User.php 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803
  1. <?php
  2. Lib::loadClass('UserProfile');
  3. Lib::loadClass('Router');
  4. Lib::loadClass('DebugExecutionTime');
  5. class User {
  6. public static function getLogin() {
  7. return V::get('ADM_ACCOUNT', '', $_SESSION);
  8. }
  9. public static function getName() {
  10. return V::get('ADM_ACCOUNT', '', $_SESSION);
  11. }
  12. public static function getID() {
  13. if (V::get('ADM_ID', 0, $_SESSION, 'int') <= 0) {
  14. self::_fetchMoreUserData();
  15. }
  16. return V::get('ADM_ID', '', $_SESSION);
  17. }
  18. public static function getType() {
  19. if (!empty($_SESSION['EMPLOYEE_TYPE'])) {
  20. self::_fetchMoreUserData();
  21. }
  22. return V::get('EMPLOYEE_TYPE', '', $_SESSION);
  23. }
  24. public static function getFullName() {
  25. return V::get('ADM_NAME', '', $_SESSION);
  26. }
  27. public static function getInicjaly() {
  28. if (!V::get('ADM_INICJALY_HANDLOWCA', '', $_SESSION)) {
  29. self::_fetchMoreUserData();
  30. }
  31. return $_SESSION['ADM_INICJALY_HANDLOWCA'];
  32. }
  33. public static function getDefaultAclGroup() {
  34. if (!V::get('DEFAULT_ACL_GROUP', '', $_SESSION)) {
  35. self::_fetchMoreUserData();
  36. }
  37. return $_SESSION['DEFAULT_ACL_GROUP'];
  38. }
  39. public static function _fetchMoreUserData() {
  40. $db = DB::getDB();
  41. $login = self::getLogin();
  42. if (empty($login)) return false;
  43. $sql = "select `ID`, `INICJALY_HANDLOWCA`, `EMPLOYEE_TYPE`
  44. , `DEFAULT_ACL_GROUP`
  45. from `ADMIN_USERS`
  46. where `ADM_ACCOUNT`='{$login}'
  47. limit 1
  48. ";
  49. $res = $db->query($sql);
  50. if ($r = $db->fetch($res)) {
  51. $_SESSION['ADM_ID'] = $r->ID;
  52. $_SESSION['ADM_INICJALY_HANDLOWCA'] = $r->INICJALY_HANDLOWCA;
  53. $_SESSION['EMPLOYEE_TYPE'] = $r->EMPLOYEE_TYPE;
  54. $_SESSION['DEFAULT_ACL_GROUP'] = $r->DEFAULT_ACL_GROUP;
  55. }
  56. }
  57. public static function logged() {
  58. return (!empty($_SESSION['AUTHORIZE_USER']))? true : false;
  59. }
  60. public static function get( $key ) {
  61. return V::get($key, '', $_SESSION);
  62. }
  63. public static function getGroups() {
  64. $groups = User::_fetchGroups();
  65. return $groups;
  66. }
  67. public static function getGroupsIds() {
  68. $groups = User::_fetchGroups();
  69. return array_keys($groups);
  70. }
  71. public static function _fetchGroups() {
  72. static $_groups;
  73. if (!$_groups) {
  74. $user_id = User::getID();
  75. Lib::loadClass('UsersHelper');
  76. $_groups = UsersHelper::getGroupByUser($user_id);
  77. }
  78. return $_groups;
  79. }
  80. public static function loadProfile($force = false) {
  81. return UserProfile::load($force);
  82. }
  83. public static function saveProfile() {
  84. return UserProfile::save();
  85. }
  86. public static function getProfile($key) {
  87. return UserProfile::get($key);
  88. }
  89. public static function setProfile($key, $val) {
  90. UserProfile::set($key, $val);
  91. }
  92. public static function getProfileColumn($column_name, $key) {
  93. return UserProfile::getColumn($column_name, $key);
  94. }
