2019-08-29 10:34:07 +01:00
package home
import (
2020-11-20 14:32:41 +00:00
"crypto/rand"
2019-08-29 10:34:07 +01:00
"encoding/binary"
"encoding/hex"
"encoding/json"
"fmt"
2021-04-06 12:31:20 +01:00
"net"
2019-08-29 10:34:07 +01:00
"net/http"
2022-09-29 17:04:26 +01:00
"path"
2021-04-27 16:56:32 +01:00
"strconv"
2019-08-29 10:34:07 +01:00
"strings"
"sync"
"time"
2021-12-16 17:54:59 +00:00
"github.com/AdguardTeam/AdGuardHome/internal/aghhttp"
2022-09-29 17:04:26 +01:00
"github.com/AdguardTeam/golibs/errors"
2023-04-07 12:21:37 +01:00
"github.com/AdguardTeam/golibs/httphdr"
2019-08-29 10:34:07 +01:00
"github.com/AdguardTeam/golibs/log"
2021-08-09 14:03:37 +01:00
"github.com/AdguardTeam/golibs/netutil"
2021-09-30 19:17:54 +01:00
"github.com/AdguardTeam/golibs/timeutil"
2020-04-05 16:21:26 +01:00
"go.etcd.io/bbolt"
2019-08-29 10:34:07 +01:00
"golang.org/x/crypto/bcrypt"
)
2021-04-06 12:31:20 +01:00
// cookieTTL is the time-to-live of the session cookie.
2021-09-30 19:17:54 +01:00
const cookieTTL = 365 * timeutil . Day
2021-03-01 17:37:28 +00:00
2021-04-06 12:31:20 +01:00
// sessionCookieName is the name of the session cookie.
const sessionCookieName = "agh_session"
// sessionTokenSize is the length of session token in bytes.
const sessionTokenSize = 16
2019-08-29 10:34:07 +01:00
2019-10-21 15:44:07 +01:00
type session struct {
userName string
2022-09-29 17:04:26 +01:00
// expire is the expiration time, in seconds.
expire uint32
2019-10-21 15:44:07 +01:00
}
func ( s * session ) serialize ( ) [ ] byte {
2020-11-06 09:15:08 +00:00
const (
expireLen = 4
nameLen = 2
)
data := make ( [ ] byte , expireLen + nameLen + len ( s . userName ) )
2019-10-21 15:44:07 +01:00
binary . BigEndian . PutUint32 ( data [ 0 : 4 ] , s . expire )
binary . BigEndian . PutUint16 ( data [ 4 : 6 ] , uint16 ( len ( s . userName ) ) )
copy ( data [ 6 : ] , [ ] byte ( s . userName ) )
return data
}
func ( s * session ) deserialize ( data [ ] byte ) bool {
if len ( data ) < 4 + 2 {
return false
}
s . expire = binary . BigEndian . Uint32 ( data [ 0 : 4 ] )
nameLen := binary . BigEndian . Uint16 ( data [ 4 : 6 ] )
data = data [ 6 : ]
if len ( data ) < int ( nameLen ) {
return false
}
s . userName = string ( data )
return true
}
2019-08-29 10:34:07 +01:00
// Auth - global object
type Auth struct {
2022-09-29 17:04:26 +01:00
db * bbolt . DB
raleLimiter * authRateLimiter
sessions map [ string ] * session
users [ ] webUser
lock sync . Mutex
sessionTTL uint32
2019-08-29 10:34:07 +01:00
}
2022-09-29 17:04:26 +01:00
// webUser represents a user of the Web UI.
