Skip to content

Commit 416c36f

Browse files
bohdekdumontnu
andauthored
allow synchronizing user status from OAuth2 login providers (#31572)
This leverages the existing `sync_external_users` cron job to synchronize the `IsActive` flag on users who use an OAuth2 provider set to synchronize. This synchronization is done by checking for expired access tokens, and using the stored refresh token to request a new access token. If the response back from the OAuth2 provider is the `invalid_grant` error code, the user is marked as inactive. However, the user is able to reactivate their account by logging in the web browser through their OAuth2 flow. Also changed to support this is that a linked `ExternalLoginUser` is always created upon a login or signup via OAuth2. ### Notes on updating permissions Ideally, we would also refresh permissions from the configured OAuth provider (e.g., admin, restricted and group mappings) to match the implementation of LDAP. However, the OAuth library used for this `goth`, doesn't seem to support issuing a session via refresh tokens. The interface provides a [`RefreshToken` method](https://github.com/markbates/goth/blob/master/provider.go#L20), but the returned `oauth.Token` doesn't implement the `goth.Session` we would need to call `FetchUser`. Due to specific implementations, we would need to build a compatibility function for every provider, since they cast to concrete types (e.g. [Azure](https://github.com/markbates/goth/blob/master/providers/azureadv2/azureadv2.go#L132)) --------- Co-authored-by: Kyle D <[email protected]>
1 parent 3a7454d commit 416c36f

File tree

13 files changed

+370
-49
lines changed

13 files changed

+370
-49
lines changed

models/auth/source.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ func CreateSource(ctx context.Context, source *Source) error {
210210
return ErrSourceAlreadyExist{source.Name}
211211
}
212212
// Synchronization is only available with LDAP for now
213-
if !source.IsLDAP() {
213+
if !source.IsLDAP() && !source.IsOAuth2() {
214214
source.IsSyncEnabled = false
215215
}
216216

models/user/external_login_user.go

+38-3
Original file line numberDiff line numberDiff line change
@@ -160,12 +160,34 @@ func UpdateExternalUserByExternalID(ctx context.Context, external *ExternalLogin
160160
return err
161161
}
162162

163+
// EnsureLinkExternalToUser link the external user to the user
164+
func EnsureLinkExternalToUser(ctx context.Context, external *ExternalLoginUser) error {
165+
has, err := db.Exist[ExternalLoginUser](ctx, builder.Eq{
166+
"external_id": external.ExternalID,
167+
"login_source_id": external.LoginSourceID,
168+
})
169+
if err != nil {
170+
return err
171+
}
172+
173+
if has {
174+
_, err = db.GetEngine(ctx).Where("external_id=? AND login_source_id=?", external.ExternalID, external.LoginSourceID).AllCols().Update(external)
175+
return err
176+
}
177+
178+
_, err = db.GetEngine(ctx).Insert(external)
179+
return err
180+
}
181+
163182
// FindExternalUserOptions represents an options to find external users
164183
type FindExternalUserOptions struct {
165184
db.ListOptions
166-
Provider string
167-
UserID int64
168-
OrderBy string
185+
Provider string
186+
UserID int64
187+
LoginSourceID int64
188+
HasRefreshToken bool
189+
Expired bool
190+
OrderBy string
169191
}
170192

171193
func (opts FindExternalUserOptions) ToConds() builder.Cond {
@@ -176,9 +198,22 @@ func (opts FindExternalUserOptions) ToConds() builder.Cond {
176198
if opts.UserID > 0 {
177199
cond = cond.And(builder.Eq{"user_id": opts.UserID})
178200
}
201+
if opts.Expired {
202+
cond = cond.And(builder.Lt{"expires_at": time.Now()})
203+
}
204+
if opts.HasRefreshToken {
205+
cond = cond.And(builder.Neq{"refresh_token": ""})
206+
}
207+
if opts.LoginSourceID != 0 {
208+
cond = cond.And(builder.Eq{"login_source_id": opts.LoginSourceID})
209+
}
179210
return cond
180211
}
181212

182213
func (opts FindExternalUserOptions) ToOrders() string {
183214
return opts.OrderBy
184215
}
216+
217+
func IterateExternalLogin(ctx context.Context, opts FindExternalUserOptions, f func(ctx context.Context, u *ExternalLoginUser) error) error {
218+
return db.Iterate(ctx, opts.ToConds(), f)
219+
}

routers/web/auth/auth.go

+2-4
Original file line numberDiff line numberDiff line change
@@ -622,10 +622,8 @@ func handleUserCreated(ctx *context.Context, u *user_model.User, gothUser *goth.
622622

