UNPKG

aladinnetwork-blockstack

Version:

The Aladin Javascript library for authentication, identity, and storage.

277 lines (260 loc) 8.57 kB
// @ts-ignore: Could not find a declaration file for module import { decodeToken, TokenVerifier } from 'jsontokens' import { getAddressFromDID } from '../dids' import { publicKeyToAddress } from '../keys' import { isSameOriginAbsoluteUrl } from '../utils' import { fetchPrivate } from '../fetchUtil' import { fetchAppManifest } from './authProvider' /** * Checks if the ES256k signature on passed `token` match the claimed public key * in the payload key `public_keys`. * * @param {String} token encoded and signed authentication token * @return {Boolean} Returns `true` if the signature matches the claimed public key * @throws {Error} if `token` contains multiple public keys * @private * @ignore */ export function doSignaturesMatchPublicKeys(token: string) { const payload = decodeToken(token).payload const publicKeys = payload.public_keys if (publicKeys.length === 1) { const publicKey = publicKeys[0] try { const tokenVerifier = new TokenVerifier('ES256k', publicKey) const signatureVerified = tokenVerifier.verify(token) if (signatureVerified) { return true } else { return false } } catch (e) { return false } } else { throw new Error('Multiple public keys are not supported') } } /** * Makes sure that the identity address portion of * the decentralized identifier passed in the issuer `iss` * key of the token matches the public key * * @param {String} token encoded and signed authentication token * @return {Boolean} if the identity address and public keys match * @throws {Error} if ` token` has multiple public keys * @private * @ignore */ export function doPublicKeysMatchIssuer(token: string) { const payload = decodeToken(token).payload const publicKeys = payload.public_keys const addressFromIssuer = getAddressFromDID(payload.iss) if (publicKeys.length === 1) { const addressFromPublicKeys = publicKeyToAddress(publicKeys[0]) if (addressFromPublicKeys === addressFromIssuer) { return true } } else { throw new Error('Multiple public keys are not supported') } return false } /** * Looks up the identity address that owns the claimed username * in `token` using the lookup endpoint provided in `nameLookupURL` * to determine if the username is owned by the identity address * that matches the claimed public key * * @param {String} token encoded and signed authentication token * @param {String} nameLookupURL a URL to the name lookup endpoint of the Aladin Core API * @return {Promise<Boolean>} returns a `Promise` that resolves to * `true` if the username is owned by the public key, otherwise the * `Promise` resolves to `false` * @private * @ignore */ export function doPublicKeysMatchUsername(token: string, nameLookupURL: string) { return Promise.resolve().then(() => { const payload = decodeToken(token).payload if (!payload.username) { return true } if (payload.username === null) { return true } if (nameLookupURL === null) { return false } const username = payload.username const url = `${nameLookupURL.replace(/\/$/, '')}/${username}` return fetchPrivate(url) .then(response => response.text()) .then((responseText) => { const responseJSON = JSON.parse(responseText) if (responseJSON.hasOwnProperty('address')) { const nameOwningAddress = responseJSON.address const addressFromIssuer = getAddressFromDID(payload.iss) if (nameOwningAddress === addressFromIssuer) { return true } else { return false } } else { return false } }) }).catch(() => false) } /** * Checks if the if the token issuance time and date is after the * current time and date. * * @param {String} token encoded and signed authentication token * @return {Boolean} `true` if the token was issued after the current time, * otherwise returns `false` * @private * @ignore */ export function isIssuanceDateValid(token: string) { const payload = decodeToken(token).payload if (payload.iat) { if (typeof payload.iat !== 'number') { return false } const issuedAt = new Date(payload.iat * 1000) // JWT times are in seconds if (new Date().getTime() < issuedAt.getTime()) { return false } else { return true } } else { return true } } /** * Checks if the expiration date of the `token` is before the current time * @param {String} token encoded and signed authentication token * @return {Boolean} `true` if the `token` has not yet expired, `false` * if the `token` has expired * * @private * @ignore */ export function isExpirationDateValid(token: string) { const payload = decodeToken(token).payload if (payload.exp) { if (typeof payload.exp !== 'number') { return false } const expiresAt = new Date(payload.exp * 1000) // JWT times are in seconds if (new Date().getTime() > expiresAt.getTime()) { return false } else { return true } } else { return true } } /** * Makes sure the `manifest_uri` is a same origin absolute URL. * @param {String} token encoded and signed authentication token * @return {Boolean} `true` if valid, otherwise `false` * @private * @ignore */ export function isManifestUriValid(token: string) { const payload = decodeToken(token).payload return isSameOriginAbsoluteUrl(payload.domain_name, payload.manifest_uri) } /** * Makes sure the `redirect_uri` is a same origin absolute URL. * @param {String} token encoded and signed authentication token * @return {Boolean} `true` if valid, otherwise `false` * @private * @ignore */ export function isRedirectUriValid(token: string) { const payload = decodeToken(token).payload return isSameOriginAbsoluteUrl(payload.domain_name, payload.redirect_uri) } /** * Verify authentication request is valid. This function performs a number * of checks on the authentication request token: * * Checks that `token` has a valid issuance date & is not expired * * Checks that `token` has a valid signature that matches the public key it claims * * Checks that both the manifest and redirect URLs are absolute and conform to * the same origin policy * * @param {String} token encoded and signed authentication request token * @return {Promise} that resolves to true if the auth request * is valid and false if it does not. It rejects with a String if the * token is not signed * @private * @ignore */ export function verifyAuthRequest(token: string) { return Promise.resolve().then(() => { if (decodeToken(token).header.alg === 'none') { throw new Error('Token must be signed in order to be verified') } }).then(() => Promise.all([ isExpirationDateValid(token), isIssuanceDateValid(token), doSignaturesMatchPublicKeys(token), doPublicKeysMatchIssuer(token), isManifestUriValid(token), isRedirectUriValid(token) ])).then((values) => { if (values.every(Boolean)) { return true } else { return false } }) } /** * Verify the authentication request is valid and * fetch the app manifest file if valid. Otherwise, reject the promise. * @param {String} token encoded and signed authentication request token * @return {Promise} that resolves to the app manifest file in JSON format * or rejects if the auth request or app manifest file is invalid * @private * @ignore */ export function verifyAuthRequestAndLoadManifest(token: string) { return Promise.resolve().then(() => verifyAuthRequest(token) .then((valid) => { if (valid) { return fetchAppManifest(token) } else { return Promise.reject() } })) } /** * Verify the authentication response is valid * @param {String} token the authentication response token * @param {String} nameLookupURL the url use to verify owner of a username * @return {Promise} that resolves to true if auth response * is valid and false if it does not * @private * @ignore */ export function verifyAuthResponse(token: string, nameLookupURL: string) { return Promise.all([ isExpirationDateValid(token), isIssuanceDateValid(token), doSignaturesMatchPublicKeys(token), doPublicKeysMatchIssuer(token), doPublicKeysMatchUsername(token, nameLookupURL) ]).then((values) => { if (values.every(Boolean)) { return true } else { return false } }) }