1
0
mirror of https://github.com/invoiceninja/invoiceninja.git synced 2024-11-10 21:22:58 +01:00
invoiceninja/app/Exceptions/Handler.php

228 lines
8.8 KiB
PHP
Raw Normal View History

2018-10-04 19:10:43 +02:00
<?php
2019-05-11 05:32:07 +02:00
/**
* Invoice Ninja (https://invoiceninja.com).
2019-05-11 05:32:07 +02:00
*
* @link https://github.com/invoiceninja/invoiceninja source repository
*
* @copyright Copyright (c) 2021. Invoice Ninja LLC (https://invoiceninja.com)
2019-05-11 05:32:07 +02:00
*
2021-06-16 08:58:16 +02:00
* @license https://www.elastic.co/licensing/elastic-license
2019-05-11 05:32:07 +02:00
*/
2018-10-04 19:10:43 +02:00
namespace App\Exceptions;
2021-04-12 06:36:51 +02:00
use App\Exceptions\FilePermissionsFailure;
use App\Exceptions\InternalPDFFailure;
use App\Exceptions\PhantomPDFFailure;
2021-05-19 00:08:37 +02:00
use App\Utils\Ninja;
2018-10-04 19:10:43 +02:00
use Exception;
2019-10-03 02:17:29 +02:00
use Illuminate\Auth\Access\AuthorizationException;
use Illuminate\Auth\AuthenticationException;
2019-04-02 08:36:49 +02:00
use Illuminate\Database\Eloquent\ModelNotFoundException as ModelNotFoundException;
2020-05-28 11:40:35 +02:00
use Illuminate\Database\Eloquent\RelationNotFoundException;
use Illuminate\Foundation\Exceptions\Handler as ExceptionHandler;
use Illuminate\Http\Exceptions\ThrottleRequestsException;
2020-10-28 11:10:49 +01:00
use Illuminate\Http\Request;
use Illuminate\Http\Response;
use Illuminate\Queue\MaxAttemptsExceededException;
use Illuminate\Session\TokenMismatchException;
2019-10-01 03:56:48 +02:00
use Illuminate\Support\Arr;
2020-05-28 11:40:35 +02:00
use Illuminate\Support\Facades\Schema;
2019-10-10 03:01:38 +02:00
use Illuminate\Validation\ValidationException;
2020-10-28 11:10:49 +01:00
use PDOException;
2020-11-01 06:16:37 +01:00
use Sentry\State\Scope;
2020-10-28 11:10:49 +01:00
use Swift_TransportException;
use Symfony\Component\Console\Exception\CommandNotFoundException;
2019-04-23 08:19:45 +02:00
use Symfony\Component\Debug\Exception\FatalThrowableError;
2019-10-08 13:14:23 +02:00
use Symfony\Component\HttpKernel\Exception\MethodNotAllowedHttpException;
2019-10-10 03:01:38 +02:00
use Symfony\Component\HttpKernel\Exception\NotFoundHttpException;
use Throwable;
2018-10-04 19:10:43 +02:00
class Handler extends ExceptionHandler
{
/**
* A list of the exception types that are not reported.
*
* @var array
*/
protected $dontReport = [
2020-10-28 11:10:49 +01:00
PDOException::class,
2020-11-12 04:04:27 +01:00
//Swift_TransportException::class,
2020-10-28 11:10:49 +01:00
MaxAttemptsExceededException::class,
CommandNotFoundException::class,
2021-06-04 00:16:18 +02:00
ValidationException::class,
2018-10-04 19:10:43 +02:00
];
/**
* A list of the inputs that are never flashed for validation exceptions.
*
* @var array
*/
protected $dontFlash = [
'password',
'password_confirmation',
];
/**
* Report or log an exception.
