middleware.go 6.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package ui // import "miniflux.app/v2/internal/ui"
  4. import (
  5. "context"
  6. "errors"
  7. "net/http"
  8. "miniflux.app/v2/internal/config"
  9. "miniflux.app/v2/internal/http/cookie"
  10. "miniflux.app/v2/internal/http/request"
  11. "miniflux.app/v2/internal/http/response/html"
  12. "miniflux.app/v2/internal/http/route"
  13. "miniflux.app/v2/internal/logger"
  14. "miniflux.app/v2/internal/model"
  15. "miniflux.app/v2/internal/storage"
  16. "miniflux.app/v2/internal/ui/session"
  17. "github.com/gorilla/mux"
  18. )
  19. type middleware struct {
  20. router *mux.Router
  21. store *storage.Storage
  22. }
  23. func newMiddleware(router *mux.Router, store *storage.Storage) *middleware {
  24. return &middleware{router, store}
  25. }
  26. func (m *middleware) handleUserSession(next http.Handler) http.Handler {
  27. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  28. session := m.getUserSessionFromCookie(r)
  29. if session == nil {
  30. if m.isPublicRoute(r) {
  31. next.ServeHTTP(w, r)
  32. } else {
  33. logger.Debug("[UI:UserSession] Session not found, redirect to login page")
  34. html.Redirect(w, r, route.Path(m.router, "login"))
  35. }
  36. } else {
  37. logger.Debug("[UI:UserSession] %s", session)
  38. ctx := r.Context()
  39. ctx = context.WithValue(ctx, request.UserIDContextKey, session.UserID)
  40. ctx = context.WithValue(ctx, request.IsAuthenticatedContextKey, true)
  41. ctx = context.WithValue(ctx, request.UserSessionTokenContextKey, session.Token)
  42. next.ServeHTTP(w, r.WithContext(ctx))
  43. }
  44. })
  45. }
  46. func (m *middleware) handleAppSession(next http.Handler) http.Handler {
  47. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  48. var err error
  49. session := m.getAppSessionValueFromCookie(r)
  50. if session == nil {
  51. if request.IsAuthenticated(r) {
  52. userID := request.UserID(r)
  53. logger.Debug("[UI:AppSession] Cookie expired but user #%d is logged: creating a new session", userID)
  54. session, err = m.store.CreateAppSessionWithUserPrefs(userID)
  55. if err != nil {
  56. html.ServerError(w, r, err)
  57. return
  58. }
  59. } else {
  60. logger.Debug("[UI:AppSession] Session not found, creating a new one")
  61. session, err = m.store.CreateAppSession()
  62. if err != nil {
  63. html.ServerError(w, r, err)
  64. return
  65. }
  66. }
  67. http.SetCookie(w, cookie.New(cookie.CookieAppSessionID, session.ID, config.Opts.HTTPS, config.Opts.BasePath()))
  68. } else {
  69. logger.Debug("[UI:AppSession] %s", session)
  70. }
  71. if r.Method == http.MethodPost {
  72. formValue := r.FormValue("csrf")
  73. headerValue := r.Header.Get("X-Csrf-Token")
  74. if session.Data.CSRF != formValue && session.Data.CSRF != headerValue {
  75. logger.Error(`[UI:AppSession] Invalid or missing CSRF token: Form="%s", Header="%s"`, formValue, headerValue)
  76. if mux.CurrentRoute(r).GetName() == "checkLogin" {
  77. html.Redirect(w, r, route.Path(m.router, "login"))
  78. return
  79. }
  80. html.BadRequest(w, r, errors.New("Invalid or missing CSRF"))
  81. return
  82. }
  83. }
  84. ctx := r.Context()
  85. ctx = context.WithValue(ctx, request.SessionIDContextKey, session.ID)
  86. ctx = context.WithValue(ctx, request.CSRFContextKey, session.Data.CSRF)
  87. ctx = context.WithValue(ctx, request.OAuth2StateContextKey, session.Data.OAuth2State)
  88. ctx = context.WithValue(ctx, request.FlashMessageContextKey, session.Data.FlashMessage)
