userrightsprofile.class.inc.php 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817
  1. <?php
  2. // Copyright (C) 2010-2013 Combodo SARL
  3. //
  4. // This file is part of iTop.
  5. //
  6. // iTop is free software; you can redistribute it and/or modify
  7. // it under the terms of the GNU Affero General Public License as published by
  8. // the Free Software Foundation, either version 3 of the License, or
  9. // (at your option) any later version.
  10. //
  11. // iTop is distributed in the hope that it will be useful,
  12. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. // GNU Affero General Public License for more details.
  15. //
  16. // You should have received a copy of the GNU Affero General Public License
  17. // along with iTop. If not, see <http://www.gnu.org/licenses/>
  18. /**
  19. * UserRightsProfile
  20. * User management Module, basing the right on profiles and a matrix (similar to UserRightsMatrix, but profiles and other decorations have been added)
  21. *
  22. * @copyright Copyright (C) 2010-2012 Combodo SARL
  23. * @license http://opensource.org/licenses/AGPL-3.0
  24. */
  25. define('ADMIN_PROFILE_NAME', 'Administrator');
  26. define('PORTAL_PROFILE_NAME', 'Portal user');
  27. class UserRightsBaseClassGUI extends cmdbAbstractObject
  28. {
  29. // Whenever something changes, reload the privileges
  30. protected function AfterInsert()
  31. {
  32. UserRights::FlushPrivileges();
  33. }
  34. protected function AfterUpdate()
  35. {
  36. UserRights::FlushPrivileges();
  37. }
  38. protected function AfterDelete()
  39. {
  40. UserRights::FlushPrivileges();
  41. }
  42. }
  43. class URP_Profiles extends UserRightsBaseClassGUI
  44. {
  45. public static function Init()
  46. {
  47. $aParams = array
  48. (
  49. "category" => "addon/userrights",
  50. "key_type" => "autoincrement",
  51. "name_attcode" => "name",
  52. "state_attcode" => "",
  53. "reconc_keys" => array(),
  54. "db_table" => "priv_urp_profiles",
  55. "db_key_field" => "id",
  56. "db_finalclass_field" => "",
  57. "display_template" => "",
  58. );
  59. MetaModel::Init_Params($aParams);
  60. //MetaModel::Init_InheritAttributes();
  61. MetaModel::Init_AddAttribute(new AttributeString("name", array("allowed_values"=>null, "sql"=>"name", "default_value"=>null, "is_null_allowed"=>false, "depends_on"=>array())));
  62. MetaModel::Init_AddAttribute(new AttributeString("description", array("allowed_values"=>null, "sql"=>"description", "default_value"=>null, "is_null_allowed"=>false, "depends_on"=>array())));
  63. MetaModel::Init_AddAttribute(new AttributeLinkedSetIndirect("user_list", array("linked_class"=>"URP_UserProfile", "ext_key_to_me"=>"profileid", "ext_key_to_remote"=>"userid", "allowed_values"=>null, "count_min"=>1, "count_max"=>0, "depends_on"=>array())));
  64. // Display lists
  65. MetaModel::Init_SetZListItems('details', array('name', 'description', 'user_list')); // Attributes to be displayed for the complete details
  66. MetaModel::Init_SetZListItems('list', array('description')); // Attributes to be displayed for a list
  67. // Search criteria
  68. MetaModel::Init_SetZListItems('standard_search', array('name')); // Criteria of the std search form
  69. MetaModel::Init_SetZListItems('advanced_search', array('name')); // Criteria of the advanced search form
  70. }
  71. protected static $m_aCacheProfiles = null;
  72. public static function DoCreateProfile($sName, $sDescription)
  73. {
  74. if (is_null(self::$m_aCacheProfiles))
  75. {
  76. self::$m_aCacheProfiles = array();
  77. $oFilterAll = new DBObjectSearch('URP_Profiles');
  78. $oSet = new DBObjectSet($oFilterAll);
  79. while ($oProfile = $oSet->Fetch())
  80. {
  81. self::$m_aCacheProfiles[$oProfile->Get('name')] = $oProfile->GetKey();
  82. }
  83. }
  84. $sCacheKey = $sName;
  85. if (isset(self::$m_aCacheProfiles[$sCacheKey]))
  86. {
  87. return self::$m_aCacheProfiles[$sCacheKey];
  88. }
  89. $oNewObj = MetaModel::NewObject("URP_Profiles");
  90. $oNewObj->Set('name', $sName);
  91. $oNewObj->Set('description', $sDescription);
  92. $iId = $oNewObj->DBInsertNoReload();
  93. self::$m_aCacheProfiles[$sCacheKey] = $iId;
  94. return $iId;
  95. }
  96. function GetGrantAsHtml($oUserRights, $sClass, $sAction)
  97. {
  98. $bGrant = $oUserRights->GetProfileActionGrant($this->GetKey(), $sClass, $sAction);
