beatswitch / lock
A flexible, driver based Acl package for PHP 5.4+
Installs: 220 054
Dependents: 4
Suggesters: 0
Security: 0
Stars: 876
Watchers: 60
Forks: 49
Open Issues: 23
Requires
- php: >=5.4.0
Requires (Dev)
- codeclimate/php-test-reporter: ^0.1.2
- phpspec/phpspec: ~2.1
- phpunit/phpunit: ~4.0
This package is auto-updated.
Last update: 2024-10-29 04:30:58 UTC
README
I'm sad to say that Lock is currently not maintained. I won't be able to offer support or accept new contributions for the current time being. Other priorities are keeping me from putting the work into Lock that it deserves. Eventually I'll try to pick up work again but unfortunately I cannot say when. My thanks goes out to all the contributors and users.
-- Dries
Lock is a flexible, driver based Acl package for PHP 5.4+.
Created by Dries Vints. Made possible thanks to BeatSwitch. Inspired by Authority by Matthew Machuga. Logo by Jerry Low.
Table of Contents
- Terminology
- Features
- Introduction
- Drivers
- Roadmap
- Installation
- Usage
- Implementing the Caller contract
- Working with a static driver
- Working with a persistent driver
- Setting and checking permissions
- Clearing permissions
- Setting an action alias
- Setting a God caller
- Working with roles
- Working with conditions
- Retrieving allowed or denied resources
- Using the LockAware trait
- Api
- Building a driver
- Maintainer
- Contributing
- Changelog
- License
Terminology
Lock
: An acl instance for a subject. This package currently ships with aCallerLock
and aRoleLock
Caller
: An identity object that can have permissions to do somethingDriver
: A storage system for permissions which can either be static or persistentPermission
: A permission holds an action and an optional (unique) resource. Can be either aRestriction
or aPrivilege
Restriction
: A restriction denies you from being able to perform an action (on an optional resource)Privilege
: A privilege allows you to perform an action (on an optional resource)Action
: An action is something you are either allowed or denied to doResource
: A resource can be an object where you can perform one or more actions on. It can either target a certain type of resource or a specific resource by its unique identifierRole
: A role can also hold multiple permissions. A caller can have multiple roles. Roles can inherit permissions from other roles
Features
- Flexible acl permissions for multiple identities (callers)
- Static or persistent drivers to store permissions
- Action aliases
- Roles
- Conditions (Asserts)
- Easily implement acl functionality on your caller or role with a trait
Introduction
Lock differs from other acl packages by trying to provide the most flexible way for working with multiple permission callers and storing permissions.
By working with Lock's Caller
contract you can set permissions on multiple identities.
The Driver
contract allows for an easy way to store permissions to a persistent or static storage system. A default static ArrayDriver
ships with this package. Check out the list below for more drivers which have already been prepared for you. Or build your own by implementing the Driver
contract.
You can set and check permissions for resources by manually passing along a resource's type and (optional) identifier or you can implement the Resource
contract onto your objects so you can pass them along to lock more easily.
The Manager
allows for an easy way to instantiate new Lock
instances, set action aliases or register roles.
Drivers
If you need a framework-specific implementation, pick one of the already prepared drivers below.
- ArrayDriver (ships with this package)
- Laravel 5
Roadmap
- Group Permissions
- More drivers (Symfony, Zend Framework, Doctrine, ...)
- Event Listeners
Installation
Install this package through Composer.
$ composer require beatswitch/lock
Usage
Implementing the Caller contract
Every identity which should have permissions to do something must implement the BeatSwitch\Lock\Callers\Caller
contract. The Caller
contract identifies a caller by requiring it to return its type and its unique identifier. Let's look at an example below.
<?php use BeatSwitch\Lock\Callers\Caller; class User implements Caller { public function getCallerType() { return 'users'; } public function getCallerId() { return $this->id; } public function getCallerRoles() { return ['editor', 'publisher']; } }
By adding the getCallerType
function we can identify a group of callers through a unique type. If we would at some point wanted to set permissions on another group of callers we could easily implement the contract on another object.
<?php use BeatSwitch\Lock\Callers\Caller; class Organization implements Caller { public function getCallerType() { return 'organizations'; } public function getCallerId() { return $this->id; } public function getCallerRoles() { return ['enterprise']; } }
And thus we can easily retrieve permissions for a specific caller type through a driver.
