google_callback.go 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174
  1. package user
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "io/ioutil"
  6. "net/http"
  7. "net/url"
  8. "strings"
  9. "golang.org/x/oauth2"
  10. "gorm.io/gorm"
  11. "github.com/porter-dev/porter/api/server/authn"
  12. "github.com/porter-dev/porter/api/server/handlers"
  13. "github.com/porter-dev/porter/api/server/shared"
  14. "github.com/porter-dev/porter/api/server/shared/apierrors"
  15. "github.com/porter-dev/porter/api/server/shared/config"
  16. "github.com/porter-dev/porter/internal/models"
  17. )
  18. type UserOAuthGoogleCallbackHandler struct {
  19. handlers.PorterHandlerReadWriter
  20. }
  21. func NewUserOAuthGoogleCallbackHandler(
  22. config *config.Config,
  23. decoderValidator shared.RequestDecoderValidator,
  24. writer shared.ResultWriter,
  25. ) *UserOAuthGoogleCallbackHandler {
  26. return &UserOAuthGoogleCallbackHandler{
  27. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  28. }
  29. }
  30. func (p *UserOAuthGoogleCallbackHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  31. session, err := p.Config().Store.Get(r, p.Config().ServerConf.CookieName)
  32. if err != nil {
  33. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  34. return
  35. }
  36. if _, ok := session.Values["state"]; !ok {
  37. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  38. return
  39. }
  40. if r.URL.Query().Get("state") != session.Values["state"] {
  41. p.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  42. return
  43. }
  44. token, err := p.Config().GoogleConf.Exchange(oauth2.NoContext, r.URL.Query().Get("code"))
  45. if err != nil {
  46. p.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  47. return
  48. }
  49. if !token.Valid() {
  50. p.HandleAPIError(w, r, apierrors.NewErrForbidden(fmt.Errorf("invalid token")))
  51. return
  52. }
  53. // otherwise, create the user if not exists
  54. user, err := upsertGoogleUserFromToken(p.Config(), token)
  55. if err != nil && strings.Contains(err.Error(), "already registered") {
  56. http.Redirect(w, r, "/login?error="+url.QueryEscape(err.Error()), 302)
  57. return
  58. } else if err != nil && strings.Contains(err.Error(), "restricted domain group") {
  59. http.Redirect(w, r, "/login?error="+url.QueryEscape(err.Error()), 302)
  60. return
  61. } else if err != nil {
  62. http.Error(w, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  63. return
  64. }
  65. // save the user as authenticated in the session
  66. if err := authn.SaveUserAuthenticated(w, r, p.Config(), user); err != nil {
  67. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  68. return
  69. }
  70. if session.Values["query_params"] != "" {
  71. http.Redirect(w, r, fmt.Sprintf("/dashboard?%s", session.Values["query_params"]), 302)
  72. } else {
  73. http.Redirect(w, r, "/dashboard", 302)
  74. }
  75. }
  76. func upsertGoogleUserFromToken(config *config.Config, tok *oauth2.Token) (*models.User, error) {
  77. gInfo, err := getGoogleUserInfoFromToken(tok)
  78. if err != nil {
  79. return nil, err
  80. }
  81. // if the app has a restricted domain, check the `hd` query param
  82. if config.ServerConf.GoogleRestrictedDomain != "" {
  83. if gInfo.HD != config.ServerConf.GoogleRestrictedDomain {
  84. return nil, fmt.Errorf("Email is not in the restricted domain group.")
  85. }
  86. }
  87. user, err := config.Repo.User().ReadUserByGoogleUserID(gInfo.Sub)
  88. // if the user does not exist, create new user
  89. if err != nil && err == gorm.ErrRecordNotFound {
  90. // check if a user with that email address already exists
  91. _, err = config.Repo.User().ReadUserByEmail(gInfo.Email)
  92. if err == gorm.ErrRecordNotFound {
  93. user = &models.User{
  94. Email: gInfo.Email,
  95. EmailVerified: !config.Metadata.Email || gInfo.EmailVerified,
  96. GoogleUserID: gInfo.Sub,
  97. }
  98. user, err = config.Repo.User().CreateUser(user)
  99. if err != nil {
  100. return nil, err
  101. }
  102. } else if err == nil {
  103. return nil, fmt.Errorf("email already registered")
  104. } else if err != nil {
  105. return nil, err
  106. }
  107. } else if err != nil {
  108. return nil, fmt.Errorf("unexpected error occurred:%s", err.Error())
  109. }
  110. return user, nil
  111. }
  112. type googleUserInfo struct {
  113. Email string `json:"email"`
  114. EmailVerified bool `json:"email_verified"`
  115. HD string `json:"hd"`
  116. Sub string `json:"sub"`
  117. }
  118. func getGoogleUserInfoFromToken(tok *oauth2.Token) (*googleUserInfo, error) {
  119. // use userinfo endpoint for Google OIDC to get claims
  120. url := "https://openidconnect.googleapis.com/v1/userinfo"
  121. req, err := http.NewRequest("GET", url, nil)
  122. req.Header.Add("Authorization", "Bearer "+tok.AccessToken)
  123. client := &http.Client{}
  124. response, err := client.Do(req)
  125. if err != nil {
  126. return nil, fmt.Errorf("failed getting user info: %s", err.Error())
  127. }
  128. defer response.Body.Close()
  129. contents, err := ioutil.ReadAll(response.Body)
  130. if err != nil {
  131. return nil, fmt.Errorf("failed reading response body: %s", err.Error())
  132. }
  133. // parse contents into Google userinfo claims
  134. gInfo := &googleUserInfo{}
  135. err = json.Unmarshal(contents, &gInfo)
  136. return gInfo, nil
  137. }