type webUser struct {
2019-08-29 10:34:07 +01:00
Name string ` yaml:"name" `
2022-09-29 17:04:26 +01:00
PasswordHash string ` yaml:"password" `
2019-08-29 10:34:07 +01:00
}
// InitAuth - create a global object
2022-09-29 17:04:26 +01:00
func InitAuth ( dbFilename string , users [ ] webUser , sessionTTL uint32 , rateLimiter * authRateLimiter ) * Auth {
2020-04-15 13:17:57 +01:00
log . Info ( "Initializing auth module: %s" , dbFilename )
2021-04-27 16:56:32 +01:00
a := & Auth {
2022-09-29 17:04:26 +01:00
sessionTTL : sessionTTL ,
raleLimiter : rateLimiter ,
sessions : make ( map [ string ] * session ) ,
users : users ,
2021-04-27 16:56:32 +01:00
}
2019-08-29 10:34:07 +01:00
var err error
2020-11-05 12:20:57 +00:00
a . db , err = bbolt . Open ( dbFilename , 0 o644 , nil )
2019-08-29 10:34:07 +01:00
if err != nil {
2021-04-06 12:31:20 +01:00
log . Error ( "auth: open DB: %s: %s" , dbFilename , err )
2020-07-02 14:52:29 +01:00
if err . Error ( ) == "invalid argument" {
2021-04-08 14:44:01 +01:00
log . Error ( "AdGuard Home cannot be initialized due to an incompatible file system.\nPlease read the explanation here: https://github.com/AdguardTeam/AdGuardHome/wiki/Getting-Started#limitations" )
2020-07-02 14:52:29 +01:00
}
2021-04-06 12:31:20 +01:00
2019-08-29 10:34:07 +01:00
return nil
}
a . loadSessions ( )
2021-04-06 12:31:20 +01:00
log . Info ( "auth: initialized. users:%d sessions:%d" , len ( a . users ) , len ( a . sessions ) )
2021-04-27 16:56:32 +01:00
return a
2019-08-29 10:34:07 +01:00
}
// Close - close module
func ( a * Auth ) Close ( ) {
_ = a . db . Close ( )
}
2019-10-21 15:44:07 +01:00
func bucketName ( ) [ ] byte {
return [ ] byte ( "sessions-2" )
}
2019-08-29 10:34:07 +01:00
// load sessions from file, remove expired sessions
func ( a * Auth ) loadSessions ( ) {
tx , err := a . db . Begin ( true )
if err != nil {
2021-04-06 12:31:20 +01:00
log . Error ( "auth: bbolt.Begin: %s" , err )
2019-08-29 10:34:07 +01:00
return
}
defer func ( ) {
_ = tx . Rollback ( )
} ( )
2019-10-21 15:44:07 +01:00
bkt := tx . Bucket ( bucketName ( ) )
2019-08-29 10:34:07 +01:00
if bkt == nil {
return
}
removed := 0
2019-10-21 15:44:07 +01:00
if tx . Bucket ( [ ] byte ( "sessions" ) ) != nil {
_ = tx . DeleteBucket ( [ ] byte ( "sessions" ) )
removed = 1
}
2019-08-29 10:34:07 +01:00
now := uint32 ( time . Now ( ) . UTC ( ) . Unix ( ) )
forEach := func ( k , v [ ] byte ) error {
2019-10-21 15:44:07 +01:00
s := session { }
if ! s . deserialize ( v ) || s . expire <= now {
2019-08-29 10:34:07 +01:00
err = bkt . Delete ( k )
if err != nil {
2021-04-06 12:31:20 +01:00
log . Error ( "auth: bbolt.Delete: %s" , err )
2019-08-29 10:34:07 +01:00
} else {
removed ++
}
2021-04-06 12:31:20 +01:00
2019-08-29 10:34:07 +01:00
return nil
}
2019-10-21 15:44:07 +01:00
a . sessions [ hex . EncodeToString ( k ) ] = & s
2019-08-29 10:34:07 +01:00
return nil
}
_ = bkt . ForEach ( forEach )
if removed != 0 {
2019-09-18 11:17:35 +01:00
err = tx . Commit ( )
if err != nil {
log . Error ( "bolt.Commit(): %s" , err )
}
2019-08-29 10:34:07 +01:00
}
2021-04-06 12:31:20 +01:00
log . Debug ( "auth: loaded %d sessions from DB (removed %d expired)" , len ( a . sessions ) , removed )
