userrights.class.inc.php 46 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514
  1. <?php
  2. // Copyright (C) 2010-2013 Combodo SARL
  3. //
  4. // This file is part of iTop.
  5. //
  6. // iTop is free software; you can redistribute it and/or modify
  7. // it under the terms of the GNU Affero General Public License as published by
  8. // the Free Software Foundation, either version 3 of the License, or
  9. // (at your option) any later version.
  10. //
  11. // iTop is distributed in the hope that it will be useful,
  12. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. // GNU Affero General Public License for more details.
  15. //
  16. // You should have received a copy of the GNU Affero General Public License
  17. // along with iTop. If not, see <http://www.gnu.org/licenses/>
  18. /**
  19. * User rights management API
  20. *
  21. * @copyright Copyright (C) 2010-2012 Combodo SARL
  22. * @license http://opensource.org/licenses/AGPL-3.0
  23. */
  24. class UserRightException extends CoreException
  25. {
  26. }
  27. define('UR_ALLOWED_NO', 0);
  28. define('UR_ALLOWED_YES', 1);
  29. define('UR_ALLOWED_DEPENDS', 2);
  30. define('UR_ACTION_READ', 1); // View an object
  31. define('UR_ACTION_MODIFY', 2); // Create/modify an object/attribute
  32. define('UR_ACTION_DELETE', 3); // Delete an object
  33. define('UR_ACTION_BULK_READ', 4); // Export multiple objects
  34. define('UR_ACTION_BULK_MODIFY', 5); // Create/modify multiple objects
  35. define('UR_ACTION_BULK_DELETE', 6); // Delete multiple objects
  36. define('UR_ACTION_CREATE', 7); // Instantiate an object
  37. define('UR_ACTION_APPLICATION_DEFINED', 10000); // Application specific actions (CSV import, View schema...)
  38. /**
  39. * User management module API
  40. *
  41. * @package iTopORM
  42. */
  43. abstract class UserRightsAddOnAPI
  44. {
  45. abstract public function CreateAdministrator($sAdminUser, $sAdminPwd, $sLanguage = 'EN US'); // could be used during initial installation
  46. abstract public function Init(); // loads data (possible optimizations)
  47. // Used to build select queries showing only objects visible for the given user
  48. abstract public function GetSelectFilter($sLogin, $sClass, $aSettings = array()); // returns a filter object
  49. abstract public function IsActionAllowed($oUser, $sClass, $iActionCode, /*dbObjectSet*/ $oInstanceSet = null);
  50. abstract public function IsStimulusAllowed($oUser, $sClass, $sStimulusCode, /*dbObjectSet*/ $oInstanceSet = null);
  51. abstract public function IsActionAllowedOnAttribute($oUser, $sClass, $sAttCode, $iActionCode, /*dbObjectSet*/ $oInstanceSet = null);
  52. abstract public function IsAdministrator($oUser);
  53. abstract public function IsPortalUser($oUser);
  54. abstract public function FlushPrivileges();
  55. /**
  56. * ...
  57. */
  58. public function MakeSelectFilter($sClass, $aAllowedOrgs, $aSettings = array(), $sAttCode = null)
  59. {
  60. if ($sAttCode == null)
  61. {
  62. $sAttCode = $this->GetOwnerOrganizationAttCode($sClass);
  63. }
  64. if (empty($sAttCode))
  65. {
  66. return $oFilter = new DBObjectSearch($sClass);
  67. }
  68. $oExpression = new FieldExpression($sAttCode, $sClass);
  69. $oFilter = new DBObjectSearch($sClass);
  70. $oListExpr = ListExpression::FromScalars($aAllowedOrgs);
  71. $oCondition = new BinaryExpression($oExpression, 'IN', $oListExpr);
  72. $oFilter->AddConditionExpression($oCondition);
  73. if ($this->HasSharing())
  74. {
  75. if (($sAttCode == 'id') && isset($aSettings['bSearchMode']) && $aSettings['bSearchMode'])
  76. {
  77. // Querying organizations (or derived)
  78. // and the expected list of organizations will be used as a search criteria
  79. // Therefore the query can also return organization having objects shared with the allowed organizations
  80. //
  81. // 1) build the list of organizations sharing something with the allowed organizations
  82. // Organization <== sharing_org_id == SharedObject having org_id IN {user orgs}
  83. $oShareSearch = new DBObjectSearch('SharedObject');
  84. $oOrgField = new FieldExpression('org_id', 'SharedObject');
  85. $oShareSearch->AddConditionExpression(new BinaryExpression($oOrgField, 'IN', $oListExpr));
  86. $oSearchSharers = new DBObjectSearch('Organization');
  87. $oSearchSharers->AllowAllData();
  88. $oSearchSharers->AddCondition_ReferencedBy($oShareSearch, 'sharing_org_id');
  89. $aSharers = array();
  90. foreach($oSearchSharers->ToDataArray(array('id')) as $aRow)
  91. {
  92. $aSharers[] = $aRow['id'];
  93. }
  94. // 2) Enlarge the overall results: ... OR id IN(id1, id2, id3)
  95. if (count($aSharers) > 0)
  96. {
  97. $oSharersList = ListExpression::FromScalars($aSharers);
  98. $oFilter->MergeConditionExpression(new BinaryExpression($oExpression, 'IN', $oSharersList));
  99. }
  100. }
  101. $aShareProperties = SharedObject::GetSharedClassProperties($sClass);
  102. if ($aShareProperties)
  103. {
  104. $sShareClass = $aShareProperties['share_class'];
  105. $sShareAttCode = $aShareProperties['attcode'];
  106. $oSearchShares = new DBObjectSearch($sShareClass);
  107. $oSearchShares->AllowAllData();
  108. $sHierarchicalKeyCode = MetaModel::IsHierarchicalClass('Organization');
  109. $oOrgField = new FieldExpression('org_id', $sShareClass);
  110. $oSearchShares->AddConditionExpression(new BinaryExpression($oOrgField, 'IN', $oListExpr));
  111. $aShared = array();
  112. foreach($oSearchShares->ToDataArray(array($sShareAttCode)) as $aRow)
  113. {
  114. $aShared[] = $aRow[$sShareAttCode];
  115. }
  116. if (count($aShared) > 0)
  117. {
  118. $oObjId = new FieldExpression('id', $sClass);
  119. $oSharedIdList = ListExpression::FromScalars($aShared);
  120. $oFilter->MergeConditionExpression(new BinaryExpression($oObjId, 'IN', $oSharedIdList));
  121. }
  122. }
  123. } // if HasSharing
  124. return $oFilter;
  125. }
  126. }
  127. abstract class User extends cmdbAbstractObject
  128. {
  129. public static function Init()
  130. {
  131. $aParams = array
  132. (
  133. "category" => "core",
  134. "key_type" => "autoincrement",
  135. "name_attcode" => "login",
  136. "state_attcode" => "",
  137. "reconc_keys" => array(),
  138. "db_table" => "priv_user",
  139. "db_key_field" => "id",
  140. "db_finalclass_field" => "",
  141. "display_template" => "",
  142. );
  143. MetaModel::Init_Params($aParams);
  144. //MetaModel::Init_InheritAttributes();
