| Total Complexity | 96 |
| Total Lines | 724 |
| Duplicated Lines | 0 % |
| Changes | 0 | ||
Complex classes like Permission often do a lot of different things. To break such a class down, we need to identify a cohesive component within that class. A common approach to find such a component is to look for fields/methods that share the same prefixes, or suffixes.
Once you have determined the fields that belong together, you can apply the Extract Class refactoring. If the component makes sense as a sub-class, Extract Subclass is also a candidate, and is often faster.
While breaking up the class, it is a good idea to analyze how other classes use Permission, and based on these observations, apply Extract Interface, too.
| 1 | <?php |
||
| 24 | class Permission extends DataObject implements TemplateGlobalProvider, Resettable, i18nEntityProvider |
||
| 25 | { |
||
| 26 | |||
| 27 | // the (1) after Type specifies the DB default value which is needed for |
||
| 28 | // upgrades from older SilverStripe versions |
||
| 29 | private static $db = [ |
||
|
|
|||
| 30 | "Code" => "Varchar(255)", |
||
| 31 | "Arg" => "Int", |
||
| 32 | "Type" => "Int(1)" |
||
| 33 | ]; |
||
| 34 | |||
| 35 | private static $has_one = [ |
||
| 36 | "Group" => Group::class, |
||
| 37 | ]; |
||
| 38 | |||
| 39 | private static $indexes = [ |
||
| 40 | "Code" => true |
||
| 41 | ]; |
||
| 42 | |||
| 43 | private static $defaults = [ |
||
| 44 | "Type" => 1 |
||
| 45 | ]; |
||
| 46 | |||
| 47 | private static $table_name = "Permission"; |
||
| 48 | |||
| 49 | /** |
||
| 50 | * This is the value to use for the "Type" field if a permission should be |
||
| 51 | * granted. |
||
| 52 | */ |
||
| 53 | const GRANT_PERMISSION = 1; |
||
| 54 | |||
| 55 | /** |
||
| 56 | * This is the value to use for the "Type" field if a permission should be |
||
| 57 | * denied. |
||
| 58 | */ |
||
| 59 | const DENY_PERMISSION = -1; |
||
| 60 | |||
| 61 | /** |
||
| 62 | * This is the value to use for the "Type" field if a permission should be |
||
| 63 | * inherited. |
||
| 64 | */ |
||
| 65 | const INHERIT_PERMISSION = 0; |
||
| 66 | |||
| 67 | |||
| 68 | /** |
||
| 69 | * Method to globally disable "strict" checking, which means a permission |
||
| 70 | * will be granted if the key does not exist at all. |
||
| 71 | * |
||
| 72 | * @deprecated 4.4.0 |
||
| 73 | * @var array |
||
| 74 | */ |
||
| 75 | private static $declared_permissions = null; |
||
| 76 | |||
| 77 | /** |
||
| 78 | * Linear list of declared permissions in the system. |
||
| 79 | * |
||
| 80 | * @deprecated 4.4.0 |
||
| 81 | * @var array |
||
| 82 | */ |
||
| 83 | private static $declared_permissions_list = null; |
||
| 84 | |||
| 85 | /** |
||
| 86 | * @config |
||
| 87 | * @var $strict_checking Boolean Method to globally disable "strict" checking, |
||
| 88 | * which means a permission will be granted if the key does not exist at all. |
||
| 89 | */ |
||
| 90 | private static $strict_checking = true; |
||
| 91 | |||
| 92 | /** |
||
| 93 | * Set to false to prevent the 'ADMIN' permission from implying all |
||
| 94 | * permissions in the system |
||
| 95 | * |
||
| 96 | * @config |
||
| 97 | * @var bool |
||
| 98 | */ |
||
| 99 | private static $admin_implies_all = true; |
||
| 100 | |||
| 101 | /** |
||
| 102 | * a list of permission codes which doesn't appear in the Permission list |
||
| 103 | * when make the {@link PermissionCheckboxSetField} |
||
| 104 | * @config |
||
