mirror of
https://github.com/nezhahq/nezha.git
synced 2025-01-22 12:48:14 -05:00
3216ad43fa
Some checks are pending
CodeQL / Analyze (go) (push) Waiting to run
CodeQL / Analyze (javascript) (push) Waiting to run
Contributors / contributors (push) Waiting to run
Sync / sync-to-jihulab (push) Waiting to run
Run Tests / tests (macos) (push) Waiting to run
Run Tests / tests (ubuntu) (push) Waiting to run
Run Tests / tests (windows) (push) Waiting to run
* fix: struct tag * fix: struct tag * fix: strings conversion * do not write anything after redirection * fix table * fix select
193 lines
5.1 KiB
Go
193 lines
5.1 KiB
Go
package controller
|
|
|
|
import (
|
|
"encoding/json"
|
|
"net/http"
|
|
"time"
|
|
|
|
jwt "github.com/appleboy/gin-jwt/v2"
|
|
"github.com/gin-gonic/gin"
|
|
"golang.org/x/crypto/bcrypt"
|
|
"gorm.io/gorm"
|
|
|
|
"github.com/nezhahq/nezha/cmd/dashboard/controller/waf"
|
|
"github.com/nezhahq/nezha/model"
|
|
"github.com/nezhahq/nezha/pkg/utils"
|
|
"github.com/nezhahq/nezha/service/singleton"
|
|
)
|
|
|
|
func initParams() *jwt.GinJWTMiddleware {
|
|
return &jwt.GinJWTMiddleware{
|
|
Realm: singleton.Conf.SiteName,
|
|
Key: []byte(singleton.Conf.JWTSecretKey),
|
|
CookieName: "nz-jwt",
|
|
SendCookie: true,
|
|
Timeout: time.Hour,
|
|
MaxRefresh: time.Hour,
|
|
IdentityKey: model.CtxKeyAuthorizedUser,
|
|
PayloadFunc: payloadFunc(),
|
|
|
|
IdentityHandler: identityHandler(),
|
|
Authenticator: authenticator(),
|
|
Authorizator: authorizator(),
|
|
Unauthorized: unauthorized(),
|
|
TokenLookup: "header: Authorization, query: token, cookie: nz-jwt",
|
|
TokenHeadName: "Bearer",
|
|
TimeFunc: time.Now,
|
|
|
|
LoginResponse: func(c *gin.Context, code int, token string, expire time.Time) {
|
|
c.JSON(http.StatusOK, model.CommonResponse[model.LoginResponse]{
|
|
Success: true,
|
|
Data: model.LoginResponse{
|
|
Token: token,
|
|
Expire: expire.Format(time.RFC3339),
|
|
},
|
|
})
|
|
},
|
|
RefreshResponse: refreshResponse,
|
|
}
|
|
}
|
|
|
|
func payloadFunc() func(data interface{}) jwt.MapClaims {
|
|
return func(data interface{}) jwt.MapClaims {
|
|
if v, ok := data.(string); ok {
|
|
return jwt.MapClaims{
|
|
model.CtxKeyAuthorizedUser: v,
|
|
}
|
|
}
|
|
return jwt.MapClaims{}
|
|
}
|
|
}
|
|
|
|
func identityHandler() func(c *gin.Context) interface{} {
|
|
return func(c *gin.Context) interface{} {
|
|
claims := jwt.ExtractClaims(c)
|
|
userId := claims[model.CtxKeyAuthorizedUser].(string)
|
|
var user model.User
|
|
if err := singleton.DB.First(&user, userId).Error; err != nil {
|
|
return nil
|
|
}
|
|
return &user
|
|
}
|
|
}
|
|
|
|
// User Login
|
|
// @Summary user login
|
|
// @Schemes
|
|
// @Description user login
|
|
// @Accept json
|
|
// @param loginRequest body model.LoginRequest true "Login Request"
|
|
// @Produce json
|
|
// @Success 200 {object} model.CommonResponse[model.LoginResponse]
|
|
// @Router /login [post]
|
|
func authenticator() func(c *gin.Context) (interface{}, error) {
|
|
return func(c *gin.Context) (interface{}, error) {
|
|
var loginVals model.LoginRequest
|
|
if err := c.ShouldBind(&loginVals); err != nil {
