blob: 82a5bde33c8709d440b97392e7c9044926b896de [file] [log] [blame]
Ed Tanous8041f312017-04-03 09:47:01 -07001#include <boost/algorithm/string/predicate.hpp>
Ed Tanous1ccd57c2017-03-21 13:15:58 -07002#include <random>
Ed Tanousf9273472017-02-28 16:05:13 -08003#include <unordered_map>
Ed Tanousf9273472017-02-28 16:05:13 -08004
Ed Tanous1ccd57c2017-03-21 13:15:58 -07005#include <crow/logging.h>
Ed Tanousc4771fb2017-03-13 13:39:49 -07006#include <base64.hpp>
Ed Tanous8041f312017-04-03 09:47:01 -07007#include <token_authorization_middleware.hpp>
Ed Tanousf9273472017-02-28 16:05:13 -08008
Ed Tanousc4771fb2017-03-13 13:39:49 -07009namespace crow {
10
Ed Tanous8041f312017-04-03 09:47:01 -070011using random_bytes_engine =
12 std::independent_bits_engine<std::default_random_engine, CHAR_BIT,
13 unsigned char>;
Ed Tanousc4771fb2017-03-13 13:39:49 -070014
Ed Tanous8041f312017-04-03 09:47:01 -070015TokenAuthorizationMiddleware::TokenAuthorizationMiddleware()
16 : auth_token2(""){
Ed Tanousf9273472017-02-28 16:05:13 -080017
Ed Tanous8041f312017-04-03 09:47:01 -070018 };
19
20void TokenAuthorizationMiddleware::before_handle(crow::request& req,
21 response& res, context& ctx) {
Ed Tanous99923322017-03-03 14:21:24 -080022 auto return_unauthorized = [&req, &res]() {
23 res.code = 401;
24 res.end();
25 };
Ed Tanous1ccd57c2017-03-21 13:15:58 -070026
Ed Tanous1e94fa42017-04-03 13:41:19 -070027 auto return_bad_request = [&req, &res]() {
28 res.code = 400;
29 res.end();
30 };
31
Ed Tanous8041f312017-04-03 09:47:01 -070032 LOG(DEBUG) << "Token Auth Got route " << req.url;
Ed Tanous1ccd57c2017-03-21 13:15:58 -070033
Ed Tanous8041f312017-04-03 09:47:01 -070034 if (req.url == "/" || boost::starts_with(req.url, "/static/")) {
35 // TODO this is total hackery to allow the login page to work before the
36 // user is authenticated. Also, it will be quite slow for all pages instead
37 // of a one time hit for the whitelist entries. Ideally, this should be
38 // done
39 // in the url router handler, with tagged routes for the whitelist entries.
Ed Tanous1ccd57c2017-03-21 13:15:58 -070040 // Another option would be to whitelist a minimal
Ed Tanous9b65f1f2017-03-07 15:17:13 -080041 return;
42 }
43
Ed Tanous99923322017-03-03 14:21:24 -080044 if (req.url == "/login") {
Ed Tanous8041f312017-04-03 09:47:01 -070045 if (req.method != HTTPMethod::POST) {
Ed Tanousc4771fb2017-03-13 13:39:49 -070046 return_unauthorized();
47 return;
48 } else {
49 auto login_credentials = crow::json::load(req.body);
Ed Tanous8041f312017-04-03 09:47:01 -070050 if (!login_credentials) {
Ed Tanous1e94fa42017-04-03 13:41:19 -070051 return_bad_request();
52 return;
53 }
54 if (!login_credentials.has("username") || !login_credentials.has("password")){
55 return_bad_request();
Ed Tanousc4771fb2017-03-13 13:39:49 -070056 return;
57 }
58 auto username = login_credentials["username"].s();
59 auto password = login_credentials["password"].s();
Ed Tanous8041f312017-04-03 09:47:01 -070060
Ed Tanous1ccd57c2017-03-21 13:15:58 -070061 // TODO(ed) pull real passwords from PAM
Ed Tanous8041f312017-04-03 09:47:01 -070062 if (username == "dude" && password == "dude") {
63 // TODO(ed) the RNG should be initialized at start, not every time we
64 // want a token
Ed Tanousc4771fb2017-03-13 13:39:49 -070065 std::random_device rand;
66 random_bytes_engine rbe;
67 std::string token('a', 20);
Ed Tanous93f987d2017-04-17 17:52:36 -070068 // TODO(ed) for some reason clang-tidy finds a divide by zero error in cstdlibc here
69 // commented out for now. Needs investigation
70 std::generate(begin(token), end(token), std::ref(rbe)); // NOLINT
Ed Tanousc4771fb2017-03-13 13:39:49 -070071 std::string encoded_token;
72 base64::base64_encode(token, encoded_token);
73 ctx.auth_token = encoded_token;
74 this->auth_token2 = encoded_token;
Ed Tanous8041f312017-04-03 09:47:01 -070075 crow::json::wvalue x;
76 auto auth_token = ctx.auth_token;
77 x["token"] = auth_token;
78
79 res.write(json::dump(x));
Ed Tanousb4a7bfa2017-04-04 17:23:00 -070080 res.add_header("Content-Type", "application/json");
Ed Tanous8041f312017-04-03 09:47:01 -070081 res.end();
Ed Tanousc4771fb2017-03-13 13:39:49 -070082 } else {
83 return_unauthorized();
84 return;
85 }
86 }
Ed Tanous8041f312017-04-03 09:47:01 -070087
Ed Tanousc4771fb2017-03-13 13:39:49 -070088 } else if (req.url == "/logout") {
89 this->auth_token2 = "";
Ed Tanous8041f312017-04-03 09:47:01 -070090 res.code = 200;
91 res.end();
92 } else { // Normal, non login, non static file request
Ed Tanousc4771fb2017-03-13 13:39:49 -070093 // Check to make sure we're logged in
Ed Tanous8041f312017-04-03 09:47:01 -070094 if (this->auth_token2.empty()) {
Ed Tanousc4771fb2017-03-13 13:39:49 -070095 return_unauthorized();
96 return;
97 }
98 // Check for an authorization header, reject if not present
99 if (req.headers.count("Authorization") != 1) {
100 return_unauthorized();
101 return;
102 }
103
104 std::string auth_header = req.get_header_value("Authorization");
105 // If the user is attempting any kind of auth other than token, reject
106 if (!boost::starts_with(auth_header, "Token ")) {
107 return_unauthorized();
108 return;
109 }
110
Ed Tanous8041f312017-04-03 09:47:01 -0700111 // TODO(ed), use span here instead of constructing a new string
112 if (auth_header.substr(6) != this->auth_token2) {
Ed Tanousc4771fb2017-03-13 13:39:49 -0700113 return_unauthorized();
114 return;
115 }
Ed Tanous1ccd57c2017-03-21 13:15:58 -0700116 // else let the request continue unharmed
Ed Tanous99923322017-03-03 14:21:24 -0800117 }
118}
Ed Tanousf9273472017-02-28 16:05:13 -0800119
Ed Tanous8041f312017-04-03 09:47:01 -0700120void TokenAuthorizationMiddleware::after_handle(request& req, response& res,
121 context& ctx) {}
Ed Tanousc4771fb2017-03-13 13:39:49 -0700122}