]>
Commit | Line | Data |
---|---|---|
1 | <?php | |
2 | ||
3 | namespace Wallabag\CoreBundle\Controller; | |
4 | ||
5 | use JMS\Serializer\SerializationContext; | |
6 | use JMS\Serializer\SerializerBuilder; | |
7 | use PragmaRX\Recovery\Recovery as BackupCodes; | |
8 | use Symfony\Bundle\FrameworkBundle\Controller\Controller; | |
9 | use Symfony\Component\HttpFoundation\JsonResponse; | |
10 | use Symfony\Component\HttpFoundation\RedirectResponse; | |
11 | use Symfony\Component\HttpFoundation\Request; | |
12 | use Symfony\Component\HttpFoundation\Response; | |
13 | use Symfony\Component\HttpKernel\Exception\AccessDeniedHttpException; | |
14 | use Symfony\Component\Routing\Annotation\Route; | |
15 | use Symfony\Component\Validator\Constraints\Locale as LocaleConstraint; | |
16 | use Wallabag\CoreBundle\Entity\Config; | |
17 | use Wallabag\CoreBundle\Entity\TaggingRule; | |
18 | use Wallabag\CoreBundle\Form\Type\ChangePasswordType; | |
19 | use Wallabag\CoreBundle\Form\Type\ConfigType; | |
20 | use Wallabag\CoreBundle\Form\Type\FeedType; | |
21 | use Wallabag\CoreBundle\Form\Type\TaggingRuleImportType; | |
22 | use Wallabag\CoreBundle\Form\Type\TaggingRuleType; | |
23 | use Wallabag\CoreBundle\Form\Type\UserInformationType; | |
24 | use Wallabag\CoreBundle\Tools\Utils; | |
25 | ||
26 | class ConfigController extends Controller | |
27 | { | |
28 | /** | |
29 | * @Route("/config", name="config") | |
30 | */ | |
31 | public function indexAction(Request $request) | |
32 | { | |
33 | $em = $this->getDoctrine()->getManager(); | |
34 | $config = $this->getConfig(); | |
35 | $userManager = $this->container->get('fos_user.user_manager'); | |
36 | $user = $this->getUser(); | |
37 | ||
38 | // handle basic config detail (this form is defined as a service) | |
39 | $configForm = $this->createForm(ConfigType::class, $config, ['action' => $this->generateUrl('config')]); | |
40 | $configForm->handleRequest($request); | |
41 | ||
42 | if ($configForm->isSubmitted() && $configForm->isValid()) { | |
43 | $em->persist($config); | |
44 | $em->flush(); | |
45 | ||
46 | $request->getSession()->set('_locale', $config->getLanguage()); | |
47 | ||
48 | // switch active theme | |
49 | $activeTheme = $this->get('liip_theme.active_theme'); | |
50 | $activeTheme->setName($config->getTheme()); | |
51 | ||
52 | $this->addFlash( | |
53 | 'notice', | |
54 | 'flashes.config.notice.config_saved' | |
55 | ); | |
56 | ||
57 | return $this->redirect($this->generateUrl('config')); | |
58 | } | |
59 | ||
60 | // handle changing password | |
61 | $pwdForm = $this->createForm(ChangePasswordType::class, null, ['action' => $this->generateUrl('config') . '#set4']); | |
62 | $pwdForm->handleRequest($request); | |
63 | ||
64 | if ($pwdForm->isSubmitted() && $pwdForm->isValid()) { | |
65 | if ($this->get('craue_config')->get('demo_mode_enabled') && $this->get('craue_config')->get('demo_mode_username') === $user->getUsername()) { | |
66 | $message = 'flashes.config.notice.password_not_updated_demo'; | |
67 | } else { | |
68 | $message = 'flashes.config.notice.password_updated'; | |
69 | ||
70 | $user->setPlainPassword($pwdForm->get('new_password')->getData()); | |
71 | $userManager->updateUser($user, true); | |
72 | } | |
73 | ||
74 | $this->addFlash('notice', $message); | |
75 | ||
76 | return $this->redirect($this->generateUrl('config') . '#set4'); | |
77 | } | |
78 | ||
79 | // handle changing user information | |
80 | $userForm = $this->createForm(UserInformationType::class, $user, [ | |