623623
// update external user information
624624
if gothUser != nil {
625-
if err := externalaccount.UpdateExternalUser(ctx, u, *gothUser); err != nil {
626-
if !errors.Is(err, util.ErrNotExist) {
627-
log.Error("UpdateExternalUser failed: %v", err)
628-
}
625+
if err := externalaccount.EnsureLinkExternalToUser(ctx, u, *gothUser); err != nil {
626+
log.Error("EnsureLinkExternalToUser failed: %v", err)
629627
}
630628
}
631629

routers/web/auth/oauth.go

+31-34
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,6 @@ import (
2727
"code.gitea.io/gitea/modules/optional"
2828
"code.gitea.io/gitea/modules/setting"
2929
"code.gitea.io/gitea/modules/timeutil"
30-
"code.gitea.io/gitea/modules/util"
3130
"code.gitea.io/gitea/modules/web"
3231
"code.gitea.io/gitea/modules/web/middleware"
3332
auth_service "code.gitea.io/gitea/services/auth"
@@ -1148,9 +1147,39 @@ func handleOAuth2SignIn(ctx *context.Context, source *auth.Source, u *user_model
11481147

11491148
groups := getClaimedGroups(oauth2Source, &gothUser)
11501149

1150+
opts := &user_service.UpdateOptions{}
1151+
1152+
// Reactivate user if they are deactivated
1153+
if !u.IsActive {
1154+
opts.IsActive = optional.Some(true)
1155+
}
1156+
1157+
// Update GroupClaims
1158+
opts.IsAdmin, opts.IsRestricted = getUserAdminAndRestrictedFromGroupClaims(oauth2Source, &gothUser)
1159+
1160+
if oauth2Source.GroupTeamMap != "" || oauth2Source.GroupTeamMapRemoval {
1161+
if err := source_service.SyncGroupsToTeams(ctx, u, groups, groupTeamMapping, oauth2Source.GroupTeamMapRemoval); err != nil {
1162+
ctx.ServerError("SyncGroupsToTeams", err)
1163+
return
1164+
}
1165+
}
1166+
1167+
if err := externalaccount.EnsureLinkExternalToUser(ctx, u, gothUser); err != nil {
1168+
ctx.ServerError("EnsureLinkExternalToUser", err)
1169+
return
1170+
}
1171+
11511172
// If this user is enrolled in 2FA and this source doesn't override it,
11521173
// we can't sign the user in just yet. Instead, redirect them to the 2FA authentication page.
11531174
if !needs2FA {
1175+
// Register last login
1176+
opts.SetLastLogin = true
1177+
1178+
if err := user_service.UpdateUser(ctx, u, opts); err != nil {
1179+
ctx.ServerError("UpdateUser", err)
1180+
return
1181+
}
1182+
11541183
if err := updateSession(ctx, nil, map[string]any{
11551184
"uid": u.ID,
11561185
"uname": u.Name,
@@ -1162,29 +1191,6 @@ func handleOAuth2SignIn(ctx *context.Context, source *auth.Source, u *user_model
11621191
// Clear whatever CSRF cookie has right now, force to generate a new one
11631192
ctx.Csrf.DeleteCookie(ctx)
11641193

1165-
opts := &user_service.UpdateOptions{
1166-
SetLastLogin: true,
1167-
}
1168-
opts.IsAdmin, opts.IsRestricted = getUserAdminAndRestrictedFromGroupClaims(oauth2Source, &gothUser)
1169-
if err := user_service.UpdateUser(ctx, u, opts); err != nil {
1170-
ctx.ServerError("UpdateUser", err)
1171-
return
1172-
}
1173-
1174-
if oauth2Source.GroupTeamMap != "" || oauth2Source.GroupTeamMapRemoval {
1175-
if err := source_service.SyncGroupsToTeams(ctx, u, groups, groupTeamMapping, oauth2Source.GroupTeamMapRemoval); err != nil {
1176-
ctx.ServerError("SyncGroupsToTeams", err)
1177-
return
1178-
}
1179-
}
1180-
1181-
// update external user information
1182-
if err := externalaccount.UpdateExternalUser(ctx, u, gothUser); err != nil {
1183-
if !errors.Is(err, util.ErrNotExist) {
1184-
log.Error("UpdateExternalUser failed: %v", err)
1185-
}
1186-
}
1187-
11881194
if err := resetLocale(ctx, u); err != nil {
11891195
ctx.ServerError("resetLocale", err)
11901196
return
@@ -1200,22 +1206,13 @@ func handleOAuth2SignIn(ctx *context.Context, source *auth.Source, u *user_model
12001206
return
12011207
}
12021208

