identity_provider.go 52 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package models
  15. import (
  16. "context"
  17. "database/sql"
  18. "encoding/xml"
  19. "fmt"
  20. "strings"
  21. "time"
  22. "yunion.io/x/jsonutils"
  23. "yunion.io/x/log"
  24. "yunion.io/x/pkg/errors"
  25. "yunion.io/x/pkg/tristate"
  26. "yunion.io/x/pkg/util/rbacscope"
  27. "yunion.io/x/sqlchemy"
  28. "yunion.io/x/onecloud/pkg/apis"
  29. api "yunion.io/x/onecloud/pkg/apis/identity"
  30. "yunion.io/x/onecloud/pkg/cloudcommon/consts"
  31. "yunion.io/x/onecloud/pkg/cloudcommon/db"
  32. "yunion.io/x/onecloud/pkg/cloudcommon/db/lockman"
  33. "yunion.io/x/onecloud/pkg/cloudcommon/db/taskman"
  34. "yunion.io/x/onecloud/pkg/httperrors"
  35. "yunion.io/x/onecloud/pkg/keystone/driver"
  36. "yunion.io/x/onecloud/pkg/keystone/options"
  37. "yunion.io/x/onecloud/pkg/keystone/saml"
  38. "yunion.io/x/onecloud/pkg/mcclient"
  39. "yunion.io/x/onecloud/pkg/util/logclient"
  40. "yunion.io/x/onecloud/pkg/util/samlutils/sp"
  41. "yunion.io/x/onecloud/pkg/util/stringutils2"
  42. )
  43. type SIdentityProviderManager struct {
  44. db.SEnabledStatusStandaloneResourceBaseManager
  45. db.SDomainizedResourceBaseManager
  46. }
  47. var (
  48. IdentityProviderManager *SIdentityProviderManager
  49. )
  50. func init() {
  51. IdentityProviderManager = &SIdentityProviderManager{
  52. SEnabledStatusStandaloneResourceBaseManager: db.NewEnabledStatusStandaloneResourceBaseManager(
  53. SIdentityProvider{},
  54. api.IDENTITY_PROVIDER_TABLE,
  55. api.IDENTITY_PROVIDER_RESOURCE_TYPE,
  56. api.IDENTITY_PROVIDER_RESOURCE_TYPES,
  57. ),
  58. }
  59. IdentityProviderManager.SetVirtualObject(IdentityProviderManager)
  60. }
  61. /*
  62. desc identity_provider;
  63. +-------------+-------------+------+-----+---------+-------+
  64. | Field | Type | Null | Key | Default | Extra |
  65. +-------------+-------------+------+-----+---------+-------+
  66. | id | varchar(64) | NO | PRI | NULL | |
  67. | enabled | tinyint(1) | NO | | NULL | |
  68. | description | text | YES | | NULL | |
  69. | domain_id | varchar(64) | NO | MUL | NULL | |
  70. +-------------+-------------+------+-----+---------+-------+
  71. */
  72. type SIdentityProvider struct {
  73. db.SEnabledStatusStandaloneResourceBase
  74. db.SDomainizedResourceBase `default:""`
  75. Driver string `width:"32" charset:"ascii" nullable:"false" list:"domain" create:"domain_required"`
  76. Template string `width:"32" charset:"ascii" nullable:"true" list:"domain" create:"domain_optional"`
  77. TargetDomainId string `width:"64" charset:"ascii" nullable:"true" list:"domain" create:"admin_optional"`
  78. // 是否自动创建项目
  79. AutoCreateProject tristate.TriState `default:"true" list:"domain" create:"domain_optional" update:"domain"`
  80. // 是否自动创建用户
  81. AutoCreateUser tristate.TriState `list:"domain" create:"domain_optional" update:"domain"`
  82. ErrorCount int `list:"domain"`
  83. SyncStatus string `width:"10" charset:"ascii" default:"idle" list:"domain"`
  84. LastSync time.Time `list:"domain"` // = Column(DateTime, nullable=True)
  85. LastSyncEndAt time.Time `list:"domain"`
  86. SyncIntervalSeconds int `create:"domain_optional" update:"domain"`
  87. // 认证源图标
  88. IconUri string `width:"256" charset:"utf8" nullable:"true" list:"user" create:"domain_optional" update:"domain"`
  89. // 是否是SSO登录方式
  90. IsSso tristate.TriState `list:"domain"`
  91. // 是否是缺省SSO登录方式
  92. IsDefault tristate.TriState `list:"domain"`
  93. }
  94. func (manager *SIdentityProviderManager) initializeAutoCreateUser() error {
  95. q := manager.Query().IsNull("auto_create_user")
  96. idps := make([]SIdentityProvider, 0)
  97. err := db.FetchModelObjects(manager, q, &idps)
  98. if err != nil {
  99. if errors.Cause(err) == sql.ErrNoRows {
  100. return nil
  101. } else {
  102. return errors.Wrap(err, "FetchModelObjects")
  103. }
  104. }
  105. for i := range idps {
  106. drvCls := idps[i].getDriverClass()
  107. _, err := db.Update(&idps[i], func() error {
  108. if drvCls.ForceSyncUser() {
  109. idps[i].AutoCreateUser = tristate.True
  110. } else {
  111. idps[i].AutoCreateUser = tristate.False
  112. }
  113. return nil
  114. })
  115. if err != nil {
  116. return errors.Wrap(err, "update auto_create_user")
  117. }
  118. }
  119. return nil
  120. }
  121. func (manager *SIdentityProviderManager) initializeIcon() error {
  122. q := manager.Query().IsNull("is_sso")
  123. idps := make([]SIdentityProvider, 0)
  124. err := db.FetchModelObjects(manager, q, &idps)
  125. if err != nil {
  126. if errors.Cause(err) == sql.ErrNoRows {
  127. return nil
  128. } else {
  129. return errors.Wrap(err, "FetchModelObjects")
  130. }
  131. }
  132. for i := range idps {
  133. drvCls := idps[i].getDriverClass()
  134. _, err := db.Update(&idps[i], func() error {
  135. if drvCls.IsSso() {
  136. idps[i].IsSso = tristate.True
  137. idps[i].IconUri = drvCls.GetDefaultIconUri(idps[i].Template)
  138. } else {
  139. idps[i].IsSso = tristate.False
  140. idps[i].IconUri = drvCls.GetDefaultIconUri(idps[i].Template)
  141. }
  142. return nil
  143. })
  144. if err != nil {
  145. return errors.Wrap(err, "update is_sso")
  146. }
  147. }
  148. return nil
  149. }
  150. func (manager *SIdentityProviderManager) InitializeData() error {
  151. err := manager.initializeAutoCreateUser()
  152. if err != nil {
  153. return errors.Wrap(err, "initializeAutoCreateUser")
  154. }
  155. err = manager.initializeIcon()
  156. if err != nil {
  157. return errors.Wrap(err, "initializeIcon")
  158. }
  159. cnt, err := manager.Query().CountWithError()
  160. if err != nil {
  161. return errors.Wrap(err, "CountWithError")
  162. }
  163. if cnt > 0 {
  164. return nil
  165. }
  166. // copy domains
  167. // first create a sql provider
  168. sqldrv := SIdentityProvider{}
  169. sqldrv.SetModelManager(manager, &sqldrv)
  170. sqldrv.Id = api.DEFAULT_IDP_ID
  171. sqldrv.Name = api.IdentityDriverSQL
  172. sqldrv.SetEnabled(true)
  173. sqldrv.Status = api.IdentityDriverStatusConnected
  174. sqldrv.Driver = api.IdentityDriverSQL
  175. sqldrv.Description = "Default sql identity provider"
  176. sqldrv.AutoCreateUser = tristate.True
  177. sqldrv.AutoCreateProject = tristate.False
  178. sqldrv.IsSso = tristate.False
  179. sqldrv.IconUri = ""
  180. err = manager.TableSpec().Insert(context.TODO(), &sqldrv)
  181. if err != nil {
  182. return errors.Wrap(err, "insert default sql driver")
  183. }
  184. // then, insert all none-sql domain drivers
  185. q := DomainManager.Query().NotEquals("id", api.KeystoneDomainRoot)
  186. domains := make([]SDomain, 0)
  187. err = db.FetchModelObjects(DomainManager, q, &domains)
  188. if err != nil {
  189. return errors.Wrap(err, "query domains")
  190. }
  191. for i := range domains {
  192. driver, err := WhitelistedConfigManager.getDriver(domains[i].Id)
  193. if err != nil {
  194. // get driver fail
  195. return errors.Wrap(err, "WhitelistedConfigManager.getDriver")
  196. }
  197. if driver == api.IdentityDriverSQL {
  198. // sql driver, skip
  199. continue
  200. }
  201. drv := SIdentityProvider{}
  202. drv.SetModelManager(manager, &drv)
  203. drv.Id = domains[i].Id // identical ID with domain, for backward compatibility
  204. drv.Name = domains[i].Name
  205. drv.SetEnabled(domains[i].Enabled.Bool())
  206. drv.Status = api.IdentityDriverStatusDisconnected
  207. drv.Driver = driver
  208. drv.Description = domains[i].Description
  209. err = manager.TableSpec().Insert(context.TODO(), &drv)
