]> git.mxchange.org Git - friendica.git/blob - src/Module/Settings/TwoFactor/Index.php
Merge pull request #12041 from nupplaphil/feat/usersession_Module
[friendica.git] / src / Module / Settings / TwoFactor / Index.php
1 <?php
2 /**
3  * @copyright Copyright (C) 2010-2022, the Friendica project
4  *
5  * @license GNU AGPL version 3 or any later version
6  *
7  * This program is free software: you can redistribute it and/or modify
8  * it under the terms of the GNU Affero General Public License as
9  * published by the Free Software Foundation, either version 3 of the
10  * License, or (at your option) any later version.
11  *
12  * This program is distributed in the hope that it will be useful,
13  * but WITHOUT ANY WARRANTY; without even the implied warranty of
14  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15  * GNU Affero General Public License for more details.
16  *
17  * You should have received a copy of the GNU Affero General Public License
18  * along with this program.  If not, see <https://www.gnu.org/licenses/>.
19  *
20  */
21
22 namespace Friendica\Module\Settings\TwoFactor;
23
24 use Friendica\Core\Renderer;
25 use Friendica\DI;
26 use Friendica\Network\HTTPException\FoundException;
27 use Friendica\Security\TwoFactor\Model\AppSpecificPassword;
28 use Friendica\Security\TwoFactor\Model\RecoveryCode;
29 use Friendica\Model\User;
30 use Friendica\Module\BaseSettings;
31 use Friendica\Module\Security\Login;
32 use PragmaRX\Google2FA\Google2FA;
33
34 class Index extends BaseSettings
35 {
36         protected function post(array $request = [])
37         {
38                 if (!DI::userSession()->getLocalUserId()) {
39                         return;
40                 }
41
42                 self::checkFormSecurityTokenRedirectOnError('settings/2fa', 'settings_2fa');
43
44                 try {
45                         User::getIdFromPasswordAuthentication(DI::userSession()->getLocalUserId(), $_POST['password'] ?? '');
46
47                         $has_secret = (bool)DI::pConfig()->get(DI::userSession()->getLocalUserId(), '2fa', 'secret');
48                         $verified   = DI::pConfig()->get(DI::userSession()->getLocalUserId(), '2fa', 'verified');
49
50                         switch ($_POST['action'] ?? '') {
51                                 case 'enable':
52                                         if (!$has_secret && !$verified) {
53                                                 $Google2FA = new Google2FA();
54
55                                                 DI::pConfig()->set(DI::userSession()->getLocalUserId(), '2fa', 'secret', $Google2FA->generateSecretKey(32));
56
57                                                 DI::baseUrl()
58                                                   ->redirect('settings/2fa/recovery?t=' . self::getFormSecurityToken('settings_2fa_password'));
59                                         }
60                                         break;
61                                 case 'disable':
62                                         if ($has_secret) {
63                                                 RecoveryCode::deleteForUser(DI::userSession()->getLocalUserId());
64                                                 DI::pConfig()->delete(DI::userSession()->getLocalUserId(), '2fa', 'secret');
65                                                 DI::pConfig()->delete(DI::userSession()->getLocalUserId(), '2fa', 'verified');
66                                                 DI::session()->remove('2fa');
67
68                                                 DI::sysmsg()->addInfo(DI::l10n()->t('Two-factor authentication successfully disabled.'));
69                                                 DI::baseUrl()->redirect('settings/2fa');
70                                         }
71                                         break;
72                                 case 'recovery':
73                                         if ($has_secret) {
74                                                 DI::baseUrl()
75                                                   ->redirect('settings/2fa/recovery?t=' . self::getFormSecurityToken('settings_2fa_password'));
76                                         }
77                                         break;
78                                 case 'app_specific':
79                                         if ($has_secret) {
80                                                 DI::baseUrl()
81                                                   ->redirect('settings/2fa/app_specific?t=' . self::getFormSecurityToken('settings_2fa_password'));
82                                         }
83                                         break;
84                                 case 'trusted':
85                                         if ($has_secret) {
86                                                 DI::baseUrl()
