blob: 4c7a2d427082db935154b495b293d01e3f9021d3 [file] [log] [blame]
Ed Tanous8041f312017-04-03 09:47:01 -07001#include <boost/algorithm/string/predicate.hpp>
Ed Tanous1ccd57c2017-03-21 13:15:58 -07002#include <random>
Ed Tanousf9273472017-02-28 16:05:13 -08003#include <unordered_map>
Ed Tanousf9273472017-02-28 16:05:13 -08004
Ed Tanous1ccd57c2017-03-21 13:15:58 -07005#include <crow/logging.h>
Ed Tanousc4771fb2017-03-13 13:39:49 -07006#include <base64.hpp>
Ed Tanous8041f312017-04-03 09:47:01 -07007#include <token_authorization_middleware.hpp>
Ed Tanousf9273472017-02-28 16:05:13 -08008
Ed Tanousc4771fb2017-03-13 13:39:49 -07009namespace crow {
10
Ed Tanous8041f312017-04-03 09:47:01 -070011using random_bytes_engine =
12 std::independent_bits_engine<std::default_random_engine, CHAR_BIT,
13 unsigned char>;
Ed Tanousc4771fb2017-03-13 13:39:49 -070014
Ed Tanous8041f312017-04-03 09:47:01 -070015TokenAuthorizationMiddleware::TokenAuthorizationMiddleware()
16 : auth_token2(""){
Ed Tanousf9273472017-02-28 16:05:13 -080017
Ed Tanous8041f312017-04-03 09:47:01 -070018 };
19
20void TokenAuthorizationMiddleware::before_handle(crow::request& req,
21 response& res, context& ctx) {
Ed Tanous99923322017-03-03 14:21:24 -080022 auto return_unauthorized = [&req, &res]() {
23 res.code = 401;
24 res.end();
25 };
Ed Tanous1ccd57c2017-03-21 13:15:58 -070026
Ed Tanous1e94fa42017-04-03 13:41:19 -070027 auto return_bad_request = [&req, &res]() {
28 res.code = 400;
29 res.end();
30 };
31
Ed Tanous8041f312017-04-03 09:47:01 -070032 LOG(DEBUG) << "Token Auth Got route " << req.url;
Ed Tanous1ccd57c2017-03-21 13:15:58 -070033
Ed Tanous8041f312017-04-03 09:47:01 -070034 if (req.url == "/" || boost::starts_with(req.url, "/static/")) {
35 // TODO this is total hackery to allow the login page to work before the
36 // user is authenticated. Also, it will be quite slow for all pages instead
37 // of a one time hit for the whitelist entries. Ideally, this should be
38 // done
39 // in the url router handler, with tagged routes for the whitelist entries.
Ed Tanous1ccd57c2017-03-21 13:15:58 -070040 // Another option would be to whitelist a minimal
Ed Tanous9b65f1f2017-03-07 15:17:13 -080041 return;
42 }
43
Ed Tanous99923322017-03-03 14:21:24 -080044 if (req.url == "/login") {
Ed Tanous8041f312017-04-03 09:47:01 -070045 if (req.method != HTTPMethod::POST) {
Ed Tanousc4771fb2017-03-13 13:39:49 -070046 return_unauthorized();
47 return;
48 } else {
49 auto login_credentials = crow::json::load(req.body);
Ed Tanous8041f312017-04-03 09:47:01 -070050 if (!login_credentials) {
Ed Tanous1e94fa42017-04-03 13:41:19 -070051 return_bad_request();
52 return;
53 }
Ed Tanous1ff48782017-04-18 12:45:08 -070054 if (!login_credentials.has("username") ||
55 !login_credentials.has("password")) {
Ed Tanous1e94fa42017-04-03 13:41:19 -070056 return_bad_request();
Ed Tanousc4771fb2017-03-13 13:39:49 -070057 return;
58 }
59 auto username = login_credentials["username"].s();
60 auto password = login_credentials["password"].s();
Ed Tanous8041f312017-04-03 09:47:01 -070061
Ed Tanous1ccd57c2017-03-21 13:15:58 -070062 // TODO(ed) pull real passwords from PAM
Ed Tanous8041f312017-04-03 09:47:01 -070063 if (username == "dude" && password == "dude") {
64 // TODO(ed) the RNG should be initialized at start, not every time we
65 // want a token
Ed Tanousc4771fb2017-03-13 13:39:49 -070066 std::random_device rand;
67 random_bytes_engine rbe;
68 std::string token('a', 20);
Ed Tanous1ff48782017-04-18 12:45:08 -070069 // TODO(ed) for some reason clang-tidy finds a divide by zero error in
70 // cstdlibc here
Ed Tanous93f987d2017-04-17 17:52:36 -070071 // commented out for now. Needs investigation
72 std::generate(begin(token), end(token), std::ref(rbe)); // NOLINT
Ed Tanousc4771fb2017-03-13 13:39:49 -070073 std::string encoded_token;
74 base64::base64_encode(token, encoded_token);
75 ctx.auth_token = encoded_token;
76 this->auth_token2 = encoded_token;
Ed Tanous8041f312017-04-03 09:47:01 -070077 crow::json::wvalue x;
78 auto auth_token = ctx.auth_token;
79 x["token"] = auth_token;
80
81 res.write(json::dump(x));
Ed Tanousb4a7bfa2017-04-04 17:23:00 -070082 res.add_header("Content-Type", "application/json");
Ed Tanous8041f312017-04-03 09:47:01 -070083 res.end();
Ed Tanousc4771fb2017-03-13 13:39:49 -070084 } else {
85 return_unauthorized();
86 return;
87 }
88 }
Ed Tanous8041f312017-04-03 09:47:01 -070089
Ed Tanousc4771fb2017-03-13 13:39:49 -070090 } else if (req.url == "/logout") {
91 this->auth_token2 = "";
Ed Tanous8041f312017-04-03 09:47:01 -070092 res.code = 200;
93 res.end();
94 } else { // Normal, non login, non static file request
Ed Tanousc4771fb2017-03-13 13:39:49 -070095 // Check to make sure we're logged in
Ed Tanous8041f312017-04-03 09:47:01 -070096 if (this->auth_token2.empty()) {
Ed Tanousc4771fb2017-03-13 13:39:49 -070097 return_unauthorized();
98 return;
99 }
100 // Check for an authorization header, reject if not present
101 if (req.headers.count("Authorization") != 1) {
102 return_unauthorized();
103 return;
104 }
105
106 std::string auth_header = req.get_header_value("Authorization");
107 // If the user is attempting any kind of auth other than token, reject
108 if (!boost::starts_with(auth_header, "Token ")) {
109 return_unauthorized();
110 return;
111 }
112
Ed Tanous8041f312017-04-03 09:47:01 -0700113 // TODO(ed), use span here instead of constructing a new string
114 if (auth_header.substr(6) != this->auth_token2) {
Ed Tanousc4771fb2017-03-13 13:39:49 -0700115 return_unauthorized();
116 return;
117 }
Ed Tanous1ccd57c2017-03-21 13:15:58 -0700118 // else let the request continue unharmed
Ed Tanous99923322017-03-03 14:21:24 -0800119 }
120}
Ed Tanousf9273472017-02-28 16:05:13 -0800121
Ed Tanous8041f312017-04-03 09:47:01 -0700122void TokenAuthorizationMiddleware::after_handle(request& req, response& res,
123 context& ctx) {}
Ed Tanousc4771fb2017-03-13 13:39:49 -0700124}