mirror of
https://github.com/OffchainLabs/prysm.git
synced 2026-01-08 07:03:58 -05:00
* Ran gopls modernize to fix everything go run golang.org/x/tools/gopls/internal/analysis/modernize/cmd/modernize@latest -fix -test ./... * Override rules_go provided dependency for golang.org/x/tools to v0.38.0. To update this, checked out rules_go, then ran `bazel run //go/tools/releaser -- upgrade-dep -mirror=false org_golang_x_tools` and copied the patches. * Fix buildtag violations and ignore buildtag violations in external * Introduce modernize analyzer package. * Add modernize "any" analyzer. * Fix violations of any analyzer * Add modernize "appendclipped" analyzer. * Fix violations of appendclipped * Add modernize "bloop" analyzer. * Add modernize "fmtappendf" analyzer. * Add modernize "forvar" analyzer. * Add modernize "mapsloop" analyzer. * Add modernize "minmax" analyzer. * Fix violations of minmax analyzer * Add modernize "omitzero" analyzer. * Add modernize "rangeint" analyzer. * Fix violations of rangeint. * Add modernize "reflecttypefor" analyzer. * Fix violations of reflecttypefor analyzer. * Add modernize "slicescontains" analyzer. * Add modernize "slicessort" analyzer. * Add modernize "slicesdelete" analyzer. This is disabled by default for now. See https://go.dev/issue/73686. * Add modernize "stringscutprefix" analyzer. * Add modernize "stringsbuilder" analyzer. * Fix violations of stringsbuilder analyzer. * Add modernize "stringsseq" analyzer. * Add modernize "testingcontext" analyzer. * Add modernize "waitgroup" analyzer. * Changelog fragment * gofmt * gazelle * Add modernize "newexpr" analyzer. * Disable newexpr until go1.26 * Add more details in WORKSPACE on how to update the override * @nalepae feedback on min() * gofmt * Fix violations of forvar
84 lines
2.7 KiB
Go
84 lines
2.7 KiB
Go
package rpc
|
|
|
|
import (
|
|
"context"
|
|
"net/http"
|
|
"strings"
|
|
|
|
"github.com/OffchainLabs/prysm/v7/api"
|
|
"github.com/OffchainLabs/prysm/v7/network/httputil"
|
|
"github.com/sirupsen/logrus"
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/grpc/codes"
|
|
"google.golang.org/grpc/metadata"
|
|
"google.golang.org/grpc/status"
|
|
)
|
|
|
|
// AuthTokenInterceptor is a gRPC unary interceptor to authorize incoming requests.
|
|
func (s *Server) AuthTokenInterceptor() grpc.UnaryServerInterceptor {
|
|
return func(
|
|
ctx context.Context,
|
|
req any,
|
|
info *grpc.UnaryServerInfo,
|
|
handler grpc.UnaryHandler,
|
|
) (any, error) {
|
|
if err := s.authorize(ctx); err != nil {
|
|
return nil, err
|
|
}
|
|
h, err := handler(ctx, req)
|
|
log.WithError(err).WithFields(logrus.Fields{
|
|
"FullMethod": info.FullMethod,
|
|
"Server": info.Server,
|
|
}).Debug("Request handled")
|
|
return h, err
|
|
}
|
|
}
|
|
|
|
// AuthTokenHandler is an HTTP handler to authorize a route.
|
|
func (s *Server) AuthTokenHandler(next http.Handler) http.Handler {
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
// if it's not initialize or has a web prefix
|
|
if (strings.Contains(r.URL.Path, api.WebApiUrlPrefix) || strings.Contains(r.URL.Path, api.KeymanagerApiPrefix)) && !strings.Contains(r.URL.Path, api.SystemLogsPrefix) {
|
|
// ignore some routes
|
|
reqToken := r.Header.Get("Authorization")
|
|
if reqToken == "" {
|
|
httputil.HandleError(w, "Unauthorized: no Authorization header passed. Please use an Authorization header with the jwt created in the prysm wallet", http.StatusUnauthorized)
|
|
return
|
|
}
|
|
tokenParts := strings.Split(reqToken, "Bearer ")
|
|
if len(tokenParts) != 2 {
|
|
httputil.HandleError(w, "Invalid token format", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
token := tokenParts[1]
|
|
if strings.TrimSpace(token) != s.authToken || strings.TrimSpace(s.authToken) == "" {
|
|
httputil.HandleError(w, "Forbidden: token value is invalid", http.StatusForbidden)
|
|
return
|
|
}
|
|
}
|
|
next.ServeHTTP(w, r)
|
|
})
|
|
}
|
|
|
|
// Authorize the token received is valid.
|
|
func (s *Server) authorize(ctx context.Context) error {
|
|
md, ok := metadata.FromIncomingContext(ctx)
|
|
if !ok {
|
|
return status.Errorf(codes.InvalidArgument, "Retrieving metadata failed")
|
|
}
|
|
|
|
authHeader, ok := md["authorization"]
|
|
if !ok {
|
|
return status.Errorf(codes.Unauthenticated, "Authorization token could not be found")
|
|
}
|
|
if len(authHeader) < 1 || !strings.Contains(authHeader[0], "Bearer ") {
|
|
return status.Error(codes.Unauthenticated, "Invalid auth header, needs Bearer {token}")
|
|
}
|
|
token := strings.Split(authHeader[0], "Bearer ")[1]
|
|
if strings.TrimSpace(token) != s.authToken || strings.TrimSpace(s.authToken) == "" {
|
|
return status.Errorf(codes.Unauthenticated, "Forbidden: token value is invalid")
|
|
}
|
|
return nil
|
|
}
|