blessing-skin-server/app/Http/Controllers/AuthController.php

243 lines
7.4 KiB
PHP
Raw Normal View History

2016-07-21 22:01:57 +08:00
<?php
2016-08-28 10:05:21 +08:00
namespace App\Http\Controllers;
2016-07-21 22:01:57 +08:00
use URL;
2016-07-21 22:01:57 +08:00
use Mail;
use View;
2018-08-16 17:57:24 +08:00
use Cache;
2016-08-28 10:05:21 +08:00
use Session;
2016-11-17 17:32:12 +08:00
use App\Events;
use App\Models\User;
use App\Models\Player;
2018-07-15 17:42:03 +08:00
use App\Mail\ForgotPassword;
use Illuminate\Http\Request;
use Illuminate\Support\Facades\Auth;
use App\Exceptions\PrettyPageException;
2016-10-23 11:41:52 +08:00
use App\Services\Repositories\UserRepository;
2016-07-21 22:01:57 +08:00
2016-09-03 23:50:55 +08:00
class AuthController extends Controller
2016-07-21 22:01:57 +08:00
{
2016-10-23 11:41:52 +08:00
public function handleLogin(Request $request, UserRepository $users)
2016-07-21 22:01:57 +08:00
{
2016-09-03 23:50:55 +08:00
$this->validate($request, [
2016-10-02 20:30:27 +08:00
'identification' => 'required',
'password' => 'required|min:6|max:32',
2016-09-03 23:50:55 +08:00
]);
2016-10-02 20:30:27 +08:00
$identification = $request->input('identification');
2018-02-16 17:31:04 +08:00
// Guess type of identification
$authType = (validate($identification, 'email')) ? 'email' : 'username';
2016-09-03 23:50:55 +08:00
2018-02-16 17:31:04 +08:00
event(new Events\UserTryToLogin($identification, $authType));
2016-10-17 17:51:51 +08:00
2016-10-23 11:41:52 +08:00
// Get user instance from repository.
// If the given identification is not registered yet,
// it will return a null value.
2018-02-16 17:31:04 +08:00
$user = $users->get($identification, $authType);
2016-07-21 22:01:57 +08:00
2018-08-16 17:57:24 +08:00
// Require CAPTCHA if user fails to login more than 3 times
2018-08-17 22:54:26 +08:00
$loginFailsCacheKey = sha1('login_fails_'.get_client_ip());
2018-08-16 17:57:24 +08:00
$loginFails = (int) Cache::get($loginFailsCacheKey, 0);
if ($loginFails > 3) {
2018-07-21 08:17:16 +08:00
$this->validate($request, ['captcha' => 'required|captcha']);
2016-07-21 22:01:57 +08:00
}
2018-02-16 17:31:04 +08:00
if (! $user) {
2016-09-15 09:20:02 +08:00
return json(trans('auth.validation.user'), 2);
2016-07-21 22:01:57 +08:00
} else {
if ($user->verifyPassword($request->input('password'))) {
2016-09-03 23:50:55 +08:00
Session::forget('login_fails');
2016-07-21 22:01:57 +08:00
Auth::login($user, $request->input('keep') == 'true');
2016-07-21 22:01:57 +08:00
2016-11-17 17:32:12 +08:00
event(new Events\UserLoggedIn($user));
2016-10-17 17:51:51 +08:00
2018-08-16 17:57:24 +08:00
Cache::forget($loginFailsCacheKey);
return json(trans('auth.login.success'), 0);
2016-07-21 22:01:57 +08:00
} else {
2018-08-16 17:57:24 +08:00
// Increase the counter
2019-02-27 23:44:50 +08:00
Cache::put($loginFailsCacheKey, ++$loginFails, 3600);
2016-08-16 13:27:06 +08:00
2016-10-02 20:30:27 +08:00
return json(trans('auth.validation.password'), 1, [
'login_fails' => $loginFails,
2016-07-21 22:01:57 +08:00
]);
}
}
}
public function logout()
2016-07-21 22:01:57 +08:00
{
if (Auth::check()) {
Auth::logout();
return json(trans('auth.logout.success'), 0);
2016-07-21 22:01:57 +08:00
} else {
2016-10-06 17:57:07 +08:00
return json(trans('auth.logout.fail'), 1);
2016-07-21 22:01:57 +08:00
}
}
public function register()
{
2016-10-23 11:41:52 +08:00
if (option('user_can_register')) {
2016-08-28 10:05:21 +08:00
return view('auth.register');
} else {
2016-09-15 09:20:02 +08:00
throw new PrettyPageException(trans('auth.register.close'), 7);
}
2016-07-21 22:01:57 +08:00
}
public function handleRegister(Request $request)
2016-07-21 22:01:57 +08:00
{
if (! option('user_can_register')) {
return json(trans('auth.register.close'), 7);
}
$rule = option('register_with_player_name') ?
