12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475 |
- ;(function(){
- /* UNBUILD */
- function USE(arg, req){
- return req? require(arg) : arg.slice? USE[R(arg)] : function(mod, path){
- arg(mod = {exports: {}});
- USE[R(path)] = mod.exports;
- }
- function R(p){
- return p.split('/').slice(-1).toString().replace('.js','');
- }
- }
- if(typeof module !== "undefined"){ var MODULE = module }
- /* UNBUILD */
- ;USE(function(module){
- // Security, Encryption, and Authorization: SEA.js
- // MANDATORY READING: https://gun.eco/explainers/data/security.html
- // IT IS IMPLEMENTED IN A POLYFILL/SHIM APPROACH.
- // THIS IS AN EARLY ALPHA!
- if(typeof window !== "undefined"){ module.window = window }
- var tmp = module.window || module;
- var SEA = tmp.SEA || {};
- if(SEA.window = module.window){ SEA.window.SEA = SEA }
- try{ if(typeof MODULE !== "undefined"){ MODULE.exports = SEA } }catch(e){}
- module.exports = SEA;
- })(USE, './root');
- ;USE(function(module){
- var SEA = USE('./root');
- try{ if(SEA.window){
- if(location.protocol.indexOf('s') < 0
- && location.host.indexOf('localhost') < 0
- && location.protocol.indexOf('file:') < 0){
- location.protocol = 'https:'; // WebCrypto does NOT work without HTTPS!
- }
- } }catch(e){}
- })(USE, './https');
- ;USE(function(module){
- if(typeof btoa === "undefined"){
- if(typeof Buffer === "undefined") {
- global.Buffer = require("buffer").Buffer
- }
- global.btoa = function (data) { return Buffer.from(data, "binary").toString("base64"); };
- global.atob = function (data) { return Buffer.from(data, "base64").toString("binary"); };
- }
- })(USE, './base64');
- ;USE(function(module){
- USE('./base64');
- // This is Array extended to have .toString(['utf8'|'hex'|'base64'])
- function SeaArray() {}
- Object.assign(SeaArray, { from: Array.from })
- SeaArray.prototype = Object.create(Array.prototype)
- SeaArray.prototype.toString = function(enc, start, end) { enc = enc || 'utf8'; start = start || 0;
- const length = this.length
- if (enc === 'hex') {
- const buf = new Uint8Array(this)
- return [ ...Array(((end && (end + 1)) || length) - start).keys()]
- .map((i) => buf[ i + start ].toString(16).padStart(2, '0')).join('')
- }
- if (enc === 'utf8') {
- return Array.from(
- { length: (end || length) - start },
- (_, i) => String.fromCharCode(this[ i + start])
- ).join('')
- }
- if (enc === 'base64') {
- return btoa(this)
- }
- }
- module.exports = SeaArray;
- })(USE, './array');
- ;USE(function(module){
- USE('./base64');
- // This is Buffer implementation used in SEA. Functionality is mostly
- // compatible with NodeJS 'safe-buffer' and is used for encoding conversions
- // between binary and 'hex' | 'utf8' | 'base64'
- // See documentation and validation for safe implementation in:
- // https://github.com/feross/safe-buffer#update
- var SeaArray = USE('./array');
- function SafeBuffer(...props) {
- console.warn('new SafeBuffer() is depreciated, please use SafeBuffer.from()')
- return SafeBuffer.from(...props)
- }
- SafeBuffer.prototype = Object.create(Array.prototype)
- Object.assign(SafeBuffer, {
- // (data, enc) where typeof data === 'string' then enc === 'utf8'|'hex'|'base64'
- from() {
- if (!Object.keys(arguments).length || arguments[0]==null) {
- throw new TypeError('First argument must be a string, Buffer, ArrayBuffer, Array, or array-like object.')
- }
- const input = arguments[0]
- let buf
- if (typeof input === 'string') {
- const enc = arguments[1] || 'utf8'
- if (enc === 'hex') {
- const bytes = input.match(/([\da-fA-F]{2})/g)
- .map((byte) => parseInt(byte, 16))
- if (!bytes || !bytes.length) {
- throw new TypeError('Invalid first argument for type \'hex\'.')
- }
- buf = SeaArray.from(bytes)
- } else if (enc === 'utf8') {
- const length = input.length
- const words = new Uint16Array(length)
- Array.from({ length: length }, (_, i) => words[i] = input.charCodeAt(i))
- buf = SeaArray.from(words)
- } else if (enc === 'base64') {
- const dec = atob(input)
- const length = dec.length
- const bytes = new Uint8Array(length)
- Array.from({ length: length }, (_, i) => bytes[i] = dec.charCodeAt(i))
- buf = SeaArray.from(bytes)
- } else if (enc === 'binary') {
- buf = SeaArray.from(input)
- } else {
- console.info('SafeBuffer.from unknown encoding: '+enc)
- }
- return buf
- }
- const byteLength = input.byteLength // what is going on here? FOR MARTTI
- const length = input.byteLength ? input.byteLength : input.length
- if (length) {
- let buf
- if (input instanceof ArrayBuffer) {
- buf = new Uint8Array(input)
- }
- return SeaArray.from(buf || input)
- }
- },
- // This is 'safe-buffer.alloc' sans encoding support
- alloc(length, fill = 0 /*, enc*/ ) {
- return SeaArray.from(new Uint8Array(Array.from({ length: length }, () => fill)))
- },
- // This is normal UNSAFE 'buffer.alloc' or 'new Buffer(length)' - don't use!
- allocUnsafe(length) {
- return SeaArray.from(new Uint8Array(Array.from({ length : length })))
- },
- // This puts together array of array like members
- concat(arr) { // octet array
- if (!Array.isArray(arr)) {
- throw new TypeError('First argument must be Array containing ArrayBuffer or Uint8Array instances.')
