lasthourcloud/app/Models/User.php

220 lines
6.7 KiB
PHP
Raw Normal View History

2023-03-17 14:33:48 +00:00
<?php
namespace App\Models;
2023-06-12 10:00:01 +00:00
use App\Notifications\Channels\SendsEmail;
2023-08-15 12:11:38 +00:00
use App\Notifications\TransactionalEmails\ResetPassword as TransactionalEmailsResetPassword;
2023-10-18 16:02:09 +00:00
use DateTimeInterface;
2023-03-17 14:33:48 +00:00
use Illuminate\Database\Eloquent\Factories\HasFactory;
use Illuminate\Foundation\Auth\User as Authenticatable;
2023-10-09 12:20:55 +00:00
use Illuminate\Notifications\Messages\MailMessage;
2023-03-17 14:33:48 +00:00
use Illuminate\Notifications\Notifiable;
2023-10-09 12:20:55 +00:00
use Illuminate\Support\Carbon;
2023-09-15 09:19:36 +00:00
use Illuminate\Support\Facades\Cache;
2023-10-09 12:20:55 +00:00
use Illuminate\Support\Facades\Config;
use Illuminate\Support\Facades\URL;
2024-06-10 20:43:34 +00:00
use Illuminate\Support\Str;
2023-06-01 10:15:33 +00:00
use Laravel\Fortify\TwoFactorAuthenticatable;
use Laravel\Sanctum\HasApiTokens;
2023-10-18 16:02:09 +00:00
use Laravel\Sanctum\NewAccessToken;
2024-07-09 08:45:10 +00:00
use OpenApi\Attributes as OA;
2023-03-17 14:33:48 +00:00
2024-07-09 08:45:10 +00:00
#[OA\Schema(
description: 'User model',
type: 'object',
properties: [
2024-07-09 11:59:54 +00:00
'id' => ['type' => 'integer', 'description' => 'The user identifier in the database.'],
'name' => ['type' => 'string', 'description' => 'The user name.'],
'email' => ['type' => 'string', 'description' => 'The user email.'],
'email_verified_at' => ['type' => 'string', 'description' => 'The date when the user email was verified.'],
'created_at' => ['type' => 'string', 'description' => 'The date when the user was created.'],
'updated_at' => ['type' => 'string', 'description' => 'The date when the user was updated.'],
'two_factor_confirmed_at' => ['type' => 'string', 'description' => 'The date when the user two factor was confirmed.'],
'force_password_reset' => ['type' => 'boolean', 'description' => 'The flag to force the user to reset the password.'],
'marketing_emails' => ['type' => 'boolean', 'description' => 'The flag to receive marketing emails.'],
2024-07-09 08:45:10 +00:00
],
)]
2023-06-12 10:00:01 +00:00
class User extends Authenticatable implements SendsEmail
2023-03-17 14:33:48 +00:00
{
2023-06-01 10:15:33 +00:00
use HasApiTokens, HasFactory, Notifiable, TwoFactorAuthenticatable;
2023-08-15 12:11:38 +00:00
protected $guarded = [];
2024-06-10 20:43:34 +00:00
2023-03-17 14:33:48 +00:00
protected $hidden = [
'password',
'remember_token',
'two_factor_recovery_codes',
'two_factor_secret',
2023-03-17 14:33:48 +00:00
];
2024-06-10 20:43:34 +00:00
2023-03-17 14:33:48 +00:00
protected $casts = [
'email_verified_at' => 'datetime',
2023-08-15 12:11:38 +00:00
'force_password_reset' => 'boolean',
2023-08-22 15:44:49 +00:00
'show_boarding' => 'boolean',
2023-03-17 14:33:48 +00:00
];
protected static function boot()
{
parent::boot();
2023-06-09 13:55:21 +00:00
static::created(function (User $user) {
$team = [
2024-06-10 20:43:34 +00:00
'name' => $user->name."'s Team",
2023-06-09 13:55:21 +00:00
'personal_team' => true,
2024-06-10 20:43:34 +00:00
'show_boarding' => true,
2023-06-09 13:55:21 +00:00
];
if ($user->id === 0) {
$team['id'] = 0;
$team['name'] = 'Root Team';
}
$new_team = Team::create($team);
$user->teams()->attach($new_team, ['role' => 'owner']);
});
}
2024-06-10 20:43:34 +00:00
2024-03-05 08:19:15 +00:00
public function recreate_personal_team()
{
$team = [
2024-06-10 20:43:34 +00:00
'name' => $this->name."'s Team",
2024-03-05 08:19:15 +00:00
'personal_team' => true,
2024-06-10 20:43:34 +00:00
'show_boarding' => true,
2024-03-05 08:19:15 +00:00
];
if ($this->id === 0) {
$team['id'] = 0;
$team['name'] = 'Root Team';
}
$new_team = Team::create($team);
$this->teams()->attach($new_team, ['role' => 'owner']);
2024-06-10 20:43:34 +00:00
2024-03-05 08:19:15 +00:00
return $new_team;
}
2024-06-10 20:43:34 +00:00
