Completed
Push — master ( b79faa...aa40d3 )
by Sherif
14:14
created
src/Modules/V1/Acl/Repositories/UserRepository.php 1 patch
Indentation   +234 added lines, -234 removed lines patch added patch discarded remove patch
@@ -4,268 +4,268 @@
 block discarded – undo
4 4
 
5 5
 class UserRepository extends AbstractRepository
6 6
 {
7
-    /**
8
-     * Return the model full namespace.
9
-     * 
10
-     * @return string
11
-     */
12
-    protected function getModel()
13
-    {
14
-        return 'App\Modules\V1\Acl\AclUser';
15
-    }
7
+	/**
8
+	 * Return the model full namespace.
9
+	 * 
10
+	 * @return string
11
+	 */
12
+	protected function getModel()
13
+	{
14
+		return 'App\Modules\V1\Acl\AclUser';
15
+	}
16 16
 
17
-    /**
18
-     * Check if the logged in user or the given user 
19
-     * has the given permissions on the given model.
20
-     * 
21
-     * @param  string  $nameOfPermission
22
-     * @param  string  $model            
23
-     * @param  boolean $user
24
-     * @return boolean
25
-     */
26
-    public function can($nameOfPermission, $model, $user = false )
27
-    {       
28
-        $user        = $user ?: \JWTAuth::parseToken()->authenticate();
29
-        $permissions = [];
30
-        $this->find($user->id, ['groups.permissions'])->groups->lists('permissions')->each(function ($permission) use (&$permissions, $model){
31
-            $permissions = array_merge($permissions, $permission->where('model', $model)->lists('name')->toArray()); 
32
-        });
17
+	/**
18
+	 * Check if the logged in user or the given user 
19
+	 * has the given permissions on the given model.
20
+	 * 
21
+	 * @param  string  $nameOfPermission
22
+	 * @param  string  $model            
23
+	 * @param  boolean $user
24
+	 * @return boolean
25
+	 */
26
+	public function can($nameOfPermission, $model, $user = false )
27
+	{       
28
+		$user        = $user ?: \JWTAuth::parseToken()->authenticate();
29
+		$permissions = [];
30
+		$this->find($user->id, ['groups.permissions'])->groups->lists('permissions')->each(function ($permission) use (&$permissions, $model){
31
+			$permissions = array_merge($permissions, $permission->where('model', $model)->lists('name')->toArray()); 
32
+		});
33 33
         
34
-        return in_array($nameOfPermission, $permissions);
35
-    }
34
+		return in_array($nameOfPermission, $permissions);
35
+	}
36 36
 
37
-    /**
38
-     * Check if the logged in user has the given group.
39
-     * 
40
-     * @param  string  $groupName
41
-     * @return boolean
42
-     */
43
-    public function hasGroup($groupName)
44
-    {
45
-        $groups = $this->find(\JWTAuth::parseToken()->authenticate()->id)->groups;
46
-        return $groups->lists('name')->search($groupName, true) === false ? false : true;
47
-    }
37
+	/**
38
+	 * Check if the logged in user has the given group.
39
+	 * 
40
+	 * @param  string  $groupName
41
+	 * @return boolean
42
+	 */
43
+	public function hasGroup($groupName)
44
+	{
45
+		$groups = $this->find(\JWTAuth::parseToken()->authenticate()->id)->groups;
46
+		return $groups->lists('name')->search($groupName, true) === false ? false : true;
47
+	}
48 48
 
49
-    /**
50
-     * Assign the given group ids to the given user.
51
-     * 
52
-     * @param  integer $user_id    
53
-     * @param  array   $group_ids
54
-     * @return object
55
-     */
56
-    public function assignGroups($user_id, $group_ids)
57
-    {
58
-        \DB::transaction(function () use ($user_id, $group_ids) {
59
-            $user = $this->find($user_id);
60
-            $user->groups()->detach();
61
-            $user->groups()->attach($group_ids);
62
-        });
49
+	/**
50
+	 * Assign the given group ids to the given user.
51
+	 * 
52
+	 * @param  integer $user_id    
53
+	 * @param  array   $group_ids
54
+	 * @return object
55
+	 */
56
+	public function assignGroups($user_id, $group_ids)
57
+	{
58
+		\DB::transaction(function () use ($user_id, $group_ids) {
59
+			$user = $this->find($user_id);
60
+			$user->groups()->detach();
61
+			$user->groups()->attach($group_ids);
62
+		});
63 63
 
