accounts.rs 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740
  1. use chrono::Utc;
  2. use rocket::serde::json::Json;
  3. use serde_json::Value;
  4. use crate::{
  5. api::{EmptyResult, JsonResult, JsonUpcase, Notify, NumberOrString, PasswordData, UpdateType},
  6. auth::{decode_delete, decode_invite, decode_verify_email, Headers},
  7. crypto,
  8. db::{models::*, DbConn},
  9. mail, CONFIG,
  10. };
  11. pub fn routes() -> Vec<rocket::Route> {
  12. routes![
  13. register,
  14. profile,
  15. put_profile,
  16. post_profile,
  17. get_public_keys,
  18. post_keys,
  19. post_password,
  20. post_kdf,
  21. post_rotatekey,
  22. post_sstamp,
  23. post_email_token,
  24. post_email,
  25. post_verify_email,
  26. post_verify_email_token,
  27. post_delete_recover,
  28. post_delete_recover_token,
  29. delete_account,
  30. post_delete_account,
  31. revision_date,
  32. password_hint,
  33. prelogin,
  34. verify_password,
  35. api_key,
  36. rotate_api_key,
  37. ]
  38. }
  39. #[derive(Deserialize, Debug)]
  40. #[allow(non_snake_case)]
  41. struct RegisterData {
  42. Email: String,
  43. Kdf: Option<i32>,
  44. KdfIterations: Option<i32>,
  45. Key: String,
  46. Keys: Option<KeysData>,
  47. MasterPasswordHash: String,
  48. MasterPasswordHint: Option<String>,
  49. Name: Option<String>,
  50. Token: Option<String>,
  51. #[allow(dead_code)]
  52. OrganizationUserId: Option<String>,
  53. }
  54. #[derive(Deserialize, Debug)]
  55. #[allow(non_snake_case)]
  56. struct KeysData {
  57. EncryptedPrivateKey: String,
  58. PublicKey: String,
  59. }
  60. /// Trims whitespace from password hints, and converts blank password hints to `None`.
  61. fn clean_password_hint(password_hint: &Option<String>) -> Option<String> {
  62. match password_hint {
  63. None => None,
  64. Some(h) => match h.trim() {
  65. "" => None,
  66. ht => Some(ht.to_string()),
  67. },
  68. }
  69. }
  70. fn enforce_password_hint_setting(password_hint: &Option<String>) -> EmptyResult {
  71. if password_hint.is_some() && !CONFIG.password_hints_allowed() {
  72. err!("Password hints have been disabled by the administrator. Remove the hint and try again.");
  73. }
  74. Ok(())
  75. }
  76. #[post("/accounts/register", data = "<data>")]
  77. async fn register(data: JsonUpcase<RegisterData>, conn: DbConn) -> JsonResult {
  78. let data: RegisterData = data.into_inner().data;
  79. let email = data.Email.to_lowercase();
  80. // Check if the length of the username exceeds 50 characters (Same is Upstream Bitwarden)
  81. // This also prevents issues with very long usernames causing to large JWT's. See #2419
  82. if let Some(ref name) = data.Name {
  83. if name.len() > 50 {
  84. err!("The field Name must be a string with a maximum length of 50.");
  85. }
  86. }
  87. // Check against the password hint setting here so if it fails, the user
  88. // can retry without losing their invitation below.