  95. public static function setProfileColumn($column_name, $key, $value) {
  96. UserProfile::setColumn($column_name, $key, $value);
  97. }
  98. public static function removeProfileColumn($column_name, $key) {
  99. UserProfile::removeColumn($column_name, $key);
  100. }
  101. public static function isAdmin() {
  102. if (in_array(self::get('ADM_ADMIN_LEVEL'), array(0, 1))) {
  103. return true;
  104. }
  105. return false;
  106. }
  107. public static function getRawData() {
  108. $ret = array();
  109. if (self::logged()) {
  110. $ret['id'] = self::getID();
  111. $ret['login'] = self::getName();
  112. $ret['name'] = self::get('ADM_NAME');
  113. $ret['admin_level'] = self::get('ADM_ADMIN_LEVEL');
  114. $ret['opis'] = self::get('ADM_ADMIN_DESC');
  115. }
  116. return $ret;
  117. }
  118. public static function getCurrentUserObject() {
  119. $user = new stdClass();
  120. if (self::logged()) {
  121. $user->ID = $_SESSION['ADM_ID'];
  122. $user->ADM_ACCOUNT = $_SESSION['AUTHORIZE_USER'];
  123. $user->ADM_ACCOUNT = $_SESSION['ADM_ACCOUNT'];
  124. $user->ADM_NAME = $_SESSION['ADM_NAME'];
  125. $user->ADM_TECH_WORKER = $_SESSION['ADM_TECH_WORKER'];
  126. $user->ADM_COMPANY = $_SESSION['ADM_COMPANY'];
  127. $user->ADM_ADMIN_LEVEL = $_SESSION['ADM_ADMIN_LEVEL'];
  128. $user->ADM_PHONE = $_SESSION['ADM_PHONE'];
  129. $user->ADM_ADMIN_EXPIRE = $_SESSION['ADM_ADMIN_EXPIRE'];
  130. $user->ADM_ADMIN_DESC = $_SESSION['ADM_ADMIN_DESC'];
  131. $user->EMPLOYEE_TYPE = $_SESSION['EMPLOYEE_TYPE'];
  132. }
  133. return $user;
  134. }
  135. public static function getAcl() {
  136. static $_acl;
  137. if (!$_acl) {
  138. Lib::loadClass('UserAcl');
  139. $_acl = new UserAcl(self::getID(), $use_cache = true);
  140. $_acl->fetchGroups();
  141. }
  142. return $_acl;
  143. }
  144. public static function reloadAcl() {
  145. IF('123'==V::get('DBG_ACL','',$_GET)){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">SESSION KEYS (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): [';echo implode(',', array_keys($_SESSION));echo']</pre>';}
  146. /*
  147. * [3] => USER_PROFILE
  148. * [29] => CRM_PROCES_USERA_WYKONANE_TESTY-4517
  149. * [30] => TableAjax_Cache
  150. */
  151. IF('123'==V::get('DBG_ACL','',$_GET)){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">CONFIG (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($_SESSION['CONFIG']);echo'</pre>';}
  152. IF('123'==V::get('DBG_ACL','',$_GET)){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">TableAjax_Cache (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($_SESSION['TableAjax_Cache']);echo'</pre>';}
  153. unset($_SESSION['TableAcl_cache']);
  154. unset($_SESSION['Typespecial_Cache']);
  155. unset($_SESSION['ADM_INICJALY_HANDLOWCA']);
  156. unset($_SESSION['EMPLOYEE_TYPE']);
  157. unset($_SESSION['DEFAULT_ACL_GROUP']);
  158. IF('123'==V::get('DBG_ACL','',$_GET)){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">SESSION KEYS (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): [';echo implode(',', array_keys($_SESSION));echo']</pre>';}
  159. $testySesKey = 'CRM_PROCES_USERA_WYKONANE_TESTY-' . User::getID();