  145. MetaModel::Init_AddAttribute(new AttributeExternalKey("contactid", array("targetclass"=>"Person", "allowed_values"=>null, "sql"=>"contactid", "is_null_allowed"=>true, "on_target_delete"=>DEL_MANUAL, "depends_on"=>array())));
  146. MetaModel::Init_AddAttribute(new AttributeExternalField("last_name", array("allowed_values"=>null, "extkey_attcode"=> 'contactid', "target_attcode"=>"name")));
  147. MetaModel::Init_AddAttribute(new AttributeExternalField("first_name", array("allowed_values"=>null, "extkey_attcode"=> 'contactid', "target_attcode"=>"first_name")));
  148. MetaModel::Init_AddAttribute(new AttributeExternalField("email", array("allowed_values"=>null, "extkey_attcode"=> 'contactid', "target_attcode"=>"email")));
  149. MetaModel::Init_AddAttribute(new AttributeString("login", array("allowed_values"=>null, "sql"=>"login", "default_value"=>null, "is_null_allowed"=>false, "depends_on"=>array())));
  150. MetaModel::Init_AddAttribute(new AttributeApplicationLanguage("language", array("sql"=>"language", "default_value"=>"EN US", "is_null_allowed"=>false, "depends_on"=>array())));
  151. MetaModel::Init_AddAttribute(new AttributeLinkedSetIndirect("profile_list", array("linked_class"=>"URP_UserProfile", "ext_key_to_me"=>"userid", "ext_key_to_remote"=>"profileid", "allowed_values"=>null, "count_min"=>1, "count_max"=>0, "depends_on"=>array())));
  152. MetaModel::Init_AddAttribute(new AttributeLinkedSetIndirect("allowed_org_list", array("linked_class"=>"URP_UserOrg", "ext_key_to_me"=>"userid", "ext_key_to_remote"=>"allowed_org_id", "allowed_values"=>null, "count_min"=>1, "count_max"=>0, "depends_on"=>array())));
  153. // Display lists
  154. MetaModel::Init_SetZListItems('details', array('contactid', 'first_name', 'email', 'login', 'language', 'profile_list', 'allowed_org_list')); // Attributes to be displayed for the complete details
  155. MetaModel::Init_SetZListItems('list', array('finalclass', 'first_name', 'last_name', 'login')); // Attributes to be displayed for a list
  156. // Search criteria
  157. MetaModel::Init_SetZListItems('standard_search', array('login', 'contactid')); // Criteria of the std search form
  158. MetaModel::Init_SetZListItems('advanced_search', array('login', 'contactid')); // Criteria of the advanced search form
  159. }
  160. abstract public function CheckCredentials($sPassword);
  161. abstract public function TrustWebServerContext();
  162. abstract public function CanChangePassword();
  163. abstract public function ChangePassword($sOldPassword, $sNewPassword);
  164. /*
  165. * Compute a name in best effort mode
  166. */
  167. public function GetFriendlyName()
  168. {
  169. if (!MetaModel::IsValidAttCode(get_class($this), 'contactid'))
  170. {
  171. return $this->Get('login');
  172. }
  173. if ($this->Get('contactid') != 0)
  174. {
  175. $sFirstName = $this->Get('first_name');
  176. $sLastName = $this->Get('last_name');
  177. $sEmail = $this->Get('email');
  178. if (strlen($sFirstName) > 0)
  179. {
  180. return "$sFirstName $sLastName";
  181. }
  182. elseif (strlen($sEmail) > 0)
  183. {
  184. return "$sLastName <$sEmail>";
  185. }
  186. else
  187. {
  188. return $sLastName;
  189. }
  190. }
  191. return $this->Get('login');
  192. }
  193. /*
  194. * Overload the standard behavior
  195. */
  196. public function DoCheckToWrite()
  197. {
  198. parent::DoCheckToWrite();
  199. // Note: This MUST be factorized later: declare unique keys (set of columns) in the data model
  200. $aChanges = $this->ListChanges();
  201. if (array_key_exists('login', $aChanges))
  202. {
  203. if (strcasecmp($this->Get('login'), $this->GetOriginal('login')) !== 0)
  204. {
  205. $sNewLogin = $aChanges['login'];
  206. $oSearch = DBObjectSearch::FromOQL_AllData("SELECT User WHERE login = :newlogin");
  207. $oSet = new DBObjectSet($oSearch, array(), array('newlogin' => $sNewLogin));
  208. if ($oSet->Count() > 0)
  209. {
  210. $this->m_aCheckIssues[] = Dict::Format('Class:User/Error:LoginMustBeUnique', $sNewLogin);
  211. }
  212. }
  213. }
  214. // Check that this user has at least one profile assigned
  215. $oSet = $this->Get('profile_list');
  216. if ($oSet->Count() == 0)
  217. {
  218. $this->m_aCheckIssues[] = Dict::Format('Class:User/Error:AtLeastOneProfileIsNeeded');
  219. }
  220. }
  221. function GetGrantAsHtml($sClass, $iAction)
  222. {
  223. if (UserRights::IsActionAllowed($sClass, $iAction, null, $this))
  224. {
  225. return '<span style="background-color: #ddffdd;">'.Dict::S('UI:UserManagement:ActionAllowed:Yes').'</span>';
  226. }
  227. else
  228. {
  229. return '<span style="background-color: #ffdddd;">'.Dict::S('UI:UserManagement:ActionAllowed:No').'</span>';
  230. }
  231. }
  232. function DoShowGrantSumary($oPage, $sClassCategory)
  233. {
  234. if (UserRights::IsAdministrator($this))
  235. {
  236. // Looks dirty, but ok that's THE ONE
  237. $oPage->p(Dict::S('UI:UserManagement:AdminProfile+'));
  238. return;
  239. }
  240. $oKPI = new ExecutionKPI();
  241. $aDisplayData = array();
  242. foreach (MetaModel::GetClasses($sClassCategory) as $sClass)
  243. {
  244. $aClassStimuli = MetaModel::EnumStimuli($sClass);
  245. if (count($aClassStimuli) > 0)
  246. {
  247. $aStimuli = array();
  248. foreach ($aClassStimuli as $sStimulusCode => $oStimulus)
  249. {
  250. if (UserRights::IsStimulusAllowed($sClass, $sStimulusCode, null, $this))
  251. {
  252. $aStimuli[] = '<span title="'.$sStimulusCode.': '.htmlentities($oStimulus->GetDescription(), ENT_QUOTES, 'UTF-8').'">'.htmlentities($oStimulus->GetLabel(), ENT_QUOTES, 'UTF-8').'</span>';
  253. }
  254. }
  255. $sStimuli = implode(', ', $aStimuli);
  256. }
  257. else
  258. {
  259. $sStimuli = '<em title="'.Dict::S('UI:UserManagement:NoLifeCycleApplicable+').'">'.Dict::S('UI:UserManagement:NoLifeCycleApplicable').'</em>';
  260. }
  261. $aDisplayData[] = array(
  262. 'class' => MetaModel::GetName($sClass),
  263. 'read' => $this->GetGrantAsHtml($sClass, UR_ACTION_READ),
  264. 'bulkread' => $this->GetGrantAsHtml($sClass, UR_ACTION_BULK_READ),
  265. 'write' => $this->GetGrantAsHtml($sClass, UR_ACTION_MODIFY),
  266. 'bulkwrite' => $this->GetGrantAsHtml($sClass, UR_ACTION_BULK_MODIFY),
  267. 'stimuli' => $sStimuli,
  268. );
  269. }
  270. $oKPI->ComputeAndReport('Computation of user rights');
  271. $aDisplayConfig = array();
  272. $aDisplayConfig['class'] = array('label' => Dict::S('UI:UserManagement:Class'), 'description' => Dict::S('UI:UserManagement:Class+'));
