package systemauth import ( "fmt" "math" "time" "github.com/quexten/goldwarden/agent/config" "github.com/quexten/goldwarden/agent/sockets" "github.com/quexten/goldwarden/agent/systemauth/biometrics" "github.com/quexten/goldwarden/agent/systemauth/pinentry" "github.com/quexten/goldwarden/logging" ) var log = logging.GetLogger("Goldwarden", "Systemauth") const tokenExpiry = 10 * time.Minute type SessionType string const ( AccessVault SessionType = "com.quexten.goldwarden.accessvault" SSHKey SessionType = "com.quexten.goldwarden.usesshkey" Pin SessionType = "com.quexten.goldwarden.pin" // this counts as all other permissions ) var sessionStore = SessionStore{ Store: []Session{}, } type Session struct { Pid int ParentPid int GrandParentPid int Expires time.Time sessionType SessionType } type SessionStore struct { Store []Session } func (s *SessionStore) CreateSession(pid int, parentpid int, grandparentpid int, sessionType SessionType) Session { var session = Session{ Pid: pid, ParentPid: parentpid, GrandParentPid: grandparentpid, Expires: time.Now().Add(tokenExpiry), sessionType: sessionType, } s.Store = append(s.Store, session) return session } func (s *SessionStore) verifySession(ctx sockets.CallingContext, sessionType SessionType) bool { for _, session := range s.Store { if session.ParentPid == ctx.ParentProcessPid && session.GrandParentPid == ctx.GrandParentProcessPid && (session.sessionType == sessionType || session.sessionType == Pin) { if session.Expires.After(time.Now()) { return true } } } return false } // with session func GetPermission(sessionType SessionType, ctx sockets.CallingContext, config *config.Config) (bool, error) { log.Info("Checking permission for " + ctx.ProcessName + " with session type " + string(sessionType)) var actionDescription = "" biometricsApprovalType := biometrics.AccessVault switch sessionType { case AccessVault: actionDescription = "access the vault" biometricsApprovalType = biometrics.AccessVault case SSHKey: actionDescription = "use an SSH key for signing" biometricsApprovalType = biometrics.SSHKey } var message = fmt.Sprintf("Do you want to authorize %s>%s>%s to %s? (This choice will be remembered for %d minutes)", ctx.GrandParentProcessName, ctx.ParentProcessName, ctx.ProcessName, actionDescription, int(math.Floor(tokenExpiry.Minutes()))) if sessionStore.verifySession(ctx, sessionType) { log.Info("Permission granted from cached session") } else { if biometrics.BiometricsWorking() { biometricsApproval := biometrics.CheckBiometrics(biometricsApprovalType) if !biometricsApproval { return false, nil } } else { log.Warn("Biometrics is not available, asking for pin") pin, err := pinentry.GetPassword("Enter PIN", "Biometrics is not available. Enter your pin to authorize this action. "+message) if err != nil { return false, err } if !config.VerifyPin(pin) { return false, nil } } // approval, err := pinentry.GetApproval("Goldwarden authorization", message) // if err != nil || !approval { // return false, err // } log.Info("Permission granted, creating session") sessionStore.CreateSession(ctx.ProcessPid, ctx.ParentProcessPid, ctx.GrandParentProcessPid, sessionType) } return true, nil } // no session func CheckBiometrics(callingContext *sockets.CallingContext, approvalType biometrics.Approval) bool { var message = fmt.Sprintf("Do you want to grant %s>%s>%s one-time access your vault?", callingContext.GrandParentProcessName, callingContext.ParentProcessName, callingContext.ProcessName) var bioApproval = biometrics.CheckBiometrics(approvalType) if !bioApproval { return false } approval, err := pinentry.GetApproval("Goldwarden authorization", message) if err != nil { log.Error(err.Error()) } return approval } func CreatePinSession(ctx sockets.CallingContext) { sessionStore.CreateSession(ctx.ProcessPid, ctx.ParentProcessPid, ctx.GrandParentProcessPid, Pin) } func VerifyPinSession(ctx sockets.CallingContext) bool { return sessionStore.verifySession(ctx, Pin) }