2015-10-31 18:56:49 +00:00
|
|
|
/*
|
|
|
|
Copyright 2015 Gravitational, Inc.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
2016-02-24 21:19:36 +00:00
|
|
|
|
2015-10-24 23:04:13 +00:00
|
|
|
package web
|
2015-07-15 00:52:12 +00:00
|
|
|
|
|
|
|
import (
|
2016-02-27 02:10:01 +00:00
|
|
|
"io"
|
2015-07-15 00:52:12 +00:00
|
|
|
"net/http"
|
2016-02-26 22:57:51 +00:00
|
|
|
"sync"
|
|
|
|
"time"
|
2015-07-15 00:52:12 +00:00
|
|
|
|
2015-10-05 17:36:55 +00:00
|
|
|
"github.com/gravitational/teleport/lib/auth"
|
2017-02-03 02:14:42 +00:00
|
|
|
"github.com/gravitational/teleport/lib/client"
|
2016-02-12 15:25:54 +00:00
|
|
|
"github.com/gravitational/teleport/lib/services"
|
2016-03-01 21:19:43 +00:00
|
|
|
"github.com/gravitational/teleport/lib/session"
|
2015-10-05 17:36:55 +00:00
|
|
|
"github.com/gravitational/teleport/lib/utils"
|
2017-02-18 00:16:44 +00:00
|
|
|
"github.com/jonboulle/clockwork"
|
2015-07-15 00:52:12 +00:00
|
|
|
|
2016-02-03 01:53:21 +00:00
|
|
|
log "github.com/Sirupsen/logrus"
|
2016-01-20 15:52:25 +00:00
|
|
|
"github.com/gravitational/trace"
|
2016-04-07 22:00:11 +00:00
|
|
|
"github.com/gravitational/ttlmap"
|
2016-10-14 06:51:16 +00:00
|
|
|
|
|
|
|
"github.com/tstranex/u2f"
|
2015-07-15 00:52:12 +00:00
|
|
|
)
|
|
|
|
|
2016-04-06 17:29:30 +00:00
|
|
|
// SessionContext is a context associated with users'
|
2016-02-25 01:58:22 +00:00
|
|
|
// web session, it stores connected client that persists
|
|
|
|
// between requests for example to avoid connecting
|
|
|
|
// to the auth server on every page hit
|
2016-04-06 17:29:30 +00:00
|
|
|
type SessionContext struct {
|
2016-02-27 02:10:01 +00:00
|
|
|
sync.Mutex
|
2016-02-26 22:57:51 +00:00
|
|
|
*log.Entry
|
2017-02-11 02:55:51 +00:00
|
|
|
sess services.WebSession
|
2016-02-27 02:10:01 +00:00
|
|
|
user string
|
|
|
|
clt *auth.TunClient
|
|
|
|
parent *sessionCache
|
|
|
|
closers []io.Closer
|
|
|
|
}
|
|
|
|
|
2016-12-31 22:01:04 +00:00
|
|
|
// getTerminal finds and returns an active web terminal for a given session:
|
|
|
|
func (c *SessionContext) getTerminal(sessionID session.ID) (*terminalHandler, error) {
|
2016-03-01 21:19:43 +00:00
|
|
|
c.Lock()
|
|
|
|
defer c.Unlock()
|
|
|
|
|
|
|
|
for _, closer := range c.closers {
|
2016-12-31 22:01:04 +00:00
|
|
|
term, ok := closer.(*terminalHandler)
|
|
|
|
if ok && term.params.SessionID == sessionID {
|
|
|
|
return term, nil
|
2016-03-01 21:19:43 +00:00
|
|
|
}
|
|
|
|
}
|
2016-04-12 17:54:24 +00:00
|
|
|
return nil, trace.NotFound("no connected streams")
|
2016-03-01 21:19:43 +00:00
|
|
|
}
|
|
|
|
|
2017-02-25 06:07:08 +00:00
|
|
|
// UpdateSessionTerminal is called when a browser window is resized and
|
|
|
|
// we need to update PTY on the server side
|
2016-12-31 22:01:04 +00:00
|
|
|
func (c *SessionContext) UpdateSessionTerminal(
|
2017-02-25 06:04:59 +00:00
|
|
|
siteAPI auth.ClientI, namespace string, sessionID session.ID, params session.TerminalParams) error {
|
2016-12-31 22:01:04 +00:00
|
|
|
|
2017-02-25 06:07:08 +00:00
|
|
|
// update the session size on the auth server's side
|
2017-02-25 06:04:59 +00:00
|
|
|
err := siteAPI.UpdateSession(session.UpdateRequest{
|
2016-12-31 22:01:04 +00:00
|
|
|
ID: sessionID,
|
|
|
|
TerminalParams: ¶ms,
|
|
|
|
Namespace: namespace,
|
|
|
|
})
|
2016-03-01 21:19:43 +00:00
|
|
|
if err != nil {
|
2017-02-25 06:04:59 +00:00
|
|
|
log.Error(err)
|
2016-03-01 21:19:43 +00:00
|
|
|
}
|
2017-02-25 06:07:08 +00:00
|
|
|
// update the server-side PTY to match the browser window size
|
2016-12-31 22:01:04 +00:00
