diff --git a/api/web.go b/api/web.go new file mode 100644 index 0000000000000000000000000000000000000000..1d00c43e497e2ae070503164432f3ab21a4bfbea --- /dev/null +++ b/api/web.go @@ -0,0 +1,175 @@ +package api + +import ( + "context" + "encoding/hex" + "encoding/json" + "errors" + "github.com/coreos/go-oidc/v3/oidc" + "github.com/gorilla/sessions" + "github.com/patrickmn/go-cache" + "golang.org/x/oauth2" + "log" + "math/rand" + "net/http" + "strings" + "time" +) + +const ( + RdpGwSession = "RDPGWSESSION" + PAAToken = "PAAToken" +) + +type Config struct { + SessionKey []byte + TokenCache *cache.Cache + OAuth2Config *oauth2.Config + store *sessions.CookieStore + TokenVerifier *oidc.IDTokenVerifier + stateStore *cache.Cache + Hosts []string + GatewayAddress string +} + +func (c *Config) NewApi() { + if len(c.SessionKey) < 32 { + log.Fatal("Session key too small") + } + if len(c.Hosts) < 1 { + log.Fatal("Not enough hosts to connect to specified") + } + c.store = sessions.NewCookieStore(c.SessionKey) + c.stateStore = cache.New(time.Minute*2, 5*time.Minute) +} + +func (c *Config) HandleCallback(w http.ResponseWriter, r *http.Request) { + state := r.URL.Query().Get("state") + s, found := c.stateStore.Get(state) + if !found { + http.Error(w, "unknown state", http.StatusBadRequest) + return + } + url := s.(string) + + ctx := context.Background() + oauth2Token, err := c.OAuth2Config.Exchange(ctx, r.URL.Query().Get("code")) + if err != nil { + http.Error(w, "Failed to exchange token: "+err.Error(), http.StatusInternalServerError) + return + } + + rawIDToken, ok := oauth2Token.Extra("id_token").(string) + if !ok { + http.Error(w, "No id_token field in oauth2 token.", http.StatusInternalServerError) + return + } + idToken, err := c.TokenVerifier.Verify(ctx, rawIDToken) + if err != nil { + http.Error(w, "Failed to verify ID Token: "+err.Error(), http.StatusInternalServerError) + return + } + + resp := struct { + OAuth2Token *oauth2.Token + IDTokenClaims *json.RawMessage // ID Token payload is just JSON. + }{oauth2Token, new(json.RawMessage)} + + if err := idToken.Claims(&resp.IDTokenClaims); err != nil { + http.Error(w, err.Error(), http.StatusInternalServerError) + return + } + + var data map[string]interface{} + if err := json.Unmarshal(*resp.IDTokenClaims, &data); err != nil { + http.Error(w, err.Error(), http.StatusInternalServerError) + return + } + + seed := make([]byte, 16) + rand.Read(seed) + token := hex.EncodeToString(seed) + + session, err := c.store.Get(r, RdpGwSession) + if err != nil { + http.Error(w, err.Error(), http.StatusInternalServerError) + return + } + + session.Values[PAAToken] = token + + if err = session.Save(r, w); err != nil { + http.Error(w, err.Error(), http.StatusInternalServerError) + } + c.TokenCache.Set(token, data, cache.DefaultExpiration) + + http.Redirect(w, r, url, http.StatusFound) +} + +func (c *Config) Authenticated(next http.Handler) http.Handler { + return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { + session, err := c.store.Get(r, RdpGwSession) + if err != nil { + http.Error(w, err.Error(), http.StatusInternalServerError) + return + } + + found := false + token := session.Values[PAAToken] + if token != nil { + _, found = c.TokenCache.Get(token.(string)) + } + + if !found { + seed := make([]byte, 16) + rand.Read(seed) + state := hex.EncodeToString(seed) + c.stateStore.Set(state, r.RequestURI, cache.DefaultExpiration) + http.Redirect(w, r, c.OAuth2Config.AuthCodeURL(state), http.StatusFound) + return + } + + next.ServeHTTP(w, r) + }) +} + +func (c *Config) HandleDownload(w http.ResponseWriter, r *http.Request) { + session, err := c.store.Get(r, RdpGwSession) + if err != nil { + http.Error(w, err.Error(), http.StatusInternalServerError) + return + } + + token := session.Values[PAAToken].