1203-
opts := &user_service.UpdateOptions{}
1204-
opts.IsAdmin, opts.IsRestricted = getUserAdminAndRestrictedFromGroupClaims(oauth2Source, &gothUser)
1205-
if opts.IsAdmin.Has() || opts.IsRestricted.Has() {
1209+
if opts.IsActive.Has() || opts.IsAdmin.Has() || opts.IsRestricted.Has() {
12061210
if err := user_service.UpdateUser(ctx, u, opts); err != nil {
12071211
ctx.ServerError("UpdateUser", err)
12081212
return
12091213
}
12101214
}
12111215

1212-
if oauth2Source.GroupTeamMap != "" || oauth2Source.GroupTeamMapRemoval {
1213-
if err := source_service.SyncGroupsToTeams(ctx, u, groups, groupTeamMapping, oauth2Source.GroupTeamMapRemoval); err != nil {
1214-
ctx.ServerError("SyncGroupsToTeams", err)
1215-
return
1216-
}
1217-
}
1218-
12191216
if err := updateSession(ctx, nil, map[string]any{
12201217
// User needs to use 2FA, save data and redirect to 2FA page.
12211218
"twofaUid": u.ID,
+14
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
// Copyright 2024 The Gitea Authors. All rights reserved.
2+
// SPDX-License-Identifier: MIT
3+
4+
package oauth2
5+
6+
import (
7+
"testing"
8+
9+
"code.gitea.io/gitea/models/unittest"
10+
)
11+
12+
func TestMain(m *testing.M) {
13+
unittest.MainTest(m, &unittest.TestOptions{})
14+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
// Copyright 2024 The Gitea Authors. All rights reserved.
2+
// SPDX-License-Identifier: MIT
3+
4+
package oauth2
5+
6+
import (
7+
"time"
8+
9+
"github.com/markbates/goth"
10+
"golang.org/x/oauth2"
11+
)
12+
13+
type fakeProvider struct{}
14+
15+
func (p *fakeProvider) Name() string {
16+
return "fake"
17+
}
18+
19+
func (p *fakeProvider) SetName(name string) {}
20+
21+
func (p *fakeProvider) BeginAuth(state string) (goth.Session, error) {
22+
return nil, nil
23+
}
24+
25+
func (p *fakeProvider) UnmarshalSession(string) (goth.Session, error) {
26+
return nil, nil
27+
}
28+
29+
func (p *fakeProvider) FetchUser(goth.Session) (goth.User, error) {
30+
return goth.User{}, nil
31+
}
32+
33+
func (p *fakeProvider) Debug(bool) {
34+
}
35+
36+
func (p *fakeProvider) RefreshToken(refreshToken string) (*oauth2.Token, error) {
37+
switch refreshToken {
38+
case "expired":
39+
return nil, &oauth2.RetrieveError{
40+
ErrorCode: "invalid_grant",
41+
}
42+
default:
43+
return &oauth2.Token{
44+
AccessToken: "token",
45+
TokenType: "Bearer",
46+
RefreshToken: "refresh",
47+
Expiry: time.Now().Add(time.Hour),
48+
}, nil
49+
}
50+
}
51+
52+
func (p *fakeProvider) RefreshTokenAvailable() bool {
53+
return true
54+
}
55+
56+
func init() {
57+
RegisterGothProvider(
58+
NewSimpleProvider("fake", "Fake", []string{"account"},
59+
func(clientKey, secret, callbackURL string, scopes ...string) goth.Provider {
60+
return &fakeProvider{}
61+
}))
62+
}

services/auth/source/oauth2/source.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ func (source *Source) FromDB(bs []byte) error {
3636
return json.UnmarshalHandleDoubleEncode(bs, &source)
3737
}
3838

