Register user security keys
This commit is contained in:
parent
1f0e6d05c8
commit
49716a8bf5
243
assets/js/base64_lib.js
Normal file
243
assets/js/base64_lib.js
Normal file
@ -0,0 +1,243 @@
|
|||||||
|
// From : https://gitlab.com/comunic/comunicconsole/-/raw/master/src/utils/Base64Lib.ts
|
||||||
|
|
||||||
|
/*
|
||||||
|
MIT License
|
||||||
|
|
||||||
|
Copyright (c) 2020 Egor Nepomnyaschih
|
||||||
|
|
||||||
|
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
of this software and associated documentation files (the "Software"), to deal
|
||||||
|
in the Software without restriction, including without limitation the rights
|
||||||
|
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||||
|
copies of the Software, and to permit persons to whom the Software is
|
||||||
|
furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
The above copyright notice and this permission notice shall be included in all
|
||||||
|
copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||||
|
SOFTWARE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/*
|
||||||
|
// This constant can also be computed with the following algorithm:
|
||||||
|
const base64abc = [],
|
||||||
|
A = "A".charCodeAt(0),
|
||||||
|
a = "a".charCodeAt(0),
|
||||||
|
n = "0".charCodeAt(0);
|
||||||
|
for (let i = 0; i < 26; ++i) {
|
||||||
|
base64abc.push(String.fromCharCode(A + i));
|
||||||
|
}
|
||||||
|
for (let i = 0; i < 26; ++i) {
|
||||||
|
base64abc.push(String.fromCharCode(a + i));
|
||||||
|
}
|
||||||
|
for (let i = 0; i < 10; ++i) {
|
||||||
|
base64abc.push(String.fromCharCode(n + i));
|
||||||
|
}
|
||||||
|
base64abc.push("+");
|
||||||
|
base64abc.push("/");
|
||||||
|
*/
|
||||||
|
const base64abc = [
|
||||||
|
"A",
|
||||||
|
"B",
|
||||||
|
"C",
|
||||||
|
"D",
|
||||||
|
"E",
|
||||||
|
"F",
|
||||||
|
"G",
|
||||||
|
"H",
|
||||||
|
"I",
|
||||||
|
"J",
|
||||||
|
"K",
|
||||||
|
"L",
|
||||||
|
"M",
|
||||||
|
"N",
|
||||||
|
"O",
|
||||||
|
"P",
|
||||||
|
"Q",
|
||||||
|
"R",
|
||||||
|
"S",
|
||||||
|
"T",
|
||||||
|
"U",
|
||||||
|
"V",
|
||||||
|
"W",
|
||||||
|
"X",
|
||||||
|
"Y",
|
||||||
|
"Z",
|
||||||
|
"a",
|
||||||
|
"b",
|
||||||
|
"c",
|
||||||
|
"d",
|
||||||
|
"e",
|
||||||
|
"f",
|
||||||
|
"g",
|
||||||
|
"h",
|
||||||
|
"i",
|
||||||
|
"j",
|
||||||
|
"k",
|
||||||
|
"l",
|
||||||
|
"m",
|
||||||
|
"n",
|
||||||
|
"o",
|
||||||
|
"p",
|
||||||
|
"q",
|
||||||
|
"r",
|
||||||
|
"s",
|
||||||
|
"t",
|
||||||
|
"u",
|
||||||
|
"v",
|
||||||
|
"w",
|
||||||
|
"x",
|
||||||
|
"y",
|
||||||
|
"z",
|
||||||
|
"0",
|
||||||
|
"1",
|
||||||
|
"2",
|
||||||
|
"3",
|
||||||
|
"4",
|
||||||
|
"5",
|
||||||
|
"6",
|
||||||
|
"7",
|
||||||
|
"8",
|
||||||
|
"9",
|
||||||
|
"+",
|
||||||
|
"/",
|
||||||
|
];
|
||||||
|
|
||||||
|
/*
|
||||||
|
// This constant can also be computed with the following algorithm:
|
||||||
|
const l = 256, base64codes = new Uint8Array(l);
|
||||||
|
for (let i = 0; i < l; ++i) {
|
||||||
|
base64codes[i] = 255; // invalid character
|
||||||
|
}
|
||||||
|
base64abc.forEach((char, index) => {
|
||||||
|
base64codes[char.charCodeAt(0)] = index;
|
||||||
|
});
|
||||||
|
base64codes["=".charCodeAt(0)] = 0; // ignored anyway, so we just need to prevent an error
|
||||||
|
*/
|
||||||
|
const base64codes = [
|
||||||
|
255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
|
||||||
|
255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
|
||||||
