| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102 |
- // Copyright 2019 Yunion
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package handler
- import (
- "context"
- "net/http"
- "strings"
- "yunion.io/x/pkg/errors"
- "yunion.io/x/onecloud/pkg/apigateway/clientman"
- "yunion.io/x/onecloud/pkg/appsrv"
- "yunion.io/x/onecloud/pkg/httperrors"
- "yunion.io/x/onecloud/pkg/mcclient"
- "yunion.io/x/onecloud/pkg/mcclient/auth"
- "yunion.io/x/onecloud/pkg/util/netutils2"
- )
- const (
- ASSUME_TOKEN_HEADER = "X-Assume-Token"
- )
- type SAssumeToken struct {
- Token string `json:"token"`
- UserId string `json:"user_id"`
- ProjectId string `json:"project_id"`
- }
- func getAssumeToken(r *http.Request) (*SAssumeToken, error) {
- auth := r.Header.Get(ASSUME_TOKEN_HEADER)
- if auth == "" {
- return nil, errors.Wrap(httperrors.ErrInputParameter, "Assume token header is empty")
- }
- parts := strings.Split(strings.TrimSpace(auth), ":")
- if len(parts) != 3 {
- return nil, errors.Wrap(httperrors.ErrInputParameter, "Assume token header is invalid")
- }
- return &SAssumeToken{
- Token: parts[0],
- UserId: parts[1],
- ProjectId: parts[2],
- }, nil
- }
- func doAssumeLogin(assumeToken *SAssumeToken, w http.ResponseWriter, req *http.Request) (mcclient.TokenCredential, error) {
- cliIp := netutils2.GetHttpRequestIp(req)
- token, err := auth.Client().AuthenticateAssume(assumeToken.Token, assumeToken.UserId, assumeToken.ProjectId, cliIp)
- if err != nil {
- return nil, errors.Wrapf(httperrors.ErrInvalidCredential, "AuthenticateAssume fail %s", err)
- }
- authToken := clientman.NewAuthToken(token.GetTokenString(), false, false, false)
- saveLoginCookies(w, authToken, token, nil)
- return token, nil
- }
- func (h *AuthHandlers) handleAssumeLogin(ctx context.Context, w http.ResponseWriter, req *http.Request) {
- // no auth cookie, try to get get assume user token from header
- assumeToken, err := getAssumeToken(req)
- if err != nil {
- appsrv.Send(w, err.Error())
- return
- }
- token, err := doAssumeLogin(assumeToken, w, req)
- if err != nil {
- appsrv.Send(w, err.Error())
- return
- }
- _, query, _ := appsrv.FetchEnv(ctx, w, req)
- redirect := ""
- if query != nil {
- queryMap, err := query.GetMap()
- if err != nil {
- appsrv.Send(w, err.Error())
- return
- }
- for k, v := range queryMap {
- if k == "p" {
- redirect, _ = v.GetString()
- } else {
- value, _ := v.GetString()
- saveCookie(w, k, value, "", token.GetExpires(), false)
- }
- }
- }
- if !strings.HasPrefix(redirect, "/") {
- redirect = "/" + redirect
- }
- appsrv.SendRedirect(w, redirect)
- }
|