fix: login sessions
This commit is contained in:
parent
dc91d0ab8c
commit
cf46450f5f
11 changed files with 179 additions and 27 deletions
|
@ -35,6 +35,7 @@
|
||||||
"@andyburke/fsdb": "jsr:@andyburke/fsdb@^0.9.0",
|
"@andyburke/fsdb": "jsr:@andyburke/fsdb@^0.9.0",
|
||||||
"@andyburke/lurid": "jsr:@andyburke/lurid@^0.2.0",
|
"@andyburke/lurid": "jsr:@andyburke/lurid@^0.2.0",
|
||||||
"@andyburke/serverus": "jsr:@andyburke/serverus@^0.7.1",
|
"@andyburke/serverus": "jsr:@andyburke/serverus@^0.7.1",
|
||||||
|
"@da/bcrypt": "jsr:@da/bcrypt@^1.0.1",
|
||||||
"@std/assert": "jsr:@std/assert@^1.0.13",
|
"@std/assert": "jsr:@std/assert@^1.0.13",
|
||||||
"@std/encoding": "jsr:@std/encoding@^1.0.10",
|
"@std/encoding": "jsr:@std/encoding@^1.0.10",
|
||||||
"@std/http": "jsr:@std/http@^1.0.19",
|
"@std/http": "jsr:@std/http@^1.0.19",
|
||||||
|
|
5
deno.lock
generated
5
deno.lock
generated
|
@ -7,6 +7,7 @@
|
||||||
"jsr:@andyburke/lurid@0.2": "0.2.0",
|
"jsr:@andyburke/lurid@0.2": "0.2.0",
|
||||||
"jsr:@andyburke/serverus@*": "0.7.1",
|
"jsr:@andyburke/serverus@*": "0.7.1",
|
||||||
"jsr:@andyburke/serverus@~0.7.1": "0.7.1",
|
"jsr:@andyburke/serverus@~0.7.1": "0.7.1",
|
||||||
|
"jsr:@da/bcrypt@^1.0.1": "1.0.1",
|
||||||
"jsr:@std/assert@*": "1.0.13",
|
"jsr:@std/assert@*": "1.0.13",
|
||||||
"jsr:@std/assert@^1.0.13": "1.0.13",
|
"jsr:@std/assert@^1.0.13": "1.0.13",
|
||||||
"jsr:@std/async@^1.0.13": "1.0.13",
|
"jsr:@std/async@^1.0.13": "1.0.13",
|
||||||
|
@ -64,6 +65,9 @@
|
||||||
"jsr:@std/path@^1.0.8"
|
"jsr:@std/path@^1.0.8"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"@da/bcrypt@1.0.1": {
|
||||||
|
"integrity": "d2172d3acbcff52e0465557a1a48b1ff1c92df08c90712dae5372255a8c45eb3"
|
||||||
|
},
|
||||||
"@std/assert@1.0.13": {
|
"@std/assert@1.0.13": {
|
||||||
"integrity": "ae0d31e41919b12c656c742b22522c32fb26ed0cba32975cb0de2a273cb68b29",
|
"integrity": "ae0d31e41919b12c656c742b22522c32fb26ed0cba32975cb0de2a273cb68b29",
|
||||||
"dependencies": [
|
"dependencies": [
|
||||||
|
@ -205,6 +209,7 @@
|
||||||
"jsr:@andyburke/fsdb@0.9",
|
"jsr:@andyburke/fsdb@0.9",
|
||||||
"jsr:@andyburke/lurid@0.2",
|
"jsr:@andyburke/lurid@0.2",
|
||||||
"jsr:@andyburke/serverus@~0.7.1",
|
"jsr:@andyburke/serverus@~0.7.1",
|
||||||
|
"jsr:@da/bcrypt@^1.0.1",
|
||||||
"jsr:@std/assert@^1.0.13",
|
"jsr:@std/assert@^1.0.13",
|
||||||
"jsr:@std/encoding@^1.0.10",
|
"jsr:@std/encoding@^1.0.10",
|
||||||
"jsr:@std/http@^1.0.19",
|
"jsr:@std/http@^1.0.19",
|
||||||
|
|
|
@ -1,15 +1,14 @@
|
||||||
import { PASSWORD_ENTRIES } from '../../../models/password_entry.ts';
|
import { PASSWORD_ENTRIES } from '../../../models/password_entry.ts';
