com.yubico.webauthn.data.PublicKeyCredentialCreationOptions Maven / Gradle / Ivy
Show all versions of webauthn-server-core Show documentation
// Copyright (c) 2018, Yubico AB
// All rights reserved.
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions are met:
//
// 1. Redistributions of source code must retain the above copyright notice, this
// list of conditions and the following disclaimer.
//
// 2. Redistributions in binary form must reproduce the above copyright notice,
// this list of conditions and the following disclaimer in the documentation
// and/or other materials provided with the distribution.
//
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
// AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
// DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
// FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
// DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
// SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
// CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
// OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
package com.yubico.webauthn.data;
import com.fasterxml.jackson.annotation.JsonCreator;
import com.fasterxml.jackson.annotation.JsonProperty;
import com.fasterxml.jackson.core.JsonProcessingException;
import com.fasterxml.jackson.databind.ObjectMapper;
import com.fasterxml.jackson.databind.node.ObjectNode;
import com.yubico.internal.util.CollectionUtil;
import com.yubico.internal.util.JacksonCodecs;
import com.yubico.webauthn.FinishRegistrationOptions;
import com.yubico.webauthn.RelyingParty;
import java.security.KeyFactory;
import java.security.NoSuchAlgorithmException;
import java.security.Signature;
import java.util.Collections;
import java.util.List;
import java.util.Optional;
import java.util.Set;
import java.util.TreeSet;
import java.util.stream.Collectors;
import lombok.Builder;
import lombok.NonNull;
import lombok.Value;
import lombok.extern.slf4j.Slf4j;
/**
* Parameters for a call to navigator.credentials.create()
.
*
* @see §5.4.
* Options for Credential Creation (dictionary PublicKeyCredentialCreationOptions)
*/
@Slf4j
@Value
@Builder(toBuilder = true)
public class PublicKeyCredentialCreationOptions {
/**
* Contains data about the Relying Party responsible for the request.
*
* Its value's {@link RelyingPartyIdentity#getId() id} member specifies the RP ID the credential
* should be scoped to. If omitted, its value will be set by the client. See {@link
* RelyingPartyIdentity} for further details.
*/
@NonNull private final RelyingPartyIdentity rp;
/** Contains data about the user account for which the Relying Party is requesting attestation. */
@NonNull private final UserIdentity user;
/**
* A challenge intended to be used for generating the newly created credential’s attestation
* object. See the §13.1
* Cryptographic Challenges security consideration.
*/
@NonNull private final ByteArray challenge;
/**
* Information about the desired properties of the credential to be created.
*
*
The sequence is ordered from most preferred to least preferred. The client makes a
* best-effort to create the most preferred credential that it can.
*/
@NonNull private final List pubKeyCredParams;
/**
* A time, in milliseconds, that the caller is willing to wait for the call to complete. This is
* treated as a hint, and MAY be overridden by the client.
*/
private final Long timeout;
/**
* Intended for use by Relying Parties that wish to limit the creation of multiple credentials for
* the same account on a single authenticator. The client is requested to return an error if the
* new credential would be created on an authenticator that also contains one of the credentials
* enumerated in this parameter.
*/
private final Set excludeCredentials;
/**
* Intended for use by Relying Parties that wish to select the appropriate authenticators to
* participate in the create() operation.
*/
private final AuthenticatorSelectionCriteria authenticatorSelection;
/**
* Intended for use by Relying Parties that wish to express their preference for attestation
* conveyance. The default is {@link AttestationConveyancePreference#NONE}.
*/
@NonNull private final AttestationConveyancePreference attestation;
/**
* Additional parameters requesting additional processing by the client and authenticator.
*
* For example, the caller may request that only authenticators with certain capabilities be
* used to create the credential, or that particular information be returned in the attestation
* object. Some extensions are defined in §9 WebAuthn
* Extensions; consult the IANA "WebAuthn Extension Identifier" registry established by [WebAuthn-Registries]
* for an up-to-date list of registered WebAuthn Extensions.
*/
@NonNull private final RegistrationExtensionInputs extensions;
@Builder
@JsonCreator
private PublicKeyCredentialCreationOptions(
@NonNull @JsonProperty("rp") RelyingPartyIdentity rp,
@NonNull @JsonProperty("user") UserIdentity user,
@NonNull @JsonProperty("challenge") ByteArray challenge,
@NonNull @JsonProperty("pubKeyCredParams")
List pubKeyCredParams,
@JsonProperty("timeout") Long timeout,
@JsonProperty("excludeCredentials") Set excludeCredentials,
@JsonProperty("authenticatorSelection") AuthenticatorSelectionCriteria authenticatorSelection,
@JsonProperty("attestation") AttestationConveyancePreference attestation,
@JsonProperty("extensions") RegistrationExtensionInputs extensions) {
this.rp = rp;
this.user = user;
this.challenge = challenge;
this.pubKeyCredParams = filterAvailableAlgorithms(pubKeyCredParams);
this.timeout = timeout;
this.excludeCredentials =
excludeCredentials == null
? null
: CollectionUtil.immutableSortedSet(new TreeSet<>(excludeCredentials));
this.authenticatorSelection = authenticatorSelection;
this.attestation = attestation == null ? AttestationConveyancePreference.NONE : attestation;
this.extensions =
extensions == null ? RegistrationExtensionInputs.builder().build() : extensions;
}
/**
* Serialize this {@link PublicKeyCredentialCreationOptions} value to JSON suitable for sending to
* the client.
