Added web-vault v2.21.x support + some misc fixes
- The new web-vault v2.21.0+ has support for Master Password Reset. For
this to work it generates a public/private key-pair which needs to be
stored in the database. Currently the Master Password Reset is not
fixed, but there are endpoints which are needed even if we do not
support this feature (yet). This PR fixes those endpoints, and stores
the keys already in the database.
- There was an issue when you want to do a key-rotate when you change
your password, it also called an Emergency Access endpoint, which we do
not yet support. Because this endpoint failed to reply correctly
produced some errors, and also prevent the user from being forced to
logout. This resolves #1826 by adding at least that endpoint.
Because of that extra endpoint check to Emergency Access is done using
an old user stamp, i also modified the stamp exception to allow multiple
rocket routes to be called, and added an expiration timestamp to it.
During these tests i stumbled upon an issue that after my key-change was
done, it triggered the websockets to try and reload my ciphers, because
they were updated. This shouldn't happen when rotating they keys, since
all access should be invalided. Now there will be no websocket
notification for this, which also prevents error toasts.
- Increased Send Size limit to 500MB (with a litle overhead)
As a side note, i tested these changes on both v2.20.4 and v2.21.1 web-vault versions, all keeps working.
2021-07-04 21:02:56 +00:00
|
|
|
use chrono::{Duration, NaiveDateTime, Utc};
|
2018-10-10 18:40:39 +00:00
|
|
|
use serde_json::Value;
|
2018-02-10 00:00:55 +00:00
|
|
|
|
2018-12-07 01:05:45 +00:00
|
|
|
use crate::crypto;
|
|
|
|
use crate::CONFIG;
|
2018-02-10 00:00:55 +00:00
|
|
|
|
2020-08-18 15:15:44 +00:00
|
|
|
db_object! {
|
2021-03-13 21:04:04 +00:00
|
|
|
#[derive(Identifiable, Queryable, Insertable, AsChangeset)]
|
2020-08-18 15:15:44 +00:00
|
|
|
#[table_name = "users"]
|
|
|
|
#[changeset_options(treat_none_as_null="true")]
|
|
|
|
#[primary_key(uuid)]
|
|
|
|
pub struct User {
|
|
|
|
pub uuid: String,
|
2020-11-30 22:12:56 +00:00
|
|
|
pub enabled: bool,
|
2020-08-18 15:15:44 +00:00
|
|
|
pub created_at: NaiveDateTime,
|
|
|
|
pub updated_at: NaiveDateTime,
|
|
|
|
pub verified_at: Option<NaiveDateTime>,
|
|
|
|
pub last_verifying_at: Option<NaiveDateTime>,
|
|
|
|
pub login_verify_count: i32,
|
|
|
|
|
|
|
|
pub email: String,
|
|
|
|
pub email_new: Option<String>,
|
|
|
|
pub email_new_token: Option<String>,
|
|
|
|
pub name: String,
|
|
|
|
|
|
|
|
pub password_hash: Vec<u8>,
|
|
|
|
pub salt: Vec<u8>,
|
|
|
|
pub password_iterations: i32,
|
|
|
|
pub password_hint: Option<String>,
|
|
|
|
|
|
|
|
pub akey: String,
|
|
|
|
pub private_key: Option<String>,
|
|
|
|
pub public_key: Option<String>,
|
|
|
|
|
|
|
|
#[column_name = "totp_secret"] // Note, this is only added to the UserDb structs, not to User
|
|
|
|
_totp_secret: Option<String>,
|
|
|
|
pub totp_recover: Option<String>,
|
|
|
|
|
|
|
|
pub security_stamp: String,
|
2020-12-14 18:58:23 +00:00
|
|
|
pub stamp_exception: Option<String>,
|
2020-08-18 15:15:44 +00:00
|
|
|
|
|
|
|
pub equivalent_domains: String,
|
|
|
|
pub excluded_globals: String,
|
|
|
|
|
|
|
|
pub client_kdf_type: i32,
|
|
|
|
pub client_kdf_iter: i32,
|
|
|
|
|
2022-01-19 10:51:26 +00:00
|
|
|
pub api_key: Option<String>,
|
|
|
|
}
|
2020-08-18 15:15:44 +00:00
|
|
|
|
2021-03-13 21:04:04 +00:00
|
|
|
#[derive(Identifiable, Queryable, Insertable)]
|
2020-08-18 15:15:44 +00:00
|
|
|
#[table_name = "invitations"]
|
|
|
|
#[primary_key(email)]
|
|
|
|
pub struct Invitation {
|
|
|
|
pub email: String,
|
|
|
|
}
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
|
|
|
|
2019-04-12 22:01:52 +00:00
|
|
|
enum UserStatus {
|
|
|
|
Enabled = 0,
|
|
|
|
Invited = 1,
|
|
|
|
_Disabled = 2,
|
|
|
|
}
|
|
|
|
|
2020-12-14 18:58:23 +00:00
|
|
|
#[derive(Serialize, Deserialize)]
|
|
|
|
pub struct UserStampException {
|
Added web-vault v2.21.x support + some misc fixes
- The new web-vault v2.21.0+ has support for Master Password Reset. For
this to work it generates a public/private key-pair which needs to be
stored in the database. Currently the Master Password Reset is not
fixed, but there are endpoints which are needed even if we do not
support this feature (yet). This PR fixes those endpoints, and stores
the keys already in the database.
