mirror of
https://github.com/volatiletech/authboss.git
synced 2024-11-24 08:42:17 +02:00
150 lines
4.4 KiB
Go
150 lines
4.4 KiB
Go
package authboss
|
|
|
|
import (
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"path"
|
|
)
|
|
|
|
// FormValue constants
|
|
const (
|
|
FormValueRedirect = "redir"
|
|
)
|
|
|
|
// HandlerFunc augments http.HandlerFunc with a context and error handling.
|
|
type HandlerFunc func(http.ResponseWriter, *http.Request) error
|
|
|
|
// RouteTable is a routing table from a path to a handlerfunc.
|
|
type RouteTable map[string]HandlerFunc
|
|
|
|
// NewRouter returns a router to be mounted at some mountpoint.
|
|
func (a *Authboss) NewRouter() http.Handler {
|
|
if a.mux != nil {
|
|
return a.mux
|
|
}
|
|
a.mux = http.NewServeMux()
|
|
|
|
for name, mod := range a.loadedModules {
|
|
for route, handler := range mod.Routes() {
|
|
fmt.Fprintf(a.LogWriter, "%-10s Route: %s\n", "["+name+"]", path.Join(a.MountPath, route))
|
|
a.mux.Handle(path.Join(a.MountPath, route), contextRoute{a, handler})
|
|
}
|
|
}
|
|
|
|
a.mux.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
|
|
if a.NotFoundHandler != nil {
|
|
a.NotFoundHandler.ServeHTTP(w, r)
|
|
} else {
|
|
w.WriteHeader(http.StatusNotFound)
|
|
io.WriteString(w, "404 Page not found")
|
|
}
|
|
})
|
|
|
|
return a.mux
|
|
}
|
|
|
|
type contextRoute struct {
|
|
*Authboss
|
|
fn HandlerFunc
|
|
}
|
|
|
|
func (c contextRoute) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
/*
|
|
// Instantiate the context
|
|
ctx := c.Authboss.InitContext(w, r)
|
|
|
|
// Check to make sure we actually need to visit this route
|
|
if redirectIfLoggedIn(ctx, w, r) {
|
|
return
|
|
}
|
|
|
|
// Call the handler
|
|
err := c.fn(ctx, w, r)
|
|
if err == nil {
|
|
return
|
|
}
|
|
|
|
// Log the error
|
|
fmt.Fprintf(c.LogWriter, "Error Occurred at %s: %v", r.URL.Path, err)
|
|
|
|
// Do specific error handling for special kinds of errors.
|
|
switch e := err.(type) {
|
|
case ErrAndRedirect:
|
|
if len(e.FlashSuccess) > 0 {
|
|
ctx.SessionStorer.Put(FlashSuccessKey, e.FlashSuccess)
|
|
}
|
|
if len(e.FlashError) > 0 {
|
|
ctx.SessionStorer.Put(FlashErrorKey, e.FlashError)
|
|
}
|
|
http.Redirect(w, r, e.Location, http.StatusFound)
|
|
case ClientDataErr:
|
|
if c.BadRequestHandler != nil {
|
|
c.BadRequestHandler.ServeHTTP(w, r)
|
|
} else {
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
io.WriteString(w, "400 Bad request")
|
|
}
|
|
default:
|
|
if c.ErrorHandler != nil {
|
|
c.ErrorHandler.ServeHTTP(w, r)
|
|
} else {
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
io.WriteString(w, "500 An error has occurred")
|
|
}
|
|
}
|
|
}
|
|
|
|
// redirectIfLoggedIn checks a user's existence by using currentUser. This is done instead of
|
|
// a simple Session cookie check so that the remember module has a chance to log the user in
|
|
// before they are determined to "not be logged in".
|
|
//
|
|
// The exceptional routes are sort of hardcoded in a terrible way in here, later on this could move to some
|
|
// configuration or something more interesting.
|
|
func redirectIfLoggedIn(ctx *Context, w http.ResponseWriter, r *http.Request) (handled bool) {
|
|
// If it's a log out url, always let it pass through.
|
|
if strings.HasSuffix(r.URL.Path, "/logout") {
|
|
return false
|
|
}
|
|
|
|
// If it's an auth url, allow them through if they're half-authed.
|
|
if strings.HasSuffix(r.URL.Path, "/auth") || strings.Contains(r.URL.Path, "/oauth2/") {
|
|
if halfAuthed, ok := ctx.SessionStorer.Get(SessionHalfAuthKey); ok && halfAuthed == "true" {
|
|
return false
|
|
}
|
|
}
|
|
|
|
// Otherwise, check if they're logged in, this uses hooks to allow remember
|
|
// to set the session cookie
|
|
cu, err := ctx.currentUser(ctx, w, r)
|
|
|
|
// if the user was not found, that means the user was deleted from the underlying
|
|
// storer and we should just remove this session cookie and allow them through.
|
|
// if it's a generic error, 500
|
|
// if the user is found, redirect them away from this page, because they don't need
|
|
// to see it.
|
|
if err == ErrUserNotFound {
|
|
uname, _ := ctx.SessionStorer.Get(SessionKey)
|
|
fmt.Fprintf(ctx.LogWriter, "user (%s) has session cookie but user not found, removing cookie", uname)
|
|
ctx.SessionStorer.Del(SessionKey)
|
|
return false
|
|
} else if err != nil {
|
|
fmt.Fprintf(ctx.LogWriter, "error occurred reading current user at %s: %v", r.URL.Path, err)
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
io.WriteString(w, "500 An error has occurred")
|
|
return true
|
|
}
|
|
|
|
if cu != nil {
|
|
if redir := r.FormValue(FormValueRedirect); len(redir) > 0 {
|
|
http.Redirect(w, r, redir, http.StatusFound)
|
|
} else {
|
|
http.Redirect(w, r, ctx.AuthLoginOKPath, http.StatusFound)
|
|
}
|
|
return true
|
|
}
|
|
|
|
return false
|
|
*/
|
|
}
|