package middlewares import ( "context" "fmt" conf "github.com/muety/wakapi/config" "github.com/muety/wakapi/models" "github.com/muety/wakapi/services" "github.com/muety/wakapi/utils" "net/http" "strings" ) type AuthenticateMiddleware struct { config *conf.Config userSrvc services.IUserService whitelistPaths []string } func NewAuthenticateMiddleware(userService services.IUserService, whitelistPaths []string) *AuthenticateMiddleware { return &AuthenticateMiddleware{ config: conf.Get(), userSrvc: userService, whitelistPaths: whitelistPaths, } } func (m *AuthenticateMiddleware) Handler(h http.Handler) http.Handler { return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { m.ServeHTTP(w, r, h.ServeHTTP) }) } func (m *AuthenticateMiddleware) ServeHTTP(w http.ResponseWriter, r *http.Request, next http.HandlerFunc) { for _, p := range m.whitelistPaths { if strings.HasPrefix(r.URL.Path, p) || r.URL.Path == p { next(w, r) return } } var user *models.User user, err := m.tryGetUserByCookie(r) if err != nil { user, err = m.tryGetUserByApiKey(r) } if err != nil { if strings.HasPrefix(r.URL.Path, "/api") { w.WriteHeader(http.StatusUnauthorized) } else { http.SetCookie(w, m.config.GetClearCookie(models.AuthCookieKey, "/")) http.Redirect(w, r, fmt.Sprintf("%s/?error=unauthorized", m.config.Server.BasePath), http.StatusFound) } return } ctx := context.WithValue(r.Context(), models.UserKey, user) next(w, r.WithContext(ctx)) } func (m *AuthenticateMiddleware) tryGetUserByApiKey(r *http.Request) (*models.User, error) { key, err := utils.ExtractBearerAuth(r) if err != nil { return nil, err } var user *models.User userKey := strings.TrimSpace(key) user, err = m.userSrvc.GetUserByKey(userKey) if err != nil { return nil, err } return user, nil } func (m *AuthenticateMiddleware) tryGetUserByCookie(r *http.Request) (*models.User, error) { username, err := utils.ExtractCookieAuth(r, m.config) if err != nil { return nil, err } user, err := m.userSrvc.GetUserById(*username) if err != nil { return nil, err } // no need to check password here, as securecookie decoding will fail anyway, // if cookie is not properly signed return user, nil }