- There was an issue when you want to do a key-rotate when you change
your password, it also called an Emergency Access endpoint, which we do
not yet support. Because this endpoint failed to reply correctly
produced some errors, and also prevent the user from being forced to
logout. This resolves #1826 by adding at least that endpoint.
Because of that extra endpoint check to Emergency Access is done using
an old user stamp, i also modified the stamp exception to allow multiple
rocket routes to be called, and added an expiration timestamp to it.
During these tests i stumbled upon an issue that after my key-change was
done, it triggered the websockets to try and reload my ciphers, because
they were updated. This shouldn't happen when rotating they keys, since
all access should be invalided. Now there will be no websocket
notification for this, which also prevents error toasts.
- Increased Send Size limit to 500MB (with a litle overhead)
As a side note, i tested these changes on both v2.20.4 and v2.21.1 web-vault versions, all keeps working.
2021-07-04 21:02:56 +00:00
|
|
|
pub routes: Vec<String>,
|
2021-03-31 20:18:35 +00:00
|
|
|
pub security_stamp: String,
|
Added web-vault v2.21.x support + some misc fixes
- The new web-vault v2.21.0+ has support for Master Password Reset. For
this to work it generates a public/private key-pair which needs to be
stored in the database. Currently the Master Password Reset is not
fixed, but there are endpoints which are needed even if we do not
support this feature (yet). This PR fixes those endpoints, and stores
the keys already in the database.
- There was an issue when you want to do a key-rotate when you change
your password, it also called an Emergency Access endpoint, which we do
not yet support. Because this endpoint failed to reply correctly
produced some errors, and also prevent the user from being forced to
logout. This resolves #1826 by adding at least that endpoint.
Because of that extra endpoint check to Emergency Access is done using
an old user stamp, i also modified the stamp exception to allow multiple
rocket routes to be called, and added an expiration timestamp to it.
During these tests i stumbled upon an issue that after my key-change was
done, it triggered the websockets to try and reload my ciphers, because
they were updated. This shouldn't happen when rotating they keys, since
all access should be invalided. Now there will be no websocket
notification for this, which also prevents error toasts.
- Increased Send Size limit to 500MB (with a litle overhead)
As a side note, i tested these changes on both v2.20.4 and v2.21.1 web-vault versions, all keeps working.
2021-07-04 21:02:56 +00:00
|
|
|
pub expire: i64,
|
2020-12-14 18:58:23 +00:00
|
|
|
}
|
|
|
|
|
2018-02-10 00:00:55 +00:00
|
|
|
/// Local methods
|
|
|
|
impl User {
|
2018-09-19 15:30:14 +00:00
|
|
|
pub const CLIENT_KDF_TYPE_DEFAULT: i32 = 0; // PBKDF2: 0
|
2019-09-05 19:56:12 +00:00
|
|
|
pub const CLIENT_KDF_ITER_DEFAULT: i32 = 100_000;
|
2018-09-19 15:30:14 +00:00
|
|
|
|
2021-09-09 11:50:18 +00:00
|
|
|
pub fn new(email: String) -> Self {
|
2018-02-10 00:00:55 +00:00
|
|
|
let now = Utc::now().naive_utc();
|
2021-09-09 11:50:18 +00:00
|
|
|
let email = email.to_lowercase();
|
2018-02-10 00:00:55 +00:00
|
|
|
|
2018-02-14 23:40:34 +00:00
|
|
|
Self {
|
2018-12-07 13:32:40 +00:00
|
|
|
uuid: crate::util::get_uuid(),
|
2020-11-30 22:12:56 +00:00
|
|
|
enabled: true,
|
2018-02-10 00:00:55 +00:00
|
|
|
created_at: now,
|
|
|
|
updated_at: now,
|
2019-11-25 05:28:49 +00:00
|
|
|
verified_at: None,
|
|
|
|
last_verifying_at: None,
|
|
|
|
login_verify_count: 0,
|
2018-02-10 00:00:55 +00:00
|
|
|
name: email.clone(),
|
|
|
|
email,
|
2019-05-20 19:12:41 +00:00
|
|
|
akey: String::new(),
|
2019-11-25 05:28:49 +00:00
|
|
|
email_new: None,
|
|
|
|
email_new_token: None,
|
2018-02-10 00:00:55 +00:00
|
|
|
|
2018-09-11 13:25:12 +00:00
|
|
|
password_hash: Vec::new(),
|
2018-09-19 15:30:14 +00:00
|
|
|
salt: crypto::get_random_64(),
|
2019-01-25 17:23:51 +00:00
|
|
|
password_iterations: CONFIG.password_iterations(),
|
2018-02-10 00:00:55 +00:00
|
|
|
|
2018-12-07 13:32:40 +00:00
|
|
|
security_stamp: crate::util::get_uuid(),
