2023-03-15 16:00:52 +00:00
/ * *
* Copyright ( c ) HashiCorp , Inc .
* SPDX - License - Identifier : MPL - 2.0
* /
2019-02-14 15:39:19 +00:00
import Ember from 'ember' ;
import { inject as service } from '@ember/service' ;
2022-06-02 20:40:17 +00:00
// ARG NOTE: Once you remove outer-html after glimmerizing you can remove the outer-html component
2019-02-14 15:39:19 +00:00
import Component from './outer-html' ;
import { task , timeout , waitForEvent } from 'ember-concurrency' ;
import { computed } from '@ember/object' ;
2021-12-17 03:44:29 +00:00
import { waitFor } from '@ember/test-waiters' ;
2019-02-14 15:39:19 +00:00
2021-12-17 03:44:29 +00:00
const WAIT _TIME = 500 ;
2019-02-14 15:39:19 +00:00
const ERROR _WINDOW _CLOSED =
2023-01-24 13:15:17 +00:00
'The provider window was closed before authentication was complete. Your web browser may have blocked or closed a pop-up window. Please check your settings and click Sign In to try again.' ;
2019-02-14 15:39:19 +00:00
const ERROR _MISSING _PARAMS =
'The callback from the provider did not supply all of the required parameters. Please click Sign In to try again. If the problem persists, you may want to contact your administrator.' ;
2020-05-08 23:00:28 +00:00
const ERROR _JWT _LOGIN = 'OIDC login is not configured for this mount' ;
export { ERROR _WINDOW _CLOSED , ERROR _MISSING _PARAMS , ERROR _JWT _LOGIN } ;
2019-02-14 15:39:19 +00:00
export default Component . extend ( {
store : service ( ) ,
2021-04-07 16:46:06 +00:00
featureFlagService : service ( 'featureFlag' ) ,
2022-10-26 21:34:43 +00:00
2019-02-14 15:39:19 +00:00
selectedAuthPath : null ,
2019-03-05 16:03:54 +00:00
selectedAuthType : null ,
2019-02-14 15:39:19 +00:00
roleName : null ,
role : null ,
2020-05-08 23:00:28 +00:00
errorMessage : null ,
2019-02-14 15:39:19 +00:00
onRoleName ( ) { } ,
onLoading ( ) { } ,
onError ( ) { } ,
onNamespace ( ) { } ,
didReceiveAttrs ( ) {
2021-12-17 03:44:29 +00:00
this . _super ( ) ;
2022-10-26 21:34:43 +00:00
const debounce = ! this . oldSelectedAuthPath && ! this . selectedAuthPath ;
if ( this . oldSelectedAuthPath !== this . selectedAuthPath || debounce ) {
this . fetchRole . perform ( this . roleName , { debounce } ) ;
2019-05-03 03:20:28 +00:00
}
2022-10-26 21:34:43 +00:00
2020-05-08 23:00:28 +00:00
this . set ( 'errorMessage' , null ) ;
2022-10-26 21:34:43 +00:00
this . set ( 'oldSelectedAuthPath' , this . selectedAuthPath ) ;
2019-02-14 15:39:19 +00:00
} ,
2020-05-08 23:00:28 +00:00
// Assumes authentication using OIDC until it's known that the mount is
// configured for JWT authentication via static keys, JWKS, or OIDC discovery.
