| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
# ************************************************************************* |
|
2
|
|
|
|
|
|
|
# Copyright (c) 2014-2015, SUSE LLC |
|
3
|
|
|
|
|
|
|
# |
|
4
|
|
|
|
|
|
|
# All rights reserved. |
|
5
|
|
|
|
|
|
|
# |
|
6
|
|
|
|
|
|
|
# Redistribution and use in source and binary forms, with or without |
|
7
|
|
|
|
|
|
|
# modification, are permitted provided that the following conditions are met: |
|
8
|
|
|
|
|
|
|
# |
|
9
|
|
|
|
|
|
|
# 1. Redistributions of source code must retain the above copyright notice, |
|
10
|
|
|
|
|
|
|
# this list of conditions and the following disclaimer. |
|
11
|
|
|
|
|
|
|
# |
|
12
|
|
|
|
|
|
|
# 2. Redistributions in binary form must reproduce the above copyright |
|
13
|
|
|
|
|
|
|
# notice, this list of conditions and the following disclaimer in the |
|
14
|
|
|
|
|
|
|
# documentation and/or other materials provided with the distribution. |
|
15
|
|
|
|
|
|
|
# |
|
16
|
|
|
|
|
|
|
# 3. Neither the name of SUSE LLC nor the names of its contributors may be |
|
17
|
|
|
|
|
|
|
# used to endorse or promote products derived from this software without |
|
18
|
|
|
|
|
|
|
# specific prior written permission. |
|
19
|
|
|
|
|
|
|
# |
|
20
|
|
|
|
|
|
|
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" |
|
21
|
|
|
|
|
|
|
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
|
22
|
|
|
|
|
|
|
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
|
23
|
|
|
|
|
|
|
# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE |
|
24
|
|
|
|
|
|
|
# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
|
25
|
|
|
|
|
|
|
# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
|
26
|
|
|
|
|
|
|
# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
|
27
|
|
|
|
|
|
|
# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
|
28
|
|
|
|
|
|
|
# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
|
29
|
|
|
|
|
|
|
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
|
30
|
|
|
|
|
|
|
# POSSIBILITY OF SUCH DAMAGE. |
|
31
|
|
|
|
|
|
|
# ************************************************************************* |
|
32
|
|
|
|
|
|
|
|
|
33
|
|
|
|
|
|
|
package App::Dochazka::REST::Auth; |
|
34
|
|
|
|
|
|
|
|
|
35
|
41
|
|
|
41
|
|
21091
|
use strict; |
|
|
41
|
|
|
|
|
122
|
|
|
|
41
|
|
|
|
|
1220
|
|
|
36
|
41
|
|
|
41
|
|
229
|
use warnings; |
|
|
41
|
|
|
|
|
110
|
|
|
|
41
|
|
|
|
|
1266
|
|
|
37
|
|
|
|
|
|
|
|
|
38
|
41
|
|
|
41
|
|
240
|
use App::CELL qw( $CELL $log $meta $site ); |
|
|
41
|
|
|
|
|
107
|
|
|
|
41
|
|
|
|
|
4220
|
|
|
39
|
41
|
|
|
41
|
|
341
|
use App::Dochazka::REST; |
|
|
41
|
|
|
|
|
100
|
|
|
|
41
|
|
|
|
|
1664
|
|
|
40
|
41
|
|
|
41
|
|
365
|
use App::Dochazka::REST::ConnBank qw( $dbix_conn conn_status ); |