81 | 'validation_groups' => ['Profile'], | |
82 | 'action' => $this->generateUrl('config') . '#set3', | |
83 | ]); | |
84 | $userForm->handleRequest($request); | |
85 | ||
86 | if ($userForm->isSubmitted() && $userForm->isValid()) { | |
87 | $userManager->updateUser($user, true); | |
88 | ||
89 | $this->addFlash( | |
90 | 'notice', | |
91 | 'flashes.config.notice.user_updated' | |
92 | ); | |
93 | ||
94 | return $this->redirect($this->generateUrl('config') . '#set3'); | |
95 | } | |
96 | ||
97 | // handle feed information | |
98 | $feedForm = $this->createForm(FeedType::class, $config, ['action' => $this->generateUrl('config') . '#set2']); | |
99 | $feedForm->handleRequest($request); | |
100 | ||
101 | if ($feedForm->isSubmitted() && $feedForm->isValid()) { | |
102 | $em->persist($config); | |
103 | $em->flush(); | |
104 | ||
105 | $this->addFlash( | |
106 | 'notice', | |
107 | 'flashes.config.notice.feed_updated' | |
108 | ); | |
109 | ||
110 | return $this->redirect($this->generateUrl('config') . '#set2'); | |
111 | } | |
112 | ||
113 | // handle tagging rule | |
114 | $taggingRule = new TaggingRule(); | |
115 | $action = $this->generateUrl('config') . '#set5'; | |
116 | ||
117 | if ($request->query->has('tagging-rule')) { | |
118 | $taggingRule = $this->getDoctrine() | |
119 | ->getRepository('WallabagCoreBundle:TaggingRule') | |
120 | ->find($request->query->get('tagging-rule')); | |
121 | ||
122 | if ($this->getUser()->getId() !== $taggingRule->getConfig()->getUser()->getId()) { | |
123 | return $this->redirect($action); | |
124 | } | |
125 | ||
126 | $action = $this->generateUrl('config') . '?tagging-rule=' . $taggingRule->getId() . '#set5'; | |
127 | } | |
128 | ||
129 | $newTaggingRule = $this->createForm(TaggingRuleType::class, $taggingRule, ['action' => $action]); | |
130 | $newTaggingRule->handleRequest($request); | |
131 | ||
132 | if ($newTaggingRule->isSubmitted() && $newTaggingRule->isValid()) { | |
133 | $taggingRule->setConfig($config); | |
134 | $em->persist($taggingRule); | |
135 | $em->flush(); | |
136 | ||
137 | $this->addFlash( | |
138 | 'notice', | |
139 | 'flashes.config.notice.tagging_rules_updated' | |
140 | ); | |
141 | ||
142 | return $this->redirect($this->generateUrl('config') . '#set5'); | |
143 | } | |
144 | ||
145 | // handle tagging rules import | |
146 | $taggingRulesImportform = $this->createForm(TaggingRuleImportType::class); | |
147 | $taggingRulesImportform->handleRequest($request); | |
148 | ||
149 | if ($taggingRulesImportform->isSubmitted() && $taggingRulesImportform->isValid()) { | |
150 | $message = 'flashes.config.notice.tagging_rules_not_imported'; | |
151 | $file = $taggingRulesImportform->get('file')->getData(); | |
152 | ||
153 | if (null !== $file && $file->isValid() && \in_array($file->getClientMimeType(), ['application/json', 'application/octet-stream'], true)) { | |
154 | $content = json_decode(file_get_contents($file->getPathname()), true); | |
155 | ||
156 | if (\is_array($content)) { | |
157 | foreach ($content as $rule) { | |
158 | $taggingRule = new TaggingRule(); | |
159 | $taggingRule->setRule($rule['rule']); | |
160 | $taggingRule->setTags($rule['tags']); | |
161 | $taggingRule->setConfig($config); | |
162 | $em->persist($taggingRule); | |
163 | } | |
164 | ||
165 | $em->flush(); | |
166 | ||
167 | $message = 'flashes.config.notice.tagging_rules_imported'; | |
168 | } | |
169 | } | |
170 | ||
171 | $this->addFlash('notice', $message); | |
