| | package github |
| |
|
| | import ( |
| | "bytes" |
| | "context" |
| | "encoding/base64" |
| | "encoding/binary" |
| | "fmt" |
| | "net/http" |
| | "net/url" |
| | "strconv" |
| | "strings" |
| | "time" |
| |
|
| | "github.com/google/go-github/v56/github" |
| | "github.com/pkg/errors" |
| | "github.com/target/goalert/auth" |
| | "github.com/target/goalert/config" |
| | "github.com/target/goalert/util/log" |
| | "golang.org/x/oauth2" |
| | ) |
| |
|
| | const stateCookieName = "goalert_github_auth_state" |
| |
|
| | |
| | func (Provider) Info(ctx context.Context) auth.ProviderInfo { |
| | cfg := config.FromContext(ctx) |
| | return auth.ProviderInfo{ |
| | Title: "GitHub", |
| | Enabled: cfg.GitHub.Enable, |
| | } |
| | } |
| |
|
| | func (p *Provider) newStateToken() (string, error) { |
| | buf := bytes.NewBuffer(nil) |
| | buf.WriteByte('N') |
| |
|
| | tok := p.c.NonceStore.New() |
| | buf.Write(tok[:]) |
| |
|
| | if err := binary.Write(buf, binary.BigEndian, time.Now().Unix()); err != nil { |
| | return "", err |
| | } |
| |
|
| | sig, err := p.c.Keyring.Sign(buf.Bytes()) |
| | if err != nil { |
| | return "", err |
| | } |
| | buf.Write(sig) |
| |
|
| | return base64.URLEncoding.EncodeToString(buf.Bytes()), nil |
| | } |
| |
|
| | func (p *Provider) validateStateToken(ctx context.Context, s string) (bool, error) { |
| | data, err := base64.URLEncoding.DecodeString(s) |
| | if err != nil { |
| | return false, err |
| | } |
| | if len(data) < 25 { |
| | return false, nil |
| | } |
| | valid, _ := p.c.Keyring.Verify(data[:25], data[25:]) |
| | if !valid { |
| | return false, nil |
| | } |
| | if data[0] != 'N' { |
| | return false, nil |
| | } |
| | var id [16]byte |
| | copy(id[:], data[1:]) |
| |
|
| | unix := int64(binary.BigEndian.Uint64(data[17:])) |
| | t := time.Unix(unix, 0) |
| | if time.Since(t) > time.Hour { |
| | return false, nil |
| | } |
| | if time.Until(t) > time.Minute*5 { |
| | |
| | return false, nil |
| | } |
| |
|
| | return p.c.NonceStore.Consume(ctx, id) |
| | } |
| |
|
| | |
| | func (p *Provider) ExtractIdentity(route *auth.RouteInfo, w http.ResponseWriter, req *http.Request) (*auth.Identity, error) { |
| | ctx := req.Context() |
| | cfg := config.FromContext(ctx) |
| |
|
| | switch route.RelativePath { |
| | case "/": |
| | tok, err := p.newStateToken() |
| | if err != nil { |
| | log.Log(req.Context(), errors.Wrap(err, "generate new state token")) |
| | return nil, auth.Error("Failed to generate state token.") |
| | } |
| |
|
| | auth.SetCookie(w, req, stateCookieName, tok, false) |
| | u := authConfig(ctx).AuthCodeURL(tok, oauth2.ApprovalForce) |
| |
|
| | return nil, auth.RedirectURL(u) |
| | case "/callback": |
| | |
| | default: |
| | return nil, auth.Error("Invalid callback URL specified in GitHub application config.") |
| | } |
| |
|
| | tokStr := req.FormValue("state") |
| | stateCookie, err := req.Cookie("goalert_github_auth_state") |
| | if err != nil || stateCookie.Value != tokStr { |
| | return nil, auth.Error("Invalid state token.") |
| | } |
| | auth.ClearCookie(w, req, stateCookieName, false) |
| |
|
| | valid, err := p.validateStateToken(req.Context(), tokStr) |
| | if err != nil { |
| | log.Log(req.Context(), errors.Wrap(err, "validate state token")) |
| | return nil, auth.Error("Could not validate state token.") |
| | } |
| | if !valid { |
| | return nil, auth.Error("Invalid state token.") |
| | } |
| |