| 105 | * @var array; |
||
| 106 | */ |
||
| 107 | private static $hidden_permissions = []; |
||
| 108 | |||
| 109 | /** |
||
| 110 | * @config These permissions can only be applied by ADMIN users, to prevent |
||
| 111 | * privilege escalation on group assignments and inheritance. |
||
| 112 | * @var array |
||
| 113 | */ |
||
| 114 | private static $privileged_permissions = [ |
||
| 115 | 'ADMIN', |
||
| 116 | 'APPLY_ROLES', |
||
| 117 | 'EDIT_PERMISSIONS' |
||
| 118 | ]; |
||
| 119 | |||
| 120 | /** |
||
| 121 | * Check that the current member has the given permission. |
||
| 122 | * |
||
| 123 | * @param string|array $code Code of the permission to check (case-sensitive) |
||
| 124 | * @param string $arg Optional argument (e.g. a permissions for a specific page) |
||
| 125 | * @param int|Member $member Optional member instance or ID. If set to NULL, the permssion |
||
| 126 | * will be checked for the current user |
||
| 127 | * @param bool $strict Use "strict" checking (which means a permission |
||
| 128 | * will be granted if the key does not exist at all)? |
||
| 129 | * @return int|bool The ID of the permission record if the permission |
||
| 130 | * exists; FALSE otherwise. If "strict" checking is |
||
| 131 | * disabled, TRUE will be returned if the permission does not exist at all. |
||
| 132 | */ |
||
| 133 | public static function check($code, $arg = "any", $member = null, $strict = true) |
||
| 134 | { |
||
| 135 | if (!$member) { |
||
| 136 | if (!Security::getCurrentUser()) { |
||
| 137 | return false; |
||
| 138 | } |
||
| 139 | $member = Security::getCurrentUser(); |
||
| 140 | } |
||
| 141 | |||
| 142 | return self::checkMember($member, $code, $arg, $strict); |
||
| 143 | } |
||
| 144 | |||
| 145 | /** |
||
| 146 | * Permissions cache. The format is a map, where the keys are member IDs, and the values are |
||
| 147 | * arrays of permission codes. |
||
| 148 | */ |
||
| 149 | private static $cache_permissions = []; |
||
| 150 | |||
| 151 | /** |
||
| 152 | * Flush the permission cache, for example if you have edited group membership or a permission record. |
||
| 153 | * @todo Call this whenever Group_Members is added to or removed from |
||
| 154 | */ |
||
| 155 | public static function reset() |
||
| 158 | } |
||
| 159 | |||
| 160 | /** |
||
| 161 | * Check that the given member has the given permission. |
||
| 162 | * |
||
| 163 | * @param int|Member $member The ID of the member to check. Leave blank for the current member. |
||
| 164 | * Alternatively you can use a member object. |
||
| 165 | * @param string|array $code Code of the permission to check (case-sensitive) |
||
| 166 | * @param string $arg Optional argument (e.g. a permissions for a specific page) |
||
| 167 | * @param bool $strict Use "strict" checking (which means a permission |
||
| 168 | * will be granted if the key does not exist at all)? |
||
| 169 | * @return int|bool The ID of the permission record if the permission |
||
| 170 | * exists; FALSE otherwise. If "strict" checking is |
||
| 171 | * disabled, TRUE will be returned if the permission does not exist at all. |
||
| 172 | */ |
||
| 173 | public static function checkMember($member, $code, $arg = "any", $strict = true) |
||
| 174 | { |
||
| 175 | if (!$member) { |
||
| 176 | $member = Security::getCurrentUser(); |
||
| 177 | } |
||
| 178 | $memberID = ($member instanceof Member) ? $member->ID : $member; |
||
| 179 | |||
| 180 | if (!$memberID) { |
||
| 181 | return false; |