172 | ||
173 | return $this->redirect($this->generateUrl('config') . '#set5'); | |
174 | } | |
175 | ||
176 | return $this->render('WallabagCoreBundle:Config:index.html.twig', [ | |
177 | 'form' => [ | |
178 | 'config' => $configForm->createView(), | |
179 | 'feed' => $feedForm->createView(), | |
180 | 'pwd' => $pwdForm->createView(), | |
181 | 'user' => $userForm->createView(), | |
182 | 'new_tagging_rule' => $newTaggingRule->createView(), | |
183 | 'import_tagging_rule' => $taggingRulesImportform->createView(), | |
184 | ], | |
185 | 'feed' => [ | |
186 | 'username' => $user->getUsername(), | |
187 | 'token' => $config->getFeedToken(), | |
188 | ], | |
189 | 'twofactor_auth' => $this->getParameter('twofactor_auth'), | |
190 | 'wallabag_url' => $this->getParameter('domain_name'), | |
191 | 'enabled_users' => $this->get('wallabag_user.user_repository')->getSumEnabledUsers(), | |
192 | ]); | |
193 | } | |
194 | ||
195 | /** | |
196 | * Disable 2FA using email. | |
197 | * | |
198 | * @Route("/config/otp/email/disable", name="disable_otp_email") | |
199 | */ | |
200 | public function disableOtpEmailAction() | |
201 | { | |
202 | if (!$this->getParameter('twofactor_auth')) { | |
203 | return $this->createNotFoundException('two_factor not enabled'); | |
204 | } | |
205 | ||
206 | $user = $this->getUser(); | |
207 | $user->setEmailTwoFactor(false); | |
208 | ||
209 | $this->container->get('fos_user.user_manager')->updateUser($user, true); | |
210 | ||
211 | $this->addFlash( | |
212 | 'notice', | |
213 | 'flashes.config.notice.otp_disabled' | |
214 | ); | |
215 | ||
216 | return $this->redirect($this->generateUrl('config') . '#set3'); | |
217 | } | |
218 | ||
219 | /** | |
220 | * Enable 2FA using email. | |
221 | * | |
222 | * @Route("/config/otp/email", name="config_otp_email") | |
223 | */ | |
224 | public function otpEmailAction() | |
225 | { | |
226 | if (!$this->getParameter('twofactor_auth')) { | |
227 | return $this->createNotFoundException('two_factor not enabled'); | |
228 | } | |
229 | ||
230 | $user = $this->getUser(); | |
231 | ||
232 | $user->setGoogleAuthenticatorSecret(null); | |
233 | $user->setBackupCodes(null); | |
234 | $user->setEmailTwoFactor(true); | |
235 | ||
236 | $this->container->get('fos_user.user_manager')->updateUser($user, true); | |
237 | ||
238 | $this->addFlash( | |
239 | 'notice', | |
240 | 'flashes.config.notice.otp_enabled' | |
241 | ); | |
242 | ||
243 | return $this->redirect($this->generateUrl('config') . '#set3'); | |
244 | } | |
245 | ||
246 | /** | |
247 | * Disable 2FA using OTP app. | |
248 | * | |
249 | * @Route("/config/otp/app/disable", name="disable_otp_app") | |
250 | */ | |
251 | public function disableOtpAppAction() | |
252 | { | |
253 | if (!$this->getParameter('twofactor_auth')) { | |
254 | return $this->createNotFoundException('two_factor not enabled'); | |
255 | } | |
256 | ||
257 | $user = $this->getUser(); | |
258 | ||
259 | $user->setGoogleAuthenticatorSecret(''); | |
260 | $user->setBackupCodes(null); | |
261 | ||
262 | $this->container->get('fos_user.user_manager')->updateUser($user, true); | |
263 | ||
264 | $this->addFlash( | |
265 | 'notice', | |
266 | 'flashes.config.notice.otp_disabled' | |
267 | ); | |
268 | ||
269 | return $this->redirect($this->generateUrl('config') . '#set3'); | |
270 | } | |
271 | ||
272 | /** | |
273 | * Enable 2FA using OTP app, user will need to confirm the generated code from the app. | |
274 | * | |
