2019-11-25 06:28:49 +01:00
|
|
|
use chrono::Utc;
|
2019-12-06 22:12:41 +01:00
|
|
|
use rocket_contrib::json::Json;
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2020-07-14 18:00:09 +02:00
|
|
|
use crate::{
|
|
|
|
api::{EmptyResult, JsonResult, JsonUpcase, Notify, NumberOrString, PasswordData, UpdateType},
|
|
|
|
auth::{decode_delete, decode_invite, decode_verify_email, Headers},
|
|
|
|
crypto,
|
|
|
|
db::{models::*, DbConn},
|
|
|
|
mail, CONFIG,
|
|
|
|
};
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2020-07-14 18:00:09 +02:00
|
|
|
pub fn routes() -> Vec<rocket::Route> {
|
2018-10-10 20:40:39 +02:00
|
|
|
routes![
|
|
|
|
register,
|
|
|
|
profile,
|
|
|
|
put_profile,
|
|
|
|
post_profile,
|
|
|
|
get_public_keys,
|
|
|
|
post_keys,
|
|
|
|
post_password,
|
|
|
|
post_kdf,
|
2018-11-24 23:00:41 +01:00
|
|
|
post_rotatekey,
|
2018-10-10 20:40:39 +02:00
|
|
|
post_sstamp,
|
|
|
|
post_email_token,
|
|
|
|
post_email,
|
2019-11-25 06:28:49 +01:00
|
|
|
post_verify_email,
|
|
|
|
post_verify_email_token,
|
|
|
|
post_delete_recover,
|
|
|
|
post_delete_recover_token,
|
2018-10-10 20:40:39 +02:00
|
|
|
delete_account,
|
|
|
|
post_delete_account,
|
|
|
|
revision_date,
|
|
|
|
password_hint,
|
|
|
|
prelogin,
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
2018-02-10 01:00:55 +01:00
|
|
|
#[derive(Deserialize, Debug)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct RegisterData {
|
2018-06-01 00:18:50 +02:00
|
|
|
Email: String,
|
2018-09-19 17:30:14 +02:00
|
|
|
Kdf: Option<i32>,
|
|
|
|
KdfIterations: Option<i32>,
|
2018-06-01 00:18:50 +02:00
|
|
|
Key: String,
|
|
|
|
Keys: Option<KeysData>,
|
|
|
|
MasterPasswordHash: String,
|
|
|
|
MasterPasswordHint: Option<String>,
|
|
|
|
Name: Option<String>,
|
2018-12-21 04:16:41 +01:00
|
|
|
Token: Option<String>,
|
|
|
|
OrganizationUserId: Option<String>,
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Deserialize, Debug)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct KeysData {
|
2018-06-01 00:35:30 +02:00
|
|
|
EncryptedPrivateKey: String,
|
|
|
|
PublicKey: String,
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/accounts/register", data = "<data>")]
|
2018-06-01 00:18:50 +02:00
|
|
|
fn register(data: JsonUpcase<RegisterData>, conn: DbConn) -> EmptyResult {
|
|
|
|
let data: RegisterData = data.into_inner().data;
|
2018-02-17 23:38:55 +01:00
|
|
|
|
2018-09-10 15:51:40 +02:00
|
|
|
let mut user = match User::find_by_mail(&data.Email, &conn) {
|
2018-11-24 23:00:41 +01:00
|
|
|
Some(user) => {
|
2019-01-08 15:11:16 +01:00
|
|
|
if !user.password_hash.is_empty() {
|
2020-04-09 10:42:27 +02:00
|
|
|
if CONFIG.is_signup_allowed(&data.Email) {
|
2019-11-01 23:34:42 +01:00
|
|
|
err!("User already exists")
|
|
|
|
} else {
|
|
|
|
err!("Registration not allowed or user already exists")
|
|
|
|
}
|
2019-01-08 15:11:16 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(token) = data.Token {
|
2019-01-19 21:36:34 +01:00
|
|
|
let claims = decode_invite(&token)?;
|
2019-01-08 15:11:16 +01:00
|
|
|
if claims.email == data.Email {
|
2018-12-15 03:56:00 +01:00
|
|
|
user
|
|
|
|
} else {
|
2019-01-08 15:11:16 +01:00
