line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package Catalyst::Plugin::Authorization::RoleAbilities; |
2
|
|
|
|
|
|
|
|
3
|
|
|
|
|
|
|
# ABSTRACT: Ability based authorization for Catalyst (using only Roles) |
4
|
|
|
|
|
|
|
|
5
|
1
|
|
|
1
|
|
504608
|
use Moose; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
6
|
|
6
|
|
|
|
|
|
|
extends 'Catalyst::Plugin::Authorization::Roles'; |
7
|
|
|
|
|
|
|
|
8
|
1
|
|
|
1
|
|
4975
|
use Set::Object (); |
|
1
|
|
|
|
|
5745
|
|
|
1
|
|
|
|
|
18
|
|
9
|
1
|
|
|
1
|
|
5
|
use Scalar::Util (); |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
9
|
|
10
|
1
|
|
|
1
|
|
402
|
use Catalyst::Exception (); |
|
1
|
|
|
|
|
138529
|
|
|
1
|
|
|
|
|
511
|
|
11
|
|
|
|
|
|
|
|
12
|
|
|
|
|
|
|
sub check_user_ability { |
13
|
2
|
|
|
2
|
1
|
414
|
my ($c, @roles) = @_; |
14
|
2
|
|
|
|
|
3
|
local $@; |
15
|
2
|
|
|
|
|
3
|
eval { $c->assert_user_ability(@roles) }; |
|
2
|
|
|
|
|
4
|
|
16
|
2
|
100
|
|
|
|
114
|
return $@ ? 0 : 1; |
17
|
|
|
|
|
|
|
} |
18
|
|
|
|
|
|
|
|
19
|
|
|
|
|
|
|
sub assert_user_ability { |
20
|
9
|
|
|
9
|
1
|
8138
|
my ($c, @actions) = @_; |
21
|
|
|
|
|
|
|
|
22
|
9
|
|
|
|
|
9
|
my $user; |
23
|
|
|
|
|
|
|
|
24
|
9
|
100
|
66
|
|
|
35
|
if (Scalar::Util::blessed($actions[0]) && $actions[0]->isa("Catalyst::Authentication::User")) { |
25
|
|
|
|
|
|
|
|
26
|
|
|
|
|
|
|
# A user was supplied in the arguments |
27
|
1
|
|
|
|
|
2
|
$user = shift @actions; |
28
|
|
|
|
|
|
|
} |
29
|
|
|
|
|
|
|
|
30
|
9
|
|
100
|
|
|
29
|
$user ||= $c->user; |
31
|
|
|
|
|
|
|
|
32
|
9
|
100
|
|
|
|
43
|
Catalyst::Exception->throw("No logged in user, and none supplied as argument") unless $user; |
33
|
|
|
|
|
|
|
|
34
|
8
|
|
|
|
|
14
|
my $have = Set::Object->new(map { $_->name } $user->user_roles->search_related('role')->search_related('role_actions')->search_related('action')); |
|
24
|
|
|
|
|
212
|
|
35
|
8
|
|
|
|
|
78
|
my $need = Set::Object->new(@actions); |
36
|
|
|
|
|
|
|
|
37
|
8
|
100
|
|
|
|
17
|
if ($have->superset($need)) { |
38
|
4
|
50
|
|
|
|
48
|
$c->log->debug("Action granted: @actions") if $c->debug; |
39
|
4
|
|
|
|
|
30
|
return 1; |
40
|
|
|
|
|
|
|
} else { |
41
|
4
|
50
|
|
|
|
40
|
$c->log->debug("Action denied: @actions") if $c->debug; |
42
|
4
|
|
|
|
|
18
|
my @missing = $need->difference($have)->members; |
43
|
4
|
|
|
|
|
104
|
Catalyst::Exception->throw("Missing actions: @missing"); |
44
|
|
|
|
|
|
|
} |
45
|
|
|
|
|
|
|
} |
46
|
|
|
|
|
|
|
|
47
|
|
|
|
|
|
|
__PACKAGE__->meta->make_immutable; |
48
