Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature/reworked package #5

Open
wants to merge 10 commits into
base: master
Choose a base branch
from
Open

Conversation

GautierDele
Copy link
Member

@GautierDele GautierDele commented Feb 12, 2025

Summary by CodeRabbit

  • Chores
    • Removed outdated issue submission templates and streamlined project configuration.
    • Upgraded dependency requirements to support PHP 8.2–8.4 and Laravel 11/12.
  • Refactor
    • Revamped access control logic and updated configuration defaults for improved permission handling.
  • Tests
    • Enhanced and restructured the test suite to ensure reliability under the new access control mechanisms.
    • Introduced new tests for validating access control based on user permissions and model states.

Copy link

coderabbitai bot commented Feb 12, 2025

Walkthrough

The changes remove several GitHub issue templates and update CI configurations. Dependency versions in Composer have been raised, and access control configuration settings have been modified. The service provider and legacy traits for policies and queries were removed, while the core Control class was refactored to use static methods for control name resolution and permission checks. In addition, the Perimeter system was reworked by removing fixed properties and collection classes and introducing callback-based logic and a new OverlayPerimeter. A number of tests have been added, removed, or refactored to align with the new access control flow.

Changes

File(s) Change Summary
.github/ISSUE_TEMPLATE/Bug_report.yml, .github/ISSUE_TEMPLATE/Question_or_enhancement_proposal.yml, .github/ISSUE_TEMPLATE/config.yml Removed issue template files and configuration for structured issue reporting.
.github/workflows/tests.yml Updated CI workflow: replaced PHP 8.1 with 8.4 and changed Laravel version matrix from ^10.0 to ^11.0/^12.0.
composer.json Raised dependency versions for PHP (^8.2), Laravel (^11.0
config/access-control.php Removed the perimeters entry; changed enabled_by_default from true to false and added isolated set to true.
src/AccessServiceProvider.php Removed registration methods (registerServices, registerPerimeters) and their calls.
src/Controls/Concerns/HasPolicy.php, src/Controls/Concerns/HasQuery.php Removed legacy traits for policy and query handling.
src/Controls/Control.php, src/Controls/HasControl.php Refactored Control: removed the constructor, replaced should with applies, added static methods/properties for control resolution; introduced new HasControl trait.
src/Controls/HasControlScope.php Renamed from ControlScope; updated macro names and query logic (using controlled/uncontrolled).
src/Exceptions/QueryNotImplemented.php Removed custom exception class.
src/Perimeters/Perimeter.php, src/Perimeters/PerimeterCollection.php, src/Perimeters/Perimeters.php, src/Perimeters/OverlayPerimeter.php Revised Perimeter: removed fixed properties and getter methods in favor of callback-based methods; removed collection classes; added new OverlayPerimeter.
src/QueriesControlled.php Removed trait for query control.
src/Policies/ControlledPolicy.php Restructured policy: renamed methods and shifted to model-based permission checks via the new Control flow.
Tests (multiple files under tests/...) Updated test suites: added new tests (PerimetersTest, ControlsQueryTest, ControlsShouldTest), removed deprecated tests (QueriesTest, ControlsTest, NotImplementedQueryControl, etc.), refactored ModelControl and policies, and updated factories, migrations, and models with new boolean attributes.

Sequence Diagram(s)

sequenceDiagram
    participant U as User
    participant P as ControlledPolicy
    participant C as Control
    participant M as Model
    U->>P: Request action (e.g., "view")
    P->>C: getControl() with model name
    C-->>P: Return Control instance (via resolveControlName)
    P->>C: applies(user, action, model)
    C-->>P: Return permission decision (true/false)
    P-->>U: Respond with authorization decision
Loading

Poem

I'm a bunny on the run,
Hopping through code with endless fun,
Templates and traits bid farewell today,
Static controls now lead the way,
Perimeters change like carrots in the sun,
Leaping into tests—oh what a run! 🥕🐰

✨ Finishing Touches
  • 📝 Generate Docstrings

🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate docstrings to generate docstrings for this PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai plan to trigger planning for file edits and PR creation.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 8

🧹 Nitpick comments (13)
src/Perimeters/Perimeter.php (4)

11-11: Clarify or address the TODO.

It’s unclear what the “shared example” refers to. Would you like help elaborating on or removing the TODO comment for clarity?


15-18: Placeholder “should(...)” implementation always returns false.

This effectively denies all requests. If it’s intentional, consider adding a comment clarifying. Otherwise, consider updating to a more descriptive or dynamic check.


20-26: Validate usage of the stored query callback.

Though the design is clear, consider documenting the expected signature of $queryCallback to ensure consistent usage across the codebase.


29-36: Consider renaming the static constructor.

public static function new() may conflict with built-in naming expectations. Using make or create is a common practice and can improve readability.

tests/Support/Access/Controls/ModelControl.php (1)

13-28: Ensure test coverage and consider DRY approach.

Each perimeter definition follows a similar pattern. You could consider a shared helper or generator to reduce repetition. Also, confirm that tests adequately cover queries for is_global, is_client, and is_own.

src/Controls/Control.php (5)

19-24: Public static $namespace is mutable.

Making $namespace publicly mutable could lead to unexpected behavior. Consider restricting write access or introducing an explicit method to change it if needed.


48-62: Factory method for controls.

controlForModel seamlessly delegates to resolveControlName. Consider matching naming conventions (e.g., makeControlForModel) if you prefer more descriptive factory method names.


63-65: Remove or resolve commented-out TODOs.

These comment blocks might be stale or partial. Would you like assistance drafting a follow-up PR to finalize or remove them?


66-74: Static “new()” method naming.

Similar to the Perimeter class, consider using more conventional naming patterns like create or make for clarity.


100-114: Fallback to 'App\\' is a reasonable default.

Catching Throwable ensures robust fallback, but consider logging the error for better debugging if the auto-detection fails.

config/access-control.php (1)

12-12: Verify the impact of disabling queries by default.

This is a breaking change that could affect existing applications. Please ensure this change is documented in the changelog and migration guide.

Consider adding a note in the README or documentation about:

  1. The reason for this change
  2. How to enable queries if needed
  3. Migration steps for existing applications
tests/Feature/PerimetersTest.php (1)

25-25: Enhance test coverage for perimeters.

Consider adding tests for:

  • Different actions (update, delete, view)
  • Edge cases (null user, null model)
  • Other perimeters mentioned in the TODO

Would you like me to help generate additional test cases?

src/Controls/HasControl.php (1)

24-29: Add return type hint for control method.

The method should have a return type hint for better type safety.

Apply this diff:

-    public static function control()
+    public static function control(): Control
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 6b5a45b and 280365c.

