"use strict";
Object.defineProperty(exports, "__esModule", {
value: true
});
exports.buildChallengeTx = buildChallengeTx;
exports.gatherTxSigners = gatherTxSigners;
exports.readChallengeTx = readChallengeTx;
exports.verifyChallengeTxSigners = verifyChallengeTxSigners;
exports.verifyChallengeTxThreshold = verifyChallengeTxThreshold;
exports.verifyTxSignedBy = verifyTxSignedBy;
var _randombytes = _interopRequireDefault(require("randombytes"));
var _stellarBase = require("@stellar/stellar-base");
var _utils = require("../utils");
var _errors = require("./errors");
function _interopRequireDefault(e) { return e && e.__esModule ? e : { default: e }; }
/**
* Stellar Web Authentication
* @module WebAuth
* @see {@link https://stellar.org/protocol-10 | SEP-10 Specification}
*/
/**
* Returns a valid {@link https://stellar.org/protocol/sep-10 | SEP-10}
* challenge transaction which you can use for Stellar Web Authentication.
*
* @param {Keypair} serverKeypair Keypair for server's signing account.
* @param {string} clientAccountID The stellar account (G...) or muxed account
* (M...) that the wallet wishes to authenticate with the server.
* @param {string} homeDomain The fully qualified domain name of the service
* requiring authentication
* @param {number} [timeout=300] Challenge duration (default to 5 minutes).
* @param {string} networkPassphrase The network passphrase. If you pass this
* argument then timeout is required.
* @param {string} webAuthDomain The fully qualified domain name of the service
* issuing the challenge.
* @param {string} [memo] The memo to attach to the challenge transaction. The
* memo must be of type `id`. If the `clientaccountID` is a muxed account,
* memos cannot be used.
* @param {string} [clientDomain] The fully qualified domain of the client
* requesting the challenge. Only necessary when the the 'client_domain'
* parameter is passed.
* @param {string} [clientSigningKey] The public key assigned to the SIGNING_KEY
* attribute specified on the stellar.toml hosted on the client domain. Only
* necessary when the 'client_domain' parameter is passed.
* @returns {string} A base64 encoded string of the raw TransactionEnvelope xdr
* struct for the transaction.
* @throws {Error} Will throw if `clientAccountID is a muxed account, and `memo`
* is present.
* @throws {Error} Will throw if `clientDomain` is provided, but
* `clientSigningKey` is missing
*
* @see {@link https://stellar.org/protocol/sep-10 | SEP-10: Stellar Web Auth}
*
* @example
* import { Keypair, Networks, WebAuth } from 'stellar-sdk'
*
* let serverKeyPair = Keypair.fromSecret("server-secret")
* let challenge = WebAuth.buildChallengeTx(
* serverKeyPair,
* "client-stellar-account-id",
* "stellar.org",
* 300,
* Networks.TESTNET);
*/
function buildChallengeTx(serverKeypair, clientAccountID, homeDomain, timeout = 300, networkPassphrase, webAuthDomain, memo = null, clientDomain = null, clientSigningKey = null) {
if (clientAccountID.startsWith("M") && memo) {
throw Error("memo cannot be used if clientAccountID is a muxed account");
}
const account = new _stellarBase.Account(serverKeypair.publicKey(), "-1");
const now = Math.floor(Date.now() / 1000);
// A Base64 digit represents 6 bits, to generate a random 64 bytes
// base64 string, we need 48 random bytes = (64 * 6)/8
//
// Each Base64 digit is in ASCII and each ASCII characters when
// turned into binary represents 8 bits = 1 bytes.
