adamjakab /
SuiteCRM
This project does not seem to handle request data directly as such no vulnerable execution paths were found.
include, or for example
via PHP's auto-loading mechanism.
These results are based on our legacy PHP analysis, consider migrating to our new PHP analysis engine instead. Learn more
| 1 | <?php |
||
| 2 | 1 | if(!defined('sugarEntry') || !sugarEntry) die('Not A Valid Entry Point'); |
|
| 3 | /********************************************************************************* |
||
| 4 | * SugarCRM Community Edition is a customer relationship management program developed by |
||
| 5 | * SugarCRM, Inc. Copyright (C) 2004-2013 SugarCRM Inc. |
||
| 6 | |||
| 7 | * SuiteCRM is an extension to SugarCRM Community Edition developed by Salesagility Ltd. |
||
| 8 | * Copyright (C) 2011 - 2014 Salesagility Ltd. |
||
| 9 | * |
||
| 10 | * This program is free software; you can redistribute it and/or modify it under |
||
| 11 | * the terms of the GNU Affero General Public License version 3 as published by the |
||
| 12 | * Free Software Foundation with the addition of the following permission added |
||
| 13 | * to Section 15 as permitted in Section 7(a): FOR ANY PART OF THE COVERED WORK |
||
| 14 | * IN WHICH THE COPYRIGHT IS OWNED BY SUGARCRM, SUGARCRM DISCLAIMS THE WARRANTY |
||
| 15 | * OF NON INFRINGEMENT OF THIRD PARTY RIGHTS. |
||
| 16 | * |
||
| 17 | * This program is distributed in the hope that it will be useful, but WITHOUT |
||
| 18 | * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS |
||
| 19 | * FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more |
||
| 20 | * details. |
||
| 21 | * |
||
| 22 | * You should have received a copy of the GNU Affero General Public License along with |
||
| 23 | * this program; if not, see http://www.gnu.org/licenses or write to the Free |
||
| 24 | * Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA |
||
| 25 | * 02110-1301 USA. |
||
| 26 | * |
||
| 27 | * You can contact SugarCRM, Inc. headquarters at 10050 North Wolfe Road, |
||
| 28 | * SW2-130, Cupertino, CA 95014, USA. or at email address [email protected]. |
||
| 29 | * |
||
| 30 | * The interactive user interfaces in modified source and object code versions |
||
| 31 | * of this program must display Appropriate Legal Notices, as required under |
||
| 32 | * Section 5 of the GNU Affero General Public License version 3. |
||
| 33 | * |
||
| 34 | * In accordance with Section 7(b) of the GNU Affero General Public License version 3, |
||
| 35 | * these Appropriate Legal Notices must retain the display of the "Powered by |
||
| 36 | * SugarCRM" logo and "Supercharged by SuiteCRM" logo. If the display of the logos is not |
||
| 37 | * reasonably feasible for technical reasons, the Appropriate Legal Notices must |
||
| 38 | * display the words "Powered by SugarCRM" and "Supercharged by SuiteCRM". |
||
| 39 | ********************************************************************************/ |
||
| 40 | /* BEGIN - SECURITY GROUPS */ |
||
| 41 | 1 | if(file_exists("modules/ACLActions/actiondefs.override.php")){ |
|
| 42 | 1 | require_once("modules/ACLActions/actiondefs.override.php"); |
|
| 43 | } else { |
||
| 44 | require_once('modules/ACLActions/actiondefs.php'); |
||
| 45 | } |
||
| 46 | /* END - SECURITY GROUPS */ |
||
| 47 | class ACLAction extends SugarBean{ |
||
|
0 ignored issues
–
show
Coding Style
introduced
by
Loading history...
