You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

auth.go 9.5KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Copyright 2019 The Gitea Authors. All rights reserved.
  3. // Use of this source code is governed by a MIT-style
  4. // license that can be found in the LICENSE file.
  5. package auth
  6. import (
  7. "reflect"
  8. "strings"
  9. "time"
  10. "code.gitea.io/gitea/models"
  11. "code.gitea.io/gitea/modules/base"
  12. "code.gitea.io/gitea/modules/log"
  13. "code.gitea.io/gitea/modules/setting"
  14. "code.gitea.io/gitea/modules/timeutil"
  15. "code.gitea.io/gitea/modules/validation"
  16. "gitea.com/macaron/binding"
  17. "gitea.com/macaron/macaron"
  18. "gitea.com/macaron/session"
  19. gouuid "github.com/satori/go.uuid"
  20. "github.com/unknwon/com"
  21. )
  22. // IsAPIPath if URL is an api path
  23. func IsAPIPath(url string) bool {
  24. return strings.HasPrefix(url, "/api/")
  25. }
  26. // IsAttachmentDownload check if request is a file download (GET) with URL to an attachment
  27. func IsAttachmentDownload(ctx *macaron.Context) bool {
  28. return strings.HasPrefix(ctx.Req.URL.Path, "/attachments/") && ctx.Req.Method == "GET"
  29. }
  30. // SignedInID returns the id of signed in user.
  31. func SignedInID(ctx *macaron.Context, sess session.Store) int64 {
  32. if !models.HasEngine {
  33. return 0
  34. }
  35. // Check access token.
  36. if IsAPIPath(ctx.Req.URL.Path) || IsAttachmentDownload(ctx) {
  37. tokenSHA := ctx.Query("token")
  38. if len(tokenSHA) == 0 {
  39. tokenSHA = ctx.Query("access_token")
  40. }
  41. if len(tokenSHA) == 0 {
  42. // Well, check with header again.
  43. auHead := ctx.Req.Header.Get("Authorization")
  44. if len(auHead) > 0 {
  45. auths := strings.Fields(auHead)
  46. if len(auths) == 2 && (auths[0] == "token" || strings.ToLower(auths[0]) == "bearer") {
  47. tokenSHA = auths[1]
  48. }
  49. }
  50. }
  51. // Let's see if token is valid.
  52. if len(tokenSHA) > 0 {
  53. if strings.Contains(tokenSHA, ".") {
  54. uid := CheckOAuthAccessToken(tokenSHA)
  55. if uid != 0 {
  56. ctx.Data["IsApiToken"] = true
  57. }
  58. return uid
  59. }
  60. t, err := models.GetAccessTokenBySHA(tokenSHA)
  61. if err != nil {
  62. if models.IsErrAccessTokenNotExist(err) || models.IsErrAccessTokenEmpty(err) {
  63. log.Error("GetAccessTokenBySHA: %v", err)
  64. }
  65. return 0
  66. }
  67. t.UpdatedUnix = timeutil.TimeStampNow()
  68. if err = models.UpdateAccessToken(t); err != nil {
  69. log.Error("UpdateAccessToken: %v", err)
  70. }
  71. ctx.Data["IsApiToken"] = true
  72. return t.UID
  73. }
  74. }
  75. uid := sess.Get("uid")
  76. if uid == nil {
  77. return 0
  78. } else if id, ok := uid.(int64); ok {
  79. return id
  80. }
  81. return 0
  82. }
  83. // CheckOAuthAccessToken returns uid of user from oauth token token
  84. func CheckOAuthAccessToken(accessToken string) int64 {
  85. // JWT tokens require a "."
  86. if !strings.Contains(accessToken, ".") {
  87. return 0
  88. }
  89. token, err := models.ParseOAuth2Token(accessToken)
  90. if err != nil {
  91. log.Trace("ParseOAuth2Token: %v", err)
  92. return 0
  93. }
  94. var grant *models.OAuth2Grant
  95. if grant, err = models.GetOAuth2GrantByID(token.GrantID); err != nil || grant == nil {
  96. return 0
  97. }
  98. if token.Type != models.TypeAccessToken {
  99. return 0
  100. }
  101. if token.ExpiresAt < time.Now().Unix() || token.IssuedAt > time.Now().Unix() {
  102. return 0
  103. }
  104. return grant.UserID
  105. }
  106. // SignedInUser returns the user object of signed user.
  107. // It returns a bool value to indicate whether user uses basic auth or not.