📒 Files selected for processing (40)
  • .github/ISSUE_TEMPLATE/Bug_report.yml (0 hunks)
  • .github/ISSUE_TEMPLATE/Question_or_enhancement_proposal.yml (0 hunks)
  • .github/ISSUE_TEMPLATE/config.yml (0 hunks)
  • .github/workflows/tests.yml (1 hunks)
  • composer.json (1 hunks)
  • config/access-control.php (1 hunks)
  • src/AccessServiceProvider.php (0 hunks)
  • src/Controls/Concerns/HasPolicy.php (0 hunks)
  • src/Controls/Concerns/HasQuery.php (0 hunks)
  • src/Controls/Control.php (1 hunks)
  • src/Controls/HasControl.php (1 hunks)
  • src/Controls/HasControlScope.php (3 hunks)
  • src/Exceptions/QueryNotImplemented.php (0 hunks)
  • src/Perimeters/Perimeter.php (1 hunks)
  • src/Perimeters/PerimeterCollection.php (0 hunks)
  • src/Perimeters/Perimeters.php (0 hunks)
  • src/PoliciesControlled.php (0 hunks)
  • src/QueriesControlled.php (0 hunks)
  • tests/Feature/PerimetersTest.php (1 hunks)
  • tests/Feature/QueriesTest.php (0 hunks)
  • tests/Feature/TestCase.php (0 hunks)
  • tests/Support/Access/Controls/ModelControl.php (1 hunks)
  • tests/Support/Access/Controls/NotImplementedQueryControl.php (0 hunks)
  • tests/Support/Access/Perimeters/ClientPerimeter.php (1 hunks)
  • tests/Support/Access/Perimeters/GlobalPerimeter.php (1 hunks)
  • tests/Support/Access/Perimeters/OwnPerimeter.php (1 hunks)
  • tests/Support/Access/Perimeters/SharedPerimeter.php (1 hunks)
  • tests/Support/Access/Perimeters/SitePerimeter.php (0 hunks)
  • tests/Support/Access/Policies/ModelPolicy.php (0 hunks)
  • tests/Support/Database/Factories/UserFactory.php (1 hunks)
  • tests/Support/Database/migrations/2014_00_00_000000_create_users_table.php (1 hunks)
  • tests/Support/Database/migrations/2023_04_00_000000_create_models_table.php (1 hunks)
  • tests/Support/Models/Model.php (1 hunks)
  • tests/Support/Models/NotImplementedQueryModel.php (0 hunks)
  • tests/Support/Models/User.php (2 hunks)
  • tests/Support/Traits/InteractsWithAuthorization.php (0 hunks)
  • tests/TestCase.php (1 hunks)
  • tests/Unit/ControlsTest.php (0 hunks)
  • tests/Unit/PoliciesTest.php (0 hunks)
  • tests/Unit/TestCase.php (0 hunks)
💤 Files with no reviewable changes (21)
  • tests/Support/Access/Policies/ModelPolicy.php
  • tests/Feature/TestCase.php
  • tests/Unit/TestCase.php
  • .github/ISSUE_TEMPLATE/Question_or_enhancement_proposal.yml
  • .github/ISSUE_TEMPLATE/Bug_report.yml
  • src/Controls/Concerns/HasQuery.php
  • tests/Support/Access/Perimeters/SitePerimeter.php
  • src/PoliciesControlled.php
  • src/QueriesControlled.php
  • src/AccessServiceProvider.php
  • src/Controls/Concerns/HasPolicy.php
  • .github/ISSUE_TEMPLATE/config.yml
  • src/Perimeters/Perimeters.php
  • src/Exceptions/QueryNotImplemented.php
  • tests/Support/Access/Controls/NotImplementedQueryControl.php
  • tests/Unit/PoliciesTest.php
  • tests/Feature/QueriesTest.php
  • tests/Support/Traits/InteractsWithAuthorization.php
  • tests/Support/Models/NotImplementedQueryModel.php
  • tests/Unit/ControlsTest.php
  • src/Perimeters/PerimeterCollection.php
🧰 Additional context used
🪛 GitHub Actions: tests
composer.json

[error] 1-1: Your requirements could not be resolved to an installable set of packages. The required PHP version (8.2) does not match the current PHP version (8.1.31).

🔇 Additional comments (22)
tests/Support/Access/Perimeters/SharedPerimeter.php (2)

5-7: LGTM! Clean import declarations.

The imports are correctly specified and align with the new method signature requirements.


11-14: Consider enhancing test coverage with edge cases.

While the implementation is straightforward for testing purposes, consider adding test cases that cover:

  1. Users with undefined should_shared property
  2. Null user scenarios
  3. Different method types
  4. Various model types

Would you like me to generate additional test cases to improve coverage?

tests/Support/Access/Perimeters/OwnPerimeter.php (2)

5-6: LGTM! Clean import statements.

The imports are properly organized and type-safe, using concrete types from Laravel's contracts and Eloquent.


11-14: Consider adding validation for the should_own property.

While the implementation is clean and follows type safety, it assumes the should_own property always exists on the user model.

Let's verify this assumption by checking the user model implementation:

Additionally, consider adding a property check:

 public function should(Authenticatable $user, string $method, Model $model): bool
 {
+    if (!property_exists($user, 'should_own')) {
+        return false;
+    }
     return $user->should_own;
 }
✅ Verification successful

🏁 Script executed:

#!/bin/bash
# Search for the definition of should_own property in test user models
rg -A 5 "should_own" --type php

Length of output: 1665


Final Response: The "should_own" property is already guaranteed to exist in the User model.

  • The search shows that should_own is defined in both the test user model (tests/Support/Models/User.php) and set up via the corresponding migration and factory.
  • As such, adding an extra property check is unnecessary given the codebase's current design.
tests/TestCase.php (1)

92-96: LGTM!

The method provides a clean and focused way to assert unauthorized responses, checking both the status code and error message. This helper method will improve test readability and maintainability.

src/Perimeters/Perimeter.php (2)

5-7: Imports look good.

These imports appear necessary and relevant; no issues are found.


13-13: Ensure property assignment path is well-defined.

protected Closure $queryCallback; is typed and not nullable. Verify code that uses this property calls query(...) first, or consider adding a default value to avoid uninitialized property usage.

tests/Support/Access/Controls/ModelControl.php (1)

7-9: New perimeter imports.

These perimeter imports align with the shift to perimeter-based access control. No issues found.

src/Controls/Control.php (5)

5-6: Imports are appropriate.

These dependencies are required for namespace resolution and error handling. No immediate concerns.

Also applies to: 8-8


12-17: Potential concurrency concerns for static property.

static $controlNameResolver could cause conflicts if modified concurrently at runtime. Confirm if your application flow calls for dynamic changes or if it’s effectively set once in a boot phase.


26-34: Empty perimeters method.

This default implementation returning an empty array is presumably a base fallback. Looks fine.


36-46: Naming resolver override method looks good.

guessControlNamesUsing is a clear API to override the control naming mechanism. No further issues noted.


76-98: Namespace string manipulation can be fragile.

If a model is not in the default namespace, this logic might fail. Confirm that $namespace includes a trailing backslash and that edge cases for nested namespaces are handled.

tests/Support/Access/Perimeters/ClientPerimeter.php (1)

11-14: LGTM! Clean and focused implementation.

The should method follows a consistent pattern and provides a clear way to check client permissions.

tests/Support/Access/Perimeters/GlobalPerimeter.php (1)

11-14: LGTM! Consistent implementation.

The should method follows the established pattern and provides a clear way to check global permissions.

tests/Support/Database/migrations/2023_04_00_000000_create_models_table.php (1)

20-20: LGTM!

The column reordering doesn't affect functionality.

tests/Feature/PerimetersTest.php (2)

11-16: LGTM!

The test correctly verifies that the client perimeter allows access when should_client is true.


18-23: LGTM!

The test correctly verifies that the client perimeter denies access when should_client is false.

tests/Support/Models/User.php (1)

29-32: LGTM! The new access control attributes are properly configured.

The new attributes are correctly added to both $fillable and $casts arrays, ensuring proper mass assignment and boolean type casting.

Also applies to: 52-55

tests/Support/Database/Factories/UserFactory.php (1)

34-37: LGTM! The factory definition is properly updated.

The new access control attributes are correctly initialized to false by default, aligning with the User model changes.

src/Controls/HasControlScope.php (1)

3-3: LGTM! The namespace and naming changes improve organization.

The changes follow a more consistent naming convention and better code organization.

Also applies to: 9-9, 16-16

.github/workflows/tests.yml (1)

17-17: Verify PHP 8.4 compatibility.

PHP 8.4 is currently in development and not yet released. Including it in the test matrix might cause CI failures.

❌ Verification inconclusive

🌐 Web query:

What is the current status of PHP 8.4?

Error during web search


Action Required: Adjust PHP Versions in Testing Matrix

  • PHP 8.4: Since PHP 8.4 remains in development and isn’t officially released, including it in the test matrix may lead to unexpected CI failures.
  • PHP 8.1 & Laravel 11: Laravel 11 requires PHP 8.2 or higher. Retaining PHP 8.1 in the testing matrix might cause compatibility issues.

Please consider revising the test configuration (e.g., removing PHP 8.4 or marking it as an allowed failure, and dropping or updating PHP 8.1) to align with Laravel 11’s requirements.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 6

🧹 Nitpick comments (10)
src/Policies/ControlledPolicy.php (2)

8-8: Consider adding a class docblock
While not strictly necessary, a brief docblock explaining the class purpose would improve clarity and maintainability.


