2022-07-10 16:39:38 +02:00
|
|
|
#![forbid(unsafe_code, non_ascii_idents)]
|
|
|
|
#![deny(
|
|
|
|
rust_2018_idioms,
|
|
|
|
rust_2021_compatibility,
|
|
|
|
noop_method_call,
|
|
|
|
pointer_structural_match,
|
|
|
|
trivial_casts,
|
|
|
|
trivial_numeric_casts,
|
|
|
|
unused_import_braces,
|
|
|
|
clippy::cast_lossless,
|
|
|
|
clippy::clone_on_ref_ptr,
|
|
|
|
clippy::equatable_if_let,
|
|
|
|
clippy::float_cmp_const,
|
|
|
|
clippy::inefficient_to_string,
|
|
|
|
clippy::linkedlist,
|
|
|
|
clippy::macro_use_imports,
|
|
|
|
clippy::manual_assert,
|
|
|
|
clippy::match_wildcard_for_single_variants,
|
|
|
|
clippy::mem_forget,
|
|
|
|
clippy::string_add_assign,
|
|
|
|
clippy::string_to_string,
|
|
|
|
clippy::unnecessary_join,
|
|
|
|
clippy::unnecessary_self_imports,
|
|
|
|
clippy::unused_async,
|
|
|
|
clippy::verbose_file_reads,
|
|
|
|
clippy::zero_sized_map_values
|
|
|
|
)]
|
2020-07-14 23:44:01 +02:00
|
|
|
#![cfg_attr(feature = "unstable", feature(ip))]
|
2021-11-05 19:18:54 +01:00
|
|
|
// The recursion_limit is mainly triggered by the json!() macro.
|
|
|
|
// The more key/value pairs there are the more recursion occurs.
|
|
|
|
// We want to keep this as low as possible, but not higher then 128.
|
|
|
|
// If you go above 128 it will cause rust-analyzer to fail,
|
|
|
|
#![recursion_limit = "87"]
|
2018-10-10 20:40:39 +02:00
|
|
|
|
2022-03-20 18:51:24 +01:00
|
|
|
// When enabled use MiMalloc as malloc instead of the default malloc
|
|
|
|
#[cfg(feature = "enable_mimalloc")]
|
|
|
|
use mimalloc::MiMalloc;
|
|
|
|
#[cfg(feature = "enable_mimalloc")]
|
|
|
|
#[cfg_attr(feature = "enable_mimalloc", global_allocator)]
|
|
|
|
static GLOBAL: MiMalloc = MiMalloc;
|
|
|
|
|
2018-12-30 23:34:31 +01:00
|
|
|
#[macro_use]
|
|
|
|
extern crate rocket;
|
|
|
|
#[macro_use]
|
2021-01-31 20:07:42 +01:00
|
|
|
extern crate serde;
|
2018-12-30 23:34:31 +01:00
|
|
|
#[macro_use]
|
|
|
|
extern crate serde_json;
|
|
|
|
#[macro_use]
|
|
|
|
extern crate log;
|
|
|
|
#[macro_use]
|
|
|
|
extern crate diesel;
|
|
|
|
#[macro_use]
|
|
|
|
extern crate diesel_migrations;
|
2020-03-16 17:53:22 +01:00
|
|
|
|
2021-11-07 18:53:39 +01:00
|
|
|
use std::{
|
|
|
|
fs::{canonicalize, create_dir_all},
|
|
|
|
panic,
|
|
|
|
path::Path,
|
|
|
|
process::exit,
|
|
|
|
str::FromStr,
|
|
|
|
thread,
|
|
|
|
};
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2022-07-19 18:39:42 +02:00
|
|
|
use tokio::{
|
|
|
|
fs::File,
|
|
|
|
io::{AsyncBufReadExt, BufReader},
|
|
|
|
};
|
|
|
|
|
2018-12-30 23:34:31 +01:00
|
|
|
#[macro_use]
|
|
|
|
mod error;
|
2018-02-10 01:00:55 +01:00
|
|
|
mod api;
|
|
|
|
mod auth;
|
2019-01-25 18:23:51 +01:00
|
|
|
mod config;
|
2018-12-30 23:34:31 +01:00
|
|
|
mod crypto;
|
2020-08-18 17:15:44 +02:00
|
|
|
#[macro_use]
|
2018-12-30 23:34:31 +01:00
|
|
|
mod db;
|
2018-08-15 08:32:19 +02:00
|
|
|
mod mail;
|
2021-12-22 21:48:49 +01:00
|
|
|
mod ratelimit;
|
2018-12-30 23:34:31 +01:00
|
|
|
mod util;
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2019-01-25 18:23:51 +01:00
|
|
|
pub use config::CONFIG;
|
2019-02-14 02:03:37 +01:00
|
|
|
pub use error::{Error, MapResult};
|
