| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586 |
- package user
- import (
- "errors"
- "fmt"
- "net/http"
- "github.com/porter-dev/porter/api/server/authn"
- "github.com/porter-dev/porter/api/server/handlers"
- "github.com/porter-dev/porter/api/server/shared"
- "github.com/porter-dev/porter/api/server/shared/apierrors"
- "github.com/porter-dev/porter/api/server/shared/config"
- "github.com/porter-dev/porter/api/server/shared/config/env"
- "github.com/porter-dev/porter/api/types"
- "golang.org/x/crypto/bcrypt"
- "gorm.io/gorm"
- )
- type UserLoginHandler struct {
- handlers.PorterHandlerReadWriter
- }
- func NewUserLoginHandler(
- config *config.Config,
- decoderValidator shared.RequestDecoderValidator,
- writer shared.ResultWriter,
- ) *UserLoginHandler {
- return &UserLoginHandler{
- PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
- }
- }
- func (u *UserLoginHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
- request := &types.LoginUserRequest{}
- if ok := u.DecodeAndValidate(w, r, request); !ok {
- return
- }
- if err := checkUserRestrictions(u.Config().ServerConf, request.Email); err != nil {
- u.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
- return
- }
- // check that passwords match
- storedUser, err := u.Repo().User().ReadUserByEmail(request.Email)
- // case on user not existing, send forbidden error if not exist
- if err != nil {
- if targetErr := gorm.ErrRecordNotFound; errors.Is(err, targetErr) {
- u.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
- return
- } else {
- u.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- }
- if err := bcrypt.CompareHashAndPassword([]byte(storedUser.Password), []byte(request.Password)); err != nil {
- reqErr := apierrors.NewErrPassThroughToClient(fmt.Errorf("incorrect password"), http.StatusUnauthorized)
- u.HandleAPIError(w, r, reqErr)
- return
- }
- // save the user as authenticated in the session
- if err := authn.SaveUserAuthenticated(w, r, u.Config(), storedUser); err != nil {
- u.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- u.WriteResult(w, r, storedUser.ToUserType())
- }
- // checkUserRestrictions checks login restrictions specified by environment variables on the
- // Porter instance.
- func checkUserRestrictions(
- serverConf *env.ServerConf,
- reqEmail string,
- ) error {
- // if the admin user env var is specified, only allow admin user email
- if adminEmail := serverConf.AdminEmail; adminEmail != "" && adminEmail != reqEmail {
- return fmt.Errorf("email not allowed")
- }
- return nil
- }
|