2022-10-08 02:41:03 +00:00
< ? php
2023-10-22 22:21:36 +00:00
require_once ( 'wp-webauthn-vendor/autoload.php' );
2022-10-08 02:41:03 +00:00
use Webauthn\Server ;
use Webauthn\PublicKeyCredentialRpEntity ;
use Webauthn\PublicKeyCredentialUserEntity ;
use Webauthn\PublicKeyCredentialCreationOptions ;
use Webauthn\PublicKeyCredentialSourceRepository as PublicKeyCredentialSourceRepositoryInterface ;
use Webauthn\PublicKeyCredentialSource ;
use Webauthn\AuthenticatorSelectionCriteria ;
use Nyholm\Psr7\Factory\Psr17Factory ;
use Nyholm\Psr7Server\ServerRequestCreator ;
/**
* Store all publickeys and pubilckey metas
*/
class PublicKeyCredentialSourceRepository implements PublicKeyCredentialSourceRepositoryInterface {
// Get one credential by credential ID
public function findOneByCredentialId ( string $publicKeyCredentialId ) : ? PublicKeyCredentialSource {
$data = $this -> read ();
if ( isset ( $data [ base64_encode ( $publicKeyCredentialId )])){
return PublicKeyCredentialSource :: createFromArray ( $data [ base64_encode ( $publicKeyCredentialId )]);
}
return null ;
}
// Get one credential's meta by credential ID
public function findOneMetaByCredentialId ( string $publicKeyCredentialId ) : ? array {
$meta = json_decode ( wwa_get_option ( " user_credentials_meta " ), true );
if ( isset ( $meta [ base64_encode ( $publicKeyCredentialId )])){
return $meta [ base64_encode ( $publicKeyCredentialId )];
}
return null ;
}
// Get all credentials of one user
public function findAllForUserEntity ( PublicKeyCredentialUserEntity $publicKeyCredentialUserEntity ) : array {
$sources = [];
foreach ( $this -> read () as $data ){
$source = PublicKeyCredentialSource :: createFromArray ( $data );
if ( $source -> getUserHandle () === $publicKeyCredentialUserEntity -> getId ()){
$sources [] = $source ;
}
}
return $sources ;
}
public function findCredentialsForUserEntityByType ( PublicKeyCredentialUserEntity $publicKeyCredentialUserEntity , string $credentialType ) : array {
$credentialsForUserEntity = $this -> findAllForUserEntity ( $publicKeyCredentialUserEntity );
$credentialsByType = [];
foreach ( $credentialsForUserEntity as $credential ){
if ( $this -> findOneMetaByCredentialId ( $credential -> getPublicKeyCredentialId ())[ " authenticator_type " ] === $credentialType ){
$credentialsByType [] = $credential ;
}
}
return $credentialsByType ;
}
// Save credential into database
public function saveCredentialSource ( PublicKeyCredentialSource $publicKeyCredentialSource , bool $usernameless = false ) : void {
$data = $this -> read ();
$data_key = base64_encode ( $publicKeyCredentialSource -> getPublicKeyCredentialId ());
$data [ $data_key ] = $publicKeyCredentialSource ;
$this -> write ( $data , $data_key , $usernameless );
}
// Update credential's last used
public function updateCredentialLastUsed ( string $publicKeyCredentialId ) : void {
$credential = $this -> findOneMetaByCredentialId ( $publicKeyCredentialId );
if ( $credential !== null ){
$credential [ " last_used " ] = date ( 'Y-m-d H:i:s' , current_time ( 'timestamp' ));
$meta = json_decode ( wwa_get_option ( " user_credentials_meta " ), true );
$meta [ base64_encode ( $publicKeyCredentialId )] = $credential ;
wwa_update_option ( " user_credentials_meta " , json_encode ( $meta ));
}
}
// List all authenticators
public function getShowList ( PublicKeyCredentialUserEntity $publicKeyCredentialUserEntity ) : array {
$data = json_decode ( wwa_get_option ( " user_credentials_meta " ), true );
$arr = array ();
$user_id = $publicKeyCredentialUserEntity -> getId ();
foreach ( $data as $key => $value ){
if ( $user_id === $value [ " user " ]){
array_push ( $arr , array (
" key " => rtrim ( strtr ( base64_encode ( $key ), '+/' , '-_' ), '=' ),
" name " => base64_decode ( $value [ " human_name " ]),
" type " => $value [ " authenticator_type " ],
" added " => $value [ " added " ],
" usernameless " => isset ( $value [ " usernameless " ]) ? $value [ " usernameless " ] : false ,
" last_used " => isset ( $value [ " last_used " ]) ? $value [ " last_used " ] : " - "
));
}
}
return array_map ( function ( $item ){ return array ( " key " => $item [ " key " ], " name " => $item [ " name " ], " type " => $item [ " type " ], " added " => $item [ " added " ], " usernameless " => $item [ " usernameless " ], " last_used " => $item [ " last_used " ]);}, $arr );
}
// Modify an authenticator
public function modifyAuthenticator ( string $id , string $name , PublicKeyCredentialUserEntity $publicKeyCredentialUserEntity , string $action , string $res_id ) : string {
$keys = $this -> findAllForUserEntity ( $publicKeyCredentialUserEntity );
$user_id = $publicKeyCredentialUserEntity -> getId ();
// Check if the user has the authenticator
foreach ( $keys as $item ){
if ( $item -> getUserHandle () === $user_id ){
if ( base64_encode ( $item -> getPublicKeyCredentialId ()) === base64_decode ( str_pad ( strtr ( $id , '-_' , '+/' ), strlen ( $id ) % 4 , '=' , STR_PAD_RIGHT ))){
if ( $action === " rename " ){
$this -> renameCredential ( base64_encode ( $item -> getPublicKeyCredentialId ()), $name , $res_id );
} else if ( $action === " remove " ){
$this -> removeCredential ( base64_encode ( $item -> getPublicKeyCredentialId ()), $res_id );
}
wwa_add_log ( $res_id , " ajax_modify_authenticator: Done " );
return " true " ;
}
}
}
wwa_add_log ( $res_id , " ajax_modify_authenticator: (ERROR)Authenticator not found, exit " );
return " Not Found. " ;
}
// Rename a credential from database by credential ID
private function renameCredential ( string $id , string $name , string $res_id ) : void {
$meta = json_decode ( wwa_get_option ( " user_credentials_meta " ), true );
wwa_add_log ( $res_id , " ajax_modify_authenticator: Rename \" " . base64_decode ( $meta [ $id ][ " human_name " ]) . " \" -> \" " . $name . " \" " );
$meta [ $id ][ " human_name " ] = base64_encode ( $name );
wwa_update_option ( " user_credentials_meta " , json_encode ( $meta ));
}
// Remove a credential from database by credential ID
private function removeCredential ( string $id , string $res_id ) : void {
$data = $this -> read ();
unset ( $data [ $id ]);
$this -> write ( $data , '' );
$meta = json_decode ( wwa_get_option ( " user_credentials_meta " ), true );
wwa_add_log ( $res_id , " ajax_modify_authenticator: Remove \" " . base64_decode ( $meta [ $id ][ " human_name " ]) . " \" " );
unset ( $meta [ $id ]);
wwa_update_option ( " user_credentials_meta " , json_encode ( $meta ));
}
// Read credential database