  210. if err != nil {
  211. return errors.Wrap(err, "insert driver")
  212. }
  213. _, err = IdmappingManager.RegisterIdMapWithId(context.Background(), drv.Id, api.DefaultRemoteDomainId, api.IdMappingEntityDomain, domains[i].Id)
  214. if err != nil {
  215. return errors.Wrap(err, "RegisterIdMapWithId")
  216. }
  217. }
  218. return nil
  219. }
  220. func (ident *SIdentityProvider) SetSyncStatus(ctx context.Context, userCred mcclient.TokenCredential, status string) error {
  221. if status != ident.SyncStatus {
  222. _, err := db.UpdateWithLock(ctx, ident, func() error {
  223. ident.SyncStatus = status
  224. switch status {
  225. case api.IdentitySyncStatusQueued:
  226. ident.LastSync = time.Now().UTC()
  227. ident.LastSyncEndAt = time.Time{}
  228. case api.IdentitySyncStatusSyncing:
  229. ident.LastSync = time.Now().UTC()
  230. case api.IdentitySyncStatusIdle:
  231. ident.LastSyncEndAt = time.Now().UTC()
  232. }
  233. return nil
  234. })
  235. if err != nil {
  236. return errors.Wrap(err, "updateWithLock")
  237. }
  238. }
  239. return nil
  240. }
  241. func (ident *SIdentityProvider) MarkConnected(ctx context.Context, userCred mcclient.TokenCredential) error {
  242. if ident.ErrorCount > 0 {
  243. _, err := db.UpdateWithLock(ctx, ident, func() error {
  244. ident.ErrorCount = 0
  245. return nil
  246. })
  247. if err != nil {
  248. return errors.Wrap(err, "UpdateWithLock")
  249. }
  250. }
  251. if ident.Status != api.IdentityDriverStatusConnected {
  252. return ident.SetStatus(ctx, userCred, api.IdentityDriverStatusConnected, "")
  253. }
  254. return nil
  255. }
  256. func (ident *SIdentityProvider) MarkDisconnected(ctx context.Context, userCred mcclient.TokenCredential, reason error) error {
  257. _, err := db.UpdateWithLock(ctx, ident, func() error {
  258. ident.ErrorCount = ident.ErrorCount + 1
  259. return nil
  260. })
  261. if err != nil {
  262. return errors.Wrap(err, "UpdateWithLock")
  263. }
  264. if ident.Status != api.IdentityDriverStatusDisconnected {
  265. return ident.SetStatus(ctx, userCred, api.IdentityDriverStatusDisconnected, reason.Error())
  266. }
  267. return nil
  268. }
  269. func (self *SIdentityProvider) GetDetailsConfig(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject) (jsonutils.JSONObject, error) {
  270. sensitive := jsonutils.QueryBoolean(query, "sensitive", false)
  271. if sensitive {
  272. if !db.IsAdminAllowGetSpec(ctx, userCred, self, "config") {
  273. return nil, httperrors.NewNotSufficientPrivilegeError("get sensitive config requires admin priviliges")
  274. }
  275. }
  276. conf, err := GetConfigs(self, sensitive, nil, nil)
  277. if err != nil {
  278. return nil, err
  279. }
  280. result := jsonutils.NewDict()
  281. result.Add(jsonutils.Marshal(conf), "config")
  282. return result, nil
  283. }
  284. func (ident *SIdentityProvider) getDriverClass() driver.IIdentityBackendClass {
  285. return driver.GetDriverClass(ident.Driver)
  286. }
  287. // 配置认证源
  288. func (ident *SIdentityProvider) PerformConfig(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input api.PerformConfigInput) (jsonutils.JSONObject, error) {
  289. if ident.Status == api.IdentityDriverStatusConnected && ident.GetEnabled() {
  290. return nil, httperrors.NewInvalidStatusError("cannot update config when enabled and connected")
  291. }
  292. if ident.SyncStatus != api.IdentitySyncStatusIdle {
  293. return nil, httperrors.NewInvalidStatusError("cannot update config when not idle")
  294. }
  295. var err error
  296. input.Config, err = ident.getDriverClass().ValidateConfig(ctx, userCred, ident.Template, input.Config, ident.Id, ident.DomainId)
  297. if err != nil {
  298. return nil, errors.Wrap(err, "ValidateConfig")
  299. }
  300. opts := input.Config
  301. action := input.Action
  302. changed, err := saveConfigs(userCred, action, ident, opts, nil, nil, api.SensitiveDomainConfigMap)
  303. if err != nil {
  304. return nil, httperrors.NewInternalServerError("saveConfigs fail %s", err)
  305. }
  306. if changed {
  307. ident.MarkDisconnected(ctx, userCred, fmt.Errorf("change config"))
  308. submitIdpSyncTask(ctx, userCred, ident)
  309. }
  310. return ident.GetDetailsConfig(ctx, userCred, query)
  311. }
  312. func (manager *SIdentityProviderManager) getDriveInstanceCount(drvName string) (int, error) {
  313. return manager.Query().Equals("driver", drvName).CountWithError()
  314. }
  315. func (manager *SIdentityProviderManager) ValidateCreateData(
  316. ctx context.Context,
  317. userCred mcclient.TokenCredential,
  318. ownerId mcclient.IIdentityProvider,
  319. query jsonutils.JSONObject,
  320. input api.IdentityProviderCreateInput,
  321. ) (api.IdentityProviderCreateInput, error) {
  322. var drvName string
  323. template := input.Template
  324. if len(template) > 0 {
  325. if _, ok := api.IdpTemplateDriver[template]; !ok {
  326. return input, httperrors.NewInputParameterError("invalid template")
  327. }
  328. drvName = api.IdpTemplateDriver[template]
  329. input.Driver = drvName
  330. } else {
  331. drvName = input.Driver
  332. if len(drvName) == 0 {
  333. return input, httperrors.NewInputParameterError("missing driver")
  334. }
  335. }
  336. drvCls := driver.GetDriverClass(drvName)
  337. if drvCls == nil {
  338. return input, httperrors.NewInputParameterError("driver %s not supported", drvName)
  339. }
  340. if drvCls.SingletonInstance() {
  341. cnt, err := manager.getDriveInstanceCount(drvName)
  342. if err != nil {
  343. return input, httperrors.NewGeneralError(err)
  344. }
  345. if cnt >= 1 {
  346. return input, httperrors.NewConflictError("driver %s already exists", drvName)
  347. }
  348. }
  349. if input.SyncIntervalSeconds != nil {
  350. secs := *input.SyncIntervalSeconds
  351. if secs < api.MinimalSyncIntervalSeconds {
  352. secs = api.MinimalSyncIntervalSeconds
  353. input.SyncIntervalSeconds = &secs
  354. }
  355. }
  356. ownerDomainStr := input.OwnerDomainId
  357. if len(ownerDomainStr) > 0 {
  358. domain, err := DomainManager.FetchDomainByIdOrName(ownerDomainStr)
  359. if err != nil {
  360. if err == sql.ErrNoRows {
  361. return input, httperrors.NewResourceNotFoundError2(DomainManager.Keyword(), ownerDomainStr)
  362. } else {
  363. return input, httperrors.NewGeneralError(err)
  364. }
  365. }
  366. input.OwnerDomainId = domain.Id
  367. if domain.Id != ownerId.GetProjectDomainId() && db.IsAdminAllowCreate(userCred, manager).Result.IsDeny() {
  368. return input, errors.Wrap(httperrors.ErrNotSufficientPrivilege, "require system priviliges to specify owner_domain_id")
  369. }
  370. } else if db.IsAdminAllowCreate(userCred, manager).Result.IsDeny() {
  371. input.OwnerDomainId = ownerId.GetProjectDomainId()
  372. }
  373. targetDomainStr := input.TargetDomainId
  374. if len(targetDomainStr) > 0 {
  375. domain, err := DomainManager.FetchDomainByIdOrName(targetDomainStr)
  376. if err != nil {
  377. if err == sql.ErrNoRows {
  378. return input, httperrors.NewResourceNotFoundError2(DomainManager.Keyword(), targetDomainStr)
  379. } else {
  380. return input, httperrors.NewGeneralError(err)
  381. }
  382. }
  383. input.TargetDomainId = domain.Id
  384. if domain.Id != ownerId.GetProjectDomainId() && db.IsAdminAllowCreate(userCred, manager).Result.IsDeny() {
  385. return input, errors.Wrap(httperrors.ErrNotSufficientPrivilege, "require system priviliges to specify target_domain_id")
  386. }
  387. if len(input.OwnerDomainId) > 0 && input.OwnerDomainId != input.TargetDomainId {
