credentials.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package models
  15. import (
  16. "context"
  17. "database/sql"
  18. "fmt"
  19. "yunion.io/x/jsonutils"
  20. "yunion.io/x/log"
  21. "yunion.io/x/pkg/errors"
  22. "yunion.io/x/pkg/gotypes"
  23. "yunion.io/x/pkg/tristate"
  24. "yunion.io/x/pkg/util/rbacscope"
  25. "yunion.io/x/pkg/util/sets"
  26. "yunion.io/x/sqlchemy"
  27. api "yunion.io/x/onecloud/pkg/apis/identity"
  28. "yunion.io/x/onecloud/pkg/cloudcommon/db"
  29. "yunion.io/x/onecloud/pkg/httperrors"
  30. "yunion.io/x/onecloud/pkg/keystone/keys"
  31. "yunion.io/x/onecloud/pkg/mcclient"
  32. "yunion.io/x/onecloud/pkg/util/stringutils2"
  33. )
  34. type SCredentialManager struct {
  35. db.SStandaloneResourceBaseManager
  36. SUserResourceBaseManager
  37. SProjectResourceBaseManager
  38. }
  39. var CredentialManager *SCredentialManager
  40. func init() {
  41. CredentialManager = &SCredentialManager{
  42. SStandaloneResourceBaseManager: db.NewStandaloneResourceBaseManager(
  43. SCredential{},
  44. "credential",
  45. "credential",
  46. "credentials",
  47. ),
  48. }
  49. CredentialManager.SetVirtualObject(CredentialManager)
  50. }
  51. /*
  52. +----------------+--------------+------+-----+---------+-------+
  53. | Field | Type | Null | Key | Default | Extra |
  54. +----------------+--------------+------+-----+---------+-------+
  55. | id | varchar(64) | NO | PRI | NULL | |
  56. | user_id | varchar(64) | NO | | NULL | |
  57. | project_id | varchar(64) | YES | | NULL | |
  58. | type | varchar(255) | NO | | NULL | |
  59. | extra | text | YES | | NULL | |
  60. | key_hash | varchar(64) | NO | | NULL | |
  61. | encrypted_blob | text | NO | | NULL | |
  62. +----------------+--------------+------+-----+---------+-------+
  63. */
  64. type SCredential struct {
  65. db.SStandaloneResourceBase
  66. UserId string `width:"64" charset:"ascii" nullable:"false" list:"user" create:"required"`
  67. ProjectId string `width:"64" charset:"ascii" nullable:"true" list:"user" create:"required"`
  68. Type string `width:"255" charset:"utf8" nullable:"false" list:"user" create:"required"`
  69. KeyHash string `width:"64" charset:"ascii" nullable:"false" create:"required" update:"user"`
  70. Extra *jsonutils.JSONDict `nullable:"true" list:"admin"`
  71. EncryptedBlob string `nullable:"false" create:"required" update:"user"`
  72. Enabled tristate.TriState `default:"true" list:"user" update:"user" create:"optional"`
  73. }
  74. func (manager *SCredentialManager) InitializeData() error {
  75. q := manager.Query()
  76. q = q.IsNullOrEmpty("name")
  77. creds := make([]SCredential, 0)
  78. err := db.FetchModelObjects(manager, q, &creds)
  79. if err != nil {
  80. return err
  81. }
  82. for i := range creds {
  83. if gotypes.IsNil(creds[i].Extra) {
  84. continue
  85. }
  86. name, _ := creds[i].Extra.GetString("name")
  87. desc, _ := creds[i].Extra.GetString("description")
  88. if len(name) == 0 {
  89. name = creds[i].Type
  90. }
  91. db.Update(&creds[i], func() error {
  92. creds[i].Name = name
  93. creds[i].Description = desc
  94. return nil
  95. })
  96. }
  97. return nil
  98. }
  99. func (manager *SCredentialManager) ValidateCreateData(
  100. ctx context.Context,
  101. userCred mcclient.TokenCredential,
  102. ownerId mcclient.IIdentityProvider,
  103. query jsonutils.JSONObject,
  104. input api.CredentialCreateInput,
  105. ) (api.CredentialCreateInput, error) {
