This project does not seem to handle request data directly as such no vulnerable execution paths were found.
include
, or for example
via PHP's auto-loading mechanism.
These results are based on our legacy PHP analysis, consider migrating to our new PHP analysis engine instead. Learn more
1 | <?php |
||
2 | 1 | if(!defined('sugarEntry') || !sugarEntry) die('Not A Valid Entry Point'); |
|
3 | /********************************************************************************* |
||
4 | * SugarCRM Community Edition is a customer relationship management program developed by |
||
5 | * SugarCRM, Inc. Copyright (C) 2004-2013 SugarCRM Inc. |
||
6 | |||
7 | * SuiteCRM is an extension to SugarCRM Community Edition developed by Salesagility Ltd. |
||
8 | * Copyright (C) 2011 - 2014 Salesagility Ltd. |
||
9 | * |
||
10 | * This program is free software; you can redistribute it and/or modify it under |
||
11 | * the terms of the GNU Affero General Public License version 3 as published by the |
||
12 | * Free Software Foundation with the addition of the following permission added |
||
13 | * to Section 15 as permitted in Section 7(a): FOR ANY PART OF THE COVERED WORK |
||
14 | * IN WHICH THE COPYRIGHT IS OWNED BY SUGARCRM, SUGARCRM DISCLAIMS THE WARRANTY |
||
15 | * OF NON INFRINGEMENT OF THIRD PARTY RIGHTS. |
||
16 | * |
||
17 | * This program is distributed in the hope that it will be useful, but WITHOUT |
||
18 | * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS |
||
19 | * FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more |
||
20 | * details. |
||
21 | * |
||
22 | * You should have received a copy of the GNU Affero General Public License along with |
||
23 | * this program; if not, see http://www.gnu.org/licenses or write to the Free |
||
24 | * Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA |
||
25 | * 02110-1301 USA. |
||
26 | * |
||
27 | * You can contact SugarCRM, Inc. headquarters at 10050 North Wolfe Road, |
||
28 | * SW2-130, Cupertino, CA 95014, USA. or at email address [email protected]. |
||
29 | * |
||
30 | * The interactive user interfaces in modified source and object code versions |
||
31 | * of this program must display Appropriate Legal Notices, as required under |
||
32 | * Section 5 of the GNU Affero General Public License version 3. |
||
33 | * |
||
34 | * In accordance with Section 7(b) of the GNU Affero General Public License version 3, |
||
35 | * these Appropriate Legal Notices must retain the display of the "Powered by |
||
36 | * SugarCRM" logo and "Supercharged by SuiteCRM" logo. If the display of the logos is not |
||
37 | * reasonably feasible for technical reasons, the Appropriate Legal Notices must |
||
38 | * display the words "Powered by SugarCRM" and "Supercharged by SuiteCRM". |
||
39 | ********************************************************************************/ |
||
40 | /* BEGIN - SECURITY GROUPS */ |
||
41 | 1 | if(file_exists("modules/ACLActions/actiondefs.override.php")){ |
|
42 | 1 | require_once("modules/ACLActions/actiondefs.override.php"); |
|
43 | } else { |
||
44 | require_once('modules/ACLActions/actiondefs.php'); |
||
45 | } |
||
46 | /* END - SECURITY GROUPS */ |
||
47 | class ACLAction extends SugarBean{ |
||
0 ignored issues
–
show
Coding Style
introduced
by
![]() |
|||
48 | var $module_dir = 'ACLActions'; |
||
49 | var $object_name = 'ACLAction'; |
||
50 | var $table_name = 'acl_actions'; |
||
51 | var $new_schema = true; |
||
52 | var $disable_custom_fields = true; |
||
53 | |||
54 | 97 | public function __construct(){ |
|
55 | 97 | parent::__construct(); |
|
56 | 97 | } |
|
57 | |||
58 | /** |
||
59 | * @deprecated deprecated since version 7.6, PHP4 Style Constructors are deprecated and will be remove in 7.8, please update your code, use __construct instead |