  273. $aDisplayConfig['read'] = array('label' => Dict::S('UI:UserManagement:Action:Read'), 'description' => Dict::S('UI:UserManagement:Action:Read+'));
  274. $aDisplayConfig['bulkread'] = array('label' => Dict::S('UI:UserManagement:Action:BulkRead'), 'description' => Dict::S('UI:UserManagement:Action:BulkRead+'));
  275. $aDisplayConfig['write'] = array('label' => Dict::S('UI:UserManagement:Action:Modify'), 'description' => Dict::S('UI:UserManagement:Action:Modify+'));
  276. $aDisplayConfig['bulkwrite'] = array('label' => Dict::S('UI:UserManagement:Action:BulkModify'), 'description' => Dict::S('UI:UserManagement:Action:BulkModify+'));
  277. $aDisplayConfig['stimuli'] = array('label' => Dict::S('UI:UserManagement:Action:Stimuli'), 'description' => Dict::S('UI:UserManagement:Action:Stimuli+'));
  278. $oPage->table($aDisplayConfig, $aDisplayData);
  279. }
  280. function DisplayBareRelations(WebPage $oPage, $bEditMode = false)
  281. {
  282. parent::DisplayBareRelations($oPage, $bEditMode);
  283. if (!$bEditMode)
  284. {
  285. $oPage->SetCurrentTab(Dict::S('UI:UserManagement:GrantMatrix'));
  286. $this->DoShowGrantSumary($oPage, 'bizmodel');
  287. // debug
  288. if (false)
  289. {
  290. $oPage->SetCurrentTab('More on user rigths (dev only)');
  291. $oPage->add("<h3>User rights</h3>\n");
  292. $this->DoShowGrantSumary($oPage, 'addon/userrights');
  293. $oPage->add("<h3>Change log</h3>\n");
  294. $this->DoShowGrantSumary($oPage, 'core/cmdb');
  295. $oPage->add("<h3>Application</h3>\n");
  296. $this->DoShowGrantSumary($oPage, 'application');
  297. $oPage->add("<h3>GUI</h3>\n");
  298. $this->DoShowGrantSumary($oPage, 'gui');
  299. }
  300. }
  301. }
  302. }
  303. /**
  304. * Abstract class for all types of "internal" authentication i.e. users
  305. * for which the application is supplied a login and a password opposed
  306. * to "external" users for whom the authentication is performed outside
  307. * of the application (by the web server for example).
  308. * Note that "internal" users do not necessary correspond to a local authentication
  309. * they may be authenticated by a remote system, like in authent-ldap.
  310. */
  311. abstract class UserInternal extends User
  312. {
  313. // Nothing special, just a base class to categorize this type of authenticated users
  314. public static function Init()
  315. {
  316. $aParams = array
  317. (
  318. "category" => "core",
  319. "key_type" => "autoincrement",
  320. "name_attcode" => "login",
  321. "state_attcode" => "",
  322. "reconc_keys" => array('login'),
  323. "db_table" => "priv_internaluser",
  324. "db_key_field" => "id",
  325. "db_finalclass_field" => "",
  326. );
  327. MetaModel::Init_Params($aParams);
  328. MetaModel::Init_InheritAttributes();
  329. // When set, this token allows for password reset
  330. MetaModel::Init_AddAttribute(new AttributeString("reset_pwd_token", array("allowed_values"=>null, "sql"=>"reset_pwd_token", "default_value"=>null, "is_null_allowed"=>true, "depends_on"=>array())));
  331. // Display lists
  332. MetaModel::Init_SetZListItems('details', array('contactid', 'first_name', 'email', 'login', 'language', 'profile_list', 'allowed_org_list')); // Attributes to be displayed for the complete details
  333. MetaModel::Init_SetZListItems('list', array('finalclass', 'first_name', 'last_name', 'login')); // Attributes to be displayed for a list
  334. // Search criteria
  335. MetaModel::Init_SetZListItems('standard_search', array('login', 'contactid')); // Criteria of the std search form
  336. MetaModel::Init_SetZListItems('advanced_search', array('login', 'contactid')); // Criteria of the advanced search form
  337. }
  338. /**
  339. * Use with care!
  340. */
  341. public function SetPassword($sNewPassword)
  342. {
  343. }
  344. /**
  345. * The email recipient is the person who is allowed to regain control when the password gets lost
  346. * Throws an exception if the feature cannot be available
  347. */
  348. public function GetResetPasswordEmail()
  349. {
  350. if (!MetaModel::IsValidAttCode(get_class($this), 'contactid'))
  351. {
  352. throw new Exception(Dict::S('UI:ResetPwd-Error-NoContact'));
  353. }
  354. $iContactId = $this->Get('contactid');
  355. if ($iContactId == 0)
  356. {
  357. throw new Exception(Dict::S('UI:ResetPwd-Error-NoContact'));
  358. }
  359. $oContact = MetaModel::GetObject('Contact', $iContactId);
  360. // Determine the email attribute (the first one will be our choice)
  361. foreach (MetaModel::ListAttributeDefs(get_class($oContact)) as $sAttCode => $oAttDef)
  362. {
  363. if ($oAttDef instanceof AttributeEmailAddress)
  364. {
  365. $sEmailAttCode = $sAttCode;
  366. // we've got one, exit the loop
  367. break;
  368. }
  369. }
  370. if (!isset($sEmailAttCode))
  371. {
  372. throw new Exception(Dict::S('UI:ResetPwd-Error-NoEmailAtt'));
  373. }
  374. $sRes = trim($oContact->Get($sEmailAttCode));
  375. return $sRes;
  376. }
  377. }
  378. /**
  379. * Self register extension
  380. *
  381. * @package iTopORM
  382. */
  383. interface iSelfRegister
  384. {
  385. /**
  386. * Called when no user is found in iTop for the corresponding 'name'. This method
  387. * can create/synchronize the User in iTop with an external source (such as AD/LDAP) on the fly
  388. * @param string $sName The typed-in user name
  389. * @param string $sPassword The typed-in password
  390. * @param string $sLoginMode The login method used (cas|form|basic|url)
  391. * @param string $sAuthentication The authentication method used (any|internal|external)
  392. * @return bool true if the user is a valid one, false otherwise
  393. */
  394. public static function CheckCredentialsAndCreateUser($sName, $sPassword, $sLoginMode, $sAuthentication);
  395. /**
  396. * Called after the user has been authenticated and found in iTop. This method can
  397. * Update the user's definition on the fly (profiles...) to keep it in sync with an external source
  398. * @param User $oUser The user to update/synchronize
  399. * @param string $sLoginMode The login mode used (cas|form|basic|url)
  400. * @param string $sAuthentication The authentication method used
  401. * @return void
  402. */
  403. public static function UpdateUser(User $oUser, $sLoginMode, $sAuthentication);
  404. }
  405. /**
  406. * User management core API
  407. *
  408. * @package iTopORM
  409. */
  410. class UserRights
  411. {
  412. protected static $m_oAddOn;
  413. protected static $m_oUser;
