2018-10-04 19:10:43 +02:00
|
|
|
<?php
|
2019-05-11 05:32:07 +02:00
|
|
|
/**
|
2020-09-06 11:38:10 +02:00
|
|
|
* Invoice Ninja (https://invoiceninja.com).
|
2019-05-11 05:32:07 +02:00
|
|
|
*
|
|
|
|
* @link https://github.com/invoiceninja/invoiceninja source repository
|
|
|
|
*
|
2022-04-27 05:20:41 +02:00
|
|
|
* @copyright Copyright (c) 2022. Invoice Ninja LLC (https://invoiceninja.com)
|
2019-05-11 05:32:07 +02:00
|
|
|
*
|
2021-06-16 08:58:16 +02:00
|
|
|
* @license https://www.elastic.co/licensing/elastic-license
|
2019-05-11 05:32:07 +02:00
|
|
|
*/
|
2018-10-04 19:10:43 +02:00
|
|
|
|
|
|
|
namespace App\Exceptions;
|
|
|
|
|
2021-04-12 06:36:51 +02:00
|
|
|
use App\Exceptions\FilePermissionsFailure;
|
|
|
|
use App\Exceptions\InternalPDFFailure;
|
|
|
|
use App\Exceptions\PhantomPDFFailure;
|
2021-08-15 08:21:18 +02:00
|
|
|
use App\Exceptions\StripeConnectFailure;
|
2021-05-19 00:08:37 +02:00
|
|
|
use App\Utils\Ninja;
|
2018-10-04 19:10:43 +02:00
|
|
|
use Exception;
|
2019-10-03 02:17:29 +02:00
|
|
|
use Illuminate\Auth\Access\AuthorizationException;
|
2018-10-15 07:00:48 +02:00
|
|
|
use Illuminate\Auth\AuthenticationException;
|
2019-04-02 08:36:49 +02:00
|
|
|
use Illuminate\Database\Eloquent\ModelNotFoundException as ModelNotFoundException;
|
2020-05-28 11:40:35 +02:00
|
|
|
use Illuminate\Database\Eloquent\RelationNotFoundException;
|
2022-10-24 00:07:55 +02:00
|
|
|
use Illuminate\Database\QueryException;
|
2019-04-19 09:59:48 +02:00
|
|
|
use Illuminate\Foundation\Exceptions\Handler as ExceptionHandler;
|
|
|
|
use Illuminate\Http\Exceptions\ThrottleRequestsException;
|
2020-10-28 11:10:49 +01:00
|
|
|
use Illuminate\Http\Request;
|
|
|
|
use Illuminate\Http\Response;
|
|
|
|
use Illuminate\Queue\MaxAttemptsExceededException;
|
|
|
|
use Illuminate\Session\TokenMismatchException;
|
2019-10-01 03:56:48 +02:00
|
|
|
use Illuminate\Support\Arr;
|
2020-05-28 11:40:35 +02:00
|
|
|
use Illuminate\Support\Facades\Schema;
|
2019-10-10 03:01:38 +02:00
|
|
|
use Illuminate\Validation\ValidationException;
|
2020-10-28 11:10:49 +01:00
|
|
|
use PDOException;
|
2020-11-01 06:16:37 +01:00
|
|
|
use Sentry\State\Scope;
|
2020-10-28 11:10:49 +01:00
|
|
|
use Swift_TransportException;
|
|
|
|
use Symfony\Component\Console\Exception\CommandNotFoundException;
|
2019-04-23 08:19:45 +02:00
|
|
|
use Symfony\Component\Debug\Exception\FatalThrowableError;
|
2019-10-08 13:14:23 +02:00
|
|
|
use Symfony\Component\HttpKernel\Exception\MethodNotAllowedHttpException;
|
2019-10-10 03:01:38 +02:00
|
|
|
use Symfony\Component\HttpKernel\Exception\NotFoundHttpException;
|
2020-09-06 11:38:10 +02:00
|
|
|
use Throwable;
|
2018-10-04 19:10:43 +02:00
|
|
|
|
|
|
|
class Handler extends ExceptionHandler
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* A list of the exception types that are not reported.
|
|
|
|
*
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
protected $dontReport = [
|
2020-10-28 11:10:49 +01:00
|
|
|
PDOException::class,
|
2020-11-12 04:04:27 +01:00
|
|
|
//Swift_TransportException::class,
|
2020-10-28 11:10:49 +01:00
|
|
|
MaxAttemptsExceededException::class,
|
|
|
|
CommandNotFoundException::class,
|
2021-06-04 00:16:18 +02:00
|
|
|
ValidationException::class,
|
2021-10-24 22:25:14 +02:00
|
|
|
ModelNotFoundException::class,
|
2021-10-25 23:00:30 +02:00
|
|
|
NotFoundHttpException::class,
|
2018-10-04 19:10:43 +02:00
|
|
|
];
|
|
|
|
|
|
|
|
/**
|
|
|
|
* A list of the inputs that are never flashed for validation exceptions.