|
2020-12-14 18:58:23 +00:00
|
|
|
stamp_exception: None,
|
2018-02-10 00:00:55 +00:00
|
|
|
|
|
|
|
password_hint: None,
|
|
|
|
private_key: None,
|
|
|
|
public_key: None,
|
2018-12-30 22:34:31 +00:00
|
|
|
|
2018-07-12 19:46:50 +00:00
|
|
|
_totp_secret: None,
|
2018-02-10 00:00:55 +00:00
|
|
|
totp_recover: None,
|
2018-02-14 23:40:34 +00:00
|
|
|
|
|
|
|
equivalent_domains: "[]".to_string(),
|
|
|
|
excluded_globals: "[]".to_string(),
|
2018-12-30 22:34:31 +00:00
|
|
|
|
2018-09-19 15:30:14 +00:00
|
|
|
client_kdf_type: Self::CLIENT_KDF_TYPE_DEFAULT,
|
|
|
|
client_kdf_iter: Self::CLIENT_KDF_ITER_DEFAULT,
|
2022-01-19 10:51:26 +00:00
|
|
|
|
|
|
|
api_key: None,
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn check_valid_password(&self, password: &str) -> bool {
|
2018-12-30 22:34:31 +00:00
|
|
|
crypto::verify_password_hash(
|
|
|
|
password.as_bytes(),
|
|
|
|
&self.salt,
|
|
|
|
&self.password_hash,
|
|
|
|
self.password_iterations as u32,
|
|
|
|
)
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
|
|
|
|
2018-02-15 18:05:57 +00:00
|
|
|
pub fn check_valid_recovery_code(&self, recovery_code: &str) -> bool {
|
|
|
|
if let Some(ref totp_recover) = self.totp_recover {
|
2019-02-11 22:45:55 +00:00
|
|
|
crate::crypto::ct_eq(recovery_code, totp_recover.to_lowercase())
|
2018-02-15 18:05:57 +00:00
|
|
|
} else {
|
|
|
|
false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-19 10:51:26 +00:00
|
|
|
pub fn check_valid_api_key(&self, key: &str) -> bool {
|
|
|
|
matches!(self.api_key, Some(ref api_key) if crate::crypto::ct_eq(api_key, key))
|
|
|
|
}
|
|
|
|
|
2020-12-14 18:58:23 +00:00
|
|
|
/// Set the password hash generated
|
|
|
|
/// And resets the security_stamp. Based upon the allow_next_route the security_stamp will be different.
|
|
|
|
///
|
|
|
|
/// # Arguments
|
|
|
|
///
|
|
|
|
/// * `password` - A str which contains a hashed version of the users master password.
|
Added web-vault v2.21.x support + some misc fixes
- The new web-vault v2.21.0+ has support for Master Password Reset. For
this to work it generates a public/private key-pair which needs to be
stored in the database. Currently the Master Password Reset is not
fixed, but there are endpoints which are needed even if we do not
support this feature (yet). This PR fixes those endpoints, and stores
the keys already in the database.
- There was an issue when you want to do a key-rotate when you change
your password, it also called an Emergency Access endpoint, which we do
not yet support. Because this endpoint failed to reply correctly
produced some errors, and also prevent the user from being forced to
logout. This resolves #1826 by adding at least that endpoint.
Because of that extra endpoint check to Emergency Access is done using
an old user stamp, i also modified the stamp exception to allow multiple
rocket routes to be called, and added an expiration timestamp to it.
During these tests i stumbled upon an issue that after my key-change was
done, it triggered the websockets to try and reload my ciphers, because
they were updated. This shouldn't happen when rotating they keys, since
all access should be invalided. Now there will be no websocket
notification for this, which also prevents error toasts.
- Increased Send Size limit to 500MB (with a litle overhead)
As a side note, i tested these changes on both v2.20.4 and v2.21.1 web-vault versions, all keeps working.
2021-07-04 21:02:56 +00:00
|
|
|
/// * `allow_next_route` - A Option<Vec<String>> with the function names of the next allowed (rocket) routes.
|
|
|
|
/// These routes are able to use the previous stamp id for the next 2 minutes.
|
|
|
|
/// After these 2 minutes this stamp will expire.
|
2020-12-14 18:58:23 +00:00
|
|
|
///
|
Added web-vault v2.21.x support + some misc fixes
- The new web-vault v2.21.0+ has support for Master Password Reset. For
this to work it generates a public/private key-pair which needs to be
stored in the database. Currently the Master Password Reset is not
fixed, but there are endpoints which are needed even if we do not
support this feature (yet). This PR fixes those endpoints, and stores
the keys already in the database.
