You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

reverseproxy.go 5.9KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Copyright 2019 The Gitea Authors. All rights reserved.
  3. // SPDX-License-Identifier: MIT
  4. package auth
  5. import (
  6. "net/http"
  7. "strings"
  8. user_model "code.gitea.io/gitea/models/user"
  9. "code.gitea.io/gitea/modules/log"
  10. "code.gitea.io/gitea/modules/setting"
  11. "code.gitea.io/gitea/modules/util"
  12. "code.gitea.io/gitea/modules/web/middleware"
  13. "code.gitea.io/gitea/services/mailer"
  14. gouuid "github.com/google/uuid"
  15. )
  16. // Ensure the struct implements the interface.
  17. var (
  18. _ Method = &ReverseProxy{}
  19. _ Named = &ReverseProxy{}
  20. )
  21. // ReverseProxyMethodName is the constant name of the ReverseProxy authentication method
  22. const ReverseProxyMethodName = "reverse_proxy"
  23. // ReverseProxy implements the Auth interface, but actually relies on
  24. // a reverse proxy for authentication of users.
  25. // On successful authentication the proxy is expected to populate the username in the
  26. // "setting.ReverseProxyAuthUser" header. Optionally it can also populate the email of the
  27. // user in the "setting.ReverseProxyAuthEmail" header.
  28. type ReverseProxy struct{}
  29. // getUserName extracts the username from the "setting.ReverseProxyAuthUser" header
  30. func (r *ReverseProxy) getUserName(req *http.Request) string {
  31. return strings.TrimSpace(req.Header.Get(setting.ReverseProxyAuthUser))
  32. }
  33. // Name represents the name of auth method
  34. func (r *ReverseProxy) Name() string {
  35. return ReverseProxyMethodName
  36. }
  37. // getUserFromAuthUser extracts the username from the "setting.ReverseProxyAuthUser" header
  38. // of the request and returns the corresponding user object for that name.
  39. // Verification of header data is not performed as it should have already been done by
  40. // the reverse proxy.
  41. // If a username is available in the "setting.ReverseProxyAuthUser" header an existing
  42. // user object is returned (populated with username or email found in header).
  43. // Returns nil if header is empty.
  44. func (r *ReverseProxy) getUserFromAuthUser(req *http.Request) (*user_model.User, error) {
  45. username := r.getUserName(req)
  46. if len(username) == 0 {
  47. return nil, nil
  48. }
  49. log.Trace("ReverseProxy Authorization: Found username: %s", username)
  50. user, err := user_model.GetUserByName(req.Context(), username)
  51. if err != nil {
  52. if !user_model.IsErrUserNotExist(err) || !r.isAutoRegisterAllowed() {
  53. log.Error("GetUserByName: %v", err)
  54. return nil, err
  55. }
  56. user = r.newUser(req)
  57. }
  58. return user, nil
  59. }
  60. // getEmail extracts the email from the "setting.ReverseProxyAuthEmail" header
  61. func (r *ReverseProxy) getEmail(req *http.Request) string {
  62. return strings.TrimSpace(req.Header.Get(setting.ReverseProxyAuthEmail))
  63. }
  64. // getUserFromAuthEmail extracts the username from the "setting.ReverseProxyAuthEmail" header
  65. // of the request and returns the corresponding user object for that email.
  66. // Verification of header data is not performed as it should have already been done by
  67. // the reverse proxy.
  68. // If an email is available in the "setting.ReverseProxyAuthEmail" header an existing
  69. // user object is returned (populated with the email found in header).
  70. // Returns nil if header is empty or if "setting.EnableReverseProxyEmail" is disabled.
  71. func (r *ReverseProxy) getUserFromAuthEmail(req *http.Request) *user_model.User {
  72. if !setting.Service.EnableReverseProxyEmail {
  73. return nil
  74. }
  75. email := r.getEmail(req)
  76. if len(email) == 0 {
  77. return nil
  78. }
  79. log.Trace("ReverseProxy Authorization: Found email: %s", email)
  80. user, err := user_model.GetUserByEmail(email)
  81. if err != nil {
  82. // Do not allow auto-registration, we don't have a username here
  83. if !user_model.IsErrUserNotExist(err) {
  84. log.Error("GetUserByEmail: %v", err)
  85. }
  86. return nil
  87. }
  88. return user
  89. }
  90. // Verify attempts to load a user object based on headers sent by the reverse proxy.
  91. // First it will attempt to load it based on the username (see docs for getUserFromAuthUser),
  92. // and failing that it will attempt to load it based on the email (see docs for getUserFromAuthEmail).
  93. // Returns nil if the headers are empty or the user is not found.
  94. func (r *ReverseProxy) Verify(req *http.Request, w http.ResponseWriter, store DataStore, sess SessionStore) (*user_model.User, error) {
  95. user, err := r.getUserFromAuthUser(req)
  96. if err != nil {
  97. return nil, err
  98. }
  99. if user == nil {
  100. user = r.getUserFromAuthEmail(req)
  101. if user == nil {
  102. return nil, nil
  103. }
  104. }
  105. // Make sure requests to API paths, attachment downloads, git and LFS do not create a new session
  106. if !middleware.IsAPIPath(req) && !isAttachmentDownload(req) && !isGitRawReleaseOrLFSPath(req) {
  107. if sess != nil && (sess.Get("uid") == nil || sess.Get("uid").(int64) != user.ID) {
  108. handleSignIn(w, req, sess, user)
  109. }
  110. }
  111. store.GetData()["IsReverseProxy"] = true
  112. log.Trace("ReverseProxy Authorization: Logged in user %-v", user)
  113. return user, nil
  114. }
  115. // isAutoRegisterAllowed checks if EnableReverseProxyAutoRegister setting is true
  116. func (r *ReverseProxy) isAutoRegisterAllowed() bool {
  117. return setting.Service.EnableReverseProxyAutoRegister
  118. }
  119. // newUser creates a new user object for the purpose of automatic registration
  120. // and populates its name and email with the information present in request headers.
  121. func (r *ReverseProxy) newUser(req *http.Request) *user_model.User {
  122. username := r.getUserName(req)
  123. if len(username) == 0 {
  124. return nil
  125. }
  126. email := gouuid.New().String() + "@localhost"
  127. if setting.Service.EnableReverseProxyEmail {
  128. webAuthEmail := req.Header.Get(setting.ReverseProxyAuthEmail)
  129. if len(webAuthEmail) > 0 {
  130. email = webAuthEmail
  131. }
  132. }
  133. var fullname string
  134. if setting.Service.EnableReverseProxyFullName {
  135. fullname = req.Header.Get(setting.ReverseProxyAuthFullName)
  136. }
  137. user := &user_model.User{
  138. Name: username,
  139. Email: email,
  140. FullName: fullname,
  141. }
  142. overwriteDefault := user_model.CreateUserOverwriteOptions{
  143. IsActive: util.OptionalBoolTrue,
  144. }
  145. if err := user_model.CreateUser(user, &overwriteDefault); err != nil {
  146. // FIXME: should I create a system notice?
  147. log.Error("CreateUser: %v", err)
  148. return nil
  149. }
  150. mailer.SendRegisterNotifyMail(user)
  151. return user
  152. }