allerta-vvf/backend/app/Http/Controllers/AuthController.php

238 lines
7.0 KiB
PHP
Raw Normal View History

2023-02-19 01:40:12 +01:00
<?php
namespace App\Http\Controllers;
use App\Models\User;
use App\Models\Option;
2023-02-19 01:40:12 +01:00
use Illuminate\Support\Facades\Hash;
2023-09-04 14:00:49 +02:00
use Illuminate\Validation\ValidationException;
2023-02-19 01:40:12 +01:00
use Illuminate\Http\Request;
2023-09-01 14:24:10 +02:00
use App\Utils\Logger;
2023-02-19 01:40:12 +01:00
class AuthController extends Controller
{
2024-02-24 00:52:25 +01:00
/**
* Register a new user
*/
2023-02-19 01:40:12 +01:00
public function register(Request $request)
{
2024-01-07 18:43:52 +01:00
if(!$request->user()->hasPermission("users-create")) abort(401);
2023-02-19 01:40:12 +01:00
$validatedData = $request->validate([
'name' => 'required|string|max:255',
'email' => 'required|string|email|max:255|unique:users',
2023-03-15 23:06:07 +01:00
'username' => 'required|string|max:255|unique:users',
2023-02-19 01:40:12 +01:00
'password' => 'required|string|min:8',
]);
$user = User::create([
'name' => $validatedData['name'],
'email' => $validatedData['email'],
'username' => $validatedData['username'],
2023-02-19 01:40:12 +01:00
'password' => Hash::make($validatedData['password']),
]);
$token = $user->createToken('auth_token')->plainTextToken;
2023-09-01 14:24:10 +02:00
Logger::log("Creato utente $user->name ($user->username)", $user);
2023-02-19 01:40:12 +01:00
return response()->json([
'access_token' => $token,
'token_type' => 'Bearer',
'user' => $user
]);
}
2024-02-24 00:52:25 +01:00
/**
* Login
* @unauthenticated
*/
2023-02-19 01:40:12 +01:00
public function login(Request $request)
{
2023-09-04 14:00:49 +02:00
$request->validate([
'username' => 'required|string|exists:users,username|max:255',
'password' => 'required',
]);
$user = User::where('username', $request->username)->first();
if (! $user || ! Hash::check($request->password, $user->password)) {
throw ValidationException::withMessages([
'username' => ['Credenziali inserite non valide.'],
]);
}
2023-02-19 01:40:12 +01:00
$user = User::where('username', $request['username'])->firstOrFail();
2023-02-19 01:40:12 +01:00
2023-09-04 14:00:49 +02:00
if($request->input('use_sessions', false)) {
$request->session()->regenerate();
auth()->guard('api')->login($user);
$token = null;
} else {
$token = $user->createToken('auth_token')->plainTextToken;
}
2023-02-19 01:40:12 +01:00
2023-09-01 14:24:10 +02:00
Logger::log("Login", $user, $user);
2023-02-19 01:40:12 +01:00
return response()->json([
'access_token' => $token,
'token_type' => 'Bearer',
2023-09-04 14:00:49 +02:00
'auth_type' => is_null($token) ? 'session' : 'token'
2023-02-19 01:40:12 +01:00
]);
}
2024-02-24 00:52:25 +01:00
/**
* Logout
*/
2023-02-23 00:23:56 +01:00
public function logout(Request $request)
{
2023-09-01 14:24:10 +02:00
Logger::log("Logout");
2023-09-04 14:00:49 +02:00
if(
method_exists($request->user(), 'currentAccessToken') &&
method_exists($request->user()->currentAccessToken(), 'delete')
) {
$request->user()->currentAccessToken()->delete();
} else {
auth()->guard('api')->logout();
$request->session()->invalidate();
$request->session()->regenerateToken();
}
return response()->json(null, 200);
2023-02-23 00:23:56 +01:00
}
2024-02-24 00:52:25 +01:00
/**
* Get current user info and global options (so they can be loaded on frontend without additional requests)
*/
2023-02-19 01:40:12 +01:00
public function me(Request $request)
{
2023-06-06 18:53:49 +02:00
$impersonateManager = app('impersonate');
$options = Option::all(["name", "value", "type"]);
//Cast the value to the correct type and remove type
