mirror of
				https://github.com/go-gitea/gitea
				synced 2025-09-28 03:28:13 +00:00 
			
		
		
		
	* add google+ * sort signin oauth2 providers based on the name so order is always the same * update auth tip for google+ * add gitlab provider * add bitbucket provider (and some go fmt) * add twitter provider * add facebook provider * add dropbox provider * add openid connect provider incl. new format of tips section in "Add New Source" * lower the amount of disk storage for each session to prevent issues while building cross platform (and disk overflow) * imports according to goimport and code style * make it possible to set custom urls to gitlab and github provider (only these could have a different host) * split up oauth2 into multiple files * small typo in comment * fix indention * fix indentation * fix new line before external import * fix layout of signin part * update "broken" dependency
		
			
				
	
	
		
			225 lines
		
	
	
		
			7.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			225 lines
		
	
	
		
			7.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2017 The Gitea Authors. All rights reserved.
 | |
| // Use of this source code is governed by a MIT-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| package oauth2
 | |
| 
 | |
| import (
 | |
| 	"math"
 | |
| 	"net/http"
 | |
| 	"os"
 | |
| 	"path/filepath"
 | |
| 
 | |
| 	"code.gitea.io/gitea/modules/log"
 | |
| 	"code.gitea.io/gitea/modules/setting"
 | |
| 
 | |
| 	"github.com/gorilla/sessions"
 | |
| 	"github.com/markbates/goth"
 | |
| 	"github.com/markbates/goth/gothic"
 | |
| 	"github.com/markbates/goth/providers/bitbucket"
 | |
| 	"github.com/markbates/goth/providers/dropbox"
 | |
| 	"github.com/markbates/goth/providers/facebook"
 | |
| 	"github.com/markbates/goth/providers/github"
 | |
| 	"github.com/markbates/goth/providers/gitlab"
 | |
| 	"github.com/markbates/goth/providers/gplus"
 | |
| 	"github.com/markbates/goth/providers/openidConnect"
 | |
| 	"github.com/markbates/goth/providers/twitter"
 | |
| 	"github.com/satori/go.uuid"
 | |
| )
 | |
| 
 | |
| var (
 | |
| 	sessionUsersStoreKey = "gitea-oauth2-sessions"
 | |
| 	providerHeaderKey    = "gitea-oauth2-provider"
 | |
| )
 | |
| 
 | |
| // CustomURLMapping describes the urls values to use when customizing OAuth2 provider URLs
 | |
| type CustomURLMapping struct {
 | |
| 	AuthURL    string
 | |
| 	TokenURL   string
 | |
| 	ProfileURL string
 | |
| 	EmailURL   string
 | |
| }
 | |
| 
 | |
| // Init initialize the setup of the OAuth2 library
 | |
| func Init() {
 | |
| 	sessionDir := filepath.Join(setting.AppDataPath, "sessions", "oauth2")
 | |
| 	if err := os.MkdirAll(sessionDir, 0700); err != nil {
 | |
| 		log.Fatal(4, "Fail to create dir %s: %v", sessionDir, err)
 | |
| 	}
 | |
| 
 | |
| 	store := sessions.NewFilesystemStore(sessionDir, []byte(sessionUsersStoreKey))
 | |
| 	// according to the Goth lib:
 | |
| 	// set the maxLength of the cookies stored on the disk to a larger number to prevent issues with:
 | |
| 	// securecookie: the value is too long
 | |
| 	// when using OpenID Connect , since this can contain a large amount of extra information in the id_token
 | |
| 
 | |
| 	// Note, when using the FilesystemStore only the session.ID is written to a browser cookie, so this is explicit for the storage on disk
 | |
