2018-10-04 19:10:43 +02:00
|
|
|
<?php
|
2019-05-11 05:32:07 +02:00
|
|
|
/**
|
2020-09-06 11:38:10 +02:00
|
|
|
* Invoice Ninja (https://invoiceninja.com).
|
2019-05-11 05:32:07 +02:00
|
|
|
*
|
|
|
|
* @link https://github.com/invoiceninja/invoiceninja source repository
|
|
|
|
*
|
2021-01-03 22:54:54 +01:00
|
|
|
* @copyright Copyright (c) 2021. Invoice Ninja LLC (https://invoiceninja.com)
|
2019-05-11 05:32:07 +02:00
|
|
|
*
|
|
|
|
* @license https://opensource.org/licenses/AAL
|
|
|
|
*/
|
2018-10-04 19:10:43 +02:00
|
|
|
|
2019-05-22 03:24:05 +02:00
|
|
|
namespace App\Http\Controllers\Auth;
|
2018-10-04 19:10:43 +02:00
|
|
|
|
2020-04-30 14:33:57 +02:00
|
|
|
use App\DataMapper\Analytics\LoginFailure;
|
|
|
|
use App\DataMapper\Analytics\LoginSuccess;
|
2021-05-12 08:18:32 +02:00
|
|
|
use App\Events\User\UserLoggedIn;
|
2019-04-19 04:58:40 +02:00
|
|
|
use App\Http\Controllers\BaseController;
|
2018-10-04 19:10:43 +02:00
|
|
|
use App\Http\Controllers\Controller;
|
2019-05-22 02:56:47 +02:00
|
|
|
use App\Jobs\Account\CreateAccount;
|
2021-04-28 02:02:31 +02:00
|
|
|
use App\Jobs\Company\CreateCompanyToken;
|
2021-05-12 08:31:02 +02:00
|
|
|
use App\Jobs\Util\SystemLogger;
|
2019-05-22 02:56:47 +02:00
|
|
|
use App\Libraries\MultiDB;
|
2019-05-22 05:18:18 +02:00
|
|
|
use App\Libraries\OAuth\OAuth;
|
2020-05-13 07:38:42 +02:00
|
|
|
use App\Libraries\OAuth\Providers\Google;
|
2021-05-12 08:31:02 +02:00
|
|
|
use App\Models\Client;
|
2021-05-19 03:12:23 +02:00
|
|
|
use App\Models\Company;
|
2020-08-08 02:32:47 +02:00
|
|
|
use App\Models\CompanyToken;
|
2019-09-11 12:15:44 +02:00
|
|
|
use App\Models\CompanyUser;
|
2021-05-12 08:31:02 +02:00
|
|
|
use App\Models\SystemLog;
|
2018-12-02 11:42:06 +01:00
|
|
|
use App\Models\User;
|
2019-09-11 12:15:44 +02:00
|
|
|
use App\Transformers\CompanyUserTransformer;
|
2021-05-12 08:18:32 +02:00
|
|
|
use App\Utils\Ninja;
|
2018-11-02 11:54:46 +01:00
|
|
|
use App\Utils\Traits\UserSessionAttributes;
|
2020-10-28 11:10:49 +01:00
|
|
|
use Google_Client;
|
2018-10-04 19:10:43 +02:00
|
|
|
use Illuminate\Foundation\Auth\AuthenticatesUsers;
|
2018-11-02 11:54:46 +01:00
|
|
|
use Illuminate\Http\Request;
|
2018-12-02 11:42:06 +01:00
|
|
|
use Illuminate\Support\Facades\Auth;
|
2021-03-16 13:10:15 +01:00
|
|
|
use Illuminate\Support\Facades\Cache;
|
|
|
|
use Illuminate\Support\Str;
|
|
|
|
use PragmaRX\Google2FA\Google2FA;
|
2020-05-09 00:35:49 +02:00
|
|
|
use Turbo124\Beacon\Facades\LightLogs;
|
