| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216 |
- package api
- import (
- "encoding/hex"
- "net/http"
- "net/url"
- "github.com/grafana/grafana/pkg/api/dtos"
- "github.com/grafana/grafana/pkg/bus"
- "github.com/grafana/grafana/pkg/infra/log"
- "github.com/grafana/grafana/pkg/infra/metrics"
- "github.com/grafana/grafana/pkg/login"
- "github.com/grafana/grafana/pkg/middleware"
- "github.com/grafana/grafana/pkg/models"
- "github.com/grafana/grafana/pkg/setting"
- "github.com/grafana/grafana/pkg/util"
- )
- const (
- ViewIndex = "index"
- LoginErrorCookieName = "login_error"
- )
- var setIndexViewData = (*HTTPServer).setIndexViewData
- var getViewIndex = func() string {
- return ViewIndex
- }
- func (hs *HTTPServer) LoginView(c *models.ReqContext) {
- viewData, err := setIndexViewData(hs, c)
- if err != nil {
- c.Handle(500, "Failed to get settings", err)
- return
- }
- enabledOAuths := make(map[string]interface{})
- for key, oauth := range setting.OAuthService.OAuthInfos {
- enabledOAuths[key] = map[string]string{"name": oauth.Name}
- }
- viewData.Settings["oauth"] = enabledOAuths
- viewData.Settings["disableUserSignUp"] = !setting.AllowUserSignUp
- viewData.Settings["loginHint"] = setting.LoginHint
- viewData.Settings["passwordHint"] = setting.PasswordHint
- viewData.Settings["disableLoginForm"] = setting.DisableLoginForm
- viewData.Settings["samlEnabled"] = setting.IsEnterprise && hs.Cfg.SAMLEnabled
- if loginError, ok := tryGetEncryptedCookie(c, LoginErrorCookieName); ok {
- //this cookie is only set whenever an OAuth login fails
- //therefore the loginError should be passed to the view data
- //and the view should return immediately before attempting
- //to login again via OAuth and enter to a redirect loop
- deleteCookie(c, LoginErrorCookieName)
- viewData.Settings["loginError"] = loginError
- c.HTML(200, getViewIndex(), viewData)
- return
- }
- if tryOAuthAutoLogin(c) {
- return
- }
- if !c.IsSignedIn {
- c.HTML(200, ViewIndex, viewData)
- return
- }
- if redirectTo, _ := url.QueryUnescape(c.GetCookie("redirect_to")); len(redirectTo) > 0 {
- c.SetCookie("redirect_to", "", -1, setting.AppSubUrl+"/")
- c.Redirect(redirectTo)
- return
- }
- c.Redirect(setting.AppSubUrl + "/")
- }
- func tryOAuthAutoLogin(c *models.ReqContext) bool {
- if !setting.OAuthAutoLogin {
- return false
- }
- oauthInfos := setting.OAuthService.OAuthInfos
- if len(oauthInfos) != 1 {
- log.Warn("Skipping OAuth auto login because multiple OAuth providers are configured")
- return false
- }
- for key := range setting.OAuthService.OAuthInfos {
- redirectUrl := setting.AppSubUrl + "/login/" + key
- log.Info("OAuth auto login enabled. Redirecting to " + redirectUrl)
- c.Redirect(redirectUrl, 307)
- return true
- }
- return false
- }
- func (hs *HTTPServer) LoginAPIPing(c *models.ReqContext) Response {
- if c.IsSignedIn || c.IsAnonymous {
- return JSON(200, "Logged in")
- }
- return Error(401, "Unauthorized", nil)
- }
- func (hs *HTTPServer) LoginPost(c *models.ReqContext, cmd dtos.LoginCommand) Response {
- if setting.DisableLoginForm {
- return Error(401, "Login is disabled", nil)
- }
- authQuery := &models.LoginUserQuery{
- ReqContext: c,
- Username: cmd.User,
- Password: cmd.Password,
- IpAddress: c.Req.RemoteAddr,
- }
- if err := bus.Dispatch(authQuery); err != nil {
- e401 := Error(401, "Invalid username or password", err)
- if err == login.ErrInvalidCredentials || err == login.ErrTooManyLoginAttempts {
- return e401
- }
- // Do not expose disabled status,
- // just show incorrect user credentials error (see #17947)
- if err == login.ErrUserDisabled {
- hs.log.Warn("User is disabled", "user", cmd.User)
- return e401
- }
- return Error(500, "Error while trying to authenticate user", err)
- }
- user := authQuery.User
- hs.loginUserWithUser(user, c)
- result := map[string]interface{}{
- "message": "Logged in",
- }
- if redirectTo, _ := url.QueryUnescape(c.GetCookie("redirect_to")); len(redirectTo) > 0 {
- result["redirectUrl"] = redirectTo
- c.SetCookie("redirect_to", "", -1, setting.AppSubUrl+"/")
- }
- metrics.MApiLoginPost.Inc()
- return JSON(200, result)
- }
- func (hs *HTTPServer) loginUserWithUser(user *models.User, c *models.ReqContext) {
- if user == nil {
- hs.log.Error("user login with nil user")
- }
- userToken, err := hs.AuthTokenService.CreateToken(c.Req.Context(), user.Id, c.RemoteAddr(), c.Req.UserAgent())
- if err != nil {
- hs.log.Error("failed to create auth token", "error", err)
- }
- hs.log.Info("Successful Login", "User", user.Email)
- middleware.WriteSessionCookie(c, userToken.UnhashedToken, hs.Cfg.LoginMaxLifetimeDays)
- }
- func (hs *HTTPServer) Logout(c *models.ReqContext) {
- if err := hs.AuthTokenService.RevokeToken(c.Req.Context(), c.UserToken); err != nil && err != models.ErrUserTokenNotFound {
- hs.log.Error("failed to revoke auth token", "error", err)
- }
- middleware.WriteSessionCookie(c, "", -1)
- if setting.SignoutRedirectUrl != "" {
- c.Redirect(setting.SignoutRedirectUrl)
- } else {
- hs.log.Info("Successful Logout", "User", c.Email)
- c.Redirect(setting.AppSubUrl + "/login")
- }
- }
- func tryGetEncryptedCookie(ctx *models.ReqContext, cookieName string) (string, bool) {
- cookie := ctx.GetCookie(cookieName)
- if cookie == "" {
- return "", false
- }
- decoded, err := hex.DecodeString(cookie)
- if err != nil {
- return "", false
- }
- decryptedError, err := util.Decrypt(decoded, setting.SecretKey)
- return string(decryptedError), err == nil
- }
- func deleteCookie(ctx *models.ReqContext, cookieName string) {
- ctx.SetCookie(cookieName, "", -1, setting.AppSubUrl+"/")
- }
- func (hs *HTTPServer) trySetEncryptedCookie(ctx *models.ReqContext, cookieName string, value string, maxAge int) error {
- encryptedError, err := util.Encrypt([]byte(value), setting.SecretKey)
- if err != nil {
- return err
- }
- cookie := http.Cookie{
- Name: cookieName,
- MaxAge: 60,
- Value: hex.EncodeToString(encryptedError),
- HttpOnly: true,
- Path: setting.AppSubUrl + "/",
- Secure: hs.Cfg.CookieSecure,
- }
- if hs.Cfg.CookieSameSite != http.SameSiteDefaultMode {
- cookie.SameSite = hs.Cfg.CookieSameSite
- }
- http.SetCookie(ctx.Resp, &cookie)
- return nil
- }
|