37 Star 407 Fork 75

GVPrancher/rancher

加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
克隆/下载
azure_provider.go 15.26 KB
一键复制 编辑 原始数据 按行查看 历史
Dan Ramich 提交于 2019-06-12 13:38 . goimport linting changes
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562
package azure
import (
"context"
"encoding/json"
"fmt"
"strings"
"time"
"github.com/Azure/azure-sdk-for-go/services/graphrbac/1.6/graphrbac"
"github.com/Azure/go-autorest/autorest/adal"
"github.com/mitchellh/mapstructure"
"github.com/pkg/errors"
"github.com/rancher/norman/httperror"
"github.com/rancher/norman/types"
"github.com/rancher/rancher/pkg/api/store/auth"
"github.com/rancher/rancher/pkg/auth/providers/common"
"github.com/rancher/rancher/pkg/auth/tokens"
corev1 "github.com/rancher/types/apis/core/v1"
v3 "github.com/rancher/types/apis/management.cattle.io/v3"
"github.com/rancher/types/apis/management.cattle.io/v3public"
client "github.com/rancher/types/client/management/v3"
publicclient "github.com/rancher/types/client/management/v3public"
"github.com/rancher/types/config"
"github.com/rancher/types/user"
"github.com/sirupsen/logrus"
"golang.org/x/sync/errgroup"
apierrors "k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime"
)
const (
// Name of the provider
Name = "azuread"
)
type azureProvider struct {
ctx context.Context
authConfigs v3.AuthConfigInterface
secrets corev1.SecretInterface
userMGR user.Manager
tokenMGR *tokens.Manager
}
func Configure(
ctx context.Context,
mgmtCtx *config.ScaledContext,
userMGR user.Manager,
tokenMGR *tokens.Manager,
) common.AuthProvider {
return &azureProvider{
ctx: ctx,
authConfigs: mgmtCtx.Management.AuthConfigs(""),
secrets: mgmtCtx.Core.Secrets(""),
userMGR: userMGR,
tokenMGR: tokenMGR,
}
}
func (ap *azureProvider) GetName() string {
return Name
}
func (ap *azureProvider) AuthenticateUser(
input interface{},
) (v3.Principal, []v3.Principal, string, error) {
login, ok := input.(*v3public.AzureADLogin)
if !ok {
return v3.Principal{}, nil, "", errors.New("unexpected input type")
}
return ap.loginUser(login, nil, false)
}
func (ap *azureProvider) RefetchGroupPrincipals(principalID string, secret string) ([]v3.Principal, error) {
azureClient, err := ap.newAzureClient(secret)
if err != nil {
return nil, err
}
oid, err := parseJWTforField(azureClient.accessToken(), "oid")
if err != nil {
return nil, err
}
logrus.Debug("[AZURE_PROVIDER] Started getting user info from AzureAD")
user, err := azureClient.userClient.Get(context.Background(), oid)
if err != nil {
return nil, err
}
logrus.Debug("[AZURE_PROVIDER] Completed getting user info from AzureAD")
var mem bool
params := graphrbac.UserGetMemberGroupsParameters{
SecurityEnabledOnly: &mem,
}
userGroups, err := azureClient.userClient.GetMemberGroups(context.Background(), *user.ObjectID, params)
if err != nil {
return nil, err
}
groupPrincipals, err := ap.userGroupsToPrincipals(azureClient, userGroups)
if err != nil {
return nil, err
}
return groupPrincipals, nil
}
func (ap *azureProvider) SearchPrincipals(
name string,
principalType string,
token v3.Token,
) ([]v3.Principal, error) {
var princ []v3.Principal
secret, err := ap.tokenMGR.GetSecret(token.UserID, Name, []*v3.Token{&token})
if err != nil && !apierrors.IsNotFound(err) {
return nil, err
}
client, err := ap.newAzureClient(secret)
if err != nil {
return nil, err
}
switch principalType {
case "user":
princ, err = ap.searchUsers(client, name, token)
if err != nil {
return nil, err
}
case "group":
princ, err = ap.searchGroups(client, name, token)
if err != nil {
return nil, err
}
case "":
users, err := ap.searchUsers(client, name, token)
if err != nil {
return nil, err
}
groups, err := ap.searchGroups(client, name, token)
if err != nil {
return nil, err
}
princ = append(princ, users...)
princ = append(princ, groups...)