  388. return input, errors.Wrap(httperrors.ErrInputParameter, "inconsistent owner_domain_id and target_domain_id")
  389. }
  390. } else if db.IsAdminAllowCreate(userCred, manager).Result.IsDeny() {
  391. input.TargetDomainId = ownerId.GetProjectDomainId()
  392. }
  393. var err error
  394. input.Config, err = drvCls.ValidateConfig(ctx, userCred, input.Template, input.Config, "", input.OwnerDomainId)
  395. if err != nil {
  396. return input, errors.Wrap(err, "ValidateConfig")
  397. }
  398. input.EnabledStatusStandaloneResourceCreateInput, err = manager.SEnabledStatusStandaloneResourceBaseManager.ValidateCreateData(ctx, userCred, ownerId, query, input.EnabledStatusStandaloneResourceCreateInput)
  399. if err != nil {
  400. return input, errors.Wrap(err, "SEnabledStatusStandaloneResourceBaseManager.ValidateCreateData")
  401. }
  402. return input, nil
  403. }
  404. func (ident *SIdentityProvider) CustomizeCreate(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, data jsonutils.JSONObject) error {
  405. ident.SetEnabled(true)
  406. if db.IsAdminAllowCreate(userCred, ident.GetModelManager()).Result.IsDeny() {
  407. ident.DomainId = ownerId.GetProjectDomainId()
  408. ident.TargetDomainId = ownerId.GetProjectDomainId()
  409. } else {
  410. ownerDomainId, _ := data.GetString("owner_domain_id")
  411. if len(ownerDomainId) > 0 {
  412. ident.DomainId = ownerDomainId
  413. ident.TargetDomainId = ownerDomainId
  414. }
  415. }
  416. drvCls := ident.getDriverClass()
  417. if drvCls.IsSso() {
  418. ident.IsSso = tristate.True
  419. } else {
  420. ident.IsSso = tristate.False
  421. }
  422. if len(ident.IconUri) == 0 {
  423. ident.IconUri = drvCls.GetDefaultIconUri(ident.Template)
  424. }
  425. if drvCls.ForceSyncUser() {
  426. ident.AutoCreateUser = tristate.True
  427. }
  428. return ident.SEnabledStatusStandaloneResourceBase.CustomizeCreate(ctx, userCred, ownerId, query, data)
  429. }
  430. func (ident *SIdentityProvider) PostCreate(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, data jsonutils.JSONObject) {
  431. ident.SEnabledStatusStandaloneResourceBase.PostCreate(ctx, userCred, ownerId, query, data)
  432. logclient.AddActionLogWithContext(ctx, ident, logclient.ACT_CREATE, data, userCred, true)
  433. opts := api.TConfigs{}
  434. err := data.Unmarshal(&opts, "config")
  435. if err != nil {
  436. log.Errorf("parse config error %s", err)
  437. return
  438. }
  439. _, err = saveConfigs(userCred, "", ident, opts, nil, nil, api.SensitiveDomainConfigMap)
  440. if err != nil {
  441. log.Errorf("saveConfig fail %s", err)
  442. return
  443. }
  444. if len(ident.TargetDomainId) == 0 && ident.AutoCreateUser.IsTrue() && ident.IsSso.IsTrue() && !ident.isAutoCreateDomain() {
  445. // SSO driver need to create the target domain immediately
  446. domain, err := ident.SyncOrCreateDomain(ctx, api.DefaultRemoteDomainId, ident.Name, fmt.Sprintf("%s provider %s", ident.Driver, ident.Name), false)
  447. if err != nil {
  448. log.Errorf("create domain fail %s", err)
  449. } else {
  450. // save domain_id into target_domain_id
  451. _, err := db.Update(ident, func() error {
  452. ident.TargetDomainId = domain.Id
  453. return nil
  454. })
  455. if err != nil {
  456. log.Errorf("save target_domain_id fail: %s", err)
  457. }
  458. }
  459. }
  460. submitIdpSyncTask(ctx, userCred, ident)
  461. return
  462. }
  463. func (manager *SIdentityProviderManager) FetchEnabledProviders(driver string) ([]SIdentityProvider, error) {
  464. q := manager.Query().IsTrue("enabled")
  465. if len(driver) > 0 {
  466. q = q.Equals("driver", driver)
  467. }
  468. providers := make([]SIdentityProvider, 0)
  469. err := db.FetchModelObjects(manager, q, &providers)
  470. if err != nil && err != sql.ErrNoRows {
  471. return nil, errors.Wrap(err, "FetchModelObjects")
  472. }
  473. return providers, nil
  474. }
  475. func (self *SIdentityProvider) CanSync() bool {
  476. if self.SyncStatus == api.IdentitySyncStatusQueued || self.SyncStatus == api.IdentitySyncStatusSyncing {
  477. if self.LastSync.IsZero() || time.Now().Sub(self.LastSync) > 1800*time.Second {
  478. return true
  479. } else {
  480. return false
  481. }
  482. } else {
  483. return true
  484. }
  485. }
  486. func (self *SIdentityProvider) getSyncIntervalSeconds() int {
  487. if self.SyncIntervalSeconds == 0 {
  488. return options.Options.DefaultSyncIntervalSeconds
  489. }
  490. return self.SyncIntervalSeconds
  491. }
  492. func (self *SIdentityProvider) NeedSync() bool {
  493. drvCls := driver.GetDriverClass(self.Driver)
  494. if drvCls == nil {
  495. return false
  496. }
  497. if drvCls.SyncMethod() != api.IdentityProviderSyncFull {
  498. return false
  499. }
  500. if !self.LastSync.IsZero() && time.Now().Sub(self.LastSync) < time.Duration(self.getSyncIntervalSeconds())*time.Second {
  501. return false
  502. }
  503. return true
  504. }
  505. // 手动同步认证源
  506. func (self *SIdentityProvider) PerformSync(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, data jsonutils.JSONObject) (jsonutils.JSONObject, error) {
  507. if !self.GetEnabled() {
  508. return nil, httperrors.NewInvalidStatusError("Account disabled")
  509. }
  510. if self.CanSync() {
  511. submitIdpSyncTask(ctx, userCred, self)
  512. }
  513. return nil, nil
  514. }
  515. func (manager *SIdentityProviderManager) FetchCustomizeColumns(
  516. ctx context.Context,
  517. userCred mcclient.TokenCredential,
  518. query jsonutils.JSONObject,
  519. objs []interface{},
  520. fields stringutils2.SSortedStrings,
  521. isList bool,
  522. ) []api.IdentityProviderDetails {
  523. rows := make([]api.IdentityProviderDetails, len(objs))
  524. stdRows := manager.SEnabledStatusStandaloneResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
  525. domainRows := manager.SDomainizedResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
  526. targetDomainIds := make([]string, len(objs))
  527. idpIds := make([]string, len(objs))
  528. for i := range rows {
  529. rows[i].EnabledStatusStandaloneResourceDetails = stdRows[i]
  530. rows[i].DomainizedResourceInfo = domainRows[i]
  531. idp := objs[i].(*SIdentityProvider)
  532. rows[i].SyncIntervalSeconds = idp.getSyncIntervalSeconds()
  533. targetDomainIds[i] = idp.TargetDomainId
  534. idpIds[i] = idp.Id
  535. rows[i] = objs[i].(*SIdentityProvider).getMoreDetails(rows[i])
  536. }
  537. domainMap, err := db.FetchIdNameMap2(DomainManager, targetDomainIds)
  538. if err != nil {
  539. log.Errorf("FetchIdNameMap2 error: %s", err)
  540. }
  541. opts := []struct {
  542. DomainId string
  543. Value string
  544. }{}
  545. err = WhitelistedConfigManager.Query("domain_id", "value").In("domain_id", idpIds).Equals("option", "url").All(&opts)
  546. if err != nil {
  547. log.Errorf("FetchModelObjects error: %s", err)
  548. }
  549. optMap := make(map[string]string)
  550. for i := range opts {
  551. optMap[opts[i].DomainId] = strings.Trim(opts[i].Value, `"`)
  552. }
  553. for i := range rows {
  554. rows[i].TargetDomain = domainMap[targetDomainIds[i]]
  555. rows[i].URL = optMap[idpIds[i]]
  556. }
  557. return rows
  558. }
  559. func (self *SIdentityProvider) getMoreDetails(out api.IdentityProviderDetails) api.IdentityProviderDetails {
  560. out.RoleCount, _ = self.GetRoleCount()
  561. out.UserCount, _ = self.GetUserCount()
  562. out.PolicyCount, _ = self.GetPolicyCount()
  563. out.DomainCount, _ = self.GetDomainCount()
  564. out.ProjectCount, _ = self.GetProjectCount()
  565. out.GroupCount, _ = self.GetGroupCount()
  566. return out
