login_oauth.go 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205
  1. package api
  2. import (
  3. "crypto/rand"
  4. "crypto/tls"
  5. "crypto/x509"
  6. "encoding/base64"
  7. "errors"
  8. "fmt"
  9. "io/ioutil"
  10. "log"
  11. "net/http"
  12. "net/url"
  13. "golang.org/x/net/context"
  14. "golang.org/x/oauth2"
  15. "github.com/grafana/grafana/pkg/bus"
  16. "github.com/grafana/grafana/pkg/metrics"
  17. "github.com/grafana/grafana/pkg/middleware"
  18. m "github.com/grafana/grafana/pkg/models"
  19. "github.com/grafana/grafana/pkg/setting"
  20. "github.com/grafana/grafana/pkg/social"
  21. )
  22. var (
  23. ErrProviderDeniedRequest = errors.New("Login provider denied login request")
  24. ErrEmailNotAllowed = errors.New("Required email domain not fulfilled")
  25. ErrSignUpNotAllowed = errors.New("Signup is not allowed for this adapter")
  26. ErrUsersQuotaReached = errors.New("Users quota reached")
  27. ErrNoEmail = errors.New("Login provider didn't return an email address")
  28. )
  29. func GenStateString() string {
  30. rnd := make([]byte, 32)
  31. rand.Read(rnd)
  32. return base64.StdEncoding.EncodeToString(rnd)
  33. }
  34. func OAuthLogin(ctx *middleware.Context) {
  35. if setting.OAuthService == nil {
  36. ctx.Handle(404, "login.OAuthLogin(oauth service not enabled)", nil)
  37. return
  38. }
  39. name := ctx.Params(":name")
  40. connect, ok := social.SocialMap[name]
  41. if !ok {
  42. ctx.Handle(404, "login.OAuthLogin(social login not enabled)", errors.New(name))
  43. return
  44. }
  45. error := ctx.Query("error")
  46. if error != "" {
  47. errorDesc := ctx.Query("error_description")
  48. redirectWithError(ctx, ErrProviderDeniedRequest, "error", error, "errorDesc", errorDesc)
  49. return
  50. }
  51. code := ctx.Query("code")
  52. if code == "" {
  53. state := GenStateString()
  54. ctx.Session.Set(middleware.SESS_KEY_OAUTH_STATE, state)
  55. if setting.OAuthService.OAuthInfos[name].HostedDomain == "" {
  56. ctx.Redirect(connect.AuthCodeURL(state, oauth2.AccessTypeOnline))
  57. } else {
  58. ctx.Redirect(connect.AuthCodeURL(state, oauth2.SetAuthURLParam("hd", setting.OAuthService.OAuthInfos[name].HostedDomain), oauth2.AccessTypeOnline))
  59. }
  60. return
  61. }
  62. // verify state string
  63. savedState := ctx.Session.Get(middleware.SESS_KEY_OAUTH_STATE).(string)
  64. queryState := ctx.Query("state")
  65. if savedState != queryState {
  66. ctx.Handle(500, "login.OAuthLogin(state mismatch)", nil)
  67. return
  68. }
  69. // handle call back
  70. // initialize oauth2 context
  71. oauthCtx := oauth2.NoContext
  72. if setting.OAuthService.OAuthInfos[name].TlsClientCert != "" || setting.OAuthService.OAuthInfos[name].TlsClientKey != "" {
  73. cert, err := tls.LoadX509KeyPair(setting.OAuthService.OAuthInfos[name].TlsClientCert, setting.OAuthService.OAuthInfos[name].TlsClientKey)
  74. if err != nil {
  75. log.Fatal(err)
  76. }
  77. // Load CA cert
  78. caCert, err := ioutil.ReadFile(setting.OAuthService.OAuthInfos[name].TlsClientCa)
  79. if err != nil {
  80. log.Fatal(err)
  81. }
  82. caCertPool := x509.NewCertPool()
  83. caCertPool.AppendCertsFromPEM(caCert)
  84. tr := &http.Transport{
  85. TLSClientConfig: &tls.Config{
