aboutsummaryrefslogtreecommitdiffhomepage
path: root/ui/oauth2.go
diff options
context:
space:
mode:
authorGravatar Frédéric Guillot <fred@miniflux.net>2018-01-02 22:04:48 -0800
committerGravatar Frédéric Guillot <fred@miniflux.net>2018-01-02 22:04:48 -0800
commit320d1b016747ba4501da9417d9ce5f99368a5768 (patch)
tree1054d96afde6022951b76cc4a09b78e1e3f05058 /ui/oauth2.go
parentc39f2e1a8d2de6d412bcc673d29eb0f7a2d1f5f7 (diff)
Refactor packages to have more idiomatic code base
Diffstat (limited to 'ui/oauth2.go')
-rw-r--r--ui/oauth2.go170
1 files changed, 170 insertions, 0 deletions
diff --git a/ui/oauth2.go b/ui/oauth2.go
new file mode 100644
index 0000000..12ca572
--- /dev/null
+++ b/ui/oauth2.go
@@ -0,0 +1,170 @@
+// Copyright 2017 Frédéric Guillot. All rights reserved.
+// Use of this source code is governed by the Apache 2.0
+// license that can be found in the LICENSE file.
+
+package ui
+
+import (
+ "github.com/miniflux/miniflux/config"
+ "github.com/miniflux/miniflux/http/cookie"
+ "github.com/miniflux/miniflux/http/handler"
+ "github.com/miniflux/miniflux/logger"
+ "github.com/miniflux/miniflux/model"
+ "github.com/miniflux/miniflux/oauth2"
+ "github.com/tomasen/realip"
+)
+
+// OAuth2Redirect redirects the user to the consent page to ask for permission.
+func (c *Controller) OAuth2Redirect(ctx *handler.Context, request *handler.Request, response *handler.Response) {
+ provider := request.StringParam("provider", "")
+ if provider == "" {
+ logger.Error("[OAuth2] Invalid or missing provider: %s", provider)
+ response.Redirect(ctx.Route("login"))
+ return
+ }
+
+ authProvider, err := getOAuth2Manager(c.cfg).Provider(provider)
+ if err != nil {
+ logger.Error("[OAuth2] %v", err)
+ response.Redirect(ctx.Route("login"))
+ return
+ }
+
+ response.Redirect(authProvider.GetRedirectURL(ctx.GenerateOAuth2State()))
+}
+
+// OAuth2Callback receives the authorization code and create a new session.
+func (c *Controller) OAuth2Callback(ctx *handler.Context, request *handler.Request, response *handler.Response) {
+ provider := request.StringParam("provider", "")
+ if provider == "" {
+ logger.Error("[OAuth2] Invalid or missing provider")
+ response.Redirect(ctx.Route("login"))
+ return
+ }
+
+ code := request.QueryStringParam("code", "")
+ if code == "" {
+ logger.Error("[OAuth2] No code received on callback")
+ response.Redirect(ctx.Route("login"))
+ return
+ }
+
+ state := request.QueryStringParam("state", "")
+ if state == "" || state != ctx.OAuth2State() {
+ logger.Error(`[OAuth2] Invalid state value: got "%s" instead of "%s"`, state, ctx.OAuth2State())
+ response.Redirect(ctx.Route("login"))
+ return
+ }
+
+ authProvider, err := getOAuth2Manager(c.cfg).Provider(provider)
+ if err != nil {
+ logger.Error("[OAuth2] %v", err)
+ response.Redirect(ctx.Route("login"))
+ return
+ }
+
+ profile, err := authProvider.GetProfile(code)
+ if err != nil {
+ logger.Error("[OAuth2] %v", err)
+ response.Redirect(ctx.Route("login"))
+ return
+ }
+
+ if ctx.IsAuthenticated() {
+ user, err := c.store.UserByExtraField(profile.Key, profile.ID)
+ if err != nil {
+ response.HTML().ServerError(err)
+ return
+ }
+
+ if user != nil {
+ logger.Error("[OAuth2] User #%d cannot be associated because %s is already associated", ctx.UserID(), user.Username)
+ ctx.SetFlashErrorMessage(ctx.Translate("There is already someone associated with this provider!"))
+ response.Redirect(ctx.Route("settings"))
+ return
+ }
+
+ user = ctx.LoggedUser()
+ if err := c.store.UpdateExtraField(user.ID, profile.Key, profile.ID); err != nil {
+ response.HTML().ServerError(err)
+ return
+ }
+
+ ctx.SetFlashMessage(ctx.Translate("Your external account is now linked !"))
+ response.Redirect(ctx.Route("settings"))
+ return
+ }
+
+ user, err := c.store.UserByExtraField(profile.Key, profile.ID)
+ if err != nil {
+ response.HTML().ServerError(err)
+ return
+ }
+
+ if user == nil {
+ if c.cfg.GetInt("OAUTH2_USER_CREATION", 0) == 0 {
+ response.HTML().Forbidden()
+ return
+ }
+
+ user = model.NewUser()
+ user.Username = profile.Username
+ user.IsAdmin = false
+ user.Extra[profile.Key] = profile.ID
+
+ if err := c.store.CreateUser(user); err != nil {
+ response.HTML().ServerError(err)
+ return
+ }
+ }
+
+ sessionToken, err := c.store.CreateUserSession(
+ user.Username,
+ request.Request().UserAgent(),
+ realip.RealIP(request.Request()),
+ )
+
+ if err != nil {
+ response.HTML().ServerError(err)
+ return
+ }
+
+ logger.Info("[Controller:OAuth2Callback] username=%s just logged in", user.Username)
+
+ response.SetCookie(cookie.New(cookie.CookieUserSessionID, sessionToken, c.cfg.IsHTTPS))
+ response.Redirect(ctx.Route("unread"))
+}
+
+// OAuth2Unlink unlink an account from the external provider.
+func (c *Controller) OAuth2Unlink(ctx *handler.Context, request *handler.Request, response *handler.Response) {
+ provider := request.StringParam("provider", "")
+ if provider == "" {
+ logger.Info("[OAuth2] Invalid or missing provider")
+ response.Redirect(ctx.Route("login"))
+ return
+ }
+
+ authProvider, err := getOAuth2Manager(c.cfg).Provider(provider)
+ if err != nil {
+ logger.Error("[OAuth2] %v", err)
+ response.Redirect(ctx.Route("settings"))
+ return
+ }
+
+ user := ctx.LoggedUser()
+ if err := c.store.RemoveExtraField(user.ID, authProvider.GetUserExtraKey()); err != nil {
+ response.HTML().ServerError(err)
+ return
+ }
+
+ response.Redirect(ctx.Route("settings"))
+ return
+}
+
+func getOAuth2Manager(cfg *config.Config) *oauth2.Manager {
+ return oauth2.NewManager(
+ cfg.Get("OAUTH2_CLIENT_ID", ""),
+ cfg.Get("OAUTH2_CLIENT_SECRET", ""),
+ cfg.Get("OAUTH2_REDIRECT_URL", ""),
+ )
+}