||
60 | */ |
||
61 | public function ACLAction(){ |
||
62 | $deprecatedMessage = 'PHP4 Style Constructors are deprecated and will be remove in 7.8, please update your code'; |
||
63 | if(isset($GLOBALS['log'])) { |
||
64 | $GLOBALS['log']->deprecated($deprecatedMessage); |
||
65 | } |
||
66 | else { |
||
67 | trigger_error($deprecatedMessage, E_USER_DEPRECATED); |
||
68 | } |
||
69 | self::__construct(); |
||
70 | } |
||
71 | |||
72 | |||
73 | /** |
||
74 | * static addActions($category, $type='module') |
||
75 | * Adds all default actions for a category/type |
||
76 | * |
||
77 | * @param STRING $category - the category (e.g module name - Accounts, Contacts) |
||
78 | * @param STRING $type - the type (e.g. 'module', 'field') |
||
79 | */ |
||
80 | 1 | static function addActions($category, $type='module'){ |
|
81 | 1 | global $ACLActions; |
|
82 | 1 | $db = DBManagerFactory::getInstance(); |
|
83 | 1 | if(isset($ACLActions[$type])){ |
|
84 | 1 | foreach($ACLActions[$type]['actions'] as $action_name =>$action_def){ |
|
85 | |||
86 | 1 | $action = new ACLAction(); |
|
87 | 1 | $query = "SELECT * FROM " . $action->table_name . " WHERE name='$action_name' AND category = '$category' AND acltype='$type' AND deleted=0 "; |
|
88 | 1 | $result = $db->query($query); |
|
89 | //only add if an action with that name and category don't exist |
||
90 | 1 | $row=$db->fetchByAssoc($result); |
|
91 | 1 | if ($row == null) { |
|
92 | 1 | $action->name = $action_name; |
|
93 | 1 | $action->category = $category; |
|
94 | 1 | $action->aclaccess = $action_def['default']; |
|
95 | 1 | $action->acltype = $type; |
|
96 | 1 | $action->modified_user_id = 1; |
|
97 | 1 | $action->created_by = 1; |
|
98 | 1 | $action->save(); |
|
99 | |||
100 | } |
||
101 | } |
||
102 | |||
103 | }else{ |
||
104 | sugar_die("FAILED TO ADD: $category - TYPE $type NOT DEFINED IN modules/ACLActions/actiondefs.php"); |
||
105 | } |
||
106 | |||
107 | 1 | } |
|
108 | |||
109 | /** |
||
110 | * static removeActions($category, $type='module') |
||
111 | * Removes all default actions for a category/type |
||
112 | * |
||
113 | * @param STRING $category - the category (e.g module name - Accounts, Contacts) |
||
114 | * @param STRING $type - the type (e.g. 'module', 'field') |
||
115 | */ |
||
116 | 1 | public static function removeActions($category, $type='module'){ |
|
117 | 1 | global $ACLActions; |
|
118 | 1 | $db = DBManagerFactory::getInstance(); |
|
119 | 1 | if(isset($ACLActions[$type])){ |
|
120 | 1 | foreach($ACLActions[$type]['actions'] as $action_name =>$action_def){ |
|
121 | |||
122 | 1 | $action = new ACLAction(); |
|
123 | 1 | $query = "SELECT * FROM " . $action->table_name . " WHERE name='$action_name' AND category = '$category' AND acltype='$type' and deleted=0"; |
|
124 | 1 | $result = $db->query($query); |
|
125 | //only add if an action with that name and category don't exist |
||
126 | 1 | $row=$db->fetchByAssoc($result); |
|
127 | 1 | if ($row != null) { |
|
128 | 1 | $action->mark_deleted($row['id']); |
|
129 | } |
||
130 | } |
||
131 | }else{ |
||
132 | sugar_die("FAILED TO REMOVE: $category : $name - TYPE $type NOT DEFINED IN modules/ACLActions/actiondefs.php"); |
||
133 | } |
||
134 | 1 | } |
|
135 | |||
136 | /** |
||
137 | * static AccessColor($access) |
||
138 | * |
||
139 | * returns the color associated with an access level |
||
140 | * these colors exist in the definitions in modules/ACLActions/actiondefs.php |
||
141 | * @param INT $access - the access level you want the color for |
||
142 | * @return the color either name or hex representation or false if the level does not exist |
||
143 | */ |
||
144 | 1 | protected static function AccessColor($access){ |
|
145 | 1 | global $ACLActionAccessLevels; |
|
