google_callback.go 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193
  1. package user
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "io/ioutil"
  6. "net/http"
  7. "net/url"
  8. "strings"
  9. "golang.org/x/oauth2"
  10. "gorm.io/gorm"
  11. "github.com/porter-dev/porter/api/server/authn"
  12. "github.com/porter-dev/porter/api/server/handlers"
  13. "github.com/porter-dev/porter/api/server/shared"
  14. "github.com/porter-dev/porter/api/server/shared/apierrors"
  15. "github.com/porter-dev/porter/api/server/shared/config"
  16. "github.com/porter-dev/porter/internal/analytics"
  17. "github.com/porter-dev/porter/internal/models"
  18. )
  19. type UserOAuthGoogleCallbackHandler struct {
  20. handlers.PorterHandlerReadWriter
  21. }
  22. func NewUserOAuthGoogleCallbackHandler(
  23. config *config.Config,
  24. decoderValidator shared.RequestDecoderValidator,
  25. writer shared.ResultWriter,
  26. ) *UserOAuthGoogleCallbackHandler {
  27. return &UserOAuthGoogleCallbackHandler{
  28. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  29. }
  30. }
  31. func (p *UserOAuthGoogleCallbackHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  32. session, err := p.Config().Store.Get(r, p.Config().ServerConf.CookieName)
  33. if err != nil {
  34. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  35. return
  36. }
  37. if _, ok := session.Values["state"]; !ok {
  38. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  39. return
  40. }
  41. if r.URL.Query().Get("state") != session.Values["state"] {
  42. p.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  43. return
  44. }
  45. token, err := p.Config().GoogleConf.Exchange(oauth2.NoContext, r.URL.Query().Get("code"))
  46. if err != nil {
  47. p.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  48. return
  49. }
  50. if !token.Valid() {
  51. p.HandleAPIError(w, r, apierrors.NewErrForbidden(fmt.Errorf("invalid token")))
  52. return
  53. }
  54. // otherwise, create the user if not exists
  55. user, err := upsertGoogleUserFromToken(p.Config(), token)
  56. if err != nil && strings.Contains(err.Error(), "already registered") {
  57. http.Redirect(w, r, "/login?error="+url.QueryEscape(err.Error()), 302)
  58. return
  59. } else if err != nil && strings.Contains(err.Error(), "restricted domain group") {
  60. http.Redirect(w, r, "/login?error="+url.QueryEscape(err.Error()), 302)
  61. return
  62. } else if err != nil {
  63. http.Error(w, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  64. return
  65. }
  66. p.Config().AnalyticsClient.Identify(analytics.CreateSegmentIdentifyUser(user))
  67. // save the user as authenticated in the session
  68. redirect, err := authn.SaveUserAuthenticated(w, r, p.Config(), user)
  69. if err != nil {
  70. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  71. return
  72. }
  73. // non-fatal send email verification
  74. if !user.EmailVerified {
  75. err = startEmailVerification(p.Config(), w, r, user)
  76. if err != nil {
  77. p.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(err))
  78. }
  79. }
  80. if redirect != "" {
  81. http.Redirect(w, r, redirect, http.StatusFound)
  82. return
  83. }
  84. http.Redirect(w, r, "/dashboard", 302)
  85. }
  86. func upsertGoogleUserFromToken(config *config.Config, tok *oauth2.Token) (*models.User, error) {
  87. gInfo, err := getGoogleUserInfoFromToken(tok)
  88. if err != nil {
  89. return nil, err
  90. }
  91. if err := checkUserRestrictions(config.ServerConf, gInfo.Email); err != nil {
  92. return nil, err
  93. }
  94. // if the app has a restricted domain, check the `hd` query param
  95. if config.ServerConf.GoogleRestrictedDomain != "" {
  96. if gInfo.HD != config.ServerConf.GoogleRestrictedDomain {
  97. return nil, fmt.Errorf("Email is not in the restricted domain group.")
  98. }
  99. }
  100. user, err := config.Repo.User().ReadUserByGoogleUserID(gInfo.Sub)
  101. // if the user does not exist, create new user
  102. if err != nil && err == gorm.ErrRecordNotFound {
  103. // check if a user with that email address already exists
  104. _, err = config.Repo.User().ReadUserByEmail(gInfo.Email)
  105. if err == gorm.ErrRecordNotFound {
  106. user = &models.User{
  107. Email: gInfo.Email,
  108. EmailVerified: !config.Metadata.Email || gInfo.EmailVerified,
  109. GoogleUserID: gInfo.Sub,
  110. }
  111. user, err = config.Repo.User().CreateUser(user)
  112. if err != nil {
  113. return nil, err
  114. }
  115. err = addUserToDefaultProject(config, user)
  116. if err != nil {
  117. return nil, err
  118. }
  119. } else if err == nil {
  120. return nil, fmt.Errorf("email already registered")
  121. } else if err != nil {
  122. return nil, err
  123. }
  124. } else if err != nil {
  125. return nil, fmt.Errorf("unexpected error occurred:%s", err.Error())
  126. }
  127. return user, nil
  128. }
  129. type googleUserInfo struct {
  130. Email string `json:"email"`
  131. EmailVerified bool `json:"email_verified"`
  132. HD string `json:"hd"`
  133. Sub string `json:"sub"`
  134. }
  135. func getGoogleUserInfoFromToken(tok *oauth2.Token) (*googleUserInfo, error) {
  136. // use userinfo endpoint for Google OIDC to get claims
  137. url := "https://openidconnect.googleapis.com/v1/userinfo"
  138. req, err := http.NewRequest("GET", url, nil)
  139. req.Header.Add("Authorization", "Bearer "+tok.AccessToken)
  140. client := &http.Client{}
  141. response, err := client.Do(req)
  142. if err != nil {
  143. return nil, fmt.Errorf("failed getting user info: %s", err.Error())
  144. }
  145. defer response.Body.Close()
  146. contents, err := ioutil.ReadAll(response.Body)
  147. if err != nil {
  148. return nil, fmt.Errorf("failed reading response body: %s", err.Error())
  149. }
  150. // parse contents into Google userinfo claims
  151. gInfo := &googleUserInfo{}
  152. err = json.Unmarshal(contents, &gInfo)
  153. return gInfo, nil
  154. }