|
|
|
|
|
|
|
1; |
49
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
|
|
51
|
|
|
|
|
|
|
__END__ |
52
|
|
|
|
|
|
|
=pod |
53
|
|
|
|
|
|
|
|
54
|
|
|
|
|
|
|
=head1 NAME |
55
|
|
|
|
|
|
|
|
56
|
|
|
|
|
|
|
Catalyst::Plugin::Authorization::RoleAbilities - Ability based authorization for Catalyst (using only Roles) |
57
|
|
|
|
|
|
|
|
58
|
|
|
|
|
|
|
=head1 VERSION |
59
|
|
|
|
|
|
|
|
60
|
|
|
|
|
|
|
version 0.002 |
61
|
|
|
|
|
|
|
|
62
|
|
|
|
|
|
|
=head1 SYNOPSIS |
63
|
|
|
|
|
|
|
|
64
|
|
|
|
|
|
|
use Catalyst qw/ |
65
|
|
|
|
|
|
|
Authentication |
66
|
|
|
|
|
|
|
Authorization::RoleAbilities |
67
|
|
|
|
|
|
|
/; |
68
|
|
|
|
|
|
|
|
69
|
|
|
|
|
|
|
sub delete : Local { |
70
|
|
|
|
|
|
|
my ( $self, $c ) = @_; |
71
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
$c->assert_user_ability( qw/delete_user/ ); # only users with roles that can perform this action can delete |
73
|
|
|
|
|
|
|
|
74
|
|
|
|
|
|
|
$c->model("User")->delete_it(); |
75
|
|
|
|
|
|
|
} |
76
|
|
|
|
|
|
|
|
77
|
|
|
|
|
|
|
=head1 DESCRIPTION |
78
|
|
|
|
|
|
|
|
79
|
|
|
|
|
|
|
Ability based authorization allows more flexibility than role based authorization. Users can have roles, which then |
80
|
|
|
|
|
|
|
have many actions associated. An action can be associated with several roles. With this you don't check whether a user |
81
|
|
|
|
|
|
|
has specific roles, but instead whether the roles can perform specific actions. |
82
|
|
|
|
|
|
|
|
83
|
|
|
|
|
|
|
L<Catalyst::Plugin::Authorization::RoleAbilities> extends L<Catalyst::Plugin::Authorization::Roles> so every method of |
84
|
|
|
|
|
|
|
L<Catalyst::Plugin::Authorization::Roles> still can be used. |
85
|
|
|
|
|
|
|
|
86
|
|
|
|
|
|
|
See L<SEE ALSO> for other authorization modules. |
87
|
|
|
|
|
|
|
|
88
|
|
|
|
|
|
|
=head1 METHODS |
89
|
|
|
|
|
|
|
|
90
|
|
|
|
|
|
|
=head2 assert_user_ability [ $user ], @actions |
91
|
|
|
|
|
|
|
|
92
|
|
|
|
|
|
|
Checks that the roles of the user (as supplied by the first argument, or, if omitted, |
93
|
|
|
|
|
|
|
C<< $c->user >>) has the ability to perform specified actions. |
94
|
|
|
|
|
|
|
|
95
|
|
|
|
|
|
|
If for any reason (C<< $c->user >> is not defined, the user's roles are missing the |
96
|
|
|
|
|
|
|
appropriate action, etc.) the check fails, an error is thrown. |
97
|
|
|
|
|
|
|
|
98
|
|
|
|
|
|
|
You can either catch these errors with an eval, or clean them up in your C<end> |
99
|
|
|
|
|
|
|
action. |
100
|
|
|
|
|
|
|
|
101
|
|
|
|
|
|
|
