Files
cloudpods/pkg/keystone/driver/sql/sql.go
2021-08-31 17:44:46 +08:00

167 lines
5.2 KiB
Go

// Copyright 2019 Yunion
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package sql
import (
"context"
"time"
"github.com/pkg/errors"
"yunion.io/x/jsonutils"
"yunion.io/x/log"
"yunion.io/x/pkg/util/sets"
api "yunion.io/x/onecloud/pkg/apis/identity"
noapi "yunion.io/x/onecloud/pkg/apis/notify"
"yunion.io/x/onecloud/pkg/cloudcommon/notifyclient"
"yunion.io/x/onecloud/pkg/httperrors"
"yunion.io/x/onecloud/pkg/keystone/driver"
"yunion.io/x/onecloud/pkg/keystone/models"
o "yunion.io/x/onecloud/pkg/keystone/options"
"yunion.io/x/onecloud/pkg/mcclient"
"yunion.io/x/onecloud/pkg/mcclient/modules/notify"
)
type SSQLDriver struct {
driver.SBaseIdentityDriver
}
func NewSQLDriver(idpId, idpName, template, targetDomainId string, conf api.TConfigs) (driver.IIdentityBackend, error) {
base, err := driver.NewBaseIdentityDriver(idpId, idpName, template, targetDomainId, conf)
if err != nil {
return nil, err
}
drv := SSQLDriver{base}
drv.SetVirtualObject(&drv)
return &drv, nil
}
func (sql *SSQLDriver) GetSsoRedirectUri(ctx context.Context, callbackUrl, state string) (string, error) {
return "", errors.Wrap(httperrors.ErrNotSupported, "not a SSO driver")
}
func (sql *SSQLDriver) Authenticate(ctx context.Context, ident mcclient.SAuthenticationIdentity) (*api.SUserExtended, error) {
usrExt, err := models.UserManager.FetchUserExtended(
ident.Password.User.Id,
ident.Password.User.Name,
ident.Password.User.Domain.Id,
ident.Password.User.Domain.Name,
)
if err != nil {
return nil, errors.Wrap(err, "UserManager.FetchUserExtended")
}
localUser, err := models.LocalUserManager.FetchLocalUserById(usrExt.LocalId)
if err != nil {
return nil, errors.Wrap(err, "LocalUserManager.FetchLocalUser")
}
err = models.VerifyPassword(usrExt, ident.Password.User.Password)
if err != nil {
localUser.SaveFailedAuth()
if o.Options.PasswordErrorLockCount > 0 && localUser.FailedAuthCount > o.Options.PasswordErrorLockCount && !usrExt.IsSystemAccount {
// do not lock system account!!!
models.UserManager.LockUser(usrExt.Id, "too many failed auth attempts")
sql.alertNotify(ctx, usrExt, time.Now())
return nil, errors.Wrap(httperrors.ErrTooManyAttempts, "user locked")
}
return nil, errors.Wrap(err, "usrExt.VerifyPassword")
}
localUser.ClearFailedAuth()
return usrExt, nil
}
func (sql *SSQLDriver) alertNotify(ctx context.Context, uext *api.SUserExtended, triggerTime time.Time) {
// users
data := jsonutils.NewDict()
data.Set("user", jsonutils.NewString(uext.Name))
data.Set("domain", jsonutils.NewString(uext.DomainName))
metadata := map[string]interface{}{
"trigger_time": triggerTime,
}
p := notifyclient.SNotifyParams{
RecipientId: []string{uext.Id},
Priority: notify.NotifyPriorityCritical,
Event: notifyclient.USER_LOGIN_EXCEPTION,
Data: data,
Tag: noapi.NOTIFICATION_TAG_ALERT,
Metadata: metadata,
IgnoreNonexistentReceiver: true,
}
notifyclient.NotifyWithTag(ctx, p)
// admin user
daUserIds, err := getDomainAdminUserIds(uext.DomainName)
if err != nil {
log.Errorf("unable to get user with role domainadmin in domain %s: %v", uext.DomainName, err)
}
aUserIds, err := getAdminUserIds()
if err != nil {
log.Errorf("unable to get user with role admin: %v", err)
}
userSet := sets.NewString(daUserIds...)
userSet.Insert(aUserIds...)
data.Set("admin", jsonutils.JSONTrue)
// prevent duplicate messages
userSet.Delete(uext.Id)
p.RecipientId = userSet.UnsortedList()
p.Data = data
notifyclient.NotifyWithTag(ctx, p)
}
func fetchRoleId(name string) (string, error) {
id := struct {
Id string
}{}
q := models.RoleManager.Query().Equals("name", name)
err := q.First(&id)
if err != nil {
return "", err
}
return id.Id, nil
}
func getAdminUserIds() ([]string, error) {
return getUserIdsWithRole(o.Options.AdminRoleToNotify, "")
}
func getUserIdsWithRole(roleName string, domainId string) ([]string, error) {
roleId, err := fetchRoleId(roleName)
if err != nil {
return nil, errors.Wrapf(err, "unable to fetch roleid of %s", roleName)
}
ras, _, err := models.AssignmentManager.FetchAll("", "", roleId, "", "", "", []string{}, []string{}, []string{}, []string{}, []string{}, []string{domainId}, false, true, false, false, false, 0, 0)
if err != nil {
return nil, err
}
userIds := make([]string, 0, len(ras))
for i := range ras {
userIds = append(userIds, ras[i].User.Id)
}
log.Infof("%s User: %v", roleName, userIds)
return userIds, nil
}
func getDomainAdminUserIds(domainId string) ([]string, error) {
return getUserIdsWithRole(o.Options.DomainAdminRoleToNotify, domainId)
}
func (sql *SSQLDriver) Sync(ctx context.Context) error {
return nil
}
func (sql *SSQLDriver) Probe(ctx context.Context) error {
return nil
}