|  | @ -1,4 +1,4 @@ | 
			
		
	
		
		
			
				
					
					|  |  | use chrono::{DateTime, TimeDelta, Utc}; |  |  | use chrono::{naive::serde::ts_seconds, NaiveDateTime, TimeDelta, Utc}; | 
			
				
				
			
		
	
		
		
	
		
		
			
				
					|  |  | use rocket::{serde::json::Json, Route}; |  |  | use rocket::{serde::json::Json, Route}; | 
			
		
	
		
		
			
				
					|  |  | 
 |  |  | 
 | 
			
		
	
		
		
			
				
					|  |  | use crate::{ |  |  | use crate::{ | 
			
		
	
	
		
		
			
				
					|  | @ -23,16 +23,17 @@ pub struct ProtectedActionData { | 
			
		
	
		
		
			
				
					|  |  |     /// Token issued to validate the protected action
 |  |  |     /// Token issued to validate the protected action
 | 
			
		
	
		
		
			
				
					|  |  |     pub token: String, |  |  |     pub token: String, | 
			
		
	
		
		
			
				
					|  |  |     /// UNIX timestamp of token issue.
 |  |  |     /// UNIX timestamp of token issue.
 | 
			
		
	
		
		
			
				
					
					|  |  |     pub token_sent: i64, |  |  |     #[serde(with = "ts_seconds")] | 
			
				
				
			
		
	
		
		
	
		
		
			
				
					|  |  |  |  |  |     pub token_sent: NaiveDateTime, | 
			
		
	
		
		
			
				
					|  |  |     // The total amount of attempts
 |  |  |     // The total amount of attempts
 | 
			
		
	
		
		
			
				
					
					|  |  |     pub attempts: u8, |  |  |     pub attempts: u64, | 
			
				
				
			
		
	
		
		
	
		
		
			
				
					|  |  | } |  |  | } | 
			
		
	
		
		
			
				
					|  |  | 
 |  |  | 
 | 
			
		
	
		
		
			
				
					|  |  | impl ProtectedActionData { |  |  | impl ProtectedActionData { | 
			
		
	
		
		
			
				
					|  |  |     pub fn new(token: String) -> Self { |  |  |     pub fn new(token: String) -> Self { | 
			
		
	
		
		
			
				
					|  |  |         Self { |  |  |         Self { | 
			
		
	
		
		
			
				
					|  |  |             token, |  |  |             token, | 
			
		
	
		
		
			
				
					
					|  |  |             token_sent: Utc::now().timestamp(), |  |  |             token_sent: Utc::now().naive_utc(), | 
			
				
				
			
		
	
		
		
	
		
		
			
				
					|  |  |             attempts: 0, |  |  |             attempts: 0, | 
			
		
	
		
		
			
				
					|  |  |         } |  |  |         } | 
			
		
	
		
		
			
				
					|  |  |     } |  |  |     } | 
			
		
	
	
		
		
			
				
					|  | @ -50,7 +51,11 @@ impl ProtectedActionData { | 
			
		
	
		
		
			
				
					|  |  |     } |  |  |     } | 
			
		
	
		
		
			
				
					|  |  | 
 |  |  | 
 | 
			
		
	
		
		
			
				
					|  |  |     pub fn add_attempt(&mut self) { |  |  |     pub fn add_attempt(&mut self) { | 
			
		
	
		
		
			
				
					
					|  |  |         self.attempts += 1; |  |  |         self.attempts = self.attempts.saturating_add(1); | 
			
				
				
			
		
	
		
		
	
		
		
			
				
					|  |  |  |  |  |     } | 
			
		
	
		
		
			
				
					|  |  |  |  |  | 
 | 
			
		
	
		
		
			
				
					|  |  |  |  |  |     pub fn time_since_sent(&self) -> TimeDelta { | 
			
		
	
		
		
			
				
					|  |  |  |  |  |         Utc::now().naive_utc() - self.token_sent | 
			
		
	
		
		
			
				
					|  |  |     } |  |  |     } | 
			
		
	
		
		
			
				
					|  |  | } |  |  | } | 
			
		
	
		
		
			
				
					|  |  | 
 |  |  | 
 | 
			
		
	
	
		
		
			
				
					|  | @ -65,6 +70,13 @@ async fn request_otp(headers: Headers, conn: DbConn) -> EmptyResult { | 
			
		
	
		
		
			
				
					|  |  |     // Only one Protected Action per user is allowed to take place, delete the previous one
 |  |  |     // Only one Protected Action per user is allowed to take place, delete the previous one
 | 
			
		
	
		
		
			
				
					|  |  |     if let Some(pa) = TwoFactor::find_by_user_and_type(&user.uuid, TwoFactorType::ProtectedActions as i32, &conn).await |  |  |     if let Some(pa) = TwoFactor::find_by_user_and_type(&user.uuid, TwoFactorType::ProtectedActions as i32, &conn).await | 
			
		
	
		
		
			
				
					|  |  |     { |  |  |     { | 
			
		
	
		
		
			
				
					|  |  |  |  |  |         let pa_data = ProtectedActionData::from_json(&pa.data)?; | 
			