|
|||
| 48 | var $module_dir = 'ACLActions'; |
||
| 49 | var $object_name = 'ACLAction'; |
||
| 50 | var $table_name = 'acl_actions'; |
||
| 51 | var $new_schema = true; |
||
| 52 | var $disable_custom_fields = true; |
||
| 53 | |||
| 54 | 97 | public function __construct(){ |
|
| 55 | 97 | parent::__construct(); |
|
| 56 | 97 | } |
|
| 57 | |||
| 58 | /** |
||
| 59 | * @deprecated deprecated since version 7.6, PHP4 Style Constructors are deprecated and will be remove in 7.8, please update your code, use __construct instead |
||
| 60 | */ |
||
| 61 | public function ACLAction(){ |
||
| 62 | $deprecatedMessage = 'PHP4 Style Constructors are deprecated and will be remove in 7.8, please update your code'; |
||
| 63 | if(isset($GLOBALS['log'])) { |
||
| 64 | $GLOBALS['log']->deprecated($deprecatedMessage); |
||
| 65 | } |
||
| 66 | else { |
||
| 67 | trigger_error($deprecatedMessage, E_USER_DEPRECATED); |
||
| 68 | } |
||
| 69 | self::__construct(); |
||
| 70 | } |
||
| 71 | |||
| 72 | |||
| 73 | /** |
||
| 74 | * static addActions($category, $type='module') |
||
| 75 | * Adds all default actions for a category/type |
||
| 76 | * |
||
| 77 | * @param STRING $category - the category (e.g module name - Accounts, Contacts) |
||
| 78 | * @param STRING $type - the type (e.g. 'module', 'field') |
||
| 79 | */ |
||
| 80 | 1 | static function addActions($category, $type='module'){ |
|
| 81 | 1 | global $ACLActions; |
|
| 82 | 1 | $db = DBManagerFactory::getInstance(); |
|
| 83 | 1 | if(isset($ACLActions[$type])){ |
|
| 84 | 1 | foreach($ACLActions[$type]['actions'] as $action_name =>$action_def){ |
|
| 85 | |||
| 86 | 1 | $action = new ACLAction(); |
|
| 87 | 1 | $query = "SELECT * FROM " . $action->table_name . " WHERE name='$action_name' AND category = '$category' AND acltype='$type' AND deleted=0 "; |
|
| 88 | 1 | $result = $db->query($query); |
|
| 89 | //only add if an action with that name and category don't exist |
||
| 90 | 1 | $row=$db->fetchByAssoc($result); |
|
| 91 | 1 | if ($row == null) { |
|
| 92 | 1 | $action->name = $action_name; |
|
| 93 | 1 | $action->category = $category; |
|
| 94 | 1 | $action->aclaccess = $action_def['default']; |
|
| 95 | 1 | $action->acltype = $type; |
|
| 96 | 1 | $action->modified_user_id = 1; |
|
| 97 | 1 | $action->created_by = 1; |
|
| 98 | 1 | $action->save(); |
|
| 99 | |||
| 100 | } |
||
| 101 | } |
||
| 102 | |||
| 103 | }else{ |
||
| 104 | sugar_die("FAILED TO ADD: $category - TYPE $type NOT DEFINED IN modules/ACLActions/actiondefs.php"); |
||
| 105 | } |
||
| 106 | |||
| 107 | 1 | } |
|
| 108 | |||
| 109 | /** |
||
| 110 | * static removeActions($category, $type='module') |
||
| 111 | * Removes all default actions for a category/type |
||
| 112 | * |
||
| 113 | * @param STRING $category - the category (e.g module name - Accounts, Contacts) |
||
| 114 | * @param STRING $type - the type (e.g. 'module', 'field') |
||
| 115 | */ |
||
| 116 | 1 | public static function removeActions($category, $type='module'){ |
|
| 117 | 1 | global $ACLActions; |
|
| 118 | 1 | $db = DBManagerFactory::getInstance(); |
|
| 119 | 1 | if(isset($ACLActions[$type])){ |
|
| 120 | 1 | foreach($ACLActions[$type]['actions'] as $action_name =>$action_def){ |
|
| 121 | |||
| 122 | 1 | $action = new ACLAction(); |
|
| 123 | 1 | $query = "SELECT * FROM " . $action->table_name . " WHERE name='$action_name' AND category = '$category' AND acltype='$type' and deleted=0"; |
|
| 124 | 1 | $result = $db->query($query); |
|
| 125 | //only add if an action with that name and category don't exist |
||
| 126 | 1 | $row=$db->fetchByAssoc($result); |
|
| 127 | 1 | if ($row != null) { |
|
| 128 | 1 | $action->mark_deleted($row['id']); |
|
| 129 | } |
||
| 130 | } |
||
| 131 | }else{ |
||
| 132 | sugar_die("FAILED TO REMOVE: $category : $name - TYPE $type NOT DEFINED IN modules/ACLActions/actiondefs.php"); |
||
| 133 | } |
||
| 134 | 1 | } |
|
| 135 | |||
| 136 | /** |
||
| 137 | * static AccessColor($access) |
||
| 138 | * |
||
| 139 | * returns the color associated with an access level |
