1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645 |
- use std::collections::HashSet;
- use crate::db::DbPool;
- use chrono::Utc;
- use rocket::serde::json::Json;
- use serde_json::Value;
- use crate::{
- api::{
- core::{accept_org_invite, log_user_event, two_factor::email},
- master_password_policy, register_push_device, unregister_push_device, AnonymousNotify, ApiResult, EmptyResult,
- JsonResult, Notify, PasswordOrOtpData, UpdateType,
- },
- auth::{decode_delete, decode_invite, decode_verify_email, ClientHeaders, Headers},
- crypto,
- db::{models::*, DbConn},
- mail,
- util::{format_date, NumberOrString},
- CONFIG,
- };
- use rocket::{
- http::Status,
- request::{FromRequest, Outcome, Request},
- };
- pub fn routes() -> Vec<rocket::Route> {
- routes![
- register,
- profile,
- put_profile,
- post_profile,
- put_avatar,
- get_public_keys,
- post_keys,
- post_password,
- post_set_password,
- post_kdf,
- post_rotatekey,
- post_sstamp,
- post_email_token,
- post_email,
- post_verify_email,
- post_verify_email_token,
- post_delete_recover,
- post_delete_recover_token,
- post_delete_account,
- delete_account,
- revision_date,
- password_hint,
- prelogin,
- verify_password,
- api_key,
- rotate_api_key,
- get_known_device,
- get_all_devices,
- get_device,
- post_device_token,
- put_device_token,
- put_clear_device_token,
- post_clear_device_token,
- post_auth_request,
- get_auth_request,
- put_auth_request,
- get_auth_request_response,
- get_auth_requests,
- ]
- }
- #[derive(Debug, Deserialize)]
- #[serde(rename_all = "camelCase")]
- pub struct KDFData {
- kdf: i32,
- kdf_iterations: i32,
- kdf_memory: Option<i32>,
- kdf_parallelism: Option<i32>,
- }
- #[derive(Debug, Deserialize)]
- #[serde(rename_all = "camelCase")]
- pub struct RegisterData {
- email: String,
- #[serde(flatten)]
- kdf: KDFData,
- #[serde(alias = "userSymmetricKey")]
- key: String,
- #[serde(alias = "userAsymmetricKeys")]
- keys: Option<KeysData>,
- master_password_hash: String,
- master_password_hint: Option<String>,
- name: Option<String>,
- #[allow(dead_code)]
- organization_user_id: Option<MembershipId>,
- // Used only from the register/finish endpoint
- email_verification_token: Option<String>,
- accept_emergency_access_id: Option<EmergencyAccessId>,
- accept_emergency_access_invite_token: Option<String>,
- #[serde(alias = "token")]
- org_invite_token: Option<String>,
- }
- #[derive(Debug, Deserialize)]
- #[serde(rename_all = "camelCase")]
- pub struct SetPasswordData {
- #[serde(flatten)]
- kdf: KDFData,
- key: String,
- keys: Option<KeysData>,
- master_password_hash: String,
- master_password_hint: Option<String>,
- org_identifier: Option<String>,
- }
- #[derive(Debug, Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct KeysData {
- encrypted_private_key: String,
- public_key: String,
- }
- /// Trims whitespace from password hints, and converts blank password hints to `None`.
- fn clean_password_hint(password_hint: &Option<String>) -> Option<String> {
- match password_hint {
- None => None,
- Some(h) => match h.trim() {
- "" => None,
- ht => Some(ht.to_string()),
- },
- }
- }
- fn enforce_password_hint_setting(password_hint: &Option<String>) -> EmptyResult {
- if password_hint.is_some() && !CONFIG.password_hints_allowed() {
- err!("Password hints have been disabled by the administrator. Remove the hint and try again.");
- }
- Ok(())
- }
- async fn is_email_2fa_required(member_id: Option<MembershipId>, conn: &mut DbConn) -> bool {
- if !CONFIG._enable_email_2fa() {
- return false;
- }
- if CONFIG.email_2fa_enforce_on_verified_invite() {
- return true;
- }
- if let Some(member_id) = member_id {
- return OrgPolicy::is_enabled_for_member(&member_id, OrgPolicyType::TwoFactorAuthentication, conn).await;
- }
- false
- }
- #[post("/accounts/register", data = "<data>")]
- async fn register(data: Json<RegisterData>, conn: DbConn) -> JsonResult {
- _register(data, false, conn).await
- }
- pub async fn _register(data: Json<RegisterData>, email_verification: bool, mut conn: DbConn) -> JsonResult {
- let mut data: RegisterData = data.into_inner();
- let email = data.email.to_lowercase();
- let mut email_verified = false;
- let mut pending_emergency_access = None;
- // First, validate the provided verification tokens
- if email_verification {
- match (
- &data.email_verification_token,
- &data.accept_emergency_access_id,
- &data.accept_emergency_access_invite_token,
- &data.organization_user_id,
- &data.org_invite_token,
- ) {
- // Normal user registration, when email verification is required
- (Some(email_verification_token), None, None, None, None) => {
- let claims = crate::auth::decode_register_verify(email_verification_token)?;
- if claims.sub != data.email {
- err!("Email verification token does not match email");
- }
- // During this call we don't get the name, so extract it from the claims
- if claims.name.is_some() {
- data.name = claims.name;
- }
- email_verified = claims.verified;
- }
- // Emergency access registration
- (None, Some(accept_emergency_access_id), Some(accept_emergency_access_invite_token), None, None) => {
- if !CONFIG.emergency_access_allowed() {
- err!("Emergency access is not enabled.")
- }
- let claims = crate::auth::decode_emergency_access_invite(accept_emergency_access_invite_token)?;
- if claims.email != data.email {
- err!("Claim email does not match email")
- }
- if &claims.emer_id != accept_emergency_access_id {
- err!("Claim emer_id does not match accept_emergency_access_id")
- }
- pending_emergency_access = Some((accept_emergency_access_id, claims));
- email_verified = true;
- }
- // Org invite
- (None, None, None, Some(organization_user_id), Some(org_invite_token)) => {
- let claims = decode_invite(org_invite_token)?;
- if claims.email != data.email {
- err!("Claim email does not match email")
- }
- if &claims.member_id != organization_user_id {
- err!("Claim org_user_id does not match organization_user_id")
- }
- email_verified = true;
- }
- _ => {
- err!("Registration is missing required parameters")
- }
- }
- }
- // Check if the length of the username exceeds 50 characters (Same is Upstream Bitwarden)
- // This also prevents issues with very long usernames causing to large JWT's. See #2419
- if let Some(ref name) = data.name {
- if name.len() > 50 {
- err!("The field Name must be a string with a maximum length of 50.");
- }
- }
- // Check against the password hint setting here so if it fails, the user
- // can retry without losing their invitation below.
