2017-10-27 18:01:11 -07:00
|
|
|
<?php
|
2021-06-10 13:15:52 -07:00
|
|
|
|
2017-10-27 18:01:11 -07:00
|
|
|
namespace App\Policies;
|
|
|
|
|
|
|
|
use App\Models\Company;
|
|
|
|
use App\Models\User;
|
|
|
|
use Illuminate\Auth\Access\HandlesAuthorization;
|
|
|
|
|
2017-12-07 21:00:09 -08:00
|
|
|
/**
|
|
|
|
* SnipePermissionsPolicy provides methods for handling the granular permissions used throughout Snipe-IT.
|
|
|
|
* Each "area" of a permission (which is usually a model, like Assets, Departments, etc), has a setting
|
|
|
|
* in config/permissions.php like view/create/edit/delete (and sometimes some extra stuff like
|
|
|
|
* checkout/checkin, etc.)
|
|
|
|
*
|
|
|
|
* A Policy should exist for each of these models, however if they only use the standard view/create/edit/delete,
|
|
|
|
* the policy can be pretty simple, for example with just one method setting the column name:
|
|
|
|
*
|
|
|
|
* protected function columnName()
|
|
|
|
* {
|
|
|
|
* return 'manufacturers';
|
|
|
|
* }
|
|
|
|
*/
|
2017-10-27 18:01:11 -07:00
|
|
|
abstract class SnipePermissionsPolicy
|
|
|
|
{
|
2017-12-07 21:00:09 -08:00
|
|
|
/**
|
|
|
|
* This should return the key of the model in the users json permission string.
|
|
|
|
*
|
2021-06-10 13:15:52 -07:00
|
|
|
* @return bool
|
2017-12-07 21:00:09 -08:00
|
|
|
*/
|
|
|
|
|
|
|
|
//
|
2017-10-27 18:01:11 -07:00
|
|
|
abstract protected function columnName();
|
|
|
|
|
2021-06-10 13:15:52 -07:00
|
|
|
use HandlesAuthorization;
|
2017-10-27 18:01:11 -07:00
|
|
|
|
|
|
|
public function before(User $user, $ability, $item)
|
|
|
|
{
|
2024-04-11 06:39:37 -07:00
|
|
|
/**
|
|
|
|
* If an admin, they can do all asset related tasks, but constrained by FMCSA company access.
|
|
|
|
* That scoping happens on the model level (except for the Users model) via the Companyable trait.
|
|
|
|
*
|
|
|
|
* This does lead to some inconsistencies in the responses, since attempting to edit assets,
|
|
|
|
* accessories, etc (anything other than users) will result in a Forbidden error, whereas the users
|
|
|
|
* area will redirect with "That user doesn't exist" since the scoping is handled directly on those queries.
|
|
|
|
*
|
|
|
|
* The *superuser* global permission gets handled in the AuthServiceProvider before() method.
|
|
|
|
*
|
|
|
|
* @see https://snipe-it.readme.io/docs/permissions
|
|
|
|
*/
|
|
|
|
|
2017-10-27 18:01:11 -07:00
|
|
|
if ($user->hasAccess('admin')) {
|
|
|
|
return true;
|
|
|
|
}
|
2024-04-11 06:39:37 -07:00
|
|
|
|
|
|
|
/**
|
|
|
|
* The Company::isCurrentUserHasAccess() method from the company model handles the check for FMCS already so we
|
|
|
|
* don't have to do that here.
|
|
|
|
*/
|
|
|
|
if (!Company::isCurrentUserHasAccess($item)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2017-10-27 18:01:11 -07:00
|
|
|
}
|
|
|
|
|
2024-04-11 06:39:37 -07:00
|
|
|
|
|
|
|
/**
|
|
|
|
* These methods handle the generic view/create/edit/delete permissions for the model.
