]> BookStack Code Mirror - bookstack/blob - app/Http/Controllers/Auth/MfaBackupCodesController.php
Cleaned some unused elements during testing
[bookstack] / app / Http / Controllers / Auth / MfaBackupCodesController.php
1 <?php
2
3 namespace BookStack\Http\Controllers\Auth;
4
5 use BookStack\Actions\ActivityType;
6 use BookStack\Auth\Access\LoginService;
7 use BookStack\Auth\Access\Mfa\BackupCodeService;
8 use BookStack\Auth\Access\Mfa\MfaSession;
9 use BookStack\Auth\Access\Mfa\MfaValue;
10 use BookStack\Exceptions\NotFoundException;
11 use BookStack\Http\Controllers\Controller;
12 use Exception;
13 use Illuminate\Http\Request;
14 use Illuminate\Validation\ValidationException;
15
16 class MfaBackupCodesController extends Controller
17 {
18     use HandlesPartialLogins;
19
20     protected const SETUP_SECRET_SESSION_KEY = 'mfa-setup-backup-codes';
21
22     /**
23      * Show a view that generates and displays backup codes
24      */
25     public function generate(BackupCodeService $codeService)
26     {
27         $codes = $codeService->generateNewSet();
28         session()->put(self::SETUP_SECRET_SESSION_KEY, encrypt($codes));
29
30         $downloadUrl = 'data:application/octet-stream;base64,' . base64_encode(implode("\n\n", $codes));
31
32         return view('mfa.backup-codes-generate', [
33             'codes' => $codes,
34             'downloadUrl' => $downloadUrl,
35         ]);
36     }
37
38     /**
39      * Confirm the setup of backup codes, storing them against the user.
40      * @throws Exception
41      */
42     public function confirm()
43     {
44         if (!session()->has(self::SETUP_SECRET_SESSION_KEY)) {
45             return response('No generated codes found in the session', 500);
46         }
47
48         $codes = decrypt(session()->pull(self::SETUP_SECRET_SESSION_KEY));
49         MfaValue::upsertWithValue($this->currentOrLastAttemptedUser(), MfaValue::METHOD_BACKUP_CODES, json_encode($codes));
50
51         $this->logActivity(ActivityType::MFA_SETUP_METHOD, 'backup-codes');
52
53         if (!auth()->check()) {
54             $this->showSuccessNotification(trans('auth.mfa_setup_login_notification'));
55             return redirect('/login');
56         }
57
58         return redirect('/mfa/setup');
59     }
60
61     /**
62      * Verify the MFA method submission on check.
63      * @throws NotFoundException
64      * @throws ValidationException
65      */
66     public function verify(Request $request, BackupCodeService $codeService, MfaSession $mfaSession, LoginService $loginService)
67     {
68         $user = $this->currentOrLastAttemptedUser();
69         $codes = MfaValue::getValueForUser($user, MfaValue::METHOD_BACKUP_CODES) ?? '[]';
70
71         $this->validate($request, [
72             'code' => [
73                 'required',
74                 'max:12', 'min:8',
75                 function ($attribute, $value, $fail) use ($codeService, $codes) {
76                     if (!$codeService->inputCodeExistsInSet($value, $codes)) {
77                         $fail(trans('validation.backup_codes'));
78                     }
79                 }
80             ]
81         ]);
82
83         $updatedCodes = $codeService->removeInputCodeFromSet($request->get('code'), $codes);
84         MfaValue::upsertWithValue($user, MfaValue::METHOD_BACKUP_CODES, $updatedCodes);
85
86         $mfaSession->markVerifiedForUser($user);
87         $loginService->reattemptLoginFor($user);
88
89         if ($codeService->countCodesInSet($updatedCodes) < 5) {
90             $this->showWarningNotification(trans('auth.mfa_backup_codes_usage_limit_warning'));
91         }
92
93         return redirect()->intended();
94     }
95 }