mirror of
https://github.com/Part-DB/Part-DB-server.git
synced 2025-06-21 09:35:49 +02:00
244 lines
9.9 KiB
PHP
244 lines
9.9 KiB
PHP
<?php
|
|
/**
|
|
* This file is part of Part-DB (https://github.com/Part-DB/Part-DB-symfony).
|
|
*
|
|
* Copyright (C) 2019 - 2022 Jan Böhmer (https://github.com/jbtronics)
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License as published
|
|
* by the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Affero General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
declare(strict_types=1);
|
|
|
|
namespace App\Controller;
|
|
|
|
use App\Controller\AdminPages\BaseAdminController;
|
|
use App\DataTables\LogDataTable;
|
|
use App\Entity\Attachments\UserAttachment;
|
|
use App\Entity\Base\AbstractNamedDBElement;
|
|
use App\Entity\UserSystem\User;
|
|
use App\Events\SecurityEvent;
|
|
use App\Events\SecurityEvents;
|
|
use App\Form\Permissions\PermissionsType;
|
|
use App\Form\UserAdminForm;
|
|
use App\Services\ImportExportSystem\EntityExporter;
|
|
use App\Services\ImportExportSystem\EntityImporter;
|
|
use App\Services\Trees\StructuralElementRecursionHelper;
|
|
use App\Services\UserSystem\PermissionPresetsHelper;
|
|
use App\Services\UserSystem\PermissionSchemaUpdater;
|
|
use Doctrine\ORM\EntityManagerInterface;
|
|
use Exception;
|
|
use InvalidArgumentException;
|
|
use Omines\DataTablesBundle\DataTableFactory;
|
|
use Symfony\Component\Asset\Packages;
|
|
use Symfony\Component\Form\FormInterface;
|
|
use Symfony\Component\HttpFoundation\RedirectResponse;
|
|
use Symfony\Component\HttpFoundation\Request;
|
|
use Symfony\Component\HttpFoundation\Response;
|
|
use Symfony\Component\Routing\Annotation\Route;
|
|
use Symfony\Component\Validator\Validator\ValidatorInterface;
|
|
|
|
#[Route(path: '/user')]
|
|
class UserController extends BaseAdminController
|
|
{
|
|
protected string $entity_class = User::class;
|
|
protected string $twig_template = 'admin/user_admin.html.twig';
|
|
protected string $form_class = UserAdminForm::class;
|
|
protected string $route_base = 'user';
|
|
protected string $attachment_class = UserAttachment::class;
|
|
protected ?string $parameter_class = null;
|
|
|
|
protected function additionalActionEdit(FormInterface $form, AbstractNamedDBElement $entity): bool
|
|
{
|
|
//Check if we're editing a user and if we need to change the password of it
|
|
if ($entity instanceof User && !empty($form['new_password']->getData())) {
|
|
$password = $this->passwordEncoder->hashPassword($entity, $form['new_password']->getData());
|
|
$entity->setPassword($password);
|
|
//By default, the user must change the password afterward
|
|
$entity->setNeedPwChange(true);
|
|
|
|
$event = new SecurityEvent($entity);
|
|
$this->eventDispatcher->dispatch($event, SecurityEvents::PASSWORD_CHANGED);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
*
|
|
* @throws Exception
|
|
*/
|
|
#[Route(path: '/{id}/edit/{timestamp}', name: 'user_edit', requirements: ['id' => '\d+'])]
|
|
#[Route(path: '/{id}/', requirements: ['id' => '\d+'])]
|
|
public function edit(User $entity, Request $request, EntityManagerInterface $em, PermissionPresetsHelper $permissionPresetsHelper,
|
|
PermissionSchemaUpdater $permissionSchemaUpdater, ValidatorInterface $validator, ?string $timestamp = null): Response
|
|
{
|
|
//Do an upgrade of the permission schema if needed (so the user can see the permissions a user get on next request (even if it was not done yet)
|
|
$permissionSchemaUpdater->userUpgradeSchemaRecursively($entity);
|
|
|
|
//Handle 2FA disabling
|
|
if ($request->request->has('reset_2fa')) {
|
|
//Check if the admin has the needed permissions
|
|
$this->denyAccessUnlessGranted('set_password', $entity);
|
|
if ($this->isCsrfTokenValid('reset_2fa'.$entity->getID(), $request->request->get('_token'))) {
|
|
//Disable Google authenticator
|
|
$entity->setGoogleAuthenticatorSecret(null);
|
|
$entity->setBackupCodes([]);
|
|
//Remove all U2F keys
|
|
foreach ($entity->getLegacyU2FKeys() as $key) {
|
|
$em->remove($key);
|
|
}
|
|
foreach ($entity->getWebauthnKeys() as $key) {
|
|
$em->remove($key);
|
|
}
|
|
//Invalidate trusted devices
|
|
$entity->invalidateTrustedDeviceTokens();
|
|
$em->flush();
|
|
|
|
$event = new SecurityEvent($entity);
|
|
$this->eventDispatcher->dispatch($event, SecurityEvents::TFA_ADMIN_RESET);
|
|
|
|
$this->addFlash('success', 'user.edit.reset_success');
|
|
} else {
|
|
$this->addFlash('error', 'csfr_invalid');
|
|
}
|
|
}
|
|
|
|
//Handle permissions presets
|