|
|
|
|
*
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
protected $dontFlash = [
|
2022-06-21 11:59:19 +02:00
|
|
|
'current_password',
|
2018-10-04 19:10:43 +02:00
|
|
|
'password',
|
|
|
|
'password_confirmation',
|
|
|
|
];
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Report or log an exception.
|
|
|
|
*
|
2020-10-28 11:10:49 +01:00
|
|
|
* @param Throwable $exception
|
2018-10-04 19:10:43 +02:00
|
|
|
* @return void
|
2020-10-28 11:10:49 +01:00
|
|
|
* @throws Throwable
|
2018-10-04 19:10:43 +02:00
|
|
|
*/
|
2020-09-06 11:38:10 +02:00
|
|
|
public function report(Throwable $exception)
|
2020-12-13 21:37:29 +01:00
|
|
|
{
|
2020-09-06 11:38:10 +02:00
|
|
|
if (! Schema::hasTable('accounts')) {
|
|
|
|
info('account table not found');
|
2022-06-21 11:57:17 +02:00
|
|
|
|
2020-05-28 11:40:35 +02:00
|
|
|
return;
|
2020-06-22 05:07:58 +02:00
|
|
|
}
|
2020-05-28 11:40:35 +02:00
|
|
|
|
2022-06-21 11:57:17 +02:00
|
|
|
if (Ninja::isHosted() && ! ($exception instanceof ValidationException)) {
|
2021-05-19 00:08:37 +02:00
|
|
|
app('sentry')->configureScope(function (Scope $scope): void {
|
2021-07-08 07:33:33 +02:00
|
|
|
$name = 'hosted@invoiceninja.com';
|
|
|
|
|
2022-06-21 11:57:17 +02:00
|
|
|
if (auth()->guard('contact') && auth()->guard('contact')->user()) {
|
|
|
|
$name = 'Contact = '.auth()->guard('contact')->user()->email;
|
2021-05-19 00:08:37 +02:00
|
|
|
$key = auth()->guard('contact')->user()->company->account->key;
|
2022-06-21 11:57:17 +02:00
|
|
|
} elseif (auth()->guard('user') && auth()->guard('user')->user()) {
|
|
|
|
$name = 'Admin = '.auth()->guard('user')->user()->email;
|
2021-05-19 00:08:37 +02:00
|
|
|
$key = auth()->user()->account->key;
|
2022-06-21 11:57:17 +02:00
|
|
|
} else {
|
2021-05-19 00:08:37 +02:00
|
|
|
$key = 'Anonymous';
|
2022-06-21 11:57:17 +02:00
|
|
|
}
|
2021-05-19 00:08:37 +02:00
|
|
|
|
2022-06-21 11:57:17 +02:00
|
|
|
$scope->setUser([
|
|
|
|
'id' => $key,
|
|
|
|
'email' => 'hosted@invoiceninja.com',
|
|
|
|
'name' => $name,
|
|
|
|
]);
|
|
|
|
});
|
2021-05-19 01:03:30 +02:00
|
|
|
|
2022-06-21 11:57:17 +02:00
|
|
|
app('sentry')->captureException($exception);
|
|
|
|
} elseif (app()->bound('sentry') && $this->shouldReport($exception)) {
|
2020-06-22 13:32:10 +02:00
|
|
|
app('sentry')->configureScope(function (Scope $scope): void {
|
|
|
|
if (auth()->guard('contact') && auth()->guard('contact')->user() && auth()->guard('contact')->user()->company->account->report_errors) {
|
|
|
|
$scope->setUser([
|
|
|
|
'id' => auth()->guard('contact')->user()->company->account->key,
|
2020-09-06 11:38:10 +02:00
|
|
|
'email' => 'anonymous@example.com',
|
|
|
|
'name' => 'Anonymous User',
|
2020-06-22 13:32:10 +02:00
|
|
|
]);
|
2021-05-18 15:12:03 +02:00
|
|
|
} elseif (auth()->guard('user') && auth()->guard('user')->user() && auth()->user()->company() && auth()->user()->company()->account->report_errors) {
|
2020-06-22 13:32:10 +02:00
|
|
|
$scope->setUser([
|
|
|
|
'id' => auth()->user()->account->key,
|
2020-09-06 11:38:10 +02:00
|
|
|
'email' => 'anonymous@example.com',
|
|
|
|
'name' => 'Anonymous User',
|
2020-06-22 13:32:10 +02:00
|
|
|
]);
|
|
|
|
}
|
|
|
|
});
|
2020-03-29 14:22:14 +02:00
|
|
|
|
2022-03-30 04:54:40 +02:00
|
|
|
if ($this->validException($exception)) {
|
2020-12-12 12:23:29 +01:00
|
|
|
app('sentry')->captureException($exception);
|
2020-12-16 12:52:40 +01:00
|
|
|
}
|
2019-04-10 04:01:28 +02:00
