iceshrimp-legacy/packages/backend/src/server/api/private/signin.ts

275 lines
5.9 KiB
TypeScript
Raw Normal View History

2023-01-13 05:40:33 +01:00
import type Koa from "koa";
import * as OTPAuth from "otpauth";
2023-01-13 05:40:33 +01:00
import signin from "../common/signin.js";
import config from "@/config/index.js";
import {
Users,
Signins,
UserProfiles,
UserSecurityKeys,
AttestationChallenges,
} from "@/models/index.js";
import type { ILocalUser } from "@/models/entities/user.js";
import { genId } from "@/misc/gen-id.js";
2023-03-31 04:10:03 +02:00
import {
comparePassword,
hashPassword,
isOldAlgorithm,
} from "@/misc/password.js";
2023-01-13 05:40:33 +01:00
import { verifyLogin, hash } from "../2fa.js";
import { randomBytes } from "node:crypto";
import { IsNull } from "typeorm";
import { limiter } from "../limiter.js";
import { getIpHash } from "@/misc/get-ip-hash.js";
2016-12-28 23:49:51 +01:00
2019-11-24 09:09:32 +01:00
export default async (ctx: Koa.Context) => {
2023-01-13 05:40:33 +01:00
ctx.set("Access-Control-Allow-Origin", config.url);
ctx.set("Access-Control-Allow-Credentials", "true");
2016-12-28 23:49:51 +01:00
2018-07-23 06:56:25 +02:00
const body = ctx.request.body as any;
2023-01-13 05:40:33 +01:00
const username = body["username"];
const password = body["password"];
const token = body["token"];
2016-12-28 23:49:51 +01:00
function error(status: number, error: { id: string }) {
ctx.status = status;
ctx.body = { error };
}
try {
// not more than 1 attempt per second and not more than 10 attempts per hour
2023-01-13 05:40:33 +01:00
await limiter(
{ key: "signin", duration: 60 * 60 * 1000, max: 10, minInterval: 1000 },
getIpHash(ctx.ip),
);
} catch (err) {
ctx.status = 429;
ctx.body = {
error: {
2023-01-13 05:40:33 +01:00
message: "Too many failed attempts to sign in. Try again later.",
code: "TOO_MANY_AUTHENTICATION_FAILURES",
id: "22d05606-fbcf-421a-a2db-b32610dcfd1b",
},
};
return;
}
2023-01-13 05:40:33 +01:00
if (typeof username !== "string") {
2018-04-12 23:06:18 +02:00
ctx.status = 400;
2017-02-22 11:39:34 +01:00
return;
}
2023-01-13 05:40:33 +01:00
if (typeof password !== "string") {
2018-04-12 23:06:18 +02:00
ctx.status = 400;
2017-02-22 11:39:34 +01:00
return;
}
2023-01-13 05:40:33 +01:00
if (token != null && typeof token !== "string") {
2018-04-12 23:06:18 +02:00
ctx.status = 400;
2017-12-08 14:57:58 +01:00
return;
}
2016-12-28 23:49:51 +01:00
// Fetch user
2023-01-13 05:40:33 +01:00
const user = (await Users.findOneBy({
2018-03-29 07:48:47 +02:00
usernameLower: username.toLowerCase(),
host: IsNull(),
2023-01-13 05:40:33 +01:00
})) as ILocalUser;
2016-12-28 23:49:51 +01:00
Use PostgreSQL instead of MongoDB (#4572) * wip * Update note.ts * Update timeline.ts * Update core.ts * wip * Update generate-visibility-query.ts * wip * wip * wip * wip * wip * Update global-timeline.ts * wip * wip * wip * Update vote.ts * wip * wip * Update create.ts * wip * wip * wip * wip * wip * wip * wip * wip * wip * wip * wip * wip * Update files.ts * wip * wip * Update CONTRIBUTING.md * wip * wip * wip * wip * wip * wip * wip * wip * Update read-notification.ts * wip * wip * wip * wip * wip * wip * wip * Update cancel.ts * wip * wip * wip * Update show.ts * wip * wip * Update gen-id.ts * Update create.ts * Update id.ts * wip * wip * wip * wip * wip * wip * wip * Docker: Update files about Docker (#4599) * Docker: Use cache if files used by `yarn install` was not updated This patch reduces the number of times to installing node_modules. For example, `yarn install` step will be skipped when only ".config/default.yml" is updated. * Docker: Migrate MongoDB to Postgresql Misskey uses Postgresql as a database instead of Mongodb since version 11. * Docker: Uncomment about data persistence This patch will save a lot of databases. * wip * wip * wip * Update activitypub.ts * wip * wip * wip * Update logs.ts * wip * Update drive-file.ts * Update register.ts * wip * wip * Update mentions.ts * wip * wip * wip * Update recommendation.ts * wip * Update index.ts * wip * Update recommendation.ts * Doc: Update docker.ja.md and docker.en.md (#1) (#4608) Update how to set up misskey. * wip * :v: * wip * Update note.ts * Update postgre.ts * wip * wip * wip * wip * Update add-file.ts * wip * wip * wip * Clean up * Update logs.ts * wip * :pizza: * wip * Ad notes * wip * Update api-visibility.ts * Update note.ts * Update add-file.ts * tests * tests * Update postgre.ts * Update utils.ts * wip * wip * Refactor * wip * Refactor * wip * wip * Update show-users.ts * Update update-instance.ts * wip * Update feed.ts * Update outbox.ts * Update outbox.ts * Update user.ts * wip * Update list.ts * Update update-hashtag.ts * wip * Update update-hashtag.ts * Refactor * Update update.ts * wip * wip * :v: * clean up * docs * Update push.ts * wip * Update api.ts * wip * :v: * Update make-pagination-query.ts * :v: * Delete hashtags.ts * Update instances.ts * Update instances.ts * Update create.ts * Update search.ts * Update reversi-game.ts * Update signup.ts * Update user.ts * id * Update example.yml * :art: * objectid * fix * reversi * reversi * Fix bug of chart engine * Add test of chart engine * Improve test * Better testing * Improve chart engine * Refactor * Add test of chart engine * Refactor * Add chart test * Fix bug * コミットし忘れ * Refactoring * :v: * Add tests * Add test * Extarct note tests * Refactor * 存在しないユーザーにメンションできなくなっていた問題を修正 * Fix bug * Update update-meta.ts * Fix bug * Update mention.vue * Fix bug * Update meta.ts * Update CONTRIBUTING.md * Fix bug * Fix bug * Fix bug * Clean up * Clean up * Update notification.ts * Clean up * Add mute tests * Add test * Refactor * Add test * Fix test * Refactor * Refactor * Add tests * Update utils.ts * Update utils.ts * Fix test * Update package.json * Update update.ts * Update manifest.ts * Fix bug * Fix bug * Add test * :art: * Update endpoint permissions * Updaye permisison * Update person.ts #4299 * データベースと同期しないように * Fix bug * Fix bug * Update reversi-game.ts * Use a feature of Node v11.7.0 to extract a public key (#4644) * wip * wip * :v: * Refactoring #1540 * test * test * test * test * test * test * test * Fix bug * Fix test * :sushi: * wip * #4471 * Add test for #4335 * Refactor * Fix test * Add tests * :clock4: * Fix bug * Add test * Add test * rename * Fix bug
2019-04-07 14:50:36 +02:00
if (user == null) {
error(404, {
2023-01-13 05:40:33 +01:00
id: "6cc579cc-885d-43d8-95c2-b8c7fc963280",
2017-03-09 22:42:57 +01:00
});
2016-12-28 23:49:51 +01:00
return;
}
if (user.isSuspended) {
error(403, {
2023-01-13 05:40:33 +01:00
id: "e03a5f46-d309-4865-9b69-56282d94e1eb",
});
return;
}
const profile = await UserProfiles.findOneByOrFail({ userId: user.id });
2019-04-10 08:04:27 +02:00
2016-12-28 23:49:51 +01:00
// Compare password
const same = await comparePassword(password, profile.password!);
if (same && isOldAlgorithm(profile.password!)) {
profile.password = await hashPassword(password);
await UserProfiles.save(profile);
}
2016-12-28 23:49:51 +01:00
async function fail(status?: number, failure?: { id: string }) {
// Append signin history
2021-03-21 13:27:09 +01:00
await Signins.insert({
id: genId(),
createdAt: new Date(),
userId: user.id,
ip: ctx.ip,
headers: ctx.headers,
2021-12-09 15:58:30 +01:00
success: false,
});
2017-12-08 14:57:58 +01:00
2023-01-13 05:40:33 +01:00
error(
status || 500,
failure || { id: "4e30e80c-e338-45a0-8c8f-44455efa3b76" },
);
}
if (!profile.twoFactorEnabled) {
if (same) {
signin(ctx, user);
return;
} else {
await fail(403, {
2023-01-13 05:40:33 +01:00
id: "932c904e-9460-45b7-9ce6-7ed33be7eb2c",
});
return;
