|
package basic |
|
|
|
import ( |
|
"context" |
|
"database/sql" |
|
"sync" |
|
|
|
"github.com/target/goalert/config" |
|
"github.com/target/goalert/permission" |
|
"github.com/target/goalert/util" |
|
"github.com/target/goalert/validation" |
|
"github.com/target/goalert/validation/validate" |
|
|
|
"github.com/pkg/errors" |
|
"golang.org/x/crypto/bcrypt" |
|
) |
|
|
|
|
|
|
|
type Store struct { |
|
insert *sql.Stmt |
|
getByUsername *sql.Stmt |
|
getByID *sql.Stmt |
|
update *sql.Stmt |
|
|
|
mx sync.Mutex |
|
} |
|
|
|
|
|
func NewStore(ctx context.Context, db *sql.DB) (*Store, error) { |
|
p := &util.Prepare{ |
|
DB: db, |
|
Ctx: ctx, |
|
} |
|
return &Store{ |
|
insert: p.P("INSERT INTO auth_basic_users (user_id, username, password_hash) VALUES ($1, $2, $3)"), |
|
getByUsername: p.P("SELECT user_id, password_hash FROM auth_basic_users WHERE username = $1"), |
|
getByID: p.P("SELECT password_hash FROM auth_basic_users WHERE user_id = $1"), |
|
update: p.P("UPDATE auth_basic_users SET password_hash = $2 WHERE user_id = $1"), |
|
}, p.Err |
|
} |
|
|
|
|
|
type HashedPassword interface { |
|
Hash() string |
|
|
|
_private() |
|
} |
|
|
|
type hashed []byte |
|
|
|
func (h hashed) Hash() string { return string(h) } |
|
func (h hashed) _private() {} |
|
|
|
|
|
type ValidatedPassword interface { |
|
UserID() string |
|
|
|
_private() |
|
} |
|
|
|
type validated string |
|
|
|
func (v validated) UserID() string { return string(v) } |
|
func (v validated) _private() {} |
|
|
|
|
|
func ValidateBasicAuth(ctx context.Context) error { |
|
if permission.Admin(ctx) { |
|
return nil |
|
} |
|
|
|
cfg := config.FromContext(ctx) |
|
if cfg.Auth.DisableBasic { |
|
return permission.NewAccessDenied("Basic auth is disabled by administrator.") |
|
} |
|
|
|
return nil |
|
} |
|
|
|
|
|
func (b *Store) NewHashedPassword(ctx context.Context, password string) (HashedPassword, error) { |
|
err := ValidateBasicAuth(ctx) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
err = validate.Text("Password", password, 8, 200) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
b.mx.Lock() |
|
defer b.mx.Unlock() |
|
hashedPassword, err := bcrypt.GenerateFromPassword([]byte(password), 12) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
return hashed(hashedPassword), nil |
|
} |
|
|
|
|
|
|
|
|
|
func (b *Store) CreateTx(ctx context.Context, tx *sql.Tx, userID, username string, password HashedPassword) error { |
|
err := ValidateBasicAuth(ctx) |
|
if err != nil { |
|
return err |
|
} |
|
|
|
err = permission.LimitCheckAny(ctx, permission.System, permission.Admin, permission.MatchUser(userID)) |
|
if err != nil { |
|
return err |
|
} |
|
|
|
err = validate.Many( |
|
validate.UUID("UserID", userID), |
|
validate.Username("Username", username), |
|
) |
|
if err != nil { |
|
return err |
|
} |
|
|
|
_, err = tx.StmtContext(ctx, b.insert).ExecContext(ctx, userID, username, password.Hash()) |
|
return err |
|
} |
|
|
|
|
|
func (b *Store) UpdateTx(ctx context.Context, tx *sql.Tx, userID string, oldPass ValidatedPassword, newPass HashedPassword) error { |
|
err := ValidateBasicAuth(ctx) |
|
if err != nil { |
|
return err |
|
} |
|
|
|
err = permission.LimitCheckAny(ctx, permission.Admin, permission.MatchUser(userID)) |
|
if err != nil { |
|
return err |
|
} |
|
|
|
err = validate.UUID("UserID", userID) |
|
if err != nil { |
|
return err |
|
} |
|
|
|
if oldPass != nil && oldPass.UserID() != userID { |
|
return validation.NewFieldError("OldPassword", "Password does not match User") |
|
} |
|
if (!permission.Admin(ctx) || permission.UserID(ctx) == userID) && oldPass == nil { |
|
return validation.NewFieldError("OldPassword", "Previous password required") |
|
} |
|
|
|
res, err := tx.StmtContext(ctx, b.update).ExecContext(ctx, userID, newPass.Hash()) |
|
if err != nil { |
|
return err |
|
} |
|
|
|
count, err := res.RowsAffected() |
|
if err != nil { |
|
return err |
|
} |
|
|
|
if count == 0 { |
|
return validation.NewFieldError("UserID", "does not have basic auth configured") |
|
} |
|
|
|
return nil |
|
} |
|
|
|
|
|
func (b *Store) Validate(ctx context.Context, username, password string) (string, error) { |
|
err := validate.Many( |
|
validate.Username("Username", username), |
|
validate.Text("Password", password, 1, 200), |
|
) |
|
if err != nil { |
|
return "", err |
|
} |
|
|
|
row := b.getByUsername.QueryRowContext(ctx, username) |
|
var userID, hashed string |
|
err = row.Scan(&userID, &hashed) |
|
if err != nil { |
|
if errors.Is(err, sql.ErrNoRows) { |
|
return "", errors.New("invalid username") |
|
} |
|
return "", errors.WithMessage(err, "user lookup failure") |
|
} |
|
|
|
|
|
b.mx.Lock() |
|
defer b.mx.Unlock() |
|
|
|
err = bcrypt.CompareHashAndPassword([]byte(hashed), []byte(password)) |
|
if err != nil { |
|
return "", errors.WithMessage(err, "invalid password") |
|
} |
|
|
|
return userID, nil |
|
} |
|
|
|
|
|
func (b *Store) ValidatePassword(ctx context.Context, password string) (ValidatedPassword, error) { |
|
err := ValidateBasicAuth(ctx) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
err = permission.LimitCheckAny(ctx, permission.User) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
userID := permission.UserID(ctx) |
|
|
|
err = validate.Many( |
|
validate.UUID("UserID", userID), |
|
validate.Text("OldPassword", password, 8, 200), |
|
) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
var hash string |
|
err = b.getByID.QueryRowContext(ctx, userID).Scan(&hash) |
|
if errors.Is(err, sql.ErrNoRows) { |
|
return nil, errors.New("unknown userID") |
|
} |
|
if err != nil { |
|
return nil, errors.WithMessage(err, "user lookup failure") |
|
} |
|
|
|
b.mx.Lock() |
|
defer b.mx.Unlock() |
|
|
|
err = bcrypt.CompareHashAndPassword([]byte(hash), []byte(password)) |
|
if err != nil { |
|
return nil, validation.NewFieldError("OldPassword", "invalid password") |
|
} |
|
|
|
return validated(userID), nil |
|
} |
|
|