  567. }
  568. func (self *SIdentityProvider) ValidateUpdateData(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input api.IdentityProviderUpdateInput) (api.IdentityProviderUpdateInput, error) {
  569. if input.SyncIntervalSeconds != nil {
  570. secs := *input.SyncIntervalSeconds
  571. if secs < api.MinimalSyncIntervalSeconds {
  572. secs = api.MinimalSyncIntervalSeconds
  573. input.SyncIntervalSeconds = &secs
  574. }
  575. }
  576. var err error
  577. input.EnabledStatusStandaloneResourceBaseUpdateInput, err = self.SEnabledStatusStandaloneResourceBase.ValidateUpdateData(ctx, userCred, query, input.EnabledStatusStandaloneResourceBaseUpdateInput)
  578. if err != nil {
  579. return input, errors.Wrap(err, "SEnabledStatusStandaloneResourceBase.ValidateUpdateData")
  580. }
  581. return input, nil
  582. }
  583. func (self *SIdentityProvider) GetUserCount() (int, error) {
  584. if self.Driver == api.IdentityDriverSQL {
  585. return getSQLUserCount()
  586. } else {
  587. return self.getLinkedUserCount()
  588. }
  589. }
  590. func (self *SIdentityProvider) getLinkedUserCount() (int, error) {
  591. return self.getLinkedUserQuery().CountWithError()
  592. }
  593. func (self *SIdentityProvider) getLinkedUserQuery() *sqlchemy.SQuery {
  594. return self.getLinkedEntityQuery(UserManager, api.IdMappingEntityUser)
  595. }
  596. func (self *SIdentityProvider) getLinkedEntityQuery(manager db.IStandaloneModelManager, typeStr string) *sqlchemy.SQuery {
  597. users := manager.Query().SubQuery()
  598. idmaps := IdmappingManager.Query().SubQuery()
  599. q := users.Query()
  600. q = q.LeftJoin(idmaps, sqlchemy.AND(
  601. sqlchemy.Equals(users.Field("id"), idmaps.Field("public_id")),
  602. sqlchemy.Equals(idmaps.Field("entity_type"), typeStr),
  603. ))
  604. q = q.Filter(sqlchemy.Equals(idmaps.Field("domain_id"), self.Id))
  605. return q
  606. }
  607. func (self *SIdentityProvider) getLinkedUsers() ([]SUser, error) {
  608. q := self.getLinkedUserQuery()
  609. users := make([]SUser, 0)
  610. err := db.FetchModelObjects(UserManager, q, &users)
  611. if err != nil && err != sql.ErrNoRows {
  612. return nil, errors.Wrap(err, "FetchModelObjects")
  613. }
  614. return users, nil
  615. }
  616. func getSQLEntityQuery(manager db.IStandaloneModelManager, typeStr string) *sqlchemy.SQuery {
  617. subq := IdmappingManager.Query("public_id")
  618. subq = subq.Equals("entity_type", typeStr)
  619. return manager.Query().NotIn("id", subq.SubQuery())
  620. }
  621. func getSQLUserQuery() *sqlchemy.SQuery {
  622. return getSQLEntityQuery(UserManager, api.IdMappingEntityUser)
  623. }
  624. func getSQLUserCount() (int, error) {
  625. return getSQLUserQuery().CountWithError()
  626. }
  627. func getSQLGroupQuery() *sqlchemy.SQuery {
  628. return getSQLEntityQuery(GroupManager, api.IdMappingEntityGroup)
  629. }
  630. func getSQLGroupCount() (int, error) {
  631. return getSQLGroupQuery().CountWithError()
  632. }
  633. func getSQLDomainQuery() *sqlchemy.SQuery {
  634. return getSQLEntityQuery(DomainManager, api.IdMappingEntityDomain).NotEquals("id", api.KeystoneDomainRoot)
  635. }
  636. func getSQLDomainCount() (int, error) {
  637. return getSQLDomainQuery().CountWithError()
  638. }
  639. func (self *SIdentityProvider) GetGroupCount() (int, error) {
  640. if self.Driver == api.IdentityDriverSQL {
  641. return getSQLGroupCount()
  642. } else {
  643. return self.getLinkedGroupCount()
  644. }
  645. }
  646. func (self *SIdentityProvider) getLinkedGroupCount() (int, error) {
  647. return self.getLinkedGroupQuery().CountWithError()
  648. }
  649. func (self *SIdentityProvider) getLinkedGroupQuery() *sqlchemy.SQuery {
  650. return self.getLinkedEntityQuery(GroupManager, api.IdMappingEntityGroup)
  651. }
  652. func (self *SIdentityProvider) getLinkedGroups() ([]SGroup, error) {
  653. q := self.getLinkedGroupQuery()
  654. groups := make([]SGroup, 0)
  655. err := db.FetchModelObjects(GroupManager, q, &groups)
  656. if err != nil && err != sql.ErrNoRows {
  657. return nil, errors.Wrap(err, "FetchModelObjects")
  658. }
  659. return groups, nil
  660. }
  661. func (self *SIdentityProvider) GetDomainCount() (int, error) {
  662. if self.Driver == api.IdentityDriverSQL {
  663. return getSQLDomainCount()
  664. } else {
  665. return self.getLinkedDomainCount()
  666. }
  667. }
  668. func (self *SIdentityProvider) getDomainQuery() *sqlchemy.SQuery {
  669. if self.Driver == api.IdentityDriverSQL {
  670. return getSQLDomainQuery()
  671. } else {
  672. return self.getLinkedDomainQuery()
  673. }
  674. }
  675. func (self *SIdentityProvider) getLinkedDomainCount() (int, error) {
  676. q := self.getLinkedDomainQuery()
  677. return q.CountWithError()
  678. }
  679. func (self *SIdentityProvider) getLinkedDomainQuery() *sqlchemy.SQuery {
  680. q := self.getLinkedEntityQuery(DomainManager, api.IdMappingEntityDomain)
  681. q = q.NotEquals("id", api.KeystoneDomainRoot)
  682. return q
  683. }
  684. func (self *SIdentityProvider) GetProjectCount() (int, error) {
  685. subq := self.getDomainQuery().SubQuery()
  686. q := ProjectManager.Query().In("domain_id", subq.Query(subq.Field("id")).SubQuery())
  687. return q.CountWithError()
  688. }
  689. func (self *SIdentityProvider) GetRoleCount() (int, error) {
  690. subq := self.getDomainQuery().SubQuery()
  691. q := RoleManager.Query().In("domain_id", subq.Query(subq.Field("id")).SubQuery())
  692. return q.CountWithError()
  693. }
  694. func (self *SIdentityProvider) GetPolicyCount() (int, error) {
  695. subq := self.getDomainQuery().SubQuery()
  696. q := PolicyManager.Query().In("domain_id", subq.Query(subq.Field("id")).SubQuery())
  697. return q.CountWithError()
  698. }
  699. func (self *SIdentityProvider) ValidateDeleteCondition(ctx context.Context, info jsonutils.JSONObject) error {
  700. if self.Driver == api.IdentityDriverSQL {
  701. return httperrors.NewForbiddenError("cannot delete default SQL identity provider")
  702. }
  703. if self.Enabled.IsTrue() {
  704. return httperrors.NewInvalidStatusError("cannot delete enabled idp")
  705. }
  706. if self.Driver == api.IdentityDriverLDAP || (self.IsSso.IsTrue() && self.isAutoCreateDomain()) || self.AutoCreateUser.IsTrue() {
  707. prjCnt, err := self.GetProjectCount()
  708. if err != nil {
  709. return httperrors.NewGeneralError(err)
  710. }
  711. if prjCnt > 0 {
  712. return httperrors.NewConflictError("identity provider with projects")
  713. }
  714. domains, err := self.getLinkedDomains()
  715. if err != nil {
  716. return httperrors.NewGeneralError(err)
  717. }
  718. for i := range domains {
  719. if domains[i].Enabled.IsTrue() {
  720. return httperrors.NewInvalidStatusError("enabled domain %s cannot be deleted", domains[i].Name)
  721. }
  722. }
  723. }
  724. return self.SEnabledStatusStandaloneResourceBase.ValidateDeleteCondition(ctx, nil)
  725. }
  726. func (self *SIdentityProvider) ValidateUpdateCondition(ctx context.Context) error {
  727. if self.SyncStatus != api.IdentitySyncStatusIdle {
  728. return httperrors.NewConflictError("cannot update in sync status")
  729. }
  730. return self.SEnabledStatusStandaloneResourceBase.ValidateUpdateCondition(ctx)
  731. }
  732. func (self *SIdentityProvider) getLinkedDomains() ([]SDomain, error) {
  733. q := self.getLinkedDomainQuery()
  734. domains := make([]SDomain, 0)
  735. err := db.FetchModelObjects(DomainManager, q, &domains)
  736. if err != nil && err != sql.ErrNoRows {
  737. return nil, errors.Wrap(err, "FetchModelObjects")
