-
Notifications
You must be signed in to change notification settings - Fork 221
Expand file tree
/
Copy pathvalues.go
More file actions
339 lines (284 loc) · 8.71 KB
/
values.go
File metadata and controls
339 lines (284 loc) · 8.71 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
package defaults
import (
"encoding/json"
"io"
"net/http"
"net/url"
"regexp"
"github.com/friendsofgo/errors"
"github.com/aarondl/authboss/v3"
)
// FormValue types
const (
FormValueEmail = "email"
FormValuePassword = "password"
FormValueUsername = "username"
FormValueConfirm = "cnf"
FormValueToken = "token"
FormValueCode = "code"
FormValueRecoveryCode = "recovery_code"
FormValuePhoneNumber = "phone_number"
)
// UserValues from the login form
type UserValues struct {
HTTPFormValidator
PID string
Password string
Arbitrary map[string]string
}
// GetPID from the values
func (u UserValues) GetPID() string {
return u.PID
}
// GetPassword from the values
func (u UserValues) GetPassword() string {
return u.Password
}
// GetValues from the form.
func (u UserValues) GetValues() map[string]string {
return u.Arbitrary
}
// GetShouldRemember checks the form values for
func (u UserValues) GetShouldRemember() bool {
rm, ok := u.Values[authboss.CookieRemember]
return ok && rm == "true"
}
// ConfirmValues retrieves values on the confirm page.
type ConfirmValues struct {
HTTPFormValidator
Token string
}
// GetToken from the confirm values
func (c ConfirmValues) GetToken() string {
return c.Token
}
// RecoverStartValues for recover_start page
type RecoverStartValues struct {
HTTPFormValidator
PID string
}
// GetPID for recovery
func (r RecoverStartValues) GetPID() string { return r.PID }
// RecoverMiddleValues for recover_middle page
type RecoverMiddleValues struct {
HTTPFormValidator
Token string
}
// GetToken for recovery
func (r RecoverMiddleValues) GetToken() string { return r.Token }
// RecoverEndValues for recover_end page
type RecoverEndValues struct {
HTTPFormValidator
Token string
NewPassword string
}
// GetToken for recovery
func (r RecoverEndValues) GetToken() string { return r.Token }
// GetPassword for recovery
func (r RecoverEndValues) GetPassword() string { return r.NewPassword }
// TwoFA for totp2fa_validate page
type TwoFA struct {
HTTPFormValidator
Code string
RecoveryCode string
}
// GetCode from authenticator
func (t TwoFA) GetCode() string { return t.Code }
// GetRecoveryCode for authenticator
func (t TwoFA) GetRecoveryCode() string { return t.RecoveryCode }
// SMSTwoFA for sms2fa_validate page
type SMSTwoFA struct {
HTTPFormValidator
Code string
RecoveryCode string
PhoneNumber string
}
// GetCode from sms
func (s SMSTwoFA) GetCode() string { return s.Code }
// GetRecoveryCode from sms
func (s SMSTwoFA) GetRecoveryCode() string { return s.RecoveryCode }
// GetPhoneNumber from authenticator
func (s SMSTwoFA) GetPhoneNumber() string { return s.PhoneNumber }
// HTTPBodyReader reads forms from various pages and decodes
// them.
type HTTPBodyReader struct {
// ReadJSON if turned on reads json from the http request
// instead of a encoded form.
ReadJSON bool
// UseUsername instead of e-mail address
UseUsername bool
// Rulesets for each page.
Rulesets map[string][]Rules
// Confirm fields for each page.
Confirms map[string][]string
// Whitelist values for each page through the html forms
// this is for security so that we can properly protect the
// arbitrary user API. In reality this really only needs to be set
// for the register page since everything else is expecting
// a hardcoded set of values.
Whitelist map[string][]string
}
// NewHTTPBodyReader creates a form reader with default validation rules
// and fields for each page. If no defaults are required, simply construct
// this using the struct members itself for more control.
