1
0
mirror of https://github.com/invoiceninja/invoiceninja.git synced 2024-11-14 07:02:34 +01:00
invoiceninja/app/Http/Middleware/PasswordProtection.php

124 lines
5.2 KiB
PHP
Raw Normal View History

<?php
/**
* Invoice Ninja (https://invoiceninja.com).
*
* @link https://github.com/invoiceninja/invoiceninja source repository
*
2024-04-12 06:15:41 +02:00
* @copyright Copyright (c) 2024. Invoice Ninja LLC (https://invoiceninja.com)
*
2021-06-16 08:58:16 +02:00
* @license https://www.elastic.co/licensing/elastic-license
*/
namespace App\Http\Middleware;
use App\Libraries\MultiDB;
use App\Libraries\OAuth\Providers\Google;
use Closure;
2020-10-28 11:10:49 +01:00
use Illuminate\Http\Request;
use Illuminate\Support\Facades\Cache;
use Illuminate\Support\Facades\Hash;
use Illuminate\Support\Str;
use Laravel\Socialite\Facades\Socialite;
2020-10-28 11:10:49 +01:00
use stdClass;
class PasswordProtection
{
/**
* Handle an incoming request.
*
2020-10-28 11:10:49 +01:00
* @param Request $request
* @param Closure $next
* @return mixed
*/
public function handle($request, Closure $next)
{
$error = [
'message' => 'Invalid Password',
2024-01-14 05:05:00 +01:00
'errors' => new stdClass(),
];
2023-08-07 06:50:08 +02:00
/** @var \App\Models\User auth()->user() */
2023-10-26 04:57:44 +02:00
$user = auth()->user();
2023-08-07 06:50:08 +02:00
$timeout = $user->company()->default_password_timeout;
2023-02-16 02:36:09 +01:00
if ($timeout == 0) {
2024-01-14 05:05:00 +01:00
$timeout = 30 * 60 * 1000 * 1000;
2023-02-16 02:36:09 +01:00
} else {
2024-01-14 05:05:00 +01:00
$timeout = $timeout / 1000;
2023-02-16 02:36:09 +01:00
}
2021-07-19 02:57:13 +02:00
//test if password if base64 encoded
$x_api_password = $request->header('X-API-PASSWORD');
2023-02-16 02:36:09 +01:00
if ($request->header('X-API-PASSWORD-BASE64')) {
$x_api_password = base64_decode($request->header('X-API-PASSWORD-BASE64'));
}
2021-07-19 02:57:13 +02:00
// If no password supplied - then we just check if their authentication is in cache //
if (Cache::get(auth()->user()->hashed_id.'_'.auth()->user()->account_id.'_logged_in') && !$x_api_password) {
Cache::put(auth()->user()->hashed_id.'_'.auth()->user()->account_id.'_logged_in', Str::random(64), $timeout);
return $next($request);
2023-10-26 04:57:44 +02:00
} elseif(strlen(auth()->user()->oauth_provider_id) > 2 && !auth()->user()->company()->oauth_password_required) {
2023-06-20 22:51:48 +02:00
return $next($request);
2024-01-14 05:05:00 +01:00
} elseif ($request->header('X-API-OAUTH-PASSWORD') && strlen($request->header('X-API-OAUTH-PASSWORD')) >= 1) {
//user is attempting to reauth with OAuth - check the token value
//todo expand this to include all OAuth providers
2023-02-16 02:36:09 +01:00
if (auth()->user()->oauth_provider_id == 'google') {
$user = false;
$google = new Google();
$user = $google->getTokenResponse(request()->header('X-API-OAUTH-PASSWORD'));
if (is_array($user)) {
$query = [
'oauth_user_id' => $google->harvestSubField($user),
2024-01-14 05:05:00 +01:00
'oauth_provider_id' => 'google'
];
//If OAuth and user also has a password set - check both
if ($existing_user = MultiDB::hasUser($query) && auth()->user()->company()->oauth_password_required && auth()->user()->has_password && Hash::check(auth()->user()->password, $x_api_password)) {
nlog("existing user with password");
Cache::put(auth()->user()->hashed_id.'_'.auth()->user()->account_id.'_logged_in', Str::random(64), $timeout);
return $next($request);
2023-02-16 02:36:09 +01:00
} elseif ($existing_user = MultiDB::hasUser($query) && !auth()->user()->company()->oauth_password_required) {
nlog("existing user without password");
Cache::put(auth()->user()->hashed_id.'_'.auth()->user()->account_id.'_logged_in', Str::random(64), $timeout);
2023-02-16 02:36:09 +01:00
return $next($request);
}
}
2023-02-16 02:36:09 +01:00
} elseif (auth()->user()->oauth_provider_id == 'microsoft') {
try {
$payload = json_decode(base64_decode(str_replace('_', '/', str_replace('-', '+', explode('.', request()->header('X-API-OAUTH-PASSWORD'))[1]))));
} catch(\Exception $e) {
nlog("could not decode microsoft response");
return response()->json(['message' => 'Could not decode the response from Microsoft'], 412);
}
2023-02-16 02:36:09 +01:00
if ($payload->preferred_username == auth()->user()->email) {
Cache::put(auth()->user()->hashed_id.'_'.auth()->user()->account_id.'_logged_in', Str::random(64), $timeout);
return $next($request);
}
2023-02-16 02:36:09 +01:00
} elseif (auth()->user()->oauth_provider_id == 'apple') {
$user = Socialite::driver('apple')->userFromToken($request->header('X-API-OAUTH-PASSWORD'));
2023-02-16 02:36:09 +01:00
if ($user && ($user->email == auth()->user()->email)) {
Cache::put(auth()->user()->hashed_id.'_'.auth()->user()->account_id.'_logged_in', Str::random(64), $timeout);
return $next($request);
}
}
return response()->json($error, 412);
2023-02-16 02:36:09 +01:00
} elseif ($x_api_password && Hash::check($x_api_password, auth()->user()->password)) {
Cache::put(auth()->user()->hashed_id.'_'.auth()->user()->account_id.'_logged_in', Str::random(64), $timeout);
return $next($request);
} else {
return response()->json($error, 412);
}
}
2023-02-16 02:36:09 +01:00
}