tulip/server/auth.go

133 lines
3.3 KiB
Go
Raw Normal View History

2023-09-06 22:20:09 +01:00
package server
import (
"fmt"
"github.com/1f349/tulip/database"
2023-09-06 22:20:09 +01:00
"github.com/go-session/session"
"github.com/google/uuid"
"github.com/julienschmidt/httprouter"
"net/http"
"net/url"
2023-09-24 18:24:16 +01:00
"strings"
2023-09-06 22:20:09 +01:00
)
type UserHandler func(rw http.ResponseWriter, req *http.Request, params httprouter.Params, auth UserAuth)
type UserAuth struct {
Session session.Store
Data SessionData
}
type SessionData struct {
ID uuid.UUID
NeedOtp bool
}
func (u UserAuth) NextFlowUrl(origin *url.URL) *url.URL {
if u.Data.NeedOtp {
return PrepareRedirectUrl("/login/otp", origin)
}
return nil
2023-09-06 22:20:09 +01:00
}
func (u UserAuth) IsGuest() bool {
return u.Data.ID == uuid.Nil
2023-09-06 22:20:09 +01:00
}
func (u UserAuth) SaveSessionData() error {
u.Session.Set("session-data", u.Data)
return u.Session.Save()
2023-09-06 22:20:09 +01:00
}
func (h *HttpServer) RequireAdminAuthentication(next UserHandler) httprouter.Handle {
return RequireAuthentication(func(rw http.ResponseWriter, req *http.Request, params httprouter.Params, auth UserAuth) {
var role database.UserRole
if h.DbTx(rw, func(tx *database.Tx) (err error) {
role, err = tx.GetUserRole(auth.Data.ID)
return
}) {
return
}
if role != database.RoleAdmin {
http.Error(rw, "403 Forbidden", http.StatusForbidden)
return
}
next(rw, req, params, auth)
})
}
func RequireAuthentication(next UserHandler) httprouter.Handle {
return OptionalAuthentication(false, func(rw http.ResponseWriter, req *http.Request, params httprouter.Params, auth UserAuth) {
2023-09-06 22:20:09 +01:00
if auth.IsGuest() {
redirectUrl := PrepareRedirectUrl("/login", req.URL)
http.Redirect(rw, req, redirectUrl.String(), http.StatusFound)
2023-09-06 22:20:09 +01:00
return
}
next(rw, req, params, auth)
})
}
func OptionalAuthentication(flowPart bool, next UserHandler) httprouter.Handle {
2023-09-06 22:20:09 +01:00
return func(rw http.ResponseWriter, req *http.Request, params httprouter.Params) {
auth, err := internalAuthenticationHandler(rw, req)
2023-09-06 22:20:09 +01:00
if err != nil {
http.Error(rw, err.Error(), http.StatusInternalServerError)
return
}
if n := auth.NextFlowUrl(req.URL); n != nil && !flowPart {
http.Redirect(rw, req, n.String(), http.StatusFound)
return
}
2023-09-06 22:20:09 +01:00
next(rw, req, params, auth)
}
}
func internalAuthenticationHandler(rw http.ResponseWriter, req *http.Request) (UserAuth, error) {
2023-09-06 22:20:09 +01:00
ss, err := session.Start(req.Context(), rw, req)
if err != nil {
return UserAuth{}, fmt.Errorf("failed to start session")
}
// get auth object
userIdRaw, ok := ss.Get("session-data")
2023-09-06 22:20:09 +01:00
if !ok {
return UserAuth{Session: ss}, nil
}
userData, ok := userIdRaw.(SessionData)
2023-09-06 22:20:09 +01:00
if !ok {
ss.Delete("session-data")
2023-09-06 22:20:09 +01:00
err := ss.Save()
if err != nil {
return UserAuth{Session: ss}, fmt.Errorf("failed to reset invalid session data")
}
}
return UserAuth{Session: ss, Data: userData}, nil
}
func PrepareRedirectUrl(targetPath string, origin *url.URL) *url.URL {
2023-09-24 18:24:16 +01:00
// find start of query parameters in target path
n := strings.IndexByte(targetPath, '?')
v := url.Values{}
2023-09-24 18:24:16 +01:00
// parse existing query parameters
if n != -1 {
q, err := url.ParseQuery(targetPath[n+1:])
if err != nil {
panic("PrepareRedirectUrl: invalid hardcoded target path query parameters")
}
v = q
targetPath = targetPath[:n]
}
// add path of origin as a new query parameter
orig := origin.Path
if origin.RawQuery != "" || origin.ForceQuery {
orig += "?" + origin.RawQuery
}
if orig != "" {
v.Set("redirect", orig)
}
return &url.URL{Path: targetPath, RawQuery: v.Encode()}
2023-09-06 22:20:09 +01:00
}