mirror of
https://github.com/coder/coder.git
synced 2025-07-06 15:41:45 +00:00
123 lines
3.9 KiB
Go
123 lines
3.9 KiB
Go
package httpmw
|
|
|
|
import (
|
|
"context"
|
|
"net/http"
|
|
|
|
"golang.org/x/xerrors"
|
|
|
|
"cdr.dev/slog"
|
|
"github.com/coder/coder/coderd/database"
|
|
"github.com/coder/coder/coderd/httpapi"
|
|
"github.com/coder/coder/coderd/rbac"
|
|
)
|
|
|
|
// Authorize will enforce if the user roles can complete the action on the AuthObject.
|
|
// The organization and owner are found using the ExtractOrganization and
|
|
// ExtractUser middleware if present.
|
|
func Authorize(logger slog.Logger, auth *rbac.RegoAuthorizer, action rbac.Action) func(http.Handler) http.Handler {
|
|
return func(next http.Handler) http.Handler {
|
|
return http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
|
roles := UserRoles(r)
|
|
object := rbacObject(r)
|
|
|
|
if object.Type == "" {
|
|
panic("developer error: auth object has no type")
|
|
}
|
|
|
|
// First extract the object's owner and organization if present.
|
|
unknownOrg := r.Context().Value(organizationParamContextKey{})
|
|
if organization, castOK := unknownOrg.(database.Organization); unknownOrg != nil {
|
|
if !castOK {
|
|
panic("developer error: organization param middleware not provided for authorize")
|
|
}
|
|
object = object.InOrg(organization.ID)
|
|
}
|
|
|
|
unknownOwner := r.Context().Value(userParamContextKey{})
|
|
if owner, castOK := unknownOwner.(database.User); unknownOwner != nil {
|
|
if !castOK {
|
|
panic("developer error: user param middleware not provided for authorize")
|
|
}
|
|
object = object.WithOwner(owner.ID.String())
|
|
}
|
|
|
|
err := auth.AuthorizeByRoleName(r.Context(), roles.ID.String(), roles.Roles, action, object)
|
|
if err != nil {
|
|
internalError := new(rbac.UnauthorizedError)
|
|
if xerrors.As(err, internalError) {
|
|
logger = logger.With(slog.F("internal", internalError.Internal()))
|
|
}
|
|
// Log information for debugging. This will be very helpful
|
|
// in the early days if we over secure endpoints.
|
|
logger.Warn(r.Context(), "unauthorized",
|
|
slog.F("roles", roles.Roles),
|
|
slog.F("user_id", roles.ID),
|
|
slog.F("username", roles.Username),
|
|
slog.F("route", r.URL.Path),
|
|
slog.F("action", action),
|
|
slog.F("object", object),
|
|
)
|
|
httpapi.Write(rw, http.StatusUnauthorized, httpapi.Response{
|
|
Message: err.Error(),
|
|
})
|
|
return
|
|
}
|
|
next.ServeHTTP(rw, r)
|
|
})
|
|
}
|
|
}
|
|
|
|
type authObjectKey struct{}
|
|
|
|
// APIKey returns the API key from the ExtractAPIKey handler.
|
|
func rbacObject(r *http.Request) rbac.Object {
|
|
obj, ok := r.Context().Value(authObjectKey{}).(rbac.Object)
|
|
if !ok {
|
|
panic("developer error: auth object middleware not provided")
|
|
}
|
|
return obj
|
|
}
|
|
|
|
// WithRBACObject sets the object for 'Authorize()' for all routes handled
|
|
// by this middleware. The important field to set is 'Type'
|
|
func WithRBACObject(object rbac.Object) func(http.Handler) http.Handler {
|
|
return func(next http.Handler) http.Handler {
|
|
return http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
|
ctx := context.WithValue(r.Context(), authObjectKey{}, object)
|
|
next.ServeHTTP(rw, r.WithContext(ctx))
|
|
})
|
|
}
|
|
}
|
|
|
|
// User roles are the 'subject' field of Authorize()
|
|
type userRolesKey struct{}
|
|
|
|
// UserRoles returns the API key from the ExtractUserRoles handler.
|
|
func UserRoles(r *http.Request) database.GetAllUserRolesRow {
|
|
apiKey, ok := r.Context().Value(userRolesKey{}).(database.GetAllUserRolesRow)
|
|
if !ok {
|
|
panic("developer error: user roles middleware not provided")
|
|
}
|
|
return apiKey
|
|
}
|
|
|
|
// ExtractUserRoles requires authentication using a valid API key.
|
|
func ExtractUserRoles(db database.Store) func(http.Handler) http.Handler {
|
|
return func(next http.Handler) http.Handler {
|
|
return http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
|
apiKey := APIKey(r)
|
|
role, err := db.GetAllUserRoles(r.Context(), apiKey.UserID)
|
|
if err != nil {
|
|
httpapi.Write(rw, http.StatusUnauthorized, httpapi.Response{
|
|
Message: "roles not found",
|
|
})
|
|
return
|
|
}
|
|
|
|
ctx := context.WithValue(r.Context(), userRolesKey{}, role)
|
|
next.ServeHTTP(rw, r.WithContext(ctx))
|
|
})
|
|
}
|
|
}
|