- Update operator dependency - Don't store policy on session token, instead obtain it during session validation Signed-off-by: Lenin Alevski <alevsk.8772@gmail.com>
123 lines
3.8 KiB
Go
123 lines
3.8 KiB
Go
// This file is part of MinIO Console Server
|
|
// Copyright (c) 2021 MinIO, Inc.
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package restapi
|
|
|
|
import (
|
|
"context"
|
|
"net/http"
|
|
"net/url"
|
|
"time"
|
|
|
|
"github.com/go-openapi/runtime/middleware"
|
|
"github.com/minio/console/models"
|
|
"github.com/minio/console/pkg/acl"
|
|
"github.com/minio/console/restapi/operations"
|
|
"github.com/minio/console/restapi/operations/user_api"
|
|
)
|
|
|
|
func isErasureMode() bool {
|
|
u, err := url.Parse(getMinIOServer())
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
u.Path = "/minio/health/cluster"
|
|
|
|
req, err := http.NewRequest(http.MethodGet, u.String(), nil)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
clnt := GetConsoleHTTPClient()
|
|
resp, err := clnt.Do(req)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
return false
|
|
}
|
|
|
|
return resp.Header.Get("x-minio-write-quorum") != ""
|
|
}
|
|
|
|
func registerSessionHandlers(api *operations.ConsoleAPI) {
|
|
// session check
|
|
api.UserAPISessionCheckHandler = user_api.SessionCheckHandlerFunc(func(params user_api.SessionCheckParams, session *models.Principal) middleware.Responder {
|
|
sessionResp, err := getSessionResponse(session)
|
|
if err != nil {
|
|
return user_api.NewSessionCheckDefault(int(err.Code)).WithPayload(err)
|
|
}
|
|
return user_api.NewSessionCheckOK().WithPayload(sessionResp)
|
|
})
|
|
}
|
|
|
|
// getSessionResponse parse the token of the current session and returns a list of allowed actions to render in the UI
|
|
func getSessionResponse(session *models.Principal) (*models.SessionResponse, *models.Error) {
|
|
ctx, cancel := context.WithTimeout(context.Background(), 20*time.Second)
|
|
defer cancel()
|
|
// serialize output
|
|
if session == nil {
|
|
return nil, prepareError(errorGenericInvalidSession)
|
|
}
|
|
|
|
// initialize admin client
|
|
mAdminClient, err := NewMinioAdminClient(&models.Principal{
|
|
STSAccessKeyID: session.STSAccessKeyID,
|
|
STSSecretAccessKey: session.STSSecretAccessKey,
|
|
STSSessionToken: session.STSSessionToken,
|
|
})
|
|
if err != nil {
|
|
return nil, prepareError(err, errorGenericInvalidSession)
|
|
}
|
|
userAdminClient := AdminClient{Client: mAdminClient}
|
|
// Obtain the current policy assigned to this user
|
|
// necessary for generating the list of allowed endpoints
|
|
policy, err := getAccountPolicy(ctx, userAdminClient)
|
|
if err != nil {
|
|
return nil, prepareError(err, errorGenericInvalidSession)
|
|
}
|
|
// by default every user starts with an empty array of available actions
|
|
// therefore we would have access only to pages that doesn't require any privilege
|
|
// ie: service-account page
|
|
var actions []string
|
|
// if a policy is assigned to this user we parse the actions from there
|
|
if policy != nil {
|
|
actions = acl.GetActionsStringFromPolicy(policy)
|
|
}
|
|
|
|
sessionResp := &models.SessionResponse{
|
|
Pages: acl.GetAuthorizedEndpoints(actions),
|
|
Features: getListOfEnabledFeatures(),
|
|
Status: models.SessionResponseStatusOk,
|
|
Operator: false,
|
|
DistributedMode: isErasureMode(),
|
|
}
|
|
return sessionResp, nil
|
|
}
|
|
|
|
// getListOfEnabledFeatures returns a list of features
|
|
func getListOfEnabledFeatures() []string {
|
|
var features []string
|
|
logSearchURL := getLogSearchURL()
|
|
|
|
if logSearchURL != "" {
|
|
features = append(features, "log-search")
|
|
}
|
|
|
|
return features
|
|
}
|