|
|
|
err!("Registration email does not match invite email")
|
|
|
|
}
|
|
|
|
} else if Invitation::take(&data.Email, &conn) {
|
|
|
|
for mut user_org in UserOrganization::find_invited_by_user(&user.uuid, &conn).iter_mut() {
|
|
|
|
user_org.status = UserOrgStatus::Accepted as i32;
|
|
|
|
user_org.save(&conn)?;
|
2018-11-24 23:00:41 +01:00
|
|
|
}
|
2019-01-08 15:11:16 +01:00
|
|
|
|
|
|
|
user
|
2020-04-09 10:42:27 +02:00
|
|
|
} else if CONFIG.is_signup_allowed(&data.Email) {
|
2018-12-24 00:27:12 +01:00
|
|
|
err!("Account with this email already exists")
|
2018-09-10 15:51:40 +02:00
|
|
|
} else {
|
2019-11-01 23:34:42 +01:00
|
|
|
err!("Registration not allowed or user already exists")
|
2018-09-10 15:51:40 +02:00
|
|
|
}
|
2018-11-24 23:00:41 +01:00
|
|
|
}
|
2018-09-10 15:51:40 +02:00
|
|
|
None => {
|
2020-04-09 10:42:27 +02:00
|
|
|
// Order is important here; the invitation check must come first
|
|
|
|
// because the bitwarden_rs admin can invite anyone, regardless
|
|
|
|
// of other signup restrictions.
|
|
|
|
if Invitation::take(&data.Email, &conn) || CONFIG.is_signup_allowed(&data.Email) {
|
2019-01-08 15:11:16 +01:00
|
|
|
User::new(data.Email.clone())
|
2018-09-10 15:51:40 +02:00
|
|
|
} else {
|
2019-11-01 23:34:42 +01:00
|
|
|
err!("Registration not allowed or user already exists")
|
2018-09-10 15:51:40 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2019-01-08 15:11:16 +01:00
|
|
|
// Make sure we don't leave a lingering invitation.
|
|
|
|
Invitation::take(&data.Email, &conn);
|
|
|
|
|
2018-09-19 17:30:14 +02:00
|
|
|
if let Some(client_kdf_iter) = data.KdfIterations {
|
|
|
|
user.client_kdf_iter = client_kdf_iter;
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(client_kdf_type) = data.Kdf {
|
|
|
|
user.client_kdf_type = client_kdf_type;
|
|
|
|
}
|
|
|
|
|
2018-09-11 15:25:12 +02:00
|
|
|
user.set_password(&data.MasterPasswordHash);
|
2019-05-20 21:24:29 +02:00
|
|
|
user.akey = data.Key;
|
2018-02-10 01:00:55 +01:00
|
|
|
|
|
|
|
// Add extra fields if present
|
2018-06-01 00:18:50 +02:00
|
|
|
if let Some(name) = data.Name {
|
2018-02-10 01:00:55 +01:00
|
|
|
user.name = name;
|
|
|
|
}
|
|
|
|
|
2018-06-01 00:18:50 +02:00
|
|
|
if let Some(hint) = data.MasterPasswordHint {
|
2018-02-10 01:00:55 +01:00
|
|
|
user.password_hint = Some(hint);
|
|
|
|
}
|
|
|
|
|
2018-06-01 00:18:50 +02:00
|
|
|
if let Some(keys) = data.Keys {
|
2018-06-01 00:35:30 +02:00
|
|
|
user.private_key = Some(keys.EncryptedPrivateKey);
|
|
|
|
user.public_key = Some(keys.PublicKey);
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
|
|
|
|
2019-11-25 06:28:49 +01:00
|
|
|
if CONFIG.mail_enabled() {
|
|
|
|
if CONFIG.signups_verify() {
|
|
|
|
if let Err(e) = mail::send_welcome_must_verify(&user.email, &user.uuid) {
|
|
|
|
error!("Error sending welcome email: {:#?}", e);
|
|
|
|
}
|
|
|
|
|
|
|
|
user.last_verifying_at = Some(user.created_at);
|
|
|
|
} else {
|
|
|
|
if let Err(e) = mail::send_welcome(&user.email) {
|
|
|
|
error!("Error sending welcome email: {:#?}", e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-19 21:52:53 +01:00
|
|
|
user.save(&conn)