2021-12-17 03:44:29 +00:00
isOIDC : computed ( 'errorMessage' , function ( ) {
2020-05-08 23:00:28 +00:00
return this . errorMessage !== ERROR _JWT _LOGIN ;
2019-02-14 15:39:19 +00:00
} ) ,
getWindow ( ) {
return this . window || window ;
} ,
2021-12-17 03:44:29 +00:00
fetchRole : task (
waitFor ( function * ( roleName , options = { debounce : true } ) {
if ( options . debounce ) {
this . onRoleName ( roleName ) ;
// debounce
yield timeout ( Ember . testing ? 0 : WAIT _TIME ) ;
2019-02-14 15:39:19 +00:00
}
2022-11-09 23:15:31 +00:00
const path = this . selectedAuthPath || this . selectedAuthType ;
const id = JSON . stringify ( [ path , roleName ] ) ;
2021-12-17 03:44:29 +00:00
let role = null ;
try {
role = yield this . store . findRecord ( 'role-jwt' , id , { adapterOptions : { namespace : this . namespace } } ) ;
} catch ( e ) {
// throwing here causes failures in tests
if ( ( ! e . httpStatus || e . httpStatus !== 400 ) && ! Ember . testing ) {
throw e ;
}
if ( e . errors && e . errors . length > 0 ) {
this . set ( 'errorMessage' , e . errors [ 0 ] ) ;
}
2020-05-08 23:00:28 +00:00
}
2021-12-17 03:44:29 +00:00
this . set ( 'role' , role ) ;
} )
) . restartable ( ) ,
2019-02-14 15:39:19 +00:00
2023-02-08 20:32:57 +00:00
cancelLogin ( oidcWindow , errorMessage ) {
this . closeWindow ( oidcWindow ) ;
this . handleOIDCError ( errorMessage ) ;
} ,
closeWindow ( oidcWindow ) {
this . watchPopup . cancelAll ( ) ;
this . watchCurrent . cancelAll ( ) ;
oidcWindow . close ( ) ;
} ,
2019-02-14 15:39:19 +00:00
handleOIDCError ( err ) {
this . onLoading ( false ) ;
this . prepareForOIDC . cancelAll ( ) ;
this . onError ( err ) ;
} ,
2021-12-17 03:44:29 +00:00
prepareForOIDC : task ( function * ( oidcWindow ) {
2021-06-17 20:56:04 +00:00
const thisWindow = this . getWindow ( ) ;
2019-02-14 15:39:19 +00:00
// show the loading animation in the parent
this . onLoading ( true ) ;
// start watching the popup window and the current one
this . watchPopup . perform ( oidcWindow ) ;
this . watchCurrent . perform ( oidcWindow ) ;
2021-11-15 15:48:11 +00:00
// wait for message posted from oidc callback
// see issue https://github.com/hashicorp/vault/issues/12436
// ensure that postMessage event is from expected source
while ( true ) {
const event = yield waitForEvent ( thisWindow , 'message' ) ;
2023-03-07 16:23:45 +00:00
if ( event . origin === thisWindow . origin && event . isTrusted && event . data . source === 'oidc-callback' ) {
2021-11-15 15:48:11 +00:00
return this . exchangeOIDC . perform ( event . data , oidcWindow ) ;
}
// continue to wait for the correct message
2021-06-17 20:56:04 +00:00
}
2019-02-14 15:39:19 +00:00
} ) ,
2021-12-17 03:44:29 +00:00
watchPopup : task ( function * ( oidcWindow ) {
2019-02-14 15:39:19 +00:00
while ( true ) {
yield timeout ( WAIT _TIME ) ;
if ( ! oidcWindow || oidcWindow . closed ) {
return this . handleOIDCError ( ERROR _WINDOW _CLOSED ) ;
}
}
} ) ,
2021-12-17 03:44:29 +00:00
watchCurrent : task ( function * ( oidcWindow ) {
2021-06-17 20:56:04 +00:00
// when user is about to change pages, close the popup window
2019-02-14 15:39:19 +00:00
yield waitForEvent ( this . getWindow ( ) , 'beforeunload' ) ;
oidcWindow . close ( ) ;
} ) ,
2021-12-17 03:44:29 +00:00
exchangeOIDC : task ( function * ( oidcState , oidcWindow ) {
2020-01-15 21:27:12 +00:00
if ( oidcState === null || oidcState === undefined ) {
2019-02-14 15:39:19 +00:00
return ;
}
this . onLoading ( true ) ;
2021-06-17 20:56:04 +00:00
let { namespace , path , state , code } = oidcState ;
2019-02-14 15:39:19 +00:00
2023-03-21 13:51:15 +00:00
// The namespace can be either be passed as a query parameter, or be embedded
2020-10-26 22:17:21 +00:00
// in the state param in the format `<state_id>,ns=<namespace>`. So if
// `namespace` is empty, check for namespace in state as well.
