2
0

api_token.go 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107
  1. package authmanagement
  2. import (
  3. "context"
  4. "fmt"
  5. "time"
  6. "github.com/google/uuid"
  7. "github.com/dgrijalva/jwt-go"
  8. "github.com/porter-dev/porter/internal/auth/token"
  9. "github.com/porter-dev/porter/internal/models"
  10. "github.com/porter-dev/porter/internal/telemetry"
  11. "github.com/bufbuild/connect-go"
  12. porterv1 "github.com/porter-dev/api-contracts/generated/go/porter/v1"
  13. )
  14. // APIToken returns an encoded token for programmatic access to the Porter UI. Currently, this token is hardcoded
  15. // to use the "porter-agent-token" name. Once this endpoint is used for multiple tokens, the GRPC request should
  16. // include the token name or type as an argument.
  17. func (a AuthManagementService) APIToken(ctx context.Context, req *connect.Request[porterv1.APITokenRequest]) (*connect.Response[porterv1.APITokenResponse], error) {
  18. ctx, span := telemetry.NewSpan(ctx, "auth-endpoint-api-token")
  19. defer span.End()
  20. resp := connect.NewResponse(&porterv1.APITokenResponse{})
  21. if req == nil {
  22. err := telemetry.Error(ctx, span, nil, "missing request")
  23. return resp, connect.NewError(connect.CodeInvalidArgument, err)
  24. }
  25. if req.Msg == nil {
  26. err := telemetry.Error(ctx, span, nil, "missing request message")
  27. return resp, connect.NewError(connect.CodeInvalidArgument, err)
  28. }
  29. if req.Msg.ProjectId == 0 {
  30. err := telemetry.Error(ctx, span, nil, "missing project id")
  31. return resp, connect.NewError(connect.CodeInvalidArgument, err)
  32. }
  33. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "project-id", Value: req.Msg.ProjectId})
  34. existingTokens, err := a.Config.APITokenManager.ListAPITokensByProjectID(uint(req.Msg.ProjectId))
  35. if err != nil {
  36. return resp, telemetry.Error(ctx, span, err, "error listing api tokens")
  37. }
  38. var apiToken *models.APIToken
  39. for _, tok := range existingTokens {
  40. if tok.Name == "porter-agent-token" {
  41. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "token-exists", Value: true})
  42. apiToken = tok
  43. }
  44. }
  45. if apiToken == nil {
  46. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "token-exists", Value: false})
  47. tokenID, err := uuid.NewUUID()
  48. if err != nil {
  49. return resp, telemetry.Error(ctx, span, err, "error generating tokenID")
  50. }
  51. expiresAt := time.Now().Add(time.Hour * 24 * 365)
  52. apiToken = &models.APIToken{
  53. UniqueID: tokenID.String(),
  54. ProjectID: uint(req.Msg.ProjectId),
  55. Expiry: &expiresAt,
  56. Revoked: false,
  57. PolicyUID: "developer",
  58. PolicyName: "developer",
  59. Name: "porter-agent-token",
  60. }
  61. apiToken, err = a.Config.APITokenManager.CreateAPIToken(apiToken)
  62. if err != nil {
  63. return resp, telemetry.Error(ctx, span, err, "error creating api token")
  64. }
  65. }
  66. telemetry.WithAttributes(span,
  67. telemetry.AttributeKV{Key: "token-id", Value: apiToken.UniqueID},
  68. telemetry.AttributeKV{Key: "expiry", Value: apiToken.Expiry.UTC().String()},
  69. )
  70. now := time.Now().UTC()
  71. token := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{
  72. "sub_kind": "porter-agent",
  73. "sub": string(token.API),
  74. "iat": fmt.Sprintf("%d", now.Unix()),
  75. "project_id": apiToken.ProjectID,
  76. "token_id": apiToken.UniqueID,
  77. })
  78. encodedToken, err := token.SignedString([]byte(a.Config.TokenGeneratorSecret))
  79. if err != nil {
  80. return resp, telemetry.Error(ctx, span, err, "error signing token")
  81. }
  82. resp.Msg.Token = encodedToken
  83. return resp, nil
  84. }