1
0
mirror of https://github.com/invoiceninja/invoiceninja.git synced 2024-09-22 01:11:34 +02:00
invoiceninja/app/Jobs/Mail/NinjaMailerJob.php

656 lines
21 KiB
PHP
Raw Normal View History

2021-02-14 11:43:44 +01:00
<?php
/**
* Invoice Ninja (https://invoiceninja.com).
*
* @link https://github.com/invoiceninja/invoiceninja source repository
*
2023-01-28 23:21:40 +01:00
* @copyright Copyright (c) 2023. Invoice Ninja LLC (https://invoiceninja.com)
2021-02-14 11:43:44 +01:00
*
2021-06-16 08:58:16 +02:00
* @license https://www.elastic.co/licensing/elastic-license
2021-02-14 11:43:44 +01:00
*/
namespace App\Jobs\Mail;
use App\DataMapper\Analytics\EmailFailure;
2021-04-24 15:19:46 +02:00
use App\DataMapper\Analytics\EmailSuccess;
2021-02-16 13:56:12 +01:00
use App\Events\Invoice\InvoiceWasEmailedAndFailed;
2021-02-18 00:30:31 +01:00
use App\Events\Payment\PaymentWasEmailedAndFailed;
2021-02-14 11:43:44 +01:00
use App\Jobs\Mail\NinjaMailerObject;
use App\Jobs\Util\SystemLogger;
use App\Libraries\Google\Google;
use App\Libraries\MultiDB;
use App\Models\ClientContact;
2021-05-13 15:37:25 +02:00
use App\Models\Company;
2021-02-18 00:30:31 +01:00
use App\Models\Invoice;
use App\Models\Payment;
2021-02-14 11:43:44 +01:00
use App\Models\SystemLog;
use App\Models\User;
use App\Utils\Ninja;
use App\Utils\Traits\MakesHash;
2021-09-06 05:07:11 +02:00
use GuzzleHttp\Exception\ClientException;
2021-02-14 11:43:44 +01:00
use Illuminate\Bus\Queueable;
use Illuminate\Contracts\Queue\ShouldQueue;
use Illuminate\Foundation\Bus\Dispatchable;
use Illuminate\Queue\InteractsWithQueue;
use Illuminate\Queue\SerializesModels;
use Illuminate\Support\Facades\App;
use Illuminate\Support\Facades\Mail;
use Turbo124\Beacon\Facades\LightLogs;
2021-08-07 11:32:31 +02:00
use Illuminate\Support\Facades\Cache;
2021-02-14 11:43:44 +01:00
/*Multi Mailer implemented*/
class NinjaMailerJob implements ShouldQueue
{
use Dispatchable, InteractsWithQueue, Queueable, SerializesModels, MakesHash;
public $tries = 4; //number of retries
2021-02-14 11:43:44 +01:00
public $deleteWhenMissingModels = true;
public $nmo;
public $override;
2023-01-29 06:19:20 +01:00
/* @var Company $company*/
public $company;
2021-06-17 09:48:23 +02:00
private $mailer;
2023-01-11 09:29:27 +01:00
protected $client_postmark_secret = false;
protected $client_mailgun_secret = false;
protected $client_mailgun_domain = false;
public function __construct(NinjaMailerObject $nmo, bool $override = false)
2021-02-14 11:43:44 +01:00
{
$this->nmo = $nmo;
2023-01-11 09:29:27 +01:00
2021-05-22 08:03:34 +02:00
$this->override = $override;
2021-02-14 11:43:44 +01:00
}
public function backoff()
{
2023-01-31 23:52:12 +01:00
return [5, 10, 30, 240];
}
2021-02-14 11:43:44 +01:00
public function handle()
{
2021-02-16 13:56:12 +01:00
/*Set the correct database*/
2021-02-14 11:43:44 +01:00
MultiDB::setDb($this->nmo->company->db);
/* Serializing models from other jobs wipes the primary key */
$this->company = Company::where('company_key', $this->nmo->company->company_key)->first();
2021-05-13 15:37:25 +02:00
2023-01-11 09:29:27 +01:00
/* If any pre conditions fail, we return early here */
2023-01-15 05:22:29 +01:00
if(!$this->company || $this->preFlightChecksFail())
