OAuth2 Saved Login Session Mechanism
This commit is contained in:
71
auth/api/index.php
Normal file
71
auth/api/index.php
Normal file
@@ -0,0 +1,71 @@
|
||||
<?php
|
||||
|
||||
$config = json_decode(file_get_contents("/var/www/usergen/secret/config.json", true));
|
||||
|
||||
require_once("/var/www/usergen/secret/helpers.php");
|
||||
require_once("/var/www/usergen/secret/oauth.php");
|
||||
require_once("/var/www/usergen/secret/rsa.php");
|
||||
|
||||
if (isset($_REQUEST["act"])) {
|
||||
// internal functions such as id request
|
||||
switch($_REQUEST["act"]){
|
||||
case "id":
|
||||
// return OAUTH app ID
|
||||
header('Content-type: application/json');
|
||||
echo json_encode(array("id" => $config->oauth->key));
|
||||
exit();
|
||||
break;
|
||||
case "login":
|
||||
if (isset($_REQUEST["code"])){
|
||||
// Mastodon callback (Authorization Code from /oauth/authorize)
|
||||
$authCode = $_REQUEST["code"];
|
||||
$Auth = oauthToken($authCode, $config);
|
||||
if(isset($Auth->token_type)){
|
||||
// Valid Auth?
|
||||
$User = verifyCredentials($Auth->access_token);
|
||||
if (gettype($User) == "object" && isset($User->id)) {
|
||||
// Congrats!
|
||||
returnSuccess($User, buildEncToken($Auth->access_token, $User->id, $_SERVER["REMOTE_ADDR"], $_SERVER["HTTP_USER_AGENT"]));
|
||||
}else{
|
||||
// invalid auth
|
||||
// $User contains error string
|
||||
returnError($User);
|
||||
}
|
||||
}else{
|
||||
// invalid auth
|
||||
returnError($Auth);
|
||||
}
|
||||
}else{
|
||||
returnError("Incorrect Login Query");
|
||||
}
|
||||
break;
|
||||
case "verify":
|
||||
if (isset($_REQUEST["token"])){
|
||||
// Verify Encrypted Token
|
||||
$EncTokenData = $_REQUEST["token"];
|
||||
$TokenData = verifyEncToken($EncTokenData);
|
||||
if (gettype($TokenData) == "string") {
|
||||
// Invalid Token
|
||||
returnError($TokenData);
|
||||
}else{
|
||||
// Valid Token
|
||||
returnSuccess($TokenData["MastodonData"],
|
||||
buildEncToken($TokenData["AuthToken"],
|
||||
$TokenData["UserID"],
|
||||
$_SERVER["REMOTE_ADDR"],
|
||||
$_SERVER["HTTP_USER_AGENT"]
|
||||
)
|
||||
);
|
||||
}
|
||||
}else{
|
||||
returnError("Incorrect Verify Query");
|
||||
}
|
||||
break;
|
||||
default:
|
||||
returnError("Incorrect Action Query");
|
||||
break;
|
||||
}
|
||||
}else {
|
||||
returnError("Incorrect Empty Query");
|
||||
}
|
||||
?>
|
289
auth/auth.js
Normal file
289
auth/auth.js
Normal file
@@ -0,0 +1,289 @@
|
||||
var DEBUG = false;
|
||||
var isMobile = false;
|
||||
var USE_ORIGIN = "";
|
||||
|
||||
const SwalConfig = {
|
||||
color: "#79F257",
|
||||
background: "#022601",
|
||||
buttonsStyling: false,
|
||||
};
|
||||
|
||||
const invalidChars = ["/", "\\", ">", "<", ":", "*", "|", '"', "'", "?", "\0"];
|
||||
|
||||
const failMsg = (msg) => {
|
||||
Swal.fire({
|
||||
...SwalConfig,
|
||||
title: "Error!",
|
||||
text: msg,
|
||||
});
|
||||
};
|
||||
|
||||
const replaceInvalid = (str) => {
|
||||
var cache = str;
|
||||
invalidChars.forEach((ch) => {
|
||||
cache = cache.replaceAll(ch, "#");
|
||||
});
|
||||
return cache;
|
||||
};
|
||||
|
||||
const post = (url, data, callback) => {
|
||||
var settings = {
|
||||
url: url,
|
||||
method: "POST",
|
||||
headers: {
|
||||
