mirror of
				https://github.com/pelican-dev/panel.git
				synced 2025-10-31 03:56:52 +01:00 
			
		
		
		
	 fc643f57f9
			
		
	
	
		fc643f57f9
		
			
		
	
	
	
	
		
			
			* add spatie/permissions * add policies * add role resource * add root admin role handling * replace some "root_admin" with function * add model specific permissions * make permission selection nicer * fix user creation * fix tests * add back subuser checks in server policy * add custom model for role * assign new users to role if root_admin is set * add api for roles * fix phpstan * add permissions for settings page * remove "restore" and "forceDelete" permissions * add user count to list * prevent deletion if role has users * update user list * fix server policy * remove old `root_admin` column * small refactor * fix tests * forgot can checks here * forgot use * disable editing own roles & disable assigning root admin * don't allow to rename root admin role * remove php bombing exception handler * fix role assignment when creating a user * fix disableOptionWhen * fix missing `root_admin` attribute on react frontend * add permission check for bulk delete * rename viewAny to viewList * improve canAccessPanel check * fix admin not displaying for non-root admins * make sure non root admins can't edit root admins * fix import * fix settings page permission check * fix server permissions for non-subusers * fix settings page permission check v2 * small cleanup * cleanup config file * move consts from resouce into enum & model * Update database/migrations/2024_08_01_114538_remove_root_admin_column.php Co-authored-by: Lance Pioch <lancepioch@gmail.com> * fix config * fix phpstan * fix phpstan 2.0 --------- Co-authored-by: Lance Pioch <lancepioch@gmail.com>
		
			
				
	
	
		
			69 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
			
		
		
	
	
			69 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
| <?php
 | |
| 
 | |
| namespace App\Http\Middleware\Api\Client\Server;
 | |
| 
 | |
| use Illuminate\Http\Request;
 | |
| use App\Models\Server;
 | |
| use Symfony\Component\HttpKernel\Exception\NotFoundHttpException;
 | |
| use App\Exceptions\Http\Server\ServerStateConflictException;
 | |
| 
 | |
| class AuthenticateServerAccess
 | |
| {
 | |
|     /**
 | |
|      * Routes that this middleware should not apply to if the user is an admin.
 | |
|      */
 | |
|     protected array $except = [
 | |
|         'api:client:server.ws',
 | |
|     ];
 | |
| 
 | |
|     /**
 | |
|      * AuthenticateServerAccess constructor.
 | |
|      */
 | |
|     public function __construct()
 | |
|     {
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Authenticate that this server exists and is not suspended or marked as installing.
 | |
|      */
 | |
|     public function handle(Request $request, \Closure $next): mixed
 | |
|     {
 | |
|         /** @var \App\Models\User $user */
 | |
|         $user = $request->user();
 | |
|         $server = $request->route()->parameter('server');
 | |
| 
 | |
|         if (!$server instanceof Server) {
 | |
|             throw new NotFoundHttpException(trans('exceptions.api.resource_not_found'));
 | |
|         }
 | |
| 
 | |
|         // At the very least, ensure that the user trying to make this request is the
 | |
|         // server owner, a subuser, or a root admin. We'll leave it up to the controllers
 | |
|         // to authenticate more detailed permissions if needed.
 | |
|         if ($user->id !== $server->owner_id && !$user->isRootAdmin()) {
 | |
|             // Check for subuser status.
 | |
|             if (!$server->subusers->contains('user_id', $user->id)) {
 | |
|                 throw new NotFoundHttpException(trans('exceptions.api.resource_not_found'));
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         try {
 | |
|             $server->validateCurrentState();
 | |
|         } catch (ServerStateConflictException $exception) {
 | |
|             // Still allow users to get information about their server if it is installing or
 | |
|             // being transferred.
 | |
|             if (!$request->routeIs('api:client:server.view')) {
 | |
|                 if (($server->isSuspended() || $server->node->isUnderMaintenance()) && !$request->routeIs('api:client:server.resources')) {
 | |
|                     throw $exception;
 | |
|                 }
 | |
|                 if (!$user->isRootAdmin() || !$request->routeIs($this->except)) {
 | |
|                     throw $exception;
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         $request->attributes->set('server', $server);
 | |
| 
 | |
|         return $next($request);
 | |
|     }
 | |
| }
 |