- There was an issue when you want to do a key-rotate when you change
your password, it also called an Emergency Access endpoint, which we do
not yet support. Because this endpoint failed to reply correctly
produced some errors, and also prevent the user from being forced to
logout. This resolves #1826 by adding at least that endpoint.
Because of that extra endpoint check to Emergency Access is done using
an old user stamp, i also modified the stamp exception to allow multiple
rocket routes to be called, and added an expiration timestamp to it.
During these tests i stumbled upon an issue that after my key-change was
done, it triggered the websockets to try and reload my ciphers, because
they were updated. This shouldn't happen when rotating they keys, since
all access should be invalided. Now there will be no websocket
notification for this, which also prevents error toasts.
- Increased Send Size limit to 500MB (with a litle overhead)
As a side note, i tested these changes on both v2.20.4 and v2.21.1 web-vault versions, all keeps working.
2021-07-04 21:02:56 +00:00
|
|
|
pub fn set_password(&mut self, password: &str, allow_next_route: Option<Vec<String>>) {
|
2018-12-30 22:34:31 +00:00
|
|
|
self.password_hash = crypto::hash_password(password.as_bytes(), &self.salt, self.password_iterations as u32);
|
2020-12-14 18:58:23 +00:00
|
|
|
|
|
|
|
if let Some(route) = allow_next_route {
|
|
|
|
self.set_stamp_exception(route);
|
|
|
|
}
|
|
|
|
|
|
|
|
self.reset_security_stamp()
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn reset_security_stamp(&mut self) {
|
2018-12-07 13:32:40 +00:00
|
|
|
self.security_stamp = crate::util::get_uuid();
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
2020-12-14 18:58:23 +00:00
|
|
|
|
|
|
|
/// Set the stamp_exception to only allow a subsequent request matching a specific route using the current security-stamp.
|
|
|
|
///
|
|
|
|
/// # Arguments
|
Added web-vault v2.21.x support + some misc fixes
- The new web-vault v2.21.0+ has support for Master Password Reset. For
this to work it generates a public/private key-pair which needs to be
stored in the database. Currently the Master Password Reset is not
fixed, but there are endpoints which are needed even if we do not
support this feature (yet). This PR fixes those endpoints, and stores
the keys already in the database.
- There was an issue when you want to do a key-rotate when you change
your password, it also called an Emergency Access endpoint, which we do
not yet support. Because this endpoint failed to reply correctly
produced some errors, and also prevent the user from being forced to
logout. This resolves #1826 by adding at least that endpoint.
Because of that extra endpoint check to Emergency Access is done using
an old user stamp, i also modified the stamp exception to allow multiple
rocket routes to be called, and added an expiration timestamp to it.
During these tests i stumbled upon an issue that after my key-change was
done, it triggered the websockets to try and reload my ciphers, because
they were updated. This shouldn't happen when rotating they keys, since
all access should be invalided. Now there will be no websocket
notification for this, which also prevents error toasts.
- Increased Send Size limit to 500MB (with a litle overhead)
As a side note, i tested these changes on both v2.20.4 and v2.21.1 web-vault versions, all keeps working.
2021-07-04 21:02:56 +00:00
|
|
|
/// * `route_exception` - A Vec<String> with the function names of the next allowed (rocket) routes.
|
|
|
|
/// These routes are able to use the previous stamp id for the next 2 minutes.
|
|
|
|
/// After these 2 minutes this stamp will expire.
|
2020-12-14 18:58:23 +00:00
|
|
|
///
|
Added web-vault v2.21.x support + some misc fixes
- The new web-vault v2.21.0+ has support for Master Password Reset. For
this to work it generates a public/private key-pair which needs to be
stored in the database. Currently the Master Password Reset is not
fixed, but there are endpoints which are needed even if we do not
support this feature (yet). This PR fixes those endpoints, and stores
the keys already in the database.
- There was an issue when you want to do a key-rotate when you change
your password, it also called an Emergency Access endpoint, which we do
not yet support. Because this endpoint failed to reply correctly
produced some errors, and also prevent the user from being forced to
logout. This resolves #1826 by adding at least that endpoint.
Because of that extra endpoint check to Emergency Access is done using
an old user stamp, i also modified the stamp exception to allow multiple
rocket routes to be called, and added an expiration timestamp to it.
During these tests i stumbled upon an issue that after my key-change was
done, it triggered the websockets to try and reload my ciphers, because
they were updated. This shouldn't happen when rotating they keys, since
all access should be invalided. Now there will be no websocket
notification for this, which also prevents error toasts.
- Increased Send Size limit to 500MB (with a litle overhead)
As a side note, i tested these changes on both v2.20.4 and v2.21.1 web-vault versions, all keeps working.
