| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548 | 
							- // Load modules
 
- var Boom = require('boom');
 
- var Hoek = require('hoek');
 
- var Cryptiles = require('cryptiles');
 
- var Crypto = require('./crypto');
 
- var Utils = require('./utils');
 
- // Declare internals
 
- var internals = {};
 
- // Hawk authentication
 
- /*
 
-    req:                 node's HTTP request object or an object as follows:
 
-                         var request = {
 
-                             method: 'GET',
 
-                             url: '/resource/4?a=1&b=2',
 
-                             host: 'example.com',
 
-                             port: 8080,
 
-                             authorization: 'Hawk id="dh37fgj492je", ts="1353832234", nonce="j4h3g2", ext="some-app-ext-data", mac="6R4rV5iE+NPoym+WwjeHzjAGXUtLNIxmo1vpMofpLAE="'
 
-                         };
 
-    credentialsFunc:     required function to lookup the set of Hawk credentials based on the provided credentials id.
 
-                         The credentials include the MAC key, MAC algorithm, and other attributes (such as username)
 
-                         needed by the application. This function is the equivalent of verifying the username and
 
-                         password in Basic authentication.
 
-                         var credentialsFunc = function (id, callback) {
 
-                             // Lookup credentials in database
 
-                             db.lookup(id, function (err, item) {
 
-                                 if (err || !item) {
 
-                                     return callback(err);
 
-                                 }
 
-                                 var credentials = {
 
-                                     // Required
 
-                                     key: item.key,
 
-                                     algorithm: item.algorithm,
 
-                                     // Application specific
 
-                                     user: item.user
 
-                                 };
 
-                                 return callback(null, credentials);
 
-                             });
 
-                         };
 
-    options: {
 
-         hostHeaderName:        optional header field name, used to override the default 'Host' header when used
 
-                                behind a cache of a proxy. Apache2 changes the value of the 'Host' header while preserving
 
-                                the original (which is what the module must verify) in the 'x-forwarded-host' header field.
 
-                                Only used when passed a node Http.ServerRequest object.
 
-         nonceFunc:             optional nonce validation function. The function signature is function(key, nonce, ts, callback)
 
-                                where 'callback' must be called using the signature function(err).
 
-         timestampSkewSec:      optional number of seconds of permitted clock skew for incoming timestamps. Defaults to 60 seconds.
 
-                                Provides a +/- skew which means actual allowed window is double the number of seconds.
 
-         localtimeOffsetMsec:   optional local clock time offset express in a number of milliseconds (positive or negative).
 
-                                Defaults to 0.
 
-         payload:               optional payload for validation. The client calculates the hash value and includes it via the 'hash'
 
-                                header attribute. The server always ensures the value provided has been included in the request
 
-                                MAC. When this option is provided, it validates the hash value itself. Validation is done by calculating
 
-                                a hash value over the entire payload (assuming it has already be normalized to the same format and
 
-                                encoding used by the client to calculate the hash on request). If the payload is not available at the time
 
-                                of authentication, the authenticatePayload() method can be used by passing it the credentials and
 
-                                attributes.hash returned in the authenticate callback.
 
-         host:                  optional host name override. Only used when passed a node request object.
 
-         port:                  optional port override. Only used when passed a node request object.
 
-     }
 
-     callback: function (err, credentials, artifacts) { }
 
-  */
 
- exports.authenticate = function (req, credentialsFunc, options, callback) {
 
-     callback = Hoek.nextTick(callback);
 
-     // Default options
 
-     options.nonceFunc = options.nonceFunc || internals.nonceFunc;
 
-     options.timestampSkewSec = options.timestampSkewSec || 60;                                                  // 60 seconds
 
-     // Application time
 
-     var now = Utils.now(options.localtimeOffsetMsec);                           // Measure now before any other processing
 
-     // Convert node Http request object to a request configuration object
 
-     var request = Utils.parseRequest(req, options);
 
-     if (request instanceof Error) {
 
-         return callback(Boom.badRequest(request.message));
 
-     }
 
-     // Parse HTTP Authorization header
 
-     var attributes = Utils.parseAuthorizationHeader(request.authorization);
 
-     if (attributes instanceof Error) {
 
-         return callback(attributes);
 
-     }
 
-     // Construct artifacts container
 
-     var artifacts = {
 
-         method: request.method,
 
-         host: request.host,
 
-         port: request.port,
 
-         resource: request.url,
 
-         ts: attributes.ts,
 
-         nonce: attributes.nonce,
 
-         hash: attributes.hash,
 
-         ext: attributes.ext,
 
-         app: attributes.app,
 
-         dlg: attributes.dlg,
 
-         mac: attributes.mac,
 
-         id: attributes.id
 
-     };
 
