blob: 2fb6c3ce97ffea24b6f507ea4255f84af47bb7ae [file] [log] [blame]
<?php
/*
|--------------------------------------------------------------------------
| Application & Route Filters
|--------------------------------------------------------------------------
|
| Below you will find the "before" and "after" events for the application
| which may be used to do any work before or after a request into your
| application. Here you may also register your custom route filters.
|
*/
App::before(function ($request) {
$apiVersion = Airavata::getAPIVersion();
if (empty($apiVersion))
return View::make("server-down");
});
App::after(function ($request, $response) {
//
// Test commit.
});
/*
|--------------------------------------------------------------------------
| Authentication Filters
|--------------------------------------------------------------------------
|
| The following filters are used to verify that the user of the current
| session is logged into this application. The "basic" filter easily
| integrates HTTP Basic authentication for quick, simple checking.
|
*/
Route::filter('auth', function () {
if (Auth::guest()) {
if (Request::ajax()) {
return Response::make('Unauthorized', 401);
} else {
return Redirect::guest('login');
}
}
});
Route::filter('auth.basic', function () {
return Auth::basic();
});
/*
|--------------------------------------------------------------------------
| Guest Filter
|--------------------------------------------------------------------------
|
| The "guest" filter is the counterpart of the authentication filters as
| it simply checks that the current user is not logged in. A redirect
| response will be issued if they are, which you may freely change.
|
*/
Route::filter('guest', function () {
if (Auth::check()) return Redirect::to('/');
});
/*
|--------------------------------------------------------------------------
| CSRF Protection Filter
|--------------------------------------------------------------------------
|
| The CSRF filter is responsible for protecting your application against
| cross-site request forgery attacks. If this special token in a user
| session does not match the one given in this request, we'll bail.
|
*/
Route::filter('csrf', function () {
if (Session::token() != Input::get('_token')) {
throw new Illuminate\Session\TokenMismatchException;
}
});
Route::filter('verifylogin', function () {
if (!CommonUtilities::verify_login())
return Redirect::to("home")->with("login-alert", true);
});
Route::filter('verifyadmin', function () {
if (CommonUtilities::verify_login()) {
if (!(Session::has("admin") || Session::has("admin-read-only"))) {
return Redirect::to("home")->with("admin-alert", true);
}
} else
return Redirect::to("home")->with("login-alert", true);
});
Route::filter('verifyeditadmin', function () {
if (CommonUtilities::verify_login()) {
if (!Session::has("admin")) {
return Redirect::to("home")->with("admin-alert", true);
}
} else
return Redirect::to("home")->with("login-alert", true);
});