You can not select more than 25 topics Topics must start with a chinese character,a letter or number, can include dashes ('-') and can be up to 35 characters long.

twofactor.go 3.0 kB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117
  1. // Copyright 2017 The Gitea Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package models
  5. import (
  6. "crypto/md5"
  7. "crypto/subtle"
  8. "encoding/base64"
  9. "github.com/Unknwon/com"
  10. "github.com/pquerna/otp/totp"
  11. "code.gitea.io/gitea/modules/base"
  12. "code.gitea.io/gitea/modules/setting"
  13. "code.gitea.io/gitea/modules/util"
  14. )
  15. // TwoFactor represents a two-factor authentication token.
  16. type TwoFactor struct {
  17. ID int64 `xorm:"pk autoincr"`
  18. UID int64 `xorm:"UNIQUE"`
  19. Secret string
  20. ScratchToken string
  21. CreatedUnix util.TimeStamp `xorm:"INDEX created"`
  22. UpdatedUnix util.TimeStamp `xorm:"INDEX updated"`
  23. }
  24. // GenerateScratchToken recreates the scratch token the user is using.
  25. func (t *TwoFactor) GenerateScratchToken() error {
  26. token, err := base.GetRandomString(8)
  27. if err != nil {
  28. return err
  29. }
  30. t.ScratchToken = token
  31. return nil
  32. }
  33. // VerifyScratchToken verifies if the specified scratch token is valid.
  34. func (t *TwoFactor) VerifyScratchToken(token string) bool {
  35. if len(token) == 0 {
  36. return false
  37. }
  38. return subtle.ConstantTimeCompare([]byte(token), []byte(t.ScratchToken)) == 1
  39. }
  40. func (t *TwoFactor) getEncryptionKey() []byte {
  41. k := md5.Sum([]byte(setting.SecretKey))
  42. return k[:]
  43. }
  44. // SetSecret sets the 2FA secret.
  45. func (t *TwoFactor) SetSecret(secret string) error {
  46. secretBytes, err := com.AESGCMEncrypt(t.getEncryptionKey(), []byte(secret))
  47. if err != nil {
  48. return err
  49. }
  50. t.Secret = base64.StdEncoding.EncodeToString(secretBytes)
  51. return nil
  52. }
  53. // ValidateTOTP validates the provided passcode.
  54. func (t *TwoFactor) ValidateTOTP(passcode string) (bool, error) {
  55. decodedStoredSecret, err := base64.StdEncoding.DecodeString(t.Secret)
  56. if err != nil {
  57. return false, err
  58. }
  59. secret, err := com.AESGCMDecrypt(t.getEncryptionKey(), decodedStoredSecret)
  60. if err != nil {
  61. return false, err
  62. }
  63. secretStr := string(secret)
  64. return totp.Validate(passcode, secretStr), nil
  65. }
  66. // NewTwoFactor creates a new two-factor authentication token.
  67. func NewTwoFactor(t *TwoFactor) error {
  68. err := t.GenerateScratchToken()
  69. if err != nil {
  70. return err
  71. }
  72. _, err = x.Insert(t)
  73. return err
  74. }
  75. // UpdateTwoFactor updates a two-factor authentication token.
  76. func UpdateTwoFactor(t *TwoFactor) error {
  77. _, err := x.ID(t.ID).AllCols().Update(t)
  78. return err
  79. }
  80. // GetTwoFactorByUID returns the two-factor authentication token associated with
  81. // the user, if any.
  82. func GetTwoFactorByUID(uid int64) (*TwoFactor, error) {
  83. twofa := &TwoFactor{UID: uid}
  84. has, err := x.Get(twofa)
  85. if err != nil {
  86. return nil, err
  87. } else if !has {
  88. return nil, ErrTwoFactorNotEnrolled{uid}
  89. }
  90. return twofa, nil
  91. }
  92. // DeleteTwoFactorByID deletes two-factor authentication token by given ID.
  93. func DeleteTwoFactorByID(id, userID int64) error {
  94. cnt, err := x.ID(id).Delete(&TwoFactor{
  95. UID: userID,
  96. })
  97. if err != nil {
  98. return err
  99. } else if cnt != 1 {
  100. return ErrTwoFactorNotEnrolled{userID}
  101. }
  102. return nil
  103. }