|
|
|
}
|
2019-04-02 08:36:49 +02:00
|
|
|
|
2021-07-08 03:48:11 +02:00
|
|
|
parent::report($exception);
|
2018-10-04 19:10:43 +02:00
|
|
|
}
|
|
|
|
|
2020-12-16 12:52:40 +01:00
|
|
|
private function validException($exception)
|
2020-12-12 12:23:29 +01:00
|
|
|
{
|
2022-06-21 11:57:17 +02:00
|
|
|
if (strpos($exception->getMessage(), 'file_put_contents') !== false) {
|
2020-12-16 12:52:40 +01:00
|
|
|
return false;
|
2022-06-21 11:57:17 +02:00
|
|
|
}
|
2020-12-12 12:23:29 +01:00
|
|
|
|
2022-06-21 11:57:17 +02:00
|
|
|
if (strpos($exception->getMessage(), 'Permission denied') !== false) {
|
2020-12-16 12:52:40 +01:00
|
|
|
return false;
|
2022-06-21 11:57:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (strpos($exception->getMessage(), 'flock') !== false) {
|
2020-12-16 12:52:40 +01:00
|
|
|
return false;
|
2022-06-21 11:57:17 +02:00
|
|
|
}
|
2020-12-13 00:20:03 +01:00
|
|
|
|
2022-06-21 11:57:17 +02:00
|
|
|
if (strpos($exception->getMessage(), 'expects parameter 1 to be resource') !== false) {
|
2021-02-11 04:06:03 +01:00
|
|
|
return false;
|
2022-06-21 11:57:17 +02:00
|
|
|
}
|
2021-02-21 22:27:00 +01:00
|
|
|
|
2022-06-21 11:57:17 +02:00
|
|
|
if (strpos($exception->getMessage(), 'fwrite()') !== false) {
|
2021-02-21 22:29:39 +01:00
|
|
|
return false;
|
2022-06-21 11:57:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (strpos($exception->getMessage(), 'LockableFile') !== false) {
|
2021-03-28 04:19:44 +02:00
|
|
|
return false;
|
2022-06-21 11:57:17 +02:00
|
|
|
}
|
2021-02-11 04:06:03 +01:00
|
|
|
|
2020-12-16 12:52:40 +01:00
|
|
|
return true;
|
2020-12-12 12:23:29 +01:00
|
|
|
}
|
|
|
|
|
2018-10-04 19:10:43 +02:00
|
|
|
/**
|
|
|
|
* Render an exception into an HTTP response.
|
|
|
|
*
|
2020-10-28 11:10:49 +01:00
|
|
|
* @param Request $request
|
|
|
|
* @param Throwable $exception
|
|
|
|
* @return Response
|
|
|
|
* @throws Throwable
|
2018-10-04 19:10:43 +02:00
|
|
|
*/
|
2020-09-06 11:38:10 +02:00
|
|
|
public function render($request, Throwable $exception)
|
2018-10-04 19:10:43 +02:00
|
|
|
{
|
2019-12-30 22:59:12 +01:00
|
|
|
if ($exception instanceof ModelNotFoundException && $request->expectsJson()) {
|
2020-02-17 20:07:31 +01:00
|
|
|
return response()->json(['message'=>$exception->getMessage()], 400);
|
2022-06-21 11:57:17 +02:00
|
|
|
} elseif ($exception instanceof InternalPDFFailure && $request->expectsJson()) {
|
2021-04-12 06:36:51 +02:00
|
|
|
return response()->json(['message' => $exception->getMessage()], 500);
|
2022-06-21 11:57:17 +02:00
|
|
|
} elseif ($exception instanceof PhantomPDFFailure && $request->expectsJson()) {
|
2021-04-12 06:36:51 +02:00
|
|
|
return response()->json(['message' => $exception->getMessage()], 500);
|
2022-06-21 11:57:17 +02:00
|
|
|
} elseif ($exception instanceof FilePermissionsFailure) {
|
2021-04-12 06:36:51 +02:00
|
|
|
return response()->json(['message' => $exception->getMessage()], 500);
|
2019-12-30 22:59:12 +01:00
|
|
|
} elseif ($exception instanceof ThrottleRequestsException && $request->expectsJson()) {
|
|
|
|
return response()->json(['message'=>'Too many requests'], 429);
|
|
|
|
} elseif ($exception instanceof FatalThrowableError && $request->expectsJson()) {
|
2019-11-16 04:12:29 +01:00
|
|
|
return response()->json(['message'=>'Fatal error'], 500);
|
2019-12-30 22:59:12 +01:00
|
|
|
} elseif ($exception instanceof AuthorizationException) {
|
|
|
|