  108. func SignedInUser(ctx *macaron.Context, sess session.Store) (*models.User, bool) {
  109. if !models.HasEngine {
  110. return nil, false
  111. }
  112. if uid := SignedInID(ctx, sess); uid > 0 {
  113. user, err := models.GetUserByID(uid)
  114. if err == nil {
  115. return user, false
  116. } else if !models.IsErrUserNotExist(err) {
  117. log.Error("GetUserById: %v", err)
  118. }
  119. }
  120. if setting.Service.EnableReverseProxyAuth {
  121. webAuthUser := ctx.Req.Header.Get(setting.ReverseProxyAuthUser)
  122. if len(webAuthUser) > 0 {
  123. u, err := models.GetUserByName(webAuthUser)
  124. if err != nil {
  125. if !models.IsErrUserNotExist(err) {
  126. log.Error("GetUserByName: %v", err)
  127. return nil, false
  128. }
  129. // Check if enabled auto-registration.
  130. if setting.Service.EnableReverseProxyAutoRegister {
  131. email := gouuid.NewV4().String() + "@localhost"
  132. if setting.Service.EnableReverseProxyEmail {
  133. webAuthEmail := ctx.Req.Header.Get(setting.ReverseProxyAuthEmail)
  134. if len(webAuthEmail) > 0 {
  135. email = webAuthEmail
  136. }
  137. }
  138. u := &models.User{
  139. Name: webAuthUser,
  140. Email: email,
  141. Passwd: webAuthUser,
  142. IsActive: true,
  143. }
  144. if err = models.CreateUser(u); err != nil {
  145. // FIXME: should I create a system notice?
  146. log.Error("CreateUser: %v", err)
  147. return nil, false
  148. }
  149. return u, false
  150. }
  151. }
  152. return u, false
  153. }
  154. }
  155. // Check with basic auth.
  156. baHead := ctx.Req.Header.Get("Authorization")
  157. if len(baHead) > 0 {
  158. auths := strings.Fields(baHead)
  159. if len(auths) == 2 && auths[0] == "Basic" {
  160. var u *models.User
  161. uname, passwd, _ := base.BasicAuthDecode(auths[1])
  162. // Check if username or password is a token
  163. isUsernameToken := len(passwd) == 0 || passwd == "x-oauth-basic"
  164. // Assume username is token
  165. authToken := uname
  166. if !isUsernameToken {
  167. // Assume password is token
  168. authToken = passwd
  169. }
  170. uid := CheckOAuthAccessToken(authToken)
  171. if uid != 0 {
  172. var err error
  173. ctx.Data["IsApiToken"] = true
  174. u, err = models.GetUserByID(uid)
  175. if err != nil {
  176. log.Error("GetUserByID: %v", err)
  177. return nil, false
  178. }
  179. }
  180. token, err := models.GetAccessTokenBySHA(authToken)
  181. if err == nil {
  182. if isUsernameToken {
  183. u, err = models.GetUserByID(token.UID)
  184. if err != nil {
  185. log.Error("GetUserByID: %v", err)
  186. return nil, false
  187. }
  188. } else {
  189. u, err = models.GetUserByName(uname)
  190. if err != nil {
  191. log.Error("GetUserByID: %v", err)
  192. return nil, false
  193. }
  194. if u.ID != token.UID {
  195. return nil, false
  196. }
  197. }
  198. token.UpdatedUnix = timeutil.TimeStampNow()
  199. if err = models.UpdateAccessToken(token); err != nil {
  200. log.Error("UpdateAccessToken: %v", err)
  201. }
  202. } else if !models.IsErrAccessTokenNotExist(err) && !models.IsErrAccessTokenEmpty(err) {
  203. log.Error("GetAccessTokenBySha: %v", err)
  204. }
  205. if u == nil {
  206. u, err = models.UserSignIn(uname, passwd)
  207. if err != nil {
  208. if !models.IsErrUserNotExist(err) {
  209. log.Error("UserSignIn: %v", err)
  210. }
  211. return nil, false
  212. }
  213. } else {
  214. ctx.Data["IsApiToken"] = true
  215. }
  216. return u, true
  217. }
  218. }
  219. return nil, false
  220. }
  221. // Form form binding interface
  222. type Form interface {
  223. binding.Validator
  224. }
  225. func init() {
  226. binding.SetNameMapper(com.ToSnakeCase)
  227. }
  228. // AssignForm assign form values back to the template data.