|
| | errorDesc := req.FormValue("error_description") |
| | if errorDesc != "" { |
| | return nil, auth.Error(errorDesc) |
| | } |
| |
|
| | oaCfg := authConfig(ctx) |
| |
|
| | tok, err := oaCfg.Exchange(ctx, req.FormValue("code")) |
| | if err != nil { |
| | log.Log(ctx, fmt.Errorf("github: exchange token: %w", err)) |
| | return nil, auth.Error("Failed to get token from GitHub.") |
| | } |
| |
|
| | if !tok.Valid() { |
| | return nil, auth.Error("Invalid token returned from GitHub.") |
| | } |
| |
|
| | c := oaCfg.Client(ctx, tok) |
| | g := github.NewClient(c) |
| | if cfg.GitHub.EnterpriseURL != "" { |
| | g.BaseURL, err = url.Parse(strings.TrimSuffix(cfg.GitHub.EnterpriseURL, "/") + "/api/v3/") |
| | if err != nil { |
| | return nil, err |
| | } |
| | } |
| |
|
| | u, _, err := g.Users.Get(ctx, "") |
| | if err != nil { |
| | log.Log(ctx, fmt.Errorf("github: fetch user: %w", err)) |
| | return nil, auth.Error("Failed to fetch user profile from GitHub.") |
| | } |
| |
|
| | var inUsers bool |
| | login := strings.ToLower(u.GetLogin()) |
| | ctx = log.WithFields(ctx, log.Fields{ |
| | "github_id": u.GetID(), |
| | "github_login": u.GetLogin(), |
| | "github_name": u.GetName(), |
| | }) |
| |
|
| | for _, u := range cfg.GitHub.AllowedUsers { |
| | if u == "*" || login == strings.ToLower(u) { |
| | inUsers = true |
| | break |
| | } |
| | } |
| |
|
| | var inOrg bool |
| | if !inUsers && len(cfg.GitHub.AllowedOrgs) > 0 { |
| | for _, o := range cfg.GitHub.AllowedOrgs { |
| | if strings.Contains(o, "/") { |
| | |
| | continue |
| | } |
| | m, _, err := g.Organizations.IsMember(ctx, o, login) |
| | if err != nil { |
| | log.Log(ctx, errors.Wrap(err, "fetch GitHub org membership")) |
| | return nil, auth.Error("Failed to read GitHub org membership") |
| | } |
| | if m { |
| | inOrg = true |
| | ctx = log.WithField(ctx, "github_org", o) |
| | log.Debugf(ctx, "GitHub Auth matched org") |
| | break |
| | } |
| | } |
| |
|
| | if !inOrg { |
| |
|
| | opt := &github.ListOptions{} |
| | teams := make([]string, 0, 30) |
| |
|
| | CheckTeams: |
| | for { |
| | tm, resp, err := g.Teams.ListUserTeams(ctx, opt) |
| | if err != nil { |
| | log.Log(ctx, errors.Wrap(err, "fetch GitHub teams")) |
| | return nil, auth.Error("Failed to read GitHub team membership") |
| | } |
| | for _, t := range tm { |
| | teamName := strings.ToLower(t.Organization.GetLogin()) + "/" + strings.ToLower(t.GetSlug()) |
| | teams = append(teams, teamName) |
| | if containsOrg(cfg.GitHub.AllowedOrgs, teamName) { |
| | inOrg = true |
| | ctx = log.WithField(ctx, "github_team", teamName) |
| | log.Debugf(ctx, "GitHub Auth matched team") |
| | break CheckTeams |
| | } |
| | } |
| | if resp.NextPage == 0 { |
| | break |
| | } |
| | opt.Page = resp.NextPage |
| | } |
| |
|
| | |
| | if !inOrg { |
| | log.Debugf(log.WithFields(ctx, log.Fields{ |
| | "AllowedOrgs": cfg.GitHub.AllowedOrgs, |
| | "TeamMemberships": teams, |
| | }), "not in any matching team or org") |
| | } |
| | } |
| | } |
| |
|
| | if !inUsers && !inOrg { |
| | return nil, auth.Error("Not a member of an allowed org or whitelisted user.") |
| | } |
| | if strings.TrimSpace(u.GetName()) == "" { |
| | return nil, auth.Error("GitHub user has no display name set.") |
| | } |
| |
|
| | return &auth.Identity{ |
| | Email: u.GetEmail(), |
| | Name: u.GetName(), |
| | SubjectID: strconv.FormatInt(u.GetID(), 10), |
| | }, nil |
| | } |
| |
|