.. index:: single: Security; Data Permission Voters
In Symfony2 you can check the permission to access data by using the :doc:`ACL module </cookbook/security/acl>`, which is a bit overwhelming for many applications. A much easier solution is to work with custom voters, which are like simple conditional statements.
.. seealso:: Voters can also be used in other ways, like, for example, blacklisting IP addresses from the entire application: :doc:`/cookbook/security/voters`.
Tip
Take a look at the :doc:`authorization </components/security/authorization>` chapter for an even deeper understanding on voters.
In order to use voters, you have to understand how Symfony works with them.
All voters are called each time you use the isGranted()
method on Symfony's
security context (i.e. the security.context
service). Each one decides
if the current user should have access to some resource.
Ultimately, Symfony uses one of three different approaches on what to do with the feedback from all voters: affirmative, consensus and unanimous.
For more information take a look at :ref:`the section about access decision managers <components-security-access-decision-manager>`.
A custom voter must implement :class:`Symfony\\Component\\Security\\Core\\Authorization\\Voter\\VoterInterface`, which has this structure:
In this example, the voter will check if the user has access to a specific
object according to your custom conditions (e.g. they must be the owner of
the object). If the condition fails, you'll return
VoterInterface::ACCESS_DENIED
, otherwise you'll return
VoterInterface::ACCESS_GRANTED
. In case the responsibility for this decision
does not belong to this voter, it will return VoterInterface::ACCESS_ABSTAIN
.
The goal is to create a voter that checks if a user has access to view or edit a particular object. Here's an example implementation:
// src/Acme/DemoBundle/Security/Authorization/Voter/PostVoter.php
namespace Acme\DemoBundle\Security\Authorization\Voter;
use Symfony\Component\Security\Core\Exception\InvalidArgumentException;
use Symfony\Component\Security\Core\Authorization\Voter\VoterInterface;
use Symfony\Component\Security\Core\Authentication\Token\TokenInterface;
use Symfony\Component\Security\Core\User\UserInterface;
class PostVoter implements VoterInterface
{
const VIEW = 'view';
const EDIT = 'edit';
public function supportsAttribute($attribute)
{
return in_array($attribute, array(
self::VIEW,
self::EDIT,
));
}
public function supportsClass($class)
{
$supportedClass = 'Acme\DemoBundle\Entity\Post';
return $supportedClass === $class || is_subclass_of($class, $supportedClass);
}
/**
* @var \Acme\DemoBundle\Entity\Post $post
*/
public function vote(TokenInterface $token, $post, array $attributes)
{
// check if class of this object is supported by this voter
if (!$this->supportsClass(get_class($post))) {
return VoterInterface::ACCESS_ABSTAIN;
}
// check if the voter is used correct, only allow one attribute
// this isn't a requirement, it's just one easy way for you to
// design your voter
if(1 !== count($attributes)) {
throw new InvalidArgumentException(
'Only one attribute is allowed for VIEW or EDIT'
);
}
// set the attribute to check against
$attribute = $attributes[0];
// get current logged in user
$user = $token->getUser();
// check if the given attribute is covered by this voter
if (!$this->supportsAttribute($attribute)) {
return VoterInterface::ACCESS_ABSTAIN;
}
// make sure there is a user object (i.e. that the user is logged in)
if (!$user instanceof UserInterface) {
return VoterInterface::ACCESS_DENIED;
}
switch($attribute) {
case 'view':
// the data object could have for example a method isPrivate()
// which checks the Boolean attribute $private
if (!$post->isPrivate()) {
return VoterInterface::ACCESS_GRANTED;
}
break;
case 'edit':
// we assume that our data object has a method getOwner() to
// get the current owner user entity for this data object
if ($user->getId() === $post->getOwner()->getId()) {
return VoterInterface::ACCESS_GRANTED;
}
break;
}
}
}
That's it! The voter is done. The next step is to inject the voter into the security layer.
To inject the voter into the security layer, you must declare it as a service
and tag it with security.voter
:
.. configuration-block:: .. code-block:: yaml # src/Acme/DemoBundle/Resources/config/services.yml services: security.access.post_voter: class: Acme\DemoBundle\Security\Authorization\Voter\PostVoter public: false tags: - { name: security.voter } .. code-block:: xml <!-- src/Acme/DemoBundle/Resources/config/services.xml --> <?xml version="1.0" encoding="UTF-8" ?> <container xmlns="http://symfony.com/schema/dic/services" xsi:schemaLocation="http://symfony.com/schema/dic/services http://symfony.com/schema/dic/services/services-1.0.xsd"> <services> <service id="security.access.post_document_voter" class="Acme\DemoBundle\Security\Authorization\Voter\PostVoter" public="false"> <tag name="security.voter" /> </service> </services> </container> .. code-block:: php // src/Acme/DemoBundle/Resources/config/services.php $container ->register( 'security.access.post_document_voter', 'Acme\DemoBundle\Security\Authorization\Voter\PostVoter' ) ->addTag('security.voter') ;
The registered voter will then always be asked as soon as the method isGranted()
from the security context is called.
// src/Acme/DemoBundle/Controller/PostController.php
namespace Acme\DemoBundle\Controller;
use Symfony\Bundle\FrameworkBundle\Controller\Controller;
use Symfony\Component\HttpFoundation\Response;
use Symfony\Component\Security\Core\Exception\AccessDeniedException;
class PostController extends Controller
{
public function showAction($id)
{
// get a Post instance
$post = ...;
// keep in mind, this will call all registered security voters
if (false === $this->get('security.context')->isGranted('view', $post)) {
throw new AccessDeniedException('Unauthorised access!');
}
return new Response('<h1>'.$post->getName().'</h1>');
}
}
It's that easy!