gitea源码

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Copyright 2019 The Gitea Authors. All rights reserved.
  3. // SPDX-License-Identifier: MIT
  4. package auth
  5. import (
  6. "net/http"
  7. "strings"
  8. user_model "code.gitea.io/gitea/models/user"
  9. "code.gitea.io/gitea/modules/log"
  10. "code.gitea.io/gitea/modules/optional"
  11. "code.gitea.io/gitea/modules/setting"
  12. gouuid "github.com/google/uuid"
  13. )
  14. // Ensure the struct implements the interface.
  15. var (
  16. _ Method = &ReverseProxy{}
  17. )
  18. // ReverseProxyMethodName is the constant name of the ReverseProxy authentication method
  19. const ReverseProxyMethodName = "reverse_proxy"
  20. // ReverseProxy implements the Auth interface, but actually relies on
  21. // a reverse proxy for authentication of users.
  22. // On successful authentication the proxy is expected to populate the username in the
  23. // "setting.ReverseProxyAuthUser" header. Optionally it can also populate the email of the
  24. // user in the "setting.ReverseProxyAuthEmail" header.
  25. type ReverseProxy struct{}
  26. // getUserName extracts the username from the "setting.ReverseProxyAuthUser" header
  27. func (r *ReverseProxy) getUserName(req *http.Request) string {
  28. return strings.TrimSpace(req.Header.Get(setting.ReverseProxyAuthUser))
  29. }
  30. // Name represents the name of auth method
  31. func (r *ReverseProxy) Name() string {
  32. return ReverseProxyMethodName
  33. }
  34. // getUserFromAuthUser extracts the username from the "setting.ReverseProxyAuthUser" header
  35. // of the request and returns the corresponding user object for that name.
  36. // Verification of header data is not performed as it should have already been done by
  37. // the reverse proxy.
  38. // If a username is available in the "setting.ReverseProxyAuthUser" header an existing
  39. // user object is returned (populated with username or email found in header).
  40. // Returns nil if header is empty.
  41. func (r *ReverseProxy) getUserFromAuthUser(req *http.Request) (*user_model.User, error) {
  42. username := r.getUserName(req)
  43. if len(username) == 0 {
  44. return nil, nil
  45. }
  46. log.Trace("ReverseProxy Authorization: Found username: %s", username)
  47. user, err := user_model.GetUserByName(req.Context(), username)
  48. if err != nil {
  49. if !user_model.IsErrUserNotExist(err) || !r.isAutoRegisterAllowed() {
  50. log.Error("GetUserByName: %v", err)
  51. return nil, err
  52. }
  53. user = r.newUser(req)
  54. }
  55. return user, nil
  56. }
  57. // getEmail extracts the email from the "setting.ReverseProxyAuthEmail" header
  58. func (r *ReverseProxy) getEmail(req *http.Request) string {
  59. return strings.TrimSpace(req.Header.Get(setting.ReverseProxyAuthEmail))
  60. }
  61. // getUserFromAuthEmail extracts the username from the "setting.ReverseProxyAuthEmail" header
  62. // of the request and returns the corresponding user object for that email.
  63. // Verification of header data is not performed as it should have already been done by
  64. // the reverse proxy.
  65. // If an email is available in the "setting.ReverseProxyAuthEmail" header an existing
  66. // user object is returned (populated with the email found in header).
  67. // Returns nil if header is empty or if "setting.EnableReverseProxyEmail" is disabled.
  68. func (r *ReverseProxy) getUserFromAuthEmail(req *http.Request) *user_model.User {
  69. if !setting.Service.EnableReverseProxyEmail {
  70. return nil
  71. }
  72. email := r.getEmail(req)
  73. if len(email) == 0 {
  74. return nil
  75. }
  76. log.Trace("ReverseProxy Authorization: Found email: %s", email)
  77. user, err := user_model.GetUserByEmail(req.Context(), email)
  78. if err != nil {
  79. // Do not allow auto-registration, we don't have a username here
  80. if !user_model.IsErrUserNotExist(err) {
  81. log.Error("GetUserByEmail: %v", err)
  82. }
  83. return nil
  84. }
  85. return user
  86. }
  87. // Verify attempts to load a user object based on headers sent by the reverse proxy.
  88. // First it will attempt to load it based on the username (see docs for getUserFromAuthUser),
  89. // and failing that it will attempt to load it based on the email (see docs for getUserFromAuthEmail).
  90. // Returns nil if the headers are empty or the user is not found.
  91. func (r *ReverseProxy) Verify(req *http.Request, w http.ResponseWriter, store DataStore, sess SessionStore) (*user_model.User, error) {
  92. user, err := r.getUserFromAuthUser(req)
  93. if err != nil {
  94. return nil, err
  95. }
  96. if user == nil {
  97. user = r.getUserFromAuthEmail(req)
  98. if user == nil {
  99. return nil, nil
  100. }
  101. }
  102. // Make sure requests to API paths, attachment downloads, git and LFS do not create a new session
  103. detector := newAuthPathDetector(req)
  104. if !detector.isAPIPath() && !detector.isAttachmentDownload() && !detector.isGitRawOrAttachOrLFSPath() {
  105. if sess != nil && (sess.Get("uid") == nil || sess.Get("uid").(int64) != user.ID) {
  106. handleSignIn(w, req, sess, user)
  107. }
  108. }
  109. store.GetData()["IsReverseProxy"] = true
  110. log.Trace("ReverseProxy Authorization: Logged in user %-v", user)
  111. return user, nil
  112. }
  113. // isAutoRegisterAllowed checks if EnableReverseProxyAutoRegister setting is true
  114. func (r *ReverseProxy) isAutoRegisterAllowed() bool {
  115. return setting.Service.EnableReverseProxyAutoRegister
  116. }
  117. // newUser creates a new user object for the purpose of automatic registration
  118. // and populates its name and email with the information present in request headers.
  119. func (r *ReverseProxy) newUser(req *http.Request) *user_model.User {
  120. username := r.getUserName(req)
  121. if len(username) == 0 {
  122. return nil
  123. }
  124. email := gouuid.New().String() + "@localhost"
  125. if setting.Service.EnableReverseProxyEmail {
  126. webAuthEmail := req.Header.Get(setting.ReverseProxyAuthEmail)
  127. if len(webAuthEmail) > 0 {
  128. email = webAuthEmail
  129. }
  130. }
  131. var fullname string
  132. if setting.Service.EnableReverseProxyFullName {
  133. fullname = req.Header.Get(setting.ReverseProxyAuthFullName)
  134. }
  135. user := &user_model.User{
  136. Name: username,
  137. Email: email,
  138. FullName: fullname,
  139. }
  140. overwriteDefault := user_model.CreateUserOverwriteOptions{
  141. IsActive: optional.Some(true),
  142. }
  143. if err := user_model.CreateUser(req.Context(), user, &user_model.Meta{}, &overwriteDefault); err != nil {
  144. // FIXME: should I create a system notice?
  145. log.Error("CreateUser: %v", err)
  146. return nil
  147. }
  148. return user
  149. }