mirror of
				https://github.com/pelican-dev/panel.git
				synced 2025-11-04 16:06:52 +01:00 
			
		
		
		
	* Remove old admin * Remove controller test * Remove unused exceptions * Remove unused files * More small tweaks * Fix doc block * Remove unused service * Restore these * Add back autoDeploy * Revert "Add back autoDeploy" This reverts commit 630c1e08acf8056ce8e612f376fcd00c23d90aea. * Add these back * Add back exception * Remove ApiController again --------- Co-authored-by: RMartinOscar <40749467+RMartinOscar@users.noreply.github.com> Co-authored-by: Boy132 <mail@boy132.de> Co-authored-by: notCharles <charles@pelican.dev>
		
			
				
	
	
		
			60 lines
		
	
	
		
			2.1 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
			
		
		
	
	
			60 lines
		
	
	
		
			2.1 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
<?php
 | 
						|
 | 
						|
namespace App\Http\Middleware;
 | 
						|
 | 
						|
use Illuminate\Support\Str;
 | 
						|
use Illuminate\Http\Request;
 | 
						|
use App\Exceptions\Http\TwoFactorAuthRequiredException;
 | 
						|
 | 
						|
class RequireTwoFactorAuthentication
 | 
						|
{
 | 
						|
    public const LEVEL_NONE = 0;
 | 
						|
 | 
						|
    public const LEVEL_ADMIN = 1;
 | 
						|
 | 
						|
    public const LEVEL_ALL = 2;
 | 
						|
 | 
						|
    /**
 | 
						|
     * The route to redirect a user to enable 2FA.
 | 
						|
     */
 | 
						|
    protected string $redirectRoute = '/account';
 | 
						|
 | 
						|
    /**
 | 
						|
     * Check the user state on the incoming request to determine if they should be allowed to
 | 
						|
     * proceed or not. This checks if the Panel is configured to require 2FA on an account in
 | 
						|
     * order to perform actions. If so, we check the level at which it is required (all users
 | 
						|
     * or just admins) and then check if the user has enabled it for their account.
 | 
						|
     *
 | 
						|
     * @throws \App\Exceptions\Http\TwoFactorAuthRequiredException
 | 
						|
     */
 | 
						|
    public function handle(Request $request, \Closure $next): mixed
 | 
						|
    {
 | 
						|
        $user = $request->user();
 | 
						|
        $uri = rtrim($request->getRequestUri(), '/') . '/';
 | 
						|
        $current = $request->route()->getName();
 | 
						|
 | 
						|
        if (!$user || Str::startsWith($uri, ['/auth/']) || Str::startsWith($current, ['auth.', 'account.'])) {
 | 
						|
            return $next($request);
 | 
						|
        }
 | 
						|
 | 
						|
        /** @var \App\Models\User $user */
 | 
						|
        $level = (int) config('panel.auth.2fa_required');
 | 
						|
        // If this setting is not configured, or the user is already using 2FA then we can just
 | 
						|
        // send them right through, nothing else needs to be checked.
 | 
						|
        //
 | 
						|
        // If the level is set as admin and the user is not an admin, pass them through as well.
 | 
						|
        if ($level === self::LEVEL_NONE || $user->use_totp) {
 | 
						|
            return $next($request);
 | 
						|
        } elseif ($level === self::LEVEL_ADMIN && !$user->isRootAdmin()) {
 | 
						|
            return $next($request);
 | 
						|
        }
 | 
						|
 | 
						|
        // For API calls return an exception which gets rendered nicely in the API response.
 | 
						|
        if ($request->isJson() || Str::startsWith($uri, '/api/')) {
 | 
						|
            throw new TwoFactorAuthRequiredException();
 | 
						|
        }
 | 
						|
 | 
						|
        return redirect()->to($this->redirectRoute);
 | 
						|
    }
 | 
						|
}
 |