  160. if (isset($_SESSION[$testySesKey])) unset($_SESSION[$testySesKey]);
  161. $userAcl = User::getAcl();
  162. $userAcl->fetchAllPerms(true);
  163. }
  164. public static function auth() {
  165. $route = V::get('_route', '', $_REQUEST);
  166. if (!empty($route)) {
  167. Router::handleAuth($route);
  168. } else {
  169. self::authByRequest();
  170. }
  171. if (User::logged() && !V::get('ADM_ACL_LOADED', false, $_SESSION)) {
  172. $userAcl = User::getAcl();
  173. $userAcl->fetchAllPerms();
  174. $_SESSION['ADM_ACL_LOADED'] = true;
  175. }
  176. }
  177. public static function authByRequest() {
  178. $task = V::get('LOGIN', '', $_REQUEST);
  179. $data = array();
  180. $data['errors'] = array();
  181. Lib::loadClass('Config');
  182. $data['ALLOW_GUEST_ACCOUNT'] = (int)Config::get('ALLOW_GUEST_ACCOUNT');
  183. switch ($task) {
  184. case 'LOGIN':
  185. if (!User::logged()) {
  186. $req_ADM_ACCOUNT = (isset($_REQUEST['ADM_ACCOUNT']))? $_REQUEST['ADM_ACCOUNT'] : '';
  187. $req_ADM_PASSWD = (isset($_REQUEST['ADM_PASSWD']))? $_REQUEST['ADM_PASSWD'] : '';
  188. if (empty($req_ADM_ACCOUNT) || empty($req_ADM_PASSWD)) {
  189. $data['errors'][] = "Proszę podać poprawny login i hasło!";
  190. } else {
  191. try {
  192. User::login($req_ADM_ACCOUNT, $req_ADM_PASSWD);
  193. } catch (Exception $e) {
  194. $data['errors'][] = $e->getMessage();
  195. session_destroy();
  196. unset($_SESSION['AUTHORIZE_USER']);
  197. unset($_SESSION['ADM_ACCOUNT']);
  198. Lib::loadClass('SE_Layout');
  199. SE_Layout::gora();
  200. SE_Layout::loadTemplate('logout', $data);
  201. SE_Layout::dol();
  202. exit;
  203. }
  204. }
  205. }
  206. break;
  207. case 'LOGOUT':
  208. if (User::logged()) {
  209. $_SESSION = array();
  210. session_destroy();
  211. unset($_SESSION['AUTHORIZE_USER']);
  212. unset($_SESSION['ADM_ACCOUNT']);
  213. Lib::loadClass('SE_Layout');
  214. SE_Layout::gora();
  215. SE_Layout::loadTemplate('logout', $data);
  216. SE_Layout::dol();
  217. exit;
  218. }
  219. break;
  220. case 'PERMS_RELOAD':
  221. if (User::logged()) {
  222. try {
  223. $dbgExecTime = new DebugExecutionTime();
  224. $dbgExecTime->activate();
  225. $dbgExecTime->log('start');
  226. $routeFixCrmProcesInitIdx = Router::getRoute('FixCrmProcesInitIdx');
  227. if ($routeFixCrmProcesInitIdx) {
  228. $routeFixCrmProcesInitIdx->runMethod('callProcedure');
  229. }
  230. $dbgExecTime->log('FixCrmProcesInitIdx::callProcedure');
  231. $fixAllPermsExecTime = $dbgExecTime->getLastExecTime();
  232. User::reloadAcl();
  233. $dbgExecTime->log('User::reloadAcl');
  234. $fixUserPermsExecTime = $dbgExecTime->getLastExecTime();
  235. } catch (Exception $e) {
  236. $data['errors'][] = $e->getMessage();
  237. }
  238. SE_Layout::gora();
  239. SE_Layout::menu();
  240. ?>
  241. <div class="container">
  242. <div class="alert alert-success" title="<?php echo number_format($fixAllPermsExecTime, 4); ?> s / <?php echo number_format($fixUserPermsExecTime, 4); ?> s">
  243. Zaktualizowano uprawnienia
  244. </div>
  245. </div>
  246. <?php
