2018-02-22 23:38:54 +00:00
|
|
|
use rocket_contrib::Json;
|
2018-02-10 00:00:55 +00:00
|
|
|
|
|
|
|
use db::DbConn;
|
|
|
|
use db::models::*;
|
|
|
|
|
2018-06-16 22:06:59 +00:00
|
|
|
use api::{PasswordData, JsonResult, EmptyResult, JsonUpcase, NumberOrString};
|
2018-02-10 00:00:55 +00:00
|
|
|
use auth::Headers;
|
2018-08-15 15:25:59 +00:00
|
|
|
use fast_chemail::is_valid_email;
|
2018-08-15 06:32:19 +00:00
|
|
|
use mail;
|
2018-02-10 00:00:55 +00:00
|
|
|
|
|
|
|
use CONFIG;
|
|
|
|
|
|
|
|
#[derive(Deserialize, Debug)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct RegisterData {
|
2018-05-31 22:18:50 +00:00
|
|
|
Email: String,
|
|
|
|
Key: String,
|
|
|
|
Keys: Option<KeysData>,
|
|
|
|
MasterPasswordHash: String,
|
|
|
|
MasterPasswordHint: Option<String>,
|
|
|
|
Name: Option<String>,
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Deserialize, Debug)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct KeysData {
|
2018-05-31 22:35:30 +00:00
|
|
|
EncryptedPrivateKey: String,
|
|
|
|
PublicKey: String,
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/accounts/register", data = "<data>")]
|
2018-05-31 22:18:50 +00:00
|
|
|
fn register(data: JsonUpcase<RegisterData>, conn: DbConn) -> EmptyResult {
|
|
|
|
let data: RegisterData = data.into_inner().data;
|
2018-02-17 22:38:55 +00:00
|
|
|
|
2018-02-10 00:00:55 +00:00
|
|
|
|
2018-09-10 13:51:40 +00:00
|
|
|
let mut user = match User::find_by_mail(&data.Email, &conn) {
|
|
|
|
Some(mut user) => {
|
|
|
|
if Invitation::take(&data.Email, &conn) {
|
|
|
|
for mut user_org in UserOrganization::find_invited_by_user(&user.uuid, &conn).iter_mut() {
|
|
|
|
user_org.status = UserOrgStatus::Accepted as i32;
|
|
|
|
user_org.save(&conn);
|
|
|
|
};
|
|
|
|
user
|
2018-09-13 19:55:23 +00:00
|
|
|
} else if CONFIG.signups_allowed {
|
|
|
|
err!("Account with this email already exists")
|
2018-09-10 13:51:40 +00:00
|
|
|
} else {
|
2018-09-13 19:55:23 +00:00
|
|
|
err!("Registration not allowed")
|
2018-09-10 13:51:40 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
None => {
|
|
|
|
if CONFIG.signups_allowed || Invitation::take(&data.Email, &conn) {
|
2018-09-11 13:25:12 +00:00
|
|
|
User::new(data.Email)
|
2018-09-10 13:51:40 +00:00
|
|
|
} else {
|
|
|
|
err!("Registration not allowed")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
2018-02-10 00:00:55 +00:00
|
|
|
|
2018-09-11 13:25:12 +00:00
|
|
|
user.set_password(&data.MasterPasswordHash);
|
|
|
|
user.key = data.Key;
|
2018-02-10 00:00:55 +00:00
|
|
|
|
|
|
|
// Add extra fields if present
|
2018-05-31 22:18:50 +00:00
|
|
|
if let Some(name) = data.Name {
|
2018-02-10 00:00:55 +00:00
|
|
|
user.name = name;
|
|
|
|
}
|
|
|
|
|
2018-05-31 22:18:50 +00:00
|
|
|
if let Some(hint) = data.MasterPasswordHint {
|
2018-02-10 00:00:55 +00:00
|
|
|
user.password_hint = Some(hint);
|
|
|
|
}
|
|
|
|
|
2018-05-31 22:18:50 +00:00
|
|
|
