|
| 1 | +import { Hono } from 'hono'; |
| 2 | +import { setCookie } from 'hono/cookie'; |
| 3 | +import type { HonoEnv } from '../env'; |
| 4 | +import { createDb } from '../db/connection'; |
| 5 | +import { SystemStorage } from '../storage/system'; |
| 6 | +import { SESSION_COOKIE_NAME, SESSION_TTL } from '../lib/session'; |
| 7 | +import { generateOAuthState, validateOAuthState } from '../lib/oauth-state-edge'; |
| 8 | + |
| 9 | +const CHITTYAUTH_BASE = 'https://auth.chitty.cc'; |
| 10 | + |
| 11 | +function generateSessionId(): string { |
| 12 | + const bytes = new Uint8Array(32); |
| 13 | + crypto.getRandomValues(bytes); |
| 14 | + return Array.from(bytes, (b) => b.toString(16).padStart(2, '0')).join(''); |
| 15 | +} |
| 16 | + |
| 17 | +/** Generate PKCE code_verifier + code_challenge (S256) */ |
| 18 | +async function generatePKCE(): Promise<{ verifier: string; challenge: string }> { |
| 19 | + const bytes = new Uint8Array(32); |
| 20 | + crypto.getRandomValues(bytes); |
| 21 | + const verifier = btoa(String.fromCharCode(...bytes)) |
| 22 | + .replace(/\+/g, '-').replace(/\//g, '_').replace(/=+$/, ''); |
| 23 | + const digest = await crypto.subtle.digest('SHA-256', new TextEncoder().encode(verifier)); |
| 24 | + const challenge = btoa(String.fromCharCode(...new Uint8Array(digest))) |
| 25 | + .replace(/\+/g, '-').replace(/\//g, '_').replace(/=+$/, ''); |
| 26 | + return { verifier, challenge }; |
| 27 | +} |
| 28 | + |
| 29 | +export const chittyIdAuthRoutes = new Hono<HonoEnv>(); |
| 30 | + |
| 31 | +// GET /api/auth/chittyid/authorize — start OAuth flow |
| 32 | +chittyIdAuthRoutes.get('/api/auth/chittyid/authorize', async (c) => { |
| 33 | + const clientId = c.env.CHITTYAUTH_CLIENT_ID; |
| 34 | + const stateSecret = c.env.OAUTH_STATE_SECRET; |
| 35 | + |
| 36 | + if (!clientId || !stateSecret) { |
| 37 | + return c.json({ error: 'ChittyID SSO not configured' }, 503); |
| 38 | + } |
| 39 | + |
| 40 | + const baseUrl = c.env.PUBLIC_APP_BASE_URL || new URL(c.req.url).origin; |
| 41 | + const redirectUri = `${baseUrl}/api/auth/chittyid/callback`; |
| 42 | + |
| 43 | + // Generate PKCE pair and state token |
| 44 | + const { verifier, challenge } = await generatePKCE(); |
| 45 | + const state = await generateOAuthState('chittyid-login', stateSecret); |
| 46 | + |
| 47 | + // Store verifier in KV (keyed by state) for callback retrieval |
| 48 | + const kv = c.env.FINANCE_KV; |
| 49 | + await kv.put(`pkce:${state}`, verifier, { expirationTtl: 600 }); // 10 min TTL |
| 50 | + |
| 51 | + const params = new URLSearchParams({ |
| 52 | + response_type: 'code', |
| 53 | + client_id: clientId, |
| 54 | + redirect_uri: redirectUri, |
| 55 | + state, |
| 56 | + code_challenge: challenge, |
| 57 | + code_challenge_method: 'S256', |
| 58 | + scope: 'chittyid:read', |
| 59 | + }); |
| 60 | + |
| 61 | + return c.redirect(`${CHITTYAUTH_BASE}/v1/oauth/authorize?${params}`); |
| 62 | +}); |
| 63 | + |
| 64 | +// GET /api/auth/chittyid/callback — handle OAuth callback |
| 65 | +chittyIdAuthRoutes.get('/api/auth/chittyid/callback', async (c) => { |
| 66 | + const code = c.req.query('code'); |
| 67 | + const state = c.req.query('state'); |
| 68 | + const error = c.req.query('error'); |
| 69 | + |
| 70 | + if (error) { |
| 71 | + return c.redirect(`/login?error=${encodeURIComponent(error)}`); |
| 72 | + } |
| 73 | + |
| 74 | + if (!code || !state) { |
| 75 | + return c.redirect('/login?error=missing_params'); |
| 76 | + } |
| 77 | + |
| 78 | + const stateSecret = c.env.OAUTH_STATE_SECRET; |
| 79 | + if (!stateSecret) { |
| 80 | + return c.redirect('/login?error=server_config'); |
| 81 | + } |
| 82 | + |
| 83 | + // Validate CSRF state token |
| 84 | + const stateData = await validateOAuthState(state, stateSecret); |
