2019-04-24 21:52:08 +00:00
|
|
|
package authentication
|
|
|
|
|
|
|
|
import (
|
2021-02-21 23:07:06 +00:00
|
|
|
_ "embed" // Embed users_database.template.yml.
|
2019-04-24 21:52:08 +00:00
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
2020-06-17 06:25:35 +00:00
|
|
|
"os"
|
2019-12-27 16:55:00 +00:00
|
|
|
"strings"
|
2019-04-24 21:52:08 +00:00
|
|
|
"sync"
|
|
|
|
|
|
|
|
"github.com/asaskevich/govalidator"
|
|
|
|
"gopkg.in/yaml.v2"
|
2020-04-05 12:37:21 +00:00
|
|
|
|
2021-08-11 01:04:35 +00:00
|
|
|
"github.com/authelia/authelia/v4/internal/configuration/schema"
|
|
|
|
"github.com/authelia/authelia/v4/internal/logging"
|
2019-04-24 21:52:08 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// FileUserProvider is a provider reading details from a file.
|
|
|
|
type FileUserProvider struct {
|
2020-03-06 01:38:02 +00:00
|
|
|
configuration *schema.FileAuthenticationBackendConfiguration
|
|
|
|
database *DatabaseModel
|
|
|
|
lock *sync.Mutex
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// UserDetailsModel is the model of user details in the file database.
|
|
|
|
type UserDetailsModel struct {
|
|
|
|
HashedPassword string `yaml:"password" valid:"required"`
|
2020-06-19 10:50:21 +00:00
|
|
|
DisplayName string `yaml:"displayname" valid:"required"`
|
2019-04-24 21:52:08 +00:00
|
|
|
Email string `yaml:"email"`
|
|
|
|
Groups []string `yaml:"groups"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// DatabaseModel is the model of users file database.
|
|
|
|
type DatabaseModel struct {
|
|
|
|
Users map[string]UserDetailsModel `yaml:"users" valid:"required"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewFileUserProvider creates a new instance of FileUserProvider.
|
2020-03-06 01:38:02 +00:00
|
|
|
func NewFileUserProvider(configuration *schema.FileAuthenticationBackendConfiguration) *FileUserProvider {
|
2021-01-16 23:23:35 +00:00
|
|
|
logger := logging.Logger()
|
|
|
|
|
2020-06-17 06:25:35 +00:00
|
|
|
errs := checkDatabase(configuration.Path)
|
|
|
|
if errs != nil {
|
|
|
|
for _, err := range errs {
|
2021-01-16 23:23:35 +00:00
|
|
|
logger.Error(err)
|
2020-06-17 06:25:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
|
2020-03-06 01:38:02 +00:00
|
|
|
database, err := readDatabase(configuration.Path)
|
2019-04-24 21:52:08 +00:00
|
|
|
if err != nil {
|
|
|
|
// Panic since the file does not exist when Authelia is starting.
|
2020-05-08 03:38:22 +00:00
|
|
|
panic(err)
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|
2019-12-27 17:09:57 +00:00
|
|
|
|
|
|
|
// Early check whether hashed passwords are correct for all users
|
|
|
|
err = checkPasswordHashes(database)
|
|
|
|
if err != nil {
|
2020-05-08 03:38:22 +00:00
|
|
|
panic(err)
|
2019-12-27 17:09:57 +00:00
|
|
|
}
|
|
|
|
|
2019-04-24 21:52:08 +00:00
|
|
|
return &FileUserProvider{
|
2020-03-06 01:38:02 +00:00
|
|
|
configuration: configuration,
|
|
|
|
database: database,
|
|
|
|
lock: &sync.Mutex{},
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-12-27 17:09:57 +00:00
|
|
|
func checkPasswordHashes(database *DatabaseModel) error {
|
|
|
|
for u, v := range database.Users {
|
2020-05-08 03:38:22 +00:00
|
|
|
v.HashedPassword = strings.ReplaceAll(v.HashedPassword, "{CRYPT}", "")
|
2019-12-27 17:09:57 +00:00
|
|
|
_, err := ParseHash(v.HashedPassword)
|
2020-05-08 03:38:22 +00:00
|
|
|
|
2019-12-27 17:09:57 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Unable to parse hash of user %s: %s", u, err)
|
|
|
|
}
|
2020-05-08 03:38:22 +00:00
|
|
|
|
|
|
|
database.Users[u] = v
|
2019-12-27 17:09:57 +00:00
|
|
|
}
|
2020-05-05 19:35:32 +00:00
|
|
|
|
2019-12-27 17:09:57 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-06-17 06:25:35 +00:00
|
|
|
func checkDatabase(path string) []error {
|
|
|
|
_, err := os.Stat(path)
|
|
|
|
if err != nil {
|
|
|
|
errs := []error{
|
|
|
|
fmt.Errorf("Unable to find database file: %v", path),
|
|
|
|
fmt.Errorf("Generating database file: %v", path),
|
|
|
|
}
|
|
|
|
|
|
|
|
err := generateDatabaseFromTemplate(path)
|
|
|
|
if err != nil {
|
|
|
|
errs = append(errs, err)
|
|
|
|
} else {
|
|
|
|
errs = append(errs, fmt.Errorf("Generated database at: %v", path))
|
|
|
|
}
|
|
|
|
|
|
|
|
return errs
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-02-21 23:07:06 +00:00
|
|
|
//go:embed users_database.template.yml
|
|
|
|
var cfg []byte
|
2020-06-17 06:25:35 +00:00
|
|
|
|
2021-02-21 23:07:06 +00:00
|
|
|
func generateDatabaseFromTemplate(path string) error {
|
|
|
|
err := ioutil.WriteFile(path, cfg, 0600)
|
2020-06-17 06:25:35 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Unable to generate %v: %v", path, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-04-24 21:52:08 +00:00
|
|
|
func readDatabase(path string) (*DatabaseModel, error) {
|
|
|
|
content, err := ioutil.ReadFile(path)
|
|
|
|
if err != nil {
|
2019-12-27 17:09:57 +00:00
|
|
|
return nil, fmt.Errorf("Unable to read database from file %s: %s", path, err)
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|
2020-05-05 19:35:32 +00:00
|
|
|
|
2019-04-24 21:52:08 +00:00
|
|
|
db := DatabaseModel{}
|
2020-05-05 19:35:32 +00:00
|
|
|
|
2019-04-24 21:52:08 +00:00
|
|
|
err = yaml.Unmarshal(content, &db)
|
|
|
|
if err != nil {
|
2019-12-27 17:09:57 +00:00
|
|
|
return nil, fmt.Errorf("Unable to parse database: %s", err)
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
ok, err := govalidator.ValidateStruct(db)
|
|
|
|
if err != nil {
|
2019-12-27 17:09:57 +00:00
|
|
|
return nil, fmt.Errorf("Invalid schema of database: %s", err)
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if !ok {
|
2019-12-27 17:09:57 +00:00
|
|
|
return nil, fmt.Errorf("The database format is invalid: %s", err)
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|
2020-05-05 19:35:32 +00:00
|
|
|
|
2019-04-24 21:52:08 +00:00
|
|
|
return &db, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// CheckUserPassword checks if provided password matches for the given user.
|
|
|
|
func (p *FileUserProvider) CheckUserPassword(username string, password string) (bool, error) {
|
|
|
|
if details, ok := p.database.Users[username]; ok {
|
2020-05-08 03:38:22 +00:00
|
|
|
ok, err := CheckPassword(password, details.HashedPassword)
|
2019-04-24 21:52:08 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
2020-05-05 19:35:32 +00:00
|
|
|
|
2019-04-24 21:52:08 +00:00
|
|
|
return ok, nil
|
|
|
|
}
|
2020-05-01 22:32:09 +00:00
|
|
|
|
2020-05-08 03:38:22 +00:00
|
|
|
return false, ErrUserNotFound
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// GetDetails retrieve the groups a user belongs to.
|
|
|
|
func (p *FileUserProvider) GetDetails(username string) (*UserDetails, error) {
|
|
|
|
if details, ok := p.database.Users[username]; ok {
|
|
|
|
return &UserDetails{
|
2020-06-19 10:50:21 +00:00
|
|
|
Username: username,
|
|
|
|
DisplayName: details.DisplayName,
|
|
|
|
Groups: details.Groups,
|
|
|
|
Emails: []string{details.Email},
|
2019-04-24 21:52:08 +00:00
|
|
|
}, nil
|
|
|
|
}
|
2020-05-05 19:35:32 +00:00
|
|
|
|
2019-04-24 21:52:08 +00:00
|
|
|
return nil, fmt.Errorf("User '%s' does not exist in database", username)
|
|
|
|
}
|
|
|
|
|
|
|
|
// UpdatePassword update the password of the given user.
|
|
|
|
func (p *FileUserProvider) UpdatePassword(username string, newPassword string) error {
|
|
|
|
details, ok := p.database.Users[username]
|
|
|
|
if !ok {
|
2020-05-08 03:38:22 +00:00
|
|
|
return ErrUserNotFound
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|
|
|
|
|
2020-05-08 03:38:22 +00:00
|
|
|
algorithm, err := ConfigAlgoToCryptoAlgo(p.configuration.Password.Algorithm)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2020-03-06 01:38:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
hash, err := HashPassword(
|
2020-04-11 03:54:18 +00:00
|
|
|
newPassword, "", algorithm, p.configuration.Password.Iterations,
|
|
|
|
p.configuration.Password.Memory*1024, p.configuration.Password.Parallelism,
|
|
|
|
p.configuration.Password.KeyLength, p.configuration.Password.SaltLength)
|
2020-05-08 03:38:22 +00:00
|
|
|
|
2020-03-06 01:38:02 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-05-05 19:35:32 +00:00
|
|
|
|
2020-03-06 01:38:02 +00:00
|
|
|
details.HashedPassword = hash
|
2020-05-05 19:35:32 +00:00
|
|
|
|
2019-04-24 21:52:08 +00:00
|
|
|
p.lock.Lock()
|
|
|
|
p.database.Users[username] = details
|
|
|
|
|
|
|
|
b, err := yaml.Marshal(p.database)
|
|
|
|
if err != nil {
|
|
|
|
p.lock.Unlock()
|
|
|
|
return err
|
|
|
|
}
|
2020-05-05 19:35:32 +00:00
|
|
|
|
2020-05-08 03:38:22 +00:00
|
|
|
err = ioutil.WriteFile(p.configuration.Path, b, fileAuthenticationMode)
|
2019-04-24 21:52:08 +00:00
|
|
|
p.lock.Unlock()
|
2020-05-05 19:35:32 +00:00
|
|
|
|
2019-04-24 21:52:08 +00:00
|
|
|
return err
|
|
|
|
}
|
2021-09-17 09:53:59 +00:00
|
|
|
|
|
|
|
// StartupCheck implements the startup check provider interface.
|
2021-11-23 09:45:38 +00:00
|
|
|
func (p *FileUserProvider) StartupCheck() (err error) {
|
2021-09-17 09:53:59 +00:00
|
|
|
return nil
|
|
|
|
}
|