mirror of
https://github.com/TheAnachronism/docspell.git
synced 2025-04-05 10:59:33 +00:00
Merge pull request #1829 from eikek/1827-auth-oidc-fix
Allow to authenticate with the same account from different sources
This commit is contained in:
commit
2430bb6b87
@ -11,10 +11,13 @@ import docspell.common.Password
|
|||||||
import org.mindrot.jbcrypt.BCrypt
|
import org.mindrot.jbcrypt.BCrypt
|
||||||
|
|
||||||
object PasswordCrypt {
|
object PasswordCrypt {
|
||||||
|
// BCrypt requires non-empty strings
|
||||||
|
|
||||||
def crypt(pass: Password): Password =
|
def crypt(pass: Password): Password =
|
||||||
Password(BCrypt.hashpw(pass.pass, BCrypt.gensalt()))
|
if (pass.isEmpty) sys.error("Empty password given to hash")
|
||||||
|
else Password(BCrypt.hashpw(pass.pass, BCrypt.gensalt()))
|
||||||
|
|
||||||
def check(plain: Password, hashed: Password): Boolean =
|
def check(plain: Password, hashed: Password): Boolean =
|
||||||
BCrypt.checkpw(plain.pass, hashed.pass)
|
if (plain.isEmpty || hashed.isEmpty) false
|
||||||
|
else BCrypt.checkpw(plain.pass, hashed.pass)
|
||||||
}
|
}
|
||||||
|
@ -6,10 +6,11 @@
|
|||||||
|
|
||||||
package docspell.backend.auth
|
package docspell.backend.auth
|
||||||
|
|
||||||
import cats.data.{EitherT, OptionT}
|
import cats.data.{EitherT, NonEmptyList, OptionT}
|
||||||
import cats.effect._
|
import cats.effect._
|
||||||
import cats.implicits._
|
import cats.implicits._
|
||||||
|
|
||||||
|
import docspell.backend.PasswordCrypt
|
||||||
import docspell.backend.auth.Login._
|
import docspell.backend.auth.Login._
|
||||||
import docspell.common._
|
import docspell.common._
|
||||||
import docspell.store.Store
|
import docspell.store.Store
|
||||||
@ -17,7 +18,6 @@ import docspell.store.queries.QLogin
|
|||||||
import docspell.store.records._
|
import docspell.store.records._
|
||||||
import docspell.totp.{OnetimePassword, Totp}
|
import docspell.totp.{OnetimePassword, Totp}
|
||||||
|
|
||||||
import org.mindrot.jbcrypt.BCrypt
|
|
||||||
import scodec.bits.ByteVector
|
import scodec.bits.ByteVector
|
||||||
|
|
||||||
trait Login[F[_]] {
|
trait Login[F[_]] {
|
||||||
@ -43,9 +43,32 @@ object Login {
|
|||||||
case class Config(
|
case class Config(
|
||||||
serverSecret: ByteVector,
|
serverSecret: ByteVector,
|
||||||
sessionValid: Duration,
|
sessionValid: Duration,
|
||||||
rememberMe: RememberMe
|
rememberMe: RememberMe,
|
||||||
|
onAccountSourceConflict: OnAccountSourceConflict
|
||||||
)
|
)
|
||||||
|
|
||||||
|
sealed trait OnAccountSourceConflict {
|
||||||
|
def name: String
|
||||||
|
}
|
||||||
|
object OnAccountSourceConflict {
|
||||||
|
case object Fail extends OnAccountSourceConflict {
|
||||||
|
val name = "fail"
|
||||||
|
}
|
||||||
|
case object Convert extends OnAccountSourceConflict {
|
||||||
|
val name = "convert"
|
||||||
|
}
|
||||||
|
|
||||||
|
val all: NonEmptyList[OnAccountSourceConflict] =
|
||||||
|
NonEmptyList.of(Fail, Convert)
|
||||||
|
|
||||||
|
def fromString(str: String): Either[String, OnAccountSourceConflict] =
|
||||||
|
all
|
||||||
|
.find(_.name.equalsIgnoreCase(str))
|
||||||
|
.toRight(
|
||||||
|
s"Invalid on-account-source-conflict value: $str. Use one of ${all.toList.mkString(", ")}"
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
case class RememberMe(enabled: Boolean, valid: Duration) {
|
case class RememberMe(enabled: Boolean, valid: Duration) {
|
||||||
val disabled = !enabled
|
val disabled = !enabled
|
||||||
}
|
}
|
||||||
@ -73,8 +96,13 @@ object Login {
|
|||||||
case object InvalidAuth extends Result {
|
case object InvalidAuth extends Result {
|
||||||
val toEither = Left("Authentication failed.")
