| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131 | // Copyright 2020 The Gogs Authors. All rights reserved.// Use of this source code is governed by a MIT-style// license that can be found in the LICENSE file.package databaseimport (	"context"	"encoding/base64"	"fmt"	"strings"	"time"	"github.com/pkg/errors"	"gorm.io/gorm"	log "unknwon.dev/clog/v2"	"gogs.io/gogs/internal/cryptoutil"	"gogs.io/gogs/internal/errutil"	"gogs.io/gogs/internal/strutil")// BeforeCreate implements the GORM create hook.func (t *TwoFactor) BeforeCreate(tx *gorm.DB) error {	if t.CreatedUnix == 0 {		t.CreatedUnix = tx.NowFunc().Unix()	}	return nil}// AfterFind implements the GORM query hook.func (t *TwoFactor) AfterFind(_ *gorm.DB) error {	t.Created = time.Unix(t.CreatedUnix, 0).Local()	return nil}// TwoFactorsStore is the storage layer for two-factor authentication settings.type TwoFactorsStore struct {	db *gorm.DB}func newTwoFactorsStore(db *gorm.DB) *TwoFactorsStore {	return &TwoFactorsStore{db: db}}// Create creates a new 2FA token and recovery codes for given user. The "key"// is used to encrypt and later decrypt given "secret", which should be// configured in site-level and change of the "key" will break all existing 2FA// tokens.func (s *TwoFactorsStore) Create(ctx context.Context, userID int64, key, secret string) error {	encrypted, err := cryptoutil.AESGCMEncrypt(cryptoutil.MD5Bytes(key), []byte(secret))	if err != nil {		return errors.Wrap(err, "encrypt secret")	}	tf := &TwoFactor{		UserID: userID,		Secret: base64.StdEncoding.EncodeToString(encrypted),	}	recoveryCodes, err := generateRecoveryCodes(userID, 10)	if err != nil {		return errors.Wrap(err, "generate recovery codes")	}	return s.db.WithContext(ctx).Transaction(func(tx *gorm.DB) error {		err := tx.Create(tf).Error		if err != nil {			return err		}		return tx.Create(&recoveryCodes).Error	})}var _ errutil.NotFound = (*ErrTwoFactorNotFound)(nil)type ErrTwoFactorNotFound struct {	args errutil.Args}func IsErrTwoFactorNotFound(err error) bool {	return errors.As(err, &ErrTwoFactorNotFound{})}func (err ErrTwoFactorNotFound) Error() string {	return fmt.Sprintf("2FA does not found: %v", err.args)}func (ErrTwoFactorNotFound) NotFound() bool {	return true}// GetByUserID returns the 2FA token of given user. It returns// ErrTwoFactorNotFound when not found.func (s *TwoFactorsStore) GetByUserID(ctx context.Context, userID int64) (*TwoFactor, error) {	tf := new(TwoFactor)	err := s.db.WithContext(ctx).Where("user_id = ?", userID).First(tf).Error	if err != nil {		if errors.Is(err, gorm.ErrRecordNotFound) {			return nil, ErrTwoFactorNotFound{args: errutil.Args{"userID": userID}}		}		return nil, err	}	return tf, nil}// IsEnabled returns true if the user has enabled 2FA.func (s *TwoFactorsStore) IsEnabled(ctx context.Context, userID int64) bool {	var count int64	err := s.db.WithContext(ctx).Model(new(TwoFactor)).Where("user_id = ?", userID).Count(&count).Error	if err != nil {		log.Error("Failed to count two factors [user_id: %d]: %v", userID, err)	}	return count > 0}// generateRecoveryCodes generates N number of recovery codes for 2FA.func generateRecoveryCodes(userID int64, n int) ([]*TwoFactorRecoveryCode, error) {	recoveryCodes := make([]*TwoFactorRecoveryCode, n)	for i := 0; i < n; i++ {		code, err := strutil.RandomChars(10)		if err != nil {			return nil, errors.Wrap(err, "generate random characters")		}		recoveryCodes[i] = &TwoFactorRecoveryCode{			UserID: userID,			Code:   strings.ToLower(code[:5] + "-" + code[5:]),		}	}	return recoveryCodes, nil}
 |