mirror of
https://github.com/onsonr/sonr.git
synced 2025-03-10 21:09:11 +00:00
- **refactor: move session-related code to middleware package** - **refactor: update PKL build process and adjust related configurations** - **feat: integrate base.cosmos.v1 Genesis module** - **refactor: pass session context to modal rendering functions** - **refactor: move nebula package to app directory and update templ version** - **refactor: Move home section video view to dedicated directory** - **refactor: remove unused views file** - **refactor: move styles and UI components to global scope** - **refactor: Rename images.go to cdn.go** - **feat: Add Empty State Illustrations** - **refactor: Consolidate Vault Index Logic** - **fix: References to App.wasm and remove Vault Directory embedded CDN files** - **refactor: Move CDN types to Models** - **fix: Correct line numbers in templ error messages for arch_templ.go** - **refactor: use common types for peer roles** - **refactor: move common types and ORM to a shared package** - **fix: Config import dwn** - **refactor: move nebula directory to app** - **feat: Rebuild nebula** - **fix: correct file paths in panels templates** - **feat: Remove duplicate types** - **refactor: Move dwn to pkg/core** - **refactor: Binary Structure** - **feat: Introduce Crypto Pkg** - **fix: Broken Process Start** - **feat: Update pkg/* structure** - **feat: Refactor PKL Structure** - **build: update pkl build process** - **chore: Remove Empty Files** - **refactor: remove unused macaroon package** - **feat: Add WebAwesome Components** - **refactor: consolidate build and generation tasks into a single taskfile, remove redundant makefile targets** - **refactor: refactor server and move components to pkg/core/dwn** - **build: update go modules** - **refactor: move gateway logic into dedicated hway command** - **feat: Add KSS (Krawczyk-Song-Song) MPC cryptography module** - **feat: Implement MPC-based JWT signing and UCAN token generation** - **feat: add support for MPC-based JWT signing** - **feat: Implement MPC-based UCAN capabilities for smart accounts** - **feat: add address field to keyshareSource** - **feat: Add comprehensive MPC test suite for keyshares, UCAN tokens, and token attenuations** - **refactor: improve MPC keyshare management and signing process** - **feat: enhance MPC capability hierarchy documentation** - **refactor: rename GenerateKeyshares function to NewKeyshareSource for clarity** - **refactor: remove unused Ethereum address computation** - **feat: Add HasHandle and IsAuthenticated methods to HTTPContext** - **refactor: Add context.Context support to session HTTPContext** - **refactor: Resolve context interface conflicts in HTTPContext** - **feat: Add session ID context key and helper functions** - **feat: Update WebApp Page Rendering** - **refactor: Simplify context management by using single HTTPContext key** - **refactor: Simplify HTTPContext creation and context management in session middleware** - **refactor: refactor session middleware to use a single data structure** - **refactor: Simplify HTTPContext implementation and session data handling** - **refactor: Improve session context handling and prevent nil pointer errors** - **refactor: Improve session context handling with nil safety and type support** - **refactor: improve session data injection** - **feat: add full-screen modal component and update registration flow** - **chore: add .air.toml to .gitignore** - **feat: add Air to devbox and update dependencies**
192 lines
7.4 KiB
Plaintext
192 lines
7.4 KiB
Plaintext
package credentials
|
|
|
|
var credentialsHandle = templ.NewOnceHandle()
|
|
|
|
// Types for credential data
|
|
type PublicKeyCredentialCreationOptions struct {
|
|
Challenge string `json:"challenge"`
|
|
RpName string `json:"rpName"`
|
|
RpID string `json:"rpId"`
|
|
UserID string `json:"userId"`
|
|
UserName string `json:"userName"`
|
|
UserDisplayName string `json:"userDisplayName"`
|
|
Timeout int `json:"timeout,omitempty"`
|
|
AttestationType string `json:"attestationType,omitempty"`
|
|
}
|
|
|
|
type PublicKeyCredentialRequestOptions struct {
|
|
Challenge string `json:"challenge"`
|
|
RpID string `json:"rpId"`
|
|
Timeout int `json:"timeout,omitempty"`
|
|
UserVerification string `json:"userVerification,omitempty"`
|
|
AllowCredentials []CredentialDescriptor `json:"allowCredentials,omitempty"`
|
|
}
|
|
|
|
type CredentialDescriptor struct {
|
|
Type string `json:"type"`
|
|
ID string `json:"id"`
|
|
}
|
|
|
|
// Base credentials script template
|
|
templ CredentialsScripts() {
|
|
@credentialsHandle.Once() {
