mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
72a3f1e0d7
When no rule is set to two_factor in ACL configuration, 2FA is considered disabled. Therefore, when a user cannot be redirected correctly because no target URL is provided or the URL is unsafe, the user is either redirected to the default URL or to the 'already authenticated' view instead of the second factor view. Fixes #683
31 lines
1.0 KiB
Go
31 lines
1.0 KiB
Go
package handlers
|
|
|
|
import (
|
|
"github.com/authelia/authelia/internal/authentication"
|
|
"github.com/authelia/authelia/internal/middlewares"
|
|
)
|
|
|
|
// ExtendedConfigurationBody the content returned by extended configuration endpoint
|
|
type ExtendedConfigurationBody struct {
|
|
AvailableMethods MethodList `json:"available_methods"`
|
|
|
|
// SecondFactorEnabled whether second factor is enabled
|
|
SecondFactorEnabled bool `json:"second_factor_enabled"`
|
|
}
|
|
|
|
// ExtendedConfigurationGet get the extended configuration accessible to authenticated users.
|
|
func ExtendedConfigurationGet(ctx *middlewares.AutheliaCtx) {
|
|
body := ExtendedConfigurationBody{}
|
|
body.AvailableMethods = MethodList{authentication.TOTP, authentication.U2F}
|
|
|
|
if ctx.Configuration.DuoAPI != nil {
|
|
body.AvailableMethods = append(body.AvailableMethods, authentication.Push)
|
|
}
|
|
|
|
body.SecondFactorEnabled = ctx.Providers.Authorizer.IsSecondFactorEnabled()
|
|
ctx.Logger.Tracef("Second factor enabled: %v", body.SecondFactorEnabled)
|
|
|
|
ctx.Logger.Tracef("Available methods are %s", body.AvailableMethods)
|
|
ctx.SetJSONBody(body)
|
|
}
|