| 
									
										
										
										
											2021-06-26 23:23:15 +08:00
										 |  |  | <?php | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | namespace BookStack\Auth\Permissions; | 
					
						
							| 
									
										
										
										
											2018-09-25 19:30:50 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-09-25 23:58:03 +08:00
										 |  |  | use BookStack\Auth\Role; | 
					
						
							| 
									
										
										
										
											2021-03-15 03:52:07 +08:00
										 |  |  | use BookStack\Auth\User; | 
					
						
							| 
									
										
										
										
											2022-07-17 02:28:04 +08:00
										 |  |  | use BookStack\Entities\Models\Chapter; | 
					
						
							| 
									
										
										
										
											2020-11-22 08:17:45 +08:00
										 |  |  | use BookStack\Entities\Models\Entity; | 
					
						
							| 
									
										
										
										
											2021-03-13 23:18:37 +08:00
										 |  |  | use BookStack\Entities\Models\Page; | 
					
						
							| 
									
										
										
										
											2020-12-31 02:25:35 +08:00
										 |  |  | use BookStack\Model; | 
					
						
							|  |  |  | use BookStack\Traits\HasCreatorAndUpdater; | 
					
						
							|  |  |  | use BookStack\Traits\HasOwner; | 
					
						
							| 
									
										
										
										
											2017-01-02 00:05:44 +08:00
										 |  |  | use Illuminate\Database\Eloquent\Builder; | 
					
						
							| 
									
										
										
										
											2017-04-30 18:38:58 +08:00
										 |  |  | use Illuminate\Database\Query\Builder as QueryBuilder; | 
					
						
							| 
									
										
										
										
											2022-07-16 20:17:08 +08:00
										 |  |  | use InvalidArgumentException; | 
					
						
							| 
									
										
										
										
											2016-03-01 04:31:21 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-07-13 03:15:41 +08:00
										 |  |  | class PermissionApplicator | 
					
						
							| 
									
										
										
										
											2016-02-29 03:03:04 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2016-03-06 02:09:21 +08:00
										 |  |  |     /** | 
					
						
							|  |  |  |      * Checks if an entity has a restriction set upon it. | 
					
						
							| 
									
										
										
										
											2021-06-26 23:23:15 +08:00
										 |  |  |      * | 
					
						
							| 
									
										
										
										
											2020-12-31 02:25:35 +08:00
										 |  |  |      * @param HasCreatorAndUpdater|HasOwner $ownable | 
					
						
							| 
									
										
										
										
											2016-03-06 02:09:21 +08:00
										 |  |  |      */ | 
					
						
							| 
									
										
										
										
											2020-12-31 02:25:35 +08:00
										 |  |  |     public function checkOwnableUserAccess(Model $ownable, string $permission): bool | 
					
						
							| 
									
										
										
										
											2016-03-01 04:31:21 +08:00
										 |  |  |     { | 
					
						
							| 
									
										
										
										
											2016-04-24 23:54:20 +08:00
										 |  |  |         $explodedPermission = explode('-', $permission); | 
					
						
							| 
									
										
										
										
											2022-07-17 02:28:04 +08:00
										 |  |  |         $action = $explodedPermission[1] ?? $explodedPermission[0]; | 
					
						
							| 
									
										
										
										
											2022-07-17 03:55:32 +08:00
										 |  |  |         $fullPermission = count($explodedPermission) > 1 ? $permission : $ownable->getMorphClass() . '-' . $permission; | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-03-15 03:52:07 +08:00
										 |  |  |         $user = $this->currentUser(); | 
					
						
							| 
									
										
										
										
											2022-07-17 02:28:04 +08:00
										 |  |  |         $userRoleIds = $this->getCurrentUserRoleIds(); | 
					
						
							| 
									
										
										
										
											2016-04-24 23:54:20 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-07-17 03:55:32 +08:00
										 |  |  |         $allRolePermission = $user->can($fullPermission . '-all'); | 
					
						
							|  |  |  |         $ownRolePermission = $user->can($fullPermission . '-own'); | 
					
						
							| 
									
										
										
										
											2020-12-31 06:18:28 +08:00
										 |  |  |         $nonJointPermissions = ['restrictions', 'image', 'attachment', 'comment']; | 
					
						
							| 
									
										
										
