Compare commits
2 commits
45f33b8b46
...
50cbce92fc
Author | SHA1 | Date | |
---|---|---|---|
50cbce92fc | |||
e457e979ff |
16 changed files with 452 additions and 134 deletions
|
@ -3,6 +3,7 @@ package admin
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
"net/url"
|
||||||
"os"
|
"os"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
@ -15,9 +16,12 @@ import (
|
||||||
func accountHandler(app *model.AppState) http.Handler {
|
func accountHandler(app *model.AppState) http.Handler {
|
||||||
mux := http.NewServeMux()
|
mux := http.NewServeMux()
|
||||||
|
|
||||||
|
mux.Handle("/totp-setup", totpSetupHandler(app))
|
||||||
|
mux.Handle("/totp-confirm", totpConfirmHandler(app))
|
||||||
|
mux.Handle("/totp-delete/", http.StripPrefix("/totp-delete", totpDeleteHandler(app)))
|
||||||
|
|
||||||
mux.Handle("/password", changePasswordHandler(app))
|
mux.Handle("/password", changePasswordHandler(app))
|
||||||
mux.Handle("/delete", deleteAccountHandler(app))
|
mux.Handle("/delete", deleteAccountHandler(app))
|
||||||
mux.Handle("/", accountIndexHandler(app))
|
|
||||||
|
|
||||||
return mux
|
return mux
|
||||||
}
|
}
|
||||||
|
@ -37,6 +41,13 @@ func accountIndexHandler(app *model.AppState) http.Handler {
|
||||||
TOTPs []model.TOTP
|
TOTPs []model.TOTP
|
||||||
}
|
}
|
||||||
|
|
||||||
|
sessionMessage := session.Message
|
||||||
|
sessionError := session.Error
|
||||||
|
controller.SetSessionMessage(app.DB, session, "")
|
||||||
|
controller.SetSessionError(app.DB, session, "")
|
||||||
|
session.Message = sessionMessage
|
||||||
|
session.Error = sessionError
|
||||||
|
|
||||||
err = pages["account"].Execute(w, accountResponse{
|
err = pages["account"].Execute(w, accountResponse{
|
||||||
Session: session,
|
Session: session,
|
||||||
TOTPs: totps,
|
TOTPs: totps,
|
||||||
|
@ -57,18 +68,39 @@ func changePasswordHandler(app *model.AppState) http.Handler {
|
||||||
|
|
||||||
session := r.Context().Value("session").(*model.Session)
|
session := r.Context().Value("session").(*model.Session)
|
||||||
|
|
||||||
|
controller.SetSessionMessage(app.DB, session, "")
|
||||||
|
controller.SetSessionError(app.DB, session, "")
|
||||||
|
|
||||||
r.ParseForm()
|
r.ParseForm()
|
||||||
|
|
||||||
currentPassword := r.Form.Get("current-password")
|
currentPassword := r.Form.Get("current-password")
|
||||||
if err := bcrypt.CompareHashAndPassword([]byte(session.Account.Password), []byte(currentPassword)); err != nil {
|
if err := bcrypt.CompareHashAndPassword([]byte(session.Account.Password), []byte(currentPassword)); err != nil {
|
||||||
controller.SetSessionMessage(app.DB, session, "Incorrect password.")
|
controller.SetSessionError(app.DB, session, "Incorrect password.")
|
||||||
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
newPassword := r.Form.Get("new-password")
|
newPassword := r.Form.Get("new-password")
|
||||||
|
|
||||||
controller.SetSessionMessage(app.DB, session, fmt.Sprintf("Updating password to <code>%s</code>", newPassword))
|
hashedPassword, err := bcrypt.GenerateFromPassword([]byte(newPassword), bcrypt.DefaultCost)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Fprintf(os.Stderr, "WARN: Failed to generate password hash: %v\n", err)
|
||||||
|
controller.SetSessionError(app.DB, session, "Something went wrong. Please try again.")
|
||||||
|
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
session.Account.Password = string(hashedPassword)
|
||||||
|
err = controller.UpdateAccount(app.DB, session.Account)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Fprintf(os.Stderr, "WARN: Failed to update account password: %v\n", err)
|
||||||
|
controller.SetSessionError(app.DB, session, "Something went wrong. Please try again.")
|
||||||
|
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
controller.SetSessionError(app.DB, session, "")
|
||||||
|
controller.SetSessionMessage(app.DB, session, "Password updated successfully.")
|
||||||
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
@ -97,10 +129,10 @@ func deleteAccountHandler(app *model.AppState) http.Handler {
|
||||||
if err := bcrypt.CompareHashAndPassword([]byte(session.Account.Password), []byte(r.Form.Get("password"))); err != nil {
|
if err := bcrypt.CompareHashAndPassword([]byte(session.Account.Password), []byte(r.Form.Get("password"))); err != nil {
|
||||||
fmt.Printf(
|
fmt.Printf(
|
||||||
"[%s] WARN: Account \"%s\" attempted account deletion with incorrect password.\n",
|
"[%s] WARN: Account \"%s\" attempted account deletion with incorrect password.\n",
|
||||||
time.Now().Format("2006-02-01 15:04:05"),
|
time.Now().Format(time.UnixDate),
|
||||||
session.Account.Username,
|
session.Account.Username,
|
||||||
)
|
)
|
||||||
controller.SetSessionMessage(app.DB, session, "Incorrect password.")
|
controller.SetSessionError(app.DB, session, "Incorrect password.")
|
||||||
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
@ -108,36 +140,212 @@ func deleteAccountHandler(app *model.AppState) http.Handler {
|
||||||
totpMethod, err := controller.CheckTOTPForAccount(app.DB, session.Account.ID, r.Form.Get("totp"))
|
totpMethod, err := controller.CheckTOTPForAccount(app.DB, session.Account.ID, r.Form.Get("totp"))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "Failed to fetch account: %v\n", err)
|
fmt.Fprintf(os.Stderr, "Failed to fetch account: %v\n", err)
|
||||||
controller.SetSessionMessage(app.DB, session, "Something went wrong. Please try again.")
|
controller.SetSessionError(app.DB, session, "Something went wrong. Please try again.")
|
||||||
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
if totpMethod == nil {
|
if totpMethod == nil {
|
||||||
fmt.Printf(
|
fmt.Printf(
|
||||||
"[%s] WARN: Account \"%s\" attempted account deletion with incorrect TOTP.\n",
|
"[%s] WARN: Account \"%s\" attempted account deletion with incorrect TOTP.\n",
|
||||||
time.Now().Format("2006-02-01 15:04:05"),
|
time.Now().Format(time.UnixDate),
|
||||||
session.Account.Username,
|
session.Account.Username,
|
||||||
)
|
)
|
||||||
controller.SetSessionMessage(app.DB, session, "Incorrect TOTP.")
|
controller.SetSessionError(app.DB, session, "Incorrect TOTP.")
|
||||||
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
||||||
}
|
}
|
||||||
|
|
||||||
err = controller.DeleteAccount(app.DB, session.Account.ID)
|
err = controller.DeleteAccount(app.DB, session.Account.ID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "Failed to delete account: %v\n", err)
|
fmt.Fprintf(os.Stderr, "Failed to delete account: %v\n", err)
|
||||||
controller.SetSessionMessage(app.DB, session, "Something went wrong. Please try again.")
|
controller.SetSessionError(app.DB, session, "Something went wrong. Please try again.")