if let Some(keys) = data.Keys {
|
2018-05-31 22:35:30 +00:00
|
|
|
user.private_key = Some(keys.EncryptedPrivateKey);
|
|
|
|
user.public_key = Some(keys.PublicKey);
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
user.save(&conn);
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
#[get("/accounts/profile")]
|
2018-04-24 20:01:55 +00:00
|
|
|
fn profile(headers: Headers, conn: DbConn) -> JsonResult {
|
|
|
|
Ok(Json(headers.user.to_json(&conn)))
|
|
|
|
}
|
|
|
|
|
2018-06-16 22:06:59 +00:00
|
|
|
#[derive(Deserialize, Debug)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct ProfileData {
|
|
|
|
#[serde(rename = "Culture")]
|
|
|
|
_Culture: String, // Ignored, always use en-US
|
|
|
|
MasterPasswordHint: Option<String>,
|
|
|
|
Name: String,
|
|
|
|
}
|
|
|
|
|
2018-08-15 15:10:40 +00:00
|
|
|
#[put("/accounts/profile", data = "<data>")]
|
|
|
|
fn put_profile(data: JsonUpcase<ProfileData>, headers: Headers, conn: DbConn) -> JsonResult {
|
|
|
|
post_profile(data, headers, conn)
|
|
|
|
}
|
|
|
|
|
2018-06-16 22:06:59 +00:00
|
|
|
#[post("/accounts/profile", data = "<data>")]
|
|
|
|
fn post_profile(data: JsonUpcase<ProfileData>, headers: Headers, conn: DbConn) -> JsonResult {
|
|
|
|
let data: ProfileData = data.into_inner().data;
|
|
|
|
|
|
|
|
let mut user = headers.user;
|
|
|
|
|
|
|
|
user.name = data.Name;
|
2018-09-11 11:00:59 +00:00
|
|
|
user.password_hint = match data.MasterPasswordHint {
|
|
|
|
Some(ref h) if h.is_empty() => None,
|
|
|
|
_ => data.MasterPasswordHint,
|
|
|
|
};
|
2018-06-16 22:06:59 +00:00
|
|
|
user.save(&conn);
|
|
|
|
|
|
|
|
Ok(Json(user.to_json(&conn)))
|
|
|
|
}
|
|
|
|
|
2018-04-24 20:01:55 +00:00
|
|
|
#[get("/users/<uuid>/public-key")]
|
2018-05-30 20:30:45 +00:00
|
|
|
fn get_public_keys(uuid: String, _headers: Headers, conn: DbConn) -> JsonResult {
|
2018-04-24 20:01:55 +00:00
|
|
|
let user = match User::find_by_uuid(&uuid, &conn) {
|
|
|
|
Some(user) => user,
|
|
|
|
None => err!("User doesn't exist")
|
|
|
|
};
|
|
|
|
|
2018-05-04 20:54:23 +00:00
|
|
|
Ok(Json(json!({
|
|
|
|
"UserId": user.uuid,
|
|
|
|
"PublicKey": user.public_key,
|
|
|
|
"Object":"userKey"
|
|
|
|
})))
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/accounts/keys", data = "<data>")]
|
2018-05-31 22:18:50 +00:00
|
|
|
fn post_keys(data: JsonUpcase<KeysData>, headers: Headers, conn: DbConn) -> JsonResult {
|
|
|
|
let data: KeysData = data.into_inner().data;
|
2018-02-17 22:38:55 +00:00
|
|
|
|
2018-02-10 00:00:55 +00:00
|
|
|
let mut user = headers.user;
|
|
|
|
|
2018-05-31 22:35:30 +00:00
|
|
|
user.private_key = Some(data.EncryptedPrivateKey);
|
|
|
|
user.public_key = Some(data.PublicKey);
|
2018-02-10 00:00:55 +00:00
|
|
|
|
|
|
|
user.save(&conn);
|
|
|
|
|
2018-04-24 20:01:55 +00:00
|
|
|
Ok(Json(user.to_json(&conn)))
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
|
|
|
|
2018-02-22 23:38:54 +00:00
