2016-09-17 13:22:04 -04:00
|
|
|
<?php
|
|
|
|
|
|
|
|
namespace BookStack\Http\Controllers\Auth;
|
|
|
|
|
2018-09-25 07:30:50 -04:00
|
|
|
use BookStack\Auth\Access\SocialAuthService;
|
2020-02-01 06:42:22 -05:00
|
|
|
use BookStack\Exceptions\LoginAttemptEmailNeededException;
|
|
|
|
use BookStack\Exceptions\LoginAttemptException;
|
2018-09-25 11:58:03 -04:00
|
|
|
use BookStack\Http\Controllers\Controller;
|
2016-09-17 13:22:04 -04:00
|
|
|
use Illuminate\Foundation\Auth\AuthenticatesUsers;
|
|
|
|
use Illuminate\Http\Request;
|
|
|
|
|
|
|
|
class LoginController extends Controller
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
|--------------------------------------------------------------------------
|
|
|
|
| Login Controller
|
|
|
|
|--------------------------------------------------------------------------
|
|
|
|
|
|
|
|
|
| This controller handles authenticating users for the application and
|
|
|
|
| redirecting them to your home screen. The controller uses a trait
|
|
|
|
| to conveniently provide its functionality to your applications.
|
|
|
|
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
use AuthenticatesUsers;
|
|
|
|
|
|
|
|
/**
|
2020-02-01 06:42:22 -05:00
|
|
|
* Redirection paths
|
2016-09-17 13:22:04 -04:00
|
|
|
*/
|
|
|
|
protected $redirectTo = '/';
|
|
|
|
protected $redirectPath = '/';
|
|
|
|
protected $redirectAfterLogout = '/login';
|
|
|
|
|
|
|
|
protected $socialAuthService;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Create a new controller instance.
|
|
|
|
*/
|
2020-02-01 06:42:22 -05:00
|
|
|
public function __construct(SocialAuthService $socialAuthService)
|
2016-09-17 13:22:04 -04:00
|
|
|
{
|
|
|
|
$this->middleware('guest', ['only' => ['getLogin', 'postLogin']]);
|
|
|
|
$this->socialAuthService = $socialAuthService;
|
2019-08-04 09:26:39 -04:00
|
|
|
$this->redirectPath = url('/');
|
|
|
|
$this->redirectAfterLogout = url('/login');
|
2016-09-17 13:22:04 -04:00
|
|
|
parent::__construct();
|
|
|
|
}
|
|
|
|
|
|
|
|
public function username()
|
|
|
|
{
|
|
|
|
return config('auth.method') === 'standard' ? 'email' : 'username';
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-02-01 06:42:22 -05:00
|
|
|
* Get the needed authorization credentials from the request.
|
2016-09-17 13:22:04 -04:00
|
|
|
*/
|
2020-02-01 06:42:22 -05:00
|
|
|
protected function credentials(Request $request)
|
2016-09-17 13:22:04 -04:00
|
|
|
{
|
2020-02-01 06:42:22 -05:00
|
|
|
return $request->only('username', 'email', 'password');
|
2016-09-17 13:22:04 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Show the application login form.
|
|
|
|
*/
|
2017-12-10 08:56:25 -05:00
|
|
|
public function getLogin(Request $request)
|
2016-09-17 13:22:04 -04:00
|
|
|
{
|
|
|
|
$socialDrivers = $this->socialAuthService->getActiveDrivers();
|
|
|
|
$authMethod = config('auth.method');
|
2019-11-17 08:26:43 -05:00
|
|
|
$samlEnabled = config('saml2.enabled') === true;
|
2017-12-10 08:56:25 -05:00
|
|
|
|
|
|
|
if ($request->has('email')) {
|
|
|
|
session()->flashInput([
|
|
|
|
'email' => $request->get('email'),
|
|
|
|
'password' => (config('app.env') === 'demo') ? $request->get('password', '') : ''
|
|
|
|
]);
|
|
|
|
}
|
|
|
|
|
2019-08-05 14:06:39 -04:00
|
|
|
return view('auth.login', [
|
|
|
|
'socialDrivers' => $socialDrivers,
|
|
|
|
'authMethod' => $authMethod,
|
|
|
|
'samlEnabled' => $samlEnabled,
|
|
|
|
]);
|
2016-09-17 13:22:04 -04:00
|
|
|
}
|
|
|
|
|
2020-02-01 06:42:22 -05:00
|
|
|
/**
|
|
|
|
* Handle a login request to the application.
|
|
|
|
*
|
|
|
|
* @param \Illuminate\Http\Request $request
|
|
|
|
* @return \Illuminate\Http\RedirectResponse|\Illuminate\Http\Response|\Illuminate\Http\JsonResponse
|
|
|
|
*
|
|
|
|
* @throws \Illuminate\Validation\ValidationException
|
|
|
|
*/
|
|
|
|
public function login(Request $request)
|
|
|
|
{
|
|
|
|
$this->validateLogin($request);
|
|
|
|
|
|
|
|
// If the class is using the ThrottlesLogins trait, we can automatically throttle
|
|
|
|
// the login attempts for this application. We'll key this by the username and
|
|
|
|
// the IP address of the client making these requests into this application.
|
|
|
|
if (method_exists($this, 'hasTooManyLoginAttempts') &&
|
|
|
|
$this->hasTooManyLoginAttempts($request)) {
|
|
|
|
$this->fireLockoutEvent($request);
|
|
|
|
|
|
|
|
return $this->sendLockoutResponse($request);
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
if ($this->attemptLogin($request)) {
|
|
|
|
return $this->sendLoginResponse($request);
|
|
|
|
}
|
|
|
|
} catch (LoginAttemptException $exception) {
|
|
|
|
return $this->sendLoginAttemptExceptionResponse($exception, $request);
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the login attempt was unsuccessful we will increment the number of attempts
|
|
|
|
// to login and redirect the user back to the login form. Of course, when this
|
|
|
|
// user surpasses their maximum number of attempts they will get locked out.
|
|
|
|
$this->incrementLoginAttempts($request);
|
|
|
|
|
|
|
|
return $this->sendFailedLoginResponse($request);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Send a response when a login attempt exception occurs.
|
|
|
|
*/
|
|
|
|
protected function sendLoginAttemptExceptionResponse(LoginAttemptException $exception, Request $request)
|
|
|
|
{
|
|
|
|
if ($exception instanceof LoginAttemptEmailNeededException) {
|
|
|
|
$request->flash();
|
|
|
|
session()->flash('request-email', true);
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($message = $exception->getMessage()) {
|
|
|
|
$this->showWarningNotification($message);
|
|
|
|
}
|
|
|
|
|
|
|
|
return redirect('/login');
|
|
|
|
}
|
|
|
|
|
2019-11-17 10:40:36 -05:00
|
|
|
/**
|
|
|
|
* Log the user out of the application.
|
|
|
|
*/
|
|
|
|
public function logout(Request $request)
|
|
|
|
{
|
|
|
|
if (config('saml2.enabled') && session()->get('last_login_type') === 'saml2') {
|
|
|
|
return redirect('/saml2/logout');
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->guard()->logout();
|
|
|
|
$request->session()->invalidate();
|
|
|
|
|
|
|
|
return $this->loggedOut($request) ?: redirect('/');
|
|
|
|
}
|
2018-01-28 11:58:52 -05:00
|
|
|
}
|