Files
ezmigrationbundle/Core/Executor/RoleManager.php

302 lines
10 KiB
PHP

<?php
namespace Kaliop\eZMigrationBundle\Core\Executor;
use eZ\Publish\API\Repository\Values\User\Role;
use eZ\Publish\API\Repository\RoleService;
use eZ\Publish\API\Repository\UserService;
use Kaliop\eZMigrationBundle\Core\ReferenceHandler\ReferenceHandler;
use Kaliop\eZMigrationBundle\Core\Handler\RoleTranslationHandler;
use eZ\Publish\API\Repository\Exceptions\InvalidArgumentException;
/**
* Handles the role migration definitions.
*/
class RoleManager extends RepositoryExecutor
{
protected $supportedStepTypes = array('role');
/**
* Method to handle the create operation of the migration instructions
*/
protected function create()
{
// Authenticate the user
$this->loginUser();
$roleService = $this->repository->getRoleService();
$userService = $this->repository->getUserService();
$roleCreateStruct = $roleService->newRoleCreateStruct($this->dsl['name']);
// Publish new role
$role = $roleService->createRole($roleCreateStruct);
if (array_key_exists('policies', $this->dsl)) {
$this->addPolicies($role, $roleService, $this->dsl['policies']);
}
if (array_key_exists('assign', $this->dsl)) {
$this->assignRole($role, $roleService, $userService, $this->dsl['assign']);
}
$this->setReferences($role);
}
/**
* Method to handle the update operation of the migration instructions
*/
protected function update()
{
// Authenticate the user
$this->loginUser();
$roleService = $this->repository->getRoleService();
$userService = $this->repository->getUserService();
if (array_key_exists('name', $this->dsl)) {
/** @var \eZ\Publish\API\Repository\Values\User\Role $role */
$role = $roleService->loadRoleByIdentifier($this->dsl['name']);
// Updating role name
if (array_key_exists('new_name', $this->dsl)) {
$update = $roleService->newRoleUpdateStruct();
$update->identifier = $this->dsl['new_name'];
$roleService->updateRole($role, $update);
}
if (array_key_exists('policies', $this->dsl)) {
$ymlPolicies = $this->dsl['policies'];
// Removing all policies so we can add them back.
// TODO: Check and update policies instead of remove and add.
$policies = $role->getPolicies();
foreach($policies as $policy) {
$roleService->deletePolicy($policy);
}
foreach($ymlPolicies as $key => $ymlPolicy) {
$this->addPolicy($role, $roleService, $ymlPolicy);
}
}
if (array_key_exists('assign', $this->dsl)) {
$this->assignRole($role, $roleService, $userService, $this->dsl['assign']);
}
$this->setReferences($role);
}
}
/**
* Method to handle the delete operation of the migration instructions
*/
protected function delete()
{
//Get the eZ 5 API Repository and the required services
// Authenticate the user
$this->loginUser();
$roleService = $this->repository->getRoleService();
if (array_key_exists('name', $this->dsl)) {
$role = $roleService->loadRoleByIdentifier($this->dsl['name']);
$roleService->deleteRole($role);
}
}
/**
* Set references to object attributes to be retrieved later.
*
* The Role Manager currently support setting references to role_ids.
*
* @param \eZ\Publish\API\Repository\Values\User\Role $role
* @throws \InvalidArgumentException When trying to assign a reference to an unsupported attribute
* @return boolean
*/
protected function setReferences($role)
{
if (!array_key_exists('references', $this->dsl)) {
return false;
}
$referenceHandler = ReferenceHandler::instance();
foreach ($this->dsl['references'] as $reference) {
switch ($reference['attribute']) {
case 'role_id':
case 'id':
$value = $role->id;
break;
case 'identifier':
case 'role_identidier':
$value = $role->identifier;
break;
default:
throw new \InvalidArgumentException('Role Manager does not support setting references for attribute ' . $reference['attribute']);
}
$referenceHandler->addReference($reference['identifier'], $value);
}
return true;
}
/**
* Create a new Limitation object based on the type and value in the $limitation array.