|
val toEither = Left("Authentication failed.")
|
||||||
}
|
}
|
||||||
|
case class InvalidAccountSource(account: AccountId) extends Result {
|
||||||
|
val toEither = Left(
|
||||||
|
s"The account '${account.asString}' already exists from a different source (local vs openid)!"
|
||||||
|
)
|
||||||
|
}
|
||||||
case object InvalidTime extends Result {
|
case object InvalidTime extends Result {
|
||||||
val toEither = Left("Authentication failed.")
|
val toEither = Left("Authentication failed due expired authenticator.")
|
||||||
}
|
}
|
||||||
case object InvalidFactor extends Result {
|
case object InvalidFactor extends Result {
|
||||||
val toEither = Left("Authentication requires second factor.")
|
val toEither = Left("Authentication requires second factor.")
|
||||||
@ -85,6 +113,7 @@ object Login {
|
|||||||
def invalidAuth: Result = InvalidAuth
|
def invalidAuth: Result = InvalidAuth
|
||||||
def invalidTime: Result = InvalidTime
|
def invalidTime: Result = InvalidTime
|
||||||
def invalidFactor: Result = InvalidFactor
|
def invalidFactor: Result = InvalidFactor
|
||||||
|
def invalidAccountSource(account: AccountId): Result = InvalidAccountSource(account)
|
||||||
}
|
}
|
||||||
|
|
||||||
def apply[F[_]: Async](store: Store[F], totp: Totp): Resource[F, Login[F]] =
|
def apply[F[_]: Async](store: Store[F], totp: Totp): Resource[F, Login[F]] =
|
||||||
@ -99,6 +128,26 @@ object Login {
|
|||||||
res <- data match {
|
res <- data match {
|
||||||
case Some(d) if checkNoPassword(d, Set(AccountSource.OpenId)) =>
|
case Some(d) if checkNoPassword(d, Set(AccountSource.OpenId)) =>
|
||||||
doLogin(config, d.account, false)
|
doLogin(config, d.account, false)
|
||||||
|
case Some(d) if checkNoPassword(d, Set(AccountSource.Local)) =>
|
||||||
|
config.onAccountSourceConflict match {
|
||||||
|
case OnAccountSourceConflict.Fail =>
|
||||||
|
Result.invalidAccountSource(accountId).pure[F]
|
||||||
|
case OnAccountSourceConflict.Convert =>
|
||||||
|
for {
|
||||||
|
_ <- logF.debug(
|
||||||
|
s"Converting account ${d.account.asString} from Local to OpenId!"
|
||||||
|
)
|
||||||
|
_ <- store
|
||||||
|
.transact(
|
||||||
|
RUser.updateSource(
|
||||||
|
d.account.userId,
|
||||||
|
d.account.collectiveId,
|
||||||
|
AccountSource.OpenId
|
||||||
|
)
|
||||||
|
)
|
||||||
|
res <- doLogin(config, d.account, false)
|
||||||
|
} yield res
|
||||||
|
}
|
||||||
case _ =>
|
case _ =>
|
||||||
Result.invalidAuth.pure[F]
|
Result.invalidAuth.pure[F]
|
||||||
}
|
}
|
||||||
@ -125,8 +174,31 @@ object Login {
|
|||||||
data <- store.transact(QLogin.findUser(acc))
|
data <- store.transact(QLogin.findUser(acc))
|
||||||
_ <- logF.trace(s"Account lookup: $data")
|
_ <- logF.trace(s"Account lookup: $data")
|
||||||
res <- data match {
|
res <- data match {
|
||||||
case Some(d) if check(up.pass)(d) =>
|
case Some(d) if check(up.pass)(d, Set(AccountSource.Local)) =>
|
||||||
doLogin(config, d.account, up.rememberMe)
|
doLogin(config, d.account, up.rememberMe)
|
||||||
|
case Some(d) if check(up.pass)(d, Set(AccountSource.OpenId)) =>
|
||||||
|
config.onAccountSourceConflict match {
|
||||||
|
case OnAccountSourceConflict.Fail =>
|
||||||
|
logF.info(
|
||||||
|
s"Fail authentication because of account source mismatch (local vs openid)."
|
||||||
|
) *>
|
||||||
|
Result.invalidAccountSource(d.account.asAccountId).pure[F]
|
||||||
|
case OnAccountSourceConflict.Convert =>
|
||||||
|
for {
|
||||||
|
_ <- logF.debug(
|
||||||
|
s"Converting account ${d.account.asString} from OpenId to Local!"
