middleware.go 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158
  1. // Copyright 2018 Frédéric Guillot. All rights reserved.
  2. // Use of this source code is governed by the Apache 2.0
  3. // license that can be found in the LICENSE file.
  4. package ui // import "miniflux.app/ui"
  5. import (
  6. "context"
  7. "errors"
  8. "net/http"
  9. "miniflux.app/config"
  10. "miniflux.app/http/cookie"
  11. "miniflux.app/http/request"
  12. "miniflux.app/http/response/html"
  13. "miniflux.app/http/route"
  14. "miniflux.app/storage"
  15. "miniflux.app/logger"
  16. "miniflux.app/model"
  17. "github.com/gorilla/mux"
  18. )
  19. type middleware struct {
  20. router *mux.Router
  21. cfg *config.Config
  22. store *storage.Storage
  23. }
  24. func newMiddleware(router *mux.Router, cfg *config.Config, store *storage.Storage) *middleware {
  25. return &middleware{router, cfg, store}
  26. }
  27. func (m *middleware) handleUserSession(next http.Handler) http.Handler {
  28. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  29. session := m.getUserSessionFromCookie(r)
  30. if session == nil {
  31. if m.isPublicRoute(r) {
  32. next.ServeHTTP(w, r)
  33. } else {
  34. logger.Debug("[UI:UserSession] Session not found, redirect to login page")
  35. html.Redirect(w, r, route.Path(m.router, "login"))
  36. }
  37. } else {
  38. logger.Debug("[UI:UserSession] %s", session)
  39. ctx := r.Context()
  40. ctx = context.WithValue(ctx, request.UserIDContextKey, session.UserID)
  41. ctx = context.WithValue(ctx, request.IsAuthenticatedContextKey, true)
  42. ctx = context.WithValue(ctx, request.UserSessionTokenContextKey, session.Token)
  43. next.ServeHTTP(w, r.WithContext(ctx))
  44. }
  45. })
  46. }
  47. func (m *middleware) handleAppSession(next http.Handler) http.Handler {
  48. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  49. var err error
  50. session := m.getAppSessionValueFromCookie(r)
  51. if session == nil {
  52. if (request.IsAuthenticated(r)) {
  53. userID := request.UserID(r)
  54. logger.Debug("[UI:AppSession] Cookie expired but user #%d is logged: creating a new session", userID)
  55. session, err = m.store.CreateAppSessionWithUserPrefs(userID)
  56. if err != nil {
  57. html.ServerError(w, r, err)
  58. return
  59. }
  60. } else {
  61. logger.Debug("[UI:AppSession] Session not found, creating a new one")
  62. session, err = m.store.CreateAppSession()
  63. if err != nil {
  64. html.ServerError(w, r, err)
  65. return
  66. }
  67. }
  68. http.SetCookie(w, cookie.New(cookie.CookieAppSessionID, session.ID, m.cfg.IsHTTPS, m.cfg.BasePath()))
  69. } else {
  70. logger.Debug("[UI:AppSession] %s", session)
  71. }
  72. if r.Method == "POST" {
  73. formValue := r.FormValue("csrf")
  74. headerValue := r.Header.Get("X-Csrf-Token")
  75. if session.Data.CSRF != formValue && session.Data.CSRF != headerValue {
  76. logger.Error(`[UI:AppSession] Invalid or missing CSRF token: Form="%s", Header="%s"`, formValue, headerValue)
  77. html.BadRequest(w, r, errors.New("Invalid or missing CSRF"))
  78. return
  79. }
  80. }
  81. ctx := r.Context()
  82. ctx = context.WithValue(ctx, request.SessionIDContextKey, session.ID)
  83. ctx = context.WithValue(ctx, request.CSRFContextKey, session.Data.CSRF)
  84. ctx = context.WithValue(ctx, request.OAuth2StateContextKey, session.Data.OAuth2State)
  85. ctx = context.WithValue(ctx, request.FlashMessageContextKey, session.Data.FlashMessage)
  86. ctx = context.WithValue(ctx, request.FlashErrorMessageContextKey, session.Data.FlashErrorMessage)
  87. ctx = context.WithValue(ctx, request.UserLanguageContextKey, session.Data.Language)
  88. ctx = context.WithValue(ctx, request.UserThemeContextKey, session.Data.Theme)
  89. ctx = context.WithValue(ctx, request.PocketRequestTokenContextKey, session.Data.PocketRequestToken)
  90. next.ServeHTTP(w, r.WithContext(ctx))
  91. })
  92. }
  93. func (m *middleware) getAppSessionValueFromCookie(r *http.Request) *model.Session {
  94. cookieValue := request.CookieValue(r, cookie.CookieAppSessionID)
  95. if cookieValue == "" {
  96. return nil
  97. }
  98. session, err := m.store.AppSession(cookieValue)
  99. if err != nil {
  100. logger.Error("[UI:AppSession] %v", err)
  101. return nil
  102. }
  103. return session
  104. }
  105. func (m *middleware) isPublicRoute(r *http.Request) bool {
  106. route := mux.CurrentRoute(r)
  107. switch route.GetName() {
  108. case "login",
  109. "checkLogin",
  110. "stylesheet",
  111. "javascript",
  112. "oauth2Redirect",
  113. "oauth2Callback",
  114. "appIcon",
  115. "favicon",
  116. "webManifest",
  117. "robots",
  118. "healthcheck":
  119. return true
  120. default:
  121. return false
  122. }
  123. }
  124. func (m *middleware) getUserSessionFromCookie(r *http.Request) *model.UserSession {
  125. cookieValue := request.CookieValue(r, cookie.CookieUserSessionID)
  126. if cookieValue == "" {
  127. return nil
  128. }
  129. session, err := m.store.UserSessionByToken(cookieValue)
  130. if err != nil {
  131. logger.Error("[UI:UserSession] %v", err)
  132. return nil
  133. }
  134. return session
  135. }