Page Menu
Home
Phabricator
Search
Configure Global Search
Log In
Files
F3367504
D8501.diff
No One
Temporary
Actions
View File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Award Token
Flag For Later
Size
6 KB
Referenced Files
None
Subscribers
None
D8501.diff
View Options
diff --git a/services/identity/src/client_service.rs b/services/identity/src/client_service.rs
--- a/services/identity/src/client_service.rs
+++ b/services/identity/src/client_service.rs
@@ -10,7 +10,7 @@
client_service::client_proto::{
AddReservedUsernamesRequest, DeleteUserRequest, Empty,
GenerateNonceResponse, InboundKeysForUserRequest,
- InboundKeysForUserResponse, OpaqueLoginFinishRequest,
+ InboundKeysForUserResponse, LogoutRequest, OpaqueLoginFinishRequest,
OpaqueLoginFinishResponse, OpaqueLoginStartRequest,
OpaqueLoginStartResponse, OutboundKeysForUserRequest,
OutboundKeysForUserResponse, RefreshUserPreKeysRequest,
@@ -39,7 +39,6 @@
IdentityClientService, IdentityClientServiceServer,
};
use comm_opaque2::grpc::protocol_error_to_grpc_status;
-use constant_time_eq::constant_time_eq;
use moka::future::Cache;
use rand::rngs::OsRng;
use tonic::Response;
@@ -346,48 +345,43 @@
{
let message = request.into_inner();
- let access_token = self
+ let token_is_valid = self
.client
- .get_access_token_data(message.user_id.clone(), message.device_id_key)
+ .verify_access_token(
+ message.user_id.clone(),
+ message.device_id_key,
+ message.access_token,
+ )
.await
.map_err(handle_db_error)?;
- if let Some(token) = access_token {
- if !token.is_valid()
- || !constant_time_eq(
- token.access_token.as_bytes(),
- message.access_token.as_bytes(),
- )
- {
- return Err(tonic::Status::permission_denied("bad token"));
- }
+ if !token_is_valid {
+ return Err(tonic::Status::permission_denied("bad token"));
+ }
- let server_registration = comm_opaque2::server::Registration::new();
- let server_message = server_registration
- .start(
- &CONFIG.server_setup,
- &message.opaque_registration_request,
- message.user_id.as_bytes(),
- )
- .map_err(protocol_error_to_grpc_status)?;
+ let server_registration = comm_opaque2::server::Registration::new();
+ let server_message = server_registration
+ .start(
+ &CONFIG.server_setup,
+ &message.opaque_registration_request,
+ message.user_id.as_bytes(),
+ )
+ .map_err(protocol_error_to_grpc_status)?;
- let update_state = UpdateState {
- user_id: message.user_id,
- };
- let session_id = generate_uuid();
- self
- .cache
- .insert(session_id.clone(), WorkflowInProgress::Update(update_state))
- .await;
+ let update_state = UpdateState {
+ user_id: message.user_id,
+ };
+ let session_id = generate_uuid();
+ self
+ .cache
+ .insert(session_id.clone(), WorkflowInProgress::Update(update_state))
+ .await;
- let response = UpdateUserPasswordStartResponse {
- session_id,
- opaque_registration_response: server_message,
- };
- Ok(Response::new(response))
- } else {
- Err(tonic::Status::permission_denied("bad token"))
- }
+ let response = UpdateUserPasswordStartResponse {
+ session_id,
+ opaque_registration_response: server_message,
+ };
+ Ok(Response::new(response))
}
async fn update_user_password_finish(
@@ -696,40 +690,75 @@
Ok(Response::new(response))
}
+ async fn log_out_user(
+ &self,
+ request: tonic::Request<LogoutRequest>,
+ ) -> Result<tonic::Response<Empty>, tonic::Status> {
+ let message = request.into_inner();
+
+ let token_is_valid = self
+ .client
+ .verify_access_token(
+ message.user_id.clone(),
+ message.device_id_key.clone(),
+ message.access_token,
+ )
+ .await
+ .map_err(handle_db_error)?;
+
+ if !token_is_valid {
+ return Err(tonic::Status::permission_denied("bad token"));
+ }
+
+ self
+ .client
+ .remove_device_from_users_table(
+ message.user_id.clone(),
+ message.device_id_key.clone(),
+ )
+ .await
+ .map_err(handle_db_error)?;
+
+ self
+ .client
+ .delete_access_token_data(message.user_id, message.device_id_key)
+ .await
+ .map_err(handle_db_error)?;
+
+ let response = Empty {};
+
+ Ok(Response::new(response))
+ }
+
async fn delete_user(
&self,
request: tonic::Request<DeleteUserRequest>,
) -> Result<tonic::Response<Empty>, tonic::Status> {
let message = request.into_inner();
- let access_token = self
+ let token_is_valid = self
.client
- .get_access_token_data(message.user_id.clone(), message.device_id_key)
+ .verify_access_token(
+ message.user_id.clone(),
+ message.device_id_key,
+ message.access_token,
+ )
.await
.map_err(handle_db_error)?;
- if let Some(token) = access_token {
- if !token.is_valid()
- || !constant_time_eq(
- token.access_token.as_bytes(),
- message.access_token.as_bytes(),
- )
- {
- return Err(tonic::Status::permission_denied("bad token"));
- }
+ if !token_is_valid {
+ return Err(tonic::Status::permission_denied("bad token"));
+ }
- self
- .client
- .delete_user(message.user_id)
- .await
- .map_err(handle_db_error)?;
+ self
+ .client
+ .delete_user(message.user_id)
+ .await
+ .map_err(handle_db_error)?;
- let response = Empty {};
+ let response = Empty {};
- Ok(Response::new(response))
- } else {
- Err(tonic::Status::permission_denied("bad token"))
- }
+ Ok(Response::new(response))
}
async fn generate_nonce(
diff --git a/shared/protos/identity_client.proto b/shared/protos/identity_client.proto
--- a/shared/protos/identity_client.proto
+++ b/shared/protos/identity_client.proto
@@ -28,6 +28,8 @@
rpc LoginPasswordUserFinish(OpaqueLoginFinishRequest) returns
(OpaqueLoginFinishResponse) {}
rpc LoginWalletUser(WalletLoginRequest) returns (WalletLoginResponse) {}
+ // Called by user to log out (clears device's keys and access token)
+ rpc LogOutUser(LogoutRequest) returns (Empty) {}
// Called by a user to delete their own account
rpc DeleteUser(DeleteUserRequest) returns (Empty) {}
@@ -242,6 +244,16 @@
string accessToken = 2;
}
+// LogOutUser
+
+message LogoutRequest {
+ string accessToken = 1;
+ string userID = 2;
+ // Public ed25519 key used for signing. We need this to look up a device's
+ // access token
+ string deviceIDKey = 3;
+}
+
// DeleteUser
message DeleteUserRequest {
File Metadata
Details
Attached
Mime Type
text/plain
Expires
Tue, Nov 26, 2:57 PM (11 h, 19 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
2581007
Default Alt Text
D8501.diff (6 KB)
Attached To
Mode
D8501: [identity] log out user RPC
Attached
Detach File
Event Timeline
Log In to Comment