mirror of
https://github.com/go-gitea/gitea.git
synced 2024-11-04 08:17:24 -05:00
parent
cff0787759
commit
2837563147
2
go.mod
2
go.mod
@ -68,8 +68,8 @@ require (
|
|||||||
github.com/lib/pq v1.2.0
|
github.com/lib/pq v1.2.0
|
||||||
github.com/lunny/dingtalk_webhook v0.0.0-20171025031554-e3534c89ef96
|
github.com/lunny/dingtalk_webhook v0.0.0-20171025031554-e3534c89ef96
|
||||||
github.com/lunny/levelqueue v0.0.0-20190217115915-02b525a4418e
|
github.com/lunny/levelqueue v0.0.0-20190217115915-02b525a4418e
|
||||||
|
github.com/markbates/goth v1.56.0
|
||||||
github.com/mailru/easyjson v0.7.0 // indirect
|
github.com/mailru/easyjson v0.7.0 // indirect
|
||||||
github.com/markbates/goth v1.49.0
|
|
||||||
github.com/mattn/go-isatty v0.0.7
|
github.com/mattn/go-isatty v0.0.7
|
||||||
github.com/mattn/go-oci8 v0.0.0-20190320171441-14ba190cf52d // indirect
|
github.com/mattn/go-oci8 v0.0.0-20190320171441-14ba190cf52d // indirect
|
||||||
github.com/mattn/go-sqlite3 v1.11.0
|
github.com/mattn/go-sqlite3 v1.11.0
|
||||||
|
4
go.sum
4
go.sum
@ -408,8 +408,8 @@ github.com/mailru/easyjson v0.0.0-20190626092158-b2ccc519800e/go.mod h1:C1wdFJiN
|
|||||||
github.com/mailru/easyjson v0.7.0 h1:aizVhC/NAAcKWb+5QsU1iNOZb4Yws5UO2I+aIprQITM=
|
github.com/mailru/easyjson v0.7.0 h1:aizVhC/NAAcKWb+5QsU1iNOZb4Yws5UO2I+aIprQITM=
|
||||||
github.com/mailru/easyjson v0.7.0/go.mod h1:KAzv3t3aY1NaHWoQz1+4F1ccyAH66Jk7yos7ldAVICs=
|
github.com/mailru/easyjson v0.7.0/go.mod h1:KAzv3t3aY1NaHWoQz1+4F1ccyAH66Jk7yos7ldAVICs=
|
||||||
github.com/markbates/going v1.0.0/go.mod h1:I6mnB4BPnEeqo85ynXIx1ZFLLbtiLHNXVgWeFO9OGOA=
|
github.com/markbates/going v1.0.0/go.mod h1:I6mnB4BPnEeqo85ynXIx1ZFLLbtiLHNXVgWeFO9OGOA=
|
||||||
github.com/markbates/goth v1.49.0 h1:qQ4Ti4WaqAxNAggOC+4s5M85sMVfMJwQn/Xkp73wfgI=
|
github.com/markbates/goth v1.56.0 h1:XEYedCgMNz5pi3ojXI8z2XUmXtBnMeuKUpx4Z6HlNj8=
|
||||||
github.com/markbates/goth v1.49.0/go.mod h1:zZmAw0Es0Dpm7TT/4AdN14QrkiWLMrrU9Xei1o+/mdA=
|
github.com/markbates/goth v1.56.0/go.mod h1:zZmAw0Es0Dpm7TT/4AdN14QrkiWLMrrU9Xei1o+/mdA=
|
||||||
github.com/mattn/go-isatty v0.0.7 h1:UvyT9uN+3r7yLEYSlJsbQGdsaB/a0DlgWP3pql6iwOc=
|
github.com/mattn/go-isatty v0.0.7 h1:UvyT9uN+3r7yLEYSlJsbQGdsaB/a0DlgWP3pql6iwOc=
|
||||||
github.com/mattn/go-isatty v0.0.7/go.mod h1:Iq45c/XA43vh69/j3iqttzPXn0bhXyGjM0Hdxcsrc5s=
|
github.com/mattn/go-isatty v0.0.7/go.mod h1:Iq45c/XA43vh69/j3iqttzPXn0bhXyGjM0Hdxcsrc5s=
|
||||||
github.com/mattn/go-oci8 v0.0.0-20190320171441-14ba190cf52d h1:m+dSK37rFf2fqppZhg15yI2IwC9BtucBiRwSDm9VL8g=
|
github.com/mattn/go-oci8 v0.0.0-20190320171441-14ba190cf52d h1:m+dSK37rFf2fqppZhg15yI2IwC9BtucBiRwSDm9VL8g=
|
||||||
|
@ -44,6 +44,13 @@ var OAuth2Providers = map[string]OAuth2Provider{
|
|||||||
"openidConnect": {Name: "openidConnect", DisplayName: "OpenID Connect", Image: "/img/auth/openid_connect.png"},
|
"openidConnect": {Name: "openidConnect", DisplayName: "OpenID Connect", Image: "/img/auth/openid_connect.png"},
|
||||||
"twitter": {Name: "twitter", DisplayName: "Twitter", Image: "/img/auth/twitter.png"},
|
