2024-04-11 23:04:30 +02:00
|
|
|
// Copyright (C) NHR@FAU, University Erlangen-Nuremberg.
|
2022-07-29 06:29:21 +02:00
|
|
|
// All rights reserved.
|
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
2021-12-08 10:03:00 +01:00
|
|
|
package auth
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2022-07-25 09:33:36 +02:00
|
|
|
"crypto/rand"
|
2023-08-11 10:00:23 +02:00
|
|
|
"database/sql"
|
2022-07-25 09:33:36 +02:00
|
|
|
"encoding/base64"
|
|
|
|
"errors"
|
2021-12-08 10:03:00 +01:00
|
|
|
"net/http"
|
2022-07-25 09:33:36 +02:00
|
|
|
"os"
|
2022-02-16 11:50:25 +01:00
|
|
|
"time"
|
2021-12-08 10:03:00 +01:00
|
|
|
|
2023-08-18 10:43:06 +02:00
|
|
|
"github.com/ClusterCockpit/cc-backend/internal/config"
|
2023-08-17 10:29:00 +02:00
|
|
|
"github.com/ClusterCockpit/cc-backend/internal/repository"
|
2022-06-21 17:52:36 +02:00
|
|
|
"github.com/ClusterCockpit/cc-backend/pkg/log"
|
2023-08-17 10:29:00 +02:00
|
|
|
"github.com/ClusterCockpit/cc-backend/pkg/schema"
|
2021-12-08 10:03:00 +01:00
|
|
|
"github.com/gorilla/sessions"
|
|
|
|
)
|
|
|
|
|
2022-07-07 14:08:37 +02:00
|
|
|
type Authenticator interface {
|
2023-08-17 14:02:04 +02:00
|
|
|
CanLogin(user *schema.User, username string, rw http.ResponseWriter, r *http.Request) (*schema.User, bool)
|
2023-08-17 10:29:00 +02:00
|
|
|
Login(user *schema.User, rw http.ResponseWriter, r *http.Request) (*schema.User, error)
|
2022-07-07 14:08:37 +02:00
|
|
|
}
|
|
|
|
|
2022-02-14 14:22:44 +01:00
|
|
|
type Authentication struct {
|
2024-03-13 09:37:12 +01:00
|
|
|
sessionStore *sessions.CookieStore
|
2022-09-07 12:24:45 +02:00
|
|
|
LdapAuth *LdapAuthenticator
|
2022-07-07 14:08:37 +02:00
|
|
|
JwtAuth *JWTAuthenticator
|
|
|
|
LocalAuth *LocalAuthenticator
|
2024-03-13 09:37:12 +01:00
|
|
|
authenticators []Authenticator
|
|
|
|
SessionMaxAge time.Duration
|
2022-02-14 14:22:44 +01:00
|
|
|
}
|
2021-12-08 10:03:00 +01:00
|
|
|
|
2023-08-11 10:00:23 +02:00
|
|
|
func (auth *Authentication) AuthViaSession(
|
|
|
|
rw http.ResponseWriter,
|
2024-03-13 09:37:12 +01:00
|
|
|
r *http.Request,
|
|
|
|
) (*schema.User, error) {
|
2023-08-11 10:00:23 +02:00
|
|
|
session, err := auth.sessionStore.Get(r, "session")
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Error while getting session store")
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if session.IsNew {
|
|
|
|
return nil, nil
|
|
|
|
}
|
2023-08-18 15:56:11 +02:00
|
|
|
|
|
|
|
// TODO: Check if session keys exist
|
2023-08-12 09:02:41 +02:00
|
|
|
username, _ := session.Values["username"].(string)
|
|
|
|
projects, _ := session.Values["projects"].([]string)
|
|
|
|
roles, _ := session.Values["roles"].([]string)
|
2023-08-17 10:29:00 +02:00
|
|
|
return &schema.User{
|
2023-08-11 10:00:23 +02:00
|
|
|
Username: username,
|
|
|
|
Projects: projects,
|
|
|
|
Roles: roles,
|
2023-08-17 10:29:00 +02:00
|
|
|
AuthType: schema.AuthSession,
|
2023-08-11 10:00:23 +02:00
|
|
|
AuthSource: -1,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2023-08-18 10:43:06 +02:00
|
|
|
