You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

auth.go 9.2KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Copyright 2019 The Gitea Authors. All rights reserved.
  3. // Use of this source code is governed by a MIT-style
  4. // license that can be found in the LICENSE file.
  5. package auth
  6. import (
  7. "reflect"
  8. "strings"
  9. "time"
  10. "github.com/Unknwon/com"
  11. "github.com/go-macaron/binding"
  12. "github.com/go-macaron/session"
  13. gouuid "github.com/satori/go.uuid"
  14. "gopkg.in/macaron.v1"
  15. "code.gitea.io/gitea/models"
  16. "code.gitea.io/gitea/modules/base"
  17. "code.gitea.io/gitea/modules/log"
  18. "code.gitea.io/gitea/modules/setting"
  19. "code.gitea.io/gitea/modules/timeutil"
  20. "code.gitea.io/gitea/modules/validation"
  21. )
  22. // IsAPIPath if URL is an api path
  23. func IsAPIPath(url string) bool {
  24. return strings.HasPrefix(url, "/api/")
  25. }
  26. // SignedInID returns the id of signed in user.
  27. func SignedInID(ctx *macaron.Context, sess session.Store) int64 {
  28. if !models.HasEngine {
  29. return 0
  30. }
  31. // Check access token.
  32. if IsAPIPath(ctx.Req.URL.Path) {
  33. tokenSHA := ctx.Query("token")
  34. if len(tokenSHA) == 0 {
  35. tokenSHA = ctx.Query("access_token")
  36. }
  37. if len(tokenSHA) == 0 {
  38. // Well, check with header again.
  39. auHead := ctx.Req.Header.Get("Authorization")
  40. if len(auHead) > 0 {
  41. auths := strings.Fields(auHead)
  42. if len(auths) == 2 && (auths[0] == "token" || strings.ToLower(auths[0]) == "bearer") {
  43. tokenSHA = auths[1]
  44. }
  45. }
  46. }
  47. // Let's see if token is valid.
  48. if len(tokenSHA) > 0 {
  49. if strings.Contains(tokenSHA, ".") {
  50. uid := CheckOAuthAccessToken(tokenSHA)
  51. if uid != 0 {
  52. ctx.Data["IsApiToken"] = true
  53. }
  54. return uid
  55. }
  56. t, err := models.GetAccessTokenBySHA(tokenSHA)
  57. if err != nil {
  58. if models.IsErrAccessTokenNotExist(err) || models.IsErrAccessTokenEmpty(err) {
  59. log.Error("GetAccessTokenBySHA: %v", err)
  60. }
  61. return 0
  62. }
  63. t.UpdatedUnix = timeutil.TimeStampNow()
  64. if err = models.UpdateAccessToken(t); err != nil {
  65. log.Error("UpdateAccessToken: %v", err)
  66. }
  67. ctx.Data["IsApiToken"] = true
  68. return t.UID
  69. }
  70. }
  71. uid := sess.Get("uid")
  72. if uid == nil {
  73. return 0
  74. } else if id, ok := uid.(int64); ok {
  75. return id
  76. }
  77. return 0
  78. }
  79. // CheckOAuthAccessToken returns uid of user from oauth token token
  80. func CheckOAuthAccessToken(accessToken string) int64 {
  81. // JWT tokens require a "."
  82. if !strings.Contains(accessToken, ".") {
  83. return 0
  84. }
  85. token, err := models.ParseOAuth2Token(accessToken)
  86. if err != nil {
  87. log.Trace("ParseOAuth2Token: %v", err)
  88. return 0
  89. }
  90. var grant *models.OAuth2Grant
  91. if grant, err = models.GetOAuth2GrantByID(token.GrantID); err != nil || grant == nil {
  92. return 0
  93. }
  94. if token.Type != models.TypeAccessToken {
  95. return 0
  96. }
  97. if token.ExpiresAt < time.Now().Unix() || token.IssuedAt > time.Now().Unix() {
  98. return 0
  99. }
  100. return grant.UserID
  101. }
  102. // SignedInUser returns the user object of signed user.
  103. // It returns a bool value to indicate whether user uses basic auth or not.