||
| 140 | * these colors exist in the definitions in modules/ACLActions/actiondefs.php |
||
| 141 | * @param INT $access - the access level you want the color for |
||
| 142 | * @return the color either name or hex representation or false if the level does not exist |
||
| 143 | */ |
||
| 144 | 1 | protected static function AccessColor($access){ |
|
| 145 | 1 | global $ACLActionAccessLevels; |
|
| 146 | 1 | if(isset($ACLActionAccessLevels[$access])){ |
|
| 147 | |||
| 148 | return $ACLActionAccessLevels[$access]['color']; |
||
| 149 | } |
||
| 150 | 1 | return false; |
|
| 151 | |||
| 152 | } |
||
| 153 | |||
| 154 | /** |
||
| 155 | * static AccessName($access) |
||
| 156 | * |
||
| 157 | * returns the translated name associated with an access level |
||
| 158 | * these label definitions exist in the definitions in modules/ACLActions/actiondefs.php |
||
| 159 | * @param INT $access - the access level you want the color for |
||
| 160 | * @return the translated access level name or false if the level does not exist |
||
| 161 | */ |
||
| 162 | 2 | static function AccessName($access){ |
|
| 163 | 2 | global $ACLActionAccessLevels; |
|
| 164 | 2 | if(isset($ACLActionAccessLevels[$access])){ |
|
| 165 | 2 | return translate($ACLActionAccessLevels[$access]['label'], 'ACLActions'); |
|
| 166 | } |
||
| 167 | 2 | return false; |
|
| 168 | |||
| 169 | } |
||
| 170 | |||
| 171 | /** |
||
| 172 | * static AccessLabel($access) |
||
| 173 | * |
||
| 174 | * returns the label associated with an access level |
||
| 175 | * these label definitions exist in the definitions in modules/ACLActions/actiondefs.php |
||
| 176 | * @param INT $access - the access level you want the color for |
||
| 177 | * @return the access level label or false if the level does not exist |
||
| 178 | */ |
||
| 179 | 1 | protected static function AccessLabel($access){ |
|
| 180 | 1 | global $ACLActionAccessLevels; |
|
| 181 | 1 | if(isset($ACLActionAccessLevels[$access])){ |
|
| 182 | $label=preg_replace('/(LBL_ACCESS_)(.*)/', '$2', $ACLActionAccessLevels[$access]['label']); |
||
| 183 | return strtolower($label); |
||
| 184 | |||
| 185 | } |
||
| 186 | 1 | return false; |
|
| 187 | |||
| 188 | } |
||
| 189 | |||
| 190 | /** |
||
| 191 | * static getAccessOptions() |
||
| 192 | * this is used for building select boxes |
||
| 193 | * @return array containg access levels (ints) as keys and access names as values |
||
| 194 | */ |
||
| 195 | 1 | protected static function getAccessOptions( $action, $type='module'){ |
|
| 196 | 1 | global $ACLActions; |
|
| 197 | 1 | $options = array(); |
|
| 198 | |||
| 199 | 1 | if(empty($ACLActions[$type]['actions'][$action]['aclaccess']))return $options; |
|
| 200 | 1 | foreach($ACLActions[$type]['actions'][$action]['aclaccess'] as $action){ |
|
| 201 | 1 | $options[$action] = ACLAction::AccessName($action); |
|
| 202 | } |
||
| 203 | 1 | return $options; |
|
| 204 | |||
| 205 | } |
||
| 206 | |||
| 207 | /** |
||
| 208 | * function static getDefaultActions() |
||
| 209 | * This function will return a list of acl actions with their default access levels |
||
| 210 | * |
||
| 211 | * |
||
| 212 | */ |
||
| 213 | 3 | public static function getDefaultActions($type='module', $action=''){ |
|
| 214 | 3 | $query = "SELECT * FROM acl_actions WHERE deleted=0 "; |
|
| 215 | 3 | if(!empty($type)){ |
|
| 216 | 3 | $query .= " AND acltype='$type'"; |
|
| 217 | } |
||
| 218 | 3 | if(!empty($action)){ |
|
| 219 | 1 | $query .= "AND name='$action'"; |
|
| 220 | } |
||
| 221 | 3 | $query .= " ORDER BY category"; |
|
| 222 | |||
| 223 | 3 | $db = DBManagerFactory::getInstance(); |
|
| 224 | 3 | $result = $db->query($query); |
|
| 225 | 3 | $default_actions = array(); |
|
| 226 | 3 | while($row = $db->fetchByAssoc($result) ){ |
|
| 227 | 3 | $acl = new ACLAction(); |
|
| 228 | 3 | $acl->populateFromRow($row); |
|
| 229 | 3 | $default_actions[] = $acl; |
|
| 230 | } |
||
| 231 | 3 | return $default_actions; |
|
| 232 | } |
||
| 233 | |||
| 234 | |||
