diff options
author | John Christopher Anderson <jchris@apache.org> | 2010-01-07 20:02:46 +0000 |
---|---|---|
committer | John Christopher Anderson <jchris@apache.org> | 2010-01-07 20:02:46 +0000 |
commit | cd0e9c9b6384e4c9200d10088a13164ce4229ea6 (patch) | |
tree | 0ac40098a49b2dd62b0099f742323a7811399489 /src | |
parent | dd15c8ed5bf5873aec08a99a0687849f1d29f4c3 (diff) |
merge account branch to trunk
git-svn-id: https://svn.apache.org/repos/asf/couchdb/trunk@896989 13f79535-47bb-0310-9956-ffa450edef68
Diffstat (limited to 'src')
-rw-r--r-- | src/couchdb/couch_db.hrl | 7 | ||||
-rw-r--r-- | src/couchdb/couch_httpd.erl | 28 | ||||
-rw-r--r-- | src/couchdb/couch_httpd_auth.erl | 439 | ||||
-rw-r--r-- | src/couchdb/couch_httpd_db.erl | 35 | ||||
-rw-r--r-- | src/couchdb/couch_httpd_oauth.erl | 3 |
5 files changed, 226 insertions, 286 deletions
diff --git a/src/couchdb/couch_db.hrl b/src/couchdb/couch_db.hrl index f2ccb453..99ef8997 100644 --- a/src/couchdb/couch_db.hrl +++ b/src/couchdb/couch_db.hrl @@ -107,8 +107,11 @@ -record(user_ctx, - {name=null, - roles=[] + { + name=null, + roles=[], + handler, + user_doc }). % This should be updated anytime a header change happens that requires more diff --git a/src/couchdb/couch_httpd.erl b/src/couchdb/couch_httpd.erl index baa22d8f..252ecdb7 100644 --- a/src/couchdb/couch_httpd.erl +++ b/src/couchdb/couch_httpd.erl @@ -17,6 +17,7 @@ -export([header_value/2,header_value/3,qs_value/2,qs_value/3,qs/1,path/1,absolute_uri/2,body_length/1]). -export([verify_is_server_admin/1,unquote/1,quote/1,recv/2,recv_chunked/4,error_info/1]). +-export([make_fun_spec_strs/1]). -export([parse_form/1,json_body/1,json_body_obj/1,body/1,doc_etag/1, make_etag/1, etag_respond/3]). -export([primary_header_value/2,partition/1,serve_file/3,serve_file/4, server_header/0]). -export([start_chunked_response/3,send_chunk/2,log_request/2]). @@ -119,8 +120,8 @@ make_arity_3_fun(SpecStr) -> end. % SpecStr is "{my_module, my_fun}, {my_module2, my_fun2}" -make_arity_1_fun_list(SpecStr) -> - [make_arity_1_fun(FunSpecStr) || FunSpecStr <- re:split(SpecStr, "(?<=})\\s*,\\s*(?={)", [{return, list}])]. +make_fun_spec_strs(SpecStr) -> + [FunSpecStr || FunSpecStr <- re:split(SpecStr, "(?<=})\\s*,\\s*(?={)", [{return, list}])]. stop() -> mochiweb_http:stop(?MODULE). @@ -129,7 +130,7 @@ stop() -> handle_request(MochiReq, DefaultFun, UrlHandlers, DbUrlHandlers, DesignUrlHandlers) -> Begin = now(), - AuthenticationFuns = make_arity_1_fun_list( + AuthenticationSrcs = make_fun_spec_strs( couch_config:get("httpd", "authentication_handlers")), % for the path, use the raw path with the query string and fragment % removed, but URL quoting left intact @@ -180,7 +181,7 @@ handle_request(MochiReq, DefaultFun, {ok, Resp} = try - case authenticate_request(HttpReq, AuthenticationFuns) of + case authenticate_request(HttpReq, AuthenticationSrcs) of #httpd{} = Req -> HandlerFun(Req); Response -> @@ -216,8 +217,10 @@ handle_request(MochiReq, DefaultFun, couch_stats_collector:increment({httpd, requests}), {ok, Resp}. -% Try authentication handlers in order until one returns a result -authenticate_request(#httpd{user_ctx=#user_ctx{}} = Req, _AuthFuns) -> +% Try authentication handlers in order until one sets a user_ctx +% the auth funs also have the option of returning a response +% move this to couch_httpd_auth? +authenticate_request(#httpd{user_ctx=#user_ctx{}} = Req, _AuthSrcs) -> Req; authenticate_request(#httpd{} = Req, []) -> case