|
255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 62, 255,
|
||||||
|
255, 255, 63, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 255, 255, 255, 0, 255,
|
||||||
|
255, 255, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18,
|
||||||
|
19, 20, 21, 22, 23, 24, 25, 255, 255, 255, 255, 255, 255, 26, 27, 28, 29,
|
||||||
|
30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48,
|
||||||
|
49, 50, 51,
|
||||||
|
];
|
||||||
|
|
||||||
|
function getBase64Code(charCode) {
|
||||||
|
if (charCode >= base64codes.length) {
|
||||||
|
throw new Error("Unable to parse base64 string.");
|
||||||
|
}
|
||||||
|
const code = base64codes[charCode];
|
||||||
|
if (code === 255) {
|
||||||
|
throw new Error("Unable to parse base64 string.");
|
||||||
|
}
|
||||||
|
return code;
|
||||||
|
}
|
||||||
|
|
||||||
|
function bytesToBase64(bytes) {
|
||||||
|
let result = "",
|
||||||
|
i,
|
||||||
|
l = bytes.length;
|
||||||
|
for (i = 2; i < l; i += 3) {
|
||||||
|
result += base64abc[bytes[i - 2] >> 2];
|
||||||
|
result += base64abc[((bytes[i - 2] & 0x03) << 4) | (bytes[i - 1] >> 4)];
|
||||||
|
result += base64abc[((bytes[i - 1] & 0x0f) << 2) | (bytes[i] >> 6)];
|
||||||
|
result += base64abc[bytes[i] & 0x3f];
|
||||||
|
}
|
||||||
|
if (i === l + 1) {
|
||||||
|
// 1 octet yet to write
|
||||||
|
result += base64abc[bytes[i - 2] >> 2];
|
||||||
|
result += base64abc[(bytes[i - 2] & 0x03) << 4];
|
||||||
|
result += "==";
|
||||||
|
}
|
||||||
|
if (i === l) {
|
||||||
|
// 2 octets yet to write
|
||||||
|
result += base64abc[bytes[i - 2] >> 2];
|
||||||
|
result += base64abc[((bytes[i - 2] & 0x03) << 4) | (bytes[i - 1] >> 4)];
|
||||||
|
result += base64abc[(bytes[i - 1] & 0x0f) << 2];
|
||||||
|
result += "=";
|
||||||
|
}
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
function base64ToBytes(str) {
|
||||||
|
if (str.length % 4 !== 0) {
|
||||||
|
throw new Error("Unable to parse base64 string.");
|
||||||
|
}
|
||||||
|
const index = str.indexOf("=");
|
||||||
|
if (index !== -1 && index < str.length - 2) {
|
||||||
|
throw new Error("Unable to parse base64 string.");
|
||||||
|
}
|
||||||
|
let missingOctets = str.endsWith("==") ? 2 : str.endsWith("=") ? 1 : 0,
|
||||||
|
n = str.length,
|
||||||
|
result = new Uint8Array(3 * (n / 4)),
|
||||||
|
buffer;
|
||||||
|
for (let i = 0, j = 0; i < n; i += 4, j += 3) {
|
||||||
|
buffer =
|
||||||
|
(getBase64Code(str.charCodeAt(i)) << 18) |
|
||||||
|
(getBase64Code(str.charCodeAt(i + 1)) << 12) |
|
||||||
|
(getBase64Code(str.charCodeAt(i + 2)) << 6) |
|
||||||
|
getBase64Code(str.charCodeAt(i + 3));
|
||||||
|
result[j] = buffer >> 16;
|
||||||
|
result[j + 1] = (buffer >> 8) & 0xff;
|
||||||
|
result[j + 2] = buffer & 0xff;
|
||||||
|
}
|
||||||
|
return result.subarray(0, result.length - missingOctets);
|
||||||
|
}
|
||||||
|
|
||||||
|
function base64encode(str, encoder = new TextEncoder()) {
|
||||||
|
return bytesToBase64(encoder.encode(str));
|
||||||
|
}
|
||||||
|
|
||||||
|
function base64decode(str, decoder = new TextDecoder()) {
|
||||||
|
return decoder.decode(base64ToBytes(str));
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
// From: https://gitlab.com/comunic/comunicconsole/-/raw/master/src/utils/Base64Utils.ts
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Add padding to base64 string
|
||||||
|
*
|
||||||
|
* Based on : https://gist.github.com/catwell/3046205
|
||||||
|
*
|
