mirror of
https://git.sr.ht/~phw/scotty
synced 2025-04-16 10:09:28 +02:00
OAuth2Strategy interface to abstract the details of the login flow
This allows implementing clients the deviate from the standard OAuth2 flow
This commit is contained in:
parent
780af98e1e
commit
f447a259d4
6 changed files with 130 additions and 27 deletions
|
@ -46,7 +46,7 @@ func Authenticate(service string, backend models.Backend, db storage.Database, c
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return auth, err
|
return auth, err
|
||||||
}
|
}
|
||||||
conf := authenticator.OAuth2Config(redirectURL)
|
conf := authenticator.OAuth2Strategy(redirectURL).Config()
|
||||||
tokenSource := NewDatabaseTokenSource(db, service, &conf, token)
|
tokenSource := NewDatabaseTokenSource(db, service, &conf, token)
|
||||||
authenticator.OAuth2Setup(tokenSource)
|
authenticator.OAuth2Setup(tokenSource)
|
||||||
}
|
}
|
||||||
|
|
|
@ -25,6 +25,7 @@ import (
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/spf13/viper"
|
"github.com/spf13/viper"
|
||||||
|
"go.uploadedlobster.com/scotty/internal/auth"
|
||||||
"go.uploadedlobster.com/scotty/models"
|
"go.uploadedlobster.com/scotty/models"
|
||||||
"golang.org/x/oauth2"
|
"golang.org/x/oauth2"
|
||||||
"golang.org/x/oauth2/spotify"
|
"golang.org/x/oauth2/spotify"
|
||||||
|
@ -44,6 +45,23 @@ func (b *SpotifyApiBackend) FromConfig(config *viper.Viper) models.Backend {
|
||||||
return b
|
return b
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (b *SpotifyApiBackend) OAuth2Strategy(redirectUrl *url.URL) auth.OAuth2Strategy {
|
||||||
|
conf := oauth2.Config{
|
||||||
|
ClientID: b.clientId,
|
||||||
|
ClientSecret: b.clientSecret,
|
||||||
|
Scopes: []string{
|
||||||
|
"user-read-currently-playing",
|
||||||
|
"user-read-recently-played",
|
||||||
|
"user-library-read",
|
||||||
|
"user-library-modify",
|
||||||
|
},
|
||||||
|
RedirectURL: redirectUrl.String(),
|
||||||
|
Endpoint: spotify.Endpoint,
|
||||||
|
}
|
||||||
|
|
||||||
|
return auth.NewStandardStrategy(conf)
|
||||||
|
}
|
||||||
|
|
||||||
func (b *SpotifyApiBackend) OAuth2Config(redirectUrl *url.URL) oauth2.Config {
|
func (b *SpotifyApiBackend) OAuth2Config(redirectUrl *url.URL) oauth2.Config {
|
||||||
return oauth2.Config{
|
return oauth2.Config{
|
||||||
ClientID: b.clientId,
|
ClientID: b.clientId,
|
||||||
|
|
42
cmd/auth.go
42
cmd/auth.go
|
@ -17,14 +17,14 @@ Scotty. If not, see <https://www.gnu.org/licenses/>.
|
||||||
package cmd
|
package cmd
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
"os"
|
||||||
|
|
||||||
"github.com/cli/browser"
|
"github.com/cli/browser"
|
||||||
"github.com/spf13/cobra"
|
"github.com/spf13/cobra"
|
||||||
"github.com/spf13/viper"
|
"github.com/spf13/viper"
|
||||||
"go.uploadedlobster.com/scotty/backends"
|
"go.uploadedlobster.com/scotty/backends"
|
||||||
|
"go.uploadedlobster.com/scotty/internal/auth"
|
||||||
"go.uploadedlobster.com/scotty/models"
|
"go.uploadedlobster.com/scotty/models"
|
||||||
"go.uploadedlobster.com/scotty/storage"
|
"go.uploadedlobster.com/scotty/storage"
|
||||||
"golang.org/x/oauth2"
|
"golang.org/x/oauth2"
|
||||||
|
@ -43,44 +43,36 @@ var authCmd = &cobra.Command{
|
||||||
redirectURL, err := backends.BuildRedirectURL(viper.GetViper(), backend.Name())
|
redirectURL, err := backends.BuildRedirectURL(viper.GetViper(), backend.Name())
|
||||||
cobra.CheckErr(err)
|
cobra.CheckErr(err)
|
||||||
|
|
||||||
ctx := context.Background()
|
|
||||||
conf := backend.OAuth2Config(redirectURL)
|
|
||||||
|
|
||||||
responseChan := make(chan string)
|
|
||||||
|
|
||||||
// Start an HTTP server to listen for the response
|
// Start an HTTP server to listen for the response
|
||||||
http.HandleFunc(redirectURL.Path, func(w http.ResponseWriter, r *http.Request) {
|
responseChan := make(chan auth.CodeResponse)
|
||||||
code := r.URL.Query().Get("code")
|
auth.RunOauth2CallbackServer(*redirectURL, responseChan)
|
||||||
fmt.Fprint(w, "Token received, you can close this window now.")