146 | 1 | if(isset($ACLActionAccessLevels[$access])){ |
|
147 | |||
148 | return $ACLActionAccessLevels[$access]['color']; |
||
149 | } |
||
150 | 1 | return false; |
|
151 | |||
152 | } |
||
153 | |||
154 | /** |
||
155 | * static AccessName($access) |
||
156 | * |
||
157 | * returns the translated name associated with an access level |
||
158 | * these label definitions exist in the definitions in modules/ACLActions/actiondefs.php |
||
159 | * @param INT $access - the access level you want the color for |
||
160 | * @return the translated access level name or false if the level does not exist |
||
161 | */ |
||
162 | 2 | static function AccessName($access){ |
|
163 | 2 | global $ACLActionAccessLevels; |
|
164 | 2 | if(isset($ACLActionAccessLevels[$access])){ |
|
165 | 2 | return translate($ACLActionAccessLevels[$access]['label'], 'ACLActions'); |
|
166 | } |
||
167 | 2 | return false; |
|
168 | |||
169 | } |
||
170 | |||
171 | /** |
||
172 | * static AccessLabel($access) |
||
173 | * |
||
174 | * returns the label associated with an access level |
||
175 | * these label definitions exist in the definitions in modules/ACLActions/actiondefs.php |
||
176 | * @param INT $access - the access level you want the color for |
||
177 | * @return the access level label or false if the level does not exist |
||
178 | */ |
||
179 | 1 | protected static function AccessLabel($access){ |
|
180 | 1 | global $ACLActionAccessLevels; |
|
181 | 1 | if(isset($ACLActionAccessLevels[$access])){ |
|
182 | $label=preg_replace('/(LBL_ACCESS_)(.*)/', '$2', $ACLActionAccessLevels[$access]['label']); |
||
183 | return strtolower($label); |
||
184 | |||
185 | } |
||
186 | 1 | return false; |
|
187 | |||
188 | } |
||
189 | |||
190 | /** |
||
191 | * static getAccessOptions() |
||
192 | * this is used for building select boxes |
||
193 | * @return array containg access levels (ints) as keys and access names as values |
||
194 | */ |
||
195 | 1 | protected static function getAccessOptions( $action, $type='module'){ |
|
196 | 1 | global $ACLActions; |
|
197 | 1 | $options = array(); |
|
198 | |||
199 | 1 | if(empty($ACLActions[$type]['actions'][$action]['aclaccess']))return $options; |
|
200 | 1 | foreach($ACLActions[$type]['actions'][$action]['aclaccess'] as $action){ |
|
201 | 1 | $options[$action] = ACLAction::AccessName($action); |
|
202 | } |
||
203 | 1 | return $options; |
|
204 | |||
205 | } |
||
206 | |||
207 | /** |
||
208 | * function static getDefaultActions() |
||
209 | * This function will return a list of acl actions with their default access levels |
||
210 | * |
||
211 | * |
||
212 | */ |
||
213 | 3 | public static function getDefaultActions($type='module', $action=''){ |
|
214 | 3 | $query = "SELECT * FROM acl_actions WHERE deleted=0 "; |
|
215 | 3 | if(!empty($type)){ |
|
216 | 3 | $query .= " AND acltype='$type'"; |
|
217 | } |
||
218 | 3 | if(!empty($action)){ |
|
219 | 1 | $query .= "AND name='$action'"; |
|
220 | } |
||
221 | 3 | $query .= " ORDER BY category"; |
|
222 | |||
223 | 3 | $db = DBManagerFactory::getInstance(); |
|
224 | 3 | $result = $db->query($query); |
|
225 | 3 | $default_actions = array(); |
|
226 | 3 | while($row = $db->fetchByAssoc($result) ){ |
|
227 | 3 | $acl = new ACLAction(); |
|
228 | 3 | $acl->populateFromRow($row); |
|
229 | 3 | $default_actions[] = $acl; |
|
230 | } |
||
231 | 3 | return $default_actions; |
|
232 | } |
||
233 | |||
234 | |||
235 | /** |
||
236 | * static getUserActions($user_id,$refresh=false, $category='', $action='') |
||
237 | * returns a list of user actions |
||
238 | * @param GUID $user_id |
||
239 | * @param BOOLEAN $refresh |
||
240 | * @param STRING $category |
||
241 | * @param STRING $action |
||
242 | * @return ARRAY of ACLActionsArray |
||
243 | */ |
||
244 | |||
