commit
d0bae67940
|
@ -38,5 +38,5 @@ nosetests.xml
|
||||||
venv
|
venv
|
||||||
app.db
|
app.db
|
||||||
microblog.log*
|
microblog.log*
|
||||||
|
.env
|
||||||
.idea/
|
.idea/
|
|
@ -9,6 +9,7 @@ RUN python -m venv venv
|
||||||
RUN venv/bin/pip install -r requirements.txt
|
RUN venv/bin/pip install -r requirements.txt
|
||||||
RUN venv/bin/pip install gunicorn pymysql cryptography
|
RUN venv/bin/pip install gunicorn pymysql cryptography
|
||||||
|
|
||||||
|
COPY .env .env
|
||||||
COPY app app
|
COPY app app
|
||||||
COPY migrations migrations
|
COPY migrations migrations
|
||||||
COPY microblog.py config.py boot.sh ./
|
COPY microblog.py config.py boot.sh ./
|
||||||
|
@ -16,6 +17,10 @@ RUN chmod a+x boot.sh
|
||||||
|
|
||||||
ENV FLASK_APP microblog.py
|
ENV FLASK_APP microblog.py
|
||||||
|
|
||||||
|
CMD flask db upgrade
|
||||||
|
CMD flask db migrate -m "two-factor authentication"
|
||||||
|
CMD flask db upgrade
|
||||||
|
|
||||||
RUN chown -R microblog:microblog ./
|
RUN chown -R microblog:microblog ./
|
||||||
USER microblog
|
USER microblog
|
||||||
|
|
||||||
|
|
|
@ -4,7 +4,6 @@ from wtforms.validators import ValidationError, DataRequired, Email, EqualTo
|
||||||
from flask_babel import _, lazy_gettext as _l
|
from flask_babel import _, lazy_gettext as _l
|
||||||
from app.models import User
|
from app.models import User
|
||||||
|
|
||||||
|
|
||||||
class LoginForm(FlaskForm):
|
class LoginForm(FlaskForm):
|
||||||
username = StringField(_l('Username'), validators=[DataRequired()])
|
username = StringField(_l('Username'), validators=[DataRequired()])
|
||||||
password = PasswordField(_l('Password'), validators=[DataRequired()])
|
password = PasswordField(_l('Password'), validators=[DataRequired()])
|
||||||
|
@ -12,6 +11,20 @@ class LoginForm(FlaskForm):
|
||||||
submit = SubmitField(_l('Sign In'))
|
submit = SubmitField(_l('Sign In'))
|
||||||
|
|
||||||
|
|
||||||
|
class Confirm2faForm(FlaskForm):
|
||||||
|
token = StringField('Token')
|
||||||
|
submit = SubmitField('Verify')
|
||||||
|
|
||||||
|
|
||||||
|
class Enable2faForm(FlaskForm):
|
||||||
|
verification_phone = StringField('Phone', validators=[DataRequired()])
|
||||||
|
submit = SubmitField('Enable 2FA')
|
||||||
|
|
||||||
|
|
||||||
|
class Disable2faForm(FlaskForm):
|
||||||
|
submit = SubmitField('Disable 2FA')
|
||||||
|
|
||||||
|
|
||||||
class RegistrationForm(FlaskForm):
|
class RegistrationForm(FlaskForm):
|
||||||
username = StringField(_l('Username'), validators=[DataRequired()])
|
username = StringField(_l('Username'), validators=[DataRequired()])
|
||||||
email = StringField(_l('Email'), validators=[DataRequired(), Email()])
|
email = StringField(_l('Email'), validators=[DataRequired(), Email()])
|
||||||
|
|
|
@ -1,10 +1,11 @@
|
||||||
from flask import render_template, redirect, url_for, flash, request
|
from app.auth.twilio_verify import check_verification_token, request_verification_token
|
||||||
|
from flask import render_template, redirect, url_for, flash, request, session
|
||||||
from werkzeug.urls import url_parse
|
from werkzeug.urls import url_parse
|
||||||
from flask_login import login_user, logout_user, current_user
|
from flask_login import login_user, login_required, logout_user, current_user
|
||||||
from flask_babel import _
|
from flask_babel import _
|
||||||
from app import db
|
from app import db
|
||||||
from app.auth import bp
|
from app.auth import bp
|
||||||
from app.auth.forms import LoginForm, RegistrationForm, \
|
from app.auth.forms import Confirm2faForm, Disable2faForm, Enable2faForm, LoginForm, RegistrationForm, \
