aboutsummaryrefslogtreecommitdiff
path: root/internal/ui/middleware.go
diff options
context:
space:
mode:
authorGravatar Frédéric Guillot <f@miniflux.net> 2023-08-10 19:46:45 -0700
committerGravatar Frédéric Guillot <f@miniflux.net> 2023-08-10 20:29:34 -0700
commit168a870c025bfef6efdeb46e166e79a16093c157 (patch)
tree4d8ab69c7e3ef03a7ade06e7b5e5053429a64c3b /internal/ui/middleware.go
parentc2349032552891745cbbc3d2a9e772845a0239f4 (diff)
downloadv2-168a870c025bfef6efdeb46e166e79a16093c157.tar.gz
v2-168a870c025bfef6efdeb46e166e79a16093c157.tar.zst
v2-168a870c025bfef6efdeb46e166e79a16093c157.zip
Move internal packages to an internal folder
For reference: https://go.dev/doc/go1.4#internalpackages
Diffstat (limited to 'internal/ui/middleware.go')
-rw-r--r--internal/ui/middleware.go227
1 files changed, 227 insertions, 0 deletions
diff --git a/internal/ui/middleware.go b/internal/ui/middleware.go
new file mode 100644
index 00000000..93cd9491
--- /dev/null
+++ b/internal/ui/middleware.go
@@ -0,0 +1,227 @@
+// SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
+// SPDX-License-Identifier: Apache-2.0
+
+package ui // import "miniflux.app/v2/internal/ui"
+
+import (
+ "context"
+ "errors"
+ "net/http"
+
+ "miniflux.app/v2/internal/config"
+ "miniflux.app/v2/internal/http/cookie"
+ "miniflux.app/v2/internal/http/request"
+ "miniflux.app/v2/internal/http/response/html"
+ "miniflux.app/v2/internal/http/route"
+ "miniflux.app/v2/internal/logger"
+ "miniflux.app/v2/internal/model"
+ "miniflux.app/v2/internal/storage"
+ "miniflux.app/v2/internal/ui/session"
+
+ "github.com/gorilla/mux"
+)
+
+type middleware struct {
+ router *mux.Router
+ store *storage.Storage
+}
+
+func newMiddleware(router *mux.Router, store *storage.Storage) *middleware {
+ return &middleware{router, store}
+}
+
+func (m *middleware) handleUserSession(next http.Handler) http.Handler {
+ return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
+ session := m.getUserSessionFromCookie(r)
+
+ if session == nil {
+ if m.isPublicRoute(r) {
+ next.ServeHTTP(w, r)
+ } else {
+ logger.Debug("[UI:UserSession] Session not found, redirect to login page")
+ html.Redirect(w, r, route.Path(m.router, "login"))
+ }
+ } else {
+ logger.Debug("[UI:UserSession] %s", session)
+
+ ctx := r.Context()
+ ctx = context.WithValue(ctx, request.UserIDContextKey, session.UserID)
+ ctx = context.WithValue(ctx, request.IsAuthenticatedContextKey, true)
+ ctx = context.WithValue(ctx, request.UserSessionTokenContextKey, session.Token)
+
+ next.ServeHTTP(w, r.WithContext(ctx))
+ }
+ })
+}
+
+func (m *middleware) handleAppSession(next http.Handler) http.Handler {
+ return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
+ var err error
+ session := m.getAppSessionValueFromCookie(r)
+
+ if session == nil {
+ if request.IsAuthenticated(r) {
+ userID := request.UserID(r)
+ logger.Debug("[UI:AppSession] Cookie expired but user #%d is logged: creating a new session", userID)
+ session, err = m.store.CreateAppSessionWithUserPrefs(userID)
+ if err != nil {
+ html.ServerError(w, r, err)
+ return
+ }
+ } else {
+ logger.Debug("[UI:AppSession] Session not found, creating a new one")
+ session, err = m.store.CreateAppSession()
+ if err != nil {
+ html.ServerError(w, r, err)
+ return
+ }
+ }
+
+ http.SetCookie(w, cookie.New(cookie.CookieAppSessionID, session.ID, config.Opts.HTTPS, config.Opts.BasePath()))
+ } else {
+ logger.Debug("[UI:AppSession] %s", session)
+ }
+
+ if r.Method == http.MethodPost {
+ formValue := r.FormValue("csrf")
+ headerValue := r.Header.Get("X-Csrf-Token")
+
+ if session.Data.CSRF != formValue && session.Data.CSRF != headerValue {
