Skip to content

Commit

Permalink
[plugin/auth/tokenfile]
Browse files Browse the repository at this point in the history
- allowing for variable length groups to be added to the static token file

[docs/admin/authentication]
- updating the documentation for token file
  • Loading branch information
gambol99 committed Oct 19, 2015
1 parent bd1c26c commit f02c805
Show file tree
Hide file tree
Showing 3 changed files with 20 additions and 1 deletion.
3 changes: 2 additions & 1 deletion docs/admin/authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,8 @@ to apiserver. Currently, tokens last indefinitely, and the token list cannot
be changed without restarting apiserver.

The token file format is implemented in `plugin/pkg/auth/authenticator/token/tokenfile/...`
and is a csv file with 3 columns: token, user name, user uid.
and is a csv file with a minimum of 3 columns: token, user name, user uid, followed by
optional group names.

When using token authentication from an http client the apiserver expects an `Authorization`
header with a value of `Bearer SOMETOKEN`.
Expand Down
5 changes: 5 additions & 0 deletions plugin/pkg/auth/authenticator/token/tokenfile/tokenfile.go
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,7 @@ func NewCSV(path string) (*TokenAuthenticator, error) {

tokens := make(map[string]*user.DefaultInfo)
reader := csv.NewReader(file)
reader.FieldsPerRecord = -1
for {
record, err := reader.Read()
if err == io.EOF {
Expand All @@ -56,6 +57,10 @@ func NewCSV(path string) (*TokenAuthenticator, error) {
UID: record[2],
}
tokens[record[0]] = obj

if len(record) > 3 {
obj.Groups = record[3:]
}
}

return &TokenAuthenticator{
Expand Down
13 changes: 13 additions & 0 deletions plugin/pkg/auth/authenticator/token/tokenfile/tokenfile_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,8 @@ func TestTokenFile(t *testing.T) {
auth, err := newWithContents(t, `
token1,user1,uid1
token2,user2,uid2
token3,user3,uid3,group1,group2
token4,user4,uid4,group2
`)
if err != nil {
t.Fatalf("unable to read tokenfile: %v", err)
Expand All @@ -52,9 +54,19 @@ token2,user2,uid2
},
{
Token: "token3",
User: &user.DefaultInfo{Name: "user3", UID: "uid3", Groups: []string{"group1", "group2"}},
Ok: true,
},
{
Token: "token4",
User: &user.DefaultInfo{Name: "user4", UID: "uid4", Groups: []string{"group2"}},
Ok: true,
},
{
Token: "token5",
},
{
Token: "token6",
},
}
for i, testCase := range testCases {
Expand All @@ -66,6 +78,7 @@ token2,user2,uid2
} else if !reflect.DeepEqual(testCase.User, user) {
t.Errorf("%d: expected user %#v, got %#v", i, testCase.User, user)
}

if testCase.Ok != ok {
t.Errorf("%d: expected auth %v, got %v", i, testCase.Ok, ok)
}
Expand Down

0 comments on commit f02c805

Please sign in to comment.