2018-10-17 22:25:28 +02:00
|
|
|
use rocket::request::LenientForm;
|
|
|
|
use rocket::Route;
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-10-10 20:40:39 +02:00
|
|
|
use rocket_contrib::json::Json;
|
|
|
|
use serde_json::Value;
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-07-12 21:46:50 +02:00
|
|
|
use num_traits::FromPrimitive;
|
|
|
|
|
2018-12-07 02:05:45 +01:00
|
|
|
use crate::db::models::*;
|
|
|
|
use crate::db::DbConn;
|
2018-02-17 20:47:13 +01:00
|
|
|
|
2018-12-07 02:05:45 +01:00
|
|
|
use crate::util::{self, JsonMap};
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-12-07 02:05:45 +01:00
|
|
|
use crate::api::{ApiResult, EmptyResult, JsonResult};
|
2018-02-17 20:47:13 +01:00
|
|
|
|
2018-12-09 17:58:38 +01:00
|
|
|
use crate::auth::ClientIp;
|
|
|
|
|
2018-12-07 02:05:45 +01:00
|
|
|
use crate::CONFIG;
|
2018-07-13 15:58:50 +02:00
|
|
|
|
2018-02-10 01:00:55 +01:00
|
|
|
pub fn routes() -> Vec<Route> {
|
2018-07-12 21:46:50 +02:00
|
|
|
routes![login]
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
|
|
|
|
2018-10-10 20:40:39 +02:00
|
|
|
#[post("/connect/token", data = "<data>")]
|
2018-12-09 17:58:38 +01:00
|
|
|
fn login(data: LenientForm<ConnectData>, conn: DbConn, ip: ClientIp) -> JsonResult {
|
2018-10-10 20:40:39 +02:00
|
|
|
let data: ConnectData = data.into_inner();
|
2018-10-17 22:25:28 +02:00
|
|
|
validate_data(&data)?;
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-06-01 15:08:03 +02:00
|
|
|
match data.grant_type {
|
2018-10-17 22:25:28 +02:00
|
|
|
GrantType::refresh_token => _refresh_login(data, conn),
|
2018-12-09 17:58:38 +01:00
|
|
|
GrantType::password => _password_login(data, conn, ip),
|
2018-06-01 15:08:03 +02:00
|
|
|
}
|
|
|
|
}
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-10-17 22:25:28 +02:00
|
|
|
fn _refresh_login(data: ConnectData, conn: DbConn) -> JsonResult {
|
2018-06-01 15:08:03 +02:00
|
|
|
// Extract token
|
2018-10-17 22:25:28 +02:00
|
|
|
let token = data.refresh_token.unwrap();
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-06-01 15:08:03 +02:00
|
|
|
// Get device by refresh token
|
2018-10-17 22:25:28 +02:00
|
|
|
let mut device = match Device::find_by_refresh_token(&token, &conn) {
|
2018-06-01 15:08:03 +02:00
|
|
|
Some(device) => device,
|
2018-07-12 21:46:50 +02:00
|
|
|
None => err!("Invalid refresh token"),
|
2018-06-01 15:08:03 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
// COMMON
|
|
|
|
let user = User::find_by_uuid(&device.user_uuid, &conn).unwrap();
|
|
|
|
let orgs = UserOrganization::find_by_user(&user.uuid, &conn);
|
|
|
|
|
|
|
|
let (access_token, expires_in) = device.refresh_tokens(&user, orgs);
|
2018-10-14 14:28:12 +02:00
|
|
|
match device.save(&conn) {
|
2018-10-17 22:25:28 +02:00
|
|
|
Ok(()) => Ok(Json(json!({
|
|
|
|
"access_token": access_token,
|
|
|
|
"expires_in": expires_in,
|
|
|
|
"token_type": "Bearer",
|
|
|
|
"refresh_token": device.refresh_token,
|
|
|
|
"Key": user.key,
|
|
|
|
"PrivateKey": user.private_key,
|
|
|
|
}))),
|
2018-12-09 17:58:38 +01:00