||
| 182 | } |
||
| 183 | |||
| 184 | // Turn the code into an array as we may need to add other permsissions to the set we check |
||
| 185 | if (!is_array($code)) { |
||
| 186 | $code = [$code]; |
||
| 187 | } |
||
| 188 | |||
| 189 | // Check if admin should be treated as holding all permissions |
||
| 190 | $adminImpliesAll = (bool)static::config()->admin_implies_all; |
||
| 191 | |||
| 192 | if ($arg == 'any') { |
||
| 193 | // Cache the permissions in memory |
||
| 194 | if (!isset(self::$cache_permissions[$memberID])) { |
||
| 195 | self::$cache_permissions[$memberID] = self::permissions_for_member($memberID); |
||
| 196 | } |
||
| 197 | foreach ($code as $permCode) { |
||
| 198 | if ($permCode === 'CMS_ACCESS') { |
||
| 199 | foreach (self::$cache_permissions[$memberID] as $perm) { |
||
| 200 | //if they have admin rights OR they have an explicit access to the CMS then give permission |
||
| 201 | if (($adminImpliesAll && $perm == 'ADMIN') || substr($perm ?? '', 0, 11) === 'CMS_ACCESS_') { |
||
| 202 | return true; |
||
| 203 | } |
||
| 204 | } |
||
| 205 | } elseif (substr($permCode ?? '', 0, 11) === 'CMS_ACCESS_' && !in_array('CMS_ACCESS_LeftAndMain', $code ?? [])) { |
||
| 206 | //cms_access_leftandmain means access to all CMS areas |
||
| 207 | $code[] = 'CMS_ACCESS_LeftAndMain'; |
||
| 208 | } |
||
| 209 | } |
||
| 210 | |||
| 211 | // if ADMIN has all privileges, then we need to push that code in |
||
| 212 | if ($adminImpliesAll) { |
||
| 213 | $code[] = "ADMIN"; |
||
| 214 | } |
||
| 215 | |||
| 216 | // Multiple $code values - return true if at least one matches, ie, intersection exists |
||
| 217 | return (bool)array_intersect($code ?? [], self::$cache_permissions[$memberID]); |
||
| 218 | } |
||
| 219 | |||
| 220 | // Code filters |
||
| 221 | $codeParams = is_array($code) ? $code : [$code]; |
||
| 222 | $codeClause = DB::placeholders($codeParams); |
||
| 223 | $adminParams = $adminImpliesAll ? ['ADMIN'] : []; |
||
| 224 | $adminClause = $adminImpliesAll ? ", ?" : ''; |
||
| 225 | |||
| 226 | // The following code should only be used if you're not using the "any" arg. This is kind |
||
| 227 | // of obsolete functionality and could possibly be deprecated. |
||
| 228 | $groupParams = self::groupList($memberID); |
||
| 229 | if (empty($groupParams)) { |
||
| 230 | return false; |
||
| 231 | } |
||
| 232 | $groupClause = DB::placeholders($groupParams); |
||
| 233 | |||
| 234 | // Arg component |
||
| 235 | $argClause = ""; |
||
| 236 | $argParams = []; |
||
| 237 | switch ($arg) { |
||
| 238 | case "any": |
||
| 239 | break; |
||
| 240 | case "all": |
||
| 241 | $argClause = " AND \"Arg\" = ?"; |
||
| 242 | $argParams = [-1]; |
||
| 243 | break; |
||
| 244 | default: |
||
| 245 | if (is_numeric($arg)) { |
||
| 246 | $argClause = "AND \"Arg\" IN (?, ?) "; |
||
| 247 | $argParams = [-1, $arg]; |
||
| 248 | } else { |
||
| 249 | throw new \InvalidArgumentException("Permission::checkMember: bad arg '$arg'"); |
||
| 250 | } |
||
| 251 | } |
||
| 252 | |||
| 253 | // Raw SQL for efficiency |
||
| 254 | $permission = DB::prepared_query( |
||
| 255 | "SELECT \"ID\" |
||
| 256 | FROM \"Permission\" |
||
| 257 | WHERE ( |
||
| 258 | \"Code\" IN ($codeClause $adminClause) |
||
| 259 | AND \"Type\" = ? |
||
| 260 | AND \"GroupID\" IN ($groupClause) |
||
| 261 | $argClause |
||
| 262 | )", |
||
| 263 | array_merge( |
||
| 264 | $codeParams, |
||
| 265 | $adminParams, |
||