20-20: Use the correct docblock type
The current notation string-class<Model> is non-standard. Consider using class-string<Model> for better accuracy.

-     * @return string-class<Model>
+     * @return class-string<Model>
tests/Support/Policies/ModelPolicy.php (1)

10-10: Base Eloquent Model
Setting $model to Model::class is valid for demonstration; in real usage, referencing a specific model might be preferable.

tests/Support/Access/Perimeters/ClientPerimeter.php (1)

10-13: LGTM! Consider adding type hints for better code clarity.

The implementation aligns well with the perimeter-based access control approach. The applies method correctly evaluates the user's client status.

Consider adding a type hint for the should_client property to improve code clarity:

-    public function applies(Model $user): bool
+    /**
+     * @param Model $user User model with bool $should_client property
+     */
+    public function applies(Model $user): bool
tests/Support/Access/Perimeters/GlobalPerimeter.php (1)

10-13: LGTM! Consider adding type hints for better code clarity.

The implementation aligns well with the perimeter-based access control approach. The applies method correctly evaluates the user's global status.

Consider adding a type hint for the should_global property to improve code clarity:

-    public function applies(Model $user): bool
+    /**
+     * @param Model $user User model with bool $should_global property
+     */
+    public function applies(Model $user): bool
src/Perimeters/Perimeter.php (2)

12-13: Consider adding property type hints and initialization.

The closure properties should be initialized to prevent potential null pointer issues.

Consider initializing the properties with no-op closures:

-    protected Closure $queryCallback;
-    protected Closure $shouldCallback;
+    protected Closure $queryCallback;
+    protected Closure $shouldCallback;
+
+    public function __construct()
+    {
+        $this->queryCallback = fn(Builder $query) => $query;
+        $this->shouldCallback = fn(Model $user, string $method, Model $model) => false;
+    }

15-18: Consider documenting the default behavior.

The default implementation of applies returns false, which might not be immediately obvious to implementers.

Add documentation to clarify the default behavior:

+    /**
+     * Determines if this perimeter applies to the given user.
+     * Default implementation returns false. Override this method in child classes.
+     */
     public function applies(Model $user): bool
     {
         return false;
     }
tests/Feature/PerimetersTest.php (1)

14-19: Consider enhancing test coverage with edge cases and complex scenarios.

The current tests only verify simple boolean flags. Consider adding tests for:

  • Multiple perimeters applied simultaneously
  • Edge cases with null/empty values
  • Complex scenarios with different combinations of permissions

Also applies to: 21-26, 28-33, 35-40, 42-47, 49-54, 56-61, 63-68

src/Controls/Control.php (1)

33-36: Consider making the empty perimeters method abstract.

The empty perimeters method might be confusing. Consider making it abstract to force implementation in child classes.

-protected function perimeters(): array
+abstract protected function perimeters(): array
 {
-    return [];
 }
tests/Feature/ControlsTest.php (1)

10-10: Improve readability by using imports instead of FQCN.

The repeated use of fully qualified class names makes the code less readable.

Add import at the top:

+use Lomkit\Access\Tests\Support\Access\Controls\ModelControl;

 class ControlsTest extends TestCase
 {
     public function test_control_with_no_perimeter_passing(): void
     {
-        $this->assertFalse((new \Lomkit\Access\Tests\Support\Access\Controls\ModelControl())->applies(Auth::user(), 'create', new Model()));
+        $this->assertFalse((new ModelControl())->applies(Auth::user(), 'create', new Model()));
     }

Also applies to: 17-17, 28-28, 39-39, 46-46, 57-57, 68-68, 75-75, 86-86, 97-97, 104-104, 115-115, 126-126

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 280365c and 72584b5.

📒 Files selected for processing (15)
  • .github/workflows/tests.yml (1 hunks)
  • composer.json (1 hunks)
  • src/Controls/Control.php (1 hunks)
  • src/Perimeters/Perimeter.php (1 hunks)
  • src/Policies/ControlledPolicy.php (1 hunks)
  • tests/Feature/ControlsTest.php (1 hunks)
  • tests/Feature/PerimetersTest.php (1 hunks)
  • tests/Support/Access/Controls/ModelControl.php (1 hunks)
  • tests/Support/Access/Perimeters/ClientPerimeter.php (1 hunks)
  • tests/Support/Access/Perimeters/GlobalPerimeter.php (1 hunks)
  • tests/Support/Access/Perimeters/OwnPerimeter.php (1 hunks)
  • tests/Support/Access/Perimeters/SharedPerimeter.php (1 hunks)
  • tests/Support/Database/Factories/ModelFactory.php (1 hunks)
  • tests/Support/Database/migrations/2023_04_00_000000_create_models_table.php (1 hunks)
  • tests/Support/Policies/ModelPolicy.php (1 hunks)
🚧 Files skipped from review as they are similar to previous changes (4)
  • tests/Support/Access/Perimeters/OwnPerimeter.php
  • tests/Support/Database/migrations/2023_04_00_000000_create_models_table.php
  • .github/workflows/tests.yml
  • composer.json
🔇 Additional comments (19)
tests/Support/Database/Factories/ModelFactory.php (1)

25-31:

✅ Verification successful

LGTM! Clean and well-structured factory definition.

The attributes are well-organized with consistent alignment, and the new boolean flags align with the package's reworked access control mechanism.

Let's verify that the database schema matches these factory attributes:


🏁 Script executed:

#!/bin/bash
# Description: Check if the database schema matches the factory attributes

# Search for the models table migration
rg -A 10 "Schema::create.*models" tests/Support/Database/migrations/

Length of output: 1407


Factory Definition and Schema Consistency Verified

The factory definition in tests/Support/Database/Factories/ModelFactory.php is well-organized and correctly structured. The new boolean flags (is_shared, is_global, is_client, is_own) align perfectly with the corresponding columns in the database migration (tests/Support/Database/migrations/2023_04_00_000000_create_models_table.php). No changes are needed.

src/Policies/ControlledPolicy.php (8)

3-3: Namespace change looks good
No issues here; the updated namespace is more consistent with the folder structure.


10-15: Property definition is clear
The $model property and its docblock are consistent, ensuring future maintainers can easily identify its purpose.


22-24: Getter logic aligns with property
Returning the $model ensures consistent usage. Good to see typed return for clarity.


32-34: Control instantiation is valid
Creating a Control with Control::controlForModel() is straightforward and maintains a clear entry point for policies.


50-50: Consistent usage of Control::should
Good to see a unified approach with $model in the parameters.


58-58: Consistent usage for create
Mirrors the approach in viewAny(), ensuring consistent permission checks.


66-66: Approach for update is consistent
No concerns with the dynamic call; the pattern remains clear.


74-74: Delete logic follows same pattern
Matches the other methods; no issues noted.

tests/Support/Policies/ModelPolicy.php (6)

1-1: No remarks needed


3-3: Namespace usage
Namespace placement is fine and follows PSR-4 structure.


5-5: Importing Model
Straightforward import for referencing Eloquent base class.


6-6: Inherited policy
Cleanly references the ControlledPolicy base.


8-8: Extend ControlledPolicy
This extension pattern is clear and straightforward for customizing policy logic.


9-9: No remarks needed

tests/Support/Access/Perimeters/SharedPerimeter.php (2)

5-5: Import statement is fine
No issues found with the import of Model.


10-13:

✅ Verification successful

Guard usage of $user->should_shared
Ensure that the should_shared property is always set and boolean. Otherwise, calling it could raise issues.


🏁 Script executed:

#!/bin/bash
# Look for references to 'should_shared' to confirm it's defined and used consistently.
rg 'should_shared' tests src

Length of output: 724


Validation Result: $user->should_shared Property is Consistently Defined as Boolean

The verification confirms that:

  • The should_shared property is defined in the User model with a boolean cast.
  • The migration file declares should_shared as a boolean column.
  • Test cases consistently update should_shared using boolean values.