Working with a static driver
If you'd like to configure all of your permissions beforehand you can use the static ArrayDriver
which ships with the package. This allows you to set a list of permissions for a caller before your application is run.
use \BeatSwitch\Lock\Drivers\ArrayDriver; use \BeatSwitch\Lock\Lock; use \BeatSwitch\Lock\Manager; // Create a new Manager instance. $manager = new Manager(new ArrayDriver()); // Instantiate a new Lock instance for an object which implements the Caller contract. $lock = $manager->caller($caller); // Set some permissions. $lock->allow('manage_settings'); $lock->allow('create', 'events'); // Use the Lock instance to validate permissions on the given caller. $lock->can('manage_settings'); // true: can manage settings $lock->can('create', 'events'); // true: can create events $lock->cannot('update', 'events'); // true: cannot update events $lock->can('delete', 'events'); // false: cannot delete events
Working with a persistent driver
Working with a persistent driver allows you to store permissions to a persistent storage layer and adjust them during runtime. For example, if you'd implement the Laravel 5 driver, it would store the permissions to a database using Laravel's database component. By creating your own UI, you could easily attach the acl functionality from this package to create, for example, a user management system where different users have different permissions.
Let's take a look at a very basic user management controller to see how that's done. We'll assume we get a bootstrapped lock manager instance with our Laravel DB driver.
<?php use BeatSwitch\Lock\Manager; class UserManagementController extends BaseController { protected $lockManager; public function __construct(Manager $lockManager) { $this->lockManager = $lockManager; } public function togglePermission() { $userId = Input::get('user'); $action = Input::get('action'); $resource = Input::get('resource'); $user = User::find($userId); $this->lockManager->caller($user)->toggle($action, $resource); return Redirect::route('user_management'); } }
Every time the togglePermission
method is used, the user's permission for the given action and resource type will be toggled.
Setting and checking permissions
You can either allow
or deny
a caller from doing something. Here are a couple of ways to set and check permissions.
Allow a caller to create everything.
$lock->allow('create'); $lock->can('create'); // true
Allow a caller to only create posts.
$lock->allow('create', 'posts'); $lock->can('create'); // false $lock->can('create', 'posts'); // true
Allow a caller to only edit a specific post with an ID of 5.
$lock->allow('edit', 'posts', 5); $lock->can('edit'); // false $lock->can('edit', 'posts'); // false $lock->can('edit', 'posts', 5); // true
Allow a caller to edit all posts but deny them from editing one with the id of 5.
$lock->allow('edit', 'posts'); $lock->deny('edit', 'posts', 5); $lock->can('edit', 'posts'); // true $lock->can('edit', 'posts', 5); // false
Toggle a permission's value.
$lock->allow('create'); $lock->can('create'); // true $lock->toggle('create'); $lock->can('create'); // false
You can allow or deny multiple actions at once and also check multiple actions at once.
$lock->allow(['create', 'edit'], 'posts'); $lock->can('create', 'posts'); // true $lock->can(['create', 'edit'], 'posts'); // true $lock->can(['create', 'delete'], 'posts'); // false
Clearing permissions
You can easily clear permissions for a set specific combination of actions and resources.
$lock->allow(['create', 'edit'], 'posts'); $lock->clear('edit', 'posts'); $lock->can('edit', 'posts'); // false $lock->can('create', 'posts'); // true
You can also just clear all permissions for a lock instance.
$lock->allow('manage-posts'); $lock->allow(['create', 'edit'], 'users'); $lock->clear(); $lock->can('manage-posts'); // false $lock->can('create', 'users'); // false
Setting an action alias
To group multiple actions and set them all at once you might want to set an action alias.
$lock->alias('manage', ['create', 'read', 'delete']); $lock->allow('manage', 'posts'); $lock->can('manage', 'posts'); // true $lock->can('create', 'posts'); // true $lock->can('delete', 'posts', 1); // true $lock->can('update', 'posts'); // false
Setting a God caller
You could easily set a caller which has all permissions for everything by passing the all
wildcard as an action on the lock instance.
$lock->allow('all');
Now every "can" method call will validate to true for this caller.
Working with roles
Lock provides an easy way to working with roles. You can work with roles out of the box but if you want to work with inheritance, you'll need to register the roles to the manager instance.
$manager->setRole('guest'); $manager->setRole('user', 'guest'); // "user" will inherit all permissions from "guest"
Or register multiple roles at once.
$manager->setRole(['editor', 'admin'], 'user'); // "editor" and "admin" will inherit all permissions from "user".
Let's set some permissions and see how they are resolved.
