mirror of
https://codeberg.org/forgejo/forgejo.git
synced 2024-12-29 09:42:13 +01:00
235 lines
5.5 KiB
Go
235 lines
5.5 KiB
Go
|
// Copyright 2014 Google Inc. All Rights Reserved.
|
||
|
// Copyright 2014 The Gogs Authors. All rights reserved.
|
||
|
// Use of this source code is governed by a MIT-style
|
||
|
// license that can be found in the LICENSE file.
|
||
|
|
||
|
// Package oauth2 contains Martini handlers to provide
|
||
|
// user login via an OAuth 2.0 backend.
|
||
|
package oauth2
|
||
|
|
||
|
import (
|
||
|
"encoding/json"
|
||
|
"fmt"
|
||
|
"net/http"
|
||
|
"net/url"
|
||
|
"strings"
|
||
|
"time"
|
||
|
|
||
|
"code.google.com/p/goauth2/oauth"
|
||
|
"github.com/go-martini/martini"
|
||
|
|
||
|
"github.com/gogits/session"
|
||
|
|
||
|
"github.com/gogits/gogs/modules/log"
|
||
|
"github.com/gogits/gogs/modules/middleware"
|
||
|
)
|
||
|
|
||
|
const (
|
||
|
keyToken = "oauth2_token"
|
||
|
keyNextPage = "next"
|
||
|
)
|
||
|
|
||
|
var (
|
||
|
// Path to handle OAuth 2.0 logins.
|
||
|
PathLogin = "/login"
|
||
|
// Path to handle OAuth 2.0 logouts.
|
||
|
PathLogout = "/logout"
|
||
|
// Path to handle callback from OAuth 2.0 backend
|
||
|
// to exchange credentials.
|
||
|
PathCallback = "/oauth2callback"
|
||
|
// Path to handle error cases.
|
||
|
PathError = "/oauth2error"
|
||
|
)
|
||
|
|
||
|
// Represents OAuth2 backend options.
|
||
|
type Options struct {
|
||
|
ClientId string
|
||
|
ClientSecret string
|
||
|
RedirectURL string
|
||
|
Scopes []string
|
||
|
|
||
|
AuthUrl string
|
||
|
TokenUrl string
|
||
|
}
|
||
|
|
||
|
// Represents a container that contains
|
||
|
// user's OAuth 2.0 access and refresh tokens.
|
||
|
type Tokens interface {
|
||
|
Access() string
|
||
|
Refresh() string
|
||
|
IsExpired() bool
|
||
|
ExpiryTime() time.Time
|
||
|
ExtraData() map[string]string
|
||
|
}
|
||
|
|
||
|
type token struct {
|
||
|
oauth.Token
|
||
|
}
|
||
|
|
||
|
func (t *token) ExtraData() map[string]string {
|
||
|
return t.Extra
|
||
|
}
|
||
|
|
||
|
// Returns the access token.
|
||
|
func (t *token) Access() string {
|
||
|
return t.AccessToken
|
||
|
}
|
||
|
|
||
|
// Returns the refresh token.
|
||
|
func (t *token) Refresh() string {
|
||
|
return t.RefreshToken
|
||
|
}
|
||
|
|
||
|
// Returns whether the access token is
|
||
|
// expired or not.
|
||
|
func (t *token) IsExpired() bool {
|
||
|
if t == nil {
|
||
|
return true
|
||
|
}
|
||
|
return t.Expired()
|
||
|
}
|
||
|
|
||
|
// Returns the expiry time of the user's
|
||
|
// access token.
|
||
|
func (t *token) ExpiryTime() time.Time {
|
||
|
return t.Expiry
|
||
|
}
|
||
|
|
||
|
// Formats tokens into string.
|
||
|
func (t *token) String() string {
|
||
|
return fmt.Sprintf("tokens: %v", t)
|
||
|
}
|
||
|
|
||
|
// Returns a new Google OAuth 2.0 backend endpoint.
|
||
|
func Google(opts *Options) martini.Handler {
|
||
|
opts.AuthUrl = "https://accounts.google.com/o/oauth2/auth"
|
||
|
opts.TokenUrl = "https://accounts.google.com/o/oauth2/token"
|
||
|
return NewOAuth2Provider(opts)
|
||
|
}
|
||
|
|
||
|
// Returns a new Github OAuth 2.0 backend endpoint.
|
||
|
func Github(opts *Options) martini.Handler {
|
||
|
opts.AuthUrl = "https://github.com/login/oauth/authorize"
|
||
|
opts.TokenUrl = "https://github.com/login/oauth/access_token"
|
||
|
return NewOAuth2Provider(opts)
|
||
|
}
|
||
|
|
||
|
func Facebook(opts *Options) martini.Handler {
|
||
|
opts.AuthUrl = "https://www.facebook.com/dialog/oauth"
|
||
|
opts.TokenUrl = "https://graph.facebook.com/oauth/access_token"
|
||
|
return NewOAuth2Provider(opts)
|
||
|
}
|
||
|
|
||
|
// Returns a generic OAuth 2.0 backend endpoint.
