Full Mattermost server source with integrated Community Enterprise features. Includes vendor directory for offline/air-gapped builds. Structure: - enterprise-impl/: Enterprise feature implementations - enterprise-community/: Init files that register implementations - enterprise/: Bridge imports (community_imports.go) - vendor/: All dependencies for offline builds Build (online): go build ./cmd/mattermost Build (offline/air-gapped): go build -mod=vendor ./cmd/mattermost 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
308 lines
9.7 KiB
Go
308 lines
9.7 KiB
Go
// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
|
|
// See LICENSE.txt for license information.
|
|
|
|
package web
|
|
|
|
import (
|
|
b64 "encoding/base64"
|
|
"html"
|
|
"net/http"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/mattermost/mattermost/server/public/model"
|
|
"github.com/mattermost/mattermost/server/public/plugin"
|
|
"github.com/mattermost/mattermost/server/v8/channels/utils"
|
|
)
|
|
|
|
const maxSAMLResponseSize = 2 * 1024 * 1024 // 2MB
|
|
|
|
func (w *Web) InitSaml() {
|
|
w.MainRouter.Handle("/login/sso/saml", w.APIHandler(loginWithSaml)).Methods(http.MethodGet)
|
|
w.MainRouter.Handle("/login/sso/saml", w.APIHandlerTrustRequester(completeSaml)).Methods(http.MethodPost)
|
|
}
|
|
|
|
func loginWithSaml(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
samlInterface := c.App.Saml()
|
|
|
|
if samlInterface == nil {
|
|
c.Err = model.NewAppError("loginWithSaml", "api.user.saml.not_available.app_error", nil, "", http.StatusFound)
|
|
return
|
|
}
|
|
|
|
tokenID := r.URL.Query().Get("t")
|
|
inviteId := r.URL.Query().Get("id")
|
|
|
|
action := r.URL.Query().Get("action")
|
|
isMobile := action == model.OAuthActionMobile
|
|
redirectURL := html.EscapeString(r.URL.Query().Get("redirect_to"))
|
|
// Optional SAML challenge parameters for mobile code-exchange
|
|
state := r.URL.Query().Get("state")
|
|
codeChallenge := r.URL.Query().Get("code_challenge")
|
|
codeChallengeMethod := r.URL.Query().Get("code_challenge_method")
|
|
relayProps := map[string]string{}
|
|
relayState := ""
|
|
|
|
if action != "" {
|
|
if tokenID != "" {
|
|
relayProps["invite_token"] = tokenID
|
|
} else if inviteId != "" {
|
|
relayProps["invite_id"] = inviteId
|
|
}
|
|
relayProps["action"] = action
|
|
if action == model.OAuthActionEmailToSSO {
|
|
relayProps["email_token"] = r.URL.Query().Get("email_token")
|
|
}
|
|
}
|
|
|
|
if redirectURL != "" {
|
|
if isMobile && !utils.IsValidMobileAuthRedirectURL(c.App.Config(), redirectURL) {
|
|
invalidSchemeErr := model.NewAppError("loginWithOAuth", "api.invalid_custom_url_scheme", nil, "", http.StatusBadRequest)
|
|
utils.RenderMobileError(c.App.Config(), w, invalidSchemeErr, redirectURL)
|
|
return
|
|
}
|
|
relayProps["redirect_to"] = redirectURL
|
|
}
|
|
|
|
// Forward SAML challenge values via RelayState so the complete step can prefer code-exchange
|
|
if isMobile {
|
|
if state != "" {
|
|
relayProps["state"] = state
|
|
}
|
|
if codeChallenge != "" {
|
|
relayProps["code_challenge"] = codeChallenge
|
|
}
|
|
if codeChallengeMethod != "" {
|
|
relayProps["code_challenge_method"] = codeChallengeMethod
|
|
}
|
|
}
|
|
|
|
desktopToken := r.URL.Query().Get("desktop_token")
|
|
if desktopToken != "" {
|
|
relayProps["desktop_token"] = desktopToken
|
|
}
|
|
|
|
relayProps[model.UserAuthServiceIsMobile] = strconv.FormatBool(isMobile)
|
|
|
|
if len(relayProps) > 0 {
|
|
relayState = b64.StdEncoding.EncodeToString([]byte(model.MapToJSON(relayProps)))
|
|
}
|
|
|
|
data, err := samlInterface.BuildRequest(c.AppContext, relayState)
|
|
if err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
w.Header().Set("Content-Type", "application/x-www-form-urlencoded")
