Custom Policies¶
The content Repository uses Roles and Policies to give Users access to different functions of the system.
Any bundle can expose available Policies via a PolicyProvider which can be added to EzPublishCoreBundle's service container extension.
PolicyProvider¶
A PolicyProvider object provides a hash containing declared modules, functions and Limitations.
- Each Policy provider provides a collection of permission modules.
- Each module can provide functions (e.g. in
content/read"content" is the module, "read" is the function) - Each function can provide a collection of Limitations.
First level key is the module name, value is a hash of available functions, with function name as key.
Function value is an array of available Limitations, identified by the alias declared in LimitationType service tag.
If no Limitation is provided, value can be null or an empty array.
1 2 3 4 5 6 7 8 9 10 | |
Limitations need to be implemented as Limitation types and declared as services identified with ezpublish.limitationType tag.
Name provided in the hash for each Limitation is the same value set in the alias attribute in the service tag.
For example:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 | |
YamlPolicyProvider¶
An abstract class based on YAML is provided: eZ\Bundle\EzPublishCoreBundle\DependencyInjection\Security\PolicyProvider\YamlPolicyProvider.
It defines an abstract getFiles() method.
Extend YamlPolicyProvider and implement getFiles() to return absolute paths to your YAML files.
1 2 3 4 5 6 7 8 9 10 11 12 13 | |
In AcmeExampleBundle/Resources/config/policies.yml:
1 2 3 | |
Extending existing policies¶
A PolicyProvider may provide new functions to a module, and additional Limitations to an existing function.
It is however strongly encouraged to add functions to your own Policy modules.
It is not possible to remove an existing module, function or limitation from a Policy.
Integrating the PolicyProvider into EzPublishCoreBundle¶
For a PolicyProvider to be active, it must be properly declared in EzPublishCoreBundle.
A bundle just has to retrieve CoreBundle's DIC extension and call addPolicyProvider(). This must be done in the bundle's build() method.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 | |
Integrating custom Limitation types with the UI¶
To provide support for editing custom policies in the Back Office you need to implement EzSystems\RepositoryForms\Limitation\LimitationFormMapperInterface.
Next, register the service in DIC (Dependency Injection Container) with the ez.limitation.formMapper tag and set the limitationType attribute to the Limitation type's identifier:
1 2 3 4 5 6 | |
If you want to provide human-readable names of the custom Limitation values, you need to implement \EzSystems\RepositoryForms\Limitation\LimitationValueMapperInterface.
Then register the service in DIC with the ez.limitation.valueMapper tag and set the limitationType attribute to Limitation type's identifier:
1 2 3 4 5 6 | |
If you want to completely override the way of rendering custom Limitation values in the role view,
create a Twig template containing block definition which follows the naming convention:
ez_limitation_<LIMITATION TYPE>_value. For example:
1 2 3 | |
Add it to the configuration under ezpublish.system.<SCOPE>.limitation_value_templates:
1 2 3 4 5 | |
Note
If you skip this part, Limitation values will be rendered using an ez_limitation_value_fallback block as comma-separated list.
You can also provide translation of the Limitation type identifier by adding an entry to the translation file under the ezrepoforms_policies domain.
The key must follow the naming convention: policy.limitation.identifier.<LIMITATION TYPE>.
For example:
1 2 3 4 5 | |