2020-06-19 00:42:10 +02:00
|
|
|
<?php
|
|
|
|
|
|
|
|
namespace App\Model\Table;
|
|
|
|
|
|
|
|
use App\Model\Table\AppTable;
|
|
|
|
use Cake\ORM\Table;
|
|
|
|
use Cake\Validation\Validator;
|
2020-06-21 21:27:11 +02:00
|
|
|
use Cake\ORM\RulesChecker;
|
2020-06-22 17:47:11 +02:00
|
|
|
use Cake\ORM\TableRegistry;
|
2021-09-24 01:48:50 +02:00
|
|
|
use \Cake\Datasource\EntityInterface;
|
|
|
|
use \Cake\Http\Session;
|
|
|
|
use Cake\Http\Client;
|
|
|
|
use Cake\Utility\Security;
|
|
|
|
use Cake\Core\Configure;
|
2021-11-24 14:46:34 +01:00
|
|
|
use Cake\Utility\Text;
|
2020-06-19 00:42:10 +02:00
|
|
|
|
|
|
|
class UsersTable extends AppTable
|
|
|
|
{
|
|
|
|
public function initialize(array $config): void
|
|
|
|
{
|
|
|
|
parent::initialize($config);
|
2021-10-21 11:33:41 +02:00
|
|
|
$this->addBehavior('Timestamp');
|
2020-06-19 00:42:10 +02:00
|
|
|
$this->addBehavior('UUID');
|
2021-11-17 15:43:52 +01:00
|
|
|
$this->addBehavior('AuditLog');
|
2021-10-01 13:19:26 +02:00
|
|
|
$this->initAuthBehaviors();
|
2020-06-19 00:42:10 +02:00
|
|
|
$this->belongsTo(
|
|
|
|
'Individuals',
|
|
|
|
[
|
|
|
|
'dependent' => false,
|
|
|
|
'cascadeCallbacks' => false
|
|
|
|
]
|
|
|
|
);
|
|
|
|
$this->belongsTo(
|
|
|
|
'Roles',
|
|
|
|
[
|
|
|
|
'dependent' => false,
|
|
|
|
'cascadeCallbacks' => false
|
|
|
|
]
|
|
|
|
);
|
2021-11-24 01:25:32 +01:00
|
|
|
$this->belongsTo(
|
|
|
|
'Organisations',
|
|
|
|
[
|
|
|
|
'dependent' => false,
|
|
|
|
'cascadeCallbacks' => false
|
|
|
|
]
|
|
|
|
);
|
2021-10-08 10:27:40 +02:00
|
|
|
$this->hasMany(
|
|
|
|
'UserSettings',
|
|
|
|
[
|
|
|
|
'dependent' => true,
|
|
|
|
'cascadeCallbacks' => true
|
|
|
|
]
|
|
|
|
);
|
2020-06-21 21:27:11 +02:00
|
|
|
$this->setDisplayField('username');
|
2020-06-19 00:42:10 +02:00
|
|
|
}
|
|
|
|
|
2021-10-01 13:19:26 +02:00
|
|
|
private function initAuthBehaviors()
|
|
|
|
{
|
|
|
|
if (!empty(Configure::read('keycloak'))) {
|
|
|
|
$this->addBehavior('AuthKeycloak');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-19 00:42:10 +02:00
|
|
|
public function validationDefault(Validator $validator): Validator
|
|
|
|
{
|
|
|
|
$validator
|
2020-11-06 10:07:25 +01:00
|
|
|
->requirePresence(['password'], 'create')
|
|
|
|
->add('password', [
|
|
|
|
'password_complexity' => [
|
|
|
|
'rule' => function($value, $context) {
|
2020-11-20 11:16:57 +01:00
|
|
|
if (!preg_match('/^((?=.*\d)|(?=.*\W+))(?![\n])(?=.*[A-Z])(?=.*[a-z]).*$|.{16,}/s', $value) || strlen($value) < 12) {
|
2020-11-06 10:07:25 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
},
|
|
|
|
'message' => __('Invalid password. Passwords have to be either 16 character long or 12 character long with 3/4 special groups.')
|
|
|
|
],
|
|
|
|
'password_confirmation' => [
|
|
|
|
'rule' => function($value, $context) {
|
|
|
|
if (isset($context['data']['confirm_password'])) {
|
|
|
|
if ($context['data']['confirm_password'] !== $value) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
},
|
|
|
|
'message' => __('Password confirmation missing or not matching the password.')
