fleet/server/service/middleware/auth/auth.go

112 lines
3.4 KiB
Go
Raw Normal View History

package auth
import (
"context"
"net/http"
"github.com/fleetdm/fleet/v4/server/contexts/authz"
"github.com/fleetdm/fleet/v4/server/contexts/token"
"github.com/fleetdm/fleet/v4/server/contexts/viewer"
"github.com/fleetdm/fleet/v4/server/fleet"
"github.com/fleetdm/fleet/v4/server/service/middleware/log"
"github.com/go-kit/kit/endpoint"
)
// AuthViewer creates an authenticated viewer by validating the session key.
func AuthViewer(ctx context.Context, sessionKey string, svc fleet.Service) (*viewer.Viewer, error) {
session, err := svc.GetSessionByKey(ctx, sessionKey)
if err != nil {
return nil, fleet.NewAuthRequiredError(err.Error())
}
user, err := svc.UserUnauthorized(ctx, session.UserID)
if err != nil {
return nil, fleet.NewAuthRequiredError(err.Error())
}
return &viewer.Viewer{User: user, Session: session}, nil
}
// AuthenticatedUser wraps an endpoint, requires that the Fleet user is
// authenticated, and populates the context with a Viewer struct for that user.
//
// If auth fails or the user must reset their password, an error is returned.
func AuthenticatedUser(svc fleet.Service, next endpoint.Endpoint) endpoint.Endpoint {
authUserFunc := func(ctx context.Context, request interface{}) (interface{}, error) {
// first check if already successfully set
if v, ok := viewer.FromContext(ctx); ok {
if v.User.IsAdminForcedPasswordReset() {
return nil, fleet.ErrPasswordResetRequired
}
return next(ctx, request)
}
// if not successful, try again this time with errors
sessionKey, ok := token.FromContext(ctx)
if !ok {
return nil, fleet.NewAuthHeaderRequiredError("no auth token")
}
v, err := AuthViewer(ctx, string(sessionKey), svc)
if err != nil {
return nil, err
}
if v.User.IsAdminForcedPasswordReset() {
return nil, fleet.ErrPasswordResetRequired
}
ctx = viewer.NewContext(ctx, *v)
if ac, ok := authz.FromContext(ctx); ok {
ac.SetAuthnMethod(authz.AuthnUserToken)
}
return next(ctx, request)
}
return log.Logged(authUserFunc)
}
func UnauthenticatedRequest(_ fleet.Service, next endpoint.Endpoint) endpoint.Endpoint {
return log.Logged(next)
}
// errorHandler has the same signature as http.Error
type errorHandler func(w http.ResponseWriter, detail string, status int)
func AuthenticatedUserMiddleware(svc fleet.Service, errHandler errorHandler, next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
// first check if already successfully set
if v, ok := viewer.FromContext(r.Context()); ok {
if v.User.IsAdminForcedPasswordReset() {
errHandler(w, fleet.ErrPasswordResetRequired.Error(), http.StatusUnauthorized)
return
}
next.ServeHTTP(w, r)
return
}
// if not successful, try again this time with errors
sessionKey, ok := token.FromContext(r.Context())
if !ok {
errHandler(w, fleet.NewAuthHeaderRequiredError("no auth token").Error(), http.StatusUnauthorized)
return
}
v, err := AuthViewer(r.Context(), string(sessionKey), svc)
if err != nil {
errHandler(w, err.Error(), http.StatusUnauthorized)
return
}
if v.User.IsAdminForcedPasswordReset() {
errHandler(w, fleet.ErrPasswordResetRequired.Error(), http.StatusUnauthorized)
return
}
ctx := viewer.NewContext(r.Context(), *v)
if ac, ok := authz.FromContext(r.Context()); ok {
ac.SetAuthnMethod(authz.AuthnUserToken)
}
next.ServeHTTP(w, r.WithContext(ctx))
})
}