2021-11-07 18:53:39 +01:00
|
|
|
use rocket::data::{Limits, ToByteUnit};
|
2021-02-27 04:40:12 +01:00
|
|
|
pub use util::is_running_in_docker;
|
2019-01-25 18:23:51 +01:00
|
|
|
|
2021-11-07 18:53:39 +01:00
|
|
|
#[rocket::main]
|
|
|
|
async fn main() -> Result<(), Error> {
|
2020-03-02 20:57:06 +01:00
|
|
|
parse_args();
|
2019-02-20 20:59:37 +01:00
|
|
|
launch_info();
|
|
|
|
|
2019-12-06 22:19:07 +01:00
|
|
|
use log::LevelFilter as LF;
|
|
|
|
let level = LF::from_str(&CONFIG.log_level()).expect("Valid log level");
|
|
|
|
init_logging(level).ok();
|
|
|
|
|
2021-03-27 15:03:07 +01:00
|
|
|
let extra_debug = matches!(level, LF::Trace | LF::Debug);
|
2018-12-06 20:35:25 +01:00
|
|
|
|
2022-07-19 18:39:42 +02:00
|
|
|
check_data_folder().await;
|
2021-06-25 20:49:44 +02:00
|
|
|
check_rsa_keys().unwrap_or_else(|_| {
|
|
|
|
error!("Error creating keys, exiting...");
|
|
|
|
exit(1);
|
|
|
|
});
|
2018-09-13 20:59:51 +02:00
|
|
|
check_web_vault();
|
2018-02-10 01:00:55 +01:00
|
|
|
|
2021-11-07 18:53:39 +01:00
|
|
|
create_dir(&CONFIG.icon_cache_folder(), "icon cache");
|
|
|
|
create_dir(&CONFIG.tmp_folder(), "tmp folder");
|
|
|
|
create_dir(&CONFIG.sends_folder(), "sends folder");
|
|
|
|
create_dir(&CONFIG.attachments_folder(), "attachments folder");
|
2019-11-06 20:21:47 +01:00
|
|
|
|
2022-03-20 18:51:24 +01:00
|
|
|
let pool = create_db_pool().await;
|
2021-11-07 18:53:39 +01:00
|
|
|
schedule_jobs(pool.clone()).await;
|
2021-11-16 17:07:55 +01:00
|
|
|
crate::db::models::TwoFactor::migrate_u2f_to_webauthn(&pool.get().await.unwrap()).await.unwrap();
|
2021-06-07 23:34:00 +02:00
|
|
|
|
2021-11-07 18:53:39 +01:00
|
|
|
launch_rocket(pool, extra_debug).await // Blocks until program termination.
|
2018-02-10 01:00:55 +01:00
|
|
|
}
|
|
|
|
|
2021-02-07 20:10:40 +01:00
|
|
|
const HELP: &str = "\
|
2021-04-27 23:18:32 +02:00
|
|
|
Alternative implementation of the Bitwarden server API written in Rust
|
2021-03-27 15:03:07 +01:00
|
|
|
|
2021-02-07 20:10:40 +01:00
|
|
|
USAGE:
|
2021-04-27 23:18:32 +02:00
|
|
|
vaultwarden
|
2021-03-27 15:03:07 +01:00
|
|
|
|
2021-02-07 20:10:40 +01:00
|
|
|
FLAGS:
|
|
|
|
-h, --help Prints help information
|
|
|
|
-v, --version Prints the app version
|
|
|
|
";
|
|
|
|
|
2022-01-23 23:40:59 +01:00
|
|
|
pub const VERSION: Option<&str> = option_env!("VW_VERSION");
|
|
|
|
|
2020-03-02 20:57:06 +01:00
|
|
|
fn parse_args() {
|
2021-02-07 20:10:40 +01:00
|
|
|
let mut pargs = pico_args::Arguments::from_env();
|
2022-01-23 23:40:59 +01:00
|
|
|
let version = VERSION.unwrap_or("(Version info from Git not present)");
|
2021-02-07 20:10:40 +01:00
|
|
|
|
|
|
|
if pargs.contains(["-h", "--help"]) {
|
2022-01-23 23:40:59 +01:00
|
|
|
println!("vaultwarden {}", version);
|
2021-02-07 20:10:40 +01:00
|
|
|
print!("{}", HELP);
|
|
|
|
exit(0);
|
|
|
|
} else if pargs.contains(["-v", "--version"]) {
|
2022-01-23 23:40:59 +01:00
|
|
|
println!("vaultwarden {}", version);
|
2020-03-02 20:57:06 +01:00
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-20 20:59:37 +01:00
|
|
|
fn launch_info() {
|
|
|
|
println!("/--------------------------------------------------------------------\\");
