You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					549 lines
				
				18 KiB
			
		
		
			
		
	
	
					549 lines
				
				18 KiB
			| 
											3 years ago
										 | // Load modules
 | ||
|  | 
 | ||
|  | var Boom = require('boom'); | ||
|  | var Hoek = require('hoek'); | ||
|  | var Cryptiles = require('cryptiles'); | ||
|  | var Crypto = require('./crypto'); | ||
|  | var Utils = require('./utils'); | ||
|  | 
 | ||
|  | 
 | ||
|  | // Declare internals
 | ||
|  | 
 | ||
|  | var internals = {}; | ||
|  | 
 | ||
|  | 
 | ||
|  | // Hawk authentication
 | ||
|  | 
 | ||
|  | /* | ||
|  |    req:                 node's HTTP request object or an object as follows: | ||
|  | 
 | ||
|  |                         var request = { | ||
|  |                             method: 'GET', | ||
|  |                             url: '/resource/4?a=1&b=2', | ||
|  |                             host: 'example.com', | ||
|  |                             port: 8080, | ||
|  |                             authorization: 'Hawk id="dh37fgj492je", ts="1353832234", nonce="j4h3g2", ext="some-app-ext-data", mac="6R4rV5iE+NPoym+WwjeHzjAGXUtLNIxmo1vpMofpLAE="' | ||
|  |                         }; | ||
|  | 
 | ||
|  |    credentialsFunc:     required function to lookup the set of Hawk credentials based on the provided credentials id. | ||
|  |                         The credentials include the MAC key, MAC algorithm, and other attributes (such as username) | ||
|  |                         needed by the application. This function is the equivalent of verifying the username and | ||
|  |                         password in Basic authentication. | ||
|  | 
 | ||
|  |                         var credentialsFunc = function (id, callback) { | ||
|  | 
 | ||
|  |                             // Lookup credentials in database
 | ||
|  |                             db.lookup(id, function (err, item) { | ||
|  | 
 | ||
|  |                                 if (err || !item) { | ||
|  |                                     return callback(err); | ||
|  |                                 } | ||
|  | 
 | ||
|  |                                 var credentials = { | ||
|  |                                     // Required
 | ||
|  |                                     key: item.key, | ||
|  |                                     algorithm: item.algorithm, | ||
|  |                                     // Application specific
 | ||
|  |                                     user: item.user | ||
|  |                                 }; | ||
|  | 
 | ||
|  |                                 return callback(null, credentials); | ||
|  |                             }); | ||
|  |                         }; | ||
|  | 
 | ||
|  |    options: { | ||
|  | 
 | ||
|  |         hostHeaderName:        optional header field name, used to override the default 'Host' header when used | ||
|  |                                behind a cache of a proxy. Apache2 changes the value of the 'Host' header while preserving | ||
|  |                                the original (which is what the module must verify) in the 'x-forwarded-host' header field. | ||
|  |                                Only used when passed a node Http.ServerRequest object. | ||
|  | 
 | ||
|  |         nonceFunc:             optional nonce validation function. The function signature is function(key, nonce, ts, callback) | ||
|  |                                where 'callback' must be called using the signature function(err). | ||
|  | 
 | ||
|  |         timestampSkewSec:      optional number of seconds of permitted clock skew for incoming timestamps. Defaults to 60 seconds. | ||
|  |                                Provides a +/- skew which means actual allowed window is double the number of seconds. | ||
|  | 
 | ||
|  |         localtimeOffsetMsec:   optional local clock time offset express in a number of milliseconds (positive or negative). | ||
|  |                                Defaults to 0. | ||
