2020-05-18 12:06:36 +02:00
|
|
|
package eventstore
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"time"
|
|
|
|
|
2020-06-05 07:50:04 +02:00
|
|
|
"github.com/caos/logging"
|
|
|
|
|
2020-05-18 12:06:36 +02:00
|
|
|
"github.com/caos/zitadel/internal/auth/repository/eventsourcing/view"
|
|
|
|
"github.com/caos/zitadel/internal/auth_request/model"
|
2020-06-05 07:50:04 +02:00
|
|
|
cache "github.com/caos/zitadel/internal/auth_request/repository"
|
2020-05-18 12:06:36 +02:00
|
|
|
"github.com/caos/zitadel/internal/errors"
|
2020-06-05 07:50:04 +02:00
|
|
|
es_models "github.com/caos/zitadel/internal/eventstore/models"
|
2020-05-18 12:06:36 +02:00
|
|
|
"github.com/caos/zitadel/internal/id"
|
|
|
|
user_model "github.com/caos/zitadel/internal/user/model"
|
|
|
|
user_event "github.com/caos/zitadel/internal/user/repository/eventsourcing"
|
2020-06-05 07:50:04 +02:00
|
|
|
es_model "github.com/caos/zitadel/internal/user/repository/eventsourcing/model"
|
2020-05-18 12:06:36 +02:00
|
|
|
view_model "github.com/caos/zitadel/internal/user/repository/view/model"
|
|
|
|
)
|
|
|
|
|
|
|
|
type AuthRequestRepo struct {
|
|
|
|
UserEvents *user_event.UserEventstore
|
2020-06-05 07:50:04 +02:00
|
|
|
AuthRequests cache.AuthRequestCache
|
2020-05-18 12:06:36 +02:00
|
|
|
View *view.View
|
|
|
|
|
|
|
|
UserSessionViewProvider userSessionViewProvider
|
|
|
|
UserViewProvider userViewProvider
|
2020-06-05 07:50:04 +02:00
|
|
|
UserEventProvider userEventProvider
|
2020-05-18 12:06:36 +02:00
|
|
|
|
|
|
|
IdGenerator id.Generator
|
|
|
|
|
|
|
|
PasswordCheckLifeTime time.Duration
|
|
|
|
MfaInitSkippedLifeTime time.Duration
|
|
|
|
MfaSoftwareCheckLifeTime time.Duration
|
|
|
|
MfaHardwareCheckLifeTime time.Duration
|
|
|
|
}
|
|
|
|
|
|
|
|
type userSessionViewProvider interface {
|
|
|
|
UserSessionByIDs(string, string) (*view_model.UserSessionView, error)
|
|
|
|
UserSessionsByAgentID(string) ([]*view_model.UserSessionView, error)
|
|
|
|
}
|
|
|
|
type userViewProvider interface {
|
|
|
|
UserByID(string) (*view_model.UserView, error)
|
|
|
|
}
|
|
|
|
|
2020-06-05 07:50:04 +02:00
|
|
|
type userEventProvider interface {
|
|
|
|
UserEventsByID(ctx context.Context, id string, sequence uint64) ([]*es_models.Event, error)
|
|
|
|
}
|
|
|
|
|
2020-05-18 12:06:36 +02:00
|
|
|
func (repo *AuthRequestRepo) Health(ctx context.Context) error {
|
|
|
|
if err := repo.UserEvents.Health(ctx); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return repo.AuthRequests.Health(ctx)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (repo *AuthRequestRepo) CreateAuthRequest(ctx context.Context, request *model.AuthRequest) (*model.AuthRequest, error) {
|
|
|
|
reqID, err := repo.IdGenerator.Next()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
request.ID = reqID
|
2020-06-05 07:50:04 +02:00
|
|
|
ids, err := repo.View.AppIDsFromProjectByClientID(ctx, request.ApplicationID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
request.Audience = ids
|
2020-05-18 12:06:36 +02:00
|
|
|
err = repo.AuthRequests.SaveAuthRequest(ctx, request)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return request, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (repo *AuthRequestRepo) AuthRequestByID(ctx context.Context, id string) (*model.AuthRequest, error) {
|
2020-06-05 07:50:04 +02:00
|
|
|
return repo.getAuthRequest(ctx, id, false)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (repo *AuthRequestRepo) AuthRequestByIDCheckLoggedIn(ctx context.Context, id string) (*model.AuthRequest, error) {
|
|
|
|
return repo.getAuthRequest(ctx, id, true)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (repo *AuthRequestRepo) SaveAuthCode(ctx context.Context, id, code string) error {
|
2020-05-18 12:06:36 +02:00
|
|
|
request, err := repo.AuthRequests.GetAuthRequestByID(ctx, id)
|
2020-06-05 07:50:04 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
request.Code = code
|
|
|
|
