257 lines
8.9 KiB
Perl
257 lines
8.9 KiB
Perl
package App::Netdisco::Web::AuthN;
|
||
|
||
use Dancer ':syntax';
|
||
use Dancer::Plugin::DBIC;
|
||
use Dancer::Plugin::Auth::Extensible;
|
||
use Dancer::Plugin::Swagger;
|
||
|
||
use App::Netdisco; # a safe noop but needed for standalone testing
|
||
use App::Netdisco::Util::Web 'request_is_api';
|
||
use MIME::Base64;
|
||
|
||
# ensure that regardless of where the user is redirected, we have a link
|
||
# back to the page they requested.
|
||
hook 'before' => sub {
|
||
params->{return_url} ||= ((request->path ne uri_for('/')->path)
|
||
? request->uri : uri_for(setting('web_home'))->path);
|
||
};
|
||
|
||
# try to find a valid username according to headers
|
||
# or configuration settings
|
||
sub _get_delegated_authn_user {
|
||
my $username = undef;
|
||
|
||
if (setting('trust_x_remote_user')
|
||
and scalar request->header('X-REMOTE_USER')
|
||
and length scalar request->header('X-REMOTE_USER')) {
|
||
|
||
($username = scalar request->header('X-REMOTE_USER')) =~ s/@[^@]*$//;
|
||
}
|
||
elsif (setting('trust_remote_user')
|
||
and defined $ENV{REMOTE_USER}
|
||
and length $ENV{REMOTE_USER}) {
|
||
|
||
($username = $ENV{REMOTE_USER}) =~ s/@[^@]*$//;
|
||
}
|
||
# this works for API calls, too
|
||
elsif (setting('no_auth')) {
|
||
$username = 'guest';
|
||
}
|
||
|
||
return unless $username;
|
||
|
||
# from the internals of Dancer::Plugin::Auth::Extensible
|
||
my $provider = Dancer::Plugin::Auth::Extensible::auth_provider('users');
|
||
|
||
# may synthesize a user if validate_remote_user=false
|
||
return $provider->get_user_details($username);
|
||
}
|
||
|
||
# Dancer will create a session if it sees its own cookie. For the API and also
|
||
# various auto login options we need to bootstrap the session instead. If no
|
||
# auth data passed, then the hook simply returns, no session is set, and the
|
||
# user is redirected to login page.
|
||
hook 'before' => sub {
|
||
# return if request is for endpoints not requiring a session
|
||
return if (
|
||
request->path eq uri_for('/login')->path
|
||
or request->path eq uri_for('/logout')->path
|
||
or request->path eq uri_for('/swagger.json')->path
|
||
or index(request->path, uri_for('/swagger-ui')->path) == 0
|
||
);
|
||
|
||
# Dancer will issue a cookie to the client which could be returned and
|
||
# cause API calls to succeed without passing token. Kill the session.
|
||
session->destroy if request_is_api;
|
||
|
||
# ...otherwise, we can short circuit if Dancer reads its cookie OK
|
||
return if session('logged_in_user');
|
||
|
||
my $delegated = _get_delegated_authn_user();
|
||
|
||
# this ordering allows override of delegated authN if given creds
|
||
|
||
# protect against delegated authN config but no valid user
|
||
if ((not $delegated) and
|
||
(setting('trust_x_remote_user') or setting('trust_remote_user'))) {
|
||
session->destroy;
|
||
request->path_info('/');
|
||
}
|
||
# API calls must conform strictly to path and header requirements
|
||
elsif (request_is_api and request->header('Authorization')) {
|
||
# from the internals of Dancer::Plugin::Auth::Extensible
|
||
my $provider = Dancer::Plugin::Auth::Extensible::auth_provider('users');
|
||
|
||
my $token = request->header('Authorization');
|
||
my $user = $provider->validate_api_token($token)
|
||
or return;
|
||
|
||
session(logged_in_user => $user->username);
|
||
session(logged_in_user_realm => 'users');
|
||
}
|
||
elsif ($delegated) {
|
||
session(logged_in_user => $delegated->username);
|
||
session(logged_in_user_realm => 'users');
|
||
}
|
||
else {
|
||
# user has no AuthN - force to handler for '/'
|
||
request->path_info('/');
|
||
}
|
||
};
|
||
|
||
# override default login_handler so we can log access in the database
|
||
swagger_path {
|
||
description => 'Obtain an API Key',
|
||
tags => ['General'],
|
||
path => (setting('url_base') ? setting('url_base')->with('/login')->path : '/login'),
|
||
parameters => [],
|
||
responses => { default => { examples => {
|
||
'application/json' => { api_key => 'cc9d5c02d8898e5728b7d7a0339c0785' } } },
|
||
},
|
||
},
|
||
post '/login' => sub {
|
||
my $api = ((request->accept and request->accept =~ m/(?:json|javascript)/) ? true : false);
|
||
|
||
# from the internals of Dancer::Plugin::Auth::Extensible
|
||
my $provider = Dancer::Plugin::Auth::Extensible::auth_provider('users');
|
||
|
||
# get authN data from BasicAuth header used by API, put into params
|
||
my $authheader = request->header('Authorization');
|
||
if (defined $authheader and $authheader =~ /^Basic (.*)$/i) {
|
||
my ($u, $p) = split(m/:/, (MIME::Base64::decode($1) || ":"));
