two_factor.go 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205
  1. // Copyright 2015 - Present, The Gogs Authors. All rights reserved.
  2. // Copyright 2018 - Present, Gitote. All rights reserved.
  3. //
  4. // This source code is licensed under the MIT license found in the
  5. // LICENSE file in the root directory of this source tree.
  6. package models
  7. import (
  8. "encoding/base64"
  9. "fmt"
  10. "gitote/gitote/models/errors"
  11. "gitote/gitote/pkg/setting"
  12. "gitote/gitote/pkg/tool"
  13. "strings"
  14. "time"
  15. "github.com/go-xorm/xorm"
  16. "github.com/pquerna/otp/totp"
  17. "gitlab.com/gitote/com"
  18. log "gopkg.in/clog.v1"
  19. )
  20. // TwoFactor represents a two-factor authentication token.
  21. type TwoFactor struct {
  22. ID int64
  23. UserID int64 `xorm:"UNIQUE"`
  24. Secret string
  25. Created time.Time `xorm:"-" json:"-"`
  26. CreatedUnix int64
  27. }
  28. // BeforeInsert will be invoked by XORM before inserting a record
  29. func (t *TwoFactor) BeforeInsert() {
  30. t.CreatedUnix = time.Now().Unix()
  31. }
  32. // AfterSet is invoked from XORM after setting the values of all fields of this object.
  33. func (t *TwoFactor) AfterSet(colName string, _ xorm.Cell) {
  34. switch colName {
  35. case "created_unix":
  36. t.Created = time.Unix(t.CreatedUnix, 0).Local()
  37. }
  38. }
  39. // ValidateTOTP returns true if given passcode is valid for two-factor authentication token.
  40. // It also returns possible validation error.
  41. func (t *TwoFactor) ValidateTOTP(passcode string) (bool, error) {
  42. secret, err := base64.StdEncoding.DecodeString(t.Secret)
  43. if err != nil {
  44. return false, fmt.Errorf("DecodeString: %v", err)
  45. }
  46. decryptSecret, err := com.AESGCMDecrypt(tool.MD5Bytes(setting.SecretKey), secret)
  47. if err != nil {
  48. return false, fmt.Errorf("AESGCMDecrypt: %v", err)
  49. }
  50. return totp.Validate(passcode, string(decryptSecret)), nil
  51. }
  52. // IsUserEnabledTwoFactor returns true if user has enabled two-factor authentication.
  53. func IsUserEnabledTwoFactor(userID int64) bool {
  54. has, err := x.Where("user_id = ?", userID).Get(new(TwoFactor))
  55. if err != nil {
  56. log.Error(2, "IsUserEnabledTwoFactor [user_id: %d]: %v", userID, err)
  57. }
  58. return has
  59. }
  60. func generateRecoveryCodes(userID int64) ([]*TwoFactorRecoveryCode, error) {
  61. recoveryCodes := make([]*TwoFactorRecoveryCode, 10)
  62. for i := 0; i < 10; i++ {
  63. code, err := tool.RandomString(10)
  64. if err != nil {
  65. return nil, fmt.Errorf("RandomString: %v", err)
  66. }
  67. recoveryCodes[i] = &TwoFactorRecoveryCode{
  68. UserID: userID,
  69. Code: strings.ToLower(code[:5] + "-" + code[5:]),
  70. }
  71. }
  72. return recoveryCodes, nil
  73. }
  74. // NewTwoFactor creates a new two-factor authentication token and recovery codes for given user.
  75. func NewTwoFactor(userID int64, secret string) error {
  76. t := &TwoFactor{
  77. UserID: userID,
  78. }
  79. // Encrypt secret
  80. encryptSecret, err := com.AESGCMEncrypt(tool.MD5Bytes(setting.SecretKey), []byte(secret))
  81. if err != nil {
  82. return fmt.Errorf("AESGCMEncrypt: %v", err)
  83. }
  84. t.Secret = base64.StdEncoding.EncodeToString(encryptSecret)
  85. recoveryCodes, err := generateRecoveryCodes(userID)
  86. if err != nil {
  87. return fmt.Errorf("generateRecoveryCodes: %v", err)
  88. }
  89. sess := x.NewSession()
  90. defer sess.Close()
  91. if err = sess.Begin(); err != nil {
  92. return err
  93. }
  94. if _, err = sess.Insert(t); err != nil {
  95. return fmt.Errorf("insert two-factor: %v", err)
  96. } else if _, err = sess.Insert(recoveryCodes); err != nil {
  97. return fmt.Errorf("insert recovery codes: %v", err)
  98. }
  99. return sess.Commit()
  100. }
  101. // GetTwoFactorByUserID returns two-factor authentication token of given user.
