aboutsummaryrefslogtreecommitdiff
path: root/models
diff options
context:
space:
mode:
Diffstat (limited to 'models')
-rw-r--r--models/errors/two_factor.go33
-rw-r--r--models/models.go4
-rw-r--r--models/two_factor.go201
-rw-r--r--models/user.go9
4 files changed, 243 insertions, 4 deletions
diff --git a/models/errors/two_factor.go b/models/errors/two_factor.go
new file mode 100644
index 00000000..02cdcf5c
--- /dev/null
+++ b/models/errors/two_factor.go
@@ -0,0 +1,33 @@
+// Copyright 2017 The Gogs Authors. All rights reserved.
+// Use of this source code is governed by a MIT-style
+// license that can be found in the LICENSE file.
+
+package errors
+
+import "fmt"
+
+type TwoFactorNotFound struct {
+ UserID int64
+}
+
+func IsTwoFactorNotFound(err error) bool {
+ _, ok := err.(TwoFactorNotFound)
+ return ok
+}
+
+func (err TwoFactorNotFound) Error() string {
+ return fmt.Sprintf("two-factor authentication does not found [user_id: %d]", err.UserID)
+}
+
+type TwoFactorRecoveryCodeNotFound struct {
+ Code string
+}
+
+func IsTwoFactorRecoveryCodeNotFound(err error) bool {
+ _, ok := err.(TwoFactorRecoveryCodeNotFound)
+ return ok
+}
+
+func (err TwoFactorRecoveryCodeNotFound) Error() string {
+ return fmt.Sprintf("two-factor recovery code does not found [code: %s]", err.Code)
+}
diff --git a/models/models.go b/models/models.go
index 2eea56b1..98a4fd23 100644
--- a/models/models.go
+++ b/models/models.go
@@ -27,7 +27,7 @@ import (
"github.com/gogits/gogs/pkg/setting"
)
-// Engine represents a xorm engine or session.
+// Engine represents a XORM engine or session.
type Engine interface {
Delete(interface{}) (int64, error)
Exec(string, ...interface{}) (sql.Result, error)
@@ -64,7 +64,7 @@ var (
func init() {
tables = append(tables,
- new(User), new(PublicKey), new(AccessToken),
+ new(User), new(PublicKey), new(AccessToken), new(TwoFactor), new(TwoFactorRecoveryCode),
new(Repository), new(DeployKey), new(Collaboration), new(Access), new(Upload),
new(Watch), new(Star), new(Follow), new(Action),
new(Issue), new(PullRequest), new(Comment), new(Attachment), new(IssueUser),
diff --git a/models/two_factor.go b/models/two_factor.go
new file mode 100644
index 00000000..2f6e7991
--- /dev/null
+++ b/models/two_factor.go
@@ -0,0 +1,201 @@
+// Copyright 2017 The Gogs Authors. All rights reserved.
+// Use of this source code is governed by a MIT-style
+// license that can be found in the LICENSE file.
+
+package models
+
+import (
+ "encoding/base64"
+ "fmt"
+ "strings"
+ "time"
+
+ "github.com/Unknwon/com"
+ "github.com/go-xorm/xorm"
+ "github.com/pquerna/otp/totp"
+ log "gopkg.in/clog.v1"
+
+ "github.com/gogits/gogs/models/errors"
+ "github.com/gogits/gogs/pkg/setting"
+ "github.com/gogits/gogs/pkg/tool"
+)
+
+// TwoFactor represents a two-factor authentication token.
+type TwoFactor struct {
+ ID int64
+ UserID int64 `xorm:"UNIQUE"`
+ Secret string
+ Created time.Time `xorm:"-"`
+ CreatedUnix int64
+}
+
+func (t *TwoFactor) BeforeInsert() {
+ t.CreatedUnix = time.Now().Unix()
+}
+
+func (t *TwoFactor) AfterSet(colName string, _ xorm.Cell) {
+ switch colName {
+ case "created_unix":
+ t.Created = time.Unix(t.CreatedUnix, 0).Local()
+ }
+}
+
+// ValidateTOTP returns true if given passcode is valid for two-factor authentication token.