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#[get("/accounts/profile")]
|
2018-04-24 22:01:55 +02:00
|
|
|
fn profile(headers: Headers, conn: DbConn) -> JsonResult {
|
|
|
|
Ok(Json(headers.user.to_json(&conn)))
|
|
|
|
}
|
|
|
|
|
2018-06-17 00:06:59 +02:00
|
|
|
#[derive(Deserialize, Debug)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct ProfileData {
|
|
|
|
#[serde(rename = "Culture")]
|
2018-11-24 23:00:41 +01:00
|
|
|
_Culture: String, // Ignored, always use en-US
|
2018-06-17 00:06:59 +02:00
|
|
|
MasterPasswordHint: Option<String>,
|
|
|
|
Name: String,
|
|
|
|
}
|
|
|
|
|
2018-08-15 17:10:40 +02:00
|
|
|
#[put("/accounts/profile", data = "<data>")]
|
|
|
|
fn put_profile(data: JsonUpcase<ProfileData>, headers: Headers, conn: DbConn) -> JsonResult {
|
|
|
|
post_profile(data, headers, conn)
|
|
|
|
}
|
|
|
|
|
2018-06-17 00:06:59 +02:00
|
|
|
#[post("/accounts/profile", data = "<data>")]
|
|
|
|
fn post_profile(data: JsonUpcase<ProfileData>, headers: Headers, conn: DbConn) -> JsonResult {
|
|
|
|
let data: ProfileData = data.into_inner().data;
|
|
|
|
|
|
|
|
let mut user = headers.user;
|
|
|
|
|
|
|
|
user.name = data.Name;
|
2018-09-11 13:00:59 +02:00
|
|
|
user.password_hint = match data.MasterPasswordHint {
|
|
|
|
Some(ref h) if h.is_empty() => None,
|
|
|
|
_ => data.MasterPasswordHint,
|
|
|
|
};
|
2018-12-19 21:52:53 +01:00
|
|
|
user.save(&conn)?;
|
|
|
|
Ok(Json(user.to_json(&conn)))
|
2018-06-17 00:06:59 +02:00
|
|
|
}
|
|
|
|
|
2018-04-24 22:01:55 +02:00
|
|
|
#[get("/users/<uuid>/public-key")]
|
2018-05-30 22:30:45 +02:00
|
|
|
fn get_public_keys(uuid: String, _headers: Headers, conn: DbConn) -> JsonResult {
|
2018-04-24 22:01:55 +02:00
|
|
|
let user = match User::find_by_uuid(&uuid, &conn) {
|
|
|
|
Some(user) => user,
|
2018-11-24 23:00:41 +01:00
|
|
|
None => err!("User doesn't exist"),
|
2018-04-24 22:01:55 +02:00
|
|
|
};
|
|
|
|
|
2018-05-04 22:54:23 +02:00
|
|
|
Ok(Json(json!({
|
|
|
|
"UserId": user.uuid,
|
|
|
|
"PublicKey": user.public_key,
|
|
|
|
"Object":"userKey"
|
|
|
|
})))
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/accounts/keys", data = "<data>")]
|
2018-06-01 00:18:50 +02:00
|
|
|
fn post_keys(data: JsonUpcase<KeysData>, headers: Headers, conn: DbConn) -> JsonResult {
|
|
|
|
let data: KeysData = data.into_inner().data;
|
2018-02-17 23:38:55 +01:00
|
|
|
|
2018-02-10 01:00:55 +01:00
|
|
|
let mut user = headers.user;
|
|
|
|
|
2018-06-01 00:35:30 +02:00
|
|
|
user.private_key = Some(data.EncryptedPrivateKey);
|
|
|
|
user.public_key = Some(data.PublicKey);
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-12-19 21:52:53 +01:00
|
|
|
user.save(&conn)?;
|
2020-05-08 19:38:49 +02:00
|
|
|
|
|
|
|
Ok(Json(json!({
|
|
|
|
"PrivateKey": user.private_key,
|
|
|
|
"PublicKey": user.public_key,
|
|
|
|
"Object":"keys"
|
|
|
|
})))
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
|
|
|
|
2018-02-23 00:38:54 +01:00
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct ChangePassData {
|
2018-06-01 00:18:50 +02:00
|
|
|
MasterPasswordHash: String,
|
|
|
|
NewMasterPasswordHash: String,
|
|
|
|
Key: String,
|
2018-02-23 00:38:54 +01:00
|
|
|
}
