- # frozen_string_literal: true
-
- module Settings
- module TwoFactorAuthentication
- class OtpAuthenticationController < BaseController
- include ChallengableConcern
-
- skip_before_action :require_functional!
-
- before_action :verify_otp_not_enabled, only: [:show]
- before_action :require_challenge!, only: [:create]
-
- def show
- @confirmation = Form::TwoFactorConfirmation.new
- end
-
- def create
- session[:new_otp_secret] = User.generate_otp_secret(32)
-
- redirect_to new_settings_two_factor_authentication_confirmation_path
- end
-
- private
-
- def confirmation_params
- params.require(:form_two_factor_confirmation).permit(:otp_attempt)
- end
-
- def verify_otp_not_enabled
- redirect_to settings_two_factor_authentication_methods_path if current_user.otp_enabled?
- end
-
- def acceptable_code?
- current_user.validate_and_consume_otp!(confirmation_params[:otp_attempt]) ||
- current_user.invalidate_otp_backup_code!(confirmation_params[:otp_attempt])
- end
- end
- end
- end
|