2021-07-17 18:45:00 +02:00
|
|
|
<?php
|
|
|
|
|
|
|
|
namespace BookStack\Auth\Access;
|
|
|
|
|
|
|
|
use BookStack\Actions\ActivityType;
|
2021-07-17 19:24:50 +02:00
|
|
|
use BookStack\Auth\Access\Mfa\MfaSession;
|
2021-07-17 18:45:00 +02:00
|
|
|
use BookStack\Auth\User;
|
2021-07-18 17:52:31 +02:00
|
|
|
use BookStack\Exceptions\StoppedAuthenticationException;
|
2021-07-17 18:45:00 +02:00
|
|
|
use BookStack\Facades\Activity;
|
|
|
|
use BookStack\Facades\Theme;
|
|
|
|
use BookStack\Theming\ThemeEvents;
|
2021-07-18 17:52:31 +02:00
|
|
|
use Exception;
|
2021-08-02 23:02:25 +02:00
|
|
|
use phpDocumentor\Reflection\DocBlock\Tags\Method;
|
2021-07-17 18:45:00 +02:00
|
|
|
|
|
|
|
class LoginService
|
|
|
|
{
|
|
|
|
|
2021-07-18 17:52:31 +02:00
|
|
|
protected const LAST_LOGIN_ATTEMPTED_SESSION_KEY = 'auth-login-last-attempted';
|
|
|
|
|
2021-07-17 19:24:50 +02:00
|
|
|
protected $mfaSession;
|
|
|
|
|
|
|
|
public function __construct(MfaSession $mfaSession)
|
|
|
|
{
|
|
|
|
$this->mfaSession = $mfaSession;
|
|
|
|
}
|
|
|
|
|
2021-07-17 18:45:00 +02:00
|
|
|
/**
|
|
|
|
* Log the given user into the system.
|
2021-07-17 19:24:50 +02:00
|
|
|
* Will start a login of the given user but will prevent if there's
|
|
|
|
* a reason to (MFA or Unconfirmed Email).
|
|
|
|
* Returns a boolean to indicate the current login result.
|
2021-07-18 17:52:31 +02:00
|
|
|
* @throws StoppedAuthenticationException
|
2021-07-17 18:45:00 +02:00
|
|
|
*/
|
2021-07-18 17:52:31 +02:00
|
|
|
public function login(User $user, string $method): void
|
2021-07-17 18:45:00 +02:00
|
|
|
{
|
2021-07-17 19:24:50 +02:00
|
|
|
if ($this->awaitingEmailConfirmation($user) || $this->needsMfaVerification($user)) {
|
2021-08-02 23:02:25 +02:00
|
|
|
$this->setLastLoginAttemptedForUser($user, $method);
|
2021-07-18 17:52:31 +02:00
|
|
|
throw new StoppedAuthenticationException($user, $this);
|
2021-07-17 19:24:50 +02:00
|
|
|
// TODO - Does 'remember' still work? Probably not right now.
|
|
|
|
|
2021-08-02 17:35:37 +02:00
|
|
|
// TODO - Need to clear MFA sessions out upon logout
|
|
|
|
|
2021-07-17 19:24:50 +02:00
|
|
|
// Old MFA middleware todos:
|
|
|
|
|
|
|
|
// TODO - Handle email confirmation handling
|
|
|
|
// Left BookStack\Http\Middleware\Authenticate@emailConfirmationErrorResponse in which needs
|
|
|
|
// be removed as an example of old behaviour.
|
|
|
|
}
|
|
|
|
|
2021-07-18 17:52:31 +02:00
|
|
|
$this->clearLastLoginAttempted();
|
2021-07-17 18:45:00 +02:00
|
|
|
auth()->login($user);
|
|
|
|
Activity::add(ActivityType::AUTH_LOGIN, "{$method}; {$user->logDescriptor()}");
|
|
|
|
Theme::dispatch(ThemeEvents::AUTH_LOGIN, $method, $user);
|
|
|
|
|
|
|
|
// Authenticate on all session guards if a likely admin
|
|
|
|
if ($user->can('users-manage') && $user->can('user-roles-manage')) {
|
|
|
|
$guards = ['standard', 'ldap', 'saml2'];
|
|
|
|
foreach ($guards as $guard) {
|
|
|
|
auth($guard)->login($user);
|
|
|
|
}
|
|
|
|
}
|
2021-07-18 17:52:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Reattempt a system login after a previous stopped attempt.
|
|
|
|
* @throws Exception
|
|
|
|
*/
|
2021-08-02 23:02:25 +02:00
|
|
|
public function reattemptLoginFor(User $user)
|
2021-07-18 17:52:31 +02:00
|
|
|
{
|
2021-08-02 16:04:43 +02:00
|
|
|
if ($user->id !== ($this->getLastLoginAttemptUser()->id ?? null)) {
|
2021-07-18 17:52:31 +02:00
|
|
|
throw new Exception('Login reattempt user does align with current session state');
|
|
|
|
}
|
2021-07-17 19:24:50 +02:00
|
|
|
|
2021-08-02 23:02:25 +02:00
|
|
|
$this->login($user, $this->getLastLoginAttemptMethod());
|
2021-07-18 17:52:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get the last user that was attempted to be logged in.
