2021-04-14 17:32:12 +05:30
|
|
|
// Copyright 2021 The Gitea Authors. All rights reserved.
|
2022-11-27 23:50:29 +05:30
|
|
|
// SPDX-License-Identifier: MIT
|
2021-04-14 17:32:12 +05:30
|
|
|
|
|
|
|
package setting
|
|
|
|
|
|
|
|
import (
|
2023-04-25 20:36:39 +05:30
|
|
|
"encoding/base64"
|
2023-02-19 21:42:01 +05:30
|
|
|
"math"
|
|
|
|
"path/filepath"
|
|
|
|
|
2023-04-25 20:36:39 +05:30
|
|
|
"code.gitea.io/gitea/modules/generate"
|
2021-04-14 17:32:12 +05:30
|
|
|
"code.gitea.io/gitea/modules/log"
|
2023-08-14 16:00:16 +05:30
|
|
|
"code.gitea.io/gitea/modules/util"
|
2021-04-14 17:32:12 +05:30
|
|
|
)
|
|
|
|
|
|
|
|
// OAuth2UsernameType is enum describing the way gitea 'name' should be generated from oauth2 data
|
|
|
|
type OAuth2UsernameType string
|
|
|
|
|
|
|
|
const (
|
|
|
|
// OAuth2UsernameUserid oauth2 userid field will be used as gitea name
|
|
|
|
OAuth2UsernameUserid OAuth2UsernameType = "userid"
|
|
|
|
// OAuth2UsernameNickname oauth2 nickname field will be used as gitea name
|
|
|
|
OAuth2UsernameNickname OAuth2UsernameType = "nickname"
|
2024-01-04 06:18:20 +05:30
|
|
|
// OAuth2UsernameEmail username of oauth2 email field will be used as gitea name
|
2021-04-14 17:32:12 +05:30
|
|
|
OAuth2UsernameEmail OAuth2UsernameType = "email"
|
|
|
|
)
|
|
|
|
|
|
|
|
func (username OAuth2UsernameType) isValid() bool {
|
|
|
|
switch username {
|
|
|
|
case OAuth2UsernameUserid, OAuth2UsernameNickname, OAuth2UsernameEmail:
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// OAuth2AccountLinkingType is enum describing behaviour of linking with existing account
|
|
|
|
type OAuth2AccountLinkingType string
|
|
|
|
|
|
|
|
const (
|
|
|
|
// OAuth2AccountLinkingDisabled error will be displayed if account exist
|
|
|
|
OAuth2AccountLinkingDisabled OAuth2AccountLinkingType = "disabled"
|
|
|
|
// OAuth2AccountLinkingLogin account linking login will be displayed if account exist
|
|
|
|
OAuth2AccountLinkingLogin OAuth2AccountLinkingType = "login"
|
|
|
|
// OAuth2AccountLinkingAuto account will be automatically linked if account exist
|
|
|
|
OAuth2AccountLinkingAuto OAuth2AccountLinkingType = "auto"
|
|
|
|
)
|
|
|
|
|
|
|
|
func (accountLinking OAuth2AccountLinkingType) isValid() bool {
|
|
|
|
switch accountLinking {
|
|
|
|
case OAuth2AccountLinkingDisabled, OAuth2AccountLinkingLogin, OAuth2AccountLinkingAuto:
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// OAuth2Client settings
|
|
|
|
var OAuth2Client struct {
|
|
|
|
RegisterEmailConfirm bool
|
|
|
|
OpenIDConnectScopes []string
|
|
|
|
EnableAutoRegistration bool
|
|
|
|
Username OAuth2UsernameType
|
|
|
|
UpdateAvatar bool
|
|
|
|
AccountLinking OAuth2AccountLinkingType
|
|
|
|
}
|
|
|
|
|
2023-02-19 21:42:01 +05:30
|
|
|
func loadOAuth2ClientFrom(rootCfg ConfigProvider) {
|
|
|
|
sec := rootCfg.Section("oauth2_client")
|
2021-04-14 17:32:12 +05:30
|
|
|
OAuth2Client.RegisterEmailConfirm = sec.Key("REGISTER_EMAIL_CONFIRM").MustBool(Service.RegisterEmailConfirm)
|
|
|
|
OAuth2Client.OpenIDConnectScopes = parseScopes(sec, "OPENID_CONNECT_SCOPES")
|
|
|
|
OAuth2Client.EnableAutoRegistration = sec.Key("ENABLE_AUTO_REGISTRATION").MustBool()
|
|
|
|
OAuth2Client.Username = OAuth2UsernameType(sec.Key("USERNAME").MustString(string(OAuth2UsernameNickname)))
|
|
|
|
if !OAuth2Client.Username.isValid() {
|
|
|
|
log.Warn("Username setting is not valid: '%s', will fallback to '%s'", OAuth2Client.Username, OAuth2UsernameNickname)
|
|
|
|
OAuth2Client.Username = OAuth2UsernameNickname
|
|
|
|
}
|
|
|
|
OAuth2Client.UpdateAvatar = sec.Key("UPDATE_AVATAR").MustBool()
|
2021-05-07 19:45:16 +05:30
|
|
|
OAuth2Client.AccountLinking = OAuth2AccountLinkingType(sec.Key("ACCOUNT_LINKING").MustString(string(OAuth2AccountLinkingLogin)))
|
2021-04-14 17:32:12 +05:30
|
|
|
if !OAuth2Client.AccountLinking.isValid() {
|
2021-05-07 19:45:16 +05:30
|
|
|
