2017-02-22 08:14:37 +01:00
|
|
|
// Copyright 2017 The Gitea Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package oauth2
|
|
|
|
|
|
|
|
import (
|
2017-05-01 15:26:53 +02:00
|
|
|
"math"
|
2017-03-03 09:21:31 +01:00
|
|
|
"net/http"
|
|
|
|
|
2017-02-22 08:14:37 +01:00
|
|
|
"code.gitea.io/gitea/modules/log"
|
2017-03-03 09:21:31 +01:00
|
|
|
"code.gitea.io/gitea/modules/setting"
|
|
|
|
|
2018-04-29 08:09:24 +02:00
|
|
|
"github.com/go-xorm/xorm"
|
|
|
|
"github.com/lafriks/xormstore"
|
2017-02-22 08:14:37 +01:00
|
|
|
"github.com/markbates/goth"
|
|
|
|
"github.com/markbates/goth/gothic"
|
2017-05-01 15:26:53 +02:00
|
|
|
"github.com/markbates/goth/providers/bitbucket"
|
2019-01-13 20:06:22 +01:00
|
|
|
"github.com/markbates/goth/providers/discord"
|
2017-05-01 15:26:53 +02:00
|
|
|
"github.com/markbates/goth/providers/dropbox"
|
|
|
|
"github.com/markbates/goth/providers/facebook"
|
2017-02-22 08:14:37 +01:00
|
|
|
"github.com/markbates/goth/providers/github"
|
2017-05-01 15:26:53 +02:00
|
|
|
"github.com/markbates/goth/providers/gitlab"
|
|
|
|
"github.com/markbates/goth/providers/gplus"
|
|
|
|
"github.com/markbates/goth/providers/openidConnect"
|
|
|
|
"github.com/markbates/goth/providers/twitter"
|
2017-03-03 09:21:31 +01:00
|
|
|
"github.com/satori/go.uuid"
|
2017-02-22 08:14:37 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
sessionUsersStoreKey = "gitea-oauth2-sessions"
|
|
|
|
providerHeaderKey = "gitea-oauth2-provider"
|
|
|
|
)
|
|
|
|
|
2017-05-01 15:26:53 +02:00
|
|
|
// CustomURLMapping describes the urls values to use when customizing OAuth2 provider URLs
|
|
|
|
type CustomURLMapping struct {
|
|
|
|
AuthURL string
|
|
|
|
TokenURL string
|
|
|
|
ProfileURL string
|
|
|
|
EmailURL string
|
|
|
|
}
|
|
|
|
|
2017-02-22 08:14:37 +01:00
|
|
|
// Init initialize the setup of the OAuth2 library
|
2018-04-29 08:09:24 +02:00
|
|
|
func Init(x *xorm.Engine) error {
|
|
|
|
store, err := xormstore.NewOptions(x, xormstore.Options{
|
|
|
|
TableName: "oauth2_session",
|
|
|
|
}, []byte(sessionUsersStoreKey))
|
2017-02-22 08:14:37 +01:00
|
|
|
|
2018-04-29 08:09:24 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2017-05-01 15:26:53 +02:00
|
|
|
// according to the Goth lib:
|
|
|
|
// set the maxLength of the cookies stored on the disk to a larger number to prevent issues with:
|
|
|
|
// securecookie: the value is too long
|
|
|
|
// when using OpenID Connect , since this can contain a large amount of extra information in the id_token
|
|
|
|
|
|
|
|
// Note, when using the FilesystemStore only the session.ID is written to a browser cookie, so this is explicit for the storage on disk
|
|
|
|
store.MaxLength(math.MaxInt16)
|
|
|
|
gothic.Store = store
|
2017-02-22 08:14:37 +01:00
|
|
|
|
|
|
|
gothic.SetState = func(req *http.Request) string {
|
|
|
|
return uuid.NewV4().String()
|
|
|
|
}
|
|
|
|
|
|
|
|
gothic.GetProviderName = func(req *http.Request) (string, error) {
|
|
|
|
return req.Header.Get(providerHeaderKey), nil
|
|
|
|
}
|
|
|
|
|
2018-04-29 08:09:24 +02:00
|
|
|
return nil
|
2017-02-22 08:14:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Auth OAuth2 auth service
|
|
|
|
func Auth(provider string, request *http.Request, response http.ResponseWriter) error {
|
|
|
|
// not sure if goth is thread safe (?) when using multiple providers
|
|
|
|
request.Header.Set(providerHeaderKey, provider)