}
}
if (token) {
if (!same) {
await fail(403, {
2023-01-13 05:40:33 +01:00
id: "932c904e-9460-45b7-9ce6-7ed33be7eb2c",
});
return;
}
if (profile.twoFactorSecret == null) {
throw new Error("Attempted 2FA signin without 2FA enabled.");
}
const delta = OTPAuth.TOTP.validate({
secret: OTPAuth.Secret.fromBase32(profile.twoFactorSecret),
digits: 6,
token,
window: 1,
});
if (delta != null) {
2018-04-13 04:44:39 +02:00
signin(ctx, user);
return;
} else {
await fail(403, {
2023-01-13 05:40:33 +01:00
id: "cdf1235b-ac71-46d4-a3a6-84ccce48df6f",
});
return;
2017-12-08 14:57:58 +01:00
}
2019-07-05 00:48:12 +02:00
} else if (body.credentialId) {
2023-01-13 05:40:33 +01:00
if (!(same || profile.usePasswordLessLogin)) {
await fail(403, {
2023-01-13 05:40:33 +01:00
id: "932c904e-9460-45b7-9ce6-7ed33be7eb2c",
});
return;
}
2023-01-13 05:40:33 +01:00
const clientDataJSON = Buffer.from(body.clientDataJSON, "hex");
const clientData = JSON.parse(clientDataJSON.toString("utf-8"));
const challenge = await AttestationChallenges.findOneBy({
userId: user.id,
id: body.challengeId,
registrationChallenge: false,
2023-01-13 05:40:33 +01:00
challenge: hash(clientData.challenge).toString("hex"),
2017-03-09 22:42:57 +01:00
});
if (!challenge) {
await fail(403, {
2023-01-13 05:40:33 +01:00
id: "2715a88a-2125-4013-932f-aa6fe72792da",
});
return;
}
await AttestationChallenges.delete({
userId: user.id,
2021-12-09 15:58:30 +01:00
id: body.challengeId,
});
if (new Date().getTime() - challenge.createdAt.getTime() >= 5 * 60 * 1000) {
await fail(403, {
2023-01-13 05:40:33 +01:00
id: "2715a88a-2125-4013-932f-aa6fe72792da",
});
return;
}
const securityKey = await UserSecurityKeys.findOneBy({
id: Buffer.from(
2023-01-13 05:40:33 +01:00
body.credentialId.replace(/-/g, "+").replace(/_/g, "/"),
"base64",
).toString("hex"),
});
if (!securityKey) {
await fail(403, {
2023-01-13 05:40:33 +01:00
id: "66269679-aeaf-4474-862b-eb761197e046",
});
return;
}
const isValid = verifyLogin({
2023-01-13 05:40:33 +01:00
publicKey: Buffer.from(securityKey.publicKey, "hex"),
authenticatorData: Buffer.from(body.authenticatorData, "hex"),
clientDataJSON,
clientData,
2023-01-13 05:40:33 +01:00
signature: Buffer.from(body.signature, "hex"),
2021-12-09 15:58:30 +01:00
challenge: challenge.challenge,
});
if (isValid) {
signin(ctx, user);
return;
} else {
await fail(403, {
2023-01-13 05:40:33 +01:00
id: "93b86c4b-72f9-40eb-9815-798928603d1e",
});
return;
}
2019-07-05 00:48:12 +02:00
} else {
2023-01-13 05:40:33 +01:00
if (!(same || profile.usePasswordLessLogin)) {
await fail(403, {
2023-01-13 05:40:33 +01:00
id: "932c904e-9460-45b7-9ce6-7ed33be7eb2c",
});
return;
}
const keys = await UserSecurityKeys.findBy({
2021-12-09 15:58:30 +01:00
userId: user.id,
2019-07-05 00:48:12 +02:00
});
if (keys.length === 0) {
await fail(403, {
2023-01-13 05:40:33 +01:00
id: "f27fd449-9af4-4841-9249-1f989b9fa4a4",
2019-07-05 00:48:12 +02:00
});
return;
2019-07-05 00:48:12 +02:00
}
// 32 byte challenge
2023-01-13 05:40:33 +01:00
const challenge = randomBytes(32)
.toString("base64")
.replace(/=/g, "")
.replace(/\+/g, "-")
.replace(/\//g, "_");
2019-07-05 00:48:12 +02:00
const challengeId = genId();
2021-03-21 13:27:09 +01:00
await AttestationChallenges.insert({
2019-07-05 00:48:12 +02:00
userId: user.id,
id: challengeId,
2023-01-13 05:40:33 +01:00
challenge: hash(Buffer.from(challenge, "utf-8")).toString("hex"),
2019-07-05 00:48:12 +02:00
createdAt: new Date(),
2021-12-09 15:58:30 +01:00
registrationChallenge: false,
2019-07-05 00:48:12 +02:00
});
ctx.body = {
challenge,
challengeId,
2023-01-13 05:40:33 +01:00
securityKeys: keys.map((key) => ({
2021-12-09 15:58:30 +01:00
id: key.id,
})),
2019-07-05 00:48:12 +02:00
};
ctx.status = 200;
return;
2016-12-28 23:49:51 +01:00
}
// never get here
2016-12-28 23:49:51 +01:00
};