mirror of
				https://github.com/go-gitea/gitea
				synced 2025-10-31 03:18:24 +00:00 
			
		
		
		
	* initial stuff for oauth2 login, fails on: * login button on the signIn page to start the OAuth2 flow and a callback for each provider Only GitHub is implemented for now * show login button only when the OAuth2 consumer is configured (and activated) * create macaron group for oauth2 urls * prevent net/http in modules (other then oauth2) * use a new data sessions oauth2 folder for storing the oauth2 session data * add missing 2FA when this is enabled on the user * add password option for OAuth2 user , for use with git over http and login to the GUI * add tip for registering a GitHub OAuth application * at startup of Gitea register all configured providers and also on adding/deleting of new providers * custom handling of errors in oauth2 request init + show better tip * add ExternalLoginUser model and migration script to add it to database * link a external account to an existing account (still need to handle wrong login and signup) and remove if user is removed * remove the linked external account from the user his settings * if user is unknown we allow him to register a new account or link it to some existing account * sign up with button on signin page (als change OAuth2Provider structure so we can store basic stuff about providers) * from gorilla/sessions docs: "Important Note: If you aren't using gorilla/mux, you need to wrap your handlers with context.ClearHandler as or else you will leak memory!" (we're using gorilla/sessions for storing oauth2 sessions) * use updated goth lib that now supports getting the OAuth2 user if the AccessToken is still valid instead of re-authenticating (prevent flooding the OAuth2 provider)
		
			
				
	
	
		
			77 lines
		
	
	
		
			2.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			77 lines
		
	
	
		
			2.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2014 The Go Authors. All rights reserved.
 | |
| // Use of this source code is governed by a BSD-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| // Package internal contains support packages for oauth2 package.
 | |
| package internal
 | |
| 
 | |
| import (
 | |
| 	"bufio"
 | |
| 	"crypto/rsa"
 | |
| 	"crypto/x509"
 | |
| 	"encoding/pem"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"io"
 | |
| 	"strings"
 | |
| )
 | |
| 
 | |
| // ParseKey converts the binary contents of a private key file
 | |
| // to an *rsa.PrivateKey. It detects whether the private key is in a
 | |
| // PEM container or not. If so, it extracts the the private key
 | |
| // from PEM container before conversion. It only supports PEM
 | |
| // containers with no passphrase.
 | |
| func ParseKey(key []byte) (*rsa.PrivateKey, error) {
 | |
| 	block, _ := pem.Decode(key)
 | |
| 	if block != nil {
 | |
| 		key = block.Bytes
 | |
| 	}
 | |
| 	parsedKey, err := x509.ParsePKCS8PrivateKey(key)
 | |
| 	if err != nil {
 | |
| 		parsedKey, err = x509.ParsePKCS1PrivateKey(key)
 | |
| 		if err != nil {
 | |
| 			return nil, fmt.Errorf("private key should be a PEM or plain PKSC1 or PKCS8; parse error: %v", err)
 | |
| 		}
 | |
| 	}
 | |
| 	parsed, ok := parsedKey.(*rsa.PrivateKey)
 | |
| 	if !ok {
 | |
| 		return nil, errors.New("private key is invalid")
 | |
| 	}
 | |
| 	return parsed, nil
 | |
| }
 | |
| 
 | |
| func ParseINI(ini io.Reader) (map[string]map[string]string, error) {
 | |
| 	result := map[string]map[string]string{
 | |
| 		"": map[string]string{}, // root section
 | |
| 	}
 | |
| 	scanner := bufio.NewScanner(ini)
 | |
| 	currentSection := ""
 | |
| 	for scanner.Scan() {
 | |
| 		line := strings.TrimSpace(scanner.Text())
 | |
| 		if strings.HasPrefix(line, ";") {
 | |
| 			// comment.
 | |
| 			continue
 | |
| 		}
 | |
| 		if strings.HasPrefix(line, "[") && strings.HasSuffix(line, "]") {
 | |
| 			currentSection = strings.TrimSpace(line[1 : len(line)-1])
 | |
| 			result[currentSection] = map[string]string{}
 | |
| 			continue
 | |
| 		}
 | |
| 		parts := strings.SplitN(line, "=", 2)
 | |
| 		if len(parts) == 2 && parts[0] != "" {
 | |
| 			result[currentSection][strings.TrimSpace(parts[0])] = strings.TrimSpace(parts[1])
 | |
| 		}
 | |
| 	}
 | |
| 	if err := scanner.Err(); err != nil {
 | |
| 		return nil, fmt.Errorf("error scanning ini: %v", err)
 | |
| 	}
 | |
| 	return result, nil
 | |
| }
 | |
| 
 | |
| func CondVal(v string) []string {
 | |
| 	if v == "" {
 | |
| 		return nil
 | |
| 	}
 | |
| 	return []string{v}
 | |
| }
 |