2FAuth/resources/js/components/OtpDisplay.vue

320 lines
10 KiB
Vue
Raw Normal View History

2023-10-19 11:50:06 +02:00
<script setup>
import Spinner from '@/components/Spinner.vue'
import TotpLooper from '@/components/TotpLooper.vue'
import Dots from '@/components/Dots.vue'
import twofaccountService from '@/services/twofaccountService'
import { useUserStore } from '@/stores/user'
import { useNotifyStore } from '@/stores/notify'
2023-10-19 11:50:06 +02:00
import { UseColorMode } from '@vueuse/components'
import { useDisplayablePassword } from '@/composables/helpers'
const user = useUserStore()
const notify = useNotifyStore()
2023-10-19 11:50:06 +02:00
const $2fauth = inject('2fauth')
2023-10-20 13:24:55 +02:00
const { copy, copied } = useClipboard({ legacy: true })
const route = useRoute()
2023-10-19 11:50:06 +02:00
const emit = defineEmits(['please-close-me', 'increment-hotp', 'validation-error'])
const props = defineProps({
otp_type : String,
account : String,
service : String,
icon : String,
secret : String,
digits : Number,
algorithm : String,
period : null,
counter : null,
image : String,
qrcode : null,
uri : String
})
const id = ref(null)
const uri = ref(null)
const otpauthParams = ref({
otp_type : '',
account : '',
service : '',
icon : '',
secret : '',
digits : null,
algorithm : '',
2023-10-19 11:50:06 +02:00
period : null,
counter : null,
image : ''
2023-10-19 11:50:06 +02:00
})
const password = ref('')
const generated_at = ref(null)
const hasTOTP = ref(false)
const showInlineSpinner = ref(false)
const revealPassword = ref(false)
2023-10-19 11:50:06 +02:00
const dots = ref()
const totpLooper = ref()
const otpSpanTag = ref()
watch(
() => props.icon,
(val) => {
if (val != undefined) {
otpauthParams.value.icon = val
}
}
)
2023-10-19 11:50:06 +02:00
/***
*
*/
const show = async (accountId) => {
revealPassword.value = false
2023-10-19 11:50:06 +02:00
// 3 possible cases :
//
// Case 1 : When user asks for an otp of an existing account: the ID is provided so we fetch the account data
// from db but without the uri. This prevent the uri (a sensitive data) to transit via http request unnecessarily.
// In this case this.otp_type is sent by the backend.
//
// Case 2 : When user uses the Quick Uploader and preview the account: No ID but we have an URI.
//
// Case 3 : When user uses the Advanced form and preview the account: We should have all OTP parameter
// to obtain an otp, including Secret and otp_type which are required
otpauthParams.value.otp_type = props.otp_type
otpauthParams.value.account = props.account
otpauthParams.value.service = props.service
otpauthParams.value.icon = props.icon
otpauthParams.value.secret = props.secret
otpauthParams.value.digits = props.digits
otpauthParams.value.algorithm = props.algorithm
otpauthParams.value.period = props.period
otpauthParams.value.counter = props.counter
2023-10-19 11:50:06 +02:00
setLoadingState()
// Case 1
if (accountId) {
id.value = accountId
const { data } = await twofaccountService.get(id.value)
otpauthParams.value.service = data.service
otpauthParams.value.account = data.account
otpauthParams.value.icon = data.icon
otpauthParams.value.otp_type = data.otp_type
2023-10-19 11:50:06 +02:00
if( isHMacBased(data.otp_type) && data.counter ) {
otpauthParams.value.counter = data.counter
2023-10-19 11:50:06 +02:00
}
}
// Case 2
else if(props.uri) {
uri.value = props.uri
otpauthParams.value.otp_type = props.uri.slice(0, 15 ).toLowerCase() === "otpauth://totp/" ? 'totp' : 'hotp'
2023-10-19 11:50:06 +02:00
}
// Case 3
else if (! props.secret) {
notify.error(new Error(trans('errors.cannot_create_otp_without_secret')))
}
else if (! isTimeBased(otpauthParams.value.otp_type) && ! isHMacBased(otpauthParams.value.otp_type)) {
2023-10-19 11:50:06 +02:00
notify.error(new Error(trans('errors.not_a_supported_otp_type')))
}
try {
await getOtp()
focusOnOTP()
}
catch(error) {
clearOTP()
}
}
/**
* Requests and handles a fresh OTP
*/
async function getOtp() {
setLoadingState()
await getOtpPromise().then(response => {
2023-10-19 11:50:06 +02:00
let otp = response.data
password.value = otp.password
if(user.preferences.copyOtpOnDisplay) {
copyOTP(otp.password)
}
if (isTimeBased(otp.otp_type)) {
generated_at.value = otp.generated_at
otpauthParams.value.period = otp.period
2023-10-19 11:50:06 +02:00
hasTOTP.value = true
nextTick().then(() => {
totpLooper.value.startLoop()
})
}
else if (isHMacBased(otp.otp_type)) {
otpauthParams.value.counter = otp.counter
2023-10-19 11:50:06 +02:00
// returned counter & uri are incremented
emit('increment-hotp', { nextHotpCounter: otp.counter, nextUri: otp.uri })
}
})
.catch(error => {
if (error.response.status === 422) {
emit('validation-error', error.response)
}
//throw error
2023-10-19 11:50:06 +02:00
})
.finally(() => {
showInlineSpinner.value = false
})
}
/**
* Shows blacked dots and a loading spinner
*/
function setLoadingState() {
showInlineSpinner.value = true
dots.value.turnOff()
}
/**
* Returns the appropriate promise to get a fresh OTP from backend
*/
function getOtpPromise() {
if(id.value) {
return twofaccountService.getOtpById(id.value)
}
else if(uri.value) {
return twofaccountService.getOtpByUri(uri.value)
}
else {
return twofaccountService.getOtpByParams(otpauthParams.value)
2023-10-19 11:50:06 +02:00
}
}
/**
* Reset component's refs
*/
function clearOTP() {
id.value = otpauthParams.value.counter = generated_at.value = null
otpauthParams.value.service = otpauthParams.value.account = otpauthParams.value.icon = otpauthParams.value.otp_type = otpauthParams.value.secret = ''
2023-10-19 11:50:06 +02:00
password.value = '... ...'