|
||||||
import { USER, USERS } from '../../../models/user.ts';
|
import { USER, USERS } from '../../../models/user.ts';
|
||||||
import { generateSecret } from 'jsr:@stdext/crypto/utils';
|
|
||||||
import { encodeBase32 } from 'jsr:@std/encoding';
|
import { encodeBase32 } from 'jsr:@std/encoding';
|
||||||
import { verify } from 'jsr:@stdext/crypto/hash';
|
|
||||||
import lurid from 'jsr:@andyburke/lurid';
|
import lurid from 'jsr:@andyburke/lurid';
|
||||||
import { SESSION, SESSIONS } from '../../../models/session.ts';
|
import { SESSION, SESSIONS } from '../../../models/session.ts';
|
||||||
import { TOTP_ENTRIES } from '../../../models/totp_entry.ts';
|
import { TOTP_ENTRIES } from '../../../models/totp_entry.ts';
|
||||||
import { verifyTotp } from 'jsr:@stdext/crypto/totp';
|
|
||||||
import { encodeBase64 } from 'jsr:@std/encoding/base64';
|
import { encodeBase64 } from 'jsr:@std/encoding/base64';
|
||||||
import parse_body from '../../../utils/bodyparser.ts';
|
import parse_body from '../../../utils/bodyparser.ts';
|
||||||
import { SESSION_ID_TOKEN, SESSION_SECRET_TOKEN } from '../../../utils/prechecks.ts';
|
import { SESSION_ID_TOKEN, SESSION_SECRET_TOKEN } from '../../../utils/prechecks.ts';
|
||||||
|
import * as bcrypt from 'jsr:@da/bcrypt';
|
||||||
|
import { verifyTotp } from '../../../utils/totp.ts';
|
||||||
|
|
||||||
const DEFAULT_SESSION_TIME: number = 60 * 60 * 1_000; // 1 Hour
|
const DEFAULT_SESSION_TIME: number = 60 * 60 * 1_000; // 1 Hour
|
||||||
|
|
||||||
|
@ -78,7 +77,8 @@ export async function POST(req: Request, meta: Record<string, any>): Promise<Res
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
const verified = verify('bcrypt', `${password_hash}${password_entry.salt}`, password_entry.hash);
|
const verified = await bcrypt.compare(`${password_hash}${password_entry.salt}`, password_entry.hash);
|
||||||
|
|
||||||
if (!verified) {
|
if (!verified) {
|
||||||
return Response.json({
|
return Response.json({
|
||||||
error: {
|
error: {
|
||||||
|
@ -158,15 +158,18 @@ export type SESSION_INFO = {
|
||||||
expires: string | undefined;
|
expires: string | undefined;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
const session_secret_buffer = new Uint8Array(20);
|
||||||
export async function create_new_session(session_settings: SESSION_INFO): Promise<SESSION_RESULT> {
|
export async function create_new_session(session_settings: SESSION_INFO): Promise<SESSION_RESULT> {
|
||||||
const now = new Date().toISOString();
|
const now = new Date().toISOString();
|
||||||
const expires: string = session_settings.expires ??
|
const expires: string = session_settings.expires ??