  247. SE_Layout::loadTemplate('defaultPage', $data);
  248. SE_Layout::dol();
  249. exit;
  250. }
  251. break;
  252. case 'PASSEDIT':
  253. if (User::logged()) {
  254. $data = array();
  255. if (!empty($_POST)) {
  256. if (empty($_POST['ADM_PASSWD_NEW']) || empty($_POST['ADM_PASSWD'])) {
  257. $data['msg'] = "Proszę podać stare i nowe hasło.";
  258. }
  259. }
  260. if (!empty($_POST['ADM_PASSWD_NEW']) && !empty($_POST['ADM_PASSWD'])) {
  261. $ret = User::changePasswd($_POST['ADM_PASSWD'], $_POST['ADM_PASSWD_NEW']);
  262. if ($ret) {
  263. $data['info'] = "Hasło zostało zmienione";
  264. } else {
  265. $data['error'] = "Nie udało się zmienić hasła";
  266. }
  267. }
  268. SE_Layout::gora();
  269. SE_Layout::loadTemplate('passedit', $data);
  270. SE_Layout::dol();
  271. exit;
  272. }
  273. break;
  274. case 'ANONYMOUS_LOGIN':
  275. if (!User::logged()) {
  276. if ($data['ALLOW_GUEST_ACCOUNT'] != 1) {
  277. $data['errors'][] = "Zablokowane logowaniwe na konto gościa!";
  278. }
  279. else {
  280. $anonim = User::getAnonymousAccount();
  281. if (!$anonim) {
  282. $data['errors'][] = "Konto gościa nie istnieje!";
  283. } else {
  284. try {
  285. User::login($anonim->ADM_ACCOUNT, $anonim->ADM_PASSWD);
  286. } catch (Exception $e) {
  287. $data['errors'][] = $e->getMessage();
  288. }
  289. }
  290. }
  291. }
  292. break;
  293. default:
  294. }
  295. if (!User::logged()) {
  296. Lib::loadClass('SE_Layout');
  297. SE_Layout::gora();
  298. SE_Layout::loadTemplate('login', $data);
  299. SE_Layout::dol();
  300. exit;
  301. }
  302. }
  303. public static function kandydatLogin($kandydatId, &$errors = array()) {
  304. $user = self::kandydatLoginByDB($kandydatId, $errors);
  305. if ($user) {
  306. $_SESSION['ADM_ID'] = $user->ID;
  307. $_SESSION['AUTHORIZE_USER'] = $user->ADM_ACCOUNT;
  308. $_SESSION['ADM_ACCOUNT'] = $user->ADM_ACCOUNT;
  309. //$_SESSION['ADM_AREA'] = $user->ADM_AREA;
  310. $_SESSION['ADM_NAME'] = $user->ADM_NAME;
  311. $_SESSION['ADM_TECH_WORKER'] = $user->ADM_TECH_WORKER;
  312. $_SESSION['ADM_COMPANY'] = $user->ADM_COMPANY;
  313. $_SESSION['ADM_ADMIN_LEVEL'] = $user->ADM_ADMIN_LEVEL;
  314. $_SESSION['ADM_PHONE'] = $user->ADM_PHONE;
  315. $_SESSION['ADM_ADMIN_EXPIRE'] = $user->ADM_ADMIN_EXPIRE;
  316. $_SESSION['ADM_ADMIN_DESC'] = $user->ADM_ADMIN_DESC;
  317. $_SESSION['EMPLOYEE_TYPE'] = $user->EMPLOYEE_TYPE;
  318. // save user pass in encrypted form
  319. Lib::loadClass('Crypt');
  320. $_SESSION['ADM_PASS_HASH'] = Crypt::encrypt($pass);
  321. $_SESSION['EMAIL_IMAP_IMPORT_PASSWD_HASH'] = Crypt::encrypt($user->EMAIL_IMAP_IMPORT_PASSWD);
  322. $_SESSION['EMAIL_IMAP_IMPORT_HOST'] = $user->EMAIL_IMAP_IMPORT_HOST;
  323. $_SESSION['EMAIL_IMAP_IMPORT_USERNAME'] = $user->EMAIL_IMAP_IMPORT_USERNAME;
  324. //$keyFromHash = Crypt::decrypt($_SESSION['ADM_PASS_HASH']);
  325. $userAcl = User::getAcl();
  326. $userAcl->fetchAllPerms();
  327. return true;
  328. }
  329. return false;
  330. }
  331. public static function login($login, $pass) {
  332. Lib::loadClass('LDAP');
  333. $ldap = LDAP::getInstance();
  334. if ($ldap != null && $ldap->isConnected()) {