|
||||||
|
)
|
||||||
|
_ <- store
|
||||||
|
.transact(
|
||||||
|
RUser.updateSource(
|
||||||
|
d.account.userId,
|
||||||
|
d.account.collectiveId,
|
||||||
|
AccountSource.Local
|
||||||
|
)
|
||||||
|
)
|
||||||
|
res <- doLogin(config, d.account, up.rememberMe)
|
||||||
|
} yield res
|
||||||
|
}
|
||||||
case _ =>
|
case _ =>
|
||||||
Result.invalidAuth.pure[F]
|
Result.invalidAuth.pure[F]
|
||||||
}
|
}
|
||||||
@ -277,9 +349,11 @@ object Login {
|
|||||||
token <- RememberToken.user(rme.id, config.serverSecret)
|
token <- RememberToken.user(rme.id, config.serverSecret)
|
||||||
} yield token
|
} yield token
|
||||||
|
|
||||||
private def check(givenPass: String)(data: QLogin.Data): Boolean = {
|
private def check(
|
||||||
val passOk = BCrypt.checkpw(givenPass, data.password.pass)
|
givenPass: String
|
||||||
checkNoPassword(data, Set(AccountSource.Local)) && passOk
|
)(data: QLogin.Data, expectedSources: Set[AccountSource]): Boolean = {
|
||||||
|
val passOk = PasswordCrypt.check(Password(givenPass), data.password)
|
||||||
|
checkNoPassword(data, expectedSources) && passOk
|
||||||
}
|
}
|
||||||
|
|
||||||
def checkNoPassword(
|
def checkNoPassword(
|
||||||
|
@ -55,10 +55,14 @@ trait OCollective[F[_]] {
|
|||||||
collectiveId: CollectiveId,
|
collectiveId: CollectiveId,
|
||||||
userId: Ident,
|
userId: Ident,
|
||||||
current: Password,
|
current: Password,
|
||||||
newPass: Password
|
newPass: Password,
|
||||||
|
expectedSources: Set[AccountSource]
|
||||||
): F[PassChangeResult]
|
): F[PassChangeResult]
|
||||||
|
|
||||||
def resetPassword(accountId: AccountId): F[PassResetResult]
|
def resetPassword(
|
||||||
|
accountId: AccountId,
|
||||||
|
expectedSources: Set[AccountSource]
|
||||||
|
): F[PassResetResult]
|
||||||
|
|
||||||
def getContacts(
|
def getContacts(
|
||||||
collective: CollectiveId,
|
collective: CollectiveId,
|
||||||
@ -114,11 +118,11 @@ object OCollective {
|
|||||||
object PassResetResult {
|
object PassResetResult {
|
||||||
case class Success(newPw: Password) extends PassResetResult
|
case class Success(newPw: Password) extends PassResetResult
|
||||||
case object NotFound extends PassResetResult
|
case object NotFound extends PassResetResult
|
||||||
case object UserNotLocal extends PassResetResult
|
case class InvalidSource(source: AccountSource) extends PassResetResult
|
||||||
|
|
||||||
def success(np: Password): PassResetResult = Success(np)
|
def success(np: Password): PassResetResult = Success(np)
|
||||||
def notFound: PassResetResult = NotFound
|
def notFound: PassResetResult = NotFound
|
||||||
def userNotLocal: PassResetResult = UserNotLocal
|
def invalidSource(source: AccountSource): PassResetResult = InvalidSource(source)
|
||||||
}
|
}
|
||||||
|
|
||||||
sealed trait PassChangeResult
|
sealed trait PassChangeResult
|
||||||
@ -126,14 +130,14 @@ object OCollective {
|
|||||||
case object UserNotFound extends PassChangeResult
|
case object UserNotFound extends PassChangeResult
|
||||||
case object PasswordMismatch extends PassChangeResult
|
case object PasswordMismatch extends PassChangeResult
|
||||||
case object UpdateFailed extends PassChangeResult
|
case object UpdateFailed extends PassChangeResult
|
||||||
case object UserNotLocal extends PassChangeResult
|
case class InvalidSource(source: AccountSource) extends PassChangeResult
|
||||||
case object Success extends PassChangeResult
|
case object Success extends PassChangeResult
|
||||||
|
|
||||||
def userNotFound: PassChangeResult = UserNotFound
|
def userNotFound: PassChangeResult = UserNotFound
|
||||||
def passwordMismatch: PassChangeResult = PasswordMismatch
|
def passwordMismatch: PassChangeResult = PasswordMismatch
|
||||||
def success: PassChangeResult = Success
|
def success: PassChangeResult = Success