|
||||||
new Date(new Date(now).valueOf() + DEFAULT_SESSION_TIME).toISOString();
|
new Date(new Date(now).valueOf() + DEFAULT_SESSION_TIME).toISOString();
|
||||||
|
|
||||||
|
crypto.getRandomValues(session_secret_buffer);
|
||||||
|
|
||||||
const session: SESSION = {
|
const session: SESSION = {
|
||||||
id: lurid(),
|
id: lurid(),
|
||||||
user_id: session_settings.user.id,
|
user_id: session_settings.user.id,
|
||||||
secret: encodeBase32(generateSecret()),
|
secret: encodeBase32(session_secret_buffer),
|
||||||
timestamps: {
|
timestamps: {
|
||||||
created: now,
|
created: now,
|
||||||
expires,
|
expires,
|
||||||
|
|
|
@ -1,13 +1,12 @@
|
||||||
import { PASSWORD_ENTRIES, PASSWORD_ENTRY } from '../../../models/password_entry.ts';
|
import { PASSWORD_ENTRIES, PASSWORD_ENTRY } from '../../../models/password_entry.ts';
|
||||||
import { USER, USERS } from '../../../models/user.ts';
|
import { USER, USERS } from '../../../models/user.ts';
|
||||||
import { generateSecret } from 'jsr:@stdext/crypto/utils';
|
|
||||||
import { hash } from 'jsr:@stdext/crypto/hash';
|
|
||||||
import lurid from 'jsr:@andyburke/lurid';
|
import lurid from 'jsr:@andyburke/lurid';
|
||||||
import { encodeBase64 } from 'jsr:@std/encoding';
|
import { encodeBase64 } from 'jsr:@std/encoding';
|
||||||
import parse_body from '../../../utils/bodyparser.ts';
|
import parse_body from '../../../utils/bodyparser.ts';
|
||||||
import { create_new_session, SESSION_RESULT } from '../auth/index.ts';
|
import { create_new_session, SESSION_RESULT } from '../auth/index.ts';
|
||||||
import { get_session, get_user, PRECHECK_TABLE, require_user } from '../../../utils/prechecks.ts';
|
import { get_session, get_user, PRECHECK_TABLE, require_user } from '../../../utils/prechecks.ts';
|
||||||
import * as CANNED_RESPONSES from '../../../utils/canned_responses.ts';
|
import * as CANNED_RESPONSES from '../../../utils/canned_responses.ts';
|
||||||
|
import * as bcrypt from 'jsr:@da/bcrypt';
|
||||||
|
|
||||||
// TODO: figure out a better solution for doling out permissions
|
// TODO: figure out a better solution for doling out permissions
|
||||||
const DEFAULT_USER_PERMISSIONS: string[] = [
|
const DEFAULT_USER_PERMISSIONS: string[] = [
|
||||||
|
@ -107,8 +106,8 @@ export async function POST(req: Request, meta: Record<string, any>): Promise<Res
|
||||||
|
|
||||||
await USERS.create(user);
|
await USERS.create(user);
|
||||||
|
|
||||||
const salt = generateSecret();
|
const salt = await bcrypt.genSalt();
|
||||||
const hashed_password_value = hash('bcrypt', `${password_hash}${salt}`);
|
const hashed_password_value = await bcrypt.hash(password_hash, salt);
|
||||||
|
|
||||||
const password_entry: PASSWORD_ENTRY = {
|
const password_entry: PASSWORD_ENTRY = {
|
||||||
user_id: user.id,
|
user_id: user.id,
|
||||||
|
|
|
@ -27,6 +27,7 @@
|
||||||
/* check if we are logged in */
|
/* check if we are logged in */
|
||||||
(async () => {
|
(async () => {
|
||||||
try {
|
try {
|
||||||
|
console.log( 'hi');
|
||||||
const session_response = await api.fetch("/users/me");
|
const session_response = await api.fetch("/users/me");
|
||||||
|
|
||||||
if (!session_response.ok) {
|
if (!session_response.ok) {
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
document.addEventListener("DOMContentLoaded", () => {
|
document.addEventListener("DOMContentLoaded", () => {
|
||||||
/* make all forms semi-smart */
|
/* make all forms semi-smart */
|
||||||
const forms = document.querySelectorAll("form");
|
const forms = document.querySelectorAll("form[data-smart]");
|
||||||
for (const form of forms) {