64
-        return $this->find($user_id);
65
-    }
64
+		return $this->find($user_id);
65
+	}
66 66
 
67
-    /**
68
-     * Handle a login request to the application.
69
-     * 
70
-     * @param  array   $credentials    
71
-     * @param  boolean $adminLogin
72
-     * @return string
73
-     */
74
-    public function login($credentials, $adminLogin = false)
75
-    {
76
-        if ( ! $user = $this->first(['email' => $credentials['email']])) 
77
-        {
78
-            \ErrorHandler::loginFailed();
79
-        }
80
-        else if ($adminLogin && $user->groups->lists('name')->search('Admin', true) === false) 
81
-        {
82
-            \ErrorHandler::loginFailed();
83
-        }
84
-        else if ( ! $adminLogin && $user->groups->lists('name')->search('Admin', true) !== false) 
85
-        {
86
-            \ErrorHandler::loginFailed();
87
-        }
88
-        else if ($user->blocked)
89
-        {
90
-            \ErrorHandler::userIsBlocked();
91
-        }
92
-        else if ($token = \JWTAuth::attempt($credentials))
93
-        {
94
-            return ['token' => $token];
95
-        }
96
-        else
97
-        {
98
-            \ErrorHandler::loginFailed();
99
-        }
100
-    }
67
+	/**
68
+	 * Handle a login request to the application.
69
+	 * 
70
+	 * @param  array   $credentials    
71
+	 * @param  boolean $adminLogin
72
+	 * @return string
73
+	 */
74
+	public function login($credentials, $adminLogin = false)
75
+	{
76
+		if ( ! $user = $this->first(['email' => $credentials['email']])) 
77
+		{
78
+			\ErrorHandler::loginFailed();
79
+		}
80
+		else if ($adminLogin && $user->groups->lists('name')->search('Admin', true) === false) 
81
+		{
82
+			\ErrorHandler::loginFailed();
83
+		}
84
+		else if ( ! $adminLogin && $user->groups->lists('name')->search('Admin', true) !== false) 
85
+		{
86
+			\ErrorHandler::loginFailed();
87
+		}
88
+		else if ($user->blocked)
89
+		{
90
+			\ErrorHandler::userIsBlocked();
91
+		}
92
+		else if ($token = \JWTAuth::attempt($credentials))
93
+		{
94
+			return ['token' => $token];
95
+		}
96
+		else
97
+		{
98
+			\ErrorHandler::loginFailed();
99
+		}
100
+	}
101 101
 
102
-    /**
103
-     * Handle a social login request of the none admin to the application.
104
-     * 
105
-     * @param  array   $credentials
106
-     * @return string
107
-     */
108
-    public function loginSocial($credentials)
109
-    {
110
-        $access_token = $credentials['auth_code'] ? \Socialite::driver($credentials['type'])->getAccessToken($credentials['auth_code']) : $credentials['access_token'];   
111
-        $user         = \Socialite::driver($credentials['type'])->userFromToken($access_token);
102
+	/**
103
+	 * Handle a social login request of the none admin to the application.
104
+	 * 
105
+	 * @param  array   $credentials
106
+	 * @return string
107
+	 */
108
+	public function loginSocial($credentials)
109
+	{
110
+		$access_token = $credentials['auth_code'] ? \Socialite::driver($credentials['type'])->getAccessToken($credentials['auth_code']) : $credentials['access_token'];   
111
+		$user         = \Socialite::driver($credentials['type'])->userFromToken($access_token);
112 112
 
113
-        if ( ! $user->email)
114
-        {
115
-            \ErrorHandler::noSocialEmail();
116
-        }
113
+		if ( ! $user->email)
114
+		{
115
+			\ErrorHandler::noSocialEmail();
116
+		}
117 117
 
118
-        if ( ! $registeredUser = $this->model->where('email', $user->email)->first()) 
119
-        {
120
-            $data = ['email' => $user->email, 'password' => ''];
121
-            return $this->register($data);
122
-        }
123
-        else
124
-        {
125
-            return $this->login(['email' => $registeredUser->email, 'password' => ''], false);
126
-        }
127
-    }
118
+		if ( ! $registeredUser = $this->model->where('email', $user->email)->first()) 
119
+		{
120
+			$data = ['email' => $user->email, 'password' => ''];
121
+			return $this->register($data);
122
+		}
123
+		else
124
+		{
125
+			return $this->login(['email' => $registeredUser->email, 'password' => ''], false);
126
+		}
127
+	}
128 128
     
