Ви не можете вибрати більше 25 тем Теми мають розпочинатися з літери або цифри, можуть містити дефіси (-) і не повинні перевищувати 35 символів.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Copyright 2019 The Gitea Authors. All rights reserved.
  3. // SPDX-License-Identifier: MIT
  4. package auth
  5. import (
  6. "net/http"
  7. "strings"
  8. user_model "code.gitea.io/gitea/models/user"
  9. "code.gitea.io/gitea/modules/log"
  10. "code.gitea.io/gitea/modules/setting"
  11. "code.gitea.io/gitea/modules/util"
  12. "code.gitea.io/gitea/modules/web/middleware"
  13. gouuid "github.com/google/uuid"
  14. )
  15. // Ensure the struct implements the interface.
  16. var (
  17. _ Method = &ReverseProxy{}
  18. )
  19. // ReverseProxyMethodName is the constant name of the ReverseProxy authentication method
  20. const ReverseProxyMethodName = "reverse_proxy"
  21. // ReverseProxy implements the Auth interface, but actually relies on
  22. // a reverse proxy for authentication of users.
  23. // On successful authentication the proxy is expected to populate the username in the
  24. // "setting.ReverseProxyAuthUser" header. Optionally it can also populate the email of the
  25. // user in the "setting.ReverseProxyAuthEmail" header.
  26. type ReverseProxy struct{}
  27. // getUserName extracts the username from the "setting.ReverseProxyAuthUser" header
  28. func (r *ReverseProxy) getUserName(req *http.Request) string {
  29. return strings.TrimSpace(req.Header.Get(setting.ReverseProxyAuthUser))
  30. }
  31. // Name represents the name of auth method
  32. func (r *ReverseProxy) Name() string {
  33. return ReverseProxyMethodName
  34. }
  35. // getUserFromAuthUser extracts the username from the "setting.ReverseProxyAuthUser" header
  36. // of the request and returns the corresponding user object for that name.
  37. // Verification of header data is not performed as it should have already been done by
  38. // the reverse proxy.
  39. // If a username is available in the "setting.ReverseProxyAuthUser" header an existing
  40. // user object is returned (populated with username or email found in header).
  41. // Returns nil if header is empty.
  42. func (r *ReverseProxy) getUserFromAuthUser(req *http.Request) (*user_model.User, error) {
  43. username := r.getUserName(req)
  44. if len(username) == 0 {
  45. return nil, nil
  46. }
  47. log.Trace("ReverseProxy Authorization: Found username: %s", username)
  48. user, err := user_model.GetUserByName(req.Context(), username)
  49. if err != nil {
  50. if !user_model.IsErrUserNotExist(err) || !r.isAutoRegisterAllowed() {
  51. log.Error("GetUserByName: %v", err)
  52. return nil, err
  53. }
  54. user = r.newUser(req)
  55. }
  56. return user, nil
  57. }
  58. // getEmail extracts the email from the "setting.ReverseProxyAuthEmail" header
  59. func (r *ReverseProxy) getEmail(req *http.Request) string {
  60. return strings.TrimSpace(req.Header.Get(setting.ReverseProxyAuthEmail))
  61. }
  62. // getUserFromAuthEmail extracts the username from the "setting.ReverseProxyAuthEmail" header
  63. // of the request and returns the corresponding user object for that email.
  64. // Verification of header data is not performed as it should have already been done by
  65. // the reverse proxy.
  66. // If an email is available in the "setting.ReverseProxyAuthEmail" header an existing
  67. // user object is returned (populated with the email found in header).
  68. // Returns nil if header is empty or if "setting.EnableReverseProxyEmail" is disabled.
  69. func (r *ReverseProxy) getUserFromAuthEmail(req *http.Request) *user_model.User {
  70. if !setting.Service.EnableReverseProxyEmail {
  71. return nil
  72. }
  73. email := r.getEmail(req)
  74. if len(email) == 0 {
  75. return nil
  76. }
  77. log.Trace("ReverseProxy Authorization: Found email: %s", email)
  78. user, err := user_model.GetUserByEmail(req.Context(), email)
  79. if err != nil {
  80. // Do not allow auto-registration, we don't have a username here
  81. if !user_model.IsErrUserNotExist(err) {
  82. log.Error("GetUserByEmail: %v", err)
  83. }
  84. return nil
  85. }
  86. return user
  87. }
  88. // Verify attempts to load a user object based on headers sent by the reverse proxy.
  89. // First it will attempt to load it based on the username (see docs for getUserFromAuthUser),
  90. // and failing that it will attempt to load it based on the email (see docs for getUserFromAuthEmail).
  91. // Returns nil if the headers are empty or the user is not found.
  92. func (r *ReverseProxy) Verify(req *http.Request, w http.ResponseWriter, store DataStore, sess SessionStore) (*user_model.User, error) {
  93. user, err := r.getUserFromAuthUser(req)
  94. if err != nil {
  95. return nil, err
  96. }
  97. if user == nil {
  98. user = r.getUserFromAuthEmail(req)
  99. if user == nil {
  100. return nil, nil
  101. }
  102. }
  103. // Make sure requests to API paths, attachment downloads, git and LFS do not create a new session
  104. if !middleware.IsAPIPath(req) && !isAttachmentDownload(req) && !isGitRawOrAttachOrLFSPath(req) {
  105. if sess != nil && (sess.Get("uid") == nil || sess.Get("uid").(int64) != user.ID) {
  106. handleSignIn(w, req, sess, user)
  107. }
  108. }
  109. store.GetData()["IsReverseProxy"] = true
  110. log.Trace("ReverseProxy Authorization: Logged in user %-v", user)
  111. return user, nil
  112. }
  113. // isAutoRegisterAllowed checks if EnableReverseProxyAutoRegister setting is true
  114. func (r *ReverseProxy) isAutoRegisterAllowed() bool {
  115. return setting.Service.EnableReverseProxyAutoRegister
  116. }
  117. // newUser creates a new user object for the purpose of automatic registration
  118. // and populates its name and email with the information present in request headers.
  119. func (r *ReverseProxy) newUser(req *http.Request) *user_model.User {
  120. username := r.getUserName(req)
  121. if len(username) == 0 {
  122. return nil
  123. }
  124. email := gouuid.New().String() + "@localhost"
  125. if setting.Service.EnableReverseProxyEmail {
  126. webAuthEmail := req.Header.Get(setting.ReverseProxyAuthEmail)
  127. if len(webAuthEmail) > 0 {
  128. email = webAuthEmail
  129. }
  130. }
  131. var fullname string
  132. if setting.Service.EnableReverseProxyFullName {
  133. fullname = req.Header.Get(setting.ReverseProxyAuthFullName)
  134. }
  135. user := &user_model.User{
  136. Name: username,
  137. Email: email,
  138. FullName: fullname,
  139. }
  140. overwriteDefault := user_model.CreateUserOverwriteOptions{
  141. IsActive: util.OptionalBoolTrue,
  142. }
  143. if err := user_model.CreateUser(req.Context(), user, &overwriteDefault); err != nil {
  144. // FIXME: should I create a system notice?
  145. log.Error("CreateUser: %v", err)
  146. return nil
  147. }
  148. return user
  149. }