oauth2.go 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296
  1. package oauth2
  2. import (
  3. "context"
  4. "encoding/json"
  5. "log"
  6. "net/http"
  7. "strconv"
  8. "time"
  9. "golang.org/x/oauth2"
  10. auth "imuslab.com/arozos/mod/auth"
  11. syncdb "imuslab.com/arozos/mod/auth/oauth2/syncdb"
  12. reg "imuslab.com/arozos/mod/auth/register"
  13. db "imuslab.com/arozos/mod/database"
  14. )
  15. type OauthHandler struct {
  16. googleOauthConfig *oauth2.Config
  17. syncDb *syncdb.SyncDB
  18. ag *auth.AuthAgent
  19. reg *reg.RegisterHandler
  20. coredb *db.Database
  21. }
  22. type Config struct {
  23. Enabled bool `json:"enabled"`
  24. IDP string `json:"idp"`
  25. RedirectURL string `json:"redirect_url"`
  26. ServerURL string `json:"server_url"`
  27. ClientID string `json:"client_id"`
  28. ClientSecret string `json:"client_secret"`
  29. }
  30. //NewOauthHandler xxx
  31. func NewOauthHandler(authAgent *auth.AuthAgent, register *reg.RegisterHandler, coreDb *db.Database) *OauthHandler {
  32. err := coreDb.NewTable("oauth")
  33. if err != nil {
  34. log.Println("Failed to create oauth database. Terminating.")
  35. panic(err)
  36. }
  37. NewlyCreatedOauthHandler := OauthHandler{
  38. googleOauthConfig: &oauth2.Config{
  39. RedirectURL: readSingleConfig("redirecturl", coreDb) + "/system/auth/oauth/authorize",
  40. ClientID: readSingleConfig("clientid", coreDb),
  41. ClientSecret: readSingleConfig("clientsecret", coreDb),
  42. Scopes: getScope(coreDb),
  43. Endpoint: getEndpoint(coreDb),
  44. },
  45. ag: authAgent,
  46. syncDb: syncdb.NewSyncDB(),
  47. reg: register,
  48. coredb: coreDb,
  49. }
  50. return &NewlyCreatedOauthHandler
  51. }
  52. //HandleOauthLogin xxx
  53. func (oh *OauthHandler) HandleLogin(w http.ResponseWriter, r *http.Request) {
  54. enabled := oh.readSingleConfig("enabled")
  55. if enabled == "" || enabled == "false" {
  56. sendTextResponse(w, "OAuth disabled")
  57. return
  58. }
  59. //add cookies
  60. redirect, err := mv(r, "redirect", false)
  61. //store the redirect url to the sync map
  62. uuid := ""
  63. if err != nil {
  64. uuid = oh.syncDb.Store("/")
  65. } else {
  66. uuid = oh.syncDb.Store(redirect)
  67. }
  68. //store the key to client
  69. oh.addCookie(w, "uuid_login", uuid, 30*time.Minute)
  70. //handle redirect
  71. url := oh.googleOauthConfig.AuthCodeURL(uuid)
  72. http.Redirect(w, r, url, http.StatusTemporaryRedirect)
  73. }
  74. //OauthAuthorize xxx
  75. func (oh *OauthHandler) HandleAuthorize(w http.ResponseWriter, r *http.Request) {
  76. enabled := oh.readSingleConfig("enabled")
  77. if enabled == "" || enabled == "false" {
  78. sendTextResponse(w, "OAuth disabled")
  79. return
  80. }
  81. //read the uuid(aka the state parameter)
  82. uuid, err := r.Cookie("uuid_login")
  83. if err != nil {
  84. sendTextResponse(w, "Invalid redirect URI.")
  85. return
  86. }
  87. state, err := mv(r, "state", true)
  88. if state != uuid.Value {
  89. sendTextResponse(w, "Invalid oauth state.")
  90. return
  91. }
  92. if err != nil {
  93. sendTextResponse(w, "Invalid state parameter.")
  94. return
  95. }
  96. code, err := mv(r, "code", true)
  97. if err != nil {
  98. sendTextResponse(w, "Invalid state parameter.")
  99. return
  100. }
  101. //exchange the infromation to get code
  102. token, err := oh.googleOauthConfig.Exchange(context.Background(), code)
  103. if err != nil {
  104. sendTextResponse(w, "Code exchange failed.")
  105. return
  106. }
  107. //get user info
  108. username, err := getUserInfo(token.AccessToken, oh.coredb)
  109. if err != nil {
  110. oh.ag.Logger.LogAuthByRequestInfo(username, r.RemoteAddr, time.Now().Unix(), false, "web")
  111. sendTextResponse(w, "Failed to obtain user info.")
  112. return
  113. }
  114. if !oh.ag.UserExists(username) {
  115. //register user if not already exists
  116. //if registration is closed, return error message.
  117. //also makr the login as fail.
  118. if oh.reg.AllowRegistry {
  119. oh.ag.Logger.LogAuthByRequestInfo(username, r.RemoteAddr, time.Now().Unix(), false, "web")
  120. http.Redirect(w, r, "/public/register/register.system?user="+username, http.StatusFound)
  121. } else {
  122. oh.ag.Logger.LogAuthByRequestInfo(username, r.RemoteAddr, time.Now().Unix(), false, "web")
  123. sendHTMLResponse(w, "You are not allowed to register in this system.&nbsp;<a href=\"/\">Back</a>")
  124. }
  125. } else {
  126. log.Println(username + " logged in via OAuth.")