*
2020-10-28 11:10:49 +01:00
* @param Throwable $exception
2018-10-04 19:10:43 +02:00
* @return void
2020-10-28 11:10:49 +01:00
* @throws Throwable
2018-10-04 19:10:43 +02:00
*/
public function report(Throwable $exception)
2020-12-13 21:37:29 +01:00
{
if (! Schema::hasTable('accounts')) {
info('account table not found');
2020-05-28 11:40:35 +02:00
return;
2020-06-22 05:07:58 +02:00
}
2020-05-28 11:40:35 +02:00
2021-06-25 00:38:15 +02:00
if(Ninja::isHosted() && !($exception instanceof ValidationException)){
2021-05-19 00:08:37 +02:00
app('sentry')->configureScope(function (Scope $scope): void {
2021-07-08 07:33:33 +02:00
$name = 'hosted@invoiceninja.com';
if(auth()->guard('contact') && auth()->guard('contact')->user()){
$name = "Contact = ".auth()->guard('contact')->user()->email;
2021-05-19 00:08:37 +02:00
$key = auth()->guard('contact')->user()->company->account->key;
2021-07-08 07:33:33 +02:00
}
elseif (auth()->guard('user') && auth()->guard('user')->user()){
$name = "Admin = ".auth()->guard('user')->user()->email;
2021-05-19 00:08:37 +02:00
$key = auth()->user()->account->key;
2021-07-08 07:33:33 +02:00
}
2021-05-19 00:08:37 +02:00
else
$key = 'Anonymous';
$scope->setUser([
2021-07-08 07:33:33 +02:00
'id' => $key,
2021-05-19 00:08:37 +02:00
'email' => 'hosted@invoiceninja.com',
2021-07-08 07:33:33 +02:00
'name' => $name,
2021-05-19 00:08:37 +02:00
]);
});
2021-05-19 01:03:30 +02:00
app('sentry')->captureException($exception);
2021-05-19 00:08:37 +02:00
}
elseif (app()->bound('sentry') && $this->shouldReport($exception)) {
2020-06-22 13:32:10 +02:00
app('sentry')->configureScope(function (Scope $scope): void {
if (auth()->guard('contact') && auth()->guard('contact')->user() && auth()->guard('contact')->user()->company->account->report_errors) {
$scope->setUser([
'id' => auth()->guard('contact')->user()->company->account->key,
'email' => 'anonymous@example.com',
'name' => 'Anonymous User',
2020-06-22 13:32:10 +02:00
]);
2021-05-18 15:12:03 +02:00
} elseif (auth()->guard('user') && auth()->guard('user')->user() && auth()->user()->company() && auth()->user()->company()->account->report_errors) {
2020-06-22 13:32:10 +02:00
$scope->setUser([
'id' => auth()->user()->account->key,
'email' => 'anonymous@example.com',
'name' => 'Anonymous User',
2020-06-22 13:32:10 +02:00
]);
}
});
2020-12-16 12:52:40 +01:00
if ($this->validException($exception)) {
2020-12-12 12:23:29 +01:00
app('sentry')->captureException($exception);
2020-12-16 12:52:40 +01:00
}
2019-04-10 04:01:28 +02:00
}
2019-04-02 08:36:49 +02:00
2021-07-08 03:48:11 +02:00
parent::report($exception);
2021-03-28 04:26:46 +02:00
2018-10-04 19:10:43 +02:00
}
2020-12-16 12:52:40 +01:00
private function validException($exception)
2020-12-12 12:23:29 +01:00
{
2021-02-21 22:27:00 +01:00
if (strpos($exception->getMessage(), 'file_put_contents') !== false)
2020-12-16 12:52:40 +01:00
return false;
2020-12-12 12:23:29 +01:00
2021-02-21 22:27:00 +01:00
if (strpos($exception->getMessage(), 'Permission denied') !== false)
2020-12-16 12:52:40 +01:00
return false;
2021-03-28 04:19:44 +02:00
if (strpos($exception->getMessage(), 'flock') !== false)
2020-12-16 12:52:40 +01:00
return false;
2021-02-21 22:27:00 +01:00
if (strpos($exception->getMessage(), 'expects parameter 1 to be resource') !== false)
2021-02-11 04:06:03 +01:00
return false;
2021-02-21 22:27:00 +01:00
if (strpos($exception->getMessage(), 'fwrite()') !== false)
2021-02-21 22:29:39 +01:00
return false;
2021-02-21 22:27:00 +01:00
2021-03-28 04:26:46 +02:00
if(strpos($exception->getMessage(), 'LockableFile') !== false)
2021-03-28 04:19:44 +02:00
return false;
2021-02-11 04:06:03 +01:00
2020-12-16 12:52:40 +01:00
return true;
2020-12-12 12:23:29 +01:00
}
2018-10-04 19:10:43 +02:00
/**
* Render an exception into an HTTP response.
