oauth2.go 8.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323
  1. package oauth2
  2. import (
  3. "context"
  4. "encoding/json"
  5. "log"
  6. "net/http"
  7. "strconv"
  8. "time"
  9. "golang.org/x/oauth2"
  10. auth "imuslab.com/arozos/mod/auth"
  11. syncdb "imuslab.com/arozos/mod/auth/oauth2/syncdb"
  12. reg "imuslab.com/arozos/mod/auth/register"
  13. db "imuslab.com/arozos/mod/database"
  14. )
  15. type OauthHandler struct {
  16. googleOauthConfig *oauth2.Config
  17. syncDb *syncdb.SyncDB
  18. ag *auth.AuthAgent
  19. reg *reg.RegisterHandler
  20. coredb *db.Database
  21. }
  22. type Config struct {
  23. Enabled bool `json:"enabled"`
  24. AutoRedirect bool `json:"auto_redirect"`
  25. IDP string `json:"idp"`
  26. RedirectURL string `json:"redirect_url"`
  27. ServerURL string `json:"server_url"`
  28. ClientID string `json:"client_id"`
  29. ClientSecret string `json:"client_secret"`
  30. }
  31. //NewOauthHandler xxx
  32. func NewOauthHandler(authAgent *auth.AuthAgent, register *reg.RegisterHandler, coreDb *db.Database) *OauthHandler {
  33. err := coreDb.NewTable("oauth")
  34. if err != nil {
  35. log.Println("Failed to create oauth database. Terminating.")
  36. panic(err)
  37. }
  38. NewlyCreatedOauthHandler := OauthHandler{
  39. googleOauthConfig: &oauth2.Config{
  40. RedirectURL: readSingleConfig("redirecturl", coreDb) + "/system/auth/oauth/authorize",
  41. ClientID: readSingleConfig("clientid", coreDb),
  42. ClientSecret: readSingleConfig("clientsecret", coreDb),
  43. Scopes: getScope(coreDb),
  44. Endpoint: getEndpoint(coreDb),
  45. },
  46. ag: authAgent,
  47. syncDb: syncdb.NewSyncDB(),
  48. reg: register,
  49. coredb: coreDb,
  50. }
  51. return &NewlyCreatedOauthHandler
  52. }
  53. //HandleOauthLogin xxx
  54. func (oh *OauthHandler) HandleLogin(w http.ResponseWriter, r *http.Request) {
  55. enabled := oh.readSingleConfig("enabled")
  56. if enabled == "" || enabled == "false" {
  57. sendTextResponse(w, "OAuth disabled")
  58. return
  59. }
  60. //add cookies
  61. redirect, err := mv(r, "redirect", false)
  62. //store the redirect url to the sync map
  63. uuid := ""
  64. if err != nil {
  65. uuid = oh.syncDb.Store("/")
  66. } else {
  67. uuid = oh.syncDb.Store(redirect)
  68. }
  69. //store the key to client
  70. oh.addCookie(w, "uuid_login", uuid, 30*time.Minute)
  71. //handle redirect
  72. url := oh.googleOauthConfig.AuthCodeURL(uuid)
  73. http.Redirect(w, r, url, http.StatusTemporaryRedirect)
  74. }
  75. //OauthAuthorize xxx
  76. func (oh *OauthHandler) HandleAuthorize(w http.ResponseWriter, r *http.Request) {
  77. enabled := oh.readSingleConfig("enabled")
  78. if enabled == "" || enabled == "false" {
  79. sendTextResponse(w, "OAuth disabled")
  80. return
  81. }
  82. //read the uuid(aka the state parameter)
  83. uuid, err := r.Cookie("uuid_login")
  84. if err != nil {
  85. sendTextResponse(w, "Invalid redirect URI.")
  86. return
  87. }
  88. state, err := mv(r, "state", true)
  89. if state != uuid.Value {
  90. sendTextResponse(w, "Invalid oauth state.")
  91. return
  92. }
  93. if err != nil {
  94. sendTextResponse(w, "Invalid state parameter.")
