src/EventSubscriber/MFACheckSubscriber.php line 44

Open in your IDE?
  1. <?php
  2. namespace App\EventSubscriber;
  3. use App\Entity\UserInterface;
  4. use Symfony\Component\EventDispatcher\EventSubscriberInterface;
  5. use Symfony\Component\HttpFoundation\JsonResponse;
  6. use Symfony\Component\HttpFoundation\RequestStack;
  7. use Symfony\Component\HttpKernel\Event\RequestEvent;
  8. use Symfony\Component\HttpKernel\KernelEvents;
  9. use Symfony\Component\Security\Core\Security;
  10. class MFACheckSubscriber implements EventSubscriberInterface
  11. {
  12.     /** @var Security */
  13.     private $security;
  14.     /** @var RequestStack */
  15.     private $requestStack;
  16.     /**
  17.      * @param Security     $security
  18.      * @param RequestStack $requestStack
  19.      */
  20.     public function __construct(Security $securityRequestStack $requestStack)
  21.     {
  22.         $this->security $security;
  23.         $this->requestStack $requestStack;
  24.     }
  25.     /**
  26.      * {@inheritdoc}
  27.      */
  28.     public static function getSubscribedEvents()
  29.     {
  30.         return [
  31.             KernelEvents::REQUEST => 'onKernelRequest',
  32.         ];
  33.     }
  34.     /**
  35.      * @param RequestEvent $event
  36.      */
  37.     public function onKernelRequest(RequestEvent $event)
  38.     {
  39.         /** @var UserInterface|null $user */
  40.         if (!$user $this->security->getUser()) {
  41.             return;
  42.         }
  43.         $request $event->getRequest();
  44.         $currentPath $request->getPathInfo();
  45.         $excludedPatterns = [
  46.             '/api/me',
  47.             '/api/mfa',
  48.             '/api/users'// Admin access only
  49.         ];
  50.         foreach ($excludedPatterns as $pattern) {
  51.             if (=== strpos($currentPath$pattern)) {
  52.                 return;
  53.             }
  54.         }
  55.         $cookies $request->cookies;
  56.         $mfaVerified 'true' === $cookies->get('streamer:isMFAVerified''false');
  57.         if ($user->isMFAEnabled() && !$mfaVerified) {
  58.             // MFA is required but not verified, return a 403 Forbidden response
  59.             $response = new JsonResponse(['message' => 'MFA verification required.'], JsonResponse::HTTP_FORBIDDEN);
  60.             $event->setResponse($response);
  61.             $event->stopPropagation();
  62.         }
  63.     }
  64. }