  335. $user = self::loginByLDAP($login, $pass);
  336. } else {
  337. $user = self::loginByDB($login, $pass);
  338. }
  339. if ($user) {
  340. $_SESSION['ADM_ID'] = $user->ID;
  341. $_SESSION['AUTHORIZE_USER'] = $user->ADM_ACCOUNT;
  342. $_SESSION['ADM_ACCOUNT'] = $user->ADM_ACCOUNT;
  343. //$_SESSION['ADM_AREA'] = $user->ADM_AREA;
  344. $_SESSION['ADM_NAME'] = $user->ADM_NAME;
  345. $_SESSION['ADM_TECH_WORKER'] = $user->ADM_TECH_WORKER;
  346. $_SESSION['ADM_COMPANY'] = $user->ADM_COMPANY;
  347. $_SESSION['ADM_ADMIN_LEVEL'] = $user->ADM_ADMIN_LEVEL;
  348. $_SESSION['ADM_PHONE'] = $user->ADM_PHONE;
  349. $_SESSION['ADM_ADMIN_EXPIRE'] = $user->ADM_ADMIN_EXPIRE;
  350. $_SESSION['ADM_ADMIN_DESC'] = $user->ADM_ADMIN_DESC;
  351. $_SESSION['EMPLOYEE_TYPE'] = $user->EMPLOYEE_TYPE;
  352. // save user pass in encrypted form
  353. Lib::loadClass('Crypt');
  354. $_SESSION['ADM_PASS_HASH'] = Crypt::encrypt($pass);
  355. $_SESSION['EMAIL_IMAP_IMPORT_PASSWD_HASH'] = Crypt::encrypt($user->EMAIL_IMAP_IMPORT_PASSWD);
  356. $_SESSION['EMAIL_IMAP_IMPORT_HOST'] = $user->EMAIL_IMAP_IMPORT_HOST;
  357. $_SESSION['EMAIL_IMAP_IMPORT_USERNAME'] = $user->EMAIL_IMAP_IMPORT_USERNAME;
  358. //$keyFromHash = Crypt::decrypt($_SESSION['ADM_PASS_HASH']);
  359. $userAcl = User::getAcl();
  360. $userAcl->fetchAllPerms();
  361. $_SESSION['ADM_ACL_LOADED'] = true;
  362. return true;
  363. }
  364. return false;
  365. }
  366. public static function loginByLDAP($login, $pass) {
  367. $ldapUser = array();
  368. $DBG = false;
  369. Lib::loadClass('LDAP');
  370. $ldap = LDAP::getInstance();
  371. if (!$ldap->isConnected()) {
  372. throw new Exception("Wystąpiły błędy podczas połączenia do bazy LDAP. Spróbuj ponownie za chwilę.");
  373. }
  374. $filter = (false !== strpos($login, '@'))? "(mail={$login})" : "(uid={$login})";
  375. //$filter = "cn=*";// show all ldap accounts
  376. $justthese = array();//array("uid", "givenName", "mail", "*");
  377. if($DBG){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">ldap_search (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r(array('ldaprdn'=>$ldap->getBaseDN(), 'filter'=>$filter, 'justthese'=>$justthese));echo'</pre>';}
  378. $res = $ldap->search($filter, 'cn=users', $justthese);
  379. if ($ldap->count_entries($res) > 0) {
  380. $entry = $ldap->first_entry($res);
  381. if ($entry) {
  382. $ldapUser['user_dn'] = $ldap->get_dn($entry);
  383. $val = $ldap->get_values($entry, 'uid');
  384. $ldapUser['uid'] = $val[0];
  385. $val = $ldap->get_values($entry, 'mail');
  386. $ldapUser['mail'] = $val[0];
  387. $val = $ldap->get_values($entry, 'cn');
  388. $ldapUser['cn'] = $val[0];
  389. } else {
  390. throw new Exception("Login nie istnieje");
  391. }
  392. if($DBG){// test
  393. echo'<pre style="overflow:auto;border:1px solid green;">';
  394. // print number of entries found
  395. echo "Number of entries found: " . $ldap->count_entries($res) . "\n";
  396. while ( $entry ) {
  397. $dn = $ldap->get_dn($entry);
  398. echo "<b>$dn</b>\n";
  399. $attrs = $ldap->get_attributes($entry);
