UNPKG

aladinnetwork-blockstack

Version:

The Aladin Javascript library for authentication, identity, and storage.

240 lines (218 loc) 9.04 kB
import 'cross-fetch/polyfill' // @ts-ignore: Could not find a declaration file for module import { TokenSigner, SECP256K1Client } from 'jsontokens' import { makeECPrivateKey, publicKeyToAddress } from '../keys' import { makeUUID4, nextMonth, getGlobalObject } from '../utils' import { makeDIDFromAddress } from '../dids' import { encryptECIES, decryptECIES } from '../encryption/ec' import { Logger } from '../logger' import { DEFAULT_SCOPE, AuthScope } from './authConstants' import { UserSession } from './userSession' const VERSION = '1.3.1' type AuthMetadata = { email?: string, profileUrl?: string } /** * Generates a ECDSA keypair to * use as the ephemeral app transit private key * @param {SessionData} session - session object in which key will be stored * @return {String} the hex encoded private key * @private * @ignore */ export function generateTransitKey() { const transitKey = makeECPrivateKey() return transitKey } /** * Generates an authentication request that can be sent to the Aladin * browser for the user to approve sign in. This authentication request can * then be used for sign in by passing it to the `redirectToSignInWithAuthRequest` * method. * * *Note: This method should only be used if you want to roll your own authentication * flow. Typically you'd use `redirectToSignIn` which takes care of this * under the hood.* * * @param {String} transitPrivateKey - hex encoded transit private key * @param {String} redirectURI - location to redirect user to after sign in approval * @param {String} manifestURI - location of this app's manifest file * @param {Array<String>} scopes - the permissions this app is requesting * @param {String} appDomain - the origin of this app * @param {Number} expiresAt - the time at which this request is no longer valid * @param {Object} extraParams - Any extra parameters you'd like to pass to the authenticator. * Use this to pass options that aren't part of the Aladin auth spec, but might be supported * by special authenticators. * @return {String} the authentication request */ export function makeAuthRequest( transitPrivateKey?: string, redirectURI?: string, manifestURI?: string, scopes: Array<AuthScope | string> = DEFAULT_SCOPE.slice(), appDomain?: string, expiresAt: number = nextMonth().getTime(), extraParams: any = {} ): string { if (!transitPrivateKey) { transitPrivateKey = new UserSession().generateAndStoreTransitKey() } const getWindowOrigin = (paramName: string) => { const location = getGlobalObject('location', { throwIfUnavailable: true, usageDesc: `makeAuthRequest([${paramName}=undefined])` }) return location.origin } if (!redirectURI) { redirectURI = `${getWindowOrigin('redirectURI')}/` } if (!manifestURI) { manifestURI = `${getWindowOrigin('manifestURI')}/manifest.json` } if (!appDomain) { appDomain = getWindowOrigin('appDomain') } /* Create the payload */ const payload = Object.assign({}, extraParams, { jti: makeUUID4(), iat: Math.floor(new Date().getTime() / 1000), // JWT times are in seconds exp: Math.floor(expiresAt / 1000), // JWT times are in seconds iss: null, public_keys: [], domain_name: appDomain, manifest_uri: manifestURI, redirect_uri: redirectURI, version: VERSION, do_not_include_profile: true, supports_hub_url: true, scopes }) Logger.info(`aladin.js: generating v${VERSION} auth request`) /* Convert the private key to a public key to an issuer */ const publicKey = SECP256K1Client.derivePublicKey(transitPrivateKey) payload.public_keys = [publicKey] const address = publicKeyToAddress(publicKey) payload.iss = makeDIDFromAddress(address) /* Sign and return the token */ const tokenSigner = new TokenSigner('ES256k', transitPrivateKey) const token = tokenSigner.sign(payload) return token } /** * Encrypts the private key for decryption by the given * public key. * @param {String} publicKey [description] * @param {String} privateKey [description] * @return {String} hex encoded ciphertext * @private * @ignore */ export function encryptPrivateKey(publicKey: string, privateKey: string): string | null { const