-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathassertion.go
109 lines (95 loc) · 2.63 KB
/
assertion.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
package main
import (
"net/http"
"github.com/go-webauthn/webauthn/webauthn"
)
func AssertionOptions(w http.ResponseWriter, r *http.Request) {
if r.Method != "POST" {
jsonResponse(w, FIDO2Response{
Status: "failed",
ErrorMessage: "Invalid request method",
}, http.StatusBadRequest)
return
}
if err := r.ParseForm(); err != nil {
jsonResponse(w, FIDO2Response{
Status: "failed",
ErrorMessage: err.Error(),
}, http.StatusBadRequest)
return
}
// Some options are complemented in the frontend
// Ref: https://github.com/MasterKale/SimpleWebAuthn/blob/5229cebbcc2d087b7eaaaeb9886f53c9e1d93522/packages/browser/src/methods/startAuthentication.ts#L72-L76
options, sessionData, err := webAuthn.BeginDiscoverableLogin()
if err != nil {
jsonResponse(w, FIDO2Response{
Status: "failed",
ErrorMessage: err.Error(),
}, http.StatusBadRequest)
return
}
http.SetCookie(w, &http.Cookie{
Name: "authentication",
Value: sessionDb.StartSession(sessionData),
Path: "/",
})
jsonResponse(w, options, http.StatusOK)
}
func AssertionResult(w http.ResponseWriter, r *http.Request) {
if r.Method != "POST" {
http.Error(w, "Invalid request method", http.StatusMethodNotAllowed)
return
}
if err := r.ParseForm(); err != nil {
jsonResponse(w, FIDO2Response{
Status: "failed",
ErrorMessage: err.Error(),
}, http.StatusBadRequest)
return
}
cookie, err := r.Cookie("authentication")
if err != nil {
jsonResponse(w, FIDO2Response{
Status: "failed",
ErrorMessage: err.Error(),
}, http.StatusBadRequest)
return
}
sessionData, err := sessionDb.GetSession(cookie.Value)
if err != nil {
jsonResponse(w, FIDO2Response{
Status: "failed",
ErrorMessage: err.Error(),
}, http.StatusBadRequest)
return
}
credential, err := webAuthn.FinishDiscoverableLogin(func(rawId []byte, userhandle []byte) (user webauthn.User, err error) {
return usersDB.GetUser(string(userhandle))
}, *sessionData, r)
if err != nil {
jsonResponse(w, FIDO2Response{
Status: "failed",
ErrorMessage: err.Error(),
}, http.StatusBadRequest)
return
}
if !credential.Flags.UserPresent || !credential.Flags.UserVerified {
jsonResponse(w, FIDO2Response{
Status: "failed",
ErrorMessage: "user was not verified",
}, http.StatusBadRequest)
return
}
if credential.Authenticator.CloneWarning {
jsonResponse(w, FIDO2Response{
Status: "failed",
ErrorMessage: "authenticator is cloned",
}, http.StatusBadRequest)
return
}
sessionDb.DeleteSession(cookie.Value)
jsonResponse(w, FIDO2Response{
Status: "ok",
ErrorMessage: "",
}, http.StatusOK)
}