mirror of
https://github.com/gravitl/netmaker.git
synced 2025-09-04 04:04:17 +08:00
* feat: api access tokens
* revoke all user tokens
* redefine access token api routes, add auto egress option to enrollment keys
* add server settings apis, add db table for settigs
* handle server settings updates
* switch to using settings from DB
* fix sever settings migration
* revet force migration for settings
* fix server settings database write
* fix revoked tokens to be unauthorized
* remove unused functions
* convert access token to sql schema
* switch access token to sql schema
* fix merge conflicts
* fix server settings types
* bypass basic auth setting for super admin
* add TODO comment
* feat(go): add types for idp package;
* feat(go): import azure sdk;
* feat(go): add stub for google workspace client;
* feat(go): implement azure ad client;
* feat(go): sync users and groups using idp client;
* publish peer update on settings update
* feat(go): read creds from env vars;
* feat(go): add api endpoint to trigger idp sync;
* fix(go): sync member changes;
* fix(go): handle error;
* fix(go): set correct response type;
* feat(go): support disabling user accounts;
1. Add api endpoints to enable and disable user accounts.
2. Add checks in authenticators to prevent disabled users from logging in.
3. Add checks in middleware to prevent api usage by disabled users.
* feat(go): use string slice for group members;
* feat(go): sync user account status from idp;
* feat(go): import google admin sdk;
* feat(go): add support for google workspace idp;
* feat(go): initialize idp client on sync;
* feat(go): sync from idp periodically;
* feat(go): improvements for google idp;
1. Use the impersonate package to authenticate.
2. Use Pages method to get all data.
* chore(go): import style changes from migration branch;
1. Singular file names for table schema.
2. No table name method.
3. Use .Model instead of .Table.
4. No unnecessary tagging.
* remove nat check on egress gateway request
* Revert "remove nat check on egress gateway request"
This reverts commit 0aff12a189
.
* feat(go): add db middleware;
* feat(go): restore method;
* feat(go): add user access token schema;
* fix user auth api:
* re initalise oauth and email config
* feat(go): fetch idp creds from server settings;
* feat(go): add filters for users and groups;
* feat(go): skip sync from idp if disabled;
* feat(go): add endpoint to remove idp integration;
* feat(go): import all users if no filters;
* feat(go): assign service-user role on sync;
* feat(go): remove microsoft-go-sdk;
* feat(go): add display name field for user;
* fix(go): set account disabled correctly;
* fix(go): update user if display name changes;
* fix(go): remove auth provider when removing idp integration;
* fix(go): ignore display name if empty;
* feat(go): add idp sync interval setting;
* fix(go): error on invalid auth provider;
* fix(go): no error if no user on group delete;
* fix(go): check superadmin using platform role id;
* feat(go): add display name and account disabled to return user as well;
* feat(go): tidy go mod after merge;
* feat(go): reinitialize auth provider and idp sync hook;
* fix(go): merge error;
* fix(go): merge error;
* feat(go): use id as the external provider id;
* fix(go): comments;
* feat(go): add function to return pending users;
* feat(go): prevent external id erasure;
* fix(go): user and group sync errors;
* chore(go): cleanup;
* fix(go): delete only oauth users;
* feat(go): use uuid group id;
* export ipd id to in rest api
* feat(go): don't use uuid for default groups;
* feat(go): migrate group only if id not uuid;
* chore(go): go mod tidy;
---------
Co-authored-by: abhishek9686 <abhi281342@gmail.com>
Co-authored-by: Abhishek K <abhishek@netmaker.io>
Co-authored-by: the_aceix <aceixsmartx@gmail.com>
286 lines
8.1 KiB
Go
286 lines
8.1 KiB
Go
package auth
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"strings"
|
|
|
|
"github.com/gravitl/netmaker/database"
|
|
"github.com/gravitl/netmaker/logger"
|
|
"github.com/gravitl/netmaker/logic"
|
|
"github.com/gravitl/netmaker/models"
|
|
proLogic "github.com/gravitl/netmaker/pro/logic"
|
|
"github.com/gravitl/netmaker/servercfg"
|
|
"golang.org/x/oauth2"
