accounts.rs 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661
  1. use chrono::Utc;
  2. use rocket_contrib::json::Json;
  3. use serde_json::Value;
  4. use crate::{
  5. api::{EmptyResult, JsonResult, JsonUpcase, Notify, NumberOrString, PasswordData, UpdateType},
  6. auth::{decode_delete, decode_invite, decode_verify_email, Headers},
  7. crypto,
  8. db::{models::*, DbConn},
  9. mail, CONFIG,
  10. };
  11. pub fn routes() -> Vec<rocket::Route> {
  12. routes![
  13. register,
  14. profile,
  15. put_profile,
  16. post_profile,
  17. get_public_keys,
  18. post_keys,
  19. post_password,
  20. post_kdf,
  21. post_rotatekey,
  22. post_sstamp,
  23. post_email_token,
  24. post_email,
  25. post_verify_email,
  26. post_verify_email_token,
  27. post_delete_recover,
  28. post_delete_recover_token,
  29. delete_account,
  30. post_delete_account,
  31. revision_date,
  32. password_hint,
  33. prelogin,
  34. verify_password,
  35. ]
  36. }
  37. #[derive(Deserialize, Debug)]
  38. #[allow(non_snake_case)]
  39. struct RegisterData {
  40. Email: String,
  41. Kdf: Option<i32>,
  42. KdfIterations: Option<i32>,
  43. Key: String,
  44. Keys: Option<KeysData>,
  45. MasterPasswordHash: String,
  46. MasterPasswordHint: Option<String>,
  47. Name: Option<String>,
  48. Token: Option<String>,
  49. OrganizationUserId: Option<String>,
  50. }
  51. #[derive(Deserialize, Debug)]
  52. #[allow(non_snake_case)]
  53. struct KeysData {
  54. EncryptedPrivateKey: String,
  55. PublicKey: String,
  56. }
  57. #[post("/accounts/register", data = "<data>")]
  58. fn register(data: JsonUpcase<RegisterData>, conn: DbConn) -> EmptyResult {
  59. let data: RegisterData = data.into_inner().data;
  60. let email = data.Email.to_lowercase();
  61. let mut user = match User::find_by_mail(&email, &conn) {
  62. Some(user) => {
  63. if !user.password_hash.is_empty() {
  64. if CONFIG.is_signup_allowed(&email) {
  65. err!("User already exists")
  66. } else {
  67. err!("Registration not allowed or user already exists")
  68. }
  69. }
  70. if let Some(token) = data.Token {
  71. let claims = decode_invite(&token)?;
  72. if claims.email == email {
  73. user
  74. } else {
  75. err!("Registration email does not match invite email")
  76. }
  77. } else if Invitation::take(&email, &conn) {
  78. for mut user_org in UserOrganization::find_invited_by_user(&user.uuid, &conn).iter_mut() {
  79. user_org.status = UserOrgStatus::Accepted as i32;
  80. user_org.save(&conn)?;
  81. }
  82. user
  83. } else if CONFIG.is_signup_allowed(&email) {
  84. err!("Account with this email already exists")
  85. } else {
  86. err!("Registration not allowed or user already exists")
  87. }
  88. }
  89. None => {
  90. // Order is important here; the invitation check must come first
  91. // because the vaultwarden admin can invite anyone, regardless
  92. // of other signup restrictions.
  93. if Invitation::take(&email, &conn) || CONFIG.is_signup_allowed(&email) {
  94. User::new(email.clone())
  95. } else {
  96. err!("Registration not allowed or user already exists")
  97. }
  98. }
  99. };
  100. // Make sure we don't leave a lingering invitation.