245 | 89 | static function getUserActions($user_id,$refresh=false, $category='',$type='', $action=''){ |
|
246 | //check in the session if we already have it loaded |
||
247 | 89 | if(!$refresh && !empty($_SESSION['ACL'][$user_id])){ |
|
248 | 4 | if(empty($category) && empty($action)){ |
|
249 | 3 | return $_SESSION['ACL'][$user_id]; |
|
250 | }else{ |
||
251 | 1 | if(!empty($category) && isset($_SESSION['ACL'][$user_id][$category])){ |
|
252 | 1 | if(empty($action)){ |
|
253 | 1 | if(empty($type)){ |
|
254 | 1 | return $_SESSION['ACL'][$user_id][$category]; |
|
255 | } |
||
256 | 1 | return $_SESSION['ACL'][$user_id][$category][$type]; |
|
257 | }else if(!empty($type) && isset($_SESSION['ACL'][$user_id][$category][$type][$action])){ |
||
258 | return $_SESSION['ACL'][$user_id][$category][$type][$action]; |
||
259 | } |
||
260 | } |
||
261 | } |
||
262 | } |
||
263 | //if we don't have it loaded then lets check against the db |
||
264 | 89 | $additional_where = ''; |
|
265 | 89 | $db = DBManagerFactory::getInstance(); |
|
266 | 89 | if(!empty($category)){ |
|
267 | $additional_where .= " AND acl_actions.category = '$category' "; |
||
268 | } |
||
269 | 89 | if(!empty($action)){ |
|
270 | $additional_where .= " AND acl_actions.name = '$action' "; |
||
271 | } |
||
272 | 89 | if(!empty($type)){ |
|
273 | $additional_where .= " AND acl_actions.acltype = '$type' "; |
||
274 | } |
||
275 | /* BEGIN - SECURITY GROUPS */ |
||
276 | /** |
||
277 | $query = "SELECT acl_actions .*, acl_roles_actions.access_override |
||
278 | FROM acl_actions |
||
279 | LEFT JOIN acl_roles_users ON acl_roles_users.user_id = '$user_id' AND acl_roles_users.deleted = 0 |
||
280 | LEFT JOIN acl_roles_actions ON acl_roles_actions.role_id = acl_roles_users.role_id AND acl_roles_actions.action_id = acl_actions.id AND acl_roles_actions.deleted=0 |
||
281 | WHERE acl_actions.deleted=0 $additional_where ORDER BY category,name"; |
||
282 | */ |
||
283 | $query = "(SELECT acl_actions .*, acl_roles_actions.access_override, 1 as user_role |
||
284 | FROM acl_actions |
||
285 | 89 | INNER JOIN acl_roles_users ON acl_roles_users.user_id = '$user_id' AND acl_roles_users.deleted = 0 |
|
286 | LEFT JOIN acl_roles_actions ON acl_roles_actions.role_id = acl_roles_users.role_id AND acl_roles_actions.action_id = acl_actions.id AND acl_roles_actions.deleted=0 |
||
287 | 89 | WHERE acl_actions.deleted=0 $additional_where ) |
|
288 | |||
289 | UNION |
||
290 | |||
291 | (SELECT acl_actions .*, acl_roles_actions.access_override, 0 as user_role |
||
292 | FROM acl_actions |
||
293 | 89 | INNER JOIN securitygroups_users ON securitygroups_users.user_id = '$user_id' AND securitygroups_users.deleted = 0 |
|
294 | INNER JOIN securitygroups_acl_roles ON securitygroups_users.securitygroup_id = securitygroups_acl_roles.securitygroup_id and securitygroups_acl_roles.deleted = 0 |
||
295 | LEFT JOIN acl_roles_actions ON acl_roles_actions.role_id = securitygroups_acl_roles.role_id AND acl_roles_actions.action_id = acl_actions.id AND acl_roles_actions.deleted=0 |
||
296 | 89 | WHERE acl_actions.deleted=0 $additional_where ) |
|
297 | |||
298 | UNION |
||
299 | |||
300 | (SELECT acl_actions.*, 0 as access_override, -1 as user_role |
||
301 | FROM acl_actions |
||
302 | WHERE acl_actions.deleted = 0 ) |
||
303 | |||
304 | 89 | ORDER BY user_role desc, category,name,access_override desc"; //want non-null to show first |
|
305 | /* END - SECURITY GROUPS */ |
||
306 | 89 | $result = $db->query($query); |
|
307 | 89 | $selected_actions = array(); |
|
308 | /* BEGIN - SECURITY GROUPS */ |
||
309 | 89 | global $sugar_config; |
|
310 | 89 | $has_user_role = false; //used for user_role_precedence |
|
311 | 89 | $has_role = false; //used to determine if default actions can be ignored. If a user has a defined role don't use the defaults |
