2022-01-14 16:03:31 +01:00
|
|
|
// Copyright 2018 The Gitea Authors. All rights reserved.
|
2022-11-27 19:20:29 +01:00
|
|
|
// SPDX-License-Identifier: MIT
|
2022-01-14 16:03:31 +01:00
|
|
|
|
|
|
|
package security
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"net/http"
|
2023-06-06 07:29:37 +02:00
|
|
|
"strconv"
|
|
|
|
"time"
|
2022-01-14 16:03:31 +01:00
|
|
|
|
|
|
|
"code.gitea.io/gitea/models/auth"
|
2024-07-09 19:36:31 +02:00
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
2022-01-14 16:03:31 +01:00
|
|
|
wa "code.gitea.io/gitea/modules/auth/webauthn"
|
|
|
|
"code.gitea.io/gitea/modules/log"
|
|
|
|
"code.gitea.io/gitea/modules/setting"
|
|
|
|
"code.gitea.io/gitea/modules/web"
|
2024-02-27 08:12:22 +01:00
|
|
|
"code.gitea.io/gitea/services/context"
|
2022-01-14 16:03:31 +01:00
|
|
|
"code.gitea.io/gitea/services/forms"
|
|
|
|
|
2023-01-12 03:51:00 +01:00
|
|
|
"github.com/go-webauthn/webauthn/protocol"
|
|
|
|
"github.com/go-webauthn/webauthn/webauthn"
|
2022-01-14 16:03:31 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
// WebAuthnRegister initializes the webauthn registration procedure
|
|
|
|
func WebAuthnRegister(ctx *context.Context) {
|
2024-07-09 19:36:31 +02:00
|
|
|
if user_model.IsFeatureDisabledWithLoginType(ctx.Doer, setting.UserFeatureManageMFA) {
|
|
|
|
ctx.Error(http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-01-14 16:03:31 +01:00
|
|
|
form := web.GetForm(ctx).(*forms.WebauthnRegistrationForm)
|
|
|
|
if form.Name == "" {
|
2023-06-06 07:29:37 +02:00
|
|
|
// Set name to the hexadecimal of the current time
|
|
|
|
form.Name = strconv.FormatInt(time.Now().UnixNano(), 16)
|
2022-01-14 16:03:31 +01:00
|
|
|
}
|
|
|
|
|
2023-09-16 16:39:12 +02:00
|
|
|
cred, err := auth.GetWebAuthnCredentialByName(ctx, ctx.Doer.ID, form.Name)
|
2022-01-14 16:03:31 +01:00
|
|
|
if err != nil && !auth.IsErrWebAuthnCredentialNotExist(err) {
|
|
|
|
ctx.ServerError("GetWebAuthnCredentialsByUID", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if cred != nil {
|
|
|
|
ctx.Error(http.StatusConflict, "Name already taken")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-01-15 17:52:56 +01:00
|
|
|
_ = ctx.Session.Delete("webauthnRegistration")
|
|
|
|
if err := ctx.Session.Set("webauthnName", form.Name); err != nil {
|
|
|
|
ctx.ServerError("Unable to set session key for webauthnName", err)
|
2022-01-14 16:03:31 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-11-26 17:04:17 +01:00
|
|
|
webAuthnUser := wa.NewWebAuthnUser(ctx, ctx.Doer)
|
|
|
|
credentialOptions, sessionData, err := wa.WebAuthn.BeginRegistration(webAuthnUser, webauthn.WithAuthenticatorSelection(protocol.AuthenticatorSelection{
|
2024-06-30 00:50:03 +02:00
|
|
|
ResidentKey: protocol.ResidentKeyRequirementRequired,
|
|
|
|
}))
|
2022-01-14 16:03:31 +01:00
|
|
|
if err != nil {
|
|
|
|
ctx.ServerError("Unable to BeginRegistration", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Save the session data as marshaled JSON
|
2022-01-15 17:52:56 +01:00
|
|
|
if err = ctx.Session.Set("webauthnRegistration", sessionData); err != nil {
|
2022-01-14 16:03:31 +01:00
|
|
|
ctx.ServerError("Unable to set session", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.JSON(http.StatusOK, credentialOptions)
