Files
kubesphere/pkg/controller/config/oauthclient/webhook.go
KubeSphere CI Bot 447a51f08b feat: kubesphere 4.0 (#6115)
* feat: kubesphere 4.0

Signed-off-by: ci-bot <ci-bot@kubesphere.io>

* feat: kubesphere 4.0

Signed-off-by: ci-bot <ci-bot@kubesphere.io>

---------

Signed-off-by: ci-bot <ci-bot@kubesphere.io>
Co-authored-by: ks-ci-bot <ks-ci-bot@example.com>
Co-authored-by: joyceliu <joyceliu@yunify.com>
2024-09-06 11:05:52 +08:00

132 lines
3.3 KiB
Go

/*
* Please refer to the LICENSE file in the root directory of the project.
* https://github.com/kubesphere/kubesphere/blob/master/LICENSE
*/
package oauthclient
import (
"context"
"errors"
"fmt"
"math/rand"
"sync"
"time"
corev1 "k8s.io/api/core/v1"
v1 "k8s.io/api/core/v1"
"sigs.k8s.io/controller-runtime/pkg/client"
"sigs.k8s.io/controller-runtime/pkg/webhook/admission"
"kubesphere.io/kubesphere/pkg/apiserver/authentication/oauth"
)
var once sync.Once
type WebhookHandler struct {
client.Client
getter oauth.ClientGetter
}
func (v *WebhookHandler) Default(_ context.Context, secret *v1.Secret) error {
oc, err := oauth.UnmarshalFrom(secret)
if err != nil {
return err
}
if oc.GrantMethod == "" {
oc.GrantMethod = oauth.GrantMethodAuto
}
if oc.Secret == "" {
oc.Secret = generatePassword(32)
}
if secret.Labels == nil {
secret.Labels = make(map[string]string)
}
secret.Labels[oauth.SecretTypeOAuthClient] = oc.Name
return oauth.MarshalInto(oc, secret)
}
func (v *WebhookHandler) ValidateCreate(ctx context.Context, secret *corev1.Secret) (admission.Warnings, error) {
oc, err := oauth.UnmarshalFrom(secret)
if err != nil {
return nil, err
}
if oc.Name != "" {
exist, err := v.clientExist(ctx, oc.Name)
if err != nil {
return nil, err
}
if exist {
return nil, fmt.Errorf("invalid OAuth client, client name '%s' already exists", oc.Name)
}
}
return validate(oc)
}
func (v *WebhookHandler) ValidateUpdate(_ context.Context, old, new *corev1.Secret) (admission.Warnings, error) {
newOc, err := oauth.UnmarshalFrom(new)
if err != nil {
return nil, err
}
oldOc, err := oauth.UnmarshalFrom(old)
if err != nil {
return nil, err
}
if newOc.Name != oldOc.Name {
return nil, fmt.Errorf("cannot change client name")
}
return validate(newOc)
}
func (v *WebhookHandler) ValidateDelete(_ context.Context, _ *corev1.Secret) (admission.Warnings, error) {
return nil, nil
}
func (v *WebhookHandler) ConfigType() corev1.SecretType {
return oauth.SecretTypeOAuthClient
}
// validate performs general validation for the OAuth client.
func validate(oc *oauth.Client) (admission.Warnings, error) {
if oc.Name == "" {
return nil, fmt.Errorf("invalid OAuth client, please ensure that the client name is not empty")
}
if err := oauth.ValidateClient(*oc); err != nil {
return nil, err
}
// Other scope values MAY be present.
// Scope values used that are not understood by an implementation SHOULD be ignored.
if !oauth.IsValidScopes(oc.ScopeRestrictions) {
warnings := fmt.Sprintf("some requested scopes were invalid: %v", oc.ScopeRestrictions)
return []string{warnings}, nil
}
return nil, nil
}
func (v *WebhookHandler) clientExist(ctx context.Context, clientName string) (bool, error) {
once.Do(func() {
v.getter = oauth.NewOAuthClientGetter(v.Client)
})
if _, err := v.getter.GetOAuthClient(ctx, clientName); err != nil {
if errors.Is(err, oauth.ErrorClientNotFound) {
return false, nil
}
return false, err
}
return true, nil
}
func generatePassword(length int) string {
characters := "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789"
password := make([]byte, length)
r := rand.New(rand.NewSource(time.Now().UnixNano()))
for i := range password {
password[i] = characters[r.Intn(len(characters))]
}
return string(password)
}