417 lines
22 KiB
PHP
417 lines
22 KiB
PHP
|
<?php
|
||
|
/*********************************************************************************
|
||
|
*
|
||
|
* TimeTrex is a Workforce Management program developed by
|
||
|
* TimeTrex Software Inc. Copyright (C) 2003 - 2021 TimeTrex Software Inc.
|
||
|
*
|
||
|
* This program is free software; you can redistribute it and/or modify it under
|
||
|
* the terms of the GNU Affero General Public License version 3 as published by
|
||
|
* the Free Software Foundation with the addition of the following permission
|
||
|
* added to Section 15 as permitted in Section 7(a): FOR ANY PART OF THE COVERED
|
||
|
* WORK IN WHICH THE COPYRIGHT IS OWNED BY TIMETREX, TIMETREX DISCLAIMS THE
|
||
|
* WARRANTY OF NON INFRINGEMENT OF THIRD PARTY RIGHTS.
|
||
|
*
|
||
|
* This program is distributed in the hope that it will be useful, but WITHOUT
|
||
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
|
||
|
* FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more
|
||
|
* details.
|
||
|
*
|
||
|
*
|
||
|
* You should have received a copy of the GNU Affero General Public License along
|
||
|
* with this program; if not, see http://www.gnu.org/licenses or write to the Free
|
||
|
* Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
||
|
* 02110-1301 USA.
|
||
|
*
|
||
|
*
|
||
|
* You can contact TimeTrex headquarters at Unit 22 - 2475 Dobbin Rd. Suite
|
||
|
* #292 West Kelowna, BC V4T 2E9, Canada or at email address info@timetrex.com.
|
||
|
*
|
||
|
*
|
||
|
* The interactive user interfaces in modified source and object code versions
|
||
|
* of this program must display Appropriate Legal Notices, as required under
|
||
|
* Section 5 of the GNU Affero General Public License version 3.
|
||
|
*
|
||
|
*
|
||
|
* In accordance with Section 7(b) of the GNU Affero General Public License
|
||
|
* version 3, these Appropriate Legal Notices must retain the display of the
|
||
|
* "Powered by TimeTrex" logo. If the display of the logo is not reasonably
|
||
|
* feasible for technical reasons, the Appropriate Legal Notices must display
|
||
|
* the words "Powered by TimeTrex".
|
||
|
*
|
||
|
********************************************************************************/
|
||
|
|
||
|
define( 'TIMETREX_JSON_API', true );
|
||
|
if ( isset( $_GET['disable_db'] ) && $_GET['disable_db'] == 1 ) {
|
||
|
$disable_database_connection = true;
|
||
|
}
|
||
|
//Add timetrex.ini.php setting to enable/disable the API. Make an entire [API] section.
|
||
|
require_once( '../../includes/global.inc.php' );
|
||
|
require_once( '../../includes/API.inc.php' );
|
||
|
Header( 'Content-Type: application/json; charset=UTF-8' ); //Make sure content type is not text/HTML to help avoid XSS.
|
||
|
|
||
|
|
||
|
/**
|
||
|
* General handler for service calls, regardless of if the user is logged in or not. Mostly a wrapper to make idempotent request handling consistent across authenticated and unauthenticated calls.
|
||
|
* @param $obj
|
||
|
* @param $class_name
|
||
|
* @param $method
|
||
|
* @param $arguments
|
||
|
* @param $message_id
|
||
|
* @param $api_auth
|
||
|
* @param $user_id
|
||
|
* @return bool
|
||
|
* @throws DBError
|
||
|
* @throws GeneralError
|
||
|
*/
|
||
|
function invokeService( $obj, $class_name, $method, $arguments, $message_id, $api_auth, $user_id ) {
|
||
|
try {
|
||
|
//Handle idempotent enabled requests here.
|
||
|
if ( TTUUID::isUUID( $message_id ) && ( ( isset( $_GET['idempotent'] ) && (int)$_GET['idempotent'] == 1 && strtolower( substr( $method, 0, 3 ) ) != 'get' && strtolower( substr( $method, 0, 8 ) ) != 'validate' ) ) ) { //Don't allow idempotent requests on get*() and validate*() calls.
