mirror of https://github.com/h44z/wg-portal.git
				
				
				
			
		
			
				
	
	
		
			348 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			348 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			Go
		
	
	
	
| package handlers
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"net/http"
 | |
| 	"net/url"
 | |
| 	"strconv"
 | |
| 	"strings"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/gin-gonic/gin"
 | |
| 	"github.com/h44z/wg-portal/internal/app"
 | |
| 	"github.com/h44z/wg-portal/internal/app/api/v0/model"
 | |
| 	"github.com/h44z/wg-portal/internal/domain"
 | |
| )
 | |
| 
 | |
| type authEndpoint struct {
 | |
| 	app           *app.App
 | |
| 	authenticator *authenticationHandler
 | |
| }
 | |
| 
 | |
| func (e authEndpoint) GetName() string {
 | |
| 	return "AuthEndpoint"
 | |
| }
 | |
| 
 | |
| func (e authEndpoint) RegisterRoutes(g *gin.RouterGroup, authenticator *authenticationHandler) {
 | |
| 	apiGroup := g.Group("/auth")
 | |
| 
 | |
| 	apiGroup.GET("/providers", e.handleExternalLoginProvidersGet())
 | |
| 	apiGroup.GET("/session", e.handleSessionInfoGet())
 | |
| 
 | |
| 	apiGroup.GET("/login/:provider/init", e.handleOauthInitiateGet())
 | |
| 	apiGroup.GET("/login/:provider/callback", e.handleOauthCallbackGet())
 | |
| 
 | |
| 	apiGroup.POST("/login", e.handleLoginPost())
 | |
| 	apiGroup.POST("/logout", authenticator.LoggedIn(), e.handleLogoutPost())
 | |
| }
 | |
| 
 | |
| // handleExternalLoginProvidersGet returns a gorm handler function.
 | |
| //
 | |
| // @ID auth_handleExternalLoginProvidersGet
 | |
| // @Tags Authentication
 | |
| // @Summary Get all available external login providers.
 | |
| // @Produce json
 | |
| // @Success 200 {object} []model.LoginProviderInfo
 | |
| // @Router /auth/providers [get]
 | |
| func (e authEndpoint) handleExternalLoginProvidersGet() gin.HandlerFunc {
 | |
| 	return func(c *gin.Context) {
 | |
| 		ctx := domain.SetUserInfoFromGin(c)
 | |
| 		providers := e.app.Authenticator.GetExternalLoginProviders(ctx)
 | |
| 
 | |
| 		c.JSON(http.StatusOK, model.NewLoginProviderInfos(providers))
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // handleSessionInfoGet returns a gorm handler function.
 | |
| //
 | |
| // @ID auth_handleSessionInfoGet
 | |
| // @Tags Authentication
 | |
| // @Summary Get information about the currently logged-in user.
 | |
| // @Produce json
 | |
| // @Success 200 {object} []model.SessionInfo
 | |
| // @Failure 500 {object} model.Error
 | |
| // @Router /auth/session [get]
 | |
| func (e authEndpoint) handleSessionInfoGet() gin.HandlerFunc {
 | |
| 	return func(c *gin.Context) {
 | |
| 		currentSession := e.authenticator.Session.GetData(c)
 | |
| 
 | |
| 		var loggedInUid *string
 | |
| 		var firstname *string
 | |
| 		var lastname *string
 | |
| 		var email *string
 | |
| 
 | |
| 		if currentSession.LoggedIn {
 | |
| 			uid := currentSession.UserIdentifier
 | |
| 			f := currentSession.Firstname
 | |
| 			l := currentSession.Lastname
 | |
| 			e := currentSession.Email
 | |
| 			loggedInUid = &uid
 | |
| 			firstname = &f
 | |
| 			lastname = &l
 | |
| 			email = &e
 | |
| 		}
 | |
| 
 | |
| 		c.JSON(http.StatusOK, model.SessionInfo{
 | |
| 			LoggedIn:       currentSession.LoggedIn,
 | |
| 			IsAdmin:        currentSession.IsAdmin,
 | |