  127. oh.ag.LoginUserByRequest(w, r, username, true)
  128. oh.ag.Logger.LogAuthByRequestInfo(username, r.RemoteAddr, time.Now().Unix(), true, "web")
  129. //clear the cooke
  130. oh.addCookie(w, "uuid_login", "-invaild-", -1)
  131. //read the value from db and delete it from db
  132. url := oh.syncDb.Read(uuid.Value)
  133. oh.syncDb.Delete(uuid.Value)
  134. //redirect to the desired page
  135. http.Redirect(w, r, url, http.StatusFound)
  136. }
  137. }
  138. //CheckOAuth check if oauth is enabled
  139. func (oh *OauthHandler) CheckOAuth(w http.ResponseWriter, r *http.Request) {
  140. enabled := oh.readSingleConfig("enabled")
  141. if enabled == "" {
  142. enabled = "false"
  143. }
  144. sendJSONResponse(w, enabled)
  145. }
  146. //https://golangcode.com/add-a-http-cookie/
  147. func (oh *OauthHandler) addCookie(w http.ResponseWriter, name, value string, ttl time.Duration) {
  148. expire := time.Now().Add(ttl)
  149. cookie := http.Cookie{
  150. Name: name,
  151. Value: value,
  152. Expires: expire,
  153. }
  154. http.SetCookie(w, &cookie)
  155. }
  156. func (oh *OauthHandler) ReadConfig(w http.ResponseWriter, r *http.Request) {
  157. enabled, err := strconv.ParseBool(oh.readSingleConfig("enabled"))
  158. if err != nil {
  159. sendTextResponse(w, "Invalid config value [key=enabled].")
  160. return
  161. }
  162. idp := oh.readSingleConfig("idp")
  163. redirecturl := oh.readSingleConfig("redirecturl")
  164. serverurl := oh.readSingleConfig("serverurl")
  165. clientid := oh.readSingleConfig("clientid")
  166. clientsecret := oh.readSingleConfig("clientsecret")
  167. config, err := json.Marshal(Config{
  168. Enabled: enabled,
  169. IDP: idp,
  170. ServerURL: serverurl,
  171. RedirectURL: redirecturl,
  172. ClientID: clientid,
  173. ClientSecret: clientsecret,
  174. })
  175. if err != nil {
  176. empty, err := json.Marshal(Config{})
  177. if err != nil {
  178. sendErrorResponse(w, "Error while marshalling config")
  179. }
  180. sendJSONResponse(w, string(empty))
  181. }
  182. sendJSONResponse(w, string(config))
  183. }
  184. func (oh *OauthHandler) WriteConfig(w http.ResponseWriter, r *http.Request) {
  185. enabled, err := mv(r, "enabled", true)
  186. if err != nil {
  187. sendErrorResponse(w, "enabled field can't be empty")
  188. return
  189. }
  190. oh.coredb.Write("oauth", "enabled", enabled)
  191. showError := true
  192. if enabled != "true" {
  193. showError = false
  194. }
  195. idp, err := mv(r, "idp", true)
  196. if err != nil {
  197. if showError {
  198. sendErrorResponse(w, "idp field can't be empty")
  199. return
  200. }
  201. }
  202. redirecturl, err := mv(r, "redirecturl", true)
  203. if err != nil {
  204. if showError {
  205. sendErrorResponse(w, "redirecturl field can't be empty")
  206. return
  207. }
  208. }
  209. serverurl, err := mv(r, "serverurl", true)
  210. if err != nil {
  211. if showError {
  212. if idp != "Gitlab" {
  213. serverurl = ""
  214. } else {
  215. sendErrorResponse(w, "serverurl field can't be empty")
  216. return
  217. }
  218. }
  219. }
  220. if idp != "Gitlab" {
  221. serverurl = ""
  222. }
  223. clientid, err := mv(r, "clientid", true)
  224. if err != nil {
  225. if showError {
  226. sendErrorResponse(w, "clientid field can't be empty")
  227. return
  228. }
  229. }
  230. clientsecret, err := mv(r, "clientsecret", true)
  231. if err != nil {
  232. if showError {
  233. sendErrorResponse(w, "clientsecret field can't be empty")
  234. return
  235. }
  236. }
  237. oh.coredb.Write("oauth", "idp", idp)
  238. oh.coredb.Write("oauth", "redirecturl", redirecturl)
  239. oh.coredb.Write("oauth", "serverurl", serverurl)
  240. oh.coredb.Write("oauth", "clientid", clientid)
  241. oh.coredb.Write("oauth", "clientsecret", clientsecret)
  242. //update the information inside the oauth class
  243. oh.googleOauthConfig = &oauth2.Config{
  244. RedirectURL: oh.readSingleConfig("redirecturl") + "/system/auth/oauth/authorize",
  245. ClientID: oh.readSingleConfig("clientid"),
  246. ClientSecret: oh.readSingleConfig("clientsecret"),
  247. Scopes: getScope(oh.coredb),
  248. Endpoint: getEndpoint(oh.coredb),
  249. }
  250. sendOK(w)
  251. }
  252. func (oh *OauthHandler) readSingleConfig(key string) string {
  253. var value string
  254. err := oh.coredb.Read("oauth", key, &value)
  255. if err != nil {
  256. value = ""
  257. }
  258. return value
  259. }
  260. func readSingleConfig(key string, coredb *db.Database) string {
  261. var value string
  262. err := coredb.Read("oauth", key, &value)
  263. if err != nil {
  264. value = ""
  265. }
  266. return value
  267. }