|
||||||
def updateFailed: PassChangeResult = UpdateFailed
|
def updateFailed: PassChangeResult = UpdateFailed
|
||||||
def userNotLocal: PassChangeResult = UserNotLocal
|
def invalidSource(source: AccountSource): PassChangeResult = InvalidSource(source)
|
||||||
}
|
}
|
||||||
|
|
||||||
def apply[F[_]: Async](
|
def apply[F[_]: Async](
|
||||||
@ -280,7 +284,10 @@ object OCollective {
|
|||||||
def tagCloud(collective: CollectiveId): F[List[TagCount]] =
|
def tagCloud(collective: CollectiveId): F[List[TagCount]] =
|
||||||
store.transact(QCollective.tagCloud(collective))
|
store.transact(QCollective.tagCloud(collective))
|
||||||
|
|
||||||
def resetPassword(accountId: AccountId): F[PassResetResult] =
|
def resetPassword(
|
||||||
|
accountId: AccountId,
|
||||||
|
expectedSources: Set[AccountSource]
|
||||||
|
): F[PassResetResult] =
|
||||||
(for {
|
(for {
|
||||||
user <- OptionT(store.transact(RUser.findByAccount(accountId)))
|
user <- OptionT(store.transact(RUser.findByAccount(accountId)))
|
||||||
newPass <- OptionT.liftF(Password.generate[F])
|
newPass <- OptionT.liftF(Password.generate[F])
|
||||||
@ -289,8 +296,8 @@ object OCollective {
|
|||||||
RUser.updatePassword(user.cid, user.uid, PasswordCrypt.crypt(newPass))
|
RUser.updatePassword(user.cid, user.uid, PasswordCrypt.crypt(newPass))
|
||||||
)
|
)
|
||||||
res <-
|
res <-
|
||||||
if (user.source != AccountSource.Local)
|
if (!expectedSources.contains(user.source))
|
||||||
OptionT.pure[F](PassResetResult.userNotLocal)
|
OptionT.pure[F](PassResetResult.invalidSource(user.source))
|
||||||
else OptionT.liftF(doUpdate.as(PassResetResult.success(newPass)))
|
else OptionT.liftF(doUpdate.as(PassResetResult.success(newPass)))
|
||||||
} yield res).getOrElse(PassResetResult.notFound)
|
} yield res).getOrElse(PassResetResult.notFound)
|
||||||
|
|
||||||
@ -298,31 +305,31 @@ object OCollective {
|
|||||||
collectiveId: CollectiveId,
|
collectiveId: CollectiveId,
|
||||||
userId: Ident,
|
userId: Ident,
|
||||||
current: Password,
|
current: Password,
|
||||||
newPass: Password
|
newPass: Password,
|
||||||
|
expectedSources: Set[AccountSource]
|
||||||
): F[PassChangeResult] = {
|
): F[PassChangeResult] = {
|
||||||
val q = for {
|
val q = for {
|
||||||
optUser <- RUser.findById(userId, collectiveId.some)
|
user <- OptionT(store.transact(RUser.findById(userId, collectiveId.some)))
|
||||||
check = optUser.map(_.password).map(p => PasswordCrypt.check(current, p))
|
check = user.password.isEmpty || PasswordCrypt.check(current, user.password)
|
||||||
n <-
|
res <-
|
||||||
check
|
if (check && expectedSources.contains(user.source))
|
||||||
.filter(identity)
|
OptionT.liftF(
|
||||||
.traverse(_ =>
|
store
|
||||||
RUser.updatePassword(collectiveId, userId, PasswordCrypt.crypt(newPass))
|
.transact(
|
||||||
|
RUser
|
||||||
|
.updatePassword(collectiveId, userId, PasswordCrypt.crypt(newPass))
|
||||||
)
|
)
|
||||||
res = check match {
|
.map {
|
||||||
case Some(true) =>
|
case 0 => PassChangeResult.updateFailed
|
||||||
if (n.getOrElse(0) > 0) PassChangeResult.success
|
case _ => PassChangeResult.success
|
||||||
else if (optUser.exists(_.source != AccountSource.Local))
|
|
||||||
PassChangeResult.userNotLocal
|
|
||||||
else PassChangeResult.updateFailed
|
|
||||||
case Some(false) =>
|
|
||||||
PassChangeResult.passwordMismatch
|
|
||||||
case None =>
|
|
||||||
PassChangeResult.userNotFound
|
|
||||||
}
|
}
|
||||||
|
)
|
||||||
|
else if (check && !expectedSources.contains(user.source))
|
||||||
|
OptionT.some[F](PassChangeResult.invalidSource(user.source))
|
||||||
|
else OptionT.some[F](PassChangeResult.passwordMismatch)
|
||||||
} yield res
|
} yield res
|
||||||
|
|
||||||
store.transact(q)
|
q.getOrElse(PassChangeResult.userNotFound)