*
* Any {@link ByteArray} values in this data structure will be {@link ByteArray#getBase64Url()
* Base64Url} encoded. Those values MUST be decoded into BufferSource
values (such as
* Uint8Array
) on the client side before calling navigator.credentials.create()
*
.
*
*
After decoding binary values, the resulting JavaScript object is suitable for passing as an
* argument to navigator.credentials.create()
.
*
* @return a JSON value suitable for sending to the client and passing as an argument to
* navigator.credentials.create()
, after decoding binary options from Base64Url
* strings.
* @throws JsonProcessingException if JSON serialization fails.
*/
public String toCredentialsCreateJson() throws JsonProcessingException {
ObjectMapper json = JacksonCodecs.json();
ObjectNode result = json.createObjectNode();
result.set("publicKey", json.valueToTree(this));
return json.writeValueAsString(result);
}
/**
* Encode this {@link PublicKeyCredentialCreationOptions} to JSON. The inverse of {@link
* #fromJson(String)}.
*
*
This method is suitable for encoding the {@link PublicKeyCredentialCreationOptions} for
* temporary storage so that it can later be passed as an argument to {@link
* RelyingParty#finishRegistration(FinishRegistrationOptions)}. The {@link #fromJson(String)}
* factory function is guaranteed to restore an identical {@link
* PublicKeyCredentialCreationOptions} instance.
*
*
Note that encoding might not be needed if you can simply keep the {@link
* PublicKeyCredentialCreationOptions} instance in server memory.
*
* @return this {@link PublicKeyCredentialCreationOptions} encoded to JSON.
* @throws JsonProcessingException
*/
public String toJson() throws JsonProcessingException {
return JacksonCodecs.json().writeValueAsString(this);
}
/**
* Decode a {@link PublicKeyCredentialCreationOptions} from JSON. The inverse of {@link
* #toJson()}.
*
*
If the JSON was generated by the {@link #toJson()} method, then {@link #fromJson(String)} in
* the same library version guarantees to restore an identical {@link
* PublicKeyCredentialCreationOptions} instance. This is not guaranteed between different library
* versions.
*
* @return a {@link PublicKeyCredentialCreationOptions} decoded from the input JSON.
* @throws JsonProcessingException
*/
public static PublicKeyCredentialCreationOptions fromJson(String json)
throws JsonProcessingException {
return JacksonCodecs.json().readValue(json, PublicKeyCredentialCreationOptions.class);
}
public Optional getTimeout() {
return Optional.ofNullable(timeout);
}
public Optional> getExcludeCredentials() {
return Optional.ofNullable(excludeCredentials);
}
public Optional getAuthenticatorSelection() {
return Optional.ofNullable(authenticatorSelection);
}
public static PublicKeyCredentialCreationOptionsBuilder.MandatoryStages builder() {
return new PublicKeyCredentialCreationOptionsBuilder.MandatoryStages();
}
public static class PublicKeyCredentialCreationOptionsBuilder {
private Long timeout = null;
private Set excludeCredentials = null;
private AuthenticatorSelectionCriteria authenticatorSelection = null;
public static class MandatoryStages {
private final PublicKeyCredentialCreationOptionsBuilder builder =
new PublicKeyCredentialCreationOptionsBuilder();
/**
* {@link PublicKeyCredentialCreationOptionsBuilder#rp(RelyingPartyIdentity) rp} is a required
* parameter.
*
* @see PublicKeyCredentialCreationOptionsBuilder#rp(RelyingPartyIdentity)
*/
public Step2 rp(RelyingPartyIdentity rp) {
builder.rp(rp);
return new Step2();
}
public class Step2 {
/**
* {@link PublicKeyCredentialCreationOptionsBuilder#user(UserIdentity) user} is a required
* parameter.
*
* @see PublicKeyCredentialCreationOptionsBuilder#user(UserIdentity)
*/
public Step3 user(UserIdentity user) {
builder.user(user);
return new Step3();
}
}
public class Step3 {
/**
* {@link PublicKeyCredentialCreationOptionsBuilder#challenge(ByteArray) challenge} is a
* required parameter.
*
* @see PublicKeyCredentialCreationOptionsBuilder#challenge(ByteArray)
*/
public Step4 challenge(ByteArray challenge) {
builder.challenge(challenge);
return new Step4();
}
}
public class Step4 {
/**
* {@link PublicKeyCredentialCreationOptionsBuilder#pubKeyCredParams(List) pubKeyCredParams}
* is a required parameter.
