@@ -38,7 +38,7 @@ discard block |
||
| 38 | 38 | { |
| 39 | 39 | collect($ability) |
| 40 | 40 | ->concat(static::ABILITY_ALIASES[$ability] ?? []) |
| 41 | - ->each(function ($alias) use ($callback) { |
|
| 41 | + ->each(function($alias) use ($callback) { |
|
| 42 | 42 | Gate::define($alias, $callback); |
| 43 | 43 | }); |
| 44 | 44 | } |
@@ -63,77 +63,77 @@ discard block |
||
| 63 | 63 | |
| 64 | 64 | public function boot() |
| 65 | 65 | { |
| 66 | - $this->define('list', function ($user, $item=null) { |
|
| 67 | - return $this->authorize($user, function ($user) { |
|
| 66 | + $this->define('list', function($user, $item = null) { |
|
| 67 | + return $this->authorize($user, function($user) { |
|
| 68 | 68 | return $this->userHasRole($user, [UserRole::VIEWONLY, UserRole::PUBLISHER, UserRole::ADMIN]); |
| 69 | 69 | }); |
| 70 | 70 | }); |
| 71 | 71 | |
| 72 | - $this->define('edit', function ($user, $item=null) { |
|
| 73 | - return $this->authorize($user, function ($user) { |
|
| 72 | + $this->define('edit', function($user, $item = null) { |
|
| 73 | + return $this->authorize($user, function($user) { |
|
| 74 | 74 | return $this->userHasRole($user, [UserRole::PUBLISHER, UserRole::ADMIN]); |
| 75 | 75 | }); |
| 76 | 76 | }); |
| 77 | 77 | |
| 78 | - $this->define('reorder', function ($user) { |
|
| 79 | - return $this->authorize($user, function ($user) { |
|
| 78 | + $this->define('reorder', function($user) { |
|
| 79 | + return $this->authorize($user, function($user) { |
|
| 80 | 80 | return $this->userHasRole($user, [UserRole::PUBLISHER, UserRole::ADMIN]); |
| 81 | 81 | }); |
| 82 | 82 | }); |
| 83 | 83 | |
| 84 | - $this->define('publish', function ($user) { |
|
| 85 | - return $this->authorize($user, function ($user) { |
|
| 84 | + $this->define('publish', function($user) { |
|
| 85 | + return $this->authorize($user, function($user) { |
|
| 86 | 86 | return $this->userHasRole($user, [UserRole::PUBLISHER, UserRole::ADMIN]); |
| 87 | 87 | }); |
| 88 | 88 | }); |
| 89 | 89 | |
| 90 | - $this->define('feature', function ($user) { |
|
| 91 | - return $this->authorize($user, function ($user) { |
|
| 90 | + $this->define('feature', function($user) { |
|
| 91 | + return $this->authorize($user, function($user) { |
|
| 92 | 92 | return $this->userHasRole($user, [UserRole::PUBLISHER, UserRole::ADMIN]); |
| 93 | 93 | }); |
| 94 | 94 | }); |
| 95 | 95 | |
| 96 | - $this->define('delete', function ($user) { |
|
| 97 | - return $this->authorize($user, function ($user) { |
|
| 96 | + $this->define('delete', function($user) { |
|
| 97 | + return $this->authorize($user, function($user) { |
|
| 98 | 98 | return $this->userHasRole($user, [UserRole::PUBLISHER, UserRole::ADMIN]); |
| 99 | 99 | }); |
| 100 | 100 | }); |
| 101 | 101 | |
| 102 | - $this->define('duplicate', function ($user) { |
|
| 103 | - return $this->authorize($user, function ($user) { |
|
| 102 | + $this->define('duplicate', function($user) { |
|
| 103 | + return $this->authorize($user, function($user) { |
|
| 104 | 104 | return $this->userHasRole($user, [UserRole::PUBLISHER, UserRole::ADMIN]); |
| 105 | 105 | }); |
| 106 | 106 | }); |
| 107 | 107 | |
| 108 | - $this->define('upload', function ($user) { |
|
| 109 | - return $this->authorize($user, function ($user) { |
|
| 108 | + $this->define('upload', function($user) { |
|
| 109 | + return $this->authorize($user, function($user) { |
|
| 110 | 110 | return $this->userHasRole($user, [UserRole::PUBLISHER, UserRole::ADMIN]); |
| 111 | 111 | }); |
| 112 | 112 | }); |