  89. let password_hint = clean_password_hint(&data.MasterPasswordHint);
  90. enforce_password_hint_setting(&password_hint)?;
  91. let mut verified_by_invite = false;
  92. let mut user = match User::find_by_mail(&email, &conn).await {
  93. Some(mut user) => {
  94. if !user.password_hash.is_empty() {
  95. err!("Registration not allowed or user already exists")
  96. }
  97. if let Some(token) = data.Token {
  98. let claims = decode_invite(&token)?;
  99. if claims.email == email {
  100. // Verify the email address when signing up via a valid invite token
  101. verified_by_invite = true;
  102. user.verified_at = Some(Utc::now().naive_utc());
  103. user
  104. } else {
  105. err!("Registration email does not match invite email")
  106. }
  107. } else if Invitation::take(&email, &conn).await {
  108. for mut user_org in UserOrganization::find_invited_by_user(&user.uuid, &conn).await.iter_mut() {
  109. user_org.status = UserOrgStatus::Accepted as i32;
  110. user_org.save(&conn).await?;
  111. }
  112. user
  113. } else if CONFIG.is_signup_allowed(&email)
  114. || EmergencyAccess::find_invited_by_grantee_email(&email, &conn).await.is_some()
  115. {
  116. user
  117. } else {
  118. err!("Registration not allowed or user already exists")
  119. }
  120. }
  121. None => {
  122. // Order is important here; the invitation check must come first
  123. // because the vaultwarden admin can invite anyone, regardless
  124. // of other signup restrictions.
  125. if Invitation::take(&email, &conn).await || CONFIG.is_signup_allowed(&email) {
  126. User::new(email.clone())
  127. } else {
  128. err!("Registration not allowed or user already exists")
  129. }
  130. }
  131. };
  132. // Make sure we don't leave a lingering invitation.
  133. Invitation::take(&email, &conn).await;
  134. if let Some(client_kdf_iter) = data.KdfIterations {
  135. user.client_kdf_iter = client_kdf_iter;
  136. }
  137. if let Some(client_kdf_type) = data.Kdf {
  138. user.client_kdf_type = client_kdf_type;
  139. }
  140. user.set_password(&data.MasterPasswordHash, None);
  141. user.akey = data.Key;
  142. user.password_hint = password_hint;
  143. // Add extra fields if present
  144. if let Some(name) = data.Name {
  145. user.name = name;
  146. }
  147. if let Some(keys) = data.Keys {
  148. user.private_key = Some(keys.EncryptedPrivateKey);
  149. user.public_key = Some(keys.PublicKey);
  150. }
  151. if CONFIG.mail_enabled() {
  152. if CONFIG.signups_verify() && !verified_by_invite {
  153. if let Err(e) = mail::send_welcome_must_verify(&user.email, &user.uuid).await {
  154. error!("Error sending welcome email: {:#?}", e);
  155. }
  156. user.last_verifying_at = Some(user.created_at);
  157. } else if let Err(e) = mail::send_welcome(&user.email).await {
  158. error!("Error sending welcome email: {:#?}", e);
  159. }
  160. }
  161. user.save(&conn).await?;
  162. Ok(Json(json!({
  163. "Object": "register",
  164. "CaptchaBypassToken": "",
  165. })))
  166. }
  167. #[get("/accounts/profile")]
  168. async fn profile(headers: Headers, conn: DbConn) -> Json<Value> {
  169. Json(headers.user.to_json(&conn).await)
  170. }
  171. #[derive(Deserialize, Debug)]
  172. #[allow(non_snake_case)]
  173. struct ProfileData {
  174. // Culture: String, // Ignored, always use en-US
  175. // MasterPasswordHint: Option<String>, // Ignored, has been moved to ChangePassData
  176. Name: String,
  177. }
  178. #[put("/accounts/profile", data = "<data>")]
  179. async fn put_profile(data: JsonUpcase<ProfileData>, headers: Headers, conn: DbConn) -> JsonResult {
  180. post_profile(data, headers, conn).await
  181. }
  182. #[post("/accounts/profile", data = "<data>")]
  183. async fn post_profile(data: JsonUpcase<ProfileData>, headers: Headers, conn: DbConn) -> JsonResult {
  184. let data: ProfileData = data.into_inner().data;
  185. // Check if the length of the username exceeds 50 characters (Same is Upstream Bitwarden)
  186. // This also prevents issues with very long usernames causing to large JWT's. See #2419
  187. if data.Name.len() > 50 {
  188. err!("The field Name must be a string with a maximum length of 50.");
