mattermost/server/channels/web/magic_link.go
2025-12-17 13:50:18 +01:00

91 lines
3.1 KiB
Go

// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
// See LICENSE.txt for license information.
package web
import (
"html"
"net/http"
"github.com/mattermost/mattermost/server/public/model"
"github.com/mattermost/mattermost/server/v8/channels/utils"
)
func (w *Web) InitMagicLink() {
w.MainRouter.Handle("/login/one_time_link", w.APIHandler(loginWithMagicLinkToken)).Methods(http.MethodGet)
}
func loginWithMagicLinkToken(c *Context, w http.ResponseWriter, r *http.Request) {
auditRec := c.MakeAuditRecord(model.AuditEventLogin, model.AuditStatusFail)
auditRec.AddMeta("login_method", "guest_magic_link")
defer c.LogAuditRec(auditRec)
if !*c.App.Config().GuestAccountsSettings.EnableGuestMagicLink {
http.Redirect(w, r, c.GetSiteURLHeader()+"/login?extra=login_error&message="+html.EscapeString("Magic link is disabled"), http.StatusFound)
return
}
if c.AppContext.Session() != nil && c.AppContext.Session().UserId != "" {
http.Redirect(w, r, c.GetSiteURLHeader()+"/error?type=magic_link_already_logged_in", http.StatusFound)
return
}
tokenString := r.URL.Query().Get("t")
if tokenString == "" {
c.Err = model.NewAppError("loginWithMagicLinkToken", "api.user.guest_magic_link.missing_token.app_error", nil, "", http.StatusBadRequest)
return
}
// Rate limit by IP to prevent brute force attacks on tokens
if c.App.Srv().RateLimiter != nil {
rateLimitKey := c.App.Srv().RateLimiter.GenerateKey(r)
if c.App.Srv().RateLimiter.RateLimitWriter(rateLimitKey, w) {
return
}
}
redirectURL := html.EscapeString(r.URL.Query().Get("redirect_to"))
user, err := c.App.AuthenticateUserForGuestMagicLink(c.AppContext, tokenString)
if err != nil {
http.Redirect(w, r, c.GetSiteURLHeader()+"/login?extra=login_error&message="+html.EscapeString(err.Message), http.StatusFound)
return
}
auditRec.AddMeta("user_id", user.Id)
c.LogAuditWithUserId(user.Id, "attempt - guest_magic_link")
// Check user authentication criteria
if authErr := c.App.CheckUserAllAuthenticationCriteria(c.AppContext, user, ""); authErr != nil {
c.LogAuditWithUserId(user.Id, "failure - guest_magic_link")
utils.RenderWebAppError(c.App.Config(), w, r, authErr, c.App.AsymmetricSigningKey())
return
}
// Create session and log user in
session, err := c.App.DoLogin(c.AppContext, w, r, user, "", false, false, true)
if err != nil {
utils.RenderWebAppError(c.App.Config(), w, r, err, c.App.AsymmetricSigningKey())
return
}
c.AppContext = c.AppContext.WithSession(session)
// Mark login as successful in audit log
auditRec.Success()
c.LogAuditWithUserId(user.Id, "success - guest_magic_link")
// Attach session cookies and redirect
c.App.AttachSessionCookies(c.AppContext, w, r)
// Determine redirect URL
if redirectURL == "" {
// No redirect specified - go to root and let webapp route to appropriate location
redirectURL = c.GetSiteURLHeader()
} else {
// Validate and make redirect URL fully qualified
redirectURL = fullyQualifiedRedirectURL(c.GetSiteURLHeader(), redirectURL, c.App.Config().NativeAppSettings.AppCustomURLSchemes)
}
http.Redirect(w, r, redirectURL, http.StatusFound)
}