|
|
|
term, err := c.getTerminal(sessionID)
|
2016-03-01 21:19:43 +00:00
|
|
|
if err != nil {
|
2017-02-25 06:04:59 +00:00
|
|
|
log.Error(err)
|
2016-03-01 21:19:43 +00:00
|
|
|
return trace.Wrap(err)
|
|
|
|
}
|
2016-12-31 22:01:04 +00:00
|
|
|
return trace.Wrap(term.resizePTYWindow(params))
|
2016-03-01 21:19:43 +00:00
|
|
|
}
|
|
|
|
|
2016-04-06 17:29:30 +00:00
|
|
|
func (c *SessionContext) AddClosers(closers ...io.Closer) {
|
2016-02-27 02:10:01 +00:00
|
|
|
c.Lock()
|
|
|
|
defer c.Unlock()
|
|
|
|
c.closers = append(c.closers, closers...)
|
|
|
|
}
|
|
|
|
|
2017-02-04 07:12:29 +00:00
|
|
|
func (c *SessionContext) RemoveCloser(closer io.Closer) {
|
|
|
|
c.Lock()
|
|
|
|
defer c.Unlock()
|
|
|
|
for i := range c.closers {
|
|
|
|
if c.closers[i] == closer {
|
|
|
|
c.closers = append(c.closers[:i], c.closers[i+1:]...)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-04-06 17:29:30 +00:00
|
|
|
func (c *SessionContext) TransferClosers() []io.Closer {
|
2016-02-27 02:10:01 +00:00
|
|
|
c.Lock()
|
|
|
|
defer c.Unlock()
|
|
|
|
closers := c.closers
|
|
|
|
c.closers = nil
|
|
|
|
return closers
|
2016-02-26 22:57:51 +00:00
|
|
|
}
|
|
|
|
|
2016-04-06 17:29:30 +00:00
|
|
|
func (c *SessionContext) Invalidate() error {
|
2016-02-26 22:57:51 +00:00
|
|
|
return c.parent.InvalidateSession(c)
|
2015-07-15 00:52:12 +00:00
|
|
|
}
|
|
|
|
|
2016-02-25 01:58:22 +00:00
|
|
|
// GetClient returns the client connected to the auth server
|
2016-04-06 17:29:30 +00:00
|
|
|
func (c *SessionContext) GetClient() (auth.ClientI, error) {
|
2016-02-20 04:56:25 +00:00
|
|
|
return c.clt, nil
|
2015-07-15 00:52:12 +00:00
|
|
|
}
|
|
|
|
|
2016-02-25 01:58:22 +00:00
|
|
|
// GetUser returns the authenticated teleport user
|
2016-04-06 17:29:30 +00:00
|
|
|
func (c *SessionContext) GetUser() string {
|
2015-07-15 00:52:12 +00:00
|
|
|
return c.user
|
|
|
|
}
|
|
|
|
|
2016-02-25 01:58:22 +00:00
|
|
|
// GetWebSession returns a web session
|
2017-02-11 02:55:51 +00:00
|
|
|
func (c *SessionContext) GetWebSession() services.WebSession {
|
2016-02-24 01:26:23 +00:00
|
|
|
return c.sess
|
2015-07-15 00:52:12 +00:00
|
|
|
}
|
|
|
|
|
2016-04-10 20:29:32 +00:00
|
|
|
// ExtendWebSession creates a new web session for this user
|
2016-02-26 22:57:51 +00:00
|
|
|
// based on the previous session
|
2017-02-11 02:55:51 +00:00
|
|
|
func (c *SessionContext) ExtendWebSession() (services.WebSession, error) {
|
2017-02-11 18:48:29 +00:00
|
|
|
sess, err := c.clt.ExtendWebSession(c.user, c.sess.GetName())
|
2016-02-26 22:57:51 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, trace.Wrap(err)
|
|
|
|
}
|
|
|
|
return sess, nil
|
|
|
|
}
|
|
|
|
|
2016-03-04 02:03:25 +00:00
|
|
|
// GetAgent returns agent that can we used to answer challenges
|
|
|
|
// for the web to ssh connection
|
2016-04-06 17:29:30 +00:00
|
|
|
func (c *SessionContext) GetAgent() (auth.AgentCloser, error) {
|
2017-01-25 21:45:46 +00:00
|
|
|
return c.clt.GetAgent()
|
2015-07-15 00:52:12 +00:00
|
|
|
}
|
|
|
|
|
2016-02-25 01:58:22 +00:00
|
|
|
// Close cleans up connections associated with requests
|
2016-04-06 17:29:30 +00:00
|
|
|
func (c *SessionContext) Close() error {
|
2016-02-27 02:10:01 +00:00
|
|
|
closers := c.TransferClosers()
|
|
|
|
for _, closer := range closers {
|
|
|
|
c.Infof("closing %v", closer)
|
|
|
|
closer.Close()
|
|
|
|
}
|
2015-07-15 00:52:12 +00:00
|
|
|
if c.clt != nil {
|
2016-02-24 01:26:23 +00:00
|
|
|
return trace.Wrap(c.clt.Close())
|
2015-07-15 00:52:12 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-04-07 22:00:11 +00:00
