app-MAIL-temp/app/dashboard/views/fido_setup.py

103 lines
3.4 KiB
Python
Raw Normal View History

2020-05-05 10:32:49 +02:00
import json
import secrets
2020-05-07 17:49:29 +02:00
import uuid
2020-05-05 10:32:49 +02:00
2020-05-07 17:49:29 +02:00
import webauthn
2020-05-05 10:32:49 +02:00
from flask import render_template, flash, redirect, url_for, session
from flask_login import login_required, current_user
from flask_wtf import FlaskForm
from wtforms import HiddenField, validators
2020-05-07 17:49:29 +02:00
from app.config import RP_ID, URL
2020-05-05 10:32:49 +02:00
from app.dashboard.base import dashboard_bp
from app.extensions import db
from app.log import LOG
class FidoTokenForm(FlaskForm):
sk_assertion = HiddenField("sk_assertion", validators=[validators.DataRequired()])
@dashboard_bp.route("/fido_setup", methods=["GET", "POST"])
@login_required
def fido_setup():
2020-05-07 14:32:52 +02:00
if current_user.fido_enabled():
2020-05-05 10:32:49 +02:00
flash("You have already registered your security key", "warning")
return redirect(url_for("dashboard.index"))
if not current_user.can_use_fido:
flash(
"This feature is currently in invitation-only beta. Please send us an email if you want to try",
"warning",
)
return redirect(url_for("dashboard.index"))
2020-05-05 10:32:49 +02:00
fido_token_form = FidoTokenForm()
2020-05-05 10:58:42 +02:00
# Handling POST requests
if fido_token_form.validate_on_submit():
try:
sk_assertion = json.loads(fido_token_form.sk_assertion.data)
except Exception as e:
2020-05-07 11:53:28 +02:00
flash("Key registration failed. Error: Invalid Payload", "warning")
2020-05-05 10:58:42 +02:00
return redirect(url_for("dashboard.index"))
2020-05-07 11:53:28 +02:00
fido_uuid = session["fido_uuid"]
challenge = session["fido_challenge"]
2020-05-05 10:58:42 +02:00
fido_reg_response = webauthn.WebAuthnRegistrationResponse(
2020-05-07 11:33:24 +02:00
RP_ID,
2020-05-07 14:34:17 +02:00
URL,
2020-05-05 10:58:42 +02:00
sk_assertion,
challenge,
2020-05-07 11:53:28 +02:00
trusted_attestation_cert_required=False,
none_attestation_permitted=True,
)
2020-05-05 10:58:42 +02:00
try:
fido_credential = fido_reg_response.verify()
except Exception as e:
2020-05-07 11:53:28 +02:00
LOG.error(f"An error occurred in WebAuthn registration process: {e}")
flash("Key registration failed.", "warning")
2020-05-05 10:58:42 +02:00
return redirect(url_for("dashboard.index"))
2020-05-05 14:03:29 +02:00
current_user.fido_pk = str(fido_credential.public_key, "utf-8")
current_user.fido_uuid = fido_uuid
2020-05-05 12:16:52 +02:00
current_user.fido_sign_count = fido_credential.sign_count
2020-05-05 10:58:42 +02:00
current_user.fido_credential_id = str(fido_credential.credential_id, "utf-8")
db.session.commit()
flash("Security key has been activated", "success")
return redirect(url_for("dashboard.index"))
2020-05-07 11:53:28 +02:00
2020-05-07 11:31:42 +02:00
# Prepare information for key registration process
2020-05-05 10:32:49 +02:00
fido_uuid = str(uuid.uuid4())
challenge = secrets.token_urlsafe(32)
credential_create_options = webauthn.WebAuthnMakeCredentialOptions(
2020-05-07 11:53:28 +02:00
challenge,
"SimpleLogin",
RP_ID,
fido_uuid,
current_user.email,
current_user.name if current_user.name else current_user.email,
2020-05-07 11:53:28 +02:00
False,
attestation="none",
user_verification="discouraged",
2020-05-07 11:53:28 +02:00
)
2020-05-05 10:32:49 +02:00
# Don't think this one should be used, but it's not configurable by arguments
# https://www.w3.org/TR/webauthn/#sctn-location-extension
registration_dict = credential_create_options.registration_dict
2020-05-07 11:53:28 +02:00
del registration_dict["extensions"]["webauthn.loc"]
2020-05-05 10:32:49 +02:00
2020-05-07 11:53:28 +02:00
session["fido_uuid"] = fido_uuid
session["fido_challenge"] = challenge.rstrip("=")
2020-05-05 10:32:49 +02:00
return render_template(
2020-05-07 11:53:28 +02:00
"dashboard/fido_setup.html",
fido_token_form=fido_token_form,
credential_create_options=registration_dict,
2020-05-05 10:32:49 +02:00
)