2021-06-26 11:23:15 -04:00
|
|
|
<?php
|
|
|
|
|
|
|
|
namespace BookStack\Auth;
|
2015-09-04 12:16:58 -04:00
|
|
|
|
2022-02-03 10:12:50 -05:00
|
|
|
use BookStack\Actions\ActivityType;
|
2022-02-03 19:26:19 -05:00
|
|
|
use BookStack\Auth\Access\UserInviteService;
|
2021-01-01 13:31:01 -05:00
|
|
|
use BookStack\Entities\EntityProvider;
|
2022-02-03 10:12:50 -05:00
|
|
|
use BookStack\Exceptions\NotifyException;
|
2018-12-30 11:11:58 -05:00
|
|
|
use BookStack\Exceptions\UserUpdateException;
|
2022-02-03 10:12:50 -05:00
|
|
|
use BookStack\Facades\Activity;
|
2020-12-08 18:46:38 -05:00
|
|
|
use BookStack\Uploads\UserAvatars;
|
2016-09-17 16:33:55 -04:00
|
|
|
use Exception;
|
2022-09-22 11:54:27 -04:00
|
|
|
use Illuminate\Support\Facades\Hash;
|
2021-09-26 10:37:55 -04:00
|
|
|
use Illuminate\Support\Facades\Log;
|
2022-02-03 19:26:19 -05:00
|
|
|
use Illuminate\Support\Str;
|
2015-09-04 12:16:58 -04:00
|
|
|
|
|
|
|
class UserRepo
|
|
|
|
{
|
2022-02-13 07:56:26 -05:00
|
|
|
protected UserAvatars $userAvatar;
|
|
|
|
protected UserInviteService $inviteService;
|
2015-09-04 12:16:58 -04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* UserRepo constructor.
|
|
|
|
*/
|
2022-02-03 19:26:19 -05:00
|
|
|
public function __construct(UserAvatars $userAvatar, UserInviteService $inviteService)
|
2015-09-04 12:16:58 -04:00
|
|
|
{
|
2020-12-08 18:46:38 -05:00
|
|
|
$this->userAvatar = $userAvatar;
|
2022-02-03 19:26:19 -05:00
|
|
|
$this->inviteService = $inviteService;
|
2015-09-04 12:16:58 -04:00
|
|
|
}
|
|
|
|
|
2015-09-06 07:14:32 -04:00
|
|
|
/**
|
2020-02-02 12:31:00 -05:00
|
|
|
* Get a user by their email address.
|
2015-09-06 07:14:32 -04:00
|
|
|
*/
|
2020-02-02 12:31:00 -05:00
|
|
|
public function getByEmail(string $email): ?User
|
2015-09-06 07:14:32 -04:00
|
|
|
{
|
2020-12-08 18:46:38 -05:00
|
|
|
return User::query()->where('email', '=', $email)->first();
|
2015-09-04 12:16:58 -04:00
|
|
|
}
|
2015-09-05 15:25:57 -04:00
|
|
|
|
2015-09-06 07:14:32 -04:00
|
|
|
/**
|
2020-12-08 18:46:38 -05:00
|
|
|
* Get a user by their ID.
|
2015-09-06 07:14:32 -04:00
|
|
|
*/
|
2020-12-08 18:46:38 -05:00
|
|
|
public function getById(int $id): User
|
2015-09-05 15:25:57 -04:00
|
|
|
{
|
2020-12-08 18:46:38 -05:00
|
|
|
return User::query()->findOrFail($id);
|
2015-09-05 15:25:57 -04:00
|
|
|
}
|
2015-09-06 07:14:32 -04:00
|
|
|
|
2021-03-09 18:06:12 -05:00
|
|
|
/**
|
|
|
|
* Get a user by their slug.
|
|
|
|
*/
|
|
|
|
public function getBySlug(string $slug): User
|
|
|
|
{
|
|
|
|
return User::query()->where('slug', '=', $slug)->firstOrFail();
|
|
|
|
}
|
|
|
|
|
2015-09-06 07:14:32 -04:00
|
|
|
/**
|
2022-02-03 19:26:19 -05:00
|
|
|
* Create a new basic instance of user with the given pre-validated data.