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-02-23 00:38:54 +01:00
|
|
|
#[post("/accounts/password", data = "<data>")]
|
2018-06-01 00:18:50 +02:00
|
|
|
fn post_password(data: JsonUpcase<ChangePassData>, headers: Headers, conn: DbConn) -> EmptyResult {
|
|
|
|
let data: ChangePassData = data.into_inner().data;
|
2018-02-10 01:00:55 +01:00
|
|
|
let mut user = headers.user;
|
|
|
|
|
2018-06-01 00:18:50 +02:00
|
|
|
if !user.check_valid_password(&data.MasterPasswordHash) {
|
2018-02-10 01:00:55 +01:00
|
|
|
err!("Invalid password")
|
|
|
|
}
|
|
|
|
|
2018-06-01 00:18:50 +02:00
|
|
|
user.set_password(&data.NewMasterPasswordHash);
|
2019-05-20 21:24:29 +02:00
|
|
|
user.akey = data.Key;
|
2018-12-19 21:52:53 +01:00
|
|
|
user.save(&conn)
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
|
|
|
|
2018-09-19 17:30:14 +02:00
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct ChangeKdfData {
|
|
|
|
Kdf: i32,
|
|
|
|
KdfIterations: i32,
|
|
|
|
|
|
|
|
MasterPasswordHash: String,
|
|
|
|
NewMasterPasswordHash: String,
|
|
|
|
Key: String,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/accounts/kdf", data = "<data>")]
|
|
|
|
fn post_kdf(data: JsonUpcase<ChangeKdfData>, headers: Headers, conn: DbConn) -> EmptyResult {
|
|
|
|
let data: ChangeKdfData = data.into_inner().data;
|
|
|
|
let mut user = headers.user;
|
|
|
|
|
|
|
|
if !user.check_valid_password(&data.MasterPasswordHash) {
|
|
|
|
err!("Invalid password")
|
|
|
|
}
|
|
|
|
|
|
|
|
user.client_kdf_iter = data.KdfIterations;
|
|
|
|
user.client_kdf_type = data.Kdf;
|
|
|
|
user.set_password(&data.NewMasterPasswordHash);
|
2019-05-20 21:24:29 +02:00
|
|
|
user.akey = data.Key;
|
2018-12-19 21:52:53 +01:00
|
|
|
user.save(&conn)
|
2018-09-19 17:30:14 +02:00
|
|
|
}
|
|
|
|
|
2018-11-24 23:00:41 +01:00
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct UpdateFolderData {
|
|
|
|
Id: String,
|
|
|
|
Name: String,
|
|
|
|
}
|
|
|
|
|
|
|
|
use super::ciphers::CipherData;
|
|
|
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct KeyData {
|
|
|
|
Ciphers: Vec<CipherData>,
|
|
|
|
Folders: Vec<UpdateFolderData>,
|
|
|
|
Key: String,
|
|
|
|
PrivateKey: String,
|
|
|
|
MasterPasswordHash: String,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/accounts/key", data = "<data>")]
|
2018-12-30 23:34:31 +01:00
|
|
|
fn post_rotatekey(data: JsonUpcase<KeyData>, headers: Headers, conn: DbConn, nt: Notify) -> EmptyResult {
|
2018-11-24 23:00:41 +01:00
|
|
|
let data: KeyData = data.into_inner().data;
|
|
|
|
|
|
|
|
if !headers.user.check_valid_password(&data.MasterPasswordHash) {
|
|
|
|
err!("Invalid password")
|
|
|
|
}
|
|
|
|
|
|
|
|
let user_uuid = &headers.user.uuid;
|
|
|
|
|
|
|
|
// Update folder data
|
|
|
|
for folder_data in data.Folders {
|
|
|
|
let mut saved_folder = match Folder::find_by_uuid(&folder_data.Id, &conn) {
|
|
|
|
Some(folder) => folder,
|
|
|
|
None => err!("Folder doesn't exist"),
|
|
|
|
};
|
|
|
|
|
|
|
|
if &saved_folder.user_uuid != user_uuid {
|
|
|
|
err!("The folder is not owned by the user")
|
|
|
|
}
|
|
|
|
|
|
|
|
saved_folder.name = folder_data.Name;
|
2018-12-19 21:52:53 +01:00
|
|
|
saved_folder.save(&conn)?
