mirror of
https://github.com/cake-tech/cake_wallet.git
synced 2024-12-26 05:29:57 +00:00
9fbb206a7c
Conflicts: .gitignore assets/text/Monerocom_Release_Notes.txt assets/text/Release_Notes.txt cw_bitcoin/lib/bitcoin_wallet_service.dart cw_bitcoin/lib/electrum_transaction_history.dart cw_bitcoin/lib/litecoin_wallet_service.dart cw_bitcoin/pubspec.yaml cw_core/pubspec.lock cw_monero/ios/Classes/monero_api.cpp cw_monero/lib/monero_wallet.dart cw_monero/lib/monero_wallet_service.dart lib/core/backup_service.dart lib/core/wallet_loading_service.dart lib/di.dart lib/entities/default_settings_migration.dart lib/entities/get_encryption_key.dart lib/entities/main_actions.dart lib/main.dart lib/router.dart lib/src/screens/dashboard/desktop_widgets/desktop_action_button.dart lib/src/screens/dashboard/desktop_widgets/desktop_wallet_selection_dropdown.dart lib/src/screens/dashboard/widgets/market_place_page.dart lib/src/screens/dashboard/widgets/transactions_page.dart lib/src/screens/receive/anonpay_invoice_page.dart lib/src/screens/restore/wallet_restore_from_keys_form.dart lib/src/screens/restore/wallet_restore_page.dart lib/src/screens/settings/security_backup_page.dart lib/src/screens/wallet/wallet_edit_page.dart lib/src/screens/wallet_list/wallet_list_page.dart lib/store/settings_store.dart lib/utils/distribution_info.dart lib/view_model/wallet_creation_vm.dart lib/view_model/wallet_list/wallet_edit_view_model.dart lib/view_model/wallet_list/wallet_list_view_model.dart lib/view_model/wallet_new_vm.dart res/values/strings_ar.arb res/values/strings_bg.arb res/values/strings_cs.arb res/values/strings_de.arb res/values/strings_en.arb res/values/strings_es.arb res/values/strings_fr.arb res/values/strings_ha.arb res/values/strings_hi.arb res/values/strings_hr.arb res/values/strings_id.arb res/values/strings_it.arb res/values/strings_ja.arb res/values/strings_ko.arb res/values/strings_my.arb res/values/strings_nl.arb res/values/strings_pl.arb res/values/strings_pt.arb res/values/strings_ru.arb res/values/strings_th.arb res/values/strings_tr.arb res/values/strings_uk.arb res/values/strings_ur.arb res/values/strings_yo.arb res/values/strings_zh.arb scripts/android/app_env.sh scripts/ios/app_env.sh scripts/macos/app_env.sh tool/configure.dart
147 lines
4.7 KiB
Dart
147 lines
4.7 KiB
Dart
import 'package:cake_wallet/core/totp_request_details.dart';
|
|
import 'package:cake_wallet/routes.dart';
|
|
import 'package:cake_wallet/src/screens/auth/auth_page.dart';
|
|
import 'package:flutter/material.dart';
|
|
import 'package:mobx/mobx.dart';
|
|
import 'package:cake_wallet/core/secure_storage.dart';
|
|
import 'package:shared_preferences/shared_preferences.dart';
|
|
import 'package:cake_wallet/entities/preferences_key.dart';
|
|
import 'package:cake_wallet/entities/secret_store_key.dart';
|
|
import 'package:cake_wallet/entities/encrypt.dart';
|
|
import 'package:cake_wallet/store/settings_store.dart';
|
|
|
|
import '../src/screens/setup_2fa/setup_2fa_enter_code_page.dart';
|
|
|
|
class AuthService with Store {
|
|
AuthService({
|
|
required this.secureStorage,
|
|
required this.sharedPreferences,
|
|
required this.settingsStore,
|
|
});
|
|
|
|
static const List<String> _alwaysAuthenticateRoutes = [
|
|
Routes.showKeys,
|
|
Routes.backup,
|
|
Routes.setupPin,
|
|
Routes.setup_2faPage,
|
|
Routes.modify2FAPage,
|
|
Routes.newWallet,
|
|
Routes.newWalletType,
|
|
Routes.addressBookAddContact,
|
|
Routes.restoreOptions,
|
|
];
|
|
|
|
final SecureStorage secureStorage;
