2019-01-23 22:40:23 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"log"
|
|
|
|
"net/http"
|
|
|
|
)
|
|
|
|
|
2023-05-18 17:55:52 +00:00
|
|
|
var adminToken string
|
2019-01-23 22:40:23 +00:00
|
|
|
|
|
|
|
func authorizeAdmin(r *http.Request) bool {
|
2023-05-18 17:55:52 +00:00
|
|
|
return authorizeToken(r, adminToken)
|
2019-01-23 22:40:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func authorizeToken(r *http.Request, token string) bool {
|
|
|
|
if token == "" {
|
|
|
|
// access is open
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
reqToken := r.Header.Get("Authorization")
|
2023-02-07 20:29:19 +00:00
|
|
|
if reqToken != "" {
|
|
|
|
return reqToken == "Bearer "+token
|
|
|
|
}
|
2019-01-23 22:40:23 +00:00
|
|
|
|
2023-02-07 20:29:19 +00:00
|
|
|
return r.URL.Query().Get("token") == token
|
2019-01-23 22:40:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func forbidden(w http.ResponseWriter, r *http.Request) {
|
2023-09-10 14:47:54 +00:00
|
|
|
log.Printf("denied access to %s from %s", r.URL.Path, r.RemoteAddr)
|
2019-01-23 22:40:23 +00:00
|
|
|
http.Error(w, "Forbidden", http.StatusForbidden)
|
|
|
|
}
|
2023-02-07 20:29:19 +00:00
|
|
|
|
|
|
|
func requireToken(token string, handler http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
|
|
|
if !authorizeToken(req, token) {
|
|
|
|
forbidden(w, req)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
handler.ServeHTTP(w, req)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func requireAdmin(handler http.Handler) http.Handler {
|
2023-05-18 17:55:52 +00:00
|
|
|
return requireToken(adminToken, handler)
|
2023-02-07 20:29:19 +00:00
|
|
|
}
|