Платформа ЦРНП "Мирокод" для разработки проектов
https://git.mirocod.ru
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
212 lines
6.5 KiB
212 lines
6.5 KiB
import {encode, decode} from 'uint8-to-base64'; |
|
|
|
const {appSubUrl, csrfToken} = window.config; |
|
|
|
|
|
export function initUserAuthWebAuthn() { |
|
if ($('.user.signin.webauthn-prompt').length === 0) { |
|
return; |
|
} |
|
|
|
if (!detectWebAuthnSupport()) { |
|
return; |
|
} |
|
|
|
$.getJSON(`${appSubUrl}/user/webauthn/assertion`, {}) |
|
.done((makeAssertionOptions) => { |
|
makeAssertionOptions.publicKey.challenge = decode(makeAssertionOptions.publicKey.challenge); |
|
for (let i = 0; i < makeAssertionOptions.publicKey.allowCredentials.length; i++) { |
|
makeAssertionOptions.publicKey.allowCredentials[i].id = decode(makeAssertionOptions.publicKey.allowCredentials[i].id); |
|
} |
|
navigator.credentials.get({ |
|
publicKey: makeAssertionOptions.publicKey |
|
}) |
|
.then((credential) => { |
|
verifyAssertion(credential); |
|
}).catch((err) => { |
|
// Try again... without the appid |
|
if (makeAssertionOptions.publicKey.extensions && makeAssertionOptions.publicKey.extensions.appid) { |
|
delete makeAssertionOptions.publicKey.extensions['appid']; |
|
navigator.credentials.get({ |
|
publicKey: makeAssertionOptions.publicKey |
|
}) |
|
.then((credential) => { |
|
verifyAssertion(credential); |
|
}).catch((err) => { |
|
webAuthnError('general', err.message); |
|
}); |
|
return; |
|
} |
|
webAuthnError('general', err.message); |
|
}); |
|
}).fail(() => { |
|
webAuthnError('unknown'); |
|
}); |
|
} |
|
|
|
function verifyAssertion(assertedCredential) { |
|
// Move data into Arrays incase it is super long |
|
const authData = new Uint8Array(assertedCredential.response.authenticatorData); |
|
const clientDataJSON = new Uint8Array(assertedCredential.response.clientDataJSON); |
|
const rawId = new Uint8Array(assertedCredential.rawId); |
|
const sig = new Uint8Array(assertedCredential.response.signature); |
|
const userHandle = new Uint8Array(assertedCredential.response.userHandle); |
|
$.ajax({ |
|
url: `${appSubUrl}/user/webauthn/assertion`, |
|
type: 'POST', |
|
data: JSON.stringify({ |
|
id: assertedCredential.id, |
|
rawId: bufferEncode(rawId), |
|
type: assertedCredential.type, |
|
clientExtensionResults: assertedCredential.getClientExtensionResults(), |
|
response: { |
|
authenticatorData: bufferEncode(authData), |
|
clientDataJSON: bufferEncode(clientDataJSON), |
|
signature: bufferEncode(sig), |
|
userHandle: bufferEncode(userHandle), |
|
}, |
|
}), |
|
contentType: 'application/json; charset=utf-8', |
|
dataType: 'json', |
|
success: (resp) => { |
|
if (resp && resp['redirect']) { |
|
window.location.href = resp['redirect']; |
|
} else { |
|
window.location.href = '/'; |
|
} |
|
}, |
|
error: (xhr) => { |
|
if (xhr.status === 500) { |
|
webAuthnError('unknown'); |
|
return; |
|
} |
|
webAuthnError('unable-to-process'); |
|
} |
|
}); |
|
} |
|
|
|
// Encode an ArrayBuffer into a base64 string. |
|
function bufferEncode(value) { |
|
return encode(value) |
|
.replace(/\+/g, '-') |
|
.replace(/\//g, '_') |
|
.replace(/=/g, ''); |
|
} |
|
|
|
function webauthnRegistered(newCredential) { |
|
const attestationObject = new Uint8Array(newCredential.response.attestationObject); |
|
const clientDataJSON = new Uint8Array(newCredential.response.clientDataJSON); |
|
