You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
boundary/internal/cmd/commands/authenticate/oidc.go

193 lines
5.2 KiB

// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: BUSL-1.1
package authenticate
import (
"encoding/json"
"errors"
"fmt"
"net/http"
"sync"
"time"
"github.com/hashicorp/boundary/api"
"github.com/hashicorp/boundary/api/authmethods"
"github.com/hashicorp/boundary/internal/cmd/base"
"github.com/hashicorp/boundary/internal/types/scope"
"github.com/hashicorp/cap/util"
"github.com/mitchellh/cli"
"github.com/mitchellh/go-wordwrap"
"github.com/posener/complete"
)
var (
_ cli.Command = (*OidcCommand)(nil)
_ cli.CommandAutocomplete = (*OidcCommand)(nil)
)
type OidcCommand struct {
*base.Command
parsedOpts base.Options
}
func (c *OidcCommand) Synopsis() string {
return wordwrap.WrapString("Invoke the OIDC auth method to authenticate with Boundary", base.TermWidth)
}
func (c *OidcCommand) Help() string {
return base.WrapForHelpText([]string{
"Usage: boundary authenticate oidc [options] [args]",
"",
" Invoke the OIDC auth method to authenticate the Boundary CLI. Example:",
"",
` $ boundary authenticate oidc -auth-method-id amoidc_1234567890`,
"",
"",
}) + c.Flags().Help()
}
func (c *OidcCommand) Flags() *base.FlagSets {
set := c.FlagSet(base.FlagSetHTTP | base.FlagSetClient | base.FlagSetOutputFormat)
f := set.NewFlagSet("Command Options")
f.StringVar(&base.StringVar{
Name: "auth-method-id",
EnvVar: "BOUNDARY_AUTH_METHOD_ID",
Target: &c.FlagAuthMethodId,
Usage: "The auth-method resource to use for the operation",
})
if !c.parsedOpts.WithSkipScopeIdFlag {
f.StringVar(&base.StringVar{
Name: "scope-id",
EnvVar: "BOUNDARY_SCOPE_ID",
Target: &c.FlagScopeId,
Usage: "The scope ID to use for the operation.",
})
}
return set
}
func (c *OidcCommand) AutocompleteArgs() complete.Predictor {
return complete.PredictAnything
}
func (c *OidcCommand) AutocompleteFlags() complete.Flags {
return c.Flags().Completions()
}
func (c *OidcCommand) Run(args []string) int {
c.parsedOpts = base.GetOpts(c.Opts...)
f := c.Flags()
if err := f.Parse(args); err != nil {
c.PrintCliError(err)
return base.CommandUserError
}
client, err := c.Client(base.WithNoTokenScope(), base.WithNoTokenValue())
if c.WrapperCleanupFunc != nil {
defer func() {
if err := c.WrapperCleanupFunc(); err != nil {
c.PrintCliError(fmt.Errorf("Error cleaning kms wrapper: %w", err))
}
}()
}
if err != nil {
c.PrintCliError(fmt.Errorf("Error creating API client: %w", err))
return base.CommandCliError
}
aClient := authmethods.NewClient(client)
// if auth method ID isn't passed on the CLI, try looking up the primary auth method ID
if c.FlagAuthMethodId == "" {
// if flag for scope is empty try looking up global
if c.FlagScopeId == "" {
c.FlagScopeId = scope.Global.String()
}
pri, err := getPrimaryAuthMethodId(c.Context, aClient, c.FlagScopeId, "amoidc")
if err != nil {
c.PrintCliError(err)
return base.CommandUserError
}
c.FlagAuthMethodId = pri
}
result, err := aClient.Authenticate(c.Context, c.FlagAuthMethodId, "start", nil)
if err != nil {
if apiErr := api.AsServerError(err); apiErr != nil {
c.PrintApiError(apiErr, "Error from controller when performing authentication start")
return base.CommandApiError
}
c.PrintCliError(fmt.Errorf("Error trying to perform authentication start: %w", err))
return base.CommandCliError
}
startResp := new(authmethods.OidcAuthMethodAuthenticateStartResponse)
if err := json.Unmarshal(result.GetRawAttributes(), startResp); err != nil {
c.PrintCliError(fmt.Errorf("Error trying to decode authenticate start response: %w", err))
return base.CommandCliError
}
if base.Format(c.UI) == "table" {
c.UI.Output("Opening returned authentication URL in your browser...")
c.UI.Output(startResp.AuthUrl)
}
if err := util.OpenURL(startResp.AuthUrl); err != nil {
c.UI.Error(fmt.Errorf("Unable to open authentication URL in browser: %w", err).Error())
c.UI.Warn("Please copy and paste this link into a browser manually:")
c.UI.Output(startResp.AuthUrl)
}
var watchCode int
wg := new(sync.WaitGroup)
wg.Add(1)
go func() {
defer wg.Done()
for {
select {
case <-c.Context.Done():
c.PrintCliError(errors.New("Command canceled."))
watchCode = base.CommandCliError
return
case <-time.After(1500 * time.Millisecond):
result, err = aClient.Authenticate(c.Context, c.FlagAuthMethodId, "token", map[string]any{
"token_id": startResp.TokenId,
})
if err != nil {
if apiErr := api.AsServerError(err); apiErr != nil {
c.PrintApiError(apiErr, "Error from controller when performing authentication token fetch")
watchCode = base.CommandApiError
return
}
c.PrintCliError(fmt.Errorf("Error trying to perform authentication token fetch: %w", err))
watchCode = base.CommandCliError
return
}
if result.GetResponse().StatusCode() == http.StatusAccepted {
// Nothing yet -- circle around.
continue
}
return
}
}
}()
wg.Wait()
if watchCode != 0 {
return watchCode
}
if result == nil {
c.PrintCliError(errors.New("After watching for token, no response was found."))
return base.CommandCliError
}
return saveAndOrPrintToken(c.Command, result, c.Opts...)
}