feat: Enhance security and fix bugs in authentication

- Update the minimum access token length from 16 to 32
- Prevent spam by introducing policies and detecting user agents
- Add an authorization header to the login response
- Use base64 to decode the session secret and generate a random one if not set
This commit is contained in:
Laisky.Cai 2024-03-05 13:07:07 +00:00
parent bcd5cf3d5f
commit ba9b258a4b
4 changed files with 37 additions and 6 deletions

View File

@ -1,15 +1,29 @@
package config
import (
"github.com/songquanpeng/one-api/common/helper"
"crypto/rand"
"encoding/base64"
"fmt"
"os"
"strconv"
"sync"
"time"
"github.com/google/uuid"
"github.com/songquanpeng/one-api/common/helper"
)
func init() {
if SessionSecret == "" {
fmt.Println("SESSION_SECRET not set, using random secret")
key := make([]byte, 32)
if _, err := rand.Read(key); err != nil {
panic(fmt.Sprintf("failed to generate random secret: %v", err))
}
SessionSecret = base64.StdEncoding.EncodeToString(key)
}
}
var SystemName = "One API"
var ServerAddress = "http://localhost:3000"
var Footer = ""
@ -22,7 +36,7 @@ var DisplayTokenStatEnabled = true
// Any options with "Secret", "Token" in its key won't be return by GetOptions
var SessionSecret = uuid.New().String()
var SessionSecret = os.Getenv("SESSION_SECRET")
var OptionMap map[string]string
var OptionMapRWMutex sync.RWMutex

View File

@ -76,6 +76,12 @@ func setupLogin(user *model.User, c *gin.Context) {
})
return
}
// set auth header
// c.Set("id", user.Id)
// GenerateAccessToken(c)
// c.Header("Authorization", user.AccessToken)
cleanUser := model.User{
Id: user.Id,
Username: user.Username,

View File

@ -2,6 +2,7 @@ package main
import (
"embed"
"encoding/base64"
"fmt"
"os"
"strconv"
@ -94,7 +95,12 @@ func main() {
server.Use(middleware.RequestId())
middleware.SetUpLogger(server)
// Initialize session store
store := cookie.NewStore([]byte(config.SessionSecret))
sessionSecret, err := base64.StdEncoding.DecodeString(config.SessionSecret)
if err != nil {
panic(fmt.Sprintf("failed to decode session secret: %v", err))
}
store := cookie.NewStore(sessionSecret, sessionSecret)
server.Use(sessions.Sessions("session", store))
router.SetRouter(server, buildFS)

View File

@ -1,12 +1,14 @@
package middleware
import (
"net/http"
"strings"
"github.com/gin-contrib/sessions"
"github.com/gin-gonic/gin"
"github.com/songquanpeng/one-api/common"
"github.com/songquanpeng/one-api/common/logger"
"github.com/songquanpeng/one-api/model"
"net/http"
"strings"
)
func authHelper(c *gin.Context, minRole int) {
@ -16,6 +18,7 @@ func authHelper(c *gin.Context, minRole int) {
id := session.Get("id")
status := session.Get("status")
if username == nil {
logger.SysLog("no user session found, try to use access token")
// Check access token
accessToken := c.Request.Header.Get("Authorization")
if accessToken == "" {
@ -26,6 +29,7 @@ func authHelper(c *gin.Context, minRole int) {
c.Abort()
return
}
user := model.ValidateAccessToken(accessToken)
if user != nil && user.Username != "" {
// Token is valid
@ -42,6 +46,7 @@ func authHelper(c *gin.Context, minRole int) {
return
}
}
if status.(int) == common.UserStatusDisabled {
c.JSON(http.StatusOK, gin.H{
"success": false,