mirror of
https://github.com/1f349/lavender.git
synced 2024-11-09 22:32:48 +00:00
200 lines
5.6 KiB
Go
200 lines
5.6 KiB
Go
package server
|
|
|
|
import (
|
|
"context"
|
|
_ "embed"
|
|
"encoding/json"
|
|
"fmt"
|
|
"github.com/1f349/lavender/issuer"
|
|
"github.com/1f349/lavender/server/pages"
|
|
"github.com/1f349/mjwt/auth"
|
|
"github.com/1f349/mjwt/claims"
|
|
"github.com/golang-jwt/jwt/v4"
|
|
"github.com/google/uuid"
|
|
"github.com/julienschmidt/httprouter"
|
|
"golang.org/x/oauth2"
|
|
"net/http"
|
|
"net/mail"
|
|
"strings"
|
|
"time"
|
|
)
|
|
|
|
var uuidNewStringState = uuid.NewString
|
|
var uuidNewStringAti = uuid.NewString
|
|
var uuidNewStringRti = uuid.NewString
|
|
|
|
var testOa2Exchange = func(oa2conf oauth2.Config, ctx context.Context, code string) (*oauth2.Token, error) {
|
|
return oa2conf.Exchange(ctx, code)
|
|
}
|
|
|
|
var testOa2UserInfo = func(oidc *issuer.WellKnownOIDC, ctx context.Context, exchange *oauth2.Token) (*http.Response, error) {
|
|
client := oidc.OAuth2Config.Client(ctx, exchange)
|
|
return client.Get(oidc.UserInfoEndpoint)
|
|
}
|
|
|
|
func (h *HttpServer) flowPopup(rw http.ResponseWriter, req *http.Request, _ httprouter.Params) {
|
|
pages.RenderPageTemplate(rw, "flow-popup", map[string]any{
|
|
"ServiceName": h.conf.ServiceName,
|
|
"Origin": req.URL.Query().Get("origin"),
|
|
})
|
|
}
|
|
|
|
func (h *HttpServer) flowPopupPost(rw http.ResponseWriter, req *http.Request, _ httprouter.Params) {
|
|
loginName := req.PostFormValue("loginname")
|
|
login := h.manager.FindServiceFromLogin(loginName)
|
|
if login == nil {
|
|
http.Error(rw, "No login service defined for this username", http.StatusBadRequest)
|
|
return
|
|
}
|
|
// the @ must exist if the service is defined
|
|
n := strings.IndexByte(loginName, '@')
|
|
loginUn := loginName[:n]
|
|
|
|
targetOrigin := req.PostFormValue("origin")
|
|
allowedService, found := h.services[targetOrigin]
|
|
if !found {
|
|
http.Error(rw, "Invalid target origin", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
// save state for use later
|
|
state := login.Config.Namespace + ":" + uuidNewStringState()
|
|
h.flowState.Set(state, flowStateData{
|
|
login,
|
|
allowedService,
|
|
}, time.Now().Add(15*time.Minute))
|
|
|
|
// generate oauth2 config and redirect to authorize URL
|
|
oa2conf := login.OAuth2Config
|
|
oa2conf.RedirectURL = h.conf.BaseUrl + "/callback"
|
|
nextUrl := oa2conf.AuthCodeURL(state, oauth2.SetAuthURLParam("login_name", loginUn))
|
|
http.Redirect(rw, req, nextUrl, http.StatusFound)
|
|
}
|
|
|
|
func (h *HttpServer) flowCallback(rw http.ResponseWriter, req *http.Request, _ httprouter.Params) {
|
|
err := req.ParseForm()
|
|
if err != nil {
|
|
http.Error(rw, "Error parsing form", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
q := req.URL.Query()
|
|
state := q.Get("state")
|
|
n := strings.IndexByte(state, ':')
|
|
if n == -1 || !h.manager.CheckNamespace(state[:n]) {
|
|
http.Error(rw, "Invalid state namespace", http.StatusBadRequest)
|
|
return
|
|
}
|
|
v, found := h.flowState.Get(state)
|
|
if !found {
|
|
http.Error(rw, "Invalid state", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
oa2conf := v.sso.OAuth2Config
