forked from mystiq/dex
472e4a02a4
Whenever it makes the code easier to follow, use early return to avoid else statements.
345 lines
8.2 KiB
Go
345 lines
8.2 KiB
Go
package user
|
|
|
|
import (
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"net/url"
|
|
"os"
|
|
"time"
|
|
|
|
"golang.org/x/crypto/bcrypt"
|
|
|
|
"github.com/coreos/go-oidc/jose"
|
|
"github.com/coreos/go-oidc/key"
|
|
"github.com/coreos/go-oidc/oidc"
|
|
|
|
"github.com/coreos/dex/repo"
|
|
)
|
|
|
|
const (
|
|
bcryptHashCost = 10
|
|
|
|
// Blowfish, the algorithm underlying bcrypt, has a maximum
|
|
// password length of 72. We explicitly track and check this
|
|
// since the bcrypt library will silently ignore portions of
|
|
// a password past the first 72 characters.
|
|
maxSecretLength = 72
|
|
|
|
// ClaimPasswordResetCallback represents where a user should be sent after
|
|
// resetting their password.
|
|
ClaimPasswordResetCallback = "http://coreos.com/password/reset-callback"
|
|
|
|
// ClaimPasswordResetPassword represents the hash of the password to be
|
|
// reset; in other words, the old password.
|
|
ClaimPasswordResetPassword = "http://coreos.com/password/old-hash"
|
|
)
|
|
|
|
var (
|
|
PasswordHasher = DefaultPasswordHasher
|
|
|
|
ErrorInvalidPassword = errors.New("invalid Password")
|
|
ErrorPasswordHashNoMatch = errors.New("password and hash don't match")
|
|
ErrorPasswordExpired = errors.New("password has expired")
|
|
)
|
|
|
|
type Hasher func(string) ([]byte, error)
|
|
|
|
func DefaultPasswordHasher(s string) ([]byte, error) {
|
|
pwHash, err := bcrypt.GenerateFromPassword([]byte(s), bcryptHashCost)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return Password(pwHash), nil
|
|
}
|
|
|
|
type Password []byte
|
|
|
|
func NewPasswordFromPlaintext(plaintext string) (Password, error) {
|
|
return PasswordHasher(plaintext)
|
|
}
|
|
|
|
type PasswordInfo struct {
|
|
UserID string
|
|
|
|
Password Password
|
|
|
|
PasswordExpires time.Time
|
|
}
|
|
|
|
func (p PasswordInfo) Authenticate(plaintext string) (*oidc.Identity, error) {
|
|
if err := bcrypt.CompareHashAndPassword(p.Password, []byte(plaintext)); err != nil {
|
|
return nil, ErrorPasswordHashNoMatch
|
|
}
|
|
|
|
if !p.PasswordExpires.IsZero() && time.Now().After(p.PasswordExpires) {
|
|
return nil, ErrorPasswordExpired
|
|
}
|
|
|
|
ident := p.Identity()
|
|
return &ident, nil
|
|
}
|
|
|
|
func (p PasswordInfo) Identity() oidc.Identity {
|
|
return oidc.Identity{
|
|
ID: p.UserID,
|
|
}
|
|
}
|
|
|
|
type PasswordInfoRepo interface {
|
|
Get(tx repo.Transaction, id string) (PasswordInfo, error)
|
|
Update(repo.Transaction, PasswordInfo) error
|
|
Create(repo.Transaction, PasswordInfo) error
|
|
}
|
|
|
|
func NewPasswordInfoRepo() PasswordInfoRepo {
|
|
return &memPasswordInfoRepo{
|
|
pws: make(map[string]PasswordInfo),
|
|
}
|
|
}
|
|
|
|
type memPasswordInfoRepo struct {
|
|
pws map[string]PasswordInfo
|
|
}
|
|
|
|
func (m *memPasswordInfoRepo) Get(_ repo.Transaction, id string) (PasswordInfo, error) {
|
|
pw, ok := m.pws[id]
|
|
if !ok {
|
|
return PasswordInfo{}, ErrorNotFound
|
|
}
|
|
return pw, nil
|
|
}
|
|
|
|
func (m *memPasswordInfoRepo) Create(_ repo.Transaction, pw PasswordInfo) error {