  738. }
  739. return domains, nil
  740. }
  741. func (ident *SIdentityProvider) deleteConfigs(ctx context.Context, userCred mcclient.TokenCredential) error {
  742. _, err := WhitelistedConfigManager.deleteConfigs(ident)
  743. if err != nil {
  744. return errors.Wrap(err, "WhitelistedConfigManager.deleteConfig")
  745. }
  746. _, err = SensitiveConfigManager.deleteConfigs(ident)
  747. if err != nil {
  748. return errors.Wrap(err, "SensitiveConfigManager.deleteConfig")
  749. }
  750. return nil
  751. }
  752. func (self *SIdentityProvider) isSsoIdp() bool {
  753. if self.Driver == api.IdentityDriverLDAP || self.Driver == api.IdentityDriverSQL {
  754. return false
  755. }
  756. return true
  757. }
  758. func (self *SIdentityProvider) Purge(ctx context.Context, userCred mcclient.TokenCredential) error {
  759. // delete users
  760. users, err := self.getLinkedUsers()
  761. if err != nil {
  762. return errors.Wrap(err, "getNonlocalUsers")
  763. }
  764. for i := range users {
  765. err = users[i].UnlinkIdp(self.Id)
  766. if err != nil {
  767. return errors.Wrap(err, "users[i].UnlinkIdp")
  768. }
  769. if self.isSsoIdp() && self.AutoCreateUser.IsFalse() {
  770. continue
  771. }
  772. if users[i].IsAdminUser() {
  773. continue
  774. }
  775. err = users[i].Delete(ctx, userCred)
  776. if err != nil {
  777. db.OpsLog.LogEvent(&users[i], db.ACT_DELETE_FAIL, err, userCred)
  778. return errors.Wrap(err, "delete users[i]")
  779. }
  780. }
  781. // delete groups
  782. groups, err := self.getLinkedGroups()
  783. if err != nil {
  784. return errors.Wrap(err, "getNonlocalGroups")
  785. }
  786. for i := range groups {
  787. err = groups[i].UnlinkIdp(self.Id)
  788. if err != nil {
  789. return errors.Wrap(err, "groups[i].UnlinkIdp")
  790. }
  791. if self.isSsoIdp() && self.AutoCreateUser.IsFalse() {
  792. continue
  793. }
  794. err = groups[i].ValidateDeleteCondition(ctx, nil)
  795. if err != nil {
  796. db.OpsLog.LogEvent(&groups[i], db.ACT_DELETE_FAIL, err, userCred)
  797. log.Errorf("group %s ValidateDeleteCondition fail %s", groups[i].Name, err)
  798. continue
  799. }
  800. err = groups[i].Delete(ctx, userCred)
  801. if err != nil {
  802. db.OpsLog.LogEvent(&groups[i], db.ACT_DELETE_FAIL, err, userCred)
  803. return errors.Wrap(err, "delete groups[i]")
  804. }
  805. }
  806. // delete domains
  807. domains, err := self.getLinkedDomains()
  808. if err != nil {
  809. return errors.Wrap(err, "getDomains")
  810. }
  811. for i := range domains {
  812. if self.isSsoIdp() && self.AutoCreateUser.IsFalse() {
  813. err = domains[i].UnlinkIdp(self.Id)
  814. if err != nil {
  815. return errors.Wrap(err, "domains[i].UnlinkIdp")
  816. }
  817. } else {
  818. err = domains[i].validateDeleteConditionInternal(ctx, nil, true)
  819. if err != nil {
  820. db.OpsLog.LogEvent(&domains[i], db.ACT_DELETE_FAIL, err, userCred)
  821. return errors.Wrap(err, "domain.ValidateDeleteCondition")
  822. }
  823. err = domains[i].UnlinkIdp(self.Id)
  824. if err != nil {
  825. return errors.Wrap(err, "domains[i].UnlinkIdp")
  826. }
  827. err = domains[i].Delete(ctx, userCred)
  828. if err != nil {
  829. db.OpsLog.LogEvent(&domains[i], db.ACT_DELETE_FAIL, err, userCred)
  830. return errors.Wrap(err, "delete domain")
  831. }
  832. }
  833. }
  834. err = self.deleteConfigs(ctx, userCred)
  835. if err != nil {
  836. return errors.Wrap(err, "self.deleteConfig")
  837. }
  838. err = IdmappingManager.deleteByIdpId(self.Id)
  839. if err != nil {
  840. return errors.Wrap(err, "self.deleteIdmappings")
  841. }
  842. return self.RealDelete(ctx, userCred)
  843. }
  844. func (self *SIdentityProvider) Delete(ctx context.Context, userCred mcclient.TokenCredential) error {
  845. log.Infof("SIdentityProvider delete do nothing")
  846. return nil
  847. }
  848. func (self *SIdentityProvider) RealDelete(ctx context.Context, userCred mcclient.TokenCredential) error {
  849. return self.SEnabledStatusStandaloneResourceBase.Delete(ctx, userCred)
  850. }
  851. func (self *SIdentityProvider) CustomizeDelete(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, data jsonutils.JSONObject) error {
  852. return self.startDeleteIdentityProviderTask(ctx, userCred, "")
  853. }
  854. func (self *SIdentityProvider) startDeleteIdentityProviderTask(ctx context.Context, userCred mcclient.TokenCredential, parentTaskId string) error {
  855. self.SetStatus(ctx, userCred, api.IdentityDriverStatusDeleting, "")
  856. task, err := taskman.TaskManager.NewTask(ctx, "IdentityProviderDeleteTask", self, userCred, nil, parentTaskId, "", nil)
  857. if err != nil {
  858. return err
  859. }
  860. task.ScheduleRun(nil)
  861. return nil
  862. }
  863. func (self *SIdentityProvider) GetSingleDomain(ctx context.Context, extId string, extName string, extDesc string, createDefaultProject bool) (*SDomain, error) {
  864. if len(self.TargetDomainId) > 0 {
  865. targetDomain, err := DomainManager.FetchDomainById(self.TargetDomainId)
  866. if err != nil && err != sql.ErrNoRows {
  867. return nil, errors.Wrap(err, "DomainManager.FetchDomainById")
  868. }
  869. if targetDomain == nil {
  870. log.Warningln("target domain not exist!")
  871. } else {
  872. return targetDomain, nil
  873. }
  874. }
  875. return self.SyncOrCreateDomain(ctx, extId, extName, extDesc, createDefaultProject)
  876. }
  877. func (self *SIdentityProvider) SyncOrCreateDomain(ctx context.Context, extId string, extName string, extDesc string, createDefaultProject bool) (*SDomain, error) {
  878. log.Debugf("SyncOrCreateDomain extId: %s extName: %s", extId, extName)
  879. domainId, err := IdmappingManager.RegisterIdMap(ctx, self.Id, extId, api.IdMappingEntityDomain)
  880. if err != nil {
  881. return nil, errors.Wrap(err, "IdmappingManager.RegisterIdMap")
  882. }
  883. domain, err := DomainManager.FetchDomainById(domainId)
  884. if err != nil && err != sql.ErrNoRows {
  885. return nil, errors.Wrap(err, "DomainManager.FetchDomainById")
  886. }
  887. if err == nil {
  888. // find the domain
  889. if domain.Name != extName {
  890. // sync domain name
  891. newName, err := db.GenerateName2(ctx, DomainManager, nil, extName, domain, 1)
  892. if err != nil {
  893. log.Errorf("sync existing domain name (%s=%s) generate fail %s", domain.Name, extName, err)
  894. } else {
  895. _, err = db.Update(domain, func() error {
  896. domain.Name = newName
  897. return nil
  898. })
  899. if err != nil {
  900. log.Errorf("sync existing domain name (%s=%s) update fail %s", domain.Name, extName, err)
  901. }
  902. }
  903. }
  904. } else {
  905. // otherwise, create the domain
  906. domain = &SDomain{}
  907. domain.SetModelManager(DomainManager, domain)
  908. domain.Id = domainId
  909. domain.Enabled = tristate.True
  910. domain.IsDomain = tristate.True
  911. domain.DomainId = api.KeystoneDomainRoot
  912. domain.Description = fmt.Sprintf("domain for %s", extDesc)
  913. err = func() error {
  914. lockman.LockClass(ctx, DomainManager, "name")
  915. defer lockman.ReleaseClass(ctx, DomainManager, "name")
  916. newName, err := db.GenerateName(ctx, DomainManager, nil, extName)
  917. if err != nil {
  918. return errors.Wrap(err, "GenerateName")
  919. }
  920. domain.Name = newName
  921. return DomainManager.TableSpec().Insert(ctx, domain)
  922. }()
  923. if err != nil {
  924. return nil, errors.Wrap(err, "insert")
  925. }
  926. }
  927. if self.AutoCreateProject.IsTrue() && consts.GetNonDefaultDomainProjects() && createDefaultProject {
  928. // check existence