2021-07-04 21:02:56 +00:00
|
|
|
pub fn set_stamp_exception(&mut self, route_exception: Vec<String>) {
|
2020-12-14 18:58:23 +00:00
|
|
|
let stamp_exception = UserStampException {
|
Added web-vault v2.21.x support + some misc fixes
- The new web-vault v2.21.0+ has support for Master Password Reset. For
this to work it generates a public/private key-pair which needs to be
stored in the database. Currently the Master Password Reset is not
fixed, but there are endpoints which are needed even if we do not
support this feature (yet). This PR fixes those endpoints, and stores
the keys already in the database.
- There was an issue when you want to do a key-rotate when you change
your password, it also called an Emergency Access endpoint, which we do
not yet support. Because this endpoint failed to reply correctly
produced some errors, and also prevent the user from being forced to
logout. This resolves #1826 by adding at least that endpoint.
Because of that extra endpoint check to Emergency Access is done using
an old user stamp, i also modified the stamp exception to allow multiple
rocket routes to be called, and added an expiration timestamp to it.
During these tests i stumbled upon an issue that after my key-change was
done, it triggered the websockets to try and reload my ciphers, because
they were updated. This shouldn't happen when rotating they keys, since
all access should be invalided. Now there will be no websocket
notification for this, which also prevents error toasts.
- Increased Send Size limit to 500MB (with a litle overhead)
As a side note, i tested these changes on both v2.20.4 and v2.21.1 web-vault versions, all keeps working.
2021-07-04 21:02:56 +00:00
|
|
|
routes: route_exception,
|
2021-03-31 20:18:35 +00:00
|
|
|
security_stamp: self.security_stamp.to_string(),
|
Added web-vault v2.21.x support + some misc fixes
- The new web-vault v2.21.0+ has support for Master Password Reset. For
this to work it generates a public/private key-pair which needs to be
stored in the database. Currently the Master Password Reset is not
fixed, but there are endpoints which are needed even if we do not
support this feature (yet). This PR fixes those endpoints, and stores
the keys already in the database.
- There was an issue when you want to do a key-rotate when you change
your password, it also called an Emergency Access endpoint, which we do
not yet support. Because this endpoint failed to reply correctly
produced some errors, and also prevent the user from being forced to
logout. This resolves #1826 by adding at least that endpoint.
Because of that extra endpoint check to Emergency Access is done using
an old user stamp, i also modified the stamp exception to allow multiple
rocket routes to be called, and added an expiration timestamp to it.
During these tests i stumbled upon an issue that after my key-change was
done, it triggered the websockets to try and reload my ciphers, because
they were updated. This shouldn't happen when rotating they keys, since
all access should be invalided. Now there will be no websocket
notification for this, which also prevents error toasts.
- Increased Send Size limit to 500MB (with a litle overhead)
As a side note, i tested these changes on both v2.20.4 and v2.21.1 web-vault versions, all keeps working.
2021-07-04 21:02:56 +00:00
|
|
|
expire: (Utc::now().naive_utc() + Duration::minutes(2)).timestamp(),
|
2020-12-14 18:58:23 +00:00
|
|
|
};
|
|
|
|
self.stamp_exception = Some(serde_json::to_string(&stamp_exception).unwrap_or_default());
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Resets the stamp_exception to prevent re-use of the previous security-stamp