private function read () : array {
if ( wwa_get_option ( " user_credentials " ) !== NULL ){
try {
return json_decode ( wwa_get_option ( " user_credentials " ), true );
} catch ( \Throwable $exception ) {
return [];
}
}
return [];
}
// Save credentials data
private function write ( array $data , string $key , bool $usernameless = false ) : void {
if ( isset ( $_POST [ " type " ]) && ( $_POST [ " type " ] === " platform " || $_POST [ " type " ] == " cross-platform " || $_POST [ " type " ] === " none " ) && $key !== '' ){
// Save credentials's meta separately
$source = $data [ $key ] -> getUserHandle ();
$meta = json_decode ( wwa_get_option ( " user_credentials_meta " ), true );
$meta [ $key ] = array ( " human_name " => base64_encode ( sanitize_text_field ( $_POST [ " name " ])), " added " => date ( 'Y-m-d H:i:s' , current_time ( 'timestamp' )), " authenticator_type " => $_POST [ " type " ], " user " => $source , " usernameless " => $usernameless , " last_used " => " - " );
wwa_update_option ( " user_credentials_meta " , json_encode ( $meta ));
}
wwa_update_option ( " user_credentials " , json_encode ( $data ));
}
}
// Bind an authenticator
function wwa_ajax_create (){
try {
$res_id = wwa_generate_random_string ( 5 );
$client_id = strval ( time ()) . wwa_generate_random_string ( 24 );
wwa_init_new_options ();
wwa_add_log ( $res_id , " ajax_create: Start " );
if ( ! current_user_can ( " read " )){
wwa_add_log ( $res_id , " ajax_create: (ERROR)Permission denied, exit " );
wwa_wp_die ( " Something went wrong. " , $client_id );
}
2023-10-22 22:21:36 +00:00
if ( wwa_get_option ( " website_name " ) === " " || wwa_get_option ( 'website_domain' ) === " " ){
2022-10-08 02:41:03 +00:00
wwa_add_log ( $res_id , " ajax_create: (ERROR)Plugin not configured, exit " );
wwa_wp_die ( " Not configured. " , $client_id );
}
// Check queries
if ( ! isset ( $_GET [ " name " ]) || ! isset ( $_GET [ " type " ]) || ! isset ( $_GET [ " usernameless " ])){
wwa_add_log ( $res_id , " ajax_create: (ERROR)Missing parameters, exit " );
wwa_wp_die ( " Bad Request. " , $client_id );
} else {
// Sanitize the input
$wwa_get = array ();
$wwa_get [ " name " ] = sanitize_text_field ( $_GET [ " name " ]);
$wwa_get [ " type " ] = sanitize_text_field ( $_GET [ " type " ]);
$wwa_get [ " usernameless " ] = sanitize_text_field ( $_GET [ " usernameless " ]);
wwa_add_log ( $res_id , " ajax_create: name => \" " . $wwa_get [ " name " ] . " \" , type => \" " . $wwa_get [ " type " ] . " \" , usernameless => \" " . $wwa_get [ " usernameless " ] . " \" " );
}
$user_info = wp_get_current_user ();
if ( isset ( $_GET [ " user_id " ])){
$user_id = intval ( sanitize_text_field ( $_GET [ " user_id " ]));
if ( $user_id <= 0 ){
wwa_add_log ( $res_id , " ajax_create: (ERROR)Wrong parameters, exit " );
wwa_wp_die ( " Bad Request. " );
}
if ( $user_info -> ID !== $user_id ){
if ( ! current_user_can ( " edit_user " , $user_id )){
wwa_add_log ( $res_id , " ajax_create: (ERROR)No permission, exit " );
wwa_wp_die ( " Something went wrong. " );
}
$user_info = get_user_by ( 'id' , $user_id );
if ( $user_info === false ){
wwa_add_log ( $res_id , " ajax_create: (ERROR)Wrong user ID, exit " );
wwa_wp_die ( " Something went wrong. " );
}
}
}
// Empty authenticator name
if ( $wwa_get [ " name " ] === " " ){
wwa_add_log ( $res_id , " ajax_create: (ERROR)Empty name, exit " );
wwa_wp_die ( " Bad Request. " , $client_id );
}
// Usernameless authentication not allowed
if ( $wwa_get [ " usernameless " ] === " true " && wwa_get_option ( " usernameless_login " ) !== " true " ){
wwa_add_log ( $res_id , " ajax_create: (ERROR)Usernameless authentication not allowed, exit " );
wwa_wp_die ( " Bad Request. " , $client_id );
}
// Check authenticator type
$allow_authenticator_type = wwa_get_option ( " allow_authenticator_type " );
if ( $allow_authenticator_type !== false && $allow_authenticator_type !== " none " ){
if ( $allow_authenticator_type != $wwa_get [ " type " ]){
wwa_add_log ( $res_id , " ajax_create: (ERROR)Credential type error, type => \" " . $wwa_get [ " type " ] . " \" , allow_authenticator_type => \" " . $allow_authenticator_type . " \" , exit " );
wwa_wp_die ( " Bad Request. " , $client_id );
}
}
$rpEntity = new PublicKeyCredentialRpEntity (
wwa_get_option ( " website_name " ),
wwa_get_option ( " website_domain " )
);
$publicKeyCredentialSourceRepository = new PublicKeyCredentialSourceRepository ();
$server = new Server (
$rpEntity ,
$publicKeyCredentialSourceRepository ,
null
);
wwa_add_log ( $res_id , " ajax_create: user => \" " . $user_info -> user_login . " \" " );
// Get user ID or create one
$user_key = " " ;
if ( ! isset ( wwa_get_option ( " user_id " )[ $user_info -> user_login ])){
wwa_add_log ( $res_id , " ajax_create: User not initialized, initialize " );
$user_array = wwa_get_option ( " user_id " );
$user_key = hash ( " sha256 " , $user_info -> user_login . " - " . $user_info -> display_name . " - " . wwa_generate_random_string ( 10 ));
$user_array [ $user_info -> user_login ] = $user_key ;
wwa_update_option ( " user_id " , $user_array );
} else {
$user_key = wwa_get_option ( " user_id " )[ $user_info -> user_login ];
}
$user = array (
" login " => $user_info -> user_login ,
" id " => $user_key ,
" display " => $user_info -> display_name ,
" icon " => get_avatar_url ( $user_info -> user_email , array ( " scheme " => " https " ))
);
$userEntity = new PublicKeyCredentialUserEntity (
$user [ " login " ],
$user [ " id " ],
$user [ " display " ],
$user [ " icon " ]
);
$credentialSourceRepository = new PublicKeyCredentialSourceRepository ();
$credentialSources = $credentialSourceRepository -> findAllForUserEntity ( $userEntity );
// Convert the Credential Sources into Public Key Credential Descriptors for excluding
$excludeCredentials = array_map ( function ( PublicKeyCredentialSource $credential ) {
return $credential -> getPublicKeyCredentialDescriptor ();
}, $credentialSources );
wwa_add_log ( $res_id , " ajax_create: excludeCredentials => " . json_encode ( $excludeCredentials ));
// Set authenticator type
if ( $wwa_get [ " type " ] === " platform " ){
$authenticator_type = AuthenticatorSelectionCriteria :: AUTHENTICATOR_ATTACHMENT_PLATFORM ;
} else if ( $wwa_get [ " type " ] === " cross-platform " ){
$authenticator_type = AuthenticatorSelectionCriteria :: AUTHENTICATOR_ATTACHMENT_CROSS_PLATFORM ;
} else {
$authenticator_type = AuthenticatorSelectionCriteria :: AUTHENTICATOR_ATTACHMENT_NO_PREFERENCE ;
}
// Set user verification