func NewHTTPBodyReader(readJSON, useUsernameNotEmail bool) *HTTPBodyReader {
var pid string
var pidRules Rules
if useUsernameNotEmail {
pid = "username"
pidRules = Rules{
FieldName: pid, Required: true,
MatchError: "Usernames must only start with letters, and contain letters and numbers",
MustMatch: regexp.MustCompile(`(?i)[a-z][a-z0-9]?`),
}
} else {
pid = "email"
pidRules = Rules{
FieldName: pid, Required: true,
MatchError: "Must be a valid e-mail address",
MustMatch: regexp.MustCompile(`.*@.*\.[a-z]+`),
}
}
passwordRule := Rules{
FieldName: "password",
MinLength: 8,
MinNumeric: 1,
MinSymbols: 1,
MinUpper: 1,
MinLower: 1,
}
return &HTTPBodyReader{
UseUsername: useUsernameNotEmail,
ReadJSON: readJSON,
Rulesets: map[string][]Rules{
"login": {pidRules},
"register": {pidRules, passwordRule},
"confirm": {Rules{FieldName: FormValueConfirm, Required: true}},
"recover_start": {pidRules},
"recover_end": {passwordRule},
"twofactor_verify_end": {Rules{FieldName: FormValueToken, Required: true}},
},
Confirms: map[string][]string{
"register": {FormValuePassword, authboss.ConfirmPrefix + FormValuePassword},
"recover_end": {FormValuePassword, authboss.ConfirmPrefix + FormValuePassword},
},
Whitelist: map[string][]string{
"register": {FormValueEmail, FormValuePassword},
},
}
}
// Read the form pages
func (h HTTPBodyReader) Read(page string, r *http.Request) (authboss.Validator, error) {
var values map[string]string
// first parse form data regardless of content type. ParseForm() is safe to call even if there's no form data
if err := r.ParseForm(); err != nil {
return nil, errors.Wrapf(err, "failed to parse form on page: %s", page)
}
values = URLValuesToMap(r.Form)
// then if JSON mode is enabled, also try to read JSON body. any JSON values will override corresponding form values
if h.ReadJSON {
b, err := io.ReadAll(r.Body)
r.Body.Close()
if err != nil {
return nil, errors.Wrap(err, "failed to read http body")
}
_ = json.Unmarshal(b, &values)
}
rules := h.Rulesets[page]
confirms := h.Confirms[page]
whitelist := h.Whitelist[page]
switch page {
case "confirm":
return ConfirmValues{
HTTPFormValidator: HTTPFormValidator{Values: values, Ruleset: rules},
Token: values[FormValueConfirm],
}, nil
case "login":
var pid string
if h.UseUsername {
pid = values[FormValueUsername]
} else {
pid = values[FormValueEmail]
}
return UserValues{
HTTPFormValidator: HTTPFormValidator{Values: values, Ruleset: rules, ConfirmFields: confirms},
PID: pid,
Password: values[FormValuePassword],
}, nil
case "recover_start":
var pid string
if h.UseUsername {
pid = values[FormValueUsername]
} else {
pid = values[FormValueEmail]
}
return RecoverStartValues{
HTTPFormValidator: HTTPFormValidator{Values: values, Ruleset: rules, ConfirmFields: confirms},
PID: pid,
}, nil
case "recover_middle":
return RecoverMiddleValues{
HTTPFormValidator: HTTPFormValidator{Values: values, Ruleset: rules, ConfirmFields: confirms},
Token: values[FormValueToken],
}, nil
case "recover_end":
return RecoverEndValues{
HTTPFormValidator: HTTPFormValidator{Values: values, Ruleset: rules, ConfirmFields: confirms},
Token: values[FormValueToken],
NewPassword: values[FormValuePassword],
}, nil
case "twofactor_verify_end":
// Reuse ConfirmValues here, it's the same values we need
return ConfirmValues{
HTTPFormValidator: HTTPFormValidator{Values: values, Ruleset: rules, ConfirmFields: confirms},
Token: values[FormValueToken],
}, nil
case "totp2fa_confirm", "totp2fa_remove", "totp2fa_validate":
return TwoFA{
HTTPFormValidator: HTTPFormValidator{Values: values, Ruleset: rules, ConfirmFields: confirms},
Code: values[FormValueCode],
RecoveryCode: values[FormValueRecoveryCode],
}, nil
case "sms2fa_setup", "sms2fa_remove", "sms2fa_confirm", "sms2fa_validate":
return SMSTwoFA{
HTTPFormValidator: HTTPFormValidator{Values: values, Ruleset: rules, ConfirmFields: confirms},
Code: values[FormValueCode],
PhoneNumber: values[FormValuePhoneNumber],
RecoveryCode: values[FormValueRecoveryCode],
}, nil
case "register":
arbitrary := make(map[string]string)
for k, v := range values {
for _, w := range whitelist {
if k == w {
arbitrary[k] = v
break
}
}
}
var pid string
if h.UseUsername {
pid = values[FormValueUsername]
} else {
pid = values[FormValueEmail]
}
return UserValues{
HTTPFormValidator: HTTPFormValidator{Values: values, Ruleset: rules, ConfirmFields: confirms},
PID: pid,
Password: values[FormValuePassword],
Arbitrary: arbitrary,
}, nil
default:
return nil, errors.Errorf("failed to parse unknown page's form: %s", page)
}
}
// URLValuesToMap helps create a map from url.Values
func URLValuesToMap(form url.Values) map[string]string {
values := make(map[string]string)
for k, v := range form {
if len(v) != 0 {
values[k] = v[0]
}
}
return values
}