2019-08-29 10:34:07 +01:00
}
// store session data in file
2019-10-21 15:44:07 +01:00
func ( a * Auth ) addSession ( data [ ] byte , s * session ) {
2019-11-12 11:24:27 +00:00
name := hex . EncodeToString ( data )
2019-08-29 10:34:07 +01:00
a . lock . Lock ( )
2019-11-12 11:24:27 +00:00
a . sessions [ name ] = s
2019-08-29 10:34:07 +01:00
a . lock . Unlock ( )
2019-11-12 11:24:27 +00:00
if a . storeSession ( data , s ) {
2021-04-06 12:31:20 +01:00
log . Debug ( "auth: created session %s: expire=%d" , name , s . expire )
2019-11-12 11:24:27 +00:00
}
2019-10-21 15:44:07 +01:00
}
2019-08-29 10:34:07 +01:00
2019-10-21 15:44:07 +01:00
// store session data in file
2019-11-12 11:24:27 +00:00
func ( a * Auth ) storeSession ( data [ ] byte , s * session ) bool {
2019-08-29 10:34:07 +01:00
tx , err := a . db . Begin ( true )
if err != nil {
2021-04-06 12:31:20 +01:00
log . Error ( "auth: bbolt.Begin: %s" , err )
2019-11-12 11:24:27 +00:00
return false
2019-08-29 10:34:07 +01:00
}
defer func ( ) {
_ = tx . Rollback ( )
} ( )
2019-10-21 15:44:07 +01:00
bkt , err := tx . CreateBucketIfNotExists ( bucketName ( ) )
2019-08-29 10:34:07 +01:00
if err != nil {
2021-04-06 12:31:20 +01:00
log . Error ( "auth: bbolt.CreateBucketIfNotExists: %s" , err )
2019-11-12 11:24:27 +00:00
return false
2019-08-29 10:34:07 +01:00
}
2021-04-06 12:31:20 +01:00
2019-10-21 15:44:07 +01:00
err = bkt . Put ( data , s . serialize ( ) )
2019-08-29 10:34:07 +01:00
if err != nil {
2021-04-06 12:31:20 +01:00
log . Error ( "auth: bbolt.Put: %s" , err )
2019-11-12 11:24:27 +00:00
return false
2019-08-29 10:34:07 +01:00
}
err = tx . Commit ( )
if err != nil {
2021-04-06 12:31:20 +01:00
log . Error ( "auth: bbolt.Commit: %s" , err )
2019-11-12 11:24:27 +00:00
return false
2019-08-29 10:34:07 +01:00
}
2021-04-06 12:31:20 +01:00
2019-11-12 11:24:27 +00:00
return true
2019-08-29 10:34:07 +01:00
}
// remove session from file
func ( a * Auth ) removeSession ( sess [ ] byte ) {
tx , err := a . db . Begin ( true )
if err != nil {
2021-04-06 12:31:20 +01:00
log . Error ( "auth: bbolt.Begin: %s" , err )
2019-08-29 10:34:07 +01:00
return
}
2021-04-06 12:31:20 +01:00
2019-08-29 10:34:07 +01:00
defer func ( ) {
_ = tx . Rollback ( )
} ( )
2019-10-21 15:44:07 +01:00
bkt := tx . Bucket ( bucketName ( ) )
2019-08-29 10:34:07 +01:00
if bkt == nil {
2021-04-06 12:31:20 +01:00
log . Error ( "auth: bbolt.Bucket" )
2019-08-29 10:34:07 +01:00
return
}
2021-04-06 12:31:20 +01:00
2019-08-29 10:34:07 +01:00
err = bkt . Delete ( sess )
if err != nil {
2021-04-06 12:31:20 +01:00
log . Error ( "auth: bbolt.Put: %s" , err )
2019-08-29 10:34:07 +01:00
return
}
err = tx . Commit ( )
if err != nil {
2021-04-06 12:31:20 +01:00
log . Error ( "auth: bbolt.Commit: %s" , err )
2019-08-29 10:34:07 +01:00
return
}
2021-04-06 12:31:20 +01:00
log . Debug ( "auth: removed session from DB" )
2019-08-29 10:34:07 +01:00
}
2020-12-22 18:05:12 +00:00
// checkSessionResult is the result of checking a session.
type checkSessionResult int
// checkSessionResult constants.
const (
checkSessionOK checkSessionResult = 0
checkSessionNotFound checkSessionResult = - 1
checkSessionExpired checkSessionResult = 1
)
// checkSession checks if the session is valid.
