session.rs 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380
  1. use crate::{schema, user, UIDCError};
  2. use microrm::{prelude::*, schema::Stored};
  3. use serde::Deserialize;
  4. use tide::http::Cookie;
  5. pub(super) struct SessionHelper<'l> {
  6. db: &'l schema::UIDCDatabase,
  7. tmpl: &'l handlebars::Handlebars<'l>,
  8. realm_str: &'l str,
  9. }
  10. type Request = tide::Request<super::ServerStateWrapper>;
  11. const SESSION_COOKIE_NAME: &'static str = "uidc_session";
  12. impl<'l> SessionHelper<'l> {
  13. pub fn new(req: &'l Request) -> Self {
  14. Self {
  15. db: &req.state().core.db,
  16. tmpl: &req.state().core.templates,
  17. realm_str: req.param("realm").expect("no realm param?"),
  18. }
  19. }
  20. pub fn get_realm(&self) -> tide::Result<Stored<schema::Realm>> {
  21. self.db
  22. .realms
  23. .unique(self.realm_str)
  24. .get()?
  25. .ok_or(tide::Error::from_str(404, "No such realm"))
  26. }
  27. fn build_session(
  28. &self,
  29. ) -> tide::Result<(schema::Session, Option<tide::http::Cookie<'static>>)> {
  30. let rng = ring::rand::SystemRandom::new();
  31. let session_id: [u8; 32] = ring::rand::generate(&rng)
  32. .map_err(|_| tide::Error::from_str(500, "Failed to generate session ID"))?
  33. .expose();
  34. let session_id = base64::encode_config(session_id, base64::URL_SAFE_NO_PAD);
  35. // XXX: replace with in-place insertion once support for that is added to microrm
  36. let session = self.db.sessions.insert_and_return(schema::Session {
  37. session_id: session_id.clone(),
  38. auth: Default::default(),
  39. expiry: time::OffsetDateTime::now_utc() + time::Duration::minutes(10),
  40. })?;
  41. let session_cookie = Cookie::build(SESSION_COOKIE_NAME, session_id)
  42. .path("/")
  43. .finish();
  44. Ok((session.wrapped(), Some(session_cookie)))
  45. }
  46. pub fn verify_session(&self, req: &Request) -> Option<(Stored<schema::Realm>, schema::UserID)> {
  47. self.get_or_build_session(req)
  48. .ok()
  49. .zip(self.get_realm().ok())
  50. .and_then(|((sid, _cookie), realm)| {
  51. self.get_auth_for_session(realm.id(), &sid)
  52. .and_then(|auth| {
  53. if let Some(user) = auth.user {
  54. Some((realm, user))
  55. } else {
  56. None
  57. }
  58. })
  59. })
  60. }
  61. pub fn get_session(&self, req: &Request) -> Option<schema::Session> {
  62. req.cookie(SESSION_COOKIE_NAME).and_then(|sid| {
  63. self.db
  64. .sessions
  65. .unique(sid.value())
  66. .get()
  67. .ok()
  68. .flatten()
  69. .map(|v| v.wrapped())
  70. })
  71. }
  72. pub fn get_or_build_session(
  73. &self,
  74. req: &Request,
  75. ) -> tide::Result<(schema::Session, Option<tide::http::Cookie<'static>>)> {
  76. match self.get_session(&req) {
  77. Some(s) => Ok((s, None)),
  78. None => self.build_session(),
  79. }
  80. }
  81. pub fn get_auth_for_session(
  82. &self,
  83. realm: schema::RealmID,
  84. session: &schema::Session,
  85. ) -> Option<Stored<schema::SessionAuth>> {
  86. session
  87. .auth
  88. .with(schema::SessionAuth::Realm, realm)
  89. .first()
  90. .get()
  91. .ok()?
