2017-02-22 08:14:37 +01:00
|
|
|
// Copyright 2017 The Gitea Authors. All rights reserved.
|
2022-11-27 19:20:29 +01:00
|
|
|
// SPDX-License-Identifier: MIT
|
2017-02-22 08:14:37 +01:00
|
|
|
|
2021-11-28 15:11:58 +01:00
|
|
|
package user
|
2017-02-22 08:14:37 +01:00
|
|
|
|
2019-10-14 08:10:42 +02:00
|
|
|
import (
|
2021-11-28 15:11:58 +01:00
|
|
|
"context"
|
|
|
|
"fmt"
|
2019-10-14 08:10:42 +02:00
|
|
|
"time"
|
|
|
|
|
2021-09-19 13:49:59 +02:00
|
|
|
"code.gitea.io/gitea/models/db"
|
2022-10-18 07:50:37 +02:00
|
|
|
"code.gitea.io/gitea/modules/util"
|
2019-10-14 08:10:42 +02:00
|
|
|
|
|
|
|
"xorm.io/builder"
|
|
|
|
)
|
2017-02-22 08:14:37 +01:00
|
|
|
|
2021-11-28 15:11:58 +01:00
|
|
|
// ErrExternalLoginUserAlreadyExist represents a "ExternalLoginUserAlreadyExist" kind of error.
|
|
|
|
type ErrExternalLoginUserAlreadyExist struct {
|
|
|
|
ExternalID string
|
|
|
|
UserID int64
|
|
|
|
LoginSourceID int64
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsErrExternalLoginUserAlreadyExist checks if an error is a ExternalLoginUserAlreadyExist.
|
|
|
|
func IsErrExternalLoginUserAlreadyExist(err error) bool {
|
|
|
|
_, ok := err.(ErrExternalLoginUserAlreadyExist)
|
|
|
|
return ok
|
|
|
|
}
|
|
|
|
|
|
|
|
func (err ErrExternalLoginUserAlreadyExist) Error() string {
|
|
|
|
return fmt.Sprintf("external login user already exists [externalID: %s, userID: %d, loginSourceID: %d]", err.ExternalID, err.UserID, err.LoginSourceID)
|
|
|
|
}
|
|
|
|
|
2022-10-18 07:50:37 +02:00
|
|
|
func (err ErrExternalLoginUserAlreadyExist) Unwrap() error {
|
|
|
|
return util.ErrAlreadyExist
|
|
|
|
}
|
|
|
|
|
2021-11-28 15:11:58 +01:00
|
|
|
// ErrExternalLoginUserNotExist represents a "ExternalLoginUserNotExist" kind of error.
|
|
|
|
type ErrExternalLoginUserNotExist struct {
|
|
|
|
UserID int64
|
|
|
|
LoginSourceID int64
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsErrExternalLoginUserNotExist checks if an error is a ExternalLoginUserNotExist.
