package sts import ( "fmt" "github.com/seaweedfs/seaweedfs/weed/glog" "github.com/seaweedfs/seaweedfs/weed/iam/oidc" "github.com/seaweedfs/seaweedfs/weed/iam/providers" ) // ProviderFactory creates identity providers from configuration type ProviderFactory struct{} // NewProviderFactory creates a new provider factory func NewProviderFactory() *ProviderFactory { return &ProviderFactory{} } // CreateProvider creates an identity provider from configuration func (f *ProviderFactory) CreateProvider(config *ProviderConfig) (providers.IdentityProvider, error) { if config == nil { return nil, fmt.Errorf(ErrConfigCannotBeNil) } if config.Name == "" { return nil, fmt.Errorf(ErrProviderNameEmpty) } if config.Type == "" { return nil, fmt.Errorf(ErrProviderTypeEmpty) } if !config.Enabled { glog.V(2).Infof("Provider %s is disabled, skipping", config.Name) return nil, nil } glog.V(2).Infof("Creating provider: name=%s, type=%s", config.Name, config.Type) switch config.Type { case ProviderTypeOIDC: return f.createOIDCProvider(config) case ProviderTypeLDAP: return f.createLDAPProvider(config) case ProviderTypeSAML: return f.createSAMLProvider(config) default: return nil, fmt.Errorf(ErrUnsupportedProviderType, config.Type) } } // createOIDCProvider creates an OIDC provider from configuration func (f *ProviderFactory) createOIDCProvider(config *ProviderConfig) (providers.IdentityProvider, error) { oidcConfig, err := f.convertToOIDCConfig(config.Config) if err != nil { return nil, fmt.Errorf("failed to convert OIDC config: %w", err) } provider := oidc.NewOIDCProvider(config.Name) if err := provider.Initialize(oidcConfig); err != nil { return nil, fmt.Errorf("failed to initialize OIDC provider: %w", err) } return provider, nil } // createLDAPProvider creates an LDAP provider from configuration func (f *ProviderFactory) createLDAPProvider(config *ProviderConfig) (providers.IdentityProvider, error) { // TODO: Implement LDAP provider when available return nil, fmt.Errorf("LDAP provider not implemented yet") } // createSAMLProvider creates a SAML provider from configuration func (f *ProviderFactory) createSAMLProvider(config *ProviderConfig) (providers.IdentityProvider, error) { // TODO: Implement SAML provider when available return nil, fmt.Errorf("SAML provider not implemented yet") } // convertToOIDCConfig converts generic config map to OIDC config struct func (f *ProviderFactory) convertToOIDCConfig(configMap map[string]interface{}) (*oidc.OIDCConfig, error) { config := &oidc.OIDCConfig{} // Required fields if issuer, ok := configMap[ConfigFieldIssuer].(string); ok { config.Issuer = issuer } else { return nil, fmt.Errorf(ErrIssuerRequired) } if clientID, ok := configMap[ConfigFieldClientID].(string); ok { config.ClientID = clientID } else { return nil, fmt.Errorf(ErrClientIDRequired) } // Optional fields if clientSecret, ok := configMap[ConfigFieldClientSecret].(string); ok { config.ClientSecret = clientSecret } if jwksUri, ok := configMap[ConfigFieldJWKSUri].(string); ok { config.JWKSUri = jwksUri } if userInfoUri, ok := configMap[ConfigFieldUserInfoUri].(string); ok { config.UserInfoUri = userInfoUri } // Convert scopes array if scopesInterface, ok := configMap[ConfigFieldScopes]; ok { scopes, err := f.convertToStringSlice(scopesInterface) if err != nil { return nil, fmt.Errorf("failed to convert scopes: %w", err) } config.Scopes = scopes } // Convert claims mapping if claimsMapInterface, ok := configMap["claimsMapping"]; ok { claimsMap, err := f.convertToStringMap(claimsMapInterface) if err != nil { return nil, fmt.Errorf("failed to convert claimsMapping: %w", err) } config.ClaimsMapping = claimsMap } // Convert role mapping if roleMappingInterface, ok := configMap["roleMapping"]; ok { roleMapping, err := f.convertToRoleMapping(roleMappingInterface) if err != nil { return nil, fmt.Errorf("failed to convert roleMapping: %w", err) } config.RoleMapping = roleMapping } glog.V(3).Infof("Converted OIDC config: issuer=%s, clientId=%s, jwksUri=%s", config.Issuer, config.ClientID, config.JWKSUri) return config, nil } // convertToStringSlice converts interface{} to []string func (f *ProviderFactory) convertToStringSlice(value interface{}) ([]string, error) { switch v := value.(type) { case []string: return v, nil case []interface{}: result := make([]string, len(v)) for i, item := range v { if str, ok := item.