  92. }
  93. pub fn destroy_auth(
  94. &self,
  95. realm: schema::RealmID,
  96. session: &schema::Session,
  97. ) -> Result<(), UIDCError> {
  98. session
  99. .auth
  100. .with(schema::SessionAuth::Realm, realm)
  101. .first()
  102. .delete()?;
  103. Ok(())
  104. }
  105. }
  106. impl<'l> SessionHelper<'l> {
  107. fn render_login_from_auth(
  108. &self,
  109. mut response: tide::Response,
  110. redirect: String,
  111. auth: Option<schema::SessionAuth>,
  112. error_msg: Option<String>,
  113. ) -> tide::Response {
  114. let to_present: Option<schema::AuthChallengeType> = match auth {
  115. None => Some(schema::AuthChallengeType::Username),
  116. Some(auth) => auth.pending_challenges.as_ref().first().copied(),
  117. };
  118. if to_present.is_none() {
  119. response.set_status(302);
  120. tide::Redirect::new("../..").into()
  121. } else {
  122. self.render_login_page(response, redirect, to_present.unwrap(), error_msg)
  123. }
  124. }
  125. fn render_login_page(
  126. &self,
  127. mut response: tide::Response,
  128. redirect: String,
  129. to_present: schema::AuthChallengeType,
  130. error_msg: Option<String>,
  131. ) -> tide::Response {
  132. let do_challenge = |ty, ch| {
  133. self.tmpl
  134. .render(
  135. "id_v1_login",
  136. &serde_json::json!(
  137. {
  138. "challenge":
  139. format!(r#"
  140. <td class="challenge-type">
  141. <input type="hidden" name="challenge_type" value="{:?}" />
  142. {}
  143. </td>
  144. <td class="challenge-content">{}</td>
  145. "#,
  146. to_present, ty, ch),
  147. "redirect": redirect,
  148. "error_msg": error_msg.iter().collect::<Vec<_>>()
  149. }
  150. ),
  151. )
  152. .unwrap()
  153. };
  154. response.set_content_type("text/html");
  155. match to_present {
  156. schema::AuthChallengeType::Username => {
  157. response.set_body(do_challenge(
  158. "Username",
  159. r#"<input name="challenge" type="text" autofocus />"#,
  160. ));
  161. }
  162. schema::AuthChallengeType::Password => {
  163. response.set_body(do_challenge(
  164. "Password",
  165. r#"<input name="challenge" type="password" autofocus />"#,
  166. ));
  167. }
  168. schema::AuthChallengeType::TOTP => {
  169. response.set_body(do_challenge(
  170. "Authenticator code",
  171. r#"<input name="challenge" type="text" autofocus />"#,
  172. ));
  173. }
  174. _ => todo!(),
  175. }
  176. response
  177. }
  178. }
  179. async fn v1_login(req: Request) -> tide::Result<tide::Response> {
  180. let mut response = tide::Response::builder(200).build();
  181. let shelper = SessionHelper::new(&req);
  182. let realm = shelper.get_realm()?;
  183. let (session, cookie) = shelper.get_or_build_session(&req)?;
  184. cookie.map(|c| response.insert_cookie(c));
  185. let auth = shelper.get_auth_for_session(realm.id(), &session);
  186. #[derive(serde::Deserialize)]
  187. struct LoginQuery {
  188. redirect: Option<String>,
  189. }
  190. let query: LoginQuery = req.query().unwrap();
  191. Ok(shelper.render_login_from_auth(
  192. response,
  193. query.redirect.unwrap_or_else(|| "../..".to_string()),
  194. auth.map(Stored::wrapped),
  195. None,
  196. ))
  197. }
  198. async fn v1_login_post(mut req: Request) -> tide::Result<tide::Response> {
  199. let mut response = tide::Response::builder(200).build();
  200. #[derive(Deserialize)]
  201. struct ResponseBody {
  202. challenge_type: String,
  203. challenge: String,
  204. reset: Option<String>,
  205. redirect: String,
  206. }
  207. let body: ResponseBody = req.body_form().await?;
  208. let shelper = SessionHelper::new(&req);
  209. let realm = shelper.get_realm()?;
  210. let (session, cookie) = shelper.get_or_build_session(&req)?;
  211. cookie.map(|c| response.insert_cookie(c));
  212. let mut auth = shelper.get_auth_for_session(realm.id(), &session);
  213. // check if a login reset was requested; if so, we start again from the top
  214. if body.reset.is_some() {
  215. shelper.destroy_auth(realm.id(), &session)?;
  216. return Ok(tide::Redirect::new("login").into());
  217. }
  218. use schema::AuthChallengeType as ChallengeType;
  219. let challenge: schema::AuthChallengeType = match body.challenge_type.as_str() {
  220. "Username" => ChallengeType::Username,
  221. "Password" => ChallengeType::Password,
  222. "TOTP" => ChallengeType::TOTP,
  223. _ => Err(tide::Error::from_str(400, "Unknown challenge type"))?,
  224. };
  225. let mut error = None;
  226. // check that the response matches what we're expecting next
  227. let to_be_presented: Option<schema::AuthChallengeType> = match &auth {
  228. None => Some(schema::AuthChallengeType::Username),
  229. Some(auth) => auth.pending_challenges.as_ref().first().copied(),
  230. };
  231. if to_be_presented != Some(challenge) {
  232. Err(tide::Error::from_str(400, "Unexpected challenge type"))?
  233. }
  234. match challenge {
  235. // handle the username challenge specially because this sets up the pending challenges.