|
2018-11-24 23:00:41 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Update cipher data
|
|
|
|
use super::ciphers::update_cipher_from_data;
|
|
|
|
|
|
|
|
for cipher_data in data.Ciphers {
|
|
|
|
let mut saved_cipher = match Cipher::find_by_uuid(cipher_data.Id.as_ref().unwrap(), &conn) {
|
|
|
|
Some(cipher) => cipher,
|
|
|
|
None => err!("Cipher doesn't exist"),
|
|
|
|
};
|
|
|
|
|
|
|
|
if saved_cipher.user_uuid.as_ref().unwrap() != user_uuid {
|
|
|
|
err!("The cipher is not owned by the user")
|
|
|
|
}
|
|
|
|
|
2018-12-30 23:34:31 +01:00
|
|
|
update_cipher_from_data(
|
|
|
|
&mut saved_cipher,
|
|
|
|
cipher_data,
|
|
|
|
&headers,
|
|
|
|
false,
|
|
|
|
&conn,
|
|
|
|
&nt,
|
|
|
|
UpdateType::CipherUpdate,
|
|
|
|
)?
|
2018-11-24 23:00:41 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Update user data
|
|
|
|
let mut user = headers.user;
|
|
|
|
|
2019-05-20 21:24:29 +02:00
|
|
|
user.akey = data.Key;
|
2018-11-24 23:00:41 +01:00
|
|
|
user.private_key = Some(data.PrivateKey);
|
|
|
|
user.reset_security_stamp();
|
|
|
|
|
2018-12-19 21:52:53 +01:00
|
|
|
user.save(&conn)
|
2018-11-24 23:00:41 +01:00
|
|
|
}
|
|
|
|
|
2018-02-10 01:00:55 +01:00
|
|
|
#[post("/accounts/security-stamp", data = "<data>")]
|
2018-06-01 00:18:50 +02:00
|
|
|
fn post_sstamp(data: JsonUpcase<PasswordData>, headers: Headers, conn: DbConn) -> EmptyResult {
|
|
|
|
let data: PasswordData = data.into_inner().data;
|
2018-02-10 01:00:55 +01:00
|
|
|
let mut user = headers.user;
|
|
|
|
|
2018-06-01 00:18:50 +02:00
|
|
|
if !user.check_valid_password(&data.MasterPasswordHash) {
|
2018-02-10 01:00:55 +01:00
|
|
|
err!("Invalid password")
|
|
|
|
}
|
|
|
|
|
2019-02-16 23:06:26 +01:00
|
|
|
Device::delete_all_by_user(&user.uuid, &conn)?;
|
2018-02-10 01:00:55 +01:00
|
|
|
user.reset_security_stamp();
|
2018-12-19 21:52:53 +01:00
|
|
|
user.save(&conn)
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
|
|
|
|
2018-02-23 00:38:54 +01:00
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
2018-06-17 00:06:59 +02:00
|
|
|
struct EmailTokenData {
|
2018-06-01 00:18:50 +02:00
|
|
|
MasterPasswordHash: String,
|
|
|
|
NewEmail: String,
|
2018-02-23 00:38:54 +01:00
|
|
|
}
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-02-23 00:38:54 +01:00
|
|
|
#[post("/accounts/email-token", data = "<data>")]
|
2018-06-17 00:06:59 +02:00
|
|
|
fn post_email_token(data: JsonUpcase<EmailTokenData>, headers: Headers, conn: DbConn) -> EmptyResult {
|
|
|
|
let data: EmailTokenData = data.into_inner().data;
|
2019-11-25 06:28:49 +01:00
|
|
|
let mut user = headers.user;
|
2018-06-17 00:06:59 +02:00
|
|
|
|
2019-11-25 06:28:49 +01:00
|
|
|
if !user.check_valid_password(&data.MasterPasswordHash) {
|
2018-06-17 00:06:59 +02:00
|
|
|
err!("Invalid password")
|
|
|
|
}
|
|
|
|
|
|
|
|
if User::find_by_mail(&data.NewEmail, &conn).is_some() {
|
|
|
|
err!("Email already in use");
|
|
|
|
}
|
|
|
|
|
2020-05-24 23:00:26 +02:00
|
|
|
if !CONFIG.is_email_domain_allowed(&data.NewEmail) {
|
|
|
|
err!("Email domain not allowed");
|
2019-11-25 06:28:49 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
let token = crypto::generate_token(6)?;
|
|
|
|
|
|
|
|