||||||
|
* @param input Input base64, without padding
|
||||||
|
*/
|
||||||
|
function base64AddPadding(input) {
|
||||||
|
const remainder = input.length % 4;
|
||||||
|
|
||||||
|
if (remainder === 2) input += "==";
|
||||||
|
else if (remainder === 3) input += "=";
|
||||||
|
|
||||||
|
return input.replaceAll("-", "+").replaceAll("_", "/");
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Turn a base64 string without padding into Uint8Array
|
||||||
|
*
|
||||||
|
* @param input Input base64 (without padding) string
|
||||||
|
*/
|
||||||
|
function base64NoPaddingToUint8Array(input) {
|
||||||
|
return Uint8Array.from(atob(base64AddPadding(input)), (c) =>
|
||||||
|
c.charCodeAt(0)
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Convert a buffer to a base64-encoded string
|
||||||
|
*
|
||||||
|
* @param buff Buffer to convert
|
||||||
|
*/
|
||||||
|
function ArrayBufferToBase64(buff) {
|
||||||
|
const arr = new Uint8Array(buff);
|
||||||
|
return bytesToBase64(arr);
|
||||||
|
}
|
@ -1,12 +1,14 @@
|
|||||||
use actix::Addr;
|
use actix::Addr;
|
||||||
use actix_web::{HttpResponse, Responder, web};
|
use actix_web::{HttpResponse, Responder, web};
|
||||||
use uuid::Uuid;
|
use uuid::Uuid;
|
||||||
|
use webauthn_rs::proto::RegisterPublicKeyCredential;
|
||||||
|
|
||||||
use crate::actors::users_actor;
|
use crate::actors::users_actor;
|
||||||
use crate::actors::users_actor::UsersActor;
|
use crate::actors::users_actor::UsersActor;
|
||||||
use crate::data::current_user::CurrentUser;
|
use crate::data::current_user::CurrentUser;
|
||||||
use crate::data::totp_key::TotpKey;
|
use crate::data::totp_key::TotpKey;
|
||||||
use crate::data::user::{FactorID, TwoFactor, TwoFactorType, User};
|
use crate::data::user::{FactorID, TwoFactor, TwoFactorType, User};
|
||||||
|
use crate::data::webauthn_manager::WebAuthManagerReq;
|
||||||
|
|
||||||
#[derive(serde::Deserialize)]
|
#[derive(serde::Deserialize)]
|
||||||
pub struct AddTOTPRequest {
|
pub struct AddTOTPRequest {
|
||||||
@ -45,6 +47,43 @@ pub async fn save_totp_factor(user: CurrentUser, form: web::Json<AddTOTPRequest>
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[derive(serde::Deserialize)]
|
||||||
|
pub struct AddWebauthnRequest {
|
||||||
|
opaque_state: String,
|
||||||
|
factor_name: String,
|
||||||
|
credential: RegisterPublicKeyCredential,
|
||||||
|
}
|
||||||
|
|
||||||
|
pub async fn save_webauthn_factor(user: CurrentUser, form: web::Json<AddWebauthnRequest>,
|
||||||
|
users: web::Data<Addr<UsersActor>>,
|
||||||
|
manager: WebAuthManagerReq) -> impl Responder {
|
||||||
|
let key = match manager.finish_registration(
|
||||||
|
&user,
|
||||||
|
&form.0.opaque_state,
|
||||||
|
form.0.credential,
|
||||||
|
) {
|
||||||
|
Ok(k) => k,
|
||||||
|
Err(e) => {
|
||||||
|
log::error!("Failed to register security key! {:?}", e);
|
||||||
|
return HttpResponse::InternalServerError().body("Failed to register key!");
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
let mut user = User::from(user);
|
||||||
|
user.add_factor(TwoFactor {
|
||||||
|
id: FactorID(Uuid::new_v4().to_string()),
|
||||||
|
name: form.0.factor_name,
|
||||||
|
kind: TwoFactorType::WEBAUTHN(key),
|
||||||
|
});
|
||||||
|
let res = users.send(users_actor::UpdateUserRequest(user)).await.unwrap().0;
|
||||||
|
|
||||||
|
if !res {
|
||||||
|
HttpResponse::InternalServerError().body("Failed to update user information!")