										
											2022-07-17 02:28:04 +08:00
										 |  |  |         $ownerField = ($ownable instanceof Entity) ? 'owned_by' : 'created_by'; | 
					
						
							| 
									
										
										
										
											2022-08-10 15:06:48 +08:00
										 |  |  |         $ownableFieldVal = $ownable->getAttribute($ownerField); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         if (is_null($ownableFieldVal)) { | 
					
						
							|  |  |  |             throw new InvalidArgumentException("{$ownerField} field used but has not been loaded"); | 
					
						
							|  |  |  |         } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         $isOwner = $user->id === $ownableFieldVal; | 
					
						
							| 
									
										
										
										
											2022-07-17 02:28:04 +08:00
										 |  |  |         $hasRolePermission = $allRolePermission || ($isOwner && $ownRolePermission); | 
					
						
							| 
									
										
										
										
											2020-12-31 06:18:28 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-05-02 04:20:50 +08:00
										 |  |  |         // Handle non entity specific jointPermissions
 | 
					
						
							| 
									
										
										
										
											2020-12-31 06:18:28 +08:00
										 |  |  |         if (in_array($explodedPermission[0], $nonJointPermissions)) { | 
					
						
							| 
									
										
										
										
											2022-07-17 02:28:04 +08:00
										 |  |  |             return $hasRolePermission; | 
					
						
							|  |  |  |         } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-07-17 03:55:32 +08:00
										 |  |  |         $hasApplicableEntityPermissions = $this->hasEntityPermission($ownable, $userRoleIds, $action); | 
					
						
							| 
									
										
										
										
											2022-07-17 02:28:04 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-07-17 03:55:32 +08:00
										 |  |  |         return is_null($hasApplicableEntityPermissions) ? $hasRolePermission : $hasApplicableEntityPermissions; | 
					
						
							| 
									
										
										
										
											2022-07-17 02:28:04 +08:00
										 |  |  |     } | 
					
						
							| 
									
										
										
										
											2021-06-26 23:23:15 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-07-17 02:28:04 +08:00
										 |  |  |     /** | 
					
						
							| 
									
										
										
										
											2022-07-17 03:55:32 +08:00
										 |  |  |      * Check if there are permissions that are applicable for the given entity item, action and roles. | 
					
						
							|  |  |  |      * Returns null when no entity permissions are in force. | 
					
						
							| 
									
										
										
										
											2022-07-17 02:28:04 +08:00
										 |  |  |      */ | 
					
						
							| 
									
										
										
										
											2022-07-17 03:55:32 +08:00
										 |  |  |     protected function hasEntityPermission(Entity $entity, array $userRoleIds, string $action): ?bool | 
					
						
							| 
									
										
										
										
											2022-07-17 02:28:04 +08:00
										 |  |  |     { | 
					
						
							| 
									
										
										
										
											2022-10-08 20:52:59 +08:00
										 |  |  |         $this->ensureValidEntityAction($action); | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-07-17 03:55:32 +08:00
										 |  |  |         $adminRoleId = Role::getSystemRole('admin')->id; | 
					
						
							|  |  |  |         if (in_array($adminRoleId, $userRoleIds)) { | 
					
						
							|  |  |  |             return true; | 
					
						
							|  |  |  |         } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-10-10 23:58:26 +08:00
										 |  |  |         // The chain order here is very important due to the fact we walk up the chain
 | 
					
						
							|  |  |  |         // in the loop below. Earlier items in the chain have higher priority.
 | 
					
						
							| 
									
										
										
										
											2022-07-17 02:28:04 +08:00
										 |  |  |         $chain = [$entity]; | 
					
						
							|  |  |  |         if ($entity instanceof Page && $entity->chapter_id) { | 
					
						
							|  |  |  |             $chain[] = $entity->chapter; | 
					
						
							| 
									
										
										
										
											2016-03-01 04:31:21 +08:00
										 |  |  |         } | 
					
						
							| 
									
										
										
										
											2016-04-24 23:54:20 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-07-17 02:28:04 +08:00
										 |  |  |         if ($entity instanceof Page || $entity instanceof Chapter) { | 
					
						
							|  |  |  |             $chain[] = $entity->book; | 
					
						
							| 
									
										
										