| 235 | /** |
||
| 236 | * static getUserActions($user_id,$refresh=false, $category='', $action='') |
||
| 237 | * returns a list of user actions |
||
| 238 | * @param GUID $user_id |
||
| 239 | * @param BOOLEAN $refresh |
||
| 240 | * @param STRING $category |
||
| 241 | * @param STRING $action |
||
| 242 | * @return ARRAY of ACLActionsArray |
||
| 243 | */ |
||
| 244 | |||
| 245 | 89 | static function getUserActions($user_id,$refresh=false, $category='',$type='', $action=''){ |
|
| 246 | //check in the session if we already have it loaded |
||
| 247 | 89 | if(!$refresh && !empty($_SESSION['ACL'][$user_id])){ |
|
| 248 | 4 | if(empty($category) && empty($action)){ |
|
| 249 | 3 | return $_SESSION['ACL'][$user_id]; |
|
| 250 | }else{ |
||
| 251 | 1 | if(!empty($category) && isset($_SESSION['ACL'][$user_id][$category])){ |
|
| 252 | 1 | if(empty($action)){ |
|
| 253 | 1 | if(empty($type)){ |
|
| 254 | 1 | return $_SESSION['ACL'][$user_id][$category]; |
|
| 255 | } |
||
| 256 | 1 | return $_SESSION['ACL'][$user_id][$category][$type]; |
|
| 257 | }else if(!empty($type) && isset($_SESSION['ACL'][$user_id][$category][$type][$action])){ |
||
| 258 | return $_SESSION['ACL'][$user_id][$category][$type][$action]; |
||
| 259 | } |
||
| 260 | } |
||
| 261 | } |
||
| 262 | } |
||
| 263 | //if we don't have it loaded then lets check against the db |
||
| 264 | 89 | $additional_where = ''; |
|
| 265 | 89 | $db = DBManagerFactory::getInstance(); |
|
| 266 | 89 | if(!empty($category)){ |
|
| 267 | $additional_where .= " AND acl_actions.category = '$category' "; |
||
| 268 | } |
||
| 269 | 89 | if(!empty($action)){ |
|
| 270 | $additional_where .= " AND acl_actions.name = '$action' "; |
||
| 271 | } |
||
| 272 | 89 | if(!empty($type)){ |
|
| 273 | $additional_where .= " AND acl_actions.acltype = '$type' "; |
||
| 274 | } |
||
| 275 | /* BEGIN - SECURITY GROUPS */ |
||
| 276 | /** |
||
| 277 | $query = "SELECT acl_actions .*, acl_roles_actions.access_override |
||
| 278 | FROM acl_actions |
||
| 279 | LEFT JOIN acl_roles_users ON acl_roles_users.user_id = '$user_id' AND acl_roles_users.deleted = 0 |
||
| 280 | LEFT JOIN acl_roles_actions ON acl_roles_actions.role_id = acl_roles_users.role_id AND acl_roles_actions.action_id = acl_actions.id AND acl_roles_actions.deleted=0 |
||
| 281 | WHERE acl_actions.deleted=0 $additional_where ORDER BY category,name"; |
||
| 282 | */ |
||
| 283 | $query = "(SELECT acl_actions .*, acl_roles_actions.access_override, 1 as user_role |
||
| 284 | FROM acl_actions |
||
| 285 | 89 | INNER JOIN acl_roles_users ON acl_roles_users.user_id = '$user_id' AND acl_roles_users.deleted = 0 |
|
| 286 | LEFT JOIN acl_roles_actions ON acl_roles_actions.role_id = acl_roles_users.role_id AND acl_roles_actions.action_id = acl_actions.id AND acl_roles_actions.deleted=0 |
||
| 287 | 89 | WHERE acl_actions.deleted=0 $additional_where ) |
|
| 288 | |||
| 289 | UNION |
||
| 290 | |||
| 291 | (SELECT acl_actions .*, acl_roles_actions.access_override, 0 as user_role |
||
| 292 | FROM acl_actions |
||
| 293 | 89 | INNER JOIN securitygroups_users ON securitygroups_users.user_id = '$user_id' AND securitygroups_users.deleted = 0 |
|
| 294 | INNER JOIN securitygroups_acl_roles ON securitygroups_users.securitygroup_id = securitygroups_acl_roles.securitygroup_id and securitygroups_acl_roles.deleted = 0 |
||
| 295 | LEFT JOIN acl_roles_actions ON acl_roles_actions.role_id = securitygroups_acl_roles.role_id AND acl_roles_actions.action_id = acl_actions.id AND acl_roles_actions.deleted=0 |
||
| 296 | 89 | WHERE acl_actions.deleted=0 $additional_where ) |
|
| 297 | |||
| 298 | UNION |
||
| 299 | |||
| 300 | (SELECT acl_actions.*, 0 as access_override, -1 as user_role |
||
| 301 | FROM acl_actions |
||
| 302 | WHERE acl_actions.deleted = 0 ) |
||
| 303 | |||
| 304 | 89 | ORDER BY user_role desc, category,name,access_override desc"; //want non-null to show first |
|
| 305 | /* END - SECURITY GROUPS */ |
||
| 306 | 89 | $result = $db->query($query); |
|
| 307 | 89 | $selected_actions = array(); |
