mirror of
https://github.com/snipe/snipe-it.git
synced 2024-11-13 17:14:10 -08:00
cd8c585377
* Make delete routes work. We put a little form in the modal that spoofs the delete field. * Fix route on creating a user. * Fix redundant id parameter. * Port acceptance tests to new urls. * Initial work on migrating to model based policies instead of global gates. Will allow for much more detailed permissions bits in the future. * This needs to stay for the dashboard checks. * Add user states for permissions to build tests. * Build up unit tests for gates/permissions. Move accessories/consumables/assets to policies instead of in authserviceprovider * Migrate various locations to new syntax. Update test to be more specific * Fix functional tests. Add an artisan command for installing a settings setup on travis-ci * Try a different id... Need to come up with a better way of passing the id for tests that need an existing one. * Try to fix travis * Update urls to use routes and not hardcode old paths. Also fix some migration errors found along the way.: * Add a environment for travis functional tests. * Adjust config file to make travis use it. * Use redirect()->route instead of redirect()-to * Dump all failures in the output directory if travis fails. * Cleanups and minor fixes. * Adjust the supplier modelfactory to comply with new validation restrictions. * Some test fixes. * Locales can be longer than 5 characters according to faker... fex gez_ET. Increase lenght in mysql and add a validation * Update test database dump to latest migrations.
91 lines
2.1 KiB
PHP
91 lines
2.1 KiB
PHP
<?php
|
|
|
|
namespace App\Policies;
|
|
|
|
use App\Models\Company;
|
|
use App\Models\User;
|
|
use Illuminate\Auth\Access\HandlesAuthorization;
|
|
use Illuminate\Support\Facades\Auth;
|
|
|
|
class UserPolicy
|
|
{
|
|
use HandlesAuthorization;
|
|
|
|
|
|
public function before(User $user, $ability, $targetUser)
|
|
{
|
|
// Lets move all company related checks here.
|
|
if ($targetUser instanceof \App\Models\User && !Company::isCurrentUserHasAccess($targetUser)) {
|
|
return false;
|
|
}
|
|
// If an admin, they can do all asset related tasks.
|
|
if ($user->hasAccess('admin')) {
|
|
return true;
|
|
}
|
|
}
|
|
/**
|
|
* Determine whether the user can view the targetUser.
|
|
*
|
|
* @param \App\User $user
|
|
* @param \App\Consumable $targetUser
|
|
* @return mixed
|
|
*/
|
|
public function view(User $user, User $targetUser = null)
|
|
{
|
|
//
|
|
return $user->hasAccess('users.view');
|
|
}
|
|
|
|
/**
|
|
* Determine whether the user can create users.
|
|
*
|
|
* @param \App\User $user
|
|
* @return mixed
|
|
*/
|
|
public function create(User $user)
|
|
{
|
|
//
|
|
return $user->hasAccess('users.create');
|
|
}
|
|
|
|
/**
|
|
* Determine whether the user can update the targetUser.
|
|
*
|
|
* @param \App\User $user
|
|
* @param \App\User $targetUser
|
|
* @return mixed
|
|
*/
|
|
public function update(User $user, User $targetUser = null)
|
|
{
|
|
//
|
|
return $user->hasAccess('users.edit');
|
|
}
|
|
|
|
/**
|
|
* Determine whether the user can delete the targetUser.
|
|
*
|
|
* @param \App\User $user
|
|
* @param \App\User $targetUser
|
|
* @return mixed
|
|
*/
|
|
public function delete(User $user, User $targetUser = null)
|
|
{
|
|
if($targetUser) {
|
|
//We can't delete ourselves.
|
|
if ($user->id == $targetUser->id) {
|
|
return false;
|
|
}
|
|
|
|
if ((!Auth::user()->isSuperUser()) || (config('app.lock_passwords'))) {
|
|
return false;
|
|
}
|
|
}
|
|
return $user->hasAccess('users.delete');
|
|
}
|
|
|
|
public function index(User $user)
|
|
{
|
|
return $user->hasAccess('users.view');
|
|
}
|
|
}
|