a

Edit Package perl-Catalyst-Plugin-Authorization-Roles
http://search.cpan.org/dist/Catalyst-Plugin-Authorization-Roles/

Role based access control is very simple: every user has a list of roles,
which that user is allowed to assume, and every restricted part of the app
makes an assertion about the necessary roles.

With 'assert_user_roles', if the user is a member in *all* of the required
roles access is granted. Otherwise, access is denied. With
'assert_any_user_role' it is enough that the user is a member in *one*
role.

There are alternative approaches to do this on a per action basis, see the
Catalyst::ActionRole::ACL manpage.

For example, if you have a CRUD application, for every mutating action you
probably want to check that the user is allowed to edit. To do this, create
an editor role, and add that role to every user who is allowed to edit.

sub edit : Local {
my ( $self, $c ) = @_;
$c->assert_user_roles( qw/editor/ );
$c->model("TheModel")->make_changes();
}

When this plugin checks the roles of a user it will first see if the user
supports the self check method.

When this is not supported the list of roles is extracted from the user
using the 'roles' method.

When this is supported, the 'check_roles' method will be used to delegate
the role check to the user class. Classes like the one provided with the
iCatalyst::Authentication::Store::DBIx::Class manpage optimize the check
this way.

Refresh
Refresh
Source Files
Filename Size Changed
Catalyst-Plugin-Authorization-Roles-0.09.tar.gz 0000021107 20.6 KB
cpanspec.yml 0000000669 669 Bytes
perl-Catalyst-Plugin-Authorization-Roles.changes 0000000388 388 Bytes
perl-Catalyst-Plugin-Authorization-Roles.spec 0000003474 3.39 KB
Latest Revision
Stephan Kulow's avatar Stephan Kulow (coolo) accepted request 741155 from Tina Müller's avatar Tina Müller (tinita) (revision 2)
- Regenerate spec with newest cpanspec
   * Add PERL_USE_UNSAFE_INC
Comments 0
openSUSE Build Service is sponsored by