-     // Verify required header attributes
 
-     if (!attributes.id ||
 
-         !attributes.ts ||
 
-         !attributes.nonce ||
 
-         !attributes.mac) {
 
-         return callback(Boom.badRequest('Missing attributes'), null, artifacts);
 
-     }
 
-     // Fetch Hawk credentials
 
-     credentialsFunc(attributes.id, function (err, credentials) {
 
-         if (err) {
 
-             return callback(err, credentials || null, artifacts);
 
-         }
 
-         if (!credentials) {
 
-             return callback(Boom.unauthorized('Unknown credentials', 'Hawk'), null, artifacts);
 
-         }
 
-         if (!credentials.key ||
 
-             !credentials.algorithm) {
 
-             return callback(Boom.internal('Invalid credentials'), credentials, artifacts);
 
-         }
 
-         if (Crypto.algorithms.indexOf(credentials.algorithm) === -1) {
 
-             return callback(Boom.internal('Unknown algorithm'), credentials, artifacts);
 
-         }
 
-         // Calculate MAC
 
-         var mac = Crypto.calculateMac('header', credentials, artifacts);
 
-         if (!Cryptiles.fixedTimeComparison(mac, attributes.mac)) {
 
-             return callback(Boom.unauthorized('Bad mac', 'Hawk'), credentials, artifacts);
 
-         }
 
-         // Check payload hash
 
-         if (options.payload ||
 
-             options.payload === '') {
 
-             if (!attributes.hash) {
 
-                 return callback(Boom.unauthorized('Missing required payload hash', 'Hawk'), credentials, artifacts);
 
-             }
 
-             var hash = Crypto.calculatePayloadHash(options.payload, credentials.algorithm, request.contentType);
 
-             if (!Cryptiles.fixedTimeComparison(hash, attributes.hash)) {
 
-                 return callback(Boom.unauthorized('Bad payload hash', 'Hawk'), credentials, artifacts);
 
-             }
 
-         }
 
-         // Check nonce
 
-         options.nonceFunc(credentials.key, attributes.nonce, attributes.ts, function (err) {
 
-             if (err) {
 
-                 return callback(Boom.unauthorized('Invalid nonce', 'Hawk'), credentials, artifacts);
 
-             }
 
-             // Check timestamp staleness
 
-             if (Math.abs((attributes.ts * 1000) - now) > (options.timestampSkewSec * 1000)) {
 
-                 var tsm = Crypto.timestampMessage(credentials, options.localtimeOffsetMsec);
 
-                 return callback(Boom.unauthorized('Stale timestamp', 'Hawk', tsm), credentials, artifacts);
 
-             }
 
-             // Successful authentication
 
-             return callback(null, credentials, artifacts);
 
-         });
 
-     });
 
- };
 
- // Authenticate payload hash - used when payload cannot be provided during authenticate()
 
- /*
 
-     payload:        raw request payload
 
-     credentials:    from authenticate callback
 
-     artifacts:      from authenticate callback
 
-     contentType:    req.headers['content-type']
 
- */
 
- exports.authenticatePayload = function (payload, credentials, artifacts, contentType) {
 
-     var calculatedHash = Crypto.calculatePayloadHash(payload, credentials.algorithm, contentType);
 
-     return Cryptiles.fixedTimeComparison(calculatedHash, artifacts.hash);
 
- };
 
- // Authenticate payload hash - used when payload cannot be provided during authenticate()
 
- /*
 
-     calculatedHash: the payload hash calculated using Crypto.calculatePayloadHash()
 
-     artifacts:      from authenticate callback
 
- */
 
- exports.authenticatePayloadHash = function (calculatedHash, artifacts) {
 
-     return Cryptiles.fixedTimeComparison(calculatedHash, artifacts.hash);
 
- };
 
- // Generate a Server-Authorization header for a given response
 
- /*
 
-     credentials: {},                                        // Object received from authenticate()
 
-     artifacts: {}                                           // Object received from authenticate(); 'mac', 'hash', and 'ext' - ignored
 
-     options: {
 
-         ext: 'application-specific',                        // Application specific data sent via the ext attribute
 
-         payload: '{"some":"payload"}',                      // UTF-8 encoded string for body hash generation (ignored if hash provided)
 
-         contentType: 'application/json',                    // Payload content-type (ignored if hash provided)
 
-         hash: 'U4MKKSmiVxk37JCCrAVIjV='                     // Pre-calculated payload hash
 
-     }
 
- */
 
- exports.header = function (credentials, artifacts, options) {
 
-     // Prepare inputs
 
-     options = options || {};
 
