Compare commits
	
		
			8 Commits
		
	
	
		
			v1.0.15
			...
			98ea369664
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 98ea369664 | |||
| 62c27305f9 | |||
|   | 7864ed98e6 | ||
| 57d7e0cc69 | |||
| c29340669c | |||
|   | ae06c8fd14 | ||
| 407895337b | |||
| 1d026d3ec4 | 
							
								
								
									
										14
									
								
								CHANGELOG.md
									
									
									
									
									
								
							
							
						
						
									
										14
									
								
								CHANGELOG.md
									
									
									
									
									
								
							| @@ -1,3 +1,17 @@ | ||||
| ## [1.0.17](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/compare/v1.0.16...v1.0.17) (2024-03-10) | ||||
|  | ||||
|  | ||||
| ### Bug Fixes | ||||
|  | ||||
| * Remove superfluous response write ([c293406](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/commit/c29340669ce60e19aca391ac19da3b9d275f1687)) | ||||
|  | ||||
| ## [1.0.16](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/compare/v1.0.15...v1.0.16) (2024-03-10) | ||||
|  | ||||
|  | ||||
| ### Bug Fixes | ||||
|  | ||||
| * Change oath scopes & direct debugging to console. ([1d026d3](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/commit/1d026d3ec450c94f3e0401d35f858db1627f6ef7)) | ||||
|  | ||||
| ## [1.0.15](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/compare/v1.0.14...v1.0.15) (2024-03-10) | ||||
|  | ||||
|  | ||||
|   | ||||
							
								
								
									
										4
									
								
								go.mod
									
									
									
									
									
								
							
							
						
						
									
										4
									
								
								go.mod
									
									
									
									
									
								
							| @@ -5,6 +5,7 @@ go 1.19 | ||||
| require ( | ||||
| 	github.com/breml/rootcerts v0.2.16 | ||||
| 	github.com/gorilla/mux v1.8.1 | ||||
| 	github.com/gorilla/sessions v1.2.2 | ||||
| 	github.com/microsoftgraph/msgraph-sdk-go v1.34.0 | ||||
| 	golang.org/x/oauth2 v0.18.0 | ||||
| ) | ||||
| @@ -14,7 +15,6 @@ require ( | ||||
| 	github.com/golang-jwt/jwt/v5 v5.2.0 // indirect | ||||
| 	github.com/golang/protobuf v1.5.3 // indirect | ||||
| 	github.com/gorilla/securecookie v1.1.2 // indirect | ||||
| 	github.com/gorilla/sessions v1.2.2 // indirect | ||||
| 	github.com/kylelemons/godebug v1.1.0 // indirect | ||||
| 	github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c // indirect | ||||
| 	golang.org/x/crypto v0.21.0 // indirect | ||||
| @@ -28,7 +28,7 @@ require ( | ||||
| 	github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.5.1 | ||||
| 	github.com/Azure/azure-sdk-for-go/sdk/internal v1.5.2 // indirect | ||||
| 	github.com/cjlapao/common-go v0.0.39 // indirect | ||||
| 	github.com/davecgh/go-spew v1.1.1 // indirect | ||||
| 	github.com/davecgh/go-spew v1.1.1 | ||||
| 	github.com/go-logr/logr v1.4.1 // indirect | ||||
| 	github.com/go-logr/stdr v1.2.2 // indirect | ||||
| 	github.com/google/uuid v1.6.0 // indirect | ||||
|   | ||||
							
								
								
									
										1
									
								
								go.sum
									
									
									
									
									
								
							
							
						
						
									
										1
									
								
								go.sum
									
									
									
