User.php 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825
  1. <?php
  2. Lib::loadClass('UserProfile');
  3. Lib::loadClass('Router');
  4. Lib::loadClass('DebugExecutionTime');
  5. class User {
  6. public static function getLogin() {
  7. return V::get('ADM_ACCOUNT', '', $_SESSION);
  8. }
  9. public static function getName() {
  10. return V::get('ADM_ACCOUNT', '', $_SESSION);
  11. }
  12. public static function getID() {
  13. if (V::get('ADM_ID', 0, $_SESSION, 'int') <= 0) {
  14. self::_fetchMoreUserData();
  15. }
  16. return V::get('ADM_ID', '', $_SESSION);
  17. }
  18. public static function getType() {
  19. if (empty($_SESSION['EMPLOYEE_TYPE'])) {
  20. self::_fetchMoreUserData();
  21. }
  22. return V::get('EMPLOYEE_TYPE', '', $_SESSION);
  23. }
  24. public static function getFullName() {
  25. return V::get('ADM_NAME', '', $_SESSION);
  26. }
  27. public static function getInicjaly() {
  28. if (!array_key_exists('ADM_INICJALY_HANDLOWCA', $_SESSION)) {
  29. self::_fetchMoreUserData();
  30. }
  31. return $_SESSION['ADM_INICJALY_HANDLOWCA'];
  32. }
  33. public static function getDefaultAclGroup() {
  34. if (!array_key_exists('DEFAULT_ACL_GROUP', $_SESSION)) {
  35. self::_fetchMoreUserData();
  36. }
  37. return $_SESSION['DEFAULT_ACL_GROUP'];
  38. }
  39. public static function _fetchMoreUserData() {
  40. $login = self::getLogin();
  41. if (empty($login)) return false;
  42. $sql = "
  43. select u.ID as ADM_ID
  44. , u.INICJALY_HANDLOWCA as ADM_INICJALY_HANDLOWCA
  45. , u.EMPLOYEE_TYPE
  46. , u.DEFAULT_ACL_GROUP
  47. from `ADMIN_USERS` u
  48. where `ADM_ACCOUNT`='{$login}'
  49. ";
  50. if ($userInfo = DB::getPDO()->fetchFirstNoLog($sql)) {
  51. $_SESSION['ADM_ID'] = $userInfo['ADM_ID'];
  52. $_SESSION['ADM_INICJALY_HANDLOWCA'] = $userInfo['ADM_INICJALY_HANDLOWCA'];
  53. $_SESSION['EMPLOYEE_TYPE'] = $userInfo['EMPLOYEE_TYPE'];
  54. $_SESSION['DEFAULT_ACL_GROUP'] = $userInfo['DEFAULT_ACL_GROUP'];
  55. return $userInfo;
  56. }
  57. return [];
  58. }
  59. public static function logged() {
  60. return (!empty($_SESSION['AUTHORIZE_USER']))? true : false;
  61. }
  62. public static function get( $key ) {
  63. return V::get($key, '', $_SESSION);
  64. }
  65. public static function getGroups() {
  66. $groups = User::_fetchGroups();
  67. return $groups;
  68. }
  69. public static function getGroupsIds() {
  70. $groups = User::_fetchGroups();
  71. return array_keys($groups);
  72. }
  73. public static function _fetchGroups() {
  74. static $_groups;
  75. if (!$_groups) {
  76. $user_id = User::getID();
  77. Lib::loadClass('UsersHelper');
  78. $_groups = UsersHelper::getGroupByUser($user_id);
  79. }
  80. return $_groups;
  81. }
  82. public static function loadProfile($force = false) {
  83. return UserProfile::load($force);
  84. }
  85. public static function saveProfile() {
  86. return UserProfile::save();
  87. }
  88. public static function getProfile($key) {
  89. return UserProfile::get($key);
  90. }
  91. public static function setProfile($key, $val) {
  92. UserProfile::set($key, $val);
  93. }
  94. public static function getProfileColumn($column_name, $key) {
  95. return UserProfile::getColumn($column_name, $key);
  96. }
  97. public static function setProfileColumn($column_name, $key, $value) {
  98. UserProfile::setColumn($column_name, $key, $value);
  99. }
  100. public static function removeProfileColumn($column_name, $key) {
  101. UserProfile::removeColumn($column_name, $key);
  102. }
  103. public static function isAdmin() {
  104. if (in_array(self::get('ADM_ADMIN_LEVEL'), array(0, 1))) {
  105. return true;
  106. }
  107. return false;
  108. }
  109. public static function getRawData() {
  110. $ret = array();
  111. if (self::logged()) {
  112. $ret['id'] = self::getID();
  113. $ret['login'] = self::getName();
  114. $ret['name'] = self::get('ADM_NAME');
  115. $ret['admin_level'] = self::get('ADM_ADMIN_LEVEL');
  116. $ret['opis'] = self::get('ADM_ADMIN_DESC');
  117. }
  118. return $ret;
  119. }
  120. public static function getCurrentUserObject() {
  121. $user = new stdClass();
  122. if (self::logged()) {
  123. $user->ID = $_SESSION['ADM_ID'];
  124. $user->ADM_ACCOUNT = $_SESSION['AUTHORIZE_USER'];