|
||
|
$irf = new IdempotentRequestFactory();
|
||
|
$irf->setUser( $user_id );
|
||
|
$irf->setIdempotentKey( $obj->getAPIMessageId() );
|
||
|
$irf->setStatus( 10 ); //10=Processing
|
||
|
$irf->setRequestDate( microtime( true ) );
|
||
|
$irf->setRequestMethod( $_SERVER['REQUEST_METHOD'] );
|
||
|
$irf->setRequestBody( ( ( $irf->getRequestMethod() == 'GET' ) ? $_GET : ( ( isset( $_SERVER['CONTENT_LENGTH'] ) && $_SERVER['CONTENT_LENGTH'] <= 25000 ) ? $_POST : [ 'request_body_hash' => sha1( json_encode( $_POST ) ) ] ) ) ); //To prevent bloating the database, only save request bodies smaller than 25K.
|
||
|
$irf->setRequestURI( $_SERVER['REQUEST_URI'] );
|
||
|
if ( $irf->isValid() ) {
|
||
|
Debug::text( ' IDEMPOTENT: Enabled and saved! Key: '. $irf->getIdempotentKey(), __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
$irf->Save( false, false );
|
||
|
if ( $irf->getIsExists() == true ) { //Check if the key already exists in the database.
|
||
|
/**
|
||
|
* @param $key
|
||
|
* @param $user_id
|
||
|
* @return array|false
|
||
|
*/
|
||
|
function getOrWaitForIdempotentResponse( $key, $user_id ) {
|
||
|
$irlf = new IdempotentRequestListFactory();
|
||
|
$irlf->getByIdempotentKeyAndUserId( $key, $user_id );
|
||
|
if ( $irlf->getRecordCount() == 1 ) {
|
||
|
$ir_obj = $irlf->getCurrent();
|
||
|
if ( $ir_obj->getStatus() == 20 ) {
|
||
|
Debug::text( ' IDEMPOTENT: Found saved idempotent response...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
return [ 'response_body' => $ir_obj->getResponseBody() ];
|
||
|
}
|
||
|
}
|
||
|
|
||
|
Debug::text( ' IDEMPOTENT: No saved idempotent response yet...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
Debug::text( ' IDEMPOTENT: Idempotent Key already exists with Status: ' . $irf->getStatus(), __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
|
||
|
$retry_sleep = 1; //Start at 0.5 seconds retry interval, then use expontential backoff, similar to retryTransaction()
|
||
|
$tmp_sleep = ( $retry_sleep * 1000000 );
|
||
|
|
||
|
$retry_attempts = 0;
|
||
|
$retry_max_attempts = 7; //max of 128 seconds delay.
|
||
|
while ( $retry_attempts < $retry_max_attempts ) {
|
||
|
$irf_response = getOrWaitForIdempotentResponse( $irf->getIdempotentKey(), $user_id );
|
||
|
if ( is_array( $irf_response ) && isset( $irf_response['response_body'] ) ) {
|
||
|
Debug::text( ' IDEMPOTENT: Sending saved idempotent response... Key: '. $irf->getIdempotentKey(), __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
echo json_encode( $irf_response['response_body'] );
|
||
|
return true;
|
||
|
} else {
|
||
|
Debug::text( ' IDEMPOTENT: Sleeping for idempotent response before retry... Sleep: '. $tmp_sleep .' Attempt: '. $retry_attempts, __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
$random_sleep_interval = ( ceil( ( rand() / getrandmax() ) * ( ( $tmp_sleep * 0.33 ) * 2 ) - ( $tmp_sleep * 0.33 ) ) ); //+/- 33% of the sleep time.
|
||
|
|
||
|
if ( $retry_attempts < ( $retry_max_attempts - 1 ) ) { //Don't sleep on the last iteration as its serving no purpose.
|
||
|
usleep( $tmp_sleep + $random_sleep_interval );
|
||
|
}
|
||
|
|
||
|
$tmp_sleep = ( $tmp_sleep * 2 ); //Exponential back-off with 25% of retry sleep time as a random value.