|
||||||
ResetPasswordRequestForm, ResetPasswordForm
|
ResetPasswordRequestForm, ResetPasswordForm
|
||||||
from app.models import User
|
from app.models import User
|
||||||
from app.auth.email import send_password_reset_email
|
from app.auth.email import send_password_reset_email
|
||||||
|
@ -20,14 +21,68 @@ def login():
|
||||||
if user is None or not user.check_password(form.password.data):
|
if user is None or not user.check_password(form.password.data):
|
||||||
flash(_('Invalid username or password'))
|
flash(_('Invalid username or password'))
|
||||||
return redirect(url_for('auth.login'))
|
return redirect(url_for('auth.login'))
|
||||||
login_user(user, remember=form.remember_me.data)
|
|
||||||
next_page = request.args.get('next')
|
next_page = request.args.get('next')
|
||||||
if not next_page or url_parse(next_page).netloc != '':
|
if not next_page or url_parse(next_page).netloc != '':
|
||||||
next_page = url_for('main.index')
|
next_page = url_for('main.index')
|
||||||
|
if user.two_factor_enabled():
|
||||||
|
request_verification_token(user.verification_phone)
|
||||||
|
session['username'] = user.username
|
||||||
|
session['phone'] = user.verification_phone
|
||||||
|
return redirect(url_for(
|
||||||
|
'auth.verify_2fa', next=next_page,
|
||||||
|
remember='1' if form.remember_me.data else '0'))
|
||||||
|
login_user(user, remember=form.remember_me.data)
|
||||||
return redirect(next_page)
|
return redirect(next_page)
|
||||||
return render_template('auth/login.html', title=_('Sign In'), form=form)
|
return render_template('auth/login.html', title=_('Sign In'), form=form)
|
||||||
|
|
||||||
|
|
||||||
|
@bp.route('/verify_2fa', methods=['GET', 'POST'])
|
||||||
|
def verify_2fa():
|
||||||
|
form = Confirm2faForm()
|
||||||
|
if form.validate_on_submit():
|
||||||
|
phone = session['phone']
|
||||||
|
if check_verification_token(phone, form.token.data):
|
||||||
|
if current_user.is_authenticated:
|
||||||
|
current_user.verification_phone = phone
|
||||||
|
db.session.commit()
|
||||||
|
flash('Two-factor authentication is now enabled')
|
||||||
|
return redirect(url_for('main.index'))
|
||||||
|
else:
|
||||||
|
username = session['username']
|
||||||
|
user = User.query.filter_by(username=username).first()
|
||||||
|
next_page = request.args.get('next')
|
||||||
|
remember = request.args.get('remember', '0') == '1'
|
||||||
|
if not next_page or url_parse(next_page).netloc != '':
|
||||||
|
next_page = url_for('main.index')
|
||||||
|
login_user(user, remember=remember)
|
||||||
|
return redirect(next_page)
|
||||||
|
form.token.errors.append('Invalid token')
|
||||||
|
return render_template('auth/verify_2fa.html', form=form)
|
||||||
|
|
||||||
|
|
||||||
|
@bp.route('/enable_2fa', methods=['GET', 'POST'])
|
||||||
|
@login_required
|
||||||
|
def enable_2fa():
|
||||||
|
form = Enable2faForm()
|
||||||
|
if form.validate_on_submit():
|
||||||
|
session['phone'] = form.verification_phone.data
|
||||||
|
request_verification_token(session['phone'])
|
||||||
|
return redirect(url_for('auth.verify_2fa'))
|
||||||
|
return render_template('auth/enable_2fa.html', form=form)
|
||||||
|
|
||||||
|
|
||||||
|
@bp.route('/disable_2fa', methods=['GET', 'POST'])
|
||||||
|
@login_required
|
||||||
|
def disable_2fa():
|
||||||
|
form = Disable2faForm()
|
||||||
|
if form.validate_on_submit():
|
||||||
|
current_user.verification_phone = None
|
||||||
|
db.session.commit()
|
||||||
|
flash('Two-factor authentication is now disabled.')