2021-08-07 12:56:42 +02:00
return;
2021-02-16 13:56:12 +01:00
/* Set the email driver */
2021-02-14 11:43:44 +01:00
$this->setMailDriver();
2023-01-11 09:29:27 +01:00
/* Run time we set Reply To Email*/
2021-02-24 00:39:37 +01:00
if (strlen($this->nmo->settings->reply_to_email) > 1) {
2021-05-03 06:50:55 +02:00
if(property_exists($this->nmo->settings, 'reply_to_name'))
$reply_to_name = strlen($this->nmo->settings->reply_to_name) > 3 ? $this->nmo->settings->reply_to_name : $this->nmo->settings->reply_to_email;
else
$reply_to_name = $this->nmo->settings->reply_to_email;
2021-02-24 00:39:37 +01:00
$this->nmo->mailable->replyTo($this->nmo->settings->reply_to_email, $reply_to_name);
}
2021-05-13 00:13:33 +02:00
else {
$this->nmo->mailable->replyTo($this->company->owner()->email, $this->company->owner()->present()->name());
2021-05-13 00:13:33 +02:00
}
2023-01-11 09:29:27 +01:00
/* Run time we set the email tag */
2022-08-07 09:34:23 +02:00
$this->nmo->mailable->tag($this->company->company_key);
2023-01-11 09:29:27 +01:00
/* If we have an invitation present, we pass the invitation key into the email headers*/
2022-08-17 09:18:30 +02:00
if($this->nmo->invitation)
{
$this->nmo
->mailable
->withSymfonyMessage(function ($message) {
$message->getHeaders()->addTextHeader('x-invitation', $this->nmo->invitation->key);
});
}
2021-02-14 11:43:44 +01:00
//send email
try {
2023-01-29 06:19:20 +01:00
nlog("Trying to send to {$this->nmo->to_user->email} ". now()->toDateTimeString());
2021-06-23 00:17:22 +02:00
nlog("Using mailer => ". $this->mailer);
2023-01-11 09:29:27 +01:00
$mailer = Mail::mailer($this->mailer);
if($this->client_postmark_secret){
$mailer->postmark_config($this->client_postmark_secret);
}
if($this->client_mailgun_secret){
$mailer->mailgun_config($this->client_mailgun_secret, $this->client_mailgun_domain);
}
$mailer
->to($this->nmo->to_user->email)
->send($this->nmo->mailable);
2021-04-25 00:18:35 +02:00
2021-08-07 11:32:31 +02:00
/* Count the amount of emails sent across all the users accounts */
Cache::increment($this->company->account->key);
2021-07-23 11:38:30 +02:00
LightLogs::create(new EmailSuccess($this->nmo->company->company_key))
->send();
2022-11-01 07:10:05 +01:00
$this->nmo = null;
$this->company = null;
2022-11-01 11:20:28 +01:00
2023-01-29 06:19:20 +01:00
}
catch(\Symfony\Component\Mime\Exception\RfcComplianceException $e) {
nlog("Mailer failed with a Logic Exception {$e->getMessage()}");
$this->fail();
$this->cleanUpMailers();
$this->logMailError($e->getMessage(), $this->company->clients()->first());
return;
}
catch(\Symfony\Component\Mime\Exception\LogicException $e){
nlog("Mailer failed with a Logic Exception {$e->getMessage()}");
$this->fail();
$this->cleanUpMailers();
$this->logMailError($e->getMessage(), $this->company->clients()->first());
return;
}
catch (\Exception | \Google\Service\Exception $e) {
2021-07-23 11:38:30 +02:00
nlog("Mailer failed with {$e->getMessage()}");
2021-09-06 05:07:11 +02:00
$message = $e->getMessage();
2021-09-08 03:04:50 +02:00
/**
* Post mark buries the proper message in a a guzzle response
* this merges a text string with a json object
* need to harvest the ->Message property using the following
*/
