123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135 |
- <?php
-
- /*
- * Copyright 2011 Johannes M. Schmitt <schmittjoh@gmail.com>
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-
- namespace JMS\SecurityExtraBundle\DependencyInjection;
-
- use Symfony\Component\DependencyInjection\Reference;
-
- use JMS\SecurityExtraBundle\Exception\RuntimeException;
- use Symfony\Component\HttpKernel\DependencyInjection\Extension;
- use Symfony\Component\Config\FileLocator;
- use Symfony\Component\DependencyInjection\Loader\XmlFileLoader;
- use Symfony\Component\DependencyInjection\ContainerBuilder;
-
- /**
- * JMSSecurityExtraExtension.
- *
- * @author Johannes M. Schmitt <schmittjoh@gmail.com>
- */
- class JMSSecurityExtraExtension extends Extension
- {
- public function load(array $configs, ContainerBuilder $container)
- {
- $bundles = $container->getParameter('kernel.bundles');
- if (!isset($bundles['JMSAopBundle'])) {
- throw new RuntimeException('The JMSSecurityExtraBundle requires the JMSAopBundle, please make sure to enable it in your AppKernel.');
- }
-
- $config = $this->processConfiguration($this->getConfiguration($configs, $container), $configs);
-
- $loader = new XmlFileLoader($container, new FileLocator(array(__DIR__.'/../Resources/config/')));
- $loader->load('services.xml');
-
- $container->setParameter('security.access.secure_all_services', $config['secure_all_services']);
-
- $cacheDir = $container->getParameterBag()->resolveValue($config['cache_dir']);
- if (!is_dir($cacheDir)) {
- if (false === @mkdir($cacheDir, 0777, true)) {
- throw new RuntimeException(sprintf('Could not create cache directory "%s".', $cacheDir));
- }
- }
- $container->setParameter('security.extra.cache_dir', $cacheDir);
-
- if ($config['expressions']) {
- $loader->load('security_expressions.xml');
-
- if (!is_dir($cacheDir.'/expressions')) {
- if (false === @mkdir($cacheDir.'/expressions', 0777, true)) {
- throw new RuntimeException(sprintf('Could not create cache directory "%s".', $cacheDir.'/expressions'));
- }
- }
-
- $container->getDefinition('security.expressions.voter')
- ->addMethodCall('setCacheDir', array($cacheDir.'/expressions'));
- }
-
- $disableAllVoters = !isset($config['voters']);
- $container->setParameter('security.authenticated_voter.disabled',
- $disableAllVoters || $config['voters']['disable_authenticated']);
- $container->setParameter('security.role_voter.disabled',
- $disableAllVoters || $config['voters']['disable_role']);
- $container->setParameter('security.acl_voter.disabled',
- $disableAllVoters || $config['voters']['disable_acl']);
-
- if ($config['enable_iddqd_attribute']) {
- $container
- ->getDefinition('security.extra.iddqd_voter')
- ->addTag('security.voter')
- ;
-
- // FIXME: Also add an iddqd after invocation provider
- }
-
- if ($config['method_access_control']) {
- $driverDef = $container->getDefinition('security.extra.driver_chain');
- $args = $driverDef->getArguments();
- array_unshift($args[0], new Reference('security.extra.config_driver'));
- $driverDef->setArguments($args);
-
- $container->setParameter('security.access.method_access_control',
- $config['method_access_control']);
- }
-
- if (isset($config['util']['secure_random'])) {
- $loader->load('security_secure_random.xml');
- $this->configureSecureRandom($config['util']['secure_random'], $container);
- }
- }
-
- private function configureSecureRandom(array $config, ContainerBuilder $container)
- {
- if (isset($config['seed_provider'])) {
- $container
- ->getDefinition('security.util.secure_random')
- ->addMethodCall('setSeedProvider', array(new Reference($config['seed_provider'])))
- ;
- $container->setAlias('security.util.secure_random_seed_provider', $config['seed_provider']);
- } elseif (isset($config['connection'])) {
- $container
- ->getDefinition('security.util.secure_random')
- ->addMethodCall('setConnection', array(new Reference($this->getDoctrineConnectionId($config['connection'])), $config['table_name']))
- ;
- $container->setAlias('security.util.secure_random_connection', $this->getDoctrineConnectionId($config['connection']));
- $container->setParameter('security.util.secure_random_table', $config['table_name']);
- $container
- ->getDefinition('security.util.secure_random_schema_listener')
- ->addTag('doctrine.event_listener', array('connection' => $config['connection'], 'event' => 'postGenerateSchema', 'lazy' => true))
- ;
- $container
- ->getDefinition('security.util.secure_random_schema')
- ->replaceArgument(0, $config['table_name'])
- ;
- }
- }
-
- private function getDoctrineConnectionId($guess)
- {
- return "doctrine.dbal.{$guess}_connection";
- }
- }
|