2021-07-24 12:16:34 +02:00
|
|
|
// Copyright 2021 The Gitea Authors. All rights reserved.
|
2022-11-27 19:20:29 +01:00
|
|
|
// SPDX-License-Identifier: MIT
|
2021-07-24 12:16:34 +02:00
|
|
|
|
|
|
|
package oauth2
|
|
|
|
|
|
|
|
import (
|
|
|
|
"net/http"
|
2024-04-18 09:55:08 +02:00
|
|
|
"net/url"
|
2021-07-24 12:16:34 +02:00
|
|
|
|
|
|
|
"github.com/markbates/goth"
|
|
|
|
"github.com/markbates/goth/gothic"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Callout redirects request/response pair to authenticate against the provider
|
2024-04-18 09:55:08 +02:00
|
|
|
func (source *Source) Callout(request *http.Request, response http.ResponseWriter, codeChallengeS256 string) error {
|
2021-07-24 12:16:34 +02:00
|
|
|
// not sure if goth is thread safe (?) when using multiple providers
|
2022-01-02 14:12:35 +01:00
|
|
|
request.Header.Set(ProviderHeaderKey, source.authSource.Name)
|
2021-07-24 12:16:34 +02:00
|
|
|
|
2024-04-18 09:55:08 +02:00
|
|
|
var querySuffix string
|
|
|
|
if codeChallengeS256 != "" {
|
|
|
|
querySuffix = "&" + url.Values{
|
|
|
|
"code_challenge_method": []string{"S256"},
|
|
|
|
"code_challenge": []string{codeChallengeS256},
|
|
|
|
}.Encode()
|
|
|
|
}
|
|
|
|
|
2021-07-24 12:16:34 +02:00
|
|
|
// don't use the default gothic begin handler to prevent issues when some error occurs
|
|
|
|
// normally the gothic library will write some custom stuff to the response instead of our own nice error page
|
2022-01-20 18:46:10 +01:00
|
|
|
// gothic.BeginAuthHandler(response, request)
|
2021-07-24 12:16:34 +02:00
|
|
|
|
2021-07-29 19:53:18 +02:00
|
|
|
gothRWMutex.RLock()
|
|
|
|
defer gothRWMutex.RUnlock()
|
|
|
|
|
2021-07-24 12:16:34 +02:00
|
|
|
url, err := gothic.GetAuthURL(response, request)
|
|
|
|
if err == nil {
|
2024-04-18 09:55:08 +02:00
|
|
|
// hacky way to set the code_challenge, but no better way until
|
|
|
|
// https://github.com/markbates/goth/issues/516 is resolved
|
|
|
|
http.Redirect(response, request, url+querySuffix, http.StatusTemporaryRedirect)
|
2021-07-24 12:16:34 +02:00
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Callback handles OAuth callback, resolve to a goth user and send back to original url
|
|
|
|
// this will trigger a new authentication request, but because we save it in the session we can use that
|
2024-04-18 09:55:08 +02:00
|
|
|
func (source *Source) Callback(request *http.Request, response http.ResponseWriter, codeVerifier string) (goth.User, error) {
|
2021-07-24 12:16:34 +02:00
|
|
|
// not sure if goth is thread safe (?) when using multiple providers
|
2022-01-02 14:12:35 +01:00
|
|
|
request.Header.Set(ProviderHeaderKey, source.authSource.Name)
|
2021-07-24 12:16:34 +02:00
|
|
|
|
2024-04-18 09:55:08 +02:00
|
|
|
if codeVerifier != "" {
|
|
|
|
// hacky way to set the code_verifier...
|
|
|
|
// Will be picked up inside CompleteUserAuth: params := req.URL.Query()
|
|
|
|
// https://github.com/markbates/goth/pull/474/files
|
|
|
|
request = request.Clone(request.Context())
|
|
|
|
q := request.URL.Query()
|
|
|
|
q.Add("code_verifier", codeVerifier)
|
|
|
|
request.URL.RawQuery = q.Encode()
|
|
|
|
}
|
|
|
|
|
2021-07-29 19:53:18 +02:00
|
|
|
gothRWMutex.RLock()
|
|
|
|
defer gothRWMutex.RUnlock()
|
|
|
|
|
2021-07-24 12:16:34 +02:00
|
|
|
user, err := gothic.CompleteUserAuth(response, request)
|
|
|
|
if err != nil {
|
|
|
|
return user, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return user, nil
|
|
|
|
}
|