| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156 |
- // Copyright 2014 The Gogs Authors. All rights reserved.
- // Copyright 2019 The Gitea Authors. All rights reserved.
- // SPDX-License-Identifier: MIT
-
- package auth
-
- import (
- "fmt"
- "net/http"
- "regexp"
- "strings"
- "sync"
-
- user_model "code.gitea.io/gitea/models/user"
- "code.gitea.io/gitea/modules/auth/webauthn"
- "code.gitea.io/gitea/modules/log"
- "code.gitea.io/gitea/modules/optional"
- "code.gitea.io/gitea/modules/session"
- "code.gitea.io/gitea/modules/setting"
- "code.gitea.io/gitea/modules/web/middleware"
- gitea_context "code.gitea.io/gitea/services/context"
- user_service "code.gitea.io/gitea/services/user"
- )
-
- type globalVarsStruct struct {
- gitRawOrAttachPathRe *regexp.Regexp
- lfsPathRe *regexp.Regexp
- archivePathRe *regexp.Regexp
- feedPathRe *regexp.Regexp
- feedRefPathRe *regexp.Regexp
- }
-
- var globalVars = sync.OnceValue(func() *globalVarsStruct {
- return &globalVarsStruct{
- gitRawOrAttachPathRe: regexp.MustCompile(`^/[-.\w]+/[-.\w]+/(?:(?:git-(?:(?:upload)|(?:receive))-pack$)|(?:info/refs$)|(?:HEAD$)|(?:objects/)|(?:raw/)|(?:releases/download/)|(?:attachments/))`),
- lfsPathRe: regexp.MustCompile(`^/[-.\w]+/[-.\w]+/info/lfs/`),
- archivePathRe: regexp.MustCompile(`^/[-.\w]+/[-.\w]+/archive/`),
- feedPathRe: regexp.MustCompile(`^/[-.\w]+(/[-.\w]+)?\.(rss|atom)$`), // "/owner.rss" or "/owner/repo.atom"
- feedRefPathRe: regexp.MustCompile(`^/[-.\w]+/[-.\w]+/(rss|atom)/`), // "/owner/repo/rss/branch/..."
- }
- })
-
- // Init should be called exactly once when the application starts to allow plugins
- // to allocate necessary resources
- func Init() {
- webauthn.Init()
- }
-
- type authPathDetector struct {
- req *http.Request
- vars *globalVarsStruct
- }
-
- func newAuthPathDetector(req *http.Request) *authPathDetector {
- return &authPathDetector{req: req, vars: globalVars()}
- }
-
- // isAPIPath returns true if the specified URL is an API path
- func (a *authPathDetector) isAPIPath() bool {
- return strings.HasPrefix(a.req.URL.Path, "/api/")
- }
-
- // isAttachmentDownload check if request is a file download (GET) with URL to an attachment
- func (a *authPathDetector) isAttachmentDownload() bool {
- return strings.HasPrefix(a.req.URL.Path, "/attachments/") && a.req.Method == http.MethodGet
- }
-
- func (a *authPathDetector) isFeedRequest(req *http.Request) bool {
- if !setting.Other.EnableFeed {
- return false
- }
- if req.Method != http.MethodGet {
- return false
- }
- return a.vars.feedPathRe.MatchString(req.URL.Path) || a.vars.feedRefPathRe.MatchString(req.URL.Path)
- }
-
- // isContainerPath checks if the request targets the container endpoint
- func (a *authPathDetector) isContainerPath() bool {
- return strings.HasPrefix(a.req.URL.Path, "/v2/")
- }
-
- func (a *authPathDetector) isGitRawOrAttachPath() bool {
- return a.vars.gitRawOrAttachPathRe.MatchString(a.req.URL.Path)
- }
-
- func (a *authPathDetector) isGitRawOrAttachOrLFSPath() bool {
- if a.isGitRawOrAttachPath() {
- return true
- }
- if setting.LFS.StartServer {
- return a.vars.lfsPathRe.MatchString(a.req.URL.Path)
- }
- return false
- }
-
- func (a *authPathDetector) isArchivePath() bool {
- return a.vars.archivePathRe.MatchString(a.req.URL.Path)
- }
-
- func (a *authPathDetector) isAuthenticatedTokenRequest() bool {
- switch a.req.URL.Path {
- case "/login/oauth/userinfo", "/login/oauth/introspect":
- return true
- }
- return false
- }
-
- // handleSignIn clears existing session variables and stores new ones for the specified user object
- func handleSignIn(resp http.ResponseWriter, req *http.Request, sess SessionStore, user *user_model.User) {
- // We need to regenerate the session...
- newSess, err := session.RegenerateSession(resp, req)
- if err != nil {
- log.Error(fmt.Sprintf("Error regenerating session: %v", err))
- } else {
- sess = newSess
- }
-
- _ = sess.Delete("openid_verified_uri")
- _ = sess.Delete("openid_signin_remember")
- _ = sess.Delete("openid_determined_email")
- _ = sess.Delete("openid_determined_username")
- _ = sess.Delete("twofaUid")
- _ = sess.Delete("twofaRemember")
- _ = sess.Delete("webauthnAssertion")
- _ = sess.Delete("linkAccount")
- err = sess.Set("uid", user.ID)
- if err != nil {
- log.Error(fmt.Sprintf("Error setting session: %v", err))
- }
- err = sess.Set("uname", user.Name)
- if err != nil {
- log.Error(fmt.Sprintf("Error setting session: %v", err))
- }
-
- // Language setting of the user overwrites the one previously set
- // If the user does not have a locale set, we save the current one.
- if len(user.Language) == 0 {
- lc := middleware.Locale(resp, req)
- opts := &user_service.UpdateOptions{
- Language: optional.Some(lc.Language()),
- }
- if err := user_service.UpdateUser(req.Context(), user, opts); err != nil {
- log.Error(fmt.Sprintf("Error updating user language [user: %d, locale: %s]", user.ID, user.Language))
- return
- }
- }
-
- middleware.SetLocaleCookie(resp, user.Language, 0)
-
- // force to generate a new CSRF token
- if ctx := gitea_context.GetWebContext(req.Context()); ctx != nil {
- ctx.Csrf.PrepareForSessionUser(ctx)
- }
- }
|