2016-09-16 06:19:40 +02:00
|
|
|
<?php
|
2017-10-21 08:40:00 +02:00
|
|
|
/**
|
|
|
|
* LoginController.php
|
|
|
|
* Copyright (c) 2017 thegrumpydictator@gmail.com
|
|
|
|
*
|
|
|
|
* This file is part of Firefly III.
|
|
|
|
*
|
|
|
|
* Firefly III is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* Firefly III is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2017-12-17 14:41:58 +01:00
|
|
|
* along with Firefly III. If not, see <http://www.gnu.org/licenses/>.
|
2017-10-21 08:40:00 +02:00
|
|
|
*/
|
2017-09-14 17:40:02 +02:00
|
|
|
declare(strict_types=1);
|
|
|
|
|
2016-09-16 06:19:40 +02:00
|
|
|
namespace FireflyIII\Http\Controllers\Auth;
|
|
|
|
|
2019-02-16 19:04:36 +01:00
|
|
|
use Adldap;
|
2018-03-08 20:44:56 +01:00
|
|
|
use DB;
|
2016-09-16 06:19:40 +02:00
|
|
|
use FireflyIII\Http\Controllers\Controller;
|
|
|
|
use Illuminate\Foundation\Auth\AuthenticatesUsers;
|
2017-09-14 16:13:25 +02:00
|
|
|
use Illuminate\Http\Request;
|
2019-02-16 07:20:25 +01:00
|
|
|
use Log;
|
2017-09-14 16:13:25 +02:00
|
|
|
|
2017-12-17 14:06:14 +01:00
|
|
|
/**
|
|
|
|
* Class LoginController
|
2017-12-17 18:23:10 +01:00
|
|
|
*
|
|
|
|
* This controller handles authenticating users for the application and
|
|
|
|
* redirecting them to your home screen. The controller uses a trait
|
|
|
|
* to conveniently provide its functionality to your applications.
|
2018-07-22 08:10:16 +02:00
|
|
|
*
|
|
|
|
* @codeCoverageIgnore
|
2017-12-17 14:06:14 +01:00
|
|
|
*/
|
2016-09-16 06:19:40 +02:00
|
|
|
class LoginController extends Controller
|
|
|
|
{
|
|
|
|
use AuthenticatesUsers;
|
|
|
|
|
|
|
|
/**
|
2017-09-09 22:03:27 +02:00
|
|
|
* Where to redirect users after login.
|
2016-09-16 06:19:40 +02:00
|
|
|
*
|
2017-09-09 22:03:27 +02:00
|
|
|
* @var string
|
2016-09-16 06:19:40 +02:00
|
|
|
*/
|
2017-09-09 22:03:27 +02:00
|
|
|
protected $redirectTo = '/home';
|
2016-09-16 07:22:57 +02:00
|
|
|
|
|
|
|
/**
|
2017-09-09 22:03:27 +02:00
|
|
|
* Create a new controller instance.
|
2016-12-28 18:49:30 +01:00
|
|
|
*/
|
2017-09-09 22:03:27 +02:00
|
|
|
public function __construct()
|
2016-12-28 18:49:30 +01:00
|
|
|
{
|
2017-09-12 18:24:42 +02:00
|
|
|
parent::__construct();
|
2017-09-09 22:03:27 +02:00
|
|
|
$this->middleware('guest')->except('logout');
|
2016-12-28 18:49:30 +01:00
|
|
|
}
|
2017-09-14 16:13:25 +02:00
|
|
|
|
2017-11-22 20:20:57 +01:00
|
|
|
/**
|
2018-07-21 08:06:24 +02:00
|
|
|
* Log in a user.
|
|
|
|
*
|
2017-11-25 08:54:52 +01:00
|
|
|
* @param Request $request
|
2017-11-22 20:20:57 +01:00
|
|
|
*
|
2018-07-09 19:24:08 +02:00
|
|
|
* @return \Illuminate\Http\Response|\Symfony\Component\HttpFoundation\Response|void
|
2017-12-17 14:06:14 +01:00
|
|
|
* @throws \Illuminate\Validation\ValidationException
|
2017-11-22 20:20:57 +01:00
|
|
|
*/
|
|
|
|
public function login(Request $request)
|
|
|
|
{
|
2019-02-16 23:01:14 +01:00
|
|
|
Log::channel('audit')->info(sprintf('User is trying to login using "%s"', $request->get('email')));
|
2019-03-24 14:48:12 +01:00
|
|
|
Log::info(sprintf('User is trying to login.'));
|
2019-02-16 23:01:14 +01:00
|
|
|
if ('ldap' === config('auth.providers.users.driver')) {
|
|
|
|
/**
|
|
|
|
* Temporary bug fix for something that doesn't seem to work in
|
|
|
|
* AdLdap.
|
|
|
|
*/
|
|
|
|
$schema = config('ldap.connections.default.schema');
|
2019-02-16 19:04:36 +01:00
|
|
|
|
2019-02-16 23:01:14 +01:00
|
|
|
/** @var Adldap\Connections\Provider $provider */
|
|
|
|
Adldap::getProvider('default')->setSchema(new $schema);
|
|
|
|
}
|
2017-11-22 20:20:57 +01:00
|
|
|
$this->validateLogin($request);
|
|
|
|
|
2019-08-17 06:35:45 +02:00
|
|
|
/** Copied directly from AuthenticatesUsers, but with logging added: */
|
2017-11-22 20:20:57 +01:00
|
|
|
// If the class is using the ThrottlesLogins trait, we can automatically throttle
|
|
|
|
// the login attempts for this application. We'll key this by the username and
|
|
|
|
// the IP address of the client making these requests into this application.
