snap-0.6.0.2: Snap: A Haskell Web Framework: project starter executable and glue code library

Snap.Snaplet.Auth

Contents

Description

This module contains all the central authentication functionality.

It exports a number of high-level functions to be used directly in your application handlers.

We also export a number of mid-level functions that should be helpful when you are integrating with another way of confirming the authentication of login requests.

Synopsis

Higher Level Handler Functions

createUser :: Text -> ByteString -> Handler b (AuthManager b) AuthUserSource

Create a new user from just a username and password

May throw a DuplicateLogin if given username is not unique

usernameExistsSource

Arguments

:: Text

The username to be checked

-> Handler b (AuthManager b) Bool 

Check whether a user with the given username exists.

saveUser :: AuthUser -> Handler b (AuthManager b) AuthUserSource

Create or update a given user

May throw a BackendError if something goes wrong.

destroyUser :: AuthUser -> Handler b (AuthManager b) ()Source

Destroy the given user

May throw a BackendError if something goes wrong.

loginByUsernameSource

Arguments

:: ByteString

Username/login for user

-> Password

Should be ClearText

-> Bool

Set remember token?

-> Handler b (AuthManager b) (Either AuthFailure AuthUser) 

Lookup a user by her username, check given password and perform login

loginByRememberToken :: Handler b (AuthManager b) (Maybe AuthUser)Source

Remember user from the remember token if possible and perform login

forceLoginSource

Arguments

:: AuthUser

An existing user, somehow looked up from db

-> Handler b (AuthManager b) (Either AuthFailure AuthUser) 

Login and persist the given AuthUser in the active session

Meant to be used if you have other means of being sure that the person is who she says she is.

logout :: Handler b (AuthManager b) ()Source

Logout the active user

currentUser :: Handler b (AuthManager b) (Maybe AuthUser)Source

Return the current user; trying to remember from cookie if possible.

isLoggedIn :: Handler b (AuthManager b) BoolSource

Convenience wrapper around rememberUser that returns a bool result

Lower Level Functions

markAuthSuccess :: AuthUser -> Handler b (AuthManager b) AuthUserSource

Mutate an AuthUser, marking successful authentication

This will save the user to the backend.

markAuthFail :: AuthUser -> Handler b (AuthManager b) AuthUserSource

Mutate an AuthUser, marking failed authentication

This will save the user to the backend.

checkPasswordAndLoginSource

Arguments

:: AuthUser

An existing user, somehow looked up from db

-> Password

A ClearText password

-> Handler b (AuthManager b) (Either AuthFailure AuthUser) 

Authenticate and log the user into the current session if successful.

This is a mid-level function exposed to allow roll-your-own ways of looking up a user from the database.

This function will:

  1. Check the password
  2. Login the user into the current session
  3. Mark success/failure of the authentication trial on the user record

Types

data AuthManager b Source

Abstract data type holding all necessary information for auth operation

Constructors

forall r . IAuthBackend r => AuthManager 

Fields

backend :: r

Storage back-end

session :: Lens b (Snaplet SessionManager)

A lens pointer to a SessionManager

activeUser :: Maybe AuthUser

A per-request logged-in user cache

minPasswdLen :: Int

Password length range

rememberCookieName :: ByteString

Cookie name for the remember token

rememberPeriod :: Maybe Int

Remember period in seconds. Defaults to 2 weeks.

siteKey :: Key

A unique encryption key used to encrypt remember cookie

lockout :: Maybe (Int, NominalDiffTime)

Lockout after x tries, re-allow entry after y seconds

class IAuthBackend r whereSource

All storage backends need to implement this typeclass

Backend operations may throw BackendErrors

Methods

save :: r -> AuthUser -> IO AuthUserSource

Needs to create or update the given AuthUser record

lookupByUserId :: r -> UserId -> IO (Maybe AuthUser)Source

lookupByLogin :: r -> Text -> IO (Maybe AuthUser)Source

lookupByRememberToken :: r -> Text -> IO (Maybe AuthUser)Source

destroy :: r -> AuthUser -> IO ()Source

Instances

IAuthBackend JsonFileAuthManager 

data AuthSettings Source

Authetication settings defined at initialization time

Constructors

AuthSettings 

Fields

asMinPasswdLen :: Int

Currently not used/checked

asRememberCookieName :: ByteString

Name of the desired remember cookie

asRememberPeriod :: Maybe Int

How long to remember when the option is used in rest of the API. Nothing means remember until end of session.