func ( a * Auth ) checkSession ( sess string ) ( res checkSessionResult ) {
2019-08-29 10:34:07 +01:00
now := uint32 ( time . Now ( ) . UTC ( ) . Unix ( ) )
update := false
a . lock . Lock ( )
2020-12-21 18:39:39 +00:00
defer a . lock . Unlock ( )
2020-12-22 18:05:12 +00:00
2019-10-21 15:44:07 +01:00
s , ok := a . sessions [ sess ]
2019-08-29 10:34:07 +01:00
if ! ok {
2020-12-22 18:05:12 +00:00
return checkSessionNotFound
2019-08-29 10:34:07 +01:00
}
2020-12-22 18:05:12 +00:00
2019-10-21 15:44:07 +01:00
if s . expire <= now {
2019-08-29 10:34:07 +01:00
delete ( a . sessions , sess )
key , _ := hex . DecodeString ( sess )
a . removeSession ( key )
2020-12-22 18:05:12 +00:00
return checkSessionExpired
2019-08-29 10:34:07 +01:00
}
2019-11-12 11:23:00 +00:00
newExpire := now + a . sessionTTL
2019-10-21 15:44:07 +01:00
if s . expire / ( 24 * 60 * 60 ) != newExpire / ( 24 * 60 * 60 ) {
2019-08-29 10:34:07 +01:00
// update expiration time once a day
update = true
2019-10-21 15:44:07 +01:00
s . expire = newExpire
2019-08-29 10:34:07 +01:00
}
if update {
key , _ := hex . DecodeString ( sess )
2019-11-12 11:24:27 +00:00
if a . storeSession ( key , s ) {
2021-04-06 12:31:20 +01:00
log . Debug ( "auth: updated session %s: expire=%d" , sess , s . expire )
2019-11-12 11:24:27 +00:00
}
2019-08-29 10:34:07 +01:00
}
2020-12-22 18:05:12 +00:00
return checkSessionOK
2019-08-29 10:34:07 +01:00
}
// RemoveSession - remove session
func ( a * Auth ) RemoveSession ( sess string ) {
key , _ := hex . DecodeString ( sess )
a . lock . Lock ( )
delete ( a . sessions , sess )
a . lock . Unlock ( )
a . removeSession ( key )
}
type loginJSON struct {
Name string ` json:"name" `
Password string ` json:"password" `
}
2021-03-01 17:37:28 +00:00
// newSessionToken returns cryptographically secure randomly generated slice of
// bytes of sessionTokenSize length.
//
// TODO(e.burkov): Think about using byte array instead of byte slice.
func newSessionToken ( ) ( data [ ] byte , err error ) {
randData := make ( [ ] byte , sessionTokenSize )
_ , err = rand . Read ( randData )
2020-11-20 14:32:41 +00:00
if err != nil {
return nil , err
}
2021-03-01 17:37:28 +00:00
return randData , nil
}
2022-09-29 17:04:26 +01:00
// newCookie creates a new authentication cookie.
func ( a * Auth ) newCookie ( req loginJSON , addr string ) ( c * http . Cookie , err error ) {
rateLimiter := a . raleLimiter
u , ok := a . findUser ( req . Name , req . Password )
if ! ok {
if rateLimiter != nil {
rateLimiter . inc ( addr )
2021-04-27 16:56:32 +01:00
}
2022-09-29 17:04:26 +01:00
return nil , errors . Error ( "invalid username or password" )
2019-08-29 10:34:07 +01:00
}
2022-09-29 17:04:26 +01:00
if rateLimiter != nil {
rateLimiter . remove ( addr )
2021-04-27 16:56:32 +01:00
}
2022-09-29 17:04:26 +01:00
sess , err := newSessionToken ( )
2020-11-20 14:32:41 +00:00
if err != nil {
2022-09-29 17:04:26 +01:00
return nil , fmt . Errorf ( "generating token: %w" , err )
2020-11-20 14:32:41 +00:00
}
2019-08-29 10:34:07 +01:00
now := time . Now ( ) . UTC ( )
2021-03-01 17:37:28 +00:00
a . addSession ( sess , & session {
userName : u . Name ,
expire : uint32 ( now . Unix ( ) ) + a . sessionTTL ,
} )
2022-09-29 17:04:26 +01:00
return & http . Cookie {
Name : sessionCookieName ,
Value : hex . EncodeToString ( sess ) ,
Path : "/" ,
Expires : now . Add ( cookieTTL ) ,
HttpOnly : true ,
SameSite : http . SameSiteLaxMode ,
} , nil
2019-10-11 10:41:01 +01:00
}
2021-04-06 12:31:20 +01:00
// realIP extracts the real IP address of the client from an HTTP request using
// the known HTTP headers.