|
||||||
|
} else {
|
||||||
|
HttpResponse::Ok().body("Added new factor!")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
#[derive(serde::Deserialize)]
|
#[derive(serde::Deserialize)]
|
||||||
pub struct DeleteFactorRequest {
|
pub struct DeleteFactorRequest {
|
||||||
id: FactorID,
|
id: FactorID,
|
||||||
|
@ -2,6 +2,7 @@ use crate::data::client::ClientID;
|
|||||||
use crate::data::entity_manager::EntityManager;
|
use crate::data::entity_manager::EntityManager;
|
||||||
use crate::data::login_redirect::LoginRedirect;
|
use crate::data::login_redirect::LoginRedirect;
|
||||||
use crate::data::totp_key::TotpKey;
|
use crate::data::totp_key::TotpKey;
|
||||||
|
use crate::data::webauthn_manager::WebauthnPubKey;
|
||||||
use crate::utils::err::Res;
|
use crate::utils::err::Res;
|
||||||
|
|
||||||
#[derive(Clone, Debug, Eq, PartialEq, serde::Serialize, serde::Deserialize)]
|
#[derive(Clone, Debug, Eq, PartialEq, serde::Serialize, serde::Deserialize)]
|
||||||
@ -13,7 +14,7 @@ pub struct FactorID(pub String);
|
|||||||
#[derive(Clone, Debug, serde::Serialize, serde::Deserialize)]
|
#[derive(Clone, Debug, serde::Serialize, serde::Deserialize)]
|
||||||
pub enum TwoFactorType {
|
pub enum TwoFactorType {
|
||||||
TOTP(TotpKey),
|
TOTP(TotpKey),
|
||||||
_OTHER,
|
WEBAUTHN(WebauthnPubKey),
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Clone, Debug, serde::Serialize, serde::Deserialize)]
|
#[derive(Clone, Debug, serde::Serialize, serde::Deserialize)]
|
||||||
@ -27,7 +28,7 @@ impl TwoFactor {
|
|||||||
pub fn type_str(&self) -> &'static str {
|
pub fn type_str(&self) -> &'static str {
|
||||||
match self.kind {
|
match self.kind {
|
||||||
TwoFactorType::TOTP(_) => "Authenticator app",
|
TwoFactorType::TOTP(_) => "Authenticator app",
|
||||||
_ => unimplemented!()
|
TwoFactorType::WEBAUTHN(_) => "Security key",
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -35,7 +36,8 @@ impl TwoFactor {
|
|||||||
match self.kind {
|
match self.kind {
|
||||||
TwoFactorType::TOTP(_) => format!("/2fa_otp?id={}&redirect={}",
|
TwoFactorType::TOTP(_) => format!("/2fa_otp?id={}&redirect={}",
|
||||||
self.id.0, redirect_uri.get_encoded()),
|
self.id.0, redirect_uri.get_encoded()),
|
||||||
_ => unimplemented!()
|
TwoFactorType::WEBAUTHN(_) => format!("/2fa_webauthn?id={}&redirect={}",
|
||||||
|
self.id.0, redirect_uri.get_encoded()),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,8 +1,9 @@
|
|||||||
|
use std::io::ErrorKind;
|
||||||
use std::sync::Arc;
|
use std::sync::Arc;
|
||||||
|
|
||||||
use actix_web::web;
|
use actix_web::web;
|
||||||
use webauthn_rs::{RegistrationState, Webauthn, WebauthnConfig};
|
use webauthn_rs::{RegistrationState, Webauthn, WebauthnConfig};
|
||||||
use webauthn_rs::proto::CreationChallengeResponse;
|
use webauthn_rs::proto::{CreationChallengeResponse, Credential, RegisterPublicKeyCredential};
|
||||||
|
|
||||||
use crate::constants::APP_NAME;
|
use crate::constants::APP_NAME;
|
||||||
use crate::data::app_config::AppConfig;
|
use crate::data::app_config::AppConfig;
|
||||||
@ -35,6 +36,11 @@ pub struct RegisterKeyRequest {
|
|||||||
pub creation_challenge: CreationChallengeResponse,
|
pub creation_challenge: CreationChallengeResponse,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[derive(Clone, Debug, serde::Serialize, serde::Deserialize)]