"Content-Type": "application/x-www-form-urlencoded"
|
||||
},
|
||||
data: data
|
||||
};
|
||||
$.ajax(settings).done(callback);
|
||||
};
|
||||
|
||||
const saveFile = (name, type, data) => {
|
||||
if (data !== null && navigator.msSaveBlob)
|
||||
return navigator.msSaveBlob(new Blob([data], { type: type }), name);
|
||||
var a = $("<a style='display: none;'/>");
|
||||
var url = window.URL.createObjectURL(new Blob([data], { type: type }));
|
||||
a.attr("href", url);
|
||||
a.attr("download", name);
|
||||
$("body").append(a);
|
||||
a[0].click();
|
||||
window.URL.revokeObjectURL(url);
|
||||
a.remove();
|
||||
};
|
||||
|
||||
const validatePubKey = (key) => {
|
||||
return /^(ssh-rsa AAAAB3NzaC1yc2|ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNT|ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzOD|ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1Mj|ssh-ed25519 AAAAC3NzaC1lZDI1NTE5|ssh-dss AAAAB3NzaC1kc3)[0-9A-Za-z+\/]+[=]{0,3}( .*)?$/.test(
|
||||
key
|
||||
);
|
||||
};
|
||||
|
||||
const sendSSH = (key, id, token) => {
|
||||
var payload = {
|
||||
pubkey: key,
|
||||
token: token,
|
||||
};
|
||||
post(USE_ORIGIN + "/auth/setKey.php", payload, (response) => {
|
||||
if (!response.error) {
|
||||
localStorage.setItem("tty_token", response.refreshToken);
|
||||
Swal.fire({
|
||||
...SwalConfig,
|
||||
title: "Success!",
|
||||
text: "Your key has been uploaded to the server.",
|
||||
});
|
||||
} else {
|
||||
Swal.fire({
|
||||
...SwalConfig,
|
||||
title: "Failed!",
|
||||
text: response.error,
|
||||
}).then(() => {
|
||||
window.location.reload();
|
||||
});
|
||||
}
|
||||
});
|
||||
};
|
||||
|
||||
const generateSSH = async () => {
|
||||
if (window.location.protocol === "http:") {
|
||||
Swal.fire({
|
||||
...SwalConfig,
|
||||
title: "Error!",
|
||||
text: "You must use HTTPS to generate keys.",
|
||||
});
|
||||
return;
|
||||
}
|
||||
var token = localStorage.getItem("tty_token");
|
||||
var userData = localStorage.getItem("tty_userData");
|
||||
if (!token || !userData) {
|
||||
failMsg("Not Logged In");
|
||||
return;
|
||||
}
|
||||
userData = JSON.parse(userData);
|
||||
generateKeyPair("RSASSA-PKCS1-v1_5", 4096, "WebGen " + Date())
|
||||
.then((keys) => {
|
||||
var KeyExport = new JSZip();
|
||||
var name = replaceInvalid(userData.username);
|
||||
KeyExport.file("HackersTownTTY-" + name, keys[0]);
|
||||
KeyExport.file("HackersTownTTY-" + name + ".pub", keys[1]);
|
||||
KeyExport.generateAsync({ type: "blob" }).then((content) => {
|
||||
saveFile("HackersTownTTY-" + name + ".zip", "application/zip", content);
|
||||
});
|
||||
sendSSH(keys[1], userData.id, token);
|
||||
})
|
||||
.catch((err) => {
|
||||
console.log(err);
|
||||
failMsg("Failed to generate keypair locally.");
|
||||
});
|
||||
};
|
||||
|
||||
const testSwal = () => {
|
||||
Swal.fire({
|
||||
...SwalConfig,
|
||||
title: "Success!",
|
||||
});
|
||||
};
|
||||
|
||||
const uploadSSH = () => {
|
||||
var token = localStorage.getItem("tty_token");
|
||||
var userData = localStorage.getItem("tty_userData");
|
||||
if (!token || !userData) {
|
||||
failMsg("Not Logged In");
|
||||
return;
|
||||
}
|
||||
userData = JSON.parse(userData);
|
||||
//request local file