  189. }
  190. let mut user = headers.user;
  191. user.name = data.Name;
  192. user.save(&conn).await?;
  193. Ok(Json(user.to_json(&conn).await))
  194. }
  195. #[get("/users/<uuid>/public-key")]
  196. async fn get_public_keys(uuid: String, _headers: Headers, conn: DbConn) -> JsonResult {
  197. let user = match User::find_by_uuid(&uuid, &conn).await {
  198. Some(user) => user,
  199. None => err!("User doesn't exist"),
  200. };
  201. Ok(Json(json!({
  202. "UserId": user.uuid,
  203. "PublicKey": user.public_key,
  204. "Object":"userKey"
  205. })))
  206. }
  207. #[post("/accounts/keys", data = "<data>")]
  208. async fn post_keys(data: JsonUpcase<KeysData>, headers: Headers, conn: DbConn) -> JsonResult {
  209. let data: KeysData = data.into_inner().data;
  210. let mut user = headers.user;
  211. user.private_key = Some(data.EncryptedPrivateKey);
  212. user.public_key = Some(data.PublicKey);
  213. user.save(&conn).await?;
  214. Ok(Json(json!({
  215. "PrivateKey": user.private_key,
  216. "PublicKey": user.public_key,
  217. "Object":"keys"
  218. })))
  219. }
  220. #[derive(Deserialize)]
  221. #[allow(non_snake_case)]
  222. struct ChangePassData {
  223. MasterPasswordHash: String,
  224. NewMasterPasswordHash: String,
  225. MasterPasswordHint: Option<String>,
  226. Key: String,
  227. }
  228. #[post("/accounts/password", data = "<data>")]
  229. async fn post_password(data: JsonUpcase<ChangePassData>, headers: Headers, conn: DbConn) -> EmptyResult {
  230. let data: ChangePassData = data.into_inner().data;
  231. let mut user = headers.user;
  232. if !user.check_valid_password(&data.MasterPasswordHash) {
  233. err!("Invalid password")
  234. }
  235. user.password_hint = clean_password_hint(&data.MasterPasswordHint);
  236. enforce_password_hint_setting(&user.password_hint)?;
  237. user.set_password(
  238. &data.NewMasterPasswordHash,
  239. Some(vec![String::from("post_rotatekey"), String::from("get_contacts"), String::from("get_public_keys")]),
  240. );
  241. user.akey = data.Key;
  242. user.save(&conn).await
  243. }
  244. #[derive(Deserialize)]
  245. #[allow(non_snake_case)]
  246. struct ChangeKdfData {
  247. Kdf: i32,
  248. KdfIterations: i32,
  249. MasterPasswordHash: String,
  250. NewMasterPasswordHash: String,
  251. Key: String,
  252. }
  253. #[post("/accounts/kdf", data = "<data>")]
  254. async fn post_kdf(data: JsonUpcase<ChangeKdfData>, headers: Headers, conn: DbConn) -> EmptyResult {
  255. let data: ChangeKdfData = data.into_inner().data;
  256. let mut user = headers.user;
  257. if !user.check_valid_password(&data.MasterPasswordHash) {
  258. err!("Invalid password")
  259. }
  260. user.client_kdf_iter = data.KdfIterations;
  261. user.client_kdf_type = data.Kdf;
  262. user.set_password(&data.NewMasterPasswordHash, None);
  263. user.akey = data.Key;
  264. user.save(&conn).await
  265. }
  266. #[derive(Deserialize)]
  267. #[allow(non_snake_case)]
  268. struct UpdateFolderData {
  269. Id: String,
  270. Name: String,
  271. }
  272. use super::ciphers::CipherData;
  273. #[derive(Deserialize)]
  274. #[allow(non_snake_case)]
  275. struct KeyData {
  276. Ciphers: Vec<CipherData>,
  277. Folders: Vec<UpdateFolderData>,
  278. Key: String,
  279. PrivateKey: String,
  280. MasterPasswordHash: String,
  281. }
  282. #[post("/accounts/key", data = "<data>")]
  283. async fn post_rotatekey(data: JsonUpcase<KeyData>, headers: Headers, conn: DbConn, nt: Notify<'_>) -> EmptyResult {
  284. let data: KeyData = data.into_inner().data;
  285. if !headers.user.check_valid_password(&data.MasterPasswordHash) {
  286. err!("Invalid password")
  287. }
  288. let user_uuid = &headers.user.uuid;
  289. // Update folder data
  290. for folder_data in data.Folders {
  291. let mut saved_folder = match Folder::find_by_uuid(&folder_data.Id, &conn).await {
  292. Some(folder) => folder,
  293. None => err!("Folder doesn't exist"),
  294. };
  295. if &saved_folder.user_uuid != user_uuid {
  296. err!("The folder is not owned by the user")
  297. }
  298. saved_folder.name = folder_data.Name;
  299. saved_folder.save(&conn).await?
