oauth2_callback.go 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package ui // import "miniflux.app/v2/internal/ui"
  4. import (
  5. "crypto/subtle"
  6. "errors"
  7. "log/slog"
  8. "net/http"
  9. "miniflux.app/v2/internal/config"
  10. "miniflux.app/v2/internal/http/request"
  11. "miniflux.app/v2/internal/http/response"
  12. "miniflux.app/v2/internal/locale"
  13. "miniflux.app/v2/internal/model"
  14. )
  15. func (h *handler) oauth2Callback(w http.ResponseWriter, r *http.Request) {
  16. provider := request.RouteStringParam(r, "provider")
  17. if provider == "" {
  18. slog.Warn("Invalid or missing OAuth2 provider")
  19. response.HTMLRedirect(w, r, h.routePath("/"))
  20. return
  21. }
  22. code := request.QueryStringParam(r, "code", "")
  23. if code == "" {
  24. slog.Warn("No code received on OAuth2 callback")
  25. response.HTMLRedirect(w, r, h.routePath("/"))
  26. return
  27. }
  28. sess := request.WebSession(r)
  29. state := request.QueryStringParam(r, "state", "")
  30. if subtle.ConstantTimeCompare([]byte(state), []byte(sess.OAuth2State())) == 0 {
  31. slog.Warn("Invalid OAuth2 state value received")
  32. response.HTMLRedirect(w, r, h.routePath("/"))
  33. return
  34. }
  35. codeVerifier := sess.OAuth2CodeVerifier()
  36. sess.ClearOAuth2Flow()
  37. authProvider, err := getOAuth2Manager(r.Context()).FindProvider(provider)
  38. if err != nil {
  39. slog.Error("Unable to initialize OAuth2 provider",
  40. slog.String("provider", provider),
  41. slog.Any("error", err),
  42. )
  43. response.HTMLRedirect(w, r, h.routePath("/"))
  44. return
  45. }
  46. profile, err := authProvider.Profile(r.Context(), code, codeVerifier)
  47. if err != nil {
  48. slog.Warn("Unable to get OAuth2 profile from provider",
  49. slog.String("provider", provider),
  50. slog.Any("error", err),
  51. )
  52. response.HTMLRedirect(w, r, h.routePath("/"))
  53. return
  54. }
  55. printer := locale.NewPrinter(sess.Language())
  56. if request.IsAuthenticated(r) {
  57. loggedUser, err := h.store.UserByID(request.UserID(r))
  58. if err != nil {
  59. response.HTMLServerError(w, r, err)
  60. return
  61. }
  62. if h.store.AnotherUserWithFieldExists(loggedUser.ID, profile.Key, profile.ID) {
  63. slog.Error("Oauth2 user cannot be associated because it is already associated with another user",
  64. slog.Int64("user_id", loggedUser.ID),
  65. slog.String("oauth2_provider", provider),
  66. slog.String("oauth2_profile_id", profile.ID),
  67. )
  68. sess.SetErrorMessage(printer.Print("error.duplicate_linked_account"))
  69. response.HTMLRedirect(w, r, h.routePath("/settings"))
  70. return
  71. }
  72. existingProfileID := authProvider.UserProfileID(loggedUser)
  73. if existingProfileID != "" && existingProfileID != profile.ID {
  74. slog.Error("Oauth2 user cannot be associated because this user is already linked to a different identity",
  75. slog.Int64("user_id", loggedUser.ID),
  76. slog.String("oauth2_provider", provider),
  77. slog.String("existing_profile_id", existingProfileID),
  78. slog.String("new_profile_id", profile.ID),
  79. )
  80. sess.SetErrorMessage(printer.Print("error.duplicate_linked_account"))
  81. response.HTMLRedirect(w, r, h.routePath("/settings"))
  82. return
  83. }
  84. authProvider.PopulateUserWithProfileID(loggedUser, profile)
  85. if err := h.store.UpdateUser(loggedUser); err != nil {
  86. response.HTMLServerError(w, r, err)
  87. return
  88. }
  89. sess.SetSuccessMessage(printer.Print("alert.account_linked"))
  90. response.HTMLRedirect(w, r, h.routePath("/settings"))
  91. return
  92. }
  93. user, err := h.store.UserByField(profile.Key, profile.ID)
  94. if err != nil {
  95. response.HTMLServerError(w, r, err)
  96. return
  97. }
  98. if user == nil {
  99. if !config.Opts.IsOAuth2UserCreationAllowed() {
  100. response.HTMLForbidden(w, r)
  101. return
  102. }
  103. if h.store.UserExists(profile.Username) {
  104. response.HTMLBadRequest(w, r, errors.New(printer.Print("error.user_already_exists")))
  105. return
  106. }
  107. userCreationRequest := &model.UserCreationRequest{Username: profile.Username}
  108. authProvider.PopulateUserCreationWithProfileID(userCreationRequest, profile)
  109. user, err = h.store.CreateUser(userCreationRequest)
  110. if err != nil {
  111. response.HTMLServerError(w, r, err)
  112. return
  113. }
  114. }
  115. slog.Info("User authenticated successfully using OAuth2",
  116. slog.Bool("authentication_successful", true),
  117. slog.String("client_ip", request.ClientIP(r)),
  118. slog.String("user_agent", r.UserAgent()),
  119. slog.Int64("user_id", user.ID),
  120. slog.String("username", user.Username),
  121. )
  122. h.store.SetLastLogin(user.ID)
  123. if err := authenticateWebSession(w, r, h.store, user); err != nil {
  124. response.HTMLServerError(w, r, err)
  125. return
  126. }
  127. response.HTMLRedirect(w, r, h.basePath+"/"+user.DefaultHomePage)
  128. }