  99. if (is_null($bGrant))
  100. {
  101. return '<span style="background-color: #ffdddd;">'.Dict::S('UI:UserManagement:ActionAllowed:No').'</span>';
  102. }
  103. elseif ($bGrant)
  104. {
  105. return '<span style="background-color: #ddffdd;">'.Dict::S('UI:UserManagement:ActionAllowed:Yes').'</span>';
  106. }
  107. else
  108. {
  109. return '<span style="background-color: #ffdddd;">'.Dict::S('UI:UserManagement:ActionAllowed:No').'</span>';
  110. }
  111. }
  112. function DoShowGrantSumary($oPage)
  113. {
  114. if ($this->GetRawName() == "Administrator")
  115. {
  116. // Looks dirty, but ok that's THE ONE
  117. $oPage->p(Dict::S('UI:UserManagement:AdminProfile+'));
  118. return;
  119. }
  120. // Note: for sure, we assume that the instance is derived from UserRightsProfile
  121. $oUserRights = UserRights::GetModuleInstance();
  122. $aDisplayData = array();
  123. foreach (MetaModel::GetClasses('bizmodel') as $sClass)
  124. {
  125. // Skip non instantiable classes
  126. if (MetaModel::IsAbstract($sClass)) continue;
  127. $aStimuli = array();
  128. foreach (MetaModel::EnumStimuli($sClass) as $sStimulusCode => $oStimulus)
  129. {
  130. $bGrant = $oUserRights->GetClassStimulusGrant($this->GetKey(), $sClass, $sStimulusCode);
  131. if ($bGrant === true)
  132. {
  133. $aStimuli[] = '<span title="'.$sStimulusCode.': '.htmlentities($oStimulus->GetDescription(), ENT_QUOTES, 'UTF-8').'">'.htmlentities($oStimulus->GetLabel(), ENT_QUOTES, 'UTF-8').'</span>';
  134. }
  135. }
  136. $sStimuli = implode(', ', $aStimuli);
  137. $aDisplayData[] = array(
  138. 'class' => MetaModel::GetName($sClass),
  139. 'read' => $this->GetGrantAsHtml($oUserRights, $sClass, 'r'),
  140. 'bulkread' => $this->GetGrantAsHtml($oUserRights, $sClass, 'br'),
  141. 'write' => $this->GetGrantAsHtml($oUserRights, $sClass, 'w'),
  142. 'bulkwrite' => $this->GetGrantAsHtml($oUserRights, $sClass, 'bw'),
  143. 'delete' => $this->GetGrantAsHtml($oUserRights, $sClass, 'd'),
  144. 'bulkdelete' => $this->GetGrantAsHtml($oUserRights, $sClass, 'bd'),
  145. 'stimuli' => $sStimuli,
  146. );
  147. }
  148. $aDisplayConfig = array();
  149. $aDisplayConfig['class'] = array('label' => Dict::S('UI:UserManagement:Class'), 'description' => Dict::S('UI:UserManagement:Class+'));
  150. $aDisplayConfig['read'] = array('label' => Dict::S('UI:UserManagement:Action:Read'), 'description' => Dict::S('UI:UserManagement:Action:Read+'));
  151. $aDisplayConfig['bulkread'] = array('label' => Dict::S('UI:UserManagement:Action:BulkRead'), 'description' => Dict::S('UI:UserManagement:Action:BulkRead+'));
  152. $aDisplayConfig['write'] = array('label' => Dict::S('UI:UserManagement:Action:Modify'), 'description' => Dict::S('UI:UserManagement:Action:Modify+'));
  153. $aDisplayConfig['bulkwrite'] = array('label' => Dict::S('UI:UserManagement:Action:BulkModify'), 'description' => Dict::S('UI:UserManagement:Action:BulkModify+'));
  154. $aDisplayConfig['delete'] = array('label' => Dict::S('UI:UserManagement:Action:Delete'), 'description' => Dict::S('UI:UserManagement:Action:Delete+'));
  155. $aDisplayConfig['bulkdelete'] = array('label' => Dict::S('UI:UserManagement:Action:BulkDelete'), 'description' => Dict::S('UI:UserManagement:Action:BulkDelete+'));
  156. $aDisplayConfig['stimuli'] = array('label' => Dict::S('UI:UserManagement:Action:Stimuli'), 'description' => Dict::S('UI:UserManagement:Action:Stimuli+'));
  157. $oPage->table($aDisplayConfig, $aDisplayData);
  158. }
  159. function DisplayBareRelations(WebPage $oPage, $bEditMode = false)
  160. {
  161. parent::DisplayBareRelations($oPage, $bEditMode);
  162. if (!$bEditMode)
  163. {
  164. $oPage->SetCurrentTab(Dict::S('UI:UserManagement:GrantMatrix'));
  165. $this->DoShowGrantSumary($oPage);
  166. }
  167. }
  168. public static function GetReadOnlyAttributes()
  169. {
  170. return array('name', 'description');
  171. }
  172. // returns an array of id => array of column => php value(so-called "real value")
  173. public static function GetPredefinedObjects()
  174. {
  175. return ProfilesConfig::GetProfilesValues();
  176. }
  177. // Before deleting a profile,
  178. // preserve DB integrity by deleting links to users
  179. protected function OnDelete()
  180. {
  181. // Note: this may break the rule that says: "a user must have at least ONE profile" !