|
|
|
// newSessionCache returns new instance of the session cache
|
|
|
|
func newSessionCache(servers []utils.NetAddr) (*sessionCache, error) {
|
|
|
|
m, err := ttlmap.New(1024, ttlmap.CallOnExpire(closeContext))
|
2015-07-15 00:52:12 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2016-04-07 22:00:11 +00:00
|
|
|
cache := &sessionCache{
|
2016-02-25 01:58:22 +00:00
|
|
|
contexts: m,
|
2015-07-15 00:52:12 +00:00
|
|
|
authServers: servers,
|
2016-04-07 22:00:11 +00:00
|
|
|
closer: utils.NewCloseBroadcaster(),
|
|
|
|
}
|
|
|
|
// periodically close expired and unused sessions
|
|
|
|
go cache.expireSessions()
|
|
|
|
return cache, nil
|
2015-07-15 00:52:12 +00:00
|
|
|
}
|
|
|
|
|
2016-02-26 22:57:51 +00:00
|
|
|
// sessionCache handles web session authentication,
|
2016-02-25 01:58:22 +00:00
|
|
|
// and holds in memory contexts associated with each session
|
2016-02-26 22:57:51 +00:00
|
|
|
type sessionCache struct {
|
|
|
|
sync.Mutex
|
2016-04-07 22:00:11 +00:00
|
|
|
contexts *ttlmap.TTLMap
|
2015-07-15 00:52:12 +00:00
|
|
|
authServers []utils.NetAddr
|
2016-04-07 22:00:11 +00:00
|
|
|
closer *utils.CloseBroadcaster
|
|
|
|
}
|
|
|
|
|
|
|
|
// Close closes all allocated resources and stops goroutines
|
|
|
|
func (s *sessionCache) Close() error {
|
2016-08-22 06:16:04 +00:00
|
|
|
log.Infof("[WEB] closing session cache")
|
2016-04-07 22:00:11 +00:00
|
|
|
return s.closer.Close()
|
2015-07-15 00:52:12 +00:00
|
|
|
}
|
|
|
|
|
2016-02-25 01:58:22 +00:00
|
|
|
// closeContext is called when session context expires from
|
|
|
|
// cache and will clean up connections
|
|
|
|
func closeContext(key string, val interface{}) {
|
2016-04-07 22:00:11 +00:00
|
|
|
go func() {
|
|
|
|
log.Infof("[WEB] closing context %v", key)
|
|
|
|
ctx, ok := val.(*SessionContext)
|
|
|
|
if !ok {
|
|
|
|
log.Warningf("warning, not valid value type %T", val)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := ctx.Close(); err != nil {
|
|
|
|
log.Infof("failed to close context: %v", err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *sessionCache) expireSessions() {
|
|
|
|
ticker := time.NewTicker(time.Second)
|
2016-08-28 19:50:52 +00:00
|
|
|
defer ticker.Stop()
|
|
|
|
|
2016-10-12 20:40:08 +00:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-ticker.C:
|
|
|
|
s.clearExpiredSessions()
|
|
|
|
case <-s.closer.C:
|
|
|
|
return
|
2016-04-07 22:00:11 +00:00
|
|
|
}
|
2016-10-12 20:40:08 +00:00
|
|
|
}
|
2016-04-07 22:00:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (s *sessionCache) clearExpiredSessions() {
|
|
|
|
s.Lock()
|
|
|
|
defer s.Unlock()
|
|
|
|
expired := s.contexts.RemoveExpired(10)
|
|
|
|
if expired != 0 {
|
|
|
|
log.Infof("[WEB] removed %v expired sessions", expired)
|
2015-08-16 20:55:00 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-02-11 02:55:51 +00:00
|
|
|
func (s *sessionCache) Auth(user, pass string, otpToken string) (services.WebSession, error) {
|
2017-01-17 19:24:17 +00:00
|
|
|
method, err := auth.NewWebPasswordAuth(user, []byte(pass), otpToken)
|
2015-07-15 00:52:12 +00:00
|
|
|
if err != nil {
|
2016-02-24 01:26:23 +00:00
|
|
|
return nil, trace.Wrap(err)
|
2015-07-15 00:52:12 +00:00
|
|
|
}
|
2017-01-17 19:24:17 +00:00
|
|
|
|
|
|
|
// the act of creating a tunnel performs authentication. since we are
|
|
|
|
// only using the tunnel for authentication, we close it right afterwards
|
|
|
|
// because we will not be using this connection (initiated using password
|
|
|
|
// based credentials) later.
