kanidm/kanidm_tools/src/cli/login.rs

329 lines
11 KiB
Rust

use crate::LoginOpt;
use kanidm_client::{ClientError, KanidmClient};
use kanidm_proto::v1::{AuthAllowed, AuthResponse, AuthState};
use libc::umask;
use std::collections::BTreeMap;
use std::fs::{create_dir, File};
use std::io::ErrorKind;
use std::io::{self, BufReader, BufWriter};
use std::path::PathBuf;
use webauthn_authenticator_rs::{u2fhid::U2FHid, RequestChallengeResponse, WebauthnAuthenticator};
static TOKEN_DIR: &str = "~/.cache";
static TOKEN_PATH: &str = "~/.cache/kanidm_tokens";
pub fn read_tokens() -> Result<BTreeMap<String, String>, ()> {
let token_path = PathBuf::from(shellexpand::tilde(TOKEN_PATH).into_owned());
if !token_path.exists() {
debug!(
"Token cache file path {:?} does not exist, returning an empty token store.",
TOKEN_PATH
);
return Ok(BTreeMap::new());
}
debug!("Attempting to read tokens from {:?}", &token_path);
// If the file does not exist, return Ok<map>
let file = match File::open(&token_path) {
Ok(f) => f,
Err(e) => {
match e.kind() {
ErrorKind::PermissionDenied => {
// we bail here because you won't be able to write them back...
error!(
"Permission denied reading token store file {:?}",
&token_path
);
return Err(());
}
// other errors are OK to continue past
_ => {
warn!(
"Cannot read tokens from {} due to error: {:?} ... continuing.",
TOKEN_PATH, e
);
return Ok(BTreeMap::new());
}
};
}
};
let reader = BufReader::new(file);
// Else try to read
serde_json::from_reader(reader).map_err(|e| {
error!(
"JSON/IO error reading tokens from {:?} -> {:?}",
&token_path, e
);
})
}
pub fn write_tokens(tokens: &BTreeMap<String, String>) -> Result<(), ()> {
let token_dir = PathBuf::from(shellexpand::tilde(TOKEN_DIR).into_owned());
let token_path = PathBuf::from(shellexpand::tilde(TOKEN_PATH).into_owned());
token_dir
.parent()
.ok_or_else(|| {
error!(
"Parent directory to {} is invalid (root directory?).",
TOKEN_DIR
);
})
.and_then(|parent_dir| {
if parent_dir.exists() {
Ok(())
} else {
error!("Parent directory to {} does not exist.", TOKEN_DIR);
Err(())
}
})?;
if !token_dir.exists() {
create_dir(token_dir).map_err(|e| {
error!("Unable to create directory - {} {:?}", TOKEN_DIR, e);
})?;
}
// Take away group/everyone read/write
let before = unsafe { umask(0o177) };
let file = File::create(&token_path).map_err(|e| {
let _ = unsafe { umask(before) };
error!("Can not write to {} -> {:?}", TOKEN_PATH, e);
})?;
let _ = unsafe { umask(before) };
let writer = BufWriter::new(file);
serde_json::to_writer_pretty(writer, tokens).map_err(|e| {
error!(
"JSON/IO error writing tokens to file {:?} -> {:?}",
&token_path, e
);
})
}
fn get_index_choice(len: usize) -> Result<u8, ClientError> {
loop {
let mut buffer = String::new();
if let Err(e) = io::stdin().read_line(&mut buffer) {
eprintln!("Failed to read from stdin -> {:?}", e);
return Err(ClientError::SystemError);
};
let response = buffer.trim();
match u8::from_str_radix(response, 10) {
Ok(i) => {
if (i as usize) < len {
break Ok(i);
} else {
eprintln!("Choice must be less than {}", len);
}
}
Err(_) => eprintln!("Invalid Number"),
};
}
}
impl LoginOpt {
pub fn debug(&self) -> bool {
self.copt.debug
}
fn do_password(&self, client: &mut KanidmClient) -> Result<AuthResponse, ClientError> {
let password = match rpassword::prompt_password_stderr("Enter password: ") {
Ok(p) => p,
Err(e) => {
error!("Failed to create password prompt -- {:?}", e);
std::process::exit(1);
}
};
client.auth_step_password(password.as_str())
}
fn do_totp(&self, client: &mut KanidmClient) -> Result<AuthResponse, ClientError> {
let totp = loop {
println!("Enter TOTP: ");
let mut buffer = String::new();
if let Err(e) = io::stdin().read_line(&mut buffer) {
eprintln!("Failed to read from stdin -> {:?}", e);
return Err(ClientError::SystemError);
};
let response = buffer.trim();
match u32::from_str_radix(response, 10) {
Ok(i) => break i,
Err(_) => eprintln!("Invalid Number"),
};
};
client.auth_step_totp(totp)
}
fn do_webauthn(
&self,
client: &mut KanidmClient,
pkr: RequestChallengeResponse,
) -> Result<AuthResponse, ClientError> {
let mut wa = WebauthnAuthenticator::new(U2FHid::new());
println!("Your authenticator will now flash for you to interact with it.");
let auth = match wa.do_authentication(client.get_origin(), pkr) {
Ok(a) => a,
Err(e) => {
error!("Failed to interact with webauthn device. -- {:?}", e);
std::process::exit(1);
}
};
client.auth_step_webauthn_complete(auth)
}
pub fn exec(&self) {
let mut client = self.copt.to_unauth_client();
let username = self.copt.username.as_deref().unwrap_or("anonymous");
// What auth mechanisms exist?
