Implement Google OAuth2
This commit is contained in:
182
handler/auth/google/callback/callback.go
Normal file
182
handler/auth/google/callback/callback.go
Normal file
@ -0,0 +1,182 @@
|
||||
package googleOauthCallbackHandler
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"encoding/json"
|
||||
"errors"
|
||||
"fmt"
|
||||
"github.com/fossyy/filekeeper/cache"
|
||||
"github.com/fossyy/filekeeper/db"
|
||||
signinHandler "github.com/fossyy/filekeeper/handler/signin"
|
||||
"github.com/fossyy/filekeeper/logger"
|
||||
"github.com/fossyy/filekeeper/session"
|
||||
"github.com/fossyy/filekeeper/types"
|
||||
"github.com/fossyy/filekeeper/utils"
|
||||
"net/http"
|
||||
"net/url"
|
||||
"sync"
|
||||
"time"
|
||||
)
|
||||
|
||||
//type OauthToken struct {
|
||||
// AccessToken string `json:"access_token"`
|
||||
// ExpiresIn int `json:"expires_in"`
|
||||
// RefreshToken string `json:"refresh_token"`
|
||||
// Scope string `json:"scope"`
|
||||
// TokenType string `json:"token_type"`
|
||||
// IdToken string `json:"id_token"`
|
||||
//}
|
||||
//
|
||||
//type OauthUser struct {
|
||||
// Id string `json:"id"`
|
||||
// Email string `json:"email"`
|
||||
// VerifiedEmail bool `json:"verified_email"`
|
||||
// Name string `json:"name"`
|
||||
// GivenName string `json:"given_name"`
|
||||
// Picture string `json:"picture"`
|
||||
// Locale string `json:"locale"`
|
||||
//}
|
||||
|
||||
type OauthToken struct {
|
||||
AccessToken string `json:"access_token"`
|
||||
}
|
||||
|
||||
type OauthUser struct {
|
||||
Email string `json:"email"`
|
||||
VerifiedEmail bool `json:"verified_email"`
|
||||
}
|
||||
|
||||
type CsrfToken struct {
|
||||
Token string
|
||||
CreateTime time.Time
|
||||
mu sync.Mutex
|
||||
}
|
||||
|
||||
var log *logger.AggregatedLogger
|
||||
var CsrfTokens map[string]*CsrfToken
|
||||
|
||||
func init() {
|
||||
log = logger.Logger()
|
||||
CsrfTokens = make(map[string]*CsrfToken)
|
||||
|
||||
ticker := time.NewTicker(time.Minute)
|
||||
go func() {
|
||||
for {
|
||||
<-ticker.C
|
||||
currentTime := time.Now()
|
||||
cacheClean := 0
|
||||
cleanID := utils.GenerateRandomString(10)
|
||||
log.Info(fmt.Sprintf("Cache cleanup [csrf_token] [%s] initiated at %02d:%02d:%02d", cleanID, currentTime.Hour(), currentTime.Minute(), currentTime.Second()))
|
||||
|
||||
for _, data := range CsrfTokens {
|
||||
data.mu.Lock()
|
||||
if currentTime.Sub(data.CreateTime) > time.Minute-10 {
|
||||
delete(CsrfTokens, data.Token)
|
||||
cacheClean++
|
||||
}
|
||||
data.mu.Unlock()
|
||||
}
|
||||
|
||||
log.Info(fmt.Sprintf("Cache cleanup [csrf_token] [%s] completed: %d entries removed. Finished at %s", cleanID, cacheClean, time.Since(currentTime)))
|
||||
}
|
||||
}()
|
||||
}
|
||||
|
||||
func GET(w http.ResponseWriter, r *http.Request) {
|
||||
if _, ok := CsrfTokens[r.URL.Query().Get("state")]; !ok {
|
||||
http.Error(w, "csrf token mismatch", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
|
||||
delete(CsrfTokens, r.URL.Query().Get("state"))
|
||||
|
||||
formData := url.Values{
|
||||
"grant_type": {"authorization_code"},
|
||||
"code": {r.URL.Query().Get("code")},
|
||||
"client_id": {utils.Getenv("GOOGLE_CLIENT_ID")},
|
||||
"client_secret": {utils.Getenv("GOOGLE_CLIENT_SECRET")},
|
||||
"redirect_uri": {utils.Getenv("GOOGLE_CALLBACK")},
|
||||
}
|
||||
resp, err := http.Post("https://oauth2.googleapis.com/token", "application/x-www-form-urlencoded", bytes.NewBufferString(formData.Encode()))
|
||||
if err != nil {
|
||||
log.Error("Error:", err)
|
||||
http.Error(w, "Failed to get token", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
defer resp.Body.Close()
|
||||
|
||||
var oauthData OauthToken
|
||||
if err := json.NewDecoder(resp.Body).Decode(&oauthData); err != nil {
|
||||
log.Error("Error reading token response body:", err)
|
||||
http.Error(w, "Failed to read token response body", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
|
||||
client := &http.Client{}
|
||||
|
||||
req, err := http.NewRequest("GET", "https://www.googleapis.com/oauth2/v1/userinfo?alt=json", nil)
|
||||
req.Header.Set("Authorization", "Bearer "+oauthData.AccessToken)
|
||||
if err != nil {
|
||||
log.Error("Error creating user info request:", err)
|
||||
http.Error(w, "Failed to create user info request", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
|
||||
userInfoResp, err := client.Do(req)
|
||||
defer userInfoResp.Body.Close()
|
||||
|
||||
var oauthUser OauthUser
|
||||
if err := json.NewDecoder(userInfoResp.Body).Decode(&oauthUser); err != nil {
|
||||
log.Error("Error reading user info response body:", err)
|
||||
http.Error(w, "Failed to read user info response body", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
|
||||
if !db.DB.IsUserRegistered(oauthUser.Email, "ll") {
|
||||
http.Redirect(w, r, "/signup", http.StatusSeeOther)
|
||||
return
|
||||
}
|
||||
|
||||
user, err := cache.GetUser(oauthUser.Email)
|
||||
|
||||
if err != nil {
|
||||
http.Error(w, err.Error(), http.StatusInternalServerError)
|
||||
log.Error(err.Error())
|
||||
return
|
||||
}
|
||||
storeSession := session.GlobalSessionStore.Create()
|
||||
storeSession.Values["user"] = types.User{
|
||||
UserID: user.UserID,
|
||||
Email: oauthUser.Email,
|
||||
Username: user.Username,
|
||||
Authenticated: true,
|
||||
}
|
||||
|
||||
userAgent := r.Header.Get("User-Agent")
|
||||
browserInfo, osInfo := signinHandler.ParseUserAgent(userAgent)
|
||||
|
||||
sessionInfo := session.SessionInfo{
|
||||
SessionID: storeSession.ID,
|
||||
Browser: browserInfo["browser"],
|
||||
Version: browserInfo["version"],
|
||||
OS: osInfo["os"],
|
||||
OSVersion: osInfo["version"],
|
||||
IP: utils.ClientIP(r),
|
||||
Location: "Indonesia",
|
||||
}
|
||||
|
||||
storeSession.Save(w)
|
||||
session.AddSessionInfo(oauthUser.Email, &sessionInfo)
|
||||
|
||||
cookie, err := r.Cookie("redirect")
|
||||
if errors.Is(err, http.ErrNoCookie) {
|
||||
http.Redirect(w, r, "/", http.StatusSeeOther)
|
||||
return
|
||||
}
|
||||
http.SetCookie(w, &http.Cookie{
|
||||
Name: "redirect",
|
||||
MaxAge: -1,
|
||||
})
|
||||
http.Redirect(w, r, cookie.Value, http.StatusSeeOther)
|
||||
return
|
||||
}
|
Reference in New Issue
Block a user