From 0aee88a17bb41ab4ab76e5d1ffeffcf2e86d7e85 Mon Sep 17 00:00:00 2001 From: Lloyd Hilaiel <lloyd@hilaiel.com> Date: Mon, 9 Jan 2012 13:33:33 -0700 Subject: [PATCH] backend support for 'two level authentication'. issue #761 --- lib/wsapi.js | 22 +++-- lib/wsapi/auth_with_assertion.js | 4 +- lib/wsapi/authenticate_user.js | 2 +- lib/wsapi/complete_email_addition.js | 8 +- lib/wsapi/complete_user_creation.js | 2 +- lib/wsapi/session_context.js | 11 ++- lib/wsapi/user_creation_status.js | 2 +- tests/primary-then-secondary-test.js | 22 +++++ tests/registration-status-wsapi-test.js | 2 +- tests/two-level-auth-test.js | 115 ++++++++++++++++++++++++ 10 files changed, 174 insertions(+), 16 deletions(-) create mode 100755 tests/two-level-auth-test.js diff --git a/lib/wsapi.js b/lib/wsapi.js index 4fb4bab34..45ca5854e 100644 --- a/lib/wsapi.js +++ b/lib/wsapi.js @@ -32,8 +32,16 @@ function clearAuthenticatedUser(session) { session.reset(['csrf']); } -function isAuthed(req) { - return (req.session) ? req.session.userid : undefined; +function isAuthed(req, requiredLevel) { + if (req.session && req.session.userid && req.session.auth_level) { + // 'password' authentication allows access to all apis. + // 'assertion' authentication, grants access to only those apis + // that don't require 'password' + if (requiredLevel === 'assertion' || req.session.auth_level === 'password') { + return true; + } + } + return false; } function bcryptPassword(password, cb) { @@ -45,8 +53,12 @@ function bcryptPassword(password, cb) { }); }; -function setAuthenticatedUser(session, uid) { +function authenticateSession(session, uid, level) { + if (['assertion', 'password'].indexOf(level) === -1) + throw "invalid authentication level: " + level; + session.userid = uid; + session.auth_level = level; } function checkPassword(pass) { @@ -59,7 +71,7 @@ function checkPassword(pass) { exports.clearAuthenticatedUser = clearAuthenticatedUser; exports.isAuthed = isAuthed; exports.bcryptPassword = bcryptPassword; -exports.setAuthenticatedUser = setAuthenticatedUser; +exports.authenticateSession = authenticateSession; exports.checkPassword = checkPassword; exports.fowardWritesTo = undefined; @@ -278,7 +290,7 @@ exports.setup = function(options, app) { // above // does the request require authentication? - if (wsapis[operation].authed && !isAuthed(req)) { + if (wsapis[operation].authed && !isAuthed(req, wsapis[operation].authed)) { return httputils.badRequest(resp, "requires authentication"); } diff --git a/lib/wsapi/auth_with_assertion.js b/lib/wsapi/auth_with_assertion.js index 8db03f64b..2e9c10f61 100644 --- a/lib/wsapi/auth_with_assertion.js +++ b/lib/wsapi/auth_with_assertion.js @@ -33,7 +33,7 @@ exports.process = function(req, res) { if (type === 'primary') { return db.emailToUID(email, function(uid) { if (!uid) return res.json({ success: false, reason: "internal error" }); - wsapi.setAuthenticatedUser(req.session, uid); + wsapi.authenticateSession(req.session, uid, 'assertion'); return res.json({ success: true }); }); } @@ -82,7 +82,7 @@ exports.process = function(req, res) { } logger.info("successfully created primary acct for " + email + " (" + r.userid + ")"); - wsapi.setAuthenticatedUser(req.session, r.userid); + wsapi.authenticateSession(req.session, r.userid, 'assertion'); res.json({ success: true }); }); }).on('error', function(e) { diff --git a/lib/wsapi/authenticate_user.js b/lib/wsapi/authenticate_user.js index f6f415c9f..25b073bc6 100644 --- a/lib/wsapi/authenticate_user.js +++ b/lib/wsapi/authenticate_user.js @@ -50,7 +50,7 @@ exports.process = function(req, res) { } else { if (!req.session) req.session = {}; - wsapi.setAuthenticatedUser(req.session, uid); + wsapi.authenticateSession(req.session, uid, 'password'); res.json({ success: true }); diff --git a/lib/wsapi/complete_email_addition.js b/lib/wsapi/complete_email_addition.js index deedcd4b9..c0449c5bf 100644 --- a/lib/wsapi/complete_email_addition.js +++ b/lib/wsapi/complete_email_addition.js @@ -45,7 +45,13 @@ exports.process = function(req, res) { return res.json({ success: false }); } db.updatePassword(uid, hash, function(err) { - if (err) logger.warn("couldn't update password during