|
||||||
}
|
}
|
||||||
|
|
||||||
def getContacts(
|
def getContacts(
|
||||||
|
@ -95,6 +95,17 @@ docspell.server {
|
|||||||
# How long the remember me cookie/token is valid.
|
# How long the remember me cookie/token is valid.
|
||||||
valid = "30 days"
|
valid = "30 days"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# One of: fail, convert
|
||||||
|
#
|
||||||
|
# Accounts can be local or defined at a remote provider and
|
||||||
|
# integrated via OIDC. If the same account is defined in both
|
||||||
|
# sources, docspell by default fails if a user mixes logins (e.g.
|
||||||
|
# when registering a user locally and then logging in with the
|
||||||
|
# same user via OIDC). When set to `convert` docspell treats it as
|
||||||
|
# being the same and simply updates the account to reflect the new
|
||||||
|
# account source.
|
||||||
|
on-account-source-conflict = "fail"
|
||||||
}
|
}
|
||||||
|
|
||||||
# Settings for "download as zip"
|
# Settings for "download as zip"
|
||||||
|
@ -11,6 +11,7 @@ import java.security.SecureRandom
|
|||||||
import cats.Monoid
|
import cats.Monoid
|
||||||
import cats.effect.Async
|
import cats.effect.Async
|
||||||
|
|
||||||
|
import docspell.backend.auth.Login
|
||||||
import docspell.backend.signup.{Config => SignupConfig}
|
import docspell.backend.signup.{Config => SignupConfig}
|
||||||
import docspell.config.Implicits._
|
import docspell.config.Implicits._
|
||||||
import docspell.config.{ConfigFactory, FtsType, Validation}
|
import docspell.config.{ConfigFactory, FtsType, Validation}
|
||||||
@ -50,6 +51,10 @@ object ConfigFile {
|
|||||||
|
|
||||||
implicit val openIdExtractorReader: ConfigReader[OpenId.UserInfo.Extractor] =
|
implicit val openIdExtractorReader: ConfigReader[OpenId.UserInfo.Extractor] =
|
||||||
ConfigReader[String].emap(reason(OpenId.UserInfo.Extractor.fromString))
|
ConfigReader[String].emap(reason(OpenId.UserInfo.Extractor.fromString))
|
||||||
|
|
||||||
|
implicit val onAccountSourceConflictReader
|
||||||
|
: ConfigReader[Login.OnAccountSourceConflict] =
|
||||||
|
ConfigReader[String].emap(reason(Login.OnAccountSourceConflict.fromString))
|
||||||
}
|
}
|
||||||
|
|
||||||
def generateSecretIfEmpty: Validation[Config] =
|
def generateSecretIfEmpty: Validation[Config] =
|
||||||
|
@ -81,7 +81,7 @@ final class RestAppImpl[F[_]: Async](
|
|||||||
Router(
|
Router(
|
||||||
"fts" -> FullTextIndexRoutes.admin(config, backend),
|
"fts" -> FullTextIndexRoutes.admin(config, backend),
|
||||||
"user/otp" -> TotpRoutes.admin(backend),
|
"user/otp" -> TotpRoutes.admin(backend),
|
||||||
"user" -> UserRoutes.admin(backend),
|
"user" -> UserRoutes.admin(backend, config.auth),
|
||||||
"info" -> InfoRoutes.admin(config),
|
"info" -> InfoRoutes.admin(config),
|
||||||
"attachments" -> AttachmentRoutes.admin(backend),
|
"attachments" -> AttachmentRoutes.admin(backend),
|
||||||
"files" -> FileRepositoryRoutes.admin(backend)
|
"files" -> FileRepositoryRoutes.admin(backend)
|
||||||
@ -129,7 +129,7 @@ final class RestAppImpl[F[_]: Async](
|
|||||||
"person" -> PersonRoutes(backend, token),
|
"person" -> PersonRoutes(backend, token),
|
||||||
"source" -> SourceRoutes(backend, token),
|
"source" -> SourceRoutes(backend, token),
|
||||||
"user/otp" -> TotpRoutes(backend, config, token),
|
"user/otp" -> TotpRoutes(backend, config, token),
|
||||||
"user" -> UserRoutes(backend, token),
