mashirozx/mastodon

View on GitHub
app/controllers/settings/two_factor_authentication/otp_authentication_controller.rb

Summary

Maintainability
A
0 mins
Test Coverage
# frozen_string_literal: true

module Settings
  module TwoFactorAuthentication
    class OtpAuthenticationController < BaseController
      include ChallengableConcern

      skip_before_action :require_functional!

      before_action :verify_otp_not_enabled, only: [:show]
      before_action :require_challenge!, only: [:create]

      def show
        @confirmation = Form::TwoFactorConfirmation.new
      end

      def create
        session[:new_otp_secret] = User.generate_otp_secret(32)

        redirect_to new_settings_two_factor_authentication_confirmation_path
      end

      private

      def confirmation_params
        params.require(:form_two_factor_confirmation).permit(:otp_attempt)
      end

      def verify_otp_not_enabled
        redirect_to settings_two_factor_authentication_methods_path if current_user.otp_enabled?
      end

      def acceptable_code?
        current_user.validate_and_consume_otp!(confirmation_params[:otp_attempt]) ||
          current_user.invalidate_otp_backup_code!(confirmation_params[:otp_attempt])
      end
    end
  end
end