fabaccess-bffh/bffhd/capnp/user.rs

392 lines
13 KiB
Rust
Raw Permalink Normal View History

2022-03-21 00:01:50 +01:00
use crate::authorization::permissions::Permission;
2022-05-05 15:50:44 +02:00
use crate::session::SessionHandle;
2022-03-21 00:01:50 +01:00
use crate::users::{db, UserRef};
use crate::CONFIG;
2022-05-05 15:50:44 +02:00
use api::general_capnp::optional;
2023-01-06 12:45:43 +01:00
use api::user_capnp::user::card_d_e_s_fire_e_v2::{
BindParams, BindResults, GenCardTokenParams, GenCardTokenResults, GetMetaInfoParams,
GetMetaInfoResults, GetSpaceInfoParams, GetSpaceInfoResults, GetTokenListParams,
GetTokenListResults, UnbindParams, UnbindResults,
};
use api::user_capnp::user::{self, admin, card_d_e_s_fire_e_v2, info, manage};
2022-05-05 15:50:44 +02:00
use capnp::capability::Promise;
2023-01-06 12:45:43 +01:00
use capnp::Error;
2022-05-05 15:50:44 +02:00
use capnp_rpc::pry;
2023-01-06 12:45:43 +01:00
use std::borrow::Cow;
2023-01-09 16:58:32 +01:00
use std::io::Write;
use uuid::Uuid;
2023-01-06 12:45:43 +01:00
const TARGET: &str = "bffh::api::user";
2022-03-21 00:01:50 +01:00
#[derive(Clone)]
pub struct User {
2023-01-06 12:45:43 +01:00
span: tracing::Span,
2022-03-12 17:31:53 +01:00
session: SessionHandle,
2022-03-21 00:01:50 +01:00
user: UserRef,
2022-03-12 17:31:53 +01:00
}
impl User {
2022-03-21 00:01:50 +01:00
pub fn new(session: SessionHandle, user: UserRef) -> Self {
2023-01-06 12:45:43 +01:00
let span = tracing::info_span!(target: TARGET, "User");
Self {
span,
session,
user,
}
}
2022-03-21 00:01:50 +01:00
pub fn new_self(session: SessionHandle) -> Self {
let user = session.get_user_ref();
Self::new(session, user)
}
2022-05-05 15:50:44 +02:00
pub fn build_optional(
session: &SessionHandle,
user: Option<UserRef>,
builder: optional::Builder<user::Owned>,
) {
2022-04-28 20:33:46 +02:00
if let Some(user) = user.and_then(|u| session.users.get_user(u.get_username())) {
2022-04-26 23:21:43 +02:00
let builder = builder.init_just();
2022-04-28 20:33:46 +02:00
Self::fill(&session, user, builder);
2022-03-21 00:01:50 +01:00
}
}
2022-04-26 23:21:43 +02:00
pub fn build(session: SessionHandle, builder: user::Builder) {
2022-03-21 00:01:50 +01:00
let this = Self::new_self(session);
let user = this.session.get_user();
Self::fill(&this.session, user, builder);
2022-03-21 00:01:50 +01:00
}
pub fn fill(session: &SessionHandle, user: db::User, mut builder: user::Builder) {
2022-03-21 00:01:50 +01:00
builder.set_username(user.id.as_str());
// We have permissions on ourself
let is_me = &session.get_user_ref().id == &user.id;
let client = Self::new(session.clone(), UserRef::new(user.id));
2022-03-21 00:01:50 +01:00
if is_me || session.has_perm(Permission::new("bffh.users.info")) {
2022-03-21 00:01:50 +01:00
builder.set_info(capnp_rpc::new_client(client.clone()));
}
if is_me {
builder.set_manage(capnp_rpc::new_client(client.clone()));
}
if session.has_perm(Permission::new("bffh.users.admin")) {
2022-03-21 00:01:50 +01:00
builder.set_admin(capnp_rpc::new_client(client.clone()));
}
}
}
impl info::Server for User {
fn list_roles(
&mut self,
_: info::ListRolesParams,
2022-03-21 00:01:50 +01:00
mut result: info::ListRolesResults,
) -> Promise<(), ::capnp::Error> {
if let Some(user) = self.session.users.get_user(self.user.get_username()) {
let mut builder = result.get().init_roles(user.userdata.roles.len() as u32);
for (i, role) in user.userdata.roles.into_iter().enumerate() {
let mut b = builder.reborrow().get(i as u32);
b.set_name(role.as_str());
}
2022-03-21 00:01:50 +01:00
}
Promise::ok(())
}
}
impl manage::Server for User {
fn pwd(
&mut self,
params: manage::PwdParams,
2022-04-26 23:21:43 +02:00
_results: manage::PwdResults,
2022-03-21 00:01:50 +01:00
) -> Promise<(), ::capnp::Error> {
let params = pry!(params.get());
let old_pw = pry!(params.get_old_pwd());
let new_pw = pry!(params.get_new_pwd());
let uid = self.user.get_username();
if let Some(mut user) = self.session.users.get_user(uid) {
if let Ok(true) = user.check_password(old_pw.as_bytes()) {
user.set_pw(new_pw.as_bytes());
self.session.users.put_user(uid, &user);
}
}
Promise::ok(())
}
}
impl admin::Server for User {
fn get_user_info_extended(
&mut self,
_: admin::GetUserInfoExtendedParams,
