diff options
author | Starfall <us@starfall.systems> | 2021-07-07 11:46:33 -0500 |
---|---|---|
committer | Starfall <us@starfall.systems> | 2021-07-07 11:46:33 -0500 |
commit | d30025d28d813999bfe98ce9cee2cda3bebf6c22 (patch) | |
tree | e2cf70344fc6426f3a2c778d3b6d3bab9e22c078 /app/controllers/concerns | |
parent | fadb06ef6e1950a82f08673683e705943b93ba40 (diff) | |
parent | 0c2eb949fc21ceecbd99a81e5ffe75517a1e64df (diff) |
Merge branch 'glitch'
Diffstat (limited to 'app/controllers/concerns')
-rw-r--r-- | app/controllers/concerns/sign_in_token_authentication_concern.rb | 5 | ||||
-rw-r--r-- | app/controllers/concerns/two_factor_authentication_concern.rb | 10 |
2 files changed, 6 insertions, 9 deletions
diff --git a/app/controllers/concerns/sign_in_token_authentication_concern.rb b/app/controllers/concerns/sign_in_token_authentication_concern.rb index 51ebcb115..016ab8f52 100644 --- a/app/controllers/concerns/sign_in_token_authentication_concern.rb +++ b/app/controllers/concerns/sign_in_token_authentication_concern.rb @@ -29,10 +29,9 @@ module SignInTokenAuthenticationConcern def authenticate_with_sign_in_token_attempt(user) if valid_sign_in_token_attempt?(user) - clear_attempt_from_session - remember_me(user) - sign_in(user) + on_authentication_success(user, :sign_in_token) else + on_authentication_failure(user, :sign_in_token, :invalid_sign_in_token) flash.now[:alert] = I18n.t('users.invalid_sign_in_token') prompt_for_sign_in_token(user) end diff --git a/app/controllers/concerns/two_factor_authentication_concern.rb b/app/controllers/concerns/two_factor_authentication_concern.rb index 4800db348..d3f00a4b4 100644 --- a/app/controllers/concerns/two_factor_authentication_concern.rb +++ b/app/controllers/concerns/two_factor_authentication_concern.rb @@ -52,21 +52,19 @@ module TwoFactorAuthenticationConcern webauthn_credential = WebAuthn::Credential.from_get(user_params[:credential]) if valid_webauthn_credential?(user, webauthn_credential) - clear_attempt_from_session - remember_me(user) - sign_in(user) + on_authentication_success(user, :webauthn) render json: { redirect_path: root_path }, status: :ok else + on_authentication_failure(user, :webauthn, :invalid_credential) render json: { error: t('webauthn_credentials.invalid_credential') }, status: :unprocessable_entity end end def authenticate_with_two_factor_via_otp(user) if valid_otp_attempt?(user) - clear_attempt_from_session - remember_me(user) - sign_in(user) + on_authentication_success(user, :otp) else + on_authentication_failure(user, :otp, :invalid_otp_token) flash.now[:alert] = I18n.t('users.invalid_otp_token') prompt_for_two_factor(user) end |