275 | * @Route("/config/otp/app", name="config_otp_app") | |
276 | */ | |
277 | public function otpAppAction() | |
278 | { | |
279 | if (!$this->getParameter('twofactor_auth')) { | |
280 | return $this->createNotFoundException('two_factor not enabled'); | |
281 | } | |
282 | ||
283 | $user = $this->getUser(); | |
284 | $secret = $this->get('scheb_two_factor.security.google_authenticator')->generateSecret(); | |
285 | ||
286 | $user->setGoogleAuthenticatorSecret($secret); | |
287 | $user->setEmailTwoFactor(false); | |
288 | ||
289 | $backupCodes = (new BackupCodes())->toArray(); | |
290 | $backupCodesHashed = array_map( | |
291 | function ($backupCode) { | |
292 | return password_hash($backupCode, PASSWORD_DEFAULT); | |
293 | }, | |
294 | $backupCodes | |
295 | ); | |
296 | ||
297 | $user->setBackupCodes($backupCodesHashed); | |
298 | ||
299 | $this->container->get('fos_user.user_manager')->updateUser($user, true); | |
300 | ||
301 | $this->addFlash( | |
302 | 'notice', | |
303 | 'flashes.config.notice.otp_enabled' | |
304 | ); | |
305 | ||
306 | return $this->render('WallabagCoreBundle:Config:otp_app.html.twig', [ | |
307 | 'backupCodes' => $backupCodes, | |
308 | 'qr_code' => $this->get('scheb_two_factor.security.google_authenticator')->getQRContent($user), | |
309 | ]); | |
310 | } | |
311 | ||
312 | /** | |
313 | * Cancelling 2FA using OTP app. | |
314 | * | |
315 | * @Route("/config/otp/app/cancel", name="config_otp_app_cancel") | |
316 | */ | |
317 | public function otpAppCancelAction() | |
318 | { | |
319 | if (!$this->getParameter('twofactor_auth')) { | |
320 | return $this->createNotFoundException('two_factor not enabled'); | |
321 | } | |
322 | ||
323 | $user = $this->getUser(); | |
324 | $user->setGoogleAuthenticatorSecret(null); | |
325 | $user->setBackupCodes(null); | |
326 | ||
327 | $this->container->get('fos_user.user_manager')->updateUser($user, true); | |
328 | ||
329 | return $this->redirect($this->generateUrl('config') . '#set3'); | |
330 | } | |
331 | ||
332 | /** | |
333 | * Validate OTP code. | |
334 | * | |
335 | * @Route("/config/otp/app/check", name="config_otp_app_check") | |
336 | */ | |
337 | public function otpAppCheckAction(Request $request) | |
338 | { | |
339 | $isValid = $this->get('scheb_two_factor.security.google_authenticator')->checkCode( | |
340 | $this->getUser(), | |
341 | $request->get('_auth_code') | |
342 | ); | |
343 | ||
344 | if (true === $isValid) { | |
345 | $this->addFlash( | |
346 | 'notice', | |
347 | 'flashes.config.notice.otp_enabled' | |
348 | ); | |
349 | ||
350 | return $this->redirect($this->generateUrl('config') . '#set3'); | |
351 | } | |
352 | ||
353 | $this->addFlash( | |
354 | 'two_factor', | |
355 | 'scheb_two_factor.code_invalid' | |
356 | ); | |
357 | ||
358 | return $this->redirect($this->generateUrl('config_otp_app')); | |
359 | } | |
360 | ||
361 | /** | |
362 | * @Route("/generate-token", name="generate_token") | |
363 | * | |
364 | * @return RedirectResponse|JsonResponse | |
365 | */ | |
366 | public function generateTokenAction(Request $request) | |
367 | { | |
368 | $config = $this->getConfig(); | |
369 | $config->setFeedToken(Utils::generateToken()); | |
370 | ||
371 | $em = $this->getDoctrine()->getManager(); | |
372 | $em->persist($config); | |
373 | $em->flush(); | |
374 | ||
375 | if ($request->isXmlHttpRequest()) { | |
376 | return new JsonResponse(['token' => $config->getFeedToken()]); | |
377 | } | |
378 | ||
379 | $this->addFlash( | |
380 | 'notice', | |