if CONFIG.mail_enabled() {
|
|
|
|
if let Err(e) = mail::send_change_email(&data.NewEmail, &token) {
|
|
|
|
error!("Error sending change-email email: {:#?}", e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
user.email_new = Some(data.NewEmail);
|
|
|
|
user.email_new_token = Some(token);
|
|
|
|
user.save(&conn)
|
2018-06-17 00:06:59 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct ChangeEmailData {
|
|
|
|
MasterPasswordHash: String,
|
|
|
|
NewEmail: String,
|
2018-11-24 23:00:41 +01:00
|
|
|
|
2018-06-17 00:06:59 +02:00
|
|
|
Key: String,
|
|
|
|
NewMasterPasswordHash: String,
|
2019-11-25 06:28:49 +01:00
|
|
|
Token: NumberOrString,
|
2018-06-17 00:06:59 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/accounts/email", data = "<data>")]
|
2018-06-01 00:18:50 +02:00
|
|
|
fn post_email(data: JsonUpcase<ChangeEmailData>, headers: Headers, conn: DbConn) -> EmptyResult {
|
|
|
|
let data: ChangeEmailData = data.into_inner().data;
|
2018-02-10 01:00:55 +01:00
|
|
|
let mut user = headers.user;
|
|
|
|
|
2018-06-01 00:18:50 +02:00
|
|
|
if !user.check_valid_password(&data.MasterPasswordHash) {
|
2018-02-10 01:00:55 +01:00
|
|
|
err!("Invalid password")
|
|
|
|
}
|
|
|
|
|
2018-06-01 00:18:50 +02:00
|
|
|
if User::find_by_mail(&data.NewEmail, &conn).is_some() {
|
2018-02-15 00:40:34 +01:00
|
|
|
err!("Email already in use");
|
|
|
|
}
|
|
|
|
|
2019-11-25 06:28:49 +01:00
|
|
|
match user.email_new {
|
|
|
|
Some(ref val) => {
|
2019-12-06 22:12:41 +01:00
|
|
|
if val != &data.NewEmail {
|
2019-11-25 06:28:49 +01:00
|
|
|
err!("Email change mismatch");
|
|
|
|
}
|
2019-12-06 22:12:41 +01:00
|
|
|
}
|
2019-11-25 06:28:49 +01:00
|
|
|
None => err!("No email change pending"),
|
|
|
|
}
|
|
|
|
|
|
|
|
if CONFIG.mail_enabled() {
|
|
|
|
// Only check the token if we sent out an email...
|
|
|
|
match user.email_new_token {
|
2019-12-06 22:12:41 +01:00
|
|
|
Some(ref val) => {
|
2019-11-25 06:28:49 +01:00
|
|
|
if *val != data.Token.into_string() {
|
|
|
|
err!("Token mismatch");
|
|
|
|
}
|
2019-12-06 22:12:41 +01:00
|
|
|
}
|
2019-11-25 06:28:49 +01:00
|
|
|
None => err!("No email change pending"),
|
|
|
|
}
|
|
|
|
user.verified_at = Some(Utc::now().naive_utc());
|
|
|
|
} else {
|
|
|
|
user.verified_at = None;
|
|
|
|
}
|
|
|
|
|
2018-06-01 00:18:50 +02:00
|
|
|
user.email = data.NewEmail;
|
2019-11-25 06:28:49 +01:00
|
|
|
user.email_new = None;
|
|
|
|
user.email_new_token = None;
|
2018-11-24 23:00:41 +01:00
|
|
|
|
2018-06-17 00:06:59 +02:00
|
|
|
user.set_password(&data.NewMasterPasswordHash);
|
2019-05-20 21:24:29 +02:00
|
|
|
user.akey = data.Key;
|
2018-06-17 00:06:59 +02:00
|
|
|
|
2018-12-19 21:52:53 +01:00
|
|
|
user.save(&conn)
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
|
|
|
|
2019-11-25 06:28:49 +01:00
|
|
|
#[post("/accounts/verify-email")]
|
|
|
|
fn post_verify_email(headers: Headers, _conn: DbConn) -> EmptyResult {
|
|
|
|
let user = headers.user;
|
|
|
|
|
|
|
|
if !CONFIG.mail_enabled() {
|
|
|
|
err!("Cannot verify email address");
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Err(e) = mail::send_verify_email(&user.email, &user.uuid) {
|
|
|
|
error!("Error sending delete account email: {:#?}", e);