  102. func GetTwoFactorByUserID(userID int64) (*TwoFactor, error) {
  103. t := new(TwoFactor)
  104. has, err := x.Where("user_id = ?", userID).Get(t)
  105. if err != nil {
  106. return nil, err
  107. } else if !has {
  108. return nil, errors.TwoFactorNotFound{userID}
  109. }
  110. return t, nil
  111. }
  112. // DeleteTwoFactor removes two-factor authentication token and recovery codes of given user.
  113. func DeleteTwoFactor(userID int64) (err error) {
  114. sess := x.NewSession()
  115. defer sess.Close()
  116. if err = sess.Begin(); err != nil {
  117. return err
  118. }
  119. if _, err = sess.Where("user_id = ?", userID).Delete(new(TwoFactor)); err != nil {
  120. return fmt.Errorf("delete two-factor: %v", err)
  121. } else if err = deleteRecoveryCodesByUserID(sess, userID); err != nil {
  122. return fmt.Errorf("deleteRecoveryCodesByUserID: %v", err)
  123. }
  124. return sess.Commit()
  125. }
  126. // TwoFactorRecoveryCode represents a two-factor authentication recovery code.
  127. type TwoFactorRecoveryCode struct {
  128. ID int64
  129. UserID int64
  130. Code string `xorm:"VARCHAR(11)"`
  131. IsUsed bool
  132. }
  133. // GetRecoveryCodesByUserID returns all recovery codes of given user.
  134. func GetRecoveryCodesByUserID(userID int64) ([]*TwoFactorRecoveryCode, error) {
  135. recoveryCodes := make([]*TwoFactorRecoveryCode, 0, 10)
  136. return recoveryCodes, x.Where("user_id = ?", userID).Find(&recoveryCodes)
  137. }
  138. func deleteRecoveryCodesByUserID(e Engine, userID int64) error {
  139. _, err := e.Where("user_id = ?", userID).Delete(new(TwoFactorRecoveryCode))
  140. return err
  141. }
  142. // RegenerateRecoveryCodes regenerates new set of recovery codes for given user.
  143. func RegenerateRecoveryCodes(userID int64) error {
  144. recoveryCodes, err := generateRecoveryCodes(userID)
  145. if err != nil {
  146. return fmt.Errorf("generateRecoveryCodes: %v", err)
  147. }
  148. sess := x.NewSession()
  149. defer sess.Close()
  150. if err = sess.Begin(); err != nil {
  151. return err
  152. }
  153. if err = deleteRecoveryCodesByUserID(sess, userID); err != nil {
  154. return fmt.Errorf("deleteRecoveryCodesByUserID: %v", err)
  155. } else if _, err = sess.Insert(recoveryCodes); err != nil {
  156. return fmt.Errorf("insert new recovery codes: %v", err)
  157. }
  158. return sess.Commit()
  159. }
  160. // UseRecoveryCode validates recovery code of given user and marks it is used if valid.
  161. func UseRecoveryCode(userID int64, code string) error {
  162. recoveryCode := new(TwoFactorRecoveryCode)
  163. has, err := x.Where("code = ?", code).And("is_used = ?", false).Get(recoveryCode)
  164. if err != nil {
  165. return fmt.Errorf("get unused code: %v", err)
  166. } else if !has {
  167. return errors.TwoFactorRecoveryCodeNotFound{code}
  168. }
  169. recoveryCode.IsUsed = true
  170. if _, err = x.Id(recoveryCode.ID).Cols("is_used").Update(recoveryCode); err != nil {
  171. return fmt.Errorf("mark code as used: %v", err)
  172. }
  173. return nil
  174. }