2FAuth/app/Http/Middleware/KickOutInactiveUser.php

51 lines
1.6 KiB
PHP
Raw Normal View History

2020-10-08 15:38:36 +02:00
<?php
namespace App\Http\Middleware;
use Closure;
use Carbon\Carbon;
use Illuminate\Http\Response;
use Illuminate\Support\Facades\Auth;
2021-10-15 23:46:21 +02:00
use Illuminate\Support\Facades\Log;
2020-10-08 15:38:36 +02:00
class KickOutInactiveUser
2020-10-08 15:38:36 +02:00
{
/**
* Handle an incoming request.
*
* @param \Illuminate\Http\Request $request
* @param \Closure $next
* @return mixed
*/
public function handle($request, Closure $next, ...$quards)
2020-10-08 15:38:36 +02:00
{
// We do not track activity of:
// - Guest
// - User authenticated against a bearer token
// - User authenticated via a reverse-proxy
if (Auth::guest() || $request->bearerToken() || config('auth.defaults.guard') === 'reverse-proxy-guard') {
2020-10-08 15:38:36 +02:00
return $next($request);
}
$user = Auth::user();
2020-10-08 15:38:36 +02:00
$now = Carbon::now();
2020-10-09 13:35:03 +02:00
$inactiveFor = $now->diffInSeconds(Carbon::parse($user->last_seen_at));
2020-10-08 15:38:36 +02:00
// Fetch all setting values
2021-12-01 13:47:20 +01:00
$settingService = resolve('App\Services\SettingService');
$kickUserAfterXSecond = intval($settingService->get('kickUserAfter')) * 60;
2020-10-09 13:35:03 +02:00
// If user has been inactive longer than the allowed inactivity period
if ($kickUserAfterXSecond > 0 && $inactiveFor > $kickUserAfterXSecond) {
2020-10-08 15:38:36 +02:00
$user->last_seen_at = $now->format('Y-m-d H:i:s');
$user->save();
Log::notice('Inactive user detected, authentication rejected');
2020-10-08 15:38:36 +02:00
return response()->json(['message' => 'unauthorised'], Response::HTTP_UNAUTHORIZED);
}
return $next($request);
}
}