Completed
Push — master ( f3277c...b5dbed )
by Sherif
02:26
created
src/Modules/V1/Acl/Http/Controllers/UsersController.php 1 patch
Indentation   +219 added lines, -219 removed lines patch added patch discarded remove patch
@@ -7,250 +7,250 @@
 block discarded – undo
7 7
 
8 8
 class UsersController extends BaseApiController
9 9
 {
10
-    /**
11
-     * The name of the model that is used by the base api controller 
12
-     * to preform actions like (add, edit ... etc).
13
-     * @var string
14
-     */
15
-    protected $model               = 'users';
10
+	/**
11
+	 * The name of the model that is used by the base api controller 
12
+	 * to preform actions like (add, edit ... etc).
13
+	 * @var string
14
+	 */
15
+	protected $model               = 'users';
16 16
 
17
-    /**
18
-     * List of all route actions that the base api controller
19
-     * will skip permissions check for them.
20
-     * @var array
21
-     */
22
-    protected $skipPermissionCheck = ['account', 'logout', 'sendreset', 'changePassword'];
17
+	/**
18
+	 * List of all route actions that the base api controller
19
+	 * will skip permissions check for them.
20
+	 * @var array
21
+	 */
22
+	protected $skipPermissionCheck = ['account', 'logout', 'sendreset', 'changePassword'];
23 23
 
24
-    /**
25
-     * List of all route actions that the base api controller
26
-     * will skip login check for them.
27
-     * @var array
28
-     */
29
-    protected $skipLoginCheck      = ['login', 'loginSocial', 'register', 'sendreset', 'resetpassword', 'refreshtoken'];
24
+	/**
25
+	 * List of all route actions that the base api controller
26
+	 * will skip login check for them.
27
+	 * @var array
28
+	 */
29
+	protected $skipLoginCheck      = ['login', 'loginSocial', 'register', 'sendreset', 'resetpassword', 'refreshtoken'];
30 30
 
31
-    /**
32
-     * The validations rules used by the base api controller
33
-     * to check before add.
34
-     * @var array
35
-     */
36
-    protected $validationRules     = [
37
-        'name'     => 'nullable|string|unique:users,name,{id},id,name,NOT_NULL', 
38
-        'email'    => 'required|email|unique:users,email,{id},id,email,NOT_NULL', 
39
-        'password' => 'nullable|min:6'
40
-    ];
31
+	/**
32
+	 * The validations rules used by the base api controller
33
+	 * to check before add.
34
+	 * @var array
35
+	 */
36
+	protected $validationRules     = [
37
+		'name'     => 'nullable|string|unique:users,name,{id},id,name,NOT_NULL', 
38
+		'email'    => 'required|email|unique:users,email,{id},id,email,NOT_NULL', 
39
+		'password' => 'nullable|min:6'
40
+	];
41 41
 
42
-    /**
43
-     * Return the logged in user account.
44
-     * 
45
-     * @return \Illuminate\Http\Response
46
-     */
47
-    public function account()
48
-    {
49
-        return \Response::json(\Core::users()->account($this->relations), 200);
50
-    }
42
+	/**
43
+	 * Return the logged in user account.
44
+	 * 
45
+	 * @return \Illuminate\Http\Response
46
+	 */
47
+	public function account()
48
+	{
49
+		return \Response::json(\Core::users()->account($this->relations), 200);
50
+	}
51 51
 
52
-    /**
53
-     * Block the user.
54
-     *
55
-     * @param  integer  $id
56
-     * @return \Illuminate\Http\Response
57
-     */
58
-    public function block($id)
59
-    {
60
-        return \Response::json(\Core::users()->block($id), 200);
61
-    }
52
+	/**
53
+	 * Block the user.
54
+	 *
55
+	 * @param  integer  $id
56
+	 * @return \Illuminate\Http\Response
57
+	 */
58
+	public function block($id)
59
+	{
60
+		return \Response::json(\Core::users()->block($id), 200);
61
+	}
62 62
 
63
-    /**
64
-     * Unblock the user.
65
-     *
66
-     * @param  integer  $id
67
-     * @return \Illuminate\Http\Response
68
-     */
69
-    public function unblock($id)
70
-    {
71
-        return \Response::json(\Core::users()->unblock($id), 200);
72
-    }
63
+	/**
64
+	 * Unblock the user.
65
+	 *
66
+	 * @param  integer  $id
67
+	 * @return \Illuminate\Http\Response
68
+	 */
69
+	public function unblock($id)
70
+	{
71
+		return \Response::json(\Core::users()->unblock($id), 200);
72
+	}
73 73
 
74
-    /**
75
-     * Logout the user.
76
-     * 
77
-     * @return \Illuminate\Http\Response
78
-     */
79
-    public function logout()
80
-    {
81
-        return \Response::json(\Core::users()->logout(), 200);
82
-    }
74
+	/**
75
+	 * Logout the user.
76
+	 * 
77
+	 * @return \Illuminate\Http\Response
78
+	 */
79
+	public function logout()
80
+	{
81
+		return \Response::json(\Core::users()->logout(), 200);
82
+	}
83 83
 
84
-    /**
85
-     * Handle a registration request.
86
-     *
87
-     * @param  \Illuminate\Http\Request  $request
88
-     * @return \Illuminate\Http\Response
89
-     */
90
-    public function register(Request $request)
91
-    {
92
-        $this->validate($request, [
93
-            'name'     => 'nullable|string|unique:users,name,{id},id,name,NOT_NULL', 
94
-            'email'    => 'required|email|unique:users,email,{id},id,email,NOT_NULL', 
95
-            'password' => 'required|min:6'
96
-            ]);
84
+	/**
85
+	 * Handle a registration request.
86
+	 *
87
+	 * @param  \Illuminate\Http\Request  $request
88
+	 * @return \Illuminate\Http\Response
89
+	 */
90
+	public function register(Request $request)
91
+	{
92
+		$this->validate($request, [
93
+			'name'     => 'nullable|string|unique:users,name,{id},id,name,NOT_NULL', 
94
+			'email'    => 'required|email|unique:users,email,{id},id,email,NOT_NULL', 
95
+			'password' => 'required|min:6'
96
+			]);
97 97
 
