43 lines
1.1 KiB
Ruby
43 lines
1.1 KiB
Ruby
|
# frozen_string_literal: true
|
||
|
|
||
|
module Settings
|
||
|
module TwoFactorAuthentication
|
||
|
class OtpAuthenticationController < BaseController
|
||
|
include ChallengableConcern
|
||
|
|
||
|
layout 'admin'
|
||
|
|
||
|
before_action :authenticate_user!
|
||
|
before_action :verify_otp_not_enabled, only: [:show]
|
||
|
before_action :require_challenge!, only: [:create]
|
||
|
|
||
|
skip_before_action :require_functional!
|
||
|
|
||
|
def show
|
||
|
@confirmation = Form::TwoFactorConfirmation.new
|
||
|
end
|
||
|
|
||
|
def create
|
||
|
session[:new_otp_secret] = User.generate_otp_secret(32)
|
||
|
|
||
|
redirect_to new_settings_two_factor_authentication_confirmation_path
|
||
|
end
|
||
|
|
||
|
private
|
||
|
|
||
|
def confirmation_params
|
||
|
params.require(:form_two_factor_confirmation).permit(:otp_attempt)
|
||
|
end
|
||
|
|
||
|
def verify_otp_not_enabled
|
||
|
redirect_to settings_two_factor_authentication_methods_path if current_user.otp_enabled?
|
||
|
end
|
||
|
|
||
|
def acceptable_code?
|
||
|
current_user.validate_and_consume_otp!(confirmation_params[:otp_attempt]) ||
|
||
|
current_user.invalidate_otp_backup_code!(confirmation_params[:otp_attempt])
|
||
|
end
|
||
|
end
|
||
|
end
|
||
|
end
|