1
0
mirror of https://github.com/bitwarden/browser synced 2025-12-17 16:53:34 +00:00

[EC-598] feat: wait for session close before closing window

This commit is contained in:
Andreas Coroiu
2023-04-11 16:02:45 +02:00
parent 2992142681
commit a06b9ad020
5 changed files with 196 additions and 176 deletions

View File

@@ -86,6 +86,9 @@ export type BrowserFido2Message = { sessionId: string } & (
type: "AbortResponse"; type: "AbortResponse";
fallbackRequested: boolean; fallbackRequested: boolean;
} }
| {
type: "CloseRequest";
}
); );
export class BrowserFido2UserInterfaceService implements Fido2UserInterfaceServiceAbstraction { export class BrowserFido2UserInterfaceService implements Fido2UserInterfaceServiceAbstraction {
@@ -237,6 +240,13 @@ export class BrowserFido2UserInterfaceSession implements Fido2UserInterfaceSessi
await this.receive("AbortResponse"); await this.receive("AbortResponse");
} }
async close() {
await this.send({ type: "CloseRequest", sessionId: this.sessionId });
this.closed = true;
this.destroy$.next();
this.destroy$.complete();
}
private async send(msg: BrowserFido2Message): Promise<void> { private async send(msg: BrowserFido2Message): Promise<void> {
if (!this.connected$.value) { if (!this.connected$.value) {
await this.connect(); await this.connect();
@@ -276,10 +286,4 @@ export class BrowserFido2UserInterfaceSession implements Fido2UserInterfaceSessi
); );
await firstValueFrom(this.connected$.pipe(filter((connected) => connected === true))); await firstValueFrom(this.connected$.pipe(filter((connected) => connected === true)));
} }
private close() {
this.closed = true;
this.destroy$.next();
this.destroy$.complete();
}
} }

View File

@@ -1,5 +1,6 @@
<ng-container *ngIf="data$ | async as data"> <ng-container *ngIf="data$ | async as data">
<div class="auth-wrapper"> <div class="auth-wrapper">
<i class="bwi bwi-spinner bwi-lg bwi-spin" [hidden]="!loading" aria-hidden="true"></i>
<ng-container *ngIf="data.type == 'ConfirmCredentialRequest'"> <ng-container *ngIf="data.type == 'ConfirmCredentialRequest'">
A site is asking for authentication using the following credential: A site is asking for authentication using the following credential:
<div class="box list"> <div class="box list">

View File

@@ -33,6 +33,7 @@ export class Fido2Component implements OnInit, OnDestroy {
protected data$ = new BehaviorSubject<BrowserFido2Message>(null); protected data$ = new BehaviorSubject<BrowserFido2Message>(null);
protected sessionId?: string; protected sessionId?: string;
protected ciphers?: CipherView[] = []; protected ciphers?: CipherView[] = [];
protected loading = false;
constructor(private activatedRoute: ActivatedRoute, private cipherService: CipherService) {} constructor(private activatedRoute: ActivatedRoute, private cipherService: CipherService) {}
@@ -92,6 +93,8 @@ export class Fido2Component implements OnInit, OnDestroy {
return cipher.decrypt(); return cipher.decrypt();
}) })
); );
} else if (data?.type === "CloseRequest") {
window.close();
} }
}), }),
takeUntil(this.destroy$) takeUntil(this.destroy$)
@@ -122,7 +125,7 @@ export class Fido2Component implements OnInit, OnDestroy {
}); });
} }
window.close(); this.loading = true;
} }
confirm() { confirm() {
@@ -130,7 +133,7 @@ export class Fido2Component implements OnInit, OnDestroy {
sessionId: this.sessionId, sessionId: this.sessionId,
type: "ConfirmCredentialResponse", type: "ConfirmCredentialResponse",
}); });
window.close(); this.loading = true;
} }
confirmNew() { confirmNew() {
@@ -138,7 +141,7 @@ export class Fido2Component implements OnInit, OnDestroy {
sessionId: this.sessionId, sessionId: this.sessionId,
type: "ConfirmNewCredentialResponse", type: "ConfirmNewCredentialResponse",
}); });
window.close(); this.loading = true;
} }
abort(fallback: boolean) { abort(fallback: boolean) {

View File

@@ -41,4 +41,5 @@ export abstract class Fido2UserInterfaceSession {
existingCipherIds: string[], existingCipherIds: string[],
abortController?: AbortController abortController?: AbortController
) => Promise<void>; ) => Promise<void>;
close: () => void;
} }