  101. Invitation::take(&email, &conn);
  102. if let Some(client_kdf_iter) = data.KdfIterations {
  103. user.client_kdf_iter = client_kdf_iter;
  104. }
  105. if let Some(client_kdf_type) = data.Kdf {
  106. user.client_kdf_type = client_kdf_type;
  107. }
  108. user.set_password(&data.MasterPasswordHash, None);
  109. user.akey = data.Key;
  110. // Add extra fields if present
  111. if let Some(name) = data.Name {
  112. user.name = name;
  113. }
  114. if let Some(hint) = data.MasterPasswordHint {
  115. user.password_hint = Some(hint);
  116. }
  117. if let Some(keys) = data.Keys {
  118. user.private_key = Some(keys.EncryptedPrivateKey);
  119. user.public_key = Some(keys.PublicKey);
  120. }
  121. if CONFIG.mail_enabled() {
  122. if CONFIG.signups_verify() {
  123. if let Err(e) = mail::send_welcome_must_verify(&user.email, &user.uuid) {
  124. error!("Error sending welcome email: {:#?}", e);
  125. }
  126. user.last_verifying_at = Some(user.created_at);
  127. } else if let Err(e) = mail::send_welcome(&user.email) {
  128. error!("Error sending welcome email: {:#?}", e);
  129. }
  130. }
  131. user.save(&conn)
  132. }
  133. #[get("/accounts/profile")]
  134. fn profile(headers: Headers, conn: DbConn) -> Json<Value> {
  135. Json(headers.user.to_json(&conn))
  136. }
  137. #[derive(Deserialize, Debug)]
  138. #[allow(non_snake_case)]
  139. struct ProfileData {
  140. #[serde(rename = "Culture")]
  141. _Culture: String, // Ignored, always use en-US
  142. MasterPasswordHint: Option<String>,
  143. Name: String,
  144. }
  145. #[put("/accounts/profile", data = "<data>")]
  146. fn put_profile(data: JsonUpcase<ProfileData>, headers: Headers, conn: DbConn) -> JsonResult {
  147. post_profile(data, headers, conn)
  148. }
  149. #[post("/accounts/profile", data = "<data>")]
  150. fn post_profile(data: JsonUpcase<ProfileData>, headers: Headers, conn: DbConn) -> JsonResult {
  151. let data: ProfileData = data.into_inner().data;
  152. let mut user = headers.user;
  153. user.name = data.Name;
  154. user.password_hint = match data.MasterPasswordHint {
  155. Some(ref h) if h.is_empty() => None,
  156. _ => data.MasterPasswordHint,
  157. };
  158. user.save(&conn)?;
  159. Ok(Json(user.to_json(&conn)))
  160. }
  161. #[get("/users/<uuid>/public-key")]
  162. fn get_public_keys(uuid: String, _headers: Headers, conn: DbConn) -> JsonResult {
  163. let user = match User::find_by_uuid(&uuid, &conn) {
  164. Some(user) => user,
  165. None => err!("User doesn't exist"),
  166. };
  167. Ok(Json(json!({
  168. "UserId": user.uuid,
  169. "PublicKey": user.public_key,
  170. "Object":"userKey"
  171. })))
  172. }
  173. #[post("/accounts/keys", data = "<data>")]
  174. fn post_keys(data: JsonUpcase<KeysData>, headers: Headers, conn: DbConn) -> JsonResult {
  175. let data: KeysData = data.into_inner().data;
  176. let mut user = headers.user;
  177. user.private_key = Some(data.EncryptedPrivateKey);
  178. user.public_key = Some(data.PublicKey);
  179. user.save(&conn)?;
  180. Ok(Json(json!({
  181. "PrivateKey": user.private_key,
  182. "PublicKey": user.public_key,
  183. "Object":"keys"
  184. })))
  185. }
  186. #[derive(Deserialize)]
  187. #[allow(non_snake_case)]
  188. struct ChangePassData {
  189. MasterPasswordHash: String,
  190. NewMasterPasswordHash: String,
  191. Key: String,
  192. }