if(stripos($e->getMessage(), 'code 406') || stripos($e->getMessage(), 'code 300') || stripos($e->getMessage(), 'code 413'))
{
2021-09-06 05:07:11 +02:00
$message = "Either Attachment too large, or recipient has been suppressed.";
$this->fail();
$this->logMailError($e->getMessage(), $this->company->clients()->first());
$this->cleanUpMailers();
return;
2021-09-06 05:07:11 +02:00
}
//only report once, not on all tries
if($this->attempts() == $this->tries)
{
2021-05-20 23:58:46 +02:00
/* If the is an entity attached to the message send a failure mailer */
if($this->nmo->entity)
$this->entityEmailFailed($message);
2022-11-01 11:20:28 +01:00
/* Don't send postmark failures to Sentry */
if(Ninja::isHosted() && (!$e instanceof ClientException))
app('sentry')->captureException($e);
}
2023-01-29 08:29:35 +01:00
/* Releasing immediately does not add in the backoff */
$this->release($this->backoff()[$this->attempts()-1]);
2022-11-01 11:20:28 +01:00
2023-01-29 08:29:35 +01:00
}
/*Clean up mailers*/
2023-01-11 09:29:27 +01:00
$this->cleanUpMailers();
2021-02-16 13:56:12 +01:00
}
2023-01-11 09:29:27 +01:00
/**
* Entity notification when an email fails to send
*
* @param string $message
* @return void
*/
private function entityEmailFailed($message): void
2021-02-16 13:56:12 +01:00
{
2021-02-18 00:30:31 +01:00
$class = get_class($this->nmo->entity);
switch ($class) {
case Invoice::class:
2021-04-14 06:41:04 +02:00
event(new InvoiceWasEmailedAndFailed($this->nmo->invitation, $this->nmo->company, $message, $this->nmo->reminder_template, Ninja::eventVars(auth()->user() ? auth()->user()->id : null)));
2021-02-16 13:56:12 +01:00
break;
2021-02-18 00:30:31 +01:00
case Payment::class:
2021-04-14 07:28:05 +02:00
event(new PaymentWasEmailedAndFailed($this->nmo->entity, $this->nmo->company, $message, Ninja::eventVars(auth()->user() ? auth()->user()->id : null)));
2021-02-18 00:30:31 +01:00
break;
2021-02-16 13:56:12 +01:00
default:
# code...
break;
2021-02-14 11:43:44 +01:00
}
2021-02-18 00:30:31 +01:00
if ($this->nmo->to_user instanceof ClientContact)
2021-02-18 01:12:49 +01:00
$this->logMailError($message, $this->nmo->to_user->client);
2022-11-01 12:23:52 +01:00
2021-02-14 11:43:44 +01:00
}
2023-01-11 09:29:27 +01:00
/**
* Initializes the configured Mailer
*/
2021-02-14 11:43:44 +01:00
private function setMailDriver()
{
/* Singletons need to be rebooted each time just in case our Locale is changing*/
App::forgetInstance('translator');
2021-05-31 12:40:34 +02:00
$t = app('translator');
$t->replace(Ninja::transformTranslations($this->nmo->settings));
2021-02-14 11:43:44 +01:00
switch ($this->nmo->settings->email_sending_method) {
case 'default':
2021-06-17 09:48:23 +02:00
$this->mailer = config('mail.default');
2021-02-14 11:43:44 +01:00
break;
case 'gmail':
2021-06-17 09:48:23 +02:00
$this->mailer = 'gmail';
2021-02-14 11:43:44 +01:00
$this->setGmailMailer();
2023-01-11 09:29:27 +01:00
return;
2022-06-17 10:28:31 +02:00
case 'office365':
$this->mailer = 'office365';
$this->setOfficeMailer();
2023-01-11 09:29:27 +01:00
return;
case 'client_postmark':
$this->mailer = 'postmark';
$this->setPostmarkMailer();
return;
case 'client_mailgun':
$this->mailer = 'mailgun';
$this->setMailgunMailer();
