2019-04-25 04:52:08 +07:00
|
|
|
package handlers
|
|
|
|
|
|
|
|
import (
|
2021-11-29 10:09:14 +07:00
|
|
|
"errors"
|
2019-04-25 04:52:08 +07:00
|
|
|
"time"
|
|
|
|
|
2022-03-13 09:51:23 +07:00
|
|
|
"github.com/authelia/authelia/v4/internal/configuration/schema"
|
2021-08-11 08:04:35 +07:00
|
|
|
"github.com/authelia/authelia/v4/internal/middlewares"
|
|
|
|
"github.com/authelia/authelia/v4/internal/regulation"
|
|
|
|
"github.com/authelia/authelia/v4/internal/session"
|
2019-04-25 04:52:08 +07:00
|
|
|
)
|
|
|
|
|
2022-04-08 11:13:47 +07:00
|
|
|
// FirstFactorPOST is the handler performing the first factory.
|
2020-05-05 02:39:25 +07:00
|
|
|
//nolint:gocyclo // TODO: Consider refactoring time permitting.
|
2022-04-08 11:13:47 +07:00
|
|
|
func FirstFactorPOST(delayFunc middlewares.TimingAttackDelayFunc) middlewares.RequestHandler {
|
2020-05-21 05:03:15 +07:00
|
|
|
return func(ctx *middlewares.AutheliaCtx) {
|
|
|
|
var successful bool
|
2019-04-25 04:52:08 +07:00
|
|
|
|
2020-05-21 05:03:15 +07:00
|
|
|
requestTime := time.Now()
|
|
|
|
|
2022-01-21 06:46:13 +07:00
|
|
|
if delayFunc != nil {
|
2022-06-14 14:20:13 +07:00
|
|
|
defer delayFunc(ctx, requestTime, &successful)
|
2020-05-21 05:03:15 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
bodyJSON := firstFactorRequestBody{}
|
|
|
|
|
2021-11-29 10:09:14 +07:00
|
|
|
if err := ctx.ParseBody(&bodyJSON); err != nil {
|
|
|
|
ctx.Logger.Errorf(logFmtErrParseRequestBody, regulation.AuthType1FA, err)
|
|
|
|
|
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
|
|
|
|
2019-11-30 23:49:52 +07:00
|
|
|
return
|
|
|
|
}
|
2020-05-06 02:35:32 +07:00
|
|
|
|
2021-11-29 10:09:14 +07:00
|
|
|
if bannedUntil, err := ctx.Providers.Regulator.Regulate(ctx, bodyJSON.Username); err != nil {
|
|
|
|
if errors.Is(err, regulation.ErrUserIsBanned) {
|
|
|
|
_ = markAuthenticationAttempt(ctx, false, &bannedUntil, bodyJSON.Username, regulation.AuthType1FA, nil)
|
|
|
|
|
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
2020-05-06 02:35:32 +07:00
|
|
|
|
2020-05-21 05:03:15 +07:00
|
|
|
return
|
|
|
|
}
|
2019-04-25 04:52:08 +07:00
|
|
|
|
2021-11-29 10:09:14 +07:00
|
|
|
ctx.Logger.Errorf(logFmtErrRegulationFail, regulation.AuthType1FA, bodyJSON.Username, err)
|
|
|
|
|
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
2019-04-25 04:52:08 +07:00
|
|
|
|
2020-05-21 05:03:15 +07:00
|
|
|
return
|
|
|
|
}
|
2019-11-25 03:27:59 +07:00
|
|
|
|
2020-05-21 05:03:15 +07:00
|
|
|
userPasswordOk, err := ctx.Providers.UserProvider.CheckUserPassword(bodyJSON.Username, bodyJSON.Password)
|
|
|
|
if err != nil {
|
2021-11-29 10:09:14 +07:00
|
|
|
_ = markAuthenticationAttempt(ctx, false, nil, bodyJSON.Username, regulation.AuthType1FA, err)
|
2020-12-16 08:47:31 +07:00
|
|
|
|
2021-11-29 10:09:14 +07:00
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
2019-11-30 23:49:52 +07:00
|
|
|
|
2020-05-21 05:03:15 +07:00
|
|
|
return
|
|
|
|
}
|
2020-05-06 04:27:38 +07:00
|
|
|
|
2020-05-21 05:03:15 +07:00
|
|
|
if !userPasswordOk {
|
2021-11-29 10:09:14 +07:00
|
|
|
_ = markAuthenticationAttempt(ctx, false, nil, bodyJSON.Username, regulation.AuthType1FA, nil)
|
2019-04-25 04:52:08 +07:00
|
|
|
|
2021-11-29 10:09:14 +07:00
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
2019-04-25 04:52:08 +07:00
|
|
|
|
2020-05-21 05:03:15 +07:00
|
|
|
return
|
|
|
|
}
|
2019-11-30 21:33:45 +07:00
|
|
|
|
2021-11-29 10:09:14 +07:00
|
|
|
if err = markAuthenticationAttempt(ctx, true, nil, bodyJSON.Username, regulation.AuthType1FA, nil); err != nil {
|
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
2019-04-25 04:52:08 +07:00
|
|
|
|
2020-05-21 05:03:15 +07:00
|
|
|
return
|
|
|
|
}
|
2019-04-25 04:52:08 +07:00
|
|
|
|
2021-05-05 05:06:05 +07:00
|
|
|
userSession := ctx.GetSession()
|
|
|
|
newSession := session.NewDefaultUserSession()
|
2022-04-07 12:33:53 +07:00
|
|
|
newSession.ConsentChallengeID = userSession.ConsentChallengeID
|
2021-05-05 05:06:05 +07:00
|
|
|
|
|
|
|
// Reset all values from previous session except OIDC workflow before regenerating the cookie.