|
2021-04-27 23:18:32 +02:00
|
|
|
println!("| Starting Vaultwarden |");
|
2019-02-20 20:59:37 +01:00
|
|
|
|
2022-01-23 23:40:59 +01:00
|
|
|
if let Some(version) = VERSION {
|
2019-02-20 20:59:37 +01:00
|
|
|
println!("|{:^68}|", format!("Version {}", version));
|
|
|
|
}
|
|
|
|
|
|
|
|
println!("|--------------------------------------------------------------------|");
|
|
|
|
println!("| This is an *unofficial* Bitwarden implementation, DO NOT use the |");
|
|
|
|
println!("| official channels to report bugs/features, regardless of client. |");
|
2020-05-13 21:29:47 +02:00
|
|
|
println!("| Send usage/configuration questions or feature requests to: |");
|
2021-04-30 22:40:12 +02:00
|
|
|
println!("| https://vaultwarden.discourse.group/ |");
|
2020-05-13 21:29:47 +02:00
|
|
|
println!("| Report suspected bugs/issues in the software itself at: |");
|
2021-04-27 23:18:32 +02:00
|
|
|
println!("| https://github.com/dani-garcia/vaultwarden/issues/new |");
|
2019-02-20 20:59:37 +01:00
|
|
|
println!("\\--------------------------------------------------------------------/\n");
|
|
|
|
}
|
|
|
|
|
2019-12-06 22:19:07 +01:00
|
|
|
fn init_logging(level: log::LevelFilter) -> Result<(), fern::InitError> {
|
2021-11-28 13:02:27 +01:00
|
|
|
// Depending on the main log level we either want to disable or enable logging for trust-dns.
|
|
|
|
// Else if there are timeouts it will clutter the logs since trust-dns uses warn for this.
|
|
|
|
let trust_dns_level = if level >= log::LevelFilter::Debug {
|
|
|
|
level
|
|
|
|
} else {
|
|
|
|
log::LevelFilter::Off
|
|
|
|
};
|
|
|
|
|
2018-12-06 20:35:25 +01:00
|
|
|
let mut logger = fern::Dispatch::new()
|
2019-12-06 22:19:07 +01:00
|
|
|
.level(level)
|
|
|
|
// Hide unknown certificate errors if using self-signed
|
|
|
|
.level_for("rustls::session", log::LevelFilter::Off)
|
|
|
|
// Hide failed to close stream messages
|
|
|
|
.level_for("hyper::server", log::LevelFilter::Warn)
|
|
|
|
// Silence rocket logs
|
2022-06-26 14:49:26 +02:00
|
|
|
.level_for("_", log::LevelFilter::Warn)
|
2021-11-07 18:53:39 +01:00
|
|
|
.level_for("rocket::launch", log::LevelFilter::Error)
|
|
|
|
.level_for("rocket::launch_", log::LevelFilter::Error)
|
|
|
|
.level_for("rocket::rocket", log::LevelFilter::Warn)
|
|
|
|
.level_for("rocket::server", log::LevelFilter::Warn)
|
|
|
|
.level_for("rocket::fairing::fairings", log::LevelFilter::Warn)
|
|
|
|
.level_for("rocket::shield::shield", log::LevelFilter::Warn)
|
2020-12-08 17:33:15 +01:00
|
|
|
.level_for("hyper::proto", log::LevelFilter::Off)
|
2021-05-16 15:29:13 +02:00
|
|
|
.level_for("hyper::client", log::LevelFilter::Off)
|
|
|
|
// Prevent cookie_store logs
|
|
|
|
.level_for("cookie_store", log::LevelFilter::Off)
|
2021-11-28 13:02:27 +01:00
|
|
|
// Variable level for trust-dns used by reqwest
|
|
|
|
.level_for("trust_dns_proto", trust_dns_level)
|
2019-12-06 22:19:07 +01:00
|
|
|
.chain(std::io::stdout());
|
|
|
|
|
2020-11-18 12:07:08 +01:00
|
|
|
// Enable smtp debug logging only specifically for smtp when need.
|
|
|
|
// This can contain sensitive information we do not want in the default debug/trace logging.
