mirror of https://github.com/matrix-org/go-neb.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
194 lines
5.1 KiB
194 lines
5.1 KiB
package realms
|
|
|
|
import (
|
|
"crypto/rand"
|
|
"encoding/hex"
|
|
"encoding/json"
|
|
log "github.com/Sirupsen/logrus"
|
|
"github.com/matrix-org/go-neb/database"
|
|
"github.com/matrix-org/go-neb/types"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"net/url"
|
|
)
|
|
|
|
// GithubRealm can handle OAuth processes with github.com
|
|
type GithubRealm struct {
|
|
id string
|
|
redirectURL string
|
|
ClientSecret string
|
|
ClientID string
|
|
StarterLink string
|
|
}
|
|
|
|
// GithubSession represents an authenticated github session
|
|
type GithubSession struct {
|
|
// AccessToken is the github access token for the user
|
|
AccessToken string
|
|
// Scopes are the set of *ALLOWED* scopes (which may not be the same as the requested scopes)
|
|
Scopes string
|
|
id string
|
|
userID string
|
|
realmID string
|
|
}
|
|
|
|
// Authenticated returns true if the user has completed the auth process
|
|
func (s *GithubSession) Authenticated() bool {
|
|
return s.AccessToken != ""
|
|
}
|
|
|
|
// UserID returns the user_id who authorised with Github
|
|
func (s *GithubSession) UserID() string {
|
|
return s.userID
|
|
}
|
|
|
|
// RealmID returns the realm ID of the realm which performed the authentication
|
|
func (s *GithubSession) RealmID() string {
|
|
return s.realmID
|
|
}
|
|
|
|
// ID returns the session ID
|
|
func (s *GithubSession) ID() string {
|
|
return s.id
|
|
}
|
|
|
|
// ID returns the realm ID
|
|
func (r *GithubRealm) ID() string {
|
|
return r.id
|
|
}
|
|
|
|
// Type is github
|
|
func (r *GithubRealm) Type() string {
|
|
return "github"
|
|
}
|
|
|
|
// Init does nothing.
|
|
func (r *GithubRealm) Init() error {
|
|
return nil
|
|
}
|
|
|
|
// Register does nothing.
|
|
func (r *GithubRealm) Register() error {
|
|
return nil
|
|
}
|
|
|
|
// RequestAuthSession generates an OAuth2 URL for this user to auth with github via.
|
|
func (r *GithubRealm) RequestAuthSession(userID string, req json.RawMessage) interface{} {
|
|
state, err := randomString(10)
|
|
if err != nil {
|
|
log.WithError(err).Print("Failed to generate state param")
|
|
return nil
|
|
}
|
|
u, _ := url.Parse("https://github.com/login/oauth/authorize")
|
|
q := u.Query()
|
|
q.Set("client_id", r.ClientID)
|
|
q.Set("client_secret", r.ClientSecret)
|
|
q.Set("state", state)
|
|
q.Set("redirect_uri", r.redirectURL)
|
|
u.RawQuery = q.Encode()
|
|
session := &GithubSession{
|
|
id: state, // key off the state for redirects
|
|
userID: userID,
|
|
realmID: r.ID(),
|
|
}
|
|
_, err = database.GetServiceDB().StoreAuthSession(session)
|
|
if err != nil {
|
|
log.WithError(err).Print("Failed to store new auth session")
|
|
return nil
|
|
}
|
|
|
|
return &struct {
|
|
URL string
|
|
}{u.String()}
|
|
}
|
|
|
|
// OnReceiveRedirect processes OAuth redirect requests from Github
|
|
func (r *GithubRealm) OnReceiveRedirect(w http.ResponseWriter, req *http.Request) {
|
|
// parse out params from the request
|
|
code := req.URL.Query().Get("code")
|
|
state := req.URL.Query().Get("state")
|
|
logger := log.WithFields(log.Fields{
|
|
"state": state,
|
|
})
|
|
logger.WithField("code", code).Print("GithubRealm: OnReceiveRedirect")
|
|
if code == "" || state == "" {
|
|
failWith(logger, w, 400, "code and state are required", nil)
|
|
return
|
|
}
|
|
// load the session (we keyed off the state param)
|
|
session, err := database.GetServiceDB().LoadAuthSessionByID(r.ID(), state)
|
|
if err != nil {
|
|
// most likely cause
|
|
failWith(logger, w, 400, "Provided ?state= param is not recognised.", err)
|
|
return
|
|
}
|
|
ghSession, ok := session.(*GithubSession)
|
|
if !ok {
|
|
failWith(logger, w, 500, "Unexpected session found.", nil)
|
|
return
|
|
}
|
|
logger.WithField("user_id", ghSession.UserID()).Print("Mapped redirect to user")
|
|
|
|
// exchange code for access_token
|
|
res, err := http.PostForm("https://github.com/login/oauth/access_token",
|
|
url.Values{"client_id": {r.ClientID}, "client_secret": {r.ClientSecret}, "code": {code}})
|
|
if err != nil {
|
|
failWith(logger, w, 502, "Failed to exchange code for token", err)
|
|
return
|
|
}
|
|
defer res.Body.Close()
|
|
body, err := ioutil.ReadAll(res.Body)
|
|
if err != nil {
|
|
failWith(logger, w, 502, "Failed to read token response", err)
|
|
return
|
|
}
|
|
vals, err := url.ParseQuery(string(body))
|
|
if err != nil {
|
|
failWith(logger, w, 502, "Failed to parse token response", err)
|
|
return
|
|
}
|
|
|
|
// update database and return
|
|
ghSession.AccessToken = vals.Get("access_token")
|
|
ghSession.Scopes = vals.Get("scope")
|
|
logger.WithField("scope", ghSession.Scopes).Print("Scopes granted.")
|
|
_, err = database.GetServiceDB().StoreAuthSession(ghSession)
|
|
if err != nil {
|
|
failWith(logger, w, 500, "Failed to persist session", err)
|
|
return
|
|
}
|
|
w.WriteHeader(200)
|
|
w.Write([]byte("OK!"))
|
|
}
|
|
|
|
// AuthSession returns a GithubSession for this user
|
|
func (r *GithubRealm) AuthSession(id, userID, realmID string) types.AuthSession {
|
|
return &GithubSession{
|
|
id: id,
|
|
userID: userID,
|
|
realmID: realmID,
|
|
}
|
|
}
|
|
|
|
func failWith(logger *log.Entry, w http.ResponseWriter, code int, msg string, err error) {
|
|
logger.WithError(err).Print(msg)
|
|
w.WriteHeader(code)
|
|
w.Write([]byte(msg))
|
|
}
|
|
|
|
// Generate a cryptographically secure pseudorandom string with the given number of bytes (length).
|
|
// Returns a hex string of the bytes.
|
|
func randomString(length int) (string, error) {
|
|
b := make([]byte, length)
|
|
_, err := rand.Read(b)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return hex.EncodeToString(b), nil
|
|
}
|
|
|
|
func init() {
|
|
types.RegisterAuthRealm(func(realmID, redirectURL string) types.AuthRealm {
|
|
return &GithubRealm{id: realmID, redirectURL: redirectURL}
|
|
})
|
|
}
|