github.com/greenpau/go-authcrunch@v1.1.4/pkg/authn/api_fetch_user_multi_factor_authenticators.go (about)

     1  // Copyright 2024 Paul Greenberg greenpau@outlook.com
     2  //
     3  // Licensed under the Apache License, Version 2.0 (the "License");
     4  // you may not use this file except in compliance with the License.
     5  // You may obtain a copy of the License at
     6  //
     7  //     http://www.apache.org/licenses/LICENSE-2.0
     8  //
     9  // Unless required by applicable law or agreed to in writing, software
    10  // distributed under the License is distributed on an "AS IS" BASIS,
    11  // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    12  // See the License for the specific language governing permissions and
    13  // limitations under the License.
    14  
    15  package authn
    16  
    17  import (
    18  	"context"
    19  	"net/http"
    20  
    21  	"github.com/greenpau/go-authcrunch/pkg/authn/enums/operator"
    22  	"github.com/greenpau/go-authcrunch/pkg/identity"
    23  	"github.com/greenpau/go-authcrunch/pkg/ids"
    24  	"github.com/greenpau/go-authcrunch/pkg/requests"
    25  	"github.com/greenpau/go-authcrunch/pkg/user"
    26  )
    27  
    28  // FetchUserMultiFactorVerifiers fetches app multi factor authenticators from user identity.
    29  func (p *Portal) FetchUserMultiFactorVerifiers(
    30  	ctx context.Context,
    31  	w http.ResponseWriter,
    32  	r *http.Request,
    33  	rr *requests.Request,
    34  	parsedUser *user.User,
    35  	resp map[string]interface{},
    36  	usr *user.User,
    37  	backend ids.IdentityStore) error {
    38  
    39  	// List MFA Tokens.
    40  	rr.MfaToken.IncludeAll = true
    41  	if err := backend.Request(operator.GetMfaTokens, rr); err != nil {
    42  		resp["message"] = "Profile API failed to get user multi factor authenticators"
    43  		return handleAPIProfileResponse(w, rr, http.StatusInternalServerError, resp)
    44  	}
    45  	bundle := rr.Response.Payload.(*identity.MfaTokenBundle)
    46  
    47  	tokens := bundle.Get()
    48  	// for _, token := range tokens {
    49  	// 	token.Secret = ""
    50  	// }
    51  	resp["entries"] = tokens
    52  	return handleAPIProfileResponse(w, rr, http.StatusOK, resp)
    53  }
    54  
    55  // FetchUserMultiFactorVerifier fetches app multi factor authenticator from user identity.
    56  func (p *Portal) FetchUserMultiFactorVerifier(
    57  	ctx context.Context,
    58  	w http.ResponseWriter,
    59  	r *http.Request,
    60  	rr *requests.Request,
    61  	parsedUser *user.User,
    62  	resp map[string]interface{},
    63  	usr *user.User,
    64  	backend ids.IdentityStore,
    65  	bodyData map[string]interface{}) error {
    66  
    67  	if v, exists := bodyData["id"]; exists {
    68  		rr.MfaToken.ID = v.(string)
    69  	} else {
    70  		resp["message"] = "Profile API did not find id in the request payload"
    71  		return handleAPIProfileResponse(w, rr, http.StatusBadRequest, resp)
    72  	}
    73  
    74  	// Get MFA Token
    75  	if err := backend.Request(operator.GetMfaToken, rr); err != nil {
    76  		resp["message"] = "Profile API failed to get user multi factor authenticator"
    77  		return handleAPIProfileResponse(w, rr, http.StatusInternalServerError, resp)
    78  	}
    79  	token := rr.Response.Payload.(*identity.MfaToken)
    80  	resp["entry"] = token
    81  	return handleAPIProfileResponse(w, rr, http.StatusOK, resp)
    82  }