|
|
|
Err(e) => err!("Failed to add device to user", e),
|
2018-10-14 14:28:12 +02:00
|
|
|
}
|
2018-06-01 15:08:03 +02:00
|
|
|
}
|
|
|
|
|
2018-12-09 17:58:38 +01:00
|
|
|
fn _password_login(data: ConnectData, conn: DbConn, ip: ClientIp) -> JsonResult {
|
2018-06-01 15:08:03 +02:00
|
|
|
// Validate scope
|
2018-10-17 22:25:28 +02:00
|
|
|
let scope = data.scope.as_ref().unwrap();
|
2018-06-01 15:08:03 +02:00
|
|
|
if scope != "api offline_access" {
|
|
|
|
err!("Scope not supported")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the user
|
2018-10-17 22:25:28 +02:00
|
|
|
let username = data.username.as_ref().unwrap();
|
2018-06-01 15:08:03 +02:00
|
|
|
let user = match User::find_by_mail(username, &conn) {
|
|
|
|
Some(user) => user,
|
2018-08-26 00:07:59 +02:00
|
|
|
None => err!(format!(
|
|
|
|
"Username or password is incorrect. Try again. IP: {}. Username: {}.",
|
2018-12-09 17:58:38 +01:00
|
|
|
ip.ip, username
|
2018-08-26 00:07:59 +02:00
|
|
|
)),
|
2018-06-01 15:08:03 +02:00
|
|
|
};
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-06-01 15:08:03 +02:00
|
|
|
// Check password
|
2018-10-17 22:25:28 +02:00
|
|
|
let password = data.password.as_ref().unwrap();
|
2018-06-01 15:08:03 +02:00
|
|
|
if !user.check_valid_password(password) {
|
2018-08-26 00:07:59 +02:00
|
|
|
err!(format!(
|
|
|
|
"Username or password is incorrect. Try again. IP: {}. Username: {}.",
|
2018-12-09 17:58:38 +01:00
|
|
|
ip.ip, username
|
2018-08-26 00:07:59 +02:00
|
|
|
))
|
2018-06-01 15:08:03 +02:00
|
|
|
}
|
2018-07-12 21:46:50 +02:00
|
|
|
|
2018-12-07 14:32:40 +01:00
|
|
|
let device_type = util::try_parse_string(data.device_type.as_ref()).unwrap_or(0);
|
2018-12-07 15:01:29 +01:00
|
|
|
let device_id = data.device_identifier.clone().unwrap_or_else(crate::util::get_uuid);
|
2018-12-07 14:32:40 +01:00
|
|
|
let device_name = data.device_name.clone().unwrap_or("unknown_device".into());
|
2018-06-01 15:08:03 +02:00
|
|
|
|
|
|
|
// Find device or create new
|
|
|
|
let mut device = match Device::find_by_uuid(&device_id, &conn) {
|
|
|
|
Some(device) => {
|
2018-12-09 17:58:38 +01:00
|
|
|
// Check if owned device, and recreate if not
|
2018-06-01 15:08:03 +02:00
|
|
|
if device.user_uuid != user.uuid {
|
2018-12-09 17:58:38 +01:00
|
|
|
info!("Device exists but is owned by another user. The old device will be discarded");
|
|
|
|
Device::new(device_id, user.uuid.clone(), device_name, device_type)
|
2018-10-12 16:20:10 +02:00
|
|
|
} else {
|
|
|
|
device
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
2018-06-01 15:08:03 +02:00
|
|
|
}
|
2018-12-09 17:58:38 +01:00
|
|
|
None => Device::new(device_id, user.uuid.clone(), device_name, device_type)
|
2018-06-01 15:08:03 +02:00
|
|
|
};
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-10-17 22:25:28 +02:00
|
|
|
let twofactor_token = twofactor_auth(&user.uuid, &data.clone(), &mut device, &conn)?;
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-06-01 15:08:03 +02:00
|
|
|
// Common
|
2018-02-10 01:00:55 +01:00
|
|
|
