mirror of
https://github.com/dani-garcia/vaultwarden.git
synced 2025-09-10 10:45:57 +03:00
Fix and improvements to policies (#5923)
This commit is contained in:
@@ -8,8 +8,8 @@ use serde_json::Value;
|
|||||||
use crate::{
|
use crate::{
|
||||||
api::{
|
api::{
|
||||||
core::{log_user_event, two_factor::email},
|
core::{log_user_event, two_factor::email},
|
||||||
register_push_device, unregister_push_device, AnonymousNotify, EmptyResult, JsonResult, Notify,
|
master_password_policy, register_push_device, unregister_push_device, AnonymousNotify, EmptyResult, JsonResult,
|
||||||
PasswordOrOtpData, UpdateType,
|
Notify, PasswordOrOtpData, UpdateType,
|
||||||
},
|
},
|
||||||
auth::{decode_delete, decode_invite, decode_verify_email, ClientHeaders, Headers},
|
auth::{decode_delete, decode_invite, decode_verify_email, ClientHeaders, Headers},
|
||||||
crypto,
|
crypto,
|
||||||
@@ -1068,7 +1068,7 @@ struct SecretVerificationRequest {
|
|||||||
}
|
}
|
||||||
|
|
||||||
#[post("/accounts/verify-password", data = "<data>")]
|
#[post("/accounts/verify-password", data = "<data>")]
|
||||||
fn verify_password(data: Json<SecretVerificationRequest>, headers: Headers) -> EmptyResult {
|
async fn verify_password(data: Json<SecretVerificationRequest>, headers: Headers, conn: DbConn) -> JsonResult {
|
||||||
let data: SecretVerificationRequest = data.into_inner();
|
let data: SecretVerificationRequest = data.into_inner();
|
||||||
let user = headers.user;
|
let user = headers.user;
|
||||||
|
|
||||||
@@ -1076,7 +1076,7 @@ fn verify_password(data: Json<SecretVerificationRequest>, headers: Headers) -> E
|
|||||||
err!("Invalid password")
|
err!("Invalid password")
|
||||||
}
|
}
|
||||||
|
|
||||||
Ok(())
|
Ok(Json(master_password_policy(&user, &conn).await))
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn _api_key(data: Json<PasswordOrOtpData>, rotate: bool, headers: Headers, mut conn: DbConn) -> JsonResult {
|
async fn _api_key(data: Json<PasswordOrOtpData>, rotate: bool, headers: Headers, mut conn: DbConn) -> JsonResult {
|
||||||
|
@@ -14,6 +14,7 @@ use crate::{
|
|||||||
log_user_event,
|
log_user_event,
|
||||||
two_factor::{authenticator, duo, duo_oidc, email, enforce_2fa_policy, webauthn, yubikey},
|
two_factor::{authenticator, duo, duo_oidc, email, enforce_2fa_policy, webauthn, yubikey},
|
||||||
},
|
},
|
||||||
|
master_password_policy,
|
||||||
push::register_push_device,
|
push::register_push_device,
|
||||||
ApiResult, EmptyResult, JsonResult,
|
ApiResult, EmptyResult, JsonResult,
|
||||||
},
|
},
|
||||||
@@ -132,18 +133,6 @@ async fn _refresh_login(data: ConnectData, conn: &mut DbConn) -> JsonResult {
|
|||||||
Ok(Json(result))
|
Ok(Json(result))
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Default, Deserialize, Serialize)]
|
|
||||||
#[serde(rename_all = "camelCase")]
|
|
||||||
struct MasterPasswordPolicy {
|
|
||||||
min_complexity: u8,
|
|
||||||
min_length: u32,
|
|
||||||
require_lower: bool,
|
|
||||||
require_upper: bool,
|
|
||||||
require_numbers: bool,
|
|
||||||
require_special: bool,
|
|
||||||
enforce_on_login: bool,
|
|
||||||
}
|
|
||||||
|
|
||||||
async fn _password_login(
|
async fn _password_login(
|
||||||
data: ConnectData,
|
data: ConnectData,
|
||||||
user_id: &mut Option<UserId>,
|
user_id: &mut Option<UserId>,
|
||||||
@@ -300,36 +289,7 @@ async fn _password_login(
|
|||||||
let (access_token, expires_in) = device.refresh_tokens(&user, scope_vec, data.client_id);
|
let (access_token, expires_in) = device.refresh_tokens(&user, scope_vec, data.client_id);
|
||||||
device.save(conn).await?;
|
device.save(conn).await?;
|
||||||
|
|
||||||
// Fetch all valid Master Password Policies and merge them into one with all trues and largest numbers as one policy
|
let master_password_policy = master_password_policy(&user, conn).await;
|
||||||
let master_password_policies: Vec<MasterPasswordPolicy> =
|
|
||||||
OrgPolicy::find_accepted_and_confirmed_by_user_and_active_policy(
|
|
||||||
&user.uuid,
|
|
||||||
OrgPolicyType::MasterPassword,
|
|
||||||
conn,
|
|
||||||
)
|
|
||||||
.await
|
|
||||||
.into_iter()
|
|
||||||
.filter_map(|p| serde_json::from_str(&p.data).ok())
|
|
||||||
.collect();
|
|
||||||
|
|
||||||
// NOTE: Upstream still uses PascalCase here for `Object`!