  104. func SignedInUser(ctx *macaron.Context, sess session.Store) (*models.User, bool) {
  105. if !models.HasEngine {
  106. return nil, false
  107. }
  108. if uid := SignedInID(ctx, sess); uid > 0 {
  109. user, err := models.GetUserByID(uid)
  110. if err == nil {
  111. return user, false
  112. } else if !models.IsErrUserNotExist(err) {
  113. log.Error("GetUserById: %v", err)
  114. }
  115. }
  116. if setting.Service.EnableReverseProxyAuth {
  117. webAuthUser := ctx.Req.Header.Get(setting.ReverseProxyAuthUser)
  118. if len(webAuthUser) > 0 {
  119. u, err := models.GetUserByName(webAuthUser)
  120. if err != nil {
  121. if !models.IsErrUserNotExist(err) {
  122. log.Error("GetUserByName: %v", err)
  123. return nil, false
  124. }
  125. // Check if enabled auto-registration.
  126. if setting.Service.EnableReverseProxyAutoRegister {
  127. email := gouuid.NewV4().String() + "@localhost"
  128. if setting.Service.EnableReverseProxyEmail {
  129. webAuthEmail := ctx.Req.Header.Get(setting.ReverseProxyAuthEmail)
  130. if len(webAuthEmail) > 0 {
  131. email = webAuthEmail
  132. }
  133. }
  134. u := &models.User{
  135. Name: webAuthUser,
  136. Email: email,
  137. Passwd: webAuthUser,
  138. IsActive: true,
  139. }
  140. if err = models.CreateUser(u); err != nil {
  141. // FIXME: should I create a system notice?
  142. log.Error("CreateUser: %v", err)
  143. return nil, false
  144. }
  145. return u, false
  146. }
  147. }
  148. return u, false
  149. }
  150. }
  151. // Check with basic auth.
  152. baHead := ctx.Req.Header.Get("Authorization")
  153. if len(baHead) > 0 {
  154. auths := strings.Fields(baHead)
  155. if len(auths) == 2 && auths[0] == "Basic" {
  156. var u *models.User
  157. uname, passwd, _ := base.BasicAuthDecode(auths[1])
  158. // Check if username or password is a token
  159. isUsernameToken := len(passwd) == 0 || passwd == "x-oauth-basic"
  160. // Assume username is token
  161. authToken := uname
  162. if !isUsernameToken {
  163. // Assume password is token
  164. authToken = passwd
  165. }
  166. uid := CheckOAuthAccessToken(authToken)
  167. if uid != 0 {
  168. var err error
  169. ctx.Data["IsApiToken"] = true
  170. u, err = models.GetUserByID(uid)
  171. if err != nil {
  172. log.Error("GetUserByID: %v", err)
  173. return nil, false
  174. }
  175. }
  176. token, err := models.GetAccessTokenBySHA(authToken)
  177. if err == nil {
  178. if isUsernameToken {
  179. u, err = models.GetUserByID(token.UID)
  180. if err != nil {
  181. log.Error("GetUserByID: %v", err)
  182. return nil, false
  183. }
  184. } else {
  185. u, err = models.GetUserByName(uname)
  186. if err != nil {
  187. log.Error("GetUserByID: %v", err)
  188. return nil, false
  189. }
  190. if u.ID != token.UID {
  191. return nil, false
  192. }
  193. }
  194. token.UpdatedUnix = timeutil.TimeStampNow()
  195. if err = models.UpdateAccessToken(token); err != nil {
  196. log.Error("UpdateAccessToken: %v", err)
  197. }
  198. } else if !models.IsErrAccessTokenNotExist(err) && !models.IsErrAccessTokenEmpty(err) {
  199. log.Error("GetAccessTokenBySha: %v", err)
  200. }
  201. if u == nil {
  202. u, err = models.UserSignIn(uname, passwd)
  203. if err != nil {
  204. if !models.IsErrUserNotExist(err) {
  205. log.Error("UserSignIn: %v", err)
  206. }
  207. return nil, false
  208. }
  209. } else {
  210. ctx.Data["IsApiToken"] = true
  211. }
  212. return u, true
  213. }
  214. }
  215. return nil, false
  216. }
  217. // Form form binding interface
  218. type Form interface {
  219. binding.Validator
  220. }
  221. func init() {
  222. binding.SetNameMapper(com.ToSnakeCase)
  223. }
  224. // AssignForm assign form values back to the template data.
