|
27 | 27 |
|
28 | 28 | use Auth; |
29 | 29 | use Alert; |
| 30 | +use Cache; |
30 | 31 | use Illuminate\Http\Request; |
31 | 32 | use Pterodactyl\Models\User; |
32 | 33 | use PragmaRX\Google2FA\Google2FA; |
@@ -110,33 +111,62 @@ public function login(Request $request) |
110 | 111 | } |
111 | 112 |
|
112 | 113 | // Verify TOTP Token was Valid |
113 | | - if (Auth::user()->use_totp === 1) { |
114 | | - $G2FA = new Google2FA(); |
115 | | - if (is_null($request->input('totp_token')) || ! $G2FA->verifyKey(Auth::user()->totp_secret, $request->input('totp_token'))) { |
116 | | - if (! $lockedOut) { |
117 | | - $this->incrementLoginAttempts($request); |
118 | | - } |
| 114 | + if (Auth::user()->use_totp) { |
| 115 | + $verifyKey = str_random(64); |
| 116 | + Cache::put($verifyKey, Auth::user()->id, 5); |
119 | 117 |
|
120 | | - Alert::danger(trans('auth.totp_failed'))->flash(); |
| 118 | + return redirect()->route('auth.totp')->with('authentication_token', $verifyKey); |
| 119 | + } else { |
| 120 | + Auth::login(Auth::user(), $request->has('remember')); |
121 | 121 |
|
122 | | - return $this->sendFailedLoginResponse($request); |
123 | | - } |
| 122 | + return $this->sendLoginResponse($request); |
124 | 123 | } |
| 124 | + } |
| 125 | + |
| 126 | + public function totp(Request $request) |
| 127 | + { |
| 128 | + $verifyKey = $request->session()->get('authentication_token'); |
125 | 129 |
|
126 | | - // Successfully Authenticated. |
127 | | - Auth::login(Auth::user(), $request->has('remember')); |
| 130 | + if (is_null($verifyKey) || Auth::user()) { |
| 131 | + return redirect()->route('auth.login'); |
| 132 | + } |
128 | 133 |
|
129 | | - return $this->sendLoginResponse($request); |
| 134 | + return view('auth.totp', [ |
| 135 | + 'verify_key' => $verifyKey, |
| 136 | + 'remember' => $request->has('remember'), |
| 137 | + ]); |
130 | 138 | } |
131 | 139 |
|
132 | | - /** |
133 | | - * Check if the provided user has TOTP enabled. |
134 | | - * |
135 | | - * @param \Illuminate\Http\Request $request |
136 | | - * @return \Illuminate\Http\Response |
137 | | - */ |
138 | | - public function checkTotp(Request $request) |
| 140 | + public function totpCheckpoint(Request $request) |
139 | 141 | { |
140 | | - return response()->json(User::select('id')->where('email', $request->input('email'))->where('use_totp', 1)->first()); |
| 142 | + $G2FA = new Google2FA(); |
| 143 | + |
| 144 | + if (is_null($request->input('verify_token'))) { |
| 145 | + $this->incrementLoginAttempts($request); |
| 146 | + Alert::danger(trans('auth.totp_failed'))->flash(); |
| 147 | + |
| 148 | + return redirect()->route('auth.login'); |
| 149 | + } |
| 150 | + |
| 151 | + $user = User::where('id', Cache::pull($request->input('verify_token')))->first(); |
| 152 | + if (! $user) { |
| 153 | + $this->incrementLoginAttempts($request); |
| 154 | + Alert::danger(trans('auth.totp_failed'))->flash(); |
| 155 | + |
| 156 | + return redirect()->route('auth.login'); |
| 157 | + } |
| 158 | + |
| 159 | + |
| 160 | + if (! is_null($request->input('2fa_token')) && $G2FA->verifyKey($user->totp_secret, $request->input('2fa_token'), 1)) { |
| 161 | + Auth::login($user, $request->has('remember')); |
| 162 | + |
| 163 | + return redirect()->intended($this->redirectPath()); |
| 164 | + } else { |
| 165 | + $this->incrementLoginAttempts($request); |
| 166 | + Alert::danger(trans('auth.2fa_failed'))->flash(); |
| 167 | + |
| 168 | + return redirect()->route('auth.login'); |
| 169 | + } |
141 | 170 | } |
| 171 | + |
142 | 172 | } |
0 commit comments