										
											2016-04-27 04:48:17 +08:00
										 |  |  |         } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-07-17 02:28:04 +08:00
										 |  |  |         foreach ($chain as $currentEntity) { | 
					
						
							| 
									
										
										
										
											2022-10-10 23:58:26 +08:00
										 |  |  |             $allowedByRoleId = $currentEntity->permissions() | 
					
						
							|  |  |  |                 ->whereIn('role_id', [0, ...$userRoleIds]) | 
					
						
							|  |  |  |                 ->pluck($action, 'role_id'); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |             // Continue up the chain if no applicable entity permission overrides.
 | 
					
						
							| 
									
										
										
										
											2022-10-12 19:12:36 +08:00
										 |  |  |             if ($allowedByRoleId->isEmpty()) { | 
					
						
							| 
									
										
										
										
											2022-10-10 23:58:26 +08:00
										 |  |  |                 continue; | 
					
						
							| 
									
										
										
										
											2022-08-10 15:06:48 +08:00
										 |  |  |             } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-10-10 23:58:26 +08:00
										 |  |  |             // If we have user-role-specific permissions set, allow if any of those
 | 
					
						
							|  |  |  |             // role permissions allow access.
 | 
					
						
							|  |  |  |             $hasDefault = $allowedByRoleId->has(0); | 
					
						
							|  |  |  |             if (!$hasDefault || $allowedByRoleId->count() > 1) { | 
					
						
							|  |  |  |                 return $allowedByRoleId->search(function (bool $allowed, int $roleId) { | 
					
						
							|  |  |  |                         return $roleId !== 0 && $allowed; | 
					
						
							|  |  |  |                 }) !== false; | 
					
						
							| 
									
										
										
										
											2022-07-17 02:28:04 +08:00
										 |  |  |             } | 
					
						
							| 
									
										
										
										
											2022-10-10 23:58:26 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |             // Otherwise, return the default "Other roles" fallback value.
 | 
					
						
							|  |  |  |             return $allowedByRoleId->get(0); | 
					
						
							| 
									
										
										
										
											2022-07-17 02:28:04 +08:00
										 |  |  |         } | 
					
						
							| 
									
										
										
										
											2021-06-26 23:23:15 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-07-17 02:28:04 +08:00
										 |  |  |         return null; | 
					
						
							| 
									
										
										
										
											2016-02-29 03:03:04 +08:00
										 |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-01-02 13:55:28 +08:00
										 |  |  |     /** | 
					
						
							| 
									
										
										
										
											2019-03-10 00:50:22 +08:00
										 |  |  |      * Checks if a user has the given permission for any items in the system. | 
					
						
							| 
									
										
										
										
											2019-03-10 05:15:45 +08:00
										 |  |  |      * Can be passed an entity instance to filter on a specific type. | 
					
						
							| 
									
										
										
										
											2019-01-02 13:55:28 +08:00
										 |  |  |      */ | 
					
						
							| 
									
										
										
										
											2022-07-16 20:17:08 +08:00
										 |  |  |     public function checkUserHasEntityPermissionOnAny(string $action, string $entityClass = ''): bool | 
					
						
							| 
									
										
										
										
											2019-01-02 13:55:28 +08:00
										 |  |  |     { | 
					
						
							| 
									
										
										
										
											2022-10-08 20:52:59 +08:00
										 |  |  |         $this->ensureValidEntityAction($action); | 
					
						
							| 
									
										
										
										
											2022-07-16 20:17:08 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |         $permissionQuery = EntityPermission::query() | 
					
						
							| 
									
										
										
										
											2022-10-08 20:52:59 +08:00
										 |  |  |             ->where($action, '=', true) | 
					
						
							| 
									
										
										
										
											2022-07-16 20:17:08 +08:00
										 |  |  |             ->whereIn('role_id', $this->getCurrentUserRoleIds()); | 
					
						
							| 
									
										
										
										
											2019-03-10 05:15:45 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-07-16 20:17:08 +08:00
										 |  |  |         if (!empty($entityClass)) { | 
					
						
							|  |  |  |             /** @var Entity $entityInstance */ | 
					
						
							|  |  |  |             $entityInstance = app()->make($entityClass); | 
					
						
							| 
									
										
										
										
											2022-10-08 20:52:59 +08:00
										 |  |  |             $permissionQuery = $permissionQuery->where('entity_type', '=', $entityInstance->getMorphClass()); | 
					
						
							| 
									
										
										