-     if (!artifacts ||
 
-         typeof artifacts !== 'object' ||
 
-         typeof options !== 'object') {
 
-         return '';
 
-     }
 
-     artifacts = Hoek.clone(artifacts);
 
-     delete artifacts.mac;
 
-     artifacts.hash = options.hash;
 
-     artifacts.ext = options.ext;
 
-     // Validate credentials
 
-     if (!credentials ||
 
-         !credentials.key ||
 
-         !credentials.algorithm) {
 
-         // Invalid credential object
 
-         return '';
 
-     }
 
-     if (Crypto.algorithms.indexOf(credentials.algorithm) === -1) {
 
-         return '';
 
-     }
 
-     // Calculate payload hash
 
-     if (!artifacts.hash &&
 
-         (options.payload || options.payload === '')) {
 
-         artifacts.hash = Crypto.calculatePayloadHash(options.payload, credentials.algorithm, options.contentType);
 
-     }
 
-     var mac = Crypto.calculateMac('response', credentials, artifacts);
 
-     // Construct header
 
-     var header = 'Hawk mac="' + mac + '"' +
 
-                  (artifacts.hash ? ', hash="' + artifacts.hash + '"' : '');
 
-     if (artifacts.ext !== null &&
 
-         artifacts.ext !== undefined &&
 
-         artifacts.ext !== '') {                       // Other falsey values allowed
 
-         header += ', ext="' + Hoek.escapeHeaderAttribute(artifacts.ext) + '"';
 
-     }
 
-     return header;
 
- };
 
- /*
 
-  * Arguments and options are the same as authenticate() with the exception that the only supported options are:
 
-  * 'hostHeaderName', 'localtimeOffsetMsec', 'host', 'port'
 
-  */
 
- //                       1     2             3           4
 
- internals.bewitRegex = /^(\/.*)([\?&])bewit\=([^&$]*)(?:&(.+))?$/;
 
- exports.authenticateBewit = function (req, credentialsFunc, options, callback) {
 
-     callback = Hoek.nextTick(callback);
 
-     // Application time
 
-     var now = Utils.now(options.localtimeOffsetMsec);
 
-     // Convert node Http request object to a request configuration object
 
-     var request = Utils.parseRequest(req, options);
 
-     if (request instanceof Error) {
 
-         return callback(Boom.badRequest(request.message));
 
-     }
 
-     // Extract bewit
 
-     if (request.url.length > Utils.limits.maxMatchLength) {
 
-         return callback(Boom.badRequest('Resource path exceeds max length'));
 
-     }
 
-     var resource = request.url.match(internals.bewitRegex);
 
-     if (!resource) {
 
-         return callback(Boom.unauthorized(null, 'Hawk'));
 
-     }
 
-     // Bewit not empty
 
-     if (!resource[3]) {
 
-         return callback(Boom.unauthorized('Empty bewit', 'Hawk'));
 
-     }
 
-     // Verify method is GET
 
-     if (request.method !== 'GET' &&
 
-         request.method !== 'HEAD') {
 
-         return callback(Boom.unauthorized('Invalid method', 'Hawk'));
 
-     }
 
-     // No other authentication
 
-     if (request.authorization) {
 
-         return callback(Boom.badRequest('Multiple authentications'));
 
-     }
 
-     // Parse bewit
 
-     var bewitString = Hoek.base64urlDecode(resource[3]);
 
-     if (bewitString instanceof Error) {
 
-         return callback(Boom.badRequest('Invalid bewit encoding'));
 
-     }
 
-     // Bewit format: id\exp\mac\ext ('\' is used because it is a reserved header attribute character)
 
-     var bewitParts = bewitString.split('\\');
 
-     if (bewitParts.length !== 4) {
 
-         return callback(Boom.badRequest('Invalid bewit structure'));
 
-     }
 
-     var bewit = {
 
-         id: bewitParts[0],
 
-         exp: parseInt(bewitParts[1], 10),
 
-         mac: bewitParts[2],
 
-         ext: bewitParts[3] || ''
 
-     };
 
-     if (!bewit.id ||
 
-         !bewit.exp ||
 
-         !bewit.mac) {
 
-         return callback(Boom.badRequest('Missing bewit attributes'));
 
-     }
 
-     // Construct URL without bewit
 
-     var url = resource[1];
 
-     if (resource[4]) {
 
-         url += resource[2] + resource[4];
 
-     }
 
-     // Check expiration
 
-     if (bewit.exp * 1000 <= now) {
 
-         return callback(Boom.unauthorized('Access expired', 'Hawk'), null, bewit);
 