|
|
|
|
}
|
|
|
|
|
|
|
|
// WebauthnRegisterPost receives the response of the security key
|
|
|
|
func WebauthnRegisterPost(ctx *context.Context) {
|
2024-07-09 19:36:31 +02:00
|
|
|
if user_model.IsFeatureDisabledWithLoginType(ctx.Doer, setting.UserFeatureManageMFA) {
|
|
|
|
ctx.Error(http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-01-15 17:52:56 +01:00
|
|
|
name, ok := ctx.Session.Get("webauthnName").(string)
|
2022-01-14 16:03:31 +01:00
|
|
|
if !ok || name == "" {
|
2022-01-15 17:52:56 +01:00
|
|
|
ctx.ServerError("Get webauthnName", errors.New("no webauthnName"))
|
2022-01-14 16:03:31 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Load the session data
|
2022-01-15 17:52:56 +01:00
|
|
|
sessionData, ok := ctx.Session.Get("webauthnRegistration").(*webauthn.SessionData)
|
2022-01-14 16:03:31 +01:00
|
|
|
if !ok || sessionData == nil {
|
|
|
|
ctx.ServerError("Get registration", errors.New("no registration"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer func() {
|
2022-01-15 17:52:56 +01:00
|
|
|
_ = ctx.Session.Delete("webauthnRegistration")
|
2022-01-14 16:03:31 +01:00
|
|
|
}()
|
|
|
|
|
|
|
|
// Verify that the challenge succeeded
|
2024-11-26 17:04:17 +01:00
|
|
|
webAuthnUser := wa.NewWebAuthnUser(ctx, ctx.Doer)
|
|
|
|
cred, err := wa.WebAuthn.FinishRegistration(webAuthnUser, *sessionData, ctx.Req)
|
2022-01-14 16:03:31 +01:00
|
|
|
if err != nil {
|
|
|
|
if pErr, ok := err.(*protocol.Error); ok {
|
|
|
|
log.Error("Unable to finish registration due to error: %v\nDevInfo: %s", pErr, pErr.DevInfo)
|
|
|
|
}
|
|
|
|
ctx.ServerError("CreateCredential", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-09-16 16:39:12 +02:00
|
|
|
dbCred, err := auth.GetWebAuthnCredentialByName(ctx, ctx.Doer.ID, name)
|
2022-01-14 16:03:31 +01:00
|
|
|
if err != nil && !auth.IsErrWebAuthnCredentialNotExist(err) {
|
|
|
|
ctx.ServerError("GetWebAuthnCredentialsByUID", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if dbCred != nil {
|
|
|
|
ctx.Error(http.StatusConflict, "Name already taken")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the credential
|
2023-09-16 16:39:12 +02:00
|
|
|
_, err = auth.CreateCredential(ctx, ctx.Doer.ID, name, cred)
|
2022-01-14 16:03:31 +01:00
|
|
|
if err != nil {
|
|
|
|
ctx.ServerError("CreateCredential", err)
|
|
|
|
return
|
|
|
|
}
|
2022-01-15 17:52:56 +01:00
|
|
|
_ = ctx.Session.Delete("webauthnName")
|
|
|
|
|
2022-01-14 16:03:31 +01:00
|
|
|
ctx.JSON(http.StatusCreated, cred)
|
|
|
|
}
|
|
|
|
|
|
|
|
// WebauthnDelete deletes an security key by id
|
|
|
|
func WebauthnDelete(ctx *context.Context) {
|
2024-07-09 19:36:31 +02:00
|
|
|
if user_model.IsFeatureDisabledWithLoginType(ctx.Doer, setting.UserFeatureManageMFA) {
|
|
|
|
ctx.Error(http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-01-14 16:03:31 +01:00
|
|
|
form := web.GetForm(ctx).(*forms.WebauthnDeleteForm)
|
2023-09-16 16:39:12 +02:00
|
|
|
if _, err := auth.DeleteCredential(ctx, form.ID, ctx.Doer.ID); err != nil {
|
2022-01-14 16:03:31 +01:00
|
|
|
ctx.ServerError("GetWebAuthnCredentialByID", err)
|
|
|
|
return
|
|
|
|
}
|
2023-07-26 08:04:01 +02:00
|
|
|
ctx.JSONRedirect(setting.AppSubURL + "/user/settings/security")
|
2022-01-14 16:03:31 +01:00
|
|
|
}
|