namespace Nette\Security
Class Permission
Access control list (ACL) functionality and privileges management.
This solution is mostly based on Zend_Acl © Zend Technologies USA Inc. (http://www.zend.com), new BSD license
- Nette\Object
-
Nette\Security\Permission implements IAuthorizator
Author: David Grudl
Located at /Security/Permission.php
public
Permission
|
#
addRole(
string
$role,
string|array
$parents = NULL
)
Adds a Role to the list. Adds a Role to the list. The $parents parameter may be a Role identifier (or array of identifiers) to indicate the Roles from which the newly added Role will directly inherit. In order to resolve potential ambiguities with conflicting rules inherited from different parents, the most recently added parent takes precedence over parents that were previously added. In other words, the first parent added will have the least priority, and the last parent added will have the highest priority. Parameters$role string$parents string|arrayReturnsPermission provides a fluent interface
Throws |
public
bool
|
#
hasRole(
string
$role
)
Returns TRUE if the Role exists in the list. Returns TRUE if the Role exists in the list. Parameters$role string |
public
array
|
#
getRoleParents(
string
$role
)
Returns an array of an existing Role's parents. Returns an array of an existing Role's parents. The parent Roles are ordered in this array by ascending priority. The highest priority parent Role, last in the array, corresponds with the parent Role most recently added. If the Role does not have any parents, then an empty array is returned. Parameters$role string |
public
bool
|
#
roleInheritsFrom(
string
$role,
string
$inherit,
boolean
$onlyParents = false
)
Returns TRUE if $role inherits from $inherit. Returns TRUE if $role inherits from $inherit. If $onlyParents is TRUE, then $role must inherit directly from $inherit in order to return TRUE. By default, this method looks through the entire inheritance DAG to determine whether $role inherits from $inherit through its ancestor Roles. Parameters$role string$inherit string$onlyParents booleanThrows |
public
Permission
|
#
removeRole(
string
$role
)
Removes the Role from the list. Removes the Role from the list. Parameters$role stringReturnsPermission provides a fluent interface
Throws |
public
Permission
|
#
removeAllRoles(
)
Removes all Roles from the list. Removes all Roles from the list. ReturnsPermission provides a fluent interface
|
public
Permission
|
#
addResource(
string
$resource,
string
$parent = NULL
)
Adds a Resource having an identifier unique to the list. Adds a Resource having an identifier unique to the list. Parameters$resource string$parent stringReturnsPermission provides a fluent interface
Throws |
public
bool
|
#
hasResource(
string
$resource
)
Returns TRUE if the Resource exists in the list. Returns TRUE if the Resource exists in the list. Parameters$resource string |
public
bool
|
#
resourceInheritsFrom(
string
$resource,
string
$inherit,
boolean
$onlyParent = false
)
Returns TRUE if $resource inherits from $inherit. Returns TRUE if $resource inherits from $inherit. If $onlyParents is TRUE, then $resource must inherit directly from $inherit in order to return TRUE. By default, this method looks through the entire inheritance tree to determine whether $resource inherits from $inherit through its ancestor Resources. Parameters$resource string$inherit string$onlyParent booleanThrows |
public
Permission
|
#
removeResource(
string
$resource
)
Removes a Resource and all of its children. Removes a Resource and all of its children. Parameters$resource stringReturnsPermission provides a fluent interface
Throws |
public
Permission
|
#
removeAllResources(
)
Removes all Resources. Removes all Resources. ReturnsPermission provides a fluent interface
|
public
Permission
|
#
allow(
string|array|Permission::ALL
$roles = NULL,
string|array|Permission::ALL
$resources = NULL,
string|array|Permission::ALL
$privileges = NULL,
callback
$assertion = NULL
)
Adds an „allow“ rule to the list. A rule is added that would allow one Adds an „allow“ rule to the list. A rule is added that would allow one or more Roles access to [certain $privileges upon] the specified Resource(s). If either $roles or $resources is Permission::ALL, then the rule applies to all Roles or all Resources, respectively. Both may be Permission::ALL in order to work with the default rule of the ACL. The $privileges parameter may be used to further specify that the rule applies only to certain privileges upon the Resource(s) in question. This may be specified to be a single privilege with a string, and multiple privileges may be specified as an array of strings. If $assertion is provided, then its assert() method must return TRUE in order for the rule to apply. If $assertion is provided with $roles, $resources, and $privileges all equal to NULL, then a rule will imply a type of DENY when the rule's assertion fails. Parameters$roles string|array|Permission::ALL roles$resources string|array|Permission::ALL resources$privileges string|array|Permission::ALL privileges$assertion callback assertionReturnsPermission provides a fluent interface