func Init() (*Authentication, error) {
|
2022-07-07 14:08:37 +02:00
|
|
|
auth := &Authentication{}
|
2022-03-03 14:54:37 +01:00
|
|
|
|
2022-07-25 09:33:36 +02:00
|
|
|
sessKey := os.Getenv("SESSION_KEY")
|
|
|
|
if sessKey == "" {
|
|
|
|
log.Warn("environment variable 'SESSION_KEY' not set (will use non-persistent random key)")
|
|
|
|
bytes := make([]byte, 32)
|
|
|
|
if _, err := rand.Read(bytes); err != nil {
|
2023-01-31 18:28:44 +01:00
|
|
|
log.Error("Error while initializing authentication -> failed to generate random bytes for session key")
|
2022-07-25 09:33:36 +02:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
auth.sessionStore = sessions.NewCookieStore(bytes)
|
|
|
|
} else {
|
|
|
|
bytes, err := base64.StdEncoding.DecodeString(sessKey)
|
|
|
|
if err != nil {
|
2023-01-31 18:28:44 +01:00
|
|
|
log.Error("Error while initializing authentication -> decoding session key failed")
|
2022-07-25 09:33:36 +02:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
auth.sessionStore = sessions.NewCookieStore(bytes)
|
|
|
|
}
|
|
|
|
|
2023-08-18 10:43:06 +02:00
|
|
|
if config.Keys.LdapConfig != nil {
|
2023-08-16 09:19:41 +02:00
|
|
|
ldapAuth := &LdapAuthenticator{}
|
2023-08-18 10:43:06 +02:00
|
|
|
if err := ldapAuth.Init(); err != nil {
|
2023-08-16 09:19:41 +02:00
|
|
|
log.Warn("Error while initializing authentication -> ldapAuth init failed")
|
|
|
|
} else {
|
|
|
|
auth.LdapAuth = ldapAuth
|
|
|
|
auth.authenticators = append(auth.authenticators, auth.LdapAuth)
|
2022-02-14 14:22:44 +01:00
|
|
|
}
|
2023-08-11 10:00:23 +02:00
|
|
|
} else {
|
2023-08-18 08:49:25 +02:00
|
|
|
log.Info("Missing LDAP configuration: No LDAP support!")
|
2023-08-11 10:00:23 +02:00
|
|
|
}
|
2022-09-07 12:24:45 +02:00
|
|
|
|
2023-08-18 10:43:06 +02:00
|
|
|
if config.Keys.JwtConfig != nil {
|
2023-08-18 08:57:56 +02:00
|
|
|
auth.JwtAuth = &JWTAuthenticator{}
|
2023-08-18 10:43:06 +02:00
|
|
|
if err := auth.JwtAuth.Init(); err != nil {
|
2023-08-18 08:57:56 +02:00
|
|
|
log.Error("Error while initializing authentication -> jwtAuth init failed")
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2023-08-18 08:49:25 +02:00
|
|
|
jwtSessionAuth := &JWTSessionAuthenticator{}
|
2023-08-18 10:43:06 +02:00
|
|
|
if err := jwtSessionAuth.Init(); err != nil {
|
2023-08-18 11:00:13 +02:00
|
|
|
log.Info("jwtSessionAuth init failed: No JWT login support!")
|
2023-08-18 08:49:25 +02:00
|
|
|
} else {
|
|
|
|
auth.authenticators = append(auth.authenticators, jwtSessionAuth)
|
|
|
|
}
|
|
|
|
|
|
|
|
jwtCookieSessionAuth := &JWTCookieSessionAuthenticator{}
|
2023-08-18 10:43:06 +02:00
|
|
|
if err := jwtCookieSessionAuth.Init(); err != nil {
|
2023-08-18 11:00:13 +02:00
|
|
|
log.Info("jwtCookieSessionAuth init failed: No JWT cookie login support!")
|
2023-08-18 08:49:25 +02:00
|
|
|
} else {
|
|
|
|
auth.authenticators = append(auth.authenticators, jwtCookieSessionAuth)
|
|
|
|
}
|
2023-08-11 10:00:23 +02:00
|
|
|
} else {
|
2023-08-18 10:43:06 +02:00
|
|
|
log.Info("Missing JWT configuration: No JWT token support!")