*
* @see PublicKeyCredentialCreationOptionsBuilder#pubKeyCredParams(List)
*/
public PublicKeyCredentialCreationOptionsBuilder pubKeyCredParams(
List pubKeyCredParams) {
return builder.pubKeyCredParams(pubKeyCredParams);
}
}
}
/**
* A time, in milliseconds, that the caller is willing to wait for the call to complete. This is
* treated as a hint, and MAY be overridden by the client.
*/
public PublicKeyCredentialCreationOptionsBuilder timeout(@NonNull Optional timeout) {
this.timeout = timeout.orElse(null);
return this;
}
/*
* Workaround, see: https://github.com/rzwitserloot/lombok/issues/2623#issuecomment-714816001
* Consider reverting this workaround if Lombok fixes that issue.
*/
private PublicKeyCredentialCreationOptionsBuilder timeout(Long timeout) {
return this.timeout(Optional.ofNullable(timeout));
}
/**
* A time, in milliseconds, that the caller is willing to wait for the call to complete. This is
* treated as a hint, and MAY be overridden by the client.
*/
public PublicKeyCredentialCreationOptionsBuilder timeout(long timeout) {
return this.timeout(Optional.of(timeout));
}
/**
* Intended for use by Relying Parties that wish to limit the creation of multiple credentials
* for the same account on a single authenticator. The client is requested to return an error if
* the new credential would be created on an authenticator that also contains one of the
* credentials enumerated in this parameter.
*/
public PublicKeyCredentialCreationOptionsBuilder excludeCredentials(
Optional> excludeCredentials) {
return this.excludeCredentials(excludeCredentials.orElse(null));
}
/**
* Intended for use by Relying Parties that wish to limit the creation of multiple credentials
* for the same account on a single authenticator. The client is requested to return an error if
* the new credential would be created on an authenticator that also contains one of the
* credentials enumerated in this parameter.
*/
public PublicKeyCredentialCreationOptionsBuilder excludeCredentials(
Set excludeCredentials) {
this.excludeCredentials = excludeCredentials;
return this;
}
/**
* Intended for use by Relying Parties that wish to select the appropriate authenticators to
* participate in the create() operation.
*/
public PublicKeyCredentialCreationOptionsBuilder authenticatorSelection(
@NonNull Optional authenticatorSelection) {
return this.authenticatorSelection(authenticatorSelection.orElse(null));
}
/**
* Intended for use by Relying Parties that wish to select the appropriate authenticators to
* participate in the create() operation.
*/
public PublicKeyCredentialCreationOptionsBuilder authenticatorSelection(
AuthenticatorSelectionCriteria authenticatorSelection) {
this.authenticatorSelection = authenticatorSelection;
return this;
}
}
/*
* Essentially a copy of RelyingParty.filterAvailableAlgorithms(List) because that method and WebAuthnCodecs are not visible here.
*/
private static List filterAvailableAlgorithms(
List pubKeyCredParams) {
return Collections.unmodifiableList(
pubKeyCredParams.stream()
.filter(
param -> {
try {
switch (param.getAlg()) {
case EdDSA:
KeyFactory.getInstance("EdDSA");
break;
case ES256:
case ES384:
case ES512:
KeyFactory.getInstance("EC");
break;
case RS256:
case RS384:
case RS512:
case RS1:
KeyFactory.getInstance("RSA");
break;
default:
log.warn(
"Unknown algorithm: {}. Please file a bug report.", param.getAlg());
}
} catch (NoSuchAlgorithmException e) {
log.warn(
"Unsupported algorithm in PublicKeyCredentialCreationOptions.pubKeyCredParams: {}. No KeyFactory available; registrations with this key algorithm will fail. You may need to add a dependency and load a provider using java.security.Security.addProvider().",
param.getAlg());
return false;
}
try {
switch (param.getAlg()) {
case EdDSA:
Signature.getInstance("EDDSA");
break;
case ES256:
Signature.getInstance("SHA256withECDSA");
break;
case ES384:
Signature.getInstance("SHA384withECDSA");
break;
case ES512:
Signature.getInstance("SHA512withECDSA");
break;
case RS256:
Signature.getInstance("SHA256withRSA");
break;
case RS384:
Signature.getInstance("SHA384withRSA");
break;
case RS512:
Signature.getInstance("SHA512withRSA");
break;
case RS1:
Signature.getInstance("SHA1withRSA");
break;
default:
log.warn(
"Unknown algorithm: {}. Please file a bug report.", param.getAlg());
}
} catch (NoSuchAlgorithmException e) {
log.warn(
"Unsupported algorithm in PublicKeyCredentialCreationOptions.pubKeyCredParams: {}. No Signature available; registrations with this key algorithm will fail. You may need to add a dependency and load a provider using java.security.Security.addProvider().",
param.getAlg());
return false;
}
return true;
})
.collect(Collectors.toList()));
}
}