										
											2019-03-10 05:15:45 +08:00
										 |  |  |         } | 
					
						
							| 
									
										
										
										
											2019-01-02 13:55:28 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-10 05:15:45 +08:00
										 |  |  |         $hasPermission = $permissionQuery->count() > 0; | 
					
						
							| 
									
										
										
										
											2021-06-26 23:23:15 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-03-10 05:15:45 +08:00
										 |  |  |         return $hasPermission; | 
					
						
							| 
									
										
										
										
											2019-01-02 13:55:28 +08:00
										 |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-01-15 23:00:29 +08:00
										 |  |  |     /** | 
					
						
							| 
									
										
										
										
											2022-07-17 02:54:25 +08:00
										 |  |  |      * Limit the given entity query so that the query will only | 
					
						
							| 
									
										
										
										
											2022-07-16 20:17:08 +08:00
										 |  |  |      * return items that the user has view permission for. | 
					
						
							| 
									
										
										
										
											2017-01-15 23:00:29 +08:00
										 |  |  |      */ | 
					
						
							| 
									
										
										
										
											2022-07-16 20:17:08 +08:00
										 |  |  |     public function restrictEntityQuery(Builder $query): Builder | 
					
						
							| 
									
										
										
										
											2018-01-29 00:58:52 +08:00
										 |  |  |     { | 
					
						
							| 
									
										
										
										
											2022-07-16 20:17:08 +08:00
										 |  |  |         return $query->where(function (Builder $parentQuery) { | 
					
						
							|  |  |  |             $parentQuery->whereHas('jointPermissions', function (Builder $permissionQuery) { | 
					
						
							|  |  |  |                 $permissionQuery->whereIn('role_id', $this->getCurrentUserRoleIds()) | 
					
						
							| 
									
										
										
										
											2019-10-05 19:55:01 +08:00
										 |  |  |                     ->where(function (Builder $query) { | 
					
						
							| 
									
										
										
										
											2021-03-15 04:32:33 +08:00
										 |  |  |                         $this->addJointHasPermissionCheck($query, $this->currentUser()->id); | 
					
						
							| 
									
										
										
										
											2019-01-27 18:29:23 +08:00
										 |  |  |                     }); | 
					
						
							| 
									
										
										
										
											2018-09-21 02:48:08 +08:00
										 |  |  |             }); | 
					
						
							| 
									
										
										
										
											2019-10-05 19:55:01 +08:00
										 |  |  |         }); | 
					
						
							|  |  |  |     } | 
					
						
							| 
									
										
										
										
											2017-01-22 20:02:30 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-10-05 19:55:01 +08:00
										 |  |  |     /** | 
					
						
							|  |  |  |      * Extend the given page query to ensure draft items are not visible | 
					
						
							|  |  |  |      * unless created by the given user. | 
					
						
							|  |  |  |      */ | 
					
						
							| 
									
										
										
										
											2022-07-17 02:54:25 +08:00
										 |  |  |     public function restrictDraftsOnPageQuery(Builder $query): Builder | 
					
						
							| 
									
										
										
										
											2019-10-05 19:55:01 +08:00
										 |  |  |     { | 
					
						
							|  |  |  |         return $query->where(function (Builder $query) { | 
					
						
							|  |  |  |             $query->where('draft', '=', false) | 
					
						
							|  |  |  |                 ->orWhere(function (Builder $query) { | 
					
						
							|  |  |  |                     $query->where('draft', '=', true) | 
					
						
							| 
									
										
										
										
											2020-12-31 02:25:35 +08:00
										 |  |  |                         ->where('owned_by', '=', $this->currentUser()->id); | 
					
						
							| 
									
										
										
										
											2019-10-05 19:55:01 +08:00
										 |  |  |                 }); | 
					
						
							|  |  |  |         }); | 
					
						
							| 
									
										
										
										
											2017-01-02 05:21:11 +08:00
										 |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-02-29 03:03:04 +08:00
										 |  |  |     /** | 
					
						
							| 
									
										
										
										
											2017-03-19 20:48:44 +08:00
										 |  |  |      * Filter items that have entities set as a polymorphic relation. | 
					
						
							| 
									
										
										
