mirror of
https://github.com/minio/minio.git
synced 2025-04-24 20:30:47 -04:00
142 lines
4.1 KiB
Go
142 lines
4.1 KiB
Go
// Copyright (c) 2015-2023 MinIO, Inc.
|
|
//
|
|
// This file is part of MinIO Object Storage stack
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package cmd
|
|
|
|
import (
|
|
"context"
|
|
"strings"
|
|
|
|
"github.com/minio/madmin-go/v3"
|
|
"github.com/minio/minio/internal/auth"
|
|
)
|
|
|
|
// getUserWithProvider - returns the appropriate internal username based on the user provider.
|
|
// if validate is true, an error is returned if the user does not exist.
|
|
func getUserWithProvider(ctx context.Context, userProvider, user string, validate bool) (string, error) {
|
|
switch userProvider {
|
|
case madmin.BuiltinProvider:
|
|
if validate {
|
|
if _, ok := globalIAMSys.GetUser(ctx, user); !ok {
|
|
return "", errNoSuchUser
|
|
}
|
|
}
|
|
return user, nil
|
|
case madmin.LDAPProvider:
|
|
if globalIAMSys.GetUsersSysType() != LDAPUsersSysType {
|
|
return "", errIAMActionNotAllowed
|
|
}
|
|
res, err := globalIAMSys.LDAPConfig.GetValidatedDNForUsername(user)
|
|
if res == nil {
|
|
err = errNoSuchUser
|
|
}
|
|
if err != nil {
|
|
if validate {
|
|
return "", err
|
|
}
|
|
if !globalIAMSys.LDAPConfig.ParsesAsDN(user) {
|
|
return "", errNoSuchUser
|
|
}
|
|
}
|
|
return res.NormDN, nil
|
|
default:
|
|
return "", errIAMActionNotAllowed
|
|
}
|
|
}
|
|
|
|
// guessUserProvider - guesses the user provider based on the access key and claims.
|
|
func guessUserProvider(credentials auth.Credentials) string {
|
|
if !credentials.IsServiceAccount() && !credentials.IsTemp() {
|
|
return madmin.BuiltinProvider // regular users are always internal
|
|
}
|
|
|
|
claims := credentials.Claims
|
|
if _, ok := claims[ldapUser]; ok {
|
|
return madmin.LDAPProvider // ldap users
|
|
}
|
|
|
|
if _, ok := claims[subClaim]; ok {
|
|
providerPrefix, _, found := strings.Cut(credentials.ParentUser, getKeySeparator())
|
|
if found {
|
|
return providerPrefix // this is true for certificate and custom providers
|
|
}
|
|
return madmin.OpenIDProvider // openid users are already hashed, so no separator
|
|
}
|
|
|
|
return madmin.BuiltinProvider // default to internal
|
|
}
|
|
|
|
// getProviderInfoFromClaims - returns the provider info from the claims.
|
|
func populateProviderInfoFromClaims(claims map[string]interface{}, provider string, resp *madmin.InfoAccessKeyResp) {
|
|
resp.UserProvider = provider
|
|
switch provider {
|
|
case madmin.LDAPProvider:
|
|
resp.LDAPSpecificInfo = getLDAPInfoFromClaims(claims)
|
|
case madmin.OpenIDProvider:
|
|
resp.OpenIDSpecificInfo = getOpenIDInfoFromClaims(claims)
|
|
}
|
|
}
|
|
|
|
func getOpenIDCfgNameFromClaims(claims map[string]interface{}) (string, bool) {
|
|
roleArn := claims[roleArnClaim]
|
|
|
|
s := globalServerConfig.Clone()
|
|
configs, err := globalIAMSys.OpenIDConfig.GetConfigList(s)
|
|
if err != nil {
|
|
return "", false
|
|
}
|
|
for _, cfg := range configs {
|
|
if cfg.RoleARN == roleArn {
|
|
return cfg.Name, true
|
|
}
|
|
}
|
|
return "", false
|
|
}
|
|
|
|
func getOpenIDInfoFromClaims(claims map[string]interface{}) madmin.OpenIDSpecificAccessKeyInfo {
|
|
info := madmin.OpenIDSpecificAccessKeyInfo{}
|
|
|
|
cfgName, ok := getOpenIDCfgNameFromClaims(claims)
|
|
if !ok {
|
|
return info
|
|
}
|
|
|
|
info.ConfigName = cfgName
|
|
if displayNameClaim := globalIAMSys.OpenIDConfig.GetUserReadableClaim(cfgName); displayNameClaim != "" {
|
|
name, _ := claims[displayNameClaim].(string)
|
|
info.DisplayName = name
|
|
info.DisplayNameClaim = displayNameClaim
|
|
}
|
|
if idClaim := globalIAMSys.OpenIDConfig.GetUserIDClaim(cfgName); idClaim != "" {
|
|
id, _ := claims[idClaim].(string)
|
|
info.UserID = id
|
|
info.UserIDClaim = idClaim
|
|
}
|
|
|
|
return info
|
|
}
|
|
|
|
func getLDAPInfoFromClaims(claims map[string]interface{}) madmin.LDAPSpecificAccessKeyInfo {
|
|
info := madmin.LDAPSpecificAccessKeyInfo{}
|
|
|
|
if name, ok := claims[ldapUser].(string); ok {
|
|
info.Username = name
|
|
}
|
|
|
|
return info
|
|
}
|