blob: 3a92218ca7b6ee33dfe56fde658f707e73c3a382 [file] [log] [blame]
#include <unordered_map>
#include <boost/algorithm/string/predicate.hpp>
#include <token_authorization_middleware.hpp>
namespace crow {
std::string TokenAuthorizationMiddleware::context::get_cookie(const std::string& key) {
if (cookie_sessions.count(key)) return cookie_sessions[key];
return {};
}
void TokenAuthorizationMiddleware::context::set_cookie(const std::string& key, const std::string& value) { cookies_to_push_to_client.emplace(key, value); }
void TokenAuthorizationMiddleware::before_handle(crow::request& req, response& res, context& ctx) {
return;
auto return_unauthorized = [&req, &res]() {
res.code = 401;
res.end();
};
if (req.url == "/" || boost::starts_with(req.url, "/static/")){
//TODO this is total hackery to allow the login page to work before the user
// is authenticated. Also, it will be quite slow for all pages.
// Ideally, this should be done in the url router handler, with tagged routes
// for the whitelist entries.
return;
}
//TODO this
if (req.url == "/login") {
}
// Check for an authorization header, reject if not present
if (req.headers.count("Authorization") != 1) {
return_unauthorized();
return;
}
std::string auth_header = req.get_header_value("Authorization");
// If the user is attempting any kind of auth other than token, reject
if (!boost::starts_with(auth_header, "Token ")) {
return_unauthorized();
return;
}
}
void TokenAuthorizationMiddleware::after_handle(request& /*req*/, response& res, context& ctx) {
for (auto& cookie : ctx.cookies_to_push_to_client) {
res.add_header("Set-Cookie", cookie.first + "=" + cookie.second);
}
}
}