|
||||||
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
fmt.Printf(
|
fmt.Printf(
|
||||||
"[%s] INFO: Account \"%s\" deleted by user request.\n",
|
"[%s] INFO: Account \"%s\" deleted by user request.\n",
|
||||||
time.Now().Format("2006-02-01 15:04:05"),
|
time.Now().Format(time.UnixDate),
|
||||||
session.Account.Username,
|
session.Account.Username,
|
||||||
)
|
)
|
||||||
|
|
||||||
session.Account = nil
|
controller.SetSessionAccount(app.DB, session, nil)
|
||||||
|
controller.SetSessionError(app.DB, session, "")
|
||||||
controller.SetSessionMessage(app.DB, session, "Account deleted successfully.")
|
controller.SetSessionMessage(app.DB, session, "Account deleted successfully.")
|
||||||
http.Redirect(w, r, "/admin/login", http.StatusFound)
|
http.Redirect(w, r, "/admin/login", http.StatusFound)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func totpSetupHandler(app *model.AppState) http.Handler {
|
||||||
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
if r.Method == http.MethodGet {
|
||||||
|
type totpSetupData struct {
|
||||||
|
Session *model.Session
|
||||||
|
}
|
||||||
|
|
||||||
|
session := r.Context().Value("session").(*model.Session)
|
||||||
|
|
||||||
|
err := pages["totp-setup"].Execute(w, totpSetupData{ Session: session })
|
||||||
|
if err != nil {
|
||||||
|
fmt.Printf("WARN: Failed to render TOTP setup page: %s\n", err)
|
||||||
|
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if r.Method != http.MethodPost {
|
||||||
|
http.NotFound(w, r)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
type totpSetupData struct {
|
||||||
|
Session *model.Session
|
||||||
|
TOTP *model.TOTP
|
||||||
|
NameEscaped string
|
||||||
|
}
|
||||||
|
|
||||||
|
err := r.ParseForm()
|
||||||
|
if err != nil {
|
||||||
|
http.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
name := r.FormValue("totp-name")
|
||||||
|
if len(name) == 0 {
|
||||||
|
http.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
session := r.Context().Value("session").(*model.Session)
|
||||||
|
|
||||||
|
secret := controller.GenerateTOTPSecret(controller.TOTP_SECRET_LENGTH)
|
||||||
|
totp := model.TOTP {
|
||||||
|
AccountID: session.Account.ID,
|
||||||
|
Name: name,
|
||||||
|
Secret: string(secret),
|
||||||
|
}
|
||||||
|
err = controller.CreateTOTP(app.DB, &totp)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Printf("WARN: Failed to create TOTP method: %s\n", err)
|
||||||
|
controller.SetSessionError(app.DB, session, "Something went wrong. Please try again.")
|
||||||
|
err := pages["totp-setup"].Execute(w, totpSetupData{ Session: session })
|
||||||
|
if err != nil {
|
||||||
|
fmt.Printf("WARN: Failed to render TOTP setup page: %s\n", err)
|
||||||
|
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
err = pages["totp-confirm"].Execute(w, totpSetupData{
|
||||||
|
Session: session,
|
||||||
|
TOTP: &totp,
|
||||||
|
NameEscaped: url.PathEscape(totp.Name),
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
fmt.Printf("WARN: Failed to render TOTP confirm page: %s\n", err)
|
||||||
|
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func totpConfirmHandler(app *model.AppState) http.Handler {
|
||||||
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
if r.Method != http.MethodPost {
|
||||||
|
http.NotFound(w, r)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
type totpConfirmData struct {
|
||||||
|
Session *model.Session
|
||||||
|
TOTP *model.TOTP
|
||||||
|
}
|
||||||
|
|
||||||
|
session := r.Context().Value("session").(*model.Session)
|
||||||
|
|
||||||
|
err := r.ParseForm()
|
||||||
|
if err != nil {
|
||||||
|
http.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
name := r.FormValue("totp-name")
|
||||||
|
if len(name) == 0 {
|
||||||
|
http.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
code := r.FormValue("totp")
|
||||||
|
if len(code) != controller.TOTP_CODE_LENGTH {
|
||||||
|
http.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
totp, err := controller.GetTOTP(app.DB, session.Account.ID, name)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Printf("WARN: Failed to fetch TOTP method: %s\n", err)
|
||||||
|
controller.SetSessionError(app.DB, session, "Something went wrong. Please try again.")
|
||||||
|
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if totp == nil {
|
||||||
|
http.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
confirmCode := controller.GenerateTOTP(totp.Secret, 0)
|
||||||
|
if code != confirmCode {
|
||||||
|
confirmCodeOffset := controller.GenerateTOTP(totp.Secret, 1)
|
||||||
|
if code != confirmCodeOffset {
|
||||||
|
controller.SetSessionError(app.DB, session, "Incorrect TOTP code. Please try again.")
|
||||||
|
err = pages["totp-confirm"].Execute(w, totpConfirmData{
|
||||||
|
Session: session,
|
||||||
|
TOTP: totp,
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
controller.SetSessionError(app.DB, session, "")
|
||||||
|
controller.SetSessionMessage(app.DB, session, fmt.Sprintf("TOTP method \"%s\" created successfully.", totp.Name))
|
||||||
|
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func totpDeleteHandler(app *model.AppState) http.Handler {
|
||||||
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
if r.Method != http.MethodGet {
|
||||||
|
http.NotFound(w, r)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
name := r.URL.Path
|
||||||
|
fmt.Printf("%s\n", name);
|
||||||
|
if len(name) == 0 {
|
||||||
|
http.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
session := r.Context().Value("session").(*model.Session)
|
||||||
|
|
||||||
|
totp, err := controller.GetTOTP(app.DB, session.Account.ID, name)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Printf("WARN: Failed to fetch TOTP method: %s\n", err)
|
||||||
|
controller.SetSessionError(app.DB, session, "Something went wrong. Please try again.")
|
||||||
|
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if totp == nil {
|
||||||
|
http.NotFound(w, r)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
err = controller.DeleteTOTP(app.DB, session.Account.ID, totp.Name)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Printf("WARN: Failed to delete TOTP method: %s\n", err)
|
||||||
|
controller.SetSessionError(app.DB, session, "Something went wrong. Please try again.")
