mirror of
https://github.com/rclone/rclone.git
synced 2024-12-18 08:39:05 +08:00
8c3df224ef
* Optional interfaces Copier, Mover, DirMover not done
249 lines
6.6 KiB
Go
249 lines
6.6 KiB
Go
package oauthutil
|
|
|
|
import (
|
|
"crypto/rand"
|
|
"encoding/json"
|
|
"fmt"
|
|
"log"
|
|
"net"
|
|
"net/http"
|
|
"time"
|
|
|
|
"github.com/ncw/rclone/fs"
|
|
"github.com/skratchdot/open-golang/open"
|
|
"golang.org/x/net/context"
|
|
"golang.org/x/oauth2"
|
|
)
|
|
|
|
// configKey is the key used to store the token under
|
|
const configKey = "token"
|
|
|
|
// TitleBarRedirectURL is the OAuth2 redirect URL to use when the authorization
|
|
// code should be returned in the title bar of the browser, with the page text
|
|
// prompting the user to copy the code and paste it in the application.
|
|
const TitleBarRedirectURL = "urn:ietf:wg:oauth:2.0:oob"
|
|
|
|
// oldToken contains an end-user's tokens.
|
|
// This is the data you must store to persist authentication.
|
|
//
|
|
// From the original code.google.com/p/goauth2/oauth package - used
|
|
// for backwards compatibility in the rclone config file
|
|
type oldToken struct {
|
|
AccessToken string
|
|
RefreshToken string
|
|
Expiry time.Time
|
|
}
|
|
|
|
// getToken returns the token saved in the config file under
|
|
// section name.
|
|
func getToken(name string) (*oauth2.Token, error) {
|
|
tokenString, err := fs.ConfigFile.GetValue(string(name), configKey)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if tokenString == "" {
|
|
return nil, fmt.Errorf("Empty token found - please run rclone config again")
|
|
}
|
|
token := new(oauth2.Token)
|
|
err = json.Unmarshal([]byte(tokenString), token)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
// if has data then return it
|
|
if token.AccessToken != "" && token.RefreshToken != "" {
|
|
return token, nil
|
|
}
|
|
// otherwise try parsing as oldToken
|
|
oldtoken := new(oldToken)
|
|
err = json.Unmarshal([]byte(tokenString), oldtoken)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
// Fill in result into new token
|
|
token.AccessToken = oldtoken.AccessToken
|
|
token.RefreshToken = oldtoken.RefreshToken
|
|
token.Expiry = oldtoken.Expiry
|
|
// Save new format in config file
|
|
err = putToken(name, token)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return token, nil
|
|
}
|
|
|
|
// putToken stores the token in the config file
|
|
//
|
|
// This saves the config file if it changes
|
|
func putToken(name string, token *oauth2.Token) error {
|
|
tokenBytes, err := json.Marshal(token)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
tokenString := string(tokenBytes)
|
|
old := fs.ConfigFile.MustValue(name, configKey)
|
|
if tokenString != old {
|
|
fs.ConfigFile.SetValue(name, configKey, tokenString)
|
|
fs.SaveConfig()
|
|
fs.Debug(name, "Saving new token in config file")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// tokenSource stores updated tokens in the config file
|
|
type tokenSource struct {
|
|
Name string
|
|
TokenSource oauth2.TokenSource
|
|
OldToken oauth2.Token
|
|
}
|
|
|
|
// Token returns a token or an error.
|
|
// Token must be safe for concurrent use by multiple goroutines.
|
|
// The returned Token must not be modified.
