forked from Shiloh/githaven
12a1f914f4
* update github.com/alecthomas/chroma v0.8.0 -> v0.8.1 * github.com/blevesearch/bleve v1.0.10 -> v1.0.12 * editorconfig-core-go v2.1.1 -> v2.3.7 * github.com/gliderlabs/ssh v0.2.2 -> v0.3.1 * migrate editorconfig.ParseBytes to Parse * github.com/shurcooL/vfsgen to 0d455de96546 * github.com/go-git/go-git/v5 v5.1.0 -> v5.2.0 * github.com/google/uuid v1.1.1 -> v1.1.2 * github.com/huandu/xstrings v1.3.0 -> v1.3.2 * github.com/klauspost/compress v1.10.11 -> v1.11.1 * github.com/markbates/goth v1.61.2 -> v1.65.0 * github.com/mattn/go-sqlite3 v1.14.0 -> v1.14.4 * github.com/mholt/archiver v3.3.0 -> v3.3.2 * github.com/microcosm-cc/bluemonday 4f7140c49acb -> v1.0.4 * github.com/minio/minio-go v7.0.4 -> v7.0.5 * github.com/olivere/elastic v7.0.9 -> v7.0.20 * github.com/urfave/cli v1.20.0 -> v1.22.4 * github.com/prometheus/client_golang v1.1.0 -> v1.8.0 * github.com/xanzy/go-gitlab v0.37.0 -> v0.38.1 * mvdan.cc/xurls v2.1.0 -> v2.2.0 Co-authored-by: Lauris BH <lauris@nix.lv>
210 lines
5.1 KiB
Go
Vendored
210 lines
5.1 KiB
Go
Vendored
// Package bitbucket implements the OAuth2 protocol for authenticating users through Bitbucket.
|
|
package bitbucket
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"net/url"
|
|
|
|
"github.com/markbates/goth"
|
|
"golang.org/x/oauth2"
|
|
)
|
|
|
|
const (
|
|
authURL string = "https://bitbucket.org/site/oauth2/authorize"
|
|
tokenURL string = "https://bitbucket.org/site/oauth2/access_token"
|
|
endpointProfile string = "https://api.bitbucket.org/2.0/user"
|
|
endpointEmail string = "https://api.bitbucket.org/2.0/user/emails"
|
|
)
|
|
|
|
// New creates a new Bitbucket provider, and sets up important connection details.
|
|
// You should always call `bitbucket.New` to get a new Provider. Never try to create
|
|
// one manually.
|
|
func New(clientKey, secret, callbackURL string, scopes ...string) *Provider {
|
|
p := &Provider{
|
|
ClientKey: clientKey,
|
|
Secret: secret,
|
|
CallbackURL: callbackURL,
|
|
providerName: "bitbucket",
|
|
}
|
|
p.config = newConfig(p, scopes)
|
|
return p
|
|
}
|
|
|
|
// Provider is the implementation of `goth.Provider` for accessing Bitbucket.
|
|
type Provider struct {
|
|
ClientKey string
|
|
Secret string
|
|
CallbackURL string
|
|
HTTPClient *http.Client
|
|
config *oauth2.Config
|
|
providerName string
|
|
}
|
|
|
|
// Name is the name used to retrieve this provider later.
|
|
func (p *Provider) Name() string {
|
|
return p.providerName
|
|
}
|
|
|
|
// SetName is to update the name of the provider (needed in case of multiple providers of 1 type)
|
|
func (p *Provider) SetName(name string) {
|
|
p.providerName = name
|
|
}
|
|
|
|
func (p *Provider) Client() *http.Client {
|
|
return goth.HTTPClientWithFallBack(p.HTTPClient)
|
|
}
|
|
|
|
// Debug is a no-op for the bitbucket package.
|
|
func (p *Provider) Debug(debug bool) {}
|
|
|
|
// BeginAuth asks Bitbucket for an authentication end-point.
|
|
func (p *Provider) BeginAuth(state string) (goth.Session, error) {
|
|
url := p.config.AuthCodeURL(state)
|
|
session := &Session{
|
|
AuthURL: url,
|
|
}
|
|
return session, nil
|
|
}
|
|
|
|
// FetchUser will go to Bitbucket and access basic information about the user.
|
|
func (p *Provider) FetchUser(session goth.Session) (goth.User, error) {
|
|
sess := session.(*Session)
|
|
user := goth.User{
|
|
AccessToken: sess.AccessToken,
|
|
Provider: p.Name(),
|
|
RefreshToken: sess.RefreshToken,
|
|
ExpiresAt: sess.ExpiresAt,
|
|
}
|
|
|
|
if user.AccessToken == "" {
|
|
// data is not yet retrieved since accessToken is still empty
|
|
return user, fmt.Errorf("%s cannot get user information without accessToken", p.providerName)
|
|
}
|
|
|
|
response, err := goth.HTTPClientWithFallBack(p.Client()).Get(endpointProfile + "?access_token=" + url.QueryEscape(sess.AccessToken))
|
|
if err != nil {
|
|
return user, err
|
|
}
|
|
defer response.Body.Close()
|
|
|
|
if response.StatusCode != http.StatusOK {
|
|
return user, fmt.Errorf("%s responded with a %d trying to fetch user information", p.providerName, response.StatusCode)
|
|
}
|
|
|
|
bits, err := ioutil.ReadAll(response.Body)
|
|
if err != nil {
|
|
return user, err
|
|
}
|
|
|
|
err = json.NewDecoder(bytes.NewReader(bits)).Decode(&user.RawData)
|
|
if err != nil {
|
|
return user, err
|
|
}
|
|
|
|
err = userFromReader(bytes.NewReader(bits), &user)
|
|
if err != nil {
|
|
return user, err
|
|
}
|
|
|
|
response, err = goth.HTTPClientWithFallBack(p.Client()).Get(endpointEmail + "?access_token=" + url.QueryEscape(sess.AccessToken))
|
|
if err != nil {
|
|
return user, err
|
|
}
|
|
defer response.Body.Close()
|
|
|
|
bits, err = ioutil.ReadAll(response.Body)
|
|
if err != nil {
|
|
return user, err
|
|
}
|
|
|
|
err = emailFromReader(bytes.NewReader(bits), &user)
|
|
return user, err
|
|
}
|
|
|
|
func userFromReader(reader io.Reader, user *goth.User) error {
|
|
u := struct {
|
|
ID string `json:"uuid"`
|
|
Links struct {
|
|
Avatar struct {
|
|
URL string `json:"href"`
|
|
} `json:"avatar"`
|
|
} `json:"links"`
|
|
Email string `json:"email"`
|
|
Username string `json:"username"`
|
|
Name string `json:"display_name"`
|
|
Location string `json:"location"`
|
|
}{}
|
|
|
|
err := json.NewDecoder(reader).Decode(&u)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
user.Name = u.Name
|
|
user.NickName = u.Username
|
|
user.AvatarURL = u.Links.Avatar.URL
|
|
user.UserID = u.ID
|
|
user.Location = u.Location
|
|
|
|
return err
|
|
}
|
|
|
|
func emailFromReader(reader io.Reader, user *goth.User) error {
|
|
e := struct {
|
|
Values []struct {
|
|
Email string `json:"email"`
|
|
} `json:"values"`
|
|
}{}
|
|
|
|
err := json.NewDecoder(reader).Decode(&e)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if len(e.Values) > 0 {
|
|
user.Email = e.Values[0].Email
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
func newConfig(provider *Provider, scopes []string) *oauth2.Config {
|
|
c := &oauth2.Config{
|
|
ClientID: provider.ClientKey,
|
|
ClientSecret: provider.Secret,
|
|
RedirectURL: provider.CallbackURL,
|
|
Endpoint: oauth2.Endpoint{
|
|
AuthURL: authURL,
|
|
TokenURL: tokenURL,
|
|
},
|
|
Scopes: []string{},
|
|
}
|
|
|
|
for _, scope := range scopes {
|
|
c.Scopes = append(c.Scopes, scope)
|
|
}
|
|
|
|
return c
|
|
}
|
|
|
|
//RefreshTokenAvailable refresh token is provided by auth provider or not
|
|
func (p *Provider) RefreshTokenAvailable() bool {
|
|
return true
|
|
}
|
|
|
|
//RefreshToken get new access token based on the refresh token
|
|
func (p *Provider) RefreshToken(refreshToken string) (*oauth2.Token, error) {
|
|
token := &oauth2.Token{RefreshToken: refreshToken}
|
|
ts := p.config.TokenSource(goth.ContextForClient(p.Client()), token)
|
|
newToken, err := ts.Token()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return newToken, err
|
|
}
|