| 113 | 113 | |
| 114 | - $this->define('manage-users', function ($user) { |
|
| 115 | - return $this->authorize($user, function ($user) { |
|
| 114 | + $this->define('manage-users', function($user) { |
|
| 115 | + return $this->authorize($user, function($user) { |
|
| 116 | 116 | return $this->userHasRole($user, [UserRole::ADMIN]); |
| 117 | 117 | }); |
| 118 | 118 | }); |
| 119 | 119 | |
| 120 | 120 | // As an admin, I can edit users, except superadmins |
| 121 | 121 | // As a non-admin, I can edit myself only |
| 122 | - $this->define('edit-user', function ($user, $editedUser = null) { |
|
| 123 | - return $this->authorize($user, function ($user) use ($editedUser) { |
|
| 122 | + $this->define('edit-user', function($user, $editedUser = null) { |
|
| 123 | + return $this->authorize($user, function($user) use ($editedUser) { |
|
| 124 | 124 | return ($this->userHasRole($user, [UserRole::ADMIN]) || $user->id == $editedUser->id) |
| 125 | 125 | && ($editedUser ? $editedUser->role !== self::SUPERADMIN : true); |
| 126 | 126 | }); |
| 127 | 127 | }); |
| 128 | 128 | |
| 129 | - $this->define('publish-user', function ($user) { |
|
| 130 | - return $this->authorize($user, function ($user) { |
|
| 129 | + $this->define('publish-user', function($user) { |
|
| 130 | + return $this->authorize($user, function($user) { |
|
| 131 | 131 | $editedUserObject = User::find(request('id')); |
| 132 | 132 | return $this->userHasRole($user, [UserRole::ADMIN]) && ($editedUserObject ? $user->id !== $editedUserObject->id && $editedUserObject->role !== self::SUPERADMIN : false); |
| 133 | 133 | }); |
| 134 | 134 | }); |
| 135 | 135 | |
| 136 | - $this->define('impersonate', function ($user) { |
|
| 136 | + $this->define('impersonate', function($user) { |
|
| 137 | 137 | return $user->role === self::SUPERADMIN; |
| 138 | 138 | }); |
| 139 | 139 | } |
@@ -233,11 +233,11 @@ discard block |
||
| 233 | 233 | |
| 234 | 234 | public function allPermissions() |
| 235 | 235 | { |
| 236 | - $permissions = Permission::whereHas('users', function ($query) { |
|
| 236 | + $permissions = Permission::whereHas('users', function($query) { |
|
| 237 | 237 | $query->where('id', $this->id); |
| 238 | - })->orWhereHas('roles', function ($query) { |
|
| 238 | + })->orWhereHas('roles', function($query) { |
|
| 239 | 239 | $query->where('id', $this->role->id); |
| 240 | - })->orWhereHas('groups', function ($query) { |
|
| 240 | + })->orWhereHas('groups', function($query) { |
|
| 241 | 241 | $query |
| 242 | 242 | ->join('group_twill_user', 'groups.id', '=', 'group_twill_user.group_id') |
| 243 | 243 | ->where('group_twill_user.twill_user_id', $this->id) |
@@ -250,8 +250,7 @@ discard block |
||
| 250 | 250 | public function getLastLoginColumnValueAttribute() |
| 251 | 251 | { |
| 252 | 252 | return $this->last_login_at ? |
| 253 | - $this->last_login_at->format('d M Y, H:i') : |
|
| 254 | - ($this->isActivated() ? '—' : twillTrans('twill::lang.user-management.activation-pending')); |
|
| 253 | + $this->last_login_at->format('d M Y, H:i') : ($this->isActivated() ? '—' : twillTrans('twill::lang.user-management.activation-pending')); |
|
| 255 | 254 | } |
| 256 | 255 | |
| 257 | 256 | public function setGoogle2faSecretAttribute($secret) |
@@ -348,7 +348,7 @@ discard block |
||
| 348 | 348 | { |
| 349 | 349 | if (config('twill.enabled.permissions-management')) { |
| 350 | 350 | return Group::with('permissions')->get() |
| 351 | - ->mapWithKeys(function ($group) { |
|
| 351 | + ->mapWithKeys(function($group) { |
