userrightsprofile.class.inc.php 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775
  1. <?php
  2. // Copyright (C) 2010-2013 Combodo SARL
  3. //
  4. // This file is part of iTop.
  5. //
  6. // iTop is free software; you can redistribute it and/or modify
  7. // it under the terms of the GNU Affero General Public License as published by
  8. // the Free Software Foundation, either version 3 of the License, or
  9. // (at your option) any later version.
  10. //
  11. // iTop is distributed in the hope that it will be useful,
  12. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. // GNU Affero General Public License for more details.
  15. //
  16. // You should have received a copy of the GNU Affero General Public License
  17. // along with iTop. If not, see <http://www.gnu.org/licenses/>
  18. /**
  19. * UserRightsProfile
  20. * User management Module, basing the right on profiles and a matrix (similar to UserRightsMatrix, but profiles and other decorations have been added)
  21. *
  22. * @copyright Copyright (C) 2010-2012 Combodo SARL
  23. * @license http://opensource.org/licenses/AGPL-3.0
  24. */
  25. define('ADMIN_PROFILE_NAME', 'Administrator');
  26. define('PORTAL_PROFILE_NAME', 'Portal user');
  27. class UserRightsBaseClassGUI extends cmdbAbstractObject
  28. {
  29. // Whenever something changes, reload the privileges
  30. protected function AfterInsert()
  31. {
  32. UserRights::FlushPrivileges();
  33. }
  34. protected function AfterUpdate()
  35. {
  36. UserRights::FlushPrivileges();
  37. }
  38. protected function AfterDelete()
  39. {
  40. UserRights::FlushPrivileges();
  41. }
  42. }
  43. class URP_Profiles extends UserRightsBaseClassGUI
  44. {
  45. public static function Init()
  46. {
  47. $aParams = array
  48. (
  49. "category" => "addon/userrights",
  50. "key_type" => "autoincrement",
  51. "name_attcode" => "name",
  52. "state_attcode" => "",
  53. "reconc_keys" => array(),
  54. "db_table" => "priv_urp_profiles",
  55. "db_key_field" => "id",
  56. "db_finalclass_field" => "",
  57. "display_template" => "",
  58. );
  59. MetaModel::Init_Params($aParams);
  60. //MetaModel::Init_InheritAttributes();
  61. MetaModel::Init_AddAttribute(new AttributeString("name", array("allowed_values"=>null, "sql"=>"name", "default_value"=>null, "is_null_allowed"=>false, "depends_on"=>array())));
  62. MetaModel::Init_AddAttribute(new AttributeString("description", array("allowed_values"=>null, "sql"=>"description", "default_value"=>null, "is_null_allowed"=>false, "depends_on"=>array())));
  63. MetaModel::Init_AddAttribute(new AttributeLinkedSetIndirect("user_list", array("linked_class"=>"URP_UserProfile", "ext_key_to_me"=>"profileid", "ext_key_to_remote"=>"userid", "allowed_values"=>null, "count_min"=>1, "count_max"=>0, "depends_on"=>array())));
  64. // Display lists
  65. MetaModel::Init_SetZListItems('details', array('name', 'description', 'user_list')); // Attributes to be displayed for the complete details
  66. MetaModel::Init_SetZListItems('list', array('description')); // Attributes to be displayed for a list
  67. // Search criteria
  68. MetaModel::Init_SetZListItems('standard_search', array('name')); // Criteria of the std search form
  69. MetaModel::Init_SetZListItems('advanced_search', array('name')); // Criteria of the advanced search form
  70. }
  71. protected static $m_aCacheProfiles = null;
  72. public static function DoCreateProfile($sName, $sDescription)
  73. {
  74. if (is_null(self::$m_aCacheProfiles))
  75. {
  76. self::$m_aCacheProfiles = array();
  77. $oFilterAll = new DBObjectSearch('URP_Profiles');
  78. $oSet = new DBObjectSet($oFilterAll);
  79. while ($oProfile = $oSet->Fetch())
  80. {
  81. self::$m_aCacheProfiles[$oProfile->Get('name')] = $oProfile->GetKey();
  82. }
  83. }
  84. $sCacheKey = $sName;
  85. if (isset(self::$m_aCacheProfiles[$sCacheKey]))
  86. {
  87. return self::$m_aCacheProfiles[$sCacheKey];