2018-10-04 19:10:43 +02:00
|
|
|
|
2019-04-19 04:58:40 +02:00
|
|
|
class LoginController extends BaseController
|
2018-10-04 19:10:43 +02:00
|
|
|
{
|
2020-10-10 14:07:52 +02:00
|
|
|
/**
|
2019-12-30 22:59:12 +01:00
|
|
|
* @OA\Tag(
|
|
|
|
* name="login",
|
|
|
|
* description="Authentication",
|
|
|
|
* @OA\ExternalDocumentation(
|
|
|
|
* description="Find out more",
|
|
|
|
* url="http://docs.invoiceninja.com"
|
|
|
|
* )
|
|
|
|
* )
|
|
|
|
*/
|
2018-10-04 19:10:43 +02:00
|
|
|
|
|
|
|
use AuthenticatesUsers;
|
2018-11-02 11:54:46 +01:00
|
|
|
use UserSessionAttributes;
|
2020-09-06 11:38:10 +02:00
|
|
|
|
2019-09-12 14:02:25 +02:00
|
|
|
protected $entity_type = CompanyUser::class;
|
2019-04-19 04:58:40 +02:00
|
|
|
|
2019-09-12 14:02:25 +02:00
|
|
|
protected $entity_transformer = CompanyUserTransformer::class;
|
2019-04-19 04:58:40 +02:00
|
|
|
|
2018-10-04 19:10:43 +02:00
|
|
|
/**
|
|
|
|
* Where to redirect users after login.
|
|
|
|
*
|
|
|
|
* @var string
|
|
|
|
*/
|
2018-10-17 14:26:27 +02:00
|
|
|
protected $redirectTo = '/dashboard';
|
2018-10-04 19:10:43 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Create a new controller instance.
|
|
|
|
*
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function __construct()
|
|
|
|
{
|
2019-04-19 04:58:40 +02:00
|
|
|
parent::__construct();
|
2018-10-04 19:10:43 +02:00
|
|
|
}
|
2018-10-18 07:04:36 +02:00
|
|
|
|
2018-11-20 05:36:56 +01:00
|
|
|
/**
|
|
|
|
* Once the user is authenticated, we need to set
|
2020-09-06 11:38:10 +02:00
|
|
|
* the default company into a session variable.
|
2018-11-20 05:36:56 +01:00
|
|
|
*
|
2020-10-28 11:10:49 +01:00
|
|
|
* @param Request $request
|
|
|
|
* @param User $user
|
2018-11-20 05:36:56 +01:00
|
|
|
* @return void
|
2019-05-23 02:25:55 +02:00
|
|
|
* deprecated .1 API ONLY we don't need to set any session variables
|
2018-11-20 05:36:56 +01:00
|
|
|
*/
|
2018-12-02 11:42:06 +01:00
|
|
|
public function authenticated(Request $request, User $user) : void
|
2018-11-02 11:54:46 +01:00
|
|
|
{
|
2019-03-26 12:31:07 +01:00
|
|
|
//$this->setCurrentCompanyId($user->companies()->first()->account->default_company_id);
|
2018-11-02 11:54:46 +01:00
|
|
|
}
|
|
|
|
|
2019-05-23 02:25:55 +02:00
|
|
|
/**
|
2020-09-06 11:38:10 +02:00
|
|
|
* Login via API.
|
2019-05-23 02:25:55 +02:00
|
|
|
*
|
2020-10-28 11:10:49 +01:00
|
|
|
* @param Request $request The request
|
2019-05-23 02:25:55 +02:00
|
|
|
*
|
|
|
|
* @return Response|User Process user login.