|
"user" -> UserRoutes(backend, config.auth, token),
|
||||||
"collective" -> CollectiveRoutes(backend, token),
|
"collective" -> CollectiveRoutes(backend, token),
|
||||||
"queue" -> JobQueueRoutes(backend, token),
|
"queue" -> JobQueueRoutes(backend, token),
|
||||||
"item" -> ItemRoutes(config, backend, token),
|
"item" -> ItemRoutes(config, backend, token),
|
||||||
|
@ -116,6 +116,7 @@ object RestServer {
|
|||||||
)(
|
)(
|
||||||
wsB: WebSocketBuilder2[F]
|
wsB: WebSocketBuilder2[F]
|
||||||
) = {
|
) = {
|
||||||
|
val logger = docspell.logging.getLogger[F]
|
||||||
val internal = Router(
|
val internal = Router(
|
||||||
"/" -> redirectTo("/app"),
|
"/" -> redirectTo("/app"),
|
||||||
"/internal" -> InternalHeader(internSettings.internalRouteKey) {
|
"/internal" -> InternalHeader(internSettings.internalRouteKey) {
|
||||||
@ -123,6 +124,17 @@ object RestServer {
|
|||||||
}
|
}
|
||||||
)
|
)
|
||||||
val httpApp = (internal <+> restApp.routes(wsB)).orNotFound
|
val httpApp = (internal <+> restApp.routes(wsB)).orNotFound
|
||||||
|
.mapF(
|
||||||
|
_.attempt
|
||||||
|
.flatMap { eab =>
|
||||||
|
eab.fold(
|
||||||
|
ex =>
|
||||||
|
logger.error(ex)("Processing the request resulted in an error.").as(eab),
|
||||||
|
_ => eab.pure[F]
|
||||||
|
)
|
||||||
|
}
|
||||||
|
.rethrow
|
||||||
|
)
|
||||||
Logger.httpApp(logHeaders = false, logBody = false)(httpApp)
|
Logger.httpApp(logHeaders = false, logBody = false)(httpApp)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -105,6 +105,7 @@ object OpenId {
|
|||||||
import dsl._
|
import dsl._
|
||||||
|
|
||||||
for {
|
for {
|
||||||
|
_ <- logger.debug(s"Setting up external account: ${accountId.asString}")
|
||||||
setup <- backend.signup.setupExternal(ExternalAccount(accountId))
|
setup <- backend.signup.setupExternal(ExternalAccount(accountId))
|
||||||
res <- setup match {
|
res <- setup match {
|
||||||
case SignupResult.Failure(ex) =>
|
case SignupResult.Failure(ex) =>
|
||||||
@ -143,6 +144,7 @@ object OpenId {
|
|||||||
import dsl._
|
import dsl._
|
||||||
|
|
||||||
for {
|
for {
|
||||||
|
_ <- logger.debug(s"Login and verify external account: ${accountId.asString}")
|
||||||
login <- backend.login.loginExternal(config.auth)(accountId)
|
login <- backend.login.loginExternal(config.auth)(accountId)
|
||||||
resp <- login match {
|
resp <- login match {
|
||||||
case Login.Result.Ok(session, _) =>
|
case Login.Result.Ok(session, _) =>
|
||||||
@ -158,7 +160,9 @@ object OpenId {
|
|||||||
.map(_.addCookie(CookieData(session).asCookie(baseUrl)))
|
.map(_.addCookie(CookieData(session).asCookie(baseUrl)))
|
||||||
|
|
||||||
case failed =>
|
case failed =>
|
||||||
logger.error(s"External login failed: $failed") *>
|
logger.error(
|
||||||
|
s"External login failed: $failed. ${failed.toEither.left.getOrElse("")}"
|
||||||
|
) *>
|
||||||
SeeOther(location)
|
SeeOther(location)
|
||||||
}
|
}
|
||||||
} yield resp
|
} yield resp
|
||||||
|
@ -699,8 +699,11 @@ trait Conversions {
|
|||||||
case PassChangeResult.PasswordMismatch =>
|
case PassChangeResult.PasswordMismatch =>
|
||||||
BasicResult(false, "The current password is incorrect.")
|
BasicResult(false, "The current password is incorrect.")
|
||||||
case PassChangeResult.UserNotFound => BasicResult(false, "User not found.")
|
case PassChangeResult.UserNotFound => BasicResult(false, "User not found.")
