2019-04-24 21:52:08 +00:00
|
|
|
package handlers
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"time"
|
|
|
|
|
2019-12-24 02:14:52 +00:00
|
|
|
"github.com/authelia/authelia/internal/authentication"
|
|
|
|
"github.com/authelia/authelia/internal/middlewares"
|
|
|
|
"github.com/authelia/authelia/internal/regulation"
|
|
|
|
"github.com/authelia/authelia/internal/session"
|
2019-04-24 21:52:08 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// FirstFactorPost is the handler performing the first factory.
|
|
|
|
func FirstFactorPost(ctx *middlewares.AutheliaCtx) {
|
|
|
|
bodyJSON := firstFactorRequestBody{}
|
|
|
|
err := ctx.ParseBody(&bodyJSON)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
ctx.Error(err, authenticationFailedMessage)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
bannedUntil, err := ctx.Providers.Regulator.Regulate(bodyJSON.Username)
|
|
|
|
|
2019-11-30 16:49:52 +00:00
|
|
|
if err != nil {
|
|
|
|
if err == regulation.ErrUserIsBanned {
|
|
|
|
ctx.Error(fmt.Errorf("User %s is banned until %s", bodyJSON.Username, bannedUntil), userBannedMessage)
|
|
|
|
return
|
|
|
|
}
|
2019-04-24 21:52:08 +00:00
|
|
|
ctx.Error(fmt.Errorf("Unable to regulate authentication: %s", err), authenticationFailedMessage)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
userPasswordOk, err := ctx.Providers.UserProvider.CheckUserPassword(bodyJSON.Username, bodyJSON.Password)
|
|
|
|
|
|
|
|
if err != nil {
|
2019-11-24 20:27:59 +00:00
|
|
|
ctx.Logger.Debugf("Mark authentication attempt made by user %s", bodyJSON.Username)
|
|
|
|
ctx.Providers.Regulator.Mark(bodyJSON.Username, false)
|
|
|
|
|
2019-04-24 21:52:08 +00:00
|
|
|
ctx.Error(fmt.Errorf("Error while checking password for user %s: %s", bodyJSON.Username, err.Error()), authenticationFailedMessage)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if !userPasswordOk {
|
2019-11-30 16:49:52 +00:00
|
|
|
ctx.Logger.Debugf("Mark authentication attempt made by user %s", bodyJSON.Username)
|
|
|
|
ctx.Providers.Regulator.Mark(bodyJSON.Username, false)
|
|
|
|
|
2019-11-16 19:50:58 +00:00
|
|
|
ctx.ReplyError(fmt.Errorf("Credentials are wrong for user %s", bodyJSON.Username), authenticationFailedMessage)
|
2019-04-24 21:52:08 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.Logger.Debugf("Credentials validation of user %s is ok", bodyJSON.Username)
|
|
|
|
|
2019-11-30 14:33:45 +00:00
|
|
|
ctx.Logger.Debugf("Mark authentication attempt made by user %s", bodyJSON.Username)
|
|
|
|
err = ctx.Providers.Regulator.Mark(bodyJSON.Username, true)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
ctx.Error(fmt.Errorf("Unable to mark authentication: %s", err), authenticationFailedMessage)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-04-24 21:52:08 +00:00
|
|
|
// Reset all values from previous session before regenerating the cookie.
|
|
|
|
err = ctx.SaveSession(session.NewDefaultUserSession())
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
ctx.Error(fmt.Errorf("Unable to reset the session for user %s: %s", bodyJSON.Username, err), authenticationFailedMessage)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
err = ctx.Providers.SessionProvider.RegenerateSession(ctx.RequestCtx)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
ctx.Error(fmt.Errorf("Unable to regenerate session for user %s: %s", bodyJSON.Username, err), authenticationFailedMessage)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-01-17 02:36:18 +00:00
|
|
|
// set the cookie to expire in 1 year if "Remember me" was ticked.
|
2019-04-24 21:52:08 +00:00
|
|
|
if *bodyJSON.KeepMeLoggedIn {
|
2020-02-01 12:54:50 +00:00
|
|
|
err = ctx.Providers.SessionProvider.UpdateExpiration(ctx.RequestCtx, time.Duration(31556952*time.Second))
|
2019-04-24 21:52:08 +00:00
|
|
|
if err != nil {
|
|
|
|
ctx.Error(fmt.Errorf("Unable to update expiration timer for user %s: %s", bodyJSON.Username, err), authenticationFailedMessage)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the details of the given user from the user provider.
|
|
|
|
userDetails, err := ctx.Providers.UserProvider.GetDetails(bodyJSON.Username)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
ctx.Error(fmt.Errorf("Error while retrieving details from user %s: %s", bodyJSON.Username, err.Error()), authenticationFailedMessage)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-11-16 19:50:58 +00:00
|
|
|
ctx.Logger.Tracef("Details for user %s => groups: %s, emails %s", bodyJSON.Username, userDetails.Groups, userDetails.Emails)
|
2019-04-24 21:52:08 +00:00
|
|
|
|
|
|
|
// And set those information in the new session.
|
|
|
|
userSession := ctx.GetSession()
|
2020-03-15 07:10:25 +00:00
|
|
|
userSession.Username = userDetails.Username
|
2019-04-24 21:52:08 +00:00
|
|
|
userSession.Groups = userDetails.Groups
|
|
|
|
userSession.Emails = userDetails.Emails
|
|
|
|
userSession.AuthenticationLevel = authentication.OneFactor
|
|
|
|
userSession.LastActivity = time.Now().Unix()
|
2020-01-17 22:48:48 +00:00
|
|
|
userSession.KeepMeLoggedIn = *bodyJSON.KeepMeLoggedIn
|
2019-04-24 21:52:08 +00:00
|
|
|
err = ctx.SaveSession(userSession)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
ctx.Error(fmt.Errorf("Unable to save session of user %s", bodyJSON.Username), authenticationFailedMessage)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-02-04 21:18:02 +00:00
|
|
|
Handle1FAResponse(ctx, bodyJSON.TargetURL, userSession.Username, userSession.Groups)
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|