|
312 | /* END - SECURITY GROUPS */ |
||
313 | 89 | while($row = $db->fetchByAssoc($result, FALSE) ){ |
|
314 | /* BEGIN - SECURITY GROUPS */ |
||
315 | 89 | if($has_user_role == false && $row['user_role'] == 1) { |
|
0 ignored issues
–
show
|
|||
316 | $has_user_role = true; |
||
317 | } |
||
318 | 89 | if($has_role == false && ($row['user_role'] == 1 || $row['user_role'] ==0)) { |
|
0 ignored issues
–
show
|
|||
319 | $has_role = true; |
||
320 | } |
||
321 | //if user roles should take precedence over group roles and we have a user role |
||
322 | //break when we get to processing the group roles |
||
323 | 89 | if($has_user_role == true && $row['user_role'] == 0 |
|
0 ignored issues
–
show
|
|||
324 | 89 | && isset($sugar_config['securitysuite_user_role_precedence']) |
|
325 | 89 | && $sugar_config['securitysuite_user_role_precedence'] == true ) |
|
326 | { |
||
327 | break; |
||
328 | } |
||
329 | 89 | if($row['user_role'] == -1 && $has_role == true) { |
|
0 ignored issues
–
show
|
|||
330 | break; //no need for default actions when a role is assigned to the user or user's group already |
||
331 | } |
||
332 | /* END - SECURITY GROUPS */ |
||
333 | 89 | $acl = new ACLAction(); |
|
334 | 89 | $isOverride = false; |
|
335 | 89 | $acl->populateFromRow($row); |
|
336 | 89 | if(!empty($row['access_override'])){ |
|
337 | $acl->aclaccess = $row['access_override']; |
||
338 | $isOverride = true; |
||
339 | } |
||
340 | 89 | if(!isset($selected_actions[$acl->category])){ |
|
341 | 89 | $selected_actions[$acl->category] = array(); |
|
342 | |||
343 | } |
||
344 | 89 | if(!isset($selected_actions[$acl->category][$acl->acltype][$acl->name]) |
|
345 | || ( |
||
346 | /* BEGIN - SECURITY GROUPS - additive security*/ |
||
347 | ( |
||
348 | (isset($sugar_config['securitysuite_additive']) && $sugar_config['securitysuite_additive'] == true |
||
349 | && $selected_actions[$acl->category][$acl->acltype][$acl->name]['aclaccess'] < $acl->aclaccess) |
||
350 | || |
||
351 | ((!isset($sugar_config['securitysuite_additive']) || $sugar_config['securitysuite_additive'] == false) |
||
352 | && $selected_actions[$acl->category][$acl->acltype][$acl->name]['aclaccess'] > $acl->aclaccess) |
||
353 | ) |
||
354 | /* END - SECURITY GROUPS */ |
||
355 | && $isOverride |
||
356 | ) |
||
357 | || |
||
358 | (!empty($selected_actions[$acl->category][$acl->acltype][$acl->name]['isDefault']) |
||
359 | 89 | && $isOverride |
|
360 | ) |
||
361 | ) |
||
362 | { |
||
363 | |||
364 | |||
365 | 89 | $selected_actions[$acl->category][$acl->acltype][$acl->name] = $acl->toArray(); |
|
366 | 89 | $selected_actions[$acl->category][$acl->acltype][$acl->name]['isDefault'] = !$isOverride; |
|
367 | } |
||
368 | |||
369 | } |
||
370 | |||
371 | //only set the session variable if it was a full list; |
||
372 | 89 | if(empty($category) && empty($action)){ |
|
373 | 89 | if(!isset($_SESSION['ACL'])){ |
|
374 | 89 | $_SESSION['ACL'] = array(); |
|
375 | } |
||
376 | 89 | $_SESSION['ACL'][$user_id] = $selected_actions; |
|
377 | }else{ |
||
378 | if(empty($action) && !empty($category)){ |
||
379 | if(!empty($type)){ |
||
380 | $_SESSION['ACL'][$user_id][$category][$type] = $selected_actions[$category][$type];} |
||
381 | $_SESSION['ACL'][$user_id][$category] = $selected_actions[$category]; |
||
382 | }else{ |
||
383 | if(!empty($action) && !empty($category) && !empty($type)){ |
||
384 | $_SESSION['ACL'][$user_id][$category][$type][$action] = $selected_actions[$category][$action]; |
||
385 | |||
386 | } |
||
387 | } |
||
388 | } |
||
389 | |||
390 | // Sort by translated categories |
||
391 | 89 | uksort($selected_actions, "ACLAction::langCompare"); |
|
392 | 89 | return $selected_actions; |
|
393 | } |
||
394 | |||