98
-        return \Response::json(\Core::users()->register($request->only('email', 'password')), 200);
99
-    }
98
+		return \Response::json(\Core::users()->register($request->only('email', 'password')), 200);
99
+	}
100 100
 
101
-    /**
102
-     * Handle a login request of the none admin to the application.
103
-     *
104
-     * @param  \Illuminate\Http\Request  $request
105
-     * @return \Illuminate\Http\Response
106
-     */
107
-    public function login(Request $request)
108
-    {
109
-        $this->validate($request, [
110
-            'email'    => 'required|email', 
111
-            'password' => 'required|min:6',
112
-            'admin'    => 'boolean'
113
-            ]);
101
+	/**
102
+	 * Handle a login request of the none admin to the application.
103
+	 *
104
+	 * @param  \Illuminate\Http\Request  $request
105
+	 * @return \Illuminate\Http\Response
106
+	 */
107
+	public function login(Request $request)
108
+	{
109
+		$this->validate($request, [
110
+			'email'    => 'required|email', 
111
+			'password' => 'required|min:6',
112
+			'admin'    => 'boolean'
113
+			]);
114 114
 
115
-        return \Response::json(\Core::users()->login($request->only('email', 'password'), $request->get('admin')), 200);
116
-    }
115
+		return \Response::json(\Core::users()->login($request->only('email', 'password'), $request->get('admin')), 200);
116
+	}
117 117
 
118
-    /**
119
-     * Handle a social login request of the none admin to the application.
120
-     *
121
-     * @param  \Illuminate\Http\Request  $request
122
-     * @return \Illuminate\Http\Response
123
-     */
124
-    public function loginSocial(Request $request)
125
-    {
126
-        $this->validate($request, [
127
-            'auth_code'    => 'required_without:access_token',
128
-            'access_token' => 'required_without:auth_code',
129
-            'type'         => 'required|in:facebook,google'
130
-            ]);
118
+	/**
119
+	 * Handle a social login request of the none admin to the application.
120
+	 *
121
+	 * @param  \Illuminate\Http\Request  $request
122
+	 * @return \Illuminate\Http\Response
123
+	 */
124
+	public function loginSocial(Request $request)
125
+	{
126
+		$this->validate($request, [
127
+			'auth_code'    => 'required_without:access_token',
128
+			'access_token' => 'required_without:auth_code',
129
+			'type'         => 'required|in:facebook,google'
130
+			]);
131 131
 
132
-        return \Response::json(\Core::users()->loginSocial($request->only('auth_code', 'access_token', 'type')), 200);
133
-    }
132
+		return \Response::json(\Core::users()->loginSocial($request->only('auth_code', 'access_token', 'type')), 200);
133
+	}
134 134
 
135
-    /**
136
-     * Handle an assign groups to user request.
137
-     *
138
-     * @param  \Illuminate\Http\Request  $request
139
-     * @return \Illuminate\Http\Response
140
-     */
141
-    public function assigngroups(Request $request)
142
-    {
143
-        $this->validate($request, [
144
-            'group_ids' => 'required|exists:groups,id', 
145
-            'user_id'   => 'required|exists:users,id'
146
-            ]);
135
+	/**
136
+	 * Handle an assign groups to user request.
137
+	 *
138
+	 * @param  \Illuminate\Http\Request  $request
139
+	 * @return \Illuminate\Http\Response
140
+	 */
141
+	public function assigngroups(Request $request)
142
+	{
143
+		$this->validate($request, [
144
+			'group_ids' => 'required|exists:groups,id', 
145
+			'user_id'   => 'required|exists:users,id'
146
+			]);
147 147
 
148
-        return \Response::json(\Core::users()->assignGroups($request->get('user_id'), $request->get('group_ids')), 200);
149
-    }
148
+		return \Response::json(\Core::users()->assignGroups($request->get('user_id'), $request->get('group_ids')), 200);
149
+	}
150 150
 
151
-    /**
152
-     * Send a reset link to the given user.
153
-     *
154
-     * @param  \Illuminate\Http\Request  $request
155
-     * @return \Illuminate\Http\Response
156
-     */
157
-    public function sendreset(Request $request)
158
-    {
159
-        $this->validate($request, ['email' => 'required|email']);
151
+	/**
152
+	 * Send a reset link to the given user.
153
+	 *
154
+	 * @param  \Illuminate\Http\Request  $request
155
+	 * @return \Illuminate\Http\Response
156
+	 */
157
+	public function sendreset(Request $request)
158
+	{
159
+		$this->validate($request, ['email' => 'required|email']);
160 160
 
161
-        return \Response::json(\Core::users()->sendReset($request->only('email')), 200);
162
-    }
161
+		return \Response::json(\Core::users()->sendReset($request->only('email')), 200);
162
+	}
163 163
 