|
||
|
$retry_attempts++;
|
||
|
}
|
||
|
}
|
||
|
unset( $retry_sleep, $tmp_sleep, $retry_attempts, $retry_max_attempts );
|
||
|
|
||
|
Debug::text( 'IDEMPOTENT: Response not found after maximum retry attempts, original request is likely still being processed!', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
echo json_encode( $api_auth->returnHandler( false, 'EXCEPTION', TTi18n::getText( 'Idempotent response not available yet, please try again' ) ) );
|
||
|
return true;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
//Use array_values() to remove any named parameters and avoid "Uncaught Error: Unknown named parameter" problems on PHP v8+
|
||
|
// This can happen when a malformed API call is made with arguments like: [ 'filter_page' => 1, 'filter_items_per_page' => 9999 ], which is sending two named arguments to the function,
|
||
|
// instead of: [ 0 => [ 'filter_page' => 1, 'filter_items_per_page' => 9999 ] ], which sends one argument that is an assoc. array.
|
||
|
$retval = call_user_func_array( [ $obj, $method ], array_values( (array)$arguments ) );
|
||
|
if ( $retval !== null ) {
|
||
|
if ( !is_object( $retval ) ) { //Make sure we never return a raw object to end-user, as too much information could be included in it.
|
||
|
echo json_encode( $retval );
|
||
|
$json_error = getJSONError();
|
||
|
if ( $json_error !== false ) {
|
||
|
Debug::Arr( $retval, 'ERROR: JSON: ' . $json_error, __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
echo json_encode( $api_auth->returnHandler( false, 'EXCEPTION', 'ERROR: JSON: ' . $json_error ) );
|
||
|
} else {
|
||
|
//Save response for idempotent requests.
|
||
|
if ( isset( $irf ) && is_object( $irf ) ) {
|
||
|
Debug::text( 'IDEMPOTENT: Updating response to: Completed.', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
$irf->setStatus( 20 ); //20=Completed
|
||
|
$irf->setResponseCode( 200 ); //200=OK
|
||
|
$irf->setResponseBody( $retval );
|
||
|
$irf->setResponseDate( microtime( true ) );
|
||
|
if ( $irf->isValid() ) {
|
||
|
$irf->Save();
|
||
|
}
|
||
|
unset( $irf );
|
||
|
}
|
||
|
}
|
||
|
} else {
|
||
|
Debug::text( 'OBJECT return value, not JSON encoding any additional data.', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
}
|
||
|
} else {
|
||
|
Debug::text( 'NULL return value, not JSON encoding any additional data.', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
}
|
||
|
} catch ( ArgumentCountError $e ) {
|
||
|
echo json_encode( $api_auth->returnHandler( false, 'EXCEPTION', $e->getMessage() ) );
|
||
|
}
|
||
|
|
||
|
return null;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Invoke API methods before the user is authenticated.
|
||
|
* @param $class_name
|
||
|
* @param $method
|
||
|
* @param $arguments
|
||
|
* @param $message_id
|
||
|
* @param $api_auth
|
||
|
* @return bool
|
||
|
* @throws ReflectionException
|
||
|
*/
|
||
|
function unauthenticatedInvokeService( $class_name, $method, $arguments, $message_id, $api_auth ) {
|
||
|
global $config_vars;
|
||
|
TTi18n::chooseBestLocale(); //Make sure we set the locale as best we can when not logged in
|
||
|
|
||
|
Debug::text( 'Handling UNAUTHENTICATED JSON Call To API Factory: ' . $class_name . ' Method: ' . $method . ' Message ID: ' . $message_id, __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
if ( !isset( $config_vars['other']['down_for_maintenance'] ) || isset( $config_vars['other']['down_for_maintenance'] ) && $config_vars['other']['down_for_maintenance'] == '' ) {
|
||
|
$valid_unauthenticated_classes = getUnauthenticatedAPIClasses();
|
||
|
if ( $class_name != '' && in_array( $class_name, $valid_unauthenticated_classes ) && class_exists( $class_name ) ) {
|
||
|
$obj = new $class_name;
|
||
|
|
||
|
if ( isWhiteListedAPICall( $obj, $method ) === true ) {
|
||
|
if ( method_exists( $obj, 'setAPIMessageID' ) ) {
|
||
|
$obj->setAPIMessageID( $message_id ); //Sets API message ID so progress bar continues to work.
