@@ 412-423 (lines=12) @@ | ||
409 | self::$log[] = $key.' match with ACL rule id '.$rule->getPK().' denies access for '.$module.'/'.$action.$extra; |
|
410 | $access = false; |
|
411 | break; |
|
412 | case 'own': |
|
413 | if (call_user_func_array($ownerCallback, [$uid, $usergroup])) { |
|
414 | self::$log[] = $key.' match with ACL rule id '.$rule->getPK().' allows access for '.$module.'/'.$action.$extra.' (owner)'; |
|
415 | $access = true; |
|
416 | $isWildcard = $rule->extra == '*'; |
|
417 | break 2; |
|
418 | } else { |
|
419 | self::$log[] = $key.' match with ACL rule id '.$rule->getPK().' denies access for '.$module.'/'.$action.$extra.' (owner)'; |
|
420 | // TODO: or inherit? |
|
421 | $access = false; |
|
422 | } |
|
423 | break; |
|
424 | case 'parent': |
|
425 | if (call_user_func_array($parentCallback, [$uid, $usergroup])) { |
|
426 | self::$log[] = $key.' match with ACL rule id '.$rule->getPK().' allows access for '.$module.'/'.$action.$extra.' (parent)'; |
|
@@ 424-435 (lines=12) @@ | ||
421 | $access = false; |
|
422 | } |
|
423 | break; |
|
424 | case 'parent': |
|
425 | if (call_user_func_array($parentCallback, [$uid, $usergroup])) { |
|
426 | self::$log[] = $key.' match with ACL rule id '.$rule->getPK().' allows access for '.$module.'/'.$action.$extra.' (parent)'; |
|
427 | $access = true; |
|
428 | $isWildcard = $rule->extra == '*'; |
|
429 | break 2; |
|
430 | } else { |
|
431 | self::$log[] = $key.' match with ACL rule id '.$rule->getPK().' denies access for '.$module.'/'.$action.$extra.' (parent)'; |
|
432 | // TODO: or inherit? |
|
433 | $access = false; |
|
434 | } |
|
435 | break; |
|
436 | case 'allow': |
|
437 | self::$log[] = $key.' match with ACL rule id '.$rule->getPK().' allows access for '.$module.'/'.$action.$extra; |
|
438 | $access = true; |