"twitter": {Name: "twitter", DisplayName: "Twitter", Image: "/img/auth/twitter.png"},
|
||||||
"discord": {Name: "discord", DisplayName: "Discord", Image: "/img/auth/discord.png"},
|
"discord": {Name: "discord", DisplayName: "Discord", Image: "/img/auth/discord.png"},
|
||||||
|
"gitea": {Name: "gitea", DisplayName: "Gitea", Image: "/img/auth/gitea.png",
|
||||||
|
CustomURLMapping: &oauth2.CustomURLMapping{
|
||||||
|
TokenURL: oauth2.GetDefaultTokenURL("gitea"),
|
||||||
|
AuthURL: oauth2.GetDefaultAuthURL("gitea"),
|
||||||
|
ProfileURL: oauth2.GetDefaultProfileURL("gitea"),
|
||||||
|
},
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
// OAuth2DefaultCustomURLMappings contains the map of default URL's for OAuth2 providers that are allowed to have custom urls
|
// OAuth2DefaultCustomURLMappings contains the map of default URL's for OAuth2 providers that are allowed to have custom urls
|
||||||
@ -52,6 +59,7 @@ var OAuth2Providers = map[string]OAuth2Provider{
|
|||||||
var OAuth2DefaultCustomURLMappings = map[string]*oauth2.CustomURLMapping{
|
var OAuth2DefaultCustomURLMappings = map[string]*oauth2.CustomURLMapping{
|
||||||
"github": OAuth2Providers["github"].CustomURLMapping,
|
"github": OAuth2Providers["github"].CustomURLMapping,
|
||||||
"gitlab": OAuth2Providers["gitlab"].CustomURLMapping,
|
"gitlab": OAuth2Providers["gitlab"].CustomURLMapping,
|
||||||
|
"gitea": OAuth2Providers["gitea"].CustomURLMapping,
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetActiveOAuth2ProviderLoginSources returns all actived LoginOAuth2 sources
|
// GetActiveOAuth2ProviderLoginSources returns all actived LoginOAuth2 sources
|
||||||
|
@ -19,6 +19,7 @@ import (
|
|||||||
"github.com/markbates/goth/providers/discord"
|
"github.com/markbates/goth/providers/discord"
|
||||||
"github.com/markbates/goth/providers/dropbox"
|
"github.com/markbates/goth/providers/dropbox"
|
||||||
"github.com/markbates/goth/providers/facebook"
|
"github.com/markbates/goth/providers/facebook"
|
||||||
|
"github.com/markbates/goth/providers/gitea"
|
||||||
"github.com/markbates/goth/providers/github"
|
"github.com/markbates/goth/providers/github"
|
||||||
"github.com/markbates/goth/providers/gitlab"
|
"github.com/markbates/goth/providers/gitlab"
|
||||||
"github.com/markbates/goth/providers/gplus"
|
"github.com/markbates/goth/providers/gplus"
|
||||||
@ -175,6 +176,22 @@ func createProvider(providerName, providerType, clientID, clientSecret, openIDCo
|
|||||||
provider = twitter.NewAuthenticate(clientID, clientSecret, callbackURL)
|
provider = twitter.NewAuthenticate(clientID, clientSecret, callbackURL)
|
||||||
case "discord":
|
case "discord":
|
||||||
provider = discord.New(clientID, clientSecret, callbackURL, discord.ScopeIdentify, discord.ScopeEmail)
|
provider = discord.New(clientID, clientSecret, callbackURL, discord.ScopeIdentify, discord.ScopeEmail)
|
||||||
|
case "gitea":
|
||||||
|
authURL := gitea.AuthURL
|
||||||
|
tokenURL := gitea.TokenURL
|
||||||
|
profileURL := gitea.ProfileURL
|
||||||
|
if customURLMapping != nil {
|
||||||
|
if len(customURLMapping.AuthURL) > 0 {