|
||||||
case PassChangeResult.UserNotLocal =>
|
case PassChangeResult.InvalidSource(source) =>
|
||||||
BasicResult(false, "User is not local, passwords are managed externally.")
|
BasicResult(
|
||||||
|
false,
|
||||||
|
s"User has invalid soure: $source. Passwords are managed elsewhere."
|
||||||
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
def basicResult(e: Either[Throwable, _], successMsg: String): BasicResult =
|
def basicResult(e: Either[Throwable, _], successMsg: String): BasicResult =
|
||||||
|
@ -10,7 +10,8 @@ import cats.effect._
|
|||||||
import cats.implicits._
|
import cats.implicits._
|
||||||
|
|
||||||
import docspell.backend.BackendApp
|
import docspell.backend.BackendApp
|
||||||
import docspell.backend.auth.AuthToken
|
import docspell.backend.auth.Login.OnAccountSourceConflict
|
||||||
|
import docspell.backend.auth.{AuthToken, Login}
|
||||||
import docspell.backend.ops.OCollective
|
import docspell.backend.ops.OCollective
|
||||||
import docspell.common._
|
import docspell.common._
|
||||||
import docspell.restapi.model._
|
import docspell.restapi.model._
|
||||||
@ -24,7 +25,11 @@ import org.http4s.dsl.Http4sDsl
|
|||||||
|
|
||||||
object UserRoutes {
|
object UserRoutes {
|
||||||
|
|
||||||
def apply[F[_]: Async](backend: BackendApp[F], user: AuthToken): HttpRoutes[F] = {
|
def apply[F[_]: Async](
|
||||||
|
backend: BackendApp[F],
|
||||||
|
loginConfig: Login.Config,
|
||||||
|
user: AuthToken
|
||||||
|
): HttpRoutes[F] = {
|
||||||
val dsl = new Http4sDsl[F] {}
|
val dsl = new Http4sDsl[F] {}
|
||||||
import dsl._
|
import dsl._
|
||||||
|
|
||||||
@ -36,7 +41,8 @@ object UserRoutes {
|
|||||||
user.account.collectiveId,
|
user.account.collectiveId,
|
||||||
user.account.userId,
|
user.account.userId,
|
||||||
data.currentPassword,
|
data.currentPassword,
|
||||||
data.newPassword
|
data.newPassword,
|
||||||
|
expectedAccountSources(loginConfig)
|
||||||
)
|
)
|
||||||
resp <- Ok(basicResult(res))
|
resp <- Ok(basicResult(res))
|
||||||
} yield resp
|
} yield resp
|
||||||
@ -91,14 +97,20 @@ object UserRoutes {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
def admin[F[_]: Async](backend: BackendApp[F]): HttpRoutes[F] = {
|
def admin[F[_]: Async](
|
||||||
|
backend: BackendApp[F],
|
||||||
|
loginConfig: Login.Config
|
||||||
|
): HttpRoutes[F] = {
|
||||||
val dsl = new Http4sDsl[F] {}
|
val dsl = new Http4sDsl[F] {}
|
||||||
import dsl._
|
import dsl._
|
||||||
|
|
||||||
HttpRoutes.of { case req @ POST -> Root / "resetPassword" =>
|
HttpRoutes.of { case req @ POST -> Root / "resetPassword" =>
|
||||||
for {
|
for {
|
||||||
input <- req.as[ResetPassword]
|
input <- req.as[ResetPassword]
|
||||||
result <- backend.collective.resetPassword(input.account)
|
result <- backend.collective.resetPassword(
|
||||||
|
input.account,
|
||||||
|
expectedAccountSources(loginConfig)
|
||||||
|
)
|
||||||
resp <- Ok(result match {
|
resp <- Ok(result match {
|
||||||
case OCollective.PassResetResult.Success(np) =>
|
case OCollective.PassResetResult.Success(np) =>
|
||||||
ResetPasswordResult(true, np, "Password updated")
|
ResetPasswordResult(true, np, "Password updated")
|
||||||
@ -108,14 +120,20 @@ object UserRoutes {
|
|||||||
Password(""),
|
Password(""),
|
||||||
"Password update failed. User not found."
|
"Password update failed. User not found."
|
||||||
)
|
)
|
||||||
case OCollective.PassResetResult.UserNotLocal =>
|
case OCollective.PassResetResult.InvalidSource(source) =>
|
||||||
ResetPasswordResult(
|
ResetPasswordResult(
|
||||||
false,
|
false,
|
||||||
Password(""),
|
Password(""),
|
||||||
"Password update failed. User is not local, passwords are managed externally."