email verification: " + err); + if (err) { + logger.warn("couldn't update password during email verification: " + err); + } else { + // XXX: what if our software 503s? User doens't get a password set and + // cannot change it. + wsapi.authenticateSession(req.session, uid, 'password'); + } res.json({ success: !err }); }); }); diff --git a/lib/wsapi/complete_user_creation.js b/lib/wsapi/complete_user_creation.js index 912e94262..fd582b7ea 100644 --- a/lib/wsapi/complete_user_creation.js +++ b/lib/wsapi/complete_user_creation.js @@ -45,7 +45,7 @@ exports.process = function(req, res) { // FIXME: not sure if we want to do this (ba) // at this point the user has set a password associated with an email address // that they've verified. We create an authenticated session. - wsapi.setAuthenticatedUser(req.session, uid); + wsapi.authenticateSession(req.session, uid, 'password'); res.json({ success: true }); } }); diff --git a/lib/wsapi/session_context.js b/lib/wsapi/session_context.js index 89386ed00..bc57b6bfe 100644 --- a/lib/wsapi/session_context.js +++ b/lib/wsapi/session_context.js @@ -29,13 +29,15 @@ exports.process = function(req, res) { logger.debug("NEW csrf token created: " + req.session.csrf); } - var auth_status = false; + var auth_level = undefined; + var authenticated = false; function sendResponse() { res.json({ csrf_token: req.session.csrf, server_time: (new Date()).getTime(), - authenticated: auth_status, + authenticated: authenticated, + auth_level: auth_level, domain_key_creation_time: domainKeyCreationDate.getTime(), random_seed: crypto.randomBytes(32).toString('base64') }); @@ -43,7 +45,7 @@ exports.process = function(req, res) { // if they're authenticated for an email address that we don't know about, // then we should purge the stored cookie - if (!wsapi.isAuthed(req)) { + if (!wsapi.isAuthed(req, 'assertion')) { logger.debug("user is not authenticated"); sendResponse(); } else { @@ -53,7 +55,8 @@ exports.process = function(req, res) { wsapi.clearAuthenticatedUser(req.session); } else { logger.debug("user is authenticated"); - auth_status = true; + auth_level = req.session.auth_level; + authenticated = true; } sendResponse(); }); diff --git a/lib/wsapi/user_creation_status.js b/lib/wsapi/user_creation_status.js index c06b6f624..f62e5ea9f 100644 --- a/lib/wsapi/user_creation_status.js +++ b/lib/wsapi/user_creation_status.js @@ -11,7 +11,7 @@ exports.process = function(req, res) { var email = req.query.email; // if the user is authenticated as the user in question, we're done - if (wsapi.isAuthed(req)) { + if (wsapi.isAuthed(req, 'assertion')) { db.userOwnsEmail(req.session.userid, email, function(owned) { if (owned) res.json({ status: 'complete' }); else notAuthed(); diff --git a/tests/primary-then-secondary-test.js b/tests/primary-then-secondary-test.js index 55ef5df97..d4d244d57 100755 --- a/tests/primary-then-secondary-test.js +++ b/tests/primary-then-secondary-test.js @@ -94,6 +94,17 @@ suite.addBatch({ } }); +// now we have an account, and we're authenticated with an assertion. +// check auth_level with session_context +suite.addBatch({ + "auth_level": { + topic: wsapi.get('/wsapi/session_context'), + "is 'assertion' after authenticating with assertion" : function(r, err) { + assert.strictEqual(JSON.parse(r.body).auth_level, 'assertion'); + } + } +}); + var token; // now we have a new account. let's add a secondary to it @@ -150,6 +161,17 @@ suite.addBatch({ } }); +// after adding a secondary and setting password, we're password auth'd +suite.addBatch({ + "auth_level": { + topic: wsapi.get('/wsapi/session_context'), + "is 'password' after authenticating with password" : function(r, err) { + assert.strictEqual(JSON.parse(r.body).auth_level, 'password'); + } + } +}); + + // adding a second secondary will not let us set the password suite.addBatch({ "add a new email address to our account": { diff --git a/tests/registration-status-wsapi-test.js b/tests/registration-status-wsapi-test.js index dfb962282..73012662d 100755 --- a/tests/registration-status-wsapi-test.js +++ b/tests/registration-status-wsapi-test.js @@ -175,7 +175,7 @@ suite.addBatch({ topic: wsapi.get("/wsapi/session_context"), "we're authenticated": function (r, err) { assert.strictEqual(r.code, 200); - assert.strictEqual(JSON.parse(r.body).authenticated, true); + assert.strictEqual(JSON.parse(r.body).auth_level, 'password'); }, "but we can easily clear cookies on the client to change that!": function(r, err) { wsapi.clearCookies(); diff --git a/tests/two-level-auth-test.js b/tests/two-level-auth-test.js new file mode 100755 index 000000000..b486a42c4 --- /dev/null +++ b/tests/two-level-auth-test.js @@ -0,0 +1,115 @@ +#!