Ви не можете вибрати більше 25 тем Теми мають розпочинатися з літери або цифри, можуть містити дефіси (-) і не повинні перевищувати 35 символів.

Oauth2 consumer (#679) * initial stuff for oauth2 login, fails on: * login button on the signIn page to start the OAuth2 flow and a callback for each provider Only GitHub is implemented for now * show login button only when the OAuth2 consumer is configured (and activated) * create macaron group for oauth2 urls * prevent net/http in modules (other then oauth2) * use a new data sessions oauth2 folder for storing the oauth2 session data * add missing 2FA when this is enabled on the user * add password option for OAuth2 user , for use with git over http and login to the GUI * add tip for registering a GitHub OAuth application * at startup of Gitea register all configured providers and also on adding/deleting of new providers * custom handling of errors in oauth2 request init + show better tip * add ExternalLoginUser model and migration script to add it to database * link a external account to an existing account (still need to handle wrong login and signup) and remove if user is removed * remove the linked external account from the user his settings * if user is unknown we allow him to register a new account or link it to some existing account * sign up with button on signin page (als change OAuth2Provider structure so we can store basic stuff about providers) * from gorilla/sessions docs: "Important Note: If you aren't using gorilla/mux, you need to wrap your handlers with context.ClearHandler as or else you will leak memory!" (we're using gorilla/sessions for storing oauth2 sessions) * use updated goth lib that now supports getting the OAuth2 user if the AccessToken is still valid instead of re-authenticating (prevent flooding the OAuth2 provider)
7 роки тому
Oauth2 consumer (#679) * initial stuff for oauth2 login, fails on: * login button on the signIn page to start the OAuth2 flow and a callback for each provider Only GitHub is implemented for now * show login button only when the OAuth2 consumer is configured (and activated) * create macaron group for oauth2 urls * prevent net/http in modules (other then oauth2) * use a new data sessions oauth2 folder for storing the oauth2 session data * add missing 2FA when this is enabled on the user * add password option for OAuth2 user , for use with git over http and login to the GUI * add tip for registering a GitHub OAuth application * at startup of Gitea register all configured providers and also on adding/deleting of new providers * custom handling of errors in oauth2 request init + show better tip * add ExternalLoginUser model and migration script to add it to database * link a external account to an existing account (still need to handle wrong login and signup) and remove if user is removed * remove the linked external account from the user his settings * if user is unknown we allow him to register a new account or link it to some existing account * sign up with button on signin page (als change OAuth2Provider structure so we can store basic stuff about providers) * from gorilla/sessions docs: "Important Note: If you aren't using gorilla/mux, you need to wrap your handlers with context.ClearHandler as or else you will leak memory!" (we're using gorilla/sessions for storing oauth2 sessions) * use updated goth lib that now supports getting the OAuth2 user if the AccessToken is still valid instead of re-authenticating (prevent flooding the OAuth2 provider)
7 роки тому
Oauth2 consumer (#679) * initial stuff for oauth2 login, fails on: * login button on the signIn page to start the OAuth2 flow and a callback for each provider Only GitHub is implemented for now * show login button only when the OAuth2 consumer is configured (and activated) * create macaron group for oauth2 urls * prevent net/http in modules (other then oauth2) * use a new data sessions oauth2 folder for storing the oauth2 session data * add missing 2FA when this is enabled on the user * add password option for OAuth2 user , for use with git over http and login to the GUI * add tip for registering a GitHub OAuth application * at startup of Gitea register all configured providers and also on adding/deleting of new providers * custom handling of errors in oauth2 request init + show better tip * add ExternalLoginUser model and migration script to add it to database * link a external account to an existing account (still need to handle wrong login and signup) and remove if user is removed * remove the linked external account from the user his settings * if user is unknown we allow him to register a new account or link it to some existing account * sign up with button on signin page (als change OAuth2Provider structure so we can store basic stuff about providers) * from gorilla/sessions docs: "Important Note: If you aren't using gorilla/mux, you need to wrap your handlers with context.ClearHandler as or else you will leak memory!" (we're using gorilla/sessions for storing oauth2 sessions) * use updated goth lib that now supports getting the OAuth2 user if the AccessToken is still valid instead of re-authenticating (prevent flooding the OAuth2 provider)
7 роки тому
1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374
  1. // Copyright 2017 The Gitea Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package models
  5. import "github.com/markbates/goth"
  6. // ExternalLoginUser makes the connecting between some existing user and additional external login sources
  7. type ExternalLoginUser struct {
  8. ExternalID string `xorm:"pk NOT NULL"`
  9. UserID int64 `xorm:"INDEX NOT NULL"`
  10. LoginSourceID int64 `xorm:"pk NOT NULL"`
  11. }
  12. // GetExternalLogin checks if a externalID in loginSourceID scope already exists
  13. func GetExternalLogin(externalLoginUser *ExternalLoginUser) (bool, error) {
  14. return x.Get(externalLoginUser)
  15. }
  16. // ListAccountLinks returns a map with the ExternalLoginUser and its LoginSource
  17. func ListAccountLinks(user *User) ([]*ExternalLoginUser, error) {
  18. externalAccounts := make([]*ExternalLoginUser, 0, 5)
  19. err := x.Where("user_id=?", user.ID).
  20. Desc("login_source_id").
  21. Find(&externalAccounts)
  22. if err != nil {
  23. return nil, err
  24. }
  25. return externalAccounts, nil
  26. }
  27. // LinkAccountToUser link the gothUser to the user
  28. func LinkAccountToUser(user *User, gothUser goth.User) error {
  29. loginSource, err := GetActiveOAuth2LoginSourceByName(gothUser.Provider)
  30. if err != nil {
  31. return err
  32. }
  33. externalLoginUser := &ExternalLoginUser{
  34. ExternalID: gothUser.UserID,
  35. UserID: user.ID,
  36. LoginSourceID: loginSource.ID,
  37. }
  38. has, err := x.Get(externalLoginUser)
  39. if err != nil {
  40. return err
  41. } else if has {
  42. return ErrExternalLoginUserAlreadyExist{gothUser.UserID, user.ID, loginSource.ID}
  43. }
  44. _, err = x.Insert(externalLoginUser)
  45. return err
  46. }
  47. // RemoveAccountLink will remove all external login sources for the given user
  48. func RemoveAccountLink(user *User, loginSourceID int64) (int64, error) {
  49. deleted, err := x.Delete(&ExternalLoginUser{UserID: user.ID, LoginSourceID: loginSourceID})
  50. if err != nil {
  51. return deleted, err
  52. }
  53. if deleted < 1 {
  54. return deleted, ErrExternalLoginUserNotExist{user.ID, loginSourceID}
  55. }
  56. return deleted, err
  57. }
  58. // removeAllAccountLinks will remove all external login sources for the given user
  59. func removeAllAccountLinks(e Engine, user *User) error {
  60. _, err := e.Delete(&ExternalLoginUser{UserID: user.ID})
  61. return err
  62. }