|
|
|
use chrono::{NaiveDateTime, Utc};
|
|
|
|
use serde_json::Value as JsonValue;
|
|
|
|
|
|
|
|
use uuid::Uuid;
|
|
|
|
|
|
|
|
use crypto;
|
|
|
|
use CONFIG;
|
|
|
|
|
|
|
|
|
|
|
|
#[derive(Debug, Identifiable, Queryable, Insertable)]
|
|
|
|
#[table_name = "users"]
|
|
|
|
#[primary_key(uuid)]
|
|
|
|
pub struct User {
|
|
|
|
pub uuid: String,
|
|
|
|
pub created_at: NaiveDateTime,
|
|
|
|
pub updated_at: NaiveDateTime,
|
|
|
|
|
|
|
|
pub email: String,
|
|
|
|
pub name: String,
|
|
|
|
|
|
|
|
pub password_hash: Vec<u8>,
|
|
|
|
pub salt: Vec<u8>,
|
|
|
|
pub password_iterations: i32,
|
|
|
|
pub password_hint: Option<String>,
|
|
|
|
|
|
|
|
pub key: String,
|
|
|
|
pub private_key: Option<String>,
|
|
|
|
pub public_key: Option<String>,
|
|
|
|
|
|
|
|
pub totp_secret: Option<String>,
|
|
|
|
pub totp_recover: Option<String>,
|
|
|
|
|
|
|
|
pub security_stamp: String,
|
|
|
|
|
|
|
|
pub equivalent_domains: String,
|
|
|
|
pub excluded_globals: String,
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Local methods
|
|
|
|
impl User {
|
|
|
|
pub fn new(mail: String, key: String, password: String) -> Self {
|
|
|
|
let now = Utc::now().naive_utc();
|
|
|
|
let email = mail.to_lowercase();
|
|
|
|
|
|
|
|
let iterations = CONFIG.password_iterations;
|
|
|
|
let salt = crypto::get_random_64();
|
|
|
|
let password_hash = crypto::hash_password(password.as_bytes(), &salt, iterations as u32);
|
|
|
|
|
|
|
|
Self {
|
|
|
|
uuid: Uuid::new_v4().to_string(),
|
|
|
|
created_at: now,
|
|
|
|
updated_at: now,
|
|
|
|
name: email.clone(),
|
|
|
|
email,
|
|
|
|
key,
|
|
|
|
|
|
|
|
password_hash,
|
|
|
|
salt,
|
|
|
|
password_iterations: iterations,
|
|
|
|
|
|
|
|
security_stamp: Uuid::new_v4().to_string(),
|
|
|
|
|
|
|
|
password_hint: None,
|
|
|
|
private_key: None,
|
|
|
|
public_key: None,
|
|
|
|
|
|
|
|
totp_secret: None,
|
|
|
|
totp_recover: None,
|
|
|
|
|
|
|
|
equivalent_domains: "[]".to_string(),
|
|
|
|
excluded_globals: "[]".to_string(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn check_valid_password(&self, password: &str) -> bool {
|
|
|
|
crypto::verify_password_hash(password.as_bytes(),
|
|
|
|
&self.salt,
|
|
|
|
&self.password_hash,
|
|
|
|
self.password_iterations as u32)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn check_valid_recovery_code(&self, recovery_code: &str) -> bool {
|
|
|
|
if let Some(ref totp_recover) = self.totp_recover {
|
|
|
|
recovery_code == totp_recover.to_lowercase()
|
|
|
|
} else {
|
|
|
|
false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn set_password(&mut self, password: &str) {
|
|
|
|
self.password_hash = crypto::hash_password(password.as_bytes(),
|
|
|
|
&self.salt,
|
|
|
|
self.password_iterations as u32);
|
|
|
|
self.reset_security_stamp();
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn reset_security_stamp(&mut self) {
|
|
|
|
self.security_stamp = Uuid::new_v4().to_string();
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn requires_twofactor(&self) -> bool {
|
|
|
|
self.totp_secret.is_some()
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn check_totp_code(&self, totp_code: u64) -> bool {
|
|
|
|
if let Some(ref totp_secret) = self.totp_secret {
|
|
|
|
// Validate totp
|
|
|
|
use data_encoding::BASE32;
|
|
|
|
use oath::{totp_raw_now, HashType};
|
|
|
|
|
|
|
|
let decoded_secret = match BASE32.decode(totp_secret.as_bytes()) {
|
|
|
|
Ok(s) => s,
|
|
|
|
Err(_) => return false
|
|
|
|
};
|
|
|
|
|
|
|
|
let generated = totp_raw_now(&decoded_secret, 6, 0, 30, &HashType::SHA1);
|
|
|
|
generated == totp_code
|
|
|
|
} else {
|
|
|
|
true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
use diesel;
|
|
|
|
use diesel::prelude::*;
|
|
|
|
use db::DbConn;
|
|
|
|
use db::schema::users;
|
|
|
|
|
|
|
|
/// Database methods
|
|
|
|
impl User {
|
|
|
|
pub fn to_json(&self, conn: &DbConn) -> JsonValue {
|
|
|
|
use super::UserOrganization;
|
|
|
|
|
|
|
|
let orgs = UserOrganization::find_by_user(&self.uuid, conn);
|
|
|
|
let orgs_json: Vec<JsonValue> = orgs.iter().map(|c| c.to_json(&conn)).collect();
|
|
|
|
|
|
|
|
json!({
|
|
|
|
"Id": self.uuid,
|
|
|
|
"Name": self.name,
|
|
|
|
"Email": self.email,
|
|
|
|
"EmailVerified": true,
|
|
|
|
"Premium": true,
|
|
|
|
"MasterPasswordHint": self.password_hint,
|
|
|
|
"Culture": "en-US",
|
|
|
|
"TwoFactorEnabled": self.totp_secret.is_some(),
|
|
|
|
"Key": self.key,
|
|
|
|
"PrivateKey": self.private_key,
|
|
|
|
"SecurityStamp": self.security_stamp,
|
|
|
|
"Organizations": orgs_json,
|
|
|
|
"Object": "profile"
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
pub fn save(&mut self, conn: &DbConn) -> bool {
|
|
|
|
self.updated_at = Utc::now().naive_utc();
|
|
|
|
|
|
|
|
match diesel::replace_into(users::table) // Insert or update
|
|
|
|
.values(&*self)
|
|
|
|
.execute(&**conn) {
|
|
|
|
Ok(1) => true, // One row inserted
|
|
|
|
_ => false,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn delete(self, conn: &DbConn) -> bool {
|
|
|
|
match diesel::delete(users::table.filter(
|
|
|
|
users::uuid.eq(self.uuid)))
|
|
|
|
.execute(&**conn) {
|
|
|
|
Ok(1) => true, // One row deleted
|
|
|
|
_ => false,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn find_by_mail(mail: &str, conn: &DbConn) -> Option<Self> {
|
|
|
|
let lower_mail = mail.to_lowercase();
|
|
|
|
users::table
|
|
|
|
.filter(users::email.eq(lower_mail))
|
|
|
|
.first::<Self>(&**conn).ok()
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn find_by_uuid(uuid: &str, conn: &DbConn) -> Option<Self> {
|
|
|
|
users::table
|
|
|
|
.filter(users::uuid.eq(uuid))
|
|
|
|
.first::<Self>(&**conn).ok()
|
|
|
|
}
|
|
|
|
}
|