|
||
params->{username} = $u;
|
||
params->{password} = $p;
|
||
}
|
||
|
||
# validate authN
|
||
my ($success, $realm) = authenticate_user(param('username'),param('password'));
|
||
|
||
# or try to get user from somewhere else
|
||
my $delegated = _get_delegated_authn_user();
|
||
|
||
if (($success and not
|
||
# protect against delegated authN config but no valid user (then must ignore params)
|
||
(not $delegated and (setting('trust_x_remote_user') or setting('trust_remote_user'))))
|
||
or $delegated) {
|
||
|
||
# this ordering allows override of delegated user if given creds
|
||
my $user = ($success ? $provider->get_user_details(param('username'))
|
||
: $delegated);
|
||
|
||
session logged_in_user => $user->username;
|
||
session logged_in_fullname => ($user->fullname || '');
|
||
session logged_in_user_realm => ($realm || 'users');
|
||
|
||
schema('netdisco')->resultset('UserLog')->create({
|
||
username => session('logged_in_user'),
|
||
userip => request->remote_address,
|
||
event => (sprintf 'Login (%s)', ($api ? 'API' : 'WebUI')),
|
||
details => param('return_url'),
|
||
});
|
||
$user->update({ last_on => \'LOCALTIMESTAMP' });
|
||
|
||
if ($api) {
|
||
header('Content-Type' => 'application/json');
|
||
|
||
# if there's a current valid token then reissue it and reset timer
|
||
$user->update({
|
||
token_from => time,
|
||
($provider->validate_api_token($user->token)
|
||
? () : (token => \'md5(random()::text)')),
|
||
})->discard_changes();
|
||
return to_json { api_key => $user->token };
|
||
}
|
||
|
||
redirect param('return_url');
|
||
}
|
||
else {
|
||
# invalidate session cookie
|
||
session->destroy;
|
||
|
||
schema('netdisco')->resultset('UserLog')->create({
|
||
username => param('username'),
|
||
userip => request->remote_address,
|
||
event => (sprintf 'Login Failure (%s)', ($api ? 'API' : 'WebUI')),
|
||
details => param('return_url'),
|
||
});
|
||
|
||
if ($api) {
|
||
header('Content-Type' => 'application/json');
|
||
status('unauthorized');
|
||
return to_json { error => 'authentication failed' };
|
||
}
|
||
|
||
vars->{login_failed}++;
|
||
forward uri_for('/login'),
|
||
{ login_failed => 1, return_url => param('return_url') },
|
||
{ method => 'GET' };
|
||
}
|
||
};
|
||
|
||
# ugh, *puke*, but D::P::Swagger has no way to set this with swagger_path
|
||
# must be after the path is declared, above.
|
||
Dancer::Plugin::Swagger->instance->doc
|
||
->{paths}->{ (setting('url_base') ? setting('url_base')->with('/login')->path : '/login') }
|
||
->{post}->{security}->[0]->{BasicAuth} = [];
|
||
|
||
# we override the default login_handler, so logout has to be handled as well
|
||
swagger_path {
|
||
description => 'Destroy user API Key and session cookie',
|
||
tags => ['General'],
|
||
path => (setting('url_base') ? setting('url_base')->with('/logout')->path : '/logout'),
|
||
parameters => [],
|
||
responses => { default => { examples => { 'application/json' => {} } } },
|
||
},
|
||
get '/logout' => sub {
|
||
my $api = ((request->accept and request->accept =~ m/(?:json|javascript)/) ? true : false);
|
||
|
||
# clear out API token
|
||
my $user = schema('netdisco')->resultset('User')
|
||
->find({ username => session('logged_in_user')});
|
||
$user->update({token => undef, token_from => undef})->discard_changes()
|
||
if $user and $user->in_storage;
|
||
|
||
# invalidate session cookie
|
||
session->destroy;
|
||
|
||
schema('netdisco')->resultset('UserLog')->create({
|
||
username => session('logged_in_user'),
|
||
userip => request->remote_address,
|
||
event => (sprintf 'Logout (%s)', ($api ? 'API' : 'WebUI')),
|
||
details => '',
|
||
});
|
||
|
||
if ($api) {
|
||
header('Content-Type' => 'application/json');
|
||
return to_json {};
|
||
}
|
||
|
||
redirect uri_for(setting('web_home'))->path;
|
||
};
|
||
|
||
# user redirected here when require_role does not succeed
|
||
any qr{^/(?:login(?:/denied)?)?} => sub {
|
||
my $api = ((request->accept and request->accept =~ m/(?:json|javascript)/) ? true : false);
|
||
|
||
if ($api) {
|
||
header('Content-Type' => 'application/json');
|
||
status('unauthorized');
|
||
return to_json {
|
||
error => 'not authorized',
|
||
return_url => param('return_url'),
|
||
};
|
||
}
|
||
elsif (defined request->header('X-Requested-With')
|
||
and request->header('X-Requested-With') eq 'XMLHttpRequest') {
|
||
status('unauthorized');
|
||
return '<div class="span2 alert alert-error"><i class="icon-ban-circle"></i> Error: unauthorized.</div>';
|
||
}
|
||
else {
|
||
template 'index', {
|
||
return_url => param('return_url')
|
||
}, { layout => 'main' };
|
||
}
|
||
};
|
||
|
||
true;
|