oauth2.go 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283
  1. package oauth2
  2. import (
  3. "encoding/json"
  4. "log"
  5. "net/http"
  6. "strconv"
  7. "time"
  8. "golang.org/x/oauth2"
  9. auth "imuslab.com/arozos/mod/auth"
  10. syncdb "imuslab.com/arozos/mod/auth/oauth2/syncdb"
  11. reg "imuslab.com/arozos/mod/auth/register"
  12. db "imuslab.com/arozos/mod/database"
  13. )
  14. type OauthHandler struct {
  15. googleOauthConfig *oauth2.Config
  16. syncDb *syncdb.SyncDB
  17. oauthStateString string
  18. DefaultUserGroup string
  19. ag *auth.AuthAgent
  20. reg *reg.RegisterHandler
  21. coredb *db.Database
  22. config *Config
  23. }
  24. type Config struct {
  25. Enabled bool `json:"enabled"`
  26. IDP string `json:"idp"`
  27. RedirectURL string `json:"redirect_url"`
  28. ClientID string `json:"client_id"`
  29. ClientSecret string `json:"client_secret"`
  30. DefaultUserGroup string `json:"default_user_group"`
  31. }
  32. //NewOauthHandler xxx
  33. func NewOauthHandler(authAgent *auth.AuthAgent, register *reg.RegisterHandler, coreDb *db.Database) *OauthHandler {
  34. err := coreDb.NewTable("oauth")
  35. if err != nil {
  36. log.Println("Failed to create oauth database. Terminating.")
  37. panic(err)
  38. }
  39. NewlyCreatedOauthHandler := OauthHandler{
  40. googleOauthConfig: &oauth2.Config{
  41. RedirectURL: readSingleConfig("redirecturl", coreDb) + "/system/auth/oauth/authorize",
  42. ClientID: readSingleConfig("clientid", coreDb),
  43. ClientSecret: readSingleConfig("clientsecret", coreDb),
  44. Scopes: getScope(coreDb),
  45. Endpoint: getEndpoint(coreDb),
  46. },
  47. DefaultUserGroup: readSingleConfig("defaultusergroup", coreDb),
  48. ag: authAgent,
  49. syncDb: syncdb.NewSyncDB(),
  50. reg: register,
  51. coredb: coreDb,
  52. }
  53. return &NewlyCreatedOauthHandler
  54. }
  55. //HandleOauthLogin xxx
  56. func (oh *OauthHandler) HandleLogin(w http.ResponseWriter, r *http.Request) {
  57. //add cookies
  58. redirect, err := mv(r, "redirect", false)
  59. //store the redirect url to the sync map
  60. uuid := ""
  61. if err != nil {
  62. uuid = oh.syncDb.Store("/")
  63. } else {
  64. uuid = oh.syncDb.Store(redirect)
  65. }
  66. //store the key to client
  67. oh.addCookie(w, "uuid_login", uuid, 30*time.Minute)
  68. //handle redirect
  69. url := oh.googleOauthConfig.AuthCodeURL(uuid)
  70. http.Redirect(w, r, url, http.StatusTemporaryRedirect)
  71. }
  72. //OauthAuthorize xxx
  73. func (oh *OauthHandler) HandleAuthorize(w http.ResponseWriter, r *http.Request) {
  74. //read the uuid(aka the state parameter)
  75. uuid, err := r.Cookie("uuid_login")
  76. if err != nil {
  77. sendTextResponse(w, "Invalid redirect URI.")
  78. return
  79. }
  80. state, err := mv(r, "state", true)
  81. if state != uuid.Value {
  82. sendTextResponse(w, "Invalid oauth state.")
  83. return
  84. }
  85. if err != nil {
  86. sendTextResponse(w, "Invalid state parameter.")
  87. return
  88. }
  89. code, err := mv(r, "code", true)
  90. if err != nil {
  91. sendTextResponse(w, "Invalid state parameter.")
  92. return
  93. }
  94. //exchange the infromation to get code
  95. token, err := oh.googleOauthConfig.Exchange(oauth2.NoContext, code)
  96. if err != nil {
  97. sendTextResponse(w, "Code exchange failed.")
  98. return
  99. }
  100. //get user info
  101. username, err := getUserInfo(token.AccessToken, oh.coredb)
  102. if err != nil {
  103. oh.ag.Logger.LogAuth(r, false)
  104. sendTextResponse(w, "Failed to obtain user info.")
  105. return
  106. }
  107. r.Form.Add("username", username) // to address Tobychui's log auth function
  108. if !oh.ag.UserExists(username) {
  109. //register user if not already exists
  110. //if registration is closed, return error message.
  111. //also makr the login as fail.
  112. if oh.reg.AllowRegistry {
  113. oh.ag.Logger.LogAuth(r, false)
  114. http.Redirect(w, r, "/public/register/register.system?user="+username, 302)
  115. } else {
  116. oh.ag.Logger.LogAuth(r, false)
  117. sendHTMLResponse(w, "You are not allowed to register in this system.&nbsp;<a href=\"/\">Back</a>")
  118. }
  119. } else {
  120. log.Println(username + " logged in via OAuth.")