|
||||||
|
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
controller.SetSessionError(app.DB, session, "")
|
||||||
|
controller.SetSessionMessage(app.DB, session, fmt.Sprintf("TOTP method \"%s\" deleted successfully.", totp.Name))
|
||||||
|
http.Redirect(w, r, "/admin/account", http.StatusFound)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
|
@ -93,8 +93,6 @@ func AdminIndexHandler(app *model.AppState) http.Handler {
|
||||||
func registerAccountHandler(app *model.AppState) http.Handler {
|
func registerAccountHandler(app *model.AppState) http.Handler {
|
||||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
session := r.Context().Value("session").(*model.Session)
|
session := r.Context().Value("session").(*model.Session)
|
||||||
session.Error = sql.NullString{}
|
|
||||||
session.Message = sql.NullString{}
|
|
||||||
|
|
||||||
if session.Account != nil {
|
if session.Account != nil {
|
||||||
// user is already logged in
|
// user is already logged in
|
||||||
|
@ -102,8 +100,12 @@ func registerAccountHandler(app *model.AppState) http.Handler {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type registerData struct {
|
||||||
|
Session *model.Session
|
||||||
|
}
|
||||||
|
|
||||||
render := func() {
|
render := func() {
|
||||||
err := pages["register"].Execute(w, session)
|
err := pages["register"].Execute(w, registerData{ Session: session })
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Printf("WARN: Error rendering create account page: %s\n", err)
|
fmt.Printf("WARN: Error rendering create account page: %s\n", err)
|
||||||
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
||||||
|
@ -122,8 +124,7 @@ func registerAccountHandler(app *model.AppState) http.Handler {
|
||||||
|
|
||||||
err := r.ParseForm()
|
err := r.ParseForm()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
session.Error = sql.NullString{ String: "Malformed data.", Valid: true }
|
http.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)
|
||||||
render()
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -144,7 +145,7 @@ func registerAccountHandler(app *model.AppState) http.Handler {
|
||||||
invite, err := controller.GetInvite(app.DB, credentials.Invite)
|
invite, err := controller.GetInvite(app.DB, credentials.Invite)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "WARN: Failed to retrieve invite: %v\n", err)
|
fmt.Fprintf(os.Stderr, "WARN: Failed to retrieve invite: %v\n", err)
|
||||||
session.Error = sql.NullString{ String: "Something went wrong. Please try again.", Valid: true }
|
controller.SetSessionError(app.DB, session, "Something went wrong. Please try again.")
|
||||||
render()
|
render()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
@ -153,7 +154,7 @@ func registerAccountHandler(app *model.AppState) http.Handler {
|
||||||
err := controller.DeleteInvite(app.DB, invite.Code)
|
err := controller.DeleteInvite(app.DB, invite.Code)
|
||||||
if err != nil { fmt.Fprintf(os.Stderr, "WARN: Failed to delete expired invite: %v\n", err) }
|
if err != nil { fmt.Fprintf(os.Stderr, "WARN: Failed to delete expired invite: %v\n", err) }
|
||||||
}
|
}
|
||||||
session.Error = sql.NullString{ String: "Invalid invite code.", Valid: true }
|
controller.SetSessionError(app.DB, session, "Invalid invite code.")
|
||||||
render()
|
render()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
@ -161,7 +162,7 @@ func registerAccountHandler(app *model.AppState) http.Handler {
|
||||||
hashedPassword, err := bcrypt.GenerateFromPassword([]byte(credentials.Password), bcrypt.DefaultCost)
|
hashedPassword, err := bcrypt.GenerateFromPassword([]byte(credentials.Password), bcrypt.DefaultCost)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "WARN: Failed to generate password hash: %v\n", err)
|
fmt.Fprintf(os.Stderr, "WARN: Failed to generate password hash: %v\n", err)
|
||||||
session.Error = sql.NullString{ String: "Something went wrong. Please try again.", Valid: true }
|
controller.SetSessionError(app.DB, session, "Something went wrong. Please try again.")
|
||||||
render()
|
render()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
@ -175,21 +176,30 @@ func registerAccountHandler(app *model.AppState) http.Handler {
|
||||||
err = controller.CreateAccount(app.DB, &account)
|
err = controller.CreateAccount(app.DB, &account)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if strings.HasPrefix(err.Error(), "pq: duplicate key") {
|
if strings.HasPrefix(err.Error(), "pq: duplicate key") {
|
||||||
session.Error = sql.NullString{ String: "An account with that username already exists.", Valid: true }
|
controller.SetSessionError(app.DB, session, "An account with that username already exists.")
|
||||||
render()
|
render()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
fmt.Fprintf(os.Stderr, "WARN: Failed to create account: %v\n", err)
|
fmt.Fprintf(os.Stderr, "WARN: Failed to create account: %v\n", err)
|
||||||
session.Error = sql.NullString{ String: "Something went wrong. Please try again.", Valid: true }
|
controller.SetSessionError(app.DB, session, "Something went wrong. Please try again.")
|
||||||
render()
|
render()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fmt.Printf(
|
||||||
|
"[%s]: Account registered: %s (%s)\n",
|
||||||
|
time.Now().Format(time.UnixDate),
|
||||||
|
account.Username,
|
||||||
|
account.ID,
|
||||||
|
)
|
||||||
|
|
||||||
err = controller.DeleteInvite(app.DB, invite.Code)
|
err = controller.DeleteInvite(app.DB, invite.Code)
|
||||||
if err != nil { fmt.Fprintf(os.Stderr, "WARN: Failed to delete expired invite: %v\n", err) }
|
if err != nil { fmt.Fprintf(os.Stderr, "WARN: Failed to delete expired invite: %v\n", err) }
|
||||||
|
|
||||||
// registration success!
|
// registration success!
|
||||||
controller.SetSessionAccount(app.DB, session, &account)
|
controller.SetSessionAccount(app.DB, session, &account)
|
||||||
|
controller.SetSessionMessage(app.DB, session, "")
|
||||||
|
controller.SetSessionError(app.DB, session, "")
|
||||||
http.Redirect(w, r, "/admin", http.StatusFound)
|
http.Redirect(w, r, "/admin", http.StatusFound)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
@ -229,8 +239,7 @@ func loginHandler(app *model.AppState) http.Handler {
|
||||||
|
|
||||||
err := r.ParseForm()
|
err := r.ParseForm()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
session.Error = sql.NullString{ String: "Malformed data.", Valid: true }
|
http.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)
|
||||||
render()
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -253,12 +262,12 @@ func loginHandler(app *model.AppState) http.Handler {
|
||||||
account, err := controller.GetAccountByUsername(app.DB, credentials.Username)
|
account, err := controller.GetAccountByUsername(app.DB, credentials.Username)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "WARN: Failed to fetch account for login: %v\n", err)
|
fmt.Fprintf(os.Stderr, "WARN: Failed to fetch account for login: %v\n", err)
|
||||||
session.Error = sql.NullString{ String: "Invalid username or password.", Valid: true }
|
controller.SetSessionError(app.DB, session, "Invalid username or password.")
|
||||||
render()
|
render()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
if account == nil {
|
if account == nil {
|
||||||
session.Error = sql.NullString{ String: "Invalid username or password.", Valid: true }
|
controller.SetSessionError(app.DB, session, "Invalid username or password.")
|
||||||
render()
|
render()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
@ -267,10 +276,10 @@ func loginHandler(app *model.AppState) http.Handler {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Printf(
|
fmt.Printf(
|
||||||
"[%s] INFO: Account \"%s\" attempted login with incorrect password.\n",
|
"[%s] INFO: Account \"%s\" attempted login with incorrect password.\n",
|
||||||
time.Now().Format("2006-02-01 15:04:05"),
|
time.Now().Format(time.UnixDate),
|
||||||
account.Username,
|
account.Username,
|
||||||
)
|
)
|
||||||
session.Error = sql.NullString{ String: "Invalid username or password.", Valid: true }
|
controller.SetSessionError(app.DB, session, "Invalid username or password.")
|
||||||
render()
|
render()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
@ -278,12 +287,12 @@ func loginHandler(app *model.AppState) http.Handler {
|
||||||
totpMethod, err := controller.CheckTOTPForAccount(app.DB, account.ID, credentials.TOTP)
|
totpMethod, err := controller.CheckTOTPForAccount(app.DB, account.ID, credentials.TOTP)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "WARN: Failed to fetch TOTPs: %v\n", err)
|
fmt.Fprintf(os.Stderr, "WARN: Failed to fetch TOTPs: %v\n", err)
|
||||||
session.Error = sql.NullString{ String: "Something went wrong. Please try again.", Valid: true }
|
controller.SetSessionError(app.DB, session, "Something went wrong. Please try again.")