|
2019-10-07 00:00:02 +02:00
|
|
|
*
|
2019-12-30 22:59:12 +01:00
|
|
|
*
|
2020-10-28 11:10:49 +01:00
|
|
|
* @throws \Illuminate\Validation\ValidationException
|
2019-10-06 08:05:46 +02:00
|
|
|
* @OA\Post(
|
|
|
|
* path="/api/v1/login",
|
|
|
|
* operationId="postLogin",
|
|
|
|
* tags={"login"},
|
|
|
|
* summary="Attempts authentication",
|
|
|
|
* description="Returns a CompanyUser object on success",
|
|
|
|
* @OA\Parameter(ref="#/components/parameters/X-Api-Secret"),
|
|
|
|
* @OA\Parameter(ref="#/components/parameters/X-Api-Token"),
|
|
|
|
* @OA\Parameter(ref="#/components/parameters/X-Requested-With"),
|
|
|
|
* @OA\Parameter(ref="#/components/parameters/include"),
|
|
|
|
* @OA\Parameter(ref="#/components/parameters/include_static"),
|
|
|
|
* @OA\Parameter(ref="#/components/parameters/clear_cache"),
|
|
|
|
* @OA\RequestBody(
|
|
|
|
* description="User credentials",
|
|
|
|
* required=true,
|
|
|
|
* @OA\MediaType(
|
|
|
|
* mediaType="application/json",
|
|
|
|
* @OA\Schema(
|
|
|
|
* type="object",
|
|
|
|
* @OA\Property(
|
|
|
|
* property="email",
|
|
|
|
* description="The user email address",
|
|
|
|
* type="string",
|
|
|
|
* ),
|
|
|
|
* @OA\Property(
|
|
|
|
* property="password",
|
|
|
|
* example="1234567",
|
|
|
|
* description="The user password must meet minimum criteria ~ >6 characters",
|
|
|
|
* type="string"
|
|
|
|
* )
|
|
|
|
* )
|
|
|
|
* )
|
|
|
|
* ),
|
|
|
|
* @OA\Response(
|
|
|
|
* response=200,
|
|
|
|
* description="The Company User response",
|
2020-06-21 23:30:25 +02:00
|
|
|
* @OA\Header(header="X-MINIMUM-CLIENT-VERSION", ref="#/components/headers/X-MINIMUM-CLIENT-VERSION"),
|
2019-10-06 08:05:46 +02:00
|
|
|
* @OA\Header(header="X-RateLimit-Remaining", ref="#/components/headers/X-RateLimit-Remaining"),
|
|
|
|
* @OA\Header(header="X-RateLimit-Limit", ref="#/components/headers/X-RateLimit-Limit"),
|
2019-10-06 13:51:33 +02:00
|
|
|
* @OA\JsonContent(ref="#/components/schemas/CompanyUser"),
|
|
|
|
* ),
|
|
|
|
* @OA\Response(
|
|
|
|
* response=422,
|
|
|
|
* description="Validation error",
|
|
|
|
* @OA\JsonContent(ref="#/components/schemas/ValidationError"),
|
2019-10-06 08:05:46 +02:00
|
|
|
* ),
|
2019-10-06 13:24:54 +02:00
|
|
|
* @OA\Response(
|
2019-12-30 22:59:12 +01:00
|
|
|
* response="default",
|
2019-10-06 13:24:54 +02:00
|
|
|
* description="Unexpected Error",
|
|
|
|
* @OA\JsonContent(ref="#/components/schemas/Error"),
|
|
|
|
* ),
|
2019-10-06 08:05:46 +02:00
|
|
|
* )
|
|
|
|
*/
|
2019-04-19 03:59:07 +02:00
|
|
|
public function apiLogin(Request $request)
|
|
|
|
{
|
2019-07-14 11:34:49 +02:00
|
|
|
$this->forced_includes = ['company_users'];
|
|
|
|
|
2019-04-19 03:59:07 +02:00
|
|
|
$this->validateLogin($request);
|
|
|
|
|
2019-04-19 09:59:48 +02:00
|
|
|
if ($this->hasTooManyLoginAttempts($request)) {
|
|
|
|
$this->fireLockoutEvent($request);
|
|
|
|
|
2019-09-11 07:32:47 +02:00
|
|
|
return response()
|
|
|
|
