|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
module Settings
|
|
|
|
module TwoFactorAuthentication
|
|
|
|
class ConfirmationsController < BaseController
|
|
|
|
layout 'admin'
|
|
|
|
|
|
|
|
before_action :authenticate_user!
|
|
|
|
before_action :ensure_otp_secret
|
|
|
|
|
Change unconfirmed user login behaviour (#11375)
Allow access to account settings, 2FA, authorized applications, and
account deletions to unconfirmed and pending users, as well as
users who had their accounts disabled. Suspended users cannot update
their e-mail or password or delete their account.
Display account status on account settings page, for example, when
an account is frozen, limited, unconfirmed or pending review.
After sign up, login users straight away and show a simple page that
tells them the status of their account with links to account settings
and logout, to reduce onboarding friction and allow users to correct
wrongly typed e-mail addresses.
Move the final sign-up step of SSO integrations to be the same
as above to reduce code duplication.
5 years ago
|
|
|
skip_before_action :require_functional!
|
|
|
|
|
|
|
|
def new
|
|
|
|
prepare_two_factor_form
|
|
|
|
end
|
|
|
|
|
|
|
|
def create
|
|
|
|
if current_user.validate_and_consume_otp!(confirmation_params[:otp_attempt])
|
|
|
|
flash.now[:notice] = I18n.t('two_factor_authentication.enabled_success')
|
|
|
|
|
|
|
|
current_user.otp_required_for_login = true
|
|
|
|
@recovery_codes = current_user.generate_otp_backup_codes!
|
|
|
|
current_user.save!
|
|
|
|
|
|
|
|
render 'settings/two_factor_authentication/recovery_codes/index'
|
|
|
|
else
|
|
|
|
flash.now[:alert] = I18n.t('two_factor_authentication.wrong_code')
|
|
|
|
prepare_two_factor_form
|
|
|
|
render :new
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
|
|
|
def confirmation_params
|
|
|
|
params.require(:form_two_factor_confirmation).permit(:otp_attempt)
|
|
|
|
end
|
|
|
|
|
|
|
|
def prepare_two_factor_form
|
|
|
|
@confirmation = Form::TwoFactorConfirmation.new
|
|
|
|
@provision_url = current_user.otp_provisioning_uri(current_user.email, issuer: Rails.configuration.x.local_domain)
|
|
|
|
@qrcode = RQRCode::QRCode.new(@provision_url)
|
|
|
|
end
|
|
|
|
|
|
|
|
def ensure_otp_secret
|
|
|
|
redirect_to settings_two_factor_authentication_path unless current_user.otp_secret
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|