couch_config:get("couch_httpd_auth", "require_valid_user", "false") of @@ -226,9 +229,15 @@ authenticate_request(#httpd{} = Req, []) -> "false" -> Req#httpd{user_ctx=#user_ctx{}} end; -authenticate_request(#httpd{} = Req, [AuthFun|Rest]) -> - authenticate_request(AuthFun(Req), Rest); -authenticate_request(Response, _AuthFuns) -> +authenticate_request(#httpd{} = Req, [AuthSrc|Rest]) -> + AuthFun = make_arity_1_fun(AuthSrc), + R = case AuthFun(Req) of + #httpd{user_ctx=#user_ctx{}=UserCtx}=Req2 -> + Req2#httpd{user_ctx=UserCtx#user_ctx{handler=?l2b(AuthSrc)}}; + Else -> Else + end, + authenticate_request(R, Rest); +authenticate_request(Response, _AuthSrcs) -> Response. increment_method_stats(Method) -> @@ -586,6 +595,7 @@ send_error(_Req, {already_sent, Resp, _Error}) -> send_error(#httpd{mochi_req=MochiReq}=Req, Error) -> {Code, ErrorStr, ReasonStr} = error_info(Error), Headers = if Code == 401 -> + % this is where the basic auth popup is triggered case MochiReq:get_header_value("X-CouchDB-WWW-Authenticate") of undefined -> case couch_config:get("httpd", "WWW-Authenticate", nil) of diff --git a/src/couchdb/couch_httpd_auth.erl b/src/couchdb/couch_httpd_auth.erl index b244e16e..554886ca 100644 --- a/src/couchdb/couch_httpd_auth.erl +++ b/src/couchdb/couch_httpd_auth.erl @@ -18,7 +18,6 @@ -export([null_authentication_handler/1]). -export([cookie_auth_header/2]). -export([handle_session_req/1]). --export([handle_user_req/1]). -export([ensure_users_db_exists/1, get_user/1]). -import(couch_httpd, [header_value/2, send_json/2,send_json/4, send_method_not_allowed/2]). @@ -49,6 +48,9 @@ basic_username_pw(Req) -> case AuthorizationHeader of "Basic " ++ Base64Value -> case string:tokens(?b2l(couch_util:decodeBase64(Base64Value)),":") of + ["_", "_"] -> + % special name and pass to be logged out + nil; [User, Pass] -> {User, Pass}; [User] -> @@ -63,11 +65,22 @@ basic_username_pw(Req) -> default_authentication_handler(Req) -> case basic_username_pw(Req) of {User, Pass} -> - case couch_server:is_admin(User, Pass) of - true -> - Req#httpd{user_ctx=#user_ctx{name=?l2b(User), roles=[<<"_admin">>]}}; - false -> - throw({unauthorized, <<"Name or password is incorrect.">>}) + case get_user(?l2b(User)) of + nil -> + throw({unauthorized, <<"Name or password is incorrect.">>}); + UserProps -> + UserSalt = proplists:get_value(<<"salt">>, UserProps, <<>>), + PasswordHash = hash_password(?l2b(Pass), UserSalt), + case proplists:get_value(<<"password_sha">>, UserProps, nil) of + ExpectedHash when ExpectedHash == PasswordHash -> + Req#httpd{user_ctx=#user_ctx{ + name=?l2b(User), + roles=proplists:get_value(<<"roles">>, UserProps, []), + user_doc={UserProps} + }}; + _Else -> + throw({unauthorized, <<"Name or password is incorrect.">>}) + end end; nil -> case couch_server:has_admins() of @@ -86,138 +99,161 @@ default_authentication_handler(Req) -> null_authentication_handler(Req) -> Req#httpd{user_ctx=#user_ctx{roles=[<<"_admin">>]}}. -% Cookie auth handler using per-node user db -cookie_authentication_handler(Req) -> - case cookie_auth_user(Req) of - % Fall back to default authentication handler - nil -> default_authentication_handler(Req); - Req2 -> Req2 - end. - -% Cookie auth handler using per-db user db -% cookie_authentication_handler(#httpd{path_parts=Path}=Req) -> -% case Path of -% [DbName|_] -> -% case cookie_auth_user(Req, DbName) of -% nil -> default_authentication_handler(Req); -% Req2 -> Req2 -% end; -% _Else -> -% % Fall back to default authentication handler -% default_authentication_handler(Req) -% end. - % maybe we can use hovercraft to simplify running this view query +% rename to get_user_from_users_db get_user(UserName) -> - % In the future this will be pluggable. For now we check the .ini first, - % then fall back to querying the db. case couch_config:get("admins", ?b2l(UserName)) of "-hashed-" ++ HashedPwdAndSalt -> + % the username is an admin, now check to see if there is a user doc + % which has a matching username, salt, and password_sha [HashedPwd, Salt] = string:tokens(HashedPwdAndSalt, ","), - [{<<"roles">>, [<<"_admin">>]}, - {<<"salt">>, ?l2b(Salt)}, - {<<"password_sha">>, ?l2b(HashedPwd)}]; - _ -> - DesignId = <<"_design/_auth">>, - ViewName = <<"users">>, - % if the design doc or the view doesn't exist, then make it - DbName = couch_config:get("couch_httpd_auth", "authentication_db"), - {ok, Db} = ensure_users_db_exists(?l2b(DbName)), - - ensure_users_view_exists(Db, DesignId, ViewName), + case get_user_props_from_db(UserName) of + nil -> + [{<<"roles">>, [<<"_admin">>]}, + {<<"salt">>, ?l2b(Salt)}, + {<<"password_sha">>, ?l2b(HashedPwd)}]; + UserProps when is_list(UserProps) -> + DocRoles = proplists:get_value(<<"roles">>, UserProps), + [{<<"roles">>, [<<"_admin">> | DocRoles]}, + {<<"salt">>, ?l2b(Salt)}, + {<<"password_sha">>, ?l2b(HashedPwd)}, + {<<"user_doc">>, {UserProps}}] + end; + Else -> + get_user_props_from_db(UserName) + end. - case (catch couch_view:get_map_view(Db, DesignId, ViewName, nil)) of - {ok, View, _Group} -> - FoldFun = fun({_, Value}, _, {_}) -> {stop, Value} end, - {ok, _, {Result}} = couch_view:fold(View, FoldFun, {nil}, - [{start_key, {UserName, ?MIN_STR}},{end_key, {UserName, ?MAX_STR}}]), - Result; - {not_found, _Reason} -> - nil - % case (catch couch_view:get_reduce_view(Db, DesignId, ViewName, nil)) of - % {ok, _ReduceView, _Group} -> - % not_implemented; - % {not_found, _Reason} -> - % nil - % end - end +get_user_props_from_db(UserName) -> + DbName = couch_config:get("couch_httpd_auth", "authentication_db"), + {ok, Db} = ensure_users_db_exists(?l2b(DbName)), + DocId = <<"org.couchdb.user:", UserName/binary>>, + try couch_httpd_db:couch_doc_open(Db, DocId, nil, []) of + #doc{}=Doc -> + {DocProps} = couch_query_servers:json_doc(Doc), + DocProps + catch + throw:Throw -> + nil end. - + +% this should handle creating the ddoc ensure_users_db_exists(DbName) -> case couch_db:open(DbName, [{user_ctx, #user_ctx{roles=[<<"_admin">>]}}]) of {ok, Db} -> + ensure_auth_ddoc_exists(Db, <<"_design/_auth">>), {ok, Db}; _Error -> - ?LOG_ERROR("Create the db ~p", [DbName]), {ok, Db} = couch_db:create(DbName, [{user_ctx, #user_ctx{roles=[<<"_admin">>]}}]), - ?LOG_ERROR("Created the db ~p", [DbName]), + ensure_auth_ddoc_exists(Db, <<"_design/_auth">>), {ok, Db} end. -ensure_users_view_exists(Db, DDocId, VName) -> +ensure_auth_ddoc_exists(Db, DDocId) -> try couch_httpd_db:couch_doc_open(Db, DDocId, nil, []) of _Foo -> ok catch _:Error -> - ?LOG_ERROR("create the design document ~p : ~p", [DDocId, Error]), % create the design document - {ok, AuthDesign} = auth_design_doc(DDocId, VName), + {ok, AuthDesign} = auth_design_doc(DDocId), {ok, _Rev} = couch_db:update_doc(Db, AuthDesign, []), - ?LOG_ERROR("created the design document", []), ok end. -auth_design_doc(DocId, VName) -> +% add the validation function here +auth_design_doc(DocId) -> DocProps = [ {<<"_id">>, DocId}, {<<"language">>,<<"javascript">>}, {<<"views">>, - {[{VName, + {[{<<"users">>, {[{<<"map">>, <<"function (doc) {\n if (doc.type == \"user\") {\n emit(doc.username, doc);\n}\n}">> }]} }]} + }, + { + <<"validate_doc_update">>, + <<"function(newDoc, oldDoc, userCtx) { + if (newDoc.type != 'user') { + return; + } // we only validate user docs for now + if (!newDoc.username) { + throw({forbidden : 'doc.username is required'}); + } + if (!