zdravko/internal/handlers/oauth2.go

179 lines
4.7 KiB
Go
Raw Normal View History

package handlers
import (
"context"
2024-02-12 08:25:11 +00:00
"crypto/rand"
"encoding/hex"
"encoding/json"
2024-02-12 08:25:11 +00:00
"fmt"
"io"
"net/http"
2024-02-12 08:25:11 +00:00
"time"
"code.tjo.space/mentos1386/zdravko/internal/config"
2024-02-12 08:25:11 +00:00
"code.tjo.space/mentos1386/zdravko/internal/models"
"golang.org/x/oauth2"
)
type UserInfo struct {
2024-02-16 12:52:27 +00:00
Id string `json:"id"`
Sub string `json:"sub"`
Email string `json:"email"`
}
2024-02-12 08:25:11 +00:00
func newRandomState() string {
b := make([]byte, 16)
_, err := rand.Read(b)
if err != nil {
panic(err)
}
return hex.EncodeToString(b)
}
func newOAuth2(config *config.Config) *oauth2.Config {
return &oauth2.Config{
ClientID: config.OAuth2.ClientID,
ClientSecret: config.OAuth2.ClientSecret,
Scopes: config.OAuth2.Scopes,
RedirectURL: config.RootUrl + "/oauth2/callback",
Endpoint: oauth2.Endpoint{
TokenURL: config.OAuth2.EndpointTokenURL,
AuthURL: config.OAuth2.EndpointAuthURL,
},
}
}
func (h *BaseHandler) AuthenticatedUserToOAuth2Token(user *AuthenticatedUser) *oauth2.Token {
return &oauth2.Token{
AccessToken: user.OAuth2AccessToken,
TokenType: user.OAuth2TokenType,
RefreshToken: user.OAuth2RefreshToken,
Expiry: user.OAuth2Expiry,
}
}
func (h *BaseHandler) RefreshToken(w http.ResponseWriter, r *http.Request, user *AuthenticatedUser) (*AuthenticatedUser, error) {
tok := h.AuthenticatedUserToOAuth2Token(user)
conf := newOAuth2(h.config)
refreshed, err := conf.TokenSource(context.Background(), tok).Token()
if err != nil {
2024-02-12 08:25:11 +00:00
fmt.Println("Error: ", err)
return nil, err
}
refreshedUser := &AuthenticatedUser{
ID: user.ID,
Email: user.Email,
OAuth2AccessToken: refreshed.AccessToken,
OAuth2RefreshToken: refreshed.RefreshToken,
OAuth2TokenType: refreshed.TokenType,
OAuth2Expiry: refreshed.Expiry,
}
err = h.SetAuthenticatedUserForRequest(w, r, refreshedUser)
if err != nil {
return nil, err
}
return refreshedUser, nil
}
func (h *BaseHandler) OAuth2LoginGET(w http.ResponseWriter, r *http.Request) {
conf := newOAuth2(h.config)
2024-02-12 08:25:11 +00:00
state := newRandomState()
result := h.db.Create(&models.OAuth2State{State: state, Expiry: time.Now().Add(5 * time.Minute)})
if result.Error != nil {
http.Error(w, result.Error.Error(), http.StatusInternalServerError)
}
url := conf.AuthCodeURL(state, oauth2.AccessTypeOffline)
http.Redirect(w, r, url, http.StatusTemporaryRedirect)
}
func (h *BaseHandler) OAuth2CallbackGET(w http.ResponseWriter, r *http.Request) {
ctx := context.Background()
conf := newOAuth2(h.config)
2024-02-12 08:25:11 +00:00
state := r.URL.Query().Get("state")
result, err := h.query.OAuth2State.WithContext(ctx).Where(
h.query.OAuth2State.State.Eq(state),
h.query.OAuth2State.Expiry.Gt(time.Now()),
).Delete()
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
if result.RowsAffected != 1 {
http.Error(w, "Invalid state", http.StatusUnauthorized)
return
}
// Exchange the code for a new token.
tok, err := conf.Exchange(r.Context(), r.URL.Query().Get("code"))
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
// Ge the user information.
client := oauth2.NewClient(ctx, oauth2.StaticTokenSource(tok))
resp, err := client.Get(h.config.OAuth2.EndpointUserInfoURL)
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
defer resp.Body.Close()
body, err := io.ReadAll(resp.Body)
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
}
var userInfo UserInfo
err = json.Unmarshal(body, &userInfo)
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
2024-02-16 12:52:27 +00:00
userId := userInfo.Id
if userInfo.Sub != "" {
userId = userInfo.Sub
}
err = h.SetAuthenticatedUserForRequest(w, r, &AuthenticatedUser{
2024-02-16 12:52:27 +00:00
ID: userId,
Email: userInfo.Email,
OAuth2AccessToken: tok.AccessToken,
OAuth2RefreshToken: tok.RefreshToken,
OAuth2TokenType: tok.TokenType,
OAuth2Expiry: tok.Expiry,
})
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
http.Redirect(w, r, "/settings", http.StatusTemporaryRedirect)
}
func (h *BaseHandler) OAuth2LogoutGET(w http.ResponseWriter, r *http.Request, user *AuthenticatedUser) {
2024-02-16 12:52:27 +00:00
if h.config.OAuth2.EndpointLogoutURL != "" {
tok := h.AuthenticatedUserToOAuth2Token(user)
client := oauth2.NewClient(context.Background(), oauth2.StaticTokenSource(tok))
_, err := client.Get(h.config.OAuth2.EndpointLogoutURL)
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
}
2024-02-16 12:52:27 +00:00
err := h.ClearAuthenticatedUserForRequest(w, r)
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
}
http.Redirect(w, r, "/", http.StatusTemporaryRedirect)
}