2022-10-19 20:27:14 +00:00
|
|
|
use crate::{
|
2023-03-17 20:56:12 +00:00
|
|
|
db::{self, AccessTokenId, Database, UserId},
|
2022-10-19 20:27:14 +00:00
|
|
|
AppState, Error, Result,
|
|
|
|
};
|
2022-05-19 17:09:44 +00:00
|
|
|
use anyhow::{anyhow, Context};
|
2022-04-26 02:05:09 +00:00
|
|
|
use axum::{
|
|
|
|
http::{self, Request, StatusCode},
|
|
|
|
middleware::Next,
|
|
|
|
response::IntoResponse,
|
|
|
|
};
|
2023-03-17 21:32:13 +00:00
|
|
|
use lazy_static::lazy_static;
|
|
|
|
use prometheus::{exponential_buckets, register_histogram, Histogram};
|
2022-04-25 23:51:13 +00:00
|
|
|
use rand::thread_rng;
|
|
|
|
use scrypt::{
|
|
|
|
password_hash::{PasswordHash, PasswordHasher, PasswordVerifier, SaltString},
|
|
|
|
Scrypt,
|
|
|
|
};
|
2023-03-17 18:13:50 +00:00
|
|
|
use serde::{Deserialize, Serialize};
|
2023-03-17 21:32:13 +00:00
|
|
|
use std::{sync::Arc, time::Instant};
|
|
|
|
|
|
|
|
lazy_static! {
|
|
|
|
static ref METRIC_ACCESS_TOKEN_HASHING_TIME: Histogram = register_histogram!(
|
|
|
|
"access_token_hashing_time",
|
|
|
|
"time spent hashing access tokens",
|
|
|
|
exponential_buckets(10.0, 2.0, 10).unwrap(),
|
|
|
|
)
|
|
|
|
.unwrap();
|
|
|
|
}
|
2021-07-12 20:14:39 +00:00
|
|
|
|
2024-01-17 18:38:12 +00:00
|
|
|
/// Validates the authorization header. This has two mechanisms, one for the ADMIN_TOKEN
|
|
|
|
/// and one for the access tokens that we issue.
|
2022-04-26 17:15:41 +00:00
|
|
|
pub async fn validate_header<B>(mut req: Request<B>, next: Next<B>) -> impl IntoResponse {
|
2022-04-26 02:05:09 +00:00
|
|
|
let mut auth_header = req
|
|
|
|
.headers()
|
|
|
|
.get(http::header::AUTHORIZATION)
|
|
|
|
.and_then(|header| header.to_str().ok())
|
|
|
|
.ok_or_else(|| {
|
|
|
|
Error::Http(
|
2022-10-19 20:27:14 +00:00
|
|
|
StatusCode::UNAUTHORIZED,
|
2022-04-26 02:05:09 +00:00
|
|
|
"missing authorization header".to_string(),
|
|
|
|
)
|
|
|
|
})?
|
|
|
|
.split_whitespace();
|
|
|
|
|
|
|
|
let user_id = UserId(auth_header.next().unwrap_or("").parse().map_err(|_| {
|
|
|
|
Error::Http(
|
|
|
|
StatusCode::BAD_REQUEST,
|
|
|
|
"missing user id in authorization header".to_string(),
|
|
|
|
)
|
|
|
|
})?);
|
2021-07-12 20:14:39 +00:00
|
|
|
|
2022-04-26 02:05:09 +00:00
|
|
|
let access_token = auth_header.next().ok_or_else(|| {
|
|
|
|
Error::Http(
|
|
|
|
StatusCode::BAD_REQUEST,
|
|
|
|
"missing access token in authorization header".to_string(),
|
|
|
|
)
|
|
|
|
})?;
|
2021-07-12 20:14:39 +00:00
|
|
|
|
2022-10-19 00:36:54 +00:00
|
|
|
let state = req.extensions().get::<Arc<AppState>>().unwrap();
|
2023-03-17 18:13:50 +00:00
|
|
|
let credentials_valid = if let Some(admin_token) = access_token.strip_prefix("ADMIN_TOKEN:") {
|
|
|
|
state.config.api_token == admin_token
|
2022-10-19 00:36:54 +00:00
|
|
|
} else {
|
2023-03-17 20:56:12 +00:00
|
|
|
verify_access_token(&access_token, user_id, &state.db)
|
|
|
|
.await
|
|
|
|
.unwrap_or(false)
|
2023-03-17 18:13:50 +00:00
|
|
|
};
|
2021-09-23 22:32:23 +00:00
|
|
|
|
2022-04-26 17:15:41 +00:00
|
|
|
if credentials_valid {
|
2022-05-12 18:06:06 +00:00
|
|
|
let user = state
|
|
|
|
.db
|
|
|
|
.get_user_by_id(user_id)
|
|
|
|
.await?
