Files
rspade_system/app/RSpade/resource/DebugProxy/src/http/auth.ts
root f6fac6c4bc Fix bin/publish: copy docs.dist from project root
Fix bin/publish: use correct .env path for rspade_system
Fix bin/publish script: prevent grep exit code 1 from terminating script

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-21 02:08:33 +00:00

142 lines
4.9 KiB
TypeScript
Executable File

import * as fs from 'fs/promises';
import * as crypto from 'crypto';
import * as path from 'path';
import { Request, Response, NextFunction } from 'express';
import { Logger } from '../utils/logger';
import { Config } from '../utils/config';
interface AuthSession {
client_key: string;
server_key: string;
created_at: number;
workspace_path: string;
}
export class AuthValidator {
private logger: Logger;
private sessionsCache: Map<string, AuthSession> = new Map();
constructor() {
this.logger = new Logger('AuthValidator');
}
public async validateWebSocketAuth(sessionId: string, signature: string): Promise<boolean> {
try {
const session = await this.loadSession(sessionId);
if (!session) {
this.logger.warn(`Session not found: ${sessionId}`);
return false;
}
// For WebSocket, we'll validate a simple signature
// In production, this should include timestamp and nonce
const expectedSignature = crypto
.createHmac('sha256', session.server_key)
.update(sessionId)
.digest('hex');
return signature === expectedSignature;
} catch (error) {
this.logger.error('WebSocket auth validation failed:', error);
return false;
}
}
public authMiddleware() {
return async (req: Request, res: Response, next: NextFunction) => {
const sessionId = req.headers['x-session-id'] as string;
const signature = req.headers['x-auth-signature'] as string;
const timestamp = req.headers['x-timestamp'] as string;
if (!sessionId || !signature || !timestamp) {
res.status(401).json({
error: 'Missing authentication headers',
code: 401
});
return;
}
try {
const session = await this.loadSession(sessionId);
if (!session) {
res.status(401).json({
error: 'Session not found',
code: 401,
recoverable: true,
recovery: 'Create new session via POST /_ide/service/auth/create'
});
return;
}
// Validate signature
const method = req.method;
const path = req.path;
const body = JSON.stringify(req.body || {});
const signatureBase = `${method}\n${path}\n${timestamp}\n${body}`;
const expectedSignature = crypto
.createHmac('sha256', session.server_key)
.update(signatureBase)
.digest('hex');
if (signature !== expectedSignature) {
this.logger.warn('Invalid signature for session:', sessionId);
res.status(401).json({
error: 'Invalid signature',
code: 401
});
return;
}
// Check timestamp to prevent replay attacks (5 minute window)
const requestTime = parseInt(timestamp, 10);
const currentTime = Math.floor(Date.now() / 1000);
if (Math.abs(currentTime - requestTime) > 300) {
res.status(401).json({
error: 'Request timestamp expired',
code: 401
});
return;
}
// Attach session to request for use in routes
(req as any).session = session;
(req as any).sessionId = sessionId;
next();
} catch (error) {
this.logger.error('Auth middleware error:', error);
res.status(500).json({
error: 'Authentication error',
code: 500
});
}
};
}
private async loadSession(sessionId: string): Promise<AuthSession | null> {
// Check cache first
if (this.sessionsCache.has(sessionId)) {
return this.sessionsCache.get(sessionId)!;
}
try {
const sessionPath = path.join(Config.AUTH_SESSION_PATH, `auth-${sessionId}.json`);
const data = await fs.readFile(sessionPath, 'utf8');
const session = JSON.parse(data) as AuthSession;
// Cache the session
this.sessionsCache.set(sessionId, session);
return session;
} catch (error) {
if ((error as any).code === 'ENOENT') {
return null; // Session file doesn't exist
}
throw error;
}
}
public clearCache(): void {
this.sessionsCache.clear();
}
}