|
| 352 | 352 | return [$group->id => $group->permissions]; |
| 353 | 353 | })->toArray(); |
| 354 | 354 | } |
@@ -369,12 +369,12 @@ discard block |
||
| 369 | 369 | private function getRoleList() |
| 370 | 370 | { |
| 371 | 371 | if (config('twill.enabled.permissions-management')) { |
| 372 | - return Role::accessible()->published()->get()->map(function ($role) { |
|
| 372 | + return Role::accessible()->published()->get()->map(function($role) { |
|
| 373 | 373 | return ['value' => $role->id, 'label' => $role->name]; |
| 374 | 374 | })->toArray(); |
| 375 | 375 | } |
| 376 | 376 | |
| 377 | - return collect(UserRole::toArray())->map(function ($item, $key) { |
|
| 377 | + return collect(UserRole::toArray())->map(function($item, $key) { |
|
| 378 | 378 | return ['value' => $key, 'label' => $item]; |
| 379 | 379 | })->values()->toArray(); |
| 380 | 380 | } |
@@ -24,7 +24,7 @@ discard block |
||
| 24 | 24 | } |
| 25 | 25 | |
| 26 | 26 | $userItemPermissions = twillModel('user')::notSuperAdmin()->get()->mapWithKeys( |
| 27 | - function ($user) use ($object, $moduleName) { |
|
| 27 | + function($user) use ($object, $moduleName) { |
|
| 28 | 28 | $permissionName = $this->getUserItemPermissionName($user, $object, $moduleName); |
| 29 | 29 | |
| 30 | 30 | return ["user_{$user->id}_permission" => $permissionName]; |
@@ -51,7 +51,7 @@ discard block |
||
| 51 | 51 | |
| 52 | 52 | // Group-Item permissions |
| 53 | 53 | $userGroups = $user->groups()->where('is_everyone_group', false)->get(); |
| 54 | - foreach($userGroups as $group) { |
|
| 54 | + foreach ($userGroups as $group) { |
|
| 55 | 55 | if ($permission = $group->permissions()->ofItem($item)->first()) { |
| 56 | 56 | $allPermissionNames->push($permission->name); |
| 57 | 57 | } |
@@ -73,7 +73,7 @@ discard block |
||
| 73 | 73 | |
| 74 | 74 | $itemScopes = collect(Permission::available(Permission::SCOPE_ITEM)) |
| 75 | 75 | ->reverse() |
| 76 | - ->mapWithKeys(function ($scope) { return [$scope => 0]; }) |
|
| 76 | + ->mapWithKeys(function($scope) { return [$scope => 0]; }) |
|
| 77 | 77 | ->toArray(); |
| 78 | 78 | |
| 79 | 79 | foreach ($permissionNames as $name) { |
@@ -49,85 +49,85 @@ discard block |
||
| 49 | 49 | * |
| 50 | 50 | ***/ |
| 51 | 51 | |
| 52 | - $this->define('edit-settings', function ($user) { |
|
| 53 | - return $this->authorize($user, function ($user) { |
|
| 52 | + $this->define('edit-settings', function($user) { |
|
| 53 | + return $this->authorize($user, function($user) { |
|
| 54 | 54 | return $user->role->permissions()->global()->where('name', 'edit-settings')->exists(); |
| 55 | 55 | }); |
| 56 | 56 | }); |
| 57 | 57 | |
| 58 | - $this->define('edit-users', function ($user) { |
|
| 59 | - return $this->authorize($user, function ($user) { |
|
| 58 | + $this->define('edit-users', function($user) { |
|
| 59 | + return $this->authorize($user, function($user) { |
|
| 60 | 60 | return $user->role->permissions()->global()->where('name', 'edit-users')->exists(); |
| 61 | 61 | }); |
| 62 | 62 | }); |
| 63 | 63 | |
| 64 | - $this->define('edit-user', function ($user, $editedUser) { |
|
| 65 | - return $this->authorize($user, function ($user) use ($editedUser) { |
|
| 64 | + $this->define('edit-user', function($user, $editedUser) { |
|
| 65 | + return $this->authorize($user, function($user) use ($editedUser) { |
|
| 66 | 66 | return ($user->id === $editedUser->id) |
| 67 | 67 | || ($editedUser->role->position >= $user->role->position && $user->can('edit-users')); |
| 68 | 68 | }); |
