oauth2.go 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170
  1. // Copyright 2017 Frédéric Guillot. All rights reserved.
  2. // Use of this source code is governed by the Apache 2.0
  3. // license that can be found in the LICENSE file.
  4. package controller
  5. import (
  6. "github.com/miniflux/miniflux/config"
  7. "github.com/miniflux/miniflux/logger"
  8. "github.com/miniflux/miniflux/model"
  9. "github.com/miniflux/miniflux/server/cookie"
  10. "github.com/miniflux/miniflux/server/core"
  11. "github.com/miniflux/miniflux/server/oauth2"
  12. "github.com/tomasen/realip"
  13. )
  14. // OAuth2Redirect redirects the user to the consent page to ask for permission.
  15. func (c *Controller) OAuth2Redirect(ctx *core.Context, request *core.Request, response *core.Response) {
  16. provider := request.StringParam("provider", "")
  17. if provider == "" {
  18. logger.Error("[OAuth2] Invalid or missing provider: %s", provider)
  19. response.Redirect(ctx.Route("login"))
  20. return
  21. }
  22. authProvider, err := getOAuth2Manager(c.cfg).Provider(provider)
  23. if err != nil {
  24. logger.Error("[OAuth2] %v", err)
  25. response.Redirect(ctx.Route("login"))
  26. return
  27. }
  28. response.Redirect(authProvider.GetRedirectURL(ctx.GenerateOAuth2State()))
  29. }
  30. // OAuth2Callback receives the authorization code and create a new session.
  31. func (c *Controller) OAuth2Callback(ctx *core.Context, request *core.Request, response *core.Response) {
  32. provider := request.StringParam("provider", "")
  33. if provider == "" {
  34. logger.Error("[OAuth2] Invalid or missing provider")
  35. response.Redirect(ctx.Route("login"))
  36. return
  37. }
  38. code := request.QueryStringParam("code", "")
  39. if code == "" {
  40. logger.Error("[OAuth2] No code received on callback")
  41. response.Redirect(ctx.Route("login"))
  42. return
  43. }
  44. state := request.QueryStringParam("state", "")
  45. if state == "" || state != ctx.OAuth2State() {
  46. logger.Error(`[OAuth2] Invalid state value: got "%s" instead of "%s"`, state, ctx.OAuth2State())
  47. response.Redirect(ctx.Route("login"))
  48. return
  49. }
  50. authProvider, err := getOAuth2Manager(c.cfg).Provider(provider)
  51. if err != nil {
  52. logger.Error("[OAuth2] %v", err)
  53. response.Redirect(ctx.Route("login"))
  54. return
  55. }
  56. profile, err := authProvider.GetProfile(code)
  57. if err != nil {
  58. logger.Error("[OAuth2] %v", err)
  59. response.Redirect(ctx.Route("login"))
  60. return
  61. }
  62. if ctx.IsAuthenticated() {
  63. user, err := c.store.UserByExtraField(profile.Key, profile.ID)
  64. if err != nil {
  65. response.HTML().ServerError(err)
  66. return
  67. }
  68. if user != nil {
  69. logger.Error("[OAuth2] User #%d cannot be associated because %s is already associated", ctx.UserID(), user.Username)
  70. ctx.SetFlashErrorMessage(ctx.Translate("There is already someone associated with this provider!"))
  71. response.Redirect(ctx.Route("settings"))
  72. return
  73. }
  74. user = ctx.LoggedUser()
  75. if err := c.store.UpdateExtraField(user.ID, profile.Key, profile.ID); err != nil {
  76. response.HTML().ServerError(err)
  77. return
  78. }
  79. ctx.SetFlashMessage(ctx.Translate("Your external account is now linked !"))
  80. response.Redirect(ctx.Route("settings"))
  81. return
  82. }
  83. user, err := c.store.UserByExtraField(profile.Key, profile.ID)
  84. if err != nil {
  85. response.HTML().ServerError(err)
  86. return
  87. }
  88. if user == nil {
  89. if c.cfg.GetInt("OAUTH2_USER_CREATION", 0) == 0 {
  90. response.HTML().Forbidden()
  91. return
  92. }
  93. user = model.NewUser()
  94. user.Username = profile.Username
  95. user.IsAdmin = false
  96. user.Extra[profile.Key] = profile.ID
  97. if err := c.store.CreateUser(user); err != nil {
  98. response.HTML().ServerError(err)
  99. return
  100. }
  101. }
  102. sessionToken, err := c.store.CreateUserSession(
  103. user.Username,
  104. request.Request().UserAgent(),
  105. realip.RealIP(request.Request()),
  106. )
  107. if err != nil {
  108. response.HTML().ServerError(err)
  109. return
  110. }
  111. logger.Info("[Controller:OAuth2Callback] username=%s just logged in", user.Username)
  112. response.SetCookie(cookie.New(cookie.CookieUserSessionID, sessionToken, c.cfg.IsHTTPS))
  113. response.Redirect(ctx.Route("unread"))
  114. }
  115. // OAuth2Unlink unlink an account from the external provider.
  116. func (c *Controller) OAuth2Unlink(ctx *core.Context, request *core.Request, response *core.Response) {
  117. provider := request.StringParam("provider", "")
  118. if provider == "" {
  119. logger.Info("[OAuth2] Invalid or missing provider")
  120. response.Redirect(ctx.Route("login"))
  121. return
  122. }
  123. authProvider, err := getOAuth2Manager(c.cfg).Provider(provider)
  124. if err != nil {
  125. logger.Error("[OAuth2] %v", err)
  126. response.Redirect(ctx.Route("settings"))
  127. return
  128. }
  129. user := ctx.LoggedUser()
  130. if err := c.store.RemoveExtraField(user.ID, authProvider.GetUserExtraKey()); err != nil {
  131. response.HTML().ServerError(err)
  132. return
  133. }
  134. response.Redirect(ctx.Route("settings"))
  135. return
  136. }
  137. func getOAuth2Manager(cfg *config.Config) *oauth2.Manager {
  138. return oauth2.NewManager(
  139. cfg.Get("OAUTH2_CLIENT_ID", ""),
  140. cfg.Get("OAUTH2_CLIENT_SECRET", ""),
  141. cfg.Get("OAUTH2_REDIRECT_URL", ""),
  142. )
  143. }