  414. protected static $m_oRealUser;
  415. protected static $m_sSelfRegisterAddOn = null;
  416. public static function SelectModule($sModuleName)
  417. {
  418. if (!class_exists($sModuleName))
  419. {
  420. throw new CoreException("Could not select this module, '$sModuleName' in not a valid class name");
  421. return;
  422. }
  423. if (!is_subclass_of($sModuleName, 'UserRightsAddOnAPI'))
  424. {
  425. throw new CoreException("Could not select this module, the class '$sModuleName' is not derived from UserRightsAddOnAPI");
  426. return;
  427. }
  428. self::$m_oAddOn = new $sModuleName;
  429. self::$m_oAddOn->Init();
  430. self::$m_oUser = null;
  431. self::$m_oRealUser = null;
  432. }
  433. public static function SelectSelfRegister($sModuleName)
  434. {
  435. if (!class_exists($sModuleName))
  436. {
  437. throw new CoreException("Could not select the class, '$sModuleName' for self register, is not a valid class name");
  438. }
  439. self::$m_sSelfRegisterAddOn = $sModuleName;
  440. }
  441. public static function GetModuleInstance()
  442. {
  443. return self::$m_oAddOn;
  444. }
  445. // Installation: create the very first user
  446. public static function CreateAdministrator($sAdminUser, $sAdminPwd, $sLanguage = 'EN US')
  447. {
  448. $bRes = self::$m_oAddOn->CreateAdministrator($sAdminUser, $sAdminPwd, $sLanguage);
  449. self::FlushPrivileges(true /* reset admin cache */);
  450. return $bRes;
  451. }
  452. protected static function IsLoggedIn()
  453. {
  454. if (self::$m_oUser == null)
  455. {
  456. return false;
  457. }
  458. else
  459. {
  460. return true;
  461. }
  462. }
  463. public static function Login($sName, $sAuthentication = 'any')
  464. {
  465. $oUser = self::FindUser($sName, $sAuthentication);
  466. if (is_null($oUser))
  467. {
  468. return false;
  469. }
  470. self::$m_oUser = $oUser;
  471. Dict::SetUserLanguage(self::GetUserLanguage());
  472. return true;
  473. }
  474. public static function CheckCredentials($sName, $sPassword, $sLoginMode = 'form', $sAuthentication = 'any')
  475. {
  476. $oUser = self::FindUser($sName, $sAuthentication);
  477. if (is_null($oUser))
  478. {
  479. return self::CheckCredentialsAndCreateUser($sName, $sPassword, $sLoginMode, $sAuthentication);
  480. }
  481. if (!$oUser->CheckCredentials($sPassword))
  482. {
  483. return false;
  484. }
  485. self::UpdateUser($oUser, $sLoginMode, $sAuthentication);
  486. return true;
  487. }
  488. public static function CheckCredentialsAndCreateUser($sName, $sPassword, $sLoginMode, $sAuthentication)
  489. {
  490. if (self::$m_sSelfRegisterAddOn != null)
  491. {
  492. return call_user_func(array(self::$m_sSelfRegisterAddOn, 'CheckCredentialsAndCreateUser'), $sName, $sPassword, $sLoginMode, $sAuthentication);
  493. }
  494. }
  495. public static function UpdateUser($oUser, $sLoginMode, $sAuthentication)
  496. {
  497. if (self::$m_sSelfRegisterAddOn != null)
  498. {
  499. call_user_func(array(self::$m_sSelfRegisterAddOn, 'UpdateUser'), $oUser, $sLoginMode, $sAuthentication);
  500. }
  501. }
  502. public static function TrustWebServerContext()
  503. {
  504. if (!is_null(self::$m_oUser))
  505. {
  506. return self::$m_oUser->TrustWebServerContext();
  507. }
  508. else
  509. {
  510. return false;
  511. }
  512. }
  513. public static function CanChangePassword()
  514. {
  515. if (MetaModel::DBIsReadOnly())
  516. {
  517. return false;
  518. }
  519. if (!is_null(self::$m_oUser))
  520. {
  521. return self::$m_oUser->CanChangePassword();
  522. }
  523. else
  524. {
  525. return false;
  526. }
  527. }
  528. public static function ChangePassword($sOldPassword, $sNewPassword, $sName = '')
  529. {
  530. if (empty($sName))
  531. {
  532. $oUser = self::$m_oUser;
  533. }
  534. else
  535. {
  536. // find the id out of the login string
  537. $oUser = self::FindUser($sName);
  538. }
  539. if (is_null($oUser))
  540. {
  541. return false;
  542. }
  543. else
  544. {
  545. return $oUser->ChangePassword($sOldPassword, $sNewPassword);
  546. }
  547. }
  548. public static function Impersonate($sName, $sPassword)
  549. {
  550. if (!self::CheckLogin()) return false;
  551. $oUser = self::FindUser($sName);
  552. if (is_null($oUser))
  553. {
  554. return false;
  555. }
  556. if (!$oUser->CheckCredentials($sPassword))
  557. {
  558. return false;
  559. }
  560. self::$m_oRealUser = self::$m_oUser;
  561. self::$m_oUser = $oUser;
  562. Dict::SetUserLanguage(self::GetUserLanguage());
  563. return true;
  564. }
  565. public static function GetUser()
  566. {
  567. if (is_null(self::$m_oUser))
  568. {
  569. return '';
  570. }
  571. else
  572. {
  573. return self::$m_oUser->Get('login');
  574. }
  575. }
  576. public static function GetUserObject()
  577. {
  578. if (is_null(self::$m_oUser))
  579. {
  580. return null;
  581. }
  582. else
  583. {
  584. return self::$m_oUser;
  585. }
  586. }
  587. public static function GetUserLanguage()
  588. {
  589. if (is_null(self::$m_oUser))
  590. {
  591. return 'EN US';
  592. }
  593. else
  594. {
  595. return self::$m_oUser->Get('language');
  596. }
  597. }
  598. public static function GetUserId($sName = '')
  599. {
  600. if (empty($sName))
  601. {
  602. // return current user id
  603. if (is_null(self::$m_oUser))
  604. {
  605. return null;
  606. }
  607. return self::$m_oUser->GetKey();
  608. }
  609. else
  610. {
  611. // find the id out of the login string
  612. $oUser = self::$m_oAddOn->FindUser($sName);
  613. if (is_null($oUser))
  614. {
  615. return null;
  616. }
  617. return $oUser->GetKey();
  618. }
  619. }
  620. public static function GetContactId($sName = '')
  621. {
  622. if (empty($sName))
  623. {
  624. $oUser = self::$m_oUser;
  625. }
  626. else
  627. {
  628. $oUser = FindUser($sName);
  629. }
  630. if (is_null($oUser))
  631. {
  632. return '';
  633. }
  634. if (!MetaModel::IsValidAttCode(get_class($oUser), 'contactid'))
  635. {
  636. return '';
  637. }
  638. return $oUser->Get('contactid');
  639. }
  640. // Render the user name in best effort mode
  641. public static function GetUserFriendlyName($sName = '')
  642. {
  643. if (empty($sName))
  644. {
  645. $oUser = self::$m_oUser;
  646. }
  647. else
  648. {
  649. $oUser = FindUser($sName);
  650. }
  651. if (is_null($oUser))
  652. {
  653. return '';
  654. }
  655. return $oUser->GetFriendlyName();
  656. }
  657. public static function IsImpersonated()
  658. {