|  | 
 | ||
|  |         payload:               optional payload for validation. The client calculates the hash value and includes it via the 'hash' | ||
|  |                                header attribute. The server always ensures the value provided has been included in the request | ||
|  |                                MAC. When this option is provided, it validates the hash value itself. Validation is done by calculating | ||
|  |                                a hash value over the entire payload (assuming it has already be normalized to the same format and | ||
|  |                                encoding used by the client to calculate the hash on request). If the payload is not available at the time | ||
|  |                                of authentication, the authenticatePayload() method can be used by passing it the credentials and | ||
|  |                                attributes.hash returned in the authenticate callback. | ||
|  | 
 | ||
|  |         host:                  optional host name override. Only used when passed a node request object. | ||
|  |         port:                  optional port override. Only used when passed a node request object. | ||
|  |     } | ||
|  | 
 | ||
|  |     callback: function (err, credentials, artifacts) { } | ||
|  |  */ | ||
|  | 
 | ||
|  | exports.authenticate = function (req, credentialsFunc, options, callback) { | ||
|  | 
 | ||
|  |     callback = Hoek.nextTick(callback); | ||
|  | 
 | ||
|  |     // Default options
 | ||
|  | 
 | ||
|  |     options.nonceFunc = options.nonceFunc || internals.nonceFunc; | ||
|  |     options.timestampSkewSec = options.timestampSkewSec || 60;                                                  // 60 seconds
 | ||
|  | 
 | ||
|  |     // Application time
 | ||
|  | 
 | ||
|  |     var now = Utils.now(options.localtimeOffsetMsec);                           // Measure now before any other processing
 | ||
|  | 
 | ||
|  |     // Convert node Http request object to a request configuration object
 | ||
|  | 
 | ||
|  |     var request = Utils.parseRequest(req, options); | ||
|  |     if (request instanceof Error) { | ||
|  |         return callback(Boom.badRequest(request.message)); | ||
|  |     } | ||
|  | 
 | ||
|  |     // Parse HTTP Authorization header
 | ||
|  | 
 | ||
|  |     var attributes = Utils.parseAuthorizationHeader(request.authorization); | ||
|  |     if (attributes instanceof Error) { | ||
|  |         return callback(attributes); | ||
|  |     } | ||
|  | 
 | ||
|  |     // Construct artifacts container
 | ||
|  | 
 | ||
|  |     var artifacts = { | ||
|  |         method: request.method, | ||
|  |         host: request.host, | ||
|  |         port: request.port, | ||
|  |         resource: request.url, | ||
|  |         ts: attributes.ts, | ||
|  |         nonce: attributes.nonce, | ||
|  |         hash: attributes.hash, | ||
|  |         ext: attributes.ext, | ||
|  |         app: attributes.app, | ||
|  |         dlg: attributes.dlg, | ||
|  |         mac: attributes.mac, | ||
|  |         id: attributes.id | ||
|  |     }; | ||
|  | 
 | ||
|  |     // Verify required header attributes
 | ||
|  | 
 | ||
|  |     if (!attributes.id || | ||
|  |         !attributes.ts || | ||
|  |         !attributes.nonce || | ||
|  |         !attributes.mac) { | ||
|  | 
 | ||
|  |         return callback(Boom.badRequest('Missing attributes'), null, artifacts); | ||
|  |     } | ||
|  | 
 | ||
|  |     // Fetch Hawk credentials
 | ||
|  | 
 | ||
|  |     credentialsFunc(attributes.id, function (err, credentials) { | ||
|  | 
 | ||
|  |         if (err) { | ||
|  |             return callback(err, credentials || null, artifacts); | ||
|  |         } | ||
|  | 
 | ||
|  |         if (!credentials) { | ||
|  |             return callback(Boom.unauthorized('Unknown credentials', 'Hawk'), null, artifacts); | ||
|  |         } | ||
|  | 
 | ||
|  |         if (!credentials.key || | ||
