2017-09-26 01:58:16 +00:00
|
|
|
<?php
|
|
|
|
|
|
|
|
namespace Pterodactyl\Http\Middleware;
|
|
|
|
|
|
|
|
use Closure;
|
2018-07-05 02:38:23 +00:00
|
|
|
use Illuminate\Support\Str;
|
2017-10-29 17:37:25 +00:00
|
|
|
use Illuminate\Http\Request;
|
2017-09-26 01:58:16 +00:00
|
|
|
use Prologue\Alerts\AlertsMessageBag;
|
2020-12-06 21:56:14 +00:00
|
|
|
use Pterodactyl\Exceptions\Http\TwoFactorAuthRequiredException;
|
2017-09-26 01:58:16 +00:00
|
|
|
|
|
|
|
class RequireTwoFactorAuthentication
|
|
|
|
{
|
|
|
|
const LEVEL_NONE = 0;
|
|
|
|
const LEVEL_ADMIN = 1;
|
|
|
|
const LEVEL_ALL = 2;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @var \Prologue\Alerts\AlertsMessageBag
|
|
|
|
*/
|
2017-10-29 17:37:25 +00:00
|
|
|
private $alert;
|
2017-09-26 01:58:16 +00:00
|
|
|
|
2017-10-29 17:37:25 +00:00
|
|
|
/**
|
|
|
|
* The route to redirect a user to to enable 2FA.
|
|
|
|
*
|
|
|
|
* @var string
|
|
|
|
*/
|
2020-12-06 21:56:14 +00:00
|
|
|
protected $redirectRoute = '/account';
|
2017-10-29 17:37:25 +00:00
|
|
|
|
2017-09-26 01:58:16 +00:00
|
|
|
/**
|
|
|
|
* RequireTwoFactorAuthentication constructor.
|
|
|
|
*
|
|
|
|
* @param \Prologue\Alerts\AlertsMessageBag $alert
|
|
|
|
*/
|
2017-12-15 03:05:26 +00:00
|
|
|
public function __construct(AlertsMessageBag $alert)
|
2017-09-26 01:58:16 +00:00
|
|
|
{
|
|
|
|
$this->alert = $alert;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-12-06 21:56:14 +00:00
|
|
|
* Check the user state on the incoming request to determine if they should be allowed to
|
|
|
|
* proceed or not. This checks if the Panel is configured to require 2FA on an account in
|
|
|
|
* order to perform actions. If so, we check the level at which it is required (all users
|
|
|
|
* or just admins) and then check if the user has enabled it for their account.
|
2017-09-26 01:58:16 +00:00
|
|
|
*
|
2017-09-26 02:43:01 +00:00
|
|
|
* @param \Illuminate\Http\Request $request
|
2019-09-06 04:32:57 +00:00
|
|
|
* @param \Closure $next
|
2017-09-26 01:58:16 +00:00
|
|
|
* @return mixed
|
2020-12-06 21:56:14 +00:00
|
|
|
*
|
|
|
|
* @throws \Pterodactyl\Exceptions\Http\TwoFactorAuthRequiredException
|
2017-09-26 01:58:16 +00:00
|
|
|
*/
|
2017-10-29 17:37:25 +00:00
|
|
|
public function handle(Request $request, Closure $next)
|
2017-09-26 01:58:16 +00:00
|
|
|
{
|
2020-12-06 21:56:14 +00:00
|
|
|
/** @var \Pterodactyl\Models\User $user */
|
|
|
|
$user = $request->user();
|
|
|
|
$uri = rtrim($request->getRequestUri(), '/') . '/';
|
|
|
|
$current = $request->route()->getName();
|
|
|
|
|
|
|
|
if (! $user || Str::startsWith($uri, ['/auth/']) || Str::startsWith($current, ['auth.', 'account.'])) {
|
2017-09-26 01:58:16 +00:00
|
|
|
return $next($request);
|
|
|
|
}
|
|
|
|
|
2021-01-23 20:09:16 +00:00
|
|
|
$level = (int) config('pterodactyl.auth.2fa_required');
|
2020-12-06 21:56:14 +00:00
|
|
|
// If this setting is not configured, or the user is already using 2FA then we can just
|
|
|
|
// send them right through, nothing else needs to be checked.
|
|
|
|
//
|
|
|
|
// If the level is set as admin and the user is not an admin, pass them through as well.
|
|
|
|
if ($level === self::LEVEL_NONE || $user->use_totp) {
|
|
|
|
return $next($request);
|
2021-01-23 20:09:16 +00:00
|
|
|
} elseif ($level === self::LEVEL_ADMIN && ! $user->root_admin) {
|
2017-09-26 01:58:16 +00:00
|
|
|
return $next($request);
|
|
|
|
}
|
|
|
|
|
2020-12-06 21:56:14 +00:00
|
|
|
// For API calls return an exception which gets rendered nicely in the API response.
|
|
|
|
if ($request->isJson() || Str::startsWith($uri, '/api/')) {
|
|
|
|
throw new TwoFactorAuthRequiredException;
|
2017-09-26 01:58:16 +00:00
|
|
|
}
|
|
|
|
|
2017-10-29 17:37:25 +00:00
|
|
|
$this->alert->danger(trans('auth.2fa_must_be_enabled'))->flash();
|
2017-09-26 01:58:16 +00:00
|
|
|
|
2020-12-06 21:56:14 +00:00
|
|
|
return redirect()->to($this->redirectRoute);
|
2017-09-26 01:58:16 +00:00
|
|
|
}
|
|
|
|
}
|