(newDoc.roles && (typeof newDoc.roles.length != 'undefined') )) { + throw({forbidden : 'doc.roles must be an array'}); + } + if (newDoc._id != 'org.couchdb.user:'+newDoc.username) { + throw({forbidden : 'Docid must be of the form org.couchdb.user:username'}); + } + if (oldDoc) { // validate all updates + if (oldDoc.username != newDoc.username) { + throw({forbidden : 'Usernames may not be changed.'}); + } + } + if (newDoc.password_sha && !newDoc.salt) { + throw({forbidden : 'Users with password_sha must have a salt. See /_utils/script/couch.js for example code.'}); + } + if (userCtx.roles.indexOf('_admin') == -1) { // not an admin + if (oldDoc) { // validate non-admin updates + if (userCtx.name != newDoc.username) { + throw({forbidden : 'You may only update your own user document.'}); + } + // validate role updates + var oldRoles = oldDoc.roles.sort(); + var newRoles = newDoc.roles.sort(); + if (oldRoles.length != newRoles.length) { + throw({forbidden : 'Only _admin may edit roles'}); + } + for (var i=0; i < oldRoles.length; i++) { + if (oldRoles[i] != newRoles[i]) { + throw({forbidden : 'Only _admin may edit roles'}); + } + }; + } else if (newDoc.roles.length > 0) { + throw({forbidden : 'Only _admin may set roles'}); + } + } + // no system roles in users db + for (var i=0; i < newDoc.roles.length; i++) { + if (newDoc.roles[i][0] == '_') { + throw({forbidden : 'No system roles (starting with underscore) in users db.'}); + } + }; + // no system names as usernames + if (newDoc.username[0] == '_') { + throw({forbidden : 'Username may not start with underscore.'}); + } + }">> }], {ok, couch_doc:from_json_obj({DocProps})}. - - -user_doc(DocId, Username, UserSalt, PasswordHash, Email, Active, Roles) -> - user_doc(DocId, Username, UserSalt, PasswordHash, Email, Active, Roles, nil). -user_doc(DocId, Username, UserSalt, PasswordHash, Email, Active, Roles, Rev) -> - DocProps = [ - {<<"_id">>, DocId}, - {<<"type">>, <<"user">>}, - {<<"username">>, Username}, - {<<"password_sha">>, PasswordHash}, - {<<"salt">>, UserSalt}, - {<<"email">>, Email}, - {<<"active">>, Active}, - {<<"roles">>, Roles}], - DocProps1 = case Rev of - nil -> DocProps; - _Rev -> - [{<<"_rev">>, Rev}] ++ DocProps - end, - {ok, couch_doc:from_json_obj({DocProps1})}. -cookie_auth_user(#httpd{mochi_req=MochiReq}=Req) -> +cookie_authentication_handler(#httpd{mochi_req=MochiReq}=Req) -> case MochiReq:get_cookie_value("AuthSession") of - undefined -> nil; - [] -> nil; + undefined -> Req; + [] -> Req; Cookie -> - AuthSession = couch_util:decodeBase64Url(Cookie), - [User, TimeStr | HashParts] = string:tokens(?b2l(AuthSession), ":"), + [User, TimeStr | HashParts] = try + AuthSession = couch_util:decodeBase64Url(Cookie), + [A, B | Cs] = string:tokens(?b2l(AuthSession), ":") + catch + _:Error -> + Reason = <<"Malformed AuthSession cookie. Please clear your cookies.">>, + throw({bad_request, Reason}) + end, % Verify expiry and hash {NowMS, NowS, _} = erlang:now(), CurrentTime = NowMS * 1000000 + NowS, case couch_config:get("couch_httpd_auth", "secret", nil) of - nil -> nil; + nil -> + ?LOG_ERROR("cookie auth secret is not set",[]), + Req; SecretStr -> Secret = ?l2b(SecretStr), case get_user(?l2b(User)) of - nil -> nil; - Result -> - UserSalt = proplists:get_value(<<"salt">>, Result, <<"">>), + nil -> Req; + UserProps -> + UserSalt = proplists:get_value(<<"salt">>, UserProps, <<"">>), FullSecret = <<Secret/binary, UserSalt/binary>>, ExpectedHash = crypto:sha_mac(FullSecret, User ++ ":" ++ TimeStr), Hash = ?l2b(string:join(HashParts, ":")), @@ -230,10 +266,11 @@ cookie_auth_user(#httpd{mochi_req=MochiReq}=Req) -> ?LOG_DEBUG("Successful cookie auth as: ~p", [User]), Req#httpd{user_ctx=#user_ctx{ name=?l2b(User), - roles=proplists:get_value(<<"roles">>, Result, []) + roles=proplists:get_value(<<"roles">>, UserProps, []), + user_doc=proplists:get_value(<<"user_doc">>, UserProps, null) }, auth={FullSecret, TimeLeft < Timeout*0.9}}; _Else -> - nil + Req end end end @@ -270,8 +307,19 @@ cookie_auth_cookie(User, Secret, TimeStamp) -> hash_password(Password, Salt) -> ?l2b(couch_util:to_hex(crypto:sha(<<Password/binary, Salt/binary>>))). +ensure_cookie_auth_secret() -> + case couch_config:get("couch_httpd_auth", "secret", nil) of + nil -> + NewSecret = ?b2l(couch_uuids:random()), + couch_config:set("couch_httpd_auth", "secret", NewSecret), + NewSecret; + Secret -> Secret + end. + +% session handlers % Login handler with user db -handle_login_req(#httpd{method='POST', mochi_req=MochiReq}=Req) -> +% TODO this should also allow a JSON POST +handle_session_req(#httpd{method='POST', mochi_req=MochiReq}=Req) -> ReqBody = MochiReq:recv_body(), Form = case MochiReq:get_primary_header_value("content-type") of "application/x-www-form-urlencoded" ++ _ -> @@ -281,6 +329,7 @@ handle_login_req(#httpd{method='POST', mochi_req=MochiReq}=Req) -> end, UserName = ?l2b(proplists:get_value("username", Form, "")), Password = ?l2b(proplists:get_value("password", Form, "")), + ?LOG_DEBUG("Attempt Login: ~s",[UserName]), User = case get_user(UserName) of nil -> []; Result -> Result @@ -289,10 +338,12 @@ handle_login_req(#httpd{method='POST', mochi_req=MochiReq}=Req) -> PasswordHash = hash_password(Password, UserSalt), case proplists:get_value(<<"password_sha">>, User, nil) of ExpectedHash when ExpectedHash == PasswordHash -> - Secret = ?l2b(couch_config:get("couch_httpd_auth", "secret", nil)), + % setup the session cookie + Secret = ?l2b(ensure_cookie_auth_secret()), {NowMS, NowS, _} = erlang:now(), CurrentTime = NowMS * 1000000 + NowS, Cookie = cookie_auth_cookie(?b2l(UserName), <<Secret/binary, UserSalt/binary>>, CurrentTime), + % TODO document the "next" feature in Futon {Code, Headers} = case couch_httpd:qs_value(Req, "next", nil) of nil -> {200, [Cookie]}; @@ -300,32 +351,38 @@ handle_login_req(#httpd{method='POST', mochi_req=MochiReq}=Req) -> {302, [Cookie, {"Location", couch_httpd:absolute_uri(Req, Redirect)}]} end, send_json(Req#httpd{req_body=ReqBody}, Code, Headers, - {[{ok, true}]}); + {[ + {ok, true}, + {name, proplists:get_value(<<"username">>, User, null)}, + {roles, proplists:get_value(<<"roles">>, User, [])}, + {user_doc, proplists:get_value(<<"user_doc">>, User, null)} + ]}); _Else -> - throw({unauthorized, <<"Name or password is incorrect.">>}) - end. - -% Session Handler - -handle_session_req(#httpd{method='POST'}=Req) -> - handle_login_req(Req); + % clear the session + Cookie = mochiweb_cookies:cookie("AuthSession", "", [{path, "/"}, {http_only, true}]), + send_json(Req, 