| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | /* | 
					
						
							| 
									
										
										
										
											2019-04-10 02:39:42 +08:00
										 |  |  |  * MinIO Cloud Storage, (C) 2018, 2019 MinIO, Inc. | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  |  * | 
					
						
							|  |  |  |  * Licensed under the Apache License, Version 2.0 (the "License"); | 
					
						
							|  |  |  |  * you may not use this file except in compliance with the License. | 
					
						
							|  |  |  |  * You may obtain a copy of the License at | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  *     http://www.apache.org/licenses/LICENSE-2.0
 | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * Unless required by applicable law or agreed to in writing, software | 
					
						
							|  |  |  |  * distributed under the License is distributed on an "AS IS" BASIS, | 
					
						
							|  |  |  |  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
					
						
							|  |  |  |  * See the License for the specific language governing permissions and | 
					
						
							|  |  |  |  * limitations under the License. | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | package cmd | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							| 
									
										
										
										
											2019-06-21 06:28:33 +08:00
										 |  |  | 	"bytes" | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 	"context" | 
					
						
							| 
									
										
										
										
											2019-06-21 06:28:33 +08:00
										 |  |  | 	"encoding/base64" | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 	"fmt" | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 	"net/http" | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	"github.com/gorilla/mux" | 
					
						
							| 
									
										
										
										
											2019-10-23 13:59:13 +08:00
										 |  |  | 	xldap "github.com/minio/minio/cmd/config/identity/ldap" | 
					
						
							|  |  |  | 	"github.com/minio/minio/cmd/config/identity/openid" | 
					
						
							| 
									
										
										
										
											2019-07-03 13:34:32 +08:00
										 |  |  | 	xhttp "github.com/minio/minio/cmd/http" | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 	"github.com/minio/minio/cmd/logger" | 
					
						
							|  |  |  | 	"github.com/minio/minio/pkg/auth" | 
					
						
							| 
									
										
										
										
											2019-06-21 06:28:33 +08:00
										 |  |  | 	iampolicy "github.com/minio/minio/pkg/iam/policy" | 
					
						
							| 
									
										
										
										
											2019-04-24 06:55:41 +08:00
										 |  |  | 	"github.com/minio/minio/pkg/wildcard" | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 	ldap "gopkg.in/ldap.v3" | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | const ( | 
					
						
							|  |  |  | 	// STS API version.
 | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	stsAPIVersion       = "2011-06-15" | 
					
						
							|  |  |  | 	stsVersion          = "Version" | 
					
						
							|  |  |  | 	stsAction           = "Action" | 
					
						
							|  |  |  | 	stsPolicy           = "Policy" | 
					
						
							|  |  |  | 	stsToken            = "Token" | 
					
						
							|  |  |  | 	stsWebIdentityToken = "WebIdentityToken" | 
					
						
							|  |  |  | 	stsDurationSeconds  = "DurationSeconds" | 
					
						
							|  |  |  | 	stsLDAPUsername     = "LDAPUsername" | 
					
						
							|  |  |  | 	stsLDAPPassword     = "LDAPPassword" | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	// STS API action constants
 | 
					
						
							|  |  |  | 	clientGrants = "AssumeRoleWithClientGrants" | 
					
						
							|  |  |  | 	webIdentity  = "AssumeRoleWithWebIdentity" | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 	ldapIdentity = "AssumeRoleWithLDAPIdentity" | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 	assumeRole   = "AssumeRole" | 
					
						
							| 
									
										
										
										
											2019-08-06 01:06:40 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	stsRequestBodyLimit = 10 * (1 << 20) // 10 MiB
 | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	// JWT claim keys
 | 
					
						
							|  |  |  | 	expClaim = "exp" | 
					
						
							|  |  |  | 	subClaim = "sub" | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-03-18 01:36:13 +08:00
										 |  |  | 	// JWT claim to check the parent user
 | 
					
						
							|  |  |  | 	parentClaim = "parent" | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 	// LDAP claim keys
 | 
					
						
							|  |  |  | 	ldapUser   = "ldapUser" | 
					
						
							|  |  |  | 	ldapGroups = "ldapGroups" | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // stsAPIHandlers implements and provides http handlers for AWS STS API.
 | 
					
						
							|  |  |  | type stsAPIHandlers struct{} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // registerSTSRouter - registers AWS STS compatible APIs.
 | 
					
						
							|  |  |  | func registerSTSRouter(router *mux.Router) { | 
					
						
							|  |  |  | 	// Initialize STS.
 | 
					
						
							|  |  |  | 	sts := &stsAPIHandlers{} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// STS Router
 | 
					
						
							| 
									
										
										
