2020-02-07 17:27:45 +01:00
|
|
|
// Vikunja is a to-do list application to facilitate your life.
|
2021-02-02 20:19:13 +01:00
|
|
|
// Copyright 2018-2021 Vikunja and contributors. All rights reserved.
|
2018-11-26 21:17:33 +01:00
|
|
|
//
|
2019-12-04 20:39:56 +01:00
|
|
|
// This program is free software: you can redistribute it and/or modify
|
2020-12-23 16:41:52 +01:00
|
|
|
// it under the terms of the GNU Affero General Public Licensee as published by
|
2019-12-04 20:39:56 +01:00
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
2018-11-26 21:17:33 +01:00
|
|
|
//
|
2019-12-04 20:39:56 +01:00
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
2020-12-23 16:41:52 +01:00
|
|
|
// GNU Affero General Public Licensee for more details.
|
2018-11-26 21:17:33 +01:00
|
|
|
//
|
2020-12-23 16:41:52 +01:00
|
|
|
// You should have received a copy of the GNU Affero General Public Licensee
|
2019-12-04 20:39:56 +01:00
|
|
|
// along with this program. If not, see <https://www.gnu.org/licenses/>.
|
2018-11-26 21:17:33 +01:00
|
|
|
|
2018-06-10 11:34:59 +02:00
|
|
|
package v1
|
2018-06-10 11:11:41 +02:00
|
|
|
|
|
|
|
import (
|
2020-10-11 22:10:03 +02:00
|
|
|
"net/http"
|
|
|
|
|
2021-07-30 14:46:10 +02:00
|
|
|
"code.vikunja.io/api/pkg/modules/keyvalue"
|
|
|
|
|
2020-12-23 16:32:28 +01:00
|
|
|
"code.vikunja.io/api/pkg/db"
|
2018-10-31 13:42:38 +01:00
|
|
|
"code.vikunja.io/api/pkg/models"
|
2020-11-21 17:38:58 +01:00
|
|
|
"code.vikunja.io/api/pkg/modules/auth"
|
2020-01-26 18:08:06 +01:00
|
|
|
user2 "code.vikunja.io/api/pkg/user"
|
2018-12-01 00:26:56 +01:00
|
|
|
"code.vikunja.io/web/handler"
|
2021-07-29 18:05:25 +02:00
|
|
|
|
2021-08-03 23:43:18 +02:00
|
|
|
"github.com/golang-jwt/jwt/v4"
|
2019-05-07 21:42:24 +02:00
|
|
|
"github.com/labstack/echo/v4"
|
2018-06-10 11:11:41 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
// Login is the login handler
|
2018-11-12 16:46:35 +01:00
|
|
|
// @Summary Login
|
|
|
|
// @Description Logs a user in. Returns a JWT-Token to authenticate further requests.
|
|
|
|
// @tags user
|
|
|
|
// @Accept json
|
|
|
|
// @Produce json
|
2020-06-28 16:25:46 +02:00
|
|
|
// @Param credentials body user.Login true "The login credentials"
|
2020-11-21 17:38:58 +01:00
|
|
|
// @Success 200 {object} auth.Token
|
2018-11-12 16:46:35 +01:00
|
|
|
// @Failure 400 {object} models.Message "Invalid user password model."
|
2020-04-17 21:25:35 +02:00
|
|
|
// @Failure 412 {object} models.Message "Invalid totp passcode."
|
2018-11-12 16:46:35 +01:00
|
|
|
// @Failure 403 {object} models.Message "Invalid username or password."