->json(['message' => 'Too many login attempts, you are being throttled'], 401)
|
|
|
|
->header('X-App-Version', config('ninja.app_version'))
|
2020-06-21 23:30:25 +02:00
|
|
|
->header('X-Api-Version', config('ninja.minimum_client_version'));
|
2019-04-19 09:59:48 +02:00
|
|
|
}
|
|
|
|
|
2019-09-11 02:37:53 +02:00
|
|
|
if ($this->attemptLogin($request)) {
|
2021-03-16 13:10:15 +01:00
|
|
|
|
2020-05-04 13:13:46 +02:00
|
|
|
LightLogs::create(new LoginSuccess())
|
2020-04-30 14:33:57 +02:00
|
|
|
->increment()
|
|
|
|
->batch();
|
|
|
|
|
2020-08-08 01:58:10 +02:00
|
|
|
$user = $this->guard()->user();
|
2020-09-06 11:38:10 +02:00
|
|
|
|
2021-05-12 08:18:32 +02:00
|
|
|
event(new UserLoggedIn($user, $user->account->default_company, Ninja::eventVars($user->id)));
|
|
|
|
|
2021-03-16 13:10:15 +01:00
|
|
|
//if user has 2fa enabled - lets check this now:
|
|
|
|
|
2021-03-20 01:46:42 +01:00
|
|
|
if($user->google_2fa_secret && $request->has('one_time_password'))
|
2021-03-16 13:10:15 +01:00
|
|
|
{
|
|
|
|
$google2fa = new Google2FA();
|
|
|
|
|
2021-03-20 01:46:42 +01:00
|
|
|
if(strlen($request->input('one_time_password')) == 0 || !$google2fa->verifyKey(decrypt($user->google_2fa_secret), $request->input('one_time_password')))
|
2021-03-16 13:10:15 +01:00
|
|
|
{
|
|
|
|
return response()
|
|
|
|
->json(['message' => ctrans('texts.invalid_one_time_password')], 401)
|
|
|
|
->header('X-App-Version', config('ninja.app_version'))
|
|
|
|
->header('X-Api-Version', config('ninja.minimum_client_version'));
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
2021-03-18 12:46:58 +01:00
|
|
|
elseif($user->google_2fa_secret && !$request->has('one_time_password')) {
|
|
|
|
|
|
|
|
return response()
|
|
|
|
->json(['message' => ctrans('texts.invalid_one_time_password')], 401)
|
|
|
|
->header('X-App-Version', config('ninja.app_version'))
|
|
|
|
->header('X-Api-Version', config('ninja.minimum_client_version'));
|
|
|
|
}
|
2021-03-16 13:10:15 +01:00
|
|
|
|
2020-11-13 10:09:20 +01:00
|
|
|
$user->setCompany($user->account->default_company);
|
2021-05-05 08:44:31 +02:00
|
|
|
|
|
|
|
$timeout = $user->company()->default_password_timeout;
|
|
|
|
|
|
|
|
if($timeout == 0)
|
|
|
|
$timeout = 30*60*1000*1000;
|
|
|
|
else
|
|
|
|
$timeout = $timeout/1000;
|
|
|
|
|
2021-05-13 14:41:32 +02:00
|
|
|
Cache::put($user->hashed_id.'_'.$user->account_id.'_logged_in', Str::random(64), $timeout);
|
2019-09-11 02:37:53 +02:00
|
|
|
|
2020-11-13 10:09:20 +01:00
|
|
|
$cu = CompanyUser::query()
|
|
|
|
->where('user_id', auth()->user()->id);
|
|
|
|
|
2021-05-11 06:57:36 +02:00
|
|
|
if(!$cu->exists())
|
|
|
|
return response()->json(['message' => 'User not linked to any companies'], 403);
|
|
|
|
|
2021-04-28 02:02:31 +02:00
|
|
|
$cu->first()->account->companies->each(function ($company) use($cu, $request){
|
|
|
|
|
|
|
|
if($company->tokens()->where('is_system', true)->count() == 0)
|
|
|
|
{
|
|
|
|
