Support for multiple oauth backends

This commit is contained in:
choelzl 2022-08-07 23:27:57 +02:00
parent b468a9dacc
commit 77ad2a5818
No known key found for this signature in database
GPG key ID: A362EA0491E2EEA0
7 changed files with 78 additions and 43 deletions

View file

@ -296,8 +296,8 @@ https_only: false
#admins: [""] #admins: [""]
## ##
## Force Authentication Backend ## List of Enabled Authentication Backend
## If not provided falls back to the type query parameter ## If not provided falls back to enabling all
## ##
## Supported Values: ## Supported Values:
## - invidious ## - invidious
@ -306,18 +306,24 @@ https_only: false
## - ldap (Not implemented !) ## - ldap (Not implemented !)
## - saml (Not implemented !) ## - saml (Not implemented !)
## ##
## Default: nil ## Default: ["invidious","google","oauth"]
## ##
# auth_type: oauth # auth_type: ["oauth"]
## ##
## OAuth Configuration ## OAuth Configuration
## ##
## Notes:
## - Supports multiple OAuth backends
## - Requires external_port and domain to be configured
##
## Default: []
##
# oauth: # oauth:
# host: oauth.example.net # - host: oauth.example.net
# auth_uri: /oauth/authorize # auth_uri: /oauth/authorize/
# token_uri: /oauth/token # token_uri: /oauth/token/
# info_uri: /oauth/userinfo # info_uri: /oauth/userinfo/
# client_id: CLIENT_ID # client_id: CLIENT_ID
# client_secret: CLIENT_SECRET # client_secret: CLIENT_SECRET
# redirect_uri: https://invidious.example.net/login/oauth # redirect_uri: https://invidious.example.net/login/oauth

View file

@ -17,7 +17,6 @@ struct OAuthConfig
property info_uri : String property info_uri : String
property client_id : String property client_id : String
property client_secret : String property client_secret : String
property redirect_uri : String
end end
struct ConfigPreferences struct ConfigPreferences
@ -135,8 +134,8 @@ class Config
# Use quic transport for youtube api # Use quic transport for youtube api
property use_quic : Bool = false property use_quic : Bool = false
property auth_type : String? = nil property auth_type : Array(String) = ["invidious", "google", "oauth"] of String
property oauth : OAuthConfig? = nil property oauth : Array(OAuthConfig) = [] of OAuthConfig
# Saved cookies in "name1=value1; name2=value2..." format # Saved cookies in "name1=value1; name2=value2..." format
@[YAML::Field(converter: Preferences::StringToCookies)] @[YAML::Field(converter: Preferences::StringToCookies)]

View file

@ -1,12 +1,19 @@
def oauth_get() def oauth_get(idx)
if oauth = CONFIG.oauth if HOST_URL == ""
raise Exception.new("Missing domain and port configuration")
end
if idx > CONFIG.oauth.size
raise Exception.new("Invalid OAuth Endpoint Index: " + idx.to_s)
end
if oauth = CONFIG.oauth[idx]
oauth_host = oauth.host oauth_host = oauth.host
oauth_auth_uri = oauth.auth_uri oauth_auth_uri = oauth.auth_uri
oauth_token_uri = oauth.token_uri oauth_token_uri = oauth.token_uri
oauth_info_uri = oauth.info_uri oauth_info_uri = oauth.info_uri
oauth_client_id = oauth.client_id oauth_client_id = oauth.client_id
oauth_client_secret = oauth.client_secret oauth_client_secret = oauth.client_secret
oauth_redirect_uri = oauth.redirect_uri oauth_redirect_uri = HOST_URL + "/login/oauth/" + idx.to_s
OAuth2::Client.new(oauth_host, oauth_client_id, oauth_client_secret, OAuth2::Client.new(oauth_host, oauth_client_id, oauth_client_secret,
authorize_uri: oauth_auth_uri, token_uri: oauth_token_uri, authorize_uri: oauth_auth_uri, token_uri: oauth_token_uri,
@ -16,12 +23,16 @@ def oauth_get()
end end
end end
def oauth_auth(authorization_code) def oauth_auth(idx, authorization_code)
oauth_get().get_access_token_using_authorization_code(authorization_code) oauth_get(idx).get_access_token_using_authorization_code(authorization_code)
end end
def oauth_info(token) def oauth_info(idx, token)
if oauth = CONFIG.oauth if idx > CONFIG.oauth.size
raise Exception.new("Invalid OAuth Endpoint Index: " + idx.to_s)
end
if oauth = CONFIG.oauth[idx]
oauth_host = oauth.host oauth_host = oauth.host
oauth_info_uri = oauth.info_uri oauth_info_uri = oauth.info_uri