}
return princ, ap.updateToken(client, &token)
}
func (ap *azureProvider) GetPrincipal(
principalID string,
token v3.Token,
) (v3.Principal, error) {
var princ v3.Principal
var err error
secret, err := ap.tokenMGR.GetSecret(token.UserID, Name, []*v3.Token{&token})
if err != nil && !apierrors.IsNotFound(err) {
return princ, err
}
client, err := ap.newAzureClient(secret)
if err != nil {
return princ, err
}
parsed, err := parsePrincipalID(principalID)
if err != nil {
return v3.Principal{}, httperror.NewAPIError(httperror.NotFound, "invalid principal")
}
switch parsed["type"] {
case "user":
princ, err = ap.getUser(client, parsed["ID"], token)
case "group":
princ, err = ap.getGroup(client, parsed["ID"], token)
}
if err != nil {
return v3.Principal{}, err
}
return princ, ap.updateToken(client, &token)
}
func (ap *azureProvider) CustomizeSchema(schema *types.Schema) {
schema.ActionHandler = ap.actionHandler
schema.Formatter = ap.formatter
}
func (ap *azureProvider) TransformToAuthProvider(
authConfig map[string]interface{},
) map[string]interface{} {
p := common.TransformToAuthProvider(authConfig)
p[publicclient.AzureADProviderFieldRedirectURL] = formAzureRedirectURL(authConfig)
return p
}
func (ap *azureProvider) loginUser(
azureCredential *v3public.AzureADLogin,
config *v3.AzureADConfig,
test bool,
) (v3.Principal, []v3.Principal, string, error) {
var err error
if config == nil {
config, err = ap.getAzureConfigK8s()
if err != nil {
return v3.Principal{}, nil, "", err
}
}
logrus.Debug("[AZURE_PROVIDER] Started token swap with AzureAD")
azureClient, err := newClientCode(azureCredential.Code, config)
if err != nil {
return v3.Principal{}, nil, "", err
}
logrus.Debug("[AZURE_PROVIDER] Completed token swap with AzureAD")
oid, err := parseJWTforField(azureClient.accessToken(), "oid")
if err != nil {
return v3.Principal{}, nil, "", err
}
logrus.Debug("[AZURE_PROVIDER] Started getting user info from AzureAD")
user, err := azureClient.userClient.Get(context.Background(), oid)
if err != nil {
return v3.Principal{}, nil, "", err
}
logrus.Debug("[AZURE_PROVIDER] Completed getting user info from AzureAD")
userPrincipal := ap.userToPrincipal(user)
userPrincipal.Me = true
var mem bool
params := graphrbac.UserGetMemberGroupsParameters{
SecurityEnabledOnly: &mem,
}
userGroups, err := azureClient.userClient.GetMemberGroups(context.Background(), *user.ObjectID, params)
if err != nil {
return v3.Principal{}, nil, "", err
}
groupPrincipals, err := ap.userGroupsToPrincipals(azureClient, userGroups)
if err != nil {
return v3.Principal{}, nil, "", err
}
testAllowedPrincipals := config.AllowedPrincipalIDs
if test && config.AccessMode == "restricted" {
testAllowedPrincipals = append(testAllowedPrincipals, userPrincipal.Name)
}
allowed, err := ap.userMGR.CheckAccess(config.AccessMode, testAllowedPrincipals, userPrincipal.Name, groupPrincipals)
if err != nil {
return v3.Principal{}, nil, "", err
}
if !allowed {
return v3.Principal{}, nil, "", httperror.NewAPIError(httperror.Unauthorized, "unauthorized")
}
providerToken, err := azureClient.marshalTokenJSON()
if err != nil {
return v3.Principal{}, nil, "", err
}
return userPrincipal, groupPrincipals, string(providerToken), nil
}
func (ap *azureProvider) getUser(client *azureClient, principalID string, token v3.Token) (v3.Principal, error) {
user, err := client.userClient.Get(context.Background(), principalID)
if err != nil {
return v3.Principal{}, httperror.NewAPIError(httperror.NotFound, err.Error())
}
p := ap.userToPrincipal(user)
p.Me = samePrincipal(token.UserPrincipal, p)
return p, nil
}
func (ap *azureProvider) getGroup(client *azureClient, principalID string, token v3.Token) (v3.Principal, error) {
group, err := client.groupClient.Get(context.Background(), principalID)
if err != nil {
return v3.Principal{}, httperror.NewAPIError(httperror.NotFound, err.Error())
