Better Error Handling
This commit is contained in:
12
mfa/FIDO2.py
12
mfa/FIDO2.py
@@ -12,7 +12,7 @@ from django.conf import settings
|
|||||||
from .models import *
|
from .models import *
|
||||||
from fido2.utils import websafe_decode,websafe_encode
|
from fido2.utils import websafe_decode,websafe_encode
|
||||||
from fido2.ctap2 import AttestedCredentialData
|
from fido2.ctap2 import AttestedCredentialData
|
||||||
from .views import login
|
from .views import login,reset_cookie
|
||||||
import datetime
|
import datetime
|
||||||
from django.utils import timezone
|
from django.utils import timezone
|
||||||
|
|
||||||
@@ -87,6 +87,7 @@ def authenticate_begin(request):
|
|||||||
|
|
||||||
@csrf_exempt
|
@csrf_exempt
|
||||||
def authenticate_complete(request):
|
def authenticate_complete(request):
|
||||||
|
try:
|
||||||
credentials = []
|
credentials = []
|
||||||
username=request.session.get("base_username",request.user.username)
|
username=request.session.get("base_username",request.user.username)
|
||||||
server=getServer()
|
server=getServer()
|
||||||
@@ -115,7 +116,7 @@ def authenticate_complete(request):
|
|||||||
except:
|
except:
|
||||||
pass
|
pass
|
||||||
return HttpResponse(simplejson.dumps({'status': "ERR",
|
return HttpResponse(simplejson.dumps({'status': "ERR",
|
||||||
"message": "Err: " + excep.message}),
|
"message": excep.message}),
|
||||||
content_type = "application/json")
|
content_type = "application/json")
|
||||||
|
|
||||||
if request.session.get("mfa_recheck",False):
|
if request.session.get("mfa_recheck",False):
|
||||||
@@ -135,6 +136,11 @@ def authenticate_complete(request):
|
|||||||
mfa["next_check"] = int((datetime.datetime.now()+ datetime.timedelta(
|
mfa["next_check"] = int((datetime.datetime.now()+ datetime.timedelta(
|
||||||
seconds=random.randint(settings.MFA_RECHECK_MIN, settings.MFA_RECHECK_MAX))).strftime("%s"))
|
seconds=random.randint(settings.MFA_RECHECK_MIN, settings.MFA_RECHECK_MAX))).strftime("%s"))
|
||||||
request.session["mfa"] = mfa
|
request.session["mfa"] = mfa
|
||||||
|
if not request.user.is_authenticated():
|
||||||
res=login(request)
|
res=login(request)
|
||||||
|
if not "location" in res: return reset_cookie(request)
|
||||||
return HttpResponse(simplejson.dumps({'status':"OK","redirect":res["location"]}),content_type="application/json")
|
return HttpResponse(simplejson.dumps({'status':"OK","redirect":res["location"]}),content_type="application/json")
|
||||||
return HttpResponse(simplejson.dumps({'status': "ERR","message":"Unknown error happened"}),content_type="application/json")
|
return HttpResponse(simplejson.dumps({'status': "OK"}),
|
||||||
|
content_type = "application/json")
|
||||||
|
except Exception as exp:
|
||||||
|
return HttpResponse(simplejson.dumps({'status': "ERR","message":exp.message}),content_type="application/json")
|
||||||
|
|||||||
@@ -82,7 +82,7 @@
|
|||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
$("#msgdiv").addClass("alert alert-danger").removeClass("alert-success")
|
$("#msgdiv").addClass("alert alert-danger").removeClass("alert-success")
|
||||||
$("#res").html("<div class='alert alert-danger'>Verification Failed as " + res["message"] + ", <a href='javascript:void(0)' onclick='authen())'> try again or <a href='javascript:void(0)' onclick='history.back()'> Go Back</a></div>")
|
$("#msgdiv").html("Verification Failed as " + res.message + ", <a href='javascript:void(0)' onclick='authen())'> try again</a> or <a href='javascript:void(0)' onclick='history.back()'> Go Back</a>")
|
||||||
|
|
||||||
{% if mode == "auth" %}
|
{% if mode == "auth" %}
|
||||||
|
|
||||||
|
|||||||
@@ -27,10 +27,7 @@ urlpatterns = [
|
|||||||
url(r'fido2/complete_auth', FIDO2.authenticate_complete, name="fido2_complete_auth"),
|
url(r'fido2/complete_auth', FIDO2.authenticate_complete, name="fido2_complete_auth"),
|
||||||
url(r'fido2/begin_reg', FIDO2.begin_registeration, name="fido2_begin_reg"),
|
url(r'fido2/begin_reg', FIDO2.begin_registeration, name="fido2_begin_reg"),
|
||||||
url(r'fido2/complete_reg', FIDO2.complete_reg, name="fido2_complete_reg"),
|
url(r'fido2/complete_reg', FIDO2.complete_reg, name="fido2_complete_reg"),
|
||||||
url(r'u2f/bind', U2F.bind, name="bind_u2f"),
|
url(r'fido2/recheck', FIDO2.recheck, name="fido2_recheck"),
|
||||||
url(r'u2f/auth', U2F.auth, name="u2f_auth"),
|
|
||||||
url(r'u2f/process_recheck', U2F.process_recheck, name="u2f_recheck"),
|
|
||||||
url(r'u2f/verify', U2F.verify, name="u2f_verify"),
|
|
||||||
|
|
||||||
|
|
||||||
url(r'td/$', TrustedDevice.start, name="start_td"),
|
url(r'td/$', TrustedDevice.start, name="start_td"),
|
||||||
|
|||||||
2
setup.py
2
setup.py
@@ -4,7 +4,7 @@ from setuptools import find_packages, setup
|
|||||||
|
|
||||||
setup(
|
setup(
|
||||||
name='django-mfa2',
|
name='django-mfa2',
|
||||||
version='1.7.5',
|
version='1.7.11',
|
||||||
description='Allows user to add 2FA to their accounts',
|
description='Allows user to add 2FA to their accounts',
|
||||||
long_description=open("README.md").read(),
|
long_description=open("README.md").read(),
|
||||||
long_description_content_type="text/markdown",
|
long_description_content_type="text/markdown",
|
||||||
|
|||||||
Reference in New Issue
Block a user