  88. }
  89. $oNewObj = MetaModel::NewObject("URP_Profiles");
  90. $oNewObj->Set('name', $sName);
  91. $oNewObj->Set('description', $sDescription);
  92. $iId = $oNewObj->DBInsertNoReload();
  93. self::$m_aCacheProfiles[$sCacheKey] = $iId;
  94. return $iId;
  95. }
  96. function GetGrantAsHtml($oUserRights, $sClass, $sAction)
  97. {
  98. $bGrant = $oUserRights->GetProfileActionGrant($this->GetKey(), $sClass, $sAction);
  99. if (is_null($bGrant))
  100. {
  101. return '<span style="background-color: #ffdddd;">'.Dict::S('UI:UserManagement:ActionAllowed:No').'</span>';
  102. }
  103. elseif ($bGrant)
  104. {
  105. return '<span style="background-color: #ddffdd;">'.Dict::S('UI:UserManagement:ActionAllowed:Yes').'</span>';
  106. }
  107. else
  108. {
  109. return '<span style="background-color: #ffdddd;">'.Dict::S('UI:UserManagement:ActionAllowed:No').'</span>';
  110. }
  111. }
  112. function DoShowGrantSumary($oPage)
  113. {
  114. if ($this->GetRawName() == "Administrator")
  115. {
  116. // Looks dirty, but ok that's THE ONE
  117. $oPage->p(Dict::S('UI:UserManagement:AdminProfile+'));
  118. return;
  119. }
  120. // Note: for sure, we assume that the instance is derived from UserRightsProfile
  121. $oUserRights = UserRights::GetModuleInstance();
  122. $aDisplayData = array();
  123. foreach (MetaModel::GetClasses('bizmodel') as $sClass)
  124. {
  125. // Skip non instantiable classes
  126. if (MetaModel::IsAbstract($sClass)) continue;
  127. $aStimuli = array();
  128. foreach (MetaModel::EnumStimuli($sClass) as $sStimulusCode => $oStimulus)
  129. {
  130. $bGrant = $oUserRights->GetClassStimulusGrant($this->GetKey(), $sClass, $sStimulusCode);
  131. if ($bGrant === true)
  132. {
  133. $aStimuli[] = '<span title="'.$sStimulusCode.': '.htmlentities($oStimulus->GetDescription(), ENT_QUOTES, 'UTF-8').'">'.htmlentities($oStimulus->GetLabel(), ENT_QUOTES, 'UTF-8').'</span>';
  134. }
  135. }
  136. $sStimuli = implode(', ', $aStimuli);
  137. $aDisplayData[] = array(
  138. 'class' => MetaModel::GetName($sClass),
  139. 'read' => $this->GetGrantAsHtml($oUserRights, $sClass, 'r'),
  140. 'bulkread' => $this->GetGrantAsHtml($oUserRights, $sClass, 'br'),
  141. 'write' => $this->GetGrantAsHtml($oUserRights, $sClass, 'w'),
  142. 'bulkwrite' => $this->GetGrantAsHtml($oUserRights, $sClass, 'bw'),
  143. 'delete' => $this->GetGrantAsHtml($oUserRights, $sClass, 'd'),
  144. 'bulkdelete' => $this->GetGrantAsHtml($oUserRights, $sClass, 'bd'),
  145. 'stimuli' => $sStimuli,
  146. );
  147. }
  148. $aDisplayConfig = array();
  149. $aDisplayConfig['class'] = array('label' => Dict::S('UI:UserManagement:Class'), 'description' => Dict::S('UI:UserManagement:Class+'));
  150. $aDisplayConfig['read'] = array('label' => Dict::S('UI:UserManagement:Action:Read'), 'description' => Dict::S('UI:UserManagement:Action:Read+'));
  151. $aDisplayConfig['bulkread'] = array('label' => Dict::S('UI:UserManagement:Action:BulkRead'), 'description' => Dict::S('UI:UserManagement:Action:BulkRead+'));
  152. $aDisplayConfig['write'] = array('label' => Dict::S('UI:UserManagement:Action:Modify'), 'description' => Dict::S('UI:UserManagement:Action:Modify+'));
  153. $aDisplayConfig['bulkwrite'] = array('label' => Dict::S('UI:UserManagement:Action:BulkModify'), 'description' => Dict::S('UI:UserManagement:Action:BulkModify+'));
  154. $aDisplayConfig['delete'] = array('label' => Dict::S('UI:UserManagement:Action:Delete'), 'description' => Dict::S('UI:UserManagement:Action:Delete+'));
  155. $aDisplayConfig['bulkdelete'] = array('label' => Dict::S('UI:UserManagement:Action:BulkDelete'), 'description' => Dict::S('UI:UserManagement:Action:BulkDelete+'));
  156. $aDisplayConfig['stimuli'] = array('label' => Dict::S('UI:UserManagement:Action:Stimuli'), 'description' => Dict::S('UI:UserManagement:Action:Stimuli+'));
  157. $oPage->table($aDisplayConfig, $aDisplayData);