+// It also returns possible validation error.
+func (t *TwoFactor) ValidateTOTP(passcode string) (bool, error) {
+ secret, err := base64.StdEncoding.DecodeString(t.Secret)
+ if err != nil {
+ return false, fmt.Errorf("DecodeString: %v", err)
+ }
+ decryptSecret, err := com.AESGCMDecrypt(tool.MD5Bytes(setting.SecretKey), secret)
+ if err != nil {
+ return false, fmt.Errorf("AESGCMDecrypt: %v", err)
+ }
+ return totp.Validate(passcode, string(decryptSecret)), nil
+}
+
+// IsUserEnabledTwoFactor returns true if user has enabled two-factor authentication.
+func IsUserEnabledTwoFactor(userID int64) bool {
+ has, err := x.Where("user_id = ?", userID).Get(new(TwoFactor))
+ if err != nil {
+ log.Error(2, "IsUserEnabledTwoFactor [user_id: %d]: %v", userID, err)
+ }
+ return has
+}
+
+func generateRecoveryCodes(userID int64) ([]*TwoFactorRecoveryCode, error) {
+ recoveryCodes := make([]*TwoFactorRecoveryCode, 10)
+ for i := 0; i < 10; i++ {
+ code, err := tool.GetRandomString(10)
+ if err != nil {
+ return nil, fmt.Errorf("GetRandomString: %v", err)
+ }
+ recoveryCodes[i] = &TwoFactorRecoveryCode{
+ UserID: userID,
+ Code: strings.ToLower(code[:5] + "-" + code[5:]),
+ }
+ }
+ return recoveryCodes, nil
+}
+
+// NewTwoFactor creates a new two-factor authentication token and recovery codes for given user.
+func NewTwoFactor(userID int64, secret string) error {
+ t := &TwoFactor{
+ UserID: userID,
+ }
+
+ // Encrypt secret
+ encryptSecret, err := com.AESGCMEncrypt(tool.MD5Bytes(setting.SecretKey), []byte(secret))
+ if err != nil {
+ return fmt.Errorf("AESGCMEncrypt: %v", err)
+ }
+ t.Secret = base64.StdEncoding.EncodeToString(encryptSecret)
+
+ recoveryCodes, err := generateRecoveryCodes(userID)
+ if err != nil {
+ return fmt.Errorf("generateRecoveryCodes: %v", err)
+ }
+
+ sess := x.NewSession()
+ defer sess.Close()
+ if err = sess.Begin(); err != nil {
+ return err
+ }
+
+ if _, err = sess.Insert(t); err != nil {
+ return fmt.Errorf("insert two-factor: %v", err)
+ } else if _, err = sess.Insert(recoveryCodes); err != nil {
+ return fmt.Errorf("insert recovery codes: %v", err)
+ }
+
+ return sess.Commit()
+}
+
+// GetTwoFactorByUserID returns two-factor authentication token of given user.
+func GetTwoFactorByUserID(userID int64) (*TwoFactor, error) {
+ t := new(TwoFactor)
+ has, err := x.Where("user_id = ?", userID).Get(t)
+ if err != nil {
+ return nil, err
+ } else if !has {
+ return nil, errors.TwoFactorNotFound{userID}
+ }
+
+ return t, nil
+}
+
+// DeleteTwoFactor removes two-factor authentication token and recovery codes of given user.
+func DeleteTwoFactor(userID int64) (err error) {
+ sess := x.NewSession()
+ defer sess.Close()
+ if err = sess.Begin(); err != nil {
+ return err
+ }
+
+ if _, err = sess.Where("user_id = ?", userID).Delete(new(TwoFactor)); err != nil {
+ return fmt.Errorf("delete two-factor: %v", err)
+ } else if err = deleteRecoveryCodesByUserID(sess, userID); err != nil {
+ return fmt.Errorf("deleteRecoveryCodesByUserID: %v", err)
+ }
+
+ return sess.Commit()
+}
+
+// TwoFactorRecoveryCode represents a two-factor authentication recovery code.
