diff options
Diffstat (limited to 'models')
-rw-r--r-- | models/errors/two_factor.go | 33 | ||||
-rw-r--r-- | models/models.go | 4 | ||||
-rw-r--r-- | models/two_factor.go | 201 | ||||
-rw-r--r-- | models/user.go | 9 |
4 files changed, 243 insertions, 4 deletions
diff --git a/models/errors/two_factor.go b/models/errors/two_factor.go new file mode 100644 index 00000000..02cdcf5c --- /dev/null +++ b/models/errors/two_factor.go @@ -0,0 +1,33 @@ +// Copyright 2017 The Gogs Authors. All rights reserved. +// Use of this source code is governed by a MIT-style +// license that can be found in the LICENSE file. + +package errors + +import "fmt" + +type TwoFactorNotFound struct { + UserID int64 +} + +func IsTwoFactorNotFound(err error) bool { + _, ok := err.(TwoFactorNotFound) + return ok +} + +func (err TwoFactorNotFound) Error() string { + return fmt.Sprintf("two-factor authentication does not found [user_id: %d]", err.UserID) +} + +type TwoFactorRecoveryCodeNotFound struct { + Code string +} + +func IsTwoFactorRecoveryCodeNotFound(err error) bool { + _, ok := err.(TwoFactorRecoveryCodeNotFound) + return ok +} + +func (err TwoFactorRecoveryCodeNotFound) Error() string { + return fmt.Sprintf("two-factor recovery code does not found [code: %s]", err.Code) +} diff --git a/models/models.go b/models/models.go index 2eea56b1..98a4fd23 100644 --- a/models/models.go +++ b/models/models.go @@ -27,7 +27,7 @@ import ( "github.com/gogits/gogs/pkg/setting" ) -// Engine represents a xorm engine or session. +// Engine represents a XORM engine or session. type Engine interface { Delete(interface{}) (int64, error) Exec(string, ...interface{}) (sql.Result, error) @@ -64,7 +64,7 @@ var ( func init() { tables = append(tables, - new(User), new(PublicKey), new(AccessToken), + new(User), new(PublicKey), new(AccessToken), new(TwoFactor), new(TwoFactorRecoveryCode), new(Repository), new(DeployKey), new(Collaboration), new(Access), new(Upload), new(Watch), new(Star), new(Follow), new(Action), new(Issue), new(PullRequest), new(Comment), new(Attachment), new(IssueUser), diff --git a/models/two_factor.go b/models/two_factor.go new file mode 100644 index 00000000..2f6e7991 --- /dev/null +++ b/models/two_factor.go @@ -0,0 +1,201 @@ +// Copyright 2017 The Gogs Authors. All rights reserved. +// Use of this source code is governed by a MIT-style +// license that can be found in the LICENSE file. + +package models + +import ( + "encoding/base64" + "fmt" + "strings" + "time" + + "github.com/Unknwon/com" + "github.com/go-xorm/xorm" + "github.com/pquerna/otp/totp" + log "gopkg.in/clog.v1" + + "github.com/gogits/gogs/models/errors" + "github.com/gogits/gogs/pkg/setting" + "github.com/gogits/gogs/pkg/tool" +) + +// TwoFactor represents a two-factor authentication token. +type TwoFactor struct { + ID int64 + UserID int64 `xorm:"UNIQUE"` + Secret string + Created time.Time `xorm:"-"` + CreatedUnix int64 +} + +func (t *TwoFactor) BeforeInsert() { + t.CreatedUnix = time.Now().Unix() +} + +func (t *TwoFactor) AfterSet(colName string, _ xorm.Cell) { + switch colName { + case "created_unix": + t.Created = time.Unix(t.CreatedUnix, 0).Local() + } +} + +// ValidateTOTP returns true if given passcode is valid for two-factor authentication token. +// It also returns possible validation error. +func (t *TwoFactor) ValidateTOTP(passcode string) (bool, error) { + secret, err := base64.StdEncoding.DecodeString(t.Secret) + if err != nil { + return false, fmt.Errorf("DecodeString: %v", err) + } + decryptSecret, err := com.AESGCMDecrypt(tool.MD5Bytes(setting.SecretKey), secret) + if err != nil { + return false, fmt.Errorf("AESGCMDecrypt: %v", err) + } + return totp.Validate(passcode, string(decryptSecret)), nil +} + +// IsUserEnabledTwoFactor returns true if user has enabled two-factor authentication. +func IsUserEnabledTwoFactor(userID int64) bool { + has, err := x.Where("user_id = ?", userID).Get(new(TwoFactor)) + if err != nil { + log.Error(2, "IsUserEnabledTwoFactor [user_id: %d]: %v", userID, err) + } + return has +} + +func generateRecoveryCodes(userID int64) ([]*TwoFactorRecoveryCode, error) { + recoveryCodes := make([]*TwoFactorRecoveryCode, 10) + for i := 0; i < 10; i++ { + code, err := tool.GetRandomString(10) + if err != nil { + return nil, fmt.Errorf("GetRandomString: %v", err) + } + recoveryCodes[i] = &TwoFactorRecoveryCode{ + UserID: userID, + Code: strings.ToLower(code[:5] + "-" + code[5:]), + } + } + return recoveryCodes, nil +} + +// NewTwoFactor creates a new two-factor authentication token and recovery codes for given user. +func NewTwoFactor(userID int64, secret string) error { + t := &TwoFactor{ + UserID: userID, + } + + // Encrypt secret + encryptSecret, err := com.AESGCMEncrypt(tool.MD5Bytes(setting.SecretKey), []byte(secret)) + if err != nil { + return fmt.Errorf("AESGCMEncrypt: %v", err) + } + t.Secret = base64.StdEncoding.EncodeToString(encryptSecret) + + recoveryCodes, err := generateRecoveryCodes(userID) + if err != nil { + return fmt.Errorf("generateRecoveryCodes: %v", err) + } + + sess := x.NewSession() + defer sess.Close() + if err = sess.Begin(); err != nil { + return err + } + + if _, err = sess.Insert(t); err != nil { + return fmt.Errorf("insert two-factor: %v", err) + } else if _, err = sess.Insert(recoveryCodes); err != nil { + return fmt.Errorf("insert recovery codes: %v", err) + } + + return sess.Commit() +} + +// GetTwoFactorByUserID returns two-factor authentication token of given user. +func GetTwoFactorByUserID(userID int64) (*TwoFactor, error) { + t := new(TwoFactor) + has, err := x.Where("user_id = ?", userID).Get(t) + if err != nil { + return nil, err + } else if !has { + return nil, errors.TwoFactorNotFound{userID} + } + + return t, nil +} + +// DeleteTwoFactor removes two-factor authentication token and recovery codes of given user. +func DeleteTwoFactor(userID int64) (err error) { + sess := x.NewSession() + defer sess.Close() + if err = sess.Begin(); err != nil { + return err + } + + if _, err = sess.Where("user_id = ?", userID).Delete(new(TwoFactor)); err != nil { + return fmt.Errorf("delete two-factor: %v", err) + } else if err = deleteRecoveryCodesByUserID(sess, userID); err != nil { + return fmt.Errorf("deleteRecoveryCodesByUserID: %v", err) + } + + return sess.Commit() +} + +// TwoFactorRecoveryCode represents a two-factor authentication recovery code. +type TwoFactorRecoveryCode struct { + ID int64 + UserID int64 + Code string `xorm:"VARCHAR(11)"` + IsUsed bool +} + +// GetRecoveryCodesByUserID returns all recovery codes of given user. +func GetRecoveryCodesByUserID(userID int64) ([]*TwoFactorRecoveryCode, error) { + recoveryCodes := make([]*TwoFactorRecoveryCode, 0, 10) + return recoveryCodes, x.Where("user_id = ?", userID).Find(&recoveryCodes) +} + +func deleteRecoveryCodesByUserID(e Engine, userID int64) error { + _, err := e.Where("user_id = ?", userID).Delete(new(TwoFactorRecoveryCode)) + return err +} + +// RegenerateRecoveryCodes regenerates new set of recovery codes for given user. +func RegenerateRecoveryCodes(userID int64) error { + recoveryCodes, err := generateRecoveryCodes(userID) + if err != nil { + return fmt.Errorf("generateRecoveryCodes: %v", err) + } + + sess := x.NewSession() + defer sess.Close() + if err = sess.Begin(); err != nil { + return err + } + + if err = deleteRecoveryCodesByUserID(sess, userID); err != nil { + return fmt.Errorf("deleteRecoveryCodesByUserID: %v", err) + } else if _, err = sess.Insert(recoveryCodes); err != nil { + return fmt.Errorf("insert new recovery codes: %v", err) + } + + return sess.Commit() +} + +// UseRecoveryCode validates recovery code of given user and marks it is used if valid. +func UseRecoveryCode(userID int64, code string) error { + recoveryCode := new(TwoFactorRecoveryCode) + has, err := x.Where("code = ?", code).And("is_used = ?", false).Get(recoveryCode) + if err != nil { + return fmt.Errorf("get unused code: %v", err) + } else if !has { + return errors.TwoFactorRecoveryCodeNotFound{code} + } + + recoveryCode.IsUsed = true + if _, err = x.Id(recoveryCode.ID).Cols("is_used").Update(recoveryCode); err != nil { + return fmt.Errorf("mark code as used: %v", err) + } + + return nil +} diff --git a/models/user.go b/models/user.go index 1c733d6e..d9a1e2a0 100644 --- a/models/user.go +++ b/models/user.go @@ -31,8 +31,8 @@ import ( "github.com/gogits/gogs/models/errors" "github.com/gogits/gogs/pkg/avatar" - "github.com/gogits/gogs/pkg/tool" "github.com/gogits/gogs/pkg/setting" + "github.com/gogits/gogs/pkg/tool" ) type UserType int @@ -404,6 +404,11 @@ func (u *User) IsPublicMember(orgId int64) bool { return IsPublicMembership(orgId, u.ID) } +// IsEnabledTwoFactor returns true if user has enabled two-factor authentication. +func (u *User) IsEnabledTwoFactor() bool { + return IsUserEnabledTwoFactor(u.ID) +} + func (u *User) getOrganizationCount(e Engine) (int64, error) { return e.Where("uid=?", u.ID).Count(new(OrgUser)) } @@ -479,7 +484,7 @@ func IsUserExist(uid int64, name string) (bool, error) { if len(name) == 0 { return false, nil } - return x.Where("id!=?", uid).Get(&User{LowerName: strings.ToLower(name)}) + return x.Where("id != ?", uid).Get(&User{LowerName: strings.ToLower(name)}) } // GetUserSalt returns a ramdom user salt token. |