|
||||||
|
pub struct WebauthnPubKey {
|
||||||
|
creds: Credential,
|
||||||
|
}
|
||||||
|
|
||||||
#[derive(Debug, serde::Serialize, serde::Deserialize)]
|
#[derive(Debug, serde::Serialize, serde::Deserialize)]
|
||||||
struct RegisterKeyOpaqueData {
|
struct RegisterKeyOpaqueData {
|
||||||
registration_state: RegistrationState,
|
registration_state: RegistrationState,
|
||||||
@ -54,7 +60,10 @@ impl WebAuthManager {
|
|||||||
core: Webauthn::new(WebAuthnAppConfig {
|
core: Webauthn::new(WebAuthnAppConfig {
|
||||||
origin: url::Url::parse(&conf.website_origin)
|
origin: url::Url::parse(&conf.website_origin)
|
||||||
.expect("Failed to parse configuration origin!"),
|
.expect("Failed to parse configuration origin!"),
|
||||||
relying_party_id: conf.domain_name().to_string(),
|
relying_party_id: conf.domain_name().split_once(':')
|
||||||
|
.map(|s| s.0)
|
||||||
|
.unwrap_or(conf.domain_name())
|
||||||
|
.to_string(),
|
||||||
}),
|
}),
|
||||||
crypto_wrapper: CryptoWrapper::new_random(),
|
crypto_wrapper: CryptoWrapper::new_random(),
|
||||||
}
|
}
|
||||||
@ -63,7 +72,7 @@ impl WebAuthManager {
|
|||||||
pub fn start_register(&self, user: &User) -> Res<RegisterKeyRequest> {
|
pub fn start_register(&self, user: &User) -> Res<RegisterKeyRequest> {
|
||||||
let (creation_challenge, registration_state) = self.core.generate_challenge_register(
|
let (creation_challenge, registration_state) = self.core.generate_challenge_register(
|
||||||
&user.username,
|
&user.username,
|
||||||
true,
|
false,
|
||||||
)?;
|
)?;
|
||||||
|
|
||||||
Ok(RegisterKeyRequest {
|
Ok(RegisterKeyRequest {
|
||||||
@ -74,4 +83,18 @@ impl WebAuthManager {
|
|||||||
creation_challenge,
|
creation_challenge,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub fn finish_registration(&self, user: &User, opaque_state: &str,
|
||||||
|
pub_cred: RegisterPublicKeyCredential) -> Res<WebauthnPubKey> {
|
||||||
|
let state: RegisterKeyOpaqueData = self.crypto_wrapper.decrypt(opaque_state)?;
|
||||||
|
if state.user_id != user.uid {
|
||||||
|
return Err(Box::new(
|
||||||
|
std::io::Error::new(ErrorKind::Other, "Invalid user for pubkey!")));
|
||||||
|
}
|
||||||
|
|
||||||
|
let res = self.core
|
||||||
|
.register_credential(&pub_cred, &state.registration_state, |_| Ok(false))?;
|
||||||
|
|
||||||
|
Ok(WebauthnPubKey { creds: res.0 })
|
||||||
|
}
|
||||||
}
|
}
|
@ -133,6 +133,7 @@ async fn main() -> std::io::Result<()> {
|
|||||||
|
|
||||||
// User API
|
// User API
|
||||||
.route("/settings/api/two_factor/save_totp_factor", web::post().to(two_factor_api::save_totp_factor))
|
.route("/settings/api/two_factor/save_totp_factor", web::post().to(two_factor_api::save_totp_factor))
|
||||||
|
.route("/settings/api/two_factor/save_webauthn_factor", web::post().to(two_factor_api::save_webauthn_factor))
|
||||||
.route("/settings/api/two_factor/delete_factor", web::post().to(two_factor_api::delete_factor))
|
.route("/settings/api/two_factor/delete_factor", web::post().to(two_factor_api::delete_factor))
|
||||||
|
|
||||||
// Admin routes
|
// Admin routes
|
||||||
|
@ -2,11 +2,83 @@
|
|||||||
{% block content %}
|
{% block content %}
|
||||||
<div style="max-width: 700px;">
|
<div style="max-width: 700px;">
|
||||||
|
|
||||||
<p>In order, to continue, please insert your security key & approve the registration request.</p>