- }
- return SeaArray.from(arr.reduce((ret, item) => ret.concat(Array.from(item)), []))
- }
- })
- SafeBuffer.prototype.from = SafeBuffer.from
- SafeBuffer.prototype.toString = SeaArray.prototype.toString
- module.exports = SafeBuffer;
- })(USE, './buffer');
- ;USE(function(module){
- const SEA = USE('./root')
- const Buffer = USE('./buffer')
- const api = {Buffer: Buffer}
- var o = {};
- if(SEA.window){
- api.crypto = window.crypto || window.msCrypto
- api.subtle = (api.crypto||o).subtle || (api.crypto||o).webkitSubtle;
- api.TextEncoder = window.TextEncoder;
- api.TextDecoder = window.TextDecoder;
- api.random = (len) => Buffer.from(api.crypto.getRandomValues(new Uint8Array(Buffer.alloc(len))));
- }
- if(!api.TextDecoder)
- {
- const { TextEncoder, TextDecoder } = require('text-encoding');
- api.TextDecoder = TextDecoder;
- api.TextEncoder = TextEncoder;
- }
- if(!api.crypto)
- {
- try
- {
- var crypto = USE('crypto', 1);
- Object.assign(api, {
- crypto,
- random: (len) => Buffer.from(crypto.randomBytes(len))
- });
- const { Crypto: WebCrypto } = USE('@peculiar/webcrypto', 1);
- api.ossl = api.subtle = new WebCrypto({directory: 'ossl'}).subtle // ECDH
- }
- catch(e){
- console.log("text-encoding and @peculiar/webcrypto may not be included by default, please add it to your package.json!");
- }}
- module.exports = api
- })(USE, './shim');
- ;USE(function(module){
- var SEA = USE('./root');
- var Buffer = USE('./buffer');
- var s = {};
- s.pbkdf2 = {hash: {name : 'SHA-256'}, iter: 100000, ks: 64};
- s.ecdsa = {
- pair: {name: 'ECDSA', namedCurve: 'P-256'},
- sign: {name: 'ECDSA', hash: {name: 'SHA-256'}}
- };
- s.ecdh = {name: 'ECDH', namedCurve: 'P-256'};
- // This creates Web Cryptography API compliant JWK for sign/verify purposes
- s.jwk = function(pub, d){ // d === priv
- pub = pub.split('.');
- var x = pub[0], y = pub[1];
- var jwk = {kty: "EC", crv: "P-256", x: x, y: y, ext: true};
- jwk.key_ops = d ? ['sign'] : ['verify'];
- if(d){ jwk.d = d }
- return jwk;
- };
-
- s.keyToJwk = function(keyBytes) {
- const keyB64 = keyBytes.toString('base64');
- const k = keyB64.replace(/\+/g, '-').replace(/\//g, '_').replace(/\=/g, '');
- return { kty: 'oct', k: k, ext: false, alg: 'A256GCM' };
- }
- s.recall = {
- validity: 12 * 60 * 60, // internally in seconds : 12 hours
- hook: function(props){ return props } // { iat, exp, alias, remember } // or return new Promise((resolve, reject) => resolve(props)
- };
- s.check = function(t){ return (typeof t == 'string') && ('SEA{' === t.slice(0,4)) }
- s.parse = function p(t){ try {
- var yes = (typeof t == 'string');
- if(yes && 'SEA{' === t.slice(0,4)){ t = t.slice(3) }
- return yes ? JSON.parse(t) : t;
- } catch (e) {}
- return t;
- }
- SEA.opt = s;
- module.exports = s
- })(USE, './settings');
- ;USE(function(module){
- var shim = USE('./shim');
- module.exports = async function(d, o){
- var t = (typeof d == 'string')? d : JSON.stringify(d);
- var hash = await shim.subtle.digest({name: o||'SHA-256'}, new shim.TextEncoder().encode(t));
- return shim.Buffer.from(hash);
- }
- })(USE, './sha256');
- ;USE(function(module){
- // This internal func returns SHA-1 hashed data for KeyID generation
- const __shim = USE('./shim')
- const subtle = __shim.subtle
- const ossl = __shim.ossl ? __shim.ossl : subtle
- const sha1hash = (b) => ossl.digest({name: 'SHA-1'}, new ArrayBuffer(b))
- module.exports = sha1hash
- })(USE, './sha1');
- ;USE(function(module){
- var SEA = USE('./root');
- var shim = USE('./shim');
- var S = USE('./settings');
- var sha = USE('./sha256');
- var u;
- SEA.work = SEA.work || (async (data, pair, cb, opt) => { try { // used to be named `proof`
- var salt = (pair||{}).epub || pair; // epub not recommended, salt should be random!
- var opt = opt || {};
- if(salt instanceof Function){
- cb = salt;
- salt = u;
- }
- data = (typeof data == 'string')? data : JSON.stringify(data);
- if('sha' === (opt.name||'').toLowerCase().slice(0,3)){
- var rsha = shim.Buffer.from(await sha(data, opt.name), 'binary').toString(opt.encode || 'base64')
- if(cb){ try{ cb(rsha) }catch(e){console.log(e)} }
- return rsha;
- }
- salt = salt || shim.random(9);
- var key = await (shim.ossl || shim.subtle).importKey('raw', new shim.TextEncoder().encode(data), {name: opt.name || 'PBKDF2'}, false, ['deriveBits']);
- var work = await (shim.ossl || shim.subtle).deriveBits({
- name: opt.name || 'PBKDF2',
- iterations: opt.iterations || S.pbkdf2.iter,
- salt: new shim.TextEncoder().encode(opt.salt || salt),
- hash: opt.hash || S.pbkdf2.hash,
- }, key, opt.length || (S.pbkdf2.ks * 8))
- data = shim.random(data.length) // Erase data in case of passphrase
- var r = shim.Buffer.from(work, 'binary').toString(opt.encode || 'base64')
- if(cb){ try{ cb(r) }catch(e){console.log(e)} }
- return r;
- } catch(e) {
- console.log(e);
- SEA.err = e;
- if(SEA.throw){ throw e }
- if(cb){ cb() }
- return;
- }});
- module.exports = SEA.work;
- })(USE, './work');
- ;USE(function(module){
- var SEA = USE('./root');
- var shim = USE('./shim');
- var S = USE('./settings');
- SEA.name = SEA.name || (async (cb, opt) => { try {
- if(cb){ try{ cb() }catch(e){console.log(e)} }
- return;
- } catch(e) {
- console.log(e);
- SEA.err = e;
- if(SEA.throw){ throw e }
- if(cb){ cb() }
- return;
- }});
- //SEA.pair = async (data, proof, cb) => { try {
- SEA.pair = SEA.pair || (async (cb, opt) => { try {
- var ecdhSubtle = shim.ossl || shim.subtle;
- // First: ECDSA keys for signing/verifying...
- var sa = await shim.subtle.generateKey({name: 'ECDSA', namedCurve: 'P-256'}, true, [ 'sign', 'verify' ])
- .then(async (keys) => {
- // privateKey scope doesn't leak out from here!
- //const { d: priv } = await shim.subtle.exportKey('jwk', keys.privateKey)
- var key = {};
- key.priv = (await shim.subtle.exportKey('jwk', keys.privateKey)).d;
- var pub = await shim.subtle.exportKey('jwk', keys.publicKey);
- //const pub = Buff.from([ x, y ].join(':')).toString('base64') // old
- key.pub = pub.x+'.'+pub.y; // new
- // x and y are already base64
- // pub is UTF8 but filename/URL safe (https://www.ietf.org/rfc/rfc3986.txt)
- // but split on a non-base64 letter.
- return key;
- })
-
- // To include PGPv4 kind of keyId:
- // const pubId = await SEA.keyid(keys.pub)
- // Next: ECDH keys for encryption/decryption...
- try{
- var dh = await ecdhSubtle.generateKey({name: 'ECDH', namedCurve: 'P-256'}, true, ['deriveKey'])
- .then(async (keys) => {
- // privateKey scope doesn't leak out from here!
- var key = {};
- key.epriv = (await ecdhSubtle.exportKey('jwk', keys.privateKey)).d;
- var pub = await ecdhSubtle.exportKey('jwk', keys.publicKey);
- //const epub = Buff.from([ ex, ey ].join(':')).toString('base64') // old
- key.epub = pub.x+'.'+pub.y; // new
- // ex and ey are already base64
- // epub is UTF8 but filename/URL safe (https://www.ietf.org/rfc/rfc3986.txt)
- // but split on a non-base64 letter.
- return key;
- })
- }catch(e){
- if(SEA.window){ throw e }
- if(e == 'Error: ECDH is not a supported algorithm'){ console.log('Ignoring ECDH...') }
- else { throw e }
- } dh = dh || {};
- var r = { pub: sa.pub, priv: sa.priv, /* pubId, */ epub: dh.epub, epriv: dh.epriv }
- if(cb){ try{ cb(r) }catch(e){console.log(e)} }
- return r;
- } catch(e) {
- console.log(e);
- SEA.err = e;
- if(SEA.throw){ throw e }
- if(cb){ cb() }
- return;
- }});
- module.exports = SEA.pair;
- })(USE, './pair');
- ;USE(function(module){
- var SEA = USE('./root');
- var shim = USE('./shim');
- var S = USE('./settings');
- var sha = USE('./sha256');
- var u;
- SEA.sign = SEA.sign || (async (data, pair, cb, opt) => { try {
- opt = opt || {};
- if(!(pair||opt).priv){
- pair = await SEA.I(null, {what: data, how: 'sign', why: opt.why});
- }
- if(u === data){ throw '`undefined` not allowed.' }
- var json = S.parse(data);
- var check = opt.check = opt.check || json;
- if(SEA.verify && (SEA.opt.check(check) || (check && check.s && check.m))
- && u !== await SEA.verify(check, pair)){ // don't sign if we already signed it.