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct VerifyEmailTokenData {
|
|
|
|
UserId: String,
|
|
|
|
Token: String,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/accounts/verify-email-token", data = "<data>")]
|
|
|
|
fn post_verify_email_token(data: JsonUpcase<VerifyEmailTokenData>, conn: DbConn) -> EmptyResult {
|
|
|
|
let data: VerifyEmailTokenData = data.into_inner().data;
|
|
|
|
|
|
|
|
let mut user = match User::find_by_uuid(&data.UserId, &conn) {
|
|
|
|
Some(user) => user,
|
|
|
|
None => err!("User doesn't exist"),
|
|
|
|
};
|
|
|
|
|
|
|
|
let claims = match decode_verify_email(&data.Token) {
|
|
|
|
Ok(claims) => claims,
|
|
|
|
Err(_) => err!("Invalid claim"),
|
|
|
|
};
|
|
|
|
if claims.sub != user.uuid {
|
2019-12-06 22:12:41 +01:00
|
|
|
err!("Invalid claim");
|
2019-11-25 06:28:49 +01:00
|
|
|
}
|
|
|
|
user.verified_at = Some(Utc::now().naive_utc());
|
|
|
|
user.last_verifying_at = None;
|
|
|
|
user.login_verify_count = 0;
|
|
|
|
if let Err(e) = user.save(&conn) {
|
|
|
|
error!("Error saving email verification: {:#?}", e);
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct DeleteRecoverData {
|
|
|
|
Email: String,
|
|
|
|
}
|
|
|
|
|
2019-12-06 22:12:41 +01:00
|
|
|
#[post("/accounts/delete-recover", data = "<data>")]
|
2019-11-25 06:28:49 +01:00
|
|
|
fn post_delete_recover(data: JsonUpcase<DeleteRecoverData>, conn: DbConn) -> EmptyResult {
|
|
|
|
let data: DeleteRecoverData = data.into_inner().data;
|
|
|
|
|
|
|
|
let user = User::find_by_mail(&data.Email, &conn);
|
|
|
|
|
|
|
|
if CONFIG.mail_enabled() {
|
|
|
|
if let Some(user) = user {
|
|
|
|
if let Err(e) = mail::send_delete_account(&user.email, &user.uuid) {
|
|
|
|
error!("Error sending delete account email: {:#?}", e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
} else {
|
|
|
|
// We don't support sending emails, but we shouldn't allow anybody
|
|
|
|
// to delete accounts without at least logging in... And if the user
|
|
|
|
// cannot remember their password then they will need to contact
|
|
|
|
// the administrator to delete it...
|
|
|
|
err!("Please contact the administrator to delete your account");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct DeleteRecoverTokenData {
|
|
|
|
UserId: String,
|
|
|
|
Token: String,
|
|
|
|
}
|
|
|
|
|
2019-12-06 22:12:41 +01:00
|
|
|
#[post("/accounts/delete-recover-token", data = "<data>")]
|
2019-11-25 06:28:49 +01:00
|
|
|
fn post_delete_recover_token(data: JsonUpcase<DeleteRecoverTokenData>, conn: DbConn) -> EmptyResult {
|
|
|
|
let data: DeleteRecoverTokenData = data.into_inner().data;
|
|
|
|
|
|
|
|
let user = match User::find_by_uuid(&data.UserId, &conn) {
|
|
|
|
Some(user) => user,
|
|
|
|
None => err!("User doesn't exist"),
|
|
|
|
};
|
|
|
|
|
|
|
|
let claims = match decode_delete(&data.Token) {
|
|
|
|
Ok(claims) => claims,
|
|
|
|
Err(_) => err!("Invalid claim"),
|
|
|
|
};
|
|
|
|
if claims.sub != user.uuid {
|
2019-12-06 22:12:41 +01:00
|
|
|
err!("Invalid claim");
|
2019-11-25 06:28:49 +01:00
|
|
|
}
|
|
|
|
user.delete(&conn)
|
|
|
|
}
|
|
|
|
|
2018-02-10 01:00:55 +01:00
|
|
|
#[post("/accounts/delete", data = "<data>")]
|
2018-09-18 12:13:45 +02:00
|