|
||||||
|
authURL = customURLMapping.AuthURL
|
||||||
|
}
|
||||||
|
if len(customURLMapping.TokenURL) > 0 {
|
||||||
|
tokenURL = customURLMapping.TokenURL
|
||||||
|
}
|
||||||
|
if len(customURLMapping.ProfileURL) > 0 {
|
||||||
|
profileURL = customURLMapping.ProfileURL
|
||||||
|
}
|
||||||
|
}
|
||||||
|
provider = gitea.NewCustomisedURL(clientID, clientSecret, callbackURL, authURL, tokenURL, profileURL)
|
||||||
}
|
}
|
||||||
|
|
||||||
// always set the name if provider is created so we can support multiple setups of 1 provider
|
// always set the name if provider is created so we can support multiple setups of 1 provider
|
||||||
@ -192,6 +209,8 @@ func GetDefaultTokenURL(provider string) string {
|
|||||||
return github.TokenURL
|
return github.TokenURL
|
||||||
case "gitlab":
|
case "gitlab":
|
||||||
return gitlab.TokenURL
|
return gitlab.TokenURL
|
||||||
|
case "gitea":
|
||||||
|
return gitea.TokenURL
|
||||||
}
|
}
|
||||||
return ""
|
return ""
|
||||||
}
|
}
|
||||||
@ -203,6 +222,8 @@ func GetDefaultAuthURL(provider string) string {
|
|||||||
return github.AuthURL
|
return github.AuthURL
|
||||||
case "gitlab":
|
case "gitlab":
|
||||||
return gitlab.AuthURL
|
return gitlab.AuthURL
|
||||||
|
case "gitea":
|
||||||
|
return gitea.AuthURL
|
||||||
}
|
}
|
||||||
return ""
|
return ""
|
||||||
}
|
}
|
||||||
@ -214,6 +235,8 @@ func GetDefaultProfileURL(provider string) string {
|
|||||||
return github.ProfileURL
|
return github.ProfileURL
|
||||||
case "gitlab":
|
case "gitlab":
|
||||||
return gitlab.ProfileURL
|
return gitlab.ProfileURL
|
||||||
|
case "gitea":
|
||||||
|
return gitea.ProfileURL
|
||||||
}
|
}
|
||||||
return ""
|
return ""
|
||||||
}
|
}
|
||||||
|
@ -1706,6 +1706,7 @@ auths.tip.google_plus = Obtain OAuth2 client credentials from the Google API con
|
|||||||
auths.tip.openid_connect = Use the OpenID Connect Discovery URL (<server>/.well-known/openid-configuration) to specify the endpoints
|
auths.tip.openid_connect = Use the OpenID Connect Discovery URL (<server>/.well-known/openid-configuration) to specify the endpoints
|
||||||
auths.tip.twitter = Go to https://dev.twitter.com/apps, create an application and ensure that the “Allow this application to be used to Sign in with Twitter” option is enabled
|
auths.tip.twitter = Go to https://dev.twitter.com/apps, create an application and ensure that the “Allow this application to be used to Sign in with Twitter” option is enabled
|
||||||
auths.tip.discord = Register a new application on https://discordapp.com/developers/applications/me
|
auths.tip.discord = Register a new application on https://discordapp.com/developers/applications/me
|
||||||
|
auths.tip.gitea = Register a new OAuth2 application. Guide can be found at https://docs.gitea.io/en-us/oauth2-provider/
|
||||||
auths.edit = Edit Authentication Source
|
auths.edit = Edit Authentication Source
|
||||||
auths.activated = This Authentication Source is Activated
|
auths.activated = This Authentication Source is Activated
|
||||||
auths.new_success = The authentication '%s' has been added.
