login_oauth.go 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188
  1. package api
  2. import (
  3. "crypto/rand"
  4. "crypto/tls"
  5. "crypto/x509"
  6. "encoding/base64"
  7. "errors"
  8. "fmt"
  9. "io/ioutil"
  10. "log"
  11. "net/http"
  12. "net/url"
  13. "golang.org/x/net/context"
  14. "golang.org/x/oauth2"
  15. "github.com/grafana/grafana/pkg/bus"
  16. "github.com/grafana/grafana/pkg/metrics"
  17. "github.com/grafana/grafana/pkg/middleware"
  18. m "github.com/grafana/grafana/pkg/models"
  19. "github.com/grafana/grafana/pkg/setting"
  20. "github.com/grafana/grafana/pkg/social"
  21. )
  22. func GenStateString() string {
  23. rnd := make([]byte, 32)
  24. rand.Read(rnd)
  25. return base64.StdEncoding.EncodeToString(rnd)
  26. }
  27. func OAuthLogin(ctx *middleware.Context) {
  28. if setting.OAuthService == nil {
  29. ctx.Handle(404, "login.OAuthLogin(oauth service not enabled)", nil)
  30. return
  31. }
  32. name := ctx.Params(":name")
  33. connect, ok := social.SocialMap[name]
  34. if !ok {
  35. ctx.Handle(404, "login.OAuthLogin(social login not enabled)", errors.New(name))
  36. return
  37. }
  38. error := ctx.Query("error")
  39. if error != "" {
  40. errorDesc := ctx.Query("error_description")
  41. ctx.Logger.Info("OAuthLogin Failed", "error", error, "errorDesc", errorDesc)
  42. ctx.Redirect(setting.AppSubUrl + "/login?failCode=1003")
  43. return
  44. }
  45. code := ctx.Query("code")
  46. if code == "" {
  47. state := GenStateString()
  48. ctx.Session.Set(middleware.SESS_KEY_OAUTH_STATE, state)
  49. if setting.OAuthService.OAuthInfos[name].HostedDomain == "" {
  50. ctx.Redirect(connect.AuthCodeURL(state, oauth2.AccessTypeOnline))
  51. } else {
  52. ctx.Redirect(connect.AuthCodeURL(state, oauth2.SetParam("hd", setting.OAuthService.OAuthInfos[name].HostedDomain), oauth2.AccessTypeOnline))
  53. }
  54. return
  55. }
  56. // verify state string
  57. savedState := ctx.Session.Get(middleware.SESS_KEY_OAUTH_STATE).(string)
  58. queryState := ctx.Query("state")
  59. if savedState != queryState {
  60. ctx.Handle(500, "login.OAuthLogin(state mismatch)", nil)
  61. return
  62. }
  63. // handle call back
  64. // initialize oauth2 context
  65. oauthCtx := oauth2.NoContext
  66. if setting.OAuthService.OAuthInfos[name].TlsClientCert != "" {
  67. cert, err := tls.LoadX509KeyPair(setting.OAuthService.OAuthInfos[name].TlsClientCert, setting.OAuthService.OAuthInfos[name].TlsClientKey)
  68. if err != nil {
  69. log.Fatal(err)
  70. }
  71. // Load CA cert
  72. caCert, err := ioutil.ReadFile(setting.OAuthService.OAuthInfos[name].TlsClientCa)
  73. if err != nil {
  74. log.Fatal(err)
  75. }
  76. caCertPool := x509.NewCertPool()
  77. caCertPool.AppendCertsFromPEM(caCert)
  78. tr := &http.Transport{
  79. TLSClientConfig: &tls.Config{
  80. InsecureSkipVerify: true,
  81. Certificates: []tls.Certificate{cert},
  82. RootCAs: caCertPool,
  83. },
  84. }
  85. sslcli := &http.Client{Transport: tr}
  86. oauthCtx = context.Background()
  87. oauthCtx = context.WithValue(oauthCtx, oauth2.HTTPClient, sslcli)
  88. }
  89. // get token from provider
  90. token, err := connect.Exchange(oauthCtx, code)
  91. if err != nil {
  92. ctx.Handle(500, "login.OAuthLogin(NewTransportWithCode)", err)
  93. return
  94. }
  95. // token.TokenType was defaulting to "bearer", which is out of spec, so we explicitly set to "Bearer"
  96. token.TokenType = "Bearer"
  97. ctx.Logger.Debug("OAuthLogin Got token")
  98. // set up oauth2 client
  99. client := connect.Client(oauthCtx, token)
  100. // get user info
  101. userInfo, err := connect.UserInfo(client)
  102. if err != nil {
  103. if err == social.ErrMissingTeamMembership {
  104. ctx.Redirect(setting.AppSubUrl + "/login?failCode=1000")
  105. } else if err == social.ErrMissingOrganizationMembership {
  106. ctx.Redirect(setting.AppSubUrl + "/login?failCode=1001")
  107. } else {
  108. ctx.Handle(500, fmt.Sprintf("login.OAuthLogin(get info from %s)", name), err)
  109. }
  110. return
  111. }
  112. ctx.Logger.Debug("OAuthLogin got user info", "userInfo", userInfo)
  113. // validate that the email is allowed to login to grafana
  114. if !connect.IsEmailAllowed(userInfo.Email) {
  115. ctx.Logger.Info("OAuth login attempt with unallowed email", "email", userInfo.Email)
  116. ctx.Redirect(setting.AppSubUrl + "/login?failCode=1002")
  117. return
  118. }
  119. userQuery := m.GetUserByEmailQuery{Email: userInfo.Email}
  120. err = bus.Dispatch(&userQuery)
  121. // create account if missing
  122. if err == m.ErrUserNotFound {
  123. if !connect.IsSignupAllowed() {
  124. ctx.Redirect(setting.AppSubUrl + "/login")
  125. return
  126. }
  127. limitReached, err := middleware.QuotaReached(ctx, "user")
  128. if err != nil {
  129. ctx.Handle(500, "Failed to get user quota", err)
  130. return
  131. }
  132. if limitReached {
  133. ctx.Redirect(setting.AppSubUrl + "/login")
  134. return
  135. }
  136. cmd := m.CreateUserCommand{
  137. Login: userInfo.Login,
  138. Email: userInfo.Email,
  139. Name: userInfo.Name,
  140. Company: userInfo.Company,
  141. DefaultOrgRole: userInfo.Role,
  142. }
  143. if err = bus.Dispatch(&cmd); err != nil {
  144. ctx.Handle(500, "Failed to create account", err)
  145. return
  146. }
  147. userQuery.Result = &cmd.Result
  148. } else if err != nil {
  149. ctx.Handle(500, "Unexpected error", err)
  150. }
  151. // login
  152. loginUserWithUser(userQuery.Result, ctx)
  153. metrics.M_Api_Login_OAuth.Inc(1)
  154. if redirectTo, _ := url.QueryUnescape(ctx.GetCookie("redirect_to")); len(redirectTo) > 0 {
  155. ctx.SetCookie("redirect_to", "", -1, setting.AppSubUrl+"/")
  156. ctx.Redirect(redirectTo)
  157. return
  158. }
  159. ctx.Redirect(setting.AppSubUrl + "/")
  160. }