| 69 | 69 | }); |
| 70 | 70 | |
| 71 | - $this->define('edit-user-roles', function ($user) { |
|
| 72 | - return $this->authorize($user, function ($user) { |
|
| 71 | + $this->define('edit-user-roles', function($user) { |
|
| 72 | + return $this->authorize($user, function($user) { |
|
| 73 | 73 | return $user->role->permissions()->global()->where('name', 'edit-user-roles')->exists(); |
| 74 | 74 | }); |
| 75 | 75 | }); |
| 76 | 76 | |
| 77 | - $this->define('edit-role', function ($user, $editedRole) { |
|
| 78 | - return $this->authorize($user, function ($user) use ($editedRole) { |
|
| 77 | + $this->define('edit-role', function($user, $editedRole) { |
|
| 78 | + return $this->authorize($user, function($user) use ($editedRole) { |
|
| 79 | 79 | return ($editedRole->position >= $user->role->position) && $user->can('edit-user-roles'); |
| 80 | 80 | }); |
| 81 | 81 | }); |
| 82 | 82 | |
| 83 | - $this->define('edit-user-groups', function ($user) { |
|
| 83 | + $this->define('edit-user-groups', function($user) { |
|
| 84 | 84 | if (!in_array(Config::get('twill.permissions.level'), ['roleGroup', 'roleGroupItem'])) { |
| 85 | 85 | return false; |
| 86 | 86 | } |
| 87 | 87 | |
| 88 | - return $this->authorize($user, function ($user) { |
|
| 88 | + return $this->authorize($user, function($user) { |
|
| 89 | 89 | return $user->role->permissions()->global()->where('name', 'edit-user-groups')->exists(); |
| 90 | 90 | }); |
| 91 | 91 | }); |
| 92 | 92 | |
| 93 | - $this->define('edit-group', function ($user, $editedGroup) { |
|
| 94 | - return $this->authorize($user, function ($user) use ($editedGroup) { |
|
| 93 | + $this->define('edit-group', function($user, $editedGroup) { |
|
| 94 | + return $this->authorize($user, function($user) use ($editedGroup) { |
|
| 95 | 95 | return !$editedGroup->isEveryoneGroup() && $user->can('edit-user-groups'); |
| 96 | 96 | }); |
| 97 | 97 | }); |
| 98 | 98 | |
| 99 | - $this->define('access-user-management', function ($user) { |
|
| 100 | - return $this->authorize($user, function ($user) { |
|
| 99 | + $this->define('access-user-management', function($user) { |
|
| 100 | + return $this->authorize($user, function($user) { |
|
| 101 | 101 | return $user->can('edit-users') || $user->can('edit-user-roles') || $user->can('edit-user-groups'); |
| 102 | 102 | }); |
| 103 | 103 | }); |
| 104 | 104 | |
| 105 | - $this->define('manage-modules', function ($user) { |
|
| 105 | + $this->define('manage-modules', function($user) { |
|
| 106 | 106 | if (self::$useCache && isset(self::$cache['manage-modules'])) { |
| 107 | 107 | return self::$cache['manage-modules']; |
| 108 | 108 | } |
| 109 | 109 | |
| 110 | - return self::$cache['manage-modules'] = $this->authorize($user, function ($user) { |
|
| 110 | + return self::$cache['manage-modules'] = $this->authorize($user, function($user) { |
|
| 111 | 111 | return $user->role->permissions()->global()->where('name', 'manage-modules')->exists() |
| 112 | 112 | || isUserGroupPermissionModuleExists($user, 'global', 'manage-modules'); |
| 113 | 113 | }); |
| 114 | 114 | }); |
| 115 | 115 | |
| 116 | - $this->define('access-media-library', function ($user) { |
|
| 117 | - return $this->authorize($user, function ($user) { |
|
| 116 | + $this->define('access-media-library', function($user) { |
|
| 117 | + return $this->authorize($user, function($user) { |
|
| 118 | 118 | return $user->can('edit-media-library') |
| 119 | 119 | || $user->role->permissions()->global()->where('name', 'access-media-library')->exists(); |
