Просмотр исходного кода

Saner TOTP provisioning

A user's e-mail address may be fluid, and the site "instance name"
may be strange or change regularly. There's no reason to use these
over the user's stable ID and the site's stable hostname for TOTP
parameters. Even if the system is built to TOLERATE changes (as it
is -- I tested it), it seems much more elegant to have these para-
meters as stable identifiers.
feature/saner-totp
James Edington 2 лет назад
Родитель
Сommit
21fe97fa16
2 измененных файлов: 2 добавлений и 2 удалений
  1. +1
    -1
      lib/pleroma/mfa/totp.ex
  2. +1
    -1
      lib/pleroma/web/pleroma_api/controllers/two_factor_authentication_controller.ex

+ 1
- 1
lib/pleroma/mfa/totp.ex Просмотреть файл

@@ -34,7 +34,7 @@ defmodule Pleroma.MFA.TOTP do
defp default_digits, do: Config.get(@config_ns ++ [:digits])

defp default_issuer,
do: Config.get(@config_ns ++ [:issuer], Config.get([:instance, :name]))
do: Config.get(@config_ns ++ [:issuer], Config.get([:instance, :host]))

@doc "Creates a random Base 32 encoded string"
def generate_secret do


+ 1
- 1
lib/pleroma/web/pleroma_api/controllers/two_factor_authentication_controller.ex Просмотреть файл

@@ -41,7 +41,7 @@ defmodule Pleroma.Web.PleromaAPI.TwoFactorAuthenticationController do
def setup(%{assigns: %{user: user}} = conn, %{"method" => "totp"} = _params) do
with {:ok, user} <- MFA.setup_totp(user),
%{secret: secret} = _ <- user.multi_factor_authentication_settings.totp do
provisioning_uri = TOTP.provisioning_uri(secret, "#{user.email}")
provisioning_uri = TOTP.provisioning_uri(secret, "#{user.ap_id}")

json(conn, %{provisioning_uri: provisioning_uri, key: secret})
else


Загрузка…
Отмена
Сохранить