107 lines
4.1 KiB
JavaScript
107 lines
4.1 KiB
JavaScript
// Authenticate U2F (universal 2nd factor) devices for users to authenticate with.
|
|
//
|
|
// State Flow #1: setup -> in_progress -> authenticated -> POST to server
|
|
// State Flow #2: setup -> in_progress -> error -> setup
|
|
(function() {
|
|
var bind = function(fn, me){ return function(){ return fn.apply(me, arguments); }; };
|
|
|
|
this.U2FAuthenticate = (function() {
|
|
function U2FAuthenticate(container, u2fParams) {
|
|
this.container = container;
|
|
this.renderNotSupported = bind(this.renderNotSupported, this);
|
|
this.renderAuthenticated = bind(this.renderAuthenticated, this);
|
|
this.renderError = bind(this.renderError, this);
|
|
this.renderInProgress = bind(this.renderInProgress, this);
|
|
this.renderSetup = bind(this.renderSetup, this);
|
|
this.renderTemplate = bind(this.renderTemplate, this);
|
|
this.authenticate = bind(this.authenticate, this);
|
|
this.start = bind(this.start, this);
|
|
this.appId = u2fParams.app_id;
|
|
this.challenge = u2fParams.challenge;
|
|
this.signRequests = u2fParams.sign_requests.map(function(request) {
|
|
// The U2F Javascript API v1.1 requires a single challenge, with
|
|
// _no challenges per-request_. The U2F Javascript API v1.0 requires a
|
|
// challenge per-request, which is done by copying the single challenge
|
|
// into every request.
|
|
//
|
|
// In either case, we don't need the per-request challenges that the server
|
|
// has generated, so we can remove them.
|
|
//
|
|
// Note: The server library fixes this behaviour in (unreleased) version 1.0.0.
|
|
// This can be removed once we upgrade.
|
|
// https://github.com/castle/ruby-u2f/commit/103f428071a81cd3d5f80c2e77d522d5029946a4
|
|
return _(request).omit('challenge');
|
|
});
|
|
}
|
|
|
|
U2FAuthenticate.prototype.start = function() {
|
|
if (U2FUtil.isU2FSupported()) {
|
|
return this.renderSetup();
|
|
} else {
|
|
return this.renderNotSupported();
|
|
}
|
|
};
|
|
|
|
U2FAuthenticate.prototype.authenticate = function() {
|
|
return u2f.sign(this.appId, this.challenge, this.signRequests, (function(_this) {
|
|
return function(response) {
|
|
var error;
|
|
if (response.errorCode) {
|
|
error = new U2FError(response.errorCode);
|
|
return _this.renderError(error);
|
|
} else {
|
|
return _this.renderAuthenticated(JSON.stringify(response));
|
|
}
|
|
};
|
|
})(this), 10);
|
|
};
|
|
|
|
// Rendering #
|
|
U2FAuthenticate.prototype.templates = {
|
|
"notSupported": "#js-authenticate-u2f-not-supported",
|
|
"setup": '#js-authenticate-u2f-setup',
|
|
"inProgress": '#js-authenticate-u2f-in-progress',
|
|
"error": '#js-authenticate-u2f-error',
|
|
"authenticated": '#js-authenticate-u2f-authenticated'
|
|
};
|
|
|
|
U2FAuthenticate.prototype.renderTemplate = function(name, params) {
|
|
var template, templateString;
|
|
templateString = $(this.templates[name]).html();
|
|
template = _.template(templateString);
|
|
return this.container.html(template(params));
|
|
};
|
|
|
|
U2FAuthenticate.prototype.renderSetup = function() {
|
|
this.renderTemplate('setup');
|
|
return this.container.find('#js-login-u2f-device').on('click', this.renderInProgress);
|
|
};
|
|
|
|
U2FAuthenticate.prototype.renderInProgress = function() {
|
|
this.renderTemplate('inProgress');
|
|
return this.authenticate();
|
|
};
|
|
|
|
U2FAuthenticate.prototype.renderError = function(error) {
|
|
this.renderTemplate('error', {
|
|
error_message: error.message()
|
|
});
|
|
return this.container.find('#js-u2f-try-again').on('click', this.renderSetup);
|
|
};
|
|
|
|
U2FAuthenticate.prototype.renderAuthenticated = function(deviceResponse) {
|
|
this.renderTemplate('authenticated');
|
|
// Prefer to do this instead of interpolating using Underscore templates
|
|
// because of JSON escaping issues.
|
|
return this.container.find("#js-device-response").val(deviceResponse);
|
|
};
|
|
|
|
U2FAuthenticate.prototype.renderNotSupported = function() {
|
|
return this.renderTemplate('notSupported');
|
|
};
|
|
|
|
return U2FAuthenticate;
|
|
|
|
})();
|
|
|
|
}).call(this);
|