| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091 |
- package user
- import (
- "errors"
- "fmt"
- "net/http"
- "github.com/porter-dev/porter/api/server/authn"
- "github.com/porter-dev/porter/api/server/handlers"
- "github.com/porter-dev/porter/api/server/shared"
- "github.com/porter-dev/porter/api/server/shared/apierrors"
- "github.com/porter-dev/porter/api/server/shared/config"
- "github.com/porter-dev/porter/api/server/shared/config/env"
- "github.com/porter-dev/porter/api/types"
- "golang.org/x/crypto/bcrypt"
- "gorm.io/gorm"
- )
- type UserLoginHandler struct {
- handlers.PorterHandlerReadWriter
- }
- func NewUserLoginHandler(
- config *config.Config,
- decoderValidator shared.RequestDecoderValidator,
- writer shared.ResultWriter,
- ) *UserLoginHandler {
- return &UserLoginHandler{
- PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
- }
- }
- func (u *UserLoginHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
- request := &types.LoginUserRequest{}
- if ok := u.DecodeAndValidate(w, r, request); !ok {
- return
- }
- if err := checkUserRestrictions(u.Config().ServerConf, request.Email); err != nil {
- u.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
- return
- }
- // check that passwords match
- storedUser, err := u.Repo().User().ReadUserByEmail(request.Email)
- // case on user not existing, send forbidden error if not exist
- if err != nil {
- if targetErr := gorm.ErrRecordNotFound; errors.Is(err, targetErr) {
- u.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
- return
- } else {
- u.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- }
- if err := bcrypt.CompareHashAndPassword([]byte(storedUser.Password), []byte(request.Password)); err != nil {
- reqErr := apierrors.NewErrPassThroughToClient(fmt.Errorf("incorrect password"), http.StatusUnauthorized)
- u.HandleAPIError(w, r, reqErr)
- return
- }
- // save the user as authenticated in the session
- redirect, err := authn.SaveUserAuthenticated(w, r, u.Config(), storedUser)
- if err != nil {
- u.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- if redirect != "" {
- http.Redirect(w, r, redirect, http.StatusFound)
- return
- }
- u.WriteResult(w, r, storedUser.ToUserType())
- }
- // checkUserRestrictions checks login restrictions specified by environment variables on the
- // Porter instance.
- func checkUserRestrictions(
- serverConf *env.ServerConf,
- reqEmail string,
- ) error {
- // if the admin user env var is specified, only allow admin user email
- if adminEmail := serverConf.AdminEmail; adminEmail != "" && adminEmail != reqEmail {
- return fmt.Errorf("email not allowed")
- }
- return nil
- }
|