=head2 check_user_ability [ $user ], @actions |
102
|
|
|
|
|
|
|
|
103
|
|
|
|
|
|
|
Takes the same args as C<assert_user_ability>, and performs the same check, but |
104
|
|
|
|
|
|
|
instead of throwing errors returns a boolean value. |
105
|
|
|
|
|
|
|
|
106
|
|
|
|
|
|
|
=head1 REQUIRED TABLES |
107
|
|
|
|
|
|
|
|
108
|
|
|
|
|
|
|
=head2 Actions |
109
|
|
|
|
|
|
|
|
110
|
|
|
|
|
|
|
Table name: C<actions> |
111
|
|
|
|
|
|
|
|
112
|
|
|
|
|
|
|
Columns: |
113
|
|
|
|
|
|
|
|
114
|
|
|
|
|
|
|
=over 4 |
115
|
|
|
|
|
|
|
|
116
|
|
|
|
|
|
|
=item * |
117
|
|
|
|
|
|
|
|
118
|
|
|
|
|
|
|
C<id>, as C<integer>, Primary Key |
119
|
|
|
|
|
|
|
|
120
|
|
|
|
|
|
|
=item * |
121
|
|
|
|
|
|
|
|
122
|
|
|
|
|
|
|
C<name>, as C<character varying> or C<text> |
123
|
|
|
|
|
|
|
|
124
|
|
|
|
|
|
|
=back |
125
|
|
|
|
|
|
|
|
126
|
|
|
|
|
|
|
=head2 Roles to Actions |
127
|
|
|
|
|
|
|
|
128
|
|
|
|
|
|
|
Table name: C<role_actions> |
129
|
|
|
|
|
|
|
|
130
|
|
|
|
|
|
|
Columns: |
131
|
|
|
|
|
|
|
|
132
|
|
|
|
|
|
|
=over 4 |
133
|
|
|
|
|
|
|
|
134
|
|
|
|
|
|
|
=item * |
135
|
|
|
|
|
|
|
|
136
|
|
|
|
|
|
|
C<id>, as C<integer>, Primary Key |
137
|
|
|
|
|
|
|
|
138
|
|
|
|
|
|
|
=item * |
139
|
|
|
|
|
|
|
|
140
|
|
|
|
|
|
|
C<role_id>, as C<integer>, Foreign Key to C<roles.id> |
141
|
|
|
|
|
|
|
|
142
|
|
|
|
|
|
|
=item * |
143
|
|
|
|
|
|
|
|
144
|
|
|
|
|
|
|
C<action_id>, as C<integer>, Foreign Key to C<actions.id> |
145
|
|
|
|
|
|
|
|
146
|
|
|
|
|
|
|
=back |
147
|
|
|
|
|
|
|
|
148
|
|
|
|
|
|
|
=head1 SEE ALSO |
149
|
|
|
|
|
|
|
|
150
|
|
|
|
|
|
|
=over 4 |
151
|
|
|
|
|
|
|
|
152
|
|
|
|
|
|
|
=item * |
153
|
|
|
|
|
|
|
|
154
|
|
|
|
|
|
|
L<Catalyst::Plugin::Authorization::Roles> |
155
|
|
|
|
|
|
|
|
156
|
|
|
|
|
|
|
=item * |
157
|
|
|
|
|
|
|
|
158
|
|
|
|
|
|
|
L<Catalyst::Plugin::Authorization::Abilities> - A more complex ability based authorization module |
159
|
|
|
|
|
|
|
|
160
|
|
|
|
|
|
|
=back |
161
|
|
|
|
|
|
|
|
162
|
|
|
|
|
|
|
=head1 AUTHOR |
163
|
|
|
|
|
|
|
|
164
|
|
|
|
|
|
|
Matthias Dietrich <perl@rainboxx.de> |
165
|
|
|
|
|
|
|
|
166
|
|
|
|
|
|
|
=head1 COPYRIGHT AND LICENSE |
167
|
|
|
|
|
|
|
|
168
|
|
|
|
|
|
|
This software is copyright (c) 2012 by Matthias Dietrich. |
169
|
|
|
|
|
|
|
|
170
|
|
|
|
|
|
|
This is free software; you can redistribute it and/or modify it under |
171
|
|
|
|
|
|
|
the same terms as the Perl 5 programming language system itself. |
172
|
|
|
|
|
|
|
|
173
|
|
|
|
|
|
|
=cut |
174
|
|
|
|
|
|
|
|