2016-07-25 20:00:28 +00:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
2016-08-25 20:10:19 +00:00
|
|
|
"fmt"
|
2017-02-02 18:29:57 +00:00
|
|
|
"html/template"
|
2016-08-25 20:10:19 +00:00
|
|
|
"io"
|
2020-10-15 14:50:39 +00:00
|
|
|
"io/fs"
|
2016-07-25 20:00:28 +00:00
|
|
|
"net/http"
|
2020-10-15 14:50:39 +00:00
|
|
|
"net/url"
|
2019-09-27 14:04:43 +00:00
|
|
|
"path"
|
2016-08-25 20:10:19 +00:00
|
|
|
"sort"
|
2016-11-30 22:26:54 +00:00
|
|
|
"strings"
|
2021-06-01 15:28:22 +00:00
|
|
|
|
|
|
|
"github.com/Masterminds/sprig/v3"
|
2016-08-25 20:10:19 +00:00
|
|
|
)
|
2016-07-25 20:00:28 +00:00
|
|
|
|
2016-08-25 20:10:19 +00:00
|
|
|
const (
|
2020-01-28 19:14:30 +00:00
|
|
|
tmplApproval = "approval.html"
|
|
|
|
tmplLogin = "login.html"
|
|
|
|
tmplPassword = "password.html"
|
|
|
|
tmplOOB = "oob.html"
|
|
|
|
tmplError = "error.html"
|
|
|
|
tmplDevice = "device.html"
|
|
|
|
tmplDeviceSuccess = "device_success.html"
|
2016-07-25 20:00:28 +00:00
|
|
|
)
|
|
|
|
|
2020-10-15 14:50:39 +00:00
|
|
|
var requiredTmpls = []string{
|
|
|
|
tmplApproval,
|
|
|
|
tmplLogin,
|
|
|
|
tmplPassword,
|
|
|
|
tmplOOB,
|
|
|
|
tmplError,
|
|
|
|
tmplDevice,
|
|
|
|
tmplDeviceSuccess,
|
|
|
|
}
|
|
|
|
|
2016-11-30 22:26:54 +00:00
|
|
|
type templates struct {
|
2020-01-28 19:14:30 +00:00
|
|
|
loginTmpl *template.Template
|
|
|
|
approvalTmpl *template.Template
|
|
|
|
passwordTmpl *template.Template
|
|
|
|
oobTmpl *template.Template
|
|
|
|
errorTmpl *template.Template
|
|
|
|
deviceTmpl *template.Template
|
|
|
|
deviceSuccessTmpl *template.Template
|
2016-11-30 22:26:54 +00:00
|
|
|
}
|
2016-08-25 20:10:19 +00:00
|
|
|
|
2020-10-15 14:50:39 +00:00
|
|
|
type webConfig struct {
|
|
|
|
webFS fs.FS
|
|
|
|
logoURL string
|
|
|
|
issuer string
|
|
|
|
theme string
|
|
|
|
issuerURL string
|
|
|
|
extra map[string]string
|
|
|
|
}
|
|
|
|
|
2021-06-01 15:28:22 +00:00
|
|
|
func getFuncMap(c webConfig) (template.FuncMap, error) {
|
|
|
|
funcs := sprig.FuncMap()
|
|
|
|
|
|
|
|
issuerURL, err := url.Parse(c.issuerURL)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("error parsing issuerURL: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
additionalFuncs := map[string]interface{}{
|
|
|
|
"extra": func(k string) string { return c.extra[k] },
|
|
|
|
"issuer": func() string { return c.issuer },
|
|
|
|
"logo": func() string { return c.logoURL },
|
|
|
|
"url": func(reqPath, assetPath string) string {
|
|
|
|
return relativeURL(issuerURL.Path, reqPath, assetPath)
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for k, v := range additionalFuncs {
|
|
|
|
funcs[k] = v
|
|
|
|
}
|
|
|
|
|
|
|
|
return funcs, nil
|
|
|
|
}
|
|
|
|
|
2020-10-15 14:50:39 +00:00
|
|
|
// loadWebConfig returns static assets, theme assets, and templates used by the frontend by
|
|
|
|
// reading the dir specified in the webConfig. If directory is not specified it will
|
|
|
|
// use the file system specified by webFS.
