2021-07-24 15:46:34 +05:30
|
|
|
// Copyright 2021 The Gitea Authors. All rights reserved.
|
2017-02-22 12:44:37 +05:30
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package oauth2
|
|
|
|
|
|
|
|
import (
|
2020-08-31 04:25:01 +05:30
|
|
|
"net/url"
|
2021-07-24 15:46:34 +05:30
|
|
|
"sort"
|
2017-03-03 13:51:31 +05:30
|
|
|
|
2021-07-24 15:46:34 +05:30
|
|
|
"code.gitea.io/gitea/models"
|
2017-02-22 12:44:37 +05:30
|
|
|
"code.gitea.io/gitea/modules/log"
|
2017-03-03 13:51:31 +05:30
|
|
|
"code.gitea.io/gitea/modules/setting"
|
|
|
|
|
2017-02-22 12:44:37 +05:30
|
|
|
"github.com/markbates/goth"
|
2017-05-01 18:56:53 +05:30
|
|
|
"github.com/markbates/goth/providers/bitbucket"
|
2019-01-14 00:36:22 +05:30
|
|
|
"github.com/markbates/goth/providers/discord"
|
2017-05-01 18:56:53 +05:30
|
|
|
"github.com/markbates/goth/providers/dropbox"
|
|
|
|
"github.com/markbates/goth/providers/facebook"
|
2019-09-13 07:45:36 +05:30
|
|
|
"github.com/markbates/goth/providers/gitea"
|
2017-02-22 12:44:37 +05:30
|
|
|
"github.com/markbates/goth/providers/github"
|
2017-05-01 18:56:53 +05:30
|
|
|
"github.com/markbates/goth/providers/gitlab"
|
2019-09-14 15:32:39 +05:30
|
|
|
"github.com/markbates/goth/providers/google"
|
2020-10-25 23:51:49 +05:30
|
|
|
"github.com/markbates/goth/providers/mastodon"
|
2020-03-03 08:41:45 +05:30
|
|
|
"github.com/markbates/goth/providers/nextcloud"
|
2017-05-01 18:56:53 +05:30
|
|
|
"github.com/markbates/goth/providers/openidConnect"
|
|
|
|
"github.com/markbates/goth/providers/twitter"
|
2020-03-05 03:38:52 +05:30
|
|
|
"github.com/markbates/goth/providers/yandex"
|
2017-02-22 12:44:37 +05:30
|
|
|
)
|
|
|
|
|
2021-07-24 15:46:34 +05:30
|
|
|
// Provider describes the display values of a single OAuth2 provider
|
|
|
|
type Provider struct {
|
|
|
|
Name string
|
|
|
|
DisplayName string
|
|
|
|
Image string
|
|
|
|
CustomURLMapping *CustomURLMapping
|
|
|
|
}
|
2017-02-22 12:44:37 +05:30
|
|
|
|
2021-07-24 15:46:34 +05:30
|
|
|
// Providers contains the map of registered OAuth2 providers in Gitea (based on goth)
|
|
|
|
// key is used to map the OAuth2Provider with the goth provider type (also in LoginSource.OAuth2Config.Provider)
|
|
|
|
// value is used to store display data
|
|
|
|
var Providers = map[string]Provider{
|
|
|
|
"bitbucket": {Name: "bitbucket", DisplayName: "Bitbucket", Image: "/assets/img/auth/bitbucket.png"},
|
|
|
|
"dropbox": {Name: "dropbox", DisplayName: "Dropbox", Image: "/assets/img/auth/dropbox.png"},
|
|
|
|
"facebook": {Name: "facebook", DisplayName: "Facebook", Image: "/assets/img/auth/facebook.png"},
|
|
|
|
"github": {
|
|
|
|
Name: "github", DisplayName: "GitHub", Image: "/assets/img/auth/github.png",
|
|
|
|
CustomURLMapping: &CustomURLMapping{
|
|
|
|
TokenURL: github.TokenURL,
|
|
|
|
AuthURL: github.AuthURL,
|
|
|
|
ProfileURL: github.ProfileURL,
|
|
|
|
EmailURL: github.EmailURL,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"gitlab": {
|
|
|
|
Name: "gitlab", DisplayName: "GitLab", Image: "/assets/img/auth/gitlab.png",
|
|
|
|
CustomURLMapping: &CustomURLMapping{
|
|
|
|
TokenURL: gitlab.TokenURL,
|
|
|
|
AuthURL: gitlab.AuthURL,
|
|
|
|
ProfileURL: gitlab.ProfileURL,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"gplus": {Name: "gplus", DisplayName: "Google", Image: "/assets/img/auth/google.png"},
|
|
|
|
"openidConnect": {Name: "openidConnect", DisplayName: "OpenID Connect", Image: "/assets/img/auth/openid_connect.svg"},
|
|
|
|