381 | 'flashes.config.notice.feed_token_updated' | |
382 | ); | |
383 | ||
384 | return $this->redirect($this->generateUrl('config') . '#set2'); | |
385 | } | |
386 | ||
387 | /** | |
388 | * @Route("/revoke-token", name="revoke_token") | |
389 | * | |
390 | * @return RedirectResponse|JsonResponse | |
391 | */ | |
392 | public function revokeTokenAction(Request $request) | |
393 | { | |
394 | $config = $this->getConfig(); | |
395 | $config->setFeedToken(null); | |
396 | ||
397 | $em = $this->getDoctrine()->getManager(); | |
398 | $em->persist($config); | |
399 | $em->flush(); | |
400 | ||
401 | if ($request->isXmlHttpRequest()) { | |
402 | return new JsonResponse(); | |
403 | } | |
404 | ||
405 | $this->addFlash( | |
406 | 'notice', | |
407 | 'flashes.config.notice.feed_token_revoked' | |
408 | ); | |
409 | ||
410 | return $this->redirect($this->generateUrl('config') . '#set2'); | |
411 | } | |
412 | ||
413 | /** | |
414 | * Deletes a tagging rule and redirect to the config homepage. | |
415 | * | |
416 | * @Route("/tagging-rule/delete/{id}", requirements={"id" = "\d+"}, name="delete_tagging_rule") | |
417 | * | |
418 | * @return RedirectResponse | |
419 | */ | |
420 | public function deleteTaggingRuleAction(TaggingRule $rule) | |
421 | { | |
422 | $this->validateRuleAction($rule); | |
423 | ||
424 | $em = $this->getDoctrine()->getManager(); | |
425 | $em->remove($rule); | |
426 | $em->flush(); | |
427 | ||
428 | $this->addFlash( | |
429 | 'notice', | |
430 | 'flashes.config.notice.tagging_rules_deleted' | |
431 | ); | |
432 | ||
433 | return $this->redirect($this->generateUrl('config') . '#set5'); | |
434 | } | |
435 | ||
436 | /** | |
437 | * Edit a tagging rule. | |
438 | * | |
439 | * @Route("/tagging-rule/edit/{id}", requirements={"id" = "\d+"}, name="edit_tagging_rule") | |
440 | * | |
441 | * @return RedirectResponse | |
442 | */ | |
443 | public function editTaggingRuleAction(TaggingRule $rule) | |
444 | { | |
445 | $this->validateRuleAction($rule); | |
446 | ||
447 | return $this->redirect($this->generateUrl('config') . '?tagging-rule=' . $rule->getId() . '#set5'); | |
448 | } | |
449 | ||
450 | /** | |
451 | * Remove all annotations OR tags OR entries for the current user. | |
452 | * | |
453 | * @Route("/reset/{type}", requirements={"id" = "annotations|tags|entries"}, name="config_reset") | |
454 | * | |
455 | * @return RedirectResponse | |
456 | */ | |
457 | public function resetAction($type) | |
458 | { | |
459 | switch ($type) { | |
460 | case 'annotations': | |
461 | $this->getDoctrine() | |
462 | ->getRepository('WallabagAnnotationBundle:Annotation') | |
463 | ->removeAllByUserId($this->getUser()->getId()); | |
464 | break; | |
465 | case 'tags': | |
466 | $this->removeAllTagsByUserId($this->getUser()->getId()); | |
467 | break; | |
468 | case 'entries': | |
469 | // SQLite doesn't care about cascading remove, so we need to manually remove associated stuff | |
470 | // otherwise they won't be removed ... | |
471 | if ($this->get('doctrine')->getConnection()->getDatabasePlatform() instanceof \Doctrine\DBAL\Platforms\SqlitePlatform) { | |
472 | $this->getDoctrine()->getRepository('WallabagAnnotationBundle:Annotation')->removeAllByUserId($this->getUser()->getId()); | |
473 | } | |
474 | ||
475 | // manually remove tags to avoid orphan tag | |
476 | $this->removeAllTagsByUserId($this->getUser()->getId()); | |
477 | ||
478 | $this->get('wallabag_core.entry_repository')->removeAllByUserId($this->getUser()->getId()); | |
