mirror of
https://github.com/Bubka/2FAuth.git
synced 2024-11-25 17:54:57 +01:00
84 lines
3.9 KiB
PHP
84 lines
3.9 KiB
PHP
<?php
|
|
|
|
namespace App\Services\Migrators;
|
|
|
|
use App\Exceptions\InvalidMigrationDataException;
|
|
use App\Models\TwoFAccount;
|
|
use App\Protobuf\GAuthValueMapping;
|
|
use App\Protobuf\GoogleAuth\Payload;
|
|
use App\Protobuf\GoogleAuth\Payload\Algorithm;
|
|
use App\Protobuf\GoogleAuth\Payload\DigitCount;
|
|
use App\Protobuf\GoogleAuth\Payload\OtpType;
|
|
use Exception;
|
|
use Illuminate\Support\Collection;
|
|
use Illuminate\Support\Facades\Log;
|
|
use Illuminate\Support\Str;
|
|
use ParagonIE\ConstantTime\Base32;
|
|
|
|
class GoogleAuthMigrator extends Migrator
|
|
{
|
|
/**
|
|
* Convert Google Authenticator migration URI to a set of TwoFAccount objects.
|
|
*
|
|
* @param mixed $migrationPayload migration uri provided by Google Authenticator export feature
|
|
* @return \Illuminate\Support\Collection<int|string, \App\Models\TwoFAccount> The converted accounts
|
|
*/
|
|
public function migrate(mixed $migrationPayload) : Collection
|
|
{
|
|
try {
|
|
$migrationData = base64_decode(urldecode(Str::replace('otpauth-migration://offline?data=', '', strval($migrationPayload))));
|
|
$protobuf = new Payload();
|
|
$protobuf->mergeFromString($migrationData);
|
|
$otpParameters = $protobuf->getOtpParameters();
|
|
} catch (Exception $ex) {
|
|
Log::error('Protobuf failed to get OTP parameters from provided migration URI');
|
|
Log::error($ex->getMessage());
|
|
|
|
throw new InvalidMigrationDataException('Google Authenticator');
|
|
}
|
|
|
|
$twofaccounts = [];
|
|
|
|
foreach ($otpParameters->getIterator() as $key => $otp_parameters) {
|
|
try {
|
|
$parameters = [];
|
|
$parameters['otp_type'] = GAuthValueMapping::OTP_TYPE[OtpType::name($otp_parameters->getType())];
|
|
$parameters['service'] = $otp_parameters->getIssuer();
|
|
$parameters['account'] = str_replace($parameters['service'] . ':', '', $otp_parameters->getName());
|
|
$parameters['secret'] = $this->toBase32($otp_parameters->getSecret());
|
|
$parameters['algorithm'] = GAuthValueMapping::ALGORITHM[Algorithm::name($otp_parameters->getAlgorithm())];
|
|
$parameters['digits'] = GAuthValueMapping::DIGIT_COUNT[DigitCount::name($otp_parameters->getDigits())];
|
|
$parameters['counter'] = $parameters['otp_type'] === TwoFAccount::HOTP ? $otp_parameters->getCounter() : null;
|
|
$parameters['period'] = $parameters['otp_type'] === TwoFAccount::TOTP ? $otp_parameters->getPeriod() : null;
|
|
|
|
$twofaccounts[$key] = new TwoFAccount;
|
|
$twofaccounts[$key]->fillWithOtpParameters($parameters);
|
|
} catch (Exception $exception) {
|
|
Log::error(sprintf('Cannot instanciate a TwoFAccount object with OTP parameters from imported item #%s', $key));
|
|
Log::debug($exception->getMessage());
|
|
|
|
// The token failed to generate a valid account so we create a fake account to be returned.
|
|
$fakeAccount = new TwoFAccount();
|
|
$fakeAccount->id = TwoFAccount::FAKE_ID;
|
|
$fakeAccount->otp_type = $fakeAccount::TOTP;
|
|
// Only basic fields are filled to limit the risk of another exception.
|
|
$fakeAccount->account = $otp_parameters->getName() ?? __('twofaccounts.import.invalid_account');
|
|
$fakeAccount->service = $otp_parameters->getIssuer() ?? __('twofaccounts.import.invalid_service');
|
|
// The secret field is used to pass the error, not very clean but will do the job for now.
|
|
$fakeAccount->secret = $exception->getMessage();
|
|
|
|
$twofaccounts[$key] = $fakeAccount;
|
|
}
|
|
}
|
|
|
|
return collect($twofaccounts);
|
|
}
|
|
|
|
/**
|
|
* Encode into uppercase Base32
|
|
*/
|
|
protected function toBase32(string $str) {
|
|
return Base32::encodeUpper($str);
|
|
}
|
|
}
|