_: admin::GetUserInfoExtendedResults,
2022-03-21 00:01:50 +01:00
) -> Promise<(), ::capnp::Error> {
Promise::err(::capnp::Error::unimplemented(
"method not implemented".to_string(),
))
}
fn add_role(
&mut self,
2022-03-21 00:01:50 +01:00
param: admin::AddRoleParams,
_: admin::AddRoleResults,
2022-03-21 00:01:50 +01:00
) -> Promise<(), ::capnp::Error> {
let rolename = pry!(pry!(pry!(param.get()).get_role()).get_name());
if let Some(_role) = self.session.roles.get(rolename) {
2022-05-05 15:50:44 +02:00
let mut target = self
.session
.users
.get_user(self.user.get_username())
.unwrap();
2022-03-21 00:01:50 +01:00
// Only update if needed
if !target.userdata.roles.iter().any(|r| r.as_str() == rolename) {
target.userdata.roles.push(rolename.to_string());
2022-05-05 15:50:44 +02:00
self.session
.users
.put_user(self.user.get_username(), &target);
2022-03-21 00:01:50 +01:00
}
}
Promise::ok(())
}
fn remove_role(
&mut self,
2022-03-21 00:01:50 +01:00
param: admin::RemoveRoleParams,
_: admin::RemoveRoleResults,
2022-03-21 00:01:50 +01:00
) -> Promise<(), ::capnp::Error> {
let rolename = pry!(pry!(pry!(param.get()).get_role()).get_name());
if let Some(_role) = self.session.roles.get(rolename) {
2022-05-05 15:50:44 +02:00
let mut target = self
.session
.users
.get_user(self.user.get_username())
.unwrap();
2022-03-21 00:01:50 +01:00
// Only update if needed
if target.userdata.roles.iter().any(|r| r.as_str() == rolename) {
target.userdata.roles.retain(|r| r.as_str() != rolename);
2022-05-05 15:50:44 +02:00
self.session
.users
.put_user(self.user.get_username(), &target);
2022-03-21 00:01:50 +01:00
}
}
Promise::ok(())
}
fn pwd(
&mut self,
param: admin::PwdParams,
_: admin::PwdResults,
) -> Promise<(), ::capnp::Error> {
let new_pw = pry!(pry!(param.get()).get_new_pwd());
let uid = self.user.get_username();
if let Some(mut user) = self.session.users.get_user(uid) {
user.set_pw(new_pw.as_bytes());
self.session.users.put_user(uid, &user);
}
Promise::ok(())
}
}
2023-01-06 12:45:43 +01:00
impl card_d_e_s_fire_e_v2::Server for User {
fn get_token_list(
&mut self,
_: GetTokenListParams,
mut results: GetTokenListResults,
) -> Promise<(), Error> {
let _guard = self.span.enter();
let _span = tracing::trace_span!(target: TARGET, "get_token_list").entered();
tracing::trace!("method call");
// TODO: This only supports a sigle key per user
let user = pry!(self
.session
.users
.get_user(self.user.get_username())
.ok_or_else(|| Error::failed(format!(
"User API object with nonexisting user \"{}\"",
self.user.get_username()
))));
let ck = user
.userdata
.kv
.get("cardkey")
.map(|ck| hex::decode(ck).ok())
.flatten()
.unwrap_or_else(|| {
tracing::debug!(user.id = &user.id, "no DESFire keys stored");
Vec::new()
});
if !ck.is_empty() {
let mut b = results.get();
let mut lb = b.init_token_list(1);
lb.set(0, &ck[..]);
}
Promise::ok(())
}
fn bind(&mut self, params: BindParams, _: BindResults) -> Promise<(), Error> {
let _guard = self.span.enter();
let _span = tracing::trace_span!(target: TARGET, "get_token_list").entered();
let params = pry!(params.get());
let card_key = pry!(params.get_auth_key());
let token = pry!(params.get_token());
let token: Cow<'_, str> = if let Ok(url) = std::str::from_utf8(token) {
Cow::Borrowed(url)
} else {
Cow::Owned(hex::encode(token))
};
tracing::trace!(
params.token = token.as_ref(),
params.auth_key = "<censored>",
"method call"
);
let card_key = hex::encode(card_key);
let mut user = pry!(self
.session
.users
.get_user(self.user.get_username())
.ok_or_else(|| Error::failed(format!(
"User API object with nonexisting user \"{}\"",
self.user.get_username()
))));
let prev_token = user.userdata.kv.get("cardtoken");
let prev_cardk = user.userdata.kv.get("cardkey");
match (prev_token, prev_cardk) {
(Some(prev_token), Some(prev_cardk))
if prev_token.as_str() == &token && prev_cardk.as_str() == card_key.as_str() =>
{
tracing::info!(
user.id, token = token.as_ref(),
"new token and card key are identical, skipping no-op"
);
return Promise::ok(());
},
(Some(prev_token), Some(_))
if prev_token.as_str() == token /* above guard means prev_cardk != card_key */ =>
{
tracing::warn!(
token = token.as_ref(),
"trying to overwrite card key for existing token, ignoring!"