}
p := ap.groupToPrincipal(group)
p.MemberOf = ap.tokenMGR.IsMemberOf(token, p)
return p, nil
}
func (ap *azureProvider) searchUsers(client *azureClient, name string, token v3.Token) ([]v3.Principal, error) {
filter := fmt.Sprintf("startswith(userPrincipalName,'%[1]s') or startswith(displayName,'%[1]s') or startswith(givenName,'%[1]s') or startswith(surname,'%[1]s')", name)
users, err := client.userClient.List(context.Background(), filter)
if err != nil {
return nil, err
}
var principals []v3.Principal
for _, user := range users.Values() {
p := ap.userToPrincipal(user)
p.Me = samePrincipal(token.UserPrincipal, p)
principals = append(principals, p)
}
return principals, nil
}
func (ap *azureProvider) searchGroups(client *azureClient, name string, token v3.Token) ([]v3.Principal, error) {
filter := fmt.Sprintf("startswith(displayName,'%[1]s') or startswith(mail,'%[1]s') or startswith(mailNickname,'%[1]s')", name)
groups, err := client.groupClient.List(context.Background(), filter)
if err != nil {
return nil, err
}
var principals []v3.Principal
for _, group := range groups.Values() {
p := ap.groupToPrincipal(group)
p.MemberOf = ap.tokenMGR.IsMemberOf(token, p)
principals = append(principals, p)
}
return principals, nil
}
func (ap *azureProvider) newAzureClient(secret string) (*azureClient, error) {
config, err := ap.getAzureConfigK8s()
if err != nil {
return nil, err
}
azureToken, err := ap.getAzureToken(secret)
if err != nil {
return nil, err
}
client, err := newClientToken(config, azureToken)
if err != nil {
return nil, err
}
return client, nil
}
func (ap *azureProvider) saveAzureConfigK8s(config *v3.AzureADConfig) error {
storedAzureConfig, err := ap.getAzureConfigK8s()
if err != nil {
return err
}
config.APIVersion = "management.cattle.io/v3"
config.Kind = v3.AuthConfigGroupVersionKind.Kind
config.Type = client.AzureADConfigType
config.ObjectMeta = storedAzureConfig.ObjectMeta
field := strings.ToLower(auth.TypeToField[config.Type])
if err := common.CreateOrUpdateSecrets(ap.secrets, config.ApplicationSecret, field, strings.ToLower(config.Type)); err != nil {
return err
}
config.ApplicationSecret = common.GetName(config.Type, field)
logrus.Debugf("updating AzureADConfig")
_, err = ap.authConfigs.ObjectClient().Update(config.ObjectMeta.Name, config)
if err != nil {
return err
}
return nil
}
func (ap *azureProvider) getAzureConfigK8s() (*v3.AzureADConfig, error) {
authConfigObj, err := ap.authConfigs.ObjectClient().UnstructuredClient().Get(Name, metav1.GetOptions{})
if err != nil {
return nil, fmt.Errorf("failed to retrieve AzureADConfig, error: %v", err)
}
u, ok := authConfigObj.(runtime.Unstructured)
if !ok {
return nil, fmt.Errorf("failed to retrieve AzureADConfig, cannot read k8s Unstructured data")
}
storedAzureADConfigMap := u.UnstructuredContent()
storedAzureADConfig := &v3.AzureADConfig{}
mapstructure.Decode(storedAzureADConfigMap, storedAzureADConfig)
metadataMap, ok := storedAzureADConfigMap["metadata"].(map[string]interface{})
if !ok {
return nil, fmt.Errorf("failed to retrieve AzureADConfig metadata, cannot read k8s Unstructured data")
}
objectMeta := &metav1.ObjectMeta{}
mapstructure.Decode(metadataMap, objectMeta)
storedAzureADConfig.ObjectMeta = *objectMeta
if storedAzureADConfig.ApplicationSecret != "" {
value, err := common.ReadFromSecret(ap.secrets, storedAzureADConfig.ApplicationSecret,
strings.ToLower(auth.TypeToField[client.AzureADConfigType]))
if err != nil {
return nil, err
}
storedAzureADConfig.ApplicationSecret = value
}
return storedAzureADConfig, nil
}
func (ap *azureProvider) userToPrincipal(user graphrbac.User) v3.Principal {
p := v3.Principal{
ObjectMeta: metav1.ObjectMeta{Name: Name + "_user://" + *user.ObjectID},
DisplayName: *user.DisplayName,
LoginName: *user.UserPrincipalName,
PrincipalType: "user",
