Record successful 2FA authentication in session cookie
All checks were successful
continuous-integration/drone/push Build is passing
All checks were successful
continuous-integration/drone/push Build is passing
This commit is contained in:
parent
b704e9868b
commit
5644e40763
@ -41,7 +41,9 @@ pub async fn auth_webauthn(
|
||||
.await
|
||||
.unwrap();
|
||||
|
||||
SessionIdentity(Some(&id)).set_status(&http_req, SessionStatus::SignedIn);
|
||||
let session = SessionIdentity(Some(&id));
|
||||
session.record_2fa_auth(&http_req);
|
||||
session.set_status(&http_req, SessionStatus::SignedIn);
|
||||
logger.log(Action::LoginWebauthnAttempt {
|
||||
success: true,
|
||||
user_id,
|
||||
|
@ -258,7 +258,7 @@ pub async fn reset_password_route(
|
||||
|
||||
let user_id = SessionIdentity(id.as_ref()).user_id();
|
||||
|
||||
// Check if user is setting a new password
|
||||
// Check if user is setting a new password
|
||||
if let Some(req) = &req {
|
||||
if req.password.len() < MIN_PASS_LEN {
|
||||
danger = Some("Password is too short!".to_string());
|
||||
@ -408,7 +408,9 @@ pub async fn login_with_otp(
|
||||
.await
|
||||
.unwrap();
|
||||
|
||||
SessionIdentity(id.as_ref()).set_status(&http_req, SessionStatus::SignedIn);
|
||||
let session = SessionIdentity(id.as_ref());
|
||||
session.record_2fa_auth(&http_req);
|
||||
session.set_status(&http_req, SessionStatus::SignedIn);
|
||||
logger.log(Action::OTPLoginAttempt {
|
||||
success: true,
|
||||
user: &user,
|
||||
|
@ -13,12 +13,14 @@ use crate::data::current_user::CurrentUser;
|
||||
use crate::data::totp_key::TotpKey;
|
||||
use crate::data::user::User;
|
||||
use crate::data::webauthn_manager::WebAuthManagerReq;
|
||||
use crate::utils::time::fmt_time;
|
||||
|
||||
#[derive(Template)]
|
||||
#[template(path = "settings/two_factors_page.html")]
|
||||
struct TwoFactorsPage<'a> {
|
||||
p: BaseSettingsPage<'a>,
|
||||
user: &'a User,
|
||||
last_2fa_auth: Option<String>,
|
||||
}
|
||||
|
||||
#[derive(Template)]
|
||||
@ -46,6 +48,7 @@ pub async fn two_factors_route(user: CurrentUser) -> impl Responder {
|
||||
TwoFactorsPage {
|
||||
p: BaseSettingsPage::get("Two factor auth", &user, None, None),
|
||||
user: user.deref(),
|
||||
last_2fa_auth: user.last_2fa_auth.map(fmt_time),
|
||||
}
|
||||
.render()
|
||||
.unwrap(),
|
||||
|
@ -13,11 +13,15 @@ use crate::actors::users_actor::UsersActor;
|
||||
use crate::data::session_identity::SessionIdentity;
|
||||
use crate::data::user::User;
|
||||
|
||||
pub struct CurrentUser(User);
|
||||
pub struct CurrentUser {
|
||||
user: User,
|
||||
pub auth_time: u64,
|
||||
pub last_2fa_auth: Option<u64>,
|
||||
}
|
||||
|
||||
impl From<CurrentUser> for User {
|
||||
fn from(user: CurrentUser) -> Self {
|
||||
user.0
|
||||
user.user
|
||||
}
|
||||
}
|
||||
|
||||
@ -25,7 +29,7 @@ impl Deref for CurrentUser {
|
||||
type Target = User;
|
||||
|
||||
fn deref(&self) -> &Self::Target {
|
||||
&self.0
|
||||
&self.user
|
||||
}
|
||||
}
|
||||
|
||||
@ -40,7 +44,10 @@ impl FromRequest for CurrentUser {
|
||||
let identity: Identity = Identity::from_request(req, payload)
|
||||
.into_inner()
|
||||
.expect("Failed to get identity!");
|
||||
let user_id = SessionIdentity(Some(&identity)).user_id();
|
||||
let id = SessionIdentity(Some(&identity));
|
||||
let user_id = id.user_id();
|
||||
let last_2fa_auth = id.last_2fa_auth();
|
||||
let auth_time = id.auth_time();
|
||||
|
||||
Box::pin(async move {
|
||||
let user = match user_actor
|
||||
