// Copyright or © or Copr. happyDNS (2021) // // contact@happydomain.org // // This software is a computer program whose purpose is to provide a modern // interface to interact with DNS systems. // // This software is governed by the CeCILL license under French law and abiding // by the rules of distribution of free software. You can use, modify and/or // redistribute the software under the terms of the CeCILL license as // circulated by CEA, CNRS and INRIA at the following URL // "http://www.cecill.info". // // As a counterpart to the access to the source code and rights to copy, modify // and redistribute granted by the license, users are provided only with a // limited warranty and the software's author, the holder of the economic // rights, and the successive licensors have only limited liability. // // In this respect, the user's attention is drawn to the risks associated with // loading, using, modifying and/or developing or reproducing the software by // the user in light of its specific status of free software, that may mean // that it is complicated to manipulate, and that also therefore means that it // is reserved for developers and experienced professionals having in-depth // computer knowledge. Users are therefore encouraged to load and test the // software's suitability as regards their requirements in conditions enabling // the security of their systems and/or data to be ensured and, more generally, // to use and operate it in the same conditions as regards security. // // The fact that you are presently reading this means that you have had // knowledge of the CeCILL license and that you accept its terms. package api import ( "fmt" "log" "net/http" "strings" "time" "github.com/gin-gonic/gin" "github.com/golang-jwt/jwt/v4" "git.happydns.org/happydomain/config" "git.happydns.org/happydomain/model" "git.happydns.org/happydomain/storage" ) type UserProfile struct { UserId []byte `json:"userid"` Email string `json:"email"` EmailVerified bool `json:"email_verified"` CreatedAt time.Time `json:"created_at"` } type UserClaims struct { Profile UserProfile `json:"profile"` jwt.RegisteredClaims } const COOKIE_NAME = "happydomain_session" var signingMethod = jwt.SigningMethodHS512 func updateUserFromClaims(user *happydns.User, claims *UserClaims) { user.Email = claims.Profile.Email user.LastSeen = time.Now() } func retrieveUserFromClaims(claims *UserClaims) (user *happydns.User, err error) { user, err = storage.MainStore.GetUser(claims.Profile.UserId) if err != nil { // The user doesn't exists yet: create it! user = &happydns.User{ Id: claims.Profile.UserId, Email: claims.Profile.Email, CreatedAt: time.Now(), LastSeen: time.Now(), Settings: *happydns.DefaultUserSettings(), } err = storage.MainStore.UpdateUser(user) if err != nil { err = fmt.Errorf("has a correct JWT, but an error occurs when creating the user: %w", err) return } } else if time.Since(user.LastSeen) > time.Hour*12 { // Update user's data when connected more than 12 hours updateUserFromClaims(user, claims) err = storage.MainStore.UpdateUser(user) if err != nil { err = fmt.Errorf("has a correct JWT, user has been found, but an error occurs when updating user's information: %w", err) return } } return } func retrieveSessionFromClaims(claims *UserClaims, user *happydns.User, session_id []byte) (session *happydns.Session, err error) { session, err = storage.MainStore.GetSession(session_id) if err != nil { // The session doesn't exists yet: create it! session = &happydns.Session{ Id: session_id, IdUser: claims.Profile.UserId, IssuedAt: time.Now(), } err = storage.MainStore.UpdateSession(session) if err != nil { err = fmt.Errorf("has a correct JWT, but an error occurs when creating the session: %w", err) return } // Update user's data updateUserFromClaims(user, claims) err = storage.MainStore.UpdateUser(user) if err != nil { err = fmt.Errorf("has a correct JWT, session has been created, but an error occurs when updating user's information: %w", err) return } } return } func requireLogin(opts *config.Options, c *gin.Context, msg string) { if opts.ExternalAuth.URL != nil { customurl := *opts.ExternalAuth.URL q := customurl.Query() q.Set("errmsg", msg) customurl.RawQuery = q.Encode() c.Header("Location", customurl.String()) } c.AbortWithStatusJSON(http.StatusUnauthorized, gin.H{"errmsg": msg}) } func authMiddleware(opts *config.Options, optional bool) gin.HandlerFunc { return func(c *gin.Context) { var token string // Retrieve the token from cookie or header if cookie, err := c.Cookie(COOKIE_NAME); err == nil { token = cookie } else if flds := strings.Fields(c.GetHeader("Authorization")); len(flds) == 2 && flds[0] == "Bearer" { token = flds[1] } // Stop here if there is no cookie if len(token) == 0 { if optional { c.Next() } else { requireLogin(opts, c, "No authorization token found in cookie nor in Authorization header.") } return } // Validate the token and retrieve claims claims := &UserClaims{} _, err := jwt.ParseWithClaims(token, claims, func(token *jwt.Token) (interface{}, error) { return []byte(opts.JWTSecretKey), nil }, jwt.WithValidMethods([]string{signingMethod.Name})) if err != nil { log.Printf("%s provide a bad JWT claims: %s", c.ClientIP(), err.Error()) c.SetCookie(COOKIE_NAME, "", -1, opts.BaseURL+"/", "", opts.DevProxy == "", true) requireLogin(opts, c, "Something goes wrong with your session. Please reconnect.") return } // Check that required fields are filled if len(claims.Profile.UserId) == 0 { log.Printf("%s: no UserId found in JWT claims", c.ClientIP()) c.SetCookie(COOKIE_NAME, "", -1, opts.BaseURL+"/", "", opts.DevProxy == "", true) requireLogin(opts, c, "Something goes wrong with your session. Please reconnect.") return } if claims.Profile.Email == "" { log.Printf("%s: no Email found in JWT claims", c.ClientIP()) c.SetCookie(COOKIE_NAME, "", -1, opts.BaseURL+"/", "", opts.DevProxy == "", true) requireLogin(opts, c, "Something goes wrong with your session. Please reconnect.") return } // Retrieve corresponding user user, err := retrieveUserFromClaims(claims) if err != nil { log.Printf("%s %s", c.ClientIP(), err.Error()) c.SetCookie(COOKIE_NAME, "", -1, opts.BaseURL+"/", "", opts.DevProxy == "", true) requireLogin(opts, c, "Something goes wrong with your session. Please reconnect.") return } c.Set("LoggedUser", user) // Retrieve the session session_id := append([]byte(claims.Profile.UserId), []byte(claims.ID)...) session, err := retrieveSessionFromClaims(claims, user, session_id) if err != nil { log.Printf("%s %s", c.ClientIP(), err.Error()) c.SetCookie(COOKIE_NAME, "", -1, opts.BaseURL+"/", "", opts.DevProxy == "", true) requireLogin(opts, c, "Your session has expired. Please reconnect.") return } c.Set("MySession", session) // We are now ready to continue c.Next() // On return, check if the session has changed if session.HasChanged() { storage.MainStore.UpdateSession(session) } } }