CreateCompanyToken::dispatchNow($company, $cu->first()->user, $request->server('HTTP_USER_AGENT'));
|
|
|
|
}
|
|
|
|
|
|
|
|
});
|
|
|
|
|
2021-04-29 00:44:40 +02:00
|
|
|
return $this->timeConstrainedResponse($cu);
|
|
|
|
// return $this->listResponse($cu);
|
2021-03-16 13:10:15 +01:00
|
|
|
|
2019-12-30 22:59:12 +01:00
|
|
|
} else {
|
2021-03-16 13:10:15 +01:00
|
|
|
|
2020-05-04 13:13:46 +02:00
|
|
|
LightLogs::create(new LoginFailure())
|
2020-04-30 14:33:57 +02:00
|
|
|
->increment()
|
|
|
|
->batch();
|
|
|
|
|
2021-05-12 08:31:02 +02:00
|
|
|
SystemLogger::dispatch(
|
2021-05-19 03:12:55 +02:00
|
|
|
json_encode(['ip' => request()->getClientIp()]),
|
2021-05-12 08:31:02 +02:00
|
|
|
SystemLog::CATEGORY_SECURITY,
|
|
|
|
SystemLog::EVENT_USER,
|
|
|
|
SystemLog::TYPE_LOGIN_FAILURE,
|
2021-05-19 03:12:23 +02:00
|
|
|
null,
|
|
|
|
Company::first(),
|
2021-05-12 08:31:02 +02:00
|
|
|
);
|
|
|
|
|
2019-04-19 09:59:48 +02:00
|
|
|
$this->incrementLoginAttempts($request);
|
|
|
|
|
2019-09-11 07:32:47 +02:00
|
|
|
return response()
|
|
|
|
->json(['message' => ctrans('texts.invalid_credentials')], 401)
|
|
|
|
->header('X-App-Version', config('ninja.app_version'))
|
2020-06-21 23:30:25 +02:00
|
|
|
->header('X-Api-Version', config('ninja.minimum_client_version'));
|
2021-03-16 13:10:15 +01:00
|
|
|
|
2019-04-19 09:59:48 +02:00
|
|
|
}
|
2019-04-19 03:59:07 +02:00
|
|
|
}
|
|
|
|
|
2019-10-07 00:00:02 +02:00
|
|
|
/**
|
2020-09-06 11:38:10 +02:00
|
|
|
* Refreshes the data feed with the current Company User.
|
2019-12-30 22:59:12 +01:00
|
|
|
*
|
2020-10-28 11:10:49 +01:00
|
|
|
* @param Request $request
|
2019-10-07 00:00:02 +02:00
|
|
|
* @return CompanyUser Refresh Feed.
|
|
|
|
*
|
2019-12-30 22:59:12 +01:00
|
|
|
*
|
2019-10-07 00:00:02 +02:00
|
|
|
* @OA\Post(
|
|
|
|
* path="/api/v1/refresh",
|
|
|
|
* operationId="refresh",
|
|
|
|
* tags={"refresh"},
|
|
|
|
* summary="Refreshes the dataset",
|
|
|
|
* description="Refreshes the dataset",
|
|
|
|
* @OA\Parameter(ref="#/components/parameters/X-Api-Secret"),
|
|
|
|
* @OA\Parameter(ref="#/components/parameters/X-Api-Token"),
|
|
|
|
* @OA\Parameter(ref="#/components/parameters/X-Requested-With"),
|
|
|
|
* @OA\Parameter(ref="#/components/parameters/include"),
|
|
|
|
* @OA\Parameter(ref="#/components/parameters/include_static"),
|
|
|
|
* @OA\Parameter(ref="#/components/parameters/clear_cache"),
|
|
|
|
* @OA\Response(
|
|
|
|
* response=200,
|
|
|
|
* description="The Company User response",
|
2020-06-21 23:30:25 +02:00
|
|
|
* @OA\Header(header="X-MINIMUM-CLIENT-VERSION", ref="#/components/headers/X-MINIMUM-CLIENT-VERSION"),
|
2019-10-07 00:00:02 +02:00
|
|
|
* @OA\Header(header="X-RateLimit-Remaining", ref="#/components/headers/X-RateLimit-Remaining"),
|
|
|
|
* @OA\Header(header="X-RateLimit-Limit", ref="#/components/headers/X-RateLimit-Limit"),
|
|
|
|
* @OA\JsonContent(ref="#/components/schemas/CompanyUser"),
|
|
|
|
* ),
|
|
|
|
* @OA\Response(
|
|
|
|
* response=422,
|
|
|
