0
0
Fork 0
mirror of https://github.com/dani-garcia/vaultwarden synced 2024-05-18 21:03:51 +02:00
bitwarden_rs/src/db/models/device.rs

179 lines
5.6 KiB
Rust
Raw Normal View History

2018-02-15 00:53:11 +01:00
use chrono::{NaiveDateTime, Utc};
2018-02-10 01:00:55 +01:00
use crate::CONFIG;
db_object! {
#[derive(Identifiable, Queryable, Insertable, AsChangeset)]
#[table_name = "devices"]
#[changeset_options(treat_none_as_null="true")]
#[primary_key(uuid, user_uuid)]
pub struct Device {
pub uuid: String,
pub created_at: NaiveDateTime,
pub updated_at: NaiveDateTime,
pub user_uuid: String,
pub name: String,
pub atype: i32, // https://github.com/bitwarden/server/blob/master/src/Core/Enums/DeviceType.cs
pub push_token: Option<String>,
pub refresh_token: String,
pub twofactor_remember: Option<String>,
}
2018-02-10 01:00:55 +01:00
}
/// Local methods
impl Device {
2019-05-20 21:12:41 +02:00
pub fn new(uuid: String, user_uuid: String, name: String, atype: i32) -> Self {
2018-02-10 01:00:55 +01:00
let now = Utc::now().naive_utc();
Self {
2018-02-10 01:00:55 +01:00
uuid,
created_at: now,
updated_at: now,
user_uuid,
name,
2019-05-20 21:12:41 +02:00
atype,
2018-02-10 01:00:55 +01:00
push_token: None,
refresh_token: String::new(),
2018-06-01 15:08:03 +02:00
twofactor_remember: None,
2018-02-10 01:00:55 +01:00
}
}
pub fn refresh_twofactor_remember(&mut self) -> String {
2018-12-07 02:05:45 +01:00
use crate::crypto;
use data_encoding::BASE64;
2018-06-01 15:08:03 +02:00
let twofactor_remember = BASE64.encode(&crypto::get_random(vec![0u8; 180]));
self.twofactor_remember = Some(twofactor_remember.clone());
twofactor_remember
2018-06-01 15:08:03 +02:00
}
pub fn delete_twofactor_remember(&mut self) {
self.twofactor_remember = None;
}
pub fn refresh_tokens(
&mut self,
user: &super::User,
orgs: Vec<super::UserOrganization>,
scope: Vec<String>,
) -> (String, i64) {
2018-02-10 01:00:55 +01:00
// If there is no refresh token, we create one
if self.refresh_token.is_empty() {
2018-12-07 02:05:45 +01:00
use crate::crypto;
use data_encoding::BASE64URL;
2018-02-10 01:00:55 +01:00
self.refresh_token = BASE64URL.encode(&crypto::get_random_64());
}
// Update the expiration of the device and the last update date
let time_now = Utc::now().naive_utc();
self.updated_at = time_now;
2019-05-20 21:12:41 +02:00
let orgowner: Vec<_> = orgs.iter().filter(|o| o.atype == 0).map(|o| o.org_uuid.clone()).collect();
let orgadmin: Vec<_> = orgs.iter().filter(|o| o.atype == 1).map(|o| o.org_uuid.clone()).collect();
let orguser: Vec<_> = orgs.iter().filter(|o| o.atype == 2).map(|o| o.org_uuid.clone()).collect();
let orgmanager: Vec<_> = orgs.iter().filter(|o| o.atype == 3).map(|o| o.org_uuid.clone()).collect();
2018-02-10 01:00:55 +01:00
// Create the JWT claims struct, to send to the client
use crate::auth::{encode_jwt, LoginJwtClaims, DEFAULT_VALIDITY, JWT_LOGIN_ISSUER};
let claims = LoginJwtClaims {
2018-02-10 01:00:55 +01:00
nbf: time_now.timestamp(),
exp: (time_now + *DEFAULT_VALIDITY).timestamp(),
iss: JWT_LOGIN_ISSUER.to_string(),
2018-02-10 01:00:55 +01:00
sub: user.uuid.to_string(),
2018-02-10 01:00:55 +01:00
premium: true,
name: user.name.to_string(),
email: user.email.to_string(),
email_verified: !CONFIG.mail_enabled() || user.verified_at.is_some(),
orgowner,
orgadmin,
orguser,
orgmanager,
2018-02-10 01:00:55 +01:00
sstamp: user.security_stamp.to_string(),
device: self.uuid.to_string(),
scope,
2018-02-10 01:00:55 +01:00
amr: vec!["Application".into()],
};
(encode_jwt(&claims), DEFAULT_VALIDITY.num_seconds())
}
}
use crate::db::DbConn;
2018-02-10 01:00:55 +01:00
use crate::api::EmptyResult;
use crate::error::MapResult;
2018-02-10 01:00:55 +01:00
/// Database methods
impl Device {
pub async fn save(&mut self, conn: &DbConn) -> EmptyResult {
self.updated_at = Utc::now().naive_utc();
db_run! { conn:
sqlite, mysql {
crate::util::retry(
|| diesel::replace_into(devices::table).values(DeviceDb::to_db(self)).execute(conn),
10,
).map_res("Error saving device")
}
postgresql {
let value = DeviceDb::to_db(self);
crate::util::retry(
|| diesel::insert_into(devices::table).values(&value).on_conflict((devices::uuid, devices::user_uuid)).do_update().set(&value).execute(conn),
10,
).map_res("Error saving device")
}
}
2018-02-10 01:00:55 +01:00
}
pub async fn delete_all_by_user(user_uuid: &str, conn: &DbConn) -> EmptyResult {
db_run! { conn: {
diesel::delete(devices::table.filter(devices::user_uuid.eq(user_uuid)))
.execute(conn)
.map_res("Error removing devices for user")
}}
2018-10-12 16:20:10 +02:00
}
pub async fn find_by_uuid_and_user(uuid: &str, user_uuid: &str, conn: &DbConn) -> Option<Self> {
db_run! { conn: {
devices::table
.filter(devices::uuid.eq(uuid))
.filter(devices::user_uuid.eq(user_uuid))
.first::<DeviceDb>(conn)
.ok()
.from_db()
}}
2018-02-10 01:00:55 +01:00
}
pub async fn find_by_refresh_token(refresh_token: &str, conn: &DbConn) -> Option<Self> {
db_run! { conn: {
devices::table
.filter(devices::refresh_token.eq(refresh_token))
.first::<DeviceDb>(conn)
.ok()
.from_db()
}}
2018-02-10 01:00:55 +01:00
}
pub async fn find_latest_active_by_user(user_uuid: &str, conn: &DbConn) -> Option<Self> {
db_run! { conn: {
devices::table
.filter(devices::user_uuid.eq(user_uuid))
.order(devices::updated_at.desc())
.first::<DeviceDb>(conn)
.ok()
.from_db()
}}
}
2018-02-10 01:00:55 +01:00
}