2018-10-04 19:10:43 +02:00
|
|
|
<?php
|
2019-05-11 05:32:07 +02:00
|
|
|
/**
|
2020-09-06 11:38:10 +02:00
|
|
|
* Invoice Ninja (https://invoiceninja.com).
|
2019-05-11 05:32:07 +02:00
|
|
|
*
|
|
|
|
* @link https://github.com/invoiceninja/invoiceninja source repository
|
|
|
|
*
|
2021-01-03 22:54:54 +01:00
|
|
|
* @copyright Copyright (c) 2021. Invoice Ninja LLC (https://invoiceninja.com)
|
2019-05-11 05:32:07 +02:00
|
|
|
*
|
|
|
|
* @license https://opensource.org/licenses/AAL
|
|
|
|
*/
|
2018-10-04 19:10:43 +02:00
|
|
|
|
|
|
|
namespace App\Exceptions;
|
|
|
|
|
|
|
|
use Exception;
|
2019-10-03 02:17:29 +02:00
|
|
|
use Illuminate\Auth\Access\AuthorizationException;
|
2018-10-15 07:00:48 +02:00
|
|
|
use Illuminate\Auth\AuthenticationException;
|
2019-04-02 08:36:49 +02:00
|
|
|
use Illuminate\Database\Eloquent\ModelNotFoundException as ModelNotFoundException;
|
2020-05-28 11:40:35 +02:00
|
|
|
use Illuminate\Database\Eloquent\RelationNotFoundException;
|
2019-04-19 09:59:48 +02:00
|
|
|
use Illuminate\Foundation\Exceptions\Handler as ExceptionHandler;
|
|
|
|
use Illuminate\Http\Exceptions\ThrottleRequestsException;
|
2020-10-28 11:10:49 +01:00
|
|
|
use Illuminate\Http\Request;
|
|
|
|
use Illuminate\Http\Response;
|
|
|
|
use Illuminate\Queue\MaxAttemptsExceededException;
|
|
|
|
use Illuminate\Session\TokenMismatchException;
|
2019-10-01 03:56:48 +02:00
|
|
|
use Illuminate\Support\Arr;
|
2020-05-28 11:40:35 +02:00
|
|
|
use Illuminate\Support\Facades\Schema;
|
2019-10-10 03:01:38 +02:00
|
|
|
use Illuminate\Validation\ValidationException;
|
2020-10-28 11:10:49 +01:00
|
|
|
use PDOException;
|
2020-11-01 06:16:37 +01:00
|
|
|
use Sentry\State\Scope;
|
2020-10-28 11:10:49 +01:00
|
|
|
use Swift_TransportException;
|
|
|
|
use Symfony\Component\Console\Exception\CommandNotFoundException;
|
2019-04-23 08:19:45 +02:00
|
|
|
use Symfony\Component\Debug\Exception\FatalThrowableError;
|
2019-10-08 13:14:23 +02:00
|
|
|
use Symfony\Component\HttpKernel\Exception\MethodNotAllowedHttpException;
|
2019-10-10 03:01:38 +02:00
|
|
|
use Symfony\Component\HttpKernel\Exception\NotFoundHttpException;
|
2020-09-06 11:38:10 +02:00
|
|
|
use Throwable;
|
2018-10-04 19:10:43 +02:00
|
|
|
|
|
|
|
class Handler extends ExceptionHandler
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* A list of the exception types that are not reported.
|
|
|
|
*
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
protected $dontReport = [
|
2020-10-28 11:10:49 +01:00
|
|
|
PDOException::class,
|
2020-11-12 04:04:27 +01:00
|
|
|
//Swift_TransportException::class,
|
2020-10-28 11:10:49 +01:00
|
|
|
MaxAttemptsExceededException::class,
|
|
|
|
CommandNotFoundException::class,
|
2018-10-04 19:10:43 +02:00
|
|
|
];
|
|
|
|
|
|
|
|
/**
|
|
|
|
* A list of the inputs that are never flashed for validation exceptions.
|
|
|
|
*
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
protected $dontFlash = [
|
|
|
|
'password',
|
|
|
|
'password_confirmation',
|
|
|
|
];
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Report or log an exception.
