返回介绍

Model Visibility

发布于 2024-06-22 20:04:58 字数 12584 浏览 0 评论 0 收藏 0

This article concerns authorization, and uses some concepts from the authorization system. You should familiarize yourself with that first.

When a user visits the All Discussions page, we want to quickly show them the recent discussions that the user has access to. We do this via the whereVisibleTo method, which is defined in Flarum\Database\ScopeVisibilityTrait, and available to Eloquent models and queries through Eloquent scoping. For example:

use Flarum\Group\Group;

// Construct and execute a query for all groups that a given user can see.
$groups = Group::whereVisibleTo($actor)->get();

// Apply visibility scoping to an existing query.
More eloquent filters can be added after this.
$query
  ->whereVisibleTo($actor)
  ->whereRaw('1=1');

// Apply visibility scoping with an ability
$query
  ->whereVisibleTo($actor, 'someAbility')

This is necessary because users shouldn't see all discussions. For instance:

  • Users shouldn't see discussions in tags they don't have permission to see.
  • Users shouldn't see posts in discussions they don't have permission to see.
  • Users shouldn't see discussions by other users that haven't been approved yet.
  • Users generally shouldn't see hidden discussions.

We accomplish this through a system called "Model Visibility". Essentially, this allows core and extensions to add logic that expands/constrains database queries made by the whereVisibleTo method.

Please note that visibility scoping can only be used on models that use the Flarum\Database\ScopeVisibilityTrait trait.

How It's Processed

So, what actually happens when we call whereVisibleTo? This call is handled by Flarum's general model visibility scoping system, which runs the query through a sequence of callbacks, which are called "scopers".

The query will be run through all applicable scopers registered for the model of the query. Note that visibility scopers registered for a parent class (like Flarum\Post\Post) will also be applied to any child classes (like Flarum\Post\CommentPost).

Scopers don't need to return anything, but rather should perform in-place mutations on the Eloquent query object.

Custom Scopers

There are actually two types of scopers:

  • ability-based scopers will apply to all queries for the query's model run with a given ability (which defaults to "view"). Please note this is not related to ability strings from the policy system
  • "global" scopers will apply to all queries for the query's model. Please note that global scopers will be run on ALL queries for its model, including view, which could create infinite loops or errors. Generally, you only want to run these for abilities that don't begin with view. You'll see this in the

    Assume we have a set of discussions, and we want to return a subset of that set based on some restrictions. There are 2 ways to do this:

    • We could start with the full set of discussions, and remove the ones that shouldn't be in our query. We'd do this via a series of where calls: $query->where('is_private', false), $query->where('is_hidden', false) etc.
    • We could start with an empty set and add the discussions that should be in our query. Here, we'd use orWhere calls: $query->orWhere('is_private, false), $query->orWhere('is_hidden, false).

    Note that these are not equivalent! The first one would only return discussions that are not private AND not hidden. The second one could return private discussions that are not hidden, as well as hidden discussions that are not private.

    Generally speaking, we'll want to be consistent with the types of queries we use. Mixing where and orWhere queries on the same level can lead to unexpected results depending on the order in which queries are applied. Some guidelines:

    • For view scopers, all logic should be wrapped in a where callback query. orWhere should NEVER be used on the top level for view.
    • For abilities prefixed by view, (e.g. viewPrivate, viewHidden), and similar calls, all logic should be wrapped in an orWhere callback query.

    For abilities that don't start with view, it will depend case-by-case. As a general rule:

    • If whereVisibleTo($actor, 'someAbilityName') is called from regular code (e.g. Discussion::query()->whereVisibleTo($actor, 'someAbilityName')), scopers for someAbilityName should wrap their logic in a where.
    • If whereVisibleTo($actor, 'someAbilityName') is called from another visibility scoper, scopers for someAbilityName should wrap their logic in an orWhere.

    This is because top-level scoper logic should constrain the query down, but each of those constraints might have exceptions, for which we'd want to add instances back in. For example, users should see discussions if:

    • The discussion is not private
      • Or they are the author.
      • Or the discussion needs approval and the current user can approve discussions.
    • The discusion is not hidden
      • Or they are the author.
      • Or they are an admin.

    See how the top-level statements are the equivalent of wheres, but their sub-statements are orWheres that add exceptions to those general rules?

    Custom Scoper Examples

    Let's take a look at some examples from Flarum Tags.

