mirror of
https://github.com/go-gitea/gitea
synced 2024-11-09 11:44:27 +00:00
2f76608221
WebAuthn may cause a security exception if the provided APP_ID is not allowed for the current origin. Therefore we should reattempt authentication without the appid extension. Also we should allow [u2f] as-well as [U2F] sections. Signed-off-by: Andrew Thornton <art27@cantab.net> Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
213 lines
6.6 KiB
JavaScript
213 lines
6.6 KiB
JavaScript
import $ from 'jquery';
|
|
import {encode, decode} from 'uint8-to-base64';
|
|
|
|
const {appSubUrl, csrfToken} = window.config;
|
|
|
|
export function initUserAuthWebAuthn() {
|
|
if ($('.user.signin.webauthn-prompt').length === 0) {
|
|
return;
|
|
}
|
|
|
|
if (!detectWebAuthnSupport()) {
|
|
return;
|
|
}
|
|
|
|
$.getJSON(`${appSubUrl}/user/webauthn/assertion`, {})
|
|
.done((makeAssertionOptions) => {
|
|
makeAssertionOptions.publicKey.challenge = decode(makeAssertionOptions.publicKey.challenge);
|
|
for (let i = 0; i < makeAssertionOptions.publicKey.allowCredentials.length; i++) {
|
|
makeAssertionOptions.publicKey.allowCredentials[i].id = decode(makeAssertionOptions.publicKey.allowCredentials[i].id);
|
|
}
|
|
navigator.credentials.get({
|
|
publicKey: makeAssertionOptions.publicKey
|
|
})
|
|
.then((credential) => {
|
|
verifyAssertion(credential);
|
|
}).catch((err) => {
|
|
// Try again... without the appid
|
|
if (makeAssertionOptions.publicKey.extensions && makeAssertionOptions.publicKey.extensions.appid) {
|
|
delete makeAssertionOptions.publicKey.extensions['appid'];
|
|
navigator.credentials.get({
|
|
publicKey: makeAssertionOptions.publicKey
|
|
})
|
|
.then((credential) => {
|
|
verifyAssertion(credential);
|
|
}).catch((err) => {
|
|
webAuthnError('general', err.message);
|
|
});
|
|
return;
|
|
}
|
|
webAuthnError('general', err.message);
|
|
});
|
|
}).fail(() => {
|
|
webAuthnError('unknown');
|
|
});
|
|
}
|
|
|
|
function verifyAssertion(assertedCredential) {
|
|
// Move data into Arrays incase it is super long
|
|
const authData = new Uint8Array(assertedCredential.response.authenticatorData);
|
|
const clientDataJSON = new Uint8Array(assertedCredential.response.clientDataJSON);
|
|
const rawId = new Uint8Array(assertedCredential.rawId);
|
|
const sig = new Uint8Array(assertedCredential.response.signature);
|
|
const userHandle = new Uint8Array(assertedCredential.response.userHandle);
|
|
$.ajax({
|
|
url: `${appSubUrl}/user/webauthn/assertion`,
|
|
type: 'POST',
|
|
data: JSON.stringify({
|
|
id: assertedCredential.id,
|
|
rawId: bufferEncode(rawId),
|
|
type: assertedCredential.type,
|
|
clientExtensionResults: assertedCredential.getClientExtensionResults(),
|
|
response: {
|
|
authenticatorData: bufferEncode(authData),
|
|
clientDataJSON: bufferEncode(clientDataJSON),
|
|
signature: bufferEncode(sig),
|
|
userHandle: bufferEncode(userHandle),
|
|
},
|
|
}),
|
|
contentType: 'application/json; charset=utf-8',
|
|
dataType: 'json',
|
|
success: (resp) => {
|
|
if (resp && resp['redirect']) {
|
|
window.location.href = resp['redirect'];
|
|
} else {
|
|
window.location.href = '/';
|
|
}
|
|
},
|
|
error: (xhr) => {
|
|
if (xhr.status === 500) {
|
|
webAuthnError('unknown');
|
|
return;
|
|
}
|
|
webAuthnError('unable-to-process');
|
|
}
|
|
});
|
|
}
|
|
|
|
// Encode an ArrayBuffer into a base64 string.