- var r = S.parse(check);
- if(!opt.raw){ r = 'SEA'+JSON.stringify(r) }
- if(cb){ try{ cb(r) }catch(e){console.log(e)} }
- return r;
- }
- var pub = pair.pub;
- var priv = pair.priv;
- var jwk = S.jwk(pub, priv);
- var hash = await sha(json);
- var sig = await (shim.ossl || shim.subtle).importKey('jwk', jwk, {name: 'ECDSA', namedCurve: 'P-256'}, false, ['sign'])
- .then((key) => (shim.ossl || shim.subtle).sign({name: 'ECDSA', hash: {name: 'SHA-256'}}, key, new Uint8Array(hash))) // privateKey scope doesn't leak out from here!
- var r = {m: json, s: shim.Buffer.from(sig, 'binary').toString(opt.encode || 'base64')}
- if(!opt.raw){ r = 'SEA'+JSON.stringify(r) }
- if(cb){ try{ cb(r) }catch(e){console.log(e)} }
- return r;
- } catch(e) {
- console.log(e);
- SEA.err = e;
- if(SEA.throw){ throw e }
- if(cb){ cb() }
- return;
- }});
- module.exports = SEA.sign;
- })(USE, './sign');
- ;USE(function(module){
- var SEA = USE('./root');
- var shim = USE('./shim');
- var S = USE('./settings');
- var sha = USE('./sha256');
- var u;
- SEA.verify = SEA.verify || (async (data, pair, cb, opt) => { try {
- var json = S.parse(data);
- if(false === pair){ // don't verify!
- var raw = S.parse(json.m);
- if(cb){ try{ cb(raw) }catch(e){console.log(e)} }
- return raw;
- }
- opt = opt || {};
- // SEA.I // verify is free! Requires no user permission.
- var pub = pair.pub || pair;
- var key = SEA.opt.slow_leak? await SEA.opt.slow_leak(pub) : await (shim.ossl || shim.subtle).importKey('jwk', S.jwk(pub), {name: 'ECDSA', namedCurve: 'P-256'}, false, ['verify']);
- var hash = await sha(json.m);
- var buf, sig, check, tmp; try{
- buf = shim.Buffer.from(json.s, opt.encode || 'base64'); // NEW DEFAULT!
- sig = new Uint8Array(buf);
- check = await (shim.ossl || shim.subtle).verify({name: 'ECDSA', hash: {name: 'SHA-256'}}, key, sig, new Uint8Array(hash));
- if(!check){ throw "Signature did not match." }
- }catch(e){
- if(SEA.opt.fallback){
- return await SEA.opt.fall_verify(data, pair, cb, opt);
- }
- }
- var r = check? S.parse(json.m) : u;
- if(cb){ try{ cb(r) }catch(e){console.log(e)} }
- return r;
- } catch(e) {
- console.log(e); // mismatched owner FOR MARTTI
- SEA.err = e;
- if(SEA.throw){ throw e }
- if(cb){ cb() }
- return;
- }});
- module.exports = SEA.verify;
- // legacy & ossl leak mitigation:
- var knownKeys = {};
- var keyForPair = SEA.opt.slow_leak = pair => {
- if (knownKeys[pair]) return knownKeys[pair];
- var jwk = S.jwk(pair);
- knownKeys[pair] = (shim.ossl || shim.subtle).importKey("jwk", jwk, {name: 'ECDSA', namedCurve: 'P-256'}, false, ["verify"]);
- return knownKeys[pair];
- };
- var O = SEA.opt;
- SEA.opt.fall_verify = async function(data, pair, cb, opt, f){
- if(f === SEA.opt.fallback){ throw "Signature did not match" } f = f || 1;
- var tmp = data||'';
- data = SEA.opt.unpack(data) || data;
- var json = S.parse(data), pub = pair.pub || pair, key = await SEA.opt.slow_leak(pub);
- var hash = (f <= SEA.opt.fallback)? shim.Buffer.from(await shim.subtle.digest({name: 'SHA-256'}, new shim.TextEncoder().encode(S.parse(json.m)))) : await sha(json.m); // this line is old bad buggy code but necessary for old compatibility.
- var buf; var sig; var check; try{
- buf = shim.Buffer.from(json.s, opt.encode || 'base64') // NEW DEFAULT!
- sig = new Uint8Array(buf)
- check = await (shim.ossl || shim.subtle).verify({name: 'ECDSA', hash: {name: 'SHA-256'}}, key, sig, new Uint8Array(hash))
- if(!check){ throw "Signature did not match." }
- }catch(e){
- buf = shim.Buffer.from(json.s, 'utf8') // AUTO BACKWARD OLD UTF8 DATA!
- sig = new Uint8Array(buf)
- check = await (shim.ossl || shim.subtle).verify({name: 'ECDSA', hash: {name: 'SHA-256'}}, key, sig, new Uint8Array(hash))
- if(!check){ throw "Signature did not match." }
- }
- var r = check? S.parse(json.m) : u;
- O.fall_soul = tmp['#']; O.fall_key = tmp['.']; O.fall_val = data; O.fall_state = tmp['>'];
- if(cb){ try{ cb(r) }catch(e){console.log(e)} }
- return r;
- }
- SEA.opt.fallback = 2;
- })(USE, './verify');
- ;USE(function(module){
- var shim = USE('./shim');
- var S = USE('./settings');
- var sha256hash = USE('./sha256');
- const importGen = async (key, salt, opt) => {
- //const combo = shim.Buffer.concat([shim.Buffer.from(key, 'utf8'), salt || shim.random(8)]).toString('utf8') // old
- var opt = opt || {};
- const combo = key + (salt || shim.random(8)).toString('utf8'); // new
- const hash = shim.Buffer.from(await sha256hash(combo), 'binary')
-
- const jwkKey = S.keyToJwk(hash)
- return await shim.subtle.importKey('jwk', jwkKey, {name:'AES-GCM'}, false, ['encrypt', 'decrypt'])
- }
- module.exports = importGen;
- })(USE, './aeskey');
- ;USE(function(module){
- var SEA = USE('./root');
- var shim = USE('./shim');
- var S = USE('./settings');
- var aeskey = USE('./aeskey');
- var u;
- SEA.encrypt = SEA.encrypt || (async (data, pair, cb, opt) => { try {
- opt = opt || {};
- var key = (pair||opt).epriv || pair;
- if(u === data){ throw '`undefined` not allowed.' }
- if(!key){
- pair = await SEA.I(null, {what: data, how: 'encrypt', why: opt.why});
- key = pair.epriv || pair;
- }
- var msg = (typeof data == 'string')? data : JSON.stringify(data);
- var rand = {s: shim.random(9), iv: shim.random(15)}; // consider making this 9 and 15 or 18 or 12 to reduce == padding.
- var ct = await aeskey(key, rand.s, opt).then((aes) => (/*shim.ossl ||*/ shim.subtle).encrypt({ // Keeping the AES key scope as private as possible...
- name: opt.name || 'AES-GCM', iv: new Uint8Array(rand.iv)
- }, aes, new shim.TextEncoder().encode(msg)));
- var r = {
- ct: shim.Buffer.from(ct, 'binary').toString(opt.encode || 'base64'),
- iv: rand.iv.toString(opt.encode || 'base64'),
- s: rand.s.toString(opt.encode || 'base64')
- }
- if(!opt.raw){ r = 'SEA'+JSON.stringify(r) }
- if(cb){ try{ cb(r) }catch(e){console.log(e)} }
- return r;
- } catch(e) {
- console.log(e);
- SEA.err = e;
- if(SEA.throw){ throw e }
- if(cb){ cb() }
- return;
- }});
- module.exports = SEA.encrypt;
- })(USE, './encrypt');
- ;USE(function(module){
- var SEA = USE('./root');
- var shim = USE('./shim');
- var S = USE('./settings');
- var aeskey = USE('./aeskey');
- SEA.decrypt = SEA.decrypt || (async (data, pair, cb, opt) => { try {
- opt = opt || {};
- var key = (pair||opt).epriv || pair;
- if(!key){
- pair = await SEA.I(null, {what: data, how: 'decrypt', why: opt.why});
- key = pair.epriv || pair;
- }
- var json = S.parse(data);
- var buf, bufiv, bufct; try{
- buf = shim.Buffer.from(json.s, opt.encode || 'base64');
- bufiv = shim.Buffer.from(json.iv, opt.encode || 'base64');
- bufct = shim.Buffer.from(json.ct, opt.encode || 'base64');
- var ct = await aeskey(key, buf, opt).then((aes) => (/*shim.ossl ||*/ shim.subtle).decrypt({ // Keeping aesKey scope as private as possible...