  225. func AssignForm(form interface{}, data map[string]interface{}) {
  226. typ := reflect.TypeOf(form)
  227. val := reflect.ValueOf(form)
  228. if typ.Kind() == reflect.Ptr {
  229. typ = typ.Elem()
  230. val = val.Elem()
  231. }
  232. for i := 0; i < typ.NumField(); i++ {
  233. field := typ.Field(i)
  234. fieldName := field.Tag.Get("form")
  235. // Allow ignored fields in the struct
  236. if fieldName == "-" {
  237. continue
  238. } else if len(fieldName) == 0 {
  239. fieldName = com.ToSnakeCase(field.Name)
  240. }
  241. data[fieldName] = val.Field(i).Interface()
  242. }
  243. }
  244. func getRuleBody(field reflect.StructField, prefix string) string {
  245. for _, rule := range strings.Split(field.Tag.Get("binding"), ";") {
  246. if strings.HasPrefix(rule, prefix) {
  247. return rule[len(prefix) : len(rule)-1]
  248. }
  249. }
  250. return ""
  251. }
  252. // GetSize get size int form tag
  253. func GetSize(field reflect.StructField) string {
  254. return getRuleBody(field, "Size(")
  255. }
  256. // GetMinSize get minimal size in form tag
  257. func GetMinSize(field reflect.StructField) string {
  258. return getRuleBody(field, "MinSize(")
  259. }
  260. // GetMaxSize get max size in form tag
  261. func GetMaxSize(field reflect.StructField) string {
  262. return getRuleBody(field, "MaxSize(")
  263. }
  264. // GetInclude get include in form tag
  265. func GetInclude(field reflect.StructField) string {
  266. return getRuleBody(field, "Include(")
  267. }
  268. func validate(errs binding.Errors, data map[string]interface{}, f Form, l macaron.Locale) binding.Errors {
  269. if errs.Len() == 0 {
  270. return errs
  271. }
  272. data["HasError"] = true
  273. AssignForm(f, data)
  274. typ := reflect.TypeOf(f)
  275. val := reflect.ValueOf(f)
  276. if typ.Kind() == reflect.Ptr {
  277. typ = typ.Elem()
  278. val = val.Elem()
  279. }
  280. for i := 0; i < typ.NumField(); i++ {
  281. field := typ.Field(i)
  282. fieldName := field.Tag.Get("form")
  283. // Allow ignored fields in the struct
  284. if fieldName == "-" {
  285. continue
  286. }
  287. if errs[0].FieldNames[0] == field.Name {
  288. data["Err_"+field.Name] = true
  289. trName := field.Tag.Get("locale")
  290. if len(trName) == 0 {
  291. trName = l.Tr("form." + field.Name)
  292. } else {
  293. trName = l.Tr(trName)
  294. }
  295. switch errs[0].Classification {
  296. case binding.ERR_REQUIRED:
  297. data["ErrorMsg"] = trName + l.Tr("form.require_error")
  298. case binding.ERR_ALPHA_DASH:
  299. data["ErrorMsg"] = trName + l.Tr("form.alpha_dash_error")
  300. case binding.ERR_ALPHA_DASH_DOT:
  301. data["ErrorMsg"] = trName + l.Tr("form.alpha_dash_dot_error")
  302. case validation.ErrGitRefName:
  303. data["ErrorMsg"] = trName + l.Tr("form.git_ref_name_error")
  304. case binding.ERR_SIZE:
  305. data["ErrorMsg"] = trName + l.Tr("form.size_error", GetSize(field))
  306. case binding.ERR_MIN_SIZE:
  307. data["ErrorMsg"] = trName + l.Tr("form.min_size_error", GetMinSize(field))
  308. case binding.ERR_MAX_SIZE:
  309. data["ErrorMsg"] = trName + l.Tr("form.max_size_error", GetMaxSize(field))
  310. case binding.ERR_EMAIL:
  311. data["ErrorMsg"] = trName + l.Tr("form.email_error")
  312. case binding.ERR_URL:
  313. data["ErrorMsg"] = trName + l.Tr("form.url_error")
  314. case binding.ERR_INCLUDE:
  315. data["ErrorMsg"] = trName + l.Tr("form.include_error", GetInclude(field))
  316. default:
  317. data["ErrorMsg"] = l.Tr("form.unknown_error") + " " + errs[0].Classification
  318. }
  319. return errs
  320. }
  321. }
  322. return errs
  323. }