  182. $oLnkSet = $this->Get('user_list');
  183. while($oLnk = $oLnkSet->Fetch())
  184. {
  185. $oLnk->DBDelete();
  186. }
  187. }
  188. /**
  189. * Returns the set of flags (OPT_ATT_HIDDEN, OPT_ATT_READONLY, OPT_ATT_MANDATORY...)
  190. * for the given attribute in the current state of the object
  191. * @param $sAttCode string $sAttCode The code of the attribute
  192. * @param $aReasons array To store the reasons why the attribute is read-only (info about the synchro replicas)
  193. * @param $sTargetState string The target state in which to evalutate the flags, if empty the current state will be used
  194. * @return integer Flags: the binary combination of the flags applicable to this attribute
  195. */
  196. public function GetAttributeFlags($sAttCode, &$aReasons = array(), $sTargetState = '')
  197. {
  198. $iFlags = parent::GetAttributeFlags($sAttCode, $aReasons, $sTargetState);
  199. if (MetaModel::GetConfig()->Get('demo_mode'))
  200. {
  201. $aReasons[] = 'Sorry, profiles are read-only in the demonstration mode!';
  202. $iFlags |= OPT_ATT_READONLY;
  203. }
  204. return $iFlags;
  205. }
  206. }
  207. class URP_UserProfile extends UserRightsBaseClassGUI
  208. {
  209. public static function Init()
  210. {
  211. $aParams = array
  212. (
  213. "category" => "addon/userrights",
  214. "key_type" => "autoincrement",
  215. "name_attcode" => "userid",
  216. "state_attcode" => "",
  217. "reconc_keys" => array(),
  218. "db_table" => "priv_urp_userprofile",
  219. "db_key_field" => "id",
  220. "db_finalclass_field" => "",
  221. "display_template" => "",
  222. );
  223. MetaModel::Init_Params($aParams);
  224. //MetaModel::Init_InheritAttributes();
  225. MetaModel::Init_AddAttribute(new AttributeExternalKey("userid", array("targetclass"=>"User", "jointype"=> "", "allowed_values"=>null, "sql"=>"userid", "is_null_allowed"=>false, "on_target_delete"=>DEL_AUTO, "depends_on"=>array())));
  226. MetaModel::Init_AddAttribute(new AttributeExternalField("userlogin", array("allowed_values"=>null, "extkey_attcode"=> 'userid', "target_attcode"=>"login")));
  227. MetaModel::Init_AddAttribute(new AttributeExternalKey("profileid", array("targetclass"=>"URP_Profiles", "jointype"=> "", "allowed_values"=>null, "sql"=>"profileid", "is_null_allowed"=>false, "on_target_delete"=>DEL_AUTO, "depends_on"=>array())));
  228. MetaModel::Init_AddAttribute(new AttributeExternalField("profile", array("allowed_values"=>null, "extkey_attcode"=> 'profileid', "target_attcode"=>"name")));
  229. MetaModel::Init_AddAttribute(new AttributeString("reason", array("allowed_values"=>null, "sql"=>"description", "default_value"=>null, "is_null_allowed"=>true, "depends_on"=>array())));
  230. // Display lists
  231. MetaModel::Init_SetZListItems('details', array('userid', 'profileid', 'reason')); // Attributes to be displayed for the complete details
  232. MetaModel::Init_SetZListItems('list', array('userid', 'profileid', 'reason')); // Attributes to be displayed for a list
  233. // Search criteria
  234. MetaModel::Init_SetZListItems('standard_search', array('userid', 'profileid')); // Criteria of the std search form
  235. MetaModel::Init_SetZListItems('advanced_search', array('userid', 'profileid')); // Criteria of the advanced search form
  236. }
  237. public function GetName()
  238. {
  239. return Dict::Format('UI:UserManagement:LinkBetween_User_And_Profile', $this->Get('userlogin'), $this->Get('profile'));