| 			UserIdentifier: loggedInUid,
 | |
| 			UserFirstname:  firstname,
 | |
| 			UserLastname:   lastname,
 | |
| 			UserEmail:      email,
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // handleOauthInitiateGet returns a gorm handler function.
 | |
| //
 | |
| // @ID auth_handleOauthInitiateGet
 | |
| // @Tags Authentication
 | |
| // @Summary Initiate the OAuth login flow.
 | |
| // @Produce json
 | |
| // @Success 200 {object} []model.LoginProviderInfo
 | |
| // @Router /auth/{provider}/init [get]
 | |
| func (e authEndpoint) handleOauthInitiateGet() gin.HandlerFunc {
 | |
| 	return func(c *gin.Context) {
 | |
| 		currentSession := e.authenticator.Session.GetData(c)
 | |
| 
 | |
| 		autoRedirect, _ := strconv.ParseBool(c.DefaultQuery("redirect", "false"))
 | |
| 		returnTo := c.Query("return")
 | |
| 		provider := c.Param("provider")
 | |
| 
 | |
| 		var returnUrl *url.URL
 | |
| 		var returnParams string
 | |
| 		redirectToReturn := func() {
 | |
| 			c.Redirect(http.StatusFound, returnUrl.String()+"?"+returnParams)
 | |
| 		}
 | |
| 
 | |
| 		if returnTo != "" {
 | |
| 			if !e.isValidReturnUrl(returnTo) {
 | |
| 				c.JSON(http.StatusBadRequest, model.Error{Code: http.StatusBadRequest, Message: "invalid return URL"})
 | |
| 				return
 | |
| 			}
 | |
| 			if u, err := url.Parse(returnTo); err == nil {
 | |
| 				returnUrl = u
 | |
| 			}
 | |
| 			queryParams := returnUrl.Query()
 | |
| 			queryParams.Set("wgLoginState", "err") // by default, we set the state to error
 | |
| 			returnUrl.RawQuery = ""                // remove potential query params
 | |
| 			returnParams = queryParams.Encode()
 | |
| 		}
 | |
| 
 | |
| 		if currentSession.LoggedIn {
 | |
| 			if autoRedirect && e.isValidReturnUrl(returnTo) {
 | |
| 				queryParams := returnUrl.Query()
 | |
| 				queryParams.Set("wgLoginState", "success")
 | |
| 				returnParams = queryParams.Encode()
 | |
| 				redirectToReturn()
 | |
| 			} else {
 | |
| 				c.JSON(http.StatusBadRequest, model.Error{Code: http.StatusBadRequest, Message: "already logged in"})
 | |
| 			}
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		ctx := domain.SetUserInfoFromGin(c)
 | |
| 		authCodeUrl, state, nonce, err := e.app.Authenticator.OauthLoginStep1(ctx, provider)
 | |
| 		if err != nil {
 | |
| 			if autoRedirect && e.isValidReturnUrl(returnTo) {
 | |
| 				redirectToReturn()
 | |
| 			} else {
 | |
| 				c.JSON(http.StatusInternalServerError,
 | |
| 					model.Error{Code: http.StatusInternalServerError, Message: err.Error()})
 | |
| 			}
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		authSession := e.authenticator.Session.DefaultSessionData()
 | |
| 		authSession.OauthState = state
 | |
| 		authSession.OauthNonce = nonce
 | |
| 		authSession.OauthProvider = provider
 | |
| 		authSession.OauthReturnTo = returnTo
 | |
| 		e.authenticator.Session.SetData(c, authSession)
 | |
| 
 | |
| 		if autoRedirect {
 | |
| 			c.Redirect(http.StatusFound, authCodeUrl)
 | |
| 		} else {
 | |
| 			c.JSON(http.StatusOK, model.OauthInitiationResponse{
 | |
| 				RedirectUrl: authCodeUrl,
 | |
| 				State:       state,
 | |
| 			})
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // handleOauthCallbackGet returns a gorm handler function.
 | |
| //
 | |
| // @ID auth_handleOauthCallbackGet
 | |
| // @Tags Authentication