| 	store.MaxLength(math.MaxInt16)
 | |
| 	gothic.Store = store
 | |
| 
 | |
| 	gothic.SetState = func(req *http.Request) string {
 | |
| 		return uuid.NewV4().String()
 | |
| 	}
 | |
| 
 | |
| 	gothic.GetProviderName = func(req *http.Request) (string, error) {
 | |
| 		return req.Header.Get(providerHeaderKey), nil
 | |
| 	}
 | |
| 
 | |
| }
 | |
| 
 | |
| // Auth OAuth2 auth service
 | |
| func Auth(provider string, request *http.Request, response http.ResponseWriter) error {
 | |
| 	// not sure if goth is thread safe (?) when using multiple providers
 | |
| 	request.Header.Set(providerHeaderKey, provider)
 | |
| 
 | |
| 	// don't use the default gothic begin handler to prevent issues when some error occurs
 | |
| 	// normally the gothic library will write some custom stuff to the response instead of our own nice error page
 | |
| 	//gothic.BeginAuthHandler(response, request)
 | |
| 
 | |
| 	url, err := gothic.GetAuthURL(response, request)
 | |
| 	if err == nil {
 | |
| 		http.Redirect(response, request, url, http.StatusTemporaryRedirect)
 | |
| 	}
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| // ProviderCallback handles OAuth callback, resolve to a goth user and send back to original url
 | |
| // this will trigger a new authentication request, but because we save it in the session we can use that
 | |
| func ProviderCallback(provider string, request *http.Request, response http.ResponseWriter) (goth.User, error) {
 | |
| 	// not sure if goth is thread safe (?) when using multiple providers
 | |
| 	request.Header.Set(providerHeaderKey, provider)
 | |
| 
 | |
| 	user, err := gothic.CompleteUserAuth(response, request)
 | |
| 	if err != nil {
 | |
| 		return user, err
 | |
| 	}
 | |
| 
 | |
| 	return user, nil
 | |
| }
 | |
| 
 | |
| // RegisterProvider register a OAuth2 provider in goth lib
 | |
| func RegisterProvider(providerName, providerType, clientID, clientSecret, openIDConnectAutoDiscoveryURL string, customURLMapping *CustomURLMapping) error {
 | |
| 	provider, err := createProvider(providerName, providerType, clientID, clientSecret, openIDConnectAutoDiscoveryURL, customURLMapping)
 | |
| 
 | |
| 	if err == nil && provider != nil {
 | |
| 		goth.UseProviders(provider)
 | |
| 	}
 | |
| 
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| // RemoveProvider removes the given OAuth2 provider from the goth lib
 | |
| func RemoveProvider(providerName string) {
 | |
| 	delete(goth.GetProviders(), providerName)
 | |
| }
 | |
| 
 | |
| // used to create different types of goth providers
 | |
| func createProvider(providerName, providerType, clientID, clientSecret, openIDConnectAutoDiscoveryURL string, customURLMapping *CustomURLMapping) (goth.Provider, error) {
 | |
| 	callbackURL := setting.AppURL + "user/oauth2/" + providerName + "/callback"
 | |
| 
 | |
| 	var provider goth.Provider
 | |
| 	var err error
 | |
| 
 | |
| 	switch providerType {
 | |
| 	case "bitbucket":
 | |
| 		provider = bitbucket.New(clientID, clientSecret, callbackURL, "account")
 | |
| 	case "dropbox":
 | |
| 		provider = dropbox.New(clientID, clientSecret, callbackURL)
 | |
| 	case "facebook":
 | |
| 		provider = facebook.New(clientID, clientSecret, callbackURL, "email")
 | |
| 	case "github":
 | |
| 		authURL := github.AuthURL
 | |
| 		tokenURL := github.TokenURL
 | |
