`MCS` will authenticate against `Mkube`using bearer tokens via HTTP `Authorization` header. The user will provide this token once in the login form, MCS will validate it against Mkube (list tenants) and if valid will generate and return a new MCS sessions with encrypted claims (the user Service account token will be inside the JWT in the data field) Kubernetes The provided `JWT token` corresponds to the `Kubernetes service account` that `Mkube` will use to run tasks on behalf of the user, ie: list, create, edit, delete tenants, storage class, etc. Development If you are running mcs in your local environment and wish to make request to `Mkube` you can set `MCS_M3_HOSTNAME`, if the environment variable is not present by default `MCS` will use `"http://m3:8787"`, additionally you will need to set the `MCS_MKUBE_ADMIN_ONLY=on` variable to make MCS display the Mkube UI Extract the Service account token and use it with MCS For local development you can use the jwt associated to the `m3-sa` service account, you can get the token running the following command in your terminal: ``` kubectl get secret $(kubectl get serviceaccount m3-sa -o jsonpath="{.secrets[0].name}") -o jsonpath="{.data.token}" | base64 --decode ``` Then run the mcs server ``` MCS_M3_HOSTNAME=http://localhost:8787 MCS_MKUBE_ADMIN_ONLY=on ./mcs server ``` Self-signed certificates and Custom certificate authority for Mkube If Mkube uses TLS with a self-signed certificate, or a certificate issued by a custom certificate authority you can add those certificates usinng the `MCS_M3_SERVER_TLS_CA_CERTIFICATE` env variable ```` MCS_M3_SERVER_TLS_CA_CERTIFICATE=cert1.pem,cert2.pem,cert3.pem ./mcs server ````
78 lines
2.6 KiB
Go
78 lines
2.6 KiB
Go
// This file is part of MinIO Console Server
|
|
// Copyright (c) 2020 MinIO, Inc.
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package auth
|
|
|
|
import (
|
|
"fmt"
|
|
"log"
|
|
"net/http"
|
|
|
|
"github.com/minio/mcs/pkg/auth/mkube"
|
|
"github.com/minio/minio-go/v6/pkg/credentials"
|
|
)
|
|
|
|
// mkubeCredentialsProvider is an struct to hold the JWT (service account token)
|
|
type mkubeCredentialsProvider struct {
|
|
serviceAccountJWT string
|
|
}
|
|
|
|
// Implementing the interfaces of the minio Provider, we use this to leverage on the existing mcs Authentication flow
|
|
func (s mkubeCredentialsProvider) Retrieve() (credentials.Value, error) {
|
|
return credentials.Value{
|
|
AccessKeyID: "",
|
|
SecretAccessKey: "",
|
|
SessionToken: s.serviceAccountJWT,
|
|
}, nil
|
|
}
|
|
|
|
// IsExpired dummy function, must be implemented in order to work with the minio provider authentication
|
|
func (s mkubeCredentialsProvider) IsExpired() bool {
|
|
return false
|
|
}
|
|
|
|
// isServiceAccountTokenValid will make an authenticated request (using bearer token) against Mkube hostname, if the
|
|
// request success means the provided jwt its a valid service account token and the MCS user can use it for future requests
|
|
// until it fails
|
|
func isServiceAccountTokenValid(client *http.Client, jwt string) bool {
|
|
url := fmt.Sprintf("%s/api/v1/tenants", mkube.GetMkubeEndpoint())
|
|
m3Req, err := http.NewRequest("GET", url, nil)
|
|
if err != nil {
|
|
log.Println(err)
|
|
return false
|
|
}
|
|
token := fmt.Sprintf("Bearer %s", jwt)
|
|
m3Req.Header.Add("Authorization", token)
|
|
resp, err := client.Do(m3Req)
|
|
if err != nil {
|
|
log.Println(err)
|
|
return false
|
|
}
|
|
defer resp.Body.Close()
|
|
if resp.StatusCode >= 200 && resp.StatusCode < 300 {
|
|
return true
|
|
}
|
|
return false
|
|
}
|
|
|
|
// GetMcsCredentialsFromMkube will validate the provided JWT (service account token) and return it in the form of credentials.Credentials
|
|
func GetMcsCredentialsFromMkube(jwt string) (*credentials.Credentials, error) {
|
|
if isServiceAccountTokenValid(mkube.HTTPClient, jwt) {
|
|
return credentials.New(mkubeCredentialsProvider{serviceAccountJWT: jwt}), nil
|
|
}
|
|
return nil, errInvalidCredentials
|
|
}
|