package handlers import ( "context" "crypto/rand" "encoding/hex" "encoding/json" "fmt" "io" "net/http" "strconv" "time" "code.tjo.space/mentos1386/zdravko/internal/config" "code.tjo.space/mentos1386/zdravko/internal/models" "golang.org/x/oauth2" ) type UserInfo struct { Id int `json:"id"` // FIXME: This might not always be int? Sub string `json:"sub"` Email string `json:"email"` } func newRandomState() string { b := make([]byte, 16) _, err := rand.Read(b) if err != nil { panic(err) } return hex.EncodeToString(b) } func newOAuth2(config *config.Config) *oauth2.Config { return &oauth2.Config{ ClientID: config.OAuth2.ClientID, ClientSecret: config.OAuth2.ClientSecret, Scopes: config.OAuth2.Scopes, RedirectURL: config.RootUrl + "/oauth2/callback", Endpoint: oauth2.Endpoint{ TokenURL: config.OAuth2.EndpointTokenURL, AuthURL: config.OAuth2.EndpointAuthURL, }, } } func (h *BaseHandler) AuthenticatedUserToOAuth2Token(user *AuthenticatedUser) *oauth2.Token { return &oauth2.Token{ AccessToken: user.OAuth2AccessToken, TokenType: user.OAuth2TokenType, RefreshToken: user.OAuth2RefreshToken, Expiry: user.OAuth2Expiry, } } func (h *BaseHandler) RefreshToken(w http.ResponseWriter, r *http.Request, user *AuthenticatedUser) (*AuthenticatedUser, error) { tok := h.AuthenticatedUserToOAuth2Token(user) conf := newOAuth2(h.config) refreshed, err := conf.TokenSource(context.Background(), tok).Token() if err != nil { fmt.Println("Error: ", err) return nil, err } refreshedUser := &AuthenticatedUser{ ID: user.ID, Email: user.Email, OAuth2AccessToken: refreshed.AccessToken, OAuth2RefreshToken: refreshed.RefreshToken, OAuth2TokenType: refreshed.TokenType, OAuth2Expiry: refreshed.Expiry, } err = h.SetAuthenticatedUserForRequest(w, r, refreshedUser) if err != nil { return nil, err } return refreshedUser, nil } func (h *BaseHandler) OAuth2LoginGET(w http.ResponseWriter, r *http.Request) { conf := newOAuth2(h.config) state := newRandomState() result := h.db.Create(&models.OAuth2State{State: state, Expiry: time.Now().Add(5 * time.Minute)}) if result.Error != nil { http.Error(w, result.Error.Error(), http.StatusInternalServerError) } url := conf.AuthCodeURL(state, oauth2.AccessTypeOffline) http.Redirect(w, r, url, http.StatusTemporaryRedirect) } func (h *BaseHandler) OAuth2CallbackGET(w http.ResponseWriter, r *http.Request) { ctx := context.Background() conf := newOAuth2(h.config) state := r.URL.Query().Get("state") result, err := h.query.OAuth2State.WithContext(ctx).Where( h.query.OAuth2State.State.Eq(state), h.query.OAuth2State.Expiry.Gt(time.Now()), ).Delete() if err != nil { http.Error(w, err.Error(), http.StatusInternalServerError) return } if result.RowsAffected != 1 { http.Error(w, "Invalid state", http.StatusUnauthorized) return } // Exchange the code for a new token. tok, err := conf.Exchange(r.Context(), r.URL.Query().Get("code")) if err != nil { http.Error(w, err.Error(), http.StatusInternalServerError) return } // Ge the user information. client := oauth2.NewClient(ctx, oauth2.StaticTokenSource(tok)) resp, err := client.Get(h.config.OAuth2.EndpointUserInfoURL) if err != nil { http.Error(w, err.Error(), http.StatusInternalServerError) return } defer resp.Body.Close() body, err := io.ReadAll(resp.Body) if err != nil { http.Error(w, err.Error(), http.StatusInternalServerError) } var userInfo UserInfo err = json.Unmarshal(body, &userInfo) if err != nil { http.Error(w, err.Error(), http.StatusInternalServerError) return } userId := userInfo.Sub if userInfo.Id != 0 { userId = strconv.Itoa(userInfo.Id) } err = h.SetAuthenticatedUserForRequest(w, r, &AuthenticatedUser{ ID: userId, Email: userInfo.Email, OAuth2AccessToken: tok.AccessToken, OAuth2RefreshToken: tok.RefreshToken, OAuth2TokenType: tok.TokenType, OAuth2Expiry: tok.Expiry, }) if err != nil { http.Error(w, err.Error(), http.StatusInternalServerError) return } http.Redirect(w, r, "/settings", http.StatusTemporaryRedirect) } func (h *BaseHandler) OAuth2LogoutGET(w http.ResponseWriter, r *http.Request, user *AuthenticatedUser) { if h.config.OAuth2.EndpointLogoutURL != "" { tok := h.AuthenticatedUserToOAuth2Token(user) client := oauth2.NewClient(context.Background(), oauth2.StaticTokenSource(tok)) _, err := client.Get(h.config.OAuth2.EndpointLogoutURL) if err != nil { http.Error(w, err.Error(), http.StatusInternalServerError) return } } err := h.ClearAuthenticatedUserForRequest(w, r) if err != nil { http.Error(w, err.Error(), http.StatusInternalServerError) } http.Redirect(w, r, "/", http.StatusTemporaryRedirect) }