2021-11-26 22:11:24 +01:00
|
|
|
use api::utils::l10n_string;
|
2021-12-15 23:42:16 +01:00
|
|
|
use crate::error;
|
2021-11-26 22:11:24 +01:00
|
|
|
|
|
|
|
use std::ops::Deref;
|
|
|
|
use capnp::capability::Promise;
|
|
|
|
use capnp::Error;
|
|
|
|
use capnp_rpc::pry;
|
|
|
|
|
2021-12-15 23:42:16 +01:00
|
|
|
use rsasl::{rsasl_err_to_str, SASL, Session as SaslSession, Property, ReturnCode, RSASL, DiscardOnDrop, Mechanisms};
|
2021-11-26 22:11:24 +01:00
|
|
|
use rsasl::session::Step::{Done, NeedsMore};
|
|
|
|
|
|
|
|
use api::auth::authentication::{
|
|
|
|
Server,
|
|
|
|
AbortParams,
|
|
|
|
AbortResults,
|
|
|
|
StepParams,
|
|
|
|
StepResults,
|
|
|
|
};
|
|
|
|
use api::auth::response::{
|
|
|
|
Reason,
|
|
|
|
Action,
|
|
|
|
};
|
2021-12-06 21:53:42 +01:00
|
|
|
use crate::users::{UserDB, PassDB};
|
2021-11-26 22:11:24 +01:00
|
|
|
|
2021-12-15 23:42:16 +01:00
|
|
|
#[derive(Debug)]
|
|
|
|
pub struct AuthenticationProvider {
|
|
|
|
sasl: RSASL<AppData, SessionData>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl AuthenticationProvider {
|
|
|
|
pub fn new() -> error::Result<Self> {
|
|
|
|
let sasl = SASL::new()?;
|
|
|
|
Ok(Self { sasl })
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn mechanisms(&self) -> error::Result<Mechanisms> {
|
|
|
|
Ok(self.sasl.server_mech_list()?)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn try_start_session(&mut self, mechanism: &str) -> error::Result<Authentication> {
|
|
|
|
let session = self.sasl.server_start(mechanism)?;
|
|
|
|
Ok(Authentication {
|
|
|
|
state: State::Running(session),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn bad_mechanism(&self) -> Authentication {
|
|
|
|
Authentication {
|
|
|
|
state: State::InvalidMechanism,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn start_session(&mut self, mechanism: &str) -> Authentication {
|
|
|
|
self.try_start_session(mechanism)
|
|
|
|
.unwrap_or_else(|_| self.bad_mechanism())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Debug)]
|
2021-12-06 21:53:42 +01:00
|
|
|
struct Callback;
|
|
|
|
|
2021-12-15 23:42:16 +01:00
|
|
|
#[derive(Debug)]
|
2021-12-06 21:53:42 +01:00
|
|
|
struct AppData {
|
|
|
|
userdb: UserDB,
|
|
|
|
passdb: PassDB,
|
|
|
|
}
|
|
|
|
|
2021-12-15 23:42:16 +01:00
|
|
|
#[derive(Debug)]
|
2021-12-06 21:53:42 +01:00
|
|
|
struct SessionData;
|
|
|
|
|
|
|
|
impl rsasl::Callback<AppData, SessionData> for Callback {
|
|
|
|
fn callback(sasl: &mut SASL<AppData, SessionData>,
|
|
|
|
session: &mut SaslSession<SessionData>,
|
|
|
|
prop: Property
|
|
|
|
) -> Result<(), ReturnCode>
|
|
|
|
{
|
|
|
|
match prop {
|
|
|
|
Property::GSASL_VALIDATE_SIMPLE => {
|
|
|
|
// Access the authentication id, i.e. the username to check the password for
|
|
|
|
let authcid = session
|
|
|
|
.get_property(Property::GSASL_AUTHID)
|
|
|
|
.ok_or(rsasl::GSASL_NO_AUTHID)
|
|
|
|
.map_err(|_| rsasl::GSASL_NO_AUTHID)
|
|
|
|
.and_then(|cstr| cstr.to_str()
|
|
|
|
.map_err(|_| rsasl::GSASL_NO_AUTHID))?;
|
|
|
|
|
|
|
|
// Access the password itself
|
|
|
|
let password = session
|
|
|
|
.get_property(Property::GSASL_PASSWORD)
|
|
|
|
.ok_or(rsasl::GSASL_NO_PASSWORD)
|
|
|
|
.and_then(|cstr| cstr.to_str()
|
|
|
|
.map_err(|_| rsasl::GSASL_NO_AUTHID))?;
|
|
|
|
|
|
|
|
let AppData { userdb: _, passdb } = sasl.retrieve_mut()
|
|
|
|
.ok_or(rsasl::GSASL_NO_CALLBACK)?;
|
|
|
|
|
|
|
|
if let Ok(Some(Ok(true))) = passdb.verify_password(authcid, &password.as_bytes()) {
|
|
|
|
Ok(())
|
|
|
|
} else {
|
|
|
|
Err(rsasl::GSASL_AUTHENTICATION_ERROR)
|
|
|
|
}
|
|
|
|
},
|
|
|
|
_ => Err(rsasl::GSASL_NO_CALLBACK),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-11-26 22:11:24 +01:00
|
|
|
|
2021-12-15 23:42:16 +01:00
|
|
|
#[derive(Debug)]
|
2021-11-26 22:11:24 +01:00
|
|
|
pub struct Authentication {
|
2021-12-06 21:53:42 +01:00
|
|
|
state: State<SessionData>,
|
2021-11-26 22:11:24 +01:00
|
|
|
}
|
|
|
|
|
2021-12-15 23:42:16 +01:00
|
|
|
#[derive(Debug)]
|
2021-12-06 21:53:42 +01:00
|
|
|
enum State<E> {
|
2021-11-26 22:11:24 +01:00
|
|
|
InvalidMechanism,
|
|
|
|
Finished,
|
|
|
|
Aborted,
|
2021-12-15 23:42:16 +01:00
|
|
|
Running(DiscardOnDrop<SaslSession<E>>)
|
2021-11-26 22:11:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
impl Server for Authentication {
|
|
|
|
fn step(&mut self, params: StepParams, mut results: StepResults) -> Promise<(), Error> {
|
|
|
|
use State::*;
|
2021-12-15 23:42:16 +01:00
|
|
|
let new = match self.state {
|
2021-11-26 22:11:24 +01:00
|
|
|
InvalidMechanism => {
|
2021-12-06 21:53:42 +01:00
|
|
|
let builder = results.get();
|
2021-11-26 22:11:24 +01:00
|
|
|
let mut b = builder.init_error();
|
|
|
|
b.set_reason(Reason::BadMechanism);
|
|
|
|
b.set_action(Action::Permanent);
|
2021-12-15 23:42:16 +01:00
|
|
|
None
|
2021-11-26 22:11:24 +01:00
|
|
|
},
|
|
|
|
Finished => {
|
2021-12-06 21:53:42 +01:00
|
|
|
let builder = results.get();
|
2021-11-26 22:11:24 +01:00
|
|
|
let mut b = builder.init_error();
|
|
|
|
b.set_reason(Reason::Finished);
|
|
|
|
b.set_action(Action::Permanent);
|
2021-12-15 23:42:16 +01:00
|
|
|
None
|
2021-11-26 22:11:24 +01:00
|
|
|
},
|
|
|
|
Aborted => {
|
2021-12-06 21:53:42 +01:00
|
|
|
let builder = results.get();
|
2021-11-26 22:11:24 +01:00
|
|
|
let mut b = builder.init_error();
|
|
|
|
b.set_reason(Reason::Aborted);
|
|
|
|
b.set_action(Action::Permanent);
|
2021-12-15 23:42:16 +01:00
|
|
|
None
|
2021-11-26 22:11:24 +01:00
|
|
|
},
|
|
|
|
Running(ref mut session) => {
|
|
|
|
// TODO: If null what happens?
