mirror of
				https://github.com/go-gitea/gitea
				synced 2025-10-31 11:28:24 +00:00 
			
		
		
		
	This leverages the existing `sync_external_users` cron job to synchronize the `IsActive` flag on users who use an OAuth2 provider set to synchronize. This synchronization is done by checking for expired access tokens, and using the stored refresh token to request a new access token. If the response back from the OAuth2 provider is the `invalid_grant` error code, the user is marked as inactive. However, the user is able to reactivate their account by logging in the web browser through their OAuth2 flow. Also changed to support this is that a linked `ExternalLoginUser` is always created upon a login or signup via OAuth2. ### Notes on updating permissions Ideally, we would also refresh permissions from the configured OAuth provider (e.g., admin, restricted and group mappings) to match the implementation of LDAP. However, the OAuth library used for this `goth`, doesn't seem to support issuing a session via refresh tokens. The interface provides a [`RefreshToken` method](https://github.com/markbates/goth/blob/master/provider.go#L20), but the returned `oauth.Token` doesn't implement the `goth.Session` we would need to call `FetchUser`. Due to specific implementations, we would need to build a compatibility function for every provider, since they cast to concrete types (e.g. [Azure](https://github.com/markbates/goth/blob/master/providers/azureadv2/azureadv2.go#L132)) --------- Co-authored-by: Kyle D <kdumontnu@gmail.com>
		
			
				
	
	
		
			52 lines
		
	
	
		
			1.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			52 lines
		
	
	
		
			1.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2021 The Gitea Authors. All rights reserved.
 | |
| // SPDX-License-Identifier: MIT
 | |
| 
 | |
| package oauth2
 | |
| 
 | |
| import (
 | |
| 	"code.gitea.io/gitea/models/auth"
 | |
| 	"code.gitea.io/gitea/modules/json"
 | |
| )
 | |
| 
 | |
| // Source holds configuration for the OAuth2 login source.
 | |
| type Source struct {
 | |
| 	Provider                      string
 | |
| 	ClientID                      string
 | |
| 	ClientSecret                  string
 | |
| 	OpenIDConnectAutoDiscoveryURL string
 | |
| 	CustomURLMapping              *CustomURLMapping
 | |
| 	IconURL                       string
 | |
| 
 | |
| 	Scopes              []string
 | |
| 	RequiredClaimName   string
 | |
| 	RequiredClaimValue  string
 | |
| 	GroupClaimName      string
 | |
| 	AdminGroup          string
 | |
| 	GroupTeamMap        string
 | |
| 	GroupTeamMapRemoval bool
 | |
| 	RestrictedGroup     string
 | |
| 	SkipLocalTwoFA      bool `json:",omitempty"`
 | |
| 
 | |
| 	// reference to the authSource
 | |
| 	authSource *auth.Source
 | |
| }
 | |
| 
 | |
| // FromDB fills up an OAuth2Config from serialized format.
 | |
| func (source *Source) FromDB(bs []byte) error {
 | |
| 	return json.UnmarshalHandleDoubleEncode(bs, &source)
 | |
| }
 | |
| 
 | |
| // ToDB exports an OAuth2Config to a serialized format.
 | |
| func (source *Source) ToDB() ([]byte, error) {
 | |
| 	return json.Marshal(source)
 | |
| }
 | |
| 
 | |
| // SetAuthSource sets the related AuthSource
 | |
| func (source *Source) SetAuthSource(authSource *auth.Source) {
 | |
| 	source.authSource = authSource
 | |
| }
 | |
| 
 | |
| func init() {
 | |
| 	auth.RegisterTypeConfig(auth.OAuth2, &Source{})
 | |
| }
 |