|
|
oa2conf.RedirectURL = h.conf.BaseUrl + "/callback"
|
|
exchange, err := testOa2Exchange(oa2conf, context.Background(), q.Get("code"))
|
|
if err != nil {
|
|
fmt.Println("Failed exchange:", err)
|
|
http.Error(rw, "Failed to exchange code", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
v2, err := testOa2UserInfo(v.sso, req.Context(), exchange)
|
|
if err != nil {
|
|
fmt.Println("Failed to get userinfo:", err)
|
|
http.Error(rw, "Failed to get userinfo", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
defer v2.Body.Close()
|
|
if v2.StatusCode != http.StatusOK {
|
|
http.Error(rw, "Failed to get userinfo: unexpected status code", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
var v3 map[string]any
|
|
if err = json.NewDecoder(v2.Body).Decode(&v3); err != nil {
|
|
fmt.Println("Failed to decode userinfo:", err)
|
|
http.Error(rw, "Failed to decode userinfo", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
sub, ok := v3["sub"].(string)
|
|
if !ok {
|
|
http.Error(rw, "Invalid subject in userinfo", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
aud, ok := v3["aud"].(string)
|
|
if !ok {
|
|
http.Error(rw, "Invalid audience in userinfo", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
var needsMailFlag, needsDomains bool
|
|
|
|
ps := claims.NewPermStorage()
|
|
for _, i := range v.target.Permissions {
|
|
if strings.HasPrefix(i, "dynamic:") {
|
|
switch i {
|
|
case "dynamic:mail-client":
|
|
needsMailFlag = true
|
|
case "dynamic:domain-owns":
|
|
needsDomains = true
|
|
}
|
|
} else {
|
|
ps.Set(i)
|
|
}
|
|
}
|
|
|
|
if needsMailFlag {
|
|
if verified, ok := v3["email_verified"].(bool); ok && verified {
|
|
if mailAddress, ok := v3["email"].(string); ok {
|
|
address, err := mail.ParseAddress(mailAddress)
|
|
if err != nil {
|
|
http.Error(rw, "Invalid email in userinfo", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
n := strings.IndexByte(address.Address, '@')
|
|
if n == -1 {
|
|
goto noEmailSupport
|
|
}
|
|
if address.Address[n+1:] != v.sso.Config.Namespace {
|
|
goto noEmailSupport
|
|
}
|
|
ps.Set("mail-client")
|
|
}
|
|
}
|
|
}
|
|
|
|
if needsDomains {
|
|
a := h.conf.Ownership.AllOwns(sub + "@" + v.sso.Config.Namespace)
|
|
for _, i := range a {
|
|
ps.Set("domain:owns=" + i)
|
|
}
|
|
}
|
|
|
|
noEmailSupport:
|
|
nsSub := sub + "@" + v.sso.Config.Namespace
|
|
ati := uuidNewStringAti()
|
|
accessToken, err := h.signer.GenerateJwt(nsSub, ati, jwt.ClaimStrings{aud}, 15*time.Minute, auth.AccessTokenClaims{
|
|
Perms: ps,
|
|
})
|
|
if err != nil {
|
|
http.Error(rw, "Error generating access token", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
refreshToken, err := h.signer.GenerateJwt(nsSub, uuidNewStringRti(), jwt.ClaimStrings{aud}, 15*time.Minute, auth.RefreshTokenClaims{AccessTokenId: ati})
|
|
if err != nil {
|
|
http.Error(rw, "Error generating refresh token", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
pages.RenderPageTemplate(rw, "flow-callback", map[string]any{
|
|
"ServiceName": h.conf.ServiceName,
|
|
"TargetOrigin": v.target.Url.String(),
|
|
"TargetMessage": v3,
|
|
"AccessToken": accessToken,
|
|
"RefreshToken": refreshToken,
|
|
})
|
|
}
|