github.com/greenpau/go-authcrunch@v1.1.4/pkg/authn/api_fetch_user_multi_factor_authenticators.go (about) 1 // Copyright 2024 Paul Greenberg greenpau@outlook.com 2 // 3 // Licensed under the Apache License, Version 2.0 (the "License"); 4 // you may not use this file except in compliance with the License. 5 // You may obtain a copy of the License at 6 // 7 // http://www.apache.org/licenses/LICENSE-2.0 8 // 9 // Unless required by applicable law or agreed to in writing, software 10 // distributed under the License is distributed on an "AS IS" BASIS, 11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 // See the License for the specific language governing permissions and 13 // limitations under the License. 14 15 package authn 16 17 import ( 18 "context" 19 "net/http" 20 21 "github.com/greenpau/go-authcrunch/pkg/authn/enums/operator" 22 "github.com/greenpau/go-authcrunch/pkg/identity" 23 "github.com/greenpau/go-authcrunch/pkg/ids" 24 "github.com/greenpau/go-authcrunch/pkg/requests" 25 "github.com/greenpau/go-authcrunch/pkg/user" 26 ) 27 28 // FetchUserMultiFactorVerifiers fetches app multi factor authenticators from user identity. 29 func (p *Portal) FetchUserMultiFactorVerifiers( 30 ctx context.Context, 31 w http.ResponseWriter, 32 r *http.Request, 33 rr *requests.Request, 34 parsedUser *user.User, 35 resp map[string]interface{}, 36 usr *user.User, 37 backend ids.IdentityStore) error { 38 39 // List MFA Tokens. 40 rr.MfaToken.IncludeAll = true 41 if err := backend.Request(operator.GetMfaTokens, rr); err != nil { 42 resp["message"] = "Profile API failed to get user multi factor authenticators" 43 return handleAPIProfileResponse(w, rr, http.StatusInternalServerError, resp) 44 } 45 bundle := rr.Response.Payload.(*identity.MfaTokenBundle) 46 47 tokens := bundle.Get() 48 // for _, token := range tokens { 49 // token.Secret = "" 50 // } 51 resp["entries"] = tokens 52 return handleAPIProfileResponse(w, rr, http.StatusOK, resp) 53 } 54 55 // FetchUserMultiFactorVerifier fetches app multi factor authenticator from user identity. 56 func (p *Portal) FetchUserMultiFactorVerifier( 57 ctx context.Context, 58 w http.ResponseWriter, 59 r *http.Request, 60 rr *requests.Request, 61 parsedUser *user.User, 62 resp map[string]interface{}, 63 usr *user.User, 64 backend ids.IdentityStore, 65 bodyData map[string]interface{}) error { 66 67 if v, exists := bodyData["id"]; exists { 68 rr.MfaToken.ID = v.(string) 69 } else { 70 resp["message"] = "Profile API did not find id in the request payload" 71 return handleAPIProfileResponse(w, rr, http.StatusBadRequest, resp) 72 } 73 74 // Get MFA Token 75 if err := backend.Request(operator.GetMfaToken, rr); err != nil { 76 resp["message"] = "Profile API failed to get user multi factor authenticator" 77 return handleAPIProfileResponse(w, rr, http.StatusInternalServerError, resp) 78 } 79 token := rr.Response.Payload.(*identity.MfaToken) 80 resp["entry"] = token 81 return handleAPIProfileResponse(w, rr, http.StatusOK, resp) 82 }