| 120 | 120 | }); |
| 121 | 121 | }); |
| 122 | 122 | |
| 123 | - $this->define('edit-media-library', function ($user) { |
|
| 124 | - return $this->authorize($user, function ($user) { |
|
| 123 | + $this->define('edit-media-library', function($user) { |
|
| 124 | + return $this->authorize($user, function($user) { |
|
| 125 | 125 | return $user->role->permissions()->global()->where('name', 'edit-media-library')->exists(); |
| 126 | 126 | }); |
| 127 | 127 | }); |
| 128 | 128 | |
| 129 | - $this->define('impersonate', function ($user) { |
|
| 130 | - return $this->authorize($user, function ($user) { |
|
| 129 | + $this->define('impersonate', function($user) { |
|
| 130 | + return $this->authorize($user, function($user) { |
|
| 131 | 131 | return $user->is_superadmin; |
| 132 | 132 | }); |
| 133 | 133 | }); |
@@ -138,48 +138,48 @@ discard block |
||
| 138 | 138 | * |
| 139 | 139 | ***/ |
| 140 | 140 | |
| 141 | - $this->define('access-module-list', function ($user, $moduleName) { |
|
| 141 | + $this->define('access-module-list', function($user, $moduleName) { |
|
| 142 | 142 | if (self::$useCache && isset(self::$cache['access-module-list-' . $moduleName])) { |
| 143 | 143 | return self::$cache['access-module-list-' . $moduleName]; |
| 144 | 144 | } |
| 145 | 145 | |
| 146 | - return self::$cache['access-module-list-' . $moduleName] = $this->authorize($user, function ($user) use ($moduleName) { |
|
| 146 | + return self::$cache['access-module-list-' . $moduleName] = $this->authorize($user, function($user) use ($moduleName) { |
|
| 147 | 147 | return $user->can('view-module', $moduleName) |
| 148 | 148 | || $user->allPermissions()->ofModuleName($moduleName)->exists(); |
| 149 | 149 | }); |
| 150 | 150 | }); |
| 151 | 151 | |
| 152 | 152 | // The gate of accessing module list page, |
| 153 | - $this->define('view-module', function ($user, $moduleName) { |
|
| 153 | + $this->define('view-module', function($user, $moduleName) { |
|
| 154 | 154 | if (self::$useCache && isset(self::$cache['view-module-' . $moduleName])) { |
| 155 | 155 | return self::$cache['view-module-' . $moduleName]; |
| 156 | 156 | } |
| 157 | 157 | |
| 158 | - return self::$cache['view-module-' . $moduleName] = $this->authorize($user, function ($user) use ($moduleName) { |
|
| 158 | + return self::$cache['view-module-' . $moduleName] = $this->authorize($user, function($user) use ($moduleName) { |
|
| 159 | 159 | return $user->can('edit-module', $moduleName) |
| 160 | 160 | || $user->role->permissions()->ofModuleName($moduleName)->where('name', 'view-module')->exists() |
| 161 | 161 | || isUserGroupPermissionModuleExists($user, $moduleName, 'view-module'); |
| 162 | 162 | }); |
| 163 | 163 | }); |
| 164 | 164 | |
| 165 | - $this->define('edit-module', function ($user, $moduleName) { |
|
| 165 | + $this->define('edit-module', function($user, $moduleName) { |
|
| 166 | 166 | if (self::$useCache && isset(self::$cache['edit-module-' . $moduleName])) { |
| 167 | 167 | return self::$cache['edit-module-' . $moduleName]; |
| 168 | 168 | } |
| 169 | 169 | |
| 170 | - return self::$cache['edit-module-' . $moduleName] = $this->authorize($user, function ($user) use ($moduleName) { |
|
| 170 | + return self::$cache['edit-module-' . $moduleName] = $this->authorize($user, function($user) use ($moduleName) { |
|
| 171 | 171 | return $user->can('manage-module', $moduleName) |
| 172 | 172 | || $user->role->permissions()->module()->ofModuleName($moduleName)->where('name', 'edit-module')->exists() |
