Display a form to create an Opengist account coming from a OAuth provider (#623)
This commit is contained in:
@@ -4,16 +4,15 @@ import (
|
||||
"crypto/md5"
|
||||
"errors"
|
||||
"fmt"
|
||||
"slices"
|
||||
"strings"
|
||||
|
||||
"github.com/rs/zerolog/log"
|
||||
"github.com/thomiceli/opengist/internal/auth/oauth"
|
||||
"github.com/thomiceli/opengist/internal/config"
|
||||
"github.com/thomiceli/opengist/internal/db"
|
||||
"github.com/thomiceli/opengist/internal/i18n"
|
||||
"github.com/thomiceli/opengist/internal/validator"
|
||||
"github.com/thomiceli/opengist/internal/web/context"
|
||||
"golang.org/x/text/cases"
|
||||
"golang.org/x/text/language"
|
||||
"gorm.io/gorm"
|
||||
)
|
||||
|
||||
@@ -48,7 +47,8 @@ func Oauth(ctx *context.Context) error {
|
||||
|
||||
provider, err := oauth.DefineProvider(providerStr, opengistUrl)
|
||||
if err != nil {
|
||||
return ctx.ErrorRes(400, ctx.Tr("error.oauth-unsupported"), nil)
|
||||
ctx.AddFlash(ctx.Tr("error.oauth-unsupported"), "error")
|
||||
return ctx.Redirect(302, "/login")
|
||||
}
|
||||
|
||||
if err = provider.RegisterProvider(); err != nil {
|
||||
@@ -62,28 +62,37 @@ func Oauth(ctx *context.Context) error {
|
||||
func OauthCallback(ctx *context.Context) error {
|
||||
provider, err := oauth.CompleteUserAuth(ctx)
|
||||
if err != nil {
|
||||
return ctx.ErrorRes(400, ctx.Tr("error.complete-oauth-login", err.Error()), err)
|
||||
ctx.AddFlash(ctx.Tr("auth.oauth.no-provider"), "error")
|
||||
return ctx.Redirect(302, "/login")
|
||||
}
|
||||
|
||||
currUser := ctx.User
|
||||
user := provider.GetProviderUser()
|
||||
|
||||
// if user is logged in, link account to user and update its avatar URL
|
||||
if currUser != nil {
|
||||
// check if this OAuth account is already linked to another user
|
||||
if existingUser, err := db.GetUserByProvider(user.UserID, provider.GetProvider()); err == nil && existingUser != nil {
|
||||
ctx.AddFlash(ctx.Tr("flash.auth.oauth-already-linked", config.C.OIDCProviderName), "error")
|
||||
return ctx.RedirectTo("/settings")
|
||||
}
|
||||
|
||||
provider.UpdateUserDB(currUser)
|
||||
|
||||
if err = currUser.Update(); err != nil {
|
||||
return ctx.ErrorRes(500, "Cannot update user "+cases.Title(language.English).String(provider.GetProvider())+" id", err)
|
||||
return ctx.ErrorRes(500, "Cannot update user "+config.C.OIDCProviderName+" id", err)
|
||||
}
|
||||
|
||||
ctx.AddFlash(ctx.Tr("flash.auth.account-linked-oauth", cases.Title(language.English).String(provider.GetProvider())), "success")
|
||||
ctx.AddFlash(ctx.Tr("flash.auth.account-linked-oauth", config.C.OIDCProviderName), "success")
|
||||
return ctx.RedirectTo("/settings")
|
||||
}
|
||||
|
||||
user := provider.GetProviderUser()
|
||||
userDB, err := db.GetUserByProvider(user.UserID, provider.GetProvider())
|
||||
// if user is not in database, create it
|
||||
// if user is not in database, redirect to OAuth registration page
|
||||
if err != nil {
|
||||
if ctx.GetData("DisableSignup") == true {
|
||||
return ctx.ErrorRes(403, ctx.Tr("error.signup-disabled"), nil)
|
||||
ctx.AddFlash(ctx.Tr("error.signup-disabled"), "error")
|
||||
return ctx.Redirect(302, "/login")
|
||||
}
|
||||
|
||||
if !errors.Is(err, gorm.ErrRecordNotFound) {
|