|
auths.new_success = The authentication '%s' has been added.
|
||||||
|
BIN
public/img/auth/gitea.png
Normal file
BIN
public/img/auth/gitea.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 5.4 KiB |
@ -1576,6 +1576,7 @@ function initAdmin() {
|
|||||||
switch (provider) {
|
switch (provider) {
|
||||||
case 'github':
|
case 'github':
|
||||||
case 'gitlab':
|
case 'gitlab':
|
||||||
|
case 'gitea':
|
||||||
$('.oauth2_use_custom_url').show();
|
$('.oauth2_use_custom_url').show();
|
||||||
break;
|
break;
|
||||||
case 'openidConnect':
|
case 'openidConnect':
|
||||||
@ -1609,6 +1610,7 @@ function initAdmin() {
|
|||||||
$('.oauth2_token_url input, .oauth2_auth_url input, .oauth2_profile_url input, .oauth2_email_url input').attr('required', 'required');
|
$('.oauth2_token_url input, .oauth2_auth_url input, .oauth2_profile_url input, .oauth2_email_url input').attr('required', 'required');
|
||||||
$('.oauth2_token_url, .oauth2_auth_url, .oauth2_profile_url, .oauth2_email_url').show();
|
$('.oauth2_token_url, .oauth2_auth_url, .oauth2_profile_url, .oauth2_email_url').show();
|
||||||
break;
|
break;
|
||||||
|
case 'gitea':
|
||||||
case 'gitlab':
|
case 'gitlab':
|
||||||
$('.oauth2_token_url input, .oauth2_auth_url input, .oauth2_profile_url input').attr('required', 'required');
|
$('.oauth2_token_url input, .oauth2_auth_url input, .oauth2_profile_url input').attr('required', 'required');
|
||||||
$('.oauth2_token_url, .oauth2_auth_url, .oauth2_profile_url').show();
|
$('.oauth2_token_url, .oauth2_auth_url, .oauth2_profile_url').show();
|
||||||
|
@ -110,6 +110,8 @@
|
|||||||
<span>{{.i18n.Tr "admin.auths.tip.twitter"}}</span>
|
<span>{{.i18n.Tr "admin.auths.tip.twitter"}}</span>
|
||||||
<li>Discord</li>
|
<li>Discord</li>
|
||||||
<span>{{.i18n.Tr "admin.auths.tip.discord"}}</span>
|
<span>{{.i18n.Tr "admin.auths.tip.discord"}}</span>
|
||||||
|
<li>Gitea</li>
|
||||||
|
<span>{{.i18n.Tr "admin.auths.tip.gitea"}}</span>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
1
vendor/github.com/markbates/goth/.travis.yml
generated
vendored
1
vendor/github.com/markbates/goth/.travis.yml
generated
vendored
@ -8,6 +8,7 @@ go:
|
|||||||
- 1.9
|
- 1.9
|
||||||
- "1.10"
|
- "1.10"
|
||||||
- "1.11"
|
- "1.11"
|
||||||
|
- "1.12"
|
||||||
- tip
|
- tip
|
||||||
|
|
||||||
matrix:
|
matrix:
|
||||||
|
5
vendor/github.com/markbates/goth/README.md
generated
vendored
5
vendor/github.com/markbates/goth/README.md
generated
vendored
@ -31,6 +31,7 @@ $ go get github.com/markbates/goth
|
|||||||
* Eve Online
|
* Eve Online
|
||||||
* Facebook
|
* Facebook
|
||||||
* Fitbit
|
* Fitbit
|
||||||
|
* Gitea
|
||||||
* GitHub
|
* GitHub
|
||||||
* Gitlab
|
* Gitlab
|
||||||
* Google
|
* Google
|
||||||
@ -41,13 +42,17 @@ $ go get github.com/markbates/goth
|
|||||||
* Intercom
|
* Intercom
|
||||||
* Lastfm
|
* Lastfm
|
||||||
* Linkedin
|
* Linkedin
|
||||||
|
* LINE