|
|
|
|
//
|
|
|
|
// The directory layout is expected to be:
|
|
|
|
//
|
|
|
|
// ( web directory )
|
|
|
|
// |- static
|
|
|
|
// |- themes
|
|
|
|
// | |- (theme name)
|
|
|
|
// |- templates
|
|
|
|
//
|
|
|
|
func loadWebConfig(c webConfig) (http.Handler, http.Handler, *templates, error) {
|
2020-12-22 07:07:28 +00:00
|
|
|
// fallback to the default theme if the legacy theme name is provided
|
2020-10-15 14:50:39 +00:00
|
|
|
if c.theme == "coreos" || c.theme == "tectonic" {
|
|
|
|
c.theme = ""
|
2016-11-30 22:26:54 +00:00
|
|
|
}
|
2020-10-15 14:50:39 +00:00
|
|
|
if c.theme == "" {
|
|
|
|
c.theme = "light"
|
2016-11-30 22:26:54 +00:00
|
|
|
}
|
2020-10-15 14:50:39 +00:00
|
|
|
if c.issuer == "" {
|
|
|
|
c.issuer = "dex"
|
2020-01-15 18:04:48 +00:00
|
|
|
}
|
2020-10-15 14:50:39 +00:00
|
|
|
if c.logoURL == "" {
|
|
|
|
c.logoURL = "theme/logo.png"
|
2016-11-30 22:26:54 +00:00
|
|
|
}
|
|
|
|
|
2020-10-15 14:50:39 +00:00
|
|
|
staticFiles, err := fs.Sub(c.webFS, "static")
|
2016-11-30 22:26:54 +00:00
|
|
|
if err != nil {
|
2020-10-15 14:50:39 +00:00
|
|
|
return nil, nil, nil, fmt.Errorf("read static dir: %v", err)
|
2016-11-30 22:26:54 +00:00
|
|
|
}
|
2021-10-27 06:40:58 +00:00
|
|
|
themeFiles, err := fs.Sub(c.webFS, path.Join("themes", c.theme))
|
2020-01-15 18:04:48 +00:00
|
|
|
if err != nil {
|
2020-10-15 14:50:39 +00:00
|
|
|
return nil, nil, nil, fmt.Errorf("read themes dir: %v", err)
|
2016-11-30 22:26:54 +00:00
|
|
|
}
|
2020-01-15 18:04:48 +00:00
|
|
|
|
2020-10-15 14:50:39 +00:00
|
|
|
static := http.FileServer(http.FS(staticFiles))
|
|
|
|
theme := http.FileServer(http.FS(themeFiles))
|
2016-08-25 20:10:19 +00:00
|
|
|
|
2020-10-15 14:50:39 +00:00
|
|
|
templates, err := loadTemplates(c, "templates")
|
|
|
|
return static, theme, templates, err
|
|
|
|
}
|
2019-09-27 14:04:43 +00:00
|
|
|
|
2020-10-15 14:50:39 +00:00
|
|
|
// loadTemplates parses the expected templates from the provided directory.
|
|
|
|
func loadTemplates(c webConfig, templatesDir string) (*templates, error) {
|
|
|
|
files, err := fs.ReadDir(c.webFS, templatesDir)
|
2020-01-15 18:04:48 +00:00
|
|
|
if err != nil {
|
2020-10-15 14:50:39 +00:00
|
|
|
return nil, fmt.Errorf("read dir: %v", err)
|
2016-11-30 22:26:54 +00:00
|
|
|
}
|
|
|
|
|
2020-10-15 14:50:39 +00:00
|
|
|
filenames := []string{}
|
|
|
|
for _, file := range files {
|
|
|
|
if file.IsDir() {
|
|
|
|
continue
|
|
|
|
}
|
2021-10-27 06:40:58 +00:00
|
|
|
filenames = append(filenames, path.Join(templatesDir, file.Name()))
|
2020-10-15 14:50:39 +00:00
|
|
|
}
|
|
|
|
if len(filenames) == 0 {
|
|
|
|
return nil, fmt.Errorf("no files in template dir %q", templatesDir)
|
2016-11-30 22:26:54 +00:00
|
|
|
}
|
2020-01-15 18:04:48 +00:00
|
|
|
|
2021-06-01 15:28:22 +00:00
|
|
|
funcs, err := getFuncMap(c)
|
2020-01-15 18:04:48 +00:00
|
|
|
if err != nil {
|
2021-06-01 15:28:22 +00:00
|
|
|
return nil, err
|
2016-08-25 20:10:19 +00:00
|
|
|
}
|
2020-01-15 18:04:48 +00:00
|
|
|
|
2020-10-15 14:50:39 +00:00
|
|
|
tmpls, err := template.New("").Funcs(funcs).ParseFS(c.webFS, filenames...)