  300. }
  301. // Update cipher data
  302. use super::ciphers::update_cipher_from_data;
  303. for cipher_data in data.Ciphers {
  304. let mut saved_cipher = match Cipher::find_by_uuid(cipher_data.Id.as_ref().unwrap(), &conn).await {
  305. Some(cipher) => cipher,
  306. None => err!("Cipher doesn't exist"),
  307. };
  308. if saved_cipher.user_uuid.as_ref().unwrap() != user_uuid {
  309. err!("The cipher is not owned by the user")
  310. }
  311. // Prevent triggering cipher updates via WebSockets by settings UpdateType::None
  312. // The user sessions are invalidated because all the ciphers were re-encrypted and thus triggering an update could cause issues.
  313. update_cipher_from_data(&mut saved_cipher, cipher_data, &headers, false, &conn, &nt, UpdateType::None).await?
  314. }
  315. // Update user data
  316. let mut user = headers.user;
  317. user.akey = data.Key;
  318. user.private_key = Some(data.PrivateKey);
  319. user.reset_security_stamp();
  320. user.save(&conn).await
  321. }
  322. #[post("/accounts/security-stamp", data = "<data>")]
  323. async fn post_sstamp(data: JsonUpcase<PasswordData>, headers: Headers, conn: DbConn) -> EmptyResult {
  324. let data: PasswordData = data.into_inner().data;
  325. let mut user = headers.user;
  326. if !user.check_valid_password(&data.MasterPasswordHash) {
  327. err!("Invalid password")
  328. }
  329. Device::delete_all_by_user(&user.uuid, &conn).await?;
  330. user.reset_security_stamp();
  331. user.save(&conn).await
  332. }
  333. #[derive(Deserialize)]
  334. #[allow(non_snake_case)]
  335. struct EmailTokenData {
  336. MasterPasswordHash: String,
  337. NewEmail: String,
  338. }
  339. #[post("/accounts/email-token", data = "<data>")]
  340. async fn post_email_token(data: JsonUpcase<EmailTokenData>, headers: Headers, conn: DbConn) -> EmptyResult {
  341. let data: EmailTokenData = data.into_inner().data;
  342. let mut user = headers.user;
  343. if !user.check_valid_password(&data.MasterPasswordHash) {
  344. err!("Invalid password")
  345. }
  346. if User::find_by_mail(&data.NewEmail, &conn).await.is_some() {
  347. err!("Email already in use");
  348. }
  349. if !CONFIG.is_email_domain_allowed(&data.NewEmail) {
  350. err!("Email domain not allowed");
  351. }
  352. let token = crypto::generate_email_token(6);
  353. if CONFIG.mail_enabled() {
  354. if let Err(e) = mail::send_change_email(&data.NewEmail, &token).await {
  355. error!("Error sending change-email email: {:#?}", e);
  356. }
  357. }
  358. user.email_new = Some(data.NewEmail);
  359. user.email_new_token = Some(token);
  360. user.save(&conn).await
  361. }
  362. #[derive(Deserialize)]
  363. #[allow(non_snake_case)]
  364. struct ChangeEmailData {
  365. MasterPasswordHash: String,
  366. NewEmail: String,
  367. Key: String,
  368. NewMasterPasswordHash: String,
  369. Token: NumberOrString,
  370. }
  371. #[post("/accounts/email", data = "<data>")]
  372. async fn post_email(data: JsonUpcase<ChangeEmailData>, headers: Headers, conn: DbConn) -> EmptyResult {
  373. let data: ChangeEmailData = data.into_inner().data;
  374. let mut user = headers.user;
  375. if !user.check_valid_password(&data.MasterPasswordHash) {
  376. err!("Invalid password")
  377. }