These checks ensure that its usage in the applies() method is safe, and no additional guarding is necessary.

src/Perimeters/Perimeter.php (1)

10-10: Address the TODO comment.

The TODO comment about "shared example" needs clarification or removal.

Please clarify the purpose of this TODO comment and whether it's still relevant.

src/Controls/Control.php (1)

82-83: Address TODO comments before merging.

These TODO comments suggest incomplete implementation:

  • new ClientPerimeter($queryCallback, $policyCallback)
  • shouldCallback déjà définie

Would you like me to help implement these features?

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

🧹 Nitpick comments (4)
tests/Feature/ControlsShouldTest.php (1)

6-128: Consider reducing redundancy in test initialization.

Each test method directly instantiates ModelControl. Consider using a setup method or a class property to reduce this duplication.

 class ControlsShouldTest extends \Lomkit\Access\Tests\Feature\TestCase
 {
+    private \Lomkit\Access\Tests\Support\Access\Controls\ModelControl $modelControl;
+
+    protected function setUp(): void
+    {
+        parent::setUp();
+        $this->modelControl = new \Lomkit\Access\Tests\Support\Access\Controls\ModelControl();
+    }
+
     public function test_control_with_no_perimeter_passing(): void
     {
-        $this->assertFalse((new \Lomkit\Access\Tests\Support\Access\Controls\ModelControl())->applies(Auth::user(), 'create', new Model()));
+        $this->assertFalse($this->modelControl->applies(Auth::user(), 'create', new Model()));
     }

     // Update the rest of the test methods similarly
tests/Feature/ControlsQueryTest.php (2)

39-39: Missing test for overlay perimeter functionality.

As noted in the TODO comment, there should be a test for the overlays perimeter functionality. Consider implementing this test to ensure complete coverage of the new perimeter system.

Would you like me to suggest an implementation for a test that verifies the overlay perimeter functionality?


6-40: Consider reducing redundancy similar to ControlsShouldTest.

As with the ControlsShouldTest class, consider refactoring to use a setup method for the ModelControl instantiation to reduce code duplication.

 class ControlsQueryTest extends \Lomkit\Access\Tests\Feature\TestCase
 {
+    private \Lomkit\Access\Tests\Support\Access\Controls\ModelControl $modelControl;
+
+    protected function setUp(): void
+    {
+        parent::setUp();
+        $this->modelControl = new \Lomkit\Access\Tests\Support\Access\Controls\ModelControl();
+    }
+
     public function test_control_with_no_perimeter_passing(): void
     {
         Model::factory()
             ->count(50)
             ->create();

         $query = Model::query();
-        $query = (new \Lomkit\Access\Tests\Support\Access\Controls\ModelControl())->queried($query, Auth::user());
+        $query = $this->modelControl->queried($query, Auth::user());

         $this->assertEquals(0, $query->count());
     }
tests/Support/Access/Controls/ModelControl.php (1)

15-20: Handle potential null or empty allowed_methods.

In your $shouldCallback, explode(',', $model->allowed_methods) could behave unexpectedly if $model->allowed_methods is empty or null. Consider validating or providing a fallback to prevent warnings or unintended empty arrays.

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 72584b5 and 7fead1e.

📒 Files selected for processing (12)
  • .github/workflows/tests.yml (1 hunks)
  • composer.json (1 hunks)
  • src/Controls/Control.php (1 hunks)
  • src/Controls/HasControlScope.php (3 hunks)
  • src/Perimeters/OverlayPerimeter.php (1 hunks)
  • src/Perimeters/Perimeter.php (1 hunks)
  • tests/Feature/ControlsQueryTest.php (1 hunks)
  • tests/Feature/ControlsShouldTest.php (1 hunks)
  • tests/Feature/PerimetersTest.php (1 hunks)
  • tests/Support/Access/Controls/ModelControl.php (1 hunks)
  • tests/Support/Access/Perimeters/SharedPerimeter.php (1 hunks)
  • tests/Unit/TestCase.php (0 hunks)
💤 Files with no reviewable changes (1)
  • tests/Unit/TestCase.php
🚧 Files skipped from review as they are similar to previous changes (4)
  • .github/workflows/tests.yml
  • src/Controls/HasControlScope.php
  • composer.json
  • tests/Feature/PerimetersTest.php
🔇 Additional comments (17)
src/Perimeters/OverlayPerimeter.php (1)

5-11: New OverlayPerimeter class implementation looks correct.

This new class creates a specialized perimeter type that always returns true for the overlays() method. This appears to be part of the larger access control system refactoring mentioned in the PR summary, providing a base class for perimeters that need to overlay permissions.

tests/Support/Access/Perimeters/SharedPerimeter.php (3)

5-6: Appropriate import additions.

The imports have been correctly updated to support the new class hierarchy and method requirements.


8-8: Class inheritance changed correctly.

The inheritance has been appropriately changed from Perimeter to OverlayPerimeter to align with the refactored access control system.


10-13: Implementation of applies method is clean and correct.

The dynamic permission check based on the user's should_shared property is a good approach, moving from static properties to runtime evaluation.

tests/Feature/ControlsShouldTest.php (3)

8-11: Test confirms expected behavior for control without perimeters.

This test correctly verifies that a control without any perimeters should not apply.


13-40: Client perimeter tests are comprehensive.

The tests for client perimeter thoroughly cover all relevant actions (viewAny, view, create, update, delete) with both positive and negative assertions. The pattern of setting up the user permissions, creating models with specific allowed methods, and testing the outcomes is well-structured.


71-127: Global perimeter tests mirror client tests appropriately.

The global perimeter tests follow the same thorough structure as the client perimeter tests, which is good for consistency and comprehensive coverage.

tests/Feature/ControlsQueryTest.php (2)

8-18: Test correctly verifies query behavior without active perimeters.

This test effectively confirms that when no perimeter is active for the user, the query returns zero results.


20-37: Client perimeter query test validates expected behavior.

The test correctly verifies that when the client perimeter is applied, only the models matching the perimeter criteria are returned in the query.

src/Controls/Control.php (6)

15-20: Add validation for the control name resolver.

This static property stores the callback with no checks to ensure it returns an existing control class name. Validating the callback’s return would prevent runtime errors if the callback is misconfigured.


39-50: Confirm the return value for non-existent models.

By returning true whenever $model->exists is false, you’re implicitly granting access if the model hasn’t been persisted yet. Double-check that this behavior is intentional and won’t open unintended access paths.


56-65: Verify the denial-by-default approach.

The query is forced to no results if none of the perimeters apply. Ensure this is correct in scenarios where you might expect a fallback or limited-access result instead of a full denial.


67-70: Approach for zero-result queries looks good.

Using WHERE 0=1 is a common pattern for returning an empty result set. The implementation is straightforward and effective.


72-82: Validate the callback in guessControlNamesUsing.

Since this method does not validate the callback, there’s a risk of returning an invalid control class name. Validating at assignment would improve reliability.


84-98: Verify existence of resolved control class.

$control = static::resolveControlName($modelName); may fail if the callback or default resolver returns a non-existent class name, resulting in an error on $control::new(). Consider extra checks or a try/catch to handle this gracefully.

src/Perimeters/Perimeter.php (2)

16-19: Confirm the default return of true.

applies always returns true, meaning each perimeter is considered applicable by default. Ensure this is desired or implement additional checks if needed.


21-29: Ensure callbacks are always defined before invocation.

If should(Closure) or query(Closure) is never invoked, $shouldCallback or $queryCallback could be null, causing runtime errors. Consider default no-op callbacks or protections to avoid unexpected breaks.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

♻️ Duplicate comments (2)
src/Policies/ControlledPolicy.php (1)

17-17: ⚠️ Potential issue

Initialize $model with a valid Eloquent model class name.

The empty string initialization of $model may cause runtime errors when using new ($this->getModel()) (lines 44 and 60). This pattern requires $model to hold a valid Eloquent model class name.