const value = (0, _randombytes.default)(48).toString("base64");
const builder = new _stellarBase.TransactionBuilder(account, {
fee: _stellarBase.BASE_FEE,
networkPassphrase,
timebounds: {
minTime: now,
maxTime: now + timeout
}
}).addOperation(_stellarBase.Operation.manageData({
name: `${homeDomain} auth`,
value,
source: clientAccountID
})).addOperation(_stellarBase.Operation.manageData({
name: "web_auth_domain",
value: webAuthDomain,
source: account.accountId()
}));
if (clientDomain) {
if (!clientSigningKey) {
throw Error("clientSigningKey is required if clientDomain is provided");
}
builder.addOperation(_stellarBase.Operation.manageData({
name: `client_domain`,
value: clientDomain,
source: clientSigningKey
}));
}
if (memo) {
builder.addMemo(_stellarBase.Memo.id(memo));
}
const transaction = builder.build();
transaction.sign(serverKeypair);
return transaction.toEnvelope().toXDR("base64").toString();
}
/**
* A parsed and validated challenge transaction, and some of its constituent details.
* @memberof module:WebAuth
*/
/**
* Reads a SEP-10 challenge transaction and returns the decoded transaction and
* client account ID contained within.
*
* It also verifies that the transaction has been signed by the server.
*
* It does not verify that the transaction has been signed by the client or that
* any signatures other than the server's on the transaction are valid. Use one
* of the following functions to completely verify the transaction:
*
* - {@link module:WebAuth~verifyChallengeTxThreshold}
* - {@link module:WebAuth~verifyChallengeTxSigners}
*
* @param {string} challengeTx SEP0010 challenge transaction in base64.
* @param {string} serverAccountID The server's stellar account (public key).
* @param {string} networkPassphrase The network passphrase, e.g.: 'Test SDF
* Network ; September 2015' (see {@link Networks})
* @param {string | Array.<string>} homeDomains The home domain that is expected
* to be included in the first Manage Data operation's string key. If an
* array is provided, one of the domain names in the array must match.
* @param {string} webAuthDomain The home domain that is expected to be included
* as the value of the Manage Data operation with the 'web_auth_domain' key.
* If no such operation is included, this parameter is not used.
* @returns {module:WebAuth.ChallengeTxDetails} The actual transaction and the
* Stellar public key (master key) used to sign the Manage Data operation,
* the matched home domain, and the memo attached to the transaction, which
* will be null if not present.
*
* @see {@link https://stellar.org/protocol/sep-10 | SEP-10: Stellar Web Auth}
*/
function readChallengeTx(challengeTx, serverAccountID, networkPassphrase, homeDomains, webAuthDomain) {
if (serverAccountID.startsWith("M")) {
throw Error("Invalid serverAccountID: multiplexed accounts are not supported.");
}
let transaction;
try {
transaction = new _stellarBase.Transaction(challengeTx, networkPassphrase);
} catch {
try {
transaction = new _stellarBase.FeeBumpTransaction(challengeTx, networkPassphrase);
} catch {
throw new _errors.InvalidChallengeError("Invalid challenge: unable to deserialize challengeTx transaction string");
}
throw new _errors.InvalidChallengeError("Invalid challenge: expected a Transaction but received a FeeBumpTransaction");
}
// verify sequence number
const sequence = Number.parseInt(transaction.sequence, 10);
if (sequence !== 0) {
throw new _errors.InvalidChallengeError("The transaction sequence number should be zero");
}
// verify transaction source
if (transaction.source !== serverAccountID) {
throw new _errors.InvalidChallengeError("The transaction source account is not equal to the server's account");
}
// verify operation
if (transaction.operations.length < 1) {
throw new _errors.InvalidChallengeError("The transaction should contain at least one operation");
}
const [operation, ...subsequentOperations] = transaction.operations;
if (!operation.source) {
throw new _errors.InvalidChallengeError("The transaction's operation should contain a source account");
}
const clientAccountID = operation.source;
let memo = null;
if (transaction.memo.type !== _stellarBase.MemoNone) {
if (clientAccountID.startsWith("M")) {
throw new _errors.InvalidChallengeError("The transaction has a memo but the client account ID is a muxed account");