||||
@@ -94,74 +103,25 @@ func OauthCallback(ctx *context.Context) error {
|
||||
user.NickName = strings.Split(user.Email, "@")[0]
|
||||
}
|
||||
|
||||
userDB = &db.User{
|
||||
Username: user.NickName,
|
||||
Email: user.Email,
|
||||
MD5Hash: fmt.Sprintf("%x", md5.Sum([]byte(strings.ToLower(strings.TrimSpace(user.Email))))),
|
||||
}
|
||||
sess := ctx.GetSession()
|
||||
sess.Values["oauthProvider"] = provider.GetProvider()
|
||||
sess.Values["oauthUserID"] = user.UserID
|
||||
sess.Values["oauthNickname"] = user.NickName
|
||||
sess.Values["oauthEmail"] = user.Email
|
||||
sess.Values["oauthAvatarURL"] = user.AvatarURL
|
||||
sess.Values["oauthIsAdmin"] = provider.IsAdmin()
|
||||
|
||||
// set provider id and avatar URL
|
||||
provider.UpdateUserDB(userDB)
|
||||
sess.Options.MaxAge = 10 * 60 // 10 minutes
|
||||
ctx.SaveSession(sess)
|
||||
|
||||
if err = userDB.Create(); err != nil {
|
||||
if db.IsUniqueConstraintViolation(err) {
|
||||
ctx.AddFlash(ctx.Tr("flash.auth.username-exists"), "error")
|
||||
return ctx.RedirectTo("/login")
|
||||
}
|
||||
|
||||
return ctx.ErrorRes(500, "Cannot create user", err)
|
||||
}
|
||||
|
||||
// if oidc admin group is not configured set first user as admin
|
||||
if config.C.OIDCAdminGroup == "" && userDB.ID == 1 {
|
||||
if err = userDB.SetAdmin(); err != nil {
|
||||
return ctx.ErrorRes(500, "Cannot set user admin", err)
|
||||
}
|
||||
}
|
||||
|
||||
keys, err := provider.GetProviderUserSSHKeys()
|
||||
if err != nil {
|
||||
ctx.AddFlash(ctx.Tr("flash.auth.user-sshkeys-not-retrievable"), "error")
|
||||
log.Error().Err(err).Msg("Could not get user keys")
|
||||
} else {
|
||||
for _, key := range keys {
|
||||
sshKey := db.SSHKey{
|
||||
Title: "Added from " + user.Provider,
|
||||
Content: key,
|
||||
User: *userDB,
|
||||
}
|
||||
|
||||
if err = sshKey.Create(); err != nil {
|
||||
ctx.AddFlash(ctx.Tr("flash.auth.user-sshkeys-not-created"), "error")
|
||||
log.Error().Err(err).Msg("Could not create ssh key")
|
||||
}
|
||||
}
|
||||
}
|
||||
return ctx.RedirectTo("/oauth/register")
|
||||
}
|
||||
|
||||
// update is admin status from oidc group
|
||||
if config.C.OIDCAdminGroup != "" {
|
||||
groupClaimName := config.C.OIDCGroupClaimName
|
||||
if groupClaimName == "" {
|
||||
log.Error().Msg("No OIDC group claim name configured")
|
||||
} else if groups, ok := user.RawData[groupClaimName].([]interface{}); ok {
|
||||
var groupNames []string
|
||||
for _, group := range groups {
|
||||
if groupName, ok := group.(string); ok {
|
||||
groupNames = append(groupNames, groupName)
|
||||
}
|
||||
}
|
||||
isOIDCAdmin := slices.Contains(groupNames, config.C.OIDCAdminGroup)
|
||||
log.Debug().Bool("isOIDCAdmin", isOIDCAdmin).Str("user", user.Name).Msg("User is in admin group")
|
||||
|
||||
if userDB.IsAdmin != isOIDCAdmin {
|
||||
userDB.IsAdmin = isOIDCAdmin
|
||||
if err = userDB.Update(); err != nil {
|
||||
return ctx.ErrorRes(500, "Cannot set user admin", err)
|
||||
}
|
||||
}
|
||||
} else {
|
||||
log.Error().Msg("No groups found in user data")
|
||||
// promote user to admin from oidc group
|
||||
if !userDB.IsAdmin && provider.IsAdmin() {
|
||||
userDB.IsAdmin = true
|
||||
if err = userDB.Update(); err != nil {
|
||||