|
2020-01-15 18:04:48 +00:00
|
|
|
if err != nil {
|
2020-10-15 14:50:39 +00:00
|
|
|
return nil, fmt.Errorf("parse files: %v", err)
|
|
|
|
}
|
|
|
|
missingTmpls := []string{}
|
|
|
|
for _, tmplName := range requiredTmpls {
|
|
|
|
if tmpls.Lookup(tmplName) == nil {
|
|
|
|
missingTmpls = append(missingTmpls, tmplName)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if len(missingTmpls) > 0 {
|
|
|
|
return nil, fmt.Errorf("missing template(s): %s", missingTmpls)
|
2020-01-15 18:04:48 +00:00
|
|
|
}
|
2016-08-25 20:10:19 +00:00
|
|
|
return &templates{
|
2020-10-15 14:50:39 +00:00
|
|
|
loginTmpl: tmpls.Lookup(tmplLogin),
|
|
|
|
approvalTmpl: tmpls.Lookup(tmplApproval),
|
|
|
|
passwordTmpl: tmpls.Lookup(tmplPassword),
|
|
|
|
oobTmpl: tmpls.Lookup(tmplOOB),
|
|
|
|
errorTmpl: tmpls.Lookup(tmplError),
|
|
|
|
deviceTmpl: tmpls.Lookup(tmplDevice),
|
|
|
|
deviceSuccessTmpl: tmpls.Lookup(tmplDeviceSuccess),
|
2016-08-25 20:10:19 +00:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2020-10-15 14:50:39 +00:00
|
|
|
// relativeURL returns the URL of the asset relative to the URL of the request path.
|
|
|
|
// The serverPath is consulted to trim any prefix due in case it is not listening
|
|
|
|
// to the root path.
|
|
|
|
//
|
|
|
|
// Algorithm:
|
|
|
|
// 1. Remove common prefix of serverPath and reqPath
|
|
|
|
// 2. Remove common prefix of assetPath and reqPath
|
|
|
|
// 3. For each part of reqPath remaining(minus one), go up one level (..)
|
|
|
|
// 4. For each part of assetPath remaining, append it to result
|
|
|
|
//
|
|
|
|
// eg
|
|
|
|
// server listens at localhost/dex so serverPath is dex
|
|
|
|
// reqPath is /dex/auth
|
|
|
|
// assetPath is static/main.css
|
|
|
|
// relativeURL("/dex", "/dex/auth", "static/main.css") = "../static/main.css"
|
|
|
|
func relativeURL(serverPath, reqPath, assetPath string) string {
|
|
|
|
if u, err := url.ParseRequestURI(assetPath); err == nil && u.Scheme != "" {
|
|
|
|
// assetPath points to the external URL, no changes needed
|
|
|
|
return assetPath
|
|
|
|
}
|
|
|
|
|
|
|
|
splitPath := func(p string) []string {
|
|
|
|
res := []string{}
|
|
|
|
parts := strings.Split(path.Clean(p), "/")
|
|
|
|
for _, part := range parts {
|
|
|
|
if part != "" {
|
|
|
|
res = append(res, part)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return res
|
|
|
|
}
|
|
|
|
|
|
|
|
stripCommonParts := func(s1, s2 []string) ([]string, []string) {
|
|
|
|
min := len(s1)
|
|
|
|
if len(s2) < min {
|
|
|
|
min = len(s2)
|
|
|
|
}
|
|
|
|
|
|
|
|
splitIndex := min
|
|
|
|
for i := 0; i < min; i++ {
|
|
|
|
if s1[i] != s2[i] {
|
|
|
|
splitIndex = i
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return s1[splitIndex:], s2[splitIndex:]
|
|
|
|
}
|
|
|
|
|
|
|
|
server, req, asset := splitPath(serverPath), splitPath(reqPath), splitPath(assetPath)
|
|
|
|
|
|
|
|
// Remove common prefix of request path with server path
|
|
|
|
_, req = stripCommonParts(server, req)
|
|
|
|
|
|
|
|
// Remove common prefix of request path with asset path
|
|
|
|
asset, req = stripCommonParts(asset, req)
|
|
|
|
|
|
|
|
// For each part of the request remaining (minus one) -> go up one level (..)
|
|
|
|
// For each part of the asset remaining -> append it
|
|
|
|
var relativeURL string
|
|
|
|
for i := 0; i < len(req)-1; i++ {
|
|
|
|
relativeURL = path.Join("..", relativeURL)
|
|
|
|
}
|
|
|
|
relativeURL = path.Join(relativeURL, path.Join(asset...))