|
| 308 | /* BEGIN - SECURITY GROUPS */ |
||
| 309 | 89 | global $sugar_config; |
|
| 310 | 89 | $has_user_role = false; //used for user_role_precedence |
|
| 311 | 89 | $has_role = false; //used to determine if default actions can be ignored. If a user has a defined role don't use the defaults |
|
| 312 | /* END - SECURITY GROUPS */ |
||
| 313 | 89 | while($row = $db->fetchByAssoc($result, FALSE) ){ |
|
| 314 | /* BEGIN - SECURITY GROUPS */ |
||
| 315 | 89 | if($has_user_role == false && $row['user_role'] == 1) { |
|
|
0 ignored issues
–
show
|
|||
| 316 | $has_user_role = true; |
||
| 317 | } |
||
| 318 | 89 | if($has_role == false && ($row['user_role'] == 1 || $row['user_role'] ==0)) { |
|
|
0 ignored issues
–
show
|
|||
| 319 | $has_role = true; |
||
| 320 | } |
||
| 321 | //if user roles should take precedence over group roles and we have a user role |
||
| 322 | //break when we get to processing the group roles |
||
| 323 | 89 | if($has_user_role == true && $row['user_role'] == 0 |
|
|
0 ignored issues
–
show
|
|||
| 324 | 89 | && isset($sugar_config['securitysuite_user_role_precedence']) |
|
| 325 | 89 | && $sugar_config['securitysuite_user_role_precedence'] == true ) |
|
| 326 | { |
||
| 327 | break; |
||
| 328 | } |
||
| 329 | 89 | if($row['user_role'] == -1 && $has_role == true) { |
|
|
0 ignored issues
–
show
|
|||
| 330 | break; //no need for default actions when a role is assigned to the user or user's group already |
||
| 331 | } |
||
| 332 | /* END - SECURITY GROUPS */ |
||
| 333 | 89 | $acl = new ACLAction(); |
|
| 334 | 89 | $isOverride = false; |
|
| 335 | 89 | $acl->populateFromRow($row); |
|
| 336 | 89 | if(!empty($row['access_override'])){ |
|
| 337 | $acl->aclaccess = $row['access_override']; |
||
| 338 | $isOverride = true; |
||
| 339 | } |
||
| 340 | 89 | if(!isset($selected_actions[$acl->category])){ |
|
| 341 | 89 | $selected_actions[$acl->category] = array(); |
|
| 342 | |||
| 343 | } |
||
| 344 | 89 | if(!isset($selected_actions[$acl->category][$acl->acltype][$acl->name]) |
|
| 345 | || ( |
||
| 346 | /* BEGIN - SECURITY GROUPS - additive security*/ |
||
| 347 | ( |
||
| 348 | (isset($sugar_config['securitysuite_additive']) && $sugar_config['securitysuite_additive'] == true |
||
| 349 | && $selected_actions[$acl->category][$acl->acltype][$acl->name]['aclaccess'] < $acl->aclaccess) |
||
| 350 | || |
||
| 351 | ((!isset($sugar_config['securitysuite_additive']) || $sugar_config['securitysuite_additive'] == false) |
||
| 352 | && $selected_actions[$acl->category][$acl->acltype][$acl->name]['aclaccess'] > $acl->aclaccess) |
||
| 353 | ) |
||
| 354 | /* END - SECURITY GROUPS */ |
||
| 355 | && $isOverride |
||
| 356 | ) |
||
| 357 | || |
||
| 358 | (!empty($selected_actions[$acl->category][$acl->acltype][$acl->name]['isDefault']) |
||
| 359 | 89 | && $isOverride |
|
| 360 | ) |
||
| 361 | ) |
||
| 362 | { |
||
| 363 | |||
| 364 | |||
| 365 | 89 | $selected_actions[$acl->category][$acl->acltype][$acl->name] = $acl->toArray(); |
|
| 366 | 89 | $selected_actions[$acl->category][$acl->acltype][$acl->name]['isDefault'] = !$isOverride; |
|
| 367 | } |
||
| 368 | |||
| 369 | } |
||
| 370 | |||
| 371 | //only set the session variable if it was a full list; |
||
| 372 | 89 | if(empty($category) && empty($action)){ |
|
| 373 | 89 | if(!isset($_SESSION['ACL'])){ |
|
| 374 | 89 | $_SESSION['ACL'] = array(); |
|
| 375 | } |
||
| 376 | 89 | $_SESSION['ACL'][$user_id] = $selected_actions; |
|
| 377 | }else{ |
||
| 378 | if(empty($action) && !empty($category)){ |
||
| 379 | if(!empty($type)){ |
||
| 380 | $_SESSION['ACL'][$user_id][$category][$type] = $selected_actions[$category][$type];} |
||
| 381 | $_SESSION['ACL'][$user_id][$category] = $selected_actions[$category]; |
||
| 382 | }else{ |
||
| 383 | if(!empty($action) && !empty($category) && !empty($type)){ |
||
| 384 | $_SESSION['ACL'][$user_id][$category][$type][$action] = $selected_actions[$category][$action]; |
||
| 385 | |||
| 386 | } |
||
| 387 | } |
||
| 388 | } |
||
| 389 | |||
| 390 | // Sort by translated categories |
||
| 391 | 89 | uksort($selected_actions, "ACLAction::langCompare"); |
|
| 392 | 89 | return $selected_actions; |
|
| 393 | } |
||
| 394 | |||
| 395 | 89 | private static function langCompare($a, $b) |
|
|
0 ignored issues
–
show
|
|||
| 396 | { |
||
| 397 | 89 | global $app_list_strings; |
|
| 398 | // Fallback to array key if translation is empty |
||
| 399 | 89 | $a = empty($app_list_strings['moduleList'][$a]) ? $a : $app_list_strings['moduleList'][$a]; |
|
| 400 | 89 | $b = empty($app_list_strings['moduleList'][$b]) ? $b : $app_list_strings['moduleList'][$b]; |
|
| 401 | 89 | if ($a == $b) |
|
| 402 | return 0; |
||
| 403 | 89 | return ($a < $b) ? -1 : 1; |
|
| 404 | } |
||
| 405 | |||
| 406 | /** |
||
| 407 | * (static/ non-static)function hasAccess($is_owner= false , $access = 0) |
||
| 408 | * checks if a user has access to this acl if the user is an owner it will check if owners have access |
||
| 409 | * |
||
| 410 | * This function may either be used statically or not. If used staticlly a user must pass in an access level not equal to zero |
||
| 411 | * @param boolean $is_owner |
||
| 412 | * @param int $access |
||
| 413 | * @return true or false |
||
| 414 | */ |
||
| 415 | /* BEGIN - SECURITY GROUPS */ |
||
| 416 | /** |
||
| 417 | static function hasAccess($is_owner=false, $access = 0){ |
||
| 418 | */ |
||
| 419 | 48 | static function hasAccess($is_owner=false, $in_group=false, $access = 0, ACLAction $action = null){ |
|
| 420 | /** |
||
| 421 | if($access != 0 && $access == ACL_ALLOW_ALL || ($is_owner && $access == ACL_ALLOW_OWNER))return true; |
||
| 422 | //if this exists, then this function is not static, so check the aclaccess parameter |
||
| 423 | if(isset($this) && isset($this->aclaccess)){ |
||
| 424 | if($this->aclaccess == ACL_ALLOW_ALL || ($is_owner && $this->aclaccess == ACL_ALLOW_OWNER)) |
||
| 425 | return true; |
||
| 426 | } |
||
| 427 | */ |
||
| 428 | 48 | if($access != 0 && ($access == ACL_ALLOW_ALL |
|
| 429 | 1 | || ($is_owner && ($access == ACL_ALLOW_OWNER || $access == ACL_ALLOW_GROUP) ) //if owner that's better than in group so count it...better way to clean this up? |
|
| 430 | 48 | || ($in_group && $access == ACL_ALLOW_GROUP) //need to pass if in group with access somehow |
|
| 431 | )) { |
||
| 432 | 48 | return true; |
|
| 433 | } |
||
| 434 | 1 | if(!is_null($action) && isset($action->aclaccess)){ |
|
| 435 | if($action->aclaccess == ACL_ALLOW_ALL |
||
| 436 | || ($is_owner && $action->aclaccess == ($access == ACL_ALLOW_OWNER || $access == ACL_ALLOW_GROUP)) |
||
| 437 | || ($in_group && $access == ACL_ALLOW_GROUP) //need to pass if in group with access somehow |
||
| 438 | ) { |
||
| 439 | return true; |
||
| 440 | } |
||
| 441 | } |
||
| 442 | 1 | return false; |
|
| 443 | } |
||
| 444 | /* END - SECURITY GROUPS */ |
||
| 445 | |||
| 446 | /* BEGIN - SECURITY GROUPS */ |
||
| 447 | /** |
||
| 448 | * STATIC function userNeedsSecurityGroup($user_id, $category, $action,$type='module') |
||
| 449 | * checks if a user should have ownership to do an action |
||
| 450 | * |
||
| 451 | * @param GUID $user_id |
||
| 452 | * @param STRING $category |
||
| 453 | * @param STRING $action |
||
| 454 | * @param STRING $type |
||
| 455 | * @return boolean |
||
| 456 | */ |
||
| 457 | 39 | static function userNeedsSecurityGroup($user_id, $category, $action,$type='module'){ |
|
| 458 | //check if we don't have it set in the cache if not lets reload the cache |
||
| 459 | |||
| 460 | 39 | if(empty($_SESSION['ACL'][$user_id][$category][$type][$action])){ |
|
| 461 | 2 | ACLAction::getUserActions($user_id, false); |
|
| 462 | |||
| 463 | } |
||
| 464 | |||
| 465 | 39 | if(!empty($_SESSION['ACL'][$user_id][$category][$type][$action])){ |
|
| 466 | 39 | return $_SESSION['ACL'][$user_id][$category][$type][$action]['aclaccess'] == ACL_ALLOW_GROUP; |
|
| 467 | } |
||
| 468 | 1 | return false; |
|
| 469 | } |
||
| 470 | /* END - SECURITY GROUPS */ |
||
| 471 | |||
| 472 | |||
