userrightsprofile.class.inc.php 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830
  1. <?php
  2. // Copyright (C) 2010-2013 Combodo SARL
  3. //
  4. // This file is part of iTop.
  5. //
  6. // iTop is free software; you can redistribute it and/or modify
  7. // it under the terms of the GNU Affero General Public License as published by
  8. // the Free Software Foundation, either version 3 of the License, or
  9. // (at your option) any later version.
  10. //
  11. // iTop is distributed in the hope that it will be useful,
  12. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. // GNU Affero General Public License for more details.
  15. //
  16. // You should have received a copy of the GNU Affero General Public License
  17. // along with iTop. If not, see <http://www.gnu.org/licenses/>
  18. /**
  19. * UserRightsProfile
  20. * User management Module, basing the right on profiles and a matrix (similar to UserRightsMatrix, but profiles and other decorations have been added)
  21. *
  22. * @copyright Copyright (C) 2010-2012 Combodo SARL
  23. * @license http://opensource.org/licenses/AGPL-3.0
  24. */
  25. define('ADMIN_PROFILE_NAME', 'Administrator');
  26. define('PORTAL_PROFILE_NAME', 'Portal user');
  27. class UserRightsBaseClassGUI extends cmdbAbstractObject
  28. {
  29. // Whenever something changes, reload the privileges
  30. protected function AfterInsert()
  31. {
  32. UserRights::FlushPrivileges();
  33. }
  34. protected function AfterUpdate()
  35. {
  36. UserRights::FlushPrivileges();
  37. }
  38. protected function AfterDelete()
  39. {
  40. UserRights::FlushPrivileges();
  41. }
  42. }
  43. class URP_Profiles extends UserRightsBaseClassGUI
  44. {
  45. public static function Init()
  46. {
  47. $aParams = array
  48. (
  49. "category" => "addon/userrights",
  50. "key_type" => "autoincrement",
  51. "name_attcode" => "name",
  52. "state_attcode" => "",
  53. "reconc_keys" => array(),
  54. "db_table" => "priv_urp_profiles",
  55. "db_key_field" => "id",
  56. "db_finalclass_field" => "",
  57. "display_template" => "",
  58. );
  59. MetaModel::Init_Params($aParams);
  60. //MetaModel::Init_InheritAttributes();
  61. MetaModel::Init_AddAttribute(new AttributeString("name", array("allowed_values"=>null, "sql"=>"name", "default_value"=>null, "is_null_allowed"=>false, "depends_on"=>array())));
  62. MetaModel::Init_AddAttribute(new AttributeString("description", array("allowed_values"=>null, "sql"=>"description", "default_value"=>null, "is_null_allowed"=>false, "depends_on"=>array())));
  63. MetaModel::Init_AddAttribute(new AttributeLinkedSetIndirect("user_list", array("linked_class"=>"URP_UserProfile", "ext_key_to_me"=>"profileid", "ext_key_to_remote"=>"userid", "allowed_values"=>null, "count_min"=>1, "count_max"=>0, "depends_on"=>array())));
  64. // Display lists
  65. MetaModel::Init_SetZListItems('details', array('name', 'description', 'user_list')); // Attributes to be displayed for the complete details
  66. MetaModel::Init_SetZListItems('list', array('description')); // Attributes to be displayed for a list
  67. // Search criteria
  68. MetaModel::Init_SetZListItems('standard_search', array('name')); // Criteria of the std search form
  69. MetaModel::Init_SetZListItems('advanced_search', array('name')); // Criteria of the advanced search form
  70. }
  71. protected static $m_aCacheProfiles = null;
  72. public static function DoCreateProfile($sName, $sDescription)
  73. {
  74. if (is_null(self::$m_aCacheProfiles))
  75. {
  76. self::$m_aCacheProfiles = array();
  77. $oFilterAll = new DBObjectSearch('URP_Profiles');
  78. $oSet = new DBObjectSet($oFilterAll);
  79. while ($oProfile = $oSet->Fetch())
  80. {
  81. self::$m_aCacheProfiles[$oProfile->Get('name')] = $oProfile->GetKey();
  82. }
  83. }
  84. $sCacheKey = $sName;
  85. if (isset(self::$m_aCacheProfiles[$sCacheKey]))
  86. {
  87. return self::$m_aCacheProfiles[$sCacheKey];
  88. }
  89. $oNewObj = MetaModel::NewObject("URP_Profiles");
  90. $oNewObj->Set('name', $sName);
  91. $oNewObj->Set('description', $sDescription);
  92. $iId = $oNewObj->DBInsertNoReload();
  93. self::$m_aCacheProfiles[$sCacheKey] = $iId;
  94. return $iId;
  95. }
  96. function GetGrantAsHtml($oUserRights, $sClass, $sAction)
  97. {
  98. $bGrant = $oUserRights->GetProfileActionGrant($this->GetKey(), $sClass, $sAction);