  378. if User::find_by_mail(&data.NewEmail, &conn).await.is_some() {
  379. err!("Email already in use");
  380. }
  381. match user.email_new {
  382. Some(ref val) => {
  383. if val != &data.NewEmail {
  384. err!("Email change mismatch");
  385. }
  386. }
  387. None => err!("No email change pending"),
  388. }
  389. if CONFIG.mail_enabled() {
  390. // Only check the token if we sent out an email...
  391. match user.email_new_token {
  392. Some(ref val) => {
  393. if *val != data.Token.into_string() {
  394. err!("Token mismatch");
  395. }
  396. }
  397. None => err!("No email change pending"),
  398. }
  399. user.verified_at = Some(Utc::now().naive_utc());
  400. } else {
  401. user.verified_at = None;
  402. }
  403. user.email = data.NewEmail;
  404. user.email_new = None;
  405. user.email_new_token = None;
  406. user.set_password(&data.NewMasterPasswordHash, None);
  407. user.akey = data.Key;
  408. user.save(&conn).await
  409. }
  410. #[post("/accounts/verify-email")]
  411. async fn post_verify_email(headers: Headers) -> EmptyResult {
  412. let user = headers.user;
  413. if !CONFIG.mail_enabled() {
  414. err!("Cannot verify email address");
  415. }
  416. if let Err(e) = mail::send_verify_email(&user.email, &user.uuid).await {
  417. error!("Error sending verify_email email: {:#?}", e);
  418. }
  419. Ok(())
  420. }
  421. #[derive(Deserialize)]
  422. #[allow(non_snake_case)]
  423. struct VerifyEmailTokenData {
  424. UserId: String,
  425. Token: String,
  426. }
  427. #[post("/accounts/verify-email-token", data = "<data>")]
  428. async fn post_verify_email_token(data: JsonUpcase<VerifyEmailTokenData>, conn: DbConn) -> EmptyResult {
  429. let data: VerifyEmailTokenData = data.into_inner().data;
  430. let mut user = match User::find_by_uuid(&data.UserId, &conn).await {
  431. Some(user) => user,
  432. None => err!("User doesn't exist"),
  433. };
  434. let claims = match decode_verify_email(&data.Token) {
  435. Ok(claims) => claims,
  436. Err(_) => err!("Invalid claim"),
  437. };
  438. if claims.sub != user.uuid {
  439. err!("Invalid claim");
  440. }
  441. user.verified_at = Some(Utc::now().naive_utc());
  442. user.last_verifying_at = None;
  443. user.login_verify_count = 0;
  444. if let Err(e) = user.save(&conn).await {
  445. error!("Error saving email verification: {:#?}", e);
  446. }
  447. Ok(())
  448. }
  449. #[derive(Deserialize)]
  450. #[allow(non_snake_case)]
  451. struct DeleteRecoverData {
  452. Email: String,
  453. }
  454. #[post("/accounts/delete-recover", data = "<data>")]
  455. async fn post_delete_recover(data: JsonUpcase<DeleteRecoverData>, conn: DbConn) -> EmptyResult {
  456. let data: DeleteRecoverData = data.into_inner().data;
  457. if CONFIG.mail_enabled() {
  458. if let Some(user) = User::find_by_mail(&data.Email, &conn).await {
  459. if let Err(e) = mail::send_delete_account(&user.email, &user.uuid).await {
  460. error!("Error sending delete account email: {:#?}", e);
  461. }
  462. }
  463. Ok(())
  464. } else {
  465. // We don't support sending emails, but we shouldn't allow anybody
  466. // to delete accounts without at least logging in... And if the user
  467. // cannot remember their password then they will need to contact
  468. // the administrator to delete it...