 | |
| // @Summary Handle the OAuth callback.
 | |
| // @Produce json
 | |
| // @Success 200 {object} []model.LoginProviderInfo
 | |
| // @Router /auth/{provider}/callback [get]
 | |
| func (e authEndpoint) handleOauthCallbackGet() gin.HandlerFunc {
 | |
| 	return func(c *gin.Context) {
 | |
| 		currentSession := e.authenticator.Session.GetData(c)
 | |
| 
 | |
| 		var returnUrl *url.URL
 | |
| 		var returnParams string
 | |
| 		redirectToReturn := func() {
 | |
| 			c.Redirect(http.StatusFound, returnUrl.String()+"?"+returnParams)
 | |
| 		}
 | |
| 
 | |
| 		if currentSession.OauthReturnTo != "" {
 | |
| 			if u, err := url.Parse(currentSession.OauthReturnTo); err == nil {
 | |
| 				returnUrl = u
 | |
| 			}
 | |
| 			queryParams := returnUrl.Query()
 | |
| 			queryParams.Set("wgLoginState", "err") // by default, we set the state to error
 | |
| 			returnUrl.RawQuery = ""                // remove potential query params
 | |
| 			returnParams = queryParams.Encode()
 | |
| 		}
 | |
| 
 | |
| 		if currentSession.LoggedIn {
 | |
| 			if returnUrl != nil && e.isValidReturnUrl(returnUrl.String()) {
 | |
| 				queryParams := returnUrl.Query()
 | |
| 				queryParams.Set("wgLoginState", "success")
 | |
| 				returnParams = queryParams.Encode()
 | |
| 				redirectToReturn()
 | |
| 			} else {
 | |
| 				c.JSON(http.StatusBadRequest, model.Error{Message: "already logged in"})
 | |
| 			}
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		provider := c.Param("provider")
 | |
| 		oauthCode := c.Query("code")
 | |
| 		oauthState := c.Query("state")
 | |
| 
 | |
| 		if provider != currentSession.OauthProvider {
 | |
| 			if returnUrl != nil && e.isValidReturnUrl(returnUrl.String()) {
 | |
| 				redirectToReturn()
 | |
| 			} else {
 | |
| 				c.JSON(http.StatusBadRequest,
 | |
| 					model.Error{Code: http.StatusBadRequest, Message: "invalid oauth provider"})
 | |
| 			}
 | |
| 			return
 | |
| 		}
 | |
| 		if oauthState != currentSession.OauthState {
 | |
| 			if returnUrl != nil && e.isValidReturnUrl(returnUrl.String()) {
 | |
| 				redirectToReturn()
 | |
| 			} else {
 | |
| 				c.JSON(http.StatusBadRequest, model.Error{Code: http.StatusBadRequest, Message: "invalid oauth state"})
 | |
| 			}
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		loginCtx, cancel := context.WithTimeout(context.Background(), 1000*time.Second)
 | |
| 		user, err := e.app.Authenticator.OauthLoginStep2(loginCtx, provider, currentSession.OauthNonce, oauthCode)
 | |
| 		cancel()
 | |
| 		if err != nil {
 | |
| 			if returnUrl != nil && e.isValidReturnUrl(returnUrl.String()) {
 | |
| 				redirectToReturn()
 | |
| 			} else {
 | |
| 				c.JSON(http.StatusUnauthorized, model.Error{Code: http.StatusUnauthorized, Message: err.Error()})
 | |
| 			}
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		e.setAuthenticatedUser(c, user)
 | |
| 
 | |
| 		if returnUrl != nil && e.isValidReturnUrl(returnUrl.String()) {
 | |
| 			queryParams := returnUrl.Query()
 | |
| 			queryParams.Set("wgLoginState", "success")
 | |
| 			returnParams = queryParams.Encode()
 | |
| 			redirectToReturn()
 | |
| 		} else {
 | |
| 			c.JSON(http.StatusOK, user)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (e authEndpoint) setAuthenticatedUser(c *gin.Context, user *domain.User) {
 | |
