| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201 | 
							- // Copyright 2017 The Gogs Authors. All rights reserved.
 
- // Use of this source code is governed by a MIT-style
 
- // license that can be found in the LICENSE file.
 
- package models
 
- import (
 
- 	"encoding/base64"
 
- 	"fmt"
 
- 	"strings"
 
- 	"time"
 
- 	"github.com/Unknwon/com"
 
- 	"github.com/go-xorm/xorm"
 
- 	"github.com/pquerna/otp/totp"
 
- 	log "gopkg.in/clog.v1"
 
- 	"github.com/gogits/gogs/models/errors"
 
- 	"github.com/gogits/gogs/pkg/setting"
 
- 	"github.com/gogits/gogs/pkg/tool"
 
- )
 
- // TwoFactor represents a two-factor authentication token.
 
- type TwoFactor struct {
 
- 	ID          int64
 
- 	UserID      int64 `xorm:"UNIQUE"`
 
- 	Secret      string
 
- 	Created     time.Time `xorm:"-"`
 
- 	CreatedUnix int64
 
- }
 
- func (t *TwoFactor) BeforeInsert() {
 
- 	t.CreatedUnix = time.Now().Unix()
 
- }
 
- func (t *TwoFactor) AfterSet(colName string, _ xorm.Cell) {
 
- 	switch colName {
 
- 	case "created_unix":
 
- 		t.Created = time.Unix(t.CreatedUnix, 0).Local()
 
- 	}
 
- }
 
- // ValidateTOTP returns true if given passcode is valid for two-factor authentication token.
 
- // It also returns possible validation error.
 
- func (t *TwoFactor) ValidateTOTP(passcode string) (bool, error) {
 
- 	secret, err := base64.StdEncoding.DecodeString(t.Secret)
 
- 	if err != nil {
 
- 		return false, fmt.Errorf("DecodeString: %v", err)
 
- 	}
 
- 	decryptSecret, err := com.AESGCMDecrypt(tool.MD5Bytes(setting.SecretKey), secret)
 
- 	if err != nil {
 
- 		return false, fmt.Errorf("AESGCMDecrypt: %v", err)
 
- 	}
 
- 	return totp.Validate(passcode, string(decryptSecret)), nil
 
- }
 
- // IsUserEnabledTwoFactor returns true if user has enabled two-factor authentication.
 
- func IsUserEnabledTwoFactor(userID int64) bool {
 
- 	has, err := x.Where("user_id = ?", userID).Get(new(TwoFactor))
 
- 	if err != nil {
 
- 		log.Error(2, "IsUserEnabledTwoFactor [user_id: %d]: %v", userID, err)
 
- 	}
 
- 	return has
 
- }
 
- func generateRecoveryCodes(userID int64) ([]*TwoFactorRecoveryCode, error) {
 
- 	recoveryCodes := make([]*TwoFactorRecoveryCode, 10)
 
- 	for i := 0; i < 10; i++ {
 
- 		code, err := tool.RandomString(10)
 
- 		if err != nil {
 
- 			return nil, fmt.Errorf("RandomString: %v", err)
 
- 		}
 
- 		recoveryCodes[i] = &TwoFactorRecoveryCode{
 
- 			UserID: userID,
 
- 			Code:   strings.ToLower(code[:5] + "-" + code[5:]),
 
- 		}
 
- 	}
 
- 	return recoveryCodes, nil
 
- }
 
- // NewTwoFactor creates a new two-factor authentication token and recovery codes for given user.
 
- func NewTwoFactor(userID int64, secret string) error {
 
- 	t := &TwoFactor{
 
- 		UserID: userID,
 
- 	}
 
- 	// Encrypt secret
 
- 	encryptSecret, err := com.AESGCMEncrypt(tool.MD5Bytes(setting.SecretKey), []byte(secret))
 
- 	if err != nil {
 
- 		return fmt.Errorf("AESGCMEncrypt: %v", err)
 
- 	}
 
- 	t.Secret = base64.StdEncoding.EncodeToString(encryptSecret)
 
- 	recoveryCodes, err := generateRecoveryCodes(userID)
 
- 	if err != nil {
 
- 		return fmt.Errorf("generateRecoveryCodes: %v", err)
 
- 	}
 
- 	sess := x.NewSession()
 
- 	defer sess.Close()
 
- 	if err = sess.Begin(); err != nil {
 
- 		return err
 
- 	}
 
- 	if _, err = sess.Insert(t); err != nil {
 
- 		return fmt.Errorf("insert two-factor: %v", err)
 
- 	} else if _, err = sess.Insert(recoveryCodes); err != nil {
 
- 		return fmt.Errorf("insert recovery codes: %v", err)
 
- 	}
 
- 	return sess.Commit()
 
- }
 
- // GetTwoFactorByUserID returns two-factor authentication token of given user.
 