  229. func AssignForm(form interface{}, data map[string]interface{}) {
  230. typ := reflect.TypeOf(form)
  231. val := reflect.ValueOf(form)
  232. if typ.Kind() == reflect.Ptr {
  233. typ = typ.Elem()
  234. val = val.Elem()
  235. }
  236. for i := 0; i < typ.NumField(); i++ {
  237. field := typ.Field(i)
  238. fieldName := field.Tag.Get("form")
  239. // Allow ignored fields in the struct
  240. if fieldName == "-" {
  241. continue
  242. } else if len(fieldName) == 0 {
  243. fieldName = com.ToSnakeCase(field.Name)
  244. }
  245. data[fieldName] = val.Field(i).Interface()
  246. }
  247. }
  248. func getRuleBody(field reflect.StructField, prefix string) string {
  249. for _, rule := range strings.Split(field.Tag.Get("binding"), ";") {
  250. if strings.HasPrefix(rule, prefix) {
  251. return rule[len(prefix) : len(rule)-1]
  252. }
  253. }
  254. return ""
  255. }
  256. // GetSize get size int form tag
  257. func GetSize(field reflect.StructField) string {
  258. return getRuleBody(field, "Size(")
  259. }
  260. // GetMinSize get minimal size in form tag
  261. func GetMinSize(field reflect.StructField) string {
  262. return getRuleBody(field, "MinSize(")
  263. }
  264. // GetMaxSize get max size in form tag
  265. func GetMaxSize(field reflect.StructField) string {
  266. return getRuleBody(field, "MaxSize(")
  267. }
  268. // GetInclude get include in form tag
  269. func GetInclude(field reflect.StructField) string {
  270. return getRuleBody(field, "Include(")
  271. }
  272. func validate(errs binding.Errors, data map[string]interface{}, f Form, l macaron.Locale) binding.Errors {
  273. if errs.Len() == 0 {
  274. return errs
  275. }
  276. data["HasError"] = true
  277. AssignForm(f, data)
  278. typ := reflect.TypeOf(f)
  279. val := reflect.ValueOf(f)
  280. if typ.Kind() == reflect.Ptr {
  281. typ = typ.Elem()
  282. val = val.Elem()
  283. }
  284. for i := 0; i < typ.NumField(); i++ {
  285. field := typ.Field(i)
  286. fieldName := field.Tag.Get("form")
  287. // Allow ignored fields in the struct
  288. if fieldName == "-" {
  289. continue
  290. }
  291. if errs[0].FieldNames[0] == field.Name {
  292. data["Err_"+field.Name] = true
  293. trName := field.Tag.Get("locale")
  294. if len(trName) == 0 {
  295. trName = l.Tr("form." + field.Name)
  296. } else {
  297. trName = l.Tr(trName)
  298. }
  299. switch errs[0].Classification {
  300. case binding.ERR_REQUIRED:
  301. data["ErrorMsg"] = trName + l.Tr("form.require_error")
  302. case binding.ERR_ALPHA_DASH:
  303. data["ErrorMsg"] = trName + l.Tr("form.alpha_dash_error")
  304. case binding.ERR_ALPHA_DASH_DOT:
  305. data["ErrorMsg"] = trName + l.Tr("form.alpha_dash_dot_error")
  306. case validation.ErrGitRefName:
  307. data["ErrorMsg"] = trName + l.Tr("form.git_ref_name_error")
  308. case binding.ERR_SIZE:
  309. data["ErrorMsg"] = trName + l.Tr("form.size_error", GetSize(field))
  310. case binding.ERR_MIN_SIZE:
  311. data["ErrorMsg"] = trName + l.Tr("form.min_size_error", GetMinSize(field))
  312. case binding.ERR_MAX_SIZE:
  313. data["ErrorMsg"] = trName + l.Tr("form.max_size_error", GetMaxSize(field))
  314. case binding.ERR_EMAIL:
  315. data["ErrorMsg"] = trName + l.Tr("form.email_error")
  316. case binding.ERR_URL:
  317. data["ErrorMsg"] = trName + l.Tr("form.url_error")
  318. case binding.ERR_INCLUDE:
  319. data["ErrorMsg"] = trName + l.Tr("form.include_error", GetInclude(field))
  320. default:
  321. data["ErrorMsg"] = l.Tr("form.unknown_error") + " " + errs[0].Classification
  322. }
  323. return errs
  324. }
  325. }
  326. return errs
  327. }