}
if (transaction.memo.type !== _stellarBase.MemoID) {
throw new _errors.InvalidChallengeError("The transaction's memo must be of type `id`");
}
memo = transaction.memo.value;
}
if (operation.type !== "manageData") {
throw new _errors.InvalidChallengeError("The transaction's operation type should be 'manageData'");
}
// verify timebounds
if (transaction.timeBounds && Number.parseInt(transaction.timeBounds?.maxTime, 10) === _stellarBase.TimeoutInfinite) {
throw new _errors.InvalidChallengeError("The transaction requires non-infinite timebounds");
}
// give a small grace period for the transaction time to account for clock drift
if (!_utils.Utils.validateTimebounds(transaction, 60 * 5)) {
throw new _errors.InvalidChallengeError("The transaction has expired");
}
if (operation.value === undefined) {
throw new _errors.InvalidChallengeError("The transaction's operation values should not be null");
}
// verify base64
if (!operation.value) {
throw new _errors.InvalidChallengeError("The transaction's operation value should not be null");
}
if (Buffer.from(operation.value.toString(), "base64").length !== 48) {
throw new _errors.InvalidChallengeError("The transaction's operation value should be a 64 bytes base64 random string");
}
// verify homeDomains
if (!homeDomains) {
throw new _errors.InvalidChallengeError("Invalid homeDomains: a home domain must be provided for verification");
}
let matchedHomeDomain;
if (typeof homeDomains === "string") {
if (`${homeDomains} auth` === operation.name) {
matchedHomeDomain = homeDomains;
}
} else if (Array.isArray(homeDomains)) {
matchedHomeDomain = homeDomains.find(domain => `${domain} auth` === operation.name);
} else {
throw new _errors.InvalidChallengeError(`Invalid homeDomains: homeDomains type is ${typeof homeDomains} but should be a string or an array`);
}
if (!matchedHomeDomain) {
throw new _errors.InvalidChallengeError("Invalid homeDomains: the transaction's operation key name does not match the expected home domain");
}
// verify any subsequent operations are manage data ops and source account is the server
for (const op of subsequentOperations) {
if (op.type !== "manageData") {
throw new _errors.InvalidChallengeError("The transaction has operations that are not of type 'manageData'");
}
if (op.source !== serverAccountID && op.name !== "client_domain") {
throw new _errors.InvalidChallengeError("The transaction has operations that are unrecognized");
}
if (op.name === "web_auth_domain") {
if (op.value === undefined) {
throw new _errors.InvalidChallengeError("'web_auth_domain' operation value should not be null");
}
if (op.value.compare(Buffer.from(webAuthDomain))) {
throw new _errors.InvalidChallengeError(`'web_auth_domain' operation value does not match ${webAuthDomain}`);
}
}
}
if (!verifyTxSignedBy(transaction, serverAccountID)) {
throw new _errors.InvalidChallengeError(`Transaction not signed by server: '${serverAccountID}'`);
}
return {
tx: transaction,
clientAccountID,
matchedHomeDomain,
memo
};
}
/**
* Verifies that for a SEP-10 challenge transaction all signatures on the
* transaction are accounted for and that the signatures meet a threshold on an
* account. A transaction is verified if it is signed by the server account, and
* all other signatures match a signer that has been provided as an argument,
* and those signatures meet a threshold on the account.
*
* Signers that are not prefixed as an address/account ID strkey (G...) will be
* ignored.
*
* Errors will be raised if:
* - The transaction is invalid according to
* {@link module:WebAuth~readChallengeTx}.
* - No client signatures are found on the transaction.
* - One or more signatures in the transaction are not identifiable as the
* server account or one of the signers provided in the arguments.
* - The signatures are all valid but do not meet the threshold.
*
* @param {string} challengeTx SEP0010 challenge transaction in base64.
* @param {string} serverAccountID The server's stellar account (public key).
* @param {string} networkPassphrase The network passphrase, e.g.: 'Test SDF
* Network ; September 2015' (see {@link Networks}).
* @param {number} threshold The required signatures threshold for verifying
* this transaction.
