auth.go 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148
  1. // Copyright 2016 Nippon Telegraph and Telephone Corporation.
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package clientv3
  15. import (
  16. "fmt"
  17. "strings"
  18. "github.com/coreos/etcd/auth/authpb"
  19. "github.com/coreos/etcd/etcdserver/api/v3rpc/rpctypes"
  20. pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
  21. "golang.org/x/net/context"
  22. "google.golang.org/grpc"
  23. )
  24. type (
  25. AuthEnableResponse pb.AuthEnableResponse
  26. AuthDisableResponse pb.AuthDisableResponse
  27. AuthenticateResponse pb.AuthenticateResponse
  28. AuthUserAddResponse pb.AuthUserAddResponse
  29. AuthUserDeleteResponse pb.AuthUserDeleteResponse
  30. AuthUserChangePasswordResponse pb.AuthUserChangePasswordResponse
  31. AuthUserGrantResponse pb.AuthUserGrantResponse
  32. AuthRoleAddResponse pb.AuthRoleAddResponse
  33. AuthRoleGrantResponse pb.AuthRoleGrantResponse
  34. PermissionType authpb.Permission_Type
  35. )
  36. const (
  37. PermRead = authpb.READ
  38. PermWrite = authpb.WRITE
  39. PermReadWrite = authpb.READWRITE
  40. )
  41. type Auth interface {
  42. // AuthEnable enables auth of an etcd cluster.
  43. AuthEnable(ctx context.Context) (*AuthEnableResponse, error)
  44. // AuthDisable disables auth of an etcd cluster.
  45. AuthDisable(ctx context.Context) (*AuthDisableResponse, error)
  46. // Authenticate does authenticate with given user name and password.
  47. Authenticate(ctx context.Context, name string, password string) (*AuthenticateResponse, error)
  48. // UserAdd adds a new user to an etcd cluster.
  49. UserAdd(ctx context.Context, name string, password string) (*AuthUserAddResponse, error)
  50. // UserDelete deletes a user from an etcd cluster.
  51. UserDelete(ctx context.Context, name string) (*AuthUserDeleteResponse, error)
  52. // UserChangePassword changes a password of a user.
  53. UserChangePassword(ctx context.Context, name string, password string) (*AuthUserChangePasswordResponse, error)
  54. // UserGrant grants a role to a user.
  55. UserGrant(ctx context.Context, user string, role string) (*AuthUserGrantResponse, error)
  56. // RoleAdd adds a new role to an etcd cluster.
  57. RoleAdd(ctx context.Context, name string) (*AuthRoleAddResponse, error)
  58. // RoleGrant grants a permission to a role.
  59. RoleGrant(ctx context.Context, name string, key string, permType PermissionType) (*AuthRoleGrantResponse, error)
  60. }
  61. type auth struct {
  62. c *Client
  63. conn *grpc.ClientConn // conn in-use
  64. remote pb.AuthClient
  65. }
  66. func NewAuth(c *Client) Auth {
  67. conn := c.ActiveConnection()
  68. return &auth{
  69. conn: c.ActiveConnection(),
  70. remote: pb.NewAuthClient(conn),
  71. c: c,
  72. }
  73. }
  74. func (auth *auth) AuthEnable(ctx context.Context) (*AuthEnableResponse, error) {
  75. resp, err := auth.remote.AuthEnable(ctx, &pb.AuthEnableRequest{})
  76. return (*AuthEnableResponse)(resp), rpctypes.Error(err)
  77. }
  78. func (auth *auth) AuthDisable(ctx context.Context) (*AuthDisableResponse, error) {
  79. resp, err := auth.remote.AuthDisable(ctx, &pb.AuthDisableRequest{})
  80. return (*AuthDisableResponse)(resp), rpctypes.Error(err)
  81. }
  82. func (auth *auth) Authenticate(ctx context.Context, name string, password string) (*AuthenticateResponse, error) {
  83. resp, err := auth.remote.Authenticate(ctx, &pb.AuthenticateRequest{Name: name, Password: password})
  84. return (*AuthenticateResponse)(resp), rpctypes.Error(err)
  85. }
  86. func (auth *auth) UserAdd(ctx context.Context, name string, password string) (*AuthUserAddResponse, error) {
  87. resp, err := auth.remote.UserAdd(ctx, &pb.AuthUserAddRequest{Name: name, Password: password})
  88. return (*AuthUserAddResponse)(resp), rpctypes.Error(err)
  89. }
  90. func (auth *auth) UserDelete(ctx context.Context, name string) (*AuthUserDeleteResponse, error) {
  91. resp, err := auth.remote.UserDelete(ctx, &pb.AuthUserDeleteRequest{Name: name})
  92. return (*AuthUserDeleteResponse)(resp), rpctypes.Error(err)
  93. }
  94. func (auth *auth) UserChangePassword(ctx context.Context, name string, password string) (*AuthUserChangePasswordResponse, error) {
  95. resp, err := auth.remote.UserChangePassword(ctx, &pb.AuthUserChangePasswordRequest{Name: name, Password: password})
  96. return (*AuthUserChangePasswordResponse)(resp), rpctypes.Error(err)
  97. }
  98. func (auth *auth) UserGrant(ctx context.Context, user string, role string) (*AuthUserGrantResponse, error) {
  99. resp, err := auth.remote.UserGrant(ctx, &pb.AuthUserGrantRequest{User: user, Role: role})
  100. return (*AuthUserGrantResponse)(resp), rpctypes.Error(err)
  101. }
  102. func (auth *auth) RoleAdd(ctx context.Context, name string) (*AuthRoleAddResponse, error) {
  103. resp, err := auth.remote.RoleAdd(ctx, &pb.AuthRoleAddRequest{Name: name})
  104. return (*AuthRoleAddResponse)(resp), rpctypes.Error(err)
  105. }
  106. func (auth *auth) RoleGrant(ctx context.Context, name string, key string, permType PermissionType) (*AuthRoleGrantResponse, error) {
  107. perm := &authpb.Permission{
  108. Key: []byte(key),
  109. PermType: authpb.Permission_Type(permType),
  110. }
  111. resp, err := auth.remote.RoleGrant(ctx, &pb.AuthRoleGrantRequest{Name: name, Perm: perm})
  112. return (*AuthRoleGrantResponse)(resp), rpctypes.Error(err)
  113. }
  114. func StrToPermissionType(s string) (PermissionType, error) {
  115. val, ok := authpb.Permission_Type_value[strings.ToUpper(s)]
  116. if ok {
  117. return PermissionType(val), nil
  118. }
  119. return PermissionType(-1), fmt.Errorf("invalid permission type: %s", s)
  120. }