  193. #[post("/accounts/password", data = "<data>")]
  194. fn post_password(data: JsonUpcase<ChangePassData>, headers: Headers, conn: DbConn) -> EmptyResult {
  195. let data: ChangePassData = data.into_inner().data;
  196. let mut user = headers.user;
  197. if !user.check_valid_password(&data.MasterPasswordHash) {
  198. err!("Invalid password")
  199. }
  200. user.set_password(
  201. &data.NewMasterPasswordHash,
  202. Some(vec![String::from("post_rotatekey"), String::from("get_contacts")]),
  203. );
  204. user.akey = data.Key;
  205. user.save(&conn)
  206. }
  207. #[derive(Deserialize)]
  208. #[allow(non_snake_case)]
  209. struct ChangeKdfData {
  210. Kdf: i32,
  211. KdfIterations: i32,
  212. MasterPasswordHash: String,
  213. NewMasterPasswordHash: String,
  214. Key: String,
  215. }
  216. #[post("/accounts/kdf", data = "<data>")]
  217. fn post_kdf(data: JsonUpcase<ChangeKdfData>, headers: Headers, conn: DbConn) -> EmptyResult {
  218. let data: ChangeKdfData = data.into_inner().data;
  219. let mut user = headers.user;
  220. if !user.check_valid_password(&data.MasterPasswordHash) {
  221. err!("Invalid password")
  222. }
  223. user.client_kdf_iter = data.KdfIterations;
  224. user.client_kdf_type = data.Kdf;
  225. user.set_password(&data.NewMasterPasswordHash, None);
  226. user.akey = data.Key;
  227. user.save(&conn)
  228. }
  229. #[derive(Deserialize)]
  230. #[allow(non_snake_case)]
  231. struct UpdateFolderData {
  232. Id: String,
  233. Name: String,
  234. }
  235. use super::ciphers::CipherData;
  236. #[derive(Deserialize)]
  237. #[allow(non_snake_case)]
  238. struct KeyData {
  239. Ciphers: Vec<CipherData>,
  240. Folders: Vec<UpdateFolderData>,
  241. Key: String,
  242. PrivateKey: String,
  243. MasterPasswordHash: String,
  244. }
  245. #[post("/accounts/key", data = "<data>")]
  246. fn post_rotatekey(data: JsonUpcase<KeyData>, headers: Headers, conn: DbConn, nt: Notify) -> EmptyResult {
  247. let data: KeyData = data.into_inner().data;
  248. if !headers.user.check_valid_password(&data.MasterPasswordHash) {
  249. err!("Invalid password")
  250. }
  251. let user_uuid = &headers.user.uuid;
  252. // Update folder data
  253. for folder_data in data.Folders {
  254. let mut saved_folder = match Folder::find_by_uuid(&folder_data.Id, &conn) {
  255. Some(folder) => folder,
  256. None => err!("Folder doesn't exist"),
  257. };
  258. if &saved_folder.user_uuid != user_uuid {
  259. err!("The folder is not owned by the user")
  260. }
  261. saved_folder.name = folder_data.Name;
  262. saved_folder.save(&conn)?
  263. }
  264. // Update cipher data
  265. use super::ciphers::update_cipher_from_data;
  266. for cipher_data in data.Ciphers {
  267. let mut saved_cipher = match Cipher::find_by_uuid(cipher_data.Id.as_ref().unwrap(), &conn) {
  268. Some(cipher) => cipher,
  269. None => err!("Cipher doesn't exist"),
  270. };
  271. if saved_cipher.user_uuid.as_ref().unwrap() != user_uuid {
  272. err!("The cipher is not owned by the user")
  273. }
  274. // Prevent triggering cipher updates via WebSockets by settings UpdateType::None
  275. // The user sessions are invalidated because all the ciphers were re-encrypted and thus triggering an update could cause issues.
  276. update_cipher_from_data(&mut saved_cipher, cipher_data, &headers, false, &conn, &nt, UpdateType::None)?
  277. }
  278. // Update user data
  279. let mut user = headers.user;
  280. user.akey = data.Key;
  281. user.private_key = Some(data.PrivateKey);
  282. user.reset_security_stamp();
  283. user.save(&conn)
  284. }
  285. #[post("/accounts/security-stamp", data = "<data>")]
  286. fn post_sstamp(data: JsonUpcase<PasswordData>, headers: Headers, conn: DbConn) -> EmptyResult {
  287. let data: PasswordData = data.into_inner().data;
  288. let mut user = headers.user;
  289. if !user.check_valid_password(&data.MasterPasswordHash) {
  290. err!("Invalid password")
  291. }
  292. Device::delete_all_by_user(&user.uuid, &conn)?;
  293. user.reset_security_stamp();
  294. user.save(&conn)
  295. }
  296. #[derive(Deserialize)]
  297. #[allow(non_snake_case)]
  298. struct EmailTokenData {
  299. MasterPasswordHash: String,
  300. NewEmail: String,
  301. }
  302. #[post("/accounts/email-token", data = "<data>")]
  303. fn post_email_token(data: JsonUpcase<EmailTokenData>, headers: Headers, conn: DbConn) -> EmptyResult {
  304. let data: EmailTokenData = data.into_inner().data;
  305. let mut user = headers.user;
  306. if !user.check_valid_password(&data.MasterPasswordHash) {
  307. err!("Invalid password")
  308. }
  309. if User::find_by_mail(&data.NewEmail, &conn).is_some() {
  310. err!("Email already in use");
  311. }
  312. if !CONFIG.is_email_domain_allowed(&data.NewEmail) {
  313. err!("Email domain not allowed");
  314. }
  315. let token = crypto::generate_token(6)?;
  316. if CONFIG.mail_enabled() {
  317. if let Err(e) = mail::send_change_email(&data.NewEmail, &token) {
  318. error!("Error sending change-email email: {:#?}", e);
  319. }
  320. }
  321. user.email_new = Some(data.NewEmail);
  322. user.email_new_token = Some(token);
  323. user.save(&conn)
  324. }
  325. #[derive(Deserialize)]
  326. #[allow(non_snake_case)]
  327. struct ChangeEmailData {
  328. MasterPasswordHash: String,
  329. NewEmail: String,
  330. Key: String,
  331. NewMasterPasswordHash: String,
  332. Token: NumberOrString,
  333. }
  334. #[post("/accounts/email", data = "<data>")]
  335. fn post_email(data: JsonUpcase<ChangeEmailData>, headers: Headers, conn: DbConn) -> EmptyResult {
  336. let data: ChangeEmailData = data.into_inner().data;
  337. let mut user = headers.user;
  338. if !user.check_valid_password(&data.MasterPasswordHash) {
  339. err!("Invalid password")
  340. }
  341. if User::find_by_mail(&data.NewEmail, &conn).is_some() {
  342. err!("Email already in use");
  343. }
  344. match user.email_new {
  345. Some(ref val) => {
  346. if val != &data.NewEmail {
  347. err!("Email change mismatch");
  348. }
  349. }
  350. None => err!("No email change pending"),
  351. }
  352. if CONFIG.mail_enabled() {
  353. // Only check the token if we sent out an email...
  354. match user.email_new_token {
  355. Some(ref val) => {
  356. if *val != data.Token.into_string() {
  357. err!("Token mismatch");
  358. }
  359. }
  360. None => err!("No email change pending"),
  361. }
  362. user.verified_at = Some(Utc::now().naive_utc());
  363. } else {
  364. user.verified_at = None;
  365. }
  366. user.email = data.NewEmail;
  367. user.email_new = None;
  368. user.email_new_token = None;
  369. user.set_password(&data.NewMasterPasswordHash, None);
  370. user.akey = data.Key;
  371. user.save(&conn)
  372. }
  373. #[post("/accounts/verify-email")]
  374. fn post_verify_email(headers: Headers, _conn: DbConn) -> EmptyResult {
  375. let user = headers.user;
  376. if !CONFIG.mail_enabled() {
  377. err!("Cannot verify email address");
  378. }
  379. if let Err(e) = mail::send_verify_email(&user.email, &user.uuid) {
  380. error!("Error sending verify_email email: {:#?}", e);
  381. }
  382. Ok(())
  383. }
  384. #[derive(Deserialize)]
  385. #[allow(non_snake_case)]
  386. struct VerifyEmailTokenData {
  387. UserId: String,
  388. Token: String,
  389. }
  390. #[post("/accounts/verify-email-token", data = "<data>")]
  391. fn post_verify_email_token(data: JsonUpcase<VerifyEmailTokenData>, conn: DbConn) -> EmptyResult {
  392. let data: VerifyEmailTokenData = data.into_inner().data;
  393. let mut user = match User::find_by_uuid(&data.UserId, &conn) {
  394. Some(user) => user,
  395. None => err!("User doesn't exist"),
  396. };
  397. let claims = match decode_verify_email(&data.Token) {
  398. Ok(claims) => claims,
  399. Err(_) => err!("Invalid claim"),
  400. };
  401. if claims.sub != user.uuid {
  402. err!("Invalid claim");
  403. }
  404. user.verified_at = Some(Utc::now().naive_utc());
  405. user.last_verifying_at = None;
  406. user.login_verify_count = 0;
  407. if let Err(e) = user.save(&conn) {
  408. error!("Error saving email verification: {:#?}", e);
  409. }
  410. Ok(())
  411. }
  412. #[derive(Deserialize)]
  413. #[allow(non_snake_case)]
  414. struct DeleteRecoverData {
  415. Email: String,
  416. }
  417. #[post("/accounts/delete-recover", data = "<data>")]
  418. fn post_delete_recover(data: JsonUpcase<DeleteRecoverData>, conn: DbConn) -> EmptyResult {
  419. let data: DeleteRecoverData = data.into_inner().data;
  420. let user = User::find_by_mail(&data.Email, &conn);
  421. if CONFIG.mail_enabled() {
  422. if let Some(user) = user {
  423. if let Err(e) = mail::send_delete_account(&user.email, &user.uuid) {
  424. error!("Error sending delete account email: {:#?}", e);
  425. }
  426. }
  427. Ok(())
  428. } else {
  429. // We don't support sending emails, but we shouldn't allow anybody
  430. // to delete accounts without at least logging in... And if the user
  431. // cannot remember their password then they will need to contact
  432. // the administrator to delete it...
  433. err!("Please contact the administrator to delete your account");
  434. }
  435. }
  436. #[derive(Deserialize)]
  437. #[allow(non_snake_case)]
  438. struct DeleteRecoverTokenData {
  439. UserId: String,
  440. Token: String,
  441. }
  442. #[post("/accounts/delete-recover-token", data = "<data>")]
  443. fn post_delete_recover_token(data: JsonUpcase<DeleteRecoverTokenData>, conn: DbConn) -> EmptyResult {
  444. let data: DeleteRecoverTokenData = data.into_inner().data;
  445. let user = match User::find_by_uuid(&data.UserId, &conn) {
  446. Some(user) => user,
  447. None => err!("User doesn't exist"),
  448. };
  449. let claims = match decode_delete(&data.Token) {
  450. Ok(claims) => claims,
  451. Err(_) => err!("Invalid claim"),
  452. };
  453. if claims.sub != user.uuid {
