auth.go 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156
  1. package auth
  2. import (
  3. "gitote/gitote/models"
  4. "gitote/gitote/models/errors"
  5. "gitote/gitote/pkg/setting"
  6. "gitote/gitote/pkg/tool"
  7. "strings"
  8. "time"
  9. raven "github.com/getsentry/raven-go"
  10. "github.com/go-macaron/session"
  11. gouuid "github.com/satori/go.uuid"
  12. log "gopkg.in/clog.v1"
  13. "gopkg.in/macaron.v1"
  14. )
  15. func IsAPIPath(url string) bool {
  16. return strings.HasPrefix(url, "/api/")
  17. }
  18. // SignedInID returns the id of signed in user, along with one bool value which indicates whether user uses token
  19. // authentication.
  20. func SignedInID(c *macaron.Context, sess session.Store) (_ int64, isTokenAuth bool) {
  21. if !models.HasEngine {
  22. return 0, false
  23. }
  24. // Check access token.
  25. if IsAPIPath(c.Req.URL.Path) {
  26. tokenSHA := c.Query("token")
  27. if len(tokenSHA) <= 0 {
  28. tokenSHA = c.Query("access_token")
  29. }
  30. if len(tokenSHA) == 0 {
  31. // Well, check with header again.
  32. auHead := c.Req.Header.Get("Authorization")
  33. if len(auHead) > 0 {
  34. auths := strings.Fields(auHead)
  35. if len(auths) == 2 && auths[0] == "token" {
  36. tokenSHA = auths[1]
  37. }
  38. }
  39. }
  40. // Let's see if token is valid.
  41. if len(tokenSHA) > 0 {
  42. t, err := models.GetAccessTokenBySHA(tokenSHA)
  43. if err != nil {
  44. if !models.IsErrAccessTokenNotExist(err) && !models.IsErrAccessTokenEmpty(err) {
  45. raven.CaptureErrorAndWait(err, nil)
  46. log.Error(2, "GetAccessTokenBySHA: %v", err)
  47. }
  48. return 0, false
  49. }
  50. t.Updated = time.Now()
  51. if err = models.UpdateAccessToken(t); err != nil {
  52. raven.CaptureErrorAndWait(err, nil)
  53. log.Error(2, "UpdateAccessToken: %v", err)
  54. }
  55. return t.UID, true
  56. }
  57. }
  58. uid := sess.Get("uid")
  59. if uid == nil {
  60. return 0, false
  61. }
  62. if id, ok := uid.(int64); ok {
  63. if _, err := models.GetUserByID(id); err != nil {
  64. if !errors.IsUserNotExist(err) {
  65. raven.CaptureErrorAndWait(err, nil)
  66. log.Error(2, "GetUserByID: %v", err)
  67. }
  68. return 0, false
  69. }
  70. return id, false
  71. }
  72. return 0, false
  73. }
  74. // SignedInUser returns the user object of signed in user, along with two bool values,
  75. // which indicate whether user uses HTTP Basic Authentication or token authentication respectively.
  76. func SignedInUser(ctx *macaron.Context, sess session.Store) (_ *models.User, isBasicAuth bool, isTokenAuth bool) {
  77. if !models.HasEngine {
  78. return nil, false, false
  79. }
  80. uid, isTokenAuth := SignedInID(ctx, sess)
  81. if uid <= 0 {
  82. if setting.Service.EnableReverseProxyAuth {
  83. webAuthUser := ctx.Req.Header.Get(setting.ReverseProxyAuthUser)
  84. if len(webAuthUser) > 0 {
  85. u, err := models.GetUserByName(webAuthUser)
  86. if err != nil {
  87. if !errors.IsUserNotExist(err) {
  88. raven.CaptureErrorAndWait(err, nil)
  89. log.Error(2, "GetUserByName: %v", err)
  90. return nil, false, false
  91. }
  92. // Check if enabled auto-registration.
  93. if setting.Service.EnableReverseProxyAutoRegister {
  94. u := &models.User{
  95. Name: webAuthUser,
  96. Email: gouuid.NewV4().String() + "@localhost",
  97. Passwd: webAuthUser,
  98. ShowAds: true,
  99. IsActive: true,
  100. }
  101. if err = models.CreateUser(u); err != nil {
  102. // FIXME: should I create a system notice?
  103. raven.CaptureErrorAndWait(err, nil)
  104. log.Error(2, "CreateUser: %v", err)
  105. return nil, false, false
  106. } else {
  107. return u, false, false
  108. }
  109. }
  110. }
  111. return u, false, false
  112. }
  113. }
  114. // Check with basic auth.
  115. baHead := ctx.Req.Header.Get("Authorization")
  116. if len(baHead) > 0 {
  117. auths := strings.Fields(baHead)
  118. if len(auths) == 2 && auths[0] == "Basic" {
  119. uname, passwd, _ := tool.BasicAuthDecode(auths[1])
  120. u, err := models.UserLogin(uname, passwd, -1)
  121. if err != nil {
  122. if !errors.IsUserNotExist(err) {
  123. raven.CaptureErrorAndWait(err, nil)
  124. log.Error(2, "UserLogin: %v", err)
  125. }
  126. return nil, false, false
  127. }
  128. return u, true, false
  129. }
  130. }
  131. return nil, false, false
  132. }
  133. u, err := models.GetUserByID(uid)
  134. if err != nil {
  135. raven.CaptureErrorAndWait(err, nil)
  136. log.Error(2, "GetUserByID: %v", err)
  137. return nil, false, false
  138. }
  139. return u, false, isTokenAuth
  140. }