164
-    /**
165
-     * Reset the given user's password.
166
-     *
167
-     * @param  \Illuminate\Http\Request  $request
168
-     * @return \Illuminate\Http\Response
169
-     */
170
-    public function resetpassword(Request $request)
171
-    {
172
-        $this->validate($request, [
173
-            'token'                 => 'required',
174
-            'email'                 => 'required|email',
175
-            'password'              => 'required|confirmed|min:6',
176
-            'password_confirmation' => 'required',
177
-        ]);
164
+	/**
165
+	 * Reset the given user's password.
166
+	 *
167
+	 * @param  \Illuminate\Http\Request  $request
168
+	 * @return \Illuminate\Http\Response
169
+	 */
170
+	public function resetpassword(Request $request)
171
+	{
172
+		$this->validate($request, [
173
+			'token'                 => 'required',
174
+			'email'                 => 'required|email',
175
+			'password'              => 'required|confirmed|min:6',
176
+			'password_confirmation' => 'required',
177
+		]);
178 178
 
179
-        return \Response::json(\Core::users()->resetPassword($request->only('email', 'password', 'password_confirmation', 'token')), 200);
180
-    }
179
+		return \Response::json(\Core::users()->resetPassword($request->only('email', 'password', 'password_confirmation', 'token')), 200);
180
+	}
181 181
 
182
-    /**
183
-     * Change the logged in user password.
184
-     *
185
-     * @param  \Illuminate\Http\Request  $request
186
-     * @return \Illuminate\Http\Response
187
-     */
188
-    public function changePassword(Request $request)
189
-    {
190
-        $this->validate($request, [
191
-            'old_password'          => 'required',
192
-            'password'              => 'required|confirmed|min:6',
193
-            'password_confirmation' => 'required',
194
-        ]);
182
+	/**
183
+	 * Change the logged in user password.
184
+	 *
185
+	 * @param  \Illuminate\Http\Request  $request
186
+	 * @return \Illuminate\Http\Response
187
+	 */
188
+	public function changePassword(Request $request)
189
+	{
190
+		$this->validate($request, [
191
+			'old_password'          => 'required',
192
+			'password'              => 'required|confirmed|min:6',
193
+			'password_confirmation' => 'required',
194
+		]);
195 195
 
196
-        return \Response::json(\Core::users()->changePassword($request->only('old_password', 'password', 'password_confirmation')), 200);
197
-    }
196
+		return \Response::json(\Core::users()->changePassword($request->only('old_password', 'password', 'password_confirmation')), 200);
197
+	}
198 198
 
199
-    /**
200
-     * Refresh the expired login token.
201
-     *
202
-     * @return \Illuminate\Http\Response
203
-     */
204
-    public function refreshtoken()
205
-    {
206
-        return \Response::json(\Core::users()->refreshtoken(), 200);
207
-    }
199
+	/**
200
+	 * Refresh the expired login token.
201
+	 *
202
+	 * @return \Illuminate\Http\Response
203
+	 */
204
+	public function refreshtoken()
205
+	{
206
+		return \Response::json(\Core::users()->refreshtoken(), 200);
207
+	}
208 208
 
209
-    /**
210
-     * Paginate all users with inthe given group.
211
-     * 
212
-     * @param  \Illuminate\Http\Request  $request
213
-     * @param  string $groupName
214
-     * @param  integer $perPage
215
-     * @param  string  $sortBy
216
-     * @param  boolean $desc
217
-     * @return \Illuminate\Http\Response
218
-     */
219
-    public function group(Request $request, $groupName, $perPage = false, $sortBy = 'created_at', $desc = 1)
220
-    {
221
-        return \Response::json(\Core::users()->group($request->all(), $groupName, $this->relations, $perPage, $sortBy, $desc), 200);
222
-    }
209
+	/**
210
+	 * Paginate all users with inthe given group.
211
+	 * 
212
+	 * @param  \Illuminate\Http\Request  $request
213
+	 * @param  string $groupName
214
+	 * @param  integer $perPage
215
+	 * @param  string  $sortBy
216
+	 * @param  boolean $desc
217
+	 * @return \Illuminate\Http\Response
218
+	 */
219
+	public function group(Request $request, $groupName, $perPage = false, $sortBy = 'created_at', $desc = 1)
220
+	{
221
+		return \Response::json(\Core::users()->group($request->all(), $groupName, $this->relations, $perPage, $sortBy, $desc), 200);
222
+	}
223 223
 
224
-    /**
225
-     * Save the given data to the logged in user.
226
-     *
227
-     * @param  \Illuminate\Http\Request  $request
228
-     * @return \Illuminate\Http\Response
229
-     */
230
-    public function saveProfile(Request $request) 
231
-    {
232
-        foreach ($this->validationRules as &$rule) 
233
-        {
234
-            if (strpos($rule, 'exists') && ! strpos($rule, 'deleted_at,NULL')) 
235
-            {
236
-                $rule .= ',deleted_at,NULL';
237
-            }
224
+	/**
225
+	 * Save the given data to the logged in user.
226
+	 *
227
+	 * @param  \Illuminate\Http\Request  $request
228
+	 * @return \Illuminate\Http\Response
229
+	 */
230
+	public function saveProfile(Request $request) 
231
+	{
232
+		foreach ($this->validationRules as &$rule) 
233
+		{
234
+			if (strpos($rule, 'exists') && ! strpos($rule, 'deleted_at,NULL')) 
235
+			{
236
+				$rule .= ',deleted_at,NULL';
237
+			}
238 238
 
239
-            if ($request->has('id')) 
240
-            {
241
-                $rule = str_replace('{id}', $request->get('id'), $rule);
242
-            }
243
-            else
244
-            {
245
-                $rule = str_replace(',{id}', '', $rule);
246
-            }
247
-        }
239
+			if ($request->has('id')) 
240
+			{
241
+				$rule = str_replace('{id}', $request->get('id'), $rule);
242
+			}
243
+			else
244
+			{
245
+				$rule = str_replace(',{id}', '', $rule);
246
+			}
247
+		}
248 248
 