|
|
_, ok := m.pws[pw.UserID]
|
|
if ok {
|
|
return ErrorDuplicateID
|
|
}
|
|
|
|
if pw.UserID == "" {
|
|
return ErrorInvalidID
|
|
}
|
|
|
|
if len(pw.Password) == 0 {
|
|
return ErrorInvalidPassword
|
|
}
|
|
|
|
m.pws[pw.UserID] = pw
|
|
return nil
|
|
}
|
|
|
|
func (m *memPasswordInfoRepo) Update(_ repo.Transaction, pw PasswordInfo) error {
|
|
if pw.UserID == "" {
|
|
return ErrorInvalidID
|
|
}
|
|
|
|
_, ok := m.pws[pw.UserID]
|
|
if !ok {
|
|
return ErrorNotFound
|
|
}
|
|
|
|
if len(pw.Password) == 0 {
|
|
return ErrorInvalidPassword
|
|
}
|
|
|
|
m.pws[pw.UserID] = pw
|
|
return nil
|
|
}
|
|
|
|
func (u *PasswordInfo) UnmarshalJSON(data []byte) error {
|
|
var dec struct {
|
|
UserID string `json:"userId"`
|
|
PasswordHash string `json:"passwordHash"`
|
|
PasswordPlaintext string `json:"passwordPlaintext"`
|
|
PasswordExpires time.Time `json:"passwordExpires"`
|
|
}
|
|
|
|
err := json.Unmarshal(data, &dec)
|
|
if err != nil {
|
|
return fmt.Errorf("invalid User entry: %v", err)
|
|
}
|
|
|
|
u.UserID = dec.UserID
|
|
|
|
u.PasswordExpires = dec.PasswordExpires
|
|
|
|
if len(dec.PasswordHash) != 0 {
|
|
if dec.PasswordPlaintext != "" {
|
|
return ErrorInvalidPassword
|
|
}
|
|
u.Password = Password(dec.PasswordHash)
|
|
return nil
|
|
}
|
|
if dec.PasswordPlaintext != "" {
|
|
u.Password, err = NewPasswordFromPlaintext(dec.PasswordPlaintext)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func newPasswordInfosFromReader(r io.Reader) ([]PasswordInfo, error) {
|
|
var pws []PasswordInfo
|
|
err := json.NewDecoder(r).Decode(&pws)
|
|
return pws, err
|
|
}
|
|
|
|
func readPasswordInfosFromFile(loc string) ([]PasswordInfo, error) {
|
|
pwf, err := os.Open(loc)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to read password info from file %q: %v", loc, err)
|
|
}
|
|
|
|
return newPasswordInfosFromReader(pwf)
|
|
}
|
|
|
|
func LoadPasswordInfos(repo PasswordInfoRepo, pws []PasswordInfo) error {
|
|
for i, pw := range pws {
|
|
err := repo.Create(nil, pw)
|
|
if err != nil {
|
|
return fmt.Errorf("error loading PasswordInfo[%d]: %q", i, err)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func NewPasswordInfoRepoFromPasswordInfos(pws []PasswordInfo) PasswordInfoRepo {
|
|
memRepo := NewPasswordInfoRepo().(*memPasswordInfoRepo)
|
|
for _, pw := range pws {
|
|
memRepo.pws[pw.UserID] = pw
|
|
}
|
|
return memRepo
|
|
}
|
|
|
|
func NewPasswordInfoRepoFromFile(loc string) (PasswordInfoRepo, error) {
|
|
pws, err := readPasswordInfosFromFile(loc)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return NewPasswordInfoRepoFromPasswordInfos(pws), nil
|
|
}
|
|
|
|
func NewPasswordReset(user User, password Password, issuer url.URL, clientID string, callback url.URL, expires time.Duration) PasswordReset {
|
|
claims := oidc.NewClaims(issuer.String(), user.ID, clientID, clock.Now(), clock.Now().Add(expires))
|
|
claims.Add(ClaimPasswordResetCallback, callback.String())
|
|
claims.Add(ClaimPasswordResetPassword, string(password))
|
|
return PasswordReset{claims}
|
|
}
|
|
|
|
type PasswordReset struct {
|
|
claims jose.Claims
|
|
}
|
|
|
|
// Token serializes the PasswordReset into a signed JWT.
