login.go 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161
  1. package api
  2. import (
  3. "net/url"
  4. "github.com/grafana/grafana/pkg/api/dtos"
  5. "github.com/grafana/grafana/pkg/api/ldapauth"
  6. "github.com/grafana/grafana/pkg/auth"
  7. "github.com/grafana/grafana/pkg/bus"
  8. "github.com/grafana/grafana/pkg/log"
  9. "github.com/grafana/grafana/pkg/metrics"
  10. "github.com/grafana/grafana/pkg/middleware"
  11. m "github.com/grafana/grafana/pkg/models"
  12. "github.com/grafana/grafana/pkg/setting"
  13. "github.com/grafana/grafana/pkg/util"
  14. )
  15. const (
  16. VIEW_INDEX = "index"
  17. )
  18. func LoginView(c *middleware.Context) {
  19. if err := setIndexViewData(c); err != nil {
  20. c.Handle(500, "Failed to get settings", err)
  21. return
  22. }
  23. settings := c.Data["Settings"].(map[string]interface{})
  24. settings["googleAuthEnabled"] = setting.OAuthService.Google
  25. settings["githubAuthEnabled"] = setting.OAuthService.GitHub
  26. settings["disableUserSignUp"] = !setting.AllowUserSignUp
  27. if !tryLoginUsingRememberCookie(c) {
  28. c.HTML(200, VIEW_INDEX)
  29. return
  30. }
  31. if redirectTo, _ := url.QueryUnescape(c.GetCookie("redirect_to")); len(redirectTo) > 0 {
  32. c.SetCookie("redirect_to", "", -1, setting.AppSubUrl+"/")
  33. c.Redirect(redirectTo)
  34. return
  35. }
  36. c.Redirect(setting.AppSubUrl + "/")
  37. }
  38. func tryLoginUsingRememberCookie(c *middleware.Context) bool {
  39. // Check auto-login.
  40. uname := c.GetCookie(setting.CookieUserName)
  41. if len(uname) == 0 {
  42. return false
  43. }
  44. isSucceed := false
  45. defer func() {
  46. if !isSucceed {
  47. log.Trace("auto-login cookie cleared: %s", uname)
  48. c.SetCookie(setting.CookieUserName, "", -1, setting.AppSubUrl+"/")
  49. c.SetCookie(setting.CookieRememberName, "", -1, setting.AppSubUrl+"/")
  50. return
  51. }
  52. }()
  53. userQuery := m.GetUserByLoginQuery{LoginOrEmail: uname}
  54. if err := bus.Dispatch(&userQuery); err != nil {
  55. return false
  56. }
  57. user := userQuery.Result
  58. // validate remember me cookie
  59. if val, _ := c.GetSuperSecureCookie(
  60. util.EncodeMd5(user.Rands+user.Password), setting.CookieRememberName); val != user.Login {
  61. return false
  62. }
  63. isSucceed = true
  64. loginUserWithUser(user, c)
  65. return true
  66. }
  67. func LoginApiPing(c *middleware.Context) {
  68. if !tryLoginUsingRememberCookie(c) {
  69. c.JsonApiErr(401, "Unauthorized", nil)
  70. return
  71. }
  72. c.JsonOK("Logged in")
  73. }
  74. func LoginPost(c *middleware.Context, cmd dtos.LoginCommand) Response {
  75. sourcesQuery := auth.GetAuthSourcesQuery{}
  76. if err := bus.Dispatch(&sourcesQuery); err != nil {
  77. return ApiError(500, "Could not get login sources", err)
  78. }
  79. var err error
  80. var user *m.User
  81. for _, authSource := range sourcesQuery.Sources {
  82. user, err = authSource.AuthenticateUser(cmd.User, cmd.Password)
  83. if err == nil {
  84. break
  85. }
  86. // handle non invalid credentials error, otherwise try next auth source
  87. if err != auth.ErrInvalidCredentials {
  88. return ApiError(500, "Error while trying to authenticate user", err)
  89. }
  90. }
  91. if err != nil {
  92. return ApiError(401, "Invalid username or password", err)
  93. }
  94. loginUserWithUser(user, c)
  95. result := map[string]interface{}{
  96. "message": "Logged in",
  97. }
  98. if redirectTo, _ := url.QueryUnescape(c.GetCookie("redirect_to")); len(redirectTo) > 0 {
  99. result["redirectUrl"] = redirectTo
  100. c.SetCookie("redirect_to", "", -1, setting.AppSubUrl+"/")
  101. }
  102. metrics.M_Api_Login_Post.Inc(1)
  103. return Json(200, result)
  104. }
  105. func LoginUsingLdap(c *middleware.Context, cmd dtos.LoginCommand) Response {
  106. err := ldapauth.Login(cmd.User, cmd.Password)
  107. if err != nil {
  108. if err == ldapauth.ErrInvalidCredentials {
  109. return ApiError(401, "Invalid username or password", err)
  110. }
  111. return ApiError(500, "Ldap login failed", err)
  112. }
  113. return Empty(401)
  114. }
  115. func loginUserWithUser(user *m.User, c *middleware.Context) {
  116. if user == nil {
  117. log.Error(3, "User login with nil user")
  118. }
  119. days := 86400 * setting.LogInRememberDays
  120. c.SetCookie(setting.CookieUserName, user.Login, days, setting.AppSubUrl+"/")
  121. c.SetSuperSecureCookie(util.EncodeMd5(user.Rands+user.Password), setting.CookieRememberName, user.Login, days, setting.AppSubUrl+"/")
  122. c.Session.Set(middleware.SESS_KEY_USERID, user.Id)
  123. }
  124. func Logout(c *middleware.Context) {
  125. c.SetCookie(setting.CookieUserName, "", -1, setting.AppSubUrl+"/")
  126. c.SetCookie(setting.CookieRememberName, "", -1, setting.AppSubUrl+"/")
  127. c.Session.Destory(c)
  128. c.Redirect(setting.AppSubUrl + "/login")
  129. }