|
for (const form of forms) {
|
||||||
const script = form.querySelector("script");
|
const script = form.querySelector("script");
|
||||||
|
|
||||||
|
@ -21,17 +21,27 @@ document.addEventListener("DOMContentLoaded", () => {
|
||||||
}
|
}
|
||||||
|
|
||||||
const url = form.action;
|
const url = form.action;
|
||||||
|
const method = form.dataset.method ?? "POST";
|
||||||
|
|
||||||
|
console.dir({
|
||||||
|
method,
|
||||||
|
form,
|
||||||
|
});
|
||||||
try {
|
try {
|
||||||
// TODO: send session header
|
// TODO: send session header
|
||||||
const response = await fetch(url, {
|
const options = {
|
||||||
method: "POST",
|
method,
|
||||||
headers: {
|
headers: {
|
||||||
Accept: "application/json",
|
Accept: "application/json",
|
||||||
"Content-Type": "application/json",
|
|
||||||
},
|
},
|
||||||
body: JSON.stringify(body),
|
};
|
||||||
});
|
|
||||||
|
if (["POST", "PUT", "PATCH"].includes(method)) {
|
||||||
|
options.headers["Content-Type"] = "application/json";
|
||||||
|
options.body = JSON.stringify(body);
|
||||||
|
}
|
||||||
|
|
||||||
|
const response = await fetch(url, options);
|
||||||
|
|
||||||
if (!response.ok) {
|
if (!response.ok) {
|
||||||
const error_body = await response.json();
|
const error_body = await response.json();
|
||||||
|
|
|
@ -102,6 +102,8 @@
|
||||||
</label>
|
</label>
|
||||||
<div class="tab-content">
|
<div class="tab-content">
|
||||||
<form
|
<form
|
||||||
|
data-smart="true"
|
||||||
|
data-method="POST"
|
||||||
id="login-form"
|
id="login-form"
|
||||||
action="/api/auth"
|
action="/api/auth"
|
||||||
onreply="(user)=>{ document.body.dataset.user = JSON.stringify( user ); }"
|
onreply="(user)=>{ document.body.dataset.user = JSON.stringify( user ); }"
|
||||||
|
@ -142,7 +144,7 @@
|
||||||
<div class="label">Sign Up</div>
|
<div class="label">Sign Up</div>
|
||||||
</label>
|
</label>
|
||||||
<div class="tab-content">
|
<div class="tab-content">
|
||||||
<form id="signup-form" action="/api/users">
|
<form data-smart="true" data-method="POST" id="signup-form" action="/api/users">
|
||||||
<script>
|
<script>
|
||||||
{
|
{
|
||||||
const form = document.currentScript.closest("form");
|
const form = document.currentScript.closest("form");
|
||||||
|
|
|
@ -288,7 +288,7 @@
|
||||||
`/rooms/${room_id}/events?type=chat&limit=100&sort=newest`,
|
`/rooms/${room_id}/events?type=chat&limit=100&sort=newest`,
|
||||||
);
|
);
|
||||||
if (!events_response.ok) {
|
if (!events_response.ok) {
|
||||||
const error = await room_response.json();
|
const error = await events_response.json();
|
||||||
alert(error.message ?? JSON.stringify(error));
|
alert(error.message ?? JSON.stringify(error));
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
@ -327,6 +327,11 @@
|
||||||
window.addEventListener("locationchange", update_chat_rooms);
|
window.addEventListener("locationchange", update_chat_rooms);
|
||||||
|
|
||||||
function check_for_room_in_url() {
|
function check_for_room_in_url() {
|
||||||
|
const user_json = document.body.dataset.user;
|
||||||
|
if (!user_json) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
const hash = window.location.hash;
|
const hash = window.location.hash;
|
||||||
const talk_in_url = hash.indexOf("#/talk") === 0;
|
const talk_in_url = hash.indexOf("#/talk") === 0;
|
||||||
if (!talk_in_url) {
|
if (!talk_in_url) {
|
||||||
|
@ -503,16 +508,6 @@
|
||||||
`<li id="room-selector-${new_room.id}" class="room"><a href="#/room/${new_room.id}">${new_room.name}</a></li>`,
|
`<li id="room-selector-${new_room.id}" class="room"><a href="#/room/${new_room.id}">${new_room.name}</a></li>`,