|
|
||||||
responseChan <- code
|
|
||||||
})
|
|
||||||
|
|
||||||
go http.ListenAndServe(redirectURL.Host, nil)
|
// The backend must provide an authentication strategy
|
||||||
|
strategy := backend.OAuth2Strategy(redirectURL)
|
||||||
|
|
||||||
// use PKCE to protect against CSRF attacks
|
// use PKCE to protect against CSRF attacks
|
||||||
// https://www.ietf.org/archive/id/draft-ietf-oauth-security-topics-22.html#name-countermeasures-6
|
// https://www.ietf.org/archive/id/draft-ietf-oauth-security-topics-22.html#name-countermeasures-6
|
||||||
verifier := oauth2.GenerateVerifier()
|
verifier := oauth2.GenerateVerifier()
|
||||||
|
|
||||||
// Redirect user to consent page to ask for permission
|
state := "somestate" // FIXME: Should be a random string
|
||||||
// for the scopes specified above.
|
// Redirect user to consent page to ask for permission specified scopes.
|
||||||
url := conf.AuthCodeURL("state", oauth2.AccessTypeOffline, oauth2.S256ChallengeOption(verifier))
|
url := strategy.AuthCodeURL(verifier, state)
|
||||||
fmt.Printf("Visit the URL for the auth dialog: %v\n", url)
|
fmt.Printf("Visit the URL for the auth dialog: %v\n", url)
|
||||||
|
|
||||||
err = browser.OpenURL(url)
|
err = browser.OpenURL(url)
|
||||||
cobra.CheckErr(err)
|
cobra.CheckErr(err)
|
||||||
|
|
||||||
|
// Retrieve the code from the authentication callback
|
||||||
code := <-responseChan
|
code := <-responseChan
|
||||||
|
if code.State != state {
|
||||||
|
cobra.CompErrorln("Error: oauth state mismatch")
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
// Use the authorization code that is pushed to the redirect
|
// Exchange the code for the authentication token
|
||||||
// URL. Exchange will do the handshake to retrieve the
|
tok, err := strategy.ExchangeToken(code, verifier)
|
||||||
// initial access token. The HTTP Client returned by
|
|
||||||
// conf.Client will refresh the token as necessary.
|
|
||||||
// var code string
|
|
||||||
// _, err = fmt.Scan(&code)
|
|
||||||
// cobra.CheckErr(err)
|
|
||||||
tok, err := conf.Exchange(ctx, code, oauth2.VerifierOption(verifier))
|
|
||||||
cobra.CheckErr(err)
|
cobra.CheckErr(err)
|
||||||
|
|
||||||
|
// Store the retrieved token in the database
|
||||||
db, err := storage.New(viper.GetString("database"))
|
db, err := storage.New(viper.GetString("database"))
|
||||||
cobra.CheckErr(err)
|
cobra.CheckErr(err)
|
||||||
|
|
||||||
|
|
36
internal/auth/callback.go
Normal file
36
internal/auth/callback.go
Normal file
|
@ -0,0 +1,36 @@
|
||||||
|
/*
|
||||||
|
Copyright © 2023 Philipp Wolfer <phw@uploadedlobster.com>
|
||||||
|
|
||||||
|
Scotty is free software: you can redistribute it and/or modify it under the
|
||||||
|
terms of the GNU General Public License as published by the Free Software
|
||||||
|
Foundation, either version 3 of the License, or (at your option) any later version.
