proxmox-backup/src/api2/access.rs

175 lines
4.7 KiB
Rust
Raw Normal View History

use anyhow::{bail, format_err, Error};
2019-01-30 14:14:20 +00:00
use serde_json::{json, Value};
use proxmox::api::{api, RpcEnvironment, Permission, UserInformation};
use proxmox::api::router::{Router, SubdirMap};
2020-04-09 11:34:07 +00:00
use proxmox::{sortable, identity};
use proxmox::{http_err, list_subdirs_api_method};
2019-01-30 14:14:20 +00:00
use crate::tools;
use crate::tools::ticket::*;
use crate::auth_helpers::*;
use crate::api2::types::*;
2020-04-16 08:01:59 +00:00
use crate::config::cached_user_info::CachedUserInfo;
use crate::config::acl::PRIV_PERMISSIONS_MODIFY;
pub mod user;
2020-04-09 09:36:45 +00:00
pub mod domain;
2020-04-13 09:09:44 +00:00
pub mod acl;
pub mod role;
2019-01-30 14:14:20 +00:00
fn authenticate_user(username: &str, password: &str) -> Result<(), Error> {
2020-04-16 08:01:59 +00:00
let user_info = CachedUserInfo::new()?;
if !user_info.is_active_user(&username) {
bail!("user account disabled or expired.");
}
let ticket_lifetime = tools::ticket::TICKET_LIFETIME;
if password.starts_with("PBS:") {
if let Ok((_age, Some(ticket_username))) = tools::ticket::verify_rsa_ticket(public_auth_key(), "PBS", password, None, -300, ticket_lifetime) {
if ticket_username == username {
return Ok(());
} else {
bail!("ticket login failed - wrong username");
}
}
}
2020-04-08 09:57:14 +00:00
crate::auth::authenticate_user(username, password)
2019-01-30 14:14:20 +00:00
}
#[api(
input: {
properties: {
username: {
schema: PROXMOX_USER_ID_SCHEMA,
},
password: {
schema: PASSWORD_SCHEMA,
},
},
},
returns: {
properties: {
username: {
type: String,
description: "User name.",
},
ticket: {
type: String,
description: "Auth ticket.",
},
CSRFPreventionToken: {
type: String,
description: "Cross Site Request Forgery Prevention Token.",
},
},
},
protected: true,
2020-04-16 08:01:59 +00:00
access: {
permission: &Permission::World,
},
)]
/// Create or verify authentication ticket.
///
/// Returns: An authentication ticket with additional infos.
fn create_ticket(username: String, password: String) -> Result<Value, Error> {
match authenticate_user(&username, &password) {
2019-01-30 14:14:20 +00:00
Ok(_) => {
let ticket = assemble_rsa_ticket( private_auth_key(), "PBS", Some(&username), None)?;
2019-01-30 14:14:20 +00:00
let token = assemble_csrf_prevention_token(csrf_secret(), &username);
2019-01-30 14:14:20 +00:00
log::info!("successful auth for user '{}'", username);
2019-10-26 09:36:01 +00:00
Ok(json!({
2019-01-30 14:14:20 +00:00
"username": username,
"ticket": ticket,
"CSRFPreventionToken": token,
2019-10-26 09:36:01 +00:00
}))
2019-01-30 14:14:20 +00:00
}
Err(err) => {
let client_ip = "unknown"; // $rpcenv->get_client_ip() || '';
2019-01-30 14:14:20 +00:00
log::error!("authentication failure; rhost={} user={} msg={}", client_ip, username, err.to_string());
2019-10-26 09:36:01 +00:00
Err(http_err!(UNAUTHORIZED, "permission check failed.".into()))
2019-01-30 14:14:20 +00:00
}
}
}
#[api(
input: {
properties: {
userid: {
schema: PROXMOX_USER_ID_SCHEMA,
},
password: {
schema: PASSWORD_SCHEMA,
},
},
},
2020-04-16 08:01:59 +00:00
access: {
description: "Anybody is allowed to change there own password. In addition, users with 'Permissions:Modify' privilege may change any password.",
2020-04-16 08:01:59 +00:00
permission: &Permission::Anybody,
},
)]
/// Change user password
///
/// Each user is allowed to change his own password. Superuser
/// can change all passwords.
fn change_password(
userid: String,
password: String,
rpcenv: &mut dyn RpcEnvironment,
) -> Result<Value, Error> {
let current_user = rpcenv.get_user()
.ok_or_else(|| format_err!("unknown user"))?;
let mut allowed = userid == current_user;
if userid == "root@pam" { allowed = true; }
if !allowed {
let user_info = CachedUserInfo::new()?;
let privs = user_info.lookup_privs(&current_user, &[]);
if (privs & PRIV_PERMISSIONS_MODIFY) != 0 { allowed = true; }
}
if !allowed {
bail!("you are not authorized to change the password.");
}
let (username, realm) = crate::auth::parse_userid(&userid)?;
let authenticator = crate::auth::lookup_authenticator(&realm)?;
authenticator.store_password(&username, &password)?;
Ok(Value::Null)
}
#[sortable]
2020-04-09 11:34:07 +00:00
const SUBDIRS: SubdirMap = &sorted!([
2020-04-13 09:09:44 +00:00
("acl", &acl::ROUTER),
(
"password", &Router::new()
.put(&API_METHOD_CHANGE_PASSWORD)
),
2019-11-21 08:36:41 +00:00
(
"ticket", &Router::new()
.post(&API_METHOD_CREATE_TICKET)
),
2020-04-09 09:36:45 +00:00
("domains", &domain::ROUTER),
("roles", &role::ROUTER),
("users", &user::ROUTER),
2020-04-09 11:34:07 +00:00
]);
2019-11-21 08:36:41 +00:00
pub const ROUTER: Router = Router::new()
.get(&list_subdirs_api_method!(SUBDIRS))
.subdirs(SUBDIRS);