2018-03-03 08:12:18 +01:00
|
|
|
<?php
|
2018-05-11 10:08:34 +02:00
|
|
|
|
2021-03-07 08:16:33 +01:00
|
|
|
/*
|
2019-08-22 17:06:43 +02:00
|
|
|
* UserUpdateRequest.php
|
2021-03-07 08:16:33 +01:00
|
|
|
* Copyright (c) 2021 james@firefly-iii.org
|
2018-03-03 08:12:18 +01:00
|
|
|
*
|
2019-10-02 06:37:26 +02:00
|
|
|
* This file is part of Firefly III (https://github.com/firefly-iii).
|
2018-03-03 08:12:18 +01:00
|
|
|
*
|
2019-10-02 06:37:26 +02:00
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
2018-03-03 08:12:18 +01:00
|
|
|
*
|
2019-10-02 06:37:26 +02:00
|
|
|
* This program is distributed in the hope that it will be useful,
|
2018-03-03 08:12:18 +01:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
2019-10-02 06:37:26 +02:00
|
|
|
* GNU Affero General Public License for more details.
|
2018-03-03 08:12:18 +01:00
|
|
|
*
|
2019-10-02 06:37:26 +02:00
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
2018-03-03 08:12:18 +01:00
|
|
|
*/
|
|
|
|
|
2018-05-11 10:08:34 +02:00
|
|
|
declare(strict_types=1);
|
2018-03-03 08:12:18 +01:00
|
|
|
|
2021-03-07 08:16:33 +01:00
|
|
|
namespace FireflyIII\Api\V1\Requests\System;
|
2018-03-03 08:12:18 +01:00
|
|
|
|
2018-12-03 07:18:05 +01:00
|
|
|
use FireflyIII\Rules\IsBoolean;
|
2020-11-08 13:36:13 +01:00
|
|
|
use FireflyIII\Support\Request\ChecksLogin;
|
2020-07-18 08:34:00 +02:00
|
|
|
use FireflyIII\Support\Request\ConvertsDataTypes;
|
2022-10-30 14:44:49 +01:00
|
|
|
use FireflyIII\User;
|
2020-07-18 08:25:25 +02:00
|
|
|
use Illuminate\Foundation\Http\FormRequest;
|
2024-01-09 20:58:18 +01:00
|
|
|
use Illuminate\Support\Facades\Log;
|
2022-02-09 17:31:30 +01:00
|
|
|
use Illuminate\Validation\Validator;
|
2018-03-03 08:12:18 +01:00
|
|
|
|
|
|
|
/**
|
2019-08-22 17:06:43 +02:00
|
|
|
* Class UserUpdateRequest
|
2018-03-03 08:12:18 +01:00
|
|
|
*/
|
2020-07-18 08:25:25 +02:00
|
|
|
class UserUpdateRequest extends FormRequest
|
2018-03-03 08:12:18 +01:00
|
|
|
{
|
2022-10-30 14:23:00 +01:00
|
|
|
use ChecksLogin;
|
2023-11-04 14:18:49 +01:00
|
|
|
use ConvertsDataTypes;
|
2020-10-18 08:00:49 +02:00
|
|
|
|
2018-03-03 08:12:18 +01:00
|
|
|
/**
|
2020-11-08 13:36:13 +01:00
|
|
|
* Logged in + owner
|
2018-03-03 08:12:18 +01:00
|
|
|
*/
|
|
|
|
public function authorize(): bool
|
|
|
|
{
|
2022-02-09 17:31:30 +01:00
|
|
|
return auth()->check();
|
2018-03-03 08:12:18 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2018-07-06 07:15:42 +02:00
|
|
|
* Get all data from the request.
|
2018-03-03 08:12:18 +01:00
|
|
|
*/
|
|
|
|
public function getAll(): array
|
|
|
|
{
|
2018-12-21 15:42:57 +01:00
|
|
|
$blocked = false;
|
2019-08-22 17:06:43 +02:00
|
|
|
if (null !== $this->get('blocked')) {
|
2018-12-21 15:42:57 +01:00
|
|
|
$blocked = $this->boolean('blocked');
|
|
|
|
}
|
2020-03-15 08:16:16 +01:00
|
|
|
|
|
|
|
return [
|
2022-05-02 19:35:35 +02:00
|
|
|
'email' => $this->convertString('email'),
|
2018-12-21 15:42:57 +01:00
|
|
|
'blocked' => $blocked,
|
2022-05-02 19:35:35 +02:00
|
|
|
'blocked_code' => $this->convertString('blocked_code'),
|
|
|
|
'role' => $this->convertString('role'),
|
2018-03-03 08:12:18 +01:00
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2018-07-06 07:15:42 +02:00
|
|
|
* The rules that the incoming request must be matched against.
|
2018-03-03 08:12:18 +01:00
|
|
|
*/
|
|
|
|
public function rules(): array
|
|
|
|
{
|
2022-10-30 14:44:49 +01:00
|
|
|
/** @var User $user */
|
2020-03-17 14:53:17 +01:00
|
|
|
$user = $this->route()->parameter('user');
|
2020-03-15 08:16:16 +01:00
|
|
|
|
|
|
|
return [
|
2019-08-22 17:06:43 +02:00
|
|
|
'email' => sprintf('email|unique:users,email,%d', $user->id),
|
2022-10-30 14:23:00 +01:00
|
|
|
'blocked' => [new IsBoolean()],
|
2018-03-03 08:12:18 +01:00
|
|
|
'blocked_code' => 'in:email_changed',
|
2019-08-22 17:06:43 +02:00
|
|
|
'role' => 'in:owner,demo,',
|
2018-03-03 08:12:18 +01:00
|
|
|
];
|
|
|
|
}
|
|
|
|
|
2022-02-09 17:31:30 +01:00
|
|
|
/**
|
|
|
|
* Configure the validator instance.
|
|
|
|
*/
|
|
|
|
public function withValidator(Validator $validator): void
|
|
|
|
{
|
2023-12-20 19:35:52 +01:00
|
|
|
/** @var null|User $current */
|
2022-02-09 17:31:30 +01:00
|
|
|
$current = $this->route()->parameter('user');
|
|
|
|
$validator->after(
|
2023-12-21 05:07:26 +01:00
|
|
|
static function (Validator $validator) use ($current): void {
|
2022-02-09 17:31:30 +01:00
|
|
|
$isAdmin = auth()->user()->hasRole('owner');
|
|
|
|
// not admin, and not own user?
|
|
|
|
if (auth()->check() && false === $isAdmin && $current?->id !== auth()->user()->id) {
|
2024-12-22 08:43:12 +01:00
|
|
|
$validator->errors()->add('email', (string) trans('validation.invalid_selection'));
|
2022-02-09 17:31:30 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
);
|
2024-02-22 01:29:01 +01:00
|
|
|
if ($validator->fails()) {
|
2025-05-04 12:57:14 +02:00
|
|
|
Log::channel('audit')->error(sprintf('Validation errors in %s', self::class), $validator->errors()->toArray());
|
2024-01-09 20:58:18 +01:00
|
|
|
}
|
2022-02-09 17:31:30 +01:00
|
|
|
}
|
2018-03-05 19:35:58 +01:00
|
|
|
}
|