  240. }
  241. }
  242. class URP_UserOrg extends UserRightsBaseClassGUI
  243. {
  244. public static function Init()
  245. {
  246. $aParams = array
  247. (
  248. "category" => "addon/userrights",
  249. "key_type" => "autoincrement",
  250. "name_attcode" => "userid",
  251. "state_attcode" => "",
  252. "reconc_keys" => array(),
  253. "db_table" => "priv_urp_userorg",
  254. "db_key_field" => "id",
  255. "db_finalclass_field" => "",
  256. "display_template" => "",
  257. );
  258. MetaModel::Init_Params($aParams);
  259. //MetaModel::Init_InheritAttributes();
  260. MetaModel::Init_AddAttribute(new AttributeExternalKey("userid", array("targetclass"=>"User", "jointype"=> "", "allowed_values"=>null, "sql"=>"userid", "is_null_allowed"=>false, "on_target_delete"=>DEL_AUTO, "depends_on"=>array())));
  261. MetaModel::Init_AddAttribute(new AttributeExternalField("userlogin", array("allowed_values"=>null, "extkey_attcode"=> 'userid', "target_attcode"=>"login")));
  262. MetaModel::Init_AddAttribute(new AttributeExternalKey("allowed_org_id", array("targetclass"=>"Organization", "jointype"=> "", "allowed_values"=>null, "sql"=>"allowed_org_id", "is_null_allowed"=>false, "on_target_delete"=>DEL_AUTO, "depends_on"=>array())));
  263. MetaModel::Init_AddAttribute(new AttributeExternalField("allowed_org_name", array("allowed_values"=>null, "extkey_attcode"=> 'allowed_org_id', "target_attcode"=>"name")));
  264. MetaModel::Init_AddAttribute(new AttributeString("reason", array("allowed_values"=>null, "sql"=>"reason", "default_value"=>null, "is_null_allowed"=>true, "depends_on"=>array())));
  265. // Display lists
  266. MetaModel::Init_SetZListItems('details', array('userid', 'allowed_org_id', 'reason')); // Attributes to be displayed for the complete details
  267. MetaModel::Init_SetZListItems('list', array('allowed_org_id', 'reason')); // Attributes to be displayed for a list
  268. // Search criteria
  269. MetaModel::Init_SetZListItems('standard_search', array('userid', 'allowed_org_id')); // Criteria of the std search form
  270. MetaModel::Init_SetZListItems('advanced_search', array('userid', 'allowed_org_id')); // Criteria of the advanced search form
  271. }
  272. public function GetName()
  273. {
  274. return Dict::Format('UI:UserManagement:LinkBetween_User_And_Org', $this->Get('userlogin'), $this->Get('allowed_org_name'));
  275. }
  276. }
  277. class UserRightsProfile extends UserRightsAddOnAPI
  278. {
  279. static public $m_aActionCodes = array(
  280. UR_ACTION_READ => 'r',
  281. UR_ACTION_MODIFY => 'w',
  282. UR_ACTION_DELETE => 'd',
  283. UR_ACTION_BULK_READ => 'br',
  284. UR_ACTION_BULK_MODIFY => 'bw',
  285. UR_ACTION_BULK_DELETE => 'bd',
  286. );
  287. // Installation: create the very first user
  288. public function CreateAdministrator($sAdminUser, $sAdminPwd, $sLanguage = 'EN US')
  289. {
  290. CMDBObject::SetTrackInfo('Initialization');
  291. $oChange = CMDBObject::GetCurrentChange();
  292. $iContactId = 0;
  293. // Support drastic data model changes: no organization class (or not writable)!
  294. if (MetaModel::IsValidClass('Organization') && !MetaModel::IsAbstract('Organization'))
  295. {
  296. $oOrg = new Organization();
  297. $oOrg->Set('name', 'My Company/Department');
  298. $oOrg->Set('code', 'SOMECODE');
  299. $iOrgId = $oOrg->DBInsertTrackedNoReload($oChange, true /* skip security */);
  300. // Support drastic data model changes: no Person class (or not writable)!
  301. if (MetaModel::IsValidClass('Person') && !MetaModel::IsAbstract('Person'))
  302. {
  303. $oContact = new Person();
  304. $oContact->Set('name', 'My last name');
  305. $oContact->Set('first_name', 'My first name');
  306. if (MetaModel::IsValidAttCode('Person', 'org_id'))
  307. {
  308. $oContact->Set('org_id', $iOrgId);
  309. }
  310. if (MetaModel::IsValidAttCode('Person', 'phone'))
  311. {
  312. $oContact->Set('phone', '+00 000 000 000');
  313. }
  314. $oContact->Set('email', 'my.email@foo.org');
  315. $iContactId = $oContact->DBInsertTrackedNoReload($oChange, true /* skip security */);
  316. }
  317. }
  318. $oUser = new UserLocal();
  319. $oUser->Set('login', $sAdminUser);
  320. $oUser->Set('password', $sAdminPwd);
  321. if (MetaModel::IsValidAttCode('UserLocal', 'contactid') && ($iContactId != 0))
  322. {
  323. $oUser->Set('contactid', $iContactId);
  324. }
  325. $oUser->Set('language', $sLanguage); // Language was chosen during the installation
  326. // Add this user to the very specific 'admin' profile
  327. $oAdminProfile = MetaModel::GetObjectFromOQL("SELECT URP_Profiles WHERE name = :name", array('name' => ADMIN_PROFILE_NAME), true /*all data*/);
  328. if (is_object($oAdminProfile))
  329. {
  330. $oUserProfile = new URP_UserProfile();
  331. //$oUserProfile->Set('userid', $iUserId);
  332. $oUserProfile->Set('profileid', $oAdminProfile->GetKey());
  333. $oUserProfile->Set('reason', 'By definition, the administrator must have the administrator profile');
  334. //$oUserProfile->DBInsertTrackedNoReload($oChange, true /* skip security */);
  335. $oSet = DBObjectSet::FromObject($oUserProfile);
  336. $oUser->Set('profile_list', $oSet);
  337. }
  338. $iUserId = $oUser->DBInsertTrackedNoReload($oChange, true /* skip security */);
  339. return true;
  340. }
  341. public function Init()
  342. {
  343. }
  344. protected $m_aAdmins = array(); // id -> bool, true if the user has the well-known admin profile
  345. protected $m_aPortalUsers = array(); // id -> bool, true if the user has the well-known portal user profile
  346. protected $m_aProfiles; // id -> object
  347. protected $m_aUserProfiles = array(); // userid,profileid -> object
  348. protected $m_aUserOrgs = array(); // userid -> array of orgid
  349. // Built on demand, could be optimized if necessary (doing a query for each attribute that needs to be read)
  350. protected $m_aObjectActionGrants = array();
  351. /**
  352. * Read and cache organizations allowed to the given user
  353. *
  354. * @param oUser
  355. * @param sClass -not used here but can be used in overloads
  356. */
  357. protected function GetUserOrgs($oUser, $sClass)
  358. {
  359. $iUser = $oUser->GetKey();
  360. if (!array_key_exists($iUser, $this->m_aUserOrgs))
  361. {
  362. $this->m_aUserOrgs[$iUser] = array();
  363. $sHierarchicalKeyCode = MetaModel::IsHierarchicalClass('Organization');
  364. if ($sHierarchicalKeyCode !== false)
  365. {
  366. $sUserOrgQuery = 'SELECT UserOrg, Org FROM Organization AS Org JOIN Organization AS Root ON Org.'.$sHierarchicalKeyCode.' BELOW Root.id JOIN URP_UserOrg AS UserOrg ON UserOrg.allowed_org_id = Root.id WHERE UserOrg.userid = :userid';
  367. $oUserOrgSet = new DBObjectSet(DBObjectSearch::FromOQL_AllData($sUserOrgQuery), array(), array('userid' => $iUser));
  368. while ($aRow = $oUserOrgSet->FetchAssoc())
  369. {
  370. $oUserOrg = $aRow['UserOrg'];
  371. $oOrg = $aRow['Org'];
  372. $this->m_aUserOrgs[$iUser][] = $oOrg->GetKey();
  373. }
  374. }
  375. else
  376. {
  377. $oSearch = new DBObjectSearch('URP_UserOrg');
  378. $oSearch->AllowAllData();
