Compare commits
No commits in common. "173976491374cc6619c9c88e0172015eb170c657" and "4362e8527e888ccb93cf3b5ab12e99eb099d91d3" have entirely different histories.
1739764913
...
4362e8527e
2
.gitignore
vendored
2
.gitignore
vendored
@ -3,5 +3,5 @@ dist/
|
|||||||
.*
|
.*
|
||||||
!.gitignore
|
!.gitignore
|
||||||
*.lock
|
*.lock
|
||||||
passkey-auth.sqlite
|
*.db
|
||||||
/passkey/frontend-build
|
/passkey/frontend-build
|
||||||
|
67
authsession.py
Normal file
67
authsession.py
Normal file
@ -0,0 +1,67 @@
|
|||||||
|
"""
|
||||||
|
Core session management for WebAuthn authentication.
|
||||||
|
|
||||||
|
This module provides generic session management functionality that is
|
||||||
|
independent of any web framework:
|
||||||
|
- Session creation and validation
|
||||||
|
- Token handling and refresh
|
||||||
|
- Credential management
|
||||||
|
"""
|
||||||
|
|
||||||
|
from datetime import datetime, timedelta
|
||||||
|
from uuid import UUID
|
||||||
|
|
||||||
|
from passkey.db import Session, db
|
||||||
|
from passkey.util import passphrase
|
||||||
|
from passkey.util.tokens import create_token, reset_key, session_key
|
||||||
|
|
||||||
|
EXPIRES = timedelta(hours=24)
|
||||||
|
|
||||||
|
|
||||||
|
def expires() -> datetime:
|
||||||
|
return datetime.now() + EXPIRES
|
||||||
|
|
||||||
|
|
||||||
|
async def create_session(user_uuid: UUID, info: dict, credential_uuid: UUID) -> str:
|
||||||
|
"""Create a new session and return a session token."""
|
||||||
|
token = create_token()
|
||||||
|
await db.instance.create_session(
|
||||||
|
user_uuid=user_uuid,
|
||||||
|
key=session_key(token),
|
||||||
|
expires=datetime.now() + EXPIRES,
|
||||||
|
info=info,
|
||||||
|
credential_uuid=credential_uuid,
|
||||||
|
)
|
||||||
|
return token
|
||||||
|
|
||||||
|
|
||||||
|
async def get_session(token: str, reset_allowed=False) -> Session:
|
||||||
|
"""Validate a session token and return session data if valid."""
|
||||||
|
if passphrase.is_well_formed(token):
|
||||||
|
if not reset_allowed:
|
||||||
|
raise ValueError("Reset link is not allowed for this endpoint")
|
||||||
|
key = reset_key(token)
|
||||||
|
else:
|
||||||
|
key = session_key(token)
|
||||||
|
|
||||||
|
session = await db.instance.get_session(key)
|
||||||
|
if not session:
|
||||||
|
raise ValueError("Invalid or expired session token")
|
||||||
|
return session
|
||||||
|
|
||||||
|
|
||||||
|
async def refresh_session_token(token: str):
|
||||||
|
"""Refresh a session extending its expiry."""
|
||||||
|
# Get the current session
|
||||||
|
s = await db.instance.update_session(
|
||||||
|
session_key(token), datetime.now() + EXPIRES, {}
|
||||||
|
)
|
||||||
|
|
||||||
|
if not s:
|
||||||
|
raise ValueError("Session not found or expired")
|
||||||
|
|
||||||
|
|
||||||
|
async def delete_credential(credential_uuid: UUID, auth: str):
|
||||||
|
"""Delete a specific credential for the current user."""
|
||||||
|
s = await get_session(auth)
|
||||||
|
await db.instance.delete_credential(credential_uuid, s.user_uuid)
|
@ -25,7 +25,7 @@ from sqlalchemy.orm import DeclarativeBase, Mapped, mapped_column, relationship
|
|||||||
|
|
||||||
from . import Credential, DatabaseInterface, Session, User, db
|
from . import Credential, DatabaseInterface, Session, User, db
|
||||||
|
|
||||||
DB_PATH = "sqlite+aiosqlite:///passkey-auth.sqlite"
|
DB_PATH = "sqlite+aiosqlite:///webauthn.db"
|
||||||
|
|
||||||
|
|
||||||
async def init(*args, **kwargs):
|
async def init(*args, **kwargs):
|
||||||
|
Loading…
x
Reference in New Issue
Block a user