  469. err!("Please contact the administrator to delete your account");
  470. }
  471. }
  472. #[derive(Deserialize)]
  473. #[allow(non_snake_case)]
  474. struct DeleteRecoverTokenData {
  475. UserId: String,
  476. Token: String,
  477. }
  478. #[post("/accounts/delete-recover-token", data = "<data>")]
  479. async fn post_delete_recover_token(data: JsonUpcase<DeleteRecoverTokenData>, conn: DbConn) -> EmptyResult {
  480. let data: DeleteRecoverTokenData = data.into_inner().data;
  481. let user = match User::find_by_uuid(&data.UserId, &conn).await {
  482. Some(user) => user,
  483. None => err!("User doesn't exist"),
  484. };
  485. let claims = match decode_delete(&data.Token) {
  486. Ok(claims) => claims,
  487. Err(_) => err!("Invalid claim"),
  488. };
  489. if claims.sub != user.uuid {
  490. err!("Invalid claim");
  491. }
  492. user.delete(&conn).await
  493. }
  494. #[post("/accounts/delete", data = "<data>")]
  495. async fn post_delete_account(data: JsonUpcase<PasswordData>, headers: Headers, conn: DbConn) -> EmptyResult {
  496. delete_account(data, headers, conn).await
  497. }
  498. #[delete("/accounts", data = "<data>")]
  499. async fn delete_account(data: JsonUpcase<PasswordData>, headers: Headers, conn: DbConn) -> EmptyResult {
  500. let data: PasswordData = data.into_inner().data;
  501. let user = headers.user;
  502. if !user.check_valid_password(&data.MasterPasswordHash) {
  503. err!("Invalid password")
  504. }
  505. user.delete(&conn).await
  506. }
  507. #[get("/accounts/revision-date")]
  508. fn revision_date(headers: Headers) -> String {
  509. let revision_date = headers.user.updated_at.timestamp_millis();
  510. revision_date.to_string()
  511. }
  512. #[derive(Deserialize)]
  513. #[allow(non_snake_case)]
  514. struct PasswordHintData {
  515. Email: String,
  516. }
  517. #[post("/accounts/password-hint", data = "<data>")]
  518. async fn password_hint(data: JsonUpcase<PasswordHintData>, conn: DbConn) -> EmptyResult {
  519. if !CONFIG.mail_enabled() && !CONFIG.show_password_hint() {
  520. err!("This server is not configured to provide password hints.");
  521. }
  522. const NO_HINT: &str = "Sorry, you have no password hint...";
  523. let data: PasswordHintData = data.into_inner().data;
  524. let email = &data.Email;
  525. match User::find_by_mail(email, &conn).await {
  526. None => {
  527. // To prevent user enumeration, act as if the user exists.
  528. if CONFIG.mail_enabled() {
  529. // There is still a timing side channel here in that the code
  530. // paths that send mail take noticeably longer than ones that
  531. // don't. Add a randomized sleep to mitigate this somewhat.