- let password_hint = clean_password_hint(&data.master_password_hint);
- enforce_password_hint_setting(&password_hint)?;
- let mut user = match User::find_by_mail(&email, &mut conn).await {
- Some(user) => {
- if !user.password_hash.is_empty() {
- err!("Registration not allowed or user already exists")
- }
- if let Some(token) = data.org_invite_token {
- let claims = decode_invite(&token)?;
- if claims.email == email {
- // Verify the email address when signing up via a valid invite token
- email_verified = true;
- user
- } else {
- err!("Registration email does not match invite email")
- }
- } else if Invitation::take(&email, &mut conn).await {
- Membership::accept_user_invitations(&user.uuid, &mut conn).await?;
- user
- } else if CONFIG.is_signup_allowed(&email)
- || (CONFIG.emergency_access_allowed()
- && EmergencyAccess::find_invited_by_grantee_email(&email, &mut conn).await.is_some())
- {
- user
- } else {
- err!("Registration not allowed or user already exists")
- }
- }
- None => {
- // Order is important here; the invitation check must come first
- // because the vaultwarden admin can invite anyone, regardless
- // of other signup restrictions.
- if Invitation::take(&email, &mut conn).await
- || CONFIG.is_signup_allowed(&email)
- || pending_emergency_access.is_some()
- {
- User::new(email.clone(), None)
- } else {
- err!("Registration not allowed or user already exists")
- }
- }
- };
- // Make sure we don't leave a lingering invitation.
- Invitation::take(&email, &mut conn).await;
- set_kdf_data(&mut user, data.kdf)?;
- user.set_password(&data.master_password_hash, Some(data.key), true, None);
- user.password_hint = password_hint;
- // Add extra fields if present
- if let Some(name) = data.name {
- user.name = name;
- }
- if let Some(keys) = data.keys {
- user.private_key = Some(keys.encrypted_private_key);
- user.public_key = Some(keys.public_key);
- }
- if email_verified {
- user.verified_at = Some(Utc::now().naive_utc());
- }
- if CONFIG.mail_enabled() {
- if CONFIG.signups_verify() && !email_verified {
- if let Err(e) = mail::send_welcome_must_verify(&user.email, &user.uuid).await {
- error!("Error sending welcome email: {e:#?}");
- }
- user.last_verifying_at = Some(user.created_at);
- } else if let Err(e) = mail::send_welcome(&user.email).await {
- error!("Error sending welcome email: {e:#?}");
- }
- if email_verified && is_email_2fa_required(data.organization_user_id, &mut conn).await {
- email::activate_email_2fa(&user, &mut conn).await.ok();
- }
- }
- user.save(&mut conn).await?;
- // accept any open emergency access invitations
- if !CONFIG.mail_enabled() && CONFIG.emergency_access_allowed() {
- for mut emergency_invite in EmergencyAccess::find_all_invited_by_grantee_email(&user.email, &mut conn).await {
- emergency_invite.accept_invite(&user.uuid, &user.email, &mut conn).await.ok();
- }
- }
- Ok(Json(json!({
- "object": "register",
- "captchaBypassToken": "",
- })))
- }
- #[post("/accounts/set-password", data = "<data>")]
- async fn post_set_password(data: Json<SetPasswordData>, headers: Headers, mut conn: DbConn) -> JsonResult {
- let data: SetPasswordData = data.into_inner();
- let mut user = headers.user;
- if user.private_key.is_some() {
- err!("Account already initialized, cannot set password")
- }
- // Check against the password hint setting here so if it fails,
- // the user can retry without losing their invitation below.
- let password_hint = clean_password_hint(&data.master_password_hint);
- enforce_password_hint_setting(&password_hint)?;
- set_kdf_data(&mut user, data.kdf)?;
- user.set_password(
- &data.master_password_hash,
- Some(data.key),
- false,
- Some(vec![String::from("revision_date")]), // We need to allow revision-date to use the old security_timestamp
- );
- user.password_hint = password_hint;
- if let Some(keys) = data.keys {
- user.private_key = Some(keys.encrypted_private_key);
- user.public_key = Some(keys.public_key);
- }
- if let Some(identifier) = data.org_identifier {
- if identifier != crate::sso::FAKE_IDENTIFIER {
- let org = match Organization::find_by_uuid(&identifier.into(), &mut conn).await {
- None => err!("Failed to retrieve the associated organization"),
- Some(org) => org,
- };
- let membership = match Membership::find_by_user_and_org(&user.uuid, &org.uuid, &mut conn).await {
- None => err!("Failed to retrieve the invitation"),
- Some(org) => org,
- };
- accept_org_invite(&user, membership, None, &mut conn).await?;
- }
- }
- if CONFIG.mail_enabled() {
- mail::send_welcome(&user.email.to_lowercase()).await?;
- } else {
- Membership::accept_user_invitations(&user.uuid, &mut conn).await?;
- }
- log_user_event(EventType::UserChangedPassword as i32, &user.uuid, headers.device.atype, &headers.ip.ip, &mut conn)
- .await;
- user.save(&mut conn).await?;
- Ok(Json(json!({
- "Object": "set-password",
- "CaptchaBypassToken": "",
- })))
- }
- #[get("/accounts/profile")]
- async fn profile(headers: Headers, mut conn: DbConn) -> Json<Value> {
- Json(headers.user.to_json(&mut conn).await)
- }
- #[derive(Debug, Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct ProfileData {
- // culture: String, // Ignored, always use en-US
- name: String,
- }
- #[put("/accounts/profile", data = "<data>")]
- async fn put_profile(data: Json<ProfileData>, headers: Headers, conn: DbConn) -> JsonResult {
- post_profile(data, headers, conn).await
- }
- #[post("/accounts/profile", data = "<data>")]
- async fn post_profile(data: Json<ProfileData>, headers: Headers, mut conn: DbConn) -> JsonResult {
- let data: ProfileData = data.into_inner();
- // Check if the length of the username exceeds 50 characters (Same is Upstream Bitwarden)
- // This also prevents issues with very long usernames causing to large JWT's. See #2419
- if data.name.len() > 50 {
- err!("The field Name must be a string with a maximum length of 50.");
- }
- let mut user = headers.user;
- user.name = data.name;
- user.save(&mut conn).await?;
- Ok(Json(user.to_json(&mut conn).await))
- }
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct AvatarData {
- avatar_color: Option<String>,
- }
- #[put("/accounts/avatar", data = "<data>")]
- async fn put_avatar(data: Json<AvatarData>, headers: Headers, mut conn: DbConn) -> JsonResult {
- let data: AvatarData = data.into_inner();
- // It looks like it only supports the 6 hex color format.
- // If you try to add the short value it will not show that color.
- // Check and force 7 chars, including the #.