|
2022-03-15 11:04:54 +01:00
|
|
|
}
|
|
|
|
|
2023-08-11 10:00:23 +02:00
|
|
|
auth.LocalAuth = &LocalAuthenticator{}
|
2023-08-18 10:43:06 +02:00
|
|
|
if err := auth.LocalAuth.Init(); err != nil {
|
2023-08-11 10:00:23 +02:00
|
|
|
log.Error("Error while initializing authentication -> localAuth init failed")
|
|
|
|
return nil, err
|
2022-03-15 11:04:54 +01:00
|
|
|
}
|
2023-08-11 10:00:23 +02:00
|
|
|
auth.authenticators = append(auth.authenticators, auth.LocalAuth)
|
2022-03-17 10:54:17 +01:00
|
|
|
|
2023-08-11 10:00:23 +02:00
|
|
|
return auth, nil
|
2022-03-15 11:04:54 +01:00
|
|
|
}
|
|
|
|
|
2024-03-28 14:22:23 +01:00
|
|
|
func persistUser(user *schema.User) {
|
|
|
|
r := repository.GetUserRepository()
|
|
|
|
_, err := r.GetUser(user.Username)
|
|
|
|
|
|
|
|
if err != nil && err != sql.ErrNoRows {
|
|
|
|
log.Errorf("Error while loading user '%s': %v", user.Username, err)
|
|
|
|
} else if err == sql.ErrNoRows {
|
|
|
|
if err := r.AddUser(user); err != nil {
|
|
|
|
log.Errorf("Error while adding user '%s' to DB: %v", user.Username, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-03-28 12:01:13 +01:00
|
|
|
func (auth *Authentication) SaveSession(rw http.ResponseWriter, r *http.Request, user *schema.User) error {
|
|
|
|
session, err := auth.sessionStore.New(r, "session")
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("session creation failed: %s", err.Error())
|
|
|
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if auth.SessionMaxAge != 0 {
|
|
|
|
session.Options.MaxAge = int(auth.SessionMaxAge.Seconds())
|
|
|
|
}
|
|
|
|
session.Values["username"] = user.Username
|
|
|
|
session.Values["projects"] = user.Projects
|
|
|
|
session.Values["roles"] = user.Roles
|
|
|
|
if err := auth.sessionStore.Save(r, rw, session); err != nil {
|
|
|
|
log.Warnf("session save failed: %s", err.Error())
|
|
|
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-09-07 12:24:45 +02:00
|
|
|
func (auth *Authentication) Login(
|
|
|
|
onsuccess http.Handler,
|
2024-03-13 09:37:12 +01:00
|
|
|
onfailure func(rw http.ResponseWriter, r *http.Request, loginErr error),
|
|
|
|
) http.Handler {
|
2021-12-08 10:03:00 +01:00
|
|
|
return http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
2022-07-07 14:08:37 +02:00
|
|
|
username := r.FormValue("username")
|
2023-08-17 14:02:04 +02:00
|
|
|
var dbUser *schema.User
|
2023-07-05 09:50:44 +02:00
|
|
|
|
2022-07-07 14:08:37 +02:00
|
|
|
if username != "" {
|
2023-08-18 11:00:13 +02:00
|
|
|
var err error
|
2023-08-17 12:34:30 +02:00
|
|
|
dbUser, err = repository.GetUserRepository().GetUser(username)
|
2023-08-11 10:00:23 +02:00
|
|
|
if err != nil && err != sql.ErrNoRows {
|
|
|
|
log.Errorf("Error while loading user '%v'", username)
|
|
|
|
}
|
2021-12-08 10:03:00 +01:00
|
|
|
}
|
|
|
|
|
2022-07-07 14:08:37 +02:00
|
|
|
for _, authenticator := range auth.authenticators {
|
2023-08-17 14:02:04 +02:00
|
|
|
var ok bool
|
|
|
|
var user *schema.User
|
|
|
|
if user, ok = authenticator.CanLogin(dbUser, username, rw, r); !ok {
|
2022-07-07 14:08:37 +02:00
|
|
|
continue
|
2023-08-18 11:59:16 +02:00
|
|
|
} else {
|
|
|
|
log.Debugf("Can login with user %v", user)
|
2022-07-07 14:08:37 +02:00
|
|
|
}
|
2021-12-08 10:03:00 +01:00
|
|
|
|
2023-08-18 11:00:13 +02:00
|
|
|
user, err := authenticator.Login(user, rw, r)
|
2022-07-07 14:08:37 +02:00
|
|
|
if err != nil {
|
2023-06-14 14:35:25 +02:00
|
|
|
log.Warnf("user login failed: %s", err.Error())
|
2022-07-07 14:08:37 +02:00
|
|
|
onfailure(rw, r, err)
|
|
|
|
return
|
|
|
|
}
|
2021-12-08 10:03:00 +01:00
|
|
|
|
2024-03-28 12:01:13 +01:00
|
|
|
if err := auth.SaveSession(rw, r, user); err != nil {
|
2022-07-07 14:08:37 +02:00
|
|
|
return
|
|
|
|
}
|
2021-12-08 10:03:00 +01:00
|
|
|
|