479 | break; | |
480 | case 'archived': | |
481 | if ($this->get('doctrine')->getConnection()->getDatabasePlatform() instanceof \Doctrine\DBAL\Platforms\SqlitePlatform) { | |
482 | $this->removeAnnotationsForArchivedByUserId($this->getUser()->getId()); | |
483 | } | |
484 | ||
485 | // manually remove tags to avoid orphan tag | |
486 | $this->removeTagsForArchivedByUserId($this->getUser()->getId()); | |
487 | ||
488 | $this->get('wallabag_core.entry_repository')->removeArchivedByUserId($this->getUser()->getId()); | |
489 | break; | |
490 | } | |
491 | ||
492 | $this->addFlash( | |
493 | 'notice', | |
494 | 'flashes.config.notice.' . $type . '_reset' | |
495 | ); | |
496 | ||
497 | return $this->redirect($this->generateUrl('config') . '#set3'); | |
498 | } | |
499 | ||
500 | /** | |
501 | * Delete account for current user. | |
502 | * | |
503 | * @Route("/account/delete", name="delete_account") | |
504 | * | |
505 | * @throws AccessDeniedHttpException | |
506 | * | |
507 | * @return \Symfony\Component\HttpFoundation\RedirectResponse | |
508 | */ | |
509 | public function deleteAccountAction(Request $request) | |
510 | { | |
511 | $enabledUsers = $this->get('wallabag_user.user_repository') | |
512 | ->getSumEnabledUsers(); | |
513 | ||
514 | if ($enabledUsers <= 1) { | |
515 | throw new AccessDeniedHttpException(); | |
516 | } | |
517 | ||
518 | $user = $this->getUser(); | |
519 | ||
520 | // logout current user | |
521 | $this->get('security.token_storage')->setToken(null); | |
522 | $request->getSession()->invalidate(); | |
523 | ||
524 | $em = $this->get('fos_user.user_manager'); | |
525 | $em->deleteUser($user); | |
526 | ||
527 | return $this->redirect($this->generateUrl('fos_user_security_login')); | |
528 | } | |
529 | ||
530 | /** | |
531 | * Switch view mode for current user. | |
532 | * | |
533 | * @Route("/config/view-mode", name="switch_view_mode") | |
534 | * | |
535 | * @return \Symfony\Component\HttpFoundation\RedirectResponse | |
536 | */ | |
537 | public function changeViewModeAction(Request $request) | |
538 | { | |
539 | $user = $this->getUser(); | |
540 | $user->getConfig()->setListMode(!$user->getConfig()->getListMode()); | |
541 | ||
542 | $em = $this->getDoctrine()->getManager(); | |
543 | $em->persist($user); | |
544 | $em->flush(); | |
545 | ||
546 | return $this->redirect($request->headers->get('referer')); | |
547 | } | |
548 | ||
549 | /** | |
550 | * Change the locale for the current user. | |
551 | * | |
552 | * @param string $language | |
553 | * | |
554 | * @Route("/locale/{language}", name="changeLocale") | |
555 | * | |
556 | * @return \Symfony\Component\HttpFoundation\RedirectResponse | |
557 | */ | |
558 | public function setLocaleAction(Request $request, $language = null) | |
559 | { | |
560 | $errors = $this->get('validator')->validate($language, (new LocaleConstraint())); | |
561 | ||
562 | if (0 === \count($errors)) { | |
563 | $request->getSession()->set('_locale', $language); | |
564 | } | |
565 | ||
566 | return $this->redirect($request->headers->get('referer', $this->generateUrl('homepage'))); | |
567 | } | |
568 | ||
569 | /** | |
570 | * Export tagging rules for the logged in user. | |
571 | * | |
572 | * @Route("/tagging-rule/export", name="export_tagging_rule") | |
573 | * | |
574 | * @return Response | |
575 | */ | |
576 | public function exportTaggingRulesAction() | |
577 | { | |
578 | $data = SerializerBuilder::create()->build()->serialize( | |
