blob: 73f90785e1f4c5fff70d190cf3cdf47088444e42 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
|
# vim:fileencoding=utf8:et:ts=4:sts=4:sw=4:ft=python
from django.db import IntegrityError
from django_otp import login as otp_login
from django_otp.middleware import OTPMiddleware
from okupy.otp.sotp.models import SOTPDevice
from okupy.otp.totp.models import TOTPDevice
def init_otp(request):
"""
Initialize OTP after login. This sets up OTP devices
for django_otp and calls the middleware to fill
request.user.is_verified().
"""
tdev = TOTPDevice(user=request.user,
name='TOTP device with LDAP secret')
try:
tdev.save()
except IntegrityError:
tdev = TOTPDevice.objects.get(user=request.user)
sdev = SOTPDevice(user=request.user,
name='SOTP device with LDAP secret')
try:
sdev.save()
except IntegrityError:
pass
# if OTP is disabled, it will match already
if tdev.verify_token():
otp_login(request, tdev)
# add .is_verified()
OTPMiddleware().process_request(request)
|