										
											2019-08-07 03:08:58 +08:00
										 |  |  | 	stsRouter := router.NewRoute().PathPrefix(SlashSeparator).Subrouter() | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 	// Assume roles with no JWT, handles AssumeRole.
 | 
					
						
							| 
									
										
										
										
											2019-07-03 13:34:32 +08:00
										 |  |  | 	stsRouter.Methods(http.MethodPost).MatcherFunc(func(r *http.Request, rm *mux.RouteMatch) bool { | 
					
						
							|  |  |  | 		ctypeOk := wildcard.MatchSimple("application/x-www-form-urlencoded*", r.Header.Get(xhttp.ContentType)) | 
					
						
							|  |  |  | 		authOk := wildcard.MatchSimple(signV4Algorithm+"*", r.Header.Get(xhttp.Authorization)) | 
					
						
							| 
									
										
										
										
											2019-04-24 06:55:41 +08:00
										 |  |  | 		noQueries := len(r.URL.Query()) == 0 | 
					
						
							|  |  |  | 		return ctypeOk && authOk && noQueries | 
					
						
							|  |  |  | 	}).HandlerFunc(httpTraceAll(sts.AssumeRole)) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 	// Assume roles with JWT handler, handles both ClientGrants and WebIdentity.
 | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	stsRouter.Methods(http.MethodPost).MatcherFunc(func(r *http.Request, rm *mux.RouteMatch) bool { | 
					
						
							| 
									
										
										
										
											2019-07-03 13:34:32 +08:00
										 |  |  | 		ctypeOk := wildcard.MatchSimple("application/x-www-form-urlencoded*", r.Header.Get(xhttp.ContentType)) | 
					
						
							| 
									
										
										
										
											2019-04-24 06:55:41 +08:00
										 |  |  | 		noQueries := len(r.URL.Query()) == 0 | 
					
						
							|  |  |  | 		return ctypeOk && noQueries | 
					
						
							|  |  |  | 	}).HandlerFunc(httpTraceAll(sts.AssumeRoleWithJWT)) | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 	// AssumeRoleWithClientGrants
 | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	stsRouter.Methods(http.MethodPost).HandlerFunc(httpTraceAll(sts.AssumeRoleWithClientGrants)). | 
					
						
							|  |  |  | 		Queries(stsAction, clientGrants). | 
					
						
							|  |  |  | 		Queries(stsVersion, stsAPIVersion). | 
					
						
							|  |  |  | 		Queries(stsToken, "{Token:.*}") | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-01-05 05:48:12 +08:00
										 |  |  | 	// AssumeRoleWithWebIdentity
 | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	stsRouter.Methods(http.MethodPost).HandlerFunc(httpTraceAll(sts.AssumeRoleWithWebIdentity)). | 
					
						
							|  |  |  | 		Queries(stsAction, webIdentity). | 
					
						
							|  |  |  | 		Queries(stsVersion, stsAPIVersion). | 
					
						
							|  |  |  | 		Queries(stsWebIdentityToken, "{Token:.*}") | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 	// AssumeRoleWithLDAPIdentity
 | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	stsRouter.Methods(http.MethodPost).HandlerFunc(httpTraceAll(sts.AssumeRoleWithLDAPIdentity)). | 
					
						
							|  |  |  | 		Queries(stsAction, ldapIdentity). | 
					
						
							|  |  |  | 		Queries(stsVersion, stsAPIVersion). | 
					
						
							|  |  |  | 		Queries(stsLDAPUsername, "{LDAPUsername:.*}"). | 
					
						
							|  |  |  | 		Queries(stsLDAPPassword, "{LDAPPassword:.*}") | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | func checkAssumeRoleAuth(ctx context.Context, r *http.Request) (user auth.Credentials, stsErr STSErrorCode) { | 
					
						
							|  |  |  | 	switch getRequestAuthType(r) { | 
					
						
							|  |  |  | 	default: | 
					
						
							|  |  |  | 		return user, ErrSTSAccessDenied | 
					
						
							|  |  |  | 	case authTypeSigned: | 
					
						
							| 
									
										
										