View File

@@ -43,114 +43,121 @@ export class Fido2AuthenticatorService implements Fido2AuthenticatorServiceAbstr
): Promise<Fido2AuthenticatorMakeCredentialResult> { ): Promise<Fido2AuthenticatorMakeCredentialResult> {
const userInterfaceSession = await this.userInterface.newSession(abortController); const userInterfaceSession = await this.userInterface.newSession(abortController);
if (params.credTypesAndPubKeyAlgs.every((p) => p.alg !== Fido2AlgorithmIdentifier.ES256)) { try {
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.NotSupported); if (params.credTypesAndPubKeyAlgs.every((p) => p.alg !== Fido2AlgorithmIdentifier.ES256)) {
} throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.NotSupported);
}
if (params.requireResidentKey != undefined && typeof params.requireResidentKey !== "boolean") { if (
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.Unknown); params.requireResidentKey != undefined &&
} typeof params.requireResidentKey !== "boolean"
) {
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.Unknown);
}
if ( if (
params.requireUserVerification != undefined && params.requireUserVerification != undefined &&
typeof params.requireUserVerification !== "boolean" typeof params.requireUserVerification !== "boolean"
) { ) {
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.Unknown); throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.Unknown);
} }
if (params.requireUserVerification) { if (params.requireUserVerification) {
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.Constraint); throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.Constraint);
} }
const existingCipherIds = await this.findExistingCredentials( const existingCipherIds = await this.findExistingCredentials(
params.excludeCredentialDescriptorList params.excludeCredentialDescriptorList
);
if (existingCipherIds.length > 0) {
await userInterfaceSession.informExcludedCredential(existingCipherIds, abortController);
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.NotAllowed);
}
let cipher: CipherView;
let fido2Key: Fido2KeyView;
let keyPair: CryptoKeyPair;
if (params.requireResidentKey) {
const userVerification = await userInterfaceSession.confirmNewCredential(
{
credentialName: params.rpEntity.name,
userName: params.userEntity.displayName,
},
abortController
); );
if (existingCipherIds.length > 0) {
await userInterfaceSession.informExcludedCredential(existingCipherIds, abortController);
if (!userVerification) {
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.NotAllowed); throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.NotAllowed);
} }
try { let cipher: CipherView;
keyPair = await createKeyPair(); let fido2Key: Fido2KeyView;
let keyPair: CryptoKeyPair;
if (params.requireResidentKey) {
const userVerification = await userInterfaceSession.confirmNewCredential(
{
credentialName: params.rpEntity.name,
userName: params.userEntity.displayName,
},
abortController
);
cipher = new CipherView(); if (!userVerification) {
cipher.type = CipherType.Fido2Key; throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.NotAllowed);
cipher.name = params.rpEntity.name; }
cipher.fido2Key = fido2Key = await createKeyView(params, keyPair.privateKey);
const encrypted = await this.cipherService.encrypt(cipher); try {
await this.cipherService.createWithServer(encrypted); // encrypted.id is assigned inside here keyPair = await createKeyPair();
cipher.id = encrypted.id;
} catch { cipher = new CipherView();
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.Unknown); cipher.type = CipherType.Fido2Key;
cipher.name = params.rpEntity.name;
cipher.fido2Key = fido2Key = await createKeyView(params, keyPair.privateKey);
const encrypted = await this.cipherService.encrypt(cipher);
await this.cipherService.createWithServer(encrypted); // encrypted.id is assigned inside here
cipher.id = encrypted.id;
} catch {
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.Unknown);
}
} else {
const cipherId = await userInterfaceSession.confirmNewNonDiscoverableCredential(
{
credentialName: params.rpEntity.name,
userName: params.userEntity.displayName,
},
abortController
);
if (cipherId === undefined) {
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.NotAllowed);
}
try {
keyPair = await createKeyPair();
const encrypted = await this.cipherService.get(cipherId);
cipher = await encrypted.decrypt();
cipher.login.fido2Key = fido2Key = await createKeyView(params, keyPair.privateKey);
const reencrypted = await this.cipherService.encrypt(cipher);
await this.cipherService.updateWithServer(reencrypted);
} catch {
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.Unknown);
}
} }
} else {
const cipherId = await userInterfaceSession.confirmNewNonDiscoverableCredential( const credentialId =
{ cipher.type === CipherType.Fido2Key ? cipher.id : cipher.login.fido2Key.nonDiscoverableId;
credentialName: params.rpEntity.name,
userName: params.userEntity.displayName, const authData = await generateAuthData({
}, rpId: params.rpEntity.id,
abortController credentialId: Utils.guidToRawFormat(credentialId),
counter: fido2Key.counter,
userPresence: true,
userVerification: false,
keyPair,
});
const attestationObject = new Uint8Array(
CBOR.encode({
fmt: "none",
attStmt: {},
authData,
})
); );
if (cipherId === undefined) { return {
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.NotAllowed); credentialId: Utils.guidToRawFormat(credentialId),
} attestationObject,
try {
keyPair = await createKeyPair();
const encrypted = await this.cipherService.get(cipherId);
cipher = await encrypted.decrypt();
cipher.login.fido2Key = fido2Key = await createKeyView(params, keyPair.privateKey);