|
2016-05-04 04:30:17 +00:00
|
|
|
clt, err := auth.NewTunClient("web.client", s.authServers, user, method)
|
2015-07-15 00:52:12 +00:00
|
|
|
if err != nil {
|
2016-02-24 01:26:23 +00:00
|
|
|
return nil, trace.Wrap(err)
|
2015-07-15 00:52:12 +00:00
|
|
|
}
|
2016-04-07 22:00:11 +00:00
|
|
|
defer clt.Close()
|
2017-01-17 19:24:17 +00:00
|
|
|
|
2016-04-07 22:00:11 +00:00
|
|
|
session, err := clt.SignIn(user, []byte(pass))
|
|
|
|
if err != nil {
|
|
|
|
defer clt.Close()
|
|
|
|
return nil, trace.Wrap(err)
|
|
|
|
}
|
|
|
|
return session, nil
|
2015-07-15 00:52:12 +00:00
|
|
|
}
|
|
|
|
|
2016-12-08 10:23:51 +00:00
|
|
|
func (s *sessionCache) GetU2FSignRequest(user, pass string) (*u2f.SignRequest, error) {
|
|
|
|
method, err := auth.NewWebPasswordU2FSignAuth(user, []byte(pass))
|
2016-10-14 06:51:16 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, trace.Wrap(err)
|
|
|
|
}
|
|
|
|
clt, err := auth.NewTunClient("web.get-u2f-sign-request", s.authServers, user, method)
|
|
|
|
if err != nil {
|
|
|
|
return nil, trace.Wrap(err)
|
|
|
|
}
|
|
|
|
// we are always closing this client, because we will not be using
|
|
|
|
// this connection initiated using password based credentials
|
|
|
|
// down the road, so it's a one call client
|
|
|
|
defer clt.Close()
|
2016-12-08 10:23:51 +00:00
|
|
|
u2fSignReq, err := clt.GetU2FSignRequest(user, []byte(pass))
|
2016-10-14 06:51:16 +00:00
|
|
|
if err != nil {
|
|
|
|
defer clt.Close()
|
|
|
|
return nil, trace.Wrap(err)
|
|
|
|
}
|
|
|
|
return u2fSignReq, nil
|
|
|
|
}
|
|
|
|
|
2017-02-11 02:55:51 +00:00
|
|
|
func (s *sessionCache) AuthWithU2FSignResponse(user string, response *u2f.SignResponse) (services.WebSession, error) {
|
2016-12-08 10:23:51 +00:00
|
|
|
method, err := auth.NewWebU2FSignResponseAuth(user, response)
|
2016-10-16 21:03:43 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, trace.Wrap(err)
|
|
|
|
}
|
2016-11-29 07:03:29 +00:00
|
|
|
clt, err := auth.NewTunClient("web.client-u2f", s.authServers, user, method)
|
2016-10-16 21:03:43 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, trace.Wrap(err)
|
|
|
|
}
|
|
|
|
defer clt.Close()
|
|
|
|
session, err := clt.PreAuthenticatedSignIn(user)
|
|
|
|
if err != nil {
|
|
|
|
return nil, trace.Wrap(err)
|
|
|
|
}
|
|
|
|
return session, nil
|
|
|
|
}
|
|
|
|
|
2017-02-03 02:14:42 +00:00
|
|
|
func (s *sessionCache) GetCertificate(c client.CreateSSHCertReq) (*client.SSHLoginResponse, error) {
|
2017-01-17 19:24:17 +00:00
|
|
|
method, err := auth.NewWebPasswordAuth(c.User, []byte(c.Password), c.OTPToken)
|
2015-10-31 01:17:37 +00:00
|
|
|
if err != nil {
|
2016-02-25 01:58:22 +00:00
|
|
|
return nil, trace.Wrap(err)
|
2015-10-31 01:17:37 +00:00
|
|
|
}
|
2017-01-17 19:24:17 +00:00
|
|
|
|
2016-05-04 04:30:17 +00:00
|
|
|
clt, err := auth.NewTunClient("web.session", s.authServers, c.User, method)
|
2015-10-31 01:17:37 +00:00
|
|
|