  125. $user->ADM_ACCOUNT = $_SESSION['ADM_ACCOUNT'];
  126. $user->ADM_NAME = $_SESSION['ADM_NAME'];
  127. $user->ADM_TECH_WORKER = $_SESSION['ADM_TECH_WORKER'];
  128. $user->ADM_COMPANY = $_SESSION['ADM_COMPANY'];
  129. $user->ADM_ADMIN_LEVEL = $_SESSION['ADM_ADMIN_LEVEL'];
  130. $user->ADM_PHONE = $_SESSION['ADM_PHONE'];
  131. $user->ADM_ADMIN_EXPIRE = $_SESSION['ADM_ADMIN_EXPIRE'];
  132. $user->ADM_ADMIN_DESC = $_SESSION['ADM_ADMIN_DESC'];
  133. $user->EMPLOYEE_TYPE = $_SESSION['EMPLOYEE_TYPE'];
  134. }
  135. return $user;
  136. }
  137. public static function getAcl($acl = null) {
  138. static $_acl;
  139. if ($_acl) return $_acl;
  140. if (null !== $acl) {// force set acl
  141. $_acl = $acl;
  142. return $_acl;
  143. }
  144. Lib::loadClass('UserAcl');
  145. $_acl = new UserAcl(self::getID(), $use_cache = true);
  146. $_acl->fetchGroups();
  147. return $_acl;
  148. }
  149. public static function reloadAcl() {
  150. IF('123'==V::get('DBG_ACL','',$_GET)){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">SESSION KEYS (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): [';echo implode(',', array_keys($_SESSION));echo']</pre>';}
  151. /*
  152. * [3] => USER_PROFILE
  153. * [29] => CRM_PROCES_USERA_WYKONANE_TESTY-4517
  154. * [30] => TableAjax_Cache
  155. */
  156. IF('123'==V::get('DBG_ACL','',$_GET)){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">CONFIG (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($_SESSION['CONFIG']);echo'</pre>';}
  157. IF('123'==V::get('DBG_ACL','',$_GET)){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">TableAjax_Cache (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($_SESSION['TableAjax_Cache']);echo'</pre>';}
  158. unset($_SESSION['TableAcl_cache']);
  159. unset($_SESSION['Typespecial_Cache']);
  160. unset($_SESSION['ADM_INICJALY_HANDLOWCA']);
  161. unset($_SESSION['EMPLOYEE_TYPE']);
  162. unset($_SESSION['DEFAULT_ACL_GROUP']);
  163. IF('123'==V::get('DBG_ACL','',$_GET)){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">SESSION KEYS (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): [';echo implode(',', array_keys($_SESSION));echo']</pre>';}
  164. $testySesKey = 'CRM_PROCES_USERA_WYKONANE_TESTY-' . User::getID();
  165. if (isset($_SESSION[$testySesKey])) unset($_SESSION[$testySesKey]);
  166. $userAcl = User::getAcl();
  167. $userAcl->fetchAllPerms(true);
  168. }
  169. public static function auth() {
  170. $route = V::get('_route', '', $_REQUEST);
  171. if (!empty($route)) {
  172. Router::handleAuth($route);
  173. } else {
  174. self::authByRequest();
  175. }
  176. if (User::logged() && !V::get('ADM_ACL_LOADED', false, $_SESSION)) {
  177. $userAcl = User::getAcl();
  178. $userAcl->fetchAllPerms();
  179. $_SESSION['ADM_ACL_LOADED'] = true;
  180. }
  181. if (User::logged() && User::isAdmin()) {
  182. if (V::get('DBG_ON', '', $_REQUEST)) {
  183. DBG::activate();
  184. }
  185. }
  186. if (V::get('DBG_OFF', '', $_REQUEST)) {
  187. DBG::deactivate();
  188. }
  189. }
  190. public static function authByRequest() {
  191. $task = V::get('LOGIN', '', $_REQUEST);
  192. $data = array();
  193. $data['errors'] = array();
  194. Lib::loadClass('Config');
  195. $data['ALLOW_GUEST_ACCOUNT'] = (int)Config::get('ALLOW_GUEST_ACCOUNT');
  196. switch ($task) {
  197. case 'LOGIN':
  198. if (!User::logged()) {
  199. $req_ADM_ACCOUNT = (isset($_REQUEST['ADM_ACCOUNT']))? $_REQUEST['ADM_ACCOUNT'] : '';
  200. $req_ADM_PASSWD = (isset($_REQUEST['ADM_PASSWD']))? $_REQUEST['ADM_PASSWD'] : '';
  201. if (empty($req_ADM_ACCOUNT) || empty($req_ADM_PASSWD)) {
  202. $data['errors'][] = "Proszę podać poprawny login i hasło!";
  203. } else {
  204. try {
  205. User::login($req_ADM_ACCOUNT, $req_ADM_PASSWD);
  206. } catch (Exception $e) {
  207. $data['errors'][] = $e->getMessage();
  208. session_destroy();
  209. unset($_SESSION['AUTHORIZE_USER']);
  210. unset($_SESSION['ADM_ACCOUNT']);
  211. Router::getRoute('Users')->logoutView($data);
  212. exit;
  213. }
  214. }
  215. }
  216. break;
  217. case 'LOGOUT':
  218. if (User::logged()) {
  219. $_SESSION = array();
  220. session_destroy();// Remove the server-side session information.
