2FA controller cleanup (#2296)
* Add spec coverage for settings/two_factor_auth area * extract setup method for qr code * Move otp required check to before action * Merge method only used once * Remove duplicate view * Consolidate creation of @codes for backup * Move settings/2fq#recovery_codes to settings/recovery_codes#create * Rename settings/two_factor_auth#disable to #destroy * Add coverage for the otp required path on 2fa#show * Clean up the recovery codes list styles * Move settings/two_factor_auth to settings/two_factor_authentication * Reorganize the settings two factor auth area Updated to use a flow like: - settings/two_factor_authentication goes to a #show view which has a button either enable or disable 2fa on the account - the disable button turns off the otp requirement for the user - the enable button cycles the user secret and redirects to a confirmation page - the confirmation page is a #new view which shows the QR code for user - that page posts to #create which verifies the code, and creates the recovery codes - that create action shares a view with a recovery codes controller which can be used separately to reset codes if neededmaster
parent
6af21daac9
commit
67dea31b0f
@ -0,0 +1,43 @@ |
||||
# frozen_string_literal: true |
||||
|
||||
module Settings |
||||
module TwoFactorAuthentication |
||||
class ConfirmationsController < ApplicationController |
||||
layout 'admin' |
||||
|
||||
before_action :authenticate_user! |
||||
|
||||
def new |
||||
prepare_two_factor_form |
||||
end |
||||
|
||||
def create |
||||
if current_user.validate_and_consume_otp!(confirmation_params[:code]) |
||||
flash[:notice] = I18n.t('two_factor_authentication.enabled_success') |
||||
|
||||
current_user.otp_required_for_login = true |
||||
@recovery_codes = current_user.generate_otp_backup_codes! |
||||
current_user.save! |
||||
|
||||
render 'settings/two_factor_authentication/recovery_codes/index' |
||||
else |
||||
flash.now[:alert] = I18n.t('two_factor_authentication.wrong_code') |
||||
prepare_two_factor_form |
||||
render :new |
||||
end |
||||
end |
||||
|
||||
private |
||||
|
||||
def confirmation_params |
||||
params.require(:form_two_factor_confirmation).permit(:code) |
||||
end |
||||
|
||||
def prepare_two_factor_form |
||||
@confirmation = Form::TwoFactorConfirmation.new |
||||
@provision_url = current_user.otp_provisioning_uri(current_user.email, issuer: Rails.configuration.x.local_domain) |
||||
@qrcode = RQRCode::QRCode.new(@provision_url) |
||||
end |
||||
end |
||||
end |
||||
end |
@ -0,0 +1,18 @@ |
||||
# frozen_string_literal: true |
||||
|
||||
module Settings |
||||
module TwoFactorAuthentication |
||||
class RecoveryCodesController < ApplicationController |
||||
layout 'admin' |
||||
|
||||
before_action :authenticate_user! |
||||
|
||||
def create |
||||
@recovery_codes = current_user.generate_otp_backup_codes! |
||||
current_user.save! |
||||
flash[:notice] = I18n.t('two_factor_authentication.recovery_codes_regenerated') |
||||
render :index |
||||
end |
||||
end |
||||
end |
||||
end |
@ -0,0 +1,30 @@ |
||||
# frozen_string_literal: true |
||||
|
||||
module Settings |
||||
class TwoFactorAuthenticationsController < ApplicationController |
||||
layout 'admin' |
||||
|
||||
before_action :authenticate_user! |
||||
before_action :verify_otp_required, only: [:create] |
||||
|
||||
def show; end |
||||
|
||||
def create |
||||
current_user.otp_secret = User.generate_otp_secret(32) |
