Skip to content

fix: guard mfa login with ip tracker#12365

Merged
wanghe-fit2cloud merged 1 commit intodev-v2from
fix/mfa-login-iptracker-guard
Mar 30, 2026
Merged

fix: guard mfa login with ip tracker#12365
wanghe-fit2cloud merged 1 commit intodev-v2from
fix/mfa-login-iptracker-guard

Conversation

@ssongliu
Copy link
Copy Markdown
Member

No description provided.

@f2c-ci-robot
Copy link
Copy Markdown

f2c-ci-robot bot commented Mar 30, 2026

Adding the "do-not-merge/release-note-label-needed" label because no release-note block was detected, please follow our release note process to remove it.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Copy link
Copy Markdown

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: d4e90147b7

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment on lines +89 to +91
if global.IPTracker.NeedCaptcha(ip) {
helper.BadAuth(c, "ErrMFA", nil)
return
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Avoid hard-blocking MFA retries when captcha is required

This early return makes /core/auth/mfalogin reject all requests from a tracked IP with ErrMFA before verifying the submitted code. Because this same handler now sets NeedCaptcha after one wrong MFA code, a user who mistypes once cannot complete MFA on the current screen anymore: the frontend MFA handler (frontend/src/views/login/components/login-form.vue, mfaLogin) treats every 401 as a generic MFA error and does not expose captcha or route back to password login, so even a correct second code is rejected until the user manually restarts the whole login flow.

Useful? React with 👍 / 👎.

Copy link
Copy Markdown
Member

@wanghe-fit2cloud wanghe-fit2cloud left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@wanghe-fit2cloud
Copy link
Copy Markdown
Member

/approve

@wanghe-fit2cloud wanghe-fit2cloud merged commit bc9882d into dev-v2 Mar 30, 2026
2 of 3 checks passed
@f2c-ci-robot
Copy link
Copy Markdown

f2c-ci-robot bot commented Mar 30, 2026

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: wanghe-fit2cloud

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@wanghe-fit2cloud wanghe-fit2cloud deleted the fix/mfa-login-iptracker-guard branch March 30, 2026 14:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants