cas.go 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package cas
  15. import (
  16. "context"
  17. "fmt"
  18. "regexp"
  19. "strings"
  20. "yunion.io/x/jsonutils"
  21. "yunion.io/x/log"
  22. "yunion.io/x/pkg/errors"
  23. "yunion.io/x/pkg/util/httputils"
  24. api "yunion.io/x/onecloud/pkg/apis/identity"
  25. "yunion.io/x/onecloud/pkg/keystone/driver"
  26. "yunion.io/x/onecloud/pkg/keystone/models"
  27. "yunion.io/x/onecloud/pkg/mcclient"
  28. )
  29. // apereo CAS (Central Authentication Server)
  30. type SCASDriver struct {
  31. driver.SBaseIdentityDriver
  32. casConfig *api.SCASIdpConfigOptions
  33. isDebug bool
  34. }
  35. func NewCASDriver(idpId, idpName, template, targetDomainId string, conf api.TConfigs) (driver.IIdentityBackend, error) {
  36. base, err := driver.NewBaseIdentityDriver(idpId, idpName, template, targetDomainId, conf)
  37. if err != nil {
  38. return nil, errors.Wrap(err, "NewBaseIdentityDriver")
  39. }
  40. drv := SCASDriver{SBaseIdentityDriver: base}
  41. drv.SetVirtualObject(&drv)
  42. err = drv.prepareConfig()
  43. if err != nil {
  44. return nil, errors.Wrap(err, "prepareConfig")
  45. }
  46. return &drv, nil
  47. }
  48. func (self *SCASDriver) prepareConfig() error {
  49. if self.casConfig == nil {
  50. conf := api.SCASIdpConfigOptions{}
  51. confJson := jsonutils.Marshal(self.Config["cas"])
  52. err := confJson.Unmarshal(&conf)
  53. if err != nil {
  54. return errors.Wrap(err, "json.Unmarshal")
  55. }
  56. if len(conf.UserIdAttribute) == 0 {
  57. conf.UserIdAttribute = "cas:user"
  58. }
  59. if len(conf.UserNameAttribute) == 0 {
  60. conf.UserNameAttribute = "cas:user"
  61. }
  62. self.casConfig = &conf
  63. log.Debugf("%s %s %#v", self.Config, confJson, self.casConfig)
  64. }
  65. return nil
  66. }
  67. func (cas *SCASDriver) GetSsoRedirectUri(ctx context.Context, callbackUrl, state string) (string, error) {
  68. req := map[string]string{
  69. "service": callbackUrl,
  70. }
  71. urlStr := fmt.Sprintf("%s?%s", cas.casConfig.CASServerURL, jsonutils.Marshal(req).QueryString())
  72. return urlStr, nil
  73. }
  74. func (self *SCASDriver) request(ctx context.Context, method httputils.THttpMethod, path string) ([]byte, error) {
  75. cli := httputils.GetDefaultClient()
  76. urlStr := httputils.JoinPath(self.casConfig.CASServerURL, path)
  77. resp, err := httputils.Request(cli, ctx, method, urlStr, nil, nil, self.isDebug)
  78. _, body, err := httputils.ParseResponse("", resp, err, self.isDebug)
  79. return body, err
  80. }
  81. /*
  82. serviceValidate response:
  83. <cas:serviceResponse xmlns:cas='http://www.yale.edu/tp/cas'>
  84. <cas:authenticationSuccess>
  85. <cas:user>casuser</cas:user>
  86. </cas:authenticationSuccess>
  87. </cas:serviceResponse>
  88. <cas:serviceResponse xmlns:cas='http://www.yale.edu/tp/cas'>
  89. <cas:authenticationSuccess>
  90. <cas:user>casuser</cas:user>
  91. <cas:attributes>
  92. <cas:credentialType>UsernamePasswordCredential</cas:credentialType>
  93. <cas:isFromNewLogin>false</cas:isFromNewLogin>
  94. <cas:authenticationDate>2019-09-05T12:40:08.014Z[UTC]</cas:authenticationDate>
  95. <cas:authenticationMethod>AcceptUsersAuthenticationHandler</cas:authenticationMethod>
  96. <cas:successfulAuthenticationHandlers>AcceptUsersAuthenticationHandler</cas:successfulAuthenticationHandlers>
  97. <cas:longTermAuthenticationRequestTokenUsed>false</cas:longTermAuthenticationRequestTokenUsed>
  98. </cas:attributes>
  99. </cas:authenticationSuccess>
  100. </cas:serviceResponse>
  101. */
  102. /*type SCASServiceResponse struct {
  103. XMLName xml.Name `xml:"serviceResponse"`
  104. CASAuthenticationSuccess struct {
  105. CASUser string `xml:"user"`
  106. } `xml:"authenticationSuccess"`
  107. }*/
  108. func (self *SCASDriver) Authenticate(ctx context.Context, ident mcclient.SAuthenticationIdentity) (*api.SUserExtended, error) {
  109. query := jsonutils.NewDict()
  110. query.Set("ticket", jsonutils.NewString(ident.CASTicket.Id))
  111. query.Set("service", jsonutils.NewString(ident.CASTicket.Service))
  112. path := "serviceValidate?" + query.QueryString()
  113. resp, err := self.request(ctx, "GET", path)
  114. /*if err != nil && httputils.ErrorCode(err) == 404 {
  115. path = "serviceValidate?" + query.QueryString()
  116. resp, err = self.request(ctx, "GET", path)
  117. }*/
  118. if err != nil {
  119. return nil, errors.Wrap(err, "self.request")
  120. }
  121. log.Debugf("CAS response: %s qs: %s", resp, query.QueryString())
  122. attrs := fetchAttributes(resp)