|
|
function bufferEncode(value) {
|
|
return encode(value)
|
|
.replace(/\+/g, '-')
|
|
.replace(/\//g, '_')
|
|
.replace(/=/g, '');
|
|
}
|
|
|
|
function webauthnRegistered(newCredential) {
|
|
const attestationObject = new Uint8Array(newCredential.response.attestationObject);
|
|
const clientDataJSON = new Uint8Array(newCredential.response.clientDataJSON);
|
|
const rawId = new Uint8Array(newCredential.rawId);
|
|
|
|
return $.ajax({
|
|
url: `${appSubUrl}/user/settings/security/webauthn/register`,
|
|
type: 'POST',
|
|
headers: {'X-Csrf-Token': csrfToken},
|
|
data: JSON.stringify({
|
|
id: newCredential.id,
|
|
rawId: bufferEncode(rawId),
|
|
type: newCredential.type,
|
|
response: {
|
|
attestationObject: bufferEncode(attestationObject),
|
|
clientDataJSON: bufferEncode(clientDataJSON),
|
|
},
|
|
}),
|
|
dataType: 'json',
|
|
contentType: 'application/json; charset=utf-8',
|
|
}).then(() => {
|
|
window.location.reload();
|
|
}).fail((xhr) => {
|
|
if (xhr.status === 409) {
|
|
webAuthnError('duplicated');
|
|
return;
|
|
}
|
|
webAuthnError('unknown');
|
|
});
|
|
}
|
|
|
|
function webAuthnError(errorType, message) {
|
|
$('#webauthn-error [data-webauthn-error-msg]').hide();
|
|
const $errorGeneral = $(`#webauthn-error [data-webauthn-error-msg=general]`);
|
|
if (errorType === 'general') {
|
|
$errorGeneral.show().text(message || 'unknown error');
|
|
} else {
|
|
const $errorTyped = $(`#webauthn-error [data-webauthn-error-msg=${errorType}]`);
|
|
if ($errorTyped.length) {
|
|
$errorTyped.show();
|
|
} else {
|
|
$errorGeneral.show().text(`unknown error type: ${errorType}`);
|
|
}
|
|
}
|
|
$('#webauthn-error').modal('show');
|
|
}
|
|
|
|
function detectWebAuthnSupport() {
|
|
if (!window.isSecureContext) {
|
|
$('#register-button').prop('disabled', true);
|
|
$('#login-button').prop('disabled', true);
|
|
webAuthnError('insecure');
|
|
return false;
|
|
}
|
|
|
|
if (typeof window.PublicKeyCredential !== 'function') {
|
|
$('#register-button').prop('disabled', true);
|
|
$('#login-button').prop('disabled', true);
|
|
webAuthnError('browser');
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
export function initUserAuthWebAuthnRegister() {
|
|
if ($('#register-webauthn').length === 0) {
|
|
return;
|
|
}
|
|
|
|
$('#webauthn-error').modal({allowMultiple: false});
|
|
$('#register-webauthn').on('click', (e) => {
|
|
e.preventDefault();
|
|
if (!detectWebAuthnSupport()) {
|
|
return;
|
|
}
|
|
webAuthnRegisterRequest();
|
|
});
|
|
}
|
|
|
|
function webAuthnRegisterRequest() {
|
|
if ($('#nickname').val() === '') {
|
|
webAuthnError('empty');
|
|
return;
|
|
}
|
|
$.post(`${appSubUrl}/user/settings/security/webauthn/request_register`, {
|
|
_csrf: csrfToken,
|
|
name: $('#nickname').val(),
|
|
}).done((makeCredentialOptions) => {
|
|
$('#nickname').closest('div.field').removeClass('error');
|
|
|
|
makeCredentialOptions.publicKey.challenge = decode(makeCredentialOptions.publicKey.challenge);
|
|
makeCredentialOptions.publicKey.user.id = decode(makeCredentialOptions.publicKey.user.id);
|
|
if (makeCredentialOptions.publicKey.excludeCredentials) {
|
|
for (let i = 0; i < makeCredentialOptions.publicKey.excludeCredentials.length; i++) {
|
|
makeCredentialOptions.publicKey.excludeCredentials[i].id = decode(makeCredentialOptions.publicKey.excludeCredentials[i].id);
|
|
}
|
|
}
|
|
|
|
navigator.credentials.create({
|
|
publicKey: makeCredentialOptions.publicKey
|
|
}).then(webauthnRegistered)
|
|
.catch((err) => {
|
|
if (!err) {
|
|
webAuthnError('unknown');
|
|
return;
|
|
}
|
|
webAuthnError('general', err.message);
|
|
});
|
|
}).fail((xhr) => {
|
|
if (xhr.status === 409) {
|
|
webAuthnError('duplicated');
|
|
return;
|
|
}
|
|
webAuthnError('unknown');
|
|
});
|
|
}
|