  158. }
  159. function DisplayBareRelations(WebPage $oPage, $bEditMode = false)
  160. {
  161. parent::DisplayBareRelations($oPage, $bEditMode);
  162. if (!$bEditMode)
  163. {
  164. $oPage->SetCurrentTab(Dict::S('UI:UserManagement:GrantMatrix'));
  165. $this->DoShowGrantSumary($oPage);
  166. }
  167. }
  168. public static function GetReadOnlyAttributes()
  169. {
  170. return array('name', 'description');
  171. }
  172. // returns an array of id => array of column => php value(so-called "real value")
  173. public static function GetPredefinedObjects()
  174. {
  175. return ProfilesConfig::GetProfilesValues();
  176. }
  177. // Before deleting a profile,
  178. // preserve DB integrity by deleting links to users
  179. protected function OnDelete()
  180. {
  181. // Note: this may break the rule that says: "a user must have at least ONE profile" !
  182. $oLnkSet = $this->Get('user_list');
  183. while($oLnk = $oLnkSet->Fetch())
  184. {
  185. $oLnk->DBDelete();
  186. }
  187. }
  188. /**
  189. * Returns the set of flags (OPT_ATT_HIDDEN, OPT_ATT_READONLY, OPT_ATT_MANDATORY...)
  190. * for the given attribute in the current state of the object
  191. * @param $sAttCode string $sAttCode The code of the attribute
  192. * @param $aReasons array To store the reasons why the attribute is read-only (info about the synchro replicas)
  193. * @param $sTargetState string The target state in which to evalutate the flags, if empty the current state will be used
  194. * @return integer Flags: the binary combination of the flags applicable to this attribute
  195. */
  196. public function GetAttributeFlags($sAttCode, &$aReasons = array(), $sTargetState = '')
  197. {
  198. $iFlags = parent::GetAttributeFlags($sAttCode, $aReasons, $sTargetState);
  199. if (MetaModel::GetConfig()->Get('demo_mode'))
  200. {
  201. $aReasons[] = 'Sorry, profiles are read-only in the demonstration mode!';
  202. $iFlags |= OPT_ATT_READONLY;
  203. }
  204. return $iFlags;
  205. }
  206. }
  207. class URP_UserProfile extends UserRightsBaseClassGUI
  208. {
  209. public static function Init()
  210. {
  211. $aParams = array
  212. (
  213. "category" => "addon/userrights",
  214. "key_type" => "autoincrement",
  215. "name_attcode" => "userid",
  216. "state_attcode" => "",
  217. "reconc_keys" => array(),
  218. "db_table" => "priv_urp_userprofile",
  219. "db_key_field" => "id",
  220. "db_finalclass_field" => "",
  221. "display_template" => "",
  222. );
  223. MetaModel::Init_Params($aParams);
  224. //MetaModel::Init_InheritAttributes();
  225. MetaModel::Init_AddAttribute(new AttributeExternalKey("userid", array("targetclass"=>"User", "jointype"=> "", "allowed_values"=>null, "sql"=>"userid", "is_null_allowed"=>false, "on_target_delete"=>DEL_AUTO, "depends_on"=>array())));
  226. MetaModel::Init_AddAttribute(new AttributeExternalField("userlogin", array("allowed_values"=>null, "extkey_attcode"=> 'userid', "target_attcode"=>"login")));
  227. MetaModel::Init_AddAttribute(new AttributeExternalKey("profileid", array("targetclass"=>"URP_Profiles", "jointype"=> "", "allowed_values"=>null, "sql"=>"profileid", "is_null_allowed"=>false, "on_target_delete"=>DEL_AUTO, "depends_on"=>array())));
  228. MetaModel::Init_AddAttribute(new AttributeExternalField("profile", array("allowed_values"=>null, "extkey_attcode"=> 'profileid', "target_attcode"=>"name")));
  229. MetaModel::Init_AddAttribute(new AttributeString("reason", array("allowed_values"=>null, "sql"=>"description", "default_value"=>null, "is_null_allowed"=>true, "depends_on"=>array())));
  230. // Display lists
  231. MetaModel::Init_SetZListItems('details', array('userid', 'profileid', 'reason')); // Attributes to be displayed for the complete details
  232. MetaModel::Init_SetZListItems('list', array('userid', 'profileid', 'reason')); // Attributes to be displayed for a list
  233. // Search criteria
