internal/base/middleware/auth.go (234 lines of code) (raw):

/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package middleware import ( "net/http" "strings" "github.com/apache/answer/internal/schema" "github.com/apache/answer/internal/service/role" "github.com/apache/answer/internal/service/siteinfo_common" "github.com/apache/answer/ui" "github.com/gin-gonic/gin" "github.com/apache/answer/internal/base/handler" "github.com/apache/answer/internal/base/reason" "github.com/apache/answer/internal/entity" "github.com/apache/answer/internal/service/auth" "github.com/apache/answer/pkg/converter" "github.com/segmentfault/pacman/errors" "github.com/segmentfault/pacman/log" ) var ctxUUIDKey = "ctxUuidKey" // AuthUserMiddleware auth user middleware type AuthUserMiddleware struct { authService *auth.AuthService siteInfoCommonService siteinfo_common.SiteInfoCommonService } // NewAuthUserMiddleware new auth user middleware func NewAuthUserMiddleware( authService *auth.AuthService, siteInfoCommonService siteinfo_common.SiteInfoCommonService) *AuthUserMiddleware { return &AuthUserMiddleware{ authService: authService, siteInfoCommonService: siteInfoCommonService, } } // Auth get token and auth user, set user info to context if user is already login func (am *AuthUserMiddleware) Auth() gin.HandlerFunc { return func(ctx *gin.Context) { token := ExtractToken(ctx) if len(token) == 0 { ctx.Next() return } userInfo, err := am.authService.GetUserCacheInfo(ctx, token) if err != nil { ctx.Next() return } if userInfo != nil { ctx.Set(ctxUUIDKey, userInfo) } ctx.Next() } } // EjectUserBySiteInfo if admin config the site can access by nologin user, eject user. func (am *AuthUserMiddleware) EjectUserBySiteInfo() gin.HandlerFunc { return func(ctx *gin.Context) { mustLogin := false siteInfo, _ := am.siteInfoCommonService.GetSiteLogin(ctx) if siteInfo != nil { mustLogin = siteInfo.LoginRequired } if !mustLogin { ctx.Next() return } // If site in private mode, user must login. userInfo := GetUserInfoFromContext(ctx) if userInfo == nil { handler.HandleResponse(ctx, errors.Unauthorized(reason.UnauthorizedError), nil) ctx.Abort() return } // If user is not active, eject user. if userInfo.EmailStatus != entity.EmailStatusAvailable { handler.HandleResponse(ctx, errors.Forbidden(reason.EmailNeedToBeVerified), &schema.ForbiddenResp{Type: schema.ForbiddenReasonTypeInactive}) ctx.Abort() return } ctx.Next() } } // MustAuthWithoutAccountAvailable auth user info, any login user can access though user is not active. func (am *AuthUserMiddleware) MustAuthWithoutAccountAvailable() gin.HandlerFunc { return func(ctx *gin.Context) { token := ExtractToken(ctx) if len(token) == 0 { handler.HandleResponse(ctx, errors.Unauthorized(reason.UnauthorizedError), nil) ctx.Abort() return } userInfo, err := am.authService.GetUserCacheInfo(ctx, token) if err != nil || userInfo == nil { handler.HandleResponse(ctx, errors.Unauthorized(reason.UnauthorizedError), nil) ctx.Abort() return } if userInfo.UserStatus == entity.UserStatusDeleted { handler.HandleResponse(ctx, errors.Unauthorized(reason.UnauthorizedError), nil) ctx.Abort() return } ctx.Set(ctxUUIDKey, userInfo) ctx.Next() } } // MustAuthAndAccountAvailable auth user info and check user status, only allow active user access. func (am *AuthUserMiddleware) MustAuthAndAccountAvailable() gin.HandlerFunc { return func(ctx *gin.Context) { token := ExtractToken(ctx) if len(token) == 0 { handler.HandleResponse(ctx, errors.Unauthorized(reason.UnauthorizedError), nil) ctx.Abort() return } userInfo, err := am.authService.GetUserCacheInfo(ctx, token) if err != nil || userInfo == nil { handler.HandleResponse(ctx, errors.Unauthorized(reason.UnauthorizedError), nil) ctx.Abort() return } if userInfo.EmailStatus != entity.EmailStatusAvailable { handler.HandleResponse(ctx, errors.Forbidden(reason.EmailNeedToBeVerified), &schema.ForbiddenResp{Type: schema.ForbiddenReasonTypeInactive}) ctx.Abort() return } if userInfo.UserStatus == entity.UserStatusSuspended { handler.HandleResponse(ctx, errors.Forbidden(reason.UserSuspended), &schema.ForbiddenResp{Type: schema.ForbiddenReasonTypeUserSuspended}) ctx.Abort() return } if userInfo.UserStatus == entity.UserStatusDeleted { handler.HandleResponse(ctx, errors.Unauthorized(reason.UnauthorizedError), nil) ctx.Abort() return } ctx.Set(ctxUUIDKey, userInfo) ctx.Next() } } func (am *AuthUserMiddleware) AdminAuth() gin.HandlerFunc { return func(ctx *gin.Context) { token := ExtractToken(ctx) if len(token) == 0 { handler.HandleResponse(ctx, errors.Unauthorized(reason.UnauthorizedError), nil) ctx.Abort() return } userInfo, err := am.authService.GetAdminUserCacheInfo(ctx, token) if err != nil || userInfo == nil { handler.HandleResponse(ctx, errors.Forbidden(reason.UnauthorizedError), nil) ctx.Abort() return } if userInfo != nil { if userInfo.UserStatus == entity.UserStatusDeleted { handler.HandleResponse(ctx, errors.Unauthorized(reason.UnauthorizedError), nil) ctx.Abort() return } ctx.Set(ctxUUIDKey, userInfo) } ctx.Next() } } func (am *AuthUserMiddleware) CheckPrivateMode() gin.HandlerFunc { return func(ctx *gin.Context) { resp, err := am.siteInfoCommonService.GetSiteLogin(ctx) if err != nil { ShowIndexPage(ctx) ctx.Abort() return } if resp.LoginRequired { ShowIndexPage(ctx) ctx.Abort() return } ctx.Next() } } func ShowIndexPage(ctx *gin.Context) { ctx.Header("content-type", "text/html;charset=utf-8") ctx.Header("X-Frame-Options", "DENY") file, err := ui.Build.ReadFile("build/index.html") if err != nil { log.Error(err) ctx.Status(http.StatusNotFound) return } ctx.String(http.StatusOK, string(file)) } // GetLoginUserIDFromContext get user id from context func GetLoginUserIDFromContext(ctx *gin.Context) (userID string) { userInfo := GetUserInfoFromContext(ctx) if userInfo == nil { return "" } return userInfo.UserID } // GetIsAdminFromContext get user is admin from context func GetIsAdminFromContext(ctx *gin.Context) (isAdmin bool) { userInfo := GetUserInfoFromContext(ctx) if userInfo == nil { return false } return userInfo.RoleID == role.RoleAdminID } // GetUserInfoFromContext get user info from context func GetUserInfoFromContext(ctx *gin.Context) (u *entity.UserCacheInfo) { userInfo, exist := ctx.Get(ctxUUIDKey) if !exist { return nil } u, ok := userInfo.(*entity.UserCacheInfo) if !ok { return nil } return u } func GetUserIsAdminModerator(ctx *gin.Context) (isAdminModerator bool) { userInfo, exist := ctx.Get(ctxUUIDKey) if !exist { return false } u, ok := userInfo.(*entity.UserCacheInfo) if !ok { return false } if u.RoleID == role.RoleAdminID || u.RoleID == role.RoleModeratorID { return true } return false } func GetLoginUserIDInt64FromContext(ctx *gin.Context) (userID int64) { userIDStr := GetLoginUserIDFromContext(ctx) return converter.StringToInt64(userIDStr) } // ExtractToken extract token from context func ExtractToken(ctx *gin.Context) (token string) { token = ctx.GetHeader("Authorization") if len(token) == 0 { token = ctx.Query("Authorization") } return strings.TrimPrefix(token, "Bearer ") }