  221. session_write_close();
  222. session_start();
  223. session_regenerate_id(true);
  224. Router::getRoute('Users')->logoutView($data);
  225. exit;
  226. }
  227. break;
  228. case 'PERMS_RELOAD':
  229. if (User::logged()) {
  230. try {
  231. $dbgExecTime = new DebugExecutionTime();
  232. $dbgExecTime->activate();
  233. $dbgExecTime->log('start');
  234. $routeFixCrmProcesInitIdx = Router::getRoute('FixCrmProcesInitIdx');
  235. if ($routeFixCrmProcesInitIdx) {
  236. $routeFixCrmProcesInitIdx->runMethod('callProcedure');
  237. }
  238. $dbgExecTime->log('FixCrmProcesInitIdx::callProcedure');
  239. $fixAllPermsExecTime = $dbgExecTime->getLastExecTime();
  240. User::reloadAcl();
  241. $dbgExecTime->log('User::reloadAcl');
  242. $fixUserPermsExecTime = $dbgExecTime->getLastExecTime();
  243. } catch (Exception $e) {
  244. $data['errors'][] = $e->getMessage();
  245. }
  246. Router::getRoute('Users')->reloadPermsView($data, $fixUserPermsExecTime);
  247. exit;
  248. }
  249. break;
  250. case 'PASSEDIT':
  251. if (User::logged()) {
  252. $data = array();
  253. if (!empty($_POST)) {
  254. if (empty($_POST['ADM_PASSWD_NEW']) || empty($_POST['ADM_PASSWD'])) {
  255. $data['msg'] = "Proszę podać stare i nowe hasło.";
  256. }
  257. }
  258. if (!empty($_POST['ADM_PASSWD_NEW']) && !empty($_POST['ADM_PASSWD'])) {
  259. $ret = User::changePasswd($_POST['ADM_PASSWD'], $_POST['ADM_PASSWD_NEW']);
  260. if ($ret) {
  261. $data['info'] = "Hasło zostało zmienione";
  262. } else {
  263. $data['error'] = "Nie udało się zmienić hasła";
  264. }
  265. }
  266. Router::getRoute('Users')->passeditView($data);
  267. exit;
  268. }
  269. break;
  270. case 'ANONYMOUS_LOGIN':
  271. if (!User::logged()) {
  272. if ($data['ALLOW_GUEST_ACCOUNT'] != 1) {
  273. $data['errors'][] = "Zablokowane logowaniwe na konto gościa!";
  274. }
  275. else {
  276. $anonim = User::getAnonymousAccount();
  277. if (!$anonim) {
  278. $data['errors'][] = "Konto gościa nie istnieje!";
  279. } else {
  280. try {
  281. User::login($anonim->ADM_ACCOUNT, $anonim->ADM_PASSWD);
  282. } catch (Exception $e) {
  283. $data['errors'][] = $e->getMessage();
  284. }
  285. }
  286. }
  287. }
  288. break;
  289. default:
  290. }
  291. if (!User::logged()) {
  292. Router::getRoute('Users')->loginView($data);
  293. exit;
  294. }
  295. }
  296. public static function kandydatLogin($kandydatId, &$errors = array()) {
  297. $user = self::kandydatLoginByDB($kandydatId, $errors);
  298. if ($user) {
  299. $_SESSION['ADM_ID'] = $user->ID;
  300. $_SESSION['AUTHORIZE_USER'] = $user->ADM_ACCOUNT;
  301. $_SESSION['ADM_ACCOUNT'] = $user->ADM_ACCOUNT;
  302. //$_SESSION['ADM_AREA'] = $user->ADM_AREA;
  303. $_SESSION['ADM_NAME'] = $user->ADM_NAME;
  304. $_SESSION['ADM_TECH_WORKER'] = $user->ADM_TECH_WORKER;
  305. $_SESSION['ADM_COMPANY'] = $user->ADM_COMPANY;
  306. $_SESSION['ADM_ADMIN_LEVEL'] = $user->ADM_ADMIN_LEVEL;
  307. $_SESSION['ADM_PHONE'] = $user->ADM_PHONE;
  308. $_SESSION['ADM_ADMIN_EXPIRE'] = $user->ADM_ADMIN_EXPIRE;
  309. $_SESSION['ADM_ADMIN_DESC'] = $user->ADM_ADMIN_DESC;