if ( wwa_get_option ( " user_verification " ) === " true " ){
wwa_add_log ( $res_id , " ajax_create: user_verification => \" true \" " );
$user_verification = AuthenticatorSelectionCriteria :: USER_VERIFICATION_REQUIREMENT_REQUIRED ;
} else {
wwa_add_log ( $res_id , " ajax_create: user_verification => \" false \" " );
$user_verification = AuthenticatorSelectionCriteria :: USER_VERIFICATION_REQUIREMENT_DISCOURAGED ;
}
$resident_key = false ;
// Set usernameless authentication
if ( $wwa_get [ " usernameless " ] === " true " ){
wwa_add_log ( $res_id , " ajax_create: Usernameless set, user_verification => \" true \" " );
$user_verification = AuthenticatorSelectionCriteria :: USER_VERIFICATION_REQUIREMENT_REQUIRED ;
$resident_key = true ;
}
// Create authenticator selection
$authenticatorSelectionCriteria = new AuthenticatorSelectionCriteria (
$authenticator_type ,
$resident_key ,
$user_verification
);
// Create a creation challenge
$publicKeyCredentialCreationOptions = $server -> generatePublicKeyCredentialCreationOptions (
$userEntity ,
PublicKeyCredentialCreationOptions :: ATTESTATION_CONVEYANCE_PREFERENCE_NONE ,
$excludeCredentials ,
$authenticatorSelectionCriteria
);
// Save for future use
wwa_set_temp_val ( " pkcco " , base64_encode ( serialize ( $publicKeyCredentialCreationOptions )), $client_id );
wwa_set_temp_val ( " bind_config " , array ( " name " => $wwa_get [ " name " ], " type " => $wwa_get [ " type " ], " usernameless " => $resident_key ), $client_id );
header ( " Content-Type: application/json " );
$publicKeyCredentialCreationOptions = json_decode ( json_encode ( $publicKeyCredentialCreationOptions ), true );
$publicKeyCredentialCreationOptions [ " clientID " ] = $client_id ;
echo json_encode ( $publicKeyCredentialCreationOptions );
wwa_add_log ( $res_id , " ajax_create: Challenge sent " );
exit ;
} catch ( \Exception $exception ){
wwa_add_log ( $res_id , " ajax_create: (ERROR) " . $exception -> getMessage ());
wwa_add_log ( $res_id , wwa_generate_call_trace ( $exception ));
wwa_add_log ( $res_id , " ajax_create: (ERROR)Unknown error, exit " );
wwa_wp_die ( " Something went wrong. " , $client_id );
} catch ( \Error $error ){
wwa_add_log ( $res_id , " ajax_create: (ERROR) " . $error -> getMessage ());
wwa_add_log ( $res_id , wwa_generate_call_trace ( $error ));
wwa_add_log ( $res_id , " ajax_create: (ERROR)Unknown error, exit " );
wwa_wp_die ( " Something went wrong. " , $client_id );
}
}
add_action ( " wp_ajax_wwa_create " , " wwa_ajax_create " );
// Verify the attestation
function wwa_ajax_create_response (){
$client_id = false ;
try {
$res_id = wwa_generate_random_string ( 5 );
wwa_init_new_options ();
wwa_add_log ( $res_id , " ajax_create_response: Client response received " );
if ( ! isset ( $_POST [ " clientid " ])){
wwa_add_log ( $res_id , " ajax_create_response: (ERROR)Missing parameters, exit " );
wp_die ( " Bad Request. " );
} else {
if ( strlen ( $_POST [ " clientid " ]) < 34 || strlen ( $_POST [ " clientid " ]) > 35 ){
wwa_add_log ( $res_id , " ajax_create_response: (ERROR)Wrong client ID, exit " );
wwa_wp_die ( " Bad Request. " , $client_id );
}
// Sanitize the input
$client_id = sanitize_text_field ( $_POST [ " clientid " ]);
}
if ( ! current_user_can ( " read " )){
wwa_add_log ( $res_id , " ajax_create_response: (ERROR)Permission denied, exit " );
wwa_wp_die ( " Something went wrong. " , $client_id );
}
// Check POST
if ( ! isset ( $_POST [ " data " ]) || ! isset ( $_POST [ " name " ]) || ! isset ( $_POST [ " type " ]) || ! isset ( $_POST [ " usernameless " ])){
wwa_add_log ( $res_id , " ajax_create_response: (ERROR)Missing parameters, exit " );
wwa_wp_die ( " Bad Request. " , $client_id );
} else {
// Sanitize the input
$wwa_post = array ();
$wwa_post [ " name " ] = sanitize_text_field ( $_POST [ " name " ]);
$wwa_post [ " type " ] = sanitize_text_field ( $_POST [ " type " ]);
$wwa_post [ " usernameless " ] = sanitize_text_field ( $_POST [ " usernameless " ]);
wwa_add_log ( $res_id , " ajax_create_response: name => \" " . $wwa_post [ " name " ] . " \" , type => \" " . $wwa_post [ " type " ] . " \" , usernameless => \" " . $wwa_post [ " usernameless " ] . " \" " );
wwa_add_log ( $res_id , " ajax_create_response: data => " . base64_decode ( $_POST [ " data " ]));
}
if ( isset ( $_GET [ " user_id " ])){
$user_id = intval ( sanitize_text_field ( $_POST [ " user_id " ]));
if ( $user_id <= 0 ){
wwa_add_log ( $res_id , " ajax_create_response: (ERROR)Wrong parameters, exit " );
wwa_wp_die ( " Bad Request. " );
}
if ( wp_get_current_user () -> ID !== $user_id ){
if ( ! current_user_can ( " edit_user " , $user_id )){
wwa_add_log ( $res_id , " ajax_create_response: (ERROR)No permission, exit " );
wwa_wp_die ( " Something went wrong. " );
}
}
}
$temp_val = array (
" pkcco " => wwa_get_temp_val ( " pkcco " , $client_id ),
" bind_config " => wwa_get_temp_val ( " bind_config " , $client_id )
);
// May not get the challenge yet
if ( $temp_val [ " pkcco " ] === false || $temp_val [ " bind_config " ] === false ){
wwa_add_log ( $res_id , " ajax_create_response: (ERROR)Challenge not found in transient, exit " );
wwa_wp_die ( " Bad request. " , $client_id );
}
// Check parameters
if ( $temp_val [ " bind_config " ][ " type " ] !== " platform " && $temp_val [ " bind_config " ][ " type " ] !== " cross-platform " && $temp_val [ " bind_config " ][ " type " ] !== " none " ){
wwa_add_log ( $res_id , " ajax_create_response: (ERROR)Wrong type, exit " );
wwa_wp_die ( " Bad request. " , $client_id );
}
if ( $temp_val [ " bind_config " ][ " type " ] !== $wwa_post [ " type " ] || $temp_val [ " bind_config " ][ " name " ] !== $wwa_post [ " name " ]){
wwa_add_log ( $res_id , " ajax_create_response: (ERROR)Wrong parameters, exit " );
wwa_wp_die ( " Bad Request. " , $client_id );
}
// Check global unique credential ID
$credential_id = base64_decode ( json_decode ( base64_decode ( $_POST [ " data " ]), true )[ " rawId " ]);
$publicKeyCredentialSourceRepository = new PublicKeyCredentialSourceRepository ();
if ( $publicKeyCredentialSourceRepository -> findOneMetaByCredentialId ( $credential_id ) !== null ){
wwa_add_log ( $res_id , " ajax_create_response: (ERROR)Credential ID not unique, ID => \" " . base64_encode ( $credential_id ) . " \" , exit " );
wwa_wp_die ( " Something went wrong. " , $client_id );
} else {
wwa_add_log ( $res_id , " ajax_create_response: Credential ID unique check passed " );
}
$psr17Factory = new Psr17Factory ();
$creator = new ServerRequestCreator (
$psr17Factory ,
$psr17Factory ,
$psr17Factory ,
$psr17Factory
);
$serverRequest = $creator -> fromGlobals ();
$rpEntity = new PublicKeyCredentialRpEntity (
wwa_get_option ( " website_name " ),
wwa_get_option ( " website_domain " )
);
$server = new Server (
$rpEntity ,
$publicKeyCredentialSourceRepository ,
null
);
// Allow to bypass scheme verification when under localhost
$current_domain = wwa_get_option ( 'website_domain' );
if ( $current_domain === " localhost " || $current_domain === " 127.0.0.1 " ){
$server -> setSecuredRelyingPartyId ([ $current_domain ]);
wwa_add_log ( $res_id , " ajax_create_response: Localhost, bypass HTTPS check " );
}
// Verify
try {
$publicKeyCredentialSource = $server -> loadAndCheckAttestationResponse (
base64_decode ( $_POST [ " data " ]),
unserialize ( base64_decode ( $temp_val [ " pkcco " ])),
$serverRequest
);
wwa_add_log ( $res_id , " ajax_create_response: Challenge verified " );
$publicKeyCredentialSourceRepository -> saveCredentialSource ( $publicKeyCredentialSource , $temp_val [ " bind_config " ][ " usernameless " ]);
if ( $temp_val [ " bind_config " ][ " usernameless " ]){
wwa_add_log ( $res_id , " ajax_create_response: Authenticator added with usernameless authentication feature " );
} else {
wwa_add_log ( $res_id , " ajax_create_response: Authenticator added " );
}
// Success
echo " true " ;
} catch ( \Throwable $exception ){
// Failed to verify
wwa_add_log ( $res_id , " ajax_create_response: (ERROR) " . $exception -> getMessage ());
wwa_add_log ( $res_id , wwa_generate_call_trace ( $exception ));
wwa_add_log ( $res_id , " ajax_create_response: (ERROR)Challenge not verified, exit " );
wwa_wp_die ( " Something went wrong. " , $client_id );
}
// Destroy transients
wwa_destroy_temp_val ( $client_id );
exit ;
} catch ( \Exception $exception ){
wwa_add_log ( $res_id , " ajax_create_response: (ERROR) " . $exception -> getMessage ());
wwa_add_log ( $res_id , wwa_generate_call_trace ( $exception ));
wwa_add_log ( $res_id , " ajax_create_response: (ERROR)Unknown error, exit " );
wwa_wp_die ( " Something went wrong. " , $client_id );
} catch ( \Error $error ){
wwa_add_log ( $res_id , " ajax_create_response: (ERROR) " . $error -> getMessage ());
wwa_add_log ( $res_id , wwa_generate_call_trace ( $error ));
wwa_add_log ( $res_id , " ajax_create_response: (ERROR)Unknown error, exit " );
wwa_wp_die ( " Something went wrong. " , $client_id );
}
}
add_action ( " wp_ajax_wwa_create_response " , " wwa_ajax_create_response " );
// Auth challenge
function wwa_ajax_auth_start (){
try {
$res_id = wwa_generate_random_string ( 5 );
$client_id = strval ( time ()) . wwa_generate_random_string ( 24 );
wwa_init_new_options ();
wwa_add_log ( $res_id , " ajax_auth: Start " );
// Check queries
if ( ! isset ( $_GET [ " type " ])){
wwa_add_log ( $res_id , " ajax_auth: (ERROR)Missing parameters, exit " );
wwa_wp_die ( " Bad Request. " , $client_id );
} else {
// Sanitize the input
$wwa_get = array ();
$wwa_get [ " type " ] = sanitize_text_field ( $_GET [ " type " ]);
if ( isset ( $_GET [ " user " ])){
$wwa_get [ " user " ] = sanitize_text_field ( $_GET [ " user " ]);
}
if ( isset ( $_GET [ " usernameless " ])){
$wwa_get [ " usernameless " ] = sanitize_text_field ( $_GET [ " usernameless " ]);
// Usernameless authentication not allowed
if ( $wwa_get [ " usernameless " ] === " true " && wwa_get_option ( " usernameless_login " ) !== " true " ){
wwa_add_log ( $res_id , " ajax_auth: (ERROR)Usernameless authentication not allowed, exit " );
wwa_wp_die ( " Bad Request. " , $client_id );
}
}
}
if ( $wwa_get [ " type " ] === " test " && ! current_user_can ( 'read' )){
// Test but not logged in
wwa_add_log ( $res_id , " ajax_auth: (ERROR)Permission denied, exit " );
wwa_wp_die ( " Bad request. " , $client_id );
}
$user_key = " " ;
$usernameless_flag = false ;
$user_icon = null ;
2023-10-22 22:21:36 +00:00
$user_exist = true ;
2022-10-08 02:41:03 +00:00
if ( $wwa_get [ " type " ] === " test " ){
if ( isset ( $wwa_get [ " usernameless " ])){
if ( $wwa_get [ " usernameless " ] !== " true " ){
// Logged in and testing, if the user haven't bound any authenticator yet, exit
$user_info = wp_get_current_user ();
if ( isset ( $_GET [ " user_id " ])){
$user_id = intval ( sanitize_text_field ( $_GET [ " user_id " ]));
if ( $user_id <= 0 ){
wwa_add_log ( $res_id , " ajax_auth: (ERROR)Wrong parameters, exit " );
wwa_wp_die ( " Bad Request. " );
}
if ( $user_info -> ID !== $user_id ){
if ( ! current_user_can ( " edit_user " , $user_id )){
wwa_add_log ( $res_id , " ajax_auth: (ERROR)No permission, exit " );
wwa_wp_die ( " Something went wrong. " );
}
$user_info = get_user_by ( 'id' , $user_id );
if ( $user_info === false ){
wwa_add_log ( $res_id , " ajax_auth: (ERROR)Wrong user ID, exit " );
wwa_wp_die ( " Something went wrong. " );
}
}
}
wwa_add_log ( $res_id , " ajax_auth: type => \" test \" , user => \" " . $user_info -> user_login . " \" , usernameless => \" false \" " );
if ( ! isset ( wwa_get_option ( " user_id " )[ $user_info -> user_login ])){
wwa_add_log ( $res_id , " ajax_auth: (ERROR)User not initialized, exit " );
wwa_wp_die ( " User not inited. " , $client_id );
} else {
$user_key = wwa_get_option ( " user_id " )[ $user_info -> user_login ];
$user_icon = get_avatar_url ( $user_info -> user_email , array ( " scheme " => " https " ));
}
} else {
if ( wwa_get_option ( " usernameless_login " ) === " true " ){
wwa_add_log ( $res_id , " ajax_auth: type => \" test \" , usernameless => \" true \" " );
$usernameless_flag = true ;
} else {
wwa_add_log ( $res_id , " ajax_auth: (ERROR)Wrong parameters, exit " );
wwa_wp_die ( " Bad Request. " , $client_id );
}
}
} else {
wwa_add_log ( $res_id , " ajax_auth: (ERROR)Missing parameters, exit " );
wwa_wp_die ( " Bad Request. " , $client_id );
}
} else {
// Not testing, create a fake user ID if the user does not exist or haven't bound any authenticator yet
if ( isset ( $wwa_get [ " user " ]) && $wwa_get [ " user " ] !== " " ){
2023-10-22 22:21:36 +00:00
$wp_user = wwa_get_user ( $wwa_get [ " user " ]);
if ( wwa_get_option ( " email_login " ) === " true " && is_email ( $wwa_get [ " user " ])){
wwa_add_log ( $res_id , " ajax_auth: email_login => \" true \" , trying to find user by email address \" " . $wwa_get [ " user " ] . " \" " );
}
if ( $wp_user !== false ){
$user_info = $wp_user ;
2022-10-08 02:41:03 +00:00
$user_icon = get_avatar_url ( $user_info -> user_email , array ( " scheme " => " https " ));
wwa_add_log ( $res_id , " ajax_auth: type => \" auth \" , user => \" " . $user_info -> user_login . " \" " );