let user = User::find_by_uuid(&device.user_uuid, &conn).unwrap();
|
2018-04-24 22:01:55 +02:00
|
|
|
let orgs = UserOrganization::find_by_user(&user.uuid, &conn);
|
|
|
|
|
|
|
|
let (access_token, expires_in) = device.refresh_tokens(&user, orgs);
|
2018-12-09 17:58:38 +01:00
|
|
|
if let Err(e) = device.save(&conn) {
|
|
|
|
err!("Failed to add device to user", e)
|
2018-10-14 14:28:12 +02:00
|
|
|
}
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-06-01 15:08:03 +02:00
|
|
|
let mut result = json!({
|
2018-02-10 01:00:55 +01:00
|
|
|
"access_token": access_token,
|
|
|
|
"expires_in": expires_in,
|
|
|
|
"token_type": "Bearer",
|
|
|
|
"refresh_token": device.refresh_token,
|
|
|
|
"Key": user.key,
|
2018-06-01 15:08:03 +02:00
|
|
|
"PrivateKey": user.private_key,
|
|
|
|
//"TwoFactorToken": "11122233333444555666777888999"
|
|
|
|
});
|
|
|
|
|
|
|
|
if let Some(token) = twofactor_token {
|
|
|
|
result["TwoFactorToken"] = Value::String(token);
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(Json(result))
|
|
|
|
}
|
|
|
|
|
2018-07-12 21:46:50 +02:00
|
|
|
fn twofactor_auth(
|
|
|
|
user_uuid: &str,
|
|
|
|
data: &ConnectData,
|
|
|
|
device: &mut Device,
|
|
|
|
conn: &DbConn,
|
|
|
|
) -> ApiResult<Option<String>> {
|
|
|
|
let twofactors_raw = TwoFactor::find_by_user(user_uuid, conn);
|
|
|
|
// Remove u2f challenge twofactors (impl detail)
|
|
|
|
let twofactors: Vec<_> = twofactors_raw.iter().filter(|tf| tf.type_ < 1000).collect();
|
|
|
|
|
|
|
|
let providers: Vec<_> = twofactors.iter().map(|tf| tf.type_).collect();
|
|
|
|
|
|
|
|
// No twofactor token if twofactor is disabled
|
2018-09-13 21:55:23 +02:00
|
|
|
if twofactors.is_empty() {
|
2018-07-12 21:46:50 +02:00
|
|
|
return Ok(None);
|
|
|
|
}
|
|
|
|
|
2018-10-17 22:25:28 +02:00
|
|
|
let provider = data.two_factor_provider.unwrap_or(providers[0]); // If we aren't given a two factor provider, asume the first one
|
2018-07-12 21:46:50 +02:00
|
|
|
|
2018-10-17 22:25:28 +02:00
|
|
|
let twofactor_code = match data.two_factor_token {
|
|
|
|
Some(ref code) => code,
|
2018-07-12 21:46:50 +02:00
|
|
|
None => err_json!(_json_err_twofactor(&providers, user_uuid, conn)?),
|
|
|
|
};
|
|
|
|
|
|
|
|
let twofactor = twofactors.iter().filter(|tf| tf.type_ == provider).nth(0);
|
|
|
|
|
|
|
|
match TwoFactorType::from_i32(provider) {
|
|
|
|
Some(TwoFactorType::Remember) => {
|
2018-10-17 22:25:28 +02:00
|
|
|
match device.twofactor_remember {
|
|
|
|
Some(ref remember) if remember == twofactor_code => return Ok(None), // No twofactor token needed here
|
2018-07-12 21:46:50 +02:00
|
|
|
_ => err_json!(_json_err_twofactor(&providers, user_uuid, conn)?),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Some(TwoFactorType::Authenticator) => {
|
|
|
|
let twofactor = match twofactor {
|
|
|
|
Some(tf) => tf,
|
|
|
|
None => err!("TOTP not enabled"),
|
|
|
|
};
|
|
|
|
|
|
|
|
let totp_code: u64 = match twofactor_code.parse() {
|
|
|
|
Ok(code) => code,
|
|
|
|
_ => err!("Invalid TOTP code"),
|
|
|
|
};
|
|
|
|
|
|
|
|
