mirror of
https://github.com/librenms/librenms.git
synced 2024-10-07 16:52:45 +00:00
* Fix alerting find owner contacts on old SQL server versions Older SQL server versions had a bug where they didn't accept parenthesis around the first query of a union statement. It was difficult to remove these parenthesis, so use whereHas instead. * Fix style
289 lines
7.5 KiB
PHP
289 lines
7.5 KiB
PHP
<?php
|
|
|
|
namespace App\Models;
|
|
|
|
use App\Events\UserCreated;
|
|
use Illuminate\Database\Eloquent\Builder;
|
|
use Illuminate\Database\Eloquent\Factories\HasFactory;
|
|
use Illuminate\Database\Eloquent\Relations\BelongsToMany;
|
|
use Illuminate\Database\Eloquent\Relations\HasMany;
|
|
use Illuminate\Foundation\Auth\User as Authenticatable;
|
|
use Illuminate\Notifications\Notifiable;
|
|
use Illuminate\Support\Facades\Hash;
|
|
use LibreNMS\Authentication\LegacyAuth;
|
|
use NotificationChannels\WebPush\HasPushSubscriptions;
|
|
use Permissions;
|
|
use Silber\Bouncer\BouncerFacade as Bouncer;
|
|
use Silber\Bouncer\Database\HasRolesAndAbilities;
|
|
|
|
/**
|
|
* @method static \Database\Factories\UserFactory factory(...$parameters)
|
|
*/
|
|
class User extends Authenticatable
|
|
{
|
|
use HasRolesAndAbilities, Notifiable, HasFactory, HasPushSubscriptions;
|
|
|
|
protected $primaryKey = 'user_id';
|
|
protected $fillable = ['realname', 'username', 'email', 'descr', 'can_modify_passwd', 'auth_type', 'auth_id', 'enabled'];
|
|
protected $hidden = ['password', 'remember_token', 'pivot'];
|
|
protected $attributes = [ // default values
|
|
'descr' => '',
|
|
'realname' => '',
|
|
'email' => '',
|
|
];
|
|
protected $dispatchesEvents = [
|
|
'created' => UserCreated::class,
|
|
];
|
|
|
|
protected $casts = [
|
|
'realname' => 'string',
|
|
'descr' => 'string',
|
|
'email' => 'string',
|
|
'can_modify_passwd' => 'integer',
|
|
];
|
|
|
|
public function toFlare(): array
|
|
{
|
|
return $this->only(['auth_type', 'enabled']);
|
|
}
|
|
|
|
// ---- Helper Functions ----
|
|
|
|
/**
|
|
* Test if this user has global read access
|
|
*
|
|
* @return bool
|
|
*/
|
|
public function hasGlobalRead()
|
|
{
|
|
return $this->isA('admin', 'global-read');
|
|
}
|
|
|
|
/**
|
|
* Test if this user has global admin access
|
|
*
|
|
* @return bool
|
|
*/
|
|
public function hasGlobalAdmin()
|
|
{
|
|
return $this->isA('admin', 'demo');
|
|
}
|
|
|
|
/**
|
|
* Test if the User is an admin.
|
|
*
|
|
* @return bool
|
|
*/
|
|
public function isAdmin()
|
|
{
|
|
return $this->isA('admin');
|
|
}
|
|
|
|
/**
|
|
* Test if this user is the demo user
|
|
*
|
|
* @return bool
|
|
*/
|
|
public function isDemo()
|
|
{
|
|
return $this->isA('demo');
|
|
}
|
|
|
|
/**
|
|
* Check if this user has access to a device
|
|
*
|
|
* @param Device|int $device can be a device Model or device id
|
|
* @return bool
|
|
*/
|
|
public function canAccessDevice($device)
|
|
{
|
|
return $this->hasGlobalRead() || Permissions::canAccessDevice($device, $this->user_id);
|
|
}
|
|
|
|
/**
|
|
* Helper function to hash passwords before setting
|
|
*
|
|
* @param string $password
|
|
*/
|
|
public function setPassword($password)
|
|
{
|
|
$this->attributes['password'] = $password ? Hash::make($password) : null;
|
|
}
|
|
|
|
/**
|
|
* Set roles and remove extra roles, optionally creating non-existent roles, flush permissions cache for this user if roles changed
|
|
*/
|
|
public function setRoles(array $roles, bool $create = false): void
|
|
{
|
|
if ($roles != $this->getRoles()) {
|
|
if ($create) {
|
|
$this->assign($roles);
|
|
}
|
|
Bouncer::sync($this)->roles($roles);
|
|
Bouncer::refresh($this);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Check if the given user can set the password for this user
|
|
*
|
|
* @param User $user
|
|
* @return bool
|
|
*/
|
|
public function canSetPassword($user)
|
|
{
|
|
if ($user && LegacyAuth::get()->canUpdatePasswords()) {
|
|
if ($user->isAdmin()) {
|
|
return true;
|
|
}
|
|
|
|
return $user->is($this) && $this->can_modify_passwd;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Checks if this user has a browser push notification transport configured.
