Skip to content

Commit 3dcad95

Browse files
Merge pull request #18370 from deads2k/oauth-02-apis
Automatic merge from submit-queue (batch tested with PRs 17942, 18370). switch oauthserver to external user client This switches the vast majority of calls to external user calls. There's a bad unit test that needs to move, but that is involved. I also found some packages that are not used inside of the oauthserver and used instead in the apiserver. /assign enj /assign mfojtik
2 parents 69dcbb2 + 754bd6c commit 3dcad95

36 files changed

+642
-656
lines changed

hack/import-restrictions.json

+6-6
Original file line numberDiff line numberDiff line change
@@ -343,6 +343,7 @@
343343
],
344344
"allowedImportPackageRoots": [
345345
"vendor/k8s.io/apimachinery",
346+
"vendor/k8s.io/api",
346347
"vendor/k8s.io/apiserver",
347348
"vendor/k8s.io/client-go",
348349
"vendor/golang.org",
@@ -353,28 +354,26 @@
353354
"vendor/github.com/gorilla/sessions",
354355
"vendor/github.com/gorilla/context",
355356
"vendor/github.com/rackspace/gophercloud",
356-
"vendor/github.com/openshift/api",
357357
"vendor/gopkg.in/ldap.v2",
358358
"vendor/k8s.io/kubernetes",
359359
"vendor/github.com/prometheus/client_golang/prometheus",
360+
"vendor/github.com/openshift/api",
361+
"vendor/github.com/openshift/client-go",
362+
360363
"github.com/openshift/origin/pkg/oauthserver",
361-
"github.com/openshift/origin/pkg/user/generated",
362364
"github.com/openshift/origin/pkg/route/generated",
363365
"github.com/openshift/origin/pkg/oauth/generated"
364366
],
365367
"allowedImportPackages": [
366368
"vendor/github.com/golang/glog",
367-
"vendor/k8s.io/kubernetes/pkg/apis/core",
368369
"vendor/k8s.io/kubernetes/pkg/api/legacyscheme",
369370
"github.com/openshift/origin/pkg/authorization/apis/authorization",
370-
"github.com/openshift/origin/pkg/user/apis/user",
371371
"github.com/openshift/origin/pkg/cmd/server/api",
372372
"github.com/openshift/origin/pkg/util/http/links",
373373
"github.com/openshift/origin/pkg/authorization/authorizer/scope",
374374
"github.com/openshift/origin/pkg/oauth/apis/oauth/validation",
375375
"github.com/openshift/origin/pkg/oauth/scope",
376376
"github.com/openshift/origin/pkg/oauth/apis/oauth",
377-
"github.com/openshift/origin/pkg/util/rankedset",
378377
"github.com/openshift/origin/pkg/oauth/registry/oauthclientauthorization",
379378
"github.com/openshift/origin/pkg/cmd/server/api",
380379
"github.com/openshift/origin/pkg/cmd/server/api/latest",
@@ -385,7 +384,8 @@
385384
"github.com/openshift/origin/pkg/user/registry/test",
386385
"github.com/openshift/origin/pkg/oauth/util",
387386
"github.com/openshift/origin/pkg/api/install",
388-
"github.com/openshift/origin/pkg/user",
387+
"github.com/openshift/origin/pkg/user/apis/user/v1",
388+
"github.com/openshift/origin/pkg/user/apis/user",
389389
"github.com/openshift/origin/pkg/user/registry/test",
390390
"github.com/openshift/origin/pkg/user/registry/useridentitymapping",
391391
"github.com/openshift/origin/pkg/util/httprequest"

pkg/oauthserver/oauth/registry/expirationvalidator.go pkg/apiserver/authentication/internaloauth/expirationvalidator.go

+5-6
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,18 @@
1-
package registry
1+
package internaloauth
22

33
import (
44
"errors"
55
"time"
66

7+
userv1 "github.com/openshift/api/user/v1"
78
"github.com/openshift/origin/pkg/oauth/apis/oauth"
8-
"github.com/openshift/origin/pkg/oauthserver/authenticator"
9-
"github.com/openshift/origin/pkg/user/apis/user"
109
)
1110