  659. if (is_null(self::$m_oRealUser))
  660. {
  661. return false;
  662. }
  663. return true;
  664. }
  665. public static function GetRealUser()
  666. {
  667. if (is_null(self::$m_oRealUser))
  668. {
  669. return '';
  670. }
  671. return self::$m_oRealUser->Get('login');
  672. }
  673. public static function GetRealUserId()
  674. {
  675. if (is_null(self::$m_oRealUser))
  676. {
  677. return '';
  678. }
  679. return self::$m_oRealUser->GetKey();
  680. }
  681. public static function GetRealUserFriendlyName()
  682. {
  683. if (is_null(self::$m_oRealUser))
  684. {
  685. return '';
  686. }
  687. return self::$m_oRealUser->GetFriendlyName();
  688. }
  689. protected static function CheckLogin()
  690. {
  691. if (!self::IsLoggedIn())
  692. {
  693. //throw new UserRightException('No user logged in', array());
  694. return false;
  695. }
  696. return true;
  697. }
  698. public static function GetSelectFilter($sClass, $aSettings = array())
  699. {
  700. // When initializing, we need to let everything pass trough
  701. if (!self::CheckLogin()) return true;
  702. if (self::IsAdministrator()) return true;
  703. if (MetaModel::HasCategory($sClass, 'bizmodel'))
  704. {
  705. return self::$m_oAddOn->GetSelectFilter(self::$m_oUser, $sClass, $aSettings);
  706. }
  707. else
  708. {
  709. return true;
  710. }
  711. }
  712. public static function IsActionAllowed($sClass, $iActionCode, /*dbObjectSet*/ $oInstanceSet = null, $oUser = null)
  713. {
  714. // When initializing, we need to let everything pass trough
  715. if (!self::CheckLogin()) return true;
  716. if (MetaModel::DBIsReadOnly())
  717. {
  718. if ($iActionCode == UR_ACTION_CREATE) return false;
  719. if ($iActionCode == UR_ACTION_MODIFY) return false;
  720. if ($iActionCode == UR_ACTION_BULK_MODIFY) return false;
  721. if ($iActionCode == UR_ACTION_DELETE) return false;
  722. if ($iActionCode == UR_ACTION_BULK_DELETE) return false;
  723. }
  724. $aPredefinedObjects = call_user_func(array($sClass, 'GetPredefinedObjects'));
  725. if ($aPredefinedObjects != null)
  726. {
  727. // As opposed to the read-only DB, modifying an object is allowed
  728. // (the constant columns will be marked as read-only)
  729. //
  730. if ($iActionCode == UR_ACTION_CREATE) return false;
  731. if ($iActionCode == UR_ACTION_DELETE) return false;
  732. if ($iActionCode == UR_ACTION_BULK_DELETE) return false;
  733. }
  734. if (self::IsAdministrator($oUser)) return true;
  735. if (MetaModel::HasCategory($sClass, 'bizmodel'))
  736. {
  737. if (is_null($oUser))
  738. {
  739. $oUser = self::$m_oUser;
  740. }
  741. if ($iActionCode == UR_ACTION_CREATE)
  742. {
  743. // The addons currently DO NOT handle the case "CREATE"
  744. // Therefore it is considered to be equivalent to "MODIFY"
  745. $iActionCode = UR_ACTION_MODIFY;
  746. }
  747. return self::$m_oAddOn->IsActionAllowed($oUser, $sClass, $iActionCode, $oInstanceSet);
  748. }
  749. elseif(($iActionCode == UR_ACTION_READ) && MetaModel::HasCategory($sClass, 'view_in_gui'))
  750. {
  751. return true;
  752. }
  753. else
  754. {
  755. // Other classes could be edited/listed by the administrators
  756. return false;
  757. }
  758. }
  759. public static function IsStimulusAllowed($sClass, $sStimulusCode, /*dbObjectSet*/ $oInstanceSet = null, $oUser = null)
  760. {
  761. // When initializing, we need to let everything pass trough
  762. if (!self::CheckLogin()) return true;
  763. if (MetaModel::DBIsReadOnly())
  764. {
  765. return false;
  766. }
  767. if (self::IsAdministrator($oUser)) return true;
  768. if (MetaModel::HasCategory($sClass, 'bizmodel'))
  769. {
  770. if (is_null($oUser))
  771. {
  772. $oUser = self::$m_oUser;
  773. }
  774. return self::$m_oAddOn->IsStimulusAllowed($oUser, $sClass, $sStimulusCode, $oInstanceSet);
  775. }
  776. else
  777. {
  778. // Other classes could be edited/listed by the administrators
  779. return false;
  780. }
  781. }
  782. public static function IsActionAllowedOnAttribute($sClass, $sAttCode, $iActionCode, /*dbObjectSet*/ $oInstanceSet = null, $oUser = null)
  783. {
  784. // When initializing, we need to let everything pass trough
  785. if (!self::CheckLogin()) return true;
  786. if (MetaModel::DBIsReadOnly())
  787. {
  788. if ($iActionCode == UR_ACTION_MODIFY) return false;
  789. if ($iActionCode == UR_ACTION_DELETE) return false;
  790. if ($iActionCode == UR_ACTION_BULK_MODIFY) return false;
  791. if ($iActionCode == UR_ACTION_BULK_DELETE) return false;
  792. }
  793. if (self::IsAdministrator($oUser)) return true;
  794. // this module is forbidden for non admins
  795. if (MetaModel::HasCategory($sClass, 'addon/userrights')) return false;
  796. // the rest is allowed (#@# to be improved)
  797. if (!MetaModel::HasCategory($sClass, 'bizmodel')) return true;
  798. if (is_null($oUser))
  799. {
  800. $oUser = self::$m_oUser;
  801. }
  802. return self::$m_oAddOn->IsActionAllowedOnAttribute($oUser, $sClass, $sAttCode, $iActionCode, $oInstanceSet);
  803. }
  804. static $m_aAdmins = array();
  805. public static function IsAdministrator($oUser = null)
  806. {
  807. if (!self::CheckLogin()) return false;
  808. if (is_null($oUser))
  809. {
  810. $oUser = self::$m_oUser;
  811. }
  812. $iUser = $oUser->GetKey();
  813. if (!isset(self::$m_aAdmins[$iUser]))
  814. {
  815. self::$m_aAdmins[$iUser] = self::$m_oAddOn->IsAdministrator($oUser);
  816. }
  817. return self::$m_aAdmins[$iUser];
  818. }
  819. static $m_aPortalUsers = array();
  820. public static function IsPortalUser($oUser = null)
  821. {
  822. if (!self::CheckLogin()) return false;
  823. if (is_null($oUser))
  824. {
  825. $oUser = self::$m_oUser;
  826. }
  827. $iUser = $oUser->GetKey();
  828. if (!isset(self::$m_aPortalUsers[$iUser]))
  829. {
  830. self::$m_aPortalUsers[$iUser] = self::$m_oAddOn->IsPortalUser($oUser);
  831. }
  832. return self::$m_aPortalUsers[$iUser];
  833. }
  834. /**
  835. * Reset cached data
  836. * @param Bool Reset admin cache as well
  837. * @return void
  838. */
  839. // Reset cached data
  840. //
  841. public static function FlushPrivileges($bResetAdminCache = false)
  842. {
  843. if ($bResetAdminCache)
  844. {
  845. self::$m_aAdmins = array();
  846. }
  847. return self::$m_oAddOn->FlushPrivileges();
  848. }
  849. static $m_aCacheUsers;
  850. /**
  851. * Find a user based on its login and its type of authentication
  852. * @param string $sLogin Login/identifier of the user
