session.rs 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377
  1. use crate::{schema, user::UserExt, UIDCError};
  2. use microrm::{prelude::*, schema::Stored};
  3. use serde::Deserialize;
  4. use tide::http::Cookie;
  5. pub(super) struct SessionHelper<'l> {
  6. db: &'l schema::UIDCDatabase,
  7. tmpl: &'l handlebars::Handlebars<'l>,
  8. realm_str: &'l str,
  9. }
  10. type Request = tide::Request<super::ServerStateWrapper>;
  11. const SESSION_COOKIE_NAME: &str = "uidc_session";
  12. impl<'l> SessionHelper<'l> {
  13. pub fn new(req: &'l Request) -> Self {
  14. Self {
  15. db: &req.state().core.db,
  16. tmpl: &req.state().core.templates,
  17. realm_str: req.param("realm").expect("no realm param?"),
  18. }
  19. }
  20. pub fn get_realm(&self) -> tide::Result<Stored<schema::Realm>> {
  21. self.db
  22. .realms
  23. .keyed(self.realm_str)
  24. .get()?
  25. .ok_or(tide::Error::from_str(404, "No such realm"))
  26. }
  27. fn build_session(
  28. &self,
  29. ) -> tide::Result<(schema::Session, Option<tide::http::Cookie<'static>>)> {
  30. let rng = ring::rand::SystemRandom::new();
  31. let session_id: [u8; 32] = ring::rand::generate(&rng)
  32. .map_err(|_| tide::Error::from_str(500, "Failed to generate session ID"))?
  33. .expose();
  34. let session_id = base64::encode_config(session_id, base64::URL_SAFE_NO_PAD);
  35. // XXX: replace with in-place insertion once support for that is added to microrm
  36. let session = self.db.sessions.insert_and_return(schema::Session {
  37. session_id: session_id.clone(),
  38. auth: Default::default(),
  39. expiry: time::OffsetDateTime::now_utc() + time::Duration::minutes(10),
  40. })?;
  41. let session_cookie = Cookie::build(SESSION_COOKIE_NAME, session_id)
  42. .path("/")
  43. .finish();
  44. Ok((session.wrapped(), Some(session_cookie)))
  45. }
  46. pub fn verify_session(&self, req: &Request) -> Option<(Stored<schema::Realm>, schema::UserID)> {
  47. self.get_or_build_session(req)
  48. .ok()
  49. .zip(self.get_realm().ok())
  50. .and_then(|((sid, _cookie), realm)| {
  51. self.get_auth_for_session(realm.id(), &sid)
  52. .and_then(|auth| auth.user.map(|user| (realm, user)))
  53. })
  54. }
  55. pub fn get_session(&self, req: &Request) -> Option<schema::Session> {
  56. req.cookie(SESSION_COOKIE_NAME).and_then(|sid| {
  57. self.db
  58. .sessions
  59. .keyed(sid.value())
  60. .get()
  61. .ok()
  62. .flatten()
  63. .map(|v| v.wrapped())
  64. })
  65. }
  66. pub fn get_or_build_session(
  67. &self,
  68. req: &Request,
  69. ) -> tide::Result<(schema::Session, Option<tide::http::Cookie<'static>>)> {
  70. match self.get_session(req) {
  71. Some(s) => Ok((s, None)),
  72. None => self.build_session(),
  73. }
  74. }
  75. pub fn get_auth_for_session(
  76. &self,
  77. realm: schema::RealmID,
  78. session: &schema::Session,
  79. ) -> Option<Stored<schema::SessionAuth>> {
  80. session
  81. .auth
  82. .with(schema::SessionAuth::Realm, realm)
  83. .first()
  84. .get()
  85. .ok()?
