otp.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147
  1. package user
  2. import (
  3. "bytes"
  4. "crypto/sha1"
  5. "encoding/base64"
  6. "encoding/hex"
  7. "fmt"
  8. "github.com/0xJacky/Nginx-UI/api"
  9. "github.com/0xJacky/Nginx-UI/internal/crypto"
  10. "github.com/0xJacky/Nginx-UI/query"
  11. "github.com/0xJacky/Nginx-UI/settings"
  12. "github.com/gin-gonic/gin"
  13. "github.com/pquerna/otp"
  14. "github.com/pquerna/otp/totp"
  15. "image/jpeg"
  16. "net/http"
  17. "strings"
  18. )
  19. func GenerateTOTP(c *gin.Context) {
  20. u := api.CurrentUser(c)
  21. issuer := fmt.Sprintf("Nginx UI %s", settings.NodeSettings.Name)
  22. issuer = strings.TrimSpace(issuer)
  23. otpOpts := totp.GenerateOpts{
  24. Issuer: issuer,
  25. AccountName: u.Name,
  26. Period: 30, // seconds
  27. Digits: otp.DigitsSix,
  28. Algorithm: otp.AlgorithmSHA1,
  29. }
  30. otpKey, err := totp.Generate(otpOpts)
  31. if err != nil {
  32. api.ErrHandler(c, err)
  33. return
  34. }
  35. qrCode, err := otpKey.Image(512, 512)
  36. if err != nil {
  37. api.ErrHandler(c, err)
  38. return
  39. }
  40. // Encode the image to a buffer
  41. var buf []byte
  42. buffer := bytes.NewBuffer(buf)
  43. err = jpeg.Encode(buffer, qrCode, nil)
  44. if err != nil {
  45. fmt.Println("Error encoding image:", err)
  46. return
  47. }
  48. // Convert the buffer to a base64 string
  49. base64Str := "data:image/jpeg;base64," + base64.StdEncoding.EncodeToString(buffer.Bytes())
  50. c.JSON(http.StatusOK, gin.H{
  51. "secret": otpKey.Secret(),
  52. "qr_code": base64Str,
  53. })
  54. }
  55. func EnrollTOTP(c *gin.Context) {
  56. cUser := api.CurrentUser(c)
  57. if cUser.EnabledOTP() {
  58. c.JSON(http.StatusBadRequest, gin.H{
  59. "message": "User already enrolled",
  60. })
  61. return
  62. }
  63. if settings.NodeSettings.Demo {
  64. c.JSON(http.StatusBadRequest, gin.H{
  65. "message": "This feature is disabled in demo mode",
  66. })
  67. return
  68. }
  69. var json struct {
  70. Secret string `json:"secret" binding:"required"`
  71. Passcode string `json:"passcode" binding:"required"`
  72. }
  73. if !api.BindAndValid(c, &json) {
  74. return
  75. }
  76. if ok := totp.Validate(json.Passcode, json.Secret); !ok {
  77. c.JSON(http.StatusNotAcceptable, gin.H{
  78. "message": "Invalid passcode",
  79. })
  80. return
  81. }
  82. ciphertext, err := crypto.AesEncrypt([]byte(json.Secret))
  83. if err != nil {
  84. api.ErrHandler(c, err)
  85. return
  86. }
  87. u := query.User
  88. _, err = u.Where(u.ID.Eq(cUser.ID)).Update(u.OTPSecret, ciphertext)
  89. if err != nil {
  90. api.ErrHandler(c, err)
  91. return
  92. }
  93. recoveryCode := sha1.Sum(ciphertext)
  94. c.JSON(http.StatusOK, gin.H{
  95. "message": "ok",
  96. "recovery_code": hex.EncodeToString(recoveryCode[:]),
  97. })
  98. }
  99. func ResetOTP(c *gin.Context) {
  100. var json struct {
  101. RecoveryCode string `json:"recovery_code"`
  102. }
  103. if !api.BindAndValid(c, &json) {
  104. return
  105. }
  106. recoverCode, err := hex.DecodeString(json.RecoveryCode)
  107. if err != nil {
  108. api.ErrHandler(c, err)
  109. return
  110. }
  111. cUser := api.CurrentUser(c)
  112. k := sha1.Sum(cUser.OTPSecret)
  113. if !bytes.Equal(k[:], recoverCode) {
  114. c.JSON(http.StatusBadRequest, gin.H{
  115. "message": "Invalid recovery code",
  116. })
  117. return
  118. }
  119. u := query.User
  120. _, err = u.Where(u.ID.Eq(cUser.ID)).UpdateSimple(u.OTPSecret.Null())
  121. if err != nil {
  122. api.ErrHandler(c, err)
  123. return
  124. }
  125. c.JSON(http.StatusOK, gin.H{
  126. "message": "ok",
  127. })
  128. }