auth
2014-08-16
Parent:3423c552e249
auth/util.go
Implement session management and move login. Add a session store interface to validate and retrieve data about sessions. Implement session management in endpoints that need session support. Move the login functionality from inlined into the OAuth flow into its own handler, that the OAuth flow will redirect to. The login functionality should take a redirect URL parameter to return to the OAuth flow when login is completed.
| paddy@6 | 1 package auth |
| paddy@0 | 2 |
| paddy@0 | 3 import ( |
| paddy@0 | 4 "encoding/base64" |
| paddy@0 | 5 "errors" |
| paddy@1 | 6 "fmt" |
| paddy@0 | 7 "net/http" |
| paddy@1 | 8 "net/url" |
| paddy@0 | 9 "strings" |
| paddy@1 | 10 |
| paddy@1 | 11 "code.google.com/p/go-uuid/uuid" |
| paddy@0 | 12 ) |
| paddy@0 | 13 |
| paddy@0 | 14 var ( |
| paddy@0 | 15 BasicAuthNotSetError = errors.New("Authorization header not set.") |
| paddy@0 | 16 InvalidBasicAuthTypeError = errors.New("Invalid basic auth type.") |
| paddy@0 | 17 InvalidBasicAuthMessage = errors.New("Invalid basic auth format.") |
| paddy@0 | 18 ) |
| paddy@0 | 19 |
| paddy@0 | 20 // Parse basic authentication header |
| paddy@0 | 21 type BasicAuth struct { |
| paddy@0 | 22 Username string |
| paddy@0 | 23 Password string |
| paddy@0 | 24 } |
| paddy@0 | 25 |
| paddy@0 | 26 // Return authorization header data |
| paddy@0 | 27 func CheckBasicAuth(r *http.Request) (BasicAuth, error) { |
| paddy@0 | 28 if r.Header.Get("Authorization") == "" { |
| paddy@0 | 29 return BasicAuth{}, BasicAuthNotSetError |
| paddy@0 | 30 } |
| paddy@0 | 31 |
| paddy@0 | 32 s := strings.SplitN(r.Header.Get("Authorization"), " ", 2) |
| paddy@0 | 33 if len(s) != 2 || s[0] != "Basic" { |
| paddy@0 | 34 return BasicAuth{}, InvalidBasicAuthTypeError |
| paddy@0 | 35 } |
| paddy@0 | 36 |
| paddy@0 | 37 b, err := base64.StdEncoding.DecodeString(s[1]) |
| paddy@0 | 38 if err != nil { |
| paddy@0 | 39 return BasicAuth{}, err |
| paddy@0 | 40 } |
| paddy@0 | 41 pair := strings.SplitN(string(b), ":", 2) |
| paddy@0 | 42 if len(pair) != 2 { |
| paddy@0 | 43 return BasicAuth{}, InvalidBasicAuthMessage |
| paddy@0 | 44 } |
| paddy@0 | 45 |
| paddy@0 | 46 return BasicAuth{Username: pair[0], Password: pair[1]}, nil |
| paddy@0 | 47 } |
| paddy@0 | 48 |
| paddy@0 | 49 // getClientAuth checks client basic authentication in params if allowed, |
| paddy@0 | 50 // otherwise gets it from the header. |
| paddy@0 | 51 func getClientAuth(r *http.Request, allowQueryParams bool) (BasicAuth, error) { |
| paddy@0 | 52 |
| paddy@0 | 53 if allowQueryParams { |
| paddy@0 | 54 // Allow for auth without password |
| paddy@0 | 55 if _, hasSecret := r.Form["client_secret"]; hasSecret { |
| paddy@0 | 56 auth := BasicAuth{ |
| paddy@0 | 57 Username: r.Form.Get("client_id"), |
| paddy@0 | 58 Password: r.Form.Get("client_secret"), |
| paddy@0 | 59 } |
| paddy@0 | 60 if auth.Username != "" { |
| paddy@0 | 61 return auth, nil |
| paddy@0 | 62 } |
| paddy@0 | 63 } |
| paddy@0 | 64 } |
| paddy@0 | 65 |
| paddy@0 | 66 return CheckBasicAuth(r) |
| paddy@0 | 67 } |
| paddy@1 | 68 |
| paddy@1 | 69 func newToken() string { |
| paddy@1 | 70 return base64.StdEncoding.EncodeToString([]byte(uuid.New())) |
| paddy@1 | 71 } |
| paddy@1 | 72 |
| paddy@1 | 73 // validateURI validates that redirectURI is contained in baseURI |
| paddy@1 | 74 func validateURI(baseURI string, redirectURI string) error { |
| paddy@1 | 75 if baseURI == "" || redirectURI == "" { |
| paddy@1 | 76 return errors.New("urls cannot be blank.") |
| paddy@1 | 77 } |
| paddy@1 | 78 |
| paddy@1 | 79 // parse base url |
| paddy@1 | 80 base, err := url.Parse(baseURI) |
| paddy@1 | 81 if err != nil { |
| paddy@1 | 82 return err |
| paddy@1 | 83 } |
| paddy@1 | 84 |
| paddy@1 | 85 // parse passed url |
| paddy@1 | 86 redirect, err := url.Parse(redirectURI) |
| paddy@1 | 87 if err != nil { |
| paddy@1 | 88 return err |
| paddy@1 | 89 } |
| paddy@1 | 90 |
| paddy@1 | 91 // must not have fragment |
| paddy@1 | 92 if base.Fragment != "" || redirect.Fragment != "" { |
| paddy@1 | 93 return errors.New("url must not include fragment.") |
| paddy@1 | 94 } |
| paddy@1 | 95 |
| paddy@1 | 96 // check if urls match |
| paddy@1 | 97 if base.Scheme == redirect.Scheme && base.Host == redirect.Host && len(redirect.Path) >= len(base.Path) && strings.HasPrefix(redirect.Path, base.Path) { |
| paddy@1 | 98 return nil |
| paddy@1 | 99 } |
| paddy@1 | 100 |
| paddy@1 | 101 return errors.New(fmt.Sprintf("urls don't validate: %s / %s\n", baseURI, redirectURI)) |
| paddy@1 | 102 } |