|
@@ -11,7 +11,7 @@ pub(super) struct SessionHelper<'l> {
|
|
|
|
|
|
type Request = tide::Request<super::ServerStateWrapper>;
|
|
|
|
|
|
-const SESSION_COOKIE_NAME: &'static str = "uidc_session";
|
|
|
+const SESSION_COOKIE_NAME: &str = "uidc_session";
|
|
|
|
|
|
impl<'l> SessionHelper<'l> {
|
|
|
pub fn new(req: &'l Request) -> Self {
|
|
@@ -57,13 +57,7 @@ impl<'l> SessionHelper<'l> {
|
|
|
.zip(self.get_realm().ok())
|
|
|
.and_then(|((sid, _cookie), realm)| {
|
|
|
self.get_auth_for_session(realm.id(), &sid)
|
|
|
- .and_then(|auth| {
|
|
|
- if let Some(user) = auth.user {
|
|
|
- Some((realm, user))
|
|
|
- } else {
|
|
|
- None
|
|
|
- }
|
|
|
- })
|
|
|
+ .and_then(|auth| auth.user.map(|user| (realm, user)))
|
|
|
})
|
|
|
}
|
|
|
|
|
@@ -83,7 +77,7 @@ impl<'l> SessionHelper<'l> {
|
|
|
&self,
|
|
|
req: &Request,
|
|
|
) -> tide::Result<(schema::Session, Option<tide::http::Cookie<'static>>)> {
|
|
|
- match self.get_session(&req) {
|
|
|
+ match self.get_session(req) {
|
|
|
Some(s) => Ok((s, None)),
|
|
|
None => self.build_session(),
|
|
|
}
|
|
@@ -129,11 +123,11 @@ impl<'l> SessionHelper<'l> {
|
|
|
Some(auth) => auth.pending_challenges.as_ref().first().copied(),
|
|
|
};
|
|
|
|
|
|
- if to_present.is_none() {
|
|
|
+ if let Some(to_present) = to_present {
|
|
|
+ self.render_login_page(response, redirect, to_present, error_msg)
|
|
|
+ } else {
|
|
|
response.set_status(302);
|
|
|
tide::Redirect::new(redirect).into()
|
|
|
- } else {
|
|
|
- self.render_login_page(response, redirect, to_present.unwrap(), error_msg)
|
|
|
}
|
|
|
}
|
|
|
|
|
@@ -182,7 +176,7 @@ impl<'l> SessionHelper<'l> {
|
|
|
r#"<input name="challenge" type="password" autofocus />"#,
|
|
|
));
|
|
|
}
|
|
|
- schema::AuthChallengeType::TOTP => {
|
|
|
+ schema::AuthChallengeType::Totp => {
|
|
|
response.set_body(do_challenge(
|
|
|
"Authenticator code",
|
|
|
r#"<input name="challenge" type="text" autofocus />"#,
|
|
@@ -203,7 +197,9 @@ async fn v1_login(req: Request) -> tide::Result<tide::Response> {
|
|
|
|
|
|
let realm = shelper.get_realm()?;
|
|
|
let (session, cookie) = shelper.get_or_build_session(&req)?;
|
|
|
- cookie.map(|c| response.insert_cookie(c));
|
|
|
+ if let Some(c) = cookie {
|
|
|
+ response.insert_cookie(c)
|
|
|
+ }
|
|
|
|
|
|
let auth = shelper.get_auth_for_session(realm.id(), &session);
|
|
|
|
|
@@ -239,7 +235,9 @@ async fn v1_login_post(mut req: Request) -> tide::Result<tide::Response> {
|
|
|
|
|
|
let realm = shelper.get_realm()?;
|
|
|
let (session, cookie) = shelper.get_or_build_session(&req)?;
|
|
|
- cookie.map(|c| response.insert_cookie(c));
|
|
|
+ if let Some(c) = cookie {
|
|
|
+ response.insert_cookie(c)
|
|
|
+ }
|
|
|
|
|
|
let mut auth = shelper.get_auth_for_session(realm.id(), &session);
|
|
|
|
|
@@ -255,7 +253,7 @@ async fn v1_login_post(mut req: Request) -> tide::Result<tide::Response> {
|
|
|
let challenge: schema::AuthChallengeType = match body.challenge_type.as_str() {
|
|
|
"Username" => ChallengeType::Username,
|
|
|
"Password" => ChallengeType::Password,
|
|
|
- "TOTP" => ChallengeType::TOTP,
|
|
|
+ "TOTP" => ChallengeType::Totp,
|
|
|
_ => Err(tide::Error::from_str(400, "Unknown challenge type"))?,
|
|
|
};
|
|
|
|
|
@@ -290,7 +288,7 @@ async fn v1_login_post(mut req: Request) -> tide::Result<tide::Response> {
|
|
|
.auth
|
|
|
.with(
|
|
|
schema::AuthChallenge::ChallengeType,
|
|
|
- microrm::schema::Serialized::from(schema::AuthChallengeType::TOTP),
|
|
|
+ microrm::schema::Serialized::from(schema::AuthChallengeType::Totp),
|
|
|
)
|
|
|
.count()?
|
|
|
> 0;
|
|
@@ -304,7 +302,7 @@ async fn v1_login_post(mut req: Request) -> tide::Result<tide::Response> {
|
|
|
pending_challenges: if has_totp {
|
|
|
vec![
|
|
|
schema::AuthChallengeType::Password,
|
|
|
- schema::AuthChallengeType::TOTP,
|
|
|
+ schema::AuthChallengeType::Totp,
|
|
|
]
|
|
|
} else {
|
|
|
vec![schema::AuthChallengeType::Password]
|
|
@@ -346,10 +344,10 @@ async fn v1_login_post(mut req: Request) -> tide::Result<tide::Response> {
|
|
|
}
|
|
|
}
|
|
|
} else {
|
|
|
- error = Some(format!("User is not configured correctly: either it was deleted or it lacks a required authentication challenge type. Please contact an administrator."));
|
|
|
+ error = Some("User is not configured correctly: either it was deleted or it lacks a required authentication challenge type. Please contact an administrator.".into());
|
|
|
}
|
|
|
} else {
|
|
|
- error = Some(format!("Please restart login process."));
|
|
|
+ error = Some("Please restart login process.".into());
|
|
|
}
|
|
|
}
|
|
|
};
|