  86. }
  87. pub fn destroy_auth(
  88. &self,
  89. realm: schema::RealmID,
  90. session: &schema::Session,
  91. ) -> Result<(), UIDCError> {
  92. session
  93. .auth
  94. .with(schema::SessionAuth::Realm, realm)
  95. .first()
  96. .delete()?;
  97. Ok(())
  98. }
  99. }
  100. impl<'l> SessionHelper<'l> {
  101. fn render_login_from_auth(
  102. &self,
  103. mut response: tide::Response,
  104. redirect: String,
  105. auth: Option<schema::SessionAuth>,
  106. error_msg: Option<String>,
  107. ) -> tide::Response {
  108. let to_present: Option<schema::AuthChallengeType> = match auth {
  109. None => Some(schema::AuthChallengeType::Username),
  110. Some(auth) => auth.pending_challenges.as_ref().first().copied(),
  111. };
  112. if let Some(to_present) = to_present {
  113. self.render_login_page(response, redirect, to_present, error_msg)
  114. } else {
  115. response.set_status(302);
  116. tide::Redirect::new(redirect).into()
  117. }
  118. }
  119. fn render_login_page(
  120. &self,
  121. mut response: tide::Response,
  122. redirect: String,
  123. to_present: schema::AuthChallengeType,
  124. error_msg: Option<String>,
  125. ) -> tide::Response {
  126. let do_challenge = |ty, ch| {
  127. self.tmpl
  128. .render(
  129. "id_v1_login",
  130. &serde_json::json!(
  131. {
  132. "challenge":
  133. format!(r#"
  134. <td class="challenge-type">
  135. <input type="hidden" name="challenge_type" value="{:?}" />
  136. {}
  137. </td>
  138. <td class="challenge-content">{}</td>
  139. "#,
  140. to_present, ty, ch),
  141. "redirect": redirect,
  142. "error_msg": error_msg.iter().collect::<Vec<_>>()
  143. }
  144. ),
  145. )
  146. .unwrap()
  147. };
  148. response.set_content_type("text/html");
  149. match to_present {
  150. schema::AuthChallengeType::Username => {
  151. response.set_body(do_challenge(
  152. "Username",
  153. r#"<input name="challenge" type="text" autofocus />"#,
  154. ));
  155. }
  156. schema::AuthChallengeType::Password => {
  157. response.set_body(do_challenge(
  158. "Password",
  159. r#"<input name="challenge" type="password" autofocus />"#,
  160. ));
  161. }
  162. schema::AuthChallengeType::Totp => {
  163. response.set_body(do_challenge(
  164. "Authenticator code",
  165. r#"<input name="challenge" type="text" autofocus />"#,
  166. ));
  167. }
  168. _ => todo!(),
  169. }
  170. response
  171. }
  172. }
  173. async fn v1_login(req: Request) -> tide::Result<tide::Response> {
  174. log::info!("in v1_login");
  175. let mut response = tide::Response::builder(200).build();
  176. let shelper = SessionHelper::new(&req);
  177. let realm = shelper.get_realm()?;
  178. let (session, cookie) = shelper.get_or_build_session(&req)?;
  179. if let Some(c) = cookie {
  180. response.insert_cookie(c)
  181. }
  182. let auth = shelper.get_auth_for_session(realm.id(), &session);
  183. #[derive(serde::Deserialize)]
  184. struct LoginQuery {
  185. redirect: Option<String>,
  186. }
  187. let query: LoginQuery = req.query().unwrap();
  188. Ok(shelper.render_login_from_auth(
  189. response,
  190. query.redirect.unwrap_or_else(|| "../..".to_string()),
  191. auth.map(Stored::wrapped),
  192. None,
  193. ))
  194. }
  195. async fn v1_login_post(mut req: Request) -> tide::Result<tide::Response> {
  196. let mut response = tide::Response::builder(200).build();
  197. #[derive(Deserialize)]
  198. struct ResponseBody {
  199. challenge_type: String,
  200. challenge: String,
  201. reset: Option<String>,
  202. redirect: String,
  203. }
  204. let body: ResponseBody = req.body_form().await?;
  205. let shelper = SessionHelper::new(&req);
  206. let realm = shelper.get_realm()?;
  207. let (session, cookie) = shelper.get_or_build_session(&req)?;
  208. if let Some(c) = cookie {
  209. response.insert_cookie(c)
  210. }
  211. let mut auth = shelper.get_auth_for_session(realm.id(), &session);
  212. // check if a login reset was requested; if so, we start again from the top
  213. if body.reset.is_some() {
  214. shelper.destroy_auth(realm.id(), &session)?;
  215. // TODO: include original redirect URL here
  216. return Ok(tide::Redirect::new("login").into());
  217. }
  218. use schema::AuthChallengeType as ChallengeType;
  219. let challenge: schema::AuthChallengeType = match body.challenge_type.as_str() {
  220. "Username" => ChallengeType::Username,
  221. "Password" => ChallengeType::Password,
  222. "TOTP" => ChallengeType::Totp,
  223. _ => Err(tide::Error::from_str(400, "Unknown challenge type"))?,
  224. };
  225. let mut error = None;
  226. // check that the response matches what we're expecting next
  227. let to_be_presented: Option<schema::AuthChallengeType> = match &auth {
  228. None => Some(schema::AuthChallengeType::Username),
  229. Some(auth) => auth.pending_challenges.as_ref().first().copied(),
  230. };
