feat: SW-162 MFA for Profile implemented

This commit is contained in:
Hrishikesh Vaipurkar
2024-07-16 14:38:57 +02:00
parent 0c0fc1d08b
commit dde2b828cb
7 changed files with 177 additions and 12 deletions

View File

@@ -1,5 +1,5 @@
import { createActionURL } from "@auth/core"
import { headers as nextHeaders } from "next/headers"
import { cookies,headers as nextHeaders } from "next/headers"
import { NextRequest, NextResponse } from "next/server"
import { AuthError } from "next-auth"
@@ -63,6 +63,8 @@ export async function GET(
console.log({ logout_NEXTAUTH_URL: process.env.NEXTAUTH_URL })
console.log({ logout_env: process.env })
const cookieStore = cookies()
cookieStore.set("_SecureMFA-token", "", { maxAge: 0 })
const headers = new Headers(nextHeaders())
const signOutURL = createActionURL(
"signout",

View File

@@ -0,0 +1,81 @@
import { NextRequest, NextResponse } from "next/server"
import { AuthError } from "next-auth"
import { Lang } from "@/constants/languages"
import { env } from "@/env/server"
import { internalServerError } from "@/server/errors/next"
import { signIn } from "@/auth"
export async function GET(
request: NextRequest,
context: { params: { lang: Lang } }
) {
let redirectHeaders: Headers | undefined = undefined
let redirectTo: string
const returnUrl = request.headers.get("x-returnurl")
if (returnUrl) {
// Seamless login request from Current web
redirectTo = returnUrl
} else {
// Normal login request from New web
redirectTo =
request.cookies.get("redirectTo")?.value || // Cookie gets set by authRequired middleware
request.nextUrl.searchParams.get("redirectTo") ||
"/"
// Make relative URL to absolute URL
if (redirectTo.startsWith("/")) {
if (!env.PUBLIC_URL) {
throw internalServerError("No value for env.PUBLIC_URL")
}
redirectTo = new URL(redirectTo, env.PUBLIC_URL).href
}
// Clean up cookie from authRequired middleware
redirectHeaders = new Headers()
redirectHeaders.append(
"set-cookie",
"redirectTo=; Expires=Thu, 01 Jan 1970 00:00:00 UTC; Path=/; HttpOnly; SameSite=Lax"
)
}
try {
/**
* Passing `redirect: false` to `signIn` will return the URL instead of
* automatically redirecting to it inside of `signIn`.
* https://github.com/nextauthjs/next-auth/blob/3c035ec/packages/next-auth/src/lib/actions.ts#L76
*/
const redirectUrl = await signIn(
"curity",
{
redirectTo,
redirect: false,
},
{
ui_locales: context.params.lang,
scope: "profile_update openid",
// The below acr value is required as for New Web same Curity Client is used for MFA
// while in current web it is being setup using different Curity Client ID and secret
acr_values:
"urn:se:curity:authentication:otp-authenticator:OTP-Authenticator_web",
}
)
if (redirectUrl) {
return NextResponse.redirect(redirectUrl, {
headers: redirectHeaders,
})
}
} catch (error) {
if (error instanceof AuthError) {
console.error({ signInAuthError: error })
} else {
console.error({ signInError: error })
}
}
return internalServerError()
}

23
auth.ts
View File

@@ -1,3 +1,5 @@
import { decode,encode } from "@auth/core/jwt"
import { cookies } from "next/headers"
import NextAuth from "next-auth"
import { env } from "@/env/server"
@@ -55,6 +57,7 @@ const customProvider = {
sub: profile.sub,
given_name: profile.given_name,
login_with: profile.login_with,
acr: profile.acr,
}
},
} satisfies OIDCConfig<User>
@@ -114,6 +117,26 @@ export const config = {
return true
},
async jwt({ account, session, token, trigger, user }) {
if (
user?.acr ==
"urn:se:curity:authentication:otp-authenticator:OTP-Authenticator_web"
) {
const cookieStore = cookies()
const value = token.access_token
const secret = env.NEXTAUTH_SECRET
const maxAge = 60 * 15
const name = "_SecureMFA-token"
const mfaCookie = await encode({
secret,
maxAge,
token: value,
salt: name,
})
cookieStore.set("_SecureMFA-token", mfaCookie.toString(), {
maxAge: maxAge,
})
}
const loginType = getLoginType(user)
if (account) {
return {