|
|
|
|
*
|
2020-10-28 11:10:49 +01:00
|
|
|
* @param Throwable $exception
|
2018-10-04 19:10:43 +02:00
|
|
|
* @return void
|
2020-10-28 11:10:49 +01:00
|
|
|
* @throws Throwable
|
2018-10-04 19:10:43 +02:00
|
|
|
*/
|
2020-09-06 11:38:10 +02:00
|
|
|
public function report(Throwable $exception)
|
2020-12-13 21:37:29 +01:00
|
|
|
{
|
2020-09-06 11:38:10 +02:00
|
|
|
if (! Schema::hasTable('accounts')) {
|
|
|
|
info('account table not found');
|
2020-05-28 11:40:35 +02:00
|
|
|
return;
|
2020-06-22 05:07:58 +02:00
|
|
|
}
|
2020-05-28 11:40:35 +02:00
|
|
|
|
2019-04-10 04:01:28 +02:00
|
|
|
if (app()->bound('sentry') && $this->shouldReport($exception)) {
|
2020-06-22 13:32:10 +02:00
|
|
|
app('sentry')->configureScope(function (Scope $scope): void {
|
|
|
|
if (auth()->guard('contact') && auth()->guard('contact')->user() && auth()->guard('contact')->user()->company->account->report_errors) {
|
|
|
|
$scope->setUser([
|
|
|
|
'id' => auth()->guard('contact')->user()->company->account->key,
|
2020-09-06 11:38:10 +02:00
|
|
|
'email' => 'anonymous@example.com',
|
|
|
|
'name' => 'Anonymous User',
|
2020-06-22 13:32:10 +02:00
|
|
|
]);
|
|
|
|
} elseif (auth()->guard('user') && auth()->guard('user')->user() && auth()->user()->company() && auth()->user()->company()->account->report_errors) {
|
|
|
|
$scope->setUser([
|
|
|
|
'id' => auth()->user()->account->key,
|
2020-09-06 11:38:10 +02:00
|
|
|
'email' => 'anonymous@example.com',
|
|
|
|
'name' => 'Anonymous User',
|
2020-06-22 13:32:10 +02:00
|
|
|
]);
|
|
|
|
}
|
|
|
|
});
|
2020-03-29 14:22:14 +02:00
|
|
|
|
2020-12-16 12:52:40 +01:00
|
|
|
if ($this->validException($exception)) {
|
2020-12-12 12:23:29 +01:00
|
|
|
app('sentry')->captureException($exception);
|
2020-12-16 12:52:40 +01:00
|
|
|
}
|
2019-04-10 04:01:28 +02:00
|
|
|
}
|
2019-04-02 08:36:49 +02:00
|
|
|
|
2019-04-10 04:01:28 +02:00
|
|
|
parent::report($exception);
|
2018-10-04 19:10:43 +02:00
|
|
|
}
|
|
|
|
|
2020-12-16 12:52:40 +01:00
|
|
|
private function validException($exception)
|
2020-12-12 12:23:29 +01:00
|
|
|
{
|
2021-02-21 22:27:00 +01:00
|
|
|
if (strpos($exception->getMessage(), 'file_put_contents') !== false)
|
2020-12-16 12:52:40 +01:00
|
|
|
return false;
|
2020-12-12 12:23:29 +01:00
|
|
|
|
2021-02-21 22:27:00 +01:00
|
|
|
if (strpos($exception->getMessage(), 'Permission denied') !== false)
|
2020-12-16 12:52:40 +01:00
|
|
|
return false;
|
2020-12-13 00:20:03 +01:00
|
|
|
|
2021-02-21 22:27:00 +01:00
|
|
|
if (strpos($exception->getMessage(), 'flock()') !== false)
|
2020-12-16 12:52:40 +01:00
|
|
|
return false;
|
2020-12-13 00:20:03 +01:00
|
|
|
|
2021-02-21 22:27:00 +01:00
|
|
|
if (strpos($exception->getMessage(), 'expects parameter 1 to be resource') !== false)
|
2021-02-11 04:06:03 +01:00
|
|
|
return false;
|
2021-02-21 22:27:00 +01:00
|
|
|
|
|
|
|
if (strpos($exception->getMessage(), 'fwrite()') !== false)
|
2021-02-21 22:29:39 +01:00
|
|
|
return false;
|
2021-02-21 22:27:00 +01:00
|
|
|
|
2021-02-11 04:06:03 +01:00
|
|
|
|
2020-12-16 12:52:40 +01:00
|
|
|
return true;
|
2020-12-12 12:23:29 +01:00
|
|
|
}
|
|
|
|
|
2018-10-04 19:10:43 +02:00
|
|
|
/**
|
|
|
|
* Render an exception into an HTTP response.
