1 | <?php |
||
24 | class PermissionCriterionResolver implements APIPermissionCriterionResolver |
||
25 | { |
||
26 | /** @var \eZ\Publish\API\Repository\PermissionResolver */ |
||
27 | private $permissionResolver; |
||
28 | |||
29 | /** @var \eZ\Publish\Core\Repository\Permission\LimitationService */ |
||
30 | private $limitationService; |
||
31 | |||
32 | /** |
||
33 | * Constructor. |
||
34 | * |
||
35 | * @param \eZ\Publish\API\Repository\PermissionResolver $permissionResolver |
||
36 | * @param \eZ\Publish\Core\Repository\Permission\LimitationService $limitationService |
||
37 | */ |
||
38 | public function __construct( |
||
45 | |||
46 | /** |
||
47 | * Get permission criteria if needed and return false if no access at all. |
||
48 | * |
||
49 | * @uses \eZ\Publish\API\Repository\PermissionResolver::getCurrentUserReference() |
||
50 | * @uses \eZ\Publish\API\Repository\PermissionResolver::hasAccess() |
||
51 | * |
||
52 | * @param string $module |
||
53 | * @param string $function |
||
54 | * @param array $targets |
||
55 | * |
||
56 | * @return bool|\eZ\Publish\API\Repository\Values\Content\Query\Criterion |
||
57 | */ |
||
58 | public function getPermissionsCriterion(string $module = 'content', string $function = 'read', ?array $targets = null) |
||
59 | { |
||
60 | $permissionSets = $this->permissionResolver->hasAccess($module, $function); |
||
61 | if (is_bool($permissionSets)) { |
||
62 | return $permissionSets; |
||
63 | } |
||
64 | |||
65 | if (empty($permissionSets)) { |
||
66 | throw new RuntimeException("Received an empty array of limitations from hasAccess( '{$module}', '{$function}' )"); |
||
67 | } |
||
68 | |||
69 | /* |
||
70 | * RoleAssignment is a OR condition, so is policy, while limitations is a AND condition |
||
71 | * |
||
72 | * If RoleAssignment has limitation then policy OR conditions are wrapped in a AND condition with the |
||
73 | * role limitation, otherwise it will be merged into RoleAssignment's OR condition. |
||
74 | */ |
||
75 | $currentUserRef = $this->permissionResolver->getCurrentUserReference(); |
||
76 | $roleAssignmentOrCriteria = []; |
||
77 | foreach ($permissionSets as $permissionSet) { |
||
78 | // $permissionSet is a RoleAssignment, but in the form of role limitation & role policies hash |
||
79 | $policyOrCriteria = []; |
||
80 | /** @var \eZ\Publish\API\Repository\Values\User\Policy */ |
||
81 | foreach ($permissionSet['policies'] as $policy) { |
||
82 | $limitations = $policy->getLimitations(); |
||
83 | if (empty($limitations)) { |
||
84 | // Given policy gives full access, optimize away all role policies (but not role limitation if any) |
||
85 | // This should be optimized on create/update of Roles, however we keep this here for bc with older data |
||
86 | $policyOrCriteria = []; |
||
87 | break; |
||
88 | } |
||
89 | |||
90 | $limitationsAndCriteria = []; |
||
91 | foreach ($limitations as $limitation) { |
||
92 | $limitationsAndCriteria[] = $this->getCriterionForLimitation($limitation, $currentUserRef, $targets); |
||
93 | } |
||
94 | |||
95 | $policyOrCriteria[] = isset($limitationsAndCriteria[1]) ? |
||
96 | new LogicalAnd($limitationsAndCriteria) : |
||
97 | $limitationsAndCriteria[0]; |
||
98 | } |
||
99 | |||
100 | /** |
||
101 | * Apply role limitations if there is one. |
||
102 | * |
||
103 | * @var \eZ\Publish\API\Repository\Values\User\Limitation[] |
||
104 | */ |
||
105 | if ($permissionSet['limitation'] instanceof Limitation) { |
||
106 | // We need to match both the limitation AND *one* of the policies, aka; roleLimit AND policies(OR) |
||
107 | if (!empty($policyOrCriteria)) { |
||
108 | $criterion = $this->getCriterionForLimitation($permissionSet['limitation'], $currentUserRef, $targets); |
||
109 | $roleAssignmentOrCriteria[] = new LogicalAnd( |
||
110 | [ |
||
111 | $criterion, |
||
112 | isset($policyOrCriteria[1]) ? new LogicalOr($policyOrCriteria) : $policyOrCriteria[0], |
||
113 | ] |
||
114 | ); |
||
115 | } else { |
||
116 | $roleAssignmentOrCriteria[] = $this->getCriterionForLimitation( |
||
117 | $permissionSet['limitation'], $currentUserRef, $targets |
||
118 | ); |
||
119 | } |
||
120 | } elseif (!empty($policyOrCriteria)) { |
||
121 | // Otherwise merge $policyOrCriteria into $roleAssignmentOrCriteria |
||
122 | // There is no role limitation, so any of the policies can globally match in the returned OR criteria |
||
123 | $roleAssignmentOrCriteria = empty($roleAssignmentOrCriteria) ? |
||
124 | $policyOrCriteria : |
||
125 | array_merge($roleAssignmentOrCriteria, $policyOrCriteria); |
||
126 | } |
||
127 | } |
||
128 | |||
129 | if (empty($roleAssignmentOrCriteria)) { |
||
130 | return false; |
||
131 | } |
||
132 | |||
133 | return isset($roleAssignmentOrCriteria[1]) ? |
||
134 | new LogicalOr($roleAssignmentOrCriteria) : |
||
135 | $roleAssignmentOrCriteria[0]; |
||
136 | } |
||
137 | |||
138 | /** |
||
139 | * @param \eZ\Publish\API\Repository\Values\User\Limitation $limitation |
||
140 | * @param \eZ\Publish\API\Repository\Values\User\UserReference $currentUserRef |
||
141 | * @param array|null $targets |
||
142 | * |
||
143 | * @return \eZ\Publish\API\Repository\Values\Content\Query\CriterionInterface|\eZ\Publish\API\Repository\Values\Content\Query\Criterion\LogicalOperator |
||
144 | */ |
||
145 | private function getCriterionForLimitation(Limitation $limitation, UserReference $currentUserRef, ?array $targets): CriterionInterface |
||
154 | } |
||
155 |