Firefox Monitor arms you with tools to keep your personal information safe. Find out what hackers already know about you and learn how to stay a step ahead of them.
Перейти к файлу
groovecoder 29c99b04df for #101: HIBP module to scan with hibp api 2018-05-09 09:23:34 -05:00
db for #101: HIBP module to scan with hibp api 2018-05-09 09:23:34 -05:00
public Replace padding/margin-inline-start/end with left/right for browser compatibility 2018-04-26 00:28:56 +02:00
routes for #101: HIBP module to scan with hibp api 2018-05-09 09:23:34 -05:00
scripts for #79: pass email to setBreachedHashNotified 2018-05-07 08:37:53 -05:00
tests Fix setBreachedHashNotified 2018-05-05 10:39:43 +01:00
views for #101: start /hibp/.../range/ stub api 2018-05-08 13:34:03 -05:00
.env-dist Use sequelize for hashset script 2018-03-12 15:08:12 -05:00
.eslintignore Use sequelize for hashset script 2018-03-12 15:08:12 -05:00
.eslintrc.js Re-enable no-missing-require eslint rule (paths were not correct case) 2018-04-18 17:02:34 +02:00
.gitignore start get_hashsets.js 2018-02-12 16:17:43 -06:00
.htmllintrc Add attr-bans to .htmllintrc 2018-03-12 15:08:11 -05:00
.npmignore fix #24: add Travis and Coveralls 2018-02-09 07:37:47 -06:00
.sequelizerc Use sequelize for hashset script 2018-03-12 15:08:12 -05:00
.travis.yml Start database interface (#48) 2018-03-05 19:23:53 +05:30
README.md start code to load hashsets into aws 2018-02-20 14:37:00 -06:00
api.md Add basic info to api.md 2018-02-01 06:56:04 +05:30
app-constants.js Change breach meta data type to json, use it in scan page, add some meta data to dummy breaches in make-breach-with-emails.js 2018-04-24 16:12:36 +02:00
email-utils.js use path.* and object-shorthand 2018-05-04 08:48:23 -05:00
hibp.js for #101: HIBP module to scan with hibp api 2018-05-09 09:23:34 -05:00
package-lock.json for #101: HIBP module to scan with hibp api 2018-05-09 09:23:34 -05:00
package.json for #101: HIBP module to scan with hibp api 2018-05-09 09:23:34 -05:00
server.js for #101: start /hibp/.../range/ stub api 2018-05-08 13:34:03 -05:00
sha1-utils.js Fix a bunch of ESLint errors 2018-04-18 16:39:05 +02:00

README.md

Breach Alerts

Summary

Firefox Breach Alerts notifies users when their credentials have possibly been leaked or stolen in a data breach. Powered by haveibeenpwned.com.

Context

See the Have I Been Pwned about page for the "what" and "why" of data breach alerts.

This project aims to explore how Firefox - as the user agent - can support this.

See the Breach Alert Product Brief for more background, objectives, key use cases.

Development

Requirements

Install

  1. Clone and change to the directory:

    git clone https://github.com/mozilla/blurts-server.git
    cd blurts-server
    
  2. Install dependencies:

    npm install
    
  3. Copy the .env-dist file to .env:

    cp .env-dist .env
    

Run

  1. Run the server:

    npm start
    
  2. Visit the test.html page at localhost:6060/test.html

Emails

The included .env-dist sets DEBUG_DUMMY_SMTP=1 which disables emails.

To send emails, you'll need to unset DEBUG_DUMMY_SMTP and supply real SMTP config values for sending email.

You can set and source these via the .env file, or set them directly:

export DEBUG_DUMMY_SMTP=
export SMTP_HOST=<your-smtp-host>
export SMTP_PORT=<your-smtp-port>
export SMTP_USERNAME=<your-username>
export SMTP_PASSWORD=<your-password>

Firefox Accounts

To use Firefox Accounts, you'll need to create an FxA Oauth Client and then set some OAUTH config values.

You can set and source these via the .env file, or set them directly:

OAUTH_CLIENT_ID=<your-fxa-oauth-client-id>
OAUTH_CLIENT_SECRET=<your-fxa-oauth-client-secret>
OAUTH_AUTHORIZATION_URI="https://oauth-stable.dev.lcip.org/v1/authorization"
OAUTH_PROFILE_URI="https://stable.dev.lcip.org/profile/v1/profile"
OAUTH_TOKEN_URI="https://oauth-stable.dev.lcip.org/v1/token"

Breach Hashsets

This requires an enterprise subscriber API token from HIBP, which you will have to get manually. Please ask a project admin if you need one. To download HIBP breach hashsets, set a HIBP_API_TOKEN environment variable. You can set and source it via the .env file, or set it directly:

export HIBP_API_TOKEN="<HIBP-API-TOKEN>"

With the HIBP_API_TOKEN set, run the get-hashsets.js script:

npm run scripts/get-hashsets.js

This will download the .zip files into breach_hashsets/ directory.

Testing

Lint

After installing the dependencies, you can lint the code by calling:

npm run lint

Deployment

blurts is designed with 12-factor methodology.

Deploy on Heroku

You will need to set required environment variables on Heroku.

heroku config:set COOKIE_SECRET=unsafe-cookie-secret-for-heroku
heroku config:set DEBUG_DUMMY_SMTP=1