mirror of
https://github.com/moghtech/komodo.git
synced 2026-03-21 13:50:09 -05:00
* attach env_file to compose build and compose pull stages * fmt and bump rust version * bump dependencies * ignored for Sqlite message * fix Build secret args info * improve secret arguments info * improve environment, ports, volumes deserializers * rename `mongo` to `database` in config * support _FILE in secret env vars * improve setup - simpler compose * remove aws ecr container registry support, alpine dockerfiles * log periphery config * ssl_enabled mode * log http vs https * periphery client accept untrust ssl certs * fix nav issue from links * configurable ssl * KOMODO_ENSURE_SERVER -> KOMODO_FIRST_SERVER * mount proc and ssl volume * managed sync * validate files on host resource path * remove sync repo not configured guards * disable confirm dialog * fix sync hash / message Option * try dev dockerfile * refresh sync resources after commit * socket invalidate handling * delete dev dockerfile * Commit Changes * Add Info tab to syncs * fix new Info parsing issue with serde default * refresh stack cache on create / update * managed syncs can't sync themselves * managed syncs seems to work * bump thiserror * use alpine as main dockerfile * apt add --no-cache * disable user write perms, super admin perms to manage admins * manage admin user UI * implement disable non admin create frontend * disable create non admin * Copy button shown based on permission * warning message on managed sync * implement monaco editor * impl simple match tags config * resource sync support match tags * more match tag filtering * improve config with better saving diffs * export button use monaco * deser Conversions with wrapping strings * envs editing * don't delete variables / user groups if match tags defined * env from_str improve * improve dashboards * remove core ca stuff for now * move periphery ssl gen to dedicated file * default server address periphery:8120 * clean up ssl configs * server dashboard * nice test compose * add discord alerter * discord alerter * stack hideInfo logic * compose setup * alert table * improve config hover card style * update min editor height and stack config * Feat: Styling Updates (#94) * sidebar takes full screen height * add bg accent to navbar * add aschild prop to topbar alerts trigger * stylize resource rows * internally scrollable data tables * better hover color for outlined button * always show scrollbar to prevent layout shift * better hover color for navbar * rearrange buttons * fix table and resource row styles * cleanup scrollbar css * use page for dashboard instead of section * fix padding * resource sync refactor and env keep comments * frontend build * improve configs * config nice * Feat/UI (#95) * stylize resource rows * internally scrollable data tables * fix table and resource row styles * use page for dashboard instead of section * fix padding * add `ResourcePageHeader` to required components * add generic resource page header component * add resource page headers for all components * add resource notificaitons component * add `TextUpdateMenu2` for use in resource page * cleanup resource notificaitons * update resource page layout * ui edits * sync kind of work * clean up unused import * syncs seem to work * new sync pending * monaco diff hide unchanged regions * update styling all in config resource select links * confirm update default strings * move procedure Add Stage to left * update colors / styles * frontend build * backend for write file contents to host * compose reference ports comment out * server config * ensure parent directory created * fix frontend build * remove default stack run_directory * fix periphery compose deploy response set * update compose files * move server stats under tabs * fix deployment list item