| 473 | |||
| 474 | |||
| 475 | |||
| 476 | |||
| 477 | |||
| 478 | |||
| 479 | /** |
||
| 480 | * static function userHasAccess($user_id, $category, $action, $is_owner = false) |
||
| 481 | * |
||
| 482 | * @param GUID $user_id the user id who you want to check access for |
||
| 483 | * @param STRING $category the category you would like to check access for |
||
| 484 | * @param STRING $action the action of that category you would like to check access for |
||
| 485 | * @param BOOLEAN OPTIONAL $is_owner if the object is owned by the user you are checking access for |
||
| 486 | */ |
||
| 487 | /* BEGIN - SECURITY GROUPS - added $in_group */ |
||
| 488 | /** |
||
| 489 | public static function userHasAccess($user_id, $category, $action,$type='module', $is_owner = false){ |
||
| 490 | */ |
||
| 491 | 47 | public static function userHasAccess($user_id, $category, $action,$type='module', $is_owner = false, $in_group = false){ |
|
| 492 | 47 | global $current_user; |
|
| 493 | 47 | if($current_user->isAdminForModule($category)&& !isset($_SESSION['ACL'][$user_id][$category][$type][$action]['aclaccess'])){ |
|
| 494 | return true; |
||
| 495 | } |
||
| 496 | //check if we don't have it set in the cache if not lets reload the cache |
||
| 497 | 47 | if(ACLAction::getUserAccessLevel($user_id, $category, 'access', $type) < ACL_ALLOW_ENABLED) return false; |
|
| 498 | 47 | if(empty($_SESSION['ACL'][$user_id][$category][$type][$action])){ |
|
| 499 | ACLAction::getUserActions($user_id, false); |
||
| 500 | |||
| 501 | } |
||
| 502 | |||
| 503 | 47 | if(!empty($_SESSION['ACL'][$user_id][$category][$type][$action])){ |
|
| 504 | /** |
||
| 505 | return ACLAction::hasAccess($is_owner, $_SESSION['ACL'][$user_id][$category][$type][$action]['aclaccess']); |
||
| 506 | */ |
||
| 507 | 47 | return ACLAction::hasAccess($is_owner, $in_group, $_SESSION['ACL'][$user_id][$category][$type][$action]['aclaccess']); |
|
| 508 | } |
||
| 509 | return false; |
||
| 510 | |||
| 511 | } |
||
| 512 | /* END - SECURITY GROUPS */ |
||
| 513 | /** |
||
| 514 | * function getUserAccessLevel($user_id, $category, $action,$type='module') |
||
| 515 | * returns the access level for a given category and action |
||
| 516 | * |
||
| 517 | * @param GUID $user_id |
||
| 518 | * @param STRING $category |
||
| 519 | * @param STRING $action |
||
| 520 | * @param STRING $type |
||
| 521 | * @return INT (ACCESS LEVEL) |
||
| 522 | */ |
||
| 523 | 48 | public static function getUserAccessLevel($user_id, $category, $action,$type='module'){ |
|
| 524 | 48 | if(empty($_SESSION['ACL'][$user_id][$category][$type][$action])){ |
|
| 525 | 43 | ACLAction::getUserActions($user_id, false); |
|
| 526 | |||
| 527 | } |
||
| 528 | 48 | if(!empty($_SESSION['ACL'][$user_id][$category][$type][$action])){ |
|
| 529 | 48 | if (!empty($_SESSION['ACL'][$user_id][$category][$type]['admin']) && $_SESSION['ACL'][$user_id][$category][$type]['admin']['aclaccess'] >= ACL_ALLOW_ADMIN) |
|
| 530 | { |
||
| 531 | // If you have admin access for a module, all ACL's are allowed |
||
| 532 | return $_SESSION['ACL'][$user_id][$category][$type]['admin']['aclaccess']; |
||
| 533 | } |
||
| 534 | 48 | return $_SESSION['ACL'][$user_id][$category][$type][$action]['aclaccess']; |
|
| 535 | } |
||
| 536 | 1 | } |
|
| 537 | |||
| 538 | /** |
||
| 539 | * STATIC function userNeedsOwnership($user_id, $category, $action,$type='module') |
||
| 540 | * checks if a user should have ownership to do an action |
||
| 541 | * |
||
| 542 | * @param GUID $user_id |
||
| 543 | * @param STRING $category |
||
| 544 | * @param STRING $action |
||
| 545 | * @param STRING $type |
||
| 546 | * @return boolean |
||
| 547 | */ |
||
| 548 | 39 | public static function userNeedsOwnership($user_id, $category, $action,$type='module'){ |
|
| 549 | //check if we don't have it set in the cache if not lets reload the cache |
||
| 550 | |||
| 551 | 39 | if(empty($_SESSION['ACL'][$user_id][$category][$type][$action])){ |
|
| 552 | 30 | ACLAction::getUserActions($user_id, false); |