  106. if len(input.Type) == 0 {
  107. return input, httperrors.NewInputParameterError("missing input field type")
  108. }
  109. projectId := input.ProjectId
  110. userId := ownerId.GetUserId()
  111. if len(userId) == 0 {
  112. userId = userCred.GetUserId()
  113. }
  114. input.UserId = userId
  115. if len(projectId) == 0 {
  116. projectId = userCred.GetProjectId()
  117. input.ProjectId = projectId
  118. } else if projectId == api.DEFAULT_PROJECT {
  119. // do nothing
  120. } else {
  121. _, err := ProjectManager.FetchById(projectId)
  122. if err != nil {
  123. if err == sql.ErrNoRows {
  124. return input, httperrors.NewResourceNotFoundError2(ProjectManager.Keyword(), projectId)
  125. } else {
  126. return input, httperrors.NewGeneralError(err)
  127. }
  128. }
  129. }
  130. if len(input.Name) == 0 {
  131. input.Name = fmt.Sprintf("%s-%s-%s", input.Type, projectId, userId)
  132. }
  133. blob := input.Blob
  134. if len(blob) == 0 {
  135. return input, httperrors.NewInputParameterError("missing input field blob")
  136. }
  137. blobEnc, err := keys.CredentialKeyManager.Encrypt([]byte(blob))
  138. if err != nil {
  139. return input, httperrors.NewInternalServerError("encrypt error %s", err)
  140. }
  141. input.EncryptedBlob = string(blobEnc)
  142. input.KeyHash = keys.CredentialKeyManager.PrimaryKeyHash()
  143. input.StandaloneResourceCreateInput, err = manager.SStandaloneResourceBaseManager.ValidateCreateData(ctx, userCred, ownerId, query, input.StandaloneResourceCreateInput)
  144. if err != nil {
  145. return input, errors.Wrap(err, "manager.SStandaloneResourceBaseManager.ValidateCreateData")
  146. }
  147. return input, nil
  148. }
  149. func (cred *SCredential) ValidateDeleteCondition(ctx context.Context, info jsonutils.JSONObject) error {
  150. return cred.SStandaloneResourceBase.ValidateDeleteCondition(ctx, nil)
  151. }
  152. func (cred *SCredential) ValidateUpdateData(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input api.CredentialUpdateInput) (api.CredentialUpdateInput, error) {
  153. var err error
  154. input.StandaloneResourceBaseUpdateInput, err = cred.SStandaloneResourceBase.ValidateUpdateData(ctx, userCred, query, input.StandaloneResourceBaseUpdateInput)
  155. if err != nil {
  156. return input, errors.Wrap(err, "SStandaloneResourceBase.ValidateUpdateData")
  157. }
  158. if len(input.Blob) > 0 {
  159. if !sets.NewString(api.CONTAINER_SECRET_TYPE, api.CONTAINER_IMAGE_TYPE).Has(cred.Type) {
  160. return input, httperrors.NewNotSupportedError("blob update only supported for credential type %v", sets.NewString(api.CONTAINER_SECRET_TYPE, api.CONTAINER_IMAGE_TYPE).List())
  161. }
  162. blobEnc, err := keys.CredentialKeyManager.Encrypt([]byte(input.Blob))
  163. if err != nil {
  164. return input, httperrors.NewInternalServerError("encrypt blob: %s", err)
  165. }
  166. input.EncryptedBlob = string(blobEnc)
  167. input.KeyHash = keys.CredentialKeyManager.PrimaryKeyHash()
  168. }
  169. return input, nil
  170. }
  171. func (manager *SCredentialManager) FetchCustomizeColumns(
  172. ctx context.Context,
  173. userCred mcclient.TokenCredential,
  174. query jsonutils.JSONObject,
  175. objs []interface{},
  176. fields stringutils2.SSortedStrings,
  177. isList bool,
  178. ) []api.CredentialDetails {
  179. rows := make([]api.CredentialDetails, len(objs))
  180. stdRows := manager.SStandaloneResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
