mirror of
https://github.com/flarum/framework.git
synced 2025-01-19 18:12:59 +08:00
Fix permission logic priorities
This helps to fix a bug in flarum-ext-tags where a user could not rename or edit the tags of their own discussion if it was in a restricted tag. This was due to the order of GetPermission event listeners – the logic that determines that a user *can't* perform an action because of a restrictive tag was running before (and thus instead of) the logic that determines that a user *can* edit their own stuff. The solution is to change the "catch-all" methods on Policies to "after" instead of "before" – that is, they will run only if the per-ability methods return null. We also simplify the GetPermission event by passing the model as a sole "argument", as I can't imagine any cases where we'll need more than one argument.
This commit is contained in:
parent
7c0a72047a
commit
40a78d302e
|
@ -27,6 +27,7 @@ abstract class AbstractPolicy
|
|||
public function subscribe(Dispatcher $events)
|
||||
{
|
||||
$events->listen(GetPermission::class, [$this, 'getPermission']);
|
||||
$events->listen(GetPermission::class, [$this, 'getPermissionAfter'], -100);
|
||||
$events->listen(ScopeModelVisibility::class, [$this, 'scopeModelVisibility']);
|
||||
}
|
||||
|
||||
|
@ -36,22 +37,19 @@ abstract class AbstractPolicy
|
|||
*/
|
||||
public function getPermission(GetPermission $event)
|
||||
{
|
||||
if (isset($event->arguments[0]) && $event->arguments[0] instanceof $this->model) {
|
||||
if (method_exists($this, 'before')) {
|
||||
$arguments = array_merge([$event->actor, $event->ability], $event->arguments);
|
||||
if ($event->model instanceof $this->model && method_exists($this, $event->ability)) {
|
||||
return call_user_func_array([$this, $event->ability], [$event->actor, $event->model]);
|
||||
}
|
||||
}
|
||||
|
||||
$result = call_user_func_array([$this, 'before'], $arguments);
|
||||
|
||||
if (! is_null($result)) {
|
||||
return $result;
|
||||
}
|
||||
}
|
||||
|
||||
if (method_exists($this, $event->ability)) {
|
||||
$arguments = array_merge([$event->actor], $event->arguments);
|
||||
|
||||
return call_user_func_array([$this, $event->ability], $arguments);
|
||||
}
|
||||
/**
|
||||
* @param GetPermission $event
|
||||
* @return bool|null
|
||||
*/
|
||||
public function getPermissionAfter(GetPermission $event)
|
||||
{
|
||||
if ($event->model instanceof $this->model && method_exists($this, 'after')) {
|
||||
return call_user_func_array([$this, 'after'], [$event->actor, $event->ability, $event->model]);
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -56,7 +56,7 @@ class DiscussionPolicy extends AbstractPolicy
|
|||
* @param string $ability
|
||||
* @return bool|null
|
||||
*/
|
||||
public function before(User $actor, $ability)
|
||||
public function after(User $actor, $ability)
|
||||
{
|
||||
if ($actor->hasPermission('discussion.'.$ability)) {
|
||||
return true;
|
||||
|
@ -107,7 +107,7 @@ class DiscussionPolicy extends AbstractPolicy
|
|||
* @param Discussion $discussion
|
||||
* @return bool|null
|
||||
*/
|
||||
public function delete(User $actor, Discussion $discussion)
|
||||
public function hide(User $actor, Discussion $discussion)
|
||||
{
|
||||
if ($discussion->start_user_id == $actor->id && $discussion->participants_count <= 1) {
|
||||
return true;
|
||||
|
|
|
@ -25,7 +25,7 @@ class GroupPolicy extends AbstractPolicy
|
|||
* @param string $ability
|
||||
* @return bool|null
|
||||
*/
|
||||
public function before(User $actor, $ability)
|
||||
public function after(User $actor, $ability)
|
||||
{
|
||||
if ($actor->hasPermission('group.'.$ability)) {
|
||||
return true;
|
||||
|
|
|
@ -29,19 +29,12 @@ class PostPolicy extends AbstractPolicy
|
|||
*/
|
||||
protected $settings;
|
||||
|
||||
/**
|
||||
* @var Gate
|
||||
*/
|
||||
protected $gate;
|
||||
|
||||
/**
|
||||
* @param SettingsRepositoryInterface $settings
|
||||
* @param Gate $gate
|
||||
*/
|
||||
public function __construct(SettingsRepositoryInterface $settings, Gate $gate)
|
||||
public function __construct(SettingsRepositoryInterface $settings)
|
||||
{
|
||||
$this->settings = $settings;
|
||||
$this->gate = $gate;
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -60,9 +53,9 @@ class PostPolicy extends AbstractPolicy
|
|||
* @param Post $post
|
||||
* @return bool|null
|
||||
*/
|
||||
public function before(User $actor, $ability, Post $post)
|
||||
public function after(User $actor, $ability, Post $post)
|
||||
{
|
||||
if ($this->discussionAllows($actor, $ability, $post)) {
|
||||
if ($actor->can($ability.'Posts', $post->discussion)) {
|
||||
return true;
|
||||
}
|
||||
}
|
||||
|
@ -75,7 +68,7 @@ class PostPolicy extends AbstractPolicy
|
|||
// When fetching a discussion's posts: if the user doesn't have permission
|
||||
// to moderate the discussion, then they can't see posts that have been
|
||||
// hidden by someone other than themself.