|
|
|
|
]
|
2021-01-12 10:16:58 +01:00
|
|
|
])
|
|
|
|
->requirePresence(['username'], 'create')
|
|
|
|
->notEmptyString('username', 'Please fill this field');
|
2020-06-19 00:42:10 +02:00
|
|
|
return $validator;
|
|
|
|
}
|
2020-06-21 21:27:11 +02:00
|
|
|
|
|
|
|
public function buildRules(RulesChecker $rules): RulesChecker
|
|
|
|
{
|
|
|
|
return $rules;
|
|
|
|
}
|
2020-06-22 17:45:00 +02:00
|
|
|
|
2021-11-24 23:24:04 +01:00
|
|
|
public function test()
|
|
|
|
{
|
|
|
|
$this->Roles = TableRegistry::get('Roles');
|
|
|
|
$role = $this->Roles->newEntity([
|
|
|
|
'name' => 'admin',
|
|
|
|
'perm_admin' => 1,
|
|
|
|
'perm_org_admin' => 1,
|
|
|
|
'perm_sync' => 1
|
|
|
|
]);
|
|
|
|
$this->Roles->save($role);
|
|
|
|
}
|
|
|
|
|
2020-06-22 17:45:00 +02:00
|
|
|
public function checkForNewInstance(): bool
|
|
|
|
{
|
|
|
|
if (empty($this->find()->first())) {
|
|
|
|
$this->Roles = TableRegistry::get('Roles');
|
|
|
|
$role = $this->Roles->newEntity([
|
|
|
|
'name' => 'admin',
|
2021-11-24 23:24:04 +01:00
|
|
|
'perm_admin' => 1,
|
|
|
|
'perm_org_admin' => 1,
|
|
|
|
'perm_sync' => 1
|
2020-06-22 17:45:00 +02:00
|
|
|
]);
|
|
|
|
$this->Roles->save($role);
|
2021-11-24 14:46:34 +01:00
|
|
|
$this->Organisations = TableRegistry::get('Organisations');
|
|
|
|
$organisation = $this->Organisations->newEntity([
|
2021-11-24 23:59:34 +01:00
|
|
|
'name' => 'default_organisation',
|
|
|
|
'uuid' => Text::uuid()
|
2021-11-24 14:46:34 +01:00
|
|
|
]);
|
|
|
|
$this->Organisations->save($organisation);
|
2020-06-22 17:45:00 +02:00
|
|
|
$this->Individuals = TableRegistry::get('Individuals');
|
2020-06-22 17:52:11 +02:00
|
|
|
$individual = $this->Individuals->newEntity([
|
2020-06-22 17:54:19 +02:00
|
|
|
'email' => 'admin@admin.test',
|
|
|
|
'first_name' => 'admin',
|
|
|
|
'last_name' => 'admin'
|
2020-06-22 17:45:00 +02:00
|
|
|
]);
|
|
|
|
$this->Individuals->save($individual);
|
|
|
|
$user = $this->newEntity([
|
|
|
|
'username' => 'admin',
|
|
|
|
'password' => 'Password1234',
|
2020-06-22 17:50:10 +02:00
|
|
|
'individual_id' => $individual->id,
|
2021-11-25 00:02:16 +01:00
|
|
|
'organisation_id' => $organisation->id,
|
2020-06-22 17:50:10 +02:00
|
|
|
'role_id' => $role->id
|
2020-06-22 17:45:00 +02:00
|
|
|
]);
|
|
|
|
$this->save($user);
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
2021-09-24 01:48:50 +02:00
|
|
|
|
2021-10-01 13:19:26 +02:00
|
|
|
public function captureIndividual($user): int
|
2021-09-24 01:48:50 +02:00
|
|
|
{
|
|
|
|
$individual = $this->Individuals->find()->where(['email' => $user['individual']['email']])->first();
|
|
|
|
if (empty($individual)) {
|
|
|
|
$individual = $this->Individuals->newEntity($user['individual']);
|
|
|
|
if (!$this->Individuals->save($individual)) {
|
|
|
|
throw new BadRequestException(__('Could not save the associated individual'));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $individual->id;
|
|
|
|
}
|
|
|
|
|
2021-10-01 13:19:26 +02:00
|
|
|
public function captureOrganisation($user): int
|
2021-09-24 01:48:50 +02:00
|
|
|
{
|
|
|
|
$organisation = $this->Organisations->find()->where(['uuid' => $user['organisation']['uuid']])->first();
|
|
|
|
if (empty($organisation)) {
|
|
|
|
$user['organisation']['name'] = $user['organisation']['uuid'];
|
|
|
|
$organisation = $this->Organisations->newEntity($user['organisation']);
|
|
|
|
if (!$this->Organisations->save($organisation)) {
|
|
|
|
throw new BadRequestException(__('Could not save the associated organisation'));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $organisation->id;
|
|
|
|
}
|
|
|
|
|
2021-10-01 13:19:26 +02:00
|
|
|
public function captureRole($user): int
|
2021-09-24 01:48:50 +02:00
|
|
|
{
|
|
|
|
$role = $this->Roles->find()->where(['name' => $user['role']['name']])->first();
|
|
|
|
if (empty($role)) {
|
|
|
|
if (!empty(Configure::read('keycloak.default_role_name'))) {
|
|
|
|
$default_role_name = Configure::read('keycloak.default_role_name');
|
|
|
|
$role = $this->Roles->find()->where(['name' => $default_role_name])->first();
|
|
|
|
}
|
|
|
|
if (empty($role)) {
|
|
|
|
throw new NotFoundException(__('Invalid role'));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $role->id;
|
|
|
|
}
|
|
|
|
|
2021-10-01 13:19:26 +02:00
|
|
|
public function enrollUserRouter($data): void
|
2021-09-24 01:48:50 +02:00
|
|
|
{
|
2021-10-01 13:19:26 +02:00
|
|
|
if (!empty(Configure::read('keycloak'))) {
|
|
|
|
$this->enrollUser($data);
|
2021-09-24 01:48:50 +02:00
|
|
|
}
|
|
|
|
}
|
2020-06-19 00:42:10 +02:00
|
|
|
}
|