2019-11-23 00:33:31 +01:00
|
|
|
// Copyright 2014 The Gogs Authors. All rights reserved.
|
|
|
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
2022-11-27 19:20:29 +01:00
|
|
|
// SPDX-License-Identifier: MIT
|
2019-11-23 00:33:31 +01:00
|
|
|
|
2021-06-09 19:53:16 +02:00
|
|
|
package auth
|
2019-11-23 00:33:31 +01:00
|
|
|
|
|
|
|
import (
|
2021-01-05 14:05:40 +01:00
|
|
|
"net/http"
|
2019-11-23 00:33:31 +01:00
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
2022-08-25 04:31:57 +02:00
|
|
|
auth_model "code.gitea.io/gitea/models/auth"
|
2021-09-19 13:49:59 +02:00
|
|
|
"code.gitea.io/gitea/models/db"
|
2021-11-24 10:49:20 +01:00
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
2019-11-23 00:33:31 +01:00
|
|
|
"code.gitea.io/gitea/modules/log"
|
|
|
|
"code.gitea.io/gitea/modules/timeutil"
|
2021-01-30 09:55:53 +01:00
|
|
|
"code.gitea.io/gitea/modules/web/middleware"
|
2021-07-24 12:16:34 +02:00
|
|
|
"code.gitea.io/gitea/services/auth/source/oauth2"
|
2019-11-23 00:33:31 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
// Ensure the struct implements the interface.
|
|
|
|
var (
|
2021-07-24 12:16:34 +02:00
|
|
|
_ Method = &OAuth2{}
|
|
|
|
_ Named = &OAuth2{}
|
2019-11-23 00:33:31 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
// CheckOAuthAccessToken returns uid of user from oauth token
|
|
|
|
func CheckOAuthAccessToken(accessToken string) int64 {
|
|
|
|
// JWT tokens require a "."
|
|
|
|
if !strings.Contains(accessToken, ".") {
|
|
|
|
return 0
|
|
|
|
}
|
2021-08-27 21:28:00 +02:00
|
|
|
token, err := oauth2.ParseToken(accessToken, oauth2.DefaultSigningKey)
|
2019-11-23 00:33:31 +01:00
|
|
|
if err != nil {
|
2021-08-27 21:28:00 +02:00
|
|
|
log.Trace("oauth2.ParseToken: %v", err)
|
2019-11-23 00:33:31 +01:00
|
|
|
return 0
|
|
|
|
}
|
2022-08-25 04:31:57 +02:00
|
|
|
var grant *auth_model.OAuth2Grant
|
|
|
|
if grant, err = auth_model.GetOAuth2GrantByID(db.DefaultContext, token.GrantID); err != nil || grant == nil {
|
2019-11-23 00:33:31 +01:00
|
|
|
return 0
|
|
|
|
}
|
2021-07-24 12:16:34 +02:00
|
|
|
if token.Type != oauth2.TypeAccessToken {
|
2019-11-23 00:33:31 +01:00
|
|
|
return 0
|
|
|
|
}
|
2022-01-20 22:52:56 +01:00
|
|
|
if token.ExpiresAt.Before(time.Now()) || token.IssuedAt.After(time.Now()) {
|
2019-11-23 00:33:31 +01:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
return grant.UserID
|
|
|
|
}
|
|
|
|
|
2021-06-09 19:53:16 +02:00
|
|
|
// OAuth2 implements the Auth interface and authenticates requests
|
2019-11-23 00:33:31 +01:00
|
|
|
// (API requests only) by looking for an OAuth token in query parameters or the
|
|
|
|
// "Authorization" header.
|
2022-01-20 18:46:10 +01:00
|
|
|
type OAuth2 struct{}
|
2019-11-23 00:33:31 +01:00
|
|
|
|
2021-06-09 19:53:16 +02:00
|
|
|
// Name represents the name of auth method
|
|
|
|
func (o *OAuth2) Name() string {
|
|
|
|
return "oauth2"
|
|
|
|
}
|
|
|
|
|
2019-11-23 00:33:31 +01:00
|
|
|
// userIDFromToken returns the user id corresponding to the OAuth token.
|
2023-01-17 22:46:03 +01:00
|
|
|
// It will set 'IsApiToken' to true if the token is an API token and
|
|
|
|
// set 'ApiTokenScope' to the scope of the access token
|
2021-01-05 14:05:40 +01:00
|
|
|
func (o *OAuth2) userIDFromToken(req *http.Request, store DataStore) int64 {
|
2021-01-26 16:36:53 +01:00
|
|
|
_ = req.ParseForm()
|
|
|
|
|
2019-11-23 00:33:31 +01:00
|
|
|
// Check access token.
|
2021-01-05 14:05:40 +01:00
|
|
|
tokenSHA := req.Form.Get("token")
|
2019-11-23 00:33:31 +01:00
|
|
|
if len(tokenSHA) == 0 {
|
2021-01-05 14:05:40 +01:00
|
|
|
tokenSHA = req.Form.Get("access_token")
|
2019-11-23 00:33:31 +01:00
|
|
|
}
|
|
|
|
if len(tokenSHA) == 0 {
|
|
|
|
// Well, check with header again.
