Skip to content

Commit d4f4f6c

Browse files
committedFeb 5, 2018
Rewrite auth module
Discovered many problems with the abstractions along the way and did small fixes to get to the end of the auth module. - Use more constants for random strings - Create forcing functions to deal with the upgrades to different interfaces
1 parent 386133a commit d4f4f6c

12 files changed

+142
-103
lines changed
 

‎auth/auth.go

+72-85
Original file line numberDiff line numberDiff line change
@@ -2,17 +2,17 @@
22
package auth
33

44
import (
5-
"fmt"
65
"net/http"
76

7+
"golang.org/x/crypto/bcrypt"
8+
89
"github.com/pkg/errors"
910
"github.com/volatiletech/authboss"
10-
"github.com/volatiletech/authboss/internal/response"
11-
"golang.org/x/crypto/bcrypt"
1211
)
1312

1413
const (
15-
tplLogin = "login.html.tpl"
14+
// PageLogin is for identifying the login page for parsing & validation
15+
PageLogin = "login"
1616
)
1717

1818
func init() {
@@ -28,7 +28,7 @@ type Auth struct {
2828
func (a *Auth) Init(ab *authboss.Authboss) (err error) {
2929
a.Authboss = ab
3030

31-
if err := a.Authboss.Config.Core.ViewRenderer.Load(tplLogin); err != nil {
31+
if err = a.Authboss.Config.Core.ViewRenderer.Load(PageLogin); err != nil {
3232
return err
3333
}
3434

@@ -44,106 +44,93 @@ func (a *Auth) Init(ab *authboss.Authboss) (err error) {
4444
return errors.Errorf("auth wants to register a logout route but is given an invalid method: %s", a.Authboss.Config.Modules.LogoutMethod)
4545
}
4646

47-
a.Authboss.Config.Core.Router.Get("/login", http.HandlerFunc(loginGet))
48-
a.Authboss.Config.Core.Router.Post("/login", http.HandlerFunc(loginPost))
49-
logoutRouteMethod("/logout", http.HandlerFunc(logout))
47+
a.Authboss.Config.Core.Router.Get("/login", a.Authboss.Core.ErrorHandler.Wrap(a.LoginGet))
48+
a.Authboss.Config.Core.Router.Post("/login", a.Authboss.Core.ErrorHandler.Wrap(a.LoginPost))
49+
logoutRouteMethod("/logout", a.Authboss.Core.ErrorHandler.Wrap(a.Logout))
5050

5151
return nil
5252
}
5353

54-
func (a *Auth) loginGet(w http.ResponseWriter, r *http.Request) error {
55-
data := authboss.NewHTMLData(
56-
"showRemember", a.IsLoaded("remember"),
57-
"showRecover", a.IsLoaded("recover"),
58-
"showRegister", a.IsLoaded("register"),
59-
"primaryID", a.PrimaryID,
60-
"primaryIDValue", "",
61-
)
62-
return a.templates.Render(ctx, w, r, tplLogin, data)
54+
// LoginGet simply displays the login form
55+
func (a *Auth) LoginGet(w http.ResponseWriter, r *http.Request) error {
56+
return a.Core.Responder.Respond(w, r, http.StatusOK, PageLogin, nil)
6357
}
6458

65-
func (a *Auth) loginPost(w http.ResponseWriter, r *http.Request) error {
66-
switch r.Method {
67-
case methodGET:
68-
case methodPOST:
69-
key := r.FormValue(a.PrimaryID)
70-
password := r.FormValue("password")
71-
72-
errData := authboss.NewHTMLData(
73-
"error", fmt.Sprintf("invalid %s and/or password", a.PrimaryID),
74-
"primaryID", a.PrimaryID,
75-
"primaryIDValue", key,
76-
"showRemember", a.IsLoaded("remember"),
77-
"showRecover", a.IsLoaded("recover"),
78-
"showRegister", a.IsLoaded("register"),
79-
)
80-
81-
if valid, err := validateCredentials(ctx, key, password); err != nil {
82-
errData["error"] = "Internal server error"
83-
fmt.Fprintf(ctx.LogWriter, "auth: validate credentials failed: %v\n", err)
84-
return a.templates.Render(ctx, w, r, tplLogin, errData)
85-
} else if !valid {
86-
if err := a.Events.FireAfter(authboss.EventAuthFail, ctx); err != nil {
87-
fmt.Fprintf(ctx.LogWriter, "EventAuthFail callback error'd out: %v\n", err)
88-
}
89-
return a.templates.Render(ctx, w, r, tplLogin, errData)
90-
}
59+
// LoginPost attempts to validate the credentials passed in
60+
// to log in a user.
61+
func (a *Auth) LoginPost(w http.ResponseWriter, r *http.Request) error {
62+
validatable, err := a.Authboss.Core.BodyReader.Read(PageLogin, r)
63+
if err != nil {
64+
return err
65+
}
9166