  379. $oCondition = new BinaryExpression(new FieldExpression('userid'), '=', new VariableExpression('userid'));
  380. $oSearch->AddConditionExpression($oCondition);
  381. $oUserOrgSet = new DBObjectSet($oSearch, array(), array('userid' => $iUser));
  382. while ($oUserOrg = $oUserOrgSet->Fetch())
  383. {
  384. $this->m_aUserOrgs[$iUser][] = $oUserOrg->Get('allowed_org_id');
  385. }
  386. }
  387. }
  388. return $this->m_aUserOrgs[$iUser];
  389. }
  390. /**
  391. * Read and cache profiles of the given user
  392. */
  393. protected function GetUserProfiles($iUser)
  394. {
  395. if (!array_key_exists($iUser, $this->m_aUserProfiles))
  396. {
  397. $oSearch = new DBObjectSearch('URP_UserProfile');
  398. $oSearch->AllowAllData();
  399. $oCondition = new BinaryExpression(new FieldExpression('userid'), '=', new VariableExpression('userid'));
  400. $oSearch->AddConditionExpression($oCondition);
  401. $this->m_aUserProfiles[$iUser] = array();
  402. $oUserProfileSet = new DBObjectSet($oSearch, array(), array('userid' => $iUser));
  403. while ($oUserProfile = $oUserProfileSet->Fetch())
  404. {
  405. $this->m_aUserProfiles[$iUser][$oUserProfile->Get('profileid')] = $oUserProfile;
  406. }
  407. }
  408. return $this->m_aUserProfiles[$iUser];
  409. }
  410. public function ResetCache()
  411. {
  412. // Loaded by Load cache
  413. $this->m_aProfiles = null;
  414. $this->m_aUserProfiles = array();
  415. $this->m_aUserOrgs = array();
  416. $this->m_aAdmins = array();
  417. $this->m_aPortalUsers = array();
  418. // Cache
  419. $this->m_aObjectActionGrants = array();
  420. }
  421. public function LoadCache()
  422. {
  423. if (!is_null($this->m_aProfiles)) return;
  424. // Could be loaded in a shared memory (?)
  425. $oKPI = new ExecutionKPI();
  426. if (self::HasSharing())
  427. {
  428. SharedObject::InitSharedClassProperties();
  429. }
  430. $oProfileSet = new DBObjectSet(DBObjectSearch::FromOQL_AllData("SELECT URP_Profiles"));
  431. $this->m_aProfiles = array();
  432. while ($oProfile = $oProfileSet->Fetch())
  433. {
  434. $this->m_aProfiles[$oProfile->GetKey()] = $oProfile;
  435. }
  436. $oKPI->ComputeAndReport('Load of user management cache (excepted Action Grants)');
  437. /*
  438. echo "<pre>\n";
  439. print_r($this->m_aProfiles);
  440. print_r($this->m_aUserProfiles);
  441. print_r($this->m_aUserOrgs);
  442. echo "</pre>\n";
  443. exit;
  444. */
  445. return true;
  446. }
  447. public function IsAdministrator($oUser)
  448. {
  449. //$this->LoadCache();
  450. $iUser = $oUser->GetKey();
  451. if (!array_key_exists($iUser, $this->m_aAdmins))
  452. {
  453. $bIsAdmin = false;
  454. foreach($this->GetUserProfiles($iUser) as $oUserProfile)
  455. {
  456. if ($oUserProfile->Get('profile') == ADMIN_PROFILE_NAME)
  457. {
  458. $bIsAdmin = true;
  459. break;
  460. }
  461. }
  462. $this->m_aAdmins[$iUser] = $bIsAdmin;
  463. }
  464. return $this->m_aAdmins[$iUser];
  465. }
  466. public function IsPortalUser($oUser)
  467. {
  468. //$this->LoadCache();
  469. $iUser = $oUser->GetKey();
  470. if (!array_key_exists($iUser, $this->m_aPortalUsers))
  471. {
  472. $bIsPortalUser = false;
  473. foreach($this->GetUserProfiles($iUser) as $oUserProfile)
  474. {
  475. if ($oUserProfile->Get('profile') == PORTAL_PROFILE_NAME)
  476. {
  477. $bIsPortalUser = true;
  478. break;
  479. }
  480. }
  481. $this->m_aPortalUsers[$iUser] = $bIsPortalUser;
  482. }
  483. return $this->m_aPortalUsers[$iUser];
  484. }
  485. public function GetSelectFilter($oUser, $sClass, $aSettings = array())
  486. {
  487. $this->LoadCache();
  488. $aObjectPermissions = $this->GetUserActionGrant($oUser, $sClass, UR_ACTION_READ);
  489. if ($aObjectPermissions['permission'] == UR_ALLOWED_NO)
  490. {
  491. return false;
  492. }
  493. // Determine how to position the objects of this class
  494. //
  495. $sAttCode = self::GetOwnerOrganizationAttCode($sClass);
  496. if (is_null($sAttCode))
  497. {
  498. // No filtering for this object
  499. return true;
  500. }
  501. // Position the user
  502. //
  503. $aUserOrgs = $this->GetUserOrgs($oUser, $sClass);
  504. if (count($aUserOrgs) == 0)
  505. {
  506. // No org means 'any org'
  507. return true;
  508. }
  509. return $this->MakeSelectFilter($sClass, $aUserOrgs, $aSettings, $sAttCode);
  510. }
  511. // This verb has been made public to allow the development of an accurate feedback for the current configuration
  512. public function GetProfileActionGrant($iProfile, $sClass, $sAction)
  513. {
  514. // Note: action is forced lowercase to be more flexible (historical bug)
  515. $sAction = strtolower($sAction);
  516. return ProfilesConfig::GetProfileActionGrant($iProfile, $sClass, $sAction);
  517. }
  518. protected function GetUserActionGrant($oUser, $sClass, $iActionCode)
  519. {
  520. $this->LoadCache();
  521. // load and cache permissions for the current user on the given class
  522. //
  523. $iUser = $oUser->GetKey();
  524. $aTest = @$this->m_aObjectActionGrants[$iUser][$sClass][$iActionCode];
  525. if (is_array($aTest)) return $aTest;
  526. $sAction = self::$m_aActionCodes[$iActionCode];
  527. $bStatus = null;
  528. $aAttributes = array();
  529. foreach($this->GetUserProfiles($iUser) as $iProfile => $oProfile)
  530. {
  531. $bGrant = $this->GetProfileActionGrant($iProfile, $sClass, $sAction);
  532. if (!is_null($bGrant))
  533. {
  534. if ($bGrant)
  535. {
  536. if (is_null($bStatus))
  537. {
  538. $bStatus = true;
  539. }
  540. }
  541. else
  542. {
  543. $bStatus = false;
  544. }
  545. }
  546. }
  547. $iPermission = $bStatus ? UR_ALLOWED_YES : UR_ALLOWED_NO;
  548. $aRes = array(
  549. 'permission' => $iPermission,
  550. // 'attributes' => $aAttributes,
  551. );
  552. $this->m_aObjectActionGrants[$iUser][$sClass][$iActionCode] = $aRes;
  553. return $aRes;
  554. }
  555. public function IsActionAllowed($oUser, $sClass, $iActionCode, $oInstanceSet = null)
  556. {
  557. $this->LoadCache();
  558. $aObjectPermissions = $this->GetUserActionGrant($oUser, $sClass, $iActionCode);
  559. $iPermission = $aObjectPermissions['permission'];
  560. // Note: In most cases the object set is ignored because it was interesting to optimize for huge data sets
  561. // and acceptable to consider only the root class of the object set
  562. if ($iPermission != UR_ALLOWED_YES)
  563. {
  564. // It is already NO for everyone... that's the final word!
  565. }
  566. elseif ($iActionCode == UR_ACTION_READ)
  567. {
  568. // We are protected by GetSelectFilter: the object set contains objects allowed or shared for reading
  569. }
  570. elseif ($iActionCode == UR_ACTION_BULK_READ)
  571. {
  572. // We are protected by GetSelectFilter: the object set contains objects allowed or shared for reading
  573. }
  574. elseif ($oInstanceSet)
  575. {
  576. // We are protected by GetSelectFilter: the object set contains objects allowed or shared for reading
  577. // We have to answer NO for objects shared for reading purposes
  578. if (self::HasSharing())
  579. {
  580. $aClassProps = SharedObject::GetSharedClassProperties($sClass);
  581. if ($aClassProps)
  582. {
  583. // This class is shared, GetSelectFilter may allow some objects for read only
  584. // But currently we are checking wether the objects might be written...