|
||||
var kf = document.getElementById("keyfile");
|
||||
kf.onchange = function (e) {
|
||||
// File selected
|
||||
var file = e.target.files[0];
|
||||
if (file) {
|
||||
var reader = new FileReader();
|
||||
reader.readAsText(file, "UTF-8");
|
||||
reader.onload = function (evt) {
|
||||
var pubkey = evt.target.result;
|
||||
pubkey = pubkey.replace(/\r\n/g, "\n");
|
||||
pubkey = pubkey.replace(/\n/g, "");
|
||||
if (validatePubKey(pubkey)) {
|
||||
sendSSH(pubkey, userData.id, token);
|
||||
} else {
|
||||
failMsg("Invalid key");
|
||||
}
|
||||
};
|
||||
reader.onerror = function (evt) {
|
||||
failMsg("Unable to load Keyfile");
|
||||
};
|
||||
}
|
||||
};
|
||||
kf.click();
|
||||
};
|
||||
|
||||
const displayFingerprints = () => {
|
||||
// Get SSH Fingerprints and display them
|
||||
$.get(USE_ORIGIN + "/fingerprint.php", (response) => {
|
||||
dbp(response);
|
||||
if (response) {
|
||||
var html =
|
||||
'<div><table class="fingerprintTable"><tr><th>Bits</th><th>Fingerprint (SHA256)</th><th class="text-start">Algorithm</th></tr>';
|
||||
response.split("\n").forEach((line) => {
|
||||
var parts = line.split(" ");
|
||||
if (parts.length === 4) {
|
||||
html +=
|
||||
'<tr><td class="fingerprintBit">' +
|
||||
parts[0] +
|
||||
'</td><td class="fingerprintData">' +
|
||||
parts[1].replace("SHA256:", "") +
|
||||
'</td><td class="fingerprintAlgo">' +
|
||||
parts[3].replace("(", "").replace(")", "") +
|
||||
"</td></tr>";
|
||||
}
|
||||
});
|
||||
html += "</table></div>";
|
||||
Swal.fire({
|
||||
...SwalConfig,
|
||||
title: "SSH Fingerprints",
|
||||
html: html,
|
||||
});
|
||||
} else {
|
||||
Swal.fire({
|
||||
...SwalConfig,
|
||||
title: "Unable to Lookup SSH Fingerprints",
|
||||
text: response.error,
|
||||
});
|
||||
}
|
||||
});
|
||||
};
|
||||
|
||||
const checkLogin = () => {
|
||||
// check login status
|
||||
var token = localStorage.getItem("tty_token");
|
||||
if (token){
|
||||
var settings = {
|
||||
url: USE_ORIGIN + "/auth/api/index.php",
|
||||
method: "POST",
|
||||
headers: {
|
||||
"Content-Type": "application/x-www-form-urlencoded"
|
||||
},
|
||||
data: {
|
||||
act: "verify",
|
||||
token: token
|
||||
}
|
||||
};
|
||||
$.ajax(settings).done(function (response) {
|
||||
if(response.error){
|
||||
localStorage.removeItem("tty_token");
|
||||
localStorage.removeItem("tty_userData");
|
||||
window.location.href = "/?error=" + response.error;
|
||||
}else {
|
||||
localStorage.setItem("tty_token", response.refreshToken);
|
||||
localStorage.setItem("tty_userData", JSON.stringify(response.data));
|
||||
document.getElementById("resizer").innerHTML = response.data.display_name;
|
||||
}
|
||||
});
|
||||
}else {
|
||||
window.location.href = "/";
|
||||
}
|
||||
};
|
||||
|
||||
const logout = () => {
|
||||
localStorage.removeItem("tty_token");
|
||||
localStorage.removeItem("tty_userData");
|
||||
window.location.href = "/?msg=End%20Of%20Line.";
|
||||
};
|
||||
|
||||
$(() => {
|
||||
// On Page Load
|
||||
// Override domain
|
||||
$.get("/DOMAIN_OVERRIDE", function (data) {
|
||||
USE_ORIGIN = data.replaceAll("\n", "");
|
||||
DEBUG = true;
|
||||
}).fail(() => {
|
||||
USE_ORIGIN = "https://tty.hackers.town";
|
