| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219 |
- package social
- import (
- "net/http"
- "strings"
- "context"
- "golang.org/x/oauth2"
- "github.com/grafana/grafana/pkg/log"
- "github.com/grafana/grafana/pkg/setting"
- "github.com/grafana/grafana/pkg/util"
- )
- type BasicUserInfo struct {
- Id string
- Name string
- Email string
- Login string
- Company string
- Role string
- }
- type SocialConnector interface {
- Type() int
- UserInfo(client *http.Client, token *oauth2.Token) (*BasicUserInfo, error)
- IsEmailAllowed(email string) bool
- IsSignupAllowed() bool
- AuthCodeURL(state string, opts ...oauth2.AuthCodeOption) string
- Exchange(ctx context.Context, code string) (*oauth2.Token, error)
- Client(ctx context.Context, t *oauth2.Token) *http.Client
- TokenSource(ctx context.Context, t *oauth2.Token) oauth2.TokenSource
- }
- type SocialBase struct {
- *oauth2.Config
- log log.Logger
- }
- type Error struct {
- s string
- }
- func (e *Error) Error() string {
- return e.s
- }
- const (
- grafanaCom = "grafana_com"
- )
- var (
- SocialBaseUrl = "/login/"
- SocialMap = make(map[string]SocialConnector)
- allOauthes = []string{"github", "gitlab", "google", "generic_oauth", "grafananet", grafanaCom}
- )
- func NewOAuthService() {
- setting.OAuthService = &setting.OAuther{}
- setting.OAuthService.OAuthInfos = make(map[string]*setting.OAuthInfo)
- for _, name := range allOauthes {
- sec := setting.Raw.Section("auth." + name)
- info := &setting.OAuthInfo{
- ClientId: sec.Key("client_id").String(),
- ClientSecret: sec.Key("client_secret").String(),
- Scopes: util.SplitString(sec.Key("scopes").String()),
- AuthUrl: sec.Key("auth_url").String(),
- TokenUrl: sec.Key("token_url").String(),
- ApiUrl: sec.Key("api_url").String(),
- Enabled: sec.Key("enabled").MustBool(),
- EmailAttributeName: sec.Key("email_attribute_name").String(),
- AllowedDomains: util.SplitString(sec.Key("allowed_domains").String()),
- HostedDomain: sec.Key("hosted_domain").String(),
- AllowSignup: sec.Key("allow_sign_up").MustBool(),
- Name: sec.Key("name").MustString(name),
- TlsClientCert: sec.Key("tls_client_cert").String(),
- TlsClientKey: sec.Key("tls_client_key").String(),
- TlsClientCa: sec.Key("tls_client_ca").String(),
- TlsSkipVerify: sec.Key("tls_skip_verify_insecure").MustBool(),
- SendClientCredentialsViaPost: sec.Key("send_client_credentials_via_post").MustBool(),
- }
- if !info.Enabled {
- continue
- }
- // handle the clients that do not properly support Basic auth headers and require passing client_id/client_secret via POST payload
- if info.SendClientCredentialsViaPost {
- oauth2.RegisterBrokenAuthHeaderProvider(info.TokenUrl)
- }
- if name == "grafananet" {
- name = grafanaCom
- }
- setting.OAuthService.OAuthInfos[name] = info
- config := oauth2.Config{
- ClientID: info.ClientId,
- ClientSecret: info.ClientSecret,
- Endpoint: oauth2.Endpoint{
- AuthURL: info.AuthUrl,
- TokenURL: info.TokenUrl,
- },
- RedirectURL: strings.TrimSuffix(setting.AppUrl, "/") + SocialBaseUrl + name,
- Scopes: info.Scopes,
- }
- logger := log.New("oauth." + name)
- // GitHub.
- if name == "github" {
- SocialMap["github"] = &SocialGithub{
- SocialBase: &SocialBase{
- Config: &config,
- log: logger,
- },
- allowedDomains: info.AllowedDomains,
- apiUrl: info.ApiUrl,
- allowSignup: info.AllowSignup,
- teamIds: sec.Key("team_ids").Ints(","),
- allowedOrganizations: util.SplitString(sec.Key("allowed_organizations").String()),
- }
- }
- // GitLab.
- if name == "gitlab" {
- SocialMap["gitlab"] = &SocialGitlab{
- SocialBase: &SocialBase{
- Config: &config,
- log: logger,
- },
- allowedDomains: info.AllowedDomains,
- apiUrl: info.ApiUrl,
- allowSignup: info.AllowSignup,
- allowedGroups: util.SplitString(sec.Key("allowed_groups").String()),
- }
- }
- // Google.
- if name == "google" {
- SocialMap["google"] = &SocialGoogle{
- SocialBase: &SocialBase{
- Config: &config,
- log: logger,
- },
- allowedDomains: info.AllowedDomains,
- hostedDomain: info.HostedDomain,
- apiUrl: info.ApiUrl,
- allowSignup: info.AllowSignup,
- }
- }
- // Generic - Uses the same scheme as Github.
- if name == "generic_oauth" {
- SocialMap["generic_oauth"] = &SocialGenericOAuth{
- SocialBase: &SocialBase{
- Config: &config,
- log: logger,
- },
- allowedDomains: info.AllowedDomains,
- apiUrl: info.ApiUrl,
- allowSignup: info.AllowSignup,
- emailAttributeName: info.EmailAttributeName,
- teamIds: sec.Key("team_ids").Ints(","),
- allowedOrganizations: util.SplitString(sec.Key("allowed_organizations").String()),
- }
- }
- if name == grafanaCom {
- config = oauth2.Config{
- ClientID: info.ClientId,
- ClientSecret: info.ClientSecret,
- Endpoint: oauth2.Endpoint{
- AuthURL: setting.GrafanaComUrl + "/oauth2/authorize",
- TokenURL: setting.GrafanaComUrl + "/api/oauth2/token",
- },
- RedirectURL: strings.TrimSuffix(setting.AppUrl, "/") + SocialBaseUrl + name,
- Scopes: info.Scopes,
- }
- SocialMap[grafanaCom] = &SocialGrafanaCom{
- SocialBase: &SocialBase{
- Config: &config,
- log: logger,
- },
- url: setting.GrafanaComUrl,
- allowSignup: info.AllowSignup,
- allowedOrganizations: util.SplitString(sec.Key("allowed_organizations").String()),
- }
- }
- }
- }
- // GetOAuthProviders returns available oauth providers and if they're enabled or not
- var GetOAuthProviders = func(cfg *setting.Cfg) map[string]bool {
- result := map[string]bool{}
- if cfg == nil || cfg.Raw == nil {
- return result
- }
- for _, name := range allOauthes {
- if name == "grafananet" {
- name = grafanaCom
- }
- sec := cfg.Raw.Section("auth." + name)
- if sec == nil {
- continue
- }
- result[name] = sec.Key("enabled").MustBool()
- }
- return result
- }
|