| 85 | + if (!stateData) { |
| 86 | + return c.redirect('/login?error=invalid_state'); |
| 87 | + } |
| 88 | + |
| 89 | + // Retrieve PKCE verifier |
| 90 | + const kv = c.env.FINANCE_KV; |
| 91 | + const verifier = await kv.get(`pkce:${state}`); |
| 92 | + await kv.delete(`pkce:${state}`); |
| 93 | + if (!verifier) { |
| 94 | + return c.redirect('/login?error=expired_session'); |
| 95 | + } |
| 96 | + |
| 97 | + const clientId = c.env.CHITTYAUTH_CLIENT_ID!; |
| 98 | + const clientSecret = c.env.CHITTYAUTH_CLIENT_SECRET; |
| 99 | + const baseUrl = c.env.PUBLIC_APP_BASE_URL || new URL(c.req.url).origin; |
| 100 | + const redirectUri = `${baseUrl}/api/auth/chittyid/callback`; |
| 101 | + |
| 102 | + // Exchange code for tokens |
| 103 | + const tokenBody: Record<string, string> = { |
| 104 | + grant_type: 'authorization_code', |
| 105 | + code, |
| 106 | + redirect_uri: redirectUri, |
| 107 | + client_id: clientId, |
| 108 | + code_verifier: verifier, |
| 109 | + }; |
| 110 | + if (clientSecret) { |
| 111 | + tokenBody.client_secret = clientSecret; |
| 112 | + } |
| 113 | + |
| 114 | + let tokenData: { access_token?: string; token_type?: string; error?: string; sub?: string; chitty_id?: string; email?: string }; |
| 115 | + try { |
| 116 | + const tokenRes = await fetch(`${CHITTYAUTH_BASE}/v1/oauth/token`, { |
| 117 | + method: 'POST', |
| 118 | + headers: { 'Content-Type': 'application/x-www-form-urlencoded' }, |
| 119 | + body: new URLSearchParams(tokenBody), |
| 120 | + }); |
| 121 | + tokenData = await tokenRes.json() as typeof tokenData; |
| 122 | + if (!tokenRes.ok || tokenData.error) { |
| 123 | + console.error('[chittyid-auth] Token exchange failed:', tokenData); |
| 124 | + return c.redirect(`/login?error=token_exchange`); |
| 125 | + } |
| 126 | + } catch (err) { |
| 127 | + console.error('[chittyid-auth] Token exchange error:', err); |
| 128 | + return c.redirect('/login?error=auth_unavailable'); |
| 129 | + } |
| 130 | + |
| 131 | + // Extract identity from token response |
| 132 | + const chittyId = tokenData.chitty_id || tokenData.sub; |
| 133 | + const email = tokenData.email; |
| 134 | + |
| 135 | + if (!chittyId) { |
| 136 | + console.error('[chittyid-auth] No chitty_id in token response'); |
| 137 | + return c.redirect('/login?error=no_identity'); |
| 138 | + } |
| 139 | + |
| 140 | + // Resolve or provision local user |
| 141 | + const db = createDb(c.env.DATABASE_URL); |
| 142 | + const storage = new SystemStorage(db); |
| 143 | + |
| 144 | + // 1. Look up by ChittyID |
| 145 | + let user = await storage.getUserByChittyId(chittyId); |
| 146 | + |
| 147 | + // 2. Fall back to email match + link ChittyID |
| 148 | + if (!user && email) { |
| 149 | + user = await storage.getUserByEmail(email.toLowerCase()); |
| 150 | + if (user && !user.chittyId) { |
| 151 | + await storage.linkChittyId(user.id, chittyId); |
| 152 | + } |
| 153 | + } |
| 154 | + |
| 155 | + if (!user) { |
| 156 | + return c.redirect('/login?error=no_account'); |
| 157 | + } |
| 158 | + |
| 159 | + if (!user.isActive) { |
| 160 | + return c.redirect('/login?error=account_disabled'); |
| 161 | + } |
| 162 | + |
| 163 | + // Create session (same path as password login) |
| 164 | + const sessionId = generateSessionId(); |
| 165 | + await kv.put(`session:${sessionId}`, JSON.stringify({ userId: user.id }), { |
| 166 | + expirationTtl: SESSION_TTL, |
| 167 | + }); |
| 168 | + |
| 169 | + setCookie(c, SESSION_COOKIE_NAME, sessionId, { |
| 170 | + path: '/', |
| 171 | + httpOnly: true, |
| 172 | + secure: new URL(c.req.url).protocol === 'https:', |
| 173 | + sameSite: 'Lax', |
| 174 | + maxAge: SESSION_TTL, |
| 175 | + }); |
| 176 | + |
| 177 | + return c.redirect('/'); |
| 178 | +}); |
0 commit comments