  310. $_SESSION['EMPLOYEE_TYPE'] = $user->EMPLOYEE_TYPE;
  311. // save user pass in encrypted form
  312. Lib::loadClass('Crypt');
  313. $_SESSION['ADM_PASS_HASH'] = Crypt::encrypt($pass);
  314. $_SESSION['EMAIL_IMAP_IMPORT_PASSWD_HASH'] = Crypt::encrypt($user->EMAIL_IMAP_IMPORT_PASSWD);
  315. $_SESSION['EMAIL_IMAP_IMPORT_HOST'] = $user->EMAIL_IMAP_IMPORT_HOST;
  316. $_SESSION['EMAIL_IMAP_IMPORT_USERNAME'] = $user->EMAIL_IMAP_IMPORT_USERNAME;
  317. //$keyFromHash = Crypt::decrypt($_SESSION['ADM_PASS_HASH']);
  318. $userAcl = User::getAcl();
  319. $userAcl->fetchAllPerms();
  320. return true;
  321. }
  322. return false;
  323. }
  324. public static function login($login, $pass) {
  325. Lib::loadClass('LDAP');
  326. $ldap = LDAP::getInstance();
  327. if ($ldap != null && $ldap->isConnected()) {
  328. $user = self::loginByLDAP($login, $pass);
  329. if ($user) { // user logged in by ldap - update password hash in db
  330. DB::getPDO()->update('ADMIN_USERS', 'ID', $user->ID, [
  331. 'ADM_PASSWD_AES' => hash('sha512', $pass), // Mysql: SHA2('{$pass}', 512)
  332. ]);
  333. }
  334. } else {
  335. $user = self::loginByDB($login, $pass);
  336. }
  337. if ($user) {
  338. $_SESSION['ADM_ID'] = $user->ID;
  339. $_SESSION['AUTHORIZE_USER'] = $user->ADM_ACCOUNT;
  340. $_SESSION['ADM_ACCOUNT'] = $user->ADM_ACCOUNT;
  341. //$_SESSION['ADM_AREA'] = $user->ADM_AREA;
  342. $_SESSION['ADM_NAME'] = $user->ADM_NAME;
  343. $_SESSION['ADM_TECH_WORKER'] = $user->ADM_TECH_WORKER;
  344. $_SESSION['ADM_COMPANY'] = $user->ADM_COMPANY;
  345. $_SESSION['ADM_ADMIN_LEVEL'] = $user->ADM_ADMIN_LEVEL;
  346. $_SESSION['ADM_PHONE'] = $user->ADM_PHONE;
  347. $_SESSION['ADM_ADMIN_EXPIRE'] = $user->ADM_ADMIN_EXPIRE;
  348. $_SESSION['ADM_ADMIN_DESC'] = $user->ADM_ADMIN_DESC;
  349. $_SESSION['EMPLOYEE_TYPE'] = $user->EMPLOYEE_TYPE;
  350. // save user pass in encrypted form
  351. Lib::loadClass('Crypt');
  352. $_SESSION['ADM_PASS_HASH'] = Crypt::encrypt($pass);
  353. $_SESSION['EMAIL_IMAP_IMPORT_PASSWD_HASH'] = Crypt::encrypt($user->EMAIL_IMAP_IMPORT_PASSWD);
  354. $_SESSION['EMAIL_IMAP_IMPORT_HOST'] = $user->EMAIL_IMAP_IMPORT_HOST;
  355. $_SESSION['EMAIL_IMAP_IMPORT_USERNAME'] = $user->EMAIL_IMAP_IMPORT_USERNAME;
  356. //$keyFromHash = Crypt::decrypt($_SESSION['ADM_PASS_HASH']);
  357. $userAcl = User::getAcl();
  358. $userAcl->fetchAllPerms();
  359. $_SESSION['ADM_ACL_LOADED'] = true;
  360. return true;
  361. }
  362. return false;
  363. }
  364. public static function loginByLDAP($login, $pass) {
  365. $ldapUser = array();
  366. $DBG = false;
  367. Lib::loadClass('LDAP');
  368. $ldap = LDAP::getInstance();
  369. if (!$ldap->isConnected()) {
  370. throw new Exception("Wystąpiły błędy podczas połączenia do bazy LDAP. Spróbuj ponownie za chwilę.");
  371. }
  372. $filter = (false !== strpos($login, '@'))? "(mail={$login})" : "(uid={$login})";
  373. //$filter = "cn=*";// show all ldap accounts
  374. $justthese = array();//array("uid", "givenName", "mail", "*");