|
<p>In order to continue, please click on the "Start Enrollment" button, insert your security key and approve the
|
||||||
|
registration request.</p>
|
||||||
|
|
||||||
|
<div class="form-group">
|
||||||
|
<label for="inputKeyName" class="form-label mt-4">Key name</label>
|
||||||
|
<input type="text" class="form-control" id="inputKeyName"
|
||||||
|
placeholder="Device / Authenticator app name"
|
||||||
|
value="Security key" minlength="1" required/>
|
||||||
|
<small class="form-text text-muted">Please give a name to your key to identify it more easily later.</small>
|
||||||
|
<div class="invalid-feedback">Please give a name to this security key</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<input type="button" class="btn btn-primary" value="Start enrollment" onclick="startEnrollment()"
|
||||||
|
style="margin-top: 20px;"/>
|
||||||
|
|
||||||
|
<script src="/assets/js/base64_lib.js"></script>
|
||||||
<script>
|
<script>
|
||||||
const OPAQUE_STATE = "{{ opaque_state }}";
|
const OPAQUE_STATE = "{{ opaque_state }}";
|
||||||
const REGISTRATION_CHALLENGE = JSON.parse(decodeURIComponent("{{ challenge_json }}"));
|
const REGISTRATION_CHALLENGE = JSON.parse(decodeURIComponent("{{ challenge_json }}"));
|
||||||
|
|
||||||
|
// Decode data
|
||||||
|
REGISTRATION_CHALLENGE.publicKey.challenge = base64NoPaddingToUint8Array(
|
||||||
|
REGISTRATION_CHALLENGE.publicKey.challenge
|
||||||
|
);
|
||||||
|
REGISTRATION_CHALLENGE.publicKey.user.id = base64NoPaddingToUint8Array(
|
||||||
|
REGISTRATION_CHALLENGE.publicKey.user.id
|
||||||
|
);
|
||||||
|
|
||||||
|
|
||||||
|
async function startEnrollment() {
|
||||||
|
try {
|
||||||
|
const factorNameInput = document.getElementById("inputKeyName");
|
||||||
|
factorNameInput.classList.remove("is-invalid");
|
||||||
|
if (factorNameInput.value.length === 0) {
|
||||||
|
factorNameInput.classList.add("is-invalid");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
const cred = await navigator.credentials.create(REGISTRATION_CHALLENGE);
|
||||||
|
|
||||||
|
// Encode data that needs to be encoded
|
||||||
|
const credential_res = {
|
||||||
|
id: cred.id,
|
||||||
|
rawId: ArrayBufferToBase64(cred.rawId),
|
||||||
|
type: cred.type,
|
||||||
|
response: {
|
||||||
|
attestationObject: ArrayBufferToBase64(
|
||||||
|
cred.response.attestationObject
|
||||||
|
),
|
||||||
|
clientDataJSON: ArrayBufferToBase64(
|
||||||
|
cred.response.clientDataJSON
|
||||||
|
),
|
||||||
|
},
|
||||||
|
};
|
||||||
|
|
||||||
|
const res = await fetch("/settings/api/two_factor/save_webauthn_factor", {
|
||||||
|
method: "post",
|
||||||
|
headers: {
|
||||||
|
'Content-Type': 'application/json',
|
||||||
|
},
|
||||||
|
body: JSON.stringify({
|
||||||
|
opaque_state: OPAQUE_STATE,
|
||||||
|
factor_name: factorNameInput.value,
|
||||||
|
credential: credential_res,
|
||||||
|
})
|
||||||
|
});
|
||||||
|
|
||||||
|
let text = await res.text();
|
||||||
|
alert(text);
|
||||||
|
|
||||||
|
if (res.status == 200)
|
||||||
|
location.href = "/settings/two_factors";
|
||||||
|
} catch(e) {
|
||||||
|
console.error(e);
|
||||||
|
alert("Failed enrollment, please try again!");
|
||||||
|
}
|
||||||
|
}
|
||||||
</script>
|
</script>
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
Loading…
Reference in New Issue
Block a user