Harden tenant admin auth and photo moderation
Some checks failed
linter / quality (push) Has been cancelled
tests / ci (push) Has been cancelled
tests / ui (push) Has been cancelled

This commit is contained in:
Codex Agent
2026-01-30 14:53:51 +01:00
parent d45cb6a087
commit 916b204688
7 changed files with 220 additions and 11 deletions

View File

@@ -20,6 +20,7 @@ use App\Support\WatermarkConfigResolver;
use Illuminate\Http\JsonResponse; use Illuminate\Http\JsonResponse;
use Illuminate\Http\Request; use Illuminate\Http\Request;
use Illuminate\Http\Resources\Json\AnonymousResourceCollection; use Illuminate\Http\Resources\Json\AnonymousResourceCollection;
use Illuminate\Http\UploadedFile;
use Illuminate\Support\Arr; use Illuminate\Support\Arr;
use Illuminate\Support\Facades\DB; use Illuminate\Support\Facades\DB;
use Illuminate\Support\Facades\Log; use Illuminate\Support\Facades\Log;
@@ -115,6 +116,7 @@ class PhotoController extends Controller
$event = Event::where('slug', $eventSlug) $event = Event::where('slug', $eventSlug)
->where('tenant_id', $tenantId) ->where('tenant_id', $tenantId)
->firstOrFail(); ->firstOrFail();
TenantMemberPermissions::ensureEventPermission($request, $event, 'photos:moderate');
if ($photo->event_id !== $event->id) { if ($photo->event_id !== $event->id) {
return ApiError::response( return ApiError::response(
@@ -321,7 +323,7 @@ class PhotoController extends Controller
$disk = $this->eventStorageManager->getHotDiskForEvent($event); $disk = $this->eventStorageManager->getHotDiskForEvent($event);
// Generate unique filename // Generate unique filename
$extension = $file->getClientOriginalExtension(); $extension = $this->resolvePhotoExtension($file);
$filename = Str::uuid().'.'.$extension; $filename = Str::uuid().'.'.$extension;
$path = "events/{$eventSlug}/photos/{$filename}"; $path = "events/{$eventSlug}/photos/{$filename}";
@@ -563,6 +565,7 @@ class PhotoController extends Controller
$event = Event::where('slug', $eventSlug) $event = Event::where('slug', $eventSlug)
->where('tenant_id', $tenantId) ->where('tenant_id', $tenantId)
->firstOrFail(); ->firstOrFail();
TenantMemberPermissions::ensureEventPermission($request, $event, 'photos:moderate');
if ($photo->event_id !== $event->id) { if ($photo->event_id !== $event->id) {
return ApiError::response( return ApiError::response(
@@ -779,6 +782,7 @@ class PhotoController extends Controller
$event = Event::where('slug', $eventSlug) $event = Event::where('slug', $eventSlug)
->where('tenant_id', $tenantId) ->where('tenant_id', $tenantId)
->firstOrFail(); ->firstOrFail();
TenantMemberPermissions::ensureEventPermission($request, $event, 'photos:moderate');
$photos = Photo::where('event_id', $event->id) $photos = Photo::where('event_id', $event->id)
->where('status', 'pending') ->where('status', 'pending')
@@ -1043,4 +1047,23 @@ class PhotoController extends Controller
return array_values(array_unique(array_filter($candidates))); return array_values(array_unique(array_filter($candidates)));
} }
private function resolvePhotoExtension(UploadedFile $file): string
{
$extension = strtolower((string) $file->extension());
if (! in_array($extension, ['jpg', 'jpeg', 'png', 'webp'], true)) {
$extension = strtolower((string) $file->getClientOriginalExtension());
}
if (! in_array($extension, ['jpg', 'jpeg', 'png', 'webp'], true)) {
$extension = match ($file->getMimeType()) {
'image/png' => 'png',
'image/webp' => 'webp',
default => 'jpg',
};
}
return $extension === 'jpeg' ? 'jpg' : $extension;
}
} }

View File

@@ -157,6 +157,10 @@ class AuthenticatedSessionController extends Controller
return null; return null;
} }
if (str_starts_with($candidate, '//')) {
return null;
}
if (str_starts_with($candidate, '/')) { if (str_starts_with($candidate, '/')) {
return $candidate; return $candidate;
} }
@@ -170,7 +174,7 @@ class AuthenticatedSessionController extends Controller
$appHost = parse_url($request->getSchemeAndHttpHost(), PHP_URL_HOST); $appHost = parse_url($request->getSchemeAndHttpHost(), PHP_URL_HOST);
if ($appHost && ! Str::endsWith($targetHost, $appHost)) { if (! $appHost || ! $this->isAllowedReturnHost($targetHost, $appHost)) {
return null; return null;
} }
@@ -222,7 +226,7 @@ class AuthenticatedSessionController extends Controller
$scheme = $parsed['scheme'] ?? null; $scheme = $parsed['scheme'] ?? null;
$requestHost = parse_url($request->getSchemeAndHttpHost(), PHP_URL_HOST); $requestHost = parse_url($request->getSchemeAndHttpHost(), PHP_URL_HOST);
if ($scheme && $host && $requestHost && ! Str::endsWith($host, $requestHost)) { if ($scheme && $host && $requestHost && ! $this->isAllowedReturnHost($host, $requestHost)) {
return '/event-admin/dashboard'; return '/event-admin/dashboard';
} }
@@ -265,6 +269,15 @@ class AuthenticatedSessionController extends Controller
return $decoded; return $decoded;
} }
private function isAllowedReturnHost(string $targetHost, string $appHost): bool
{
if ($targetHost === $appHost) {
return true;
}
return Str::endsWith($targetHost, '.'.$appHost);
}
private function rememberTenantAdminTarget(Request $request, ?string $target): void private function rememberTenantAdminTarget(Request $request, ?string $target): void
{ {
$user = Auth::user(); $user = Auth::user();

