mirror of
				https://github.com/go-gitea/gitea
				synced 2025-10-26 08:58:24 +00:00 
			
		
		
		
	* update github.com/alecthomas/chroma v0.8.0 -> v0.8.1 * github.com/blevesearch/bleve v1.0.10 -> v1.0.12 * editorconfig-core-go v2.1.1 -> v2.3.7 * github.com/gliderlabs/ssh v0.2.2 -> v0.3.1 * migrate editorconfig.ParseBytes to Parse * github.com/shurcooL/vfsgen to 0d455de96546 * github.com/go-git/go-git/v5 v5.1.0 -> v5.2.0 * github.com/google/uuid v1.1.1 -> v1.1.2 * github.com/huandu/xstrings v1.3.0 -> v1.3.2 * github.com/klauspost/compress v1.10.11 -> v1.11.1 * github.com/markbates/goth v1.61.2 -> v1.65.0 * github.com/mattn/go-sqlite3 v1.14.0 -> v1.14.4 * github.com/mholt/archiver v3.3.0 -> v3.3.2 * github.com/microcosm-cc/bluemonday 4f7140c49acb -> v1.0.4 * github.com/minio/minio-go v7.0.4 -> v7.0.5 * github.com/olivere/elastic v7.0.9 -> v7.0.20 * github.com/urfave/cli v1.20.0 -> v1.22.4 * github.com/prometheus/client_golang v1.1.0 -> v1.8.0 * github.com/xanzy/go-gitlab v0.37.0 -> v0.38.1 * mvdan.cc/xurls v2.1.0 -> v2.2.0 Co-authored-by: Lauris BH <lauris@nix.lv>
		
			
				
	
	
		
			365 lines
		
	
	
		
			9.9 KiB
		
	
	
	
		
			Go
		
	
	
	
		
			Vendored
		
	
	
	
			
		
		
	
	
			365 lines
		
	
	
		
			9.9 KiB
		
	
	
	
		
			Go
		
	
	
	
		
			Vendored
		
	
	
