2023-02-23 16:40:53 +01:00
|
|
|
<?php
|
|
|
|
|
|
|
|
namespace App\Policies;
|
|
|
|
|
|
|
|
use App\Models\Group;
|
|
|
|
use App\Models\User;
|
|
|
|
use Illuminate\Auth\Access\HandlesAuthorization;
|
2023-03-07 15:17:07 +01:00
|
|
|
use Illuminate\Support\Facades\Log;
|
2023-02-23 16:40:53 +01:00
|
|
|
|
|
|
|
class GroupPolicy
|
|
|
|
{
|
|
|
|
use HandlesAuthorization, OwnershipTrait;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Determine whether the user can view any models.
|
|
|
|
*
|
|
|
|
* @param \App\Models\User $user
|
|
|
|
* @return \Illuminate\Auth\Access\Response|bool
|
|
|
|
*/
|
|
|
|
public function viewAny(User $user)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Determine whether the user can view the model.
|
|
|
|
*
|
|
|
|
* @param \App\Models\User $user
|
|
|
|
* @param \App\Models\Group $group
|
|
|
|
* @return \Illuminate\Auth\Access\Response|bool
|
|
|
|
*/
|
|
|
|
public function view(User $user, Group $group)
|
|
|
|
{
|
2023-03-07 15:17:07 +01:00
|
|
|
$can = $this->isOwnerOf($user, $group);
|
|
|
|
|
|
|
|
if (! $can) {
|
|
|
|
Log::notice(sprintf('User ID #%s cannot view group %s (ID #%s)', $user->id, var_export($group->name, true), $group->id));
|
|
|
|
}
|
|
|
|
|
|
|
|
return $can;
|
2023-02-23 16:40:53 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Determine whether the user can view all provided models.
|
|
|
|
*
|
|
|
|
* @param \App\Models\User $user
|
|
|
|
* @param \App\Models\Group $group
|
|
|
|
* @param \Illuminate\Support\Collection<int, \App\Models\Group> $groups
|
|
|
|
* @return \Illuminate\Auth\Access\Response|bool
|
|
|
|
*/
|
|
|
|
public function viewEach(User $user, Group $group, $groups)
|
|
|
|
{
|
2023-03-07 15:17:07 +01:00
|
|
|
$can = $this->isOwnerOfEach($user, $groups);
|
|
|
|
|
|
|
|
if (! $can) {
|
|
|
|
$ids = $groups->map(function ($group, $key) {
|
|
|
|
return $group->id;
|
|
|
|
});
|
|
|
|
Log::notice(sprintf('User ID #%s cannot view all groups in IDs #%s', $user->id, implode(',', $ids->toArray())));
|
|
|
|
}
|
|
|
|
|
|
|
|
return $can;
|
2023-02-23 16:40:53 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Determine whether the user can create models.
|
|
|
|
*
|
|
|
|
* @param \App\Models\User $user
|
|
|
|
* @return \Illuminate\Auth\Access\Response|bool
|
|
|
|
*/
|
|
|
|
public function create(User $user)
|
|
|
|
{
|
2023-03-07 15:17:07 +01:00
|
|
|
// Log::notice(sprintf('User ID #%s cannot create groups', $user->id));
|
|
|
|
|
2023-02-23 16:40:53 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Determine whether the user can update the model.
|
|
|
|
*
|
|
|
|
* @param \App\Models\User $user
|
|
|
|
* @param \App\Models\Group $group
|
|
|
|
* @return \Illuminate\Auth\Access\Response|bool
|
|
|
|
*/
|
|
|
|
public function update(User $user, Group $group)
|
|
|
|
{
|
2023-03-07 15:17:07 +01:00
|
|
|
$can = $this->isOwnerOf($user, $group);
|
|
|
|
|
|
|
|
if (! $can) {
|
|
|
|
Log::notice(sprintf('User ID #%s cannot update group %s (ID #%s)', $user->id, var_export($group->name, true), $group->id));
|
|
|
|
}
|
|
|
|
|
|
|
|
return $can;
|
2023-02-23 16:40:53 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Determine whether the user can update all provided models.