View File

@@ -100,13 +100,30 @@ class TenantAdminFacebookController extends Controller
return null; return null;
} }
if (str_starts_with($decoded, '//')) {
return null;
}
if (str_starts_with($decoded, '/')) {
return $decoded;
}
$targetHost = parse_url($decoded, PHP_URL_HOST); $targetHost = parse_url($decoded, PHP_URL_HOST);
$appHost = parse_url($request->getSchemeAndHttpHost(), PHP_URL_HOST); $appHost = parse_url($request->getSchemeAndHttpHost(), PHP_URL_HOST);
if ($targetHost && $appHost && ! Str::endsWith($targetHost, $appHost)) { if (! $targetHost || ! $appHost || ! $this->isAllowedReturnHost($targetHost, $appHost)) {
return null; return null;
} }
return $decoded; return $decoded;
} }
private function isAllowedReturnHost(string $targetHost, string $appHost): bool
{
if ($targetHost === $appHost) {
return true;
}
return Str::endsWith($targetHost, '.'.$appHost);
}
} }

View File

@@ -100,13 +100,30 @@ class TenantAdminGoogleController extends Controller
return null; return null;
} }
if (str_starts_with($decoded, '//')) {
return null;
}
if (str_starts_with($decoded, '/')) {
return $decoded;
}
$targetHost = parse_url($decoded, PHP_URL_HOST); $targetHost = parse_url($decoded, PHP_URL_HOST);
$appHost = parse_url($request->getSchemeAndHttpHost(), PHP_URL_HOST); $appHost = parse_url($request->getSchemeAndHttpHost(), PHP_URL_HOST);
if ($targetHost && $appHost && ! Str::endsWith($targetHost, $appHost)) { if (! $targetHost || ! $appHost || ! $this->isAllowedReturnHost($targetHost, $appHost)) {
return null; return null;
} }
return $decoded; return $decoded;
} }
private function isAllowedReturnHost(string $targetHost, string $appHost): bool
{
if ($targetHost === $appHost) {
return true;
}
return Str::endsWith($targetHost, '.'.$appHost);
}
} }

View File

@@ -322,12 +322,24 @@ Route::prefix('v1')->name('api.v1.')->group(function () {
Route::prefix('photos')->group(function () { Route::prefix('photos')->group(function () {
Route::get('/', [PhotoController::class, 'index'])->name('tenant.events.photos.index'); Route::get('/', [PhotoController::class, 'index'])->name('tenant.events.photos.index');
Route::post('/', [PhotoController::class, 'store'])->name('tenant.events.photos.store'); Route::post('/', [PhotoController::class, 'store'])->name('tenant.events.photos.store');
Route::get('{photo}', [PhotoController::class, 'show'])->name('tenant.events.photos.show'); Route::get('{photo}', [PhotoController::class, 'show'])
Route::patch('{photo}', [PhotoController::class, 'update'])->name('tenant.events.photos.update'); ->whereNumber('photo')
Route::delete('{photo}', [PhotoController::class, 'destroy'])->name('tenant.events.photos.destroy'); ->name('tenant.events.photos.show');
Route::post('{photo}/feature', [PhotoController::class, 'feature'])->name('tenant.events.photos.feature'); Route::patch('{photo}', [PhotoController::class, 'update'])
Route::post('{photo}/unfeature', [PhotoController::class, 'unfeature'])->name('tenant.events.photos.unfeature'); ->whereNumber('photo')
Route::post('{photo}/visibility', [PhotoController::class, 'visibility'])->name('tenant.events.photos.visibility'); ->name('tenant.events.photos.update');
Route::delete('{photo}', [PhotoController::class, 'destroy'])
->whereNumber('photo')
->name('tenant.events.photos.destroy');
Route::post('{photo}/feature', [PhotoController::class, 'feature'])
->whereNumber('photo')
->name('tenant.events.photos.feature');
Route::post('{photo}/unfeature', [PhotoController::class, 'unfeature'])
->whereNumber('photo')
->name('tenant.events.photos.unfeature');
Route::post('{photo}/visibility', [PhotoController::class, 'visibility'])
->whereNumber('photo')
->name('tenant.events.photos.visibility');
Route::post('bulk-approve', [PhotoController::class, 'bulkApprove'])->name('tenant.events.photos.bulk-approve'); Route::post('bulk-approve', [PhotoController::class, 'bulkApprove'])->name('tenant.events.photos.bulk-approve');
Route::post('bulk-reject', [PhotoController::class, 'bulkReject'])->name('tenant.events.photos.bulk-reject'); Route::post('bulk-reject', [PhotoController::class, 'bulkReject'])->name('tenant.events.photos.bulk-reject');
Route::get('moderation', [PhotoController::class, 'forModeration'])->name('tenant.events.photos.for-moderation'); Route::get('moderation', [PhotoController::class, 'forModeration'])->name('tenant.events.photos.for-moderation');