getting correct image when not deployed * stack updates cache after file write * edit files on host * clean up unused imports * top level config update assignment must be spread * update deps, move alert module * move stack module * move sync module * move to sync db_client usage after init * support generic OIDC provider * init builders / server templates specifying https * special cases for server / deployment state * improve alert details * add builder template `use_https` config * try downgrade aws sdk ec2 for x86 build * update debian dockerfiles to rm lists/* * optionally configure seperate KOMODO_OIDC_REDIRECT * add defaults to compose.env * keep tags / search right aligned when view only * clean up configs * remove unused migrator deps * update roadmap support generic OIDC * initialize sync use confirm button * key_value syntax highlighting * smaller debian dockerfiles * clean up deps.sh * debian dockerifle * New config layout (#96) * new config layout * fix image config layout and components config * fix dom nesting and cleanup components * fix label, make switches flex row * ensure smooth scroll on hash navigations * width 180 on config sidebar * slight edits to config * log whether https builder * DISABLED <switch> ENABLED * fix some more config * smaller checked component * server config looking good * auto initialize compose files when files on host * stack files on host good * stack config nice * remove old config * deployments looking good * build looking good * Repo good * nice config for builders * alerter good * server template config * syncs good * tweak stack config * use status badge for update tables * unified update page using router params * replace /updates with unified updates page * redirect all resource updates to unified update page * fix reset handling * unmount legacy page * try periphery rustls * rm unused import * fix broken deps * add unified alerts apge * mount new alerts, remove old alerts page * reroute resource alerts to unified alerts page * back to periphery openssl * ssl_enabled defaults to false for backward compat * reqwest need json feature * back to og yaml monaco * Uncomment config fields for clearer config * clean up compose env * implement pull or clone, avoid deleting repo directory * refactor mongo configuration params * all configs respect empty string null * add back status to header * build toml don't have version if not auto incrementing * fix comile * fix repo pull cd to correct dir * fix core pull_or_clone directory * improve statuses * remove ' ' from kv list parser * longer CSRF valid for, to give time to login / accept * don't compute diff / execute if there are any file_errors * PartialBuilderConfig enum user inner option * move errors to top * fix toml init serializer * server template and bulder manually add config.params line * better way to check builder / template params empty * improve build configs * merge links into network area deployment * default periphery config * improve SystemCommand editor * better Repo server / builder Info * improve Alerts / Updates with ResourceSelector * fix unused frontend * update ResourceSync description * toml use [resource.config] syntax * update toml syntax * update Build.image_registry schema * fix repo / stack resource link alias * reorder image registry * align toml / yaml parser style * some config updates --------- Co-authored-by: Karamvir Singh <67458484+karamvirsingh98@users.noreply.github.com> Co-authored-by: kv <karamvir.singh98@gmail.com>
157 lines
3.7 KiB
Rust
157 lines
3.7 KiB
Rust
use ::jwt::VerifyWithKey;
|
|
use anyhow::{anyhow, Context};
|
|
use async_timing_util::unix_timestamp_ms;
|
|
use axum::{
|
|
extract::Request, http::HeaderMap, middleware::Next,
|
|
response::Response,
|
|
};
|
|
use komodo_client::entities::{komodo_timestamp, user::User};