- if let Some(color) = &data.avatar_color {
- if color.len() != 7 {
- err!("The field AvatarColor must be a HTML/Hex color code with a length of 7 characters")
- }
- }
- let mut user = headers.user;
- user.avatar_color = data.avatar_color;
- user.save(&mut conn).await?;
- Ok(Json(user.to_json(&mut conn).await))
- }
- #[get("/users/<user_id>/public-key")]
- async fn get_public_keys(user_id: UserId, _headers: Headers, mut conn: DbConn) -> JsonResult {
- let user = match User::find_by_uuid(&user_id, &mut conn).await {
- Some(user) if user.public_key.is_some() => user,
- Some(_) => err_code!("User has no public_key", Status::NotFound.code),
- None => err_code!("User doesn't exist", Status::NotFound.code),
- };
- Ok(Json(json!({
- "userId": user.uuid,
- "publicKey": user.public_key,
- "object":"userKey"
- })))
- }
- #[post("/accounts/keys", data = "<data>")]
- async fn post_keys(data: Json<KeysData>, headers: Headers, mut conn: DbConn) -> JsonResult {
- let data: KeysData = data.into_inner();
- let mut user = headers.user;
- user.private_key = Some(data.encrypted_private_key);
- user.public_key = Some(data.public_key);
- user.save(&mut conn).await?;
- Ok(Json(json!({
- "privateKey": user.private_key,
- "publicKey": user.public_key,
- "object":"keys"
- })))
- }
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct ChangePassData {
- master_password_hash: String,
- new_master_password_hash: String,
- master_password_hint: Option<String>,
- key: String,
- }
- #[post("/accounts/password", data = "<data>")]
- async fn post_password(data: Json<ChangePassData>, headers: Headers, mut conn: DbConn, nt: Notify<'_>) -> EmptyResult {
- let data: ChangePassData = data.into_inner();
- let mut user = headers.user;
- if !user.check_valid_password(&data.master_password_hash) {
- err!("Invalid password")
- }
- user.password_hint = clean_password_hint(&data.master_password_hint);
- enforce_password_hint_setting(&user.password_hint)?;
- log_user_event(EventType::UserChangedPassword as i32, &user.uuid, headers.device.atype, &headers.ip.ip, &mut conn)
- .await;
- user.set_password(
- &data.new_master_password_hash,
- Some(data.key),
- true,
- Some(vec![
- String::from("post_rotatekey"),
- String::from("get_contacts"),
- String::from("get_public_keys"),
- String::from("get_api_webauthn"),
- ]),
- );
- let save_result = user.save(&mut conn).await;
- // Prevent logging out the client where the user requested this endpoint from.
- // If you do logout the user it will causes issues at the client side.
- // Adding the device uuid will prevent this.
- nt.send_logout(&user, Some(headers.device.uuid.clone()), &mut conn).await;
- save_result
- }
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct ChangeKdfData {
- #[serde(flatten)]
- kdf: KDFData,
- master_password_hash: String,
- new_master_password_hash: String,
- key: String,
- }
- fn set_kdf_data(user: &mut User, data: KDFData) -> EmptyResult {
- if data.kdf == UserKdfType::Pbkdf2 as i32 && data.kdf_iterations < 100_000 {
- err!("PBKDF2 KDF iterations must be at least 100000.")
- }
- if data.kdf == UserKdfType::Argon2id as i32 {
- if data.kdf_iterations < 1 {
- err!("Argon2 KDF iterations must be at least 1.")
- }
- if let Some(m) = data.kdf_memory {
- if !(15..=1024).contains(&m) {
- err!("Argon2 memory must be between 15 MB and 1024 MB.")
- }
- user.client_kdf_memory = data.kdf_memory;
- } else {
- err!("Argon2 memory parameter is required.")
- }
- if let Some(p) = data.kdf_parallelism {
- if !(1..=16).contains(&p) {
- err!("Argon2 parallelism must be between 1 and 16.")
- }
- user.client_kdf_parallelism = data.kdf_parallelism;
- } else {
- err!("Argon2 parallelism parameter is required.")
- }
- } else {
- user.client_kdf_memory = None;
- user.client_kdf_parallelism = None;
- }
- user.client_kdf_iter = data.kdf_iterations;
- user.client_kdf_type = data.kdf;
- Ok(())
- }
- #[post("/accounts/kdf", data = "<data>")]
- async fn post_kdf(data: Json<ChangeKdfData>, headers: Headers, mut conn: DbConn, nt: Notify<'_>) -> EmptyResult {
- let data: ChangeKdfData = data.into_inner();
- let mut user = headers.user;
- if !user.check_valid_password(&data.master_password_hash) {
- err!("Invalid password")
- }
- set_kdf_data(&mut user, data.kdf)?;
- user.set_password(&data.new_master_password_hash, Some(data.key), true, None);
- let save_result = user.save(&mut conn).await;
- nt.send_logout(&user, Some(headers.device.uuid.clone()), &mut conn).await;
- save_result
- }
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct UpdateFolderData {
- // There is a bug in 2024.3.x which adds a `null` item.
