-
-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add two factor authentication flow #25480
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Aside from the test failures
Is proper TOTP also going to be considered in the future? I feel like it could be more convenient for a lot of people and is more secure. |
ppy/osu-web#5163 searching is not hard |
Oh I searched the wrong repo oops. |
…icate with second factor
Them being together always bothered me and led to the abject failure that is `APIUser` and its sprawl. Now that I'm about to add a flag that is unique to `/me` for verification purposes, I'm not repeating the errors of the past by adding yet another flag to `APIUser` that is never present outside of a single usage context.
I've pushed some stuff here and the basic flows appear to work. I'm not sure I'm super happy with the code, though. First of all, the current "notification client" is almost glued to chat in its construction. Like have a look at Secondly there's e3eb7a8: turns out that the previous flow of consumption of the notification websocket (a) was half-reliant on the user API state being online, (b) required to request the user's notifications to retrieve the address of the notification websocket endpoint: osu/osu.Game/Online/Notifications/WebSocket/WebSocketNotificationsClientConnector.cs Lines 30 to 35 in b272d34
I'm not sure that's going to work if the user's session isn't verified, and it also seems turbo weird to do this. So I just hardcoded the websocket address. I'll likely want to ask the web team as to whether this is anywhere near acceptable. There's also the part where any failure to set up the websocket listener basically is met with "welp, there was an attempt, enter the code manually or go away". Not sure how much I should care about that. Tests will probably fail. And there are no new tests exercising the new logic. I'll come back to that tomorrow. |
the main idea for There's no particular reason why it requires authentication apart of there's no exclusion for it from requiring one and that it's not usable without authentication anyway. |
This is a prerequisite for ppy#25480. The `WebSocketNotificationsClient` was tightly coupled to chat specifics making it difficult to use in the second factor verification flow. This commit's goal is to separate the websocket connection and message handling concerns from specific chat logic concerns.
I think I'm okay with where this is at right now, but this is dependent on #26724 now. |
Seems to work well. @bdach I've deployed the required changes to staging if you want to give it a final test, but I think this is good to go from my end. |
Closes ppy#26835. I must have not re-tested this correctly after all the refactors... Basically the issue is that the websocket connection would only come online when the API state changed to full `Online`. In particular the connector would not attempt to connect when the API state was `RequiresSecondFactorAuth`, giving the link-based flow no chance to actually work. The change in `WebSocketNotificationsClientConnector` is relevant in that queueing requests does nothing before the API state changes to full `Online`. It also cleans up things a bit code-wise so... win? And yes, this means that the _other_ `PersistentEndpointClientConnector` implementations (i.e. SignalR connectors) will also come online earlier after this. Based on previous discussions (ppy#25480 (comment)) I think this is fine, but if it is _not_ fine, then it can be fixed by exposing a virtual that lets a connector to decide when to come alive, I guess.
Draft as this requires osu-web implementation.
Flows required:
@nanaya is looking into the above requirements
CleanShot.2023-11-16.at.09.34.04.mp4