WebAuthnLoginController.php 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100
  1. <?php
  2. namespace App\Http\Controllers\Auth;
  3. use App\Http\Controllers\Controller;
  4. use App\Models\User;
  5. use Carbon\Carbon;
  6. use Illuminate\Contracts\Support\Responsable;
  7. use Illuminate\Http\JsonResponse;
  8. use Illuminate\Support\Arr;
  9. use Illuminate\Support\Facades\Log;
  10. use Laragear\WebAuthn\Http\Requests\AssertedRequest;
  11. use Laragear\WebAuthn\Http\Requests\AssertionRequest;
  12. use Laragear\WebAuthn\WebAuthn;
  13. class WebAuthnLoginController extends Controller
  14. {
  15. /*
  16. |--------------------------------------------------------------------------
  17. | WebAuthn Login Controller
  18. |--------------------------------------------------------------------------
  19. |
  20. | This controller allows the WebAuthn user device to request a login and
  21. | return the correctly signed challenge. Most of the hard work is done
  22. | by your Authentication Guard once the user is attempting to login.
  23. |
  24. */
  25. /**
  26. * Returns the challenge to assertion.
  27. *
  28. * @param \Laragear\WebAuthn\Http\Requests\AssertionRequest $request
  29. * @return \Illuminate\Contracts\Support\Responsable|\Illuminate\Http\JsonResponse
  30. */
  31. public function options(AssertionRequest $request) : Responsable|JsonResponse
  32. {
  33. switch (config('webauthn.user_verification')) {
  34. case WebAuthn::USER_VERIFICATION_DISCOURAGED:
  35. $request = $request->fastLogin(); // Makes the authenticator to only check for user presence on registration
  36. break;
  37. case WebAuthn::USER_VERIFICATION_REQUIRED:
  38. $request = $request->secureLogin(); // Makes the authenticator to always verify the user thoroughly on registration
  39. break;
  40. }
  41. return $request->toVerify($request->validate([
  42. 'email' => [
  43. 'required',
  44. 'email',
  45. new \App\Rules\CaseInsensitiveEmailExists
  46. ]
  47. ]));
  48. }
  49. /**
  50. * Log the user in.
  51. *
  52. * @param \Laragear\WebAuthn\Http\Requests\AssertedRequest $request
  53. * @return \Illuminate\Http\Response|\Illuminate\Http\JsonResponse
  54. */
  55. public function login(AssertedRequest $request)
  56. {
  57. Log::info('User login via webauthn requested');
  58. if ($request->has('response')) {
  59. $response = $request->response;
  60. // Some authenticators do not send a userHandle so we hack the response to be compliant
  61. // with Laragear\WebAuthn implementation that waits for a userHandle
  62. if (! Arr::exists($response, 'userHandle') || blank($response['userHandle'])) {
  63. $response['userHandle'] = User::getFromCredentialId($request->id)?->userHandle();
  64. $request->merge(['response' => $response]);
  65. }
  66. }
  67. $user = $request->login();
  68. if ($user) {
  69. $this->authenticated($user);
  70. return response()->noContent();
  71. }
  72. return response()->noContent(422);
  73. }
  74. /**
  75. * The user has been authenticated.
  76. *
  77. * @param mixed $user
  78. * @return void|\Illuminate\Http\JsonResponse
  79. */
  80. protected function authenticated($user)
  81. {
  82. $user->last_seen_at = Carbon::now()->format('Y-m-d H:i:s');
  83. $user->save();
  84. Log::info(sprintf('User id #%s authenticated using webauthn', $user->id));
  85. }
  86. }