//
// TODO(a.garipov): Currently, this is basically a copy of a similar function in
// module dnsproxy. This should really become a part of module golibs and be
// replaced both here and there. Or be replaced in both places by
// a well-maintained third-party module.
//
// TODO(a.garipov): Support header Forwarded from RFC 7329.
func realIP ( r * http . Request ) ( ip net . IP , err error ) {
proxyHeaders := [ ] string {
2023-04-07 12:21:37 +01:00
httphdr . CFConnectingIP ,
httphdr . TrueClientIP ,
httphdr . XRealIP ,
2021-04-06 12:31:20 +01:00
}
for _ , h := range proxyHeaders {
v := r . Header . Get ( h )
ip = net . ParseIP ( v )
if ip != nil {
return ip , nil
}
}
// If none of the above yielded any results, get the leftmost IP address
// from the X-Forwarded-For header.
2023-04-07 12:21:37 +01:00
s := r . Header . Get ( httphdr . XForwardedFor )
2021-04-06 12:31:20 +01:00
ipStrs := strings . SplitN ( s , ", " , 2 )
ip = net . ParseIP ( ipStrs [ 0 ] )
if ip != nil {
return ip , nil
}
2021-12-22 18:27:36 +00:00
// When everything else fails, just return the remote address as understood
// by the stdlib.
2021-08-09 14:03:37 +01:00
ipStr , err := netutil . SplitHost ( r . RemoteAddr )
2021-04-06 12:31:20 +01:00
if err != nil {
return nil , fmt . Errorf ( "getting ip from client addr: %w" , err )
}
return net . ParseIP ( ipStr ) , nil
}
2023-04-11 17:43:38 +01:00
// writeErrorWithIP is like [aghhttp.Error], but includes the remote IP address
// when it writes to the log.
func writeErrorWithIP (
r * http . Request ,
w http . ResponseWriter ,
code int ,
remoteIP string ,
format string ,
args ... any ,
) {
text := fmt . Sprintf ( format , args ... )
log . Error ( "%s %s %s: from ip %s: %s" , r . Method , r . Host , r . URL , remoteIP , text )
http . Error ( w , text , code )
}
2019-10-11 10:41:01 +01:00
func handleLogin ( w http . ResponseWriter , r * http . Request ) {
req := loginJSON { }
err := json . NewDecoder ( r . Body ) . Decode ( & req )
if err != nil {
2021-12-16 17:54:59 +00:00
aghhttp . Error ( r , w , http . StatusBadRequest , "json decode: %s" , err )
2021-04-27 16:56:32 +01:00
2019-10-11 10:41:01 +01:00
return
}
2023-04-11 17:43:38 +01:00
var remoteIP string
2021-12-27 16:40:39 +00:00
// realIP cannot be used here without taking TrustedProxies into account due
2021-12-22 18:27:36 +00:00
// to security issues.
2021-04-27 16:56:32 +01:00
//
// See https://github.com/AdguardTeam/AdGuardHome/issues/2799.
//
// TODO(e.burkov): Use realIP when the issue will be fixed.
2023-04-11 17:43:38 +01:00
if remoteIP , err = netutil . SplitHost ( r . RemoteAddr ) ; err != nil {
writeErrorWithIP (
r ,
w ,
http . StatusBadRequest ,
r . RemoteAddr ,
"auth: getting remote address: %s" ,
err ,
)
2021-04-27 16:56:32 +01:00
return
}
2022-09-29 17:04:26 +01:00
if rateLimiter := Context . auth . raleLimiter ; rateLimiter != nil {
2023-04-11 17:43:38 +01:00
if left := rateLimiter . check ( remoteIP ) ; left > 0 {
2023-04-07 12:21:37 +01:00
w . Header ( ) . Set ( httphdr . RetryAfter , strconv . Itoa ( int ( left . Seconds ( ) ) ) )
2023-04-11 17:43:38 +01:00
writeErrorWithIP (
r ,
w ,
http . StatusTooManyRequests ,
remoteIP ,
"auth: blocked for %s" ,
left ,
)
2021-04-27 16:56:32 +01:00
return
}
}
2023-04-11 17:43:38 +01:00
cookie , err := Context . auth . newCookie ( req , remoteIP )
2020-11-20 14:32:41 +00:00
if err != nil {
2023-04-11 17:43:38 +01:00
writeErrorWithIP ( r , w , http . StatusForbidden , remoteIP , "%s" , err )
2021-04-06 12:31:20 +01:00
2020-11-20 14:32:41 +00:00
return
}
2021-12-22 18:27:36 +00:00
// Use realIP here, since this IP address is only used for logging.