|
|
|
|
pub fn reset_stamp_exception(&mut self) {
|
|
|
|
self.stamp_exception = None;
|
|
|
|
}
|
2018-04-24 20:01:55 +00:00
|
|
|
}
|
|
|
|
|
2021-10-25 08:36:05 +00:00
|
|
|
use super::{
|
|
|
|
Cipher, Device, EmergencyAccess, Favorite, Folder, Send, TwoFactor, TwoFactorIncomplete, UserOrgType,
|
|
|
|
UserOrganization,
|
|
|
|
};
|
2018-12-30 22:34:31 +00:00
|
|
|
use crate::db::DbConn;
|
2018-04-24 20:01:55 +00:00
|
|
|
|
2018-12-19 20:52:53 +00:00
|
|
|
use crate::api::EmptyResult;
|
|
|
|
use crate::error::MapResult;
|
|
|
|
|
2018-04-24 20:01:55 +00:00
|
|
|
/// Database methods
|
|
|
|
impl User {
|
2018-10-10 18:40:39 +00:00
|
|
|
pub fn to_json(&self, conn: &DbConn) -> Value {
|
2021-09-24 15:55:49 +00:00
|
|
|
let orgs = UserOrganization::find_confirmed_by_user(&self.uuid, conn);
|
2021-06-19 20:02:03 +00:00
|
|
|
let orgs_json: Vec<Value> = orgs.iter().map(|c| c.to_json(conn)).collect();
|
2018-09-13 19:55:23 +00:00
|
|
|
let twofactor_enabled = !TwoFactor::find_by_user(&self.uuid, conn).is_empty();
|
2018-07-12 19:46:50 +00:00
|
|
|
|
2019-04-12 22:01:52 +00:00
|
|
|
// TODO: Might want to save the status field in the DB
|
|
|
|
let status = if self.password_hash.is_empty() {
|
|
|
|
UserStatus::Invited
|
|
|
|
} else {
|
|
|
|
UserStatus::Enabled
|
|
|
|
};
|
|
|
|
|
2018-02-10 00:00:55 +00:00
|
|
|
json!({
|
2019-04-12 22:01:52 +00:00
|
|
|
"_Status": status as i32,
|
2018-02-10 00:00:55 +00:00
|
|
|
"Id": self.uuid,
|
|
|
|
"Name": self.name,
|
|
|
|
"Email": self.email,
|
2019-11-25 05:28:49 +00:00
|
|
|
"EmailVerified": !CONFIG.mail_enabled() || self.verified_at.is_some(),
|
2018-02-10 00:00:55 +00:00
|
|
|
"Premium": true,
|
|
|
|
"MasterPasswordHint": self.password_hint,
|
|
|
|
"Culture": "en-US",
|
2018-07-12 19:46:50 +00:00
|
|
|
"TwoFactorEnabled": twofactor_enabled,
|
2019-05-20 19:12:41 +00:00
|
|
|
"Key": self.akey,
|
2018-02-10 00:00:55 +00:00
|
|
|
"PrivateKey": self.private_key,
|
|
|
|
"SecurityStamp": self.security_stamp,
|
2018-04-24 20:01:55 +00:00
|
|
|
"Organizations": orgs_json,
|
2021-08-21 08:36:08 +00:00
|
|
|
"Providers": [],
|
|
|
|
"ProviderOrganizations": [],
|
|
|
|
"ForcePasswordReset": false,
|
|
|
|
"Object": "profile",
|
2018-02-10 00:00:55 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2019-09-12 20:12:22 +00:00
|
|
|
pub fn save(&mut self, conn: &DbConn) -> EmptyResult {
|
|
|
|
if self.email.trim().is_empty() {
|
|
|
|
err!("User email can't be empty")
|
|
|
|
}
|
|
|
|
|
|
|
|
self.updated_at = Utc::now().naive_utc();
|
|
|
|
|
2020-08-18 15:15:44 +00:00
|
|
|
db_run! {conn:
|
|
|
|
sqlite, mysql {
|
2020-09-22 10:13:02 +00:00
|
|
|
match diesel::replace_into(users::table)
|
|
|
|
.values(UserDb::to_db(self))
|
2020-08-18 15:15:44 +00:00
|
|
|
.execute(conn)
|
2020-09-22 10:13:02 +00:00
|
|
|
{
|
|
|
|
Ok(_) => Ok(()),
|
|
|
|
// Record already exists and causes a Foreign Key Violation because replace_into() wants to delete the record first.
|
|
|
|
Err(diesel::result::Error::DatabaseError(diesel::result::DatabaseErrorKind::ForeignKeyViolation, _)) => {
|
|
|
|
diesel::update(users::table)
|
|
|
|
.filter(users::uuid.eq(&self.uuid))
|
|
|
|
.set(UserDb::to_db(self))
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error saving user")
|
|
|
|
}
|
|
|
|
Err(e) => Err(e.into()),
|
|
|
|
}.map_res("Error saving user")
|
2020-08-18 15:15:44 +00:00
|
|
|
}
|
|
|
|
postgresql {
|
|
|
|
let value = UserDb::to_db(self);
|
|
|
|
diesel::insert_into(users::table) // Insert or update
|
|
|
|
.values(&value)
|
|
|
|
.on_conflict(users::uuid)
|
|
|
|
.do_update()
|
|
|
|
.set(&value)