  929. projCnt, err := domain.GetProjectCount()
  930. if err != nil {
  931. return nil, errors.Wrap(err, "get domain project count")
  932. }
  933. if projCnt == 0 {
  934. // not exist, to create
  935. _, err := ProjectManager.NewProject(ctx,
  936. fmt.Sprintf("%s_default_project", extName),
  937. fmt.Sprintf("Default project for domain %s", extName),
  938. domain.Id,
  939. )
  940. if err != nil {
  941. log.Errorf("ProjectManager.NewProject fail %s", err)
  942. }
  943. }
  944. }
  945. return domain, nil
  946. }
  947. func (self *SIdentityProvider) SyncOrCreateUser(ctx context.Context, extId string, extName string, domainId string, enableDefault bool, syncUserInfo func(*SUser)) (*SUser, error) {
  948. log.Debugf("SyncOrCreateUser extId: %s extName: %s", extId, extName)
  949. userId, err := IdmappingManager.RegisterIdMap(ctx, self.Id, extId, api.IdMappingEntityUser)
  950. if err != nil {
  951. return nil, errors.Wrap(err, "IdmappingManager.RegisterIdMap")
  952. }
  953. lockman.LockRawObject(ctx, UserManager.Keyword(), userId)
  954. defer lockman.ReleaseRawObject(ctx, UserManager.Keyword(), userId)
  955. userObj, err := db.NewModelObject(UserManager)
  956. if err != nil {
  957. return nil, errors.Wrap(err, "db.NewModelObject")
  958. }
  959. user := userObj.(*SUser)
  960. user.SetModelManager(UserManager, user)
  961. q := UserManager.RawQuery().Equals("id", userId)
  962. err = q.First(user)
  963. if err != nil && err != sql.ErrNoRows {
  964. return nil, errors.Wrap(err, "Query user")
  965. }
  966. if err == nil {
  967. // update
  968. log.Debugf("find user %s", extName)
  969. newName, err := db.GenerateAlterName(user, extName)
  970. if err != nil {
  971. return nil, errors.Wrapf(err, "db.GenerateAlterName %s", extName)
  972. }
  973. _, err = db.Update(user, func() error {
  974. if syncUserInfo != nil {
  975. syncUserInfo(user)
  976. }
  977. user.Name = newName
  978. user.DomainId = domainId
  979. if user.Deleted {
  980. user.MarkUnDelete()
  981. if enableDefault {
  982. user.Enabled = tristate.True
  983. } else {
  984. user.Enabled = tristate.False
  985. }
  986. }
  987. return nil
  988. })
  989. if err != nil {
  990. return nil, errors.Wrap(err, "Update")
  991. }
  992. } else {
  993. if enableDefault {
  994. user.Enabled = tristate.True
  995. } else {
  996. user.Enabled = tristate.False
  997. }
  998. domainOwnerId := &db.SOwnerId{DomainId: domainId}
  999. user.Id = userId
  1000. user.DomainId = domainId
  1001. err = func() error {
  1002. lockman.LockRawObject(ctx, UserManager.Keyword(), "name")
  1003. defer lockman.ReleaseRawObject(ctx, UserManager.Keyword(), "name")
  1004. user.Name, err = db.GenerateName(ctx, UserManager, domainOwnerId, extName)
  1005. if err != nil {
  1006. return errors.Wrapf(err, "db.GenerateName %s", extName)
  1007. }
  1008. return UserManager.TableSpec().Insert(ctx, user)
  1009. }()
  1010. if err != nil {
  1011. return nil, errors.Wrap(err, "Insert")
  1012. }
  1013. if syncUserInfo != nil {
  1014. syncUserInfo(user)
  1015. }
  1016. }
  1017. return user, nil
  1018. }
  1019. func (manager *SIdentityProviderManager) FetchIdentityProviderById(idstr string) (*SIdentityProvider, error) {
  1020. obj, err := manager.FetchById(idstr)
  1021. if err != nil {
  1022. return nil, errors.Wrap(err, "manager.FetchById")
  1023. }
  1024. return obj.(*SIdentityProvider), nil
  1025. }
  1026. func (manager *SIdentityProviderManager) FetchPasswordProtectedIdpIdsQuery() *sqlchemy.SSubQuery {
  1027. q := manager.Query("id").In("driver", api.PASSWORD_PROTECTED_IDPS)
  1028. return q.SubQuery()
  1029. }
  1030. func (manager *SIdentityProviderManager) ListItemFilter(
  1031. ctx context.Context,
  1032. q *sqlchemy.SQuery,
  1033. userCred mcclient.TokenCredential,
  1034. query api.IdentityProviderListInput,
  1035. ) (*sqlchemy.SQuery, error) {
  1036. var err error
  1037. q, err = manager.SEnabledStatusStandaloneResourceBaseManager.ListItemFilter(ctx, q, userCred, query.EnabledStatusStandaloneResourceListInput)
  1038. if err != nil {
  1039. return nil, errors.Wrap(err, "SEnabledStatusStandaloneResourceBaseManager.ListItemFilter")
  1040. }
  1041. q, err = manager.SDomainizedResourceBaseManager.ListItemFilter(ctx, q, userCred, query.DomainizedResourceListInput)
  1042. if err != nil {
  1043. return nil, errors.Wrap(err, "SDomainizedResourceBaseManager.ListItemFilter")
  1044. }
  1045. if len(query.Driver) > 0 {
  1046. q = q.In("driver", query.Driver)
  1047. }
  1048. if len(query.Template) > 0 {
  1049. q = q.In("template", query.Template)
  1050. }
  1051. if len(query.SyncStatus) > 0 {
  1052. q = q.In("sync_status", query.SyncStatus)
  1053. }
  1054. if len(query.SsoDomain) > 0 {
  1055. q = q.IsTrue("is_sso")
  1056. if strings.EqualFold(query.SsoDomain, "all") {
  1057. q = q.IsNullOrEmpty("domain_id")
  1058. } else if len(query.SsoDomain) > 0 {
  1059. ssoDomain, err := DomainManager.FetchDomainByIdOrName(query.SsoDomain)
  1060. if err != nil {
  1061. if errors.Cause(err) == sql.ErrNoRows {
  1062. return nil, httperrors.NewResourceNotFoundError2(DomainManager.Keyword(), query.SsoDomain)
  1063. } else {
  1064. return nil, errors.Wrap(err, "FetchDomainByIdOrName")
  1065. }
  1066. }
  1067. q = q.Filter(sqlchemy.OR(
  1068. sqlchemy.Equals(q.Field("domain_id"), ssoDomain.Id),
  1069. sqlchemy.IsNullOrEmpty(q.Field("domain_id")),
  1070. ))
  1071. }
  1072. }
  1073. if query.AutoCreateProject != nil {
  1074. if *query.AutoCreateProject {
  1075. q = q.IsTrue("auto_create_project")
  1076. } else {
  1077. q = q.IsFalse("auto_create_project")
  1078. }
  1079. }
  1080. if query.AutoCreateUser != nil {
  1081. if *query.AutoCreateUser {
  1082. q = q.IsTrue("auto_create_user")
  1083. } else {
  1084. q = q.IsFalse("auto_create_user")
  1085. }
  1086. }
  1087. return q, nil
  1088. }
  1089. func (manager *SIdentityProviderManager) OrderByExtraFields(
  1090. ctx context.Context,
  1091. q *sqlchemy.SQuery,
  1092. userCred mcclient.TokenCredential,
  1093. query api.IdentityProviderListInput,
  1094. ) (*sqlchemy.SQuery, error) {
  1095. var err error
  1096. q, err = manager.SEnabledStatusStandaloneResourceBaseManager.OrderByExtraFields(ctx, q, userCred, query.EnabledStatusStandaloneResourceListInput)
  1097. if err != nil {
  1098. return nil, errors.Wrap(err, "SEnabledStatusStandaloneResourceBaseManager.OrderByExtraFields")
  1099. }
  1100. q, err = manager.SDomainizedResourceBaseManager.OrderByExtraFields(ctx, q, userCred, query.DomainizedResourceListInput)
  1101. if err != nil {
  1102. return nil, errors.Wrap(err, "SDomainizedResourceBaseManager.OrderByExtraFields")
  1103. }
  1104. return q, nil
  1105. }
  1106. func (manager *SIdentityProviderManager) QueryDistinctExtraField(q *sqlchemy.SQuery, field string) (*sqlchemy.SQuery, error) {
  1107. var err error
  1108. q, err = manager.SEnabledStatusStandaloneResourceBaseManager.QueryDistinctExtraField(q, field)
  1109. if err == nil {
  1110. return q, nil
  1111. }
  1112. q, err = manager.SDomainizedResourceBaseManager.QueryDistinctExtraField(q, field)
  1113. if err == nil {
  1114. return q, nil
  1115. }
  1116. return q, httperrors.ErrNotFound
  1117. }
  1118. func fetchAttribute(attrs map[string][]string, key string) string {
  1119. if v, ok := attrs[key]; ok && len(v) > 0 {
  1120. return v[0]
  1121. }
  1122. return ""
  1123. }
  1124. func fetchAttributes(attrs map[string][]string, key string) []string {
  1125. if v, ok := attrs[key]; ok && len(v) > 0 {
