2019-08-29 12:34:07 +03:00
|
|
|
package home
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/sha256"
|
|
|
|
"encoding/binary"
|
|
|
|
"encoding/hex"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"math/rand"
|
|
|
|
"net/http"
|
|
|
|
"strings"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/AdguardTeam/golibs/log"
|
2020-04-05 18:21:26 +03:00
|
|
|
"go.etcd.io/bbolt"
|
2019-08-29 12:34:07 +03:00
|
|
|
"golang.org/x/crypto/bcrypt"
|
|
|
|
)
|
|
|
|
|
|
|
|
const cookieTTL = 365 * 24 // in hours
|
2019-11-25 15:45:50 +03:00
|
|
|
const sessionCookieName = "agh_session"
|
2019-08-29 12:34:07 +03:00
|
|
|
|
2019-10-21 17:44:07 +03:00
|
|
|
type session struct {
|
|
|
|
userName string
|
|
|
|
expire uint32 // expiration time (in seconds)
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
expire byte[4]
|
|
|
|
name_len byte[2]
|
|
|
|
name byte[]
|
|
|
|
*/
|
|
|
|
func (s *session) serialize() []byte {
|
|
|
|
var data []byte
|
|
|
|
data = make([]byte, 4+2+len(s.userName))
|
|
|
|
binary.BigEndian.PutUint32(data[0:4], s.expire)
|
|
|
|
binary.BigEndian.PutUint16(data[4:6], uint16(len(s.userName)))
|
|
|
|
copy(data[6:], []byte(s.userName))
|
|
|
|
return data
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *session) deserialize(data []byte) bool {
|
|
|
|
if len(data) < 4+2 {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
s.expire = binary.BigEndian.Uint32(data[0:4])
|
|
|
|
nameLen := binary.BigEndian.Uint16(data[4:6])
|
|
|
|
data = data[6:]
|
|
|
|
|
|
|
|
if len(data) < int(nameLen) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
s.userName = string(data)
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2019-08-29 12:34:07 +03:00
|
|
|
// Auth - global object
|
|
|
|
type Auth struct {
|
2019-11-12 14:23:00 +03:00
|
|
|
db *bbolt.DB
|
|
|
|
sessions map[string]*session // session name -> session data
|
|
|
|
lock sync.Mutex
|
|
|
|
users []User
|
|
|
|
sessionTTL uint32 // in seconds
|
2019-08-29 12:34:07 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// User object
|
|
|
|
type User struct {
|
|
|
|
Name string `yaml:"name"`
|
|
|
|
PasswordHash string `yaml:"password"` // bcrypt hash
|
|
|
|
}
|
|
|
|
|
|
|
|
// InitAuth - create a global object
|
2019-11-12 14:23:00 +03:00
|
|
|
func InitAuth(dbFilename string, users []User, sessionTTL uint32) *Auth {
|
2020-04-15 15:17:57 +03:00
|
|
|
log.Info("Initializing auth module: %s", dbFilename)
|
|
|
|
|
2019-08-29 12:34:07 +03:00
|
|
|
a := Auth{}
|
2019-11-12 14:23:00 +03:00
|
|
|
a.sessionTTL = sessionTTL
|
2019-10-21 17:44:07 +03:00
|
|
|
a.sessions = make(map[string]*session)
|
2019-08-29 12:34:07 +03:00
|
|
|
rand.Seed(time.Now().UTC().Unix())
|
|
|
|
var err error
|
|
|
|
a.db, err = bbolt.Open(dbFilename, 0644, nil)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Auth: bbolt.Open: %s", err)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
a.loadSessions()
|
|
|
|
a.users = users
|
2020-04-15 15:17:57 +03:00
|
|
|
log.Info("Auth: initialized. users:%d sessions:%d", len(a.users), len(a.sessions))
|
2019-08-29 12:34:07 +03:00