| 173 | 173 | || isUserGroupPermissionModuleExists($user, $moduleName, 'edit-module'); |
| 174 | 174 | }); |
| 175 | 175 | }); |
| 176 | 176 | |
| 177 | - $this->define('manage-module', function ($user, $moduleName) { |
|
| 177 | + $this->define('manage-module', function($user, $moduleName) { |
|
| 178 | 178 | if (self::$useCache && isset(self::$cache['manage-module-' . $moduleName])) { |
| 179 | 179 | return self::$cache['manage-module-' . $moduleName]; |
| 180 | 180 | } |
| 181 | 181 | |
| 182 | - return self::$cache['manage-module-' . $moduleName] = $this->authorize($user, function ($user) use ($moduleName) { |
|
| 182 | + return self::$cache['manage-module-' . $moduleName] = $this->authorize($user, function($user) use ($moduleName) { |
|
| 183 | 183 | if (!isPermissionableModule($moduleName)) { |
| 184 | 184 | return true; |
| 185 | 185 | } |
@@ -195,13 +195,13 @@ discard block |
||
| 195 | 195 | * |
| 196 | 196 | ***/ |
| 197 | 197 | |
| 198 | - $this->define('view-item', function ($user, $item) { |
|
| 198 | + $this->define('view-item', function($user, $item) { |
|
| 199 | 199 | $key = 'view-item-' . str_replace("\\", "-", get_class($item)) . '-' . $item->id; |
| 200 | 200 | if (self::$useCache && isset(self::$cache[$key])) { |
| 201 | 201 | return self::$cache[$key]; |
| 202 | 202 | } |
| 203 | 203 | |
| 204 | - return self::$cache[$key] = $this->authorize($user, function ($user) use ($item) { |
|
| 204 | + return self::$cache[$key] = $this->authorize($user, function($user) use ($item) { |
|
| 205 | 205 | return $item->public |
| 206 | 206 | || $user->can('edit-item', $item) |
| 207 | 207 | || $user->can('view-module', getModuleNameByModel(get_class($item))) |
@@ -210,13 +210,13 @@ discard block |
||
| 210 | 210 | }); |
| 211 | 211 | }); |
| 212 | 212 | |
| 213 | - $this->define('edit-item', function ($user, $item) { |
|
| 213 | + $this->define('edit-item', function($user, $item) { |
|
| 214 | 214 | $key = 'edit-item-' . str_replace("\\", "-", get_class($item)) . '-' . $item->id; |
| 215 | 215 | if (self::$useCache && isset(self::$cache[$key])) { |
| 216 | 216 | return self::$cache[$key]; |
| 217 | 217 | } |
| 218 | 218 | |
| 219 | - return self::$cache[$key] = $this->authorize($user, function ($user) use ($item) { |
|
| 219 | + return self::$cache[$key] = $this->authorize($user, function($user) use ($item) { |
|
| 220 | 220 | return $user->can('manage-item', $item) |
| 221 | 221 | || $user->can('edit-module', getModuleNameByModel(get_class($item))) |
| 222 | 222 | || $user->permissions()->ofItem($item)->where('name', 'edit-item')->exists() |
@@ -224,13 +224,13 @@ discard block |
||
| 224 | 224 | }); |
| 225 | 225 | }); |
| 226 | 226 | |
| 227 | - $this->define('manage-item', function ($user, $item) { |
|
| 227 | + $this->define('manage-item', function($user, $item) { |
|
| 228 | 228 | $key = 'manage-item-' . str_replace("\\", "-", get_class($item)) . '-' . $item->id; |
| 229 | 229 | if (self::$useCache && isset(self::$cache[$key])) { |
| 230 | 230 | return self::$cache[$key]; |
| 231 | 231 | } |
| 232 | 232 | |
| 233 | - return self::$cache[$key] = $this->authorize($user, function ($user) use ($item) { |
|
| 233 | + return self::$cache[$key] = $this->authorize($user, function($user) use ($item) { |
|
| 234 | 234 | return $user->can('manage-module', getModuleNameByModel(get_class($item))) |
| 235 | 235 | || $user->permissions()->ofItem($item)->where('name', 'manage-item')->exists() |
| 236 | 236 | || isUserGroupPermissionItemExists($user, $item, 'manage-item'); |