|
||||||
|
|
||||||
|
Scotty is distributed in the hope that it will be useful, but WITHOUT ANY
|
||||||
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
||||||
|
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU General Public License along with
|
||||||
|
Scotty. If not, see <https://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package auth
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
"net/url"
|
||||||
|
)
|
||||||
|
|
||||||
|
func RunOauth2CallbackServer(redirectURL url.URL, responseChan chan CodeResponse) {
|
||||||
|
http.HandleFunc(redirectURL.Path, func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
code := r.URL.Query().Get("code")
|
||||||
|
state := r.URL.Query().Get("state")
|
||||||
|
fmt.Fprint(w, "Token received, you can close this window now.")
|
||||||
|
responseChan <- CodeResponse{
|
||||||
|
Code: code,
|
||||||
|
State: state,
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
go http.ListenAndServe(redirectURL.Host, nil)
|
||||||
|
}
|
56
internal/auth/strategy.go
Normal file
56
internal/auth/strategy.go
Normal file
|
@ -0,0 +1,56 @@
|
||||||
|
/*
|
||||||
|
Copyright © 2023 Philipp Wolfer <phw@uploadedlobster.com>
|
||||||
|
|
||||||
|
Scotty is free software: you can redistribute it and/or modify it under the
|
||||||
|
terms of the GNU General Public License as published by the Free Software
|
||||||
|
Foundation, either version 3 of the License, or (at your option) any later version.
|
||||||
|
|
||||||
|
Scotty is distributed in the hope that it will be useful, but WITHOUT ANY
|
||||||
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
||||||
|
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU General Public License along with
|
||||||
|
Scotty. If not, see <https://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package auth
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
|
||||||
|
"golang.org/x/oauth2"
|
||||||
|
)
|
||||||
|
|
||||||
|
type OAuth2Strategy interface {
|
||||||
|
Config() oauth2.Config
|
||||||
|
|
||||||
|
AuthCodeURL(verifier string, state string) string
|
||||||
|
|
||||||
|
ExchangeToken(code CodeResponse, verifier string) (*oauth2.Token, error)
|
||||||
|
}
|
||||||
|
|
||||||
|
type CodeResponse struct {
|
||||||
|
Code string
|
||||||
|
State string
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewStandardStrategy(conf oauth2.Config) OAuth2Strategy {
|
||||||
|
return StandardStrategy{conf: conf}
|
||||||
|
}
|
||||||
|
|
||||||
|
type StandardStrategy struct {
|
||||||
|
conf oauth2.Config
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s StandardStrategy) Config() oauth2.Config {
|
||||||
|
return s.conf
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s StandardStrategy) AuthCodeURL(verifier string, state string) string {
|
||||||
|
return s.conf.AuthCodeURL(state, oauth2.AccessTypeOffline, oauth2.S256ChallengeOption(verifier))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s StandardStrategy) ExchangeToken(code CodeResponse, verifier string) (*oauth2.Token, error) {
|
||||||
|
ctx := context.Background()
|
||||||
|
return s.conf.Exchange(ctx, code.Code, oauth2.VerifierOption(verifier))
|
||||||
|
}
|
|
@ -21,6 +21,7 @@ import (
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/spf13/viper"
|
"github.com/spf13/viper"
|
||||||
|
"go.uploadedlobster.com/scotty/internal/auth"
|
||||||
"golang.org/x/oauth2"
|
"golang.org/x/oauth2"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -87,7 +88,7 @@ type OAuth2Authenticator interface {
|
||||||
Backend
|
Backend
|
||||||
|
|
||||||
// Returns OAuth2 config suitable for this backend
|
// Returns OAuth2 config suitable for this backend
|
||||||
OAuth2Config(redirectUrl *url.URL) oauth2.Config
|
OAuth2Strategy(redirectUrl *url.URL) auth.OAuth2Strategy
|
||||||
|
|
||||||
// Setup the OAuth2 client
|
// Setup the OAuth2 client
|
||||||
OAuth2Setup(token oauth2.TokenSource) error
|
OAuth2Setup(token oauth2.TokenSource) error
|
||||||
|
|
Loading…
Add table
Reference in a new issue