0
0
mirror of https://github.com/bpg/terraform-provider-proxmox.git synced 2025-07-10 15:55:01 +00:00
terraform-provider-proxmox/proxmox/api/authentication.go
Pavel Boldyrev 1f006aa82b
feat: API client cleanup and refactoring (#323)
* cleanup 1

* continue refactoring

* more refactoring

* move VMs under nodes

* move container and other apis under nodes

* cleanups

* enabled revive.exported linter & add comments to exported stuff

* enable godot linter

* enable wsl linter

* enable thelper linter

* enable govet linter

* cleanup after rebase

* cleanup after rebase

* extract SSH ops into a separate interface

* fix linter error

* move ssh code to its own package

* cleaning up VirtualEnvironmentClient receivers

* on the finish line

* not sure what else I forgot... 🤔

* fix ssh connection and upload

* renaming client interfaces

* final cleanups
2023-05-26 01:32:51 +00:00

120 lines
2.9 KiB
Go

/*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at https://mozilla.org/MPL/2.0/.
*/
package api
import (
"bytes"
"context"
"encoding/json"
"errors"
"fmt"
"net/http"
"net/url"
"github.com/hashicorp/terraform-plugin-log/tflog"
"github.com/bpg/terraform-provider-proxmox/utils"
)
// Authenticate authenticates against the specified endpoint.
func (c *client) Authenticate(ctx context.Context, reset bool) error {
if c.authenticationData != nil && !reset {
return nil
}
var reqBody *bytes.Buffer
if c.otp != nil {
reqBody = bytes.NewBufferString(fmt.Sprintf(
"username=%s&password=%s&otp=%s",
url.QueryEscape(c.username),
url.QueryEscape(c.password),
url.QueryEscape(*c.otp),
))
} else {
reqBody = bytes.NewBufferString(fmt.Sprintf(
"username=%s&password=%s",
url.QueryEscape(c.username),
url.QueryEscape(c.password),
))
}
req, err := http.NewRequestWithContext(
ctx,
http.MethodPost,
fmt.Sprintf("%s/%s/access/ticket", c.endpoint, basePathJSONAPI),
reqBody,
)
if err != nil {
return errors.New("failed to create authentication request")
}
req.Header.Add("Content-Type", "application/x-www-form-urlencoded")
tflog.Debug(ctx, "sending authentication request", map[string]interface{}{
"path": req.URL.Path,
})
res, err := c.httpClient.Do(req)
if err != nil {
return fmt.Errorf("failed to retrieve authentication response: %w", err)
}
defer utils.CloseOrLogError(ctx)(res.Body)
err = c.validateResponseCode(res)
if err != nil {
return fmt.Errorf("failed to authenticate: %w", err)
}
resBody := AuthenticationResponseBody{}
err = json.NewDecoder(res.Body).Decode(&resBody)
if err != nil {
return fmt.Errorf("failed to decode authentication response, %w", err)
}
if resBody.Data == nil {
return errors.New("the server did not include a data object in the authentication response")
}
if resBody.Data.CSRFPreventionToken == nil {
return errors.New(
"the server did not include a CSRF prevention token in the authentication response",
)
}
if resBody.Data.Ticket == nil {
return errors.New("the server did not include a ticket in the authentication response")
}
if resBody.Data.Username == "" {
return errors.New("the server did not include the username in the authentication response")
}
c.authenticationData = resBody.Data
return nil
}
// AuthenticateRequest adds authentication data to a new request.
func (c *client) AuthenticateRequest(ctx context.Context, req *http.Request) error {
err := c.Authenticate(ctx, false)
if err != nil {
return fmt.Errorf("failed to authenticate: %w", err)
}
req.AddCookie(&http.Cookie{
Name: "PVEAuthCookie",
Value: *c.authenticationData.Ticket,
})
if req.Method != http.MethodGet {
req.Header.Add("CSRFPreventionToken", *c.authenticationData.CSRFPreventionToken)
}
return nil
}