snipe-it/app/Http/Controllers/Auth/LoginController.php

324 lines
9.4 KiB
PHP
Raw Normal View History

2016-03-25 01:18:05 -07:00
<?php
namespace App\Http\Controllers\Auth;
use Validator;
use App\Http\Controllers\Controller;
use Illuminate\Foundation\Auth\ThrottlesLogins;
2016-03-25 19:26:22 -07:00
use App\Models\Setting;
use App\Models\Ldap;
2016-03-25 19:26:22 -07:00
use App\Models\User;
2016-03-25 01:18:05 -07:00
use Auth;
use Config;
use Illuminate\Http\Request;
use Input;
use Redirect;
use Log;
use View;
use PragmaRX\Google2FA\Google2FA;
2016-03-25 01:18:05 -07:00
2016-04-07 13:21:09 -07:00
/**
* This controller handles authentication for the user, including local
* database users and LDAP users.
*
* @author [A. Gianotto] [<snipe@snipe.net>]
* @version v1.0
*/
class LoginController extends Controller
2016-03-25 01:18:05 -07:00
{
use ThrottlesLogins;
2016-03-25 01:18:05 -07:00
// This tells the auth controller to use username instead of email address
protected $username = 'username';
/**
* Where to redirect users after login / registration.
*
* @var string
*/
protected $redirectTo = '/';
/**
* Create a new authentication controller instance.
*
* @return void
*/
public function __construct()
{
$this->middleware('guest', ['except' => ['logout','postTwoFactorAuth','getTwoFactorAuth','getTwoFactorEnroll']]);
2016-03-25 01:18:05 -07:00
}
2016-12-01 02:13:00 -08:00
function showLoginForm()
2016-03-25 01:18:05 -07:00
{
if (Auth::check()) {
return redirect()->intended('dashboard');
}
return view('auth.login');
2016-03-25 01:18:05 -07:00
}
2016-12-01 02:25:53 -08:00
private function login_via_ldap(Request $request)
{
LOG::debug("Binding user to LDAP.");
$ldap_user = Ldap::findAndBindUserLdap($request->input('username'), $request->input('password'));
2016-12-29 14:02:18 -08:00
if (!$ldap_user) {
LOG::debug("LDAP user ".$request->input('username')." not found in LDAP or could not bind");
throw new \Exception("Could not find user in LDAP directory");
} else {
LOG::debug("LDAP user ".$request->input('username')." successfully bound to LDAP");
}
// Check if the user already exists in the database and was imported via LDAP
2016-12-29 14:02:18 -08:00
$user = User::where('username', '=', Input::get('username'))->whereNull('deleted_at')->where('ldap_import', '=', 1)->first();
LOG::debug("Local auth lookup complete");
// The user does not exist in the database. Try to get them from LDAP.
// If user does not exist and authenticates successfully with LDAP we
// will create it on the fly and sign in with default permissions
if (!$user) {
LOG::debug("Local user ".Input::get('username')." does not exist");
LOG::debug("Creating local user ".Input::get('username'));
if ($user = Ldap::createUserFromLdap($ldap_user)) { //this handles passwords on its own
LOG::debug("Local user created.");
} else {
LOG::debug("Could not create local user.");
throw new \Exception("Could not create local user");
}
// If the user exists and they were imported from LDAP already
} else {
LOG::debug("Local user ".$request->input('username')." exists in database. Updating existing user against LDAP.");
$ldap_attr = Ldap::parseAndMapLdapAttributes($ldap_user);
if (Setting::getSettings()->ldap_pw_sync=='1') {
$user->password = bcrypt($request->input('password'));
}
$user->email = $ldap_attr['email'];
$user->first_name = $ldap_attr['firstname'];
$user->last_name = $ldap_attr['lastname'];
$user->save();
} // End if(!user)
return $user;
}
2016-03-25 01:18:05 -07:00
/**
* Account sign in form processing.
*
* @return Redirect
*/
public function login(Request $request)
2016-03-25 01:18:05 -07:00
{
$validator = $this->validator(Input::all());
if ($validator->fails()) {
2016-04-28 21:06:41 -07:00
return redirect()->back()->withInput()->withErrors($validator);
2016-03-25 01:18:05 -07:00
}
$this->maxLoginAttempts = config('auth.throttle.max_attempts');
$this->lockoutTime = config('auth.throttle.lockout_duration');
if ($lockedOut = $this->hasTooManyLoginAttempts($request)) {
$this->fireLockoutEvent($request);
return $this->sendLockoutResponse($request);
}
$user = null;
2016-03-25 01:18:05 -07:00
// Should we even check for LDAP users?
2016-03-25 19:26:22 -07:00
if (Setting::getSettings()->ldap_enabled=='1') {
2016-03-25 01:18:05 -07:00
LOG::debug("LDAP is enabled.");
try {
2016-12-29 14:02:18 -08:00
$user = $this->login_via_ldap($request);
Auth::login($user, true);
// If the user was unable to login via LDAP, log the error and let them fall through to
// local authentication.