2023-02-17 15:45:31 +01:00
|
|
|
log.Infof("login successfull: user: %#v (roles: %v, projects: %v)", user.Username, user.Roles, user.Projects)
|
2023-08-17 10:29:00 +02:00
|
|
|
ctx := context.WithValue(r.Context(), repository.ContextUserKey, user)
|
2022-07-07 14:08:37 +02:00
|
|
|
onsuccess.ServeHTTP(rw, r.WithContext(ctx))
|
2022-07-25 09:33:36 +02:00
|
|
|
return
|
2021-12-08 10:03:00 +01:00
|
|
|
}
|
|
|
|
|
2023-06-20 15:47:38 +02:00
|
|
|
log.Debugf("login failed: no authenticator applied")
|
2023-08-18 11:00:13 +02:00
|
|
|
onfailure(rw, r, errors.New("no authenticator applied"))
|
2021-12-08 10:03:00 +01:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2022-09-07 12:24:45 +02:00
|
|
|
func (auth *Authentication) Auth(
|
|
|
|
onsuccess http.Handler,
|
2024-03-13 09:37:12 +01:00
|
|
|
onfailure func(rw http.ResponseWriter, r *http.Request, authErr error),
|
|
|
|
) http.Handler {
|
2021-12-08 10:03:00 +01:00
|
|
|
return http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
2023-08-11 10:00:23 +02:00
|
|
|
user, err := auth.JwtAuth.AuthViaJWT(rw, r)
|
2023-08-12 09:02:41 +02:00
|
|
|
if err != nil {
|
|
|
|
log.Infof("authentication failed: %s", err.Error())
|
|
|
|
http.Error(rw, err.Error(), http.StatusUnauthorized)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-08-11 10:00:23 +02:00
|
|
|
if user == nil {
|
|
|
|
user, err = auth.AuthViaSession(rw, r)
|
2022-07-07 14:08:37 +02:00
|
|
|
if err != nil {
|
2023-06-20 15:47:38 +02:00
|
|
|
log.Infof("authentication failed: %s", err.Error())
|
2022-07-07 14:08:37 +02:00
|
|
|
http.Error(rw, err.Error(), http.StatusUnauthorized)
|
|
|
|
return
|
|
|
|
}
|
2023-08-11 10:00:23 +02:00
|
|
|
}
|
2022-07-07 14:08:37 +02:00
|
|
|
|
2023-08-11 10:00:23 +02:00
|
|
|
if user != nil {
|
2023-08-17 10:29:00 +02:00
|
|
|
ctx := context.WithValue(r.Context(), repository.ContextUserKey, user)
|
2022-02-14 14:22:44 +01:00
|
|
|
onsuccess.ServeHTTP(rw, r.WithContext(ctx))
|
2022-07-25 09:33:36 +02:00
|
|
|
return
|
2021-12-08 10:03:00 +01:00
|
|
|
}
|
|
|
|
|
2023-08-12 09:02:41 +02:00
|
|
|
log.Debug("authentication failed")
|
2023-08-11 10:00:23 +02:00
|
|
|
onfailure(rw, r, errors.New("unauthorized (please login first)"))
|
2021-12-08 10:03:00 +01:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2024-07-03 17:24:26 +02:00
|
|
|
func (auth *Authentication) AuthApi(
|
|
|
|
onsuccess http.Handler,
|
|
|
|
onfailure func(rw http.ResponseWriter, r *http.Request, authErr error),
|
|
|
|
) http.Handler {
|
|
|
|
return http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
|
|
|
user, err := auth.JwtAuth.AuthViaJWT(rw, r)
|
|
|
|
if err != nil {
|
|
|
|
log.Infof("authentication failed: %s", err.Error())
|
|
|
|
http.Error(rw, err.Error(), http.StatusUnauthorized)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if user != nil {
|
|
|
|
switch {
|
|
|
|
case len(user.Roles) == 1:
|
|
|
|
if user.HasRole(schema.RoleApi) {
|
|
|
|
ctx := context.WithValue(r.Context(), repository.ContextUserKey, user)
|
|
|
|
onsuccess.ServeHTTP(rw, r.WithContext(ctx))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
case len(user.Roles) >= 2:
|
|
|
|
if user.HasAllRoles([]schema.Role{schema.RoleAdmin, schema.RoleApi}) {
|
|
|
|
ctx := context.WithValue(r.Context(), repository.ContextUserKey, user)
|
|
|
|
onsuccess.ServeHTTP(rw, r.WithContext(ctx))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
log.Debug("authentication failed")
|
|
|
|
onfailure(rw, r, errors.New("unauthorized (missing role)"))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
log.Debug("authentication failed")
|
|
|
|
onfailure(rw, r, errors.New("unauthorized (no auth)"))
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func (auth *Authentication) AuthUserApi(
|
|
