mod.rs 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147
  1. use data_encoding::BASE32;
  2. use rocket::Route;
  3. use rocket_contrib::json::Json;
  4. use serde_json::Value;
  5. use crate::{
  6. api::{JsonResult, JsonUpcase, NumberOrString, PasswordData},
  7. auth::Headers,
  8. crypto,
  9. db::{
  10. models::{TwoFactor, User},
  11. DbConn,
  12. },
  13. };
  14. pub mod authenticator;
  15. pub mod duo;
  16. pub mod email;
  17. pub mod u2f;
  18. pub mod yubikey;
  19. pub fn routes() -> Vec<Route> {
  20. let mut routes = routes![
  21. get_twofactor,
  22. get_recover,
  23. recover,
  24. disable_twofactor,
  25. disable_twofactor_put,
  26. ];
  27. routes.append(&mut authenticator::routes());
  28. routes.append(&mut duo::routes());
  29. routes.append(&mut email::routes());
  30. routes.append(&mut u2f::routes());
  31. routes.append(&mut yubikey::routes());
  32. routes
  33. }
  34. #[get("/two-factor")]
  35. fn get_twofactor(headers: Headers, conn: DbConn) -> Json<Value> {
  36. let twofactors = TwoFactor::find_by_user(&headers.user.uuid, &conn);
  37. let twofactors_json: Vec<Value> = twofactors.iter().map(TwoFactor::to_json_provider).collect();
  38. Json(json!({
  39. "Data": twofactors_json,
  40. "Object": "list",
  41. "ContinuationToken": null,
  42. }))
  43. }
  44. #[post("/two-factor/get-recover", data = "<data>")]
  45. fn get_recover(data: JsonUpcase<PasswordData>, headers: Headers) -> JsonResult {
  46. let data: PasswordData = data.into_inner().data;
  47. let user = headers.user;
  48. if !user.check_valid_password(&data.MasterPasswordHash) {
  49. err!("Invalid password");
  50. }
  51. Ok(Json(json!({
  52. "Code": user.totp_recover,
  53. "Object": "twoFactorRecover"
  54. })))
  55. }
  56. #[derive(Deserialize)]
  57. #[allow(non_snake_case)]
  58. struct RecoverTwoFactor {
  59. MasterPasswordHash: String,
  60. Email: String,
  61. RecoveryCode: String,
  62. }
  63. #[post("/two-factor/recover", data = "<data>")]
  64. fn recover(data: JsonUpcase<RecoverTwoFactor>, conn: DbConn) -> JsonResult {
  65. let data: RecoverTwoFactor = data.into_inner().data;
  66. use crate::db::models::User;
  67. // Get the user
  68. let mut user = match User::find_by_mail(&data.Email, &conn) {
  69. Some(user) => user,
  70. None => err!("Username or password is incorrect. Try again."),
  71. };
  72. // Check password
  73. if !user.check_valid_password(&data.MasterPasswordHash) {
  74. err!("Username or password is incorrect. Try again.")
  75. }
  76. // Check if recovery code is correct
  77. if !user.check_valid_recovery_code(&data.RecoveryCode) {
  78. err!("Recovery code is incorrect. Try again.")
  79. }
  80. // Remove all twofactors from the user
  81. TwoFactor::delete_all_by_user(&user.uuid, &conn)?;
  82. // Remove the recovery code, not needed without twofactors
  83. user.totp_recover = None;
  84. user.save(&conn)?;
  85. Ok(Json(json!({})))
  86. }
  87. fn _generate_recover_code(user: &mut User, conn: &DbConn) {
  88. if user.totp_recover.is_none() {
  89. let totp_recover = BASE32.encode(&crypto::get_random(vec![0u8; 20]));
  90. user.totp_recover = Some(totp_recover);
  91. user.save(conn).ok();
  92. }
  93. }
  94. #[derive(Deserialize)]
  95. #[allow(non_snake_case)]
  96. struct DisableTwoFactorData {
  97. MasterPasswordHash: String,
  98. Type: NumberOrString,
  99. }
  100. #[post("/two-factor/disable", data = "<data>")]
  101. fn disable_twofactor(data: JsonUpcase<DisableTwoFactorData>, headers: Headers, conn: DbConn) -> JsonResult {
  102. let data: DisableTwoFactorData = data.into_inner().data;
  103. let password_hash = data.MasterPasswordHash;
  104. let user = headers.user;
  105. if !user.check_valid_password(&password_hash) {
  106. err!("Invalid password");
  107. }
  108. let type_ = data.Type.into_i32()?;
  109. if let Some(twofactor) = TwoFactor::find_by_user_and_type(&user.uuid, type_, &conn) {
  110. twofactor.delete(&conn)?;
  111. }
  112. Ok(Json(json!({
  113. "Enabled": false,
  114. "Type": type_,
  115. "Object": "twoFactorProvider"
  116. })))
  117. }
  118. #[put("/two-factor/disable", data = "<data>")]
  119. fn disable_twofactor_put(data: JsonUpcase<DisableTwoFactorData>, headers: Headers, conn: DbConn) -> JsonResult {
  120. disable_twofactor(data, headers, conn)
  121. }