|
|
|
|
|
|
|
|
// don't use the default gothic begin handler to prevent issues when some error occurs
|
|
|
|
// normally the gothic library will write some custom stuff to the response instead of our own nice error page
|
|
|
|
//gothic.BeginAuthHandler(response, request)
|
|
|
|
|
|
|
|
url, err := gothic.GetAuthURL(response, request)
|
|
|
|
if err == nil {
|
|
|
|
http.Redirect(response, request, url, http.StatusTemporaryRedirect)
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// ProviderCallback handles OAuth callback, resolve to a goth user and send back to original url
|
|
|
|
// this will trigger a new authentication request, but because we save it in the session we can use that
|
|
|
|
func ProviderCallback(provider string, request *http.Request, response http.ResponseWriter) (goth.User, error) {
|
|
|
|
// not sure if goth is thread safe (?) when using multiple providers
|
|
|
|
request.Header.Set(providerHeaderKey, provider)
|
|
|
|
|
|
|
|
user, err := gothic.CompleteUserAuth(response, request)
|
|
|
|
if err != nil {
|
|
|
|
return user, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return user, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// RegisterProvider register a OAuth2 provider in goth lib
|
2017-05-01 15:26:53 +02:00
|
|
|
func RegisterProvider(providerName, providerType, clientID, clientSecret, openIDConnectAutoDiscoveryURL string, customURLMapping *CustomURLMapping) error {
|
|
|
|
provider, err := createProvider(providerName, providerType, clientID, clientSecret, openIDConnectAutoDiscoveryURL, customURLMapping)
|
2017-02-22 08:14:37 +01:00
|
|
|
|
2017-05-01 15:26:53 +02:00
|
|
|
if err == nil && provider != nil {
|
2017-02-22 08:14:37 +01:00
|
|
|
goth.UseProviders(provider)
|
|
|
|
}
|
2017-05-01 15:26:53 +02:00
|
|
|
|
|
|
|
return err
|
2017-02-22 08:14:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// RemoveProvider removes the given OAuth2 provider from the goth lib
|
|
|
|
func RemoveProvider(providerName string) {
|
|
|
|
delete(goth.GetProviders(), providerName)
|
|
|
|
}
|
|
|
|
|
|
|
|
// used to create different types of goth providers
|
2017-05-01 15:26:53 +02:00
|
|
|
func createProvider(providerName, providerType, clientID, clientSecret, openIDConnectAutoDiscoveryURL string, customURLMapping *CustomURLMapping) (goth.Provider, error) {
|
2017-02-22 08:14:37 +01:00
|
|
|
callbackURL := setting.AppURL + "user/oauth2/" + providerName + "/callback"
|
|
|
|
|
|
|
|
var provider goth.Provider
|
2017-05-01 15:26:53 +02:00
|
|
|
var err error
|
2017-02-22 08:14:37 +01:00
|
|
|
|
|
|
|
switch providerType {
|
2017-05-01 15:26:53 +02:00
|
|
|
case "bitbucket":
|
|
|
|
provider = bitbucket.New(clientID, clientSecret, callbackURL, "account")
|
|
|
|
case "dropbox":
|
|
|
|
provider = dropbox.New(clientID, clientSecret, callbackURL)
|
|
|
|
case "facebook":
|
|
|
|
provider = facebook.New(clientID, clientSecret, callbackURL, "email")
|
2017-02-22 08:14:37 +01:00
|
|
|
case "github":
|
2017-05-01 15:26:53 +02:00
|
|
|
authURL := github.AuthURL
|
|
|
|
tokenURL := github.TokenURL
|
|
|
|
profileURL := github.ProfileURL
|
|
|
|
emailURL := github.EmailURL
|
|
|
|
if customURLMapping != nil {
|
|
|
|
if len(customURLMapping.AuthURL) > 0 {
|
|
|
|
authURL = customURLMapping.AuthURL
|
|
|
|
}
|
|
|
|
if len(customURLMapping.TokenURL) > 0 {
|
|
|
|
tokenURL = customURLMapping.TokenURL
