123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263 |
- package user
- import (
- "bytes"
- "crypto/sha1"
- "encoding/hex"
- "fmt"
- "github.com/0xJacky/Nginx-UI/internal/cache"
- "github.com/0xJacky/Nginx-UI/internal/crypto"
- "github.com/0xJacky/Nginx-UI/model"
- "github.com/google/uuid"
- "github.com/pkg/errors"
- "github.com/pquerna/otp/totp"
- "time"
- )
- var (
- ErrOTPCode = errors.New("invalid otp code")
- ErrRecoveryCode = errors.New("invalid recovery code")
- )
- func VerifyOTP(user *model.Auth, otp, recoveryCode string) (err error) {
- if otp != "" {
- decrypted, err := crypto.AesDecrypt(user.OTPSecret)
- if err != nil {
- return err
- }
- if ok := totp.Validate(otp, string(decrypted)); !ok {
- return ErrOTPCode
- }
- } else {
- recoverCode, err := hex.DecodeString(recoveryCode)
- if err != nil {
- return err
- }
- k := sha1.Sum(user.OTPSecret)
- if !bytes.Equal(k[:], recoverCode) {
- return ErrRecoveryCode
- }
- }
- return
- }
- func secureSessionIDCacheKey(sessionId string) string {
- return fmt.Sprintf("otp_secure_session:_%s", sessionId)
- }
- func SetSecureSessionID(userId int) (sessionId string) {
- sessionId = uuid.NewString()
- cache.Set(secureSessionIDCacheKey(sessionId), userId, 5*time.Minute)
- return
- }
- func VerifySecureSessionID(sessionId string, userId int) bool {
- if v, ok := cache.Get(secureSessionIDCacheKey(sessionId)); ok {
- if v.(int) == userId {
- return true
- }
- }
- return false
- }
|