View file

@ -21,9 +21,16 @@ module Invidious::Routes::Login
account_type = env.params.query["type"]? account_type = env.params.query["type"]?
account_type ||= "invidious" account_type ||= "invidious"
if CONFIG.auth_type if CONFIG.auth_type.find { |i| i == account_type } == nil
account_type = CONFIG.auth_type if CONFIG.auth_type.size == 0
account_type = "invidious"
else
account_type = CONFIG.auth_type[0]
end end
end
oauth = CONFIG.auth_type.find { |i| i == "oauth" } && (CONFIG.oauth.size > 0)
oauth_providers = CONFIG.oauth
captcha_type = env.params.query["captcha"]? captcha_type = env.params.query["captcha"]?
captcha_type ||= "image" captcha_type ||= "image"
@ -43,10 +50,12 @@ module Invidious::Routes::Login
referer = get_referer(env, "/feed/subscriptions") referer = get_referer(env, "/feed/subscriptions")
authorization_code = env.params.query["code"]? authorization_code = env.params.query["code"]?
provider_idx = env.params.url["provider"].to_i
if authorization_code if authorization_code
begin begin
token = oauth_auth(authorization_code) token = oauth_auth(provider_idx, authorization_code)
info = JSON.parse(oauth_info(token)) info = JSON.parse(oauth_info(provider_idx, token))
email = info["email"].as_s email = info["email"].as_s
user = Invidious::Database::Users.select(email: email) user = Invidious::Database::Users.select(email: email)
if user if user
@ -60,10 +69,6 @@ module Invidious::Routes::Login
env.response.cookies << cookie env.response.cookies << cookie
end end
else else
if !CONFIG.registration_enabled
return error_template(400, "Registration has been disabled by administrator.")
end
sid = Base64.urlsafe_encode(Random::Secure.random_bytes(32)) sid = Base64.urlsafe_encode(Random::Secure.random_bytes(32))
user, sid = create_user(sid, email) user, sid = create_user(sid, email)
@ -91,10 +96,10 @@ module Invidious::Routes::Login
env.redirect referer env.redirect referer
rescue rescue
return error_template(403, "Invalid Authorization Code"); return error_template(403, "Invalid Authorization Code")
end end
else else
return error_template(403, "Missing Authorization Code"); return error_template(403, "Missing Authorization Code")
end end
end end
@ -110,12 +115,18 @@ module Invidious::Routes::Login
# https://stackoverflow.com/a/574698 # https://stackoverflow.com/a/574698
email = env.params.body["email"]?.try &.downcase.byte_slice(0, 254) email = env.params.body["email"]?.try &.downcase.byte_slice(0, 254)
password = env.params.body["password"]? password = env.params.body["password"]?
oauth = CONFIG.auth_type.find { |i| i == "oauth" } && (CONFIG.oauth.size > 0)
oauth_providers = CONFIG.oauth
account_type = env.params.query["type"]? account_type = env.params.query["type"]?
account_type ||= "invidious" account_type ||= "invidious"
if CONFIG.auth_type if CONFIG.auth_type.size == 0
account_type = CONFIG.auth_type return error_template(401, "No authentication backend enabled.")
end
if CONFIG.auth_type.find { |i| i == account_type } == nil
account_type = CONFIG.auth_type[0]
end end
case account_type case account_type
@ -381,7 +392,8 @@ module Invidious::Routes::Login
return error_template(500, error_message) return error_template(500, error_message)
end end
when "oauth" when "oauth"
env.redirect oauth_get().get_authorize_uri("openid email profile") provider_idx = env.params.body["provider"].to_i
env.redirect oauth_get(provider_idx).get_authorize_uri("openid email profile")
when "saml" when "saml"
return error_template(500, "Not implemented") return error_template(500, "Not implemented")
when "ldap" when "ldap"

View file

@ -13,7 +13,7 @@ end
macro define_user_routes macro define_user_routes
# User login/out # User login/out
Invidious::Routing.get "/login", Invidious::Routes::Login, :login_page Invidious::Routing.get "/login", Invidious::Routes::Login, :login_page
Invidious::Routing.get "/login/oauth", Invidious::Routes::Login, :login_oauth Invidious::Routing.get "/login/oauth/:provider", Invidious::Routes::Login, :login_oauth
Invidious::Routing.post "/login", Invidious::Routes::Login, :login Invidious::Routing.post "/login", Invidious::Routes::Login, :login
Invidious::Routing.post "/signout", Invidious::Routes::Login, :signout Invidious::Routing.post "/signout", Invidious::Routes::Login, :signout
Invidious::Routing.get "/Captcha", Invidious::Routes::Login, :captcha Invidious::Routing.get "/Captcha", Invidious::Routes::Login, :captcha

View file

@ -90,7 +90,6 @@ def create_user(sid, email)
return user, sid return user, sid
end end
def create_user(sid, email, password) def create_user(sid, email, password)
password = Crypto::Bcrypt::Password.create(password, cost: 10) password = Crypto::Bcrypt::Password.create(password, cost: 10)
token = Base64.urlsafe_encode(Random::Secure.random_bytes(32)) token = Base64.urlsafe_encode(Random::Secure.random_bytes(32))

View file

@ -46,6 +46,11 @@
<% when "oauth" %> <% when "oauth" %>
<form class="pure-form pure-form-stacked" action="/login?referer=<%= URI.encode_www_form(referer) %>&type=oauth" method="post"> <form class="pure-form pure-form-stacked" action="/login?referer=<%= URI.encode_www_form(referer) %>&type=oauth" method="post">
<fieldset> <fieldset>
<select name="provider" id="provider">
<% oauth_providers.each_index do |idx| %>
<option value="<%= idx %>"><%= oauth_providers[idx].host %></option>
<% end %>
</select>
<button type="submit" class="pure-button pure-button-primary"><%= translate(locale, "Sign In via OAuth") %></button> <button type="submit" class="pure-button pure-button-primary"><%= translate(locale, "Sign In via OAuth") %></button>
</fieldset> </fieldset>
</form> </form>
@ -110,6 +115,9 @@
<%= translate(locale, "Sign In") %>/<%= translate(locale, "Register") %> <%= translate(locale, "Sign In") %>/<%= translate(locale, "Register") %>
</button> </button>
<% end %> <% end %>
<% if oauth %>
<a class="pure-button pure-button-secondary" href="/login?referer=<%= URI.encode_www_form(referer) %>&type=oauth">OAuth</a>
<% end %>
</fieldset> </fieldset>
</form> </form>
<% end %> <% end %>