Initial commit
This commit is contained in:
264
indefero/src/IDF/Precondition.php
Normal file
264
indefero/src/IDF/Precondition.php
Normal file
@@ -0,0 +1,264 @@
|
||||
<?php
|
||||
/* -*- tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
|
||||
/*
|
||||
# ***** BEGIN LICENSE BLOCK *****
|
||||
# This file is part of InDefero, an open source project management application.
|
||||
# Copyright (C) 2008-2011 Céondo Ltd and contributors.
|
||||
#
|
||||
# InDefero is free software; you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation; either version 2 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# InDefero is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program; if not, write to the Free Software
|
||||
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
||||
#
|
||||
# ***** END LICENSE BLOCK ***** */
|
||||
|
||||
class IDF_Precondition
|
||||
{
|
||||
/**
|
||||
* Check if the user has a base authorization to access a given
|
||||
* tab. This used in the case of private project. You need to
|
||||
* further control with the accessSource, accessIssues,
|
||||
* etc. preconditions.
|
||||
*
|
||||
* @param Pluf_HTTP_Request
|
||||
* @return mixed
|
||||
*/
|
||||
static public function baseAccess($request)
|
||||
{
|
||||
if (!$request->project->private) {
|
||||
return true;
|
||||
}
|
||||
if ($request->user->hasPerm('IDF.project-authorized-user', $request->project)) {
|
||||
return true;
|
||||
}
|
||||
return self::projectMemberOrOwner($request);
|
||||
}
|
||||
|
||||
/**
|
||||
* Check if the user is project owner.
|
||||
*
|
||||
* @param Pluf_HTTP_Request
|
||||
* @return mixed
|
||||
*/
|
||||
static public function projectOwner($request)
|
||||
{
|
||||
$res = Pluf_Precondition::loginRequired($request);
|
||||
if (true !== $res) {
|
||||
return $res;
|
||||
}
|
||||
if ($request->user->hasPerm('IDF.project-owner', $request->project)) {
|
||||
return true;
|
||||
}
|
||||
return new Pluf_HTTP_Response_Forbidden($request);
|
||||
}
|
||||
|
||||
/**
|
||||
* Check if the user is project owner or member.
|
||||
*
|
||||
* @param Pluf_HTTP_Request
|
||||
* @return mixed
|
||||
*/
|
||||
static public function projectMemberOrOwner($request)
|
||||
{
|
||||
$res = Pluf_Precondition::loginRequired($request);
|
||||
if (true !== $res) {
|
||||
return $res;
|
||||
}
|
||||
if ($request->user->hasPerm('IDF.project-owner', $request->project)
|
||||
or
|
||||
$request->user->hasPerm('IDF.project-member', $request->project)
|
||||
) {
|
||||
return true;
|
||||
}
|
||||
return new Pluf_HTTP_Response_Forbidden($request);
|
||||
}
|
||||
|
||||
/**
|
||||
* Check if the user can access a given element.
|
||||
*
|
||||
* The rights are:
|
||||
* - 'all' (default)
|
||||
* - 'none'
|
||||
* - 'login'
|
||||
* - 'members'
|
||||
* - 'owners'
|
||||
*
|
||||
* The order of the rights is such that a 'owner' is also a
|
||||
* 'member' and of course a logged in person.
|
||||
*
|
||||
* @param Pluf_HTTP_Request
|
||||
* @param string Control key
|
||||
* @return mixed
|
||||
*/
|
||||
static public function accessTabGeneric($request, $key)
|
||||
{
|
||||
switch ($request->conf->getVal($key, 'all')) {
|
||||
case 'none':
|
||||
return new Pluf_HTTP_Response_Forbidden($request);
|
||||
case 'login':
|
||||
return Pluf_Precondition::loginRequired($request);
|
||||
case 'members':
|
||||
return self::projectMemberOrOwner($request);
|
||||
case 'owners':
|
||||
return self::projectOwner($request);
|
||||
case 'all':
|
||||
default:
|
||||
return true;
|
||||
}
|
||||
}
|
||||
|
||||
static public function accessSource($request)
|
||||
{
|
||||
$res = self::baseAccess($request);
|
||||
if (true !== $res) {
|
||||
return $res;
|
||||
}
|
||||
return self::accessTabGeneric($request, 'source_access_rights');
|
||||
}
|
||||
|
||||
static public function accessIssues($request)
|
||||
{
|
||||
$res = self::baseAccess($request);
|
||||
if (true !== $res) {
|
||||
return $res;
|
||||
}
|
||||
return self::accessTabGeneric($request, 'issues_access_rights');
|
||||
}
|
||||
|
||||
static public function accessDownloads($request)
|
||||
{
|
||||
$res = self::baseAccess($request);
|
||||
if (true !== $res) {
|
||||
return $res;
|
||||
}
|
||||
return self::accessTabGeneric($request, 'downloads_access_rights');
|
||||
}
|
||||
|
||||
static public function accessWiki($request)
|
||||
{
|
||||
$res = self::baseAccess($request);
|
||||
if (true !== $res) {
|
||||
return $res;
|
||||
}
|
||||
return self::accessTabGeneric($request, 'wiki_access_rights');
|
||||
}
|
||||
|
||||
static public function accessReview($request)
|
||||
{
|
||||
$res = self::baseAccess($request);
|
||||
if (true !== $res) {
|
||||
return $res;
|
||||
}
|
||||
return self::accessTabGeneric($request, 'review_access_rights');
|
||||
}
|
||||
|
||||
/**
|
||||
* Based on the request, it is automatically setting the user.
