mirror of
https://github.com/argoproj/argo-cd
synced 2026-04-21 17:07:16 +00:00
Signed-off-by: Yann Soubeyrand <8511577+yann-soubeyrand@users.noreply.github.com> Signed-off-by: Alexandre Gaudreault <alexandre_gaudreault@intuit.com> Co-authored-by: Michael Crenshaw <350466+crenshaw-dev@users.noreply.github.com> Co-authored-by: Alexandre Gaudreault <alexandre_gaudreault@intuit.com>
170 lines
4.7 KiB
Go
170 lines
4.7 KiB
Go
package dex
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"os"
|
|
|
|
"sigs.k8s.io/yaml"
|
|
|
|
"github.com/argoproj/argo-cd/v3/common"
|
|
"github.com/argoproj/argo-cd/v3/util/settings"
|
|
|
|
log "github.com/sirupsen/logrus"
|
|
)
|
|
|
|
func GenerateDexConfigYAML(argocdSettings *settings.ArgoCDSettings, disableTLS bool) ([]byte, error) {
|
|
if !argocdSettings.IsDexConfigured() {
|
|
return nil, nil
|
|
}
|
|
redirectURL, err := argocdSettings.RedirectURL()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to infer redirect url from config: %w", err)
|
|
}
|
|
var dexCfg map[string]any
|
|
err = yaml.Unmarshal([]byte(argocdSettings.DexConfig), &dexCfg)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to unmarshal dex.config from configmap: %w", err)
|
|
}
|
|
dexCfg["issuer"] = argocdSettings.IssuerURL()
|
|
dexCfg["storage"] = map[string]any{
|
|
"type": "memory",
|
|
}
|
|
if disableTLS {
|
|
dexCfg["web"] = map[string]any{
|
|
"http": "0.0.0.0:5556",
|
|
}
|
|
} else {
|
|
dexCfg["web"] = map[string]any{
|
|
"https": "0.0.0.0:5556",
|
|
"tlsCert": "/tmp/tls.crt",
|
|
"tlsKey": "/tmp/tls.key",
|
|
}
|
|
}
|
|
|
|
if loggerCfg, found := dexCfg["logger"].(map[string]any); found {
|
|
if _, found := loggerCfg["level"]; !found {
|
|
loggerCfg["level"] = slogLevelFromLogrus(os.Getenv(common.EnvLogLevel))
|
|
}
|
|
if _, found := loggerCfg["format"]; !found {
|
|
loggerCfg["format"] = os.Getenv(common.EnvLogFormat)
|
|
}
|
|
} else {
|
|
dexCfg["logger"] = map[string]any{
|
|
"level": slogLevelFromLogrus(os.Getenv(common.EnvLogLevel)),
|
|
"format": os.Getenv(common.EnvLogFormat),
|
|
}
|
|
}
|
|
|
|
dexCfg["grpc"] = map[string]any{
|
|
"addr": "0.0.0.0:5557",
|
|
}
|
|
dexCfg["telemetry"] = map[string]any{
|
|
"http": "0.0.0.0:5558",
|
|
}
|
|
|
|
if oauth2Cfg, found := dexCfg["oauth2"].(map[string]any); found {
|
|
if _, found := oauth2Cfg["skipApprovalScreen"].(bool); !found {
|
|
oauth2Cfg["skipApprovalScreen"] = true
|
|
}
|
|
} else {
|
|
dexCfg["oauth2"] = map[string]any{
|
|
"skipApprovalScreen": true,
|
|
}
|
|
}
|
|
|
|
additionalRedirectURLs, err := argocdSettings.RedirectAdditionalURLs()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to infer additional redirect urls from config: %w", err)
|
|
}
|
|
argoCDStaticClient := map[string]any{
|
|
"id": common.ArgoCDClientAppID,
|
|
"name": common.ArgoCDClientAppName,
|
|
"secret": argocdSettings.DexOAuth2ClientSecret(),
|
|
"redirectURIs": append([]string{redirectURL}, additionalRedirectURLs...),
|
|
}
|
|
argoCDPKCEStaticClient := map[string]any{
|
|
"id": "argo-cd-pkce",
|
|
"name": "Argo CD PKCE",
|
|
"redirectURIs": []string{
|
|
"http://localhost:4000/auth/callback",
|
|
},
|
|
"public": true,
|
|
}
|
|
argoCDCLIStaticClient := map[string]any{
|
|
"id": common.ArgoCDCLIClientAppID,
|
|
"name": common.ArgoCDCLIClientAppName,
|
|
"public": true,
|
|
"redirectURIs": []string{
|
|
"http://localhost",
|
|
"http://localhost:8085/auth/callback",
|
|
},
|
|
}
|
|
|
|
staticClients, ok := dexCfg["staticClients"].([]any)
|
|
if ok {
|
|
dexCfg["staticClients"] = append([]any{argoCDStaticClient, argoCDCLIStaticClient, argoCDPKCEStaticClient}, staticClients...)
|
|
} else {
|
|
dexCfg["staticClients"] = []any{argoCDStaticClient, argoCDCLIStaticClient, argoCDPKCEStaticClient}
|
|
}
|
|
|
|
dexRedirectURL, err := argocdSettings.DexRedirectURL()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
connectors, ok := dexCfg["connectors"].([]any)
|
|
if !ok {
|
|
return nil, errors.New("malformed Dex configuration found")
|
|
}
|
|
for i, connectorIf := range connectors {
|
|
connector, ok := connectorIf.(map[string]any)
|
|
if !ok {
|
|
return nil, errors.New("malformed Dex configuration found")
|
|
}
|
|
connectorType := connector["type"].(string)
|
|
if !needsRedirectURI(connectorType) {
|
|
continue
|
|
}
|
|
connectorCfg, ok := connector["config"].(map[string]any)
|
|
if !ok {
|
|
return nil, errors.New("malformed Dex configuration found")
|
|
}
|
|
connectorCfg["redirectURI"] = dexRedirectURL
|
|
connector["config"] = connectorCfg
|
|
connectors[i] = connector
|
|
}
|
|
dexCfg["connectors"] = connectors
|
|
dexCfg = settings.ReplaceMapSecrets(dexCfg, argocdSettings.Secrets)
|
|
return yaml.Marshal(dexCfg)
|
|
}
|
|
|
|
// needsRedirectURI returns whether or not the given connector type needs a redirectURI
|
|
// Update this list as necessary, as new connectors are added
|
|
// https://dexidp.io/docs/connectors/
|
|
func needsRedirectURI(connectorType string) bool {
|
|
switch connectorType {
|
|
case "oidc", "saml", "microsoft", "linkedin", "gitlab", "github", "bitbucket-cloud", "openshift", "gitea", "google", "oauth":
|
|
return true
|
|
}
|
|
return false
|
|
}
|
|
|
|
func slogLevelFromLogrus(level string) string {
|
|
logrusLevel, err := log.ParseLevel(level)
|
|
if err != nil {
|
|
return level
|
|
}
|
|
|
|
switch logrusLevel {
|
|
case log.DebugLevel, log.TraceLevel:
|
|
return "DEBUG"
|
|
case log.InfoLevel:
|
|
return "INFO"
|
|
case log.WarnLevel:
|
|
return "WARN"
|
|
case log.ErrorLevel, log.FatalLevel, log.PanicLevel:
|
|
return "ERROR"
|
|
}
|
|
// return the logrus level and let slog parse it
|
|
return level
|
|
}
|