Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: desktop client MFA #502

Merged
merged 11 commits into from
Jan 17, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion proto
Submodule proto updated 1 files
+32 −3 core/proxy.proto
2 changes: 2 additions & 0 deletions src/auth/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,7 @@ pub enum ClaimsType {
Auth,
Gateway,
YubiBridge,
DesktopClient,
}

/// Standard claims: https://www.iana.org/assignments/jwt/jwt.xhtml
Expand Down Expand Up @@ -85,6 +86,7 @@ impl Claims {
ClaimsType::Auth => AUTH_SECRET_ENV,
ClaimsType::Gateway => GATEWAY_SECRET_ENV,
ClaimsType::YubiBridge => YUBIBRIDGE_SECRET_ENV,
ClaimsType::DesktopClient => AUTH_SECRET_ENV,
};
env::var(env_var).unwrap_or_default()
}
Expand Down
3 changes: 1 addition & 2 deletions src/db/models/device.rs
Original file line number Diff line number Diff line change
Expand Up @@ -491,7 +491,6 @@ impl Device {
pub async fn add_to_all_networks(
&self,
transaction: &mut PgConnection,
admin_group_name: &str,
) -> Result<(Vec<DeviceNetworkInfo>, Vec<DeviceConfig>), DeviceError> {
info!("Adding device {} to all existing networks", self.name);
let networks = WireguardNetwork::all(&mut *transaction).await?;
Expand Down Expand Up @@ -528,7 +527,7 @@ impl Device {
}

if let Ok(wireguard_network_device) = network
.add_device_to_network(&mut *transaction, self, admin_group_name, None)
.add_device_to_network(&mut *transaction, self, None)
.await
{
debug!(
Expand Down
10 changes: 8 additions & 2 deletions src/db/models/group.rs
Original file line number Diff line number Diff line change
@@ -1,7 +1,10 @@
use model_derive::Model;
use sqlx::{query, query_as, query_scalar, Error as SqlxError, PgConnection, PgExecutor};

use crate::db::{models::error::ModelError, User, WireguardNetwork};
use crate::{
db::{models::error::ModelError, User, WireguardNetwork},
SERVER_CONFIG,
};

#[derive(Model)]
pub struct Group {
Expand Down Expand Up @@ -97,9 +100,12 @@ impl WireguardNetwork {
pub async fn get_allowed_groups(
&self,
transaction: &mut PgConnection,
admin_group_name: &str,
) -> Result<Option<Vec<String>>, ModelError> {
debug!("Returning a list of allowed groups for network {self}");
let admin_group_name = &SERVER_CONFIG
.get()
.expect("defguard config not found")
.admin_groupname;
// get allowed groups from DB
let mut groups = self.fetch_allowed_groups(&mut *transaction).await?;

Expand Down
33 changes: 8 additions & 25 deletions src/db/models/wireguard.rs
Original file line number Diff line number Diff line change
Expand Up @@ -302,11 +302,10 @@ impl WireguardNetwork {
async fn get_allowed_devices(
&self,
transaction: &mut PgConnection,
admin_group_name: &str,
) -> Result<Vec<Device>, ModelError> {
debug!("Fetching all allowed devices for network {}", self);
let devices = match self
.get_allowed_groups(&mut *transaction, admin_group_name)
.get_allowed_groups(&mut *transaction)
.await? {
// devices need to be filtered by allowed group
Some(allowed_groups) => {
Expand Down Expand Up @@ -338,15 +337,12 @@ impl WireguardNetwork {
pub async fn add_all_allowed_devices(
&self,
transaction: &mut PgConnection,
admin_group_name: &str,
) -> Result<(), ModelError> {
info!(
"Assigning IPs in network {} for all existing devices ",
self
);
let devices = self
.get_allowed_devices(&mut *transaction, admin_group_name)
.await?;
let devices = self.get_allowed_devices(&mut *transaction).await?;
for device in devices {
device
.assign_network_ip(&mut *transaction, self, None)
Expand All @@ -360,13 +356,10 @@ impl WireguardNetwork {
&self,
transaction: &mut PgConnection,
device: &Device,
admin_group_name: &str,
reserved_ips: Option<&[IpAddr]>,
) -> Result<WireguardNetworkDevice, WireguardNetworkError> {
info!("Assigning IP in network {self} for {device}");
let allowed_devices = self
.get_allowed_devices(&mut *transaction, admin_group_name)
.await?;
let allowed_devices = self.get_allowed_devices(&mut *transaction).await?;
let allowed_device_ids: Vec<i64> =
allowed_devices.iter().filter_map(|dev| dev.id).collect();
if allowed_device_ids.contains(&device.get_id()?) {
Expand All @@ -389,14 +382,11 @@ impl WireguardNetwork {
pub async fn sync_allowed_devices(
&self,
transaction: &mut PgConnection,
admin_group_name: &str,
reserved_ips: Option<&[IpAddr]>,
) -> Result<Vec<GatewayEvent>, WireguardNetworkError> {
info!("Synchronizing IPs in network {self} for all allowed devices ");
// list all allowed devices
let allowed_devices = self
.get_allowed_devices(&mut *transaction, admin_group_name)
.await?;
let allowed_devices = self.get_allowed_devices(&mut *transaction).await?;
// convert to a map for easier processing
let mut allowed_devices: HashMap<i64, Device> = allowed_devices
.into_iter()
Expand Down Expand Up @@ -485,12 +475,9 @@ impl WireguardNetwork {
&self,
transaction: &mut PgConnection,
imported_devices: Vec<ImportedDevice>,
admin_group_name: &str,
) -> Result<(Vec<ImportedDevice>, Vec<GatewayEvent>), WireguardNetworkError> {
let network_id = self.get_id()?;
let allowed_devices = self
.get_allowed_devices(&mut *transaction, admin_group_name)
.await?;
let allowed_devices = self.get_allowed_devices(&mut *transaction).await?;
// convert to a map for easier processing
let allowed_devices: HashMap<i64, Device> = allowed_devices
.into_iter()
Expand Down Expand Up @@ -551,14 +538,11 @@ impl WireguardNetwork {
&self,
transaction: &mut PgConnection,
mapped_devices: Vec<MappedDevice>,
admin_group_name: &str,
) -> Result<Vec<GatewayEvent>, WireguardNetworkError> {
info!("Mapping user devices for network {}", self);
let network_id = self.get_id()?;
// get allowed groups for network
let allowed_groups = self
.get_allowed_groups(&mut *transaction, admin_group_name)
.await?;
let allowed_groups = self.get_allowed_groups(&mut *transaction).await?;

let mut events = Vec::new();
// use a helper hashmap to avoid repeated queries
Expand Down Expand Up @@ -629,9 +613,8 @@ impl WireguardNetwork {
}

// assign IPs in other networks
let (mut all_network_info, _configs) = device
.add_to_all_networks(&mut *transaction, admin_group_name)
.await?;
let (mut all_network_info, _configs) =
device.add_to_all_networks(&mut *transaction).await?;

network_info.append(&mut all_network_info);

Expand Down
Loading