package handlers import ( "fmt" "github.com/clems4ever/authelia/internal/middlewares" "github.com/clems4ever/authelia/internal/session" "github.com/pquerna/otp/totp" ) // identityRetrieverFromSession retriever computing the identity from the cookie session. func identityRetrieverFromSession(ctx *middlewares.AutheliaCtx) (*session.Identity, error) { userSession := ctx.GetSession() if len(userSession.Emails) == 0 { return nil, fmt.Errorf("User %s does not have any email address", userSession.Username) } return &session.Identity{ Username: userSession.Username, Email: userSession.Emails[0], }, nil } func isTokenUserValidFor2FARegistration(ctx *middlewares.AutheliaCtx, username string) bool { return ctx.GetSession().Username == username } // SecondFactorTOTPIdentityStart the handler for initiating the identity validation. var SecondFactorTOTPIdentityStart = middlewares.IdentityVerificationStart(middlewares.IdentityVerificationStartArgs{ MailSubject: "[Authelia] Register your mobile", MailTitle: "Register your mobile", MailButtonContent: "Register", TargetEndpoint: "/one-time-password-registration", ActionClaim: TOTPRegistrationAction, IdentityRetrieverFunc: identityRetrieverFromSession, }) func secondFactorTOTPIdentityFinish(ctx *middlewares.AutheliaCtx, username string) { key, err := totp.Generate(totp.GenerateOpts{ Issuer: ctx.Configuration.TOTP.Issuer, AccountName: username, SecretSize: 32, }) if err != nil { ctx.Error(fmt.Errorf("Unable to generate TOTP key: %s", err), unableToRegisterOneTimePasswordMessage) return } err = ctx.Providers.StorageProvider.SaveTOTPSecret(username, key.Secret()) if err != nil { ctx.Error(fmt.Errorf("Unable to save TOTP secret in DB: %s", err), unableToRegisterOneTimePasswordMessage) return } response := TOTPKeyResponse{ OTPAuthURL: key.URL(), Base32Secret: key.Secret(), } ctx.SetJSONBody(response) } // SecondFactorTOTPIdentityFinish the handler for finishing the identity validation var SecondFactorTOTPIdentityFinish = middlewares.IdentityVerificationFinish( middlewares.IdentityVerificationFinishArgs{ ActionClaim: TOTPRegistrationAction, IsTokenUserValidFunc: isTokenUserValidFor2FARegistration, }, secondFactorTOTPIdentityFinish)