|
|
|
|
if CONFIG.smtp_debug() {
|
2021-03-31 22:18:35 +02:00
|
|
|
println!(
|
|
|
|
"[WARNING] SMTP Debugging is enabled (SMTP_DEBUG=true). Sensitive information could be disclosed via logs!"
|
|
|
|
);
|
2020-11-18 12:07:08 +01:00
|
|
|
println!("[WARNING] Only enable SMTP_DEBUG during troubleshooting!\n");
|
|
|
|
logger = logger.level_for("lettre::transport::smtp", log::LevelFilter::Debug)
|
|
|
|
} else {
|
|
|
|
logger = logger.level_for("lettre::transport::smtp", log::LevelFilter::Off)
|
|
|
|
}
|
|
|
|
|
2019-12-06 22:19:07 +01:00
|
|
|
if CONFIG.extended_logging() {
|
|
|
|
logger = logger.format(|out, message, record| {
|
2018-12-30 23:34:31 +01:00
|
|
|
out.finish(format_args!(
|
2020-07-23 06:50:49 +02:00
|
|
|
"[{}][{}][{}] {}",
|
|
|
|
chrono::Local::now().format(&CONFIG.log_timestamp_format()),
|
2018-12-30 23:34:31 +01:00
|
|
|
record.target(),
|
|
|
|
record.level(),
|
|
|
|
message
|
|
|
|
))
|
2019-12-06 22:19:07 +01:00
|
|
|
});
|
|
|
|
} else {
|
|
|
|
logger = logger.format(|out, message, _| out.finish(format_args!("{}", message)));
|
|
|
|
}
|
2018-12-06 20:35:25 +01:00
|
|
|
|
2019-01-25 18:23:51 +01:00
|
|
|
if let Some(log_file) = CONFIG.log_file() {
|
2018-12-06 20:35:25 +01:00
|
|
|
logger = logger.chain(fern::log_file(log_file)?);
|
|
|
|
}
|
|
|
|
|
2019-04-26 22:08:26 +02:00
|
|
|
#[cfg(not(windows))]
|
|
|
|
{
|
|
|
|
if cfg!(feature = "enable_syslog") || CONFIG.use_syslog() {
|
2019-03-29 20:27:20 +01:00
|
|
|
logger = chain_syslog(logger);
|
|
|
|
}
|
|
|
|
}
|
2018-12-06 20:35:25 +01:00
|
|
|
|
|
|
|
logger.apply()?;
|
|
|
|
|
2020-02-25 14:10:52 +01:00
|
|
|
// Catch panics and log them instead of default output to StdErr
|
|
|
|
panic::set_hook(Box::new(|info| {
|
2020-03-16 17:53:22 +01:00
|
|
|
let thread = thread::current();
|
|
|
|
let thread = thread.name().unwrap_or("unnamed");
|
|
|
|
|
|
|
|
let msg = match info.payload().downcast_ref::<&'static str>() {
|
|
|
|
Some(s) => *s,
|
|
|
|
None => match info.payload().downcast_ref::<String>() {
|
|
|
|
Some(s) => &**s,
|
|
|
|
None => "Box<Any>",
|
|
|
|
},
|
|
|
|
};
|
|
|
|
|
2020-08-12 18:45:26 +02:00
|
|
|
let backtrace = backtrace::Backtrace::new();
|
|
|
|
|
2020-03-16 17:53:22 +01:00
|
|
|
match info.location() {
|
|
|
|
Some(location) => {
|
|
|
|
error!(
|
2020-08-12 18:45:26 +02:00
|
|
|
target: "panic", "thread '{}' panicked at '{}': {}:{}\n{:?}",
|
2020-03-16 17:53:22 +01:00
|
|
|
thread,
|
|
|
|
msg,
|
|
|
|
location.file(),
|
|
|
|
location.line(),
|
2020-08-12 18:45:26 +02:00
|
|
|
backtrace
|
2020-03-16 17:53:22 +01:00
|
|
|
);
|
|
|
|
}
|
2020-06-15 23:40:39 +02:00
|
|
|
None => error!(
|
|
|
|
target: "panic",
|
2020-08-12 18:45:26 +02:00
|
|
|
"thread '{}' panicked at '{}'\n{:?}",
|
2020-06-15 23:40:39 +02:00
|
|
|
thread,
|
|
|
|
msg,
|
2020-08-12 18:45:26 +02:00
|
|
|
backtrace
|
2020-06-15 23:40:39 +02:00
|
|
|
),
|
2020-03-16 17:53:22 +01:00
|
|
|
}
|
2020-02-25 14:10:52 +01:00
|
|
|
}));
|
|
|
|
|
2018-12-06 20:35:25 +01:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2019-03-29 20:27:20 +01:00
|
|
|
#[cfg(not(windows))]
|
2018-12-06 20:35:25 +01:00
|
|
|
fn chain_syslog(logger: fern::Dispatch) -> fern::Dispatch {
|
|
|
|
let syslog_fmt = syslog::Formatter3164 {
|
|
|
|
facility: syslog::Facility::LOG_USER,
|
|
|
|
hostname: None,
|
2021-04-27 23:18:32 +02:00
|
|
|
process: "vaultwarden".into(),
|
2018-12-06 20:35:25 +01:00
|
|
|
pid: 0,
|
|
|
|
};
|
|
|
|
|
|
|
|
match syslog::unix(syslog_fmt) {
|
|
|
|
Ok(sl) => logger.chain(sl),
|
|
|
|
Err(e) => {
|
|
|
|
error!("Unable to connect to syslog: {:?}", e);
|
|
|
|
logger
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-27 04:40:12 +01:00
|
|
|
fn create_dir(path: &str, description: &str) {
|
|
|
|
// Try to create the specified dir, if it doesn't already exist.