  181. for i := range rows {
  182. rows[i] = api.CredentialDetails{
  183. StandaloneResourceDetails: stdRows[i],
  184. }
  185. rows[i] = credentialExtra(objs[i].(*SCredential), rows[i])
  186. }
  187. return rows
  188. }
  189. func credentialExtra(cred *SCredential, out api.CredentialDetails) api.CredentialDetails {
  190. out.Blob = string(cred.getBlob())
  191. usr, _ := UserManager.FetchUserExtended(cred.UserId, "", "", "")
  192. if usr != nil {
  193. out.User = usr.Name
  194. out.Domain = usr.DomainName
  195. out.DomainId = usr.DomainId
  196. }
  197. return out
  198. }
  199. func (cred *SCredential) getBlob() []byte {
  200. return keys.CredentialKeyManager.Decrypt([]byte(cred.EncryptedBlob))
  201. }
  202. func (cred *SCredential) GetAccessKeySecret() (*api.SAccessKeySecretBlob, error) {
  203. if cred.Type == api.ACCESS_SECRET_TYPE || cred.Type == api.OIDC_CREDENTIAL_TYPE {
  204. blobJson, err := jsonutils.Parse(cred.getBlob())
  205. if err != nil {
  206. return nil, errors.Wrap(err, "jsonutils.Parse")
  207. }
  208. akBlob := api.SAccessKeySecretBlob{}
  209. err = blobJson.Unmarshal(&akBlob)
  210. if err != nil {
  211. return nil, errors.Wrap(err, "blobJson.Unmarshal")
  212. }
  213. return &akBlob, nil
  214. }
  215. return nil, errors.Error("no an AK/SK credential")
  216. }
  217. func (manager *SCredentialManager) ResourceScope() rbacscope.TRbacScope {
  218. return rbacscope.ScopeUser
  219. }
  220. func (manager *SCredentialManager) FilterByOwner(ctx context.Context, q *sqlchemy.SQuery, man db.FilterByOwnerProvider, userCred mcclient.TokenCredential, owner mcclient.IIdentityProvider, scope rbacscope.TRbacScope) *sqlchemy.SQuery {
  221. if owner != nil {
  222. if scope == rbacscope.ScopeUser {
  223. if len(owner.GetUserId()) > 0 {
  224. q = q.Equals("user_id", owner.GetUserId())
  225. }
  226. }
  227. }
  228. return q
  229. }
  230. func (cred *SCredential) GetOwnerId() mcclient.IIdentityProvider {
  231. owner := db.SOwnerId{
  232. UserId: cred.UserId,
  233. ProjectId: cred.ProjectId,
  234. }
  235. usr, _ := UserManager.FetchUserExtended(cred.UserId, "", "", "")
  236. if usr != nil {
  237. owner.UserDomainId = usr.DomainId
  238. }
  239. return &owner
  240. }
  241. func (manager *SCredentialManager) FetchOwnerId(ctx context.Context, data jsonutils.JSONObject) (mcclient.IIdentityProvider, error) {
  242. userStr, key := jsonutils.GetAnyString2(data, []string{"user", "user_id"})
  243. if len(userStr) > 0 {
  244. domainOwner, err := db.FetchDomainInfo(ctx, data)
  245. if err != nil {
  246. return nil, err
  247. }
  248. if domainOwner == nil {
  249. domainOwner = &db.SOwnerId{DomainId: api.DEFAULT_DOMAIN_ID}
  250. }
  251. data.(*jsonutils.JSONDict).Remove(key)
  252. usrObj, err := UserManager.FetchByIdOrName(ctx, domainOwner, userStr)
  253. if err != nil {
  254. if err == sql.ErrNoRows {
  255. return nil, httperrors.NewResourceNotFoundError2("user", userStr)
  256. } else {
  257. return nil, httperrors.NewGeneralError(err)
  258. }
  259. }
  260. usr := usrObj.(*SUser)
  261. ownerId := db.SOwnerId{
  262. UserDomainId: usr.DomainId,
  263. UserId: usr.Id,
  264. }
  265. data.(*jsonutils.JSONDict).Set("user", jsonutils.NewString(usr.Id))
  266. return &ownerId, nil
  267. }
  268. return nil, nil
  269. }
  270. // 用户信用凭证列表
  271. func (manager *SCredentialManager) ListItemFilter(
  272. ctx context.Context,