|
|
*
|
|
* @return bool
|
|
*/
|
|
public function hasBrowserPushTransport(): bool
|
|
{
|
|
$user_id = \Auth::id();
|
|
|
|
return AlertTransport::query()
|
|
->where('transport_type', 'browserpush')
|
|
->where('transport_config', 'regexp', "\"user\":\"(0|$user_id)\"")
|
|
->exists();
|
|
}
|
|
|
|
// ---- Query scopes ----
|
|
|
|
/**
|
|
* This restricts the query to only users that match the current auth method
|
|
* It is not needed when using user_id, but should be used for username and auth_id
|
|
*
|
|
* @param Builder $query
|
|
* @return Builder
|
|
*/
|
|
public function scopeThisAuth($query)
|
|
{
|
|
// find user including ones where we might not know the auth type
|
|
$type = LegacyAuth::getType();
|
|
|
|
return $query->where(function ($query) use ($type) {
|
|
$query->where('auth_type', $type)
|
|
->orWhereNull('auth_type')
|
|
->orWhere('auth_type', '');
|
|
});
|
|
}
|
|
|
|
public function scopeAdminOnly($query)
|
|
{
|
|
$query->whereIs('admin');
|
|
}
|
|
|
|
// ---- Accessors/Mutators ----
|
|
|
|
public function setRealnameAttribute($realname)
|
|
{
|
|
$this->attributes['realname'] = (string) $realname;
|
|
}
|
|
|
|
public function setDescrAttribute($descr)
|
|
{
|
|
$this->attributes['descr'] = (string) $descr;
|
|
}
|
|
|
|
public function setEmailAttribute($email)
|
|
{
|
|
$this->attributes['email'] = (string) $email;
|
|
}
|
|
|
|
public function setCanModifyPasswdAttribute($modify)
|
|
{
|
|
$this->attributes['can_modify_passwd'] = $modify ? 1 : 0;
|
|
}
|
|
|
|
public function setEnabledAttribute($enable)
|
|
{
|
|
$this->attributes['enabled'] = $enable ? 1 : 0;
|
|
}
|
|
|
|
public function getDevicesAttribute()
|
|
{
|
|
// pseudo relation
|
|
if (! array_key_exists('devices', $this->relations)) {
|
|
$this->setRelation('devices', $this->devices()->get());
|
|
}
|
|
|
|
return $this->getRelation('devices');
|
|
}
|
|
|
|
// ---- Define Relationships ----
|
|
|
|
public function apiTokens(): HasMany
|
|
{
|
|
return $this->hasMany(\App\Models\ApiToken::class, 'user_id', 'user_id');
|
|
}
|
|
|
|
public function bills(): BelongsToMany
|
|
{
|
|
return $this->belongsToMany(\App\Models\Bill::class, 'bill_perms', 'user_id', 'bill_id');
|
|
}
|
|
|
|
public function devices()
|
|
{
|
|
// pseudo relation
|
|
return Device::query()->when(! $this->hasGlobalRead(), function ($query) {
|
|
return $query->whereIntegerInRaw('device_id', Permissions::devicesForUser($this));
|
|
});
|
|
}
|
|
|
|
public function devicesOwned(): BelongsToMany
|
|
{
|
|
return $this->belongsToMany(\App\Models\Device::class, 'devices_perms', 'user_id', 'device_id');
|
|
}
|
|
|
|
public function deviceGroups(): BelongsToMany
|
|
{
|
|
return $this->belongsToMany(\App\Models\DeviceGroup::class, 'devices_group_perms', 'user_id', 'device_group_id');
|
|
}
|
|
|
|
public function ports()
|
|
{
|
|
if ($this->hasGlobalRead()) {
|
|
return Port::query();
|
|
} else {
|
|
//FIXME we should return all ports for a device if the user has been given access to the whole device.
|
|
return $this->portsOwned();
|
|
}
|
|
}
|
|
|
|
public function portsOwned(): BelongsToMany
|
|
{
|
|
return $this->belongsToMany(\App\Models\Port::class, 'ports_perms', 'user_id', 'port_id');
|
|
}
|
|
|
|
public function dashboards(): HasMany
|
|
{
|
|
return $this->hasMany(\App\Models\Dashboard::class, 'user_id');
|
|
}
|
|
|
|
public function notificationAttribs(): HasMany
|
|
{
|
|
return $this->hasMany(NotificationAttrib::class, 'user_id');
|
|
}
|
|
|
|
public function preferences(): HasMany
|
|
{
|
|
return $this->hasMany(\App\Models\UserPref::class, 'user_id');
|
|
}
|
|
|
|
public function widgets(): HasMany
|
|
{
|
|
return $this->hasMany(\App\Models\UserWidget::class, 'user_id');
|
|
}
|
|
}
|