mirror of
https://github.com/yusing/godoxy.git
synced 2026-03-24 10:01:04 +01:00
Implement Signed Double Submit Cookie pattern to prevent CSRF attacks. Adds CSRF token generation, validation, and middleware for API endpoints. Safe methods (GET/HEAD/OPTIONS) automatically receive CSRF cookies, while unsafe methods require X-CSRF-Token header matching the cookie value with valid HMAC signature. Includes same-origin exemption for login/callback endpoints to support browser-based authentication flows.
73 lines
1.7 KiB
Go
73 lines
1.7 KiB
Go
package certapi
|
|
|
|
import (
|
|
"net/http"
|
|
"time"
|
|
|
|
"github.com/gin-gonic/gin"
|
|
"github.com/rs/zerolog/log"
|
|
autocertctx "github.com/yusing/godoxy/internal/autocert/types"
|
|
"github.com/yusing/godoxy/internal/logging/memlogger"
|
|
apitypes "github.com/yusing/goutils/apitypes"
|
|
"github.com/yusing/goutils/http/websocket"
|
|
)
|
|
|
|
// @x-id "renew"
|
|
// @BasePath /api/v1
|
|
// @Summary Renew cert
|
|
// @Description Renew cert
|
|
// @Tags cert,websocket
|
|
// @Produce plain
|
|
// @Success 200 {object} apitypes.SuccessResponse
|
|
// @Failure 400 {object} apitypes.ErrorResponse
|
|
// @Failure 403 {object} apitypes.ErrorResponse
|
|
// @Failure 500 {object} apitypes.ErrorResponse
|
|
// @Router /cert/renew [get]
|
|
func Renew(c *gin.Context) {
|
|
provider := autocertctx.FromCtx(c.Request.Context())
|
|
if provider == nil {
|
|
c.JSON(http.StatusNotFound, apitypes.Error("autocert is not enabled"))
|
|
return
|
|
}
|
|
|
|
manager, err := websocket.NewManagerWithUpgrade(c)
|
|
if err != nil {
|
|
c.Error(apitypes.InternalServerError(err, "failed to create websocket manager"))
|
|
return
|
|
}
|
|
defer manager.Close()
|
|
|
|
logs, cancel := memlogger.Events()
|
|
defer cancel()
|
|
|
|
go func() {
|
|
// Stream logs until WebSocket connection closes (renewal runs in background)
|
|
for {
|
|
select {
|
|
case <-manager.Context().Done():
|
|
return
|
|
case l := <-logs:
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
err = manager.WriteData(websocket.TextMessage, l, 10*time.Second)
|
|
if err != nil {
|
|
return
|
|
}
|
|
}
|
|
}
|
|
}()
|
|
|
|
// renewal happens in background
|
|
ok := provider.ForceExpiryAll()
|
|
if !ok {
|
|
log.Error().Msg("cert renewal already in progress")
|
|
time.Sleep(1 * time.Second) // wait for the log above to be sent
|
|
return
|
|
}
|
|
log.Info().Msg("cert force renewal requested")
|
|
|
|
provider.WaitRenewalDone(manager.Context())
|
|
}
|