|
|
|
|
let err_msg = format!("Error creating {} directory '{}'", description, path);
|
|
|
|
create_dir_all(path).expect(&err_msg);
|
|
|
|
}
|
|
|
|
|
2022-07-19 18:39:42 +02:00
|
|
|
async fn check_data_folder() {
|
2021-02-27 04:40:12 +01:00
|
|
|
let data_folder = &CONFIG.data_folder();
|
|
|
|
let path = Path::new(data_folder);
|
|
|
|
if !path.exists() {
|
|
|
|
error!("Data folder '{}' doesn't exist.", data_folder);
|
|
|
|
if is_running_in_docker() {
|
|
|
|
error!("Verify that your data volume is mounted at the correct location.");
|
|
|
|
} else {
|
|
|
|
error!("Create the data folder and try again.");
|
|
|
|
}
|
|
|
|
exit(1);
|
|
|
|
}
|
2022-05-25 15:30:23 +02:00
|
|
|
|
2022-07-19 18:39:42 +02:00
|
|
|
if is_running_in_docker()
|
|
|
|
&& std::env::var("I_REALLY_WANT_VOLATILE_STORAGE").is_err()
|
|
|
|
&& !docker_data_folder_is_persistent(data_folder).await
|
|
|
|
{
|
2022-05-25 15:30:23 +02:00
|
|
|
error!(
|
|
|
|
"No persistent volume!\n\
|
|
|
|
########################################################################################\n\
|
|
|
|
# It looks like you did not configure a persistent volume! #\n\
|
|
|
|
# This will result in permanent data loss when the container is removed or updated! #\n\
|
|
|
|
# If you really want to use volatile storage set `I_REALLY_WANT_VOLATILE_STORAGE=true` #\n\
|
|
|
|
########################################################################################\n"
|
|
|
|
);
|
|
|
|
exit(1);
|
|
|
|
}
|
2019-11-06 20:21:47 +01:00
|
|
|
}
|
|
|
|
|
2022-07-19 18:39:42 +02:00
|
|
|
/// Detect when using Docker or Podman the DATA_FOLDER is either a bind-mount or a volume created manually.
|
|
|
|
/// If not created manually, then the data will not be persistent.
|
|
|
|
/// A none persistent volume in either Docker or Podman is represented by a 64 alphanumerical string.
|
|
|
|
/// If we detect this string, we will alert about not having a persistent self defined volume.
|
|
|
|
/// This probably means that someone forgot to add `-v /path/to/vaultwarden_data/:/data`
|
|
|
|
async fn docker_data_folder_is_persistent(data_folder: &str) -> bool {
|
|
|
|
if let Ok(mountinfo) = File::open("/proc/self/mountinfo").await {
|
|
|
|
// Since there can only be one mountpoint to the DATA_FOLDER
|
|
|
|
// We do a basic check for this mountpoint surrounded by a space.
|
|
|
|
let data_folder_match = if data_folder.starts_with('/') {
|
|
|
|
format!(" {data_folder} ")
|
|
|
|
} else {
|
|
|
|
format!(" /{data_folder} ")
|
|
|
|
};
|
|
|
|
let mut lines = BufReader::new(mountinfo).lines();
|
|
|
|
while let Some(line) = lines.next_line().await.unwrap_or_default() {
|
|
|
|
// Only execute a regex check if we find the base match
|
|
|
|
if line.contains(&data_folder_match) {
|
|
|
|
let re = regex::Regex::new(r"/volumes/[a-z0-9]{64}/_data /").unwrap();
|
|
|
|
if re.is_match(&line) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
// If we did found a match for the mountpoint, but not the regex, then still stop searching.
