blob: 4bac9b4fb0eb9d2f386e73c6b9599919d525b173 [file] [log] [blame]
Ed Tanous1ccd57c2017-03-21 13:15:58 -07001#include <random>
Ed Tanousf9273472017-02-28 16:05:13 -08002#include <unordered_map>
Ed Tanous9140a672017-04-24 17:01:32 -07003#include <boost/algorithm/string/predicate.hpp>
Ed Tanousf9273472017-02-28 16:05:13 -08004
Ed Tanousc4771fb2017-03-13 13:39:49 -07005#include <base64.hpp>
Ed Tanous8041f312017-04-03 09:47:01 -07006#include <token_authorization_middleware.hpp>
Ed Tanous9140a672017-04-24 17:01:32 -07007#include <crow/logging.h>
Ed Tanousf9273472017-02-28 16:05:13 -08008
Ed Tanousc4771fb2017-03-13 13:39:49 -07009namespace crow {
10
Ed Tanous8041f312017-04-03 09:47:01 -070011using random_bytes_engine =
12 std::independent_bits_engine<std::default_random_engine, CHAR_BIT,
13 unsigned char>;
Ed Tanousc4771fb2017-03-13 13:39:49 -070014
Ed Tanous8041f312017-04-03 09:47:01 -070015TokenAuthorizationMiddleware::TokenAuthorizationMiddleware()
16 : auth_token2(""){
Ed Tanousf9273472017-02-28 16:05:13 -080017
Ed Tanous8041f312017-04-03 09:47:01 -070018 };
19
20void TokenAuthorizationMiddleware::before_handle(crow::request& req,
21 response& res, context& ctx) {
Ed Tanous99923322017-03-03 14:21:24 -080022 auto return_unauthorized = [&req, &res]() {
23 res.code = 401;
24 res.end();
25 };
Ed Tanous1ccd57c2017-03-21 13:15:58 -070026
Ed Tanous1e94fa42017-04-03 13:41:19 -070027 auto return_bad_request = [&req, &res]() {
28 res.code = 400;
29 res.end();
30 };
31
Ed Tanousd793bb42017-04-25 08:59:32 -070032 auto return_internal_error = [&req, &res]() {
33 res.code = 500;
34 res.end();
35 };
36
Ed Tanous8041f312017-04-03 09:47:01 -070037 if (req.url == "/" || boost::starts_with(req.url, "/static/")) {
38 // TODO this is total hackery to allow the login page to work before the
39 // user is authenticated. Also, it will be quite slow for all pages instead
40 // of a one time hit for the whitelist entries. Ideally, this should be
41 // done
42 // in the url router handler, with tagged routes for the whitelist entries.
Ed Tanous1ccd57c2017-03-21 13:15:58 -070043 // Another option would be to whitelist a minimal
Ed Tanous9b65f1f2017-03-07 15:17:13 -080044 return;
45 }
46
Ed Tanous99923322017-03-03 14:21:24 -080047 if (req.url == "/login") {
Ed Tanous8041f312017-04-03 09:47:01 -070048 if (req.method != HTTPMethod::POST) {
Ed Tanousc4771fb2017-03-13 13:39:49 -070049 return_unauthorized();
50 return;
51 } else {
52 auto login_credentials = crow::json::load(req.body);
Ed Tanous8041f312017-04-03 09:47:01 -070053 if (!login_credentials) {
Ed Tanous1e94fa42017-04-03 13:41:19 -070054 return_bad_request();
55 return;
56 }
Ed Tanous1ff48782017-04-18 12:45:08 -070057 if (!login_credentials.has("username") ||
58 !login_credentials.has("password")) {
Ed Tanous1e94fa42017-04-03 13:41:19 -070059 return_bad_request();
Ed Tanousc4771fb2017-03-13 13:39:49 -070060 return;
61 }
62 auto username = login_credentials["username"].s();
63 auto password = login_credentials["password"].s();
