


Simple permission design about PHP bit operations_PHP tutorial
This article is a detailed analysis and introduction to the simple permission design of PHP bit operations. Friends in need can refer to it.
1. Write at the front
Recently I want to write a simple thing about permission processing. I have also learned that using binary number bit operations can accomplish this task well. Regarding the bit operations of binary numbers, the most common ones are the three simple operations of "OR, AND, and NOT". Of course, I also checked the PHP manual, and there are also the three operations of "XOR, left shift, and right shift" . I remember that my math teacher started nagging me when I was in junior high school. I don’t want to give any additional explanation of this operation here and go directly to the topic.
2. How to define permissions
Define the value of the permission according to the Nth power of 2, and so on. Why define it this way? This definition ensures that there is only one 1 in each permission value (binary), and it corresponds to exactly one permission. For example:
define('ADD', 1); // Add permissions
define('UPD', 2); // Modify permissions
define('SEL', 4); // Find permissions
define('DEL', 8); // Delete permissions
3. Permission operation
Permission operations actually involve the concept of "role". Performing permission operations is nothing more than granting certain permissions to a certain role, prohibiting certain permissions, and detecting whether a certain role has certain permissions. Relative to these three operations. It can be easily implemented using arithmetic operations between binary numbers.
// To grant certain permissions, use the "bitwise OR" operator
$a_access = ADD | UPD | SEL | DEL; // a has the permission to add, delete, modify and check
$b_access = ADD | UPD | SEL; // b has the permission to add, modify and check
$c_access = ADD | UPD; // c has the permission to add and modify
// Prohibit certain permissions from using the "bit AND" and "bit NOT" operators
$d_access = $c_access & ~UPD; // d only has increased permissions
// To detect whether you have a certain permission, use the "bit AND" operator
var_dump($b_access & ADD); // 1 means b has increased permissions
var_dump($b_access & DEL); // 0 means b does not have delete permission
4. Implement simple permission classes and role classes
Using the above permission operation method, it can be simply encapsulated into a permission class and a role class.
/**
* Simple permission class
*/
class Peak_Auth {
/**
* Permission type counter
* Function is to generate permission value
*
* @var int
*/
protected static $authCount = 0;
/**
* Permission name
*
* @var string
*/
protected $authName;
/**
* Permission details
*
* @var string
*/
protected $authMessage;
/**
* Permission value
*
* @var int 2 to the Nth power
*/
protected $authValue;
/**
* Constructor
* Initialize permission name, permission details and permission value
*
* @param string $authName permission name
* @param string $authMessage permission details
*/
public function __construct($authName, $authMessage = '') {
$this->authName = $authName;
$this->authMessage = $authMessage;
$this->authValue = 1 << self::$authCount;
self::$authCount++;
}
/**
* This class does not allow object copy operations
*/
private function __clone() {
}
/**
* Set permission details
*
* @param string $authMessage
*/
public function setAuthMessage($authMessage) {
$this->authMessage = $authMessage;
}
/**
* Get permission name
*
* @return string
*/
public function getAuthName() {
return $this->authName;
}
/**
* Get permission value
*
* @return int
*/
public function getAuthValue() {
return $this->authValue;
}
/**
* Get permission details
*
* @return string
*/
public function getAuthMessage() {
return $this->authMessage;
}
}
/**
* Simple character class
*
* @author 27_Man
*/
class Peak_Role {
/**
*Character name
*
* @var string
*/
protected $roleName;
/**
* Permission value owned by the role
*
* @var int
*/
protected $authValue;
/**
* Parent role object
*
* @var Peak_Role
*/
protected $parentRole;
/**
* Constructor
*
* @param string $roleName role name
* @param Peak_Role $parentRole parent role object
*/
public function __construct($roleName, Peak_Role $parentRole = null) {
$this->roleName = $roleName;
$this->authValue = 0;
if ($parentRole) {
$this->parentRole = $parentRole;
$this->authValue = $parentRole->getAuthValue();
}
}
/**
* Obtain the permissions of the parent role
*/
protected function fetchParenAuthValue() {
if ($this->parentRole) {
$this->authValue |= $this->parentRole->getAuthValue();
}
}
/**
*Give some permission
*
* @param Peak_Auth $auth
* @return Peak_Role for chaining operations
*/
public function allow(Peak_Auth $auth) {
$this->fetchParenAuthValue();
$this->authValue |= $auth->getAuthValue();
return $this;
}
/**
* Block certain permissions
*
* @param Peak_Auth $auth
* @return Peak_Role for chaining operations
*/
public function deny(Peak_Auth $auth) {
$this->fetchParenAuthValue();
$this->authValue &= ~$auth->getAuthValue();
return $this;
}
/**
* Check whether you have certain permissions
*
* @param Peak_Auth $auth
* @return boolean
*/
public function checkAuth(Peak_Auth $auth) {
return $this->authValue & $auth->getAuthValue();
}
/**
* Get the permission value of the role
*
* @return int
*/
public function getAuthValue() {
return $this->authValue;
}
}
5.对权限类和角色类的简单操作例子
//Create three permissions: readable, writable, and executable
$read = new Peak_Auth('CanRead');
$write = new Peak_Auth('CanWrite');
$exe = new Peak_Auth('CanExe');
//Create a role User
$user = new Peak_Role('User');
//Create another role Admin, which has all the permissions of User
$admin = new Peak_Role('Admin', $user);
//Give User readable and writable permissions
$user->allow($read)->allow($write);
//Give Admin executable permissions, and he also has User permissions
$admin->allow($exe);
// Disable Admin’s writable permissions
$admin->deny($write);
// Check whether Admin has certain permissions
var_dump($admin->checkAuth($read));
var_dump($admin->checkAuth($write));
var_dump($admin->checkAuth($exe));

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

Visual Studio Code, also known as VS Code, is a free source code editor — or integrated development environment (IDE) — available for all major operating systems. With a large collection of extensions for many programming languages, VS Code can be c

This tutorial demonstrates how to efficiently process XML documents using PHP. XML (eXtensible Markup Language) is a versatile text-based markup language designed for both human readability and machine parsing. It's commonly used for data storage an

A string is a sequence of characters, including letters, numbers, and symbols. This tutorial will learn how to calculate the number of vowels in a given string in PHP using different methods. The vowels in English are a, e, i, o, u, and they can be uppercase or lowercase. What is a vowel? Vowels are alphabetic characters that represent a specific pronunciation. There are five vowels in English, including uppercase and lowercase: a, e, i, o, u Example 1 Input: String = "Tutorialspoint" Output: 6 explain The vowels in the string "Tutorialspoint" are u, o, i, a, o, i. There are 6 yuan in total

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

If you are an experienced PHP developer, you might have the feeling that you’ve been there and done that already.You have developed a significant number of applications, debugged millions of lines of code, and tweaked a bunch of scripts to achieve op

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

What are the magic methods of PHP? PHP's magic methods include: 1.\_\_construct, used to initialize objects; 2.\_\_destruct, used to clean up resources; 3.\_\_call, handle non-existent method calls; 4.\_\_get, implement dynamic attribute access; 5.\_\_set, implement dynamic attribute settings. These methods are automatically called in certain situations, improving code flexibility and efficiency.