|
|
|
return &a
|
|
|
|
}
|
|
|
|
|
|
|
|
// Close - close module
|
|
|
|
func (a *Auth) Close() {
|
|
|
|
_ = a.db.Close()
|
|
|
|
}
|
|
|
|
|
2019-10-21 17:44:07 +03:00
|
|
|
func bucketName() []byte {
|
|
|
|
return []byte("sessions-2")
|
|
|
|
}
|
|
|
|
|
2019-08-29 12:34:07 +03:00
|
|
|
// load sessions from file, remove expired sessions
|
|
|
|
func (a *Auth) loadSessions() {
|
|
|
|
tx, err := a.db.Begin(true)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Auth: bbolt.Begin: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
_ = tx.Rollback()
|
|
|
|
}()
|
|
|
|
|
2019-10-21 17:44:07 +03:00
|
|
|
bkt := tx.Bucket(bucketName())
|
2019-08-29 12:34:07 +03:00
|
|
|
if bkt == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
removed := 0
|
2019-10-21 17:44:07 +03:00
|
|
|
|
|
|
|
if tx.Bucket([]byte("sessions")) != nil {
|
|
|
|
_ = tx.DeleteBucket([]byte("sessions"))
|
|
|
|
removed = 1
|
|
|
|
}
|
|
|
|
|
2019-08-29 12:34:07 +03:00
|
|
|
now := uint32(time.Now().UTC().Unix())
|
|
|
|
forEach := func(k, v []byte) error {
|
2019-10-21 17:44:07 +03:00
|
|
|
s := session{}
|
|
|
|
if !s.deserialize(v) || s.expire <= now {
|
2019-08-29 12:34:07 +03:00
|
|
|
err = bkt.Delete(k)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Auth: bbolt.Delete: %s", err)
|
|
|
|
} else {
|
|
|
|
removed++
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2019-10-21 17:44:07 +03:00
|
|
|
|
|
|
|
a.sessions[hex.EncodeToString(k)] = &s
|
2019-08-29 12:34:07 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
_ = bkt.ForEach(forEach)
|
|
|
|
if removed != 0 {
|
2019-09-18 13:17:35 +03:00
|
|
|
err = tx.Commit()
|
|
|
|
if err != nil {
|
|
|
|
log.Error("bolt.Commit(): %s", err)
|
|
|
|
}
|
2019-08-29 12:34:07 +03:00
|
|
|
}
|
|
|
|
log.Debug("Auth: loaded %d sessions from DB (removed %d expired)", len(a.sessions), removed)
|
|
|
|
}
|
|
|
|
|
|
|
|
// store session data in file
|
2019-10-21 17:44:07 +03:00
|
|
|
func (a *Auth) addSession(data []byte, s *session) {
|
2019-11-12 14:24:27 +03:00
|
|
|
name := hex.EncodeToString(data)
|
2019-08-29 12:34:07 +03:00
|
|
|
a.lock.Lock()
|
2019-11-12 14:24:27 +03:00
|
|
|
a.sessions[name] = s
|
2019-08-29 12:34:07 +03:00
|
|
|
a.lock.Unlock()
|
2019-11-12 14:24:27 +03:00
|
|
|
if a.storeSession(data, s) {
|
2020-02-13 18:42:07 +03:00
|
|
|
log.Debug("Auth: created session %s: expire=%d", name, s.expire)
|
2019-11-12 14:24:27 +03:00
|
|
|
}
|
2019-10-21 17:44:07 +03:00
|
|
|
}
|
2019-08-29 12:34:07 +03:00
|
|
|
|
2019-10-21 17:44:07 +03:00
|
|
|
// store session data in file
|
2019-11-12 14:24:27 +03:00
|
|
|
func (a *Auth) storeSession(data []byte, s *session) bool {
|
2019-08-29 12:34:07 +03:00
|
|
|
tx, err := a.db.Begin(true)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Auth: bbolt.Begin: %s", err)
|
2019-11-12 14:24:27 +03:00
|
|
|
return false
|
2019-08-29 12:34:07 +03:00
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
_ = tx.Rollback()
|
|
|
|
}()
|
|
|
|
|
2019-10-21 17:44:07 +03:00
|
|
|
bkt, err := tx.CreateBucketIfNotExists(bucketName())
|
2019-08-29 12:34:07 +03:00