* @param {Array.<ServerApi.AccountRecordSigners>} signerSummary a map of all
* authorized signers to their weights. It's used to validate if the
* transaction signatures have met the given threshold.
* @param {string | Array.<string>} homeDomains The home domain(s) that should
* be included in the first Manage Data operation's string key. Required in
* verifyChallengeTxSigners() => readChallengeTx().
* @param {string} webAuthDomain The home domain that is expected to be included
* as the value of the Manage Data operation with the 'web_auth_domain' key,
* if present. Used in verifyChallengeTxSigners() => readChallengeTx().
* @returns {Array.<string>} The list of signers public keys that have signed
* the transaction, excluding the server account ID, given that the threshold
* was met.
* @throws {module:WebAuth.InvalidChallengeError} Will throw if the collective
* weight of the transaction's signers does not meet the necessary threshold
* to verify this transaction.
*
* @see {@link https://stellar.org/protocol/sep-10 | SEP-10: Stellar Web Auth}
*
* @example
* import { Networks, TransactionBuilder, WebAuth } from 'stellar-sdk';
*
* const serverKP = Keypair.random();
* const clientKP1 = Keypair.random();
* const clientKP2 = Keypair.random();
*
* // Challenge, possibly built in the server side
* const challenge = WebAuth.buildChallengeTx(
* serverKP,
* clientKP1.publicKey(),
* "SDF",
* 300,
* Networks.TESTNET
* );
*
* // clock.tick(200); // Simulates a 200 ms delay when communicating from server to client
*
* // Transaction gathered from a challenge, possibly from the client side
* const transaction = TransactionBuilder.fromXDR(challenge, Networks.TESTNET);
* transaction.sign(clientKP1, clientKP2);
* const signedChallenge = transaction
* .toEnvelope()
* .toXDR("base64")
* .toString();
*
* // Defining the threshold and signerSummary
* const threshold = 3;
* const signerSummary = [
* {
* key: this.clientKP1.publicKey(),
* weight: 1,
* },
* {
* key: this.clientKP2.publicKey(),
* weight: 2,
* },
* ];
*
* // The result below should be equal to [clientKP1.publicKey(), clientKP2.publicKey()]
* WebAuth.verifyChallengeTxThreshold(
* signedChallenge,
* serverKP.publicKey(),
* Networks.TESTNET,
* threshold,
* signerSummary
* );
*/
function verifyChallengeTxThreshold(challengeTx, serverAccountID, networkPassphrase, threshold, signerSummary, homeDomains, webAuthDomain) {
const signers = signerSummary.map(signer => signer.key);
const signersFound = verifyChallengeTxSigners(challengeTx, serverAccountID, networkPassphrase, signers, homeDomains, webAuthDomain);
let weight = 0;
for (const signer of signersFound) {
const sigWeight = signerSummary.find(s => s.key === signer)?.weight || 0;
weight += sigWeight;
}
if (weight < threshold) {
throw new _errors.InvalidChallengeError(`signers with weight ${weight} do not meet threshold ${threshold}"`);
}
return signersFound;
}
/**
* Verifies that for a SEP 10 challenge transaction all signatures on the
* transaction are accounted for. A transaction is verified if it is signed by
* the server account, and all other signatures match a signer that has been
* provided as an argument (as the accountIDs list). Additional signers can be
* provided that do not have a signature, but all signatures must be matched to
* a signer (accountIDs) for verification to succeed. If verification succeeds,
* a list of signers that were found is returned, not including the server
* account ID.
*
* Signers that are not prefixed as an address/account ID strkey (G...) will be
* ignored.
*
* Errors will be raised if:
* - The transaction is invalid according to
* {@link module:WebAuth~readChallengeTx}.
* - No client signatures are found on the transaction.
* - One or more signatures in the transaction are not identifiable as the
* server account or one of the signers provided in the arguments.
*
* @param {string} challengeTx SEP0010 challenge transaction in base64.
* @param {string} serverAccountID The server's stellar account (public key).