This property should be properly overridden in child classes (as seen in the test ModelPolicy class) to ensure proper instantiation. Consider either:

  1. Making this class abstract to force implementation in child classes
  2. Adding validation in the getModel() method to throw a descriptive exception
-    protected string $model = '';
+    protected string $model = '';
+
+    /**
+     * Get the model class string.
+     *
+     * @throws \RuntimeException If the model property is not set in the child class
+     * @return string-class<Model>
+     */
+    protected function getModel(): string
+    {
+        if (empty($this->model)) {
+            throw new \RuntimeException(sprintf(
+                'The $model property must be set on %s.',
+                static::class
+            ));
+        }
+
+        return $this->model;
+    }
src/Controls/Control.php (1)

98-101: 🛠️ Refactor suggestion

Add validation for control name resolver callback.

The guessControlNamesUsing method should validate that the callback returns a valid control class name.

Implement validation to ensure the callback returns a valid class name:

 public static function guessControlNamesUsing(callable $callback): void
 {
+    $testResult = $callback('TestModel');
+    if (!is_string($testResult) || !class_exists($testResult)) {
+        throw new \InvalidArgumentException('Control name resolver must return a valid control class name');
+    }
     static::$controlNameResolver = $callback;
 }
🧹 Nitpick comments (11)
src/Perimeters/Perimeter.php (4)

11-11: Remove or clarify the TODO comment.
This comment appears to reference an older project structure. Clarifying whether this placeholder is still relevant helps maintain code clarity.


13-16: Prevent potential usage without callbacks.
These closure properties risk runtime errors if used before setting them. Consider providing default callbacks or adding checks to ensure they are set.


33-45: Enhance discoverability with method docblocks.
The chainable methods are well-structured, but adding concise docblocks describing expected callback signatures and return types can improve readability.


59-62: Rename the new() method for clarity.
Using new() as a static named constructor can be confused with the language keyword. Consider using a more descriptive name like create() or make().

- public static function new()
+ public static function create()
tests/Support/Access/Perimeters/GlobalPerimeter.php (1)

7-9: Add docblock or usage context.
This class is empty, which might be intentional for test scaffolding. Adding a brief comment or docblock about its intended role will aid maintainability.

tests/Feature/ControlsQueryTest.php (1)

20-37: Consider consolidating consecutive user updates.
Invoking Auth::user()->update multiple times can be combined to reduce overhead (e.g., a single call updating all relevant fields). This is minor but can streamline test preparation.

- Auth::user()->update(['should_client' => true]);
...
- Auth::user()->update(['should_shared' => true]);
+ Auth::user()->update([
+   'should_client' => true,
+   'should_shared' => true
+ ]);
src/Controls/Control.php (3)

71-84: Improve error handling in the query control process.

The applyQueryControl method doesn't handle potential exceptions from perimeter callbacks, which could lead to query failures in production.

Consider adding try-catch blocks to gracefully handle exceptions:

 protected function applyQueryControl(Builder $query, Model $user): Builder
 {
     foreach ($this->perimeters() as $perimeter) {
-        if ($perimeter->applyAllowedCallback($user)) {
-            $query = $perimeter->applyQueryCallback($query, $user);
-
-            if (!$perimeter->overlays()) {
-                return $query;
-            }
+        try {
+            if ($perimeter->applyAllowedCallback($user)) {
+                $query = $perimeter->applyQueryCallback($query, $user);
+
+                if (!$perimeter->overlays()) {
+                    return $query;
+                }
+            }
+        } catch (\Throwable $e) {
+            // Log the error but continue with other perimeters
+            \Log::error('Error applying perimeter query control', [
+                'perimeter' => get_class($perimeter),
+                'error' => $e->getMessage()
+            ]);
         }
     }

     return $this->noResultQuery($query);
 }

36-37: Consider allowing customization of empty perimeters behavior.

The perimeters method always returns an empty array, which means the default behavior will always deny access unless overridden.

Consider providing a configuration option to control the default behavior when no perimeters are defined:

 protected function perimeters(): array
 {
     return [];
 }
+
+/**
+ * Determine the default response when no perimeters are defined.
+ *
+ * @return bool
+ */
+protected function defaultResponse(): bool
+{
+    return config('access-control.default_response', false);
+}

Then update the applies method:

 public function applies(Model $user, string $method, Model $model): bool
 {
+    $perimeters = $this->perimeters();
+    
+    if (empty($perimeters)) {
+        return $this->defaultResponse();
+    }

     foreach ($this->perimeters() as $perimeter) {
         // ...
     }

     return false;
 }

140-151: Improve namespace handling in the resolver.

The current implementation of the resolver doesn't handle edge cases like models in subdirectories or non-standard namespace structures well.

Consider improving the namespace handling:

 $resolver = static::$controlNameResolver ?? function (string $modelName) {
     $appNamespace = static::appNamespace();
 
-    $modelName = Str::startsWith($modelName, $appNamespace.'Models\\')
-        ? Str::after($modelName, $appNamespace.'Models\\')
-        : Str::after($modelName, $appNamespace);
+    // Handle models in various namespace structures
+    $modelBaseName = class_basename($modelName);
+    
+    // First check if control exists with full namespace mapping
+    $fullNamespaceControl = static::$namespace.$modelBaseName.'Control';
+    if (class_exists($fullNamespaceControl)) {
+        return $fullNamespaceControl;
+    }
+    
+    // Fall back to manipulating namespace
+    $modelName = Str::startsWith($modelName, $appNamespace.'Models\\')
+        ? Str::after($modelName, $appNamespace.'Models\\')
+        : Str::after($modelName, $appNamespace);

     return static::$namespace.$modelName.'Control';
 };
tests/Support/Access/Controls/ModelControl.php (2)

17-20: Address the TODO comment by extracting the should callback.

As mentioned in the TODO comment, the should callback could be extracted to improve code organization.

Extract the callback to a dedicated method:

-        // @TODO: possible to extract the should callback to another method ??
-        $shouldCallback = function (Model $user, string $method, Model $model) {
-            return in_array($method, explode(',', $model->allowed_methods));
-        };
+        return [
+            SharedPerimeter::new()
+                ->should([$this, 'checkAllowedMethods'])
+                ->allowed(function (Model $user) {
+                    return $user->should_shared;
+                })
+                // ... rest of the code

// Add this method to the class
+    /**
+     * Check if the method is allowed for the model.
+     *
+     * @param Model $user
+     * @param string $method
+     * @param Model $model
+     * @return bool
+     */
+    protected function checkAllowedMethods(Model $user, string $method, Model $model): bool
+    {
+        return in_array($method, explode(',', $model->allowed_methods));
+    }

22-55: Consider adding type definitions to perimeter callbacks.

Type hints in callback functions would improve code safety and IDE support.

Add type hints to all callback functions:

 return [
     SharedPerimeter::new()
         ->should($shouldCallback)
-        ->allowed(function (Model $user) {
+        ->allowed(function (Model $user): bool {
             return $user->should_shared;
         })
-        ->query(function (Builder $query, Model $user) {
+        ->query(function (Builder $query, Model $user): Builder {
             return $query->orWhere('is_shared', true);
         }),
     // ... apply the same pattern to other perimeters
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 7fead1e and fa3b186.

📒 Files selected for processing (11)
  • config/access-control.php (1 hunks)
  • src/Controls/Control.php (1 hunks)
  • src/Perimeters/Perimeter.php (1 hunks)
  • src/Policies/ControlledPolicy.php (1 hunks)
  • tests/Feature/ControlsQueryTest.php (1 hunks)
  • tests/Feature/PerimetersTest.php (1 hunks)
  • tests/Support/Access/Controls/ModelControl.php (1 hunks)
  • tests/Support/Access/Perimeters/ClientPerimeter.php (0 hunks)
  • tests/Support/Access/Perimeters/GlobalPerimeter.php (1 hunks)
  • tests/Support/Access/Perimeters/OwnPerimeter.php (0 hunks)
  • tests/Support/Access/Perimeters/SharedPerimeter.php (1 hunks)
💤 Files with no reviewable changes (2)
  • tests/Support/Access/Perimeters/OwnPerimeter.php
  • tests/Support/Access/Perimeters/ClientPerimeter.php
🚧 Files skipped from review as they are similar to previous changes (3)
  • tests/Support/Access/Perimeters/SharedPerimeter.php
  • tests/Feature/PerimetersTest.php
  • config/access-control.php
🔇 Additional comments (7)
src/Perimeters/Perimeter.php (2)

18-26: Confirm exception handling for callbacks.
If the provided closure logic throws exceptions, consider whether you need specific error handling within these “apply” methods to keep the system robust.


