2023-06-19 23:42:47 +02:00
|
|
|
// SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
|
|
|
|
// SPDX-License-Identifier: Apache-2.0
|
2018-04-30 01:35:04 +02:00
|
|
|
|
2023-08-11 04:46:45 +02:00
|
|
|
package ui // import "miniflux.app/v2/internal/ui"
|
2018-04-30 01:35:04 +02:00
|
|
|
|
|
|
|
import (
|
2023-09-25 01:32:09 +02:00
|
|
|
"log/slog"
|
2018-04-30 01:35:04 +02:00
|
|
|
"net/http"
|
|
|
|
|
2023-08-11 04:46:45 +02:00
|
|
|
"miniflux.app/v2/internal/http/request"
|
|
|
|
"miniflux.app/v2/internal/http/response/html"
|
|
|
|
"miniflux.app/v2/internal/http/route"
|
|
|
|
"miniflux.app/v2/internal/locale"
|
|
|
|
"miniflux.app/v2/internal/ui/session"
|
2018-04-30 01:35:04 +02:00
|
|
|
)
|
|
|
|
|
2018-11-11 20:28:29 +01:00
|
|
|
func (h *handler) oauth2Unlink(w http.ResponseWriter, r *http.Request) {
|
2018-09-23 00:04:55 +02:00
|
|
|
printer := locale.NewPrinter(request.UserLanguage(r))
|
2018-09-24 06:02:26 +02:00
|
|
|
provider := request.RouteStringParam(r, "provider")
|
2018-04-30 01:35:04 +02:00
|
|
|
if provider == "" {
|
2023-09-25 01:32:09 +02:00
|
|
|
slog.Warn("Invalid or missing OAuth2 provider")
|
2018-11-11 20:28:29 +01:00
|
|
|
html.Redirect(w, r, route.Path(h.router, "login"))
|
2018-04-30 01:35:04 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-12-22 06:14:10 +01:00
|
|
|
authProvider, err := getOAuth2Manager(r.Context()).FindProvider(provider)
|
2018-04-30 01:35:04 +02:00
|
|
|
if err != nil {
|
2023-09-25 01:32:09 +02:00
|
|
|
slog.Error("Unable to initialize OAuth2 provider",
|
|
|
|
slog.String("provider", provider),
|
|
|
|
slog.Any("error", err),
|
|
|
|
)
|
2018-11-11 20:28:29 +01:00
|
|
|
html.Redirect(w, r, route.Path(h.router, "settings"))
|
2018-04-30 01:35:04 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-11-11 20:28:29 +01:00
|
|
|
sess := session.New(h.store, request.SessionID(r))
|
2020-12-22 06:14:10 +01:00
|
|
|
user, err := h.store.UserByID(request.UserID(r))
|
|
|
|
if err != nil {
|
|
|
|
html.ServerError(w, r, err)
|
|
|
|
return
|
|
|
|
}
|
2018-04-30 02:04:23 +02:00
|
|
|
|
2018-11-11 20:28:29 +01:00
|
|
|
hasPassword, err := h.store.HasPassword(request.UserID(r))
|
2018-04-30 02:04:23 +02:00
|
|
|
if err != nil {
|
2018-10-08 03:42:43 +02:00
|
|
|
html.ServerError(w, r, err)
|
2018-04-30 02:04:23 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if !hasPassword {
|
2024-02-27 17:19:38 +01:00
|
|
|
sess.NewFlashErrorMessage(printer.Print("error.unlink_account_without_password"))
|
2018-11-11 20:28:29 +01:00
|
|
|
html.Redirect(w, r, route.Path(h.router, "settings"))
|
2018-04-30 02:04:23 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-12-22 06:14:10 +01:00
|
|
|
authProvider.UnsetUserProfileID(user)
|
|
|
|
if err := h.store.UpdateUser(user); err != nil {
|
2018-10-08 03:42:43 +02:00
|
|
|
html.ServerError(w, r, err)
|
2018-04-30 01:35:04 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-02-27 17:19:38 +01:00
|
|
|
sess.NewFlashMessage(printer.Print("alert.account_unlinked"))
|
2018-11-11 20:28:29 +01:00
|
|
|
html.Redirect(w, r, route.Path(h.router, "settings"))
|
2018-04-30 01:35:04 +02:00
|
|
|
}
|