|
||||||
render()
|
render()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
if totpMethod == nil {
|
if totpMethod == nil {
|
||||||
session.Error = sql.NullString{ String: "Invalid TOTP.", Valid: true }
|
controller.SetSessionError(app.DB, session, "Invalid TOTP.")
|
||||||
render()
|
render()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
@ -291,13 +300,15 @@ func loginHandler(app *model.AppState) http.Handler {
|
||||||
// TODO: log login activity to user
|
// TODO: log login activity to user
|
||||||
fmt.Printf(
|
fmt.Printf(
|
||||||
"[%s] INFO: Account \"%s\" logged in with method \"%s\"\n",
|
"[%s] INFO: Account \"%s\" logged in with method \"%s\"\n",
|
||||||
time.Now().Format("2006-02-01 15:04:05"),
|
time.Now().Format(time.UnixDate),
|
||||||
account.Username,
|
account.Username,
|
||||||
totpMethod.Name,
|
totpMethod.Name,
|
||||||
)
|
)
|
||||||
|
|
||||||
// login success!
|
// login success!
|
||||||
controller.SetSessionAccount(app.DB, session, account)
|
controller.SetSessionAccount(app.DB, session, account)
|
||||||
|
controller.SetSessionMessage(app.DB, session, "")
|
||||||
|
controller.SetSessionError(app.DB, session, "")
|
||||||
http.Redirect(w, r, "/admin", http.StatusFound)
|
http.Redirect(w, r, "/admin", http.StatusFound)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
@ -379,11 +390,7 @@ func enforceSession(app *model.AppState, next http.Handler) http.Handler {
|
||||||
// fetch existing session
|
// fetch existing session
|
||||||
session, err = controller.GetSession(app.DB, sessionCookie.Value)
|
session, err = controller.GetSession(app.DB, sessionCookie.Value)
|
||||||
|
|
||||||
if err != nil {
|
if err != nil && !strings.Contains(err.Error(), "no rows") {
|
||||||
if strings.Contains(err.Error(), "no rows") {
|
|
||||||
http.Error(w, "Invalid session. Please try clearing your cookies and refresh.", http.StatusBadRequest)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
fmt.Fprintf(os.Stderr, "WARN: Failed to retrieve session: %v\n", err)
|
fmt.Fprintf(os.Stderr, "WARN: Failed to retrieve session: %v\n", err)
|
||||||
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
||||||
return
|
return
|
||||||
|
|
|
@ -146,7 +146,7 @@ a img.icon {
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
a.delete {
|
a.delete:not(.button) {
|
||||||
color: #d22828;
|
color: #d22828;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -197,3 +197,30 @@ button:active, .button:active {
|
||||||
opacity: .5;
|
opacity: .5;
|
||||||
cursor: not-allowed !important;
|
cursor: not-allowed !important;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
form {
|
||||||
|
width: 100%;
|
||||||
|
display: block;
|
||||||
|
}
|
||||||
|
label {
|
||||||
|
width: 100%;
|
||||||
|
margin: 1rem 0 .5rem 0;
|
||||||
|
display: block;
|
||||||
|
color: #10101080;
|
||||||
|
}
|
||||||
|
input {
|
||||||
|
margin: .5rem 0;
|
||||||
|
padding: .3rem .5rem;
|
||||||
|
display: block;
|
||||||
|
border-radius: 4px;
|
||||||
|
border: 1px solid #808080;
|
||||||
|
font-size: inherit;
|
||||||
|
font-family: inherit;
|
||||||
|
color: inherit;
|
||||||
|
}
|
||||||
|
input[disabled] {
|
||||||
|
opacity: .5;
|
||||||
|
cursor: not-allowed;
|
||||||
|
}
|
||||||
|
|
|
@ -4,10 +4,6 @@ div.card {
|
||||||
margin-bottom: 2rem;
|
margin-bottom: 2rem;
|
||||||
}
|
}
|
||||||
|
|
||||||
form button {
|
|
||||||
margin-top: 1rem;
|
|
||||||
}
|
|
||||||
|
|
||||||
label {
|
label {
|
||||||
width: 100%;
|
width: 100%;
|
||||||
margin: 1rem 0 .5rem 0;
|
margin: 1rem 0 .5rem 0;
|
||||||
|
|
|
@ -33,6 +33,16 @@ var pages = map[string]*template.Template{
|
||||||
filepath.Join("views", "prideflag.html"),
|
filepath.Join("views", "prideflag.html"),
|
||||||
filepath.Join("admin", "views", "edit-account.html"),
|
filepath.Join("admin", "views", "edit-account.html"),
|
||||||
)),
|
)),
|
||||||
|
"totp-setup": template.Must(template.ParseFiles(
|
||||||
|
filepath.Join("admin", "views", "layout.html"),
|
||||||
|
filepath.Join("views", "prideflag.html"),
|
||||||
|
filepath.Join("admin", "views", "totp-setup.html"),
|
||||||
|
)),
|
||||||
|
"totp-confirm": template.Must(template.ParseFiles(
|
||||||
|
filepath.Join("admin", "views", "layout.html"),
|
||||||
|
filepath.Join("views", "prideflag.html"),
|
||||||
|
filepath.Join("admin", "views", "totp-confirm.html"),
|
||||||
|
)),
|
||||||
|
|
||||||
"release": template.Must(template.ParseFiles(
|
"release": template.Must(template.ParseFiles(
|
||||||
filepath.Join("admin", "views", "layout.html"),
|
filepath.Join("admin", "views", "layout.html"),
|
||||||
|
|
|
@ -44,7 +44,7 @@
|
||||||
<p class="mfa-device-date">Added: {{.CreatedAt}}</p>
|
<p class="mfa-device-date">Added: {{.CreatedAt}}</p>
|
||||||
</div>
|
</div>
|
||||||
<div>
|
<div>
|
||||||
<a class="delete">Delete</a>
|
<a class="button delete" href="/admin/account/totp-delete/{{.Name}}">Delete</a>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
{{end}}
|
{{end}}
|
||||||
|
@ -52,7 +52,10 @@
|
||||||
<p>You have no MFA devices.</p>
|
<p>You have no MFA devices.</p>
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
<button type="submit" class="new" id="add-mfa-device">Add MFA Device</button>
|
<div>
|
||||||
|
<button type="submit" class="save" id="enable-email" disabled>Enable Email TOTP</button>
|
||||||
|
<a class="button new" id="add-totp-device" href="/admin/account/totp-setup">Add TOTP Device</a>
|
||||||
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="card-title">