67-70: Overlay mechanism is straightforward.
Returning false by default is clear. Ensure that overriding perimeters (like OverlayPerimeter) handle overlay logic adequately to avoid confusion.

tests/Feature/ControlsQueryTest.php (3)

34-34: Revisit the TODO comment (duplicate from past reviews).
This French TODO comment was noted in a previous review. Please address it or remove it if no longer applicable.


6-19: Good coverage for the “no perimeter” scenario.
Testing a baseline with zero results is logical. Ensure additional contexts exist or will be added if partial perimeters or fallback logic become relevant.


86-135: Tests are clear and thorough.
These scenarios adequately represent key user attribute combinations. If coverage expands, consider data providers to systematically test various user states.

src/Policies/ControlledPolicy.php (1)

44-44: Validate model instantiation.

The dynamic instantiation using new ($this->getModel()) assumes the model class has a parameterless constructor, which isn't guaranteed for all Eloquent models.

Consider adding a try-catch block to handle potential instantiation errors:

-        return $this->getControl()->should($user, __FUNCTION__, new ($this->getModel()));
+        try {
+            $model = new ($this->getModel())();
+            return $this->getControl()->should($user, __FUNCTION__, $model);
+        } catch (\Throwable $e) {
+            \Log::error('Failed to instantiate model for permission check', [
+                'model' => $this->getModel(),
+                'error' => $e->getMessage()
+            ]);
+            return false;
+        }
tests/Support/Access/Controls/ModelControl.php (1)

28-30:

❓ Verification inconclusive

Caution with orWhere clauses in perimeter queries.

Using orWhere in all perimeter queries might create overly permissive queries when multiple perimeters apply.

Each perimeter adds an orWhere condition, which means any record matching any of the conditions will be included. This may not be what you intend if the perimeters should be restrictive rather than additive.

Consider:

  1. Using where instead of orWhere for the first condition
  2. Using subqueries with ->orWhere(function($q) { ... }) to group related conditions

Also applies to: 36-38, 44-46, 52-54


🏁 Script executed:

#!/bin/bash
# Find usages of perimeter queries to see expected patterns
rg -A 2 "->query\s*\(" --type php src tests

Length of output: 450


Action required: Verify Query Patterns and Usage of orWhere in Perimeter Queries

The current use of orWhere in perimeter queries (e.g., in tests/Support/Access/Controls/ModelControl.php at lines 28-30) could lead to overly permissive results when multiple perimeters apply, since each perimeter simply concatenates another orWhere condition. This may inadvertently include records that match just one of the applied perimeters.

Consider the following suggestions:

  • For the first condition, switching to where might be safer.
  • Group subsequent conditions using subqueries (e.g., via ->orWhere(function($q) { ... })) to ensure that related conditions are evaluated together.

Note on Verification Command:
The previously provided rg command failed due to pattern parsing issues. Please run the updated command below to verify the usage of perimeter queries across the codebase:

#!/bin/bash
rg -A 2 '\-\>query\s*\(' --type php tests

This command should correctly escape the arrow operator. Also, manually verify similar patterns at lines 36-38, 44-46, and 52-54 to ensure that all perimeter queries are implemented as intended.

Comment on lines +10 to +11
//@TODO: what to do for other methods like attach ? It only has view / etc basic methods

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Verification agent

❓ Verification inconclusive

Address the TODO comment.

The TODO comment about handling other methods like "attach" should be addressed before finalizing this PR.

Consider either implementing these additional methods or documenting the decision not to support them. For Laravel's authorization system, you might want to support all standard policy methods.


🏁 Script executed:

#!/bin/bash
# Find all available policy methods in Laravel's authorization system
rg -A 1 "function.*?(?:Policy|Gate)" vendor/laravel --type php | grep "function"

Length of output: 135


Action Required: Implement or Document Additional Policy Methods
The file src/Policies/ControlledPolicy.php still contains a TODO regarding methods like attach. Please either add implementations for these missing methods (ensuring consistency with Laravel’s standard policy method set) or update the documentation/comment to explain why they aren’t supported. Note that our initial search for Laravel’s policy methods using the vendor directory (vendor/laravel) did not return results—likely because the expected vendor path isn’t available here—so please verify manually against the Laravel authorization system to confirm the complete set of required methods.

  • File: src/Policies/ControlledPolicy.php
  • Lines: 10-11
        //@TODO: what to do for other methods like attach ? It only has view / etc basic methods

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Nitpick comments (2)
tests/Feature/ControlsShouldTest.php (1)

141-151: Test name could be more accurate.

The test name test_control_should_not_delete_global_using_shared_overlayed_perimeter suggests a negative test, but the assertion is checking that deletion is allowed, which is confusing.

Rename this test to better reflect that it's checking a positive case with the shared perimeter's specific permission format:

-public function test_control_should_not_delete_global_using_shared_overlayed_perimeter(): void
+public function test_control_should_delete_using_shared_specific_permission(): void
tests/Support/Access/Controls/ModelControl.php (1)

17-20: Implement or remove the TODO comment

The TODO comment indicates the intent to extract the should callback to another method, but you've already successfully implemented a callback extraction. Consider removing the TODO comment or actually extracting it to a named method for better organization and reusability.

-        // @TODO: possible to extract the should callback to another method ??
-        $shouldCallback = function (Model $user, string $method, Model $model) {
-            return in_array($method, explode(',', $model->allowed_methods));
-        };
+        // Extract callback to a named method for better organization
+        $shouldCallback = $this->createMethodPermissionValidator();

And add this method to the class:

protected function createMethodPermissionValidator(): \Closure
{
    return function (Model $user, string $method, Model $model) {
        return in_array($method, explode(',', $model->allowed_methods));
    };
}
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between fa3b186 and 58f70ad.

📒 Files selected for processing (6)
  • src/Controls/Control.php (1 hunks)
  • src/Controls/HasControl.php (1 hunks)
  • src/Perimeters/Perimeter.php (1 hunks)
  • tests/Feature/ControlsQueryTest.php (1 hunks)
  • tests/Feature/ControlsShouldTest.php (1 hunks)
  • tests/Support/Access/Controls/ModelControl.php (1 hunks)
🚧 Files skipped from review as they are similar to previous changes (1)
  • src/Controls/HasControl.php
🧰 Additional context used
🧬 Code Definitions (4)
tests/Feature/ControlsShouldTest.php (2)
tests/Support/Access/Controls/ModelControl.php (1)
  • ModelControl (13-59)
src/Controls/Control.php (1)
  • applies (40-59)
tests/Feature/ControlsQueryTest.php (4)
tests/Unit/TestCase.php (1)
  • TestCase (6-19)
tests/Feature/ControlsShouldTest.php (1)
  • test_control_with_no_perimeter_passing (8-11)
tests/Support/Access/Controls/ModelControl.php (1)
  • ModelControl (13-59)
src/Controls/Control.php (1)
  • queried (61-74)
src/Controls/Control.php (2)
src/Perimeters/Perimeter.php (8)
  • Perimeter (9-69)
  • applyAllowedCallback (26-29)
  • should (38-43)
  • applyShouldCallback (16-19)
  • overlays (65-68)
  • query (45-50)
  • applyQueryCallback (21-24)
  • new (57-60)
src/Perimeters/OverlayPerimeter.php (1)
  • overlays (7-10)
src/Perimeters/Perimeter.php (3)
tests/Support/Models/Model.php (1)
  • Model (10-23)
src/Controls/Control.php (1)
  • new (135-138)
src/Perimeters/OverlayPerimeter.php (1)
  • overlays (7-10)
🔇 Additional comments (39)
tests/Feature/ControlsShouldTest.php (14)

1-11: LGTM - Test for perimeter validation works as expected.

