* Implement Webauthn 🎉 * Share hexifyAB * Move hr inside template and add AttestationChallenges janitor daemon * Apply suggestions from code review Co-Authored-By: Acid Chicken (硫酸鶏) <root@acid-chicken.com> * Add newline at the end of file * Fix stray newline in promise chain * Ignore var in try{}catch(){} block Co-Authored-By: Acid Chicken (硫酸鶏) <root@acid-chicken.com> * Add missing comma * Add missing semicolon * Support more attestation formats * add support for more key types and linter pass * Refactor * Refactor * credentialId --> id * Fix * Improve readability * Add indexes * fixes for credentialId->id * Avoid changing store state * Fix syntax error and code style * Remove unused import * Refactor of getkey API * Create 1561706992953-webauthn.ts * Update ja-JP.yml * Add type annotations * Fix code style * Specify depedency version * Fix code style * Fix janitor daemon and login requesting 2FA regardless of status
68 lines
1.5 KiB
TypeScript
68 lines
1.5 KiB
TypeScript
import $ from 'cafy';
|
|
import * as bcrypt from 'bcryptjs';
|
|
import * as crypto from 'crypto';
|
|
import define from '../../../define';
|
|
import { UserProfiles, UserSecurityKeys, AttestationChallenges } from '../../../../../models';
|
|
import { ensure } from '../../../../../prelude/ensure';
|
|
import { promisify } from 'util';
|
|
import { hash } from '../../../2fa';
|
|
import { genId } from '../../../../../misc/gen-id';
|
|
|
|
export const meta = {
|
|
requireCredential: true,
|
|
|
|
secure: true,
|
|
|
|
params: {
|
|
password: {
|
|
validator: $.str
|
|
}
|
|
}
|
|
};
|
|
|
|
const randomBytes = promisify(crypto.randomBytes);
|
|
|
|
export default define(meta, async (ps, user) => {
|
|
const profile = await UserProfiles.findOne(user.id).then(ensure);
|
|
|
|
// Compare password
|
|
const same = await bcrypt.compare(ps.password, profile.password!);
|
|
|
|
if (!same) {
|
|
throw new Error('incorrect password');
|
|
}
|
|
|
|
const keys = await UserSecurityKeys.find({
|
|
userId: user.id
|
|
});
|
|
|
|
if (keys.length === 0) {
|
|
throw new Error('no keys found');
|
|
}
|
|
|
|
// 32 byte challenge
|
|
const entropy = await randomBytes(32);
|
|
const challenge = entropy.toString('base64')
|
|
.replace(/=/g, '')
|
|
.replace(/\+/g, '-')
|
|
.replace(/\//g, '_');
|
|
|
|
const challengeId = genId();
|
|
|
|
await AttestationChallenges.save({
|
|
userId: user.id,
|
|
id: challengeId,
|
|
challenge: hash(Buffer.from(challenge, 'utf-8')).toString('hex'),
|
|
createdAt: new Date(),
|
|
registrationChallenge: false
|
|
});
|
|
|
|
return {
|
|
challenge,
|
|
challengeId,
|
|
securityKeys: keys.map(key => ({
|
|
id: key.id
|
|
}))
|
|
};
|
|
});
|