|
2019-08-17 06:35:45 +02:00
|
|
|
if (method_exists($this, 'hasTooManyLoginAttempts') && $this->hasTooManyLoginAttempts($request)) {
|
2019-02-16 19:04:36 +01:00
|
|
|
Log::channel('audit')->info(sprintf('Login for user "%s" was locked out.', $request->get('email')));
|
2017-11-22 20:20:57 +01:00
|
|
|
$this->fireLockoutEvent($request);
|
|
|
|
|
|
|
|
return $this->sendLockoutResponse($request);
|
|
|
|
}
|
|
|
|
|
2019-08-17 06:35:45 +02:00
|
|
|
/** Copied directly from AuthenticatesUsers, but with logging added: */
|
2017-11-22 20:20:57 +01:00
|
|
|
if ($this->attemptLogin($request)) {
|
2019-02-16 19:04:36 +01:00
|
|
|
Log::channel('audit')->info(sprintf('User "%s" has been logged in.', $request->get('email')));
|
2019-03-24 14:48:12 +01:00
|
|
|
Log::debug(sprintf('Redirect after login is %s.', $this->redirectPath()));
|
|
|
|
|
2019-08-17 06:35:45 +02:00
|
|
|
return $this->sendLoginResponse($request);
|
2017-11-22 20:20:57 +01:00
|
|
|
}
|
|
|
|
|
2019-08-17 06:35:45 +02:00
|
|
|
/** Copied directly from AuthenticatesUsers, but with logging added: */
|
2017-11-22 20:20:57 +01:00
|
|
|
// If the login attempt was unsuccessful we will increment the number of attempts
|
|
|
|
// to login and redirect the user back to the login form. Of course, when this
|
|
|
|
// user surpasses their maximum number of attempts they will get locked out.
|
|
|
|
$this->incrementLoginAttempts($request);
|
2019-02-16 19:04:36 +01:00
|
|
|
Log::channel('audit')->info(sprintf('Login attempt for user "%s" failed.', $request->get('email')));
|
2019-08-17 06:35:45 +02:00
|
|
|
|
2017-11-22 20:20:57 +01:00
|
|
|
return $this->sendFailedLoginResponse($request);
|
|
|
|
}
|
|
|
|
|
2017-09-14 16:13:25 +02:00
|
|
|
/**
|
|
|
|
* Show the application's login form.
|
|
|
|
*
|
2017-12-16 19:48:31 +01:00
|
|
|
* @param Request $request
|
2017-11-18 05:46:19 +01:00
|
|
|
*
|
2017-11-25 08:54:52 +01:00
|
|
|
* @return \Illuminate\Contracts\View\Factory|\Illuminate\View\View
|
2017-09-14 16:13:25 +02:00
|
|
|
*/
|
2017-11-25 08:54:52 +01:00
|
|
|
public function showLoginForm(Request $request)
|
2017-09-14 16:13:25 +02:00
|
|
|
{
|
2018-10-13 15:06:56 +02:00
|
|
|
$count = DB::table('users')->count();
|
2018-12-15 07:59:02 +01:00
|
|
|
$loginProvider = config('firefly.login_provider');
|
2019-08-17 06:24:49 +02:00
|
|
|
$title = (string)trans('firefly.login_page_title');
|
2018-10-13 15:06:56 +02:00
|
|
|
if (0 === $count && 'eloquent' === $loginProvider) {
|
2018-03-08 20:44:56 +01:00
|
|
|
return redirect(route('register')); // @codeCoverageIgnore
|
2017-11-06 20:17:39 +01:00
|
|
|
}
|
|
|
|
|
2017-09-14 16:13:25 +02:00
|
|
|
// is allowed to?
|
2019-02-13 17:38:41 +01:00
|
|
|
$singleUserMode = app('fireflyconfig')->get('single_user_mode', config('firefly.configuration.single_user_mode'))->data;
|
2017-09-14 16:13:25 +02:00
|
|
|
$allowRegistration = true;
|
2018-10-13 15:06:56 +02:00
|
|
|
$allowReset = true;
|
2019-08-17 06:24:49 +02:00
|
|
|
if (true === $singleUserMode && $count > 0) {
|
2017-09-14 16:13:25 +02:00
|
|
|
$allowRegistration = false;
|
|
|
|
}
|
|
|
|
|
2018-10-13 15:06:56 +02:00
|
|
|
// single user mode is ignored when the user is not using eloquent:
|
|
|
|
if ('eloquent' !== $loginProvider) {
|
|
|
|
$allowRegistration = false;
|
|
|
|
$allowReset = false;
|
|
|
|
}
|
|
|
|
|
2017-09-14 16:13:25 +02:00
|
|
|
$email = $request->old('email');
|
|
|
|
$remember = $request->old('remember');
|
|
|
|
|
2019-08-17 06:24:49 +02:00
|
|
|
return view('auth.login', compact('allowRegistration', 'email', 'remember', 'allowReset', 'title'));
|
2017-09-14 16:13:25 +02:00
|
|
|
}
|
2016-09-16 06:19:40 +02:00
|
|
|
}
|