srigi / ipub-security
ACL permissions setter & checker for Nette Framework
Installs: 1 634
Dependents: 0
Suggesters: 0
Security: 0
Stars: 2
Watchers: 0
Forks: 3
Open Issues: 3
pkg:composer/srigi/ipub-security
Requires
- php: >=5.4
 - latte/latte: ~2.2
 - nette/application: ~2.2
 - nette/bootstrap: ~2.2
 - nette/di: ~2.2
 - nette/security: ~2.2
 - nette/utils: ~2.2
 
Requires (Dev)
- nette/tester: ~1.6
 - tracy/tracy: ~2.2
 
README
ACL permissions setter & checker for Nette Framework.
srigi/ipub-security is a library that allows easy configuration of Nette Framework ACL system. It supports roles & resources inheritance and also permission assertions are supported.
Installation
The best way to install srigi/ipub-security is by using Composer. To get the latest version of the library run this command at the root of your project:
$ composer require srigi/ipub-security
Or you can specify dependency by hand:
{
	"require": {
		"srigi/ipub-security": "^1.3.0"
	}
}
Setup
After installation you need to register the DI extension. If your'e using Nette 2.3, you can do that by configuration:
extensions: permission: IPub\Security\DI\SecurityExtension
I case of Nette 2.2 register extension in your bootstrap.php:
$configurator = new Nette\Configurator; // ...some other code IPub\Security\DI\SecurityExtension::register($configurator);
The ACL system 101
Nette ACL system brings some terminology you should know befor continuing. First there are resources that one (a role) wants to access (privilege). This forms a permission. Example is the best teacher:
resources - intranet, salesModule, serversDashboard, databaseServersDashboard
roles - admininstrator, guest, authenticated, employee, sales, engineer
privileges - access, powerOn, powerOff, reboot
permission - this is just abstract concept when you combine above three entities:
authenticatedcanaccesstheintranetengineercanreboottheserversDashboardadministratorcan doALLonALL
resources and roles can inherit from each other and create hierarchies:
    intranet
    ├ salesModule
    └ serversDashboard
      └ databaseServersDashboard
    administrator
    guest
    └ authenticated
      └ employee
        ├ sales
        └ engineer
          └ backend-engineer
If there is a permission (combination of resource, role and privilege) registered, this inherits down. In our little example engineer can access the intranet because is inheriting this permission from authenticated.
More on this can be found in access control chapter of Nette Framework documentation.
Creating permissions
Permission is represented by instance of IPub\Security\Entities\IPermission. Such instance is providing a IPub\Security\Entities\IResource resource instance, a privilege (defined as string) and assertion (defined as callable). All three components of the permission are optional.
Permissions definitions must be provided by service implementing IPub\Security\Providers\IPermissionsProvider. Library srigi/ipub-security have example implementation of such provider you can use in your project. Or you can write your own.
Defining set of permissions with our PermissionsProvider is very easy:
class MyPermissionsProvider extends IPub\Security\Providers\PermissionsProvider { public function __construct() { $intranet = $this->addResource('intranet'); $this->addPermission($intranet, Nette\Security\IAuthorizator::ALL); $this->addPermission($intranet, 'access'); $this->addPermission($intranet, 'update'); $salesModule = $this->addResource('salesModule', $this->getResource('intranet')); $this->addPermission($salesModule, 'access'); $this->addPermission($salesModule, 'edit', function($acl, $role, $resource, $privilege) { // ...code of permission assertion }); // ... more permissions definitions } }
Now just register your permission provider:
services: - MyPermissionsProvider
Creating roles & assigning permissions
Similarly as permission also roles have its own interface and needs a provider service. This provider should also assign permissions to the role:
class MyRolesProvider extends IPub\Security\Providers\RolesProvider { /** * @param MyPermissionsProvider $permissionsProvider */ public function __construct(MyPermissionsProvider $permissionsProvider) { $permissions = $permissionsProvider->getPermissions(); $this->addRole(Entities\IRole::ROLE_ADMINISTRATOR); $this->addRole(Entities\IRole::ROLE_ANONYMOUS); $this->addRole(Entities\IRole::ROLE_AUTHENTICATED, $this->getRole(Entities\IRole::ROLE_ANONYMOUS), $permissions['intranet:access']); $this->addRole('employee', $this->getRole(Entities\IRole::ROLE_AUTHENTICATED)); $this->addRole('sales', $this->getRole('employee'), [ $permissions['salesModule:'], ]); $this->addRole('engineer', $this->getRole('employee'), [ $permissions['servers:access'], ]); // ...more roles & permissions assignments }