The test_control_with_no_perimeter_passing test correctly validates that without any perimeter permissions, the control does not apply to any model actions.


13-18: LGTM - Client perimeter viewAny test is well structured.

This test correctly validates that when a user has client permissions, they can view any model without checking the model's specific permissions.


20-30: LGTM - Client perimeter view test properly validates permissions.

This test accurately verifies that a user with client permissions can view a model when the model's allowed_methods includes 'view'.


31-40: LGTM - Negative test case is properly implemented.

This test correctly verifies that permissions are denied when the model's allowed_methods doesn't include the 'view' action.


42-47: LGTM - Client perimeter create test is well structured.

The test correctly validates that a user with client permissions can create a model without checking the model's allowed_methods (since the model doesn't exist yet).


49-58: LGTM - Client perimeter update test properly checks permissions.

This test correctly validates that a user with client permissions can update a model when the model's allowed_methods includes 'update'.


60-69: LGTM - Client perimeter delete test properly checks permissions.

This test correctly validates that a user with client permissions can delete a model when the model's allowed_methods includes 'delete'.


71-76: LGTM - Global perimeter viewAny test is well structured.

This test correctly validates that when a user has global permissions, they can view any model without checking the model's specific permissions.


78-87: LGTM - Global perimeter view test properly validates permissions.

This test accurately verifies that a user with global permissions can view a model when the model's allowed_methods includes 'view'.


89-98: LGTM - Negative test case for global permissions is properly implemented.

This test correctly verifies that global permissions are denied when the model's allowed_methods doesn't include the 'view' action.


100-105: LGTM - Global perimeter create test is well structured.

The test correctly validates that a user with global permissions can create a model without checking the model's allowed_methods (since the model doesn't exist yet).


107-116: LGTM - Global perimeter update test properly checks permissions.

This test correctly validates that a user with global permissions can update a model when the model's allowed_methods includes 'update'.


118-127: LGTM - Global perimeter delete test properly checks permissions.

This test correctly validates that a user with global permissions can delete a model when the model's allowed_methods includes 'delete'.


129-139: LGTM - Overlayed perimeter test is well structured.

This test correctly validates the behavior when both shared and global permissions are present, checking that the standard delete method works as expected.

tests/Feature/ControlsQueryTest.php (7)

8-18: LGTM - Test for query with no perimeter permissions is well structured.

This test correctly validates that without any perimeter permissions, querying returns no records.


20-36: LGTM - Client perimeter query test is properly implemented.

This test correctly validates that when a user has client permissions, querying only returns records with the is_client flag set to true.


38-59: LGTM - Overlayed perimeter test checks correct record count.

This test verifies that when shared and client permissions are both active, the query returns records matching either is_shared or is_client flags (100 records total).


61-83: LGTM - Overlayed perimeter with distant perimeter test is properly implemented.

This test validates that when shared and own permissions are active, the queried method correctly returns both is_shared and is_own records (100 total).


85-106: LGTM - Test for only shared overlay perimeter is well structured.

This test correctly verifies that when only shared permissions are active, only is_shared records are returned (50 total).


108-130: LGTM - Isolated query test verifies correct behavior.

This test properly checks that when queries are isolated (default behavior) and a base query specifies is_client=true, only the shared records that are also client records are returned.


132-156: LGTM - Non-isolated query test verifies correct behavior.

This test properly checks that when queries are not isolated and a base query specifies is_client=true, all records (including ones that don't match the client filter) are returned.

src/Controls/Control.php (11)

15-28: LGTM - Static properties for control resolution are well defined.

The static properties for control name resolution and namespace are properly defined with clear docblocks.


30-38: LGTM - Simplified perimeters method returns empty array by default.

This change allows extending classes to override the method to provide custom perimeters.


40-59: LGTM - The applies method is well implemented.

The method properly:

  1. Iterates through perimeters
  2. Checks if perimeter allows the user
  3. Fast-returns true for non-existent models (e.g., during 'create' operations)
  4. Applies the should callback to determine specific permissions
  5. Handles overlay perimeters correctly

61-74: LGTM - Queried method properly handles isolated queries.

The method correctly implements isolation based on configuration and delegates to applyQueryControl for the actual query modification.


76-95: LGTM - Query control application logic is well implemented.

The method properly handles:

  1. Setting up a default no-result callback
  2. Iterating through perimeters
  3. Applying query callbacks for allowed perimeters
  4. Handling overlay perimeters correctly

This implementation ensures that query results are properly filtered based on user permissions.


97-100: LGTM - No result query helper is simple and effective.

The method appropriately uses a raw SQL condition that always evaluates to false to ensure no results are returned.


102-112: Add validation for the control name resolver callback.

The guessControlNamesUsing method should validate that the provided callback returns a valid control class name to prevent runtime errors.

 public static function guessControlNamesUsing(callable $callback): void
 {
+    $testResult = $callback('TestModel');
+    if (!is_string($testResult) || !class_exists($testResult)) {
+        throw new \InvalidArgumentException('Control name resolver must return a valid control class name');
+    }
     static::$controlNameResolver = $callback;
 }

114-128: LGTM - Control for model factory method is well implemented.

The static factory method properly resolves the control name and creates a new instance of the appropriate control class.


130-138: LGTM - Static factory method for instantiation is properly implemented.

The static new() method follows the factory pattern consistently used throughout the codebase.


140-162: LGTM - Control name resolution logic is comprehensive.

The resolveControlName method properly:

  1. Uses the custom resolver if provided
  2. Falls back to a default resolver that:
    • Gets the application namespace
    • Handles models within or outside the Models namespace
    • Constructs the control name with the proper namespace

164-178: LGTM - Application namespace resolution is properly implemented with error handling.

The method safely gets the application namespace and falls back to 'App\' if any exceptions occur.

src/Perimeters/Perimeter.php (5)

11-14: LGTM - Protected callback properties are properly defined.

The properties for storing callback closures are properly defined with type declarations.


16-29: LGTM - Callback application methods are well implemented.

These methods properly:

  1. Execute the stored callback closures
  2. Pass the appropriate parameters
  3. Return the expected values

31-50: LGTM - Callback setter methods enable fluent interface.

The methods for setting callback closures:

  1. Store the provided callback
  2. Return $this to enable method chaining
  3. Follow a consistent pattern

52-60: LGTM - Static factory method is properly implemented.

The static new() method follows the factory pattern consistently used throughout the codebase.


62-68: LGTM - Overlays method defines default overlay behavior.

The overlays() method returns false by default, indicating that perimeters don't overlay unless specifically designed to do so (like in OverlayPerimeter).

tests/Support/Access/Controls/ModelControl.php (2)

27-29: Inconsistent logic in SharedPerimeter's should callback

The SharedPerimeter uses a different validation logic ($method.'_shared') compared to other perimeters which use the extracted $shouldCallback. Either document why this inconsistency exists or consider unifying the approach.

Does the SharedPerimeter specifically need to check for method names with the "_shared" suffix? If not, consider using the same callback for consistency:

            ->should(function (Model $user, string $method, Model $model) {
-                return in_array($method.'_shared', explode(',', $model->allowed_methods));
+                return in_array($method, explode(',', $model->allowed_methods));
            })

15-57: Improvements implemented per previous review comments

The changes incorporate many improvements suggested in previous reviews:

  1. The common should callback has been extracted to reduce duplication
  2. in_array with explode is now used for more reliable method validation
  3. All query callbacks properly return the updated query

Good job implementing these improvements.

Comment on lines +30 to +32
->query(function (Builder $query, Model $user) {
return $query->orWhere('is_shared', true);
}),
Copy link

@coderabbitai coderabbitai bot Apr 3, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue

Potential query logic issue with orWhere conditions

All perimeters use orWhere conditions which can lead to unexpected results when combined with other query constraints. Using orWhere makes each condition an alternative path rather than an additional filter.

If these conditions should be alternatives (OR logic), consider using a query scope or wrapping them in a where closure. If they should be additive (AND logic), use where instead of orWhere:

            ->query(function (Builder $query, Model $user) {
-                return $query->orWhere('is_shared', true);
+                return $query->where('is_shared', true);
            }),

If OR logic is truly intended, use query scopes or where closures to isolate the OR conditions:

            ->query(function (Builder $query, Model $user) {
-                return $query->orWhere('is_shared', true);
+                return $query->where(function($q) {
+                    $q->orWhere('is_shared', true);
+                });
            }),

Also applies to: 38-40, 46-48, 54-56

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@coderabbitai I added many changes to this PR please do it from the beginning

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🧩 Analysis chain

🏁 Script executed:

#!/bin/bash
# Get the latest PR details
gh pr view 5 --json files,title,body

# Check the current implementation of ModelControl.php
cat tests/Support/Access/Controls/ModelControl.php

# Check the Control base class implementation
cat src/Controls/Control.php

# Check perimeter implementations
cat src/Perimeters/Perimeter.php
cat tests/Support/Access/Perimeters/SharedPerimeter.php
cat tests/Support/Access/Perimeters/ClientPerimeter.php
cat tests/Support/Access/Perimeters/GlobalPerimeter.php
cat tests/Support/Access/Perimeters/OwnPerimeter.php

# Check if there are any tests that verify the querying behavior
ls -la tests/Feature/
cat tests/Feature/ControlsQueryTest.php 2>/dev/null || echo "File not found"

Length of output: 19255


@GautierDele I'll start my review fresh as you requested. Looking at the current code, I can see that your PR includes a complete rework of the package with a new perimeter-based approach.

The current implementation in ModelControl uses orWhere conditions in all perimeter query callbacks, but I see this is intentional by design and is properly handled in the Control class. The queried() method in the base Control class automatically wraps these conditions in a where closure when the access-control.queries.isolated config is true (which is the default behavior).

Your tests in ControlsQueryTest.php clearly demonstrate this works correctly, with separate test cases for both isolated and non-isolated queries. The OR logic between perimeters (especially with the SharedPerimeter that extends OverlayPerimeter) is well thought out and thoroughly tested.

This architecture is much more flexible and maintainable than the previous implementation. Are there any specific aspects of the new design you'd like me to focus on in my review?


🧬 Code Definitions Used

Relevant Code Snippets

1. OwnPerimeter Class

  • Filename: tests/Support/Access/Perimeters/OwnPerimeter.php
  • Line Range: 7-9
class OwnPerimeter extends Perimeter
{
}
  • Description: This class extends the Perimeter class, which is likely used in the ModelControl class to define specific access control logic.

2. ClientPerimeter Class

  • Filename: tests/Support/Access/Perimeters/ClientPerimeter.php
  • Line Range: 7-9
class ClientPerimeter extends Perimeter
{
}
  • Description: This class extends the Perimeter class, similar to OwnPerimeter, and is utilized in the ModelControl class for access control.

3. GlobalPerimeter Class

  • Filename: tests/Support/Access/Perimeters/GlobalPerimeter.php
  • Line Range: 7-9
class GlobalPerimeter extends Perimeter
{
}
  • Description: This class also extends the Perimeter class and is part of the access control mechanisms in the ModelControl class.

4. SharedPerimeter Class

  • Filename: tests/Support/Access/Perimeters/SharedPerimeter.php
  • Line Range: 7-9
class SharedPerimeter extends OverlayPerimeter
{
}
  • Description: This class extends OverlayPerimeter and is used in the ModelControl class to manage shared access control.

5. Control Class

  • Filename: src/Controls/Control.php
  • Line Range: 13-179
class Control
{
    // @TODO: scout queried
    /**
     * The control name resolver.
     *
     * @var callable
     */
    protected static $controlNameResolver;

    /**
     * The default namespace where control reside.
     *
     * @var string
     */
    public static $namespace = 'App\\Access\\Controls\\';

    /**
     * Get the perimeters for the current control.
     *
     * @return array<Perimeter>
     */
    protected function perimeters(): array
    {
        return [];
    }

    public function applies(Model $user, string $method, Model $model): bool
    {
        foreach ($this->perimeters() as $perimeter) {
            if ($perimeter->applyAllowedCallback($user)) {
                // If the model doesn't exists, it means the method is not related to a model
                // so we don't need to activate the should result since we can't compare an existing model
                if (!$model->exists) {
                    return true;
                }

                $should = $perimeter->applyShouldCallback($user, $method, $model);

                if (!$perimeter->overlays() || $should) {
                    return $should;
                }
            }
        }

        return false;
    }

    public function queried(Builder $query, Model $user): Builder
    {
        $callback = function (Builder $query, Model $user) {
            return $this->applyQueryControl($query, $user);
        };

        if (config('access-control.queries.isolated')) {
            return $query->where(function (Builder $query) use ($user, $callback) {
                $callback($query, $user);
            });
        }

        return $callback($query, $user);
    }

    protected function applyQueryControl(Builder $query, Model $user): Builder
    {
        $noResultCallback = function (Builder $query) {
            return $this->noResultQuery($query);
        };

        foreach ($this->perimeters() as $perimeter) {
            if ($perimeter->applyAllowedCallback($user)) {
                $query = $perimeter->applyQueryCallback($query, $user);

                $noResultCallback = function ($query) {return $query; };

                if (!$perimeter->overlays()) {
                    return $query;
                }
            }
        }

        return $noResultCallback($query);
    }

    protected function noResultQuery(Builder $query): Builder
    {
        return $query->whereRaw('0=1');
    }

    /**
     * Specify the callback that should be invoked to guess control names.
     *
     * @param callable(class-string<\Illuminate\Database\Eloquent\Model>): class-string<\Lomkit\Access\Controls\Control> $callback
     *
     * @return void
     */
    public static function guessControlNamesUsing(callable $callback): void
    {
        static::$controlNameResolver = $callback;
    }

    /**
     * Get a new control instance for the given model name.
     *
     * @template TClass of \Illuminate\Database\Eloquent\Model
     *
     * @param class-string<TClass> $modelName
     *
     * @return \Lomkit\Access\Controls\Control<TClass>
     */
    public static function controlForModel(string $modelName): self
    {
        $control = static::resolveControlName($modelName);

        return $control::new();
    }

    /**
     * Get a new control instance for the given attributes.
     *
     * @return static
     */
    public static function new(): self
    {
        return new static();
    }

    /**
     * Get the control name for the given model name.
     *
     * @template TClass of \Illuminate\Database\Eloquent\Model
     *
     * @param class-string<TClass> $modelName
     *
     * @return class-string<\Lomkit\Access\Controls\Control<TClass>>
     */
    public static function resolveControlName(string $modelName): string
    {
        $resolver = static::$controlNameResolver ?? function (string $modelName) {
            $appNamespace = static::appNamespace();

            $modelName = Str::startsWith($modelName, $appNamespace.'Models\\')
                ? Str::after($modelName, $appNamespace.'Models\\')
                : Str::after($modelName, $appNamespace);

            return static::$namespace.$modelName.'Control';
        };

        return $resolver($modelName);
    }

    /**
     * Get the application namespace for the application.
     *
     * @return string
     */
    protected static function appNamespace(): string
    {
        try {
            return Container::getInstance()
                ->make(Application::class)
                ->getNamespace();
        } catch (Throwable) {
            return 'App\\';
        }
    }
}
  • Description: This class provides the base functionality for access control, including methods for applying perimeters and querying based on user permissions.

6. perimeters Method in Control Class

  • Filename: src/Controls/Control.php
  • Line Range: 35-38
protected function perimeters(): array
{
    return [];
}
  • Description: This method is intended to return an array of perimeters for the control, which is overridden in the ModelControl class to provide specific access control logic.

7. new Method in Control Class

  • Filename: src/Controls/Control.php
  • Line Range: 135-138
public static function new(): self
{
    return new static();
}
  • Description: This static method creates a new instance of the control class, which is used in the ModelControl class for instantiation.

These snippets provide context and functionality related to the ModelControl class and its access control mechanisms.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants