diff options
Diffstat (limited to 'models/two_factor.go')
-rw-r--r-- | models/two_factor.go | 201 |
1 files changed, 0 insertions, 201 deletions
diff --git a/models/two_factor.go b/models/two_factor.go deleted file mode 100644 index 35e9e87e..00000000 --- a/models/two_factor.go +++ /dev/null @@ -1,201 +0,0 @@ -// Copyright 2017 The Gogs Authors. All rights reserved. -// Use of this source code is governed by a MIT-style -// license that can be found in the LICENSE file. - -package models - -import ( - "encoding/base64" - "fmt" - "strings" - "time" - - "github.com/unknwon/com" - "xorm.io/xorm" - "github.com/pquerna/otp/totp" - log "gopkg.in/clog.v1" - - "gogs.io/gogs/models/errors" - "gogs.io/gogs/pkg/setting" - "gogs.io/gogs/pkg/tool" -) - -// TwoFactor represents a two-factor authentication token. -type TwoFactor struct { - ID int64 - UserID int64 `xorm:"UNIQUE"` - Secret string - Created time.Time `xorm:"-" json:"-"` - CreatedUnix int64 -} - -func (t *TwoFactor) BeforeInsert() { - t.CreatedUnix = time.Now().Unix() -} - -func (t *TwoFactor) AfterSet(colName string, _ xorm.Cell) { - switch colName { - case "created_unix": - t.Created = time.Unix(t.CreatedUnix, 0).Local() - } -} - -// ValidateTOTP returns true if given passcode is valid for two-factor authentication token. -// It also returns possible validation error. -func (t *TwoFactor) ValidateTOTP(passcode string) (bool, error) { - secret, err := base64.StdEncoding.DecodeString(t.Secret) - if err != nil { - return false, fmt.Errorf("DecodeString: %v", err) - } - decryptSecret, err := com.AESGCMDecrypt(tool.MD5Bytes(setting.SecretKey), secret) - if err != nil { - return false, fmt.Errorf("AESGCMDecrypt: %v", err) - } - return totp.Validate(passcode, string(decryptSecret)), nil -} - -// IsUserEnabledTwoFactor returns true if user has enabled two-factor authentication. -func IsUserEnabledTwoFactor(userID int64) bool { - has, err := x.Where("user_id = ?", userID).Get(new(TwoFactor)) - if err != nil { - log.Error(2, "IsUserEnabledTwoFactor [user_id: %d]: %v", userID, err) - } - return has -} - -func generateRecoveryCodes(userID int64) ([]*TwoFactorRecoveryCode, error) { - recoveryCodes := make([]*TwoFactorRecoveryCode, 10) - for i := 0; i < 10; i++ { - code, err := tool.RandomString(10) - if err != nil { - return nil, fmt.Errorf("RandomString: %v", err) - } - recoveryCodes[i] = &TwoFactorRecoveryCode{ - UserID: userID, - Code: strings.ToLower(code[:5] + "-" + code[5:]), - } - } - return recoveryCodes, nil -} - -// NewTwoFactor creates a new two-factor authentication token and recovery codes for given user. -func NewTwoFactor(userID int64, secret string) error { - t := &TwoFactor{ - UserID: userID, - } - - // Encrypt secret - encryptSecret, err := com.AESGCMEncrypt(tool.MD5Bytes(setting.SecretKey), []byte(secret)) - if err != nil { - return fmt.Errorf("AESGCMEncrypt: %v", err) - } - t.Secret = base64.StdEncoding.EncodeToString(encryptSecret) - - recoveryCodes, err := generateRecoveryCodes(userID) - if err != nil { - return fmt.Errorf("generateRecoveryCodes: %v", err) - } - - sess := x.NewSession() - defer sess.Close() - if err = sess.Begin(); err != nil { - return err - } - - if _, err = sess.Insert(t); err != nil { - return fmt.Errorf("insert two-factor: %v", err) - } else if _, err = sess.Insert(recoveryCodes); err != nil { - return fmt.Errorf("insert recovery codes: %v", err) - } - - return sess.Commit() -} - -// GetTwoFactorByUserID returns two-factor authentication token of given user. -func GetTwoFactorByUserID(userID int64) (*TwoFactor, error) { - t := new(TwoFactor) - has, err := x.Where("user_id = ?", userID).Get(t) - if err != nil { - return nil, err - } else if !has { - return nil, errors.TwoFactorNotFound{userID} - } - - return t, nil -} - -// DeleteTwoFactor removes two-factor authentication token and recovery codes of given user. -func DeleteTwoFactor(userID int64) (err error) { - sess := x.NewSession() - defer sess.Close() - if err = sess.Begin(); err != nil { - return err - } - - if _, err = sess.Where("user_id = ?", userID).Delete(new(TwoFactor)); err != nil { - return fmt.Errorf("delete two-factor: %v", err) - } else if err = deleteRecoveryCodesByUserID(sess, userID); err != nil { - return fmt.Errorf("deleteRecoveryCodesByUserID: %v", err) - } - - return sess.Commit() -} - -// TwoFactorRecoveryCode represents a two-factor authentication recovery code. -type TwoFactorRecoveryCode struct { - ID int64 - UserID int64 - Code string `xorm:"VARCHAR(11)"` - IsUsed bool -} - -// GetRecoveryCodesByUserID returns all recovery codes of given user. -func GetRecoveryCodesByUserID(userID int64) ([]*TwoFactorRecoveryCode, error) { - recoveryCodes := make([]*TwoFactorRecoveryCode, 0, 10) - return recoveryCodes, x.Where("user_id = ?", userID).Find(&recoveryCodes) -} - -func deleteRecoveryCodesByUserID(e Engine, userID int64) error { - _, err := e.Where("user_id = ?", userID).Delete(new(TwoFactorRecoveryCode)) - return err -} - -// RegenerateRecoveryCodes regenerates new set of recovery codes for given user. -func RegenerateRecoveryCodes(userID int64) error { - recoveryCodes, err := generateRecoveryCodes(userID) - if err != nil { - return fmt.Errorf("generateRecoveryCodes: %v", err) - } - - sess := x.NewSession() - defer sess.Close() - if err = sess.Begin(); err != nil { - return err - } - - if err = deleteRecoveryCodesByUserID(sess, userID); err != nil { - return fmt.Errorf("deleteRecoveryCodesByUserID: %v", err) - } else if _, err = sess.Insert(recoveryCodes); err != nil { - return fmt.Errorf("insert new recovery codes: %v", err) - } - - return sess.Commit() -} - -// UseRecoveryCode validates recovery code of given user and marks it is used if valid. -func UseRecoveryCode(userID int64, code string) error { - recoveryCode := new(TwoFactorRecoveryCode) - has, err := x.Where("code = ?", code).And("is_used = ?", false).Get(recoveryCode) - if err != nil { - return fmt.Errorf("get unused code: %v", err) - } else if !has { - return errors.TwoFactorRecoveryCodeNotFound{code} - } - - recoveryCode.IsUsed = true - if _, err = x.Id(recoveryCode.ID).Cols("is_used").Update(recoveryCode); err != nil { - return fmt.Errorf("mark code as used: %v", err) - } - - return nil -} |