|
|
|
|
// @Router /login [post]
|
2018-06-10 11:11:41 +02:00
|
|
|
func Login(c echo.Context) error {
|
2020-01-26 18:08:06 +01:00
|
|
|
u := user2.Login{}
|
2018-07-11 00:28:53 +02:00
|
|
|
if err := c.Bind(&u); err != nil {
|
2020-10-11 22:10:03 +02:00
|
|
|
return c.JSON(http.StatusBadRequest, models.Message{Message: "Please provide a username and password."})
|
2018-06-10 11:11:41 +02:00
|
|
|
}
|
|
|
|
|
2020-12-23 16:32:28 +01:00
|
|
|
s := db.NewSession()
|
|
|
|
defer s.Close()
|
|
|
|
|
2018-06-10 11:11:41 +02:00
|
|
|
// Check user
|
2020-12-23 16:32:28 +01:00
|
|
|
user, err := user2.CheckUserCredentials(s, &u)
|
2018-06-10 11:11:41 +02:00
|
|
|
if err != nil {
|
2020-12-23 16:32:28 +01:00
|
|
|
_ = s.Rollback()
|
2018-12-01 00:26:56 +01:00
|
|
|
return handler.HandleHTTPError(err, c)
|
2018-06-10 11:11:41 +02:00
|
|
|
}
|
|
|
|
|
2021-07-29 18:45:22 +02:00
|
|
|
if user.Status == user2.StatusDisabled {
|
|
|
|
_ = s.Rollback()
|
|
|
|
return handler.HandleHTTPError(&user2.ErrAccountDisabled{UserID: user.ID}, c)
|
|
|
|
}
|
|
|
|
|
2020-12-23 16:32:28 +01:00
|
|
|
totpEnabled, err := user2.TOTPEnabledForUser(s, user)
|
2020-04-17 21:25:35 +02:00
|
|
|
if err != nil {
|
2020-12-23 16:32:28 +01:00
|
|
|
_ = s.Rollback()
|
2020-04-17 21:25:35 +02:00
|
|
|
return handler.HandleHTTPError(err, c)
|
|
|
|
}
|
|
|
|
|
|
|
|
if totpEnabled {
|
2021-07-29 18:05:25 +02:00
|
|
|
if u.TOTPPasscode == "" {
|
2021-07-29 18:45:22 +02:00
|
|
|
_ = s.Rollback()
|
2021-07-29 18:05:25 +02:00
|
|
|
return handler.HandleHTTPError(user2.ErrInvalidTOTPPasscode{}, c)
|
|
|
|
}
|
|
|
|
|
2020-12-23 16:32:28 +01:00
|
|
|
_, err = user2.ValidateTOTPPasscode(s, &user2.TOTPPasscode{
|
2020-04-17 21:25:35 +02:00
|
|
|
User: user,
|
|
|
|
Passcode: u.TOTPPasscode,
|
|
|
|
})
|
|
|
|
if err != nil {
|
2021-07-29 18:05:25 +02:00
|
|
|
if user2.IsErrInvalidTOTPPasscode(err) {
|
2021-07-29 18:45:22 +02:00
|
|
|
user2.HandleFailedTOTPAuth(s, user)
|
2021-07-29 18:05:25 +02:00
|
|
|
}
|
2020-12-23 16:32:28 +01:00
|
|
|
_ = s.Rollback()
|
2020-04-17 21:25:35 +02:00
|
|
|
return handler.HandleHTTPError(err, c)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-07-30 14:46:10 +02:00
|
|
|
if err := keyvalue.Del(user.GetFailedTOTPAttemptsKey()); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2021-07-30 15:01:04 +02:00
|
|
|
if err := keyvalue.Del(user.GetFailedPasswordAttemptsKey()); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2021-07-30 14:46:10 +02:00
|
|
|
|
2020-12-23 16:32:28 +01:00
|
|
|
if err := s.Commit(); err != nil {
|
|
|
|
_ = s.Rollback()
|
|
|
|
return handler.HandleHTTPError(err, c)
|
|
|
|
}
|
|
|
|
|
2018-06-10 11:11:41 +02:00
|
|
|
// Create token
|
2022-02-06 14:18:08 +01:00
|
|
|
return auth.NewUserAuthTokenResponse(user, c, u.LongToken)
|
2019-04-21 20:18:17 +02:00
|
|
|
}
|
2019-12-07 20:52:04 +01:00
|
|
|
|
|
|
|
// RenewToken gives a new token to every user with a valid token
|
|
|
|
// If the token is valid is checked in the middleware.
