diff options
author | Frédéric Guillot <fred@miniflux.net> | 2018-01-02 22:04:48 -0800 |
---|---|---|
committer | Frédéric Guillot <fred@miniflux.net> | 2018-01-02 22:04:48 -0800 |
commit | 320d1b016747ba4501da9417d9ce5f99368a5768 (patch) | |
tree | 1054d96afde6022951b76cc4a09b78e1e3f05058 /ui/oauth2.go | |
parent | c39f2e1a8d2de6d412bcc673d29eb0f7a2d1f5f7 (diff) |
Refactor packages to have more idiomatic code base
Diffstat (limited to 'ui/oauth2.go')
-rw-r--r-- | ui/oauth2.go | 170 |
1 files changed, 170 insertions, 0 deletions
diff --git a/ui/oauth2.go b/ui/oauth2.go new file mode 100644 index 0000000..12ca572 --- /dev/null +++ b/ui/oauth2.go @@ -0,0 +1,170 @@ +// Copyright 2017 Frédéric Guillot. All rights reserved. +// Use of this source code is governed by the Apache 2.0 +// license that can be found in the LICENSE file. + +package ui + +import ( + "github.com/miniflux/miniflux/config" + "github.com/miniflux/miniflux/http/cookie" + "github.com/miniflux/miniflux/http/handler" + "github.com/miniflux/miniflux/logger" + "github.com/miniflux/miniflux/model" + "github.com/miniflux/miniflux/oauth2" + "github.com/tomasen/realip" +) + +// OAuth2Redirect redirects the user to the consent page to ask for permission. +func (c *Controller) OAuth2Redirect(ctx *handler.Context, request *handler.Request, response *handler.Response) { + provider := request.StringParam("provider", "") + if provider == "" { + logger.Error("[OAuth2] Invalid or missing provider: %s", provider) + response.Redirect(ctx.Route("login")) + return + } + + authProvider, err := getOAuth2Manager(c.cfg).Provider(provider) + if err != nil { + logger.Error("[OAuth2] %v", err) + response.Redirect(ctx.Route("login")) + return + } + + response.Redirect(authProvider.GetRedirectURL(ctx.GenerateOAuth2State())) +} + +// OAuth2Callback receives the authorization code and create a new session. +func (c *Controller) OAuth2Callback(ctx *handler.Context, request *handler.Request, response *handler.Response) { + provider := request.StringParam("provider", "") + if provider == "" { + logger.Error("[OAuth2] Invalid or missing provider") + response.Redirect(ctx.Route("login")) + return + } + + code := request.QueryStringParam("code", "") + if code == "" { + logger.Error("[OAuth2] No code received on callback") + response.Redirect(ctx.Route("login")) + return + } + + state := request.QueryStringParam("state", "") + if state == "" || state != ctx.OAuth2State() { + logger.Error(`[OAuth2] Invalid state value: got "%s" instead of "%s"`, state, ctx.OAuth2State()) + response.Redirect(ctx.Route("login")) + return + } + + authProvider, err := getOAuth2Manager(c.cfg).Provider(provider) + if err != nil { + logger.Error("[OAuth2] %v", err) + response.Redirect(ctx.Route("login")) + return + } + + profile, err := authProvider.GetProfile(code) + if err != nil { + logger.Error("[OAuth2] %v", err) + response.Redirect(ctx.Route("login")) + return + } + + if ctx.IsAuthenticated() { + user, err := c.store.UserByExtraField(profile.Key, profile.ID) + if err != nil { + response.HTML().ServerError(err) + return + } + + if user != nil { + logger.Error("[OAuth2] User #%d cannot be associated because %s is already associated", ctx.UserID(), user.Username) + ctx.SetFlashErrorMessage(ctx.Translate("There is already someone associated with this provider!")) + response.Redirect(ctx.Route("settings")) + return + } + + user = ctx.LoggedUser() + if err := c.store.UpdateExtraField(user.ID, profile.Key, profile.ID); err != nil { + response.HTML().ServerError(err) + return + } + + ctx.SetFlashMessage(ctx.Translate("Your external account is now linked !")) + response.Redirect(ctx.Route("settings")) + return + } + + user, err := c.store.UserByExtraField(profile.Key, profile.ID) + if err != nil { + response.HTML().ServerError(err) + return + } + + if user == nil { + if c.cfg.GetInt("OAUTH2_USER_CREATION", 0) == 0 { + response.HTML().Forbidden() + return + } + + user = model.NewUser() + user.Username = profile.Username + user.IsAdmin = false + user.Extra[profile.Key] = profile.ID + + if err := c.store.CreateUser(user); err != nil { + response.HTML().ServerError(err) + return + } + } + + sessionToken, err := c.store.CreateUserSession( + user.Username, + request.Request().UserAgent(), + realip.RealIP(request.Request()), + ) + + if err != nil { + response.HTML().ServerError(err) + return + } + + logger.Info("[Controller:OAuth2Callback] username=%s just logged in", user.Username) + + response.SetCookie(cookie.New(cookie.CookieUserSessionID, sessionToken, c.cfg.IsHTTPS)) + response.Redirect(ctx.Route("unread")) +} + +// OAuth2Unlink unlink an account from the external provider. +func (c *Controller) OAuth2Unlink(ctx *handler.Context, request *handler.Request, response *handler.Response) { + provider := request.StringParam("provider", "") + if provider == "" { + logger.Info("[OAuth2] Invalid or missing provider") + response.Redirect(ctx.Route("login")) + return + } + + authProvider, err := getOAuth2Manager(c.cfg).Provider(provider) + if err != nil { + logger.Error("[OAuth2] %v", err) + response.Redirect(ctx.Route("settings")) + return + } + + user := ctx.LoggedUser() + if err := c.store.RemoveExtraField(user.ID, authProvider.GetUserExtraKey()); err != nil { + response.HTML().ServerError(err) + return + } + + response.Redirect(ctx.Route("settings")) + return +} + +func getOAuth2Manager(cfg *config.Config) *oauth2.Manager { + return oauth2.NewManager( + cfg.Get("OAUTH2_CLIENT_ID", ""), + cfg.Get("OAUTH2_CLIENT_SECRET", ""), + cfg.Get("OAUTH2_REDIRECT_URL", ""), + ) +} |