|
public
Permission
|
#
deny(
string|array|Permission::ALL
$roles = NULL,
string|array|Permission::ALL
$resources = NULL,
string|array|Permission::ALL
$privileges = NULL,
callback
$assertion = NULL
)
Adds a „deny“ rule to the list. A rule is added that would deny one Adds a „deny“ rule to the list. A rule is added that would deny one or more Roles access to [certain $privileges upon] the specified Resource(s). If either $roles or $resources is Permission::ALL, then the rule applies to all Roles or all Resources, respectively. Both may be Permission::ALL in order to work with the default rule of the ACL. The $privileges parameter may be used to further specify that the rule applies only to certain privileges upon the Resource(s) in question. This may be specified to be a single privilege with a string, and multiple privileges may be specified as an array of strings. If $assertion is provided, then its assert() method must return TRUE in order for the rule to apply. If $assertion is provided with $roles, $resources, and $privileges all equal to NULL, then a rule will imply a type of ALLOW when the rule's assertion fails. Parameters$roles string|array|Permission::ALL roles$resources string|array|Permission::ALL resources$privileges string|array|Permission::ALL privileges$assertion callback assertionReturnsPermission provides a fluent interface
|
public
Permission
|
#
removeAllow(
string|array|Permission::ALL
$roles = NULL,
string|array|Permission::ALL
$resources = NULL,
string|array|Permission::ALL
$privileges = NULL
)
Removes „allow“ permissions from the list. The rule is removed only in the context Removes „allow“ permissions from the list. The rule is removed only in the context of the given Roles, Resources, and privileges. Existing rules to which the remove operation does not apply would remain in the Parameters$roles string|array|Permission::ALL roles$resources string|array|Permission::ALL resources$privileges string|array|Permission::ALL privilegesReturnsPermission provides a fluent interface
|
public
Permission
|
#
removeDeny(
string|array|Permission::ALL
$roles = NULL,
string|array|Permission::ALL
$resources = NULL,
string|array|Permission::ALL
$privileges = NULL
)
Removes „deny“ restrictions from the list. The rule is removed only in the context Removes „deny“ restrictions from the list. The rule is removed only in the context of the given Roles, Resources, and privileges. Existing rules to which the remove operation does not apply would remain in the Parameters$roles string|array|Permission::ALL roles$resources string|array|Permission::ALL resources$privileges string|array|Permission::ALL privilegesReturnsPermission provides a fluent interface
|
protected
Permission
|
#
setRule(
bool
$toAdd,
bool
$type,
string|array|Permission::ALL
$roles,
string|array|Permission::ALL
$resources,
string|array|Permission::ALL
$privileges,
callback
$assertion = NULL
)
Performs operations on Access Control List rules. Performs operations on Access Control List rules. Parameters$toAdd bool operation add?$type bool type$roles string|array|Permission::ALL roles$resources string|array|Permission::ALL resources$privileges string|array|Permission::ALL privileges$assertion callback assertionReturnsPermission provides a fluent interface
Throws |
public
bool
|
#
isAllowed(
string|Permission::ALL|IRole
$role = NULL,
string|Permission::ALL|IResource
$resource = NULL,
string|Permission::ALL
$privilege = NULL
)
Returns TRUE if and only if the Role has access to the Resource. Returns TRUE if and only if the Role has access to the Resource. If either $role or $resource is Permission::ALL, then the query applies to all Roles or all Resources, respectively. Both may be Permission::ALL to query whether the ACL has a „blacklist“ rule (allow everything to all). By default, Permission creates a „whitelist“ rule (deny everything to all), and this method would return FALSE unless this default has been overridden (i.e., by executing $acl->allow()). If a $privilege is not provided, then this method returns FALSE if and only if the Role is denied access to at least one privilege upon the Resource. In other words, this method returns TRUE if and only if the Role is allowed all privileges on the Resource. This method checks Role inheritance using a depth-first traversal of the Role list. The highest priority parent (i.e., the parent most recently added) is checked first, and its respective parents are checked similarly before the lower-priority parents of the Role are checked. Parameters$role string|Permission::ALL|IRole role$resource string|Permission::ALL|IResource resource$privilege string|Permission::ALL privilegeThrowsImplementation of |
public
mixed
|
#
getQueriedRole(
)
Returns real currently queried Role. Use by assertion. Returns real currently queried Role. Use by assertion. |
public
mixed
|
#
getQueriedResource(
)
Returns real currently queried Resource. Use by assertion. Returns real currently queried Resource. Use by assertion. |