395 | 89 | private static function langCompare($a, $b) |
|
0 ignored issues
–
show
|
|||
396 | { |
||
397 | 89 | global $app_list_strings; |
|
398 | // Fallback to array key if translation is empty |
||
399 | 89 | $a = empty($app_list_strings['moduleList'][$a]) ? $a : $app_list_strings['moduleList'][$a]; |
|
400 | 89 | $b = empty($app_list_strings['moduleList'][$b]) ? $b : $app_list_strings['moduleList'][$b]; |
|
401 | 89 | if ($a == $b) |
|
402 | return 0; |
||
403 | 89 | return ($a < $b) ? -1 : 1; |
|
404 | } |
||
405 | |||
406 | /** |
||
407 | * (static/ non-static)function hasAccess($is_owner= false , $access = 0) |
||
408 | * checks if a user has access to this acl if the user is an owner it will check if owners have access |
||
409 | * |
||
410 | * This function may either be used statically or not. If used staticlly a user must pass in an access level not equal to zero |
||
411 | * @param boolean $is_owner |
||
412 | * @param int $access |
||
413 | * @return true or false |
||
414 | */ |
||
415 | /* BEGIN - SECURITY GROUPS */ |
||
416 | /** |
||
417 | static function hasAccess($is_owner=false, $access = 0){ |
||
418 | */ |
||
419 | 48 | static function hasAccess($is_owner=false, $in_group=false, $access = 0, ACLAction $action = null){ |
|
420 | /** |
||
421 | if($access != 0 && $access == ACL_ALLOW_ALL || ($is_owner && $access == ACL_ALLOW_OWNER))return true; |
||
422 | //if this exists, then this function is not static, so check the aclaccess parameter |
||
423 | if(isset($this) && isset($this->aclaccess)){ |
||
424 | if($this->aclaccess == ACL_ALLOW_ALL || ($is_owner && $this->aclaccess == ACL_ALLOW_OWNER)) |
||
425 | return true; |
||
426 | } |
||
427 | */ |
||
428 | 48 | if($access != 0 && ($access == ACL_ALLOW_ALL |
|
429 | 1 | || ($is_owner && ($access == ACL_ALLOW_OWNER || $access == ACL_ALLOW_GROUP) ) //if owner that's better than in group so count it...better way to clean this up? |
|
430 | 48 | || ($in_group && $access == ACL_ALLOW_GROUP) //need to pass if in group with access somehow |
|
431 | )) { |
||
432 | 48 | return true; |
|
433 | } |
||
434 | 1 | if(!is_null($action) && isset($action->aclaccess)){ |
|
435 | if($action->aclaccess == ACL_ALLOW_ALL |
||
436 | || ($is_owner && $action->aclaccess == ($access == ACL_ALLOW_OWNER || $access == ACL_ALLOW_GROUP)) |
||
437 | || ($in_group && $access == ACL_ALLOW_GROUP) //need to pass if in group with access somehow |
||
438 | ) { |
||
439 | return true; |
||
440 | } |
||
441 | } |
||
442 | 1 | return false; |
|
443 | } |
||
444 | /* END - SECURITY GROUPS */ |
||
445 | |||
446 | /* BEGIN - SECURITY GROUPS */ |
||
447 | /** |
||
448 | * STATIC function userNeedsSecurityGroup($user_id, $category, $action,$type='module') |
||
449 | * checks if a user should have ownership to do an action |
||
450 | * |
||
451 | * @param GUID $user_id |
||
452 | * @param STRING $category |
||
453 | * @param STRING $action |
||
454 | * @param STRING $type |
||
455 | * @return boolean |
||
456 | */ |
||
457 | 39 | static function userNeedsSecurityGroup($user_id, $category, $action,$type='module'){ |
|
458 | //check if we don't have it set in the cache if not lets reload the cache |
||
459 | |||
460 | 39 | if(empty($_SESSION['ACL'][$user_id][$category][$type][$action])){ |
|
461 | 2 | ACLAction::getUserActions($user_id, false); |
|
462 | |||
463 | } |
||
464 | |||
465 | 39 | if(!empty($_SESSION['ACL'][$user_id][$category][$type][$action])){ |
|
466 | 39 | return $_SESSION['ACL'][$user_id][$category][$type][$action]['aclaccess'] == ACL_ALLOW_GROUP; |
|
467 | } |
||
468 | 1 | return false; |
|
469 | } |
||
470 | /* END - SECURITY GROUPS */ |
||
471 | |||
472 | |||
473 | |||
474 | |||
475 | |||
476 | |||
477 | |||
478 | |||
479 | /** |
||
480 | * static function userHasAccess($user_id, $category, $action, $is_owner = false) |
||
481 | * |
||
482 | * @param GUID $user_id the user id who you want to check access for |
||
483 | * @param STRING $category the category you would like to check access for |
||
484 | * @param STRING $action the action of that category you would like to check access for |
||
485 | * @param BOOLEAN OPTIONAL $is_owner if the object is owned by the user you are checking access for |
||
486 | */ |
||
487 | /* BEGIN - SECURITY GROUPS - added $in_group */ |
||
488 | /** |
||
489 | public static function userHasAccess($user_id, $category, $action,$type='module', $is_owner = false){ |
||
490 | */ |
||
491 | 47 | public static function userHasAccess($user_id, $category, $action,$type='module', $is_owner = false, $in_group = false){ |
|
492 | 47 | global $current_user; |
|
493 | 47 | if($current_user->isAdminForModule($category)&& !isset($_SESSION['ACL'][$user_id][$category][$type][$action]['aclaccess'])){ |
|
494 | return true; |
||
495 | } |
||
496 | //check if we don't have it set in the cache if not lets reload the cache |
||
497 | 47 | if(ACLAction::getUserAccessLevel($user_id, $category, 'access', $type) < ACL_ALLOW_ENABLED) return false; |
|
498 | 47 | if(empty($_SESSION['ACL'][$user_id][$category][$type][$action])){ |
|
499 | ACLAction::getUserActions($user_id, false); |
||
500 | |||
501 | } |
||
502 | |||
503 | 47 | if(!empty($_SESSION['ACL'][$user_id][$category][$type][$action])){ |
|
504 | /** |
||
505 | return ACLAction::hasAccess($is_owner, $_SESSION['ACL'][$user_id][$category][$type][$action]['aclaccess']); |
||
506 | */ |
||
507 | 47 | return ACLAction::hasAccess($is_owner, $in_group, $_SESSION['ACL'][$user_id][$category][$type][$action]['aclaccess']); |
|
508 | } |
||
509 | return false; |
||
510 | |||
511 | } |
||
512 | /* END - SECURITY GROUPS */ |
||
513 | /** |
||
514 | * function getUserAccessLevel($user_id, $category, $action,$type='module') |
||
515 | * returns the access level for a given category and action |
||
516 | * |
||
517 | * @param GUID $user_id |
||
518 | * @param STRING $category |
||
519 | * @param STRING $action |
||
520 | * @param STRING $type |
||
521 | * @return INT (ACCESS LEVEL) |
||
522 | */ |
||
523 | 48 | public static function getUserAccessLevel($user_id, $category, $action,$type='module'){ |
|
524 | 48 | if(empty($_SESSION['ACL'][$user_id][$category][$type][$action])){ |
|
525 | 43 | ACLAction::getUserActions($user_id, false); |
|
526 | |||
527 | } |
||
528 | 48 | if(!empty($_SESSION['ACL'][$user_id][$category][$type][$action])){ |
|
529 | 48 | if (!empty($_SESSION['ACL'][$user_id][$category][$type]['admin']) && $_SESSION['ACL'][$user_id][$category][$type]['admin']['aclaccess'] >= ACL_ALLOW_ADMIN) |
|
530 | { |
||
531 | // If you have admin access for a module, all ACL's are allowed |
||
532 | return $_SESSION['ACL'][$user_id][$category][$type]['admin']['aclaccess']; |
||
533 | } |
||
534 | 48 | return $_SESSION['ACL'][$user_id][$category][$type][$action]['aclaccess']; |
|
535 | } |
||
536 | 1 | } |
|
537 | |||
538 | /** |
||
539 | * STATIC function userNeedsOwnership($user_id, $category, $action,$type='module') |
||
540 | * checks if a user should have ownership to do an action |
||
541 | * |
||
542 | * @param GUID $user_id |
||
543 | * @param STRING $category |
||
544 | * @param STRING $action |
||
545 | * @param STRING $type |
||
546 | * @return boolean |
||
547 | */ |
||
548 | 39 | public static function userNeedsOwnership($user_id, $category, $action,$type='module'){ |
|
549 | //check if we don't have it set in the cache if not lets reload the cache |
||
550 | |||
551 | 39 | if(empty($_SESSION['ACL'][$user_id][$category][$type][$action])){ |
|
552 | 30 | ACLAction::getUserActions($user_id, false); |
|
553 | |||
554 | } |
||