  99. if (is_null($bGrant))
  100. {
  101. return '<span style="background-color: #ffdddd;">'.Dict::S('UI:UserManagement:ActionAllowed:No').'</span>';
  102. }
  103. elseif ($bGrant)
  104. {
  105. return '<span style="background-color: #ddffdd;">'.Dict::S('UI:UserManagement:ActionAllowed:Yes').'</span>';
  106. }
  107. else
  108. {
  109. return '<span style="background-color: #ffdddd;">'.Dict::S('UI:UserManagement:ActionAllowed:No').'</span>';
  110. }
  111. }
  112. function DoShowGrantSumary($oPage)
  113. {
  114. if ($this->GetRawName() == "Administrator")
  115. {
  116. // Looks dirty, but ok that's THE ONE
  117. $oPage->p(Dict::S('UI:UserManagement:AdminProfile+'));
  118. return;
  119. }
  120. // Note: for sure, we assume that the instance is derived from UserRightsProfile
  121. $oUserRights = UserRights::GetModuleInstance();
  122. $aDisplayData = array();
  123. foreach (MetaModel::GetClasses('bizmodel') as $sClass)
  124. {
  125. // Skip non instantiable classes
  126. if (MetaModel::IsAbstract($sClass)) continue;
  127. $aStimuli = array();
  128. foreach (MetaModel::EnumStimuli($sClass) as $sStimulusCode => $oStimulus)
  129. {
  130. $bGrant = $oUserRights->GetClassStimulusGrant($this->GetKey(), $sClass, $sStimulusCode);
  131. if ($bGrant === true)
  132. {
  133. $aStimuli[] = '<span title="'.$sStimulusCode.': '.htmlentities($oStimulus->GetDescription(), ENT_QUOTES, 'UTF-8').'">'.htmlentities($oStimulus->GetLabel(), ENT_QUOTES, 'UTF-8').'</span>';
  134. }
  135. }
  136. $sStimuli = implode(', ', $aStimuli);
  137. $aDisplayData[] = array(
  138. 'class' => MetaModel::GetName($sClass),
  139. 'read' => $this->GetGrantAsHtml($oUserRights, $sClass, 'r'),
  140. 'bulkread' => $this->GetGrantAsHtml($oUserRights, $sClass, 'br'),
  141. 'write' => $this->GetGrantAsHtml($oUserRights, $sClass, 'w'),
  142. 'bulkwrite' => $this->GetGrantAsHtml($oUserRights, $sClass, 'bw'),
  143. 'delete' => $this->GetGrantAsHtml($oUserRights, $sClass, 'd'),
  144. 'bulkdelete' => $this->GetGrantAsHtml($oUserRights, $sClass, 'bd'),
  145. 'stimuli' => $sStimuli,
  146. );
  147. }
  148. $aDisplayConfig = array();
  149. $aDisplayConfig['class'] = array('label' => Dict::S('UI:UserManagement:Class'), 'description' => Dict::S('UI:UserManagement:Class+'));
  150. $aDisplayConfig['read'] = array('label' => Dict::S('UI:UserManagement:Action:Read'), 'description' => Dict::S('UI:UserManagement:Action:Read+'));
  151. $aDisplayConfig['bulkread'] = array('label' => Dict::S('UI:UserManagement:Action:BulkRead'), 'description' => Dict::S('UI:UserManagement:Action:BulkRead+'));
  152. $aDisplayConfig['write'] = array('label' => Dict::S('UI:UserManagement:Action:Modify'), 'description' => Dict::S('UI:UserManagement:Action:Modify+'));
  153. $aDisplayConfig['bulkwrite'] = array('label' => Dict::S('UI:UserManagement:Action:BulkModify'), 'description' => Dict::S('UI:UserManagement:Action:BulkModify+'));
  154. $aDisplayConfig['delete'] = array('label' => Dict::S('UI:UserManagement:Action:Delete'), 'description' => Dict::S('UI:UserManagement:Action:Delete+'));
  155. $aDisplayConfig['bulkdelete'] = array('label' => Dict::S('UI:UserManagement:Action:BulkDelete'), 'description' => Dict::S('UI:UserManagement:Action:BulkDelete+'));
  156. $aDisplayConfig['stimuli'] = array('label' => Dict::S('UI:UserManagement:Action:Stimuli'), 'description' => Dict::S('UI:UserManagement:Action:Stimuli+'));
  157. $oPage->table($aDisplayConfig, $aDisplayData);
  158. }
  159. function DisplayBareRelations(WebPage $oPage, $bEditMode = false)
  160. {
  161. parent::DisplayBareRelations($oPage, $bEditMode);
  162. if (!$bEditMode)
  163. {
  164. $oPage->SetCurrentTab(Dict::S('UI:UserManagement:GrantMatrix'));
  165. $this->DoShowGrantSumary($oPage);
  166. }
  167. }
  168. public static function GetReadOnlyAttributes()
  169. {
  170. return array('name', 'description');
  171. }
  172. // returns an array of id => array of column => php value(so-called "real value")
  173. public static function GetPredefinedObjects()
  174. {
  175. return ProfilesConfig::GetProfilesValues();
  176. }
  177. // Before deleting a profile,
  178. // preserve DB integrity by deleting links to users
  179. protected function OnDelete()
  180. {
  181. // Note: this may break the rule that says: "a user must have at least ONE profile" !