|
|
|
if err != nil {
|
|
|
|
log.Error("Auth: bbolt.CreateBucketIfNotExists: %s", err)
|
2019-11-12 14:24:27 +03:00
|
|
|
return false
|
2019-08-29 12:34:07 +03:00
|
|
|
}
|
2019-10-21 17:44:07 +03:00
|
|
|
err = bkt.Put(data, s.serialize())
|
2019-08-29 12:34:07 +03:00
|
|
|
if err != nil {
|
|
|
|
log.Error("Auth: bbolt.Put: %s", err)
|
2019-11-12 14:24:27 +03:00
|
|
|
return false
|
2019-08-29 12:34:07 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
err = tx.Commit()
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Auth: bbolt.Commit: %s", err)
|
2019-11-12 14:24:27 +03:00
|
|
|
return false
|
2019-08-29 12:34:07 +03:00
|
|
|
}
|
2019-11-12 14:24:27 +03:00
|
|
|
return true
|
2019-08-29 12:34:07 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// remove session from file
|
|
|
|
func (a *Auth) removeSession(sess []byte) {
|
|
|
|
tx, err := a.db.Begin(true)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Auth: bbolt.Begin: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
_ = tx.Rollback()
|
|
|
|
}()
|
|
|
|
|
2019-10-21 17:44:07 +03:00
|
|
|
bkt := tx.Bucket(bucketName())
|
2019-08-29 12:34:07 +03:00
|
|
|
if bkt == nil {
|
|
|
|
log.Error("Auth: bbolt.Bucket")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
err = bkt.Delete(sess)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Auth: bbolt.Put: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
err = tx.Commit()
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Auth: bbolt.Commit: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Debug("Auth: removed session from DB")
|
|
|
|
}
|
|
|
|
|
|
|
|
// CheckSession - check if session is valid
|
|
|
|
// Return 0 if OK; -1 if session doesn't exist; 1 if session has expired
|
|
|
|
func (a *Auth) CheckSession(sess string) int {
|
|
|
|
now := uint32(time.Now().UTC().Unix())
|
|
|
|
update := false
|
|
|
|
|
|
|
|
a.lock.Lock()
|
2019-10-21 17:44:07 +03:00
|
|
|
s, ok := a.sessions[sess]
|
2019-08-29 12:34:07 +03:00
|
|
|
if !ok {
|
|
|
|
a.lock.Unlock()
|
|
|
|
return -1
|
|
|
|
}
|
2019-10-21 17:44:07 +03:00
|
|
|
if s.expire <= now {
|
2019-08-29 12:34:07 +03:00
|
|
|
delete(a.sessions, sess)
|
|
|
|
key, _ := hex.DecodeString(sess)
|
|
|
|
a.removeSession(key)
|
|
|
|
a.lock.Unlock()
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2019-11-12 14:23:00 +03:00
|
|
|
newExpire := now + a.sessionTTL
|
2019-10-21 17:44:07 +03:00
|
|
|
if s.expire/(24*60*60) != newExpire/(24*60*60) {
|
2019-08-29 12:34:07 +03:00
|
|
|
// update expiration time once a day
|
|
|
|
update = true
|
2019-10-21 17:44:07 +03:00
|
|
|
s.expire = newExpire
|
2019-08-29 12:34:07 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
a.lock.Unlock()
|
|
|
|
|
|
|
|
if update {
|
|
|
|
key, _ := hex.DecodeString(sess)
|
2019-11-12 14:24:27 +03:00
|
|
|
if a.storeSession(key, s) {
|
|
|
|
log.Debug("Auth: updated session %s: expire=%d", sess, s.expire)
|
|
|
|
}
|
2019-08-29 12:34:07 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
// RemoveSession - remove session
|
|
|
|
func (a *Auth) RemoveSession(sess string) {