									
									
								
							| @@ -26,6 +26,7 @@ github.com/golang/protobuf v1.5.3 h1:KhyjKVUg7Usr/dYsdSqoFveMYd5ko72D+zANwlG1mmg | ||||
| github.com/golang/protobuf v1.5.3/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY= | ||||
| github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= | ||||
| github.com/google/go-cmp v0.6.0 h1:ofyhxvXcZhMsU5ulbFiLKl/XBFqE1GSq7atu8tAmTRI= | ||||
| github.com/google/gofuzz v1.2.0 h1:xRy4A+RhZaiKjJ1bPfwQ8sedCA+YS2YcCHW6ec7JMi0= | ||||
| github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0= | ||||
| github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= | ||||
| github.com/gorilla/mux v1.8.1 h1:TuBL49tXwgrFYWhqrNgrUNEY92u81SPhu7sTdzQEiWY= | ||||
|   | ||||
| @@ -2,7 +2,6 @@ package main | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"log" | ||||
| 	"net/http" | ||||
| 	"os" | ||||
| @@ -25,7 +24,7 @@ var config = oauth2.Config{ | ||||
| 	ClientSecret: "XN98Q~Wrp1RfakkihA1BaTKfokOSX9fuB01unanr", | ||||
| 	Endpoint:     microsoft.AzureADEndpoint("ceeae22e-f163-4ac9-b7c2-45972d3aed4f"), | ||||
| 	RedirectURL:  "https://alias.spamasaurus.com/callback", | ||||
| 	Scopes:       []string{"User.Read", "Profile"}, | ||||
| 	Scopes:       []string{"email", "openid", "profile", "user.read"}, | ||||
| } | ||||
|  | ||||
| var sessionStore = sessions.NewCookieStore([]byte("xDDBjhYwyndZty3exGNq2ahE8wHRCR4DfdCJCSoWXAYncfWw2UQDH63QcJ9CkrGx")) | ||||
| @@ -33,7 +32,8 @@ var sessionStore = sessions.NewCookieStore([]byte("xDDBjhYwyndZty3exGNq2ahE8wHRC | ||||
| func rootHandler(w http.ResponseWriter, r *http.Request) { | ||||
| 	session, _ := sessionStore.Get(r, "spamasaurusRex") | ||||
| 	if token, ok := session.Values["token"]; ok { | ||||
| 		w.Write([]byte(spew.Sdump(token))) | ||||
| 		log.Println(spew.Sdump(token)) | ||||
| 		w.Write([]byte("Token retrieved from session")) | ||||
| 	} else { | ||||
| 		url := config.AuthCodeURL("state", oauth2.AccessTypeOffline) | ||||
| 		http.Redirect(w, r, url, http.StatusFound) | ||||
| @@ -45,7 +45,7 @@ func callbackHandler(w http.ResponseWriter, r *http.Request) { | ||||
| 	token, err := config.Exchange(r.Context(), r.URL.Query().Get("code")) | ||||
| 	if err != nil { | ||||
| 		if retrieveErr, ok := err.(*oauth2.RetrieveError); ok { | ||||
| 			w.Write([]byte(retrieveErr.ErrorDescription + " (" + retrieveErr.ErrorCode + ")")) | ||||
| 			log.Println(retrieveErr.ErrorDescription + " (" + retrieveErr.ErrorCode + ")") | ||||
| 		} | ||||
| 		http.Error(w, "Error exchanging code for token", http.StatusInternalServerError) | ||||
| 		return | ||||
| @@ -56,10 +56,10 @@ func callbackHandler(w http.ResponseWriter, r *http.Request) { | ||||
| 	session.Values["token"] = token | ||||
| 	session.Save(r, w) | ||||
|  | ||||
| 	fmt.Fprintln(w, "Authentication successful!") | ||||
| 	// w.Write([]byte("Authentication successful!")) | ||||
|  | ||||
| 	url := "https://alias.spamasaurus.com" | ||||
| 	http.Redirect(w, r, url, http.StatusAccepted) | ||||
| 	http.Redirect(w, r, url, http.StatusSeeOther) | ||||
| } | ||||
|  | ||||
| func healthHandler(w http.ResponseWriter, r *http.Request) { | ||||
|   | ||||
		Reference in New Issue
	
	Block a user