Adding Example App
This commit is contained in:
10
mfa/Email.py
10
mfa/Email.py
@@ -1,9 +1,9 @@
|
||||
from django.shortcuts import render,render_to_response
|
||||
from django.shortcuts import render
|
||||
from django.template.context_processors import csrf
|
||||
import datetime,random
|
||||
from random import randint
|
||||
from .models import *
|
||||
from django.template.context import RequestContext
|
||||
#from django.template.context import RequestContext
|
||||
from .views import login
|
||||
from .Common import send
|
||||
def sendEmail(request,username,secret):
|
||||
@@ -12,7 +12,7 @@ def sendEmail(request,username,secret):
|
||||
key = getattr(User, 'USERNAME_FIELD', 'username')
|
||||
kwargs = {key: username}
|
||||
user = User.objects.get(**kwargs)
|
||||
res=render_to_response("mfa_email_token_template.html",{"request":request,"user":user,'otp':secret})
|
||||
res=render(request,"mfa_email_token_template.html",{"request":request,"user":user,'otp':secret})
|
||||
return send([user.email],"OTP", res.content)
|
||||
|
||||
def start(request):
|
||||
@@ -32,7 +32,7 @@ def start(request):
|
||||
request.session["email_secret"] = str(randint(0,100000))
|
||||
if sendEmail(request, request.user.username, request.session["email_secret"]):
|
||||
context["sent"] = True
|
||||
return render_to_response("Email/Add.html", context, context_instance=RequestContext(request))
|
||||
return render(request,"Email/Add.html", context)
|
||||
def auth(request):
|
||||
context=csrf(request)
|
||||
if request.method=="POST":
|
||||
@@ -53,4 +53,4 @@ def auth(request):
|
||||
request.session["email_secret"] = str(randint(0, 100000))
|
||||
if sendEmail(request, request.session["base_username"], request.session["email_secret"]):
|
||||
context["sent"] = True
|
||||
return render_to_response("Email/Auth.html", context, context_instance = RequestContext(request))
|
||||
return render(request,"Email/Auth.html", context)
|
||||
|
||||
10
mfa/FIDO2.py
10
mfa/FIDO2.py
@@ -3,8 +3,8 @@ from fido2.server import Fido2Server, RelyingParty
|
||||
from fido2.ctap2 import AttestationObject, AuthenticatorData
|
||||
from django.template.context_processors import csrf
|
||||
from django.views.decorators.csrf import csrf_exempt
|
||||
from django.shortcuts import render_to_response
|
||||
from django.template.context import RequestContext
|
||||
from django.shortcuts import render
|
||||
#from django.template.context import RequestContext
|
||||
import simplejson
|
||||
from fido2 import cbor
|
||||
from django.http import HttpResponse
|
||||
@@ -19,7 +19,7 @@ from django.utils import timezone
|
||||
def recheck(request):
|
||||
context = csrf(request)
|
||||
context["mode"]="recheck"
|
||||
return render_to_response("FIDO2/recheck.html", context, context_instance=RequestContext(request))
|
||||
return request("FIDO2/recheck.html", context)
|
||||
|
||||
|
||||
def getServer():
|
||||
@@ -62,7 +62,7 @@ def complete_reg(request):
|
||||
return HttpResponse(simplejson.dumps({'status': 'ERR',"message":"Error on server, please try again later"}))
|
||||
def start(request):
|
||||
context = csrf(request)
|
||||
return render_to_response("FIDO2/Add.html", context, RequestContext(request))
|
||||
return render(request,"FIDO2/Add.html", context)
|
||||
|
||||
def getUserCredentials(username):
|
||||
credentials = []
|
||||
@@ -72,7 +72,7 @@ def getUserCredentials(username):
|
||||
|
||||
def auth(request):
|
||||
context=csrf(request)
|
||||
return render_to_response("FIDO2/Auth.html",context,context_instance=RequestContext(request))
|
||||
return render(request,"FIDO2/Auth.html",context)
|
||||
|
||||
def authenticate_begin(request):
|
||||
server = getServer()
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
import string
|
||||
import random
|
||||
from django.shortcuts import render_to_response,render
|
||||
from django.shortcuts import render
|
||||
from django.http import HttpResponse
|
||||
from django.template.context import RequestContext
|
||||
from django.template.context_processors import csrf
|
||||
@@ -46,7 +46,7 @@ def getCookie(request):
|
||||
|
||||
if tk.properties["status"] == "trusted":
|
||||
context={"added":True}
|
||||
response = render_to_response("TrustedDevices/Done.html", context, context_instance=RequestContext(request))
|
||||
response = render(request,"TrustedDevices/Done.html", context)
|
||||
from datetime import datetime, timedelta
|
||||
expires = datetime.now() + timedelta(days=180)
|
||||
tk.expires=expires
|
||||
@@ -57,7 +57,7 @@ def getCookie(request):
|
||||
def add(request):
|
||||
context=csrf(request)
|
||||
if request.method=="GET":
|
||||
return render_to_response("TrustedDevices/Add.html",context,context_instance=RequestContext(request))
|
||||
return render(request,"TrustedDevices/Add.html",context)
|
||||
else:
|
||||
key=request.POST["key"].replace("-","").replace(" ","").upper()
|
||||
context["username"] = request.POST["username"]
|
||||
@@ -82,11 +82,11 @@ def add(request):
|
||||
else:
|
||||
context["invalid"]="The username or key is wrong, please check and try again."