129
-    /**
130
-     * Handle a registration request.
131
-     * 
132
-     * @param  array $credentials
133
-     * @return string
134
-     */
135
-    public function register($credentials)
136
-    {
137
-        return ['token' => \JWTAuth::fromUser($this->model->create($credentials))];
138
-    }
129
+	/**
130
+	 * Handle a registration request.
131
+	 * 
132
+	 * @param  array $credentials
133
+	 * @return string
134
+	 */
135
+	public function register($credentials)
136
+	{
137
+		return ['token' => \JWTAuth::fromUser($this->model->create($credentials))];
138
+	}
139 139
 
140
-    /**
141
-     * Logout the user.
142
-     * 
143
-     * @return boolean
144
-     */
145
-    public function logout()
146
-    {
147
-        return \JWTAuth::invalidate(\JWTAuth::getToken());
148
-    }
140
+	/**
141
+	 * Logout the user.
142
+	 * 
143
+	 * @return boolean
144
+	 */
145
+	public function logout()
146
+	{
147
+		return \JWTAuth::invalidate(\JWTAuth::getToken());
148
+	}
149 149
 
150
-    /**
151
-     * Block the user.
152
-     *
153
-     * @param  integer $user_id
154
-     * @return object
155
-     */
156
-    public function block($user_id)
157
-    {
158
-        if ( ! $user = $this->find($user_id)) 
159
-        {
160
-            \ErrorHandler::notFound('user');
161
-        }
162
-        if ( ! $this->hasGroup('Admin'))
163
-        {
164
-            \ErrorHandler::noPermissions();
165
-        }
166
-        else if (\JWTAuth::parseToken()->authenticate()->id == $user_id)
167
-        {
168
-            \ErrorHandler::noPermissions();
169
-        }
170
-        else if ($user->groups->lists('name')->search('Admin', true) !== false) 
171
-        {
172
-            \ErrorHandler::noPermissions();
173
-        }
150
+	/**
151
+	 * Block the user.
152
+	 *
153
+	 * @param  integer $user_id
154
+	 * @return object
155
+	 */
156
+	public function block($user_id)
157
+	{
158
+		if ( ! $user = $this->find($user_id)) 
159
+		{
160
+			\ErrorHandler::notFound('user');
161
+		}
162
+		if ( ! $this->hasGroup('Admin'))
163
+		{
164
+			\ErrorHandler::noPermissions();
165
+		}
166
+		else if (\JWTAuth::parseToken()->authenticate()->id == $user_id)
167
+		{
168
+			\ErrorHandler::noPermissions();
169
+		}
170
+		else if ($user->groups->lists('name')->search('Admin', true) !== false) 
171
+		{
172
+			\ErrorHandler::noPermissions();
173
+		}
174 174
 
175
-        $user->blocked = 1;
176
-        $user->save();
175
+		$user->blocked = 1;
176
+		$user->save();
177 177
         
178
-        return $user;
179
-    }
178
+		return $user;
179
+	}
180 180
 
181
-    /**
182
-     * Unblock the user.
183
-     *
184
-     * @param  integer $user_id
185
-     * @return object
186
-     */
187
-    public function unblock($user_id)
188
-    {
189
-        if ( ! $this->hasGroup('Admin'))
190
-        {
191
-            \ErrorHandler::noPermissions();
192
-        }
181
+	/**
182
+	 * Unblock the user.
183
+	 *
184
+	 * @param  integer $user_id
185
+	 * @return object
186
+	 */
187
+	public function unblock($user_id)
188
+	{
189
+		if ( ! $this->hasGroup('Admin'))
190
+		{
191
+			\ErrorHandler::noPermissions();
192
+		}
193 193
 
194
-        $user          = $this->find($user_id);
195
-        $user->blocked = 0;
196
-        $user->save();
194
+		$user          = $this->find($user_id);
195
+		$user->blocked = 0;
196
+		$user->save();
197 197
 
