Dynamic-extract is a powerful database query extract to Excel and CSV manager for laravel PHP framework with elegant view without additional code.
- Powerful, Simple & fast
- Robust background job processing (queues)
- Login session (Laravel Auth or built-in verfication token)
- Dynamic filters
- Notifications
- Preview data
Imagine that you have an application with a database and you are responsible for creating reports via SQL queries for different users or departments. This package will help you manage access and perform some of the more complex database tasks on the end user, without the end user having database knowledge.
Parameter | Verson | Description |
---|---|---|
php |
^7.3 or ^8.0 |
Required |
laravel/framework |
^8.75 |
Required |
maatwebsite/excel |
^3.1 |
Required |
Install with composer
composer require enhacudima/dynamic-extract
php artisan dynamic-extract:install
- Date range
- Search field
- Dropdown field
- Group by
- Select table columuns
- Less than
- Greater than
php artisan dynamic-extract:tables
php artisan dynamic-extract:tables-list
php artisan dynamic-extract:access
php artisan dynamic-extract:access-list
php artisan dynamic-extract:access-revoke {email}
php artisan dynamic-extract:delete-exported
You don't need to run the commands on first installation
php artisan migrate --path=/vendor/enhacudima/dynamic-extract/src/DataBase/Migration
php artisan vendor:publish --provider="Enhacudima\DynamicExtract\Providers\DynamicExtractServiceProvider" --tag="config"
All configuration well be place on config file at app/config/dynamic-extract.php. after modification please run
php artisan config:cache
Parameter | type | Description |
---|---|---|
auth |
boolean |
If is true you must implement Laravel Auth |
prefix |
array |
Prefix your route name and extracted folder name |
(Permission)- permissions |
string |
Example: table_view |
(Permission) - middleware |
array |
Example: web |
permissions |
array |
Set your permissions based on your application premissions |
If you discover a security vulnerability, please send an e-mail to [email protected]. All security vulnerabilities will be promptly addressed.
licensed under the MIT license.