  182. $oLnkSet = $this->Get('user_list');
  183. while($oLnk = $oLnkSet->Fetch())
  184. {
  185. $oLnk->DBDelete();
  186. }
  187. }
  188. /**
  189. * Returns the set of flags (OPT_ATT_HIDDEN, OPT_ATT_READONLY, OPT_ATT_MANDATORY...)
  190. * for the given attribute in the current state of the object
  191. * @param $sAttCode string $sAttCode The code of the attribute
  192. * @param $aReasons array To store the reasons why the attribute is read-only (info about the synchro replicas)
  193. * @param $sTargetState string The target state in which to evalutate the flags, if empty the current state will be used
  194. * @return integer Flags: the binary combination of the flags applicable to this attribute
  195. */
  196. public function GetAttributeFlags($sAttCode, &$aReasons = array(), $sTargetState = '')
  197. {
  198. $iFlags = parent::GetAttributeFlags($sAttCode, $aReasons, $sTargetState);
  199. if (MetaModel::GetConfig()->Get('demo_mode'))
  200. {
  201. $aReasons[] = 'Sorry, profiles are read-only in the demonstration mode!';
  202. $iFlags |= OPT_ATT_READONLY;
  203. }
  204. return $iFlags;
  205. }
  206. }
  207. class URP_UserProfile extends UserRightsBaseClassGUI
  208. {
  209. public static function Init()
  210. {
  211. $aParams = array
  212. (
  213. "category" => "addon/userrights",
  214. "key_type" => "autoincrement",
  215. "name_attcode" => "userid",
  216. "state_attcode" => "",
  217. "reconc_keys" => array(),
  218. "db_table" => "priv_urp_userprofile",
  219. "db_key_field" => "id",
  220. "db_finalclass_field" => "",
  221. "display_template" => "",
  222. );
  223. MetaModel::Init_Params($aParams);
  224. //MetaModel::Init_InheritAttributes();
  225. MetaModel::Init_AddAttribute(new AttributeExternalKey("userid", array("targetclass"=>"User", "jointype"=> "", "allowed_values"=>null, "sql"=>"userid", "is_null_allowed"=>false, "on_target_delete"=>DEL_AUTO, "depends_on"=>array())));
  226. MetaModel::Init_AddAttribute(new AttributeExternalField("userlogin", array("allowed_values"=>null, "extkey_attcode"=> 'userid', "target_attcode"=>"login")));
  227. MetaModel::Init_AddAttribute(new AttributeExternalKey("profileid", array("targetclass"=>"URP_Profiles", "jointype"=> "", "allowed_values"=>null, "sql"=>"profileid", "is_null_allowed"=>false, "on_target_delete"=>DEL_AUTO, "depends_on"=>array())));
  228. MetaModel::Init_AddAttribute(new AttributeExternalField("profile", array("allowed_values"=>null, "extkey_attcode"=> 'profileid', "target_attcode"=>"name")));
  229. MetaModel::Init_AddAttribute(new AttributeString("reason", array("allowed_values"=>null, "sql"=>"description", "default_value"=>null, "is_null_allowed"=>true, "depends_on"=>array())));
  230. // Display lists
  231. MetaModel::Init_SetZListItems('details', array('userid', 'profileid', 'reason')); // Attributes to be displayed for the complete details
  232. MetaModel::Init_SetZListItems('list', array('userid', 'profileid', 'reason')); // Attributes to be displayed for a list
  233. // Search criteria
  234. MetaModel::Init_SetZListItems('standard_search', array('userid', 'profileid')); // Criteria of the std search form
  235. MetaModel::Init_SetZListItems('advanced_search', array('userid', 'profileid')); // Criteria of the advanced search form
  236. }
  237. public function GetName()
  238. {
  239. return Dict::Format('UI:UserManagement:LinkBetween_User_And_Profile', $this->Get('userlogin'), $this->Get('profile'));
  240. }
  241. public function CheckToDelete(&$oDeletionPlan)