|  |             !credentials.algorithm) { | ||
|  | 
 | ||
|  |             return callback(Boom.internal('Invalid credentials'), credentials, artifacts); | ||
|  |         } | ||
|  | 
 | ||
|  |         if (Crypto.algorithms.indexOf(credentials.algorithm) === -1) { | ||
|  |             return callback(Boom.internal('Unknown algorithm'), credentials, artifacts); | ||
|  |         } | ||
|  | 
 | ||
|  |         // Calculate MAC
 | ||
|  | 
 | ||
|  |         var mac = Crypto.calculateMac('header', credentials, artifacts); | ||
|  |         if (!Cryptiles.fixedTimeComparison(mac, attributes.mac)) { | ||
|  |             return callback(Boom.unauthorized('Bad mac', 'Hawk'), credentials, artifacts); | ||
|  |         } | ||
|  | 
 | ||
|  |         // Check payload hash
 | ||
|  | 
 | ||
|  |         if (options.payload || | ||
|  |             options.payload === '') { | ||
|  | 
 | ||
|  |             if (!attributes.hash) { | ||
|  |                 return callback(Boom.unauthorized('Missing required payload hash', 'Hawk'), credentials, artifacts); | ||
|  |             } | ||
|  | 
 | ||
|  |             var hash = Crypto.calculatePayloadHash(options.payload, credentials.algorithm, request.contentType); | ||
|  |             if (!Cryptiles.fixedTimeComparison(hash, attributes.hash)) { | ||
|  |                 return callback(Boom.unauthorized('Bad payload hash', 'Hawk'), credentials, artifacts); | ||
|  |             } | ||
|  |         } | ||
|  | 
 | ||
|  |         // Check nonce
 | ||
|  | 
 | ||
|  |         options.nonceFunc(credentials.key, attributes.nonce, attributes.ts, function (err) { | ||
|  | 
 | ||
|  |             if (err) { | ||
|  |                 return callback(Boom.unauthorized('Invalid nonce', 'Hawk'), credentials, artifacts); | ||
|  |             } | ||
|  | 
 | ||
|  |             // Check timestamp staleness
 | ||
|  | 
 | ||
|  |             if (Math.abs((attributes.ts * 1000) - now) > (options.timestampSkewSec * 1000)) { | ||
|  |                 var tsm = Crypto.timestampMessage(credentials, options.localtimeOffsetMsec); | ||
|  |                 return callback(Boom.unauthorized('Stale timestamp', 'Hawk', tsm), credentials, artifacts); | ||
|  |             } | ||
|  | 
 | ||
|  |             // Successful authentication
 | ||
|  | 
 | ||
|  |             return callback(null, credentials, artifacts); | ||
|  |         }); | ||
|  |     }); | ||
|  | }; | ||
|  | 
 | ||
|  | 
 | ||
|  | // Authenticate payload hash - used when payload cannot be provided during authenticate()
 | ||
|  | 
 | ||
|  | /* | ||
|  |     payload:        raw request payload | ||
|  |     credentials:    from authenticate callback | ||
|  |     artifacts:      from authenticate callback | ||
|  |     contentType:    req.headers['content-type'] | ||
|  | */ | ||
|  | 
 | ||
|  | exports.authenticatePayload = function (payload, credentials, artifacts, contentType) { | ||
|  | 
 | ||
|  |     var calculatedHash = Crypto.calculatePayloadHash(payload, credentials.algorithm, contentType); | ||
|  |     return Cryptiles.fixedTimeComparison(calculatedHash, artifacts.hash); | ||
|  | }; | ||
|  | 
 | ||
|  | 
 | ||
|  | // Authenticate payload hash - used when payload cannot be provided during authenticate()
 | ||
|  | 
 | ||
|  | /* | ||
|  |     calculatedHash: the payload hash calculated using Crypto.calculatePayloadHash() | ||
|  |     artifacts:      from authenticate callback | ||
|  | */ | ||
|  | 
 | ||
|  | exports.authenticatePayloadHash = function (calculatedHash, artifacts) { | ||
|  | 
 | ||
|  |     return Cryptiles.fixedTimeComparison(calculatedHash, artifacts.hash); | ||
|  | }; | ||
|  | 
 | ||
|  | 
 | ||
|  | // Generate a Server-Authorization header for a given response
 | ||
|  | 
 | ||
|  | /* | ||
|  |     credentials: {},                                        // Object received from authenticate()
 | ||
|  |     artifacts: {}                                           // Object received from authenticate(); 'mac', 'hash', and 'ext' - ignored