||||
current_user.save! |
||||
redirect_to new_settings_two_factor_authentication_confirmation_path |
||||
end |
||||
|
||||
def destroy |
||||
current_user.otp_required_for_login = false |
||||
current_user.save! |
||||
redirect_to settings_two_factor_authentication_path |
||||
end |
||||
|
||||
private |
||||
|
||||
def verify_otp_required |
||||
redirect_to settings_two_factor_authentication_path if current_user.otp_required_for_login? |
||||
end |
||||
end |
||||
end |
@ -1,56 +0,0 @@ |
||||
# frozen_string_literal: true |
||||
|
||||
class Settings::TwoFactorAuthsController < ApplicationController |
||||
layout 'admin' |
||||
|
||||
before_action :authenticate_user! |
||||
|
||||
def show; end |
||||
|
||||
def new |
||||
redirect_to settings_two_factor_auth_path if current_user.otp_required_for_login |
||||
|
||||
@confirmation = Form::TwoFactorConfirmation.new |
||||
current_user.otp_secret = User.generate_otp_secret(32) |
||||
current_user.save! |
||||
set_qr_code |
||||
end |
||||
|
||||
def create |
||||
if current_user.validate_and_consume_otp!(confirmation_params[:code]) |
||||
current_user.otp_required_for_login = true |
||||
@codes = current_user.generate_otp_backup_codes! |
||||
current_user.save! |
||||
flash[:notice] = I18n.t('two_factor_auth.enabled_success') |
||||
else |
||||
@confirmation = Form::TwoFactorConfirmation.new |
||||
set_qr_code |
||||
flash.now[:alert] = I18n.t('two_factor_auth.wrong_code') |
||||
render :new |
||||
end |
||||
end |
||||
|
||||
def recovery_codes |
||||
@codes = current_user.generate_otp_backup_codes! |
||||
current_user.save! |
||||
flash[:notice] = I18n.t('two_factor_auth.recovery_codes_regenerated') |
||||
end |
||||
|
||||
def disable |
||||
current_user.otp_required_for_login = false |
||||
current_user.save! |
||||
|
||||
redirect_to settings_two_factor_auth_path |
||||
end |
||||
|
||||
private |
||||
|
||||
def set_qr_code |
||||
@provision_url = current_user.otp_provisioning_uri(current_user.email, issuer: Rails.configuration.x.local_domain) |
||||
@qrcode = RQRCode::QRCode.new(@provision_url) |
||||
end |
||||
|
||||
def confirmation_params |
||||
params.require(:form_two_factor_confirmation).permit(:code) |
||||
end |
||||
end |
@ -0,0 +1,17 @@ |
||||
- content_for :page_title do |
||||
= t('settings.two_factor_authentication') |
||||
|
||||
= simple_form_for @confirmation, url: settings_two_factor_authentication_confirmation_path, method: :post do |f| |
||||
%p.hint= t('two_factor_authentication.instructions_html') |
||||
|
||||
.qr-wrapper |
||||
.qr-code= raw @qrcode.as_svg(padding: 0, module_size: 4) |
||||
|
||||
.qr-alternative |
||||
%p.hint= t('two_factor_authentication.manual_instructions') |
||||
%samp.qr-alternative__code= current_user.otp_secret.scan(/.{4}/).join(' ') |
||||
|
||||
= f.input :code, hint: t('two_factor_authentication.code_hint'), placeholder: t('simple_form.labels.defaults.otp_attempt') |
||||
|
||||
.actions |
||||
= f.button :button, t('two_factor_authentication.enable'), type: :submit |
@ -0,0 +1,9 @@ |
||||
- content_for :page_title do |
||||
= t('settings.two_factor_authentication') |
||||
|
||||
%p.hint= t('two_factor_authentication.recovery_instructions') |
||||
|
||||
%ol.recovery-codes |
||||
- @recovery_codes.each do |code| |
||||
%li< |
||||
%samp= code |
@ -0,0 +1,26 @@ |
||||
- content_for :page_title do |
||||
= t('settings.two_factor_authentication') |
||||
|
||||
.simple_form |
||||
%p.hint |
