2020-07-12 18:52:48 +02:00
|
|
|
package routes
|
|
|
|
|
|
|
|
import (
|
2020-07-13 17:51:53 +02:00
|
|
|
"fmt"
|
2020-07-12 18:52:48 +02:00
|
|
|
"net/http"
|
|
|
|
|
2020-12-17 22:51:43 +01:00
|
|
|
"github.com/photoview/photoview/api/graphql/auth"
|
|
|
|
"github.com/photoview/photoview/api/graphql/models"
|
2020-07-12 18:52:48 +02:00
|
|
|
"golang.org/x/crypto/bcrypt"
|
2020-11-23 19:39:44 +01:00
|
|
|
"gorm.io/gorm"
|
2020-07-12 18:52:48 +02:00
|
|
|
)
|
|
|
|
|
2020-11-23 19:39:44 +01:00
|
|
|
func authenticateMedia(media *models.Media, db *gorm.DB, r *http.Request) (success bool, responseMessage string, responseStatus int, errorMessage error) {
|
2020-07-12 18:52:48 +02:00
|
|
|
user := auth.UserFromContext(r.Context())
|
|
|
|
|
|
|
|
if user != nil {
|
2020-11-26 20:48:04 +01:00
|
|
|
var album models.Album
|
|
|
|
if err := db.First(&album, media.AlbumID).Error; err != nil {
|
2020-07-12 18:52:48 +02:00
|
|
|
return false, "internal server error", http.StatusInternalServerError, err
|
|
|
|
}
|
|
|
|
|
2020-12-22 01:14:43 +01:00
|
|
|
ownsAlbum, err := user.OwnsAlbum(db, &album)
|
|
|
|
if err != nil {
|
|
|
|
return false, "internal server error", http.StatusInternalServerError, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if !ownsAlbum {
|
2020-07-12 18:52:48 +02:00
|
|
|
return false, "invalid credentials", http.StatusForbidden, nil
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// Check if photo is authorized with a share token
|
|
|
|
token := r.URL.Query().Get("token")
|
|
|
|
if token == "" {
|
|
|
|
return false, "unauthorized", http.StatusForbidden, nil
|
|
|
|
}
|
|
|
|
|
2020-11-26 20:48:04 +01:00
|
|
|
var shareToken models.ShareToken
|
|
|
|
if err := db.Where("value = ?", token).First(&shareToken).Error; err != nil {
|
2020-07-12 18:52:48 +02:00
|
|
|
return false, "internal server error", http.StatusInternalServerError, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate share token password, if set
|
|
|
|
if shareToken.Password != nil {
|
2020-07-13 17:51:53 +02:00
|
|
|
tokenPasswordCookie, err := r.Cookie(fmt.Sprintf("share-token-pw-%s", shareToken.Value))
|
|
|
|
if err != nil {
|
|
|
|
return false, "unauthorized", http.StatusForbidden, nil
|
|
|
|
}
|
|
|
|
// tokenPassword := r.Header.Get("TokenPassword")
|
|
|
|
tokenPassword := tokenPasswordCookie.Value
|
2020-07-12 18:52:48 +02:00
|
|
|
|
|
|
|
if err := bcrypt.CompareHashAndPassword([]byte(*shareToken.Password), []byte(tokenPassword)); err != nil {
|
|
|
|
if err == bcrypt.ErrMismatchedHashAndPassword {
|
|
|
|
return false, "unauthorized", http.StatusForbidden, nil
|
|
|
|
} else {
|
|
|
|
return false, "internal server error", http.StatusInternalServerError, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-17 22:29:24 +01:00
|
|
|
if shareToken.AlbumID != nil && media.AlbumID != *shareToken.AlbumID {
|
2020-07-12 18:52:48 +02:00
|
|
|
// Check child albums
|
2020-11-26 20:48:04 +01:00
|
|
|
|
|
|
|
result := db.Raw(`
|
2020-07-12 18:52:48 +02:00
|
|
|
WITH recursive child_albums AS (
|
|
|
|
SELECT * FROM album WHERE parent_album = ?
|
|
|
|
UNION ALL
|
|
|
|
SELECT child.* FROM album child JOIN child_albums parent ON parent.album_id = child.parent_album
|
|
|
|
)
|
|
|
|
SELECT * FROM child_albums WHERE album_id = ?
|
2020-11-26 20:48:04 +01:00
|
|
|
`, *shareToken.AlbumID, media.AlbumID)
|
2020-07-12 18:52:48 +02:00
|
|
|
|
2020-11-26 20:48:04 +01:00
|
|
|
if err := result.Error; err != nil {
|
2020-07-12 18:52:48 +02:00
|
|
|
return false, "internal server error", http.StatusInternalServerError, err
|
|
|
|
}
|
2020-11-26 20:48:04 +01:00
|
|
|
|
|
|
|
if result.RowsAffected == 0 {
|
|
|
|
return false, "unauthorized", http.StatusForbidden, nil
|
|
|
|
}
|
2020-07-12 18:52:48 +02:00
|
|
|
}
|
|
|
|
|
2020-11-26 20:48:04 +01:00
|
|
|
if shareToken.MediaID != nil && media.ID != *shareToken.MediaID {
|
2020-07-12 18:52:48 +02:00
|
|
|
return false, "unauthorized", http.StatusForbidden, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return true, "success", http.StatusAccepted, nil
|
|
|
|
}
|