|
package auth |
|
|
|
import ( |
|
"context" |
|
"database/sql" |
|
"encoding/json" |
|
"io" |
|
"net/http" |
|
"net/url" |
|
"path" |
|
"sort" |
|
"strings" |
|
"time" |
|
|
|
"github.com/google/uuid" |
|
"github.com/pkg/errors" |
|
"github.com/target/goalert/auth/authtoken" |
|
"github.com/target/goalert/config" |
|
"github.com/target/goalert/integrationkey" |
|
"github.com/target/goalert/permission" |
|
"github.com/target/goalert/user" |
|
"github.com/target/goalert/util" |
|
"github.com/target/goalert/util/errutil" |
|
"github.com/target/goalert/util/log" |
|
"github.com/target/goalert/util/sqlutil" |
|
"github.com/target/goalert/validation" |
|
"github.com/target/goalert/validation/validate" |
|
) |
|
|
|
|
|
const ( |
|
CookieName = "goalert_session.2" |
|
v1CookieName = "goalert_session" |
|
) |
|
|
|
type registeredProvider struct { |
|
|
|
ID string |
|
|
|
|
|
URL string |
|
|
|
ProviderInfo |
|
} |
|
|
|
|
|
type Handler struct { |
|
providers map[string]IdentityProvider |
|
cfg HandlerConfig |
|
|
|
db *sql.DB |
|
userLookup *sql.Stmt |
|
addSubject *sql.Stmt |
|
updateUA *sql.Stmt |
|
updateUser *sql.Stmt |
|
|
|
startSession *sql.Stmt |
|
fetchSession *sql.Stmt |
|
endSession *sql.Stmt |
|
|
|
userSessions *sql.Stmt |
|
endSessionUser *sql.Stmt |
|
endAllSessionsUser *sql.Stmt |
|
} |
|
|
|
|
|
func NewHandler(ctx context.Context, db *sql.DB, cfg HandlerConfig) (*Handler, error) { |
|
p := &util.Prepare{ |
|
DB: db, |
|
Ctx: ctx, |
|
} |
|
|
|
h := &Handler{ |
|
providers: make(map[string]IdentityProvider), |
|
db: db, |
|
|
|
cfg: cfg, |
|
|
|
updateUser: p.P(` |
|
update users |
|
set |
|
name = case when $2 = '' then name else $2 end, |
|
email = case when $3 = '' then email else $3 end |
|
where id = $1 |
|
`), |
|
|
|
userLookup: p.P(` |
|
select user_id |
|
from auth_subjects |
|
where |
|
provider_id = $1 and |
|
subject_id = $2 |
|
`), |
|
addSubject: p.P(` |
|
insert into auth_subjects (provider_id, subject_id, user_id) |
|
values ($1, $2, $3) |
|
`), |
|
startSession: p.P(` |
|
insert into auth_user_sessions (id, user_agent, user_id) |
|
values ($1, $2, $3) |
|
`), |
|
endSession: p.P(` |
|
delete from auth_user_sessions |
|
where id = any($1) |
|
`), |
|
|
|
updateUA: p.P(` |
|
update auth_user_sessions |
|
set user_agent = $2 |
|
where id = $1 |
|
`), |
|
|
|
fetchSession: p.P(` |
|
with update as ( |
|
update auth_user_sessions |
|
set last_access_at = now() |
|
where id = $1 AND (last_access_at isnull OR last_access_at < now() - '1 minute'::interval) |
|
) |
|
select sess.user_id, u.role |
|
from auth_user_sessions sess |
|
join users u on u.id = sess.user_id |
|
where sess.id = $1 |
|
`), |
|
|
|
userSessions: p.P(` |
|
select id, user_agent, created_at, last_access_at |
|
from auth_user_sessions |
|
where user_id = $1 |
|
`), |
|
|
|
endSessionUser: p.P(` |
|
delete from auth_user_sessions |
|
where user_id = $1 and id = $2 |
|
`), |
|
|
|
endAllSessionsUser: p.P(` |
|
delete from auth_user_sessions |
|
where user_id = $1 and id != $2 |
|
`), |
|
} |
|
|
|
return h, p.Err |
|
} |
|
|
|
|
|
type UserSession struct { |
|
ID string |
|
UserAgent string |
|
CreatedAt time.Time |
