2019-10-22 13:27:03 +02:00
|
|
|
<?php
|
|
|
|
/**
|
2020-09-06 11:38:10 +02:00
|
|
|
* Invoice Ninja (https://invoiceninja.com).
|
2019-10-22 13:27:03 +02:00
|
|
|
*
|
|
|
|
* @link https://github.com/invoiceninja/invoiceninja source repository
|
|
|
|
*
|
2021-01-03 22:54:54 +01:00
|
|
|
* @copyright Copyright (c) 2021. Invoice Ninja LLC (https://invoiceninja.com)
|
2019-10-22 13:27:03 +02:00
|
|
|
*
|
|
|
|
* @license https://opensource.org/licenses/AAL
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace App\Http\Middleware;
|
|
|
|
|
2021-02-23 22:12:23 +01:00
|
|
|
use App\Libraries\MultiDB;
|
|
|
|
use App\Libraries\OAuth\Providers\Google;
|
2019-10-22 13:27:03 +02:00
|
|
|
use Closure;
|
2020-10-28 11:10:49 +01:00
|
|
|
use Illuminate\Http\Request;
|
2019-10-23 03:01:25 +02:00
|
|
|
use Illuminate\Support\Facades\Cache;
|
|
|
|
use Illuminate\Support\Facades\Hash;
|
2019-10-24 06:46:24 +02:00
|
|
|
use Illuminate\Support\Str;
|
2020-10-28 11:10:49 +01:00
|
|
|
use stdClass;
|
2019-10-22 13:27:03 +02:00
|
|
|
|
|
|
|
class PasswordProtection
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Handle an incoming request.
|
|
|
|
*
|
2020-10-28 11:10:49 +01:00
|
|
|
* @param Request $request
|
|
|
|
* @param Closure $next
|
2019-10-22 13:27:03 +02:00
|
|
|
* @return mixed
|
|
|
|
*/
|
|
|
|
public function handle($request, Closure $next)
|
|
|
|
{
|
2021-05-13 14:41:32 +02:00
|
|
|
|
2019-10-22 13:27:03 +02:00
|
|
|
$error = [
|
|
|
|
'message' => 'Invalid Password',
|
2020-10-28 11:10:49 +01:00
|
|
|
'errors' => new stdClass,
|
2019-10-22 13:27:03 +02:00
|
|
|
];
|
|
|
|
|
2021-03-09 11:52:48 +01:00
|
|
|
$timeout = auth()->user()->company()->default_password_timeout;
|
2021-03-04 06:03:28 +01:00
|
|
|
|
2021-03-09 11:52:48 +01:00
|
|
|
if($timeout == 0)
|
2021-05-05 08:44:31 +02:00
|
|
|
$timeout = 30*60*1000*1000;
|
2021-03-09 11:52:48 +01:00
|
|
|
else
|
2021-05-05 08:44:31 +02:00
|
|
|
$timeout = $timeout/1000;
|
2021-03-04 06:03:28 +01:00
|
|
|
|
2021-05-13 14:41:32 +02:00
|
|
|
if (Cache::get(auth()->user()->hashed_id.'_'.auth()->user()->account_id.'_logged_in')) {
|
2021-03-04 06:03:28 +01:00
|
|
|
|
2021-05-13 14:41:32 +02:00
|
|
|
Cache::put(auth()->user()->hashed_id.'_'.auth()->user()->account_id.'_logged_in', Str::random(64), $timeout);
|
2021-03-04 06:03:28 +01:00
|
|
|
|
|
|
|
return $next($request);
|
|
|
|
|
|
|
|
}elseif( $request->header('X-API-OAUTH-PASSWORD') && strlen($request->header('X-API-OAUTH-PASSWORD')) >=1){
|
2021-02-23 22:12:23 +01:00
|
|
|
|
|
|
|
//user is attempting to reauth with OAuth - check the token value
|
|
|
|
//todo expand this to include all OAuth providers
|
|
|
|
$user = false;
|
|
|
|
$google = new Google();
|
|
|
|
$user = $google->getTokenResponse(request()->header('X-API-OAUTH-PASSWORD'));
|
|
|
|
|
2021-06-09 08:01:09 +02:00
|
|
|
nlog("user");
|
|
|
|
nlog($user);
|
|
|
|
|
2021-02-23 22:12:23 +01:00
|
|
|
if (is_array($user)) {
|
|
|
|
|
|
|
|
$query = [
|
|
|
|
'oauth_user_id' => $google->harvestSubField($user),
|
2021-03-04 06:03:28 +01:00
|
|
|
'oauth_provider_id'=> 'google'
|
2021-02-23 22:12:23 +01:00
|
|
|
];
|
|
|
|
|
2021-06-09 08:01:09 +02:00
|
|
|
nlog($query);
|
|
|
|
|
2021-03-04 06:03:28 +01:00
|
|
|
//If OAuth and user also has a password set - check both
|
2021-06-09 08:22:25 +02:00
|
|
|
if ($existing_user = MultiDB::hasUser($query) && auth()->user()->company()->oauth_password_required && auth()->user()->has_password && Hash::check(auth()->user()->password, $request->header('X-API-PASSWORD'))) {
|
2021-03-04 06:03:28 +01:00
|
|
|
|
2021-06-09 08:01:09 +02:00
|
|
|
nlog("existing user with password");
|
|
|
|
|
2021-05-13 14:41:32 +02:00
|
|
|
Cache::put(auth()->user()->hashed_id.'_'.auth()->user()->account_id.'_logged_in', Str::random(64), $timeout);
|
|
|
|
|
2021-02-23 22:12:23 +01:00
|
|
|
return $next($request);
|
|
|
|
}
|
2021-06-09 08:22:25 +02:00
|
|
|
elseif($existing_user = MultiDB::hasUser($query) && !auth()->user()->company()->oauth_password_required){
|
2021-02-23 22:12:23 +01:00
|
|
|
|
2021-06-09 08:01:09 +02:00
|
|
|
nlog("existing user without password");
|
2021-06-09 08:22:25 +02:00
|
|
|
|
2021-05-13 14:41:32 +02:00
|
|
|
Cache::put(auth()->user()->hashed_id.'_'.auth()->user()->account_id.'_logged_in', Str::random(64), $timeout);
|
2021-03-04 06:03:28 +01:00
|
|
|
return $next($request);
|
|
|
|
}
|
|
|
|
}
|
2021-02-23 22:12:23 +01:00
|
|
|
|
|
|
|
return response()->json($error, 412);
|
|
|
|
|
|
|
|
|
2021-03-04 06:03:28 +01:00
|
|
|
}elseif ($request->header('X-API-PASSWORD') && Hash::check($request->header('X-API-PASSWORD'), auth()->user()->password)) {
|
2021-02-23 22:12:23 +01:00
|
|
|
|
2021-05-13 14:41:32 +02:00
|
|
|
Cache::put(auth()->user()->hashed_id.'_'.auth()->user()->account_id.'_logged_in', Str::random(64), $timeout);
|
2020-02-17 10:37:44 +01:00
|
|
|
|
2019-10-22 13:27:03 +02:00
|
|
|
return $next($request);
|
2021-02-23 22:12:23 +01:00
|
|
|
|
2019-12-30 22:59:12 +01:00
|
|
|
} else {
|
2021-02-23 22:12:23 +01:00
|
|
|
|
2019-12-30 22:59:12 +01:00
|
|
|
return response()->json($error, 412);
|
2019-10-22 13:27:03 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
}
|
2021-03-09 11:30:34 +01:00
|
|
|
}
|