return;
2021-02-14 11:43:44 +01:00
default:
break;
}
2021-02-17 01:25:30 +01:00
2022-11-02 07:30:55 +01:00
if(Ninja::isSelfHost())
$this->setSelfHostMultiMailer();
2021-02-14 11:43:44 +01:00
}
2023-01-11 09:29:27 +01:00
/**
* Allows configuration of multiple mailers
* per company for use by self hosted users
*/
private function setSelfHostMultiMailer(): void
2022-11-02 07:30:55 +01:00
{
if (env($this->company->id . '_MAIL_HOST'))
{
config([
'mail.mailers.smtp' => [
'transport' => 'smtp',
'host' => env($this->company->id . '_MAIL_HOST'),
'port' => env($this->company->id . '_MAIL_PORT'),
'username' => env($this->company->id . '_MAIL_USERNAME'),
'password' => env($this->company->id . '_MAIL_PASSWORD'),
],
]);
if(env($this->company->id . '_MAIL_FROM_ADDRESS'))
{
$this->nmo
->mailable
->from(env($this->company->id . '_MAIL_FROM_ADDRESS', env('MAIL_FROM_ADDRESS')), env($this->company->id . '_MAIL_FROM_NAME', env('MAIL_FROM_NAME')));
}
2022-11-02 07:30:55 +01:00
}
}
2023-01-11 09:29:27 +01:00
/**
* Ensure we discard any data that is not required
*
* @return void
*/
private function cleanUpMailers(): void
{
$this->client_postmark_secret = false;
2022-11-02 07:30:55 +01:00
2023-01-11 09:29:27 +01:00
$this->client_mailgun_secret = false;
$this->client_mailgun_domain = false;
//always dump the drivers to prevent reuse
app('mail.manager')->forgetMailers();
}
/**
* Check to ensure no cross account
* emails can be sent.
*
* @param User $user
*/
private function checkValidSendingUser($user)
{
/* Always ensure the user is set on the correct account */
if($user->account_id != $this->company->account_id){
$this->nmo->settings->email_sending_method = 'default';
return $this->setMailDriver();
}
}
/**
* Resolves the sending user
* when configuring the Mailer
* on behalf of the client
*
* @return User $user
*/
private function resolveSendingUser(): ?User
2022-06-17 10:28:31 +02:00
{
$sending_user = $this->nmo->settings->gmail_sending_user_id;
2023-01-15 05:36:00 +01:00
if($sending_user == "0")
$user = $this->company->owner();
else
$user = User::find($this->decodePrimaryKey($sending_user));
2022-06-27 08:37:18 +02:00
2023-01-11 09:29:27 +01:00
return $user;
}
/**
* Configures Mailgun using client supplied secret
* as the Mailer
*/
private function setMailgunMailer()
{
if(strlen($this->nmo->settings->mailgun_secret) > 2 && strlen($this->nmo->settings->mailgun_domain) > 2){
$this->client_mailgun_secret = $this->nmo->settings->mailgun_secret;
$this->client_mailgun_domain = $this->nmo->settings->mailgun_domain;
}
else{
2022-06-27 08:37:18 +02:00
$this->nmo->settings->email_sending_method = 'default';
return $this->setMailDriver();
2023-01-11 09:29:27 +01:00
}
$user = $this->resolveSendingUser();
$sending_email = (isset($this->nmo->settings->custom_sending_email) && stripos($this->nmo->settings->custom_sending_email, "@")) ? $this->nmo->settings->custom_sending_email : $user->email;
$sending_user = (isset($this->nmo->settings->email_from_name) && strlen($this->nmo->settings->email_from_name) > 2) ? $this->nmo->settings->email_from_name : $user->name();
2023-01-11 09:29:27 +01:00
$this->nmo
->mailable
->from($sending_email, $sending_user);
2023-01-11 09:29:27 +01:00
}
2022-06-27 08:37:18 +02:00