|
|
http.Redirect(w, r, data.URL, http.StatusFound)
|
|
}
|
|
|
|
func completeSaml(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
samlInterface := c.App.Saml()
|
|
|
|
if samlInterface == nil {
|
|
c.Err = model.NewAppError("completeSaml", "api.user.saml.not_available.app_error", nil, "", http.StatusFound)
|
|
return
|
|
}
|
|
|
|
// Validate that the user is with SAML and all that
|
|
encodedXML := r.FormValue("SAMLResponse")
|
|
relayState := r.FormValue("RelayState")
|
|
|
|
relayProps := make(map[string]string)
|
|
if relayState != "" {
|
|
stateStr := ""
|
|
b, err := b64.StdEncoding.DecodeString(relayState)
|
|
if err != nil {
|
|
c.Err = model.NewAppError("completeSaml", "api.user.authorize_oauth_user.invalid_state.app_error", nil, "", http.StatusFound).Wrap(err)
|
|
return
|
|
}
|
|
stateStr = string(b)
|
|
relayProps = model.MapFromJSON(strings.NewReader(stateStr))
|
|
}
|
|
|
|
auditRec := c.MakeAuditRecord(model.AuditEventCompleteSaml, model.AuditStatusFail)
|
|
defer c.LogAuditRec(auditRec)
|
|
c.LogAudit("attempt")
|
|
|
|
action := relayProps["action"]
|
|
auditRec.AddMeta("action", action)
|
|
|
|
isMobile := action == model.OAuthActionMobile
|
|
redirectURL := ""
|
|
hasRedirectURL := false
|
|
if val, ok := relayProps["redirect_to"]; ok {
|
|
redirectURL = val
|
|
hasRedirectURL = val != ""
|
|
}
|
|
redirectURL = fullyQualifiedRedirectURL(c.GetSiteURLHeader(), redirectURL, c.App.Config().NativeAppSettings.AppCustomURLSchemes)
|
|
|
|
handleError := func(err *model.AppError) {
|
|
if isMobile && hasRedirectURL {
|
|
err.Translate(c.AppContext.T)
|
|
utils.RenderMobileError(c.App.Config(), w, err, redirectURL)
|
|
} else {
|
|
c.Err = err
|
|
c.Err.StatusCode = http.StatusFound
|
|
}
|
|
}
|
|
|
|
if len(encodedXML) > maxSAMLResponseSize {
|
|
err := model.NewAppError("completeSaml", "api.user.authorize_oauth_user.saml_response_too_long.app_error", nil, "SAML response is too long", http.StatusBadRequest)
|
|
handleError(err)
|
|
return
|
|
}
|
|
|
|
user, assertion, err := samlInterface.DoLogin(c.AppContext, encodedXML, relayProps)
|
|
if err != nil {
|
|
c.LogAudit("fail")
|
|
handleError(err)
|
|
return
|
|
}
|
|
|
|
err = c.App.CheckUserAllAuthenticationCriteria(c.AppContext, user, "")
|
|
if err != nil {
|
|
handleError(err)
|
|
return
|
|
}
|
|
|
|
switch action {
|
|
case model.OAuthActionSignup:
|
|
inviteToken := relayProps["invite_token"]
|
|
inviteId := relayProps["invite_id"]
|
|
if err = c.App.AddUserToTeamByInviteIfNeeded(c.AppContext, user, inviteToken, inviteId); err != nil {
|
|
c.LogErrorByCode(err)
|
|
break
|
|
}
|
|
case model.OAuthActionEmailToSSO:
|
|
if err = c.App.RevokeAllSessions(c.AppContext, user.Id); err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
auditRec.AddMeta("revoked_user_id", user.Id)
|
|
auditRec.AddMeta("revoked", "Revoked all sessions for user")
|
|
|
|
c.LogAuditWithUserId(user.Id, "Revoked all sessions for user")
|
|
c.App.Srv().Go(func() {
|
|
if err := c.App.Srv().EmailService.SendSignInChangeEmail(user.Email, strings.Title(model.UserAuthServiceSaml)+" SSO", user.Locale, c.App.GetSiteURL()); err != nil {
|
|
c.LogErrorByCode(model.NewAppError("SendSignInChangeEmail", "api.user.send_sign_in_change_email_and_forget.error", nil, "", http.StatusInternalServerError).Wrap(err))
|
|
}
|
|
})
|
|
}
|
|
|
|
pluginContext := &plugin.Context{
|
|
RequestId: c.AppContext.RequestId(),
|
|
SessionId: c.AppContext.Session().Id,
|
|
IPAddress: c.AppContext.IPAddress(),
|
|
AcceptLanguage: c.AppContext.AcceptLanguage(),
|
|
UserAgent: c.AppContext.UserAgent(),
|
|
}
|
|
|
|
var hookErr error
|
|
c.App.Channels().RunMultiHook(func(hooks plugin.Hooks, manifest *model.Manifest) bool {
