|
@@ -1,10 +1,25 @@
|
|
|
+use super::{api, OIDCError, OIDCErrorType, Request};
|
|
|
+use crate::{
|
|
|
+ realm::RealmHelper,
|
|
|
+ schema,
|
|
|
+ server::session::SessionHelper,
|
|
|
+ user::{UserError, UserExt},
|
|
|
+ UIDCError,
|
|
|
+};
|
|
|
use microrm::prelude::*;
|
|
|
-use crate::{realm::RealmHelper, schema, server::session::SessionHelper, user::{UserError, UserExt}, UIDCError};
|
|
|
-use super::{api,OIDCError,OIDCErrorType,Request};
|
|
|
|
|
|
-fn do_authorization_code<'l>(realm: µrm::Stored<schema::Realm>, rhelper: &RealmHelper, client: µrm::Stored<schema::Client>, treq: &api::TokenRequestBody) -> Result<tide::Response, OIDCError<'l>> {
|
|
|
+fn do_authorization_code<'l>(
|
|
|
+ realm: µrm::Stored<schema::Realm>,
|
|
|
+ rhelper: &RealmHelper,
|
|
|
+ client: µrm::Stored<schema::Client>,
|
|
|
+ treq: &api::TokenRequestBody,
|
|
|
+) -> Result<tide::Response, OIDCError<'l>> {
|
|
|
let Some(code) = treq.code.as_ref() else {
|
|
|
- return Err(OIDCError(OIDCErrorType::InvalidRequest, "no authorization code provided".into(), None))
|
|
|
+ return Err(OIDCError(
|
|
|
+ OIDCErrorType::InvalidRequest,
|
|
|
+ "no authorization code provided".into(),
|
|
|
+ None,
|
|
|
+ ));
|
|
|
};
|
|
|
let code = realm
|
|
|
.auth_codes
|
|
@@ -36,18 +51,19 @@ fn do_authorization_code<'l>(realm: µrm::Stored<schema::Realm>, rhelper: &R
|
|
|
None,
|
|
|
))?;
|
|
|
|
|
|
- let access_token = rhelper.generate_access_token(
|
|
|
- &client,
|
|
|
- &user,
|
|
|
- code.scopes.as_ref().iter().map(String::as_str),
|
|
|
- )
|
|
|
- .map_err(|e| {
|
|
|
- OIDCError(
|
|
|
- OIDCErrorType::ServerError,
|
|
|
- format!("error signing key: {e}").into(),
|
|
|
- None,
|
|
|
+ let access_token = rhelper
|
|
|
+ .generate_access_token(
|
|
|
+ &client,
|
|
|
+ &user,
|
|
|
+ code.scopes.as_ref().iter().map(String::as_str),
|
|
|
)
|
|
|
- })?;
|
|
|
+ .map_err(|e| {
|
|
|
+ OIDCError(
|
|
|
+ OIDCErrorType::ServerError,
|
|
|
+ format!("error signing key: {e}").into(),
|
|
|
+ None,
|
|
|
+ )
|
|
|
+ })?;
|
|
|
|
|
|
Ok(tide::Response::builder(200)
|
|
|
.content_type(tide::http::mime::JSON)
|
|
@@ -63,7 +79,12 @@ fn do_authorization_code<'l>(realm: µrm::Stored<schema::Realm>, rhelper: &R
|
|
|
.build())
|
|
|
}
|
|
|
|
|
|
-fn do_refresh_token<'l>(_realm: µrm::Stored<schema::Realm>, rhelper: &RealmHelper, client: µrm::Stored<schema::Client>, treq: &api::TokenRequestBody) -> Result<tide::Response, OIDCError<'l>> {
|
|
|
+fn do_refresh_token<'l>(
|
|
|
+ _realm: µrm::Stored<schema::Realm>,
|
|
|
+ rhelper: &RealmHelper,
|
|
|
+ client: µrm::Stored<schema::Client>,
|
|
|
+ treq: &api::TokenRequestBody,
|
|
|
+) -> Result<tide::Response, OIDCError<'l>> {
|
|
|
let Some(rtoken) = treq.refresh_token.as_ref() else {
|
|
|
return Err(OIDCError(
|
|
|
OIDCErrorType::InvalidRequest,
|
|
@@ -74,11 +95,13 @@ fn do_refresh_token<'l>(_realm: µrm::Stored<schema::Realm>, rhelper: &Realm
|
|
|
|
|
|
