login_oauth.go 2.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108
  1. package api
  2. import (
  3. "errors"
  4. "fmt"
  5. "net/url"
  6. "golang.org/x/oauth2"
  7. "github.com/grafana/grafana/pkg/bus"
  8. "github.com/grafana/grafana/pkg/metrics"
  9. "github.com/grafana/grafana/pkg/middleware"
  10. m "github.com/grafana/grafana/pkg/models"
  11. "github.com/grafana/grafana/pkg/setting"
  12. "github.com/grafana/grafana/pkg/social"
  13. )
  14. func OAuthLogin(ctx *middleware.Context) {
  15. if setting.OAuthService == nil {
  16. ctx.Handle(404, "login.OAuthLogin(oauth service not enabled)", nil)
  17. return
  18. }
  19. name := ctx.Params(":name")
  20. connect, ok := social.SocialMap[name]
  21. if !ok {
  22. ctx.Handle(404, "login.OAuthLogin(social login not enabled)", errors.New(name))
  23. return
  24. }
  25. code := ctx.Query("code")
  26. if code == "" {
  27. ctx.Redirect(connect.AuthCodeURL("", oauth2.AccessTypeOnline))
  28. return
  29. }
  30. // handle call back
  31. token, err := connect.Exchange(oauth2.NoContext, code)
  32. if err != nil {
  33. ctx.Handle(500, "login.OAuthLogin(NewTransportWithCode)", err)
  34. return
  35. }
  36. ctx.Logger.Debug("OAuthLogin Got token")
  37. userInfo, err := connect.UserInfo(token)
  38. if err != nil {
  39. if err == social.ErrMissingTeamMembership {
  40. ctx.Redirect(setting.AppSubUrl + "/login?failedMsg=" + url.QueryEscape("Required Github team membership not fulfilled"))
  41. } else if err == social.ErrMissingOrganizationMembership {
  42. ctx.Redirect(setting.AppSubUrl + "/login?failedMsg=" + url.QueryEscape("Required Github organization membership not fulfilled"))
  43. } else {
  44. ctx.Handle(500, fmt.Sprintf("login.OAuthLogin(get info from %s)", name), err)
  45. }
  46. return
  47. }
  48. ctx.Logger.Debug("OAuthLogin got user info", "userInfo", userInfo)
  49. // validate that the email is allowed to login to grafana
  50. if !connect.IsEmailAllowed(userInfo.Email) {
  51. ctx.Logger.Info("OAuth login attempt with unallowed email", "email", userInfo.Email)
  52. ctx.Redirect(setting.AppSubUrl + "/login?failedMsg=" + url.QueryEscape("Required email domain not fulfilled"))
  53. return
  54. }
  55. userQuery := m.GetUserByLoginQuery{LoginOrEmail: userInfo.Email}
  56. err = bus.Dispatch(&userQuery)
  57. // create account if missing
  58. if err == m.ErrUserNotFound {
  59. if !connect.IsSignupAllowed() {
  60. ctx.Redirect(setting.AppSubUrl + "/login")
  61. return
  62. }
  63. limitReached, err := middleware.QuotaReached(ctx, "user")
  64. if err != nil {
  65. ctx.Handle(500, "Failed to get user quota", err)
  66. return
  67. }
  68. if limitReached {
  69. ctx.Redirect(setting.AppSubUrl + "/login")
  70. return
  71. }
  72. cmd := m.CreateUserCommand{
  73. Login: userInfo.Email,
  74. Email: userInfo.Email,
  75. Name: userInfo.Name,
  76. Company: userInfo.Company,
  77. }
  78. if err = bus.Dispatch(&cmd); err != nil {
  79. ctx.Handle(500, "Failed to create account", err)
  80. return
  81. }
  82. userQuery.Result = &cmd.Result
  83. } else if err != nil {
  84. ctx.Handle(500, "Unexpected error", err)
  85. }
  86. // login
  87. loginUserWithUser(userQuery.Result, ctx)
  88. metrics.M_Api_Login_OAuth.Inc(1)
  89. ctx.Redirect(setting.AppSubUrl + "/")
  90. }