  400. for ( $i=0; $i < $attrs['count']; $i++) {
  401. echo "$attrs[$i]: ";
  402. for ( $j=0; $j < $attrs[$attrs[$i]]['count']; $j++ ) {
  403. echo $attrs[$attrs[$i]][$j] . " ";
  404. }
  405. echo "\n";
  406. }
  407. echo "\n";
  408. $entry = $ldap->next_entry($entry);
  409. }
  410. $ldap->free_result($res);
  411. echo'</pre>';
  412. }// test
  413. }
  414. if (!$ldapUser['user_dn']) {
  415. throw new Exception("Proszę podać poprawny login i hasło!");
  416. }
  417. if($DBG){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">LDAP user (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($ldapUser);echo'</pre>';}
  418. if($DBG){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">ldap_bind (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r(array('ldaprdn'=>$ldapUser['user_dn'], 'pass'=>'***'));echo'</pre>';}
  419. $ldapbind = $ldap->bind($ldapUser['user_dn'], $pass, $errorMsg);
  420. if (!$ldapbind) {
  421. throw new Exception("Wystąpiły błędy podczas próby logowania. {$errorMsg}");
  422. }
  423. $user = new stdClass();
  424. $user->AUTHORIZE_USER = $ldapUser['uid'];
  425. $user->ADM_ACCOUNT = $ldapUser['uid'];
  426. $user->ADM_NAME = $ldapUser['cn'];
  427. $user->OTHER_INFO = $ldapUser['mail'];
  428. // get ID, ... from DB
  429. $db = DB::getDB();
  430. $sql = "SELECT u.*
  431. from `ADMIN_USERS` as u
  432. where
  433. u.`ADM_ACCOUNT`='{$user->ADM_ACCOUNT}'
  434. and u.`A_STATUS` in('WAITING','NORMAL')
  435. ";
  436. // LIMIT 0, 1;
  437. $res = $db->query($sql);
  438. if (!$res) {
  439. throw new Exception("Wystąpiły błędy podczas próby logowania. Błąd bazy danych.");
  440. }
  441. $num_rows = $db->num_rows($res);
  442. if ($num_rows == 0) {
  443. throw new Exception("Wystąpiły błędy podczas próby logowania. Brak użytkownika w bazie danych.");
  444. }
  445. else if ($num_rows == 1) {
  446. if ($r = $db->fetch($res)) {
  447. $user->ID = $r->ID;
  448. $user->ADM_TECH_WORKER = $r->ADM_TECH_WORKER;
  449. $user->ADM_COMPANY = $r->ADM_COMPANY;
  450. $user->ADM_ADMIN_LEVEL = $r->ADM_ADMIN_LEVEL;
  451. $user->ADM_PHONE = $r->ADM_PHONE;
  452. $user->ADM_ADMIN_EXPIRE = $r->ADM_ADMIN_EXPIRE;
  453. $user->ADM_ADMIN_DESC = $r->ADM_ADMIN_DESC;
  454. $user->EMAIL_IMAP_IMPORT_PASSWD = $r->EMAIL_IMAP_IMPORT_PASSWD;
  455. $user->EMAIL_IMAP_IMPORT_HOST = $r->EMAIL_IMAP_IMPORT_HOST;
  456. $user->EMAIL_IMAP_IMPORT_USERNAME = $r->EMAIL_IMAP_IMPORT_USERNAME;
  457. $user->EMPLOYEE_TYPE = $r->EMPLOYEE_TYPE;
  458. return $user;
  459. }
  460. }
  461. return $user;
  462. }
  463. public static function loginByDB($login, $pass) {
  464. $db = DB::getDB();
  465. $login = $db->_($login);
  466. $pass = $db->_($pass);
  467. $sql = "SELECT u.*
  468. from `ADMIN_USERS` as u
  469. where
  470. u.`ADM_ACCOUNT`='{$login}'
  471. and ( u.`ADM_PASSWD`='{$pass}' or u.`ADM_PASSWD`=md5('{$pass}') )
  472. and u.`A_STATUS` in('WAITING','NORMAL')
  473. LIMIT 0, 1;
  474. ";
  475. $res = $db->query($sql);
  476. if (!$res) {
  477. throw new Exception("Wystąpiły błędy podczas próby logowania. Błąd bazy danych.");
  478. }
  479. $num_rows = $db->num_rows($res);
