|
|
|
@ -32,7 +32,7 @@ func RegenerateScratchTwoFactor(ctx *context.Context) { |
|
|
|
|
t, err := login.GetTwoFactorByUID(ctx.User.ID) |
|
|
|
|
if err != nil { |
|
|
|
|
if login.IsErrTwoFactorNotEnrolled(err) { |
|
|
|
|
ctx.Flash.Error(ctx.Tr("setting.twofa_not_enrolled")) |
|
|
|
|
ctx.Flash.Error(ctx.Tr("settings.twofa_not_enrolled")) |
|
|
|
|
ctx.Redirect(setting.AppSubURL + "/user/settings/security") |
|
|
|
|
} |
|
|
|
|
ctx.ServerError("SettingsTwoFactor: Failed to GetTwoFactorByUID", err) |
|
|
|
@ -62,7 +62,7 @@ func DisableTwoFactor(ctx *context.Context) { |
|
|
|
|
t, err := login.GetTwoFactorByUID(ctx.User.ID) |
|
|
|
|
if err != nil { |
|
|
|
|
if login.IsErrTwoFactorNotEnrolled(err) { |
|
|
|
|
ctx.Flash.Error(ctx.Tr("setting.twofa_not_enrolled")) |
|
|
|
|
ctx.Flash.Error(ctx.Tr("settings.twofa_not_enrolled")) |
|
|
|
|
ctx.Redirect(setting.AppSubURL + "/user/settings/security") |
|
|
|
|
} |
|
|
|
|
ctx.ServerError("SettingsTwoFactor: Failed to GetTwoFactorByUID", err) |
|
|
|
@ -150,7 +150,7 @@ func EnrollTwoFactor(ctx *context.Context) { |
|
|
|
|
if t != nil { |
|
|
|
|
// already enrolled - we should redirect back!
|
|
|
|
|
log.Warn("Trying to re-enroll %-v in twofa when already enrolled", ctx.User) |
|
|
|
|
ctx.Flash.Error(ctx.Tr("setting.twofa_is_enrolled")) |
|
|
|
|
ctx.Flash.Error(ctx.Tr("settings.twofa_is_enrolled")) |
|
|
|
|
ctx.Redirect(setting.AppSubURL + "/user/settings/security") |
|
|
|
|
return |
|
|
|
|
} |
|
|
|
@ -175,7 +175,7 @@ func EnrollTwoFactorPost(ctx *context.Context) { |
|
|
|
|
t, err := login.GetTwoFactorByUID(ctx.User.ID) |
|
|
|
|
if t != nil { |
|
|
|
|
// already enrolled
|
|
|
|
|
ctx.Flash.Error(ctx.Tr("setting.twofa_is_enrolled")) |
|
|
|
|
ctx.Flash.Error(ctx.Tr("settings.twofa_is_enrolled")) |
|
|
|
|
ctx.Redirect(setting.AppSubURL + "/user/settings/security") |
|
|
|
|
return |
|
|
|
|
} |
|
|
|
|