|
|
|
|
*
|
|
|
|
* @param \App\Models\User $user
|
|
|
|
* @param \App\Models\Group $group
|
|
|
|
* @param \Illuminate\Support\Collection<int, \App\Models\Group> $groups
|
|
|
|
* @return \Illuminate\Auth\Access\Response|bool
|
|
|
|
*/
|
|
|
|
public function updateEach(User $user, Group $group, $groups)
|
|
|
|
{
|
2023-03-07 15:17:07 +01:00
|
|
|
$can = $this->isOwnerOfEach($user, $groups);
|
|
|
|
|
|
|
|
if (! $can) {
|
|
|
|
$ids = $groups->map(function ($group, $key) {
|
|
|
|
return $group->id;
|
|
|
|
});
|
|
|
|
Log::notice(sprintf('User ID #%s cannot update all groups in IDs #%s', $user->id, implode(',', $ids->toArray())));
|
|
|
|
}
|
|
|
|
|
|
|
|
return $can;
|
2023-02-23 16:40:53 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Determine whether the user can delete the model.
|
|
|
|
*
|
|
|
|
* @param \App\Models\User $user
|
|
|
|
* @param \App\Models\Group $group
|
|
|
|
* @return \Illuminate\Auth\Access\Response|bool
|
|
|
|
*/
|
|
|
|
public function delete(User $user, Group $group)
|
|
|
|
{
|
2023-03-07 15:17:07 +01:00
|
|
|
$can = $this->isOwnerOf($user, $group);
|
|
|
|
|
|
|
|
if (! $can) {
|
|
|
|
Log::notice(sprintf('User ID #%s cannot delete group %s (ID #%s)', $user->id, var_export($group->name, true), $group->id));
|
|
|
|
}
|
|
|
|
|
|
|
|
return $can;
|
2023-02-23 16:40:53 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Determine whether the user can delete all provided models.
|
|
|
|
*
|
|
|
|
* @param \App\Models\User $user
|
|
|
|
* @param \App\Models\Group $group
|
|
|
|
* @param \Illuminate\Support\Collection<int, \App\Models\Group> $groups
|
|
|
|
* @return \Illuminate\Auth\Access\Response|bool
|
|
|
|
*/
|
|
|
|
public function deleteEach(User $user, Group $group, $groups)
|
|
|
|
{
|
2023-03-07 15:17:07 +01:00
|
|
|
$can = $this->isOwnerOfEach($user, $groups);
|
|
|
|
|
|
|
|
if (! $can) {
|
|
|
|
$ids = $groups->map(function ($group, $key) {
|
|
|
|
return $group->id;
|
|
|
|
});
|
|
|
|
Log::notice(sprintf('User ID #%s cannot delete all groups in IDs #%s', $user->id, implode(',', $ids->toArray())));
|
|
|
|
}
|
|
|
|
|
|
|
|
return $can;
|
2023-02-23 16:40:53 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Determine whether the user can restore the model.
|
|
|
|
*
|
|
|
|
* @param \App\Models\User $user
|
|
|
|
* @param \App\Models\Group $group
|
|
|
|
* @return \Illuminate\Auth\Access\Response|bool
|
|
|
|
*/
|
|
|
|
public function restore(User $user, Group $group)
|
|
|
|
{
|
|
|
|
return $this->isOwnerOf($user, $group);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Determine whether the user can permanently delete the model.
|
|
|
|
*
|
|
|
|
* @param \App\Models\User $user
|
|
|
|
* @param \App\Models\Group $group
|
|
|
|
* @return \Illuminate\Auth\Access\Response|bool
|
|
|
|
*/
|
|
|
|
public function forceDelete(User $user, Group $group)
|
|
|
|
{
|
|
|
|
return $this->isOwnerOf($user, $group);
|
|
|
|
}
|
|
|
|
}
|