cli_login.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124
  1. package user
  2. import (
  3. "fmt"
  4. "net/http"
  5. "net/url"
  6. "time"
  7. "github.com/porter-dev/porter/api/server/handlers"
  8. "github.com/porter-dev/porter/api/server/shared"
  9. "github.com/porter-dev/porter/api/server/shared/apierrors"
  10. "github.com/porter-dev/porter/api/types"
  11. "github.com/porter-dev/porter/internal/auth/token"
  12. "github.com/porter-dev/porter/internal/models"
  13. "github.com/porter-dev/porter/internal/repository"
  14. )
  15. type CLILoginHandler struct {
  16. handlers.PorterHandlerReader
  17. }
  18. func NewCLILoginHandler(
  19. config *shared.Config,
  20. decoderValidator shared.RequestDecoderValidator,
  21. writer shared.ResultWriter,
  22. ) *CLILoginHandler {
  23. return &CLILoginHandler{
  24. PorterHandlerReader: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  25. }
  26. }
  27. func (c *CLILoginHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  28. request := &types.CLILoginUserRequest{}
  29. ok := c.DecodeAndValidate(w, r, request)
  30. if !ok {
  31. return
  32. }
  33. user, _ := r.Context().Value(types.UserScope).(*models.User)
  34. // generate the token
  35. jwt, err := token.GetTokenForUser(user.ID)
  36. if err != nil {
  37. err = fmt.Errorf("CLI token creation failed: %s", err.Error())
  38. c.HandleAPIError(w, apierrors.NewErrInternal(err))
  39. return
  40. }
  41. encoded, err := jwt.EncodeToken(c.Config().TokenConf)
  42. if err != nil {
  43. err = fmt.Errorf("CLI token encoding failed: %s", err.Error())
  44. c.HandleAPIError(w, apierrors.NewErrInternal(err))
  45. return
  46. }
  47. // generate 64 characters long authorization code
  48. code, err := repository.GenerateRandomBytes(32)
  49. if err != nil {
  50. err = fmt.Errorf("CLI random code generation failed: %s", err.Error())
  51. c.HandleAPIError(w, apierrors.NewErrInternal(err))
  52. return
  53. }
  54. expiry := time.Now().Add(30 * time.Second)
  55. // create auth code object and send back authorization code
  56. authCode := &models.AuthCode{
  57. Token: encoded,
  58. AuthorizationCode: code,
  59. Expiry: &expiry,
  60. }
  61. authCode, err = c.Repo().AuthCode().CreateAuthCode(authCode)
  62. if err != nil {
  63. c.HandleAPIError(w, apierrors.NewErrInternal(err))
  64. return
  65. }
  66. http.Redirect(w, r, fmt.Sprintf("%s/?code=%s", request.Redirect, url.QueryEscape(authCode.AuthorizationCode)), 302)
  67. }
  68. type CLILoginExchangeHandler struct {
  69. handlers.PorterHandlerReadWriter
  70. }
  71. func NewCLILoginExchangeHandler(
  72. config *shared.Config,
  73. decoderValidator shared.RequestDecoderValidator,
  74. writer shared.ResultWriter,
  75. ) *CLILoginExchangeHandler {
  76. return &CLILoginExchangeHandler{
  77. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  78. }
  79. }
  80. func (c *CLILoginExchangeHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  81. request := &types.CLILoginExchangeRequest{}
  82. ok := c.DecodeAndValidate(w, r, request)
  83. if !ok {
  84. return
  85. }
  86. // look up the auth code and exchange it for a token
  87. authCode, err := c.Repo().AuthCode().ReadAuthCode(request.AuthorizationCode)
  88. if err != nil || authCode.IsExpired() {
  89. http.Error(w, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  90. return
  91. }
  92. res := &types.CLILoginExchangeResponse{
  93. Token: authCode.Token,
  94. }
  95. c.WriteResult(w, res)
  96. }