|
|
"golang.org/x/oauth2/github"
|
|
)
|
|
|
|
var github_functions = map[string]interface{}{
|
|
init_provider: initGithub,
|
|
get_user_info: getGithubUserInfo,
|
|
handle_callback: handleGithubCallback,
|
|
handle_login: handleGithubLogin,
|
|
verify_user: verifyGithubUser,
|
|
}
|
|
|
|
// == handle github authentication here ==
|
|
|
|
func initGithub(redirectURL string, clientID string, clientSecret string) {
|
|
auth_provider = &oauth2.Config{
|
|
RedirectURL: redirectURL,
|
|
ClientID: clientID,
|
|
ClientSecret: clientSecret,
|
|
Scopes: []string{"read:user", "user:email"},
|
|
Endpoint: github.Endpoint,
|
|
}
|
|
}
|
|
|
|
func handleGithubLogin(w http.ResponseWriter, r *http.Request) {
|
|
var oauth_state_string = logic.RandomString(user_signin_length)
|
|
if auth_provider == nil {
|
|
handleOauthNotConfigured(w)
|
|
return
|
|
}
|
|
|
|
if err := logic.SetState(oauth_state_string); err != nil {
|
|
handleOauthNotConfigured(w)
|
|
return
|
|
}
|
|
|
|
var url = auth_provider.AuthCodeURL(oauth_state_string)
|
|
http.Redirect(w, r, url, http.StatusTemporaryRedirect)
|
|
}
|
|
|
|
func handleGithubCallback(w http.ResponseWriter, r *http.Request) {
|
|
|
|
var rState, rCode = getStateAndCode(r)
|
|
var content, err = getGithubUserInfo(rState, rCode)
|
|
if err != nil {
|
|
logger.Log(1, "error when getting user info from github:", err.Error())
|
|
if strings.Contains(err.Error(), "invalid oauth state") || strings.Contains(err.Error(), "failed to fetch user email from SSO state") {
|
|
handleOauthNotValid(w)
|
|
return
|
|
}
|
|
handleOauthNotConfigured(w)
|
|
return
|
|
}
|
|
var inviteExists bool
|
|
// check if invite exists for User
|
|
in, err := logic.GetUserInvite(content.Email)
|
|
if err == nil {
|
|
inviteExists = true
|
|
}
|
|
// check if user approval is already pending
|
|
if !inviteExists && logic.IsPendingUser(content.Email) {
|
|
handleOauthUserSignUpApprovalPending(w)
|
|
return
|
|
}
|
|
// if user exists with provider ID, convert them into email ID
|
|
user, err := logic.GetUser(content.Login)
|
|
if err == nil {
|
|
// if user exists, then ensure user's auth type is
|
|
// oauth before proceeding.
|
|
if user.AuthType == models.BasicAuth {
|
|
logger.Log(0, "invalid auth type: basic_auth")
|
|
handleAuthTypeMismatch(w)
|
|
return
|
|
}
|
|
|
|
// checks if user exists with email
|
|
_, err := logic.GetUser(content.Email)
|
|
if err != nil {
|
|
user.UserName = content.Email
|
|
user.ExternalIdentityProviderID = content.Login
|
|
database.DeleteRecord(database.USERS_TABLE_NAME, content.Login)
|
|
d, _ := json.Marshal(user)
|
|
database.Insert(user.UserName, string(d), database.USERS_TABLE_NAME)
|
|
}
|
|
|
|
}
|
|
_, err = logic.GetUser(content.Email)
|
|
if err != nil {
|
|
if database.IsEmptyRecord(err) { // user must not exist, so try to make one
|
|
if inviteExists {
|
|
// create user
|
|
user, err := proLogic.PrepareOauthUserFromInvite(in)
|
|
if err != nil {
|
|
logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
|
|
return
|
|
}
|
|
user.ExternalIdentityProviderID = content.ID
|
|
if err = logic.CreateUser(&user); err != nil {
|
|
handleSomethingWentWrong(w)
|
|
return
|
|
}
|
|
logic.DeleteUserInvite(content.Email)
|
|
logic.DeletePendingUser(content.Email)
|
|
} else {
|
|
if !isEmailAllowed(content.Email) {
|
|
handleOauthUserNotAllowedToSignUp(w)
|
|
return
|
|
}
|
|
err = logic.InsertPendingUser(&models.User{
|
|
UserName: content.Email,
|
|
ExternalIdentityProviderID: content.ID,
|
|
AuthType: models.OAuth,
|
|
})
|
|
if err != nil {
|
|
handleSomethingWentWrong(w)
|
|
return
|
|
}
|
|
handleFirstTimeOauthUserSignUp(w)
|
|
return
|
|
}
|
|
} else {
|
|
handleSomethingWentWrong(w)
|
|
return
|
|
}
|
|
}
|
|
user, err = logic.GetUser(content.Email)
|
|
if err != nil {
|
|
handleOauthUserNotFound(w)
|
|
return
|
|
}
|
|
|
|
if user.AccountDisabled {
|
|
handleUserAccountDisabled(w)
|
|
return
|
|
}
|
|
|
|
userRole, err := logic.GetRole(user.PlatformRoleID)
|
|
if err != nil {
|
|
handleSomethingWentWrong(w)
|
|
return
|
|
}
|
|
if userRole.DenyDashboardAccess {
|
|
handleOauthUserNotAllowed(w)
|
|
return
|
|
}
|
|
var newPass, fetchErr = logic.FetchPassValue("")
|
|
if fetchErr != nil {
|