-     }
 
-     // Fetch Hawk credentials
 
-     credentialsFunc(bewit.id, function (err, credentials) {
 
-         if (err) {
 
-             return callback(err, credentials || null, bewit.ext);
 
-         }
 
-         if (!credentials) {
 
-             return callback(Boom.unauthorized('Unknown credentials', 'Hawk'), null, bewit);
 
-         }
 
-         if (!credentials.key ||
 
-             !credentials.algorithm) {
 
-             return callback(Boom.internal('Invalid credentials'), credentials, bewit);
 
-         }
 
-         if (Crypto.algorithms.indexOf(credentials.algorithm) === -1) {
 
-             return callback(Boom.internal('Unknown algorithm'), credentials, bewit);
 
-         }
 
-         // Calculate MAC
 
-         var mac = Crypto.calculateMac('bewit', credentials, {
 
-             ts: bewit.exp,
 
-             nonce: '',
 
-             method: 'GET',
 
-             resource: url,
 
-             host: request.host,
 
-             port: request.port,
 
-             ext: bewit.ext
 
-         });
 
-         if (!Cryptiles.fixedTimeComparison(mac, bewit.mac)) {
 
-             return callback(Boom.unauthorized('Bad mac', 'Hawk'), credentials, bewit);
 
-         }
 
-         // Successful authentication
 
-         return callback(null, credentials, bewit);
 
-     });
 
- };
 
- /*
 
-  *  options are the same as authenticate() with the exception that the only supported options are:
 
-  * 'nonceFunc', 'timestampSkewSec', 'localtimeOffsetMsec'
 
-  */
 
- exports.authenticateMessage = function (host, port, message, authorization, credentialsFunc, options, callback) {
 
-     callback = Hoek.nextTick(callback);
 
-     // Default options
 
-     options.nonceFunc = options.nonceFunc || internals.nonceFunc;
 
-     options.timestampSkewSec = options.timestampSkewSec || 60;                                                  // 60 seconds
 
-     // Application time
 
-     var now = Utils.now(options.localtimeOffsetMsec);                       // Measure now before any other processing
 
-     // Validate authorization
 
-     if (!authorization.id ||
 
-         !authorization.ts ||
 
-         !authorization.nonce ||
 
-         !authorization.hash ||
 
-         !authorization.mac) {
 
-         return callback(Boom.badRequest('Invalid authorization'));
 
-     }
 
-     // Fetch Hawk credentials
 
-     credentialsFunc(authorization.id, function (err, credentials) {
 
-         if (err) {
 
-             return callback(err, credentials || null);
 
-         }
 
-         if (!credentials) {
 
-             return callback(Boom.unauthorized('Unknown credentials', 'Hawk'));
 
-         }
 
-         if (!credentials.key ||
 
-             !credentials.algorithm) {
 
-             return callback(Boom.internal('Invalid credentials'), credentials);
 
-         }
 
-         if (Crypto.algorithms.indexOf(credentials.algorithm) === -1) {
 
-             return callback(Boom.internal('Unknown algorithm'), credentials);
 
-         }
 
-         // Construct artifacts container
 
-         var artifacts = {
 
-             ts: authorization.ts,
 
-             nonce: authorization.nonce,
 
-             host: host,
 
-             port: port,
 
-             hash: authorization.hash
 
-         };
 
-         // Calculate MAC
 
-         var mac = Crypto.calculateMac('message', credentials, artifacts);
 
-         if (!Cryptiles.fixedTimeComparison(mac, authorization.mac)) {
 
-             return callback(Boom.unauthorized('Bad mac', 'Hawk'), credentials);
 
-         }
 
-         // Check payload hash
 
-         var hash = Crypto.calculatePayloadHash(message, credentials.algorithm);
 
-         if (!Cryptiles.fixedTimeComparison(hash, authorization.hash)) {
 
-             return callback(Boom.unauthorized('Bad message hash', 'Hawk'), credentials);
 
-         }
 
-         // Check nonce
 
-         options.nonceFunc(credentials.key, authorization.nonce, authorization.ts, function (err) {
 
-             if (err) {
 
-                 return callback(Boom.unauthorized('Invalid nonce', 'Hawk'), credentials);
 
-             }
 
-             // Check timestamp staleness
 
-             if (Math.abs((authorization.ts * 1000) - now) > (options.timestampSkewSec * 1000)) {
 
-                 return callback(Boom.unauthorized('Stale timestamp'), credentials);
 
-             }
 
-             // Successful authentication
 
-             return callback(null, credentials);
 
-         });
 
-     });
 
- };
 
- internals.nonceFunc = function (key, nonce, ts, nonceCallback) {
 
-     return nonceCallback();         // No validation
 
- };
 
 
  |