|
LastAccessAt time.Time |
|
UserID string |
|
} |
|
|
|
func (h *Handler) EndUserSessionTx(ctx context.Context, tx *sql.Tx, id ...string) error { |
|
err := permission.LimitCheckAny(ctx, permission.User) |
|
if err != nil { |
|
return err |
|
} |
|
if permission.Admin(ctx) { |
|
_, err = tx.StmtContext(ctx, h.endSession).ExecContext(ctx, sqlutil.UUIDArray(id)) |
|
} else { |
|
_, err = tx.StmtContext(ctx, h.endSessionUser).ExecContext(ctx, permission.UserNullUUID(ctx), sqlutil.UUIDArray(id)) |
|
} |
|
return err |
|
} |
|
|
|
|
|
func (h *Handler) EndAllUserSessionsTx(ctx context.Context, tx *sql.Tx) error { |
|
err := permission.LimitCheckAny(ctx, permission.Admin, permission.MatchUser(permission.UserID(ctx))) |
|
if err != nil { |
|
return err |
|
} |
|
|
|
|
|
src := permission.Source(ctx) |
|
|
|
stmt := h.endAllSessionsUser |
|
if tx != nil { |
|
stmt = tx.StmtContext(ctx, stmt) |
|
} |
|
_, err = stmt.ExecContext(ctx, permission.UserNullUUID(ctx), src.ID) |
|
|
|
return err |
|
} |
|
|
|
func (h *Handler) FindAllUserSessions(ctx context.Context, userID string) ([]UserSession, error) { |
|
err := permission.LimitCheckAny(ctx, permission.Admin, permission.MatchUser(userID)) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
rows, err := h.userSessions.QueryContext(ctx, userID) |
|
if err != nil { |
|
return nil, err |
|
} |
|
defer rows.Close() |
|
var sessions []UserSession |
|
for rows.Next() { |
|
s := UserSession{UserID: userID} |
|
var lastAccess sql.NullTime |
|
err = rows.Scan(&s.ID, &s.UserAgent, &s.CreatedAt, &lastAccess) |
|
if err != nil { |
|
return nil, err |
|
} |
|
s.LastAccessAt = lastAccess.Time.Truncate(time.Minute) |
|
s.CreatedAt = s.CreatedAt.Truncate(time.Minute) |
|
sessions = append(sessions, s) |
|
} |
|
|
|
return sessions, nil |
|
} |
|
|
|
|
|
func (h *Handler) ServeLogout(w http.ResponseWriter, req *http.Request) { |
|
ClearCookie(w, req, CookieName, true) |
|
var sessionIDs []string |
|
for _, c := range req.Cookies() { |
|
switch c.Name { |
|
case CookieName, v1CookieName: |
|
default: |
|
|
|
continue |
|
} |
|
|
|
tok, _, _ := authtoken.Parse(c.Value, nil) |
|
if tok == nil { |
|
continue |
|
} |
|
sessionIDs = append(sessionIDs, tok.ID.String()) |
|
} |
|
ctx := req.Context() |
|
src := permission.Source(ctx) |
|
if src != nil && src.Type == permission.SourceTypeAuthProvider { |
|
sessionIDs = append(sessionIDs, src.ID) |
|
} |
|
|
|
if len(sessionIDs) == 0 { |
|
|
|
return |
|
} |
|
|
|
_, err := h.endSession.ExecContext(log.FromContext(ctx).BackgroundContext(), sqlutil.UUIDArray(sessionIDs)) |
|
if err != nil { |
|
log.Log(ctx, errors.Wrap(err, "end session(s)")) |
|
} |
|
} |
|
|
|
|
|
func (h *Handler) ServeProviders(w http.ResponseWriter, req *http.Request) { |
|
w.Header().Set("Content-Type", "application/json") |
|
ctx := req.Context() |
|
info := make([]registeredProvider, 0, len(h.providers)) |
|
|
|
u, err := url.Parse(req.RequestURI) |
|
if errutil.HTTPError(ctx, w, err) { |
|
return |
|
} |
|
|
|
|
|
|
|
|
|
pathPrefix := strings.TrimSuffix(u.Path, req.URL.Path) |
|
|
|
for id, p := range h.providers { |
|
if !p.Info(ctx).Enabled { |
|
