-
Notifications
You must be signed in to change notification settings - Fork 133
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Support hierarchical permissions in method #1253
base: develop
Are you sure you want to change the base?
feat: Support hierarchical permissions in method #1253
Conversation
Hi, nice PR, I'm currently using something similar. If I understand correctly For example permissions: public array $permissions = [
'crm.customer.list' => 'Can access the CRM customer list',
'crm.customer.show' => 'Can access the CRM customer',
'crm.customer.edit' => 'Can edit a CRM customer',
'crm.customer.create' => 'Can create a new CRM customer',
'crm.customer.delete' => 'Can delete a CRM customer',
]; In matrix then I don't need to write 5 rows in array like: public array $matrix = [
'crm' => [
'crm.access',
'crm.customer.list',
'crm.customer.show',
'crm.customer.create',
'crm.customer.edit',
'crm.customer.delete',
],
]; but just 1 for public array $matrix = [
'crm' => [
'crm.access',
'crm.customer.*',
],
]; It will work also deeper like for permissions like : 'crm.service.note.list',
'crm.service.note.show',
'crm.service.note.edit',
'crm.service.note.create',
'crm.service.note.delete', to be only: 'crm.service.note.*, |
Looks useful, although it has a bit of limited functionality. I imagine that for some roles, we would like to allow editing only, not deletion. So I wonder why not support also this:
However, even in the proposed version, this can be error-prone - by oversight. Literally listing all permissions is safer. Let's get more opinions. |
Problem is... Shield does not allows multiple levels of permissions, only one level. And that's also very limited functionality... |
Note: |
The following is the implementation contained in this PR. I think it is pretty simple and probably much more efficient than nested loops. I can only see one inherent concern in this change, which I will discuss later. <?php
public function can(string $permission): bool
{
$this->populatePermissions();
// Check exact match
if ($this->permissions !== null && $this->permissions !== [] && in_array($permission, $this->permissions, true)) {
return true;
}
// Check wildcard match
$checks = [];
$parts = explode('.', $permission);
for ($i = count($parts); $i > 0; $i--) {
$check = implode('.', array_slice($parts, 0, $i)) . '.*';
$checks[] = $check;
}
return $this->permissions !== null
&& $this->permissions !== []
&& array_intersect($checks, $this->permissions) !== [];
} Key Differences Between Original and Improved Code
Functional ImprovementsThe improved implementation provides more granular permission checking by supporting hierarchical wildcards. For example, with a permission like "users.posts.edit":
This allows for more flexible permission structures where wildcards can exist at different levels of the hierarchy. ConcernsMy concern was that array_intersect() performs loose comparisons internally, which could potentially lead to type juggling vulnerabilities. This would happen if a user could somehow manipulate the input to the permission check, forcing it to be a different type (e.g., an integer instead of a string). However, this risk is very low in practice. The PS.: one can still lists all permissions literally like this: users.posts.edit, users.posts.read, users.post.delete... and they can() be checked correctly with this PR. |
Description
This pull request enhances the
can()
method in CodeIgniter Shield to support hierarchical permissions, allowing for more granular control over user access. Previously, Shield only supported single-level permissions (e.g.,users.create
), see #1229 This change enables checking permissions with multiple levels, likeadmin.users.crud.create
, using wildcard matching at each level.The core change involves modifying the
can()
method to generate a series of wildcard checks based on the input permission string. It now iteratively checks for all possible parent levels. For example, foradmin.users.create
, it will check foradmin.users.create
,admin.users.*
, andadmin.*
.A new test case,
testCanNestedPerms
, has been added to verify the correct behavior of the hierarchical permission checks, including various positive and negative scenarios.This improvement provides greater flexibility in defining and managing permissions within applications built with Shield. It allows for a more natural and organized permission structure, reflecting the hierarchical nature of many application features.
Checklist:
testCanNestedPerms
added to specifically cover the hierarchical permission logic.)User Guide Updates (Required):
The following section needs to be added/updated in the User Guide (likely within the "Authorization" or "Permissions" section):
Hierarchical Permissions
Shield now supports hierarchical permissions, allowing you to define permissions with multiple levels separated by dots (
.
). This enables a more granular and organized approach to authorization.You can use the wildcard character (
*
) at any level to represent all permissions within that level.Example:
If a group has the permission
users.manage.*
, it will have access to:users.manage.create
users.manage.edit
users.manage.delete
users.manage.anything.else
However, it will not have access to:
users.view
users.anything.else
The
can()
method will automatically check all parent levels when evaluating a permission.Note: This update significantly improves the flexibility of the authorization system. Be sure to review your existing permissions and consider how you can leverage hierarchical permissions to simplify and improve your authorization logic.