* Remove more unused APIs * prettier * Fix Test * Fix tests * Remove SSO Integreation * fix tests * lint
175 lines
5.9 KiB
Go
175 lines
5.9 KiB
Go
// This file is part of MinIO Console Server
|
|
// Copyright (c) 2021 MinIO, Inc.
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package api
|
|
|
|
import (
|
|
"context"
|
|
"net/http"
|
|
"strings"
|
|
|
|
"github.com/go-openapi/runtime"
|
|
"github.com/go-openapi/runtime/middleware"
|
|
"github.com/minio/console/api/operations"
|
|
authApi "github.com/minio/console/api/operations/auth"
|
|
"github.com/minio/console/models"
|
|
"github.com/minio/console/pkg/auth"
|
|
"github.com/minio/madmin-go/v3"
|
|
"github.com/minio/minio-go/v7/pkg/credentials"
|
|
"github.com/minio/pkg/v3/env"
|
|
xnet "github.com/minio/pkg/v3/net"
|
|
)
|
|
|
|
func registerLoginHandlers(api *operations.ConsoleAPI) {
|
|
// GET login strategy
|
|
api.AuthLoginDetailHandler = authApi.LoginDetailHandlerFunc(func(_ authApi.LoginDetailParams) middleware.Responder {
|
|
loginDetails, err := getLoginDetailsResponse()
|
|
if err != nil {
|
|
return authApi.NewLoginDetailDefault(err.Code).WithPayload(err.APIError)
|
|
}
|
|
return authApi.NewLoginDetailOK().WithPayload(loginDetails)
|
|
})
|
|
// POST login using user credentials
|
|
api.AuthLoginHandler = authApi.LoginHandlerFunc(func(params authApi.LoginParams) middleware.Responder {
|
|
loginResponse, err := getLoginResponse(params)
|
|
if err != nil {
|
|
return authApi.NewLoginDefault(err.Code).WithPayload(err.APIError)
|
|
}
|
|
// Custom response writer to set the session cookies
|
|
return middleware.ResponderFunc(func(w http.ResponseWriter, p runtime.Producer) {
|
|
cookie := NewSessionCookieForConsole(loginResponse.SessionID)
|
|
http.SetCookie(w, &cookie)
|
|
authApi.NewLoginNoContent().WriteResponse(w, p)
|
|
})
|
|
})
|
|
}
|
|
|
|
// login performs a check of ConsoleCredentials against MinIO, generates some claims and returns the jwt
|
|
// for subsequent authentication
|
|
func login(credentials ConsoleCredentialsI, sessionFeatures *auth.SessionFeatures) (*string, error) {
|
|
// try to obtain consoleCredentials,
|
|
tokens, err := credentials.Get()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// if we made it here, the consoleCredentials work, generate a jwt with claims
|
|
token, err := auth.NewEncryptedTokenForClient(&tokens, credentials.GetAccountAccessKey(), sessionFeatures)
|
|
if err != nil {
|
|
LogError("error authenticating user: %v", err)
|
|
return nil, ErrInvalidLogin
|
|
}
|
|
return &token, nil
|
|
}
|
|
|
|
// getAccountInfo will return the current user information
|
|
func getAccountInfo(ctx context.Context, client MinioAdmin) (*madmin.AccountInfo, error) {
|
|
accountInfo, err := client.AccountInfo(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &accountInfo, nil
|
|
}
|
|
|
|
// getConsoleCredentials will return ConsoleCredentials interface
|
|
func getConsoleCredentials(accessKey, secretKey string, client *http.Client) (*ConsoleCredentials, error) {
|
|
creds, err := NewConsoleCredentials(accessKey, secretKey, GetMinIORegion(), client)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &ConsoleCredentials{
|
|
ConsoleCredentials: creds,
|
|
AccountAccessKey: accessKey,
|
|
CredContext: &credentials.CredContext{
|
|
Client: client,
|
|
},
|
|
}, nil
|
|
}
|
|
|
|
// getLoginResponse performs login() and serializes it to the handler's output
|
|
func getLoginResponse(params authApi.LoginParams) (*models.LoginResponse, *CodedAPIError) {
|
|
ctx, cancel := context.WithCancel(params.HTTPRequest.Context())
|
|
defer cancel()
|
|
lr := params.Body
|
|
// trim any leading and trailing whitespace from the login request
|
|
lr.AccessKey = strings.TrimSpace(lr.AccessKey)
|
|
lr.SecretKey = strings.TrimSpace(lr.SecretKey)
|
|
lr.Sts = strings.TrimSpace(lr.Sts)
|
|
|
|
clientIP := getClientIP(params.HTTPRequest)
|
|
client := GetConsoleHTTPClient(clientIP)
|
|
|
|
var err error
|
|
var consoleCreds *ConsoleCredentials
|
|
// if we receive an STS we use that instead of the credentials
|
|
if lr.Sts != "" {
|
|
consoleCreds = &ConsoleCredentials{
|
|
ConsoleCredentials: credentials.NewStaticV4(lr.AccessKey, lr.SecretKey, lr.Sts),
|
|
AccountAccessKey: lr.AccessKey,
|
|
CredContext: &credentials.CredContext{
|
|
Client: client,
|
|
},
|
|
}
|
|
} else {
|
|
// prepare console credentials
|
|
consoleCreds, err = getConsoleCredentials(lr.AccessKey, lr.SecretKey, client)
|
|
if err != nil {
|
|
return nil, ErrorWithContext(ctx, err, ErrInvalidLogin)
|
|
}
|
|
}
|
|
|
|
sf := &auth.SessionFeatures{}
|
|
if lr.Features != nil {
|
|
sf.HideMenu = lr.Features.HideMenu
|
|
}
|
|
sessionID, err := login(consoleCreds, sf)
|
|
if err != nil {
|
|
if xnet.IsNetworkOrHostDown(err, true) {
|
|
return nil, ErrorWithContext(ctx, ErrNetworkError)
|
|
}
|
|
return nil, ErrorWithContext(ctx, err, ErrInvalidLogin)
|
|
}
|
|
// serialize output
|
|
loginResponse := &models.LoginResponse{
|
|
SessionID: *sessionID,
|
|
}
|
|
return loginResponse, nil
|
|
}
|
|
|
|
// isKubernetes returns true if minio is running in kubernetes.
|
|
func isKubernetes() bool {
|
|
// Kubernetes env used to validate if we are
|
|
// indeed running inside a kubernetes pod
|
|
// is KUBERNETES_SERVICE_HOST
|
|
// https://github.com/kubernetes/kubernetes/blob/master/pkg/kubelet/kubelet_pods.go#L541
|
|
return env.Get("KUBERNETES_SERVICE_HOST", "") != ""
|
|
}
|
|
|
|
// getLoginDetailsResponse returns information regarding the Console authentication mechanism.
|
|
func getLoginDetailsResponse() (ld *models.LoginDetails, apiErr *CodedAPIError) {
|
|
loginStrategy := models.LoginDetailsLoginStrategyForm
|
|
var redirectRules []*models.RedirectRule
|
|
|
|
loginDetails := &models.LoginDetails{
|
|
LoginStrategy: loginStrategy,
|
|
RedirectRules: redirectRules,
|
|
IsK8S: isKubernetes(),
|
|
AnimatedLogin: getConsoleAnimatedLogin(),
|
|
}
|
|
|
|
return loginDetails, nil
|
|
}
|