										
											2019-10-23 13:59:13 +08:00
										 |  |  | 		s3Err := isReqAuthenticated(ctx, r, globalServerRegion, serviceSTS) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		if STSErrorCode(s3Err) != ErrSTSNone { | 
					
						
							| 
									
										
										
										
											2020-02-27 04:26:47 +08:00
										 |  |  | 			if s3Err == ErrInvalidAccessKeyID { | 
					
						
							|  |  |  | 				return user, ErrSTSInvalidAccessKey | 
					
						
							|  |  |  | 			} | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 			return user, STSErrorCode(s3Err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		var owner bool | 
					
						
							| 
									
										
										
										
											2019-10-23 13:59:13 +08:00
										 |  |  | 		user, owner, s3Err = getReqAccessKeyV4(r, globalServerRegion, serviceSTS) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		if STSErrorCode(s3Err) != ErrSTSNone { | 
					
						
							| 
									
										
										
										
											2020-02-27 04:26:47 +08:00
										 |  |  | 			if s3Err == ErrInvalidAccessKeyID { | 
					
						
							|  |  |  | 				return user, ErrSTSInvalidAccessKey | 
					
						
							|  |  |  | 			} | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 			return user, STSErrorCode(s3Err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		// Root credentials are not allowed to use STS API
 | 
					
						
							|  |  |  | 		if owner { | 
					
						
							|  |  |  | 			return user, ErrSTSAccessDenied | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Session tokens are not allowed in STS AssumeRole requests.
 | 
					
						
							|  |  |  | 	if getSessionToken(r) != "" { | 
					
						
							|  |  |  | 		return user, ErrSTSAccessDenied | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return user, ErrSTSNone | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // AssumeRole - implementation of AWS STS API AssumeRole to get temporary
 | 
					
						
							|  |  |  | // credentials for regular users on Minio.
 | 
					
						
							|  |  |  | // https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html
 | 
					
						
							|  |  |  | func (sts *stsAPIHandlers) AssumeRole(w http.ResponseWriter, r *http.Request) { | 
					
						
							|  |  |  | 	ctx := newContext(r, w, "AssumeRole") | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	user, stsErr := checkAssumeRoleAuth(ctx, r) | 
					
						
							|  |  |  | 	if stsErr != ErrSTSNone { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, stsErr, nil) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	if err := r.ParseForm(); err != nil { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, err) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	if r.Form.Get(stsVersion) != stsAPIVersion { | 
					
						
							|  |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSMissingParameter, fmt.Errorf("Invalid STS API version %s, expecting %s", r.Form.Get(stsVersion), stsAPIVersion)) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	action := r.Form.Get(stsAction) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 	switch action { | 
					
						
							|  |  |  | 	case assumeRole: | 
					
						
							|  |  |  | 	default: | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, fmt.Errorf("Unsupported action %s", action)) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ctx = newContext(r, w, action) | 
					
						
							|  |  |  | 	defer logger.AuditLog(w, r, action, nil) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	sessionPolicyStr := r.Form.Get(stsPolicy) | 
					
						
							| 
									
										
										
										
											2019-06-21 06:28:33 +08:00
										 |  |  | 	// https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html
 | 
					
						
							|  |  |  | 	// The plain text that you use for both inline and managed session
 | 
					
						
							|  |  |  | 	// policies shouldn't exceed 2048 characters.
 | 
					
						
							|  |  |  | 	if len(sessionPolicyStr) > 2048 { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, fmt.Errorf("Session policy shouldn't exceed 2048 characters")) | 
					
						
							| 
									
										
										
										
											2019-06-21 06:28:33 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if len(sessionPolicyStr) > 0 { | 
					
						
							|  |  |  | 		sessionPolicy, err := iampolicy.ParseConfig(bytes.NewReader([]byte(sessionPolicyStr))) | 
					
						
							|  |  |  | 		if err != nil { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 			writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, err) | 
					
						
							| 
									
										
										
										
											2019-06-21 06:28:33 +08:00
										 |  |  | 			return | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// Version in policy must not be empty
 | 
					
						
							|  |  |  | 		if sessionPolicy.Version == "" { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 			writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, fmt.Errorf("Version cannot be empty expecting '2012-10-17'")) | 
					
						
							| 
									
										
										
										
											2019-06-21 06:28:33 +08:00
										 |  |  | 			return | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 	var err error | 
					
						
							|  |  |  | 	m := make(map[string]interface{}) | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	m[expClaim], err = openid.GetDefaultExpiration(r.Form.Get(stsDurationSeconds)) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, err) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-08-03 05:25:00 +08:00
										 |  |  | 	policies, err := globalIAMSys.PolicyDBGet(user.AccessKey, false) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, err) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-08-03 05:25:00 +08:00
										 |  |  | 	policyName := "" | 
					
						
							|  |  |  | 	if len(policies) > 0 { | 
					
						
							|  |  |  | 		policyName = policies[0] | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 	// This policy is the policy associated with the user
 | 
					
						
							|  |  |  | 	// requesting for temporary credentials. The temporary
 | 
					
						
							|  |  |  | 	// credentials will inherit the same policy requirements.
 | 
					
						
							| 
									
										
										
										
											2020-01-09 09:21:58 +08:00
										 |  |  | 	m[iamPolicyClaimName()] = policyName | 
					
						
							| 
									
										
										
										
											2019-06-21 06:28:33 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	if len(sessionPolicyStr) > 0 { | 
					
						
							|  |  |  | 		m[iampolicy.SessionPolicyName] = base64.StdEncoding.EncodeToString([]byte(sessionPolicyStr)) | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-10-23 13:59:13 +08:00
										 |  |  | 	secret := globalActiveCred.SecretKey | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 	cred, err := auth.GetNewCredentialsWithMetadata(m, secret) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInternalError, err) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Set the newly generated credentials.
 | 
					
						
							|  |  |  | 	if err = globalIAMSys.SetTempUser(cred.AccessKey, cred, policyName); err != nil { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInternalError, err) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-04-10 02:39:42 +08:00
										 |  |  | 	// Notify all other MinIO peers to reload temp users
 | 
					
						
							| 
									
										
										
										
											2019-06-07 08:46:22 +08:00
										 |  |  | 	for _, nerr := range globalNotificationSys.LoadUser(cred.AccessKey, true) { | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		if nerr.Err != nil { | 
					
						
							|  |  |  | 			logger.GetReqInfo(ctx).SetTags("peerAddress", nerr.Host.String()) | 
					
						
							|  |  |  | 			logger.LogIf(ctx, nerr.Err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	assumeRoleResponse := &AssumeRoleResponse{ | 
					
						
							|  |  |  | 		Result: AssumeRoleResult{ | 
					
						
							|  |  |  | 			Credentials: cred, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-07-03 13:34:32 +08:00
										 |  |  | 	assumeRoleResponse.ResponseMetadata.RequestID = w.Header().Get(xhttp.AmzRequestID) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 	writeSuccessResponseXML(w, encodeResponse(assumeRoleResponse)) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | func (sts *stsAPIHandlers) AssumeRoleWithJWT(w http.ResponseWriter, r *http.Request) { | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 	ctx := newContext(r, w, "AssumeRoleJWTCommon") | 
					
						
							| 
									
										
										
										
											2019-01-05 05:48:12 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 	// Parse the incoming form data.
 | 
					
						
							|  |  |  | 	if err := r.ParseForm(); err != nil { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, err) | 
					
						
							| 
									
										
										
										
											2019-01-05 05:48:12 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	if r.Form.Get(stsVersion) != stsAPIVersion { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSMissingParameter, fmt.Errorf("Invalid STS API version %s, expecting %s", r.Form.Get("Version"), stsAPIVersion)) | 
					
						
							| 
									
										
										
										
											2019-01-05 05:48:12 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	action := r.Form.Get(stsAction) | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 	switch action { | 
					
						
							|  |  |  | 	case clientGrants, webIdentity: | 
					
						
							|  |  |  | 	default: | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, fmt.Errorf("Unsupported action %s", action)) | 
					
						
							| 
									
										
										
										
											2019-01-05 05:48:12 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 	ctx = newContext(r, w, action) | 
					
						
							|  |  |  | 	defer logger.AuditLog(w, r, action, nil) | 
					
						
							| 
									
										
										
										
											2018-11-22 12:03:24 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-10-05 01:35:33 +08:00
										 |  |  | 	if globalOpenIDValidators == nil { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSNotInitialized, errServerNotInitialized) | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-10-05 01:35:33 +08:00
										 |  |  | 	v, err := globalOpenIDValidators.Get("jwt") | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, err) | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	token := r.Form.Get(stsToken) | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 	if token == "" { | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 		token = r.Form.Get(stsWebIdentityToken) | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	m, err := v.Validate(token, r.Form.Get(stsDurationSeconds)) | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		switch err { | 
					
						
							| 
									
										
										
										
											2019-10-02 06:07:20 +08:00
										 |  |  | 		case openid.ErrTokenExpired: | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 			switch action { | 
					
						
							|  |  |  | 			case clientGrants: | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 				writeSTSErrorResponse(ctx, w, ErrSTSClientGrantsExpiredToken, err) | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 			case webIdentity: | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 				writeSTSErrorResponse(ctx, w, ErrSTSWebIdentityExpiredToken, err) | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 			} | 
					
						
							|  |  |  | 			return | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 		case auth.ErrInvalidDuration: | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 			writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, err) | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 			return | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 		} | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, err) | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	sessionPolicyStr := r.Form.Get(stsPolicy) | 
					
						
							| 
									
										
										
										
											2019-06-21 06:28:33 +08:00
										 |  |  | 	// https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoleWithWebIdentity.html
 | 
					
						
							|  |  |  | 	// The plain text that you use for both inline and managed session
 | 
					
						
							|  |  |  | 	// policies shouldn't exceed 2048 characters.
 | 
					
						
							|  |  |  | 	if len(sessionPolicyStr) > 2048 { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, fmt.Errorf("Session policy should not exceed 2048 characters")) | 
					
						
							| 
									
										
										
										
											2019-06-21 06:28:33 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if len(sessionPolicyStr) > 0 { | 
					
						
							|  |  |  | 		sessionPolicy, err := iampolicy.ParseConfig(bytes.NewReader([]byte(sessionPolicyStr))) | 
					
						
							|  |  |  | 		if err != nil { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 			writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, err) | 
					
						
							| 
									
										
										
										
											2019-06-21 06:28:33 +08:00
										 |  |  | 			return | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// Version in policy must not be empty
 | 
					
						
							|  |  |  | 		if sessionPolicy.Version == "" { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 			writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, fmt.Errorf("Invalid session policy version")) | 
					
						
							| 
									
										
										
										
											2019-06-21 06:28:33 +08:00
										 |  |  | 			return | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-24 06:21:16 +08:00
										 |  |  | 	if len(sessionPolicyStr) > 0 { | 
					
						
							|  |  |  | 		m[iampolicy.SessionPolicyName] = base64.StdEncoding.EncodeToString([]byte(sessionPolicyStr)) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-10-23 13:59:13 +08:00
										 |  |  | 	secret := globalActiveCred.SecretKey | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 	cred, err := auth.GetNewCredentialsWithMetadata(m, secret) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInternalError, err) | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-10-30 02:08:59 +08:00
										 |  |  | 	// JWT has requested a custom claim with policy value set.
 | 
					
						
							| 
									
										
										
										
											2019-04-10 02:39:42 +08:00
										 |  |  | 	// This is a MinIO STS API specific value, this value should
 | 
					
						
							| 
									
										
										
										
											2018-10-30 02:08:59 +08:00
										 |  |  | 	// be set and configured on your identity provider as part of
 | 
					
						
							|  |  |  | 	// JWT custom claims.
 | 
					
						
							|  |  |  | 	var policyName string | 
					
						
							| 
									
										
										
										
											2020-01-09 09:21:58 +08:00
										 |  |  | 	if v, ok := m[iamPolicyClaimName()]; ok { | 
					
						
							| 
									
										
										
										
											2018-10-30 02:08:59 +08:00
										 |  |  | 		policyName, _ = v.(string) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-01-05 05:48:12 +08:00
										 |  |  | 	var subFromToken string | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	if v, ok := m[subClaim]; ok { | 
					
						
							| 
									
										
										
										
											2019-01-05 05:48:12 +08:00
										 |  |  | 		subFromToken, _ = v.(string) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 	// Set the newly generated credentials.
 | 
					
						
							| 
									
										
										
										
											2018-10-30 02:08:59 +08:00
										 |  |  | 	if err = globalIAMSys.SetTempUser(cred.AccessKey, cred, policyName); err != nil { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInternalError, err) | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-04-10 02:39:42 +08:00
										 |  |  | 	// Notify all other MinIO peers to reload temp users
 | 
					
						
							| 
									
										
										
										
											2019-06-07 08:46:22 +08:00
										 |  |  | 	for _, nerr := range globalNotificationSys.LoadUser(cred.AccessKey, true) { | 
					
						
							| 
									
										
										
										
											2019-01-14 14:44:20 +08:00
										 |  |  | 		if nerr.Err != nil { | 
					
						
							|  |  |  | 			logger.GetReqInfo(ctx).SetTags("peerAddress", nerr.Host.String()) | 
					
						
							|  |  |  | 			logger.LogIf(ctx, nerr.Err) | 
					
						
							| 
									
										
										
										
											2019-01-05 05:48:12 +08:00
										 |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 	var encodedSuccessResponse []byte | 
					
						
							|  |  |  | 	switch action { | 
					
						
							|  |  |  | 	case clientGrants: | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		clientGrantsResponse := &AssumeRoleWithClientGrantsResponse{ | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 			Result: ClientGrantsResult{ | 
					
						
							|  |  |  | 				Credentials:      cred, | 
					
						
							|  |  |  | 				SubjectFromToken: subFromToken, | 
					
						
							|  |  |  | 			}, | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		} | 
					
						
							| 
									
										
										
										
											2019-07-03 13:34:32 +08:00
										 |  |  | 		clientGrantsResponse.ResponseMetadata.RequestID = w.Header().Get(xhttp.AmzRequestID) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		encodedSuccessResponse = encodeResponse(clientGrantsResponse) | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 	case webIdentity: | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		webIdentityResponse := &AssumeRoleWithWebIdentityResponse{ | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 			Result: WebIdentityResult{ | 
					
						
							|  |  |  | 				Credentials:                 cred, | 
					
						
							|  |  |  | 				SubjectFromWebIdentityToken: subFromToken, | 
					
						
							|  |  |  | 			}, | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		} | 
					
						
							| 
									
										
										
										
											2019-07-03 13:34:32 +08:00
										 |  |  | 		webIdentityResponse.ResponseMetadata.RequestID = w.Header().Get(xhttp.AmzRequestID) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		encodedSuccessResponse = encodeResponse(webIdentityResponse) | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	writeSuccessResponseXML(w, encodedSuccessResponse) | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2019-02-06 07:47:11 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | // AssumeRoleWithWebIdentity - implementation of AWS STS API supporting OAuth2.0
 | 
					
						
							|  |  |  | // users from web identity provider such as Facebook, Google, or any OpenID
 | 
					
						
							|  |  |  | // Connect-compatible identity provider.
 | 
					
						
							|  |  |  | //
 | 
					
						
							|  |  |  | // Eg:-
 | 
					
						
							|  |  |  | //    $ curl https://minio:9000/?Action=AssumeRoleWithWebIdentity&WebIdentityToken=<jwt>
 | 
					
						
							|  |  |  | func (sts *stsAPIHandlers) AssumeRoleWithWebIdentity(w http.ResponseWriter, r *http.Request) { | 
					
						
							|  |  |  | 	sts.AssumeRoleWithJWT(w, r) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // AssumeRoleWithClientGrants - implementation of AWS STS extension API supporting
 | 
					
						
							|  |  |  | // OAuth2.0 client credential grants.
 | 
					
						
							|  |  |  | //
 | 
					
						
							|  |  |  | // Eg:-
 | 
					
						
							|  |  |  | //    $ curl https://minio:9000/?Action=AssumeRoleWithClientGrants&Token=<jwt>
 | 
					
						
							|  |  |  | func (sts *stsAPIHandlers) AssumeRoleWithClientGrants(w http.ResponseWriter, r *http.Request) { | 
					
						
							|  |  |  | 	sts.AssumeRoleWithJWT(w, r) | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | // AssumeRoleWithLDAPIdentity - implements user auth against LDAP server
 | 
					
						
							|  |  |  | func (sts *stsAPIHandlers) AssumeRoleWithLDAPIdentity(w http.ResponseWriter, r *http.Request) { | 
					
						
							|  |  |  | 	ctx := newContext(r, w, "AssumeRoleWithLDAPIdentity") | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Parse the incoming form data.
 | 
					