|
|
41
|
|
|
|
|
113
|
|
|
|
41
|
|
|
|
|
3981
|
|
|
41
|
41
|
|
|
41
|
|
347
|
use App::Dochazka::REST::ACL qw( check_acl ); |
|
|
41
|
|
|
|
|
117
|
|
|
|
41
|
|
|
|
|
2259
|
|
|
42
|
41
|
|
|
41
|
|
316
|
use App::Dochazka::REST::LDAP qw( ldap_exists ldap_search ldap_auth ); |
|
|
41
|
|
|
|
|
125
|
|
|
|
41
|
|
|
|
|
2535
|
|
|
43
|
41
|
|
|
41
|
|
308
|
use App::Dochazka::REST::Model::Employee qw( autocreate_employee nick_exists ); |
|
|
41
|
|
|
|
|
106
|
|
|
|
41
|
|
|
|
|
2219
|
|
|
44
|
41
|
|
|
41
|
|
295
|
use Authen::Passphrase::SaltedDigest; |
|
|
41
|
|
|
|
|
120
|
|
|
|
41
|
|
|
|
|
1348
|
|
|
45
|
41
|
|
|
41
|
|
273
|
use Data::Dumper; |
|
|
41
|
|
|
|
|
113
|
|
|
|
41
|
|
|
|
|
1974
|
|
|
46
|
41
|
|
|
41
|
|
324
|
use Params::Validate qw(:all); |
|
|
41
|
|
|
|
|
153
|
|
|
|
41
|
|
|
|
|
6750
|
|
|
47
|
41
|
|
|
41
|
|
318
|
use Try::Tiny; |
|
|
41
|
|
|
|
|
110
|
|
|
|
41
|
|
|
|
|
2289
|
|
|
48
|
41
|
|
|
41
|
|
349
|
use Web::Machine::Util qw( create_header ); |
|
|
41
|
|
|
|
|
101
|
|
|
|
41
|
|
|
|
|
539
|
|
|
49
|
41
|
|
|
41
|
|
14731
|
use Web::MREST::InitRouter qw( $resources ); |
|
|
41
|
|
|
|
|
120
|
|
|
|
41
|
|
|
|
|
3437
|
|
|
50
|
|
|
|
|
|
|
|
|
51
|
|
|
|
|
|
|
# methods/attributes not defined in this module will be inherited from: |
|
52
|
41
|
|
|
41
|
|
299
|
use parent 'Web::MREST::Entity'; |
|
|
41
|
|
|
|
|
99
|
|
|
|
41
|
|
|
|
|
311
|
|
|
53
|
|
|
|
|
|
|
|
|
54
|
|
|
|
|
|
|
|
|
55
|
|
|
|
|
|
|
|
|
56
|
|
|
|
|
|
|
|
|
57
|
|
|
|
|
|
|
=head1 NAME |
|
58
|
|
|
|
|
|
|
|
|
59
|
|
|
|
|
|
|
App::Dochazka::REST::Auth - HTTP request authentication and authorization |
|
60
|
|
|
|
|
|
|
|
|
61
|
|
|
|
|
|
|
|
|
62
|
|
|
|
|
|
|
|
|
63
|
|
|
|
|
|
|
|
|
64
|
|
|
|
|
|
|
=head1 DESCRIPTION |
|
65
|
|
|
|
|
|
|
|
|
66
|
|
|
|
|
|
|
This package, which is between L<Web::MREST::Entity> and |
|
67
|
|
|
|
|
|
|
L<Web::Dochazka::REST::Dispatch> in the chain of inheritance, provides the |
|
68
|
|
|
|
|
|
|
'is_authorized' and 'forbidden' methods called by L<Web::Machine> on each |
|
69
|
|
|
|
|
|
|
incoming HTTP request. |
|
70
|
|
|
|
|
|
|
|
|
71
|
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
|
|
73
|
|
|
|
|
|
|
|
|
74
|
|
|
|
|
|
|
=head1 METHODS |
|
75
|
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
|
|
77
|
|
|
|
|
|
|
=head2 is_authorized |
|
78
|
|
|
|
|
|
|
|
|
79
|
|
|
|
|
|
|
This overrides the L<Web::Machine> method of the same name. |
|
80
|
|
|
|
|
|
|
|
|
81
|
|
|
|
|
|
|
Authenticate the originator of the request, using HTTP Basic Authentication. |
|
82
|
|
|
|
|
|
|
Upon successful authentication, check that the user (employee) exists in |
|
83
|
|
|
|
|
|
|
the database (create if necessary) and retrieve her EID. Push the EID and |