|
<div class="card-title">
|
||||||
|
|
|
@ -11,7 +11,7 @@ a.discord {
|
||||||
color: #5865F2;
|
color: #5865F2;
|
||||||
}
|
}
|
||||||
|
|
||||||
form {
|
form#login {
|
||||||
width: 100%;
|
width: 100%;
|
||||||
display: flex;
|
display: flex;
|
||||||
flex-direction: column;
|
flex-direction: column;
|
||||||
|
@ -26,26 +26,8 @@ form button {
|
||||||
margin-top: 1rem;
|
margin-top: 1rem;
|
||||||
}
|
}
|
||||||
|
|
||||||
label {
|
|
||||||
width: 100%;
|
|
||||||
margin: 1rem 0 .5rem 0;
|
|
||||||
display: block;
|
|
||||||
color: #10101080;
|
|
||||||
}
|
|
||||||
input {
|
input {
|
||||||
width: 100%;
|
width: 100%;
|
||||||
margin: .5rem 0;
|
|
||||||
padding: .3rem .5rem;
|
|
||||||
display: block;
|
|
||||||
border-radius: 4px;
|
|
||||||
border: 1px solid #808080;
|
|
||||||
font-size: inherit;
|
|
||||||
font-family: inherit;
|
|
||||||
color: inherit;
|
|
||||||
}
|
|
||||||
input[disabled] {
|
|
||||||
opacity: .5;
|
|
||||||
cursor: not-allowed;
|
|
||||||
}
|
}
|
||||||
</style>
|
</style>
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
|
@ -11,7 +11,7 @@ a.discord {
|
||||||
color: #5865F2;
|
color: #5865F2;
|
||||||
}
|
}
|
||||||
|
|
||||||
form {
|
form#register {
|
||||||
width: 100%;
|
width: 100%;
|
||||||
display: flex;
|
display: flex;
|
||||||
flex-direction: column;
|
flex-direction: column;
|
||||||
|
@ -26,22 +26,8 @@ form button {
|
||||||
margin-top: 1rem;
|
margin-top: 1rem;
|
||||||
}
|
}
|
||||||
|
|
||||||
label {
|
|
||||||
width: 100%;
|
|
||||||
margin: 1rem 0 .5rem 0;
|
|
||||||
display: block;
|
|
||||||
color: #10101080;
|
|
||||||
}
|
|
||||||
input {
|
input {
|
||||||
width: 100%;
|
width: 100%;
|
||||||
margin: .5rem 0;
|
|
||||||
padding: .3rem .5rem;
|
|
||||||
display: block;
|
|
||||||
border-radius: 4px;
|
|
||||||
border: 1px solid #808080;
|
|
||||||
font-size: inherit;
|
|
||||||
font-family: inherit;
|
|
||||||
color: inherit;
|
|
||||||
}
|
}
|
||||||
</style>
|
</style>
|
||||||
{{end}}
|
{{end}}
|
||||||
|
@ -52,7 +38,7 @@ input {
|
||||||
<p id="error">{{html .Session.Error.String}}</p>
|
<p id="error">{{html .Session.Error.String}}</p>
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
<form action="/admin/register" method="POST" id="create-account">
|
<form action="/admin/register" method="POST" id="register">
|
||||||
<div>
|
<div>
|
||||||
<label for="username">Username</label>
|
<label for="username">Username</label>
|
||||||
<input type="text" name="username" value="" autocomplete="username" required>
|
<input type="text" name="username" value="" autocomplete="username" required>
|
||||||
|
|
34
admin/views/totp-confirm.html
Normal file
34
admin/views/totp-confirm.html
Normal file
|
@ -0,0 +1,34 @@
|
||||||
|
{{define "head"}}
|
||||||
|
<title>TOTP Confirmation - ari melody 💫</title>
|
||||||
|
<link rel="shortcut icon" href="/img/favicon.png" type="image/x-icon">
|
||||||
|
<link rel="stylesheet" href="/admin/static/admin.css">
|
||||||
|
<style>
|
||||||
|
code {
|
||||||
|
user-select: all;
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
{{end}}
|
||||||
|
|
||||||
|
{{define "content"}}
|
||||||
|
<main>
|
||||||
|
{{if .Session.Error.Valid}}
|
||||||
|
<p id="error">{{html .Session.Error.String}}</p>
|
||||||
|
{{end}}
|
||||||
|
|
||||||
|
<form action="/admin/account/totp-confirm?totp-name={{.NameEscaped}}" method="POST" id="totp-setup">
|
||||||
|
<p><strong>Your TOTP secret: </strong><code>{{.TOTP.Secret}}</code></p>
|
||||||
|
|
||||||
|
<!-- TODO: TOTP secret QR codes -->
|
||||||
|
|
||||||
|
<p>
|
||||||
|
Please store this into your two-factor authentication app or
|
||||||
|
password manager, then enter your code below:
|
||||||
|
</p>
|
||||||
|
|
||||||
|
<label for="totp">TOTP:</label>
|
||||||
|
<input type="text" name="totp" value="" autocomplete="one-time-code" required>
|
||||||
|
|
||||||
|
<button type="submit" class="new">Create</button>
|
||||||
|
</form>
|
||||||
|
</main>
|
||||||
|
{{end}}
|
20
admin/views/totp-setup.html
Normal file
20
admin/views/totp-setup.html
Normal file
|
@ -0,0 +1,20 @@
|
||||||
|
{{define "head"}}
|
||||||
|
<title>TOTP Setup - ari melody 💫</title>
|
||||||
|
<link rel="shortcut icon" href="/img/favicon.png" type="image/x-icon">
|
||||||
|
<link rel="stylesheet" href="/admin/static/admin.css">
|
||||||
|
{{end}}
|
||||||
|
|
||||||
|
{{define "content"}}
|
||||||
|
<main>
|
||||||
|
{{if .Session.Error.Valid}}
|
||||||
|
<p id="error">{{html .Session.Error.String}}</p>
|
||||||
|
{{end}}
|
||||||
|
|
||||||
|
<form action="/admin/account/totp-setup" method="POST" id="totp-setup">
|
||||||
|
<label for="totp-name">TOTP Device Name:</label>
|
||||||
|
<input type="text" name="totp-name" value="" autocomplete="off" required>
|
||||||
|
|
||||||
|
<button type="submit" class="new">Create</button>
|
||||||
|
</form>
|
||||||
|
</main>
|
||||||
|
{{end}}
|
|
@ -108,7 +108,7 @@ func CreateAccount(db *sqlx.DB, account *model.Account) error {
|
||||||
func UpdateAccount(db *sqlx.DB, account *model.Account) error {
|
func UpdateAccount(db *sqlx.DB, account *model.Account) error {
|
||||||
_, err := db.Exec(
|
_, err := db.Exec(
|
||||||
"UPDATE account " +
|
"UPDATE account " +
|
||||||
"SET username=$2, password=$3, email=$4, avatar_url=$5) " +
|
"SET username=$2,password=$3,email=$4,avatar_url=$5 " +
|
||||||
"WHERE id=$1",
|
"WHERE id=$1",
|
||||||
account.ID,
|
account.ID,
|
||||||
account.Username,
|
