2019-04-24 21:52:08 +00:00
|
|
|
package handlers
|
|
|
|
|
|
|
|
import (
|
2021-11-29 03:09:14 +00:00
|
|
|
"errors"
|
2019-04-24 21:52:08 +00:00
|
|
|
"time"
|
|
|
|
|
2023-01-25 09:36:40 +00:00
|
|
|
"github.com/authelia/authelia/v4/internal/configuration/schema"
|
2021-08-11 01:04:35 +00:00
|
|
|
"github.com/authelia/authelia/v4/internal/middlewares"
|
|
|
|
"github.com/authelia/authelia/v4/internal/regulation"
|
2023-01-25 09:36:40 +00:00
|
|
|
"github.com/authelia/authelia/v4/internal/utils"
|
2019-04-24 21:52:08 +00:00
|
|
|
)
|
|
|
|
|
2022-04-08 04:13:47 +00:00
|
|
|
// FirstFactorPOST is the handler performing the first factory.
|
2022-08-07 01:24:00 +00:00
|
|
|
//
|
2020-05-04 19:39:25 +00:00
|
|
|
//nolint:gocyclo // TODO: Consider refactoring time permitting.
|
2023-03-01 23:38:56 +00:00
|
|
|
func FirstFactorPOST(ctx *middlewares.AutheliaCtx) {
|
|
|
|
bodyJSON := bodyFirstFactorRequest{}
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
if err := ctx.ParseBody(&bodyJSON); err != nil {
|
|
|
|
ctx.Logger.Errorf(logFmtErrParseRequestBody, regulation.AuthType1FA, err)
|
2020-05-20 22:03:15 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
2020-05-05 19:35:32 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
return
|
|
|
|
}
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
if bannedUntil, err := ctx.Providers.Regulator.Regulate(ctx, bodyJSON.Username); err != nil {
|
|
|
|
if errors.Is(err, regulation.ErrUserIsBanned) {
|
|
|
|
_ = markAuthenticationAttempt(ctx, false, &bannedUntil, bodyJSON.Username, regulation.AuthType1FA, nil)
|
2021-11-29 03:09:14 +00:00
|
|
|
|
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2020-05-20 22:03:15 +00:00
|
|
|
return
|
|
|
|
}
|
2019-11-24 20:27:59 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
ctx.Logger.Errorf(logFmtErrRegulationFail, regulation.AuthType1FA, bodyJSON.Username, err)
|
2020-12-16 01:47:31 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
2019-11-30 16:49:52 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
return
|
|
|
|
}
|
2020-05-05 21:27:38 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
userPasswordOk, err := ctx.Providers.UserProvider.CheckUserPassword(bodyJSON.Username, bodyJSON.Password)
|
|
|
|
if err != nil {
|
|
|
|
_ = markAuthenticationAttempt(ctx, false, nil, bodyJSON.Username, regulation.AuthType1FA, err)
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
return
|
|
|
|
}
|
2019-11-30 14:33:45 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
if !userPasswordOk {
|
|
|
|
_ = markAuthenticationAttempt(ctx, false, nil, bodyJSON.Username, regulation.AuthType1FA, nil)
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
return
|
|
|
|
}
|
2023-01-12 10:57:44 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
if err = markAuthenticationAttempt(ctx, true, nil, bodyJSON.Username, regulation.AuthType1FA, nil); err != nil {
|
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
2023-01-12 10:57:44 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
return
|
|
|
|
}
|
2023-01-12 10:57:44 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
// TODO: write tests.
|
|
|
|
provider, err := ctx.GetSessionProvider()
|
|
|
|
if err != nil {
|
|
|
|
ctx.Logger.Errorf("%s", err)
|
2023-01-12 10:57:44 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
2023-01-12 10:57:44 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
return
|
|
|
|
}
|
2023-01-12 10:57:44 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
userSession, err := provider.GetSession(ctx.RequestCtx)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Logger.Errorf("%s", err)
|
2021-05-04 22:06:05 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
2021-11-29 03:09:14 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
return
|
|
|
|
}
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
newSession := provider.NewDefaultUserSession()
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
// Reset all values from previous session except OIDC workflow before regenerating the cookie.
