2022-03-21 00:01:50 +01:00
|
|
|
use crate::authorization::permissions::Permission;
|
2022-05-05 15:50:44 +02:00
|
|
|
use crate::session::SessionHandle;
|
2022-03-21 00:01:50 +01:00
|
|
|
use crate::users::{db, UserRef};
|
2023-01-11 14:50:48 +01:00
|
|
|
use crate::CONFIG;
|
2022-05-05 15:50:44 +02:00
|
|
|
use api::general_capnp::optional;
|
2023-01-06 12:45:43 +01:00
|
|
|
use api::user_capnp::user::card_d_e_s_fire_e_v2::{
|
|
|
|
BindParams, BindResults, GenCardTokenParams, GenCardTokenResults, GetMetaInfoParams,
|
|
|
|
GetMetaInfoResults, GetSpaceInfoParams, GetSpaceInfoResults, GetTokenListParams,
|
|
|
|
GetTokenListResults, UnbindParams, UnbindResults,
|
|
|
|
};
|
|
|
|
use api::user_capnp::user::{self, admin, card_d_e_s_fire_e_v2, info, manage};
|
2022-05-05 15:50:44 +02:00
|
|
|
use capnp::capability::Promise;
|
2023-01-06 12:45:43 +01:00
|
|
|
use capnp::Error;
|
2022-05-05 15:50:44 +02:00
|
|
|
use capnp_rpc::pry;
|
2023-01-06 12:45:43 +01:00
|
|
|
use std::borrow::Cow;
|
2023-01-09 16:58:32 +01:00
|
|
|
use std::io::Write;
|
|
|
|
use uuid::Uuid;
|
2023-01-06 12:45:43 +01:00
|
|
|
|
|
|
|
const TARGET: &str = "bffh::api::user";
|
2022-03-11 22:13:54 +01:00
|
|
|
|
2022-03-21 00:01:50 +01:00
|
|
|
#[derive(Clone)]
|
2022-03-16 20:17:59 +01:00
|
|
|
pub struct User {
|
2023-01-06 12:45:43 +01:00
|
|
|
span: tracing::Span,
|
2022-03-12 17:31:53 +01:00
|
|
|
session: SessionHandle,
|
2022-03-21 00:01:50 +01:00
|
|
|
user: UserRef,
|
2022-03-12 17:31:53 +01:00
|
|
|
}
|
2022-03-11 22:13:54 +01:00
|
|
|
|
2022-03-16 20:17:59 +01:00
|
|
|
impl User {
|
2022-03-21 00:01:50 +01:00
|
|
|
pub fn new(session: SessionHandle, user: UserRef) -> Self {
|
2023-01-06 12:45:43 +01:00
|
|
|
let span = tracing::info_span!(target: TARGET, "User");
|
|
|
|
Self {
|
|
|
|
span,
|
|
|
|
session,
|
|
|
|
user,
|
|
|
|
}
|
2022-03-16 20:17:59 +01:00
|
|
|
}
|
|
|
|
|
2022-03-21 00:01:50 +01:00
|
|
|
pub fn new_self(session: SessionHandle) -> Self {
|
|
|
|
let user = session.get_user_ref();
|
|
|
|
Self::new(session, user)
|
2022-03-16 20:17:59 +01:00
|
|
|
}
|
2022-03-11 22:13:54 +01:00
|
|
|
|
2022-05-05 15:50:44 +02:00
|
|
|
pub fn build_optional(
|
|
|
|
session: &SessionHandle,
|
|
|
|
user: Option<UserRef>,
|
|
|
|
builder: optional::Builder<user::Owned>,
|
|
|
|
) {
|
2022-04-28 20:33:46 +02:00
|
|
|
if let Some(user) = user.and_then(|u| session.users.get_user(u.get_username())) {
|
2022-04-26 23:21:43 +02:00
|
|
|
let builder = builder.init_just();
|
2022-04-28 20:33:46 +02:00
|
|
|
Self::fill(&session, user, builder);
|
2022-03-21 00:01:50 +01:00
|
|
|
}
|
2022-03-16 20:17:59 +01:00
|
|
|
}
|
|
|
|
|
2022-04-26 23:21:43 +02:00
|
|
|
pub fn build(session: SessionHandle, builder: user::Builder) {
|
2022-03-21 00:01:50 +01:00
|
|
|
let this = Self::new_self(session);
|
|
|
|
let user = this.session.get_user();
|
2022-04-27 20:19:04 +02:00
|
|
|
Self::fill(&this.session, user, builder);
|
2022-03-21 00:01:50 +01:00
|
|
|
}
|
|
|
|
|
2022-04-27 20:19:04 +02:00
|
|
|
pub fn fill(session: &SessionHandle, user: db::User, mut builder: user::Builder) {
|
2022-03-21 00:01:50 +01:00
|
|
|
builder.set_username(user.id.as_str());
|
|
|
|
|
|
|
|
// We have permissions on ourself
|
2022-04-27 20:19:04 +02:00
|
|
|
let is_me = &session.get_user_ref().id == &user.id;
|
|
|
|
|
|
|
|
let client = Self::new(session.clone(), UserRef::new(user.id));
|
2022-03-21 00:01:50 +01:00
|
|
|
|
2022-04-27 20:19:04 +02:00
|
|
|
if is_me || session.has_perm(Permission::new("bffh.users.info")) {
|
2022-03-21 00:01:50 +01:00
|
|
|
builder.set_info(capnp_rpc::new_client(client.clone()));
|
|
|
|
}
|
|
|
|
if is_me {
|
|
|
|
builder.set_manage(capnp_rpc::new_client(client.clone()));
|
|
|
|
}
|
2022-04-27 20:19:04 +02:00
|
|
|
if session.has_perm(Permission::new("bffh.users.admin")) {
|
2022-03-21 00:01:50 +01:00
|
|
|
builder.set_admin(capnp_rpc::new_client(client.clone()));
|
|
|
|
}
|
2022-03-16 20:17:59 +01:00
|
|
|
}
|
2022-03-11 22:13:54 +01:00
|
|
|
}
|
|
|
|
|
2022-03-16 20:17:59 +01:00
|
|
|
impl info::Server for User {
|
|
|
|
fn list_roles(
|
|
|
|
&mut self,
|
|
|
|
_: info::ListRolesParams,
|
2022-03-21 00:01:50 +01:00
|
|
|
mut result: info::ListRolesResults,
|
|
|
|
) -> Promise<(), ::capnp::Error> {
|
2022-04-27 20:19:04 +02:00
|
|
|
if let Some(user) = self.session.users.get_user(self.user.get_username()) {
|
|
|
|
let mut builder = result.get().init_roles(user.userdata.roles.len() as u32);
|
|
|
|
for (i, role) in user.userdata.roles.into_iter().enumerate() {
|
|
|
|
let mut b = builder.reborrow().get(i as u32);
|
|
|
|
b.set_name(role.as_str());
|
|
|
|
}
|
2022-03-21 00:01:50 +01:00
|
|
|
}
|
|
|
|
Promise::ok(())
|
2022-03-16 20:17:59 +01:00
|
|
|
}
|
|
|
|
}
|
2022-03-11 22:13:54 +01:00
|
|
|
|
2022-03-16 20:17:59 +01:00
|
|
|
impl manage::Server for User {
|
|
|
|
fn pwd(
|
|
|
|
&mut self,
|
2022-07-11 12:27:51 +02:00
|
|
|
params: manage::PwdParams,
|
2022-04-26 23:21:43 +02:00
|
|
|
_results: manage::PwdResults,
|
2022-03-21 00:01:50 +01:00
|
|
|
) -> Promise<(), ::capnp::Error> {
|
2022-07-11 12:27:51 +02:00
|
|
|
let params = pry!(params.get());
|
|
|
|
let old_pw = pry!(params.get_old_pwd());
|
|
|
|
let new_pw = pry!(params.get_new_pwd());
|
|
|
|
|
|
|
|
let uid = self.user.get_username();
|
|
|
|
if let Some(mut user) = self.session.users.get_user(uid) {
|
|
|
|
if let Ok(true) = user.check_password(old_pw.as_bytes()) {
|
|
|
|
user.set_pw(new_pw.as_bytes());
|
|
|
|
self.session.users.put_user(uid, &user);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Promise::ok(())
|
2022-03-16 20:17:59 +01:00
|
|
|
}
|
2022-03-11 22:13:54 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
impl admin::Server for User {
|
2022-03-16 20:17:59 +01:00
|
|
|
fn get_user_info_extended(
|
|
|
|
&mut self,
|
|
|
|
_: admin::GetUserInfoExtendedParams,
|
|
|
|
_: admin::GetUserInfoExtendedResults,
|
2022-03-21 00:01:50 +01:00
|
|
|
) -> Promise<(), ::capnp::Error> {
|
|
|
|
Promise::err(::capnp::Error::unimplemented(
|
2022-03-16 20:17:59 +01:00
|
|
|
"method not implemented".to_string(),
|
|
|
|
))
|
|
|
|
}
|
|
|
|
fn add_role(
|
|
|
|
&mut self,
|
2022-03-21 00:01:50 +01:00
|
|
|
param: admin::AddRoleParams,
|
2022-03-16 20:17:59 +01:00
|
|
|
_: admin::AddRoleResults,
|
2022-03-21 00:01:50 +01:00
|
|
|
) -> Promise<(), ::capnp::Error> {
|
|
|
|
let rolename = pry!(pry!(pry!(param.get()).get_role()).get_name());
|
|
|
|
|
|
|
|
if let Some(_role) = self.session.roles.get(rolename) {
|
2022-05-05 15:50:44 +02:00
|
|
|
let mut target = self
|
|
|
|
.session
|
|
|
|
.users
|
|
|
|
.get_user(self.user.get_username())
|
|
|
|
.unwrap();
|
2022-03-21 00:01:50 +01:00
|
|
|
|
|
|
|
// Only update if needed
|
|
|
|
if !target.userdata.roles.iter().any(|r| r.as_str() == rolename) {
|
|
|
|
target.userdata.roles.push(rolename.to_string());
|
2022-05-05 15:50:44 +02:00
|
|
|
self.session
|
|
|
|
.users
|
|
|
|
.put_user(self.user.get_username(), &target);
|
2022-03-21 00:01:50 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Promise::ok(())
|
2022-03-16 20:17:59 +01:00
|
|
|
}
|
|
|
|
fn remove_role(
|
|
|
|
&mut self,
|
2022-03-21 00:01:50 +01:00
|
|
|
param: admin::RemoveRoleParams,
|
2022-03-16 20:17:59 +01:00
|
|
|
_: admin::RemoveRoleResults,
|
2022-03-21 00:01:50 +01:00
|
|
|
) -> Promise<(), ::capnp::Error> {
|
|
|
|
let rolename = pry!(pry!(pry!(param.get()).get_role()).get_name());
|
|
|
|
|
|
|
|
if let Some(_role) = self.session.roles.get(rolename) {
|
2022-05-05 15:50:44 +02:00
|
|
|
let mut target = self
|
|
|
|
.session
|
|
|
|
.users
|
|
|
|
.get_user(self.user.get_username())
|
|
|
|
.unwrap();
|
2022-03-21 00:01:50 +01:00
|
|
|
|
|
|
|
// Only update if needed
|
|
|
|
if target.userdata.roles.iter().any(|r| r.as_str() == rolename) {
|
|
|
|
target.userdata.roles.retain(|r| r.as_str() != rolename);
|
2022-05-05 15:50:44 +02:00
|
|
|
self.session
|
|
|
|
.users
|
|
|
|
.put_user(self.user.get_username(), &target);
|
2022-03-21 00:01:50 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Promise::ok(())
|
2022-03-16 20:17:59 +01:00
|
|
|
}
|
2022-07-11 12:27:51 +02:00
|
|
|
fn pwd(
|
|
|
|
&mut self,
|
|
|
|
param: admin::PwdParams,
|
|
|
|
_: admin::PwdResults,
|
|
|
|
) -> Promise<(), ::capnp::Error> {
|
|
|
|
let new_pw = pry!(pry!(param.get()).get_new_pwd());
|
|
|
|
let uid = self.user.get_username();
|
|
|
|
if let Some(mut user) = self.session.users.get_user(uid) {
|
|
|
|
user.set_pw(new_pw.as_bytes());
|
|
|
|
self.session.users.put_user(uid, &user);
|
|
|
|
}
|
|
|
|
Promise::ok(())
|
2022-03-16 20:17:59 +01:00
|
|
|
}
|
|
|
|
}
|
2023-01-06 12:45:43 +01:00
|
|
|
|
|
|
|
impl card_d_e_s_fire_e_v2::Server for User {
|
|
|
|
fn get_token_list(
|
|
|
|
&mut self,
|
|
|
|
_: GetTokenListParams,
|
|
|
|
mut results: GetTokenListResults,
|
|
|
|
) -> Promise<(), Error> {
|
|
|
|
let _guard = self.span.enter();
|
|
|
|
let _span = tracing::trace_span!(target: TARGET, "get_token_list").entered();
|
|
|
|
tracing::trace!("method call");
|
|
|
|
|
|
|
|
// TODO: This only supports a sigle key per user
|
|
|
|
let user = pry!(self
|
|
|
|
.session
|
|
|
|
.users
|
|
|
|
.get_user(self.user.get_username())
|
|
|
|
.ok_or_else(|| Error::failed(format!(
|
|
|
|
"User API object with nonexisting user \"{}\"",
|
|
|
|
self.user.get_username()
|
|
|
|
))));
|
|
|
|
let ck = user
|
|
|
|
.userdata
|
|
|
|
.kv
|
|
|
|
.get("cardkey")
|
|
|
|
.map(|ck| hex::decode(ck).ok())
|
|
|
|
.flatten()
|
|
|
|
.unwrap_or_else(|| {
|
|
|
|
tracing::debug!(user.id = &user.id, "no DESFire keys stored");
|
|
|
|
Vec::new()
|
|
|
|
});
|
|
|
|
if !ck.is_empty() {
|
|
|
|
let mut b = results.get();
|
|
|
|
let mut lb = b.init_token_list(1);
|
|
|
|
lb.set(0, &ck[..]);
|
|
|
|
}
|
|
|
|
Promise::ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
fn bind(&mut self, params: BindParams, _: BindResults) -> Promise<(), Error> {
|
|
|
|
let _guard = self.span.enter();
|
|
|
|
let _span = tracing::trace_span!(target: TARGET, "get_token_list").entered();
|
|
|
|
let params = pry!(params.get());
|
|
|
|
let card_key = pry!(params.get_auth_key());
|
|
|
|
let token = pry!(params.get_token());
|
|
|
|
|
|
|
|
let token: Cow<'_, str> = if let Ok(url) = std::str::from_utf8(token) {
|
|
|
|
Cow::Borrowed(url)
|
|
|
|
} else {
|
|
|
|
Cow::Owned(hex::encode(token))
|
|
|
|
};
|
|
|
|
|
|
|
|
tracing::trace!(
|
|
|
|
params.token = token.as_ref(),
|
|
|
|
params.auth_key = "<censored>",
|
|
|
|
"method call"
|
|
|
|
);
|
|
|
|
|
|
|
|
let card_key = hex::encode(card_key);
|
|
|
|
|
|
|
|
let mut user = pry!(self
|
|
|
|
.session
|
|
|
|
.users
|
|
|
|
.get_user(self.user.get_username())
|
|
|
|
.ok_or_else(|| Error::failed(format!(
|
|
|
|
"User API object with nonexisting user \"{}\"",
|
|
|
|
self.user.get_username()
|
|
|
|
))));
|
|
|
|
|
|
|
|
let prev_token = user.userdata.kv.get("cardtoken");
|
|
|
|
let prev_cardk = user.userdata.kv.get("cardkey");
|
|
|
|
|
|
|
|
match (prev_token, prev_cardk) {
|
|
|
|
(Some(prev_token), Some(prev_cardk))
|
|
|
|
if prev_token.as_str() == &token && prev_cardk.as_str() == card_key.as_str() =>
|
|
|
|
{
|
|
|
|
tracing::info!(
|
|
|
|
user.id, token = token.as_ref(),
|
|
|
|
"new token and card key are identical, skipping no-op"
|
|
|
|
);
|
|
|
|
return Promise::ok(());
|
|
|
|
},
|
|
|
|
(Some(prev_token), Some(_))
|
|
|
|
if prev_token.as_str() == token /* above guard means prev_cardk != card_key */ =>
|
|
|
|
{
|
|
|
|
tracing::warn!(
|
|
|
|
token = token.as_ref(),
|
|
|
|
"trying to overwrite card key for existing token, ignoring!"
|
|
|
|
);
|
|
|
|
return Promise::ok(());
|
|
|
|
},
|
|
|
|
(Some(prev_token), None) => tracing::warn!(
|
|
|
|
user.id, prev_token,
|
|
|
|
"token already set for user but no card key, setting new pair unconditionally!"
|
|
|
|
),
|
|
|
|
(None, Some(_)) => tracing::warn!(
|
|
|
|
user.id,
|
|
|
|
"card key already set for user but no token, setting new pair unconditionally!"