579 | $this->getUser()->getConfig()->getTaggingRules(), | |
580 | 'json', | |
581 | SerializationContext::create()->setGroups(['export_tagging_rule']) | |
582 | ); | |
583 | ||
584 | return Response::create( | |
585 | $data, | |
586 | 200, | |
587 | [ | |
588 | 'Content-type' => 'application/json', | |
589 | 'Content-Disposition' => 'attachment; filename="tagging_rules_' . $this->getUser()->getUsername() . '.json"', | |
590 | 'Content-Transfer-Encoding' => 'UTF-8', | |
591 | ] | |
592 | ); | |
593 | } | |
594 | ||
595 | /** | |
596 | * Remove all tags for given tags and a given user and cleanup orphan tags. | |
597 | * | |
598 | * @param array $tags | |
599 | * @param int $userId | |
600 | */ | |
601 | private function removeAllTagsByStatusAndUserId($tags, $userId) | |
602 | { | |
603 | if (empty($tags)) { | |
604 | return; | |
605 | } | |
606 | ||
607 | $this->get('wallabag_core.entry_repository') | |
608 | ->removeTags($userId, $tags); | |
609 | ||
610 | // cleanup orphan tags | |
611 | $em = $this->getDoctrine()->getManager(); | |
612 | ||
613 | foreach ($tags as $tag) { | |
614 | if (0 === \count($tag->getEntries())) { | |
615 | $em->remove($tag); | |
616 | } | |
617 | } | |
618 | ||
619 | $em->flush(); | |
620 | } | |
621 | ||
622 | /** | |
623 | * Remove all tags for a given user and cleanup orphan tags. | |
624 | * | |
625 | * @param int $userId | |
626 | */ | |
627 | private function removeAllTagsByUserId($userId) | |
628 | { | |
629 | $tags = $this->get('wallabag_core.tag_repository')->findAllTags($userId); | |
630 | $this->removeAllTagsByStatusAndUserId($tags, $userId); | |
631 | } | |
632 | ||
633 | /** | |
634 | * Remove all tags for a given user and cleanup orphan tags. | |
635 | * | |
636 | * @param int $userId | |
637 | */ | |
638 | private function removeTagsForArchivedByUserId($userId) | |
639 | { | |
640 | $tags = $this->get('wallabag_core.tag_repository')->findForArchivedArticlesByUser($userId); | |
641 | $this->removeAllTagsByStatusAndUserId($tags, $userId); | |
642 | } | |
643 | ||
644 | private function removeAnnotationsForArchivedByUserId($userId) | |
645 | { | |
646 | $em = $this->getDoctrine()->getManager(); | |
647 | ||
648 | $archivedEntriesAnnotations = $this->getDoctrine() | |
649 | ->getRepository('WallabagAnnotationBundle:Annotation') | |
650 | ->findAllArchivedEntriesByUser($userId); | |
651 | ||
652 | foreach ($archivedEntriesAnnotations as $archivedEntriesAnnotation) { | |
653 | $em->remove($archivedEntriesAnnotation); | |
654 | } | |
655 | ||
656 | $em->flush(); | |
657 | } | |
658 | ||
659 | /** | |
660 | * Validate that a rule can be edited/deleted by the current user. | |
661 | */ | |
662 | private function validateRuleAction(TaggingRule $rule) | |
663 | { | |
664 | if ($this->getUser()->getId() !== $rule->getConfig()->getUser()->getId()) { | |
665 | throw $this->createAccessDeniedException('You can not access this tagging rule.'); | |
666 | } | |
667 | } | |
668 | ||
669 | /** | |
670 | * Retrieve config for the current user. | |
671 | * If no config were found, create a new one. | |
672 | * | |
673 | * @return Config | |
674 | */ | |
675 | private function getConfig() | |
676 | { | |
677 | $config = $this->getDoctrine() | |
678 | ->getRepository('WallabagCoreBundle:Config') | |
679 | ->findOneByUser($this->getUser()); | |
680 | ||
681 | // should NEVER HAPPEN ... | |
682 | if (!$config) { | |
683 | $config = new Config($this->getUser()); | |
684 | } | |
685 | ||
686 | return $config; | |
687 | } | |
688 | } |