"twitter": {Name: "twitter", DisplayName: "Twitter", Image: "/assets/img/auth/twitter.png"},
|
|
|
|
"discord": {Name: "discord", DisplayName: "Discord", Image: "/assets/img/auth/discord.png"},
|
|
|
|
"gitea": {
|
|
|
|
Name: "gitea", DisplayName: "Gitea", Image: "/assets/img/auth/gitea.png",
|
|
|
|
CustomURLMapping: &CustomURLMapping{
|
|
|
|
TokenURL: gitea.TokenURL,
|
|
|
|
AuthURL: gitea.AuthURL,
|
|
|
|
ProfileURL: gitea.ProfileURL,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"nextcloud": {
|
|
|
|
Name: "nextcloud", DisplayName: "Nextcloud", Image: "/assets/img/auth/nextcloud.png",
|
|
|
|
CustomURLMapping: &CustomURLMapping{
|
|
|
|
TokenURL: nextcloud.TokenURL,
|
|
|
|
AuthURL: nextcloud.AuthURL,
|
|
|
|
ProfileURL: nextcloud.ProfileURL,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"yandex": {Name: "yandex", DisplayName: "Yandex", Image: "/assets/img/auth/yandex.png"},
|
|
|
|
"mastodon": {
|
|
|
|
Name: "mastodon", DisplayName: "Mastodon", Image: "/assets/img/auth/mastodon.png",
|
|
|
|
CustomURLMapping: &CustomURLMapping{
|
|
|
|
AuthURL: mastodon.InstanceURL,
|
|
|
|
},
|
|
|
|
},
|
2017-05-01 18:56:53 +05:30
|
|
|
}
|
|
|
|
|
2021-07-24 15:46:34 +05:30
|
|
|
// GetActiveOAuth2Providers returns the map of configured active OAuth2 providers
|
|
|
|
// key is used as technical name (like in the callbackURL)
|
|
|
|
// values to display
|
|
|
|
func GetActiveOAuth2Providers() ([]string, map[string]Provider, error) {
|
|
|
|
// Maybe also separate used and unused providers so we can force the registration of only 1 active provider for each type
|
2017-02-22 12:44:37 +05:30
|
|
|
|
2021-07-24 15:46:34 +05:30
|
|
|
loginSources, err := models.GetActiveOAuth2ProviderLoginSources()
|
2018-04-29 11:39:24 +05:30
|
|
|
if err != nil {
|
2021-07-24 15:46:34 +05:30
|
|
|
return nil, nil, err
|
2017-02-22 12:44:37 +05:30
|
|
|
}
|
|
|
|
|
2021-07-24 15:46:34 +05:30
|
|
|
var orderedKeys []string
|
|
|
|
providers := make(map[string]Provider)
|
|
|
|
for _, source := range loginSources {
|
|
|
|
prov := Providers[source.Cfg.(*Source).Provider]
|
|
|
|
if source.Cfg.(*Source).IconURL != "" {
|
|
|
|
prov.Image = source.Cfg.(*Source).IconURL
|
|
|
|
}
|
|
|
|
providers[source.Name] = prov
|
|
|
|
orderedKeys = append(orderedKeys, source.Name)
|
2017-02-22 12:44:37 +05:30
|
|
|
}
|
|
|
|
|
2021-07-24 15:46:34 +05:30
|
|
|
sort.Strings(orderedKeys)
|
2017-02-22 12:44:37 +05:30
|
|
|
|
2021-07-24 15:46:34 +05:30
|
|
|
return orderedKeys, providers, nil
|
2017-02-22 12:44:37 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
// RegisterProvider register a OAuth2 provider in goth lib
|
2017-05-01 18:56:53 +05:30
|
|
|
func RegisterProvider(providerName, providerType, clientID, clientSecret, openIDConnectAutoDiscoveryURL string, customURLMapping *CustomURLMapping) error {
|
|
|
|
provider, err := createProvider(providerName, providerType, clientID, clientSecret, openIDConnectAutoDiscoveryURL, customURLMapping)
|
2017-02-22 12:44:37 +05:30
|
|
|
|
2017-05-01 18:56:53 +05:30
|
|
|
if err == nil && provider != nil {
|
2021-07-29 23:23:18 +05:30
|
|
|
gothRWMutex.Lock()
|
|
|
|
defer gothRWMutex.Unlock()
|
|
|
|
|
2017-02-22 12:44:37 +05:30
|
|
|
goth.UseProviders(provider)
|
|
|
|
}
|
2017-05-01 18:56:53 +05:30
|
|
|
|
|
|
|
return err
|
2017-02-22 12:44:37 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
// RemoveProvider removes the given OAuth2 provider from the goth lib
|
|
|
|
func RemoveProvider(providerName string) {
|
2021-07-29 23:23:18 +05:30
|
|
|
