use std::collections::HashMap;
use std::sync::Arc;
use actix_web::http::header::HeaderValue;
use actix_web::HttpRequest;
use actix_web::web::Data;
use chrono::Utc;
use crate::constant;
use crate::squire;
lazy_static::lazy_static! {
static ref SESSION_MAPPING: std::sync::Mutex<HashMap<String, String>> = std::sync::Mutex::new(HashMap::new());
}
struct Credentials {
username: String,
signature: String,
timestamp: String,
}
pub struct AuthToken {
pub ok: bool,
pub detail: String,
pub username: String,
}
fn extract_credentials(authorization: Option<&HeaderValue>) -> Result<Credentials, &'static str> {
let header = authorization.unwrap().to_str().unwrap().to_string();
let b64_decode_response = squire::secure::base64_decode(&header);
return match b64_decode_response {
Ok(decoded_auth) => {
if decoded_auth.is_empty() {
log::warn!("Authorization header was received without a value");
return Err("No credentials received");
}
let vector: Vec<&str> = decoded_auth.split(',').collect();
Ok(Credentials {
username: squire::secure::hex_decode(vector.first().unwrap()),
signature: vector.get(1).unwrap().to_string(),
timestamp: vector.get(2).unwrap().to_string(),
})
}
Err(err) => {
Err(err)
}
};
}
pub fn verify_login(
request: &HttpRequest,
config: &Data<Arc<squire::settings::Config>>,
) -> Result<HashMap<&'static str, String>, String> {
let authorization = request.headers().get("authorization");
let err_response;
if authorization.is_some() {
let extracted_credentials = extract_credentials(authorization);
match extracted_credentials {
Ok(credentials) => {
let password = config.authorization.get(&credentials.username);
if password.is_some() { let message = format!("{}{}{}",
squire::secure::hex_encode(&credentials.username),
squire::secure::hex_encode(password.unwrap()),
credentials.timestamp);
let expected_signature = squire::secure::calculate_hash(message);
if expected_signature == credentials.signature {
let key = squire::secure::keygen();
SESSION_MAPPING.lock().unwrap().insert(credentials.username.to_string(), key.to_string());
let mut mapped = HashMap::new();
mapped.insert("username", credentials.username.to_string());
mapped.insert("key", key.to_string());
mapped.insert("timestamp", credentials.timestamp.to_string());
return Ok(mapped);
} else {
log::warn!("{} entered bad credentials", credentials.username);
err_response = "Incorrect username or password";
}
} else {
log::warn!("{} is not allowed", credentials.username);
err_response = "Incorrect username or password";
}
}
Err(err) => {
err_response = err;
}
}
} else {
log::warn!("Authorization header was missing");
err_response = "No credentials received";
}
Err(err_response.to_string())
}
pub fn verify_token(request: &HttpRequest, config: &Data<Arc<squire::settings::Config>>) -> AuthToken {
if SESSION_MAPPING.lock().unwrap().is_empty() {
log::warn!("No stored sessions, no point in validating further");
return AuthToken {
ok: false,
detail: "Server doesn't recognize your session".to_string(),
username: "NA".to_string(),
};
}
if let Some(cookie) = request.cookie("session_token") {
if let Ok(decrypted) = constant::FERNET.decrypt(cookie.value()) {
let payload: HashMap<String, String> = serde_json::from_str(&String::from_utf8_lossy(&decrypted)).unwrap();
let username = payload.get("username").unwrap().to_string();
let cookie_key = payload.get("key").unwrap().to_string();
let timestamp = payload.get("timestamp").unwrap().parse::<i64>().unwrap();
let stored_key = SESSION_MAPPING.lock().unwrap().get(&username).unwrap().to_string();
let current_time = Utc::now().timestamp();
if stored_key != *cookie_key {
return AuthToken {
ok: false,
detail: "Invalid session token".to_string(),
username,
};
}
if current_time - timestamp > config.session_duration as i64 {
return AuthToken { ok: false, detail: "Session Expired".to_string(), username };
}
AuthToken {
ok: true,
detail: format!("Session valid for {}s", timestamp + config.session_duration as i64 - current_time),
username,
}
} else {
AuthToken {
ok: false,
detail: "Invalid session token".to_string(),
username: "NA".to_string(),
}
}
} else {
AuthToken {
ok: false,
detail: "Session information not found".to_string(),
username: "NA".to_string(),
}
}
}