Files
kestrelos/server/api/auth/oidc/callback.get.js
Keli Grubb e61e6bc7e3
All checks were successful
ci/woodpecker/push/push Pipeline was successful
major: kestrel is now a tak server (#6)
## Added

- CoT (Cursor on Target) server on port 8089 enabling ATAK/iTAK device connectivity
- Support for TAK stream protocol and traditional XML CoT messages
- TLS/SSL support with automatic fallback to plain TCP
- Username/password authentication for CoT connections
- Real-time device position tracking with TTL-based expiration (90s default)
- API endpoints: `/api/cot/config`, `/api/cot/server-package`, `/api/cot/truststore`, `/api/me/cot-password`
- TAK Server section in Settings with QR code for iTAK setup
- ATAK password management in Account page for OIDC users
- CoT device markers on map showing real-time positions
- Comprehensive documentation in `docs/` directory
- Environment variables: `COT_PORT`, `COT_TTL_MS`, `COT_REQUIRE_AUTH`, `COT_SSL_CERT`, `COT_SSL_KEY`, `COT_DEBUG`
- Dependencies: `fast-xml-parser`, `jszip`, `qrcode`

## Changed

- Authentication system supports CoT password management for OIDC users
- Database schema includes `cot_password_hash` field
- Test suite refactored to follow functional design principles

## Removed

- Consolidated utility modules: `authConfig.js`, `authSkipPaths.js`, `bootstrap.js`, `poiConstants.js`, `session.js`

## Security

- XML entity expansion protection in CoT parser
- Enhanced input validation and SQL injection prevention
- Authentication timeout to prevent hanging connections

## Breaking Changes

- Port 8089 must be exposed for CoT server. Update firewall rules and Docker/Kubernetes configurations.

## Migration Notes

- OIDC users must set ATAK password via Account settings before connecting
- Docker: expose port 8089 (`-p 8089:8089`)
- Kubernetes: update Helm values to expose port 8089

Co-authored-by: Madison Grubb <madison@elastiflow.com>
Reviewed-on: #6
2026-02-17 16:41:41 +00:00

100 lines
3.4 KiB
JavaScript

import { getCookie, deleteCookie, setCookie, getRequestURL } from 'h3'
import {
getOidcConfig,
constantTimeCompare,
validateRedirectPath,
exchangeCode,
} from '../../../utils/oidc.js'
import { getDb } from '../../../utils/db.js'
import { getSessionMaxAgeDays } from '../../../utils/constants.js'
const DEFAULT_ROLE = process.env.OIDC_DEFAULT_ROLE || 'member'
function getIdentifier(claims) {
return claims?.email ?? claims?.preferred_username ?? claims?.name ?? claims?.sub ?? 'oidc-user'
}
export default defineEventHandler(async (event) => {
const query = getQuery(event)
const code = query?.code
const state = query?.state
if (!code || !state) throw createError({ statusCode: 400, message: 'Invalid request' })
const cookieRaw = getCookie(event, 'oidc_state')
if (!cookieRaw) throw createError({ statusCode: 400, message: 'Invalid request' })
let stored
try {
stored = JSON.parse(cookieRaw)
}
catch {
throw createError({ statusCode: 400, message: 'Invalid request' })
}
if (!stored?.state || !constantTimeCompare(state, stored.state)) {
throw createError({ statusCode: 400, message: 'Invalid request' })
}
const config = await getOidcConfig()
if (!config) throw createError({ statusCode: 500, message: 'OIDC not configured' })
const currentUrl = getRequestURL(event)
const checks = {
expectedState: state,
expectedNonce: stored.nonce,
pkceCodeVerifier: stored.codeVerifier,
}
let tokens
try {
tokens = await exchangeCode(config, currentUrl, checks)
}
catch {
deleteCookie(event, 'oidc_state', { path: '/' })
throw createError({ statusCode: 401, message: 'Authentication failed' })
}
deleteCookie(event, 'oidc_state', { path: '/' })
const claims = tokens.claims?.()
if (!claims?.sub) throw createError({ statusCode: 401, message: 'Authentication failed' })
const issuer = process.env.OIDC_ISSUER ?? ''
const { get, run } = await getDb()
let user = await get(
'SELECT id, identifier, role FROM users WHERE oidc_issuer = ? AND oidc_sub = ?',
[issuer, claims.sub],
)
if (!user) {
const id = crypto.randomUUID()
const now = new Date().toISOString()
const identifier = getIdentifier(claims)
await run(
'INSERT INTO users (id, identifier, password_hash, role, created_at, auth_provider, oidc_issuer, oidc_sub) VALUES (?, ?, ?, ?, ?, ?, ?, ?)',
[id, identifier, null, DEFAULT_ROLE, now, 'oidc', issuer, claims.sub],
)
user = await get('SELECT id, identifier, role FROM users WHERE id = ?', [id])
}
// Invalidate all existing sessions for this user to prevent session fixation
await run('DELETE FROM sessions WHERE user_id = ?', [user.id])
const sessionDays = getSessionMaxAgeDays()
const sid = crypto.randomUUID()
const now = new Date()
const expires = new Date(now.getTime() + sessionDays * 24 * 60 * 60 * 1000)
await run(
'INSERT INTO sessions (id, user_id, created_at, expires_at) VALUES (?, ?, ?, ?)',
[sid, user.id, now.toISOString(), expires.toISOString()],
)
setCookie(event, 'session_id', sid, {
httpOnly: true,
sameSite: 'strict',
path: '/',
maxAge: sessionDays * 24 * 60 * 60,
secure: process.env.NODE_ENV === 'production',
})
const redirectParam = query?.redirect
const path = validateRedirectPath(redirectParam)
return sendRedirect(event, path.startsWith('http') ? path : new URL(path, getRequestURL(event).origin).href, 302)
})