- func GetTwoFactorByUserID(userID int64) (*TwoFactor, error) {
 
- 	t := new(TwoFactor)
 
- 	has, err := x.Where("user_id = ?", userID).Get(t)
 
- 	if err != nil {
 
- 		return nil, err
 
- 	} else if !has {
 
- 		return nil, errors.TwoFactorNotFound{userID}
 
- 	}
 
- 	return t, nil
 
- }
 
- // DeleteTwoFactor removes two-factor authentication token and recovery codes of given user.
 
- func DeleteTwoFactor(userID int64) (err error) {
 
- 	sess := x.NewSession()
 
- 	defer sess.Close()
 
- 	if err = sess.Begin(); err != nil {
 
- 		return err
 
- 	}
 
- 	if _, err = sess.Where("user_id = ?", userID).Delete(new(TwoFactor)); err != nil {
 
- 		return fmt.Errorf("delete two-factor: %v", err)
 
- 	} else if err = deleteRecoveryCodesByUserID(sess, userID); err != nil {
 
- 		return fmt.Errorf("deleteRecoveryCodesByUserID: %v", err)
 
- 	}
 
- 	return sess.Commit()
 
- }
 
- // TwoFactorRecoveryCode represents a two-factor authentication recovery code.
 
- type TwoFactorRecoveryCode struct {
 
- 	ID     int64
 
- 	UserID int64
 
- 	Code   string `xorm:"VARCHAR(11)"`
 
- 	IsUsed bool
 
- }
 
- // GetRecoveryCodesByUserID returns all recovery codes of given user.
 
- func GetRecoveryCodesByUserID(userID int64) ([]*TwoFactorRecoveryCode, error) {
 
- 	recoveryCodes := make([]*TwoFactorRecoveryCode, 0, 10)
 
- 	return recoveryCodes, x.Where("user_id = ?", userID).Find(&recoveryCodes)
 
- }
 
- func deleteRecoveryCodesByUserID(e Engine, userID int64) error {
 
- 	_, err := e.Where("user_id = ?", userID).Delete(new(TwoFactorRecoveryCode))
 
- 	return err
 
- }
 
- // RegenerateRecoveryCodes regenerates new set of recovery codes for given user.
 
- func RegenerateRecoveryCodes(userID int64) error {
 
- 	recoveryCodes, err := generateRecoveryCodes(userID)
 
- 	if err != nil {
 
- 		return fmt.Errorf("generateRecoveryCodes: %v", err)
 
- 	}
 
- 	sess := x.NewSession()
 
- 	defer sess.Close()
 
- 	if err = sess.Begin(); err != nil {
 
- 		return err
 
- 	}
 
- 	if err = deleteRecoveryCodesByUserID(sess, userID); err != nil {
 
- 		return fmt.Errorf("deleteRecoveryCodesByUserID: %v", err)
 
- 	} else if _, err = sess.Insert(recoveryCodes); err != nil {
 
- 		return fmt.Errorf("insert new recovery codes: %v", err)
 
- 	}
 
- 	return sess.Commit()
 
- }
 
- // UseRecoveryCode validates recovery code of given user and marks it is used if valid.
 
- func UseRecoveryCode(userID int64, code string) error {
 
- 	recoveryCode := new(TwoFactorRecoveryCode)
 
- 	has, err := x.Where("code = ?", code).And("is_used = ?", false).Get(recoveryCode)
 
- 	if err != nil {
 
- 		return fmt.Errorf("get unused code: %v", err)
 
- 	} else if !has {
 
- 		return errors.TwoFactorRecoveryCodeNotFound{code}
 
- 	}
 
- 	recoveryCode.IsUsed = true
 
- 	if _, err = x.Id(recoveryCode.ID).Cols("is_used").Update(recoveryCode); err != nil {
 
- 		return fmt.Errorf("mark code as used: %v", err)
 
- 	}
 
- 	return nil
 
- }
 
 
  |