2023-01-11 09:29:27 +01:00
/**
* Configures Postmark using client supplied secret
* as the Mailer
*/
private function setPostmarkMailer()
2023-02-15 13:09:27 +01:00
{
2023-01-11 09:29:27 +01:00
if(strlen($this->nmo->settings->postmark_secret) > 2){
$this->client_postmark_secret = $this->nmo->settings->postmark_secret;
}
else{
$this->nmo->settings->email_sending_method = 'default';
return $this->setMailDriver();
2022-06-27 08:37:18 +02:00
}
2023-01-11 09:29:27 +01:00
$user = $this->resolveSendingUser();
$sending_email = (isset($this->nmo->settings->custom_sending_email) && stripos($this->nmo->settings->custom_sending_email, "@")) ? $this->nmo->settings->custom_sending_email : $user->email;
$sending_user = (isset($this->nmo->settings->email_from_name) && strlen($this->nmo->settings->email_from_name) > 2) ? $this->nmo->settings->email_from_name : $user->name();
2023-02-15 13:09:27 +01:00
2023-01-11 09:29:27 +01:00
$this->nmo
->mailable
->from($sending_email, $sending_user);
2023-01-11 09:29:27 +01:00
}
/**
* Configures Microsoft via Oauth
* as the Mailer
*/
private function setOfficeMailer()
{
$user = $this->resolveSendingUser();
$this->checkValidSendingUser($user);
2022-06-17 10:28:31 +02:00
nlog("Sending via {$user->name()}");
2022-06-17 10:37:45 +02:00
$token = $this->refreshOfficeToken($user);
if($token)
{
$user->oauth_user_token = $token;
$user->save();
}
else {
$this->nmo->settings->email_sending_method = 'default';
return $this->setMailDriver();
}
2022-06-17 10:28:31 +02:00
$this->nmo
->mailable
->from($user->email, $user->name())
2022-07-31 11:11:32 +02:00
->withSymfonyMessage(function ($message) use($token) {
2022-07-31 13:51:35 +02:00
$message->getHeaders()->addTextHeader('gmailtoken', $token);
2022-06-17 10:28:31 +02:00
});
2022-06-17 10:37:45 +02:00
2022-06-17 10:28:31 +02:00
}
2023-01-11 09:29:27 +01:00
/**
* Configures GMail via Oauth
* as the Mailer
*/
2021-02-14 11:43:44 +01:00
private function setGmailMailer()
{
2021-02-17 01:25:30 +01:00
2023-01-11 09:29:27 +01:00
$user = $this->resolveSendingUser();
2021-02-14 11:43:44 +01:00
2023-01-11 09:29:27 +01:00
$this->checkValidSendingUser($user);
2021-02-14 11:43:44 +01:00
2021-02-22 10:54:46 +01:00
nlog("Sending via {$user->name()}");
2021-02-16 12:19:07 +01:00
2021-02-14 11:43:44 +01:00
$google = (new Google())->init();
try{
if ($google->getClient()->isAccessTokenExpired()) {
$google->refreshToken($user);
$user = $user->fresh();
}
$google->getClient()->setAccessToken(json_encode($user->oauth_user_token));
}
catch(\Exception $e) {
$this->logMailError('Gmail Token Invalid', $this->company->clients()->first());
$this->nmo->settings->email_sending_method = 'default';
return $this->setMailDriver();
}
2021-02-14 11:43:44 +01:00
2022-03-23 22:34:52 +01:00
/**
* If the user doesn't have a valid token, notify them
*/
if(!$user->oauth_user_token) {
$this->company->account->gmailCredentialNotification();
$this->nmo->settings->email_sending_method = 'default';
return $this->setMailDriver();
2022-03-23 22:34:52 +01:00
}
2021-02-14 11:43:44 +01:00
/*
* Now that our token is refreshed and valid we can boot the
* mail driver at runtime and also set the token which will persist
* just for this request.