  1126. return v
  1127. }
  1128. return nil
  1129. }
  1130. func (idp *SIdentityProvider) TryUserJoinProject(attrConf api.SIdpAttributeOptions, ctx context.Context, usr *SUser, domainId string, attrs map[string][]string) {
  1131. if idp.AutoCreateUser.IsFalse() {
  1132. return
  1133. }
  1134. // update user attributes
  1135. _, err := db.Update(usr, func() error {
  1136. if v, ok := attrs[attrConf.UserDisplaynameAttribtue]; ok && len(v) > 0 && len(v[0]) > 0 && usr.Displayname != v[0] {
  1137. usr.Displayname = v[0]
  1138. }
  1139. if v, ok := attrs[attrConf.UserEmailAttribute]; ok && len(v) > 0 && len(v[0]) > 0 && usr.Email != v[0] {
  1140. usr.Email = v[0]
  1141. }
  1142. if v, ok := attrs[attrConf.UserMobileAttribute]; ok && len(v) > 0 && len(v[0]) > 0 && usr.Mobile != v[0] {
  1143. usr.Mobile = v[0]
  1144. }
  1145. return nil
  1146. })
  1147. if err != nil {
  1148. log.Errorf("update user attributes fail %s", err)
  1149. }
  1150. var targetProject *SProject
  1151. log.Debugf("userTryJoinProject resp %s proj %s", attrs, attrConf.ProjectAttribute)
  1152. if !consts.GetNonDefaultDomainProjects() {
  1153. // if non-default-domain-project is disabled, place new project in default domain
  1154. domainId = api.DEFAULT_DOMAIN_ID
  1155. }
  1156. if len(attrConf.ProjectAttribute) > 0 {
  1157. projName := fetchAttribute(attrs, attrConf.ProjectAttribute)
  1158. if len(projName) > 0 {
  1159. projDomainId := ""
  1160. if ProjectManager.NamespaceScope() == rbacscope.ScopeDomain {
  1161. projDomainId = domainId
  1162. }
  1163. targetProject, err = ProjectManager.FetchProject("", projName, projDomainId, "")
  1164. if err != nil {
  1165. log.Errorf("fetch project %s fail %s", projName, err)
  1166. if errors.Cause(err) == sql.ErrNoRows && idp.AutoCreateProject.IsTrue() {
  1167. targetProject, err = ProjectManager.NewProject(ctx, projName, fmt.Sprintf("auto create project for idp %s", idp.Name), domainId)
  1168. if err != nil {
  1169. log.Errorf("auto create project %s fail %s", projName, err)
  1170. }
  1171. }
  1172. }
  1173. }
  1174. }
  1175. if targetProject == nil && len(attrConf.DefaultProjectId) > 0 {
  1176. targetProject, err = ProjectManager.FetchProjectById(attrConf.DefaultProjectId)
  1177. if err != nil {
  1178. log.Errorf("fetch default project %s fail %s", attrConf.DefaultProjectId, err)
  1179. }
  1180. }
  1181. if targetProject != nil {
  1182. // put user in project
  1183. targetRoles := make([]*SRole, 0)
  1184. if len(attrConf.RolesAttribute) > 0 {
  1185. roleNames := fetchAttributes(attrs, attrConf.RolesAttribute)
  1186. for _, roleName := range roleNames {
  1187. if len(roleName) > 0 {
  1188. targetRole, err := RoleManager.FetchRole("", roleName, domainId, "")
  1189. if err != nil {
  1190. log.Errorf("fetch role %s fail %s", roleName, err)
  1191. } else {
  1192. targetRoles = append(targetRoles, targetRole)
  1193. }
  1194. }
  1195. }
  1196. }
  1197. if len(targetRoles) == 0 && len(attrConf.DefaultRoleId) > 0 {
  1198. targetRole, err := RoleManager.FetchRoleById(attrConf.DefaultRoleId)
  1199. if err != nil {
  1200. log.Errorf("fetch default role %s fail %s", attrConf.DefaultRoleId, err)
  1201. } else {
  1202. targetRoles = append(targetRoles, targetRole)
  1203. }
  1204. }
  1205. for _, targetRole := range targetRoles {
  1206. err = AssignmentManager.ProjectAddUser(ctx, GetDefaultAdminCred(), targetProject, usr, targetRole)
  1207. if err != nil {
  1208. log.Errorf("CAS user %s join project %s with role %s fail %s", usr.Name, targetProject.Name, targetRole.Name, err)
  1209. }
  1210. }
  1211. }
  1212. }
  1213. func (idp *SIdentityProvider) GetDetailsSamlMetadata(ctx context.Context, userCred mcclient.TokenCredential, query api.GetIdpSamlMetadataInput) (api.GetIdpSamlMetadataOutput, error) {
  1214. output := api.GetIdpSamlMetadataOutput{}
  1215. if !saml.IsSAMLEnabled() {
  1216. return output, errors.Wrap(httperrors.ErrNotSupported, "enable SSL first")
  1217. }
  1218. if idp.Driver != api.IdentityDriverSAML {
  1219. return output, errors.Wrap(httperrors.ErrNotSupported, "not a saml IDP")
  1220. }
  1221. if len(query.RedirectUri) == 0 {
  1222. return output, errors.Wrap(httperrors.ErrInputParameter, "missing redirect_uri")
  1223. }
  1224. spInst := sp.NewSpInstance(saml.SAMLInstance(), idp.Name, nil, nil)
  1225. spInst.SetAssertionConsumerUri(query.RedirectUri)
  1226. ed := spInst.GetMetadata()
  1227. var xmlBytes []byte
  1228. if query.Pretty != nil && *query.Pretty {
  1229. xmlBytes, _ = xml.MarshalIndent(ed, "", " ")
  1230. } else {
  1231. xmlBytes, _ = xml.Marshal(ed)
  1232. }
  1233. output.Metadata = string(xmlBytes)
  1234. return output, nil
  1235. }
  1236. func (idp *SIdentityProvider) GetDetailsSsoRedirectUri(ctx context.Context, userCred mcclient.TokenCredential, query api.GetIdpSsoRedirectUriInput) (api.GetIdpSsoRedirectUriOutput, error) {
  1237. output := api.GetIdpSsoRedirectUriOutput{}
  1238. conf, err := GetConfigs(idp, true, nil, nil)
  1239. if err != nil {
  1240. return output, errors.Wrap(err, "idp.GetConfig")
  1241. }
  1242. backend, err := driver.GetDriver(idp.Driver, idp.Id, idp.Name, idp.Template, idp.TargetDomainId, conf)
  1243. if err != nil {
  1244. return output, errors.Wrap(err, "driver.GetDriver")
  1245. }
  1246. uri, err := backend.GetSsoRedirectUri(ctx, query.RedirectUri, query.State)
  1247. if err != nil {
  1248. return output, errors.Wrap(err, "backend.GetSsoRedirectUri")
  1249. }
  1250. output.Uri = uri
  1251. output.Driver = idp.Driver
  1252. return output, nil
  1253. }
  1254. func (idp *SIdentityProvider) GetDetailsSsoCallbackUri(ctx context.Context, userCred mcclient.TokenCredential, query api.GetIdpSsoCallbackUriInput) (api.GetIdpSsoCallbackUriOutput, error) {
  1255. output := api.GetIdpSsoCallbackUriOutput{}
  1256. conf, err := GetConfigs(idp, true, nil, nil)
  1257. if err != nil {
  1258. return output, errors.Wrap(err, "idp.GetConfig")
  1259. }
  1260. backend, err := driver.GetDriver(idp.Driver, idp.Id, idp.Name, idp.Template, idp.TargetDomainId, conf)
  1261. if err != nil {
  1262. return output, errors.Wrap(err, "driver.GetDriver")
  1263. }
  1264. uri := backend.GetSsoCallbackUri(query.RedirectUri)
  1265. if err != nil {
  1266. return output, errors.Wrap(err, "backend.GetSsoCallbackUri")
  1267. }
  1268. output.RedirectUri = uri
  1269. output.Driver = idp.Driver
  1270. return output, nil
  1271. }
  1272. func (idp *SIdentityProvider) SyncOrCreateDomainAndUser(ctx context.Context, extDomainId, extDomainName string, extUsrId, extUsrName string) (*SDomain, *SUser, error) {
  1273. var (
  1274. domain *SDomain
  1275. usr *SUser
  1276. err error
  1277. )
  1278. if len(extUsrId) == 0 && len(extUsrName) == 0 {
  1279. return nil, nil, errors.Wrap(httperrors.ErrUnauthenticated, "empty userId or userName")
  1280. }
  1281. if len(extUsrId) == 0 {
  1282. extUsrId = extUsrName
  1283. } else if len(extUsrName) == 0 {
  1284. extUsrName = extUsrId
  1285. }
  1286. var domainDesc string
  1287. if len(extDomainId) == 0 && len(extDomainName) == 0 {
  1288. extDomainId = api.DefaultRemoteDomainId
  1289. extDomainName = idp.Name
  1290. domainDesc = fmt.Sprintf("%s provider %s", idp.Driver, idp.Name)
  1291. } else if len(extDomainId) == 0 {
  1292. extDomainId = extDomainName
  1293. domainDesc = fmt.Sprintf("%s provider %s autocreated for %s", idp.Driver, idp.Name, extDomainName)
  1294. } else if len(extDomainName) == 0 {
  1295. extDomainName = extDomainId