	
| /*
 | |
| Package gothic wraps common behaviour when using Goth. This makes it quick, and easy, to get up
 | |
| and running with Goth. Of course, if you want complete control over how things flow, in regards
 | |
| to the authentication process, feel free and use Goth directly.
 | |
| 
 | |
| See https://github.com/markbates/goth/blob/master/examples/main.go to see this in action.
 | |
| */
 | |
| package gothic
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"compress/gzip"
 | |
| 	"context"
 | |
| 	"crypto/rand"
 | |
| 	"encoding/base64"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"io"
 | |
| 	"io/ioutil"
 | |
| 	"net/http"
 | |
| 	"net/url"
 | |
| 	"os"
 | |
| 	"strings"
 | |
| 
 | |
| 	"github.com/gorilla/mux"
 | |
| 	"github.com/gorilla/sessions"
 | |
| 	"github.com/markbates/goth"
 | |
| )
 | |
| 
 | |
| // SessionName is the key used to access the session store.
 | |
| const SessionName = "_gothic_session"
 | |
| 
 | |
| // Store can/should be set by applications using gothic. The default is a cookie store.
 | |
| var Store sessions.Store
 | |
| var defaultStore sessions.Store
 | |
| 
 | |
| var keySet = false
 | |
| 
 | |
| type key int
 | |
| 
 | |
| // ProviderParamKey can be used as a key in context when passing in a provider
 | |
| const ProviderParamKey key = iota
 | |
| 
 | |
| func init() {
 | |
| 	key := []byte(os.Getenv("SESSION_SECRET"))
 | |
| 	keySet = len(key) != 0
 | |
| 
 | |
| 	cookieStore := sessions.NewCookieStore([]byte(key))
 | |
| 	cookieStore.Options.HttpOnly = true
 | |
| 	Store = cookieStore
 | |
| 	defaultStore = Store
 | |
| }
 | |
| 
 | |
| /*
 | |
| BeginAuthHandler is a convenience handler for starting the authentication process.
 | |
| It expects to be able to get the name of the provider from the query parameters
 | |
| as either "provider" or ":provider".
 | |
| 
 | |
| BeginAuthHandler will redirect the user to the appropriate authentication end-point
 | |
| for the requested provider.
 | |
| 
 | |
| See https://github.com/markbates/goth/examples/main.go to see this in action.
 | |
| */
 | |
| func BeginAuthHandler(res http.ResponseWriter, req *http.Request) {
 | |
| 	url, err := GetAuthURL(res, req)
 | |
| 	if err != nil {
 | |
| 		res.WriteHeader(http.StatusBadRequest)
 | |
| 		fmt.Fprintln(res, err)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	http.Redirect(res, req, url, http.StatusTemporaryRedirect)
 | |
| }
 | |
| 
 | |
| // SetState sets the state string associated with the given request.
 | |
| // If no state string is associated with the request, one will be generated.
 | |
| // This state is sent to the provider and can be retrieved during the
 | |
| // callback.
 | |
| var SetState = func(req *http.Request) string {
 | |
| 	state := req.URL.Query().Get("state")
 | |
| 	if len(state) > 0 {
 | |
| 		return state
 | |
| 	}
 | |
| 
 | |
| 	// If a state query param is not passed in, generate a random
 | |
| 	// base64-encoded nonce so that the state on the auth URL
 | |
| 	// is unguessable, preventing CSRF attacks, as described in
 | |
| 	//
 | |
| 	// https://auth0.com/docs/protocols/oauth2/oauth-state#keep-reading
 | |
| 	nonceBytes := make([]byte, 64)
 | |
| 	_, err := io.ReadFull(rand.Reader, nonceBytes)
 | |
| 	if err != nil {
 | |
| 		panic("gothic: source of randomness unavailable: " + err.Error())
 | |
| 	}
 | |
| 	return base64.URLEncoding.EncodeToString(nonceBytes)
 | |
| }
 | |
| 
 | |
| // GetState gets the state returned by the provider during the callback.
 | |
| // This is used to prevent CSRF attacks, see
 | |
| // http://tools.ietf.org/html/rfc6749#section-10.12
 | |
| var GetState = func(req *http.Request) string {
 | |
| 	return req.URL.Query().Get("state")
 | |
| }
 | |
| 
 | |
| /*
 | |
| GetAuthURL starts the authentication process with the requested provided.
 | |
| It will return a URL that should be used to send users to.
 | |
| 
 | |
| It expects to be able to get the name of the provider from the query parameters
 | |
| as either "provider" or ":provider".
 | |
| 
 | |
| I would recommend using the BeginAuthHandler instead of doing all of these steps
 | |
| yourself, but that's entirely up to you.
 | |
| */
 | |
| func GetAuthURL(res http.ResponseWriter, req *http.Request) (string, error) {
