mirror of
https://github.com/opencloud-eu/opencloud.git
synced 2025-12-31 01:10:20 -06:00
Configureable via: PROXY_ACCOUNT_BACKEND_TYPE=cs3 PROXY_ACCOUNT_BACKEND_TYPE=accounts (default) By using a backend which implements the CS3 user-api (currently provided by reva/storage) it is possible to bypass the ocis-accounts service and for example use ldap directly. Hides user and auth related communication behind a facade (user/backend) to minimize logic-duplication across middlewares. Allows to switich the account backend from accounts to cs3. Co-authored-by: Jörn Friedrich Dreyer <jfd@butonic.de>
96 lines
2.8 KiB
Go
96 lines
2.8 KiB
Go
package middleware
|
|
|
|
import (
|
|
"fmt"
|
|
"github.com/owncloud/ocis/ocis-pkg/log"
|
|
"github.com/owncloud/ocis/ocis-pkg/oidc"
|
|
"github.com/owncloud/ocis/proxy/pkg/user/backend"
|
|
"net/http"
|
|
"strings"
|
|
)
|
|
|
|
const publicFilesEndpoint = "/remote.php/dav/public-files/"
|
|
|
|
// BasicAuth provides a middleware to check if BasicAuth is provided
|
|
func BasicAuth(optionSetters ...Option) func(next http.Handler) http.Handler {
|
|
options := newOptions(optionSetters...)
|
|
logger := options.Logger
|
|
|
|
if options.EnableBasicAuth {
|
|
options.Logger.Warn().Msg("basic auth enabled, use only for testing or development")
|
|
}
|
|
|
|
h := basicAuth{
|
|
logger: logger,
|
|
enabled: options.EnableBasicAuth,
|
|
userProvider: options.UserProvider,
|
|
}
|
|
|
|
return func(next http.Handler) http.Handler {
|
|
return http.HandlerFunc(
|
|
func(w http.ResponseWriter, req *http.Request) {
|
|
if h.isPublicLink(req) || !h.isBasicAuth(req) {
|
|
if !h.isPublicLink(req) {
|
|
userAgentAuthenticateLockIn(w, req, options.CredentialsByUserAgent, "basic")
|
|
}
|
|
next.ServeHTTP(w, req)
|
|
return
|
|
}
|
|
|
|
removeSuperfluousAuthenticate(w)
|
|
login, password, _ := req.BasicAuth()
|
|
user, err := h.userProvider.Authenticate(req.Context(), login, password)
|
|
|
|
// touch is a user agent locking guard, when touched changes to true it indicates the User-Agent on the
|
|
// request is configured to support only one challenge, it it remains untouched, there are no considera-
|
|
// tions and we should write all available authentication challenges to the response.
|
|
touch := false
|
|
|
|
if err != nil {
|
|
for k, v := range options.CredentialsByUserAgent {
|
|
if strings.Contains(k, req.UserAgent()) {
|
|
removeSuperfluousAuthenticate(w)
|
|
w.Header().Add("Www-Authenticate", fmt.Sprintf("%v realm=\"%s\", charset=\"UTF-8\"", strings.Title(v), req.Host))
|
|
touch = true
|
|
break
|
|
}
|
|
}
|
|
|
|
// if the request is not bound to any user agent, write all available challenges
|
|
if !touch {
|
|
writeSupportedAuthenticateHeader(w, req)
|
|
}
|
|
|
|
w.WriteHeader(http.StatusUnauthorized)
|
|
return
|
|
}
|
|
|
|
claims := &oidc.StandardClaims{
|
|
OcisID: user.Id.OpaqueId,
|
|
Iss: user.Id.Idp,
|
|
PreferredUsername: user.Username,
|
|
Email: user.Mail,
|
|
}
|
|
|
|
next.ServeHTTP(w, req.WithContext(oidc.NewContext(req.Context(), claims)))
|
|
},
|
|
)
|
|
}
|
|
}
|
|
|
|
type basicAuth struct {
|
|
logger log.Logger
|
|
enabled bool
|
|
userProvider backend.UserBackend
|
|
}
|
|
|
|
func (m basicAuth) isPublicLink(req *http.Request) bool {
|
|
login, _, ok := req.BasicAuth()
|
|
return ok && login == "public" && strings.HasPrefix(req.URL.Path, publicFilesEndpoint)
|
|
}
|
|
|
|
func (m basicAuth) isBasicAuth(req *http.Request) bool {
|
|
login, password, ok := req.BasicAuth()
|
|
return m.enabled && ok && login != "" && password != ""
|
|
}
|