| 		profileURL := github.ProfileURL
 | |
| 		emailURL := github.EmailURL
 | |
| 		if customURLMapping != nil {
 | |
| 			if len(customURLMapping.AuthURL) > 0 {
 | |
| 				authURL = customURLMapping.AuthURL
 | |
| 			}
 | |
| 			if len(customURLMapping.TokenURL) > 0 {
 | |
| 				tokenURL = customURLMapping.TokenURL
 | |
| 			}
 | |
| 			if len(customURLMapping.ProfileURL) > 0 {
 | |
| 				profileURL = customURLMapping.ProfileURL
 | |
| 			}
 | |
| 			if len(customURLMapping.EmailURL) > 0 {
 | |
| 				emailURL = customURLMapping.EmailURL
 | |
| 			}
 | |
| 		}
 | |
| 		provider = github.NewCustomisedURL(clientID, clientSecret, callbackURL, authURL, tokenURL, profileURL, emailURL)
 | |
| 	case "gitlab":
 | |
| 		authURL := gitlab.AuthURL
 | |
| 		tokenURL := gitlab.TokenURL
 | |
| 		profileURL := gitlab.ProfileURL
 | |
| 		if customURLMapping != nil {
 | |
| 			if len(customURLMapping.AuthURL) > 0 {
 | |
| 				authURL = customURLMapping.AuthURL
 | |
| 			}
 | |
| 			if len(customURLMapping.TokenURL) > 0 {
 | |
| 				tokenURL = customURLMapping.TokenURL
 | |
| 			}
 | |
| 			if len(customURLMapping.ProfileURL) > 0 {
 | |
| 				profileURL = customURLMapping.ProfileURL
 | |
| 			}
 | |
| 		}
 | |
| 		provider = gitlab.NewCustomisedURL(clientID, clientSecret, callbackURL, authURL, tokenURL, profileURL)
 | |
| 	case "gplus":
 | |
| 		provider = gplus.New(clientID, clientSecret, callbackURL, "email")
 | |
| 	case "openidConnect":
 | |
| 		if provider, err = openidConnect.New(clientID, clientSecret, callbackURL, openIDConnectAutoDiscoveryURL); err != nil {
 | |
| 			log.Warn("Failed to create OpenID Connect Provider with name '%s' with url '%s': %v", providerName, openIDConnectAutoDiscoveryURL, err)
 | |
| 		}
 | |
| 	case "twitter":
 | |
| 		provider = twitter.NewAuthenticate(clientID, clientSecret, callbackURL)
 | |
| 	}
 | |
| 
 | |
| 	// always set the name if provider is created so we can support multiple setups of 1 provider
 | |
| 	if err == nil && provider != nil {
 | |
| 		provider.SetName(providerName)
 | |
| 	}
 | |
| 
 | |
| 	return provider, err
 | |
| }
 | |
| 
 | |
| // GetDefaultTokenURL return the default token url for the given provider
 | |
| func GetDefaultTokenURL(provider string) string {
 | |
| 	switch provider {
 | |
| 	case "github":
 | |
| 		return github.TokenURL
 | |
| 	case "gitlab":
 | |
| 		return gitlab.TokenURL
 | |
| 	}
 | |
| 	return ""
 | |
| }
 | |
| 
 | |
| // GetDefaultAuthURL return the default authorize url for the given provider
 | |
| func GetDefaultAuthURL(provider string) string {
 | |
| 	switch provider {
 | |
| 	case "github":
 | |
| 		return github.AuthURL
 | |
| 	case "gitlab":
 | |
| 		return gitlab.AuthURL
 | |
| 	}
 | |
| 	return ""
 | |
| }
 | |
| 
 | |
| // GetDefaultProfileURL return the default profile url for the given provider
 | |
| func GetDefaultProfileURL(provider string) string {
 | |
| 	switch provider {
 | |
| 	case "github":
 | |
| 		return github.ProfileURL
 | |
| 	case "gitlab":
 | |
| 		return gitlab.ProfileURL
 | |
| 	}
 | |
| 	return ""
 | |
| }
 | |
| 
 | |
| // GetDefaultEmailURL return the default email url for the given provider
 | |
| func GetDefaultEmailURL(provider string) string {
 | |
| 	switch provider {
 | |
| 	case "github":
 | |
| 		return github.EmailURL
 | |
| 	}
 | |
| 	return ""
 | |
| }
 |