// Allow a guest to read everything. $manager->role('guest')->allow('guest', 'read'); // Allow a user to create posts. $manager->role('user')->allow('create', 'posts'); // Allow an editor and admin to publish posts. $manager->role('editor')->allow('publish', 'posts'); $manager->role('admin')->allow('publish', 'posts'); // Allow an admin to delete posts. $manager->role('admin')->allow('delete', 'posts'); // Let's assume our caller has the role of "editor" and check some permissions. $lock = $manager->caller($caller); $lock->can('read'); // true $lock->can('delete', 'posts'); // false $lock->can('publish'); // false: we can't publish everything, just posts. $lock->can(['create', 'publish'], 'posts'); // true
Something you need to be aware of is that caller-level permissions supersede role-level permissions. Let's see how that works.
Our caller will have the user role.
$manager->caller($caller)->allow('create', 'posts'); // Notice that we don't need to set the role in the // manager first if we don't care about inheritance. $manager->role('user')->deny('user', 'create', 'posts'); $manager->caller($caller)->can('create', 'posts'); // true: the user has explicit permission to create posts.
Working with conditions
Conditions are actually asserts which are extra checks you can set for permissions. You can pass an array with them as the last parameter of allow
and deny
. All conditions must implement the BeatSwitch\Lock\Permissions\Condition
interface.
Warning: please note that conditions currently only work with static drivers.
Let's setup a condition.
<?php use BeatSwitch\Lock\Lock; use BeatSwitch\Lock\Permissions\Condition; use BeatSwitch\Lock\Permissions\Permission; use BeatSwitch\Lock\Resources\Resource; use Illuminate\Auth\AuthManager; class LoggedInCondition implements Condition { /** * The Laravel AuthManager instance * * @var \Illuminate\Auth\AuthManager */ protected $auth; /** * @param \Illuminate\Auth\AuthManager $auth */ public function __construct(AuthManager $auth) { $this->auth = $auth; } /** * Assert if the condition is correct * * @param \BeatSwitch\Lock\Lock $lock The current Lock instance that's being used * @param \BeatSwitch\Lock\Permissions\Permission $permission The Permission that's being checked * @param string $action The action passed to the can or cannot method * @param \BeatSwitch\Lock\Resources\Resource|null $resource The resource passed to the can or cannot method * @return bool */ public function assert(Lock $lock, Permission $permission, $action, Resource $resource = null) { // Condition will succeed if the user is logged in. return $this->auth->check(); } }
Now let's see how this will work when setting up a permission.
$condition = App::make('LoggedInCondition'); $lock->allow('create', 'posts', null, $condition); $lock->can('create', 'posts'); // true if logged in, otherwise false.
You can also pass along multiple conditions.
$lock->allow('create', 'posts', null, [$falseCondition, $trueCondition]); $lock->can('create', 'posts'); // false: there's at least one false condition
You can pass along as many conditions as you like but they all need to succeed in order for the permission to work.
You can also use a callback if you like.
$lock->allow('create', 'posts', null, function ($lock, $permission, $action, $resource = null) { return false; }); $lock->can('create', 'posts'); // false because the callback returns false.
Retrieving allowed or denied resources
If you'd like to retrieve a list of resources which are allowed or denied to perform a particularly action you can use the allowed
and denied
methods on a Lock
instance.
$lock->allow('update', 'users', 1); $lock->allow('update', 'users', 2); $lock->allow('update', 'users', 3); $lock->deny('update', 'users', 2); $lock->allowed('update', 'users'); // Returns [1, 3]; $lock->denied('update', 'users'); // Returns [2];
Please keep in mind that you can only retrieve id's from resources which have permissions set. Resources which aren't registered through Lock won't be returned.
Using the LockAware trait
You can easily add acl functionality to your caller or role by implementing the BeatSwitch\Lock\LockAware
trait.
<?php use BeatSwitch\Lock\Callers\Caller; use BeatSwitch\Lock\LockAware; class Organization implements Caller { use LockAware; public function getCallerType() { return 'organizations'; } public function getCallerId() { return $this->id; } public function getCallerRoles() { return ['enterprise']; } }
Now we need to set its lock instance.
$caller->setLock($lock);
And now your caller can use all of the lock methods onto itself.
$caller->can('create', 'posts'); $caller->allow('edit', 'pages');
If you have a caller which implements the LockAware
trait but haven't bootstrapped the caller's lock instance yet you can easily make the caller lock aware by using the manager's makeCallerLockAware
method.
$caller = $manager->makeCallerLockAware($caller);
And now your caller will be able to use the LockAware
methods. There's a similar method for roles.
$role = $manager->makeRoleLockAware('guest');
This will bootstrap a SimpleRole
object which already comes with the LockAware
trait in place.