if !twofactor.check_totp_code(totp_code) {
|
|
|
|
err_json!(_json_err_twofactor(&providers, user_uuid, conn)?)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Some(TwoFactorType::U2f) => {
|
2018-12-07 02:05:45 +01:00
|
|
|
use crate::api::core::two_factor;
|
2018-07-12 21:46:50 +02:00
|
|
|
|
2018-10-17 22:25:28 +02:00
|
|
|
two_factor::validate_u2f_login(user_uuid, &twofactor_code, conn)?;
|
2018-07-12 21:46:50 +02:00
|
|
|
}
|
|
|
|
|
2018-11-16 02:43:09 +01:00
|
|
|
Some(TwoFactorType::YubiKey) => {
|
2018-12-07 02:05:45 +01:00
|
|
|
use crate::api::core::two_factor;
|
2018-11-16 02:43:09 +01:00
|
|
|
|
|
|
|
two_factor::validate_yubikey_login(user_uuid, twofactor_code, conn)?;
|
|
|
|
}
|
|
|
|
|
2018-07-12 21:46:50 +02:00
|
|
|
_ => err!("Invalid two factor provider"),
|
|
|
|
}
|
|
|
|
|
2018-10-17 22:25:28 +02:00
|
|
|
if data.two_factor_remember.unwrap_or(0) == 1 {
|
2018-07-12 21:46:50 +02:00
|
|
|
Ok(Some(device.refresh_twofactor_remember()))
|
|
|
|
} else {
|
|
|
|
device.delete_twofactor_remember();
|
|
|
|
Ok(None)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn _json_err_twofactor(providers: &[i32], user_uuid: &str, conn: &DbConn) -> ApiResult<Value> {
|
2018-12-07 02:05:45 +01:00
|
|
|
use crate::api::core::two_factor;
|
2018-07-12 21:46:50 +02:00
|
|
|
|
|
|
|
let mut result = json!({
|
2018-06-01 15:08:03 +02:00
|
|
|
"error" : "invalid_grant",
|
|
|
|
"error_description" : "Two factor required.",
|
2018-07-12 21:46:50 +02:00
|
|
|
"TwoFactorProviders" : providers,
|
|
|
|
"TwoFactorProviders2" : {} // { "0" : null }
|
|
|
|
});
|
|
|
|
|
|
|
|
for provider in providers {
|
|
|
|
result["TwoFactorProviders2"][provider.to_string()] = Value::Null;
|
|
|
|
|
|
|
|
match TwoFactorType::from_i32(*provider) {
|
|
|
|
Some(TwoFactorType::Authenticator) => { /* Nothing to do for TOTP */ }
|
|
|
|
|
2018-07-13 15:58:50 +02:00
|
|
|
Some(TwoFactorType::U2f) if CONFIG.domain_set => {
|
2018-07-12 21:46:50 +02:00
|
|
|
let request = two_factor::generate_u2f_login(user_uuid, conn)?;
|
|
|
|
let mut challenge_list = Vec::new();
|
|
|
|
|
|
|
|
for key in request.registered_keys {
|
|
|
|
let mut challenge_map = JsonMap::new();
|
|
|
|
|
|
|
|
challenge_map.insert("appId".into(), Value::String(request.app_id.clone()));
|
|
|
|
challenge_map
|
|
|
|
.insert("challenge".into(), Value::String(request.challenge.clone()));
|
|
|
|
challenge_map.insert("version".into(), Value::String(key.version));
|
|
|
|
challenge_map.insert(
|
|
|
|
"keyHandle".into(),
|
|
|
|
Value::String(key.key_handle.unwrap_or_default()),
|
|
|
|
);
|
|
|
|
|
|
|
|
challenge_list.push(Value::Object(challenge_map));
|
|
|
|
}
|
|
|
|
|
|
|
|
let mut map = JsonMap::new();
|
|
|
|
use serde_json;
|
|
|
|
let challenge_list_str = serde_json::to_string(&challenge_list).unwrap();
|
|
|
|
|
|
|
|
map.insert("Challenges".into(), Value::String(challenge_list_str));
|
|
|
|
result["TwoFactorProviders2"][provider.to_string()] = Value::Object(map);
|
|
|
|
}
|
|
|
|
|
2018-11-17 09:25:07 +01:00
|
|
|
Some(TwoFactorType::YubiKey) => {
