mirror of
				https://gitee.com/gitea/gitea
				synced 2025-11-04 08:30:25 +08:00 
			
		
		
		
	`models` does far too much. In particular it handles all `UserSignin`. It shouldn't be responsible for calling LDAP, SMTP or PAM for signing in. Therefore we should move this code out of `models`. This code has to depend on `models` - therefore it belongs in `services`. There is a package in `services` called `auth` and clearly this functionality belongs in there. Plan: - [x] Change `auth.Auth` to `auth.Method` - as they represent methods of authentication. - [x] Move `models.UserSignIn` into `auth` - [x] Move `models.ExternalUserLogin` - [x] Move most of the `LoginVia*` methods to `auth` or subpackages - [x] Move Resynchronize functionality to `auth` - Involved some restructuring of `models/ssh_key.go` to reduce the size of this massive file and simplify its files. - [x] Move the rest of the LDAP functionality in to the ldap subpackage - [x] Re-factor the login sources to express an interfaces `auth.Source`? - I've done this through some smaller interfaces Authenticator and Synchronizable - which would allow us to extend things in future - [x] Now LDAP is out of models - need to think about modules/auth/ldap and I think all of that functionality might just be moveable - [x] Similarly a lot Oauth2 functionality need not be in models too and should be moved to services/auth/source/oauth2 - [x] modules/auth/oauth2/oauth2.go uses xorm... This is naughty - probably need to move this into models. - [x] models/oauth2.go - mostly should be in modules/auth/oauth2 or services/auth/source/oauth2 - [x] More simplifications of login_source.go may need to be done - Allow wiring in of notify registration - *this can now easily be done - but I think we should do it in another PR* - see #16178 - More refactors...? - OpenID should probably become an auth Method but I think that can be left for another PR - Methods should also probably be cleaned up - again another PR I think. - SSPI still needs more refactors.* Rename auth.Auth auth.Method * Restructure ssh_key.go - move functions from models/user.go that relate to ssh_key to ssh_key - split ssh_key.go to try create clearer function domains for allow for future refactors here. Signed-off-by: Andrew Thornton <art27@cantab.net>
		
			
				
	
	
		
			122 lines
		
	
	
		
			3.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			122 lines
		
	
	
		
			3.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2014 The Gogs Authors. All rights reserved.
 | 
						|
// Copyright 2019 The Gitea Authors. All rights reserved.
 | 
						|
// Use of this source code is governed by a MIT-style
 | 
						|
// license that can be found in the LICENSE file.
 | 
						|
 | 
						|
package auth
 | 
						|
 | 
						|
import (
 | 
						|
	"net/http"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"code.gitea.io/gitea/models"
 | 
						|
	"code.gitea.io/gitea/modules/base"
 | 
						|
	"code.gitea.io/gitea/modules/log"
 | 
						|
	"code.gitea.io/gitea/modules/setting"
 | 
						|
	"code.gitea.io/gitea/modules/timeutil"
 | 
						|
	"code.gitea.io/gitea/modules/web/middleware"
 | 
						|
)
 | 
						|
 | 
						|
// Ensure the struct implements the interface.
 | 
						|
var (
 | 
						|
	_ Method = &Basic{}
 | 
						|
	_ Named  = &Basic{}
 | 
						|
)
 | 
						|
 | 
						|
// Basic implements the Auth interface and authenticates requests (API requests
 | 
						|
// only) by looking for Basic authentication data or "x-oauth-basic" token in the "Authorization"
 | 
						|
// header.
 | 
						|
type Basic struct {
 | 
						|
}
 | 
						|
 | 
						|
// Name represents the name of auth method
 | 
						|
func (b *Basic) Name() string {
 | 
						|
	return "basic"
 | 
						|
}
 | 
						|
 | 
						|
// Verify extracts and validates Basic data (username and password/token) from the
 | 
						|
// "Authorization" header of the request and returns the corresponding user object for that
 | 
						|
// name/token on successful validation.
 | 
						|
// Returns nil if header is empty or validation fails.
 | 
						|
func (b *Basic) Verify(req *http.Request, w http.ResponseWriter, store DataStore, sess SessionStore) *models.User {
 | 
						|
	// Basic authentication should only fire on API, Download or on Git or LFSPaths
 | 
						|
	if !middleware.IsAPIPath(req) && !isAttachmentDownload(req) && !isGitRawOrLFSPath(req) {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	baHead := req.Header.Get("Authorization")
 | 
						|
	if len(baHead) == 0 {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	auths := strings.SplitN(baHead, " ", 2)
 | 
						|
	if len(auths) != 2 || (auths[0] != "Basic" && auths[0] != "basic") {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	uname, passwd, _ := base.BasicAuthDecode(auths[1])
 | 
						|
 | 
						|
	// Check if username or password is a token
 | 
						|
	isUsernameToken := len(passwd) == 0 || passwd == "x-oauth-basic"
 | 
						|
	// Assume username is token
 | 
						|
	authToken := uname
 | 
						|
	if !isUsernameToken {
 | 
						|
		log.Trace("Basic Authorization: Attempting login for: %s", uname)
 | 
						|
		// Assume password is token
 | 
						|
		authToken = passwd
 | 
						|
	} else {
 | 
						|
		log.Trace("Basic Authorization: Attempting login with username as token")
 | 
						|
	}
 | 
						|
 | 
						|
	uid := CheckOAuthAccessToken(authToken)
 | 
						|
	if uid != 0 {
 | 
						|
		log.Trace("Basic Authorization: Valid OAuthAccessToken for user[%d]", uid)
 | 
						|
 | 
						|
		u, err := models.GetUserByID(uid)
 | 
						|
		if err != nil {
 | 
						|
			log.Error("GetUserByID:  %v", err)
 | 
						|
			return nil
 | 
						|
		}
 | 
						|
 | 
						|
		store.GetData()["IsApiToken"] = true
 | 
						|
		return u
 | 
						|
	}
 | 
						|
 | 
						|
	token, err := models.GetAccessTokenBySHA(authToken)
 | 
						|
	if err == nil {
 | 
						|
		log.Trace("Basic Authorization: Valid AccessToken for user[%d]", uid)
 | 
						|
		u, err := models.GetUserByID(token.UID)
 | 
						|
		if err != nil {
 | 
						|
			log.Error("GetUserByID:  %v", err)
 | 
						|
			return nil
 | 
						|
		}
 | 
						|
 | 
						|
		token.UpdatedUnix = timeutil.TimeStampNow()
 | 
						|
		if err = models.UpdateAccessToken(token); err != nil {
 | 
						|
			log.Error("UpdateAccessToken:  %v", err)
 | 
						|
		}
 | 
						|
 | 
						|
		store.GetData()["IsApiToken"] = true
 | 
						|
		return u
 | 
						|
	} else if !models.IsErrAccessTokenNotExist(err) && !models.IsErrAccessTokenEmpty(err) {
 | 
						|
		log.Error("GetAccessTokenBySha: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	if !setting.Service.EnableBasicAuth {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	log.Trace("Basic Authorization: Attempting SignIn for %s", uname)
 | 
						|
	u, err := UserSignIn(uname, passwd)
 | 
						|
	if err != nil {
 | 
						|
		if !models.IsErrUserNotExist(err) {
 | 
						|
			log.Error("UserSignIn: %v", err)
 | 
						|
		}
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	log.Trace("Basic Authorization: Logged in user %-v", u)
 | 
						|
 | 
						|
	return u
 | 
						|
}
 |