gothRWMutex.Lock()
|
|
|
|
defer gothRWMutex.Unlock()
|
|
|
|
|
2017-02-22 12:44:37 +05:30
|
|
|
delete(goth.GetProviders(), providerName)
|
|
|
|
}
|
|
|
|
|
2020-12-25 01:17:17 +05:30
|
|
|
// ClearProviders clears all OAuth2 providers from the goth lib
|
|
|
|
func ClearProviders() {
|
2021-07-29 23:23:18 +05:30
|
|
|
gothRWMutex.Lock()
|
|
|
|
defer gothRWMutex.Unlock()
|
|
|
|
|
2020-12-25 01:17:17 +05:30
|
|
|
goth.ClearProviders()
|
|
|
|
}
|
|
|
|
|
2017-02-22 12:44:37 +05:30
|
|
|
// used to create different types of goth providers
|
2017-05-01 18:56:53 +05:30
|
|
|
func createProvider(providerName, providerType, clientID, clientSecret, openIDConnectAutoDiscoveryURL string, customURLMapping *CustomURLMapping) (goth.Provider, error) {
|
2020-08-31 04:25:01 +05:30
|
|
|
callbackURL := setting.AppURL + "user/oauth2/" + url.PathEscape(providerName) + "/callback"
|
2017-02-22 12:44:37 +05:30
|
|
|
|
|
|
|
var provider goth.Provider
|
2017-05-01 18:56:53 +05:30
|
|
|
var err error
|
2017-02-22 12:44:37 +05:30
|
|
|
|
|
|
|
switch providerType {
|
2017-05-01 18:56:53 +05:30
|
|
|
case "bitbucket":
|
|
|
|
provider = bitbucket.New(clientID, clientSecret, callbackURL, "account")
|
|
|
|
case "dropbox":
|
|
|
|
provider = dropbox.New(clientID, clientSecret, callbackURL)
|
|
|
|
case "facebook":
|
|
|
|
provider = facebook.New(clientID, clientSecret, callbackURL, "email")
|
2017-02-22 12:44:37 +05:30
|
|
|
case "github":
|
2017-05-01 18:56:53 +05:30
|
|
|
authURL := github.AuthURL
|
|
|
|
tokenURL := github.TokenURL
|
|
|
|
profileURL := github.ProfileURL
|
|
|
|
emailURL := github.EmailURL
|
|
|
|
if customURLMapping != nil {
|
|
|
|
if len(customURLMapping.AuthURL) > 0 {
|
|
|
|
authURL = customURLMapping.AuthURL
|
|
|
|
}
|
|
|
|
if len(customURLMapping.TokenURL) > 0 {
|
|
|
|
tokenURL = customURLMapping.TokenURL
|
|
|
|
}
|
|
|
|
if len(customURLMapping.ProfileURL) > 0 {
|
|
|
|
profileURL = customURLMapping.ProfileURL
|
|
|
|
}
|
|
|
|
if len(customURLMapping.EmailURL) > 0 {
|
|
|
|
emailURL = customURLMapping.EmailURL
|
|
|
|
}
|
|
|
|
}
|
2021-04-14 17:32:12 +05:30
|
|
|
scopes := []string{}
|
|
|
|
if setting.OAuth2Client.EnableAutoRegistration {
|
|
|
|
scopes = append(scopes, "user:email")
|
|
|
|
}
|
|
|
|
provider = github.NewCustomisedURL(clientID, clientSecret, callbackURL, authURL, tokenURL, profileURL, emailURL, scopes...)
|
2017-05-01 18:56:53 +05:30
|
|
|
case "gitlab":
|
|
|
|
authURL := gitlab.AuthURL
|
|
|
|
tokenURL := gitlab.TokenURL
|
|
|
|
profileURL := gitlab.ProfileURL
|
|
|
|
if customURLMapping != nil {
|
|
|
|
if len(customURLMapping.AuthURL) > 0 {
|
|
|
|
authURL = customURLMapping.AuthURL
|
|
|
|
}
|
|
|
|
if len(customURLMapping.TokenURL) > 0 {
|
|
|
|
tokenURL = customURLMapping.TokenURL
|
|
|
|
}
|
|
|
|
if len(customURLMapping.ProfileURL) > 0 {
|
|
|
|
profileURL = customURLMapping.ProfileURL
|
|
|
|
}
|
|
|
|
}
|
2018-06-30 22:43:17 +05:30
|
|
|
provider = gitlab.NewCustomisedURL(clientID, clientSecret, callbackURL, authURL, tokenURL, profileURL, "read_user")
|
2019-09-14 15:32:39 +05:30
|
|
|
case "gplus": // named gplus due to legacy gplus -> google migration (Google killed Google+). This ensures old connections still work
|
2021-04-14 17:32:12 +05:30
|
|
|
scopes := []string{"email"}
|
|
|
|
if setting.OAuth2Client.UpdateAvatar || setting.OAuth2Client.EnableAutoRegistration {
|
|
|
|
scopes = append(scopes, "profile")
|
|
|
|
}
|
|
|
|
provider = google.New(clientID, clientSecret, callbackURL, scopes...)
