use2FAModal.ts 2.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101
  1. import { createVNode, render } from 'vue'
  2. import { Modal, message } from 'ant-design-vue'
  3. import { useCookies } from '@vueuse/integrations/useCookies'
  4. import Authorization from '@/components/2FA/Authorization.vue'
  5. import twoFA from '@/api/2fa'
  6. import { useUserStore } from '@/pinia'
  7. const use2FAModal = () => {
  8. const refOTPAuthorization = ref<typeof Authorization>()
  9. const randomId = Math.random().toString(36).substring(2, 8)
  10. const { secureSessionId } = storeToRefs(useUserStore())
  11. const injectStyles = () => {
  12. const style = document.createElement('style')
  13. style.innerHTML = `
  14. .${randomId} .ant-modal-title {
  15. font-size: 1.125rem;
  16. }
  17. `
  18. document.head.appendChild(style)
  19. }
  20. const open = async (): Promise<string> => {
  21. const twoFAStatus = await twoFA.status()
  22. const { status: secureSessionStatus } = await twoFA.secure_session_status()
  23. return new Promise((resolve, reject) => {
  24. if (!twoFAStatus.enabled) {
  25. resolve('')
  26. return
  27. }
  28. const cookies = useCookies(['nginx-ui-2fa'])
  29. const ssid = cookies.get('secure_session_id')
  30. if (ssid && secureSessionStatus) {
  31. resolve(ssid)
  32. secureSessionId.value = ssid
  33. return
  34. }
  35. injectStyles()
  36. let container: HTMLDivElement | null = document.createElement('div')
  37. document.body.appendChild(container)
  38. const close = () => {
  39. render(null, container!)
  40. document.body.removeChild(container!)
  41. container = null
  42. }
  43. const setSessionId = (sessionId: string) => {
  44. cookies.set('secure_session_id', sessionId, { maxAge: 60 * 3 })
  45. close()
  46. secureSessionId.value = sessionId
  47. resolve(sessionId)
  48. }
  49. const verifyOTP = (passcode: string, recovery: string) => {
  50. twoFA.start_secure_session_by_otp(passcode, recovery).then(async r => {
  51. setSessionId(r.session_id)
  52. }).catch(async () => {
  53. refOTPAuthorization.value?.clearInput()
  54. await message.error($gettext('Invalid passcode or recovery code'))
  55. })
  56. }
  57. const vnode = createVNode(Modal, {
  58. open: true,
  59. title: $gettext('Two-factor authentication required'),
  60. centered: true,
  61. maskClosable: false,
  62. class: randomId,
  63. footer: false,
  64. onCancel: () => {
  65. close()
  66. // eslint-disable-next-line prefer-promise-reject-errors
  67. reject()
  68. },
  69. }, {
  70. default: () => h(
  71. Authorization,
  72. {
  73. ref: refOTPAuthorization,
  74. twoFAStatus,
  75. class: 'mt-3',
  76. onSubmitOTP: verifyOTP,
  77. onSubmitSecureSessionID: setSessionId,
  78. },
  79. ),
  80. })
  81. render(vnode, container!)
  82. })
  83. }
  84. return { open }
  85. }
  86. export default use2FAModal