if err != nil {
|
2016-02-25 01:58:22 +00:00
|
|
|
return nil, trace.Wrap(err)
|
2015-10-31 01:17:37 +00:00
|
|
|
}
|
2016-05-04 04:30:17 +00:00
|
|
|
defer clt.Close()
|
2017-01-17 19:24:17 +00:00
|
|
|
|
2016-11-29 07:03:29 +00:00
|
|
|
return createCertificate(c.User, c.PubKey, c.TTL, clt)
|
|
|
|
}
|
|
|
|
|
2017-02-03 02:14:42 +00:00
|
|
|
func createCertificate(user string, pubkey []byte, ttl time.Duration, clt *auth.TunClient) (*client.SSHLoginResponse, error) {
|
2016-11-29 07:03:29 +00:00
|
|
|
cert, err := clt.GenerateUserCert(pubkey, user, ttl)
|
2015-10-31 01:17:37 +00:00
|
|
|
if err != nil {
|
2016-02-25 01:58:22 +00:00
|
|
|
return nil, trace.Wrap(err)
|
2016-02-12 15:25:54 +00:00
|
|
|
}
|
2016-03-28 19:58:34 +00:00
|
|
|
hostSigners, err := clt.GetCertAuthorities(services.HostCA, false)
|
2016-02-12 15:25:54 +00:00
|
|
|
if err != nil {
|
2016-02-25 01:58:22 +00:00
|
|
|
return nil, trace.Wrap(err)
|
2015-10-31 01:17:37 +00:00
|
|
|
}
|
2016-12-30 21:25:35 +00:00
|
|
|
signers, err := services.CertAuthoritiesToV1(hostSigners)
|
|
|
|
if err != nil {
|
|
|
|
return nil, trace.Wrap(err)
|
2016-02-18 19:10:34 +00:00
|
|
|
}
|
|
|
|
|
2017-02-03 02:14:42 +00:00
|
|
|
return &client.SSHLoginResponse{
|
2016-02-12 15:25:54 +00:00
|
|
|
Cert: cert,
|
2016-02-18 19:10:34 +00:00
|
|
|
HostSigners: signers,
|
2016-02-12 15:25:54 +00:00
|
|
|
}, nil
|
2015-10-31 01:17:37 +00:00
|
|
|
}
|
|
|
|
|
2017-02-03 02:14:42 +00:00
|
|
|
func (s *sessionCache) GetCertificateWithU2F(c client.CreateSSHCertWithU2FReq) (*client.SSHLoginResponse, error) {
|
2016-12-08 10:23:51 +00:00
|
|
|
method, err := auth.NewWebU2FSignResponseAuth(c.User, &c.U2FSignResponse)
|
2016-10-23 03:43:44 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, trace.Wrap(err)
|
|
|
|
}
|
2016-11-29 07:03:29 +00:00
|
|
|
clt, err := auth.NewTunClient("web.session-u2f", s.authServers, c.User, method)
|
2016-10-23 03:43:44 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, trace.Wrap(err)
|
2016-02-12 15:25:54 +00:00
|
|
|
}
|
2016-11-29 07:03:29 +00:00
|
|
|
defer clt.Close()
|
|
|
|
return createCertificate(c.User, c.PubKey, c.TTL, clt)
|
2015-10-31 01:17:37 +00:00
|
|
|
}
|
|
|
|
|
2017-01-17 19:24:17 +00:00
|
|
|
func (s *sessionCache) GetUserInviteInfo(token string) (user string, otpQRCode []byte, err error) {
|
2016-01-21 22:08:41 +00:00
|
|
|
method, err := auth.NewSignupTokenAuth(token)
|
2016-01-21 18:18:59 +00:00
|
|
|
if err != nil {
|
2017-01-17 19:24:17 +00:00
|
|
|
return "", nil, trace.Wrap(err)
|
2016-01-21 18:18:59 +00:00
|
|
|
}
|
2017-01-17 19:24:17 +00:00
|
|
|
|
2016-05-04 04:30:17 +00:00
|
|
|
clt, err := auth.NewTunClient("web.get-user-invite", s.authServers, "tokenAuth", method)
|
2016-01-21 18:18:59 +00:00
|
|
|
if err != nil {
|
2017-01-17 19:24:17 +00:00
|
|
|
return "", nil, trace.Wrap(err)
|
2016-01-21 18:18:59 +00:00
|
|
|
}
|
2016-05-04 04:30:17 +00:00
|
|
|
