mirror of
https://github.com/cake-tech/cake_wallet.git
synced 2024-12-24 12:39:37 +00:00
4120394121
* chore: Setup * feat: Verbose controls for TOTP 2FA WIP [skip-ci] * feat: Implement verbose controls for sends to contact, non contacts and internal wallets * feat: Implement verbose 2FA control for exchanges to internal wallets [skip-ci] * Implement verbose controls * chore: PR cleanup * fix: Implement fixes and recommendations on verbose controls * feat: Localization for verbose controls settings * fix: disable pin when 2fa is not activated * fix: Naming error * chore: Reformat code with linelength of 100 * fix: Wallet type page and type bug when creating wallet * fix: add new values to be stored in local storage to both reload function and import/export functions in back_service.dart * fix: White spaces with localization files * fix: Switch observers in modify_2fa page to individual observer * chore: Switch custom tab widget to reusable SettingsChoicesCell widget * chore: Remove unneeded argument in create wallet entrypoint * fix: Switch type for selectedCakePreference when importing preferences from backup file * fix: Await all values being saved to local storage --------- Co-authored-by: David Adegoke <blazebrain@Davids-MacBook-Pro.local>
147 lines
4.7 KiB
Dart
147 lines
4.7 KiB
Dart
import 'package:cake_wallet/core/totp_request_details.dart';
|
|
import 'package:cake_wallet/routes.dart';
|
|
import 'package:cake_wallet/src/screens/auth/auth_page.dart';
|
|
import 'package:flutter/material.dart';
|
|
import 'package:mobx/mobx.dart';
|
|
import 'package:flutter_secure_storage/flutter_secure_storage.dart';
|
|
import 'package:shared_preferences/shared_preferences.dart';
|
|
import 'package:cake_wallet/entities/preferences_key.dart';
|
|
import 'package:cake_wallet/entities/secret_store_key.dart';
|
|
import 'package:cake_wallet/entities/encrypt.dart';
|
|
import 'package:cake_wallet/store/settings_store.dart';
|
|
|
|
import '../src/screens/setup_2fa/setup_2fa_enter_code_page.dart';
|
|
|
|
class AuthService with Store {
|
|
AuthService({
|
|
required this.secureStorage,
|
|
required this.sharedPreferences,
|
|
required this.settingsStore,
|
|
});
|
|
|
|
static const List<String> _alwaysAuthenticateRoutes = [
|
|
Routes.showKeys,
|
|
Routes.backup,
|
|
Routes.setupPin,
|
|
Routes.setup_2faPage,
|
|
Routes.modify2FAPage,
|
|
Routes.newWallet,
|
|
Routes.newWalletType,
|
|
Routes.addressBookAddContact,
|
|
Routes.restoreOptions,
|
|
];
|
|
|
|
final FlutterSecureStorage secureStorage;
|
|
final SharedPreferences sharedPreferences;
|
|
final SettingsStore settingsStore;
|
|
|
|
Future<void> setPassword(String password) async {
|
|
final key = generateStoreKeyFor(key: SecretStoreKey.pinCodePassword);
|
|
final encodedPassword = encodedPinCode(pin: password);
|
|
await secureStorage.write(key: key, value: encodedPassword);
|
|
}
|
|
|
|
Future<bool> canAuthenticate() async {
|
|
final key = generateStoreKeyFor(key: SecretStoreKey.pinCodePassword);
|
|
final walletName = sharedPreferences.getString(PreferencesKey.currentWalletName) ?? '';
|
|
var password = '';
|
|
|
|
try {
|
|
password = await secureStorage.read(key: key) ?? '';
|
|
} catch (e) {
|
|
print(e);
|
|
}
|
|
|
|
return walletName.isNotEmpty && password.isNotEmpty;
|
|
}
|
|
|
|
Future<bool> authenticate(String pin) async {
|
|
final key = generateStoreKeyFor(key: SecretStoreKey.pinCodePassword);
|
|
final encodedPin = await secureStorage.read(key: key);
|
|
final decodedPin = decodedPinCode(pin: encodedPin!);
|
|
|
|
return decodedPin == pin;
|
|
}
|
|
|
|
void saveLastAuthTime() {
|
|
int timestamp = DateTime.now().millisecondsSinceEpoch;
|
|
sharedPreferences.setInt(PreferencesKey.lastAuthTimeMilliseconds, timestamp);
|
|
}
|
|
|
|
bool requireAuth() {
|
|
final timestamp = sharedPreferences.getInt(PreferencesKey.lastAuthTimeMilliseconds);
|
|
final duration = _durationToRequireAuth(timestamp ?? 0);
|
|
final requiredPinInterval = settingsStore.pinTimeOutDuration;
|
|
|
|
return duration >= requiredPinInterval.value;
|
|
}
|
|
|
|
int _durationToRequireAuth(int timestamp) {
|
|
DateTime before = DateTime.fromMillisecondsSinceEpoch(timestamp);
|
|
DateTime now = DateTime.now();
|
|
Duration timeDifference = now.difference(before);
|
|
|
|
return timeDifference.inMinutes;
|
|
}
|
|
|
|
Future<void> authenticateAction(BuildContext context,
|
|
{Function(bool)? onAuthSuccess,
|
|
String? route,
|
|
Object? arguments,
|
|
required bool conditionToDetermineIfToUse2FA}) async {
|
|
assert(route != null || onAuthSuccess != null,
|
|
'Either route or onAuthSuccess param must be passed.');
|
|
|
|
if (!conditionToDetermineIfToUse2FA) {
|
|
if (!requireAuth() && !_alwaysAuthenticateRoutes.contains(route)) {
|
|
if (onAuthSuccess != null) {
|
|
onAuthSuccess(true);
|
|
} else {
|
|
Navigator.of(context).pushNamed(
|
|
route ?? '',
|
|
arguments: arguments,
|
|
);
|
|
}
|
|
return;
|
|
}
|
|
}
|
|
|
|
|
|
Navigator.of(context).pushNamed(Routes.auth,
|
|
arguments: (bool isAuthenticatedSuccessfully, AuthPageState auth) async {
|
|
if (!isAuthenticatedSuccessfully) {
|
|
onAuthSuccess?.call(false);
|
|
return;
|
|
} else {
|
|
if (settingsStore.useTOTP2FA && conditionToDetermineIfToUse2FA) {
|
|
auth.close(
|
|
route: Routes.totpAuthCodePage,
|
|
arguments: TotpAuthArgumentsModel(
|
|
isForSetup: !settingsStore.useTOTP2FA,
|
|
onTotpAuthenticationFinished:
|
|
(bool isAuthenticatedSuccessfully, TotpAuthCodePageState totpAuth) async {
|
|
if (!isAuthenticatedSuccessfully) {
|
|
onAuthSuccess?.call(false);
|
|
return;
|
|
}
|
|
if (onAuthSuccess != null) {
|
|
totpAuth.close().then((value) => onAuthSuccess.call(true));
|
|
} else {
|
|
totpAuth.close(route: route, arguments: arguments);
|
|
}
|
|
},
|
|
),
|
|
);
|
|
} else {
|
|
if (onAuthSuccess != null) {
|
|
auth.close().then((value) => onAuthSuccess.call(true));
|
|
} else {
|
|
auth.close(route: route, arguments: arguments);
|
|
}
|
|
}
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
}
|