 | |
| 	if !keySet && defaultStore == Store {
 | |
| 		fmt.Println("goth/gothic: no SESSION_SECRET environment variable is set. The default cookie store is not available and any calls will fail. Ignore this warning if you are using a different store.")
 | |
| 	}
 | |
| 
 | |
| 	providerName, err := GetProviderName(req)
 | |
| 	if err != nil {
 | |
| 		return "", err
 | |
| 	}
 | |
| 
 | |
| 	provider, err := goth.GetProvider(providerName)
 | |
| 	if err != nil {
 | |
| 		return "", err
 | |
| 	}
 | |
| 	sess, err := provider.BeginAuth(SetState(req))
 | |
| 	if err != nil {
 | |
| 		return "", err
 | |
| 	}
 | |
| 
 | |
| 	url, err := sess.GetAuthURL()
 | |
| 	if err != nil {
 | |
| 		return "", err
 | |
| 	}
 | |
| 
 | |
| 	err = StoreInSession(providerName, sess.Marshal(), req, res)
 | |
| 
 | |
| 	if err != nil {
 | |
| 		return "", err
 | |
| 	}
 | |
| 
 | |
| 	return url, err
 | |
| }
 | |
| 
 | |
| /*
 | |
| CompleteUserAuth does what it says on the tin. It completes the authentication
 | |
| process and fetches all of the basic information about the user from the provider.
 | |
| 
 | |
| It expects to be able to get the name of the provider from the query parameters
 | |
| as either "provider" or ":provider".
 | |
| 
 | |
| See https://github.com/markbates/goth/examples/main.go to see this in action.
 | |
| */
 | |
| var CompleteUserAuth = func(res http.ResponseWriter, req *http.Request) (goth.User, error) {
 | |
| 	defer Logout(res, req)
 | |
| 	if !keySet && defaultStore == Store {
 | |
| 		fmt.Println("goth/gothic: no SESSION_SECRET environment variable is set. The default cookie store is not available and any calls will fail. Ignore this warning if you are using a different store.")
 | |
| 	}
 | |
| 
 | |
| 	providerName, err := GetProviderName(req)
 | |
| 	if err != nil {
 | |
| 		return goth.User{}, err
 | |
| 	}
 | |
| 
 | |
| 	provider, err := goth.GetProvider(providerName)
 | |
| 	if err != nil {
 | |
| 		return goth.User{}, err
 | |
| 	}
 | |
| 
 | |
| 	value, err := GetFromSession(providerName, req)
 | |
| 	if err != nil {
 | |
| 		return goth.User{}, err
 | |
| 	}
 | |
| 
 | |
| 	sess, err := provider.UnmarshalSession(value)
 | |
| 	if err != nil {
 | |
| 		return goth.User{}, err
 | |
| 	}
 | |
| 
 | |
| 	err = validateState(req, sess)
 | |
| 	if err != nil {
 | |
| 		return goth.User{}, err
 | |
| 	}
 | |
| 
 | |
| 	user, err := provider.FetchUser(sess)
 | |
| 	if err == nil {
 | |
| 		// user can be found with existing session data
 | |
| 		return user, err
 | |
| 	}
 | |
| 
 | |
| 	params := req.URL.Query()
 | |
| 	if params.Encode() == "" && req.Method == "POST" {
 | |
| 		req.ParseForm()
 | |
| 		params = req.Form
 | |
| 	}
 | |
| 
 | |
| 	// get new token and retry fetch
 | |
| 	_, err = sess.Authorize(provider, params)
 | |
| 	if err != nil {
 | |
| 		return goth.User{}, err
 | |
| 	}
 | |
| 
 | |
| 	err = StoreInSession(providerName, sess.Marshal(), req, res)
 | |
| 
 | |
| 	if err != nil {
 | |
| 		return goth.User{}, err
 | |
| 	}
 | |
| 
 | |
| 	gu, err := provider.FetchUser(sess)
 | |
| 	return gu, err
 | |
| }
 | |
| 
 | |
| // validateState ensures that the state token param from the original
 | |
| // AuthURL matches the one included in the current (callback) request.
 | |
| func validateState(req *http.Request, sess goth.Session) error {
 | |
| 	rawAuthURL, err := sess.GetAuthURL()
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	authURL, err := url.Parse(rawAuthURL)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	reqState := GetState(req)
 | |
| 
 | |
| 	originalState := authURL.Query().Get("state")
 | |
| 	if originalState != "" && (originalState != reqState) {
 | |
| 		return errors.New("state token mismatch")
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Logout invalidates a user session.
 | |
| func Logout(res http.ResponseWriter, req *http.Request) error {
 | |
| 	session, err := Store.Get(req, SessionName)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	session.Options.MaxAge = -1
 | |
| 	session.Values = make(map[interface{}]interface{})
 | |
| 	err = session.Save(req, res)
 | |
| 	if err != nil {
 | |
| 		return errors.New("Could not delete user session ")