|
* description="Validation error",
|
|
|
|
* @OA\JsonContent(ref="#/components/schemas/ValidationError"),
|
|
|
|
* ),
|
|
|
|
* @OA\Response(
|
2019-12-30 22:59:12 +01:00
|
|
|
* response="default",
|
2019-10-07 00:00:02 +02:00
|
|
|
* description="Unexpected Error",
|
|
|
|
* @OA\JsonContent(ref="#/components/schemas/Error"),
|
|
|
|
* ),
|
|
|
|
* )
|
|
|
|
*/
|
2019-09-25 13:49:43 +02:00
|
|
|
public function refresh(Request $request)
|
|
|
|
{
|
2020-09-06 11:38:10 +02:00
|
|
|
$company_token = CompanyToken::whereRaw('BINARY `token`= ?', [$request->header('X-API-TOKEN')])->first();
|
2020-08-11 12:57:45 +02:00
|
|
|
|
|
|
|
$cu = CompanyUser::query()
|
2020-08-12 00:17:32 +02:00
|
|
|
->where('user_id', $company_token->user_id);
|
2020-08-08 02:32:47 +02:00
|
|
|
|
2021-04-28 02:02:31 +02:00
|
|
|
|
|
|
|
$cu->first()->account->companies->each(function ($company) use($cu, $request){
|
|
|
|
|
|
|
|
if($company->tokens()->where('is_system', true)->count() == 0)
|
|
|
|
{
|
|
|
|
CreateCompanyToken::dispatchNow($company, $cu->first()->user, $request->server('HTTP_USER_AGENT'));
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
2021-04-29 13:29:10 +02:00
|
|
|
|
2021-04-29 13:36:34 +02:00
|
|
|
if($request->has('current_company') && $request->input('current_company') == 'true')
|
|
|
|
$cu->where("company_id", $company_token->company_id);
|
2021-04-29 13:29:10 +02:00
|
|
|
|
2020-08-11 12:57:45 +02:00
|
|
|
return $this->refreshResponse($cu);
|
2019-09-25 13:49:43 +02:00
|
|
|
}
|
|
|
|
|
2019-05-22 05:18:18 +02:00
|
|
|
/**
|
2019-12-30 22:59:12 +01:00
|
|
|
* A client side authentication has taken place.
|
2019-05-22 05:18:18 +02:00
|
|
|
* We now digest the token and confirm authentication with
|
|
|
|
* the authentication server, the correct user object
|
|
|
|
* is returned to us here and we send back the correct
|
|
|
|
* user object payload - or error.
|
|
|
|
*
|
2019-12-30 22:59:12 +01:00
|
|
|
* This can be extended to a create route also - need to pass a ?create query parameter and
|
2019-05-23 02:25:55 +02:00
|
|
|
* then process the signup
|
2019-12-30 22:59:12 +01:00
|
|
|
*
|
2019-05-22 05:18:18 +02:00
|
|
|
* return User $user
|
|
|
|
*/
|
|
|
|
public function oauthApiLogin()
|
2020-05-13 06:51:16 +02:00
|
|
|
{
|
2020-09-06 11:38:10 +02:00
|
|
|
if (request()->input('provider') == 'google') {
|
2020-05-13 06:51:16 +02:00
|
|
|
return $this->handleGoogleOauth();
|
2020-09-06 11:38:10 +02:00
|
|
|
}
|
2020-05-13 06:51:16 +02:00
|
|
|
|
2020-05-13 11:02:38 +02:00
|
|
|
return response()
|
|
|
|
->json(['message' => 'Provider not supported'], 400)
|
|
|
|
->header('X-App-Version', config('ninja.app_version'))
|
2020-06-21 23:30:25 +02:00
|
|
|
->header('X-Api-Version', config('ninja.minimum_client_version'));
|
2020-05-13 06:51:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
private function handleGoogleOauth()
|
2019-05-22 05:18:18 +02:00
|
|
|
{
|
|
|
|
$user = false;
|