  375. if($DBG){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">ldap_search (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r(array('ldaprdn'=>$ldap->getBaseDN(), 'filter'=>$filter, 'justthese'=>$justthese));echo'</pre>';}
  376. $res = $ldap->search($filter, 'cn=users', $justthese);
  377. if ($ldap->count_entries($res) > 0) {
  378. $entry = $ldap->first_entry($res);
  379. if ($entry) {
  380. $ldapUser['user_dn'] = $ldap->get_dn($entry);
  381. $val = $ldap->get_values($entry, 'uid');
  382. $ldapUser['uid'] = $val[0];
  383. $val = $ldap->get_values($entry, 'mail');
  384. $ldapUser['mail'] = $val[0];
  385. $val = $ldap->get_values($entry, 'cn');
  386. $ldapUser['cn'] = $val[0];
  387. } else {
  388. throw new Exception("Login nie istnieje");
  389. }
  390. if($DBG){// test
  391. echo'<pre style="overflow:auto;border:1px solid green;">';
  392. // print number of entries found
  393. echo "Number of entries found: " . $ldap->count_entries($res) . "\n";
  394. while ( $entry ) {
  395. $dn = $ldap->get_dn($entry);
  396. echo "<b>$dn</b>\n";
  397. $attrs = $ldap->get_attributes($entry);
  398. for ( $i=0; $i < $attrs['count']; $i++) {
  399. echo "$attrs[$i]: ";
  400. for ( $j=0; $j < $attrs[$attrs[$i]]['count']; $j++ ) {
  401. echo $attrs[$attrs[$i]][$j] . " ";
  402. }
  403. echo "\n";
  404. }
  405. echo "\n";
  406. $entry = $ldap->next_entry($entry);
  407. }
  408. $ldap->free_result($res);
  409. echo'</pre>';
  410. }// test
  411. }
  412. if (!$ldapUser['user_dn']) {
  413. throw new Exception("Proszę podać poprawny login i hasło!");
  414. }
  415. if($DBG){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">LDAP user (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($ldapUser);echo'</pre>';}
  416. if($DBG){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">ldap_bind (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r(array('ldaprdn'=>$ldapUser['user_dn'], 'pass'=>'***'));echo'</pre>';}
  417. $ldapbind = $ldap->bind($ldapUser['user_dn'], $pass, $errorMsg);
  418. if (!$ldapbind && "Error Binding to LDAP: No additional information is available." === $errorMsg) throw new Exception("Nieprawidłowy login lub hasło");
  419. if (!$ldapbind) throw new Exception("Wystąpiły błędy podczas próby logowania. {$errorMsg}");
  420. $user = new stdClass();
  421. $user->AUTHORIZE_USER = $ldapUser['uid'];
  422. $user->ADM_ACCOUNT = $ldapUser['uid'];
  423. $user->ADM_NAME = $ldapUser['cn'];
  424. $user->OTHER_INFO = $ldapUser['mail'];
  425. $rawUser = DB::getPDO()->fetchFirst("
  426. select u.*
  427. from ADMIN_USERS u
  428. where u.ADM_ACCOUNT = :login
  429. and u.A_STATUS in('WAITING', 'NORMAL')
  430. ", [
  431. ':login' => $user->ADM_ACCOUNT,
  432. ]);
  433. if (!$rawUser) throw new Exception("Wystąpiły błędy podczas próby logowania. Brak użytkownika w bazie danych.");
  434. $user->ID = $rawUser['ID'];
  435. $user->ADM_TECH_WORKER = $rawUser['ADM_TECH_WORKER'];
  436. $user->ADM_COMPANY = $rawUser['ADM_COMPANY'];
  437. $user->ADM_ADMIN_LEVEL = $rawUser['ADM_ADMIN_LEVEL'];
  438. $user->ADM_PHONE = $rawUser['ADM_PHONE'];
  439. $user->ADM_ADMIN_EXPIRE = $rawUser['ADM_ADMIN_EXPIRE'];