hasTOTP.value = false
totpLooper.value?.clearLooper();
}
/**
* Put focus on the OTP html tag
*/
function focusOnOTP() {
nextTick().then(() => {
otpSpanTag.value?.focus()
})
}
/**
* Copies to clipboard and notify
*
* @param {string} otp The password to copy
* @param {*} permit_closing Toggle moddle closing On-Off
*/
function copyOTP(otp, permit_closing) {
copy(otp.replace(/ /g, ''))
2023-10-20 13:24:55 +02:00
if (copied) {
if(user.preferences.kickUserAfter == -1 && (permit_closing || false) === true && route.name != 'importAccounts') {
user.logout({ kicked: true})
2023-10-20 13:24:55 +02:00
}
else if(user.preferences.closeOtpOnCopy && (permit_closing || false) === true) {
emit("please-close-me");
revealPassword.value = false
2023-10-20 13:24:55 +02:00
clearOTP()
}
2023-10-19 11:50:06 +02:00
notify.success({ text: trans('commons.copied_to_clipboard') })
2023-10-20 13:24:55 +02:00
}
2023-10-19 11:50:06 +02:00
}
/**
* Checks OTP type is Time based (TOTP)
*
* @param {string} otp_type
*/
function isTimeBased(otp_type) {
return (otp_type === 'totp' || otp_type === 'steamtotp')
}
/**
* Checks OTP type is HMAC based (HOTP)
*
* @param {string} otp_type
*/
function isHMacBased(otp_type) {
return otp_type === 'hotp'
}
/**
* Turns dots On from the first one to the provided one
*/
function turnDotOn(dotIndex) {
dots.value.turnOn(dotIndex)
}
defineExpose({
show,
clearOTP
})
</script>
<template>
<div>
<figure class="image is-64x64" :class="{ 'no-icon': !otpauthParams.icon }" style="display: inline-block">
<img :src="$2fauth.config.subdirectory + '/storage/icons/' + otpauthParams.icon" v-if="otpauthParams.icon" :alt="$t('twofaccounts.icon_to_illustrate_the_account')">
</figure>
<UseColorMode v-slot="{ mode }">
<p class="is-size-4 has-ellipsis" :class="mode == 'dark' ? 'has-text-grey-light' : 'has-text-grey'">{{ otpauthParams.service }}</p>
<p class="is-size-6 has-ellipsis" :class="mode == 'dark' ? 'has-text-grey' : 'has-text-grey-light'">{{ otpauthParams.account }}</p>
<p>
<span
v-if="!showInlineSpinner"
id="otp"
role="log"
ref="otpSpanTag"
tabindex="0"
class="otp is-size-1 is-clickable px-3"
:class="mode == 'dark' ? 'has-text-white' : 'has-text-grey-dark'"
@click="copyOTP(password, true)"
@keyup.enter="copyOTP(password, true)"
:title="$t('commons.copy_to_clipboard')"
>
{{ useDisplayablePassword(password, user.preferences.showOtpAsDot && user.preferences.revealDottedOTP && revealPassword) }}
2023-10-19 11:50:06 +02:00
</span>
<span v-else tabindex="0" class="otp is-size-1">
<Spinner :isVisible="showInlineSpinner" :type="'raw'" />
</span>
</p>
</UseColorMode>
<Dots v-show="isTimeBased(otpauthParams.otp_type)" ref="dots"></Dots>
<p v-show="isHMacBased(otpauthParams.otp_type)">
{{ $t('twofaccounts.forms.counter.label') }}: {{ otpauthParams.counter }}
</p>
<p v-if="user.preferences.showOtpAsDot && user.preferences.revealDottedOTP" class="mt-3">
<button class="button is-ghost has-text-grey-dark" @click.stop="revealPassword = !revealPassword">
<font-awesome-icon v-if="revealPassword" :icon="['fas', 'eye']" />
<font-awesome-icon v-else :icon="['fas', 'eye-slash']" />
</button>
</p>
2023-10-19 11:50:06 +02:00
<TotpLooper
v-if="hasTOTP"
:period="otpauthParams.period"
:generated_at="generated_at"
:autostart="false"
v-on:loop-ended="getOtp()"
v-on:loop-started="turnDotOn($event)"
v-on:stepped-up="turnDotOn($event)"
ref="totpLooper"
></TotpLooper>
</div>
</template>