2021-09-26 22:06:49 +02:00
|
|
|
<?php
|
|
|
|
|
|
|
|
namespace App\Services;
|
|
|
|
|
2022-11-22 15:15:52 +01:00
|
|
|
use App\Exceptions\DbEncryptionException;
|
2021-12-02 13:15:53 +01:00
|
|
|
use App\Models\Option;
|
2022-11-22 15:15:52 +01:00
|
|
|
use Exception;
|
2021-12-03 22:50:28 +01:00
|
|
|
use Illuminate\Support\Arr;
|
2021-09-26 22:06:49 +02:00
|
|
|
use Illuminate\Support\Collection;
|
2022-11-22 15:15:52 +01:00
|
|
|
use Illuminate\Support\Facades\App;
|
|
|
|
use Illuminate\Support\Facades\Crypt;
|
2021-09-26 22:06:49 +02:00
|
|
|
use Illuminate\Support\Facades\DB;
|
2021-10-15 23:46:21 +02:00
|
|
|
use Illuminate\Support\Facades\Log;
|
2022-11-22 15:15:52 +01:00
|
|
|
use Throwable;
|
2021-09-26 22:06:49 +02:00
|
|
|
|
2021-12-01 13:47:20 +01:00
|
|
|
class SettingService
|
2021-09-26 22:06:49 +02:00
|
|
|
{
|
2021-12-03 22:50:28 +01:00
|
|
|
/**
|
2022-07-29 18:34:27 +02:00
|
|
|
* All user settings
|
2022-11-22 15:15:52 +01:00
|
|
|
*
|
2022-11-21 11:16:43 +01:00
|
|
|
* @var Collection<string, mixed>
|
2021-12-03 22:50:28 +01:00
|
|
|
*/
|
2022-07-29 18:34:27 +02:00
|
|
|
private Collection $settings;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Constructor
|
|
|
|
*/
|
|
|
|
public function __construct()
|
2021-12-03 22:50:28 +01:00
|
|
|
{
|
2022-07-29 18:34:27 +02:00
|
|
|
self::build();
|
2021-12-03 22:50:28 +01:00
|
|
|
}
|
|
|
|
|
2021-09-26 22:06:49 +02:00
|
|
|
/**
|
2021-12-01 13:47:20 +01:00
|
|
|
* Get a setting
|
|
|
|
*
|
2022-11-22 15:15:52 +01:00
|
|
|
* @param string $setting A single setting name
|
2021-12-01 13:47:20 +01:00
|
|
|
* @return mixed string|int|boolean|null
|
2021-09-26 22:06:49 +02:00
|
|
|
*/
|
2022-08-26 15:57:18 +02:00
|
|
|
public function get($setting)
|
2021-09-26 22:06:49 +02:00
|
|
|
{
|
2022-07-29 18:34:27 +02:00
|
|
|
return $this->settings->get($setting);
|
2021-09-26 22:06:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2021-12-01 13:47:20 +01:00
|
|
|
* Get all settings
|
2022-11-22 15:15:52 +01:00
|
|
|
*
|
2022-11-21 11:16:43 +01:00
|
|
|
* @return Collection<string, mixed> the Settings collection
|
2021-09-26 22:06:49 +02:00
|
|
|
*/
|
|
|
|
public function all() : Collection
|
|
|
|
{
|
2022-07-29 18:34:27 +02:00
|
|
|
return $this->settings;
|
2021-09-26 22:06:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2021-12-01 13:47:20 +01:00
|
|
|
* Set a setting
|
|
|
|
*
|
2022-11-22 15:15:52 +01:00
|
|
|
* @param string|array $setting A single setting name or an associative array of name:value settings
|
|
|
|
* @param string|int|bool|null $value The value for single setting
|
2021-09-26 22:06:49 +02:00
|
|
|
*/
|
|
|
|
public function set($setting, $value = null) : void
|
|
|
|
{
|
|
|
|
$settings = is_array($setting) ? $setting : [$setting => $value];
|
|
|
|
|
|
|
|
foreach ($settings as $setting => $value) {
|
2022-11-22 15:15:52 +01:00
|
|
|
if ($setting === 'useEncryption') {
|
2021-11-26 11:21:57 +01:00
|
|
|
$this->setEncryptionTo($value);
|
|
|
|
}
|
|
|
|
|
2021-09-26 22:06:49 +02:00
|
|
|
$settings[$setting] = $this->replaceBoolean($value);
|
|
|
|
}
|
|
|
|
|
2021-10-15 23:46:21 +02:00
|
|
|
foreach ($settings as $setting => $value) {
|
2021-12-01 13:47:20 +01:00
|
|
|
Option::updateOrCreate(['key' => $setting], ['value' => $value]);
|
2021-10-15 23:46:21 +02:00
|
|
|
Log::info(sprintf('Setting %s is now %s', var_export($setting, true), var_export($this->restoreType($value), true)));