  121. oh.ag.LoginUserByRequest(w, r, username, true)
  122. oh.ag.Logger.LogAuth(r, true)
  123. //clear the cooke
  124. oh.addCookie(w, "uuid_login", "-invaild-", -1)
  125. //read the value from db and delete it from db
  126. url := oh.syncDb.Read(uuid.Value)
  127. oh.syncDb.Delete(uuid.Value)
  128. //redirect to the desired page
  129. http.Redirect(w, r, url, 302)
  130. }
  131. }
  132. //CheckOAuth check if oauth is enabled
  133. func (oh *OauthHandler) CheckOAuth(w http.ResponseWriter, r *http.Request) {
  134. enabled := oh.readSingleConfig("enabled")
  135. if enabled == "" {
  136. enabled = "false"
  137. }
  138. sendJSONResponse(w, enabled)
  139. }
  140. //https://golangcode.com/add-a-http-cookie/
  141. func (oh *OauthHandler) addCookie(w http.ResponseWriter, name, value string, ttl time.Duration) {
  142. expire := time.Now().Add(ttl)
  143. cookie := http.Cookie{
  144. Name: name,
  145. Value: value,
  146. Expires: expire,
  147. }
  148. http.SetCookie(w, &cookie)
  149. }
  150. func (oh *OauthHandler) ReadConfig(w http.ResponseWriter, r *http.Request) {
  151. enabled, err := strconv.ParseBool(oh.readSingleConfig("enabled"))
  152. if err != nil {
  153. sendTextResponse(w, "Invalid config value [key=enabled].")
  154. return
  155. }
  156. idp := oh.readSingleConfig("idp")
  157. redirecturl := oh.readSingleConfig("redirecturl")
  158. clientid := oh.readSingleConfig("clientid")
  159. clientsecret := oh.readSingleConfig("clientsecret")
  160. defaultusergroup := oh.readSingleConfig("defaultusergroup")
  161. config, err := json.Marshal(Config{
  162. Enabled: enabled,
  163. IDP: idp,
  164. RedirectURL: redirecturl,
  165. ClientID: clientid,
  166. ClientSecret: clientsecret,
  167. DefaultUserGroup: defaultusergroup,
  168. })
  169. if err != nil {
  170. empty, err := json.Marshal(Config{})
  171. if err != nil {
  172. sendErrorResponse(w, "Error while marshalling config")
  173. }
  174. sendJSONResponse(w, string(empty))
  175. }
  176. sendJSONResponse(w, string(config))
  177. }
  178. func (oh *OauthHandler) WriteConfig(w http.ResponseWriter, r *http.Request) {
  179. enabled, err := mv(r, "enabled", true)
  180. if err != nil {
  181. sendErrorResponse(w, "enabled field can't be empty'")
  182. return
  183. }
  184. oh.coredb.Write("oauth", "enabled", enabled)
  185. showError := true
  186. if enabled != "true" {
  187. showError = false
  188. }
  189. idp, err := mv(r, "idp", true)
  190. if err != nil {
  191. if showError {
  192. sendErrorResponse(w, "idp field can't be empty'")
  193. return
  194. }
  195. }
  196. redirecturl, err := mv(r, "redirecturl", true)
  197. if err != nil {
  198. if showError {
  199. sendErrorResponse(w, "redirecturl field can't be empty'")
  200. return
  201. }
  202. }
  203. clientid, err := mv(r, "clientid", true)
  204. if err != nil {
  205. if showError {
  206. sendErrorResponse(w, "clientid field can't be empty'")
  207. return
  208. }
  209. }
  210. clientsecret, err := mv(r, "clientsecret", true)
  211. if err != nil {
  212. if showError {
  213. sendErrorResponse(w, "clientsecret field can't be empty'")
  214. return
  215. }
  216. }
  217. defaultusergroup, err := mv(r, "defaultusergroup", true)
  218. if err != nil {
  219. if showError {
  220. sendErrorResponse(w, "defaultusergroup field can't be empty'")
  221. return
  222. }
  223. }
  224. oh.coredb.Write("oauth", "idp", idp)
  225. oh.coredb.Write("oauth", "redirecturl", redirecturl)
  226. oh.coredb.Write("oauth", "clientid", clientid)
  227. oh.coredb.Write("oauth", "clientsecret", clientsecret)
  228. oh.coredb.Write("oauth", "defaultusergroup", defaultusergroup)
  229. //update the information inside the oauth class
  230. oh.googleOauthConfig = &oauth2.Config{
  231. RedirectURL: oh.readSingleConfig("redirecturl") + "/system/auth/oauth/authorize",
  232. ClientID: oh.readSingleConfig("clientid"),
  233. ClientSecret: oh.readSingleConfig("clientsecret"),
  234. Scopes: getScope(oh.coredb),
  235. Endpoint: getEndpoint(oh.coredb),
  236. }
  237. sendOK(w)
  238. }
  239. func (oh *OauthHandler) readSingleConfig(key string) string {
  240. var value string
  241. err := oh.coredb.Read("oauth", key, &value)
  242. if err != nil {
  243. value = ""
  244. }
  245. return value
  246. }
  247. func readSingleConfig(key string, coredb *db.Database) string {
  248. var value string
  249. err := coredb.Read("oauth", key, &value)
  250. if err != nil {
  251. value = ""
  252. }
  253. return value
  254. }