|
return
|
|
}
|
|
// send a netmaker jwt token
|
|
var authRequest = models.UserAuthParams{
|
|
UserName: content.Email,
|
|
Password: newPass,
|
|
}
|
|
|
|
var jwt, jwtErr = logic.VerifyAuthRequest(authRequest)
|
|
if jwtErr != nil {
|
|
logger.Log(1, "could not parse jwt for user", authRequest.UserName)
|
|
return
|
|
}
|
|
logic.LogEvent(&models.Event{
|
|
Action: models.Login,
|
|
Source: models.Subject{
|
|
ID: user.UserName,
|
|
Name: user.UserName,
|
|
Type: models.UserSub,
|
|
},
|
|
TriggeredBy: user.UserName,
|
|
Target: models.Subject{
|
|
ID: models.DashboardSub.String(),
|
|
Name: models.DashboardSub.String(),
|
|
Type: models.DashboardSub,
|
|
Info: user,
|
|
},
|
|
Origin: models.Dashboard,
|
|
})
|
|
logger.Log(1, "completed github OAuth sigin in for", content.Email)
|
|
http.Redirect(w, r, servercfg.GetFrontendURL()+"/login?login="+jwt+"&user="+content.Email, http.StatusPermanentRedirect)
|
|
}
|
|
|
|
func getGithubUserInfo(state, code string) (*OAuthUser, error) {
|
|
oauth_state_string, isValid := logic.IsStateValid(state)
|
|
if (!isValid || state != oauth_state_string) && !isStateCached(state) {
|
|
return nil, fmt.Errorf("invalid oauth state")
|
|
}
|
|
var token, err = auth_provider.Exchange(context.Background(), code, oauth2.SetAuthURLParam("prompt", "login"))
|
|
if err != nil {
|
|
return nil, fmt.Errorf("code exchange failed: %s", err.Error())
|
|
}
|
|
if !token.Valid() {
|
|
return nil, fmt.Errorf("GitHub code exchange yielded invalid token")
|
|
}
|
|
var data []byte
|
|
data, err = json.Marshal(token)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to convert token to json: %s", err.Error())
|
|
}
|
|
var httpClient = &http.Client{}
|
|
var httpReq, reqErr = http.NewRequest("GET", "https://api.github.com/user", nil)
|
|
if reqErr != nil {
|
|
return nil, fmt.Errorf("failed to create request to GitHub")
|
|
}
|
|
httpReq.Header.Set("Authorization", "token "+token.AccessToken)
|
|
response, err := httpClient.Do(httpReq)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed getting user info: %s", err.Error())
|
|
}
|
|
defer response.Body.Close()
|
|
contents, err := io.ReadAll(response.Body)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed reading response body: %s", err.Error())
|
|
}
|
|
var userInfo = &OAuthUser{}
|
|
if err = json.Unmarshal(contents, userInfo); err != nil {
|
|
return nil, fmt.Errorf("failed parsing email from response data: %s", err.Error())
|
|
}
|
|
userInfo.AccessToken = string(data)
|
|
if userInfo.Email == "" {
|
|
// if user's email is not made public, get the info from the github emails api
|
|
logger.Log(2, "fetching user email from github api")
|
|
userInfo.Email, err = getGithubEmailsInfo(token.AccessToken)
|
|
if err != nil {
|
|
logger.Log(0, "failed to fetch user's email from github: ", err.Error())
|
|
}
|
|
}
|
|
if userInfo.Email == "" {
|
|
err = errors.New("failed to fetch user email from SSO state")
|
|
return userInfo, err
|
|
}
|
|
return userInfo, nil
|
|
}
|
|
|
|
func verifyGithubUser(token *oauth2.Token) bool {
|
|
return token.Valid()
|
|
}
|
|
|
|
func getGithubEmailsInfo(accessToken string) (string, error) {
|
|
|
|
var httpClient = &http.Client{}
|
|
var httpReq, reqErr = http.NewRequest("GET", "https://api.github.com/user/emails", nil)
|
|
if reqErr != nil {
|
|
return "", fmt.Errorf("failed to create request to GitHub")
|
|
}
|
|
httpReq.Header.Add("Accept", "application/vnd.github.v3+json")
|
|
httpReq.Header.Set("Authorization", "token "+accessToken)
|
|
response, err := httpClient.Do(httpReq)
|
|
if err != nil {
|
|
return "", fmt.Errorf("failed getting user info: %s", err.Error())
|
|
}
|
|
defer response.Body.Close()
|
|
contents, err := io.ReadAll(response.Body)
|
|
if err != nil {
|
|
return "", fmt.Errorf("failed reading response body: %s", err.Error())
|
|
}
|
|
|
|
emailsInfo := []interface{}{}
|
|
err = json.Unmarshal(contents, &emailsInfo)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
for _, info := range emailsInfo {
|
|
emailInfoMap := info.(map[string]interface{})
|
|
if emailInfoMap["primary"].(bool) {
|
|
return emailInfoMap["email"].(string), nil
|
|
}
|
|
|
|
}
|
|
return "", errors.New("email not found")
|
|
}
|