argo-cd/util/dex/config.go
Yann Soubeyrand d6efb9e538
chore: move OIDC PKCE support from UI to backend (#21729)
Signed-off-by: Yann Soubeyrand <8511577+yann-soubeyrand@users.noreply.github.com>
Signed-off-by: Alexandre Gaudreault <alexandre_gaudreault@intuit.com>
Co-authored-by: Michael Crenshaw <350466+crenshaw-dev@users.noreply.github.com>
Co-authored-by: Alexandre Gaudreault <alexandre_gaudreault@intuit.com>
2025-06-17 18:18:24 +00:00

170 lines
4.7 KiB
Go

package dex
import (
"errors"
"fmt"
"os"
"sigs.k8s.io/yaml"
"github.com/argoproj/argo-cd/v3/common"
"github.com/argoproj/argo-cd/v3/util/settings"
log "github.com/sirupsen/logrus"
)
func GenerateDexConfigYAML(argocdSettings *settings.ArgoCDSettings, disableTLS bool) ([]byte, error) {
if !argocdSettings.IsDexConfigured() {
return nil, nil
}
redirectURL, err := argocdSettings.RedirectURL()
if err != nil {
return nil, fmt.Errorf("failed to infer redirect url from config: %w", err)
}
var dexCfg map[string]any
err = yaml.Unmarshal([]byte(argocdSettings.DexConfig), &dexCfg)
if err != nil {
return nil, fmt.Errorf("failed to unmarshal dex.config from configmap: %w", err)
}
dexCfg["issuer"] = argocdSettings.IssuerURL()
dexCfg["storage"] = map[string]any{
"type": "memory",
}
if disableTLS {
dexCfg["web"] = map[string]any{
"http": "0.0.0.0:5556",
}
} else {
dexCfg["web"] = map[string]any{
"https": "0.0.0.0:5556",
"tlsCert": "/tmp/tls.crt",
"tlsKey": "/tmp/tls.key",
}
}
if loggerCfg, found := dexCfg["logger"].(map[string]any); found {
if _, found := loggerCfg["level"]; !found {
loggerCfg["level"] = slogLevelFromLogrus(os.Getenv(common.EnvLogLevel))
}
if _, found := loggerCfg["format"]; !found {
loggerCfg["format"] = os.Getenv(common.EnvLogFormat)
}
} else {
dexCfg["logger"] = map[string]any{
"level": slogLevelFromLogrus(os.Getenv(common.EnvLogLevel)),
"format": os.Getenv(common.EnvLogFormat),
}
}
dexCfg["grpc"] = map[string]any{
"addr": "0.0.0.0:5557",
}
dexCfg["telemetry"] = map[string]any{
"http": "0.0.0.0:5558",
}
if oauth2Cfg, found := dexCfg["oauth2"].(map[string]any); found {
if _, found := oauth2Cfg["skipApprovalScreen"].(bool); !found {
oauth2Cfg["skipApprovalScreen"] = true
}
} else {
dexCfg["oauth2"] = map[string]any{
"skipApprovalScreen": true,
}
}
additionalRedirectURLs, err := argocdSettings.RedirectAdditionalURLs()
if err != nil {
return nil, fmt.Errorf("failed to infer additional redirect urls from config: %w", err)
}
argoCDStaticClient := map[string]any{
"id": common.ArgoCDClientAppID,
"name": common.ArgoCDClientAppName,
"secret": argocdSettings.DexOAuth2ClientSecret(),
"redirectURIs": append([]string{redirectURL}, additionalRedirectURLs...),
}
argoCDPKCEStaticClient := map[string]any{
"id": "argo-cd-pkce",
"name": "Argo CD PKCE",
"redirectURIs": []string{
"http://localhost:4000/auth/callback",
},
"public": true,
}
argoCDCLIStaticClient := map[string]any{
"id": common.ArgoCDCLIClientAppID,
"name": common.ArgoCDCLIClientAppName,
"public": true,
"redirectURIs": []string{
"http://localhost",
"http://localhost:8085/auth/callback",
},
}
staticClients, ok := dexCfg["staticClients"].([]any)
if ok {
dexCfg["staticClients"] = append([]any{argoCDStaticClient, argoCDCLIStaticClient, argoCDPKCEStaticClient}, staticClients...)
} else {
dexCfg["staticClients"] = []any{argoCDStaticClient, argoCDCLIStaticClient, argoCDPKCEStaticClient}
}
dexRedirectURL, err := argocdSettings.DexRedirectURL()
if err != nil {
return nil, err
}
connectors, ok := dexCfg["connectors"].([]any)
if !ok {
return nil, errors.New("malformed Dex configuration found")
}
for i, connectorIf := range connectors {
connector, ok := connectorIf.(map[string]any)
if !ok {
return nil, errors.New("malformed Dex configuration found")
}
connectorType := connector["type"].(string)
if !needsRedirectURI(connectorType) {
continue
}
connectorCfg, ok := connector["config"].(map[string]any)
if !ok {
return nil, errors.New("malformed Dex configuration found")
}
connectorCfg["redirectURI"] = dexRedirectURL
connector["config"] = connectorCfg
connectors[i] = connector
}
dexCfg["connectors"] = connectors
dexCfg = settings.ReplaceMapSecrets(dexCfg, argocdSettings.Secrets)
return yaml.Marshal(dexCfg)
}
// needsRedirectURI returns whether or not the given connector type needs a redirectURI
// Update this list as necessary, as new connectors are added
// https://dexidp.io/docs/connectors/
func needsRedirectURI(connectorType string) bool {
switch connectorType {
case "oidc", "saml", "microsoft", "linkedin", "gitlab", "github", "bitbucket-cloud", "openshift", "gitea", "google", "oauth":
return true
}
return false
}
func slogLevelFromLogrus(level string) string {
logrusLevel, err := log.ParseLevel(level)
if err != nil {
return level
}
switch logrusLevel {
case log.DebugLevel, log.TraceLevel:
return "DEBUG"
case log.InfoLevel:
return "INFO"
case log.WarnLevel:
return "WARN"
case log.ErrorLevel, log.FatalLevel, log.PanicLevel:
return "ERROR"
}
// return the logrus level and let slog parse it
return level
}