  480. if ($num_rows == 0) {
  481. throw new Exception("Proszę podać poprawny login i hasło!");
  482. }
  483. else if ($num_rows == 1) {
  484. if ($r = $db->fetch($res)) {
  485. $user = new stdClass();
  486. $user->ID = $r->ID;
  487. $user->ADM_TECH_WORKER = $r->ADM_TECH_WORKER;
  488. $user->ADM_COMPANY = $r->ADM_COMPANY;
  489. $user->AUTHORIZE_USER = $r->ADM_ACCOUNT;
  490. $user->ADM_ACCOUNT = $r->ADM_ACCOUNT;
  491. $user->ADM_NAME = $r->ADM_NAME;
  492. $user->ADM_ADMIN_LEVEL = $r->ADM_ADMIN_LEVEL;
  493. $user->ADM_PHONE = $r->ADM_PHONE;
  494. $user->ADM_ADMIN_EXPIRE = $r->ADM_ADMIN_EXPIRE;
  495. $user->ADM_ADMIN_DESC = $r->ADM_ADMIN_DESC;
  496. $user->EMAIL_IMAP_IMPORT_PASSWD = $r->EMAIL_IMAP_IMPORT_PASSWD;
  497. $user->EMAIL_IMAP_IMPORT_HOST = $r->EMAIL_IMAP_IMPORT_HOST;
  498. $user->EMAIL_IMAP_IMPORT_USERNAME = $r->EMAIL_IMAP_IMPORT_USERNAME;
  499. $user->EMPLOYEE_TYPE = $r->EMPLOYEE_TYPE;
  500. //$user->ADM_AREA = "$r->ADM_AREA";
  501. //$_SESSION['ADM_PASSWD'] = $pass;
  502. return $user;
  503. }
  504. }
  505. return false;
  506. }
  507. public static function kandydatLoginByDB($kandydatId, &$errors) {
  508. $db = DB::getDB();
  509. $kandydatId = (int)$kandydatId;
  510. $sql = "SELECT u.*
  511. from `ADMIN_USERS` as u
  512. where
  513. u.`ID`='{$kandydatId}'
  514. and u.`A_STATUS` in('WAITING','NORMAL')
  515. LIMIT 0, 1;
  516. ";
  517. $res = $db->query($sql);
  518. if (!$res) {
  519. die("Error SQL login!");
  520. }
  521. $num_rows = $db->num_rows($res);
  522. if ($num_rows == 0) {
  523. $errors[] = "Podales zlego uzytkownika lub/i haslo()";
  524. }
  525. else if ($num_rows == 1) {
  526. if ($r = $db->fetch($res)) {
  527. $user = new stdClass();
  528. $user->ID = $r->ID;
  529. $user->ADM_TECH_WORKER = $r->ADM_TECH_WORKER;
  530. $user->ADM_COMPANY = $r->ADM_COMPANY;
  531. $user->AUTHORIZE_USER = $r->ADM_ACCOUNT;
  532. $user->ADM_ACCOUNT = $r->ADM_ACCOUNT;
  533. $user->ADM_NAME = $r->ADM_NAME;
  534. $user->ADM_ADMIN_LEVEL = $r->ADM_ADMIN_LEVEL;
  535. $user->ADM_PHONE = $r->ADM_PHONE;
  536. $user->ADM_ADMIN_EXPIRE = $r->ADM_ADMIN_EXPIRE;
  537. $user->ADM_ADMIN_DESC = $r->ADM_ADMIN_DESC;
  538. $user->EMAIL_IMAP_IMPORT_PASSWD = $r->EMAIL_IMAP_IMPORT_PASSWD;
  539. $user->EMAIL_IMAP_IMPORT_HOST = $r->EMAIL_IMAP_IMPORT_HOST;
  540. $user->EMAIL_IMAP_IMPORT_USERNAME = $r->EMAIL_IMAP_IMPORT_USERNAME;
  541. $user->EMPLOYEE_TYPE = $r->EMPLOYEE_TYPE;
  542. //$user->ADM_AREA = "$r->ADM_AREA";
  543. //$_SESSION['ADM_PASSWD'] = $pass;
  544. return $user;
  545. }
  546. }
  547. return false;
  548. }
  549. public static function changePasswd($oldPass, $newPass) {
  550. $db = DB::getDB();
  551. $newPass = $db->_($newPass);
  552. $oldPass = $db->_($oldPass);
  553. $username = $db->_(self::getName());
  554. $sql = "update `ADMIN_USERS` set
  555. `ADM_PASSWD`=md5('{$newPass}')
  556. where
  557. `ADM_ACCOUNT`='{$username}' and
  558. (`ADM_PASSWD`='{$oldPass}' or `ADM_PASSWD`=md5('{$oldPass}'))
  559. limit 1;
  560. ";
  561. $db->query($sql);
  562. return ($db->affected_rows() > 0);
  563. }
  564. /**
  565. * Check user access.