|
|
|
|
.ok_or_else(|| anyhow!("user {} not found", user_id))?;
|
|
|
|
req.extensions_mut().insert(user);
|
2022-04-26 17:15:41 +00:00
|
|
|
Ok::<_, Error>(next.run(req).await)
|
|
|
|
} else {
|
2022-04-26 02:05:09 +00:00
|
|
|
Err(Error::Http(
|
|
|
|
StatusCode::UNAUTHORIZED,
|
|
|
|
"invalid credentials".to_string(),
|
2022-04-26 17:15:41 +00:00
|
|
|
))
|
2022-04-26 02:05:09 +00:00
|
|
|
}
|
|
|
|
}
|
2021-07-12 20:14:39 +00:00
|
|
|
|
2022-04-25 23:51:13 +00:00
|
|
|
const MAX_ACCESS_TOKENS_TO_STORE: usize = 8;
|
2021-09-23 20:34:53 +00:00
|
|
|
|
2023-03-17 18:13:50 +00:00
|
|
|
#[derive(Serialize, Deserialize)]
|
|
|
|
struct AccessTokenJson {
|
|
|
|
version: usize,
|
|
|
|
id: AccessTokenId,
|
|
|
|
token: String,
|
|
|
|
}
|
|
|
|
|
2024-01-17 18:38:12 +00:00
|
|
|
/// Creates a new access token to identify the given user. before returning it, you should
|
|
|
|
/// encrypt it with the user's public key.
|
2022-12-01 13:40:37 +00:00
|
|
|
pub async fn create_access_token(db: &db::Database, user_id: UserId) -> Result<String> {
|
2023-03-17 18:13:50 +00:00
|
|
|
const VERSION: usize = 1;
|
2022-04-25 23:51:13 +00:00
|
|
|
let access_token = rpc::auth::random_token();
|
|
|
|
let access_token_hash =
|
|
|
|
hash_access_token(&access_token).context("failed to hash access token")?;
|
2023-03-17 18:13:50 +00:00
|
|
|
let id = db
|
|
|
|
.create_access_token(user_id, &access_token_hash, MAX_ACCESS_TOKENS_TO_STORE)
|
2022-04-25 23:51:13 +00:00
|
|
|
.await?;
|
2023-03-17 18:13:50 +00:00
|
|
|
Ok(serde_json::to_string(&AccessTokenJson {
|
|
|
|
version: VERSION,
|
|
|
|
id,
|
|
|
|
token: access_token,
|
|
|
|
})?)
|
2022-04-25 23:51:13 +00:00
|
|
|
}
|
2021-07-12 20:14:39 +00:00
|
|
|
|
2022-04-25 23:51:13 +00:00
|
|
|
fn hash_access_token(token: &str) -> Result<String> {
|
|
|
|
// Avoid slow hashing in debug mode.
|
|
|
|
let params = if cfg!(debug_assertions) {
|
|
|
|
scrypt::Params::new(1, 1, 1).unwrap()
|
|
|
|
} else {
|
2023-03-17 21:31:39 +00:00
|
|
|
scrypt::Params::new(14, 8, 1).unwrap()
|
2022-04-25 23:51:13 +00:00
|
|
|
};
|
2021-07-12 20:14:39 +00:00
|
|
|
|
2022-04-25 23:51:13 +00:00
|
|
|
Ok(Scrypt
|
|
|
|
.hash_password(
|
|
|
|
token.as_bytes(),
|
|
|
|
None,
|
|
|
|
params,
|
|
|
|
&SaltString::generate(thread_rng()),
|
2022-05-19 17:55:55 +00:00
|
|
|
)
|
|
|
|
.map_err(anyhow::Error::new)?
|
2022-04-25 23:51:13 +00:00
|
|
|
.to_string())
|
|
|
|
}
|
2021-07-12 20:14:39 +00:00
|
|
|
|
2024-01-17 18:38:12 +00:00
|
|
|
/// Encrypts the given access token with the given public key to avoid leaking it on the way
|
|
|
|
/// to the client.
|
2022-04-25 23:51:13 +00:00
|
|
|
pub fn encrypt_access_token(access_token: &str, public_key: String) -> Result<String> {
|
|
|
|
let native_app_public_key =
|
|
|
|
rpc::auth::PublicKey::try_from(public_key).context("failed to parse app public key")?;
|
|
|
|
let encrypted_access_token = native_app_public_key
|
2022-08-10 21:39:24 +00:00
|
|
|
.encrypt_string(access_token)
|
2022-04-25 23:51:13 +00:00
|
|
|
.context("failed to encrypt access token with public key")?;
|
|
|
|
Ok(encrypted_access_token)
|
|
|
|
}
|
2021-12-22 15:19:19 +00:00
|
|
|
|
2024-01-17 18:38:12 +00:00
|
|
|
/// verify access token returns true if the given token is valid for the given user.
|
2023-03-17 20:56:12 +00:00
|
|
|
pub async fn verify_access_token(token: &str, user_id: UserId, db: &Arc<Database>) -> Result<bool> {
|
|
|
|
let token: AccessTokenJson = serde_json::from_str(&token)?;
|
|
|
|
|
|
|
|
let db_token = db.get_access_token(token.id).await?;
|
|
|
|
if db_token.user_id != user_id {
|
|
|
|
return Err(anyhow!("no such access token"))?;
|
|
|
|
}
|
|
|
|
|
|
|
|
let db_hash = PasswordHash::new(&db_token.hash).map_err(anyhow::Error::new)?;
|
2023-03-17 21:32:13 +00:00
|
|
|
let t0 = Instant::now();
|
|
|
|
let is_valid = Scrypt
|
2023-03-17 20:56:12 +00:00
|
|
|
.verify_password(token.token.as_bytes(), &db_hash)
|
2023-03-17 21:32:13 +00:00
|
|
|
.is_ok();
|
|
|
|
let duration = t0.elapsed();
|
|
|
|
log::info!("hashed access token in {:?}", duration);
|
|
|
|
METRIC_ACCESS_TOKEN_HASHING_TIME.observe(duration.as_millis() as f64);
|
|
|
|
Ok(is_valid)
|
2022-04-25 23:51:13 +00:00
|
|
|
}
|