mirror of
https://github.com/balzack/databag.git
synced 2025-02-12 19:49:16 +00:00
104 lines
3.3 KiB
Go
104 lines
3.3 KiB
Go
package databag
|
|
|
|
import (
|
|
"encoding/hex"
|
|
"github.com/theckman/go-securerandom"
|
|
"databag/internal/store"
|
|
"gorm.io/gorm"
|
|
"gorm.io/gorm/clause"
|
|
"net/http"
|
|
"github.com/pquerna/otp"
|
|
"github.com/pquerna/otp/totp"
|
|
"errors"
|
|
"time"
|
|
)
|
|
|
|
//SetAdminAccess begins a session for admin access
|
|
func SetAdminAccess(w http.ResponseWriter, r *http.Request) {
|
|
|
|
// validate login
|
|
if code, err := ParamAdminToken(r); err != nil {
|
|
ErrResponse(w, code, err)
|
|
return
|
|
}
|
|
|
|
// check mfa
|
|
curTime := time.Now().Unix()
|
|
failedTime := getNumConfigValue(CNFMFAFailedTime, 0);
|
|
failedCount := getNumConfigValue(CNFMFAFailedCount, 0);
|
|
mfaEnabled := getBoolConfigValue(CNFMFAEnabled, false);
|
|
mfaConfirmed := getBoolConfigValue(CNFMFAConfirmed, false);
|
|
if mfaEnabled && mfaConfirmed {
|
|
if failedTime + APPMFAFailPeriod > curTime && failedCount > APPMFAFailCount {
|
|
ErrResponse(w, http.StatusTooManyRequests, errors.New("temporarily locked"))
|
|
return;
|
|
}
|
|
|
|
code := r.FormValue("code")
|
|
if code == "" {
|
|
ErrResponse(w, http.StatusMethodNotAllowed, errors.New("totp code required"))
|
|
return;
|
|
}
|
|
|
|
secret := getStrConfigValue(CNFMFASecret, "");
|
|
opts := totp.ValidateOpts{Period: 30, Skew: 1, Digits: otp.DigitsSix, Algorithm: otp.AlgorithmSHA256}
|
|
if valid, _ := totp.ValidateCustom(code, secret, time.Now(), opts); !valid {
|
|
err := store.DB.Transaction(func(tx *gorm.DB) error {
|
|
if failedTime + APPMFAFailPeriod > curTime {
|
|
if res := tx.Clauses(clause.OnConflict{
|
|
Columns: []clause.Column{{Name: "config_id"}},
|
|
DoUpdates: clause.AssignmentColumns([]string{"num_value"}),
|
|
}).Create(&store.Config{ConfigID: CNFMFAFailedCount, NumValue: failedCount + 1}).Error; res != nil {
|
|
return res
|
|
}
|
|
} else {
|
|
if res := tx.Clauses(clause.OnConflict{
|
|
Columns: []clause.Column{{Name: "config_id"}},
|
|
DoUpdates: clause.AssignmentColumns([]string{"num_value"}),
|
|
}).Create(&store.Config{ConfigID: CNFMFAFailedTime, NumValue: curTime}).Error; res != nil {
|
|
return res
|
|
}
|
|
if res := tx.Clauses(clause.OnConflict{
|
|
Columns: []clause.Column{{Name: "config_id"}},
|
|
DoUpdates: clause.AssignmentColumns([]string{"num_value"}),
|
|
}).Create(&store.Config{ConfigID: CNFMFAFailedCount, NumValue: 1}).Error; res != nil {
|
|
return res
|
|
}
|
|
}
|
|
return nil
|
|
})
|
|
if err != nil {
|
|
LogMsg("failed to increment fail count");
|
|
}
|
|
|
|
ErrResponse(w, http.StatusForbidden, errors.New("invalid code"))
|
|
return
|
|
}
|
|
}
|
|
|
|
// gernate app token
|
|
data, err := securerandom.Bytes(APPTokenSize)
|
|
if err != nil {
|
|
ErrResponse(w, http.StatusInternalServerError, err)
|
|
return
|
|
}
|
|
access := hex.EncodeToString(data)
|
|
|
|
err = store.DB.Transaction(func(tx *gorm.DB) error {
|
|
// upsert mfa enabled
|
|
if res := tx.Clauses(clause.OnConflict{
|
|
Columns: []clause.Column{{Name: "config_id"}},
|
|
DoUpdates: clause.AssignmentColumns([]string{"str_value"}),
|
|
}).Create(&store.Config{ConfigID: CNFAdminSession, StrValue: access}).Error; res != nil {
|
|
return res
|
|
}
|
|
return nil
|
|
})
|
|
if err != nil {
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
WriteResponse(w, access)
|
|
}
|