|
|
||||||
let master_password_policy = if !master_password_policies.is_empty() {
|
|
||||||
let mut mpp_json = json!(master_password_policies.into_iter().reduce(|acc, policy| {
|
|
||||||
MasterPasswordPolicy {
|
|
||||||
min_complexity: acc.min_complexity.max(policy.min_complexity),
|
|
||||||
min_length: acc.min_length.max(policy.min_length),
|
|
||||||
require_lower: acc.require_lower || policy.require_lower,
|
|
||||||
require_upper: acc.require_upper || policy.require_upper,
|
|
||||||
require_numbers: acc.require_numbers || policy.require_numbers,
|
|
||||||
require_special: acc.require_special || policy.require_special,
|
|
||||||
enforce_on_login: acc.enforce_on_login || policy.enforce_on_login,
|
|
||||||
}
|
|
||||||
}));
|
|
||||||
mpp_json["Object"] = json!("masterPasswordPolicy");
|
|
||||||
mpp_json
|
|
||||||
} else {
|
|
||||||
json!({"Object": "masterPasswordPolicy"})
|
|
||||||
};
|
|
||||||
|
|
||||||
let mut result = json!({
|
let mut result = json!({
|
||||||
"access_token": access_token,
|
"access_token": access_token,
|
||||||
|
@@ -32,7 +32,10 @@ pub use crate::api::{
|
|||||||
web::routes as web_routes,
|
web::routes as web_routes,
|
||||||
web::static_files,
|
web::static_files,
|
||||||
};
|
};
|
||||||
use crate::db::{models::User, DbConn};
|
use crate::db::{
|
||||||
|
models::{OrgPolicy, OrgPolicyType, User},
|
||||||
|
DbConn,
|
||||||
|
};
|
||||||
|
|
||||||
// Type aliases for API methods results
|
// Type aliases for API methods results
|
||||||
type ApiResult<T> = Result<T, crate::error::Error>;
|
type ApiResult<T> = Result<T, crate::error::Error>;
|
||||||
@@ -68,3 +71,49 @@ impl PasswordOrOtpData {
|
|||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[derive(Debug, Default, Deserialize, Serialize)]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
pub struct MasterPasswordPolicy {
|
||||||
|
min_complexity: Option<u8>,
|
||||||
|
min_length: Option<u32>,
|
||||||
|
require_lower: bool,
|
||||||
|
require_upper: bool,
|
||||||
|
require_numbers: bool,
|
||||||
|
require_special: bool,
|
||||||
|
enforce_on_login: bool,
|
||||||
|
}
|
||||||
|
|
||||||
|
// Fetch all valid Master Password Policies and merge them into one with all trues and largest numbers as one policy
|
||||||
|
async fn master_password_policy(user: &User, conn: &DbConn) -> Value {
|
||||||
|
let master_password_policies: Vec<MasterPasswordPolicy> =
|
||||||
|
OrgPolicy::find_accepted_and_confirmed_by_user_and_active_policy(
|
||||||
|
&user.uuid,
|
||||||
|
OrgPolicyType::MasterPassword,
|
||||||
|
conn,
|
||||||
|
)
|
||||||
|
.await
|
||||||
|
.into_iter()
|
||||||
|
.filter_map(|p| serde_json::from_str(&p.data).ok())
|
||||||
|
.collect();
|
||||||
|
|
||||||
|
let mut mpp_json = if !master_password_policies.is_empty() {
|
||||||
|
json!(master_password_policies.into_iter().reduce(|acc, policy| {
|
||||||
|
MasterPasswordPolicy {
|
||||||
|
min_complexity: acc.min_complexity.max(policy.min_complexity),
|
||||||
|
min_length: acc.min_length.max(policy.min_length),
|
||||||
|
require_lower: acc.require_lower || policy.require_lower,
|
||||||
|
require_upper: acc.require_upper || policy.require_upper,
|
||||||
|
require_numbers: acc.require_numbers || policy.require_numbers,
|
||||||
|
require_special: acc.require_special || policy.require_special,
|
||||||
|
enforce_on_login: acc.enforce_on_login || policy.enforce_on_login,
|
||||||
|
}
|
||||||
|
}))
|
||||||
|
} else {
|
||||||
|
json!({})
|
||||||
|
};
|
||||||
|
|
||||||
|
// NOTE: Upstream still uses PascalCase here for `Object`!
|
||||||
|
mpp_json["Object"] = json!("masterPasswordPolicy");
|
||||||
|
mpp_json
|
||||||
|
}
|
||||||
|
@@ -211,7 +211,7 @@ impl OrgPolicy {
|
|||||||
pub async fn find_accepted_and_confirmed_by_user_and_active_policy(
|
pub async fn find_accepted_and_confirmed_by_user_and_active_policy(
|
||||||
user_uuid: &UserId,
|
user_uuid: &UserId,
|
||||||
policy_type: OrgPolicyType,
|
policy_type: OrgPolicyType,
|
||||||
conn: &mut DbConn,
|
conn: &DbConn,
|
||||||
) -> Vec<Self> {
|
) -> Vec<Self> {
|
||||||
db_run! { conn: {
|
db_run! { conn: {
|
||||||
org_policies::table
|
org_policies::table
|
||||||
|
Reference in New Issue
Block a user