||||
= t('two_factor_authentication.description_html') |
||||
|
||||
- if current_user.otp_required_for_login |
||||
= link_to t('two_factor_authentication.disable'), |
||||
settings_two_factor_authentication_path, |
||||
data: { method: :delete }, |
||||
class: 'block-button' |
||||
- else |
||||
= link_to t('two_factor_authentication.setup'), |
||||
settings_two_factor_authentication_path, |
||||
data: { method: :post }, |
||||
class: 'block-button' |
||||
|
||||
- if current_user.otp_required_for_login |
||||
.simple_form |
||||
%p.hint |
||||
= t('two_factor_authentication.lost_recovery_codes') |
||||
= link_to t('two_factor_authentication.generate_recovery_codes'), |
||||
settings_two_factor_authentication_recovery_codes_path, |
||||
data: { method: :post }, |
||||
class: 'block-button' |
@ -1,6 +0,0 @@ |
||||
%p.hint= t('two_factor_auth.recovery_instructions') |
||||
|
||||
%ol.recovery-codes |
||||
- recovery_codes.each do |code| |
||||
%li |
||||
%samp= code |
@ -1,4 +0,0 @@ |
||||
- content_for :page_title do |
||||
= t('settings.two_factor_auth') |
||||
|
||||
= render 'recovery_codes', recovery_codes: @codes |
@ -1,17 +0,0 @@ |
||||
- content_for :page_title do |
||||
= t('settings.two_factor_auth') |
||||
|
||||
= simple_form_for @confirmation, url: settings_two_factor_auth_path, method: :post do |f| |
||||
%p.hint= t('two_factor_auth.instructions_html') |
||||
|
||||
.qr-wrapper |
||||
.qr-code= raw @qrcode.as_svg(padding: 0, module_size: 4) |
||||
|
||||
.qr-alternative |
||||
%p.hint= t('two_factor_auth.manual_instructions') |
||||
%samp.qr-alternative__code= current_user.otp_secret.scan(/.{4}/).join(' ') |
||||
|
||||
= f.input :code, hint: t('two_factor_auth.code_hint'), placeholder: t('simple_form.labels.defaults.otp_attempt') |
||||
|
||||
.actions |
||||
= f.button :button, t('two_factor_auth.enable'), type: :submit |
@ -1,4 +0,0 @@ |
||||
- content_for :page_title do |
||||
= t('settings.two_factor_auth') |
||||
|
||||
= render 'recovery_codes', recovery_codes: @codes |
@ -1,17 +0,0 @@ |
||||
- content_for :page_title do |
||||
= t('settings.two_factor_auth') |
||||
|
||||
.simple_form |
||||
%p.hint= t('two_factor_auth.description_html') |
||||
|
||||
- if current_user.otp_required_for_login |
||||
= link_to t('two_factor_auth.disable'), disable_settings_two_factor_auth_path, data: { method: 'POST' }, class: 'block-button' |
||||
- else |
||||
= link_to t('two_factor_auth.setup'), new_settings_two_factor_auth_path, class: 'block-button' |
||||
|
||||
- if current_user.otp_required_for_login |
||||
%p |
||||
|
||||
.simple_form |
||||
%p.hint= t('two_factor_auth.lost_recovery_codes') |
||||
= link_to t('two_factor_auth.generate_recovery_codes'), recovery_codes_settings_two_factor_auth_path, data: { method: 'POST' }, class: 'block-button' |
@ -0,0 +1,46 @@ |
||||
# frozen_string_literal: true |
||||
|
||||
require 'rails_helper' |
||||
|
||||
describe Settings::TwoFactorAuthentication::ConfirmationsController do |
||||
render_views |
||||
|
||||
let(:user) { Fabricate(:user) } |
||||
before do |
||||
user.otp_secret = User.generate_otp_secret(32) |
||||
user.save! |
||||
|
||||
sign_in user, scope: :user |
||||
end |
||||
|
||||
describe 'GET #new' do |
||||
it 'returns http success' do |
||||
get :new |
||||
|
||||
expect(response).to have_http_status(:success) |
||||
expect(response).to render_template(:new) |
||||
end |
||||
end |
||||
|
||||
describe 'POST #create' do |
||||