  242. {
  243. if (MetaModel::GetConfig()->Get('demo_mode'))
  244. {
  245. // Users deletion is NOT allowed in demo mode
  246. $oDeletionPlan->AddToDelete($this, null);
  247. $oDeletionPlan->SetDeletionIssues($this, array('deletion not allowed in demo mode.'), true);
  248. $oDeletionPlan->ComputeResults();
  249. return false;
  250. }
  251. return parent::CheckToDelete($oDeletionPlan);
  252. }
  253. }
  254. class URP_UserOrg extends UserRightsBaseClassGUI
  255. {
  256. public static function Init()
  257. {
  258. $aParams = array
  259. (
  260. "category" => "addon/userrights",
  261. "key_type" => "autoincrement",
  262. "name_attcode" => "userid",
  263. "state_attcode" => "",
  264. "reconc_keys" => array(),
  265. "db_table" => "priv_urp_userorg",
  266. "db_key_field" => "id",
  267. "db_finalclass_field" => "",
  268. "display_template" => "",
  269. );
  270. MetaModel::Init_Params($aParams);
  271. //MetaModel::Init_InheritAttributes();
  272. MetaModel::Init_AddAttribute(new AttributeExternalKey("userid", array("targetclass"=>"User", "jointype"=> "", "allowed_values"=>null, "sql"=>"userid", "is_null_allowed"=>false, "on_target_delete"=>DEL_AUTO, "depends_on"=>array())));
  273. MetaModel::Init_AddAttribute(new AttributeExternalField("userlogin", array("allowed_values"=>null, "extkey_attcode"=> 'userid', "target_attcode"=>"login")));
  274. MetaModel::Init_AddAttribute(new AttributeExternalKey("allowed_org_id", array("targetclass"=>"Organization", "jointype"=> "", "allowed_values"=>null, "sql"=>"allowed_org_id", "is_null_allowed"=>false, "on_target_delete"=>DEL_AUTO, "depends_on"=>array())));
  275. MetaModel::Init_AddAttribute(new AttributeExternalField("allowed_org_name", array("allowed_values"=>null, "extkey_attcode"=> 'allowed_org_id', "target_attcode"=>"name")));
  276. MetaModel::Init_AddAttribute(new AttributeString("reason", array("allowed_values"=>null, "sql"=>"reason", "default_value"=>null, "is_null_allowed"=>true, "depends_on"=>array())));
  277. // Display lists
  278. MetaModel::Init_SetZListItems('details', array('userid', 'allowed_org_id', 'reason')); // Attributes to be displayed for the complete details
  279. MetaModel::Init_SetZListItems('list', array('allowed_org_id', 'reason')); // Attributes to be displayed for a list
  280. // Search criteria
  281. MetaModel::Init_SetZListItems('standard_search', array('userid', 'allowed_org_id')); // Criteria of the std search form
  282. MetaModel::Init_SetZListItems('advanced_search', array('userid', 'allowed_org_id')); // Criteria of the advanced search form
  283. }
  284. public function GetName()
  285. {
  286. return Dict::Format('UI:UserManagement:LinkBetween_User_And_Org', $this->Get('userlogin'), $this->Get('allowed_org_name'));
  287. }
  288. }
  289. class UserRightsProfile extends UserRightsAddOnAPI
  290. {
  291. static public $m_aActionCodes = array(
  292. UR_ACTION_READ => 'r',
  293. UR_ACTION_MODIFY => 'w',
  294. UR_ACTION_DELETE => 'd',
  295. UR_ACTION_BULK_READ => 'br',
  296. UR_ACTION_BULK_MODIFY => 'bw',
  297. UR_ACTION_BULK_DELETE => 'bd',
  298. );
  299. // Installation: create the very first user
  300. public function CreateAdministrator($sAdminUser, $sAdminPwd, $sLanguage = 'EN US')
  301. {
  302. CMDBObject::SetTrackInfo('Initialization');
  303. $oChange = CMDBObject::GetCurrentChange();
  304. $iContactId = 0;
  305. // Support drastic data model changes: no organization class (or not writable)!
