2015-08-18 05:57:27 +05:30
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
|
|
|
"html/template"
|
|
|
|
"net/http"
|
|
|
|
"net/url"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/coreos/go-oidc/jose"
|
|
|
|
"github.com/coreos/go-oidc/key"
|
|
|
|
"github.com/coreos/go-oidc/oidc"
|
|
|
|
|
|
|
|
"github.com/coreos/dex/client"
|
|
|
|
"github.com/coreos/dex/pkg/log"
|
|
|
|
"github.com/coreos/dex/user"
|
|
|
|
useremail "github.com/coreos/dex/user/email"
|
2015-12-08 04:59:58 +05:30
|
|
|
"github.com/coreos/dex/user/manager"
|
2015-08-18 05:57:27 +05:30
|
|
|
)
|
|
|
|
|
|
|
|
// handleVerifyEmailResendFunc will resend an email-verification email given a valid JWT for the user and a redirect URL.
|
|
|
|
// This handler is meant to be wrapped in clientTokenMiddleware, so a valid
|
|
|
|
// bearer token for the client is expected to be present.
|
|
|
|
// The user's JWT should be in the "token" parameter and the redirect URL should
|
2015-10-17 04:40:16 +05:30
|
|
|
// be in the "redirect_uri" param.
|
2015-08-18 05:57:27 +05:30
|
|
|
func handleVerifyEmailResendFunc(
|
|
|
|
issuerURL url.URL,
|
|
|
|
srvKeysFunc func() ([]key.PublicKey, error),
|
|
|
|
emailer *useremail.UserEmailer,
|
|
|
|
userRepo user.UserRepo,
|
|
|
|
clientIdentityRepo client.ClientIdentityRepo) http.HandlerFunc {
|
|
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
decoder := json.NewDecoder(r.Body)
|
|
|
|
var params struct {
|
|
|
|
Token string `json:"token"`
|
|
|
|
RedirectURI string `json:"redirectURI"`
|
|
|
|
}
|
|
|
|
err := decoder.Decode(¶ms)
|
|
|
|
if err != nil {
|
|
|
|
writeAPIError(w, http.StatusBadRequest, newAPIError(errorInvalidRequest,
|
|
|
|
"unable to parse body as JSON"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
token := params.Token
|
|
|
|
if token == "" {
|
|
|
|
writeAPIError(w, http.StatusBadRequest,
|
|
|
|
newAPIError(errorInvalidRequest, "missing valid JWT"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
clientID, err := getClientIDFromAuthorizedRequest(r)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("Failed to extract clientID: %v", err)
|
|
|
|
writeAPIError(w, http.StatusUnauthorized,
|
|
|
|
newAPIError(errorInvalidRequest, "cilent could not be extracted from bearer token."))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
cm, err := clientIdentityRepo.Metadata(clientID)
|
|
|
|
if err == client.ErrorNotFound {
|
|
|
|
log.Errorf("No such client: %v", err)
|
|
|
|
writeAPIError(w, http.StatusBadRequest,
|
|
|
|
newAPIError(errorInvalidRequest, "invalid client_id"))
|
|
|
|
return
|
|
|
|
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("Error getting ClientMetadata: %v", err)
|
|
|
|
writeAPIError(w, http.StatusInternalServerError,
|
|
|
|
newAPIError(errorServerError, "could not send email at this time"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
noop := func() error { return nil }
|
|
|
|
keysFunc := func() []key.PublicKey {
|
|
|
|
keys, err := srvKeysFunc()
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("Error getting keys: %v", err)
|
|
|
|
}
|
|
|
|
return keys
|
|
|
|
}
|
|
|
|
|
|
|
|
jwt, err := jose.ParseJWT(token)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("Failed to Parse JWT: %v", err)
|
|
|
|
writeAPIError(w, http.StatusBadRequest,
|
|
|
|
newAPIError(errorInvalidRequest, "token could not be parsed"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
verifier := oidc.NewJWTVerifier(issuerURL.String(), clientID, noop, keysFunc)
|
|
|
|
if err := verifier.Verify(jwt); err != nil {
|
|
|
|
log.Errorf("Failed to Verify JWT: %v", err)
|
|
|
|
writeAPIError(w, http.StatusUnauthorized,
|
|
|
|
newAPIError(errorAccessDenied, "invalid token could not be verified"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
claims, err := jwt.Claims()
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("Failed to extract claims from JWT: %v", err)
|
|
|
|
writeAPIError(w, http.StatusBadRequest,
|
|
|
|
newAPIError(errorInvalidRequest, "invalid token could not be parsed"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
sub, ok, err := claims.StringClaim("sub")
|
|
|
|
if err != nil || !ok || sub == "" {
|
|
|
|
log.Errorf("Failed to extract sub claim from JWT: err:%q ok:%v", err, ok)
|
|
|
|
writeAPIError(w, http.StatusBadRequest,
|
|
|
|
newAPIError(errorInvalidRequest, "could not extract sub claim from token"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
usr, err := userRepo.Get(nil, sub)
|
|
|
|
if err != nil {
|
|
|
|
if err == user.ErrorNotFound {
|
|
|
|
log.Errorf("Failed to find user specified by token: %v", err)
|
|
|
|
writeAPIError(w, http.StatusBadRequest,
|
|
|
|
newAPIError(errorInvalidRequest, "could not find user"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
log.Errorf("Failed to fetch user: %v", err)
|
|
|
|
writeAPIError(w, http.StatusInternalServerError,
|
|
|
|