|
|
final SharedPreferences sharedPreferences;
|
|
final SettingsStore settingsStore;
|
|
|
|
Future<void> setPassword(String password) async {
|
|
final key = generateStoreKeyFor(key: SecretStoreKey.pinCodePassword);
|
|
final encodedPassword = encodedPinCode(pin: password);
|
|
await secureStorage.write(key: key, value: encodedPassword);
|
|
}
|
|
|
|
Future<bool> canAuthenticate() async {
|
|
final key = generateStoreKeyFor(key: SecretStoreKey.pinCodePassword);
|
|
final walletName = sharedPreferences.getString(PreferencesKey.currentWalletName) ?? '';
|
|
var password = '';
|
|
|
|
try {
|
|
password = await secureStorage.read(key: key) ?? '';
|
|
} catch (e) {
|
|
print(e);
|
|
}
|
|
|
|
return walletName.isNotEmpty && password.isNotEmpty;
|
|
}
|
|
|
|
Future<bool> authenticate(String pin) async {
|
|
final key = generateStoreKeyFor(key: SecretStoreKey.pinCodePassword);
|
|
final encodedPin = await secureStorage.read(key: key);
|
|
final decodedPin = decodedPinCode(pin: encodedPin!);
|
|
|
|
return decodedPin == pin;
|
|
}
|
|
|
|
void saveLastAuthTime() {
|
|
int timestamp = DateTime.now().millisecondsSinceEpoch;
|
|
sharedPreferences.setInt(PreferencesKey.lastAuthTimeMilliseconds, timestamp);
|
|
}
|
|
|
|
bool requireAuth() {
|
|
final timestamp = sharedPreferences.getInt(PreferencesKey.lastAuthTimeMilliseconds);
|
|
final duration = _durationToRequireAuth(timestamp ?? 0);
|
|
final requiredPinInterval = settingsStore.pinTimeOutDuration;
|
|
|
|
return duration >= requiredPinInterval.value;
|
|
}
|
|
|
|
int _durationToRequireAuth(int timestamp) {
|
|
DateTime before = DateTime.fromMillisecondsSinceEpoch(timestamp);
|
|
DateTime now = DateTime.now();
|
|
Duration timeDifference = now.difference(before);
|
|
|
|
return timeDifference.inMinutes;
|
|
}
|
|
|
|
Future<void> authenticateAction(BuildContext context,
|
|
{Function(bool)? onAuthSuccess,
|
|
String? route,
|
|
Object? arguments,
|
|
required bool conditionToDetermineIfToUse2FA}) async {
|
|
assert(route != null || onAuthSuccess != null,
|
|
'Either route or onAuthSuccess param must be passed.');
|
|
|
|
if (!conditionToDetermineIfToUse2FA) {
|
|
if (!requireAuth() && !_alwaysAuthenticateRoutes.contains(route)) {
|
|
if (onAuthSuccess != null) {
|
|
onAuthSuccess(true);
|
|
} else {
|
|
Navigator.of(context).pushNamed(
|
|
route ?? '',
|
|
arguments: arguments,
|
|
);
|
|
}
|
|
return;
|
|
}
|
|
}
|
|
|
|
|
|
Navigator.of(context).pushNamed(Routes.auth,
|
|
arguments: (bool isAuthenticatedSuccessfully, AuthPageState auth) async {
|
|
if (!isAuthenticatedSuccessfully) {
|
|
onAuthSuccess?.call(false);
|
|
return;
|
|
} else {
|
|
if (settingsStore.useTOTP2FA && conditionToDetermineIfToUse2FA) {
|
|
auth.close(
|
|
route: Routes.totpAuthCodePage,
|
|
arguments: TotpAuthArgumentsModel(
|
|
isForSetup: !settingsStore.useTOTP2FA,
|
|
onTotpAuthenticationFinished:
|
|
(bool isAuthenticatedSuccessfully, TotpAuthCodePageState totpAuth) async {
|
|
if (!isAuthenticatedSuccessfully) {
|
|
onAuthSuccess?.call(false);
|
|
return;
|
|
}
|
|
if (onAuthSuccess != null) {
|
|
totpAuth.close().then((value) => onAuthSuccess.call(true));
|
|
} else {
|
|
totpAuth.close(route: route, arguments: arguments);
|
|
}
|
|
},
|
|
),
|
|
);
|
|
} else {
|
|
if (onAuthSuccess != null) {
|
|
auth.close().then((value) => onAuthSuccess.call(true));
|
|
} else {
|
|
auth.close(route: route, arguments: arguments);
|
|
}
|
|
}
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
}
|