NAME
   Abilities - Simple, hierarchical user authorization for web
   applications, with optional support for plan-based paid services.

VERSION
   version 0.1

SYNOPSIS
           package User;

           use Moose;
           with 'Abilities';

           # ... define required methods ...

           # somewhere else in your code:

           # get a user object that consumed the Abilities role
           my $user = MyApp->get_user('username'); # $user is a User object

           # check if the user is able to do something
           if ($user->can_perform('something')) {
                   do_something();
           } else {
                   die "Hey you can't do that, you can only do ", join(', ', $user->abilities);
           }

DESCRIPTION
   Abilities is a simple yet powerful mechanism for authorizing users of
   web applications to perform certain actions in the app's code. This is
   an extension of the familiar role-based access control that is common in
   various systems and frameworks like Catalyst (See
   Catalyst::Plugin::Authorization::Roles for the role-based implementation
   and Catalyst::Plugin::Authorization::Abilities for the ability-based
   implementation that inspired this module).

   As opposed to the role-based access control - where users are allowed
   access to a certain feature (here called 'action') only through their
   association to a certain role that is hard-coded in the program's code -
   in ability-based acccess control, a list of actions is assigned to every
   user, and they are only allowed to perform these actions. Actions are
   not assigned by the developer during development, but rather by the
   end-user during deployment. This allows for much more flexibility, and
   also speeds up development, as you (the developer) do not need to think
   about who should be allowed to perform a certain action, and can easily
   grant access later-on after deployment (assuming you're also the
   end-user).

   Abilities to perform certain actions can be given to a user
   specifically, or via roles the user can assume (as in role-based access
   control). For example, if user 'user01' is a member of role 'admin', and
   this user wishes to perform some action, for example 'delete_foo', then
   they will only be able to do so if the 'delete_foo' ability was given to
   either the user itself or the 'admin' role itself. Furthermore, roles
   can be assigned other roles; for example, roles 'mods' and 'editors' can
   be assigned _inside_ role 'mega_mods'. Users of the 'mega_mods' role
   will assume all actions owned by the 'mods' and 'editors' roles.

   A commonly known use-case for this type of access control is message
   boards, where the administrator might wish to create roles with certain
   actions and associate users with the roles (more commonly called 'user
   groups'); for example, the admin can create an 'editor' role, giving
   users of this role the ability to edit and delete posts, but not any
   other administrative action. So in essence, this type of access control
   relieves the developer from deciding who gets to do what and passes
   these decisions to the end-user, which might be necessary in certain
   situations.

   The Abilities module is implemented as a Moose role. In order to be able
   to use this mechanism, web applications must implement a user management
   system that will consume this role. More specifically, a user class and
   a role class must be implemented, consuming this role. Entities is a
   reference implementation that can be used by web applications, or just
   as an example of an ability-based authorization system. Entities::User
   and Entities::Role are the user and role classes that consume the
   Abilities role in the Entities distribution.

 PAID, SUBSCRIPTION-BASED WEB SERVICES
   Apart from the scenario described above, this module also provides
   optional support for subscription-based web services, such as those
   where customers subscribe to a certain paid (or free, doesn't matter)
   plan from a list of available plans (GitHub is an example of such a
   service). This functionality is also implemented as a role, in the
   Abilities::Features module provided with this distribution. Read its
   documentation for detailed information.

REQUIRED METHODS
   Classes that consume this role are required to implement the following
   methods:

 roles()
   Returns a list of all roles that a user object belongs to, or a role
   object inherits from. The list must contain references to the role
   objects, not just their names.

 actions()
   Returns a list of all actions that a user object has been explicitely
   granted, or that a role object has been granted. The list must contain
   references to the action objects, not just their names.

 is_super()
   This is a boolean attribute that both user and role objects should have.
   If a user/role object has a true value for this attribute, then they
   will be able to perform any action, even if it wasn't granted to them.

METHODS
   Classes that consume this role will have the following methods available
   for them:

 can_perform( $action_name | @action_names )
   Receives the name of an action (or names of actions), and returns a true
   value if the user/role can perform the provided action(s). If more than
   one actions are passed, a true value will be returned only if the
   user/role can perform ALL of these actions.

 belongs_to( $role_name | @role_names )
 takes_from( $role_name | @role_names )
   The above two methods are actually the same. The names are meant to
   differentiate between user objects (first case) and role objects (second
   case).

   These methods receive a role name (or names). In case of a user object,
   the method will return a true value if the user is a direct member of
   the provided role. In case multiple role names were provided, a true
   value will be returned only if the user is a member of ALL of these
   roles. Only direct association is checked, so the user must be
   specifically assigned to the provided role, and not to a role that
   inherits from that role (see "inherits_from_role()" instead.

   In case of a role object, this method will return a true value if the
   role directly consumes the abilities of the provided role. In case
   multiple role names were provided, a true value will be returned only if
   the role directly consumes ALL of these roles. Like in case of a user,
   only direct association is checked, so inheritance doesn't count.

 inherits_from_role( $role_name | @role_names )
   Receives the name of a role (or names of roles), and returns a true
   value if the user/role inherits the abilities of the provided role. If
   more than one roles are passed, a true value will be returned only if
   the user/role inherits from ALL of these roles.

   This method takes inheritance into account, so if a user was directly
   assigned to the 'admins' role, and the 'admins' role inherits from the
   'devs' role, then inherits_from_role('devs') will return true for that
   user.

 all_abilities()
   Returns a list of all actions that a user/role can perform, either due
   to direct association or due to inheritance.

INTERNAL METHODS
   These methods are only to be used internally.

 _all_abilities()
TODO
   *   Create tests

       Create tests for these roles. Right now the only way this is
       actually tested is through the Entities distribution tests.

   *   Catalyst::Plugin::Authorization::Abilities

       Find a way to make Catalyst::Plugin::Authorization::Abilities use
       this role.

AUTHOR
   Ido Perlmuter, "<ido at ido50 dot net>"

BUGS
   Please report any bugs or feature requests to "bug-abilities at
   rt.cpan.org", or through the web interface at
   <http://rt.cpan.org/NoAuth/ReportBug.html?Queue=Abilities>. I will be
   notified, and then you'll automatically be notified of progress on your
   bug as I make changes.

SUPPORT
   You can find documentation for this module with the perldoc command.

       perldoc Abilities

   You can also look for information at:

   *   RT: CPAN's request tracker

       <http://rt.cpan.org/NoAuth/Bugs.html?Dist=Abilities>

   *   AnnoCPAN: Annotated CPAN documentation

       <http://annocpan.org/dist/Abilities>

   *   CPAN Ratings

       <http://cpanratings.perl.org/d/Abilities>

   *   Search CPAN

       <http://search.cpan.org/dist/Abilities/>

LICENSE AND COPYRIGHT
   Copyright 2010 Ido Perlmuter.

   This program is free software; you can redistribute it and/or modify it
   under the terms of either: the GNU General Public License as published
   by the Free Software Foundation; or the Artistic License.

   See http://dev.perl.org/licenses/ for more information.