|
|
|
|
|
|
|
|
return relativeURL
|
2020-01-15 18:04:48 +00:00
|
|
|
}
|
|
|
|
|
2016-08-25 20:10:19 +00:00
|
|
|
var scopeDescriptions = map[string]string{
|
|
|
|
"offline_access": "Have offline access",
|
|
|
|
"profile": "View basic profile information",
|
2017-12-17 17:08:19 +00:00
|
|
|
"email": "View your email address",
|
2022-05-17 14:20:37 +00:00
|
|
|
// 'groups' is not a standard OIDC scope, and Dex only returns groups only if the upstream provider does too.
|
|
|
|
// This warning is added for convenience to show that the user may expose some sensitive data to the application.
|
|
|
|
"groups": "View your groups",
|
2016-08-25 20:10:19 +00:00
|
|
|
}
|
|
|
|
|
2016-07-25 20:00:28 +00:00
|
|
|
type connectorInfo struct {
|
2016-08-25 20:10:19 +00:00
|
|
|
ID string
|
|
|
|
Name string
|
|
|
|
URL string
|
2019-10-29 23:33:52 +00:00
|
|
|
Type string
|
2016-07-25 20:00:28 +00:00
|
|
|
}
|
|
|
|
|
2016-08-25 20:10:19 +00:00
|
|
|
type byName []connectorInfo
|
|
|
|
|
|
|
|
func (n byName) Len() int { return len(n) }
|
|
|
|
func (n byName) Less(i, j int) bool { return n[i].Name < n[j].Name }
|
|
|
|
func (n byName) Swap(i, j int) { n[i], n[j] = n[j], n[i] }
|
|
|
|
|
2020-01-28 19:14:30 +00:00
|
|
|
func (t *templates) device(r *http.Request, w http.ResponseWriter, postURL string, userCode string, lastWasInvalid bool) error {
|
2020-02-04 15:07:18 +00:00
|
|
|
if lastWasInvalid {
|
|
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
|
|
}
|
2020-01-28 19:14:30 +00:00
|
|
|
data := struct {
|
|
|
|
PostURL string
|
|
|
|
UserCode string
|
|
|
|
Invalid bool
|
|
|
|
ReqPath string
|
|
|
|
}{postURL, userCode, lastWasInvalid, r.URL.Path}
|
|
|
|
return renderTemplate(w, t.deviceTmpl, data)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (t *templates) deviceSuccess(r *http.Request, w http.ResponseWriter, clientName string) error {
|
|
|
|
data := struct {
|
|
|
|
ClientName string
|
|
|
|
ReqPath string
|
|
|
|
}{clientName, r.URL.Path}
|
|
|
|
return renderTemplate(w, t.deviceSuccessTmpl, data)
|
|
|
|
}
|
|
|
|
|
2020-10-17 21:02:29 +00:00
|
|
|
func (t *templates) login(r *http.Request, w http.ResponseWriter, connectors []connectorInfo) error {
|
2016-08-25 20:10:19 +00:00
|
|
|
sort.Sort(byName(connectors))
|
2016-07-25 20:00:28 +00:00
|
|
|
data := struct {
|
|
|
|
Connectors []connectorInfo
|
2019-09-27 14:04:43 +00:00
|
|
|
ReqPath string
|
|
|
|
}{connectors, r.URL.Path}
|
2016-12-12 22:54:01 +00:00
|
|
|
return renderTemplate(w, t.loginTmpl, data)
|
2016-07-25 20:00:28 +00:00
|
|
|
}
|
|
|
|
|
2020-11-16 11:29:14 +00:00
|
|
|
func (t *templates) password(r *http.Request, w http.ResponseWriter, postURL, lastUsername, usernamePrompt string, lastWasInvalid bool, backLink string) error {
|
2016-07-25 20:00:28 +00:00
|
|
|
data := struct {
|
2017-11-07 09:28:21 +00:00
|
|
|
PostURL string
|
2020-11-16 11:29:14 +00:00
|
|
|
BackLink string
|
2017-11-07 09:28:21 +00:00
|
|
|
Username string
|
|
|
|
UsernamePrompt string
|
|
|
|
Invalid bool
|
2019-09-27 14:04:43 +00:00
|
|
|
ReqPath string
|
2020-11-16 11:29:14 +00:00
|
|
|
}{postURL, backLink, lastUsername, usernamePrompt, lastWasInvalid, r.URL.Path}
|
