2019-11-23 02:33:31 +03:00
|
|
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2021-06-09 20:53:16 +03:00
|
|
|
package auth
|
2019-11-23 02:33:31 +03:00
|
|
|
|
|
|
|
import (
|
2021-07-24 13:16:34 +03:00
|
|
|
"context"
|
2021-01-05 16:05:40 +03:00
|
|
|
"net/http"
|
2019-11-23 02:33:31 +03:00
|
|
|
|
2021-11-24 12:49:20 +03:00
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
2021-01-26 18:36:53 +03:00
|
|
|
"code.gitea.io/gitea/modules/session"
|
2021-01-30 11:55:53 +03:00
|
|
|
"code.gitea.io/gitea/modules/web/middleware"
|
2019-11-23 02:33:31 +03:00
|
|
|
)
|
|
|
|
|
2021-01-05 16:05:40 +03:00
|
|
|
// DataStore represents a data store
|
2021-01-30 11:55:53 +03:00
|
|
|
type DataStore middleware.DataStore
|
2021-01-05 16:05:40 +03:00
|
|
|
|
|
|
|
// SessionStore represents a session store
|
2021-01-26 18:36:53 +03:00
|
|
|
type SessionStore session.Store
|
2021-01-05 16:05:40 +03:00
|
|
|
|
2021-07-24 13:16:34 +03:00
|
|
|
// Method represents an authentication method (plugin) for HTTP requests.
|
|
|
|
type Method interface {
|
|
|
|
// Verify tries to verify the authentication data contained in the request.
|
|
|
|
// If verification is successful returns either an existing user object (with id > 0)
|
|
|
|
// or a new user object (with id = 0) populated with the information that was found
|
|
|
|
// in the authentication data (username or email).
|
refactor auth interface to return error when verify failure (#22119) (#22259)
backport #22119
This PR changed the Auth interface signature from `Verify(http
*http.Request, w http.ResponseWriter, store DataStore, sess
SessionStore) *user_model.User`
to
`Verify(http *http.Request, w http.ResponseWriter, store DataStore, sess
SessionStore) (*user_model.User, error)`.
There is a new return argument `error` which means the verification
condition matched but verify process failed, we should stop the auth
process.
Before this PR, when return a `nil` user, we don't know the reason why
it returned `nil`. If the match condition is not satisfied or it
verified failure? For these two different results, we should have
different handler. If the match condition is not satisfied, we should
try next auth method and if there is no more auth method, it's an
anonymous user. If the condition matched but verify failed, the auth
process should be stop and return immediately.
This will fix #20563
Co-authored-by: KN4CK3R <admin@oldschoolhack.me>
Co-authored-by: Jason Song <i@wolfogre.com>
2022-12-29 08:50:09 +03:00
|
|
|
// Second argument returns err if verification fails, otherwise
|
|
|
|
// First return argument returns nil if no matched verification condition
|
|
|
|
Verify(http *http.Request, w http.ResponseWriter, store DataStore, sess SessionStore) (*user_model.User, error)
|
2021-07-24 13:16:34 +03:00
|
|
|
}
|
2021-06-09 20:53:16 +03:00
|
|
|
|
2021-07-24 13:16:34 +03:00
|
|
|
// Initializable represents a structure that requires initialization
|
|
|
|
// It usually should only be called once before anything else is called
|
|
|
|
type Initializable interface {
|
2019-11-23 02:33:31 +03:00
|
|
|
// Init should be called exactly once before using any of the other methods,
|
|
|
|
// in order to allow the plugin to allocate necessary resources
|
2022-08-28 12:43:25 +03:00
|
|
|
Init(ctx context.Context) error
|
2021-07-24 13:16:34 +03:00
|
|
|
}
|
2019-11-23 02:33:31 +03:00
|
|
|
|
2021-07-24 13:16:34 +03:00
|
|
|
// Named represents a named thing
|
|
|
|
type Named interface {
|
|
|
|
Name() string
|
|
|
|
}
|
|
|
|
|
|
|
|
// Freeable represents a structure that is required to be freed
|
|
|
|
type Freeable interface {
|
2019-11-23 02:33:31 +03:00
|
|
|
// Free should be called exactly once before application closes, in order to
|
|
|
|
// give chance to the plugin to free any allocated resources
|
|
|
|
Free() error
|
2021-07-24 13:16:34 +03:00
|
|
|
}
|
2019-11-23 02:33:31 +03:00
|
|
|
|
2021-07-24 13:16:34 +03:00
|
|
|
// PasswordAuthenticator represents a source of authentication
|
|
|
|
type PasswordAuthenticator interface {
|
2021-11-24 12:49:20 +03:00
|
|
|
Authenticate(user *user_model.User, login, password string) (*user_model.User, error)
|
2021-07-24 13:16:34 +03:00
|
|
|
}
|
|
|
|
|
2021-09-17 14:43:47 +03:00
|
|
|
// LocalTwoFASkipper represents a source of authentication that can skip local 2fa
|
|
|
|
type LocalTwoFASkipper interface {
|
|
|
|
IsSkipLocalTwoFA() bool
|
|
|
|
}
|
|
|
|
|
2021-07-24 13:16:34 +03:00
|
|
|
// SynchronizableSource represents a source that can synchronize users
|
|
|
|
type SynchronizableSource interface {
|
|
|
|
Sync(ctx context.Context, updateExisting bool) error
|
2019-11-23 02:33:31 +03:00
|
|
|
}
|