account.Username,
|
||||||
|
@ -120,7 +120,7 @@ func UpdateAccount(db *sqlx.DB, account *model.Account) error {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
func DeleteAccount(db *sqlx.DB, username string) error {
|
func DeleteAccount(db *sqlx.DB, accountID string) error {
|
||||||
_, err := db.Exec("DELETE FROM account WHERE username=$1", username)
|
_, err := db.Exec("DELETE FROM account WHERE id=$1", accountID)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
|
@ -63,6 +63,7 @@ func SetSessionAccount(db *sqlx.DB, session *model.Session, account *model.Accou
|
||||||
func SetSessionMessage(db *sqlx.DB, session *model.Session, message string) error {
|
func SetSessionMessage(db *sqlx.DB, session *model.Session, message string) error {
|
||||||
var err error
|
var err error
|
||||||
if message == "" {
|
if message == "" {
|
||||||
|
if !session.Message.Valid { return nil }
|
||||||
session.Message = sql.NullString{ }
|
session.Message = sql.NullString{ }
|
||||||
_, err = db.Exec("UPDATE session SET message=NULL WHERE token=$1", session.Token)
|
_, err = db.Exec("UPDATE session SET message=NULL WHERE token=$1", session.Token)
|
||||||
} else {
|
} else {
|
||||||
|
@ -75,10 +76,11 @@ func SetSessionMessage(db *sqlx.DB, session *model.Session, message string) erro
|
||||||
func SetSessionError(db *sqlx.DB, session *model.Session, message string) error {
|
func SetSessionError(db *sqlx.DB, session *model.Session, message string) error {
|
||||||
var err error
|
var err error
|
||||||
if message == "" {
|
if message == "" {
|
||||||
session.Message = sql.NullString{ }
|
if !session.Error.Valid { return nil }
|
||||||
|
session.Error = sql.NullString{ }
|
||||||
_, err = db.Exec("UPDATE session SET error=NULL WHERE token=$1", session.Token)
|
_, err = db.Exec("UPDATE session SET error=NULL WHERE token=$1", session.Token)
|
||||||
} else {
|
} else {
|
||||||
session.Message = sql.NullString{ String: message, Valid: true }
|
session.Error = sql.NullString{ String: message, Valid: true }
|
||||||
_, err = db.Exec("UPDATE session SET error=$2 WHERE token=$1", session.Token, message)
|
_, err = db.Exec("UPDATE session SET error=$2 WHERE token=$1", session.Token, message)
|
||||||
}
|
}
|
||||||
return err
|
return err
|
||||||
|
|
|
@ -17,9 +17,9 @@ import (
|
||||||
"github.com/jmoiron/sqlx"
|
"github.com/jmoiron/sqlx"
|
||||||
)
|
)
|
||||||
|
|
||||||
const TOTP_SECRET_LENGTH = 64
|
const TOTP_SECRET_LENGTH = 32
|
||||||
const TIME_STEP int64 = 30
|
const TOTP_TIME_STEP int64 = 30
|
||||||
const CODE_LENGTH = 6
|
const TOTP_CODE_LENGTH = 6
|
||||||
|
|
||||||
func GenerateTOTP(secret string, timeStepOffset int) string {
|
func GenerateTOTP(secret string, timeStepOffset int) string {
|
||||||
decodedSecret, err := base32.StdEncoding.WithPadding(base32.NoPadding).DecodeString(secret)
|
decodedSecret, err := base32.StdEncoding.WithPadding(base32.NoPadding).DecodeString(secret)
|
||||||
|
@ -27,7 +27,7 @@ func GenerateTOTP(secret string, timeStepOffset int) string {
|
||||||
fmt.Fprintf(os.Stderr, "WARN: Invalid Base32 secret\n")
|
fmt.Fprintf(os.Stderr, "WARN: Invalid Base32 secret\n")
|
||||||
}
|
}
|
||||||
|
|
||||||
counter := time.Now().Unix() / TIME_STEP - int64(timeStepOffset)
|
counter := time.Now().Unix() / TOTP_TIME_STEP - int64(timeStepOffset)
|
||||||
counterBytes := make([]byte, 8)
|
counterBytes := make([]byte, 8)
|
||||||
binary.BigEndian.PutUint64(counterBytes, uint64(counter))
|
binary.BigEndian.PutUint64(counterBytes, uint64(counter))
|
||||||
|
|
||||||
|
@ -37,9 +37,9 @@ func GenerateTOTP(secret string, timeStepOffset int) string {
|
||||||
|
|
||||||
offset := hash[len(hash) - 1] & 0x0f
|
offset := hash[len(hash) - 1] & 0x0f
|
||||||
binaryCode := int32(binary.BigEndian.Uint32(hash[offset : offset + 4]) & 0x7FFFFFFF)
|
binaryCode := int32(binary.BigEndian.Uint32(hash[offset : offset + 4]) & 0x7FFFFFFF)
|
||||||
code := binaryCode % int32(math.Pow10(CODE_LENGTH))
|
code := binaryCode % int32(math.Pow10(TOTP_CODE_LENGTH))
|
||||||
|
|
||||||
return fmt.Sprintf(fmt.Sprintf("%%0%dd", CODE_LENGTH), code)
|
return fmt.Sprintf(fmt.Sprintf("%%0%dd", TOTP_CODE_LENGTH), code)
|
||||||
}
|
}
|
||||||
|
|
||||||
func GenerateTOTPSecret(length int) string {
|
func GenerateTOTPSecret(length int) string {
|
||||||
|
@ -65,8 +65,8 @@ func GenerateTOTPURI(username string, secret string) string {
|
||||||
query.Set("secret", secret)
|
query.Set("secret", secret)
|
||||||
query.Set("issuer", "arimelody.me")
|
query.Set("issuer", "arimelody.me")
|
||||||
query.Set("algorithm", "SHA1")
|
query.Set("algorithm", "SHA1")
|
||||||
query.Set("digits", fmt.Sprintf("%d", CODE_LENGTH))
|
query.Set("digits", fmt.Sprintf("%d", TOTP_CODE_LENGTH))
|
||||||
query.Set("period", fmt.Sprintf("%d", TIME_STEP))
|
query.Set("period", fmt.Sprintf("%d", TOTP_TIME_STEP))
|
||||||
url.RawQuery = query.Encode()
|
url.RawQuery = query.Encode()
|
||||||
|
|
||||||
return url.String()
|
return url.String()
|
||||||
|
@ -98,7 +98,11 @@ func CheckTOTPForAccount(db *sqlx.DB, accountID string, totp string) (*model.TOT
|
||||||
for _, method := range totps {
|
for _, method := range totps {
|
||||||
check := GenerateTOTP(method.Secret, 0)
|
check := GenerateTOTP(method.Secret, 0)
|
||||||
if check == totp {
|
if check == totp {
|
||||||
// return the whole TOTP method as it may be useful for logging
|
return &method, nil
|
||||||
|
}
|
||||||
|
// try again with offset- maybe user input the code late?