|
|
|
|
let data: &[u8] = pry!(pry!(params.get()).get_data());
|
|
|
|
|
|
|
|
let mut builder = results.get();
|
|
|
|
match session.step(data) {
|
2021-12-06 21:53:42 +01:00
|
|
|
Ok(Done(data)) => {
|
2021-11-26 22:11:24 +01:00
|
|
|
let mut b = builder.init_successful();
|
2021-12-06 21:53:42 +01:00
|
|
|
if !data.is_empty() {
|
|
|
|
b.reborrow().set_additional_data(data.deref())
|
|
|
|
}
|
|
|
|
let mut session_builder = b.init_session();
|
|
|
|
let session = super::session::Session::new();
|
|
|
|
session.build(&mut session_builder);
|
2021-12-15 23:42:16 +01:00
|
|
|
Some(State::Finished)
|
2021-11-26 22:11:24 +01:00
|
|
|
},
|
2021-12-06 21:53:42 +01:00
|
|
|
Ok(NeedsMore(data)) => {
|
|
|
|
builder.set_challenge(data.deref());
|
2021-12-15 23:42:16 +01:00
|
|
|
None
|
2021-11-26 22:11:24 +01:00
|
|
|
},
|
2021-12-06 21:53:42 +01:00
|
|
|
Err(_) => {
|
2021-11-26 22:11:24 +01:00
|
|
|
let mut b = builder.init_error();
|
|
|
|
b.set_reason(Reason::Aborted);
|
|
|
|
b.set_action(Action::Permanent);
|
2021-12-15 23:42:16 +01:00
|
|
|
Some(State::Aborted)
|
2021-11-26 22:11:24 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-12-15 23:42:16 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
if let Some(new) = new {
|
|
|
|
std::mem::replace(&mut self.state, new);
|
2021-11-26 22:11:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
Promise::ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
fn abort(&mut self, _: AbortParams, _: AbortResults) -> Promise<(), Error> {
|
2021-12-15 23:42:16 +01:00
|
|
|
std::mem::replace(&mut self.state, State::Aborted);
|
2021-11-26 22:11:24 +01:00
|
|
|
Promise::ok(())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[repr(transparent)]
|
|
|
|
struct SaslE {
|
2021-12-06 21:53:42 +01:00
|
|
|
e: ReturnCode,
|
2021-11-26 22:11:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
impl l10n_string::Server for SaslE {
|
|
|
|
fn get(&mut self,
|
|
|
|
params: l10n_string::GetParams,
|
|
|
|
mut results: l10n_string::GetResults
|
|
|
|
) -> Promise<(), Error>
|
|
|
|
{
|
|
|
|
let lang = pry!(pry!(params.get()).get_lang());
|
|
|
|
if lang == "en" {
|
|
|
|
let mut builder = results.get();
|
|
|
|
builder.set_lang("en");
|
2021-12-06 21:53:42 +01:00
|
|
|
builder.set_content(rsasl_err_to_str(self.e)
|
|
|
|
.unwrap_or("Unknown gsasl error"));
|
2021-11-26 22:11:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
Promise::ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
fn available(
|
|
|
|
&mut self,
|
|
|
|
_: l10n_string::AvailableParams,
|
|
|
|
mut results: l10n_string::AvailableResults
|
|
|
|
) -> Promise<(), Error> {
|
2021-12-06 21:53:42 +01:00
|
|
|
let builder = results.get();
|
2021-11-26 22:11:24 +01:00
|
|
|
let mut langs = builder.init_langs(1);
|
|
|
|
langs.set(0, "en");
|
|
|
|
Promise::ok(())
|
|
|
|
}
|
|
|
|
}
|