| 	currentSession := e.authenticator.Session.GetData(c)
 | |
| 
 | |
| 	currentSession.LoggedIn = true
 | |
| 	currentSession.IsAdmin = user.IsAdmin
 | |
| 	currentSession.UserIdentifier = string(user.Identifier)
 | |
| 	currentSession.Firstname = user.Firstname
 | |
| 	currentSession.Lastname = user.Lastname
 | |
| 	currentSession.Email = user.Email
 | |
| 
 | |
| 	currentSession.OauthState = ""
 | |
| 	currentSession.OauthNonce = ""
 | |
| 	currentSession.OauthProvider = ""
 | |
| 	currentSession.OauthReturnTo = ""
 | |
| 
 | |
| 	e.authenticator.Session.SetData(c, currentSession)
 | |
| }
 | |
| 
 | |
| // handleLoginPost returns a gorm handler function.
 | |
| //
 | |
| // @ID auth_handleLoginPost
 | |
| // @Tags Authentication
 | |
| // @Summary Get all available external login providers.
 | |
| // @Produce json
 | |
| // @Success 200 {object} []model.LoginProviderInfo
 | |
| // @Router /auth/login [post]
 | |
| func (e authEndpoint) handleLoginPost() gin.HandlerFunc {
 | |
| 	return func(c *gin.Context) {
 | |
| 		currentSession := e.authenticator.Session.GetData(c)
 | |
| 		if currentSession.LoggedIn {
 | |
| 			c.JSON(http.StatusOK, model.Error{Code: http.StatusOK, Message: "already logged in"})
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		var loginData struct {
 | |
| 			Username string `json:"username" binding:"required,min=2"`
 | |
| 			Password string `json:"password" binding:"required,min=4"`
 | |
| 		}
 | |
| 
 | |
| 		if err := c.ShouldBindJSON(&loginData); err != nil {
 | |
| 			c.JSON(http.StatusBadRequest, model.Error{Code: http.StatusBadRequest, Message: err.Error()})
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		ctx := domain.SetUserInfoFromGin(c)
 | |
| 		user, err := e.app.Authenticator.PlainLogin(ctx, loginData.Username, loginData.Password)
 | |
| 		if err != nil {
 | |
| 			c.JSON(http.StatusUnauthorized, model.Error{Code: http.StatusUnauthorized, Message: "login failed"})
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		e.setAuthenticatedUser(c, user)
 | |
| 
 | |
| 		c.JSON(http.StatusOK, user)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // handleLogoutPost returns a gorm handler function.
 | |
| //
 | |
| // @ID auth_handleLogoutGet
 | |
| // @Tags Authentication
 | |
| // @Summary Get all available external login providers.
 | |
| // @Produce json
 | |
| // @Success 200 {object} []model.LoginProviderInfo
 | |
| // @Router /auth/logout [get]
 | |
| func (e authEndpoint) handleLogoutPost() gin.HandlerFunc {
 | |
| 	return func(c *gin.Context) {
 | |
| 		currentSession := e.authenticator.Session.GetData(c)
 | |
| 
 | |
| 		if !currentSession.LoggedIn { // Not logged in
 | |
| 			c.JSON(http.StatusOK, model.Error{Code: http.StatusOK, Message: "not logged in"})
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		e.authenticator.Session.DestroyData(c)
 | |
| 		c.JSON(http.StatusOK, model.Error{Code: http.StatusOK, Message: "logout ok"})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // isValidReturnUrl checks if the given return URL matches the configured external URL of the application.
 | |
| func (e authEndpoint) isValidReturnUrl(returnUrl string) bool {
 | |
| 	if !strings.HasPrefix(returnUrl, e.app.Config.Web.ExternalUrl) {
 | |
| 		return false
 | |
| 	}
 | |
| 
 | |
| 	return true
 | |
| }
 |