  306. if (MetaModel::IsValidClass('Organization') && !MetaModel::IsAbstract('Organization'))
  307. {
  308. $oOrg = new Organization();
  309. $oOrg->Set('name', 'My Company/Department');
  310. $oOrg->Set('code', 'SOMECODE');
  311. $iOrgId = $oOrg->DBInsertTrackedNoReload($oChange, true /* skip security */);
  312. // Support drastic data model changes: no Person class (or not writable)!
  313. if (MetaModel::IsValidClass('Person') && !MetaModel::IsAbstract('Person'))
  314. {
  315. $oContact = new Person();
  316. $oContact->Set('name', 'My last name');
  317. $oContact->Set('first_name', 'My first name');
  318. if (MetaModel::IsValidAttCode('Person', 'org_id'))
  319. {
  320. $oContact->Set('org_id', $iOrgId);
  321. }
  322. if (MetaModel::IsValidAttCode('Person', 'phone'))
  323. {
  324. $oContact->Set('phone', '+00 000 000 000');
  325. }
  326. $oContact->Set('email', 'my.email@foo.org');
  327. $iContactId = $oContact->DBInsertTrackedNoReload($oChange, true /* skip security */);
  328. }
  329. }
  330. $oUser = new UserLocal();
  331. $oUser->Set('login', $sAdminUser);
  332. $oUser->Set('password', $sAdminPwd);
  333. if (MetaModel::IsValidAttCode('UserLocal', 'contactid') && ($iContactId != 0))
  334. {
  335. $oUser->Set('contactid', $iContactId);
  336. }
  337. $oUser->Set('language', $sLanguage); // Language was chosen during the installation
  338. // Add this user to the very specific 'admin' profile
  339. $oAdminProfile = MetaModel::GetObjectFromOQL("SELECT URP_Profiles WHERE name = :name", array('name' => ADMIN_PROFILE_NAME), true /*all data*/);
  340. if (is_object($oAdminProfile))
  341. {
  342. $oUserProfile = new URP_UserProfile();
  343. //$oUserProfile->Set('userid', $iUserId);
  344. $oUserProfile->Set('profileid', $oAdminProfile->GetKey());
  345. $oUserProfile->Set('reason', 'By definition, the administrator must have the administrator profile');
  346. //$oUserProfile->DBInsertTrackedNoReload($oChange, true /* skip security */);
  347. $oSet = DBObjectSet::FromObject($oUserProfile);
  348. $oUser->Set('profile_list', $oSet);
  349. }
  350. $iUserId = $oUser->DBInsertTrackedNoReload($oChange, true /* skip security */);
  351. return true;
  352. }
  353. public function Init()
  354. {
  355. }
  356. protected $m_aAdmins = array(); // id -> bool, true if the user has the well-known admin profile
  357. protected $m_aPortalUsers = array(); // id -> bool, true if the user has the well-known portal user profile
  358. protected $m_aProfiles; // id -> object
  359. protected $m_aUserProfiles = array(); // userid,profileid -> object
  360. protected $m_aUserOrgs = array(); // userid -> array of orgid
  361. // Built on demand, could be optimized if necessary (doing a query for each attribute that needs to be read)
  362. protected $m_aObjectActionGrants = array();
  363. /**
  364. * Read and cache organizations allowed to the given user
  365. *
  366. * @param oUser
  367. * @param sClass -not used here but can be used in overloads
  368. */
  369. protected function GetUserOrgs($oUser, $sClass)
  370. {
  371. $iUser = $oUser->GetKey();
  372. if (!array_key_exists($iUser, $this->m_aUserOrgs))
  373. {
  374. $this->m_aUserOrgs[$iUser] = array();
  375. $sHierarchicalKeyCode = MetaModel::IsHierarchicalClass('Organization');
  376. if ($sHierarchicalKeyCode !== false)
  377. {
  378. $sUserOrgQuery = 'SELECT UserOrg, Org FROM Organization AS Org JOIN Organization AS Root ON Org.'.$sHierarchicalKeyCode.' BELOW Root.id JOIN URP_UserOrg AS UserOrg ON UserOrg.allowed_org_id = Root.id WHERE UserOrg.userid = :userid';
  379. $oUserOrgSet = new DBObjectSet(DBObjectSearch::FromOQL_AllData($sUserOrgQuery), array(), array('userid' => $iUser));
  380. while ($aRow = $oUserOrgSet->FetchAssoc())
  381. {