		
	
		
		
			
				
					|  |  |  |  |  |         let elapsed = pa_data.time_since_sent().num_seconds(); | 
			
		
	
		
		
			
				
					|  |  |  |  |  |         let delay = 30; | 
			
		
	
		
		
			
				
					|  |  |  |  |  |         if elapsed < delay { | 
			
		
	
		
		
			
				
					|  |  |  |  |  |             err!(format!("Please wait {} seconds before requesting another code.", (delay - elapsed))); | 
			
		
	
		
		
			
				
					|  |  |  |  |  |         } | 
			
		
	
		
		
			
				
					|  |  |  |  |  | 
 | 
			
		
	
		
		
			
				
					|  |  |         pa.delete(&conn).await?; |  |  |         pa.delete(&conn).await?; | 
			
		
	
		
		
			
				
					|  |  |     } |  |  |     } | 
			
		
	
		
		
			
				
					|  |  | 
 |  |  | 
 | 
			
		
	
	
		
		
			
				
					|  | @ -107,24 +119,22 @@ pub async fn validate_protected_action_otp( | 
			
		
	
		
		
			
				
					|  |  |     delete_if_valid: bool, |  |  |     delete_if_valid: bool, | 
			
		
	
		
		
			
				
					|  |  |     conn: &DbConn, |  |  |     conn: &DbConn, | 
			
		
	
		
		
			
				
					|  |  | ) -> EmptyResult { |  |  | ) -> EmptyResult { | 
			
		
	
		
		
			
				
					
					|  |  |     let pa = TwoFactor::find_by_user_and_type(user_id, TwoFactorType::ProtectedActions as i32, conn) |  |  |     let mut pa = TwoFactor::find_by_user_and_type(user_id, TwoFactorType::ProtectedActions as i32, conn) | 
			
				
				
			
		
	
		
		
	
		
		
			
				
					|  |  |         .await |  |  |         .await | 
			
		
	
		
		
			
				
					|  |  |         .map_res("Protected action token not found, try sending the code again or restart the process")?; |  |  |         .map_res("Protected action token not found, try sending the code again or restart the process")?; | 
			
		
	
		
		
			
				
					|  |  |     let mut pa_data = ProtectedActionData::from_json(&pa.data)?; |  |  |     let mut pa_data = ProtectedActionData::from_json(&pa.data)?; | 
			
		
	
		
		
			
				
					|  |  | 
 |  |  |  | 
			
		
	
		
		
			
				
					|  |  |     pa_data.add_attempt(); |  |  |     pa_data.add_attempt(); | 
			
		
	
		
		
			
				
					
					|  |  |     // Delete the token after x attempts if it has been used too many times
 |  |  |     pa.data = pa_data.to_json(); | 
			
				
				
			
		
	
		
		
			
				
					
					|  |  |     // We use the 6, which should be more then enough for invalid attempts and multiple valid checks
 |  |  | 
 | 
			
				
				
			
		
	
		
		
			
				
					
					|  |  |     if pa_data.attempts > 6 { |  |  |     // Fail after x attempts if the token has been used too many times.
 | 
			
				
				
			
		
	
		
		
			
				
					
					|  |  |         pa.delete(conn).await?; |  |  |     // Don't delete it, as we use it to keep track of attempts.
 | 
			
				
				
			
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					|  |  |  |  |  |     if pa_data.attempts >= CONFIG.email_attempts_limit() { | 
			
		
	
		
		
			
				
					|  |  |         err!("Token has expired") |  |  |         err!("Token has expired") | 
			
		
	
		
		
			
				
					|  |  |     } |  |  |     } | 
			
		
	
		
		
			
				
					|  |  | 
 |  |  | 
 | 
			
		
	
		
		
			
				
					|  |  |     // Check if the token has expired (Using the email 2fa expiration time)
 |  |  |     // Check if the token has expired (Using the email 2fa expiration time)
 | 
			
		
	
		
		
			
				
					|  |  |     let date = |  |  |  | 
			
		
	
		
		
			
				
					|  |  |         DateTime::from_timestamp(pa_data.token_sent, 0).expect("Protected Action token timestamp invalid.").naive_utc(); |  |  |  | 
			
		
	
		
		
			
				
					|  |  |     let max_time = CONFIG.email_expiration_time() as i64; |  |  |     let max_time = CONFIG.email_expiration_time() as i64; | 
			
		
	
		
		
			
				
					
					|  |  |     if date + TimeDelta::try_seconds(max_time).unwrap() < Utc::now().naive_utc() { |  |  |     if pa_data.time_since_sent().num_seconds() > max_time { | 
			
				
				
			
		
	
		
		
	
		
		
			
				
					|  |  |         pa.delete(conn).await?; |  |  |         pa.delete(conn).await?; | 
			
		
	
		
		
			
				
					|  |  |         err!("Token has expired") |  |  |         err!("Token has expired") | 
			
		
	
		
		
			
				
					|  |  |     } |  |  |     } | 
			
		
	
	
		
		
			
				
					|  | 
 |