  95. return
  96. }
  97. code, err := mv(r, "code", true)
  98. if err != nil {
  99. sendTextResponse(w, "Invalid state parameter.")
  100. return
  101. }
  102. //exchange the infromation to get code
  103. token, err := oh.googleOauthConfig.Exchange(context.Background(), code)
  104. if err != nil {
  105. sendTextResponse(w, "Code exchange failed.")
  106. return
  107. }
  108. //get user info
  109. username, err := getUserInfo(token.AccessToken, oh.coredb)
  110. if err != nil {
  111. oh.ag.Logger.LogAuthByRequestInfo(username, r.RemoteAddr, time.Now().Unix(), false, "web")
  112. sendTextResponse(w, "Failed to obtain user info.")
  113. return
  114. }
  115. if !oh.ag.UserExists(username) {
  116. //register user if not already exists
  117. //if registration is closed, return error message.
  118. //also makr the login as fail.
  119. if oh.reg.AllowRegistry {
  120. oh.ag.Logger.LogAuthByRequestInfo(username, r.RemoteAddr, time.Now().Unix(), false, "web")
  121. http.Redirect(w, r, "/public/register/register.system?user="+username, http.StatusFound)
  122. } else {
  123. oh.ag.Logger.LogAuthByRequestInfo(username, r.RemoteAddr, time.Now().Unix(), false, "web")
  124. sendHTMLResponse(w, "You are not allowed to register in this system.&nbsp;<a href=\"/\">Back</a>")
  125. }
  126. } else {
  127. log.Println(username + " logged in via OAuth.")
  128. oh.ag.LoginUserByRequest(w, r, username, true)
  129. oh.ag.Logger.LogAuthByRequestInfo(username, r.RemoteAddr, time.Now().Unix(), true, "web")
  130. //clear the cooke
  131. oh.addCookie(w, "uuid_login", "-invaild-", -1)
  132. //read the value from db and delete it from db
  133. url := oh.syncDb.Read(uuid.Value)
  134. oh.syncDb.Delete(uuid.Value)
  135. //redirect to the desired page
  136. http.Redirect(w, r, url, http.StatusFound)
  137. }
  138. }
  139. //CheckOAuth check if oauth is enabled
  140. func (oh *OauthHandler) CheckOAuth(w http.ResponseWriter, r *http.Request) {
  141. enabledB := false
  142. enabled := oh.readSingleConfig("enabled")
  143. if enabled == "true" {
  144. enabledB = true
  145. }
  146. autoredirectB := false
  147. autoredirect := oh.readSingleConfig("autoredirect")
  148. if autoredirect == "true" {
  149. autoredirectB = true
  150. }
  151. type returnFormat struct {
  152. Enabled bool `json:"enabled"`
  153. AutoRedirect bool `json:"auto_redirect"`
  154. }
  155. json, err := json.Marshal(returnFormat{Enabled: enabledB, AutoRedirect: autoredirectB})
  156. if err != nil {
  157. sendErrorResponse(w, "Error occurred while marshalling JSON response")
  158. }
  159. sendJSONResponse(w, string(json))
  160. }
  161. //https://golangcode.com/add-a-http-cookie/
  162. func (oh *OauthHandler) addCookie(w http.ResponseWriter, name, value string, ttl time.Duration) {
  163. expire := time.Now().Add(ttl)
  164. cookie := http.Cookie{
  165. Name: name,
  166. Value: value,
  167. Expires: expire,
  168. }
  169. http.SetCookie(w, &cookie)
  170. }
  171. func (oh *OauthHandler) ReadConfig(w http.ResponseWriter, r *http.Request) {
  172. enabled, err := strconv.ParseBool(oh.readSingleConfig("enabled"))
  173. if err != nil {
  174. sendTextResponse(w, "Invalid config value [key=enabled].")
  175. return
  176. }
  177. autoredirect, err := strconv.ParseBool(oh.readSingleConfig("autoredirect"))
  178. if err != nil {
  179. sendTextResponse(w, "Invalid config value [key=autoredirect].")
