2018-05-09 08:05:17 -05:00
|
|
|
<?php
|
|
|
|
|
|
|
|
namespace App\Models;
|
|
|
|
|
2019-02-15 09:00:07 -06:00
|
|
|
use App\Events\UserCreated;
|
2018-09-11 07:51:35 -05:00
|
|
|
use Illuminate\Database\Eloquent\Builder;
|
2018-05-09 08:05:17 -05:00
|
|
|
use Illuminate\Foundation\Auth\User as Authenticatable;
|
|
|
|
use Illuminate\Notifications\Notifiable;
|
2018-09-11 07:51:35 -05:00
|
|
|
use LibreNMS\Authentication\LegacyAuth;
|
2019-12-30 12:11:26 +01:00
|
|
|
use Permissions;
|
2018-05-09 08:05:17 -05:00
|
|
|
|
|
|
|
class User extends Authenticatable
|
|
|
|
{
|
|
|
|
use Notifiable;
|
|
|
|
|
|
|
|
protected $primaryKey = 'user_id';
|
2019-11-08 07:32:57 +01:00
|
|
|
protected $fillable = ['realname', 'username', 'email', 'level', 'descr', 'can_modify_passwd', 'auth_type', 'auth_id', 'enabled'];
|
2018-05-09 08:05:17 -05:00
|
|
|
protected $hidden = ['password', 'remember_token', 'pivot'];
|
2018-09-11 07:51:35 -05:00
|
|
|
protected $attributes = [ // default values
|
|
|
|
'descr' => '',
|
|
|
|
'realname' => '',
|
|
|
|
'email' => '',
|
|
|
|
];
|
2019-02-15 09:00:07 -06:00
|
|
|
protected $dispatchesEvents = [
|
|
|
|
'created' => UserCreated::class,
|
|
|
|
];
|
2018-05-09 08:05:17 -05:00
|
|
|
|
2019-04-22 19:01:39 -05:00
|
|
|
protected $casts = [
|
|
|
|
'realname' => 'string',
|
|
|
|
'descr' => 'string',
|
|
|
|
'email' => 'string',
|
|
|
|
'can_modify_passwd' => 'integer',
|
|
|
|
];
|
|
|
|
|
2018-05-09 08:05:17 -05:00
|
|
|
// ---- Helper Functions ----
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Test if this user has global read access
|
|
|
|
* these users have a level of 5, 10 or 11 (demo).
|
|
|
|
*
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public function hasGlobalRead()
|
|
|
|
{
|
2018-11-27 10:28:26 -06:00
|
|
|
return $this->hasGlobalAdmin() || $this->level == 5;
|
2018-05-09 08:05:17 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2018-09-11 07:51:35 -05:00
|
|
|
* Test if this user has global admin access
|
|
|
|
* these users have a level of 10 or 11 (demo).
|
2018-05-09 08:05:17 -05:00
|
|
|
*
|
|
|
|
* @return boolean
|
|
|
|
*/
|
2018-09-11 07:51:35 -05:00
|
|
|
public function hasGlobalAdmin()
|
2018-05-09 08:05:17 -05:00
|
|
|
{
|
|
|
|
return $this->level >= 10;
|
|
|
|
}
|
|
|
|
|
2018-09-11 07:51:35 -05:00
|
|
|
/**
|
|
|
|
* Test if the User is an admin.
|
|
|
|
*
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public function isAdmin()
|
|
|
|
{
|
|
|
|
return $this->level == 10;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Test if this user is the demo user
|
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function isDemo()
|
|
|
|
{
|
|
|
|
return $this->level == 11;
|
|
|
|
}
|
|
|
|
|
2018-05-09 08:05:17 -05:00
|
|
|
/**
|
|
|
|
* Check if this user has access to a device
|
|
|
|
*
|
|
|
|
* @param Device|int $device can be a device Model or device id
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function canAccessDevice($device)
|
|
|
|
{
|
2019-12-30 12:11:26 +01:00
|
|
|
return $this->hasGlobalRead() || Permissions::canAccessDevice($device, $this->user_id);
|
2018-05-09 08:05:17 -05:00
|
|
|
}
|
|
|
|
|
2019-02-15 09:00:07 -06:00
|
|
|
/**
|
|
|
|
* Helper function to hash passwords before setting
|
|
|
|
*
|
|
|
|
* @param string $password
|
|
|
|
*/
|
|
|
|
public function setPassword($password)
|
|
|
|
{
|
|
|
|
$this->attributes['password'] = $password ? password_hash($password, PASSWORD_DEFAULT) : null;
|
|
|
|
}
|
|
|
|
|
2019-04-22 19:01:39 -05:00
|
|
|
/**
|
|
|
|
* Check if the given user can set the password for this user
|
|
|
|
*
|
|
|
|
* @param User $user
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function canSetPassword($user)
|
|
|
|
{
|
|
|
|
if ($user && LegacyAuth::get()->canUpdatePasswords()) {
|
|
|
|
if ($user->isAdmin()) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return $user->is($this) && $this->can_modify_passwd;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2018-09-11 07:51:35 -05:00