  853. * @param string $sAuthentication Type of authentication used: internal|external|any
  854. * @return User The found user or null
  855. */
  856. protected static function FindUser($sLogin, $sAuthentication = 'any')
  857. {
  858. if ($sAuthentication == 'any')
  859. {
  860. $oUser = self::FindUser($sLogin, 'internal');
  861. if ($oUser == null)
  862. {
  863. $oUser = self::FindUser($sLogin, 'external');
  864. }
  865. }
  866. else
  867. {
  868. if (!isset(self::$m_aCacheUsers))
  869. {
  870. self::$m_aCacheUsers = array('internal' => array(), 'external' => array());
  871. }
  872. if (!isset(self::$m_aCacheUsers[$sAuthentication][$sLogin]))
  873. {
  874. switch($sAuthentication)
  875. {
  876. case 'external':
  877. $sBaseClass = 'UserExternal';
  878. break;
  879. case 'internal':
  880. $sBaseClass = 'UserInternal';
  881. break;
  882. default:
  883. echo "<p>sAuthentication = $sAuthentication</p>\n";
  884. assert(false); // should never happen
  885. }
  886. $oSearch = DBObjectSearch::FromOQL("SELECT $sBaseClass WHERE login = :login");
  887. $oSet = new DBObjectSet($oSearch, array(), array('login' => $sLogin));
  888. $oUser = $oSet->fetch();
  889. self::$m_aCacheUsers[$sAuthentication][$sLogin] = $oUser;
  890. }
  891. $oUser = self::$m_aCacheUsers[$sAuthentication][$sLogin];
  892. }
  893. return $oUser;
  894. }
  895. public static function MakeSelectFilter($sClass, $aAllowedOrgs, $aSettings = array(), $sAttCode = null)
  896. {
  897. return self::$m_oAddOn->MakeSelectFilter($sClass, $aAllowedOrgs, $aSettings, $sAttCode);
  898. }
  899. }
  900. /**
  901. * Helper class to get the number/list of items for which a given action is allowed/possible
  902. */
  903. class ActionChecker
  904. {
  905. var $oFilter;
  906. var $iActionCode;
  907. var $iAllowedCount = null;
  908. var $aAllowedIDs = null;
  909. public function __construct(DBObjectSearch $oFilter, $iActionCode)
  910. {
  911. $this->oFilter = $oFilter;
  912. $this->iActionCode = $iActionCode;
  913. $this->iAllowedCount = null;
  914. $this->aAllowedIDs = null;
  915. }
  916. /**
  917. * returns the number of objects for which the action is allowed
  918. * @return integer The number of "allowed" objects 0..N
  919. */
  920. public function GetAllowedCount()
  921. {
  922. if ($this->iAllowedCount == null) $this->CheckObjects();
  923. return $this->iAllowedCount;
  924. }
  925. /**
  926. * If IsAllowed returned UR_ALLOWED_DEPENDS, this methods returns
  927. * an array of ObjKey => Status (true|false)
  928. * @return array
  929. */
  930. public function GetAllowedIDs()
  931. {
  932. if ($this->aAllowedIDs == null) $this->IsAllowed();
  933. return $this->aAllowedIDs;
  934. }
  935. /**
  936. * Check if the speficied stimulus is allowed for the set of objects
  937. * @return UR_ALLOWED_YES, UR_ALLOWED_NO or UR_ALLOWED_DEPENDS
  938. */
  939. public function IsAllowed()
  940. {
  941. $sClass = $this->oFilter->GetClass();
  942. $oSet = new DBObjectSet($this->oFilter);
  943. $iActionAllowed = UserRights::IsActionAllowed($sClass, $this->iActionCode, $oSet);
  944. if ($iActionAllowed == UR_ALLOWED_DEPENDS)
  945. {
  946. // Check for each object if the action is allowed or not
  947. $this->aAllowedIDs = array();
  948. $oSet->Rewind();
  949. $this->iAllowedCount = 0;
  950. while($oObj = $oSet->Fetch())
  951. {
  952. $oObjSet = DBObjectSet::FromArray($sClass, array($oObj));
  953. if (UserRights::IsActionAllowed($sClass, $this->iActionCode, $oObjSet) == UR_ALLOWED_NO)
  954. {
  955. $this->aAllowedIDs[$oObj->GetKey()] = false;
  956. }
  957. else
  958. {
  959. // Assume UR_ALLOWED_YES, since there is just one object !
  960. $this->aAllowedIDs[$oObj->GetKey()] = true;
  961. $this->iAllowedCount++;
  962. }
  963. }
  964. }
  965. else if ($iActionAllowed == UR_ALLOWED_YES)
  966. {
  967. $this->iAllowedCount = $oSet->Count();
  968. $this->aAllowedIDs = array(); // Optimization: not filled when Ok for all objects
  969. }
  970. else // UR_ALLOWED_NO
  971. {
  972. $this->iAllowedCount = 0;
  973. $this->aAllowedIDs = array();
  974. }
  975. return $iActionAllowed;
  976. }
  977. }
  978. /**
  979. * Helper class to get the number/list of items for which a given stimulus can be applied (allowed & possible)
  980. */
  981. class StimulusChecker extends ActionChecker
  982. {
  983. var $sState = null;
  984. public function __construct(DBObjectSearch $oFilter, $sState, $iStimulusCode)
  985. {
  986. parent::__construct($oFilter, $iStimulusCode);
  987. $this->sState = $sState;
  988. }
  989. /**
  990. * Check if the speficied stimulus is allowed for the set of objects
  991. * @return UR_ALLOWED_YES, UR_ALLOWED_NO or UR_ALLOWED_DEPENDS
  992. */
  993. public function IsAllowed()
  994. {
  995. $sClass = $this->oFilter->GetClass();
  996. if (MetaModel::IsAbstract($sClass)) return UR_ALLOWED_NO; // Safeguard, not implemented if the base class of the set is abstract !
  997. $oSet = new DBObjectSet($this->oFilter);
  998. $iActionAllowed = UserRights::IsStimulusAllowed($sClass, $this->iActionCode, $oSet);
  999. if ($iActionAllowed == UR_ALLOWED_NO)
  1000. {
  1001. $this->iAllowedCount = 0;
  1002. $this->aAllowedIDs = array();
  1003. }
  1004. else // Even if UR_ALLOWED_YES, we need to check if each object is in the appropriate state
  1005. {
  1006. // Hmmm, may not be needed right now because we limit the "multiple" action to object in
  1007. // the same state... may be useful later on if we want to extend this behavior...
  1008. // Check for each object if the action is allowed or not
  1009. $this->aAllowedIDs = array();
  1010. $oSet->Rewind();
  1011. $iAllowedCount = 0;
  1012. $iActionAllowed = UR_ALLOWED_DEPENDS;
  1013. while($oObj = $oSet->Fetch())
  1014. {
  1015. $aTransitions = $oObj->EnumTransitions();
  1016. if (array_key_exists($this->iActionCode, $aTransitions))
  1017. {
  1018. // Temporary optimization possible: since the current implementation
  1019. // of IsActionAllowed does not perform a 'per instance' check, we could
  1020. // skip this second validation phase and assume it would return UR_ALLOWED_YES
  1021. $oObjSet = DBObjectSet::FromArray($sClass, array($oObj));
  1022. if (!UserRights::IsStimulusAllowed($sClass, $this->iActionCode, $oObjSet))
  1023. {
  1024. $this->aAllowedIDs[$oObj->GetKey()] = false;
  1025. }
  1026. else
  1027. {
  1028. // Assume UR_ALLOWED_YES, since there is just one object !
