| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525 |
- package service
- import (
- "context"
- "encoding/json"
- "errors"
- "github.com/coreos/go-oidc/v3/oidc"
- "github.com/lejianwen/rustdesk-api/v2/model"
- "github.com/lejianwen/rustdesk-api/v2/utils"
- "golang.org/x/oauth2"
- "golang.org/x/oauth2/github"
- // "golang.org/x/oauth2/google"
- "gorm.io/gorm"
- // "io"
- "fmt"
- "net/http"
- "net/url"
- "strconv"
- "strings"
- "sync"
- "time"
- )
- type OauthService struct {
- }
- // Define a struct to parse the .well-known/openid-configuration response
- type OidcEndpoint struct {
- Issuer string `json:"issuer"`
- AuthURL string `json:"authorization_endpoint"`
- TokenURL string `json:"token_endpoint"`
- UserInfo string `json:"userinfo_endpoint"`
- }
- type OauthCacheItem struct {
- UserId uint `json:"user_id"`
- Id string `json:"id"` //rustdesk的设备ID
- Op string `json:"op"`
- Action string `json:"action"`
- Uuid string `json:"uuid"`
- DeviceName string `json:"device_name"`
- DeviceOs string `json:"device_os"`
- DeviceType string `json:"device_type"`
- OpenId string `json:"open_id"`
- Username string `json:"username"`
- Name string `json:"name"`
- Email string `json:"email"`
- Verifier string `json:"verifier"` // used for oauth pkce
- Nonce string `json:"nonce"`
- }
- func (oci *OauthCacheItem) ToOauthUser() *model.OauthUser {
- return &model.OauthUser{
- OpenId: oci.OpenId,
- Username: oci.Username,
- Name: oci.Name,
- Email: oci.Email,
- }
- }
- var OauthCache = &sync.Map{}
- const (
- OauthActionTypeLogin = "login"
- OauthActionTypeBind = "bind"
- )
- func (oci *OauthCacheItem) UpdateFromOauthUser(oauthUser *model.OauthUser) {
- oci.OpenId = oauthUser.OpenId
- oci.Username = oauthUser.Username
- oci.Name = oauthUser.Name
- oci.Email = oauthUser.Email
- }
- func (os *OauthService) GetOauthCache(key string) *OauthCacheItem {
- v, ok := OauthCache.Load(key)
- if !ok {
- return nil
- }
- return v.(*OauthCacheItem)
- }
- func (os *OauthService) SetOauthCache(key string, item *OauthCacheItem, expire uint) {
- OauthCache.Store(key, item)
- if expire > 0 {
- time.AfterFunc(time.Duration(expire)*time.Second, func() {
- os.DeleteOauthCache(key)
- })
- }
- }
- func (os *OauthService) DeleteOauthCache(key string) {
- OauthCache.Delete(key)
- }
- func (os *OauthService) BeginAuth(op string) (error error, state, verifier, nonce, url string) {
- state = utils.RandomString(10) + strconv.FormatInt(time.Now().Unix(), 10)
- verifier = ""
- nonce = ""
- if op == model.OauthTypeWebauth {
- url = Config.Rustdesk.ApiServer + "/_admin/#/oauth/" + state
- //url = "http://localhost:8888/_admin/#/oauth/" + code
- return nil, state, verifier, nonce, url
- }
- err, oauthInfo, oauthConfig, _ := os.GetOauthConfig(op)
- if err == nil {
- extras := make([]oauth2.AuthCodeOption, 0, 3)
- nonce = utils.RandomString(10)
- extras = append(extras, oauth2.SetAuthURLParam("nonce", nonce))
- if oauthInfo.PkceEnable != nil && *oauthInfo.PkceEnable {
- extras = append(extras, oauth2.AccessTypeOffline)
- verifier = oauth2.GenerateVerifier()
- switch oauthInfo.PkceMethod {
- case model.PKCEMethodS256:
- extras = append(extras, oauth2.S256ChallengeOption(verifier))
- case model.PKCEMethodPlain:
- // oauth2 does not have a plain challenge option, so we add it manually
- extras = append(extras, oauth2.SetAuthURLParam("code_challenge_method", "plain"), oauth2.SetAuthURLParam("code_challenge", verifier))
- }
- }
- return err, state, verifier, nonce, oauthConfig.AuthCodeURL(state, extras...)