  440. $user->ADM_ADMIN_DESC = $rawUser['ADM_ADMIN_DESC'];
  441. $user->EMAIL_IMAP_IMPORT_PASSWD = $rawUser['EMAIL_IMAP_IMPORT_PASSWD'];
  442. $user->EMAIL_IMAP_IMPORT_HOST = $rawUser['EMAIL_IMAP_IMPORT_HOST'];
  443. $user->EMAIL_IMAP_IMPORT_USERNAME = $rawUser['EMAIL_IMAP_IMPORT_USERNAME'];
  444. $user->EMPLOYEE_TYPE = $rawUser['EMPLOYEE_TYPE'];
  445. return $user;
  446. }
  447. public static function loginByDB($login, $pass) {
  448. $rawUser = DB::getPDO()->fetchFirst("
  449. select u.*
  450. from ADMIN_USERS u
  451. where u.ADM_ACCOUNT = :login
  452. and u.ADM_PASSWD_AES = :pass_hash
  453. and u.A_STATUS in('WAITING', 'NORMAL')
  454. ", [
  455. ':login' => $login,
  456. ':pass_hash' => hash('sha512', $pass),
  457. ]);
  458. if (!$rawUser) { // TODO: error log - change password for user
  459. error_log("TODO: update password hash for user '{$login}'");
  460. $rawUser = DB::getPDO()->fetchFirst("
  461. select u.*
  462. from ADMIN_USERS u
  463. where u.ADM_ACCOUNT = :login
  464. and ( u.ADM_PASSWD = :pass or u.ADM_PASSWD = md5( :pass ) )
  465. and u.ADM_PASSWD != ''
  466. and u.A_STATUS in('WAITING', 'NORMAL')
  467. ", [
  468. ':login' => $login,
  469. ':pass' => $pass,
  470. ]);
  471. }
  472. if (!$rawUser) throw new Exception("Proszę podać poprawny login i hasło!");
  473. $user = new stdClass();
  474. $user->ID = $rawUser['ID'];
  475. $user->ADM_TECH_WORKER = $rawUser['ADM_TECH_WORKER'];
  476. $user->ADM_COMPANY = $rawUser['ADM_COMPANY'];
  477. $user->AUTHORIZE_USER = $rawUser['ADM_ACCOUNT'];
  478. $user->ADM_ACCOUNT = $rawUser['ADM_ACCOUNT'];
  479. $user->ADM_NAME = $rawUser['ADM_NAME'];
  480. $user->ADM_ADMIN_LEVEL = $rawUser['ADM_ADMIN_LEVEL'];
  481. $user->ADM_PHONE = $rawUser['ADM_PHONE'];
  482. $user->ADM_ADMIN_EXPIRE = $rawUser['ADM_ADMIN_EXPIRE'];
  483. $user->ADM_ADMIN_DESC = $rawUser['ADM_ADMIN_DESC'];
  484. $user->EMAIL_IMAP_IMPORT_PASSWD = $rawUser['EMAIL_IMAP_IMPORT_PASSWD'];
  485. $user->EMAIL_IMAP_IMPORT_HOST = $rawUser['EMAIL_IMAP_IMPORT_HOST'];
  486. $user->EMAIL_IMAP_IMPORT_USERNAME = $rawUser['EMAIL_IMAP_IMPORT_USERNAME'];
  487. $user->EMPLOYEE_TYPE = $rawUser['EMPLOYEE_TYPE'];
  488. //$user->ADM_AREA = $rawUser['ADM_AREA'];
  489. //$_SESSION['ADM_PASSWD'] = $pass;
  490. return $user;
  491. }
  492. public static function kandydatLoginByDB($kandydatId, &$errors) {
  493. $db = DB::getDB();
  494. $kandydatId = (int)$kandydatId;
  495. $sql = "SELECT u.*
  496. from `ADMIN_USERS` as u
  497. where
  498. u.`ID`='{$kandydatId}'
  499. and u.`A_STATUS` in('WAITING','NORMAL')
  500. LIMIT 0, 1;
  501. ";
  502. $res = $db->query($sql);
  503. if (!$res) {
  504. die("Error SQL login!");
  505. }
  506. $num_rows = $db->num_rows($res);
  507. if ($num_rows == 0) {
  508. $errors[] = "Podales zlego uzytkownika lub/i haslo()";
  509. }
  510. else if ($num_rows == 1) {
  511. if ($r = $db->fetch($res)) {
  512. $user = new stdClass();
  513. $user->ID = $r->ID;
  514. $user->ADM_TECH_WORKER = $r->ADM_TECH_WORKER;
  515. $user->ADM_COMPANY = $r->ADM_COMPANY;