|
84
|
|
|
|
|
|
|
current privilege level onto the context. Get the user's L<DBIx::Connector> |
|
85
|
|
|
|
|
|
|
object and push that onto the context, too. |
|
86
|
|
|
|
|
|
|
|
|
87
|
|
|
|
|
|
|
=cut |
|
88
|
|
|
|
|
|
|
|
|
89
|
|
|
|
|
|
|
sub is_authorized { |
|
90
|
0
|
|
|
0
|
1
|
|
my ( $self, $auth_header ) = @_; |
|
91
|
0
|
|
|
|
|
|
$log->debug( "Entering " . __PACKAGE__ . "::is_authorized" ); |
|
92
|
|
|
|
|
|
|
|
|
93
|
|
|
|
|
|
|
# get database connection for this HTTP request |
|
94
|
0
|
|
|
|
|
|
App::Dochazka::REST::ConnBank::init_singleton(); |
|
95
|
|
|
|
|
|
|
|
|
96
|
0
|
0
|
|
|
|
|
if ( ! $meta->META_DOCHAZKA_UNIT_TESTING ) { |
|
97
|
0
|
0
|
|
|
|
|
return 1 if $self->_validate_session; |
|
98
|
|
|
|
|
|
|
} |
|
99
|
0
|
0
|
|
|
|
|
if ( $auth_header ) { |
|
100
|
0
|
|
|
|
|
|
$log->debug("is_authorized: auth header is $auth_header" ); |
|
101
|
0
|
|
|
|
|
|
my $username = $auth_header->username; |
|
102
|
0
|
|
|
|
|
|
my $password = $auth_header->password; |
|
103
|
0
|
|
|
|
|
|
my $auth_status = $self->_authenticate( $username, $password ); |
|
104
|
0
|
0
|
|
|
|
|
if ( $auth_status->ok ) { |
|
105
|
0
|
|
|
|
|
|
my $emp = $auth_status->payload; |
|
106
|
0
|
|
|
|
|
|
$self->push_onto_context( { |
|
107
|
|
|
|
|
|
|
current => $emp->TO_JSON, |
|
108
|
|
|
|
|
|
|
current_obj => $emp, |
|
109
|
|
|
|
|
|
|
current_priv => $emp->priv( $dbix_conn ), |
|
110
|
|
|
|
|
|
|
dbix_conn => $dbix_conn, |
|
111
|
|
|
|
|
|
|
} ); |
|
112
|
0
|
0
|
|
|
|
|
$self->_init_session( $emp ) unless $meta->META_DOCHAZKA_UNIT_TESTING; |
|
113
|
0
|
|
|
|
|
|
return 1; |
|
114
|
|
|
|
|
|
|
} else { |
|
115
|
0
|
|
|
|
|
|
$log->error( |
|
116
|
|
|
|
|
|
|
"_authenticate returned non-OK status. The entire status object is " . |
|
117
|
|
|
|
|
|
|
Dumper( $auth_status ) |
|
118
|
|
|
|
|
|
|
); |
|
119
|
|
|
|
|
|
|
} |
|
120
|
|
|
|
|
|
|
} |
|
121
|
0
|
|
|
|
|
|
return create_header( |
|
122
|
|
|
|
|
|
|
'WWWAuthenticate' => [ |
|
123
|
|
|
|
|
|
|
'Basic' => ( |
|
124
|
|
|
|
|
|
|
realm => $site->DOCHAZKA_BASIC_AUTH_REALM |
|
125
|
|
|
|
|
|
|
) |
|
126
|
|
|
|
|
|
|
] |
|
127
|
|
|
|
|
|
|
); |
|
128
|
|
|
|
|
|
|
} |
|
129
|
|
|
|
|
|
|
|
|
130
|
|
|
|
|
|
|
|
|
131
|
|
|
|
|
|
|
=head3 _init_session |
|
132
|
|
|
|
|
|
|
|
|
133
|
|
|
|
|
|
|
Initialize the session. Takes an employee object. |
|
134
|
|
|
|
|
|
|
|
|
135
|
|
|
|
|
|
|
=cut |
|
136
|
|
|
|
|
|
|
|
|
137
|
|
|
|
|
|
|
sub _init_session { |
|
138
|
0
|
|
|
0
|
|
|
my $self = shift; |
|
139
|
0
|
|
|
|
|
|
$log->debug( "Entering " . __PACKAGE__ . "::_init_session" ); |
|
140
|
|
|
|
|
|
|
|
|
141
|
0
|
|
|
|
|
|
my ( $emp ) = validate_pos( @_, { type => HASHREF, can => 'eid' } ); |