198
-        return $user;
199
-    }
198
+		return $user;
199
+	}
200 200
 
201
-    /**
202
-     * Send a reset link to the given user.
203
-     *
204
-     * @param  string  $url
205
-     * @param  string  $email
206
-     * @return void
207
-     */
208
-    public function sendReset($email, $url)
209
-    {
210
-        view()->composer('auth.emails.password', function($view) use ($url) {
211
-            $view->with(['url' => $url]);
212
-        });
201
+	/**
202
+	 * Send a reset link to the given user.
203
+	 *
204
+	 * @param  string  $url
205
+	 * @param  string  $email
206
+	 * @return void
207
+	 */
208
+	public function sendReset($email, $url)
209
+	{
210
+		view()->composer('auth.emails.password', function($view) use ($url) {
211
+			$view->with(['url' => $url]);
212
+		});
213 213
 
214
-        $response = \Password::sendResetLink($email, function (\Illuminate\Mail\Message $message) {
215
-            $message->subject('Your Password Reset Link');
216
-        });
214
+		$response = \Password::sendResetLink($email, function (\Illuminate\Mail\Message $message) {
215
+			$message->subject('Your Password Reset Link');
216
+		});
217 217
 
218
-        switch ($response) 
219
-        {
220
-            case \Password::INVALID_USER:
221
-                \ErrorHandler::notFound('email');
222
-        }
223
-    }
218
+		switch ($response) 
219
+		{
220
+			case \Password::INVALID_USER:
221
+				\ErrorHandler::notFound('email');
222
+		}
223
+	}
224 224
 
225
-    /**
226
-     * Reset the given user's password.
227
-     *
228
-     * @param  array  $credentials
229
-     * @return integer
230
-     */
231
-    public function resetPassword($credentials)
232
-    {
233
-        $token    = false;
234
-        $response = \Password::reset($credentials, function ($user, $password) use (&$token) {
235
-            $user->password = bcrypt($password);
236
-            $user->save();
225
+	/**
226
+	 * Reset the given user's password.
227
+	 *
228
+	 * @param  array  $credentials
229
+	 * @return integer
230
+	 */
231
+	public function resetPassword($credentials)
232
+	{
233
+		$token    = false;
234
+		$response = \Password::reset($credentials, function ($user, $password) use (&$token) {
235
+			$user->password = bcrypt($password);
236
+			$user->save();
237 237
 
238
-            $token = \JWTAuth::fromUser($user);
239
-        });
238
+			$token = \JWTAuth::fromUser($user);
239
+		});
240 240
 
241 241
 
242
-        switch ($response) {
243
-            case \Password::PASSWORD_RESET:
244
-                return $token;
242
+		switch ($response) {
243
+			case \Password::PASSWORD_RESET:
244
+				return $token;
245 245
                 
246
-            case \Password::INVALID_TOKEN:
247
-                \ErrorHandler::invalidResetToken('token');
246
+			case \Password::INVALID_TOKEN:
247
+				\ErrorHandler::invalidResetToken('token');
248 248
 
249
-            case \Password::INVALID_PASSWORD:
250
-                \ErrorHandler::invalidResetPassword('email');
249
+			case \Password::INVALID_PASSWORD:
250
+				\ErrorHandler::invalidResetPassword('email');
251 251
 
252
-            case \Password::INVALID_USER:
253
-                \ErrorHandler::notFound('user');
252
+			case \Password::INVALID_USER:
253
+				\ErrorHandler::notFound('user');
254 254
 
255
-            default:
256
-                \ErrorHandler::generalError();
257
-        }
258
-    }
255
+			default:
256
+				\ErrorHandler::generalError();
257
+		}
258
+	}
259 259
 
260
-    /**
261
-     * Refresh the expired login token.
262
-     *
263
-     * @return string
264
-     */
265
-    public function refreshtoken()
266
-    {
267
-        $token = \JWTAuth::parseToken()->refresh();
260
+	/**
261
+	 * Refresh the expired login token.
262
+	 *
263
+	 * @return string
264
+	 */
265
+	public function refreshtoken()
266
+	{
267
+		$token = \JWTAuth::parseToken()->refresh();
268 268
 