|
|
|
|
key, _ := hex.DecodeString(sess)
|
|
|
|
a.lock.Lock()
|
|
|
|
delete(a.sessions, sess)
|
|
|
|
a.lock.Unlock()
|
|
|
|
a.removeSession(key)
|
|
|
|
}
|
|
|
|
|
|
|
|
type loginJSON struct {
|
|
|
|
Name string `json:"name"`
|
|
|
|
Password string `json:"password"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func getSession(u *User) []byte {
|
|
|
|
d := []byte(fmt.Sprintf("%d%s%s", rand.Uint32(), u.Name, u.PasswordHash))
|
|
|
|
hash := sha256.Sum256(d)
|
|
|
|
return hash[:]
|
|
|
|
}
|
|
|
|
|
2019-11-12 14:23:00 +03:00
|
|
|
func (a *Auth) httpCookie(req loginJSON) string {
|
|
|
|
u := a.UserFind(req.Name, req.Password)
|
2019-08-29 12:34:07 +03:00
|
|
|
if len(u.Name) == 0 {
|
2019-10-11 12:41:01 +03:00
|
|
|
return ""
|
2019-08-29 12:34:07 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
sess := getSession(&u)
|
|
|
|
|
|
|
|
now := time.Now().UTC()
|
|
|
|
expire := now.Add(cookieTTL * time.Hour)
|
|
|
|
expstr := expire.Format(time.RFC1123)
|
|
|
|
expstr = expstr[:len(expstr)-len("UTC")] // "UTC" -> "GMT"
|
|
|
|
expstr += "GMT"
|
|
|
|
|
2019-10-21 17:44:07 +03:00
|
|
|
s := session{}
|
|
|
|
s.userName = u.Name
|
2019-11-12 14:23:00 +03:00
|
|
|
s.expire = uint32(now.Unix()) + a.sessionTTL
|
|
|
|
a.addSession(sess, &s)
|
2019-08-29 12:34:07 +03:00
|
|
|
|
2019-11-25 15:45:50 +03:00
|
|
|
return fmt.Sprintf("%s=%s; Path=/; HttpOnly; Expires=%s",
|
|
|
|
sessionCookieName, hex.EncodeToString(sess), expstr)
|
2019-10-11 12:41:01 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func handleLogin(w http.ResponseWriter, r *http.Request) {
|
|
|
|
req := loginJSON{}
|
|
|
|
err := json.NewDecoder(r.Body).Decode(&req)
|
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusBadRequest, "json decode: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-02-13 18:42:07 +03:00
|
|
|
cookie := Context.auth.httpCookie(req)
|
2019-10-11 12:41:01 +03:00
|
|
|
if len(cookie) == 0 {
|
2019-11-12 14:24:27 +03:00
|
|
|
log.Info("Auth: invalid user name or password: name='%s'", req.Name)
|
2019-10-11 12:41:01 +03:00
|
|
|
time.Sleep(1 * time.Second)
|
2019-11-12 14:24:27 +03:00
|
|
|
http.Error(w, "invalid user name or password", http.StatusBadRequest)
|
2019-10-11 12:41:01 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set("Set-Cookie", cookie)
|
2019-08-29 12:34:07 +03:00
|
|
|
|
|
|
|
w.Header().Set("Cache-Control", "no-store, no-cache, must-revalidate, proxy-revalidate")
|
|
|
|
w.Header().Set("Pragma", "no-cache")
|
|
|
|
w.Header().Set("Expires", "0")
|
|
|
|
|
|
|
|
returnOK(w)
|
|
|
|
}
|
|
|
|
|
|
|
|
func handleLogout(w http.ResponseWriter, r *http.Request) {
|
|
|
|
cookie := r.Header.Get("Cookie")
|
|
|
|
sess := parseCookie(cookie)
|
|
|
|
|
2020-02-13 18:42:07 +03:00
|
|
|
Context.auth.RemoveSession(sess)
|
2019-08-29 12:34:07 +03:00
|
|
|
|
|
|
|
w.Header().Set("Location", "/login.html")
|
|
|
|
|
2019-11-25 15:45:50 +03:00
|
|
|
s := fmt.Sprintf("%s=; Path=/; HttpOnly; Expires=Thu, 01 Jan 1970 00:00:00 GMT",
|
|
|
|
sessionCookieName)
|
2019-08-29 12:34:07 +03:00
|
|
|
w.Header().Set("Set-Cookie", s)
|
|
|
|
|
|
|
|
w.WriteHeader(http.StatusFound)
|
|
|
|
}
|
|
|
|
|
|
|
|
// RegisterAuthHandlers - register handlers
|
|
|
|
func RegisterAuthHandlers() {
|
|
|
|
http.Handle("/control/login", postInstallHandler(ensureHandler("POST", handleLogin)))
|
|
|
|
httpRegister("GET", "/control/logout", handleLogout)
|
|
|
|
}
|
|
|
|
|
|
|
|
func parseCookie(cookie string) string {
|
|
|
|
pairs := strings.Split(cookie, ";")
|
|
|
|
for _, pair := range pairs {
|
|
|
|
pair = strings.TrimSpace(pair)
|
|
|
|
kv := strings.SplitN(pair, "=", 2)
|
|
|
|
if len(kv) != 2 {
|
|
|
|
continue
|
|
|
|
}
|
2019-11-25 15:45:50 +03:00
|
|
|
if kv[0] == sessionCookieName {
|
2019-08-29 12:34:07 +03:00
|
|
|
return kv[1]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func optionalAuth(handler func(http.ResponseWriter, *http.Request)) func(http.ResponseWriter, *http.Request) {
|
|
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
|
|
|
|
if r.URL.Path == "/login.html" {
|
|
|
|
// redirect to dashboard if already authenticated
|
2020-02-13 18:42:07 +03:00
|
|
|
authRequired := Context.auth != nil && Context.auth.AuthRequired()
|
2019-11-25 15:45:50 +03:00
|
|
|
cookie, err := r.Cookie(sessionCookieName)
|
2019-08-29 12:34:07 +03:00
|
|
|
if authRequired && err == nil {
|
2020-02-13 18:42:07 +03:00
|
|
|
r := Context.auth.CheckSession(cookie.Value)
|
2019-08-29 12:34:07 +03:00
|
|
|
if r == 0 {
|
|
|
|
w.Header().Set("Location", "/")
|
|
|
|
w.WriteHeader(http.StatusFound)
|
|
|
|
return
|
|
|
|
} else if r < 0 {
|
2020-04-05 18:21:26 +03:00
|
|
|
log.Debug("Auth: invalid cookie value: %s", cookie)
|
2019-08-29 12:34:07 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-14 14:45:16 +03:00
|
|
|
} else if strings.HasPrefix(r.URL.Path,"/assets/") ||
|
2020-01-31 14:15:11 +03:00
|
|
|
strings.HasPrefix(r.URL.Path, "/login.") ||
|
|
|
|
strings.HasPrefix(r.URL.Path, "/__locales/") {
|
2019-08-29 12:34:07 +03:00
|
|
|
// process as usual
|
|
|
|
|
2020-02-13 18:42:07 +03:00
|
|
|
} else if Context.auth != nil && Context.auth.AuthRequired() {
|
2019-08-29 12:34:07 +03:00
|
|
|
// redirect to login page if not authenticated
|
|
|
|
ok := false
|
2019-11-25 15:45:50 +03:00
|
|
|
cookie, err := r.Cookie(sessionCookieName)
|
2019-08-29 12:34:07 +03:00
|
|
|
if err == nil {
|
2020-02-13 18:42:07 +03:00
|
|
|
r := Context.auth.CheckSession(cookie.Value)
|
2019-08-29 12:34:07 +03:00
|
|
|
if r == 0 {
|
|
|
|
ok = true
|
|
|
|
} else if r < 0 {
|
2020-04-05 18:21:26 +03:00
|
|
|
log.Debug("Auth: invalid cookie value: %s", cookie)
|
2019-08-29 12:34:07 +03:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// there's no Cookie, check Basic authentication
|
|
|
|
user, pass, ok2 := r.BasicAuth()
|
|
|
|
if ok2 {
|
2020-02-13 18:42:07 +03:00
|
|
|
u := Context.auth.UserFind(user, pass)
|
2019-08-29 12:34:07 +03:00
|
|
|
if len(u.Name) != 0 {
|
|
|
|
ok = true
|
2019-11-12 14:24:27 +03:00
|
|
|
} else {
|
|
|
|
log.Info("Auth: invalid Basic Authorization value")
|
2019-08-29 12:34:07 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !ok {
|
2020-01-21 12:58:55 +03:00
|
|
|
if r.URL.Path == "/" || r.URL.Path == "/index.html" {
|
|
|
|
w.Header().Set("Location", "/login.html")
|
|
|
|
w.WriteHeader(http.StatusFound)
|
|
|
|
} else {
|
|
|
|
w.WriteHeader(http.StatusForbidden)
|
|
|
|
_, _ = w.Write([]byte("Forbidden"))
|
|
|
|
}
|
2019-08-29 12:34:07 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
handler(w, r)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type authHandler struct {
|
|
|
|
handler http.Handler
|
|
|
|
}
|
|
|
|
|
|
|
|
func (a *authHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
|
|
optionalAuth(a.handler.ServeHTTP)(w, r)
|
|
|
|
}
|
|
|
|
|
|
|
|
func optionalAuthHandler(handler http.Handler) http.Handler {
|
|
|
|
return &authHandler{handler}
|
|
|
|
}
|
|
|
|
|
|
|
|
// UserAdd - add new user
|
|
|
|
func (a *Auth) UserAdd(u *User, password string) {
|
|
|
|
if len(password) == 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
hash, err := bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("bcrypt.GenerateFromPassword: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
u.PasswordHash = string(hash)
|
|
|
|
|
|
|
|
a.lock.Lock()
|
|
|
|
a.users = append(a.users, *u)
|
|
|
|
a.lock.Unlock()
|
|
|
|
|
|
|
|
log.Debug("Auth: added user: %s", u.Name)
|
|
|
|
}
|
|
|
|
|
|
|
|
// UserFind - find a user
|
|
|
|
func (a *Auth) UserFind(login string, password string) User {
|
|
|
|
a.lock.Lock()
|
|
|
|
defer a.lock.Unlock()
|
|
|
|
for _, u := range a.users {
|
|
|
|
if u.Name == login &&
|
|
|
|
bcrypt.CompareHashAndPassword([]byte(u.PasswordHash), []byte(password)) == nil {
|
|
|
|
return u
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return User{}
|
|
|
|
}
|
|
|
|
|
2019-10-21 17:44:07 +03:00
|
|
|
// GetCurrentUser - get the current user
|
|
|
|
func (a *Auth) GetCurrentUser(r *http.Request) User {
|
2019-11-25 15:45:50 +03:00
|
|
|
cookie, err := r.Cookie(sessionCookieName)
|
2019-10-21 17:44:07 +03:00
|
|
|
if err != nil {
|
|
|
|
// there's no Cookie, check Basic authentication
|
|
|
|
user, pass, ok := r.BasicAuth()
|
|
|
|
if ok {
|
2020-02-13 18:42:07 +03:00
|
|
|
u := Context.auth.UserFind(user, pass)
|
2019-10-21 17:44:07 +03:00
|
|
|
return u
|
|
|
|
}
|
2019-10-25 11:01:29 +03:00
|
|
|
return User{}
|
2019-10-21 17:44:07 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
a.lock.Lock()
|
|
|
|
s, ok := a.sessions[cookie.Value]
|
|
|
|
if !ok {
|
|
|
|
a.lock.Unlock()
|
|
|
|
return User{}
|
|
|
|
}
|
|
|
|
for _, u := range a.users {
|
|
|
|
if u.Name == s.userName {
|
|
|
|
a.lock.Unlock()
|
|
|
|
return u
|
|
|
|
}
|
|
|
|
}
|
|
|
|
a.lock.Unlock()
|
|
|
|
return User{}
|
|
|
|
}
|
|
|
|
|
2019-08-29 12:34:07 +03:00
|
|
|
// GetUsers - get users
|
|
|
|
func (a *Auth) GetUsers() []User {
|
|
|
|
a.lock.Lock()
|
|
|
|
users := a.users
|
|
|
|
a.lock.Unlock()
|
|
|
|
return users
|
|
|
|
}
|
|
|
|
|
|
|
|
// AuthRequired - if authentication is required
|
|
|
|
func (a *Auth) AuthRequired() bool {
|
|
|
|
a.lock.Lock()
|
|
|
|
r := (len(a.users) != 0)
|
|
|
|
a.lock.Unlock()
|
|
|
|
return r
|
|
|
|
}
|