/usr/bin/env node + +/* ***** BEGIN LICENSE BLOCK ***** + * Version: MPL 1.1/GPL 2.0/LGPL 2.1 + * + * The contents of this file are subject to the Mozilla Public License Version + * 1.1 (the "License"); you may not use this file except in compliance with + * the License. You may obtain a copy of the License at + * http://www.mozilla.org/MPL/ + * + * Software distributed under the License is distributed on an "AS IS" basis, + * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License + * for the specific language governing rights and limitations under the + * License. + * + * The Original Code is Mozilla BrowserID. + * + * The Initial Developer of the Original Code is Mozilla. + * Portions created by the Initial Developer are Copyright (C) 2011 + * the Initial Developer. All Rights Reserved. + * + * Contributor(s): + * + * Alternatively, the contents of this file may be used under the terms of + * either the GNU General Public License Version 2 or later (the "GPL"), or + * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"), + * in which case the provisions of the GPL or the LGPL are applicable instead + * of those above. If you wish to allow use of your version of this file only + * under the terms of either the GPL or the LGPL, and not to allow others to + * use your version of this file under the terms of the MPL, indicate your + * decision by deleting the provisions above and replace them with the notice + * and other provisions required by the GPL or the LGPL. If you do not delete + * the provisions above, a recipient may use your version of this file under + * the terms of any one of the MPL, the GPL or the LGPL. + * + * ***** END LICENSE BLOCK ***** */ + +require('./lib/test_env.js'); + +const +assert = require('assert'), +vows = require('vows'), +start_stop = require('./lib/start-stop.js'), +wsapi = require('./lib/wsapi.js'), +primary = require('./lib/primary.js'); + +var suite = vows.describe('primary-then-secondary'); + +start_stop.addStartupBatches(suite); + +// this test verifies that a user who has only authenticated with +// an assertion from their primary, may not call restricted apis + +const TEST_DOMAIN = 'example.domain', + TEST_EMAIL = 'testuser2@' + TEST_DOMAIN, + TEST_ORIGIN = 'http://127.0.0.1:10002'; + +var primaryUser = new primary({ + email: TEST_EMAIL, + domain: TEST_DOMAIN +}); + +// now let's generate an assertion using this user +suite.addBatch({ + "generating an assertion": { + topic: function() { + return primaryUser.getAssertion(TEST_ORIGIN); + }, + "succeeds": function(r, err) { + assert.isString(r); + }, + "and logging in with the assertion": { + topic: function(assertion) { + wsapi.post('/wsapi/auth_with_assertion', { + email: TEST_EMAIL, + assertion: assertion + }).call(this); + }, + "succeeds": function(r, err) { + var resp = JSON.parse(r.body); + assert.isObject(resp); + assert.isTrue(resp.success); + } + } + } +}); + +suite.addBatch({ + "updating our password": { + topic: wsapi.post('/wsapi/update_password', { oldpass: '', newpass: 'frobaztastic' }), + "won't work": function(r) { + assert.strictEqual(r.code, 400); + } + }, + "certifying a key": { + topic: wsapi.post('/wsapi/cert_key', { email: TEST_EMAIL, pubkey: 'fake_key' }), + "won't work": function(r) { + assert.strictEqual(r.code, 400); + } + }, + "listing emails": { + topic: wsapi.get('/wsapi/list_emails'), + "works fine": function(r) { + assert.strictEqual(r.code, 200); + assert.equal(Object.keys(JSON.parse(r.body)).length, 1); + } + } +}); + +// shut the server down and cleanup +start_stop.addShutdownBatches(suite); + +// run or export the suite. +if (process.argv[1] === __filename) suite.run(); +else suite.export(module); -- GitLab