|
|
|
|
}
|
2022-07-29 18:34:27 +02:00
|
|
|
|
|
|
|
self::build();
|
2021-09-26 22:06:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2021-12-01 13:47:20 +01:00
|
|
|
* Delete a setting
|
|
|
|
*
|
2022-11-22 15:15:52 +01:00
|
|
|
* @param string $name The setting name
|
2021-09-26 22:06:49 +02:00
|
|
|
*/
|
|
|
|
public function delete(string $name) : void
|
|
|
|
{
|
2021-12-01 13:47:20 +01:00
|
|
|
Option::where('key', $name)->delete();
|
2021-10-15 23:46:21 +02:00
|
|
|
Log::info(sprintf('Setting %s deleted', var_export($name, true)));
|
2021-09-26 22:06:49 +02:00
|
|
|
}
|
2022-07-29 18:34:27 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Determine if the given setting has been customized by the user
|
|
|
|
*
|
|
|
|
* @param string $key
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function isUserDefined($key) : bool
|
|
|
|
{
|
|
|
|
return DB::table('options')->where('key', $key)->exists();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Set the settings collection
|
2022-11-22 15:15:52 +01:00
|
|
|
*
|
2022-08-26 15:57:18 +02:00
|
|
|
* @return void
|
2022-07-29 18:34:27 +02:00
|
|
|
*/
|
|
|
|
private function build()
|
|
|
|
{
|
|
|
|
// Get a collection of user saved options
|
|
|
|
$userOptions = DB::table('options')->pluck('value', 'key');
|
|
|
|
$userOptions->transform(function ($item, $key) {
|
|
|
|
return $this->restoreType($item);
|
|
|
|
});
|
|
|
|
|
|
|
|
// Merge 2fauth/app config values as fallback values
|
2022-11-21 11:16:43 +01:00
|
|
|
$settings = collect(config('2fauth.options'))->merge($userOptions); /** @phpstan-ignore-line */
|
2022-11-22 15:15:52 +01:00
|
|
|
if (! Arr::has($settings, 'lang')) {
|
2022-07-29 18:34:27 +02:00
|
|
|
$settings['lang'] = 'browser';
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->settings = $settings;
|
|
|
|
}
|
2021-09-26 22:06:49 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Replaces boolean by a patterned string as appstrack/laravel-options package does not support var type
|
2022-11-22 15:15:52 +01:00
|
|
|
*
|
|
|
|
* @param mixed $value
|
2022-08-26 15:57:18 +02:00
|
|
|
* @return string
|
2021-09-26 22:06:49 +02:00
|
|
|
*/
|
2022-08-26 15:57:18 +02:00
|
|
|
private function replaceBoolean(mixed $value)
|
2021-09-26 22:06:49 +02:00
|
|
|
{
|
|
|
|
return is_bool($value) ? '{{' . $value . '}}' : $value;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Replaces patterned string that represent booleans with real booleans
|
2022-11-22 15:15:52 +01:00
|
|
|
*
|
|
|
|
* @param mixed $value
|
2022-08-26 15:57:18 +02:00
|
|
|
* @return mixed
|
2021-09-26 22:06:49 +02:00
|
|
|
*/
|
2022-08-26 15:57:18 +02:00
|
|
|
private function restoreType(mixed $value)
|
2021-09-26 22:06:49 +02:00
|
|
|
{
|
2021-10-15 23:47:00 +02:00
|
|
|
$value = is_numeric($value) ? (int) $value : $value;
|
2021-09-26 22:06:49 +02:00
|
|
|
|
2022-11-22 15:15:52 +01:00
|
|
|
if ($value === '{{}}') {
|
2021-09-26 22:06:49 +02:00
|
|
|
return false;
|
2022-11-22 15:15:52 +01:00
|
|
|
} elseif ($value === '{{1}}') {
|
2021-09-26 22:06:49 +02:00
|
|
|
return true;
|
2022-11-22 15:15:52 +01:00
|
|
|
} else {
|
2021-09-26 22:06:49 +02:00
|
|
|
return $value;
|
|
|
|
}
|
|
|
|
}
|
2021-11-26 11:21:57 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Enable or Disable encryption of 2FAccounts sensible data
|
2022-11-22 15:15:52 +01:00
|
|
|
*
|