|
||||||
|
return redirect(url_for('main.index'))
|
||||||
|
return render_template('auth/disable_2fa.html', form=form)
|
||||||
|
|
||||||
|
|
||||||
@bp.route('/logout')
|
@bp.route('/logout')
|
||||||
def logout():
|
def logout():
|
||||||
logout_user()
|
logout_user()
|
||||||
|
|
|
@ -0,0 +1,26 @@
|
||||||
|
from flask import current_app
|
||||||
|
from twilio.rest import Client, TwilioException
|
||||||
|
|
||||||
|
|
||||||
|
def _get_twilio_verify_client():
|
||||||
|
return Client(
|
||||||
|
current_app.config['TWILIO_ACCOUNT_SID'],
|
||||||
|
current_app.config['TWILIO_AUTH_TOKEN']).verify.services(
|
||||||
|
current_app.config['TWILIO_VERIFY_SERVICE_ID'])
|
||||||
|
|
||||||
|
|
||||||
|
def request_verification_token(phone):
|
||||||
|
verify = _get_twilio_verify_client()
|
||||||
|
try:
|
||||||
|
verify.verifications.create(to=phone, channel='sms')
|
||||||
|
except TwilioException:
|
||||||
|
verify.verifications.create(to=phone, channel='call')
|
||||||
|
|
||||||
|
|
||||||
|
def check_verification_token(phone, token):
|
||||||
|
verify = _get_twilio_verify_client()
|
||||||
|
try:
|
||||||
|
result = verify.verification_checks.create(to=phone, code=token)
|
||||||
|
except TwilioException:
|
||||||
|
return False
|
||||||
|
return result.status == 'approved'
|
|
@ -94,6 +94,7 @@ class User(UserMixin, PaginatedAPIMixin, db.Model):
|
||||||
username = db.Column(db.String(64), index=True, unique=True)
|
username = db.Column(db.String(64), index=True, unique=True)
|
||||||
email = db.Column(db.String(120), index=True, unique=True)
|
email = db.Column(db.String(120), index=True, unique=True)
|
||||||
password_hash = db.Column(db.String(128))
|
password_hash = db.Column(db.String(128))
|
||||||
|
verification_phone = db.Column(db.String(16))
|
||||||
posts = db.relationship('Post', backref='author', lazy='dynamic')
|
posts = db.relationship('Post', backref='author', lazy='dynamic')
|
||||||
about_me = db.Column(db.String(140))
|
about_me = db.Column(db.String(140))
|
||||||
last_seen = db.Column(db.DateTime, default=datetime.utcnow)
|
last_seen = db.Column(db.DateTime, default=datetime.utcnow)
|
||||||
|
@ -123,6 +124,9 @@ class User(UserMixin, PaginatedAPIMixin, db.Model):
|
||||||
|
|
||||||
def check_password(self, password):
|
def check_password(self, password):
|
||||||
return check_password_hash(self.password_hash, password)
|
return check_password_hash(self.password_hash, password)
|
||||||
|
|
||||||
|
def two_factor_enabled(self):
|
||||||
|
return self.verification_phone is not None
|
||||||
|
|
||||||
def avatar(self, size):
|
def avatar(self, size):
|
||||||
digest = md5(self.email.lower().encode('utf-8')).hexdigest()
|
digest = md5(self.email.lower().encode('utf-8')).hexdigest()
|
||||||
|
|
|
@ -0,0 +1,13 @@
|
||||||
|
{# app/templates/auth/disable_2fa.html #}
|
||||||
|
{% extends 'base.html' %}
|
||||||
|
{% import 'bootstrap/wtf.html' as wtf %}
|
||||||
|
|
||||||
|
{% block app_content %}
|
||||||
|
<h1>Disable Two-Factor Authentication</h1>
|
||||||
|
<p>Please click the button below to disable two-factor authentication on your account.</p>
|
||||||
|
<div class="row">
|
||||||
|
<div class="col-md-4">
|
||||||
|
{{ wtf.quick_form(form) }}
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
{% endblock %}
|
|
@ -0,0 +1,34 @@
|
||||||
|
{% extends 'base.html' %}
|
||||||
|
{% import 'bootstrap/wtf.html' as wtf %}
|
||||||
|
|
||||||
|
{% block app_content %}
|
||||||
|
<h1>Enable Two-Factor Authentication</h1>
|
||||||
|
<p>Please enter your mobile number to activate two-factor authentication on your account.</p>
