logo

mastofe

My custom branche(s) on git.pleroma.social/pleroma/mastofe
commit: 23b997ae55655ccae6a9a9e424a3596c9165a481
parent: 36c57ef8af4f82057d5916a29995f781c0500ff7
Author: Eugen Rochko <eugen@zeonfederated.com>
Date:   Sat, 28 Jan 2017 20:43:38 +0100

Split 2FA login into two prompts

Diffstat:

Mapp/controllers/auth/sessions_controller.rb55++++++++++++++++++++++++++++++++++++++++++++++++++++---
Mapp/views/auth/sessions/new.html.haml1-
Aapp/views/auth/sessions/two_factor.html.haml10++++++++++
Mconfig/locales/en.yml1+
Mconfig/locales/simple_form.en.yml2+-
5 files changed, 64 insertions(+), 5 deletions(-)

diff --git a/app/controllers/auth/sessions_controller.rb b/app/controllers/auth/sessions_controller.rb @@ -5,18 +5,33 @@ class Auth::SessionsController < Devise::SessionsController layout 'auth' - before_action :configure_sign_in_params, only: [:create] + skip_before_action :require_no_authentication, only: [:create] + prepend_before_action :authenticate_with_two_factor, if: :two_factor_enabled?, only: [:create] def create super do |resource| remember_me(resource) + flash[:notice] = nil end end + def destroy + super + flash[:notice] = nil + end + protected - def configure_sign_in_params - devise_parameter_sanitizer.permit(:sign_in, keys: [:otp_attempt]) + def find_user + if session[:otp_user_id] + User.find(session[:otp_user_id]) + elsif user_params[:email] + User.find_by(email: user_params[:email]) + end + end + + def user_params + params.require(:user).permit(:email, :password, :otp_attempt) end def after_sign_in_path_for(_resource) @@ -28,4 +43,38 @@ class Auth::SessionsController < Devise::SessionsController last_url || root_path end end + + def two_factor_enabled? + find_user.try(:otp_required_for_login?) + end + + def valid_otp_attempt?(user) + user.validate_and_consume_otp!(user_params[:otp_attempt]) + end + + def authenticate_with_two_factor + user = self.resource = find_user + + if user_params[:otp_attempt].present? && session[:otp_user_id] + authenticate_with_two_factor_via_otp(user) + elsif user && user.valid_password?(user_params[:password]) + prompt_for_two_factor(user) + end + end + + def authenticate_with_two_factor_via_otp(user) + if valid_otp_attempt?(user) + session.delete(:otp_user_id) + remember_me(user) + sign_in(user) + else + flash.now[:alert] = I18n.t('users.invalid_otp_token') + prompt_for_two_factor(user) + end + end + + def prompt_for_two_factor(user) + session[:otp_user_id] = user.id + render :two_factor + end end diff --git a/app/views/auth/sessions/new.html.haml b/app/views/auth/sessions/new.html.haml @@ -4,7 +4,6 @@ = simple_form_for(resource, as: resource_name, url: session_path(resource_name)) do |f| = f.input :email, autofocus: true, placeholder: t('simple_form.labels.defaults.email'), required: true, input_html: { 'aria-label' => t('simple_form.labels.defaults.email') } = f.input :password, placeholder: t('simple_form.labels.defaults.password'), required: true, input_html: { 'aria-label' => t('simple_form.labels.defaults.password') } - = f.input :otp_attempt, placeholder: t('simple_form.labels.defaults.otp_attempt'), input_html: { 'aria-label' => t('simple_form.labels.defaults.otp_attempt') } .actions = f.button :button, t('auth.login'), type: :submit diff --git a/app/views/auth/sessions/two_factor.html.haml b/app/views/auth/sessions/two_factor.html.haml @@ -0,0 +1,10 @@ +- content_for :page_title do + = t('auth.login') + += simple_form_for(resource, as: resource_name, url: session_path(resource_name), method: :post) do |f| + = f.input :otp_attempt, placeholder: t('simple_form.labels.defaults.otp_attempt'), input_html: { 'aria-label' => t('simple_form.labels.defaults.otp_attempt') }, required: true, autofocus: true, autocomplete: 'off' + + .actions + = f.button :button, t('auth.login'), type: :submit + +.form-footer= render "auth/shared/links" diff --git a/config/locales/en.yml b/config/locales/en.yml @@ -114,5 +114,6 @@ en: instructions_html: "<strong>Scan this QR code into Google Authenticator or a similiar app on your phone</strong>. From now on, that app will generate tokens that you will have to enter when logging in." users: invalid_email: The e-mail address is invalid + invalid_otp_token: Invalid two-factor code will_paginate: page_gap: "&hellip;" diff --git a/config/locales/simple_form.en.yml b/config/locales/simple_form.en.yml @@ -21,7 +21,7 @@ en: locked: Make account private new_password: New password note: Bio - otp_attempt: If enabled, two-factor token + otp_attempt: Two-factor code password: Password username: Username interactions: