453 lines
14 KiB
Rust
453 lines
14 KiB
Rust
use crate::database::Database;
|
|
use crate::guards::refresh_token::get_refresh_token_from_cookie;
|
|
use crate::tokens::{
|
|
JWT_COOKIE_NAME, JWT_DURATION_MINUTES, REFRESH_TOKEN_COOKIE_NAME, REFRESH_TOKEN_DURATION_DAYS,
|
|
};
|
|
use hash::SecretString;
|
|
use id::{KeyID, UserID};
|
|
use jwt::database::Key;
|
|
use jwt::{JwtClaims, PrivateKey};
|
|
use permissions::Permission;
|
|
use refresh_tokens::RefreshToken;
|
|
use rocket::http::Status;
|
|
use rocket::http::{Cookie, CookieJar, SameSite};
|
|
use rocket::request::Outcome;
|
|
use rocket::time::Duration;
|
|
use rocket::tokio::task;
|
|
use rocket::Request;
|
|
use settings::Settings;
|
|
use users::User;
|
|
|
|
mod admin;
|
|
mod admin_not_current;
|
|
mod user;
|
|
|
|
pub use admin::JwtAdmin;
|
|
pub use admin_not_current::JwtAdminNotCurrent;
|
|
pub use user::JwtUser;
|
|
|
|
#[derive(Debug)]
|
|
pub enum Error {
|
|
GetDatabase,
|
|
GetCookies,
|
|
StartTransaction,
|
|
GetRefreshToken(refresh_tokens::Error),
|
|
UserNotFound,
|
|
GetUser(users::Error),
|
|
RevokeRefreshTokens(refresh_tokens::Error),
|
|
MarkRefreshTokenUsed(refresh_tokens::Error),
|
|
GetSettings(settings::Error),
|
|
FirstAdminNotSet,
|
|
ServerUrlNotSet,
|
|
UnknownIp,
|
|
SaveRefreshToken(refresh_tokens::Error),
|
|
GetKey(jwt::Error),
|
|
MostRecentKeyNotFound,
|
|
MostRecentKeyRevoked,
|
|
SignJwt(jwt::Error),
|
|
CommitTransaction,
|
|
Keys(jwt::Error),
|
|
JwtParsing(jwt::Error),
|
|
NoSigningKey,
|
|
NonExistentKey(String),
|
|
RevokedKey(KeyID),
|
|
ImportKey(jwt::Error),
|
|
JwtValidation(jwt::Error),
|
|
BlockingTask(String),
|
|
GetPermissions(permissions::Error),
|
|
}
|
|
|
|
pub struct SpecificUser<'a> {
|
|
allow_first_admin: bool,
|
|
requested_user: &'a UserID,
|
|
}
|
|
|
|
pub(super) fn get_access_token_from_cookie(request: &Request) -> Option<String> {
|
|
request
|
|
.cookies()
|
|
.get(JWT_COOKIE_NAME)
|
|
.map(|cookie| cookie.value().to_string())
|
|
}
|
|
|
|
pub async fn validate_jwt<T>(
|
|
jwt: String,
|
|
request: &Request<'_>,
|
|
get_admin: Option<bool>,
|
|
specific_user: Option<SpecificUser<'_>>,
|
|
) -> Result<Option<JwtClaims>, Outcome<T, Error>> {
|
|
// Get database
|
|
let db = match request.guard::<&Database>().await {
|
|
Outcome::Success(database) => database,
|
|
Outcome::Failure(e) => return Err(Outcome::Failure((e.0, Error::GetDatabase))),
|
|
Outcome::Forward(f) => return Err(Outcome::Forward(f)),
|
|
};
|
|
|
|
let mut transaction = match db.begin().await {
|
|
Ok(transaction) => transaction,
|
|
Err(_e) => {
|
|
return Err(Outcome::Failure((
|
|
Status::InternalServerError,
|
|
Error::StartTransaction,
|
|
)));
|
|
}
|
|
};
|
|
|
|
// Get keys
|
|
let keys = match Key::get_all(&mut transaction, Some(false)).await {
|
|
Ok(keys) => keys,
|
|
Err(e) => {
|
|
return Err(Outcome::Failure((
|
|
Status::InternalServerError,
|
|
Error::Keys(e),
|
|
)))
|
|
}
|
|
};
|
|
|
|
if let Some(specific_user) = specific_user {
|
|
// Get settings
|
|
let settings = match Settings::get(&mut transaction).await {
|
|
Ok(settings) => settings,
|
|
Err(e) => {
|
|
return Err(Outcome::Failure((
|
|
Status::InternalServerError,
|
|
Error::GetSettings(e),
|
|
)));
|
|
}
|
|
};
|
|
|
|
// Get first admin
|
|
let first_admin = match settings.first_admin() {
|
|
Some(home_page) => UserID(home_page.to_string()),
|
|
None => {
|
|
return Err(Outcome::Failure((
|
|
Status::InternalServerError,
|
|
Error::FirstAdminNotSet,
|
|
)));
|
|
}
|
|
};
|
|
|
|
// If requested user is the first admin and they're not allowed
|
|
if !specific_user.allow_first_admin && specific_user.requested_user == &first_admin {
|
|
return Ok(None);
|
|
}
|
|
}
|
|
|
|
if let Err(_e) = transaction.commit().await {
|
|
return Err(Outcome::Failure((
|
|
Status::InternalServerError,
|
|
Error::CommitTransaction,
|
|
)));
|
|
}
|
|
|
|
match task::spawn_blocking(move || -> Result<Option<JwtClaims>, Error> {
|
|
// Parse jwt
|
|
let parsed_jwt = jwt::parse(&jwt).map_err(Error::JwtParsing)?;
|
|
|
|
// Get key id
|
|
let jwk_id = parsed_jwt
|
|
.header()
|
|
.key_id
|
|
.as_deref()
|
|
.ok_or(Error::NoSigningKey)?;
|
|
|
|
// Get key
|
|
let key = keys
|
|
.iter()
|
|
.find(|&key| key.key_id().as_ref() == jwk_id)
|
|
.ok_or_else(|| Error::NonExistentKey(jwk_id.into()))?;
|
|
|
|
// If key has been revoked
|
|
if key.is_revoked() {
|
|
return Err(Error::RevokedKey(key.key_id().to_owned()));
|
|
}
|
|
|
|
// Import private key
|
|
let private_key =
|
|
PrivateKey::from_der(key.private_der(), key.key_id()).map_err(Error::ImportKey)?;
|
|
|
|
// Validate jwt and get claims
|
|
let jwt_claims = private_key
|
|
.validate_jwt_extract_claims(&parsed_jwt)
|
|
.map_err(Error::JwtValidation)?;
|
|
|
|
// Is specific kind of user required?
|
|
match get_admin {
|
|
// Yes, need to get specific kind of user
|
|
Some(get_admin) => {
|
|
if jwt_claims.is_admin == get_admin {
|
|
Ok(Some(jwt_claims))
|
|
} else {
|
|
Ok(None)
|
|
}
|
|
}
|
|
// No, any user is good
|
|
None => Ok(Some(jwt_claims)),
|
|
}
|
|
})
|
|
.await
|
|
{
|
|
Ok(result) => match result {
|
|
Ok(claims) => {
|
|
// Return jwt claims
|
|
Ok(claims)
|
|
}
|
|
Err(_e) => Err(Outcome::Forward(())),
|
|
},
|
|
Err(e) => {
|
|
// Failed to run blocking task
|
|
Err(Outcome::Failure((
|
|
Status::InternalServerError,
|
|
Error::BlockingTask(e.to_string()),
|
|
)))
|
|
}
|
|
}
|
|
}
|
|
|
|
pub async fn use_refresh_token(
|
|
refresh: String,
|
|
request: &Request<'_>,
|
|
get_admin: Option<bool>,
|
|
) -> Outcome<JwtClaims, Error> {
|
|
// Get database
|
|
let db = match request.guard::<&Database>().await {
|
|
Outcome::Success(database) => database,
|
|
Outcome::Failure(e) => return Outcome::Failure((e.0, Error::GetDatabase)),
|
|
Outcome::Forward(f) => return Outcome::Forward(f),
|
|
};
|
|
|
|
// Get cookies
|
|
let cookie_jar = match request.guard::<&CookieJar>().await {
|
|
Outcome::Success(cookie_jar) => cookie_jar,
|
|
Outcome::Failure(e) => return Outcome::Failure((e.0, Error::GetCookies)),
|
|
Outcome::Forward(f) => return Outcome::Forward(f),
|
|
};
|
|
|
|
let mut transaction = match db.begin().await {
|
|
Ok(transaction) => transaction,
|
|
Err(_e) => {
|
|
return Outcome::Failure((Status::InternalServerError, Error::StartTransaction));
|
|
}
|
|
};
|
|
|
|
let refresh_token = match RefreshToken::get_one(&mut transaction, &refresh).await {
|
|
Ok(refresh_token) => match refresh_token {
|
|
Some(refresh_token) => refresh_token,
|
|
None => return Outcome::Forward(()),
|
|
},
|
|
Err(e) => {
|
|
return Outcome::Failure((Status::InternalServerError, Error::GetRefreshToken(e)));
|
|
}
|
|
};
|
|
|
|
let user = match User::get_one_from_refresh_token(&mut transaction, &refresh).await {
|
|
Ok(user) => match user {
|
|
Some(user) => user,
|
|
None => {
|
|
return Outcome::Failure((Status::InternalServerError, Error::UserNotFound));
|
|
}
|
|
},
|
|
Err(e) => {
|
|
return Outcome::Failure((Status::InternalServerError, Error::GetUser(e)));
|
|
}
|
|
};
|
|
|
|
// make sure that `get_admin` is respected, dont generate token for unwanted users!