(string); ok { result[i] = str } else { return nil, fmt.Errorf("non-string item in slice: %v", item) } } return result, nil default: return nil, fmt.Errorf("cannot convert %T to []string", value) } } // convertToStringMap converts interface{} to map[string]string func (f *ProviderFactory) convertToStringMap(value interface{}) (map[string]string, error) { switch v := value.(type) { case map[string]string: return v, nil case map[string]interface{}: result := make(map[string]string) for key, val := range v { if str, ok := val.(string); ok { result[key] = str } else { return nil, fmt.Errorf("non-string value for key %s: %v", key, val) } } return result, nil default: return nil, fmt.Errorf("cannot convert %T to map[string]string", value) } } // LoadProvidersFromConfig creates providers from configuration func (f *ProviderFactory) LoadProvidersFromConfig(configs []*ProviderConfig) (map[string]providers.IdentityProvider, error) { providersMap := make(map[string]providers.IdentityProvider) for _, config := range configs { if config == nil { glog.V(1).Infof("Skipping nil provider config") continue } glog.V(2).Infof("Loading provider: %s (type: %s, enabled: %t)", config.Name, config.Type, config.Enabled) if !config.Enabled { glog.V(2).Infof("Provider %s is disabled, skipping", config.Name) continue } provider, err := f.CreateProvider(config) if err != nil { glog.Errorf("Failed to create provider %s: %v", config.Name, err) return nil, fmt.Errorf("failed to create provider %s: %w", config.Name, err) } if provider != nil { providersMap[config.Name] = provider glog.V(1).Infof("Successfully loaded provider: %s", config.Name) } } glog.V(1).Infof("Loaded %d identity providers from configuration", len(providersMap)) return providersMap, nil } // convertToRoleMapping converts interface{} to *providers.RoleMapping func (f *ProviderFactory) convertToRoleMapping(value interface{}) (*providers.RoleMapping, error) { roleMappingMap, ok := value.(map[string]interface{}) if !ok { return nil, fmt.Errorf("roleMapping must be an object") } roleMapping := &providers.RoleMapping{} // Convert rules if rulesInterface, ok := roleMappingMap["rules"]; ok { rulesSlice, ok := rulesInterface.([]interface{}) if !ok { return nil, fmt.Errorf("rules must be an array") } rules := make([]providers.MappingRule, len(rulesSlice)) for i, ruleInterface := range rulesSlice { ruleMap, ok := ruleInterface.(map[string]interface{}) if !ok { return nil, fmt.Errorf("rule must be an object") } rule := providers.MappingRule{} if claim, ok := ruleMap["claim"].(string); ok { rule.Claim = claim } if value, ok := ruleMap["value"].(string); ok { rule.Value = value } if role, ok := ruleMap["role"].(string); ok { rule.Role = role } if condition, ok := ruleMap["condition"].(string); ok { rule.Condition = condition } rules[i] = rule } roleMapping.Rules = rules } // Convert default role if defaultRole, ok := roleMappingMap["defaultRole"].(string); ok { roleMapping.DefaultRole = defaultRole } return roleMapping, nil } // ValidateProviderConfig validates a provider configuration func (f *ProviderFactory) ValidateProviderConfig(config *ProviderConfig) error { if config == nil { return fmt.Errorf("provider config cannot be nil") } if config.Name == "" { return fmt.Errorf("provider name cannot be empty") } if config.Type == "" { return fmt.Errorf("provider type cannot be empty") } if config.Config == nil { return fmt.Errorf("provider config cannot be nil") } // Type-specific validation switch config.Type { case "oidc": return f.validateOIDCConfig(config.Config) case "ldap": return f.validateLDAPConfig(config.Config) case "saml": return f.validateSAMLConfig(config.Config) default: return fmt.Errorf("unsupported provider type: %s", config.Type) } } // validateOIDCConfig validates OIDC provider configuration func (f *ProviderFactory) validateOIDCConfig(config map[string]interface{}) error { if _, ok := config[ConfigFieldIssuer]; !ok { return fmt.Errorf("OIDC provider requires '%s' field", ConfigFieldIssuer) } if _, ok := config[ConfigFieldClientID]; !ok { return fmt.Errorf("OIDC provider requires '%s' field", ConfigFieldClientID) } return nil } // validateLDAPConfig validates LDAP provider configuration func (f *ProviderFactory) validateLDAPConfig(config map[string]interface{}) error { // TODO: Implement when LDAP provider is available return nil } // validateSAMLConfig validates SAML provider configuration func (f *ProviderFactory) validateSAMLConfig(config map[string]interface{}) error { // TODO: Implement when SAML provider is available return nil } // GetSupportedProviderTypes returns list of supported provider types func (f *ProviderFactory) GetSupportedProviderTypes() []string { return []string{ProviderTypeOIDC} }