1
|
|
|
<?php |
2
|
|
|
|
3
|
|
|
declare(strict_types=1); |
4
|
|
|
|
5
|
|
|
namespace Cortex\Fort\Http\Controllers\Frontarea; |
6
|
|
|
|
7
|
|
|
use Cortex\Fort\Traits\TwoFactorAuthenticatesUsers; |
8
|
|
|
use Illuminate\Support\Facades\Hash; |
9
|
|
|
use Illuminate\Http\Request; |
10
|
|
|
use Cortex\Foundation\Http\Controllers\AuthenticatedController; |
11
|
|
|
|
12
|
|
|
class ReauthenticationController extends AuthenticatedController |
13
|
|
|
{ |
14
|
|
|
|
15
|
|
|
use TwoFactorAuthenticatesUsers; |
16
|
|
|
|
17
|
|
|
/** |
18
|
|
|
* @param Request $request |
19
|
|
|
* |
20
|
|
|
* @return \Illuminate\Http\JsonResponse|\Illuminate\Http\RedirectResponse |
21
|
|
|
*/ |
22
|
|
|
public function processPassword( Request $request ) { |
23
|
|
|
|
24
|
|
|
$session_name = session(config('cortex.fort.reauthentication.prefix').'.session_name'); |
25
|
|
|
$redirect_url = session(config('cortex.fort.reauthentication.prefix').'.intended'); |
26
|
|
|
|
27
|
|
|
if( Hash::check($request->input('password'), request()->user()->password) ) { |
28
|
|
|
$this->setSession($session_name); |
29
|
|
|
|
30
|
|
|
return intend([ |
31
|
|
|
'intended' => url($redirect_url) |
32
|
|
|
]); |
33
|
|
|
} else { |
34
|
|
|
return intend([ |
35
|
|
|
'intended' => url($redirect_url), |
36
|
|
|
'withErrors' => ['password' => trans('cortex/fort::messages.auth.failed') |
37
|
|
|
] |
38
|
|
|
]); |
39
|
|
|
} |
40
|
|
|
} |
41
|
|
|
|
42
|
|
|
/** |
43
|
|
|
* @param Request $request |
44
|
|
|
* |
45
|
|
|
* @return \Illuminate\Http\JsonResponse|\Illuminate\Http\RedirectResponse |
46
|
|
|
*/ |
47
|
|
|
public function processTwofactor( Request $request ) { |
48
|
|
|
|
49
|
|
|
$session_name = session(config('cortex.fort.reauthentication.prefix').'.session_name'); |
50
|
|
|
$redirect_url = session(config('cortex.fort.reauthentication.prefix').'.intended'); |
51
|
|
|
|
52
|
|
|
$guard = $this->getGuard(); |
53
|
|
|
$token = $request->input('token'); |
54
|
|
|
$user = $request->user($guard); |
55
|
|
|
|
56
|
|
|
if( $this->attemptTwoFactor($user, $token) ) { |
|
|
|
|
57
|
|
|
$this->setSession($session_name); |
58
|
|
|
|
59
|
|
|
return intend([ |
60
|
|
|
'intended' => url($redirect_url) |
61
|
|
|
]); |
62
|
|
|
} else { |
63
|
|
|
return intend([ |
64
|
|
|
'intended' => url($redirect_url), |
65
|
|
|
'withErrors' => ['token' => trans('cortex/fort::messages.verification.twofactor.invalid_token')], |
66
|
|
|
]); |
67
|
|
|
} |
68
|
|
|
} |
69
|
|
|
|
70
|
|
|
/** |
71
|
|
|
* @param $session_name |
72
|
|
|
*/ |
73
|
|
|
protected function setSession($session_name) { |
|
|
|
|
74
|
|
|
session()->put($session_name, time()); |
75
|
|
|
session()->forget(config('cortex.fort.reauthentication.prefix').'.session_name'); |
76
|
|
|
session()->forget(config('cortex.fort.reauthentication.prefix').'.intended'); |
77
|
|
|
session()->forget('rinvex.fort.twofactor.totp'); |
78
|
|
|
} |
79
|
|
|
|
80
|
|
|
} |
81
|
|
|
|
If a method or function can return multiple different values and unless you are sure that you only can receive a single value in this context, we recommend to add an additional type check:
If this a common case that PHP Analyzer should handle natively, please let us know by opening an issue.