mirror of https://github.com/go-gitea/gitea.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
164 lines
4.9 KiB
164 lines
4.9 KiB
// Copyright 2014 The Gogs Authors. All rights reserved. |
|
// Copyright 2019 The Gitea Authors. All rights reserved. |
|
// SPDX-License-Identifier: MIT |
|
|
|
package auth |
|
|
|
import ( |
|
"errors" |
|
"fmt" |
|
"net/http" |
|
"regexp" |
|
"strings" |
|
"sync" |
|
|
|
user_model "code.gitea.io/gitea/models/user" |
|
"code.gitea.io/gitea/modules/auth/webauthn" |
|
"code.gitea.io/gitea/modules/log" |
|
"code.gitea.io/gitea/modules/optional" |
|
"code.gitea.io/gitea/modules/session" |
|
"code.gitea.io/gitea/modules/setting" |
|
"code.gitea.io/gitea/modules/web/middleware" |
|
user_service "code.gitea.io/gitea/services/user" |
|
) |
|
|
|
type globalVarsStruct struct { |
|
gitRawOrAttachPathRe *regexp.Regexp |
|
lfsPathRe *regexp.Regexp |
|
archivePathRe *regexp.Regexp |
|
feedPathRe *regexp.Regexp |
|
feedRefPathRe *regexp.Regexp |
|
} |
|
|
|
var globalVars = sync.OnceValue(func() *globalVarsStruct { |
|
return &globalVarsStruct{ |
|
gitRawOrAttachPathRe: regexp.MustCompile(`^/[-.\w]+/[-.\w]+/(?:(?:git-(?:(?:upload)|(?:receive))-pack$)|(?:info/refs$)|(?:HEAD$)|(?:objects/)|(?:raw/)|(?:releases/download/)|(?:attachments/))`), |
|
lfsPathRe: regexp.MustCompile(`^/[-.\w]+/[-.\w]+/info/lfs/`), |
|
archivePathRe: regexp.MustCompile(`^/[-.\w]+/[-.\w]+/archive/`), |
|
feedPathRe: regexp.MustCompile(`^/[-.\w]+(/[-.\w]+)?\.(rss|atom)$`), // "/owner.rss" or "/owner/repo.atom" |
|
feedRefPathRe: regexp.MustCompile(`^/[-.\w]+/[-.\w]+/(rss|atom)/`), // "/owner/repo/rss/branch/..." |
|
} |
|
}) |
|
|
|
type ErrUserAuthMessage string |
|
|
|
func (e ErrUserAuthMessage) Error() string { |
|
return string(e) |
|
} |
|
|
|
func ErrAsUserAuthMessage(err error) (string, bool) { |
|
var msg ErrUserAuthMessage |
|
if errors.As(err, &msg) { |
|
return msg.Error(), true |
|
} |
|
return "", false |
|
} |
|
|
|
// Init should be called exactly once when the application starts to allow plugins |
|
// to allocate necessary resources |
|
func Init() { |
|
webauthn.Init() |
|
} |
|
|
|
type authPathDetector struct { |
|
req *http.Request |
|
vars *globalVarsStruct |
|
} |
|
|
|
func newAuthPathDetector(req *http.Request) *authPathDetector { |
|
return &authPathDetector{req: req, vars: globalVars()} |
|
} |
|
|
|
// isAPIPath returns true if the specified URL is an API path |
|
func (a *authPathDetector) isAPIPath() bool { |
|
return strings.HasPrefix(a.req.URL.Path, "/api/") |
|
} |
|
|
|
// isAttachmentDownload check if request is a file download (GET) with URL to an attachment |
|
func (a *authPathDetector) isAttachmentDownload() bool { |
|
return strings.HasPrefix(a.req.URL.Path, "/attachments/") && a.req.Method == http.MethodGet |
|
} |
|
|
|
func (a *authPathDetector) isFeedRequest(req *http.Request) bool { |
|
if !setting.Other.EnableFeed { |
|
return false |
|
} |
|
if req.Method != http.MethodGet { |
|
return false |
|
} |
|
return a.vars.feedPathRe.MatchString(req.URL.Path) || a.vars.feedRefPathRe.MatchString(req.URL.Path) |
|
} |
|
|
|
// isContainerPath checks if the request targets the container endpoint |
|
func (a *authPathDetector) isContainerPath() bool { |
|
return strings.HasPrefix(a.req.URL.Path, "/v2/") |
|
} |
|
|
|
func (a *authPathDetector) isGitRawOrAttachPath() bool { |
|
return a.vars.gitRawOrAttachPathRe.MatchString(a.req.URL.Path) |
|
} |
|
|
|
func (a *authPathDetector) isGitRawOrAttachOrLFSPath() bool { |
|
if a.isGitRawOrAttachPath() { |
|
return true |
|
} |
|
if setting.LFS.StartServer { |
|
return a.vars.lfsPathRe.MatchString(a.req.URL.Path) |
|
} |
|
return false |
|
} |
|
|
|
func (a *authPathDetector) isArchivePath() bool { |
|
return a.vars.archivePathRe.MatchString(a.req.URL.Path) |
|
} |
|
|
|
func (a *authPathDetector) isAuthenticatedTokenRequest() bool { |
|
switch a.req.URL.Path { |
|
case "/login/oauth/userinfo", "/login/oauth/introspect": |
|
return true |
|
} |
|
return false |
|
} |
|
|
|
// handleSignIn clears existing session variables and stores new ones for the specified user object |
|
func handleSignIn(resp http.ResponseWriter, req *http.Request, sess SessionStore, user *user_model.User) { |
|
// We need to regenerate the session... |
|
newSess, err := session.RegenerateSession(resp, req) |
|
if err != nil { |
|
log.Error(fmt.Sprintf("Error regenerating session: %v", err)) |
|
} else { |
|
sess = newSess |
|
} |
|
|
|
_ = sess.Delete("openid_verified_uri") |
|
_ = sess.Delete("openid_signin_remember") |
|
_ = sess.Delete("openid_determined_email") |
|
_ = sess.Delete("openid_determined_username") |
|
_ = sess.Delete("twofaUid") |
|
_ = sess.Delete("twofaRemember") |
|
_ = sess.Delete("webauthnAssertion") |
|
_ = sess.Delete("linkAccount") |
|
err = sess.Set("uid", user.ID) |
|
if err != nil { |
|
log.Error(fmt.Sprintf("Error setting session: %v", err)) |
|
} |
|
err = sess.Set("uname", user.Name) |
|
if err != nil { |
|
log.Error(fmt.Sprintf("Error setting session: %v", err)) |
|
} |
|
|
|
// Language setting of the user overwrites the one previously set |
|
// If the user does not have a locale set, we save the current one. |
|
if len(user.Language) == 0 { |
|
lc := middleware.Locale(resp, req) |
|
opts := &user_service.UpdateOptions{ |
|
Language: optional.Some(lc.Language()), |
|
} |
|
if err := user_service.UpdateUser(req.Context(), user, opts); err != nil { |
|
log.Error(fmt.Sprintf("Error updating user language [user: %d, locale: %s]", user.ID, user.Language)) |
|
return |
|
} |
|
} |
|
|
|
middleware.SetLocaleCookie(resp, user.Language, 0) |
|
}
|
|
|