||||
}).always(() => {
|
||||
// Handle Mobile
|
||||
if ( /(android|bb\d+|meego).+mobile|avantgo|bada\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od)|ipad|iris|kindle|Android|Silk|lge |maemo|midp|mmp|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\.(browser|link)|vodafone|wap|windows (ce|phone)|xda|xiino/i
|
||||
.test(navigator.userAgent ) ||
|
||||
/1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\-(n|u)|c55\/|capi|ccwa|cdm\-|cell|chtm|cldc|cmd\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\-s|devi|dica|dmob|do(c|p)o|ds(12|\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\-|_)|g1 u|g560|gene|gf\-5|g\-mo|go(\.w|od)|gr(ad|un)|haie|hcit|hd\-(m|p|t)|hei\-|hi(pt|ta)|hp( i|ip)|hs\-c|ht(c(\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\-(20|go|ma)|i230|iac( |\-|\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\/)|klon|kpt |kwc\-|kyo(c|k)|le(no|xi)|lg( g|\/(k|l|u)|50|54|\-[a-w])|libw|lynx|m1\-w|m3ga|m50\/|ma(te|ui|xo)|mc(01|21|ca)|m\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\-2|po(ck|rt|se)|prox|psio|pt\-g|qa\-a|qc(07|12|21|32|60|\-[2-7]|i\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\-|oo|p\-)|sdk\/|se(c(\-|0|1)|47|mc|nd|ri)|sgh\-|shar|sie(\-|m)|sk\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\-|v\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\-|tdg\-|tel(i|m)|tim\-|t\-mo|to(pl|sh)|ts(70|m\-|m3|m5)|tx\-9|up(\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\-|your|zeto|zte\-/i
|
||||
.test(navigator.userAgent.substr(0, 4)
|
||||
)) {
|
||||
isMobile = true;
|
||||
}
|
||||
if (isMobile) {
|
||||
disableNonDesktopElements();
|
||||
}
|
||||
// Handle Auth
|
||||
var authCode = new URL(window.location.href).searchParams.get("code");
|
||||
if (authCode) {
|
||||
// Mastodon OAuth2 Redirected here
|
||||
var settings = {
|
||||
"url": USE_ORIGIN + "/auth/api/index.php",
|
||||
"method": "POST",
|
||||
"headers": {
|
||||
"Content-Type": "application/x-www-form-urlencoded"
|
||||
},
|
||||
"data": {
|
||||
act: "login",
|
||||
code: authCode
|
||||
}
|
||||
};
|
||||
$.ajax(settings).done(function (response) {
|
||||
if(response.error){
|
||||
checkLogin();
|
||||
}else{
|
||||
localStorage.setItem("tty_token", response.refreshToken);
|
||||
localStorage.setItem("tty_userData", JSON.stringify(response.data));
|
||||
document.getElementById("resizer").innerHTML = response.data.display_name;
|
||||
}
|
||||
});
|
||||
} else {
|
||||
// direct connect or from /
|
||||
checkLogin();
|
||||
}
|
||||
// Console Welcome
|
||||
console.log("%cWelcome Hacker!", "color: #ff0000; font-size: 7em; font-style: italic; font-family: 'Times New Roman', Times, serif;");
|
||||
// Enable Extra Debug Stuff
|
||||
if(DEBUG){
|
||||
$('.debug').each((i,e)=>{
|
||||
e.style.display = "unset";
|
||||
});
|
||||
}
|
||||
});
|
||||
});
|
134
auth/index.php
134
auth/index.php
@@ -1,149 +1,43 @@
|
||||
<?php
|
||||
$config = json_decode(file_get_contents("/var/www/usergen/secret/config.json", true));
|
||||
|
||||
require_once("/var/www/usergen/secret/helpers.php");
|
||||
|
||||
require_once("/var/www/usergen/secret/oauth.php");
|
||||
|
||||
if (isset($_REQUEST["act"])){
|
||||
// internal functions such as id request