|
| 553 | |||
| 554 | } |
||
| 555 | |||
| 556 | |||
| 557 | 39 | if(!empty($_SESSION['ACL'][$user_id][$category][$type][$action])){ |
|
| 558 | 39 | return $_SESSION['ACL'][$user_id][$category][$type][$action]['aclaccess'] == ACL_ALLOW_OWNER; |
|
| 559 | } |
||
| 560 | 1 | return false; |
|
| 561 | |||
| 562 | } |
||
| 563 | /** |
||
| 564 | * |
||
| 565 | * static pass by ref setupCategoriesMatrix(&$categories) |
||
| 566 | * takes in an array of categories and modifes them adding display information |
||
| 567 | * |
||
| 568 | * @param unknown_type $categories |
||
| 569 | */ |
||
| 570 | 1 | public static function setupCategoriesMatrix(&$categories){ |
|
| 571 | 1 | global $ACLActions, $current_user; |
|
| 572 | 1 | $names = array(); |
|
| 573 | 1 | $disabled = array(); |
|
| 574 | 1 | foreach($categories as $cat_name=>$category){ |
|
| 575 | 1 | foreach($category as $type_name=>$type){ |
|
| 576 | 1 | foreach($type as $act_name=>$action){ |
|
| 577 | 1 | $names[$act_name] = translate($ACLActions[$type_name]['actions'][$act_name]['label'], 'ACLActions'); |
|
| 578 | 1 | $categories[$cat_name][$type_name][$act_name]['accessColor'] = ACLAction::AccessColor($action['aclaccess']); |
|
| 579 | 1 | if($type_name== 'module'){ |
|
| 580 | |||
| 581 | 1 | if($act_name != 'aclaccess' && $categories[$cat_name]['module']['access']['aclaccess'] == ACL_ALLOW_DISABLED){ |
|
| 582 | $categories[$cat_name][$type_name][$act_name]['accessColor'] = 'darkgray'; |
||
| 583 | $disabled[] = $cat_name; |
||
| 584 | } |
||
| 585 | |||
| 586 | } |
||
| 587 | 1 | $categories[$cat_name][$type_name][$act_name]['accessName'] = ACLAction::AccessName($action['aclaccess']); |
|
| 588 | 1 | $categories[$cat_name][$type_name][$act_name]['accessLabel'] = ACLAction::AccessLabel($action['aclaccess']); |
|
| 589 | |||
| 590 | 1 | if($cat_name=='Users'&& $act_name=='admin'){ |
|
| 591 | $categories[$cat_name][$type_name][$act_name]['accessOptions'][ACL_ALLOW_DEFAULT]=ACLAction::AccessName(ACL_ALLOW_DEFAULT);; |
||
| 592 | $categories[$cat_name][$type_name][$act_name]['accessOptions'][ACL_ALLOW_DEV]=ACLAction::AccessName(ACL_ALLOW_DEV);; |
||
| 593 | } |
||
| 594 | else{ |
||
| 595 | 1 | $categories[$cat_name][$type_name][$act_name]['accessOptions'] = ACLAction::getAccessOptions($act_name, $type_name); |
|
| 596 | } |
||
| 597 | } |
||
| 598 | } |
||
| 599 | } |
||
| 600 | |||
| 601 | 1 | if(!is_admin($current_user)){ |
|
| 602 | 1 | foreach($disabled as $cat_name){ |
|
| 603 | unset($categories[$cat_name]); |
||
| 604 | } |
||
| 605 | } |
||
| 606 | 1 | return $names; |
|
| 607 | } |
||
| 608 | |||
| 609 | |||
| 610 | |||
| 611 | /** |
||
| 612 | * function toArray() |
||
| 613 | * returns this acl as an array |
||
| 614 | * |
||
| 615 | * @return array of fields with id, name, access and category |
||
| 616 | */ |
||
| 617 | 91 | function toArray($dbOnly = false, $stringOnly = false, $upperKeys = false){ |
|
| 618 | 91 | $array_fields = array('id', 'aclaccess'); |
|
| 619 | 91 | $arr = array(); |
|
| 620 | 91 | foreach($array_fields as $field){ |
|
| 621 | 91 | $arr[$field] = $this->$field; |
|
| 622 | } |
||
| 623 | 91 | return $arr; |
|
| 624 | } |
||
| 625 | |||
| 626 | /** |
||
| 627 | * function fromArray($arr) |
||
| 628 | * converts an array into an acl mapping name value pairs into files |
||
| 629 | * |
||
| 630 | * @param Array $arr |
||
| 631 | */ |
||
| 632 | 1 | function fromArray($arr){ |
|
| 633 | 1 | foreach($arr as $name=>$value){ |
|
| 634 | 1 | $this->$name = $value; |
|
| 635 | } |
||
| 636 | 1 | } |
|
| 637 | |||
| 638 | /** |
||
| 639 | * function clearSessionCache() |
||
| 640 | * clears the session variable storing the cache information for acls |
||
| 641 | * |
||
| 642 | */ |
||
| 643 | 1 | function clearSessionCache(){ |
|
| 644 | 1 | unset($_SESSION['ACL']); |
|
| 645 | 1 | } |
|
| 646 | |||
| 647 | |||
| 648 | |||
| 649 | |||
| 650 | |||
| 651 | |||
| 652 | |||
| 653 | |||
| 654 | |||
| 655 | |||
| 656 | |||
| 657 | |||
| 658 | |||
| 659 | } |
||
| 660 |