View File

@@ -22,3 +22,5 @@ export const authRequired = [
...Object.values(stays),
...Object.values(points),
]
export const mfaRequired = [...Object.values(profileEdit)]

View File

@@ -22,4 +22,18 @@ export const logout = {
sv: "/sv/logga-ut",
}
export const handleAuth = [...Object.values(login), ...Object.values(logout)]
/** @type {import('@/types/routes').LangRoute} */
export const mfaLogin = {
da: "/da/mfa-log-pa",
de: "/de/mfa-anmeldung",
en: "/en/mfa-login",
fi: "/fi/mfa-kirjaudu-sisaan",
no: "/no/mfa-logg-inn",
sv: "/sv/mfa-logga-in",
}
export const handleAuth = [
...Object.values(login),
...Object.values(logout),
...Object.values(mfaLogin),
]

View File

@@ -1,7 +1,9 @@
import { decode } from "@auth/core/jwt"
import { cookies } from "next/headers"
import { NextResponse } from "next/server"
import { authRequired } from "@/constants/routes/authRequired"
import { login } from "@/constants/routes/handleAuth"
import { authRequired, mfaRequired } from "@/constants/routes/authRequired"
import { login, mfaLogin } from "@/constants/routes/handleAuth"
import { env } from "@/env/server"
import { internalServerError } from "@/server/errors/next"
@@ -44,14 +46,6 @@ export const middleware = auth(async (request) => {
const isLoggedIn = !!request.auth
const hasError = request.auth?.error
if (isLoggedIn && !hasError) {
const headers = new Headers(request.headers)
headers.set("x-continue", "1")
return NextResponse.next({
headers,
})
}
if (!env.PUBLIC_URL) {
throw internalServerError("Missing value for env.PUBLIC_URL")
}
@@ -61,6 +55,54 @@ export const middleware = auth(async (request) => {
nextUrlClone.host = publicUrl.host
nextUrlClone.hostname = publicUrl.hostname
const isMFAValid = async function () {
const cookieStore = cookies()
const mfaCookieValue = cookieStore.get("_SecureMFA-token")?.value
if (mfaCookieValue) {
try {
const mfaToken = await decode({
token: mfaCookieValue,
secret: env.NEXTAUTH_SECRET,
salt: "_SecureMFA-token",
})
if (mfaToken?.exp) {
return true
}
} catch (e) {
console.log("JWT decode failed", e)
cookieStore.set("_SecureMFA-token", "", { maxAge: 0 })
return false
}
} else {
return false
}
}
if (isLoggedIn && !hasError) {
const isMFAPath = mfaRequired.includes(nextUrl.pathname)
const mfaValid = isMFAPath ? await isMFAValid() : true
if (!mfaValid) {
const mfaLoginUrl = mfaLogin[lang]
const nextUrlClone = nextUrl.clone()
nextUrlClone.host = publicUrl.host
nextUrlClone.hostname = publicUrl.hostname
const headers = new Headers()
headers.append(
"set-cookie",
`redirectTo=${encodeURIComponent(nextUrlClone.href)}; Path=/; HttpOnly; SameSite=Lax`
)
return NextResponse.redirect(new URL(mfaLoginUrl, nextUrlClone), {
headers,
})
}
const headers = new Headers(request.headers)
headers.set("x-continue", "1")
return NextResponse.next({
headers,
})
}
const headers = new Headers()
headers.append(
"set-cookie",

1
types/auth.d.ts vendored
View File

@@ -27,5 +27,6 @@ declare module "next-auth" {
sub: string
email?: string
login_with: string
acr?: string
}
}