commit 463878650772cbbe903057b47f0c00473fb13f43
parent 6eb1c3d63827bc5ab3cf641d743129b155b3ef02
Author: Daniel GarcĂa <dani-garcia@users.noreply.github.com>
Date: Fri, 9 Nov 2018 16:06:24 +0100
Merge branch 'master' into rocket-0.4
# Conflicts:
# src/api/core/mod.rs
Diffstat:
3 files changed, 24 insertions(+), 16 deletions(-)
diff --git a/Dockerfile.aarch64 b/Dockerfile.aarch64
@@ -79,7 +79,7 @@ RUN cargo build --release --target=aarch64-unknown-linux-gnu -v
######################## RUNTIME IMAGE ########################
# Create a new stage with a minimal image
# because we already have a binary built
-FROM resin/aarch64-debian:stretch
+FROM balenalib/aarch64-debian:stretch
ENV ROCKET_ENV "staging"
ENV ROCKET_PORT=80
diff --git a/Dockerfile.armv7 b/Dockerfile.armv7
@@ -79,7 +79,7 @@ RUN cargo build --release --target=armv7-unknown-linux-gnueabihf -v
######################## RUNTIME IMAGE ########################
# Create a new stage with a minimal image
# because we already have a binary built
-FROM resin/armv7hf-debian:stretch
+FROM balenalib/armv7hf-debian:stretch
ENV ROCKET_ENV "staging"
ENV ROCKET_PORT=80
diff --git a/src/api/core/two_factor.rs b/src/api/core/two_factor.rs
@@ -27,6 +27,7 @@ pub fn routes() -> Vec<Route> {
activate_authenticator,
activate_authenticator_put,
generate_u2f,
+ generate_u2f_challenge,
activate_u2f,
activate_u2f_put,
]
@@ -272,27 +273,34 @@ fn generate_u2f(data: JsonUpcase<PasswordData>, headers: Headers, conn: DbConn)
let user_uuid = &headers.user.uuid;
let u2f_type = TwoFactorType::U2f as i32;
- let register_type = TwoFactorType::U2fRegisterChallenge;
- let (enabled, challenge) = match TwoFactor::find_by_user_and_type(user_uuid, u2f_type, &conn) {
- Some(_) => (true, String::new()),
- None => {
- let c = _create_u2f_challenge(user_uuid, register_type, &conn);
- (false, c.challenge)
- }
- };
+ let enabled = TwoFactor::find_by_user_and_type(user_uuid, u2f_type, &conn).is_some();
Ok(Json(json!({
"Enabled": enabled,
- "Challenge": {
- "UserId": headers.user.uuid,
- "AppId": APP_ID.to_string(),
- "Challenge": challenge,
- "Version": U2F_VERSION,
- },
"Object": "twoFactorU2f"
})))
}
+#[post("/two-factor/get-u2f-challenge", data = "<data>")]
+fn generate_u2f_challenge(data: JsonUpcase<PasswordData>, headers: Headers, conn: DbConn) -> JsonResult {
+ let data: PasswordData = data.into_inner().data;
+
+ if !headers.user.check_valid_password(&data.MasterPasswordHash) {
+ err!("Invalid password");
+ }
+
+ let user_uuid = &headers.user.uuid;
+
+ let challenge = _create_u2f_challenge(user_uuid, TwoFactorType::U2fRegisterChallenge, &conn).challenge;
+
+ Ok(Json(json!({
+ "UserId": headers.user.uuid,
+ "AppId": APP_ID.to_string(),
+ "Challenge": challenge,
+ "Version": U2F_VERSION,
+ })))
+}
+
#[derive(Deserialize, Debug)]
#[allow(non_snake_case)]
struct EnableU2FData {