  180. return
  181. }
  182. idp := oh.readSingleConfig("idp")
  183. redirecturl := oh.readSingleConfig("redirecturl")
  184. serverurl := oh.readSingleConfig("serverurl")
  185. clientid := oh.readSingleConfig("clientid")
  186. clientsecret := oh.readSingleConfig("clientsecret")
  187. config, err := json.Marshal(Config{
  188. Enabled: enabled,
  189. AutoRedirect: autoredirect,
  190. IDP: idp,
  191. ServerURL: serverurl,
  192. RedirectURL: redirecturl,
  193. ClientID: clientid,
  194. ClientSecret: clientsecret,
  195. })
  196. if err != nil {
  197. empty, err := json.Marshal(Config{})
  198. if err != nil {
  199. sendErrorResponse(w, "Error while marshalling config")
  200. }
  201. sendJSONResponse(w, string(empty))
  202. }
  203. sendJSONResponse(w, string(config))
  204. }
  205. func (oh *OauthHandler) WriteConfig(w http.ResponseWriter, r *http.Request) {
  206. enabled, err := mv(r, "enabled", true)
  207. if err != nil {
  208. sendErrorResponse(w, "enabled field can't be empty")
  209. return
  210. }
  211. autoredirect, err := mv(r, "autoredirect", true)
  212. if err != nil {
  213. sendErrorResponse(w, "enabled field can't be empty")
  214. return
  215. }
  216. showError := true
  217. if enabled != "true" {
  218. showError = false
  219. }
  220. idp, err := mv(r, "idp", true)
  221. if err != nil {
  222. if showError {
  223. sendErrorResponse(w, "idp field can't be empty")
  224. return
  225. }
  226. }
  227. redirecturl, err := mv(r, "redirecturl", true)
  228. if err != nil {
  229. if showError {
  230. sendErrorResponse(w, "redirecturl field can't be empty")
  231. return
  232. }
  233. }
  234. serverurl, err := mv(r, "serverurl", true)
  235. if err != nil {
  236. if showError {
  237. if idp != "Gitlab" {
  238. serverurl = ""
  239. } else {
  240. sendErrorResponse(w, "serverurl field can't be empty")
  241. return
  242. }
  243. }
  244. }
  245. if idp != "Gitlab" {
  246. serverurl = ""
  247. }
  248. clientid, err := mv(r, "clientid", true)
  249. if err != nil {
  250. if showError {
  251. sendErrorResponse(w, "clientid field can't be empty")
  252. return
  253. }
  254. }
  255. clientsecret, err := mv(r, "clientsecret", true)
  256. if err != nil {
  257. if showError {
  258. sendErrorResponse(w, "clientsecret field can't be empty")
  259. return
  260. }
  261. }
  262. oh.coredb.Write("oauth", "enabled", enabled)
  263. oh.coredb.Write("oauth", "autoredirect", autoredirect)
  264. oh.coredb.Write("oauth", "idp", idp)
  265. oh.coredb.Write("oauth", "redirecturl", redirecturl)
  266. oh.coredb.Write("oauth", "serverurl", serverurl)
  267. oh.coredb.Write("oauth", "clientid", clientid)
  268. oh.coredb.Write("oauth", "clientsecret", clientsecret)
  269. //update the information inside the oauth class
  270. oh.googleOauthConfig = &oauth2.Config{
  271. RedirectURL: oh.readSingleConfig("redirecturl") + "/system/auth/oauth/authorize",
  272. ClientID: oh.readSingleConfig("clientid"),
  273. ClientSecret: oh.readSingleConfig("clientsecret"),
  274. Scopes: getScope(oh.coredb),
  275. Endpoint: getEndpoint(oh.coredb),
  276. }
  277. sendOK(w)
  278. }
  279. func (oh *OauthHandler) readSingleConfig(key string) string {
  280. var value string
  281. err := oh.coredb.Read("oauth", key, &value)
  282. if err != nil {
  283. value = ""
  284. }
  285. return value
  286. }
  287. func readSingleConfig(key string, coredb *db.Database) string {
  288. var value string
  289. err := coredb.Read("oauth", key, &value)
  290. if err != nil {
  291. value = ""
  292. }
  293. return value
  294. }