mirror of
https://github.com/yunionio/cloudpods.git
synced 2026-05-20 09:30:42 +08:00
104 lines
3.4 KiB
Go
104 lines
3.4 KiB
Go
// Copyright 2019 Yunion
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package sshkeys
|
|
|
|
import (
|
|
"context"
|
|
"database/sql"
|
|
"fmt"
|
|
"net/http"
|
|
|
|
"yunion.io/x/jsonutils"
|
|
|
|
"yunion.io/x/onecloud/pkg/appctx"
|
|
"yunion.io/x/onecloud/pkg/appsrv"
|
|
"yunion.io/x/onecloud/pkg/cloudcommon/consts"
|
|
"yunion.io/x/onecloud/pkg/cloudcommon/db"
|
|
"yunion.io/x/onecloud/pkg/cloudcommon/policy"
|
|
"yunion.io/x/onecloud/pkg/httperrors"
|
|
"yunion.io/x/onecloud/pkg/mcclient"
|
|
"yunion.io/x/onecloud/pkg/mcclient/auth"
|
|
"yunion.io/x/onecloud/pkg/util/rbacutils"
|
|
)
|
|
|
|
func AddSshKeysHandler(prefix string, app *appsrv.Application) {
|
|
app.AddHandler2("GET", fmt.Sprintf("%s/sshkeypairs", prefix), auth.Authenticate(sshKeysHandler), nil, "get_sshkeys", nil)
|
|
app.AddHandler2("GET", fmt.Sprintf("%s/sshkeypairs/<tenant_id>", prefix), auth.Authenticate(adminSshKeysHandler), nil, "get_sshkeys", nil)
|
|
}
|
|
|
|
func adminSshKeysHandler(ctx context.Context, w http.ResponseWriter, r *http.Request) {
|
|
publicOnly := false
|
|
userCred := auth.FetchUserCredential(ctx, policy.FilterPolicyCredential)
|
|
if !userCred.IsAllow(rbacutils.ScopeSystem, consts.GetServiceType(), "sshkeypairs", policy.PolicyActionGet) {
|
|
publicOnly = true
|
|
}
|
|
params := appctx.AppContextParams(ctx)
|
|
projectId := params["<tenant_id>"]
|
|
if len(projectId) == 0 {
|
|
httperrors.InputParameterError(w, "empty project_id/tenant_id")
|
|
return
|
|
}
|
|
tenant, err := db.TenantCacheManager.FetchTenantByIdOrName(ctx, projectId)
|
|
if err != nil {
|
|
if err == sql.ErrNoRows {
|
|
httperrors.ResourceNotFoundError(w, "tenant/project %s not found", projectId)
|
|
return
|
|
} else {
|
|
httperrors.GeneralServerError(w, err)
|
|
return
|
|
}
|
|
}
|
|
query, err := jsonutils.ParseQueryString(r.URL.RawQuery)
|
|
if err != nil {
|
|
httperrors.GeneralServerError(w, err)
|
|
return
|
|
}
|
|
isAdmin := jsonutils.QueryBoolean(query, "admin", false)
|
|
|
|
sendSshKey(ctx, w, userCred, tenant.Id, isAdmin, publicOnly)
|
|
}
|
|
|
|
func sshKeysHandler(ctx context.Context, w http.ResponseWriter, r *http.Request) {
|
|
userCred := auth.FetchUserCredential(ctx, policy.FilterPolicyCredential)
|
|
query, err := jsonutils.ParseQueryString(r.URL.RawQuery)
|
|
if err != nil {
|
|
httperrors.GeneralServerError(w, err)
|
|
return
|
|
}
|
|
isAdmin := jsonutils.QueryBoolean(query, "admin", false)
|
|
|
|
sendSshKey(ctx, w, userCred, userCred.GetProjectId(), isAdmin, false)
|
|
}
|
|
|
|
func sendSshKey(ctx context.Context, w http.ResponseWriter, userCred mcclient.TokenCredential, projectId string, isAdmin bool, publicOnly bool) {
|
|
var privKey, pubKey string
|
|
|
|
if isAdmin && userCred.IsAllow(rbacutils.ScopeSystem, consts.GetServiceType(), "sshkeypairs", policy.PolicyActionGet) {
|
|
privKey, pubKey, _ = GetSshAdminKeypair(ctx)
|
|
} else {
|
|
privKey, pubKey, _ = GetSshProjectKeypair(ctx, projectId)
|
|
}
|
|
|
|
ret := jsonutils.NewDict()
|
|
|
|
if !publicOnly {
|
|
ret.Add(jsonutils.NewString(privKey), "private_key")
|
|
}
|
|
ret.Add(jsonutils.NewString(pubKey), "public_key")
|
|
body := jsonutils.NewDict()
|
|
body.Add(ret, "sshkeypair")
|
|
appsrv.SendJSON(w, body)
|
|
}
|