|
|
hookErr = hooks.OnSAMLLogin(pluginContext, user, assertion)
|
|
return hookErr == nil
|
|
}, plugin.OnSAMLLoginID)
|
|
if hookErr != nil {
|
|
handleError(model.NewAppError("completeSaml", "api.user.authorize_oauth_user.saml_hook_error.app_error", nil, "", http.StatusInternalServerError).Wrap(hookErr))
|
|
return
|
|
}
|
|
|
|
auditRec.AddMeta("obtained_user_id", user.Id)
|
|
c.LogAuditWithUserId(user.Id, "obtained user")
|
|
|
|
desktopToken := relayProps["desktop_token"]
|
|
|
|
// If it's a desktop login we generate a token and redirect to another endpoint to handle session creation
|
|
if desktopToken != "" {
|
|
serverToken, serverTokenErr := c.App.GenerateAndSaveDesktopToken(time.Now().Unix(), user)
|
|
if serverTokenErr != nil {
|
|
handleError(serverTokenErr)
|
|
return
|
|
}
|
|
|
|
queryString := map[string]string{
|
|
"client_token": desktopToken,
|
|
"server_token": *serverToken,
|
|
}
|
|
if val, ok := relayProps["redirect_to"]; ok {
|
|
queryString["redirect_to"] = val
|
|
}
|
|
if strings.HasPrefix(desktopToken, "dev-") {
|
|
queryString["isDesktopDev"] = "true"
|
|
}
|
|
|
|
redirectURL = utils.AppendQueryParamsToURL(c.GetSiteURLHeader()+"/login/desktop", queryString)
|
|
http.Redirect(w, r, redirectURL, http.StatusFound)
|
|
return
|
|
}
|
|
|
|
// Decide between legacy token-in-URL vs SAML code-exchange for mobile
|
|
samlState := relayProps["state"]
|
|
samlChallenge := relayProps["code_challenge"]
|
|
samlMethod := relayProps["code_challenge_method"]
|
|
|
|
if isMobile && hasRedirectURL && samlChallenge != "" && c.App.Config().FeatureFlags.MobileSSOCodeExchange {
|
|
// Issue one-time login_code bound to user and SAML challenge values; do not create a session here
|
|
extra := model.MapToJSON(map[string]string{
|
|
"user_id": user.Id,
|
|
"state": samlState,
|
|
"code_challenge": samlChallenge,
|
|
"code_challenge_method": samlMethod,
|
|
})
|
|
|
|
var code *model.Token
|
|
code, err = c.App.CreateSamlRelayToken(model.TokenTypeSSOCodeExchange, extra)
|
|
if err != nil {
|
|
handleError(model.NewAppError("completeSaml", "app.recover.save.app_error", nil, "", http.StatusInternalServerError).Wrap(err))
|
|
return
|
|
}
|
|
|
|
redirectURL = utils.AppendQueryParamsToURL(redirectURL, map[string]string{
|
|
"login_code": code.Token,
|
|
})
|
|
utils.RenderMobileAuthComplete(w, redirectURL)
|
|
return
|
|
}
|
|
|
|
// Legacy: create a session and attach tokens (web/mobile without SAML code exchange)
|
|
session, err := c.App.DoLogin(c.AppContext, w, r, user, "", isMobile, false, true)
|
|
if err != nil {
|
|
handleError(err)
|
|
return
|
|
}
|
|
c.AppContext = c.AppContext.WithSession(session)
|
|
|
|
auditRec.Success()
|
|
c.LogAuditWithUserId(user.Id, "success")
|
|
c.App.AttachSessionCookies(c.AppContext, w, r)
|
|
|
|
if hasRedirectURL {
|
|
if isMobile {
|
|
// Mobile clients with redirect url support
|
|
// Legacy mobile path: return tokens only when SAML code exchange was not requested
|
|
if samlChallenge == "" {
|
|
redirectURL = utils.AppendQueryParamsToURL(redirectURL, map[string]string{
|
|
model.SessionCookieToken: c.AppContext.Session().Token,
|
|
model.SessionCookieCsrf: c.AppContext.Session().GetCSRF(),
|
|
})
|
|
}
|
|
utils.RenderMobileAuthComplete(w, redirectURL)
|
|
} else {
|
|
http.Redirect(w, r, redirectURL, http.StatusFound)
|
|
}
|
|
return
|
|
}
|
|
|
|
switch action {
|
|
// Mobile clients with web view implementation
|
|
case model.OAuthActionMobile:
|
|
ReturnStatusOK(w)
|
|
case model.OAuthActionEmailToSSO:
|
|
http.Redirect(w, r, c.GetSiteURLHeader()+"/login?extra=signin_change", http.StatusFound)
|
|
default:
|
|
http.Redirect(w, r, c.GetSiteURLHeader(), http.StatusFound)
|
|
}
|
|
}
|