diff --git a/src/Actions/RedirectIfTwoFactorAuthenticatable.php b/src/Actions/RedirectIfTwoFactorAuthenticatable.php index 85bdf28b..f5761a03 100644 --- a/src/Actions/RedirectIfTwoFactorAuthenticatable.php +++ b/src/Actions/RedirectIfTwoFactorAuthenticatable.php @@ -86,9 +86,11 @@ protected function validateCredentials($request) }); } - $model = $this->guard->getProvider()->getModel(); + $user = $this->guard->getProvider()->retrieveByCredentials([ + Fortify::username() => $request->{Fortify::username()}, + ]); - return tap($model::where(Fortify::username(), $request->{Fortify::username()})->first(), function ($user) use ($request) { + return tap($user, function ($user) use ($request) { if (! $user || ! $this->guard->getProvider()->validateCredentials($user, ['password' => $request->password])) { $this->fireFailedEvent($request, $user); diff --git a/src/Http/Requests/TwoFactorLoginRequest.php b/src/Http/Requests/TwoFactorLoginRequest.php index 8428b6e5..456ad434 100644 --- a/src/Http/Requests/TwoFactorLoginRequest.php +++ b/src/Http/Requests/TwoFactorLoginRequest.php @@ -94,10 +94,8 @@ public function hasChallengedUser() return true; } - $model = app(StatefulGuard::class)->getProvider()->getModel(); - - return $this->session()->has('login.id') && - $model::find($this->session()->get('login.id')); + return $this->session()->has('login.id') + && app(StatefulGuard::class)->getProvider()->retrieveById($this->session()->get('login.id')); } /** @@ -111,10 +109,8 @@ public function challengedUser() return $this->challengedUser; } - $model = app(StatefulGuard::class)->getProvider()->getModel(); - if (! $this->session()->has('login.id') || - ! $user = $model::find($this->session()->get('login.id'))) { + ! $user = app(StatefulGuard::class)->getProvider()->retrieveById($this->session()->get('login.id'))) { throw new HttpResponseException( app(FailedTwoFactorLoginResponse::class)->toResponse($this) );