return repo.AuthRequests.UpdateAuthRequest(ctx, request)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (repo *AuthRequestRepo) AuthRequestByCode(ctx context.Context, code string) (*model.AuthRequest, error) {
|
|
|
|
request, err := repo.AuthRequests.GetAuthRequestByCode(ctx, code)
|
2020-05-18 12:06:36 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-06-05 07:50:04 +02:00
|
|
|
steps, err := repo.nextSteps(ctx, request, true)
|
2020-05-18 12:06:36 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
request.PossibleSteps = steps
|
|
|
|
return request, nil
|
|
|
|
}
|
|
|
|
|
2020-06-05 07:50:04 +02:00
|
|
|
func (repo *AuthRequestRepo) DeleteAuthRequest(ctx context.Context, id string) error {
|
|
|
|
return repo.AuthRequests.DeleteAuthRequest(ctx, id)
|
|
|
|
}
|
|
|
|
|
2020-05-18 12:06:36 +02:00
|
|
|
func (repo *AuthRequestRepo) CheckUsername(ctx context.Context, id, username string) error {
|
|
|
|
request, err := repo.AuthRequests.GetAuthRequestByID(ctx, id)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
user, err := repo.View.UserByUsername(username)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-06-05 07:50:04 +02:00
|
|
|
request.SetUserInfo(user.ID, user.UserName, user.ResourceOwner)
|
|
|
|
return repo.AuthRequests.UpdateAuthRequest(ctx, request)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (repo *AuthRequestRepo) SelectUser(ctx context.Context, id, userID string) error {
|
|
|
|
request, err := repo.AuthRequests.GetAuthRequestByID(ctx, id)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
user, err := repo.View.UserByID(userID)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
request.SetUserInfo(user.ID, user.UserName, user.ResourceOwner)
|
|
|
|
return repo.AuthRequests.UpdateAuthRequest(ctx, request)
|
2020-05-18 12:06:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (repo *AuthRequestRepo) VerifyPassword(ctx context.Context, id, userID, password string, info *model.BrowserInfo) error {
|
|
|
|
request, err := repo.AuthRequests.GetAuthRequestByID(ctx, id)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-06-05 07:50:04 +02:00
|
|
|
if request.UserID != userID {
|
|
|
|
return errors.ThrowPreconditionFailed(nil, "EVENT-ds35D", "user id does not match request id")
|
2020-05-18 12:06:36 +02:00
|
|
|
}
|
|
|
|
return repo.UserEvents.CheckPassword(ctx, userID, password, request.WithCurrentInfo(info))
|
|
|
|
}
|
|
|
|
|
|
|
|
func (repo *AuthRequestRepo) VerifyMfaOTP(ctx context.Context, authRequestID, userID string, code string, info *model.BrowserInfo) error {
|
|
|
|
request, err := repo.AuthRequests.GetAuthRequestByID(ctx, authRequestID)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if request.UserID != userID {
|
|
|
|
return errors.ThrowPreconditionFailed(nil, "EVENT-ADJ26", "user id does not match request id")
|
|
|
|
}
|
|
|
|
return repo.UserEvents.CheckMfaOTP(ctx, userID, code, request.WithCurrentInfo(info))
|
|
|
|
}
|
|
|
|
|
2020-06-05 07:50:04 +02:00
|
|
|
func (repo *AuthRequestRepo) getAuthRequest(ctx context.Context, id string, checkLoggedIn bool) (*model.AuthRequest, error) {
|
|
|
|
request, err := repo.AuthRequests.GetAuthRequestByID(ctx, id)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
steps, err := repo.nextSteps(ctx, request, checkLoggedIn)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
request.PossibleSteps = steps
|
|
|
|
return request, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (repo *AuthRequestRepo) nextSteps(ctx context.Context, request *model.AuthRequest, checkLoggedIn bool) ([]model.NextStep, error) {
|
2020-05-18 12:06:36 +02:00
|
|
|
if request == nil {
|
|
|
|
return nil, errors.ThrowInvalidArgument(nil, "EVENT-ds27a", "request must not be nil")
|
|
|
|
}
|
|
|
|
steps := make([]model.NextStep, 0)
|
2020-06-05 07:50:04 +02:00
|
|
|
if !checkLoggedIn && request.Prompt == model.PromptNone {
|
|
|
|
return append(steps, &model.RedirectToCallbackStep{}), nil
|
|
|
|
}
|
2020-05-18 12:06:36 +02:00
