2018-02-10 01:00:55 +01:00
|
|
|
use std::collections::HashMap;
|
|
|
|
|
2018-02-17 20:47:13 +01:00
|
|
|
use rocket::{Route, Outcome};
|
|
|
|
use rocket::request::{self, Request, FromRequest, Form, FormItems, FromForm};
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-06-01 15:08:03 +02:00
|
|
|
use rocket_contrib::{Json, Value};
|
2018-02-10 01:00:55 +01:00
|
|
|
|
|
|
|
use db::DbConn;
|
|
|
|
use db::models::*;
|
2018-02-17 20:47:13 +01:00
|
|
|
|
2018-02-10 01:00:55 +01:00
|
|
|
use util;
|
|
|
|
|
2018-02-23 00:38:54 +01:00
|
|
|
use api::JsonResult;
|
2018-02-17 20:47:13 +01:00
|
|
|
|
2018-02-10 01:00:55 +01:00
|
|
|
pub fn routes() -> Vec<Route> {
|
|
|
|
routes![ login]
|
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/connect/token", data = "<connect_data>")]
|
2018-02-17 20:47:13 +01:00
|
|
|
fn login(connect_data: Form<ConnectData>, device_type: DeviceType, conn: DbConn) -> JsonResult {
|
2018-02-10 01:00:55 +01:00
|
|
|
let data = connect_data.get();
|
|
|
|
|
2018-06-01 15:08:03 +02:00
|
|
|
match data.grant_type {
|
|
|
|
GrantType::RefreshToken =>_refresh_login(data, device_type, conn),
|
|
|
|
GrantType::Password => _password_login(data, device_type, conn)
|
|
|
|
}
|
|
|
|
}
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-06-01 15:08:03 +02:00
|
|
|
fn _refresh_login(data: &ConnectData, _device_type: DeviceType, conn: DbConn) -> JsonResult {
|
|
|
|
// Extract token
|
2018-06-11 15:44:37 +02:00
|
|
|
let token = data.get("refresh_token");
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-06-01 15:08:03 +02:00
|
|
|
// Get device by refresh token
|
|
|
|
let mut device = match Device::find_by_refresh_token(token, &conn) {
|
|
|
|
Some(device) => device,
|
|
|
|
None => err!("Invalid refresh token")
|
|
|
|
};
|
|
|
|
|
|
|
|
// COMMON
|
|
|
|
let user = User::find_by_uuid(&device.user_uuid, &conn).unwrap();
|
|
|
|
let orgs = UserOrganization::find_by_user(&user.uuid, &conn);
|
|
|
|
|
|
|
|
let (access_token, expires_in) = device.refresh_tokens(&user, orgs);
|
|
|
|
device.save(&conn);
|
|
|
|
|
|
|
|
Ok(Json(json!({
|
|
|
|
"access_token": access_token,
|
|
|
|
"expires_in": expires_in,
|
|
|
|
"token_type": "Bearer",
|
|
|
|
"refresh_token": device.refresh_token,
|
|
|
|
"Key": user.key,
|
|
|
|
"PrivateKey": user.private_key,
|
|
|
|
})))
|
|
|
|
}
|
|
|
|
|
|
|
|
fn _password_login(data: &ConnectData, device_type: DeviceType, conn: DbConn) -> JsonResult {
|
|
|
|
// Validate scope
|
2018-06-11 15:44:37 +02:00
|
|
|
let scope = data.get("scope");
|
2018-06-01 15:08:03 +02:00
|
|
|
if scope != "api offline_access" {
|
|
|
|
err!("Scope not supported")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the user
|
2018-06-11 15:44:37 +02:00
|
|
|
let username = data.get("username");
|
2018-06-01 15:08:03 +02:00
|
|
|
let user = match User::find_by_mail(username, &conn) {
|
|
|
|
Some(user) => user,
|
|
|
|
None => err!("Username or password is incorrect. Try again.")