|
|
return "", jwt.ErrMissingLoginValues
|
|
}
|
|
|
|
var user model.User
|
|
realip := c.GetString(model.CtxKeyRealIPStr)
|
|
|
|
if err := singleton.DB.Select("id", "password", "reject_password").Where("username = ?", loginVals.Username).First(&user).Error; err != nil {
|
|
if err == gorm.ErrRecordNotFound {
|
|
model.BlockIP(singleton.DB, realip, model.WAFBlockReasonTypeLoginFail, model.BlockIDUnknownUser)
|
|
}
|
|
return nil, jwt.ErrFailedAuthentication
|
|
}
|
|
|
|
if user.RejectPassword {
|
|
model.BlockIP(singleton.DB, realip, model.WAFBlockReasonTypeLoginFail, int64(user.ID))
|
|
return nil, jwt.ErrFailedAuthentication
|
|
}
|
|
|
|
if err := bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(loginVals.Password)); err != nil {
|
|
model.BlockIP(singleton.DB, realip, model.WAFBlockReasonTypeLoginFail, int64(user.ID))
|
|
return nil, jwt.ErrFailedAuthentication
|
|
}
|
|
|
|
model.UnblockIP(singleton.DB, realip, model.BlockIDUnknownUser)
|
|
model.UnblockIP(singleton.DB, realip, int64(user.ID))
|
|
return utils.Itoa(user.ID), nil
|
|
}
|
|
}
|
|
|
|
func authorizator() func(data interface{}, c *gin.Context) bool {
|
|
return func(data interface{}, c *gin.Context) bool {
|
|
_, ok := data.(*model.User)
|
|
return ok
|
|
}
|
|
}
|
|
|
|
func unauthorized() func(c *gin.Context, code int, message string) {
|
|
return func(c *gin.Context, code int, message string) {
|
|
c.JSON(http.StatusOK, model.CommonResponse[any]{
|
|
Success: false,
|
|
Error: "ApiErrorUnauthorized",
|
|
})
|
|
}
|
|
}
|
|
|
|
// Refresh token
|
|
// @Summary Refresh token
|
|
// @Security BearerAuth
|
|
// @Schemes
|
|
// @Description Refresh token
|
|
// @Tags auth required
|
|
// @Produce json
|
|
// @Success 200 {object} model.CommonResponse[model.LoginResponse]
|
|
// @Router /refresh-token [get]
|
|
func refreshResponse(c *gin.Context, code int, token string, expire time.Time) {
|
|
c.JSON(http.StatusOK, model.CommonResponse[model.LoginResponse]{
|
|
Success: true,
|
|
Data: model.LoginResponse{
|
|
Token: token,
|
|
Expire: expire.Format(time.RFC3339),
|
|
},
|
|
})
|
|
}
|
|
|
|
func optionalAuthMiddleware(mw *jwt.GinJWTMiddleware) func(c *gin.Context) {
|
|
return func(c *gin.Context) {
|
|
claims, err := mw.GetClaimsFromJWT(c)
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
switch v := claims["exp"].(type) {
|
|
case nil:
|
|
return
|
|
case float64:
|
|
if int64(v) < mw.TimeFunc().Unix() {
|
|
return
|
|
}
|
|
case json.Number:
|
|
n, err := v.Int64()
|
|
if err != nil {
|
|
return
|
|
}
|
|
if n < mw.TimeFunc().Unix() {
|
|
return
|
|
}
|
|
default:
|
|
return
|
|
}
|
|
|
|
c.Set("JWT_PAYLOAD", claims)
|
|
identity := mw.IdentityHandler(c)
|
|
|
|
if identity != nil {
|
|
model.UnblockIP(singleton.DB, c.GetString(model.CtxKeyRealIPStr), model.BlockIDToken)
|
|
c.Set(mw.IdentityKey, identity)
|
|
} else {
|
|
if err := model.BlockIP(singleton.DB, c.GetString(model.CtxKeyRealIPStr), model.WAFBlockReasonTypeBruteForceToken, model.BlockIDToken); err != nil {
|
|
waf.ShowBlockPage(c, err)
|
|
return
|
|
}
|
|
}
|
|
|
|
c.Next()
|
|
}
|
|
}
|