| 266 | [self::GRANT_PERMISSION], |
||
| 267 | $groupParams, |
||
| 268 | $argParams |
||
| 269 | ) |
||
| 270 | )->value(); |
||
| 271 | |||
| 272 | if ($permission) { |
||
| 273 | return $permission; |
||
| 274 | } |
||
| 275 | |||
| 276 | // Strict checking disabled? |
||
| 277 | if (!static::config()->strict_checking || !$strict) { |
||
| 278 | $hasPermission = DB::prepared_query( |
||
| 279 | "SELECT COUNT(*) |
||
| 280 | FROM \"Permission\" |
||
| 281 | WHERE ( |
||
| 282 | \"Code\" IN ($codeClause) AND |
||
| 283 | \"Type\" = ? |
||
| 284 | )", |
||
| 285 | array_merge($codeParams, [self::GRANT_PERMISSION]) |
||
| 286 | )->value(); |
||
| 287 | |||
| 288 | if (!$hasPermission) { |
||
| 289 | return false; |
||
| 290 | } |
||
| 291 | } |
||
| 292 | |||
| 293 | return false; |
||
| 294 | } |
||
| 295 | |||
| 296 | /** |
||
| 297 | * Get all the 'any' permission codes available to the given member. |
||
| 298 | * |
||
| 299 | * @param int $memberID |
||
| 300 | * @return array |
||
| 301 | */ |
||
| 302 | public static function permissions_for_member($memberID) |
||
| 333 | } |
||
| 334 | |||
| 335 | |||
| 336 | /** |
||
| 337 | * Get the list of groups that the given member belongs to. |
||
| 338 | * |
||
| 339 | * Call without an argument to get the groups that the current member |
||
| 340 | * belongs to. In this case, the results will be session-cached. |
||
| 341 | * |
||
| 342 | * @param int $memberID The ID of the member. Leave blank for the current |
||
| 343 | * member. |
||
| 344 | * @return array Returns a list of group IDs to which the member belongs |
||
| 345 | * to or NULL. |
||
| 346 | */ |
||
| 347 | public static function groupList($memberID = null) |
||
| 382 | } |
||
| 383 | |||
| 384 | |||
| 385 | /** |
||
| 386 | * Grant the given permission code/arg to the given group |
||
| 387 | * |
||
| 388 | * @param int $groupID The ID of the group |
||
| 389 | * @param string $code The permission code |
||
| 390 | * @param string $arg Optional: The permission argument (e.g. a page ID). |
||
| 391 | * @returns Permission Returns the new permission object. |
||
| 392 | */ |
||
| 393 | public static function grant($groupID, $code, $arg = "any") |
||
| 394 | { |
||
| 395 | $permissions = Permission::get()->filter(['GroupID' => $groupID, 'Code' => $code]); |
||
| 396 | |||
| 397 | if ($permissions && $permissions->count() > 0) { |
||
| 398 | $perm = $permissions->last(); |
||
| 399 | } else { |
||
| 400 | $perm = new Permission(); |
||
| 401 | $perm->GroupID = $groupID; |
||
| 402 | $perm->Code = $code; |
||
| 403 | } |
||
| 404 | |||
| 405 | $perm->Type = self::GRANT_PERMISSION; |
||
| 406 | |||
| 407 | // Arg component |
||
| 408 | switch ($arg) { |
||
| 409 | case "any": |
||
| 410 | break; |
||
| 411 | case "all": |
||
| 412 | $perm->Arg = -1; |
||
| 413 | break; |
||
| 414 | default: |
||
| 415 | if (is_numeric($arg)) { |
||
| 416 | $perm->Arg = $arg; |
||
| 417 | } else { |
||
| 418 | throw new \InvalidArgumentException("Permission::checkMember: bad arg '$arg'"); |
||
| 419 | } |
||
| 420 | } |
||
| 421 | |||
| 422 | $perm->write(); |
||
| 423 | return $perm; |
||
| 424 | } |
||
| 425 | |||
| 426 | |||
| 427 | /** |
||
| 428 | * Deny the given permission code/arg to the given group |
||
| 429 | * |
||
| 430 | * @param int $groupID The ID of the group |
||
| 431 | * @param string $code The permission code |
||
| 432 | * @param string $arg Optional: The permission argument (e.g. a page ID). |
||