  231. if to_be_presented != Some(challenge) {
  232. Err(tide::Error::from_str(400, "Unexpected challenge type"))?
  233. }
  234. match challenge {
  235. // handle the username challenge specially because this sets up the pending challenges.
  236. ChallengeType::Username => {
  237. shelper.destroy_auth(realm.id(), &session)?;
  238. let user = realm
  239. .users
  240. .with(schema::User::Username, &body.challenge)
  241. .first()
  242. .get()?;
  243. if user.is_none() {
  244. error = Some(format!("No such user {}", body.challenge));
  245. } else {
  246. let user = user.unwrap();
  247. let has_totp = user
  248. .auth
  249. .with(
  250. schema::AuthChallenge::ChallengeType,
  251. microrm::schema::Serialized::from(schema::AuthChallengeType::Totp),
  252. )
  253. .count()?
  254. > 0;
  255. // TODO: support more flows than just username,password[,totp]
  256. auth = Some(
  257. session.auth.insert_and_return(schema::SessionAuth {
  258. realm: realm.id(),
  259. user: None,
  260. pending_user: Some(user.id()),
  261. pending_challenges: if has_totp {
  262. vec![
  263. schema::AuthChallengeType::Password,
  264. schema::AuthChallengeType::Totp,
  265. ]
  266. } else {
  267. vec![schema::AuthChallengeType::Password]
  268. }
  269. .into(),
  270. })?,
  271. );
  272. // auth = Some(session.auth.with(id, id).first().get()?.expect("can't re-get just-added entity"));
  273. }
  274. }
  275. ct => {
  276. if let Some(auth) = auth.as_mut() {
  277. if let Some(user_id) = auth.pending_user {
  278. let user = realm
  279. .users
  280. .with_id(user_id)
  281. .get()?
  282. .ok_or(UIDCError::Abort("session auth refers to nonexistent user"))?;
  283. let verification = user.verify_challenge_by_type(ct, body.challenge.as_bytes());
  284. match verification {
  285. Ok(true) => {
  286. auth.pending_challenges.as_mut().remove(0);
  287. // if we're done with the last challenge, mark us as logged in
  288. if auth.pending_challenges.as_ref().is_empty() {
  289. auth.user = auth.pending_user.take();
  290. }
  291. auth.sync()?;
  292. }
  293. Ok(false) => {
  294. error = Some("Incorrect response. Please try again".into());
  295. }
  296. Err(_) => {
  297. error = Some("Internal error. Please contact an administrator.".into());
  298. }
  299. }
  300. } else {
  301. error = Some("User is not configured correctly: either it was deleted or it lacks a required authentication challenge type. Please contact an administrator.".into());
  302. }
  303. } else {
  304. error = Some("Please restart login process.".into());
  305. }
  306. }
  307. };
  308. Ok(shelper.render_login_from_auth(response, body.redirect, auth.map(Stored::wrapped), error))
  309. }
  310. async fn v1_logout(req: Request) -> tide::Result<tide::Response> {
  311. let shelper = SessionHelper::new(&req);
  312. #[derive(serde::Deserialize)]
  313. struct LogoutQuery {
  314. redirect: Option<String>,
  315. }
  316. let query: LogoutQuery = req.query().unwrap();
  317. let realm = shelper.get_realm()?;
  318. shelper
  319. .get_session(&req)
  320. .map(|sid| shelper.destroy_auth(realm.id(), &sid));
  321. Ok(tide::Redirect::new(query.redirect.unwrap_or_else(|| "../..".into())).into())
  322. }
  323. pub(super) fn session_v1_server(mut route: tide::Route<super::ServerStateWrapper>) {
  324. route.at("login").get(v1_login).post(v1_login_post);
  325. route.at("logout").get(v1_logout);
  326. }