View File

@@ -184,6 +184,30 @@ class LoginTest extends TestCase
$response->assertRedirect('/event-admin/dashboard'); $response->assertRedirect('/event-admin/dashboard');
} }
public function test_tenant_admin_login_rejects_lookalike_return_host(): void
{
$user = User::factory()->create([
'email' => 'hostcheck@example.com',
'role' => 'tenant_admin',
'password' => bcrypt('password'),
'email_verified_at' => now(),
]);
$appHost = parse_url(config('app.url'), PHP_URL_HOST) ?? 'localhost';
$targetHost = 'evil-'.$appHost;
$target = "https://{$targetHost}/event-admin/dashboard";
$encodedReturn = rtrim(strtr(base64_encode($target), '+/', '-_'), '=');
$response = $this->post(route('login.store'), [
'login' => 'hostcheck@example.com',
'password' => 'password',
'return_to' => $encodedReturn,
]);
$this->assertAuthenticatedAs($user);
$response->assertRedirect('/event-admin/dashboard');
}
public function test_tenant_admin_can_access_login_with_admin_return_path_when_authenticated() public function test_tenant_admin_can_access_login_with_admin_return_path_when_authenticated()
{ {
$user = User::factory()->create([ $user = User::factory()->create([

View File

@@ -0,0 +1,103 @@
<?php
namespace Tests\Feature\Tenant;
use App\Models\Event;
use App\Models\EventMember;
use App\Models\EventPackage;
use App\Models\MediaStorageTarget;
use App\Models\Package;
use App\Models\Photo;
use App\Models\User;
use Illuminate\Http\UploadedFile;
use Illuminate\Support\Facades\Hash;
class PhotoUploadSecurityTest extends TenantTestCase
{
public function test_photo_upload_uses_safe_extension_from_mime(): void
{
$event = Event::factory()->for($this->tenant)->create([
'slug' => 'secure-photo-upload',
]);
MediaStorageTarget::query()->create([
'key' => 'local',
'name' => 'Local Storage',
'driver' => 'local',
'is_hot' => true,
'is_default' => true,
'is_active' => true,
'priority' => 1,
]);
$package = Package::factory()->endcustomer()->create([
'max_photos' => 500,
'max_guests' => 100,
'gallery_days' => 30,
]);
EventPackage::query()->create([
'event_id' => $event->id,
'package_id' => $package->id,
'purchased_price' => 0,
'used_photos' => 0,
'used_guests' => 0,
]);
$file = UploadedFile::fake()->image('photo.jpeg', 800, 600);
$response = $this->withHeaders([
'Authorization' => 'Bearer '.$this->token,
'Accept' => 'application/json',
])->post("/api/v1/tenant/events/{$event->slug}/photos", [
'photo' => $file,
]);
$response->assertCreated();
$photo = Photo::query()->first();
$this->assertNotNull($photo);
$this->assertSame('jpg', strtolower(pathinfo((string) $photo->file_path, PATHINFO_EXTENSION)));
if (Photo::supportsFilenameColumn()) {
$this->assertStringEndsWith('.jpg', (string) $photo->filename);
}
}
public function test_member_without_moderation_permission_cannot_access_moderation_queue(): void
{
$event = Event::factory()->for($this->tenant)->create([
'slug' => 'no-moderation-permission',
]);
$memberUser = User::factory()->create([
'email' => 'limited.member@example.com',
'tenant_id' => $this->tenant->id,
'role' => 'member',
'password' => Hash::make('secret123'),
]);
EventMember::factory()->create([
'tenant_id' => $this->tenant->id,
'event_id' => $event->id,
'user_id' => $memberUser->id,
'email' => $memberUser->email,
'role' => 'member',
'status' => 'active',
'permissions' => [],
]);
$login = $this->postJson('/api/v1/tenant-auth/login', [
'login' => $memberUser->email,
'password' => 'secret123',
]);
$login->assertOk();
$token = $login->json('token');
$response = $this->withHeaders([
'Authorization' => 'Bearer '.$token,
'Accept' => 'application/json',
])->getJson("/api/v1/tenant/events/{$event->slug}/photos/moderation");
$response->assertForbidden();
$response->assertJsonPath('error.code', 'insufficient_permission');
}
}