|
2022-02-08 10:29:58 -05:00
|
|
|
*
|
2022-02-03 19:26:19 -05:00
|
|
|
* @param array{name: string, email: string, password: ?string, external_auth_id: ?string, language: ?string, roles: ?array} $data
|
2015-09-06 07:14:32 -04:00
|
|
|
*/
|
2022-02-03 19:26:19 -05:00
|
|
|
public function createWithoutActivity(array $data, bool $emailConfirmed = false): User
|
2015-09-06 07:14:32 -04:00
|
|
|
{
|
2021-03-10 17:37:53 -05:00
|
|
|
$user = new User();
|
2022-02-03 19:26:19 -05:00
|
|
|
$user->name = $data['name'];
|
|
|
|
$user->email = $data['email'];
|
2022-09-22 11:54:27 -04:00
|
|
|
$user->password = Hash::make(empty($data['password']) ? Str::random(32) : $data['password']);
|
2022-02-03 19:26:19 -05:00
|
|
|
$user->email_confirmed = $emailConfirmed;
|
|
|
|
$user->external_auth_id = $data['external_auth_id'] ?? '';
|
|
|
|
|
2021-03-10 17:37:53 -05:00
|
|
|
$user->refreshSlug();
|
|
|
|
$user->save();
|
|
|
|
|
2022-02-03 19:26:19 -05:00
|
|
|
if (!empty($data['language'])) {
|
|
|
|
setting()->putUser($user, 'language', $data['language']);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (isset($data['roles'])) {
|
|
|
|
$this->setUserRoles($user, $data['roles']);
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->downloadAndAssignUserAvatar($user);
|
|
|
|
|
|
|
|
return $user;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* As per "createWithoutActivity" but records a "create" activity.
|
2022-02-08 10:29:58 -05:00
|
|
|
*
|
2022-02-03 19:26:19 -05:00
|
|
|
* @param array{name: string, email: string, password: ?string, external_auth_id: ?string, language: ?string, roles: ?array} $data
|
|
|
|
*/
|
|
|
|
public function create(array $data, bool $sendInvite = false): User
|
|
|
|
{
|
2022-02-03 20:02:13 -05:00
|
|
|
$user = $this->createWithoutActivity($data, true);
|
2022-02-03 19:26:19 -05:00
|
|
|
|
|
|
|
if ($sendInvite) {
|
|
|
|
$this->inviteService->sendInvitation($user);
|
|
|
|
}
|
|
|
|
|
|
|
|
Activity::add(ActivityType::USER_CREATE, $user);
|
2022-02-08 10:29:58 -05:00
|
|
|
|
2021-03-10 17:37:53 -05:00
|
|
|
return $user;
|
2015-09-06 07:14:32 -04:00
|
|
|
}
|
2015-12-15 14:27:36 -05:00
|
|
|
|
2022-02-03 11:52:28 -05:00
|
|
|
/**
|
|
|
|
* Update the given user with the given data.