|
||||||
|
* Mailru
|
||||||
* Meetup
|
* Meetup
|
||||||
* MicrosoftOnline
|
* MicrosoftOnline
|
||||||
* Naver
|
* Naver
|
||||||
|
* Nextcloud
|
||||||
* OneDrive
|
* OneDrive
|
||||||
* OpenID Connect (auto discovery)
|
* OpenID Connect (auto discovery)
|
||||||
* Paypal
|
* Paypal
|
||||||
* SalesForce
|
* SalesForce
|
||||||
|
* Shopify
|
||||||
* Slack
|
* Slack
|
||||||
* Soundcloud
|
* Soundcloud
|
||||||
* Spotify
|
* Spotify
|
||||||
|
24
vendor/github.com/markbates/goth/gothic/gothic.go
generated
vendored
24
vendor/github.com/markbates/goth/gothic/gothic.go
generated
vendored
@ -245,19 +245,6 @@ var GetProviderName = getProviderName
|
|||||||
|
|
||||||
func getProviderName(req *http.Request) (string, error) {
|
func getProviderName(req *http.Request) (string, error) {
|
||||||
|
|
||||||
// get all the used providers
|
|
||||||
providers := goth.GetProviders()
|
|
||||||
|
|
||||||
// loop over the used providers, if we already have a valid session for any provider (ie. user is already logged-in with a provider), then return that provider name
|
|
||||||
for _, provider := range providers {
|
|
||||||
p := provider.Name()
|
|
||||||
session, _ := Store.Get(req, p+SessionName)
|
|
||||||
value := session.Values[p]
|
|
||||||
if _, ok := value.(string); ok {
|
|
||||||
return p, nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// try to get it from the url param "provider"
|
// try to get it from the url param "provider"
|
||||||
if p := req.URL.Query().Get("provider"); p != "" {
|
if p := req.URL.Query().Get("provider"); p != "" {
|
||||||
return p, nil
|
return p, nil
|
||||||
@ -278,6 +265,17 @@ func getProviderName(req *http.Request) (string, error) {
|
|||||||
return p, nil
|
return p, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// As a fallback, loop over the used providers, if we already have a valid session for any provider (ie. user has already begun authentication with a provider), then return that provider name
|
||||||
|
providers := goth.GetProviders()
|
||||||
|
session, _ := Store.Get(req, SessionName)
|
||||||
|
for _, provider := range providers {
|
||||||
|
p := provider.Name()
|
||||||
|
value := session.Values[p]
|
||||||
|
if _, ok := value.(string); ok {
|
||||||
|
return p, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// if not found then return an empty string with the corresponding error
|
// if not found then return an empty string with the corresponding error
|
||||||
return "", errors.New("you must select a provider")
|
return "", errors.New("you must select a provider")
|
||||||
}
|
}
|
||||||
|
186
vendor/github.com/markbates/goth/providers/gitea/gitea.go
generated
vendored
Normal file
186
vendor/github.com/markbates/goth/providers/gitea/gitea.go
generated
vendored
Normal file
@ -0,0 +1,186 @@
|
|||||||
|
// Package gitea implements the OAuth2 protocol for authenticating users through gitea.
