1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
|
package sip2
import (
"encoding/json"
jwt "github.com/dgrijalva/jwt-go"
"log"
"net/http"
"os"
"time"
"0xacab.org/leap/vpnweb/pkg/config"
)
const SipUserVar string = "VPNWEB_SIP_USER"
const SipPassVar string = "VPNWEB_SIP_PASS"
const SipPortVar string = "VPNWEB_SIP_PORT"
const SipHostVar string = "VPNWEB_SIP_HOST"
const SipLibrLocVar string = "VPNWEB_SIP_LIBR_LOCATION"
const SipTerminatorVar string = "VPNWEB_SIP_TERMINATOR"
const SipDefaultTerminator string = "\r\n"
type Credentials struct {
User string
Password string
}
func getConfigFromEnv(envVar string) string {
val, exists := os.LookupEnv(envVar)
if !exists {
log.Fatal("Need to set required env var:", envVar)
}
return val
}
func setupTerminatorFromEnv() {
config.FallbackToEnv(&TelnetTerminator, SipTerminatorVar, SipDefaultTerminator)
if TelnetTerminator == "\\r" {
TelnetTerminator = "\r"
} else if TelnetTerminator == "\\r\\n" {
TelnetTerminator = "\r\n"
}
}
func SipAuthenticator(opts *config.Opts) http.HandlerFunc {
log.Println("Initializing SIP2 authenticator")
SipUser := getConfigFromEnv(SipUserVar)
SipPass := getConfigFromEnv(SipPassVar)
SipHost := getConfigFromEnv(SipHostVar)
SipPort := getConfigFromEnv(SipPortVar)
SipLibrLoc := getConfigFromEnv(SipLibrLocVar)
setupTerminatorFromEnv()
sip := NewClient(SipHost, SipPort, SipLibrLoc)
ok, err := sip.Connect()
if err != nil {
log.Fatal("Cannot connect sip client")
}
ok = sip.Login(SipUser, SipPass)
if !ok {
log.Fatal("Error on SIP login")
} else {
log.Println("SIP login ok")
}
var authTokenHandler = http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
var c Credentials
err := json.NewDecoder(r.Body).Decode(&c)
if err != nil {
log.Println("Auth request did not send valid json")
http.Error(w, err.Error(), http.StatusBadRequest)
return
}
if c.User == "" || c.Password == "" {
log.Println("Auth request did not include user or password")
http.Error(w, "missing user and/or password", http.StatusBadRequest)
return
}
valid := sip.CheckCredentials(c.User, c.Password)
if !valid {
log.Println("Wrong auth for user", c.User)
http.Error(w, "wrong user and/or password", http.StatusUnauthorized)
return
}
log.Println("Valid auth for user", c.User)
token := jwt.New(jwt.SigningMethodHS256)
claims := token.Claims.(jwt.MapClaims)
claims["exp"] = time.Now().Add(time.Hour * 24).Unix()
tokenString, _ := token.SignedString([]byte(opts.AuthSecret))
w.Write([]byte(tokenString))
})
return authTokenHandler
}
|