|
|
<script type="text/javascript">
|
|
// Check if WebAuthn is supported
|
|
async function isWebAuthnSupported() {
|
|
return window.PublicKeyCredential !== undefined;
|
|
}
|
|
|
|
// Create credentials
|
|
async function createCredential(options) {
|
|
try {
|
|
const publicKey = {
|
|
challenge: base64URLDecode(options.challenge),
|
|
rp: {
|
|
name: options.rpName,
|
|
id: options.rpId,
|
|
},
|
|
user: {
|
|
id: base64URLDecode(options.userId),
|
|
name: options.userName,
|
|
displayName: options.userDisplayName,
|
|
},
|
|
pubKeyCredParams: [{alg: -7, type: "public-key"}],
|
|
timeout: options.timeout || 60000,
|
|
attestation: options.attestationType || "none",
|
|
};
|
|
|
|
const credential = await navigator.credentials.create({
|
|
publicKey: publicKey
|
|
});
|
|
|
|
return {
|
|
id: credential.id,
|
|
rawId: arrayBufferToBase64URL(credential.rawId),
|
|
type: credential.type,
|
|
response: {
|
|
attestationObject: arrayBufferToBase64URL(credential.response.attestationObject),
|
|
clientDataJSON: arrayBufferToBase64URL(credential.response.clientDataJSON),
|
|
}
|
|
};
|
|
} catch (err) {
|
|
console.error('Error creating credential:', err);
|
|
throw err;
|
|
}
|
|
}
|
|
|
|
// Get credentials
|
|
async function getCredential(options) {
|
|
try {
|
|
const publicKey = {
|
|
challenge: base64URLDecode(options.challenge),
|
|
rpId: options.rpId,
|
|
timeout: options.timeout || 60000,
|
|
userVerification: options.userVerification || "preferred",
|
|
};
|
|
|
|
if (options.allowCredentials) {
|
|
publicKey.allowCredentials = options.allowCredentials.map(cred => ({
|
|
type: cred.type,
|
|
id: base64URLDecode(cred.id),
|
|
}));
|
|
}
|
|
|
|
const assertion = await navigator.credentials.get({
|
|
publicKey: publicKey
|
|
});
|
|
|
|
return {
|
|
id: assertion.id,
|
|
rawId: arrayBufferToBase64URL(assertion.rawId),
|
|
type: assertion.type,
|
|
response: {
|
|
authenticatorData: arrayBufferToBase64URL(assertion.response.authenticatorData),
|
|
clientDataJSON: arrayBufferToBase64URL(assertion.response.clientDataJSON),
|
|
signature: arrayBufferToBase64URL(assertion.response.signature),
|
|
userHandle: assertion.response.userHandle ? arrayBufferToBase64URL(assertion.response.userHandle) : null
|
|
}
|
|
};
|
|
} catch (err) {
|
|
console.error('Error getting credential:', err);
|
|
throw err;
|
|
}
|
|
}
|
|
|
|
// Utility functions for base64URL encoding/decoding
|
|
function base64URLDecode(base64url) {
|
|
const padding = '='.repeat((4 - base64url.length % 4) % 4);
|
|
const base64 = (base64url + padding)
|
|
.replace(/\-/g, '+')
|
|
.replace(/_/g, '/');
|
|
const rawData = window.atob(base64);
|
|
const array = new Uint8Array(rawData.length);
|
|
for (let i = 0; i < rawData.length; i++) {
|
|
array[i] = rawData.charCodeAt(i);
|
|
}
|
|
return array.buffer;
|
|
}
|
|
|
|
function arrayBufferToBase64URL(buffer) {
|
|
let binary = '';
|
|
const bytes = new Uint8Array(buffer);
|
|
for (let i = 0; i < bytes.byteLength; i++) {
|
|
binary += String.fromCharCode(bytes[i]);
|
|
}
|
|
const base64 = window.btoa(binary);
|
|
return base64
|
|
.replace(/\+/g, '-')
|
|
.replace(/\//g, '_')
|
|
.replace(/=/g, '');
|
|
}
|
|
</script>
|
|
}
|
|
}
|
|
|
|
// Template for creating credentials
|
|
templ CreateCredential(options PublicKeyCredentialCreationOptions) {
|
|
@CredentialsScripts()
|
|
<script>
|
|
(async () => {
|
|
try {
|
|
if (!await isWebAuthnSupported()) {
|
|
throw new Error("WebAuthn is not supported in this browser");
|
|
}
|
|
const options = { templ.JSONString(options) };
|
|
const credential = await createCredential(options);
|
|
// Dispatch event with credential data
|
|
window.dispatchEvent(new CustomEvent('credentialCreated', {
|
|
detail: credential
|
|
}));
|
|
} catch (err) {
|
|
window.dispatchEvent(new CustomEvent('credentialError', {
|
|
detail: err.message
|
|
}));
|
|
}
|
|
})();
|
|
</script>
|
|
}
|
|
|
|
// Template for getting credentials
|
|
templ GetCredential(options PublicKeyCredentialRequestOptions) {
|
|
@CredentialsScripts()
|
|
<script>
|
|
(async () => {
|
|
try {
|
|
if (!await isWebAuthnSupported()) {
|
|
throw new Error("WebAuthn is not supported in this browser");
|
|
}
|
|
const options = { templ.JSONString(options) };
|
|
const credential = await getCredential(options);
|
|
// Dispatch event with credential data
|
|
window.dispatchEvent(new CustomEvent('credentialRetrieved', {
|
|
detail: credential
|
|
}));
|
|
} catch (err) {
|
|
window.dispatchEvent(new CustomEvent('credentialError', {
|
|
detail: err.message
|
|
}));
|
|
}
|
|
})();
|
|
</script>
|
|
}
|