mirror of
https://github.com/amark/gun.git
synced 2025-06-13 09:36:44 +00:00
56 lines
2.4 KiB
JavaScript
56 lines
2.4 KiB
JavaScript
|
|
// TODO: BUG! `SEA` needs to be USED!
|
|
const Gun = (typeof window !== 'undefined' ? window : global).Gun || require('gun/gun')
|
|
var SEA = require('./sea');
|
|
var queryGunAliases = require('./query');
|
|
var parseProps = require('./parse');
|
|
// This is internal User authentication func.
|
|
const authenticate = async (alias, pass, root) => {
|
|
// load all public keys associated with the username alias we want to log in with.
|
|
const aliases = (await queryGunAliases(alias, root))
|
|
.filter(({ pub, at: { put } = {} } = {}) => !!pub && !!put)
|
|
// Got any?
|
|
if (!aliases.length) {
|
|
throw { err: 'Public key does not exist!' }
|
|
}
|
|
let err
|
|
// then attempt to log into each one until we find ours!
|
|
// (if two users have the same username AND the same password... that would be bad)
|
|
const [ user ] = await Promise.all(aliases.map(async ({ at, pub }) => {
|
|
// attempt to PBKDF2 extend the password with the salt. (Verifying the signature gives us the plain text salt.)
|
|
const auth = parseProps(at.put.auth)
|
|
// NOTE: aliasquery uses `gun.get` which internally SEA.read verifies the data for us, so we do not need to re-verify it here.
|
|
// SEA.read(at.put.auth, pub).then(function(auth){
|
|
try {
|
|
const proof = await SEA.proof(pass, auth.salt)
|
|
const props = { pub, proof, at }
|
|
// the proof of work is evidence that we've spent some time/effort trying to log in, this slows brute force.
|
|
/*
|
|
MARK TO @mhelander : pub vs epub!???
|
|
*/
|
|
const { salt } = auth
|
|
const sea = await SEA.dec(auth.auth, { pub, key: proof })
|
|
if (!sea) {
|
|
err = 'Failed to decrypt secret!'
|
|
return
|
|
}
|
|
// now we have AES decrypted the private key, from when we encrypted it with the proof at registration.
|
|
// if we were successful, then that meanswe're logged in!
|
|
const { priv, epriv } = sea
|
|
const { epub } = at.put
|
|
// TODO: 'salt' needed?
|
|
err = null
|
|
return Object.assign(props, { priv, salt, epub, epriv })
|
|
} catch (e) {
|
|
err = 'Failed to decrypt secret!'
|
|
throw { err }
|
|
}
|
|
}))
|
|
|
|
if (!user) {
|
|
throw { err: err || 'Public key does not exist!' }
|
|
}
|
|
return user
|
|
}
|
|
module.exports = authenticate;
|
|
|