let mechs: Vec<_> = match client.auth_step_init(username) {
Ok(s) => s.into_iter().collect(),
Err(e) => {
error!("Error during authentication init phase: {:?}", e);
std::process::exit(1);
}
};
let mech = match mechs.len() {
0 => {
error!("Error during authentication init phase: Server offered no authentication mechanisms");
std::process::exit(1);
}
1 =>
{
#[allow(clippy::expect_used)]
mechs
.get(0)
.expect("can not fail - bounds already checked.")
}
len => {
println!("Please choose how you want to authenticate:");
for (i, val) in mechs.iter().enumerate() {
println!("{}: {}", i, val)
}
let mech_idx = match get_index_choice(len) {
Ok(v) => v,
Err(e) => {
error!("Error getting index choice -> {:?}", e);
std::process::exit(1);
}
};
#[allow(clippy::expect_used)]
mechs
.get(mech_idx as usize)
.expect("can not fail - bounds already checked.")
}
};
let mut allowed = match client.auth_step_begin((*mech).clone()) {
Ok(s) => s,
Err(e) => {
error!("Error during authentication begin phase: {:?}", e);
std::process::exit(1);
}
};
// We now have the first auth state, so we can proceed until complete.
loop {
debug!("Allowed mechanisms -> {:?}", allowed);
// What auth can proceed?
let choice = match allowed.len() {
0 => {
error!(
"Error during authentication phase: Server offered no method to proceed"
);
std::process::exit(1);
}
1 =>
{
#[allow(clippy::expect_used)]
allowed
.get(0)
.expect("can not fail - bounds already checked.")
}
len => {
println!("Please choose what credential to provide:");
for (i, val) in allowed.iter().enumerate() {
println!("{}: {}", i, val)
}
let idx = match get_index_choice(len) {
Ok(v) => v,
Err(e) => {
error!("Error getting index choice -> {:?}", e);
std::process::exit(1);
}
};
#[allow(clippy::expect_used)]
allowed
.get(idx as usize)
.expect("can not fail - bounds already checked.")
}
};
let res = match choice {
AuthAllowed::Anonymous => client.auth_step_anonymous(),
AuthAllowed::Password => self.do_password(&mut client),
AuthAllowed::Totp => self.do_totp(&mut client),
AuthAllowed::Webauthn(chal) => self.do_webauthn(&mut client, chal.clone()),
};
// Now update state.
let state = match res {
Ok(s) => s.state,
Err(e) => {
error!("Error in authentication phase: {:?}", e);
std::process::exit(1);
}
};
// What auth state are we in?
allowed = match &state {
AuthState::Continue(allowed) => allowed.to_vec(),
AuthState::Success(_token) => break,
AuthState::Denied(reason) => {
error!("Authentication Denied: {:?}", reason);
std::process::exit(1);
}
_ => {
error!("Error in authentication phase: invalid authstate");
std::process::exit(1);
}
};
// Loop again.
}
// Read the current tokens
let mut tokens = match read_tokens() {
Ok(t) => t,
Err(_e) => {
error!("Error retrieving authentication token store");
std::process::exit(1);
}
};
// Add our new one
match client.get_token() {
Some(t) => tokens.insert(username.to_string(), t.to_string()),
None => {
error!("Error retrieving client session");
std::process::exit(1);
}
};
// write them out.
if let Err(_e) = write_tokens(&tokens) {
error!("Error persisting authentication token store");
std::process::exit(1);
};
// Success!
println!("Login Success for {}", username);
}
}