| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147 | package userimport (	"bytes"	"crypto/sha1"	"encoding/base64"	"encoding/hex"	"fmt"	"github.com/0xJacky/Nginx-UI/api"	"github.com/0xJacky/Nginx-UI/internal/crypto"	"github.com/0xJacky/Nginx-UI/query"	"github.com/0xJacky/Nginx-UI/settings"	"github.com/gin-gonic/gin"	"github.com/pquerna/otp"	"github.com/pquerna/otp/totp"	"image/jpeg"	"net/http"	"strings")func GenerateTOTP(c *gin.Context) {	u := api.CurrentUser(c)	issuer := fmt.Sprintf("Nginx UI %s", settings.NodeSettings.Name)	issuer = strings.TrimSpace(issuer)	otpOpts := totp.GenerateOpts{		Issuer:      issuer,		AccountName: u.Name,		Period:      30, // seconds		Digits:      otp.DigitsSix,		Algorithm:   otp.AlgorithmSHA1,	}	otpKey, err := totp.Generate(otpOpts)	if err != nil {		api.ErrHandler(c, err)		return	}	qrCode, err := otpKey.Image(512, 512)	if err != nil {		api.ErrHandler(c, err)		return	}	// Encode the image to a buffer	var buf []byte	buffer := bytes.NewBuffer(buf)	err = jpeg.Encode(buffer, qrCode, nil)	if err != nil {		fmt.Println("Error encoding image:", err)		return	}	// Convert the buffer to a base64 string	base64Str := "data:image/jpeg;base64," + base64.StdEncoding.EncodeToString(buffer.Bytes())	c.JSON(http.StatusOK, gin.H{		"secret":  otpKey.Secret(),		"qr_code": base64Str,	})}func EnrollTOTP(c *gin.Context) {	cUser := api.CurrentUser(c)	if cUser.EnabledOTP() {		c.JSON(http.StatusBadRequest, gin.H{			"message": "User already enrolled",		})		return	}	if settings.NodeSettings.Demo {		c.JSON(http.StatusBadRequest, gin.H{			"message": "This feature is disabled in demo mode",		})		return	}	var json struct {		Secret   string `json:"secret" binding:"required"`		Passcode string `json:"passcode" binding:"required"`	}	if !api.BindAndValid(c, &json) {		return	}	if ok := totp.Validate(json.Passcode, json.Secret); !ok {		c.JSON(http.StatusNotAcceptable, gin.H{			"message": "Invalid passcode",		})		return	}	ciphertext, err := crypto.AesEncrypt([]byte(json.Secret))	if err != nil {		api.ErrHandler(c, err)		return	}	u := query.User	_, err = u.Where(u.ID.Eq(cUser.ID)).Update(u.OTPSecret, ciphertext)	if err != nil {		api.ErrHandler(c, err)		return	}	recoveryCode := sha1.Sum(ciphertext)	c.JSON(http.StatusOK, gin.H{		"message":       "ok",		"recovery_code": hex.EncodeToString(recoveryCode[:]),	})}func ResetOTP(c *gin.Context) {	var json struct {		RecoveryCode string `json:"recovery_code"`	}	if !api.BindAndValid(c, &json) {		return	}	recoverCode, err := hex.DecodeString(json.RecoveryCode)	if err != nil {		api.ErrHandler(c, err)		return	}	cUser := api.CurrentUser(c)	k := sha1.Sum(cUser.OTPSecret)	if !bytes.Equal(k[:], recoverCode) {		c.JSON(http.StatusBadRequest, gin.H{			"message": "Invalid recovery code",		})		return	}	u := query.User	_, err = u.Where(u.ID.Eq(cUser.ID)).UpdateSimple(u.OTPSecret.Null())	if err != nil {		api.ErrHandler(c, err)		return	}	c.JSON(http.StatusOK, gin.H{		"message": "ok",	})}
 |