if ( ! isset ( wwa_get_option ( " user_id " )[ $user_info -> user_login ])){
wwa_add_log ( $res_id , " ajax_auth: User not initialized, initialize " );
$user_key = hash ( " sha256 " , $wwa_get [ " user " ] . " - " . $wwa_get [ " user " ] . " - " . wwa_generate_random_string ( 10 ));
2023-10-22 22:21:36 +00:00
$user_exist = false ;
2022-10-08 02:41:03 +00:00
} else {
$user_key = wwa_get_option ( " user_id " )[ $user_info -> user_login ];
}
} else {
$user_info = new stdClass ();
$user_info -> user_login = $wwa_get [ " user " ];
$user_info -> display_name = $wwa_get [ " user " ];
$user_key = hash ( " sha256 " , $wwa_get [ " user " ] . " - " . $wwa_get [ " user " ] . " - " . wwa_generate_random_string ( 10 ));
wwa_add_log ( $res_id , " ajax_auth: User not exists, create a fake id " );
2023-10-22 22:21:36 +00:00
wwa_add_log ( $res_id , " ajax_auth: type => \" auth \" , user => \" " . $wwa_get [ " user " ] . " \" " );
$user_exist = false ;
2022-10-08 02:41:03 +00:00
}
} else {
if ( wwa_get_option ( " usernameless_login " ) === " true " ){
$usernameless_flag = true ;
wwa_add_log ( $res_id , " ajax_auth: Empty username, try usernameless authentication " );
} else {
wwa_add_log ( $res_id , " ajax_auth: (ERROR)Missing parameters, exit " );
wwa_wp_die ( " Bad Request. " , $client_id );
}
}
}
if ( ! $usernameless_flag ){
$userEntity = new PublicKeyCredentialUserEntity (
$user_info -> user_login ,
$user_key ,
$user_info -> display_name ,
$user_icon
);
}
$credentialSourceRepository = new PublicKeyCredentialSourceRepository ();
$rpEntity = new PublicKeyCredentialRpEntity (
wwa_get_option ( 'website_name' ),
wwa_get_option ( 'website_domain' )
);
$server = new Server (
$rpEntity ,
$credentialSourceRepository ,
null
);
if ( $usernameless_flag ){
// Usernameless authentication, return empty allowed credentials list
wwa_add_log ( $res_id , " ajax_auth: Usernameless authentication, allowedCredentials => [] " );
$allowedCredentials = array ();
} else {
// Get the list of authenticators associated to the user
// $credentialSources = $credentialSourceRepository->findAllForUserEntity($userEntity);
$allow_authenticator_type = wwa_get_option ( 'allow_authenticator_type' );
if ( $allow_authenticator_type === false || $allow_authenticator_type === 'none' ){
$credentialSources = $credentialSourceRepository -> findAllForUserEntity ( $userEntity );
} else if ( $allow_authenticator_type !== false && $allow_authenticator_type !== 'none' ){
wwa_add_log ( $res_id , " ajax_auth: allow_authenticator_type => \" " . $allow_authenticator_type . " \" , filter authenticators " );
$credentialSources = $credentialSourceRepository -> findCredentialsForUserEntityByType ( $userEntity , $allow_authenticator_type );
}
// Logged in and testing, if the user haven't bind a authenticator yet, exit
if ( count ( $credentialSources ) === 0 && $wwa_get [ " type " ] === " test " && current_user_can ( 'read' )){
wwa_add_log ( $res_id , " ajax_auth: (ERROR)No authenticator, exit " );
wwa_wp_die ( " User not inited. " , $client_id );
}
// Convert the Credential Sources into Public Key Credential Descriptors for excluding
$allowedCredentials = array_map ( function ( PublicKeyCredentialSource $credential ){
return $credential -> getPublicKeyCredentialDescriptor ();
}, $credentialSources );
wwa_add_log ( $res_id , " ajax_auth: allowedCredentials => " . json_encode ( $allowedCredentials ));
}
// Set user verification
if ( wwa_get_option ( " user_verification " ) === " true " ){
wwa_add_log ( $res_id , " ajax_auth: user_verification => \" true \" " );
$user_verification = AuthenticatorSelectionCriteria :: USER_VERIFICATION_REQUIREMENT_REQUIRED ;
} else {
wwa_add_log ( $res_id , " ajax_auth: user_verification => \" false \" " );
$user_verification = AuthenticatorSelectionCriteria :: USER_VERIFICATION_REQUIREMENT_DISCOURAGED ;
}
if ( $usernameless_flag ){
wwa_add_log ( $res_id , " ajax_auth: Usernameless authentication, user_verification => \" true \" " );
$user_verification = AuthenticatorSelectionCriteria :: USER_VERIFICATION_REQUIREMENT_REQUIRED ;
}
// Create a auth challenge
$publicKeyCredentialRequestOptions = $server -> generatePublicKeyCredentialRequestOptions (
$user_verification ,
$allowedCredentials
);
// Save for future use
wwa_set_temp_val ( " pkcco_auth " , base64_encode ( serialize ( $publicKeyCredentialRequestOptions )), $client_id );
wwa_set_temp_val ( " auth_type " , $wwa_get [ " type " ], $client_id );
2023-10-22 22:21:36 +00:00
wwa_set_temp_val ( " user_exist " , $user_exist , $client_id );
2022-10-08 02:41:03 +00:00
if ( ! $usernameless_flag ){
wwa_set_temp_val ( " user_name_auth " , $user_info -> user_login , $client_id );
}
wwa_set_temp_val ( " usernameless_auth " , serialize ( $usernameless_flag ), $client_id );
// Save the user entity if is not logged in and not usernameless
if ( ! ( $wwa_get [ " type " ] === " test " && current_user_can ( " read " )) && ! $usernameless_flag ){
wwa_set_temp_val ( " user_auth " , serialize ( $userEntity ), $client_id );
}
header ( " Content-Type: application/json " );
$publicKeyCredentialRequestOptions = json_decode ( json_encode ( $publicKeyCredentialRequestOptions ), true );
$publicKeyCredentialRequestOptions [ " clientID " ] = $client_id ;
echo json_encode ( $publicKeyCredentialRequestOptions );
wwa_add_log ( $res_id , " ajax_auth: Challenge sent " );
exit ;
} catch ( \Exception $exception ){
wwa_add_log ( $res_id , " ajax_auth: (ERROR) " . $exception -> getMessage ());
wwa_add_log ( $res_id , wwa_generate_call_trace ( $exception ));
wwa_add_log ( $res_id , " ajax_auth: (ERROR)Unknown error, exit " );
wwa_wp_die ( " Something went wrong. " , $client_id );
} catch ( \Error $error ){
wwa_add_log ( $res_id , " ajax_auth: (ERROR) " . $error -> getMessage ());
wwa_add_log ( $res_id , wwa_generate_call_trace ( $error ));
wwa_add_log ( $res_id , " ajax_auth: (ERROR)Unknown error, exit " );
wwa_wp_die ( " Something went wrong. " , $client_id );
}
}
add_action ( " wp_ajax_wwa_auth_start " , " wwa_ajax_auth_start " );
add_action ( " wp_ajax_nopriv_wwa_auth_start " , " wwa_ajax_auth_start " );
function wwa_ajax_auth (){
$client_id = false ;
try {
$res_id = wwa_generate_random_string ( 5 );
wwa_init_new_options ();
wwa_add_log ( $res_id , " ajax_auth_response: Client response received " );
if ( ! isset ( $_POST [ " clientid " ])){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Missing parameters, exit " );
wp_die ( " Bad Request. " );
