2014-03-15 15:01:50 +04:00
// Copyright 2014 The Gogs Authors. All rights reserved.
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
package middleware
import (
2015-08-13 21:43:40 +03:00
"fmt"
2014-03-23 01:59:22 +04:00
"net/url"
2014-07-26 08:24:27 +04:00
"github.com/Unknwon/macaron"
2014-08-01 01:25:34 +04:00
"github.com/macaron-contrib/csrf"
2014-03-19 20:50:44 +04:00
2015-08-13 21:43:40 +03:00
"github.com/gogits/gogs/models"
2015-07-15 14:17:57 +03:00
"github.com/gogits/gogs/modules/auth"
2015-08-13 21:43:40 +03:00
"github.com/gogits/gogs/modules/base"
"github.com/gogits/gogs/modules/log"
2014-05-26 04:11:25 +04:00
"github.com/gogits/gogs/modules/setting"
2014-03-15 15:01:50 +04:00
)
2014-03-22 21:44:02 +04:00
type ToggleOptions struct {
SignInRequire bool
SignOutRequire bool
AdminRequire bool
DisableCsrf bool
2014-03-15 15:01:50 +04:00
}
2015-08-13 21:43:40 +03:00
// AutoSignIn reads cookie and try to auto-login.
func AutoSignIn ( ctx * Context ) ( bool , error ) {
2015-09-13 16:51:51 +03:00
if ! models . HasEngine {
return false , nil
}
2015-08-13 21:43:40 +03:00
uname := ctx . GetCookie ( setting . CookieUserName )
if len ( uname ) == 0 {
return false , nil
}
isSucceed := false
defer func ( ) {
if ! isSucceed {
log . Trace ( "auto-login cookie cleared: %s" , uname )
ctx . SetCookie ( setting . CookieUserName , "" , - 1 , setting . AppSubUrl )
ctx . SetCookie ( setting . CookieRememberName , "" , - 1 , setting . AppSubUrl )
}
} ( )
u , err := models . GetUserByName ( uname )
if err != nil {
if ! models . IsErrUserNotExist ( err ) {
return false , fmt . Errorf ( "GetUserByName: %v" , err )
}
return false , nil
}
if val , _ := ctx . GetSuperSecureCookie (
base . EncodeMd5 ( u . Rands + u . Passwd ) , setting . CookieRememberName ) ; val != u . Name {
return false , nil
}
isSucceed = true
ctx . Session . Set ( "uid" , u . Id )
ctx . Session . Set ( "uname" , u . Name )
return true , nil
}
2014-07-26 08:24:27 +04:00
func Toggle ( options * ToggleOptions ) macaron . Handler {
2014-03-15 15:01:50 +04:00
return func ( ctx * Context ) {
2014-05-05 21:08:01 +04:00
// Cannot view any page before installation.
2014-05-26 04:11:25 +04:00
if ! setting . InstallLock {
2014-09-20 04:11:34 +04:00
ctx . Redirect ( setting . AppSubUrl + "/install" )
2014-03-30 19:58:21 +04:00
return
}
2014-11-25 02:47:59 +03:00
// Checking non-logged users landing page.
if ! ctx . IsSigned && ctx . Req . RequestURI == "/" && setting . LandingPageUrl != setting . LANDING_PAGE_HOME {
2015-03-16 11:14:14 +03:00
ctx . Redirect ( setting . AppSubUrl + string ( setting . LandingPageUrl ) )
2014-11-25 02:47:59 +03:00
return
}
2014-05-05 21:08:01 +04:00
// Redirect to dashboard if user tries to visit any non-login page.
2014-03-24 14:50:11 +04:00
if options . SignOutRequire && ctx . IsSigned && ctx . Req . RequestURI != "/" {
2014-09-20 04:11:34 +04:00
ctx . Redirect ( setting . AppSubUrl + "/" )
2014-03-20 15:50:26 +04:00
return
}
2015-08-18 23:58:45 +03:00
if ! options . SignOutRequire && ! options . DisableCsrf && ctx . Req . Method == "POST" && ! auth . IsAPIPath ( ctx . Req . URL . Path ) {
2014-08-01 01:25:34 +04:00
csrf . Validate ( ctx . Context , ctx . csrf )
if ctx . Written ( ) {
return
}
2014-03-22 21:44:02 +04:00
}
if options . SignInRequire {
if ! ctx . IsSigned {
2015-07-15 14:17:57 +03:00
// Restrict API calls with error message.
if auth . IsAPIPath ( ctx . Req . URL . Path ) {
ctx . HandleAPI ( 403 , "Only signed in user is allowed to call APIs." )
return
}
2015-01-31 04:30:07 +03:00
ctx . SetCookie ( "redirect_to" , url . QueryEscape ( setting . AppSubUrl + ctx . Req . RequestURI ) , 0 , setting . AppSubUrl )
2014-09-20 04:11:34 +04:00
ctx . Redirect ( setting . AppSubUrl + "/user/login" )
2014-03-22 21:44:02 +04:00
return
2014-05-26 04:11:25 +04:00
} else if ! ctx . User . IsActive && setting . Service . RegisterEmailConfirm {
2014-08-10 08:02:00 +04:00
ctx . Data [ "Title" ] = ctx . Tr ( "auth.active_your_account" )
2014-09-02 21:01:02 +04:00
ctx . HTML ( 200 , "user/auth/activate" )
2014-03-22 21:44:02 +04:00
return
}
}
if options . AdminRequire {
if ! ctx . User . IsAdmin {
ctx . Error ( 403 )
return
}
2014-03-22 22:27:03 +04:00
ctx . Data [ "PageIsAdmin" ] = true
2014-03-15 15:01:50 +04:00
}
}
}
2014-11-13 20:57:00 +03:00
2015-07-14 18:21:34 +03:00
// Contexter middleware already checks token for user sign in process.
2014-11-13 20:57:00 +03:00
func ApiReqToken ( ) macaron . Handler {
return func ( ctx * Context ) {
if ! ctx . IsSigned {
2015-08-29 09:44:38 +03:00
ctx . Error ( 401 )
2014-11-13 20:57:00 +03:00
return
}
}
}
2014-11-18 19:07:16 +03:00
func ApiReqBasicAuth ( ) macaron . Handler {
return func ( ctx * Context ) {
if ! ctx . IsBasicAuth {
2015-08-29 09:44:38 +03:00
ctx . Error ( 401 )
2014-11-18 19:07:16 +03:00
return
}
}
}