mirror of
https://github.com/zitadel/zitadel.git
synced 2025-04-27 17:51:02 +00:00

# Which Problems Are Solved Potential nil pointers leading to a panic in the login UI. # How the Problems Are Solved As of now the login UI did not always check if the authRequest was actually retrieved form the database, which is ok for some endpoints which can also be called outside of an auth request. There are now methods added to ensure the request is loaded. # Additional Changes None # Additional Context Closes https://github.com/zitadel/DevOps/issues/55
66 lines
1.9 KiB
Go
66 lines
1.9 KiB
Go
package login
|
|
|
|
import (
|
|
"encoding/base64"
|
|
"net/http"
|
|
|
|
http_mw "github.com/zitadel/zitadel/internal/api/http/middleware"
|
|
"github.com/zitadel/zitadel/internal/domain"
|
|
)
|
|
|
|
const (
|
|
tmplMFAU2FInit = "mfainitu2f"
|
|
)
|
|
|
|
type u2fInitData struct {
|
|
webAuthNData
|
|
MFAType domain.MFAType
|
|
}
|
|
|
|
func (l *Login) renderRegisterU2F(w http.ResponseWriter, r *http.Request, authReq *domain.AuthRequest, err error) {
|
|
var errID, errMessage, credentialData string
|
|
var u2f *domain.WebAuthNToken
|
|
if err == nil {
|
|
u2f, err = l.command.HumanAddU2FSetup(setUserContext(r.Context(), authReq.UserID, authReq.UserOrgID), authReq.UserID, authReq.UserOrgID)
|
|
}
|
|
if err != nil {
|
|
errID, errMessage = l.getErrorMessage(r, err)
|
|
}
|
|
if u2f != nil {
|
|
credentialData = base64.RawURLEncoding.EncodeToString(u2f.CredentialCreationData)
|
|
}
|
|
translator := l.getTranslator(r.Context(), authReq)
|
|
data := &u2fInitData{
|
|
webAuthNData: webAuthNData{
|
|
userData: l.getUserData(r, authReq, translator, "InitMFAU2F.Title", "InitMFAU2F.Description", errID, errMessage),
|
|
CredentialCreationData: credentialData,
|
|
},
|
|
MFAType: domain.MFATypeU2F,
|
|
}
|
|
l.renderer.RenderTemplate(w, r, translator, l.renderer.Templates[tmplMFAU2FInit], data, nil)
|
|
}
|
|
|
|
func (l *Login) handleRegisterU2F(w http.ResponseWriter, r *http.Request) {
|
|
data := new(webAuthNFormData)
|
|
authReq, err := l.ensureAuthRequestAndParseData(r, data)
|
|
if err != nil {
|
|
l.renderError(w, r, authReq, err)
|
|
return
|
|
}
|
|
credData, err := base64.URLEncoding.DecodeString(data.CredentialData)
|
|
if err != nil {
|
|
l.renderRegisterU2F(w, r, authReq, err)
|
|
return
|
|
}
|
|
|
|
userAgentID, _ := http_mw.UserAgentIDFromCtx(r.Context())
|
|
if _, err = l.command.HumanVerifyU2FSetup(setUserContext(r.Context(), authReq.UserID, authReq.UserOrgID), authReq.UserID, authReq.UserOrgID, data.Name, userAgentID, credData); err != nil {
|
|
l.renderRegisterU2F(w, r, authReq, err)
|
|
return
|
|
}
|
|
done := &mfaDoneData{
|
|
MFAType: domain.MFATypeU2F,
|
|
}
|
|
l.renderMFAInitDone(w, r, authReq, done)
|
|
}
|