249
-        $this->validate($request, $this->validationRules);
249
+		$this->validate($request, $this->validationRules);
250 250
 
251
-        if ($this->model)
252
-        {
253
-            return \Response::json(call_user_func_array("\Core::{$this->model}", [])->saveProfile($request->all()), 200);
254
-        }
255
-    }
251
+		if ($this->model)
252
+		{
253
+			return \Response::json(call_user_func_array("\Core::{$this->model}", [])->saveProfile($request->all()), 200);
254
+		}
255
+	}
256 256
 }
Please login to merge, or discard this patch.
src/Modules/V1/Acl/Repositories/UserRepository.php 2 patches
Indentation   +351 added lines, -351 removed lines patch added patch discarded remove patch
@@ -4,362 +4,362 @@
 block discarded – undo
4 4
 
5 5
 class UserRepository extends AbstractRepository
6 6
 {
7
-    /**
8
-     * Return the model full namespace.
9
-     * 
10
-     * @return string
11
-     */
12
-    protected function getModel()
13
-    {
14
-        return 'App\Modules\V1\Acl\AclUser';
15
-    }
16
-
17
-    /**
18
-     * Return the logged in user account.
19
-     *
20
-     * @param  array   $relations
21
-     * @return boolean
22
-     */
23
-    public function account($relations = [])
24
-    {
25
-        $permissions = [];
26
-        $user        = \Core::users()->find(\JWTAuth::parseToken()->authenticate()->id, $relations);
27
-        foreach ($user->groups()->get() as $group)
28
-        {
29
-            $group->permissions->each(function ($permission) use (&$permissions){
30
-                $permissions[$permission->model][$permission->id] = $permission->name;
31
-            });
32
-        }
33
-        $user->permissions = $permissions;
34
-
35
-       return $user;
36
-    }
37
-
38
-    /**
39
-     * Check if the logged in user or the given user 
40
-     * has the given permissions on the given model.
41
-     * 
42
-     * @param  string  $nameOfPermission
43
-     * @param  string  $model            
44
-     * @param  boolean $user
45
-     * @return boolean
46
-     */
47
-    public function can($nameOfPermission, $model, $user = false )
48
-    {      
49
-        $user        = $user ?: \JWTAuth::parseToken()->authenticate();
50
-        $permissions = [];
51
-
52
-        if ( ! $user = $this->find($user->id, ['groups.permissions'])) 
53
-        {
54
-            \ErrorHandler::tokenExpired();
55
-        }
56
-
57
-        $user->groups->pluck('permissions')->each(function ($permission) use (&$permissions, $model){
58
-            $permissions = array_merge($permissions, $permission->where('model', $model)->pluck('name')->toArray()); 
59
-        });
7
+	/**
8
+	 * Return the model full namespace.
9
+	 * 
10
+	 * @return string
11
+	 */
12
+	protected function getModel()
13
+	{
14
+		return 'App\Modules\V1\Acl\AclUser';
15
+	}
16
+
17
+	/**
18
+	 * Return the logged in user account.
19
+	 *
20
+	 * @param  array   $relations
21
+	 * @return boolean
22
+	 */
23
+	public function account($relations = [])
24
+	{
25
+		$permissions = [];
26
+		$user        = \Core::users()->find(\JWTAuth::parseToken()->authenticate()->id, $relations);
27
+		foreach ($user->groups()->get() as $group)
28
+		{
29
+			$group->permissions->each(function ($permission) use (&$permissions){
30
+				$permissions[$permission->model][$permission->id] = $permission->name;
31
+			});
32
+		}
33
+		$user->permissions = $permissions;
34
+
35
+	   return $user;
36
+	}
37
+
38
+	/**
39
+	 * Check if the logged in user or the given user 
40
+	 * has the given permissions on the given model.
41
+	 * 
42
+	 * @param  string  $nameOfPermission
43
+	 * @param  string  $model            
44
+	 * @param  boolean $user
45
+	 * @return boolean
46
+	 */
47
+	public function can($nameOfPermission, $model, $user = false )
48
+	{      
49
+		$user        = $user ?: \JWTAuth::parseToken()->authenticate();
50
+		$permissions = [];
51
+
52
+		if ( ! $user = $this->find($user->id, ['groups.permissions'])) 
53
+		{
54
+			\ErrorHandler::tokenExpired();
55
+		}
56
+
57
+		$user->groups->pluck('permissions')->each(function ($permission) use (&$permissions, $model){
58
+			$permissions = array_merge($permissions, $permission->where('model', $model)->pluck('name')->toArray()); 
59
+		});
60 60
         