|
||||
|
||||
return render_to_response("TrustedDevices/Add.html", context, context_instance=RequestContext(request))
|
||||
return render(request,"TrustedDevices/Add.html", context)
|
||||
|
||||
def start(request):
|
||||
if User_Keys.objects.filter(username=request.user.username,key_type="Trusted Device").count()>= 2:
|
||||
return render_to_response("TrustedDevices/start.html",{"not_allowed":True},context_instance=RequestContext(request))
|
||||
return render(request,"TrustedDevices/start.html",{"not_allowed":True})
|
||||
td=None
|
||||
if not request.session.get("td_id",None):
|
||||
td=User_Keys()
|
||||
@@ -101,7 +101,7 @@ def start(request):
|
||||
except:
|
||||
del request.session["td_id"]
|
||||
return start(request)
|
||||
return render_to_response("TrustedDevices/start.html",context,context_instance=RequestContext(request))
|
||||
return render(request,"TrustedDevices/start.html",context)
|
||||
|
||||
def send_email(request):
|
||||
body=render(request,"TrustedDevices/email.html",{}).content
|
||||
|
||||
10
mfa/U2F.py
10
mfa/U2F.py
@@ -4,9 +4,9 @@ from u2flib_server.u2f import (begin_registration, begin_authentication,
|
||||
from cryptography import x509
|
||||
from cryptography.hazmat.backends import default_backend
|
||||
from cryptography.hazmat.primitives.serialization import Encoding
|
||||
from django.shortcuts import render_to_response
|
||||
from django.shortcuts import render
|
||||
import simplejson
|
||||
from django.template.context import RequestContext
|
||||
#from django.template.context import RequestContext
|
||||
from django.template.context_processors import csrf
|
||||
from django.conf import settings
|
||||
from django.http import HttpResponse
|
||||
@@ -21,7 +21,7 @@ def recheck(request):
|
||||
request.session["_u2f_challenge_"] = s[0]
|
||||
context["token"] = s[1]
|
||||
request.session["mfa_recheck"]=True
|
||||
return render_to_response("U2F/recheck.html", context, context_instance=RequestContext(request))
|
||||
return render(request,"U2F/recheck.html", context)
|
||||
|
||||
def process_recheck(request):
|
||||
x=validate(request,request.user.username)
|
||||
@@ -66,14 +66,14 @@ def auth(request):
|
||||
request.session["_u2f_challenge_"]=s[0]
|
||||
context["token"]=s[1]
|
||||
|
||||
return render_to_response("U2F/Auth.html",context,context_instance = RequestContext(request))
|
||||
return render(request,"U2F/Auth.html")
|
||||
|
||||
def start(request):
|
||||
enroll = begin_registration(settings.U2F_APPID, [])
|
||||
request.session['_u2f_enroll_'] = enroll.json
|
||||
context=csrf(request)
|
||||
context["token"]=simplejson.dumps(enroll.data_for_client)
|
||||
return render_to_response("U2F/Add.html",context,RequestContext(request))
|
||||
return render(request,"U2F/Add.html",context)
|
||||
|
||||
|
||||
def bind(request):
|
||||
|
||||
10
mfa/totp.py
10
mfa/totp.py
@@ -1,5 +1,5 @@
|
||||
from django.shortcuts import render,render_to_response
|
||||
from django.http import HttpResponse
|
||||
from django.shortcuts import render
|
||||
#from django.http import HttpResponse
|
||||
from .models import *
|
||||
from django.template.context_processors import csrf
|
||||
import simplejson
|
||||
@@ -27,7 +27,7 @@ def recheck(request):
|
||||
return HttpResponse(simplejson.dumps({"recheck": True}), content_type="application/json")
|
||||
else:
|
||||
return HttpResponse(simplejson.dumps({"recheck": False}), content_type="application/json")
|
||||
return render_to_response("TOTP/recheck.html", context, context_instance=RequestContext(request))
|
||||
return render(request,"TOTP/recheck.html", context)
|
||||
|
||||
def auth(request):
|
||||
context=csrf(request)
|
||||
@@ -42,7 +42,7 @@ def auth(request):
|
||||
request.session["mfa"] = mfa
|
||||
return login(request)
|
||||
context["invalid"]=True
|
||||
return render_to_response("TOTP/Auth.html", context, context_instance = RequestContext(request))
|
||||
return render(request,"TOTP/Auth.html", context)
|
||||
|
||||
|
||||
|
||||
@@ -67,4 +67,4 @@ def verify(request):
|
||||
else: return HttpResponse("Error")
|
||||
|
||||
def start(request):
|
||||
return render_to_response("TOTP/Add.html",{},context_instance = RequestContext(request ))
|
||||
return render(request,"TOTP/Add.html",{})
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
from django.shortcuts import render,render_to_response
|
||||
from django.http import HttpResponse,HttpResponseRedirect
|
||||
from django.shortcuts import render
|
||||
#from django.http import HttpResponse,HttpResponseRedirect
|
||||
from .models import *
|
||||
try:
|
||||
from django.urls import reverse
|
||||
@@ -21,7 +21,7 @@ def index(request):
|
||||
setattr(k,"device",k.properties.get("type","----"))
|
||||
keys.append(k)
|
||||
context["keys"]=keys
|
||||
return render_to_response("MFA.html",context,context_instance=RequestContext(request))
|
||||
return render(request,"MFA.html",context)
|
||||
|
||||
def verify(request,username):
|
||||
request.session["base_username"] = username
|
||||
@@ -39,7 +39,7 @@ def verify(request,username):
|
||||
return show_methods(request)
|
||||
|
||||
def show_methods(request):
|
||||
return render_to_response("select_mfa_method.html", {}, context_instance = RequestContext(request))
|
||||
return render(request,"select_mfa_method.html", {})
|
||||
|
||||
def reset_cookie(request):
|
||||
response=HttpResponseRedirect(settings.BASE_URL)
|
||||
|
||||
Reference in New Issue
Block a user