1
0
mirror of https://github.com/invoiceninja/invoiceninja.git synced 2024-11-14 15:13:29 +01:00
invoiceninja/app/Http/Controllers/TwoFactorController.php

89 lines
2.4 KiB
PHP
Raw Normal View History

2021-02-20 01:45:20 +01:00
<?php
/**
* Invoice Ninja (https://invoiceninja.com).
*
* @link https://github.com/invoiceninja/invoiceninja source repository
*
* @copyright Copyright (c) 2021. Invoice Ninja LLC (https://invoiceninja.com)
*
2021-06-16 08:58:16 +02:00
* @license https://www.elastic.co/licensing/elastic-license
2021-02-20 01:45:20 +01:00
*/
namespace App\Http\Controllers;
2021-06-23 06:55:12 +02:00
use App\Models\User;
2021-06-23 07:01:13 +02:00
use App\Transformers\UserTransformer;
2021-02-20 01:45:20 +01:00
use Crypt;
2021-06-23 06:55:12 +02:00
use PragmaRX\Google2FA\Google2FA;
2021-02-20 01:45:20 +01:00
class TwoFactorController extends BaseController
{
2021-06-23 06:55:12 +02:00
protected $entity_type = User::class;
protected $entity_transformer = UserTransformer::class;
2021-02-20 01:45:20 +01:00
public function setupTwoFactor()
{
$user = auth()->user();
if ($user->google_2fa_secret)
return response()->json(['message' => '2FA already enabled'], 400);
elseif(! $user->phone)
return response()->json(['message' => ctrans('texts.set_phone_for_two_factor')], 400);
2021-03-07 21:49:33 +01:00
elseif(! $user->isVerified())
2021-02-20 01:45:20 +01:00
return response()->json(['message' => 'Please confirm your account first'], 400);
$google2fa = new Google2FA();
$secret = $google2fa->generateSecretKey();
2021-03-08 21:46:30 +01:00
$qr_code = $google2fa->getQRCodeUrl(
2021-02-24 00:00:51 +01:00
config('ninja.app_name'),
2021-02-20 01:45:20 +01:00
$user->email,
$secret
);
$data = [
'secret' => $secret,
2021-03-09 11:53:25 +01:00
'qrCode' => $qr_code,
2021-02-20 01:45:20 +01:00
];
return response()->json(['data' => $data], 200);
}
public function enableTwoFactor()
{
2021-03-14 22:40:07 +01:00
$google2fa = new Google2FA();
2021-02-20 01:45:20 +01:00
$user = auth()->user();
$secret = request()->input('secret');
$oneTimePassword = request()->input('one_time_password');
2021-03-16 12:47:14 +01:00
if($google2fa->verifyKey($secret, $oneTimePassword) && $user->phone && $user->email_verified_at){
2021-03-15 23:33:55 +01:00
2021-02-20 01:45:20 +01:00
$user->google_2fa_secret = encrypt($secret);
2021-03-18 12:46:58 +01:00
2021-02-20 01:45:20 +01:00
$user->save();
2021-03-15 23:33:55 +01:00
return response()->json(['message' => ctrans('texts.enabled_two_factor')], 200);
} elseif (! $secret || ! $google2fa->verifyKey($secret, $oneTimePassword)) {
2021-02-20 01:45:20 +01:00
2021-03-16 14:40:58 +01:00
return response()->json(['message' => ctrans('texts.invalid_one_time_password')], 400);
2021-03-15 23:33:55 +01:00
}
2021-03-16 14:40:58 +01:00
return response()->json(['message' => 'No phone record or user is not confirmed'], 400);
2021-03-15 23:33:55 +01:00
2021-02-20 01:45:20 +01:00
}
2021-03-15 23:33:55 +01:00
2021-06-06 11:21:05 +02:00
public function disableTwoFactor()
{
$user = auth()->user();
$user->google_2fa_secret = null;
$user->save();
return $this->itemResponse($user);
}
2021-02-20 01:45:20 +01:00
}