2016-12-12 22:54:01 +00:00
|
|
|
return renderTemplate(w, t.passwordTmpl, data)
|
2016-07-25 20:00:28 +00:00
|
|
|
}
|
|
|
|
|
2020-10-17 21:02:29 +00:00
|
|
|
func (t *templates) approval(r *http.Request, w http.ResponseWriter, authReqID, username, clientName string, scopes []string) error {
|
2016-08-25 20:10:19 +00:00
|
|
|
accesses := []string{}
|
|
|
|
for _, scope := range scopes {
|
|
|
|
access, ok := scopeDescriptions[scope]
|
|
|
|
if ok {
|
|
|
|
accesses = append(accesses, access)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
sort.Strings(accesses)
|
2016-07-25 20:00:28 +00:00
|
|
|
data := struct {
|
2016-10-27 17:20:30 +00:00
|
|
|
User string
|
|
|
|
Client string
|
|
|
|
AuthReqID string
|
|
|
|
Scopes []string
|
2019-09-27 14:04:43 +00:00
|
|
|
ReqPath string
|
|
|
|
}{username, clientName, authReqID, accesses, r.URL.Path}
|
2016-12-12 22:54:01 +00:00
|
|
|
return renderTemplate(w, t.approvalTmpl, data)
|
2016-07-25 20:00:28 +00:00
|
|
|
}
|
|
|
|
|
2020-10-17 21:02:29 +00:00
|
|
|
func (t *templates) oob(r *http.Request, w http.ResponseWriter, code string) error {
|
2016-10-19 19:45:17 +00:00
|
|
|
data := struct {
|
2019-09-27 14:04:43 +00:00
|
|
|
Code string
|
|
|
|
ReqPath string
|
|
|
|
}{code, r.URL.Path}
|
2016-12-12 22:54:01 +00:00
|
|
|
return renderTemplate(w, t.oobTmpl, data)
|
2016-10-19 19:45:17 +00:00
|
|
|
}
|
|
|
|
|
2019-09-27 14:04:43 +00:00
|
|
|
func (t *templates) err(r *http.Request, w http.ResponseWriter, errCode int, errMsg string) error {
|
2017-12-01 05:23:45 +00:00
|
|
|
w.WriteHeader(errCode)
|
2016-12-14 22:17:59 +00:00
|
|
|
data := struct {
|
|
|
|
ErrType string
|
|
|
|
ErrMsg string
|
2019-09-27 14:04:43 +00:00
|
|
|
ReqPath string
|
|
|
|
}{http.StatusText(errCode), errMsg, r.URL.Path}
|
2017-12-01 05:23:45 +00:00
|
|
|
if err := t.errorTmpl.Execute(w, data); err != nil {
|
2020-10-17 21:02:29 +00:00
|
|
|
return fmt.Errorf("rendering template %s failed: %s", t.errorTmpl.Name(), err)
|
2017-12-01 05:23:45 +00:00
|
|
|
}
|
|
|
|
return nil
|
2016-12-14 22:17:59 +00:00
|
|
|
}
|
|
|
|
|
2016-12-13 20:23:16 +00:00
|
|
|
// small io.Writer utility to determine if executing the template wrote to the underlying response writer.
|
2016-08-25 20:10:19 +00:00
|
|
|
type writeRecorder struct {
|
|
|
|
wrote bool
|
|
|
|
w io.Writer
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *writeRecorder) Write(p []byte) (n int, err error) {
|
|
|
|
w.wrote = true
|
|
|
|
return w.w.Write(p)
|
|
|
|
}
|
2016-07-25 20:00:28 +00:00
|
|
|
|
2016-12-12 22:54:01 +00:00
|
|
|
func renderTemplate(w http.ResponseWriter, tmpl *template.Template, data interface{}) error {
|
2016-08-25 20:10:19 +00:00
|
|
|
wr := &writeRecorder{w: w}
|
|
|
|
if err := tmpl.Execute(wr, data); err != nil {
|
|
|
|
if !wr.wrote {
|
|
|
|
// TODO(ericchiang): replace with better internal server error.
|
|
|
|
http.Error(w, "Internal server error", http.StatusInternalServerError)
|
|
|
|
}
|
2020-10-17 21:02:29 +00:00
|
|
|
return fmt.Errorf("rendering template %s failed: %s", tmpl.Name(), err)
|
2016-07-25 20:00:28 +00:00
|
|
|
}
|
2016-12-12 22:54:01 +00:00
|
|
|
return nil
|
2016-07-25 20:00:28 +00:00
|
|
|
}
|