|
||||||
|
check = GenerateTOTP(method.Secret, 1)
|
||||||
|
if check == totp {
|
||||||
return &method, nil
|
return &method, nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
83
main.go
83
main.go
|
@ -4,6 +4,7 @@ import (
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"log"
|
"log"
|
||||||
|
"math"
|
||||||
"math/rand"
|
"math/rand"
|
||||||
"net/http"
|
"net/http"
|
||||||
"os"
|
"os"
|
||||||
|
@ -22,6 +23,7 @@ import (
|
||||||
|
|
||||||
"github.com/jmoiron/sqlx"
|
"github.com/jmoiron/sqlx"
|
||||||
_ "github.com/lib/pq"
|
_ "github.com/lib/pq"
|
||||||
|
"golang.org/x/crypto/bcrypt"
|
||||||
)
|
)
|
||||||
|
|
||||||
// used for database migrations
|
// used for database migrations
|
||||||
|
@ -91,12 +93,12 @@ func main() {
|
||||||
|
|
||||||
account, err := controller.GetAccountByUsername(app.DB, username)
|
account, err := controller.GetAccountByUsername(app.DB, username)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "Failed to fetch account \"%s\": %v\n", username, err)
|
fmt.Fprintf(os.Stderr, "FATAL: Failed to fetch account \"%s\": %v\n", username, err)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
if account == nil {
|
if account == nil {
|
||||||
fmt.Fprintf(os.Stderr, "Account \"%s\" does not exist.\n", username)
|
fmt.Fprintf(os.Stderr, "FATAL: Account \"%s\" does not exist.\n", username)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -109,10 +111,10 @@ func main() {
|
||||||
err = controller.CreateTOTP(app.DB, &totp)
|
err = controller.CreateTOTP(app.DB, &totp)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if strings.HasPrefix(err.Error(), "pq: duplicate key") {
|
if strings.HasPrefix(err.Error(), "pq: duplicate key") {
|
||||||
fmt.Fprintf(os.Stderr, "Account \"%s\" already has a TOTP method named \"%s\"!\n", account.Username, totp.Name)
|
fmt.Fprintf(os.Stderr, "FATAL: Account \"%s\" already has a TOTP method named \"%s\"!\n", account.Username, totp.Name)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
fmt.Fprintf(os.Stderr, "Failed to create TOTP method: %v\n", err)
|
fmt.Fprintf(os.Stderr, "FATAL: Failed to create TOTP method: %v\n", err)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -130,18 +132,18 @@ func main() {
|
||||||
|
|
||||||
account, err := controller.GetAccountByUsername(app.DB, username)
|
account, err := controller.GetAccountByUsername(app.DB, username)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "Failed to fetch account \"%s\": %v\n", username, err)
|
fmt.Fprintf(os.Stderr, "FATAL: Failed to fetch account \"%s\": %v\n", username, err)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
if account == nil {
|
if account == nil {
|
||||||
fmt.Fprintf(os.Stderr, "Account \"%s\" does not exist.\n", username)
|
fmt.Fprintf(os.Stderr, "FATAL: Account \"%s\" does not exist.\n", username)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
err = controller.DeleteTOTP(app.DB, account.ID, totpName)
|
err = controller.DeleteTOTP(app.DB, account.ID, totpName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "Failed to create TOTP method: %v\n", err)
|
fmt.Fprintf(os.Stderr, "FATAL: Failed to create TOTP method: %v\n", err)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -157,18 +159,18 @@ func main() {
|
||||||
|
|
||||||
account, err := controller.GetAccountByUsername(app.DB, username)
|
account, err := controller.GetAccountByUsername(app.DB, username)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "Failed to fetch account \"%s\": %v\n", username, err)
|
fmt.Fprintf(os.Stderr, "FATAL: Failed to fetch account \"%s\": %v\n", username, err)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
if account == nil {
|
if account == nil {
|
||||||
fmt.Fprintf(os.Stderr, "Account \"%s\" does not exist.\n", username)
|
fmt.Fprintf(os.Stderr, "FATAL: Account \"%s\" does not exist.\n", username)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
totps, err := controller.GetTOTPsForAccount(app.DB, account.ID)
|
totps, err := controller.GetTOTPsForAccount(app.DB, account.ID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "Failed to create TOTP methods: %v\n", err)
|
fmt.Fprintf(os.Stderr, "FATAL: Failed to create TOTP methods: %v\n", err)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -190,23 +192,23 @@ func main() {
|
||||||
|
|
||||||
account, err := controller.GetAccountByUsername(app.DB, username)
|
account, err := controller.GetAccountByUsername(app.DB, username)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "Failed to fetch account \"%s\": %v\n", username, err)
|
fmt.Fprintf(os.Stderr, "FATAL: Failed to fetch account \"%s\": %v\n", username, err)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
if account == nil {
|
if account == nil {
|
||||||
fmt.Fprintf(os.Stderr, "Account \"%s\" does not exist.\n", username)
|
fmt.Fprintf(os.Stderr, "FATAL: Account \"%s\" does not exist.\n", username)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
totp, err := controller.GetTOTP(app.DB, account.ID, totpName)
|
totp, err := controller.GetTOTP(app.DB, account.ID, totpName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "Failed to fetch TOTP method \"%s\": %v\n", totpName, err)
|
fmt.Fprintf(os.Stderr, "FATAL: Failed to fetch TOTP method \"%s\": %v\n", totpName, err)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
if totp == nil {
|
if totp == nil {
|
||||||
fmt.Fprintf(os.Stderr, "TOTP method \"%s\" does not exist for account \"%s\"\n", totpName, username)
|
fmt.Fprintf(os.Stderr, "FATAL: TOTP method \"%s\" does not exist for account \"%s\"\n", totpName, username)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -218,18 +220,22 @@ func main() {
|
||||||
fmt.Printf("Creating invite...\n")
|
fmt.Printf("Creating invite...\n")
|
||||||
invite, err := controller.CreateInvite(app.DB, 16, time.Hour * 24)
|
invite, err := controller.CreateInvite(app.DB, 16, time.Hour * 24)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "Failed to create invite code: %v\n", err)
|
fmt.Fprintf(os.Stderr, "FATAL: Failed to create invite code: %v\n", err)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
fmt.Printf("Here you go! This code expires in 24 hours: %s\n", invite.Code)
|
fmt.Printf(
|
||||||
|
"Here you go! This code expires in %d hours: %s\n",
|
||||||
|
int(math.Ceil(invite.ExpiresAt.Sub(invite.CreatedAt).Hours())),
|
||||||
|
invite.Code,
|
||||||
|
)
|
||||||
return
|
return
|
||||||
|
|
||||||
case "purgeInvites":
|
case "purgeInvites":
|
||||||
fmt.Printf("Deleting all invites...\n")
|
fmt.Printf("Deleting all invites...\n")
|
||||||
err := controller.DeleteAllInvites(app.DB)
|
err := controller.DeleteAllInvites(app.DB)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "Failed to delete invites: %v\n", err)
|
fmt.Fprintf(os.Stderr, "FATAL: Failed to delete invites: %v\n", err)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -239,7 +245,7 @@ func main() {
|
||||||
case "listAccounts":
|
case "listAccounts":
|
||||||
accounts, err := controller.GetAllAccounts(app.DB)
|