- // To bypass this we allow a Option here, but skip it during the updates
- // See: https://github.com/bitwarden/clients/issues/8453
- id: Option<FolderId>,
- name: String,
- }
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct UpdateEmergencyAccessData {
- id: EmergencyAccessId,
- key_encrypted: String,
- }
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct UpdateResetPasswordData {
- organization_id: OrganizationId,
- reset_password_key: String,
- }
- use super::ciphers::CipherData;
- use super::sends::{update_send_from_data, SendData};
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct KeyData {
- account_unlock_data: RotateAccountUnlockData,
- account_keys: RotateAccountKeys,
- account_data: RotateAccountData,
- old_master_key_authentication_hash: String,
- }
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct RotateAccountUnlockData {
- emergency_access_unlock_data: Vec<UpdateEmergencyAccessData>,
- master_password_unlock_data: MasterPasswordUnlockData,
- organization_account_recovery_unlock_data: Vec<UpdateResetPasswordData>,
- }
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct MasterPasswordUnlockData {
- kdf_type: i32,
- kdf_iterations: i32,
- kdf_parallelism: Option<i32>,
- kdf_memory: Option<i32>,
- email: String,
- master_key_authentication_hash: String,
- master_key_encrypted_user_key: String,
- }
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct RotateAccountKeys {
- user_key_encrypted_account_private_key: String,
- account_public_key: String,
- }
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct RotateAccountData {
- ciphers: Vec<CipherData>,
- folders: Vec<UpdateFolderData>,
- sends: Vec<SendData>,
- }
- fn validate_keydata(
- data: &KeyData,
- existing_ciphers: &[Cipher],
- existing_folders: &[Folder],
- existing_emergency_access: &[EmergencyAccess],
- existing_memberships: &[Membership],
- existing_sends: &[Send],
- user: &User,
- ) -> EmptyResult {
- if user.client_kdf_type != data.account_unlock_data.master_password_unlock_data.kdf_type
- || user.client_kdf_iter != data.account_unlock_data.master_password_unlock_data.kdf_iterations
- || user.client_kdf_memory != data.account_unlock_data.master_password_unlock_data.kdf_memory
- || user.client_kdf_parallelism != data.account_unlock_data.master_password_unlock_data.kdf_parallelism
- || user.email != data.account_unlock_data.master_password_unlock_data.email
- {
- err!("Changing the kdf variant or email is not supported during key rotation");
- }
- if user.public_key.as_ref() != Some(&data.account_keys.account_public_key) {
- err!("Changing the asymmetric keypair is not possible during key rotation")
- }
- // Check that we're correctly rotating all the user's ciphers
- let existing_cipher_ids = existing_ciphers.iter().map(|c| &c.uuid).collect::<HashSet<&CipherId>>();
- let provided_cipher_ids = data
- .account_data
- .ciphers
- .iter()
- .filter(|c| c.organization_id.is_none())
- .filter_map(|c| c.id.as_ref())
- .collect::<HashSet<&CipherId>>();
- if !provided_cipher_ids.is_superset(&existing_cipher_ids) {
- err!("All existing ciphers must be included in the rotation")
- }
- // Check that we're correctly rotating all the user's folders
- let existing_folder_ids = existing_folders.iter().map(|f| &f.uuid).collect::<HashSet<&FolderId>>();
- let provided_folder_ids =
- data.account_data.folders.iter().filter_map(|f| f.id.as_ref()).collect::<HashSet<&FolderId>>();
- if !provided_folder_ids.is_superset(&existing_folder_ids) {
- err!("All existing folders must be included in the rotation")
- }
- // Check that we're correctly rotating all the user's emergency access keys
- let existing_emergency_access_ids =
- existing_emergency_access.iter().map(|ea| &ea.uuid).collect::<HashSet<&EmergencyAccessId>>();
- let provided_emergency_access_ids = data
- .account_unlock_data
- .emergency_access_unlock_data
- .iter()
- .map(|ea| &ea.id)
- .collect::<HashSet<&EmergencyAccessId>>();
- if !provided_emergency_access_ids.is_superset(&existing_emergency_access_ids) {
- err!("All existing emergency access keys must be included in the rotation")
- }
- // Check that we're correctly rotating all the user's reset password keys
- let existing_reset_password_ids =
- existing_memberships.iter().map(|m| &m.org_uuid).collect::<HashSet<&OrganizationId>>();
- let provided_reset_password_ids = data
- .account_unlock_data
- .organization_account_recovery_unlock_data
- .iter()
- .map(|rp| &rp.organization_id)
- .collect::<HashSet<&OrganizationId>>();
- if !provided_reset_password_ids.is_superset(&existing_reset_password_ids) {
- err!("All existing reset password keys must be included in the rotation")
- }
- // Check that we're correctly rotating all the user's sends
- let existing_send_ids = existing_sends.iter().map(|s| &s.uuid).collect::<HashSet<&SendId>>();
- let provided_send_ids = data.account_data.sends.iter().filter_map(|s| s.id.as_ref()).collect::<HashSet<&SendId>>();
- if !provided_send_ids.is_superset(&existing_send_ids) {
- err!("All existing sends must be included in the rotation")
- }
- Ok(())
- }
- #[post("/accounts/key-management/rotate-user-account-keys", data = "<data>")]
- async fn post_rotatekey(data: Json<KeyData>, headers: Headers, mut conn: DbConn, nt: Notify<'_>) -> EmptyResult {
- // TODO: See if we can wrap everything within a SQL Transaction. If something fails it should revert everything.
- let data: KeyData = data.into_inner();
- if !headers.user.check_valid_password(&data.old_master_key_authentication_hash) {
- err!("Invalid password")
- }
- // Validate the import before continuing
- // Bitwarden does not process the import if there is one item invalid.
- // Since we check for the size of the encrypted note length, we need to do that here to pre-validate it.
- // TODO: See if we can optimize the whole cipher adding/importing and prevent duplicate code and checks.
- Cipher::validate_cipher_data(&data.account_data.ciphers)?;
- let user_id = &headers.user.uuid;
- // TODO: Ideally we'd do everything after this point in a single transaction.
- let mut existing_ciphers = Cipher::find_owned_by_user(user_id, &mut conn).await;
- let mut existing_folders = Folder::find_by_user(user_id, &mut conn).await;
- let mut existing_emergency_access = EmergencyAccess::find_all_by_grantor_uuid(user_id, &mut conn).await;
- let mut existing_memberships = Membership::find_by_user(user_id, &mut conn).await;
- // We only rotate the reset password key if it is set.
- existing_memberships.retain(|m| m.reset_password_key.is_some());
- let mut existing_sends = Send::find_by_user(user_id, &mut conn).await;
- validate_keydata(
- &data,
- &existing_ciphers,
- &existing_folders,
- &existing_emergency_access,
- &existing_memberships,
- &existing_sends,
- &headers.user,
- )?;
- // Update folder data
- for folder_data in data.account_data.folders {
- // Skip `null` folder id entries.
- // See: https://github.com/bitwarden/clients/issues/8453
- if let Some(folder_id) = folder_data.id {
- let Some(saved_folder) = existing_folders.iter_mut().find(|f| f.uuid == folder_id) else {
- err!("Folder doesn't exist")
- };
- saved_folder.name = folder_data.name;
- saved_folder.save(&mut conn).await?
- }
- }
- // Update emergency access data
- for emergency_access_data in data.account_unlock_data.emergency_access_unlock_data {
- let Some(saved_emergency_access) =
- existing_emergency_access.iter_mut().find(|ea| ea.uuid == emergency_access_data.id)
- else {
- err!("Emergency access doesn't exist or is not owned by the user")
- };
- saved_emergency_access.key_encrypted = Some(emergency_access_data.key_encrypted);
- saved_emergency_access.save(&mut conn).await?
- }
- // Update reset password data
- for reset_password_data in data.account_unlock_data.organization_account_recovery_unlock_data {
- let Some(membership) =
- existing_memberships.iter_mut().find(|m| m.org_uuid == reset_password_data.organization_id)
- else {
- err!("Reset password doesn't exist")
- };
- membership.reset_password_key = Some(reset_password_data.reset_password_key);
- membership.save(&mut conn).await?
- }
- // Update send data
- for send_data in data.account_data.sends {
- let Some(send) = existing_sends.iter_mut().find(|s| &s.uuid == send_data.id.as_ref().unwrap()) else {
- err!("Send doesn't exist")
- };
- update_send_from_data(send, send_data, &headers, &mut conn, &nt, UpdateType::None).await?;
- }
- // Update cipher data
- use super::ciphers::update_cipher_from_data;
- for cipher_data in data.account_data.ciphers {
- if cipher_data.organization_id.is_none() {
- let Some(saved_cipher) = existing_ciphers.iter_mut().find(|c| &c.uuid == cipher_data.id.as_ref().unwrap())
- else {
- err!("Cipher doesn't exist")
- };
- // Prevent triggering cipher updates via WebSockets by settings UpdateType::None
- // The user sessions are invalidated because all the ciphers were re-encrypted and thus triggering an update could cause issues.
