mirror of
				https://github.com/pelican-dev/panel.git
				synced 2025-10-31 03:06:51 +01:00 
			
		
		
		
	 fc643f57f9
			
		
	
	
		fc643f57f9
		
			
		
	
	
	
	
		
			
			* add spatie/permissions * add policies * add role resource * add root admin role handling * replace some "root_admin" with function * add model specific permissions * make permission selection nicer * fix user creation * fix tests * add back subuser checks in server policy * add custom model for role * assign new users to role if root_admin is set * add api for roles * fix phpstan * add permissions for settings page * remove "restore" and "forceDelete" permissions * add user count to list * prevent deletion if role has users * update user list * fix server policy * remove old `root_admin` column * small refactor * fix tests * forgot can checks here * forgot use * disable editing own roles & disable assigning root admin * don't allow to rename root admin role * remove php bombing exception handler * fix role assignment when creating a user * fix disableOptionWhen * fix missing `root_admin` attribute on react frontend * add permission check for bulk delete * rename viewAny to viewList * improve canAccessPanel check * fix admin not displaying for non-root admins * make sure non root admins can't edit root admins * fix import * fix settings page permission check * fix server permissions for non-subusers * fix settings page permission check v2 * small cleanup * cleanup config file * move consts from resouce into enum & model * Update database/migrations/2024_08_01_114538_remove_root_admin_column.php Co-authored-by: Lance Pioch <lancepioch@gmail.com> * fix config * fix phpstan * fix phpstan 2.0 --------- Co-authored-by: Lance Pioch <lancepioch@gmail.com>
		
			
				
	
	
		
			82 lines
		
	
	
		
			3.0 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
			
		
		
	
	
			82 lines
		
	
	
		
			3.0 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
| <?php
 | |
| 
 | |
| namespace App\Http\Controllers\Api\Client;
 | |
| 
 | |
| use App\Models\Server;
 | |
| use App\Models\Permission;
 | |
| use Spatie\QueryBuilder\QueryBuilder;
 | |
| use Spatie\QueryBuilder\AllowedFilter;
 | |
| use App\Models\Filters\MultiFieldServerFilter;
 | |
| use App\Transformers\Api\Client\ServerTransformer;
 | |
| use App\Http\Requests\Api\Client\GetServersRequest;
 | |
| 
 | |
| class ClientController extends ClientApiController
 | |
| {
 | |
|     /**
 | |
|      * ClientController constructor.
 | |
|      */
 | |
|     public function __construct()
 | |
|     {
 | |
|         parent::__construct();
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Return all the servers available to the client making the API
 | |
|      * request, including servers the user has access to as a subuser.
 | |
|      */
 | |
|     public function index(GetServersRequest $request): array
 | |
|     {
 | |
|         $user = $request->user();
 | |
|         $transformer = $this->getTransformer(ServerTransformer::class);
 | |
| 
 | |
|         // Start the query builder and ensure we eager load any requested relationships from the request.
 | |
|         $builder = QueryBuilder::for(
 | |
|             Server::query()->with($this->getIncludesForTransformer($transformer, ['node']))
 | |
|         )->allowedFilters([
 | |
|             'uuid',
 | |
|             'name',
 | |
|             'description',
 | |
|             'external_id',
 | |
|             AllowedFilter::custom('*', new MultiFieldServerFilter()),
 | |
|         ]);
 | |
| 
 | |
|         $type = $request->input('type');
 | |
|         // Either return all the servers the user has access to because they are an admin `?type=admin` or
 | |
|         // just return all the servers the user has access to because they are the owner or a subuser of the
 | |
|         // server. If ?type=admin-all is passed all servers on the system will be returned to the user, rather
 | |
|         // than only servers they can see because they are an admin.
 | |
|         if (in_array($type, ['admin', 'admin-all'])) {
 | |
|             // If they aren't an admin but want all the admin servers don't fail the request, just
 | |
|             // make it a query that will never return any results back.
 | |
|             if (!$user->isRootAdmin()) {
 | |
|                 $builder->whereRaw('1 = 2');
 | |
|             } else {
 | |
|                 $builder = $type === 'admin-all'
 | |
|                     ? $builder
 | |
|                     : $builder->whereNotIn('servers.id', $user->accessibleServers()->pluck('id')->all());
 | |
|             }
 | |
|         } elseif ($type === 'owner') {
 | |
|             $builder = $builder->where('servers.owner_id', $user->id);
 | |
|         } else {
 | |
|             $builder = $builder->whereIn('servers.id', $user->accessibleServers()->pluck('id')->all());
 | |
|         }
 | |
| 
 | |
|         $servers = $builder->paginate(min($request->query('per_page', '50'), 100))->appends($request->query());
 | |
| 
 | |
|         return $this->fractal->transformWith($transformer)->collection($servers)->toArray();
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Returns all the subuser permissions available on the system.
 | |
|      */
 | |
|     public function permissions(): array
 | |
|     {
 | |
|         return [
 | |
|             'object' => 'system_permissions',
 | |
|             'attributes' => [
 | |
|                 'permissions' => Permission::permissions(),
 | |
|             ],
 | |
|         ];
 | |
|     }
 | |
| }
 |