mirror of
https://github.com/steveiliop56/tinyauth.git
synced 2025-10-28 12:45:47 +00:00
* refactor: return all values from body in the providers * refactor: only accept claims following the OIDC spec * feat: map info from OIDC claims to headers * feat: add support for required oauth groups * fix: bot suggestions * feat: get claims from github and google * fix: close body correctly
130 lines
3.3 KiB
Go
130 lines
3.3 KiB
Go
package hooks
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
"tinyauth/internal/auth"
|
|
"tinyauth/internal/providers"
|
|
"tinyauth/internal/types"
|
|
"tinyauth/internal/utils"
|
|
|
|
"github.com/gin-gonic/gin"
|
|
"github.com/rs/zerolog/log"
|
|
)
|
|
|
|
func NewHooks(config types.HooksConfig, auth *auth.Auth, providers *providers.Providers) *Hooks {
|
|
return &Hooks{
|
|
Config: config,
|
|
Auth: auth,
|
|
Providers: providers,
|
|
}
|
|
}
|
|
|
|
type Hooks struct {
|
|
Config types.HooksConfig
|
|
Auth *auth.Auth
|
|
Providers *providers.Providers
|
|
}
|
|
|
|
func (hooks *Hooks) UseUserContext(c *gin.Context) types.UserContext {
|
|
// Get session cookie and basic auth
|
|
cookie, err := hooks.Auth.GetSessionCookie(c)
|
|
basic := hooks.Auth.GetBasicAuth(c)
|
|
|
|
// Check if basic auth is set
|
|
if basic != nil {
|
|
log.Debug().Msg("Got basic auth")
|
|
|
|
// Check if user exists and password is correct
|
|
user := hooks.Auth.GetUser(basic.Username)
|
|
|
|
if user != nil && hooks.Auth.CheckPassword(*user, basic.Password) {
|
|
// Return user context since we are logged in with basic auth
|
|
return types.UserContext{
|
|
Username: basic.Username,
|
|
Name: utils.Capitalize(basic.Username),
|
|
Email: fmt.Sprintf("%s@%s", strings.ToLower(basic.Username), hooks.Config.Domain),
|
|
IsLoggedIn: true,
|
|
Provider: "basic",
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
// Check cookie error after basic auth
|
|
if err != nil {
|
|
log.Error().Err(err).Msg("Failed to get session cookie")
|
|
// Return empty context
|
|
return types.UserContext{}
|
|
}
|
|
|
|
// Check if session cookie has totp pending
|
|
if cookie.TotpPending {
|
|
log.Debug().Msg("Totp pending")
|
|
// Return empty context since we are pending totp
|
|
return types.UserContext{
|
|
Username: cookie.Username,
|
|
Name: cookie.Name,
|
|
Email: cookie.Email,
|
|
Provider: cookie.Provider,
|
|
TotpPending: true,
|
|
}
|
|
}
|
|
|
|
// Check if session cookie is username/password auth
|
|
if cookie.Provider == "username" {
|
|
log.Debug().Msg("Provider is username")
|
|
|
|
// Check if user exists
|
|
if hooks.Auth.GetUser(cookie.Username) != nil {
|
|
log.Debug().Msg("User exists")
|
|
|
|
// It exists so we are logged in
|
|
return types.UserContext{
|
|
Username: cookie.Username,
|
|
Name: cookie.Name,
|
|
Email: cookie.Email,
|
|
IsLoggedIn: true,
|
|
Provider: "username",
|
|
}
|
|
}
|
|
}
|
|
|
|
log.Debug().Msg("Provider is not username")
|
|
|
|
// The provider is not username so we need to check if it is an oauth provider
|
|
provider := hooks.Providers.GetProvider(cookie.Provider)
|
|
|
|
// If we have a provider with this name
|
|
if provider != nil {
|
|
log.Debug().Msg("Provider exists")
|
|
|
|
// Check if the oauth email is whitelisted
|
|
if !hooks.Auth.EmailWhitelisted(cookie.Username) {
|
|
log.Error().Str("email", cookie.Username).Msg("Email is not whitelisted")
|
|
|
|
// It isn't so we delete the cookie and return an empty context
|
|
hooks.Auth.DeleteSessionCookie(c)
|
|
|
|
// Return empty context
|
|
return types.UserContext{}
|
|
}
|
|
|
|
log.Debug().Msg("Email is whitelisted")
|
|
|
|
// Return user context since we are logged in with oauth
|
|
return types.UserContext{
|
|
Username: cookie.Username,
|
|
Name: cookie.Name,
|
|
Email: cookie.Email,
|
|
IsLoggedIn: true,
|
|
OAuth: true,
|
|
Provider: cookie.Provider,
|
|
OAuthGroups: cookie.OAuthGroups,
|
|
}
|
|
}
|
|
|
|
// Neither basic auth or oauth is set so we return an empty context
|
|
return types.UserContext{}
|
|
}
|