Files
server/src/Core/Identity/DuoWebTokenProvider.cs

84 lines
2.7 KiB
C#
Raw Normal View History

2017-06-21 00:04:25 -04:00
using System.Threading.Tasks;
using Microsoft.AspNetCore.Identity;
using Bit.Core.Models.Table;
using Bit.Core.Enums;
using Bit.Core.Utilities.Duo;
using Bit.Core.Models;
using Bit.Core.Services;
2017-06-21 00:04:25 -04:00
namespace Bit.Core.Identity
{
public class DuoWebTokenProvider : IUserTwoFactorTokenProvider<User>
{
private readonly IUserService _userService;
2017-06-21 00:04:25 -04:00
private readonly GlobalSettings _globalSettings;
public DuoWebTokenProvider(
IUserService userService,
GlobalSettings globalSettings)
2017-06-21 00:04:25 -04:00
{
_userService = userService;
2017-06-21 00:04:25 -04:00
_globalSettings = globalSettings;
}
public async Task<bool> CanGenerateTwoFactorTokenAsync(UserManager<User> manager, User user)
2017-06-21 00:04:25 -04:00
{
if(!(await _userService.CanAccessPremium(user)))
2017-07-06 16:56:12 -04:00
{
return false;
2017-07-06 16:56:12 -04:00
}
2017-06-21 00:04:25 -04:00
var provider = user.GetTwoFactorProvider(TwoFactorProviderType.Duo);
if(!HasProperMetaData(provider))
{
return false;
}
return await user.TwoFactorProviderIsEnabledAsync(TwoFactorProviderType.Duo, _userService);
2017-06-21 00:04:25 -04:00
}
2018-08-28 17:40:08 -04:00
public async Task<string> GenerateAsync(string purpose, UserManager<User> manager, User user)
2017-06-21 00:04:25 -04:00
{
2018-08-28 17:40:08 -04:00
if(!(await _userService.CanAccessPremium(user)))
2017-07-06 16:56:12 -04:00
{
2018-08-28 17:40:08 -04:00
return null;
2017-07-06 16:56:12 -04:00
}
2017-06-21 00:04:25 -04:00
var provider = user.GetTwoFactorProvider(TwoFactorProviderType.Duo);
if(!HasProperMetaData(provider))
{
2018-08-28 17:40:08 -04:00
return null;
2017-06-21 00:04:25 -04:00
}
2017-06-21 21:46:52 -04:00
var signatureRequest = DuoWeb.SignRequest((string)provider.MetaData["IKey"], (string)provider.MetaData["SKey"],
2017-07-24 14:39:41 -04:00
_globalSettings.Duo.AKey, user.Email);
2018-08-28 17:40:08 -04:00
return signatureRequest;
2017-06-21 00:04:25 -04:00
}
2018-08-28 17:40:08 -04:00
public async Task<bool> ValidateAsync(string purpose, string token, UserManager<User> manager, User user)
2017-06-21 00:04:25 -04:00
{
2018-08-28 17:40:08 -04:00
if(!(await _userService.CanAccessPremium(user)))
2017-07-06 16:56:12 -04:00
{
2018-08-28 17:40:08 -04:00
return false;
2017-07-06 16:56:12 -04:00
}
2017-06-21 00:04:25 -04:00
var provider = user.GetTwoFactorProvider(TwoFactorProviderType.Duo);
if(!HasProperMetaData(provider))
{
2018-08-28 17:40:08 -04:00
return false;
2017-06-21 00:04:25 -04:00
}
2017-06-21 21:46:52 -04:00
var response = DuoWeb.VerifyResponse((string)provider.MetaData["IKey"], (string)provider.MetaData["SKey"],
2017-06-21 00:04:25 -04:00
_globalSettings.Duo.AKey, token);
2018-08-28 17:40:08 -04:00
return response == user.Email;
2017-06-21 00:04:25 -04:00
}
private bool HasProperMetaData(TwoFactorProvider provider)
{
return provider?.MetaData != null && provider.MetaData.ContainsKey("IKey") &&
provider.MetaData.ContainsKey("SKey") && provider.MetaData.ContainsKey("Host");
}
}
}