|
|
|
|
// @Summary Renew user token
|
|
|
|
// @Description Returns a new valid jwt user token with an extended length.
|
|
|
|
// @tags user
|
|
|
|
// @Accept json
|
|
|
|
// @Produce json
|
2020-11-21 17:38:58 +01:00
|
|
|
// @Success 200 {object} auth.Token
|
2019-12-07 20:52:04 +01:00
|
|
|
// @Failure 400 {object} models.Message "Only user token are available for renew."
|
|
|
|
// @Router /user/token [post]
|
2020-08-18 16:55:44 +02:00
|
|
|
func RenewToken(c echo.Context) (err error) {
|
2019-12-07 20:52:04 +01:00
|
|
|
|
2020-12-23 16:32:28 +01:00
|
|
|
s := db.NewSession()
|
|
|
|
defer s.Close()
|
|
|
|
|
2019-12-07 20:52:04 +01:00
|
|
|
jwtinf := c.Get("user").(*jwt.Token)
|
|
|
|
claims := jwtinf.Claims.(jwt.MapClaims)
|
|
|
|
typ := int(claims["type"].(float64))
|
2020-11-21 17:38:58 +01:00
|
|
|
if typ == auth.AuthTypeLinkShare {
|
2020-08-18 16:55:44 +02:00
|
|
|
share := &models.LinkSharing{}
|
|
|
|
share.ID = int64(claims["id"].(float64))
|
2021-02-02 23:48:37 +01:00
|
|
|
err := share.ReadOne(s, share)
|
2020-08-18 16:55:44 +02:00
|
|
|
if err != nil {
|
2020-12-23 16:32:28 +01:00
|
|
|
_ = s.Rollback()
|
2020-08-18 16:55:44 +02:00
|
|
|
return handler.HandleHTTPError(err, c)
|
|
|
|
}
|
2020-11-21 17:38:58 +01:00
|
|
|
t, err := auth.NewLinkShareJWTAuthtoken(share)
|
2020-08-18 16:55:44 +02:00
|
|
|
if err != nil {
|
2020-12-23 16:32:28 +01:00
|
|
|
_ = s.Rollback()
|
2020-08-18 16:55:44 +02:00
|
|
|
return handler.HandleHTTPError(err, c)
|
|
|
|
}
|
2020-11-21 17:38:58 +01:00
|
|
|
return c.JSON(http.StatusOK, auth.Token{Token: t})
|
2019-12-07 20:52:04 +01:00
|
|
|
}
|
|
|
|
|
2020-11-21 21:51:55 +01:00
|
|
|
u, err := user2.GetUserFromClaims(claims)
|
|
|
|
if err != nil {
|
2020-12-23 16:32:28 +01:00
|
|
|
_ = s.Rollback()
|
2020-11-21 21:51:55 +01:00
|
|
|
return handler.HandleHTTPError(err, c)
|
|
|
|
}
|
|
|
|
|
2020-12-23 16:32:28 +01:00
|
|
|
user, err := user2.GetUserWithEmail(s, &user2.User{ID: u.ID})
|
2019-12-07 20:52:04 +01:00
|
|
|
if err != nil {
|
2020-12-23 16:32:28 +01:00
|
|
|
_ = s.Rollback()
|
|
|
|
return handler.HandleHTTPError(err, c)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := s.Commit(); err != nil {
|
|
|
|
_ = s.Rollback()
|
2019-12-07 20:52:04 +01:00
|
|
|
return handler.HandleHTTPError(err, c)
|
|
|
|
}
|
|
|
|
|
2022-02-06 14:18:08 +01:00
|
|
|
var long bool
|
|
|
|
lng, has := claims["long"]
|
|
|
|
if has {
|
|
|
|
long = lng.(bool)
|
|
|
|
}
|
|
|
|
|
2019-12-07 20:52:04 +01:00
|
|
|
// Create token
|
2022-02-06 14:18:08 +01:00
|
|
|
return auth.NewUserAuthTokenResponse(user, c, long)
|
2019-12-07 20:52:04 +01:00
|
|
|
}
|