|
|
|
if request.UserID == "" {
|
2020-06-05 07:50:04 +02:00
|
|
|
steps = append(steps, &model.LoginStep{})
|
2020-05-18 12:06:36 +02:00
|
|
|
if request.Prompt == model.PromptSelectAccount {
|
|
|
|
users, err := repo.usersForUserSelection(request)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
steps = append(steps, &model.SelectUserStep{Users: users})
|
|
|
|
}
|
|
|
|
return steps, nil
|
|
|
|
}
|
2020-06-05 07:50:04 +02:00
|
|
|
user, err := userByID(ctx, repo.UserViewProvider, repo.UserEventProvider, request.UserID)
|
2020-05-18 12:06:36 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-06-05 07:50:04 +02:00
|
|
|
userSession, err := userSessionByIDs(ctx, repo.UserSessionViewProvider, repo.UserEventProvider, request.AgentID, user)
|
2020-05-18 12:06:36 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2020-06-05 07:50:04 +02:00
|
|
|
if user.InitRequired {
|
|
|
|
return append(steps, &model.InitUserStep{PasswordSet: user.PasswordSet}), nil
|
|
|
|
}
|
2020-05-18 12:06:36 +02:00
|
|
|
if !user.PasswordSet {
|
|
|
|
return append(steps, &model.InitPasswordStep{}), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if !checkVerificationTime(userSession.PasswordVerification, repo.PasswordCheckLifeTime) {
|
|
|
|
return append(steps, &model.PasswordStep{}), nil
|
|
|
|
}
|
2020-06-05 07:50:04 +02:00
|
|
|
request.PasswordVerified = true
|
|
|
|
request.AuthTime = userSession.PasswordVerification
|
2020-05-18 12:06:36 +02:00
|
|
|
|
|
|
|
if step, ok := repo.mfaChecked(userSession, request, user); !ok {
|
|
|
|
return append(steps, step), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if user.PasswordChangeRequired {
|
|
|
|
steps = append(steps, &model.ChangePasswordStep{})
|
|
|
|
}
|
|
|
|
if !user.IsEmailVerified {
|
|
|
|
steps = append(steps, &model.VerifyEMailStep{})
|
|
|
|
}
|
|
|
|
|
|
|
|
if user.PasswordChangeRequired || !user.IsEmailVerified {
|
|
|
|
return steps, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
//PLANNED: consent step
|
|
|
|
return append(steps, &model.RedirectToCallbackStep{}), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (repo *AuthRequestRepo) usersForUserSelection(request *model.AuthRequest) ([]model.UserSelection, error) {
|
|
|
|
userSessions, err := userSessionsByUserAgentID(repo.UserSessionViewProvider, request.AgentID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
users := make([]model.UserSelection, len(userSessions))
|
|
|
|
for i, session := range userSessions {
|
|
|
|
users[i] = model.UserSelection{
|
|
|
|
UserID: session.UserID,
|
|
|
|
UserName: session.UserName,
|
|
|
|
UserSessionState: session.State,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return users, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (repo *AuthRequestRepo) mfaChecked(userSession *user_model.UserSessionView, request *model.AuthRequest, user *user_model.UserView) (model.NextStep, bool) {
|
|
|
|
mfaLevel := request.MfaLevel()
|
2020-06-05 07:50:04 +02:00
|
|
|
promptRequired := user.MfaMaxSetUp < mfaLevel
|
|
|
|
if promptRequired || !repo.mfaSkippedOrSetUp(user) {
|
2020-05-18 12:06:36 +02:00
|
|
|
return &model.MfaPromptStep{
|
2020-06-05 07:50:04 +02:00
|
|
|
Required: promptRequired,
|
2020-05-18 12:06:36 +02:00
|
|
|
MfaProviders: user.MfaTypesSetupPossible(mfaLevel),
|
|
|
|
}, false
|
|
|
|
}
|
|
|
|
switch mfaLevel {
|
|
|
|
default:
|
|
|
|
fallthrough
|
2020-06-05 07:50:04 +02:00
|
|
|
case model.MfaLevelNotSetUp:
|
|
|
|
if user.MfaMaxSetUp == model.MfaLevelNotSetUp {
|
|
|
|
return nil, true
|
|
|
|
}
|
|
|
|
fallthrough
|
2020-05-18 12:06:36 +02:00
|
|
|
case model.MfaLevelSoftware:
|
|
|
|
if checkVerificationTime(userSession.MfaSoftwareVerification, repo.MfaSoftwareCheckLifeTime) {
|
2020-06-05 07:50:04 +02:00
|
|
|
request.MfasVerified = append(request.MfasVerified, userSession.MfaSoftwareVerificationType)
|
|
|
|
request.AuthTime = userSession.MfaSoftwareVerification
|
2020-05-18 12:06:36 +02:00