|
|
|
|
let twofactor = match TwoFactor::find_by_user_and_type(user_uuid, TwoFactorType::YubiKey as i32, &conn) {
|
|
|
|
Some(tf) => tf,
|
|
|
|
None => err!("No YubiKey devices registered"),
|
|
|
|
};
|
|
|
|
|
|
|
|
let yubikey_metadata: two_factor::YubikeyMetadata = serde_json::from_str(&twofactor.data).expect("Can't parse Yubikey Metadata");
|
|
|
|
|
|
|
|
let mut map = JsonMap::new();
|
|
|
|
map.insert("Nfc".into(), Value::Bool(yubikey_metadata.Nfc));
|
|
|
|
result["TwoFactorProviders2"][provider.to_string()] = Value::Object(map);
|
2018-07-12 21:46:50 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
_ => {}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(result)
|
2018-06-01 15:08:03 +02:00
|
|
|
}
|
|
|
|
|
2018-10-17 22:25:28 +02:00
|
|
|
#[derive(FromForm, Debug, Clone)]
|
|
|
|
#[allow(non_snake_case)]
|
2018-02-10 01:00:55 +01:00
|
|
|
struct ConnectData {
|
|
|
|
grant_type: GrantType,
|
|
|
|
|
2018-10-17 22:25:28 +02:00
|
|
|
// Needed for grant_type="refresh_token"
|
|
|
|
refresh_token: Option<String>,
|
|
|
|
|
|
|
|
// Needed for grant_type="password"
|
|
|
|
client_id: Option<String>, // web, cli, desktop, browser, mobile
|
|
|
|
password: Option<String>,
|
|
|
|
scope: Option<String>,
|
|
|
|
username: Option<String>,
|
|
|
|
|
|
|
|
#[form(field = "deviceIdentifier")]
|
|
|
|
device_identifier: Option<String>,
|
|
|
|
#[form(field = "deviceName")]
|
|
|
|
device_name: Option<String>,
|
|
|
|
#[form(field = "deviceType")]
|
|
|
|
device_type: Option<String>,
|
|
|
|
|
|
|
|
// Needed for two-factor auth
|
|
|
|
#[form(field = "twoFactorProvider")]
|
|
|
|
two_factor_provider: Option<i32>,
|
|
|
|
#[form(field = "twoFactorToken")]
|
|
|
|
two_factor_token: Option<String>,
|
|
|
|
#[form(field = "twoFactorRemember")]
|
|
|
|
two_factor_remember: Option<i32>,
|
2018-07-12 21:46:50 +02:00
|
|
|
}
|
2018-02-15 19:05:57 +01:00
|
|
|
|
2018-10-17 22:25:28 +02:00
|
|
|
#[derive(FromFormValue, Debug, Clone, Copy)]
|
|
|
|
#[allow(non_camel_case_types)]
|
|
|
|
enum GrantType {
|
|
|
|
refresh_token,
|
|
|
|
password,
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
|
|
|
|
2018-10-17 22:25:28 +02:00
|
|
|
fn validate_data(data: &ConnectData) -> EmptyResult {
|
|
|
|
match data.grant_type {
|
|
|
|
GrantType::refresh_token => {
|
|
|
|
_check_is_some(&data.refresh_token, "refresh_token cannot be blank")
|
|
|
|
}
|
|
|
|
GrantType::password => {
|
|
|
|
_check_is_some(&data.client_id, "client_id cannot be blank")?;
|
|
|
|
_check_is_some(&data.password, "password cannot be blank")?;
|
|
|
|
_check_is_some(&data.scope, "scope cannot be blank")?;
|
2018-12-07 14:32:40 +01:00
|
|
|
_check_is_some(&data.username, "username cannot be blank")
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-10-17 22:25:28 +02:00
|
|
|
fn _check_is_some<T>(value: &Option<T>, msg: &str) -> EmptyResult {
|
|
|
|
if value.is_none() {
|
|
|
|
err!(msg)
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
2018-10-17 22:25:28 +02:00
|
|
|
Ok(())
|
2018-02-17 20:47:13 +01:00
|
|
|
}
|