1
0
Fork 0
mirror of https://codeberg.org/forgejo/forgejo.git synced 2024-12-14 11:48:09 -05:00
forgejo/services/auth/source/oauth2
Rowan Bohde 21fdd28f08
allow synchronizing user status from OAuth2 login providers (#31572)
This leverages the existing `sync_external_users` cron job to
synchronize the `IsActive` flag on users who use an OAuth2 provider set
to synchronize. This synchronization is done by checking for expired
access tokens, and using the stored refresh token to request a new
access token. If the response back from the OAuth2 provider is the
`invalid_grant` error code, the user is marked as inactive. However, the
user is able to reactivate their account by logging in the web browser
through their OAuth2 flow.

Also changed to support this is that a linked `ExternalLoginUser` is
always created upon a login or signup via OAuth2.

Ideally, we would also refresh permissions from the configured OAuth
provider (e.g., admin, restricted and group mappings) to match the
implementation of LDAP. However, the OAuth library used for this `goth`,
doesn't seem to support issuing a session via refresh tokens. The
interface provides a [`RefreshToken`
method](https://github.com/markbates/goth/blob/master/provider.go#L20),
but the returned `oauth.Token` doesn't implement the `goth.Session` we
would need to call `FetchUser`. Due to specific implementations, we
would need to build a compatibility function for every provider, since
they cast to concrete types (e.g.
[Azure](https://github.com/markbates/goth/blob/master/providers/azureadv2/azureadv2.go#L132))

---------

Co-authored-by: Kyle D <kdumontnu@gmail.com>
(cherry picked from commit 416c36f3034e228a27258b5a8a15eec4e5e426ba)

Conflicts:
	- tests/integration/auth_ldap_test.go
	  Trivial conflict resolved by manually applying the change.
	- routers/web/auth/oauth.go
	  Technically not a conflict, but the original PR removed the
	  modules/util import, which in our version, is still in use. Added it
	  back.
2024-07-22 15:44:13 +02:00
..
assert_interface_test.go Implement FSFE REUSE for golang files (#21840) 2022-11-27 18:20:29 +00:00
init.go remove util.OptionalBool and related functions (#29513) 2024-03-06 12:10:46 +08:00
jwtsigningkey.go Port "Use general token signing secret" 2024-02-19 20:49:37 +01:00
main_test.go allow synchronizing user status from OAuth2 login providers (#31572) 2024-07-22 15:44:13 +02:00
providers.go Fix tautological conditions (#30735) 2024-05-05 08:59:40 +01:00
providers_base.go Migrate margin and padding helpers to tailwind (#30043) 2024-03-30 07:17:29 +01:00
providers_custom.go Modify OAuth login ui and fix display name, iconurl related logic (#25030) 2023-06-08 16:35:29 +00:00
providers_openid.go Migrate margin and padding helpers to tailwind (#30043) 2024-03-30 07:17:29 +01:00
providers_simple.go Modify OAuth login ui and fix display name, iconurl related logic (#25030) 2023-06-08 16:35:29 +00:00
providers_test.go allow synchronizing user status from OAuth2 login providers (#31572) 2024-07-22 15:44:13 +02:00
source.go allow synchronizing user status from OAuth2 login providers (#31572) 2024-07-22 15:44:13 +02:00
source_authenticate.go Reduce usage of db.DefaultContext (#27073) 2023-09-14 17:09:32 +00:00
source_callout.go feat: implement PKCE when acting as oauth2 client (for user login) 2024-04-29 11:20:26 +02:00
source_name.go Implement FSFE REUSE for golang files (#21840) 2022-11-27 18:20:29 +00:00
source_register.go Handle OpenID discovery URL errors a little nicer when creating/editing sources (#23397) 2023-03-10 01:14:43 -05:00
source_sync.go allow synchronizing user status from OAuth2 login providers (#31572) 2024-07-22 15:44:13 +02:00
source_sync_test.go allow synchronizing user status from OAuth2 login providers (#31572) 2024-07-22 15:44:13 +02:00
store.go fix: Fix to delete cookie when AppSubURL is non-empty (#30375) 2024-04-15 20:01:36 +02:00
token.go Bump github.com/golang-jwt/jwt to v5 (#25975) 2023-07-19 09:57:10 +00:00
urlmapping.go Implement FSFE REUSE for golang files (#21840) 2022-11-27 18:20:29 +00:00