36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
|
# File 'lib/sinatra/browserid.rb', line 36
def self.registered(app)
app.helpers BrowserID::Helpers
app.set :browserid_url, "https://broker.portier.io"
app.set :browserid_login_button, :red
app.set :browserid_login_url, "/_browserid_login"
app.set :browserid_button_class, ""
app.set :browserid_button_text, "Log in"
app.get '/_browserid_login' do
render_login_button
end
app.post '/_browserid_assert' do
begin
public_key_jwks_uri = Addressable::URI.parse(settings.browserid_url + '/keys.json')
public_key_jwks = ::JSON.parse(URI.parse(public_key_jwks_uri).read)
public_key = OpenSSL::PKey::RSA.new
if public_key.respond_to? :set_key
sequence = []
sequence << OpenSSL::ASN1::Integer.new(OpenSSL::BN.new(UrlSafeBase64.decode64(public_key_jwks["keys"][0]["n"]), 2))
sequence << OpenSSL::ASN1::Integer.new(OpenSSL::BN.new(UrlSafeBase64.decode64(public_key_jwks["keys"][0]["e"]), 2))
public_key = OpenSSL::PKey::RSA.new(OpenSSL::ASN1::Sequence(sequence).to_der)
else
public_key.e = OpenSSL::BN.new UrlSafeBase64.decode64(public_key_jwks["keys"][0]["e"]), 2
public_key.n = OpenSSL::BN.new UrlSafeBase64.decode64(public_key_jwks["keys"][0]["n"]), 2
end
id_token = JWT.decode params[:id_token], public_key, true, { :algorithm => 'RS256' }
id_token = id_token[0]
if (id_token["iss"] == settings.browserid_url &&
id_token["aud"] == request.base_url.chomp('/') &&
id_token["exp"] > Time.now.to_i &&
id_token["email_verified"] &&
Cachy.get(id_token["nonce"]))
session[:browserid_email] = id_token['email']
Cachy.delete_key(id_token["nonce"])
session.delete(:nonce)
if session['redirect_url']
redirect session['redirect_url']
else
redirect "/"
end
else
Cachy.delete_key(id_token["nonce"])
session.delete(:nonce)
end
rescue OpenURI::HTTPError => e
puts "could not validate token: " + e.to_s
end
halt 403
end
end
|