|
2017-05-01 18:56:53 +05:30
|
|
|
case "openidConnect":
|
2021-04-14 17:32:12 +05:30
|
|
|
if provider, err = openidConnect.New(clientID, clientSecret, callbackURL, openIDConnectAutoDiscoveryURL, setting.OAuth2Client.OpenIDConnectScopes...); err != nil {
|
2017-05-01 18:56:53 +05:30
|
|
|
log.Warn("Failed to create OpenID Connect Provider with name '%s' with url '%s': %v", providerName, openIDConnectAutoDiscoveryURL, err)
|
|
|
|
}
|
|
|
|
case "twitter":
|
|
|
|
provider = twitter.NewAuthenticate(clientID, clientSecret, callbackURL)
|
2019-01-14 00:36:22 +05:30
|
|
|
case "discord":
|
|
|
|
provider = discord.New(clientID, clientSecret, callbackURL, discord.ScopeIdentify, discord.ScopeEmail)
|
2019-09-13 07:45:36 +05:30
|
|
|
case "gitea":
|
|
|
|
authURL := gitea.AuthURL
|
|
|
|
tokenURL := gitea.TokenURL
|
|
|
|
profileURL := gitea.ProfileURL
|
|
|
|
if customURLMapping != nil {
|
|
|
|
if len(customURLMapping.AuthURL) > 0 {
|
|
|
|
authURL = customURLMapping.AuthURL
|
|
|
|
}
|
|
|
|
if len(customURLMapping.TokenURL) > 0 {
|
|
|
|
tokenURL = customURLMapping.TokenURL
|
|
|
|
}
|
|
|
|
if len(customURLMapping.ProfileURL) > 0 {
|
|
|
|
profileURL = customURLMapping.ProfileURL
|
|
|
|
}
|
|
|
|
}
|
|
|
|
provider = gitea.NewCustomisedURL(clientID, clientSecret, callbackURL, authURL, tokenURL, profileURL)
|
2020-03-03 08:41:45 +05:30
|
|
|
case "nextcloud":
|
|
|
|
authURL := nextcloud.AuthURL
|
|
|
|
tokenURL := nextcloud.TokenURL
|
|
|
|
profileURL := nextcloud.ProfileURL
|
|
|
|
if customURLMapping != nil {
|
|
|
|
if len(customURLMapping.AuthURL) > 0 {
|
|
|
|
authURL = customURLMapping.AuthURL
|
|
|
|
}
|
|
|
|
if len(customURLMapping.TokenURL) > 0 {
|
|
|
|
tokenURL = customURLMapping.TokenURL
|
|
|
|
}
|
|
|
|
if len(customURLMapping.ProfileURL) > 0 {
|
|
|
|
profileURL = customURLMapping.ProfileURL
|
|
|
|
}
|
|
|
|
}
|
|
|
|
provider = nextcloud.NewCustomisedURL(clientID, clientSecret, callbackURL, authURL, tokenURL, profileURL)
|
2020-03-05 03:38:52 +05:30
|
|
|
case "yandex":
|
|
|
|
// See https://tech.yandex.com/passport/doc/dg/reference/response-docpage/
|
|
|
|
provider = yandex.New(clientID, clientSecret, callbackURL, "login:email", "login:info", "login:avatar")
|
2020-10-25 23:51:49 +05:30
|
|
|
case "mastodon":
|
|
|
|
instanceURL := mastodon.InstanceURL
|
|
|
|
if customURLMapping != nil && len(customURLMapping.AuthURL) > 0 {
|
|
|
|
instanceURL = customURLMapping.AuthURL
|
|
|
|
}
|
|
|
|
provider = mastodon.NewCustomisedURL(clientID, clientSecret, callbackURL, instanceURL)
|
2017-02-22 12:44:37 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
// always set the name if provider is created so we can support multiple setups of 1 provider
|
2017-05-01 18:56:53 +05:30
|
|
|
if err == nil && provider != nil {
|
2017-02-22 12:44:37 +05:30
|
|
|
provider.SetName(providerName)
|
|
|
|
}
|
|
|
|
|
2017-05-01 18:56:53 +05:30
|
|
|
return provider, err
|
|
|
|
}
|