fa6c4792a1
Add a new provider for Bitbucket, can be configured from the options specifying team and/or repository that the user must be part/have access to in order to grant login.
164 lines
3.9 KiB
Go
164 lines
3.9 KiB
Go
package providers
|
|
|
|
import (
|
|
"net/http"
|
|
"net/url"
|
|
"strings"
|
|
|
|
"github.com/pusher/oauth2_proxy/pkg/apis/sessions"
|
|
"github.com/pusher/oauth2_proxy/pkg/logger"
|
|
"github.com/pusher/oauth2_proxy/pkg/requests"
|
|
)
|
|
|
|
// BitbucketProvider represents an Bitbucket based Identity Provider
|
|
type BitbucketProvider struct {
|
|
*ProviderData
|
|
Team string
|
|
Repository string
|
|
}
|
|
|
|
// NewBitbucketProvider initiates a new BitbucketProvider
|
|
func NewBitbucketProvider(p *ProviderData) *BitbucketProvider {
|
|
p.ProviderName = "Bitbucket"
|
|
if p.LoginURL == nil || p.LoginURL.String() == "" {
|
|
p.LoginURL = &url.URL{
|
|
Scheme: "https",
|
|
Host: "bitbucket.org",
|
|
Path: "/site/oauth2/authorize",
|
|
}
|
|
}
|
|
if p.RedeemURL == nil || p.RedeemURL.String() == "" {
|
|
p.RedeemURL = &url.URL{
|
|
Scheme: "https",
|
|
Host: "bitbucket.org",
|
|
Path: "/site/oauth2/access_token",
|
|
}
|
|
}
|
|
if p.ValidateURL == nil || p.ValidateURL.String() == "" {
|
|
p.ValidateURL = &url.URL{
|
|
Scheme: "https",
|
|
Host: "api.bitbucket.org",
|
|
Path: "/2.0/user/emails",
|
|
}
|
|
}
|
|
if p.Scope == "" {
|
|
p.Scope = "email"
|
|
}
|
|
return &BitbucketProvider{ProviderData: p}
|
|
}
|
|
|
|
// SetTeam defines the Bitbucket team the user must be part of
|
|
func (p *BitbucketProvider) SetTeam(team string) {
|
|
p.Team = team
|
|
if !strings.Contains(p.Scope, "team") {
|
|
p.Scope += " team"
|
|
}
|
|
}
|
|
|
|
// SetRepository defines the repository the user must have access to
|
|
func (p *BitbucketProvider) SetRepository(repository string) {
|
|
p.Repository = repository
|
|
if !strings.Contains(p.Scope, "repository") {
|
|
p.Scope += " repository"
|
|
}
|
|
}
|
|
|
|
// GetEmailAddress returns the email of the authenticated user
|
|
func (p *BitbucketProvider) GetEmailAddress(s *sessions.SessionState) (string, error) {
|
|
|
|
var emails struct {
|
|
Values []struct {
|
|
Email string `json:"email"`
|
|
Primary bool `json:"is_primary"`
|
|
}
|
|
}
|
|
var teams struct {
|
|
Values []struct {
|
|
Name string `json:"username"`
|
|
}
|
|
}
|
|
var repositories struct {
|
|
Values []struct {
|
|
FullName string `json:"full_name"`
|
|
}
|
|
}
|
|
req, err := http.NewRequest("GET",
|
|
p.ValidateURL.String()+"?access_token="+s.AccessToken, nil)
|
|
if err != nil {
|
|
logger.Printf("failed building request %s", err)
|
|
return "", err
|
|
}
|
|
err = requests.RequestJSON(req, &emails)
|
|
if err != nil {
|
|
logger.Printf("failed making request %s", err)
|
|
return "", err
|
|
}
|
|
|
|
if p.Team != "" {
|
|
teamURL := &url.URL{}
|
|
*teamURL = *p.ValidateURL
|
|
teamURL.Path = "/2.0/teams"
|
|
req, err = http.NewRequest("GET",
|
|
teamURL.String()+"?role=member&access_token="+s.AccessToken, nil)
|
|
if err != nil {
|
|
logger.Printf("failed building request %s", err)
|
|
return "", err
|
|
}
|
|
err = requests.RequestJSON(req, &teams)
|
|
if err != nil {
|
|
logger.Printf("failed requesting teams membership %s", err)
|
|
return "", err
|
|
}
|
|
var found = false
|
|
for _, team := range teams.Values {
|
|
if p.Team == team.Name {
|
|
found = true
|
|
break
|
|
}
|
|
}
|
|
if found != true {
|
|
logger.Print("team membership test failed, access denied")
|
|
return "", nil
|
|
}
|
|
}
|
|
|
|
if p.Repository != "" {
|
|
repositoriesURL := &url.URL{}
|
|
*repositoriesURL = *p.ValidateURL
|
|
repositoriesURL.Path = "/2.0/repositories/" + strings.Split(p.Repository, "/")[0]
|
|
req, err = http.NewRequest("GET",
|
|
repositoriesURL.String()+"?role=contributor"+
|
|
"&q=full_name="+url.QueryEscape("\""+p.Repository+"\"")+
|
|
"&access_token="+s.AccessToken,
|
|
nil)
|
|
if err != nil {
|
|
logger.Printf("failed building request %s", err)
|
|
return "", err
|
|
}
|
|
err = requests.RequestJSON(req, &repositories)
|
|
if err != nil {
|
|
logger.Printf("failed checking repository access %s", err)
|
|
return "", err
|
|
}
|
|
var found = false
|
|
for _, repository := range repositories.Values {
|
|
if p.Repository == repository.FullName {
|
|
found = true
|
|
break
|
|
}
|
|
}
|
|
if found != true {
|
|
logger.Print("repository access test failed, access denied")
|
|
return "", nil
|
|
}
|
|
}
|
|
|
|
for _, email := range emails.Values {
|
|
if email.Primary {
|
|
return email.Email, nil
|
|
}
|
|
}
|
|
|
|
return "", nil
|
|
}
|