Skip to content

Commit 82da6e8

Browse files
authored
Fix LevelDB yaml unmarshall error and update documentation (#389)
In order to ensure the project correctly validates authentication methods in the config file that can use a token db, this commit modifies the logic to ensure we check if all of the token methods are nil before outputting an error. Previously, if the local filesystem token db method was not nil and the other two (redis and google cloud storage) were nil, we would return an error and the config would be considered invalid. Additionally, this commit documents the correct LevelDB settings for the config file. Prior to the addition of Bcrypt hashing cost, just using `token_db` was acceptable in the configuration along with a string representing the path. Given the swap to a struct instead of a string, we need to update documentation concerning this.
1 parent 4922777 commit 82da6e8

File tree

3 files changed

+28
-13
lines changed

3 files changed

+28
-13
lines changed

auth_server/server/config.go

+6-6
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ type ServerConfig struct {
7070

7171
publicKey libtrust.PublicKey
7272
privateKey libtrust.PrivateKey
73-
sigAlg string
73+
sigAlg string
7474
}
7575

7676
type LetsEncryptConfig struct {
@@ -87,7 +87,7 @@ type TokenConfig struct {
8787

8888
publicKey libtrust.PublicKey
8989
privateKey libtrust.PrivateKey
90-
sigAlg string
90+
sigAlg string
9191
}
9292

9393
// TLSCipherSuitesValues maps CipherSuite names as strings to the actual values
@@ -193,7 +193,7 @@ func validate(c *Config) error {
193193
}
194194
gac.ClientSecret = strings.TrimSpace(string(contents))
195195
}
196-
if gac.ClientId == "" || gac.ClientSecret == "" || (gac.LevelTokenDB != nil && (gac.GCSTokenDB == nil && gac.RedisTokenDB == nil)) {
196+
if gac.ClientId == "" || gac.ClientSecret == "" || (gac.LevelTokenDB == nil && (gac.GCSTokenDB == nil && gac.RedisTokenDB == nil)) {
197197
return errors.New("google_auth.{client_id,client_secret,token_db} are required")
198198
}
199199

@@ -217,7 +217,7 @@ func validate(c *Config) error {
217217
}
218218
ghac.ClientSecret = strings.TrimSpace(string(contents))
219219
}
220-
if ghac.ClientId == "" || ghac.ClientSecret == "" || (ghac.LevelTokenDB != nil && (ghac.GCSTokenDB == nil && ghac.RedisTokenDB == nil)) {
220+
if ghac.ClientId == "" || ghac.ClientSecret == "" || (ghac.LevelTokenDB == nil && (ghac.GCSTokenDB == nil && ghac.RedisTokenDB == nil)) {
221221
return errors.New("github_auth.{client_id,client_secret,token_db} are required")
222222
}
223223

@@ -245,7 +245,7 @@ func validate(c *Config) error {
245245
}
246246
oidc.ClientSecret = strings.TrimSpace(string(contents))
247247
}
248-
if oidc.ClientId == "" || oidc.ClientSecret == "" || oidc.Issuer == "" || oidc.RedirectURL == "" || (oidc.LevelTokenDB != nil && (oidc.GCSTokenDB == nil && oidc.RedisTokenDB == nil)) {
248+
if oidc.ClientId == "" || oidc.ClientSecret == "" || oidc.Issuer == "" || oidc.RedirectURL == "" || (oidc.LevelTokenDB == nil && (oidc.GCSTokenDB == nil && oidc.RedisTokenDB == nil)) {
249249
return errors.New("oidc_auth.{issuer,redirect_url,client_id,client_secret,token_db} are required")
250250
}
251251

@@ -275,7 +275,7 @@ func validate(c *Config) error {
275275
}
276276
glab.ClientSecret = strings.TrimSpace(string(contents))
277277
}
278-
if glab.ClientId == "" || glab.ClientSecret == "" || (glab.LevelTokenDB != nil && (glab.GCSTokenDB == nil && glab.RedisTokenDB == nil)) {
278+
if glab.ClientId == "" || glab.ClientSecret == "" || (glab.LevelTokenDB == nil && (glab.GCSTokenDB == nil && glab.RedisTokenDB == nil)) {
279279
return errors.New("gitlab_auth.{client_id,client_secret,token_db} are required")
280280
}
281281

docs/auth-methods.md

+4-1
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,10 @@ github_auth:
1313
organization: "my-org-name"
1414
client_id: "..."
1515
client_secret: "..." # or client_secret_file
16-
token_db: /data/tokens.db
16+
level_token_db:
17+
path: /data/tokens.db
18+
# Optional token hash cost for bcrypt hashing
19+
# token_hash_cost: 5
1720
```
1821

1922
Then specify what teams can do via acls

examples/reference.yml

+18-6
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,10 @@ google_auth:
115115
# client_secret: "verysecret"
116116
client_secret_file: "/path/to/client_secret.txt"
117117
# Where to store server tokens. Required.
118-
token_db: "/somewhere/to/put/google_tokens.ldb"
118+
level_token_db:
119+
path: "/somewhere/to/put/google_tokens.ldb"
120+
# Optional token hash cost for bcrypt hashing
121+
# token_hash_cost: 5
119122
# How long to wait when talking to Google servers. Optional.
120123
http_timeout: 10
121124

@@ -135,8 +138,11 @@ github_auth:
135138
# want to have sensitive information checked in.
136139
# client_secret: "verysecret"
137140
client_secret_file: "/path/to/client_secret.txt"
138-
# Either token_db file for storing of server tokens.
139-
token_db: "/somewhere/to/put/github_tokens.ldb"
141+
# Either level_token_db file for storing of server tokens.
142+
level_token_db:
143+
path: "/somewhere/to/put/github_tokens.ldb"
144+
# Optional token hash cost for bcrypt hashing
145+
# token_hash_cost: 5
140146
# or google cloud storage for storing of the sensitive information,
141147
gcs_token_db:
142148
bucket: "tokenBucket"
@@ -181,7 +187,10 @@ oidc_auth:
181187
# client_secret_file: "/path/to/client_secret.txt"
182188
#
183189
# a file in which the tokens should be stored. Does not have to exist, it will be generated in this case
184-
token_db: "/path/to/tokens.ldb"
190+
level_token_db:
191+
path: "/path/to/tokens.ldb"
192+
# Optional token hash cost for bcrypt hashing
193+
# token_hash_cost: 5
185194
# --- optional ---
186195
# How long to wait when talking to the OIDC provider.
187196
http_timeout: 10
@@ -210,8 +219,11 @@ gitlab_auth:
210219
# want to have sensitive information checked in.
211220
# client_secret: "verysecret"
212221
client_secret_file: "/path/to/client_secret.txt"
213-
# Either token_db file for storing of server tokens.
214-
token_db: "/somewhere/to/put/gitlab_tokens.ldb"
222+
# Either level_token_db file for storing of server tokens.
223+
level_token_db:
224+
path: "/somewhere/to/put/gitlab_tokens.ldb"
225+
# Optional token hash cost for bcrypt hashing
226+
# token_hash_cost: 5
215227
# or google cloud storage for storing of the sensitive information,
216228
gcs_token_db:
217229
bucket: "tokenBucket"

0 commit comments

Comments
 (0)