|
2022-02-08 10:29:58 -05:00
|
|
|
*
|
2022-02-03 11:52:28 -05:00
|
|
|
* @param array{name: ?string, email: ?string, external_auth_id: ?string, password: ?string, roles: ?array<int>, language: ?string} $data
|
2022-02-08 10:29:58 -05:00
|
|
|
*
|
2022-02-03 11:52:28 -05:00
|
|
|
* @throws UserUpdateException
|
|
|
|
*/
|
|
|
|
public function update(User $user, array $data, bool $manageUsersAllowed): User
|
|
|
|
{
|
|
|
|
if (!empty($data['name'])) {
|
|
|
|
$user->name = $data['name'];
|
|
|
|
$user->refreshSlug();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!empty($data['email']) && $manageUsersAllowed) {
|
|
|
|
$user->email = $data['email'];
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!empty($data['external_auth_id']) && $manageUsersAllowed) {
|
|
|
|
$user->external_auth_id = $data['external_auth_id'];
|
|
|
|
}
|
|
|
|
|
|
|
|
if (isset($data['roles']) && $manageUsersAllowed) {
|
|
|
|
$this->setUserRoles($user, $data['roles']);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!empty($data['password'])) {
|
2022-09-22 11:54:27 -04:00
|
|
|
$user->password = Hash::make($data['password']);
|
2022-02-03 11:52:28 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!empty($data['language'])) {
|
|
|
|
setting()->putUser($user, 'language', $data['language']);
|
|
|
|
}
|
|
|
|
|
|
|
|
$user->save();
|
|
|
|
Activity::add(ActivityType::USER_UPDATE, $user);
|
|
|
|
|
|
|
|
return $user;
|
|
|
|
}
|
|
|
|
|
2015-12-15 14:27:36 -05:00
|
|
|
/**
|
|
|
|
* Remove the given user from storage, Delete all related content.
|
2021-06-26 11:23:15 -04:00
|
|
|
*
|
2018-01-28 09:08:14 -05:00
|
|
|
* @throws Exception
|
2015-12-15 14:27:36 -05:00
|
|
|
*/
|
2021-01-01 13:31:01 -05:00
|
|
|
public function destroy(User $user, ?int $newOwnerId = null)
|
2015-12-15 14:27:36 -05:00
|
|
|
{
|
2022-02-03 10:12:50 -05:00
|
|
|
$this->ensureDeletable($user);
|
|
|
|
|
2015-12-15 14:27:36 -05:00
|
|
|
$user->socialAccounts()->delete();
|
2019-12-29 12:03:52 -05:00
|
|
|
$user->apiTokens()->delete();
|
2021-05-23 08:41:56 -04:00
|
|
|
$user->favourites()->delete();
|
2021-06-30 17:10:02 -04:00
|
|
|
$user->mfaValues()->delete();
|
2015-12-15 14:27:36 -05:00
|
|
|
$user->delete();
|
2021-06-26 11:23:15 -04:00
|
|
|
|
2018-01-28 09:08:14 -05:00
|
|
|
// Delete user profile images
|
2021-05-24 13:45:08 -04:00
|
|
|
$this->userAvatar->destroyAllForUser($user);
|
2021-01-01 13:31:01 -05:00
|
|
|
|
2022-11-09 14:30:08 -05:00
|
|
|
// Delete related activities
|
|
|
|
setting()->deleteUserSettings($user->id);
|
|
|
|
|
2021-01-01 13:31:01 -05:00
|
|
|
if (!empty($newOwnerId)) {
|
|
|
|
$newOwner = User::query()->find($newOwnerId);
|
|
|
|
if (!is_null($newOwner)) {
|
|
|
|
$this->migrateOwnership($user, $newOwner);
|
|
|
|
}
|
|
|
|
}
|
2022-02-03 10:12:50 -05:00
|
|
|
|
|
|
|
Activity::add(ActivityType::USER_DELETE, $user);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @throws NotifyException
|
|
|
|
*/
|
|
|
|
protected function ensureDeletable(User $user): void
|
|
|
|
{
|
|
|
|
if ($this->isOnlyAdmin($user)) {
|
|
|
|
throw new NotifyException(trans('errors.users_cannot_delete_only_admin'), $user->getEditUrl());
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($user->system_name === 'public') {
|
|
|
|
throw new NotifyException(trans('errors.users_cannot_delete_guest'), $user->getEditUrl());
|
|
|
|
}
|
2021-01-01 13:31:01 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Migrate ownership of items in the system from one user to another.
