1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: AGPL-3.0
15 "git.arvados.org/arvados.git/lib/controller/rpc"
16 "git.arvados.org/arvados.git/sdk/go/arvados"
17 "git.arvados.org/arvados.git/sdk/go/auth"
18 "git.arvados.org/arvados.git/sdk/go/ctxlog"
19 "git.arvados.org/arvados.git/sdk/go/httpserver"
20 "github.com/msteinert/pam"
21 "github.com/sirupsen/logrus"
24 type pamLoginController struct {
25 Cluster *arvados.Cluster
26 RailsProxy *railsProxy
29 func (ctrl *pamLoginController) Logout(ctx context.Context, opts arvados.LogoutOptions) (arvados.LogoutResponse, error) {
30 return noopLogout(ctrl.Cluster, opts)
33 func (ctrl *pamLoginController) Login(ctx context.Context, opts arvados.LoginOptions) (arvados.LoginResponse, error) {
35 tx, err := pam.StartFunc(ctrl.Cluster.Login.PAMService, opts.Username, func(style pam.Style, message string) (string, error) {
36 ctxlog.FromContext(ctx).Debugf("pam conversation: style=%v message=%q", style, message)
39 ctxlog.FromContext(ctx).WithField("Message", message).Info("pam.ErrorMsg")
40 errorMessage = message
43 ctxlog.FromContext(ctx).WithField("Message", message).Info("pam.TextInfo")
45 case pam.PromptEchoOn, pam.PromptEchoOff:
46 return opts.Password, nil
48 return "", fmt.Errorf("unrecognized message style %d", style)
52 return arvados.LoginResponse{}, err
54 err = tx.Authenticate(pam.DisallowNullAuthtok)
56 return arvados.LoginResponse{}, httpserver.ErrorWithStatus(err, http.StatusUnauthorized)
58 if errorMessage != "" {
59 return arvados.LoginResponse{}, httpserver.ErrorWithStatus(errors.New(errorMessage), http.StatusUnauthorized)
61 user, err := tx.GetItem(pam.User)
63 return arvados.LoginResponse{}, err
66 if domain := ctrl.Cluster.Login.PAMDefaultEmailDomain; domain != "" && !strings.Contains(email, "@") {
67 email = email + "@" + domain
69 ctxlog.FromContext(ctx).WithFields(logrus.Fields{"user": user, "email": email}).Debug("pam authentication succeeded")
70 ctxRoot := auth.NewContext(ctx, &auth.Credentials{Tokens: []string{ctrl.Cluster.SystemRootToken}})
71 resp, err := ctrl.RailsProxy.UserSessionCreate(ctxRoot, rpc.UserSessionCreateOptions{
72 // Send a fake ReturnTo value instead of the caller's
73 // opts.ReturnTo. We won't follow the resulting
74 // redirect target anyway.
75 ReturnTo: opts.Remote + ",https://none.invalid",
76 AuthInfo: rpc.UserSessionAuthInfo{
82 return arvados.LoginResponse{}, err
84 target, err := url.Parse(resp.RedirectLocation)
86 return arvados.LoginResponse{}, err
88 resp.Token = target.Query().Get("api_token")
89 resp.RedirectLocation = ""