* @param {string} networkPassphrase The network passphrase, e.g.: 'Test SDF
* Network ; September 2015' (see {@link Networks}).
* @param {Array.<string>} signers The signers public keys. This list should
* contain the public keys for all signers that have signed the transaction.
* @param {string | Array.<string>} [homeDomains] The home domain(s) that should
* be included in the first Manage Data operation's string key. Required in
* readChallengeTx().
* @param {string} webAuthDomain The home domain that is expected to be included
* as the value of the Manage Data operation with the 'web_auth_domain' key,
* if present. Used in readChallengeTx().
* @returns {Array.<string>} The list of signers public keys that have signed
* the transaction, excluding the server account ID.
*
* @see {@link https://stellar.org/protocol/sep-10|SEP-10: Stellar Web Auth}
* @example
* import { Networks, TransactionBuilder, WebAuth } from 'stellar-sdk';
*
* const serverKP = Keypair.random();
* const clientKP1 = Keypair.random();
* const clientKP2 = Keypair.random();
*
* // Challenge, possibly built in the server side
* const challenge = WebAuth.buildChallengeTx(
* serverKP,
* clientKP1.publicKey(),
* "SDF",
* 300,
* Networks.TESTNET
* );
*
* // clock.tick(200); // Simulates a 200 ms delay when communicating from server to client
*
* // Transaction gathered from a challenge, possibly from the client side
* const transaction = TransactionBuilder.fromXDR(challenge, Networks.TESTNET);
* transaction.sign(clientKP1, clientKP2);
* const signedChallenge = transaction
* .toEnvelope()
* .toXDR("base64")
* .toString();
*
* // The result below should be equal to [clientKP1.publicKey(), clientKP2.publicKey()]
* WebAuth.verifyChallengeTxSigners(
* signedChallenge,
* serverKP.publicKey(),
* Networks.TESTNET,
* threshold,
* [clientKP1.publicKey(), clientKP2.publicKey()]
* );
*/
function verifyChallengeTxSigners(challengeTx, serverAccountID, networkPassphrase, signers, homeDomains, webAuthDomain) {
// Read the transaction which validates its structure.
const {
tx
} = readChallengeTx(challengeTx, serverAccountID, networkPassphrase, homeDomains, webAuthDomain);
// Ensure the server account ID is an address and not a seed.
let serverKP;
try {
serverKP = _stellarBase.Keypair.fromPublicKey(serverAccountID); // can throw 'Invalid Stellar public key'
} catch (err) {
throw new Error(`Couldn't infer keypair from the provided 'serverAccountID': ${err.message}`);
}
// Deduplicate the client signers and ensure the server is not included
// anywhere we check or output the list of signers.
const clientSigners = new Set();
for (const signer of signers) {
// Ignore the server signer if it is in the signers list. It's
// important when verifying signers of a challenge transaction that we
// only verify and return client signers. If an account has the server
// as a signer the server should not play a part in the authentication
// of the client.
if (signer === serverKP.publicKey()) {
continue;
}
// Ignore non-G... account/address signers.
if (signer.charAt(0) !== "G") {
continue;
}
clientSigners.add(signer);
}
// Don't continue if none of the signers provided are in the final list.
if (clientSigners.size === 0) {
throw new _errors.InvalidChallengeError("No verifiable client signers provided, at least one G... address must be provided");
}
let clientSigningKey;
for (const op of tx.operations) {
if (op.type === "manageData" && op.name === "client_domain") {
if (clientSigningKey) {
throw new _errors.InvalidChallengeError("Found more than one client_domain operation");
}
clientSigningKey = op.source;
}
}
// Verify all the transaction's signers (server and client) in one
// hit. We do this in one hit here even though the server signature was
// checked in the ReadChallengeTx to ensure that every signature and signer
// are consumed only once on the transaction.