describe 'when creation succeeds' do |
||||
it 'renders page with success' do |
||||
allow_any_instance_of(User).to receive(:validate_and_consume_otp!).with('123456').and_return(true) |
||||
|
||||
post :create, params: { form_two_factor_confirmation: { code: '123456' } } |
||||
expect(response).to have_http_status(:success) |
||||
expect(response).to render_template('settings/two_factor_authentication/recovery_codes/index') |
||||
end |
||||
end |
||||
|
||||
describe 'when creation fails' do |
||||
it 'renders the new view' do |
||||
allow_any_instance_of(User).to receive(:validate_and_consume_otp!).with('123456').and_return(false) |
||||
|
||||
post :create, params: { form_two_factor_confirmation: { code: '123456' } } |
||||
expect(response).to have_http_status(:success) |
||||
expect(response).to render_template(:new) |
||||
end |
||||
end |
||||
end |
||||
end |
@ -0,0 +1,25 @@ |
||||
# frozen_string_literal: true |
||||
|
||||
require 'rails_helper' |
||||
|
||||
describe Settings::TwoFactorAuthentication::RecoveryCodesController do |
||||
render_views |
||||
|
||||
let(:user) { Fabricate(:user) } |
||||
before do |
||||
sign_in user, scope: :user |
||||
end |
||||
|
||||
describe 'POST #create' do |
||||
it 'updates the codes and shows them on a view' do |
||||
before = user.otp_backup_codes |
||||
|
||||
post :create |
||||
user.reload |
||||
|
||||
expect(user.otp_backup_codes).not_to eq(before) |
||||
expect(response).to have_http_status(:success) |
||||
expect(response).to render_template(:index) |
||||
end |
||||
end |
||||
end |
@ -0,0 +1,66 @@ |
||||
# frozen_string_literal: true |
||||
|
||||
require 'rails_helper' |
||||
|
||||
describe Settings::TwoFactorAuthenticationsController do |
||||
render_views |
||||
|
||||
let(:user) { Fabricate(:user) } |
||||
before do |
||||
sign_in user, scope: :user |
||||
end |
||||
|
||||
describe 'GET #show' do |
||||
describe 'when user requires otp for login already' do |
||||
it 'returns http success' do |
||||
user.update(otp_required_for_login: true) |
||||
get :show |
||||
|
||||
expect(response).to have_http_status(:success) |
||||
end |
||||
end |
||||
|
||||
describe 'when user does not require otp for login' do |
||||
it 'returns http success' do |
||||
user.update(otp_required_for_login: false) |
||||
get :show |
||||
|
||||
expect(response).to have_http_status(:success) |
||||
end |
||||
end |
||||
end |
||||
|
||||
describe 'POST #create' do |
||||
describe 'when user requires otp for login already' do |
||||
it 'redirects to show page' do |
||||
user.update(otp_required_for_login: true) |
||||
post :create |
||||
|
||||
expect(response).to redirect_to(settings_two_factor_authentication_path) |
||||
end |
||||
end |
||||
|
||||
describe 'when creation succeeds' do |
||||
it 'updates user secret' do |
||||
before = user.otp_secret |
||||
post :create |
||||
|
||||
expect(user.reload.otp_secret).not_to eq(before) |
||||
expect(response).to redirect_to(new_settings_two_factor_authentication_confirmation_path) |
||||
end |
||||
end |
||||
end |
||||
|
||||
describe 'POST #destroy' do |
||||
before do |
||||
user.update(otp_required_for_login: true) |
||||
end |
||||
it 'turns off otp requirement' do |
||||
post :destroy |
||||
|
||||
expect(response).to redirect_to(settings_two_factor_authentication_path) |
||||
user.reload |
||||
expect(user.otp_required_for_login).to eq(false) |
||||
end |
||||
end |
||||
end |
Loading…
Reference in new issue