  454. err!("Invalid claim");
  455. }
  456. user.delete(&conn)
  457. }
  458. #[post("/accounts/delete", data = "<data>")]
  459. fn post_delete_account(data: JsonUpcase<PasswordData>, headers: Headers, conn: DbConn) -> EmptyResult {
  460. delete_account(data, headers, conn)
  461. }
  462. #[delete("/accounts", data = "<data>")]
  463. fn delete_account(data: JsonUpcase<PasswordData>, headers: Headers, conn: DbConn) -> EmptyResult {
  464. let data: PasswordData = data.into_inner().data;
  465. let user = headers.user;
  466. if !user.check_valid_password(&data.MasterPasswordHash) {
  467. err!("Invalid password")
  468. }
  469. user.delete(&conn)
  470. }
  471. #[get("/accounts/revision-date")]
  472. fn revision_date(headers: Headers) -> String {
  473. let revision_date = headers.user.updated_at.timestamp_millis();
  474. revision_date.to_string()
  475. }
  476. #[derive(Deserialize)]
  477. #[allow(non_snake_case)]
  478. struct PasswordHintData {
  479. Email: String,
  480. }
  481. #[post("/accounts/password-hint", data = "<data>")]
  482. fn password_hint(data: JsonUpcase<PasswordHintData>, conn: DbConn) -> EmptyResult {
  483. if !CONFIG.mail_enabled() && !CONFIG.show_password_hint() {
  484. err!("This server is not configured to provide password hints.");
  485. }
  486. const NO_HINT: &str = "Sorry, you have no password hint...";
  487. let data: PasswordHintData = data.into_inner().data;
  488. let email = &data.Email;
  489. match User::find_by_mail(email, &conn) {
  490. None => {
  491. // To prevent user enumeration, act as if the user exists.
  492. if CONFIG.mail_enabled() {
  493. // There is still a timing side channel here in that the code
  494. // paths that send mail take noticeably longer than ones that
  495. // don't. Add a randomized sleep to mitigate this somewhat.
  496. use rand::{thread_rng, Rng};
  497. let mut rng = thread_rng();
  498. let base = 1000;
  499. let delta: i32 = 100;
  500. let sleep_ms = (base + rng.gen_range(-delta..=delta)) as u64;
  501. std::thread::sleep(std::time::Duration::from_millis(sleep_ms));
  502. Ok(())
  503. } else {
  504. err!(NO_HINT);
  505. }
  506. }
  507. Some(user) => {
  508. let hint: Option<String> = user.password_hint;
  509. if CONFIG.mail_enabled() {
  510. mail::send_password_hint(email, hint)?;
  511. Ok(())
  512. } else if let Some(hint) = hint {
  513. err!(format!("Your password hint is: {}", hint));
  514. } else {
  515. err!(NO_HINT);
  516. }
  517. }
  518. }
  519. }
  520. #[derive(Deserialize)]
  521. #[allow(non_snake_case)]
  522. struct PreloginData {
  523. Email: String,
  524. }
  525. #[post("/accounts/prelogin", data = "<data>")]
  526. fn prelogin(data: JsonUpcase<PreloginData>, conn: DbConn) -> Json<Value> {
  527. let data: PreloginData = data.into_inner().data;
  528. let (kdf_type, kdf_iter) = match User::find_by_mail(&data.Email, &conn) {
  529. Some(user) => (user.client_kdf_type, user.client_kdf_iter),
  530. None => (User::CLIENT_KDF_TYPE_DEFAULT, User::CLIENT_KDF_ITER_DEFAULT),
  531. };
  532. Json(json!({
  533. "Kdf": kdf_type,
  534. "KdfIterations": kdf_iter
  535. }))
  536. }
  537. #[derive(Deserialize)]
  538. #[allow(non_snake_case)]
  539. struct VerifyPasswordData {
  540. MasterPasswordHash: String,
  541. }
  542. #[post("/accounts/verify-password", data = "<data>")]
  543. fn verify_password(data: JsonUpcase<VerifyPasswordData>, headers: Headers, _conn: DbConn) -> EmptyResult {
  544. let data: VerifyPasswordData = data.into_inner().data;
  545. let user = headers.user;
  546. if !user.check_valid_password(&data.MasterPasswordHash) {
  547. err!("Invalid password")
  548. }
  549. Ok(())
  550. }