miniflux-v2/internal/api/middleware.go

164 lines
4.8 KiB
Go
Raw Normal View History

// SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
// SPDX-License-Identifier: Apache-2.0
2017-11-20 06:10:04 +01:00
package api // import "miniflux.app/v2/internal/api"
2017-11-20 06:10:04 +01:00
import (
"context"
"log/slog"
2017-11-20 06:10:04 +01:00
"net/http"
2017-11-28 06:30:04 +01:00
"miniflux.app/v2/internal/http/request"
"miniflux.app/v2/internal/http/response/json"
"miniflux.app/v2/internal/storage"
2017-11-20 06:10:04 +01:00
)
type middleware struct {
store *storage.Storage
}
func newMiddleware(s *storage.Storage) *middleware {
return &middleware{s}
}
2020-06-16 19:05:07 +02:00
func (m *middleware) handleCORS(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Access-Control-Allow-Origin", "*")
2020-06-22 06:04:34 +02:00
w.Header().Set("Access-Control-Allow-Methods", "GET, POST, PUT, DELETE, OPTIONS")
w.Header().Set("Access-Control-Allow-Headers", "X-Auth-Token, Authorization, Content-Type, Accept")
2020-06-22 06:04:34 +02:00
if r.Method == http.MethodOptions {
w.Header().Set("Access-Control-Max-Age", "3600")
2020-06-16 19:05:07 +02:00
w.WriteHeader(http.StatusOK)
return
}
next.ServeHTTP(w, r)
})
}
2020-03-02 02:38:29 +01:00
func (m *middleware) apiKeyAuth(next http.Handler) http.Handler {
2017-11-20 06:10:04 +01:00
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
2020-03-02 02:38:29 +01:00
clientIP := request.ClientIP(r)
token := r.Header.Get("X-Auth-Token")
if token == "" {
slog.Debug("[API] Skipped API token authentication because no API Key has been provided",
slog.String("client_ip", clientIP),
slog.String("user_agent", r.UserAgent()),
)
2020-03-02 02:38:29 +01:00
next.ServeHTTP(w, r)
return
}
user, err := m.store.UserByAPIKey(token)
if err != nil {
json.ServerError(w, r, err)
return
}
if user == nil {
slog.Warn("[API] No user found with the provided API key",
slog.Bool("authentication_failed", true),
slog.String("client_ip", clientIP),
slog.String("user_agent", r.UserAgent()),
)
2020-03-02 02:38:29 +01:00
json.Unauthorized(w, r)
return
}
slog.Info("[API] User authenticated successfully with the API Token Authentication",
slog.Bool("authentication_successful", true),
slog.String("client_ip", clientIP),
slog.String("user_agent", r.UserAgent()),
slog.String("username", user.Username),
)
2020-03-02 02:38:29 +01:00
m.store.SetLastLogin(user.ID)
m.store.SetAPIKeyUsedTimestamp(user.ID, token)
ctx := r.Context()
ctx = context.WithValue(ctx, request.UserIDContextKey, user.ID)
ctx = context.WithValue(ctx, request.UserTimezoneContextKey, user.Timezone)
ctx = context.WithValue(ctx, request.IsAdminUserContextKey, user.IsAdmin)
ctx = context.WithValue(ctx, request.IsAuthenticatedContextKey, true)
next.ServeHTTP(w, r.WithContext(ctx))
})
}
func (m *middleware) basicAuth(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
if request.IsAuthenticated(r) {
next.ServeHTTP(w, r)
return
}
2017-11-20 06:10:04 +01:00
w.Header().Set("WWW-Authenticate", `Basic realm="Restricted"`)
clientIP := request.ClientIP(r)
2017-11-20 06:10:04 +01:00
username, password, authOK := r.BasicAuth()
if !authOK {
slog.Warn("[API] No Basic HTTP Authentication header sent with the request",
slog.Bool("authentication_failed", true),
slog.String("client_ip", clientIP),
slog.String("user_agent", r.UserAgent()),
)
2018-10-08 03:42:43 +02:00
json.Unauthorized(w, r)
return
}
if username == "" || password == "" {
slog.Warn("[API] Empty username or password provided during Basic HTTP Authentication",
slog.Bool("authentication_failed", true),
slog.String("client_ip", clientIP),
slog.String("user_agent", r.UserAgent()),
)
json.Unauthorized(w, r)
2017-11-20 06:10:04 +01:00
return
}
2018-04-28 05:38:46 +02:00
if err := m.store.CheckPassword(username, password); err != nil {
slog.Warn("[API] Invalid username or password provided during Basic HTTP Authentication",
slog.Bool("authentication_failed", true),
slog.String("client_ip", clientIP),
slog.String("user_agent", r.UserAgent()),
slog.String("username", username),
)
2018-10-08 03:42:43 +02:00
json.Unauthorized(w, r)
2017-11-20 06:10:04 +01:00
return
}
2018-04-28 05:38:46 +02:00
user, err := m.store.UserByUsername(username)
2017-12-29 22:53:02 +01:00
if err != nil {
2018-10-08 03:42:43 +02:00
json.ServerError(w, r, err)
2017-12-29 22:53:02 +01:00
return
}
if user == nil {
slog.Warn("[API] User not found while using Basic HTTP Authentication",
slog.Bool("authentication_failed", true),
slog.String("client_ip", clientIP),
slog.String("user_agent", r.UserAgent()),
slog.String("username", username),
)
2018-10-08 03:42:43 +02:00
json.Unauthorized(w, r)
2017-11-20 06:10:04 +01:00
return
}
slog.Info("[API] User authenticated successfully with the Basic HTTP Authentication",
slog.Bool("authentication_successful", true),
slog.String("client_ip", clientIP),
slog.String("user_agent", r.UserAgent()),
slog.String("username", username),
)
2018-04-28 05:38:46 +02:00
m.store.SetLastLogin(user.ID)
2017-11-20 06:10:04 +01:00
ctx := r.Context()
2018-09-03 23:26:40 +02:00
ctx = context.WithValue(ctx, request.UserIDContextKey, user.ID)
ctx = context.WithValue(ctx, request.UserTimezoneContextKey, user.Timezone)
ctx = context.WithValue(ctx, request.IsAdminUserContextKey, user.IsAdmin)
ctx = context.WithValue(ctx, request.IsAuthenticatedContextKey, true)
2017-11-20 06:10:04 +01:00
next.ServeHTTP(w, r.WithContext(ctx))
})
}