foreach($options as $option) {
if($option->type == "boolean") {
$option->value = boolval($option->value);
} else if($option->type == "number") {
$option->value = floatval($option->value);
}
unset($option->type);
}
2023-06-06 00:27:34 +02:00
return [
...$request->user()->toArray(),
"permissions" => array_map(function($p) {
return $p["name"];
}, $request->user()->allPermissions()->toArray()),
2023-06-06 18:53:49 +02:00
"impersonating_user" => $impersonateManager->isImpersonating(),
"impersonator_id" => $impersonateManager->getImpersonatorId(),
"options" => $options
2023-06-06 00:27:34 +02:00
];
2023-02-19 01:40:12 +01:00
}
2023-06-06 18:53:49 +02:00
2024-02-24 00:52:25 +01:00
/**
* Impersonate another user
*/
public function impersonate(Request $request, User $user)
2023-06-06 18:53:49 +02:00
{
2023-09-04 01:09:53 +02:00
$authUser = User::find($request->user()->id);
if(!$authUser->canImpersonate()) {
return response()->json([
'message' => 'Unauthorized'
], 401);
}
//Check if can be impersonated
if(!$user->canBeImpersonated()) {
return response()->json([
'message' => 'Unauthorized'
], 401);
}
//Check if currently impersonating
if(app('impersonate')->isImpersonating()) {
return response()->json([
'message' => 'Unauthorized'
], 401);
}
2023-09-07 15:52:25 +02:00
if(
method_exists($request->user(), 'currentAccessToken') &&
method_exists($request->user()->currentAccessToken(), 'delete')
) {
$request->user()->currentAccessToken()->delete();
} else {
auth()->guard('api')->logout();
$request->session()->invalidate();
$request->session()->regenerateToken();
2023-09-07 15:52:25 +02:00
}
$request->user()->impersonate($user);
$token = $user->createToken('auth_token')->plainTextToken;
2023-06-06 18:53:49 +02:00
Logger::log("Impersonato utente", $user, $authUser);
2024-01-10 15:21:57 +01:00
2023-06-06 18:53:49 +02:00
return response()->json([
'access_token' => $token,
'token_type' => 'Bearer',
]);
}
2024-02-24 00:52:25 +01:00
/**
* Stop impersonating other user
*/
2023-06-06 18:53:49 +02:00
public function stopImpersonating(Request $request)
{
2023-09-07 15:52:25 +02:00
$manager = app('impersonate');
$impersonatorId = $manager->getImpersonatorId();
2023-09-07 15:52:25 +02:00
$manager->leave();
$manager->clear();
$impersonator = User::find($impersonatorId);
2023-09-07 15:14:21 +02:00
2023-09-07 15:52:25 +02:00
if(
method_exists($request->user(), 'currentAccessToken') &&
method_exists($request->user()->currentAccessToken(), 'delete')
) {
$request->user()->currentAccessToken()->delete();
} else {
auth()->guard('api')->logout();
$request->session()->invalidate();
$request->session()->regenerateToken();
2023-09-07 15:52:25 +02:00
}
2023-09-07 15:14:21 +02:00
if($request->input('use_sessions', false)) {
$request->session()->regenerate();
auth()->guard('api')->login($impersonator);
$token = null;
} else {
$token = $impersonator->createToken('auth_token')->plainTextToken;
}
2023-09-07 15:14:21 +02:00
return response()->json([
'access_token' => $token,
'token_type' => 'Bearer',
]);
2023-06-06 18:53:49 +02:00
}
2023-09-07 15:52:25 +02:00
2024-02-24 00:52:25 +01:00
/**
* Refresh token, if using sessions it will return a new session token
*/
2023-09-07 15:52:25 +02:00
public function refreshToken(Request $request)
{
if(
!method_exists($request->user(), 'currentAccessToken') ||
!method_exists($request->user()->currentAccessToken(), 'delete')
) return;
$user = $request->user();
$user->currentAccessToken()->delete();
$token = $user->createToken('auth_token')->plainTextToken;
return response()->json([
'access_token' => $token,
'token_type' => 'Bearer'
]);
}
2023-02-19 01:40:12 +01:00
}