/* * Copyright 2020 The Dragonfly Authors * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package middlewares import ( "context" "net/http" "time" jwt "github.com/appleboy/gin-jwt/v2" "github.com/gin-gonic/gin" "d7y.io/dragonfly/v2/manager/config" "d7y.io/dragonfly/v2/manager/models" "d7y.io/dragonfly/v2/manager/service" "d7y.io/dragonfly/v2/manager/types" ) const ( // defaultIdentityKey is default of the identity key. defaultIdentityKey = "id" ) func Jwt(cfg config.JWTConfig, service service.Service) (*jwt.GinJWTMiddleware, error) { authMiddleware, err := jwt.New(&jwt.GinJWTMiddleware{ Realm: cfg.Realm, Key: []byte(cfg.Key), Timeout: cfg.Timeout, MaxRefresh: cfg.MaxRefresh, IdentityKey: defaultIdentityKey, IdentityHandler: func(c *gin.Context) any { claims := jwt.ExtractClaims(c) id, ok := claims[defaultIdentityKey] if !ok { c.JSON(http.StatusUnauthorized, gin.H{ "message": "Unavailable token: require user id", }) c.Abort() return nil } c.Set("id", id) return id }, Authenticator: func(c *gin.Context) (any, error) { // Oauth2 signin if rawUser, ok := c.Get("user"); ok { user, ok := rawUser.(*models.User) if !ok { return "", jwt.ErrFailedAuthentication } return user, nil } // Normal signin var json types.SignInRequest if err := c.ShouldBindJSON(&json); err != nil { return "", jwt.ErrMissingLoginValues } user, err := service.SignIn(context.TODO(), json) if err != nil { return "", jwt.ErrFailedAuthentication } return user, nil }, PayloadFunc: func(data any) jwt.MapClaims { if user, ok := data.(*models.User); ok { return jwt.MapClaims{ defaultIdentityKey: user.ID, } } return jwt.MapClaims{} }, Unauthorized: func(c *gin.Context, code int, message string) { c.JSON(code, gin.H{ "message": http.StatusText(code), }) }, LoginResponse: func(c *gin.Context, code int, token string, expire time.Time) { // Oauth2 signin if _, ok := c.Get("user"); ok { c.Redirect(http.StatusFound, "/") return } // Normal signin c.JSON(code, gin.H{ "token": token, "expire": expire.Format(time.RFC3339), }) }, LogoutResponse: func(c *gin.Context, code int) { c.Status(code) }, RefreshResponse: func(c *gin.Context, code int, token string, expire time.Time) { c.JSON(code, gin.H{ "token": token, "expire": expire.Format(time.RFC3339), }) }, TokenLookup: "cookie: jwt, header: Authorization, query: token", TokenHeadName: "Bearer", TimeFunc: time.Now, SendCookie: true, CookieHTTPOnly: false, }) if err != nil { return nil, err } return authMiddleware, nil }