  1296. domainDesc = fmt.Sprintf("%s provider %s autocreated for %s", idp.Driver, idp.Name, extDomainId)
  1297. } else {
  1298. domainDesc = fmt.Sprintf("%s provider %s autocreated for %s(%s)", idp.Driver, idp.Name, extDomainName, extDomainId)
  1299. }
  1300. if idp.AutoCreateUser.IsTrue() {
  1301. domain, err = idp.GetSingleDomain(ctx, extDomainId, extDomainName, domainDesc, false)
  1302. if err != nil {
  1303. return nil, nil, errors.Wrap(err, "idp.GetSingleDomain")
  1304. }
  1305. usr, err = idp.SyncOrCreateUser(ctx, extUsrId, extUsrName, domain.Id, true, nil)
  1306. if err != nil {
  1307. return nil, nil, errors.Wrap(err, "idp.SyncOrCreateUser")
  1308. }
  1309. } else {
  1310. modelUsrId, err := IdmappingManager.FetchByIdpAndEntityId(ctx, idp.Id, extUsrId, api.IdMappingEntityUser)
  1311. if err != nil {
  1312. if errors.Cause(err) == sql.ErrNoRows {
  1313. return nil, nil, errors.Wrap(httperrors.ErrUserNotFound, extUsrId)
  1314. } else {
  1315. return nil, nil, errors.Wrap(err, "IdmappingManager.FetchByIdpAndEntityId")
  1316. }
  1317. }
  1318. usrObj, err := UserManager.FetchById(modelUsrId)
  1319. if err != nil {
  1320. return nil, nil, errors.Wrap(err, "UserManager.FetchById")
  1321. }
  1322. usr = usrObj.(*SUser)
  1323. domain = usr.GetDomain()
  1324. }
  1325. return domain, usr, nil
  1326. }
  1327. func (manager *SIdentityProviderManager) FetchIdentityProvidersByUserId(uid string, drivers []string) ([]SIdentityProvider, error) {
  1328. idps := make([]SIdentityProvider, 0)
  1329. idmappings := IdmappingManager.Query().SubQuery()
  1330. q := manager.Query()
  1331. q = q.Join(idmappings, sqlchemy.Equals(q.Field("id"), idmappings.Field("domain_id")))
  1332. q = q.Filter(sqlchemy.Equals(idmappings.Field("entity_type"), api.IdMappingEntityUser))
  1333. q = q.Filter(sqlchemy.Equals(idmappings.Field("public_id"), uid))
  1334. if len(drivers) > 0 {
  1335. q = q.Filter(sqlchemy.In(q.Field("driver"), drivers))
  1336. }
  1337. err := db.FetchModelObjects(manager, q, &idps)
  1338. if err != nil && errors.Cause(err) != sql.ErrNoRows {
  1339. return nil, errors.Wrap(err, "FetchModelObjects")
  1340. }
  1341. return idps, nil
  1342. }
  1343. func (manager *SIdentityProviderManager) CheckUniqueness(extIdpId string, domainId string, driver string, template string, group string, option string, value jsonutils.JSONObject) (bool, error) {
  1344. configs := WhitelistedConfigManager.Query().SubQuery()
  1345. q := manager.Query()
  1346. if len(group) > 0 {
  1347. q = q.Join(configs, sqlchemy.AND(
  1348. sqlchemy.Equals(configs.Field("res_type"), manager.Keyword()),
  1349. sqlchemy.Equals(configs.Field("domain_id"), q.Field("id")),
  1350. ))
  1351. }
  1352. if len(domainId) == 0 {
  1353. q = q.IsNullOrEmpty("domain_id")
  1354. } else {
  1355. q = q.Equals("domain_id", domainId)
  1356. }
  1357. q = q.Equals("driver", driver)
  1358. if len(template) > 0 {
  1359. q = q.Equals("template", template)
  1360. }
  1361. if len(group) > 0 {
  1362. q = q.Filter(sqlchemy.Equals(configs.Field("group"), group))
  1363. if len(option) > 0 {
  1364. q = q.Filter(sqlchemy.Equals(configs.Field("option"), option))
  1365. }
  1366. if value != nil {
  1367. q = q.Filter(sqlchemy.Equals(configs.Field("value"), value.String()))
  1368. }
  1369. }
  1370. if len(extIdpId) > 0 {
  1371. q = q.Filter(sqlchemy.NotEquals(q.Field("id"), extIdpId))
  1372. }
  1373. cnt, err := q.CountWithError()
  1374. if err != nil {
  1375. return false, errors.Wrap(err, "CountWithError")
  1376. }
  1377. return cnt == 0, nil
  1378. }
  1379. func (idp *SIdentityProvider) PerformDisable(
  1380. ctx context.Context,
  1381. userCred mcclient.TokenCredential,
  1382. query jsonutils.JSONObject,
  1383. input apis.PerformDisableInput,
  1384. ) (jsonutils.JSONObject, error) {
  1385. if idp.Driver == api.IdentityDriverSQL {
  1386. return nil, errors.Wrap(httperrors.ErrForbidden, "not allow to disable sql idp")
  1387. }
  1388. if idp.Driver == api.IdentityDriverLDAP || idp.AutoCreateUser.IsTrue() {
  1389. domains, _ := idp.getLinkedDomains()
  1390. for i := range domains {
  1391. db.Update(&domains[i], func() error {
  1392. domains[i].Enabled = tristate.False
  1393. return nil
  1394. })
  1395. }
  1396. }
  1397. return idp.SEnabledStatusStandaloneResourceBase.PerformDisable(ctx, userCred, query, input)
  1398. }
  1399. func (idp *SIdentityProvider) PerformEnable(
  1400. ctx context.Context,
  1401. userCred mcclient.TokenCredential,
  1402. query jsonutils.JSONObject,
  1403. input apis.PerformEnableInput,
  1404. ) (jsonutils.JSONObject, error) {
  1405. if idp.Driver == api.IdentityDriverLDAP || idp.AutoCreateUser.IsTrue() {
  1406. domains, _ := idp.getLinkedDomains()
  1407. for i := range domains {
  1408. db.Update(&domains[i], func() error {
  1409. domains[i].Enabled = tristate.True
  1410. return nil
  1411. })
  1412. }
  1413. }
  1414. return idp.SEnabledStatusStandaloneResourceBase.PerformEnable(ctx, userCred, query, input)
  1415. }
  1416. func (idp *SIdentityProvider) isAutoCreateDomain() bool {
  1417. configs, err := GetConfigs(idp, false, nil, nil)
  1418. if err != nil {
  1419. log.Errorf("GetConfigs fail %s", err)
  1420. return false
  1421. }
  1422. if vjson, ok := configs[idp.Driver]["domain_id_attribute"]; ok {
  1423. v, _ := vjson.GetString()
  1424. if len(v) > 0 {
  1425. return true
  1426. }
  1427. }
  1428. if vjson, ok := configs[idp.Driver]["domain_id_attribute"]; ok {
  1429. v, _ := vjson.GetString()
  1430. if len(v) > 0 {
  1431. return true
  1432. }
  1433. }
  1434. return false
  1435. }
  1436. func (idp *SIdentityProvider) PerformDefaultSso(
  1437. ctx context.Context,
  1438. userCred mcclient.TokenCredential,
  1439. query jsonutils.JSONObject,
  1440. input api.PerformDefaultSsoInput,
  1441. ) (jsonutils.JSONObject, error) {
  1442. if !idp.IsSso.IsTrue() {
  1443. return nil, errors.Wrap(httperrors.ErrNotSupported, "idp is not a sso idp")
  1444. }
  1445. if input.Enable != nil {
  1446. if *input.Enable {
  1447. // enable
  1448. // first disable any other idp in the same domain
  1449. q := IdentityProviderManager.Query().IsTrue("is_sso").IsTrue("is_default").NotEquals("id", idp.Id)
  1450. if len(idp.DomainId) > 0 {
  1451. // a domain specific IDP
  1452. q = q.Equals("domain_id", idp.DomainId)
  1453. } else {
  1454. // a system IDP
  1455. q = q.IsNullOrEmpty("domain_id")
  1456. }
  1457. idps := make([]SIdentityProvider, 0)
  1458. err := db.FetchModelObjects(IdentityProviderManager, q, &idps)
  1459. if err != nil && errors.Cause(err) != sql.ErrNoRows {
  1460. return nil, errors.Wrap(err, "FetchModelObjects")
  1461. }
  1462. for i := range idps {
  1463. err := idps[i].setIsDefault(tristate.False)
  1464. if err != nil {
  1465. return nil, errors.Wrap(err, "disable other idp fail")
  1466. }
  1467. }
  1468. if !idp.IsDefault.IsTrue() {
  1469. err := idp.setIsDefault(tristate.True)
  1470. if err != nil {
  1471. return nil, errors.Wrap(err, "update is_default fail")
  1472. }
  1473. }
  1474. } else {
  1475. // disable
  1476. if idp.IsDefault.IsTrue() {
  1477. err := idp.setIsDefault(tristate.False)
  1478. if err != nil {
  1479. return nil, errors.Wrap(err, "update is_default fail")
  1480. }
  1481. }
  1482. }
  1483. }
  1484. return nil, nil
  1485. }
  1486. func (idp *SIdentityProvider) setIsDefault(val tristate.TriState) error {
  1487. _, err := db.Update(idp, func() error {
  1488. idp.IsDefault = val
  1489. return nil
  1490. })
  1491. return errors.Wrap(err, "update")
  1492. }