|
||
|
}
|
||
|
if ( $method != '' && method_exists( $obj, $method ) ) {
|
||
|
invokeService( $obj, $class_name, $method, $arguments, $message_id, $api_auth, TTUUID::getZeroID() );
|
||
|
} else {
|
||
|
$validator = TTnew( 'Validator' ); /** @var Validator $validator */
|
||
|
Debug::text( 'Class: '. get_class( $obj ) .' Method: ' . $method . ' does not exist!', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
echo json_encode( $api_auth->returnHandler( false, 'SESSION', TTi18n::getText( 'Method: "%1" does not exist.', [ $validator->escapeHTML( $method ) ] ) ) );
|
||
|
}
|
||
|
} else {
|
||
|
$validator = TTnew( 'Validator' ); /** @var Validator $validator */
|
||
|
Debug::text( 'Class: '. get_class( $obj ) .' Method: ' . $method . ' is private!', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
echo json_encode( $api_auth->returnHandler( false, 'EXCEPTION', TTi18n::getText( 'Method: "%1" is private, unable to call.', [ $validator->escapeHTML( $method ) ] ) ) );
|
||
|
}
|
||
|
} else {
|
||
|
$validator = TTnew( 'Validator' ); /** @var Validator $validator */
|
||
|
if ( class_exists( $class_name ) ) {
|
||
|
Debug::text( 'Class: ' . $class_name . ' requires authentication! (unauth)', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
echo json_encode( $api_auth->returnHandler( false, 'SESSION', TTi18n::getText( 'Class: "%1" requires authentication, and not currently authenticated.', [ $validator->escapeHTML( $class_name ) ] ) ) );
|
||
|
} else {
|
||
|
Debug::text( 'Class: ' . $class_name . ' does not exist! (unauth)', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
echo json_encode( $api_auth->returnHandler( false, 'SESSION', TTi18n::getText( 'Class: "%1" does not exist.', [ $validator->escapeHTML( $class_name ) ] ) ) );
|
||
|
}
|
||
|
}
|
||
|
} else {
|
||
|
Debug::text( 'WARNING: Installer/Down For Maintenance is enabled... Service is disabled!', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
echo json_encode( $api_auth->returnHandler( false, 'DOWN_FOR_MAINTENANCE', TTi18n::gettext( '%1 is currently undergoing maintenance. We apologize for any inconvenience this may cause, please try again later.', [ APPLICATION_NAME ] ) ) );
|
||
|
}
|
||
|
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Invoke API methods after the user is authenticated.
|
||
|
* @param $class_name
|
||
|
* @param $method
|
||
|
* @param $arguments
|
||
|
* @param $message_id
|
||
|
* @param $authentication
|
||
|
* @param $api_auth
|
||
|
* @return bool
|
||
|
*/
|
||
|
function authenticatedInvokeService( $class_name, $method, $arguments, $message_id, $authentication, $api_auth ) {
|
||
|
global $current_user, $current_user_prefs, $current_company, $obj;
|
||
|
|
||
|
$current_user = $authentication->getObject();
|
||
|
|
||
|
if ( is_object( $current_user ) ) {
|
||
|
$current_user_prefs = handleOverridePreferences( $current_user );
|
||
|
|
||
|
$clf = new CompanyListFactory();
|
||
|
$current_company = $clf->getByID( $current_user->getCompany() )->getCurrent();
|
||
|
|
||
|
if ( is_object( $current_company ) ) {
|
||
|
Debug::text( 'Current User: ' . $current_user->getUserName() . ' (User ID: ' . $current_user->getID() . ') Company: ' . $current_company->getName() . ' (Company ID: ' . $current_company->getId() . ')', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
|
||
|
//Debug::text('Handling JSON Call To API Factory: '. $class_name .' Method: '. $method .' Message ID: '. $message_id .' UserName: '. $current_user->getUserName(), __FILE__, __LINE__, __METHOD__, 10);
|
||
|
if ( $class_name != '' && class_exists( $class_name ) ) {
|
||
|
$obj = new $class_name;
|
||
|
|
||
|
if ( isWhiteListedAPICall( $obj, $method ) === true ) {
|
||
|
if ( method_exists( $obj, 'setAPIMessageID' ) ) {
|
||
|
$obj->setAPIMessageID( $message_id ); //Sets API message ID so progress bar continues to work.