61
-        return in_array($nameOfPermission, $permissions);
62
-    }
63
-
64
-    /**
65
-     * Check if the logged in user has the given group.
66
-     * 
67
-     * @param  string  $groupName
68
-     * @return boolean
69
-     */
70
-    public function hasGroup($groupName)
71
-    {
72
-        $groups = $this->find(\JWTAuth::parseToken()->authenticate()->id)->groups;
73
-        return $groups->pluck('name')->search($groupName, true) === false ? false : true;
74
-    }
75
-
76
-    /**
77
-     * Assign the given group ids to the given user.
78
-     * 
79
-     * @param  integer $user_id    
80
-     * @param  array   $group_ids
81
-     * @return object
82
-     */
83
-    public function assignGroups($user_id, $group_ids)
84
-    {
85
-        \DB::transaction(function () use ($user_id, $group_ids) {
86
-            $user = $this->find($user_id);
87
-            $user->groups()->detach();
88
-            $user->groups()->attach($group_ids);
89
-        });
90
-
91
-        return $this->find($user_id);
92
-    }
93
-
94
-    /**
95
-     * Handle a login request to the application.
96
-     * 
97
-     * @param  array   $credentials    
98
-     * @param  boolean $adminLogin
99
-     * @return array
100
-     */
101
-    public function login($credentials, $adminLogin = false)
102
-    {
103
-        if ( ! $user = $this->first(['email' => $credentials['email']])) 
104
-        {
105
-            \ErrorHandler::loginFailed();
106
-        }
107
-        else if ($adminLogin && $user->groups->pluck('name')->search('Admin', true) === false) 
108
-        {
109
-            \ErrorHandler::loginFailed();
110
-        }
111
-        else if ( ! $adminLogin && $user->groups->pluck('name')->search('Admin', true) !== false) 
112
-        {
113
-            \ErrorHandler::loginFailed();
114
-        }
115
-        else if ($user->blocked)
116
-        {
117
-            \ErrorHandler::userIsBlocked();
118
-        }
119
-        else if ($token = \JWTAuth::attempt($credentials))
120
-        {
121
-            return ['token' => $token];
122
-        }
123
-        else
124
-        {
125
-            \ErrorHandler::loginFailed();
126
-        }
127
-    }
128
-
129
-    /**
130
-     * Handle a social login request of the none admin to the application.
131
-     * 
132
-     * @param  array   $credentials
133
-     * @return array
134
-     */
135
-    public function loginSocial($credentials)
136
-    {
137
-        $access_token = $credentials['auth_code'] ? \Socialite::driver($credentials['type'])->getAccessToken($credentials['auth_code']) : $credentials['access_token'];
138
-        $user         = \Socialite::driver($credentials['type'])->userFromToken($access_token);
139
-
140
-        if ( ! $user->email)
141
-        {
142
-            \ErrorHandler::noSocialEmail();
143
-        }
144
-
145
-        if ( ! $registeredUser = $this->model->where('email', $user->email)->first()) 
146
-        {
147
-            $data = ['email' => $user->email, 'password' => ''];
148
-            return $this->register($data);
149
-        }
150
-        else
151
-        {
152
-            if ( ! \Auth::attempt(['email' => $registeredUser->email, 'password' => '']))
153
-            {
154
-                \ErrorHandler::userAlreadyRegistered();
155
-            }
156
-            return $this->login(['email' => $registeredUser->email, 'password' => ''], false);
157
-        }
158
-    }
61
+		return in_array($nameOfPermission, $permissions);
62
+	}
63
+
64
+	/**
65
+	 * Check if the logged in user has the given group.
66
+	 * 
67
+	 * @param  string  $groupName
68
+	 * @return boolean
69
+	 */
70
+	public function hasGroup($groupName)
71
+	{
72
+		$groups = $this->find(\JWTAuth::parseToken()->authenticate()->id)->groups;
73
+		return $groups->pluck('name')->search($groupName, true) === false ? false : true;
74
+	}
75
+
76
+	/**
77
+	 * Assign the given group ids to the given user.
78
+	 * 
79
+	 * @param  integer $user_id    
80
+	 * @param  array   $group_ids
81
+	 * @return object
82
+	 */
83
+	public function assignGroups($user_id, $group_ids)
84
+	{
85
+		\DB::transaction(function () use ($user_id, $group_ids) {
86
+			$user = $this->find($user_id);
87
+			$user->groups()->detach();
88
+			$user->groups()->attach($group_ids);
89
+		});
90
+
91
+		return $this->find($user_id);
92
+	}
93
+
94
+	/**
95
+	 * Handle a login request to the application.
96
+	 * 
97
+	 * @param  array   $credentials    
98
+	 * @param  boolean $adminLogin
99
+	 * @return array
100
+	 */
101
+	public function login($credentials, $adminLogin = false)
102
+	{
103
+		if ( ! $user = $this->first(['email' => $credentials['email']])) 
104
+		{
105
+			\ErrorHandler::loginFailed();
106
+		}
107
+		else if ($adminLogin && $user->groups->pluck('name')->search('Admin', true) === false) 
108
+		{
109
+			\ErrorHandler::loginFailed();
110
+		}
111
+		else if ( ! $adminLogin && $user->groups->pluck('name')->search('Admin', true) !== false) 
112
+		{
113
+			\ErrorHandler::loginFailed();
114
+		}
115
+		else if ($user->blocked)
116
+		{
117
+			\ErrorHandler::userIsBlocked();
118
+		}
119
+		else if ($token = \JWTAuth::attempt($credentials))
120
+		{
121
+			return ['token' => $token];
122
+		}
123
+		else
124
+		{
125
+			\ErrorHandler::loginFailed();
126
+		}
127
+	}
128
+
129
+	/**
130
+	 * Handle a social login request of the none admin to the application.
131
+	 * 
132
+	 * @param  array   $credentials
133
+	 * @return array
134
+	 */
135
+	public function loginSocial($credentials)
136
+	{
137
+		$access_token = $credentials['auth_code'] ? \Socialite::driver($credentials['type'])->getAccessToken($credentials['auth_code']) : $credentials['access_token'];
138
+		$user         = \Socialite::driver($credentials['type'])->userFromToken($access_token);
139
+
140
+		if ( ! $user->email)
141
+		{
142
+			\ErrorHandler::noSocialEmail();
143
+		}
144
+
145
+		if ( ! $registeredUser = $this->model->where('email', $user->email)->first()) 
146
+		{
147
+			$data = ['email' => $user->email, 'password' => ''];
148
+			return $this->register($data);
149
+		}
150
+		else
151
+		{
152
+			if ( ! \Auth::attempt(['email' => $registeredUser->email, 'password' => '']))
153
+			{
154
+				\ErrorHandler::userAlreadyRegistered();
155
+			}
156
+			return $this->login(['email' => $registeredUser->email, 'password' => ''], false);
157
+		}
158
+	}
159 159
     
