2022-02-16 21:03:58 +00:00
|
|
|
// Copyright 2022 The Gitea Authors. All rights reserved.
|
2022-11-27 18:20:29 +00:00
|
|
|
// SPDX-License-Identifier: MIT
|
2022-02-16 21:03:58 +00:00
|
|
|
|
2022-11-02 08:54:36 +00:00
|
|
|
package v1_16 //nolint
|
2022-02-16 21:03:58 +00:00
|
|
|
|
|
|
|
import (
|
2024-04-05 12:00:36 +00:00
|
|
|
"crypto/ecdh"
|
2022-02-16 21:03:58 +00:00
|
|
|
"encoding/base32"
|
2024-04-05 12:00:36 +00:00
|
|
|
"errors"
|
2022-02-16 21:03:58 +00:00
|
|
|
"fmt"
|
|
|
|
"strings"
|
|
|
|
|
|
|
|
"code.gitea.io/gitea/modules/timeutil"
|
|
|
|
|
|
|
|
"xorm.io/xorm"
|
|
|
|
"xorm.io/xorm/schemas"
|
|
|
|
)
|
|
|
|
|
2024-04-05 12:00:36 +00:00
|
|
|
func parseU2FRegistration(raw []byte) (pubKey *ecdh.PublicKey, keyHandle []byte, err error) {
|
|
|
|
if len(raw) < 69 {
|
|
|
|
return nil, nil, errors.New("data is too short")
|
|
|
|
}
|
|
|
|
if raw[0] != 0x05 {
|
|
|
|
return nil, nil, errors.New("invalid reserved byte")
|
|
|
|
}
|
|
|
|
raw = raw[1:]
|
|
|
|
|
|
|
|
pubKey, err = ecdh.P256().NewPublicKey(raw[:65])
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
raw = raw[65:]
|
|
|
|
|
|
|
|
khLen := int(raw[0])
|
|
|
|
if len(raw) < khLen {
|
|
|
|
return nil, nil, errors.New("invalid key handle")
|
|
|
|
}
|
|
|
|
raw = raw[1:]
|
|
|
|
keyHandle = raw[:khLen]
|
|
|
|
|
|
|
|
return pubKey, keyHandle, nil
|
|
|
|
}
|
|
|
|
|
2022-02-16 21:03:58 +00:00
|
|
|
// v208 migration was completely broken
|
2022-11-02 08:54:36 +00:00
|
|
|
func RemigrateU2FCredentials(x *xorm.Engine) error {
|
2022-02-16 21:03:58 +00:00
|
|
|
// Create webauthnCredential table
|
|
|
|
type webauthnCredential struct {
|
|
|
|
ID int64 `xorm:"pk autoincr"`
|
|
|
|
Name string
|
|
|
|
LowerName string `xorm:"unique(s)"`
|
|
|
|
UserID int64 `xorm:"INDEX unique(s)"`
|
|
|
|
CredentialID string `xorm:"INDEX VARCHAR(410)"` // CredentalID in U2F is at most 255bytes / 5 * 8 = 408 - add a few extra characters for safety
|
|
|
|
PublicKey []byte
|
|
|
|
AttestationType string
|
|
|
|
AAGUID []byte
|
|
|
|
SignCount uint32 `xorm:"BIGINT"`
|
|
|
|
CloneWarning bool
|
|
|
|
CreatedUnix timeutil.TimeStamp `xorm:"INDEX created"`
|
|
|
|
UpdatedUnix timeutil.TimeStamp `xorm:"INDEX updated"`
|
|
|
|
}
|
2023-08-13 19:17:21 +00:00
|
|
|
if err := x.Sync(&webauthnCredential{}); err != nil {
|
2022-02-16 21:03:58 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
switch x.Dialect().URI().DBType {
|
|
|
|
case schemas.MYSQL:
|
|
|
|
_, err := x.Exec("ALTER TABLE webauthn_credential MODIFY COLUMN credential_id VARCHAR(410)")
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
case schemas.POSTGRES:
|
|
|
|
_, err := x.Exec("ALTER TABLE webauthn_credential ALTER COLUMN credential_id TYPE VARCHAR(410)")
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
// SQLite doesn't support ALTER COLUMN, and it already makes String _TEXT_ by default so no migration needed
|
|
|
|
// nor is there any need to re-migrate
|
|
|
|
}
|
|
|
|
|
|
|
|
exist, err := x.IsTableExist("u2f_registration")
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if !exist {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now migrate the old u2f registrations to the new format
|
|
|
|
type u2fRegistration struct {
|
|
|
|
ID int64 `xorm:"pk autoincr"`
|
|
|
|
Name string
|
|
|
|
UserID int64 `xorm:"INDEX"`
|
|
|
|
Raw []byte
|
|
|
|
Counter uint32 `xorm:"BIGINT"`
|
|
|
|
CreatedUnix timeutil.TimeStamp `xorm:"INDEX created"`
|
|
|
|
UpdatedUnix timeutil.TimeStamp `xorm:"INDEX updated"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var start int
|
|
|
|
regs := make([]*u2fRegistration, 0, 50)
|
|
|
|
for {
|
|
|
|
err := x.OrderBy("id").Limit(50, start).Find(®s)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = func() error {
|
|
|
|
sess := x.NewSession()
|
|
|
|
defer sess.Close()
|
|
|
|
if err := sess.Begin(); err != nil {
|
|
|
|
return fmt.Errorf("unable to allow start session. Error: %w", err)
|
|
|
|
}
|
|
|
|
for _, reg := range regs {
|
2024-04-05 12:00:36 +00:00
|
|
|
pubKey, keyHandle, err := parseU2FRegistration(reg.Raw)
|
2023-08-29 20:19:40 +00:00
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
2022-02-16 21:03:58 +00:00
|
|
|
remigrated := &webauthnCredential{
|
|
|
|
ID: reg.ID,
|
|
|
|
Name: reg.Name,
|
|
|
|
LowerName: strings.ToLower(reg.Name),
|
|
|
|
UserID: reg.UserID,
|
2024-04-05 12:00:36 +00:00
|
|
|
CredentialID: base32.HexEncoding.EncodeToString(keyHandle),
|
2023-08-29 20:19:40 +00:00
|
|
|
PublicKey: pubKey.Bytes(),
|
2022-02-16 21:03:58 +00:00
|
|
|
AttestationType: "fido-u2f",
|
|
|
|
AAGUID: []byte{},
|
|
|
|
SignCount: reg.Counter,
|
|
|
|
UpdatedUnix: reg.UpdatedUnix,
|
|
|
|
CreatedUnix: reg.CreatedUnix,
|
|
|
|
}
|
|
|
|
|
2022-02-25 14:04:59 +00:00
|
|
|
has, err := sess.ID(reg.ID).Get(new(webauthnCredential))
|
2022-02-16 21:03:58 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to get webauthn_credential[%d]. Error: %w", reg.ID, err)
|
|
|
|
}
|
|
|
|
if !has {
|
2022-02-25 14:04:59 +00:00
|
|
|
has, err := sess.Where("`lower_name`=?", remigrated.LowerName).And("`user_id`=?", remigrated.UserID).Exist(new(webauthnCredential))
|
2022-02-16 21:03:58 +00:00
|
|
|
if err != nil {
|
2022-10-24 19:29:17 +00:00
|
|
|
return fmt.Errorf("unable to check webauthn_credential[lower_name: %s, user_id: %d]. Error: %w", remigrated.LowerName, remigrated.UserID, err)
|
2022-02-16 21:03:58 +00:00
|
|
|
}
|
2022-02-25 14:04:59 +00:00
|
|
|
if !has {
|
|
|
|
_, err = sess.Insert(remigrated)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to (re)insert webauthn_credential[%d]. Error: %w", reg.ID, err)
|
|
|
|
}
|
2022-02-16 21:03:58 +00:00
|
|
|
|
2022-02-25 14:04:59 +00:00
|
|
|
continue
|
|
|
|
}
|
2022-02-16 21:03:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
_, err = sess.ID(remigrated.ID).AllCols().Update(remigrated)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to update webauthn_credential[%d]. Error: %w", reg.ID, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return sess.Commit()
|
|
|
|
}()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(regs) < 50 {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
start += 50
|
|
|
|
regs = regs[:0]
|
|
|
|
}
|
|
|
|
|
2022-03-10 22:04:55 +00:00
|
|
|
if x.Dialect().URI().DBType == schemas.POSTGRES {
|
|
|
|
if _, err := x.Exec("SELECT setval('webauthn_credential_id_seq', COALESCE((SELECT MAX(id)+1 FROM `webauthn_credential`), 1), false)"); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-02-16 21:03:58 +00:00
|
|
|
return nil
|
|
|
|
}
|