  1029. $this->aAllowedIDs[$oObj->GetKey()] = true;
  1030. $this->iState = $oObj->GetState();
  1031. $this->iAllowedCount++;
  1032. }
  1033. }
  1034. else
  1035. {
  1036. $this->aAllowedIDs[$oObj->GetKey()] = false;
  1037. }
  1038. }
  1039. }
  1040. if ($this->iAllowedCount == $oSet->Count())
  1041. {
  1042. $iActionAllowed = UR_ALLOWED_YES;
  1043. }
  1044. if ($this->iAllowedCount == 0)
  1045. {
  1046. $iActionAllowed = UR_ALLOWED_NO;
  1047. }
  1048. return $iActionAllowed;
  1049. }
  1050. public function GetState()
  1051. {
  1052. return $this->iState;
  1053. }
  1054. }
  1055. /**
  1056. * Self-register extension to allow the automatic creation & update of CAS users
  1057. *
  1058. * @package iTopORM
  1059. *
  1060. */
  1061. class CAS_SelfRegister implements iSelfRegister
  1062. {
  1063. /**
  1064. * Called when no user is found in iTop for the corresponding 'name'. This method
  1065. * can create/synchronize the User in iTop with an external source (such as AD/LDAP) on the fly
  1066. * @param string $sName The CAS authenticated user name
  1067. * @param string $sPassword Ignored
  1068. * @param string $sLoginMode The login mode used (cas|form|basic|url)
  1069. * @param string $sAuthentication The authentication method used
  1070. * @return bool true if the user is a valid one, false otherwise
  1071. */
  1072. public static function CheckCredentialsAndCreateUser($sName, $sPassword, $sLoginMode, $sAuthentication)
  1073. {
  1074. $bOk = true;
  1075. if ($sLoginMode != 'cas') return false; // Must be authenticated via CAS
  1076. $sCASMemberships = MetaModel::GetConfig()->Get('cas_memberof');
  1077. $bFound = false;
  1078. if (!empty($sCASMemberships))
  1079. {
  1080. if (phpCAS::hasAttribute('memberOf'))
  1081. {
  1082. // A list of groups is specified, the user must a be member of (at least) one of them to pass
  1083. $aCASMemberships = array();
  1084. $aTmp = explode(';', $sCASMemberships);
  1085. setlocale(LC_ALL, "en_US.utf8"); // !!! WARNING: this is needed to have the iconv //TRANSLIT working fine below !!!
  1086. foreach($aTmp as $sGroupName)
  1087. {
  1088. $aCASMemberships[] = trim(iconv('UTF-8', 'ASCII//TRANSLIT', $sGroupName)); // Just in case remove accents and spaces...
  1089. }
  1090. $aMemberOf = phpCAS::getAttribute('memberOf');
  1091. if (!is_array($aMemberOf)) $aMemberOf = array($aMemberOf); // Just one entry, turn it into an array
  1092. $aFilteredGroupNames = array();
  1093. foreach($aMemberOf as $sGroupName)
  1094. {
  1095. phpCAS::log("Info: user if a member of the group: ".$sGroupName);
  1096. $sGroupName = trim(iconv('UTF-8', 'ASCII//TRANSLIT', $sGroupName)); // Remove accents and spaces as well
  1097. $aFilteredGroupNames[] = $sGroupName;
  1098. $bIsMember = false;
  1099. foreach($aCASMemberships as $sCASPattern)
  1100. {
  1101. if (self::IsPattern($sCASPattern))
  1102. {
  1103. if (preg_match($sCASPattern, $sGroupName))
  1104. {
  1105. $bIsMember = true;
  1106. break;
  1107. }
  1108. }
  1109. else if ($sPattern == $sGroupName)
  1110. {
  1111. $bIsMember = true;
  1112. break;
  1113. }
  1114. }
  1115. if ($bIsMember)
  1116. {
  1117. $bCASUserSynchro = MetaModel::GetConfig()->Get('cas_user_synchro');
  1118. if ($bCASUserSynchro)
  1119. {
  1120. // If needed create a new user for this email/profile
  1121. phpCAS::log('Info: cas_user_synchro is ON');
  1122. $bOk = self::CreateCASUser(phpCAS::getUser(), $aMemberOf);
  1123. if($bOk)
  1124. {
  1125. $bFound = true;
  1126. }
  1127. else
  1128. {
  1129. phpCAS::log("User ".phpCAS::getUser()." cannot be created in iTop. Logging off...");
  1130. }
  1131. }
  1132. else
  1133. {
  1134. phpCAS::log('Info: cas_user_synchro is OFF');
  1135. $bFound = true;
  1136. }
  1137. break;
  1138. }
  1139. }
  1140. if($bOk && !$bFound)
  1141. {
  1142. phpCAS::log("User ".phpCAS::getUser().", none of his/her groups (".implode('; ', $aFilteredGroupNames).") match any of the required groups: ".implode('; ', $aCASMemberships));
  1143. }
  1144. }
  1145. else
  1146. {
  1147. // Too bad, the user is not part of any of the group => not allowed
  1148. phpCAS::log("No 'memberOf' attribute found for user ".phpCAS::getUser().". Are you using the SAML protocol (S1) ?");
  1149. }
  1150. }
  1151. else
  1152. {
  1153. // No membership required, anybody will pass
  1154. $bFound = true;
  1155. }
  1156. if (!$bFound)
  1157. {
  1158. // The user is not part of the allowed groups, => log out
  1159. $sUrl = utils::GetAbsoluteUrlAppRoot().'pages/UI.php';
  1160. $sCASLogoutUrl = MetaModel::GetConfig()->Get('cas_logout_redirect_service');
  1161. if (empty($sCASLogoutUrl))
  1162. {
  1163. $sCASLogoutUrl = $sUrl;
  1164. }
  1165. phpCAS::logoutWithRedirectService($sCASLogoutUrl); // Redirects to the CAS logout page
  1166. // Will never return !
  1167. }
  1168. return $bFound;
  1169. }
  1170. /**
  1171. * Called after the user has been authenticated and found in iTop. This method can
  1172. * Update the user's definition (profiles...) on the fly to keep it in sync with an external source
  1173. * @param User $oUser The user to update/synchronize
  1174. * @param string $sLoginMode The login mode used (cas|form|basic|url)
  1175. * @param string $sAuthentication The authentication method used
  1176. * @return void
  1177. */
  1178. public static function UpdateUser(User $oUser, $sLoginMode, $sAuthentication)
  1179. {
  1180. $bCASUpdateProfiles = MetaModel::GetConfig()->Get('cas_update_profiles');
  1181. if (($sLoginMode == 'cas') && $bCASUpdateProfiles && (phpCAS::hasAttribute('memberOf')))
  1182. {
  1183. $aMemberOf = phpCAS::getAttribute('memberOf');
  1184. if (!is_array($aMemberOf)) $aMemberOf = array($aMemberOf); // Just one entry, turn it into an array
  1185. return self::SetProfilesFromCAS($oUser, $aMemberOf);
  1186. }
  1187. // No groups defined in CAS or not CAS at all: do nothing...