return ctx.ErrorRes(500, "Cannot set user admin", err)
|
||||
}
|
||||
}
|
||||
|
||||
@@ -173,6 +133,150 @@ func OauthCallback(ctx *context.Context) error {
|
||||
return ctx.RedirectTo("/")
|
||||
}
|
||||
|
||||
func OauthRegister(ctx *context.Context) error {
|
||||
if ctx.GetData("DisableSignup") == true {
|
||||
ctx.AddFlash(ctx.Tr("error.signup-disabled"), "error")
|
||||
return ctx.Redirect(302, "/login")
|
||||
}
|
||||
|
||||
sess := ctx.GetSession()
|
||||
|
||||
ctx.SetData("title", ctx.TrH("auth.oauth.complete-registration"))
|
||||
ctx.SetData("htmlTitle", ctx.TrH("auth.oauth.complete-registration"))
|
||||
ctx.SetData("oauthProvider", config.C.OIDCProviderName)
|
||||
ctx.SetData("oauthNickname", sess.Values["oauthNickname"])
|
||||
ctx.SetData("oauthEmail", sess.Values["oauthEmail"])
|
||||
ctx.SetData("oauthAvatarURL", sess.Values["oauthAvatarURL"])
|
||||
|
||||
return ctx.Html("oauth_register.html")
|
||||
}
|
||||
|
||||
func ProcessOauthRegister(ctx *context.Context) error {
|
||||
if ctx.GetData("DisableSignup") == true {
|
||||
ctx.AddFlash(ctx.Tr("error.signup-disabled"), "error")
|
||||
return ctx.Redirect(302, "/login")
|
||||
}
|
||||
|
||||
sess := ctx.GetSession()
|
||||
|
||||
providerStr := sess.Values["oauthProvider"].(string)
|
||||
oauthUserID := sess.Values["oauthUserID"].(string)
|
||||
|
||||
setOauthRegisterData := func(dto *db.OAuthRegisterDTO) {
|
||||
ctx.SetData("title", ctx.TrH("auth.oauth.complete-registration"))
|
||||
ctx.SetData("htmlTitle", ctx.TrH("auth.oauth.complete-registration"))
|
||||
ctx.SetData("oauthProvider", config.C.OIDCProviderName)
|
||||
if dto != nil {
|
||||
ctx.SetData("oauthNickname", dto.Username)
|
||||
ctx.SetData("oauthEmail", dto.Email)
|
||||
} else {
|
||||
ctx.SetData("oauthNickname", sess.Values["oauthNickname"])
|
||||
ctx.SetData("oauthEmail", sess.Values["oauthEmail"])
|
||||
}
|
||||
ctx.SetData("oauthAvatarURL", sess.Values["oauthAvatarURL"])
|
||||
}
|
||||
|
||||
// Bind and validate form data
|
||||
dto := new(db.OAuthRegisterDTO)
|
||||
if err := ctx.Bind(dto); err != nil {
|
||||
return ctx.ErrorRes(400, ctx.Tr("error.cannot-bind-data"), err)
|
||||
}
|
||||
|
||||
if err := ctx.Validate(dto); err != nil {
|
||||
ctx.AddFlash(validator.ValidationMessages(&err, ctx.GetData("locale").(*i18n.Locale)), "error")
|
||||
setOauthRegisterData(dto)
|
||||
return ctx.Html("oauth_register.html")
|
||||
}
|
||||
|
||||
if exists, err := db.UserExists(dto.Username); err != nil || exists {
|
||||
ctx.AddFlash(ctx.Tr("flash.auth.username-exists"), "error")
|
||||
setOauthRegisterData(dto)
|
||||
return ctx.Html("oauth_register.html")
|
||||
}
|
||||
|
||||
// Check if OAuth account is already linked to another user (race condition protection)
|
||||
if existingUser, err := db.GetUserByProvider(oauthUserID, providerStr); err == nil && existingUser != nil {
|
||||
ctx.AddFlash(ctx.Tr("flash.auth.oauth-already-linked", config.C.OIDCProviderName), "error")
|
||||
setOauthRegisterData(dto)
|
||||
return ctx.Html("oauth_register.html")
|
||||
}
|
||||
|
||||
userDB := &db.User{
|
||||
Username: dto.Username,
|
||||
Email: dto.Email,
|
||||
}
|
||||
if dto.Email != "" {
|
||||
userDB.MD5Hash = fmt.Sprintf("%x", md5.Sum([]byte(strings.ToLower(strings.TrimSpace(dto.Email)))))