|
||||
switch($_REQUEST["act"]){
|
||||
case "id":
|
||||
// return OAUTH app ID
|
||||
header('Content-type: application/json');
|
||||
echo json_encode(array("id" => $config->oauth->key));
|
||||
exit();
|
||||
break;
|
||||
default:
|
||||
break;
|
||||
}
|
||||
}else if (isset($_REQUEST["code"])){
|
||||
// Mastodon callback (Authorization Code from /oauth/authorize)
|
||||
$MastCode = $_REQUEST["code"];
|
||||
// var_dump($_REQUEST);
|
||||
}
|
||||
$config = json_decode(file_get_contents("/var/www/usergen/secret/config.json", true));
|
||||
require_once("/var/www/usergen/secret/helpers.php");
|
||||
?>
|
||||
<!DOCTYPE html>
|
||||
<HTML lang="en">
|
||||
<Head>
|
||||
<Title>HackersTown Server Access</Title>
|
||||
<meta charset="utf-8">
|
||||
<base href="/auth"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1">
|
||||
<!-- Javascript -->
|
||||
<script src="https://code.jquery.com/jquery-3.6.0.min.js" integrity="sha256-/xUj+3OJU5yExlq6GSYGSHk7tPXikynS7ogEvDej/m4=" crossorigin="anonymous"></script>
|
||||
<script src="https://code.jquery.com/color/jquery.color.plus-names-2.1.2.min.js"></script>
|
||||
<script src="https://cdn.jsdelivr.net/npm/bootstrap@5.1.3/dist/js/bootstrap.bundle.min.js" integrity="sha384-ka7Sk0Gln4gmtz2MlQnikT1wXgYsOg+OMhuP+IlRH9sENBO0LRn5q+8nbTov4+1p" crossorigin="anonymous"></script>
|
||||
<script src="https://cdn.jsdelivr.net/npm/jszip@3.9.1/dist/jszip.min.js" integrity="sha256-aSPPIlJfSHQ5T7wunbPcp7tM0rlq5dHoUGeN8O5odMg=" crossorigin="anonymous"></script>
|
||||
<script src="https://cdn.jsdelivr.net/npm/sweetalert2@11/dist/sweetalert2.all.min.js" crossorigin="anonymous"></script>
|
||||
<?php require("/var/www/usergen/elements/head.php"); ?>
|
||||
<Body>
|
||||
<script src="/base64url.js"></script>
|
||||
<script src="/ssh-util.js"></script>
|
||||
<script src="/keygen.js"></script>
|
||||
<script src="/fittext.js"></script>
|
||||
<script src="/index.js"></script>
|
||||
<!-- Stylesheets -->
|
||||
<link href="https://cdn.jsdelivr.net/npm/bootstrap@5.1.3/dist/css/bootstrap.min.css" rel="stylesheet" integrity="sha384-1BmE4kWBq78iYhFldvKuhfTAU6auU8tT94WrHftjDbrCEXSU1oBoqyl2QvZ6jIW3" crossorigin="anonymous">
|
||||
<link href="/style.css" rel="stylesheet"/>
|
||||
</Head>
|
||||
<Body>
|
||||
<script src="/auth/auth.js"></script>
|
||||
<div class="row">
|
||||
<div class="desktopOnly col-4"></div>
|
||||
<div id="content" class="col-4 center">
|
||||
<?php require("/var/www/usergen/elements/logo.php"); ?>
|
||||
<div class="row">
|
||||
<?php if(file_exists("/var/www/usergen/DOMAIN_OVERRIDE")){
|
||||
echo "<a href=\"".file_get_contents("/var/www/usergen/DOMAIN_OVERRIDE")."\">";
|
||||
}else{
|
||||
echo "<a href=\"https://tty.hackers.town\">";
|
||||
}?>
|
||||
<img src="/Assets/HTown.png" class="logo self-align-center mx-auto d-block" alt="Hacker Town logo in ASCII art. Rendered as image to force correct visualization."/>
|
||||
</a>
|
||||
</div>
|
||||
<?php
|
||||
// Query /oauth/token
|
||||
$Auth = oauthToken($MastCode, $config);
|
||||
if(isset($Auth->token_type)){
|
||||
// Valid Auth?
|
||||
$User = verifyCredentials($Auth->access_token);
|
||||
if (gettype($User) == "object" && isset($User->id)) {
|
||||
// Congrats!
