mirror of
https://github.com/go-gitea/gitea.git
synced 2025-05-01 13:15:12 +00:00
Fix #880 Design: 1. A global setting `security.TWO_FACTOR_AUTH`. * To support org-level config, we need to introduce a better "owner setting" system first (in the future) 2. A user without 2FA can login and may explore, but can NOT read or write to any repositories via API/web. 3. Keep things as simple as possible. * This option only aggressively suggest users to enable their 2FA at the moment, it does NOT guarantee that users must have 2FA before all other operations, it should be good enough for real world use cases. * Some details and tests could be improved in the future since this change only adds a check and seems won't affect too much. --------- Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
38 lines
1.0 KiB
Go
38 lines
1.0 KiB
Go
// Copyright 2021 The Gitea Authors. All rights reserved.
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
package db
|
|
|
|
import (
|
|
"context"
|
|
|
|
"code.gitea.io/gitea/models/auth"
|
|
user_model "code.gitea.io/gitea/models/user"
|
|
)
|
|
|
|
// Source is a password authentication service
|
|
type Source struct {
|
|
auth.ConfigBase `json:"-"`
|
|
}
|
|
|
|
// FromDB fills up an OAuth2Config from serialized format.
|
|
func (source *Source) FromDB(bs []byte) error {
|
|
return nil
|
|
}
|
|
|
|
// ToDB exports the config to a byte slice to be saved into database (this method is just dummy and does nothing for DB source)
|
|
func (source *Source) ToDB() ([]byte, error) {
|
|
return nil, nil
|
|
}
|
|
|
|
// Authenticate queries if login/password is valid against the PAM,
|
|
// and create a local user if success when enabled.
|
|
func (source *Source) Authenticate(ctx context.Context, user *user_model.User, login, password string) (*user_model.User, error) {
|
|
return Authenticate(ctx, user, login, password)
|
|
}
|
|
|
|
func init() {
|
|
auth.RegisterTypeConfig(auth.NoType, &Source{})
|
|
auth.RegisterTypeConfig(auth.Plain, &Source{})
|
|
}
|