miniflux/server/ui/controller/oauth2.go

166 lines
4.1 KiB
Go
Raw Normal View History

2017-11-23 07:22:33 +01:00
// Copyright 2017 Frédéric Guillot. All rights reserved.
// Use of this source code is governed by the Apache 2.0
// license that can be found in the LICENSE file.
package controller
import (
"net/http"
2017-12-13 06:48:13 +01:00
"github.com/miniflux/miniflux/config"
2017-12-16 03:55:57 +01:00
"github.com/miniflux/miniflux/logger"
2017-12-13 06:48:13 +01:00
"github.com/miniflux/miniflux/model"
"github.com/miniflux/miniflux/server/core"
"github.com/miniflux/miniflux/server/oauth2"
2017-11-23 07:22:33 +01:00
"github.com/tomasen/realip"
)
// OAuth2Redirect redirects the user to the consent page to ask for permission.
func (c *Controller) OAuth2Redirect(ctx *core.Context, request *core.Request, response *core.Response) {
provider := request.StringParam("provider", "")
if provider == "" {
2017-12-16 03:55:57 +01:00
logger.Error("[OAuth2] Invalid or missing provider")
2017-11-23 07:22:33 +01:00
response.Redirect(ctx.Route("login"))
return
}
authProvider, err := getOAuth2Manager(c.cfg).Provider(provider)
if err != nil {
2017-12-16 03:55:57 +01:00
logger.Error("[OAuth2] %v", err)
2017-11-23 07:22:33 +01:00
response.Redirect(ctx.Route("login"))
return
}
response.Redirect(authProvider.GetRedirectURL(ctx.CsrfToken()))
}
// OAuth2Callback receives the authorization code and create a new session.
func (c *Controller) OAuth2Callback(ctx *core.Context, request *core.Request, response *core.Response) {
provider := request.StringParam("provider", "")
if provider == "" {
2017-12-16 03:55:57 +01:00
logger.Error("[OAuth2] Invalid or missing provider")
2017-11-23 07:22:33 +01:00
response.Redirect(ctx.Route("login"))
return
}
code := request.QueryStringParam("code", "")
if code == "" {
2017-12-16 03:55:57 +01:00
logger.Error("[OAuth2] No code received on callback")
2017-11-23 07:22:33 +01:00
response.Redirect(ctx.Route("login"))
return
}
state := request.QueryStringParam("state", "")
if state != ctx.CsrfToken() {
2017-12-16 03:55:57 +01:00
logger.Error("[OAuth2] Invalid state value")
2017-11-23 07:22:33 +01:00
response.Redirect(ctx.Route("login"))
return
}
authProvider, err := getOAuth2Manager(c.cfg).Provider(provider)
if err != nil {
2017-12-16 03:55:57 +01:00
logger.Error("[OAuth2] %v", err)
2017-11-23 07:22:33 +01:00
response.Redirect(ctx.Route("login"))
return
}
profile, err := authProvider.GetProfile(code)
if err != nil {
2017-12-16 03:55:57 +01:00
logger.Error("[OAuth2] %v", err)
2017-11-23 07:22:33 +01:00
response.Redirect(ctx.Route("login"))
return
}
2017-11-25 01:09:10 +01:00
if ctx.IsAuthenticated() {
user := ctx.LoggedUser()
if err := c.store.UpdateExtraField(user.ID, profile.Key, profile.ID); err != nil {
response.HTML().ServerError(err)
return
}
response.Redirect(ctx.Route("settings"))
return
}
2017-11-28 06:30:04 +01:00
user, err := c.store.UserByExtraField(profile.Key, profile.ID)
2017-11-23 07:22:33 +01:00
if err != nil {
response.HTML().ServerError(err)
return
}
if user == nil {
2017-11-25 01:09:10 +01:00
if c.cfg.GetInt("OAUTH2_USER_CREATION", 0) == 0 {
response.HTML().Forbidden()
return
}
2017-11-23 07:22:33 +01:00
user = model.NewUser()
user.Username = profile.Username
user.IsAdmin = false
user.Extra[profile.Key] = profile.ID
if err := c.store.CreateUser(user); err != nil {
response.HTML().ServerError(err)
return
}
}
sessionToken, err := c.store.CreateSession(
user.Username,
request.Request().UserAgent(),
realip.RealIP(request.Request()),
)
if err != nil {
response.HTML().ServerError(err)
return
}
2017-12-16 03:55:57 +01:00
logger.Info("[Controller:OAuth2Callback] username=%s just logged in", user.Username)
2017-11-23 07:22:33 +01:00
cookie := &http.Cookie{
Name: "sessionID",
Value: sessionToken,
Path: "/",
Secure: request.IsHTTPS(),
HttpOnly: true,
}
response.SetCookie(cookie)
response.Redirect(ctx.Route("unread"))
}
2017-11-25 01:09:10 +01:00
// OAuth2Unlink unlink an account from the external provider.
func (c *Controller) OAuth2Unlink(ctx *core.Context, request *core.Request, response *core.Response) {
provider := request.StringParam("provider", "")
if provider == "" {
2017-12-16 03:55:57 +01:00
logger.Info("[OAuth2] Invalid or missing provider")
2017-11-25 01:09:10 +01:00
response.Redirect(ctx.Route("login"))
return
}
authProvider, err := getOAuth2Manager(c.cfg).Provider(provider)
if err != nil {
2017-12-16 03:55:57 +01:00
logger.Error("[OAuth2] %v", err)
2017-11-25 01:09:10 +01:00
response.Redirect(ctx.Route("settings"))
return
}
user := ctx.LoggedUser()
if err := c.store.RemoveExtraField(user.ID, authProvider.GetUserExtraKey()); err != nil {
response.HTML().ServerError(err)
return
}
response.Redirect(ctx.Route("settings"))
return
}
2017-11-23 07:22:33 +01:00
func getOAuth2Manager(cfg *config.Config) *oauth2.Manager {
return oauth2.NewManager(
cfg.Get("OAUTH2_CLIENT_ID", ""),
cfg.Get("OAUTH2_CLIENT_SECRET", ""),
cfg.Get("OAUTH2_REDIRECT_URL", ""),
)
}