mirror of
https://github.com/zed-industries/zed.git
synced 2025-01-28 13:18:04 +00:00
8e9c2b1125
This PR introduces a separate backend service for making LLM calls. It exposes an HTTP interface that can be called by Zed clients. To call these endpoints, the client must provide a `Bearer` token. These tokens are issued/refreshed by the collab service over RPC. We're adding this in a backwards-compatible way. Right now the access tokens can only be minted for Zed staff, and calling this separate LLM service is behind the `llm-service` feature flag (which is not automatically enabled for Zed staff). Release Notes: - N/A --------- Co-authored-by: Marshall <marshall@zed.dev> Co-authored-by: Marshall Bowers <elliott.codes@gmail.com>
419 lines
13 KiB
Rust
419 lines
13 KiB
Rust
use crate::{
|
|
db::{self, dev_server, AccessTokenId, Database, DevServerId, UserId},
|
|
rpc::Principal,
|
|
AppState, Error, Result,
|
|
};
|
|
use anyhow::{anyhow, Context};
|
|
use axum::{
|
|
http::{self, Request, StatusCode},
|
|
middleware::Next,
|
|
response::IntoResponse,
|
|
};
|
|
use base64::prelude::*;
|
|
use prometheus::{exponential_buckets, register_histogram, Histogram};
|
|
pub use rpc::auth::random_token;
|
|
use scrypt::{
|
|
password_hash::{PasswordHash, PasswordVerifier},
|
|
Scrypt,
|
|
};
|
|
use serde::{Deserialize, Serialize};
|
|
use sha2::Digest;
|
|
use std::sync::OnceLock;
|
|
use std::{sync::Arc, time::Instant};
|
|
use subtle::ConstantTimeEq;
|
|
|
|
/// Validates the authorization header and adds an Extension<Principal> to the request.
|
|
/// Authorization: <user-id> <token>
|
|
/// <token> can be an access_token attached to that user, or an access token of an admin
|
|
/// or (in development) the string ADMIN:<config.api_token>.
|
|
/// Authorization: "dev-server-token" <token>
|
|
pub async fn validate_header<B>(mut req: Request<B>, next: Next<B>) -> impl IntoResponse {
|
|
let mut auth_header = req
|
|
.headers()
|
|
.get(http::header::AUTHORIZATION)
|
|
.and_then(|header| header.to_str().ok())
|
|
.ok_or_else(|| {
|
|
Error::http(
|
|
StatusCode::UNAUTHORIZED,
|
|
"missing authorization header".to_string(),
|
|
)
|
|
})?
|
|
.split_whitespace();
|
|
|
|
let state = req.extensions().get::<Arc<AppState>>().unwrap();
|
|
|
|
let first = auth_header.next().unwrap_or("");
|
|
if first == "dev-server-token" {
|
|
let dev_server_token = auth_header.next().ok_or_else(|| {
|
|
Error::http(
|
|
StatusCode::BAD_REQUEST,
|
|
"missing dev-server-token token in authorization header".to_string(),
|
|
)
|
|
})?;
|
|
let dev_server = verify_dev_server_token(dev_server_token, &state.db)
|
|
.await
|
|
.map_err(|e| Error::http(StatusCode::UNAUTHORIZED, format!("{}", e)))?;
|
|
|
|
req.extensions_mut()
|
|
.insert(Principal::DevServer(dev_server));
|
|
return Ok::<_, Error>(next.run(req).await);
|
|
}
|
|
|
|
let user_id = UserId(first.parse().map_err(|_| {
|
|
Error::http(
|
|
StatusCode::BAD_REQUEST,
|
|
"missing user id in authorization header".to_string(),
|
|
)
|
|
})?);
|
|
|
|
let access_token = auth_header.next().ok_or_else(|| {
|
|
Error::http(
|
|
StatusCode::BAD_REQUEST,
|
|
"missing access token in authorization header".to_string(),
|
|
)
|
|
})?;
|
|
|
|
// In development, allow impersonation using the admin API token.
|
|
// Don't allow this in production because we can't tell who is doing
|
|
// the impersonating.