|
|
|
|
*
|
2020-10-28 11:10:49 +01:00
|
|
|
* @param Request $request
|
|
|
|
* @param Throwable $exception
|
|
|
|
* @return Response
|
|
|
|
* @throws Throwable
|
2018-10-04 19:10:43 +02:00
|
|
|
*/
|
2020-09-06 11:38:10 +02:00
|
|
|
public function render($request, Throwable $exception)
|
2018-10-04 19:10:43 +02:00
|
|
|
{
|
2019-12-30 22:59:12 +01:00
|
|
|
if ($exception instanceof ModelNotFoundException && $request->expectsJson()) {
|
2020-02-17 20:07:31 +01:00
|
|
|
return response()->json(['message'=>$exception->getMessage()], 400);
|
2019-12-30 22:59:12 +01:00
|
|
|
} elseif ($exception instanceof ThrottleRequestsException && $request->expectsJson()) {
|
|
|
|
return response()->json(['message'=>'Too many requests'], 429);
|
|
|
|
} elseif ($exception instanceof FatalThrowableError && $request->expectsJson()) {
|
2019-11-16 04:12:29 +01:00
|
|
|
return response()->json(['message'=>'Fatal error'], 500);
|
2019-12-30 22:59:12 +01:00
|
|
|
} elseif ($exception instanceof AuthorizationException) {
|
|
|
|
return response()->json(['message'=>'You are not authorized to view or perform this action'], 401);
|
2020-10-28 11:10:49 +01:00
|
|
|
} elseif ($exception instanceof TokenMismatchException) {
|
2019-08-13 23:16:31 +02:00
|
|
|
return redirect()
|
|
|
|
->back()
|
2019-08-13 23:41:02 +02:00
|
|
|
->withInput($request->except('password', 'password_confirmation', '_token'))
|
2019-08-13 23:16:31 +02:00
|
|
|
->with([
|
|
|
|
'message' => ctrans('texts.token_expired'),
|
2020-09-06 11:38:10 +02:00
|
|
|
'message-type' => 'danger', ]);
|
2019-12-30 22:59:12 +01:00
|
|
|
} elseif ($exception instanceof NotFoundHttpException && $request->expectsJson()) {
|
|
|
|
return response()->json(['message'=>'Route does not exist'], 404);
|
|
|
|
} elseif ($exception instanceof MethodNotAllowedHttpException && $request->expectsJson()) {
|
|
|
|
return response()->json(['message'=>'Method not support for this route'], 404);
|
|
|
|
} elseif ($exception instanceof ValidationException && $request->expectsJson()) {
|
2020-09-06 11:38:10 +02:00
|
|
|
info(print_r($exception->validator->getMessageBag(), 1));
|
|
|
|
|
2019-10-10 03:01:38 +02:00
|
|
|
return response()->json(['message' => 'The given data was invalid.', 'errors' => $exception->validator->getMessageBag()], 422);
|
2019-12-30 22:59:12 +01:00
|
|
|
} elseif ($exception instanceof RelationNotFoundException && $request->expectsJson()) {
|
2019-11-21 09:38:57 +01:00
|
|
|
return response()->json(['message' => $exception->getMessage()], 400);
|
2020-06-10 07:21:11 +02:00
|
|
|
} elseif ($exception instanceof GenericPaymentDriverFailure && $request->expectsJson()) {
|
|
|
|
return response()->json(['message' => $exception->getMessage()], 400);
|
|
|
|
} elseif ($exception instanceof GenericPaymentDriverFailure) {
|
|
|
|
$data['message'] = $exception->getMessage();
|
2020-08-13 04:30:45 +02:00
|
|
|
//dd($data);
|
2020-06-16 14:41:56 +02:00
|
|
|
// return view('errors.layout', $data);
|
2019-11-21 09:38:57 +01:00
|
|
|
}
|
2019-08-13 23:41:02 +02:00
|
|
|
|
2018-10-04 19:10:43 +02:00
|
|
|
return parent::render($request, $exception);
|
|
|
|
}
|
2018-10-15 07:00:48 +02:00
|
|
|
|
|
|
|
protected function unauthenticated($request, AuthenticationException $exception)
|
|
|
|
{
|
|
|
|
if ($request->expectsJson()) {
|
|
|
|
return response()->json(['error' => 'Unauthenticated.'], 401);
|
|
|
|
}
|
|
|
|
|
2019-10-01 03:56:48 +02:00
|
|
|
$guard = Arr::get($exception->guards(), 0);
|
2018-10-15 07:00:48 +02:00
|
|
|
|
|
|
|
switch ($guard) {
|
|
|
|
case 'contact':
|
2019-07-16 04:38:11 +02:00
|
|
|
$login = 'client.login';
|
2018-10-15 07:00:48 +02:00
|
|
|
break;
|
|
|
|
case 'user':
|
|
|
|
$login = 'login';
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
$login = 'default';
|
|
|
|
break;
|
|
|
|
}
|
2020-09-06 11:38:10 +02:00
|
|
|
|
2018-10-15 07:00:48 +02:00
|
|
|
return redirect()->guest(route($login));
|
|
|
|
}
|
2018-10-04 19:10:43 +02:00
|
|
|
}
|