BookStack/app/Auth/Role.php

153 lines
3.9 KiB
PHP
Raw Normal View History

2021-06-26 11:23:15 -04:00
<?php
namespace BookStack\Auth;
use BookStack\Auth\Permissions\EntityPermission;
use BookStack\Auth\Permissions\JointPermission;
use BookStack\Auth\Permissions\RolePermission;
use BookStack\Interfaces\Loggable;
use BookStack\Model;
use Illuminate\Database\Eloquent\Collection;
use Illuminate\Database\Eloquent\Factories\HasFactory;
use Illuminate\Database\Eloquent\Relations\BelongsToMany;
use Illuminate\Database\Eloquent\Relations\HasMany;
2015-08-29 10:03:42 -04:00
/**
2021-06-26 11:23:15 -04:00
* Class Role.
*
2021-09-18 16:21:44 -04:00
* @property int $id
* @property string $display_name
* @property string $description
* @property string $external_auth_id
* @property string $system_name
* @property bool $mfa_enforced
* @property Collection $users
*/
class Role extends Model implements Loggable
2015-08-29 10:03:42 -04:00
{
use HasFactory;
protected $fillable = ['display_name', 'description', 'external_auth_id'];
2015-09-05 12:42:05 -04:00
protected $hidden = ['pivot'];
2015-08-29 10:03:42 -04:00
/**
* The roles that belong to the role.
*/
public function users(): BelongsToMany
2015-08-29 10:03:42 -04:00
{
return $this->belongsToMany(User::class)->orderBy('name', 'asc');
2015-08-29 10:03:42 -04:00
}
/**
* Get all related JointPermissions.
*/
public function jointPermissions(): HasMany
{
return $this->hasMany(JointPermission::class);
}
2015-08-29 10:03:42 -04:00
/**
* The RolePermissions that belong to the role.
2015-08-29 10:03:42 -04:00
*/
public function permissions(): BelongsToMany
2015-08-29 10:03:42 -04:00
{
return $this->belongsToMany(RolePermission::class, 'permission_role', 'role_id', 'permission_id');
2015-08-29 10:03:42 -04:00
}
/**
* Get the entity permissions assigned to this role.
*/
public function entityPermissions(): HasMany
{
return $this->hasMany(EntityPermission::class);
}
/**
* Check if this role has a permission.
*/
public function hasPermission(string $permissionName): bool
{
$permissions = $this->getRelationValue('permissions');
foreach ($permissions as $permission) {
if ($permission->getRawAttribute('name') === $permissionName) {
return true;
}
}
2021-06-26 11:23:15 -04:00
return false;
}
2015-08-29 10:03:42 -04:00
/**
* Add a permission to this role.
*/
public function attachPermission(RolePermission $permission)
2015-08-29 10:03:42 -04:00
{
$this->permissions()->attach($permission->id);
}
/**
* Detach a single permission from this role.
*/
public function detachPermission(RolePermission $permission)
{
$this->permissions()->detach([$permission->id]);
}
/**
* Get the role of the specified display name.
*/
public static function getRole(string $displayName): ?self
{
return static::query()->where('display_name', '=', $displayName)->first();
2015-09-05 12:42:05 -04:00
}
/**
* Get the role object for the specified system role.
*/
public static function getSystemRole(string $systemName): ?self
{
return static::query()->where('system_name', '=', $systemName)->first();
}
/**
* Get all visible roles.
*/
public static function visible(): Collection
{
return static::query()->where('hidden', '=', false)->orderBy('name')->get();
}
/**
* Get the roles that can be restricted.
*/
public static function restrictable(): Collection
{
return static::query()
->where('system_name', '!=', 'admin')
->orderBy('display_name', 'asc')
->get();
}
/**
* Get a role to represent the case of 'Everyone else' in the system.
* Used within the interface since the default-fallback for permissions uses role_id=0.
*/
public static function getEveryoneElseRole(): self
{
return (new static())->forceFill([
'id' => 0,
'display_name' => 'Everyone Else',
'description' => 'Set permissions for all roles not specifically overridden.'
]);
}
/**
* {@inheritdoc}
*/
public function logDescriptor(): string
{
return "({$this->id}) {$this->display_name}";
}
2015-08-29 10:03:42 -04:00
}