userrightsprofile.class.inc.php 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798
  1. <?php
  2. // Copyright (C) 2010-2013 Combodo SARL
  3. //
  4. // This file is part of iTop.
  5. //
  6. // iTop is free software; you can redistribute it and/or modify
  7. // it under the terms of the GNU Affero General Public License as published by
  8. // the Free Software Foundation, either version 3 of the License, or
  9. // (at your option) any later version.
  10. //
  11. // iTop is distributed in the hope that it will be useful,
  12. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. // GNU Affero General Public License for more details.
  15. //
  16. // You should have received a copy of the GNU Affero General Public License
  17. // along with iTop. If not, see <http://www.gnu.org/licenses/>
  18. /**
  19. * UserRightsProfile
  20. * User management Module, basing the right on profiles and a matrix (similar to UserRightsMatrix, but profiles and other decorations have been added)
  21. *
  22. * @copyright Copyright (C) 2010-2012 Combodo SARL
  23. * @license http://opensource.org/licenses/AGPL-3.0
  24. */
  25. define('ADMIN_PROFILE_NAME', 'Administrator');
  26. define('PORTAL_PROFILE_NAME', 'Portal user');
  27. class UserRightsBaseClassGUI extends cmdbAbstractObject
  28. {
  29. // Whenever something changes, reload the privileges
  30. protected function AfterInsert()
  31. {
  32. UserRights::FlushPrivileges();
  33. }
  34. protected function AfterUpdate()
  35. {
  36. UserRights::FlushPrivileges();
  37. }
  38. protected function AfterDelete()
  39. {
  40. UserRights::FlushPrivileges();
  41. }
  42. }
  43. class URP_Profiles extends UserRightsBaseClassGUI
  44. {
  45. public static function Init()
  46. {
  47. $aParams = array
  48. (
  49. "category" => "addon/userrights",
  50. "key_type" => "autoincrement",
  51. "name_attcode" => "name",
  52. "state_attcode" => "",
  53. "reconc_keys" => array(),
  54. "db_table" => "priv_urp_profiles",
  55. "db_key_field" => "id",
  56. "db_finalclass_field" => "",
  57. "display_template" => "",
  58. );
  59. MetaModel::Init_Params($aParams);
  60. //MetaModel::Init_InheritAttributes();
  61. MetaModel::Init_AddAttribute(new AttributeString("name", array("allowed_values"=>null, "sql"=>"name", "default_value"=>null, "is_null_allowed"=>false, "depends_on"=>array())));
  62. MetaModel::Init_AddAttribute(new AttributeString("description", array("allowed_values"=>null, "sql"=>"description", "default_value"=>null, "is_null_allowed"=>false, "depends_on"=>array())));
  63. MetaModel::Init_AddAttribute(new AttributeLinkedSetIndirect("user_list", array("linked_class"=>"URP_UserProfile", "ext_key_to_me"=>"profileid", "ext_key_to_remote"=>"userid", "allowed_values"=>null, "count_min"=>1, "count_max"=>0, "depends_on"=>array())));
  64. // Display lists
  65. MetaModel::Init_SetZListItems('details', array('name', 'description', 'user_list')); // Attributes to be displayed for the complete details
  66. MetaModel::Init_SetZListItems('list', array('description')); // Attributes to be displayed for a list
  67. // Search criteria
  68. MetaModel::Init_SetZListItems('standard_search', array('name')); // Criteria of the std search form
  69. MetaModel::Init_SetZListItems('advanced_search', array('name')); // Criteria of the advanced search form
  70. }
  71. protected static $m_aCacheProfiles = null;
  72. public static function DoCreateProfile($sName, $sDescription)
  73. {
  74. if (is_null(self::$m_aCacheProfiles))
  75. {
  76. self::$m_aCacheProfiles = array();
  77. $oFilterAll = new DBObjectSearch('URP_Profiles');
  78. $oSet = new DBObjectSet($oFilterAll);