269
-        return ['token' => $token];
270
-    }
269
+		return ['token' => $token];
270
+	}
271 271
 }
Please login to merge, or discard this patch.
src/Modules/V1/Acl/Http/Controllers/UsersController.php 1 patch
Indentation   +180 added lines, -180 removed lines patch added patch discarded remove patch
@@ -7,184 +7,184 @@
 block discarded – undo
7 7
 
8 8
 class UsersController extends BaseApiController
9 9
 {
10
-    /**
11
-     * The name of the model that is used by the base api controller 
12
-     * to preform actions like (add, edit ... etc).
13
-     * @var string
14
-     */
15
-    protected $model               = 'users';
16
-
17
-    /**
18
-     * List of all route actions that the base api controller
19
-     * will skip permissions check for them.
20
-     * @var array
21
-     */
22
-    protected $skipPermissionCheck = ['account', 'logout', 'sendreset'];
23
-
24
-    /**
25
-     * List of all route actions that the base api controller
26
-     * will skip login check for them.
27
-     * @var array
28
-     */
29
-    protected $skipLoginCheck      = ['login', 'loginSocial', 'register', 'sendreset', 'resetpassword', 'refreshtoken'];
30
-
31
-    /**
32
-     * The validations rules used by the base api controller
33
-     * to check before add.
34
-     * @var array
35
-     */
36
-    protected $validationRules     = [
37
-    'email'    => 'required|email|unique:users,email,{id}',
38
-    'password' => 'min:6'
39
-    ];
40
-
41
-    /**
42
-     * Return the logged in user account.
43
-     * 
44
-     * @return \Illuminate\Http\Response
45
-     */
46
-    public function account()
47
-    {
48
-       $relations = $this->relations && $this->relations['find'] ? $this->relations['find'] : [];
49
-       return \Response::json(call_user_func_array("\Core::{$this->model}", [])->find(\JWTAuth::parseToken()->authenticate()->id, $relations), 200);
50
-    }
51
-
52
-    /**
53
-     * Block the user.
54
-     *
55
-     * @param  integer  $id
56
-     * @return \Illuminate\Http\Response
57
-     */
58
-    public function block($id)
59
-    {
60
-        return \Response::json(\Core::users()->block($id), 200);
61
-    }
62
-
63
-    /**
64
-     * Unblock the user.
65
-     *
66
-     * @param  integer  $id
67
-     * @return \Illuminate\Http\Response
68
-     */
69
-    public function unblock($id)
70
-    {
71
-        return \Response::json(\Core::users()->unblock($id), 200);
72
-    }
73
-
74
-    /**
75
-     * Logout the user.
76
-     * 
77
-     * @return \Illuminate\Http\Response
78
-     */
79
-    public function logout()
80
-    {
81
-        return \Response::json(\Core::users()->logout(), 200);
82
-    }
83
-
84
-    /**
85
-     * Handle a registration request.
86
-     *
87
-     * @param  \Illuminate\Http\Request  $request
88
-     * @return \Illuminate\Http\Response
89
-     */
90
-    public function register(Request $request)
91
-    {
92
-        $this->validate($request, [
93
-            'email'    => 'required|email|unique:users,email,{id}', 
94
-            'password' => 'required|min:6'
95
-            ]);
96
-
97
-        return \Response::json(\Core::users()->register($request->only('email', 'password')), 200);
98
-    }
99
-
100
-    /**
101
-     * Handle a login request of the none admin to the application.
102
-     *
103
-     * @param  \Illuminate\Http\Request  $request
104
-     * @return \Illuminate\Http\Response
105
-     */
106
-    public function login(Request $request)
107
-    {
108
-        $this->validate($request, [
109
-            'email'    => 'required|email', 
110
-            'password' => 'required|min:6',
111
-            'admin'    => 'boolean'
112
-            ]);
113
-
114
-        return \Response::json(\Core::users()->login($request->only('email', 'password'), $request->get('admin')), 200);
115
-    }
116
-
117
-    /**
118
-     * Handle a social login request of the none admin to the application.
119
-     *
120
-     * @param  \Illuminate\Http\Request  $request
121
-     * @return \Illuminate\Http\Response
122
-     */
