gecko/services/sync/modules/browserid_identity.js

373 lines
12 KiB
JavaScript
Raw Normal View History

/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
* You can obtain one at http://mozilla.org/MPL/2.0/. */
"use strict";
this.EXPORTED_SYMBOLS = ["BrowserIDManager"];
const {classes: Cc, interfaces: Ci, utils: Cu, results: Cr} = Components;
2013-10-17 11:42:18 -07:00
Cu.import("resource://gre/modules/Log.jsm");
Cu.import("resource://services-common/async.js");
Cu.import("resource://services-common/tokenserverclient.js");
Cu.import("resource://services-crypto/utils.js");
Cu.import("resource://services-sync/identity.js");
Cu.import("resource://services-sync/util.js");
Cu.import("resource://services-common/tokenserverclient.js");
Cu.import("resource://gre/modules/Services.jsm");
Cu.import("resource://services-sync/constants.js");
Cu.import("resource://gre/modules/Promise.jsm");
// Lazy imports to prevent unnecessary load on startup.
XPCOMUtils.defineLazyModuleGetter(this, "BulkKeyBundle",
"resource://services-sync/keys.js");
XPCOMUtils.defineLazyModuleGetter(this, "fxAccounts",
"resource://gre/modules/FxAccounts.jsm");
function deriveKeyBundle(kB) {
let out = CryptoUtils.hkdf(kB, undefined,
"identity.mozilla.com/picl/v1/oldsync", 2*32);
let bundle = new BulkKeyBundle();
// [encryptionKey, hmacKey]
bundle.keyPair = [out.slice(0, 32), out.slice(32, 64)];
return bundle;
}
this.BrowserIDManager = function BrowserIDManager() {
this._fxaService = fxAccounts;
this._tokenServerClient = new TokenServerClient();
this._log = Log.repository.getLogger("Sync.BrowserIDManager");
2013-10-17 11:42:18 -07:00
this._log.Level = Log.Level[Svc.Prefs.get("log.logger.identity")];
};
this.BrowserIDManager.prototype = {
__proto__: IdentityManager.prototype,
_fxaService: null,
_tokenServerClient: null,
// https://docs.services.mozilla.com/token/apis.html
_token: null,
_account: null,
/**
* Provide override point for testing token expiration.
*/
_now: function() {
return Date.now();
},
clusterURL: null,
get account() {
return this._account;
},
/**
* Sets the active account name.
*
* This should almost always be called in favor of setting username, as
* username is derived from account.
*
* Changing the account name has the side-effect of wiping out stored
* credentials. Keep in mind that persistCredentials() will need to be called
* to flush the changes to disk.
*
* Set this value to null to clear out identity information.
*/
set account(value) {
throw "account setter should be not used in BrowserIDManager";
},
/**
* Obtains the HTTP Basic auth password.
*
* Returns a string if set or null if it is not set.
*/
get basicPassword() {
this._log.error("basicPassword getter should be not used in BrowserIDManager");
return null;
},
/**
* Set the HTTP basic password to use.
*
* Changes will not persist unless persistSyncCredentials() is called.
*/
set basicPassword(value) {
throw "basicPassword setter should be not used in BrowserIDManager";
},
/**
* Obtain the Sync Key.
*
* This returns a 26 character "friendly" Base32 encoded string on success or
* null if no Sync Key could be found.
*
* If the Sync Key hasn't been set in this session, this will look in the
* password manager for the sync key.
*/
get syncKey() {
if (this.syncKeyBundle) {
// TODO: This is probably fine because the code shouldn't be
// using the sync key directly (it should use the sync key
// bundle), but I don't like it. We should probably refactor
// code that is inspecting this to not do validation on this
// field directly and instead call a isSyncKeyValid() function
// that we can override.
return "99999999999999999999999999";
}
else {
return null;
}
},
set syncKey(value) {
throw "syncKey setter should be not used in BrowserIDManager";
},
get syncKeyBundle() {
return this._syncKeyBundle;
},
/**
* Resets/Drops all credentials we hold for the current user.
*/
resetCredentials: function() {
// the only credentials we hold are the sync key.
this.resetSyncKey();
},
/**
* Resets/Drops the sync key we hold for the current user.
*/
resetSyncKey: function() {
this._syncKey = null;
this._syncKeyBundle = null;
this._syncKeyUpdated = true;
},
/**
* The current state of the auth credentials.
*
* This essentially validates that enough credentials are available to use
* Sync.
*/
get currentAuthState() {
// TODO: need to revisit this. Currently this isn't ready to go until
// both the username and syncKeyBundle are both configured and having no
// username seems to make things fail fast so that's good.
if (!this.username) {
return LOGIN_FAILED_NO_USERNAME;
}
// No need to check this.syncKey as our getter for that attribute
// uses this.syncKeyBundle
// If bundle creation failed.
if (!this.syncKeyBundle) {
return LOGIN_FAILED_NO_PASSPHRASE;
}
return STATUS_OK;
},
/**
* Do we have a non-null, not yet expired token whose email field
* matches (when normalized) our account field?
*/
hasValidToken: function() {
if (!this._token) {
return false;
}
if (this._token.expiration < this._now()) {
return false;
}
let signedInUser = this._getSignedInUser();
if (!signedInUser) {
return false;
}
// Does the signed in user match the user we retrieved the token for?
if (signedInUser.email !== this.account) {
return false;
}
return true;
},
/**
* Wrap and synchronize FxAccounts.getSignedInUser().
