X-Git-Url: http://source.bookstackapp.com/bookstack/blobdiff_plain/9dc9724e15bdd6d2bd316f7fa24592da72124bc5..refs/pull/2890/head:/app/Http/Controllers/Controller.php diff --git a/app/Http/Controllers/Controller.php b/app/Http/Controllers/Controller.php index 43292d941..283a01cfb 100644 --- a/app/Http/Controllers/Controller.php +++ b/app/Http/Controllers/Controller.php @@ -2,66 +2,45 @@ namespace BookStack\Http\Controllers; -use BookStack\Ownable; -use HttpRequestException; +use BookStack\Facades\Activity; +use BookStack\Interfaces\Loggable; +use BookStack\Model; +use finfo; use Illuminate\Foundation\Bus\DispatchesJobs; -use Illuminate\Http\Exception\HttpResponseException; -use Illuminate\Routing\Controller as BaseController; use Illuminate\Foundation\Validation\ValidatesRequests; -use Illuminate\Support\Facades\Auth; -use Illuminate\Support\Facades\Session; -use BookStack\User; +use Illuminate\Http\Exceptions\HttpResponseException; +use Illuminate\Http\JsonResponse; +use Illuminate\Http\Response; +use Illuminate\Routing\Controller as BaseController; abstract class Controller extends BaseController { - use DispatchesJobs, ValidatesRequests; - - /** - * @var User static - */ - protected $currentUser; - /** - * @var bool - */ - protected $signedIn; + use DispatchesJobs; + use ValidatesRequests; /** - * Controller constructor. + * Check if the current user is signed in. */ - public function __construct() + protected function isSignedIn(): bool { - $this->middleware(function ($request, $next) { - - // Get a user instance for the current user - $user = auth()->user(); - if (!$user) $user = User::getDefault(); - - // Share variables with views - view()->share('signedIn', auth()->check()); - view()->share('currentUser', $user); - - // Share variables with controllers - $this->currentUser = $user; - $this->signedIn = auth()->check(); - - return $next($request); - }); + return auth()->check(); } /** * Stops the application and shows a permission error if * the application is in demo mode. */ - protected function preventAccessForDemoUsers() + protected function preventAccessInDemoMode() { - if (config('app.env') === 'demo') $this->showPermissionError(); + if (config('app.env') === 'demo') { + $this->showPermissionError(); + } } /** * Adds the page title into the view. - * @param $title */ - public function setPageTitle($title) + public function setPageTitle(string $title) { view()->share('pageTitle', $title); } @@ -72,58 +51,131 @@ abstract class Controller extends BaseController */ protected function showPermissionError() { - Session::flash('error', trans('errors.permission')); - $response = request()->wantsJson() ? response()->json(['error' => trans('errors.permissionJson')], 403) : redirect('/'); + if (request()->wantsJson()) { + $response = response()->json(['error' => trans('errors.permissionJson')], 403); + } else { + $response = redirect('/'); + $this->showErrorNotification(trans('errors.permission')); + } + throw new HttpResponseException($response); } /** - * Checks for a permission. - * @param string $permissionName - * @return bool|\Illuminate\Http\RedirectResponse + * Checks that the current user has the given permission otherwise throw an exception. */ - protected function checkPermission($permissionName) + protected function checkPermission(string $permission): void { - if (!$this->currentUser || !$this->currentUser->can($permissionName)) { + if (!user() || !user()->can($permission)) { $this->showPermissionError(); } - return true; } /** - * Check the current user's permissions against an ownable item. - * @param $permission - * @param Ownable $ownable - * @return bool + * Check the current user's permissions against an ownable item otherwise throw an exception. */ - protected function checkOwnablePermission($permission, Ownable $ownable) + protected function checkOwnablePermission(string $permission, Model $ownable): void { - if (userCan($permission, $ownable)) return true; - return $this->showPermissionError(); + if (!userCan($permission, $ownable)) { + $this->showPermissionError(); + } } /** - * Check if a user has a permission or bypass if the callback is true. - * @param $permissionName - * @param $callback - * @return bool + * Check if a user has a permission or bypass the permission + * check if the given callback resolves true. */ - protected function checkPermissionOr($permissionName, $callback) + protected function checkPermissionOr(string $permission, callable $callback): void { - $callbackResult = $callback(); - if ($callbackResult === false) $this->checkPermission($permissionName); - return true; + if ($callback() !== true) { + $this->checkPermission($permission); + } + } + + /** + * Check if the current user has a permission or bypass if the provided user + * id matches the current user. + */ + protected function checkPermissionOrCurrentUser(string $permission, int $userId): void + { + $this->checkPermissionOr($permission, function () use ($userId) { + return $userId === user()->id; + }); } /** * Send back a json error message. - * @param string $messageText - * @param int $statusCode - * @return mixed */ - protected function jsonError($messageText = "", $statusCode = 500) + protected function jsonError(string $messageText = '', int $statusCode = 500): JsonResponse + { + return response()->json(['message' => $messageText, 'status' => 'error'], $statusCode); + } + + /** + * Create a response that forces a download in the browser. + */ + protected function downloadResponse(string $content, string $fileName): Response { - return response()->json(['message' => $messageText], $statusCode); + return response()->make($content, 200, [ + 'Content-Type' => 'application/octet-stream', + 'Content-Disposition' => 'attachment; filename="' . $fileName . '"', + ]); } + /** + * Create a file download response that provides the file with a content-type + * correct for the file, in a way so the browser can show the content in browser. + */ + protected function inlineDownloadResponse(string $content, string $fileName): Response + { + $finfo = new finfo(FILEINFO_MIME_TYPE); + $mime = $finfo->buffer($content) ?: 'application/octet-stream'; + + return response()->make($content, 200, [ + 'Content-Type' => $mime, + 'Content-Disposition' => 'inline; filename="' . $fileName . '"', + ]); + } + + /** + * Show a positive, successful notification to the user on next view load. + */ + protected function showSuccessNotification(string $message): void + { + session()->flash('success', $message); + } + + /** + * Show a warning notification to the user on next view load. + */ + protected function showWarningNotification(string $message): void + { + session()->flash('warning', $message); + } + + /** + * Show an error notification to the user on next view load. + */ + protected function showErrorNotification(string $message): void + { + session()->flash('error', $message); + } + + /** + * Log an activity in the system. + * + * @param string|Loggable + */ + protected function logActivity(string $type, $detail = ''): void + { + Activity::add($type, $detail); + } + + /** + * Get the validation rules for image files. + */ + protected function getImageValidationRules(): string + { + return 'image_extension|mimes:jpeg,png,gif,webp'; + } }