log.Warn("Account linking setting is not valid: '%s', will fallback to '%s'", OAuth2Client.AccountLinking, OAuth2AccountLinkingLogin)
|
|
|
|
OAuth2Client.AccountLinking = OAuth2AccountLinkingLogin
|
2021-04-14 17:32:12 +05:30
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-04-25 20:36:39 +05:30
|
|
|
func parseScopes(sec ConfigSection, name string) []string {
|
2021-04-14 17:32:12 +05:30
|
|
|
parts := sec.Key(name).Strings(" ")
|
|
|
|
scopes := make([]string, 0, len(parts))
|
|
|
|
for _, scope := range parts {
|
|
|
|
if scope != "" {
|
|
|
|
scopes = append(scopes, scope)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return scopes
|
|
|
|
}
|
2023-02-19 21:42:01 +05:30
|
|
|
|
|
|
|
var OAuth2 = struct {
|
2024-01-28 18:06:44 +05:30
|
|
|
Enabled bool
|
2023-02-19 21:42:01 +05:30
|
|
|
AccessTokenExpirationTime int64
|
|
|
|
RefreshTokenExpirationTime int64
|
|
|
|
InvalidateRefreshTokens bool
|
|
|
|
JWTSigningAlgorithm string `ini:"JWT_SIGNING_ALGORITHM"`
|
|
|
|
JWTSecretBase64 string `ini:"JWT_SECRET"`
|
|
|
|
JWTSigningPrivateKeyFile string `ini:"JWT_SIGNING_PRIVATE_KEY_FILE"`
|
|
|
|
MaxTokenLength int
|
2023-08-09 17:54:07 +05:30
|
|
|
DefaultApplications []string
|
2023-02-19 21:42:01 +05:30
|
|
|
}{
|
2024-01-28 18:06:44 +05:30
|
|
|
Enabled: true,
|
2023-02-19 21:42:01 +05:30
|
|
|
AccessTokenExpirationTime: 3600,
|
|
|
|
RefreshTokenExpirationTime: 730,
|
|
|
|
InvalidateRefreshTokens: false,
|
|
|
|
JWTSigningAlgorithm: "RS256",
|
|
|
|
JWTSigningPrivateKeyFile: "jwt/private.pem",
|
|
|
|
MaxTokenLength: math.MaxInt16,
|
2023-10-08 09:21:08 +05:30
|
|
|
DefaultApplications: []string{"git-credential-oauth", "git-credential-manager", "tea"},
|
2023-02-19 21:42:01 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
func loadOAuth2From(rootCfg ConfigProvider) {
|
2024-01-28 18:06:44 +05:30
|
|
|
sec := rootCfg.Section("oauth2")
|
|
|
|
if err := sec.MapTo(&OAuth2); err != nil {
|
|
|
|
log.Fatal("Failed to map OAuth2 settings: %v", err)
|
2023-02-19 21:42:01 +05:30
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-01-28 18:06:44 +05:30
|
|
|
// Handle the rename of ENABLE to ENABLED
|
|
|
|
deprecatedSetting(rootCfg, "oauth2", "ENABLE", "oauth2", "ENABLED", "v1.23.0")
|
|
|
|
if sec.HasKey("ENABLE") && !sec.HasKey("ENABLED") {
|
|
|
|
OAuth2.Enabled = sec.Key("ENABLE").MustBool(OAuth2.Enabled)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !OAuth2.Enabled {
|
2023-06-29 03:00:06 +05:30
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-01-28 18:06:44 +05:30
|
|
|
OAuth2.JWTSecretBase64 = loadSecret(sec, "JWT_SECRET_URI", "JWT_SECRET")
|
2023-06-23 05:46:12 +05:30
|
|
|
|
2023-02-19 21:42:01 +05:30
|
|
|
if !filepath.IsAbs(OAuth2.JWTSigningPrivateKeyFile) {
|
|
|
|
OAuth2.JWTSigningPrivateKeyFile = filepath.Join(AppDataPath, OAuth2.JWTSigningPrivateKeyFile)
|
|
|
|
}
|
2023-04-25 20:36:39 +05:30
|
|
|
|
2023-06-18 21:40:44 +05:30
|
|
|
if InstallLock {
|
2023-08-14 16:00:16 +05:30
|
|
|
if _, err := util.Base64FixedDecode(base64.RawURLEncoding, []byte(OAuth2.JWTSecretBase64), 32); err != nil {
|
|
|
|
key, err := generate.NewJwtSecret()
|
2023-06-18 21:40:44 +05:30
|
|
|
if err != nil {
|
|
|
|
log.Fatal("error generating JWT secret: %v", err)
|
|
|
|
}
|
|
|
|
|
2023-08-14 16:00:16 +05:30
|
|
|
OAuth2.JWTSecretBase64 = base64.RawURLEncoding.EncodeToString(key)
|
2023-06-21 08:01:40 +05:30
|
|
|
saveCfg, err := rootCfg.PrepareSaving()
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal("save oauth2.JWT_SECRET failed: %v", err)
|
|
|
|
}
|
2023-08-14 16:00:16 +05:30
|
|
|
rootCfg.Section("oauth2").Key("JWT_SECRET").SetValue(OAuth2.JWTSecretBase64)
|
|
|
|
saveCfg.Section("oauth2").Key("JWT_SECRET").SetValue(OAuth2.JWTSecretBase64)
|
2023-06-21 08:01:40 +05:30
|
|
|
if err := saveCfg.Save(); err != nil {
|
2023-06-18 21:40:44 +05:30
|
|
|
log.Fatal("save oauth2.JWT_SECRET failed: %v", err)
|
|
|
|
}
|
2023-04-25 20:36:39 +05:30
|
|
|
}
|
|
|
|
}
|
2023-02-19 21:42:01 +05:30
|
|
|
}
|