2021-07-02 15:53:33 -04:00
|
|
|
<?php
|
|
|
|
|
|
|
|
namespace BookStack\Http\Controllers\Auth;
|
|
|
|
|
|
|
|
use BookStack\Actions\ActivityType;
|
2021-08-02 10:04:43 -04:00
|
|
|
use BookStack\Auth\Access\LoginService;
|
|
|
|
use BookStack\Auth\Access\Mfa\MfaSession;
|
2021-07-02 15:53:33 -04:00
|
|
|
use BookStack\Auth\Access\Mfa\MfaValue;
|
|
|
|
use BookStack\Auth\Access\Mfa\TotpService;
|
|
|
|
use BookStack\Auth\Access\Mfa\TotpValidationRule;
|
2021-07-18 11:52:31 -04:00
|
|
|
use BookStack\Exceptions\NotFoundException;
|
2021-07-02 15:53:33 -04:00
|
|
|
use BookStack\Http\Controllers\Controller;
|
|
|
|
use Illuminate\Http\Request;
|
|
|
|
use Illuminate\Validation\ValidationException;
|
|
|
|
|
|
|
|
class MfaTotpController extends Controller
|
|
|
|
{
|
2021-07-18 11:52:31 -04:00
|
|
|
use HandlesPartialLogins;
|
|
|
|
|
2021-07-02 15:53:33 -04:00
|
|
|
protected const SETUP_SECRET_SESSION_KEY = 'mfa-setup-totp-secret';
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Show a view that generates and displays a TOTP QR code.
|
|
|
|
*/
|
|
|
|
public function generate(TotpService $totp)
|
|
|
|
{
|
|
|
|
if (session()->has(static::SETUP_SECRET_SESSION_KEY)) {
|
|
|
|
$totpSecret = decrypt(session()->get(static::SETUP_SECRET_SESSION_KEY));
|
|
|
|
} else {
|
|
|
|
$totpSecret = $totp->generateSecret();
|
|
|
|
session()->put(static::SETUP_SECRET_SESSION_KEY, encrypt($totpSecret));
|
|
|
|
}
|
|
|
|
|
|
|
|
$qrCodeUrl = $totp->generateUrl($totpSecret);
|
|
|
|
$svg = $totp->generateQrCodeSvg($qrCodeUrl);
|
|
|
|
|
|
|
|
return view('mfa.totp-generate', [
|
2021-09-01 15:58:19 -04:00
|
|
|
'url' => $qrCodeUrl,
|
|
|
|
'svg' => $svg,
|
2021-07-02 15:53:33 -04:00
|
|
|
]);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Confirm the setup of TOTP and save the auth method secret
|
|
|
|
* against the current user.
|
2021-08-21 10:49:40 -04:00
|
|
|
*
|
2021-07-02 15:53:33 -04:00
|
|
|
* @throws ValidationException
|
2021-07-18 11:52:31 -04:00
|
|
|
* @throws NotFoundException
|
2021-07-02 15:53:33 -04:00
|
|
|
*/
|
|
|
|
public function confirm(Request $request)
|
|
|
|
{
|
|
|
|
$totpSecret = decrypt(session()->get(static::SETUP_SECRET_SESSION_KEY));
|
|
|
|
$this->validate($request, [
|
|
|
|
'code' => [
|
|
|
|
'required',
|
|
|
|
'max:12', 'min:4',
|
|
|
|
new TotpValidationRule($totpSecret),
|
2021-08-21 10:49:40 -04:00
|
|
|
],
|
2021-07-02 15:53:33 -04:00
|
|
|
]);
|
|
|
|
|
2021-07-18 11:52:31 -04:00
|
|
|
MfaValue::upsertWithValue($this->currentOrLastAttemptedUser(), MfaValue::METHOD_TOTP, $totpSecret);
|
2021-07-02 15:53:33 -04:00
|
|
|
session()->remove(static::SETUP_SECRET_SESSION_KEY);
|
|
|
|
$this->logActivity(ActivityType::MFA_SETUP_METHOD, 'totp');
|
|
|
|
|
2021-08-21 10:14:24 -04:00
|
|
|
if (!auth()->check()) {
|
|
|
|
$this->showSuccessNotification(trans('auth.mfa_setup_login_notification'));
|
2021-08-21 10:49:40 -04:00
|
|
|
|
2021-08-21 10:14:24 -04:00
|
|
|
return redirect('/login');
|
|
|
|
}
|
|
|
|
|
2021-07-02 15:53:33 -04:00
|
|
|
return redirect('/mfa/setup');
|
|
|
|
}
|
2021-08-02 10:04:43 -04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Verify the MFA method submission on check.
|
2021-08-21 10:49:40 -04:00
|
|
|
*
|
2021-08-02 10:04:43 -04:00
|
|
|
* @throws NotFoundException
|
|
|
|
*/
|
|
|
|
public function verify(Request $request, LoginService $loginService, MfaSession $mfaSession)
|
|
|
|
{
|
|
|
|
$user = $this->currentOrLastAttemptedUser();
|
|
|
|
$totpSecret = MfaValue::getValueForUser($user, MfaValue::METHOD_TOTP);
|
|
|
|
|
|
|
|
$this->validate($request, [
|
|
|
|
'code' => [
|
|
|
|
'required',
|
|
|
|
'max:12', 'min:4',
|
|
|
|
new TotpValidationRule($totpSecret),
|
2021-08-21 10:49:40 -04:00
|
|
|
],
|
2021-08-02 10:04:43 -04:00
|
|
|
]);
|
|
|
|
|
|
|
|
$mfaSession->markVerifiedForUser($user);
|
2021-08-02 17:02:25 -04:00
|
|
|
$loginService->reattemptLoginFor($user);
|
2021-08-02 10:04:43 -04:00
|
|
|
|
|
|
|
return redirect()->intended();
|
|
|
|
}
|
2021-07-02 15:53:33 -04:00
|
|
|
}
|