|
|
|
|
func IsErrExternalLoginUserNotExist(err error) bool {
|
|
|
|
_, ok := err.(ErrExternalLoginUserNotExist)
|
|
|
|
return ok
|
|
|
|
}
|
|
|
|
|
|
|
|
func (err ErrExternalLoginUserNotExist) Error() string {
|
|
|
|
return fmt.Sprintf("external login user link does not exists [userID: %d, loginSourceID: %d]", err.UserID, err.LoginSourceID)
|
|
|
|
}
|
|
|
|
|
2022-10-18 07:50:37 +02:00
|
|
|
func (err ErrExternalLoginUserNotExist) Unwrap() error {
|
|
|
|
return util.ErrNotExist
|
|
|
|
}
|
|
|
|
|
2017-02-22 08:14:37 +01:00
|
|
|
// ExternalLoginUser makes the connecting between some existing user and additional external login sources
|
|
|
|
type ExternalLoginUser struct {
|
2023-07-04 20:36:08 +02:00
|
|
|
ExternalID string `xorm:"pk NOT NULL"`
|
|
|
|
UserID int64 `xorm:"INDEX NOT NULL"`
|
|
|
|
LoginSourceID int64 `xorm:"pk NOT NULL"`
|
|
|
|
RawData map[string]any `xorm:"TEXT JSON"`
|
|
|
|
Provider string `xorm:"index VARCHAR(25)"`
|
2019-10-14 08:10:42 +02:00
|
|
|
Email string
|
|
|
|
Name string
|
|
|
|
FirstName string
|
|
|
|
LastName string
|
|
|
|
NickName string
|
|
|
|
Description string
|
2022-02-01 06:40:23 +01:00
|
|
|
AvatarURL string `xorm:"TEXT"`
|
2019-10-14 08:10:42 +02:00
|
|
|
Location string
|
2019-10-18 08:58:36 +02:00
|
|
|
AccessToken string `xorm:"TEXT"`
|
|
|
|
AccessTokenSecret string `xorm:"TEXT"`
|
|
|
|
RefreshToken string `xorm:"TEXT"`
|
2019-10-14 08:10:42 +02:00
|
|
|
ExpiresAt time.Time
|
2017-02-22 08:14:37 +01:00
|
|
|
}
|
|
|
|
|
2022-02-01 19:20:28 +01:00
|
|
|
type ExternalUserMigrated interface {
|
|
|
|
GetExternalName() string
|
|
|
|
GetExternalID() int64
|
|
|
|
}
|
|
|
|
|
|
|
|
type ExternalUserRemappable interface {
|
|
|
|
GetUserID() int64
|
|
|
|
RemapExternalUser(externalName string, externalID, userID int64) error
|
|
|
|
ExternalUserMigrated
|
|
|
|
}
|
|
|
|
|
2021-09-19 13:49:59 +02:00
|
|
|
func init() {
|
|
|
|
db.RegisterModel(new(ExternalLoginUser))
|
|
|
|
}
|
|
|
|
|
2017-02-22 08:14:37 +01:00
|
|
|
// GetExternalLogin checks if a externalID in loginSourceID scope already exists
|
2023-10-14 10:37:24 +02:00
|
|
|
func GetExternalLogin(ctx context.Context, externalLoginUser *ExternalLoginUser) (bool, error) {
|
|
|
|
return db.GetEngine(ctx).Get(externalLoginUser)
|
2017-02-22 08:14:37 +01:00
|
|
|
}
|
|
|
|
|
2019-10-14 08:10:42 +02:00
|
|
|
// LinkExternalToUser link the external user to the user
|
2023-10-14 10:37:24 +02:00
|
|
|
func LinkExternalToUser(ctx context.Context, user *User, externalLoginUser *ExternalLoginUser) error {
|
2023-12-07 08:27:36 +01:00
|
|
|
has, err := db.Exist[ExternalLoginUser](ctx, builder.Eq{
|
|
|
|
"external_id": externalLoginUser.ExternalID,
|
|
|
|
"login_source_id": externalLoginUser.LoginSourceID,
|
|
|
|
})
|
2017-02-22 08:14:37 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if has {
|
2019-10-14 08:10:42 +02:00
|
|
|
return ErrExternalLoginUserAlreadyExist{externalLoginUser.ExternalID, user.ID, externalLoginUser.LoginSourceID}
|
2017-02-22 08:14:37 +01:00
|
|
|
}
|
|
|
|
|
2023-10-14 10:37:24 +02:00
|
|
|
_, err = db.GetEngine(ctx).Insert(externalLoginUser)
|
2017-02-22 08:14:37 +01:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// RemoveAccountLink will remove all external login sources for the given user
|
2023-10-14 10:37:24 +02:00
|
|
|
func RemoveAccountLink(ctx context.Context, user *User, loginSourceID int64) (int64, error) {
|
|
|
|
deleted, err := db.GetEngine(ctx).Delete(&ExternalLoginUser{UserID: user.ID, LoginSourceID: loginSourceID})
|
2017-02-22 08:14:37 +01:00
|
|
|
if err != nil {
|
|
|
|
return deleted, err
|
|
|
|
}
|
|
|
|
if deleted < 1 {
|
|
|
|
return deleted, ErrExternalLoginUserNotExist{user.ID, loginSourceID}
|
|
|
|
}
|
|
|
|
return deleted, err
|
|
|
|
}
|
|
|
|
|
2021-11-28 15:11:58 +01:00
|
|
|
// RemoveAllAccountLinks will remove all external login sources for the given user
|
|
|
|
func RemoveAllAccountLinks(ctx context.Context, user *User) error {
|
|
|
|
_, err := db.GetEngine(ctx).Delete(&ExternalLoginUser{UserID: user.ID})
|
2017-02-22 08:14:37 +01:00
|
|
|
return err
|
|
|
|
}
|
2019-10-14 08:10:42 +02:00
|
|
|
|
|
|
|
// GetUserIDByExternalUserID get user id according to provider and userID
|
2023-10-14 10:37:24 +02:00
|
|
|
func GetUserIDByExternalUserID(ctx context.Context, provider, userID string) (int64, error) {
|
2019-10-14 08:10:42 +02:00
|
|
|
var id int64
|
2023-10-14 10:37:24 +02:00
|
|
|
_, err := db.GetEngine(ctx).Table("external_login_user").
|
2019-10-14 08:10:42 +02:00
|
|
|
Select("user_id").
|
|
|
|
Where("provider=?", provider).
|
|
|
|
And("external_id=?", userID).
|
|
|
|
Get(&id)
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
return id, nil
|
|
|
|
}
|
|
|
|
|
2021-12-14 09:37:11 +01:00
|
|
|
// UpdateExternalUserByExternalID updates an external user's information
|
2023-10-14 10:37:24 +02:00
|
|
|
func UpdateExternalUserByExternalID(ctx context.Context, external *ExternalLoginUser) error {
|
2023-12-07 08:27:36 +01:00
|
|
|
has, err := db.Exist[ExternalLoginUser](ctx, builder.Eq{
|
|
|
|
"external_id": external.ExternalID,
|
|
|
|
"login_source_id": external.LoginSourceID,
|
|
|
|
})
|
2019-10-14 08:10:42 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if !has {
|
2021-12-14 09:37:11 +01:00
|
|
|
return ErrExternalLoginUserNotExist{external.UserID, external.LoginSourceID}
|
2019-10-14 08:10:42 +02:00
|
|
|
}
|
|
|
|
|
2023-10-14 10:37:24 +02:00
|
|
|
_, err = db.GetEngine(ctx).Where("external_id=? AND login_source_id=?", external.ExternalID, external.LoginSourceID).AllCols().Update(external)
|
2019-10-14 08:10:42 +02:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
allow synchronizing user status from OAuth2 login providers (#31572)
This leverages the existing `sync_external_users` cron job to
synchronize the `IsActive` flag on users who use an OAuth2 provider set
to synchronize. This synchronization is done by checking for expired
access tokens, and using the stored refresh token to request a new
access token. If the response back from the OAuth2 provider is the
`invalid_grant` error code, the user is marked as inactive. However, the
user is able to reactivate their account by logging in the web browser
through their OAuth2 flow.
Also changed to support this is that a linked `ExternalLoginUser` is
always created upon a login or signup via OAuth2.
### Notes on updating permissions
Ideally, we would also refresh permissions from the configured OAuth
provider (e.g., admin, restricted and group mappings) to match the
implementation of LDAP. However, the OAuth library used for this `goth`,
doesn't seem to support issuing a session via refresh tokens. The
interface provides a [`RefreshToken`
method](https://github.com/markbates/goth/blob/master/provider.go#L20),
but the returned `oauth.Token` doesn't implement the `goth.Session` we
would need to call `FetchUser`. Due to specific implementations, we
would need to build a compatibility function for every provider, since
they cast to concrete types (e.g.