|
||
|
}
|
||
|
|
||
|
if ( $method != '' && method_exists( $obj, $method ) ) {
|
||
|
invokeService( $obj, $class_name, $method, $arguments, $message_id, $api_auth, $current_user->getId() );
|
||
|
} else {
|
||
|
Debug::text( 'Method: ' . $method . ' does not exist!', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
echo json_encode( $api_auth->returnHandler( false, 'EXCEPTION', TTi18n::getText( 'Method: "%1" does not exist.', [ $current_company->Validator->escapeHTML( $method ) ] ) ) );
|
||
|
}
|
||
|
} else {
|
||
|
Debug::text( 'Method: ' . $method . ' is private!', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
echo json_encode( $api_auth->returnHandler( false, 'EXCEPTION', TTi18n::getText( 'Method: "%1" is private, unable to call.', [ $current_company->Validator->escapeHTML( $method ) ] ) ) );
|
||
|
}
|
||
|
} else {
|
||
|
Debug::text( 'Class: ' . $class_name . ' does not exist!', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
echo json_encode( $api_auth->returnHandler( false, 'EXCEPTION', TTi18n::getText( 'Class: "%1" does not exist.', [ $current_company->Validator->escapeHTML( $class_name ) ] ) ) );
|
||
|
}
|
||
|
} else {
|
||
|
Debug::text( 'Failed to get Company Object!', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
echo json_encode( $api_auth->returnHandler( false, 'SESSION', TTi18n::getText( 'Company does not exist.' ) ) );
|
||
|
}
|
||
|
} else {
|
||
|
Debug::text( 'Failed to get User Object!', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
echo json_encode( $api_auth->returnHandler( false, 'SESSION', TTi18n::getText( 'User does not exist.' ) ) );
|
||
|
}
|
||
|
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
/*
|
||
|
Arguments:
|
||
|
GET: SessionID
|
||
|
GET: Class
|
||
|
GET: Method
|
||
|
POST: Arguments for method.
|
||
|
*/
|
||
|
$class_prefix = 'API';
|
||
|
$class_name = false;
|
||
|
$method = false;
|
||
|
|
||
|
if ( isset( $_GET['Class'] ) && $_GET['Class'] != '' ) {
|
||
|
$class_name = $_GET['Class'];
|
||
|
|
||
|
//If API wasn't already put on the class, add it manually.
|
||
|
if ( strtolower( substr( $class_name, 0, 3 ) ) != 'api' ) {
|
||
|
$class_name = $class_prefix . $class_name;
|
||
|
}
|
||
|
|
||
|
$class_name = TTgetPluginClassName( $class_name );
|
||
|
} else {
|
||
|
$class_name = TTgetPluginClassName( $class_prefix . 'Authentication' );
|
||
|
}
|
||
|
|
||
|
if ( isset( $_GET['Method'] ) && $_GET['Method'] != '' ) {
|
||
|
$method = $_GET['Method'];
|
||
|
}
|
||
|
|
||
|
if ( isset( $_GET['MessageID'] ) && $_GET['MessageID'] != '' ) {
|
||
|
$message_id = $_GET['MessageID'];
|
||
|
} else {
|
||
|
$message_id = $_GET['MessageID'] = md5( uniqid() ); //Random message_id
|
||
|
}
|
||
|
|
||
|
Debug::text( 'Handling JSON Call To API Factory: ' . $class_name . ' Method: ' . $method . ' Message ID: ' . $message_id, __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
|
||
|
//URL: api.php?SessionID=fc914bf32711bff031a6c80295bbff86&Class=APIPayStub&Method=getPayStub
|
||
|
/*
|
||
|
RAW POST: data[filter_data][id][0]=101561&paging=TRUE&format=pdf
|
||
|
JSON (URL encoded): %7B%22data%22%3A%7B%22filter_data%22%3A%7B%22id%22%3A%5B101561%5D%7D%7D%2C%22paging%22%3Atrue%2C%22format%22%3A%22pdf%22%7D
|
||
|
|
||
|
FULL URL: SessionID=fc914bf32711bff031a6c80295bbff86&Class=APIPayStub&Method=test&json={"data":{"filter_data":{"id":[101561]}},"paging":true,"format":"pdf"}
|
||
|
*/
|
||
|
/*
|
||
|
$_POST = array( 'data' => array('filter_data' => array('id' => array(101561) ) ),
|
||
|
'paging' => TRUE,
|
||
|
'format' => 'pdf',
|
||
|
);
|
||
|
*/
|
||
|
//Debug::Arr(file_get_contents('php://input'), 'POST: ', __FILE__, __LINE__, __METHOD__, 10);
|
||
|
//Debug::Arr($_POST, 'POST: ', __FILE__, __LINE__, __METHOD__, 10);
|
||
|
|
||
|
$api_auth = TTNew( 'APIAuthentication' ); /** @var APIAuthentication $api_auth */ //Used to handle error cases and display error messages.