92-
interrupted, err := a.Events.FireBefore(authboss.EventAuth, ctx)
93-
if err != nil {
94-
return err
95-
} else if interrupted != authboss.InterruptNone {
96-
var reason string
97-
switch interrupted {
98-
case authboss.InterruptAccountLocked:
99-
reason = "Your account has been locked."
100-
case authboss.InterruptAccountNotConfirmed:
101-
reason = "Your account has not been confirmed."
102-
}
103-
response.Redirect(ctx, w, r, a.AuthLoginFailPath, "", reason, false)
104-
return nil
105-
}
67+
// Skip validation since all the validation happens during the database lookup and
68+
// password check.
69+
creds := authboss.MustHaveUserValues(validatable)
10670

107-
ctx.SessionStorer.Put(authboss.SessionKey, key)
108-
ctx.SessionStorer.Del(authboss.SessionHalfAuthKey)
109-
ctx.Values = map[string]string{authboss.CookieRemember: r.FormValue(authboss.CookieRemember)}
71+
pid := creds.GetPID()
72+
pidUser, err := a.Authboss.Storage.Server.Load(r.Context(), pid)
73+
if err == authboss.ErrUserNotFound {
74+
data := authboss.HTMLData{authboss.DataErr: "Invalid Credentials"}
75+
return a.Authboss.Core.Responder.Respond(w, r, http.StatusOK, PageLogin, data)
76+
} else if err != nil {
77+
return err
78+
}
11079

111-
if err := a.Events.FireAfter(authboss.EventAuth, ctx); err != nil {
112-
return err
113-
}
114-
response.Redirect(ctx, w, r, a.AuthLoginOKPath, "", "", true)
115-
default:
116-
w.WriteHeader(http.StatusMethodNotAllowed)
80+
authUser := authboss.MustBeAuthable(pidUser)
81+
password, err := authUser.GetPassword(r.Context())
82+
if err != nil {
83+
return err
11784
}
11885

119-
return nil
120-
}
86+
err = bcrypt.CompareHashAndPassword([]byte(password), []byte(creds.GetPassword()))
87+
if err != nil {
88+
err = a.Authboss.Events.FireAfter(r.Context(), authboss.EventAuthFail)
89+
if err != nil {
90+
return err
91+
}
12192

122-
func validateCredentials(key, password string) (bool, error) {
123-
if err := ctx.LoadUser(key); err == authboss.ErrUserNotFound {
124-
return false, nil
125-
} else if err != nil {
126-
return false, err
93+
data := authboss.HTMLData{authboss.DataErr: "Invalid Credentials"}
94+
return a.Authboss.Core.Responder.Respond(w, r, http.StatusOK, PageLogin, data)
12795
}
12896

129-
actualPassword, err := ctx.User.StringErr(authboss.StorePassword)
97+
interrupted, err := a.Events.FireBefore(r.Context(), authboss.EventAuth)
13098
if err != nil {
131-
return false, err
99+
return err
100+
} else if interrupted != authboss.InterruptNone {
101+
var reason string
102+
switch interrupted {
103+
case authboss.InterruptAccountLocked:
104+
reason = "Your account is locked"
105+
case authboss.InterruptAccountNotConfirmed:
106+
reason = "Your account is not confirmed"
107+
}
108+
data := authboss.HTMLData{authboss.DataErr: reason}
109+
return a.Authboss.Core.Responder.Respond(w, r, http.StatusOK, PageLogin, data)
132110
}
133111

134-
if err := bcrypt.CompareHashAndPassword([]byte(actualPassword), []byte(password)); err != nil {
135-
return false, nil
112+
authboss.PutSession(w, authboss.SessionKey, pid)
113+
authboss.DelSession(w, authboss.SessionHalfAuthKey)
114+
115+
if err := a.Authboss.Events.FireAfter(r.Context(), authboss.EventAuth); err != nil {
116+
return err
136117
}
137118