|
|
|
|
};
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-06-01 15:08:03 +02:00
|
|
|
// Check password
|
2018-06-11 15:44:37 +02:00
|
|
|
let password = data.get("password");
|
2018-06-01 15:08:03 +02:00
|
|
|
if !user.check_valid_password(password) {
|
|
|
|
err!("Username or password is incorrect. Try again.")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Let's only use the header and ignore the 'devicetype' parameter
|
|
|
|
let device_type_num = device_type.0;
|
|
|
|
|
2018-06-11 15:44:37 +02:00
|
|
|
let (device_id, device_name) = if data.is_device {
|
|
|
|
(
|
|
|
|
data.get("deviceidentifier").clone(),
|
|
|
|
data.get("devicename").clone(),
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
(format!("web-{}", user.uuid), String::from("web"))
|
2018-06-01 15:08:03 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
// Find device or create new
|
|
|
|
let mut device = match Device::find_by_uuid(&device_id, &conn) {
|
|
|
|
Some(device) => {
|
|
|
|
// Check if valid device
|
|
|
|
if device.user_uuid != user.uuid {
|
|
|
|
device.delete(&conn);
|
|
|
|
err!("Device is not owned by user")
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
|
|
|
|
2018-06-01 15:08:03 +02:00
|
|
|
device
|
|
|
|
}
|
|
|
|
None => {
|
|
|
|
// Create new device
|
|
|
|
Device::new(device_id, user.uuid.clone(), device_name, device_type_num)
|
|
|
|
}
|
|
|
|
};
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-06-01 15:08:03 +02:00
|
|
|
let twofactor_token = if user.requires_twofactor() {
|
2018-06-11 15:44:37 +02:00
|
|
|
let twofactor_provider = util::parse_option_string(data.get_opt("twoFactorProvider")).unwrap_or(0);
|
|
|
|
let twofactor_code = match data.get_opt("twoFactorToken") {
|
2018-06-01 15:08:03 +02:00
|
|
|
Some(code) => code,
|
|
|
|
None => err_json!(_json_err_twofactor())
|
|
|
|
};
|
|
|
|
|
|
|
|
match twofactor_provider {
|
|
|
|
0 /* TOTP */ => {
|
|
|
|
let totp_code: u64 = match twofactor_code.parse() {
|
|
|
|
Ok(code) => code,
|
|
|
|
Err(_) => err!("Invalid Totp code")
|
|
|
|
};
|
|
|
|
|
|
|
|
if !user.check_totp_code(totp_code) {
|
|
|
|
err_json!(_json_err_twofactor())
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
2018-06-01 15:08:03 +02:00
|
|
|
|
2018-06-11 15:44:37 +02:00
|
|
|
if util::parse_option_string(data.get_opt("twoFactorRemember")).unwrap_or(0) == 1 {
|
2018-06-01 15:08:03 +02:00
|
|
|
device.refresh_twofactor_remember();
|
|
|
|
device.twofactor_remember.clone()
|
|
|
|
} else {
|
|
|
|
device.delete_twofactor_remember();
|
|
|
|
None
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
2018-06-01 15:08:03 +02:00
|
|
|
},
|
|
|
|
5 /* Remember */ => {
|
|
|
|
match device.twofactor_remember {
|
|
|
|
Some(ref remember) if remember == twofactor_code => (),
|
|
|
|
_ => err_json!(_json_err_twofactor())
|
|
|
|
};
|
|
|
|
None // No twofactor token needed here
|
|
|
|
},
|
|
|
|
_ => err!("Invalid two factor provider"),
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
2018-06-01 15:08:03 +02:00
|
|
|
} else { None }; // No twofactor token if twofactor is disabled
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-06-01 15:08:03 +02:00
|
|
|
// Common
|
2018-02-10 01:00:55 +01:00
|
|
|
let user = User::find_by_uuid(&device.user_uuid, &conn).unwrap();
|
2018-04-24 22:01:55 +02:00
|
|
|
let orgs = UserOrganization::find_by_user(&user.uuid, &conn);
|
|
|
|
|
|
|
|
let (access_token, expires_in) = device.refresh_tokens(&user, orgs);
|
2018-02-10 01:00:55 +01:00
|
|
|
device.save(&conn);
|
|
|
|
|
2018-06-01 15:08:03 +02:00
|
|
|
let mut result = json!({
|
2018-02-10 01:00:55 +01:00
|
|
|
"access_token": access_token,
|
|
|
|
"expires_in": expires_in,
|
|
|
|
"token_type": "Bearer",
|
|
|
|
"refresh_token": device.refresh_token,
|
|
|
|
"Key": user.key,
|
2018-06-01 15:08:03 +02:00
|
|
|
"PrivateKey": user.private_key,
|
|
|
|
//"TwoFactorToken": "11122233333444555666777888999"
|
|
|
|
});
|
|
|
|
|
|
|
|
if let Some(token) = twofactor_token {
|
|
|
|
result["TwoFactorToken"] = Value::String(token);
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(Json(result))
|
|
|
|