|
||
|
func NewOAuth2Provider(opts *Options) martini.Handler {
|
||
|
config := &oauth.Config{
|
||
|
ClientId: opts.ClientId,
|
||
|
ClientSecret: opts.ClientSecret,
|
||
|
RedirectURL: opts.RedirectURL,
|
||
|
Scope: strings.Join(opts.Scopes, " "),
|
||
|
AuthURL: opts.AuthUrl,
|
||
|
TokenURL: opts.TokenUrl,
|
||
|
}
|
||
|
|
||
|
transport := &oauth.Transport{
|
||
|
Config: config,
|
||
|
Transport: http.DefaultTransport,
|
||
|
}
|
||
|
|
||
|
return func(c martini.Context, ctx *middleware.Context) {
|
||
|
if ctx.Req.Method == "GET" {
|
||
|
switch ctx.Req.URL.Path {
|
||
|
case PathLogin:
|
||
|
login(transport, ctx)
|
||
|
case PathLogout:
|
||
|
logout(transport, ctx)
|
||
|
case PathCallback:
|
||
|
handleOAuth2Callback(transport, ctx)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
tk := unmarshallToken(ctx.Session)
|
||
|
if tk != nil {
|
||
|
// check if the access token is expired
|
||
|
if tk.IsExpired() && tk.Refresh() == "" {
|
||
|
ctx.Session.Delete(keyToken)
|
||
|
tk = nil
|
||
|
}
|
||
|
}
|
||
|
// Inject tokens.
|
||
|
c.MapTo(tk, (*Tokens)(nil))
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// Handler that redirects user to the login page
|
||
|
// if user is not logged in.
|
||
|
// Sample usage:
|
||
|
// m.Get("/login-required", oauth2.LoginRequired, func() ... {})
|
||
|
var LoginRequired martini.Handler = func() martini.Handler {
|
||
|
return func(c martini.Context, ctx *middleware.Context) {
|
||
|
token := unmarshallToken(ctx.Session)
|
||
|
if token == nil || token.IsExpired() {
|
||
|
next := url.QueryEscape(ctx.Req.URL.RequestURI())
|
||
|
ctx.Redirect(PathLogin + "?next=" + next)
|
||
|
return
|
||
|
}
|
||
|
}
|
||
|
}()
|
||
|
|
||
|
func login(t *oauth.Transport, ctx *middleware.Context) {
|
||
|
next := extractPath(ctx.Query(keyNextPage))
|
||
|
if ctx.Session.Get(keyToken) == nil {
|
||
|
// User is not logged in.
|
||
|
ctx.Redirect(t.Config.AuthCodeURL(next))
|
||
|
return
|
||
|
}
|
||
|
// No need to login, redirect to the next page.
|
||
|
ctx.Redirect(next)
|
||
|
}
|
||
|
|
||
|
func logout(t *oauth.Transport, ctx *middleware.Context) {
|
||
|
next := extractPath(ctx.Query(keyNextPage))
|
||
|
ctx.Session.Delete(keyToken)
|
||
|
ctx.Redirect(next)
|
||
|
}
|
||
|
|
||
|
func handleOAuth2Callback(t *oauth.Transport, ctx *middleware.Context) {
|
||
|
if errMsg := ctx.Query("error_description"); len(errMsg) > 0 {
|
||
|
log.Error("oauth2.handleOAuth2Callback: %s", errMsg)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
next := extractPath(ctx.Query("state"))
|
||
|
code := ctx.Query("code")
|
||
|
tk, err := t.Exchange(code)
|
||
|
if err != nil {
|
||
|
// Pass the error message, or allow dev to provide its own
|
||
|
// error handler.
|
||
|
log.Error("oauth2.handleOAuth2Callback(token.Exchange): %v", err)
|
||
|
// ctx.Redirect(PathError)
|
||
|
return
|
||
|
}
|
||
|
// Store the credentials in the session.
|
||
|
val, _ := json.Marshal(tk)
|
||
|
ctx.Session.Set(keyToken, val)
|
||
|
ctx.Redirect(next)
|
||
|
}
|
||
|
|
||
|
func unmarshallToken(s session.SessionStore) (t *token) {
|
||
|
if s.Get(keyToken) == nil {
|
||
|
return
|
||
|
}
|
||
|
data := s.Get(keyToken).([]byte)
|
||
|
var tk oauth.Token
|
||
|
json.Unmarshal(data, &tk)
|
||
|
return &token{tk}
|
||
|
}
|
||
|
|
||
|
func extractPath(next string) string {
|
||
|
n, err := url.Parse(next)
|
||
|
if err != nil {
|
||
|
return "/"
|
||
|
}
|
||
|
return n.Path
|
||
|
}
|