|
||||||
|
<div class="row">
|
||||||
|
<div class="col-md-4">
|
||||||
|
{{ wtf.quick_form(form) }}
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
{% endblock %}
|
||||||
|
|
||||||
|
{% block styles %}
|
||||||
|
{{ super() }}
|
||||||
|
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/intl-tel-input/16.0.4/css/intlTelInput.css">
|
||||||
|
{% endblock %}
|
||||||
|
|
||||||
|
{% block scripts %}
|
||||||
|
{{ super() }}
|
||||||
|
<script src="https://cdnjs.cloudflare.com/ajax/libs/intl-tel-input/16.0.4/js/intlTelInput-jquery.min.js"></script>
|
||||||
|
<script>
|
||||||
|
$("#verification_phone").css({position: 'absolute', top: '-9999px', left: '-9999px'});
|
||||||
|
$("#verification_phone").parent().append('<div><input type="tel" id="_verification_phone"></div>');
|
||||||
|
$("#_verification_phone").intlTelInput({
|
||||||
|
separateDialCode: true,
|
||||||
|
utilsScript: "https://cdnjs.cloudflare.com/ajax/libs/intl-tel-input/16.0.4/js/utils.js",
|
||||||
|
});
|
||||||
|
$("#_verification_phone").intlTelInput("setNumber", $('#verification_phone').val());
|
||||||
|
$('#_verification_phone').blur(function() {
|
||||||
|
$('#verification_phone').val($('#_verification_phone').intlTelInput("getNumber"));
|
||||||
|
});
|
||||||
|
</script>
|
||||||
|
{% endblock %}
|
|
@ -0,0 +1,12 @@
|
||||||
|
{% extends 'base.html' %}
|
||||||
|
{% import 'bootstrap/wtf.html' as wtf %}
|
||||||
|
|
||||||
|
{% block app_content %}
|
||||||
|
<h1>Two-Factor Authentication</h1>
|
||||||
|
<p>Please enter the token that was sent to your phone.</p>
|
||||||
|
<div class="row">
|
||||||
|
<div class="col-md-4">
|
||||||
|
{{ wtf.quick_form(form) }}
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
{% endblock %}
|
|
@ -34,6 +34,11 @@
|
||||||
{% if user != current_user %}
|
{% if user != current_user %}
|
||||||
<p><a href="{{ url_for('main.send_message', recipient=user.username) }}">{{ _('Send private message') }}</a></p>
|
<p><a href="{{ url_for('main.send_message', recipient=user.username) }}">{{ _('Send private message') }}</a></p>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
{% if not user.two_factor_enabled() %}
|
||||||
|
<p><a href="{{ url_for('auth.enable_2fa') }}">{{ _('Enable two-factor authentication') }}</a></p>
|
||||||
|
{% else %}
|
||||||
|
<p><a href="{{ url_for('auth.disable_2fa') }}">{{ _('Disable two-factor authentication') }}</a></p>
|
||||||
|
{% endif %}
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
</table>
|
</table>
|
||||||
|
|
|
@ -11,6 +11,9 @@ class Config(object):
|
||||||
'postgres://', 'postgresql://') or \
|
'postgres://', 'postgresql://') or \
|
||||||
'sqlite:///' + os.path.join(basedir, 'app.db')
|
'sqlite:///' + os.path.join(basedir, 'app.db')
|
||||||
SQLALCHEMY_TRACK_MODIFICATIONS = False
|
SQLALCHEMY_TRACK_MODIFICATIONS = False
|
||||||
|
TWILIO_ACCOUNT_SID = os.environ.get('TWILIO_ACCOUNT_SID')
|
||||||
|
TWILIO_AUTH_TOKEN = os.environ.get('TWILIO_ACCOUNT_TOKEN')
|
||||||
|
TWILIO_VERIFY_SERVICE_ID = os.environ.get('TWILIO_VERIFY_SERVICE_ID')
|
||||||
LOG_TO_STDOUT = os.environ.get('LOG_TO_STDOUT')
|
LOG_TO_STDOUT = os.environ.get('LOG_TO_STDOUT')
|
||||||
MAIL_SERVER = os.environ.get('MAIL_SERVER')
|
MAIL_SERVER = os.environ.get('MAIL_SERVER')
|
||||||
MAIL_PORT = int(os.environ.get('MAIL_PORT') or 25)
|
MAIL_PORT = int(os.environ.get('MAIL_PORT') or 25)
|
||||||
|
|
|
@ -0,0 +1,28 @@
|
||||||
|
"""two-factor authentication
|
||||||
|
|
||||||
|
Revision ID: 23e9d8ca48c2
|
||||||
|
Revises: 834b1a697901
|
||||||
|
Create Date: 2023-03-04 14:26:06.269415
|
||||||
|
|
||||||
|
"""