- // We force the users to logout after the user has been saved to try and prevent these issues.
- update_cipher_from_data(saved_cipher, cipher_data, &headers, None, &mut conn, &nt, UpdateType::None).await?
- }
- }
- // Update user data
- let mut user = headers.user;
- user.private_key = Some(data.account_keys.user_key_encrypted_account_private_key);
- user.set_password(
- &data.account_unlock_data.master_password_unlock_data.master_key_authentication_hash,
- Some(data.account_unlock_data.master_password_unlock_data.master_key_encrypted_user_key),
- true,
- None,
- );
- let save_result = user.save(&mut conn).await;
- // Prevent logging out the client where the user requested this endpoint from.
- // If you do logout the user it will causes issues at the client side.
- // Adding the device uuid will prevent this.
- nt.send_logout(&user, Some(headers.device.uuid.clone()), &mut conn).await;
- save_result
- }
- #[post("/accounts/security-stamp", data = "<data>")]
- async fn post_sstamp(data: Json<PasswordOrOtpData>, headers: Headers, mut conn: DbConn, nt: Notify<'_>) -> EmptyResult {
- let data: PasswordOrOtpData = data.into_inner();
- let mut user = headers.user;
- data.validate(&user, true, &mut conn).await?;
- Device::delete_all_by_user(&user.uuid, &mut conn).await?;
- user.reset_security_stamp();
- let save_result = user.save(&mut conn).await;
- nt.send_logout(&user, None, &mut conn).await;
- save_result
- }
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct EmailTokenData {
- master_password_hash: String,
- new_email: String,
- }
- #[post("/accounts/email-token", data = "<data>")]
- async fn post_email_token(data: Json<EmailTokenData>, headers: Headers, mut conn: DbConn) -> EmptyResult {
- if !CONFIG.email_change_allowed() {
- err!("Email change is not allowed.");
- }
- let data: EmailTokenData = data.into_inner();
- let mut user = headers.user;
- if !user.check_valid_password(&data.master_password_hash) {
- err!("Invalid password")
- }
- if User::find_by_mail(&data.new_email, &mut conn).await.is_some() {
- if CONFIG.mail_enabled() {
- if let Err(e) = mail::send_change_email_existing(&data.new_email, &user.email).await {
- error!("Error sending change-email-existing email: {e:#?}");
- }
- }
- err!("Email already in use");
- }
- if !CONFIG.is_email_domain_allowed(&data.new_email) {
- err!("Email domain not allowed");
- }
- let token = crypto::generate_email_token(6);
- if CONFIG.mail_enabled() {
- if let Err(e) = mail::send_change_email(&data.new_email, &token).await {
- error!("Error sending change-email email: {e:#?}");
- }
- } else {
- debug!("Email change request for user ({}) to email ({}) with token ({token})", user.uuid, data.new_email);
- }
- user.email_new = Some(data.new_email);
- user.email_new_token = Some(token);
- user.save(&mut conn).await
- }
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct ChangeEmailData {
- master_password_hash: String,
- new_email: String,
- key: String,
- new_master_password_hash: String,
- token: NumberOrString,
- }
- #[post("/accounts/email", data = "<data>")]
- async fn post_email(data: Json<ChangeEmailData>, headers: Headers, mut conn: DbConn, nt: Notify<'_>) -> EmptyResult {
- if !CONFIG.email_change_allowed() {
- err!("Email change is not allowed.");
- }
- let data: ChangeEmailData = data.into_inner();
- let mut user = headers.user;
- if !user.check_valid_password(&data.master_password_hash) {
- err!("Invalid password")
- }
- if User::find_by_mail(&data.new_email, &mut conn).await.is_some() {
- err!("Email already in use");
- }
- match user.email_new {
- Some(ref val) => {
- if val != &data.new_email {
- err!("Email change mismatch");
- }
- }
- None => err!("No email change pending"),
- }
- if CONFIG.mail_enabled() {
- // Only check the token if we sent out an email...
- match user.email_new_token {
- Some(ref val) => {
- if *val != data.token.into_string() {
- err!("Token mismatch");
- }
- }
- None => err!("No email change pending"),
- }
- user.verified_at = Some(Utc::now().naive_utc());
- } else {
- user.verified_at = None;
- }
- user.email = data.new_email;
- user.email_new = None;
- user.email_new_token = None;
- user.set_password(&data.new_master_password_hash, Some(data.key), true, None);
- let save_result = user.save(&mut conn).await;
- nt.send_logout(&user, None, &mut conn).await;
- save_result
- }
- #[post("/accounts/verify-email")]
- async fn post_verify_email(headers: Headers) -> EmptyResult {
- let user = headers.user;
- if !CONFIG.mail_enabled() {
- err!("Cannot verify email address");
- }
- if let Err(e) = mail::send_verify_email(&user.email, &user.uuid).await {
- error!("Error sending verify_email email: {e:#?}");
- }
- Ok(())
- }
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct VerifyEmailTokenData {
- user_id: UserId,
- token: String,
- }
- #[post("/accounts/verify-email-token", data = "<data>")]
- async fn post_verify_email_token(data: Json<VerifyEmailTokenData>, mut conn: DbConn) -> EmptyResult {
- let data: VerifyEmailTokenData = data.into_inner();
- let Some(mut user) = User::find_by_uuid(&data.user_id, &mut conn).await else {
- err!("User doesn't exist")
- };
- let Ok(claims) = decode_verify_email(&data.token) else {
- err!("Invalid claim")
- };
- if claims.sub != *user.uuid {
- err!("Invalid claim");
- }
- user.verified_at = Some(Utc::now().naive_utc());
- user.last_verifying_at = None;
- user.login_verify_count = 0;
- if let Err(e) = user.save(&mut conn).await {
- error!("Error saving email verification: {e:#?}");
- }
- Ok(())
- }
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct DeleteRecoverData {
- email: String,
- }
- #[post("/accounts/delete-recover", data = "<data>")]
- async fn post_delete_recover(data: Json<DeleteRecoverData>, mut conn: DbConn) -> EmptyResult {
- let data: DeleteRecoverData = data.into_inner();
- if CONFIG.mail_enabled() {
- if let Some(user) = User::find_by_mail(&data.email, &mut conn).await {
- if let Err(e) = mail::send_delete_account(&user.email, &user.uuid).await {
- error!("Error sending delete account email: {e:#?}");
- }
- }
- Ok(())
- } else {
- // We don't support sending emails, but we shouldn't allow anybody
- // to delete accounts without at least logging in... And if the user
- // cannot remember their password then they will need to contact
- // the administrator to delete it...