1211
var errExpired = errors.New("token is expired")
1312

14-
func NewExpirationValidator() authenticator.OAuthTokenValidator {
15-
return authenticator.OAuthTokenValidatorFunc(
16-
func(token *oauth.OAuthAccessToken, _ *user.User) error {
13+
func NewExpirationValidator() OAuthTokenValidator {
14+
return OAuthTokenValidatorFunc(
15+
func(token *oauth.OAuthAccessToken, _ *userv1.User) error {
1716
if token.ExpiresIn > 0 {
1817
if expire(token).Before(time.Now()) {
1918
return errExpired
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,70 @@
1+
package internaloauth
2+
3+
import (
4+
"testing"
5+
"time"
6+
7+
userapi "github.com/openshift/api/user/v1"
8+
userfake "github.com/openshift/client-go/user/clientset/versioned/fake"
9+
oapi "github.com/openshift/origin/pkg/oauth/apis/oauth"
10+
oauthfake "github.com/openshift/origin/pkg/oauth/generated/internalclientset/fake"
11+
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
12+
)
13+
14+
func TestAuthenticateTokenExpired(t *testing.T) {
15+
fakeOAuthClient := oauthfake.NewSimpleClientset(
16+
// expired token that had a lifetime of 10 minutes
17+
&oapi.OAuthAccessToken{
18+
ObjectMeta: metav1.ObjectMeta{Name: "token1", CreationTimestamp: metav1.Time{Time: time.Now().Add(-1 * time.Hour)}},
19+
ExpiresIn: 600,
20+
UserName: "foo",
21+
},
22+
// non-expired token that has a lifetime of 10 minutes, but has a non-nil deletion timestamp
23+
&oapi.OAuthAccessToken{
24+
ObjectMeta: metav1.ObjectMeta{Name: "token2", CreationTimestamp: metav1.Time{Time: time.Now()}, DeletionTimestamp: &metav1.Time{}},
25+
ExpiresIn: 600,
26+
UserName: "foo",
27+
},
28+
)
29+
fakeUserClient := userfake.NewSimpleClientset(&userapi.User{ObjectMeta: metav1.ObjectMeta{Name: "foo", UID: "bar"}})
30+
31+
tokenAuthenticator := NewTokenAuthenticator(fakeOAuthClient.Oauth().OAuthAccessTokens(), fakeUserClient.UserV1().Users(), NoopGroupMapper{}, NewExpirationValidator())
32+
33+
for _, tokenName := range []string{"token1", "token2"} {
34+
userInfo, found, err := tokenAuthenticator.AuthenticateToken(tokenName)
35+
if found {
36+
t.Error("Found token, but it should be missing!")
37+
}
38+
if err != errExpired {
39+
t.Errorf("Unexpected error: %v", err)
40+
}
41+
if userInfo != nil {
42+
t.Errorf("Unexpected user: %v", userInfo)
43+
}
44+
}
45+
}
46+
47+
func TestAuthenticateTokenValidated(t *testing.T) {
48+
fakeOAuthClient := oauthfake.NewSimpleClientset(
49+
&oapi.OAuthAccessToken{
50+
ObjectMeta: metav1.ObjectMeta{Name: "token", CreationTimestamp: metav1.Time{Time: time.Now()}},
51+
ExpiresIn: 600, // 10 minutes
52+
UserName: "foo",
53+
UserUID: string("bar"),
54+
},
55+
)
56+
fakeUserClient := userfake.NewSimpleClientset(&userapi.User{ObjectMeta: metav1.ObjectMeta{Name: "foo", UID: "bar"}})
57+
58+
tokenAuthenticator := NewTokenAuthenticator(fakeOAuthClient.Oauth().OAuthAccessTokens(), fakeUserClient.UserV1().Users(), NoopGroupMapper{}, NewExpirationValidator(), NewUIDValidator())
59+
60+
userInfo, found, err := tokenAuthenticator.AuthenticateToken("token")
61+
if !found {
62+
t.Error("Did not find a token!")
63+
}
64+
if err != nil {
65+
t.Errorf("Unexpected error: %v", err)
66+
}
67+
if userInfo == nil {
68+
t.Error("Did not get a user!")
69+
}
70+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
package internaloauth
2+
3+
import (
4+
userapi "github.com/openshift/api/user/v1"
5+
"github.com/openshift/origin/pkg/oauth/apis/oauth"
6+
)
7+
8+
type OAuthTokenValidator interface {
9+
Validate(token *oauth.OAuthAccessToken, user *userapi.User) error
10+
}
11+
12+
var _ OAuthTokenValidator = OAuthTokenValidatorFunc(nil)
13+
14+
type OAuthTokenValidatorFunc func(token *oauth.OAuthAccessToken, user *userapi.User) error
15+
16+
func (f OAuthTokenValidatorFunc) Validate(token *oauth.OAuthAccessToken, user *userapi.User) error {
17+
return f(token, user)
18+
}
19+
20+
var _ OAuthTokenValidator = OAuthTokenValidators(nil)
21+
22+
type OAuthTokenValidators []OAuthTokenValidator
23+
24+
func (v OAuthTokenValidators) Validate(token *oauth.OAuthAccessToken, user *userapi.User) error {
25+
for _, validator := range v {
26+
if err := validator.Validate(token, user); err != nil {
27+
return err
28+
}
29+
}
30+
return nil
31+
}
32+
33+
type UserToGroupMapper interface {
34+
GroupsFor(username string) ([]*userapi.Group, error)
35+
}
36+
37+
type NoopGroupMapper struct{}
38+
39+
func (n NoopGroupMapper) GroupsFor(username string) ([]*userapi.Group, error) {
40+
return []*userapi.Group{}, nil
41+
}