 | ||
|  |     options: { | ||
|  |         ext: 'application-specific',                        // Application specific data sent via the ext attribute
 | ||
|  |         payload: '{"some":"payload"}',                      // UTF-8 encoded string for body hash generation (ignored if hash provided)
 | ||
|  |         contentType: 'application/json',                    // Payload content-type (ignored if hash provided)
 | ||
|  |         hash: 'U4MKKSmiVxk37JCCrAVIjV='                     // Pre-calculated payload hash
 | ||
|  |     } | ||
|  | */ | ||
|  | 
 | ||
|  | exports.header = function (credentials, artifacts, options) { | ||
|  | 
 | ||
|  |     // Prepare inputs
 | ||
|  | 
 | ||
|  |     options = options || {}; | ||
|  | 
 | ||
|  |     if (!artifacts || | ||
|  |         typeof artifacts !== 'object' || | ||
|  |         typeof options !== 'object') { | ||
|  | 
 | ||
|  |         return ''; | ||
|  |     } | ||
|  | 
 | ||
|  |     artifacts = Hoek.clone(artifacts); | ||
|  |     delete artifacts.mac; | ||
|  |     artifacts.hash = options.hash; | ||
|  |     artifacts.ext = options.ext; | ||
|  | 
 | ||
|  |     // Validate credentials
 | ||
|  | 
 | ||
|  |     if (!credentials || | ||
|  |         !credentials.key || | ||
|  |         !credentials.algorithm) { | ||
|  | 
 | ||
|  |         // Invalid credential object
 | ||
|  |         return ''; | ||
|  |     } | ||
|  | 
 | ||
|  |     if (Crypto.algorithms.indexOf(credentials.algorithm) === -1) { | ||
|  |         return ''; | ||
|  |     } | ||
|  | 
 | ||
|  |     // Calculate payload hash
 | ||
|  | 
 | ||
|  |     if (!artifacts.hash && | ||
|  |         (options.payload || options.payload === '')) { | ||
|  | 
 | ||
|  |         artifacts.hash = Crypto.calculatePayloadHash(options.payload, credentials.algorithm, options.contentType); | ||
|  |     } | ||
|  | 
 | ||
|  |     var mac = Crypto.calculateMac('response', credentials, artifacts); | ||
|  | 
 | ||
|  |     // Construct header
 | ||
|  | 
 | ||
|  |     var header = 'Hawk mac="' + mac + '"' + | ||
|  |                  (artifacts.hash ? ', hash="' + artifacts.hash + '"' : ''); | ||
|  | 
 | ||
|  |     if (artifacts.ext !== null && | ||
|  |         artifacts.ext !== undefined && | ||
|  |         artifacts.ext !== '') {                       // Other falsey values allowed
 | ||
|  | 
 | ||
|  |         header += ', ext="' + Hoek.escapeHeaderAttribute(artifacts.ext) + '"'; | ||
|  |     } | ||
|  | 
 | ||
|  |     return header; | ||
|  | }; | ||
|  | 
 | ||
|  | 
 | ||
|  | /* | ||
|  |  * Arguments and options are the same as authenticate() with the exception that the only supported options are: | ||
|  |  * 'hostHeaderName', 'localtimeOffsetMsec', 'host', 'port' | ||
|  |  */ | ||
|  | 
 | ||
|  | 
 | ||
|  | //                       1     2             3           4
 | ||
|  | internals.bewitRegex = /^(\/.*)([\?&])bewit\=([^&$]*)(?:&(.+))?$/; | ||
|  | 
 | ||
|  | 
 | ||
|  | exports.authenticateBewit = function (req, credentialsFunc, options, callback) { | ||
|  | 
 | ||
|  |     callback = Hoek.nextTick(callback); | ||
|  | 
 | ||
|  |     // Application time
 | ||
|  | 
 | ||
|  |     var now = Utils.now(options.localtimeOffsetMsec); | ||
|  | 
 | ||
|  |     // Convert node Http request object to a request configuration object
 | ||
|  | 
 | ||
|  |     var request = Utils.parseRequest(req, options); | ||
|  |     if (request instanceof Error) { | ||
|  |         return callback(Boom.badRequest(request.message)); | ||
|  |     } | ||
|  | 
 | ||
|  |     // Extract bewit
 | ||
|  | 
 | ||
|  |     if (request.url.length > Utils.limits.maxMatchLength) { | ||
|  |         return callback(Boom.badRequest('Resource path exceeds max length')); | ||
|  |     } | ||
|  | 
 | ||
|  |     var resource = request.url.match(internals.bewitRegex); | ||
|  |     if (!resource) { | ||
|  |         return callback(Boom.unauthorized(null, 'Hawk')); | ||
