2023-09-06 22:20:09 +01:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
2024-02-09 15:24:40 +00:00
|
|
|
"github.com/1f349/mjwt"
|
|
|
|
"github.com/1f349/mjwt/auth"
|
2023-09-15 13:06:31 +01:00
|
|
|
"github.com/1f349/tulip/database"
|
2024-03-11 12:39:52 +00:00
|
|
|
"github.com/1f349/tulip/database/types"
|
2023-09-06 22:20:09 +01:00
|
|
|
"github.com/julienschmidt/httprouter"
|
|
|
|
"net/http"
|
2023-09-09 01:38:10 +01:00
|
|
|
"net/url"
|
2023-09-24 18:24:16 +01:00
|
|
|
"strings"
|
2023-09-06 22:20:09 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
type UserHandler func(rw http.ResponseWriter, req *http.Request, params httprouter.Params, auth UserAuth)
|
|
|
|
|
|
|
|
type UserAuth struct {
|
2024-02-09 15:24:40 +00:00
|
|
|
ID string
|
2023-09-09 01:38:10 +01:00
|
|
|
NeedOtp bool
|
|
|
|
}
|
|
|
|
|
|
|
|
func (u UserAuth) NextFlowUrl(origin *url.URL) *url.URL {
|
2024-02-09 15:24:40 +00:00
|
|
|
if u.NeedOtp {
|
2023-09-09 01:38:10 +01:00
|
|
|
return PrepareRedirectUrl("/login/otp", origin)
|
|
|
|
}
|
|
|
|
return nil
|
2023-09-06 22:20:09 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func (u UserAuth) IsGuest() bool {
|
2024-02-09 15:24:40 +00:00
|
|
|
return u.ID == ""
|
2023-09-06 22:20:09 +01:00
|
|
|
}
|
|
|
|
|
2023-09-15 13:06:31 +01:00
|
|
|
func (h *HttpServer) RequireAdminAuthentication(next UserHandler) httprouter.Handle {
|
2023-12-19 00:01:08 +00:00
|
|
|
return h.RequireAuthentication(func(rw http.ResponseWriter, req *http.Request, params httprouter.Params, auth UserAuth) {
|
2024-03-11 12:39:52 +00:00
|
|
|
var role types.UserRole
|
|
|
|
if h.DbTx(rw, func(tx *database.Queries) (err error) {
|
|
|
|
role, err = tx.GetUserRole(req.Context(), auth.ID)
|
2023-09-15 13:06:31 +01:00
|
|
|
return
|
|
|
|
}) {
|
|
|
|
return
|
|
|
|
}
|
2024-03-11 12:39:52 +00:00
|
|
|
if role != types.RoleAdmin {
|
2023-09-15 13:06:31 +01:00
|
|
|
http.Error(rw, "403 Forbidden", http.StatusForbidden)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
next(rw, req, params, auth)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2023-12-19 00:01:08 +00:00
|
|
|
func (h *HttpServer) RequireAuthentication(next UserHandler) httprouter.Handle {
|
|
|
|
return h.OptionalAuthentication(false, func(rw http.ResponseWriter, req *http.Request, params httprouter.Params, auth UserAuth) {
|
2023-09-06 22:20:09 +01:00
|
|
|
if auth.IsGuest() {
|
2023-09-09 01:38:10 +01:00
|
|
|
redirectUrl := PrepareRedirectUrl("/login", req.URL)
|
|
|
|
http.Redirect(rw, req, redirectUrl.String(), http.StatusFound)
|
2023-09-06 22:20:09 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
next(rw, req, params, auth)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2023-12-19 00:01:08 +00:00
|
|
|
func (h *HttpServer) OptionalAuthentication(flowPart bool, next UserHandler) httprouter.Handle {
|
2023-09-06 22:20:09 +01:00
|
|
|
return func(rw http.ResponseWriter, req *http.Request, params httprouter.Params) {
|
2024-02-09 15:24:40 +00:00
|
|
|
authData, err := h.internalAuthenticationHandler(req)
|
|
|
|
if err == nil {
|
|
|
|
if n := authData.NextFlowUrl(req.URL); n != nil && !flowPart {
|
|
|
|
http.Redirect(rw, req, n.String(), http.StatusFound)
|
|
|
|
return
|
2023-12-19 00:01:08 +00:00
|
|
|
}
|
|
|
|
}
|
2024-02-09 15:24:40 +00:00
|
|
|
next(rw, req, params, authData)
|
2023-09-06 22:20:09 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-02-09 15:24:40 +00:00
|
|
|
func (h *HttpServer) internalAuthenticationHandler(req *http.Request) (UserAuth, error) {
|
|
|
|
if loginCookie, err := req.Cookie("tulip-login-data"); err == nil {
|
|
|
|
_, b, err := mjwt.ExtractClaims[auth.AccessTokenClaims](h.signingKey, loginCookie.Value)
|
2023-09-06 22:20:09 +01:00
|
|
|
if err != nil {
|
2024-02-09 15:24:40 +00:00
|
|
|
return UserAuth{}, err
|
2023-09-06 22:20:09 +01:00
|
|
|
}
|
2024-02-13 18:47:59 +00:00
|
|
|
return UserAuth{ID: b.Subject, NeedOtp: b.Claims.Perms.Has("needs-otp")}, nil
|
2023-09-06 22:20:09 +01:00
|
|
|
}
|
2024-02-09 15:24:40 +00:00
|
|
|
// not logged in
|
|
|
|
return UserAuth{}, nil
|
2023-09-09 01:38:10 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func PrepareRedirectUrl(targetPath string, origin *url.URL) *url.URL {
|
2023-09-24 18:24:16 +01:00
|
|
|
// find start of query parameters in target path
|
|
|
|
n := strings.IndexByte(targetPath, '?')
|
2023-09-09 01:38:10 +01:00
|
|
|
v := url.Values{}
|
2023-09-24 18:24:16 +01:00
|
|
|
|
|
|
|
// parse existing query parameters
|
|
|
|
if n != -1 {
|
|
|
|
q, err := url.ParseQuery(targetPath[n+1:])
|
|
|
|
if err != nil {
|
|
|
|
panic("PrepareRedirectUrl: invalid hardcoded target path query parameters")
|
|
|
|
}
|
|
|
|
v = q
|
|
|
|
targetPath = targetPath[:n]
|
|
|
|
}
|
|
|
|
|
|
|
|
// add path of origin as a new query parameter
|
2023-09-09 01:38:10 +01:00
|
|
|
orig := origin.Path
|
|
|
|
if origin.RawQuery != "" || origin.ForceQuery {
|
|
|
|
orig += "?" + origin.RawQuery
|
|
|
|
}
|
|
|
|
if orig != "" {
|
|
|
|
v.Set("redirect", orig)
|
|
|
|
}
|
|
|
|
return &url.URL{Path: targetPath, RawQuery: v.Encode()}
|
2023-09-06 22:20:09 +01:00
|
|
|
}
|