+ logger.Error(`[UI:AppSession] Invalid or missing CSRF token: Form="%s", Header="%s"`, formValue, headerValue)
+
+ if mux.CurrentRoute(r).GetName() == "checkLogin" {
+ html.Redirect(w, r, route.Path(m.router, "login"))
+ return
+ }
+
+ html.BadRequest(w, r, errors.New("Invalid or missing CSRF"))
+ return
+ }
+ }
+
+ ctx := r.Context()
+ ctx = context.WithValue(ctx, request.SessionIDContextKey, session.ID)
+ ctx = context.WithValue(ctx, request.CSRFContextKey, session.Data.CSRF)
+ ctx = context.WithValue(ctx, request.OAuth2StateContextKey, session.Data.OAuth2State)
+ ctx = context.WithValue(ctx, request.FlashMessageContextKey, session.Data.FlashMessage)
+ ctx = context.WithValue(ctx, request.FlashErrorMessageContextKey, session.Data.FlashErrorMessage)
+ ctx = context.WithValue(ctx, request.UserLanguageContextKey, session.Data.Language)
+ ctx = context.WithValue(ctx, request.UserThemeContextKey, session.Data.Theme)
+ ctx = context.WithValue(ctx, request.PocketRequestTokenContextKey, session.Data.PocketRequestToken)
+ next.ServeHTTP(w, r.WithContext(ctx))
+ })
+}
+
+func (m *middleware) getAppSessionValueFromCookie(r *http.Request) *model.Session {
+ cookieValue := request.CookieValue(r, cookie.CookieAppSessionID)
+ if cookieValue == "" {
+ return nil
+ }
+
+ session, err := m.store.AppSession(cookieValue)
+ if err != nil {
+ logger.Error("[UI:AppSession] %v", err)
+ return nil
+ }
+
+ return session
+}
+
+func (m *middleware) isPublicRoute(r *http.Request) bool {
+ route := mux.CurrentRoute(r)
+ switch route.GetName() {
+ case "login",
+ "checkLogin",
+ "stylesheet",
+ "javascript",
+ "oauth2Redirect",
+ "oauth2Callback",
+ "appIcon",
+ "favicon",
+ "webManifest",
+ "robots",
+ "sharedEntry",
+ "healthcheck",
+ "offline",
+ "proxy":
+ return true
+ default:
+ return false
+ }
+}
+
+func (m *middleware) getUserSessionFromCookie(r *http.Request) *model.UserSession {
+ cookieValue := request.CookieValue(r, cookie.CookieUserSessionID)
+ if cookieValue == "" {
+ return nil
+ }
+
+ session, err := m.store.UserSessionByToken(cookieValue)
+ if err != nil {
+ logger.Error("[UI:UserSession] %v", err)
+ return nil
+ }
+
+ return session
+}
+
+func (m *middleware) handleAuthProxy(next http.Handler) http.Handler {
+ return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
+ if request.IsAuthenticated(r) || config.Opts.AuthProxyHeader() == "" {
+ next.ServeHTTP(w, r)
+ return
+ }
+
+ username := r.Header.Get(config.Opts.AuthProxyHeader())
+ if username == "" {
+ next.ServeHTTP(w, r)
+ return
+ }
+
+ clientIP := request.ClientIP(r)
+ logger.Info("[AuthProxy] [ClientIP=%s] Received authenticated requested for %q", clientIP, username)
+
+ user, err := m.store.UserByUsername(username)
+ if err != nil {
+ html.ServerError(w, r, err)
+ return
+ }
+
+ if user == nil {
+ logger.Error("[AuthProxy] [ClientIP=%s] %q doesn't exist", clientIP, username)
+
+ if !config.Opts.IsAuthProxyUserCreationAllowed() {
+ html.Forbidden(w, r)
+ return
+ }
+
+ if user, err = m.store.CreateUser(&model.UserCreationRequest{Username: username}); err != nil {
+ html.ServerError(w, r, err)
+ return
+ }
+ }
+
+ sessionToken, _, err := m.store.CreateUserSessionFromUsername(user.Username, r.UserAgent(), clientIP)
+ if err != nil {
+ html.ServerError(w, r, err)
+ return
+ }
+
+ logger.Info("[AuthProxy] [ClientIP=%s] username=%s just logged in", clientIP, user.Username)
+
+ m.store.SetLastLogin(user.ID)
+
+ sess := session.New(m.store, request.SessionID(r))
+ sess.SetLanguage(user.Language)
+ sess.SetTheme(user.Theme)
+
+ http.SetCookie(w, cookie.New(
+ cookie.CookieUserSessionID,
+ sessionToken,
+ config.Opts.HTTPS,
+ config.Opts.BasePath(),
+ ))
+
+ html.Redirect(w, r, route.Path(m.router, "unread"))
+ })
+}