mirror of
https://github.com/harness/drone.git
synced 2025-05-17 01:20:13 +08:00

This change adds the following: - Space UID + Custom harness validation (accountId for top level space, harness identifier for child spaces) - Repo UID + Custom harness validation (harness identifier) - Store Unique casing of space / repo path and add Path.ValueUnique (with Unique index) to allow for application layer controlling the case sensitivity (case insensitive standalone vs partially case sensitive harness) - Token UID (unique index over ownertype + ownerID + tokenUID) - Add DisplayName for principals (replaces Name to avoid confustion) - Store Unique casing of principal UID and add Principal.ValueUnique (with unique index) to allow for application layer, per principal type control of case sensitivity (required in embedded mode) - Generate serviceAccount UID (+Email) Randomly (sa-{space|repo}-{ID}-{random}) - Allows to have a unique UID across all principals while reducing likelyhood of overlaps with users + avoid overlap across spaces / repos. - Sync casing of space names (accountId orgId projectId) when creating spaces on the fly (to ensure case sensitivity of - harness code) or use the existing space to update casing. - Update serviceaccount client to match updated NG Manager API - in embedded mode create spaces for harness resources owning the service account
75 lines
2.0 KiB
Go
75 lines
2.0 KiB
Go
// Copyright 2022 Harness Inc. All rights reserved.
|
|
// Use of this source code is governed by the Polyform Free Trial License
|
|
// that can be found in the LICENSE.md file for this repository.
|
|
|
|
package user
|
|
|
|
import (
|
|
"context"
|
|
"crypto/rand"
|
|
"errors"
|
|
"fmt"
|
|
"math/big"
|
|
"time"
|
|
|
|
"github.com/harness/gitness/internal/api/usererror"
|
|
"github.com/harness/gitness/internal/auth"
|
|
"github.com/harness/gitness/internal/store"
|
|
"github.com/harness/gitness/internal/token"
|
|
"github.com/harness/gitness/types"
|
|
"github.com/rs/zerolog/log"
|
|
"golang.org/x/crypto/bcrypt"
|
|
)
|
|
|
|
/*
|
|
* Login attempts to login as a specific user - returns the session token if successful.
|
|
*/
|
|
func (c *Controller) Login(ctx context.Context, session *auth.Session,
|
|
username string, password string) (*types.TokenResponse, error) {
|
|
// no auth check required, password is used for it.
|
|
|
|
user, err := findUserFromUID(ctx, c.userStore, username)
|
|
if errors.Is(err, store.ErrResourceNotFound) {
|
|
user, err = findUserFromEmail(ctx, c.userStore, username)
|
|
}
|
|
|
|
// always return not found for security reasons.
|
|
if err != nil {
|
|
log.Ctx(ctx).Debug().Err(err).
|
|
Str("user_uid", username).
|
|
Msgf("failed to retrieve user during login.")
|
|
return nil, usererror.ErrNotFound
|
|
}
|
|
|
|
err = bcrypt.CompareHashAndPassword(
|
|
[]byte(user.Password),
|
|
[]byte(password),
|
|
)
|
|
if err != nil {
|
|
log.Debug().Err(err).
|
|
Str("user_uid", user.UID).
|
|
Msg("invalid password")
|
|
|
|
return nil, usererror.ErrNotFound
|
|
}
|
|
|
|
tokenUID, err := generateSessionTokenUID()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
token, jwtToken, err := token.CreateUserSession(ctx, c.tokenStore, user, tokenUID)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &types.TokenResponse{Token: *token, AccessToken: jwtToken}, nil
|
|
}
|
|
|
|
func generateSessionTokenUID() (string, error) {
|
|
r, err := rand.Int(rand.Reader, big.NewInt(10000))
|
|
if err != nil {
|
|
return "", fmt.Errorf("failed to generate random number: %w", err)
|
|
}
|
|
return fmt.Sprintf("login-%d-%04d", time.Now().Unix(), r.Int64()), nil
|
|
}
|