188 lines
4.7 KiB
Go
188 lines
4.7 KiB
Go
|
// Copyright 2014 The Gogs Authors. All rights reserved.
|
||
|
// Copyright 2018 The Gitea Authors. All rights reserved.
|
||
|
// Use of this source code is governed by a MIT-style
|
||
|
// license that can be found in the LICENSE file.
|
||
|
|
||
|
package setting
|
||
|
|
||
|
import (
|
||
|
"bytes"
|
||
|
"encoding/base64"
|
||
|
"html/template"
|
||
|
"image/png"
|
||
|
"strings"
|
||
|
|
||
|
"code.gitea.io/gitea/models"
|
||
|
"code.gitea.io/gitea/modules/auth"
|
||
|
"code.gitea.io/gitea/modules/context"
|
||
|
"code.gitea.io/gitea/modules/setting"
|
||
|
|
||
|
"github.com/pquerna/otp"
|
||
|
"github.com/pquerna/otp/totp"
|
||
|
)
|
||
|
|
||
|
// RegenerateScratchTwoFactor regenerates the user's 2FA scratch code.
|
||
|
func RegenerateScratchTwoFactor(ctx *context.Context) {
|
||
|
ctx.Data["Title"] = ctx.Tr("settings")
|
||
|
ctx.Data["PageIsSettingsSecurity"] = true
|
||
|
|
||
|
t, err := models.GetTwoFactorByUID(ctx.User.ID)
|
||
|
if err != nil {
|
||
|
ctx.ServerError("SettingsTwoFactor", err)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
if err = t.GenerateScratchToken(); err != nil {
|
||
|
ctx.ServerError("SettingsTwoFactor", err)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
if err = models.UpdateTwoFactor(t); err != nil {
|
||
|
ctx.ServerError("SettingsTwoFactor", err)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
ctx.Flash.Success(ctx.Tr("settings.twofa_scratch_token_regenerated", t.ScratchToken))
|
||
|
ctx.Redirect(setting.AppSubURL + "/user/settings/security")
|
||
|
}
|
||
|
|
||
|
// DisableTwoFactor deletes the user's 2FA settings.
|
||
|
func DisableTwoFactor(ctx *context.Context) {
|
||
|
ctx.Data["Title"] = ctx.Tr("settings")
|
||
|
ctx.Data["PageIsSettingsSecurity"] = true
|
||
|
|
||
|
t, err := models.GetTwoFactorByUID(ctx.User.ID)
|
||
|
if err != nil {
|
||
|
ctx.ServerError("SettingsTwoFactor", err)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
if err = models.DeleteTwoFactorByID(t.ID, ctx.User.ID); err != nil {
|
||
|
ctx.ServerError("SettingsTwoFactor", err)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
ctx.Flash.Success(ctx.Tr("settings.twofa_disabled"))
|
||
|
ctx.Redirect(setting.AppSubURL + "/user/settings/security")
|
||
|
}
|
||
|
|
||
|
func twofaGenerateSecretAndQr(ctx *context.Context) bool {
|
||
|
var otpKey *otp.Key
|
||
|
var err error
|
||
|
uri := ctx.Session.Get("twofaUri")
|
||
|
if uri != nil {
|
||
|
otpKey, err = otp.NewKeyFromURL(uri.(string))
|
||
|
}
|
||
|
if otpKey == nil {
|
||
|
err = nil // clear the error, in case the URL was invalid
|
||
|
otpKey, err = totp.Generate(totp.GenerateOpts{
|
||
|
Issuer: setting.AppName + " (" + strings.TrimRight(setting.AppURL, "/") + ")",
|
||
|
AccountName: ctx.User.Name,
|
||
|
})
|
||
|
if err != nil {
|
||
|
ctx.ServerError("SettingsTwoFactor", err)
|
||
|
return false
|
||
|
}
|
||
|
}
|
||
|
|
||
|
ctx.Data["TwofaSecret"] = otpKey.Secret()
|
||
|
img, err := otpKey.Image(320, 240)
|
||
|
if err != nil {
|
||
|
ctx.ServerError("SettingsTwoFactor", err)
|
||
|
return false
|
||
|
}
|
||
|
|
||
|
var imgBytes bytes.Buffer
|
||
|
if err = png.Encode(&imgBytes, img); err != nil {
|
||
|
ctx.ServerError("SettingsTwoFactor", err)
|
||
|
return false
|
||
|
}
|
||
|
|
||
|
ctx.Data["QrUri"] = template.URL("data:image/png;base64," + base64.StdEncoding.EncodeToString(imgBytes.Bytes()))
|
||
|
ctx.Session.Set("twofaSecret", otpKey.Secret())
|
||
|
ctx.Session.Set("twofaUri", otpKey.String())
|
||
|
return true
|
||
|
}
|
||
|
|
||
|
// EnrollTwoFactor shows the page where the user can enroll into 2FA.