|
||
|
|
||
|
$argument_size = strlen( $HTTP_RAW_POST_DATA ); //Just strlen this variable rather than serialize all the data as it should be much faster.
|
||
|
if ( isset($_SERVER['CONTENT_LENGTH']) && $_SERVER['CONTENT_LENGTH'] > 0 ) {
|
||
|
if ( (int)$_SERVER['CONTENT_LENGTH'] != $argument_size ) {
|
||
|
Debug::Text( 'WARNING: Content Length header: '. $_SERVER['CONTENT_LENGTH'] .' does not match actual content length: ' . $argument_size .'. Request from client is possibly corrupt or cutoff.', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
//TODO: Possibly return an error message to the user to retry?
|
||
|
}
|
||
|
}
|
||
|
|
||
|
$arguments = $_POST;
|
||
|
if ( isset($_POST['json']) || isset($_GET['json']) ) {
|
||
|
if ( isset( $_GET['json'] ) && $_GET['json'] != '' ) {
|
||
|
$arguments = json_decode( $_GET['json'], true );
|
||
|
} else if ( isset( $_POST['json'] ) && $_POST['json'] != '' ) {
|
||
|
$arguments = json_decode( $_POST['json'], true );
|
||
|
}
|
||
|
|
||
|
//Test to see if json_decode() failed for some reason, this should help determine if the argument data is somehow corrupt.
|
||
|
if ( $argument_size > 5 && $arguments === null && getJSONError() != '' ) {
|
||
|
Debug::Text( 'JSON Error: ' . getJSONError(), __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
Debug::Arr( $HTTP_RAW_POST_DATA, 'Raw POST Request: ', __FILE__, __LINE__, __METHOD__, 0 );
|
||
|
Debug::Arr( urldecode( $HTTP_RAW_POST_DATA ), 'URL Decoded Raw POST Request: ', __FILE__, __LINE__, __METHOD__, 0 );
|
||
|
}
|
||
|
} elseif ( $HTTP_RAW_POST_DATA != '' ) {
|
||
|
$arguments = json_decode( $HTTP_RAW_POST_DATA, true );
|
||
|
if ( $arguments !== null && getJSONError() == '' ) {
|
||
|
echo json_encode( $api_auth->returnHandler( false, 'EXCEPTION', TTi18n::getText( 'ERROR: JSON payload must be sent within the \'json\' POST variable. ie: json=<JSON DATA>' ) ) );
|
||
|
} else {
|
||
|
echo json_encode( $api_auth->returnHandler( false, 'EXCEPTION', TTi18n::getText( 'ERROR: No JSON POST variable payload received. Payload must be sent within the \'json\' POST variable. ie: json=<JSON DATA>' ) ) );
|
||
|
}
|
||
|
Debug::Arr( urldecode( $HTTP_RAW_POST_DATA ), 'URL Decoded Raw POST Request: ', __FILE__, __LINE__, __METHOD__, 0 );
|
||
|
//Debug::writeToLog(); //Handled in TTShutdown now.