123
-    public function loginSocial(Request $request)
124
-    {
125
-        $this->validate($request, [
126
-            'auth_code'    => 'required_without:access_token',
127
-            'access_token' => 'required_without:auth_code',
128
-            'type'         => 'required|in:facebook,google'
129
-            ]);
130
-
131
-        return \Response::json(\Core::users()->loginSocial($request->only('auth_code', 'access_token', 'type')), 200);
132
-    }
133
-
134
-    /**
135
-     * Handle an assign groups to user request.
136
-     *
137
-     * @param  \Illuminate\Http\Request  $request
138
-     * @return \Illuminate\Http\Response
139
-     */
140
-    public function assigngroups(Request $request)
141
-    {
142
-        $this->validate($request, [
143
-            'group_ids' => 'required|exists:groups,id', 
144
-            'user_id'   => 'required|exists:users,id'
145
-            ]);
146
-
147
-        return \Response::json(\Core::users()->assignGroups($request->get('user_id'), $request->get('group_ids')), 200);
148
-    }
149
-
150
-    /**
151
-     * Send a reset link to the given user.
152
-     *
153
-     * @param  \Illuminate\Http\Request  $request
154
-     * @return \Illuminate\Http\Response
155
-     */
156
-    public function sendreset(Request $request)
157
-    {
158
-        $this->validate($request, ['email' => 'required|email', 'url' => 'required|url']);
159
-
160
-        return \Response::json(\Core::users()->sendReset($request->only('email'), $request->get('url')), 200);
161
-    }
162
-
163
-    /**
164
-     * Reset the given user's password.
165
-     *
166
-     * @param  \Illuminate\Http\Request  $request
167
-     * @return \Illuminate\Http\Response
168
-     */
169
-    public function resetpassword(Request $request)
170
-    {
171
-        $this->validate($request, [
172
-            'token'                 => 'required',
173
-            'email'                 => 'required|email',
174
-            'password'              => 'required|confirmed|min:6',
175
-            'password_confirmation' => 'required',
176
-        ]);
177
-
178
-        return \Response::json(\Core::users()->resetPassword($request->only('email', 'password', 'password_confirmation', 'token')), 200);
179
-    }
180
-
181
-    /**
182
-     * Refresh the expired login token.
183
-     *
184
-     * @return \Illuminate\Http\Response
185
-     */
186
-    public function refreshtoken()
187
-    {
188
-        return \Response::json(\Core::users()->refreshtoken(), 200);
189
-    }
10
+	/**
11
+	 * The name of the model that is used by the base api controller 
12
+	 * to preform actions like (add, edit ... etc).
13
+	 * @var string
14
+	 */
15
+	protected $model               = 'users';
16
+
17
+	/**
18
+	 * List of all route actions that the base api controller
19
+	 * will skip permissions check for them.
20
+	 * @var array
21
+	 */
22
+	protected $skipPermissionCheck = ['account', 'logout', 'sendreset'];
23
+
24
+	/**
25
+	 * List of all route actions that the base api controller
26
+	 * will skip login check for them.
27
+	 * @var array
28
+	 */
29
+	protected $skipLoginCheck      = ['login', 'loginSocial', 'register', 'sendreset', 'resetpassword', 'refreshtoken'];
30
+
31
+	/**
32
+	 * The validations rules used by the base api controller
33
+	 * to check before add.
34
+	 * @var array
35
+	 */
36
+	protected $validationRules     = [
37
+	'email'    => 'required|email|unique:users,email,{id}',
38
+	'password' => 'min:6'
39
+	];
40
+
41
+	/**
42
+	 * Return the logged in user account.
43
+	 * 
44
+	 * @return \Illuminate\Http\Response
45
+	 */
46
+	public function account()
47
+	{
48
+	   $relations = $this->relations && $this->relations['find'] ? $this->relations['find'] : [];
49
+	   return \Response::json(call_user_func_array("\Core::{$this->model}", [])->find(\JWTAuth::parseToken()->authenticate()->id, $relations), 200);
50
+	}
51
+
52
+	/**
53
+	 * Block the user.
54
+	 *
55
+	 * @param  integer  $id
56
+	 * @return \Illuminate\Http\Response
57
+	 */
58
+	public function block($id)
