2018-02-19 22:24:10 +00:00
|
|
|
// Copyright 2018 Drone.IO Inc.
|
2018-03-21 13:02:17 +00:00
|
|
|
//
|
2018-02-19 22:24:10 +00:00
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
2018-03-21 13:02:17 +00:00
|
|
|
//
|
2018-02-19 22:24:10 +00:00
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
2018-03-21 13:02:17 +00:00
|
|
|
//
|
2018-02-19 22:24:10 +00:00
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2015-09-30 01:21:17 +00:00
|
|
|
package session
|
|
|
|
|
|
|
|
import (
|
|
|
|
"net/http"
|
2023-07-21 17:45:32 +00:00
|
|
|
"strconv"
|
2015-09-30 01:21:17 +00:00
|
|
|
|
2023-12-08 07:15:08 +00:00
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/server"
|
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/server/model"
|
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/server/store"
|
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/shared/token"
|
2022-07-25 01:09:35 +00:00
|
|
|
|
|
|
|
"github.com/gin-gonic/gin"
|
|
|
|
"github.com/rs/zerolog/log"
|
2015-09-30 01:21:17 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func User(c *gin.Context) *model.User {
|
|
|
|
v, ok := c.Get("user")
|
|
|
|
if !ok {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
u, ok := v.(*model.User)
|
|
|
|
if !ok {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return u
|
|
|
|
}
|
|
|
|
|
|
|
|
func SetUser() gin.HandlerFunc {
|
|
|
|
return func(c *gin.Context) {
|
|
|
|
var user *model.User
|
|
|
|
|
|
|
|
t, err := token.ParseRequest(c.Request, func(t *token.Token) (string, error) {
|
|
|
|
var err error
|
2021-10-28 09:12:58 +00:00
|
|
|
user, err = store.FromContext(c).GetUserLogin(t.Text)
|
2015-09-30 01:21:17 +00:00
|
|
|
return user.Hash, err
|
|
|
|
})
|
|
|
|
if err == nil {
|
|
|
|
c.Set("user", user)
|
|
|
|
|
|
|
|
// if this is a session token (ie not the API token)
|
|
|
|
// this means the user is accessing with a web browser,
|
|
|
|
// so we should implement CSRF protection measures.
|
|
|
|
if t.Kind == token.SessToken {
|
|
|
|
err = token.CheckCsrf(c.Request, func(t *token.Token) (string, error) {
|
|
|
|
return user.Hash, nil
|
|
|
|
})
|
|
|
|
// if csrf token validation fails, exit immediately
|
|
|
|
// with a not authorized error.
|
|
|
|
if err != nil {
|
|
|
|
c.AbortWithStatus(http.StatusUnauthorized)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
c.Next()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func MustAdmin() gin.HandlerFunc {
|
|
|
|
return func(c *gin.Context) {
|
|
|
|
user := User(c)
|
|
|
|
switch {
|
|
|
|
case user == nil:
|
2016-04-22 00:10:19 +00:00
|
|
|
c.String(401, "User not authorized")
|
|
|
|
c.Abort()
|
2021-11-23 14:36:52 +00:00
|
|
|
case !user.Admin:
|
2020-11-27 03:29:07 +00:00
|
|
|
c.String(403, "User not authorized")
|
2016-04-22 00:10:19 +00:00
|
|
|
c.Abort()
|
2015-09-30 01:21:17 +00:00
|
|
|
default:
|
|
|
|
c.Next()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-07-21 17:43:29 +00:00
|
|
|
func MustRepoAdmin() gin.HandlerFunc {
|
|
|
|
return func(c *gin.Context) {
|
|
|
|
user := User(c)
|
|
|
|
perm := Perm(c)
|
|
|
|
switch {
|
|
|
|
case user == nil:
|
|
|
|
c.String(401, "User not authorized")
|
|
|
|
c.Abort()
|
2021-11-23 14:36:52 +00:00
|
|
|
case !perm.Admin:
|
2016-07-21 17:43:29 +00:00
|
|
|
c.String(403, "User not authorized")
|
|
|
|
c.Abort()
|
|
|
|
default:
|
|
|
|
c.Next()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-30 01:21:17 +00:00
|
|
|
func MustUser() gin.HandlerFunc {
|
|
|
|
return func(c *gin.Context) {
|
|
|
|
user := User(c)
|
|
|
|
switch {
|
|
|
|
case user == nil:
|
2016-04-22 00:10:19 +00:00
|
|
|
c.String(401, "User not authorized")
|
|
|
|
c.Abort()
|
2015-09-30 01:21:17 +00:00
|
|
|
default:
|
|
|
|
c.Next()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2022-07-25 01:09:35 +00:00
|
|
|
|
|
|
|
func MustOrgMember(admin bool) gin.HandlerFunc {
|
|
|
|
return func(c *gin.Context) {
|
2023-07-21 17:45:32 +00:00
|
|
|
_store := store.FromContext(c)
|
|
|
|
|
2022-07-25 01:09:35 +00:00
|
|
|
user := User(c)
|
|
|
|
if user == nil {
|
|
|
|
c.String(http.StatusUnauthorized, "User not authorized")
|
|
|
|
c.Abort()
|
|
|
|
return
|
|
|
|
}
|
2023-07-21 17:45:32 +00:00
|
|
|
|
|
|
|
orgID, err := strconv.ParseInt(c.Param("org_id"), 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
c.String(http.StatusBadRequest, "Error parsing org id. %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
org, err := _store.OrgGet(orgID)
|
|
|
|
if err != nil {
|
|
|
|
c.String(http.StatusNotFound, "Organization not found")
|
2022-07-25 01:09:35 +00:00
|
|
|
return
|
|
|
|
}
|
2023-07-21 17:45:32 +00:00
|
|
|
|
2022-07-25 01:09:35 +00:00
|
|
|
// User can access his own, admin can access all
|
2023-07-21 17:45:32 +00:00
|
|
|
if (org.Name == user.Login) || user.Admin {
|
2022-07-25 01:09:35 +00:00
|
|
|
c.Next()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-07-21 17:45:32 +00:00
|
|
|
perm, err := server.Config.Services.Membership.Get(c, user, org.Name)
|
2022-07-25 01:09:35 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Error().Msgf("Failed to check membership: %v", err)
|
|
|
|
c.String(http.StatusInternalServerError, http.StatusText(http.StatusInternalServerError))
|
|
|
|
c.Abort()
|
|
|
|
return
|
|
|
|
}
|
2023-07-21 17:45:32 +00:00
|
|
|
|
2022-07-25 01:09:35 +00:00
|
|
|
if perm == nil || (!admin && !perm.Member) || (admin && !perm.Admin) {
|
|
|
|
c.String(http.StatusForbidden, "User not authorized")
|
|
|
|
c.Abort()
|
|
|
|
return
|
|
|
|
}
|
2023-07-21 17:45:32 +00:00
|
|
|
|
2022-07-25 01:09:35 +00:00
|
|
|
c.Next()
|
|
|
|
}
|
|
|
|
}
|