oauth2_callback.go 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package ui // import "miniflux.app/v2/internal/ui"
  4. import (
  5. "crypto/subtle"
  6. "errors"
  7. "log/slog"
  8. "net/http"
  9. "miniflux.app/v2/internal/config"
  10. "miniflux.app/v2/internal/http/cookie"
  11. "miniflux.app/v2/internal/http/request"
  12. "miniflux.app/v2/internal/http/response"
  13. "miniflux.app/v2/internal/locale"
  14. "miniflux.app/v2/internal/model"
  15. "miniflux.app/v2/internal/ui/session"
  16. )
  17. func (h *handler) oauth2Callback(w http.ResponseWriter, r *http.Request) {
  18. provider := request.RouteStringParam(r, "provider")
  19. if provider == "" {
  20. slog.Warn("Invalid or missing OAuth2 provider")
  21. response.HTMLRedirect(w, r, h.routePath("/"))
  22. return
  23. }
  24. code := request.QueryStringParam(r, "code", "")
  25. if code == "" {
  26. slog.Warn("No code received on OAuth2 callback")
  27. response.HTMLRedirect(w, r, h.routePath("/"))
  28. return
  29. }
  30. state := request.QueryStringParam(r, "state", "")
  31. if subtle.ConstantTimeCompare([]byte(state), []byte(request.OAuth2State(r))) == 0 {
  32. slog.Warn("Invalid OAuth2 state value received")
  33. response.HTMLRedirect(w, r, h.routePath("/"))
  34. return
  35. }
  36. authProvider, err := getOAuth2Manager(r.Context()).FindProvider(provider)
  37. if err != nil {
  38. slog.Error("Unable to initialize OAuth2 provider",
  39. slog.String("provider", provider),
  40. slog.Any("error", err),
  41. )
  42. response.HTMLRedirect(w, r, h.routePath("/"))
  43. return
  44. }
  45. profile, err := authProvider.Profile(r.Context(), code, request.OAuth2CodeVerifier(r))
  46. if err != nil {
  47. slog.Warn("Unable to get OAuth2 profile from provider",
  48. slog.String("provider", provider),
  49. slog.Any("error", err),
  50. )
  51. response.HTMLRedirect(w, r, h.routePath("/"))
  52. return
  53. }
  54. sess := session.New(h.store, request.SessionID(r))
  55. sess.SetOAuth2State("")
  56. sess.SetOAuth2CodeVerifier("")
  57. printer := locale.NewPrinter(request.UserLanguage(r))
  58. if request.IsAuthenticated(r) {
  59. loggedUser, err := h.store.UserByID(request.UserID(r))
  60. if err != nil {
  61. response.HTMLServerError(w, r, err)
  62. return
  63. }
  64. if h.store.AnotherUserWithFieldExists(loggedUser.ID, profile.Key, profile.ID) {
  65. slog.Error("Oauth2 user cannot be associated because it is already associated with another user",
  66. slog.Int64("user_id", loggedUser.ID),
  67. slog.String("oauth2_provider", provider),
  68. slog.String("oauth2_profile_id", profile.ID),
  69. )
  70. sess.NewFlashErrorMessage(printer.Print("error.duplicate_linked_account"))
  71. response.HTMLRedirect(w, r, h.routePath("/settings"))
  72. return
  73. }
  74. existingProfileID := authProvider.UserProfileID(loggedUser)
  75. if existingProfileID != "" && existingProfileID != profile.ID {
  76. slog.Error("Oauth2 user cannot be associated because this user is already linked to a different identity",
  77. slog.Int64("user_id", loggedUser.ID),
  78. slog.String("oauth2_provider", provider),
  79. slog.String("existing_profile_id", existingProfileID),
  80. slog.String("new_profile_id", profile.ID),
  81. )
  82. sess.NewFlashErrorMessage(printer.Print("error.duplicate_linked_account"))
  83. response.HTMLRedirect(w, r, h.routePath("/settings"))
  84. return
  85. }
  86. authProvider.PopulateUserWithProfileID(loggedUser, profile)
  87. if err := h.store.UpdateUser(loggedUser); err != nil {
  88. response.HTMLServerError(w, r, err)
  89. return
  90. }
  91. sess.NewFlashMessage(printer.Print("alert.account_linked"))
  92. response.HTMLRedirect(w, r, h.routePath("/settings"))
  93. return
  94. }
  95. user, err := h.store.UserByField(profile.Key, profile.ID)
  96. if err != nil {
  97. response.HTMLServerError(w, r, err)
  98. return
  99. }
  100. if user == nil {
  101. if !config.Opts.IsOAuth2UserCreationAllowed() {
  102. response.HTMLForbidden(w, r)
  103. return
  104. }
  105. if h.store.UserExists(profile.Username) {
  106. response.HTMLBadRequest(w, r, errors.New(printer.Print("error.user_already_exists")))
  107. return
  108. }
  109. userCreationRequest := &model.UserCreationRequest{Username: profile.Username}
  110. authProvider.PopulateUserCreationWithProfileID(userCreationRequest, profile)
  111. user, err = h.store.CreateUser(userCreationRequest)
  112. if err != nil {
  113. response.HTMLServerError(w, r, err)
  114. return
  115. }
  116. }
  117. clientIP := request.ClientIP(r)
  118. sessionToken, _, err := h.store.CreateUserSessionFromUsername(user.Username, r.UserAgent(), clientIP)
  119. if err != nil {
  120. response.HTMLServerError(w, r, err)
  121. return
  122. }
  123. slog.Info("User authenticated successfully using OAuth2",
  124. slog.Bool("authentication_successful", true),
  125. slog.String("client_ip", clientIP),
  126. slog.String("user_agent", r.UserAgent()),
  127. slog.Int64("user_id", user.ID),
  128. slog.String("username", user.Username),
  129. )
  130. h.store.SetLastLogin(user.ID)
  131. sess.SetLanguage(user.Language)
  132. sess.SetTheme(user.Theme)
  133. http.SetCookie(w, cookie.New(
  134. cookie.CookieUserSessionID,
  135. sessionToken,
  136. config.Opts.HTTPS(),
  137. config.Opts.BasePath(),
  138. ))
  139. response.HTMLRedirect(w, r, h.basePath+"/"+user.DefaultHomePage)
  140. }