mirror of
https://github.com/twofas/2fas-server.git
synced 2024-12-12 04:00:15 +01:00
203 lines
5.8 KiB
Go
203 lines
5.8 KiB
Go
package sync
|
|
|
|
import (
|
|
"errors"
|
|
"net/http"
|
|
"strings"
|
|
|
|
"github.com/gin-gonic/gin"
|
|
|
|
"github.com/twofas/2fas-server/internal/common/logging"
|
|
"github.com/twofas/2fas-server/internal/pass/connection"
|
|
)
|
|
|
|
func ExtensionRequestSync(syncingApp *Syncing) gin.HandlerFunc {
|
|
return func(gCtx *gin.Context) {
|
|
log := logging.FromContext(gCtx.Request.Context())
|
|
|
|
token, err := tokenFromRequest(gCtx)
|
|
if err != nil {
|
|
log.Errorf("Failed to get token from request: %v", err)
|
|
gCtx.Status(http.StatusForbidden)
|
|
return
|
|
}
|
|
fcmToken, err := syncingApp.VerifyExtRequestSyncToken(gCtx, token)
|
|
if err != nil {
|
|
log.Errorf("Failed to verify proxy token: %v", err)
|
|
gCtx.String(http.StatusUnauthorized, "Invalid auth token")
|
|
return
|
|
}
|
|
|
|
resp, err := syncingApp.RequestSync(gCtx, fcmToken)
|
|
if err != nil {
|
|
log.Errorf("Failed to request sync: %v", err)
|
|
gCtx.Status(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
gCtx.JSON(http.StatusOK, resp)
|
|
}
|
|
}
|
|
|
|
type PushToMobileRequest struct {
|
|
DataMessage map[string]string `json:"data_message"`
|
|
}
|
|
|
|
func ExtensionRequestPush(syncingApp *Syncing) gin.HandlerFunc {
|
|
return func(gCtx *gin.Context) {
|
|
log := logging.FromContext(gCtx.Request.Context())
|
|
|
|
token, err := tokenFromRequest(gCtx)
|
|
if err != nil {
|
|
log.Errorf("Failed to get token from request: %v", err)
|
|
gCtx.Status(http.StatusForbidden)
|
|
return
|
|
}
|
|
fcmToken, err := syncingApp.VerifyExtWaitForSyncToken(gCtx, token)
|
|
if err != nil {
|
|
log.Errorf("Failed to verify proxy token: %v", err)
|
|
gCtx.String(http.StatusUnauthorized, "Invalid auth token")
|
|
return
|
|
}
|
|
var req PushToMobileRequest
|
|
if err := gCtx.BindJSON(&req); err != nil {
|
|
gCtx.String(http.StatusBadRequest, err.Error())
|
|
return
|
|
}
|
|
|
|
resp, err := syncingApp.SendPush(gCtx, fcmToken, req.DataMessage)
|
|
if err != nil {
|
|
log.Errorf("Failed to send push message: %v", err)
|
|
gCtx.Status(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
gCtx.JSON(http.StatusOK, map[string]string{
|
|
"response": string(resp),
|
|
})
|
|
}
|
|
}
|
|
|
|
func ExtensionRequestWait(syncingApp *Syncing) gin.HandlerFunc {
|
|
return func(gCtx *gin.Context) {
|
|
log := logging.FromContext(gCtx.Request.Context())
|
|
|
|
token, err := connection.TokenFromWSProtocol(gCtx.Request)
|
|
if err != nil {
|
|
log.Errorf("Failed to get token from request: %v", err)
|
|
gCtx.Status(http.StatusForbidden)
|
|
return
|
|
}
|
|
fcmToken, err := syncingApp.VerifyExtWaitForSyncToken(gCtx, token)
|
|
if err != nil {
|
|
log.Errorf("Failed to verify proxy token: %v", err)
|
|
gCtx.String(http.StatusUnauthorized, "Invalid auth token")
|
|
return
|
|
}
|
|
|
|
if err := syncingApp.ServeSyncingRequestWS(gCtx.Writer, gCtx.Request, fcmToken); err != nil {
|
|
log.Errorf("Failed to verify proxy token: %v", err)
|
|
gCtx.Status(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
func ExtensionProxyWSHandler(syncingApp *Syncing, proxy *connection.ProxyServer) gin.HandlerFunc {