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error saving user")
|
|
|
|
}
|
2019-01-22 16:26:17 +00:00
|
|
|
}
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
|
|
|
|
2018-12-19 20:52:53 +00:00
|
|
|
pub fn delete(self, conn: &DbConn) -> EmptyResult {
|
2021-09-24 15:55:49 +00:00
|
|
|
for user_org in UserOrganization::find_confirmed_by_user(&self.uuid, conn) {
|
2019-05-20 19:24:29 +00:00
|
|
|
if user_org.atype == UserOrgType::Owner {
|
2018-12-30 22:34:31 +00:00
|
|
|
let owner_type = UserOrgType::Owner as i32;
|
2020-08-18 15:15:44 +00:00
|
|
|
if UserOrganization::find_by_org_and_type(&user_org.org_uuid, owner_type, conn).len() <= 1 {
|
2018-12-19 20:52:53 +00:00
|
|
|
err!("Can't delete last owner")
|
2018-10-12 14:20:10 +00:00
|
|
|
}
|
|
|
|
}
|
2018-02-15 18:05:57 +00:00
|
|
|
}
|
2018-10-12 14:20:10 +00:00
|
|
|
|
2021-03-14 22:35:55 +00:00
|
|
|
Send::delete_all_by_user(&self.uuid, conn)?;
|
2021-03-24 19:15:55 +00:00
|
|
|
EmergencyAccess::delete_all_by_user(&self.uuid, conn)?;
|
2020-08-18 15:15:44 +00:00
|
|
|
UserOrganization::delete_all_by_user(&self.uuid, conn)?;
|
|
|
|
Cipher::delete_all_by_user(&self.uuid, conn)?;
|
2020-08-26 08:27:38 +00:00
|
|
|
Favorite::delete_all_by_user(&self.uuid, conn)?;
|
2020-08-18 15:15:44 +00:00
|
|
|
Folder::delete_all_by_user(&self.uuid, conn)?;
|
|
|
|
Device::delete_all_by_user(&self.uuid, conn)?;
|
|
|
|
TwoFactor::delete_all_by_user(&self.uuid, conn)?;
|
2021-10-25 08:36:05 +00:00
|
|
|
TwoFactorIncomplete::delete_all_by_user(&self.uuid, conn)?;
|
2020-08-18 15:15:44 +00:00
|
|
|
Invitation::take(&self.email, conn); // Delete invitation if any
|
|
|
|
|
|
|
|
db_run! {conn: {
|
|
|
|
diesel::delete(users::table.filter(users::uuid.eq(self.uuid)))
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error deleting user")
|
|
|
|
}}
|
2018-02-15 18:05:57 +00:00
|
|
|
}
|
|
|
|
|
2019-02-08 17:45:07 +00:00
|
|
|
pub fn update_uuid_revision(uuid: &str, conn: &DbConn) {
|
|
|
|
if let Err(e) = Self::_update_revision(uuid, &Utc::now().naive_utc(), conn) {
|
|
|
|
warn!("Failed to update revision for {}: {:#?}", uuid, e);
|
|
|
|
}
|
2018-08-21 11:20:55 +00:00
|
|
|
}
|
|
|
|
|
2019-03-07 20:08:33 +00:00
|
|
|
pub fn update_all_revisions(conn: &DbConn) -> EmptyResult {
|
|
|
|
let updated_at = Utc::now().naive_utc();
|
|
|
|
|
2020-08-18 15:15:44 +00:00
|
|
|
db_run! {conn: {
|
|
|
|
crate::util::retry(|| {
|
2019-03-07 20:08:33 +00:00
|
|
|
diesel::update(users::table)
|
|
|
|
.set(users::updated_at.eq(updated_at))
|
2020-08-18 15:15:44 +00:00
|
|
|
.execute(conn)
|
|
|
|
}, 10)
|
|
|
|
.map_res("Error updating revision date for all users")
|
|
|
|
}}
|
2019-03-07 20:08:33 +00:00
|
|
|
}
|
|
|
|
|
2018-12-19 20:52:53 +00:00
|
|
|
pub fn update_revision(&mut self, conn: &DbConn) -> EmptyResult {
|
2018-08-21 09:36:04 +00:00
|
|
|
self.updated_at = Utc::now().naive_utc();
|
2019-02-08 17:45:07 +00:00
|
|
|
|
|
|
|
Self::_update_revision(&self.uuid, &self.updated_at, conn)
|
|
|
|
}
|
|
|
|
|
|
|
|
fn _update_revision(uuid: &str, date: &NaiveDateTime, conn: &DbConn) -> EmptyResult {
|
2020-08-18 15:15:44 +00:00
|
|
|
db_run! {conn: {
|
|
|
|
crate::util::retry(|| {
|
2019-02-08 17:45:07 +00:00
|
|
|
diesel::update(users::table.filter(users::uuid.eq(uuid)))
|
|
|
|
.set(users::updated_at.eq(date))
|
2020-08-18 15:15:44 +00:00
|
|
|
.execute(conn)
|
|
|
|
}, 10)
|
|
|
|
.map_res("Error updating user revision")
|
|
|
|
}}
|
2018-08-13 09:58:39 +00:00
|
|
|
}
|
|
|
|
|
2018-02-14 23:40:34 +00:00
|
|
|
pub fn find_by_mail(mail: &str, conn: &DbConn) -> Option<Self> {
|
2018-02-10 00:00:55 +00:00
|
|
|
let lower_mail = mail.to_lowercase();
|