} else {
if ( strlen ( $_POST [ " clientid " ]) < 34 || strlen ( $_POST [ " clientid " ]) > 35 ){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Wrong client ID, exit " );
wwa_wp_die ( " Bad Request. " , $client_id );
}
// Sanitize the input
$client_id = sanitize_text_field ( $_POST [ " clientid " ]);
}
// Check POST
if ( ! isset ( $_POST [ " type " ]) || ! isset ( $_POST [ " data " ]) || ! isset ( $_POST [ " remember " ])){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Missing parameters, exit " );
wwa_wp_die ( " Bad Request. " , $client_id );
} else {
// Sanitize the input
$wwa_post = array ();
$wwa_post [ " type " ] = sanitize_text_field ( $_POST [ " type " ]);
$wwa_post [ " remember " ] = sanitize_text_field ( $_POST [ " remember " ]);
}
$temp_val = array (
" pkcco_auth " => wwa_get_temp_val ( " pkcco_auth " , $client_id ),
" auth_type " => wwa_get_temp_val ( " auth_type " , $client_id ),
" usernameless_auth " => wwa_get_temp_val ( " usernameless_auth " , $client_id ),
" user_auth " => wwa_get_temp_val ( " user_auth " , $client_id ),
2023-10-22 22:21:36 +00:00
" user_name_auth " => wwa_get_temp_val ( " user_name_auth " , $client_id ),
" user_exist " => wwa_get_temp_val ( " user_exist " , $client_id ),
2022-10-08 02:41:03 +00:00
);
if ( $temp_val [ " auth_type " ] === false || $wwa_post [ " type " ] !== $temp_val [ " auth_type " ]){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Wrong parameters, exit " );
wwa_wp_die ( " Bad Request. " , $client_id );
}
// Check remember me
if ( $wwa_post [ " remember " ] !== " true " && $wwa_post [ " remember " ] !== " false " ){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Wrong parameters, exit " );
wwa_wp_die ( " Bad Request. " , $client_id );
2023-10-22 22:21:36 +00:00
} else if ( wwa_get_option ( " remember_me " ) !== " true " && $wwa_post [ " remember " ] === " true " ){
2022-10-08 02:41:03 +00:00
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Wrong parameters, exit " );
wwa_wp_die ( " Bad Request. " , $client_id );
}
// May not get the challenge yet
if ( $temp_val [ " pkcco_auth " ] === false || $temp_val [ " usernameless_auth " ] === false || ( $wwa_post [ " type " ] !== " test " && $wwa_post [ " type " ] !== " auth " )){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Challenge not found in transient, exit " );
wwa_wp_die ( " Bad request. " , $client_id );
}
$temp_val [ " usernameless_auth " ] = unserialize ( $temp_val [ " usernameless_auth " ]);
if ( $temp_val [ " usernameless_auth " ] === false && $temp_val [ " user_name_auth " ] === false ){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Username not found in transient, exit " );
wwa_wp_die ( " Bad request. " , $client_id );
}
if ( $wwa_post [ " type " ] === " test " && ! current_user_can ( " read " )){
// Test but not logged in
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Permission denied, exit " );
wwa_wp_die ( " Bad request. " , $client_id );
}
if ( ! ( $wwa_post [ " type " ] === " test " && current_user_can ( " read " )) && ( $temp_val [ " usernameless_auth " ] === false && $temp_val [ " user_auth " ] === false )){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Permission denied, exit " );
wwa_wp_die ( " Bad request. " , $client_id );
}
$usernameless_flag = $temp_val [ " usernameless_auth " ];
$psr17Factory = new Psr17Factory ();
$creator = new ServerRequestCreator (
$psr17Factory ,
$psr17Factory ,
$psr17Factory ,
$psr17Factory
);
$serverRequest = $creator -> fromGlobals ();
$publicKeyCredentialSourceRepository = new PublicKeyCredentialSourceRepository ();
// If user entity is not saved, read from WordPress
$user_key = " " ;
if ( $wwa_post [ " type " ] === " test " && current_user_can ( 'read' ) && ! $usernameless_flag ){
$user_info = wp_get_current_user ();
if ( isset ( $_GET [ " user_id " ])){
$user_id = intval ( sanitize_text_field ( $_POST [ " user_id " ]));
if ( $user_id <= 0 ){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Wrong parameters, exit " );
wwa_wp_die ( " Bad Request. " );
}
if ( $user_info -> ID !== $user_id ){
if ( ! current_user_can ( " edit_user " , $user_id )){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)No permission, exit " );
wwa_wp_die ( " Something went wrong. " );
}
$user_info = get_user_by ( 'id' , $user_id );
if ( $user_info === false ){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Wrong user ID, exit " );
wwa_wp_die ( " Something went wrong. " );
}
}
}
if ( ! isset ( wwa_get_option ( " user_id " )[ $user_info -> user_login ])){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)User not initialized, exit " );
wwa_wp_die ( " User not inited. " , $client_id );
} else {
$user_key = wwa_get_option ( " user_id " )[ $user_info -> user_login ];
$user_icon = get_avatar_url ( $user_info -> user_email , array ( " scheme " => " https " ));
}
$userEntity = new PublicKeyCredentialUserEntity (
$user_info -> user_login ,
$user_key ,
$user_info -> display_name ,
$user_icon
);
wwa_add_log ( $res_id , " ajax_auth_response: type => \" test \" , user => \" " . $user_info -> user_login . " \" " );
} else {
if ( $usernameless_flag ){
$data_array = json_decode ( base64_decode ( $_POST [ " data " ]), true );
if ( ! isset ( $data_array [ " response " ][ " userHandle " ]) || ! isset ( $data_array [ " rawId " ])){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Client data not correct, exit " );
wwa_wp_die ( " Bad request. " , $client_id );
}
wwa_add_log ( $res_id , " ajax_auth_response: type => \" " . $wwa_post [ " type " ] . " \" " );
wwa_add_log ( $res_id , " ajax_auth_response: Usernameless authentication, try to find user by credential_id => \" " . $data_array [ " rawId " ] . " \" , userHandle => \" " . $data_array [ " response " ][ " userHandle " ] . " \" " );
$credential_meta = $publicKeyCredentialSourceRepository -> findOneMetaByCredentialId ( base64_decode ( $data_array [ " rawId " ]));
if ( $credential_meta !== null ){
$allow_authenticator_type = wwa_get_option ( " allow_authenticator_type " );
if ( $allow_authenticator_type !== false && $allow_authenticator_type !== 'none' ){
if ( $credential_meta [ " authenticator_type " ] !== $allow_authenticator_type ){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Credential type error, authenticator_type => \" " . $credential_meta [ " authenticator_type " ] . " \" , allow_authenticator_type => \" " . $allow_authenticator_type . " \" , exit " );
wwa_wp_die ( " Bad request. " , $client_id );
}
}
if ( $credential_meta [ " usernameless " ] === true ){
wwa_add_log ( $res_id , " ajax_auth_response: Credential found, usernameless => \" true \" , user_key => \" " . $credential_meta [ " user " ] . " \" " );
// Try to find user
$all_user = wwa_get_option ( " user_id " );
$user_login_name = false ;
foreach ( $all_user as $user => $user_id ){
if ( $user_id === $credential_meta [ " user " ]){
$user_login_name = $user ;
break ;
}
}
// Match userHandle
if ( $credential_meta [ " user " ] === base64_decode ( $data_array [ " response " ][ " userHandle " ])){
// Found user
if ( $user_login_name !== false ){
wwa_add_log ( $res_id , " ajax_auth_response: Found user => \" " . $user_login_name . " \" , user_key => \" " . $credential_meta [ " user " ] . " \" " );
// Testing, verify user
if ( $wwa_post [ " type " ] === " test " && current_user_can ( 'read' )){
$user_wp = wp_get_current_user ();
if ( $user_login_name !== $user_wp -> user_login ){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Credential found, but user not match, exit " );
wwa_wp_die ( " Bad request. " , $client_id );
}
}
2023-10-22 22:21:36 +00:00
2022-10-08 02:41:03 +00:00
$user_info = get_user_by ( 'login' , $user_login_name );
if ( $user_info === false ){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Wrong user ID, exit " );
wwa_wp_die ( " Something went wrong. " );
}
$userEntity = new PublicKeyCredentialUserEntity (
$user_info -> user_login ,
$credential_meta [ " user " ],
$user_info -> display_name ,
get_avatar_url ( $user_info -> user_email , array ( " scheme " => " https " ))
);
} else {
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Credential found, but user not found, exit " );
wwa_wp_die ( " Bad request. " , $client_id );
}
} else {
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Credential found, but userHandle not matched, exit " );
wwa_wp_die ( " Bad request. " , $client_id );
}
} else {
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Credential found, but usernameless => \" false \" , exit " );
wwa_wp_die ( " Bad request. " , $client_id );
}
} else {
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Credential not found, exit " );
wwa_wp_die ( " Bad request. " , $client_id );
}
} else {
wwa_add_log ( $res_id , " ajax_auth_response: type => \" auth \" , user => \" " . $temp_val [ " user_name_auth " ] . " \" " );
$userEntity = unserialize ( $temp_val [ " user_auth " ]);
}
}
wwa_add_log ( $res_id , " ajax_auth_response: data => " . base64_decode ( $_POST [ " data " ]));
2023-10-22 22:21:36 +00:00
if ( $temp_val [ " user_exist " ]){
$rpEntity = new PublicKeyCredentialRpEntity (
wwa_get_option ( " website_name " ),
wwa_get_option ( " website_domain " )
);
2022-10-08 02:41:03 +00:00
2023-10-22 22:21:36 +00:00
$server = new Server (
$rpEntity ,
$publicKeyCredentialSourceRepository ,
null
2022-10-08 02:41:03 +00:00
);
2023-10-22 22:21:36 +00:00
// Allow to bypass scheme verification when under localhost
$current_domain = wwa_get_option ( " website_domain " );
if ( $current_domain === " localhost " || $current_domain === " 127.0.0.1 " ){
$server -> setSecuredRelyingPartyId ([ $current_domain ]);
wwa_add_log ( $res_id , " ajax_auth_response: Localhost, bypass HTTPS check " );
}
2022-10-08 02:41:03 +00:00
2023-10-22 22:21:36 +00:00
// Verify
try {
$server -> loadAndCheckAssertionResponse (
base64_decode ( $_POST [ " data " ]),
unserialize ( base64_decode ( $temp_val [ " pkcco_auth " ])),
$userEntity ,
$serverRequest
);
wwa_add_log ( $res_id , " ajax_auth_response: Challenge verified " );
// Success
$publicKeyCredentialSourceRepository -> updateCredentialLastUsed ( base64_decode ( json_decode ( base64_decode ( $_POST [ " data " ]), true )[ " rawId " ]));
if ( ! ( $wwa_post [ " type " ] === " test " && current_user_can ( " read " ))){
// Log user in
if ( ! is_user_logged_in ()) {
include ( " wwa-compatibility.php " );
if ( ! $usernameless_flag ){
$user_login = $temp_val [ " user_name_auth " ];
} else {
$user_login = $user_login_name ;
}
2022-10-08 02:41:03 +00:00
2023-10-22 22:21:36 +00:00
$user = get_user_by ( " login " , $user_login );
2022-10-08 02:41:03 +00:00
2023-10-22 22:21:36 +00:00
if ( $user_info === false ){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Wrong user ID, exit " );
wwa_wp_die ( " Something went wrong. " );
}
2022-10-08 02:41:03 +00:00
2023-10-22 22:21:36 +00:00
$user_id = $user -> ID ;
2022-10-08 02:41:03 +00:00
2023-10-22 22:21:36 +00:00
wwa_add_log ( $res_id , " ajax_auth_response: Log in user => \" " . $user_login . " \" " );
2022-10-08 02:41:03 +00:00
2023-10-22 22:21:36 +00:00
$remember_flag = false ;
2022-10-08 02:41:03 +00:00
2023-10-22 22:21:36 +00:00
if ( $wwa_post [ " remember " ] === " true " && ( wwa_get_option ( " remember_me " ) === false ? " false " : wwa_get_option ( " remember_me " )) !== " false " ) {
$remember_flag = true ;
wwa_add_log ( $res_id , " ajax_auth_response: Remember login for 14 days " );
}
2022-10-08 02:41:03 +00:00
2023-10-22 22:21:36 +00:00
wp_set_current_user ( $user_id , $user_login );
if ( isset ( $_SERVER [ " HTTPS " ]) && $_SERVER [ " HTTPS " ] === " on " ){
wp_set_auth_cookie ( $user_id , $remember_flag , true );
} else {
wp_set_auth_cookie ( $user_id , $remember_flag );
}
do_action ( " wp_login " , $user_login , $user );
2022-10-08 02:41:03 +00:00
}
}
2023-10-22 22:21:36 +00:00
echo " true " ;
} catch ( \Throwable $exception ){
// Failed to verify
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR) " . $exception -> getMessage ());
wwa_add_log ( $res_id , wwa_generate_call_trace ( $exception ));
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Challenge not verified, exit " );
wwa_wp_die ( " Something went wrong. " , $client_id );
2022-10-08 02:41:03 +00:00
}
2023-10-22 22:21:36 +00:00
} else {
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)User not exists or has no authenticator, exit without verification " );
2022-10-08 02:41:03 +00:00
wwa_wp_die ( " Something went wrong. " , $client_id );
}
// Destroy session
wwa_destroy_temp_val ( $client_id );
exit ;
} catch ( \Exception $exception ){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR) " . $exception -> getMessage ());
wwa_add_log ( $res_id , wwa_generate_call_trace ( $exception ));
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Unknown error, exit " );
wwa_wp_die ( " Something went wrong. " , $client_id );
} catch ( \Error $error ){
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR) " . $error -> getMessage ());
wwa_add_log ( $res_id , wwa_generate_call_trace ( $error ));