|
|
let validate_result = if let (Some(admin_token), true) = (
|
|
access_token.strip_prefix("ADMIN_TOKEN:"),
|
|
state.config.is_development(),
|
|
) {
|
|
Ok(VerifyAccessTokenResult {
|
|
is_valid: state.config.api_token == admin_token,
|
|
impersonator_id: None,
|
|
})
|
|
} else {
|
|
verify_access_token(&access_token, user_id, &state.db).await
|
|
};
|
|
|
|
if let Ok(validate_result) = validate_result {
|
|
if validate_result.is_valid {
|
|
let user = state
|
|
.db
|
|
.get_user_by_id(user_id)
|
|
.await?
|
|
.ok_or_else(|| anyhow!("user {} not found", user_id))?;
|
|
|
|
if let Some(impersonator_id) = validate_result.impersonator_id {
|
|
let admin = state
|
|
.db
|
|
.get_user_by_id(impersonator_id)
|
|
.await?
|
|
.ok_or_else(|| anyhow!("user {} not found", impersonator_id))?;
|
|
req.extensions_mut()
|
|
.insert(Principal::Impersonated { user, admin });
|
|
} else {
|
|
req.extensions_mut().insert(Principal::User(user));
|
|
};
|
|
return Ok::<_, Error>(next.run(req).await);
|
|
}
|
|
}
|
|
|
|
Err(Error::http(
|
|
StatusCode::UNAUTHORIZED,
|
|
"invalid credentials".to_string(),
|
|
))
|
|
}
|
|
|
|
const MAX_ACCESS_TOKENS_TO_STORE: usize = 8;
|
|
|
|
#[derive(Serialize, Deserialize)]
|
|
struct AccessTokenJson {
|
|
version: usize,
|
|
id: AccessTokenId,
|
|
token: String,
|
|
}
|
|
|
|
/// Creates a new access token to identify the given user. before returning it, you should
|
|
/// encrypt it with the user's public key.
|
|
pub async fn create_access_token(
|
|
db: &db::Database,
|
|
user_id: UserId,
|
|
impersonated_user_id: Option<UserId>,
|
|
) -> Result<String> {
|
|
const VERSION: usize = 1;
|
|
let access_token = rpc::auth::random_token();
|
|
let access_token_hash = hash_access_token(&access_token);
|
|
let id = db
|
|
.create_access_token(
|
|
user_id,
|
|
impersonated_user_id,
|
|
&access_token_hash,
|
|
MAX_ACCESS_TOKENS_TO_STORE,
|
|
)
|
|
.await?;
|
|
Ok(serde_json::to_string(&AccessTokenJson {
|
|
version: VERSION,
|
|
id,
|
|
token: access_token,
|
|
})?)
|
|
}
|
|
|
|
/// Hashing prevents anyone with access to the database being able to login.
|
|
/// As the token is randomly generated, we don't need to worry about scrypt-style
|
|
/// protection.
|
|
pub fn hash_access_token(token: &str) -> String {
|
|
let digest = sha2::Sha256::digest(token);
|
|
format!("$sha256${}", BASE64_URL_SAFE.encode(digest))
|
|
}
|
|
|
|
/// Encrypts the given access token with the given public key to avoid leaking it on the way
|
|
/// to the client.
|
|
pub fn encrypt_access_token(access_token: &str, public_key: String) -> Result<String> {
|
|
use rpc::auth::EncryptionFormat;
|
|
|
|
/// The encryption format to use for the access token.
|
|
///
|
|
/// Currently we're using the original encryption format to avoid
|
|
/// breaking compatibility with older clients.
|
|
///
|
|
/// Once enough clients are capable of decrypting the newer encryption
|
|
/// format we can start encrypting with `EncryptionFormat::V1`.
|
|
const ENCRYPTION_FORMAT: EncryptionFormat = EncryptionFormat::V0;
|
|
|
|
let native_app_public_key =
|
|
rpc::auth::PublicKey::try_from(public_key).context("failed to parse app public key")?;
|
|
let encrypted_access_token = native_app_public_key
|
|
.encrypt_string(access_token, ENCRYPTION_FORMAT)
|
|
.context("failed to encrypt access token with public key")?;
|
|
Ok(encrypted_access_token)
|
|
}
|
|
|
|
pub struct VerifyAccessTokenResult {
|
|
pub is_valid: bool,
|
|
pub impersonator_id: Option<UserId>,
|
|
}
|
|
|
|
/// Checks that the given access token is valid for the given user.