  123. var domainId, domainName, usrId, usrName string
  124. if v, ok := attrs[self.casConfig.DomainIdAttribute]; ok && len(v) > 0 {
  125. domainId = v[0]
  126. }
  127. if v, ok := attrs[self.casConfig.DomainNameAttribute]; ok && len(v) > 0 {
  128. domainName = v[0]
  129. }
  130. if v, ok := attrs[self.casConfig.UserIdAttribute]; ok && len(v) > 0 {
  131. usrId = v[0]
  132. }
  133. if v, ok := attrs[self.casConfig.UserNameAttribute]; ok && len(v) > 0 {
  134. usrName = v[0]
  135. }
  136. idp, err := models.IdentityProviderManager.FetchIdentityProviderById(self.IdpId)
  137. if err != nil {
  138. return nil, errors.Wrap(err, "self.GetIdentityProvider")
  139. }
  140. domain, usr, err := idp.SyncOrCreateDomainAndUser(ctx, domainId, domainName, usrId, usrName)
  141. if err != nil {
  142. return nil, errors.Wrap(err, "idp.SyncOrCreateDomainAndUser")
  143. }
  144. extUser, err := models.UserManager.FetchUserExtended(usr.Id, "", "", "")
  145. if err != nil {
  146. return nil, errors.Wrap(err, "models.UserManager.FetchUserExtended")
  147. }
  148. idp.TryUserJoinProject(self.casConfig.SIdpAttributeOptions, ctx, usr, domain.Id, attrs)
  149. extUser.AuditIds = []string{
  150. ident.CASTicket.Id,
  151. }
  152. return extUser, nil
  153. }
  154. /*func (self *SCASDriver) userTryJoinProject(ctx context.Context, usr *models.SUser, domainId string, resp []byte) {
  155. var err error
  156. var targetProject *models.SProject
  157. log.Debugf("userTryJoinProject resp %s proj %s", string(resp), self.casConfig.CasProjectAttribute)
  158. if !consts.GetNonDefaultDomainProjects() {
  159. domainId = api.DEFAULT_DOMAIN_ID
  160. }
  161. if len(self.casConfig.CasProjectAttribute) > 0 {
  162. projName := fetchAttribute(resp, self.casConfig.CasProjectAttribute)
  163. if len(projName) > 0 {
  164. targetProject, err = models.ProjectManager.FetchProject("", projName, domainId, "")
  165. if err != nil {
  166. log.Errorf("fetch project %s fail %s", projName, err)
  167. if errors.Cause(err) == sql.ErrNoRows && self.casConfig.AutoCreateCasProject.IsTrue() {
  168. targetProject, err = models.ProjectManager.NewProject(ctx, projName, "cas project", domainId)
  169. if err != nil {
  170. log.Errorf("auto create project %s fail %s", projName, err)
  171. }
  172. }
  173. }
  174. }
  175. }
  176. if targetProject == nil && len(self.casConfig.DefaultCasProjectId) > 0 {
  177. targetProject, err = models.ProjectManager.FetchProjectById(self.casConfig.DefaultCasProjectId)
  178. if err != nil {
  179. log.Errorf("fetch default project %s fail %s", self.casConfig.DefaultCasProjectId, err)
  180. }
  181. }
  182. if targetProject != nil {
  183. // put user in project
  184. var targetRole *models.SRole
  185. if len(self.casConfig.CasRoleAttribute) > 0 {
  186. roleName := fetchAttribute(resp, self.casConfig.CasRoleAttribute)
  187. if len(roleName) > 0 {
  188. targetRole, err = models.RoleManager.FetchRole("", roleName, domainId, "")
  189. if err != nil {
  190. log.Errorf("fetch role %s fail %s", roleName, err)
  191. }
  192. }
  193. }
  194. if targetRole == nil && len(self.casConfig.DefaultCasRoleId) > 0 {
  195. targetRole, err = models.RoleManager.FetchRoleById(self.casConfig.DefaultCasRoleId)
  196. if err != nil {
  197. log.Errorf("fetch default role %s fail %s", self.casConfig.DefaultCasRoleId, err)
  198. }
  199. }
  200. if targetRole != nil {
  201. err = models.AssignmentManager.ProjectAddUser(ctx, models.GetDefaultAdminCred(), targetProject, usr, targetRole)
  202. if err != nil {
  203. log.Errorf("CAS user join project fail %s", err)
  204. }
  205. }
  206. }
  207. }*/
  208. func fetchAttributes(heystack []byte) map[string][]string {
  209. ret := make(map[string][]string)
  210. pattern := regexp.MustCompile(`<([^>/]+)>([^<]*)</([^>]+)>`)
  211. results := pattern.FindAllStringSubmatch(string(heystack), -1)
  212. for _, result := range results {
  213. key := result[1]
  214. value := strings.TrimSpace(result[2])
  215. var vs []string
  216. if _, ok := ret[key]; ok {
  217. vs = ret[key]
  218. } else {
  219. vs = make([]string, 0, 1)
  220. }
  221. ret[key] = append(vs, value)
  222. }
  223. return ret
  224. }
  225. func (self *SCASDriver) Sync(ctx context.Context) error {
  226. return nil
  227. }
  228. func (self *SCASDriver) Probe(ctx context.Context) error {
  229. _, err := self.request(ctx, "GET", "login")
  230. if err != nil && httputils.ErrorCode(err) != 401 {
  231. return errors.Wrap(err, "self.request")
  232. }
  233. return nil
  234. }