[Azure](https://github.com/markbates/goth/blob/master/providers/azureadv2/azureadv2.go#L132))
---------
Co-authored-by: Kyle D <kdumontnu@gmail.com>
2024-07-16 20:33:16 +02:00
|
|
|
// EnsureLinkExternalToUser link the external user to the user
|
|
|
|
func EnsureLinkExternalToUser(ctx context.Context, external *ExternalLoginUser) error {
|
|
|
|
has, err := db.Exist[ExternalLoginUser](ctx, builder.Eq{
|
|
|
|
"external_id": external.ExternalID,
|
|
|
|
"login_source_id": external.LoginSourceID,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if has {
|
|
|
|
_, err = db.GetEngine(ctx).Where("external_id=? AND login_source_id=?", external.ExternalID, external.LoginSourceID).AllCols().Update(external)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = db.GetEngine(ctx).Insert(external)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-10-14 08:10:42 +02:00
|
|
|
// FindExternalUserOptions represents an options to find external users
|
|
|
|
type FindExternalUserOptions struct {
|
2023-11-24 04:49:41 +01:00
|
|
|
db.ListOptions
|
allow synchronizing user status from OAuth2 login providers (#31572)
This leverages the existing `sync_external_users` cron job to
synchronize the `IsActive` flag on users who use an OAuth2 provider set
to synchronize. This synchronization is done by checking for expired
access tokens, and using the stored refresh token to request a new
access token. If the response back from the OAuth2 provider is the
`invalid_grant` error code, the user is marked as inactive. However, the
user is able to reactivate their account by logging in the web browser
through their OAuth2 flow.
Also changed to support this is that a linked `ExternalLoginUser` is
always created upon a login or signup via OAuth2.
### Notes on updating permissions
Ideally, we would also refresh permissions from the configured OAuth
provider (e.g., admin, restricted and group mappings) to match the
implementation of LDAP. However, the OAuth library used for this `goth`,
doesn't seem to support issuing a session via refresh tokens. The
interface provides a [`RefreshToken`
method](https://github.com/markbates/goth/blob/master/provider.go#L20),
but the returned `oauth.Token` doesn't implement the `goth.Session` we
would need to call `FetchUser`. Due to specific implementations, we
would need to build a compatibility function for every provider, since
they cast to concrete types (e.g.
[Azure](https://github.com/markbates/goth/blob/master/providers/azureadv2/azureadv2.go#L132))
---------
Co-authored-by: Kyle D <kdumontnu@gmail.com>
2024-07-16 20:33:16 +02:00
|
|
|
Provider string
|
|
|
|
UserID int64
|
|
|
|
LoginSourceID int64
|
|
|
|
HasRefreshToken bool
|
|
|
|
Expired bool
|
|
|
|
OrderBy string
|
2019-10-14 08:10:42 +02:00
|
|
|
}
|
|
|
|
|
2023-11-24 04:49:41 +01:00
|
|
|
func (opts FindExternalUserOptions) ToConds() builder.Cond {
|
2021-03-14 19:52:12 +01:00
|
|
|
cond := builder.NewCond()
|
2019-10-14 08:10:42 +02:00
|
|
|
if len(opts.Provider) > 0 {
|
|
|
|
cond = cond.And(builder.Eq{"provider": opts.Provider})
|
|
|
|
}
|
2023-11-24 04:49:41 +01:00
|
|
|
if opts.UserID > 0 {
|
|
|
|
cond = cond.And(builder.Eq{"user_id": opts.UserID})
|
|
|
|
}
|
allow synchronizing user status from OAuth2 login providers (#31572)
This leverages the existing `sync_external_users` cron job to
synchronize the `IsActive` flag on users who use an OAuth2 provider set
to synchronize. This synchronization is done by checking for expired
access tokens, and using the stored refresh token to request a new
access token. If the response back from the OAuth2 provider is the
`invalid_grant` error code, the user is marked as inactive. However, the
user is able to reactivate their account by logging in the web browser
through their OAuth2 flow.