138-
return true, nil
119+
ro := authboss.RedirectOptions{
120+
RedirectPath: a.Authboss.Paths.AuthLogoutOK,
121+
}
122+
return a.Authboss.Core.Redirector.Redirect(w, r, ro)
139123
}
140124

141-
func (a *Auth) logout(w http.ResponseWriter, r *http.Request) error {
142-
ctx.SessionStorer.Del(authboss.SessionKey)
143-
ctx.CookieStorer.Del(authboss.CookieRemember)
144-
ctx.SessionStorer.Del(authboss.SessionLastAction)
145-
146-
response.Redirect(ctx, w, r, a.AuthLogoutOKPath, "You have logged out", "", true)
125+
// Logout a user
126+
func (a *Auth) Logout(w http.ResponseWriter, r *http.Request) error {
127+
authboss.DelSession(w, authboss.SessionKey)
128+
authboss.DelSession(w, authboss.SessionLastAction)
129+
authboss.DelCookie(w, authboss.CookieRemember)
147130

148-
return nil
131+
ro := authboss.RedirectOptions{
132+
RedirectPath: a.Authboss.Paths.AuthLogoutOK,
133+
Success: "You have been logged out",
134+
}
135+
return a.Authboss.Core.Redirector.Redirect(w, r, ro)
149136
}

‎config.go

+3-5
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,6 @@ type Config struct {
1212

1313
// AuthLoginOK is the redirect path after a successful authentication.
1414
AuthLoginOK string
15-
// AuthLoginFail is the redirect path after a failed authentication.
16-
AuthLoginFail string
1715
// AuthLogoutOK is the redirect path after a log out.
1816
AuthLogoutOK string
1917

@@ -97,9 +95,9 @@ type Config struct {
9795
// only for redirection.
9896
Redirector HTTPRedirector
9997

100-
// Validator helps validate an http request, it's given a name that describes
101-
// the form it's validating so that conditional logic may be applied.
102-
Validator Validator
98+
// BodyReader reads validatable data from the body of a request to be able
99+
// to get data from the user's client.
100+
BodyReader BodyReader
103101

104102
// ViewRenderer loads the templates for the application.
105103
ViewRenderer Renderer

‎defaults/defaults.go

+22
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
package defaults
2+
3+
import (
4+
"os"
5+
6+
"github.com/volatiletech/authboss"
7+
)
8+
9+
// SetDefaultCore creates instances of all the default pieces
10+
//
11+
// Assumes you have a ViewRenderer already set.
12+
func SetDefaultCore(config *authboss.Config, useUsername bool) {
13+
logger := NewLogger(os.Stdout)
14+
15+
config.Core.Router = NewRouter()
16+
config.Core.ErrorHandler = ErrorHandler{LogWriter: logger}
17+
config.Core.Responder = &Responder{Renderer: config.Core.ViewRenderer}
18+
config.Core.Redirector = &Redirector{Renderer: config.Core.ViewRenderer, FormValueName: "redir"}
19+
config.Core.BodyReader = NewHTTPFormReader(useUsername)
20+
config.Core.Mailer = NewLogMailer(os.Stdout)
21+
config.Core.Logger = logger
22+
}

‎defaults/error_handler.go

+5-4
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,9 @@ package defaults
22

33
import (
44
"fmt"
5-
"io"
65
"net/http"
6+
7+
"github.com/volatiletech/authboss"
78
)
89

910
// ErrorHandler wraps http handlers with errors with itself
@@ -12,7 +13,7 @@ import (
1213
// The pieces provided to this struct must be thread-safe
1314
// since they will be handed to many pointers to themselves.
1415
type ErrorHandler struct {
15-
LogWriter io.Writer
16+
LogWriter authboss.Logger
1617
}
1718

1819
// Wrap an http handler with an error
@@ -25,7 +26,7 @@ func (e ErrorHandler) Wrap(handler func(w http.ResponseWriter, r *http.Request)
2526

2627
type errorHandler struct {
2728
Handler func(w http.ResponseWriter, r *http.Request) error
28-
LogWriter io.Writer
29+
LogWriter authboss.Logger
2930
}
3031

3132
// ServeHTTP handles errors
@@ -35,5 +36,5 @@ func (e errorHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
3536
return
3637
}
3738