|
||||
if ($this->gate->forUser($event->actor)->denies('editPosts', $event->discussion)) {
|
||||
if ($event->actor->cannot('editPosts', $event->discussion)) {
|
||||
$event->query->where(function ($query) use ($event) {
|
||||
$query->whereNull('hide_time')
|
||||
->orWhere('user_id', $event->actor->id);
|
||||
|
@ -90,10 +83,6 @@ class PostPolicy extends AbstractPolicy
|
|||
*/
|
||||
public function edit(User $actor, Post $post)
|
||||
{
|
||||
if ($this->discussionAllows($actor, 'edit', $post)) {
|
||||
return true;
|
||||
}
|
||||
|
||||
// A post is allowed to be edited if the user has permission to moderate
|
||||
// the discussion which it's in, or if they are the author and the post
|
||||
// hasn't been deleted by someone else.
|
||||
|
@ -107,15 +96,4 @@ class PostPolicy extends AbstractPolicy
|
|||
}
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* @param User $actor
|
||||
* @param string $ability
|
||||
* @param Post $post
|
||||
* @return bool
|
||||
*/
|
||||
protected function discussionAllows(User $actor, $ability, Post $post)
|
||||
{
|
||||
return $this->gate->forUser($actor)->allows($ability.'Posts', $post->discussion);
|
||||
}
|
||||
}
|
||||
|
|
|
@ -25,7 +25,7 @@ class UserPolicy extends AbstractPolicy
|
|||
* @param string $ability
|
||||
* @return bool|null
|
||||
*/
|
||||
public function before(User $actor, $ability)
|
||||
public function after(User $actor, $ability)
|
||||
{
|
||||
if ($actor->hasPermission('user.'.$ability)) {
|
||||
return true;
|
||||
|
|
|
@ -77,7 +77,7 @@ class CoreServiceProvider extends AbstractServiceProvider
|
|||
// this permission query and explicitly grant or deny the
|
||||
// permission.
|
||||
$allowed = $this->app->make('events')->until(
|
||||
new GetPermission($actor, $ability, $model ? [$model] : [])
|
||||
new GetPermission($actor, $ability, $model)
|
||||
);
|
||||
|
||||
if (! is_null($allowed)) {
|
||||
|
|
|
@ -25,19 +25,19 @@ class GetPermission
|
|||
public $ability;
|
||||
|
||||
/**
|
||||
* @var array
|
||||
* @var mixed
|
||||
*/
|
||||
public $arguments;
|
||||
public $model;
|
||||
|
||||
/**
|
||||
* @param User $actor
|
||||
* @param string $ability
|
||||
* @param array $arguments
|
||||
* @param mixed $model
|
||||
*/
|
||||
public function __construct(User $actor, $ability, array $arguments)
|
||||
public function __construct(User $actor, $ability, $model)
|
||||
{
|
||||
$this->actor = $actor;
|
||||
$this->ability = $ability;
|
||||
$this->arguments = $arguments;
|
||||
$this->model = $model;
|
||||
}
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue
Block a user