2020-08-18 15:15:44 +00:00
|
|
|
db_run! {conn: {
|
|
|
|
users::table
|
|
|
|
.filter(users::email.eq(lower_mail))
|
|
|
|
.first::<UserDb>(conn)
|
|
|
|
.ok()
|
|
|
|
.from_db()
|
|
|
|
}}
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
|
|
|
|
2018-02-14 23:40:34 +00:00
|
|
|
pub fn find_by_uuid(uuid: &str, conn: &DbConn) -> Option<Self> {
|
2020-08-18 15:15:44 +00:00
|
|
|
db_run! {conn: {
|
|
|
|
users::table.filter(users::uuid.eq(uuid)).first::<UserDb>(conn).ok().from_db()
|
|
|
|
}}
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
2018-10-12 14:20:10 +00:00
|
|
|
|
|
|
|
pub fn get_all(conn: &DbConn) -> Vec<Self> {
|
2020-08-18 15:15:44 +00:00
|
|
|
db_run! {conn: {
|
|
|
|
users::table.load::<UserDb>(conn).expect("Error loading users").from_db()
|
|
|
|
}}
|
2018-10-12 14:20:10 +00:00
|
|
|
}
|
2020-11-30 21:00:51 +00:00
|
|
|
|
|
|
|
pub fn last_active(&self, conn: &DbConn) -> Option<NaiveDateTime> {
|
|
|
|
match Device::find_latest_active_by_user(&self.uuid, conn) {
|
|
|
|
Some(device) => Some(device.updated_at),
|
2021-03-31 20:18:35 +00:00
|
|
|
None => None,
|
2020-12-14 18:58:23 +00:00
|
|
|
}
|
2020-11-30 21:00:51 +00:00
|
|
|
}
|
2018-02-10 00:00:55 +00:00
|
|
|
}
|
2018-09-10 13:51:40 +00:00
|
|
|
|
|
|
|
impl Invitation {
|
2021-09-09 11:50:18 +00:00
|
|
|
pub fn new(email: String) -> Self {
|
|
|
|
let email = email.to_lowercase();
|
2021-04-06 20:54:42 +00:00
|
|
|
Self {
|
|
|
|
email,
|
|
|
|
}
|
2018-09-10 13:51:40 +00:00
|
|
|
}
|
|
|
|
|
2019-09-12 20:12:22 +00:00
|
|
|
pub fn save(&self, conn: &DbConn) -> EmptyResult {
|
|
|
|
if self.email.trim().is_empty() {
|
|
|
|
err!("Invitation email can't be empty")
|
|
|
|
}
|
|
|
|
|
2020-08-18 15:15:44 +00:00
|
|
|
db_run! {conn:
|
|
|
|
sqlite, mysql {
|
2020-09-22 10:13:02 +00:00
|
|
|
// Not checking for ForeignKey Constraints here
|
|
|
|
// Table invitations does not have any ForeignKey Constraints.
|
2020-08-18 15:15:44 +00:00
|
|
|
diesel::replace_into(invitations::table)
|
|
|
|
.values(InvitationDb::to_db(self))
|
|
|
|
.execute(conn)
|
2020-09-22 10:13:02 +00:00
|
|
|
.map_res("Error saving invitation")
|
2020-08-18 15:15:44 +00:00
|
|
|
}
|
|
|
|
postgresql {
|
|
|
|
diesel::insert_into(invitations::table)
|
|
|
|
.values(InvitationDb::to_db(self))
|
|
|
|
.on_conflict(invitations::email)
|
|
|
|
.do_nothing()
|
|
|
|
.execute(conn)
|
2020-09-22 10:13:02 +00:00
|
|
|
.map_res("Error saving invitation")
|
2020-08-18 15:15:44 +00:00
|
|
|
}
|
2019-01-22 16:26:17 +00:00
|
|
|
}
|
2018-09-10 13:51:40 +00:00
|
|
|
}
|
|
|
|
|
2018-12-19 20:52:53 +00:00
|
|
|
pub fn delete(self, conn: &DbConn) -> EmptyResult {
|
2020-08-18 15:15:44 +00:00
|
|
|
db_run! {conn: {
|
|
|
|
diesel::delete(invitations::table.filter(invitations::email.eq(self.email)))
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error deleting invitation")
|
|
|
|
}}
|
2018-09-10 13:51:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn find_by_mail(mail: &str, conn: &DbConn) -> Option<Self> {
|
|
|
|
let lower_mail = mail.to_lowercase();
|
2020-08-18 15:15:44 +00:00
|
|
|
db_run! {conn: {
|
|
|
|
invitations::table
|
|
|
|
.filter(invitations::email.eq(lower_mail))
|
|
|
|
.first::<InvitationDb>(conn)
|
|
|
|
.ok()
|
|
|
|
.from_db()
|
|
|
|
}}
|
2018-09-10 13:51:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn take(mail: &str, conn: &DbConn) -> bool {
|
2021-06-19 20:02:03 +00:00
|
|
|
match Self::find_by_mail(mail, conn) {
|
|
|
|
Some(invitation) => invitation.delete(conn).is_ok(),
|
2020-02-16 20:28:50 +00:00
|
|
|
None => false,
|
|
|
|
}
|
2018-09-10 13:51:40 +00:00
|
|
|
}
|
2018-12-30 22:34:31 +00:00
|
|
|
}
|