2
0

github_callback.go 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181
  1. package user
  2. import (
  3. "context"
  4. "fmt"
  5. "net/http"
  6. "net/url"
  7. "strings"
  8. "golang.org/x/oauth2"
  9. "gorm.io/gorm"
  10. "github.com/google/go-github/v41/github"
  11. "github.com/porter-dev/porter/api/server/authn"
  12. "github.com/porter-dev/porter/api/server/handlers"
  13. "github.com/porter-dev/porter/api/server/shared"
  14. "github.com/porter-dev/porter/api/server/shared/apierrors"
  15. "github.com/porter-dev/porter/api/server/shared/config"
  16. "github.com/porter-dev/porter/internal/analytics"
  17. "github.com/porter-dev/porter/internal/models"
  18. )
  19. type UserOAuthGithubCallbackHandler struct {
  20. handlers.PorterHandlerReadWriter
  21. }
  22. func NewUserOAuthGithubCallbackHandler(
  23. config *config.Config,
  24. decoderValidator shared.RequestDecoderValidator,
  25. writer shared.ResultWriter,
  26. ) *UserOAuthGithubCallbackHandler {
  27. return &UserOAuthGithubCallbackHandler{
  28. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  29. }
  30. }
  31. func (p *UserOAuthGithubCallbackHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  32. session, err := p.Config().Store.Get(r, p.Config().ServerConf.CookieName)
  33. if err != nil {
  34. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  35. return
  36. }
  37. if _, ok := session.Values["state"]; !ok {
  38. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  39. return
  40. }
  41. if r.URL.Query().Get("state") != session.Values["state"] {
  42. p.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  43. return
  44. }
  45. token, err := p.Config().GithubConf.Exchange(oauth2.NoContext, r.URL.Query().Get("code"))
  46. if err != nil {
  47. p.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  48. return
  49. }
  50. if !token.Valid() {
  51. p.HandleAPIError(w, r, apierrors.NewErrForbidden(fmt.Errorf("invalid token")))
  52. return
  53. }
  54. // otherwise, create the user if not exists
  55. user, err := upsertUserFromToken(p.Config(), token)
  56. if err != nil && strings.Contains(err.Error(), "already registered") {
  57. http.Redirect(w, r, "/login?error="+url.QueryEscape(err.Error()), 302)
  58. return
  59. } else if err != nil {
  60. http.Error(w, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  61. return
  62. }
  63. p.Config().AnalyticsClient.Identify(analytics.CreateSegmentIdentifyUser(user))
  64. // save the user as authenticated in the session
  65. redirect, err := authn.SaveUserAuthenticated(w, r, p.Config(), user)
  66. if err != nil {
  67. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  68. return
  69. }
  70. // non-fatal send email verification
  71. if !user.EmailVerified {
  72. err = startEmailVerification(p.Config(), w, r, user)
  73. if err != nil {
  74. p.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(err))
  75. }
  76. }
  77. if redirect != "" {
  78. http.Redirect(w, r, redirect, http.StatusFound)
  79. return
  80. }
  81. http.Redirect(w, r, "/dashboard", 302)
  82. }
  83. func upsertUserFromToken(config *config.Config, tok *oauth2.Token) (*models.User, error) {
  84. // determine if the user already exists
  85. client := github.NewClient(config.GithubConf.Client(oauth2.NoContext, tok))
  86. githubUser, _, err := client.Users.Get(context.Background(), "")
  87. if err != nil {
  88. return nil, err
  89. }
  90. user, err := config.Repo.User().ReadUserByGithubUserID(*githubUser.ID)
  91. // if the user does not exist, create new user
  92. if err != nil && err == gorm.ErrRecordNotFound {
  93. emails, _, err := client.Users.ListEmails(context.Background(), &github.ListOptions{})
  94. if err != nil {
  95. return nil, err
  96. }
  97. primary := ""
  98. verified := false
  99. // get the primary email
  100. for _, email := range emails {
  101. if email.GetPrimary() {
  102. primary = email.GetEmail()
  103. verified = email.GetVerified()
  104. break
  105. }
  106. }
  107. if primary == "" {
  108. return nil, fmt.Errorf("github user must have an email")
  109. }
  110. if err := checkUserRestrictions(config.ServerConf, primary); err != nil {
  111. return nil, err
  112. }
  113. // check if a user with that email address already exists
  114. _, err = config.Repo.User().ReadUserByEmail(primary)
  115. if err == gorm.ErrRecordNotFound {
  116. user = &models.User{
  117. Email: primary,
  118. EmailVerified: !config.Metadata.Email || verified,
  119. GithubUserID: githubUser.GetID(),
  120. }
  121. user, err = config.Repo.User().CreateUser(user)
  122. if err != nil {
  123. return nil, err
  124. }
  125. err = addUserToDefaultProject(config, user)
  126. if err != nil {
  127. return nil, err
  128. }
  129. config.AnalyticsClient.Track(analytics.UserCreateTrack(&analytics.UserCreateTrackOpts{
  130. UserScopedTrackOpts: analytics.GetUserScopedTrackOpts(user.ID),
  131. Email: user.Email,
  132. }))
  133. } else if err == nil {
  134. return nil, fmt.Errorf("email already registered")
  135. } else if err != nil {
  136. return nil, err
  137. }
  138. } else if err != nil {
  139. return nil, fmt.Errorf("unexpected error occurred:%s", err.Error())
  140. }
  141. return user, nil
  142. }