jojo/services/auth/interface.go
Mathieu Fenniak be3fe4ff60 feat: allow Authorized Integrations to authenticate to Forgejo's package registries (#12310)
Enables and tests the usage of Authorized Integrations to access the package registries.  Specific testing includes:
- Container registry -- automated testing and manual testing
- Generic registry, w/ detailed authorization tests -- automated testing
- Conan registry -- automated testing (uses an "authenticate" endpoint that required updates)
- npm registry -- manual testing with a Forgejo Action publishing packages

For the container & conan registeries, where the client uses an authentication endpoint to request a temporary access token, the expiry of the temporary access token is restricted to the expiry of the authorized integration's JWT for the authorized integration in order to prevent an escalation of privileges.

## Checklist

The [contributor guide](https://forgejo.org/docs/next/contributor/) contains information that will be helpful to first time contributors. All work and communication must conform to Forgejo's [AI Agreement](https://codeberg.org/forgejo/governance/src/branch/main/AIAgreement.md). There also are a few [conditions for merging Pull Requests in Forgejo repositories](https://codeberg.org/forgejo/governance/src/branch/main/PullRequestsAgreement.md). You are also welcome to join the [Forgejo development chatroom](https://matrix.to/#/#forgejo-development:matrix.org).

### Tests for Go changes

- I added test coverage for Go changes...
  - [x] in their respective `*_test.go` for unit tests.
  - [x] in the `tests/integration` directory if it involves interactions with a live Forgejo server.
- I ran...
  - [ ] `make pr-go` before pushing

### Documentation

- [ ] I created a pull request [to the documentation](https://codeberg.org/forgejo/docs) to explain to Forgejo users how to use this change.
- [x] I did not document these changes and I do not expect someone else to do it.

### Release notes

- [x] This change will be noticed by a Forgejo user or admin (feature, bug fix, performance, etc.). I suggest to include a release note for this change.
- [ ] This change is not visible to a Forgejo user or admin (refactor, dependency upgrade, etc.). I think there is no need to add a release note for this change.

Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/12310
Reviewed-by: Andreas Ahlenstorf <aahlenst@noreply.codeberg.org>
2026-04-29 19:13:01 +02:00

150 lines
5.5 KiB
Go

// Copyright 2019 The Gitea Authors. All rights reserved.
// SPDX-License-Identifier: MIT
package auth
import (
"context"
"net/http"
auth_model "forgejo.org/models/auth"
user_model "forgejo.org/models/user"
"forgejo.org/modules/optional"
"forgejo.org/modules/session"
"forgejo.org/modules/timeutil"
"forgejo.org/modules/web/middleware"
"forgejo.org/services/authz"
)
// DataStore represents a data store
type DataStore middleware.ContextDataStore
// SessionStore represents a session store
type SessionStore session.Store
// Method represents an authentication method (plugin) for HTTP requests.
type Method interface {
// Verify tries to validate credentials provided in the request, and returns one of the [MethodOutput] results
// indicating the result of its validation.
Verify(http *http.Request, w http.ResponseWriter, sess SessionStore) MethodOutput
}
// When attempting to authenticate with an authentication [Method], one of the MethodOutput implementations must be
// returned. This interface serves as a enum of supported outputs, plus related values for each enum. Outputs are
// [AuthenticationSuccess], [AuthenticationNotAttempted], [AuthenticationAttemptedWithFailure], and
// [AuthenticationError].
type MethodOutput interface {
isMethodOutput()
}
// Authentication positively identified the incoming request as successfully authenticated with the result in the
// attached [AuthenticationResult]. For example, if a username and password were provided and we confirmed that those
// credentials matched an existing user in the database, then AuthenticationSuccess would be returned.
type AuthenticationSuccess struct {
Result AuthenticationResult
}
// Authentication method was not found to be applicable for the given request. For example, if a request did not contain
// `Authorization: Basic ...`, then a basic authentication method would return AuthenticationNotAttempted to indicate
// that this method didn't apply to the incoming request.
type AuthenticationNotAttempted struct{}
// Authentication method was attempted against the request and positively identified to be an incorrect credential. For
// example, if a request contained `Authorization: Basic ...`, and the username and password that were provided were
// found to not match any user, AuthenticationAttemptedIncorrectCredential would be returned. This is typically an
// indicator of a `401 Unauthorized ...` response.
type AuthenticationAttemptedIncorrectCredential struct {
Error error
}
// Authentication was attempted and an unexpected internal error occurred.
type AuthenticationError struct {
Error error
}
func (*AuthenticationSuccess) isMethodOutput() {}
func (*AuthenticationNotAttempted) isMethodOutput() {}
func (*AuthenticationAttemptedIncorrectCredential) isMethodOutput() {}
func (*AuthenticationError) isMethodOutput() {}
// PasswordAuthenticator represents a source of authentication
type PasswordAuthenticator interface {
Authenticate(ctx context.Context, user *user_model.User, login, password string) (*user_model.User, error)
}
// LocalTwoFASkipper represents a source of authentication that can skip local 2fa
type LocalTwoFASkipper interface {
IsSkipLocalTwoFA() bool
}
// SynchronizableSource represents a source that can synchronize users
type SynchronizableSource interface {
Sync(ctx context.Context, updateExisting bool) error
}
type AuthenticationResult interface {
// May return `nil` to represent an anonymous, unauthenticated user.
User() *user_model.User
// Optional permission scope indicated by the authentication method
Scope() optional.Option[auth_model.AccessTokenScope]
// Optional authorization reducer indicated by the authentication method
Reducer() authz.AuthorizationReducer
// Identifies if the authentication involved the user's password. If so, and the user has 2FA enabled, some
// restrictions may be applied.
IsPasswordAuthentication() bool
// Identifies if the authentication was performed by a reverse proxy.
IsReverseProxyAuthentication() bool
// Defined scopes of the [OAuth2Grant] as a comma-separated string, if authenticated via an OAuth access token JWT.
// Otherwise, None.
OAuth2GrantScopes() optional.Option[string]
// If authenticated as an Actions task (using ${{ forgejo.token }}), then indicates the specific task that performed
// the authentication.
ActionsTaskID() optional.Option[int64]
// If the authentication method used has a limited time validity, such as a JWT with an `exp` claim, that expiry
// time can be accessed through this method. Otherwise, returns None.
ExpiresAt() optional.Option[timeutil.TimeStamp]
}
type BaseAuthenticationResult struct{}
func (*BaseAuthenticationResult) OAuth2GrantScopes() optional.Option[string] {
return optional.None[string]()
}
func (*BaseAuthenticationResult) IsPasswordAuthentication() bool {
return false
}
func (*BaseAuthenticationResult) IsReverseProxyAuthentication() bool {
return false
}
func (*BaseAuthenticationResult) ActionsTaskID() optional.Option[int64] {
return optional.None[int64]()
}
func (*BaseAuthenticationResult) Reducer() authz.AuthorizationReducer {
return nil
}
func (*BaseAuthenticationResult) Scope() optional.Option[auth_model.AccessTokenScope] {
return optional.None[auth_model.AccessTokenScope]()
}
func (*BaseAuthenticationResult) ExpiresAt() optional.Option[timeutil.TimeStamp] {
return optional.None[timeutil.TimeStamp]()
}
type UnauthenticatedResult struct {
*BaseAuthenticationResult
}
func (*UnauthenticatedResult) User() *user_model.User {
return nil
}