return response()->json(['message'=>'You are not authorized to view or perform this action'], 401);
|
2020-10-28 11:10:49 +01:00
|
|
|
} elseif ($exception instanceof TokenMismatchException) {
|
2019-08-13 23:16:31 +02:00
|
|
|
return redirect()
|
|
|
|
->back()
|
2019-08-13 23:41:02 +02:00
|
|
|
->withInput($request->except('password', 'password_confirmation', '_token'))
|
2019-08-13 23:16:31 +02:00
|
|
|
->with([
|
|
|
|
'message' => ctrans('texts.token_expired'),
|
2020-09-06 11:38:10 +02:00
|
|
|
'message-type' => 'danger', ]);
|
2019-12-30 22:59:12 +01:00
|
|
|
} elseif ($exception instanceof NotFoundHttpException && $request->expectsJson()) {
|
|
|
|
return response()->json(['message'=>'Route does not exist'], 404);
|
|
|
|
} elseif ($exception instanceof MethodNotAllowedHttpException && $request->expectsJson()) {
|
2021-07-27 14:20:32 +02:00
|
|
|
return response()->json(['message'=>'Method not supported for this route'], 404);
|
2019-12-30 22:59:12 +01:00
|
|
|
} elseif ($exception instanceof ValidationException && $request->expectsJson()) {
|
2022-01-28 06:30:40 +01:00
|
|
|
// nlog($exception->validator->getMessageBag());
|
2019-10-10 03:01:38 +02:00
|
|
|
return response()->json(['message' => 'The given data was invalid.', 'errors' => $exception->validator->getMessageBag()], 422);
|
2019-12-30 22:59:12 +01:00
|
|
|
} elseif ($exception instanceof RelationNotFoundException && $request->expectsJson()) {
|
2019-11-21 09:38:57 +01:00
|
|
|
return response()->json(['message' => $exception->getMessage()], 400);
|
2020-06-10 07:21:11 +02:00
|
|
|
} elseif ($exception instanceof GenericPaymentDriverFailure && $request->expectsJson()) {
|
|
|
|
return response()->json(['message' => $exception->getMessage()], 400);
|
|
|
|
} elseif ($exception instanceof GenericPaymentDriverFailure) {
|
2021-07-08 10:13:07 +02:00
|
|
|
return response()->json(['message' => $exception->getMessage()], 400);
|
2021-08-15 08:21:18 +02:00
|
|
|
} elseif ($exception instanceof StripeConnectFailure) {
|
|
|
|
return response()->json(['message' => $exception->getMessage()], 400);
|
2022-10-24 00:07:55 +02:00
|
|
|
} elseif ($exception instanceof QueryException) {
|
2022-10-24 00:14:42 +02:00
|
|
|
return response()->json(['message' => 'We had a problem executing this query. Please retry.'], 500);
|
2022-10-24 00:07:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-08-13 23:41:02 +02:00
|
|
|
|
2018-10-04 19:10:43 +02:00
|
|
|
return parent::render($request, $exception);
|
|
|
|
}
|
2018-10-15 07:00:48 +02:00
|
|
|
|
|
|
|
protected function unauthenticated($request, AuthenticationException $exception)
|
|
|
|
{
|
|
|
|
if ($request->expectsJson()) {
|
|
|
|
return response()->json(['error' => 'Unauthenticated.'], 401);
|
|
|
|
}
|
|
|
|
|
2019-10-01 03:56:48 +02:00
|
|
|
$guard = Arr::get($exception->guards(), 0);
|
2018-10-15 07:00:48 +02:00
|
|
|
|
|
|
|
switch ($guard) {
|
|
|
|
case 'contact':
|
2019-07-16 04:38:11 +02:00
|
|
|
$login = 'client.login';
|
2018-10-15 07:00:48 +02:00
|
|
|
break;
|
|
|
|
case 'user':
|
|
|
|
$login = 'login';
|
|
|
|
break;
|
2022-06-15 07:20:00 +02:00
|
|
|
case 'vendor':
|
|
|
|
$login = 'vendor.catchall';
|
|
|
|
break;
|
2018-10-15 07:00:48 +02:00
|
|
|
default:
|
|
|
|
$login = 'default';
|
|
|
|
break;
|
|
|
|
}
|
2020-09-06 11:38:10 +02:00
|
|
|
|
2018-10-15 07:00:48 +02:00
|
|
|
return redirect()->guest(route($login));
|
|
|
|
}
|
2018-10-04 19:10:43 +02:00
|
|
|
}
|