160
-    /**
161
-     * Handle a registration request.
162
-     * 
163
-     * @param  array $credentials
164
-     * @return array
165
-     */
166
-    public function register($credentials)
167
-    {
168
-        return ['token' => \JWTAuth::fromUser($this->model->create($credentials))];
169
-    }
170
-
171
-    /**
172
-     * Logout the user.
173
-     * 
174
-     * @return boolean
175
-     */
176
-    public function logout()
177
-    {
178
-        return \JWTAuth::invalidate(\JWTAuth::getToken());
179
-    }
180
-
181
-    /**
182
-     * Block the user.
183
-     *
184
-     * @param  integer $user_id
185
-     * @return object
186
-     */
187
-    public function block($user_id)
188
-    {
189
-        if ( ! $user = $this->find($user_id)) 
190
-        {
191
-            \ErrorHandler::notFound('user');
192
-        }
193
-        if ( ! $this->hasGroup('Admin'))
194
-        {
195
-            \ErrorHandler::noPermissions();
196
-        }
197
-        else if (\JWTAuth::parseToken()->authenticate()->id == $user_id)
198
-        {
199
-            \ErrorHandler::noPermissions();
200
-        }
201
-        else if ($user->groups->pluck('name')->search('Admin', true) !== false) 
202
-        {
203
-            \ErrorHandler::noPermissions();
204
-        }
205
-
206
-        $user->blocked = 1;
207
-        $user->save();
160
+	/**
161
+	 * Handle a registration request.
162
+	 * 
163
+	 * @param  array $credentials
164
+	 * @return array
165
+	 */
166
+	public function register($credentials)
167
+	{
168
+		return ['token' => \JWTAuth::fromUser($this->model->create($credentials))];
169
+	}
170
+
171
+	/**
172
+	 * Logout the user.
173
+	 * 
174
+	 * @return boolean
175
+	 */
176
+	public function logout()
177
+	{
178
+		return \JWTAuth::invalidate(\JWTAuth::getToken());
179
+	}
180
+
181
+	/**
182
+	 * Block the user.
183
+	 *
184
+	 * @param  integer $user_id
185
+	 * @return object
186
+	 */
187
+	public function block($user_id)
188
+	{
189
+		if ( ! $user = $this->find($user_id)) 
190
+		{
191
+			\ErrorHandler::notFound('user');
192
+		}
193
+		if ( ! $this->hasGroup('Admin'))
194
+		{
195
+			\ErrorHandler::noPermissions();
196
+		}
197
+		else if (\JWTAuth::parseToken()->authenticate()->id == $user_id)
198
+		{
199
+			\ErrorHandler::noPermissions();
200
+		}
201
+		else if ($user->groups->pluck('name')->search('Admin', true) !== false) 
202
+		{
203
+			\ErrorHandler::noPermissions();
204
+		}
205
+
206
+		$user->blocked = 1;
207
+		$user->save();
208 208
         
209
-        return $user;
210
-    }
211
-
212
-    /**
213
-     * Unblock the user.
214
-     *
215
-     * @param  integer $user_id
216
-     * @return object
217
-     */
218
-    public function unblock($user_id)
219
-    {
220
-        if ( ! $this->hasGroup('Admin'))
221
-        {
222
-            \ErrorHandler::noPermissions();
223
-        }
224
-
225
-        $user          = $this->find($user_id);
226
-        $user->blocked = 0;
227
-        $user->save();
228
-
229
-        return $user;
230
-    }
231
-
232
-    /**
233
-     * Send a reset link to the given user.
234
-     *
235
-     * @param  string  $email
236
-     * @return void
237
-     */
238
-    public function sendReset($email)
239
-    {
240
-        if ( ! $user = $this->model->where('email', $email)->first())
241
-        {
242
-            \ErrorHandler::notFound('email');
243
-        }
244
-
245
-        $url   = $this->config['resetLink'];
246
-        $token = \Password::getRepository()->create($user);
209
+		return $user;
210
+	}
211
+
212
+	/**
213
+	 * Unblock the user.
214
+	 *
215
+	 * @param  integer $user_id
216
+	 * @return object
217
+	 */
218
+	public function unblock($user_id)
219
+	{
220
+		if ( ! $this->hasGroup('Admin'))
221
+		{
222
+			\ErrorHandler::noPermissions();
223
+		}
224
+
225
+		$user          = $this->find($user_id);
226
+		$user->blocked = 0;
227
+		$user->save();
228
+
229
+		return $user;
230
+	}
231
+
232
+	/**
233
+	 * Send a reset link to the given user.
234
+	 *
235
+	 * @param  string  $email
236
+	 * @return void
237
+	 */
238
+	public function sendReset($email)
239
+	{
240
+		if ( ! $user = $this->model->where('email', $email)->first())
241
+		{
242
+			\ErrorHandler::notFound('email');
243
+		}
244
+
245
+		$url   = $this->config['resetLink'];
246
+		$token = \Password::getRepository()->create($user);
247 247
         