|
||
|
func EnrollTwoFactor(ctx *context.Context) {
|
||
|
ctx.Data["Title"] = ctx.Tr("settings")
|
||
|
ctx.Data["PageIsSettingsSecurity"] = true
|
||
|
|
||
|
t, err := models.GetTwoFactorByUID(ctx.User.ID)
|
||
|
if t != nil {
|
||
|
// already enrolled
|
||
|
ctx.ServerError("SettingsTwoFactor", err)
|
||
|
return
|
||
|
}
|
||
|
if err != nil && !models.IsErrTwoFactorNotEnrolled(err) {
|
||
|
ctx.ServerError("SettingsTwoFactor", err)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
if !twofaGenerateSecretAndQr(ctx) {
|
||
|
return
|
||
|
}
|
||
|
|
||
|
ctx.HTML(200, tplSettingsTwofaEnroll)
|
||
|
}
|
||
|
|
||
|
// EnrollTwoFactorPost handles enrolling the user into 2FA.
|
||
|
func EnrollTwoFactorPost(ctx *context.Context, form auth.TwoFactorAuthForm) {
|
||
|
ctx.Data["Title"] = ctx.Tr("settings")
|
||
|
ctx.Data["PageIsSettingsSecurity"] = true
|
||
|
|
||
|
t, err := models.GetTwoFactorByUID(ctx.User.ID)
|
||
|
if t != nil {
|
||
|
// already enrolled
|
||
|
ctx.ServerError("SettingsTwoFactor", err)
|
||
|
return
|
||
|
}
|
||
|
if err != nil && !models.IsErrTwoFactorNotEnrolled(err) {
|
||
|
ctx.ServerError("SettingsTwoFactor", err)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
if ctx.HasError() {
|
||
|
if !twofaGenerateSecretAndQr(ctx) {
|
||
|
return
|
||
|
}
|
||
|
ctx.HTML(200, tplSettingsTwofaEnroll)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
secret := ctx.Session.Get("twofaSecret").(string)
|
||
|
if !totp.Validate(form.Passcode, secret) {
|
||
|
if !twofaGenerateSecretAndQr(ctx) {
|
||
|
return
|
||
|
}
|
||
|
ctx.Flash.Error(ctx.Tr("settings.passcode_invalid"))
|
||
|
ctx.HTML(200, tplSettingsTwofaEnroll)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
t = &models.TwoFactor{
|
||
|
UID: ctx.User.ID,
|
||
|
}
|
||
|
err = t.SetSecret(secret)
|
||
|
if err != nil {
|
||
|
ctx.ServerError("SettingsTwoFactor", err)
|
||
|
return
|
||
|
}
|
||
|
err = t.GenerateScratchToken()
|
||
|
if err != nil {
|
||
|
ctx.ServerError("SettingsTwoFactor", err)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
if err = models.NewTwoFactor(t); err != nil {
|
||
|
ctx.ServerError("SettingsTwoFactor", err)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
ctx.Session.Delete("twofaSecret")
|
||
|
ctx.Session.Delete("twofaUri")
|
||
|
ctx.Flash.Success(ctx.Tr("settings.twofa_enrolled", t.ScratchToken))
|
||
|
ctx.Redirect(setting.AppSubURL + "/user/settings/security")
|
||
|
}
|