|
|
use mungos::mongodb::bson::doc;
|
|
use reqwest::StatusCode;
|
|
use serde::Deserialize;
|
|
use serror::AddStatusCode;
|
|
|
|
use crate::{
|
|
helpers::query::get_user,
|
|
state::{db_client, jwt_client},
|
|
};
|
|
|
|
use self::jwt::JwtClaims;
|
|
|
|
pub mod github;
|
|
pub mod google;
|
|
pub mod jwt;
|
|
pub mod oidc;
|
|
|
|
mod local;
|
|
|
|
const STATE_PREFIX_LENGTH: usize = 20;
|
|
|
|
#[derive(Debug, Deserialize)]
|
|
struct RedirectQuery {
|
|
redirect: Option<String>,
|
|
}
|
|
|
|
#[instrument(level = "debug")]
|
|
pub async fn auth_request(
|
|
headers: HeaderMap,
|
|
mut req: Request,
|
|
next: Next,
|
|
) -> serror::Result<Response> {
|
|
let user = authenticate_check_enabled(&headers)
|
|
.await
|
|
.status_code(StatusCode::UNAUTHORIZED)?;
|
|
req.extensions_mut().insert(user);
|
|
Ok(next.run(req).await)
|
|
}
|
|
|
|
#[instrument(level = "debug")]
|
|
pub async fn get_user_id_from_headers(
|
|
headers: &HeaderMap,
|
|
) -> anyhow::Result<String> {
|
|
match (
|
|
headers.get("authorization"),
|
|
headers.get("x-api-key"),
|
|
headers.get("x-api-secret"),
|
|
) {
|
|
(Some(jwt), _, _) => {
|
|
// USE JWT
|
|
let jwt = jwt.to_str().context("jwt is not str")?;
|
|
auth_jwt_get_user_id(jwt)
|
|
.await
|
|
.context("failed to authenticate jwt")
|
|
}
|
|
(None, Some(key), Some(secret)) => {
|
|
// USE API KEY / SECRET
|
|
let key = key.to_str().context("key is not str")?;
|
|
let secret = secret.to_str().context("secret is not str")?;
|
|
auth_api_key_get_user_id(key, secret)
|
|
.await
|
|
.context("failed to authenticate api key")
|
|
}
|
|
_ => {
|
|
// AUTH FAIL
|
|
Err(anyhow!("must attach either AUTHORIZATION header with jwt OR pass X-API-KEY and X-API-SECRET"))
|
|
}
|
|
}
|
|
}
|
|
|
|
#[instrument(level = "debug")]
|
|
pub async fn authenticate_check_enabled(
|
|
headers: &HeaderMap,
|
|
) -> anyhow::Result<User> {
|
|
let user_id = get_user_id_from_headers(headers).await?;
|
|
let user = get_user(&user_id).await?;
|
|
if user.enabled {
|
|
Ok(user)
|
|
} else {
|
|
Err(anyhow!("user not enabled"))
|
|
}
|
|
}
|
|
|
|
#[instrument(level = "debug")]
|
|
pub async fn auth_jwt_get_user_id(
|
|
jwt: &str,
|
|
) -> anyhow::Result<String> {
|
|
let claims: JwtClaims = jwt
|
|
.verify_with_key(&jwt_client().key)
|
|
.context("failed to verify claims")?;
|
|
if claims.exp > unix_timestamp_ms() {
|
|
Ok(claims.id)
|
|
} else {
|
|
Err(anyhow!("token has expired"))
|
|
}
|
|
}
|
|
|
|
#[instrument(level = "debug")]
|
|
pub async fn auth_jwt_check_enabled(
|
|
jwt: &str,
|
|
) -> anyhow::Result<User> {
|
|
let user_id = auth_jwt_get_user_id(jwt).await?;
|
|
check_enabled(user_id).await
|
|
}
|
|
|
|
#[instrument(level = "debug")]
|
|
pub async fn auth_api_key_get_user_id(
|
|
key: &str,
|
|
secret: &str,
|
|
) -> anyhow::Result<String> {
|
|
let key = db_client()
|
|
.api_keys
|
|
.find_one(doc! { "key": key })
|
|
.await
|
|
.context("failed to query db")?
|
|
.context("no api key matching key")?;
|
|
if key.expires != 0 && key.expires < komodo_timestamp() {
|
|
return Err(anyhow!("api key expired"));
|
|
}
|
|
if bcrypt::verify(secret, &key.secret)
|
|
.context("failed to verify secret hash")?
|
|
{
|
|
// secret matches
|
|
Ok(key.user_id)
|
|
} else {
|
|
// secret mismatch
|
|
Err(anyhow!("invalid api secret"))
|
|
}
|
|
}
|
|
|
|
#[instrument(level = "debug")]
|
|
pub async fn auth_api_key_check_enabled(
|
|
key: &str,
|
|
secret: &str,
|
|
) -> anyhow::Result<User> {
|
|
let user_id = auth_api_key_get_user_id(key, secret).await?;
|
|
check_enabled(user_id).await
|
|
}
|
|
|
|
#[instrument(level = "debug")]
|
|
async fn check_enabled(user_id: String) -> anyhow::Result<User> {
|
|
let user = get_user(&user_id).await?;
|
|
if user.enabled {
|
|
Ok(user)
|
|
} else {
|
|
Err(anyhow!("user not enabled"))
|
|
}
|
|
}
|