  273. q *sqlchemy.SQuery,
  274. userCred mcclient.TokenCredential,
  275. query api.CredentialListInput,
  276. ) (*sqlchemy.SQuery, error) {
  277. var err error
  278. q, err = manager.SStandaloneResourceBaseManager.ListItemFilter(ctx, q, userCred, query.StandaloneResourceListInput)
  279. if err != nil {
  280. return nil, errors.Wrap(err, "SStandaloneResourceBaseManager.ListItemFilter")
  281. }
  282. q, err = manager.SUserResourceBaseManager.ListItemFilter(ctx, q, userCred, query.UserFilterListInput)
  283. if err != nil {
  284. return nil, errors.Wrap(err, "SUserResourceBaseManager.ListItemFilter")
  285. }
  286. q, err = manager.SProjectResourceBaseManager.ListItemFilter(ctx, q, userCred, query.ProjectFilterListInput)
  287. if err != nil {
  288. return nil, errors.Wrap(err, "SProjectResourceBaseManager.ListItemFilter")
  289. }
  290. if query.Enabled != nil {
  291. if *query.Enabled {
  292. q = q.IsTrue("enabled")
  293. } else {
  294. q = q.IsFalse("enabled")
  295. }
  296. }
  297. if len(query.Type) > 0 {
  298. q = q.In("type", query.Type)
  299. }
  300. return q, nil
  301. }
  302. func (manager *SCredentialManager) OrderByExtraFields(
  303. ctx context.Context,
  304. q *sqlchemy.SQuery,
  305. userCred mcclient.TokenCredential,
  306. query api.CredentialListInput,
  307. ) (*sqlchemy.SQuery, error) {
  308. var err error
  309. q, err = manager.SStandaloneResourceBaseManager.OrderByExtraFields(ctx, q, userCred, query.StandaloneResourceListInput)
  310. if err != nil {
  311. return nil, errors.Wrap(err, "SStandaloneResourceBaseManager.OrderByExtraFields")
  312. }
  313. return q, nil
  314. }
  315. func (manager *SCredentialManager) QueryDistinctExtraField(q *sqlchemy.SQuery, field string) (*sqlchemy.SQuery, error) {
  316. var err error
  317. q, err = manager.SStandaloneResourceBaseManager.QueryDistinctExtraField(q, field)
  318. if err == nil {
  319. return q, nil
  320. }
  321. return q, httperrors.ErrNotFound
  322. }
  323. func (manager *SCredentialManager) FetchCredentials(uid string, credType string) ([]SCredential, error) {
  324. q := manager.Query().Equals("user_id", uid).Equals("type", credType)
  325. ret := make([]SCredential, 0)
  326. err := db.FetchModelObjects(manager, q, &ret)
  327. if err != nil && errors.Cause(err) != sql.ErrNoRows {
  328. return nil, errors.Wrap(err, "FetchModelObjects")
  329. }
  330. return ret, nil
  331. }
  332. func (manager *SCredentialManager) DeleteAll(ctx context.Context, userCred mcclient.TokenCredential, uid string, credType string) error {
  333. creds, err := manager.FetchCredentials(uid, credType)
  334. if err != nil {
  335. return errors.Wrap(err, "FetchCredentials")
  336. }
  337. for i := range creds {
  338. err := creds[i].Delete(ctx, userCred)
  339. if err != nil {
  340. return errors.Wrap(err, "Delete")
  341. }
  342. }
  343. return nil
  344. }
  345. func (cred *SCredential) Delete(ctx context.Context, userCred mcclient.TokenCredential) error {
  346. err := cred.SStandaloneResourceBase.Delete(ctx, userCred)
  347. if err != nil {
  348. return errors.Wrap(err, "SStandaloneResourceBase.Delete")
  349. }
  350. if cred.Type == api.ACCESS_SECRET_TYPE {
  351. // clean tokens auth by this AKSK
  352. err := TokenCacheManager.BatchInvalidate(ctx, userCred, api.AUTH_METHOD_AKSK, []string{cred.Id})
  353. if err != nil {
  354. log.Errorf("BatchInvalidate token failed %s", err)
  355. }
  356. }
  357. return nil
  358. }