芝麻web文件管理V1.00
编辑当前文件:/home2/sdektunc/xmintal-back/vendor/yiisoft/yii2/filters/AccessRule.php
* @since 2.0 */ class AccessRule extends Component { /** * @var bool whether this is an 'allow' rule or 'deny' rule. */ public $allow = false; /** * @var array|null list of action IDs that this rule applies to. The comparison is case-sensitive. * If not set or empty, it means this rule applies to all actions. */ public $actions; /** * @var array|null list of the controller IDs that this rule applies to. * * The comparison uses [[\yii\base\Controller::uniqueId]], so each controller ID is prefixed * with the module ID (if any). For a `product` controller in the application, you would specify * this property like `['product']` and if that controller is located in a `shop` module, this * would be `['shop/product']`. * * The comparison is case-sensitive. * * If not set or empty, it means this rule applies to all controllers. * * Since version 2.0.12 controller IDs can be specified as wildcards, e.g. `module/*`. */ public $controllers; /** * @var array|null list of roles that this rule applies to (requires properly configured User component). * Two special roles are recognized, and they are checked via [[User::isGuest]]: * * - `?`: matches a guest user (not authenticated yet) * - `@`: matches an authenticated user * * If you are using RBAC (Role-Based Access Control), you may also specify role names. * In this case, [[User::can()]] will be called to check access. * * Note that it is preferred to check for permissions instead. * * If this property is not set or empty, it means this rule applies regardless of roles. * @see permissions * @see roleParams */ public $roles; /** * @var array|null list of RBAC (Role-Based Access Control) permissions that this rules applies to. * [[User::can()]] will be called to check access. * * If this property is not set or empty, it means this rule applies regardless of permissions. * @since 2.0.12 * @see roles * @see roleParams */ public $permissions; /** * @var array|Closure parameters to pass to the [[User::can()]] function for evaluating * user permissions in [[$roles]]. * * If this is an array, it will be passed directly to [[User::can()]]. For example for passing an * ID from the current request, you may use the following: * * ```php * ['postId' => Yii::$app->request->get('id')] * ``` * * You may also specify a closure that returns an array. This can be used to * evaluate the array values only if they are needed, for example when a model needs to be * loaded like in the following code: * * ```php * 'rules' => [ * [ * 'allow' => true, * 'actions' => ['update'], * 'roles' => ['updatePost'], * 'roleParams' => function($rule) { * return ['post' => Post::findOne(Yii::$app->request->get('id'))]; * }, * ], * ], * ``` * * A reference to the [[AccessRule]] instance will be passed to the closure as the first parameter. * * @see roles * @since 2.0.12 */ public $roleParams = []; /** * @var array|null list of user IP addresses that this rule applies to. An IP address * can contain the wildcard `*` at the end so that it matches IP addresses with the same prefix. * For example, '192.168.*' matches all IP addresses in the segment '192.168.'. * It may also contain a pattern/mask like '172.16.0.0/12' which would match all IPs from the * 20-bit private network block in RFC1918. * If not set or empty, it means this rule applies to all IP addresses. * @see Request::userIP * @see IpHelper::inRange */ public $ips; /** * @var array|null list of request methods (e.g. `GET`, `POST`) that this rule applies to. * If not set or empty, it means this rule applies to all request methods. * @see \yii\web\Request::method */ public $verbs; /** * @var callable a callback that will be called to determine if the rule should be applied. * The signature of the callback should be as follows: * * ```php * function ($rule, $action) * ``` * * where `$rule` is this rule, and `$action` is the current [[Action|action]] object. * The callback should return a boolean value indicating whether this rule should be applied. */ public $matchCallback; /** * @var callable|null a callback that will be called if this rule determines the access to * the current action should be denied. This is the case when this rule matches * and [[$allow]] is set to `false`. * * If not set, the behavior will be determined by [[AccessControl]], * either using [[AccessControl::denyAccess()]] * or [[AccessControl::$denyCallback]], if configured. * * The signature of the callback should be as follows: * * ```php * function ($rule, $action) * ``` * * where `$rule` is this rule, and `$action` is the current [[Action|action]] object. * @see AccessControl::$denyCallback */ public $denyCallback; /** * Checks whether the Web user is allowed to perform the specified action. * @param Action $action the action to be performed * @param User|false $user the user object or `false` in case of detached User component * @param Request $request * @return bool|null `true` if the user is allowed, `false` if the user is denied, `null` if the rule does not apply to the user */ public function allows($action, $user, $request) { if ($this->matchAction($action) && $this->matchRole($user) && $this->matchIP($request->getUserIP()) && $this->matchVerb($request->getMethod()) && $this->matchController($action->controller) && $this->matchCustom($action) ) { return $this->allow ? true : false; } return null; } /** * @param Action $action the action * @return bool whether the rule applies to the action */ protected function matchAction($action) { return empty($this->actions) || in_array($action->id, $this->actions, true); } /** * @param Controller $controller the controller * @return bool whether the rule applies to the controller */ protected function matchController($controller) { if (empty($this->controllers)) { return true; } $id = $controller->getUniqueId(); foreach ($this->controllers as $pattern) { if (StringHelper::matchWildcard($pattern, $id)) { return true; } } return false; } /** * @param User $user the user object * @return bool whether the rule applies to the role * @throws InvalidConfigException if User component is detached */ protected function matchRole($user) { $items = empty($this->roles) ? [] : $this->roles; if (!empty($this->permissions)) { $items = array_merge($items, $this->permissions); } if (empty($items)) { return true; } if ($user === false) { throw new InvalidConfigException('The user application component must be available to specify roles in AccessRule.'); } foreach ($items as $item) { if ($item === '?') { if ($user->getIsGuest()) { return true; } } elseif ($item === '@') { if (!$user->getIsGuest()) { return true; } } else { if (!isset($roleParams)) { $roleParams = !is_array($this->roleParams) && is_callable($this->roleParams) ? call_user_func($this->roleParams, $this) : $this->roleParams; } if ($user->can($item, $roleParams)) { return true; } } } return false; } /** * @param string|null $ip the IP address * @return bool whether the rule applies to the IP address */ protected function matchIP($ip) { if (empty($this->ips)) { return true; } foreach ($this->ips as $rule) { if ( $rule === '*' || $rule === $ip || ( $ip !== null && ($pos = strpos($rule, '*')) !== false && strncmp($ip, $rule, $pos) === 0 ) || ( strpos($rule, '/') !== false && IpHelper::inRange($ip, $rule) === true ) ) { return true; } } return false; } /** * @param string $verb the request method. * @return bool whether the rule applies to the request */ protected function matchVerb($verb) { return empty($this->verbs) || in_array(strtoupper($verb), array_map('strtoupper', $this->verbs), true); } /** * @param Action $action the action to be performed * @return bool whether the rule should be applied */ protected function matchCustom($action) { return empty($this->matchCallback) || call_user_func($this->matchCallback, $this, $action); } }