- name: opt.name || 'AES-GCM', iv: new Uint8Array(bufiv), tagLength: 128
- }, aes, new Uint8Array(bufct)));
- }catch(e){
- if('utf8' === opt.encode){ throw "Could not decrypt" }
- if(SEA.opt.fallback){
- opt.encode = 'utf8';
- return await SEA.decrypt(data, pair, cb, opt);
- }
- }
- var r = S.parse(new shim.TextDecoder('utf8').decode(ct));
- if(cb){ try{ cb(r) }catch(e){console.log(e)} }
- return r;
- } catch(e) {
- console.log(e);
- SEA.err = e;
- if(SEA.throw){ throw e }
- if(cb){ cb() }
- return;
- }});
- module.exports = SEA.decrypt;
- })(USE, './decrypt');
- ;USE(function(module){
- var SEA = USE('./root');
- var shim = USE('./shim');
- var S = USE('./settings');
- // Derive shared secret from other's pub and my epub/epriv
- SEA.secret = SEA.secret || (async (key, pair, cb, opt) => { try {
- opt = opt || {};
- if(!pair || !pair.epriv || !pair.epub){
- pair = await SEA.I(null, {what: key, how: 'secret', why: opt.why});
- }
- var pub = key.epub || key;
- var epub = pair.epub;
- var epriv = pair.epriv;
- var ecdhSubtle = shim.ossl || shim.subtle;
- var pubKeyData = keysToEcdhJwk(pub);
- var props = Object.assign({ public: await ecdhSubtle.importKey(...pubKeyData, true, []) },{name: 'ECDH', namedCurve: 'P-256'}); // Thanks to @sirpy !
- var privKeyData = keysToEcdhJwk(epub, epriv);
- var derived = await ecdhSubtle.importKey(...privKeyData, false, ['deriveBits']).then(async (privKey) => {
- // privateKey scope doesn't leak out from here!
- var derivedBits = await ecdhSubtle.deriveBits(props, privKey, 256);
- var rawBits = new Uint8Array(derivedBits);
- var derivedKey = await ecdhSubtle.importKey('raw', rawBits,{ name: 'AES-GCM', length: 256 }, true, [ 'encrypt', 'decrypt' ]);
- return ecdhSubtle.exportKey('jwk', derivedKey).then(({ k }) => k);
- })
- var r = derived;
- if(cb){ try{ cb(r) }catch(e){console.log(e)} }
- return r;
- } catch(e) {
- console.log(e);
- SEA.err = e;
- if(SEA.throw){ throw e }
- if(cb){ cb() }
- return;
- }});
- // can this be replaced with settings.jwk?
- var keysToEcdhJwk = (pub, d) => { // d === priv
- //var [ x, y ] = Buffer.from(pub, 'base64').toString('utf8').split(':') // old
- var [ x, y ] = pub.split('.') // new
- var jwk = d ? { d: d } : {}
- return [ // Use with spread returned value...
- 'jwk',
- Object.assign(
- jwk,
- { x: x, y: y, kty: 'EC', crv: 'P-256', ext: true }
- ), // ??? refactor
- {name: 'ECDH', namedCurve: 'P-256'}
- ]
- }
- module.exports = SEA.secret;
- })(USE, './secret');
- ;USE(function(module){
- var shim = USE('./shim');
- // Practical examples about usage found in tests.
- var SEA = USE('./root');
- SEA.work = USE('./work');
- SEA.sign = USE('./sign');
- SEA.verify = USE('./verify');
- SEA.encrypt = USE('./encrypt');
- SEA.decrypt = USE('./decrypt');
- //SEA.opt.aeskey = USE('./aeskey'); // not official! // this causes problems in latest WebCrypto.
- SEA.random = SEA.random || shim.random;
- // This is Buffer used in SEA and usable from Gun/SEA application also.
- // For documentation see https://nodejs.org/api/buffer.html
- SEA.Buffer = SEA.Buffer || USE('./buffer');
- // These SEA functions support now ony Promises or
- // async/await (compatible) code, use those like Promises.
- //
- // Creates a wrapper library around Web Crypto API
- // for various AES, ECDSA, PBKDF2 functions we called above.
- // Calculate public key KeyID aka PGPv4 (result: 8 bytes as hex string)
- SEA.keyid = SEA.keyid || (async (pub) => {
- try {
- // base64('base64(x):base64(y)') => Buffer(xy)
- const pb = Buffer.concat(
- pub.replace(/-/g, '+').replace(/_/g, '/').split('.')
- .map((t) => Buffer.from(t, 'base64'))
- )
- // id is PGPv4 compliant raw key
- const id = Buffer.concat([
- Buffer.from([0x99, pb.length / 0x100, pb.length % 0x100]), pb
- ])
- const sha1 = await sha1hash(id)
- const hash = Buffer.from(sha1, 'binary')
- return hash.toString('hex', hash.length - 8) // 16-bit ID as hex
- } catch (e) {
- console.log(e)
- throw e
- }
- });
- // all done!
- // Obviously it is missing MANY necessary features. This is only an alpha release.
- // Please experiment with it, audit what I've done so far, and complain about what needs to be added.
- // SEA should be a full suite that is easy and seamless to use.
- // Again, scroll naer the top, where I provide an EXAMPLE of how to create a user and sign in.
- // Once logged in, the rest of the code you just read handled automatically signing/validating data.
- // But all other behavior needs to be equally easy, like opinionated ways of
- // Adding friends (trusted public keys), sending private messages, etc.
- // Cheers! Tell me what you think.
- var Gun = (SEA.window||{}).Gun || USE((typeof MODULE == "undefined"?'.':'')+'./gun', 1);
- Gun.SEA = SEA;
- SEA.GUN = SEA.Gun = Gun;
- module.exports = SEA
- })(USE, './sea');
- ;USE(function(module){
- var Gun = USE('./sea').Gun;
- Gun.chain.then = function(cb, opt){
- var gun = this, p = (new Promise(function(res, rej){
- gun.once(res, opt);
- }));
- return cb? p.then(cb) : p;
- }
- })(USE, './then');
- ;USE(function(module){
- var SEA = USE('./sea');
- var Gun = SEA.Gun;
- var then = USE('./then');
- function User(root){
- this._ = {$: this};
- }
- User.prototype = (function(){ function F(){}; F.prototype = Gun.chain; return new F() }()) // Object.create polyfill
- User.prototype.constructor = User;
- // let's extend the gun chain with a `user` function.
- // only one user can be logged in at a time, per gun instance.
- Gun.chain.user = function(pub){
- var gun = this, root = gun.back(-1), user;
- if(pub){ return root.get('~'+pub) }
- if(user = root.back('user')){ return user }
- var root = (root._), at = root, uuid = at.opt.uuid || Gun.state.lex;
- (at = (user = at.user = gun.chain(new User))._).opt = {};
- at.opt.uuid = function(cb){
- var id = uuid(), pub = root.user;
- if(!pub || !(pub = pub.is) || !(pub = pub.pub)){ return id }
- id = id + '~' + pub + '/';
- if(cb && cb.call){ cb(null, id) }
- return id;
- }
- return user;
- }
- Gun.User = User;
- module.exports = User;
- })(USE, './user');
- ;USE(function(module){
- // TODO: This needs to be split into all separate functions.
- // Not just everything thrown into 'create'.
- var SEA = USE('./sea');
- var User = USE('./user');
- var authsettings = USE('./settings');
- var Gun = SEA.Gun;
- var noop = function(){};
- // Well first we have to actually create a user. That is what this function does.