continue |
|
} |
|
|
|
info = append(info, registeredProvider{ |
|
ID: id, |
|
URL: path.Join(pathPrefix, "/api/v2/identity/providers", url.PathEscape(id)), |
|
ProviderInfo: p.Info(ctx), |
|
}) |
|
} |
|
|
|
sort.Slice(info, func(i, j int) bool { return info[i].ID < info[j].ID }) |
|
data, err := json.Marshal(info) |
|
if errutil.HTTPError(req.Context(), w, err) { |
|
return |
|
} |
|
_, _ = w.Write(data) |
|
} |
|
|
|
|
|
|
|
|
|
func (h *Handler) IdentityProviderHandler(id string) http.HandlerFunc { |
|
p, ok := h.providers[id] |
|
if !ok { |
|
panic("IdentityProvider " + id + " does not exist") |
|
} |
|
|
|
return func(w http.ResponseWriter, req *http.Request) { |
|
ctx := req.Context() |
|
cfg := config.FromContext(ctx) |
|
|
|
var refU *url.URL |
|
if req.Method == "POST" { |
|
if cfg.ShouldUsePublicURL() { |
|
refU, _ = url.Parse(req.Header.Get("referer")) |
|
if refU == nil || !cfg.ValidReferer("", req.Header.Get("referer")) { |
|
|
|
q := make(url.Values) |
|
q.Set("login_error", "invalid referer") |
|
http.Redirect(w, req, cfg.CallbackURL("", q), http.StatusTemporaryRedirect) |
|
return |
|
} |
|
} else { |
|
|
|
var ok bool |
|
refU, ok = h.refererURL(w, req) |
|
if !ok { |
|
errutil.HTTPError(ctx, w, validation.NewFieldError("referer", "failed to resolve referer")) |
|
return |
|
} |
|
} |
|
} else { |
|
c, err := req.Cookie("login_redir") |
|
if err != nil { |
|
errutil.HTTPError(ctx, w, validation.NewFieldError("login_redir", err.Error())) |
|
return |
|
} |
|
refU, _ = url.Parse(c.Value) |
|
if refU == nil || !cfg.ValidReferer(req.URL.String(), c.Value) { |
|
|
|
q := make(url.Values) |
|
q.Set("login_error", "invalid referer") |
|
http.Redirect(w, req, cfg.CallbackURL("", q), http.StatusTemporaryRedirect) |
|
return |
|
} |
|
} |
|
|
|
info := p.Info(ctx) |
|
if !info.Enabled { |
|
err := Error(info.Title + " auth disabled") |
|
q := refU.Query() |
|
q.Set("login_error", err.Error()) |
|
refU.RawQuery = q.Encode() |
|
http.Redirect(w, req, refU.String(), http.StatusFound) |
|
return |
|
} |
|
|
|
if req.Method == "POST" { |
|
h.serveProviderPost(id, p, refU, w, req) |
|
return |
|
} |
|
|
|
h.handleProvider(id, p, refU, w, req) |
|
} |
|
} |
|
|
|
|
|
type Redirector interface { |
|
RedirectURL() string |
|
} |
|
|
|
|
|
|
|
type RedirectURL string |
|
|
|
|
|
|
|
type Error string |
|
|
|
|
|
func (Error) ClientError() bool { return true } |
|
|
|
func (a Error) Error() string { return string(a) } |
|
|
|
func (RedirectURL) Error() string { return "must redirect to acquire identity" } |
|
|
|
|
|
func (r RedirectURL) RedirectURL() string { return string(r) } |
|
|
|
func (h *Handler) canCreateUser(ctx context.Context, providerID string) bool { |
|
cfg := config.FromContext(ctx) |
|
switch providerID { |
|
case "oidc": |
|
return cfg.OIDC.NewUsers |
|
case "github": |
|
return cfg.GitHub.NewUsers |
|
} |
|
|
|
return false |
|
} |
|
|
|
func (h *Handler) handleProvider(id string, p IdentityProvider, refU *url.URL, w http.ResponseWriter, req *http.Request) { |
|
ctx := req.Context() |
|
|
|
var route RouteInfo |
|
route.RelativePath = strings.TrimPrefix(req.URL.Path, "/v1/identity/providers/"+id) |