- err!("Please contact the administrator to delete your account");
- }
- }
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct DeleteRecoverTokenData {
- user_id: UserId,
- token: String,
- }
- #[post("/accounts/delete-recover-token", data = "<data>")]
- async fn post_delete_recover_token(data: Json<DeleteRecoverTokenData>, mut conn: DbConn) -> EmptyResult {
- let data: DeleteRecoverTokenData = data.into_inner();
- let Ok(claims) = decode_delete(&data.token) else {
- err!("Invalid claim")
- };
- let Some(user) = User::find_by_uuid(&data.user_id, &mut conn).await else {
- err!("User doesn't exist")
- };
- if claims.sub != *user.uuid {
- err!("Invalid claim");
- }
- user.delete(&mut conn).await
- }
- #[post("/accounts/delete", data = "<data>")]
- async fn post_delete_account(data: Json<PasswordOrOtpData>, headers: Headers, conn: DbConn) -> EmptyResult {
- delete_account(data, headers, conn).await
- }
- #[delete("/accounts", data = "<data>")]
- async fn delete_account(data: Json<PasswordOrOtpData>, headers: Headers, mut conn: DbConn) -> EmptyResult {
- let data: PasswordOrOtpData = data.into_inner();
- let user = headers.user;
- data.validate(&user, true, &mut conn).await?;
- user.delete(&mut conn).await
- }
- #[get("/accounts/revision-date")]
- fn revision_date(headers: Headers) -> JsonResult {
- let revision_date = headers.user.updated_at.and_utc().timestamp_millis();
- Ok(Json(json!(revision_date)))
- }
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct PasswordHintData {
- email: String,
- }
- #[post("/accounts/password-hint", data = "<data>")]
- async fn password_hint(data: Json<PasswordHintData>, mut conn: DbConn) -> EmptyResult {
- if !CONFIG.password_hints_allowed() || (!CONFIG.mail_enabled() && !CONFIG.show_password_hint()) {
- err!("This server is not configured to provide password hints.");
- }
- const NO_HINT: &str = "Sorry, you have no password hint...";
- let data: PasswordHintData = data.into_inner();
- let email = &data.email;
- match User::find_by_mail(email, &mut conn).await {
- None => {
- // To prevent user enumeration, act as if the user exists.
- if CONFIG.mail_enabled() {
- // There is still a timing side channel here in that the code
- // paths that send mail take noticeably longer than ones that
- // don't. Add a randomized sleep to mitigate this somewhat.
- use rand::{rngs::SmallRng, Rng, SeedableRng};
- let mut rng = SmallRng::from_os_rng();
- let delta: i32 = 100;
- let sleep_ms = (1_000 + rng.random_range(-delta..=delta)) as u64;
- tokio::time::sleep(tokio::time::Duration::from_millis(sleep_ms)).await;
- Ok(())
- } else {
- err!(NO_HINT);
- }
- }
- Some(user) => {
- let hint: Option<String> = user.password_hint;
- if CONFIG.mail_enabled() {
- mail::send_password_hint(email, hint).await?;
- Ok(())
- } else if let Some(hint) = hint {
- err!(format!("Your password hint is: {hint}"));
- } else {
- err!(NO_HINT);
- }
- }
- }
- }
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- pub struct PreloginData {
- email: String,
- }
- #[post("/accounts/prelogin", data = "<data>")]
- async fn prelogin(data: Json<PreloginData>, conn: DbConn) -> Json<Value> {
- _prelogin(data, conn).await
- }
- pub async fn _prelogin(data: Json<PreloginData>, mut conn: DbConn) -> Json<Value> {
- let data: PreloginData = data.into_inner();
- let (kdf_type, kdf_iter, kdf_mem, kdf_para) = match User::find_by_mail(&data.email, &mut conn).await {
- Some(user) => (user.client_kdf_type, user.client_kdf_iter, user.client_kdf_memory, user.client_kdf_parallelism),
- None => (User::CLIENT_KDF_TYPE_DEFAULT, User::CLIENT_KDF_ITER_DEFAULT, None, None),
- };
- Json(json!({
- "kdf": kdf_type,
- "kdfIterations": kdf_iter,
- "kdfMemory": kdf_mem,
- "kdfParallelism": kdf_para,
- }))
- }
- // https://github.com/bitwarden/server/blob/9ebe16587175b1c0e9208f84397bb75d0d595510/src/Api/Auth/Models/Request/Accounts/SecretVerificationRequestModel.cs
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct SecretVerificationRequest {
- master_password_hash: String,
- }
- // Change the KDF Iterations if necessary
- pub async fn kdf_upgrade(user: &mut User, pwd_hash: &str, conn: &mut DbConn) -> ApiResult<()> {
- if user.password_iterations < CONFIG.password_iterations() {
- user.password_iterations = CONFIG.password_iterations();
- user.set_password(pwd_hash, None, false, None);
- if let Err(e) = user.save(conn).await {
- error!("Error updating user: {e:#?}");
- }
- }
- Ok(())
- }
- #[post("/accounts/verify-password", data = "<data>")]
- async fn verify_password(data: Json<SecretVerificationRequest>, headers: Headers, mut conn: DbConn) -> JsonResult {
- let data: SecretVerificationRequest = data.into_inner();
- let mut user = headers.user;
- if !user.check_valid_password(&data.master_password_hash) {
- err!("Invalid password")
- }
- kdf_upgrade(&mut user, &data.master_password_hash, &mut conn).await?;
- Ok(Json(master_password_policy(&user, &conn).await))
- }
- async fn _api_key(data: Json<PasswordOrOtpData>, rotate: bool, headers: Headers, mut conn: DbConn) -> JsonResult {
- use crate::util::format_date;
- let data: PasswordOrOtpData = data.into_inner();
- let mut user = headers.user;
- data.validate(&user, true, &mut conn).await?;
- if rotate || user.api_key.is_none() {
- user.api_key = Some(crypto::generate_api_key());
- user.save(&mut conn).await.expect("Error saving API key");
- }
- Ok(Json(json!({
- "apiKey": user.api_key,
- "revisionDate": format_date(&user.updated_at),
- "object": "apiKey",
- })))
- }
- #[post("/accounts/api-key", data = "<data>")]
- async fn api_key(data: Json<PasswordOrOtpData>, headers: Headers, conn: DbConn) -> JsonResult {
- _api_key(data, false, headers, conn).await
- }
- #[post("/accounts/rotate-api-key", data = "<data>")]
- async fn rotate_api_key(data: Json<PasswordOrOtpData>, headers: Headers, conn: DbConn) -> JsonResult {
- _api_key(data, true, headers, conn).await
- }
- #[get("/devices/knowndevice")]
- async fn get_known_device(device: KnownDevice, mut conn: DbConn) -> JsonResult {
- let mut result = false;
- if let Some(user) = User::find_by_mail(&device.email, &mut conn).await {
- result = Device::find_by_uuid_and_user(&device.uuid, &user.uuid, &mut conn).await.is_some();
- }
- Ok(Json(json!(result)))
- }
- struct KnownDevice {
- email: String,
- uuid: DeviceId,