  234. MetaModel::Init_SetZListItems('standard_search', array('userid', 'profileid')); // Criteria of the std search form
  235. MetaModel::Init_SetZListItems('advanced_search', array('userid', 'profileid')); // Criteria of the advanced search form
  236. }
  237. public function GetName()
  238. {
  239. return Dict::Format('UI:UserManagement:LinkBetween_User_And_Profile', $this->Get('userlogin'), $this->Get('profile'));
  240. }
  241. public function CheckToDelete(&$oDeletionPlan)
  242. {
  243. if (MetaModel::GetConfig()->Get('demo_mode'))
  244. {
  245. // Users deletion is NOT allowed in demo mode
  246. $oDeletionPlan->AddToDelete($this, null);
  247. $oDeletionPlan->SetDeletionIssues($this, array('deletion not allowed in demo mode.'), true);
  248. $oDeletionPlan->ComputeResults();
  249. return false;
  250. }
  251. return parent::CheckToDelete($oDeletionPlan);
  252. }
  253. }
  254. class URP_UserOrg extends UserRightsBaseClassGUI
  255. {
  256. public static function Init()
  257. {
  258. $aParams = array
  259. (
  260. "category" => "addon/userrights",
  261. "key_type" => "autoincrement",
  262. "name_attcode" => "userid",
  263. "state_attcode" => "",
  264. "reconc_keys" => array(),
  265. "db_table" => "priv_urp_userorg",
  266. "db_key_field" => "id",
  267. "db_finalclass_field" => "",
  268. "display_template" => "",
  269. );
  270. MetaModel::Init_Params($aParams);
  271. //MetaModel::Init_InheritAttributes();
  272. MetaModel::Init_AddAttribute(new AttributeExternalKey("userid", array("targetclass"=>"User", "jointype"=> "", "allowed_values"=>null, "sql"=>"userid", "is_null_allowed"=>false, "on_target_delete"=>DEL_AUTO, "depends_on"=>array())));
  273. MetaModel::Init_AddAttribute(new AttributeExternalField("userlogin", array("allowed_values"=>null, "extkey_attcode"=> 'userid', "target_attcode"=>"login")));
  274. MetaModel::Init_AddAttribute(new AttributeExternalKey("allowed_org_id", array("targetclass"=>"Organization", "jointype"=> "", "allowed_values"=>null, "sql"=>"allowed_org_id", "is_null_allowed"=>false, "on_target_delete"=>DEL_AUTO, "depends_on"=>array())));
  275. MetaModel::Init_AddAttribute(new AttributeExternalField("allowed_org_name", array("allowed_values"=>null, "extkey_attcode"=> 'allowed_org_id', "target_attcode"=>"name")));
  276. MetaModel::Init_AddAttribute(new AttributeString("reason", array("allowed_values"=>null, "sql"=>"reason", "default_value"=>null, "is_null_allowed"=>true, "depends_on"=>array())));
  277. // Display lists
  278. MetaModel::Init_SetZListItems('details', array('userid', 'allowed_org_id', 'reason')); // Attributes to be displayed for the complete details
  279. MetaModel::Init_SetZListItems('list', array('allowed_org_id', 'reason')); // Attributes to be displayed for a list
  280. // Search criteria
  281. MetaModel::Init_SetZListItems('standard_search', array('userid', 'allowed_org_id')); // Criteria of the std search form
  282. MetaModel::Init_SetZListItems('advanced_search', array('userid', 'allowed_org_id')); // Criteria of the advanced search form
  283. }
  284. public function GetName()
  285. {
  286. return Dict::Format('UI:UserManagement:LinkBetween_User_And_Org', $this->Get('userlogin'), $this->Get('allowed_org_name'));
  287. }
  288. }
  289. class UserRightsProfile extends UserRightsAddOnAPI
  290. {
  291. static public $m_aActionCodes = array(
  292. UR_ACTION_READ => 'r',
  293. UR_ACTION_MODIFY => 'w',
  294. UR_ACTION_DELETE => 'd',
  295. UR_ACTION_BULK_READ => 'br',
  296. UR_ACTION_BULK_MODIFY => 'bw',
  297. UR_ACTION_BULK_DELETE => 'bd',
  298. );
  299. // Installation: create the very first user
  300. public function CreateAdministrator($sAdminUser, $sAdminPwd, $sLanguage = 'EN US')
  301. {
  302. CMDBObject::SetTrackInfo('Initialization');
  303. $oChange = CMDBObject::GetCurrentChange();
  304. $iContactId = 0;
  305. // Support drastic data model changes: no organization class (or not writable)!
  306. if (MetaModel::IsValidClass('Organization') && !MetaModel::IsAbstract('Organization'))
  307. {
  308. $oOrg = new Organization();
  309. $oOrg->Set('name', 'My Company/Department');
  310. $oOrg->Set('code', 'SOMECODE');
  311. $iOrgId = $oOrg->DBInsertTrackedNoReload($oChange, true /* skip security */);
  312. // Support drastic data model changes: no Person class (or not writable)!
  313. if (MetaModel::IsValidClass('Person') && !MetaModel::IsAbstract('Person'))
  314. {
  315. $oContact = new Person();
  316. $oContact->Set('name', 'My last name');
  317. $oContact->Set('first_name', 'My first name');
  318. if (MetaModel::IsValidAttCode('Person', 'org_id'))
  319. {
  320. $oContact->Set('org_id', $iOrgId);
  321. }
  322. if (MetaModel::IsValidAttCode('Person', 'phone'))
  323. {
  324. $oContact->Set('phone', '+00 000 000 000');
  325. }
  326. $oContact->Set('email', 'my.email@foo.org');
  327. $iContactId = $oContact->DBInsertTrackedNoReload($oChange, true /* skip security */);
  328. }
  329. }
  330. $oUser = new UserLocal();
  331. $oUser->Set('login', $sAdminUser);
  332. $oUser->Set('password', $sAdminPwd);
  333. if (MetaModel::IsValidAttCode('UserLocal', 'contactid') && ($iContactId != 0))
  334. {
  335. $oUser->Set('contactid', $iContactId);
  336. }
  337. $oUser->Set('language', $sLanguage); // Language was chosen during the installation
  338. // Add this user to the very specific 'admin' profile
  339. $oAdminProfile = MetaModel::GetObjectFromOQL("SELECT URP_Profiles WHERE name = :name", array('name' => ADMIN_PROFILE_NAME), true /*all data*/);
  340. if (is_object($oAdminProfile))
  341. {
  342. $oUserProfile = new URP_UserProfile();
  343. //$oUserProfile->Set('userid', $iUserId);
  344. $oUserProfile->Set('profileid', $oAdminProfile->GetKey());
  345. $oUserProfile->Set('reason', 'By definition, the administrator must have the administrator profile');
  346. //$oUserProfile->DBInsertTrackedNoReload($oChange, true /* skip security */);
  347. $oSet = DBObjectSet::FromObject($oUserProfile);
  348. $oUser->Set('profile_list', $oSet);
  349. }
  350. $iUserId = $oUser->DBInsertTrackedNoReload($oChange, true /* skip security */);
  351. return true;
  352. }
  353. public function Init()
  354. {
  355. }
  356. protected $m_aUserOrgs = array(); // userid -> array of orgid
  357. // Built on demand, could be optimized if necessary (doing a query for each attribute that needs to be read)
  358. protected $m_aObjectActionGrants = array();
  359. /**
  360. * Read and cache organizations allowed to the given user
  361. *
  362. * @param oUser
  363. * @param sClass -not used here but can be used in overloads
  364. */
  365. protected function GetUserOrgs($oUser, $sClass)
  366. {
  367. $iUser = $oUser->GetKey();
  368. if (!array_key_exists($iUser, $this->m_aUserOrgs))
  369. {
  370. $this->m_aUserOrgs[$iUser] = array();
  371. $sHierarchicalKeyCode = MetaModel::IsHierarchicalClass('Organization');
  372. if ($sHierarchicalKeyCode !== false)
  373. {
  374. $sUserOrgQuery = 'SELECT UserOrg, Org FROM Organization AS Org JOIN Organization AS Root ON Org.'.$sHierarchicalKeyCode.' BELOW Root.id JOIN URP_UserOrg AS UserOrg ON UserOrg.allowed_org_id = Root.id WHERE UserOrg.userid = :userid';
  375. $oUserOrgSet = new DBObjectSet(DBObjectSearch::FromOQL_AllData($sUserOrgQuery), array(), array('userid' => $iUser));
  376. while ($aRow = $oUserOrgSet->FetchAssoc())
  377. {
  378. $oUserOrg = $aRow['UserOrg'];
  379. $oOrg = $aRow['Org'];
  380. $this->m_aUserOrgs[$iUser][] = $oOrg->GetKey();
  381. }
  382. }
  383. else
  384. {
  385. $oSearch = new DBObjectSearch('URP_UserOrg');
  386. $oSearch->AllowAllData();
  387. $oCondition = new BinaryExpression(new FieldExpression('userid'), '=', new VariableExpression('userid'));
  388. $oSearch->AddConditionExpression($oCondition);
  389. $oUserOrgSet = new DBObjectSet($oSearch, array(), array('userid' => $iUser));
  390. while ($oUserOrg = $oUserOrgSet->Fetch())
  391. {
  392. $this->m_aUserOrgs[$iUser][] = $oUserOrg->Get('allowed_org_id');
  393. }
  394. }
  395. }
  396. return $this->m_aUserOrgs[$iUser];
  397. }
  398. public function ResetCache()
  399. {
  400. // Loaded by Load cache
  401. $this->m_aUserOrgs = array();
  402. // Cache
  403. $this->m_aObjectActionGrants = array();
  404. }
  405. public function LoadCache()
  406. {
  407. static $bSharedObjectInitialized = false;
  408. if (!$bSharedObjectInitialized)
  409. {
  410. $bSharedObjectInitialized = true;
  411. if (self::HasSharing())
  412. {
  413. SharedObject::InitSharedClassProperties();
  414. }
  415. }
  416. return true;
  417. }
  418. /**
  419. * @param $oUser User
  420. * @return array
  421. */
  422. public function IsAdministrator($oUser)
  423. {
  424. // UserRights caches the list for us
  425. return UserRights::HasProfile(ADMIN_PROFILE_NAME, $oUser);
  426. }
  427. /**
  428. * @param $oUser User
  429. * @return array
  430. */
  431. public function IsPortalUser($oUser)
  432. {
  433. // UserRights caches the list for us
  434. return UserRights::HasProfile(PORTAL_PROFILE_NAME, $oUser);
  435. }
  436. /**
  437. * @param $oUser User
  438. * @return bool
  439. */
  440. public function ListProfiles($oUser)
  441. {
  442. $aRet = array();
  443. $oSearch = new DBObjectSearch('URP_UserProfile');
  444. $oSearch->AllowAllData();
  445. $oSearch->NoContextParameters();
  446. $oSearch->Addcondition('userid', $oUser->GetKey(), '=');
  447. $oProfiles = new DBObjectSet($oSearch);
  448. while ($oUserProfile = $oProfiles->Fetch())
  449. {
  450. $aRet[$oUserProfile->Get('profileid')] = $oUserProfile->Get('profileid_friendlyname');
  451. }
  452. return $aRet;
  453. }
  454. public function GetSelectFilter($oUser, $sClass, $aSettings = array())
  455. {
  456. $this->LoadCache();
  457. $aObjectPermissions = $this->GetUserActionGrant($oUser, $sClass, UR_ACTION_READ);
  458. if ($aObjectPermissions['permission'] == UR_ALLOWED_NO)
  459. {
  460. return false;
  461. }
  462. // Determine how to position the objects of this class
  463. //
  464. $sAttCode = self::GetOwnerOrganizationAttCode($sClass);
  465. if (is_null($sAttCode))
  466. {
  467. // No filtering for this object
  468. return true;
  469. }
  470. // Position the user
  471. //
  472. $aUserOrgs = $this->GetUserOrgs($oUser, $sClass);