}
|
|
|
|
|
|
|
|
fn _json_err_twofactor() -> Value {
|
|
|
|
json!({
|
|
|
|
"error" : "invalid_grant",
|
|
|
|
"error_description" : "Two factor required.",
|
|
|
|
"TwoFactorProviders" : [ 0 ],
|
|
|
|
"TwoFactorProviders2" : { "0" : null }
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2018-06-11 15:44:37 +02:00
|
|
|
#[derive(Clone, Copy)]
|
2018-02-17 20:47:13 +01:00
|
|
|
struct DeviceType(i32);
|
|
|
|
|
|
|
|
impl<'a, 'r> FromRequest<'a, 'r> for DeviceType {
|
|
|
|
type Error = &'static str;
|
|
|
|
|
|
|
|
fn from_request(request: &'a Request<'r>) -> request::Outcome<Self, Self::Error> {
|
|
|
|
let headers = request.headers();
|
|
|
|
let type_opt = headers.get_one("Device-Type");
|
|
|
|
let type_num = util::parse_option_string(type_opt).unwrap_or(0);
|
|
|
|
|
|
|
|
Outcome::Success(DeviceType(type_num))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-02-10 01:00:55 +01:00
|
|
|
#[derive(Debug)]
|
|
|
|
struct ConnectData {
|
|
|
|
grant_type: GrantType,
|
2018-02-15 19:05:57 +01:00
|
|
|
is_device: bool,
|
2018-02-10 01:00:55 +01:00
|
|
|
data: HashMap<String, String>,
|
|
|
|
}
|
|
|
|
|
2018-02-15 19:05:57 +01:00
|
|
|
#[derive(Debug, Copy, Clone)]
|
|
|
|
enum GrantType { RefreshToken, Password }
|
|
|
|
|
2018-02-10 01:00:55 +01:00
|
|
|
impl ConnectData {
|
2018-06-11 15:44:37 +02:00
|
|
|
fn get(&self, key: &str) -> &String {
|
|
|
|
&self.data[&key.to_lowercase()]
|
|
|
|
}
|
|
|
|
|
|
|
|
fn get_opt(&self, key: &str) -> Option<&String> {
|
2018-02-10 01:00:55 +01:00
|
|
|
self.data.get(&key.to_lowercase())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
const VALUES_REFRESH: [&str; 1] = ["refresh_token"];
|
2018-02-15 19:05:57 +01:00
|
|
|
const VALUES_PASSWORD: [&str; 5] = ["client_id", "grant_type", "password", "scope", "username"];
|
|
|
|
const VALUES_DEVICE: [&str; 3] = ["deviceidentifier", "devicename", "devicetype"];
|
2018-02-10 01:00:55 +01:00
|
|
|
|
|
|
|
impl<'f> FromForm<'f> for ConnectData {
|
|
|
|
type Error = String;
|
|
|
|
|
2018-02-15 00:53:11 +01:00
|
|
|
fn from_form(items: &mut FormItems<'f>, _strict: bool) -> Result<Self, Self::Error> {
|
2018-02-10 01:00:55 +01:00
|
|
|
let mut data = HashMap::new();
|
|
|
|
|
|
|
|
// Insert data into map
|
|
|
|
for (key, value) in items {
|
2018-02-15 19:05:57 +01:00
|
|
|
match (key.url_decode(), value.url_decode()) {
|
|
|
|
(Ok(key), Ok(value)) => data.insert(key.to_lowercase(), value),
|
2018-06-11 15:44:37 +02:00
|
|
|
_ => return Err("Error decoding key or value".to_string()),
|
2018-02-10 01:00:55 +01:00
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate needed values
|
2018-02-15 19:05:57 +01:00
|
|
|
let (grant_type, is_device) =
|
|
|
|
match data.get("grant_type").map(String::as_ref) {
|
2018-02-10 01:00:55 +01:00
|
|
|
Some("refresh_token") => {
|
2018-02-15 19:05:57 +01:00
|
|
|
check_values(&data, &VALUES_REFRESH)?;
|
|
|
|
(GrantType::RefreshToken, false) // Device doesn't matter here
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
|
|
|
Some("password") => {
|
2018-02-15 19:05:57 +01:00
|
|
|
check_values(&data, &VALUES_PASSWORD)?;
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2018-06-11 15:44:37 +02:00
|
|
|
let is_device = match data["client_id"].as_ref() {
|
2018-02-15 19:05:57 +01:00
|
|
|
"browser" | "mobile" => check_values(&data, &VALUES_DEVICE)?,
|
|
|
|
_ => false
|
|
|
|
};
|
|
|
|
(GrantType::Password, is_device)
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
2018-06-11 15:44:37 +02:00
|
|
|
_ => return Err("Grant type not supported".to_string())
|
2018-02-10 01:00:55 +01:00
|
|
|
};
|
|
|
|
|
2018-02-15 19:05:57 +01:00
|
|
|
Ok(ConnectData { grant_type, is_device, data })
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-15 19:05:57 +01:00
|
|
|
fn check_values(map: &HashMap<String, String>, values: &[&str]) -> Result<bool, String> {
|
2018-02-10 01:00:55 +01:00
|
|
|
for value in values {
|
|
|
|
if !map.contains_key(*value) {
|
|
|
|
return Err(format!("{} cannot be blank", value));
|
|
|
|
}
|
|
|
|
}
|
2018-02-15 19:05:57 +01:00
|
|
|
Ok(true)
|
2018-02-17 20:47:13 +01:00
|
|
|
}
|