401, [Cookie], {[{error, <<"unauthorized">>},{reason, <<"Name or password is incorrect.">>}]}) + end; +% get user info handle_session_req(#httpd{method='GET', user_ctx=UserCtx}=Req) -> - % whoami Name = UserCtx#user_ctx.name, - Roles = UserCtx#user_ctx.roles, ForceLogin = couch_httpd:qs_value(Req, "basic", "false"), case {Name, ForceLogin} of {null, "true"} -> throw({unauthorized, <<"Please login.">>}); - _False -> ok - end, - send_json(Req, {[ - {ok, true}, - {name, Name}, - {roles, Roles} - ]}); + {Name, _} -> + send_json(Req, {[ + {ok, true}, + {name, Name}, + {roles, UserCtx#user_ctx.roles}, + {info, {[ + {user_db, ?l2b(couch_config:get("couch_httpd_auth", "authentication_db"))}, + {handlers, [?l2b(H) || H <- couch_httpd:make_fun_spec_strs( + couch_config:get("httpd", "authentication_handlers"))]} + ] ++ maybe_value(authenticated, UserCtx#user_ctx.handler)}} + ] ++ maybe_value(user_doc, UserCtx#user_ctx.user_doc)}) + end; +% logout by deleting the session handle_session_req(#httpd{method='DELETE'}=Req) -> - % logout Cookie = mochiweb_cookies:cookie("AuthSession", "", [{path, "/"}, {http_only, true}]), {Code, Headers} = case couch_httpd:qs_value(Req, "next", nil) of nil -> @@ -336,135 +393,9 @@ handle_session_req(#httpd{method='DELETE'}=Req) -> send_json(Req, Code, Headers, {[{ok, true}]}); handle_session_req(Req) -> send_method_not_allowed(Req, "GET,HEAD,POST,DELETE"). - -create_user_req(#httpd{method='POST', mochi_req=MochiReq}=Req, Db) -> - ReqBody = MochiReq:recv_body(), - Form = case MochiReq:get_primary_header_value("content-type") of - "application/x-www-form-urlencoded" ++ _ -> - ?LOG_INFO("body parsed ~p", [mochiweb_util:parse_qs(ReqBody)]), - mochiweb_util:parse_qs(ReqBody); - _ -> - [] - end, - Roles = proplists:get_all_values("roles", Form), - UserName = ?l2b(proplists:get_value("username", Form, "")), - Password = ?l2b(proplists:get_value("password", Form, "")), - Email = ?l2b(proplists:get_value("email", Form, "")), - Active = couch_httpd_view:parse_bool_param(proplists:get_value("active", Form, "true")), - case get_user(UserName) of - nil -> - Roles1 = case Roles of - [] -> Roles; - _ -> - ok = couch_httpd:verify_is_server_admin(Req), - [?l2b(R) || R <- Roles] - end, - - UserSalt = couch_uuids:random(), - PasswordHash = hash_password(Password, UserSalt), - DocId = couch_uuids:random(), - {ok, UserDoc} = user_doc(DocId, UserName, UserSalt, PasswordHash, Email, Active, Roles1), - {ok, _Rev} = couch_db:update_doc(Db, UserDoc, []), - ?LOG_DEBUG("User ~s (~s) with password, ~s created.", [?b2l(UserName), ?b2l(DocId), ?b2l(Password)]), - {Code, Headers} = case couch_httpd:qs_value(Req, "next", nil) of - nil -> - {200, []}; - Redirect -> - {302, [{"Location", couch_httpd:absolute_uri(Req, Redirect)}]} - end, - send_json(Req, Code, Headers, {[{ok, true}]}); - _Result -> - ?LOG_DEBUG("Can't create ~s: already exists", [?b2l(UserName)]), - throw({forbidden, <<"User already exists.">>}) - end. - -update_user_req(#httpd{method='PUT', mochi_req=MochiReq, user_ctx=UserCtx}=Req, Db, UserName) -> - Name = UserCtx#user_ctx.name, - UserRoles = UserCtx#user_ctx.roles, - case User = get_user(UserName) of - nil -> - throw({not_found, <<"User doesn't exist">>}); - _Result -> - ReqBody = MochiReq:recv_body(), - Form = case MochiReq:get_primary_header_value("content-type") of - "application/x-www-form-urlencoded" ++ _ -> - mochiweb_util:parse_qs(ReqBody); - _ -> - [] - end, - Roles = proplists:get_all_values("roles", Form), - Password = ?l2b(proplists:get_value("password", Form, "")), - Email = ?l2b(proplists:get_value("email", Form, "")), - Active = couch_httpd_view:parse_bool_param(proplists:get_value("active", Form, "true")), - OldPassword = proplists:get_value("old_password", Form, ""), - OldPassword1 = ?l2b(OldPassword), - UserSalt = proplists:get_value(<<"salt">>, User, <<>>), - OldRev = proplists:get_value(<<"_rev">>, User, <<>>), - DocId = proplists:get_value(<<"_id">>, User, <<>>), - CurrentPasswordHash = proplists:get_value(<<"password_sha">>, User, nil), - - - Roles1 = case Roles of - [] -> Roles; - _ -> - ok = couch_httpd:verify_is_server_admin(Req), - [?l2b(R) || R <- Roles] - end, - - PasswordHash = case lists:member(<<"_admin">>, UserRoles) of - true -> - case Password of - <<>> -> CurrentPasswordHash; - _Else -> - hash_password(Password, UserSalt) - end; - false when Name =:= UserName -> - %% for user we test old password before allowing change - case Password of - <<>> -> - CurrentPasswordHash; - _P when OldPassword =:= [] -> - throw({forbidden, <<"Old password is incorrect.">>}); - _Else -> - OldPasswordHash = hash_password(OldPassword1, UserSalt), - ?LOG_DEBUG("~p == ~p", [CurrentPasswordHash, OldPasswordHash]), - case CurrentPasswordHash of - ExpectedHash when ExpectedHash =:= OldPasswordHash -> - hash_password(Password, UserSalt); - _ -> - throw({forbidden, <<"Old password is incorrect.">>}) - end - end; - _ -> - throw({forbidden, <<"You aren't allowed to change this password.">>}) - end, - {ok, UserDoc} = user_doc(DocId, UserName, UserSalt, PasswordHash, Email, Active, Roles1, OldRev), - {ok, _Rev} = couch_db:update_doc(Db, UserDoc, []), - ?LOG_DEBUG("User ~s (~s)updated.", [?b2l(UserName), ?b2l(DocId)]), - {Code, Headers} = case couch_httpd:qs_value(Req, "next", nil) of - nil -> {200, []}; - Redirect -> - {302, [{"Location", couch_httpd:absolute_uri(Req, Redirect)}]} - end, - send_json(Req, Code, Headers, {[{ok, true}]}) - end. -handle_user_req(#httpd{method='POST'}=Req) -> - DbName = couch_config:get("couch_httpd_auth", "authentication_db"), - ensure_users_db_exists(?l2b(DbName)), - {ok, Db} = couch_db:open(?l2b(DbName), - [{user_ctx, #user_ctx{roles=[<<"_admin">>]}}]), - create_user_req(Req, Db); -handle_user_req(#httpd{method='PUT', path_parts=[_]}=_Req) -> - throw({bad_request, <<"Username is missing">>}); -handle_user_req(#httpd{method='PUT', path_parts=[_, UserName]}=Req) -> - DbName = couch_config:get("couch_httpd_auth", "authentication_db"), - ensure_users_db_exists(?l2b(DbName)), - {ok, Db} = couch_db:open(?l2b(DbName), - [{user_ctx, #user_ctx{roles=[<<"_admin">>]}}]), - update_user_req(Req, Db, UserName); -handle_user_req(Req) -> - couch_httpd:send_method_not_allowed(Req, "POST,PUT"). +maybe_value(Key, undefined) -> []; +maybe_value(Key, Else) -> [{Key, Else}]. to_int(Value) when is_binary(Value) -> to_int(?b2l(Value)); @@ -472,25 +403,3 @@ to_int(Value) when is_list(Value) -> list_to_integer(Value); to_int(Value) when is_integer(Value) -> Value. - -% % Login handler -% handle_login_req(#httpd{method='POST'}=Req) -> -% DbName = couch_config:get("couch_httpd_auth", "authentication_db"), -% case couch_db:open(?l2b(DbName), [{user_ctx, #user_ctx{roles=[<<"_admin">>]}}]) of -% {ok, Db} -> handle_login_req(Req, Db) -% end; -% handle_login_req(Req) -> -% send_method_not_allowed(Req, "POST"). -% -% % Logout handler -% handle_logout_req(#httpd{method='POST'}=Req) -> -% Cookie = mochiweb_cookies:cookie("AuthSession", "", [{path, "/"}, {http_only, true}]), -% {Code, Headers} = case couch_httpd:qs_value(Req, "next", nil) of -% nil -> -% {200, [Cookie]}; -% Redirect -> -% {302, [Cookie, {"Location", couch_httpd:absolute_uri(Req, Redirect)}]} -% end, -% send_json(Req, Code, Headers, {[{ok, true}]}); -% handle_logout_req(Req) -> -% send_method_not_allowed(Req, "POST"). diff --git a/src/couchdb/couch_httpd_db.erl b/src/couchdb/couch_httpd_db.erl index 35f32514..9233e953 100644 --- a/src/couchdb/couch_httpd_db.erl +++ b/src/couchdb/couch_httpd_db.erl @@ -298,13 +298,23 @@ handle_design_info_req(Req, _Db, _DDoc) -> create_db_req(#httpd{user_ctx=UserCtx}=Req, DbName) -> ok = couch_httpd:verify_is_server_admin(Req), - case couch_server:create(DbName, [{user_ctx, UserCtx}]) of - {ok, Db} -> - couch_db:close(Db), - DocUrl = absolute_uri(Req, "/" ++ couch_util:url_encode(DbName)), - send_json(Req, 201, [{"Location", DocUrl}], {[{ok, true}]}); - Error -> - throw(Error) + LDbName = ?b2l(DbName), + case couch_config:get("couch_httpd_auth", "authentication_db") of + LDbName -> + % make sure user's db always has the auth ddoc + {ok, Db} = couch_httpd_auth:ensure_users_db_exists(DbName), + couch_db:close(Db), + DbUrl = absolute_uri(Req, "/" ++ couch_util:url_encode(DbName)), + send_json(Req, 201, [{"Location", DbUrl}], {[{ok, true}]}); + _Else -> + case couch_server:create(DbName, [{user_ctx, UserCtx}]) of + {ok, Db} -> + couch_db:close(Db), + DbUrl = absolute_uri(Req, "/" ++ couch_util:url_encode(DbName)), + send_json(Req, 201, [{"Location", DbUrl}], {[{ok, true}]}); + Error -> + throw(Error) + end end. delete_db_req(#httpd{user_ctx=UserCtx}=Req, DbName) -> @@ -317,6 +327,15 @@ delete_db_req(#httpd{user_ctx=UserCtx}=Req, DbName) -> end. do_db_req(#httpd{user_ctx=UserCtx,path_parts=[DbName|_]}=Req, Fun) -> + LDbName = ?b2l(DbName), + % I hope this lookup is cheap. + case couch_config:get("couch_httpd_auth", "authentication_db") of + LDbName -> + % make sure user's db always has the auth ddoc + {ok, ADb} = couch_httpd_auth:ensure_users_db_exists(DbName), + couch_db:close(ADb); + _Else -> ok + end, case couch_db:open(DbName, [{user_ctx, UserCtx}]) of {ok, Db} -> try @@ -553,7 +572,7 @@ db_req(#httpd{path_parts=[_,<<"_revs_limit">>]}=Req, _Db) -> % as slashes in document IDs must otherwise be URL encoded. db_req(#httpd{method='GET',mochi_req=MochiReq, path_parts=[DbName,<<"_design/",_/binary>>|_]}=Req, _Db) -> PathFront = "/" ++ couch_httpd:quote(binary_to_list(DbName)) ++ "/", - [PathFront|PathTail] = re:split(MochiReq:get(raw_path), "_design%2F", + [_|PathTail] = re:split(MochiReq:get(raw_path), "_design%2F", [{return, list}]), couch_httpd:send_redirect(Req, PathFront ++ "_design/" ++ mochiweb_util:join(PathTail, "_design%2F")); diff --git a/src/couchdb/couch_httpd_oauth.erl b/src/couchdb/couch_httpd_oauth.erl index e46ea5bc..ddf84008 100644 --- a/src/couchdb/couch_httpd_oauth.erl +++ b/src/couchdb/couch_httpd_oauth.erl @@ -36,8 +36,7 @@ oauth_authentication_handler(#httpd{mochi_req=MochiReq}=Req) -> % Look up the consumer key and get the roles to give the consumer set_user_ctx(Req, AccessToken) -> - DbName = couch_config:get("couch_httpd_auth", "authentication_db"), - {ok, _Db} = couch_httpd_auth:ensure_users_db_exists(?l2b(DbName)), + % TODO move to db storage Name = case couch_config:get("oauth_token_users", AccessToken) of undefined -> throw({bad_request, unknown_oauth_token}); Value -> ?l2b(Value) |