  473. if (count($aUserOrgs) == 0)
  474. {
  475. // No org means 'any org'
  476. return true;
  477. }
  478. return $this->MakeSelectFilter($sClass, $aUserOrgs, $aSettings, $sAttCode);
  479. }
  480. // This verb has been made public to allow the development of an accurate feedback for the current configuration
  481. public function GetProfileActionGrant($iProfile, $sClass, $sAction)
  482. {
  483. // Note: action is forced lowercase to be more flexible (historical bug)
  484. $sAction = strtolower($sAction);
  485. return ProfilesConfig::GetProfileActionGrant($iProfile, $sClass, $sAction);
  486. }
  487. protected function GetUserActionGrant($oUser, $sClass, $iActionCode)
  488. {
  489. $this->LoadCache();
  490. // load and cache permissions for the current user on the given class
  491. //
  492. $iUser = $oUser->GetKey();
  493. $aTest = @$this->m_aObjectActionGrants[$iUser][$sClass][$iActionCode];
  494. if (is_array($aTest)) return $aTest;
  495. $sAction = self::$m_aActionCodes[$iActionCode];
  496. $bStatus = null;
  497. // Call the API of UserRights because it caches the list for us
  498. foreach(UserRights::ListProfiles($oUser) as $iProfile => $oProfile)
  499. {
  500. $bGrant = $this->GetProfileActionGrant($iProfile, $sClass, $sAction);
  501. if (!is_null($bGrant))
  502. {
  503. if ($bGrant)
  504. {
  505. if (is_null($bStatus))
  506. {
  507. $bStatus = true;
  508. }
  509. }
  510. else
  511. {
  512. $bStatus = false;
  513. }
  514. }
  515. }
  516. $iPermission = $bStatus ? UR_ALLOWED_YES : UR_ALLOWED_NO;
  517. $aRes = array(
  518. 'permission' => $iPermission,
  519. );
  520. $this->m_aObjectActionGrants[$iUser][$sClass][$iActionCode] = $aRes;
  521. return $aRes;
  522. }
  523. public function IsActionAllowed($oUser, $sClass, $iActionCode, $oInstanceSet = null)
  524. {
  525. $this->LoadCache();
  526. $aObjectPermissions = $this->GetUserActionGrant($oUser, $sClass, $iActionCode);
  527. $iPermission = $aObjectPermissions['permission'];
  528. // Note: In most cases the object set is ignored because it was interesting to optimize for huge data sets
  529. // and acceptable to consider only the root class of the object set
  530. if ($iPermission != UR_ALLOWED_YES)
  531. {
  532. // It is already NO for everyone... that's the final word!
  533. }
  534. elseif ($iActionCode == UR_ACTION_READ)
  535. {
  536. // We are protected by GetSelectFilter: the object set contains objects allowed or shared for reading
  537. }
  538. elseif ($iActionCode == UR_ACTION_BULK_READ)
  539. {
  540. // We are protected by GetSelectFilter: the object set contains objects allowed or shared for reading
  541. }
  542. elseif ($oInstanceSet)
  543. {
  544. // We are protected by GetSelectFilter: the object set contains objects allowed or shared for reading
  545. // We have to answer NO for objects shared for reading purposes
  546. if (self::HasSharing())
  547. {
  548. $aClassProps = SharedObject::GetSharedClassProperties($sClass);
  549. if ($aClassProps)
  550. {
  551. // This class is shared, GetSelectFilter may allow some objects for read only
  552. // But currently we are checking wether the objects might be written...