|  |     } | ||
|  | 
 | ||
|  |     // Bewit not empty
 | ||
|  | 
 | ||
|  |     if (!resource[3]) { | ||
|  |         return callback(Boom.unauthorized('Empty bewit', 'Hawk')); | ||
|  |     } | ||
|  | 
 | ||
|  |     // Verify method is GET
 | ||
|  | 
 | ||
|  |     if (request.method !== 'GET' && | ||
|  |         request.method !== 'HEAD') { | ||
|  | 
 | ||
|  |         return callback(Boom.unauthorized('Invalid method', 'Hawk')); | ||
|  |     } | ||
|  | 
 | ||
|  |     // No other authentication
 | ||
|  | 
 | ||
|  |     if (request.authorization) { | ||
|  |         return callback(Boom.badRequest('Multiple authentications')); | ||
|  |     } | ||
|  | 
 | ||
|  |     // Parse bewit
 | ||
|  | 
 | ||
|  |     var bewitString = Hoek.base64urlDecode(resource[3]); | ||
|  |     if (bewitString instanceof Error) { | ||
|  |         return callback(Boom.badRequest('Invalid bewit encoding')); | ||
|  |     } | ||
|  | 
 | ||
|  |     // Bewit format: id\exp\mac\ext ('\' is used because it is a reserved header attribute character)
 | ||
|  | 
 | ||
|  |     var bewitParts = bewitString.split('\\'); | ||
|  |     if (bewitParts.length !== 4) { | ||
|  |         return callback(Boom.badRequest('Invalid bewit structure')); | ||
|  |     } | ||
|  | 
 | ||
|  |     var bewit = { | ||
|  |         id: bewitParts[0], | ||
|  |         exp: parseInt(bewitParts[1], 10), | ||
|  |         mac: bewitParts[2], | ||
|  |         ext: bewitParts[3] || '' | ||
|  |     }; | ||
|  | 
 | ||
|  |     if (!bewit.id || | ||
|  |         !bewit.exp || | ||
|  |         !bewit.mac) { | ||
|  | 
 | ||
|  |         return callback(Boom.badRequest('Missing bewit attributes')); | ||
|  |     } | ||
|  | 
 | ||
|  |     // Construct URL without bewit
 | ||
|  | 
 | ||
|  |     var url = resource[1]; | ||
|  |     if (resource[4]) { | ||
|  |         url += resource[2] + resource[4]; | ||
|  |     } | ||
|  | 
 | ||
|  |     // Check expiration
 | ||
|  | 
 | ||
|  |     if (bewit.exp * 1000 <= now) { | ||
|  |         return callback(Boom.unauthorized('Access expired', 'Hawk'), null, bewit); | ||
|  |     } | ||
|  | 
 | ||
|  |     // Fetch Hawk credentials
 | ||
|  | 
 | ||
|  |     credentialsFunc(bewit.id, function (err, credentials) { | ||
|  | 
 | ||
|  |         if (err) { | ||
|  |             return callback(err, credentials || null, bewit.ext); | ||
|  |         } | ||
|  | 
 | ||
|  |         if (!credentials) { | ||
|  |             return callback(Boom.unauthorized('Unknown credentials', 'Hawk'), null, bewit); | ||
|  |         } | ||
|  | 
 | ||
|  |         if (!credentials.key || | ||
|  |             !credentials.algorithm) { | ||
|  | 
 | ||
|  |             return callback(Boom.internal('Invalid credentials'), credentials, bewit); | ||
|  |         } | ||
|  | 
 | ||
|  |         if (Crypto.algorithms.indexOf(credentials.algorithm) === -1) { | ||
|  |             return callback(Boom.internal('Unknown algorithm'), credentials, bewit); | ||
|  |         } | ||
|  | 
 | ||
|  |         // Calculate MAC
 | ||
|  | 
 | ||
|  |         var mac = Crypto.calculateMac('bewit', credentials, { | ||
|  |             ts: bewit.exp, | ||
|  |             nonce: '', | ||
|  |             method: 'GET', | ||
|  |             resource: url, | ||
|  |             host: request.host, | ||
|  |             port: request.port, | ||
|  |             ext: bewit.ext | ||
|  |         }); | ||
|  | 
 | ||
|  |         if (!Cryptiles.fixedTimeComparison(mac, bewit.mac)) { | ||
|  |             return callback(Boom.unauthorized('Bad mac', 'Hawk'), credentials, bewit); | ||
|  |         } | ||
|  | 
 | ||
|  |         // Successful authentication
 | ||
|  | 
 | ||
|  |         return callback(null, credentials, bewit); | ||
|  |     }); | ||
|  | }; | ||
|  | 
 | ||
|  | 
 | ||
|  | /* | ||
|  |  *  options are the same as authenticate() with the exception that the only supported options are: | ||