- User.prototype.create = function(alias, pass, cb, opt){
- var gun = this, cat = (gun._), root = gun.back(-1);
- cb = cb || noop;
- if(cat.ing){
- cb({err: Gun.log("User is already being created or authenticated!"), wait: true});
- return gun;
- }
- cat.ing = true;
- opt = opt || {};
- var act = {}, u;
- act.a = function(pubs){
- act.pubs = pubs;
- if(pubs && !opt.already){
- // If we can enforce that a user name is already taken, it might be nice to try, but this is not guaranteed.
- var ack = {err: Gun.log('User already created!')};
- cat.ing = false;
- cb(ack);
- gun.leave();
- return;
- }
- act.salt = Gun.text.random(64); // pseudo-randomly create a salt, then use PBKDF2 function to extend the password with it.
- SEA.work(pass, act.salt, act.b); // this will take some short amount of time to produce a proof, which slows brute force attacks.
- }
- act.b = function(proof){
- act.proof = proof;
- SEA.pair(act.c); // now we have generated a brand new ECDSA key pair for the user account.
- }
- act.c = function(pair){ var tmp;
- act.pair = pair || {};
- if(tmp = cat.root.user){
- tmp._.sea = pair;
- tmp.is = {pub: pair.pub, epub: pair.epub, alias: alias};
- }
- // the user's public key doesn't need to be signed. But everything else needs to be signed with it! // we have now automated it! clean up these extra steps now!
- act.data = {pub: pair.pub};
- act.d();
- }
- act.d = function(){
- act.data.alias = alias;
- act.e();
- }
- act.e = function(){
- act.data.epub = act.pair.epub;
- SEA.encrypt({priv: act.pair.priv, epriv: act.pair.epriv}, act.proof, act.f, {raw:1}); // to keep the private key safe, we AES encrypt it with the proof of work!
- }
- act.f = function(auth){
- act.data.auth = JSON.stringify({ek: auth, s: act.salt});
- act.g(act.data.auth);
- }
- act.g = function(auth){ var tmp;
- act.data.auth = act.data.auth || auth;
- root.get(tmp = '~'+act.pair.pub).put(act.data); // awesome, now we can actually save the user with their public key as their ID.
- root.get('~@'+alias).put(Gun.obj.put({}, tmp, Gun.val.link.ify(tmp))); // next up, we want to associate the alias with the public key. So we add it to the alias list.
- setTimeout(function(){ // we should be able to delete this now, right?
- cat.ing = false;
- cb({ok: 0, pub: act.pair.pub}); // callback that the user has been created. (Note: ok = 0 because we didn't wait for disk to ack)
- if(noop === cb){ gun.auth(alias, pass) } // if no callback is passed, auto-login after signing up.
- },10);
- }
- root.get('~@'+alias).once(act.a);
- return gun;
- }
- // now that we have created a user, we want to authenticate them!
- User.prototype.auth = function(alias, pass, cb, opt){
- var gun = this, cat = (gun._), root = gun.back(-1);
- cb = cb || function(){};
- if(cat.ing){
- cb({err: Gun.log("User is already being created or authenticated!"), wait: true});
- return gun;
- }
- cat.ing = true;
- opt = opt || {};
- var pair = (alias && (alias.pub || alias.epub))? alias : (pass && (pass.pub || pass.epub))? pass : null;
- var act = {}, u;
- act.a = function(data){
- if(!data){ return act.b() }
- if(!data.pub){
- var tmp = [];
- Gun.node.is(data, function(v){ tmp.push(v) })
- return act.b(tmp);
- }
- if(act.name){ return act.f(data) }
- act.c((act.data = data).auth);
- }
- act.b = function(list){
- var get = (act.list = (act.list||[]).concat(list||[])).shift();
- if(u === get){
- if(act.name){ return act.err('Your user account is not published for dApps to access, please consider syncing it online, or allowing local access by adding your device as a peer.') }
- return act.err('Wrong user or password.')
- }
- root.get(get).once(act.a);
- }
- act.c = function(auth){
- if(u === auth){ return act.b() }
- if(Gun.text.is(auth)){ return act.c(Gun.obj.ify(auth)) } // in case of legacy
- SEA.work(pass, (act.auth = auth).s, act.d, act.enc); // the proof of work is evidence that we've spent some time/effort trying to log in, this slows brute force.
- }
- act.d = function(proof){
- SEA.decrypt(act.auth.ek, proof, act.e, act.enc);
- }
- act.e = function(half){
- if(u === half){
- if(!act.enc){ // try old format
- act.enc = {encode: 'utf8'};
- return act.c(act.auth);
- } act.enc = null; // end backwards
- return act.b();
- }
- act.half = half;
- act.f(act.data);
- }
- act.f = function(data){
- if(!data || !data.pub){ return act.b() }
- var tmp = act.half || {};
- act.g({pub: data.pub, epub: data.epub, priv: tmp.priv, epriv: tmp.epriv});
- }
- act.g = function(pair){
- act.pair = pair;
- var user = (root._).user, at = (user._);
- var tmp = at.tag;
- var upt = at.opt;
- at = user._ = root.get('~'+pair.pub)._;
- at.opt = upt;
- // add our credentials in-memory only to our root user instance
- user.is = {pub: pair.pub, epub: pair.epub, alias: alias};
- at.sea = act.pair;
- cat.ing = false;
- try{if(pass && !Gun.obj.has(Gun.obj.ify(cat.root.graph['~'+pair.pub].auth), ':')){ opt.shuffle = opt.change = pass; } }catch(e){} // migrate UTF8 & Shuffle!
- opt.change? act.z() : cb(at);
- if(SEA.window && ((gun.back('user')._).opt||opt).remember){
- // TODO: this needs to be modular.
- try{var sS = {};
- sS = window.sessionStorage;
- sS.recall = true;
- sS.alias = alias;
- sS.tmp = pass;
- }catch(e){}
- }
- try{
- (root._).on('auth', at) // TODO: Deprecate this, emit on user instead! Update docs when you do.
- //at.on('auth', at) // Arrgh, this doesn't work without event "merge" code, but "merge" code causes stack overflow and crashes after logging in & trying to write data.
- }catch(e){
- Gun.log("Your 'auth' callback crashed with:", e);
- }
- }
- act.z = function(){
- // password update so encrypt private key using new pwd + salt
- act.salt = Gun.text.random(64); // pseudo-random
- SEA.work(opt.change, act.salt, act.y);
- }
- act.y = function(proof){
- SEA.encrypt({priv: act.pair.priv, epriv: act.pair.epriv}, proof, act.x, {raw:1});
- }
- act.x = function(auth){
- act.w(JSON.stringify({ek: auth, s: act.salt}));
- }
- act.w = function(auth){
- if(opt.shuffle){ // delete in future!
- console.log('migrate core account from UTF8 & shuffle');
- var tmp = Gun.obj.to(act.data);
- Gun.obj.del(tmp, '_');
- tmp.auth = auth;
- root.get('~'+act.pair.pub).put(tmp);
- } // end delete
- root.get('~'+act.pair.pub).get('auth').put(auth, cb);
- }
- act.err = function(e){
- var ack = {err: Gun.log(e || 'User cannot be found!')};
- cat.ing = false;
- cb(ack);
- }
- act.plugin = function(name){
- if(!(act.name = name)){ return act.err() }
- var tmp = [name];
- if('~' !== name[0]){
- tmp[1] = '~'+name;
- tmp[2] = '~@'+name;
- }
- act.b(tmp);
- }
- if(pair){
- act.g(pair);
- } else
- if(alias){
- root.get('~@'+alias).once(act.a);
- } else
- if(!alias && !pass){
- SEA.name(act.plugin);
- }
- return gun;
- }
- User.prototype.pair = function(){
- console.log("user.pair() IS DEPRECATED AND WILL BE DELETED!!!");
- var user = this;
- if(!user.is){ return false }
- return user._.sea;
- }
- User.prototype.leave = function(opt, cb){
- var gun = this, user = (gun.back(-1)._).user;
- if(user){
- delete user.is;
- delete user._.is;
- delete user._.sea;
- }
- if(SEA.window){
- try{var sS = {};
- sS = window.sessionStorage;
- delete sS.alias;
- delete sS.tmp;
- delete sS.recall;
- }catch(e){};
- }
- return gun;
- }
- // If authenticated user wants to delete his/her account, let's support it!
