fleet/server/kolide/users.go

151 lines
4.9 KiB
Go
Raw Normal View History

package kolide
import (
"crypto/rand"
"encoding/base64"
"fmt"
"time"
"golang.org/x/crypto/bcrypt"
"golang.org/x/net/context"
)
// UserStore contains methods for managing users in a datastore
type UserStore interface {
NewUser(user *User) (*User, error)
User(username string) (*User, error)
ListUsers(opt ListOptions) ([]*User, error)
UserByEmail(email string) (*User, error)
UserByID(id uint) (*User, error)
SaveUser(user *User) error
}
// UserService contains methods for managing a Kolide User
type UserService interface {
// NewUser creates a new User from a request Payload
NewUser(ctx context.Context, p UserPayload) (user *User, err error)
// User returns a valid User given a User ID
User(ctx context.Context, id uint) (user *User, err error)
// AuthenticatedUser returns the current user
// from the viewer context
AuthenticatedUser(ctx context.Context) (user *User, err error)
// Users returns all users
ListUsers(ctx context.Context, opt ListOptions) (users []*User, err error)
// RequestPasswordReset generates a password reset request for
// a user. The request results in a token emailed to the user.
// If the person making the request is an admin the AdminForcedPasswordReset
// parameter is enabled instead of sending an email with a password reset token
RequestPasswordReset(ctx context.Context, email string) (err error)
// ResetPassword validate a password reset token and updates
// a user's password
ResetPassword(ctx context.Context, token, password string) (err error)
// ModifyUser updates a user's parameters given a UserPayload
ModifyUser(ctx context.Context, userID uint, p UserPayload) (user *User, err error)
}
// User is the model struct which represents a kolide user
type User struct {
ID uint `json:"id" gorm:"primary_key"`
CreatedAt time.Time `json:"-"`
UpdatedAt time.Time `json:"-"`
Username string `json:"username" gorm:"not null;unique_index:idx_user_unique_username"`
Password []byte `json:"-" gorm:"not null"`
Salt string `json:"-" gorm:"not null"`
Name string `json:"name"`
Email string `json:"email" gorm:"not null;unique_index:idx_user_unique_email"`
Admin bool `json:"admin" gorm:"not null"`
Enabled bool `json:"enabled" gorm:"not null"`
AdminForcedPasswordReset bool `json:"force_password_reset"`
GravatarURL string `json:"gravatar_url"`
Position string `json:"position,omitempty"` // job role
}
2016-08-28 03:59:17 +00:00
// UserPayload is used to modify an existing user
type UserPayload struct {
Username *string `json:"username"`
Name *string `json:"name"`
Email *string `json:"email"`
Admin *bool `json:"admin"`
Enabled *bool `json:"enabled"`
AdminForcedPasswordReset *bool `json:"force_password_reset"`
Password *string `json:"password"`
GravatarURL *string `json:"gravatar_url"`
Position *string `json:"position"`
InviteToken *string `json:"invite_token"`
}
// User creates a user from payload.
func (p UserPayload) User(keySize, cost int) (*User, error) {
user := &User{
Username: *p.Username,
Email: *p.Email,
Admin: falseIfNil(p.Admin),
AdminForcedPasswordReset: falseIfNil(p.AdminForcedPasswordReset),
Enabled: true,
}
if err := user.SetPassword(*p.Password, keySize, cost); err != nil {
return nil, err
}
// add optional fields
if p.Name != nil {
user.Name = *p.Name
}
if p.Position != nil {
user.Position = *p.Position
}
return user, nil
}
// ValidatePassword accepts a potential password for a given user and attempts
// to validate it against the hash stored in the database after joining the
// supplied password with the stored password salt
func (u *User) ValidatePassword(password string) error {
saltAndPass := []byte(fmt.Sprintf("%s%s", password, u.Salt))
return bcrypt.CompareHashAndPassword(u.Password, saltAndPass)
}
func (u *User) SetPassword(plaintext string, keySize, cost int) error {
salt, err := generateRandomText(keySize)
if err != nil {
return err
}
withSalt := []byte(fmt.Sprintf("%s%s", plaintext, salt))
hashed, err := bcrypt.GenerateFromPassword(withSalt, cost)
if err != nil {
return err
}
u.Salt = salt
u.Password = hashed
return nil
}
// generateRandomText return a string generated by filling in keySize bytes with
// random data and then base64 encoding those bytes
func generateRandomText(keySize int) (string, error) {
key := make([]byte, keySize)
_, err := rand.Read(key)
if err != nil {
return "", err
}
return base64.StdEncoding.EncodeToString(key), nil
}
// helper to convert a bool pointer false
func falseIfNil(b *bool) bool {
if b == nil {
return false
}
return *b
}