|
|
|
|
}
|
|
|
|
if len(customURLMapping.ProfileURL) > 0 {
|
|
|
|
profileURL = customURLMapping.ProfileURL
|
|
|
|
}
|
|
|
|
if len(customURLMapping.EmailURL) > 0 {
|
|
|
|
emailURL = customURLMapping.EmailURL
|
|
|
|
}
|
|
|
|
}
|
|
|
|
provider = github.NewCustomisedURL(clientID, clientSecret, callbackURL, authURL, tokenURL, profileURL, emailURL)
|
|
|
|
case "gitlab":
|
|
|
|
authURL := gitlab.AuthURL
|
|
|
|
tokenURL := gitlab.TokenURL
|
|
|
|
profileURL := gitlab.ProfileURL
|
|
|
|
if customURLMapping != nil {
|
|
|
|
if len(customURLMapping.AuthURL) > 0 {
|
|
|
|
authURL = customURLMapping.AuthURL
|
|
|
|
}
|
|
|
|
if len(customURLMapping.TokenURL) > 0 {
|
|
|
|
tokenURL = customURLMapping.TokenURL
|
|
|
|
}
|
|
|
|
if len(customURLMapping.ProfileURL) > 0 {
|
|
|
|
profileURL = customURLMapping.ProfileURL
|
|
|
|
}
|
|
|
|
}
|
2018-06-30 19:13:17 +02:00
|
|
|
provider = gitlab.NewCustomisedURL(clientID, clientSecret, callbackURL, authURL, tokenURL, profileURL, "read_user")
|
2017-05-01 15:26:53 +02:00
|
|
|
case "gplus":
|
|
|
|
provider = gplus.New(clientID, clientSecret, callbackURL, "email")
|
|
|
|
case "openidConnect":
|
|
|
|
if provider, err = openidConnect.New(clientID, clientSecret, callbackURL, openIDConnectAutoDiscoveryURL); err != nil {
|
|
|
|
log.Warn("Failed to create OpenID Connect Provider with name '%s' with url '%s': %v", providerName, openIDConnectAutoDiscoveryURL, err)
|
|
|
|
}
|
|
|
|
case "twitter":
|
|
|
|
provider = twitter.NewAuthenticate(clientID, clientSecret, callbackURL)
|
2019-01-13 20:06:22 +01:00
|
|
|
case "discord":
|
|
|
|
provider = discord.New(clientID, clientSecret, callbackURL, discord.ScopeIdentify, discord.ScopeEmail)
|
2017-02-22 08:14:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// always set the name if provider is created so we can support multiple setups of 1 provider
|
2017-05-01 15:26:53 +02:00
|
|
|
if err == nil && provider != nil {
|
2017-02-22 08:14:37 +01:00
|
|
|
provider.SetName(providerName)
|
|
|
|
}
|
|
|
|
|
2017-05-01 15:26:53 +02:00
|
|
|
return provider, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetDefaultTokenURL return the default token url for the given provider
|
|
|
|
func GetDefaultTokenURL(provider string) string {
|
|
|
|
switch provider {
|
|
|
|
case "github":
|
|
|
|
return github.TokenURL
|
|
|
|
case "gitlab":
|
|
|
|
return gitlab.TokenURL
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetDefaultAuthURL return the default authorize url for the given provider
|
|
|
|
func GetDefaultAuthURL(provider string) string {
|
|
|
|
switch provider {
|
|
|
|
case "github":
|
|
|
|
return github.AuthURL
|
|
|
|
case "gitlab":
|
|
|
|
return gitlab.AuthURL
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetDefaultProfileURL return the default profile url for the given provider
|
|
|
|
func GetDefaultProfileURL(provider string) string {
|
|
|
|
switch provider {
|
|
|
|
case "github":
|
|
|
|
return github.ProfileURL
|
|
|
|
case "gitlab":
|
|
|
|
return gitlab.ProfileURL
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetDefaultEmailURL return the default email url for the given provider
|
|
|
|
func GetDefaultEmailURL(provider string) string {
|
2019-06-12 21:41:28 +02:00
|
|
|
if provider == "github" {
|
2017-05-01 15:26:53 +02:00
|
|
|
return github.EmailURL
|
|
|
|
}
|
|
|
|
return ""
|
2017-02-22 08:14:37 +01:00
|
|
|
}
|