  236. ChallengeType::Username => {
  237. shelper.destroy_auth(realm.id(), &session)?;
  238. let user = realm.users.unique(&body.challenge).get()?;
  239. if user.is_none() {
  240. error = Some(format!("No such user {}", body.challenge));
  241. } else {
  242. let user = user.unwrap();
  243. let has_totp = user
  244. .auth
  245. .with(
  246. schema::AuthChallenge::ChallengeType,
  247. microrm::schema::Serialized::from(schema::AuthChallengeType::TOTP),
  248. )
  249. .count()?
  250. > 0;
  251. // TODO: support more flows than just username,password[,totp]
  252. auth = Some(
  253. session.auth.insert_and_return(schema::SessionAuth {
  254. realm: realm.id(),
  255. user: None,
  256. pending_user: Some(user.id()),
  257. pending_challenges: if has_totp {
  258. vec![
  259. schema::AuthChallengeType::Password,
  260. schema::AuthChallengeType::TOTP,
  261. ]
  262. } else {
  263. vec![schema::AuthChallengeType::Password]
  264. }
  265. .into(),
  266. })?,
  267. );
  268. // auth = Some(session.auth.with(id, id).first().get()?.expect("can't re-get just-added entity"));
  269. }
  270. }
  271. ct => {
  272. if let Some(auth) = auth.as_mut() {
  273. // let qi = req.state().core.pool.query_interface();
  274. // let user = qi.get().by_id(&auth.user).one().expect("couldn't query db");
  275. if let Some(user_id) = auth.pending_user {
  276. let user = realm
  277. .users
  278. .with(user_id, user_id)
  279. .first()
  280. .get()?
  281. .ok_or(UIDCError::Abort("session auth refers to nonexistent user"))?;
  282. let user = user::User::from_schema(&realm, user);
  283. let verification = user.verify_challenge_by_type(ct, body.challenge.as_bytes());
  284. match verification {
  285. Ok(true) => {
  286. auth.pending_challenges.as_mut().remove(0);
  287. // if we're done with the last challenge, mark us as logged in
  288. if auth.pending_challenges.as_ref().is_empty() {
  289. auth.user = auth.pending_user.take();
  290. }
  291. auth.sync()?;
  292. }
  293. Ok(false) => {
  294. error = Some("Incorrect response. Please try again".into());
  295. }
  296. Err(_) => {
  297. error = Some("Internal error. Please contact an administrator.".into());
  298. }
  299. }
  300. } else {
  301. error = Some(format!("User is not configured correctly: either it was deleted or it lacks a required authentication challenge type. Please contact an administrator."));
  302. }
  303. } else {
  304. error = Some(format!("Please restart login process."));
  305. }
  306. }
  307. };
  308. Ok(shelper.render_login_from_auth(response, body.redirect, auth.map(Stored::wrapped), error))
  309. }
  310. async fn v1_logout(req: Request) -> tide::Result<tide::Response> {
  311. let shelper = SessionHelper::new(&req);
  312. #[derive(serde::Deserialize)]
  313. struct LogoutQuery {
  314. redirect: Option<String>,
  315. }
  316. let query: LogoutQuery = req.query().unwrap();
  317. let realm = shelper.get_realm()?;
  318. shelper
  319. .get_session(&req)
  320. .map(|sid| shelper.destroy_auth(realm.id(), &sid));
  321. Ok(tide::Redirect::new(query.redirect.unwrap_or_else(|| "../..".into())).into())
  322. }
  323. pub(super) fn session_v1_server(mut route: tide::Route<super::ServerStateWrapper>) {
  324. route.at("login").get(v1_login).post(v1_login_post);
  325. route.at("logout").get(v1_logout);
  326. }