|
2021-01-05 14:05:40 +01:00
|
|
|
auHead := req.Header.Get("Authorization")
|
2019-11-23 00:33:31 +01:00
|
|
|
if len(auHead) > 0 {
|
|
|
|
auths := strings.Fields(auHead)
|
|
|
|
if len(auths) == 2 && (auths[0] == "token" || strings.ToLower(auths[0]) == "bearer") {
|
|
|
|
tokenSHA = auths[1]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if len(tokenSHA) == 0 {
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
// Let's see if token is valid.
|
|
|
|
if strings.Contains(tokenSHA, ".") {
|
|
|
|
uid := CheckOAuthAccessToken(tokenSHA)
|
|
|
|
if uid != 0 {
|
2021-01-05 14:05:40 +01:00
|
|
|
store.GetData()["IsApiToken"] = true
|
2023-01-17 22:46:03 +01:00
|
|
|
store.GetData()["ApiTokenScope"] = auth_model.AccessTokenScopeAll // fallback to all
|
2019-11-23 00:33:31 +01:00
|
|
|
}
|
|
|
|
return uid
|
|
|
|
}
|
2022-08-25 04:31:57 +02:00
|
|
|
t, err := auth_model.GetAccessTokenBySHA(tokenSHA)
|
2019-11-23 00:33:31 +01:00
|
|
|
if err != nil {
|
2022-08-25 04:31:57 +02:00
|
|
|
if !auth_model.IsErrAccessTokenNotExist(err) && !auth_model.IsErrAccessTokenEmpty(err) {
|
2019-11-23 00:33:31 +01:00
|
|
|
log.Error("GetAccessTokenBySHA: %v", err)
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
t.UpdatedUnix = timeutil.TimeStampNow()
|
2022-08-25 04:31:57 +02:00
|
|
|
if err = auth_model.UpdateAccessToken(t); err != nil {
|
2019-11-23 00:33:31 +01:00
|
|
|
log.Error("UpdateAccessToken: %v", err)
|
|
|
|
}
|
2021-01-05 14:05:40 +01:00
|
|
|
store.GetData()["IsApiToken"] = true
|
2023-01-17 22:46:03 +01:00
|
|
|
store.GetData()["ApiTokenScope"] = t.Scope
|
2019-11-23 00:33:31 +01:00
|
|
|
return t.UID
|
|
|
|
}
|
|
|
|
|
2021-06-09 19:53:16 +02:00
|
|
|
// Verify extracts the user ID from the OAuth token in the query parameters
|
2019-11-23 00:33:31 +01:00
|
|
|
// or the "Authorization" header and returns the corresponding user object for that ID.
|
|
|
|
// If verification is successful returns an existing user object.
|
|
|
|
// Returns nil if verification fails.
|
refactor auth interface to return error when verify failure (#22119)
This PR changed the Auth interface signature from
`Verify(http *http.Request, w http.ResponseWriter, store DataStore, sess
SessionStore) *user_model.User`
to
`Verify(http *http.Request, w http.ResponseWriter, store DataStore, sess
SessionStore) (*user_model.User, error)`.
There is a new return argument `error` which means the verification
condition matched but verify process failed, we should stop the auth
process.
Before this PR, when return a `nil` user, we don't know the reason why
it returned `nil`. If the match condition is not satisfied or it
verified failure? For these two different results, we should have
different handler. If the match condition is not satisfied, we should
try next auth method and if there is no more auth method, it's an
anonymous user. If the condition matched but verify failed, the auth
process should be stop and return immediately.
This will fix #20563
Co-authored-by: KN4CK3R <admin@oldschoolhack.me>
Co-authored-by: Jason Song <i@wolfogre.com>
2022-12-28 06:53:28 +01:00
|
|
|
func (o *OAuth2) Verify(req *http.Request, w http.ResponseWriter, store DataStore, sess SessionStore) (*user_model.User, error) {
|
2021-08-21 04:16:45 +02:00
|
|
|
if !middleware.IsAPIPath(req) && !isAttachmentDownload(req) && !isAuthenticatedTokenRequest(req) {
|
refactor auth interface to return error when verify failure (#22119)
This PR changed the Auth interface signature from
`Verify(http *http.Request, w http.ResponseWriter, store DataStore, sess
SessionStore) *user_model.User`
to
`Verify(http *http.Request, w http.ResponseWriter, store DataStore, sess
SessionStore) (*user_model.User, error)`.
There is a new return argument `error` which means the verification
condition matched but verify process failed, we should stop the auth
process.
Before this PR, when return a `nil` user, we don't know the reason why
it returned `nil`. If the match condition is not satisfied or it
verified failure? For these two different results, we should have
different handler. If the match condition is not satisfied, we should
try next auth method and if there is no more auth method, it's an
anonymous user. If the condition matched but verify failed, the auth
process should be stop and return immediately.