(string) + data, found := c.TokenCache.Get(token) + if found == false { + // This shouldnt happen if the Authenticated handler is used to wrap this func + log.Printf("Found expired or non existent session: %s", token) + http.Error(w, errors.New("cannot find token").Error(), http.StatusInternalServerError) + return + } + + // do a round robin selection for now + rand.Seed(time.Now().Unix()) + var host = c.Hosts[rand.Intn(len(c.Hosts))] + for k, v := range data.(map[string]interface{}) { + if val, ok := v.(string); ok == true { + host = strings.Replace(host, "{{ "+k+" }}", val, 1) + } + } + + // authenticated + seed := make([]byte, 16) + rand.Read(seed) + fn := hex.EncodeToString(seed) + ".rdp" + + w.Header().Set("Content-Disposition", "attachment; filename="+fn) + w.Header().Set("Content-Type", "application/x-rdp") + http.ServeContent(w, r, fn, time.Now(), strings.NewReader( + "full address:s:"+host+"\r\n"+ + "gatewayhostname:s:"+c.GatewayAddress+"\r\n"+ + "gatewaycredentialssource:i:5\r\n"+ + "gatewayusagemethod:i:1\r\n"+ + "gatewayprofileusagemethod:i:1\r\n"+ + "gatewayaccesstoken:s:"+token+"\r\n")) +} diff --git a/config/configuration.go b/config/configuration.go index 3e9d3c01c1bb05e2e0ba25919f5ca86f7306978a..45271ba1fc10fadc7f2f16b370c0af352b0b5d95 100644 --- a/config/configuration.go +++ b/config/configuration.go @@ -18,6 +18,7 @@ type ServerConfig struct { KeyFile string Hosts []string RoundRobin bool + SessionKey string } type OpenIDConfig struct { diff --git a/go.mod b/go.mod index 44d063300e0bfeef0bb34336bed6419343b581d0..74c06d005b558a8d08f335138e194e1b528bf198 100644 --- a/go.mod +++ b/go.mod @@ -4,6 +4,7 @@ go 1.14 require ( github.com/coreos/go-oidc/v3 v3.0.0-alpha.1 + github.com/gorilla/sessions v1.2.0 github.com/gorilla/websocket v1.4.2 github.com/patrickmn/go-cache v2.1.0+incompatible github.com/prometheus/client_golang v1.7.1 diff --git a/main.go b/main.go index 2e8b8c07fa0667077b536b6335479c88bf1b91a2..ea660745c1e1b24fa8d64961f7a0eb2221676b6f 100644 --- a/main.go +++ b/main.go @@ -3,6 +3,7 @@ package main import ( "context" "crypto/tls" + "github.com/bolkedebruin/rdpgw/api" "github.com/bolkedebruin/rdpgw/config" "github.com/bolkedebruin/rdpgw/protocol" "github.com/bolkedebruin/rdpgw/security" @@ -30,17 +31,13 @@ var ( var tokens = cache.New(time.Minute *5, 10*time.Minute) var conf config.Configuration -var verifier *oidc.IDTokenVerifier -var oauthConfig oauth2.Config -var ctx context.Context - func main() { // get config cmd.PersistentFlags().StringVarP(&configFile, "conf", "c", "rdpgw.yaml", "config file (json, yaml, ini)") conf = config.Load(configFile) // set oidc config - ctx = context.Background() + ctx := context.Background() provider, err := oidc.NewProvider(ctx, conf.OpenId.ProviderUrl) if err != nil { log.Fatalf("Cannot get oidc provider: %s", err) @@ -48,9 +45,9 @@ func main() { oidcConfig := &oidc.Config{ ClientID: conf.OpenId.ClientId, } - verifier = provider.Verifier(oidcConfig) + verifier := provider.Verifier(oidcConfig) - oauthConfig = oauth2.Config{ + oauthConfig := oauth2.Config{ ClientID: conf.OpenId.ClientId, ClientSecret: conf.OpenId.ClientSecret, RedirectURL: "https://" + conf.Server.GatewayAddress + "/callback", @@ -58,6 +55,16 @@ func main() { Scopes: []string{oidc.ScopeOpenID, "profile", "email"}, } + api := &api.Config{ + GatewayAddress: conf.Server.GatewayAddress, + OAuth2Config: &oauthConfig, + TokenVerifier: verifier, + TokenCache: tokens, + SessionKey: []byte(conf.Server.SessionKey), + Hosts: conf.Server.Hosts, + } + api.NewApi() + if conf.Server.CertFile == "" || conf.Server.KeyFile == "" { log.Fatal("Both certfile and keyfile need to be specified") } @@ -115,9 +122,9 @@ func main() { } http.HandleFunc("/remoteDesktopGateway/", gw.HandleGatewayProtocol) - http.HandleFunc("/connect", handleRdpDownload) + http.Handle("/connect", api.Authenticated(http.HandlerFunc(api.HandleDownload))) http.Handle("/metrics", promhttp.Handler()) - http.HandleFunc("/callback", handleCallback) + http.HandleFunc("/callback", api.HandleCallback) err = server.ListenAndServeTLS("", "") if err != nil {