38-
fmt.Fprintf(e.LogWriter, "error at %s: %+v", r.URL.String(), err)
39+
e.LogWriter.Error(fmt.Sprintf("error at %s: %+v", r.URL.String(), err))
3940
}

‎defaults/error_handler_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ func TestErrorHandler(t *testing.T) {
1515

1616
b := &bytes.Buffer{}
1717

18-
eh := ErrorHandler{LogWriter: b}
18+
eh := ErrorHandler{LogWriter: NewLogger(b)}
1919

2020
handler := eh.Wrap(func(w http.ResponseWriter, r *http.Request) error {
2121
return errors.New("error occurred")

‎defaults/router.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -56,8 +56,8 @@ func (r *Router) ServeHTTP(w http.ResponseWriter, req *http.Request) {
5656
case "DELETE":
5757
router = r.deletes
5858
default:
59-
w.WriteHeader(http.StatusBadRequest)
60-
io.WriteString(w, "bad request, this method not allowed")
59+
w.WriteHeader(http.StatusMethodNotAllowed)
60+
io.WriteString(w, "method not allowed")
6161
return
6262
}
6363

‎defaults/router_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ func TestRouterBadMethod(t *testing.T) {
7777

7878
r.ServeHTTP(wr, req)
7979

80-
if wr.Code != http.StatusBadRequest {
81-
t.Error("want bad request code, got:", wr.Code)
80+
if wr.Code != http.StatusMethodNotAllowed {
81+
t.Error("want method not allowed code, got:", wr.Code)
8282
}
8383
}

‎defaults/values.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ func (h HTTPFormReader) Read(page string, r *http.Request) (authboss.Validator,
101101
validator := HTTPFormValidator{
102102
Values: values,
103103
Ruleset: rules,
104-
ConfirmFields: []string{FormValuePassword, "confirm_" + FormValuePassword},
104+
ConfirmFields: []string{FormValuePassword, authboss.ConfirmPrefix + FormValuePassword},
105105
}
106106
password := values[FormValuePassword]
107107

‎html_data.go

+9
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,14 @@
11
package authboss
22

3+
// Keys for use in HTMLData that are meaningful
4+
const (
5+
// DataErr is for one off errors that don't really belong to
6+
// a particular field
7+
DataErr = "error"
8+
// DataValidation is for validation errors
9+
DataValidation = "errors"
10+
)
11+
312
// HTMLData is used to render templates with.
413
type HTMLData map[string]interface{}
514

‎renderer.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ import "context"
55
// Renderer is a type that can render a given template with some data.
66
type Renderer interface {
77
// Load the given templates, will most likely be called multiple times
8-
Load(name ...string) error
8+
Load(names ...string) error
99

1010
// Render the given template
11-
Render(ctx context.Context, name string, data HTMLData) (output []byte, contentType string, err error)
11+
Render(ctx context.Context, page string, data HTMLData) (output []byte, contentType string, err error)
1212
}

‎storage.go

+9
Original file line numberDiff line numberDiff line change
@@ -106,3 +106,12 @@ type OAuth2User interface {
106106
PutRefreshToken(ctx context.Context, refreshToken string) error
107107
PutExpiry(ctx context.Context, expiry time.Duration) error
108108
}
109+
110+
// MustBeAuthable forces an upgrade conversion to Authable
111+
// or will panic.
112+
func MustBeAuthable(u User) AuthableUser {
113+
if au, ok := u.(AuthableUser); ok {
114+
return au
115+
}
116+
panic("could not upgrade user to an authable user, check your user struct")
117+
}

‎values.go

+14-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,9 @@
11
package authboss
22

3-
import "net/http"
3+
import (
4+
"fmt"
5+
"net/http"
6+
)
47

58
// BodyReader reads data from the request
69
// and returns it in an abstract form.
@@ -27,3 +30,13 @@ type UserValuer interface {
2730
GetPID() string
2831
GetPassword() string
2932
}
33+
34+
// MustHaveUserValues upgrades a validatable set of values
35+
// to ones specific to the user.
36+
func MustHaveUserValues(v Validator) UserValuer {
37+
if u, ok := v.(UserValuer); ok {
38+
return u
39+
}
40+
41+
panic(fmt.Sprintf("bodyreader returned a type that could not be upgraded to UserValuer: %T", v))
42+
}

0 commit comments

Comments
 (0)
Please sign in to comment.