Adding Example App

This commit is contained in:
Mohamed El-Kalioby
2019-06-20 19:15:55 +03:00
parent ed204c1d85
commit 215262a2c7
1764 changed files with 145755 additions and 30 deletions

View File

@@ -1,9 +1,9 @@
from django.shortcuts import render,render_to_response
from django.shortcuts import render
from django.template.context_processors import csrf
import datetime,random
from random import randint
from .models import *
from django.template.context import RequestContext
#from django.template.context import RequestContext
from .views import login
from .Common import send
def sendEmail(request,username,secret):
@@ -12,7 +12,7 @@ def sendEmail(request,username,secret):
key = getattr(User, 'USERNAME_FIELD', 'username')
kwargs = {key: username}
user = User.objects.get(**kwargs)
res=render_to_response("mfa_email_token_template.html",{"request":request,"user":user,'otp':secret})
res=render(request,"mfa_email_token_template.html",{"request":request,"user":user,'otp':secret})
return send([user.email],"OTP", res.content)
def start(request):
@@ -32,7 +32,7 @@ def start(request):
request.session["email_secret"] = str(randint(0,100000))
if sendEmail(request, request.user.username, request.session["email_secret"]):
context["sent"] = True
return render_to_response("Email/Add.html", context, context_instance=RequestContext(request))
return render(request,"Email/Add.html", context)
def auth(request):
context=csrf(request)
if request.method=="POST":
@@ -53,4 +53,4 @@ def auth(request):
request.session["email_secret"] = str(randint(0, 100000))
if sendEmail(request, request.session["base_username"], request.session["email_secret"]):
context["sent"] = True
return render_to_response("Email/Auth.html", context, context_instance = RequestContext(request))
return render(request,"Email/Auth.html", context)

View File

@@ -3,8 +3,8 @@ from fido2.server import Fido2Server, RelyingParty
from fido2.ctap2 import AttestationObject, AuthenticatorData
from django.template.context_processors import csrf
from django.views.decorators.csrf import csrf_exempt
from django.shortcuts import render_to_response
from django.template.context import RequestContext
from django.shortcuts import render
#from django.template.context import RequestContext
import simplejson
from fido2 import cbor
from django.http import HttpResponse
@@ -19,7 +19,7 @@ from django.utils import timezone
def recheck(request):
context = csrf(request)
context["mode"]="recheck"
return render_to_response("FIDO2/recheck.html", context, context_instance=RequestContext(request))
return request("FIDO2/recheck.html", context)
def getServer():
@@ -62,7 +62,7 @@ def complete_reg(request):
return HttpResponse(simplejson.dumps({'status': 'ERR',"message":"Error on server, please try again later"}))
def start(request):
context = csrf(request)
return render_to_response("FIDO2/Add.html", context, RequestContext(request))
return render(request,"FIDO2/Add.html", context)
def getUserCredentials(username):
credentials = []
@@ -72,7 +72,7 @@ def getUserCredentials(username):
def auth(request):
context=csrf(request)
return render_to_response("FIDO2/Auth.html",context,context_instance=RequestContext(request))
return render(request,"FIDO2/Auth.html",context)
def authenticate_begin(request):
server = getServer()

View File

@@ -1,6 +1,6 @@
import string
import random
from django.shortcuts import render_to_response,render
from django.shortcuts import render
from django.http import HttpResponse
from django.template.context import RequestContext
from django.template.context_processors import csrf
@@ -46,7 +46,7 @@ def getCookie(request):
if tk.properties["status"] == "trusted":
context={"added":True}
response = render_to_response("TrustedDevices/Done.html", context, context_instance=RequestContext(request))
response = render(request,"TrustedDevices/Done.html", context)
from datetime import datetime, timedelta
expires = datetime.now() + timedelta(days=180)
tk.expires=expires
@@ -57,7 +57,7 @@ def getCookie(request):
def add(request):
context=csrf(request)
if request.method=="GET":
return render_to_response("TrustedDevices/Add.html",context,context_instance=RequestContext(request))
return render(request,"TrustedDevices/Add.html",context)
else:
key=request.POST["key"].replace("-","").replace(" ","").upper()
context["username"] = request.POST["username"]
@@ -82,11 +82,11 @@ def add(request):
else:
context["invalid"]="The username or key is wrong, please check and try again."
return render_to_response("TrustedDevices/Add.html", context, context_instance=RequestContext(request))
return render(request,"TrustedDevices/Add.html", context)
def start(request):
if User_Keys.objects.filter(username=request.user.username,key_type="Trusted Device").count()>= 2:
return render_to_response("TrustedDevices/start.html",{"not_allowed":True},context_instance=RequestContext(request))
return render(request,"TrustedDevices/start.html",{"not_allowed":True})
td=None
if not request.session.get("td_id",None):
td=User_Keys()
@@ -101,7 +101,7 @@ def start(request):
except:
del request.session["td_id"]
return start(request)
return render_to_response("TrustedDevices/start.html",context,context_instance=RequestContext(request))
return render(request,"TrustedDevices/start.html",context)
def send_email(request):
body=render(request,"TrustedDevices/email.html",{}).content