|
|
|
|
2020-05-13 07:38:42 +02:00
|
|
|
$google = new Google();
|
2019-05-22 05:18:18 +02:00
|
|
|
|
2020-05-13 07:38:42 +02:00
|
|
|
$user = $google->getTokenResponse(request()->input('id_token'));
|
|
|
|
|
2020-09-06 11:38:10 +02:00
|
|
|
if (is_array($user)) {
|
2021-03-16 12:29:16 +01:00
|
|
|
|
2021-05-22 06:45:09 +02:00
|
|
|
//
|
2020-05-13 06:51:16 +02:00
|
|
|
$query = [
|
2020-05-13 07:40:55 +02:00
|
|
|
'oauth_user_id' => $google->harvestSubField($user),
|
2020-09-06 11:38:10 +02:00
|
|
|
'oauth_provider_id'=> 'google',
|
2020-05-13 06:51:16 +02:00
|
|
|
];
|
|
|
|
|
2020-09-06 11:38:10 +02:00
|
|
|
if ($existing_user = MultiDB::hasUser($query)) {
|
2021-03-16 12:29:16 +01:00
|
|
|
|
2020-05-13 08:20:05 +02:00
|
|
|
Auth::login($existing_user, true);
|
2020-05-13 11:02:38 +02:00
|
|
|
$existing_user->setCompany($existing_user->account->default_company);
|
2021-05-05 08:44:31 +02:00
|
|
|
|
|
|
|
$timeout = $existing_user->company()->default_password_timeout;
|
|
|
|
|
|
|
|
if($timeout == 0)
|
|
|
|
$timeout = 30*60*1000*1000;
|
|
|
|
else
|
|
|
|
$timeout = $timeout/1000;
|
|
|
|
|
2021-05-13 14:41:32 +02:00
|
|
|
Cache::put($existing_user->hashed_id.'_'.$existing_user->account_id.'_logged_in', Str::random(64), $timeout);
|
2020-05-13 06:51:16 +02:00
|
|
|
|
2020-11-13 10:09:20 +01:00
|
|
|
$cu = CompanyUser::query()
|
|
|
|
->where('user_id', auth()->user()->id);
|
2020-05-13 06:51:16 +02:00
|
|
|
|
2021-04-28 02:02:31 +02:00
|
|
|
$cu->first()->account->companies->each(function ($company) use($cu){
|
|
|
|
|
|
|
|
if($company->tokens()->where('is_system', true)->count() == 0)
|
|
|
|
{
|
|
|
|
CreateCompanyToken::dispatchNow($company, $cu->first()->user, request()->server('HTTP_USER_AGENT'));
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
2021-04-29 03:31:04 +02:00
|
|
|
return $this->timeConstrainedResponse($cu);
|
2021-03-16 12:29:16 +01:00
|
|
|
|
2020-05-13 06:51:16 +02:00
|
|
|
}
|
2021-05-22 06:45:09 +02:00
|
|
|
|
|
|
|
//If this is a result user/email combo - lets add their OAuth details details
|
|
|
|
if($existing_login_user = MultiDB::hasUser(['email' => $google->harvestEmail($user)]))
|
|
|
|
{
|
|
|
|
Auth::login($existing_login_user, true);
|
|
|
|
$existing_login_user->setCompany($existing_login_user->account->default_company);
|
|
|
|
|
|
|
|
$timeout = $existing_login_user->company()->default_password_timeout;
|
|
|
|
|
|
|
|
if($timeout == 0)
|
|
|
|
$timeout = 30*60*1000*1000;
|
|
|
|
else
|
|
|
|
$timeout = $timeout/1000;
|
|
|
|
|
|
|
|
Cache::put($existing_login_user->hashed_id.'_'.$existing_login_user->account_id.'_logged_in', Str::random(64), $timeout);
|
|
|
|
|
|
|
|
auth()->user()->update([
|
|
|
|
'oauth_user_id' => $google->harvestSubField($user),
|
|
|
|
'oauth_provider_id'=> 'google',
|
|
|
|
]);
|
2021-05-22 23:57:53 +02:00
|
|
|
|
|
|
|
|
|
|
|
$cu = CompanyUser::query()
|
|
|
|
->where('user_id', auth()->user()->id);
|
|
|
|
|
|
|
|
