WebAuthnLoginController.php 2.7 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192
  1. <?php
  2. namespace App\Http\Controllers\Auth;
  3. use App\Models\User;
  4. use Illuminate\Http\Request;
  5. use App\Http\Controllers\Controller;
  6. use DarkGhostHunter\Larapass\Http\AuthenticatesWebAuthn;
  7. use Carbon\Carbon;
  8. class WebAuthnLoginController extends Controller
  9. {
  10. // use AuthenticatesWebAuthn;
  11. use AuthenticatesWebAuthn {
  12. options as traitOptions;
  13. login as traitLogin;
  14. }
  15. /*
  16. |--------------------------------------------------------------------------
  17. | WebAuthn Login Controller
  18. |--------------------------------------------------------------------------
  19. |
  20. | This controller allows the WebAuthn user device to request a login and
  21. | return the correctly signed challenge. Most of the hard work is done
  22. | by your Authentication Guard once the user is attempting to login.
  23. |
  24. */
  25. public function options(Request $request)
  26. {
  27. // Since 2FAuth is single user designed we fetch the user instance
  28. // and merge its email address to the request. This let Larapass validate
  29. // the request against a user instance without the need to ask the visitor
  30. // for an email address.
  31. //
  32. // This approach override the Larapass 'userless' config value that seems buggy.
  33. $user = User::first();
  34. if (!$user) {
  35. return response()->json([
  36. 'message' => 'no registered user'
  37. ], 400);
  38. }
  39. else $request->merge(['email' => $user->email]);
  40. return $this->traitOptions($request);
  41. }
  42. /**
  43. * Log the user in.
  44. *
  45. * @param \Illuminate\Http\Request $request
  46. *
  47. * @return \Illuminate\Http\Response|\Illuminate\Http\JsonResponse
  48. */
  49. public function login(Request $request)
  50. {
  51. $request->validate($this->assertionRules());
  52. if ($request->has('response')) {
  53. $response = $request->response;
  54. // Some authenticators do not send a userHandle so we hack the response to be compliant
  55. // with Larapass/webauthn-lib implementation that wait for a userHandle
  56. if(!$response['userHandle']) {
  57. $user = User::getFromCredentialId($request->id);
  58. $response['userHandle'] = base64_encode($user->userHandle());
  59. $request->merge(['response' => $response]);
  60. }
  61. }
  62. return $this->traitLogin($request);
  63. }
  64. /**
  65. * The user has been authenticated.
  66. *
  67. * @param \Illuminate\Http\Request $request
  68. * @param mixed $user
  69. *
  70. * @return void|\Illuminate\Http\JsonResponse
  71. */
  72. protected function authenticated(Request $request, $user)
  73. {
  74. $user->last_seen_at = Carbon::now()->format('Y-m-d H:i:s');
  75. $user->save();
  76. }
  77. }