										
											2021-11-30 08:06:17 +08:00
										 |  |  |      * For simplicity, this will not return results attached to draft pages. | 
					
						
							|  |  |  |      * Draft pages should never really have related items though. | 
					
						
							| 
									
										
										
										
											2021-06-26 23:23:15 +08:00
										 |  |  |      * | 
					
						
							| 
									
										
										
										
											2021-09-30 01:41:11 +08:00
										 |  |  |      * @param Builder|QueryBuilder $query | 
					
						
							| 
									
										
										
										
											2016-02-29 03:03:04 +08:00
										 |  |  |      */ | 
					
						
							| 
									
										
										
										
											2022-07-17 02:54:25 +08:00
										 |  |  |     public function restrictEntityRelationQuery($query, string $tableName, string $entityIdColumn, string $entityTypeColumn) | 
					
						
							| 
									
										
										
										
											2016-02-29 03:03:04 +08:00
										 |  |  |     { | 
					
						
							| 
									
										
										
										
											2021-09-30 01:41:11 +08:00
										 |  |  |         $tableDetails = ['tableName' => $tableName, 'entityIdColumn' => $entityIdColumn, 'entityTypeColumn' => $entityTypeColumn]; | 
					
						
							| 
									
										
										
										
											2021-11-30 08:06:17 +08:00
										 |  |  |         $pageMorphClass = (new Page())->getMorphClass(); | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-07-16 20:17:08 +08:00
										 |  |  |         $q = $query->whereExists(function ($permissionQuery) use (&$tableDetails) { | 
					
						
							| 
									
										
										
										
											2021-11-30 08:06:17 +08:00
										 |  |  |             /** @var Builder $permissionQuery */ | 
					
						
							|  |  |  |             $permissionQuery->select(['role_id'])->from('joint_permissions') | 
					
						
							|  |  |  |                 ->whereColumn('joint_permissions.entity_id', '=', $tableDetails['tableName'] . '.' . $tableDetails['entityIdColumn']) | 
					
						
							|  |  |  |                 ->whereColumn('joint_permissions.entity_type', '=', $tableDetails['tableName'] . '.' . $tableDetails['entityTypeColumn']) | 
					
						
							| 
									
										
										
										
											2022-07-16 20:17:08 +08:00
										 |  |  |                 ->whereIn('joint_permissions.role_id', $this->getCurrentUserRoleIds()) | 
					
						
							| 
									
										
										
										
											2021-11-30 08:06:17 +08:00
										 |  |  |                 ->where(function (QueryBuilder $query) { | 
					
						
							|  |  |  |                     $this->addJointHasPermissionCheck($query, $this->currentUser()->id); | 
					
						
							|  |  |  |                 }); | 
					
						
							|  |  |  |         })->where(function ($query) use ($tableDetails, $pageMorphClass) { | 
					
						
							|  |  |  |             /** @var Builder $query */ | 
					
						
							|  |  |  |             $query->where($tableDetails['entityTypeColumn'], '!=', $pageMorphClass) | 
					
						
							| 
									
										
										
										
											2021-11-30 22:25:09 +08:00
										 |  |  |                 ->orWhereExists(function (QueryBuilder $query) use ($tableDetails, $pageMorphClass) { | 
					
						
							| 
									
										
										
										
											2021-11-30 08:06:17 +08:00
										 |  |  |                     $query->select('id')->from('pages') | 
					
						
							|  |  |  |                         ->whereColumn('pages.id', '=', $tableDetails['tableName'] . '.' . $tableDetails['entityIdColumn']) | 
					
						
							|  |  |  |                         ->where($tableDetails['tableName'] . '.' . $tableDetails['entityTypeColumn'], '=', $pageMorphClass) | 
					
						
							|  |  |  |                         ->where('pages.draft', '=', false); | 
					
						
							|  |  |  |                 }); | 
					
						
							| 
									
										
										
										
											2016-02-29 03:03:04 +08:00
										 |  |  |         }); | 
					
						
							| 
									
										
										
										
											2021-03-15 03:52:07 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-09-18 01:22:04 +08:00
										 |  |  |         return $q; | 
					
						
							| 
									
										
										
										
											2016-02-29 03:03:04 +08:00
										 |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-03-13 21:30:47 +08:00
										 |  |  |     /** | 
					
						
							| 
									
										
										
