1
0

two_factor.go 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108
  1. package database
  2. import (
  3. "encoding/base64"
  4. "fmt"
  5. "time"
  6. "github.com/cockroachdb/errors"
  7. "github.com/pquerna/otp/totp"
  8. "github.com/unknwon/com"
  9. "gorm.io/gorm"
  10. "gogs.io/gogs/internal/conf"
  11. "gogs.io/gogs/internal/cryptoutil"
  12. )
  13. // TwoFactor is a 2FA token of a user.
  14. type TwoFactor struct {
  15. ID int64 `gorm:"primaryKey"`
  16. UserID int64 `xorm:"UNIQUE" gorm:"unique"`
  17. Secret string
  18. Created time.Time `xorm:"-" gorm:"-" json:"-"`
  19. CreatedUnix int64
  20. }
  21. // ValidateTOTP returns true if given passcode is valid for two-factor authentication token.
  22. // It also returns possible validation error.
  23. func (t *TwoFactor) ValidateTOTP(passcode string) (bool, error) {
  24. secret, err := base64.StdEncoding.DecodeString(t.Secret)
  25. if err != nil {
  26. return false, errors.Newf("DecodeString: %v", err)
  27. }
  28. decryptSecret, err := com.AESGCMDecrypt(cryptoutil.MD5Bytes(conf.Security.SecretKey), secret)
  29. if err != nil {
  30. return false, errors.Newf("AESGCMDecrypt: %v", err)
  31. }
  32. return totp.Validate(passcode, string(decryptSecret)), nil
  33. }
  34. // DeleteTwoFactor removes two-factor authentication token and recovery codes of given user.
  35. func DeleteTwoFactor(userID int64) (err error) {
  36. sess := x.NewSession()
  37. defer sess.Close()
  38. if err = sess.Begin(); err != nil {
  39. return err
  40. }
  41. if _, err = sess.Where("user_id = ?", userID).Delete(new(TwoFactor)); err != nil {
  42. return errors.Newf("delete two-factor: %v", err)
  43. } else if err = deleteRecoveryCodesByUserID(sess, userID); err != nil {
  44. return errors.Newf("deleteRecoveryCodesByUserID: %v", err)
  45. }
  46. return sess.Commit()
  47. }
  48. // TwoFactorRecoveryCode represents a two-factor authentication recovery code.
  49. type TwoFactorRecoveryCode struct {
  50. ID int64
  51. UserID int64
  52. Code string `xorm:"VARCHAR(11)"`
  53. IsUsed bool
  54. }
  55. // GetRecoveryCodesByUserID returns all recovery codes of given user.
  56. func GetRecoveryCodesByUserID(userID int64) ([]*TwoFactorRecoveryCode, error) {
  57. recoveryCodes := make([]*TwoFactorRecoveryCode, 0, 10)
  58. return recoveryCodes, x.Where("user_id = ?", userID).Find(&recoveryCodes)
  59. }
  60. func deleteRecoveryCodesByUserID(e *gorm.DB, userID int64) error {
  61. return e.Where("user_id = ?", userID).Delete(&TwoFactorRecoveryCode{}).Error
  62. }
  63. // RegenerateRecoveryCodes regenerates new set of recovery codes for given user.
  64. func RegenerateRecoveryCodes(userID int64) error {
  65. recoveryCodes, err := generateRecoveryCodes(userID, 10)
  66. if err != nil {
  67. return errors.Newf("generateRecoveryCodes: %v", err)
  68. }
  69. sess := x.NewSession()
  70. defer sess.Close()
  71. if err = sess.Begin(); err != nil {
  72. return err
  73. }
  74. if err = deleteRecoveryCodesByUserID(sess, userID); err != nil {
  75. return errors.Newf("deleteRecoveryCodesByUserID: %v", err)
  76. } else if _, err = sess.Insert(recoveryCodes); err != nil {
  77. return errors.Newf("insert new recovery codes: %v", err)
  78. }
  79. return sess.Commit()
  80. }
  81. type ErrTwoFactorRecoveryCodeNotFound struct {
  82. Code string
  83. }
  84. func IsTwoFactorRecoveryCodeNotFound(err error) bool {
  85. _, ok := err.(ErrTwoFactorRecoveryCodeNotFound)
  86. return ok
  87. }
  88. func (err ErrTwoFactorRecoveryCodeNotFound) Error() string {
  89. return fmt.Sprintf("two-factor recovery code does not found [code: %s]", err.Code)
  90. }