2023-06-19 23:42:47 +02:00
|
|
|
// SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
|
|
|
|
// SPDX-License-Identifier: Apache-2.0
|
2017-12-04 02:44:27 +01:00
|
|
|
|
2023-08-11 04:46:45 +02:00
|
|
|
package fever // import "miniflux.app/v2/internal/fever"
|
2017-12-04 02:44:27 +01:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2023-09-25 01:32:09 +02:00
|
|
|
"log/slog"
|
2017-12-04 02:44:27 +01:00
|
|
|
"net/http"
|
|
|
|
|
2023-08-11 04:46:45 +02:00
|
|
|
"miniflux.app/v2/internal/http/request"
|
|
|
|
"miniflux.app/v2/internal/http/response/json"
|
|
|
|
"miniflux.app/v2/internal/storage"
|
2017-12-04 02:44:27 +01:00
|
|
|
)
|
|
|
|
|
2018-11-11 18:52:12 +01:00
|
|
|
type middleware struct {
|
|
|
|
store *storage.Storage
|
|
|
|
}
|
|
|
|
|
|
|
|
func newMiddleware(s *storage.Storage) *middleware {
|
|
|
|
return &middleware{s}
|
|
|
|
}
|
2018-10-27 04:49:49 +02:00
|
|
|
|
2018-11-11 18:52:12 +01:00
|
|
|
func (m *middleware) serve(next http.Handler) http.Handler {
|
2017-12-04 02:44:27 +01:00
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
2020-08-09 06:51:52 +02:00
|
|
|
clientIP := request.ClientIP(r)
|
2017-12-04 02:44:27 +01:00
|
|
|
apiKey := r.FormValue("api_key")
|
2018-10-27 04:49:49 +02:00
|
|
|
if apiKey == "" {
|
2023-09-25 01:32:09 +02:00
|
|
|
slog.Warn("[Fever] No API key provided",
|
|
|
|
slog.Bool("authentication_failed", true),
|
|
|
|
slog.String("client_ip", clientIP),
|
|
|
|
slog.String("user_agent", r.UserAgent()),
|
|
|
|
)
|
2018-11-11 18:52:12 +01:00
|
|
|
json.OK(w, r, newAuthFailureResponse())
|
2018-10-27 04:49:49 +02:00
|
|
|
return
|
|
|
|
}
|
2018-04-30 01:35:04 +02:00
|
|
|
|
2018-04-28 05:38:46 +02:00
|
|
|
user, err := m.store.UserByFeverToken(apiKey)
|
2017-12-04 02:44:27 +01:00
|
|
|
if err != nil {
|
2023-09-25 01:32:09 +02:00
|
|
|
slog.Error("[Fever] Unable to fetch user by API key",
|
|
|
|
slog.Bool("authentication_failed", true),
|
|
|
|
slog.String("client_ip", clientIP),
|
|
|
|
slog.String("user_agent", r.UserAgent()),
|
|
|
|
slog.Any("error", err),
|
|
|
|
)
|
2018-11-11 18:52:12 +01:00
|
|
|
json.OK(w, r, newAuthFailureResponse())
|
2017-12-04 02:44:27 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if user == nil {
|
2023-09-25 01:32:09 +02:00
|
|
|
slog.Warn("[Fever] No user found with the API key provided",
|
|
|
|
slog.Bool("authentication_failed", true),
|
|
|
|
slog.String("client_ip", clientIP),
|
|
|
|
slog.String("user_agent", r.UserAgent()),
|
|
|
|
)
|
2018-11-11 18:52:12 +01:00
|
|
|
json.OK(w, r, newAuthFailureResponse())
|
2017-12-04 02:44:27 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-09-25 01:32:09 +02:00
|
|
|
slog.Info("[Fever] User authenticated successfully",
|
|
|
|
slog.Bool("authentication_successful", true),
|
|
|
|
slog.String("client_ip", clientIP),
|
|
|
|
slog.String("user_agent", r.UserAgent()),
|
|
|
|
slog.Int64("user_id", user.ID),
|
|
|
|
slog.String("username", user.Username),
|
|
|
|
)
|
|
|
|
|
2018-04-28 05:38:46 +02:00
|
|
|
m.store.SetLastLogin(user.ID)
|
2017-12-04 02:44:27 +01:00
|
|
|
|
|
|
|
ctx := r.Context()
|
2018-09-03 23:26:40 +02:00
|
|
|
ctx = context.WithValue(ctx, request.UserIDContextKey, user.ID)
|
|
|
|
ctx = context.WithValue(ctx, request.UserTimezoneContextKey, user.Timezone)
|
|
|
|
ctx = context.WithValue(ctx, request.IsAdminUserContextKey, user.IsAdmin)
|
|
|
|
ctx = context.WithValue(ctx, request.IsAuthenticatedContextKey, true)
|
2017-12-04 02:44:27 +01:00
|
|
|
|
|
|
|
next.ServeHTTP(w, r.WithContext(ctx))
|
|
|
|
})
|
|
|
|
}
|