discourse/app/controllers/second_factor_controller.rb
Jeff Wong f4f8a293e7 FEATURE: Implement 2factor login TOTP
implemented review items.

Blocking previous codes - valid 2-factor auth tokens can only be authenticated once/30 seconds.
I played with updating the “last used” any time the token was attempted but that seemed to be overkill, and frustrating as to why a token would fail.
Translatable texts.
Move second factor logic to a helper class.
Move second factor specific controller endpoints to its own controller.
Move serialization logic for 2-factor details in admin user views.
Add a login ember component for de-duplication
Fix up code formatting
Change verbiage of google authenticator

add controller tests:
second factor controller tests
change email tests
change password tests
admin login tests

add qunit tests - password reset, preferences

fix: check for 2factor on change email controller
fix: email controller - only show second factor errors on attempt
fix: check against 'true' to enable second factor.

Add modal for explaining what 2fa with links to Google Authenticator/FreeOTP

add two factor to email signin link

rate limit if second factor token present

add rate limiter test for second factor attempts
2018-02-21 09:04:07 +08:00

52 lines
1.7 KiB
Ruby

class SecondFactorController < ApplicationController
def create
RateLimiter.new(nil, "login-hr-#{request.remote_ip}", SiteSetting.max_logins_per_ip_per_hour, 1.hour).performed!
RateLimiter.new(nil, "login-min-#{request.remote_ip}", SiteSetting.max_logins_per_ip_per_minute, 1.minute).performed!
if user = User.find_by_username_or_email(params[:login])
unless user.confirm_password?(params[:password])
return invalid_credentials
end
qrcode = RQRCode::QRCode.new(SecondFactorHelper.provisioning_uri(user))
qrcode_svg = qrcode.as_svg(
offset: 0,
color: '000',
shape_rendering: 'crispEdges',
module_size: 4
)
render json: { key: user.user_second_factor.data, qr: qrcode_svg }
end
end
def update
params.require(:token)
user = fetch_user_from_params
unless SecondFactorHelper.authenticate(user, params[:token])
RateLimiter.new(nil, "second-factor-min-#{request.remote_ip}", 3, 1.minute).performed!
render json: { error: I18n.t("login.invalid_second_factor_code") }
return
end
if params[:enable] == "true"
SecondFactorHelper.create_totp(user)
user.user_second_factor.enabled = true
user.user_second_factor.save!
return render json: { result: "ok", action: "enabled" }
else
user.user_second_factor.delete
Jobs.enqueue(
:critical_user_email,
type: :account_second_factor_disabled,
user_id: user.id
)
return render json: { result: "ok", action: "disabled" }
end
end
private
def invalid_credentials
render json: { error: I18n.t("login.incorrect_username_email_or_password") }
end
end