248
-        \Mail::send('auth.emails.password', ['user' => $user, 'url' => $url, 'token' => $token], function ($m) use ($user) {
249
-            $m->to($user->email, $user->name)->subject('Your Password Reset Link');
250
-        });
251
-    }
252
-
253
-    /**
254
-     * Reset the given user's password.
255
-     *
256
-     * @param  array  $credentials
257
-     * @return array
258
-     */
259
-    public function resetPassword($credentials)
260
-    {
261
-        $token    = false;
262
-        $response = \Password::reset($credentials, function ($user, $password) use (&$token) {
263
-            $user->password = bcrypt($password);
264
-            $user->save();
265
-
266
-            $token = \JWTAuth::fromUser($user);
267
-        });
268
-
269
-        switch ($response) {
270
-            case \Password::PASSWORD_RESET:
271
-                return ['token' => $token];
248
+		\Mail::send('auth.emails.password', ['user' => $user, 'url' => $url, 'token' => $token], function ($m) use ($user) {
249
+			$m->to($user->email, $user->name)->subject('Your Password Reset Link');
250
+		});
251
+	}
252
+
253
+	/**
254
+	 * Reset the given user's password.
255
+	 *
256
+	 * @param  array  $credentials
257
+	 * @return array
258
+	 */
259
+	public function resetPassword($credentials)
260
+	{
261
+		$token    = false;
262
+		$response = \Password::reset($credentials, function ($user, $password) use (&$token) {
263
+			$user->password = bcrypt($password);
264
+			$user->save();
265
+
266
+			$token = \JWTAuth::fromUser($user);
267
+		});
268
+
269
+		switch ($response) {
270
+			case \Password::PASSWORD_RESET:
271
+				return ['token' => $token];
272 272
                 
273
-            case \Password::INVALID_TOKEN:
274
-                \ErrorHandler::invalidResetToken('token');
275
-
276
-            case \Password::INVALID_PASSWORD:
277
-                \ErrorHandler::invalidResetPassword('email');
278
-
279
-            case \Password::INVALID_USER:
280
-                \ErrorHandler::notFound('user');
281
-
282
-            default:
283
-                \ErrorHandler::generalError();
284
-        }
285
-    }
286
-
287
-    /**
288
-     * Change the logged in user password.
289
-     *
290
-     * @param  array  $credentials
291
-     * @return void
292
-     */
293
-    public function changePassword($credentials)
294
-    {
295
-        $user = $this->find(\JWTAuth::parseToken()->authenticate()->id);
296
-        if ( ! \Hash::check($credentials['old_password'], $user->password)) 
297
-        {
298
-            \ErrorHandler::invalidOldPassword();
299
-        }
300
-
301
-        $user->password = $credentials['password'];
302
-        $user->save();
303
-    }
304
-
305
-    /**
306
-     * Refresh the expired login token.
307
-     *
308
-     * @return array
309
-     */
310
-    public function refreshtoken()
311
-    {
312
-        $token = \JWTAuth::parseToken()->refresh();
313
-
314
-        return ['token' => $token];
315
-    }
316
-
317
-    /**
318
-     * Paginate all users in the given group based on the given conditions.
319
-     * 
320
-     * @param  string  $groupName
321
-     * @param  array   $relations
322
-     * @param  integer $perPage
323
-     * @param  string  $sortBy
324
-     * @param  boolean $desc
325
-     * @return \Illuminate\Http\Response
326
-     */
327
-    public function group($conditions, $groupName, $relations, $perPage, $sortBy, $desc)
328
-    {   
329
-        unset($conditions['page']);
330
-        $conditions = $this->constructConditions($conditions, $this->model);
331
-        $sort       = $desc ? 'desc' : 'asc';
332
-        $model      = call_user_func_array("{$this->getModel()}::with", array($relations));
333
-
334
-        $model->whereHas('groups', function($q) use ($groupName){
335
-            $q->where('name', $groupName);
336
-        });
273
+			case \Password::INVALID_TOKEN:
274
+				\ErrorHandler::invalidResetToken('token');
275
+
276
+			case \Password::INVALID_PASSWORD:
277
+				\ErrorHandler::invalidResetPassword('email');
278
+
279
+			case \Password::INVALID_USER:
280
+				\ErrorHandler::notFound('user');
281
+
282
+			default:
283
+				\ErrorHandler::generalError();
284
+		}
285
+	}
286
+
287
+	/**
288
+	 * Change the logged in user password.
289
+	 *
290
+	 * @param  array  $credentials
291
+	 * @return void
292
+	 */
293
+	public function changePassword($credentials)
294
+	{
295
+		$user = $this->find(\JWTAuth::parseToken()->authenticate()->id);
296
+		if ( ! \Hash::check($credentials['old_password'], $user->password)) 
297
+		{
298
+			\ErrorHandler::invalidOldPassword();
299
+		}
300
+
301
+		$user->password = $credentials['password'];
302
+		$user->save();
303
+	}
304
+
305
+	/**
306
+	 * Refresh the expired login token.
307
+	 *
308
+	 * @return array
309
+	 */
310
+	public function refreshtoken()
311
+	{
312
+		$token = \JWTAuth::parseToken()->refresh();
313
+
314
+		return ['token' => $token];
315
+	}
316
+
317
+	/**
318
+	 * Paginate all users in the given group based on the given conditions.
319
+	 * 
320
+	 * @param  string  $groupName
321
+	 * @param  array   $relations
322
+	 * @param  integer $perPage
323
+	 * @param  string  $sortBy
324
+	 * @param  boolean $desc
325
+	 * @return \Illuminate\Http\Response
326
+	 */
327
+	public function group($conditions, $groupName, $relations, $perPage, $sortBy, $desc)
328
+	{   
329
+		unset($conditions['page']);
330
+		$conditions = $this->constructConditions($conditions, $this->model);
331
+		$sort       = $desc ? 'desc' : 'asc';
332
+		$model      = call_user_func_array("{$this->getModel()}::with", array($relations));
333
+
334
+		$model->whereHas('groups', function($q) use ($groupName){
335
+			$q->where('name', $groupName);
336
+		});
337 337
 