|
142
|
|
|
|
|
|
|
|
|
143
|
0
|
|
|
|
|
|
my $r = $self->request; |
|
144
|
0
|
|
|
|
|
|
my $ip_addr = $r->{'env'}->{'REMOTE_ADDR'}; |
|
145
|
0
|
|
|
|
|
|
my $session = $r->{'env'}->{'psgix.session'}; |
|
146
|
0
|
|
|
|
|
|
my $eid = $emp->eid; |
|
147
|
|
|
|
|
|
|
|
|
148
|
0
|
|
|
|
|
|
$session->{'eid'} = $eid; |
|
149
|
0
|
|
|
|
|
|
$session->{'ip_addr'} = $ip_addr; |
|
150
|
0
|
|
|
|
|
|
$session->{'last_seen'} = time; |
|
151
|
|
|
|
|
|
|
|
|
152
|
0
|
|
|
|
|
|
$log->info( "Initialized new session, EID $eid" ); |
|
153
|
|
|
|
|
|
|
|
|
154
|
0
|
|
|
|
|
|
return; |
|
155
|
|
|
|
|
|
|
} |
|
156
|
|
|
|
|
|
|
|
|
157
|
|
|
|
|
|
|
|
|
158
|
|
|
|
|
|
|
=head3 _validate_session |
|
159
|
|
|
|
|
|
|
|
|
160
|
|
|
|
|
|
|
Validate the session |
|
161
|
|
|
|
|
|
|
|
|
162
|
|
|
|
|
|
|
=cut |
|
163
|
|
|
|
|
|
|
|
|
164
|
|
|
|
|
|
|
sub _validate_session { |
|
165
|
0
|
|
|
0
|
|
|
my ( $self ) = @_; |
|
166
|
0
|
|
|
|
|
|
$log->debug( "Entering " . __PACKAGE__ . "::_validate_session" ); |
|
167
|
|
|
|
|
|
|
|
|
168
|
0
|
|
|
|
|
|
my $r = $self->request; |
|
169
|
|
|
|
|
|
|
|
|
170
|
0
|
|
|
|
|
|
my $remote_addr = $r->{'env'}->{'REMOTE_ADDR'}; |
|
171
|
|
|
|
|
|
|
|
|
172
|
0
|
|
|
|
|
|
my $session = $r->{'env'}->{'psgix.session'}; |
|
173
|
0
|
|
|
|
|
|
$log->debug( "Session is " . Dumper( $session ) ); |
|
174
|
|
|
|
|
|
|
|
|
175
|
0
|
0
|
|
|
|
|
return 0 unless %$session; |
|
176
|
0
|
0
|
|
|
|
|
return 0 unless _is_fresh( $session->{'last_seen'} ); |
|
177
|
0
|
0
|
|
|
|
|
return 0 unless $session->{'ip_addr'} eq $remote_addr; |
|
178
|
0
|
0
|
0
|
|
|
|
return 0 unless exists( $session->{'eid'} ) and $session->{'eid'}; |
|
179
|
|
|
|
|
|
|
|
|
180
|
|
|
|
|
|
|
$log->info( "Detected valid existing session" . |
|
181
|
|
|
|
|
|
|
", EID " . $session->{'eid'} . |
|
182
|
0
|
|
|
|
|
|
", last seen " . $session->{'last_seen'} |
|
183
|
|
|
|
|
|
|
); |
|
184
|
|
|
|
|
|
|
|
|
185
|
0
|
|
|
|
|
|
$session->{'last_seen'} = time; |
|
186
|
|
|
|
|
|
|
|
|
187
|
0
|
|
|
|
|
|
my $emp = App::Dochazka::REST::Model::Employee->load_by_eid( $dbix_conn, $session->{'eid'} )->payload; |
|
188
|
0
|
0
|
|
|
|
|
die "missing employee object in session management" |
|
189
|
|
|
|
|
|
|
unless $emp->isa( "App::Dochazka::REST::Model::Employee" ); |
|
190
|
0
|
|
|
|
|
|
$self->push_onto_context( { |
|
191
|
|
|
|
|
|
|
current => $emp->TO_JSON, |
|
192
|
|
|
|
|
|
|
current_obj => $emp, |
|
193
|
|
|
|
|
|
|
current_priv => $emp->priv( $dbix_conn ), |
|
194
|
|
|
|
|
|
|
dbix_conn => $dbix_conn, |
|
195
|
|
|
|
|
|
|
} ); |
|
196
|
|
|
|
|
|
|
|
|
197
|
0
|
|
|
|
|
|
return 1; |
|
198
|
|
|
|
|
|
|
} |
|
199
|
|
|
|
|
|
|
|
|
200
|
|
|
|
|
|
|
|
|
201
|
|
|
|
|
|
|