*/
$token = $user->oauth_user_token->access_token;
2021-02-17 01:25:30 +01:00
if(!$token) {
$this->company->account->gmailCredentialNotification();
$this->nmo->settings->email_sending_method = 'default';
return $this->setMailDriver();
}
$this->nmo
->mailable
2021-02-22 10:54:46 +01:00
->from($user->email, $user->name())
2022-07-31 11:11:32 +02:00
->withSymfonyMessage(function ($message) use($token) {
2022-07-31 13:51:35 +02:00
$message->getHeaders()->addTextHeader('gmailtoken', $token);
});
2021-02-14 11:43:44 +01:00
}
2023-01-11 09:29:27 +01:00
/**
* On the hosted platform we scan all outbound email for
* spam. This sequence processes the filters we use on all
* emails.
*
* @return bool
*/
private function preFlightChecksFail(): bool
2021-06-29 22:23:23 +02:00
{
2021-06-29 22:23:23 +02:00
/* If we are migrating data we don't want to fire any emails */
2022-07-01 13:08:20 +02:00
if($this->company->is_disabled && !$this->override)
2021-06-29 22:23:23 +02:00
return true;
2022-08-19 04:09:50 +02:00
/* To handle spam users we drop all emails from flagged accounts */
if(Ninja::isHosted() && $this->company->account && $this->company->account->is_flagged)
return true;
2021-06-29 22:23:23 +02:00
/* On the hosted platform we set default contacts a @example.com email address - we shouldn't send emails to these types of addresses */
if(Ninja::isHosted() && $this->nmo->to_user && strpos($this->nmo->to_user->email, '@example.com') !== false)
2021-06-29 22:23:23 +02:00
return true;
2021-08-09 12:33:59 +02:00
/* GMail users are uncapped */
if(Ninja::isHosted() && ($this->nmo->settings->email_sending_method == 'gmail' || $this->nmo->settings->email_sending_method == 'office365'))
2021-08-09 12:33:59 +02:00
return false;
2022-08-19 02:36:13 +02:00
/* On the hosted platform, if the user is over the email quotas, we do not send the email. */
if(Ninja::isHosted() && $this->company->account && $this->company->account->emailQuotaExceeded())
return true;
2022-07-23 01:19:06 +02:00
/* If the account is verified, we allow emails to flow */
2022-07-24 09:44:40 +02:00
if(Ninja::isHosted() && $this->company->account && $this->company->account->is_verified_account) {
2023-01-11 09:29:27 +01:00
//11-01-2022
2022-07-24 09:44:40 +02:00
/* Continue to analyse verified accounts in case they later start sending poor quality emails*/
// if(class_exists(\Modules\Admin\Jobs\Account\EmailQuality::class))
// (new \Modules\Admin\Jobs\Account\EmailQuality($this->nmo, $this->company))->run();
2022-07-24 09:44:40 +02:00
2022-07-23 01:19:06 +02:00
return false;
2022-07-24 09:44:40 +02:00
}
2022-07-23 01:19:06 +02:00
/* Ensure the user has a valid email address */
if(!str_contains($this->nmo->to_user->email, "@"))
return true;
2022-08-31 06:30:23 +02:00
/* On the hosted platform if the user has not verified their account we fail here - but still check what they are trying to send! */
if(Ninja::isHosted() && $this->company->account && !$this->company->account->account_sms_verified){
if(class_exists(\Modules\Admin\Jobs\Account\EmailQuality::class))