										
											2022-07-17 02:54:25 +08:00
										 |  |  |      * Add conditions to a query for a model that's a relation of a page, so only the model results | 
					
						
							|  |  |  |      * on visible pages are returned by the query. | 
					
						
							|  |  |  |      * Is effectively the same as "restrictEntityRelationQuery" but takes into account page drafts | 
					
						
							|  |  |  |      * while not expecting a polymorphic relation, Just a simpler one-page-to-many-relations set-up. | 
					
						
							| 
									
										
										
										
											2016-03-13 21:30:47 +08:00
										 |  |  |      */ | 
					
						
							| 
									
										
										
										
											2022-07-17 02:54:25 +08:00
										 |  |  |     public function restrictPageRelationQuery(Builder $query, string $tableName, string $pageIdColumn): Builder | 
					
						
							| 
									
										
										
										
											2016-03-13 21:30:47 +08:00
										 |  |  |     { | 
					
						
							| 
									
										
										
										
											2022-07-17 02:54:25 +08:00
										 |  |  |         $fullPageIdColumn = $tableName . '.' . $pageIdColumn; | 
					
						
							|  |  |  |         $morphClass = (new Page())->getMorphClass(); | 
					
						
							| 
									
										
										
										
											2021-11-30 08:06:17 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-07-17 02:54:25 +08:00
										 |  |  |         $existsQuery = function ($permissionQuery) use ($fullPageIdColumn, $morphClass) { | 
					
						
							| 
									
										
										
										
											2021-11-30 08:06:17 +08:00
										 |  |  |             /** @var Builder $permissionQuery */ | 
					
						
							|  |  |  |             $permissionQuery->select('joint_permissions.role_id')->from('joint_permissions') | 
					
						
							| 
									
										
										
										
											2022-07-17 02:54:25 +08:00
										 |  |  |                 ->whereColumn('joint_permissions.entity_id', '=', $fullPageIdColumn) | 
					
						
							| 
									
										
										
										
											2021-11-30 08:06:17 +08:00
										 |  |  |                 ->where('joint_permissions.entity_type', '=', $morphClass) | 
					
						
							| 
									
										
										
										
											2022-07-16 20:17:08 +08:00
										 |  |  |                 ->whereIn('joint_permissions.role_id', $this->getCurrentUserRoleIds()) | 
					
						
							| 
									
										
										
										
											2021-11-30 08:06:17 +08:00
										 |  |  |                 ->where(function (QueryBuilder $query) { | 
					
						
							|  |  |  |                     $this->addJointHasPermissionCheck($query, $this->currentUser()->id); | 
					
						
							| 
									
										
										
										
											2016-04-24 01:14:26 +08:00
										 |  |  |                 }); | 
					
						
							| 
									
										
										
										
											2021-11-30 08:06:17 +08:00
										 |  |  |         }; | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-07-17 02:54:25 +08:00
										 |  |  |         $q = $query->where(function ($query) use ($existsQuery, $fullPageIdColumn) { | 
					
						
							| 
									
										
										
										
											2021-11-30 08:06:17 +08:00
										 |  |  |             $query->whereExists($existsQuery) | 
					
						
							| 
									
										
										
										
											2022-07-17 02:54:25 +08:00
										 |  |  |                 ->orWhere($fullPageIdColumn, '=', 0); | 
					
						
							| 
									
										
										
										
											2016-03-13 21:30:47 +08:00
										 |  |  |         }); | 
					
						
							| 
									
										
										
										
											2019-04-27 21:18:00 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-07-17 02:54:25 +08:00
										 |  |  |         // Prevent visibility of non-owned draft pages
 | 
					
						
							|  |  |  |         $q->whereExists(function (QueryBuilder $query) use ($fullPageIdColumn) { | 
					
						
							|  |  |  |             $query->select('id')->from('pages') | 
					
						
							|  |  |  |                 ->whereColumn('pages.id', '=', $fullPageIdColumn) | 
					
						
							|  |  |  |                 ->where(function (QueryBuilder $query) { | 
					
						
							|  |  |  |                     $query->where('pages.draft', '=', false) | 
					
						
							|  |  |  |                         ->orWhere('pages.owned_by', '=', $this->currentUser()->id); | 
					
						
							|  |  |  |                 }); | 
					
						
							|  |  |  |         }); | 
					
						
							| 
									
										
										