defer clt.Close()
|
2016-01-21 18:18:59 +00:00
|
|
|
|
2016-01-21 19:41:04 +00:00
|
|
|
return clt.GetSignupTokenData(token)
|
2016-01-21 18:18:59 +00:00
|
|
|
}
|
|
|
|
|
2016-12-08 10:23:51 +00:00
|
|
|
func (s *sessionCache) GetUserInviteU2FRegisterRequest(token string) (u2fRegisterRequest *u2f.RegisterRequest, e error) {
|
2016-10-14 06:51:16 +00:00
|
|
|
method, err := auth.NewSignupTokenAuth(token)
|
|
|
|
if err != nil {
|
|
|
|
return nil, trace.Wrap(err)
|
|
|
|
}
|
|
|
|
clt, err := auth.NewTunClient("web.get-user-invite-u2f-register-request", s.authServers, "tokenAuth", method)
|
|
|
|
if err != nil {
|
|
|
|
return nil, trace.Wrap(err)
|
|
|
|
}
|
|
|
|
defer clt.Close()
|
|
|
|
|
2016-12-08 10:23:51 +00:00
|
|
|
return clt.GetSignupU2FRegisterRequest(token)
|
2016-10-14 06:51:16 +00:00
|
|
|
}
|
|
|
|
|
2017-02-11 02:55:51 +00:00
|
|
|
func (s *sessionCache) CreateNewUser(token, password, otpToken string) (services.WebSession, error) {
|
2016-01-21 22:08:41 +00:00
|
|
|
method, err := auth.NewSignupTokenAuth(token)
|
2016-01-21 18:18:59 +00:00
|
|
|
if err != nil {
|
2016-02-24 01:26:23 +00:00
|
|
|
return nil, trace.Wrap(err)
|
2016-01-21 18:18:59 +00:00
|
|
|
}
|
2017-01-17 19:24:17 +00:00
|
|
|
|
2016-05-08 04:17:28 +00:00
|
|
|
clt, err := auth.NewTunClient("web.create-user", s.authServers, "tokenAuth", method)
|
2016-01-21 18:18:59 +00:00
|
|
|
if err != nil {
|
2016-02-24 01:26:23 +00:00
|
|
|
return nil, trace.Wrap(err)
|
2016-01-21 18:18:59 +00:00
|
|
|
}
|
2016-05-04 04:30:17 +00:00
|
|
|
defer clt.Close()
|
2017-01-17 19:24:17 +00:00
|
|
|
|
|
|
|
sess, err := clt.CreateUserWithToken(token, password, otpToken)
|
2016-02-24 01:26:23 +00:00
|
|
|
return sess, trace.Wrap(err)
|
2016-01-21 18:18:59 +00:00
|
|
|
}
|
|
|
|
|
2017-02-11 02:55:51 +00:00
|
|
|
func (s *sessionCache) CreateNewU2FUser(token string, password string, u2fRegisterResponse u2f.RegisterResponse) (services.WebSession, error) {
|
2016-10-14 06:51:16 +00:00
|
|
|
method, err := auth.NewSignupTokenAuth(token)
|
|
|
|
if err != nil {
|
|
|
|
return nil, trace.Wrap(err)
|
|
|
|
}
|
|
|
|
clt, err := auth.NewTunClient("web.create-u2f-user", s.authServers, "tokenAuth", method)
|
|
|
|
if err != nil {
|
|
|
|
return nil, trace.Wrap(err)
|
|
|
|
}
|
|
|
|
defer clt.Close()
|
2016-12-08 10:23:51 +00:00
|
|
|
sess, err := clt.CreateUserWithU2FToken(token, password, u2fRegisterResponse)
|
2016-10-14 06:51:16 +00:00
|
|
|
return sess, trace.Wrap(err)
|
|
|
|
}
|
|
|
|
|
2017-03-02 19:50:35 +00:00
|
|
|
func (s *sessionCache) ValidateTrustedCluster(validateRequest *auth.ValidateTrustedClusterRequest) (*auth.ValidateTrustedClusterResponse, error) {
|
|
|
|
method, err := auth.NewValidateTrustedClusterAuth(validateRequest.Token)
|
|
|
|
if err != nil {
|
|
|
|
return nil, trace.Wrap(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
clt, err := auth.NewTunClient("web.validate-trusted-cluster", s.authServers, "tokenAuth", method)