  516. $user->AUTHORIZE_USER = $r->ADM_ACCOUNT;
  517. $user->ADM_ACCOUNT = $r->ADM_ACCOUNT;
  518. $user->ADM_NAME = $r->ADM_NAME;
  519. $user->ADM_ADMIN_LEVEL = $r->ADM_ADMIN_LEVEL;
  520. $user->ADM_PHONE = $r->ADM_PHONE;
  521. $user->ADM_ADMIN_EXPIRE = $r->ADM_ADMIN_EXPIRE;
  522. $user->ADM_ADMIN_DESC = $r->ADM_ADMIN_DESC;
  523. $user->EMAIL_IMAP_IMPORT_PASSWD = $r->EMAIL_IMAP_IMPORT_PASSWD;
  524. $user->EMAIL_IMAP_IMPORT_HOST = $r->EMAIL_IMAP_IMPORT_HOST;
  525. $user->EMAIL_IMAP_IMPORT_USERNAME = $r->EMAIL_IMAP_IMPORT_USERNAME;
  526. $user->EMPLOYEE_TYPE = $r->EMPLOYEE_TYPE;
  527. //$user->ADM_AREA = "$r->ADM_AREA";
  528. //$_SESSION['ADM_PASSWD'] = $pass;
  529. return $user;
  530. }
  531. }
  532. return false;
  533. }
  534. public static function changePasswd($oldPass, $newPass) { //TODO chyba nieuzywane - Bzyk @ 2018-02-15
  535. $db = DB::getDB();
  536. $newPass = $db->_($newPass);
  537. $oldPass = $db->_($oldPass);
  538. $username = $db->_(self::getName());
  539. $sql = "update `ADMIN_USERS` set
  540. `ADM_PASSWD`=md5('{$newPass}')
  541. where
  542. `ADM_ACCOUNT`='{$username}' and
  543. (`ADM_PASSWD`='{$oldPass}' or `ADM_PASSWD`=md5('{$oldPass}'))
  544. limit 1;
  545. ";
  546. $db->query($sql);
  547. return ($db->affected_rows() > 0);
  548. }
  549. public static function changePassword($oldPass, $newPass) {
  550. if (!is_string($newPass)) throw new Exception("Błąd parametru");
  551. if (strlen($newPass) < 8) throw new Exception("Hasło zbyt krótkie (min. 8 znaków)"); // TODO regex 1 mala litera, 1 mala litera, 1 cyfra, min. 8 znakow
  552. if (!self::logged()) throw new Exception("Użytkownik niezalogwany");
  553. Lib::loadClass('LDAP');
  554. $ldap = LDAP::getInstance();
  555. if ($ldap != null && $ldap->isConnected()) {
  556. self::changePasswordLDAP($oldPass, $newPass);
  557. } else {
  558. self::changePasswordDB($oldPass, $newPass);
  559. }
  560. }
  561. public static function changePasswordLDAP($oldPass, $newPass) {
  562. throw new Exception("changePassword::LDAP not implemented yet"); // TODO
  563. }
  564. public static function changePasswordDB($oldPass, $newPass) {
  565. try {
  566. $user = self::loginByDB(self::getLogin(), $oldPass);
  567. } catch (Exception $e) {
  568. throw new Exception("Błędne hasło");
  569. }
  570. if (!$user) throw new Exception("Błąd weryfikacji użytkownika");
  571. $affected = DB::getPDO()->update('ADMIN_USERS', 'ID', $user->ID, [
  572. 'ADM_PASSWD' => '',
  573. 'ADM_PASSWD_AES' => hash('sha512', $newPass), // Mysql: SHA2('{$pass}', 512)
  574. ]);
  575. $affected = 1;
  576. return ($affected > 0);
  577. }
  578. /**
  579. * Check user access.
  580. * @param string $name
  581. * 'menu' - access to view menu
  582. *
  583. * @from [4101] ADM_ADMIN_LEVEL
  584. * Poziom uprawnień - każdy powinien mieć poziom o numerze 3
  585. * kierownicy powinni mieć 2
  586. * a administratorzy 0
  587. * kandydaci poziom 6.
  588. * Poziom 1 umożliwia edycje procesów i zasobów
  589. * poziom 2 umożliwia ocenę testów
  590. * poziom 3 umożliwia widzenie systemu jakości.