|
||||||
|
// This package can be used as a reference implementation of an OAuth2 provider for Goth.
|
||||||
|
package gitea
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"encoding/json"
|
||||||
|
"io"
|
||||||
|
"io/ioutil"
|
||||||
|
"net/http"
|
||||||
|
"net/url"
|
||||||
|
"strconv"
|
||||||
|
|
||||||
|
"fmt"
|
||||||
|
"github.com/markbates/goth"
|
||||||
|
"golang.org/x/oauth2"
|
||||||
|
)
|
||||||
|
|
||||||
|
// These vars define the default Authentication, Token, and Profile URLS for Gitea.
|
||||||
|
//
|
||||||
|
// Examples:
|
||||||
|
// gitea.AuthURL = "https://gitea.acme.com/oauth/authorize
|
||||||
|
// gitea.TokenURL = "https://gitea.acme.com/oauth/token
|
||||||
|
// gitea.ProfileURL = "https://gitea.acme.com/api/v3/user
|
||||||
|
var (
|
||||||
|
AuthURL = "https://gitea.com/login/oauth/authorize"
|
||||||
|
TokenURL = "https://gitea.com/login/oauth/access_token"
|
||||||
|
ProfileURL = "https://gitea.com/api/v1/user"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Provider is the implementation of `goth.Provider` for accessing Gitea.
|
||||||
|
type Provider struct {
|
||||||
|
ClientKey string
|
||||||
|
Secret string
|
||||||
|
CallbackURL string
|
||||||
|
HTTPClient *http.Client
|
||||||
|
config *oauth2.Config
|
||||||
|
providerName string
|
||||||
|
authURL string
|
||||||
|
tokenURL string
|
||||||
|
profileURL string
|
||||||
|
}
|
||||||
|
|
||||||
|
// New creates a new Gitea provider and sets up important connection details.
|
||||||
|
// You should always call `gitea.New` to get a new provider. Never try to
|
||||||
|
// create one manually.
|
||||||
|
func New(clientKey, secret, callbackURL string, scopes ...string) *Provider {
|
||||||
|
return NewCustomisedURL(clientKey, secret, callbackURL, AuthURL, TokenURL, ProfileURL, scopes...)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCustomisedURL is similar to New(...) but can be used to set custom URLs to connect to
|
||||||
|
func NewCustomisedURL(clientKey, secret, callbackURL, authURL, tokenURL, profileURL string, scopes ...string) *Provider {
|
||||||
|
p := &Provider{
|
||||||
|
ClientKey: clientKey,
|
||||||
|
Secret: secret,
|
||||||
|
CallbackURL: callbackURL,
|
||||||
|
providerName: "gitea",
|
||||||
|
profileURL: profileURL,
|
||||||
|
}
|
||||||
|
p.config = newConfig(p, authURL, tokenURL, scopes)
|
||||||
|
return p
|
||||||
|
}
|
||||||
|
|
||||||
|
// Name is the name used to retrieve this provider later.
|
||||||
|
func (p *Provider) Name() string {
|
||||||
|
return p.providerName
|
||||||
|
}
|
||||||
|
|
||||||
|
// SetName is to update the name of the provider (needed in case of multiple providers of 1 type)
|
||||||
|
func (p *Provider) SetName(name string) {
|
||||||
|
p.providerName = name
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *Provider) Client() *http.Client {
|
||||||
|
return goth.HTTPClientWithFallBack(p.HTTPClient)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Debug is a no-op for the gitea package.
|
||||||
|
func (p *Provider) Debug(debug bool) {}
|
||||||
|
|
||||||
|
// BeginAuth asks Gitea for an authentication end-point.
|
||||||
|
func (p *Provider) BeginAuth(state string) (goth.Session, error) {
|
||||||
|
return &Session{
|
||||||
|
AuthURL: p.config.AuthCodeURL(state),
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// FetchUser will go to Gitea and access basic information about the user.