- }
- return err, state, verifier, nonce, ""
- }
- func (os *OauthService) FetchOidcProvider(issuer string) (error, *oidc.Provider) {
- // Get the HTTP client (with or without proxy based on configuration)
- client := getHTTPClientWithProxy()
- ctx := oidc.ClientContext(context.Background(), client)
- provider, err := oidc.NewProvider(ctx, issuer)
- if err != nil {
- return err, nil
- }
- return nil, provider
- }
- func (os *OauthService) GithubProvider() *oidc.Provider {
- return (&oidc.ProviderConfig{
- IssuerURL: "",
- AuthURL: github.Endpoint.AuthURL,
- TokenURL: github.Endpoint.TokenURL,
- DeviceAuthURL: github.Endpoint.DeviceAuthURL,
- UserInfoURL: model.UserEndpointGithub,
- JWKSURL: "",
- Algorithms: nil,
- }).NewProvider(context.Background())
- }
- func (os *OauthService) LinuxdoProvider() *oidc.Provider {
- return (&oidc.ProviderConfig{
- IssuerURL: "",
- AuthURL: "https://connect.linux.do/oauth2/authorize",
- TokenURL: "https://connect.linux.do/oauth2/token",
- DeviceAuthURL: "",
- UserInfoURL: model.UserEndpointLinuxdo,
- JWKSURL: "",
- Algorithms: nil,
- }).NewProvider(context.Background())
- }
- // GetOauthConfig retrieves the OAuth2 configuration based on the provider name
- func (os *OauthService) GetOauthConfig(op string) (err error, oauthInfo *model.Oauth, oauthConfig *oauth2.Config, provider *oidc.Provider) {
- //err, oauthInfo, oauthConfig = os.getOauthConfigGeneral(op)
- oauthInfo = os.InfoByOp(op)
- if oauthInfo.Id == 0 || oauthInfo.ClientId == "" || oauthInfo.ClientSecret == "" {
- return errors.New("ConfigNotFound"), nil, nil, nil
- }
- // If the redirect URL is empty, use the default redirect URL
- if oauthInfo.RedirectUrl == "" {
- oauthInfo.RedirectUrl = Config.Rustdesk.ApiServer + "/api/oidc/callback"
- }
- oauthConfig = &oauth2.Config{
- ClientID: oauthInfo.ClientId,
- ClientSecret: oauthInfo.ClientSecret,
- RedirectURL: oauthInfo.RedirectUrl,
- }
- // Maybe should validate the oauthConfig here
- oauthType := oauthInfo.OauthType
- err = model.ValidateOauthType(oauthType)
- if err != nil {
- return err, nil, nil, nil
- }
- switch oauthType {
- case model.OauthTypeGithub:
- oauthConfig.Endpoint = github.Endpoint
- oauthConfig.Scopes = []string{"read:user", "user:email"}
- provider = os.GithubProvider()
- case model.OauthTypeLinuxdo:
- provider = os.LinuxdoProvider()
- oauthConfig.Endpoint = provider.Endpoint()
- oauthConfig.Scopes = []string{"profile"}
- //case model.OauthTypeGoogle: //google单独出来,可以少一次FetchOidcEndpoint请求
- // oauthConfig.Endpoint = google.Endpoint
- // oauthConfig.Scopes = os.constructScopes(oauthInfo.Scopes)
- case model.OauthTypeOidc, model.OauthTypeGoogle:
- err, provider = os.FetchOidcProvider(oauthInfo.Issuer)
- if err != nil {
- return err, nil, nil, nil
- }
- oauthConfig.Endpoint = provider.Endpoint()
- oauthConfig.Scopes = os.constructScopes(oauthInfo.Scopes)
- default:
- return errors.New("unsupported OAuth type"), nil, nil, nil
- }
- return nil, oauthInfo, oauthConfig, provider
- }
- func getHTTPClientWithProxy() *http.Client {
- //add timeout 30s
- timeout := time.Duration(60) * time.Second
- if Config.Proxy.Enable {
- if Config.Proxy.Host == "" {
- Logger.Warn("Proxy is enabled but proxy host is empty.")
