mirror of
https://github.com/hay-kot/homebox.git
synced 2024-11-29 20:15:41 +00:00
03df23d97c
* fix inaccruate 401 error on SQL db error
* init golangci-lint config
* linter autofix
* testify auto fixes
* fix sqlite busy errors
* fix naming
* more linter errors
* fix rest of linter issues
Former-commit-id: e8449b3a73
154 lines
3.9 KiB
Go
154 lines
3.9 KiB
Go
package main
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"net/http"
|
|
"net/url"
|
|
"strings"
|
|
|
|
v1 "github.com/hay-kot/homebox/backend/app/api/handlers/v1"
|
|
"github.com/hay-kot/homebox/backend/internal/core/services"
|
|
"github.com/hay-kot/homebox/backend/internal/data/ent"
|
|
"github.com/hay-kot/homebox/backend/internal/sys/validate"
|
|
"github.com/hay-kot/httpkit/errchain"
|
|
)
|
|
|
|
type tokenHasKey struct {
|
|
key string
|
|
}
|
|
|
|
var hashedToken = tokenHasKey{key: "hashedToken"}
|
|
|
|
type RoleMode int
|
|
|
|
const (
|
|
RoleModeOr RoleMode = 0
|
|
RoleModeAnd RoleMode = 1
|
|
)
|
|
|
|
// mwRoles is a middleware that will validate the required roles are met. All roles
|
|
// are required to be met for the request to be allowed. If the user does not have
|
|
// the required roles, a 403 Forbidden will be returned.
|
|
//
|
|
// WARNING: This middleware _MUST_ be called after mwAuthToken or else it will panic
|
|
func (a *app) mwRoles(rm RoleMode, required ...string) errchain.Middleware {
|
|
return func(next errchain.Handler) errchain.Handler {
|
|
return errchain.HandlerFunc(func(w http.ResponseWriter, r *http.Request) error {
|
|
ctx := r.Context()
|
|
|
|
maybeToken := ctx.Value(hashedToken)
|
|
if maybeToken == nil {
|
|
panic("mwRoles: token not found in context, you must call mwAuthToken before mwRoles")
|
|
}
|
|
|
|
token := maybeToken.(string)
|
|
|
|
roles, err := a.repos.AuthTokens.GetRoles(r.Context(), token)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
outer:
|
|
switch rm {
|
|
case RoleModeOr:
|
|
for _, role := range required {
|
|
if roles.Contains(role) {
|
|
break outer
|
|
}
|
|
}
|
|
return validate.NewRequestError(errors.New("Forbidden"), http.StatusForbidden)
|
|
case RoleModeAnd:
|
|
for _, req := range required {
|
|
if !roles.Contains(req) {
|
|
return validate.NewRequestError(errors.New("Unauthorized"), http.StatusForbidden)
|
|
}
|
|
}
|
|
}
|
|
|
|
return next.ServeHTTP(w, r)
|
|
})
|
|
}
|
|
}
|
|
|
|
type KeyFunc func(r *http.Request) (string, error)
|
|
|
|
func getBearer(r *http.Request) (string, error) {
|
|
auth := r.Header.Get("Authorization")
|
|
if auth == "" {
|
|
return "", errors.New("authorization header is required")
|
|
}
|
|
|
|
return auth, nil
|
|
}
|
|
|
|
func getQuery(r *http.Request) (string, error) {
|
|
token := r.URL.Query().Get("access_token")
|
|
if token == "" {
|
|
return "", errors.New("access_token query is required")
|
|
}
|
|
|
|
token, err := url.QueryUnescape(token)
|
|
if err != nil {
|
|
return "", errors.New("access_token query is required")
|
|
}
|
|
|
|
return token, nil
|
|
}
|
|
|
|
// mwAuthToken is a middleware that will check the database for a stateful token
|
|
// and attach it's user to the request context, or return an appropriate error.
|
|
// Authorization support is by token via Headers or Query Parameter
|
|
//
|
|
// Example:
|
|
// - header = "Bearer 1234567890"
|
|
// - query = "?access_token=1234567890"
|
|
func (a *app) mwAuthToken(next errchain.Handler) errchain.Handler {
|
|
return errchain.HandlerFunc(func(w http.ResponseWriter, r *http.Request) error {
|
|
var requestToken string
|
|
|
|
// We ignore the error to allow the next strategy to be attempted
|
|
{
|
|
cookies, _ := v1.GetCookies(r)
|
|
if cookies != nil {
|
|
requestToken = cookies.Token
|
|
}
|
|
}
|
|
|
|
if requestToken == "" {
|
|
keyFuncs := [...]KeyFunc{
|
|
getBearer,
|
|
getQuery,
|
|
}
|
|
|
|
for _, keyFunc := range keyFuncs {
|
|
token, err := keyFunc(r)
|
|
if err == nil {
|
|
requestToken = token
|
|
break
|
|
}
|
|
}
|
|
}
|
|
|
|
if requestToken == "" {
|
|
return validate.NewRequestError(errors.New("authorization header or query is required"), http.StatusUnauthorized)
|
|
}
|
|
|
|
requestToken = strings.TrimPrefix(requestToken, "Bearer ")
|
|
|
|
r = r.WithContext(context.WithValue(r.Context(), hashedToken, requestToken))
|
|
|
|
usr, err := a.services.User.GetSelf(r.Context(), requestToken)
|
|
// Check the database for the token
|
|
if err != nil {
|
|
if ent.IsNotFound(err) {
|
|
return validate.NewRequestError(errors.New("valid authorization token is required"), http.StatusUnauthorized)
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
r = r.WithContext(services.SetUserCtx(r.Context(), &usr, requestToken))
|
|
return next.ServeHTTP(w, r)
|
|
})
|
|
}
|