mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
29e54c231b
* [MISC] Template global config and refactor some /api endpoints * /api/configuration has been removed in favour of templating said global config * /api/configuration/extended has been renamed to /api/configuration and display_name has been removed * /api/user/info has been modified to include display_name Co-authored-by: Clement Michaud <clement.michaud34@gmail.com>
130 lines
2.9 KiB
Go
130 lines
2.9 KiB
Go
package handlers
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
"sync"
|
|
|
|
"github.com/sirupsen/logrus"
|
|
|
|
"github.com/authelia/authelia/internal/authentication"
|
|
"github.com/authelia/authelia/internal/middlewares"
|
|
"github.com/authelia/authelia/internal/storage"
|
|
"github.com/authelia/authelia/internal/utils"
|
|
)
|
|
|
|
func loadInfo(username string, storageProvider storage.Provider, userInfo *UserInfo, logger *logrus.Entry) []error {
|
|
var wg sync.WaitGroup
|
|
|
|
wg.Add(3)
|
|
|
|
errors := make([]error, 0)
|
|
|
|
go func() {
|
|
defer wg.Done()
|
|
|
|
method, err := storageProvider.LoadPreferred2FAMethod(username)
|
|
if err != nil {
|
|
errors = append(errors, err)
|
|
logger.Error(err)
|
|
|
|
return
|
|
}
|
|
|
|
if method == "" {
|
|
userInfo.Method = authentication.PossibleMethods[0]
|
|
} else {
|
|
userInfo.Method = method
|
|
}
|
|
}()
|
|
|
|
go func() {
|
|
defer wg.Done()
|
|
|
|
_, _, err := storageProvider.LoadU2FDeviceHandle(username)
|
|
if err != nil {
|
|
if err == storage.ErrNoU2FDeviceHandle {
|
|
return
|
|
}
|
|
|
|
errors = append(errors, err)
|
|
logger.Error(err)
|
|
|
|
return
|
|
}
|
|
|
|
userInfo.HasU2F = true
|
|
}()
|
|
|
|
go func() {
|
|
defer wg.Done()
|
|
|
|
_, err := storageProvider.LoadTOTPSecret(username)
|
|
if err != nil {
|
|
if err == storage.ErrNoTOTPSecret {
|
|
return
|
|
}
|
|
|
|
errors = append(errors, err)
|
|
logger.Error(err)
|
|
|
|
return
|
|
}
|
|
|
|
userInfo.HasTOTP = true
|
|
}()
|
|
|
|
wg.Wait()
|
|
|
|
return errors
|
|
}
|
|
|
|
// UserInfoGet get the info related to the user identified by the session.
|
|
func UserInfoGet(ctx *middlewares.AutheliaCtx) {
|
|
userSession := ctx.GetSession()
|
|
|
|
userInfo := UserInfo{}
|
|
errors := loadInfo(userSession.Username, ctx.Providers.StorageProvider, &userInfo, ctx.Logger)
|
|
|
|
if len(errors) > 0 {
|
|
ctx.Error(fmt.Errorf("Unable to load user information"), operationFailedMessage)
|
|
return
|
|
}
|
|
|
|
userInfo.DisplayName = userSession.DisplayName
|
|
|
|
ctx.SetJSONBody(userInfo) //nolint:errcheck // TODO: Legacy code, consider refactoring time permitting.
|
|
}
|
|
|
|
// MethodBody the selected 2FA method.
|
|
type MethodBody struct {
|
|
Method string `json:"method" valid:"required"`
|
|
}
|
|
|
|
// MethodPreferencePost update the user preferences regarding 2FA method.
|
|
func MethodPreferencePost(ctx *middlewares.AutheliaCtx) {
|
|
bodyJSON := MethodBody{}
|
|
|
|
err := ctx.ParseBody(&bodyJSON)
|
|
if err != nil {
|
|
ctx.Error(err, operationFailedMessage)
|
|
return
|
|
}
|
|
|
|
if !utils.IsStringInSlice(bodyJSON.Method, authentication.PossibleMethods) {
|
|
ctx.Error(fmt.Errorf("Unknown method '%s', it should be one of %s", bodyJSON.Method, strings.Join(authentication.PossibleMethods, ", ")), operationFailedMessage)
|
|
return
|
|
}
|
|
|
|
userSession := ctx.GetSession()
|
|
ctx.Logger.Debugf("Save new preferred 2FA method of user %s to %s", userSession.Username, bodyJSON.Method)
|
|
err = ctx.Providers.StorageProvider.SavePreferred2FAMethod(userSession.Username, bodyJSON.Method)
|
|
|
|
if err != nil {
|
|
ctx.Error(fmt.Errorf("Unable to save new preferred 2FA method: %s", err), operationFailedMessage)
|
|
return
|
|
}
|
|
|
|
ctx.ReplyOK()
|
|
}
|