mirror of
https://github.com/YunoHost/SSOwat.git
synced 2024-09-03 20:06:27 +02:00
security: rework previous fixes to use the new use_remote_user_var_in_nginx_conf in ssowat conf introduced in yunohost 11.1.2
This commit is contained in:
parent
b6aba201cd
commit
8bd2a53ee7
2 changed files with 52 additions and 36 deletions
21
access.lua
21
access.lua
|
@ -315,9 +315,28 @@ for permission_name, permission_infos in pairs(conf["permissions"]) do
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
||||||
|
---
|
||||||
|
--- 5. CHECK CLIENT-PROVIDED AUTH HEADER (should almost never happen?)
|
||||||
|
---
|
||||||
|
|
||||||
|
if permission ~= nil then
|
||||||
|
perm_user_remote_user_var_in_nginx_conf = permission["use_remote_user_var_in_nginx_conf"]
|
||||||
|
if perm_user_remote_user_var_in_nginx_conf == nil or perm_user_remote_user_var_in_nginx_conf == true then
|
||||||
|
is_logged_in_with_basic_auth = hlp.validate_or_clear_basic_auth_header_provided_by_client()
|
||||||
|
|
||||||
|
-- NB: is_logged_in_with_basic_auth can be false, true or nil
|
||||||
|
if is_logged_in_with_basic_auth == false then
|
||||||
|
return ngx.exit(ngx.HTTP_UNAUTHORIZED)
|
||||||
|
elseif is_logged_in_with_basic_auth == true then
|
||||||
|
is_logged_in = true
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
--
|
--
|
||||||
--
|
--
|
||||||
-- 5. APPLY PERMISSION
|
-- 6. APPLY PERMISSION
|
||||||
--
|
--
|
||||||
--
|
--
|
||||||
|
|
||||||
|
|
43
helpers.lua
43
helpers.lua
|
@ -256,36 +256,40 @@ function refresh_logged_in()
|
||||||
return false
|
return false
|
||||||
end
|
end
|
||||||
|
|
||||||
-- If client set the Authorization/Proxy-Authorization header before reaching the SSO,
|
return is_logged_in
|
||||||
-- we want to match user and password against the user database.
|
end
|
||||||
--
|
|
||||||
-- It allows to bypass the cookie-based procedure with a per-request
|
|
||||||
-- authentication. This is useful to authenticate on the SSO during
|
|
||||||
-- curl requests for example.
|
|
||||||
|
|
||||||
local auth_header = ngx.req.get_headers()["Authorization"] or ngx.req.get_headers()["Proxy-Authorization"]
|
function validate_or_clear_basic_auth_header_provided_by_client()
|
||||||
|
|
||||||
-- Ignore this for PROPFIND routes used by Nextcloud (et al.?) which also rely on basic auth with totally yunohost-unrelated credentials ...
|
-- Ignore if no Auth header
|
||||||
if auth_header and ngx.var.request_method ~= "PROPFIND" then
|
local auth_header = ngx.req.get_headers()["Authorization"]
|
||||||
logger.debug(auth_header)
|
if auth_header == nil then
|
||||||
|
return nil
|
||||||
|
end
|
||||||
|
|
||||||
|
-- Ignore if not a Basic auth header
|
||||||
_, _, b64_cred = string.find(auth_header, "^Basic%s+(.+)$")
|
_, _, b64_cred = string.find(auth_header, "^Basic%s+(.+)$")
|
||||||
if b64_cred == nil then
|
if b64_cred == nil then
|
||||||
return is_logged_in
|
return nil
|
||||||
end
|
end
|
||||||
|
|
||||||
|
-- Try to authenticate the user,
|
||||||
|
-- or remove the Auth header if not valid
|
||||||
_, _, user, password = string.find(ngx.decode_base64(b64_cred), "^(.+):(.+)$")
|
_, _, user, password = string.find(ngx.decode_base64(b64_cred), "^(.+):(.+)$")
|
||||||
user = authenticate(user, password)
|
user = authenticate(user, password)
|
||||||
if user then
|
if user then
|
||||||
logger.debug("User got authenticated through basic auth")
|
logger.debug("User got authenticated through basic auth")
|
||||||
authUser = user
|
authUser = user
|
||||||
is_logged_in = true
|
return true
|
||||||
else
|
else
|
||||||
return ngx.exit(ngx.HTTP_UNAUTHORIZED)
|
ngx.req.clear_header("Authorization")
|
||||||
end
|
return false -- ngx.exit(ngx.HTTP_UNAUTHORIZED)
|
||||||
end
|
end
|
||||||
|
|
||||||
return is_logged_in
|
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
-- Check whether a user is allowed to access a URL using the `permissions` directive
|
-- Check whether a user is allowed to access a URL using the `permissions` directive
|
||||||
-- of the configuration file
|
-- of the configuration file
|
||||||
function has_access(permission, user)
|
function has_access(permission, user)
|
||||||
|
@ -419,14 +423,7 @@ end
|
||||||
-- - app requests that no authentication headers be sent
|
-- - app requests that no authentication headers be sent
|
||||||
-- Prevents user from pretending to be someone else on public apps
|
-- Prevents user from pretending to be someone else on public apps
|
||||||
function clear_headers()
|
function clear_headers()
|
||||||
-- Clear auth header only if it's a 'Basic' auth stuff, not 'Bearer' stuff
|
-- NB: Basic Auth header is cleared in validate_or_clear_basic_auth_header_provided_by_client
|
||||||
-- Also ignore PROPFIND routes used by Nextcloud (et al.?)
|
|
||||||
if ngx.var.request_method ~= "PROPFIND" and ngx.req.get_headers()["Authorization"] then
|
|
||||||
_, _, b64_cred = string.find(ngx.req.get_headers()["Authorization"], "^Basic%s+(.+)$")
|
|
||||||
if b64_cred ~= nil then
|
|
||||||
ngx.req.clear_header("Authorization")
|
|
||||||
end
|
|
||||||
end
|
|
||||||
for k, v in pairs(conf["additional_headers"]) do
|
for k, v in pairs(conf["additional_headers"]) do
|
||||||
ngx.req.clear_header(k)
|
ngx.req.clear_header(k)
|
||||||
end
|
end
|
||||||
|
|
Loading…
Reference in a new issue