|
route.RelativePath = strings.TrimPrefix(route.RelativePath, "/api/v2/identity/providers/"+id) |
|
if route.RelativePath == "" { |
|
route.RelativePath = "/" |
|
} |
|
|
|
cfg := config.FromContext(ctx) |
|
if cfg.ShouldUsePublicURL() { |
|
route.CurrentURL = cfg.CallbackURL(req.URL.Path) |
|
} else { |
|
u := *req.URL |
|
u.RawQuery = "" |
|
route.CurrentURL = u.String() |
|
} |
|
|
|
sub, err := p.ExtractIdentity(&route, w, req) |
|
var r Redirector |
|
if errors.As(err, &r) { |
|
http.Redirect(w, req, r.RedirectURL(), http.StatusFound) |
|
return |
|
} |
|
noRedirect := req.FormValue("noRedirect") == "1" |
|
|
|
errRedirect := func(err error) { |
|
q := refU.Query() |
|
old := err |
|
_, err = errutil.ScrubError(err) |
|
if err != old { |
|
log.Log(ctx, old) |
|
} |
|
q.Set("login_error", err.Error()) |
|
refU.RawQuery = q.Encode() |
|
if noRedirect { |
|
if err != old { |
|
w.WriteHeader(500) |
|
} else { |
|
w.WriteHeader(400) |
|
} |
|
_, _ = io.WriteString(w, err.Error()) |
|
return |
|
} |
|
http.Redirect(w, req, refU.String(), http.StatusFound) |
|
} |
|
|
|
if err != nil { |
|
errRedirect(err) |
|
return |
|
} |
|
|
|
var userID string |
|
err = h.userLookup.QueryRowContext(ctx, id, sub.SubjectID).Scan(&userID) |
|
if errors.Is(err, sql.ErrNoRows) { |
|
err = nil |
|
} |
|
if err != nil { |
|
errRedirect(err) |
|
return |
|
} |
|
|
|
var newUser bool |
|
if userID == "" { |
|
newUser = true |
|
|
|
if !h.canCreateUser(ctx, id) { |
|
errRedirect(Error("New users are not allowed right now, but you can try again later.")) |
|
log.Log(ctx, errors.New("create user: disabled for provider")) |
|
return |
|
} |
|
|
|
|
|
tx, err := h.db.BeginTx(ctx, nil) |
|
if err != nil { |
|
errRedirect(err) |
|
return |
|
} |
|
defer sqlutil.Rollback(ctx, "auth: create user", tx) |
|
|
|
u := &user.User{ |
|
Role: permission.RoleUser, |
|
Name: validate.SanitizeName(sub.Name), |
|
Email: validate.SanitizeEmail(sub.Email), |
|
} |
|
permission.SudoContext(ctx, func(ctx context.Context) { |
|
u, err = h.cfg.UserStore.InsertTx(ctx, tx, u) |
|
}) |
|
if err != nil { |
|
errRedirect(err) |
|
return |
|
} |
|
_, err = tx.Stmt(h.addSubject).ExecContext(ctx, id, sub.SubjectID, u.ID) |
|
userID = u.ID |
|
if err != nil { |
|
errRedirect(err) |
|
return |
|
} |
|
err = tx.Commit() |
|
if err != nil { |
|
errRedirect(err) |
|
return |
|
} |
|
} else { |
|
_, err = h.updateUser.ExecContext(ctx, userID, validate.SanitizeName(sub.Name), |
|
validate.SanitizeEmail(sub.Email)) |
|
if err != nil { |
|
log.Log(ctx, errors.Wrap(err, "update user info")) |
|
} |
|
} |
|
|
|
tok, err := h.CreateSession(ctx, req.UserAgent(), userID) |
|
if err != nil { |
|
errRedirect(err) |
|
return |
|
} |
|
tokStr, err := tok.Encode(h.cfg.SessionKeyring.Sign) |
|
if err != nil { |
|
errRedirect(err) |
|
return |
|
} |
|
|
|
if noRedirect { |
|
_, _ = io.WriteString(w, tokStr) |
|
return |
|
} |
|
|
|
h.setSessionCookie(w, req, tokStr) |
|
|
|
if newUser { |
|
q := refU.Query() |
|
q.Set("isFirstLogin", "1") |
|
refU.RawQuery = q.Encode() |
|
} |
|
|
|
http.Redirect(w, req, refU.String(), http.StatusFound) |
|
} |
|
|
|
|
|