newAPIError(errorServerError, "could not send email at this time"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if usr.EmailVerified {
|
|
|
|
log.Errorf("User's email already verified")
|
|
|
|
writeAPIError(w, http.StatusBadRequest,
|
|
|
|
newAPIError(errorInvalidRequest, "email already verified"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
aud, _, _ := claims.StringClaim("aud")
|
|
|
|
if aud != clientID {
|
|
|
|
log.Errorf("aud of token and sub of bearer token must match: %v", err)
|
|
|
|
writeAPIError(w, http.StatusForbidden,
|
|
|
|
newAPIError(errorAccessDenied, "JWT is from another client."))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
redirectURLStr := params.RedirectURI
|
|
|
|
if redirectURLStr == "" {
|
|
|
|
log.Errorf("No redirect URL: %v", err)
|
|
|
|
writeAPIError(w, http.StatusBadRequest,
|
|
|
|
newAPIError(errorInvalidRequest, "must provide a redirect_uri"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
redirectURL, err := url.Parse(redirectURLStr)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("Unparsable URL: %v", err)
|
|
|
|
writeAPIError(w, http.StatusBadRequest,
|
|
|
|
newAPIError(errorInvalidRequest, "invalid redirect_uri"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2016-01-13 06:46:28 +05:30
|
|
|
*redirectURL, err = client.ValidRedirectURL(redirectURL, cm.RedirectURIs)
|
2015-08-18 05:57:27 +05:30
|
|
|
if err != nil {
|
|
|
|
switch err {
|
|
|
|
case (client.ErrorInvalidRedirectURL):
|
|
|
|
log.Errorf("Request provided unregistered redirect URL: %s", redirectURLStr)
|
|
|
|
writeAPIError(w, http.StatusBadRequest,
|
|
|
|
newAPIError(errorInvalidRequest, "invalid redirect_uri"))
|
|
|
|
return
|
|
|
|
case (client.ErrorNoValidRedirectURLs):
|
|
|
|
log.Errorf("There are no registered URLs for the requested client: %s", redirectURL)
|
|
|
|
writeAPIError(w, http.StatusBadRequest,
|
|
|
|
newAPIError(errorInvalidRequest, "invalid redirect_uri"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = emailer.SendEmailVerification(usr.ID, clientID, *redirectURL)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("Failed to send email verification email: %v", err)
|
|
|
|
writeAPIError(w, http.StatusInternalServerError,
|
|
|
|
newAPIError(errorServerError, "could not send email at this time"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
writeResponseWithBody(w, http.StatusOK, struct{}{})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type emailVerifiedTemplateData struct {
|
|
|
|
Error string
|
|
|
|
Message string
|
|
|
|
}
|
|
|
|
|
|
|
|
func handleEmailVerifyFunc(verifiedTpl *template.Template, issuer url.URL, keysFunc func() ([]key.PublicKey,
|
2015-12-08 04:59:58 +05:30
|
|
|
error), userManager *manager.UserManager) http.HandlerFunc {
|
2015-08-18 05:57:27 +05:30
|
|
|
|
|
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
q := r.URL.Query()
|
|
|
|
token := q.Get("token")
|
|
|
|
|
|
|
|
keys, err := keysFunc()
|
|
|
|
if err != nil {
|
|
|
|
execTemplateWithStatus(w, verifiedTpl, emailVerifiedTemplateData{
|
|
|
|
Error: "There's been an error processing your request.",
|
2015-10-17 04:40:16 +05:30
|
|
|
Message: "Please try again later.",
|
2015-08-18 05:57:27 +05:30
|
|
|
}, http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ev, err := user.ParseAndVerifyEmailVerificationToken(token, issuer, keys)
|
|
|
|
if err != nil {
|
|
|
|
execTemplateWithStatus(w, verifiedTpl, emailVerifiedTemplateData{
|
|
|
|
Error: "Bad Email Verification Token",
|
|
|
|
Message: "That was not a verifiable token.",
|
|
|
|
}, http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
cbURL, err := userManager.VerifyEmail(ev)
|
|
|
|
if err != nil {
|
|
|
|
switch err {
|
2015-12-08 04:59:58 +05:30
|
|
|
case manager.ErrorEmailAlreadyVerified:
|
2015-08-18 05:57:27 +05:30
|
|
|
execTemplateWithStatus(w, verifiedTpl, emailVerifiedTemplateData{
|
|
|
|
Error: "Invalid Verification Link",
|
|
|
|
Message: "Your email link has expired or has already been verified.",
|
|
|
|
}, http.StatusBadRequest)
|
2015-12-08 04:59:58 +05:30
|
|
|
case manager.ErrorEVEmailDoesntMatch:
|
2015-08-18 05:57:27 +05:30
|
|
|
execTemplateWithStatus(w, verifiedTpl, emailVerifiedTemplateData{
|
|
|
|
Error: "Invalid Verification Link",
|
|
|
|
Message: "Your email link does not match the email address on file. Perhaps you have a more recent verification link?",
|
|
|
|
}, http.StatusBadRequest)
|
|
|
|
default:
|
|
|
|
execTemplateWithStatus(w, verifiedTpl, emailVerifiedTemplateData{
|
|
|
|
Error: "Error Processing Request",
|
|
|
|
Message: "Please try again later.",
|
|
|
|
}, http.StatusInternalServerError)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
http.SetCookie(w, &http.Cookie{
|
|
|
|
HttpOnly: true,
|
|
|
|
Name: "ShowEmailVerifiedMessage",
|
|
|
|
MaxAge: int(60 * 5),
|
|
|
|
Expires: time.Now().Add(time.Minute * 5),
|
|
|
|
})
|
|
|
|
http.Redirect(w, r, cbURL.String(), http.StatusSeeOther)
|
|
|
|
}
|
|
|
|
}
|