- }
- #[rocket::async_trait]
- impl<'r> FromRequest<'r> for KnownDevice {
- type Error = &'static str;
- async fn from_request(req: &'r Request<'_>) -> Outcome<Self, Self::Error> {
- let email = if let Some(email_b64) = req.headers().get_one("X-Request-Email") {
- let Ok(email_bytes) = data_encoding::BASE64URL_NOPAD.decode(email_b64.as_bytes()) else {
- return Outcome::Error((Status::BadRequest, "X-Request-Email value failed to decode as base64url"));
- };
- match String::from_utf8(email_bytes) {
- Ok(email) => email,
- Err(_) => {
- return Outcome::Error((Status::BadRequest, "X-Request-Email value failed to decode as UTF-8"));
- }
- }
- } else {
- return Outcome::Error((Status::BadRequest, "X-Request-Email value is required"));
- };
- let uuid = if let Some(uuid) = req.headers().get_one("X-Device-Identifier") {
- uuid.to_string().into()
- } else {
- return Outcome::Error((Status::BadRequest, "X-Device-Identifier value is required"));
- };
- Outcome::Success(KnownDevice {
- email,
- uuid,
- })
- }
- }
- #[get("/devices")]
- async fn get_all_devices(headers: Headers, mut conn: DbConn) -> JsonResult {
- let devices = Device::find_with_auth_request_by_user(&headers.user.uuid, &mut conn).await;
- let devices = devices.iter().map(|device| device.to_json()).collect::<Vec<Value>>();
- Ok(Json(json!({
- "data": devices,
- "continuationToken": null,
- "object": "list"
- })))
- }
- #[get("/devices/identifier/<device_id>")]
- async fn get_device(device_id: DeviceId, headers: Headers, mut conn: DbConn) -> JsonResult {
- let Some(device) = Device::find_by_uuid_and_user(&device_id, &headers.user.uuid, &mut conn).await else {
- err!("No device found");
- };
- Ok(Json(device.to_json()))
- }
- #[derive(Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct PushToken {
- push_token: String,
- }
- #[post("/devices/identifier/<device_id>/token", data = "<data>")]
- async fn post_device_token(device_id: DeviceId, data: Json<PushToken>, headers: Headers, conn: DbConn) -> EmptyResult {
- put_device_token(device_id, data, headers, conn).await
- }
- #[put("/devices/identifier/<device_id>/token", data = "<data>")]
- async fn put_device_token(
- device_id: DeviceId,
- data: Json<PushToken>,
- headers: Headers,
- mut conn: DbConn,
- ) -> EmptyResult {
- let data = data.into_inner();
- let token = data.push_token;
- let Some(mut device) = Device::find_by_uuid_and_user(&headers.device.uuid, &headers.user.uuid, &mut conn).await
- else {
- err!(format!("Error: device {device_id} should be present before a token can be assigned"))
- };
- // Check if the new token is the same as the registered token
- // Although upstream seems to always register a device on login, we do not.
- // Unless this causes issues, lets keep it this way, else we might need to also register on every login.
- if device.push_token.as_ref() == Some(&token) {
- debug!("Device {device_id} for user {} is already registered and token is identical", headers.user.uuid);
- return Ok(());
- }
- device.push_token = Some(token);
- if let Err(e) = device.save(&mut conn).await {
- err!(format!("An error occurred while trying to save the device push token: {e}"));
- }
- register_push_device(&mut device, &mut conn).await?;
- Ok(())
- }
- #[put("/devices/identifier/<device_id>/clear-token")]
- async fn put_clear_device_token(device_id: DeviceId, mut conn: DbConn) -> EmptyResult {
- // This only clears push token
- // https://github.com/bitwarden/server/blob/9ebe16587175b1c0e9208f84397bb75d0d595510/src/Api/Controllers/DevicesController.cs#L215
- // https://github.com/bitwarden/server/blob/9ebe16587175b1c0e9208f84397bb75d0d595510/src/Core/Services/Implementations/DeviceService.cs#L37
- // This is somehow not implemented in any app, added it in case it is required
- // 2025: Also, it looks like it only clears the first found device upstream, which is probably faulty.
- // This because currently multiple accounts could be on the same device/app and that would cause issues.
- // Vaultwarden removes the push-token for all devices, but this probably means we should also unregister all these devices.
- if !CONFIG.push_enabled() {
- return Ok(());
- }
- if let Some(device) = Device::find_by_uuid(&device_id, &mut conn).await {
- Device::clear_push_token_by_uuid(&device_id, &mut conn).await?;
- unregister_push_device(&device.push_uuid).await?;
- }
- Ok(())
- }
- // On upstream server, both PUT and POST are declared. Implementing the POST method in case it would be useful somewhere
- #[post("/devices/identifier/<device_id>/clear-token")]
- async fn post_clear_device_token(device_id: DeviceId, conn: DbConn) -> EmptyResult {
- put_clear_device_token(device_id, conn).await
- }
- #[derive(Debug, Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct AuthRequestRequest {
- access_code: String,
- device_identifier: DeviceId,
- email: String,
- public_key: String,
- // Not used for now
- // #[serde(alias = "type")]
- // _type: i32,
- }
- #[post("/auth-requests", data = "<data>")]
- async fn post_auth_request(
- data: Json<AuthRequestRequest>,
- client_headers: ClientHeaders,
- mut conn: DbConn,
- nt: Notify<'_>,
- ) -> JsonResult {
- let data = data.into_inner();
- let Some(user) = User::find_by_mail(&data.email, &mut conn).await else {
- err!("AuthRequest doesn't exist", "User not found")
- };
- // Validate device uuid and type
- let device = match Device::find_by_uuid_and_user(&data.device_identifier, &user.uuid, &mut conn).await {
- Some(device) if device.atype == client_headers.device_type => device,
- _ => err!("AuthRequest doesn't exist", "Device verification failed"),
- };
- let mut auth_request = AuthRequest::new(
- user.uuid.clone(),
- data.device_identifier.clone(),
- client_headers.device_type,
- client_headers.ip.ip.to_string(),
- data.access_code,
- data.public_key,
- );
- auth_request.save(&mut conn).await?;
- nt.send_auth_request(&user.uuid, &auth_request.uuid, &device, &mut conn).await;
- log_user_event(
- EventType::UserRequestedDeviceApproval as i32,
- &user.uuid,
- client_headers.device_type,
- &client_headers.ip.ip,
- &mut conn,
- )
- .await;
- Ok(Json(json!({
- "id": auth_request.uuid,
- "publicKey": auth_request.public_key,
- "requestDeviceType": DeviceType::from_i32(auth_request.device_type).to_string(),
- "requestIpAddress": auth_request.request_ip,
- "key": null,
- "masterPasswordHash": null,
- "creationDate": format_date(&auth_request.creation_date),
- "responseDate": null,
- "requestApproved": false,
- "origin": CONFIG.domain_origin(),
- "object": "auth-request"
- })))
- }
- #[get("/auth-requests/<auth_request_id>")]
- async fn get_auth_request(auth_request_id: AuthRequestId, headers: Headers, mut conn: DbConn) -> JsonResult {
- let Some(auth_request) = AuthRequest::find_by_uuid_and_user(&auth_request_id, &headers.user.uuid, &mut conn).await
- else {
- err!("AuthRequest doesn't exist", "Record not found or user uuid does not match")
- };
- let response_date_utc = auth_request.response_date.map(|response_date| format_date(&response_date));
- Ok(Json(json!({
- "id": &auth_request_id,
- "publicKey": auth_request.public_key,
- "requestDeviceType": DeviceType::from_i32(auth_request.device_type).to_string(),
- "requestIpAddress": auth_request.request_ip,
- "key": auth_request.enc_key,
- "masterPasswordHash": auth_request.master_password_hash,
- "creationDate": format_date(&auth_request.creation_date),
- "responseDate": response_date_utc,
- "requestApproved": auth_request.approved,
- "origin": CONFIG.domain_origin(),
- "object":"auth-request"
- })))
- }
- #[derive(Debug, Deserialize)]
- #[serde(rename_all = "camelCase")]
- struct AuthResponseRequest {
- device_identifier: DeviceId,
- key: String,
- master_password_hash: Option<String>,
- request_approved: bool,
- }
- #[put("/auth-requests/<auth_request_id>", data = "<data>")]
- async fn put_auth_request(
- auth_request_id: AuthRequestId,
- data: Json<AuthResponseRequest>,
- headers: Headers,
- mut conn: DbConn,
- ant: AnonymousNotify<'_>,
- nt: Notify<'_>,
- ) -> JsonResult {
- let data = data.into_inner();
- let Some(mut auth_request) =
- AuthRequest::find_by_uuid_and_user(&auth_request_id, &headers.user.uuid, &mut conn).await
- else {
- err!("AuthRequest doesn't exist", "Record not found or user uuid does not match")
- };
- if headers.device.uuid != data.device_identifier {
- err!("AuthRequest doesn't exist", "Device verification failed")
- }
- if auth_request.approved.is_some() {
- err!("An authentication request with the same device already exists")
- }
- let response_date = Utc::now().naive_utc();
- let response_date_utc = format_date(&response_date);
- if data.request_approved {
- auth_request.approved = Some(data.request_approved);
- auth_request.enc_key = Some(data.key);
- auth_request.master_password_hash = data.master_password_hash;
- auth_request.response_device_id = Some(data.device_identifier.clone());
- auth_request.response_date = Some(response_date);
- auth_request.save(&mut conn).await?;
- ant.send_auth_response(&auth_request.user_uuid, &auth_request.uuid).await;
- nt.send_auth_response(&auth_request.user_uuid, &auth_request.uuid, &headers.device, &mut conn).await;
- log_user_event(
- EventType::OrganizationUserApprovedAuthRequest as i32,
- &headers.user.uuid,
- headers.device.atype,
- &headers.ip.ip,
- &mut conn,
- )
- .await;
- } else {
- // If denied, there's no reason to keep the request
- auth_request.delete(&mut conn).await?;
- log_user_event(
- EventType::OrganizationUserRejectedAuthRequest as i32,
- &headers.user.uuid,
- headers.device.atype,
- &headers.ip.ip,
- &mut conn,
- )
- .await;
- }
- Ok(Json(json!({
- "id": &auth_request_id,
- "publicKey": auth_request.public_key,
- "requestDeviceType": DeviceType::from_i32(auth_request.device_type).to_string(),
- "requestIpAddress": auth_request.request_ip,
- "key": auth_request.enc_key,
- "masterPasswordHash": auth_request.master_password_hash,
- "creationDate": format_date(&auth_request.creation_date),
- "responseDate": response_date_utc,
- "requestApproved": auth_request.approved,
- "origin": CONFIG.domain_origin(),
- "object":"auth-request"
- })))
- }
- #[get("/auth-requests/<auth_request_id>/response?<code>")]
- async fn get_auth_request_response(
- auth_request_id: AuthRequestId,
- code: &str,
- client_headers: ClientHeaders,
- mut conn: DbConn,
- ) -> JsonResult {
- let Some(auth_request) = AuthRequest::find_by_uuid(&auth_request_id, &mut conn).await else {
- err!("AuthRequest doesn't exist", "User not found")
- };
- if auth_request.device_type != client_headers.device_type
- || auth_request.request_ip != client_headers.ip.ip.to_string()
- || !auth_request.check_access_code(code)
- {
- err!("AuthRequest doesn't exist", "Invalid device, IP or code")
- }
- let response_date_utc = auth_request.response_date.map(|response_date| format_date(&response_date));
- Ok(Json(json!({
- "id": &auth_request_id,
- "publicKey": auth_request.public_key,
- "requestDeviceType": DeviceType::from_i32(auth_request.device_type).to_string(),
- "requestIpAddress": auth_request.request_ip,
- "key": auth_request.enc_key,
- "masterPasswordHash": auth_request.master_password_hash,
- "creationDate": format_date(&auth_request.creation_date),
- "responseDate": response_date_utc,
- "requestApproved": auth_request.approved,
- "origin": CONFIG.domain_origin(),
- "object":"auth-request"
- })))
- }
- #[get("/auth-requests")]
- async fn get_auth_requests(headers: Headers, mut conn: DbConn) -> JsonResult {
- let auth_requests = AuthRequest::find_by_user(&headers.user.uuid, &mut conn).await;
- Ok(Json(json!({
- "data": auth_requests
- .iter()
- .filter(|request| request.approved.is_none())
- .map(|request| {
- let response_date_utc = request.response_date.map(|response_date| format_date(&response_date));
- json!({
- "id": request.uuid,
- "publicKey": request.public_key,
- "requestDeviceType": DeviceType::from_i32(request.device_type).to_string(),
- "requestIpAddress": request.request_ip,
- "key": request.enc_key,
- "masterPasswordHash": request.master_password_hash,
- "creationDate": format_date(&request.creation_date),
- "responseDate": response_date_utc,
- "requestApproved": request.approved,
- "origin": CONFIG.domain_origin(),
- "object":"auth-request"
- })
- }).collect::<Vec<Value>>(),
- "continuationToken": null,
- "object": "list"
- })))
- }
- pub async fn purge_auth_requests(pool: DbPool) {
- debug!("Purging auth requests");
- if let Ok(mut conn) = pool.get().await {
- AuthRequest::purge_expired_auth_requests(&mut conn).await;
- } else {
- error!("Failed to get DB connection while purging trashed ciphers")
- }
- }
|