|
|
|
return nil, true
|
|
|
|
}
|
|
|
|
fallthrough
|
|
|
|
case model.MfaLevelHardware:
|
|
|
|
if checkVerificationTime(userSession.MfaHardwareVerification, repo.MfaHardwareCheckLifeTime) {
|
2020-06-05 07:50:04 +02:00
|
|
|
request.MfasVerified = append(request.MfasVerified, userSession.MfaHardwareVerificationType)
|
|
|
|
request.AuthTime = userSession.MfaHardwareVerification
|
2020-05-18 12:06:36 +02:00
|
|
|
return nil, true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return &model.MfaVerificationStep{
|
|
|
|
MfaProviders: user.MfaTypesAllowed(mfaLevel),
|
|
|
|
}, false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (repo *AuthRequestRepo) mfaSkippedOrSetUp(user *user_model.UserView) bool {
|
2020-06-05 07:50:04 +02:00
|
|
|
if user.MfaMaxSetUp > model.MfaLevelNotSetUp {
|
2020-05-18 12:06:36 +02:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
return checkVerificationTime(user.MfaInitSkipped, repo.MfaInitSkippedLifeTime)
|
|
|
|
}
|
|
|
|
|
|
|
|
func checkVerificationTime(verificationTime time.Time, lifetime time.Duration) bool {
|
|
|
|
return verificationTime.Add(lifetime).After(time.Now().UTC())
|
|
|
|
}
|
|
|
|
|
|
|
|
func userSessionsByUserAgentID(provider userSessionViewProvider, agentID string) ([]*user_model.UserSessionView, error) {
|
|
|
|
session, err := provider.UserSessionsByAgentID(agentID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return view_model.UserSessionsToModel(session), nil
|
|
|
|
}
|
|
|
|
|
2020-06-05 07:50:04 +02:00
|
|
|
func userSessionByIDs(ctx context.Context, provider userSessionViewProvider, eventProvider userEventProvider, agentID string, user *user_model.UserView) (*user_model.UserSessionView, error) {
|
|
|
|
session, err := provider.UserSessionByIDs(agentID, user.ID)
|
2020-05-18 12:06:36 +02:00
|
|
|
if err != nil {
|
2020-06-05 07:50:04 +02:00
|
|
|
if !errors.IsNotFound(err) {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
session = &view_model.UserSessionView{}
|
|
|
|
}
|
|
|
|
events, err := eventProvider.UserEventsByID(ctx, user.ID, session.Sequence)
|
|
|
|
if err != nil {
|
|
|
|
logging.Log("EVENT-Hse6s").WithError(err).Debug("error retrieving new events")
|
|
|
|
return view_model.UserSessionToModel(session), nil
|
|
|
|
}
|
|
|
|
sessionCopy := *session
|
|
|
|
for _, event := range events {
|
|
|
|
switch event.Type {
|
|
|
|
case es_model.UserPasswordCheckSucceeded,
|
|
|
|
es_model.UserPasswordCheckFailed,
|
|
|
|
es_model.MfaOtpCheckSucceeded,
|
|
|
|
es_model.MfaOtpCheckFailed:
|
|
|
|
eventData, err := view_model.UserSessionFromEvent(event)
|
|
|
|
if err != nil {
|
|
|
|
logging.Log("EVENT-sdgT3").WithError(err).Debug("error getting event data")
|
|
|
|
return view_model.UserSessionToModel(session), nil
|
|
|
|
}
|
|
|
|
if eventData.UserAgentID != agentID {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
sessionCopy.AppendEvent(event)
|
2020-05-18 12:06:36 +02:00
|
|
|
}
|
2020-06-05 07:50:04 +02:00
|
|
|
return view_model.UserSessionToModel(&sessionCopy), nil
|
2020-05-18 12:06:36 +02:00
|
|
|
}
|
|
|
|
|
2020-06-05 07:50:04 +02:00
|
|
|
func userByID(ctx context.Context, viewProvider userViewProvider, eventProvider userEventProvider, userID string) (*user_model.UserView, error) {
|
|
|
|
user, err := viewProvider.UserByID(userID)
|
2020-05-18 12:06:36 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-06-05 07:50:04 +02:00
|
|
|
events, err := eventProvider.UserEventsByID(ctx, userID, user.Sequence)
|
|
|
|
if err != nil {
|
|
|
|
logging.Log("EVENT-dfg42").WithError(err).Debug("error retrieving new events")
|
|
|
|
return view_model.UserToModel(user), nil
|
|
|
|
}
|
|
|
|
userCopy := *user
|
|
|
|
for _, event := range events {
|
|
|
|
if err := userCopy.AppendEvent(event); err != nil {
|
|
|
|
return view_model.UserToModel(user), nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return view_model.UserToModel(&userCopy), nil
|
2020-05-18 12:06:36 +02:00
|
|
|
}
|