wwa_add_log ( $res_id , " ajax_auth_response: (ERROR)Unknown error, exit " );
wwa_wp_die ( " Something went wrong. " , $client_id );
}
}
add_action ( " wp_ajax_wwa_auth " , " wwa_ajax_auth " );
add_action ( " wp_ajax_nopriv_wwa_auth " , " wwa_ajax_auth " );
// Get authenticator list
function wwa_ajax_authenticator_list (){
$res_id = wwa_generate_random_string ( 5 );
wwa_init_new_options ();
if ( ! current_user_can ( " read " )){
2023-10-22 22:21:36 +00:00
wwa_add_log ( $res_id , " ajax_authenticator_list: (ERROR)Missing parameters, exit " );
2022-10-08 02:41:03 +00:00
wwa_wp_die ( " Something went wrong. " );
}
$user_info = wp_get_current_user ();
if ( isset ( $_GET [ " user_id " ])){
$user_id = intval ( sanitize_text_field ( $_GET [ " user_id " ]));
if ( $user_id <= 0 ){
2023-10-22 22:21:36 +00:00
wwa_add_log ( $res_id , " ajax_authenticator_list: (ERROR)Wrong parameters, exit " );
2022-10-08 02:41:03 +00:00
wwa_wp_die ( " Bad Request. " );
}
if ( $user_info -> ID !== $user_id ){
if ( ! current_user_can ( " edit_user " , $user_id )){
2023-10-22 22:21:36 +00:00
wwa_add_log ( $res_id , " ajax_authenticator_list: (ERROR)No permission, exit " );
2022-10-08 02:41:03 +00:00
wwa_wp_die ( " Something went wrong. " );
}
$user_info = get_user_by ( 'id' , $user_id );
if ( $user_info === false ){
2023-10-22 22:21:36 +00:00
wwa_add_log ( $res_id , " ajax_authenticator_list: (ERROR)Wrong user ID, exit " );
2022-10-08 02:41:03 +00:00
wwa_wp_die ( " Something went wrong. " );
}
}
}
header ( 'Content-Type: application/json' );
$user_key = " " ;
if ( ! isset ( wwa_get_option ( " user_id " )[ $user_info -> user_login ])){
// The user haven't bound any authenticator, return empty list
echo " [] " ;
exit ;
} else {
$user_key = wwa_get_option ( " user_id " )[ $user_info -> user_login ];
}
$userEntity = new PublicKeyCredentialUserEntity (
$user_info -> user_login ,
$user_key ,
$user_info -> display_name ,
get_avatar_url ( $user_info -> user_email , array ( " scheme " => " https " ))
);
$publicKeyCredentialSourceRepository = new PublicKeyCredentialSourceRepository ();
echo json_encode ( $publicKeyCredentialSourceRepository -> getShowList ( $userEntity ));
exit ;
}
add_action ( " wp_ajax_wwa_authenticator_list " , " wwa_ajax_authenticator_list " );
// Modify an authenticator
function wwa_ajax_modify_authenticator (){
try {
$res_id = wwa_generate_random_string ( 5 );
wwa_init_new_options ();
wwa_add_log ( $res_id , " ajax_modify_authenticator: Start " );
if ( ! current_user_can ( " read " )){
wwa_add_log ( $res_id , " ajax_modify_authenticator: (ERROR)Permission denied, exit " );
wwa_wp_die ( " Bad Request. " );
}
if ( ! isset ( $_GET [ " id " ]) || ! isset ( $_GET [ " target " ])){
wwa_add_log ( $res_id , " ajax_modify_authenticator: (ERROR)Missing parameters, exit " );
wwa_wp_die ( " Bad Request. " );
}
$user_info = wp_get_current_user ();
if ( isset ( $_GET [ " user_id " ])){
$user_id = intval ( sanitize_text_field ( $_GET [ " user_id " ]));
if ( $user_id <= 0 ){
wwa_add_log ( $res_id , " ajax_modify_authenticator: (ERROR)Wrong parameters, exit " );
wwa_wp_die ( " Bad Request. " );
}
if ( $user_info -> ID !== $user_id ){
if ( ! current_user_can ( " edit_user " , $user_id )){
wwa_add_log ( $res_id , " ajax_modify_authenticator: (ERROR)No permission, exit " );
wwa_wp_die ( " Something went wrong. " );
}
$user_info = get_user_by ( 'id' , $user_id );
if ( $user_info === false ){
wwa_add_log ( $res_id , " ajax_modify_authenticator: (ERROR)Wrong user ID, exit " );
wwa_wp_die ( " Something went wrong. " );
}
}
}
if ( $_GET [ " target " ] !== " rename " && $_GET [ " target " ] !== " remove " ){
wwa_add_log ( $res_id , " ajax_modify_authenticator: (ERROR)Wrong target, exit " );
wwa_wp_die ( " Bad Request. " );
}
if ( $_GET [ " target " ] === " rename " && ! isset ( $_GET [ " name " ])){
wwa_add_log ( $res_id , " ajax_modify_authenticator: (ERROR)Missing parameters, exit " );
wwa_wp_die ( " Bad Request. " );
}
$user_key = " " ;
if ( ! isset ( wwa_get_option ( " user_id " )[ $user_info -> user_login ])){
// The user haven't bound any authenticator, exit
wwa_add_log ( $res_id , " ajax_modify_authenticator: (ERROR)User not initialized, exit " );
wwa_wp_die ( " User not inited. " );
} else {
$user_key = wwa_get_option ( " user_id " )[ $user_info -> user_login ];
}
$userEntity = new PublicKeyCredentialUserEntity (
$user_info -> user_login ,
$user_key ,
$user_info -> display_name ,
get_avatar_url ( $user_info -> user_email , array ( " scheme " => " https " ))
);
wwa_add_log ( $res_id , " ajax_modify_authenticator: user => \" " . $user_info -> user_login . " \" " );
$publicKeyCredentialSourceRepository = new PublicKeyCredentialSourceRepository ();
if ( $_GET [ " target " ] === " rename " ){
echo $publicKeyCredentialSourceRepository -> modifyAuthenticator ( $_GET [ " id " ], sanitize_text_field ( $_GET [ " name " ]), $userEntity , " rename " , $res_id );
} else if ( $_GET [ " target " ] === " remove " ){
echo $publicKeyCredentialSourceRepository -> modifyAuthenticator ( $_GET [ " id " ], " " , $userEntity , " remove " , $res_id );
}
exit ;
} catch ( \Exception $exception ){
wwa_add_log ( $res_id , " ajax_modify_authenticator: (ERROR) " . $exception -> getMessage ());
wwa_add_log ( $res_id , wwa_generate_call_trace ( $exception ));
wwa_add_log ( $res_id , " ajax_modify_authenticator: (ERROR)Unknown error, exit " );
wwa_wp_die ( " Something went wrong. " );
} catch ( \Error $error ){
wwa_add_log ( $res_id , " ajax_modify_authenticator: (ERROR) " . $error -> getMessage ());
wwa_add_log ( $res_id , wwa_generate_call_trace ( $error ));
wwa_add_log ( $res_id , " ajax_modify_authenticator: (ERROR)Unknown error, exit " );
wwa_wp_die ( " Something went wrong. " );
}
}
add_action ( " wp_ajax_wwa_modify_authenticator " , " wwa_ajax_modify_authenticator " );
// Print log
function wwa_ajax_get_log (){
if ( ! wwa_validate_privileges ()){
wwa_wp_die ( " Bad Request. " );
}
header ( 'Content-Type: application/json' );
$log = get_option ( " wwa_log " );
if ( $log === false ){
echo " [] " ;
} else {
echo json_encode ( $log );
}
exit ;
}
add_action ( " wp_ajax_wwa_get_log " , " wwa_ajax_get_log " );
// Clear log
function wwa_ajax_clear_log (){
if ( ! wwa_validate_privileges ()){
wwa_wp_die ( " Bad Request. " );
}
$log = get_option ( " wwa_log " );
if ( $log !== false ){
update_option ( " wwa_log " , array ());
}
echo " true " ;
exit ;
}
add_action ( " wp_ajax_wwa_clear_log " , " wwa_ajax_clear_log " );
?>