package user import ( "errors" "fmt" "net/http" "github.com/porter-dev/porter/api/server/authn" "github.com/porter-dev/porter/api/server/handlers" "github.com/porter-dev/porter/api/server/shared" "github.com/porter-dev/porter/api/server/shared/apierrors" "github.com/porter-dev/porter/api/server/shared/config" "github.com/porter-dev/porter/api/server/shared/config/env" "github.com/porter-dev/porter/api/types" "golang.org/x/crypto/bcrypt" "gorm.io/gorm" ) type UserLoginHandler struct { handlers.PorterHandlerReadWriter } func NewUserLoginHandler( config *config.Config, decoderValidator shared.RequestDecoderValidator, writer shared.ResultWriter, ) *UserLoginHandler { return &UserLoginHandler{ PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer), } } func (u *UserLoginHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) { request := &types.LoginUserRequest{} if ok := u.DecodeAndValidate(w, r, request); !ok { return } if err := checkUserRestrictions(u.Config().ServerConf, request.Email); err != nil { u.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest)) return } // check that passwords match storedUser, err := u.Repo().User().ReadUserByEmail(request.Email) // case on user not existing, send forbidden error if not exist if err != nil { if targetErr := gorm.ErrRecordNotFound; errors.Is(err, targetErr) { u.HandleAPIError(w, r, apierrors.NewErrForbidden(err)) return } else { u.HandleAPIError(w, r, apierrors.NewErrInternal(err)) return } } if err := bcrypt.CompareHashAndPassword([]byte(storedUser.Password), []byte(request.Password)); err != nil { reqErr := apierrors.NewErrPassThroughToClient(fmt.Errorf("incorrect password"), http.StatusUnauthorized) u.HandleAPIError(w, r, reqErr) return } // save the user as authenticated in the session redirect, err := authn.SaveUserAuthenticated(w, r, u.Config(), storedUser) if err != nil { u.HandleAPIError(w, r, apierrors.NewErrInternal(err)) return } if redirect != "" { http.Redirect(w, r, redirect, http.StatusFound) return } u.WriteResult(w, r, storedUser.ToUserType()) } // checkUserRestrictions checks login restrictions specified by environment variables on the // Porter instance. func checkUserRestrictions( serverConf *env.ServerConf, reqEmail string, ) error { // if the admin user env var is specified, only allow admin user email if adminEmail := serverConf.AdminEmail; adminEmail != "" && adminEmail != reqEmail { return fmt.Errorf("email not allowed") } return nil }