session.go 3.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148
  1. package api
  2. import (
  3. "net/http"
  4. "github.com/gin-gonic/gin"
  5. "github.com/photoprism/photoprism/internal/acl"
  6. "github.com/photoprism/photoprism/internal/entity"
  7. "github.com/photoprism/photoprism/internal/form"
  8. "github.com/photoprism/photoprism/internal/i18n"
  9. "github.com/photoprism/photoprism/internal/service"
  10. "github.com/photoprism/photoprism/internal/session"
  11. )
  12. // POST /api/v1/session
  13. func CreateSession(router *gin.RouterGroup) {
  14. router.POST("/session", func(c *gin.Context) {
  15. var f form.Login
  16. if err := c.BindJSON(&f); err != nil {
  17. AbortBadRequest(c)
  18. return
  19. }
  20. var data session.Data
  21. id := SessionID(c)
  22. if s := Session(id); s.Valid() {
  23. data = s
  24. } else {
  25. data = session.Data{}
  26. id = ""
  27. }
  28. conf := service.Config()
  29. if f.HasToken() {
  30. links := entity.FindValidLinks(f.Token, "")
  31. if len(links) == 0 {
  32. c.AbortWithStatusJSON(400, gin.H{"error": i18n.Msg(i18n.ErrInvalidLink)})
  33. }
  34. data.Tokens = []string{f.Token}
  35. for _, link := range links {
  36. data.Shares = append(data.Shares, link.ShareUID)
  37. link.Redeem()
  38. }
  39. // Upgrade from anonymous to guest. Don't downgrade.
  40. if data.User.Anonymous() {
  41. data.User = entity.Guest
  42. }
  43. } else if f.HasCredentials() {
  44. user := entity.FindUserByName(f.UserName)
  45. if user == nil {
  46. c.AbortWithStatusJSON(400, gin.H{"error": i18n.Msg(i18n.ErrInvalidCredentials)})
  47. return
  48. }
  49. if user.InvalidPassword(f.Password) {
  50. c.AbortWithStatusJSON(400, gin.H{"error": i18n.Msg(i18n.ErrInvalidCredentials)})
  51. return
  52. }
  53. oidcEnabled := conf.OidcIssuerUrl() != nil && conf.OidcClientId() != "" && conf.OidcClientSecret() != ""
  54. if user.ID != entity.Admin.ID && oidcEnabled && !user.External() {
  55. log.Warn("Internal users are disabled when using OpenID Connect")
  56. c.AbortWithStatusJSON(400, gin.H{"error": i18n.Msg(i18n.ErrInvalidCredentials)})
  57. return
  58. }
  59. data.User = *user
  60. } else {
  61. c.AbortWithStatusJSON(400, gin.H{"error": i18n.Msg(i18n.ErrInvalidPassword)})
  62. return
  63. }
  64. if err := service.Session().Update(id, data); err != nil {
  65. id = service.Session().Create(data)
  66. }
  67. AddSessionHeader(c, id)
  68. if data.User.Anonymous() {
  69. c.JSON(http.StatusOK, gin.H{"status": "ok", "id": id, "data": data, "config": conf.GuestConfig()})
  70. } else {
  71. c.JSON(http.StatusOK, gin.H{"status": "ok", "id": id, "data": data, "config": conf.UserConfig()})
  72. }
  73. })
  74. }
  75. // DELETE /api/v1/session/:id
  76. func DeleteSession(router *gin.RouterGroup) {
  77. router.DELETE("/session/:id", func(c *gin.Context) {
  78. id := c.Param("id")
  79. service.Session().Delete(id)
  80. c.JSON(http.StatusOK, gin.H{"status": "ok", "id": id})
  81. })
  82. }
  83. // Gets session id from HTTP header.
  84. func SessionID(c *gin.Context) string {
  85. return c.GetHeader("X-Session-ID")
  86. }
  87. // Session returns the current session data.
  88. func Session(id string) session.Data {
  89. // Return fake admin session if site is public.
  90. if service.Config().Public() {
  91. return session.Data{User: entity.Admin}
  92. }
  93. // Check if session id is valid.
  94. return service.Session().Get(id)
  95. }
  96. // Auth returns the session if user is authorized for the current action.
  97. func Auth(id string, resource acl.Resource, action acl.Action) session.Data {
  98. sess := Session(id)
  99. if acl.Permissions.Deny(resource, sess.User.Role(), action) {
  100. return session.Data{}
  101. }
  102. return sess
  103. }
  104. // InvalidPreviewToken returns true if the token is invalid.
  105. func InvalidPreviewToken(c *gin.Context) bool {
  106. token := c.Param("token")
  107. if token == "" {
  108. token = c.Query("t")
  109. }
  110. return service.Config().InvalidPreviewToken(token)
  111. }
  112. // InvalidDownloadToken returns true if the token is invalid.
  113. func InvalidDownloadToken(c *gin.Context) bool {
  114. return service.Config().InvalidDownloadToken(c.Query("t"))
  115. }