rbrecruiter/app/Policies/BanPolicy.php

104 lines
2.2 KiB
PHP
Raw Normal View History

<?php
namespace App\Policies;
use App\Ban;
use App\User;
use Illuminate\Auth\Access\HandlesAuthorization;
2020-08-13 21:12:17 +00:00
use Illuminate\Support\Facades\Auth;
use Illuminate\Support\Facades\Log;
class BanPolicy
{
use HandlesAuthorization;
/**
* Determine whether the user can view any models.
*
* @param \App\User $user
* @return mixed
*/
public function viewAny(User $user)
{
//
}
/**
* Determine whether the user can view the model.
*
* @param \App\User $user
* @param \App\Ban $ban
* @return mixed
*/
public function view(User $user, Ban $ban)
{
//
}
/**
* Determine whether the user can create models.
*
2020-09-07 22:38:25 +00:00
* @param \App\User $user
* @param User $targetUser
* @return mixed
*/
2020-09-07 22:33:35 +00:00
public function create(User $user, User $targetUser)
{
2020-08-13 21:12:17 +00:00
Log::debug("Authorization check started", [
'requiredRoles' => 'admin',
'hasRequiredRole' => $user->hasRole('admin'),
2020-09-07 23:07:50 +00:00
'targetUser' => $targetUser->username,
2020-08-13 21:12:17 +00:00
'isCurrentUser' => Auth::user()->is($user)
]);
2020-09-07 22:33:35 +00:00
return $user->hasRole('admin') && $user->isNot($targetUser);
}
/**
* Determine whether the user can update the model.
*
* @param \App\User $user
* @param \App\Ban $ban
* @return mixed
*/
public function update(User $user, Ban $ban)
{
return $user->hasRole('admin');
}
/**
* Determine whether the user can delete the model.
*
* @param \App\User $user
* @param \App\Ban $ban
* @return mixed
*/
public function delete(User $user, Ban $ban)
{
return $user->hasRole('admin');
}
/**
* Determine whether the user can restore the model.
*
* @param \App\User $user
* @param \App\Ban $ban
* @return mixed
*/
public function restore(User $user, Ban $ban)
{
//
}
/**
* Determine whether the user can permanently delete the model.
*
* @param \App\User $user
* @param \App\Ban $ban
* @return mixed
*/
public function forceDelete(User $user, Ban $ban)
{
//
}
}