2021-11-26 11:21:57 +01:00
|
|
|
* @return void
|
2022-11-22 15:15:52 +01:00
|
|
|
*
|
2021-11-26 11:21:57 +01:00
|
|
|
* @throws DbEncryptionException Something failed, everything have been rolled back
|
|
|
|
*/
|
|
|
|
private function setEncryptionTo(bool $state) : void
|
|
|
|
{
|
|
|
|
// We don't want the records to be encrypted/decrypted multiple successive times
|
|
|
|
$isInUse = $this->get('useEncryption');
|
|
|
|
|
2022-11-22 15:15:52 +01:00
|
|
|
if ($isInUse === ! $state) {
|
2021-11-26 11:21:57 +01:00
|
|
|
if ($this->updateRecords($state)) {
|
|
|
|
if ($state) {
|
|
|
|
Log::notice('Sensible data are now encrypted');
|
2022-11-22 15:15:52 +01:00
|
|
|
} else {
|
|
|
|
Log::notice('Sensible data are now decrypted');
|
2021-11-26 11:21:57 +01:00
|
|
|
}
|
2022-11-22 15:15:52 +01:00
|
|
|
} else {
|
2021-11-26 11:21:57 +01:00
|
|
|
Log::warning('Some data cannot be encrypted/decrypted, the useEncryption setting remain unchanged');
|
|
|
|
throw new DbEncryptionException($state === true ? __('errors.error_during_encryption') : __('errors.error_during_decryption'));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Encrypt/Decrypt accounts in database
|
2022-11-22 15:15:52 +01:00
|
|
|
*
|
|
|
|
* @param bool $encrypted Whether the record should be encrypted or not
|
|
|
|
* @return bool Whether the operation completed successfully
|
2021-11-26 11:21:57 +01:00
|
|
|
*/
|
|
|
|
private function updateRecords(bool $encrypted) : bool
|
2022-11-22 15:15:52 +01:00
|
|
|
{
|
|
|
|
$success = true;
|
2021-11-26 11:21:57 +01:00
|
|
|
$twofaccounts = DB::table('twofaccounts')->get();
|
|
|
|
|
2022-11-22 15:15:52 +01:00
|
|
|
$twofaccounts->each(function ($item, $key) use (&$success, $encrypted) {
|
2021-11-26 11:21:57 +01:00
|
|
|
try {
|
2022-11-22 15:15:52 +01:00
|
|
|
$item->legacy_uri = $encrypted ? Crypt::encryptString($item->legacy_uri) : Crypt::decryptString($item->legacy_uri);
|
|
|
|
$item->account = $encrypted ? Crypt::encryptString($item->account) : Crypt::decryptString($item->account);
|
|
|
|
$item->secret = $encrypted ? Crypt::encryptString($item->secret) : Crypt::decryptString($item->secret);
|
|
|
|
} catch (Exception $ex) {
|
2021-11-26 11:21:57 +01:00
|
|
|
$success = false;
|
|
|
|
// Exit the each iteration
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
if ($success) {
|
|
|
|
// The whole collection has now its sensible data encrypted/decrypted
|
|
|
|
// We update the db using a transaction that can rollback everything if an error occured
|
|
|
|
DB::beginTransaction();
|
|
|
|
|
|
|
|
try {
|
|
|
|
$twofaccounts->each(function ($item, $key) {
|
|
|
|
DB::table('twofaccounts')
|
|
|
|
->where('id', $item->id)
|
|
|
|
->update([
|
|
|
|
'legacy_uri' => $item->legacy_uri,
|
|
|
|
'account' => $item->account,
|
2022-11-22 15:15:52 +01:00
|
|
|
'secret' => $item->secret,
|
2021-11-26 11:21:57 +01:00
|
|
|
]);
|
|
|
|
});
|
|
|
|
|
|
|
|
DB::commit();
|
2022-11-22 15:15:52 +01:00
|
|
|
|
2021-11-26 11:21:57 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
// @codeCoverageIgnoreStart
|
|
|
|
catch (Throwable $ex) {
|
|
|
|
DB::rollBack();
|
2022-11-22 15:15:52 +01:00
|
|
|
|
2021-11-26 11:21:57 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
// @codeCoverageIgnoreEnd
|
2022-11-22 15:15:52 +01:00
|
|
|
} else {
|
|
|
|
return false;
|
2021-11-26 11:21:57 +01:00
|
|
|
}
|
|
|
|
}
|
2022-11-22 15:15:52 +01:00
|
|
|
}
|