  86. InsecureSkipVerify: setting.OAuthService.OAuthInfos[name].TlsSkipVerify,
  87. Certificates: []tls.Certificate{cert},
  88. RootCAs: caCertPool,
  89. },
  90. }
  91. sslcli := &http.Client{Transport: tr}
  92. oauthCtx = context.Background()
  93. oauthCtx = context.WithValue(oauthCtx, oauth2.HTTPClient, sslcli)
  94. }
  95. // get token from provider
  96. token, err := connect.Exchange(oauthCtx, code)
  97. if err != nil {
  98. ctx.Handle(500, "login.OAuthLogin(NewTransportWithCode)", err)
  99. return
  100. }
  101. // token.TokenType was defaulting to "bearer", which is out of spec, so we explicitly set to "Bearer"
  102. token.TokenType = "Bearer"
  103. ctx.Logger.Debug("OAuthLogin Got token")
  104. // set up oauth2 client
  105. client := connect.Client(oauthCtx, token)
  106. // get user info
  107. userInfo, err := connect.UserInfo(client)
  108. if err != nil {
  109. if sErr, ok := err.(*social.Error); ok {
  110. redirectWithError(ctx, sErr)
  111. } else {
  112. ctx.Handle(500, fmt.Sprintf("login.OAuthLogin(get info from %s)", name), err)
  113. }
  114. return
  115. }
  116. ctx.Logger.Debug("OAuthLogin got user info", "userInfo", userInfo)
  117. // validate that we got at least an email address
  118. if userInfo.Email == "" {
  119. redirectWithError(ctx, ErrNoEmail)
  120. return
  121. }
  122. // validate that the email is allowed to login to grafana
  123. if !connect.IsEmailAllowed(userInfo.Email) {
  124. redirectWithError(ctx, ErrEmailNotAllowed)
  125. return
  126. }
  127. userQuery := m.GetUserByEmailQuery{Email: userInfo.Email}
  128. err = bus.Dispatch(&userQuery)
  129. // create account if missing
  130. if err == m.ErrUserNotFound {
  131. if !connect.IsSignupAllowed() {
  132. redirectWithError(ctx, ErrSignUpNotAllowed)
  133. return
  134. }
  135. limitReached, err := middleware.QuotaReached(ctx, "user")
  136. if err != nil {
  137. ctx.Handle(500, "Failed to get user quota", err)
  138. return
  139. }
  140. if limitReached {
  141. redirectWithError(ctx, ErrUsersQuotaReached)
  142. return
  143. }
  144. cmd := m.CreateUserCommand{
  145. Login: userInfo.Login,
  146. Email: userInfo.Email,
  147. Name: userInfo.Name,
  148. Company: userInfo.Company,
  149. DefaultOrgRole: userInfo.Role,
  150. }
  151. if err = bus.Dispatch(&cmd); err != nil {
  152. ctx.Handle(500, "Failed to create account", err)
  153. return
  154. }
  155. userQuery.Result = &cmd.Result
  156. } else if err != nil {
  157. ctx.Handle(500, "Unexpected error", err)
  158. }
  159. // login
  160. loginUserWithUser(userQuery.Result, ctx)
  161. metrics.M_Api_Login_OAuth.Inc()
  162. if redirectTo, _ := url.QueryUnescape(ctx.GetCookie("redirect_to")); len(redirectTo) > 0 {
  163. ctx.SetCookie("redirect_to", "", -1, setting.AppSubUrl+"/")
  164. ctx.Redirect(redirectTo)
  165. return
  166. }
  167. ctx.Redirect(setting.AppSubUrl + "/")
  168. }
  169. func redirectWithError(ctx *middleware.Context, err error, v ...interface{}) {
  170. ctx.Logger.Info(err.Error(), v...)
  171. // TODO: we can use the flash storage here once it's implemented
  172. ctx.Session.Set("loginError", err.Error())
  173. ctx.Redirect(setting.AppSubUrl + "/login")
  174. }