  382. $oUserOrg = $aRow['UserOrg'];
  383. $oOrg = $aRow['Org'];
  384. $this->m_aUserOrgs[$iUser][] = $oOrg->GetKey();
  385. }
  386. }
  387. else
  388. {
  389. $oSearch = new DBObjectSearch('URP_UserOrg');
  390. $oSearch->AllowAllData();
  391. $oCondition = new BinaryExpression(new FieldExpression('userid'), '=', new VariableExpression('userid'));
  392. $oSearch->AddConditionExpression($oCondition);
  393. $oUserOrgSet = new DBObjectSet($oSearch, array(), array('userid' => $iUser));
  394. while ($oUserOrg = $oUserOrgSet->Fetch())
  395. {
  396. $this->m_aUserOrgs[$iUser][] = $oUserOrg->Get('allowed_org_id');
  397. }
  398. }
  399. }
  400. return $this->m_aUserOrgs[$iUser];
  401. }
  402. /**
  403. * Read and cache profiles of the given user
  404. */
  405. protected function GetUserProfiles($iUser)
  406. {
  407. if (!array_key_exists($iUser, $this->m_aUserProfiles))
  408. {
  409. $oSearch = new DBObjectSearch('URP_UserProfile');
  410. $oSearch->AllowAllData();
  411. $oCondition = new BinaryExpression(new FieldExpression('userid'), '=', new VariableExpression('userid'));
  412. $oSearch->AddConditionExpression($oCondition);
  413. $this->m_aUserProfiles[$iUser] = array();
  414. $oUserProfileSet = new DBObjectSet($oSearch, array(), array('userid' => $iUser));
  415. while ($oUserProfile = $oUserProfileSet->Fetch())
  416. {
  417. $this->m_aUserProfiles[$iUser][$oUserProfile->Get('profileid')] = $oUserProfile;
  418. }
  419. }
  420. return $this->m_aUserProfiles[$iUser];
  421. }
  422. public function ResetCache()
  423. {
  424. // Loaded by Load cache
  425. $this->m_aProfiles = null;
  426. $this->m_aUserProfiles = array();
  427. $this->m_aUserOrgs = array();
  428. $this->m_aAdmins = array();
  429. $this->m_aPortalUsers = array();
  430. // Cache
  431. $this->m_aObjectActionGrants = array();
  432. }
  433. public function LoadCache()
  434. {
  435. if (!is_null($this->m_aProfiles)) return;
  436. // Could be loaded in a shared memory (?)
  437. $oKPI = new ExecutionKPI();
  438. if (self::HasSharing())
  439. {
  440. SharedObject::InitSharedClassProperties();
  441. }
  442. $oProfileSet = new DBObjectSet(DBObjectSearch::FromOQL_AllData("SELECT URP_Profiles"));
  443. $this->m_aProfiles = array();
  444. while ($oProfile = $oProfileSet->Fetch())
  445. {
  446. $this->m_aProfiles[$oProfile->GetKey()] = $oProfile;
  447. }
  448. $oKPI->ComputeAndReport('Load of user management cache (excepted Action Grants)');
  449. /*
  450. echo "<pre>\n";
  451. print_r($this->m_aProfiles);
  452. print_r($this->m_aUserProfiles);
  453. print_r($this->m_aUserOrgs);
  454. echo "</pre>\n";
  455. exit;
  456. */
  457. return true;
  458. }
  459. public function IsAdministrator($oUser)
  460. {
  461. //$this->LoadCache();
  462. $iUser = $oUser->GetKey();
  463. if (!array_key_exists($iUser, $this->m_aAdmins))
  464. {
  465. $bIsAdmin = false;
  466. foreach($this->GetUserProfiles($iUser) as $oUserProfile)
  467. {
  468. if ($oUserProfile->Get('profile') == ADMIN_PROFILE_NAME)
  469. {
  470. $bIsAdmin = true;
  471. break;
  472. }
  473. }
  474. $this->m_aAdmins[$iUser] = $bIsAdmin;
  475. }
  476. return $this->m_aAdmins[$iUser];
  477. }
  478. public function IsPortalUser($oUser)
  479. {
  480. //$this->LoadCache();
  481. $iUser = $oUser->GetKey();
  482. if (!array_key_exists($iUser, $this->m_aPortalUsers))
  483. {
  484. $bIsPortalUser = false;
  485. foreach($this->GetUserProfiles($iUser) as $oUserProfile)
  486. {
  487. if ($oUserProfile->Get('profile') == PORTAL_PROFILE_NAME)
  488. {
  489. $bIsPortalUser = true;
  490. break;
  491. }
  492. }
  493. $this->m_aPortalUsers[$iUser] = $bIsPortalUser;
  494. }
  495. return $this->m_aPortalUsers[$iUser];
  496. }
  497. public function GetSelectFilter($oUser, $sClass, $aSettings = array())