  89. ctx = context.WithValue(ctx, request.FlashErrorMessageContextKey, session.Data.FlashErrorMessage)
  90. ctx = context.WithValue(ctx, request.UserLanguageContextKey, session.Data.Language)
  91. ctx = context.WithValue(ctx, request.UserThemeContextKey, session.Data.Theme)
  92. ctx = context.WithValue(ctx, request.PocketRequestTokenContextKey, session.Data.PocketRequestToken)
  93. next.ServeHTTP(w, r.WithContext(ctx))
  94. })
  95. }
  96. func (m *middleware) getAppSessionValueFromCookie(r *http.Request) *model.Session {
  97. cookieValue := request.CookieValue(r, cookie.CookieAppSessionID)
  98. if cookieValue == "" {
  99. return nil
  100. }
  101. session, err := m.store.AppSession(cookieValue)
  102. if err != nil {
  103. logger.Error("[UI:AppSession] %v", err)
  104. return nil
  105. }
  106. return session
  107. }
  108. func (m *middleware) isPublicRoute(r *http.Request) bool {
  109. route := mux.CurrentRoute(r)
  110. switch route.GetName() {
  111. case "login",
  112. "checkLogin",
  113. "stylesheet",
  114. "javascript",
  115. "oauth2Redirect",
  116. "oauth2Callback",
  117. "appIcon",
  118. "favicon",
  119. "webManifest",
  120. "robots",
  121. "sharedEntry",
  122. "healthcheck",
  123. "offline",
  124. "proxy":
  125. return true
  126. default:
  127. return false
  128. }
  129. }
  130. func (m *middleware) getUserSessionFromCookie(r *http.Request) *model.UserSession {
  131. cookieValue := request.CookieValue(r, cookie.CookieUserSessionID)
  132. if cookieValue == "" {
  133. return nil
  134. }
  135. session, err := m.store.UserSessionByToken(cookieValue)
  136. if err != nil {
  137. logger.Error("[UI:UserSession] %v", err)
  138. return nil
  139. }
  140. return session
  141. }
  142. func (m *middleware) handleAuthProxy(next http.Handler) http.Handler {
  143. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  144. if request.IsAuthenticated(r) || config.Opts.AuthProxyHeader() == "" {
  145. next.ServeHTTP(w, r)
  146. return
  147. }
  148. username := r.Header.Get(config.Opts.AuthProxyHeader())
  149. if username == "" {
  150. next.ServeHTTP(w, r)
  151. return
  152. }
  153. clientIP := request.ClientIP(r)
  154. logger.Info("[AuthProxy] [ClientIP=%s] Received authenticated requested for %q", clientIP, username)
  155. user, err := m.store.UserByUsername(username)
  156. if err != nil {
  157. html.ServerError(w, r, err)
  158. return
  159. }
  160. if user == nil {
  161. logger.Error("[AuthProxy] [ClientIP=%s] %q doesn't exist", clientIP, username)
  162. if !config.Opts.IsAuthProxyUserCreationAllowed() {
  163. html.Forbidden(w, r)
  164. return
  165. }
  166. if user, err = m.store.CreateUser(&model.UserCreationRequest{Username: username}); err != nil {
  167. html.ServerError(w, r, err)
  168. return
  169. }
  170. }
  171. sessionToken, _, err := m.store.CreateUserSessionFromUsername(user.Username, r.UserAgent(), clientIP)
  172. if err != nil {
  173. html.ServerError(w, r, err)
  174. return
  175. }
  176. logger.Info("[AuthProxy] [ClientIP=%s] username=%s just logged in", clientIP, user.Username)
  177. m.store.SetLastLogin(user.ID)
  178. sess := session.New(m.store, request.SessionID(r))
  179. sess.SetLanguage(user.Language)
  180. sess.SetTheme(user.Theme)
  181. http.SetCookie(w, cookie.New(
  182. cookie.CookieUserSessionID,
  183. sessionToken,
  184. config.Opts.HTTPS,
  185. config.Opts.BasePath(),
  186. ))
  187. html.Redirect(w, r, route.Path(m.router, "unread"))
  188. })
  189. }