Don't forget to register your roles provider:
services: - MyRolesProvider
Now your'e set!
Checking permissions
Library provide a PHP trait, which enables pleasant quering Nette ACL system we've just configured. Please note that traits are available from PHP 5.4, for older versions of PHP you must copy/paste trait contents. This trait is effective only in presenter(s).
class BasePresenter extends Nette\Application\UI\Presenter { use IPub\Security\TPermission; }
Using annotations
You can fine-tune checking logic by this set of annotations:
/** * @Secured * @Secured\User(loggedIn) * @Secured\Resource(RESOURCE_NAME) * @Secured\Privilege(PRIVILEGE_NAME) * @Secured\Permission(RESOURCE_NAME: PRIVILEGE_NAME) * @Secured\Role(ROLE_NAME) */ class IntranetPresenter extends BasePresenter { /** * @Secured * @Secured\Permission(RESOURCE_NAME: PRIVILEGE_NAME) */ public function renderDefault() { } }
@Secured
This annotation instruct security system that presenter is subject to the permissions check. Without it permission checking will be skipped completely!
@Secured\User
This annotation accept value loggedIn or guest. Access to any resource and any privilege is controled only by login state of the current user.
Next annotations are working over Nette\Security\User roles assigned during login process.
@Secured\Resource
Access is granted only if role is allowed to access specified resource.
@Secured\Privilege
This grand access only if role is allowed to access specified privilege.
@Secured\Permission
Combination of above two - access is granted only if role have resource: privilege permission.
@Secured\Role
Grand access only to specified role.
On every place where *_NAME applies, you can specify multiple names separated by comma.
Using in presenters, components, models, etc.
Permission check can be performed also manually. You just need Nette\Security\User instance on which you call:
$user->isAllowed('resource', 'privilege');
TRUE of FALSE is returned respecively.
Using in Latte
In latte you can use two special macros.
<p>This text is for everyone...</p> {ifAllowed resource => 'intranet', privilege => 'access'} <p>But this one is only for special persons...</p> {/ifAllowed}
Macro ifAllowed is very similar to annotations definitions. You can use here one or all of available parameters: user, resource, privilege, permission or role.
This macro can be also used as n: macro:
<p>This text is for everyone...</p> <p n:ifAllowed resource => 'intranet', privilege => 'access'> But this one is only for special persons...</p>
And second special macro is for links:
<a n:allowedHref="Intranet:">Link to Intranet...</a>
Macro n:allowedHref is expecting only valid link and in case user doesn't have permission to that resource, link isn't displayed.
Redirect to login page
If user is not logged-in and tries to access secured resource a default action is throwing the Nette\Application\ForbiddenRequestException. However if you configure so called redirectUrl, request will be redirected to this url (login page) when this situation occurs.
Also all parameters of the original request will be stored. That way you are able to restore original request and be redirected to secured resource after successful login. To configure redirectUrl add this to your configuration:
permission:
	redirectUrl: 'Login:default'
To restore the original request prepare persistent param backlink in the presenter and use it in login procedure (callback)
class LoginPresenter { /** @persistent */ public $backlink; public function processLoginForm($form) { // try $this->getUser()->login($form->getValues()); $this->restoreRequest($this->backlink); $this->redirect('Admin:default'); // catch } }
TODO
- check 
IPub\Security\Entities\Permissionconstructor types - make documentation examples to be in sync w/ tests
 - tests for 
IPub\Security\Providers\* - latte macros tests
 - check annotations test logic
 - permissions-assertions tests/doc
 RolesProvider::allow,RolesProvider::denymethods
History
- 1.3.4 Add 
redirectUrlfunctionality - 1.3.0 Rename 
RolesModelandIPub\Security\ModelstoRolesProviderandIPub\Security\Providers - 1.2.0 Rewrite 
Security\Permissionto support resource inheritance & permissions assertions - 1.1.0 Cloned library into 
srigi/ipub-permissions - 1.0.1 Added roles inheritance
 
License
New BSD License or the GNU General Public License (GPL) version 2 or 3, see license.md.