2019-10-14 08:10:42 +02:00
|
|
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
2022-11-27 19:20:29 +01:00
|
|
|
// SPDX-License-Identifier: MIT
|
2019-10-14 08:10:42 +02:00
|
|
|
|
|
|
|
package externalaccount
|
|
|
|
|
|
|
|
import (
|
2023-09-25 15:17:37 +02:00
|
|
|
"context"
|
2024-06-20 15:24:53 +02:00
|
|
|
"strconv"
|
2019-10-14 08:10:42 +02:00
|
|
|
"strings"
|
|
|
|
|
2022-01-02 14:12:35 +01:00
|
|
|
"code.gitea.io/gitea/models/auth"
|
2023-09-08 23:09:23 +02:00
|
|
|
issues_model "code.gitea.io/gitea/models/issues"
|
|
|
|
repo_model "code.gitea.io/gitea/models/repo"
|
2021-11-24 10:49:20 +01:00
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
2019-10-14 08:10:42 +02:00
|
|
|
"code.gitea.io/gitea/modules/structs"
|
|
|
|
|
|
|
|
"github.com/markbates/goth"
|
|
|
|
)
|
|
|
|
|
2024-02-24 05:18:49 +01:00
|
|
|
func toExternalLoginUser(ctx context.Context, user *user_model.User, gothUser goth.User) (*user_model.ExternalLoginUser, error) {
|
|
|
|
authSource, err := auth.GetActiveOAuth2SourceByName(ctx, gothUser.Provider)
|
2019-10-14 08:10:42 +02:00
|
|
|
if err != nil {
|
2021-12-14 09:37:11 +01:00
|
|
|
return nil, err
|
2019-10-14 08:10:42 +02:00
|
|
|
}
|
2021-12-14 09:37:11 +01:00
|
|
|
return &user_model.ExternalLoginUser{
|
2019-10-14 08:10:42 +02:00
|
|
|
ExternalID: gothUser.UserID,
|
|
|
|
UserID: user.ID,
|
2022-01-02 14:12:35 +01:00
|
|
|
LoginSourceID: authSource.ID,
|
2019-10-14 08:10:42 +02:00
|
|
|
RawData: gothUser.RawData,
|
|
|
|
Provider: gothUser.Provider,
|
|
|
|
Email: gothUser.Email,
|
|
|
|
Name: gothUser.Name,
|
|
|
|
FirstName: gothUser.FirstName,
|
|
|
|
LastName: gothUser.LastName,
|
|
|
|
NickName: gothUser.NickName,
|
|
|
|
Description: gothUser.Description,
|
|
|
|
AvatarURL: gothUser.AvatarURL,
|
|
|
|
Location: gothUser.Location,
|
|
|
|
AccessToken: gothUser.AccessToken,
|
|
|
|
AccessTokenSecret: gothUser.AccessTokenSecret,
|
|
|
|
RefreshToken: gothUser.RefreshToken,
|
|
|
|
ExpiresAt: gothUser.ExpiresAt,
|
2021-12-14 09:37:11 +01:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// LinkAccountToUser link the gothUser to the user
|
2024-02-24 05:18:49 +01:00
|
|
|
func LinkAccountToUser(ctx context.Context, user *user_model.User, gothUser goth.User) error {
|
|
|
|
externalLoginUser, err := toExternalLoginUser(ctx, user, gothUser)
|
2021-12-14 09:37:11 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
2019-10-14 08:10:42 +02:00
|
|
|
}
|
|
|
|
|
2023-10-14 10:37:24 +02:00
|
|
|
if err := user_model.LinkExternalToUser(ctx, user, externalLoginUser); err != nil {
|
2019-10-14 08:10:42 +02:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-10-17 04:06:28 +02:00
|
|
|
externalID := externalLoginUser.ExternalID
|
2019-10-14 08:10:42 +02:00
|
|
|
|
|
|
|
var tp structs.GitServiceType
|
|
|
|
for _, s := range structs.SupportedFullGitService {
|
|
|
|
if strings.EqualFold(s.Name(), gothUser.Provider) {
|
|
|
|
tp = s
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if tp.Name() != "" {
|
2023-09-25 15:17:37 +02:00
|
|
|
return UpdateMigrationsByType(ctx, tp, externalID, user.ID)
|
2019-10-14 08:10:42 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2021-12-14 09:37:11 +01:00
|
|
|
|
allow synchronizing user status from OAuth2 login providers (#31572)
This leverages the existing `sync_external_users` cron job to
synchronize the `IsActive` flag on users who use an OAuth2 provider set
to synchronize. This synchronization is done by checking for expired
access tokens, and using the stored refresh token to request a new
access token. If the response back from the OAuth2 provider is the
`invalid_grant` error code, the user is marked as inactive. However, the
user is able to reactivate their account by logging in the web browser
through their OAuth2 flow.