Api
BeatSwitch\Lock\Lock
The following methods can all be called on a BeatSwitch\Lock\Lock
instance.
can
Checks to see if the current caller has permission to do something.
can(
string|array $action,
string|\BeatSwitch\Lock\Resources\Resource $resource = null,
int $resourceId = null
)
cannot
Checks to see if it's forbidden for the current caller to do something.
cannot(
string|array $action,
string|\BeatSwitch\Lock\Resources\Resource $resource = null,
int $resourceId = null
)
allow
Sets a Privilege
permission on a caller to allow it to do something. Removes any matching restrictions.
allow(
string|array $action,
string|\BeatSwitch\Lock\Resources\Resource $resource = null,
int $resourceId = null,
\BeatSwitch\Lock\Permissions\Condition[] $conditions = []
)
deny
Sets a Restriction
permission on a caller to prevent it from doing something. Removes any matching privileges.
deny(
string|array $action,
string|\BeatSwitch\Lock\Resources\Resource $resource = null,
int $resourceId = null,
\BeatSwitch\Lock\Permissions\Condition[] $conditions = []
)
toggle
Toggles the value for the given permission.
toggle(
string|array $action,
string|\BeatSwitch\Lock\Resources\Resource $resource = null,
int $resourceId = null
)
allowed
Returns all the id's in an array of the given resource type to which the subject is allowed to perform the given action on.
allowed(
string|array $action,
string|\BeatSwitch\Lock\Resources\Resource $resourceType
)
denied
Returns all the id's in an array of the given resource type to which the subject is denied to perform the given action on.
denied(
string|array $action,
string|\BeatSwitch\Lock\Resources\Resource $resourceType
)
BeatSwitch\Lock\Manager
The following methods can all be called on a BeatSwitch\Lock\Manager
instance.
caller
Returns a BeatSwitch\Lock\Lock
instance for a caller.
caller(
\BeatSwitch\Lock\Callers\Caller $caller
)
role
Returns a BeatSwitch\Lock\Lock
instance for a role.
role(
\BeatSwitch\Lock\Roles\Role $role
)
alias
Add an alias for one or more actions.
alias(
string $name,
string|array $actions
)
setRole
Set one or more roles and an optional role to inherit permissions from.
setRole(
string|array $name,
string $inherit = null
)
makeCallerLockAware
Sets the lock instance for a caller which implements the LockAware
trait. Returns the caller with the lock instance set.
makeCallerLockAware(
\BeatSwitch\Lock\Callers\Caller $caller
)
makeRoleLockAware
Sets the lock instance for a role which implements the LockAware
trait. Returns the role with the lock instance set.
makeRoleLockAware(
\BeatSwitch\Lock\Roles\Role|string $role
)
Building a driver
You can easily build a driver by implementing the BeatSwitch\Lock\Drivers\Driver
contract. Below we'll demonstrate how to create our own persistent driver using Laravel's Eloquent ORM as our storage mechanism.
We'll assume we have a CallerPermission
model class with at least the following database columns:
caller_type
(varchar, 100)caller_id
(int, 11)type
(varchar, 10)action
(varchar, 100)resource_type
(varchar, 100, nullable)resource_id
(int, 11, nullable)
And we have a RolePermission
model with the following database columns:
role
(varchar, 100)type
(varchar, 10)action
(varchar, 100)resource_type
(varchar, 100, nullable)resource_id
(int, 11, nullable)
Let's check out a full implementation of the driver below. Notice that for the getCallerPermissions
method we're using the PermissionFactory
class to easily map the data and create Permission
objects from them. The PermissionFactory
's createFromData
method will accept both arrays and objects.