- return http.DefaultClient
- }
- proxyURL, err := url.Parse(Config.Proxy.Host)
- if err != nil {
- Logger.Warn("Invalid proxy URL: ", err)
- return http.DefaultClient
- }
- transport := &http.Transport{
- Proxy: http.ProxyURL(proxyURL),
- }
- return &http.Client{Transport: transport, Timeout: timeout}
- }
- return http.DefaultClient
- }
- func (os *OauthService) callbackBase(oauthConfig *oauth2.Config, provider *oidc.Provider, code string, verifier string, nonce string, userData interface{}) (err error, client *http.Client) {
- // 设置代理客户端
- httpClient := getHTTPClientWithProxy()
- ctx := context.WithValue(context.Background(), oauth2.HTTPClient, httpClient)
- exchangeOpts := make([]oauth2.AuthCodeOption, 0, 1)
- if verifier != "" {
- exchangeOpts = append(exchangeOpts, oauth2.VerifierOption(verifier))
- }
- token, err := oauthConfig.Exchange(ctx, code, exchangeOpts...)
- if err != nil {
- Logger.Warn("oauthConfig.Exchange() failed: ", err)
- return errors.New("GetOauthTokenError"), nil
- }
- // 获取 ID Token, github没有id_token
- rawIDToken, ok := token.Extra("id_token").(string)
- if ok && rawIDToken != "" {
- // 验证 ID Token
- v := provider.Verifier(&oidc.Config{ClientID: oauthConfig.ClientID})
- idToken, err2 := v.Verify(ctx, rawIDToken)
- if err2 != nil {
- Logger.Warn("IdTokenVerifyError: ", err2)
- return errors.New("IdTokenVerifyError"), nil
- }
- if nonce != "" {
- // 验证 nonce
- var claims struct {
- Nonce string `json:"nonce"`
- }
- if err2 = idToken.Claims(&claims); err2 != nil {
- Logger.Warn("Failed to parse ID Token claims: ", err)
- return errors.New("IDTokenClaimsError"), nil
- }
- if claims.Nonce != nonce {
- Logger.Warn("Nonce does not match")
- return errors.New("NonceDoesNotMatch"), nil
- }
- }
- }
- // 获取用户信息
- client = oauthConfig.Client(ctx, token)
- resp, err := client.Get(provider.UserInfoEndpoint())
- if err != nil {
- Logger.Warn("failed getting user info: ", err)
- return errors.New("GetOauthUserInfoError"), nil
- }
- defer func() {
- if closeErr := resp.Body.Close(); closeErr != nil {
- Logger.Warn("failed closing response body: ", closeErr)
- }
- }()
- // 解析用户信息
- if err = json.NewDecoder(resp.Body).Decode(userData); err != nil {
- Logger.Warn("failed decoding user info: ", err)
- return errors.New("DecodeOauthUserInfoError"), nil
- }
- return nil, client
- }
- // githubCallback github回调
- func (os *OauthService) githubCallback(oauthConfig *oauth2.Config, provider *oidc.Provider, code, verifier, nonce string) (error, *model.OauthUser) {
- var user = &model.GithubUser{}
- err, client := os.callbackBase(oauthConfig, provider, code, verifier, nonce, user)
- if err != nil {
- return err, nil
- }
- err = os.getGithubPrimaryEmail(client, user)
- if err != nil {
- return err, nil
- }
- return nil, user.ToOauthUser()
- }
- // linuxdoCallback linux.do回调
- func (os *OauthService) linuxdoCallback(oauthConfig *oauth2.Config, provider *oidc.Provider, code, verifier, nonce string) (error, *model.OauthUser) {
- var user = &model.LinuxdoUser{}
- err, _ := os.callbackBase(oauthConfig, provider, code, verifier, nonce, user)
