| Total Complexity | 7 |
| Total Lines | 45 |
| Duplicated Lines | 0 % |
| Coverage | 0% |
| Changes | 0 | ||
| 1 | <?php |
||
| 8 | class HoneyPot |
||
| 9 | { |
||
| 10 | /** |
||
| 11 | * Handle an incoming request. |
||
| 12 | * |
||
| 13 | * @param \Illuminate\Http\Request $request |
||
| 14 | * @param \Closure $next |
||
| 15 | * @return mixed |
||
| 16 | */ |
||
| 17 | public function handle($request, Closure $next) |
||
| 23 | } |
||
| 24 | |||
| 25 | /** |
||
| 26 | * Honeypot field protection |
||
| 27 | * |
||
| 28 | * A hidden field in the comment form is tagged as honeypot. |
||
| 29 | * Should this field be filled with data or if this field is removed |
||
| 30 | * from the input, We can assume the submit is forged. |
||
| 31 | * |
||
| 32 | * A field with the attribute key of your_name is assumed |
||
| 33 | */ |
||
| 34 | private function honeypot(Request $request) |
||
| 35 | { |
||
| 36 | if (!$request->exists('your_name') or $request->has('your_name')) { |
||
| 37 | abort('403', 'Request blocked due to assumed spam attempt. Honeypot field was filled in.'); |
||
| 38 | } |
||
| 39 | } |
||
| 40 | |||
| 41 | /** |
||
| 42 | * Timer lock |
||
| 43 | * |
||
| 44 | * Should the request be performed in less then 3 seconds |
||
| 45 | * A automatic spam submit is assumed. |
||
| 46 | * Validation is performed by setting a timestamp |
||
| 47 | * at the time of the comment form creation |
||
| 48 | */ |
||
| 49 | private function timer(Request $request) |
||
| 53 | } |
||
| 54 | } |
||
| 56 |