|
|
fn post_delete_account(data: JsonUpcase<PasswordData>, headers: Headers, conn: DbConn) -> EmptyResult {
|
|
|
|
delete_account(data, headers, conn)
|
|
|
|
}
|
|
|
|
|
|
|
|
#[delete("/accounts", data = "<data>")]
|
2018-06-01 00:18:50 +02:00
|
|
|
fn delete_account(data: JsonUpcase<PasswordData>, headers: Headers, conn: DbConn) -> EmptyResult {
|
|
|
|
let data: PasswordData = data.into_inner().data;
|
2018-02-15 00:53:11 +01:00
|
|
|
let user = headers.user;
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-06-01 00:18:50 +02:00
|
|
|
if !user.check_valid_password(&data.MasterPasswordHash) {
|
2018-02-10 01:00:55 +01:00
|
|
|
err!("Invalid password")
|
|
|
|
}
|
2018-11-24 23:00:41 +01:00
|
|
|
|
2018-12-19 21:52:53 +01:00
|
|
|
user.delete(&conn)
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#[get("/accounts/revision-date")]
|
2018-02-17 20:47:13 +01:00
|
|
|
fn revision_date(headers: Headers) -> String {
|
2018-08-10 18:17:44 +02:00
|
|
|
let revision_date = headers.user.updated_at.timestamp_millis();
|
2018-02-17 20:47:13 +01:00
|
|
|
revision_date.to_string()
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
2018-08-10 15:21:42 +02:00
|
|
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct PasswordHintData {
|
|
|
|
Email: String,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/accounts/password-hint", data = "<data>")]
|
|
|
|
fn password_hint(data: JsonUpcase<PasswordHintData>, conn: DbConn) -> EmptyResult {
|
|
|
|
let data: PasswordHintData = data.into_inner().data;
|
|
|
|
|
2018-10-04 00:01:04 +02:00
|
|
|
let hint = match User::find_by_mail(&data.Email, &conn) {
|
|
|
|
Some(user) => user.password_hint,
|
|
|
|
None => return Ok(()),
|
|
|
|
};
|
2018-08-15 08:32:19 +02:00
|
|
|
|
2019-02-02 01:09:21 +01:00
|
|
|
if CONFIG.mail_enabled() {
|
|
|
|
mail::send_password_hint(&data.Email, hint)?;
|
2019-01-25 18:23:51 +01:00
|
|
|
} else if CONFIG.show_password_hint() {
|
2018-10-04 00:01:04 +02:00
|
|
|
if let Some(hint) = hint {
|
2018-09-11 13:04:34 +02:00
|
|
|
err!(format!("Your password hint is: {}", &hint));
|
|
|
|
} else {
|
2018-09-13 21:55:23 +02:00
|
|
|
err!("Sorry, you have no password hint...");
|
2018-09-11 13:04:34 +02:00
|
|
|
}
|
2018-08-10 15:21:42 +02:00
|
|
|
}
|
2018-08-15 08:32:19 +02:00
|
|
|
|
|
|
|
Ok(())
|
2018-08-10 15:21:42 +02:00
|
|
|
}
|
2018-08-24 19:02:34 +02:00
|
|
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct PreloginData {
|
|
|
|
Email: String,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/accounts/prelogin", data = "<data>")]
|
|
|
|
fn prelogin(data: JsonUpcase<PreloginData>, conn: DbConn) -> JsonResult {
|
|
|
|
let data: PreloginData = data.into_inner().data;
|
|
|
|
|
2018-09-13 23:04:52 +02:00
|
|
|
let (kdf_type, kdf_iter) = match User::find_by_mail(&data.Email, &conn) {
|
2018-09-19 17:30:14 +02:00
|
|
|
Some(user) => (user.client_kdf_type, user.client_kdf_iter),
|
|
|
|
None => (User::CLIENT_KDF_TYPE_DEFAULT, User::CLIENT_KDF_ITER_DEFAULT),
|
2018-09-13 23:04:52 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
Ok(Json(json!({
|
|
|
|
"Kdf": kdf_type,
|
|
|
|
"KdfIterations": kdf_iter
|
|
|
|
})))
|
2018-08-24 19:02:34 +02:00
|
|
|
}
|