mirror of
				https://github.com/steveiliop56/tinyauth.git
				synced 2025-11-04 08:05:42 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			140 lines
		
	
	
		
			3.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			140 lines
		
	
	
		
			3.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package hooks
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"strings"
 | 
						|
	"tinyauth/internal/auth"
 | 
						|
	"tinyauth/internal/providers"
 | 
						|
	"tinyauth/internal/types"
 | 
						|
	"tinyauth/internal/utils"
 | 
						|
 | 
						|
	"github.com/gin-gonic/gin"
 | 
						|
	"github.com/rs/zerolog/log"
 | 
						|
)
 | 
						|
 | 
						|
func NewHooks(config types.HooksConfig, auth *auth.Auth, providers *providers.Providers) *Hooks {
 | 
						|
	return &Hooks{
 | 
						|
		Config:    config,
 | 
						|
		Auth:      auth,
 | 
						|
		Providers: providers,
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
type Hooks struct {
 | 
						|
	Config    types.HooksConfig
 | 
						|
	Auth      *auth.Auth
 | 
						|
	Providers *providers.Providers
 | 
						|
}
 | 
						|
 | 
						|
func (hooks *Hooks) UseUserContext(c *gin.Context) types.UserContext {
 | 
						|
	// Get session cookie and basic auth
 | 
						|
	cookie, err := hooks.Auth.GetSessionCookie(c)
 | 
						|
	basic := hooks.Auth.GetBasicAuth(c)
 | 
						|
 | 
						|
	// Check if basic auth is set
 | 
						|
	if basic != nil {
 | 
						|
		log.Debug().Msg("Got basic auth")
 | 
						|
 | 
						|
		// Get user
 | 
						|
		user := hooks.Auth.GetUser(basic.Username)
 | 
						|
 | 
						|
		// Check we have a user
 | 
						|
		if user == nil {
 | 
						|
			log.Error().Str("username", basic.Username).Msg("User does not exist")
 | 
						|
 | 
						|
			// Return empty context
 | 
						|
			return types.UserContext{}
 | 
						|
		}
 | 
						|
 | 
						|
		// Check if the user has a correct password
 | 
						|
		if hooks.Auth.CheckPassword(*user, basic.Password) {
 | 
						|
			// Return user context since we are logged in with basic auth
 | 
						|
			return types.UserContext{
 | 
						|
				Username:    basic.Username,
 | 
						|
				Name:        utils.Capitalize(basic.Username),
 | 
						|
				Email:       fmt.Sprintf("%s@%s", strings.ToLower(basic.Username), hooks.Config.Domain),
 | 
						|
				IsLoggedIn:  true,
 | 
						|
				Provider:    "basic",
 | 
						|
				TotpEnabled: user.TotpSecret != "",
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
	}
 | 
						|
 | 
						|
	// Check cookie error after basic auth
 | 
						|
	if err != nil {
 | 
						|
		log.Error().Err(err).Msg("Failed to get session cookie")
 | 
						|
		// Return empty context
 | 
						|
		return types.UserContext{}
 | 
						|
	}
 | 
						|
 | 
						|
	// Check if session cookie has totp pending
 | 
						|
	if cookie.TotpPending {
 | 
						|
		log.Debug().Msg("Totp pending")
 | 
						|
		// Return empty context since we are pending totp
 | 
						|
		return types.UserContext{
 | 
						|
			Username:    cookie.Username,
 | 
						|
			Name:        cookie.Name,
 | 
						|
			Email:       cookie.Email,
 | 
						|
			Provider:    cookie.Provider,
 | 
						|
			TotpPending: true,
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Check if session cookie is username/password auth
 | 
						|
	if cookie.Provider == "username" {
 | 
						|
		log.Debug().Msg("Provider is username")
 | 
						|
 | 
						|
		// Check if user exists
 | 
						|
		if hooks.Auth.GetUser(cookie.Username) != nil {
 | 
						|
			log.Debug().Msg("User exists")
 | 
						|
 | 
						|
			// It exists so we are logged in
 | 
						|
			return types.UserContext{
 | 
						|
				Username:   cookie.Username,
 | 
						|
				Name:       cookie.Name,
 | 
						|
				Email:      cookie.Email,
 | 
						|
				IsLoggedIn: true,
 | 
						|
				Provider:   "username",
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	log.Debug().Msg("Provider is not username")
 | 
						|
 | 
						|
	// The provider is not username so we need to check if it is an oauth provider
 | 
						|
	provider := hooks.Providers.GetProvider(cookie.Provider)
 | 
						|
 | 
						|
	// If we have a provider with this name
 | 
						|
	if provider != nil {
 | 
						|
		log.Debug().Msg("Provider exists")
 | 
						|
 | 
						|
		// Check if the oauth email is whitelisted
 | 
						|
		if !hooks.Auth.EmailWhitelisted(cookie.Email) {
 | 
						|
			log.Error().Str("email", cookie.Email).Msg("Email is not whitelisted")
 | 
						|
 | 
						|
			// It isn't so we delete the cookie and return an empty context
 | 
						|
			hooks.Auth.DeleteSessionCookie(c)
 | 
						|
 | 
						|
			// Return empty context
 | 
						|
			return types.UserContext{}
 | 
						|
		}
 | 
						|
 | 
						|
		log.Debug().Msg("Email is whitelisted")
 | 
						|
 | 
						|
		// Return user context since we are logged in with oauth
 | 
						|
		return types.UserContext{
 | 
						|
			Username:    cookie.Username,
 | 
						|
			Name:        cookie.Name,
 | 
						|
			Email:       cookie.Email,
 | 
						|
			IsLoggedIn:  true,
 | 
						|
			OAuth:       true,
 | 
						|
			Provider:    cookie.Provider,
 | 
						|
			OAuthGroups: cookie.OAuthGroups,
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Neither basic auth or oauth is set so we return an empty context
 | 
						|
	return types.UserContext{}
 | 
						|
}
 |