diff --git a/app/Http/Controllers/AuthenticationController.php b/app/Http/Controllers/AuthenticationController.php index 59f8225..9cc59a8 100644 --- a/app/Http/Controllers/AuthenticationController.php +++ b/app/Http/Controllers/AuthenticationController.php @@ -131,24 +131,16 @@ public function verify(Request $request, ServerRequestInterface $serverRequest) AttestationObjectLoader::create($attestationManager) ); - \Log::info($request->all()); - $publicKeyCredential = $pkCredentialLoader->load(json_encode($request->all())); $authenticatorAssertionResponse = $publicKeyCredential->getResponse(); - \Log::info($authenticatorAssertionResponse->getClientDataJSON()->all()); - if (!$authenticatorAssertionResponse instanceof AuthenticatorAssertionResponse) { throw ValidationException::withMessages([ 'username' => 'Invalid response type', ]); } - \Log::info($authenticatorAssertionResponse->getUserHandle()); - - \Log::info(session(self::CREDENTIAL_REQUEST_OPTIONS_SESSION_KEY)); - // Check the response from the device, this will // throw an exception if the response is invalid. // For the purposes of this demo, we are letting @@ -164,9 +156,6 @@ public function verify(Request $request, ServerRequestInterface $serverRequest) $authenticatorAssertionResponse->getUserHandle(), ); - \Log::info($publicKeyCredentialSource->jsonSerialize()); - \Log::info($publicKeyCredentialSource->getUserHandle()); - // If we've gotten this far, the response is valid! // We don't need the options anymore, so let's remove them from the session