use chrono::{NaiveDateTime, Utc}; use serde_json::Value; use uuid::Uuid; use crate::crypto; use crate::CONFIG; #[derive(Debug, Identifiable, Queryable, Insertable)] #[table_name = "users"] #[primary_key(uuid)] pub struct User { pub uuid: String, pub created_at: NaiveDateTime, pub updated_at: NaiveDateTime, pub email: String, pub name: String, pub password_hash: Vec, pub salt: Vec, pub password_iterations: i32, pub password_hint: Option, pub key: String, pub private_key: Option, pub public_key: Option, #[column_name = "totp_secret"] _totp_secret: Option, pub totp_recover: Option, pub security_stamp: String, pub equivalent_domains: String, pub excluded_globals: String, pub client_kdf_type: i32, pub client_kdf_iter: i32, } /// Local methods impl User { pub const CLIENT_KDF_TYPE_DEFAULT: i32 = 0; // PBKDF2: 0 pub const CLIENT_KDF_ITER_DEFAULT: i32 = 5_000; pub fn new(mail: String) -> Self { let now = Utc::now().naive_utc(); let email = mail.to_lowercase(); Self { uuid: Uuid::new_v4().to_string(), created_at: now, updated_at: now, name: email.clone(), email, key: String::new(), password_hash: Vec::new(), salt: crypto::get_random_64(), password_iterations: CONFIG.password_iterations, security_stamp: Uuid::new_v4().to_string(), password_hint: None, private_key: None, public_key: None, _totp_secret: None, totp_recover: None, equivalent_domains: "[]".to_string(), excluded_globals: "[]".to_string(), client_kdf_type: Self::CLIENT_KDF_TYPE_DEFAULT, client_kdf_iter: Self::CLIENT_KDF_ITER_DEFAULT, } } pub fn check_valid_password(&self, password: &str) -> bool { crypto::verify_password_hash(password.as_bytes(), &self.salt, &self.password_hash, self.password_iterations as u32) } pub fn check_valid_recovery_code(&self, recovery_code: &str) -> bool { if let Some(ref totp_recover) = self.totp_recover { recovery_code == totp_recover.to_lowercase() } else { false } } pub fn set_password(&mut self, password: &str) { self.password_hash = crypto::hash_password(password.as_bytes(), &self.salt, self.password_iterations as u32); } pub fn reset_security_stamp(&mut self) { self.security_stamp = Uuid::new_v4().to_string(); } pub fn is_server_admin(&self) -> bool { match CONFIG.server_admin_email { Some(ref server_admin_email) => &self.email == server_admin_email, None => false } } } use diesel; use diesel::prelude::*; use crate::db::DbConn; use crate::db::schema::{users, invitations}; use super::{Cipher, Folder, Device, UserOrganization, UserOrgType}; /// Database methods impl User { pub fn to_json(&self, conn: &DbConn) -> Value { use super::{UserOrganization, UserOrgType, UserOrgStatus, TwoFactor}; let mut orgs = UserOrganization::find_by_user(&self.uuid, conn); if self.is_server_admin() { orgs.push(UserOrganization::new_virtual(self.uuid.clone(), UserOrgType::Owner, UserOrgStatus::Confirmed)); } let orgs_json: Vec = orgs.iter().map(|c| c.to_json(&conn)).collect(); let twofactor_enabled = !TwoFactor::find_by_user(&self.uuid, conn).is_empty(); json!({ "Id": self.uuid, "Name": self.name, "Email": self.email, "EmailVerified": true, "Premium": true, "MasterPasswordHint": self.password_hint, "Culture": "en-US", "TwoFactorEnabled": twofactor_enabled, "Key": self.key, "PrivateKey": self.private_key, "SecurityStamp": self.security_stamp, "Organizations": orgs_json, "Object": "profile" }) } pub fn save(&mut self, conn: &DbConn) -> QueryResult<()> { self.updated_at = Utc::now().naive_utc(); diesel::replace_into(users::table) // Insert or update .values(&*self).execute(&**conn).and(Ok(())) } pub fn delete(self, conn: &DbConn) -> QueryResult<()> { for user_org in UserOrganization::find_by_user(&self.uuid, &*conn) { if user_org.type_ == UserOrgType::Owner { if UserOrganization::find_by_org_and_type( &user_org.org_uuid, UserOrgType::Owner as i32, &conn ).len() <= 1 { return Err(diesel::result::Error::NotFound); } } } UserOrganization::delete_all_by_user(&self.uuid, &*conn)?; Cipher::delete_all_by_user(&self.uuid, &*conn)?; Folder::delete_all_by_user(&self.uuid, &*conn)?; Device::delete_all_by_user(&self.uuid, &*conn)?; Invitation::take(&self.email, &*conn); // Delete invitation if any diesel::delete(users::table.filter( users::uuid.eq(self.uuid))) .execute(&**conn).and(Ok(())) } pub fn update_uuid_revision(uuid: &str, conn: &DbConn) { if let Some(mut user) = User::find_by_uuid(&uuid, conn) { if user.update_revision(conn).is_err(){ warn!("Failed to update revision for {}", user.email); }; }; } pub fn update_revision(&mut self, conn: &DbConn) -> QueryResult<()> { self.updated_at = Utc::now().naive_utc(); diesel::update( users::table.filter( users::uuid.eq(&self.uuid) ) ) .set(users::updated_at.eq(&self.updated_at)) .execute(&**conn).and(Ok(())) } pub fn find_by_mail(mail: &str, conn: &DbConn) -> Option { let lower_mail = mail.to_lowercase(); users::table .filter(users::email.eq(lower_mail)) .first::(&**conn).ok() } pub fn find_by_uuid(uuid: &str, conn: &DbConn) -> Option { users::table .filter(users::uuid.eq(uuid)) .first::(&**conn).ok() } pub fn get_all(conn: &DbConn) -> Vec { users::table .load::(&**conn).expect("Error loading users") } } #[derive(Debug, Identifiable, Queryable, Insertable)] #[table_name = "invitations"] #[primary_key(email)] pub struct Invitation { pub email: String, } impl Invitation { pub fn new(email: String) -> Self { Self { email } } pub fn save(&mut self, conn: &DbConn) -> QueryResult<()> { diesel::replace_into(invitations::table) .values(&*self) .execute(&**conn) .and(Ok(())) } pub fn delete(self, conn: &DbConn) -> QueryResult<()> { diesel::delete(invitations::table.filter( invitations::email.eq(self.email))) .execute(&**conn) .and(Ok(())) } pub fn find_by_mail(mail: &str, conn: &DbConn) -> Option { let lower_mail = mail.to_lowercase(); invitations::table .filter(invitations::email.eq(lower_mail)) .first::(&**conn).ok() } pub fn take(mail: &str, conn: &DbConn) -> bool { CONFIG.invitations_allowed && match Self::find_by_mail(mail, &conn) { Some(invitation) => invitation.delete(&conn).is_ok(), None => false } } }