*
* <pre>
* $limitation = array(
* 'type' => Type of the limitation
* 'value' => array(Values to base the limitation on)
* )
* </pre>
*
* @param \eZ\Publish\API\Repository\RoleService $roleService
* @param array $limitation
* @return \eZ\Publish\API\Repository\Values\User\Limitation
*/
private function createLimitation(RoleService $roleService, array $limitation)
{
/** @var RoleTranslationHandler $roleTranslationHandler */
$roleTranslationHandler = $this->container->get('ez_migration_bundle.handler.role');
$limitationType = $roleService->getLimitationType($limitation['identifier']);
$limitationValue = is_array($limitation['values']) ? $limitation['values'] : array($limitation['values']);
foreach( $limitationValue as $id => $value) {
if ($this->isReference($value)) {
$value = $this->getReference($value);
$limitationValue[$id] = $value;
}
}
$limitationValue = $roleTranslationHandler->convertLimitationToValue($limitation['identifier'], $limitationValue);
return $limitationType->buildValue($limitationValue);
}
/**
* Assign a role to users and groups in the assignment array.
*
* <pre>
* $assignments = array(
* array(
* 'type' => 'user',
* 'ids' => array( user ids ),
* 'limitation' => array( limitations )
* )
* )
* </pre>
*
* @param \eZ\Publish\API\Repository\Values\User\Role $role
* @param \eZ\Publish\API\Repository\RoleService $roleService
* @param \eZ\Publish\API\Repository\UserService $userService
* @param array $assignments
*/
private function assignRole(Role $role, RoleService $roleService, UserService $userService, array $assignments)
{
foreach ($assignments as $assign) {
switch ($assign['type']) {
case 'user':
foreach ($assign['ids'] as $userId) {
$user = $userService->loadUser($userId);
if (!array_key_exists('limitation', $assign)) {
$roleService->assignRoleToUser($role, $user);
} else {
foreach ($assign['limitation'] as $limitation) {
$limitationObject = $this->createLimitation($roleService, $limitation);
$roleService->assignRoleToUser($role, $user, $limitationObject);
}
}
}
break;
case 'group':
foreach ($assign['ids'] as $groupId) {
$group = $userService->loadUserGroup($groupId);
if (!array_key_exists('limitation', $assign)) {
try {
$roleService->assignRoleToUserGroup($role, $group);
} catch (InvalidArgumentException $e) {}
} else {
foreach ($assign['limitation'] as $limitation) {
$limitationObject = $this->createLimitation($roleService, $limitation);
try {
$roleService->assignRoleToUserGroup($role, $group, $limitationObject);
} catch (InvalidArgumentException $e) {}
}
}
}
break;
}
}
}
/**
* Unassign a role from a list of users based on their user ids.
*
* @param Role $role
* @param RoleService $roleService
* @param UserService $userService
* @param array $userIds
*/
private function unassignRoleFromUsers(
Role $role,
RoleService $roleService,
UserService $userService,
array $userIds
) {
foreach ($userIds as $userId) {
$user = $userService->loadUser($userId);
$roleService->unassignRoleFromUser($role, $user);
}
}
/**
* Unassign a role from a list of user groups based on their id.
*
* @param Role $role
* @param RoleService $roleService
* @param UserService $userService
* @param array $userGroupIds
*/
private function unassignRoleFromGroups(
Role $role,
RoleService $roleService,
UserService $userService,
array $userGroupIds
) {
foreach ($userGroupIds as $userGroupId) {
$userGroup = $userService->loadUserGroup($userGroupId);
$roleService->unassignRoleFromUserGroup($role, $userGroup);
}
}
/**
* Add new policies to the $role Role.
*
* @param \eZ\Publish\API\Repository\Values\User\Role $role
* @param \eZ\Publish\API\Repository\RoleService $roleService
* @param array $policies
*/
private function addPolicy(Role $role, RoleService $roleService, array $policy)
{
$policyCreateStruct = $roleService->newPolicyCreateStruct($policy['module'], $policy['function']);
if (array_key_exists('limitations', $policy)) {
foreach ($policy['limitations'] as $limitation) {
$limitationObject = $this->createLimitation($roleService, $limitation);
$policyCreateStruct->addLimitation($limitationObject);
}
}
$roleService->addPolicy($role, $policyCreateStruct);
}
}