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// In all other cases, just assume a true.
|
|
|
|
// This is just an informative check to try and prevent data loss.
|
|
|
|
true
|
|
|
|
}
|
|
|
|
|
2021-06-26 14:21:58 +02:00
|
|
|
fn check_rsa_keys() -> Result<(), crate::error::Error> {
|
2018-02-17 01:13:02 +01:00
|
|
|
// If the RSA keys don't exist, try to create them
|
2021-06-25 20:49:44 +02:00
|
|
|
let priv_path = CONFIG.private_rsa_key();
|
|
|
|
let pub_path = CONFIG.public_rsa_key();
|
2019-02-20 20:59:37 +01:00
|
|
|
|
2021-06-25 20:49:44 +02:00
|
|
|
if !util::file_exists(&priv_path) {
|
|
|
|
let rsa_key = openssl::rsa::Rsa::generate(2048)?;
|
2018-12-30 23:34:31 +01:00
|
|
|
|
2021-06-25 20:49:44 +02:00
|
|
|
let priv_key = rsa_key.private_key_to_pem()?;
|
|
|
|
crate::util::write_file(&priv_path, &priv_key)?;
|
|
|
|
info!("Private key created correctly.");
|
|
|
|
}
|
2018-12-30 23:34:31 +01:00
|
|
|
|
2021-06-25 20:49:44 +02:00
|
|
|
if !util::file_exists(&pub_path) {
|
2022-07-15 19:13:26 +02:00
|
|
|
let rsa_key = openssl::rsa::Rsa::private_key_from_pem(&std::fs::read(&priv_path)?)?;
|
2018-02-17 01:13:02 +01:00
|
|
|
|
2021-06-25 20:49:44 +02:00
|
|
|
let pub_key = rsa_key.public_key_to_pem()?;
|
|
|
|
crate::util::write_file(&pub_path, &pub_key)?;
|
|
|
|
info!("Public key created correctly.");
|
2018-02-17 01:13:02 +01:00
|
|
|
}
|
2021-06-25 20:49:44 +02:00
|
|
|
|
|
|
|
auth::load_keys();
|
|
|
|
Ok(())
|
2018-02-17 01:13:02 +01:00
|
|
|
}
|
|
|
|
|
2018-04-24 22:38:23 +02:00
|
|
|
fn check_web_vault() {
|
2019-01-25 18:23:51 +01:00
|
|
|
if !CONFIG.web_vault_enabled() {
|
2018-06-12 21:09:42 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-01-25 18:23:51 +01:00
|
|
|
let index_path = Path::new(&CONFIG.web_vault_folder()).join("index.html");
|
2018-04-24 22:38:23 +02:00
|
|
|
|
|
|
|
if !index_path.exists() {
|
2021-03-31 22:18:35 +02:00
|
|
|
error!(
|
|
|
|
"Web vault is not found at '{}'. To install it, please follow the steps in: ",
|
|
|
|
CONFIG.web_vault_folder()
|
|
|
|
);
|
2021-04-27 23:18:32 +02:00
|
|
|
error!("https://github.com/dani-garcia/vaultwarden/wiki/Building-binary#install-the-web-vault");
|
2019-12-29 15:29:46 +01:00
|
|
|
error!("You can also set the environment variable 'WEB_VAULT_ENABLED=false' to disable it");
|
2018-04-24 22:38:23 +02:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-03-20 18:51:24 +01:00
|
|
|
async fn create_db_pool() -> db::DbPool {
|
|
|
|
match util::retry_db(db::DbPool::from_config, CONFIG.db_connection_retries()).await {
|
2020-08-18 17:15:44 +02:00
|
|
|
Ok(p) => p,
|
|
|
|
Err(e) => {
|
|
|
|
error!("Error creating database pool: {:?}", e);
|
|
|
|
exit(1);
|
|
|
|
}
|
2021-04-03 05:16:49 +02:00
|
|
|
}
|
|
|
|
}
|
2021-03-22 19:57:35 +01:00
|
|
|
|
2021-11-07 18:53:39 +01:00
|
|
|
async fn launch_rocket(pool: db::DbPool, extra_debug: bool) -> Result<(), Error> {
|
2020-02-19 06:27:00 +01:00
|
|
|
let basepath = &CONFIG.domain_path();
|
|
|
|
|
2021-11-07 18:53:39 +01:00
|
|
|
let mut config = rocket::Config::from(rocket::Config::figment());
|
|
|
|
config.temp_dir = canonicalize(CONFIG.tmp_folder()).unwrap().into();
|
2022-05-21 17:28:29 +02:00
|
|
|
config.cli_colors = false; // Make sure Rocket does not color any values for logging.