338 338
         
339
-        if (count($conditions['conditionValues']))
340
-        {
341
-            $model->whereRaw($conditions['conditionString'], $conditions['conditionValues']);
342
-        }
343
-
344
-        if ($perPage) 
345
-        {
346
-            return $model->orderBy($sortBy, $sort)->paginate($perPage);
347
-        }
348
-
349
-        return $model->orderBy($sortBy, $sort)->get();
350
-    }
351
-
352
-    /**
353
-     * Save the given data to the logged in user.
354
-     *
355
-     * @param  array $credentials
356
-     * @return object
357
-     */
358
-    public function saveProfile($credentials) 
359
-    {
360
-        $user = \JWTAuth::parseToken()->authenticate();
361
-        $user->save($credentials);
362
-
363
-        return $user;
364
-    }
339
+		if (count($conditions['conditionValues']))
340
+		{
341
+			$model->whereRaw($conditions['conditionString'], $conditions['conditionValues']);
342
+		}
343
+
344
+		if ($perPage) 
345
+		{
346
+			return $model->orderBy($sortBy, $sort)->paginate($perPage);
347
+		}
348
+
349
+		return $model->orderBy($sortBy, $sort)->get();
350
+	}
351
+
352
+	/**
353
+	 * Save the given data to the logged in user.
354
+	 *
355
+	 * @param  array $credentials
356
+	 * @return object
357
+	 */
358
+	public function saveProfile($credentials) 
359
+	{
360
+		$user = \JWTAuth::parseToken()->authenticate();
361
+		$user->save($credentials);
362
+
363
+		return $user;
364
+	}
365 365
 }
Please login to merge, or discard this patch.
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -26,7 +26,7 @@  discard block
 block discarded – undo
26 26
         $user        = \Core::users()->find(\JWTAuth::parseToken()->authenticate()->id, $relations);
27 27
         foreach ($user->groups()->get() as $group)
28 28
         {
29
-            $group->permissions->each(function ($permission) use (&$permissions){
29
+            $group->permissions->each(function($permission) use (&$permissions){
30 30
                 $permissions[$permission->model][$permission->id] = $permission->name;
31 31
             });
32 32
         }
@@ -44,7 +44,7 @@  discard block
 block discarded – undo
44 44
      * @param  boolean $user
45 45
      * @return boolean
46 46
      */
47
-    public function can($nameOfPermission, $model, $user = false )
47
+    public function can($nameOfPermission, $model, $user = false)
48 48
     {      
49 49
         $user        = $user ?: \JWTAuth::parseToken()->authenticate();
50 50
         $permissions = [];
@@ -54,7 +54,7 @@  discard block
 block discarded – undo
54 54
             \ErrorHandler::tokenExpired();
55 55
         }
56 56
 
57
-        $user->groups->pluck('permissions')->each(function ($permission) use (&$permissions, $model){
57
+        $user->groups->pluck('permissions')->each(function($permission) use (&$permissions, $model){
58 58
             $permissions = array_merge($permissions, $permission->where('model', $model)->pluck('name')->toArray()); 
59 59
         });
60 60
         
@@ -82,7 +82,7 @@  discard block
 block discarded – undo
82 82
      */
83 83
     public function assignGroups($user_id, $group_ids)
84 84
     {
85
-        \DB::transaction(function () use ($user_id, $group_ids) {
85
+        \DB::transaction(function() use ($user_id, $group_ids) {
86 86
             $user = $this->find($user_id);
87 87
             $user->groups()->detach();
88 88
             $user->groups()->attach($group_ids);
@@ -245,7 +245,7 @@  discard block
 block discarded – undo
245 245
         $url   = $this->config['resetLink'];
246 246
         $token = \Password::getRepository()->create($user);
247 247
         
248
-        \Mail::send('auth.emails.password', ['user' => $user, 'url' => $url, 'token' => $token], function ($m) use ($user) {
248
+        \Mail::send('auth.emails.password', ['user' => $user, 'url' => $url, 'token' => $token], function($m) use ($user) {
249 249
             $m->to($user->email, $user->name)->subject('Your Password Reset Link');
250 250
         });
251 251
     }
@@ -259,7 +259,7 @@  discard block
 block discarded – undo
259 259
     public function resetPassword($credentials)
260 260
     {
261 261
         $token    = false;
262
-        $response = \Password::reset($credentials, function ($user, $password) use (&$token) {
262
+        $response = \Password::reset($credentials, function($user, $password) use (&$token) {
263 263
             $user->password = bcrypt($password);
264 264
             $user->save();
265 265
 
Please login to merge, or discard this patch.
src/Modules/V1/Core/Utl/CoreConfig.php 1 patch
Indentation   +9 added lines, -9 removed lines patch added patch discarded remove patch
@@ -3,15 +3,15 @@  discard block
 block discarded – undo
3 3
 
4 4
 class CoreConfig
5 5
 {
6
-    public function getConfig()
7
-    {
8
-    	$customSettings = [];
9
-    	Settings::get(['key', 'value'])->each(function ($setting) use (&$customSettings){
10
-    		$customSettings[$setting['key']] = $setting['value'];
11
-    	});
6
+	public function getConfig()
7
+	{
8
+		$customSettings = [];
9
+		Settings::get(['key', 'value'])->each(function ($setting) use (&$customSettings){
10
+			$customSettings[$setting['key']] = $setting['value'];
11
+		});
12 12
 
13
-        return array_merge($customSettings, [
14
-        	'resetLink' => '{{link_here}}',
13
+		return array_merge($customSettings, [
14
+			'resetLink' => '{{link_here}}',
15 15
 			/**
16 16
 			 * Specify what relations should be used for every model.
17 17
 			 */
@@ -150,5 +150,5 @@  discard block
 block discarded – undo
150 150
 				]
151 151
 			]
152 152
 		]);
153
-    }
153
+	}
154 154
 }
155 155
\ No newline at end of file
Please login to merge, or discard this patch.