=head3 _is_fresh |
|
202
|
|
|
|
|
|
|
|
|
203
|
|
|
|
|
|
|
Takes a single argument, which is assumed to be number of seconds since |
|
204
|
|
|
|
|
|
|
epoch when the session was last seen. This is compared to "now" and if the |
|
205
|
|
|
|
|
|
|
difference is greater than the DOCHAZKA_REST_SESSION_EXPIRATION_TIME site |
|
206
|
|
|
|
|
|
|
parameter, the return value is false, otherwise true. |
|
207
|
|
|
|
|
|
|
|
|
208
|
|
|
|
|
|
|
=cut |
|
209
|
|
|
|
|
|
|
|
|
210
|
|
|
|
|
|
|
sub _is_fresh { |
|
211
|
0
|
|
|
0
|
|
|
$log->debug( "Entering " . __PACKAGE__ . "::_is_fresh" ); |
|
212
|
0
|
|
|
|
|
|
my ( $last_seen ) = validate_pos( @_, { type => SCALAR } ); |
|
213
|
0
|
0
|
|
|
|
|
if ( time - $last_seen > $site->DOCHAZKA_REST_SESSION_EXPIRATION_TIME ) { |
|
214
|
0
|
|
|
|
|
|
$log->error( "Session expired!" ); |
|
215
|
0
|
|
|
|
|
|
return 0; |
|
216
|
|
|
|
|
|
|
} |
|
217
|
0
|
|
|
|
|
|
return 1; |
|
218
|
|
|
|
|
|
|
} |
|
219
|
|
|
|
|
|
|
|
|
220
|
|
|
|
|
|
|
|
|
221
|
|
|
|
|
|
|
=head3 _authenticate |
|
222
|
|
|
|
|
|
|
|
|
223
|
|
|
|
|
|
|
Authenticate the nick associated with an incoming REST request. Takes a nick |
|
224
|
|
|
|
|
|
|
and a password (i.e., a set of credentials). Returns a status object, which |
|
225
|
|
|
|
|
|
|
will have level 'OK' on success (with employee object in the payload), 'NOT_OK' |
|
226
|
|
|
|
|
|
|
on failure. In the latter case, there will be a declared status. |
|
227
|
|
|
|
|
|
|
|
|
228
|
|
|
|
|
|
|
=cut |
|
229
|
|
|
|
|
|
|
|
|
230
|
|
|
|
|
|
|
sub _authenticate { |
|
231
|
0
|
|
|
0
|
|
|
my ( $self, $nick, $password ) = @_; |
|
232
|
0
|
|
|
|
|
|
my ( $status, $emp ); |
|
233
|
0
|
|
|
|
|
|
$log->debug( "Entering " . __PACKAGE__ . "::_authenticate" ); |
|
234
|
|
|
|
|
|
|
|
|
235
|
|
|
|
|
|
|
# empty credentials: fall back to demo/demo |
|
236
|
0
|
0
|
|
|
|
|
if ( $nick ) { |
|
237
|
0
|
|
|
|
|
|
$log->notice( "Login attempt from $nick" ); |
|
238
|
|
|
|
|
|
|
} else { |
|
239
|
0
|
|
|
|
|
|
$log->notice( "Login attempt from (anonymous) -- defaulting to demo/demo" ); |
|
240
|
0
|
|
|
|
|
|
$nick = 'demo'; |
|
241
|
0
|
|
|
|
|
|
$password = 'demo'; |
|
242
|
|
|
|
|
|
|
} |
|
243
|
|
|
|
|
|
|
|
|
244
|
0
|
|
|
|
|
|
$log->debug( "\$site->DOCHAZKA_LDAP is " . $site->DOCHAZKA_LDAP ); |
|
245
|
|
|
|
|
|
|
|
|
246
|
|
|
|
|
|
|
# check if LDAP is enabled and if the employee exists in LDAP |
|
247
|
0
|
0
|
0
|
|
|
|
if ( ! $meta->META_DOCHAZKA_UNIT_TESTING and |
|
|
|
|
0
|
|
|
|
|
|
248
|
|
|
|
|
|
|
$site->DOCHAZKA_LDAP and |
|
249
|
|
|
|
|
|
|
ldap_exists( $nick ) |
|
250
|
|
|
|
|
|
|
) { |
|
251
|
|
|
|
|
|
|
|
|
252
|
0
|
|
|
|
|
|
$log->info( "Detected authentication attempt from $nick, a known LDAP user" ); |
