commit 5f6d721c091029f02efd6bbacc57fa9847d95dc5
parent ddda86b90d1d4db22ef86a183f00654d9b71271c
Author: Kumar Ankur <kmrankur@outlook.com>
Date: Fri, 10 Aug 2018 23:19:07 +0530
Implemented PUT for /two-factor/authenticator and /two-factor/disable
Diffstat:
2 files changed, 20 insertions(+), 0 deletions(-)
diff --git a/src/api/core/mod.rs b/src/api/core/mod.rs
@@ -66,8 +66,10 @@ pub fn routes() -> Vec<Route> {
get_recover,
recover,
disable_twofactor,
+ disable_twofactor_put,
generate_authenticator,
activate_authenticator,
+ activate_authenticator_put,
generate_u2f,
activate_u2f,
diff --git a/src/api/core/two_factor.rs b/src/api/core/two_factor.rs
@@ -112,6 +112,15 @@ fn disable_twofactor(
})))
}
+#[put("/two-factor/disable", data = "<data>")]
+fn disable_twofactor_put(
+ data: JsonUpcase<DisableTwoFactorData>,
+ headers: Headers,
+ conn: DbConn,
+) -> JsonResult {
+ disable_twofactor(data, headers, conn)
+}
+
#[post("/two-factor/get-authenticator", data = "<data>")]
fn generate_authenticator(
data: JsonUpcase<PasswordData>,
@@ -194,6 +203,15 @@ fn activate_authenticator(
})))
}
+#[put("/two-factor/authenticator", data = "<data>")]
+fn activate_authenticator_put(
+ data: JsonUpcase<EnableAuthenticatorData>,
+ headers: Headers,
+ conn: DbConn,
+) -> JsonResult {
+ activate_authenticator(data, headers, conn)
+}
+
fn _generate_recover_code(user: &mut User, conn: &DbConn) {
if user.totp_recover.is_none() {
let totp_recover = BASE32.encode(&crypto::get_random(vec![0u8; 20]));