Also changed to support this is that a linked `ExternalLoginUser` is
always created upon a login or signup via OAuth2.
### Notes on updating permissions
Ideally, we would also refresh permissions from the configured OAuth
provider (e.g., admin, restricted and group mappings) to match the
implementation of LDAP. However, the OAuth library used for this `goth`,
doesn't seem to support issuing a session via refresh tokens. The
interface provides a [`RefreshToken`
method](https://github.com/markbates/goth/blob/master/provider.go#L20),
but the returned `oauth.Token` doesn't implement the `goth.Session` we
would need to call `FetchUser`. Due to specific implementations, we
would need to build a compatibility function for every provider, since
they cast to concrete types (e.g.
[Azure](https://github.com/markbates/goth/blob/master/providers/azureadv2/azureadv2.go#L132))
---------
Co-authored-by: Kyle D <kdumontnu@gmail.com>
2024-07-16 20:33:16 +02:00
|
|
|
if opts.Expired {
|
|
|
|
cond = cond.And(builder.Lt{"expires_at": time.Now()})
|
|
|
|
}
|
|
|
|
if opts.HasRefreshToken {
|
|
|
|
cond = cond.And(builder.Neq{"refresh_token": ""})
|
|
|
|
}
|
|
|
|
if opts.LoginSourceID != 0 {
|
|
|
|
cond = cond.And(builder.Eq{"login_source_id": opts.LoginSourceID})
|
|
|
|
}
|
2019-10-14 08:10:42 +02:00
|
|
|
return cond
|
|
|
|
}
|
|
|
|
|
2023-11-24 04:49:41 +01:00
|
|
|
func (opts FindExternalUserOptions) ToOrders() string {
|
|
|
|
return opts.OrderBy
|
2019-10-14 08:10:42 +02:00
|
|
|
}
|
allow synchronizing user status from OAuth2 login providers (#31572)
This leverages the existing `sync_external_users` cron job to
synchronize the `IsActive` flag on users who use an OAuth2 provider set
to synchronize. This synchronization is done by checking for expired
access tokens, and using the stored refresh token to request a new
access token. If the response back from the OAuth2 provider is the
`invalid_grant` error code, the user is marked as inactive. However, the
user is able to reactivate their account by logging in the web browser
through their OAuth2 flow.
Also changed to support this is that a linked `ExternalLoginUser` is
always created upon a login or signup via OAuth2.
### Notes on updating permissions
Ideally, we would also refresh permissions from the configured OAuth
provider (e.g., admin, restricted and group mappings) to match the
implementation of LDAP. However, the OAuth library used for this `goth`,
doesn't seem to support issuing a session via refresh tokens. The
interface provides a [`RefreshToken`
method](https://github.com/markbates/goth/blob/master/provider.go#L20),
but the returned `oauth.Token` doesn't implement the `goth.Session` we
would need to call `FetchUser`. Due to specific implementations, we
would need to build a compatibility function for every provider, since
they cast to concrete types (e.g.
[Azure](https://github.com/markbates/goth/blob/master/providers/azureadv2/azureadv2.go#L132))
---------
Co-authored-by: Kyle D <kdumontnu@gmail.com>
2024-07-16 20:33:16 +02:00
|
|
|
|
|
|
|
func IterateExternalLogin(ctx context.Context, opts FindExternalUserOptions, f func(ctx context.Context, u *ExternalLoginUser) error) error {
|
|
|
|
return db.Iterate(ctx, opts.ToConds(), f)
|
|
|
|
}
|