accounts, err := controller.GetAllAccounts(app.DB)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "Failed to fetch accounts: %v\n", err)
|
fmt.Fprintf(os.Stderr, "FATAL: Failed to fetch accounts: %v\n", err)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -259,6 +265,39 @@ func main() {
|
||||||
}
|
}
|
||||||
return
|
return
|
||||||
|
|
||||||
|
case "changePassword":
|
||||||
|
if len(os.Args) < 4 {
|
||||||
|
fmt.Fprintf(os.Stderr, "FATAL: `username` and `password` must be specified for changePassword\n")
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
username := os.Args[2]
|
||||||
|
password := os.Args[3]
|
||||||
|
account, err := controller.GetAccountByUsername(app.DB, username)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Fprintf(os.Stderr, "FATAL: Failed to fetch account \"%s\": %v\n", username, err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
if account == nil {
|
||||||
|
fmt.Fprintf(os.Stderr, "FATAL: Account \"%s\" does not exist.\n", username)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
hashedPassword, err := bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Fprintf(os.Stderr, "FATAL: Failed to update password: %v\n", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
account.Password = string(hashedPassword)
|
||||||
|
err = controller.UpdateAccount(app.DB, account)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Fprintf(os.Stderr, "FATAL: Failed to delete account: %v\n", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
fmt.Printf("Account \"%s\" deleted successfully.\n", account.Username)
|
||||||
|
return
|
||||||
|
|
||||||
case "deleteAccount":
|
case "deleteAccount":
|
||||||
if len(os.Args) < 3 {
|
if len(os.Args) < 3 {
|
||||||
fmt.Fprintf(os.Stderr, "FATAL: `username` must be specified for deleteAccount\n")
|
fmt.Fprintf(os.Stderr, "FATAL: `username` must be specified for deleteAccount\n")
|
||||||
|
@ -269,12 +308,12 @@ func main() {
|
||||||
|
|
||||||
account, err := controller.GetAccountByUsername(app.DB, username)
|
account, err := controller.GetAccountByUsername(app.DB, username)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "Failed to fetch account \"%s\": %v\n", username, err)
|
fmt.Fprintf(os.Stderr, "FATAL: Failed to fetch account \"%s\": %v\n", username, err)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
if account == nil {
|
if account == nil {
|
||||||
fmt.Fprintf(os.Stderr, "Account \"%s\" does not exist.\n", username)
|
fmt.Fprintf(os.Stderr, "FATAL: Account \"%s\" does not exist.\n", username)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -285,9 +324,9 @@ func main() {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
err = controller.DeleteAccount(app.DB, username)
|
err = controller.DeleteAccount(app.DB, account.ID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "Failed to delete account: %v\n", err)
|
fmt.Fprintf(os.Stderr, "FATAL: Failed to delete account: %v\n", err)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -4,19 +4,19 @@
|
||||||
|
|
||||||
-- Accounts
|
-- Accounts
|
||||||
CREATE TABLE arimelody.account (
|
CREATE TABLE arimelody.account (
|
||||||
id uuid DEFAULT gen_random_uuid(),
|
id UUID DEFAULT gen_random_uuid(),
|
||||||
username text NOT NULL UNIQUE,
|
username TEXT NOT NULL UNIQUE,
|
||||||
password text NOT NULL,
|
password TEXT NOT NULL,
|
||||||
email text,
|
email TEXT,
|
||||||
avatar_url text,
|
avatar_url TEXT,
|
||||||
created_at TIMESTAMP DEFAULT current_timestamp
|
created_at TIMESTAMP DEFAULT current_timestamp
|
||||||
);
|
);
|
||||||
ALTER TABLE arimelody.account ADD CONSTRAINT account_pk PRIMARY KEY (id);
|
ALTER TABLE arimelody.account ADD CONSTRAINT account_pk PRIMARY KEY (id);
|
||||||
|
|
||||||
-- Privilege
|
-- Privilege
|
||||||
CREATE TABLE arimelody.privilege (
|
CREATE TABLE arimelody.privilege (
|
||||||
account uuid NOT NULL,
|
account UUID NOT NULL,
|
||||||
privilege text NOT NULL
|
privilege TEXT NOT NULL
|
||||||
);
|
);
|
||||||
ALTER TABLE arimelody.privilege ADD CONSTRAINT privilege_pk PRIMARY KEY (account, privilege);
|
ALTER TABLE arimelody.privilege ADD CONSTRAINT privilege_pk PRIMARY KEY (account, privilege);
|
||||||
|
|
||||||
|
@ -33,12 +33,12 @@ CREATE TABLE arimelody.session (
|
||||||
token TEXT,
|
token TEXT,
|
||||||
user_agent TEXT NOT NULL,
|
user_agent TEXT NOT NULL,
|
||||||
created_at TIMESTAMP NOT NULL DEFAULT current_timestamp,
|
created_at TIMESTAMP NOT NULL DEFAULT current_timestamp,
|
||||||
expires_at TIMESTAMP DEFAULT NULL
|
expires_at TIMESTAMP DEFAULT NULL,
|
||||||
account UUID,
|
account UUID,
|
||||||
message TEXT,
|
message TEXT,
|
||||||
error TEXT,
|
error TEXT
|
||||||
);
|
);
|
||||||
ALTER TABLE arimelody.session ADD CONSTRAINT session_pk PRIMARY KEY (session);
|
ALTER TABLE arimelody.session ADD CONSTRAINT session_pk PRIMARY KEY (token);
|
||||||
|
|
||||||
-- TOTPs
|
-- TOTPs
|
||||||
CREATE TABLE arimelody.totp (
|
CREATE TABLE arimelody.totp (
|
||||||
|
|
|
@ -2,21 +2,21 @@
|
||||||
-- New items
|
-- New items
|
||||||
--
|
--
|
||||||
|
|
||||||
-- Acounts
|
-- Accounts
|
||||||
CREATE TABLE arimelody.account (
|
CREATE TABLE arimelody.account (
|
||||||
id uuid DEFAULT gen_random_uuid(),
|
id UUID DEFAULT gen_random_uuid(),
|
||||||
username text NOT NULL UNIQUE,
|
username TEXT NOT NULL UNIQUE,
|
||||||
password text NOT NULL,
|
password TEXT NOT NULL,
|
||||||
email text,
|
email TEXT,
|
||||||
avatar_url text,
|
avatar_url TEXT,
|
||||||
created_at TIMESTAMP DEFAULT current_timestamp
|
created_at TIMESTAMP DEFAULT current_timestamp
|
||||||
);
|
);
|
||||||
ALTER TABLE arimelody.account ADD CONSTRAINT account_pk PRIMARY KEY (id);
|
ALTER TABLE arimelody.account ADD CONSTRAINT account_pk PRIMARY KEY (id);
|
||||||
|
|
||||||
-- Privilege
|
-- Privilege
|
||||||
CREATE TABLE arimelody.privilege (
|
CREATE TABLE arimelody.privilege (
|
||||||
account uuid NOT NULL,
|
account UUID NOT NULL,
|
||||||
privilege text NOT NULL
|
privilege TEXT NOT NULL
|
||||||
);
|
);
|
||||||
ALTER TABLE arimelody.privilege ADD CONSTRAINT privilege_pk PRIMARY KEY (account, privilege);
|
ALTER TABLE arimelody.privilege ADD CONSTRAINT privilege_pk PRIMARY KEY (account, privilege);
|
||||||
|
|
||||||
|
@ -33,12 +33,12 @@ CREATE TABLE arimelody.session (
|
||||||
token TEXT,
|
token TEXT,
|
||||||
user_agent TEXT NOT NULL,
|
user_agent TEXT NOT NULL,
|
||||||
created_at TIMESTAMP NOT NULL DEFAULT current_timestamp,
|
created_at TIMESTAMP NOT NULL DEFAULT current_timestamp,
|
||||||
expires_at TIMESTAMP DEFAULT NULL
|
expires_at TIMESTAMP DEFAULT NULL,
|
||||||
account UUID,
|
account UUID,
|
||||||
message TEXT,
|
message TEXT,
|
||||||
error TEXT,
|
error TEXT
|
||||||
);
|
);
|
||||||
ALTER TABLE arimelody.session ADD CONSTRAINT session_pk PRIMARY KEY (session);
|
ALTER TABLE arimelody.session ADD CONSTRAINT session_pk PRIMARY KEY (token);
|
||||||
|
|
||||||
-- TOTPs
|
-- TOTPs
|
||||||
CREATE TABLE arimelody.totp (
|
CREATE TABLE arimelody.totp (
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue