Fixed rate limit panic when authenticatin with a link share auth token (#97)

This commit is contained in:
konrad 2019-09-08 19:11:42 +00:00 committed by Gitea
parent fdd1624121
commit 6140920cb8
3 changed files with 22 additions and 18 deletions

View file

@ -19,7 +19,10 @@ package v1
import ( import (
"code.vikunja.io/api/pkg/config" "code.vikunja.io/api/pkg/config"
"code.vikunja.io/api/pkg/models" "code.vikunja.io/api/pkg/models"
"code.vikunja.io/web"
"github.com/dgrijalva/jwt-go" "github.com/dgrijalva/jwt-go"
"github.com/labstack/echo/v4"
"net/http"
"time" "time"
) )
@ -65,3 +68,17 @@ func NewLinkShareJWTAuthtoken(share *models.LinkSharing) (token string, err erro
// Generate encoded token and send it as response. // Generate encoded token and send it as response.
return t.SignedString([]byte(config.ServiceJWTSecret.GetString())) return t.SignedString([]byte(config.ServiceJWTSecret.GetString()))
} }
// GetAuthFromClaims returns a web.Auth object from jwt claims
func GetAuthFromClaims(c echo.Context) (a web.Auth, err error) {
jwtinf := c.Get("user").(*jwt.Token)
claims := jwtinf.Claims.(jwt.MapClaims)
typ := int(claims["type"].(float64))
if typ == AuthTypeLinkShare && config.ServiceEnableLinkSharing.GetBool() {
return models.GetLinkShareFromClaims(claims)
}
if typ == AuthTypeUser {
return models.GetUserFromClaims(claims)
}
return nil, echo.NewHTTPError(http.StatusBadRequest, models.Message{Message: "Invalid JWT token."})
}

View file

@ -20,8 +20,8 @@ package routes
import ( import (
"code.vikunja.io/api/pkg/config" "code.vikunja.io/api/pkg/config"
"code.vikunja.io/api/pkg/log" "code.vikunja.io/api/pkg/log"
"code.vikunja.io/api/pkg/models"
"code.vikunja.io/api/pkg/red" "code.vikunja.io/api/pkg/red"
apiv1 "code.vikunja.io/api/pkg/routes/api/v1"
"github.com/labstack/echo/v4" "github.com/labstack/echo/v4"
"github.com/ulule/limiter/v3" "github.com/ulule/limiter/v3"
"github.com/ulule/limiter/v3/drivers/store/memory" "github.com/ulule/limiter/v3/drivers/store/memory"
@ -40,11 +40,11 @@ func RateLimit(rateLimiter *limiter.Limiter) echo.MiddlewareFunc {
case "ip": case "ip":
rateLimitKey = c.RealIP() rateLimitKey = c.RealIP()
case "user": case "user":
user, err := models.GetCurrentUser(c) auth, err := apiv1.GetAuthFromClaims(c)
if err != nil { if err != nil {
log.Errorf("Error while getting the current user for rate limiting: %s", err) log.Errorf("Error getting auth from jwt claims: %v", err)
} }
rateLimitKey = "user_" + strconv.FormatInt(user.ID, 10) rateLimitKey = "user_" + strconv.FormatInt(auth.GetID(), 10)
default: default:
log.Errorf("Unknown rate limit kind configured: %s", config.RateLimitKind.GetString()) log.Errorf("Unknown rate limit kind configured: %s", config.RateLimitKind.GetString())
} }

View file

@ -48,11 +48,9 @@ import (
"code.vikunja.io/web" "code.vikunja.io/web"
"code.vikunja.io/web/handler" "code.vikunja.io/web/handler"
"github.com/asaskevich/govalidator" "github.com/asaskevich/govalidator"
"github.com/dgrijalva/jwt-go"
"github.com/labstack/echo/v4" "github.com/labstack/echo/v4"
"github.com/labstack/echo/v4/middleware" "github.com/labstack/echo/v4/middleware"
elog "github.com/labstack/gommon/log" elog "github.com/labstack/gommon/log"
"net/http"
"strings" "strings"
) )
@ -109,18 +107,7 @@ func NewEcho() *echo.Echo {
// Handler config // Handler config
handler.SetAuthProvider(&web.Auths{ handler.SetAuthProvider(&web.Auths{
AuthObject: func(c echo.Context) (web.Auth, error) { AuthObject: apiv1.GetAuthFromClaims,
jwtinf := c.Get("user").(*jwt.Token)
claims := jwtinf.Claims.(jwt.MapClaims)
typ := int(claims["type"].(float64))
if typ == apiv1.AuthTypeLinkShare && config.ServiceEnableLinkSharing.GetBool() {
return models.GetLinkShareFromClaims(claims)
}
if typ == apiv1.AuthTypeUser {
return models.GetUserFromClaims(claims)
}
return nil, echo.NewHTTPError(http.StatusBadRequest, models.Message{Message: "Invalid JWT token."})
},
}) })
handler.SetLoggingProvider(log.GetLogger()) handler.SetLoggingProvider(log.GetLogger())