summary refs log tree commit diff
path: root/src/api/routes/auth/mfa/webauthn.ts
blob: c4334c4c250109e1230299f6f2ddf2d8c9e6cc5f (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
/*
	Fosscord: A FOSS re-implementation and extension of the Discord.com backend.
	Copyright (C) 2023 Fosscord and Fosscord Contributors
	
	This program is free software: you can redistribute it and/or modify
	it under the terms of the GNU Affero General Public License as published
	by the Free Software Foundation, either version 3 of the License, or
	(at your option) any later version.
	
	This program is distributed in the hope that it will be useful,
	but WITHOUT ANY WARRANTY; without even the implied warranty of
	MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
	GNU Affero General Public License for more details.
	
	You should have received a copy of the GNU Affero General Public License
	along with this program.  If not, see <https://www.gnu.org/licenses/>.
*/

import { route } from "@fosscord/api";
import {
	generateToken,
	SecurityKey,
	User,
	verifyWebAuthnToken,
	WebAuthn,
	WebAuthnTotpSchema,
} from "@fosscord/util";
import { Request, Response, Router } from "express";
import { ExpectedAssertionResult } from "fido2-lib";
import { HTTPError } from "lambert-server";
const router = Router();

function toArrayBuffer(buf: Buffer) {
	const ab = new ArrayBuffer(buf.length);
	const view = new Uint8Array(ab);
	for (let i = 0; i < buf.length; ++i) {
		view[i] = buf[i];
	}
	return ab;
}

router.post(
	"/",
	route({ body: "WebAuthnTotpSchema" }),
	async (req: Request, res: Response) => {
		if (!WebAuthn.fido2) {
			// TODO: I did this for typescript and I can't use !
			throw new Error("WebAuthn not enabled");
		}

		const { code, ticket } = req.body as WebAuthnTotpSchema;

		const user = await User.findOneOrFail({
			where: {
				totp_last_ticket: ticket,
			},
			select: ["id", "settings"],
		});

		const ret = await verifyWebAuthnToken(ticket);
		if (!ret)
			throw new HTTPError(req.t("auth:login.INVALID_TOTP_CODE"), 60008);

		await User.update({ id: user.id }, { totp_last_ticket: "" });

		const clientAttestationResponse = JSON.parse(code);

		if (!clientAttestationResponse.rawId)
			throw new HTTPError("Missing rawId", 400);

		clientAttestationResponse.rawId = toArrayBuffer(
			Buffer.from(clientAttestationResponse.rawId, "base64url"),
		);

		const securityKey = await SecurityKey.findOneOrFail({
			where: {
				key_id: Buffer.from(
					clientAttestationResponse.rawId,
					"base64url",
				).toString("base64"),
			},
		});

		const assertionExpectations: ExpectedAssertionResult = JSON.parse(
			Buffer.from(
				clientAttestationResponse.response.clientDataJSON,
				"base64",
			).toString(),
		);

		const authnResult = await WebAuthn.fido2.assertionResult(
			clientAttestationResponse,
			{
				...assertionExpectations,
				factor: "second",
				publicKey: securityKey.public_key,
				prevCounter: securityKey.counter,
				userHandle: securityKey.key_id,
			},
		);

		const counter = authnResult.authnrData.get("counter");

		securityKey.counter = counter;

		await securityKey.save();

		return res.json({
			token: await generateToken(user.id),
			user_settings: user.settings,
		});
	},
);

export default router;