|
|
pub async fn verify_access_token(
|
|
token: &str,
|
|
user_id: UserId,
|
|
db: &Arc<Database>,
|
|
) -> Result<VerifyAccessTokenResult> {
|
|
static METRIC_ACCESS_TOKEN_HASHING_TIME: OnceLock<Histogram> = OnceLock::new();
|
|
let metric_access_token_hashing_time = METRIC_ACCESS_TOKEN_HASHING_TIME.get_or_init(|| {
|
|
register_histogram!(
|
|
"access_token_hashing_time",
|
|
"time spent hashing access tokens",
|
|
exponential_buckets(10.0, 2.0, 10).unwrap(),
|
|
)
|
|
.unwrap()
|
|
});
|
|
|
|
let token: AccessTokenJson = serde_json::from_str(&token)?;
|
|
|
|
let db_token = db.get_access_token(token.id).await?;
|
|
let token_user_id = db_token.impersonated_user_id.unwrap_or(db_token.user_id);
|
|
if token_user_id != user_id {
|
|
return Err(anyhow!("no such access token"))?;
|
|
}
|
|
let t0 = Instant::now();
|
|
|
|
let is_valid = if db_token.hash.starts_with("$scrypt$") {
|
|
let db_hash = PasswordHash::new(&db_token.hash).map_err(anyhow::Error::new)?;
|
|
Scrypt
|
|
.verify_password(token.token.as_bytes(), &db_hash)
|
|
.is_ok()
|
|
} else {
|
|
let token_hash = hash_access_token(&token.token);
|
|
db_token.hash.as_bytes().ct_eq(token_hash.as_ref()).into()
|
|
};
|
|
|
|
let duration = t0.elapsed();
|
|
log::info!("hashed access token in {:?}", duration);
|
|
metric_access_token_hashing_time.observe(duration.as_millis() as f64);
|
|
|
|
if is_valid && db_token.hash.starts_with("$scrypt$") {
|
|
let new_hash = hash_access_token(&token.token);
|
|
db.update_access_token_hash(db_token.id, &new_hash).await?;
|
|
}
|
|
|
|
Ok(VerifyAccessTokenResult {
|
|
is_valid,
|
|
impersonator_id: if db_token.impersonated_user_id.is_some() {
|
|
Some(db_token.user_id)
|
|
} else {
|
|
None
|
|
},
|
|
})
|
|
}
|
|
|
|
pub fn generate_dev_server_token(id: usize, access_token: String) -> String {
|
|
format!("{}.{}", id, access_token)
|
|
}
|
|
|
|
pub async fn verify_dev_server_token(
|
|
dev_server_token: &str,
|
|
db: &Arc<Database>,
|
|
) -> anyhow::Result<dev_server::Model> {
|
|
let (id, token) = split_dev_server_token(dev_server_token)?;
|
|
let token_hash = hash_access_token(&token);
|
|
let server = db.get_dev_server(id).await?;
|
|
|
|
if server
|
|
.hashed_token
|
|
.as_bytes()
|
|
.ct_eq(token_hash.as_ref())
|
|
.into()
|
|
{
|
|
Ok(server)
|
|
} else {
|
|
Err(anyhow!("wrong token for dev server"))
|
|
}
|
|
}
|
|
|
|
// a dev_server_token has the format <id>.<base64>. This is to make them
|
|
// relatively easy to copy/paste around.
|
|
pub fn split_dev_server_token(dev_server_token: &str) -> anyhow::Result<(DevServerId, &str)> {
|
|
let mut parts = dev_server_token.splitn(2, '.');
|
|
let id = DevServerId(parts.next().unwrap_or_default().parse()?);
|
|
let token = parts
|
|
.next()
|
|
.ok_or_else(|| anyhow!("invalid dev server token format"))?;
|
|
Ok((id, token))
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod test {
|
|
use rand::thread_rng;
|
|
use scrypt::password_hash::{PasswordHasher, SaltString};
|
|
use sea_orm::EntityTrait;
|
|
|
|
use super::*;
|
|
use crate::db::{access_token, NewUserParams};
|
|
|
|
#[gpui::test]
|
|
async fn test_verify_access_token(cx: &mut gpui::TestAppContext) {
|
|
let test_db = crate::db::TestDb::sqlite(cx.executor().clone());
|
|
let db = test_db.db();
|
|
|
|
let user = db
|
|
.create_user(
|
|
"example@example.com",
|
|
false,
|
|
NewUserParams {
|
|
github_login: "example".into(),
|
|
github_user_id: 1,
|
|
},
|
|
)
|
|
.await
|
|
.unwrap();
|
|
|
|
let token = create_access_token(&db, user.user_id, None).await.unwrap();
|
|
assert!(matches!(
|
|
verify_access_token(&token, user.user_id, &db)
|
|
.await
|
|
.unwrap(),
|
|
VerifyAccessTokenResult {
|
|
is_valid: true,
|
|
impersonator_id: None,
|
|
}
|
|
));
|
|
|
|
let old_token = create_previous_access_token(user.user_id, None, &db)
|
|
.await
|
|
.unwrap();
|
|
|
|
let old_token_id = serde_json::from_str::<AccessTokenJson>(&old_token)
|
|
.unwrap()
|
|
.id;
|
|
|
|
let hash = db
|
|
.transaction(|tx| async move {
|
|
Ok(access_token::Entity::find_by_id(old_token_id)
|
|
.one(&*tx)
|
|
.await?)
|
|
})
|
|
.await
|
|
.unwrap()
|
|
.unwrap()
|
|
.hash;
|
|
assert!(hash.starts_with("$scrypt$"));
|
|
|
|
assert!(matches!(
|
|
verify_access_token(&old_token, user.user_id, &db)
|
|
.await
|
|
.unwrap(),
|
|
VerifyAccessTokenResult {
|
|
is_valid: true,
|
|
impersonator_id: None,
|
|
}
|
|
));
|
|
|
|
let hash = db
|
|
.transaction(|tx| async move {
|
|
Ok(access_token::Entity::find_by_id(old_token_id)
|
|
.one(&*tx)
|
|
.await?)
|
|
})
|
|
.await
|
|
.unwrap()
|
|
.unwrap()
|
|
.hash;
|
|
assert!(hash.starts_with("$sha256$"));
|
|
|
|
assert!(matches!(
|
|
verify_access_token(&old_token, user.user_id, &db)
|
|
.await
|
|
.unwrap(),
|
|
VerifyAccessTokenResult {
|
|
is_valid: true,
|
|
impersonator_id: None,
|
|
}
|
|
));
|
|
|
|
assert!(matches!(
|
|
verify_access_token(&token, user.user_id, &db)
|
|
.await
|
|
.unwrap(),
|
|
VerifyAccessTokenResult {
|
|
is_valid: true,
|
|
impersonator_id: None,
|
|
}
|
|
));
|
|
}
|
|
|
|
async fn create_previous_access_token(
|
|
user_id: UserId,
|
|
impersonated_user_id: Option<UserId>,
|
|
db: &Database,
|
|
) -> Result<String> {
|
|
let access_token = rpc::auth::random_token();
|
|
let access_token_hash = previous_hash_access_token(&access_token)?;
|
|
let id = db
|
|
.create_access_token(
|
|
user_id,
|
|
impersonated_user_id,
|
|
&access_token_hash,
|
|
MAX_ACCESS_TOKENS_TO_STORE,
|
|
)
|
|
.await?;
|
|
Ok(serde_json::to_string(&AccessTokenJson {
|
|
version: 1,
|
|
id,
|
|
token: access_token,
|
|
})?)
|
|
}
|
|
|
|
fn previous_hash_access_token(token: &str) -> Result<String> {
|
|
// Avoid slow hashing in debug mode.
|
|
let params = if cfg!(debug_assertions) {
|
|
scrypt::Params::new(1, 1, 1, scrypt::Params::RECOMMENDED_LEN).unwrap()
|
|
} else {
|
|
scrypt::Params::new(14, 8, 1, scrypt::Params::RECOMMENDED_LEN).unwrap()
|
|
};
|
|
|
|
Ok(Scrypt
|
|
.hash_password_customized(
|
|
token.as_bytes(),
|
|
None,
|
|
None,
|
|
params,
|
|
&SaltString::generate(thread_rng()),
|
|
)
|
|
.map_err(anyhow::Error::new)?
|
|
.to_string())
|
|
}
|
|
}
|