| 433 | * @returns Permission Returns the new permission object. |
||
| 434 | */ |
||
| 435 | public static function deny($groupID, $code, $arg = "any") |
||
| 466 | } |
||
| 467 | |||
| 468 | /** |
||
| 469 | * Returns all members for a specific permission. |
||
| 470 | * |
||
| 471 | * @param string|array $code Either a single permission code, or a list of permission codes |
||
| 472 | * @return SS_List Returns a set of member that have the specified |
||
| 473 | * permission. |
||
| 474 | */ |
||
| 475 | public static function get_members_by_permission($code) |
||
| 476 | { |
||
| 477 | $toplevelGroups = self::get_groups_by_permission($code); |
||
| 478 | if (!$toplevelGroups) { |
||
| 479 | return new ArrayList(); |
||
| 480 | } |
||
| 481 | |||
| 482 | $groupIDs = []; |
||
| 483 | foreach ($toplevelGroups as $group) { |
||
| 484 | $familyIDs = $group->collateFamilyIDs(); |
||
| 485 | if (is_array($familyIDs)) { |
||
| 486 | $groupIDs = array_merge($groupIDs, array_values($familyIDs ?? [])); |
||
| 487 | } |
||
| 488 | } |
||
| 489 | |||
| 490 | if (empty($groupIDs)) { |
||
| 491 | return new ArrayList(); |
||
| 492 | } |
||
| 493 | |||
| 494 | $groupClause = DB::placeholders($groupIDs); |
||
| 495 | /** @skipUpgrade */ |
||
| 496 | $members = Member::get() |
||
| 497 | ->where(["\"Group\".\"ID\" IN ($groupClause)" => $groupIDs]) |
||
| 498 | ->leftJoin("Group_Members", '"Member"."ID" = "Group_Members"."MemberID"') |
||
| 499 | ->leftJoin("Group", '"Group_Members"."GroupID" = "Group"."ID"'); |
||
| 500 | |||
| 501 | return $members; |
||
| 502 | } |
||
| 503 | |||
| 504 | /** |
||
| 505 | * Return all of the groups that have one of the given permission codes |
||
| 506 | * @param array|string $codes Either a single permission code, or an array of permission codes |
||
| 507 | * @return SS_List The matching group objects |
||
| 508 | */ |
||
| 509 | public static function get_groups_by_permission($codes) |
||
| 510 | { |
||
| 511 | $codeParams = is_array($codes) ? $codes : [$codes]; |
||
| 512 | $codeClause = DB::placeholders($codeParams); |
||
| 513 | |||
| 514 | // Via Roles are groups that have the permission via a role |
||
| 515 | /** @skipUpgrade */ |
||
| 516 | return Group::get() |
||
| 517 | ->where([ |
||
| 518 | "\"PermissionRoleCode\".\"Code\" IN ($codeClause) OR \"Permission\".\"Code\" IN ($codeClause)" |
||
| 519 | => array_merge($codeParams, $codeParams) |
||
| 520 | ]) |
||
| 521 | ->leftJoin('Permission', "\"Permission\".\"GroupID\" = \"Group\".\"ID\"") |
||
| 522 | ->leftJoin('Group_Roles', "\"Group_Roles\".\"GroupID\" = \"Group\".\"ID\"") |
||
| 523 | ->leftJoin('PermissionRole', "\"Group_Roles\".\"PermissionRoleID\" = \"PermissionRole\".\"ID\"") |
||
| 524 | ->leftJoin('PermissionRoleCode', "\"PermissionRoleCode\".\"RoleID\" = \"PermissionRole\".\"ID\""); |
||
| 525 | } |
||
| 526 | |||
| 527 | |||
| 528 | /** |
||
| 529 | * Get a list of all available permission codes, both defined through the |
||
| 530 | * {@link PermissionProvider} interface, and all not explicitly defined codes existing |
||
| 531 | * as a {@link Permission} database record. By default, the results are |
||
| 532 | * grouped as denoted by {@link Permission_Group}. |
||
| 533 | * |
||
| 534 | * @param bool $grouped Group results into an array of permission groups. |
||
| 535 | * @return array Returns an array of all available permission codes. The |
||
| 536 | * array indices are the permission codes as used in |