2021-04-07 16:46:06 +00:00
if ( namespace === '' || this . featureFlagService . managedNamespaceRoot ) {
2022-11-09 23:15:31 +00:00
const i = state . indexOf ( ',ns=' ) ;
2020-10-26 22:17:21 +00:00
if ( i >= 0 ) {
// ",ns=" is 4 characters
namespace = state . substring ( i + 4 ) ;
state = state . substring ( 0 , i ) ;
}
}
2019-02-14 15:39:19 +00:00
if ( ! path || ! state || ! code ) {
2023-02-08 20:32:57 +00:00
return this . cancelLogin ( oidcWindow , ERROR _MISSING _PARAMS ) ;
2019-02-14 15:39:19 +00:00
}
2022-11-09 23:15:31 +00:00
const adapter = this . store . adapterFor ( 'auth-method' ) ;
2019-02-14 15:39:19 +00:00
this . onNamespace ( namespace ) ;
let resp ;
// do the OIDC exchange, set the token on the parent component
// and submit auth form
try {
resp = yield adapter . exchangeOIDC ( path , state , code ) ;
2023-02-08 20:32:57 +00:00
this . closeWindow ( oidcWindow ) ;
2019-02-14 15:39:19 +00:00
} catch ( e ) {
2023-02-08 20:32:57 +00:00
// If there was an error on Vault's end, close the popup
// and show the error on the login screen
return this . cancelLogin ( oidcWindow , e ) ;
2019-02-14 15:39:19 +00:00
}
2022-10-26 21:34:43 +00:00
yield this . onSubmit ( null , null , resp . auth . client _token ) ;
2019-02-14 15:39:19 +00:00
} ) ,
actions : {
async startOIDCAuth ( data , e ) {
this . onError ( null ) ;
if ( e && e . preventDefault ) {
e . preventDefault ( ) ;
}
2023-03-21 13:51:15 +00:00
try {
await this . fetchRole . perform ( this . roleName , { debounce : false } ) ;
} catch ( error ) {
// this task could be cancelled if the instances in didReceiveAttrs resolve after this was started
if ( error ? . name !== 'TaskCancelation' ) {
throw error ;
}
}
2020-05-08 23:00:28 +00:00
if ( ! this . isOIDC || ! this . role || ! this . role . authUrl ) {
2022-10-26 21:34:43 +00:00
let message = this . errorMessage ;
if ( ! this . role ) {
message = 'Invalid role. Please try again.' ;
} else if ( ! this . role . authUrl ) {
message =
'Missing auth_url. Please check that allowed_redirect_uris for the role include this mount path.' ;
}
this . onError ( message ) ;
2019-02-14 15:39:19 +00:00
return ;
}
2022-11-09 23:15:31 +00:00
const win = this . getWindow ( ) ;
2019-02-14 15:39:19 +00:00
const POPUP _WIDTH = 500 ;
const POPUP _HEIGHT = 600 ;
2022-11-09 23:15:31 +00:00
const left = win . screen . width / 2 - POPUP _WIDTH / 2 ;
const top = win . screen . height / 2 - POPUP _HEIGHT / 2 ;
const oidcWindow = win . open (
2019-02-14 15:39:19 +00:00
this . role . authUrl ,
'vaultOIDCWindow' ,
2019-02-21 22:21:23 +00:00
` width= ${ POPUP _WIDTH } ,height= ${ POPUP _HEIGHT } ,resizable,scrollbars=yes,top= ${ top } ,left= ${ left } `
2019-02-14 15:39:19 +00:00
) ;
this . prepareForOIDC . perform ( oidcWindow ) ;
} ,
} ,
} ) ;