oauth2_callback.go 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package ui // import "miniflux.app/v2/internal/ui"
  4. import (
  5. "crypto/subtle"
  6. "errors"
  7. "log/slog"
  8. "net/http"
  9. "miniflux.app/v2/internal/config"
  10. "miniflux.app/v2/internal/http/cookie"
  11. "miniflux.app/v2/internal/http/request"
  12. "miniflux.app/v2/internal/http/response/html"
  13. "miniflux.app/v2/internal/http/route"
  14. "miniflux.app/v2/internal/locale"
  15. "miniflux.app/v2/internal/model"
  16. "miniflux.app/v2/internal/ui/session"
  17. )
  18. func (h *handler) oauth2Callback(w http.ResponseWriter, r *http.Request) {
  19. provider := request.RouteStringParam(r, "provider")
  20. if provider == "" {
  21. slog.Warn("Invalid or missing OAuth2 provider")
  22. html.Redirect(w, r, route.Path(h.router, "login"))
  23. return
  24. }
  25. code := request.QueryStringParam(r, "code", "")
  26. if code == "" {
  27. slog.Warn("No code received on OAuth2 callback")
  28. html.Redirect(w, r, route.Path(h.router, "login"))
  29. return
  30. }
  31. state := request.QueryStringParam(r, "state", "")
  32. if subtle.ConstantTimeCompare([]byte(state), []byte(request.OAuth2State(r))) == 0 {
  33. slog.Warn("Invalid OAuth2 state value received",
  34. slog.String("expected", request.OAuth2State(r)),
  35. slog.String("received", state),
  36. )
  37. html.Redirect(w, r, route.Path(h.router, "login"))
  38. return
  39. }
  40. authProvider, err := getOAuth2Manager(r.Context()).FindProvider(provider)
  41. if err != nil {
  42. slog.Error("Unable to initialize OAuth2 provider",
  43. slog.String("provider", provider),
  44. slog.Any("error", err),
  45. )
  46. html.Redirect(w, r, route.Path(h.router, "login"))
  47. return
  48. }
  49. profile, err := authProvider.GetProfile(r.Context(), code, request.OAuth2CodeVerifier(r))
  50. if err != nil {
  51. slog.Warn("Unable to get OAuth2 profile from provider",
  52. slog.String("provider", provider),
  53. slog.Any("error", err),
  54. )
  55. html.Redirect(w, r, route.Path(h.router, "login"))
  56. return
  57. }
  58. printer := locale.NewPrinter(request.UserLanguage(r))
  59. sess := session.New(h.store, request.SessionID(r))
  60. if request.IsAuthenticated(r) {
  61. loggedUser, err := h.store.UserByID(request.UserID(r))
  62. if err != nil {
  63. html.ServerError(w, r, err)
  64. return
  65. }
  66. if h.store.AnotherUserWithFieldExists(loggedUser.ID, profile.Key, profile.ID) {
  67. slog.Error("Oauth2 user cannot be associated because it is already associated with another user",
  68. slog.Int64("user_id", loggedUser.ID),
  69. slog.String("oauth2_provider", provider),
  70. slog.String("oauth2_profile_id", profile.ID),
  71. )
  72. sess.NewFlashErrorMessage(printer.Print("error.duplicate_linked_account"))
  73. html.Redirect(w, r, route.Path(h.router, "settings"))
  74. return
  75. }
  76. authProvider.PopulateUserWithProfileID(loggedUser, profile)
  77. if err := h.store.UpdateUser(loggedUser); err != nil {
  78. html.ServerError(w, r, err)
  79. return
  80. }
  81. sess.NewFlashMessage(printer.Print("alert.account_linked"))
  82. html.Redirect(w, r, route.Path(h.router, "settings"))
  83. return
  84. }
  85. user, err := h.store.UserByField(profile.Key, profile.ID)
  86. if err != nil {
  87. html.ServerError(w, r, err)
  88. return
  89. }
  90. if user == nil {
  91. if !config.Opts.IsOAuth2UserCreationAllowed() {
  92. html.Forbidden(w, r)
  93. return
  94. }
  95. if h.store.UserExists(profile.Username) {
  96. html.BadRequest(w, r, errors.New(printer.Print("error.user_already_exists")))
  97. return
  98. }
  99. userCreationRequest := &model.UserCreationRequest{Username: profile.Username}
  100. authProvider.PopulateUserCreationWithProfileID(userCreationRequest, profile)
  101. user, err = h.store.CreateUser(userCreationRequest)
  102. if err != nil {
  103. html.ServerError(w, r, err)
  104. return
  105. }
  106. }
  107. clientIP := request.ClientIP(r)
  108. sessionToken, _, err := h.store.CreateUserSessionFromUsername(user.Username, r.UserAgent(), clientIP)
  109. if err != nil {
  110. html.ServerError(w, r, err)
  111. return
  112. }
  113. slog.Info("User authenticated successfully using OAuth2",
  114. slog.Bool("authentication_successful", true),
  115. slog.String("client_ip", clientIP),
  116. slog.String("user_agent", r.UserAgent()),
  117. slog.Int64("user_id", user.ID),
  118. slog.String("username", user.Username),
  119. )
  120. h.store.SetLastLogin(user.ID)
  121. sess.SetLanguage(user.Language)
  122. sess.SetTheme(user.Theme)
  123. http.SetCookie(w, cookie.New(
  124. cookie.CookieUserSessionID,
  125. sessionToken,
  126. config.Opts.HTTPS(),
  127. config.Opts.BasePath(),
  128. ))
  129. html.Redirect(w, r, route.Path(h.router, user.DefaultHomePage))
  130. }