|
||||
*
|
||||
* API calls are not translated.
|
||||
*/
|
||||
static public function apiSetUser($request)
|
||||
{
|
||||
// REQUEST is used to be used both for POST and GET requests.
|
||||
if (!isset($request->REQUEST['_hash'])
|
||||
or !isset($request->REQUEST['_login'])
|
||||
or !isset($request->REQUEST['_salt'])) {
|
||||
// equivalent to anonymous access.
|
||||
return true;
|
||||
}
|
||||
$db =& Pluf::db();
|
||||
$true = Pluf_DB_BooleanToDb(true, $db);
|
||||
$sql = new Pluf_SQL('login=%s AND active='.$true,
|
||||
$request->REQUEST['_login']);
|
||||
$users = Pluf::factory('Pluf_User')->getList(array('filter'=>$sql->gen()));
|
||||
if ($users->count() != 1 or !$users[0]->active) {
|
||||
// Should return a special authentication error like user
|
||||
// not found.
|
||||
return true;
|
||||
}
|
||||
$hash = sha1($request->REQUEST['_salt'].sha1($users[0]->password));
|
||||
if ($hash != $request->REQUEST['_hash']) {
|
||||
return true; // Again need authentication error
|
||||
}
|
||||
$request->user = $users[0];
|
||||
|
||||
// Don't try to load projects rights access if we are not in one
|
||||
if ($request->query !== "/api/") {
|
||||
IDF_Middleware::setRights($request);
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
/**
|
||||
* Based on the request, it is automatically setting the user.
|
||||
*
|
||||
* Authenticated feeds have a token set at the end of the url in
|
||||
* the for of 'authenticated/url/token/234092384023woeiur/'. If
|
||||
* you remove 'token/234092384023woeiur/' the url is not
|
||||
* authenticated.
|
||||
*
|
||||
* If the user is already logged in and not anonymous and no token
|
||||
* is given, then the user is unset and a non authenticated user
|
||||
* is loaded. This is to avoid people to not understand why a
|
||||
* normally not authenticated feed is providing authenticated
|
||||
* data.
|
||||
*/
|
||||
static public function feedSetUser($request)
|
||||
{
|
||||
if (!isset($request->project)) {
|
||||
return true; // we do not act on non project pages at the
|
||||
// moment.
|
||||
}
|
||||
if (!$request->user->isAnonymous()) {
|
||||
// by default anonymous
|
||||
$request->user = new Pluf_User();
|
||||
IDF_Middleware::setRights($request);
|
||||
}
|
||||
$match = array();
|
||||
if (!preg_match('#/token/([^/]+)/$#', $request->query, $match)) {
|
||||
return true; // anonymous
|
||||
}
|
||||
$token = $match[1];
|
||||
$hash = substr($token, 0, 2);
|
||||
$encrypted = substr($token, 2);
|
||||
if ($hash != substr(md5(Pluf::f('secret_key').$encrypted), 0, 2)) {
|
||||
return true; // no match in the hash, anonymous
|
||||
}
|
||||
$cr = new Pluf_Crypt(md5(Pluf::f('secret_key')));
|
||||
list($userid, $projectid) = explode(':', $cr->decrypt($encrypted), 2);
|
||||
if ($projectid != $request->project->id) {
|
||||
return true; // anonymous
|
||||
}
|
||||
$user = new Pluf_User($userid);
|
||||
if (!$user->active) {
|
||||
return true; // anonymous
|
||||
}
|
||||
$request->user = $user;
|
||||
IDF_Middleware::setRights($request);
|
||||
return true;
|
||||
}
|
||||
|
||||
/**
|
||||
* Generate the token for the feed.
|
||||
*
|
||||
* @param IDF_Project
|
||||
* @param Pluf_User
|
||||
* @return string Token
|
||||
*/
|
||||
static public function genFeedToken($project, $user)
|
||||
{
|
||||
$cr = new Pluf_Crypt(md5(Pluf::f('secret_key')));
|
||||
$encrypted = trim($cr->encrypt($user->id.':'.$project->id), '~');
|
||||
return substr(md5(Pluf::f('secret_key').$encrypted), 0, 2).$encrypted;
|
||||
}
|
||||
}
|
Reference in New Issue
Block a user