87                                                   ->redirect('settings/2fa/trusted?t=' . self::getFormSecurityToken('settings_2fa_password'));
88                                         }
89                                         break;
90                                 case 'configure':
91                                         if (!$verified) {
92                                                 DI::baseUrl()
93                                                   ->redirect('settings/2fa/verify?t=' . self::getFormSecurityToken('settings_2fa_password'));
94                                         }
95                                         break;
96                         }
97                 } catch (FoundException $exception) {
98                         // Nothing to do here
99                 } catch (\Exception $e) {
100                         DI::sysmsg()->addNotice(DI::l10n()->t($e->getMessage()));
101                 }
102         }
103
104         protected function content(array $request = []): string
105         {
106                 if (!DI::userSession()->getLocalUserId()) {
107                         return Login::form('settings/2fa');
108                 }
109
110                 parent::content();
111
112                 $has_secret = (bool) DI::pConfig()->get(DI::userSession()->getLocalUserId(), '2fa', 'secret');
113                 $verified = DI::pConfig()->get(DI::userSession()->getLocalUserId(), '2fa', 'verified');
114
115                 return Renderer::replaceMacros(Renderer::getMarkupTemplate('settings/twofactor/index.tpl'), [
116                         '$form_security_token' => self::getFormSecurityToken('settings_2fa'),
117                         '$title'               => DI::l10n()->t('Two-factor authentication'),
118                         '$help_label'          => DI::l10n()->t('Help'),
119                         '$status_title'        => DI::l10n()->t('Status'),
120                         '$message'             => DI::l10n()->t('<p>Use an application on a mobile device to get two-factor authentication codes when prompted on login.</p>'),
121                         '$has_secret'          => $has_secret,
122                         '$verified'            => $verified,
123
124                         '$auth_app_label'         => DI::l10n()->t('Authenticator app'),
125                         '$app_status'             => $has_secret ? $verified ? DI::l10n()->t('Configured') : DI::l10n()->t('Not Configured') : DI::l10n()->t('Disabled'),
126                         '$not_configured_message' => DI::l10n()->t('<p>You haven\'t finished configuring your authenticator app.</p>'),
127                         '$configured_message'     => DI::l10n()->t('<p>Your authenticator app is correctly configured.</p>'),
128
129                         '$recovery_codes_title'     => DI::l10n()->t('Recovery codes'),
130                         '$recovery_codes_remaining' => DI::l10n()->t('Remaining valid codes'),
131                         '$recovery_codes_count'     => RecoveryCode::countValidForUser(DI::userSession()->getLocalUserId()),
132                         '$recovery_codes_message'   => DI::l10n()->t('<p>These one-use codes can replace an authenticator app code in case you have lost access to it.</p>'),
133
134                         '$app_specific_passwords_title'     => DI::l10n()->t('App-specific passwords'),
135                         '$app_specific_passwords_remaining' => DI::l10n()->t('Generated app-specific passwords'),
136                         '$app_specific_passwords_count'     => AppSpecificPassword::countForUser(DI::userSession()->getLocalUserId()),
137                         '$app_specific_passwords_message'   => DI::l10n()->t('<p>These randomly generated passwords allow you to authenticate on apps not supporting two-factor authentication.</p>'),
138
139                         '$action_title'         => DI::l10n()->t('Actions'),
140                         '$password'             => ['password', DI::l10n()->t('Current password:'), '', DI::l10n()->t('You need to provide your current password to change two-factor authentication settings.'), DI::l10n()->t('Required'), 'autofocus'],
141                         '$enable_label'         => DI::l10n()->t('Enable two-factor authentication'),
142                         '$disable_label'        => DI::l10n()->t('Disable two-factor authentication'),
143                         '$recovery_codes_label' => DI::l10n()->t('Show recovery codes'),
144                         '$app_specific_passwords_label' => DI::l10n()->t('Manage app-specific passwords'),
145                         '$trusted_browsers_label' => DI::l10n()->t('Manage trusted browsers'),
146                         '$configure_label'      => DI::l10n()->t('Finish app configuration'),
147                 ]);
148         }
149 }