const allSigners = [serverKP.publicKey(), ...Array.from(clientSigners)];
if (clientSigningKey) {
allSigners.push(clientSigningKey);
}
const signersFound = gatherTxSigners(tx, allSigners);
let serverSignatureFound = false;
let clientSigningKeySignatureFound = false;
for (const signer of signersFound) {
if (signer === serverKP.publicKey()) {
serverSignatureFound = true;
}
if (signer === clientSigningKey) {
clientSigningKeySignatureFound = true;
}
}
// Confirm we matched a signature to the server signer.
if (!serverSignatureFound) {
throw new _errors.InvalidChallengeError(`Transaction not signed by server: '${serverKP.publicKey()}'`);
}
// Confirm we matched a signature to the client domain's signer
if (clientSigningKey && !clientSigningKeySignatureFound) {
throw new _errors.InvalidChallengeError("Transaction not signed by the source account of the 'client_domain' " + "ManageData operation");
}
// Confirm we matched at least one given signer with the transaction signatures
if (signersFound.length === 1) {
throw new _errors.InvalidChallengeError("None of the given signers match the transaction signatures");
}
// Confirm all signatures, including the server signature, were consumed by a signer:
if (signersFound.length !== tx.signatures.length) {
throw new _errors.InvalidChallengeError("Transaction has unrecognized signatures");
}
// Remove the server public key before returning
signersFound.splice(signersFound.indexOf(serverKP.publicKey()), 1);
if (clientSigningKey) {
// Remove the client domain public key public key before returning
signersFound.splice(signersFound.indexOf(clientSigningKey), 1);
}
return signersFound;
}
/**
* Verifies if a transaction was signed by the given account id.
*
* @param {Transaction | FeeBumpTransaction} transaction The signed transaction.
* @param {string} accountID The signer's public key.
* @returns {boolean} Whether or not `accountID` was found to have signed the
* transaction.
*
* @example
* let keypair = Keypair.random();
* const account = new StellarSdk.Account(keypair.publicKey(), "-1");
*
* const transaction = new TransactionBuilder(account, { fee: 100 })
* .setTimeout(30)
* .build();
*
* transaction.sign(keypair)
* WebAuth.verifyTxSignedBy(transaction, keypair.publicKey())
*/
function verifyTxSignedBy(transaction, accountID) {
return gatherTxSigners(transaction, [accountID]).length !== 0;
}
/**
* Checks if a transaction has been signed by one or more of the given signers,
* returning a list of non-repeated signers that were found to have signed the
* given transaction.
*
* @param {Transaction | FeeBumpTransaction} transaction The signed transaction.
* @param {Array.<string>} signers The signer's public keys.
* @returns {Array.<string>} A list of signers that were found to have signed
* the transaction.
*
* @example
* let keypair1 = Keypair.random();
* let keypair2 = Keypair.random();
* const account = new StellarSdk.Account(keypair1.publicKey(), "-1");
*
* const transaction = new TransactionBuilder(account, { fee: 100 })
* .setTimeout(30)
* .build();
*
* transaction.sign(keypair1, keypair2)
* WebAuth.gatherTxSigners(transaction, [keypair1.publicKey(), keypair2.publicKey()])
*/
function gatherTxSigners(transaction, signers) {
const hashedSignatureBase = transaction.hash();
const txSignatures = [...transaction.signatures]; // shallow copy for safe splicing
const signersFound = new Set();
for (const signer of signers) {
if (txSignatures.length === 0) {
break;
}
let keypair;
try {
keypair = _stellarBase.Keypair.fromPublicKey(signer); // This can throw a few different errors
} catch (err) {
throw new _errors.InvalidChallengeError(`Signer is not a valid address: ${err.message}`);
}
for (let i = 0; i < txSignatures.length; i++) {
const decSig = txSignatures[i];
if (!decSig.hint().equals(keypair.signatureHint())) {
continue;
}
if (keypair.verify(hashedSignatureBase, decSig.signature())) {
signersFound.add(signer);
txSignatures.splice(i, 1);
break;
}
}
}
return Array.from(signersFound);
}
Source