|
|
return func(gCtx *gin.Context) {
|
|
log := logging.FromContext(gCtx.Request.Context())
|
|
|
|
token, err := connection.TokenFromWSProtocol(gCtx.Request)
|
|
if err != nil {
|
|
log.Errorf("Failed to get token from request: %v", err)
|
|
gCtx.Status(http.StatusForbidden)
|
|
return
|
|
}
|
|
fcmToken, err := syncingApp.VerifyExtSyncToken(gCtx, token)
|
|
if err != nil {
|
|
log.Errorf("Failed to verify proxy token: %v", err)
|
|
gCtx.Status(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
ok := syncingApp.isSyncConfirmed(gCtx, fcmToken)
|
|
if !ok {
|
|
gCtx.String(http.StatusForbidden, "Syncing is not yet done")
|
|
return
|
|
}
|
|
if err := proxy.ServeExtensionProxyToMobileWS(gCtx.Writer, gCtx.Request, fcmToken); err != nil {
|
|
log.Errorf("Failed to serve ws: %v", err)
|
|
gCtx.Status(http.StatusInternalServerError)
|
|
}
|
|
}
|
|
}
|
|
|
|
func MobileConfirmHandler(syncApp *Syncing) gin.HandlerFunc {
|
|
return func(gCtx *gin.Context) {
|
|
log := logging.FromContext(gCtx.Request.Context())
|
|
|
|
token, err := tokenFromRequest(gCtx)
|
|
if err != nil {
|
|
log.Errorf("Failed to get token from request: %v", err)
|
|
gCtx.Status(http.StatusForbidden)
|
|
return
|
|
}
|
|
fcmToken, err := syncApp.VerifyMobileSyncConfirmToken(gCtx, token)
|
|
if err != nil {
|
|
log.Errorf("Failed to verify connection token: %v", err)
|
|
gCtx.Status(http.StatusUnauthorized)
|
|
return
|
|
}
|
|
resp, err := syncApp.confirmSync(gCtx, fcmToken)
|
|
if err != nil {
|
|
if errors.Is(err, noSyncRequestErr) {
|
|
gCtx.String(http.StatusBadRequest, "no sync request was created for this token")
|
|
return
|
|
}
|
|
log.Errorf("Failed to ConfirmPairing: %v", err)
|
|
gCtx.Status(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
gCtx.JSON(http.StatusOK, resp)
|
|
}
|
|
}
|
|
|
|
func MobileProxyWSHandler(syncingApp *Syncing, proxy *connection.ProxyServer) gin.HandlerFunc {
|
|
return func(gCtx *gin.Context) {
|
|
log := logging.FromContext(gCtx.Request.Context())
|
|
|
|
token, err := connection.TokenFromWSProtocol(gCtx.Request)
|
|
if err != nil {
|
|
log.Errorf("Failed to get token from request: %v", err)
|
|
gCtx.Status(http.StatusForbidden)
|
|
return
|
|
}
|
|
fcmToken, err := syncingApp.VerifyMobileSyncConfirmToken(gCtx, token)
|
|
if err != nil {
|
|
log.Errorf("Invalid connection token: %v", err)
|
|
gCtx.Status(http.StatusUnauthorized)
|
|
return
|
|
}
|
|
ok := syncingApp.isSyncConfirmed(gCtx, fcmToken)
|
|
if !ok {
|
|
gCtx.String(http.StatusForbidden, "Syncing is not yet done")
|
|
return
|
|
}
|
|
if err := proxy.ServeMobileProxyToExtensionWS(gCtx.Writer, gCtx.Request, fcmToken); err != nil {
|
|
log.Errorf("Failed to serve ws: %v", err)
|
|
gCtx.Status(http.StatusInternalServerError)
|
|
}
|
|
}
|
|
}
|
|
|
|
func tokenFromRequest(gCtx *gin.Context) (string, error) {
|
|
tokenHeader := gCtx.GetHeader("Authorization")
|
|
if tokenHeader == "" {
|
|
return "", errors.New("missing Authorization header")
|
|
}
|
|
splitToken := strings.Split(tokenHeader, "Bearer ")
|
|
if len(splitToken) != 2 {
|
|
gCtx.Status(http.StatusForbidden)
|
|
return "", errors.New("missing 'Bearer: value'")
|
|
}
|
|
return splitToken[1], nil
|
|
}
|