pkg/oauthserver/oauth/registry/timeoutvalidator.go pkg/apiserver/authentication/internaloauth/timeoutvalidator.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
package registry
1+
package internaloauth
22

33
import (
44
"errors"
@@ -10,10 +10,10 @@ import (
1010
"k8s.io/apimachinery/pkg/apis/meta/v1"
1111
"k8s.io/apimachinery/pkg/util/runtime"
1212

13+
userv1 "github.com/openshift/api/user/v1"
1314
"github.com/openshift/origin/pkg/oauth/apis/oauth"
1415
oauthclient "github.com/openshift/origin/pkg/oauth/generated/internalclientset/typed/oauth/internalversion"
1516
oauthclientlister "github.com/openshift/origin/pkg/oauth/generated/listers/oauth/internalversion"
16-
"github.com/openshift/origin/pkg/user/apis/user"
1717
"github.com/openshift/origin/pkg/util/rankedset"
1818
)
1919

@@ -105,7 +105,7 @@ func NewTimeoutValidator(tokens oauthclient.OAuthAccessTokenInterface, oauthClie
105105

106106
// Validate is called with a token when it is seen by an authenticator
107107
// it touches only the tokenChannel so it is safe to call from other threads
108-
func (a *TimeoutValidator) Validate(token *oauth.OAuthAccessToken, _ *user.User) error {
108+
func (a *TimeoutValidator) Validate(token *oauth.OAuthAccessToken, _ *userv1.User) error {
109109
if token.InactivityTimeoutSeconds == 0 {
110110
// We care only if the token was created with a timeout to start with
111111
return nil

pkg/oauthserver/oauth/registry/tokenauthenticator.go pkg/apiserver/authentication/internaloauth/tokenauthenticator.go

+7-9
Original file line numberDiff line numberDiff line change
@@ -1,30 +1,28 @@
1-
package registry
1+
package internaloauth
22

33
import (
44
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
55
kauthenticator "k8s.io/apiserver/pkg/authentication/authenticator"
66
kuser "k8s.io/apiserver/pkg/authentication/user"
77

8+
userclient "github.com/openshift/client-go/user/clientset/versioned/typed/user/v1"
89
authorizationapi "github.com/openshift/origin/pkg/authorization/apis/authorization"
910
oauthclient "github.com/openshift/origin/pkg/oauth/generated/internalclientset/typed/oauth/internalversion"
10-
"github.com/openshift/origin/pkg/oauthserver/authenticator"
11-
"github.com/openshift/origin/pkg/oauthserver/userregistry/identitymapper"
12-
userclient "github.com/openshift/origin/pkg/user/generated/internalclientset/typed/user/internalversion"
1311
)
1412

1513
type tokenAuthenticator struct {
1614
tokens oauthclient.OAuthAccessTokenInterface
17-
users userclient.UserResourceInterface
18-
groupMapper identitymapper.UserToGroupMapper
19-
validators authenticator.OAuthTokenValidator
15+
users userclient.UserInterface
16+
groupMapper UserToGroupMapper
17+
validators OAuthTokenValidator
2018
}
2119

22-
func NewTokenAuthenticator(tokens oauthclient.OAuthAccessTokenInterface, users userclient.UserResourceInterface, groupMapper identitymapper.UserToGroupMapper, validators ...authenticator.OAuthTokenValidator) kauthenticator.Token {
20+
func NewTokenAuthenticator(tokens oauthclient.OAuthAccessTokenInterface, users userclient.UserInterface, groupMapper UserToGroupMapper, validators ...OAuthTokenValidator) kauthenticator.Token {
2321
return &tokenAuthenticator{
2422
tokens: tokens,
2523
users: users,
2624
groupMapper: groupMapper,
27-
validators: authenticator.OAuthTokenValidators(validators),
25+
validators: OAuthTokenValidators(validators),
2826
}
2927
}
3028

0 commit comments

Comments
 (0)