|
|
onsuccess http.Handler,
|
|
|
|
onfailure func(rw http.ResponseWriter, r *http.Request, authErr error),
|
|
|
|
) http.Handler {
|
|
|
|
return http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
|
|
|
user, err := auth.JwtAuth.AuthViaJWT(rw, r)
|
|
|
|
if err != nil {
|
|
|
|
log.Infof("authentication failed: %s", err.Error())
|
|
|
|
http.Error(rw, err.Error(), http.StatusUnauthorized)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if user != nil {
|
|
|
|
switch {
|
|
|
|
case len(user.Roles) == 1:
|
|
|
|
if user.HasRole(schema.RoleApi) {
|
|
|
|
ctx := context.WithValue(r.Context(), repository.ContextUserKey, user)
|
|
|
|
onsuccess.ServeHTTP(rw, r.WithContext(ctx))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
case len(user.Roles) >= 2:
|
|
|
|
if user.HasRole(schema.RoleApi) && user.HasAnyRole([]schema.Role{schema.RoleUser, schema.RoleManager, schema.RoleAdmin}) {
|
|
|
|
ctx := context.WithValue(r.Context(), repository.ContextUserKey, user)
|
|
|
|
onsuccess.ServeHTTP(rw, r.WithContext(ctx))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
log.Debug("authentication failed")
|
|
|
|
onfailure(rw, r, errors.New("unauthorized (missing role)"))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
log.Debug("authentication failed")
|
|
|
|
onfailure(rw, r, errors.New("unauthorized (no auth)"))
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2024-07-04 11:16:45 +02:00
|
|
|
func (auth *Authentication) AuthConfigApi(
|
|
|
|
onsuccess http.Handler,
|
|
|
|
onfailure func(rw http.ResponseWriter, r *http.Request, authErr error),
|
|
|
|
) http.Handler {
|
|
|
|
return http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
|
|
|
user, err := auth.AuthViaSession(rw, r)
|
|
|
|
if err != nil {
|
|
|
|
log.Infof("authentication failed: %s", err.Error())
|
|
|
|
http.Error(rw, err.Error(), http.StatusUnauthorized)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if user != nil && user.HasRole(schema.RoleAdmin) {
|
|
|
|
ctx := context.WithValue(r.Context(), repository.ContextUserKey, user)
|
|
|
|
onsuccess.ServeHTTP(rw, r.WithContext(ctx))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
log.Debug("authentication failed")
|
|
|
|
onfailure(rw, r, errors.New("unauthorized (no auth)"))
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func (auth *Authentication) AuthUserConfigApi(
|
|
|
|
onsuccess http.Handler,
|
|
|
|
onfailure func(rw http.ResponseWriter, r *http.Request, authErr error),
|
|
|
|
) http.Handler {
|
|
|
|
return http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
|
|
|
user, err := auth.AuthViaSession(rw, r)
|
|
|
|
if err != nil {
|
|
|
|
log.Infof("authentication failed: %s", err.Error())
|
|
|
|
http.Error(rw, err.Error(), http.StatusUnauthorized)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if user != nil {
|
|
|
|
ctx := context.WithValue(r.Context(), repository.ContextUserKey, user)
|
|
|
|
onsuccess.ServeHTTP(rw, r.WithContext(ctx))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
log.Debug("authentication failed")
|
|
|
|
onfailure(rw, r, errors.New("unauthorized (no auth)"))
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2022-02-14 14:22:44 +01:00
|
|
|
func (auth *Authentication) Logout(onsuccess http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
|
|
|
session, err := auth.sessionStore.Get(r, "session")
|
|
|
|
if err != nil {
|
2021-12-08 10:03:00 +01:00
|
|
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-02-14 14:22:44 +01:00
|
|
|
if !session.IsNew {
|
|
|
|
session.Options.MaxAge = -1
|
|
|
|
if err := auth.sessionStore.Save(r, rw, session); err != nil {
|
|
|
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
onsuccess.ServeHTTP(rw, r)
|
2021-12-08 10:03:00 +01:00
|
|
|
})
|
|
|
|
}
|