|
|
|
|
config.limits = Limits::new()
|
|
|
|
.limit("json", 20.megabytes()) // 20MB should be enough for very large imports, something like 5000+ vault entries
|
|
|
|
.limit("data-form", 525.megabytes()) // This needs to match the maximum allowed file size for Send
|
|
|
|
.limit("file", 525.megabytes()); // This needs to match the maximum allowed file size for attachments
|
2021-11-07 18:53:39 +01:00
|
|
|
|
2020-02-19 06:27:00 +01:00
|
|
|
// If adding more paths here, consider also adding them to
|
2019-12-06 22:19:07 +01:00
|
|
|
// crate::utils::LOGGED_ROUTES to make sure they appear in the log
|
2021-11-07 18:53:39 +01:00
|
|
|
let instance = rocket::custom(config)
|
|
|
|
.mount([basepath, "/"].concat(), api::web_routes())
|
|
|
|
.mount([basepath, "/api"].concat(), api::core_routes())
|
|
|
|
.mount([basepath, "/admin"].concat(), api::admin_routes())
|
|
|
|
.mount([basepath, "/identity"].concat(), api::identity_routes())
|
|
|
|
.mount([basepath, "/icons"].concat(), api::icons_routes())
|
|
|
|
.mount([basepath, "/notifications"].concat(), api::notifications_routes())
|
2022-09-25 04:02:16 +02:00
|
|
|
.register([basepath, "/"].concat(), api::web_catchers())
|
2022-09-25 10:55:55 +02:00
|
|
|
.register([basepath, "/api"].concat(), api::core_catchers())
|
2020-08-18 17:15:44 +02:00
|
|
|
.manage(pool)
|
2019-02-20 20:59:37 +01:00
|
|
|
.manage(api::start_notification_server())
|
2019-09-01 13:00:12 +02:00
|
|
|
.attach(util::AppHeaders())
|
2021-03-27 15:26:32 +01:00
|
|
|
.attach(util::Cors())
|
2020-06-15 23:40:39 +02:00
|
|
|
.attach(util::BetterLogging(extra_debug))
|
2021-11-07 18:53:39 +01:00
|
|
|
.ignite()
|
|
|
|
.await?;
|
|
|
|
|
|
|
|
CONFIG.set_rocket_shutdown_handle(instance.shutdown());
|
|
|
|
ctrlc::set_handler(move || {
|
|
|
|
info!("Exiting vaultwarden!");
|
|
|
|
CONFIG.shutdown();
|
|
|
|
})
|
|
|
|
.expect("Error setting Ctrl-C handler");
|
2019-02-20 20:59:37 +01:00
|
|
|
|
2022-05-11 22:03:07 +02:00
|
|
|
let _ = instance.launch().await?;
|
2021-11-07 18:53:39 +01:00
|
|
|
|
|
|
|
info!("Vaultwarden process exited!");
|
|
|
|
Ok(())
|
2019-01-11 14:18:13 +01:00
|
|
|
}
|
2021-04-03 05:16:49 +02:00
|
|
|
|
2021-11-07 18:53:39 +01:00
|
|
|
async fn schedule_jobs(pool: db::DbPool) {
|
2021-04-03 05:16:49 +02:00
|
|
|
if CONFIG.job_poll_interval_ms() == 0 {
|
|
|
|
info!("Job scheduler disabled.");
|
|
|
|
return;
|
|
|
|
}
|
2021-11-07 18:53:39 +01:00
|
|
|
|
2022-05-04 21:13:05 +02:00
|
|
|
let runtime = tokio::runtime::Runtime::new().unwrap();
|
2021-11-07 18:53:39 +01:00
|
|
|
|
2021-04-06 22:55:28 +02:00
|
|
|
thread::Builder::new()
|
|
|
|
.name("job-scheduler".to_string())
|
|
|
|
.spawn(move || {
|
2022-05-20 21:10:52 +02:00
|
|
|
use job_scheduler_ng::{Job, JobScheduler};
|
2022-05-04 21:13:05 +02:00
|
|
|
let _runtime_guard = runtime.enter();
|
2021-11-07 18:53:39 +01:00
|
|
|
|
2021-04-06 22:55:28 +02:00
|
|
|
let mut sched = JobScheduler::new();
|
|
|
|
|
|
|
|
// Purge sends that are past their deletion date.
|
|
|
|
if !CONFIG.send_purge_schedule().is_empty() {
|
|
|
|
sched.add(Job::new(CONFIG.send_purge_schedule().parse().unwrap(), || {
|
2021-11-07 18:53:39 +01:00
|
|
|
runtime.spawn(api::purge_sends(pool.clone()));
|
2021-04-06 22:55:28 +02:00
|
|
|
}));
|
|
|
|
}
|
2021-04-03 05:16:49 +02:00
|
|
|
|
2021-04-06 22:55:28 +02:00
|
|
|
// Purge trashed items that are old enough to be auto-deleted.
|
|
|
|
if !CONFIG.trash_purge_schedule().is_empty() {
|
|
|
|
sched.add(Job::new(CONFIG.trash_purge_schedule().parse().unwrap(), || {
|
2021-11-07 18:53:39 +01:00
|
|
|
runtime.spawn(api::purge_trashed_ciphers(pool.clone()));
|
2021-04-06 22:55:28 +02:00
|
|
|
}));
|
|
|
|
}
|
2021-04-03 05:52:15 +02:00
|
|
|
|
2021-10-25 10:36:05 +02:00
|
|
|
// Send email notifications about incomplete 2FA logins, which potentially
|
|
|
|
// indicates that a user's master password has been compromised.
|
|
|
|
if !CONFIG.incomplete_2fa_schedule().is_empty() {
|
|
|
|
sched.add(Job::new(CONFIG.incomplete_2fa_schedule().parse().unwrap(), || {
|
2021-11-07 18:53:39 +01:00
|
|
|
runtime.spawn(api::send_incomplete_2fa_notifications(pool.clone()));
|
2021-10-25 10:36:05 +02:00
|
|
|
}));
|
|
|
|
}
|
|
|
|
|
2021-10-19 10:27:50 +02:00
|
|
|
// Grant emergency access requests that have met the required wait time.
|
|
|
|
// This job should run before the emergency access reminders job to avoid
|
|
|
|
// sending reminders for requests that are about to be granted anyway.
|
2021-03-24 20:15:55 +01:00
|
|
|
if !CONFIG.emergency_request_timeout_schedule().is_empty() {
|
|
|
|
sched.add(Job::new(CONFIG.emergency_request_timeout_schedule().parse().unwrap(), || {
|
2021-11-07 18:53:39 +01:00
|
|
|
runtime.spawn(api::emergency_request_timeout_job(pool.clone()));
|
2021-03-24 20:15:55 +01:00
|
|
|
}));
|
|
|
|
}
|
|
|
|
|
2021-10-19 10:27:50 +02:00
|
|
|
// Send reminders to emergency access grantors that there are pending
|
|
|
|
// emergency access requests.
|
2021-03-24 20:15:55 +01:00
|
|
|
if !CONFIG.emergency_notification_reminder_schedule().is_empty() {
|
|
|
|
sched.add(Job::new(CONFIG.emergency_notification_reminder_schedule().parse().unwrap(), || {
|
2021-11-07 18:53:39 +01:00
|
|
|
runtime.spawn(api::emergency_notification_reminder_job(pool.clone()));
|
2021-03-24 20:15:55 +01:00
|
|
|
}));
|
|
|
|
}
|
|
|
|
|
2021-04-06 22:55:28 +02:00
|
|
|
// Periodically check for jobs to run. We probably won't need any
|
|
|
|
// jobs that run more often than once a minute, so a default poll
|
|
|
|
// interval of 30 seconds should be sufficient. Users who want to
|
|
|
|
// schedule jobs to run more frequently for some reason can reduce
|
|
|
|
// the poll interval accordingly.
|
2021-10-19 10:27:50 +02:00
|
|
|
//
|
|
|
|
// Note that the scheduler checks jobs in the order in which they
|
|
|
|
// were added, so if two jobs are both eligible to run at a given
|
|
|
|
// tick, the one that was added earlier will run first.
|
2021-04-06 22:55:28 +02:00
|
|
|
loop {
|
|
|
|
sched.tick();
|
2022-03-20 18:51:24 +01:00
|
|
|
runtime.block_on(async move {
|
|
|
|
tokio::time::sleep(tokio::time::Duration::from_millis(CONFIG.job_poll_interval_ms())).await
|
|
|
|
});
|
2021-04-06 22:55:28 +02:00
|
|
|
}
|
|
|
|
})
|
|
|
|
.expect("Error spawning job scheduler thread");
|
2021-04-03 05:16:49 +02:00
|
|
|
}
|