||
| 537 | * {@link Permission::check()}. The value is a description |
||
| 538 | * suitable for using in an interface. |
||
| 539 | */ |
||
| 540 | public static function get_codes($grouped = true) |
||
| 541 | { |
||
| 542 | $classes = ClassInfo::implementorsOf('SilverStripe\\Security\\PermissionProvider'); |
||
| 543 | |||
| 544 | $allCodes = []; |
||
| 545 | $adminCategory = _t(__CLASS__ . '.AdminGroup', 'Administrator'); |
||
| 546 | $allCodes[$adminCategory]['ADMIN'] = [ |
||
| 547 | 'name' => _t(__CLASS__ . '.FULLADMINRIGHTS', 'Full administrative rights'), |
||
| 548 | 'help' => _t( |
||
| 549 | 'SilverStripe\\Security\\Permission.FULLADMINRIGHTS_HELP', |
||
| 550 | 'Implies and overrules all other assigned permissions.' |
||
| 551 | ), |
||
| 552 | 'sort' => 100000 |
||
| 553 | ]; |
||
| 554 | |||
| 555 | if ($classes) { |
||
| 556 | foreach ($classes as $class) { |
||
| 557 | $SNG = singleton($class); |
||
| 558 | if ($SNG instanceof TestOnly) { |
||
| 559 | continue; |
||
| 560 | } |
||
| 561 | |||
| 562 | $someCodes = $SNG->providePermissions(); |
||
| 563 | if ($someCodes) { |
||
| 564 | foreach ($someCodes as $k => $v) { |
||
| 565 | if (is_array($v)) { |
||
| 566 | // There must be a category and name key. |
||
| 567 | if (!isset($v['category'])) { |
||
| 568 | user_error( |
||
| 569 | "The permission $k must have a category key", |
||
| 570 | E_USER_WARNING |
||
| 571 | ); |
||
| 572 | } |
||
| 573 | if (!isset($v['name'])) { |
||
| 574 | user_error( |
||
| 575 | "The permission $k must have a name key", |
||
| 576 | E_USER_WARNING |
||
| 577 | ); |
||
| 578 | } |
||
| 579 | |||
| 580 | if (!isset($allCodes[$v['category']])) { |
||
| 581 | $allCodes[$v['category']] = []; |
||
| 582 | } |
||
| 583 | |||
| 584 | $allCodes[$v['category']][$k] = [ |
||
| 585 | 'name' => $v['name'], |
||
| 586 | 'help' => isset($v['help']) ? $v['help'] : null, |
||
| 587 | 'sort' => isset($v['sort']) ? $v['sort'] : 0 |
||
| 588 | ]; |
||
| 589 | } else { |
||
| 590 | $allCodes['Other'][$k] = [ |
||
| 591 | 'name' => $v, |
||
| 592 | 'help' => null, |
||
| 593 | 'sort' => 0 |
||
| 594 | ]; |
||
| 595 | } |
||
| 596 | } |
||
| 597 | } |
||
| 598 | } |
||
| 599 | } |
||
| 600 | |||
| 601 | $flatCodeArray = []; |
||
| 602 | foreach ($allCodes as $category) { |
||
| 603 | foreach ($category as $code => $permission) { |
||
| 604 | $flatCodeArray[] = $code; |
||
| 605 | } |
||
| 606 | } |
||
| 607 | $otherPerms = DB::query("SELECT DISTINCT \"Code\" From \"Permission\" WHERE \"Code\" != ''")->column(); |
||
| 608 | |||
| 609 | if ($otherPerms) { |
||
| 610 | foreach ($otherPerms as $otherPerm) { |
||
| 611 | if (!in_array($otherPerm, $flatCodeArray ?? [])) { |
||
| 612 | $allCodes['Other'][$otherPerm] = [ |
||
| 613 | 'name' => $otherPerm, |
||
| 614 | 'help' => null, |
||
| 615 | 'sort' => 0 |
||
| 616 | ]; |
||
| 617 | } |
||
| 618 | } |
||
| 619 | } |
||
| 620 | |||
| 621 | // Don't let people hijack ADMIN rights |
||
| 622 | if (!Permission::check("ADMIN")) { |
||
| 623 | unset($allCodes['ADMIN']); |
||
| 624 | } |
||
| 625 | |||
| 626 | ksort($allCodes); |
||
| 627 | |||
| 628 | $returnCodes = []; |
||
| 629 | foreach ($allCodes as $category => $permissions) { |
||
| 630 | if ($grouped) { |
||
| 631 | uasort($permissions, [__CLASS__, 'sort_permissions']); |
||
| 632 | $returnCodes[$category] = $permissions; |
||
| 633 | } else { |
||
| 634 | $returnCodes = array_merge($returnCodes, $permissions); |
||