|
|
|
|
if err != nil {
|
|
|
|
return nil, trace.Wrap(err)
|
|
|
|
}
|
|
|
|
defer clt.Close()
|
|
|
|
|
|
|
|
validateResponse, err := clt.ValidateTrustedCluster(validateRequest)
|
|
|
|
if err != nil {
|
|
|
|
return nil, trace.Wrap(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return validateResponse, nil
|
|
|
|
}
|
|
|
|
|
2016-04-06 17:29:30 +00:00
|
|
|
func (s *sessionCache) InvalidateSession(ctx *SessionContext) error {
|
2016-02-26 22:57:51 +00:00
|
|
|
defer ctx.Close()
|
2017-02-11 18:48:29 +00:00
|
|
|
if err := s.resetContext(ctx.GetUser(), ctx.GetWebSession().GetName()); err != nil {
|
2016-02-26 22:57:51 +00:00
|
|
|
return trace.Wrap(err)
|
|
|
|
}
|
|
|
|
clt, err := ctx.GetClient()
|
|
|
|
if err != nil {
|
|
|
|
return trace.Wrap(err)
|
|
|
|
}
|
2017-02-11 18:48:29 +00:00
|
|
|
err = clt.DeleteWebSession(ctx.GetUser(), ctx.GetWebSession().GetName())
|
2016-02-26 22:57:51 +00:00
|
|
|
return trace.Wrap(err)
|
|
|
|
}
|
|
|
|
|
2016-04-06 17:29:30 +00:00
|
|
|
func (s *sessionCache) getContext(user, sid string) (*SessionContext, error) {
|
2016-02-26 22:57:51 +00:00
|
|
|
s.Lock()
|
|
|
|
defer s.Unlock()
|
|
|
|
|
2016-02-25 01:58:22 +00:00
|
|
|
val, ok := s.contexts.Get(user + sid)
|
2015-07-15 00:52:12 +00:00
|
|
|
if ok {
|
2016-04-06 17:29:30 +00:00
|
|
|
return val.(*SessionContext), nil
|
2015-07-15 00:52:12 +00:00
|
|
|
}
|
2016-04-12 17:54:24 +00:00
|
|
|
return nil, trace.NotFound("sessionContext not found")
|
2016-02-26 22:57:51 +00:00
|
|
|
}
|
|
|
|
|
2016-04-06 17:29:30 +00:00
|
|
|
func (s *sessionCache) insertContext(user, sid string, ctx *SessionContext, ttl time.Duration) (*SessionContext, error) {
|
2016-02-26 22:57:51 +00:00
|
|
|
s.Lock()
|
|
|
|
defer s.Unlock()
|
|
|
|
|
|
|
|
val, ok := s.contexts.Get(user + sid)
|
|
|
|
if ok && val != nil { // nil means that we've just invalidated the context now and set it to nil in the cache
|
2016-04-12 17:54:24 +00:00
|
|
|
return val.(*SessionContext), trace.AlreadyExists("exists")
|
2016-02-26 22:57:51 +00:00
|
|
|
}
|
2016-04-07 22:00:11 +00:00
|
|
|
if err := s.contexts.Set(user+sid, ctx, ttl); err != nil {
|
2016-02-26 22:57:51 +00:00
|
|
|
return nil, trace.Wrap(err)
|
|
|
|
}
|
|
|
|
return ctx, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *sessionCache) resetContext(user, sid string) error {
|
|
|
|
s.Lock()
|
|
|
|
defer s.Unlock()
|
2016-04-07 22:00:11 +00:00
|
|
|
context, ok := s.contexts.Remove(user + sid)
|
|
|
|
if ok {
|
|
|
|
closeContext(user+sid, context)
|
|
|
|
}
|
|
|
|
return nil
|
2016-02-26 22:57:51 +00:00
|
|
|
}
|
|
|
|
|
2016-04-06 17:29:30 +00:00
|
|
|
func (s *sessionCache) ValidateSession(user, sid string) (*SessionContext, error) {
|
2016-02-26 22:57:51 +00:00
|
|
|
ctx, err := s.getContext(user, sid)
|
|
|
|
if err == nil {
|
|
|
|
return ctx, nil
|
|
|
|
}
|
2016-05-08 04:17:28 +00:00
|
|
|
