summaryrefslogtreecommitdiffstats
path: root/modules/auth/sso/basic.go
diff options
context:
space:
mode:
Diffstat (limited to 'modules/auth/sso/basic.go')
-rw-r--r--modules/auth/sso/basic.go132
1 files changed, 0 insertions, 132 deletions
diff --git a/modules/auth/sso/basic.go b/modules/auth/sso/basic.go
deleted file mode 100644
index 5551288128..0000000000
--- a/modules/auth/sso/basic.go
+++ /dev/null
@@ -1,132 +0,0 @@
-// Copyright 2014 The Gogs Authors. All rights reserved.
-// Copyright 2019 The Gitea Authors. All rights reserved.
-// Use of this source code is governed by a MIT-style
-// license that can be found in the LICENSE file.
-
-package sso
-
-import (
- "net/http"
- "strings"
-
- "code.gitea.io/gitea/models"
- "code.gitea.io/gitea/modules/base"
- "code.gitea.io/gitea/modules/log"
- "code.gitea.io/gitea/modules/setting"
- "code.gitea.io/gitea/modules/timeutil"
- "code.gitea.io/gitea/modules/web/middleware"
-)
-
-// Ensure the struct implements the interface.
-var (
- _ SingleSignOn = &Basic{}
-)
-
-// Basic implements the SingleSignOn interface and authenticates requests (API requests
-// only) by looking for Basic authentication data or "x-oauth-basic" token in the "Authorization"
-// header.
-type Basic struct {
-}
-
-// Init does nothing as the Basic implementation does not need to allocate any resources
-func (b *Basic) Init() error {
- return nil
-}
-
-// Free does nothing as the Basic implementation does not have to release any resources
-func (b *Basic) Free() error {
- return nil
-}
-
-// IsEnabled returns true as this plugin is enabled by default and its not possible to disable
-// it from settings.
-func (b *Basic) IsEnabled() bool {
- return true
-}
-
-// VerifyAuthData extracts and validates Basic data (username and password/token) from the
-// "Authorization" header of the request and returns the corresponding user object for that
-// name/token on successful validation.
-// Returns nil if header is empty or validation fails.
-func (b *Basic) VerifyAuthData(req *http.Request, w http.ResponseWriter, store DataStore, sess SessionStore) *models.User {
-
- // Basic authentication should only fire on API, Download or on Git or LFSPaths
- if middleware.IsInternalPath(req) || !middleware.IsAPIPath(req) && !isAttachmentDownload(req) && !isGitRawOrLFSPath(req) {
- return nil
- }
-
- baHead := req.Header.Get("Authorization")
- if len(baHead) == 0 {
- return nil
- }
-
- auths := strings.SplitN(baHead, " ", 2)
- if len(auths) != 2 || (auths[0] != "Basic" && auths[0] != "basic") {
- return nil
- }
-
- uname, passwd, _ := base.BasicAuthDecode(auths[1])
-
- // Check if username or password is a token
- isUsernameToken := len(passwd) == 0 || passwd == "x-oauth-basic"
- // Assume username is token
- authToken := uname
- if !isUsernameToken {
- log.Trace("Basic Authorization: Attempting login for: %s", uname)
- // Assume password is token
- authToken = passwd
- } else {
- log.Trace("Basic Authorization: Attempting login with username as token")
- }
-
- uid := CheckOAuthAccessToken(authToken)
- if uid != 0 {
- log.Trace("Basic Authorization: Valid OAuthAccessToken for user[%d]", uid)
-
- u, err := models.GetUserByID(uid)
- if err != nil {
- log.Error("GetUserByID: %v", err)
- return nil
- }
-
- store.GetData()["IsApiToken"] = true
- return u
- }
-
- token, err := models.GetAccessTokenBySHA(authToken)
- if err == nil {
- log.Trace("Basic Authorization: Valid AccessToken for user[%d]", uid)
- u, err := models.GetUserByID(token.UID)
- if err != nil {
- log.Error("GetUserByID: %v", err)
- return nil
- }
-
- token.UpdatedUnix = timeutil.TimeStampNow()
- if err = models.UpdateAccessToken(token); err != nil {
- log.Error("UpdateAccessToken: %v", err)
- }
-
- store.GetData()["IsApiToken"] = true
- return u
- } else if !models.IsErrAccessTokenNotExist(err) && !models.IsErrAccessTokenEmpty(err) {
- log.Error("GetAccessTokenBySha: %v", err)
- }
-
- if !setting.Service.EnableBasicAuth {
- return nil
- }
-
- log.Trace("Basic Authorization: Attempting SignIn for %s", uname)
- u, err := models.UserSignIn(uname, passwd)
- if err != nil {
- if !models.IsErrUserNotExist(err) {
- log.Error("UserSignIn: %v", err)
- }
- return nil
- }
-
- log.Trace("Basic Authorization: Logged in user %-v", u)
-
- return u
-}