['player_name' => 'required|player_name|min:'.option('player_name_length_min').'|max:'.option('player_name_length_max')] :
['nickname' => 'required|no_special_chars|max:255'];
$data = $this->validate($request, array_merge([
'email' => 'required|email|unique:users',
'password' => 'required|min:8|max:32',
'captcha' => 'required'.(app()->environment('testing') ? '' : '|captcha'),
], $rule));
2016-09-03 23:50:55 +08:00
if (option('register_with_player_name')) {
event(new Events\CheckPlayerExists($request->get('player_name')));
if (Player::where('player_name', $request->get('player_name'))->first()) {
return json(trans('user.player.add.repeated'), 2);
}
2016-10-23 11:41:52 +08:00
}
// If amount of registered accounts of IP is more than allowed amounts,
2018-08-17 22:54:26 +08:00
// then reject the register.
if (User::where('ip', get_client_ip())->count() >= option('regs_per_ip')) {
return json(trans('auth.register.max', ['regs' => option('regs_per_ip')]), 7);
}
2018-08-17 22:54:26 +08:00
$user = new User;
$user->email = $data['email'];
$user->nickname = $data[option('register_with_player_name') ? 'player_name' : 'nickname'];
$user->score = option('user_initial_score');
$user->avatar = 0;
$user->password = User::getEncryptedPwdFromEvent($data['password'], $user)
?: app('cipher')->hash($data['password'], config('secure.salt'));
$user->ip = get_client_ip();
$user->permission = User::NORMAL;
$user->register_at = get_datetime_string();
$user->last_sign_at = get_datetime_string(time() - 86400);
2018-08-17 22:54:26 +08:00
$user->save();
2016-10-23 11:41:52 +08:00
2018-08-17 22:54:26 +08:00
event(new Events\UserRegistered($user));
if (option('register_with_player_name')) {
$player = new Player;
$player->uid = $user->uid;
$player->player_name = $request->get('player_name');
$player->tid_skin = 0;
2018-08-17 22:54:26 +08:00
$player->save();
event(new Events\PlayerWasAdded($player));
2016-07-21 22:01:57 +08:00
}
2018-08-17 22:54:26 +08:00
Auth::login($user);
return json([
'errno' => 0,
'msg' => trans('auth.register.success'),
2018-08-17 22:54:26 +08:00
]);
2016-07-21 22:01:57 +08:00
}
public function forgot()
{
if (config('mail.driver') != '') {
2016-08-28 10:05:21 +08:00
return view('auth.forgot');
} else {
2018-08-17 12:32:44 +08:00
throw new PrettyPageException(trans('auth.forgot.disabled'), 8);
}
2016-07-21 22:01:57 +08:00
}
2016-10-23 11:41:52 +08:00
public function handleForgot(Request $request, UserRepository $users)
2016-07-21 22:01:57 +08:00
{
2018-08-12 16:00:21 +08:00
$this->validate($request, [
'captcha' => 'required'.(app()->environment('testing') ? '' : '|captcha'),
2018-08-12 16:00:21 +08:00
]);
2016-07-21 22:01:57 +08:00
2018-08-17 12:32:44 +08:00
if (! config('mail.driver')) {
return json(trans('auth.forgot.disabled'), 1);
}
$rateLimit = 180;
2018-08-17 22:54:26 +08:00
$lastMailCacheKey = sha1('last_mail_'.get_client_ip());
$remain = $rateLimit + Cache::get($lastMailCacheKey, 0) - time();
// Rate limit
if ($remain > 0) {
return json([
'errno' => 2,
'msg' => trans('auth.forgot.frequent-mail'),
'remain' => $remain,
]);
}
2016-07-21 22:01:57 +08:00
2018-02-16 17:31:04 +08:00
// Get user instance
2016-10-23 11:41:52 +08:00
$user = $users->get($request->input('email'), 'email');
2016-07-21 22:01:57 +08:00
if (! $user) {
2016-09-15 09:20:02 +08:00
return json(trans('auth.forgot.unregistered'), 1);
}
2016-07-21 22:01:57 +08:00
$url = URL::temporarySignedRoute('auth.reset', now()->addHour(), ['uid' => $user->uid]);
2016-07-21 22:01:57 +08:00
2016-09-04 16:15:11 +08:00
try {
Mail::to($request->input('email'))->send(new ForgotPassword($url));
} catch (\Exception $e) {
2018-07-22 11:36:00 +08:00
report($e);
2018-08-16 18:10:09 +08:00
return json(trans('auth.forgot.failed', ['msg' => $e->getMessage()]), 2);
2016-07-21 22:01:57 +08:00
}
2019-02-27 23:44:50 +08:00
Cache::put($lastMailCacheKey, time(), 3600);
2016-09-04 16:15:11 +08:00
2018-08-16 18:10:09 +08:00
return json(trans('auth.forgot.success'), 0);
2016-07-21 22:01:57 +08:00
}
public function reset($uid, UserRepository $users)
2016-07-21 22:01:57 +08:00
{
return view('auth.reset')->with('user', $users->get($uid));
2016-07-21 22:01:57 +08:00
}
public function handleReset($uid, Request $request, UserRepository $users)
2016-07-21 22:01:57 +08:00
{
$validated = $this->validate($request, [
'password' => 'required|min:8|max:32',
2016-09-03 23:50:55 +08:00
]);
2016-07-21 22:01:57 +08:00
2018-07-19 10:31:44 +08:00
$users->get($uid)->changePassword($validated['password']);
2016-11-07 22:34:34 +08:00
2016-09-15 09:20:02 +08:00
return json(trans('auth.reset.success'), 0);
2016-07-21 22:01:57 +08:00
}
2018-08-17 12:32:44 +08:00
public function verify(UserRepository $users, $uid)
2016-10-23 11:41:52 +08:00
{
2018-08-17 12:32:44 +08:00
if (! option('require_verification')) {
throw new PrettyPageException(trans('user.verification.disabled'), 1);
}
$user = $users->get($uid);
if (! $user || $user->verified) {
throw new PrettyPageException(trans('auth.verify.invalid'), 1);
}
$user->verified = true;
$user->save();
return view('auth.verify');
2016-10-23 11:41:52 +08:00
}
2016-07-21 22:01:57 +08:00
}