| // Copyright 2015 The Weave Authors. All rights reserved. | 
 | // Use of this source code is governed by a BSD-style license that can be | 
 | // found in the LICENSE file. | 
 |  | 
 | #include "src/privet/auth_manager.h" | 
 |  | 
 | #include <base/rand_util.h> | 
 | #include <base/strings/string_number_conversions.h> | 
 |  | 
 | #include "src/config.h" | 
 | #include "src/data_encoding.h" | 
 | #include "src/privet/constants.h" | 
 | #include "src/privet/openssl_utils.h" | 
 | #include "src/string_utils.h" | 
 |  | 
 | extern "C" { | 
 | #include "third_party/libuweave/src/macaroon.h" | 
 | } | 
 |  | 
 | namespace weave { | 
 | namespace privet { | 
 |  | 
 | namespace { | 
 |  | 
 | const char kTokenDelimeter[] = ":"; | 
 | const size_t kCaveatBuffetSize = 32; | 
 | const size_t kMaxMacaroonSize = 1024; | 
 | const size_t kMaxPendingClaims = 10; | 
 |  | 
 | // Returns "scope:id:time". | 
 | std::string CreateTokenData(const UserInfo& user_info, const base::Time& time) { | 
 |   return base::IntToString(static_cast<int>(user_info.scope())) + | 
 |          kTokenDelimeter + base::Uint64ToString(user_info.user_id()) + | 
 |          kTokenDelimeter + base::Int64ToString(time.ToTimeT()); | 
 | } | 
 |  | 
 | // Splits string of "scope:id:time" format. | 
 | UserInfo SplitTokenData(const std::string& token, base::Time* time) { | 
 |   const UserInfo kNone; | 
 |   auto parts = Split(token, kTokenDelimeter, false, false); | 
 |   if (parts.size() != 3) | 
 |     return kNone; | 
 |   int scope = 0; | 
 |   if (!base::StringToInt(parts[0], &scope) || | 
 |       scope < static_cast<int>(AuthScope::kNone) || | 
 |       scope > static_cast<int>(AuthScope::kOwner)) { | 
 |     return kNone; | 
 |   } | 
 |  | 
 |   uint64_t id{0}; | 
 |   if (!base::StringToUint64(parts[1], &id)) | 
 |     return kNone; | 
 |  | 
 |   int64_t timestamp{0}; | 
 |   if (!base::StringToInt64(parts[2], ×tamp)) | 
 |     return kNone; | 
 |   if (time) | 
 |     *time = base::Time::FromTimeT(timestamp); | 
 |   return UserInfo{static_cast<AuthScope>(scope), id}; | 
 | } | 
 |  | 
 | class Caveat { | 
 |  public: | 
 |   Caveat(UwMacaroonCaveatType type, uint32_t value) { | 
 |     CHECK(uw_macaroon_caveat_create_with_uint_(type, value, buffer, | 
 |                                                sizeof(buffer), &caveat)); | 
 |   } | 
 |  | 
 |   const UwMacaroonCaveat& GetCaveat() const { return caveat; } | 
 |  | 
 |  private: | 
 |   UwMacaroonCaveat caveat; | 
 |   uint8_t buffer[kCaveatBuffetSize]; | 
 |  | 
 |   DISALLOW_COPY_AND_ASSIGN(Caveat); | 
 | }; | 
 |  | 
 | std::vector<uint8_t> CreateSecret() { | 
 |   std::vector<uint8_t> secret(kSha256OutputSize); | 
 |   base::RandBytes(secret.data(), secret.size()); | 
 |   return secret; | 
 | } | 
 |  | 
 | bool IsClaimAllowed(RootClientTokenOwner curret, RootClientTokenOwner claimer) { | 
 |   return claimer > curret || claimer == RootClientTokenOwner::kCloud; | 
 | } | 
 |  | 
 | }  // namespace | 
 |  | 
 | AuthManager::AuthManager(Config* config, | 
 |                          const std::vector<uint8_t>& certificate_fingerprint) | 
 |     : config_{config}, certificate_fingerprint_{certificate_fingerprint} { | 
 |   if (config_) { | 
 |     SetSecret(config_->GetSettings().secret, | 
 |               config_->GetSettings().root_client_token_owner); | 
 |   } else { | 
 |     SetSecret({}, RootClientTokenOwner::kNone); | 
 |   } | 
 | } | 
 |  | 
 | AuthManager::AuthManager(const std::vector<uint8_t>& secret, | 
 |                          const std::vector<uint8_t>& certificate_fingerprint, | 
 |                          base::Clock* clock) | 
 |     : AuthManager(nullptr, certificate_fingerprint) { | 
 |   SetSecret(secret, RootClientTokenOwner::kNone); | 
 |   if (clock) | 
 |     clock_ = clock; | 
 | } | 
 |  | 
 | void AuthManager::SetSecret(const std::vector<uint8_t>& secret, | 
 |                             RootClientTokenOwner owner) { | 
 |   secret_ = secret; | 
 |  | 
 |   if (secret.size() != kSha256OutputSize) { | 
 |     secret_ = CreateSecret(); | 
 |     owner = RootClientTokenOwner::kNone; | 
 |   } | 
 |  | 
 |   if (!config_ || (config_->GetSettings().secret == secret_ && | 
 |                    config_->GetSettings().root_client_token_owner == owner)) { | 
 |     return; | 
 |   } | 
 |  | 
 |   Config::Transaction change{config_}; | 
 |   change.set_secret(secret); | 
 |   change.set_root_client_token_owner(owner); | 
 |   change.Commit(); | 
 | } | 
 |  | 
 | AuthManager::~AuthManager() {} | 
 |  | 
 | // Returns "[hmac]scope:id:time". | 
 | std::vector<uint8_t> AuthManager::CreateAccessToken(const UserInfo& user_info) { | 
 |   std::string data_str{CreateTokenData(user_info, Now())}; | 
 |   std::vector<uint8_t> data{data_str.begin(), data_str.end()}; | 
 |   std::vector<uint8_t> hash{HmacSha256(secret_, data)}; | 
 |   hash.insert(hash.end(), data.begin(), data.end()); | 
 |   return hash; | 
 | } | 
 |  | 
 | // Parses "base64([hmac]scope:id:time)". | 
 | UserInfo AuthManager::ParseAccessToken(const std::vector<uint8_t>& token, | 
 |                                        base::Time* time) const { | 
 |   if (token.size() <= kSha256OutputSize) | 
 |     return UserInfo{}; | 
 |   std::vector<uint8_t> hash(token.begin(), token.begin() + kSha256OutputSize); | 
 |   std::vector<uint8_t> data(token.begin() + kSha256OutputSize, token.end()); | 
 |   if (hash != HmacSha256(secret_, data)) | 
 |     return UserInfo{}; | 
 |   return SplitTokenData(std::string(data.begin(), data.end()), time); | 
 | } | 
 |  | 
 | std::vector<uint8_t> AuthManager::ClaimRootClientAuthToken( | 
 |     RootClientTokenOwner owner, | 
 |     ErrorPtr* error) { | 
 |   CHECK(RootClientTokenOwner::kNone != owner); | 
 |   if (config_) { | 
 |     auto current = config_->GetSettings().root_client_token_owner; | 
 |     if (!IsClaimAllowed(current, owner)) { | 
 |       Error::AddToPrintf( | 
 |           error, FROM_HERE, errors::kDomain, errors::kAlreadyClaimed, | 
 |           "Device already claimed by '%s'", EnumToString(current).c_str()); | 
 |       return {}; | 
 |     } | 
 |   }; | 
 |  | 
 |   pending_claims_.push_back(std::make_pair( | 
 |       std::unique_ptr<AuthManager>{new AuthManager{nullptr, {}}}, owner)); | 
 |   if (pending_claims_.size() > kMaxPendingClaims) | 
 |     pending_claims_.pop_front(); | 
 |   return pending_claims_.back().first->GetRootClientAuthToken(); | 
 | } | 
 |  | 
 | bool AuthManager::ConfirmClientAuthToken(const std::vector<uint8_t>& token, | 
 |                                          ErrorPtr* error) { | 
 |   // Cover case when caller sent confirm twice. | 
 |   if (pending_claims_.empty() && IsValidAuthToken(token)) | 
 |     return true; | 
 |  | 
 |   auto claim = | 
 |       std::find_if(pending_claims_.begin(), pending_claims_.end(), | 
 |                    [&token](const decltype(pending_claims_)::value_type& auth) { | 
 |                      return auth.first->IsValidAuthToken(token); | 
 |                    }); | 
 |   if (claim == pending_claims_.end()) { | 
 |     Error::AddTo(error, FROM_HERE, errors::kDomain, errors::kNotFound, | 
 |                  "Unknown claim"); | 
 |     return false; | 
 |   } | 
 |  | 
 |   SetSecret(claim->first->GetSecret(), claim->second); | 
 |   pending_claims_.clear(); | 
 |   return true; | 
 | } | 
 |  | 
 | std::vector<uint8_t> AuthManager::GetRootClientAuthToken() const { | 
 |   Caveat scope{kUwMacaroonCaveatTypeScope, kUwMacaroonCaveatScopeTypeOwner}; | 
 |   Caveat issued{kUwMacaroonCaveatTypeIssued, | 
 |                 static_cast<uint32_t>(Now().ToTimeT())}; | 
 |  | 
 |   UwMacaroonCaveat caveats[] = { | 
 |       scope.GetCaveat(), issued.GetCaveat(), | 
 |   }; | 
 |  | 
 |   CHECK_EQ(kSha256OutputSize, secret_.size()); | 
 |   UwMacaroon macaroon{}; | 
 |   CHECK(uw_macaroon_new_from_root_key_( | 
 |       &macaroon, secret_.data(), secret_.size(), caveats, arraysize(caveats))); | 
 |  | 
 |   std::vector<uint8_t> token(kMaxMacaroonSize); | 
 |   size_t len = 0; | 
 |   CHECK(uw_macaroon_dump_(&macaroon, token.data(), token.size(), &len)); | 
 |   token.resize(len); | 
 |   return token; | 
 | } | 
 |  | 
 | base::Time AuthManager::Now() const { | 
 |   return clock_->Now(); | 
 | } | 
 |  | 
 | bool AuthManager::IsValidAuthToken(const std::vector<uint8_t>& token) const { | 
 |   std::vector<uint8_t> buffer(kMaxMacaroonSize); | 
 |   UwMacaroon macaroon{}; | 
 |   if (!uw_macaroon_load_(token.data(), token.size(), buffer.data(), | 
 |                          buffer.size(), &macaroon)) { | 
 |     return false; | 
 |   } | 
 |  | 
 |   CHECK_EQ(kSha256OutputSize, secret_.size()); | 
 |   return uw_macaroon_verify_(&macaroon, secret_.data(), secret_.size()); | 
 | } | 
 |  | 
 | }  // namespace privet | 
 | }  // namespace weave |