  498. {
  499. $this->LoadCache();
  500. $aObjectPermissions = $this->GetUserActionGrant($oUser, $sClass, UR_ACTION_READ);
  501. if ($aObjectPermissions['permission'] == UR_ALLOWED_NO)
  502. {
  503. return false;
  504. }
  505. // Determine how to position the objects of this class
  506. //
  507. $sAttCode = self::GetOwnerOrganizationAttCode($sClass);
  508. if (is_null($sAttCode))
  509. {
  510. // No filtering for this object
  511. return true;
  512. }
  513. // Position the user
  514. //
  515. $aUserOrgs = $this->GetUserOrgs($oUser, $sClass);
  516. if (count($aUserOrgs) == 0)
  517. {
  518. // No org means 'any org'
  519. return true;
  520. }
  521. return $this->MakeSelectFilter($sClass, $aUserOrgs, $aSettings, $sAttCode);
  522. }
  523. // This verb has been made public to allow the development of an accurate feedback for the current configuration
  524. public function GetProfileActionGrant($iProfile, $sClass, $sAction)
  525. {
  526. // Note: action is forced lowercase to be more flexible (historical bug)
  527. $sAction = strtolower($sAction);
  528. return ProfilesConfig::GetProfileActionGrant($iProfile, $sClass, $sAction);
  529. }
  530. protected function GetUserActionGrant($oUser, $sClass, $iActionCode)
  531. {
  532. $this->LoadCache();
  533. // load and cache permissions for the current user on the given class
  534. //
  535. $iUser = $oUser->GetKey();
  536. $aTest = @$this->m_aObjectActionGrants[$iUser][$sClass][$iActionCode];
  537. if (is_array($aTest)) return $aTest;
  538. $sAction = self::$m_aActionCodes[$iActionCode];
  539. $bStatus = null;
  540. $aAttributes = array();
  541. foreach($this->GetUserProfiles($iUser) as $iProfile => $oProfile)
  542. {
  543. $bGrant = $this->GetProfileActionGrant($iProfile, $sClass, $sAction);
  544. if (!is_null($bGrant))
  545. {
  546. if ($bGrant)
  547. {
  548. if (is_null($bStatus))
  549. {
  550. $bStatus = true;
  551. }
  552. }
  553. else
  554. {
  555. $bStatus = false;
  556. }
  557. }
  558. }
  559. $iPermission = $bStatus ? UR_ALLOWED_YES : UR_ALLOWED_NO;
  560. $aRes = array(
  561. 'permission' => $iPermission,
  562. // 'attributes' => $aAttributes,
  563. );
  564. $this->m_aObjectActionGrants[$iUser][$sClass][$iActionCode] = $aRes;
  565. return $aRes;
  566. }
  567. public function IsActionAllowed($oUser, $sClass, $iActionCode, $oInstanceSet = null)
  568. {
  569. $this->LoadCache();
  570. $aObjectPermissions = $this->GetUserActionGrant($oUser, $sClass, $iActionCode);
  571. $iPermission = $aObjectPermissions['permission'];
  572. // Note: In most cases the object set is ignored because it was interesting to optimize for huge data sets
  573. // and acceptable to consider only the root class of the object set
  574. if ($iPermission != UR_ALLOWED_YES)
  575. {
  576. // It is already NO for everyone... that's the final word!
  577. }
  578. elseif ($iActionCode == UR_ACTION_READ)
  579. {
  580. // We are protected by GetSelectFilter: the object set contains objects allowed or shared for reading
  581. }
  582. elseif ($iActionCode == UR_ACTION_BULK_READ)
  583. {
  584. // We are protected by GetSelectFilter: the object set contains objects allowed or shared for reading
  585. }
  586. elseif ($oInstanceSet)
  587. {
  588. // We are protected by GetSelectFilter: the object set contains objects allowed or shared for reading
  589. // We have to answer NO for objects shared for reading purposes
  590. if (self::HasSharing())
  591. {
  592. $aClassProps = SharedObject::GetSharedClassProperties($sClass);
  593. if ($aClassProps)
  594. {
  595. // This class is shared, GetSelectFilter may allow some objects for read only
  596. // But currently we are checking wether the objects might be written...