|
||||
$AuthToken = $Auth->access_token;
|
||||
$UserName = $User->display_name;
|
||||
$UserId = $User->id;
|
||||
}else{
|
||||
// invalid auth
|
||||
$AuthToken = "BadUser";
|
||||
$ErrorDesc = "User Not Found";
|
||||
}
|
||||
|
||||
}else{
|
||||
// invalid auth
|
||||
// TODO: Replace with direct to index logout with error msg
|
||||
if(isset($_COOKIE["oa_retries"])){
|
||||
$retries = $_COOKIE["oa_retries"];
|
||||
if($retries >= 3){
|
||||
$AuthToken = "BadUser";
|
||||
$ErrorDesc = "Invalid OAuth";
|
||||
setcookie("oa_retries", 0, time()+3600);
|
||||
}else{
|
||||
$retries++;
|
||||
setcookie("oa_retries", $retries, time()+3600);
|
||||
$AuthToken = "BadOauthRetry";
|
||||
$ErrorDesc = "Invalid OAuth Retry";
|
||||
}
|
||||
}else{
|
||||
$AuthToken = "BadOauth";
|
||||
$ErrorDesc = "Invalid OAuth Retry";
|
||||
setcookie("oa_retries", 1, time()+3600);
|
||||
}
|
||||
}
|
||||
|
||||
// revoke token after usage
|
||||
?>
|
||||
<div id="usertoken" ><?php echo $AuthToken; ?></div>
|
||||
<div class="row"<?php if(strpos($AuthToken, "Bad") === false){
|
||||
echo "hidden";
|
||||
}?>>
|
||||
<span>
|
||||
Invalid
|
||||
</span>
|
||||
<span>
|
||||
try again
|
||||
</span>
|
||||
<div id="ErrorResult" class="message">
|
||||
<?php echo $ErrorDesc; ?>
|
||||
</div>
|
||||
</div><div class="row button"<?php if(strpos($AuthToken, "Bad") === false){
|
||||
echo "hidden";
|
||||
}?>>
|
||||
<button class="col keyButton" onclick="beginOauth()">Retry</button>
|
||||
</div>
|
||||
<div class="row"<?php if(strpos($AuthToken, "Bad") !== false){
|
||||
echo "hidden";
|
||||
}?>>
|
||||
<span>
|
||||
<?php
|
||||
$Welcomes = array("Welcome", "Dobrodošli", "Vitejte", "Welkom", "Tervetuloa", "Willkommen", "Fáilte", "Benvenuto", "Bienvenidos", "Välkommen", "ようこそ");
|
||||
echo $Welcomes[array_rand($Welcomes)];
|
||||
echo getHello();
|
||||
?>
|
||||
</span>
|
||||
<span id="resizer">
|
||||
<?php echo $UserName; ?>
|
||||
</span>
|
||||
<div class="message">
|
||||
Setup an account SSH key
|
||||
</div>
|
||||
</div>
|
||||
<div class="row button" <?php if(strpos($AuthToken, "Bad") !== false){
|
||||
echo "hidden";
|
||||
}?>>
|
||||
<button class="col keyButton" onclick="generateSSH('<?php echo $UserName; ?>', '<?php echo $UserId; ?>', '<?php echo $AuthToken; ?>')">Generate</button>
|
||||
<button class="col keyButton" onclick="uploadSSH('<?php echo $UserId; ?>', '<?php echo $AuthToken; ?>' )">Upload</button>
|
||||
<div class="row button">
|
||||
<button class="col keyButton" onclick="generateSSH()">Generate</button>
|
||||
<button class="col keyButton" onclick="uploadSSH()">Upload</button>
|
||||
<button class="col keyButton debug" onclick="testSwal()">Test Popup</button>
|
||||
<form id="uploadForm" enctype="multipart/form-data">
|
||||
<input id="keyfile" type="file" style="display: none;"/>
|
||||
</form>
|
||||
</div>
|
||||
<?php require("/var/www/usergen/footer.php"); ?>
|
||||
<div class="row button">
|
||||
<button class="col keyButton" onclick="logout()">Log Out</button>
|
||||
</div>
|
||||
<?php require("/var/www/usergen/elements/footer.php"); ?>
|
||||
</div>
|
||||
<div class="desktopOnly col-4"></div>
|
||||
</div>
|
||||
|
@@ -2,6 +2,10 @@
|
||||
// Create an account and apply SSH key
|
||||
$config = json_decode(file_get_contents("/var/www/usergen/secret/config.json", true));
