mirror of
https://github.com/cake-tech/cake_wallet.git
synced 2024-12-24 04:29:28 +00:00
43e062d1ac
* CW-263-TOTP-2FA-in-security-settings WIP * Implement TOTP 2FA WIP * Implement TOTP 2FA Authentication * chore: Remove unneeded formatting * revert formatting * fixes * CW-263-TOTP-2FA-in-security-settings WIP * Setup TOTP Complete, left with Modify TOTF * CW-263-TOTP-2FA-in-security-settings * CW-263-TOTP-2FA-in-security-settings * CW-263-TOTP-2FA-in-security-settings * fix: Add copy-to-clipboard for qr secret key * fix: Translation * chore: Move strings into translation files * feat: End to end flow for TOTP * hotfix: Switch totp to use sha512 * Update strings; 8 digits and error explanation * fix: Totp 2fa implementation feedback * hotfix: same action for button and alert close * feat: App should show both normal and totp auths when totp is enabled * hotfix: prevent barrier from dismissing * fix: Changes requested during PR review * - Minor Enhancements - Minor UI fixes --------- Co-authored-by: Justin Ehrenhofer <justin.ehrenhofer@gmail.com> Co-authored-by: OmarHatem <omarh.ismail1@gmail.com>
138 lines
4.5 KiB
Dart
138 lines
4.5 KiB
Dart
import 'package:cake_wallet/core/totp_request_details.dart';
|
|
import 'package:cake_wallet/routes.dart';
|
|
import 'package:cake_wallet/src/screens/auth/auth_page.dart';
|
|
import 'package:flutter/material.dart';
|
|
import 'package:mobx/mobx.dart';
|
|
import 'package:flutter_secure_storage/flutter_secure_storage.dart';
|
|
import 'package:shared_preferences/shared_preferences.dart';
|
|
import 'package:cake_wallet/entities/preferences_key.dart';
|
|
import 'package:cake_wallet/entities/secret_store_key.dart';
|
|
import 'package:cake_wallet/entities/encrypt.dart';
|
|
import 'package:cake_wallet/store/settings_store.dart';
|
|
|
|
import '../src/screens/setup_2fa/setup_2fa_enter_code_page.dart';
|
|
|
|
class AuthService with Store {
|
|
AuthService({
|
|
required this.secureStorage,
|
|
required this.sharedPreferences,
|
|
required this.settingsStore,
|
|
});
|
|
|
|
static const List<String> _alwaysAuthenticateRoutes = [
|
|
Routes.showKeys,
|
|
Routes.backup,
|
|
Routes.setupPin,
|
|
Routes.setup_2faPage,
|
|
Routes.modify2FAPage,
|
|
];
|
|
|
|
final FlutterSecureStorage secureStorage;
|
|
final SharedPreferences sharedPreferences;
|
|
final SettingsStore settingsStore;
|
|
|
|
Future<void> setPassword(String password) async {
|
|
final key = generateStoreKeyFor(key: SecretStoreKey.pinCodePassword);
|
|
final encodedPassword = encodedPinCode(pin: password);
|
|
await secureStorage.write(key: key, value: encodedPassword);
|
|
}
|
|
|
|
Future<bool> canAuthenticate() async {
|
|
final key = generateStoreKeyFor(key: SecretStoreKey.pinCodePassword);
|
|
final walletName = sharedPreferences.getString(PreferencesKey.currentWalletName) ?? '';
|
|
var password = '';
|
|
|
|
try {
|
|
password = await secureStorage.read(key: key) ?? '';
|
|
} catch (e) {
|
|
print(e);
|
|
}
|
|
|
|
return walletName.isNotEmpty && password.isNotEmpty;
|
|
}
|
|
|
|
Future<bool> authenticate(String pin) async {
|
|
final key = generateStoreKeyFor(key: SecretStoreKey.pinCodePassword);
|
|
final encodedPin = await secureStorage.read(key: key);
|
|
final decodedPin = decodedPinCode(pin: encodedPin!);
|
|
|
|
return decodedPin == pin;
|
|
}
|
|
|
|
void saveLastAuthTime() {
|
|
int timestamp = DateTime.now().millisecondsSinceEpoch;
|
|
sharedPreferences.setInt(PreferencesKey.lastAuthTimeMilliseconds, timestamp);
|
|
}
|
|
|
|
bool requireAuth() {
|
|
final timestamp = sharedPreferences.getInt(PreferencesKey.lastAuthTimeMilliseconds);
|
|
final duration = _durationToRequireAuth(timestamp ?? 0);
|
|
final requiredPinInterval = settingsStore.pinTimeOutDuration;
|
|
|
|
return duration >= requiredPinInterval.value;
|
|
}
|
|
|
|
int _durationToRequireAuth(int timestamp) {
|
|
DateTime before = DateTime.fromMillisecondsSinceEpoch(timestamp);
|
|
DateTime now = DateTime.now();
|
|
Duration timeDifference = now.difference(before);
|
|
|
|
return timeDifference.inMinutes;
|
|
}
|
|
|
|
Future<void> authenticateAction(BuildContext context,
|
|
{Function(bool)? onAuthSuccess, String? route, Object? arguments}) async {
|
|
assert(route != null || onAuthSuccess != null,
|
|
'Either route or onAuthSuccess param must be passed.');
|
|
|
|
if (!requireAuth() && !_alwaysAuthenticateRoutes.contains(route)) {
|
|
if (onAuthSuccess != null) {
|
|
onAuthSuccess(true);
|
|
} else {
|
|
Navigator.of(context).pushNamed(
|
|
route ?? '',
|
|
arguments: arguments,
|
|
);
|
|
}
|
|
return;
|
|
}
|
|
|
|
|
|
Navigator.of(context).pushNamed(Routes.auth,
|
|
arguments: (bool isAuthenticatedSuccessfully, AuthPageState auth) async {
|
|
if (!isAuthenticatedSuccessfully) {
|
|
onAuthSuccess?.call(false);
|
|
return;
|
|
} else {
|
|
if (settingsStore.useTOTP2FA) {
|
|
auth.close(
|
|
route: Routes.totpAuthCodePage,
|
|
arguments: TotpAuthArgumentsModel(
|
|
isForSetup: !settingsStore.useTOTP2FA,
|
|
onTotpAuthenticationFinished:
|
|
(bool isAuthenticatedSuccessfully, TotpAuthCodePageState totpAuth) async {
|
|
if (!isAuthenticatedSuccessfully) {
|
|
onAuthSuccess?.call(false);
|
|
return;
|
|
}
|
|
if (onAuthSuccess != null) {
|
|
totpAuth.close().then((value) => onAuthSuccess.call(true));
|
|
} else {
|
|
totpAuth.close(route: route, arguments: arguments);
|
|
}
|
|
},
|
|
),
|
|
);
|
|
} else {
|
|
if (onAuthSuccess != null) {
|
|
auth.close().then((value) => onAuthSuccess.call(true));
|
|
} else {
|
|
auth.close(route: route, arguments: arguments);
|
|
}
|
|
}
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
}
|