  597. // Let's exclude the objects based on the relevant criteria
  598. $sOrgAttCode = self::GetOwnerOrganizationAttCode($sClass);
  599. if (!is_null($sOrgAttCode))
  600. {
  601. $aUserOrgs = $this->GetUserOrgs($oUser, $sClass);
  602. if (!is_null($aUserOrgs) && count($aUserOrgs) > 0)
  603. {
  604. $iCountNO = 0;
  605. $iCountYES = 0;
  606. $oInstanceSet->Rewind();
  607. while($oObject = $oInstanceSet->Fetch())
  608. {
  609. $iOrg = $oObject->Get($sOrgAttCode);
  610. if (in_array($iOrg, $aUserOrgs))
  611. {
  612. $iCountYES++;
  613. }
  614. else
  615. {
  616. $iCountNO++;
  617. }
  618. }
  619. if ($iCountNO == 0)
  620. {
  621. $iPermission = UR_ALLOWED_YES;
  622. }
  623. elseif ($iCountYES == 0)
  624. {
  625. $iPermission = UR_ALLOWED_NO;
  626. }
  627. else
  628. {
  629. $iPermission = UR_ALLOWED_DEPENDS;
  630. }
  631. }
  632. }
  633. }
  634. }
  635. }
  636. return $iPermission;
  637. }
  638. public function IsActionAllowedOnAttribute($oUser, $sClass, $sAttCode, $iActionCode, $oInstanceSet = null)
  639. {
  640. $this->LoadCache();
  641. // Note: The object set is ignored because it was interesting to optimize for huge data sets
  642. // and acceptable to consider only the root class of the object set
  643. $aObjectPermissions = $this->GetUserActionGrant($oUser, $sClass, $iActionCode);
  644. return $aObjectPermissions['permission'];
  645. }
  646. // This verb has been made public to allow the development of an accurate feedback for the current configuration
  647. public function GetClassStimulusGrant($iProfile, $sClass, $sStimulusCode)
  648. {
  649. return ProfilesConfig::GetProfileStimulusGrant($iProfile, $sClass, $sStimulusCode);
  650. }
  651. public function IsStimulusAllowed($oUser, $sClass, $sStimulusCode, $oInstanceSet = null)
  652. {
  653. $this->LoadCache();
  654. // Note: this code is VERY close to the code of IsActionAllowed()
  655. $iUser = $oUser->GetKey();
  656. // Note: The object set is ignored because it was interesting to optimize for huge data sets
  657. // and acceptable to consider only the root class of the object set
  658. $bStatus = null;
  659. foreach($this->GetUserProfiles($iUser) as $iProfile => $oProfile)
  660. {
  661. $bGrant = $this->GetClassStimulusGrant($iProfile, $sClass, $sStimulusCode);
  662. if (!is_null($bGrant))
  663. {
  664. if ($bGrant)
  665. {
  666. if (is_null($bStatus))
  667. {
  668. $bStatus = true;
  669. }
  670. }
  671. else
  672. {
  673. $bStatus = false;
  674. }
  675. }
  676. }
  677. $iPermission = $bStatus ? UR_ALLOWED_YES : UR_ALLOWED_NO;
  678. return $iPermission;
  679. }
  680. public function FlushPrivileges()
  681. {
  682. $this->ResetCache();
  683. }
  684. /**
  685. * Find out which attribute is corresponding the the dimension 'owner org'
  686. * returns null if no such attribute has been found (no filtering should occur)
  687. */
  688. public static function GetOwnerOrganizationAttCode($sClass)
  689. {
  690. $sAttCode = null;
  691. $aCallSpec = array($sClass, 'MapContextParam');
  692. if (($sClass == 'Organization') || is_subclass_of($sClass, 'Organization'))
  693. {
  694. $sAttCode = 'id';
  695. }
  696. elseif (is_callable($aCallSpec))
  697. {
  698. $sAttCode = call_user_func($aCallSpec, 'org_id'); // Returns null when there is no mapping for this parameter
  699. if (!MetaModel::IsValidAttCode($sClass, $sAttCode))
  700. {
  701. // Skip silently. The data model checker will tell you something about this...
  702. $sAttCode = null;
  703. }
  704. }
  705. elseif(MetaModel::IsValidAttCode($sClass, 'org_id'))
  706. {
  707. $sAttCode = 'org_id';
  708. }
  709. return $sAttCode;
  710. }
  711. /**
  712. * Determine wether the objects can be shared by the mean of a class SharedObject
  713. **/
  714. protected static function HasSharing()
  715. {
  716. static $bHasSharing;
  717. if (!isset($bHasSharing))
  718. {
  719. $bHasSharing = class_exists('SharedObject');
  720. }
  721. return $bHasSharing;
  722. }
  723. }
  724. UserRights::SelectModule('UserRightsProfile');
  725. ?>