|
|
|
|
),
|
|
|
|
(Some(_), Some(_)) | (None, None) => tracing::debug!(
|
|
|
|
user.id, token = token.as_ref(),
|
|
|
|
"Adding new card key/token pair"
|
|
|
|
),
|
|
|
|
}
|
|
|
|
|
|
|
|
user.userdata
|
|
|
|
.kv
|
|
|
|
.insert("cardtoken".to_string(), token.to_string());
|
|
|
|
user.userdata.kv.insert("cardkey".to_string(), card_key);
|
|
|
|
Promise::ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
fn unbind(&mut self, params: UnbindParams, _: UnbindResults) -> Promise<(), Error> {
|
|
|
|
let _guard = self.span.enter();
|
|
|
|
let _span = tracing::trace_span!(target: TARGET, "get_token_list").entered();
|
|
|
|
|
|
|
|
let params = pry!(params.get());
|
|
|
|
let token = pry!(params.get_token());
|
|
|
|
|
|
|
|
let token: Cow<'_, str> = if let Ok(url) = std::str::from_utf8(token) {
|
|
|
|
Cow::Borrowed(url)
|
|
|
|
} else {
|
|
|
|
Cow::Owned(hex::encode(token))
|
|
|
|
};
|
|
|
|
|
|
|
|
tracing::trace!(params.token = token.as_ref(), "method call");
|
|
|
|
|
|
|
|
let mut user = pry!(self
|
|
|
|
.session
|
|
|
|
.users
|
|
|
|
.get_user(self.user.get_username())
|
|
|
|
.ok_or_else(|| Error::failed(format!(
|
|
|
|
"User API object with nonexisting user \"{}\"",
|
|
|
|
self.user.get_username()
|
|
|
|
))));
|
|
|
|
if let Some(prev_token) = user.userdata.kv.get("cardtoken") {
|
|
|
|
if token.as_ref() == prev_token.as_str() {
|
|
|
|
user.userdata.kv.remove("cardtoken");
|
|
|
|
user.userdata.kv.remove("cardkey");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Promise::ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
fn gen_card_token(
|
|
|
|
&mut self,
|
|
|
|
_: GenCardTokenParams,
|
2023-01-09 16:58:32 +01:00
|
|
|
mut results: GenCardTokenResults,
|
2023-01-06 12:45:43 +01:00
|
|
|
) -> Promise<(), Error> {
|
|
|
|
let _guard = self.span.enter();
|
2023-01-09 16:58:32 +01:00
|
|
|
let _span = tracing::trace_span!(target: TARGET, "get_card_token").entered();
|
2023-01-06 12:45:43 +01:00
|
|
|
tracing::trace!("method call");
|
2023-01-09 16:58:32 +01:00
|
|
|
|
|
|
|
results.get().set_token(Uuid::new_v4().as_bytes());
|
|
|
|
|
|
|
|
Promise::ok(())
|
2023-01-06 12:45:43 +01:00
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:48 +01:00
|
|
|
fn get_meta_info(
|
|
|
|
&mut self,
|
|
|
|
_: GetMetaInfoParams,
|
|
|
|
mut results: GetMetaInfoResults,
|
|
|
|
) -> Promise<(), Error> {
|
2023-01-06 12:45:43 +01:00
|
|
|
let _guard = self.span.enter();
|
2023-01-09 16:58:32 +01:00
|
|
|
let _span = tracing::trace_span!(target: TARGET, "get_meta_info").entered();
|
2023-01-06 12:45:43 +01:00
|
|
|
tracing::trace!("method call");
|
2023-01-09 16:58:32 +01:00
|
|
|
|
|
|
|
results.get().set_bytes(b"FABACCESS\x00DESFIRE\x001.0\x00");
|
|
|
|
|
|
|
|
Promise::ok(())
|
2023-01-06 12:45:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
fn get_space_info(
|
|
|
|
&mut self,
|
|
|
|
_: GetSpaceInfoParams,
|
2023-01-11 14:50:48 +01:00
|
|
|
mut results: GetSpaceInfoResults,
|
2023-01-06 12:45:43 +01:00
|
|
|
) -> Promise<(), Error> {
|
|
|
|
let _guard = self.span.enter();
|
2023-01-09 16:58:32 +01:00
|
|
|
let _span = tracing::trace_span!(target: TARGET, "get_space_info").entered();
|
2023-01-06 12:45:43 +01:00
|
|
|
tracing::trace!("method call");
|
2023-01-09 16:58:32 +01:00
|
|
|
|
|
|
|
let space = if let Some(space) = CONFIG.get().and_then(|c| c.spacename.as_ref()) {
|
|
|
|
space
|
|
|
|
} else {
|
|
|
|
return Promise::err(Error::failed("No space name configured".to_string()));
|
|
|
|
};
|
|
|
|
|
|
|
|
let url = if let Some(url) = CONFIG.get().and_then(|c| c.instanceurl.as_ref()) {
|
|
|
|
url
|
|
|
|
} else {
|
|
|
|
return Promise::err(Error::failed("No instance url configured".to_string()));
|
|
|
|
};
|
|
|
|
|
|
|
|
let mut data = Vec::new();
|
|
|
|
write!(&mut data, "urn:fabaccess:lab:{space}\x00{url}").unwrap();
|
|
|
|
results.get().set_bytes(&data);
|
|
|
|
|
|
|
|
Promise::ok(())
|
2023-01-06 12:45:43 +01:00
|
|
|
}
|
|
|
|
}
|