|
||||
}
|
||||
|
||||
nickname := ""
|
||||
if n, ok := sess.Values["oauthNickname"].(string); ok {
|
||||
nickname = n
|
||||
}
|
||||
avatarURL := ""
|
||||
if av, ok := sess.Values["oauthAvatarURL"].(string); ok {
|
||||
avatarURL = av
|
||||
}
|
||||
|
||||
callbackProvider, err := oauth.NewCallbackProviderFromSession(providerStr, oauthUserID, nickname, dto.Email, avatarURL)
|
||||
if err != nil {
|
||||
return ctx.ErrorRes(500, "Cannot create provider", err)
|
||||
}
|
||||
callbackProvider.UpdateUserDB(userDB)
|
||||
|
||||
if err := userDB.Create(); err != nil {
|
||||
if db.IsUniqueConstraintViolation(err) {
|
||||
ctx.AddFlash(ctx.Tr("flash.auth.username-exists"), "error")
|
||||
setOauthRegisterData(dto)
|
||||
return ctx.Html("oauth_register.html")
|
||||
}
|
||||
return ctx.ErrorRes(500, "Cannot create user", err)
|
||||
}
|
||||
|
||||
if config.C.OIDCAdminGroup == "" && userDB.ID == 1 {
|
||||
if err := userDB.SetAdmin(); err != nil {
|
||||
return ctx.ErrorRes(500, "Cannot set user admin", err)
|
||||
}
|
||||
}
|
||||
|
||||
if isAdmin, ok := sess.Values["oauthIsAdmin"].(bool); ok && isAdmin {
|
||||
userDB.IsAdmin = true
|
||||
_ = userDB.Update()
|
||||
}
|
||||
|
||||
keys, err := callbackProvider.GetProviderUserSSHKeys()
|
||||
if err != nil {
|
||||
ctx.AddFlash(ctx.Tr("flash.auth.user-sshkeys-not-retrievable"), "error")
|
||||
log.Error().Err(err).Msg("Could not get user keys")
|
||||
} else {
|
||||
for _, key := range keys {
|
||||
sshKey := db.SSHKey{
|
||||
Title: "Added from " + providerStr,
|
||||
Content: key,
|
||||
User: *userDB,
|
||||
}
|
||||
if err = sshKey.Create(); err != nil {
|
||||
ctx.AddFlash(ctx.Tr("flash.auth.user-sshkeys-not-created"), "error")
|
||||
log.Error().Err(err).Msg("Could not create ssh key")
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
delete(sess.Values, "oauthProvider")
|
||||
delete(sess.Values, "oauthUserID")
|
||||
delete(sess.Values, "oauthNickname")
|
||||
delete(sess.Values, "oauthEmail")
|
||||
delete(sess.Values, "oauthAvatarURL")
|
||||
delete(sess.Values, "oauthIsAdmin")
|
||||
|
||||
sess.Values["user"] = userDB.ID
|
||||
sess.Options.MaxAge = 60 * 60 * 24 * 365 // 1 year
|
||||
ctx.SaveSession(sess)
|
||||
ctx.DeleteCsrfCookie()
|
||||
|
||||
return ctx.RedirectTo("/")
|
||||
}
|
||||
|
||||
func OauthUnlink(ctx *context.Context) error {
|
||||
providerStr := ctx.Param("provider")
|
||||
provider, err := oauth.DefineProvider(ctx.Param("provider"), "")
|
||||
@@ -184,10 +288,10 @@ func OauthUnlink(ctx *context.Context) error {
|
||||
|
||||
if provider.UserHasProvider(currUser) {
|
||||
if err := currUser.DeleteProviderID(providerStr); err != nil {
|
||||
return ctx.ErrorRes(500, "Cannot unlink account from "+cases.Title(language.English).String(providerStr), err)
|
||||
return ctx.ErrorRes(500, "Cannot unlink account from "+config.C.OIDCProviderName, err)
|
||||
}
|
||||
|
||||
ctx.AddFlash(ctx.Tr("flash.auth.account-unlinked-oauth", cases.Title(language.English).String(providerStr)), "success")
|
||||
ctx.AddFlash(ctx.Tr("flash.auth.account-unlinked-oauth", config.C.OIDCProviderName), "success")
|
||||
return ctx.RedirectTo("/settings")
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user