|
||||||
|
func (p *Provider) FetchUser(session goth.Session) (goth.User, error) {
|
||||||
|
sess := session.(*Session)
|
||||||
|
user := goth.User{
|
||||||
|
AccessToken: sess.AccessToken,
|
||||||
|
Provider: p.Name(),
|
||||||
|
RefreshToken: sess.RefreshToken,
|
||||||
|
ExpiresAt: sess.ExpiresAt,
|
||||||
|
}
|
||||||
|
|
||||||
|
if user.AccessToken == "" {
|
||||||
|
// data is not yet retrieved since accessToken is still empty
|
||||||
|
return user, fmt.Errorf("%s cannot get user information without accessToken", p.providerName)
|
||||||
|
}
|
||||||
|
|
||||||
|
response, err := p.Client().Get(p.profileURL + "?access_token=" + url.QueryEscape(sess.AccessToken))
|
||||||
|
if err != nil {
|
||||||
|
if response != nil {
|
||||||
|
response.Body.Close()
|
||||||
|
}
|
||||||
|
return user, err
|
||||||
|
}
|
||||||
|
|
||||||
|
defer response.Body.Close()
|
||||||
|
|
||||||
|
if response.StatusCode != http.StatusOK {
|
||||||
|
return user, fmt.Errorf("%s responded with a %d trying to fetch user information", p.providerName, response.StatusCode)
|
||||||
|
}
|
||||||
|
|
||||||
|
bits, err := ioutil.ReadAll(response.Body)
|
||||||
|
if err != nil {
|
||||||
|
return user, err
|
||||||
|
}
|
||||||
|
|
||||||
|
err = json.NewDecoder(bytes.NewReader(bits)).Decode(&user.RawData)
|
||||||
|
if err != nil {
|
||||||
|
return user, err
|
||||||
|
}
|
||||||
|
|
||||||
|
err = userFromReader(bytes.NewReader(bits), &user)
|
||||||
|
|
||||||
|
return user, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func newConfig(provider *Provider, authURL, tokenURL string, scopes []string) *oauth2.Config {
|
||||||
|
c := &oauth2.Config{
|
||||||
|
ClientID: provider.ClientKey,
|
||||||
|
ClientSecret: provider.Secret,
|
||||||
|
RedirectURL: provider.CallbackURL,
|
||||||
|
Endpoint: oauth2.Endpoint{
|
||||||
|
AuthURL: authURL,
|
||||||
|
TokenURL: tokenURL,
|
||||||
|
},
|
||||||
|
Scopes: []string{},
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(scopes) > 0 {
|
||||||
|
for _, scope := range scopes {
|
||||||
|
c.Scopes = append(c.Scopes, scope)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
|
||||||
|
func userFromReader(r io.Reader, user *goth.User) error {
|
||||||
|
u := struct {
|
||||||
|
Name string `json:"full_name"`
|
||||||
|
Email string `json:"email"`
|
||||||
|
NickName string `json:"login"`
|
||||||
|
ID int `json:"id"`
|
||||||
|
AvatarURL string `json:"avatar_url"`
|
||||||
|
}{}
|
||||||
|
err := json.NewDecoder(r).Decode(&u)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
user.Email = u.Email
|
||||||
|
user.Name = u.Name
|
||||||
|
user.NickName = u.NickName
|
||||||
|
user.UserID = strconv.Itoa(u.ID)
|
||||||
|
user.AvatarURL = u.AvatarURL
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
//RefreshTokenAvailable refresh token is provided by auth provider or not
|
||||||
|
func (p *Provider) RefreshTokenAvailable() bool {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
//RefreshToken get new access token based on the refresh token
|
||||||
|
func (p *Provider) RefreshToken(refreshToken string) (*oauth2.Token, error) {
|
||||||
|
token := &oauth2.Token{RefreshToken: refreshToken}
|
||||||
|
ts := p.config.TokenSource(goth.ContextForClient(p.Client()), token)
|
||||||
|
newToken, err := ts.Token()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return newToken, err
|
||||||
|
}
|
63
vendor/github.com/markbates/goth/providers/gitea/session.go
generated
vendored
Normal file
63
vendor/github.com/markbates/goth/providers/gitea/session.go
generated
vendored
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
package gitea
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"errors"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/markbates/goth"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Session stores data during the auth process with Gitea.