    First, a scoper for the Tag model with the view ability:

    <?php
    
    namespace Flarum\Tags\Access;
    
    use Flarum\Tags\Tag;
    use Flarum\User\User;
    use Illuminate\Database\Eloquent\Builder;
    
    class ScopeTagVisibility
    {
        /**
         * @param User $actor
         * @param Builder $query
         */
        public function __invoke(User $actor, Builder $query)
        {
            $query->whereIn('id', function ($query) use ($actor) {
                Tag::query()->setQuery($query->from('tags'))->whereHasPermission($actor, 'viewForum')->select('tags.id');
            });
        }
    }
    

    And a global scoper for the Discussion model:

    <?php
    
    namespace Flarum\Tags\Access;
    
    use Flarum\Tags\Tag;
    use Flarum\User\User;
    use Illuminate\Database\Eloquent\Builder;
    
    class ScopeDiscussionVisibilityForAbility
    {
        /**
         * @param User $actor
         * @param Builder $query
         * @param string $ability
         */
        public function __invoke(User $actor, Builder $query, $ability)
        {
            // Automatic scoping should be applied to the global `view` ability,
            // and to arbitrary abilities that aren't subqueries of `view`.
            // For example, if we want to scope discussions where the user can
            // edit posts, this should apply.
            // But if we are expanding a restriction of `view` (for example,
            // `viewPrivate`), we shouldn't apply this query again.
            if (substr($ability, 0, 4) === 'view' && $ability !== 'view') {
                return;
            }
    
            // Avoid an infinite recursive loop.
            if (Str::endsWith($ability, 'InRestrictedTags')) {
                return;
            }
    
            // `view` is a special case where the permission string is represented by `viewForum`.
            $permission = $ability === 'view' ? 'viewForum' : $ability;
    
            // Restrict discussions where users don't have necessary permissions in all tags.
            // We use a double notIn instead of a doubleIn because the permission must be present in ALL tags,
            // not just one.
            $query->where(function ($query) use ($actor, $permission) {
                $query
                    ->whereNotIn('discussions.id', function ($query) use ($actor, $permission) {
                        return $query->select('discussion_id')
                            ->from('discussion_tag')
                            ->whereNotIn('tag_id', function ($query) use ($actor, $permission) {
                                Tag::query()->setQuery($query->from('tags'))->whereHasPermission($actor, $permission)->select('tags.id');
                            });
                    })
                    ->orWhere(function ($query) use ($actor, $permission) {
                        // Allow extensions a way to override scoping for any given permission.
                        $query->whereVisibleTo($actor, "${permission}InRestrictedTags");
                    });
            });
    
            // Hide discussions with no tags if the user doesn't have that global
            // permission.
            if (! $actor->hasPermission($permission)) {
                $query->has('tags');
            }
        }
    }
    

    Note that, as mentioned above, we don't run this for abilities starting with view, since those are handled by their own, dedicated scopers.

    And finally, a scoper for the viewPrivate ability (this one is a fake example, not from tags):

    <?php
    
    namespace ACME\YourExtension\Access;
    
    use Flarum\Discussion\Discussion;
    use Flarum\User\User;
    use Illuminate\Database\Eloquent\Builder;
    
    class ScopeDiscussionVisibility
    {
        /**
         * @param User $actor
         * @param Builder $query
         */
        public function __invoke(User $actor, Builder $query)
        {
            $query->orWhere(function($query) use ($actor) {
                $query->where('some_column', true);
                $query->where('some_other_column', false);
            })
        }
    }
    

    Note that in contrast to the other 2 examples, we're using orWhere to wrap our logic. This is explained

    use Flarum\Extend;
    use Flarum\Discussion\Discussion;
    use Flarum\Tags\Tag;
    use YourNamespace\Access;
    
    return [
      // Other extenders
    
      // 'view' is optional here, since that's the default value for the ability argument.
      // However, if we were applying this to a different ability, such as `viewPrivate`,
      // would need to explicitly specify that.
      (new Extend\ModelVisibility(Tag::class))
        ->scope(Access\ScopeTagVisibility::class, 'view'),
    
      (new Extend\ModelVisibility(Discussion::class))
        ->scopeAll(Access\ScopeDiscussionVisibilityForAbility::class),
      // Other extenders
    ];
    

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。
列表为空,暂无数据
    我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
    原文