log.Debugf("ValidateSession(%s, %s)", user, sid)
|
2015-07-15 00:52:12 +00:00
|
|
|
method, err := auth.NewWebSessionAuth(user, []byte(sid))
|
|
|
|
if err != nil {
|
2016-02-24 01:26:23 +00:00
|
|
|
return nil, trace.Wrap(err)
|
2015-07-15 00:52:12 +00:00
|
|
|
}
|
2016-05-04 04:30:17 +00:00
|
|
|
// Note: do not close this auth API client now. It will exist inside of "session context"
|
|
|
|
clt, err := auth.NewTunClient("web.session-user", s.authServers, user, method)
|
2015-07-15 00:52:12 +00:00
|
|
|
if err != nil {
|
2016-02-24 01:26:23 +00:00
|
|
|
return nil, trace.Wrap(err)
|
2015-07-15 00:52:12 +00:00
|
|
|
}
|
2016-02-24 01:26:23 +00:00
|
|
|
sess, err := clt.GetWebSessionInfo(user, sid)
|
|
|
|
if err != nil {
|
|
|
|
return nil, trace.Wrap(err)
|
2015-07-15 00:52:12 +00:00
|
|
|
}
|
2016-04-06 17:29:30 +00:00
|
|
|
c := &SessionContext{
|
2016-02-26 22:57:51 +00:00
|
|
|
clt: clt,
|
|
|
|
user: user,
|
|
|
|
sess: sess,
|
|
|
|
parent: s,
|
2015-07-15 00:52:12 +00:00
|
|
|
}
|
2016-02-26 22:57:51 +00:00
|
|
|
c.Entry = log.WithFields(log.Fields{
|
|
|
|
"user": user,
|
2017-02-18 00:16:44 +00:00
|
|
|
"sess": sess.GetShortName(),
|
2016-02-26 22:57:51 +00:00
|
|
|
})
|
2016-04-07 22:00:11 +00:00
|
|
|
|
2017-02-18 00:16:44 +00:00
|
|
|
ttl := utils.ToTTL(clockwork.NewRealClock(), sess.GetBearerTokenExpiryTime())
|
|
|
|
out, err := s.insertContext(user, sid, c, ttl)
|
2016-02-26 22:57:51 +00:00
|
|
|
if err != nil {
|
|
|
|
// this means that someone has just inserted the context, so
|
|
|
|
// close our extra context and return
|
2016-04-12 17:54:24 +00:00
|
|
|
if trace.IsAlreadyExists(err) {
|
2016-03-08 00:13:11 +00:00
|
|
|
log.Infof("just created, returning the existing one")
|
2016-02-26 22:57:51 +00:00
|
|
|
defer c.Close()
|
|
|
|
return out, nil
|
|
|
|
}
|
2016-02-24 01:26:23 +00:00
|
|
|
return nil, trace.Wrap(err)
|
2015-07-15 00:52:12 +00:00
|
|
|
}
|
2016-02-26 22:57:51 +00:00
|
|
|
return out, nil
|
2015-07-15 00:52:12 +00:00
|
|
|
}
|
|
|
|
|
2016-02-26 22:57:51 +00:00
|
|
|
func (s *sessionCache) SetSession(w http.ResponseWriter, user, sid string) error {
|
2015-07-15 00:52:12 +00:00
|
|
|
d, err := EncodeCookie(user, sid)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
c := &http.Cookie{
|
2016-02-24 01:26:23 +00:00
|
|
|
Name: "session",
|
|
|
|
Value: d,
|
|
|
|
Path: "/",
|
|
|
|
HttpOnly: true,
|
2016-04-07 22:00:11 +00:00
|
|
|
Secure: true,
|
2015-07-15 00:52:12 +00:00
|
|
|
}
|
|
|
|
http.SetCookie(w, c)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-02-26 22:57:51 +00:00
|
|
|
func (s *sessionCache) ClearSession(w http.ResponseWriter) {
|
2015-07-15 00:52:12 +00:00
|
|
|
http.SetCookie(w, &http.Cookie{
|
2016-02-24 01:26:23 +00:00
|
|
|
Name: "session",
|
|
|
|
Value: "",
|
|
|
|
Path: "/",
|
|
|
|
HttpOnly: true,
|
2016-04-07 22:00:11 +00:00
|
|
|
Secure: true,
|
2015-07-15 00:52:12 +00:00
|
|
|
})
|
|
|
|
}
|