$cu->first()->account->companies->each(function ($company) use($cu){
|
|
|
|
|
|
|
|
if($company->tokens()->where('is_system', true)->count() == 0)
|
|
|
|
{
|
|
|
|
CreateCompanyToken::dispatchNow($company, $cu->first()->user, request()->server('HTTP_USER_AGENT'));
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
return $this->timeConstrainedResponse($cu);
|
2021-05-22 06:45:09 +02:00
|
|
|
}
|
|
|
|
|
2020-09-06 11:38:10 +02:00
|
|
|
}
|
2020-05-13 08:20:05 +02:00
|
|
|
|
2020-09-06 11:38:10 +02:00
|
|
|
if ($user) {
|
2021-03-20 01:41:41 +01:00
|
|
|
|
2020-05-13 07:40:55 +02:00
|
|
|
$name = OAuth::splitName($google->harvestName($user));
|
2020-05-13 06:51:16 +02:00
|
|
|
|
|
|
|
$new_account = [
|
|
|
|
'first_name' => $name[0],
|
|
|
|
'last_name' => $name[1],
|
|
|
|
'password' => '',
|
2020-05-13 07:40:55 +02:00
|
|
|
'email' => $google->harvestEmail($user),
|
|
|
|
'oauth_user_id' => $google->harvestSubField($user),
|
2021-03-21 23:52:39 +01:00
|
|
|
// 'oauth_user_token' => $token,
|
|
|
|
// 'oauth_user_refresh_token' => $refresh_token,
|
2020-09-06 11:38:10 +02:00
|
|
|
'oauth_provider_id' => 'google',
|
2020-05-13 06:51:16 +02:00
|
|
|
];
|
2019-05-22 05:18:18 +02:00
|
|
|
|
2020-05-13 06:51:16 +02:00
|
|
|
MultiDB::setDefaultDatabase();
|
2020-09-06 11:38:10 +02:00
|
|
|
|
2020-05-13 06:51:16 +02:00
|
|
|
$account = CreateAccount::dispatchNow($new_account);
|
|
|
|
|
|
|
|
Auth::login($account->default_company->owner(), true);
|
2020-05-13 11:02:38 +02:00
|
|
|
|
|
|
|
auth()->user()->email_verified_at = now();
|
|
|
|
auth()->user()->save();
|
2021-05-05 08:44:31 +02:00
|
|
|
|
|
|
|
$timeout = auth()->user()->company()->default_password_timeout;
|
|
|
|
|
|
|
|
if($timeout == 0)
|
|
|
|
$timeout = 30*60*1000*1000;
|
|
|
|
else
|
|
|
|
$timeout = $timeout/1000;
|
|
|
|
|
2021-05-13 14:41:32 +02:00
|
|
|
Cache::put(auth()->user()->hashed_id.'_'.auth()->user()->account_id.'_logged_in', Str::random(64), $timeout);
|
2021-03-22 12:18:57 +01:00
|
|
|
|
2021-04-28 02:02:31 +02:00
|
|
|
$cu = CompanyUser::whereUserId(auth()->user()->id);
|
|
|
|
|
|
|
|
$cu->first()->account->companies->each(function ($company) use($cu){
|
2020-09-06 11:38:10 +02:00
|
|
|
|
2021-04-28 02:02:31 +02:00
|
|
|
if($company->tokens()->where('is_system', true)->count() == 0)
|
|
|
|
{
|
|
|
|
CreateCompanyToken::dispatchNow($company, $cu->first()->user, request()->server('HTTP_USER_AGENT'));
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
2021-04-29 03:31:04 +02:00
|
|
|
return $this->timeConstrainedResponse($cu);
|
2019-12-30 22:59:12 +01:00
|
|
|
}
|
2020-05-13 07:30:17 +02:00
|
|
|
|
|
|
|
return response()
|
|
|
|
->json(['message' => ctrans('texts.invalid_credentials')], 401)
|
|
|
|
->header('X-App-Version', config('ninja.app_version'))
|
2020-06-21 23:30:25 +02:00
|
|
|
->header('X-Api-Version', config('ninja.minimum_client_version'));
|
2019-05-22 05:18:18 +02:00
|
|
|
}
|
2018-10-04 19:10:43 +02:00
|
|
|
}
|