return (new \Modules\Admin\Jobs\Account\EmailQuality($this->nmo, $this->company))->run();
return true;
2022-08-31 06:30:23 +02:00
}
2022-08-31 04:05:15 +02:00
/* On the hosted platform we actively scan all outbound emails to ensure outbound email quality remains high */
if(class_exists(\Modules\Admin\Jobs\Account\EmailQuality::class))
return (new \Modules\Admin\Jobs\Account\EmailQuality($this->nmo, $this->company))->run();
2021-06-29 22:23:23 +02:00
return false;
}
2023-01-11 09:29:27 +01:00
/**
* Logs any errors to the SystemLog
*
* @param string $errors
* @param App\Models\User | App\Models\Client $recipient_object
* @return void
*/
private function logMailError($errors, $recipient_object) :void
2021-02-14 11:43:44 +01:00
{
2021-09-06 05:07:11 +02:00
2022-12-12 05:27:22 +01:00
(new SystemLogger(
2021-02-14 11:43:44 +01:00
$errors,
SystemLog::CATEGORY_MAIL,
SystemLog::EVENT_MAIL_SEND,
SystemLog::TYPE_FAILURE,
$recipient_object,
$this->nmo->company
2022-12-12 05:27:22 +01:00
))->handle();
2021-02-14 11:43:44 +01:00
2021-04-24 15:19:46 +02:00
$job_failure = new EmailFailure($this->nmo->company->company_key);
2021-04-25 06:36:22 +02:00
$job_failure->string_metric5 = 'failed_email';
2021-09-06 05:07:11 +02:00
$job_failure->string_metric6 = substr($errors, 0, 150);
2021-02-14 11:43:44 +01:00
LightLogs::create($job_failure)
->send();
2022-11-01 07:10:05 +01:00
$job_failure = null;
2021-02-14 11:43:44 +01:00
}
2021-08-07 11:32:31 +02:00
2023-01-11 09:29:27 +01:00
/**
* Attempts to refresh the Microsoft refreshToken
*
* @param App\Models\User
* @return string | boool
*/
2022-06-17 10:37:45 +02:00
private function refreshOfficeToken($user)
{
2022-06-22 11:18:00 +02:00
$expiry = $user->oauth_user_token_expiry ?: now()->subDay();
2022-06-17 10:37:45 +02:00
2022-06-22 11:18:00 +02:00
if($expiry->lt(now()))
2022-06-22 11:15:31 +02:00
{
$guzzle = new \GuzzleHttp\Client();
$url = 'https://login.microsoftonline.com/common/oauth2/v2.0/token';
$token = json_decode($guzzle->post($url, [
'form_params' => [
'client_id' => config('ninja.o365.client_id') ,
'client_secret' => config('ninja.o365.client_secret') ,
'scope' => 'email Mail.Send offline_access profile User.Read openid',
2022-06-22 11:15:31 +02:00
'grant_type' => 'refresh_token',
'refresh_token' => $user->oauth_user_refresh_token
],
])->getBody()->getContents());
2022-06-22 11:26:14 +02:00
2022-06-22 11:15:31 +02:00
if($token){
2022-06-22 11:21:58 +02:00
$user->oauth_user_refresh_token = property_exists($token, 'refresh_token') ? $token->refresh_token : $user->oauth_user_refresh_token;
2022-06-22 11:15:31 +02:00
$user->oauth_user_token = $token->access_token;
$user->oauth_user_token_expiry = now()->addSeconds($token->expires_in);
$user->save();
return $token->access_token;
}
return false;
}
2022-07-03 07:52:13 +02:00
return $user->oauth_user_token;
2022-06-22 11:15:31 +02:00
2022-06-17 10:37:45 +02:00
}
2023-01-11 09:29:27 +01:00
public function failed($exception = null)
{
config(['queue.failed.driver' => null]);
2023-01-11 09:29:27 +01:00
}
2021-08-07 11:32:31 +02:00
}