|  |  * 'nonceFunc', 'timestampSkewSec', 'localtimeOffsetMsec' | ||
|  |  */ | ||
|  | 
 | ||
|  | exports.authenticateMessage = function (host, port, message, authorization, credentialsFunc, options, callback) { | ||
|  | 
 | ||
|  |     callback = Hoek.nextTick(callback); | ||
|  | 
 | ||
|  |     // Default options
 | ||
|  | 
 | ||
|  |     options.nonceFunc = options.nonceFunc || internals.nonceFunc; | ||
|  |     options.timestampSkewSec = options.timestampSkewSec || 60;                                                  // 60 seconds
 | ||
|  | 
 | ||
|  |     // Application time
 | ||
|  | 
 | ||
|  |     var now = Utils.now(options.localtimeOffsetMsec);                       // Measure now before any other processing
 | ||
|  | 
 | ||
|  |     // Validate authorization
 | ||
|  | 
 | ||
|  |     if (!authorization.id || | ||
|  |         !authorization.ts || | ||
|  |         !authorization.nonce || | ||
|  |         !authorization.hash || | ||
|  |         !authorization.mac) { | ||
|  | 
 | ||
|  |         return callback(Boom.badRequest('Invalid authorization')); | ||
|  |     } | ||
|  | 
 | ||
|  |     // Fetch Hawk credentials
 | ||
|  | 
 | ||
|  |     credentialsFunc(authorization.id, function (err, credentials) { | ||
|  | 
 | ||
|  |         if (err) { | ||
|  |             return callback(err, credentials || null); | ||
|  |         } | ||
|  | 
 | ||
|  |         if (!credentials) { | ||
|  |             return callback(Boom.unauthorized('Unknown credentials', 'Hawk')); | ||
|  |         } | ||
|  | 
 | ||
|  |         if (!credentials.key || | ||
|  |             !credentials.algorithm) { | ||
|  | 
 | ||
|  |             return callback(Boom.internal('Invalid credentials'), credentials); | ||
|  |         } | ||
|  | 
 | ||
|  |         if (Crypto.algorithms.indexOf(credentials.algorithm) === -1) { | ||
|  |             return callback(Boom.internal('Unknown algorithm'), credentials); | ||
|  |         } | ||
|  | 
 | ||
|  |         // Construct artifacts container
 | ||
|  | 
 | ||
|  |         var artifacts = { | ||
|  |             ts: authorization.ts, | ||
|  |             nonce: authorization.nonce, | ||
|  |             host: host, | ||
|  |             port: port, | ||
|  |             hash: authorization.hash | ||
|  |         }; | ||
|  | 
 | ||
|  |         // Calculate MAC
 | ||
|  | 
 | ||
|  |         var mac = Crypto.calculateMac('message', credentials, artifacts); | ||
|  |         if (!Cryptiles.fixedTimeComparison(mac, authorization.mac)) { | ||
|  |             return callback(Boom.unauthorized('Bad mac', 'Hawk'), credentials); | ||
|  |         } | ||
|  | 
 | ||
|  |         // Check payload hash
 | ||
|  | 
 | ||
|  |         var hash = Crypto.calculatePayloadHash(message, credentials.algorithm); | ||
|  |         if (!Cryptiles.fixedTimeComparison(hash, authorization.hash)) { | ||
|  |             return callback(Boom.unauthorized('Bad message hash', 'Hawk'), credentials); | ||
|  |         } | ||
|  | 
 | ||
|  |         // Check nonce
 | ||
|  | 
 | ||
|  |         options.nonceFunc(credentials.key, authorization.nonce, authorization.ts, function (err) { | ||
|  | 
 | ||
|  |             if (err) { | ||
|  |                 return callback(Boom.unauthorized('Invalid nonce', 'Hawk'), credentials); | ||
|  |             } | ||
|  | 
 | ||
|  |             // Check timestamp staleness
 | ||
|  | 
 | ||
|  |             if (Math.abs((authorization.ts * 1000) - now) > (options.timestampSkewSec * 1000)) { | ||
|  |                 return callback(Boom.unauthorized('Stale timestamp'), credentials); | ||
|  |             } | ||
|  | 
 | ||
|  |             // Successful authentication
 | ||
|  | 
 | ||
|  |             return callback(null, credentials); | ||
|  |         }); | ||
|  |     }); | ||
|  | }; | ||
|  | 
 | ||
|  | 
 | ||
|  | internals.nonceFunc = function (key, nonce, ts, nonceCallback) { | ||
|  | 
 | ||
|  |     return nonceCallback();         // No validation
 | ||
|  | }; |