UserController.php 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293
  1. <?php
  2. namespace App\Http\Controllers\Auth;
  3. use App\Api\v1\Resources\UserResource;
  4. use App\Http\Controllers\Controller;
  5. use App\Http\Requests\UserDeleteRequest;
  6. use App\Http\Requests\UserUpdateRequest;
  7. use App\Models\User;
  8. use Illuminate\Support\Facades\Auth;
  9. use Illuminate\Support\Facades\DB;
  10. use Illuminate\Support\Facades\Hash;
  11. use Illuminate\Support\Facades\Log;
  12. class UserController extends Controller
  13. {
  14. /**
  15. * Update the user's profile information.
  16. *
  17. * @return \App\Api\v1\Resources\UserResource|\Illuminate\Http\JsonResponse
  18. */
  19. public function update(UserUpdateRequest $request)
  20. {
  21. $user = $request->user();
  22. $validated = $request->validated();
  23. if (config('auth.defaults.guard') === 'reverse-proxy-guard' || $user->oauth_provider) {
  24. Log::notice('Account update rejected: reverse-proxy-guard enabled or account from external sso provider');
  25. return response()->json(['message' => __('errors.account_managed_by_external_provider')], 400);
  26. }
  27. if (! Hash::check($request->password, Auth::user()->password)) {
  28. Log::notice('Account update failed: wrong password provided');
  29. return response()->json(['message' => __('errors.wrong_current_password')], 400);
  30. }
  31. if (! config('2fauth.config.isDemoApp')) {
  32. $user->update([
  33. 'name' => $validated['name'],
  34. 'email' => $validated['email'],
  35. ]);
  36. }
  37. Log::info(sprintf('Account of user ID #%s updated', $user->id));
  38. return new UserResource($user);
  39. }
  40. /**
  41. * Delete the user's account.
  42. *
  43. * @return \Illuminate\Http\JsonResponse
  44. */
  45. public function delete(UserDeleteRequest $request)
  46. {
  47. $validated = $request->validated();
  48. $user = Auth::user();
  49. Log::info(sprintf('Deletion of user ID #%s requested', $user->id));
  50. if ($user->is_admin && User::admins()->count() == 1) {
  51. return response()->json(['message' => __('errors.cannot_delete_the_only_admin')], 400);
  52. }
  53. if (! Hash::check($validated['password'], Auth::user()->password)) {
  54. return response()->json(['message' => __('errors.wrong_current_password')], 400);
  55. }
  56. try {
  57. DB::transaction(function () use ($user) {
  58. DB::table('twofaccounts')->where('user_id', $user->id)->delete();
  59. DB::table('groups')->where('user_id', $user->id)->delete();
  60. DB::table('webauthn_credentials')->where('authenticatable_id', $user->id)->delete();
  61. DB::table('webauthn_recoveries')->where('email', $user->email)->delete();
  62. DB::table('oauth_access_tokens')->where('user_id', $user->id)->delete();
  63. DB::table('password_resets')->where('email', $user->email)->delete();
  64. DB::table('users')->where('id', $user->id)->delete();
  65. });
  66. }
  67. // @codeCoverageIgnoreStart
  68. catch (\Throwable $e) {
  69. Log::error(sprintf('Deletion of user ID #%s failed, transaction has been rolled-back', $user->id));
  70. return response()->json(['message' => __('errors.user_deletion_failed')], 400);
  71. }
  72. // @codeCoverageIgnoreEnd
  73. Log::info(sprintf('User ID #%s deleted', $user->id));
  74. return response()->json(null, 204);
  75. }
  76. }