|
|
|
|
if err = ctx.SaveSession(newSession); err != nil {
|
|
|
|
ctx.Logger.Errorf(logFmtErrSessionReset, regulation.AuthType1FA, bodyJSON.Username, err)
|
2021-11-29 03:09:14 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
2020-04-03 23:11:33 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
return
|
|
|
|
}
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
if err = ctx.RegenerateSession(); err != nil {
|
|
|
|
ctx.Logger.Errorf(logFmtErrSessionRegenerate, regulation.AuthType1FA, bodyJSON.Username, err)
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
2021-11-29 03:09:14 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
return
|
|
|
|
}
|
2021-11-29 03:09:14 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
// Check if bodyJSON.KeepMeLoggedIn can be deref'd and derive the value based on the configuration and JSON data.
|
|
|
|
keepMeLoggedIn := !provider.Config.DisableRememberMe && bodyJSON.KeepMeLoggedIn != nil && *bodyJSON.KeepMeLoggedIn
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
// Set the cookie to expire if remember me is enabled and the user has asked us to.
|
|
|
|
if keepMeLoggedIn {
|
|
|
|
err = provider.UpdateExpiration(ctx.RequestCtx, provider.Config.RememberMe)
|
2020-05-20 22:03:15 +00:00
|
|
|
if err != nil {
|
2023-03-01 23:38:56 +00:00
|
|
|
ctx.Logger.Errorf(logFmtErrSessionSave, "updated expiration", regulation.AuthType1FA, bodyJSON.Username, err)
|
2021-11-29 03:09:14 +00:00
|
|
|
|
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
|
|
|
|
2020-05-20 22:03:15 +00:00
|
|
|
return
|
|
|
|
}
|
2023-03-01 23:38:56 +00:00
|
|
|
}
|
2020-05-05 19:35:32 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
// Get the details of the given user from the user provider.
|
|
|
|
userDetails, err := ctx.Providers.UserProvider.GetDetails(bodyJSON.Username)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Logger.Errorf(logFmtErrObtainProfileDetails, regulation.AuthType1FA, bodyJSON.Username, err)
|
2020-05-05 19:35:32 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-03 23:44:30 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
return
|
|
|
|
}
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
ctx.Logger.Tracef(logFmtTraceProfileDetails, bodyJSON.Username, userDetails.Groups, userDetails.Emails)
|
2021-11-29 03:09:14 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
userSession.SetOneFactor(ctx.Clock.Now(), userDetails, keepMeLoggedIn)
|
2021-11-29 03:09:14 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
if refresh, refreshInterval := getProfileRefreshSettings(ctx.Configuration.AuthenticationBackend); refresh {
|
|
|
|
userSession.RefreshTTL = ctx.Clock.Now().Add(refreshInterval)
|
|
|
|
}
|
2020-05-20 22:03:15 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
if err = ctx.SaveSession(userSession); err != nil {
|
|
|
|
ctx.Logger.Errorf(logFmtErrSessionSave, "updated profile", regulation.AuthType1FA, bodyJSON.Username, err)
|
2020-05-20 22:03:15 +00:00
|
|
|
|
2023-03-01 23:38:56 +00:00
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if bodyJSON.Workflow == workflowOpenIDConnect {
|
|
|
|
handleOIDCWorkflowResponse(ctx, bodyJSON.TargetURL, bodyJSON.WorkflowID)
|
|
|
|
} else {
|
|
|
|
Handle1FAResponse(ctx, bodyJSON.TargetURL, bodyJSON.RequestMethod, userSession.Username, userSession.Groups)
|
2020-05-20 22:03:15 +00:00
|
|
|
}
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|
2023-01-25 09:36:40 +00:00
|
|
|
|
|
|
|
func getProfileRefreshSettings(cfg schema.AuthenticationBackend) (refresh bool, refreshInterval time.Duration) {
|
|
|
|
if cfg.LDAP != nil {
|
|
|
|
if cfg.RefreshInterval == schema.ProfileRefreshDisabled {
|
|
|
|
refresh = false
|
|
|
|
refreshInterval = 0
|
|
|
|
} else {
|
|
|
|
refresh = true
|
|
|
|
|
|
|
|
if cfg.RefreshInterval != schema.ProfileRefreshAlways {
|
|
|
|
refreshInterval, _ = utils.ParseDurationString(cfg.RefreshInterval)
|
|
|
|
} else {
|
|
|
|
refreshInterval = schema.RefreshIntervalAlways
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return refresh, refreshInterval
|
|
|
|
}
|