59
+	{
60
+		return \Response::json(\Core::users()->block($id), 200);
61
+	}
62
+
63
+	/**
64
+	 * Unblock the user.
65
+	 *
66
+	 * @param  integer  $id
67
+	 * @return \Illuminate\Http\Response
68
+	 */
69
+	public function unblock($id)
70
+	{
71
+		return \Response::json(\Core::users()->unblock($id), 200);
72
+	}
73
+
74
+	/**
75
+	 * Logout the user.
76
+	 * 
77
+	 * @return \Illuminate\Http\Response
78
+	 */
79
+	public function logout()
80
+	{
81
+		return \Response::json(\Core::users()->logout(), 200);
82
+	}
83
+
84
+	/**
85
+	 * Handle a registration request.
86
+	 *
87
+	 * @param  \Illuminate\Http\Request  $request
88
+	 * @return \Illuminate\Http\Response
89
+	 */
90
+	public function register(Request $request)
91
+	{
92
+		$this->validate($request, [
93
+			'email'    => 'required|email|unique:users,email,{id}', 
94
+			'password' => 'required|min:6'
95
+			]);
96
+
97
+		return \Response::json(\Core::users()->register($request->only('email', 'password')), 200);
98
+	}
99
+
100
+	/**
101
+	 * Handle a login request of the none admin to the application.
102
+	 *
103
+	 * @param  \Illuminate\Http\Request  $request
104
+	 * @return \Illuminate\Http\Response
105
+	 */
106
+	public function login(Request $request)
107
+	{
108
+		$this->validate($request, [
109
+			'email'    => 'required|email', 
110
+			'password' => 'required|min:6',
111
+			'admin'    => 'boolean'
112
+			]);
113
+
114
+		return \Response::json(\Core::users()->login($request->only('email', 'password'), $request->get('admin')), 200);
115
+	}
116
+
117
+	/**
118
+	 * Handle a social login request of the none admin to the application.
119
+	 *
120
+	 * @param  \Illuminate\Http\Request  $request
121
+	 * @return \Illuminate\Http\Response
122
+	 */
123
+	public function loginSocial(Request $request)
124
+	{
125
+		$this->validate($request, [
126
+			'auth_code'    => 'required_without:access_token',
127
+			'access_token' => 'required_without:auth_code',
128
+			'type'         => 'required|in:facebook,google'
129
+			]);
130
+
131
+		return \Response::json(\Core::users()->loginSocial($request->only('auth_code', 'access_token', 'type')), 200);
132
+	}
133
+
134
+	/**
135
+	 * Handle an assign groups to user request.
136
+	 *
137
+	 * @param  \Illuminate\Http\Request  $request
138
+	 * @return \Illuminate\Http\Response
139
+	 */
140
+	public function assigngroups(Request $request)
141
+	{
142
+		$this->validate($request, [
143
+			'group_ids' => 'required|exists:groups,id', 
144
+			'user_id'   => 'required|exists:users,id'
145
+			]);
146
+
147
+		return \Response::json(\Core::users()->assignGroups($request->get('user_id'), $request->get('group_ids')), 200);
148
+	}
149
+
150
+	/**
151
+	 * Send a reset link to the given user.
152
+	 *
153
+	 * @param  \Illuminate\Http\Request  $request
154
+	 * @return \Illuminate\Http\Response
155
+	 */
156
+	public function sendreset(Request $request)
157
+	{
158
+		$this->validate($request, ['email' => 'required|email', 'url' => 'required|url']);
159
+
160
+		return \Response::json(\Core::users()->sendReset($request->only('email'), $request->get('url')), 200);
161
+	}
162
+
163
+	/**
164
+	 * Reset the given user's password.
165
+	 *
166
+	 * @param  \Illuminate\Http\Request  $request
167
+	 * @return \Illuminate\Http\Response
168
+	 */
169
+	public function resetpassword(Request $request)
170
+	{
171
+		$this->validate($request, [
172
+			'token'                 => 'required',
173
+			'email'                 => 'required|email',
174
+			'password'              => 'required|confirmed|min:6',
175
+			'password_confirmation' => 'required',
176
+		]);
177
+
178
+		return \Response::json(\Core::users()->resetPassword($request->only('email', 'password', 'password_confirmation', 'token')), 200);
179
+	}
180
+
181
+	/**
182
+	 * Refresh the expired login token.
183
+	 *
184
+	 * @return \Illuminate\Http\Response
185
+	 */
186
+	public function refreshtoken()
187
+	{
188
+		return \Response::json(\Core::users()->refreshtoken(), 200);
189
+	}
190 190
 }
Please login to merge, or discard this patch.