const reencrypted = await this.cipherService.encrypt(cipher);
await this.cipherService.updateWithServer(reencrypted);
} catch {
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.Unknown);
}
}
const credentialId =
cipher.type === CipherType.Fido2Key ? cipher.id : cipher.login.fido2Key.nonDiscoverableId;
const authData = await generateAuthData({
rpId: params.rpEntity.id,
credentialId: Utils.guidToRawFormat(credentialId),
counter: fido2Key.counter,
userPresence: true,
userVerification: false,
keyPair,
});
const attestationObject = new Uint8Array(
CBOR.encode({
fmt: "none",
attStmt: {},
authData, authData,
}) publicKeyAlgorithm: -7,
); };
} finally {
return { userInterfaceSession.close();
credentialId: Utils.guidToRawFormat(credentialId), }
attestationObject,
authData,
publicKeyAlgorithm: -7,
};
} }
async getAssertion( async getAssertion(
@@ -159,85 +166,89 @@ export class Fido2AuthenticatorService implements Fido2AuthenticatorServiceAbstr
): Promise<Fido2AuthenticatorGetAssertionResult> { ): Promise<Fido2AuthenticatorGetAssertionResult> {
const userInterfaceSession = await this.userInterface.newSession(abortController); const userInterfaceSession = await this.userInterface.newSession(abortController);
if (
params.requireUserVerification != undefined &&
typeof params.requireUserVerification !== "boolean"
) {
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.Unknown);
}
if (params.requireUserVerification) {
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.Constraint);
}
let cipherOptions: CipherView[];
// eslint-disable-next-line no-empty
if (params.allowCredentialDescriptorList?.length > 0) {
cipherOptions = await this.findNonDiscoverableCredentials(
params.allowCredentialDescriptorList,
params.rpId
);
} else {
cipherOptions = await this.findDiscoverableCredentials(params.rpId);
}
if (cipherOptions.length === 0) {
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.NotAllowed);
}
const selectedCipherId = await userInterfaceSession.pickCredential(
cipherOptions.map((cipher) => cipher.id)
);
const selectedCipher = cipherOptions.find((c) => c.id === selectedCipherId);
if (selectedCipher === undefined) {
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.NotAllowed);
}
try { try {
const selectedFido2Key = if (
selectedCipher.type === CipherType.Login params.requireUserVerification != undefined &&
? selectedCipher.login.fido2Key typeof params.requireUserVerification !== "boolean"
: selectedCipher.fido2Key; ) {
const selectedCredentialId = throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.Unknown);
selectedCipher.type === CipherType.Login }
? selectedFido2Key.nonDiscoverableId
: selectedCipher.id;
++selectedFido2Key.counter; if (params.requireUserVerification) {
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.Constraint);
}
selectedCipher.localData = { let cipherOptions: CipherView[];
...selectedCipher.localData,
lastUsedDate: new Date().getTime(),
};
const encrypted = await this.cipherService.encrypt(selectedCipher);
await this.cipherService.updateWithServer(encrypted);
const authenticatorData = await generateAuthData({ // eslint-disable-next-line no-empty
rpId: selectedFido2Key.rpId, if (params.allowCredentialDescriptorList?.length > 0) {
credentialId: Utils.guidToRawFormat(selectedCredentialId), cipherOptions = await this.findNonDiscoverableCredentials(
counter: selectedFido2Key.counter, params.allowCredentialDescriptorList,
userPresence: true, params.rpId
userVerification: false, );
}); } else {
cipherOptions = await this.findDiscoverableCredentials(params.rpId);
}
const signature = await generateSignature({ if (cipherOptions.length === 0) {
authData: authenticatorData, throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.NotAllowed);
clientDataHash: params.hash, }
privateKey: await getPrivateKeyFromFido2Key(selectedFido2Key),
});
return { const selectedCipherId = await userInterfaceSession.pickCredential(
authenticatorData, cipherOptions.map((cipher) => cipher.id)
selectedCredential: { );
id: Utils.guidToRawFormat(selectedCredentialId), const selectedCipher = cipherOptions.find((c) => c.id === selectedCipherId);
userHandle: Fido2Utils.stringToBuffer(selectedFido2Key.userHandle),
}, if (selectedCipher === undefined) {
signature, throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.NotAllowed);
}; }
} catch {
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.Unknown); try {
const selectedFido2Key =
selectedCipher.type === CipherType.Login
? selectedCipher.login.fido2Key
: selectedCipher.fido2Key;
const selectedCredentialId =
selectedCipher.type === CipherType.Login
? selectedFido2Key.nonDiscoverableId
: selectedCipher.id;
++selectedFido2Key.counter;
selectedCipher.localData = {
...selectedCipher.localData,
lastUsedDate: new Date().getTime(),
};
const encrypted = await this.cipherService.encrypt(selectedCipher);
await this.cipherService.updateWithServer(encrypted);
const authenticatorData = await generateAuthData({
rpId: selectedFido2Key.rpId,
credentialId: Utils.guidToRawFormat(selectedCredentialId),
counter: selectedFido2Key.counter,
userPresence: true,
userVerification: false,
});
const signature = await generateSignature({
authData: authenticatorData,
clientDataHash: params.hash,
privateKey: await getPrivateKeyFromFido2Key(selectedFido2Key),
});
return {
authenticatorData,
selectedCredential: {
id: Utils.guidToRawFormat(selectedCredentialId),
userHandle: Fido2Utils.stringToBuffer(selectedFido2Key.userHandle),
},
signature,
};
} catch {
throw new Fido2AutenticatorError(Fido2AutenticatorErrorCode.Unknown);
}
} finally {
userInterfaceSession.close();
} }
} }