func (h *Handler) CreateSession(ctx context.Context, userAgent, userID string) (*authtoken.Token, error) { |
|
tok := &authtoken.Token{ |
|
Version: 1, |
|
Type: authtoken.TypeSession, |
|
ID: uuid.New(), |
|
} |
|
_, err := h.startSession.ExecContext(ctx, tok.ID.String(), userAgent, userID) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
return tok, nil |
|
} |
|
|
|
func (h *Handler) setSessionCookie(w http.ResponseWriter, req *http.Request, val string) { |
|
SetCookieAge(w, req, CookieName, val, 30*24*time.Hour, true) |
|
} |
|
|
|
func (h *Handler) authWithToken(w http.ResponseWriter, req *http.Request, next http.Handler) bool { |
|
err := req.ParseMultipartForm(32 << 20) |
|
if err != nil && !errors.Is(err, http.ErrNotMultipart) { |
|
http.Error(w, err.Error(), 400) |
|
return true |
|
} |
|
|
|
tokStr := GetToken(req) |
|
if tokStr == "" { |
|
return false |
|
} |
|
|
|
ctx := req.Context() |
|
if req.URL.Path == "/api/graphql" && strings.HasPrefix(tokStr, "ey") { |
|
ctx, err = h.cfg.APIKeyStore.AuthorizeGraphQL(ctx, tokStr, req.UserAgent(), req.RemoteAddr) |
|
if errutil.HTTPError(req.Context(), w, err) { |
|
return true |
|
} |
|
|
|
next.ServeHTTP(w, req.WithContext(ctx)) |
|
return true |
|
} |
|
if req.URL.Path == "/api/v2/uik" && strings.HasPrefix(tokStr, "ey") { |
|
ctx, err = h.cfg.IntKeyStore.AuthorizeUIK(ctx, tokStr) |
|
if errutil.HTTPError(req.Context(), w, err) { |
|
return true |
|
} |
|
|
|
next.ServeHTTP(w, req.WithContext(ctx)) |
|
return true |
|
} |
|
|
|
tok, _, err := authtoken.Parse(tokStr, func(t authtoken.Type, p, sig []byte) (bool, bool) { |
|
if t == authtoken.TypeSession { |
|
return h.cfg.SessionKeyring.Verify(p, sig) |
|
} |
|
|
|
return h.cfg.APIKeyring.Verify(p, sig) |
|
}) |
|
if errutil.HTTPError(req.Context(), w, err) { |
|
return true |
|
} |
|
|
|
switch req.URL.Path { |
|
case "/v1/api/alerts", "/api/v2/generic/incoming": |
|
ctx, err = h.cfg.IntKeyStore.Authorize(ctx, *tok, integrationkey.TypeGeneric) |
|
case "/v1/webhooks/grafana", "/api/v2/grafana/incoming": |
|
ctx, err = h.cfg.IntKeyStore.Authorize(ctx, *tok, integrationkey.TypeGrafana) |
|
case "/api/v2/site24x7/incoming": |
|
ctx, err = h.cfg.IntKeyStore.Authorize(ctx, *tok, integrationkey.TypeSite24x7) |
|
case "/api/v2/prometheusalertmanager/incoming": |
|
ctx, err = h.cfg.IntKeyStore.Authorize(ctx, *tok, integrationkey.TypePrometheusAlertmanager) |
|
case "/api/v2/calendar": |
|
ctx, err = h.cfg.CalSubStore.Authorize(ctx, *tok) |
|
default: |
|
return false |
|
} |
|
|
|
if errutil.HTTPError(req.Context(), w, err) { |
|
return true |
|
} |
|
|
|
next.ServeHTTP(w, req.WithContext(ctx)) |
|
return true |
|
} |
|
|
|
func (h *Handler) tryAuthUser(ctx context.Context, w http.ResponseWriter, req *http.Request, tokenStr string, isCookie bool) (context.Context, error) { |
|
tok, isOld, err := authtoken.Parse(tokenStr, func(t authtoken.Type, p, sig []byte) (bool, bool) { |
|
|
|
return h.cfg.SessionKeyring.Verify(p, sig) |
|
}) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
var userID uuid.UUID |
|
var userRole permission.Role |
|