|
|
|
|
* Only exists if the last login attempt had correct credentials
|
|
|
|
* but had been prevented by a secondary factor.
|
|
|
|
*/
|
|
|
|
public function getLastLoginAttemptUser(): ?User
|
|
|
|
{
|
2021-08-02 23:02:25 +02:00
|
|
|
$id = $this->getLastLoginAttemptDetails()['user_id'];
|
|
|
|
return User::query()->where('id', '=', $id)->first();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get the method for the last login attempt.
|
|
|
|
*/
|
|
|
|
protected function getLastLoginAttemptMethod(): ?string
|
|
|
|
{
|
|
|
|
return $this->getLastLoginAttemptDetails()['method'];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get the details of the last login attempt.
|
|
|
|
* Checks upon a ttl of about 1 hour since that last attempted login.
|
|
|
|
* @return array{user_id: ?string, method: ?string}
|
|
|
|
*/
|
|
|
|
protected function getLastLoginAttemptDetails(): array
|
|
|
|
{
|
|
|
|
$value = session()->get(self::LAST_LOGIN_ATTEMPTED_SESSION_KEY);
|
|
|
|
if (!$value) {
|
|
|
|
return ['user_id' => null, 'method' => null];
|
2021-07-18 17:52:31 +02:00
|
|
|
}
|
|
|
|
|
2021-08-02 23:02:25 +02:00
|
|
|
[$id, $method, $time] = explode(':', $value);
|
|
|
|
$hourAgo = time() - (60*60);
|
|
|
|
if ($time < $hourAgo) {
|
|
|
|
$this->clearLastLoginAttempted();
|
|
|
|
return ['user_id' => null, 'method' => null];
|
|
|
|
}
|
|
|
|
|
|
|
|
return ['user_id' => $id, 'method' => $method];
|
2021-07-18 17:52:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Set the last login attempted user.
|
|
|
|
* Must be only used when credentials are correct and a login could be
|
|
|
|
* achieved but a secondary factor has stopped the login.
|
|
|
|
*/
|
2021-08-02 23:02:25 +02:00
|
|
|
protected function setLastLoginAttemptedForUser(User $user, string $method)
|
2021-07-18 17:52:31 +02:00
|
|
|
{
|
2021-08-02 23:02:25 +02:00
|
|
|
session()->put(
|
|
|
|
self::LAST_LOGIN_ATTEMPTED_SESSION_KEY,
|
|
|
|
implode(':', [$user->id, $method, time()])
|
|
|
|
);
|
2021-07-18 17:52:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Clear the last login attempted session value.
|
|
|
|
*/
|
|
|
|
protected function clearLastLoginAttempted(): void
|
|
|
|
{
|
|
|
|
session()->remove(self::LAST_LOGIN_ATTEMPTED_SESSION_KEY);
|
2021-07-17 18:45:00 +02:00
|
|
|
}
|
|
|
|
|
2021-07-17 19:24:50 +02:00
|
|
|
/**
|
|
|
|
* Check if MFA verification is needed.
|
|
|
|
*/
|
2021-07-18 17:52:31 +02:00
|
|
|
public function needsMfaVerification(User $user): bool
|
2021-07-17 19:24:50 +02:00
|
|
|
{
|
|
|
|
return !$this->mfaSession->isVerifiedForUser($user) && $this->mfaSession->isRequiredForUser($user);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Check if the given user is awaiting email confirmation.
|
|
|
|
*/
|
2021-07-18 17:52:31 +02:00
|
|
|
public function awaitingEmailConfirmation(User $user): bool
|
2021-07-17 19:24:50 +02:00
|
|
|
{
|
|
|
|
$requireConfirmation = (setting('registration-confirmation') || setting('registration-restrict'));
|
|
|
|
return $requireConfirmation && !$user->email_confirmed;
|
|
|
|
}
|
2021-07-17 18:45:00 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Attempt the login of a user using the given credentials.
|
2021-07-17 19:24:50 +02:00
|
|
|
* Meant to mirror Laravel's default guard 'attempt' method
|
2021-07-17 18:45:00 +02:00
|
|
|
* but in a manner that always routes through our login system.
|
2021-07-18 17:52:31 +02:00
|
|
|
* May interrupt the flow if extra authentication requirements are imposed.
|
|
|
|
*
|
|
|
|
* @throws StoppedAuthenticationException
|
2021-07-17 18:45:00 +02:00
|
|
|
*/
|
|
|
|
public function attempt(array $credentials, string $method, bool $remember = false): bool
|
|
|
|
{
|
|
|
|
$result = auth()->attempt($credentials, $remember);
|
|
|
|
if ($result) {
|
|
|
|
$user = auth()->user();
|
|
|
|
auth()->logout();
|
2021-07-18 17:52:31 +02:00
|
|
|
$this->login($user, $method);
|
2021-07-17 18:45:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|