let (access, refresh) = match rhelper.trade_refresh_token(&client, rtoken.as_str()) {
|
|
|
Ok((a, r)) => (a, r),
|
|
|
- Err(e) => return Err(OIDCError(
|
|
|
- OIDCErrorType::InvalidRequest,
|
|
|
- format!("could not trade refresh token: {e}").into(),
|
|
|
- None,
|
|
|
- ))
|
|
|
+ Err(e) => {
|
|
|
+ return Err(OIDCError(
|
|
|
+ OIDCErrorType::InvalidRequest,
|
|
|
+ format!("could not trade refresh token: {e}").into(),
|
|
|
+ None,
|
|
|
+ ))
|
|
|
+ }
|
|
|
};
|
|
|
Ok(tide::Response::builder(200)
|
|
|
.content_type(tide::http::mime::JSON)
|
|
@@ -94,43 +117,89 @@ fn do_refresh_token<'l>(_realm: µrm::Stored<schema::Realm>, rhelper: &Realm
|
|
|
.build())
|
|
|
}
|
|
|
|
|
|
-fn do_direct_grant<'l>(realm: µrm::Stored<schema::Realm>, rhelper: &RealmHelper, client: µrm::Stored<schema::Client>, treq: &api::TokenRequestBody) -> Result<tide::Response, OIDCError<'l>> {
|
|
|
+fn do_direct_grant<'l>(
|
|
|
+ realm: µrm::Stored<schema::Realm>,
|
|
|
+ rhelper: &RealmHelper,
|
|
|
+ client: µrm::Stored<schema::Client>,
|
|
|
+ treq: &api::TokenRequestBody,
|
|
|
+) -> Result<tide::Response, OIDCError<'l>> {
|
|
|
// first thing to check: does the client have the direct grant type enabled?
|
|
|
if !client.direct_grant_enabled {
|
|
|
- return Err(OIDCError(OIDCErrorType::UnsupportedResponseType, "client does not have direct grants enabled".into(), None))
|
|
|
+ return Err(OIDCError(
|
|
|
+ OIDCErrorType::UnsupportedResponseType,
|
|
|
+ "client does not have direct grants enabled".into(),
|
|
|
+ None,
|
|
|
+ ));
|
|
|
}
|
|
|
|
|
|
let Some(username) = treq.username.as_ref() else {
|
|
|
- return Err(OIDCError(OIDCErrorType::InvalidRequest, "no username provided".into(), None))
|
|
|
+ return Err(OIDCError(
|
|
|
+ OIDCErrorType::InvalidRequest,
|
|
|
+ "no username provided".into(),
|
|
|
+ None,
|
|
|
+ ));
|
|
|
};
|
|
|
let Some(password) = treq.password.as_ref() else {
|
|
|
- return Err(OIDCError(OIDCErrorType::InvalidRequest, "no password provided".into(), None))
|
|
|
+ return Err(OIDCError(
|
|
|
+ OIDCErrorType::InvalidRequest,
|
|
|
+ "no password provided".into(),
|
|
|
+ None,
|
|
|
+ ));
|
|
|
};
|
|
|
|
|
|
- let Some(user) = realm.users.with(schema::User::Username, username).first().get()? else {
|
|
|
- return Err(OIDCError(OIDCErrorType::AccessDenied, "no such user".into(), None))
|
|
|
+ let Some(user) = realm
|
|
|
+ .users
|
|
|
+ .with(schema::User::Username, username)
|
|
|
+ .first()
|
|
|
+ .get()?
|
|
|
+ else {
|
|
|
+ return Err(OIDCError(
|
|
|
+ OIDCErrorType::AccessDenied,
|
|
|
+ "no such user".into(),
|
|
|
+ None,
|
|
|
+ ));
|
|
|
};
|
|
|
|
|
|
// verify that we don't accidentally log in someone with username/password who has MFA..
|
|
|
- match user.auth.with(schema::AuthChallenge::Enabled, true).count()? {
|
|
|
- 0 => return Err(OIDCError(OIDCErrorType::AccessDenied, "user has no associated password".into(), None)),
|
|
|
+ match user
|
|
|
+ .auth
|
|
|
+ .with(schema::AuthChallenge::Enabled, true)
|
|
|
+ .count()?
|
|
|
+ {
|
|
|
+ 0 => {
|
|
|
+ return Err(OIDCError(
|
|
|
+ OIDCErrorType::AccessDenied,
|
|
|
+ "user has no associated password".into(),
|
|
|
+ None,
|
|
|
+ ))
|
|
|
+ }
|
|
|
1 => (),
|
|
|
- _ => return Err(OIDCError(OIDCErrorType::AccessDenied, "user has MFA enabled".into(), None)),
|
|
|
+ _ => {
|
|
|
+ return Err(OIDCError(
|
|
|
+ OIDCErrorType::AccessDenied,
|
|
|
+ "user has MFA enabled".into(),
|
|
|
+ None,
|
|
|
+ ))
|
|
|
+ }
|
|
|
}
|
|
|
|
|
|
match user.verify_challenge_by_type(schema::AuthChallengeType::Password, password.as_bytes()) {
|
|
|
- Err(UIDCError::UserError(UserError::NoSuchChallenge)) => {
|
|
|
- Err(OIDCError(OIDCErrorType::AccessDenied, "user has no associated password".into(), None))
|
|
|
- },
|
|
|
- Err(UIDCError::DatabaseError(e)) => {
|
|
|
- Err(e.into())
|
|
|
- },
|
|
|
- Err(e) => {
|
|
|
- Err(OIDCError(OIDCErrorType::ServerError, format!("internal error: {e}").into(), None))
|
|
|
- },
|
|
|
- Ok(false) => {
|
|
|
- Err(OIDCError(OIDCErrorType::AccessDenied, "password authentication failed".into(), None))
|
|
|
- },
|
|
|
+ Err(UIDCError::UserError(UserError::NoSuchChallenge)) => Err(OIDCError(
|
|
|
+ OIDCErrorType::AccessDenied,
|
|
|
+ "user has no associated password".into(),
|
|
|
+ None,
|
|
|
+ )),
|
|
|
+ Err(UIDCError::DatabaseError(e)) => Err(e.into()),
|
|
|
+ Err(e) => Err(OIDCError(
|
|
|
+ OIDCErrorType::ServerError,
|
|
|
+ format!("internal error: {e}").into(),
|
|
|
+ None,
|
|
|
+ )),
|
|
|
+ Ok(false) => Err(OIDCError(
|
|
|
+ OIDCErrorType::AccessDenied,
|
|
|
+ "password authentication failed".into(),
|
|
|
+ None,
|
|
|
+ )),
|
|
|
Ok(true) => {
|
|
|
let scopes = treq
|
|
|
.scope
|
|
@@ -138,23 +207,35 @@ fn do_direct_grant<'l>(realm: µrm::Stored<schema::Realm>, rhelper: &RealmHe
|
|
|
.map(String::as_str)
|
|
|
.unwrap_or("")
|
|
|
.split_whitespace();
|
|
|
- let Ok(access_token) = rhelper.generate_access_token(client, &user, scopes.clone()) else {
|
|
|
- return Err(OIDCError(OIDCErrorType::ServerError, "could not generate access token".into(), None))
|
|
|
+ let Ok(access_token) = rhelper.generate_access_token(client, &user, scopes.clone())
|
|
|
+ else {
|
|
|
+ return Err(OIDCError(
|
|
|
+ OIDCErrorType::ServerError,
|
|
|
+ "could not generate access token".into(),
|
|
|
+ None,
|
|
|
+ ));
|
|
|
};
|
|
|
let Ok(refresh_token) = rhelper.generate_refresh_token(client, &user, scopes) else {
|
|
|
- return Err(OIDCError(OIDCErrorType::ServerError, "could not generate access token".into(), None))
|
|
|
+ return Err(OIDCError(
|
|
|
+ OIDCErrorType::ServerError,
|
|
|
+ "could not generate access token".into(),
|
|
|
+ None,
|
|
|
+ ));
|
|
|
};
|
|
|
|
|
|
Ok(tide::Response::builder(200)
|
|
|
- .content_type(tide::http::mime::JSON)
|
|
|
- .body(serde_json::to_vec(&api::TokenResponse {
|
|
|
- access_token: access_token.as_str(),
|
|
|
- token_type: "bearer",
|
|
|
- refresh_token: Some(refresh_token.as_str()),
|
|
|
- scope: None,
|
|
|
- }).unwrap())
|
|
|
- .build())
|
|
|
- },
|
|
|
+ .content_type(tide::http::mime::JSON)
|
|
|
+ .body(
|
|
|
+ serde_json::to_vec(&api::TokenResponse {
|
|
|
+ access_token: access_token.as_str(),
|
|
|
+ token_type: "bearer",
|
|
|
+ refresh_token: Some(refresh_token.as_str()),
|
|
|
+ scope: None,
|
|
|
+ })
|
|
|
+ .unwrap(),
|
|
|
+ )
|
|
|
+ .build())
|
|
|
+ }
|
|
|
}
|
|
|
}
|
|
|
|
|
@@ -199,9 +280,8 @@ pub(super) async fn do_token<'l>(mut request: Request) -> Result<tide::Response,
|
|
|
} else {
|
|
|
Err(OIDCError(
|
|
|
OIDCErrorType::InvalidRequest,
|
|
|
- format!("unknown grant type {}", treq.grant_type).into(),
|
|
|
+ format!("unknown grant_type {}", treq.grant_type).into(),
|
|
|
None,
|
|
|
))
|
|
|
}
|
|
|
}
|
|
|
-
|