err = h.fetchSession.QueryRowContext(ctx, tok.ID.String()).Scan(&userID, &userRole) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
if isCookie && isOld { |
|
|
|
newSignedToken, err := tok.Encode(h.cfg.SessionKeyring.Sign) |
|
if err != nil { |
|
log.Log(ctx, errors.Wrap(err, "failed to sign/issue new session token")) |
|
} else { |
|
h.setSessionCookie(w, req, newSignedToken) |
|
_, err = h.updateUA.ExecContext(ctx, tok.ID.String(), req.UserAgent()) |
|
if err != nil { |
|
log.Log(ctx, errors.Wrap(err, "update user agent (session key refresh)")) |
|
} |
|
} |
|
} |
|
|
|
return permission.UserSourceContext( |
|
ctx, |
|
userID.String(), |
|
userRole, |
|
&permission.SourceInfo{ |
|
Type: permission.SourceTypeAuthProvider, |
|
ID: tok.ID.String(), |
|
}, |
|
), nil |
|
} |
|
|
|
|
|
|
|
|
|
|
|
func (h *Handler) WrapHandler(wrapped http.Handler) http.Handler { |
|
return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) { |
|
if strings.HasPrefix(req.URL.Path, "/api/v2/slack") { |
|
wrapped.ServeHTTP(w, req) |
|
return |
|
} |
|
if req.URL.Path == "/api/v2/mailgun/incoming" || req.URL.Path == "/v1/webhooks/mailgun" { |
|
|
|
|
|
|
|
wrapped.ServeHTTP(w, req) |
|
return |
|
} |
|
if h.authWithToken(w, req, wrapped) { |
|
return |
|
} |
|
|
|
|
|
|
|
tokStr := GetToken(req) |
|
|
|
if tokStr != "" { |
|
ctx, err := h.tryAuthUser(req.Context(), w, req, tokStr, false) |
|
if err != nil { |
|
wrapped.ServeHTTP(w, req) |
|
return |
|
} |
|
|
|
wrapped.ServeHTTP(w, req.WithContext(ctx)) |
|
return |
|
} |
|
|
|
for _, c := range req.Cookies() { |
|
switch c.Name { |
|
case CookieName, v1CookieName: |
|
default: |
|
|
|
continue |
|
} |
|
|
|
ctx, err := h.tryAuthUser(req.Context(), w, req, c.Value, true) |
|
if err != nil { |
|
continue |
|
} |
|
|
|
wrapped.ServeHTTP(w, req.WithContext(ctx)) |
|
return |
|
} |
|
|
|
wrapped.ServeHTTP(w, req) |
|
}) |
|
} |
|
|
|
func (h *Handler) refererURL(w http.ResponseWriter, req *http.Request) (*url.URL, bool) { |
|
ref := req.Header.Get("referer") |
|
ctx := req.Context() |
|
cfg := config.FromContext(ctx) |
|
refU, err := url.Parse(ref) |
|
if err != nil { |
|
errutil.HTTPError(ctx, w, validation.NewFieldError("referer", err.Error())) |
|
return nil, false |
|
} |
|
|
|
if !cfg.ValidReferer(req.URL.String(), ref) { |
|
err := validation.NewFieldError("referer", "wrong host/path") |
|
ctx = log.WithFields(ctx, log.Fields{ |
|
"AuthRefererURLs": cfg.Auth.RefererURLs, |
|
"PublicURL": cfg.PublicURL(), |
|
}) |
|
log.Log(ctx, err) |
|
errutil.HTTPError(ctx, w, err) |
|
return nil, false |
|
} |
|
|
|
q := refU.Query() |
|
q.Del("isFirstLogin") |
|
q.Del("login_error") |
|
refU.RawQuery = q.Encode() |
|
return refU, true |
|
} |
|
|
|
func (h *Handler) serveProviderPost(id string, p IdentityProvider, refU *url.URL, w http.ResponseWriter, req *http.Request) { |
|
SetCookie(w, req, "login_redir", refU.String(), false) |
|
|
|
h.handleProvider(id, p, refU, w, req) |
|
} |
|
|
|
|
|
func (h *Handler) AddIdentityProvider(id string, idp IdentityProvider) error { |
|
if h.providers[id] != nil { |
|
return errors.Errorf("provider already exists with id '%s'", id) |
|
} |
|
|
|
h.providers[id] = idp |
|
return nil |
|
} |
|
|