*
2020-10-28 11:10:49 +01:00
* @param Request $request
* @param Throwable $exception
* @return Response
* @throws Throwable
2018-10-04 19:10:43 +02:00
*/
public function render($request, Throwable $exception)
2018-10-04 19:10:43 +02:00
{
if ($exception instanceof ModelNotFoundException && $request->expectsJson()) {
return response()->json(['message'=>$exception->getMessage()], 400);
2021-04-12 06:36:51 +02:00
}elseif($exception instanceof InternalPDFFailure && $request->expectsJson()){
return response()->json(['message' => $exception->getMessage()], 500);
}elseif($exception instanceof PhantomPDFFailure && $request->expectsJson()){
return response()->json(['message' => $exception->getMessage()], 500);
}elseif($exception instanceof FilePermissionsFailure) {
return response()->json(['message' => $exception->getMessage()], 500);
} elseif ($exception instanceof ThrottleRequestsException && $request->expectsJson()) {
return response()->json(['message'=>'Too many requests'], 429);
} elseif ($exception instanceof FatalThrowableError && $request->expectsJson()) {
return response()->json(['message'=>'Fatal error'], 500);
} elseif ($exception instanceof AuthorizationException) {
return response()->json(['message'=>'You are not authorized to view or perform this action'], 401);
2020-10-28 11:10:49 +01:00
} elseif ($exception instanceof TokenMismatchException) {
2019-08-13 23:16:31 +02:00
return redirect()
->back()
2019-08-13 23:41:02 +02:00
->withInput($request->except('password', 'password_confirmation', '_token'))
2019-08-13 23:16:31 +02:00
->with([
'message' => ctrans('texts.token_expired'),
'message-type' => 'danger', ]);
} elseif ($exception instanceof NotFoundHttpException && $request->expectsJson()) {
return response()->json(['message'=>'Route does not exist'], 404);
} elseif ($exception instanceof MethodNotAllowedHttpException && $request->expectsJson()) {
2021-07-27 14:20:32 +02:00
return response()->json(['message'=>'Method not supported for this route'], 404);
} elseif ($exception instanceof ValidationException && $request->expectsJson()) {
2021-04-12 06:36:51 +02:00
nlog($exception->validator->getMessageBag());
2019-10-10 03:01:38 +02:00
return response()->json(['message' => 'The given data was invalid.', 'errors' => $exception->validator->getMessageBag()], 422);
} elseif ($exception instanceof RelationNotFoundException && $request->expectsJson()) {
return response()->json(['message' => $exception->getMessage()], 400);
2020-06-10 07:21:11 +02:00
} elseif ($exception instanceof GenericPaymentDriverFailure && $request->expectsJson()) {
return response()->json(['message' => $exception->getMessage()], 400);
} elseif ($exception instanceof GenericPaymentDriverFailure) {
2021-07-08 10:13:07 +02:00
return response()->json(['message' => $exception->getMessage()], 400);
2021-04-12 06:36:51 +02:00
}
2019-08-13 23:41:02 +02:00
2018-10-04 19:10:43 +02:00
return parent::render($request, $exception);
}
protected function unauthenticated($request, AuthenticationException $exception)
{
if ($request->expectsJson()) {
return response()->json(['error' => 'Unauthenticated.'], 401);
}
2019-10-01 03:56:48 +02:00
$guard = Arr::get($exception->guards(), 0);
switch ($guard) {
case 'contact':
$login = 'client.login';
break;
case 'user':
$login = 'login';
break;
default:
$login = 'default';
break;
}
return redirect()->guest(route($login));
}
2018-10-04 19:10:43 +02:00
}