3 * @copyright Copyright (C) 2010-2021, the Friendica project
5 * @license GNU AGPL version 3 or any later version
7 * This program is free software: you can redistribute it and/or modify
8 * it under the terms of the GNU Affero General Public License as
9 * published by the Free Software Foundation, either version 3 of the
10 * License, or (at your option) any later version.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU Affero General Public License for more details.
17 * You should have received a copy of the GNU Affero General Public License
18 * along with this program. If not, see <https://www.gnu.org/licenses/>.
22 namespace Friendica\Module\Security\TwoFactor;
24 use Friendica\BaseModule;
25 use Friendica\Core\Renderer;
26 use Friendica\Core\Session;
28 use PragmaRX\Google2FA\Google2FA;
29 use Friendica\Security\TwoFactor;
32 * Page 1: Authenticator code verification
34 * @package Friendica\Module\TwoFactor
36 class Verify extends BaseModule
38 private static $errors = [];
40 public static function post(array $parameters = [])
46 if (($_POST['action'] ?? '') == 'verify') {
47 self::checkFormSecurityTokenRedirectOnError('2fa', 'twofactor_verify');
51 $code = $_POST['verify_code'] ?? '';
53 $valid = (new Google2FA())->verifyKey(DI::pConfig()->get(local_user(), '2fa', 'secret'), $code);
55 // The same code can't be used twice even if it's valid
56 if ($valid && Session::get('2fa') !== $code) {
57 Session::set('2fa', $code);
59 // Trust this browser feature
60 if (!empty($_REQUEST['trust_browser'])) {
61 $trustedBrowserFactory = new TwoFactor\Factory\TrustedBrowser(DI::logger());
62 $trustedBrowserRepository = new TwoFactor\Repository\TrustedBrowser(DI::dba(), DI::logger(), $trustedBrowserFactory);
64 $trustedBrowser = $trustedBrowserFactory->createForUserWithUserAgent(local_user(), $_SERVER['HTTP_USER_AGENT']);
66 $trustedBrowserRepository->save($trustedBrowser);
68 // The string is sent to the browser to be sent back with each request
69 DI::cookie()->set('trusted', $trustedBrowser->cookie_hash);
72 // Resume normal login workflow
73 DI::auth()->setForUser($a, $a->user, true, true);
75 self::$errors[] = DI::l10n()->t('Invalid code, please retry.');
80 public static function content(array $parameters = [])
83 DI::baseUrl()->redirect();
86 // Already authenticated with 2FA token
87 if (Session::get('2fa')) {
88 DI::baseUrl()->redirect();
91 return Renderer::replaceMacros(Renderer::getMarkupTemplate('twofactor/verify.tpl'), [
92 '$form_security_token' => self::getFormSecurityToken('twofactor_verify'),
94 '$title' => DI::l10n()->t('Two-factor authentication'),
95 '$message' => DI::l10n()->t('<p>Open the two-factor authentication app on your device to get an authentication code and verify your identity.</p>'),
96 '$errors_label' => DI::l10n()->tt('Error', 'Errors', count(self::$errors)),
97 '$errors' => self::$errors,
98 '$recovery_message' => DI::l10n()->t('Don’t have your phone? <a href="%s">Enter a two-factor recovery code</a>', '2fa/recovery'),
99 '$verify_code' => ['verify_code', DI::l10n()->t('Please enter a code from your authentication app'), '', '', DI::l10n()->t('Required'), 'autofocus autocomplete="off" placeholder="000000"', 'tel'],
100 '$trust_browser' => ['trust_browser', DI::l10n()->t('This is my two-factor authenticator app device'), !empty($_REQUEST['trust_browser'])],
101 '$verify_label' => DI::l10n()->t('Verify code and complete login'),