| 635 | } |
||
| 636 | } |
||
| 637 | |||
| 638 | return $returnCodes; |
||
| 639 | } |
||
| 640 | |||
| 641 | /** |
||
| 642 | * Sort permissions based on their sort value, or name |
||
| 643 | * |
||
| 644 | * @param array $a |
||
| 645 | * @param array $b |
||
| 646 | * @return int |
||
| 647 | */ |
||
| 648 | public static function sort_permissions($a, $b) |
||
| 649 | { |
||
| 650 | if ($a['sort'] == $b['sort']) { |
||
| 651 | // Same sort value, do alpha instead |
||
| 652 | return strcmp($a['name'] ?? '', $b['name'] ?? ''); |
||
| 653 | } else { |
||
| 654 | // Just numeric. |
||
| 655 | return $a['sort'] < $b['sort'] ? -1 : 1; |
||
| 656 | } |
||
| 657 | } |
||
| 658 | |||
| 659 | /** |
||
| 660 | * Get a linear list of the permissions in the system. |
||
| 661 | * |
||
| 662 | * @return array Linear list of declared permissions in the system. |
||
| 663 | * @deprecated 4.4.0 |
||
| 664 | */ |
||
| 665 | public static function get_declared_permissions_list() |
||
| 666 | { |
||
| 667 | if (!self::$declared_permissions) { |
||
| 668 | return null; |
||
| 669 | } |
||
| 670 | |||
| 671 | if (self::$declared_permissions_list) { |
||
| 672 | return self::$declared_permissions_list; |
||
| 673 | } |
||
| 674 | |||
| 675 | self::$declared_permissions_list = []; |
||
| 676 | |||
| 677 | self::traverse_declared_permissions(self::$declared_permissions, self::$declared_permissions_list); |
||
| 678 | |||
| 679 | return self::$declared_permissions_list; |
||
| 680 | } |
||
| 681 | |||
| 682 | /** |
||
| 683 | * Look up the human-readable title for the permission as defined by <code>Permission::declare_permissions</code> |
||
| 684 | * |
||
| 685 | * @param string $perm Permission code |
||
| 686 | * @return string Label for the given permission, or the permission itself if the label doesn't exist |
||
| 687 | * @deprecated 4.4.0 |
||
| 688 | */ |
||
| 689 | public static function get_label_for_permission($perm) |
||
| 690 | { |
||
| 691 | $list = self::get_declared_permissions_list(); |
||
| 692 | if (array_key_exists($perm, $list ?? [])) { |
||
| 693 | return $list[$perm]; |
||
| 694 | } |
||
| 695 | return $perm; |
||
| 696 | } |
||
| 697 | |||
| 698 | /** |
||
| 699 | * Recursively traverse the nested list of declared permissions and create |
||
| 700 | * a linear list. |
||
| 701 | * |
||
| 702 | * @param array $declared Nested structure of permissions. |
||
| 703 | * @param array $list List of permissions in the structure. The result will be |
||
| 704 | * written to this array. |
||
| 705 | * @deprecated 4.4.0 |
||
| 706 | */ |
||
| 707 | protected static function traverse_declared_permissions($declared, &$list) |
||
| 708 | { |
||
| 709 | if (!is_array($declared)) { |
||
| 710 | return; |
||
| 711 | } |
||
| 712 | |||
| 713 | foreach ($declared as $perm => $value) { |
||
| 714 | if ($value instanceof Permission_Group) { |
||
| 715 | $list[] = $value->getName(); |
||
| 716 | self::traverse_declared_permissions($value->getPermissions(), $list); |
||
| 717 | } else { |
||
| 718 | $list[$perm] = $value; |
||
| 719 | } |
||
| 720 | } |
||
| 721 | } |
||
| 722 | |||
| 723 | public function onBeforeWrite() |
||
| 729 | } |
||
| 730 | |||
| 731 | public static function get_template_global_variables() |
||
| 732 | { |
||
| 733 | return [ |
||
| 734 | 'HasPerm' => 'check' |
||
| 735 | ]; |
||
| 736 | } |
||
| 737 | |||
| 738 | public function provideI18nEntities() |
||
| 748 | } |
||
| 749 | } |
||
| 750 |