Fixed#5461: added support for OMD sso (#5462)

This commit is contained in:
Parth Panchal 2022-06-15 15:26:13 +05:30 committed by GitHub
parent 430d32a9c6
commit 1c6046cf8e
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 47 additions and 6 deletions

View File

@ -16,7 +16,8 @@ public class Auth0AccessTokenRequestInterceptor implements RequestInterceptor {
@Override
public void apply(RequestTemplate requestTemplate) {
String requestBody =
"grant_type="+ AccessTokenResponse.GrantType.CLIENT_CREDENTIALS
"grant_type="
+ AccessTokenResponse.GrantType.CLIENT_CREDENTIALS
+ "&client_id="
+ securityConfig.getClientId()
+ "&client_secret="

View File

@ -14,25 +14,64 @@
package org.openmetadata.client.security;
import feign.RequestTemplate;
import org.openmetadata.catalog.security.client.OpenMetadataJWTClientConfig;
import org.openmetadata.catalog.services.connections.metadata.OpenMetadataServerConnection;
import org.openmetadata.client.security.interfaces.AuthenticationProvider;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
public class OpenMetadataAuthenticationProvider implements AuthenticationProvider {
private static final Logger LOG = LoggerFactory.getLogger(OpenMetadataAuthenticationProvider.class);
private final OpenMetadataJWTClientConfig securityConfig;
private String generatedAuthToken;
private Long expirationTimeMillis;
public OpenMetadataAuthenticationProvider(OpenMetadataServerConnection iConfig) {
if (!iConfig.getAuthProvider().equals(OpenMetadataServerConnection.AuthProvider.OPENMETADATA)) {
LOG.error("Required type to invoke is OpenMetadata for OpenMetadataAuthentication Provider");
throw new RuntimeException("Required type to invoke is OpenMetadata for OpenMetadataAuthentication Provider");
}
securityConfig = (OpenMetadataJWTClientConfig) iConfig.getSecurityConfig();
if (securityConfig == null) {
LOG.error("Security Config is missing, it is required");
throw new RuntimeException("Security Config is missing, it is required");
}
generatedAuthToken = "";
}
@Override
public AuthenticationProvider create(OpenMetadataServerConnection iConfig) {
return null;
return new OpenMetadataAuthenticationProvider(iConfig);
}
@Override
public String authToken() {
return null;
generatedAuthToken = securityConfig.getJwtToken();
return generatedAuthToken;
}
@Override
public String getAccessToken() {
return null;
return generatedAuthToken;
}
@Override
public void apply(RequestTemplate requestTemplate) {}
public void apply(RequestTemplate requestTemplate) {
if (requestTemplate.url().contains("version")) {
return;
}
if (requestTemplate.headers().containsKey("Authorization")) {
return;
}
// If first time, get the token
if (expirationTimeMillis == null || System.currentTimeMillis() >= expirationTimeMillis) {
this.authToken();
}
if (getAccessToken() != null) {
requestTemplate.header("Authorization", "Bearer " + getAccessToken());
}
}
}

View File

@ -19,6 +19,7 @@ import org.openmetadata.client.security.AzureAuthenticationProvider;
import org.openmetadata.client.security.GoogleAuthenticationProvider;
import org.openmetadata.client.security.NoOpAuthenticationProvider;
import org.openmetadata.client.security.OktaAuthenticationProvider;
import org.openmetadata.client.security.OpenMetadataAuthenticationProvider;
import org.openmetadata.client.security.interfaces.AuthenticationProvider;
public class AuthenticationProviderFactory {
@ -36,7 +37,7 @@ public class AuthenticationProviderFactory {
case AZURE:
return new AzureAuthenticationProvider(serverConfig);
case OPENMETADATA:
return null;
return new OpenMetadataAuthenticationProvider(serverConfig);
}
return null;
}