2023-06-09 08:03:29 +00:00
|
|
|
package auth
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/ed25519"
|
|
|
|
"encoding/hex"
|
|
|
|
"errors"
|
|
|
|
"git.lumeweb.com/LumeWeb/portal/db"
|
|
|
|
"git.lumeweb.com/LumeWeb/portal/logger"
|
|
|
|
"git.lumeweb.com/LumeWeb/portal/model"
|
|
|
|
"github.com/kataras/jwt"
|
|
|
|
"go.uber.org/zap"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
)
|
|
|
|
|
|
|
|
var sharedKey = []byte("sercrethatmaycontainch@r$32chars")
|
|
|
|
|
|
|
|
var blocklist *jwt.Blocklist
|
|
|
|
|
|
|
|
var (
|
|
|
|
ErrInvalidEmailPassword = errors.New("Invalid email or password")
|
|
|
|
ErrPubkeyOnly = errors.New("Only pubkey login is supported")
|
|
|
|
ErrFailedGenerateToken = errors.New("Failed to generate token")
|
|
|
|
ErrFailedGenerateKeyChallenge = errors.New("Failed to generate key challenge")
|
|
|
|
ErrFailedSignJwt = errors.New("Failed to sign jwt")
|
|
|
|
ErrFailedSaveToken = errors.New("Failed to sign token")
|
|
|
|
ErrFailedDeleteKeyChallenge = errors.New("Failed to delete key challenge")
|
|
|
|
ErrFailedInvalidateToken = errors.New("Failed to invalidate token")
|
|
|
|
ErrInvalidKeyChallenge = errors.New("Invalid key challenge")
|
|
|
|
ErrInvalidPubkey = errors.New("Invalid pubkey")
|
|
|
|
ErrInvalidSignature = errors.New("Invalid signature")
|
|
|
|
ErrInvalidToken = errors.New("Invalid token")
|
|
|
|
)
|
|
|
|
|
|
|
|
func Init() {
|
|
|
|
blocklist = jwt.NewBlocklist(0)
|
|
|
|
}
|
|
|
|
|
|
|
|
func LoginWithPassword(email string, password string) (string, error) {
|
|
|
|
// Retrieve the account for the given email.
|
|
|
|
account := model.Account{}
|
|
|
|
if err := db.Get().Model(&account).Where("email = ?", email).First(&account).Error; err != nil {
|
|
|
|
logger.Get().Debug(ErrInvalidEmailPassword.Error(), zap.String("email", email))
|
|
|
|
return "", ErrInvalidEmailPassword
|
|
|
|
}
|
|
|
|
|
|
|
|
if account.Password == nil || len(*account.Password) == 0 {
|
|
|
|
logger.Get().Debug(ErrPubkeyOnly.Error(), zap.String("email", email))
|
|
|
|
return "", ErrPubkeyOnly
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify the provided password against the hashed password stored in the database.
|
|
|
|
if err := verifyPassword(*account.Password, password); err != nil {
|
|
|
|
logger.Get().Debug(ErrPubkeyOnly.Error(), zap.String("email", email))
|
|
|
|
return "", ErrInvalidEmailPassword
|
|
|
|
}
|
|
|
|
|
|
|
|
// Generate a JWT token for the authenticated user.
|
|
|
|
token, err := generateAndSaveLoginToken(account.ID, 24*time.Hour)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
return token, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func LoginWithPubkey(pubkey string, challenge string, signature string) (string, error) {
|
|
|
|
pubkey = strings.ToLower(pubkey)
|
|
|
|
signature = strings.ToLower(signature)
|
|
|
|
|
|
|
|
// Retrieve the key challenge for the given challenge.
|
|
|
|
challengeObj := model.KeyChallenge{}
|
|
|
|
if err := db.Get().Model(challengeObj).Where("challenge = ?", challenge).First(&challengeObj).Error; err != nil {
|
|
|
|
logger.Get().Debug(ErrInvalidKeyChallenge.Error(), zap.Error(err), zap.String("challenge", challenge))
|
|
|
|
return "", ErrInvalidKeyChallenge
|
|
|
|
}
|
|
|
|
|
|
|
|
verifiedToken, err := jwt.Verify(jwt.HS256, sharedKey, []byte(challenge), blocklist)
|
|
|
|
if err != nil {
|
|
|
|
logger.Get().Debug(ErrInvalidKeyChallenge.Error(), zap.Error(err), zap.String("challenge", challenge))
|
|
|
|
return "", ErrInvalidKeyChallenge
|
|
|
|
}
|
|
|
|
|
|
|
|
rawPubKey, err := hex.DecodeString(pubkey)
|
|
|
|
if err != nil {
|
|
|
|
logger.Get().Debug(ErrInvalidPubkey.Error(), zap.Error(err), zap.String("pubkey", pubkey))
|
|
|
|
return "", ErrInvalidPubkey
|
|
|
|
}
|
|
|
|
|
|
|
|
rawSignature, err := hex.DecodeString(signature)
|
|
|
|
if err != nil {
|
|
|
|
logger.Get().Debug(ErrInvalidPubkey.Error(), zap.Error(err), zap.String("signature", pubkey))
|
|
|
|
return "", ErrInvalidSignature
|
|
|
|
}
|
|
|
|
|
|
|
|
publicKeyDecoded := ed25519.PublicKey(rawPubKey)
|
|
|
|
|
|
|
|
// Verify the challenge signature.