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct ChangePassData {
|
2018-05-31 22:18:50 +00:00
|
|
|
MasterPasswordHash: String,
|
|
|
|
NewMasterPasswordHash: String,
|
|
|
|
Key: String,
|
2018-02-22 23:38:54 +00:00
|
|
|
}
|
2018-02-10 00:00:55 +00:00
|
|
|
|
2018-02-22 23:38:54 +00:00
|
|
|
#[post("/accounts/password", data = "<data>")]
|
2018-05-31 22:18:50 +00:00
|
|
|
fn post_password(data: JsonUpcase<ChangePassData>, headers: Headers, conn: DbConn) -> EmptyResult {
|
|
|
|
let data: ChangePassData = data.into_inner().data;
|
2018-02-10 00:00:55 +00:00
|
|
|
let mut user = headers.user;
|
|
|
|
|
2018-05-31 22:18:50 +00:00
|
|
|
if !user.check_valid_password(&data.MasterPasswordHash) {
|
2018-02-10 00:00:55 +00:00
|
|
|
err!("Invalid password")
|
|
|
|
}
|
|
|
|
|
2018-05-31 22:18:50 +00:00
|
|
|
user.set_password(&data.NewMasterPasswordHash);
|
|
|
|
user.key = data.Key;
|
2018-02-10 00:00:55 +00:00
|
|
|
user.save(&conn);
|
|
|
|
|
2018-02-14 23:40:34 +00:00
|
|
|
Ok(())
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/accounts/security-stamp", data = "<data>")]
|
2018-05-31 22:18:50 +00:00
|
|
|
fn post_sstamp(data: JsonUpcase<PasswordData>, headers: Headers, conn: DbConn) -> EmptyResult {
|
|
|
|
let data: PasswordData = data.into_inner().data;
|
2018-02-10 00:00:55 +00:00
|
|
|
let mut user = headers.user;
|
|
|
|
|
2018-05-31 22:18:50 +00:00
|
|
|
if !user.check_valid_password(&data.MasterPasswordHash) {
|
2018-02-10 00:00:55 +00:00
|
|
|
err!("Invalid password")
|
|
|
|
}
|
|
|
|
|
|
|
|
user.reset_security_stamp();
|
2018-02-14 23:40:34 +00:00
|
|
|
user.save(&conn);
|
2018-02-10 00:00:55 +00:00
|
|
|
|
2018-02-14 23:40:34 +00:00
|
|
|
Ok(())
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
|
|
|
|
2018-02-22 23:38:54 +00:00
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
2018-06-16 22:06:59 +00:00
|
|
|
struct EmailTokenData {
|
2018-05-31 22:18:50 +00:00
|
|
|
MasterPasswordHash: String,
|
|
|
|
NewEmail: String,
|
2018-02-22 23:38:54 +00:00
|
|
|
}
|
2018-02-10 00:00:55 +00:00
|
|
|
|
2018-02-22 23:38:54 +00:00
|
|
|
#[post("/accounts/email-token", data = "<data>")]
|
2018-06-16 22:06:59 +00:00
|
|
|
fn post_email_token(data: JsonUpcase<EmailTokenData>, headers: Headers, conn: DbConn) -> EmptyResult {
|
|
|
|
let data: EmailTokenData = data.into_inner().data;
|
|
|
|
|
|
|
|
if !headers.user.check_valid_password(&data.MasterPasswordHash) {
|
|
|
|
err!("Invalid password")
|
|
|
|
}
|
|
|
|
|
|
|
|
if User::find_by_mail(&data.NewEmail, &conn).is_some() {
|
|
|
|
err!("Email already in use");
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct ChangeEmailData {
|
|
|
|
MasterPasswordHash: String,
|
|
|
|
NewEmail: String,
|
|
|
|
|
|
|
|
Key: String,
|
|
|
|
NewMasterPasswordHash: String,
|
|
|
|
#[serde(rename = "Token")]
|
|
|
|
_Token: NumberOrString,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/accounts/email", data = "<data>")]