						
							|  |  |  | 	if err := r.ParseForm(); err != nil { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, err) | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	if r.Form.Get(stsVersion) != stsAPIVersion { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSMissingParameter, fmt.Errorf("Invalid STS API version %s, expecting %s", r.Form.Get("Version"), stsAPIVersion)) | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	action := r.Form.Get(stsAction) | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 	switch action { | 
					
						
							|  |  |  | 	case ldapIdentity: | 
					
						
							|  |  |  | 	default: | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, fmt.Errorf("Unsupported action %s", action)) | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ctx = newContext(r, w, action) | 
					
						
							|  |  |  | 	defer logger.AuditLog(w, r, action, nil) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	ldapUsername := r.Form.Get(stsLDAPUsername) | 
					
						
							|  |  |  | 	ldapPassword := r.Form.Get(stsLDAPPassword) | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	if ldapUsername == "" || ldapPassword == "" { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSMissingParameter, fmt.Errorf("LDAPUsername and LDAPPassword cannot be empty")) | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 	sessionPolicyStr := r.Form.Get(stsPolicy) | 
					
						
							| 
									
										
										
										
											2019-09-24 06:21:16 +08:00
										 |  |  | 	// https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html
 | 
					
						
							|  |  |  | 	// The plain text that you use for both inline and managed session
 | 
					
						
							|  |  |  | 	// policies shouldn't exceed 2048 characters.
 | 
					
						
							|  |  |  | 	if len(sessionPolicyStr) > 2048 { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, fmt.Errorf("Session policy should not exceed 2048 characters")) | 
					
						
							| 
									
										
										
										
											2019-09-24 06:21:16 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if len(sessionPolicyStr) > 0 { | 
					
						
							|  |  |  | 		sessionPolicy, err := iampolicy.ParseConfig(bytes.NewReader([]byte(sessionPolicyStr))) | 
					
						
							|  |  |  | 		if err != nil { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 			writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, err) | 
					
						
							| 
									
										
										
										
											2019-09-24 06:21:16 +08:00
										 |  |  | 			return | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// Version in policy must not be empty
 | 
					
						
							|  |  |  | 		if sessionPolicy.Version == "" { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 			writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, fmt.Errorf("Version needs to be specified in session policy")) | 
					
						
							| 
									
										
										
										
											2019-09-24 06:21:16 +08:00
										 |  |  | 			return | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-10-23 13:59:13 +08:00
										 |  |  | 	ldapConn, err := globalLDAPConfig.Connect() | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2019-12-03 01:28:01 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, fmt.Errorf("LDAP server connection failure: %w", err)) | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	if ldapConn == nil { | 
					
						
							| 
									
										
										
										
											2019-12-03 01:28:01 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, fmt.Errorf("LDAP server not configured: %w", err)) | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-12-05 20:47:42 +08:00
										 |  |  | 	// Close ldap connection to avoid leaks.
 | 
					
						
							|  |  |  | 	defer ldapConn.Close() | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-10-05 01:35:33 +08:00
										 |  |  | 	usernameSubs, _ := xldap.NewSubstituter("username", ldapUsername) | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 	// We ignore error below as we already validated the username
 | 
					
						
							|  |  |  | 	// format string at startup.
 | 
					
						
							| 
									
										
										
										
											2019-10-23 13:59:13 +08:00
										 |  |  | 	usernameDN, _ := usernameSubs.Substitute(globalLDAPConfig.UsernameFormat) | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 	// Bind with user credentials to validate the password
 | 
					
						
							| 
									
										
										
										
											2019-10-23 13:59:13 +08:00
										 |  |  | 	if err = ldapConn.Bind(usernameDN, ldapPassword); err != nil { | 
					
						
							| 
									
										
										
										
											2019-12-03 01:28:01 +08:00
										 |  |  | 		err = fmt.Errorf("LDAP authentication failure: %w", err) | 
					
						
							| 
									
										
										
										
											2019-10-23 13:59:13 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, err) | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	groups := []string{} | 
					
						
							| 
									
										
										
										
											2019-10-23 13:59:13 +08:00
										 |  |  | 	if globalLDAPConfig.GroupSearchFilter != "" { | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 		// Verified user credentials. Now we find the groups they are
 | 
					
						
							|  |  |  | 		// a member of.
 | 
					
						
							| 
									
										
										
