BookStack/app/Auth/User.php

307 lines
7.9 KiB
PHP
Raw Normal View History

<?php namespace BookStack\Auth;
2015-07-13 03:01:42 +08:00
use BookStack\Api\ApiToken;
use BookStack\Interfaces\Loggable;
use BookStack\Interfaces\Sluggable;
use BookStack\Model;
use BookStack\Notifications\ResetPassword;
use BookStack\Uploads\Image;
2019-08-17 22:52:33 +08:00
use Carbon\Carbon;
use Exception;
2015-07-13 03:01:42 +08:00
use Illuminate\Auth\Authenticatable;
use Illuminate\Auth\Passwords\CanResetPassword;
use Illuminate\Contracts\Auth\Authenticatable as AuthenticatableContract;
use Illuminate\Contracts\Auth\CanResetPassword as CanResetPasswordContract;
use Illuminate\Database\Eloquent\Builder;
use Illuminate\Database\Eloquent\Relations\BelongsTo;
use Illuminate\Database\Eloquent\Relations\BelongsToMany;
use Illuminate\Database\Eloquent\Relations\HasMany;
use Illuminate\Notifications\Notifiable;
use Illuminate\Support\Collection;
2015-07-13 03:01:42 +08:00
2019-08-17 22:52:33 +08:00
/**
* Class User
* @property string $id
* @property string $name
* @property string $slug
2019-08-17 22:52:33 +08:00
* @property string $email
* @property string $password
* @property Carbon $created_at
* @property Carbon $updated_at
* @property bool $email_confirmed
* @property int $image_id
* @property string $external_auth_id
* @property string $system_name
* @property Collection $roles
2019-08-17 22:52:33 +08:00
*/
class User extends Model implements AuthenticatableContract, CanResetPasswordContract, Loggable, Sluggable
2015-07-13 03:01:42 +08:00
{
use Authenticatable, CanResetPassword, Notifiable;
2015-07-13 03:01:42 +08:00
/**
* The database table used by the model.
* @var string
*/
protected $table = 'users';
/**
* The attributes that are mass assignable.
* @var array
*/
protected $fillable = ['name', 'email'];
2015-07-13 03:01:42 +08:00
protected $casts = ['last_activity_at' => 'datetime'];
2015-07-13 03:01:42 +08:00
/**
* The attributes excluded from the model's JSON form.
* @var array
*/
protected $hidden = [
'password', 'remember_token', 'system_name', 'email_confirmed', 'external_auth_id', 'email',
2020-05-23 07:28:41 +08:00
'created_at', 'updated_at', 'image_id',
];
2015-08-23 20:41:35 +08:00
/**
* This holds the user's permissions when loaded.
* @var ?Collection
*/
protected $permissions;
/**
* This holds the default user when loaded.
* @var null|User
*/
protected static $defaultUser = null;
2015-08-25 04:10:04 +08:00
/**
* Returns the default public user.
2015-08-25 04:10:04 +08:00
*/
public static function getDefault(): User
2015-08-25 04:10:04 +08:00
{
if (!is_null(static::$defaultUser)) {
return static::$defaultUser;
}
static::$defaultUser = static::query()->where('system_name', '=', 'public')->first();
return static::$defaultUser;
}
/**
* Check if the user is the default public user.
*/
public function isDefault(): bool
{
return $this->system_name === 'public';
2015-08-25 04:10:04 +08:00
}
2015-08-29 22:03:42 +08:00
/**
* The roles that belong to the user.
* @return BelongsToMany
2015-08-29 22:03:42 +08:00
*/
public function roles()
{
if ($this->id === 0) {
return ;
}
return $this->belongsToMany(Role::class);
2015-08-29 22:03:42 +08:00
}
/**
* Check if the user has a role.
*/
public function hasRole($roleId): bool
2015-08-29 22:03:42 +08:00
{
return $this->roles->pluck('id')->contains($roleId);
}
2017-01-02 05:21:11 +08:00
/**
* Check if the user has a role.
*/
public function hasSystemRole(string $roleSystemName): bool
2017-01-02 05:21:11 +08:00
{
return $this->roles->pluck('system_name')->contains($roleSystemName);
2017-01-02 05:21:11 +08:00
}
/**
* Attach the default system role to this user.
*/
public function attachDefaultRole(): void
{
$roleId = setting('registration-role');
if ($roleId && $this->roles()->where('id', '=', $roleId)->count() === 0) {
$this->roles()->attach($roleId);
}
}
/**
* Check if the user has a particular permission.
*/
public function can(string $permissionName): bool
{
if ($this->email === 'guest') {
return false;
}
return $this->permissions()->contains($permissionName);
}
/**
* Get all permissions belonging to a the current user.
*/
protected function permissions(): Collection
{
if (isset($this->permissions)) {
return $this->permissions;
}
$this->permissions = $this->newQuery()->getConnection()->table('role_user', 'ru')
->select('role_permissions.name as name')->distinct()
->leftJoin('permission_role', 'ru.role_id', '=', 'permission_role.role_id')
->leftJoin('role_permissions', 'permission_role.permission_id', '=', 'role_permissions.id')
->where('ru.user_id', '=', $this->id)
->get()
->pluck('name');
return $this->permissions;
2015-08-29 22:03:42 +08:00
}
/**
* Clear any cached permissions on this instance.
2015-08-29 22:03:42 +08:00
*/
public function clearPermissionCache()
2015-08-29 22:03:42 +08:00
{
$this->permissions = null;
2015-08-29 22:03:42 +08:00
}
/**
* Attach a role to this user.
*/
public function attachRole(Role $role)
{
$this->roles()->attach($role->id);
2015-08-29 22:03:42 +08:00
}
2015-09-05 03:40:36 +08:00
/**
* Get the social account associated with this user.
*/
public function socialAccounts(): HasMany
2015-09-05 03:40:36 +08:00
{
return $this->hasMany(SocialAccount::class);
2015-09-05 03:40:36 +08:00
}
/**
* Check if the user has a social account,
* If a driver is passed it checks for that single account type.
* @param bool|string $socialDriver
* @return bool
*/
public function hasSocialAccount($socialDriver = false)
{
if ($socialDriver === false) {
2015-09-05 03:40:36 +08:00
return $this->socialAccounts()->count() > 0;
}
return $this->socialAccounts()->where('driver', '=', $socialDriver)->exists();
}
2015-08-23 20:41:35 +08:00
/**
* Returns a URL to the user's avatar
2015-08-23 20:41:35 +08:00
*/
public function getAvatar(int $size = 50): string
2015-08-23 20:41:35 +08:00
{
$default = url('/user_avatar.png');
$imageId = $this->image_id;
if ($imageId === 0 || $imageId === '0' || $imageId === null) {
return $default;
}
try {
$avatar = $this->avatar ? url($this->avatar->getThumb($size, $size, false)) : $default;
} catch (Exception $err) {
$avatar = $default;
}
return $avatar;
2015-12-10 06:30:55 +08:00
}
/**
* Get the avatar for the user.
*/
public function avatar(): BelongsTo
2015-12-10 06:30:55 +08:00
{
return $this->belongsTo(Image::class, 'image_id');
2015-08-23 20:41:35 +08:00
}
2015-09-05 03:40:36 +08:00
/**
* Get the API tokens assigned to this user.
*/
public function apiTokens(): HasMany
{
return $this->hasMany(ApiToken::class);
}
/**
* Get the last activity time for this user.
*/
public function scopeWithLastActivityAt(Builder $query)
{
$query->addSelect(['activities.created_at as last_activity_at'])
->leftJoinSub(function (\Illuminate\Database\Query\Builder $query) {
$query->from('activities')->select('user_id')
->selectRaw('max(created_at) as created_at')
->groupBy('user_id');
}, 'activities', 'users.id', '=', 'activities.user_id');
}
2015-09-22 03:54:11 +08:00
/**
* Get the url for editing this user.
*/
public function getEditUrl(string $path = ''): string
2015-09-05 03:40:36 +08:00
{
$uri = '/settings/users/' . $this->id . '/' . trim($path, '/');
return url(rtrim($uri, '/'));
2015-09-05 03:40:36 +08:00
}
2016-03-31 04:28:38 +08:00
/**
* Get the url that links to this user's profile.
*/
public function getProfileUrl(): string
{
return url('/user/' . $this->id);
}
2016-03-31 04:28:38 +08:00
/**
* Get a shortened version of the user's name.
*/
public function getShortName(int $chars = 8): string
2016-03-31 04:28:38 +08:00
{
if (mb_strlen($this->name) <= $chars) {
return $this->name;
}
2016-03-31 04:28:38 +08:00
$splitName = explode(' ', $this->name);
if (mb_strlen($splitName[0]) <= $chars) {
return $splitName[0];
}
2016-03-31 04:28:38 +08:00
return '';
}
/**
* Send the password reset notification.
* @param string $token
* @return void
*/
public function sendPasswordResetNotification($token)
{
$this->notify(new ResetPassword($token));
}
/**
* @inheritdoc
*/
public function logDescriptor(): string
{
return "({$this->id}) {$this->name}";
}
2015-07-13 03:01:42 +08:00
}