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // GetProviderName is a function used to get the name of a provider
 | |
| // for a given request. By default, this provider is fetched from
 | |
| // the URL query string. If you provide it in a different way,
 | |
| // assign your own function to this variable that returns the provider
 | |
| // name for your request.
 | |
| var GetProviderName = getProviderName
 | |
| 
 | |
| func getProviderName(req *http.Request) (string, error) {
 | |
| 
 | |
| 	// try to get it from the url param "provider"
 | |
| 	if p := req.URL.Query().Get("provider"); p != "" {
 | |
| 		return p, nil
 | |
| 	}
 | |
| 
 | |
| 	// try to get it from the url param ":provider"
 | |
| 	if p := req.URL.Query().Get(":provider"); p != "" {
 | |
| 		return p, nil
 | |
| 	}
 | |
| 
 | |
| 	// try to get it from the context's value of "provider" key
 | |
| 	if p, ok := mux.Vars(req)["provider"]; ok {
 | |
| 		return p, nil
 | |
| 	}
 | |
| 
 | |
| 	//  try to get it from the go-context's value of "provider" key
 | |
| 	if p, ok := req.Context().Value("provider").(string); ok {
 | |
| 		return p, nil
 | |
| 	}
 | |
| 
 | |
| 	// try to get it from the go-context's value of providerContextKey key
 | |
| 	if p, ok := req.Context().Value(ProviderParamKey).(string); ok {
 | |
| 		return p, nil
 | |
| 	}
 | |
| 
 | |
| 	// As a fallback, loop over the used providers, if we already have a valid session for any provider (ie. user has already begun authentication with a provider), then return that provider name
 | |
| 	providers := goth.GetProviders()
 | |
| 	session, _ := Store.Get(req, SessionName)
 | |
| 	for _, provider := range providers {
 | |
| 		p := provider.Name()
 | |
| 		value := session.Values[p]
 | |
| 		if _, ok := value.(string); ok {
 | |
| 			return p, nil
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// if not found then return an empty string with the corresponding error
 | |
| 	return "", errors.New("you must select a provider")
 | |
| }
 | |
| 
 | |
| // GetContextWithProvider returns a new request context containing the provider
 | |
| func GetContextWithProvider(req *http.Request, provider string) *http.Request {
 | |
| 	return req.WithContext(context.WithValue(req.Context(), ProviderParamKey, provider))
 | |
| }
 | |
| 
 | |
| // StoreInSession stores a specified key/value pair in the session.
 | |
| func StoreInSession(key string, value string, req *http.Request, res http.ResponseWriter) error {
 | |
| 	session, _ := Store.New(req, SessionName)
 | |
| 
 | |
| 	if err := updateSessionValue(session, key, value); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	return session.Save(req, res)
 | |
| }
 | |
| 
 | |
| // GetFromSession retrieves a previously-stored value from the session.
 | |
| // If no value has previously been stored at the specified key, it will return an error.
 | |
| func GetFromSession(key string, req *http.Request) (string, error) {
 | |
| 	session, _ := Store.Get(req, SessionName)
 | |
| 	value, err := getSessionValue(session, key)
 | |
| 	if err != nil {
 | |
| 		return "", errors.New("could not find a matching session for this request")
 | |
| 	}
 | |
| 
 | |
| 	return value, nil
 | |
| }
 | |
| 
 | |
| func getSessionValue(session *sessions.Session, key string) (string, error) {
 | |
| 	value := session.Values[key]
 | |
| 	if value == nil {
 | |
| 		return "", fmt.Errorf("could not find a matching session for this request")
 | |
| 	}
 | |
| 
 | |
| 	rdata := strings.NewReader(value.(string))
 | |
| 	r, err := gzip.NewReader(rdata)
 | |
| 	if err != nil {
 | |
| 		return "", err
 | |
| 	}
 | |
| 	s, err := ioutil.ReadAll(r)
 | |
| 	if err != nil {
 | |
| 		return "", err
 | |
| 	}
 | |
| 
 | |
| 	return string(s), nil
 | |
| }
 | |
| 
 | |
| func updateSessionValue(session *sessions.Session, key, value string) error {
 | |
| 	var b bytes.Buffer
 | |
| 	gz := gzip.NewWriter(&b)
 | |
| 	if _, err := gz.Write([]byte(value)); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	if err := gz.Flush(); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	if err := gz.Close(); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	session.Values[key] = b.String()
 | |
| 	return nil
 | |
| }
 |