|
s"Password update failed. User has unexpected source: $source. Passwords are managed externally."
|
||||||
)
|
)
|
||||||
})
|
})
|
||||||
} yield resp
|
} yield resp
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private def expectedAccountSources(loginConfig: Login.Config): Set[AccountSource] =
|
||||||
|
loginConfig.onAccountSourceConflict match {
|
||||||
|
case OnAccountSourceConflict.Fail => Set(AccountSource.Local)
|
||||||
|
case OnAccountSourceConflict.Convert => AccountSource.all.toList.toSet
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@ -204,11 +204,20 @@ object RUser {
|
|||||||
val t = Table(None)
|
val t = Table(None)
|
||||||
DML.update(
|
DML.update(
|
||||||
t,
|
t,
|
||||||
t.cid === collId && t.uid === userId && t.source === AccountSource.Local,
|
t.cid === collId && t.uid === userId,
|
||||||
DML.set(t.password.setTo(hashedPass))
|
DML.set(t.password.setTo(hashedPass))
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
def updateSource(
|
||||||
|
userId: Ident,
|
||||||
|
collId: CollectiveId,
|
||||||
|
source: AccountSource
|
||||||
|
): ConnectionIO[Int] = {
|
||||||
|
val t = Table(None)
|
||||||
|
DML.update(t, t.uid === userId && t.cid === collId, DML.set(t.source.setTo(source)))
|
||||||
|
}
|
||||||
|
|
||||||
def delete(user: Ident, coll: CollectiveId): ConnectionIO[Int] = {
|
def delete(user: Ident, coll: CollectiveId): ConnectionIO[Int] = {
|
||||||
val t = Table(None)
|
val t = Table(None)
|
||||||
DML.delete(t, t.cid === coll && t.login === user)
|
DML.delete(t, t.cid === coll && t.login === user)
|
||||||
|
@ -56,7 +56,7 @@ object Dependencies {
|
|||||||
|
|
||||||
val scribe = Seq(
|
val scribe = Seq(
|
||||||
"com.outr" %% "scribe" % ScribeVersion,
|
"com.outr" %% "scribe" % ScribeVersion,
|
||||||
"com.outr" %% "scribe-slf4j" % ScribeVersion
|
"com.outr" %% "scribe-slf4j2" % ScribeVersion
|
||||||
)
|
)
|
||||||
|
|
||||||
val sourcecode = Seq(
|
val sourcecode = Seq(
|
||||||
|
@ -145,3 +145,36 @@ provider, skipping the login page for Docspell.
|
|||||||
|
|
||||||
For logging out, you can specify a `logout-url` for the provider which
|
For logging out, you can specify a `logout-url` for the provider which
|
||||||
is used to redirect the browser after logging out from Docspell.
|
is used to redirect the browser after logging out from Docspell.
|
||||||
|
|
||||||
|
## Mixing OIDC and local accounts
|
||||||
|
|
||||||
|
Local accounts and those created from an openid provider can live next
|
||||||
|
to each other. There is only a caveat for accounts with same login
|
||||||
|
name that may occur from local and openid providers. By default,
|
||||||
|
docspell treats OIDC and local accounts always as different when
|
||||||
|
logging in.
|
||||||
|
|
||||||
|
That means when a local user exists and the same account is trying to
|
||||||
|
login via an openid provider, docspell fails the authentication
|
||||||
|
attempt by default. It could be that these accounts belong to
|
||||||
|
different persons in reality.
|
||||||
|
|
||||||
|
The other way around is the same: signing up an account that exists
|
||||||
|
due to an OIDC login doesn't work, because the collective already
|
||||||
|
exists. And obviously, logging in without a password doesn't work
|
||||||
|
either :). Even if a password would exists for an account created by
|
||||||
|
an OIDC flow, logging in with it doesn't work. It would allow to
|
||||||
|
bypass the openid provider (which may not be desired)
|
||||||
|
|
||||||
|
This behavior can be changed by setting:
|
||||||
|
|
||||||
|
```
|
||||||
|
on-account-source-conflict = convert
|
||||||
|
```
|
||||||
|
|
||||||
|
in the config file (or environment variable). With this setting,
|
||||||
|
accounts with same name are treated identical, independet where they
|
||||||
|
came from. So you can login either locally **or** via the configured
|
||||||
|
openid provider. Note that this also allows users to set a local
|
||||||
|
password by themselves (which may not adhere to the password rules you
|
||||||
|
can potentially define at an openid provider).
|
||||||
|
Loading…
x
Reference in New Issue
Block a user