ip , err := realIP ( r )
if err != nil {
2023-04-11 17:43:38 +01:00
log . Error ( "auth: getting real ip from request with remote ip %s: %s" , remoteIP , err )
2021-12-22 18:27:36 +00:00
}
2021-04-06 12:31:20 +01:00
2021-12-22 18:27:36 +00:00
log . Info ( "auth: user %q successfully logged in from ip %v" , req . Name , ip )
2019-08-29 10:34:07 +01:00
2022-09-29 17:04:26 +01:00
http . SetCookie ( w , cookie )
2021-12-22 18:27:36 +00:00
h := w . Header ( )
2023-04-07 12:21:37 +01:00
h . Set ( httphdr . CacheControl , "no-store, no-cache, must-revalidate, proxy-revalidate" )
h . Set ( httphdr . Pragma , "no-cache" )
h . Set ( httphdr . Expires , "0" )
2019-08-29 10:34:07 +01:00
2021-12-16 17:54:59 +00:00
aghhttp . OK ( w )
2019-08-29 10:34:07 +01:00
}
func handleLogout ( w http . ResponseWriter , r * http . Request ) {
2022-09-29 17:04:26 +01:00
respHdr := w . Header ( )
c , err := r . Cookie ( sessionCookieName )
if err != nil {
// The only error that is returned from r.Cookie is [http.ErrNoCookie].
// The user is already logged out.
2023-04-07 12:21:37 +01:00
respHdr . Set ( httphdr . Location , "/login.html" )
2022-09-29 17:04:26 +01:00
w . WriteHeader ( http . StatusFound )
return
}
2019-08-29 10:34:07 +01:00
2022-09-29 17:04:26 +01:00
Context . auth . RemoveSession ( c . Value )
2019-08-29 10:34:07 +01:00
2022-09-29 17:04:26 +01:00
c = & http . Cookie {
Name : sessionCookieName ,
Value : "" ,
Path : "/" ,
Expires : time . Unix ( 0 , 0 ) ,
2019-08-29 10:34:07 +01:00
2022-09-29 17:04:26 +01:00
HttpOnly : true ,
SameSite : http . SameSiteLaxMode ,
}
2019-08-29 10:34:07 +01:00
2023-04-07 12:21:37 +01:00
respHdr . Set ( httphdr . Location , "/login.html" )
respHdr . Set ( httphdr . SetCookie , c . String ( ) )
2019-08-29 10:34:07 +01:00
w . WriteHeader ( http . StatusFound )
}
// RegisterAuthHandlers - register handlers
func RegisterAuthHandlers ( ) {
2021-01-13 14:26:57 +00:00
Context . mux . Handle ( "/control/login" , postInstallHandler ( ensureHandler ( http . MethodPost , handleLogin ) ) )
httpRegister ( http . MethodGet , "/control/logout" , handleLogout )
2019-08-29 10:34:07 +01:00
}
2020-11-20 14:32:41 +00:00
// optionalAuthThird return true if user should authenticate first.
2022-09-29 17:04:26 +01:00
func optionalAuthThird ( w http . ResponseWriter , r * http . Request ) ( mustAuth bool ) {
if glProcessCookie ( r ) {
log . Debug ( "auth: authentication is handled by GL-Inet submodule" )
return false
}
2020-11-20 14:32:41 +00:00
// redirect to login page if not authenticated
2022-09-29 17:04:26 +01:00
isAuthenticated := false
2020-11-20 14:32:41 +00:00
cookie , err := r . Cookie ( sessionCookieName )
2022-09-29 17:04:26 +01:00
if err != nil {
// The only error that is returned from r.Cookie is [http.ErrNoCookie].