|
|
|
|
*/
|
|
|
|
protected function migrateOwnership(User $fromUser, User $toUser)
|
|
|
|
{
|
2021-06-26 11:23:15 -04:00
|
|
|
$entities = (new EntityProvider())->all();
|
2021-01-01 13:31:01 -05:00
|
|
|
foreach ($entities as $instance) {
|
|
|
|
$instance->newQuery()->where('owned_by', '=', $fromUser->id)
|
|
|
|
->update(['owned_by' => $toUser->id]);
|
|
|
|
}
|
2015-12-15 14:27:36 -05:00
|
|
|
}
|
2016-02-16 16:25:11 -05:00
|
|
|
|
|
|
|
/**
|
2022-02-13 07:56:26 -05:00
|
|
|
* Get an avatar image for a user and set it as their avatar.
|
|
|
|
* Returns early if avatars disabled or not set in config.
|
2016-02-16 16:25:11 -05:00
|
|
|
*/
|
2022-02-13 07:56:26 -05:00
|
|
|
protected function downloadAndAssignUserAvatar(User $user): void
|
2016-02-16 16:25:11 -05:00
|
|
|
{
|
2022-02-13 07:56:26 -05:00
|
|
|
try {
|
|
|
|
$this->userAvatar->fetchAndAssignToUser($user);
|
|
|
|
} catch (Exception $e) {
|
|
|
|
Log::error('Failed to save user avatar image');
|
|
|
|
}
|
2016-02-16 16:25:11 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2022-02-13 07:56:26 -05:00
|
|
|
* Checks if the give user is the only admin.
|
2016-02-16 16:25:11 -05:00
|
|
|
*/
|
2022-02-13 07:56:26 -05:00
|
|
|
protected function isOnlyAdmin(User $user): bool
|
2016-02-16 16:25:11 -05:00
|
|
|
{
|
2022-02-13 07:56:26 -05:00
|
|
|
if (!$user->hasSystemRole('admin')) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
$adminRole = Role::getSystemRole('admin');
|
|
|
|
if ($adminRole->users()->count() > 1) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
2016-02-16 16:25:11 -05:00
|
|
|
}
|
2016-02-17 17:11:48 -05:00
|
|
|
|
2016-05-01 14:36:53 -04:00
|
|
|
/**
|
2022-02-13 07:56:26 -05:00
|
|
|
* Set the assigned user roles via an array of role IDs.
|
|
|
|
*
|
|
|
|
* @throws UserUpdateException
|
2016-05-01 14:36:53 -04:00
|
|
|
*/
|
2022-02-13 07:56:26 -05:00
|
|
|
protected function setUserRoles(User $user, array $roles)
|
2016-05-01 14:36:53 -04:00
|
|
|
{
|
2022-02-13 07:56:26 -05:00
|
|
|
if ($this->demotingLastAdmin($user, $roles)) {
|
|
|
|
throw new UserUpdateException(trans('errors.role_cannot_remove_only_admin'), $user->getEditUrl());
|
|
|
|
}
|
|
|
|
|
|
|
|
$user->roles()->sync($roles);
|
2016-05-01 14:36:53 -04:00
|
|
|
}
|
|
|
|
|
2018-01-28 13:09:26 -05:00
|
|
|
/**
|
2022-02-13 07:56:26 -05:00
|
|
|
* Check if the given user is the last admin and their new roles no longer
|
|
|
|
* contains the admin role.
|
2018-01-28 13:09:26 -05:00
|
|
|
*/
|
2022-02-13 07:56:26 -05:00
|
|
|
protected function demotingLastAdmin(User $user, array $newRoles): bool
|
2018-01-28 13:09:26 -05:00
|
|
|
{
|
2022-02-13 07:56:26 -05:00
|
|
|
if ($this->isOnlyAdmin($user)) {
|
|
|
|
$adminRole = Role::getSystemRole('admin');
|
|
|
|
if (!in_array(strval($adminRole->id), $newRoles)) {
|
|
|
|
return true;
|
|
|
|
}
|
2018-01-28 13:09:26 -05:00
|
|
|
}
|
2022-02-13 07:56:26 -05:00
|
|
|
|
|
|
|
return false;
|
2018-01-28 13:09:26 -05:00
|
|
|
}
|
2018-08-20 21:19:25 -04:00
|
|
|
}
|