										
											2019-10-05 01:35:33 +08:00
										 |  |  | 		searchSubs, _ := xldap.NewSubstituter( | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 			"username", ldapUsername, | 
					
						
							|  |  |  | 			"usernamedn", usernameDN, | 
					
						
							|  |  |  | 		) | 
					
						
							|  |  |  | 		// We ignore error below as we already validated the search string
 | 
					
						
							|  |  |  | 		// at startup.
 | 
					
						
							| 
									
										
										
										
											2019-10-23 13:59:13 +08:00
										 |  |  | 		groupSearchFilter, _ := searchSubs.Substitute(globalLDAPConfig.GroupSearchFilter) | 
					
						
							|  |  |  | 		baseDN, _ := searchSubs.Substitute(globalLDAPConfig.GroupSearchBaseDN) | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 		searchRequest := ldap.NewSearchRequest( | 
					
						
							|  |  |  | 			baseDN, | 
					
						
							|  |  |  | 			ldap.ScopeWholeSubtree, ldap.NeverDerefAliases, 0, 0, false, | 
					
						
							|  |  |  | 			groupSearchFilter, | 
					
						
							| 
									
										
										
										
											2019-10-23 13:59:13 +08:00
										 |  |  | 			[]string{globalLDAPConfig.GroupNameAttribute}, | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 			nil, | 
					
						
							|  |  |  | 		) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		sr, err := ldapConn.Search(searchRequest) | 
					
						
							|  |  |  | 		if err != nil { | 
					
						
							| 
									
										
										
										
											2019-12-03 01:28:01 +08:00
										 |  |  | 			writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, fmt.Errorf("LDAP search failure: %w", err)) | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 			return | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		for _, entry := range sr.Entries { | 
					
						
							|  |  |  | 			// We only queried one attribute, so we only look up
 | 
					
						
							|  |  |  | 			// the first one.
 | 
					
						
							|  |  |  | 			groups = append(groups, entry.Attributes[0].Values...) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2019-10-23 13:59:13 +08:00
										 |  |  | 	expiryDur := globalLDAPConfig.GetExpiryDuration() | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 	m := map[string]interface{}{ | 
					
						
							| 
									
										
										
										
											2019-11-29 21:27:54 +08:00
										 |  |  | 		expClaim:   UTCNow().Add(expiryDur).Unix(), | 
					
						
							|  |  |  | 		ldapUser:   ldapUsername, | 
					
						
							|  |  |  | 		ldapGroups: groups, | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-24 06:21:16 +08:00
										 |  |  | 	if len(sessionPolicyStr) > 0 { | 
					
						
							|  |  |  | 		m[iampolicy.SessionPolicyName] = base64.StdEncoding.EncodeToString([]byte(sessionPolicyStr)) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-10-23 13:59:13 +08:00
										 |  |  | 	secret := globalActiveCred.SecretKey | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 	cred, err := auth.GetNewCredentialsWithMetadata(m, secret) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInternalError, err) | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	policyName := "" | 
					
						
							|  |  |  | 	// Set the newly generated credentials.
 | 
					
						
							|  |  |  | 	if err = globalIAMSys.SetTempUser(cred.AccessKey, cred, policyName); err != nil { | 
					
						
							| 
									
										
										
										
											2019-10-01 05:05:19 +08:00
										 |  |  | 		writeSTSErrorResponse(ctx, w, ErrSTSInternalError, err) | 
					
						
							| 
									
										
										
										
											2019-09-10 07:12:29 +08:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Notify all other MinIO peers to reload temp users
 | 
					
						
							|  |  |  | 	for _, nerr := range globalNotificationSys.LoadUser(cred.AccessKey, true) { | 
					
						
							|  |  |  | 		if nerr.Err != nil { | 
					
						
							|  |  |  | 			logger.GetReqInfo(ctx).SetTags("peerAddress", nerr.Host.String()) | 
					
						
							|  |  |  | 			logger.LogIf(ctx, nerr.Err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ldapIdentityResponse := &AssumeRoleWithLDAPResponse{ | 
					
						
							|  |  |  | 		Result: LDAPIdentityResult{ | 
					
						
							|  |  |  | 			Credentials: cred, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	ldapIdentityResponse.ResponseMetadata.RequestID = w.Header().Get(xhttp.AmzRequestID) | 
					
						
							|  |  |  | 	encodedSuccessResponse := encodeResponse(ldapIdentityResponse) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	writeSuccessResponseXML(w, encodedSuccessResponse) | 
					
						
							|  |  |  | } |