LmcRbac v2 is a major version upgrade with many major breaking changes that prevent straightforward upgrading.
- LmcRbac v2 is now based on Role and Rbac classes from
laminas-permissions-rbac
. All services have been updated to use these classes and interfaces.
The namespace has been changed from LmcRbac to Lmc\Rbac. Please review your code to replace LmcRbac
namespace
by Lmc\Rbac
namespace.
LmcRbac\HierarchicalRole
,LmcRbac\Role
andLmcRbac\RoleInterface
has been deleted. Use the equivalent classes fromlaminas-permissions-rbac
instead.- The factories for services have been refactored from the
src/Container
folder to be colocated with the service that a factory is creating. All factories in thesrc/Container
has been deleted. - The
AssertionContainer
class, interface and factory have been deprecated and replaced byAssertionPluginManager
class, interface and factory.
The ZF-Commons organisation has been moved to LM-Commons and ZfcRbac has been split into two repositories.
- LmcRbacMvc contains the old version 2 of ZfcRbac.
- LmcRbac contains the version 3 of ZfcRbac, which was only released as v3.alpha.1.
To upgrade
- Uninstall
zf-commons/zfc-rbac:3.0.0-alpha.1
. - Install
lm-commons/lmc-rbac:^1.0
- Change
zfc-rbac.global.php
tolmc-rbac.global.php
and update the keyzfc_rbac
tolmc_rbac
. - Review your code for usages of the
ZfcRbac/*
namespace toLmcRbac/*
namespace.
- ZfcRbac is no longer a ZF2 module. Instead, it fully embraces middlewares and can be used for any middleware library like Mezzio. As a consequence, its scope has been dramatically reduced and now only provide the base logic for authorization.
- No BC
- [Potential BC] To simplify unit tests, we have introduced a new
AuthorizationServiceInterface
that theAuthorizationService
now implements. We didn't touch any interface (such asAssertionInterface
) that rely explicitly on typehinting theAuthorizationService
to avoid big BC. However, we have updated the view helper and controller plugins to use the interface instead. This can lead to a BC if you created subclasses of those plugins (which is not a typical use case). If this is the case, just changeAuthorizationService
toAuthorizationServiceInterface
.
- [Potential BC] A potential BC have been introduced in v2.1 to respect interfaces of RBAC component more strictly.
However there is great chance that you have nothing to do. Now, ZfcRbac no longer cast permissions to string before
passing it to your "hasPermission" method in the Role entity. If you used to call
isGranted
using a string permission, like this:isGranted('myPermission')
, then you have nothing to do. However, if you are passing aPermissionInterface
object, you will now receive this object instead of a string. It's up to you to getting the name from your permission.
Here are the major breaking changes from ZfcRbac 1 to ZfcRbac 2:
- [BC] Dependency to the ZF2 RBAC component has been replaced in favour of a ZF3 prototype which fixes a lot of design issues.
- [BC] ZfcRbac no longer accepts multiple role providers. Therefore, the option
role_providers
has been renamed torole_provider
- [BC] Permission providers are gone (hence, the options
permission_providers
as well aspermission_manager
should be removed). Instead, roles now embed all the necessary information - [BC] The
redirect_to_route
option for theRedirectStrategy
is gone. Instead, we now have two options:redirect_to_route_connected
andredirect_to_route_disconnected
. This solves an issue when people used to have a guard onlogin
for non-authenticated users only, which leaded to circular redirections. - [BC] The default protection policy is now
POLICY_ALLOW
.POLICY_DENY
was way too restrictive and annoying to work with by default. - [BC]
isGranted
method of the AuthorizationService no longer accepts an assertion as a second parameter. Instead, the AuthorizationService now has an assertion map, that allows to map an assertion to a permission. This allows to inject dependencies into assertions, as well as making the use of assertions much more transparent. - [BC] Each assertions now receive the whole
AuthorizationService
instead of the current identity. This allows to support use cases where an assertion needs to check another permission. - [BC] Entity schema for hierarchical role have changed and no longer require to implement
RecursiveIterator
. Please have a look at the new schema in thedata
folder.