const rawId = new Uint8Array(newCredential.rawId); |
|
|
|
return $.ajax({ |
|
url: `${appSubUrl}/user/settings/security/webauthn/register`, |
|
type: 'POST', |
|
headers: {'X-Csrf-Token': csrfToken}, |
|
data: JSON.stringify({ |
|
id: newCredential.id, |
|
rawId: bufferEncode(rawId), |
|
type: newCredential.type, |
|
response: { |
|
attestationObject: bufferEncode(attestationObject), |
|
clientDataJSON: bufferEncode(clientDataJSON), |
|
}, |
|
}), |
|
dataType: 'json', |
|
contentType: 'application/json; charset=utf-8', |
|
}).then(() => { |
|
window.location.reload(); |
|
}).fail((xhr) => { |
|
if (xhr.status === 409) { |
|
webAuthnError('duplicated'); |
|
return; |
|
} |
|
webAuthnError('unknown'); |
|
}); |
|
} |
|
|
|
function webAuthnError(errorType, message) { |
|
$('#webauthn-error [data-webauthn-error-msg]').hide(); |
|
const $errorGeneral = $(`#webauthn-error [data-webauthn-error-msg=general]`); |
|
if (errorType === 'general') { |
|
$errorGeneral.show().text(message || 'unknown error'); |
|
} else { |
|
const $errorTyped = $(`#webauthn-error [data-webauthn-error-msg=${errorType}]`); |
|
if ($errorTyped.length) { |
|
$errorTyped.show(); |
|
} else { |
|
$errorGeneral.show().text(`unknown error type: ${errorType}`); |
|
} |
|
} |
|
$('#webauthn-error').modal('show'); |
|
} |
|
|
|
function detectWebAuthnSupport() { |
|
if (!window.isSecureContext) { |
|
$('#register-button').prop('disabled', true); |
|
$('#login-button').prop('disabled', true); |
|
webAuthnError('insecure'); |
|
return false; |
|
} |
|
|
|
if (typeof window.PublicKeyCredential !== 'function') { |
|
$('#register-button').prop('disabled', true); |
|
$('#login-button').prop('disabled', true); |
|
webAuthnError('browser'); |
|
return false; |
|
} |
|
|
|
return true; |
|
} |
|
|
|
export function initUserAuthWebAuthnRegister() { |
|
if ($('#register-webauthn').length === 0) { |
|
return; |
|
} |
|
|
|
$('#webauthn-error').modal({allowMultiple: false}); |
|
$('#register-webauthn').on('click', (e) => { |
|
e.preventDefault(); |
|
if (!detectWebAuthnSupport()) { |
|
return; |
|
} |
|
webAuthnRegisterRequest(); |
|
}); |
|
} |
|
|
|
function webAuthnRegisterRequest() { |
|
if ($('#nickname').val() === '') { |
|
webAuthnError('empty'); |
|
return; |
|
} |
|
$.post(`${appSubUrl}/user/settings/security/webauthn/request_register`, { |
|
_csrf: csrfToken, |
|
name: $('#nickname').val(), |
|
}).done((makeCredentialOptions) => { |
|
$('#nickname').closest('div.field').removeClass('error'); |
|
|
|
makeCredentialOptions.publicKey.challenge = decode(makeCredentialOptions.publicKey.challenge); |
|
makeCredentialOptions.publicKey.user.id = decode(makeCredentialOptions.publicKey.user.id); |
|
if (makeCredentialOptions.publicKey.excludeCredentials) { |
|
for (let i = 0; i < makeCredentialOptions.publicKey.excludeCredentials.length; i++) { |
|
makeCredentialOptions.publicKey.excludeCredentials[i].id = decode(makeCredentialOptions.publicKey.excludeCredentials[i].id); |
|
} |
|
} |
|
|
|
navigator.credentials.create({ |
|
publicKey: makeCredentialOptions.publicKey |
|
}).then(webauthnRegistered) |
|
.catch((err) => { |
|
if (!err) { |
|
webAuthnError('unknown'); |
|
return; |
|
} |
|
webAuthnError('general', err.message); |
|
}); |
|
}).fail((xhr) => { |
|
if (xhr.status === 409) { |
|
webAuthnError('duplicated'); |
|
return; |
|
} |
|
webAuthnError('unknown'); |
|
}); |
|
}
|
|
|