HEX
Server: LiteSpeed
System: Linux d8 4.18.0-553.121.1.lve.el8.x86_64 #1 SMP Thu Apr 30 16:40:41 UTC 2026 x86_64
User: wbwebdes (3015)
PHP: 8.1.31
Disabled: exec,system,passthru,shell_exec,proc_close,proc_open,dl,popen,show_source,posix_kill,posix_mkfifo,posix_getpwuid,posix_setpgid,posix_setsid,posix_setuid,posix_setgid,posix_seteuid,posix_setegid,posix_uname
Upload Files
File: /home/wbwebdes/domains/uren-registratie.blankevoort.net/private_html/src/Voter/ReportingVoter.php
<?php

/*
 * This file is part of the Kimai time-tracking app.
 *
 * For the full copyright and license information, please view the LICENSE
 * file that was distributed with this source code.
 */

namespace App\Voter;

use App\Entity\User;
use App\Security\RolePermissionManager;
use Symfony\Component\Security\Core\Authentication\Token\TokenInterface;
use Symfony\Component\Security\Core\Authorization\Voter\Voter;

/**
 * @extends Voter<string, null>
 */
final class ReportingVoter extends Voter
{
    private const ALLOWED_ATTRIBUTES = [
        'report:customer',
        'report:other',
        'report:project',
        'report:user',
    ];

    public function __construct(private readonly RolePermissionManager $permissionManager)
    {
    }

    public function supportsAttribute(string $attribute): bool
    {
        return \in_array($attribute, self::ALLOWED_ATTRIBUTES, true);
    }

    public function supportsType(string $subjectType): bool
    {
        return $subjectType === 'null';
    }

    protected function supports(string $attribute, mixed $subject): bool
    {
        return $subject === null && $this->supportsAttribute($attribute);
    }

    protected function voteOnAttribute(string $attribute, mixed $subject, TokenInterface $token): bool
    {
        $user = $token->getUser();

        if (!$user instanceof User) {
            return false;
        }

        $permissions = ['view_reporting'];

        switch ($attribute) {
            case 'report:customer':
                $permissions[] = 'customer_reporting';
                break;

            case 'report:other':
                $permissions[] = 'view_other_reporting';
                $permissions[] = 'view_other_timesheet';
                break;

            case 'report:project':
                $permissions[] = 'project_reporting';
                break;

            case 'report:user':
                // own reports are always allowed if reporting can be accessed
                break;
        }

        foreach ($permissions as $permission) {
            if (!$this->permissionManager->hasRolePermission($user, $permission)) {
                return false;
            }
        }

        return true;
    }
}