  553. // Let's exclude the objects based on the relevant criteria
  554. $sOrgAttCode = self::GetOwnerOrganizationAttCode($sClass);
  555. if (!is_null($sOrgAttCode))
  556. {
  557. $aUserOrgs = $this->GetUserOrgs($oUser, $sClass);
  558. if (!is_null($aUserOrgs) && count($aUserOrgs) > 0)
  559. {
  560. $iCountNO = 0;
  561. $iCountYES = 0;
  562. $oInstanceSet->Rewind();
  563. while($oObject = $oInstanceSet->Fetch())
  564. {
  565. $iOrg = $oObject->Get($sOrgAttCode);
  566. if (in_array($iOrg, $aUserOrgs))
  567. {
  568. $iCountYES++;
  569. }
  570. else
  571. {
  572. $iCountNO++;
  573. }
  574. }
  575. if ($iCountNO == 0)
  576. {
  577. $iPermission = UR_ALLOWED_YES;
  578. }
  579. elseif ($iCountYES == 0)
  580. {
  581. $iPermission = UR_ALLOWED_NO;
  582. }
  583. else
  584. {
  585. $iPermission = UR_ALLOWED_DEPENDS;
  586. }
  587. }
  588. }
  589. }
  590. }
  591. }
  592. return $iPermission;
  593. }
  594. public function IsActionAllowedOnAttribute($oUser, $sClass, $sAttCode, $iActionCode, $oInstanceSet = null)
  595. {
  596. $this->LoadCache();
  597. // Note: The object set is ignored because it was interesting to optimize for huge data sets
  598. // and acceptable to consider only the root class of the object set
  599. $aObjectPermissions = $this->GetUserActionGrant($oUser, $sClass, $iActionCode);
  600. return $aObjectPermissions['permission'];
  601. }
  602. // This verb has been made public to allow the development of an accurate feedback for the current configuration
  603. public function GetClassStimulusGrant($iProfile, $sClass, $sStimulusCode)
  604. {
  605. return ProfilesConfig::GetProfileStimulusGrant($iProfile, $sClass, $sStimulusCode);
  606. }
  607. public function IsStimulusAllowed($oUser, $sClass, $sStimulusCode, $oInstanceSet = null)
  608. {
  609. $this->LoadCache();
  610. // Note: this code is VERY close to the code of IsActionAllowed()
  611. $iUser = $oUser->GetKey();
  612. // Note: The object set is ignored because it was interesting to optimize for huge data sets
  613. // and acceptable to consider only the root class of the object set
  614. $bStatus = null;
  615. // Call the API of UserRights because it caches the list for us
  616. foreach(UserRights::ListProfiles($oUser) as $iProfile => $oProfile)
  617. {
  618. $bGrant = $this->GetClassStimulusGrant($iProfile, $sClass, $sStimulusCode);
  619. if (!is_null($bGrant))
  620. {
  621. if ($bGrant)
  622. {
  623. if (is_null($bStatus))
  624. {
  625. $bStatus = true;
  626. }
  627. }
  628. else
  629. {
  630. $bStatus = false;
  631. }
  632. }
  633. }
  634. $iPermission = $bStatus ? UR_ALLOWED_YES : UR_ALLOWED_NO;
  635. return $iPermission;
  636. }
  637. public function FlushPrivileges()
  638. {
  639. $this->ResetCache();
  640. }
  641. /**
  642. * Find out which attribute is corresponding the the dimension 'owner org'
  643. * returns null if no such attribute has been found (no filtering should occur)
  644. */
  645. public static function GetOwnerOrganizationAttCode($sClass)
  646. {
  647. $sAttCode = null;
  648. $aCallSpec = array($sClass, 'MapContextParam');
  649. if (($sClass == 'Organization') || is_subclass_of($sClass, 'Organization'))
  650. {
  651. $sAttCode = 'id';
  652. }
  653. elseif (is_callable($aCallSpec))
  654. {
  655. $sAttCode = call_user_func($aCallSpec, 'org_id'); // Returns null when there is no mapping for this parameter
  656. if (!MetaModel::IsValidAttCode($sClass, $sAttCode))
  657. {
  658. // Skip silently. The data model checker will tell you something about this...
  659. $sAttCode = null;
  660. }
  661. }
  662. elseif(MetaModel::IsValidAttCode($sClass, 'org_id'))
  663. {
  664. $sAttCode = 'org_id';
  665. }
  666. return $sAttCode;
  667. }
  668. /**
  669. * Determine wether the objects can be shared by the mean of a class SharedObject
  670. **/
  671. protected static function HasSharing()
  672. {
  673. static $bHasSharing;
  674. if (!isset($bHasSharing))
  675. {
  676. $bHasSharing = class_exists('SharedObject');
  677. }
  678. return $bHasSharing;
  679. }
  680. }
  681. UserRights::SelectModule('UserRightsProfile');
  682. ?>