forked from MicroPyramid/django-mfa
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmodels.py
59 lines (42 loc) · 1.44 KB
/
models.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
from __future__ import division
from django.conf import settings
from django.db import models
class UserOTP(models.Model):
OTP_TYPES = (
('HOTP', 'hotp'),
('TOTP', 'totp'),
)
user = models.OneToOneField(
settings.AUTH_USER_MODEL, on_delete=models.PROTECT)
otp_type = models.CharField(max_length=20, choices=OTP_TYPES)
secret_key = models.CharField(max_length=100, blank=True)
def is_mfa_enabled(user):
"""
Determine if a user has MFA enabled
"""
return hasattr(user, 'userotp')
MFA_RECOVERY_CODE_LENGTH = 10
class UserRecoveryCodes(models.Model):
user = models.ForeignKey(UserOTP,
on_delete=models.CASCADE)
secret_code = models.CharField(max_length=10)
class U2FKey(models.Model):
user = models.ForeignKey(settings.AUTH_USER_MODEL, related_name='u2f_keys',
on_delete=models.CASCADE)
created_at = models.DateTimeField(auto_now_add=True)
last_used_at = models.DateTimeField(null=True)
public_key = models.TextField(unique=True)
key_handle = models.TextField()
app_id = models.TextField()
def to_json(self):
return {
'publicKey': self.public_key,
'keyHandle': self.key_handle,
'appId': self.app_id,
'version': 'U2F_V2',
}
def is_u2f_enabled(user):
"""
Determine if a user has U2F enabled
"""
return user.u2f_keys.all().exists()