|
|
if let Some(get_admin) = get_admin {
|
|
if user.is_admin() != get_admin {
|
|
return Outcome::Forward(());
|
|
}
|
|
}
|
|
|
|
if refresh_token.has_been_used() {
|
|
// Revoke all tokens for user
|
|
if let Err(e) =
|
|
RefreshToken::revoke_all_for_user(&mut transaction, refresh_token.user()).await
|
|
{
|
|
return Outcome::Failure((Status::InternalServerError, Error::RevokeRefreshTokens(e)));
|
|
}
|
|
|
|
if let Err(_e) = transaction.commit().await {
|
|
return Outcome::Failure((Status::InternalServerError, Error::CommitTransaction));
|
|
}
|
|
|
|
return Outcome::Forward(());
|
|
}
|
|
|
|
if refresh_token.is_revoked() {
|
|
return Outcome::Forward(());
|
|
}
|
|
|
|
if refresh_token.has_expired() {
|
|
return Outcome::Forward(());
|
|
}
|
|
|
|
if let Err(e) = refresh_token.use_token(&mut transaction).await {
|
|
return Outcome::Failure((Status::InternalServerError, Error::MarkRefreshTokenUsed(e)));
|
|
}
|
|
|
|
// Get base url
|
|
let settings = match Settings::get(&mut transaction).await {
|
|
Ok(settings) => settings,
|
|
Err(e) => {
|
|
return Outcome::Failure((Status::InternalServerError, Error::GetSettings(e)));
|
|
}
|
|
};
|
|
|
|
let home_page = match settings.url().map(String::from) {
|
|
Some(home_page) => home_page,
|
|
None => {
|
|
return Outcome::Failure((Status::InternalServerError, Error::ServerUrlNotSet));
|
|
}
|
|
};
|
|
|
|
// Generate refresh token
|
|
let new_refresh_token = match task::spawn_blocking(SecretString::default).await {
|
|
Ok(new_refresh_token) => new_refresh_token,
|
|
Err(e) => {
|
|
return Outcome::Failure((
|
|
Status::InternalServerError,
|
|
Error::BlockingTask(e.to_string()),
|
|
));
|
|
}
|
|
};
|
|
|
|
// Attempt to get ip address
|
|
let ip_address = match request.client_ip() {
|
|
Some(ip) => ip.to_string(),
|
|
None => {
|
|
return Outcome::Failure((Status::BadRequest, Error::UnknownIp));
|
|
}
|
|
};
|
|
|
|
// Insert refresh token in database
|
|
if let Err(e) = RefreshToken::insert(
|
|
&mut transaction,
|
|
new_refresh_token.as_ref(),
|
|
ip_address,
|
|
user.id(),
|
|
refresh_token.app(),
|
|
REFRESH_TOKEN_DURATION_DAYS,
|
|
)
|
|
.await
|
|
{
|
|
return Outcome::Failure((Status::InternalServerError, Error::SaveRefreshToken(e)));
|
|
}
|
|
|
|
// Add refresh token as a cookie
|
|
let mut cookie = Cookie::new(
|
|
REFRESH_TOKEN_COOKIE_NAME,
|
|
new_refresh_token.as_ref().to_string(),
|
|
);
|
|
cookie.set_secure(true);
|
|
cookie.set_http_only(true);
|
|
cookie.set_same_site(SameSite::Strict);
|
|
cookie.set_max_age(Duration::days(REFRESH_TOKEN_DURATION_DAYS));
|
|
cookie_jar.add(cookie);
|
|
|
|
// Get latest key from database
|
|
let key = match Key::get_most_recent(&mut transaction).await {
|
|
Ok(key) => match key {
|
|
Some(key) => key,
|
|
None => {
|
|
return Outcome::Failure((
|
|
Status::InternalServerError,
|
|
Error::MostRecentKeyNotFound,
|
|
));
|
|
}
|
|
},
|
|
Err(e) => {
|
|
return Outcome::Failure((Status::InternalServerError, Error::GetKey(e)));
|
|
}
|
|
};
|
|
|
|
// Make sure key has not been revoked
|
|
if key.is_revoked() {
|
|
return Outcome::Failure((Status::InternalServerError, Error::MostRecentKeyRevoked));
|
|
}
|
|
|
|
// Import private key
|
|
let private_key =
|
|
match task::spawn_blocking(move || PrivateKey::from_der(key.private_der(), key.key_id()))
|
|
.await
|
|
{
|
|
Ok(private_key) => match private_key {
|
|
Ok(private_key) => private_key,
|
|
Err(e) => {
|
|
return Outcome::Failure((Status::InternalServerError, Error::ImportKey(e)));
|
|
}
|
|
},
|
|
Err(e) => {
|
|
return Outcome::Failure((
|
|
Status::InternalServerError,
|
|
Error::BlockingTask(e.to_string()),
|
|
));
|
|
}
|
|
};
|
|
|
|
// Get user roles
|
|
let roles = match Permission::get_all(&mut transaction, Some(user.id()), None).await {
|
|
Ok(roles) => roles
|
|
.into_iter()
|
|
.map(|role| role.role().to_string())
|
|
.collect(),
|
|
Err(e) => {
|
|
return Outcome::Failure((Status::InternalServerError, Error::GetPermissions(e)));
|
|
}
|
|
};
|
|
|
|
// Create jwt, sign and serialize
|
|
let jwt_claims = JwtClaims::new(home_page.clone(), "ezidam", &user, roles);
|
|
let jwt = match jwt_claims
|
|
.clone()
|
|
.sign_serialize(&private_key, JWT_DURATION_MINUTES)
|
|
{
|
|
Ok(jwt) => jwt,
|
|
Err(e) => {
|
|
return Outcome::Failure((Status::InternalServerError, Error::SignJwt(e)));
|
|
}
|
|
};
|
|
|
|
// Add jwt as a cookie
|
|
let mut cookie = Cookie::new(JWT_COOKIE_NAME, jwt);
|
|
cookie.set_secure(true);
|
|
cookie.set_http_only(true);
|
|
cookie.set_same_site(SameSite::Strict);
|
|
cookie.set_max_age(Duration::minutes(JWT_DURATION_MINUTES));
|
|
cookie_jar.add(cookie);
|
|
|
|
if let Err(_e) = transaction.commit().await {
|
|
return Outcome::Failure((Status::InternalServerError, Error::CommitTransaction));
|
|
}
|
|
|
|
Outcome::Success(jwt_claims)
|
|
}
|
|
|
|
pub async fn use_access_token_or_refresh_token(
|
|
request: &Request<'_>,
|
|
get_admin: Option<bool>,
|
|
specific_user: Option<SpecificUser<'_>>,
|
|
) -> Outcome<JwtClaims, Error> {
|
|
let access_token = get_access_token_from_cookie(request);
|
|
let refresh_token = get_refresh_token_from_cookie(request);
|
|
|
|
match (access_token, refresh_token) {
|
|
(Some(access), _) => {
|
|
// If there is an access token, attempt to validate it
|
|
match validate_jwt(access, request, get_admin, specific_user).await {
|
|
Ok(jwt_claims) => match jwt_claims {
|
|
Some(jwt_claims) => Outcome::Success(jwt_claims),
|
|
None => Outcome::Forward(()),
|
|
},
|
|
Err(e) => e,
|
|
}
|
|
}
|
|
(None, Some(refresh)) => {
|
|
// Use refresh token to get new access token
|
|
use_refresh_token(refresh, request, get_admin).await
|
|
}
|
|
(None, None) => {
|
|
// Nothing to do
|
|
Outcome::Forward(())
|
|
}
|
|
}
|
|
}
|