  591. */
  592. public static function hasAccess($name) {
  593. switch ($name) {
  594. case 'menu': {
  595. if (User::get('ADM_ADMIN_LEVEL') < 6) {
  596. return true;
  597. }
  598. else {
  599. Lib::loadClass('Config');
  600. $ALLOW_GUEST_ACCOUNT = (int)Config::get('ALLOW_GUEST_ACCOUNT');
  601. if ($ALLOW_GUEST_ACCOUNT && User::getLogin() == 'anonymous') {
  602. return true;
  603. }
  604. }
  605. break;
  606. }
  607. case 'dbg': {
  608. return (0 == User::get('ADM_ADMIN_LEVEL'));
  609. break;
  610. }
  611. case 'procesy': {
  612. if (User::get('ADM_ADMIN_LEVEL') < 4) return true;
  613. break;
  614. }
  615. case 'procesy_admin': {
  616. if (User::get('ADM_ADMIN_LEVEL') < 2) return true;
  617. break;
  618. }
  619. case 'testy': {
  620. if (User::get('ADM_ADMIN_LEVEL') <= 6) return true;
  621. break;
  622. }
  623. case 'testy_wyniki': {
  624. if (User::get('ADM_ADMIN_LEVEL') < 3) return true;
  625. break;
  626. }
  627. case 'testy_wyniki_edit': {
  628. if (User::get('ADM_ADMIN_LEVEL') < 3) return true;
  629. break;
  630. }
  631. case 'testy_wyniki_read': {
  632. if (User::get('ADM_ADMIN_LEVEL') < 3) return true;
  633. break;
  634. }
  635. case 'user_add_group': {
  636. if (User::get('ADM_ADMIN_LEVEL') < 1) return true;
  637. break;
  638. }
  639. default:
  640. }
  641. return false;
  642. }
  643. public static function hasAccessToEditTable($tableName) {
  644. if (empty($tableName)) return;
  645. $userAcl = User::getAcl();
  646. $userAcl->fetchGroups();
  647. Lib::loadClass('ProcesHelper');
  648. $zasobID = ProcesHelper::getZasobTableID($tableName);
  649. if (!$userAcl->hasTableAcl($zasobID)) {
  650. return false;
  651. }
  652. $tblAcl = $userAcl->getTableAcl($zasobID);
  653. if (empty($tblAcl)) {
  654. echo "Brak dostępu do tabeli nr {$zasobID} '{$tableName}'"; return;
  655. //throw new Exception("Brak dostępu do tabeli nr {$zasobID} '{$tableName}'");
  656. }
  657. $tblAcl->init();
  658. return $tblAcl->hasEditPerms();
  659. }
  660. public static function hasGroup($groupName) {
  661. // TODO: find group by name @see self::getGroups() @used in SchemaReaderProcess
  662. return false;
  663. }
  664. public static function getAnonymousAccount() {
  665. $db = DB::getDB();
  666. if (!$db) die("Error DB connection!");
  667. $sql = "select u.*
  668. from `ADMIN_USERS` as u
  669. where
  670. u.`ADM_ACCOUNT`='anonymous'
  671. and u.`EMPLOYEE_TYPE`='Anonymous'
  672. and u.`A_STATUS` in('NORMAL')
  673. order by u.`ID` asc
  674. limit 1
  675. ";
  676. $res = $db->query($sql);
  677. if (!$res) die("Error SQL login!");
  678. $num_rows = $db->num_rows($res);
  679. if ($r = $db->fetch($res)) {
  680. //$_SESSION['ADM_PASSWD'] = $pass;
  681. $user = new stdClass();
  682. $user->ID = "$r->ID";
  683. $user->AUTHORIZE_USER = "$r->ADM_ACCOUNT";
  684. $user->ADM_ACCOUNT = "$r->ADM_ACCOUNT";
  685. $user->ADM_PASSWD = "$r->ADM_PASSWD";
  686. //$user->ADM_AREA = "$r->ADM_AREA";
  687. $user->ADM_NAME = "$r->ADM_NAME";
  688. $user->ADM_TECH_WORKER = "$r->ADM_TECH_WORKER";
  689. $user->ADM_COMPANY = "$r->ADM_COMPANY";
  690. $user->ADM_ADMIN_LEVEL = "$r->ADM_ADMIN_LEVEL";
  691. $user->ADM_PHONE = "$r->ADM_PHONE";
  692. $user->ADM_ADMIN_EXPIRE = "$r->ADM_ADMIN_EXPIRE";
  693. $user->ADM_ADMIN_DESC = "$r->ADM_ADMIN_DESC";
  694. return $user;
  695. }
  696. return false;
  697. }
  698. public static function getLdapGroups() {
  699. $ldapGroups = User::_fetchLdapGroups();
  700. return $ldapGroups;
  701. }
  702. public static function getLdapGroupsNames() {
  703. $ldapGroupsNames = array();
  704. $ldapGroups = User::_fetchLdapGroups();
  705. foreach ($ldapGroups as $kID => $vLDAPGroup) {
  706. $ldapGroupsNames[$kID] = $vLDAPGroup->cn;
  707. }
  708. return $ldapGroupsNames;
  709. }
  710. public static function getLdapGroupsIds() {
  711. $ldapGroups = User::_fetchLdapGroups();
  712. $gidNumbers = array();
  713. if (!empty($ldapGroups)) {
  714. foreach ($ldapGroups as $vLdapGroup) {
  715. $gidNumbers[] = $vLdapGroup->gidNumber;
  716. }
  717. }
  718. return $gidNumbers;
  719. }
  720. public static function _fetchLdapGroups() {
  721. static $_groups;
  722. if (!$_groups) {
  723. $login = User::getLogin();
  724. Lib::loadClass('UsersLdapHelper');
  725. $_groups = UsersLdapHelper::getUserGroups($login, 3);
  726. //echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">getLDAPGroupByUserName (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($_groups);echo'</pre>';
  727. }
  728. return $_groups;
  729. }
  730. }