- User.prototype.delete = async function(alias, pass, cb){
- console.log("user.delete() IS DEPRECATED AND WILL BE MOVED TO A MODULE!!!");
- var gun = this, root = gun.back(-1), user = gun.back('user');
- try {
- user.auth(alias, pass, function(ack){
- var pub = (user.is||{}).pub;
- // Delete user data
- user.map().once(function(){ this.put(null) });
- // Wipe user data from memory
- user.leave();
- (cb || noop)({ok: 0});
- });
- } catch (e) {
- Gun.log('User.delete failed! Error:', e);
- }
- return gun;
- }
- User.prototype.recall = function(opt, cb){
- var gun = this, root = gun.back(-1), tmp;
- opt = opt || {};
- if(opt && opt.sessionStorage){
- if(SEA.window){
- try{var sS = {};
- sS = window.sessionStorage;
- if(sS){
- (root._).opt.remember = true;
- ((gun.back('user')._).opt||opt).remember = true;
- if(sS.recall || (sS.alias && sS.tmp)){
- root.user().auth(sS.alias, sS.tmp, cb);
- }
- }
- }catch(e){}
- }
- return gun;
- }
- /*
- TODO: copy mhelander's expiry code back in.
- Although, we should check with community,
- should expiry be core or a plugin?
- */
- return gun;
- }
- User.prototype.alive = async function(){
- console.log("user.alive() IS DEPRECATED!!!");
- const gunRoot = this.back(-1)
- try {
- // All is good. Should we do something more with actual recalled data?
- await authRecall(gunRoot)
- return gunRoot._.user._
- } catch (e) {
- const err = 'No session!'
- Gun.log(err)
- throw { err }
- }
- }
- User.prototype.trust = async function(user){
- // TODO: BUG!!! SEA `node` read listener needs to be async, which means core needs to be async too.
- //gun.get('alice').get('age').trust(bob);
- if (Gun.is(user)) {
- user.get('pub').get((ctx, ev) => {
- console.log(ctx, ev)
- })
- }
- user.get('trust').get(path).put(theirPubkey);
- // do a lookup on this gun chain directly (that gets bob's copy of the data)
- // do a lookup on the metadata trust table for this path (that gets all the pubkeys allowed to write on this path)
- // do a lookup on each of those pubKeys ON the path (to get the collab data "layers")
- // THEN you perform Jachen's mix operation
- // and return the result of that to...
- }
- User.prototype.grant = function(to, cb){
- console.log("`.grant` API MAY BE DELETED OR CHANGED OR RENAMED, DO NOT USE!");
- var gun = this, user = gun.back(-1).user(), pair = user._.sea, path = '';
- gun.back(function(at){ if(at.is){ return } path += (at.get||'') });
- (async function(){
- var enc, sec = await user.get('grant').get(pair.pub).get(path).then();
- sec = await SEA.decrypt(sec, pair);
- if(!sec){
- sec = SEA.random(16).toString();
- enc = await SEA.encrypt(sec, pair);
- user.get('grant').get(pair.pub).get(path).put(enc);
- }
- var pub = to.get('pub').then();
- var epub = to.get('epub').then();
- pub = await pub; epub = await epub;
- var dh = await SEA.secret(epub, pair);
- enc = await SEA.encrypt(sec, dh);
- user.get('grant').get(pub).get(path).put(enc, cb);
- }());
- return gun;
- }
- User.prototype.secret = function(data, cb){
- console.log("`.secret` API MAY BE DELETED OR CHANGED OR RENAMED, DO NOT USE!");
- var gun = this, user = gun.back(-1).user(), pair = user.pair(), path = '';
- gun.back(function(at){ if(at.is){ return } path += (at.get||'') });
- (async function(){
- var enc, sec = await user.get('trust').get(pair.pub).get(path).then();
- sec = await SEA.decrypt(sec, pair);
- if(!sec){
- sec = SEA.random(16).toString();
- enc = await SEA.encrypt(sec, pair);
- user.get('trust').get(pair.pub).get(path).put(enc);
- }
- enc = await SEA.encrypt(data, sec);
- gun.put(enc, cb);
- }());
- return gun;
- }
- /**
- * returns the decrypted value, encrypted by secret
- * @returns {Promise<any>}
- // Mark needs to review 1st before officially supported
- User.prototype.decrypt = function(cb) {
- let gun = this,
- path = ''
- gun.back(function(at) {
- if (at.is) {
- return
- }
- path += at.get || ''
- })
- return gun
- .then(async data => {
- if (data == null) {
- return
- }
- const user = gun.back(-1).user()
- const pair = user.pair()
- let sec = await user
- .get('trust')
- .get(pair.pub)
- .get(path)
- sec = await SEA.decrypt(sec, pair)
- if (!sec) {
- return data
- }
- let decrypted = await SEA.decrypt(data, sec)
- return decrypted
- })
- .then(res => {
- cb && cb(res)
- return res
- })
- }
- */
- module.exports = User
- })(USE, './create');
- ;USE(function(module){
- var SEA = USE('./sea')
- var Gun = SEA.Gun;
- // After we have a GUN extension to make user registration/login easy, we then need to handle everything else.
- // We do this with a GUN adapter, we first listen to when a gun instance is created (and when its options change)
- Gun.on('opt', function(at){
- if(!at.sea){ // only add SEA once per instance, on the "at" context.
- at.sea = {own: {}};
- //at.on('in', security, at); // now listen to all input data, acting as a firewall.
- //at.on('out', signature, at); // and output listeners, to encrypt outgoing data.
- at.on('put', check, at);
- }
- this.to.next(at); // make sure to call the "next" middleware adapter.
- });
- // Alright, this next adapter gets run at the per node level in the graph database.
- // This will let us verify that every property on a node has a value signed by a public key we trust.
- // If the signature does not match, the data is just `undefined` so it doesn't get passed on.
- // If it does match, then we transform the in-memory "view" of the data into its plain value (without the signature).
- // Now NOTE! Some data is "system" data, not user data. Example: List of public keys, aliases, etc.
- // This data is self-enforced (the value can only match its ID), but that is handled in the `security` function.
- // From the self-enforced data, we can see all the edges in the graph that belong to a public key.
- // Example: ~ASDF is the ID of a node with ASDF as its public key, signed alias and salt, and
- // its encrypted private key, but it might also have other signed values on it like `profile = <ID>` edge.
- // Using that directed edge's ID, we can then track (in memory) which IDs belong to which keys.
- // Here is a problem: Multiple public keys can "claim" any node's ID, so this is dangerous!
- // This means we should ONLY trust our "friends" (our key ring) public keys, not any ones.
- // I have not yet added that to SEA yet in this alpha release. That is coming soon, but beware in the meanwhile!
- function each(msg){ // TODO: Warning: Need to switch to `gun.on('node')`! Do not use `Gun.on('node'` in your apps!
- // NOTE: THE SECURITY FUNCTION HAS ALREADY VERIFIED THE DATA!!!
- // WE DO NOT NEED TO RE-VERIFY AGAIN, JUST TRANSFORM IT TO PLAINTEXT.
- var to = this.to, vertex = (msg.$._).put, c = 0, d;
- Gun.node.is(msg.put, function(val, key, node){
- // only process if SEA formatted?
- var tmp = Gun.obj.ify(val) || noop;
- if(u !== tmp[':']){
- node[key] = SEA.opt.unpack(tmp);
- return;
- }
- if(!SEA.opt.check(val)){ return }
- c++; // for each property on the node
- SEA.verify(val, false, function(data){ c--; // false just extracts the plain data.
- node[key] = SEA.opt.unpack(data, key, node);; // transform to plain value.
- if(d && !c && (c = -1)){ to.next(msg) }
- });
- });
- if((d = true) && !c){ to.next(msg) }
- }
- // signature handles data output, it is a proxy to the security function.
- function signature(msg){
- if((msg._||noop).user){
- return this.to.next(msg);
- }
- var ctx = this.as;
- (msg._||(msg._=function(){})).user = ctx.user;
- security.call(this, msg);
- }
- var u;
- function check(msg){ // REVISE / IMPROVE, NO NEED TO PASS MSG/EVE EACH SUB?
- var eve = this, at = eve.as, put = msg.put, soul = put['#'], key = put['.'], val = put[':'], state = put['>'], id = msg['#'], tmp;
- if(!soul || !key){ return }
- if((msg._||'').faith && (at.opt||'').faith && 'function' == typeof msg._){
- SEA.verify(SEA.opt.pack(put), false, function(data){ // this is synchronous if false
- put['='] = SEA.opt.unpack(data);
- eve.to.next(msg);
- });
- return
- }
- var no = function(why){ at.on('in', {'@': id, err: why}) };
- //var no = function(why){ msg.ack(why) };
- (msg._||'').DBG && ((msg._||'').DBG.c = +new Date);
- if(0 <= soul.indexOf('<?')){ // special case for "do not sync data X old"
- // 'a~pub.key/b<?9'
- tmp = parseFloat(soul.split('<?')[1]||'');
- if(tmp && (state < (Gun.state() - (tmp * 1000)))){ // sec to ms
- (tmp = msg._) && (tmp = tmp.lot) && (tmp.more--); // THIS IS BAD CODE! It assumes GUN internals do something that will probably change in future, but hacking in now.
- return; // omit!
- }
- }
- if('~@' === soul){ // special case for shared system data, the list of aliases.
- check.alias(eve, msg, val, key, soul, at, no); return;
- }
- if('~@' === soul.slice(0,2)){ // special case for shared system data, the list of public keys for an alias.
- check.pubs(eve, msg, val, key, soul, at, no); return;
- }
- //if('~' === soul.slice(0,1) && 2 === (tmp = soul.slice(1)).split('.').length){ // special case, account data for a public key.
- if(tmp = SEA.opt.pub(soul)){ // special case, account data for a public key.
- check.pub(eve, msg, val, key, soul, at, no, at.user||'', tmp); return;
- }
- if(0 <= soul.indexOf('#')){ // special case for content addressing immutable hashed data.
- check.hash(eve, msg, val, key, soul, at, no); return;
- }
- check.any(eve, msg, val, key, soul, at, no, at.user||''); return;
- eve.to.next(msg); // not handled
- }
- check.hash = function(eve, msg, val, key, soul, at, no){
- SEA.work(val, null, function(data){
- if(data && data === key.split('#').slice(-1)[0]){ return eve.to.next(msg) }
- no("Data hash not same as hash!");
- }, {name: 'SHA-256'});
- }
- check.alias = function(eve, msg, val, key, soul, at, no){ // Example: {_:#~@, ~@alice: {#~@alice}}
- if(!val){ return no("Data must exist!") } // data MUST exist
- if('~@'+key === link_is(val)){ return eve.to.next(msg) } // in fact, it must be EXACTLY equal to itself
- no("Alias not same!"); // if it isn't, reject.
- };
- check.pubs = function(eve, msg, val, key, soul, at, no){ // Example: {_:#~@alice, ~asdf: {#~asdf}}
- if(!val){ return no("Alias must exist!") } // data MUST exist
- if(key === link_is(val)){ return eve.to.next(msg) } // and the ID must be EXACTLY equal to its property
- no("Alias not same!"); // that way nobody can tamper with the list of public keys.
- };
- check.pub = function(eve, msg, val, key, soul, at, no, user, pub){ var tmp; // Example: {_:#~asdf, hello:'world'~fdsa}}
- if('pub' === key && '~'+pub === soul){
- if(val === pub){ return eve.to.next(msg) } // the account MUST match `pub` property that equals the ID of the public key.
- return no("Account not same!");
- }
- if((tmp = user.is) && pub === tmp.pub){
- SEA.sign(SEA.opt.pack(msg.put), (user._).sea, function(data){
- if(u === data){ return no(SEA.err || 'Signature fail.') }
- if(tmp = link_is(val)){ (at.sea.own[tmp] = at.sea.own[tmp] || {})[pub] = 1 }
- msg.put[':'] = JSON.stringify({':': tmp = SEA.opt.unpack(data.m), '~': data.s});
- msg.put['='] = tmp;
- eve.to.next(msg);
- }, {raw: 1});
- return;
- }
- SEA.verify(SEA.opt.pack(msg.put), pub, function(data){ var tmp;
- data = SEA.opt.unpack(data);
- if(u === data){ return no("Unverified data.") } // make sure the signature matches the account it claims to be on. // reject any updates that are signed with a mismatched account.
- if((tmp = link_is(data)) && pub === SEA.opt.pub(tmp)){ (at.sea.own[tmp] = at.sea.own[tmp] || {})[pub] = 1 }
- msg.put['='] = data;
- eve.to.next(msg);
- });
- };
- check.any = function(eve, msg, val, key, soul, at, no, user){ var tmp, pub;
- if(at.opt.secure){ return no("Soul missing public key at '" + key + "'.") }
- // TODO: Ask community if should auto-sign non user-graph data.
- at.on('secure', function(msg){ this.off();
- if(!at.opt.secure){ return eve.to.next(msg) }
- no("Data cannot be changed.");
- }).on.on('secure', msg);
- return;
- }
- var link_is = Gun.val.link.is, state_ify = Gun.state.ify;
- // okay! The security function handles all the heavy lifting.
- // It needs to deal read and write of input and output of system data, account/public key data, and regular data.
- // This is broken down into some pretty clear edge cases, let's go over them:
- function security(msg){
- var at = this.as, sea = at.sea, to = this.to;
- if(at.opt.faith && (msg._||noop).faith){ // you probably shouldn't have faith in this!
- this.to.next(msg); // why do we allow skipping security? I'm very scared about it actually.
- return; // but so that way storage adapters that already verified something can get performance boost. This was a community requested feature. If anybody finds an exploit with it, please report immediately. It should only be exploitable if you have XSS control anyways, which if you do, you can bypass security regardless of this.
- }
- if(msg.get){
- // if there is a request to read data from us, then...
- var soul = msg.get['#'];
- if(soul){ // for now, only allow direct IDs to be read.
- if(typeof soul !== 'string'){ return to.next(msg) } // do not handle lexical cursors.
- if('alias' === soul){ // Allow reading the list of usernames/aliases in the system?
- return to.next(msg); // yes.
- } else
- if('~@' === soul.slice(0,2)){ // Allow reading the list of public keys associated with an alias?
- return to.next(msg); // yes.
- } else { // Allow reading everything?
- return to.next(msg); // yes // TODO: No! Make this a callback/event that people can filter on.
- }
- }
- }
- if(msg.put){
- /*
- NOTICE: THIS IS OLD AND GETTING DEPRECATED.
- ANY SECURITY CHANGES SHOULD HAPPEN ABOVE FIRST
- THEN PORTED TO HERE.
- */
- // potentially parallel async operations!!!
- var check = {}, each = {}, u;
- each.node = function(node, soul){
- if(Gun.obj.empty(node, '_')){ return check['node'+soul] = 0 } // ignore empty updates, don't reject them.
- Gun.obj.map(node, each.way, {soul: soul, node: node});
- };
- each.way = function(val, key){
- var soul = this.soul, node = this.node, tmp;
- if('_' === key){ return } // ignore meta data
- if('~@' === soul){ // special case for shared system data, the list of aliases.
- each.alias(val, key, node, soul); return;
- }
- if('~@' === soul.slice(0,2)){ // special case for shared system data, the list of public keys for an alias.
- each.pubs(val, key, node, soul); return;
- }
- if('~' === soul.slice(0,1) && 2 === (tmp = soul.slice(1)).split('.').length){ // special case, account data for a public key.
- each.pub(val, key, node, soul, tmp, (msg._||noop).user); return;
- }
- each.any(val, key, node, soul, (msg._||noop).user); return;
- return each.end({err: "No other data allowed!"});
- };
- each.alias = function(val, key, node, soul){ // Example: {_:#~@, ~@alice: {#~@alice}}
- if(!val){ return each.end({err: "Data must exist!"}) } // data MUST exist
- if('~@'+key === Gun.val.link.is(val)){ return check['alias'+key] = 0 } // in fact, it must be EXACTLY equal to itself
- each.end({err: "Mismatching alias."}); // if it isn't, reject.
- };
- each.pubs = function(val, key, node, soul){ // Example: {_:#~@alice, ~asdf: {#~asdf}}
- if(!val){ return each.end({err: "Alias must exist!"}) } // data MUST exist
- if(key === Gun.val.link.is(val)){ return check['pubs'+soul+key] = 0 } // and the ID must be EXACTLY equal to its property
- each.end({err: "Alias must match!"}); // that way nobody can tamper with the list of public keys.
- };
- each.pub = function(val, key, node, soul, pub, user){ var tmp; // Example: {_:#~asdf, hello:'world'~fdsa}}
- if('pub' === key){
- if(val === pub){ return (check['pub'+soul+key] = 0) } // the account MUST match `pub` property that equals the ID of the public key.
- return each.end({err: "Account must match!"});
- }
- check['user'+soul+key] = 1;
- if(Gun.is(msg.$) && user && user.is && pub === user.is.pub){
- SEA.sign(SEA.opt.prep(tmp = SEA.opt.parse(val), key, node, soul), (user._).sea, function(data){ var rel;
- if(u === data){ return each.end({err: SEA.err || 'Pub signature fail.'}) }
- if(rel = Gun.val.link.is(val)){
- (at.sea.own[rel] = at.sea.own[rel] || {})[pub] = true;
- }
- node[key] = JSON.stringify({':': SEA.opt.unpack(data.m), '~': data.s});
- check['user'+soul+key] = 0;
- each.end({ok: 1});
- }, {check: SEA.opt.pack(tmp, key, node, soul), raw: 1});
- return;
- }
- SEA.verify(SEA.opt.pack(val,key,node,soul), pub, function(data){ var rel, tmp;
- data = SEA.opt.unpack(data, key, node);
- if(u === data){ // make sure the signature matches the account it claims to be on.
- return each.end({err: "Unverified data."}); // reject any updates that are signed with a mismatched account.
- }
- if((rel = Gun.val.link.is(data)) && pub === SEA.opt.pub(rel)){
- (at.sea.own[rel] = at.sea.own[rel] || {})[pub] = true;
- }
- check['user'+soul+key] = 0;
- each.end({ok: 1});
- });
- };
- each.any = function(val, key, node, soul, user){ var tmp, pub;
- if(!(pub = SEA.opt.pub(soul))){
- if(at.opt.secure){
- each.end({err: "Soul is missing public key at '" + key + "'."});
- return;
- }
- // TODO: Ask community if should auto-sign non user-graph data.
- check['any'+soul+key] = 1;
- at.on('secure', function(msg){ this.off();
- check['any'+soul+key] = 0;
- if(at.opt.secure){ msg = null }
- each.end(msg || {err: "Data cannot be modified."});
- }).on.on('secure', msg);
- //each.end({err: "Data cannot be modified."});
- return;
- }
- if(Gun.is(msg.$) && user && user.is && pub === user.is.pub){
- /*var other = Gun.obj.map(at.sea.own[soul], function(v, p){
- if((user.is||{}).pub !== p){ return p }
- });
- if(other){
- each.any(val, key, node, soul);
- return;
- }*/
- check['any'+soul+key] = 1;
- SEA.sign(SEA.opt.prep(tmp = SEA.opt.parse(val), key, node, soul), (user._).sea, function(data){
- if(u === data){ return each.end({err: 'My signature fail.'}) }
- node[key] = JSON.stringify({':': SEA.opt.unpack(data.m), '~': data.s});
- check['any'+soul+key] = 0;
- each.end({ok: 1});
- }, {check: SEA.opt.pack(tmp, key, node, soul), raw: 1});
- return;
- }
- check['any'+soul+key] = 1;
- SEA.verify(SEA.opt.pack(val,key,node,soul), pub, function(data){ var rel;
- data = SEA.opt.unpack(data, key, node);
- if(u === data){ return each.end({err: "Mismatched owner on '" + key + "'."}) } // thanks @rogowski !
- if((rel = Gun.val.link.is(data)) && pub === SEA.opt.pub(rel)){
- (at.sea.own[rel] = at.sea.own[rel] || {})[pub] = true;
- }
- check['any'+soul+key] = 0;
- each.end({ok: 1});
- });
- }
- each.end = function(ctx){ // TODO: Can't you just switch this to each.end = cb?
- if(each.err){ return }
- if((each.err = ctx.err) || ctx.no){
- console.log('NO!', each.err, msg.put); // 451 mistmached data FOR MARTTI
- return;
- }
- if(!each.end.ed){ return }
- if(Gun.obj.map(check, function(no){
- if(no){ return true }
- })){ return }
- (msg._||{}).user = at.user || security; // already been through firewall, does not need to again on out.
- to.next(msg);
- };
- Gun.obj.map(msg.put, each.node);
- each.end({end: each.end.ed = true});
- return; // need to manually call next after async.
- }
- to.next(msg); // pass forward any data we do not know how to handle or process (this allows custom security protocols).
- }
- var pubcut = /[^\w_-]/; // anything not alphanumeric or _ -
- SEA.opt.pub = function(s){
- if(!s){ return }
- s = s.split('~');
- if(!s || !(s = s[1])){ return }
- s = s.split(pubcut).slice(0,2);
- if(!s || 2 != s.length){ return }
- if('@' === (s[0]||'')[0]){ return }
- s = s.slice(0,2).join('.');
- return s;
- }
- SEA.opt.prep = function(d,k, n,s){ // prep for signing
- return {'#':s,'.':k,':':SEA.opt.parse(d),'>':Gun.state.is(n, k)};
- }
- SEA.opt.pack = function(d,k, n,s){ // pack for verifying
- if(SEA.opt.check(d)){ return d }
- var meta = (Gun.obj.ify((d && d[':'])||d)||''), sig = meta['~'];
- return sig? {m: {'#':s||d['#'],'.':k||d['.'],':':meta[':'],'>':d['>']||Gun.state.is(n, k)}, s: sig} : d;
- }
- var O = SEA.opt;
- SEA.opt.unpack = function(d, k, n){ var tmp;
- if(u === d){ return }
- if(d && (u !== (tmp = d[':']))){ return tmp }
- k = k || O.fall_key; if(!n && O.fall_val){ n = {}; n[k] = O.fall_val }
- if(!k || !n){ return }
- if(d === n[k]){ return d }
- if(!SEA.opt.check(n[k])){ return d }
- var soul = Gun.node.soul(n) || O.fall_soul, s = Gun.state.is(n, k) || O.fall_state;
- if(d && 4 === d.length && soul === d[0] && k === d[1] && fl(s) === fl(d[3])){
- return d[2];
- }
- if(s < SEA.opt.shuffle_attack){
- return d;
- }
- }
- SEA.opt.shuffle_attack = 1546329600000; // Jan 1, 2019
- var noop = function(){}, u;
- var fl = Math.floor; // TODO: Still need to fix inconsistent state issue.
- var rel_is = Gun.val.rel.is;
- var obj_ify = Gun.obj.ify;
- // TODO: Potential bug? If pub/priv key starts with `-`? IDK how possible.
- })(USE, './index');
- }());
|