mirror of
				https://github.com/pelican-dev/panel.git
				synced 2025-11-04 14:56:51 +01:00 
			
		
		
		
	* add spatie/permissions * add policies * add role resource * add root admin role handling * replace some "root_admin" with function * add model specific permissions * make permission selection nicer * fix user creation * fix tests * add back subuser checks in server policy * add custom model for role * assign new users to role if root_admin is set * add api for roles * fix phpstan * add permissions for settings page * remove "restore" and "forceDelete" permissions * add user count to list * prevent deletion if role has users * update user list * fix server policy * remove old `root_admin` column * small refactor * fix tests * forgot can checks here * forgot use * disable editing own roles & disable assigning root admin * don't allow to rename root admin role * remove php bombing exception handler * fix role assignment when creating a user * fix disableOptionWhen * fix missing `root_admin` attribute on react frontend * add permission check for bulk delete * rename viewAny to viewList * improve canAccessPanel check * fix admin not displaying for non-root admins * make sure non root admins can't edit root admins * fix import * fix settings page permission check * fix server permissions for non-subusers * fix settings page permission check v2 * small cleanup * cleanup config file * move consts from resouce into enum & model * Update database/migrations/2024_08_01_114538_remove_root_admin_column.php Co-authored-by: Lance Pioch <lancepioch@gmail.com> * fix config * fix phpstan * fix phpstan 2.0 --------- Co-authored-by: Lance Pioch <lancepioch@gmail.com>
		
			
				
	
	
		
			82 lines
		
	
	
		
			3.0 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
			
		
		
	
	
			82 lines
		
	
	
		
			3.0 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
<?php
 | 
						|
 | 
						|
namespace App\Http\Controllers\Api\Client;
 | 
						|
 | 
						|
use App\Models\Server;
 | 
						|
use App\Models\Permission;
 | 
						|
use Spatie\QueryBuilder\QueryBuilder;
 | 
						|
use Spatie\QueryBuilder\AllowedFilter;
 | 
						|
use App\Models\Filters\MultiFieldServerFilter;
 | 
						|
use App\Transformers\Api\Client\ServerTransformer;
 | 
						|
use App\Http\Requests\Api\Client\GetServersRequest;
 | 
						|
 | 
						|
class ClientController extends ClientApiController
 | 
						|
{
 | 
						|
    /**
 | 
						|
     * ClientController constructor.
 | 
						|
     */
 | 
						|
    public function __construct()
 | 
						|
    {
 | 
						|
        parent::__construct();
 | 
						|
    }
 | 
						|
 | 
						|
    /**
 | 
						|
     * Return all the servers available to the client making the API
 | 
						|
     * request, including servers the user has access to as a subuser.
 | 
						|
     */
 | 
						|
    public function index(GetServersRequest $request): array
 | 
						|
    {
 | 
						|
        $user = $request->user();
 | 
						|
        $transformer = $this->getTransformer(ServerTransformer::class);
 | 
						|
 | 
						|
        // Start the query builder and ensure we eager load any requested relationships from the request.
 | 
						|
        $builder = QueryBuilder::for(
 | 
						|
            Server::query()->with($this->getIncludesForTransformer($transformer, ['node']))
 | 
						|
        )->allowedFilters([
 | 
						|
            'uuid',
 | 
						|
            'name',
 | 
						|
            'description',
 | 
						|
            'external_id',
 | 
						|
            AllowedFilter::custom('*', new MultiFieldServerFilter()),
 | 
						|
        ]);
 | 
						|
 | 
						|
        $type = $request->input('type');
 | 
						|
        // Either return all the servers the user has access to because they are an admin `?type=admin` or
 | 
						|
        // just return all the servers the user has access to because they are the owner or a subuser of the
 | 
						|
        // server. If ?type=admin-all is passed all servers on the system will be returned to the user, rather
 | 
						|
        // than only servers they can see because they are an admin.
 | 
						|
        if (in_array($type, ['admin', 'admin-all'])) {
 | 
						|
            // If they aren't an admin but want all the admin servers don't fail the request, just
 | 
						|
            // make it a query that will never return any results back.
 | 
						|
            if (!$user->isRootAdmin()) {
 | 
						|
                $builder->whereRaw('1 = 2');
 | 
						|
            } else {
 | 
						|
                $builder = $type === 'admin-all'
 | 
						|
                    ? $builder
 | 
						|
                    : $builder->whereNotIn('servers.id', $user->accessibleServers()->pluck('id')->all());
 | 
						|
            }
 | 
						|
        } elseif ($type === 'owner') {
 | 
						|
            $builder = $builder->where('servers.owner_id', $user->id);
 | 
						|
        } else {
 | 
						|
            $builder = $builder->whereIn('servers.id', $user->accessibleServers()->pluck('id')->all());
 | 
						|
        }
 | 
						|
 | 
						|
        $servers = $builder->paginate(min($request->query('per_page', '50'), 100))->appends($request->query());
 | 
						|
 | 
						|
        return $this->fractal->transformWith($transformer)->collection($servers)->toArray();
 | 
						|
    }
 | 
						|
 | 
						|
    /**
 | 
						|
     * Returns all the subuser permissions available on the system.
 | 
						|
     */
 | 
						|
    public function permissions(): array
 | 
						|
    {
 | 
						|
        return [
 | 
						|
            'object' => 'system_permissions',
 | 
						|
            'attributes' => [
 | 
						|
                'permissions' => Permission::permissions(),
 | 
						|
            ],
 | 
						|
        ];
 | 
						|
    }
 | 
						|
}
 |