Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
<?php declare(strict_types=1); /** * Passbolt ~ Open source password manager for teams ..
Decoded Output download
<?php
declare(strict_types=1);
/**
* Passbolt ~ Open source password manager for teams
* Copyright (c) Passbolt SA (https://www.passbolt.com)
*
* Licensed under GNU Affero General Public License version 3 of the or any later version.
* For full copyright and license information, please see the LICENSE.txt
* Redistributions of files must retain the above copyright notice.
*
* @copyright Copyright (c) Passbolt SA (https://www.passbolt.com)
* @license https://opensource.org/licenses/AGPL-3.0 AGPL License
* @link https://www.passbolt.com Passbolt(tm)
* @since 3.3.0
*/
namespace Passbolt\MultiFactorAuthentication\Authenticator;
use App\Model\Entity\User;
use App\Utility\UserAccessControl;
use Cake\Http\ServerRequest;
use Passbolt\JwtAuthentication\Authenticator\JwtArmoredChallengeService;
use Passbolt\MultiFactorAuthentication\Service\IsMfaAuthenticationRequiredService;
use Passbolt\MultiFactorAuthentication\Utility\MfaSettings;
/**
* When successfully logged in, but with MFA required,
* appends the MFA providers to the challenge to inform
* that an additional MFA token is required.
*/
class MfaJwtArmoredChallengeService extends JwtArmoredChallengeService
{
/**
* @inheritDoc
*/
public function makeArmoredChallenge(ServerRequest $request, User $user, string $verifyToken): array
{
$challenge = parent::makeArmoredChallenge($request, $user, $verifyToken);
$uac = new UserAccessControl($user['role']['name'], $user['id'], $user['username']);
$mfaSettings = MfaSettings::get($uac);
$isMfaAuthenticationRequired = (new IsMfaAuthenticationRequiredService())
->isMfaCheckRequired($request, $mfaSettings, $uac);
if ($isMfaAuthenticationRequired) {
$challenge['providers'] = $mfaSettings->getEnabledProvidersWithLastUsedFirst();
}
return $challenge;
}
}
?>
Did this file decode correctly?
Original Code
<?php
declare(strict_types=1);
/**
* Passbolt ~ Open source password manager for teams
* Copyright (c) Passbolt SA (https://www.passbolt.com)
*
* Licensed under GNU Affero General Public License version 3 of the or any later version.
* For full copyright and license information, please see the LICENSE.txt
* Redistributions of files must retain the above copyright notice.
*
* @copyright Copyright (c) Passbolt SA (https://www.passbolt.com)
* @license https://opensource.org/licenses/AGPL-3.0 AGPL License
* @link https://www.passbolt.com Passbolt(tm)
* @since 3.3.0
*/
namespace Passbolt\MultiFactorAuthentication\Authenticator;
use App\Model\Entity\User;
use App\Utility\UserAccessControl;
use Cake\Http\ServerRequest;
use Passbolt\JwtAuthentication\Authenticator\JwtArmoredChallengeService;
use Passbolt\MultiFactorAuthentication\Service\IsMfaAuthenticationRequiredService;
use Passbolt\MultiFactorAuthentication\Utility\MfaSettings;
/**
* When successfully logged in, but with MFA required,
* appends the MFA providers to the challenge to inform
* that an additional MFA token is required.
*/
class MfaJwtArmoredChallengeService extends JwtArmoredChallengeService
{
/**
* @inheritDoc
*/
public function makeArmoredChallenge(ServerRequest $request, User $user, string $verifyToken): array
{
$challenge = parent::makeArmoredChallenge($request, $user, $verifyToken);
$uac = new UserAccessControl($user['role']['name'], $user['id'], $user['username']);
$mfaSettings = MfaSettings::get($uac);
$isMfaAuthenticationRequired = (new IsMfaAuthenticationRequiredService())
->isMfaCheckRequired($request, $mfaSettings, $uac);
if ($isMfaAuthenticationRequired) {
$challenge['providers'] = $mfaSettings->getEnabledProvidersWithLastUsedFirst();
}
return $challenge;
}
}
Function Calls
None |
Stats
MD5 | dde2fd344420f11f60341faea957b1af |
Eval Count | 0 |
Decode Time | 95 ms |