Peter Stuifzand
90074d28d6
All checks were successful
continuous-integration/drone/push Build is passing
Solution: Paste license on top of all files. This does not change the license. It was already licensed as GPLv3.
146 lines
4.0 KiB
Go
146 lines
4.0 KiB
Go
/*
|
|
* Ekster is a microsub server
|
|
* Copyright (c) 2021 The Ekster authors
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
package main
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"log"
|
|
"net/http"
|
|
"regexp"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/gomodule/redigo/redis"
|
|
"github.com/pkg/errors"
|
|
"p83.nl/go/ekster/pkg/auth"
|
|
)
|
|
|
|
var authHeaderRegex = regexp.MustCompile("^Bearer (.+)$")
|
|
|
|
func cachedCheckAuthToken(conn redis.Conn, header string, tokenEndpoint string, r *auth.TokenResponse) (bool, error) {
|
|
tokens := authHeaderRegex.FindStringSubmatch(header)
|
|
|
|
if len(tokens) != 2 {
|
|
return false, fmt.Errorf("could not find token in header")
|
|
}
|
|
|
|
key := fmt.Sprintf("token:%s", tokens[1])
|
|
|
|
authorized, err := getCachedValue(conn, key, r)
|
|
if err != nil {
|
|
log.Printf("could not get cached auth token value: %v", err)
|
|
}
|
|
|
|
if authorized {
|
|
return true, nil
|
|
}
|
|
|
|
authorized, err = checkAuthToken(header, tokenEndpoint, r)
|
|
if err != nil {
|
|
return false, errors.Wrap(err, "could not check auth token")
|
|
}
|
|
|
|
if authorized {
|
|
err = setCachedTokenResponseValue(conn, key, r)
|
|
if err != nil {
|
|
log.Printf("could not set cached token response value: %v", err)
|
|
}
|
|
|
|
return true, nil
|
|
}
|
|
|
|
return authorized, nil
|
|
}
|
|
|
|
func checkAuthToken(header string, tokenEndpoint string, token *auth.TokenResponse) (bool, error) {
|
|
req, err := buildValidateAuthTokenRequest(tokenEndpoint, header)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
client := http.Client{}
|
|
res, err := client.Do(req)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
defer func() {
|
|
err := res.Body.Close()
|
|
if err != nil {
|
|
log.Printf("could not close http response body: %v", err)
|
|
}
|
|
}()
|
|
|
|
if res.StatusCode < 200 || res.StatusCode >= 300 {
|
|
return false, fmt.Errorf("got unsuccessful http status code while verifying token: %d", res.StatusCode)
|
|
}
|
|
|
|
contentType := res.Header.Get("content-type")
|
|
if strings.HasPrefix(contentType, "application/json") {
|
|
dec := json.NewDecoder(res.Body)
|
|
err = dec.Decode(&token)
|
|
if err != nil {
|
|
return false, errors.Wrap(err, "could not decode json body")
|
|
}
|
|
return true, nil
|
|
}
|
|
|
|
return false, errors.Wrapf(err, "unknown content-type %q while checking auth token", contentType)
|
|
}
|
|
|
|
func buildValidateAuthTokenRequest(tokenEndpoint string, header string) (*http.Request, error) {
|
|
req, err := http.NewRequest("GET", tokenEndpoint, nil)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "could not create a new request")
|
|
}
|
|
req.Header.Add("Authorization", header)
|
|
req.Header.Add("Accept", "application/json")
|
|
|
|
return req, nil
|
|
}
|
|
|
|
// setCachedTokenResponseValue remembers the value of the auth token response in redis
|
|
func setCachedTokenResponseValue(conn redis.Conn, key string, r *auth.TokenResponse) error {
|
|
_, err := conn.Do("HMSET", redis.Args{}.Add(key).AddFlat(r)...)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not remember token")
|
|
}
|
|
_, err = conn.Do("EXPIRE", key, uint64(10*time.Minute/time.Second))
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not set expiration for token")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// getCachedValue gets the cached value from Redis
|
|
func getCachedValue(conn redis.Conn, key string, r *auth.TokenResponse) (bool, error) {
|
|
values, err := redis.Values(conn.Do("HGETALL", key))
|
|
if err != nil {
|
|
return false, errors.Wrap(err, "could not get value from backend")
|
|
}
|
|
|
|
if len(values) > 0 {
|
|
if err = redis.ScanStruct(values, r); err == nil {
|
|
return true, nil
|
|
}
|
|
}
|
|
|
|
return false, fmt.Errorf("no cached value available")
|
|
}
|