mirror of
https://github.com/onsonr/sonr.git
synced 2025-03-11 13:29:12 +00:00
refactor: Improve WebAuthn credential handling and validation in register finish route
This commit is contained in:
parent
38096db2dd
commit
27d4dfcdfd
@ -42,35 +42,76 @@ func HandleRegisterStart(c echo.Context) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func HandleRegisterFinish(c echo.Context) error {
|
func HandleRegisterFinish(c echo.Context) error {
|
||||||
credB64 := c.FormValue("credential")
|
// Get the raw credential JSON string
|
||||||
|
credentialJSON := c.FormValue("credential")
|
||||||
// Decode base64 credential
|
if credentialJSON == "" {
|
||||||
credJSON, err := base64.StdEncoding.DecodeString(credB64)
|
return echo.NewHTTPError(http.StatusBadRequest, "missing credential data")
|
||||||
if err != nil {
|
|
||||||
return echo.NewHTTPError(http.StatusBadRequest, "invalid credential encoding")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Unmarshal the complete credential
|
// Define the credential structure matching our frontend data
|
||||||
var cred struct {
|
var cred struct {
|
||||||
ID string `json:"id"`
|
ID string `json:"id"`
|
||||||
Type string `json:"type"`
|
RawID string `json:"rawId"`
|
||||||
AuthenticatorAttachment string `json:"authenticatorAttachment"`
|
Type string `json:"type"`
|
||||||
ClientExtensionResults map[string]interface{} `json:"clientExtensionResults"`
|
AuthenticatorAttachment string `json:"authenticatorAttachment"`
|
||||||
Response struct {
|
Transports []string `json:"transports"`
|
||||||
|
ClientExtensionResults map[string]interface{} `json:"clientExtensionResults"`
|
||||||
|
Response struct {
|
||||||
AttestationObject string `json:"attestationObject"`
|
AttestationObject string `json:"attestationObject"`
|
||||||
ClientDataJSON string `json:"clientDataJSON"`
|
ClientDataJSON string `json:"clientDataJSON"`
|
||||||
} `json:"response"`
|
} `json:"response"`
|
||||||
}
|
}
|
||||||
if err := json.Unmarshal(credJSON, &cred); err != nil {
|
|
||||||
return echo.NewHTTPError(http.StatusBadRequest, "invalid credential format")
|
// Unmarshal the credential JSON
|
||||||
|
if err := json.Unmarshal([]byte(credentialJSON), &cred); err != nil {
|
||||||
|
return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("invalid credential format: %v", err))
|
||||||
}
|
}
|
||||||
|
|
||||||
// Log credential details
|
// Validate required fields
|
||||||
fmt.Printf("Credential ID: %s\n", cred.ID)
|
if cred.ID == "" || cred.RawID == "" {
|
||||||
fmt.Printf("Credential Type: %s\n", cred.Type)
|
return echo.NewHTTPError(http.StatusBadRequest, "missing credential ID")
|
||||||
fmt.Printf("Authenticator Attachment: %s\n", cred.AuthenticatorAttachment)
|
}
|
||||||
fmt.Printf("Attestation Object Length: %d\n", len(cred.Response.AttestationObject))
|
if cred.Type != "public-key" {
|
||||||
fmt.Printf("Client Data JSON Length: %d\n", len(cred.Response.ClientDataJSON))
|
return echo.NewHTTPError(http.StatusBadRequest, "invalid credential type")
|
||||||
|
}
|
||||||
|
if cred.Response.AttestationObject == "" || cred.Response.ClientDataJSON == "" {
|
||||||
|
return echo.NewHTTPError(http.StatusBadRequest, "missing attestation data")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Decode attestation object and client data
|
||||||
|
attestationObj, err := base64.RawURLEncoding.DecodeString(cred.Response.AttestationObject)
|
||||||
|
if err != nil {
|
||||||
|
return echo.NewHTTPError(http.StatusBadRequest, "invalid attestation object encoding")
|
||||||
|
}
|
||||||
|
|
||||||
|
clientData, err := base64.RawURLEncoding.DecodeString(cred.Response.ClientDataJSON)
|
||||||
|
if err != nil {
|
||||||
|
return echo.NewHTTPError(http.StatusBadRequest, "invalid client data encoding")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Log detailed credential information
|
||||||
|
fmt.Printf("Credential Details:\n"+
|
||||||
|
"ID: %s\n"+
|
||||||
|
"Raw ID: %s\n"+
|
||||||
|
"Type: %s\n"+
|
||||||
|
"Authenticator Attachment: %s\n"+
|
||||||
|
"Transports: %v\n"+
|
||||||
|
"Attestation Object Size: %d bytes\n"+
|
||||||
|
"Client Data Size: %d bytes\n",
|
||||||
|
cred.ID,
|
||||||
|
cred.RawID,
|
||||||
|
cred.Type,
|
||||||
|
cred.AuthenticatorAttachment,
|
||||||
|
cred.Transports,
|
||||||
|
len(attestationObj),
|
||||||
|
len(clientData))
|
||||||
|
|
||||||
|
// TODO: Verify the attestation and store the credential
|
||||||
|
// This is where you would:
|
||||||
|
// 1. Verify the attestation signature
|
||||||
|
// 2. Check the origin in client data
|
||||||
|
// 3. Verify the challenge
|
||||||
|
// 4. Store the credential for future authentications
|
||||||
|
|
||||||
return response.TemplEcho(c, register.LoadingVaultView())
|
return response.TemplEcho(c, register.LoadingVaultView())
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user