|
||||||
|
type Session struct {
|
||||||
|
AuthURL string
|
||||||
|
AccessToken string
|
||||||
|
RefreshToken string
|
||||||
|
ExpiresAt time.Time
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ goth.Session = &Session{}
|
||||||
|
|
||||||
|
// GetAuthURL will return the URL set by calling the `BeginAuth` function on the Gitea provider.
|
||||||
|
func (s Session) GetAuthURL() (string, error) {
|
||||||
|
if s.AuthURL == "" {
|
||||||
|
return "", errors.New(goth.NoAuthUrlErrorMessage)
|
||||||
|
}
|
||||||
|
return s.AuthURL, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Authorize the session with Gitea and return the access token to be stored for future use.
|
||||||
|
func (s *Session) Authorize(provider goth.Provider, params goth.Params) (string, error) {
|
||||||
|
p := provider.(*Provider)
|
||||||
|
token, err := p.config.Exchange(goth.ContextForClient(p.Client()), params.Get("code"))
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
if !token.Valid() {
|
||||||
|
return "", errors.New("Invalid token received from provider")
|
||||||
|
}
|
||||||
|
|
||||||
|
s.AccessToken = token.AccessToken
|
||||||
|
s.RefreshToken = token.RefreshToken
|
||||||
|
s.ExpiresAt = token.Expiry
|
||||||
|
return token.AccessToken, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Marshal the session into a string
|
||||||
|
func (s Session) Marshal() string {
|
||||||
|
b, _ := json.Marshal(s)
|
||||||
|
return string(b)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s Session) String() string {
|
||||||
|
return s.Marshal()
|
||||||
|
}
|
||||||
|
|
||||||
|
// UnmarshalSession wil unmarshal a JSON string into a session.
|
||||||
|
func (p *Provider) UnmarshalSession(data string) (goth.Session, error) {
|
||||||
|
s := &Session{}
|
||||||
|
err := json.NewDecoder(strings.NewReader(data)).Decode(s)
|
||||||
|
return s, err
|
||||||
|
}
|
3
vendor/modules.txt
vendored
3
vendor/modules.txt
vendored
@ -303,13 +303,14 @@ github.com/magiconair/properties
|
|||||||
github.com/mailru/easyjson/buffer
|
github.com/mailru/easyjson/buffer
|
||||||
github.com/mailru/easyjson/jlexer
|
github.com/mailru/easyjson/jlexer
|
||||||
github.com/mailru/easyjson/jwriter
|
github.com/mailru/easyjson/jwriter
|
||||||
# github.com/markbates/goth v1.49.0
|
# github.com/markbates/goth v1.56.0
|
||||||
github.com/markbates/goth
|
github.com/markbates/goth
|
||||||
github.com/markbates/goth/gothic
|
github.com/markbates/goth/gothic
|
||||||
github.com/markbates/goth/providers/bitbucket
|
github.com/markbates/goth/providers/bitbucket
|
||||||
github.com/markbates/goth/providers/discord
|
github.com/markbates/goth/providers/discord
|
||||||
github.com/markbates/goth/providers/dropbox
|
github.com/markbates/goth/providers/dropbox
|
||||||
github.com/markbates/goth/providers/facebook
|
github.com/markbates/goth/providers/facebook
|
||||||
|
github.com/markbates/goth/providers/gitea
|
||||||
github.com/markbates/goth/providers/github
|
github.com/markbates/goth/providers/github
|
||||||
github.com/markbates/goth/providers/gitlab
|
github.com/markbates/goth/providers/gitlab
|
||||||
github.com/markbates/goth/providers/gplus
|
github.com/markbates/goth/providers/gplus
|
||||||
|
Loading…
Reference in New Issue
Block a user