2022-09-13 13:14:49 +00:00
|
|
|
<?php
|
|
|
|
namespace Misuzu;
|
|
|
|
|
2023-07-22 15:02:41 +00:00
|
|
|
use RuntimeException;
|
2023-08-02 22:12:47 +00:00
|
|
|
use Misuzu\TOTPGenerator;
|
2023-08-03 01:35:08 +00:00
|
|
|
use Misuzu\Auth\AuthTokenCookie;
|
2022-09-13 13:14:49 +00:00
|
|
|
|
2023-08-02 22:12:47 +00:00
|
|
|
if($msz->isLoggedIn()) {
|
2022-09-13 13:14:49 +00:00
|
|
|
url_redirect('index');
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-09-06 13:50:19 +00:00
|
|
|
$users = $msz->getUsersContext()->getUsers();
|
2023-08-02 22:12:47 +00:00
|
|
|
$sessions = $msz->getSessions();
|
|
|
|
$tfaSessions = $msz->getTFASessions();
|
|
|
|
$loginAttempts = $msz->getLoginAttempts();
|
|
|
|
|
2023-01-05 18:33:03 +00:00
|
|
|
$ipAddress = $_SERVER['REMOTE_ADDR'];
|
2023-07-11 00:25:43 +00:00
|
|
|
$countryCode = $_SERVER['COUNTRY_CODE'] ?? 'XX';
|
2023-07-22 16:37:57 +00:00
|
|
|
$userAgent = $_SERVER['HTTP_USER_AGENT'] ?? '';
|
2022-09-13 13:14:49 +00:00
|
|
|
$twofactor = !empty($_POST['twofactor']) && is_array($_POST['twofactor']) ? $_POST['twofactor'] : [];
|
|
|
|
$notices = [];
|
2023-07-22 16:37:57 +00:00
|
|
|
|
|
|
|
$remainingAttempts = $loginAttempts->countRemainingAttempts($ipAddress);
|
2022-09-13 13:14:49 +00:00
|
|
|
|
2023-07-27 12:44:50 +00:00
|
|
|
$tokenString = !empty($_GET['token']) && is_string($_GET['token']) ? $_GET['token'] : (
|
|
|
|
!empty($twofactor['token']) && is_string($twofactor['token']) ? $twofactor['token'] : ''
|
|
|
|
);
|
2022-09-13 13:14:49 +00:00
|
|
|
|
2023-07-27 12:44:50 +00:00
|
|
|
$tokenUserId = $tfaSessions->getTokenUserId($tokenString);
|
|
|
|
if(empty($tokenUserId)) {
|
2022-09-13 13:14:49 +00:00
|
|
|
url_redirect('auth-login');
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-08-02 22:12:47 +00:00
|
|
|
$userInfo = $users->getUser($tokenUserId, 'id');
|
2022-09-13 13:14:49 +00:00
|
|
|
|
|
|
|
// checking user_totp_key specifically because there's a fringe chance that
|
|
|
|
// there's a token present, but totp is actually disabled
|
2023-07-29 20:18:41 +00:00
|
|
|
if(!$userInfo->hasTOTPKey()) {
|
2022-09-13 13:14:49 +00:00
|
|
|
url_redirect('auth-login');
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
while(!empty($twofactor)) {
|
|
|
|
if(!CSRF::validateRequest()) {
|
|
|
|
$notices[] = 'Was unable to verify the request, please try again!';
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
$userAgent = $_SERVER['HTTP_USER_AGENT'] ?? '';
|
|
|
|
$redirect = !empty($twofactor['redirect']) && is_string($twofactor['redirect']) ? $twofactor['redirect'] : '';
|
|
|
|
|
|
|
|
if(empty($twofactor['code']) || !is_string($twofactor['code'])) {
|
|
|
|
$notices[] = 'Code field was empty.';
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if($remainingAttempts < 1) {
|
|
|
|
$notices[] = 'There are too many failed login attempts from your IP address, please try again later.';
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2023-07-28 20:06:12 +00:00
|
|
|
$clientInfo = ClientInfo::fromRequest();
|
2023-08-02 22:12:47 +00:00
|
|
|
$totp = new TOTPGenerator($userInfo->getTOTPKey());
|
2023-07-28 20:06:12 +00:00
|
|
|
|
2023-07-29 20:18:41 +00:00
|
|
|
if(!in_array($twofactor['code'], $totp->generateRange())) {
|
2022-09-13 13:14:49 +00:00
|
|
|
$notices[] = sprintf(
|
|
|
|
"Invalid two factor code, %d attempt%s remaining",
|
|
|
|
$remainingAttempts - 1,
|
|
|
|
$remainingAttempts === 2 ? '' : 's'
|
|
|
|
);
|
2023-07-28 20:06:12 +00:00
|
|
|
$loginAttempts->recordAttempt(false, $ipAddress, $countryCode, $userAgent, $clientInfo, $userInfo);
|
2022-09-13 13:14:49 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2023-07-28 20:06:12 +00:00
|
|
|
$loginAttempts->recordAttempt(true, $ipAddress, $countryCode, $userAgent, $clientInfo, $userInfo);
|
2023-07-27 12:44:50 +00:00
|
|
|
$tfaSessions->deleteToken($tokenString);
|
2022-09-13 13:14:49 +00:00
|
|
|
|
|
|
|
try {
|
2023-07-28 20:06:12 +00:00
|
|
|
$sessionInfo = $sessions->createSession($userInfo, $ipAddress, $countryCode, $userAgent, $clientInfo);
|
2023-07-22 15:02:41 +00:00
|
|
|
} catch(RuntimeException $ex) {
|
2022-09-13 13:14:49 +00:00
|
|
|
$notices[] = "Something broke while creating a session for you, please tell an administrator or developer about this!";
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2023-08-03 01:35:08 +00:00
|
|
|
$tokenBuilder = $msz->getAuthInfo()->getTokenInfo()->toBuilder();
|
|
|
|
$tokenBuilder->setUserId($userInfo);
|
|
|
|
$tokenBuilder->setSessionToken($sessionInfo);
|
|
|
|
$tokenBuilder->removeImpersonatedUserId();
|
|
|
|
$tokenInfo = $tokenBuilder->toInfo();
|
|
|
|
|
|
|
|
AuthTokenCookie::apply($tokenPacker->pack($tokenInfo));
|
2022-09-13 13:14:49 +00:00
|
|
|
|
2023-07-28 20:06:12 +00:00
|
|
|
if(!is_local_url($redirect))
|
2022-09-13 13:14:49 +00:00
|
|
|
$redirect = url('index');
|
|
|
|
|
|
|
|
redirect($redirect);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
Template::render('auth.twofactor', [
|
|
|
|
'twofactor_notices' => $notices,
|
|
|
|
'twofactor_redirect' => !empty($_GET['redirect']) && is_string($_GET['redirect']) ? $_GET['redirect'] : url('index'),
|
|
|
|
'twofactor_attempts_remaining' => $remainingAttempts,
|
2023-07-27 12:44:50 +00:00
|
|
|
'twofactor_token' => $tokenString,
|
2022-09-13 13:14:49 +00:00
|
|
|
]);
|