|
|
|
// ---- Query scopes ----
|
|
|
|
|
|
|
|
/**
|
|
|
|
* This restricts the query to only users that match the current auth method
|
|
|
|
* It is not needed when using user_id, but should be used for username and auth_id
|
|
|
|
*
|
|
|
|
* @param Builder $query
|
|
|
|
* @return Builder
|
|
|
|
*/
|
|
|
|
public function scopeThisAuth($query)
|
|
|
|
{
|
|
|
|
// find user including ones where we might not know the auth type
|
|
|
|
$type = LegacyAuth::getType();
|
|
|
|
|
|
|
|
return $query->where(function ($query) use ($type) {
|
|
|
|
$query->where('auth_type', $type)
|
|
|
|
->orWhereNull('auth_type')
|
|
|
|
->orWhere('auth_type', '');
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2020-06-21 21:25:00 -05:00
|
|
|
public function scopeAdminOnly($query)
|
|
|
|
{
|
2020-06-19 00:17:18 -05:00
|
|
|
$query->where('level', 10);
|
|
|
|
}
|
|
|
|
|
2019-04-22 19:01:39 -05:00
|
|
|
// ---- Accessors/Mutators ----
|
|
|
|
|
|
|
|
public function setRealnameAttribute($realname)
|
|
|
|
{
|
|
|
|
$this->attributes['realname'] = (string)$realname;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function setDescrAttribute($descr)
|
|
|
|
{
|
|
|
|
$this->attributes['descr'] = (string)$descr;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function setEmailAttribute($email)
|
|
|
|
{
|
|
|
|
$this->attributes['email'] = (string)$email;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function setCanModifyPasswdAttribute($modify)
|
|
|
|
{
|
|
|
|
$this->attributes['can_modify_passwd'] = $modify ? 1 : 0;
|
|
|
|
}
|
|
|
|
|
2019-11-08 07:32:57 +01:00
|
|
|
public function setEnabledAttribute($enable)
|
|
|
|
{
|
|
|
|
$this->attributes['enabled'] = $enable ? 1 : 0;
|
|
|
|
}
|
|
|
|
|
2019-12-30 12:11:26 +01:00
|
|
|
public function getDevicesAttribute()
|
|
|
|
{
|
|
|
|
// pseudo relation
|
|
|
|
if (!array_key_exists('devices', $this->relations)) {
|
|
|
|
$this->setRelation('devices', $this->devices()->get());
|
|
|
|
}
|
|
|
|
return $this->getRelation('devices');
|
|
|
|
}
|
|
|
|
|
2018-05-09 08:05:17 -05:00
|
|
|
// ---- Define Relationships ----
|
|
|
|
|
2019-07-29 16:32:37 -05:00
|
|
|
public function apiToken()
|
|
|
|
{
|
2020-04-21 14:28:48 +02:00
|
|
|
return $this->hasOne(\App\Models\ApiToken::class, 'user_id', 'user_id');
|
2019-07-29 16:32:37 -05:00
|
|
|
}
|
|
|
|
|
2018-05-09 08:05:17 -05:00
|
|
|
public function devices()
|
|
|
|
{
|
2019-12-30 12:11:26 +01:00
|
|
|
// pseudo relation
|
|
|
|
return Device::query()->when(!$this->hasGlobalRead(), function ($query) {
|
|
|
|
return $query->whereIn('device_id', Permissions::devicesForUser($this));
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
public function deviceGroups()
|
|
|
|
{
|
2020-04-21 14:28:48 +02:00
|
|
|
return $this->belongsToMany(\App\Models\DeviceGroup::class, 'devices_group_perms', 'user_id', 'device_group_id');
|
2018-05-09 08:05:17 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
public function ports()
|
|
|
|
{
|
|
|
|
if ($this->hasGlobalRead()) {
|
|
|
|
return Port::query();
|
|
|
|
} else {
|
|
|
|
//FIXME we should return all ports for a device if the user has been given access to the whole device.
|
2020-04-21 14:28:48 +02:00
|
|
|
return $this->belongsToMany(\App\Models\Port::class, 'ports_perms', 'user_id', 'port_id');
|
2018-05-09 08:05:17 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public function dashboards()
|
|
|
|
{
|
2020-04-21 14:28:48 +02:00
|
|
|
return $this->hasMany(\App\Models\Dashboard::class, 'user_id');
|
2018-05-09 08:05:17 -05:00
|
|
|
}
|
|
|
|
|
2018-09-11 07:51:35 -05:00
|
|
|
public function preferences()
|
|
|
|
{
|
2020-04-21 14:28:48 +02:00
|
|
|
return $this->hasMany(\App\Models\UserPref::class, 'user_id');
|
2018-09-11 07:51:35 -05:00
|
|
|
}
|
|
|
|
|
2018-05-09 08:05:17 -05:00
|
|
|
public function widgets()
|
|
|
|
{
|
2020-04-21 14:28:48 +02:00
|
|
|
return $this->hasMany(\App\Models\UserWidget::class, 'user_id');
|
2018-05-09 08:05:17 -05:00
|
|
|
}
|
|
|
|
}
|