3 * @copyright Copyright (C) 2010-2022, the Friendica project
5 * @license GNU AGPL version 3 or any later version
7 * This program is free software: you can redistribute it and/or modify
8 * it under the terms of the GNU Affero General Public License as
9 * published by the Free Software Foundation, either version 3 of the
10 * License, or (at your option) any later version.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU Affero General Public License for more details.
17 * You should have received a copy of the GNU Affero General Public License
18 * along with this program. If not, see <https://www.gnu.org/licenses/>.
22 namespace Friendica\Module\Security\TwoFactor;
24 use Friendica\BaseModule;
25 use Friendica\Core\Renderer;
26 use Friendica\Core\Session;
28 use Friendica\Model\User;
29 use PragmaRX\Google2FA\Google2FA;
30 use Friendica\Security\TwoFactor;
33 * Page 1: Authenticator code verification
35 * @package Friendica\Module\TwoFactor
37 class Verify extends BaseModule
39 private static $errors = [];
41 protected function post(array $request = [])
47 if (($_POST['action'] ?? '') == 'verify') {
48 self::checkFormSecurityTokenRedirectOnError('2fa', 'twofactor_verify');
52 $code = $_POST['verify_code'] ?? '';
54 $valid = (new Google2FA())->verifyKey(DI::pConfig()->get(local_user(), '2fa', 'secret'), $code);
56 // The same code can't be used twice even if it's valid
57 if ($valid && Session::get('2fa') !== $code) {
58 Session::set('2fa', $code);
60 // Trust this browser feature
61 if (!empty($_REQUEST['trust_browser'])) {
62 $trustedBrowserFactory = new TwoFactor\Factory\TrustedBrowser(DI::logger());
63 $trustedBrowserRepository = new TwoFactor\Repository\TrustedBrowser(DI::dba(), DI::logger(), $trustedBrowserFactory);
65 $trustedBrowser = $trustedBrowserFactory->createForUserWithUserAgent(local_user(), $_SERVER['HTTP_USER_AGENT']);
67 $trustedBrowserRepository->save($trustedBrowser);
69 // The string is sent to the browser to be sent back with each request
70 DI::cookie()->set('trusted', $trustedBrowser->cookie_hash);
73 // Resume normal login workflow
74 DI::auth()->setForUser($a, User::getById($a->getLoggedInUserId()), true, true);
76 self::$errors[] = DI::l10n()->t('Invalid code, please retry.');
81 protected function content(array $request = []): string
84 DI::baseUrl()->redirect();
87 // Already authenticated with 2FA token
88 if (Session::get('2fa')) {
89 DI::baseUrl()->redirect();
92 return Renderer::replaceMacros(Renderer::getMarkupTemplate('twofactor/verify.tpl'), [
93 '$form_security_token' => self::getFormSecurityToken('twofactor_verify'),
95 '$title' => DI::l10n()->t('Two-factor authentication'),
96 '$message' => DI::l10n()->t('<p>Open the two-factor authentication app on your device to get an authentication code and verify your identity.</p>'),
97 '$errors_label' => DI::l10n()->tt('Error', 'Errors', count(self::$errors)),
98 '$errors' => self::$errors,
99 '$recovery_message' => DI::l10n()->t('Don’t have your phone? <a href="%s">Enter a two-factor recovery code</a>', '2fa/recovery'),
100 '$verify_code' => ['verify_code', DI::l10n()->t('Please enter a code from your authentication app'), '', '', DI::l10n()->t('Required'), 'autofocus autocomplete="off" placeholder="000000"', 'tel'],
101 '$trust_browser' => ['trust_browser', DI::l10n()->t('This is my two-factor authenticator app device'), !empty($_REQUEST['trust_browser'])],
102 '$verify_label' => DI::l10n()->t('Verify code and complete login'),