| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130 |
- package user
- import (
- "fmt"
- "net/http"
- "net/url"
- "time"
- "github.com/porter-dev/porter/api/server/handlers"
- "github.com/porter-dev/porter/api/server/shared"
- "github.com/porter-dev/porter/api/server/shared/apierrors"
- "github.com/porter-dev/porter/api/server/shared/config"
- "github.com/porter-dev/porter/api/types"
- "github.com/porter-dev/porter/internal/auth/token"
- "github.com/porter-dev/porter/internal/encryption"
- "github.com/porter-dev/porter/internal/models"
- )
- type CLILoginHandler struct {
- handlers.PorterHandlerReader
- }
- func NewCLILoginHandler(
- config *config.Config,
- decoderValidator shared.RequestDecoderValidator,
- writer shared.ResultWriter,
- ) *CLILoginHandler {
- return &CLILoginHandler{
- PorterHandlerReader: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
- }
- }
- func (c *CLILoginHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
- request := &types.CLILoginUserRequest{}
- ok := c.DecodeAndValidate(w, r, request)
- if !ok {
- return
- }
- user, _ := r.Context().Value(types.UserScope).(*models.User)
- if err := checkUserRestrictions(c.Config().ServerConf, user.Email); err != nil {
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
- return
- }
- // generate the token
- jwt, err := token.GetTokenForUser(user.ID)
- if err != nil {
- err = fmt.Errorf("CLI token creation failed: %s", err.Error())
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- encoded, err := jwt.EncodeToken(c.Config().TokenConf)
- if err != nil {
- err = fmt.Errorf("CLI token encoding failed: %s", err.Error())
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- // generate 64 characters long authorization code
- code, err := encryption.GenerateRandomBytes(32)
- if err != nil {
- err = fmt.Errorf("CLI random code generation failed: %s", err.Error())
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- expiry := time.Now().Add(30 * time.Second)
- // create auth code object and send back authorization code
- authCode := &models.AuthCode{
- Token: encoded,
- AuthorizationCode: code,
- Expiry: &expiry,
- }
- authCode, err = c.Repo().AuthCode().CreateAuthCode(authCode)
- if err != nil {
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- http.Redirect(w, r, fmt.Sprintf("%s/?code=%s", request.Redirect, url.QueryEscape(authCode.AuthorizationCode)), 302)
- }
- type CLILoginExchangeHandler struct {
- handlers.PorterHandlerReadWriter
- }
- func NewCLILoginExchangeHandler(
- config *config.Config,
- decoderValidator shared.RequestDecoderValidator,
- writer shared.ResultWriter,
- ) *CLILoginExchangeHandler {
- return &CLILoginExchangeHandler{
- PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
- }
- }
- func (c *CLILoginExchangeHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
- request := &types.CLILoginExchangeRequest{}
- ok := c.DecodeAndValidate(w, r, request)
- if !ok {
- return
- }
- // look up the auth code and exchange it for a token
- authCode, err := c.Repo().AuthCode().ReadAuthCode(request.AuthorizationCode)
- if err != nil || authCode.IsExpired() {
- http.Error(w, http.StatusText(http.StatusForbidden), http.StatusForbidden)
- return
- }
- res := &types.CLILoginExchangeResponse{
- Token: authCode.Token,
- }
- c.WriteResult(w, r, res)
- }
|