} catch (\Exception $e) {
LOG::error("There was an error authenticating the LDAP user: ".$e->getMessage());
}
}
2016-03-25 01:18:05 -07:00
// If the user wasn't authenticated via LDAP, skip to local auth
2016-12-29 14:02:18 -08:00
if (!$user) {
LOG::debug("Authenticating user against database.");
// Try to log the user in
2016-12-29 14:02:18 -08:00
if (!Auth::attempt(Input::only('username', 'password'), Input::get('remember-me', 0))) {
2016-12-29 14:02:18 -08:00
if (!$lockedOut) {
$this->incrementLoginAttempts($request);
}
2016-12-29 14:02:18 -08:00
LOG::debug("Local authentication failed.");
return redirect()->back()->withInput()->with('error', trans('auth/message.account_not_found'));
} else {
2017-03-03 18:28:13 -08:00
$this->clearLoginAttempts($request);
2016-12-29 14:02:18 -08:00
}
}
2017-03-03 18:28:13 -08:00
if ($user = Auth::user()) {
$user->last_login = \Carbon::now();
\Log::debug('Last login:'.$user->last_login);
$user->save();
}
// Redirect to the users page
return redirect()->intended()->with('success', trans('auth/message.signin.success'));
}
2016-03-25 01:18:05 -07:00
/**
* Two factor enrollment page
*
* @return Redirect
*/
public function getTwoFactorEnroll()
{
2016-03-25 01:18:05 -07:00
if (!Auth::check()) {
return redirect()->route('login')->with('error', 'You must be logged in.');
}
2016-03-25 01:18:05 -07:00
$user = Auth::user();
$google2fa = app()->make('PragmaRX\Google2FA\Contracts\Google2FA');
2016-07-14 23:49:32 -07:00
if ($user->two_factor_secret=='') {
$user->two_factor_secret = $google2fa->generateSecretKey(32);
$user->save();
}
2016-07-14 23:49:32 -07:00
$google2fa_url = $google2fa->getQRCodeGoogleUrl(
2016-10-31 22:34:57 -07:00
urlencode(Setting::getSettings()->site_name),
urlencode($user->username),
$user->two_factor_secret
);
2016-03-25 01:18:05 -07:00
return view('auth.two_factor_enroll')->with('google2fa_url', $google2fa_url);
}
2016-03-25 01:18:05 -07:00
/**
* Two factor code form page
*
* @return Redirect
*/
2016-12-29 14:02:18 -08:00
public function getTwoFactorAuth()
{
return view('auth.two_factor');
}
2016-03-25 01:18:05 -07:00
/**
* Two factor code submission
*
* @return Redirect
*/
2016-12-29 14:02:18 -08:00
public function postTwoFactorAuth(Request $request)
{
if (!Auth::check()) {
return redirect()->route('login')->with('error', 'You must be logged in.');
2016-03-25 01:18:05 -07:00
}
$user = Auth::user();
$secret = $request->get('two_factor_secret');
$google2fa = app()->make('PragmaRX\Google2FA\Contracts\Google2FA');
$valid = $google2fa->verifyKey($user->two_factor_secret, $secret);
if ($valid) {
$user->two_factor_enrolled = 1;
$user->save();
$request->session()->put('2fa_authed', 'true');
return redirect()->route('home')->with('success', 'You are logged in!');
}
return redirect()->route('two-factor')->with('error', 'Invalid two-factor code');
2016-03-25 01:18:05 -07:00
}
2016-03-25 01:18:05 -07:00
/**
* Logout page.
*
* @return Redirect
*/
public function logout(Request $request)
2016-03-25 01:18:05 -07:00
{
$request->session()->forget('2fa_authed');
2016-03-25 01:18:05 -07:00
Auth::logout();
return redirect()->route('login')->with('success', 'You have successfully logged out!');
2016-03-25 01:18:05 -07:00
}
/**
* Get a validator for an incoming registration request.
*
* @param array $data
* @return \Illuminate\Contracts\Validation\Validator
*/
protected function validator(array $data)
{
return Validator::make($data, [
'username' => 'required',
'password' => 'required',
]);
}
public function username()
{
return 'username';
}
/**
* Redirect the user after determining they are locked out.
*
* @param \Illuminate\Http\Request $request
* @return \Illuminate\Http\RedirectResponse
*/
protected function sendLockoutResponse(Request $request)
{
2016-12-14 06:30:51 -08:00
$seconds = $this->limiter()->availableIn(
$this->throttleKey($request)
);
$minutes = round($seconds / 60);
2016-12-29 14:02:18 -08:00
$message = \Lang::get('auth/message.throttle', ['minutes' => $minutes]);
2016-12-14 06:30:51 -08:00
return redirect()->back()
->withInput($request->only($this->username(), 'remember'))
->withErrors([$this->username() => $message]);
}
2016-12-14 06:30:51 -08:00
/**
* Override the lockout time and duration
*
* @param \Illuminate\Http\Request $request
* @return \Illuminate\Http\RedirectResponse
*/
protected function hasTooManyLoginAttempts(Request $request)
{
$lockoutTime = config('auth.throttle.lockout_duration');
$maxLoginAttempts = config('auth.throttle.max_attempts');
return $this->limiter()->tooManyAttempts(
2016-12-29 14:02:18 -08:00
$this->throttleKey($request),
$maxLoginAttempts,
$lockoutTime
2016-12-14 06:30:51 -08:00
);
}
2017-02-02 18:14:25 -08:00
public function legacyAuthRedirect() {
return redirect()->route('login');
}
2016-03-25 01:18:05 -07:00
}