*
* @return credentials per wrapped.
*/
_getSignedInUser: function() {
let userData;
let cb = Async.makeSpinningCallback();
this._fxaService.getSignedInUser().then(function (result) {
cb(null, result);
},
function (err) {
cb(err);
});
try {
userData = cb.wait();
} catch (err) {
this._log.error("FxAccounts.getSignedInUser() failed with: " + err);
return null;
}
return userData;
},
// initWithLoggedInUser will fetch the logged in user from firefox accounts,
// and if such a logged in user exists, will use that user to initialize
// the identity module. Returns a Promise.
initWithLoggedInUser: function() {
// Get the signed in user from FxAccounts.
return this._fxaService.getSignedInUser()
.then(userData => {
if (!userData) {
this._log.warn("initWithLoggedInUser found no logged in user");
throw new Error("initWithLoggedInUser found no logged in user");
}
// Make a note of the last logged in user.
this._account = userData.email;
// Fetch a sync token for the logged in user from the token server.
return this._refreshTokenForLoggedInUser();
})
.then(token => {
this._token = token;
// Set the username to be the uid returned by the token server.
// TODO: check here to see if the uid is different that the current
// this.username. If so, we may need to reinit sync, detect if the new
// user has sync set up, etc
this.username = this._token.uid.toString();
return this._fxaService.getKeys();
})
.then(userData => {
// both Jelly and FxAccounts give us kA/kB as hex.
let kB = Utils.hexToBytes(userData.kB);
this._syncKeyBundle = deriveKeyBundle(kB);
// Set the clusterURI for this user based on the endpoint in the
// token. This is a bit of a hack, and we should figure out a better
// way of distributing it to components that need it.
let clusterURI = Services.io.newURI(this._token.endpoint, null, null);
clusterURI.path = "/";
this.clusterURL = clusterURI.spec;
this._log.info("initWithLoggedUser has username " + this.username + ", endpoint is " + this.clusterURL);
});
},
// Refresh the sync token for the currently logged in Firefox Accounts user.
// This method requires that this module has been intialized for a user.
_refreshTokenForLoggedInUser: function() {
return this._fxaService.getSignedInUser().then(function (userData) {
if (!userData || userData.email !== this.account) {
// This means the logged in user changed or the identity module
// wasn't properly initialized. TODO: figure out what needs to
// happen here.
this._log.error("Currently logged in FxA user differs from what was locally noted. TODO: do proper error handling.");
return null;
}
return this._fetchTokenForUser(userData);
}.bind(this));
},
_refreshTokenForLoggedInUserSync: function() {
let cb = Async.makeSpinningCallback();
this._refreshTokenForLoggedInUser().then(function (token) {
cb(null, token);
},
function (err) {
cb(err);
});
try {
return cb.wait();
} catch (err) {
this._log.info("refreshTokenForLoggedInUserSync: " + err.message);
return null;
}
},
// This is a helper to fetch a sync token for the given user data.
_fetchTokenForUser: function(userData) {
let tokenServerURI = Svc.Prefs.get("tokenServerURI");
let log = this._log;
let client = this._tokenServerClient;
log.info("Fetching Sync token from: " + tokenServerURI);
function getToken(tokenServerURI, assertion) {
let deferred = Promise.defer();
let cb = function (err, token) {
if (err) {
log.info("TokenServerClient.getTokenFromBrowserIDAssertion() failed with: " + err.message);
return deferred.reject(err);
} else {
return deferred.resolve(token);
}
};
client.getTokenFromBrowserIDAssertion(tokenServerURI, assertion, cb);
return deferred.promise;
}
let audience = Services.io.newURI(tokenServerURI, null, null).prePath;
// wait until the account email is verified and we know that
// getAssertion() will return a real assertion (not null).
return this._fxaService.whenVerified(userData)
.then(() => this._fxaService.getAssertion(audience))
.then(assertion => getToken(tokenServerURI, assertion))
.then(token => {
token.expiration = this._now() + (token.duration * 1000);
return token;
});
},
getResourceAuthenticator: function () {
return this._getAuthenticationHeader.bind(this);
},
/**
* Obtain a function to be used for adding auth to RESTRequest instances.
*/
getRESTRequestAuthenticator: function() {
return this._addAuthenticationHeader.bind(this);
},
/**
* @return a Hawk HTTP Authorization Header, lightly wrapped, for the .uri
* of a RESTRequest or AsyncResponse object.
*/
_getAuthenticationHeader: function(httpObject, method) {
if (!this.hasValidToken()) {
// Refresh token for the currently logged in FxA user
this._token = this._refreshTokenForLoggedInUserSync();
if (!this._token) {
return null;
}
}
let credentials = {algorithm: "sha256",
id: this._token.id,
key: this._token.key,
};
method = method || httpObject.method;
let headerValue = CryptoUtils.computeHAWK(httpObject.uri, method,
{credentials: credentials});
return {headers: {authorization: headerValue.field}};
},
_addAuthenticationHeader: function(request, method) {
let header = this._getAuthenticationHeader(request, method);
if (!header) {
return null;
}
request.setHeader("authorization", header.headers.authorization);
return request;
}
};