View File

@@ -4,9 +4,9 @@ from u2flib_server.u2f import (begin_registration, begin_authentication,
from cryptography import x509
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives.serialization import Encoding
from django.shortcuts import render_to_response
from django.shortcuts import render
import simplejson
from django.template.context import RequestContext
#from django.template.context import RequestContext
from django.template.context_processors import csrf
from django.conf import settings
from django.http import HttpResponse
@@ -21,7 +21,7 @@ def recheck(request):
request.session["_u2f_challenge_"] = s[0]
context["token"] = s[1]
request.session["mfa_recheck"]=True
return render_to_response("U2F/recheck.html", context, context_instance=RequestContext(request))
return render(request,"U2F/recheck.html", context)
def process_recheck(request):
x=validate(request,request.user.username)
@@ -66,14 +66,14 @@ def auth(request):
request.session["_u2f_challenge_"]=s[0]
context["token"]=s[1]
return render_to_response("U2F/Auth.html",context,context_instance = RequestContext(request))
return render(request,"U2F/Auth.html")
def start(request):
enroll = begin_registration(settings.U2F_APPID, [])
request.session['_u2f_enroll_'] = enroll.json
context=csrf(request)
context["token"]=simplejson.dumps(enroll.data_for_client)
return render_to_response("U2F/Add.html",context,RequestContext(request))
return render(request,"U2F/Add.html",context)
def bind(request):

View File

@@ -1,5 +1,5 @@
from django.shortcuts import render,render_to_response
from django.http import HttpResponse
from django.shortcuts import render
#from django.http import HttpResponse
from .models import *
from django.template.context_processors import csrf
import simplejson
@@ -27,7 +27,7 @@ def recheck(request):
return HttpResponse(simplejson.dumps({"recheck": True}), content_type="application/json")
else:
return HttpResponse(simplejson.dumps({"recheck": False}), content_type="application/json")
return render_to_response("TOTP/recheck.html", context, context_instance=RequestContext(request))
return render(request,"TOTP/recheck.html", context)
def auth(request):
context=csrf(request)
@@ -42,7 +42,7 @@ def auth(request):
request.session["mfa"] = mfa
return login(request)
context["invalid"]=True
return render_to_response("TOTP/Auth.html", context, context_instance = RequestContext(request))
return render(request,"TOTP/Auth.html", context)
@@ -67,4 +67,4 @@ def verify(request):
else: return HttpResponse("Error")
def start(request):
return render_to_response("TOTP/Add.html",{},context_instance = RequestContext(request ))
return render(request,"TOTP/Add.html",{})

View File

@@ -1,5 +1,5 @@
from django.shortcuts import render,render_to_response
from django.http import HttpResponse,HttpResponseRedirect
from django.shortcuts import render
#from django.http import HttpResponse,HttpResponseRedirect
from .models import *
try:
from django.urls import reverse
@@ -21,7 +21,7 @@ def index(request):
setattr(k,"device",k.properties.get("type","----"))
keys.append(k)
context["keys"]=keys
return render_to_response("MFA.html",context,context_instance=RequestContext(request))
return render(request,"MFA.html",context)
def verify(request,username):
request.session["base_username"] = username
@@ -39,7 +39,7 @@ def verify(request,username):
return show_methods(request)
def show_methods(request):
return render_to_response("select_mfa_method.html", {}, context_instance = RequestContext(request))
return render(request,"select_mfa_method.html", {})
def reset_cookie(request):
response=HttpResponseRedirect(settings.BASE_URL)