Semaphore/api/auth.go

86 lines
2.0 KiB
Go
Raw Normal View History

2016-05-24 11:55:48 +02:00
package api
2016-01-05 00:32:53 +01:00
import (
"database/sql"
2016-01-05 00:32:53 +01:00
"fmt"
2017-02-23 00:21:49 +01:00
"net/http"
"strings"
2016-01-05 00:32:53 +01:00
"time"
2016-03-16 22:49:43 +01:00
2017-02-23 06:12:16 +01:00
"github.com/ansible-semaphore/semaphore/db"
2016-03-16 22:49:43 +01:00
"github.com/ansible-semaphore/semaphore/util"
2017-02-23 00:21:49 +01:00
"github.com/gorilla/context"
2016-01-05 00:32:53 +01:00
)
2017-02-22 23:17:36 +01:00
func authentication(w http.ResponseWriter, r *http.Request) {
var userID int
2017-02-22 23:17:36 +01:00
if authHeader := strings.ToLower(r.Header.Get("authorization")); len(authHeader) > 0 && strings.Contains(authHeader, "bearer") {
2017-02-23 06:12:16 +01:00
var token db.APIToken
if err := db.Mysql.SelectOne(&token, "select * from user__token where id=? and expired=0", strings.Replace(authHeader, "bearer ", "", 1)); err != nil {
if err == sql.ErrNoRows {
2017-02-22 23:17:36 +01:00
w.WriteHeader(http.StatusForbidden)
return
}
panic(err)
2016-01-05 00:32:53 +01:00
}
userID = token.UserID
} else {
// fetch session from cookie
2017-02-22 23:17:36 +01:00
cookie, err := r.Cookie("semaphore")
if err != nil {
2017-02-22 23:17:36 +01:00
w.WriteHeader(http.StatusForbidden)
return
}
2016-01-05 00:32:53 +01:00
value := make(map[string]interface{})
if err = util.Cookie.Decode("semaphore", cookie.Value, &value); err != nil {
2017-02-22 23:17:36 +01:00
w.WriteHeader(http.StatusForbidden)
return
2016-01-05 00:32:53 +01:00
}
user, ok := value["user"]
sessionVal, okSession := value["session"]
if !ok || !okSession {
2017-02-22 23:17:36 +01:00
w.WriteHeader(http.StatusForbidden)
return
}
2016-01-05 00:32:53 +01:00
userID = user.(int)
sessionID := sessionVal.(int)
2016-01-05 00:32:53 +01:00
// fetch session
2017-02-23 06:12:16 +01:00
var session db.Session
if err := db.Mysql.SelectOne(&session, "select * from session where id=? and user_id=? and expired=0", sessionID, userID); err != nil {
2017-02-22 23:17:36 +01:00
w.WriteHeader(http.StatusForbidden)
2016-03-18 23:03:28 +01:00
return
}
2016-01-05 00:32:53 +01:00
if time.Now().Sub(session.LastActive).Hours() > 7*24 {
// more than week old unused session
// destroy.
2017-02-23 06:12:16 +01:00
if _, err := db.Mysql.Exec("update session set expired=1 where id=?", sessionID); err != nil {
panic(err)
}
2016-01-05 00:32:53 +01:00
2017-02-22 23:17:36 +01:00
w.WriteHeader(http.StatusForbidden)
return
}
if _, err := db.Mysql.Exec("update session set last_active=UTC_TIMESTAMP() where id=?", sessionID); err != nil {
panic(err)
}
}
2016-01-05 00:32:53 +01:00
2017-02-23 06:12:16 +01:00
user, err := db.FetchUser(userID)
if err != nil {
fmt.Println("Can't find user", err)
2017-02-22 23:17:36 +01:00
w.WriteHeader(http.StatusForbidden)
2016-01-05 00:32:53 +01:00
return
}
2017-02-23 00:21:49 +01:00
context.Set(r, "user", user)
2016-01-05 00:32:53 +01:00
}