|
2021-11-29 10:09:14 +07:00
|
|
|
if err = ctx.SaveSession(newSession); err != nil {
|
|
|
|
ctx.Logger.Errorf(logFmtErrSessionReset, regulation.AuthType1FA, bodyJSON.Username, err)
|
|
|
|
|
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
2019-04-25 04:52:08 +07:00
|
|
|
|
2020-05-21 05:03:15 +07:00
|
|
|
return
|
|
|
|
}
|
2019-04-25 04:52:08 +07:00
|
|
|
|
2021-11-29 10:09:14 +07:00
|
|
|
if err = ctx.Providers.SessionProvider.RegenerateSession(ctx.RequestCtx); err != nil {
|
|
|
|
ctx.Logger.Errorf(logFmtErrSessionRegenerate, regulation.AuthType1FA, bodyJSON.Username, err)
|
|
|
|
|
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
2020-04-04 06:11:33 +07:00
|
|
|
|
2019-04-25 04:52:08 +07:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-01-31 12:25:15 +07:00
|
|
|
// Check if bodyJSON.KeepMeLoggedIn can be deref'd and derive the value based on the configuration and JSON data.
|
2022-03-13 09:51:23 +07:00
|
|
|
keepMeLoggedIn := ctx.Providers.SessionProvider.RememberMe != schema.RememberMeDisabled && bodyJSON.KeepMeLoggedIn != nil && *bodyJSON.KeepMeLoggedIn
|
2019-04-25 04:52:08 +07:00
|
|
|
|
2022-01-31 12:25:15 +07:00
|
|
|
// Set the cookie to expire if remember me is enabled and the user has asked us to.
|
2020-05-21 05:03:15 +07:00
|
|
|
if keepMeLoggedIn {
|
|
|
|
err = ctx.Providers.SessionProvider.UpdateExpiration(ctx.RequestCtx, ctx.Providers.SessionProvider.RememberMe)
|
|
|
|
if err != nil {
|
2021-11-29 10:09:14 +07:00
|
|
|
ctx.Logger.Errorf(logFmtErrSessionSave, "updated expiration", regulation.AuthType1FA, bodyJSON.Username, err)
|
|
|
|
|
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
|
|
|
|
2020-05-21 05:03:15 +07:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2019-04-25 04:52:08 +07:00
|
|
|
|
2020-05-21 05:03:15 +07:00
|
|
|
// Get the details of the given user from the user provider.
|
|
|
|
userDetails, err := ctx.Providers.UserProvider.GetDetails(bodyJSON.Username)
|
|
|
|
if err != nil {
|
2021-11-29 10:09:14 +07:00
|
|
|
ctx.Logger.Errorf(logFmtErrObtainProfileDetails, regulation.AuthType1FA, bodyJSON.Username, err)
|
|
|
|
|
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
|
|
|
|
2020-05-21 05:03:15 +07:00
|
|
|
return
|
|
|
|
}
|
2020-05-06 02:35:32 +07:00
|
|
|
|
2021-11-29 10:09:14 +07:00
|
|
|
ctx.Logger.Tracef(logFmtTraceProfileDetails, bodyJSON.Username, userDetails.Groups, userDetails.Emails)
|
2020-05-06 02:35:32 +07:00
|
|
|
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
userSession.SetOneFactor(ctx.Clock.Now(), userDetails, keepMeLoggedIn)
|
|
|
|
|
|
|
|
if refresh, refreshInterval := getProfileRefreshSettings(ctx.Configuration.AuthenticationBackend); refresh {
|
2020-05-21 05:03:15 +07:00
|
|
|
userSession.RefreshTTL = ctx.Clock.Now().Add(refreshInterval)
|
|
|
|
}
|
2019-04-25 04:52:08 +07:00
|
|
|
|
2021-11-29 10:09:14 +07:00
|
|
|
if err = ctx.SaveSession(userSession); err != nil {
|
|
|
|
ctx.Logger.Errorf(logFmtErrSessionSave, "updated profile", regulation.AuthType1FA, bodyJSON.Username, err)
|
|
|
|
|
|
|
|
respondUnauthorized(ctx, messageAuthenticationFailed)
|
|
|
|
|
2020-05-21 05:03:15 +07:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
successful = true
|
|
|
|
|
2022-04-07 12:33:53 +07:00
|
|
|
if userSession.ConsentChallengeID != nil {
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
handleOIDCWorkflowResponse(ctx)
|
2021-05-05 05:06:05 +07:00
|
|
|
} else {
|
|
|
|
Handle1FAResponse(ctx, bodyJSON.TargetURL, bodyJSON.RequestMethod, userSession.Username, userSession.Groups)
|
|
|
|
}
|
2020-05-21 05:03:15 +07:00
|
|
|
}
|
2019-04-25 04:52:08 +07:00
|
|
|
}
|