|
||
|
exit;
|
||
|
|
||
|
}
|
||
|
|
||
|
if ( PRODUCTION == true && $argument_size > ( 1024 * 12 ) ) {
|
||
|
Debug::Text( 'Arguments too large to display... Size: ' . $argument_size, __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
} else {
|
||
|
if ( in_array( strtolower( $method ), [ 'login', 'changepassword', 'registerapikey', 'senderrorreport' ] ) && isset( $arguments[0] ) ) { //Make sure passwords arent displayed if logging is enabled.
|
||
|
Debug::Arr( $arguments[0], '*Censored* Arguments: (Size: ' . $argument_size . ')', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
} else {
|
||
|
Debug::Arr( $arguments, 'Arguments: (Size: ' . $argument_size . ')', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
}
|
||
|
}
|
||
|
unset( $argument_size );
|
||
|
|
||
|
$authentication = new Authentication();
|
||
|
if ( isUnauthenticatedMethod( $method ) == true || $authentication->checkValidCSRFToken() == true ) { //Help prevent CSRF attacks with this, run this check during and before the user is logged in. However, when calling isLoggedIn() after being idle, if the CSRF/SessionID cookies are deleted, it will trigger a CSRF error before logging the user out. So we want to ignore CSRF checks for these functions.
|
||
|
$session_id = getSessionID();
|
||
|
if ( ( isset( $config_vars['other']['installer_enabled'] ) && $config_vars['other']['installer_enabled'] == false ) && ( !isset( $config_vars['other']['down_for_maintenance'] ) || isset( $config_vars['other']['down_for_maintenance'] ) && $config_vars['other']['down_for_maintenance'] == '' ) && $session_id != '' && !isset( $_GET['disable_db'] ) && isUnauthenticatedMethod( $method ) == false ) { //When interface calls PING() on a regular basis we need to skip this check and pass it to APIAuthentication immediately to avoid updating the session time.
|
||
|
Debug::text( 'Session ID: ' . $session_id . ' Source IP: ' . Misc::getRemoteIPAddress(), __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
if ( $authentication->isSessionIDAPIKey( $session_id ) == true ) {
|
||
|
$authentication_type_id = 700; //API Key
|
||
|
} else if ( Misc::isMobileAppUserAgent() == true && Misc::getMobileAppClientVersion() != '' && version_compare( Misc::getMobileAppClientVersion(), '5.0.0', '<' ) ) { //As of Mobile App v5.0 it no longer uses Quick Punch ID/Password.
|
||
|
$authentication_type_id = 605; //Phone ID - Mobile App
|
||
|
} else {
|
||
|
$authentication_type_id = [ 800, 810 ]; //USER_NAME, USER_NAME_MULTI_FACTOR
|
||
|
}
|
||
|
|
||
|
if ( $class_name != 'APIProgressBar' && $authentication->Check( $session_id, $authentication_type_id ) === true ) { //Always treat APIProgressBar as unauthenticated as an optimization to avoid causing uncessary SQL queries.
|
||
|
authenticatedInvokeService( $class_name, $method, $arguments, $message_id, $authentication, $api_auth );
|
||
|
} else {
|
||
|
Debug::text( 'SessionID set but user not authenticated!', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
//echo json_encode( $api_auth->returnHandler( FALSE, 'SESSION', TTi18n::getText('User is not authenticated.' ) ) );
|
||
|
|
||
|
//Rather than fail with session error, switch over to using unauthenticated calls, which if its calling to authenticated method will cause a SESSION error at that time.
|
||
|
unauthenticatedInvokeService( $class_name, $method, $arguments, $message_id, $api_auth );
|
||
|
}
|
||
|
} else {
|
||
|
Debug::text( 'No SessionID or calling non-authenticated function...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
unauthenticatedInvokeService( $class_name, $method, $arguments, $message_id, $api_auth );
|
||
|
}
|
||
|
} else {
|
||
|
echo json_encode( $api_auth->returnHandler( false, 'EXCEPTION_CSRF', TTi18n::getText( 'Invalid CSRF token, please refresh your browser and try again!' ) ) ); //Could potentially use a SESSION error so the front-end logs the user out so they can login again with a fresh CSRF token.
|
||
|
}
|
||
|
?>
|