  585. // Let's exclude the objects based on the relevant criteria
  586. $sOrgAttCode = self::GetOwnerOrganizationAttCode($sClass);
  587. if (!is_null($sOrgAttCode))
  588. {
  589. $aUserOrgs = $this->GetUserOrgs($oUser, $sClass);
  590. if (!is_null($aUserOrgs) && count($aUserOrgs) > 0)
  591. {
  592. $iCountNO = 0;
  593. $iCountYES = 0;
  594. $oInstanceSet->Rewind();
  595. while($oObject = $oInstanceSet->Fetch())
  596. {
  597. $iOrg = $oObject->Get($sOrgAttCode);
  598. if (in_array($iOrg, $aUserOrgs))
  599. {
  600. $iCountYES++;
  601. }
  602. else
  603. {
  604. $iCountNO++;
  605. }
  606. }
  607. if ($iCountNO == 0)
  608. {
  609. $iPermission = UR_ALLOWED_YES;
  610. }
  611. elseif ($iCountYES == 0)
  612. {
  613. $iPermission = UR_ALLOWED_NO;
  614. }
  615. else
  616. {
  617. $iPermission = UR_ALLOWED_DEPENDS;
  618. }
  619. }
  620. }
  621. }
  622. }
  623. }
  624. return $iPermission;
  625. }
  626. public function IsActionAllowedOnAttribute($oUser, $sClass, $sAttCode, $iActionCode, $oInstanceSet = null)
  627. {
  628. $this->LoadCache();
  629. // Note: The object set is ignored because it was interesting to optimize for huge data sets
  630. // and acceptable to consider only the root class of the object set
  631. $aObjectPermissions = $this->GetUserActionGrant($oUser, $sClass, $iActionCode);
  632. return $aObjectPermissions['permission'];
  633. }
  634. // This verb has been made public to allow the development of an accurate feedback for the current configuration
  635. public function GetClassStimulusGrant($iProfile, $sClass, $sStimulusCode)
  636. {
  637. return ProfilesConfig::GetProfileStimulusGrant($iProfile, $sClass, $sStimulusCode);
  638. }
  639. public function IsStimulusAllowed($oUser, $sClass, $sStimulusCode, $oInstanceSet = null)
  640. {
  641. $this->LoadCache();
  642. // Note: this code is VERY close to the code of IsActionAllowed()
  643. $iUser = $oUser->GetKey();
  644. // Note: The object set is ignored because it was interesting to optimize for huge data sets
  645. // and acceptable to consider only the root class of the object set
  646. $bStatus = null;
  647. foreach($this->GetUserProfiles($iUser) as $iProfile => $oProfile)
  648. {
  649. $bGrant = $this->GetClassStimulusGrant($iProfile, $sClass, $sStimulusCode);
  650. if (!is_null($bGrant))
  651. {
  652. if ($bGrant)
  653. {
  654. if (is_null($bStatus))
  655. {
  656. $bStatus = true;
  657. }
  658. }
  659. else
  660. {
  661. $bStatus = false;
  662. }
  663. }
  664. }
  665. $iPermission = $bStatus ? UR_ALLOWED_YES : UR_ALLOWED_NO;
  666. return $iPermission;
  667. }
  668. public function FlushPrivileges()
  669. {
  670. $this->ResetCache();
  671. }
  672. /**
  673. * Find out which attribute is corresponding the the dimension 'owner org'
  674. * returns null if no such attribute has been found (no filtering should occur)
  675. */
  676. public static function GetOwnerOrganizationAttCode($sClass)
  677. {
  678. $sAttCode = null;
  679. $aCallSpec = array($sClass, 'MapContextParam');
  680. if (($sClass == 'Organization') || is_subclass_of($sClass, 'Organization'))
  681. {
  682. $sAttCode = 'id';
  683. }
  684. elseif (is_callable($aCallSpec))
  685. {
  686. $sAttCode = call_user_func($aCallSpec, 'org_id'); // Returns null when there is no mapping for this parameter
  687. if (!MetaModel::IsValidAttCode($sClass, $sAttCode))
  688. {
  689. // Skip silently. The data model checker will tell you something about this...
  690. $sAttCode = null;
  691. }
  692. }
  693. elseif(MetaModel::IsValidAttCode($sClass, 'org_id'))
  694. {
  695. $sAttCode = 'org_id';
  696. }
  697. return $sAttCode;
  698. }
  699. /**
  700. * Determine wether the objects can be shared by the mean of a class SharedObject
  701. **/
  702. protected static function HasSharing()
  703. {
  704. static $bHasSharing;
  705. if (!isset($bHasSharing))
  706. {
  707. $bHasSharing = class_exists('SharedObject');
  708. }
  709. return $bHasSharing;
  710. }
  711. }
  712. UserRights::SelectModule('UserRightsProfile');
  713. ?>