  1188. return true;
  1189. }
  1190. /**
  1191. * Helper method to create a CAS based user
  1192. * @param string $sEmail
  1193. * @param array $aGroups
  1194. * @return bool true on success, false otherwise
  1195. */
  1196. protected static function CreateCASUser($sEmail, $aGroups)
  1197. {
  1198. if (!MetaModel::IsValidClass('URP_Profiles'))
  1199. {
  1200. phpCAS::log("URP_Profiles is not a valid class. Automatic creation of Users is not supported in this context, sorry.");
  1201. return false;
  1202. }
  1203. $oUser = MetaModel::GetObjectByName('UserExternal', $sEmail, false);
  1204. if ($oUser == null)
  1205. {
  1206. // Create the user, link it to a contact
  1207. phpCAS::log("Info: the user '$sEmail' does not exist. A new UserExternal will be created.");
  1208. $oSearch = new DBObjectSearch('Person');
  1209. $oSearch->AddCondition('email', $sEmail);
  1210. $oSet = new DBObjectSet($oSearch);
  1211. $iContactId = 0;
  1212. switch($oSet->Count())
  1213. {
  1214. case 0:
  1215. phpCAS::log("Error: found no contact with the email: '$sEmail'. Cannot create the user in iTop.");
  1216. return false;
  1217. case 1:
  1218. $oContact = $oSet->Fetch();
  1219. $iContactId = $oContact->GetKey();
  1220. phpCAS::log("Info: Found 1 contact '".$oContact->GetName()."' (id=$iContactId) corresponding to the email '$sEmail'.");
  1221. break;
  1222. default:
  1223. phpCAS::log("Error: ".$oSet->Count()." contacts have the same email: '$sEmail'. Cannot create a user for this email.");
  1224. return false;
  1225. }
  1226. $oUser = new UserExternal();
  1227. $oUser->Set('login', $sEmail);
  1228. $oUser->Set('contactid', $iContactId);
  1229. $oUser->Set('language', MetaModel::GetConfig()->GetDefaultLanguage());
  1230. }
  1231. else
  1232. {
  1233. phpCAS::log("Info: the user '$sEmail' already exists (id=".$oUser->GetKey().").");
  1234. }
  1235. // Now synchronize the profiles
  1236. if (!self::SetProfilesFromCAS($oUser, $aGroups))
  1237. {
  1238. return false;
  1239. }
  1240. else
  1241. {
  1242. if ($oUser->IsNew() || $oUser->IsModified())
  1243. {
  1244. $oMyChange = MetaModel::NewObject("CMDBChange");
  1245. $oMyChange->Set("date", time());
  1246. $oMyChange->Set("userinfo", 'CAS/LDAP Synchro');
  1247. $oMyChange->DBInsert();
  1248. if ($oUser->IsNew())
  1249. {
  1250. $oUser->DBInsertTracked($oMyChange);
  1251. }
  1252. else
  1253. {
  1254. $oUser->DBUpdateTracked($oMyChange);
  1255. }
  1256. }
  1257. return true;
  1258. }
  1259. }
  1260. protected static function SetProfilesFromCAS($oUser, $aGroups)
  1261. {
  1262. if (!MetaModel::IsValidClass('URP_Profiles'))
  1263. {
  1264. phpCAS::log("URP_Profiles is not a valid class. Automatic creation of Users is not supported in this context, sorry.");
  1265. return false;
  1266. }
  1267. // read all the existing profiles
  1268. $oProfilesSearch = new DBObjectSearch('URP_Profiles');
  1269. $oProfilesSet = new DBObjectSet($oProfilesSearch);
  1270. $aAllProfiles = array();
  1271. while($oProfile = $oProfilesSet->Fetch())
  1272. {
  1273. $aAllProfiles[strtolower($oProfile->GetName())] = $oProfile->GetKey();
  1274. }
  1275. // Translate the CAS/LDAP group names into iTop profile names
  1276. $aProfiles = array();
  1277. $sPattern = MetaModel::GetConfig()->Get('cas_profile_pattern');
  1278. foreach($aGroups as $sGroupName)
  1279. {
  1280. if (preg_match($sPattern, $sGroupName, $aMatches))
  1281. {
  1282. if (array_key_exists(strtolower($aMatches[1]), $aAllProfiles))
  1283. {
  1284. $aProfiles[] = $aAllProfiles[strtolower($aMatches[1])];
  1285. phpCAS::log("Info: Adding the profile '{$aMatches[1]}' from CAS.");
  1286. }
  1287. else
  1288. {
  1289. phpCAS::log("Warning: {$aMatches[1]} is not a valid iTop profile (extracted from group name: '$sGroupName'). Ignored.");
  1290. }
  1291. }
  1292. else
  1293. {
  1294. phpCAS::log("Info: The CAS group '$sGroupName' does not seem to match an iTop pattern. Ignored.");
  1295. }
  1296. }
  1297. if (count($aProfiles) == 0)
  1298. {
  1299. phpCAS::log("Info: The user '".$oUser->GetName()."' has no profiles retrieved from CAS. Default profile(s) will be used.");
  1300. // Second attempt: check if there is/are valid default profile(s)
  1301. $sCASDefaultProfiles = MetaModel::GetConfig()->Get('cas_default_profiles');
  1302. $aCASDefaultProfiles = explode(';', $sCASDefaultProfiles);
  1303. foreach($aCASDefaultProfiles as $sDefaultProfileName)
  1304. {
  1305. if (array_key_exists(strtolower($sDefaultProfileName), $aAllProfiles))
  1306. {
  1307. $aProfiles[] = $aAllProfiles[strtolower($sDefaultProfileName)];
  1308. phpCAS::log("Info: Adding the default profile '".$aAllProfiles[strtolower($sDefaultProfileName)]."' from CAS.");
  1309. }
  1310. else
  1311. {
  1312. phpCAS::log("Warning: the default profile {$sDefaultProfileName} is not a valid iTop profile. Ignored.");
  1313. }
  1314. }
  1315. if (count($aProfiles) == 0)
  1316. {
  1317. phpCAS::log("Error: The user '".$oUser->GetName()."' has no profiles in iTop, and therefore cannot be created.");
  1318. return false;
  1319. }
  1320. }
  1321. // Now synchronize the profiles
  1322. $oProfilesSet = DBObjectSet::FromScratch('URP_UserProfile');
  1323. foreach($aProfiles as $iProfileId)
  1324. {
  1325. $oLink = new URP_UserProfile();
  1326. $oLink->Set('profileid', $iProfileId);
  1327. $oLink->Set('reason', 'CAS/LDAP Synchro');
  1328. $oProfilesSet->AddObject($oLink);
  1329. }
  1330. $oUser->Set('profile_list', $oProfilesSet);
  1331. phpCAS::log("Info: the user '".$oUser->GetName()."' (id=".$oUser->GetKey().") now has the following profiles: '".implode("', '", $aProfiles)."'.");
  1332. if ($oUser->IsModified())
  1333. {
  1334. $oMyChange = MetaModel::NewObject("CMDBChange");
  1335. $oMyChange->Set("date", time());
  1336. $oMyChange->Set("userinfo", 'CAS/LDAP Synchro');
  1337. $oMyChange->DBInsert();
  1338. if ($oUser->IsNew())
  1339. {
  1340. $oUser->DBInsertTracked($oMyChange);
  1341. }
  1342. else
  1343. {
  1344. $oUser->DBUpdateTracked($oMyChange);
  1345. }
  1346. }
  1347. return true;
  1348. }
  1349. /**
  1350. * Helper function to check if the supplied string is a litteral string or a regular expression pattern
  1351. * @param string $sCASPattern
  1352. * @return bool True if it's a regular expression pattern, false otherwise
  1353. */
  1354. protected static function IsPattern($sCASPattern)
  1355. {
  1356. if ((substr($sCASPattern, 0, 1) == '/') && (substr($sCASPattern, -1) == '/'))
  1357. {
  1358. // the string is enclosed by slashes, let's assume it's a pattern
  1359. return true;
  1360. }
  1361. else
  1362. {
  1363. return false;
  1364. }
  1365. }
  1366. }
  1367. // By default enable the 'CAS_SelfRegister' defined above
  1368. UserRights::SelectSelfRegister('CAS_SelfRegister');
  1369. ?>