argo-cd/server/session/session.go
jannfis ae49b45249
chore: Upgrade Go module to v2 (#5931)
* chore: Upgrade Go module to v2

Signed-off-by: jannfis <jann@mistrust.net>

* Restore import order

Signed-off-by: jannfis <jann@mistrust.net>

* fix knowntypes_normalizer codegen error

Signed-off-by: Alexander Matyushentsev <AMatyushentsev@gmail.com>

* fix codegen

Signed-off-by: Alexander Matyushentsev <AMatyushentsev@gmail.com>

* fix Procfile

Signed-off-by: Alexander Matyushentsev <AMatyushentsev@gmail.com>

Co-authored-by: Alexander Matyushentsev <AMatyushentsev@gmail.com>
2021-04-01 20:44:18 +02:00

99 lines
3.5 KiB
Go

package session
import (
"context"
"fmt"
"github.com/argoproj/argo-cd/v2/util/settings"
"github.com/google/uuid"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/status"
"github.com/argoproj/argo-cd/v2/pkg/apiclient/session"
"github.com/argoproj/argo-cd/v2/server/rbacpolicy"
util "github.com/argoproj/argo-cd/v2/util/io"
sessionmgr "github.com/argoproj/argo-cd/v2/util/session"
)
// Server provides a Session service
type Server struct {
mgr *sessionmgr.SessionManager
settingsMgr *settings.SettingsManager
authenticator Authenticator
policyEnf *rbacpolicy.RBACPolicyEnforcer
limitLoginAttempts func() (util.Closer, error)
}
type Authenticator interface {
Authenticate(ctx context.Context) (context.Context, error)
}
// NewServer returns a new instance of the Session service
func NewServer(mgr *sessionmgr.SessionManager, settingsMgr *settings.SettingsManager, authenticator Authenticator, policyEnf *rbacpolicy.RBACPolicyEnforcer, rateLimiter func() (util.Closer, error)) *Server {
return &Server{mgr, settingsMgr, authenticator, policyEnf, rateLimiter}
}
// Create generates a JWT token signed by Argo CD intended for web/CLI logins of the admin user
// using username/password
func (s *Server) Create(_ context.Context, q *session.SessionCreateRequest) (*session.SessionResponse, error) {
if s.limitLoginAttempts != nil {
closer, err := s.limitLoginAttempts()
if err != nil {
return nil, err
}
defer util.Close(closer)
}
if q.Token != "" {
return nil, status.Errorf(codes.Unauthenticated, "token-based session creation no longer supported. please upgrade argocd cli to v0.7+")
}
if q.Username == "" || q.Password == "" {
return nil, status.Errorf(codes.Unauthenticated, "no credentials supplied")
}
err := s.mgr.VerifyUsernamePassword(q.Username, q.Password)
if err != nil {
return nil, err
}
uniqueId, err := uuid.NewRandom()
if err != nil {
return nil, err
}
argoCDSettings, err := s.settingsMgr.GetSettings()
if err != nil {
return nil, err
}
jwtToken, err := s.mgr.Create(
fmt.Sprintf("%s:%s", q.Username, settings.AccountCapabilityLogin),
int64(argoCDSettings.UserSessionDuration.Seconds()),
uniqueId.String())
if err != nil {
return nil, err
}
return &session.SessionResponse{Token: jwtToken}, nil
}
// Delete an authentication cookie from the client. This makes sense only for the Web client.
func (s *Server) Delete(ctx context.Context, q *session.SessionDeleteRequest) (*session.SessionResponse, error) {
return &session.SessionResponse{Token: ""}, nil
}
// AuthFuncOverride overrides the authentication function and let us not require auth to receive auth.
// Without this function here, ArgoCDServer.authenticate would be invoked and credentials checked.
// Since this service is generally invoked when the user has _no_ credentials, that would create a
// chicken-and-egg situation if we didn't place this here to allow traffic to pass through.
func (s *Server) AuthFuncOverride(ctx context.Context, fullMethodName string) (context.Context, error) {
// this authenticates the user, but ignores any error, so that we have claims populated
ctx, _ = s.authenticator.Authenticate(ctx)
return ctx, nil
}
func (s *Server) GetUserInfo(ctx context.Context, q *session.GetUserInfoRequest) (*session.GetUserInfoResponse, error) {
return &session.GetUserInfoResponse{
LoggedIn: sessionmgr.LoggedIn(ctx),
Username: sessionmgr.Username(ctx),
Iss: sessionmgr.Iss(ctx),
Groups: sessionmgr.Groups(ctx, s.policyEnf.GetScopes()),
}, nil
}