Backport #18678 WebAuthn may cause a security exception if the provided APP_ID is not allowed for the current origin. Therefore we should reattempt authentication without the appid extension. Also we should allow [u2f] as-well as [U2F] sections. Signed-off-by: Andrew Thornton <art27@cantab.net> Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
This commit is contained in:
parent
ce69882180
commit
2e317d3f6e
2 changed files with 20 additions and 3 deletions
|
@ -1022,8 +1022,13 @@ func loadFromConf(allowEmpty bool, extraConfig string) {
|
||||||
UI.CustomEmojisMap[emoji] = ":" + emoji + ":"
|
UI.CustomEmojisMap[emoji] = ":" + emoji + ":"
|
||||||
}
|
}
|
||||||
|
|
||||||
sec = Cfg.Section("U2F")
|
// FIXME: DEPRECATED to be removed in v1.18.0
|
||||||
U2F.AppID = sec.Key("APP_ID").MustString(strings.TrimSuffix(AppURL, "/"))
|
U2F.AppID = strings.TrimSuffix(AppURL, "/")
|
||||||
|
if Cfg.Section("U2F").HasKey("APP_ID") {
|
||||||
|
U2F.AppID = Cfg.Section("U2F").Key("APP_ID").MustString(strings.TrimSuffix(AppURL, "/"))
|
||||||
|
} else if Cfg.Section("u2f").HasKey("APP_ID") {
|
||||||
|
U2F.AppID = Cfg.Section("u2f").Key("APP_ID").MustString(strings.TrimSuffix(AppURL, "/"))
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func parseAuthorizedPrincipalsAllow(values []string) ([]string, bool) {
|
func parseAuthorizedPrincipalsAllow(values []string) ([]string, bool) {
|
||||||
|
@ -1162,7 +1167,6 @@ func MakeManifestData(appName, appURL, absoluteAssetURL string) []byte {
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
})
|
})
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Error("unable to marshal manifest JSON. Error: %v", err)
|
log.Error("unable to marshal manifest JSON. Error: %v", err)
|
||||||
return make([]byte, 0)
|
return make([]byte, 0)
|
||||||
|
|
|
@ -24,6 +24,19 @@ export function initUserAuthWebAuthn() {
|
||||||
.then((credential) => {
|
.then((credential) => {
|
||||||
verifyAssertion(credential);
|
verifyAssertion(credential);
|
||||||
}).catch((err) => {
|
}).catch((err) => {
|
||||||
|
// Try again... without the appid
|
||||||
|
if (makeAssertionOptions.publicKey.extensions && makeAssertionOptions.publicKey.extensions.appid) {
|
||||||
|
delete makeAssertionOptions.publicKey.extensions['appid'];
|
||||||
|
navigator.credentials.get({
|
||||||
|
publicKey: makeAssertionOptions.publicKey
|
||||||
|
})
|
||||||
|
.then((credential) => {
|
||||||
|
verifyAssertion(credential);
|
||||||
|
}).catch((err) => {
|
||||||
|
webAuthnError('general', err.message);
|
||||||
|
});
|
||||||
|
return;
|
||||||
|
}
|
||||||
webAuthnError('general', err.message);
|
webAuthnError('general', err.message);
|
||||||
});
|
});
|
||||||
}).fail(() => {
|
}).fail(() => {
|
||||||
|
|
Reference in a new issue