84 lines
2.7 KiB
Dart
84 lines
2.7 KiB
Dart
part of angel_auth;
|
|
|
|
/// Determines the validity of an incoming username and password.
|
|
typedef Future LocalAuthVerifier(String username, String password);
|
|
|
|
class LocalAuthStrategy extends AuthStrategy {
|
|
RegExp _rgxBasic = new RegExp(r'^Basic (.+)$', caseSensitive: false);
|
|
RegExp _rgxUsrPass = new RegExp(r'^([^:]+):(.+)$');
|
|
|
|
@override
|
|
String name = 'local';
|
|
LocalAuthVerifier verifier;
|
|
String usernameField;
|
|
String passwordField;
|
|
String invalidMessage;
|
|
bool allowBasic;
|
|
bool forceBasic;
|
|
String basicRealm;
|
|
|
|
LocalAuthStrategy(LocalAuthVerifier this.verifier,
|
|
{String this.usernameField: 'username',
|
|
String this.passwordField: 'password',
|
|
String this.invalidMessage:
|
|
'Please provide a valid username and password.',
|
|
bool this.allowBasic: true,
|
|
bool this.forceBasic: false,
|
|
String this.basicRealm: 'Authentication is required.'}) {}
|
|
|
|
@override
|
|
Future<bool> canLogout(RequestContext req, ResponseContext res) async {
|
|
return true;
|
|
}
|
|
|
|
@override
|
|
Future<bool> authenticate(RequestContext req, ResponseContext res,
|
|
{Map options: const {}}) async {
|
|
var verificationResult;
|
|
|
|
if (allowBasic) {
|
|
String authHeader = req.headers.value(HttpHeaders.AUTHORIZATION) ?? "";
|
|
if (_rgxBasic.hasMatch(authHeader)) {
|
|
String base64AuthString = _rgxBasic.firstMatch(authHeader).group(1);
|
|
String authString = new String.fromCharCodes(
|
|
BASE64.decode(base64AuthString));
|
|
if (_rgxUsrPass.hasMatch(authString)) {
|
|
Match usrPassMatch = _rgxUsrPass.firstMatch(authString);
|
|
verificationResult =
|
|
await verifier(usrPassMatch.group(1), usrPassMatch.group(2));
|
|
} else throw new AngelHttpException.BadRequest(
|
|
errors: [invalidMessage]);
|
|
}
|
|
}
|
|
|
|
if (verificationResult == null) {
|
|
if (_validateString(req.body[usernameField]) &&
|
|
_validateString(req.body[passwordField])) {
|
|
verificationResult =
|
|
await verifier(req.body[usernameField], req.body[passwordField]);
|
|
}
|
|
}
|
|
|
|
if (verificationResult == false || verificationResult == null) {
|
|
if (options.containsKey('failureRedirect')) {
|
|
return res.redirect(
|
|
options['failureRedirect'], code: HttpStatus.UNAUTHORIZED);
|
|
}
|
|
|
|
if (forceBasic) {
|
|
res
|
|
..status(401)
|
|
..header(HttpHeaders.WWW_AUTHENTICATE, 'Basic realm="$basicRealm"')
|
|
..end();
|
|
return false;
|
|
} else throw new AngelHttpException.NotAuthenticated();
|
|
}
|
|
|
|
req.session['user'] = await Auth.serializer(verificationResult);
|
|
if (options.containsKey('successRedirect')) {
|
|
return res.redirect(options['successRedirect'], code: HttpStatus.OK);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
}
|