|
2018-05-31 22:18:50 +00:00
|
|
|
fn post_email(data: JsonUpcase<ChangeEmailData>, headers: Headers, conn: DbConn) -> EmptyResult {
|
|
|
|
let data: ChangeEmailData = data.into_inner().data;
|
2018-02-10 00:00:55 +00:00
|
|
|
let mut user = headers.user;
|
|
|
|
|
2018-05-31 22:18:50 +00:00
|
|
|
if !user.check_valid_password(&data.MasterPasswordHash) {
|
2018-02-10 00:00:55 +00:00
|
|
|
err!("Invalid password")
|
|
|
|
}
|
|
|
|
|
2018-05-31 22:18:50 +00:00
|
|
|
if User::find_by_mail(&data.NewEmail, &conn).is_some() {
|
2018-02-14 23:40:34 +00:00
|
|
|
err!("Email already in use");
|
|
|
|
}
|
|
|
|
|
2018-05-31 22:18:50 +00:00
|
|
|
user.email = data.NewEmail;
|
2018-06-16 22:06:59 +00:00
|
|
|
|
|
|
|
user.set_password(&data.NewMasterPasswordHash);
|
|
|
|
user.key = data.Key;
|
|
|
|
|
2018-02-14 23:40:34 +00:00
|
|
|
user.save(&conn);
|
|
|
|
|
|
|
|
Ok(())
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/accounts/delete", data = "<data>")]
|
2018-09-18 10:13:45 +00:00
|
|
|
fn post_delete_account(data: JsonUpcase<PasswordData>, headers: Headers, conn: DbConn) -> EmptyResult {
|
|
|
|
delete_account(data, headers, conn)
|
|
|
|
}
|
|
|
|
|
|
|
|
#[delete("/accounts", data = "<data>")]
|
2018-05-31 22:18:50 +00:00
|
|
|
fn delete_account(data: JsonUpcase<PasswordData>, headers: Headers, conn: DbConn) -> EmptyResult {
|
|
|
|
let data: PasswordData = data.into_inner().data;
|
2018-02-14 23:53:11 +00:00
|
|
|
let user = headers.user;
|
2018-02-10 00:00:55 +00:00
|
|
|
|
2018-05-31 22:18:50 +00:00
|
|
|
if !user.check_valid_password(&data.MasterPasswordHash) {
|
2018-02-10 00:00:55 +00:00
|
|
|
err!("Invalid password")
|
|
|
|
}
|
|
|
|
|
2018-02-15 18:05:57 +00:00
|
|
|
// Delete ciphers and their attachments
|
2018-05-13 12:20:21 +00:00
|
|
|
for cipher in Cipher::find_owned_by_user(&user.uuid, &conn) {
|
2018-06-11 13:44:37 +00:00
|
|
|
if cipher.delete(&conn).is_err() {
|
|
|
|
err!("Failed deleting cipher")
|
2018-05-15 16:27:53 +00:00
|
|
|
}
|
2018-02-15 18:05:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Delete folders
|
2018-05-16 16:19:52 +00:00
|
|
|
for f in Folder::find_by_user(&user.uuid, &conn) {
|
2018-06-11 13:44:37 +00:00
|
|
|
if f.delete(&conn).is_err() {
|
|
|
|
err!("Failed deleting folder")
|
2018-05-16 16:19:52 +00:00
|
|
|
}
|
|
|
|
}
|
2018-02-15 18:05:57 +00:00
|
|
|
|
|
|
|
// Delete devices
|
|
|
|
for d in Device::find_by_user(&user.uuid, &conn) { d.delete(&conn); }
|
|
|
|
|
2018-02-14 23:40:34 +00:00
|
|
|
// Delete user
|
2018-02-15 18:05:57 +00:00
|
|
|
user.delete(&conn);
|
2018-02-14 23:40:34 +00:00
|
|
|
|
2018-02-15 18:05:57 +00:00
|
|
|
Ok(())
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[get("/accounts/revision-date")]
|
2018-02-17 19:47:13 +00:00
|
|
|
fn revision_date(headers: Headers) -> String {
|
2018-08-10 16:17:44 +00:00
|
|
|
let revision_date = headers.user.updated_at.timestamp_millis();
|