encryptedObj = encryptECIES(publicKey, privateKey) const encryptedJSON = JSON.stringify(encryptedObj) return (Buffer.from(encryptedJSON)).toString('hex') } /** * Decrypts the hex encrypted private key * @param {String} privateKey the private key corresponding to the public * key for which the ciphertext was encrypted * @param {String} hexedEncrypted the ciphertext * @return {String} the decrypted private key * @throws {Error} if unable to decrypt * * @private * @ignore */ export function decryptPrivateKey(privateKey: string, hexedEncrypted: string): string | null { const unhexedString = Buffer.from(hexedEncrypted, 'hex').toString() const encryptedObj = JSON.parse(unhexedString) const decrypted = decryptECIES(privateKey, encryptedObj) if (typeof decrypted !== 'string') { throw new Error('Unable to correctly decrypt private key') } else { return decrypted } } /** * Generates a signed authentication response token for an app. This * token is sent back to apps which use contents to access the * resources and data requested by the app. * * @param {String} privateKey the identity key of the Aladin ID generating * the authentication response * @param {Object} profile the profile object for the Aladin ID * @param {String} username the username of the Aladin ID if any, otherwise `null` * @param {AuthMetadata} metadata an object containing metadata sent as part of the authentication * response including `email` if requested and available and a URL to the profile * @param {String} coreToken core session token when responding to a legacy auth request * or `null` for current direct to gaia authentication requests * @param {String} appPrivateKey the application private key. This private key is * unique and specific for every Aladin ID and application combination. * @param {Number} expiresAt an integer in the same format as * `new Date().getTime()`, milliseconds since the Unix epoch * @param {String} transitPublicKey the public key provide by the app * in its authentication request with which secrets will be encrypted * @param {String} hubUrl URL to the write path of the user's Gaia hub * @param {String} aladinAPIUrl URL to the API endpoint to use * @param {String} associationToken JWT that binds the app key to the identity key * @return {String} signed and encoded authentication response token * @private * @ignore */ export function makeAuthResponse(privateKey: string, profile: {} = {}, username: string = null, metadata: AuthMetadata, coreToken: string = null, appPrivateKey: string = null, expiresAt: number = nextMonth().getTime(), transitPublicKey: string = null, hubUrl: string = null, aladinAPIUrl: string = null, associationToken: string = null): string { /* Convert the private key to a public key to an issuer */ const publicKey = SECP256K1Client.derivePublicKey(privateKey) const address = publicKeyToAddress(publicKey) /* See if we should encrypt with the transit key */ let privateKeyPayload = appPrivateKey let coreTokenPayload = coreToken let additionalProperties = {} if (appPrivateKey !== undefined && appPrivateKey !== null) { Logger.info(`aladin.js: generating v${VERSION} auth response`) if (transitPublicKey !== undefined && transitPublicKey !== null) { privateKeyPayload = encryptPrivateKey(transitPublicKey, appPrivateKey) if (coreToken !== undefined && coreToken !== null) { coreTokenPayload = encryptPrivateKey(transitPublicKey, coreToken) } } additionalProperties = { email: metadata.email ? metadata.email : null, profile_url: metadata.profileUrl ? metadata.profileUrl : null, hubUrl, aladinAPIUrl, associationToken, version: VERSION } } else { Logger.info('aladin.js: generating legacy auth response') } /* Create the payload */ const payload = Object.assign({}, { jti: makeUUID4(), iat: Math.floor(new Date().getTime() / 1000), // JWT times are in seconds exp: Math.floor(expiresAt / 1000), // JWT times are in seconds iss: makeDIDFromAddress(address), private_key: privateKeyPayload, public_keys: [publicKey], profile, username, core_token: coreTokenPayload }, additionalProperties) /* Sign and return the token */ const tokenSigner = new TokenSigner('ES256k', privateKey) return tokenSigner.sign(payload) }