39-
// ToDB exports an SMTPConfig to a serialized format.
39+
// ToDB exports an OAuth2Config to a serialized format.
4040
func (source *Source) ToDB() ([]byte, error) {
4141
return json.Marshal(source)
4242
}
+114
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,114 @@
1+
// Copyright 2024 The Gitea Authors. All rights reserved.
2+
// SPDX-License-Identifier: MIT
3+
4+
package oauth2
5+
6+
import (
7+
"context"
8+
"time"
9+
10+
"code.gitea.io/gitea/models/auth"
11+
"code.gitea.io/gitea/models/db"
12+
user_model "code.gitea.io/gitea/models/user"
13+
"code.gitea.io/gitea/modules/log"
14+
15+
"github.com/markbates/goth"
16+
"golang.org/x/oauth2"
17+
)
18+
19+
// Sync causes this OAuth2 source to synchronize its users with the db.
20+
func (source *Source) Sync(ctx context.Context, updateExisting bool) error {
21+
log.Trace("Doing: SyncExternalUsers[%s] %d", source.authSource.Name, source.authSource.ID)
22+
23+
if !updateExisting {
24+
log.Info("SyncExternalUsers[%s] not running since updateExisting is false", source.authSource.Name)
25+
return nil
26+
}
27+
28+
provider, err := createProvider(source.authSource.Name, source)
29+
if err != nil {
30+
return err
31+
}
32+
33+
if !provider.RefreshTokenAvailable() {
34+
log.Trace("SyncExternalUsers[%s] provider doesn't support refresh tokens, can't synchronize", source.authSource.Name)
35+
return nil
36+
}
37+
38+
opts := user_model.FindExternalUserOptions{
39+
HasRefreshToken: true,
40+
Expired: true,
41+
LoginSourceID: source.authSource.ID,
42+
}
43+
44+
return user_model.IterateExternalLogin(ctx, opts, func(ctx context.Context, u *user_model.ExternalLoginUser) error {
45+
return source.refresh(ctx, provider, u)
46+
})
47+
}
48+
49+
func (source *Source) refresh(ctx context.Context, provider goth.Provider, u *user_model.ExternalLoginUser) error {
50+
log.Trace("Syncing login_source_id=%d external_id=%s expiration=%s", u.LoginSourceID, u.ExternalID, u.ExpiresAt)
51+
52+
shouldDisable := false
53+
54+
token, err := provider.RefreshToken(u.RefreshToken)
55+
if err != nil {
56+
if err, ok := err.(*oauth2.RetrieveError); ok && err.ErrorCode == "invalid_grant" {
57+
// this signals that the token is not valid and the user should be disabled
58+
shouldDisable = true
59+
} else {
60+
return err
61+
}
62+
}
63+
64+
user := &user_model.User{
65+
LoginName: u.ExternalID,
66+
LoginType: auth.OAuth2,
67+
LoginSource: u.LoginSourceID,
68+
}
69+
70+
hasUser, err := user_model.GetUser(ctx, user)
71+
if err != nil {
72+
return err
73+
}
74+
75+
// If the grant is no longer valid, disable the user and
76+
// delete local tokens. If the OAuth2 provider still
77+
// recognizes them as a valid user, they will be able to login
78+
// via their provider and reactivate their account.
79+
if shouldDisable {
80+
log.Info("SyncExternalUsers[%s] disabling user %d", source.authSource.Name, user.ID)
81+
82+
return db.WithTx(ctx, func(ctx context.Context) error {
83+
if hasUser {
84+
user.IsActive = false
85+
err := user_model.UpdateUserCols(ctx, user, "is_active")
86+
if err != nil {
87+
return err
88+
}
89+
}
90+
91+
// Delete stored tokens, since they are invalid. This
92+
// also provents us from checking this in subsequent runs.
93+
u.AccessToken = ""
94+
u.RefreshToken = ""
95+
u.ExpiresAt = time.Time{}
96+
97+
return user_model.UpdateExternalUserByExternalID(ctx, u)
98+
})
99+
}
100+
101+
// Otherwise, update the tokens
102+
u.AccessToken = token.AccessToken
103+
u.ExpiresAt = token.Expiry
104+
105+
// Some providers only update access tokens provide a new
106+
// refresh token, so avoid updating it if it's empty
107+
if token.RefreshToken != "" {
108+
u.RefreshToken = token.RefreshToken
109+
}
110+
111+
err = user_model.UpdateExternalUserByExternalID(ctx, u)
112+
113+
return err
114+
}

0 commit comments

Comments
 (0)