2018-02-17 19:47:13 +00:00
|
|
|
revision_date.to_string()
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
2018-08-10 13:21:42 +00:00
|
|
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct PasswordHintData {
|
|
|
|
Email: String,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/accounts/password-hint", data = "<data>")]
|
|
|
|
fn password_hint(data: JsonUpcase<PasswordHintData>, conn: DbConn) -> EmptyResult {
|
|
|
|
let data: PasswordHintData = data.into_inner().data;
|
|
|
|
|
2018-08-15 15:25:59 +00:00
|
|
|
if !is_valid_email(&data.Email) {
|
2018-09-12 21:58:02 +00:00
|
|
|
err!("This email address is not valid...");
|
2018-08-10 13:21:42 +00:00
|
|
|
}
|
|
|
|
|
2018-08-15 06:32:19 +00:00
|
|
|
let user = User::find_by_mail(&data.Email, &conn);
|
|
|
|
if user.is_none() {
|
|
|
|
return Ok(());
|
|
|
|
}
|
|
|
|
|
|
|
|
let user = user.unwrap();
|
|
|
|
if let Some(ref mail_config) = CONFIG.mail {
|
2018-09-11 11:04:34 +00:00
|
|
|
if let Err(e) = mail::send_password_hint(&user.email, user.password_hint, mail_config) {
|
2018-08-15 06:32:19 +00:00
|
|
|
err!(format!("There have been a problem sending the email: {}", e));
|
|
|
|
}
|
2018-08-15 12:08:00 +00:00
|
|
|
} else if CONFIG.show_password_hint {
|
2018-09-11 11:04:34 +00:00
|
|
|
if let Some(hint) = user.password_hint {
|
|
|
|
err!(format!("Your password hint is: {}", &hint));
|
|
|
|
} else {
|
2018-09-13 19:55:23 +00:00
|
|
|
err!("Sorry, you have no password hint...");
|
2018-09-11 11:04:34 +00:00
|
|
|
}
|
2018-08-10 13:21:42 +00:00
|
|
|
}
|
2018-08-15 06:32:19 +00:00
|
|
|
|
|
|
|
Ok(())
|
2018-08-10 13:21:42 +00:00
|
|
|
}
|
2018-08-24 17:02:34 +00:00
|
|
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
struct PreloginData {
|
|
|
|
Email: String,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/accounts/prelogin", data = "<data>")]
|
|
|
|
fn prelogin(data: JsonUpcase<PreloginData>, conn: DbConn) -> JsonResult {
|
|
|
|
let data: PreloginData = data.into_inner().data;
|
|
|
|
|
2018-09-13 21:04:52 +00:00
|
|
|
const KDF_TYPE_DEFAULT: i32 = 0; // PBKDF2: 0
|
|
|
|
const KDF_ITER_DEFAULT: i32 = 5_000;
|
2018-08-24 17:02:34 +00:00
|
|
|
|
2018-09-13 21:04:52 +00:00
|
|
|
let (kdf_type, kdf_iter) = match User::find_by_mail(&data.Email, &conn) {
|
|
|
|
Some(user) => {
|
2018-08-24 17:02:34 +00:00
|
|
|
let _server_iter = user.password_iterations;
|
2018-09-13 21:04:52 +00:00
|
|
|
let client_iter = KDF_ITER_DEFAULT; // TODO: Make iterations user configurable
|
2018-08-24 17:02:34 +00:00
|
|
|
|
2018-09-13 21:04:52 +00:00
|
|
|
(KDF_TYPE_DEFAULT, client_iter)
|
2018-08-24 17:02:34 +00:00
|
|
|
},
|
2018-09-13 21:04:52 +00:00
|
|
|
None => (KDF_TYPE_DEFAULT, KDF_ITER_DEFAULT), // Return default values when no user
|
|
|
|
};
|
|
|
|
|
|
|
|
Ok(Json(json!({
|
|
|
|
"Kdf": kdf_type,
|
|
|
|
"KdfIterations": kdf_iter
|
|
|
|
})))
|
2018-08-24 17:02:34 +00:00
|
|
|
}
|
|
|
|
|