<?php use BeatSwitch\Lock\Callers\Caller; use BeatSwitch\Lock\Drivers\Driver; use BeatSwitch\Lock\Permissions\Permission; use BeatSwitch\Lock\Permissions\PermissionFactory; use BeatSwitch\Lock\Roles\Role; use CallerPermission; use RolePermission; class EloquentDriver implements Driver { /** * Returns all the permissions for a caller * * @param \BeatSwitch\Lock\Callers\Caller $caller * @return \BeatSwitch\Lock\Permissions\Permission[] */ public function getCallerPermissions(Caller $caller) { $permissions = CallerPermission::where('caller_type', $caller->getCallerType()) ->where('caller_id', $caller->getCallerId()) ->get(); return PermissionFactory::createFromData($permissions->toArray()); } /** * Stores a new permission into the driver for a caller * * @param \BeatSwitch\Lock\Callers\Caller $caller * @param \BeatSwitch\Lock\Permissions\Permission * @return void */ public function storeCallerPermission(Caller $caller, Permission $permission) { $eloquentPermission = new CallerPermission; $eloquentPermission->caller_type = $caller->getCallerType(); $eloquentPermission->caller_id = $caller->getCallerId(); $eloquentPermission->type = $permission->getType(); $eloquentPermission->action = $permission->getAction(); $eloquentPermission->resource_type = $permission->getResourceType(); $eloquentPermission->resource_id = $permission->getResourceId(); $eloquentPermission->save(); } /** * Removes a permission from the driver for a caller * * @param \BeatSwitch\Lock\Callers\Caller $caller * @param \BeatSwitch\Lock\Permissions\Permission * @return void */ public function removeCallerPermission(Caller $caller, Permission $permission) { CallerPermission::where('caller_type', $caller->getCallerType()) ->where('caller_id', $caller->getCallerId()) ->where('type', $permission->getType()) ->where('action', $permission->getAction()) ->where('resource_type', $permission->getResourceType()) ->where('resource_id', $permission->getResourceId()) ->delete(); } /** * Checks if a permission is stored for a user * * @param \BeatSwitch\Lock\Callers\Caller $caller * @param \BeatSwitch\Lock\Permissions\Permission * @return bool */ public function hasCallerPermission(Caller $caller, Permission $permission) { return (bool) CallerPermission::where('caller_type', $caller->getCallerType()) ->where('caller_id', $caller->getCallerId()) ->where('type', $permission->getType()) ->where('action', $permission->getAction()) ->where('resource_type', $permission->getResourceType()) ->where('resource_id', $permission->getResourceId()) ->first(); } /** * Returns all the permissions for a role * * @param \BeatSwitch\Lock\Roles\Role $role * @return \BeatSwitch\Lock\Permissions\Permission[] */ public function getRolePermissions(Role $role) { $permissions = RolePermission::where('role', $role->getRoleName())->get(); return PermissionFactory::createFromData($permissions->toArray()); } /** * Stores a new permission for a role * * @param \BeatSwitch\Lock\Roles\Role $role * @param \BeatSwitch\Lock\Permissions\Permission * @return void */ public function storeRolePermission(Role $role, Permission $permission) { $eloquentPermission = new RolePermission; $eloquentPermission->role = $role->getRoleName(); $eloquentPermission->type = $permission->getType(); $eloquentPermission->action = $permission->getAction(); $eloquentPermission->resource_type = $permission->getResourceType(); $eloquentPermission->resource_id = $permission->getResourceId(); $eloquentPermission->save(); } /** * Removes a permission for a role * * @param \BeatSwitch\Lock\Roles\Role $role * @param \BeatSwitch\Lock\Permissions\Permission * @return void */ public function removeRolePermission(Role $role, Permission $permission) { RolePermission::where('role', $role->getRoleName()) ->where('type', $permission->getType()) ->where('action', $permission->getAction()) ->where('resource_type', $permission->getResourceType()) ->where('resource_id', $permission->getResourceId()) ->delete(); } /** * Checks if a permission is stored for a role * * @param \BeatSwitch\Lock\Roles\Role $role * @param \BeatSwitch\Lock\Permissions\Permission * @return bool */ public function hasRolePermission(Role $role, Permission $permission) { return (bool) RolePermission::where('role', $role->getRoleName()) ->where('type', $permission->getType()) ->where('action', $permission->getAction()) ->where('resource_type', $permission->getResourceType()) ->where('resource_id', $permission->getResourceId()) ->first(); } }
Notice that we're not checking if the permission already exists when we're attempting to store it. You don't need to worry about that because that's all been done for you in the Lock
instance.
Now we have a driver which supports storing of permissions for callers and roles.
Testing your driver
It's very easy for you to make sure your driver works as expected. If you're building a persistent driver you can easily test it by creating a PHPUnit test which extends the PersistentDriverTestCase
class.
<?php use BeatSwitch\Lock\Tests\PersistentDriverTestCase; class EloquentDriverTest extends PersistentDriverTestCase { public function setUp() { // Don't forget to reset your DB here. // Bootstrap your driver. $this->driver = new EloquentDriver(); parent::setUp(); } }
And this is all you need! The PersistentDriverTestCase
contains all the tests you'll need to make sure your driver works as expected. So if all those tests pass then your driver was set up correctly. No need to mock anything, this is a pure integration test case. Of course in this specific example above, for Eloquent to work you'll need to bootstrap Laravel. Working with a database like sqlite would be the best way here to test your driver.
Maintainer
Lock is unmaintained at this moment.
This package is currently maintained by Dries Vints.
If you have any questions please don't hesitate to ask them in an issue.
Contributing
Please see the contributing file for details.
Changelog
You can see a list of changes for each release in our changelog file.
License
The MIT License. Please see the license file for more information.