|
|
//
|
|
// This saves the token in the config file if it has changed
|
|
func (ts *tokenSource) Token() (*oauth2.Token, error) {
|
|
token, err := ts.TokenSource.Token()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if *token != ts.OldToken {
|
|
putToken(ts.Name, token)
|
|
}
|
|
return token, nil
|
|
}
|
|
|
|
// Check interface satisfied
|
|
var _ oauth2.TokenSource = (*tokenSource)(nil)
|
|
|
|
// Context returns a context with our HTTP Client baked in for oauth2
|
|
func Context() context.Context {
|
|
return context.WithValue(nil, oauth2.HTTPClient, fs.Config.Client())
|
|
}
|
|
|
|
// NewClient gets a token from the config file and configures a Client
|
|
// with it
|
|
func NewClient(name string, config *oauth2.Config) (*http.Client, error) {
|
|
token, err := getToken(name)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Set our own http client in the context
|
|
ctx := Context()
|
|
|
|
// Wrap the TokenSource in our TokenSource which saves changed
|
|
// tokens in the config file
|
|
ts := &tokenSource{
|
|
Name: name,
|
|
OldToken: *token,
|
|
TokenSource: config.TokenSource(ctx, token),
|
|
}
|
|
return oauth2.NewClient(ctx, ts), nil
|
|
|
|
}
|
|
|
|
// Config does the initial creation of the token
|
|
//
|
|
// It runs an internal webserver to receive the results
|
|
func ConfigWithWebserver(name string, config *oauth2.Config, bindAddress string) error {
|
|
// See if already have a token
|
|
tokenString := fs.ConfigFile.MustValue(name, "token")
|
|
if tokenString != "" {
|
|
fmt.Printf("Already have a token - refresh?\n")
|
|
if !fs.Confirm() {
|
|
return nil
|
|
}
|
|
}
|
|
|
|
// Make random state
|
|
stateBytes := make([]byte, 16)
|
|
_, err := rand.Read(stateBytes)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
state := fmt.Sprintf("%x", stateBytes)
|
|
|
|
// Prepare webserver
|
|
server := authServer{
|
|
state: state,
|
|
bindAddress: bindAddress,
|
|
}
|
|
if bindAddress != "" {
|
|
go server.Start()
|
|
defer server.Stop()
|
|
}
|
|
|
|
// Generate a URL for the user to visit for authorization.
|
|
authUrl := config.AuthCodeURL(state)
|
|
_ = open.Start(authUrl)
|
|
fmt.Printf("If your browser doesn't open automatically go to the following link\n")
|
|
fmt.Printf("%s\n", authUrl)
|
|
fmt.Printf("Log in, then cut and paste the token that is returned from the browser here\n")
|
|
|
|
// Read the code, and exchange it for a token.
|
|
fmt.Printf("Enter verification code> ")
|
|
authCode := fs.ReadLine()
|
|
token, err := config.Exchange(oauth2.NoContext, authCode)
|
|
if err != nil {
|
|
return fmt.Errorf("Failed to get token: %v", err)
|
|
}
|
|
return putToken(name, token)
|
|
}
|
|
|
|
// Config does the initial creation of the token
|
|
func Config(name string, config *oauth2.Config) error {
|
|
return ConfigWithWebserver(name, config, "")
|
|
}
|
|
|
|
// Local web server for collecting auth
|
|
type authServer struct {
|
|
state string
|
|
listener net.Listener
|
|
bindAddress string
|
|
}
|
|
|
|
// startWebServer runs an internal web server to receive config details
|
|
func (s *authServer) Start() {
|
|
fs.Debug(nil, "Starting auth server on %s", s.bindAddress)
|
|
mux := http.NewServeMux()
|
|
server := &http.Server{
|
|
Addr: s.bindAddress,
|
|
Handler: mux,
|
|
}
|
|
mux.HandleFunc("/favicon.ico", func(w http.ResponseWriter, req *http.Request) {
|
|
http.Error(w, "", 404)
|
|
return
|
|
})
|
|
mux.HandleFunc("/", func(w http.ResponseWriter, req *http.Request) {
|
|
fs.Debug(nil, "Received request on auth server")
|
|
code := req.FormValue("code")
|
|
if code != "" {
|
|
state := req.FormValue("state")
|
|
if state != s.state {
|
|
fs.Debug(nil, "State did not match: want %q got %q", s.state, state)
|
|
fmt.Fprintf(w, "<h1>Failure</h1>\n<p>Auth state doesn't match</p>")
|
|
} else {
|
|
fs.Debug(nil, "Successfully got code")
|
|
fmt.Fprintf(w, "<h1>Success</h1>\n<p>Cut and paste this code into rclone: <code>%s</code></p>", code)
|
|
}
|
|
return
|
|
}
|
|
fs.Debug(nil, "No code found on request")
|
|
fmt.Fprintf(w, "<h1>Failed!</h1>\nNo code found.")
|
|
http.Error(w, "", 500)
|
|
})
|
|
|
|
var err error
|
|
s.listener, err = net.Listen("tcp", s.bindAddress)
|
|
if err != nil {
|
|
log.Fatalf("Failed to start auth webserver: %v", err)
|
|
}
|
|
server.Serve(s.listener)
|
|
fs.Debug(nil, "Closed auth server")
|
|
}
|
|
|
|
func (s *authServer) Stop() {
|
|
fs.Debug(nil, "Closing auth server")
|
|
_ = s.listener.Close()
|
|
}
|