public function createToken(string $name, array $abilities = ['*'], ?DateTimeInterface $expiresAt = null)
2023-10-18 16:02:09 +00:00
{
$plainTextToken = sprintf(
'%s%s%s',
config('sanctum.token_prefix', ''),
$tokenEntropy = Str::random(40),
hash('crc32b', $tokenEntropy)
);
2023-10-18 16:02:09 +00:00
$token = $this->tokens()->create([
'name' => $name,
'token' => hash('sha256', $plainTextToken),
'abilities' => $abilities,
'expires_at' => $expiresAt,
2024-06-10 20:43:34 +00:00
'team_id' => session('currentTeam')->id,
2023-10-18 16:02:09 +00:00
]);
2024-06-10 20:43:34 +00:00
return new NewAccessToken($token, $token->getKey().'|'.$plainTextToken);
2023-10-18 16:02:09 +00:00
}
2024-06-10 20:43:34 +00:00
public function teams()
{
return $this->belongsToMany(Team::class)->withPivot('role');
}
2023-07-28 08:55:26 +00:00
public function getRecepients($notification)
2023-06-12 10:00:01 +00:00
{
return $this->email;
}
2023-10-09 12:20:55 +00:00
public function sendVerificationEmail()
{
2024-07-24 12:27:21 +00:00
$mail = new MailMessage;
2023-10-09 12:20:55 +00:00
$url = Url::temporarySignedRoute(
'verify.verify',
Carbon::now()->addMinutes(Config::get('auth.verification.expire', 60)),
[
'id' => $this->getKey(),
'hash' => sha1($this->getEmailForVerification()),
]
);
$mail->view('emails.email-verification', [
'url' => $url,
]);
2024-07-25 20:04:05 +00:00
$mail->subject('Last Hour: Verify your email.');
2023-10-09 12:20:55 +00:00
send_user_an_email($mail, $this->email);
}
2024-06-10 20:43:34 +00:00
2023-07-28 08:55:26 +00:00
public function sendPasswordResetNotification($token): void
{
2023-12-13 11:01:27 +00:00
$this?->notify(new TransactionalEmailsResetPassword($token));
2023-07-28 08:55:26 +00:00
}
2023-07-14 09:27:08 +00:00
public function isAdmin()
{
return $this->role() === 'admin' || $this->role() === 'owner';
2023-07-13 20:03:27 +00:00
}
public function isOwner()
{
return $this->role() === 'owner';
}
2024-06-10 20:43:34 +00:00
public function isMember()
{
return $this->role() === 'member';
}
2024-06-10 20:43:34 +00:00
2023-07-13 20:03:27 +00:00
public function isAdminFromSession()
2023-06-08 09:43:14 +00:00
{
2023-06-09 13:55:21 +00:00
if (auth()->user()->id === 0) {
return true;
}
$teams = $this->teams()->get();
$is_part_of_root_team = $teams->where('id', 0)->first();
$is_admin_of_root_team = $is_part_of_root_team &&
($is_part_of_root_team->pivot->role === 'admin' || $is_part_of_root_team->pivot->role === 'owner');
if ($is_part_of_root_team && $is_admin_of_root_team) {
return true;
}
2023-09-15 09:19:36 +00:00
$team = $teams->where('id', session('currentTeam')->id)->first();
2023-10-09 12:20:55 +00:00
$role = data_get($team, 'pivot.role');
2024-06-10 20:43:34 +00:00
2023-06-09 13:55:21 +00:00
return $role === 'admin' || $role === 'owner';
2023-06-08 09:43:14 +00:00
}
2023-06-08 09:43:14 +00:00
public function isInstanceAdmin()
{
2023-05-22 10:00:59 +00:00
$found_root_team = auth()->user()->teams->filter(function ($team) {
if ($team->id == 0) {
return true;
}
2024-06-10 20:43:34 +00:00
2023-05-22 10:00:59 +00:00
return false;
});
2024-06-10 20:43:34 +00:00
2023-05-22 10:00:59 +00:00
return $found_root_team->count() > 0;
2023-04-25 07:38:05 +00:00
}
2023-06-09 13:55:21 +00:00
public function currentTeam()
{
2024-06-10 20:43:34 +00:00
return Cache::remember('team:'.auth()->user()->id, 3600, function () {
if (is_null(data_get(session('currentTeam'), 'id')) && auth()->user()->teams->count() > 0) {
return auth()->user()->teams[0];
}
2024-06-10 20:43:34 +00:00
2023-09-08 16:33:26 +00:00
return Team::find(session('currentTeam')->id);
});
}
public function otherTeams()
{
2023-08-29 12:36:17 +00:00
return auth()->user()->teams->filter(function ($team) {
return $team->id != currentTeam()->id;
});
}
2023-06-09 13:55:21 +00:00
public function role()
{
2024-02-23 11:59:14 +00:00
if (data_get($this, 'pivot')) {
return $this->pivot->role;
}
$user = auth()->user()->teams->where('id', currentTeam()->id)->first();
2024-06-10 20:43:34 +00:00
return data_get($user, 'pivot.role');
2023-05-10 17:26:28 +00:00
}
}