|
253
|
|
|
|
|
|
|
#$log->debug( "Password provided: $password" ); |
|
254
|
|
|
|
|
|
|
|
|
255
|
|
|
|
|
|
|
# - authenticate by LDAP bind |
|
256
|
0
|
0
|
|
|
|
|
if ( ldap_auth( $nick, $password ) ) { |
|
257
|
|
|
|
|
|
|
# successful LDAP auth: if the employee doesn't already exist in |
|
258
|
|
|
|
|
|
|
# the database, possibly autocreate |
|
259
|
0
|
|
|
|
|
|
$status = autocreate_employee( $dbix_conn, $nick ); |
|
260
|
0
|
0
|
|
|
|
|
return $status unless $status->ok; |
|
261
|
|
|
|
|
|
|
} else { |
|
262
|
0
|
|
|
|
|
|
return $CELL->status_not_ok( 'DOCHAZKA_EMPLOYEE_AUTH' ); |
|
263
|
|
|
|
|
|
|
} |
|
264
|
|
|
|
|
|
|
|
|
265
|
|
|
|
|
|
|
# load the employee object |
|
266
|
0
|
|
|
|
|
|
my $emp = App::Dochazka::REST::Model::Employee->load_by_nick( $dbix_conn, $nick )->payload; |
|
267
|
0
|
0
|
|
|
|
|
die "missing employee object in _authenticate" unless ref($emp) eq "App::Dochazka::REST::Model::Employee"; |
|
268
|
0
|
|
|
|
|
|
return $CELL->status_ok( 'DOCHAZKA_EMPLOYEE_AUTH', payload => $emp ); |
|
269
|
|
|
|
|
|
|
} |
|
270
|
|
|
|
|
|
|
|
|
271
|
|
|
|
|
|
|
# if not, authenticate against the password stored in the employee object. |
|
272
|
|
|
|
|
|
|
else { |
|
273
|
|
|
|
|
|
|
|
|
274
|
0
|
|
|
|
|
|
$log->notice( "Employee $nick not found in LDAP; reverting to internal auth" ); |
|
275
|
|
|
|
|
|
|
|
|
276
|
|
|
|
|
|
|
# - check if this employee exists in database |
|
277
|
0
|
|
|
|
|
|
my $emp = nick_exists( $dbix_conn, $nick ); |
|
278
|
|
|
|
|
|
|
|
|
279
|
0
|
0
|
0
|
|
|
|
if ( ! defined( $emp ) or ! $emp->isa( 'App::Dochazka::REST::Model::Employee' ) ) { |
|
280
|
0
|
|
|
|
|
|
$log->notice( "Rejecting login attempt from unknown user $nick" ); |
|
281
|
0
|
|
|
|
|
|
$self->mrest_declare_status( explanation => "Authentication failed for user $nick", permanent => 1 ); |
|
282
|
0
|
|
|
|
|
|
return $CELL->status_not_ok; |
|
283
|
|
|
|
|
|
|
} |
|
284
|
|
|
|
|
|
|
|
|
285
|
|
|
|
|
|
|
# - the password might be empty |
|
286
|
0
|
0
|
|
|
|
|
$password = '' unless defined( $password ); |
|
287
|
0
|
|
|
|
|
|
my $passhash = $emp->passhash; |
|
288
|
0
|
0
|
|
|
|
|
$passhash = '' unless defined( $passhash ); |
|
289
|
|
|
|
|
|
|
|
|
290
|
|
|
|
|
|
|
# - check password against passhash |
|
291
|
0
|
|
|
|
|
|
my ( $ppr, $status ); |
|
292
|
|
|
|
|
|
|
try { |
|
293
|
0
|
|
|
0
|
|
|
$ppr = Authen::Passphrase::SaltedDigest->new( |
|
294
|
|
|
|
|
|
|
algorithm => "SHA-512", |
|
295
|
|
|
|
|
|
|
salt_hex => $emp->salt, |
|
296
|
|
|
|
|
|
|
hash_hex => $emp->passhash, |
|
297
|
|
|
|
|
|
|
); |
|
298
|
|
|
|
|
|
|
} catch { |
|
299
|
0
|
|
|
0
|
|
|
$status = $CELL->status_err( 'DOCHAZKA_PASSPHRASE_EXCEPTION', args => [ $_ ] ); |
|
300
|
0
|
|
|
|
