2FAuth/app/Policies/GroupPolicy.php
2023-03-26 17:13:32 +02:00

171 lines
4.7 KiB
PHP

<?php
namespace App\Policies;
use App\Models\Group;
use App\Models\User;
use Illuminate\Auth\Access\HandlesAuthorization;
use Illuminate\Support\Facades\Log;
class GroupPolicy
{
use HandlesAuthorization, OwnershipTrait;
/**
* Determine whether the user can view any models.
*
* @return \Illuminate\Auth\Access\Response|bool
*/
// public function viewAny(User $user)
// {
// return false;
// }
/**
* Determine whether the user can view the model.
*
* @return \Illuminate\Auth\Access\Response|bool
*/
public function view(User $user, Group $group)
{
$can = $this->isOwnerOf($user, $group);
if (! $can) {
Log::notice(sprintf('User ID #%s cannot view group %s (ID #%s)', $user->id, var_export($group->name, true), $group->id));
}
return $can;
}
/**
* Determine whether the user can view all provided models.
*
* @param \App\Models\Group $group
* @param \Illuminate\Support\Collection<int, \App\Models\Group> $groups
* @return \Illuminate\Auth\Access\Response|bool
*/
// public function viewEach(User $user, Group $group, $groups)
// {
// $can = $this->isOwnerOfEach($user, $groups);
// if (! $can) {
// $ids = $groups->map(function ($group, $key) {
// return $group->id;
// });
// Log::notice(sprintf('User ID #%s cannot view all groups in IDs #%s', $user->id, implode(',', $ids->toArray())));
// }
// return $can;
// }
/**
* Determine whether the user can create models.
*
* @return \Illuminate\Auth\Access\Response|bool
*/
public function create(User $user)
{
// Log::notice(sprintf('User ID #%s cannot create groups', $user->id));
return true;
}
/**
* Determine whether the user can update the model.
*
* @return \Illuminate\Auth\Access\Response|bool
*/
public function update(User $user, Group $group)
{
$can = $this->isOwnerOf($user, $group);
if (! $can) {
Log::notice(sprintf('User ID #%s cannot update group %s (ID #%s)', $user->id, var_export($group->name, true), $group->id));
}
return $can;
}
/**
* Determine whether the user can update all provided models.
*
* @param \Illuminate\Support\Collection<int, \App\Models\Group> $groups
* @return \Illuminate\Auth\Access\Response|bool
*/
// public function updateEach(User $user, Group $group, $groups)
// {
// $can = $this->isOwnerOfEach($user, $groups);
// if (! $can) {
// $ids = $groups->map(function ($group, $key) {
// return $group->id;
// });
// Log::notice(sprintf('User ID #%s cannot update all groups in IDs #%s', $user->id, implode(',', $ids->toArray())));
// }
// return $can;
// }
/**
* Determine whether the user can delete the model.
*
* @return \Illuminate\Auth\Access\Response|bool
*/
public function delete(User $user, Group $group)
{
$can = $this->isOwnerOf($user, $group);
if (! $can) {
Log::notice(sprintf('User ID #%s cannot delete group %s (ID #%s)', $user->id, var_export($group->name, true), $group->id));
}
return $can;
}
/**
* Determine whether the user can delete all provided models.
*
* @param \App\Models\User $user
* @param \App\Models\Group $group
* @param \Illuminate\Support\Collection<int, \App\Models\Group> $groups
* @return \Illuminate\Auth\Access\Response|bool
*/
// public function deleteEach(User $user, Group $group, $groups)
// {
// $can = $this->isOwnerOfEach($user, $groups);
// if (! $can) {
// $ids = $groups->map(function ($group, $key) {
// return $group->id;
// });
// Log::notice(sprintf('User ID #%s cannot delete all groups in IDs #%s', $user->id, implode(',', $ids->toArray())));
// }
// return $can;
// }
/**
* Determine whether the user can restore the model.
*
* @param \App\Models\User $user
* @param \App\Models\Group $group
* @return \Illuminate\Auth\Access\Response|bool
*/
// public function restore(User $user, Group $group)
// {
// }
/**
* Determine whether the user can permanently delete the model.
*
* @param \App\Models\User $user
* @param \App\Models\Group $group
* @return \Illuminate\Auth\Access\Response|bool
*/
// public function forceDelete(User $user, Group $group)
// {
// }
}