Provider: Name,
}
return p
}
func (ap *azureProvider) userGroupsToPrincipals(
azureClient *azureClient,
groups graphrbac.UserGetMemberGroupsResult,
) ([]v3.Principal, error) {
start := time.Now()
logrus.Debug("[AZURE_PROVIDER] Started gathering users groups")
var g errgroup.Group
groupPrincipals := make([]v3.Principal, len(*groups.Value))
for i, group := range *groups.Value {
j := i
gp := group
g.Go(func() error {
groupObj, err := azureClient.groupClient.Get(context.Background(), gp)
if err != nil {
logrus.Debugf("[AZURE_PROVIDER] Error getting group: %v", err)
return err
}
p := ap.groupToPrincipal(groupObj)
p.MemberOf = true
groupPrincipals[j] = p
return nil
})
}
if err := g.Wait(); err != nil {
return nil, err
}
logrus.Debugf("[AZURE_PROVIDER] Completed gathering users groups, took %v", time.Now().Sub(start))
return groupPrincipals, nil
}
func (ap *azureProvider) groupToPrincipal(group graphrbac.ADGroup) v3.Principal {
p := v3.Principal{
ObjectMeta: metav1.ObjectMeta{Name: Name + "_group://" + *group.ObjectID},
DisplayName: *group.DisplayName,
PrincipalType: "group",
Provider: Name,
}
return p
}
func (ap *azureProvider) getAzureToken(secret string) (adal.Token, error) {
var azureToken adal.Token
err := json.Unmarshal([]byte(secret), &azureToken)
if err != nil {
return azureToken, err
}
return azureToken, nil
}
// updateToken compares the current azure token to the azure token living in the
// secret and updates if needed
func (ap *azureProvider) updateToken(client *azureClient, token *v3.Token) error {
new, err := client.marshalTokenJSON()
if err != nil {
return err
}
stringNew := string(new)
secret, err := ap.tokenMGR.GetSecret(token.UserID, token.AuthProvider, []*v3.Token{token})
if err != nil {
if apierrors.IsNotFound(err) {
// providerToken doesn't exists as a secret, update on token
if current, ok := token.ProviderInfo["access_token"]; ok && current != stringNew {
token.ProviderInfo["access_token"] = stringNew
}
return nil
}
return err
}
if stringNew == secret {
return nil
}
return ap.tokenMGR.UpdateSecret(token.UserID, token.AuthProvider, stringNew)
}
func formAzureRedirectURL(config map[string]interface{}) string {
return fmt.Sprintf(
"%s?client_id=%s&redirect_uri=%s&resource=%s",
config["authEndpoint"],
config["applicationId"],
config["rancherUrl"],
config["graphEndpoint"],
)
}
// parsePrincipalID accepts a principalID in the format <provider>_<type>://<ID>
// and returns a map of the 3 parts - ID, provider and type
func parsePrincipalID(principalID string) (map[string]string, error) {
parsed := make(map[string]string)
parts := strings.SplitN(principalID, ":", 2)
if len(parts) != 2 {
return parsed, errors.Errorf("invalid id %v", principalID)
}
externalID := strings.TrimPrefix(parts[1], "//")
parsed["ID"] = externalID
pparts := strings.SplitN(parts[0], "_", 2)
if len(pparts) != 2 {
return parsed, errors.Errorf("invalid id %v", principalID)
}
parsed["provider"] = pparts[0]
parsed["type"] = pparts[1]
return parsed, nil
}
// samePrincipal verifies if they are the same principal
func samePrincipal(me v3.Principal, other v3.Principal) bool {
if me.ObjectMeta.Name == other.ObjectMeta.Name && me.LoginName == other.LoginName && me.PrincipalType == other.PrincipalType {
return true
}
return false
}
func (ap *azureProvider) CanAccessWithGroupProviders(userPrincipalID string, groupPrincipals []v3.Principal) (bool, error) {
config, err := ap.getAzureConfigK8s()
if err != nil {
logrus.Errorf("Error fetching azure config: %v", err)
return false, err
}
allowed, err := ap.userMGR.CheckAccess(config.AccessMode, config.AllowedPrincipalIDs, userPrincipalID, groupPrincipals)
if err != nil {
return false, err
}
return allowed, nil
}
马建仓 AI 助手
尝试更多
代码解读
代码找茬
代码优化
Go
1
https://gitee.com/rancher/rancher.git
git@gitee.com:rancher/rancher.git
rancher
rancher
rancher
v2.2.7-rc1

搜索帮助