|
|
}; |
|
301
|
|
|
|
|
|
|
|
|
302
|
0
|
0
|
|
|
|
|
if ( ref( $ppr ) ne 'Authen::Passphrase::SaltedDigest' ) { |
|
303
|
0
|
|
|
|
|
|
$log->crit( "employee $nick has invalid passhash and/or salt" ); |
|
304
|
0
|
|
|
|
|
|
return $CELL->status_not_ok( 'DOCHAZKA_EMPLOYEE_AUTH' ); |
|
305
|
|
|
|
|
|
|
} |
|
306
|
0
|
0
|
|
|
|
|
if ( $ppr->match( $password ) ) { |
|
307
|
0
|
|
|
|
|
|
$log->notice( "Internal auth successful for employee $nick" ); |
|
308
|
0
|
|
|
|
|
|
return $CELL->status_ok( 'DOCHAZKA_EMPLOYEE_AUTH', payload => $emp ); |
|
309
|
|
|
|
|
|
|
} else { |
|
310
|
0
|
|
|
|
|
|
$self->mrest_declare_status( explanation => |
|
311
|
|
|
|
|
|
|
"Internal auth failed for known employee $nick (mistyped password?)" |
|
312
|
|
|
|
|
|
|
); |
|
313
|
0
|
|
|
|
|
|
return $CELL->status_not_ok; |
|
314
|
|
|
|
|
|
|
} |
|
315
|
|
|
|
|
|
|
} |
|
316
|
|
|
|
|
|
|
} |
|
317
|
|
|
|
|
|
|
|
|
318
|
|
|
|
|
|
|
|
|
319
|
|
|
|
|
|
|
=head2 forbidden |
|
320
|
|
|
|
|
|
|
|
|
321
|
|
|
|
|
|
|
This overrides the L<Web::Machine> method of the same name. |
|
322
|
|
|
|
|
|
|
|
|
323
|
|
|
|
|
|
|
Authorization (ACL check) method. |
|
324
|
|
|
|
|
|
|
|
|
325
|
|
|
|
|
|
|
First, parse the path and look at the method to determine which controller |
|
326
|
|
|
|
|
|
|
action the user is asking us to perform. Each controller action has an ACL |
|
327
|
|
|
|
|
|
|
associated with it, from which we can determine whether employees of each of |
|
328
|
|
|
|
|
|
|
the four different privilege levels are authorized to perform that action. |
|
329
|
|
|
|
|
|
|
|
|
330
|
|
|
|
|
|
|
Requests for non-existent resources will always pass the ACL check. |
|
331
|
|
|
|
|
|
|
|
|
332
|
|
|
|
|
|
|
=cut |
|
333
|
|
|
|
|
|
|
|
|
334
|
|
|
|
|
|
|
sub forbidden { |
|
335
|
0
|
|
|
0
|
1
|
|
my ( $self ) = @_; |
|
336
|
0
|
|
|
|
|
|
$log->debug( "Entering " . __PACKAGE__ . "::forbidden" ); |
|
337
|
|
|
|
|
|
|
|
|
338
|
0
|
|
|
|
|
|
my $method = $self->context->{'method'}; |
|
339
|
0
|
|
|
|
|
|
my $resource_name = $self->context->{'resource_name'}; |
|
340
|
|
|
|
|
|
|
|
|
341
|
|
|
|
|
|
|
# if there is no handler on the context, the URL is invalid so we |
|
342
|
|
|
|
|
|
|
# just pass on the request |
|
343
|
0
|
0
|
|
|
|
|
if ( not exists $self->context->{'handler'} ) { |
|
344
|
0
|
|
|
|
|
|
$log->debug("forbidden: no handler on context, passing on this request"); |
|
345
|
0
|
|
|
|
|
|
return 0; |
|
346
|
|
|
|
|
|
|
} |
|
347
|
|
|
|
|
|
|
|
|
348
|
0
|
|
|
|
|
|
my $resource_def = $resources->{$resource_name}->{$method}; |
|
349
|
|
|
|
|
|
|
|
|
350
|
|
|
|
|
|
|
# now we get the ACL profile. There are three possibilities: |
|
351
|
|
|
|
|
|
|
# 1. acl_profile property does not exist => fail |
|
