mirror of
https://github.com/1f349/lavender.git
synced 2024-12-22 07:34:06 +00:00
126 lines
3.2 KiB
Go
126 lines
3.2 KiB
Go
package server
|
|
|
|
import (
|
|
"fmt"
|
|
"github.com/1f349/lavender/database"
|
|
"github.com/go-session/session"
|
|
"github.com/julienschmidt/httprouter"
|
|
"net/http"
|
|
"net/url"
|
|
"strings"
|
|
)
|
|
|
|
type UserHandler func(rw http.ResponseWriter, req *http.Request, params httprouter.Params, auth UserAuth)
|
|
|
|
type UserAuth struct {
|
|
Session session.Store
|
|
Data SessionData
|
|
}
|
|
|
|
type SessionData struct {
|
|
ID string
|
|
DisplayName string
|
|
UserInfo UserInfoFields
|
|
}
|
|
|
|
func (u UserAuth) IsGuest() bool {
|
|
return u.Data.ID == ""
|
|
}
|
|
|
|
func (u UserAuth) SaveSessionData() error {
|
|
u.Session.Set("session-data", u.Data)
|
|
return u.Session.Save()
|
|
}
|
|
|
|
func (h *HttpServer) RequireAdminAuthentication(next UserHandler) httprouter.Handle {
|
|
return h.RequireAuthentication(func(rw http.ResponseWriter, req *http.Request, params httprouter.Params, auth UserAuth) {
|
|
var roles string
|
|
if h.DbTx(rw, func(tx *database.Tx) (err error) {
|
|
roles, err = tx.GetUserRoles(auth.Data.ID)
|
|
return
|
|
}) {
|
|
return
|
|
}
|
|
if !HasRole(roles, "lavender:admin") {
|
|
http.Error(rw, "403 Forbidden", http.StatusForbidden)
|
|
return
|
|
}
|
|
next(rw, req, params, auth)
|
|
})
|
|
}
|
|
|
|
func (h *HttpServer) RequireAuthentication(next UserHandler) httprouter.Handle {
|
|
return h.OptionalAuthentication(func(rw http.ResponseWriter, req *http.Request, params httprouter.Params, auth UserAuth) {
|
|
if auth.IsGuest() {
|
|
redirectUrl := PrepareRedirectUrl("/login", req.URL)
|
|
http.Redirect(rw, req, redirectUrl.String(), http.StatusFound)
|
|
return
|
|
}
|
|
next(rw, req, params, auth)
|
|
})
|
|
}
|
|
|
|
func (h *HttpServer) OptionalAuthentication(next UserHandler) httprouter.Handle {
|
|
return func(rw http.ResponseWriter, req *http.Request, params httprouter.Params) {
|
|
auth, err := internalAuthenticationHandler(rw, req)
|
|
if err != nil {
|
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
|
return
|
|
}
|
|
if auth.IsGuest() {
|
|
// if this fails internally it just sees the user as logged out
|
|
h.readLoginDataCookie(rw, req, &auth)
|
|
}
|
|
next(rw, req, params, auth)
|
|
}
|
|
}
|
|
|
|
func internalAuthenticationHandler(rw http.ResponseWriter, req *http.Request) (UserAuth, error) {
|
|
ss, err := session.Start(req.Context(), rw, req)
|
|
if err != nil {
|
|
return UserAuth{}, fmt.Errorf("failed to start session")
|
|
}
|
|
|
|
// get auth object
|
|
userIdRaw, ok := ss.Get("session-data")
|
|
if !ok {
|
|
return UserAuth{Session: ss}, nil
|
|
}
|
|
userData, ok := userIdRaw.(SessionData)
|
|
if !ok {
|
|
ss.Delete("session-data")
|
|
err := ss.Save()
|
|
if err != nil {
|
|
return UserAuth{Session: ss}, fmt.Errorf("failed to reset invalid session data")
|
|
}
|
|
}
|
|
|
|
return UserAuth{Session: ss, Data: userData}, nil
|
|
}
|
|
|
|
func PrepareRedirectUrl(targetPath string, origin *url.URL) *url.URL {
|
|
// find start of query parameters in target path
|
|
n := strings.IndexByte(targetPath, '?')
|
|
v := url.Values{}
|
|
|
|
// parse existing query parameters
|
|
if n != -1 {
|
|
q, err := url.ParseQuery(targetPath[n+1:])
|
|
if err != nil {
|
|
panic("PrepareRedirectUrl: invalid hardcoded target path query parameters")
|
|
}
|
|
v = q
|
|
targetPath = targetPath[:n]
|
|
}
|
|
|
|
// add path of origin as a new query parameter
|
|
orig := origin.Path
|
|
if origin.RawQuery != "" || origin.ForceQuery {
|
|
orig += "?" + origin.RawQuery
|
|
}
|
|
if orig != "" {
|
|
v.Set("redirect", orig)
|
|
}
|
|
return &url.URL{Path: targetPath, RawQuery: v.Encode()}
|
|
}
|