@ -57,7 +64,11 @@ impl FromRequest for CurrentUser {
|
||||
}
|
||||
};
|
||||
|
||||
Ok(CurrentUser(user))
|
||||
Ok(CurrentUser {
|
||||
user,
|
||||
auth_time,
|
||||
last_2fa_auth,
|
||||
})
|
||||
})
|
||||
}
|
||||
}
|
||||
|
@ -24,6 +24,7 @@ pub struct SessionIdentityData {
|
||||
pub id: Option<UserID>,
|
||||
pub is_admin: bool,
|
||||
pub auth_time: u64,
|
||||
pub last_2fa_auth: Option<u64>,
|
||||
pub status: SessionStatus,
|
||||
}
|
||||
|
||||
@ -75,6 +76,7 @@ impl<'a> SessionIdentity<'a> {
|
||||
&SessionIdentityData {
|
||||
id: Some(user.uid.clone()),
|
||||
is_admin: user.admin,
|
||||
last_2fa_auth: None,
|
||||
auth_time: time(),
|
||||
status,
|
||||
},
|
||||
@ -87,6 +89,12 @@ impl<'a> SessionIdentity<'a> {
|
||||
self.set_session_data(req, &sess);
|
||||
}
|
||||
|
||||
pub fn record_2fa_auth(&self, req: &HttpRequest) {
|
||||
let mut sess = self.get_session_data().unwrap_or_default();
|
||||
sess.last_2fa_auth = Some(time());
|
||||
self.set_session_data(req, &sess);
|
||||
}
|
||||
|
||||
pub fn is_authenticated(&self) -> bool {
|
||||
self.get_session_data()
|
||||
.map(|s| s.status == SessionStatus::SignedIn)
|
||||
@ -119,4 +127,8 @@ impl<'a> SessionIdentity<'a> {
|
||||
pub fn auth_time(&self) -> u64 {
|
||||
self.get_session_data().unwrap_or_default().auth_time
|
||||
}
|
||||
|
||||
pub fn last_2fa_auth(&self) -> Option<u64> {
|
||||
self.get_session_data().unwrap_or_default().last_2fa_auth
|
||||
}
|
||||
}
|
||||
|
@ -26,7 +26,9 @@
|
||||
<tbody>
|
||||
{% for f in user.two_factor %}
|
||||
<tr id="factor-{{ f.id.0 }}">
|
||||
<td><img src="{{ f.type_image() }}" alt="Factor icon" style="height: 1.5em; margin-right: 0.5em;" />{{ f.type_str() }}</td>
|
||||
<td><img src="{{ f.type_image() }}" alt="Factor icon" style="height: 1.5em; margin-right: 0.5em;"/>{{
|
||||
f.type_str() }}
|
||||
</td>
|
||||
<td>{{ f.name }}</td>
|
||||
<td><a href="javascript:delete_factor('{{ f.id.0 }}');">Delete</a></td>
|
||||
</tr>
|
||||
@ -53,7 +55,9 @@
|
||||
{% for e in user.get_formatted_2fa_successful_logins() %}
|
||||
<tr>
|
||||
<td>{{ e.ip }}</td>
|
||||
<td><locateip ip="{{ e.ip }}"></locateip></td>
|
||||
<td>
|
||||
<locateip ip="{{ e.ip }}"></locateip>
|
||||
</td>
|
||||
<td>{{ e.fmt_time() }}</td>
|
||||
<td>{% if e.can_bypass_2fa %}YES{% else %}NO{% endif %}</td>
|
||||
</tr>
|
||||
@ -63,6 +67,10 @@
|
||||
{% endif %}
|
||||
</div>
|
||||
|
||||
{% if let Some(last_2fa_auth) = last_2fa_auth %}
|
||||
<p>Last successful 2FA authentication on this browser: {{ last_2fa_auth }}</p>
|
||||
{% endif %}
|
||||
|
||||
<script>
|
||||
async function delete_factor(id) {
|
||||
if (!confirm("Do you really want to remove this factor?"))
|
||||
@ -72,7 +80,7 @@
|
||||
const res = await fetch("/settings/api/two_factor/delete_factor", {
|
||||
method: "post",
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Content-Type': 'application/json',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
id: id,
|
||||
@ -84,7 +92,7 @@
|
||||
|
||||
if (res.status == 200)
|
||||
document.getElementById("factor-" + id).remove();
|
||||
} catch(e) {
|
||||
} catch (e) {
|
||||
console.error(e);
|
||||
alert("Failed to remove factor!");
|
||||
}
|
||||
@ -104,7 +112,7 @@
|
||||
|
||||
if (res.status == 200)
|
||||
document.getElementById("2fa_history_container").remove();
|
||||
} catch(e) {
|
||||
} catch (e) {
|
||||
console.error(e);
|
||||
alert("Failed to clear 2FA history!");
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user