|
|
func (e PasswordReset) Token(signer jose.Signer) (string, error) {
|
|
if signer == nil {
|
|
return "", errors.New("no signer")
|
|
}
|
|
|
|
jwt, err := jose.NewSignedJWT(e.claims, signer)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return jwt.Encode(), nil
|
|
}
|
|
|
|
// ParseAndVerifyPasswordResetToken parses a string into a an PasswordReset, verifies the signature, and ensures that required claims are present.
|
|
// In addition to the usual claims required by the OIDC spec, "aud" and "sub" must be present as well as ClaimPasswordResetCallback, ClaimPasswordResetEmail and ClaimPasswordResetPassword.
|
|
func ParseAndVerifyPasswordResetToken(token string, issuer url.URL, keys []key.PublicKey) (PasswordReset, error) {
|
|
jwt, err := jose.ParseJWT(token)
|
|
if err != nil {
|
|
return PasswordReset{}, err
|
|
}
|
|
|
|
claims, err := jwt.Claims()
|
|
if err != nil {
|
|
return PasswordReset{}, err
|
|
}
|
|
|
|
cb, ok, err := claims.StringClaim(ClaimPasswordResetCallback)
|
|
if err != nil {
|
|
return PasswordReset{}, err
|
|
}
|
|
var clientID string
|
|
if ok && cb != "" {
|
|
clientID, ok, err = claims.StringClaim("aud")
|
|
if err != nil {
|
|
return PasswordReset{}, err
|
|
}
|
|
if !ok || clientID == "" {
|
|
return PasswordReset{}, errors.New("no aud(client ID) claim")
|
|
}
|
|
}
|
|
if _, err := url.Parse(cb); err != nil {
|
|
return PasswordReset{}, fmt.Errorf("callback URL not parseable: %v", cb)
|
|
}
|
|
|
|
pw, ok, err := claims.StringClaim(ClaimPasswordResetPassword)
|
|
if err != nil {
|
|
return PasswordReset{}, err
|
|
}
|
|
if pw == "" {
|
|
return PasswordReset{}, fmt.Errorf("no %q claim", ClaimPasswordResetPassword)
|
|
}
|
|
|
|
sub, ok, err := claims.StringClaim("sub")
|
|
if err != nil {
|
|
return PasswordReset{}, err
|
|
}
|
|
if sub == "" {
|
|
return PasswordReset{}, errors.New("no sub claim")
|
|
}
|
|
|
|
noop := func() error { return nil }
|
|
|
|
keysFunc := func() []key.PublicKey {
|
|
return keys
|
|
}
|
|
|
|
verifier := oidc.NewJWTVerifier(issuer.String(), clientID, noop, keysFunc)
|
|
if err := verifier.Verify(jwt); err != nil {
|
|
return PasswordReset{}, err
|
|
}
|
|
|
|
return PasswordReset{
|
|
claims: claims,
|
|
}, nil
|
|
|
|
}
|
|
|
|
func (e PasswordReset) UserID() string {
|
|
uid, ok, err := e.claims.StringClaim("sub")
|
|
if !ok || err != nil {
|
|
panic("PasswordReset: no sub claim. This should be impossible.")
|
|
}
|
|
return uid
|
|
}
|
|
|
|
func (e PasswordReset) Password() Password {
|
|
pw, ok, err := e.claims.StringClaim(ClaimPasswordResetPassword)
|
|
if !ok || err != nil {
|
|
panic("PasswordReset: no password claim. This should be impossible.")
|
|
}
|
|
return Password(pw)
|
|
}
|
|
|
|
func (e PasswordReset) Callback() *url.URL {
|
|
cb, ok, err := e.claims.StringClaim(ClaimPasswordResetCallback)
|
|
if err != nil {
|
|
panic("PasswordReset: error getting string claim. This should be impossible.")
|
|
}
|
|
|
|
if !ok || cb == "" {
|
|
return nil
|
|
}
|
|
|
|
cbURL, err := url.Parse(cb)
|
|
if err != nil {
|
|
panic("EmailVerificaiton: can't parse callback. This should be impossible.")
|
|
}
|
|
return cbURL
|
|
}
|