// Check Basic authentication.
user , pass , hasBasic := r . BasicAuth ( )
if hasBasic {
_ , isAuthenticated = Context . auth . findUser ( user , pass )
if ! isAuthenticated {
2021-04-06 12:31:20 +01:00
log . Info ( "auth: invalid Basic Authorization value" )
2020-11-20 14:32:41 +00:00
}
}
2022-09-29 17:04:26 +01:00
} else {
res := Context . auth . checkSession ( cookie . Value )
isAuthenticated = res == checkSessionOK
if ! isAuthenticated {
log . Debug ( "auth: invalid cookie value: %s" , cookie )
}
2020-11-20 14:32:41 +00:00
}
2022-09-29 17:04:26 +01:00
if isAuthenticated {
return false
}
if p := r . URL . Path ; p == "/" || p == "/index.html" {
if glProcessRedirect ( w , r ) {
log . Debug ( "auth: redirected to login page by GL-Inet submodule" )
2020-11-20 14:32:41 +00:00
} else {
2022-09-29 17:04:26 +01:00
log . Debug ( "auth: redirected to login page" )
2023-04-11 17:43:38 +01:00
http . Redirect ( w , r , "login.html" , http . StatusFound )
2020-11-20 14:32:41 +00:00
}
2022-09-29 17:04:26 +01:00
} else {
log . Debug ( "auth: responded with forbidden to %s %s" , r . Method , p )
w . WriteHeader ( http . StatusForbidden )
_ , _ = w . Write ( [ ] byte ( "Forbidden" ) )
2020-11-20 14:32:41 +00:00
}
2021-04-06 12:31:20 +01:00
2022-09-29 17:04:26 +01:00
return true
2020-11-20 14:32:41 +00:00
}
2022-09-29 17:04:26 +01:00
// TODO(a.garipov): Use [http.Handler] consistently everywhere throughout the
// project.
func optionalAuth (
h func ( http . ResponseWriter , * http . Request ) ,
) ( wrapped func ( http . ResponseWriter , * http . Request ) ) {
2019-08-29 10:34:07 +01:00
return func ( w http . ResponseWriter , r * http . Request ) {
2022-09-29 17:04:26 +01:00
p := r . URL . Path
authRequired := Context . auth != nil && Context . auth . AuthRequired ( )
if p == "/login.html" {
2019-11-25 12:45:50 +00:00
cookie , err := r . Cookie ( sessionCookieName )
2019-08-29 10:34:07 +01:00
if authRequired && err == nil {
2022-09-29 17:04:26 +01:00
// Redirect to the dashboard if already authenticated.
res := Context . auth . checkSession ( cookie . Value )
if res == checkSessionOK {
2023-04-11 17:43:38 +01:00
http . Redirect ( w , r , "" , http . StatusFound )
2020-12-22 18:05:12 +00:00
2019-08-29 10:34:07 +01:00
return
}
2022-09-29 17:04:26 +01:00
log . Debug ( "auth: invalid cookie value: %s" , cookie )
}
} else if isPublicResource ( p ) {
// Process as usual, no additional auth requirements.
} else if authRequired {
2020-11-20 14:32:41 +00:00
if optionalAuthThird ( w , r ) {
2019-08-29 10:34:07 +01:00
return
}
}
2022-09-29 17:04:26 +01:00
h ( w , r )
2019-08-29 10:34:07 +01:00
}
}
2022-09-29 17:04:26 +01:00
// isPublicResource returns true if p is a path to a public resource.
func isPublicResource ( p string ) ( ok bool ) {
isAsset , err := path . Match ( "/assets/*" , p )
if err != nil {
// The only error that is returned from path.Match is
// [path.ErrBadPattern]. This is a programmer error.
panic ( fmt . Errorf ( "bad asset pattern: %w" , err ) )
}
isLogin , err := path . Match ( "/login.*" , p )
if err != nil {
// Same as above.