|
||||||
);
|
);
|
||||||
|
|
||||||
const room_selectors = document.querySelectorAll("li.room");
|
|
||||||
for (const room_selector of room_selectors) {
|
|
||||||
room_selector.classList.remove("active");
|
|
||||||
}
|
|
||||||
|
|
||||||
const new_room_selector = document.getElementById(
|
|
||||||
`room-selector-${new_room.id}`,
|
|
||||||
);
|
|
||||||
new_room_selector.classList.add("active");
|
|
||||||
|
|
||||||
window.location.hash = `/talk/room/${new_room.id}`;
|
window.location.hash = `/talk/room/${new_room.id}`;
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
|
@ -53,5 +53,24 @@
|
||||||
<div class="username-container">
|
<div class="username-container">
|
||||||
<span class="username" data-bind-user_username></span>
|
<span class="username" data-bind-user_username></span>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
|
<form data-smart="true" action="/api/auth" method="DELETE">
|
||||||
|
<script>
|
||||||
|
{
|
||||||
|
const form = document.currentScript.closest("form");
|
||||||
|
form.on_response = (response) => {
|
||||||
|
if (!response.ok) {
|
||||||
|
alert("error logging out!");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
delete document.body.dataset.user;
|
||||||
|
delete document.body.dataset.perms;
|
||||||
|
window.location = "/";
|
||||||
|
};
|
||||||
|
}
|
||||||
|
</script>
|
||||||
|
<button class="primary">Log Out</button>
|
||||||
|
</form>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
|
@ -22,6 +22,9 @@ export async function get_session(request: Request, meta: Record<string, any>):
|
||||||
meta.valid_totp = meta.valid_session && meta.session && meta.request_totp
|
meta.valid_totp = meta.valid_session && meta.session && meta.request_totp
|
||||||
? await verifyTotp(meta.request_totp, meta.session.secret)
|
? await verifyTotp(meta.request_totp, meta.session.secret)
|
||||||
: false;
|
: false;
|
||||||
|
console.dir({
|
||||||
|
meta
|
||||||
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
export async function get_user(request: Request, meta: Record<string, any>): Promise<undefined> {
|
export async function get_user(request: Request, meta: Record<string, any>): Promise<undefined> {
|
||||||
|
|
114
utils/totp.ts
Normal file
114
utils/totp.ts
Normal file
|
@ -0,0 +1,114 @@
|
||||||
|
// https://jsr.io/@stdext/crypto/0.1.0/hotp.ts
|
||||||
|
// https://jsr.io/@stdext/crypto/0.1.0/totp.ts
|
||||||
|
|
||||||
|
import { decodeBase32 } from 'jsr:@std/encoding@^1';
|
||||||
|
|
||||||
|
/** Converts a counter value to a DataView.
|
||||||
|
*
|
||||||
|
* @ignore
|
||||||
|
*/
|
||||||
|
export function counterToBuffer(counter: number): DataView {
|
||||||
|
const buffer = new DataView(new ArrayBuffer(8));
|
||||||
|
buffer.setBigUint64(0, BigInt(counter), false);
|
||||||
|
return buffer;
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Generates a HMAC-SHA1 hash of the specified key and counter.
|
||||||
|
*
|
||||||
|
* @ignore
|
||||||
|
*/
|
||||||
|
export async function generateHmacSha1(
|
||||||
|
key: Uint8Array,
|
||||||
|
data: BufferSource
|
||||||
|
): Promise<Uint8Array> {
|
||||||
|
const importedKey = await crypto.subtle.importKey(
|
||||||
|
'raw',
|
||||||
|
key,
|
||||||
|
{ name: 'HMAC', hash: 'SHA-1' },
|
||||||
|
false,
|
||||||
|
['sign']
|
||||||
|
);
|
||||||
|
|
||||||
|
const signedData = await crypto.subtle.sign(
|
||||||
|
'HMAC',
|
||||||
|
importedKey,
|
||||||
|
data
|
||||||
|
);
|
||||||
|
|
||||||
|
return new Uint8Array(signedData);
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Truncates the HMAC value to a 6-digit HOTP value.
