<?php namespace Pterodactyl\Http\Controllers\Auth; use Pterodactyl\Models\User; use Illuminate\Auth\AuthManager; use Illuminate\Http\JsonResponse; use PragmaRX\Google2FA\Google2FA; use Illuminate\Contracts\Config\Repository; use Illuminate\Contracts\Encryption\Encrypter; use Illuminate\Database\Eloquent\ModelNotFoundException; use Pterodactyl\Http\Requests\Auth\LoginCheckpointRequest; use Illuminate\Contracts\Cache\Repository as CacheRepository; use Pterodactyl\Contracts\Repository\UserRepositoryInterface; use Pterodactyl\Repositories\Eloquent\RecoveryTokenRepository; class LoginCheckpointController extends AbstractLoginController { /** * @var \Illuminate\Contracts\Cache\Repository */ private $cache; /** * @var \Pterodactyl\Contracts\Repository\UserRepositoryInterface */ private $repository; /** * @var \PragmaRX\Google2FA\Google2FA */ private $google2FA; /** * @var \Illuminate\Contracts\Encryption\Encrypter */ private $encrypter; /** * @var \Pterodactyl\Repositories\Eloquent\RecoveryTokenRepository */ private $recoveryTokenRepository; /** * LoginCheckpointController constructor. * * @param \Illuminate\Auth\AuthManager $auth * @param \Illuminate\Contracts\Encryption\Encrypter $encrypter * @param \PragmaRX\Google2FA\Google2FA $google2FA * @param \Illuminate\Contracts\Config\Repository $config * @param \Illuminate\Contracts\Cache\Repository $cache * @param \Pterodactyl\Repositories\Eloquent\RecoveryTokenRepository $recoveryTokenRepository * @param \Pterodactyl\Contracts\Repository\UserRepositoryInterface $repository */ public function __construct( AuthManager $auth, Encrypter $encrypter, Google2FA $google2FA, Repository $config, CacheRepository $cache, RecoveryTokenRepository $recoveryTokenRepository, UserRepositoryInterface $repository ) { parent::__construct($auth, $config); $this->google2FA = $google2FA; $this->cache = $cache; $this->repository = $repository; $this->encrypter = $encrypter; $this->recoveryTokenRepository = $recoveryTokenRepository; } /** * Handle a login where the user is required to provide a TOTP authentication * token. Once a user has reached this stage it is assumed that they have already * provided a valid username and password. * * @param \Pterodactyl\Http\Requests\Auth\LoginCheckpointRequest $request * @return \Illuminate\Http\JsonResponse|void * * @throws \PragmaRX\Google2FA\Exceptions\IncompatibleWithGoogleAuthenticatorException * @throws \PragmaRX\Google2FA\Exceptions\InvalidCharactersException * @throws \PragmaRX\Google2FA\Exceptions\SecretKeyTooShortException * @throws \Exception * @throws \Illuminate\Validation\ValidationException */ public function __invoke(LoginCheckpointRequest $request): JsonResponse { if ($this->hasTooManyLoginAttempts($request)) { $this->sendLockoutResponse($request); } $token = $request->input('confirmation_token'); try { /** @var \Pterodactyl\Models\User $user */ $user = User::query()->findOrFail($this->cache->get($token, 0)); } catch (ModelNotFoundException $exception) { $this->incrementLoginAttempts($request); return $this->sendFailedLoginResponse( $request, null, 'The authentication token provided has expired, please refresh the page and try again.' ); } // Recovery tokens go through a slightly different pathway for usage. if (! is_null($recoveryToken = $request->input('recovery_token'))) { if ($this->isValidRecoveryToken($user, $recoveryToken)) { return $this->sendLoginResponse($user, $request); } } else { $decrypted = $this->encrypter->decrypt($user->totp_secret); if ($this->google2FA->verifyKey($decrypted, (string) $request->input('authentication_code') ?? '', config('pterodactyl.auth.2fa.window'))) { $this->cache->delete($token); return $this->sendLoginResponse($user, $request); } } $this->incrementLoginAttempts($request); return $this->sendFailedLoginResponse($request, $user, ! empty($recoveryToken) ? 'The recovery token provided is not valid.' : null); } /** * Determines if a given recovery token is valid for the user account. If we find a matching token * it will be deleted from the database. * * @param \Pterodactyl\Models\User $user * @param string $value * @return bool * * @throws \Exception */ protected function isValidRecoveryToken(User $user, string $value) { foreach ($user->recoveryTokens as $token) { if (password_verify($value, $token->token)) { $token->delete(); return true; } } return false; } }