|
||||
|
||||
require_once("/var/www/usergen/secret/helpers.php");
|
||||
require_once("/var/www/usergen/secret/oauth.php");
|
||||
require_once("/var/www/usergen/secret/rsa.php");
|
||||
|
||||
function checkParameters($parameterArray){
|
||||
$error = false;
|
||||
foreach($parameterArray as $parameter){
|
||||
@@ -18,12 +22,13 @@ function apiResult($result){
|
||||
exit();
|
||||
}
|
||||
|
||||
function success(){
|
||||
apiResult(array("status" => true));
|
||||
function success($encryptedToken){
|
||||
$Auth = verifyEncToken($encryptedToken);
|
||||
returnSuccess(true, buildEncToken($Auth["AuthToken"], $Auth["UserID"], $_SERVER["REMOTE_ADDR"], $_SERVER["HTTP_USER_AGENT"]));
|
||||
}
|
||||
|
||||
function error($error){
|
||||
apiResult(array("status" => false, "error" => $error));
|
||||
returnError($error);
|
||||
}
|
||||
|
||||
function validateUsername($username){
|
||||
@@ -34,33 +39,30 @@ function validatePublicKey($key){
|
||||
return (preg_match("/^(ssh-rsa AAAAB3NzaC1yc2|ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNT|ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzOD|ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1Mj|ssh-ed25519 AAAAC3NzaC1lZDI1NTE5|ssh-dss AAAAB3NzaC1kc3)[0-9A-Za-z+\/]+[=]{0,3}( .*)?$/", $key) == 1);
|
||||
}
|
||||
|
||||
if (checkParameters(array("pubkey", "userId", "authToken"))){
|
||||
if (checkParameters(array("pubkey", "token"))){
|
||||
error("Missing parameters");
|
||||
}
|
||||
|
||||
$userToken = $_POST["authToken"];
|
||||
$userId = $_POST["userId"];
|
||||
$userToken = $_POST["token"];
|
||||
$pubkey = $_POST["pubkey"];
|
||||
|
||||
if(!validatePublicKey($pubkey)){
|
||||
error("Invalid public key");
|
||||
}
|
||||
|
||||
$request = curl_init();
|
||||
curl_setopt($request, CURLOPT_URL, "https://hackers.town/api/v1/accounts/verify_credentials");
|
||||
curl_setopt($request, CURLOPT_RETURNTRANSFER, 1);
|
||||
curl_setopt($request, CURLOPT_HTTPHEADER, array(
|
||||
"Authorization: Bearer ".$userToken
|
||||
));
|
||||
$response = curl_exec($request);
|
||||
curl_close($request);
|
||||
$User = json_decode($response);
|
||||
$User = verifyEncToken($userToken);
|
||||
// Check User
|
||||
if($User->id != $userId){
|
||||
error("User Mismatch");
|
||||
|
||||
if (gettype($User) == "string") {
|
||||
// Invalid Token
|
||||
error($User);
|
||||
}else{
|
||||
// Valid Token
|
||||
$User = $User["MastodonData"];
|
||||
}
|
||||
|
||||
if(!validateUsername($User->username)){
|
||||
error("Invalid Username");
|
||||
error("Invalid POSIX Username");
|
||||
}
|
||||
// Create temporary pubkey holding file
|
||||
$TempFileName = "/etc/ttyserver/tmp/".uniqid("ssh-", true).".pub";
|
||||
@@ -68,11 +70,11 @@ if(!file_put_contents($TempFileName, $pubkey."\n")){
|
||||
error("Key Addition Failed: Temp");
|
||||
}
|
||||
// Run User Generation Tool
|
||||
// TODO: Replace with custom Rust PHP Extension
|
||||
// TODO: Replace with custom Rust PHP Extension?
|
||||
$UserGenCode = shell_exec("/usr/bin/sudo /etc/ttyserver/bin/mkuser \"".$User->username."\" \"".$TempFileName."\" 2>&1; echo $?");
|
||||
if($UserGenCode != "0"){
|
||||
error("Key Addition Failed: MK-".$UserGenCode);
|
||||
}
|
||||
success();
|
||||
success($userToken);
|
||||
|
||||
?>
|
||||
|
Reference in New Issue
Block a user