asLockout :: Maybe (Int, NominalDiffTime)

Lockout strategy: ([MaxAttempts], [LockoutDuration])

asSiteKey :: FilePath

Location of app's encryption key

defAuthSettings :: AuthSettingsSource

Default settings for Auth.

 asMinPasswdLen = 8
 asRememberCookieName = "_remember"
 asRememberPeriod = Just (2*7*24*60*60) = 2 weeks
 asLockout = Nothing
 asSiteKey = "site_key.txt"

defAuthUser :: AuthUserSource

Default AuthUser that has all empty values.

newtype UserId Source

Internal representation of a User. By convention, we demand that the application is able to directly fetch a User using this identifier.

Think of this type as a secure, authenticated user. You should normally never see this type unless a user has been authenticated.

Constructors

UserId 

Fields

unUid :: Text
 

data Password Source

Password is clear when supplied by the user and encrypted later when returned from the db.

data AuthFailure Source

Authentication failures indicate what went wrong during authentication. They may provide useful information to the developer, although it is generally not advisable to show the user the exact details about why login failed.

Constructors

UserNotFound 
IncorrectPassword 
PasswordMissing 
LockedOut UTCTime

Locked out until given time

AuthError String 

data Role Source

This will be replaced by a role-based permission system.

Constructors

Role ByteString 

Instances

Other Utilities

withBackendSource

Arguments

:: (forall r. IAuthBackend r => r -> Handler b (AuthManager v) a)

The function to run with the handler.

-> Handler b (AuthManager v) a 

Run a function on the backend, and return the result.

This uses an existential type so that the backend type doesn't escape AuthManager. The reason that the type is Handler b (AuthManager v) a and not a is because anything that uses the backend will return an IO something, which you can liftIO, or a Handler b (AuthManager v) a if it uses other handler things.

authenticatePasswordSource

Arguments

:: AuthUser

Looked up from the back-end

-> Password

Check against this password

-> Maybe AuthFailure 

Check password for a given user.

Returns Nothing if check is successful and an IncorrectPassword error otherwise

setPassword :: AuthUser -> ByteString -> IO AuthUserSource

Set a new password for the given user. Given password should be clear-text; it will be encrypted into a Encrypted.

Handlers

registerUser :: ByteString -> ByteString -> Handler b (AuthManager b) AuthUserSource

Register a new user by specifying login and password Param fields

loginUserSource

Arguments

:: ByteString

Username field

-> ByteString

Password field

-> Maybe ByteString

Remember field; Nothing if you want no remember function.

-> (AuthFailure -> Handler b (AuthManager b) ())

Upon failure

-> Handler b (AuthManager b) ()

Upon success

-> Handler b (AuthManager b) () 

A MonadSnap handler that processes a login form.

The request paremeters are passed to performLogin

logoutUserSource

Arguments

:: Handler b (AuthManager b) ()

What to do after logging out

-> Handler b (AuthManager b) () 

Simple handler to log the user out. Deletes user from session.

requireUserSource

Arguments

:: Lens b (Snaplet (AuthManager b)) 
-> Handler b v a

Do this if no authenticated user is present.

-> Handler b v a

Do this if an authenticated user is present.

-> Handler b v a 

Require that an authenticated AuthUser is present in the current session.

This function has no DB cost - only checks to see if a user_id is present in the current session.

Splice helpers

addAuthSplicesSource

Arguments

:: HasHeist b 
=> Lens b (Snaplet (AuthManager b))

A lens reference to AuthManager

-> Initializer b v () 

Add all standard auth splices to a Heist-enabled application.

This adds the following splices: <ifLoggedIn> <ifLoggedOut>

ifLoggedIn :: Lens b (Snaplet (AuthManager b)) -> SnapletSplice b vSource

A splice that can be used to check for existence of a user. If a user is present, this will run the contents of the node.

 <ifLoggedIn> Show this when there is a logged in user </ifLoggedIn>

ifLoggedOut :: Lens b (Snaplet (AuthManager b)) -> SnapletSplice b vSource

A splice that can be used to check for absence of a user. If a user is not present, this will run the contents of the node.

 <ifLoggedOut> Show this when there is a logged in user </ifLoggedOut>