|
@@ -1,4 +1,4 @@
|
|
-use crate::schema;
|
|
|
|
|
|
+use crate::{schema,user};
|
|
use serde::Deserialize;
|
|
use serde::Deserialize;
|
|
use tide::http::Cookie;
|
|
use tide::http::Cookie;
|
|
use microrm::prelude::*;
|
|
use microrm::prelude::*;
|
|
@@ -82,6 +82,8 @@ impl ServerState {
|
|
|
|
|
|
impl ServerState {
|
|
impl ServerState {
|
|
fn render_login_from_auth(&self, mut response: tide::Response, auth: Option<schema::SessionAuthentication>, error_msg: Option<String>) -> tide::Response {
|
|
fn render_login_from_auth(&self, mut response: tide::Response, auth: Option<schema::SessionAuthentication>, error_msg: Option<String>) -> tide::Response {
|
|
|
|
+ log::info!("rendering login response... auth is {:?}", auth);
|
|
|
|
+
|
|
let to_present: Option<schema::AuthChallengeType> = match auth {
|
|
let to_present: Option<schema::AuthChallengeType> = match auth {
|
|
None => Some(schema::AuthChallengeType::Username),
|
|
None => Some(schema::AuthChallengeType::Username),
|
|
Some(auth) => auth.challenges_left.first().copied()
|
|
Some(auth) => auth.challenges_left.first().copied()
|
|
@@ -97,7 +99,7 @@ impl ServerState {
|
|
}
|
|
}
|
|
|
|
|
|
fn render_login_page(&self, mut response: tide::Response, to_present: schema::AuthChallengeType, error_msg: Option<String>) -> tide::Response {
|
|
fn render_login_page(&self, mut response: tide::Response, to_present: schema::AuthChallengeType, error_msg: Option<String>) -> tide::Response {
|
|
- let tmpl = self.core.templates.read().unwrap();
|
|
|
|
|
|
+ let tmpl = &self.core.templates;
|
|
|
|
|
|
let do_challenge = |ty,ch| {
|
|
let do_challenge = |ty,ch| {
|
|
tmpl.render("id_v1_login", &serde_json::json!(
|
|
tmpl.render("id_v1_login", &serde_json::json!(
|
|
@@ -144,7 +146,7 @@ async fn v1_login(req: tide::Request<ServerState>) -> tide::Result<tide::Respons
|
|
Ok(req.state().render_login_from_auth(response, auth.map(|a| a.wrapped()), None))
|
|
Ok(req.state().render_login_from_auth(response, auth.map(|a| a.wrapped()), None))
|
|
}
|
|
}
|
|
|
|
|
|
-async fn v1_login_response(mut req: tide::Request<ServerState>) -> tide::Result<tide::Response> {
|
|
|
|
|
|
+async fn v1_login_post(mut req: tide::Request<ServerState>) -> tide::Result<tide::Response> {
|
|
let mut response = tide::Response::builder(200).build();
|
|
let mut response = tide::Response::builder(200).build();
|
|
|
|
|
|
let realm = req.state().get_realm(&req).ok_or(tide::Error::from_str(404, "No such realm"))?;
|
|
let realm = req.state().get_realm(&req).ok_or(tide::Error::from_str(404, "No such realm"))?;
|
|
@@ -156,11 +158,21 @@ async fn v1_login_response(mut req: tide::Request<ServerState>) -> tide::Result<
|
|
#[derive(Deserialize)]
|
|
#[derive(Deserialize)]
|
|
struct ResponseBody {
|
|
struct ResponseBody {
|
|
challenge_type: String,
|
|
challenge_type: String,
|
|
- challenge: String
|
|
|
|
|
|
+ challenge: String,
|
|
|
|
+ reset: Option<String>,
|
|
}
|
|
}
|
|
|
|
|
|
let body : ResponseBody = req.body_form().await?;
|
|
let body : ResponseBody = req.body_form().await?;
|
|
|
|
|
|
|
|
+ // check if a login reset was requested; if so, we start again from the top
|
|
|
|
+ if body.reset.is_some() {
|
|
|
|
+ if let Some(_) = auth {
|
|
|
|
+ req.state().destroy_auth(realm, session_id);
|
|
|
|
+ response.set_status(302);
|
|
|
|
+ return Ok(tide::Redirect::new("login").into())
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+
|
|
use schema::AuthChallengeType as ChallengeType;
|
|
use schema::AuthChallengeType as ChallengeType;
|
|
|
|
|
|
let challenge: schema::AuthChallengeType = match body.challenge_type.as_str() {
|
|
let challenge: schema::AuthChallengeType = match body.challenge_type.as_str() {
|
|
@@ -178,7 +190,7 @@ async fn v1_login_response(mut req: tide::Request<ServerState>) -> tide::Result<
|
|
};
|
|
};
|
|
|
|
|
|
if to_be_presented != Some(challenge) {
|
|
if to_be_presented != Some(challenge) {
|
|
- Err(tide::Error::from_str(400, "Incorrect challenge type"))?
|
|
|
|
|
|
+ Err(tide::Error::from_str(400, "Unexpected challenge type"))?
|
|
}
|
|
}
|
|
|
|
|
|
match challenge {
|
|
match challenge {
|
|
@@ -193,49 +205,64 @@ async fn v1_login_response(mut req: tide::Request<ServerState>) -> tide::Result<
|
|
else {
|
|
else {
|
|
let user = user.unwrap();
|
|
let user = user.unwrap();
|
|
|
|
|
|
|
|
+ // TODO: set list of challenges to be whatever else this user has set up
|
|
let sa = schema::SessionAuthentication { session: session_id, realm: realm, user: user.id(), challenges_left: vec![schema::AuthChallengeType::Password] };
|
|
let sa = schema::SessionAuthentication { session: session_id, realm: realm, user: user.id(), challenges_left: vec![schema::AuthChallengeType::Password] };
|
|
let id = qi.add(&sa).unwrap();
|
|
let id = qi.add(&sa).unwrap();
|
|
auth = Some(microrm::WithID::new(sa, id));
|
|
auth = Some(microrm::WithID::new(sa, id));
|
|
}
|
|
}
|
|
},
|
|
},
|
|
- ChallengeType::Password => {
|
|
|
|
- if auth.is_none() {
|
|
|
|
- error = Some(format!("Please restart login process."));
|
|
|
|
- }
|
|
|
|
- else {
|
|
|
|
|
|
+ ct => {
|
|
|
|
+ if let Some(auth) = &mut auth {
|
|
let qi = req.state().core.pool.query_interface();
|
|
let qi = req.state().core.pool.query_interface();
|
|
|
|
|
|
- use schema::AuthChallenge;
|
|
|
|
- let challenge = qi.get().by(AuthChallenge::User, &auth.as_ref().unwrap().user).by(AuthChallenge::ChallengeType, &schema::AuthChallengeType::Password).one().expect("couldn't query db");
|
|
|
|
|
|
+ let user = qi.get().by_id(&auth.user).one().expect("couldn't query db");
|
|
|
|
|
|
- if challenge.is_none() {
|
|
|
|
- error = Some(format!("User lacks a password. Please contact an administrator."));
|
|
|
|
- }
|
|
|
|
- else {
|
|
|
|
- use ring::pbkdf2;
|
|
|
|
|
|
+ if let Some(user) = user {
|
|
|
|
+ let user = user::User::from_model(user);
|
|
|
|
|
|
- let challenge = challenge.unwrap();
|
|
|
|
|
|
+ let verification = user.verify_challenge(&qi, ct, body.challenge.as_bytes());
|
|
|
|
|
|
- let verification = pbkdf2::verify(pbkdf2::PBKDF2_HMAC_SHA256, std::num::NonZeroU32::new(20000).unwrap(), challenge.public.as_slice(), body.challenge.as_bytes(), challenge.secret.as_slice());
|
|
|
|
-
|
|
|
|
- if verification.is_ok() {
|
|
|
|
- auth.as_mut().unwrap().challenges_left.remove(0);
|
|
|
|
|
|
+ match verification {
|
|
|
|
+ Some(true) => {
|
|
|
|
+ auth.challenges_left.remove(0);
|
|
|
|
+ qi.update().to(auth.as_ref()).by_id(&auth.id()).exec().expect("couldn't update auth status?");
|
|
|
|
+ },
|
|
|
|
+ Some(false) => {
|
|
|
|
+ error = Some("Incorrect response. Please try again".into());
|
|
|
|
+ },
|
|
|
|
+ None => {
|
|
|
|
+ error = Some("User no longer exists. Please contact an administrator.".into());
|
|
|
|
+ },
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
+ else {
|
|
|
|
+ error = Some(format!("User is not configured correctly: either it was deleted or it lacks a required authentication challenge type. Please contact an administrator."));
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ else {
|
|
|
|
+ error = Some(format!("Please restart login process."));
|
|
}
|
|
}
|
|
},
|
|
},
|
|
- _ => todo!()
|
|
|
|
};
|
|
};
|
|
|
|
|
|
Ok(req.state().render_login_from_auth(response, auth.map(|a| a.wrapped()), error))
|
|
Ok(req.state().render_login_from_auth(response, auth.map(|a| a.wrapped()), error))
|
|
}
|
|
}
|
|
|
|
|
|
|
|
+async fn v1_logout(req: tide::Request<ServerState>) -> tide::Result<tide::Response> {
|
|
|
|
+ let realm = req.state().get_realm(&req).ok_or(tide::Error::from_str(404, "No such realm"))?;
|
|
|
|
+ let (session_id, _) = req.state().get_or_build_session(&req)?;
|
|
|
|
+
|
|
|
|
+ req.state().destroy_auth(realm, session_id);
|
|
|
|
+ Ok(tide::Redirect::new("/").into())
|
|
|
|
+}
|
|
|
|
+
|
|
pub fn session_v1_server(core: &'static super::ServerCoreState) -> tide::Server<ServerState> {
|
|
pub fn session_v1_server(core: &'static super::ServerCoreState) -> tide::Server<ServerState> {
|
|
let mut srv = tide::with_state(ServerState { core, realm_cache: std::sync::Arc::new(std::sync::RwLock::new(std::collections::HashMap::new())) });
|
|
let mut srv = tide::with_state(ServerState { core, realm_cache: std::sync::Arc::new(std::sync::RwLock::new(std::collections::HashMap::new())) });
|
|
|
|
|
|
srv.with(tide::log::LogMiddleware::new());
|
|
srv.with(tide::log::LogMiddleware::new());
|
|
|
|
|
|
- srv.at("login").get(v1_login).post(v1_login_response);
|
|
|
|
|
|
+ srv.at("login").get(v1_login).post(v1_login_post);
|
|
|
|
+ srv.at("logout").get(v1_logout);
|
|
|
|
|
|
srv
|
|
srv
|
|
}
|
|
}
|