										
											2021-11-30 08:06:17 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-09-18 01:22:04 +08:00
										 |  |  |         return $q; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-03-15 04:32:33 +08:00
										 |  |  |     /** | 
					
						
							|  |  |  |      * Add the query for checking the given user id has permission | 
					
						
							|  |  |  |      * within the join_permissions table. | 
					
						
							| 
									
										
										
										
											2021-06-26 23:23:15 +08:00
										 |  |  |      * | 
					
						
							| 
									
										
										
										
											2021-03-15 04:32:33 +08:00
										 |  |  |      * @param QueryBuilder|Builder $query | 
					
						
							|  |  |  |      */ | 
					
						
							|  |  |  |     protected function addJointHasPermissionCheck($query, int $userIdToCheck) | 
					
						
							|  |  |  |     { | 
					
						
							| 
									
										
										
										
											2021-11-30 08:06:17 +08:00
										 |  |  |         $query->where('joint_permissions.has_permission', '=', true)->orWhere(function ($query) use ($userIdToCheck) { | 
					
						
							|  |  |  |             $query->where('joint_permissions.has_permission_own', '=', true) | 
					
						
							|  |  |  |                 ->where('joint_permissions.owned_by', '=', $userIdToCheck); | 
					
						
							| 
									
										
										
										
											2021-03-15 04:32:33 +08:00
										 |  |  |         }); | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-09-18 01:22:04 +08:00
										 |  |  |     /** | 
					
						
							| 
									
										
										
										
											2021-06-26 23:23:15 +08:00
										 |  |  |      * Get the current user. | 
					
						
							| 
									
										
										
										
											2016-09-18 01:22:04 +08:00
										 |  |  |      */ | 
					
						
							| 
									
										
										
										
											2022-07-16 20:17:08 +08:00
										 |  |  |     protected function currentUser(): User | 
					
						
							| 
									
										
										
										
											2016-09-18 01:22:04 +08:00
										 |  |  |     { | 
					
						
							| 
									
										
										
										
											2022-07-16 20:17:08 +08:00
										 |  |  |         return user(); | 
					
						
							| 
									
										
										
										
											2016-09-18 01:22:04 +08:00
										 |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     /** | 
					
						
							| 
									
										
										
										
											2022-07-16 20:17:08 +08:00
										 |  |  |      * Get the roles for the current logged-in user. | 
					
						
							|  |  |  |      * | 
					
						
							|  |  |  |      * @return int[] | 
					
						
							| 
									
										
										
										
											2016-09-18 01:22:04 +08:00
										 |  |  |      */ | 
					
						
							| 
									
										
										
										
											2022-07-16 20:17:08 +08:00
										 |  |  |     protected function getCurrentUserRoleIds(): array | 
					
						
							| 
									
										
										
										
											2016-09-18 01:22:04 +08:00
										 |  |  |     { | 
					
						
							| 
									
										
										
										
											2022-07-16 20:17:08 +08:00
										 |  |  |         if (auth()->guest()) { | 
					
						
							|  |  |  |             return [Role::getSystemRole('public')->id]; | 
					
						
							|  |  |  |         } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         return $this->currentUser()->roles->pluck('id')->values()->all(); | 
					
						
							| 
									
										
										
										
											2016-03-13 21:30:47 +08:00
										 |  |  |     } | 
					
						
							| 
									
										
										
										
											2022-10-08 20:52:59 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |     /** | 
					
						
							|  |  |  |      * Ensure the given action is a valid and expected entity action. | 
					
						
							|  |  |  |      * Throws an exception if invalid otherwise does nothing. | 
					
						
							|  |  |  |      * @throws InvalidArgumentException | 
					
						
							|  |  |  |      */ | 
					
						
							|  |  |  |     protected function ensureValidEntityAction(string $action): void | 
					
						
							|  |  |  |     { | 
					
						
							|  |  |  |         if (!in_array($action, EntityPermission::PERMISSIONS)) { | 
					
						
							|  |  |  |             throw new InvalidArgumentException('Action should be a simple entity permission action, not a role permission'); | 
					
						
							|  |  |  |         } | 
					
						
							|  |  |  |     } | 
					
						
							| 
									
										
										
										
											2018-01-29 00:58:52 +08:00
										 |  |  | } |