-
-
Notifications
You must be signed in to change notification settings - Fork 3.7k
Regression: Fix edit check in backend articles manager, always denying edit after soft deny #11511
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from 5 commits
Commits
Show all changes
7 commits
Select commit
Hold shift + click to select a range
a707d60
Fix allow after soft deny in backend
ggppdk 1ad1ce2
Improve edit check in frontend similar to backend
ggppdk df0bff1
Better comments for the code
ggppdk 001e157
Force better usage of allowEdit
ggppdk 0c7e0a8
Force better usage of allowEdit
ggppdk d5e378b
Restore behaviour on zero record id to return component edit permissions
ggppdk 84d0dad
Restore behaviour on zero record id to return component edit permissions
ggppdk File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -103,45 +103,36 @@ protected function allowAdd($data = array()) | |
| protected function allowEdit($data = array(), $key = 'id') | ||
| { | ||
| $recordId = (int) isset($data[$key]) ? $data[$key] : 0; | ||
| $user = JFactory::getUser(); | ||
| $userId = $user->get('id'); | ||
| $asset = 'com_content.article.' . $recordId; | ||
| $user = JFactory::getUser(); | ||
|
|
||
| // Check general edit permission first. | ||
| if ($user->authorise('core.edit', $asset)) | ||
| // Zero record (id:0) return false, if caller wants component permissions just get them directly | ||
|
||
| if (!$recordId) | ||
| { | ||
| return false; | ||
| } | ||
|
|
||
| // Check edit on the record asset (explicit or inherited) | ||
| if ($user->authorise('core.edit', 'com_content.article.' . $recordId)) | ||
| { | ||
| return true; | ||
| } | ||
|
|
||
| // Fallback on edit.own. | ||
| // First test if the permission is available. | ||
| if ($user->authorise('core.edit.own', $asset)) | ||
| // Check edit own on the record asset (explicit or inherited) | ||
| if ($user->authorise('core.edit.own', 'com_content.article.' . $recordId)) | ||
| { | ||
| // Now test the owner is the user. | ||
| $ownerId = (int) isset($data['created_by']) ? $data['created_by'] : 0; | ||
| // Existing record already has an owner, get it | ||
| $record = $this->getModel()->getItem($recordId); | ||
|
|
||
| if (empty($ownerId) && $recordId) | ||
| if (empty($record)) | ||
| { | ||
| // Need to do a lookup from the model. | ||
| $record = $this->getModel()->getItem($recordId); | ||
|
|
||
| if (empty($record)) | ||
| { | ||
| return false; | ||
| } | ||
|
|
||
| $ownerId = $record->created_by; | ||
| return false; | ||
| } | ||
|
|
||
| // If the owner matches 'me' then do the test. | ||
| if ($ownerId == $userId) | ||
| { | ||
| return true; | ||
| } | ||
| // Grant if current user is owner of the record, note: zero id is guest | ||
| return $user->get('id') == $record->created_by; | ||
| } | ||
|
|
||
| // Since there is no asset tracking, revert to the component permissions. | ||
| return parent::allowEdit($data, $key); | ||
| return false; | ||
| } | ||
|
|
||
| /** | ||
|
|
||
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
So a method that is supposed to check the ACL now has a hardcoded deny rule in place when it should be using the ACL system? Am I the only one who sees an issue with this?