|
|
|
|
if !ed25519.Verify(publicKeyDecoded, []byte(challenge), rawSignature) {
|
|
|
|
logger.Get().Debug(ErrInvalidKeyChallenge.Error(), zap.Error(err), zap.String("challenge", challenge))
|
|
|
|
return "", ErrInvalidKeyChallenge
|
|
|
|
}
|
|
|
|
|
|
|
|
// Generate a JWT token for the authenticated user.
|
|
|
|
token, err := generateAndSaveLoginToken(challengeObj.AccountID, 24*time.Hour)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = blocklist.InvalidateToken(verifiedToken.Token, verifiedToken.StandardClaims)
|
|
|
|
if err != nil {
|
|
|
|
logger.Get().Error(ErrFailedInvalidateToken.Error(), zap.Error(err), zap.String("pubkey", pubkey), zap.ByteString("token", verifiedToken.Token), zap.String("challenge", challenge))
|
|
|
|
return "", ErrFailedInvalidateToken
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := db.Get().Delete(&challenge).Error; err != nil {
|
|
|
|
logger.Get().Debug(ErrFailedDeleteKeyChallenge.Error(), zap.Error(err))
|
|
|
|
return "", ErrFailedDeleteKeyChallenge
|
|
|
|
}
|
|
|
|
|
|
|
|
return token, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func GeneratePubkeyChallenge(pubkey string) (string, error) {
|
|
|
|
pubkey = strings.ToLower(pubkey)
|
|
|
|
|
|
|
|
// Retrieve the account for the given email.
|
|
|
|
account := model.Key{}
|
|
|
|
if err := db.Get().Where("pubkey = ?", pubkey).First(&account).Error; err != nil {
|
|
|
|
logger.Get().Debug("failed to query pubkey", zap.Error(err))
|
|
|
|
return "", errors.New("invalid pubkey")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Generate a random challenge string.
|
|
|
|
challenge, err := generateAndSaveChallengeToken(account.AccountID, time.Minute)
|
|
|
|
if err != nil {
|
|
|
|
logger.Get().Error(ErrFailedGenerateKeyChallenge.Error())
|
|
|
|
return "", ErrFailedGenerateKeyChallenge
|
|
|
|
}
|
|
|
|
|
|
|
|
return challenge, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func Logout(token string) error {
|
|
|
|
// Verify the provided token.
|
|
|
|
claims, err := jwt.Verify(jwt.HS256, sharedKey, []byte(token), blocklist)
|
|
|
|
if err != nil {
|
|
|
|
logger.Get().Debug(ErrInvalidToken.Error(), zap.Error(err))
|
|
|
|
return ErrInvalidToken
|
|
|
|
}
|
|
|
|
|
|
|
|
err = blocklist.InvalidateToken(claims.Token, claims.StandardClaims)
|
|
|
|
if err != nil {
|
|
|
|
logger.Get().Error(ErrFailedInvalidateToken.Error(), zap.Error(err), zap.String("token", token))
|
|
|
|
return ErrFailedInvalidateToken
|
|
|
|
}
|
|
|
|
|
|
|
|
// Retrieve the key challenge for the given challenge.
|
|
|
|
session := model.LoginSession{}
|
|
|
|
if err := db.Get().Model(session).Where("token = ?", token).First(&session).Error; err != nil {
|
|
|
|
logger.Get().Debug(ErrFailedInvalidateToken.Error(), zap.Error(err), zap.String("token", token))
|
|
|
|
return ErrFailedInvalidateToken
|
|
|
|
}
|
|
|
|
|
|
|
|
db.Get().Delete(&session)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func VerifyLoginToken(token string) error {
|
2023-06-09 08:29:18 +00:00
|
|
|
uvt, err := jwt.Decode([]byte(token))
|
|
|
|
if err != nil {
|
|
|
|
return ErrInvalidToken
|
|
|
|
}
|
|
|
|
|
|
|
|
var claim jwt.Claims
|
|
|
|
|
|
|
|
err = uvt.Claims(&claim)
|
2023-06-09 08:03:29 +00:00
|
|
|
if err != nil {
|
2023-06-09 08:26:50 +00:00
|
|
|
return ErrInvalidToken
|
2023-06-09 08:03:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
session := model.LoginSession{}
|
|
|
|
if err := db.Get().Model(session).Where("token = ?", token).First(&session).Error; err != nil {
|
|
|
|
logger.Get().Debug(ErrInvalidToken.Error(), zap.Error(err), zap.String("token", token))
|
|
|
|
return ErrInvalidToken
|
|
|
|
}
|
|
|
|
|
2023-06-09 08:26:50 +00:00
|
|
|
_, err = jwt.Verify(jwt.HS256, sharedKey, []byte(token), blocklist)
|
|
|
|
if err != nil {
|
|
|
|
db.Get().Delete(&session)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-06-09 08:03:29 +00:00
|
|
|
return nil
|
|
|
|
}
|