  532. use rand::{rngs::SmallRng, Rng, SeedableRng};
  533. let mut rng = SmallRng::from_entropy();
  534. let delta: i32 = 100;
  535. let sleep_ms = (1_000 + rng.gen_range(-delta..=delta)) as u64;
  536. tokio::time::sleep(tokio::time::Duration::from_millis(sleep_ms)).await;
  537. Ok(())
  538. } else {
  539. err!(NO_HINT);
  540. }
  541. }
  542. Some(user) => {
  543. let hint: Option<String> = user.password_hint;
  544. if CONFIG.mail_enabled() {
  545. mail::send_password_hint(email, hint).await?;
  546. Ok(())
  547. } else if let Some(hint) = hint {
  548. err!(format!("Your password hint is: {}", hint));
  549. } else {
  550. err!(NO_HINT);
  551. }
  552. }
  553. }
  554. }
  555. #[derive(Deserialize)]
  556. #[allow(non_snake_case)]
  557. pub struct PreloginData {
  558. Email: String,
  559. }
  560. #[post("/accounts/prelogin", data = "<data>")]
  561. async fn prelogin(data: JsonUpcase<PreloginData>, conn: DbConn) -> Json<Value> {
  562. _prelogin(data, conn).await
  563. }
  564. pub async fn _prelogin(data: JsonUpcase<PreloginData>, conn: DbConn) -> Json<Value> {
  565. let data: PreloginData = data.into_inner().data;
  566. let (kdf_type, kdf_iter) = match User::find_by_mail(&data.Email, &conn).await {
  567. Some(user) => (user.client_kdf_type, user.client_kdf_iter),
  568. None => (User::CLIENT_KDF_TYPE_DEFAULT, User::CLIENT_KDF_ITER_DEFAULT),
  569. };
  570. Json(json!({
  571. "Kdf": kdf_type,
  572. "KdfIterations": kdf_iter
  573. }))
  574. }
  575. // https://github.com/bitwarden/server/blob/master/src/Api/Models/Request/Accounts/SecretVerificationRequestModel.cs
  576. #[derive(Deserialize)]
  577. #[allow(non_snake_case)]
  578. struct SecretVerificationRequest {
  579. MasterPasswordHash: String,
  580. }
  581. #[post("/accounts/verify-password", data = "<data>")]
  582. fn verify_password(data: JsonUpcase<SecretVerificationRequest>, headers: Headers) -> EmptyResult {
  583. let data: SecretVerificationRequest = data.into_inner().data;
  584. let user = headers.user;
  585. if !user.check_valid_password(&data.MasterPasswordHash) {
  586. err!("Invalid password")
  587. }
  588. Ok(())
  589. }
  590. async fn _api_key(
  591. data: JsonUpcase<SecretVerificationRequest>,
  592. rotate: bool,
  593. headers: Headers,
  594. conn: DbConn,
  595. ) -> JsonResult {
  596. let data: SecretVerificationRequest = data.into_inner().data;
  597. let mut user = headers.user;
  598. if !user.check_valid_password(&data.MasterPasswordHash) {
  599. err!("Invalid password")
  600. }
  601. if rotate || user.api_key.is_none() {
  602. user.api_key = Some(crypto::generate_api_key());
  603. user.save(&conn).await.expect("Error saving API key");
  604. }
  605. Ok(Json(json!({
  606. "ApiKey": user.api_key,
  607. "Object": "apiKey",
  608. })))
  609. }
  610. #[post("/accounts/api-key", data = "<data>")]
  611. async fn api_key(data: JsonUpcase<SecretVerificationRequest>, headers: Headers, conn: DbConn) -> JsonResult {
  612. _api_key(data, false, headers, conn).await
  613. }
  614. #[post("/accounts/rotate-api-key", data = "<data>")]
  615. async fn rotate_api_key(data: JsonUpcase<SecretVerificationRequest>, headers: Headers, conn: DbConn) -> JsonResult {
  616. _api_key(data, true, headers, conn).await
  617. }