  79. while ($oProfile = $oSet->Fetch())
  80. {
  81. self::$m_aCacheProfiles[$oProfile->Get('name')] = $oProfile->GetKey();
  82. }
  83. }
  84. $sCacheKey = $sName;
  85. if (isset(self::$m_aCacheProfiles[$sCacheKey]))
  86. {
  87. return self::$m_aCacheProfiles[$sCacheKey];
  88. }
  89. $oNewObj = MetaModel::NewObject("URP_Profiles");
  90. $oNewObj->Set('name', $sName);
  91. $oNewObj->Set('description', $sDescription);
  92. $iId = $oNewObj->DBInsertNoReload();
  93. self::$m_aCacheProfiles[$sCacheKey] = $iId;
  94. return $iId;
  95. }
  96. function GetGrantAsHtml($oUserRights, $sClass, $sAction)
  97. {
  98. $bGrant = $oUserRights->GetProfileActionGrant($this->GetKey(), $sClass, $sAction);
  99. if (is_null($bGrant))
  100. {
  101. return '<span style="background-color: #ffdddd;">'.Dict::S('UI:UserManagement:ActionAllowed:No').'</span>';
  102. }
  103. elseif ($bGrant)
  104. {
  105. return '<span style="background-color: #ddffdd;">'.Dict::S('UI:UserManagement:ActionAllowed:Yes').'</span>';
  106. }
  107. else
  108. {
  109. return '<span style="background-color: #ffdddd;">'.Dict::S('UI:UserManagement:ActionAllowed:No').'</span>';
  110. }
  111. }
  112. function DoShowGrantSumary($oPage)
  113. {
  114. if ($this->GetRawName() == "Administrator")
  115. {
  116. // Looks dirty, but ok that's THE ONE
  117. $oPage->p(Dict::S('UI:UserManagement:AdminProfile+'));
  118. return;
  119. }
  120. // Note: for sure, we assume that the instance is derived from UserRightsProfile
  121. $oUserRights = UserRights::GetModuleInstance();
  122. $aDisplayData = array();
  123. foreach (MetaModel::GetClasses('bizmodel') as $sClass)
  124. {
  125. // Skip non instantiable classes
  126. if (MetaModel::IsAbstract($sClass)) continue;
  127. $aStimuli = array();
  128. foreach (MetaModel::EnumStimuli($sClass) as $sStimulusCode => $oStimulus)
  129. {
  130. $bGrant = $oUserRights->GetClassStimulusGrant($this->GetKey(), $sClass, $sStimulusCode);
  131. if ($bGrant === true)
  132. {
  133. $aStimuli[] = '<span title="'.$sStimulusCode.': '.htmlentities($oStimulus->GetDescription(), ENT_QUOTES, 'UTF-8').'">'.htmlentities($oStimulus->GetLabel(), ENT_QUOTES, 'UTF-8').'</span>';
  134. }
  135. }
  136. $sStimuli = implode(', ', $aStimuli);
  137. $aDisplayData[] = array(
  138. 'class' => MetaModel::GetName($sClass),
  139. 'read' => $this->GetGrantAsHtml($oUserRights, $sClass, 'r'),
  140. 'bulkread' => $this->GetGrantAsHtml($oUserRights, $sClass, 'br'),
  141. 'write' => $this->GetGrantAsHtml($oUserRights, $sClass, 'w'),
  142. 'bulkwrite' => $this->GetGrantAsHtml($oUserRights, $sClass, 'bw'),
  143. 'delete' => $this->GetGrantAsHtml($oUserRights, $sClass, 'd'),
  144. 'bulkdelete' => $this->GetGrantAsHtml($oUserRights, $sClass, 'bd'),
  145. 'stimuli' => $sStimuli,
  146. );
  147. }
  148. $aDisplayConfig = array();
  149. $aDisplayConfig['class'] = array('label' => Dict::S('UI:UserManagement:Class'), 'description' => Dict::S('UI:UserManagement:Class+'));
  150. $aDisplayConfig['read'] = array('label' => Dict::S('UI:UserManagement:Action:Read'), 'description' => Dict::S('UI:UserManagement:Action:Read+'));
  151. $aDisplayConfig['bulkread'] = array('label' => Dict::S('UI:UserManagement:Action:BulkRead'), 'description' => Dict::S('UI:UserManagement:Action:BulkRead+'));
  152. $aDisplayConfig['write'] = array('label' => Dict::S('UI:UserManagement:Action:Modify'), 'description' => Dict::S('UI:UserManagement:Action:Modify+'));
  153. $aDisplayConfig['bulkwrite'] = array('label' => Dict::S('UI:UserManagement:Action:BulkModify'), 'description' => Dict::S('UI:UserManagement:Action:BulkModify+'));
  154. $aDisplayConfig['delete'] = array('label' => Dict::S('UI:UserManagement:Action:Delete'), 'description' => Dict::S('UI:UserManagement:Action:Delete+'));
  155. $aDisplayConfig['bulkdelete'] = array('label' => Dict::S('UI:UserManagement:Action:BulkDelete'), 'description' => Dict::S('UI:UserManagement:Action:BulkDelete+'));
  156. $aDisplayConfig['stimuli'] = array('label' => Dict::S('UI:UserManagement:Action:Stimuli'), 'description' => Dict::S('UI:UserManagement:Action:Stimuli+'));
  157. $oPage->table($aDisplayConfig, $aDisplayData);
  158. }
  159. function DisplayBareRelations(WebPage $oPage, $bEditMode = false)
  160. {
  161. parent::DisplayBareRelations($oPage, $bEditMode);
  162. if (!$bEditMode)
  163. {
  164. $oPage->SetCurrentTab(Dict::S('UI:UserManagement:GrantMatrix'));
  165. $this->DoShowGrantSumary($oPage);
  166. }
  167. }
  168. public static function GetReadOnlyAttributes()
  169. {
  170. return array('name', 'description');
  171. }
  172. // returns an array of id => array of column => php value(so-called "real value")
  173. public static function GetPredefinedObjects()
  174. {
  175. return ProfilesConfig::GetProfilesValues();
  176. }
  177. // Before deleting a profile,
  178. // preserve DB integrity by deleting links to users
  179. protected function OnDelete()
  180. {
  181. // Note: this may break the rule that says: "a user must have at least ONE profile" !
  182. $oLnkSet = $this->Get('user_list');
  183. while($oLnk = $oLnkSet->Fetch())
  184. {
  185. $oLnk->DBDelete();
  186. }
  187. }
  188. }
  189. class URP_UserProfile extends UserRightsBaseClassGUI
  190. {
  191. public static function Init()
  192. {
  193. $aParams = array
  194. (
  195. "category" => "addon/userrights",
  196. "key_type" => "autoincrement",
  197. "name_attcode" => "userid",
  198. "state_attcode" => "",
  199. "reconc_keys" => array(),
  200. "db_table" => "priv_urp_userprofile",
  201. "db_key_field" => "id",
  202. "db_finalclass_field" => "",
  203. "display_template" => "",
  204. );
  205. MetaModel::Init_Params($aParams);
  206. //MetaModel::Init_InheritAttributes();
  207. MetaModel::Init_AddAttribute(new AttributeExternalKey("userid", array("targetclass"=>"User", "jointype"=> "", "allowed_values"=>null, "sql"=>"userid", "is_null_allowed"=>false, "on_target_delete"=>DEL_AUTO, "depends_on"=>array())));
  208. MetaModel::Init_AddAttribute(new AttributeExternalField("userlogin", array("allowed_values"=>null, "extkey_attcode"=> 'userid', "target_attcode"=>"login")));
  209. MetaModel::Init_AddAttribute(new AttributeExternalKey("profileid", array("targetclass"=>"URP_Profiles", "jointype"=> "", "allowed_values"=>null, "sql"=>"profileid", "is_null_allowed"=>false, "on_target_delete"=>DEL_AUTO, "depends_on"=>array())));
  210. MetaModel::Init_AddAttribute(new AttributeExternalField("profile", array("allowed_values"=>null, "extkey_attcode"=> 'profileid', "target_attcode"=>"name")));
  211. MetaModel::Init_AddAttribute(new AttributeString("reason", array("allowed_values"=>null, "sql"=>"description", "default_value"=>null, "is_null_allowed"=>true, "depends_on"=>array())));
  212. // Display lists
  213. MetaModel::Init_SetZListItems('details', array('userid', 'profileid', 'reason')); // Attributes to be displayed for the complete details
  214. MetaModel::Init_SetZListItems('list', array('userid', 'profileid', 'reason')); // Attributes to be displayed for a list
  215. // Search criteria
  216. MetaModel::Init_SetZListItems('standard_search', array('userid', 'profileid')); // Criteria of the std search form
  217. MetaModel::Init_SetZListItems('advanced_search', array('userid', 'profileid')); // Criteria of the advanced search form
  218. }
  219. public function GetName()
  220. {
  221. return Dict::Format('UI:UserManagement:LinkBetween_User_And_Profile', $this->Get('userlogin'), $this->Get('profile'));
  222. }
  223. }
  224. class URP_UserOrg extends UserRightsBaseClassGUI
  225. {
  226. public static function Init()
  227. {
  228. $aParams = array
  229. (
  230. "category" => "addon/userrights",
  231. "key_type" => "autoincrement",
  232. "name_attcode" => "userid",
  233. "state_attcode" => "",
  234. "reconc_keys" => array(),
  235. "db_table" => "priv_urp_userorg",
  236. "db_key_field" => "id",
  237. "db_finalclass_field" => "",
  238. "display_template" => "",
  239. );
  240. MetaModel::Init_Params($aParams);
  241. //MetaModel::Init_InheritAttributes();
  242. MetaModel::Init_AddAttribute(new AttributeExternalKey("userid", array("targetclass"=>"User", "jointype"=> "", "allowed_values"=>null, "sql"=>"userid", "is_null_allowed"=>false, "on_target_delete"=>DEL_AUTO, "depends_on"=>array())));
  243. MetaModel::Init_AddAttribute(new AttributeExternalField("userlogin", array("allowed_values"=>null, "extkey_attcode"=> 'userid', "target_attcode"=>"login")));
  244. MetaModel::Init_AddAttribute(new AttributeExternalKey("allowed_org_id", array("targetclass"=>"Organization", "jointype"=> "", "allowed_values"=>null, "sql"=>"allowed_org_id", "is_null_allowed"=>false, "on_target_delete"=>DEL_AUTO, "depends_on"=>array())));
  245. MetaModel::Init_AddAttribute(new AttributeExternalField("allowed_org_name", array("allowed_values"=>null, "extkey_attcode"=> 'allowed_org_id', "target_attcode"=>"name")));
  246. MetaModel::Init_AddAttribute(new AttributeString("reason", array("allowed_values"=>null, "sql"=>"reason", "default_value"=>null, "is_null_allowed"=>true, "depends_on"=>array())));
  247. // Display lists
  248. MetaModel::Init_SetZListItems('details', array('userid', 'allowed_org_id', 'reason')); // Attributes to be displayed for the complete details
  249. MetaModel::Init_SetZListItems('list', array('allowed_org_id', 'reason')); // Attributes to be displayed for a list
  250. // Search criteria
  251. MetaModel::Init_SetZListItems('standard_search', array('userid', 'allowed_org_id')); // Criteria of the std search form
  252. MetaModel::Init_SetZListItems('advanced_search', array('userid', 'allowed_org_id')); // Criteria of the advanced search form
  253. }
  254. public function GetName()
  255. {
  256. return Dict::Format('UI:UserManagement:LinkBetween_User_And_Org', $this->Get('userlogin'), $this->Get('allowed_org_name'));
  257. }
  258. }
  259. class UserRightsProfile extends UserRightsAddOnAPI
  260. {
  261. static public $m_aActionCodes = array(
  262. UR_ACTION_READ => 'r',
  263. UR_ACTION_MODIFY => 'w',
  264. UR_ACTION_DELETE => 'd',
  265. UR_ACTION_BULK_READ => 'br',
  266. UR_ACTION_BULK_MODIFY => 'bw',
  267. UR_ACTION_BULK_DELETE => 'bd',
  268. );
  269. // Installation: create the very first user
  270. public function CreateAdministrator($sAdminUser, $sAdminPwd, $sLanguage = 'EN US')
  271. {
  272. CMDBObject::SetTrackInfo('Initialization');
  273. $oChange = CMDBObject::GetCurrentChange();
  274. $iContactId = 0;
  275. // Support drastic data model changes: no organization class (or not writable)!
  276. if (MetaModel::IsValidClass('Organization') && !MetaModel::IsAbstract('Organization'))
  277. {
  278. $oOrg = new Organization();
  279. $oOrg->Set('name', 'My Company/Department');
  280. $oOrg->Set('code', 'SOMECODE');
  281. $iOrgId = $oOrg->DBInsertTrackedNoReload($oChange, true /* skip security */);
  282. // Support drastic data model changes: no Person class (or not writable)!
  283. if (MetaModel::IsValidClass('Person') && !MetaModel::IsAbstract('Person'))
  284. {
  285. $oContact = new Person();
  286. $oContact->Set('name', 'My last name');
  287. $oContact->Set('first_name', 'My first name');
  288. if (MetaModel::IsValidAttCode('Person', 'org_id'))
  289. {
  290. $oContact->Set('org_id', $iOrgId);
  291. }
  292. if (MetaModel::IsValidAttCode('Person', 'phone'))
  293. {
  294. $oContact->Set('phone', '+00 000 000 000');
  295. }
  296. $oContact->Set('email', 'my.email@foo.org');
  297. $iContactId = $oContact->DBInsertTrackedNoReload($oChange, true /* skip security */);
  298. }
  299. }
  300. $oUser = new UserLocal();
  301. $oUser->Set('login', $sAdminUser);
  302. $oUser->Set('password', $sAdminPwd);
  303. if (MetaModel::IsValidAttCode('UserLocal', 'contactid') && ($iContactId != 0))
  304. {
  305. $oUser->Set('contactid', $iContactId);
  306. }
  307. $oUser->Set('language', $sLanguage); // Language was chosen during the installation
  308. // Add this user to the very specific 'admin' profile
  309. $oAdminProfile = MetaModel::GetObjectFromOQL("SELECT URP_Profiles WHERE name = :name", array('name' => ADMIN_PROFILE_NAME), true /*all data*/);
  310. if (is_object($oAdminProfile))
  311. {
  312. $oUserProfile = new URP_UserProfile();
  313. //$oUserProfile->Set('userid', $iUserId);
  314. $oUserProfile->Set('profileid', $oAdminProfile->GetKey());
  315. $oUserProfile->Set('reason', 'By definition, the administrator must have the administrator profile');
  316. //$oUserProfile->DBInsertTrackedNoReload($oChange, true /* skip security */);
  317. $oSet = DBObjectSet::FromObject($oUserProfile);
  318. $oUser->Set('profile_list', $oSet);
  319. }
  320. $iUserId = $oUser->DBInsertTrackedNoReload($oChange, true /* skip security */);
  321. return true;
  322. }
  323. public function Init()
  324. {
  325. }
  326. protected $m_aAdmins = array(); // id -> bool, true if the user has the well-known admin profile
  327. protected $m_aPortalUsers = array(); // id -> bool, true if the user has the well-known portal user profile
  328. protected $m_aProfiles; // id -> object
  329. protected $m_aUserProfiles = array(); // userid,profileid -> object
  330. protected $m_aUserOrgs = array(); // userid -> array of orgid
  331. // Built on demand, could be optimized if necessary (doing a query for each attribute that needs to be read)
  332. protected $m_aObjectActionGrants = array();
  333. /**
  334. * Read and cache organizations allowed to the given user
  335. *
  336. * @param oUser
  337. * @param sClass -not used here but can be used in overloads
  338. */
  339. protected function GetUserOrgs($oUser, $sClass)
  340. {
  341. $iUser = $oUser->GetKey();
  342. if (!array_key_exists($iUser, $this->m_aUserOrgs))
  343. {
  344. $this->m_aUserOrgs[$iUser] = array();
  345. $sHierarchicalKeyCode = MetaModel::IsHierarchicalClass('Organization');
  346. if ($sHierarchicalKeyCode !== false)
  347. {
  348. $sUserOrgQuery = 'SELECT UserOrg, Org FROM Organization AS Org JOIN Organization AS Root ON Org.'.$sHierarchicalKeyCode.' BELOW Root.id JOIN URP_UserOrg AS UserOrg ON UserOrg.allowed_org_id = Root.id WHERE UserOrg.userid = :userid';
  349. $oUserOrgSet = new DBObjectSet(DBObjectSearch::FromOQL_AllData($sUserOrgQuery), array(), array('userid' => $iUser));
  350. while ($aRow = $oUserOrgSet->FetchAssoc())
  351. {
  352. $oUserOrg = $aRow['UserOrg'];
  353. $oOrg = $aRow['Org'];
  354. $this->m_aUserOrgs[$iUser][] = $oOrg->GetKey();
  355. }
  356. }
  357. else
  358. {
  359. $oSearch = new DBObjectSearch('URP_UserOrg');
  360. $oSearch->AllowAllData();
  361. $oCondition = new BinaryExpression(new FieldExpression('userid'), '=', new VariableExpression('userid'));
  362. $oSearch->AddConditionExpression($oCondition);
  363. $oUserOrgSet = new DBObjectSet($oSearch, array(), array('userid' => $iUser));
  364. while ($oUserOrg = $oUserOrgSet->Fetch())
  365. {
  366. $this->m_aUserOrgs[$iUser][] = $oUserOrg->Get('allowed_org_id');
  367. }
  368. }
  369. }
  370. return $this->m_aUserOrgs[$iUser];
  371. }
  372. /**
  373. * Read and cache profiles of the given user
  374. */
  375. protected function GetUserProfiles($iUser)
  376. {
  377. if (!array_key_exists($iUser, $this->m_aUserProfiles))
  378. {
  379. $oSearch = new DBObjectSearch('URP_UserProfile');
  380. $oSearch->AllowAllData();
  381. $oCondition = new BinaryExpression(new FieldExpression('userid'), '=', new VariableExpression('userid'));
  382. $oSearch->AddConditionExpression($oCondition);
  383. $this->m_aUserProfiles[$iUser] = array();
  384. $oUserProfileSet = new DBObjectSet($oSearch, array(), array('userid' => $iUser));
  385. while ($oUserProfile = $oUserProfileSet->Fetch())
  386. {
  387. $this->m_aUserProfiles[$iUser][$oUserProfile->Get('profileid')] = $oUserProfile;
  388. }
  389. }
  390. return $this->m_aUserProfiles[$iUser];
  391. }
  392. public function ResetCache()
  393. {
  394. // Loaded by Load cache
  395. $this->m_aProfiles = null;
  396. $this->m_aUserProfiles = array();
  397. $this->m_aUserOrgs = array();
  398. $this->m_aAdmins = array();
  399. $this->m_aPortalUsers = array();
  400. // Cache
  401. $this->m_aObjectActionGrants = array();
  402. }
  403. public function LoadCache()
  404. {
  405. if (!is_null($this->m_aProfiles)) return;
  406. // Could be loaded in a shared memory (?)
  407. $oKPI = new ExecutionKPI();
  408. if (self::HasSharing())
  409. {
  410. SharedObject::InitSharedClassProperties();
  411. }
  412. $oProfileSet = new DBObjectSet(DBObjectSearch::FromOQL_AllData("SELECT URP_Profiles"));
  413. $this->m_aProfiles = array();
  414. while ($oProfile = $oProfileSet->Fetch())
  415. {
  416. $this->m_aProfiles[$oProfile->GetKey()] = $oProfile;
  417. }
  418. $oKPI->ComputeAndReport('Load of user management cache (excepted Action Grants)');
  419. /*
  420. echo "<pre>\n";
  421. print_r($this->m_aProfiles);
  422. print_r($this->m_aUserProfiles);
  423. print_r($this->m_aUserOrgs);
  424. echo "</pre>\n";
  425. exit;
  426. */
  427. return true;
  428. }
  429. public function IsAdministrator($oUser)
  430. {
  431. //$this->LoadCache();
  432. $iUser = $oUser->GetKey();
  433. if (!array_key_exists($iUser, $this->m_aAdmins))
  434. {
  435. $bIsAdmin = false;
  436. foreach($this->GetUserProfiles($iUser) as $oUserProfile)
  437. {
  438. if ($oUserProfile->Get('profile') == ADMIN_PROFILE_NAME)
  439. {
  440. $bIsAdmin = true;
  441. break;
  442. }
  443. }
  444. $this->m_aAdmins[$iUser] = $bIsAdmin;
  445. }
  446. return $this->m_aAdmins[$iUser];
  447. }
  448. public function IsPortalUser($oUser)
  449. {
  450. //$this->LoadCache();
  451. $iUser = $oUser->GetKey();
  452. if (!array_key_exists($iUser, $this->m_aPortalUsers))
  453. {
  454. $bIsPortalUser = false;
  455. foreach($this->GetUserProfiles($iUser) as $oUserProfile)
  456. {
  457. if ($oUserProfile->Get('profile') == PORTAL_PROFILE_NAME)
  458. {
  459. $bIsPortalUser = true;
  460. break;
  461. }
  462. }
  463. $this->m_aPortalUsers[$iUser] = $bIsPortalUser;
  464. }
  465. return $this->m_aPortalUsers[$iUser];
  466. }
  467. public function GetSelectFilter($oUser, $sClass, $aSettings = array())
  468. {
  469. $this->LoadCache();
  470. $aObjectPermissions = $this->GetUserActionGrant($oUser, $sClass, UR_ACTION_READ);
  471. if ($aObjectPermissions['permission'] == UR_ALLOWED_NO)
  472. {
  473. return false;
  474. }
  475. // Determine how to position the objects of this class
  476. //
  477. $sAttCode = self::GetOwnerOrganizationAttCode($sClass);
  478. if (is_null($sAttCode))
  479. {
  480. // No filtering for this object
  481. return true;
  482. }
  483. // Position the user
  484. //
  485. $aUserOrgs = $this->GetUserOrgs($oUser, $sClass);
  486. if (count($aUserOrgs) == 0)
  487. {
  488. // No org means 'any org'
  489. return true;
  490. }
  491. return $this->MakeSelectFilter($sClass, $aUserOrgs, $aSettings, $sAttCode);
  492. }
  493. // This verb has been made public to allow the development of an accurate feedback for the current configuration
  494. public function GetProfileActionGrant($iProfile, $sClass, $sAction)
  495. {
  496. // Note: action is forced lowercase to be more flexible (historical bug)
  497. $sAction = strtolower($sAction);
  498. return ProfilesConfig::GetProfileActionGrant($iProfile, $sClass, $sAction);
  499. }
  500. protected function GetUserActionGrant($oUser, $sClass, $iActionCode)
  501. {
  502. $this->LoadCache();
  503. // load and cache permissions for the current user on the given class
  504. //
  505. $iUser = $oUser->GetKey();
  506. $aTest = @$this->m_aObjectActionGrants[$iUser][$sClass][$iActionCode];
  507. if (is_array($aTest)) return $aTest;
  508. $sAction = self::$m_aActionCodes[$iActionCode];
  509. $bStatus = null;
  510. $aAttributes = array();
  511. foreach($this->GetUserProfiles($iUser) as $iProfile => $oProfile)
  512. {
  513. $bGrant = $this->GetProfileActionGrant($iProfile, $sClass, $sAction);
  514. if (!is_null($bGrant))
  515. {
  516. if ($bGrant)
  517. {
  518. if (is_null($bStatus))
  519. {
  520. $bStatus = true;
  521. }
  522. }
  523. else
  524. {
  525. $bStatus = false;
  526. }
  527. }
  528. }
  529. $iPermission = $bStatus ? UR_ALLOWED_YES : UR_ALLOWED_NO;
  530. $aRes = array(
  531. 'permission' => $iPermission,
  532. // 'attributes' => $aAttributes,
  533. );
  534. $this->m_aObjectActionGrants[$iUser][$sClass][$iActionCode] = $aRes;
  535. return $aRes;
  536. }
  537. public function IsActionAllowed($oUser, $sClass, $iActionCode, $oInstanceSet = null)
  538. {
  539. $this->LoadCache();
  540. $aObjectPermissions = $this->GetUserActionGrant($oUser, $sClass, $iActionCode);
  541. $iPermission = $aObjectPermissions['permission'];
  542. // Note: In most cases the object set is ignored because it was interesting to optimize for huge data sets
  543. // and acceptable to consider only the root class of the object set
  544. if ($iPermission != UR_ALLOWED_YES)
  545. {
  546. // It is already NO for everyone... that's the final word!
  547. }
  548. elseif ($iActionCode == UR_ACTION_READ)
  549. {
  550. // We are protected by GetSelectFilter: the object set contains objects allowed or shared for reading
  551. }
  552. elseif ($iActionCode == UR_ACTION_BULK_READ)
  553. {
  554. // We are protected by GetSelectFilter: the object set contains objects allowed or shared for reading
  555. }
  556. elseif ($oInstanceSet)
  557. {
  558. // We are protected by GetSelectFilter: the object set contains objects allowed or shared for reading
  559. // We have to answer NO for objects shared for reading purposes
  560. if (self::HasSharing())
  561. {
  562. $aClassProps = SharedObject::GetSharedClassProperties($sClass);
  563. if ($aClassProps)
  564. {
  565. // This class is shared, GetSelectFilter may allow some objects for read only
  566. // But currently we are checking wether the objects might be written...
  567. // Let's exclude the objects based on the relevant criteria
  568. $sOrgAttCode = self::GetOwnerOrganizationAttCode($sClass);
  569. if (!is_null($sOrgAttCode))
  570. {
  571. $aUserOrgs = $this->GetUserOrgs($oUser, $sClass);
  572. if (!is_null($aUserOrgs) && count($aUserOrgs) > 0)
  573. {
  574. $iCountNO = 0;
  575. $iCountYES = 0;
  576. $oInstanceSet->Rewind();
  577. while($oObject = $oInstanceSet->Fetch())
  578. {
  579. $iOrg = $oObject->Get($sOrgAttCode);
  580. if (in_array($iOrg, $aUserOrgs))
  581. {
  582. $iCountYES++;
  583. }
  584. else
  585. {
  586. $iCountNO++;
  587. }
  588. }
  589. if ($iCountNO == 0)
  590. {
  591. $iPermission = UR_ALLOWED_YES;
  592. }
  593. elseif ($iCountYES == 0)
  594. {
  595. $iPermission = UR_ALLOWED_NO;
  596. }
  597. else
  598. {
  599. $iPermission = UR_ALLOWED_DEPENDS;
  600. }
  601. }
  602. }
  603. }
  604. }
  605. }
  606. return $iPermission;
  607. }
  608. public function IsActionAllowedOnAttribute($oUser, $sClass, $sAttCode, $iActionCode, $oInstanceSet = null)
  609. {
  610. $this->LoadCache();
  611. // Note: The object set is ignored because it was interesting to optimize for huge data sets
  612. // and acceptable to consider only the root class of the object set
  613. $aObjectPermissions = $this->GetUserActionGrant($oUser, $sClass, $iActionCode);
  614. return $aObjectPermissions['permission'];
  615. }
  616. // This verb has been made public to allow the development of an accurate feedback for the current configuration
  617. public function GetClassStimulusGrant($iProfile, $sClass, $sStimulusCode)
  618. {
  619. return ProfilesConfig::GetProfileStimulusGrant($iProfile, $sClass, $sStimulusCode);
  620. }
  621. public function IsStimulusAllowed($oUser, $sClass, $sStimulusCode, $oInstanceSet = null)
  622. {
  623. $this->LoadCache();
  624. // Note: this code is VERY close to the code of IsActionAllowed()
  625. $iUser = $oUser->GetKey();
  626. // Note: The object set is ignored because it was interesting to optimize for huge data sets
  627. // and acceptable to consider only the root class of the object set
  628. $bStatus = null;
  629. foreach($this->GetUserProfiles($iUser) as $iProfile => $oProfile)
  630. {
  631. $bGrant = $this->GetClassStimulusGrant($iProfile, $sClass, $sStimulusCode);
  632. if (!is_null($bGrant))
  633. {
  634. if ($bGrant)
  635. {
  636. if (is_null($bStatus))
  637. {
  638. $bStatus = true;
  639. }
  640. }
  641. else
  642. {
  643. $bStatus = false;
  644. }
  645. }
  646. }
  647. $iPermission = $bStatus ? UR_ALLOWED_YES : UR_ALLOWED_NO;
  648. return $iPermission;
  649. }
  650. public function FlushPrivileges()
  651. {
  652. $this->ResetCache();
  653. }
  654. /**
  655. * Find out which attribute is corresponding the the dimension 'owner org'
  656. * returns null if no such attribute has been found (no filtering should occur)
  657. */
  658. public static function GetOwnerOrganizationAttCode($sClass)
  659. {
  660. $sAttCode = null;
  661. $aCallSpec = array($sClass, 'MapContextParam');
  662. if (($sClass == 'Organization') || is_subclass_of($sClass, 'Organization'))
  663. {
  664. $sAttCode = 'id';
  665. }
  666. elseif (is_callable($aCallSpec))
  667. {
  668. $sAttCode = call_user_func($aCallSpec, 'org_id'); // Returns null when there is no mapping for this parameter
  669. if (!MetaModel::IsValidAttCode($sClass, $sAttCode))
  670. {
  671. // Skip silently. The data model checker will tell you something about this...
  672. $sAttCode = null;
  673. }
  674. }
  675. elseif(MetaModel::IsValidAttCode($sClass, 'org_id'))
  676. {
  677. $sAttCode = 'org_id';
  678. }
  679. return $sAttCode;
  680. }
  681. /**
  682. * Determine wether the objects can be shared by the mean of a class SharedObject
  683. **/
  684. protected static function HasSharing()
  685. {
  686. static $bHasSharing;
  687. if (!isset($bHasSharing))
  688. {
  689. $bHasSharing = class_exists('SharedObject');
  690. }
  691. return $bHasSharing;
  692. }
  693. }
  694. UserRights::SelectModule('UserRightsProfile');
  695. ?>