352
|
|
|
|
|
|
|
# 2. single ACL profile for the entire resource |
|
353
|
|
|
|
|
|
|
# 3. separate ACL profiles for each HTTP method |
|
354
|
0
|
|
|
|
|
|
my ( $acl_profile_prop, $acl_profile ); |
|
355
|
|
|
|
|
|
|
SKIP: { |
|
356
|
|
|
|
|
|
|
|
|
357
|
|
|
|
|
|
|
# check acl_profile property |
|
358
|
0
|
0
|
|
|
|
|
if ( exists( $resource_def->{'acl_profile'} ) ) { |
|
|
0
|
|
|
|
|
|
|
|
359
|
0
|
|
|
|
|
|
$acl_profile_prop = $resource_def->{'acl_profile'}; |
|
360
|
|
|
|
|
|
|
} else { |
|
361
|
0
|
|
|
|
|
|
$log->notice( "Resource $resource_name has no acl_profile property; ACL check will fail" ); |
|
362
|
0
|
|
|
|
|
|
last SKIP; |
|
363
|
|
|
|
|
|
|
} |
|
364
|
|
|
|
|
|
|
|
|
365
|
|
|
|
|
|
|
# got the property, process it |
|
366
|
0
|
0
|
|
|
|
|
if ( ! ref( $acl_profile_prop ) ) { |
|
|
|
0
|
|
|
|
|
|
|
367
|
0
|
|
|
|
|
|
$acl_profile = $acl_profile_prop; |
|
368
|
0
|
|
0
|
|
|
|
$log->debug( "ACL profile for all methods is " . ( $acl_profile || "undefined" ) ); |
|
369
|
|
|
|
|
|
|
} elsif ( ref( $acl_profile_prop ) eq 'HASH' ) { |
|
370
|
0
|
|
|
|
|
|
$acl_profile = $acl_profile_prop->{$method}; |
|
371
|
0
|
|
0
|
|
|
|
$log->debug( "ACL profile for $method requests is " . ( $acl_profile || "undefined" ) ); |
|
372
|
|
|
|
|
|
|
} else { |
|
373
|
|
|
|
|
|
|
$self->mrest_declare_status( code => 500, explanation => |
|
374
|
0
|
|
|
|
|
|
"Cannot determine ACL profile of resource!!! Path is " . $self->context->{'path'}, |
|
375
|
|
|
|
|
|
|
permanent => 1 ); |
|
376
|
0
|
|
|
|
|
|
return 1; |
|
377
|
|
|
|
|
|
|
} |
|
378
|
|
|
|
|
|
|
} |
|
379
|
|
|
|
|
|
|
# push ACL profile onto context |
|
380
|
0
|
|
|
|
|
|
$self->push_onto_context( { 'acl_profile' => $acl_profile } ); |
|
381
|
|
|
|
|
|
|
|
|
382
|
|
|
|
|
|
|
# determine privlevel of our user |
|
383
|
0
|
|
|
|
|
|
my $acl_priv = $self->context->{'current_priv'}; |
|
384
|
0
|
|
0
|
|
|
|
$log->debug( "My ACL level is $acl_priv and the ACL profile of this resource is " |
|
385
|
|
|
|
|
|
|
. ( $acl_profile || "undefined" ) ); |
|
386
|
|
|
|
|
|
|
|
|
387
|
|
|
|
|
|
|
# compare the two |
|
388
|
0
|
|
|
|
|
|
my $acl_check_passed = check_acl( profile => $acl_profile, privlevel => $acl_priv ); |
|
389
|
0
|
0
|
|
|
|
|
if ( $acl_check_passed ) { |
|
390
|
0
|
|
|
|
|
|
$log->debug( "ACL check passed" ); |
|
391
|
0
|
|
|
|
|
|
$self->push_onto_context( { 'acl_priv' => $acl_priv } ); |
|
392
|
0
|
|
|
|
|
|
return 0; |
|
393
|
|
|
|
|
|
|
} |
|
394
|
0
|
|
|
|
|
|
$self->mrest_declare_status( explanation => 'DISPATCH_ACL_CHECK_FAILED', |
|
395
|
|
|
|
|
|
|
args => [ $resource_name ] ); |
|
396
|
0
|
|
|
|
|
|
return 1; |
|
397
|
|
|
|
|
|
|
} |
|
398
|
|
|
|
|
|
|
|
|
399
|
|
|
|
|
|
|
1; |