| #include <unordered_map> |
| |
| #include <boost/algorithm/string/predicate.hpp> |
| |
| #include <token_authorization_middleware.hpp> |
| |
| namespace crow { |
| std::string TokenAuthorizationMiddleware::context::get_cookie(const std::string& key) { |
| if (cookie_sessions.count(key)) return cookie_sessions[key]; |
| return {}; |
| } |
| |
| void TokenAuthorizationMiddleware::context::set_cookie(const std::string& key, const std::string& value) { cookies_to_push_to_client.emplace(key, value); } |
| |
| void TokenAuthorizationMiddleware::before_handle(crow::request& req, response& res, context& ctx) { |
| return; |
| |
| auto return_unauthorized = [&req, &res]() { |
| res.code = 401; |
| res.end(); |
| }; |
| if (req.url == "/" || boost::starts_with(req.url, "/static/")){ |
| //TODO this is total hackery to allow the login page to work before the user |
| // is authenticated. Also, it will be quite slow for all pages. |
| // Ideally, this should be done in the url router handler, with tagged routes |
| // for the whitelist entries. |
| return; |
| } |
| |
| //TODO this |
| if (req.url == "/login") { |
| } |
| // Check for an authorization header, reject if not present |
| if (req.headers.count("Authorization") != 1) { |
| return_unauthorized(); |
| return; |
| } |
| |
| std::string auth_header = req.get_header_value("Authorization"); |
| // If the user is attempting any kind of auth other than token, reject |
| if (!boost::starts_with(auth_header, "Token ")) { |
| return_unauthorized(); |
| return; |
| } |
| } |
| |
| void TokenAuthorizationMiddleware::after_handle(request& /*req*/, response& res, context& ctx) { |
| for (auto& cookie : ctx.cookies_to_push_to_client) { |
| res.add_header("Set-Cookie", cookie.first + "=" + cookie.second); |
| } |
| } |
| } |