- if err != nil {
- return err, nil
- }
- return nil, user.ToOauthUser()
- }
- // oidcCallback oidc回调, 通过code获取用户信息
- func (os *OauthService) oidcCallback(oauthConfig *oauth2.Config, provider *oidc.Provider, code, verifier, nonce string) (error, *model.OauthUser) {
- var user = &model.OidcUser{}
- if err, _ := os.callbackBase(oauthConfig, provider, code, verifier, nonce, user); err != nil {
- return err, nil
- }
- return nil, user.ToOauthUser()
- }
- // Callback: Get user information by code and op(Oauth provider)
- func (os *OauthService) Callback(code, verifier, op, nonce string) (err error, oauthUser *model.OauthUser) {
- err, oauthInfo, oauthConfig, provider := os.GetOauthConfig(op)
- // oauthType is already validated in GetOauthConfig
- if err != nil {
- return err, nil
- }
- oauthType := oauthInfo.OauthType
- switch oauthType {
- case model.OauthTypeGithub:
- err, oauthUser = os.githubCallback(oauthConfig, provider, code, verifier, nonce)
- case model.OauthTypeLinuxdo:
- err, oauthUser = os.linuxdoCallback(oauthConfig, provider, code, verifier, nonce)
- case model.OauthTypeOidc, model.OauthTypeGoogle:
- err, oauthUser = os.oidcCallback(oauthConfig, provider, code, verifier, nonce)
- default:
- return errors.New("unsupported OAuth type"), nil
- }
- return err, oauthUser
- }
- func (os *OauthService) UserThirdInfo(op string, openId string) *model.UserThird {
- ut := &model.UserThird{}
- DB.Where("open_id = ? and op = ?", openId, op).First(ut)
- return ut
- }
- // BindOauthUser: Bind third party account
- func (os *OauthService) BindOauthUser(userId uint, oauthUser *model.OauthUser, op string) error {
- utr := &model.UserThird{}
- err, oauthType := os.GetTypeByOp(op)
- if err != nil {
- return err
- }
- utr.FromOauthUser(userId, oauthUser, oauthType, op)
- return DB.Create(utr).Error
- }
- // UnBindOauthUser: Unbind third party account
- func (os *OauthService) UnBindOauthUser(userId uint, op string) error {
- return os.UnBindThird(op, userId)
- }
- // UnBindThird: Unbind third party account
- func (os *OauthService) UnBindThird(op string, userId uint) error {
- return DB.Where("user_id = ? and op = ?", userId, op).Delete(&model.UserThird{}).Error
- }
- // DeleteUserByUserId: When user is deleted, delete all third party bindings
- func (os *OauthService) DeleteUserByUserId(userId uint) error {
- return DB.Where("user_id = ?", userId).Delete(&model.UserThird{}).Error
- }
- // InfoById 根据id获取Oauth信息
- func (os *OauthService) InfoById(id uint) *model.Oauth {
- oauthInfo := &model.Oauth{}
- DB.Where("id = ?", id).First(oauthInfo)
- return oauthInfo
- }
- // InfoByOp 根据op获取Oauth信息
- func (os *OauthService) InfoByOp(op string) *model.Oauth {
- oauthInfo := &model.Oauth{}
- DB.Where("op = ?", op).First(oauthInfo)
- return oauthInfo
- }
- // Helper function to get scopes by operation
- func (os *OauthService) getScopesByOp(op string) []string {
- scopes := os.InfoByOp(op).Scopes
- return os.constructScopes(scopes)
- }
- // Helper function to construct scopes
- func (os *OauthService) constructScopes(scopes string) []string {