panic ( fmt . Errorf ( "bad login pattern: %w" , err ) )
}
return isAsset || isLogin
}
2019-08-29 10:34:07 +01:00
type authHandler struct {
handler http . Handler
}
func ( a * authHandler ) ServeHTTP ( w http . ResponseWriter , r * http . Request ) {
optionalAuth ( a . handler . ServeHTTP ) ( w , r )
}
func optionalAuthHandler ( handler http . Handler ) http . Handler {
return & authHandler { handler }
}
// UserAdd - add new user
2022-09-29 17:04:26 +01:00
func ( a * Auth ) UserAdd ( u * webUser , password string ) {
2019-08-29 10:34:07 +01:00
if len ( password ) == 0 {
return
}
hash , err := bcrypt . GenerateFromPassword ( [ ] byte ( password ) , bcrypt . DefaultCost )
if err != nil {
log . Error ( "bcrypt.GenerateFromPassword: %s" , err )
return
}
u . PasswordHash = string ( hash )
a . lock . Lock ( )
a . users = append ( a . users , * u )
a . lock . Unlock ( )
2021-04-06 12:31:20 +01:00
log . Debug ( "auth: added user: %s" , u . Name )
2019-08-29 10:34:07 +01:00
}
2022-09-29 17:04:26 +01:00
// findUser returns a user if there is one.
func ( a * Auth ) findUser ( login , password string ) ( u webUser , ok bool ) {
2019-08-29 10:34:07 +01:00
a . lock . Lock ( )
defer a . lock . Unlock ( )
2022-09-29 17:04:26 +01:00
for _ , u = range a . users {
2019-08-29 10:34:07 +01:00
if u . Name == login &&
bcrypt . CompareHashAndPassword ( [ ] byte ( u . PasswordHash ) , [ ] byte ( password ) ) == nil {
2022-09-29 17:04:26 +01:00
return u , true
2019-08-29 10:34:07 +01:00
}
}
2022-09-29 17:04:26 +01:00
return webUser { } , false
2019-08-29 10:34:07 +01:00
}
2020-12-22 18:09:53 +00:00
// getCurrentUser returns the current user. It returns an empty User if the
// user is not found.
2022-09-29 17:04:26 +01:00
func ( a * Auth ) getCurrentUser ( r * http . Request ) ( u webUser ) {
2019-11-25 12:45:50 +00:00
cookie , err := r . Cookie ( sessionCookieName )
2019-10-21 15:44:07 +01:00
if err != nil {
2020-12-22 18:09:53 +00:00
// There's no Cookie, check Basic authentication.
2019-10-21 15:44:07 +01:00
user , pass , ok := r . BasicAuth ( )
if ok {
2022-09-29 17:04:26 +01:00
u , _ = Context . auth . findUser ( user , pass )
return u
2019-10-21 15:44:07 +01:00
}
2020-12-22 18:09:53 +00:00
2022-09-29 17:04:26 +01:00
return webUser { }
2019-10-21 15:44:07 +01:00
}
a . lock . Lock ( )
2020-12-21 18:39:39 +00:00
defer a . lock . Unlock ( )
2020-12-22 18:09:53 +00:00
2019-10-21 15:44:07 +01:00
s , ok := a . sessions [ cookie . Value ]
if ! ok {
2022-09-29 17:04:26 +01:00
return webUser { }
2019-10-21 15:44:07 +01:00
}
2020-12-22 18:09:53 +00:00
2022-09-29 17:04:26 +01:00
for _ , u = range a . users {
2019-10-21 15:44:07 +01:00
if u . Name == s . userName {
return u
}
}
2020-12-22 18:09:53 +00:00
2022-09-29 17:04:26 +01:00
return webUser { }
2019-10-21 15:44:07 +01:00
}
2019-08-29 10:34:07 +01:00
// GetUsers - get users
2022-09-29 17:04:26 +01:00
func ( a * Auth ) GetUsers ( ) [ ] webUser {
2019-08-29 10:34:07 +01:00
a . lock . Lock ( )
users := a . users
a . lock . Unlock ( )
return users
}
// AuthRequired - if authentication is required
func ( a * Auth ) AuthRequired ( ) bool {
2020-07-03 18:34:08 +01:00
if GLMode {
return true
}
2019-08-29 10:34:07 +01:00
a . lock . Lock ( )
r := ( len ( a . users ) != 0 )
a . lock . Unlock ( )
return r
}