|
||||||
|
from alembic import op
|
||||||
|
import sqlalchemy as sa
|
||||||
|
|
||||||
|
|
||||||
|
# revision identifiers, used by Alembic.
|
||||||
|
revision = '23e9d8ca48c2'
|
||||||
|
down_revision = '834b1a697901'
|
||||||
|
branch_labels = None
|
||||||
|
depends_on = None
|
||||||
|
|
||||||
|
|
||||||
|
def upgrade():
|
||||||
|
# ### commands auto generated by Alembic - please adjust! ###
|
||||||
|
op.add_column('user', sa.Column('verification_phone', sa.String(length=16), nullable=True))
|
||||||
|
# ### end Alembic commands ###
|
||||||
|
|
||||||
|
|
||||||
|
def downgrade():
|
||||||
|
# ### commands auto generated by Alembic - please adjust! ###
|
||||||
|
op.drop_column('user', 'verification_phone')
|
||||||
|
# ### end Alembic commands ###
|
|
@ -1,13 +1,17 @@
|
||||||
alembic==1.6.5
|
alembic==1.6.5
|
||||||
|
async-generator==1.10
|
||||||
|
attrs==22.2.0
|
||||||
Babel==2.9.1
|
Babel==2.9.1
|
||||||
blinker==1.4
|
blinker==1.4
|
||||||
certifi==2021.5.30
|
certifi==2021.5.30
|
||||||
chardet==4.0.0
|
chardet==4.0.0
|
||||||
|
charset-normalizer==3.0.1
|
||||||
click==8.0.1
|
click==8.0.1
|
||||||
dnspython==2.1.0
|
dnspython==2.1.0
|
||||||
dominate==2.6.0
|
dominate==2.6.0
|
||||||
elasticsearch==7.13.3
|
elasticsearch==7.13.3
|
||||||
email-validator==1.1.3
|
email-validator==1.1.3
|
||||||
|
exceptiongroup==1.1.0
|
||||||
Flask==2.0.1
|
Flask==2.0.1
|
||||||
Flask-Babel==2.0.0
|
Flask-Babel==2.0.0
|
||||||
Flask-Bootstrap==3.3.7.1
|
Flask-Bootstrap==3.3.7.1
|
||||||
|
@ -19,6 +23,7 @@ Flask-Moment==1.0.1
|
||||||
Flask-SQLAlchemy==2.5.1
|
Flask-SQLAlchemy==2.5.1
|
||||||
Flask-WTF==0.15.1
|
Flask-WTF==0.15.1
|
||||||
greenlet==2.0.2
|
greenlet==2.0.2
|
||||||
|
h11==0.14.0
|
||||||
httpie==2.4.0
|
httpie==2.4.0
|
||||||
idna==2.10
|
idna==2.10
|
||||||
itsdangerous==2.0.1
|
itsdangerous==2.0.1
|
||||||
|
@ -26,6 +31,7 @@ Jinja2==3.0.1
|
||||||
langdetect==1.0.9
|
langdetect==1.0.9
|
||||||
Mako==1.1.4
|
Mako==1.1.4
|
||||||
MarkupSafe==2.0.1
|
MarkupSafe==2.0.1
|
||||||
|
outcome==1.2.0
|
||||||
Pygments==2.9.0
|
Pygments==2.9.0
|
||||||
PyJWT==2.1.0
|
PyJWT==2.1.0
|
||||||
PySocks==1.7.1
|
PySocks==1.7.1
|
||||||
|
@ -37,16 +43,19 @@ redis==3.5.3
|
||||||
requests==2.25.1
|
requests==2.25.1
|
||||||
requests-toolbelt==0.9.1
|
requests-toolbelt==0.9.1
|
||||||
rq==1.9.0
|
rq==1.9.0
|
||||||
|
selenium==4.4.1
|
||||||
selenium
|
selenium
|
||||||
behave
|
behave
|
||||||
webdriver_manager
|
webdriver_manager
|
||||||
six==1.16.0
|
six==1.16.0
|
||||||
|
sniffio==1.3.0
|
||||||
|
sortedcontainers==2.4.0
|
||||||
SQLAlchemy==1.4.20
|
SQLAlchemy==1.4.20
|
||||||
|
trio==0.22.0
|
||||||
|
trio-websocket==0.9.2
|
||||||
|
twilio==7.16.4
|
||||||
urllib3==1.26.6
|
urllib3==1.26.6
|
||||||
visitor==0.1.3
|
visitor==0.1.3
|
||||||
Werkzeug==2.0.1
|
Werkzeug==2.0.1
|
||||||
|
wsproto==1.2.0
|
||||||
WTForms==2.3.3
|
WTForms==2.3.3
|
||||||
|
|
||||||
# requirements for Heroku
|
|
||||||
#psycopg2==2.9.1
|
|
||||||
#gunicorn==20.1.0
|
|
||||||
|
|
Loading…
Reference in New Issue