+type TwoFactorRecoveryCode struct {
+ ID int64
+ UserID int64
+ Code string `xorm:"VARCHAR(11)"`
+ IsUsed bool
+}
+
+// GetRecoveryCodesByUserID returns all recovery codes of given user.
+func GetRecoveryCodesByUserID(userID int64) ([]*TwoFactorRecoveryCode, error) {
+ recoveryCodes := make([]*TwoFactorRecoveryCode, 0, 10)
+ return recoveryCodes, x.Where("user_id = ?", userID).Find(&recoveryCodes)
+}
+
+func deleteRecoveryCodesByUserID(e Engine, userID int64) error {
+ _, err := e.Where("user_id = ?", userID).Delete(new(TwoFactorRecoveryCode))
+ return err
+}
+
+// RegenerateRecoveryCodes regenerates new set of recovery codes for given user.
+func RegenerateRecoveryCodes(userID int64) error {
+ recoveryCodes, err := generateRecoveryCodes(userID)
+ if err != nil {
+ return fmt.Errorf("generateRecoveryCodes: %v", err)
+ }
+
+ sess := x.NewSession()
+ defer sess.Close()
+ if err = sess.Begin(); err != nil {
+ return err
+ }
+
+ if err = deleteRecoveryCodesByUserID(sess, userID); err != nil {
+ return fmt.Errorf("deleteRecoveryCodesByUserID: %v", err)
+ } else if _, err = sess.Insert(recoveryCodes); err != nil {
+ return fmt.Errorf("insert new recovery codes: %v", err)
+ }
+
+ return sess.Commit()
+}
+
+// UseRecoveryCode validates recovery code of given user and marks it is used if valid.
+func UseRecoveryCode(userID int64, code string) error {
+ recoveryCode := new(TwoFactorRecoveryCode)
+ has, err := x.Where("code = ?", code).And("is_used = ?", false).Get(recoveryCode)
+ if err != nil {
+ return fmt.Errorf("get unused code: %v", err)
+ } else if !has {
+ return errors.TwoFactorRecoveryCodeNotFound{code}
+ }
+
+ recoveryCode.IsUsed = true
+ if _, err = x.Id(recoveryCode.ID).Cols("is_used").Update(recoveryCode); err != nil {
+ return fmt.Errorf("mark code as used: %v", err)
+ }
+
+ return nil
+}
diff --git a/models/user.go b/models/user.go
index 1c733d6e..d9a1e2a0 100644
--- a/models/user.go
+++ b/models/user.go
@@ -31,8 +31,8 @@ import (
"github.com/gogits/gogs/models/errors"
"github.com/gogits/gogs/pkg/avatar"
- "github.com/gogits/gogs/pkg/tool"
"github.com/gogits/gogs/pkg/setting"
+ "github.com/gogits/gogs/pkg/tool"
)
type UserType int
@@ -404,6 +404,11 @@ func (u *User) IsPublicMember(orgId int64) bool {
return IsPublicMembership(orgId, u.ID)
}
+// IsEnabledTwoFactor returns true if user has enabled two-factor authentication.
+func (u *User) IsEnabledTwoFactor() bool {
+ return IsUserEnabledTwoFactor(u.ID)
+}
+
func (u *User) getOrganizationCount(e Engine) (int64, error) {
return e.Where("uid=?", u.ID).Count(new(OrgUser))
}
@@ -479,7 +484,7 @@ func IsUserExist(uid int64, name string) (bool, error) {
if len(name) == 0 {
return false, nil
}
- return x.Where("id!=?", uid).Get(&User{LowerName: strings.ToLower(name)})
+ return x.Where("id != ?", uid).Get(&User{LowerName: strings.ToLower(name)})
}
// GetUserSalt returns a ramdom user salt token.