Also changed to support this is that a linked `ExternalLoginUser` is
always created upon a login or signup via OAuth2.
### Notes on updating permissions
Ideally, we would also refresh permissions from the configured OAuth
provider (e.g., admin, restricted and group mappings) to match the
implementation of LDAP. However, the OAuth library used for this `goth`,
doesn't seem to support issuing a session via refresh tokens. The
interface provides a [`RefreshToken`
method](https://github.com/markbates/goth/blob/master/provider.go#L20),
but the returned `oauth.Token` doesn't implement the `goth.Session` we
would need to call `FetchUser`. Due to specific implementations, we
would need to build a compatibility function for every provider, since
they cast to concrete types (e.g.
[Azure](https://github.com/markbates/goth/blob/master/providers/azureadv2/azureadv2.go#L132))
---------
Co-authored-by: Kyle D <kdumontnu@gmail.com>
2024-07-16 20:33:16 +02:00
|
|
|
// EnsureLinkExternalToUser link the gothUser to the user
|
|
|
|
func EnsureLinkExternalToUser(ctx context.Context, user *user_model.User, gothUser goth.User) error {
|
2024-02-24 05:18:49 +01:00
|
|
|
externalLoginUser, err := toExternalLoginUser(ctx, user, gothUser)
|
2021-12-14 09:37:11 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
allow synchronizing user status from OAuth2 login providers (#31572)
This leverages the existing `sync_external_users` cron job to
synchronize the `IsActive` flag on users who use an OAuth2 provider set
to synchronize. This synchronization is done by checking for expired
access tokens, and using the stored refresh token to request a new
access token. If the response back from the OAuth2 provider is the
`invalid_grant` error code, the user is marked as inactive. However, the
user is able to reactivate their account by logging in the web browser
through their OAuth2 flow.
Also changed to support this is that a linked `ExternalLoginUser` is
always created upon a login or signup via OAuth2.
### Notes on updating permissions
Ideally, we would also refresh permissions from the configured OAuth
provider (e.g., admin, restricted and group mappings) to match the
implementation of LDAP. However, the OAuth library used for this `goth`,
doesn't seem to support issuing a session via refresh tokens. The
interface provides a [`RefreshToken`
method](https://github.com/markbates/goth/blob/master/provider.go#L20),
but the returned `oauth.Token` doesn't implement the `goth.Session` we
would need to call `FetchUser`. Due to specific implementations, we
would need to build a compatibility function for every provider, since
they cast to concrete types (e.g.
[Azure](https://github.com/markbates/goth/blob/master/providers/azureadv2/azureadv2.go#L132))
---------
Co-authored-by: Kyle D <kdumontnu@gmail.com>
2024-07-16 20:33:16 +02:00
|
|
|
return user_model.EnsureLinkExternalToUser(ctx, externalLoginUser)
|
2021-12-14 09:37:11 +01:00
|
|
|
}
|
2023-09-08 23:09:23 +02:00
|
|
|
|
|
|
|
// UpdateMigrationsByType updates all migrated repositories' posterid from gitServiceType to replace originalAuthorID to posterID
|
2023-09-25 15:17:37 +02:00
|
|
|
func UpdateMigrationsByType(ctx context.Context, tp structs.GitServiceType, externalUserID string, userID int64) error {
|
2024-06-20 15:24:53 +02:00
|
|
|
// Skip update if externalUserID is not a valid numeric ID or exceeds int64
|
|
|
|
if _, err := strconv.ParseInt(externalUserID, 10, 64); err != nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-09-29 14:12:54 +02:00
|
|
|
if err := issues_model.UpdateIssuesMigrationsByType(ctx, tp, externalUserID, userID); err != nil {
|
2023-09-08 23:09:23 +02:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-09-29 14:12:54 +02:00
|
|
|
if err := issues_model.UpdateCommentsMigrationsByType(ctx, tp, externalUserID, userID); err != nil {
|
2023-09-08 23:09:23 +02:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-09-25 15:17:37 +02:00
|
|
|
if err := repo_model.UpdateReleasesMigrationsByType(ctx, tp, externalUserID, userID); err != nil {
|
2023-09-08 23:09:23 +02:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-09-29 14:12:54 +02:00
|
|
|
if err := issues_model.UpdateReactionsMigrationsByType(ctx, tp, externalUserID, userID); err != nil {
|
2023-09-08 23:09:23 +02:00
|
|
|
return err
|
|
|
|
}
|
2023-09-29 14:12:54 +02:00
|
|
|
return issues_model.UpdateReviewsMigrationsByType(ctx, tp, externalUserID, userID)
|
2023-09-08 23:09:23 +02:00
|
|
|
}
|