- scopes = strings.TrimSpace(scopes)
- if scopes == "" {
- scopes = model.OIDC_DEFAULT_SCOPES
- }
- return strings.Split(scopes, ",")
- }
- func (os *OauthService) List(page, pageSize uint, where func(tx *gorm.DB)) (res *model.OauthList) {
- res = &model.OauthList{}
- res.Page = int64(page)
- res.PageSize = int64(pageSize)
- tx := DB.Model(&model.Oauth{})
- if where != nil {
- where(tx)
- }
- tx.Count(&res.Total)
- tx.Scopes(Paginate(page, pageSize))
- tx.Find(&res.Oauths)
- return
- }
- // GetTypeByOp 根据op获取OauthType
- func (os *OauthService) GetTypeByOp(op string) (error, string) {
- oauthInfo := &model.Oauth{}
- if DB.Where("op = ?", op).First(oauthInfo).Error != nil {
- return fmt.Errorf("OAuth provider with op '%s' not found", op), ""
- }
- return nil, oauthInfo.OauthType
- }
- // ValidateOauthProvider 验证Oauth提供者是否正确
- func (os *OauthService) ValidateOauthProvider(op string) error {
- if !os.IsOauthProviderExist(op) {
- return fmt.Errorf("OAuth provider with op '%s' not found", op)
- }
- return nil
- }
- // IsOauthProviderExist 验证Oauth提供者是否存在
- func (os *OauthService) IsOauthProviderExist(op string) bool {
- oauthInfo := &model.Oauth{}
- // 使用 Gorm 的 Take 方法查找符合条件的记录
- if err := DB.Where("op = ?", op).Take(oauthInfo).Error; err != nil {
- return false
- }
- return true
- }
- // Create 创建
- func (os *OauthService) Create(oauthInfo *model.Oauth) error {
- err := oauthInfo.FormatOauthInfo()
- if err != nil {
- return err
- }
- res := DB.Create(oauthInfo).Error
- return res
- }
- func (os *OauthService) Delete(oauthInfo *model.Oauth) error {
- return DB.Delete(oauthInfo).Error
- }
- // Update 更新
- func (os *OauthService) Update(oauthInfo *model.Oauth) error {
- err := oauthInfo.FormatOauthInfo()
- if err != nil {
- return err
- }
- return DB.Model(oauthInfo).Updates(oauthInfo).Error
- }
- // GetOauthProviders 获取所有的provider
- func (os *OauthService) GetOauthProviders() []string {
- var res []string
- DB.Model(&model.Oauth{}).Pluck("op", &res)
- return res
- }
- // getGithubPrimaryEmail: Get the primary email of the user from Github
- func (os *OauthService) getGithubPrimaryEmail(client *http.Client, githubUser *model.GithubUser) error {
- // the client is already set with the token
- resp, err := client.Get("https://api.github.com/user/emails")
- if err != nil {
- return fmt.Errorf("failed to fetch emails: %w", err)
- }
- defer resp.Body.Close()
- // check the response status code
- if resp.StatusCode != http.StatusOK {
- return fmt.Errorf("failed to fetch emails: %s", resp.Status)
- }
- // decode the response
- var emails []struct {
- Email string `json:"email"`
- Primary bool `json:"primary"`
- Verified bool `json:"verified"`
- }
- if err := json.NewDecoder(resp.Body).Decode(&emails); err != nil {
- return fmt.Errorf("failed to decode response: %w", err)
- }
- // find the primary verified email
- for _, e := range emails {
- if e.Primary && e.Verified {
- githubUser.Email = e.Email
- githubUser.VerifiedEmail = e.Verified
- return nil
- }
- }
- return fmt.Errorf("no primary verified email found")
- }
|