555 | |||
556 | |||
557 | 39 | if(!empty($_SESSION['ACL'][$user_id][$category][$type][$action])){ |
|
558 | 39 | return $_SESSION['ACL'][$user_id][$category][$type][$action]['aclaccess'] == ACL_ALLOW_OWNER; |
|
559 | } |
||
560 | 1 | return false; |
|
561 | |||
562 | } |
||
563 | /** |
||
564 | * |
||
565 | * static pass by ref setupCategoriesMatrix(&$categories) |
||
566 | * takes in an array of categories and modifes them adding display information |
||
567 | * |
||
568 | * @param unknown_type $categories |
||
569 | */ |
||
570 | 1 | public static function setupCategoriesMatrix(&$categories){ |
|
571 | 1 | global $ACLActions, $current_user; |
|
572 | 1 | $names = array(); |
|
573 | 1 | $disabled = array(); |
|
574 | 1 | foreach($categories as $cat_name=>$category){ |
|
575 | 1 | foreach($category as $type_name=>$type){ |
|
576 | 1 | foreach($type as $act_name=>$action){ |
|
577 | 1 | $names[$act_name] = translate($ACLActions[$type_name]['actions'][$act_name]['label'], 'ACLActions'); |
|
578 | 1 | $categories[$cat_name][$type_name][$act_name]['accessColor'] = ACLAction::AccessColor($action['aclaccess']); |
|
579 | 1 | if($type_name== 'module'){ |
|
580 | |||
581 | 1 | if($act_name != 'aclaccess' && $categories[$cat_name]['module']['access']['aclaccess'] == ACL_ALLOW_DISABLED){ |
|
582 | $categories[$cat_name][$type_name][$act_name]['accessColor'] = 'darkgray'; |
||
583 | $disabled[] = $cat_name; |
||
584 | } |
||
585 | |||
586 | } |
||
587 | 1 | $categories[$cat_name][$type_name][$act_name]['accessName'] = ACLAction::AccessName($action['aclaccess']); |
|
588 | 1 | $categories[$cat_name][$type_name][$act_name]['accessLabel'] = ACLAction::AccessLabel($action['aclaccess']); |
|
589 | |||
590 | 1 | if($cat_name=='Users'&& $act_name=='admin'){ |
|
591 | $categories[$cat_name][$type_name][$act_name]['accessOptions'][ACL_ALLOW_DEFAULT]=ACLAction::AccessName(ACL_ALLOW_DEFAULT);; |
||
592 | $categories[$cat_name][$type_name][$act_name]['accessOptions'][ACL_ALLOW_DEV]=ACLAction::AccessName(ACL_ALLOW_DEV);; |
||
593 | } |
||
594 | else{ |
||
595 | 1 | $categories[$cat_name][$type_name][$act_name]['accessOptions'] = ACLAction::getAccessOptions($act_name, $type_name); |
|
596 | } |
||
597 | } |
||
598 | } |
||
599 | } |
||
600 | |||
601 | 1 | if(!is_admin($current_user)){ |
|
602 | 1 | foreach($disabled as $cat_name){ |
|
603 | unset($categories[$cat_name]); |
||
604 | } |
||
605 | } |
||
606 | 1 | return $names; |
|
607 | } |
||
608 | |||
609 | |||
610 | |||
611 | /** |
||
612 | * function toArray() |
||
613 | * returns this acl as an array |
||
614 | * |
||
615 | * @return array of fields with id, name, access and category |
||
616 | */ |
||
617 | 91 | function toArray($dbOnly = false, $stringOnly = false, $upperKeys = false){ |
|
618 | 91 | $array_fields = array('id', 'aclaccess'); |
|
619 | 91 | $arr = array(); |
|
620 | 91 | foreach($array_fields as $field){ |
|
621 | 91 | $arr[$field] = $this->$field; |
|
622 | } |
||
623 | 91 | return $arr; |
|
624 | } |
||
625 | |||
626 | /** |
||
627 | * function fromArray($arr) |
||
628 | * converts an array into an acl mapping name value pairs into files |
||
629 | * |
||
630 | * @param Array $arr |
||
631 | */ |
||
632 | 1 | function fromArray($arr){ |
|
633 | 1 | foreach($arr as $name=>$value){ |
|
634 | 1 | $this->$name = $value; |
|
635 | } |
||
636 | 1 | } |
|
637 | |||
638 | /** |
||
639 | * function clearSessionCache() |
||
640 | * clears the session variable storing the cache information for acls |
||
641 | * |
||
642 | */ |
||
643 | 1 | function clearSessionCache(){ |
|
644 | 1 | unset($_SESSION['ACL']); |
|
645 | 1 | } |
|
646 | |||
647 | |||
648 | |||
649 | |||
650 | |||
651 | |||
652 | |||
653 | |||
654 | |||
655 | |||
656 | |||
657 | |||
658 | |||
659 | } |
||
660 |