login_oauth.go 3.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126
  1. package api
  2. import (
  3. "errors"
  4. "fmt"
  5. "crypto/rand"
  6. "encoding/base64"
  7. "golang.org/x/oauth2"
  8. "github.com/grafana/grafana/pkg/bus"
  9. "github.com/grafana/grafana/pkg/metrics"
  10. "github.com/grafana/grafana/pkg/middleware"
  11. m "github.com/grafana/grafana/pkg/models"
  12. "github.com/grafana/grafana/pkg/setting"
  13. "github.com/grafana/grafana/pkg/social"
  14. )
  15. func GenStateString() string {
  16. rnd := make([]byte, 32)
  17. rand.Read(rnd)
  18. return base64.StdEncoding.EncodeToString(rnd)
  19. }
  20. func OAuthLogin(ctx *middleware.Context) {
  21. if setting.OAuthService == nil {
  22. ctx.Handle(404, "login.OAuthLogin(oauth service not enabled)", nil)
  23. return
  24. }
  25. name := ctx.Params(":name")
  26. connect, ok := social.SocialMap[name]
  27. if !ok {
  28. ctx.Handle(404, "login.OAuthLogin(social login not enabled)", errors.New(name))
  29. return
  30. }
  31. code := ctx.Query("code")
  32. if code == "" {
  33. state := GenStateString()
  34. ctx.Session.Set(middleware.SESS_KEY_OAUTH_STATE, state)
  35. ctx.Redirect(connect.AuthCodeURL(state, oauth2.AccessTypeOnline))
  36. return
  37. }
  38. // verify state string
  39. savedState := ctx.Session.Get(middleware.SESS_KEY_OAUTH_STATE).(string)
  40. queryState := ctx.Query("state")
  41. if savedState != queryState {
  42. ctx.Handle(500, "login.OAuthLogin(state mismatch)", nil)
  43. return
  44. }
  45. // handle call back
  46. token, err := connect.Exchange(oauth2.NoContext, code)
  47. if err != nil {
  48. ctx.Handle(500, "login.OAuthLogin(NewTransportWithCode)", err)
  49. return
  50. }
  51. ctx.Logger.Debug("OAuthLogin Got token")
  52. userInfo, err := connect.UserInfo(token)
  53. if err != nil {
  54. if err == social.ErrMissingTeamMembership {
  55. ctx.Redirect(setting.AppSubUrl + "/login?failCode=1000")
  56. } else if err == social.ErrMissingOrganizationMembership {
  57. ctx.Redirect(setting.AppSubUrl + "/login?failCode=1001")
  58. } else {
  59. ctx.Handle(500, fmt.Sprintf("login.OAuthLogin(get info from %s)", name), err)
  60. }
  61. return
  62. }
  63. ctx.Logger.Debug("OAuthLogin got user info", "userInfo", userInfo)
  64. // validate that the email is allowed to login to grafana
  65. if !connect.IsEmailAllowed(userInfo.Email) {
  66. ctx.Logger.Info("OAuth login attempt with unallowed email", "email", userInfo.Email)
  67. ctx.Redirect(setting.AppSubUrl + "/login?failCode=1002")
  68. return
  69. }
  70. userQuery := m.GetUserByLoginQuery{LoginOrEmail: userInfo.Email}
  71. err = bus.Dispatch(&userQuery)
  72. // create account if missing
  73. if err == m.ErrUserNotFound {
  74. if !connect.IsSignupAllowed() {
  75. ctx.Redirect(setting.AppSubUrl + "/login")
  76. return
  77. }
  78. limitReached, err := middleware.QuotaReached(ctx, "user")
  79. if err != nil {
  80. ctx.Handle(500, "Failed to get user quota", err)
  81. return
  82. }
  83. if limitReached {
  84. ctx.Redirect(setting.AppSubUrl + "/login")
  85. return
  86. }
  87. cmd := m.CreateUserCommand{
  88. Login: userInfo.Email,
  89. Email: userInfo.Email,
  90. Name: userInfo.Name,
  91. Company: userInfo.Company,
  92. DefaultOrgRole: userInfo.Role,
  93. }
  94. if err = bus.Dispatch(&cmd); err != nil {
  95. ctx.Handle(500, "Failed to create account", err)
  96. return
  97. }
  98. userQuery.Result = &cmd.Result
  99. } else if err != nil {
  100. ctx.Handle(500, "Unexpected error", err)
  101. }
  102. // login
  103. loginUserWithUser(userQuery.Result, ctx)
  104. metrics.M_Api_Login_OAuth.Inc(1)
  105. ctx.Redirect(setting.AppSubUrl + "/")
  106. }