|
|
|
|
*
|
|
|
|
* @param User $user
|
|
|
|
* @return bool
|
|
|
|
*/
|
2017-10-27 18:01:11 -07:00
|
|
|
public function index(User $user)
|
|
|
|
{
|
|
|
|
return $user->hasAccess($this->columnName().'.view');
|
|
|
|
}
|
2021-06-10 13:15:52 -07:00
|
|
|
|
2017-10-27 18:01:11 -07:00
|
|
|
/**
|
|
|
|
* Determine whether the user can view the accessory.
|
|
|
|
*
|
2019-03-18 11:58:08 -07:00
|
|
|
* @param \App\Models\User $user
|
2017-10-27 18:01:11 -07:00
|
|
|
* @return mixed
|
|
|
|
*/
|
|
|
|
public function view(User $user, $item = null)
|
|
|
|
{
|
|
|
|
return $user->hasAccess($this->columnName().'.view');
|
|
|
|
}
|
|
|
|
|
2022-09-16 14:00:27 -07:00
|
|
|
public function files(User $user, $item = null)
|
|
|
|
{
|
|
|
|
return $user->hasAccess($this->columnName().'.files');
|
|
|
|
}
|
|
|
|
|
2017-10-27 18:01:11 -07:00
|
|
|
/**
|
|
|
|
* Determine whether the user can create accessories.
|
|
|
|
*
|
2019-03-18 11:58:08 -07:00
|
|
|
* @param \App\Models\User $user
|
2017-10-27 18:01:11 -07:00
|
|
|
* @return mixed
|
|
|
|
*/
|
|
|
|
public function create(User $user)
|
|
|
|
{
|
|
|
|
return $user->hasAccess($this->columnName().'.create');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Determine whether the user can update the accessory.
|
|
|
|
*
|
2019-03-18 11:58:08 -07:00
|
|
|
* @param \App\Models\User $user
|
2017-10-27 18:01:11 -07:00
|
|
|
* @return mixed
|
|
|
|
*/
|
|
|
|
public function update(User $user, $item = null)
|
|
|
|
{
|
|
|
|
return $user->hasAccess($this->columnName().'.edit');
|
|
|
|
}
|
|
|
|
|
2022-05-11 19:02:23 -07:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Determine whether the user can update the accessory.
|
|
|
|
*
|
|
|
|
* @param \App\Models\User $user
|
|
|
|
* @return mixed
|
|
|
|
*/
|
|
|
|
public function checkout(User $user, $item = null)
|
|
|
|
{
|
|
|
|
return $user->hasAccess($this->columnName().'.checkout');
|
|
|
|
}
|
|
|
|
|
2017-10-27 18:01:11 -07:00
|
|
|
/**
|
|
|
|
* Determine whether the user can delete the accessory.
|
|
|
|
*
|
2019-03-18 11:58:08 -07:00
|
|
|
* @param \App\Models\User $user
|
2017-10-27 18:01:11 -07:00
|
|
|
* @return mixed
|
|
|
|
*/
|
|
|
|
public function delete(User $user, $item = null)
|
|
|
|
{
|
2020-05-23 10:36:02 -07:00
|
|
|
$itemConditional = true;
|
|
|
|
if ($item) {
|
2021-06-10 13:15:52 -07:00
|
|
|
$itemConditional = empty($item->deleted_at);
|
2020-05-23 10:36:02 -07:00
|
|
|
}
|
2021-06-10 13:15:52 -07:00
|
|
|
|
2020-05-23 10:36:02 -07:00
|
|
|
return $itemConditional && $user->hasAccess($this->columnName().'.delete');
|
2017-10-27 18:01:11 -07:00
|
|
|
}
|
|
|
|
|
2021-06-10 13:15:52 -07:00
|
|
|
/**
|
2017-10-27 18:01:11 -07:00
|
|
|
* Determine whether the user can manage the accessory.
|
|
|
|
*
|
2019-03-18 11:58:08 -07:00
|
|
|
* @param \App\Models\User $user
|
2017-10-27 18:01:11 -07:00
|
|
|
* @return mixed
|
|
|
|
*/
|
|
|
|
public function manage(User $user, $item = null)
|
|
|
|
{
|
|
|
|
return $user->hasAccess($this->columnName().'.edit');
|
|
|
|
}
|
|
|
|
}
|