This will fix #20563
Co-authored-by: KN4CK3R <admin@oldschoolhack.me>
Co-authored-by: Jason Song <i@wolfogre.com>
2022-12-28 06:53:28 +01:00
|
|
|
return nil, nil
|
2019-11-23 00:33:31 +01:00
|
|
|
}
|
|
|
|
|
2021-01-05 14:05:40 +01:00
|
|
|
id := o.userIDFromToken(req, store)
|
2019-11-23 00:33:31 +01:00
|
|
|
if id <= 0 {
|
refactor auth interface to return error when verify failure (#22119)
This PR changed the Auth interface signature from
`Verify(http *http.Request, w http.ResponseWriter, store DataStore, sess
SessionStore) *user_model.User`
to
`Verify(http *http.Request, w http.ResponseWriter, store DataStore, sess
SessionStore) (*user_model.User, error)`.
There is a new return argument `error` which means the verification
condition matched but verify process failed, we should stop the auth
process.
Before this PR, when return a `nil` user, we don't know the reason why
it returned `nil`. If the match condition is not satisfied or it
verified failure? For these two different results, we should have
different handler. If the match condition is not satisfied, we should
try next auth method and if there is no more auth method, it's an
anonymous user. If the condition matched but verify failed, the auth
process should be stop and return immediately.
This will fix #20563
Co-authored-by: KN4CK3R <admin@oldschoolhack.me>
Co-authored-by: Jason Song <i@wolfogre.com>
2022-12-28 06:53:28 +01:00
|
|
|
return nil, nil
|
2019-11-23 00:33:31 +01:00
|
|
|
}
|
2021-05-09 18:04:53 +02:00
|
|
|
log.Trace("OAuth2 Authorization: Found token for user[%d]", id)
|
2019-11-23 00:33:31 +01:00
|
|
|
|
2022-12-03 03:48:26 +01:00
|
|
|
user, err := user_model.GetUserByID(req.Context(), id)
|
2019-11-23 00:33:31 +01:00
|
|
|
if err != nil {
|
2021-11-24 10:49:20 +01:00
|
|
|
if !user_model.IsErrUserNotExist(err) {
|
2019-11-23 00:33:31 +01:00
|
|
|
log.Error("GetUserByName: %v", err)
|
|
|
|
}
|
refactor auth interface to return error when verify failure (#22119)
This PR changed the Auth interface signature from
`Verify(http *http.Request, w http.ResponseWriter, store DataStore, sess
SessionStore) *user_model.User`
to
`Verify(http *http.Request, w http.ResponseWriter, store DataStore, sess
SessionStore) (*user_model.User, error)`.
There is a new return argument `error` which means the verification
condition matched but verify process failed, we should stop the auth
process.
Before this PR, when return a `nil` user, we don't know the reason why
it returned `nil`. If the match condition is not satisfied or it
verified failure? For these two different results, we should have
different handler. If the match condition is not satisfied, we should
try next auth method and if there is no more auth method, it's an
anonymous user. If the condition matched but verify failed, the auth
process should be stop and return immediately.
This will fix #20563
Co-authored-by: KN4CK3R <admin@oldschoolhack.me>
Co-authored-by: Jason Song <i@wolfogre.com>
2022-12-28 06:53:28 +01:00
|
|
|
return nil, err
|
2019-11-23 00:33:31 +01:00
|
|
|
}
|
|
|
|
|
2021-05-09 18:04:53 +02:00
|
|
|
log.Trace("OAuth2 Authorization: Logged in user %-v", user)
|
refactor auth interface to return error when verify failure (#22119)
This PR changed the Auth interface signature from
`Verify(http *http.Request, w http.ResponseWriter, store DataStore, sess
SessionStore) *user_model.User`
to
`Verify(http *http.Request, w http.ResponseWriter, store DataStore, sess
SessionStore) (*user_model.User, error)`.
There is a new return argument `error` which means the verification
condition matched but verify process failed, we should stop the auth
process.
Before this PR, when return a `nil` user, we don't know the reason why
it returned `nil`. If the match condition is not satisfied or it
verified failure? For these two different results, we should have
different handler. If the match condition is not satisfied, we should
try next auth method and if there is no more auth method, it's an
anonymous user. If the condition matched but verify failed, the auth
process should be stop and return immediately.
This will fix #20563
Co-authored-by: KN4CK3R <admin@oldschoolhack.me>
Co-authored-by: Jason Song <i@wolfogre.com>
2022-12-28 06:53:28 +01:00
|
|
|
return user, nil
|
2019-11-23 00:33:31 +01:00
|
|
|
}
|
2021-08-21 04:16:45 +02:00
|
|
|
|
|
|
|
func isAuthenticatedTokenRequest(req *http.Request) bool {
|
|
|
|
switch req.URL.Path {
|
|
|
|
case "/login/oauth/userinfo":
|
|
|
|
fallthrough
|
|
|
|
case "/login/oauth/introspect":
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|