|
||||||
|
*
|
||||||
|
* @ignore
|
||||||
|
*/
|
||||||
|
export function truncate(value: Uint8Array, length: number): string {
|
||||||
|
const offset = value[19] & 0xf;
|
||||||
|
const code = (value[offset] & 0x7f) << 24 |
|
||||||
|
(value[offset + 1] & 0xff) << 16 |
|
||||||
|
(value[offset + 2] & 0xff) << 8 |
|
||||||
|
(value[offset + 3] & 0xff);
|
||||||
|
const digits = code % Math.pow(10, length);
|
||||||
|
return digits.toString().padStart(length, '0');
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Generates a HMAC-based one-time password (HOTP) using the specified key and counter.
|
||||||
|
*
|
||||||
|
* @param key a secret key used to generate the HOTP. Can be a string in base32 encoding or a Uint8Array.
|
||||||
|
* @param counter a counter value used to generate the HOTP.
|
||||||
|
* @returns a 6-digit HOTP value.
|
||||||
|
*/
|
||||||
|
export async function generateHotp(
|
||||||
|
key: string | Uint8Array,
|
||||||
|
counter: number
|
||||||
|
): Promise<string> {
|
||||||
|
const parsedKey = typeof key === 'string' ? decodeBase32(key) : key;
|
||||||
|
const buffer = counterToBuffer(counter);
|
||||||
|
|
||||||
|
const hmac = await generateHmacSha1(parsedKey, buffer);
|
||||||
|
return truncate(hmac, 6);
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Verifies a HMAC-based one-time password (HOTP) using the specified key and counter.
|
||||||
|
*
|
||||||
|
* @param otp the one-time password to verify.
|
||||||
|
* @param key a secret key used to generate the HOTP. Can be a string in base32 encoding or a Uint8Array.
|
||||||
|
* @param counter a counter value used to generate the HOTP.
|
||||||
|
*/
|
||||||
|
export async function verifyHotp(
|
||||||
|
otp: string,
|
||||||
|
key: string | Uint8Array,
|
||||||
|
counter: number
|
||||||
|
): Promise<boolean> {
|
||||||
|
return otp === await generateHotp(key, counter);
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Generate a TOTP value from a key and a time.
|
||||||
|
*
|
||||||
|
* @param key a secret key used to generate the HOTP. Can be a string in base32 encoding or a Uint8Array.
|
||||||
|
* @param t0 the initial time to use for the counter.
|
||||||
|
* @returns the TOTP value.
|
||||||
|
*/
|
||||||
|
export function generateTotp(
|
||||||
|
key: string | Uint8Array,
|
||||||
|
t0: number = 0,
|
||||||
|
t: number = Date.now()
|
||||||
|
): Promise<string> {
|
||||||
|
const counter = Math.floor((t - t0) / 30000);
|
||||||
|
return generateHotp(key, counter);
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Verifies a TOTP value from a key and a time.
|
||||||
|
*
|
||||||
|
* @param otp the one-time password to verify.
|
||||||
|
* @param key a secret key used to generate the HOTP. Can be a string in base32 encoding or a Uint8Array.
|
||||||
|
* @param t0 the initial time to use for the counter.
|
||||||
|
*/
|
||||||
|
export async function verifyTotp(
|
||||||
|
otp: string,
|
||||||
|
key: string | Uint8Array,
|
||||||
|
t0: number = 0,
|
||||||
|
t: number = Date.now()
|
||||||
|
): Promise<boolean> {
|
||||||
|
return otp === await generateTotp(key, t0, t);
|
||||||
|
}
|
Loading…
Add table
Add a link
Reference in a new issue