Ed Tanous8041f312017-04-03 09:47:01 -070064
Ed Tanous1ccd57c2017-03-21 13:15:58 -070065 // TODO(ed) pull real passwords from PAM
Ed Tanous8041f312017-04-03 09:47:01 -070066 if (username == "dude" && password == "dude") {
Ed Tanousd793bb42017-04-25 08:59:32 -070067 crow::json::wvalue x;
68
Ed Tanous8041f312017-04-03 09:47:01 -070069 // TODO(ed) the RNG should be initialized at start, not every time we
70 // want a token
Ed Tanousc4771fb2017-03-13 13:39:49 -070071 std::random_device rand;
72 random_bytes_engine rbe;
73 std::string token('a', 20);
Ed Tanous1ff48782017-04-18 12:45:08 -070074 // TODO(ed) for some reason clang-tidy finds a divide by zero error in
75 // cstdlibc here
Ed Tanous93f987d2017-04-17 17:52:36 -070076 // commented out for now. Needs investigation
77 std::generate(begin(token), end(token), std::ref(rbe)); // NOLINT
Ed Tanousc4771fb2017-03-13 13:39:49 -070078 std::string encoded_token;
79 base64::base64_encode(token, encoded_token);
80 ctx.auth_token = encoded_token;
81 this->auth_token2 = encoded_token;
Ed Tanousd793bb42017-04-25 08:59:32 -070082
Ed Tanous8041f312017-04-03 09:47:01 -070083 auto auth_token = ctx.auth_token;
84 x["token"] = auth_token;
85
86 res.write(json::dump(x));
Ed Tanousb4a7bfa2017-04-04 17:23:00 -070087 res.add_header("Content-Type", "application/json");
Ed Tanous8041f312017-04-03 09:47:01 -070088 res.end();
Ed Tanousc4771fb2017-03-13 13:39:49 -070089 } else {
90 return_unauthorized();
91 return;
92 }
93 }
Ed Tanous8041f312017-04-03 09:47:01 -070094
Ed Tanousc4771fb2017-03-13 13:39:49 -070095 } else if (req.url == "/logout") {
96 this->auth_token2 = "";
Ed Tanous8041f312017-04-03 09:47:01 -070097 res.code = 200;
98 res.end();
99 } else { // Normal, non login, non static file request
Ed Tanousc4771fb2017-03-13 13:39:49 -0700100 // Check to make sure we're logged in
Ed Tanous8041f312017-04-03 09:47:01 -0700101 if (this->auth_token2.empty()) {
Ed Tanousc4771fb2017-03-13 13:39:49 -0700102 return_unauthorized();
103 return;
104 }
105 // Check for an authorization header, reject if not present
106 if (req.headers.count("Authorization") != 1) {
107 return_unauthorized();
108 return;
109 }
110
111 std::string auth_header = req.get_header_value("Authorization");
112 // If the user is attempting any kind of auth other than token, reject
113 if (!boost::starts_with(auth_header, "Token ")) {
114 return_unauthorized();
115 return;
116 }
117
Ed Tanous8041f312017-04-03 09:47:01 -0700118 // TODO(ed), use span here instead of constructing a new string
119 if (auth_header.substr(6) != this->auth_token2) {
Ed Tanousc4771fb2017-03-13 13:39:49 -0700120 return_unauthorized();
121 return;
122 }
Ed Tanous1ccd57c2017-03-21 13:15:58 -0700123 // else let the request continue unharmed
Ed Tanous99923322017-03-03 14:21:24 -0800124 }
125}
Ed Tanousf9273472017-02-28 16:05:13 -0800126
Ed Tanous8041f312017-04-03 09:47:01 -0700127void TokenAuthorizationMiddleware::after_handle(request& req, response& res,
128 context& ctx) {}
Ed Tanousc4771fb2017-03-13 13:39:49 -0700129}