);
return Promise::ok(());
},
(Some(prev_token), None) => tracing::warn!(
user.id, prev_token,
"token already set for user but no card key, setting new pair unconditionally!"
),
(None, Some(_)) => tracing::warn!(
user.id,
"card key already set for user but no token, setting new pair unconditionally!"
),
(Some(_), Some(_)) | (None, None) => tracing::debug!(
user.id, token = token.as_ref(),
"Adding new card key/token pair"
),
}
user.userdata
.kv
.insert("cardtoken".to_string(), token.to_string());
user.userdata.kv.insert("cardkey".to_string(), card_key);
Promise::ok(())
}
fn unbind(&mut self, params: UnbindParams, _: UnbindResults) -> Promise<(), Error> {
let _guard = self.span.enter();
let _span = tracing::trace_span!(target: TARGET, "get_token_list").entered();
let params = pry!(params.get());
let token = pry!(params.get_token());
let token: Cow<'_, str> = if let Ok(url) = std::str::from_utf8(token) {
Cow::Borrowed(url)
} else {
Cow::Owned(hex::encode(token))
};
tracing::trace!(params.token = token.as_ref(), "method call");
let mut user = pry!(self
.session
.users
.get_user(self.user.get_username())
.ok_or_else(|| Error::failed(format!(
"User API object with nonexisting user \"{}\"",
self.user.get_username()
))));
if let Some(prev_token) = user.userdata.kv.get("cardtoken") {
if token.as_ref() == prev_token.as_str() {
user.userdata.kv.remove("cardtoken");
user.userdata.kv.remove("cardkey");
}
}
Promise::ok(())
}
fn gen_card_token(
&mut self,
_: GenCardTokenParams,
2023-01-09 16:58:32 +01:00
mut results: GenCardTokenResults,
2023-01-06 12:45:43 +01:00
) -> Promise<(), Error> {
let _guard = self.span.enter();
2023-01-09 16:58:32 +01:00
let _span = tracing::trace_span!(target: TARGET, "get_card_token").entered();
2023-01-06 12:45:43 +01:00
tracing::trace!("method call");
2023-01-09 16:58:32 +01:00
results.get().set_token(Uuid::new_v4().as_bytes());
Promise::ok(())
2023-01-06 12:45:43 +01:00
}
fn get_meta_info(
&mut self,
_: GetMetaInfoParams,
mut results: GetMetaInfoResults,
) -> Promise<(), Error> {
2023-01-06 12:45:43 +01:00
let _guard = self.span.enter();
2023-01-09 16:58:32 +01:00
let _span = tracing::trace_span!(target: TARGET, "get_meta_info").entered();
2023-01-06 12:45:43 +01:00
tracing::trace!("method call");
2023-01-09 16:58:32 +01:00
results.get().set_bytes(b"FABACCESS\x00DESFIRE\x001.0\x00");
Promise::ok(())
2023-01-06 12:45:43 +01:00
}
fn get_space_info(
&mut self,
_: GetSpaceInfoParams,
mut results: GetSpaceInfoResults,
2023-01-06 12:45:43 +01:00
) -> Promise<(), Error> {
let _guard = self.span.enter();
2023-01-09 16:58:32 +01:00
let _span = tracing::trace_span!(target: TARGET, "get_space_info").entered();
2023-01-06 12:45:43 +01:00
tracing::trace!("method call");
2023-01-09 16:58:32 +01:00
let space = if let Some(space) = CONFIG.get().and_then(|c| c.spacename.as_ref()) {
space
} else {
return Promise::err(Error::failed("No space name configured".to_string()));
};
let url = if let Some(url) = CONFIG.get().and_then(|c| c.instanceurl.as_ref()) {
url
} else {
return Promise::err(Error::failed("No instance url configured".to_string()));
};
let mut data = Vec::new();
write!(&mut data, "urn:fabaccess:lab:{space}\x00{url}").unwrap();
results.get().set_bytes(&data);
Promise::ok(())
2023-01-06 12:45:43 +01:00
}
}