|
if ($request->request->has('permission_preset')) {
|
|
$this->denyAccessUnlessGranted('edit_permissions', $entity);
|
|
if ($this->isCsrfTokenValid('reset_2fa'.$entity->getID(), $request->request->get('_token'))) {
|
|
$preset = $request->request->get('permission_preset');
|
|
|
|
$permissionPresetsHelper->applyPreset($entity, $preset);
|
|
|
|
//Ensure that the user is valid after applying the preset
|
|
$errors = $validator->validate($entity);
|
|
if (count($errors) > 0) {
|
|
$this->addFlash('error', 'validator.noLockout');
|
|
//Refresh the entity to remove the changes
|
|
$em->refresh($entity);
|
|
} else {
|
|
$em->flush();
|
|
|
|
$this->addFlash('success', 'user.edit.permission_success');
|
|
|
|
//We need to stop the execution here, or our permissions changes will be overwritten by the form values
|
|
return $this->redirectToRoute('user_edit', ['id' => $entity->getID()]);
|
|
}
|
|
|
|
|
|
} else {
|
|
$this->addFlash('error', 'csfr_invalid');
|
|
}
|
|
}
|
|
|
|
return $this->_edit($entity, $request, $em, $timestamp);
|
|
}
|
|
|
|
protected function additionalActionNew(FormInterface $form, AbstractNamedDBElement $entity): bool
|
|
{
|
|
if ($entity instanceof User && !empty($form['new_password']->getData())) {
|
|
$password = $this->passwordEncoder->hashPassword($entity, $form['new_password']->getData());
|
|
$entity->setPassword($password);
|
|
//By default, the user must change the password afterward
|
|
$entity->setNeedPwChange(true);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
#[Route(path: '/new', name: 'user_new')]
|
|
#[Route(path: '/{id}/clone', name: 'user_clone')]
|
|
#[Route(path: '/')]
|
|
public function new(Request $request, EntityManagerInterface $em, EntityImporter $importer, ?User $entity = null): Response
|
|
{
|
|
return $this->_new($request, $em, $importer, $entity);
|
|
}
|
|
|
|
#[Route(path: '/{id}', name: 'user_delete', requirements: ['id' => '\d+'], methods: ['DELETE'])]
|
|
public function delete(Request $request, User $entity, StructuralElementRecursionHelper $recursionHelper): RedirectResponse
|
|
{
|
|
//Disallow deleting the anonymous user
|
|
if (User::ID_ANONYMOUS === $entity->getID()) {
|
|
throw new \LogicException('You can not delete the anonymous user! It is needed for permission checking without a logged in user');
|
|
}
|
|
|
|
//Disallow deleting the current logged-in user
|
|
if ($entity === $this->getUser()) {
|
|
throw new \LogicException('You can not delete your own user account!');
|
|
}
|
|
|
|
return $this->_delete($request, $entity, $recursionHelper);
|
|
}
|
|
|
|
#[Route(path: '/export', name: 'user_export_all')]
|
|
public function exportAll(EntityManagerInterface $em, EntityExporter $exporter, Request $request): Response
|
|
{
|
|
return $this->_exportAll($em, $exporter, $request);
|
|
}
|
|
|
|
#[Route(path: '/{id}/export', name: 'user_export')]
|
|
public function exportEntity(User $entity, EntityExporter $exporter, Request $request): Response
|
|
{
|
|
return $this->_exportEntity($entity, $exporter, $request);
|
|
}
|
|
|
|
#[Route(path: '/info', name: 'user_info_self')]
|
|
#[Route(path: '/{id}/info', name: 'user_info')]
|
|
public function userInfo(?User $user, Packages $packages, Request $request, DataTableFactory $dataTableFactory): Response
|
|
{
|
|
//If no user id was passed, then we show info about the current user
|
|
if (!$user instanceof User) {
|
|
$tmp = $this->getUser();
|
|
if (!$tmp instanceof User) {
|
|
throw new InvalidArgumentException('Userinfo only works for database users!');
|
|
}
|
|
$user = $tmp;
|
|
} else {
|
|
//Else we must check, if the current user is allowed to access $user
|
|
$this->denyAccessUnlessGranted('info', $user);
|
|
}
|
|
|
|
//Only show the history table, if the user is the current user
|
|
if ($user === $this->getUser()) {
|
|
$table = $this->dataTableFactory->createFromType(
|
|
LogDataTable::class,
|
|
[
|
|
'filter_elements' => $user,
|
|
'mode' => 'element_history',
|
|
],
|
|
['pageLength' => 10]
|
|
)
|
|
->handleRequest($request);
|
|
|
|
if ($table->isCallback()) {
|
|
return $table->getResponse();
|
|
}
|
|
}
|
|
|
|
//Show permissions to user
|
|
$builder = $this->createFormBuilder()->add('permissions', PermissionsType::class, [
|
|
'mapped' => false,
|
|
'disabled' => true,
|
|
'inherit' => true,
|
|
'data' => $user,
|
|
]);
|
|
|
|
return $this->render('users/user_info.html.twig', [
|
|
'user' => $user,
|
|
'form' => $builder->getForm(),
|
|
'datatable' => $table ?? null,
|
|
]);
|
|
}
|
|
}
|