1 node.entity.inc | public Node::access($op, $account = NULL) |
Overrides Entity::access().
Parameters
string $op: The operation to be performed on the node. Possible values are:
- create
- view
- update
- delete
User|AnonymousUser|object $account: (optional) The user to check for. Leave it to NULL to check for the global user.
Return value
bool|NULL: TRUE if access is granted, FALSE otherwise.
Overrides Entity::access
File
- core/
modules/ node/ node.entity.inc, line 280 - Entity controller and class for nodes.
Class
- Node
- Defines the node entity class.
Code
public function access($op, $account = NULL) {
// Casting class with private property causes errors due to added prefix.
// e.g. "\0" . 'Node' . "\0". So use static array instead.
$rights = &backdrop_static('node_access', array());
if ($op == 'create') {
return self::createAccess($this->bundle(), $account);
}
elseif (!in_array($op, array('view', 'update', 'delete'), TRUE)) {
// If the $op was not one of the supported ones, we return access denied.
return FALSE;
}
// If no user object is supplied, the access check is for the current user.
if (empty($account)) {
$account = $GLOBALS['user'];
}
$cid = $this->id();
// If we've already checked access for this node, user and op, return from
// cache.
if (isset($rights[$account->uid][$cid][$op])) {
return $rights[$account->uid][$cid][$op];
}
if (user_access('bypass node access', $account)) {
$rights[$account->uid][$cid][$op] = TRUE;
return $rights[$account->uid][$cid][$op];
}
if (!user_access('access content', $account)) {
$rights[$account->uid][$cid][$op] = FALSE;
return $rights[$account->uid][$cid][$op];
}
// We grant access to the node if both of the following conditions are met:
// - No modules say to deny access.
// - At least one module says to grant access.
// If no module specified either allow or deny, we fall back to the
// node_access table.
$access = module_invoke_all('node_access', $this, $op, $account);
if (in_array(NODE_ACCESS_DENY, $access, TRUE)) {
$rights[$account->uid][$cid][$op] = FALSE;
return $rights[$account->uid][$cid][$op];
}
elseif (in_array(NODE_ACCESS_ALLOW, $access, TRUE)) {
$rights[$account->uid][$cid][$op] = TRUE;
return $rights[$account->uid][$cid][$op];
}
// Check if user can view any unpublished nodes.
if ($op == 'view' && !$this->status && user_access('view any unpublished content', $account) && $account->uid != 0) {
$rights[$account->uid][$cid][$op] = TRUE;
return $rights[$account->uid][$cid][$op];
}
// Check if authors can view their own unpublished nodes.
if ($op == 'view' && !$this->status && user_access('view own unpublished content', $account) && $account->uid == $this->uid && $account->uid != 0) {
$rights[$account->uid][$cid][$op] = TRUE;
return $rights[$account->uid][$cid][$op];
}
// If the module did not override the access rights, use those set in the
// node_access table.
if ($this->id()) {
if (module_implements('node_grants')) {
$query = db_select('node_access');
$query->addExpression('1');
$query->condition('grant_' . $op, 1, '>=');
$nids = db_or()->condition('nid', $this->id());
if ($this->status) {
$nids->condition('nid', 0);
}
$query->condition($nids);
$query->range(0, 1);
$grants = db_or();
foreach (node_access_grants($op, $account) as $realm => $gids) {
foreach ($gids as $gid) {
$grants->condition(db_and()
->condition('gid', $gid)
->condition('realm', $realm)
);
}
}
if (count($grants) > 0) {
$query->condition($grants);
}
$result = (bool) $query
->execute()
->fetchField();
$rights[$account->uid][$cid][$op] = $result;
return $rights[$account->uid][$cid][$op];
}
elseif ($op == 'view' && $this->status) {
// If no modules implement hook_node_grants(), the default behavior is
// to allow all users to view published nodes, so reflect that here.
$rights[$account->uid][$cid][$op] = TRUE;
return $rights[$account->uid][$cid][$op];
}
}
$rights[$account->uid][$cid][$op] = FALSE;
return $rights[$account->uid][$cid][$op];
}