  566. * @param string $name
  567. * 'menu' - access to view menu
  568. *
  569. * @from [4101] ADM_ADMIN_LEVEL
  570. * Poziom uprawnień - każdy powinien mieć poziom o numerze 3
  571. * kierownicy powinni mieć 2
  572. * a administratorzy 0
  573. * kandydaci poziom 6.
  574. * Poziom 1 umożliwia edycje procesów i zasobów
  575. * poziom 2 umożliwia ocenę testów
  576. * poziom 3 umożliwia widzenie systemu jakości.
  577. */
  578. public static function hasAccess($name) {
  579. switch ($name) {
  580. case 'menu': {
  581. if (User::get('ADM_ADMIN_LEVEL') < 6) {
  582. return true;
  583. }
  584. else {
  585. Lib::loadClass('Config');
  586. $ALLOW_GUEST_ACCOUNT = (int)Config::get('ALLOW_GUEST_ACCOUNT');
  587. if ($ALLOW_GUEST_ACCOUNT && User::getLogin() == 'anonymous') {
  588. return true;
  589. }
  590. }
  591. break;
  592. }
  593. case 'dbg': {
  594. return (0 == User::get('ADM_ADMIN_LEVEL'));
  595. break;
  596. }
  597. case 'procesy': {
  598. if (User::get('ADM_ADMIN_LEVEL') < 4) return true;
  599. break;
  600. }
  601. case 'procesy_admin': {
  602. if (User::get('ADM_ADMIN_LEVEL') < 2) return true;
  603. break;
  604. }
  605. case 'testy': {
  606. if (User::get('ADM_ADMIN_LEVEL') <= 6) return true;
  607. break;
  608. }
  609. case 'testy_wyniki': {
  610. if (User::get('ADM_ADMIN_LEVEL') < 3) return true;
  611. break;
  612. }
  613. case 'testy_wyniki_edit': {
  614. if (User::get('ADM_ADMIN_LEVEL') < 3) return true;
  615. break;
  616. }
  617. case 'testy_wyniki_read': {
  618. if (User::get('ADM_ADMIN_LEVEL') < 3) return true;
  619. break;
  620. }
  621. case 'user_add_group': {
  622. if (User::get('ADM_ADMIN_LEVEL') < 1) return true;
  623. break;
  624. }
  625. default:
  626. }
  627. return false;
  628. }
  629. public static function hasAccessToEditTable($tableName) {
  630. if (empty($tableName)) return;
  631. $userAcl = User::getAcl();
  632. $userAcl->fetchGroups();
  633. Lib::loadClass('ProcesHelper');
  634. $zasobID = ProcesHelper::getZasobTableID($tableName);
  635. if (!$userAcl->hasTableAcl($zasobID)) {
  636. return false;
  637. }
  638. $tblAcl = $userAcl->getTableAcl($zasobID);
  639. if (empty($tblAcl)) {
  640. echo "Brak dostępu do tabeli nr {$zasobID} '{$tableName}'"; return;
  641. //throw new Exception("Brak dostępu do tabeli nr {$zasobID} '{$tableName}'");
  642. }
  643. $tblAcl->init();
  644. return $tblAcl->hasEditPerms();
  645. }
  646. public static function hasGroup($groupName) {
  647. // TODO: find group by name @see self::getGroups() @used in SchemaReaderProcess
  648. return false;
  649. }
  650. public static function getAnonymousAccount() {
  651. $db = DB::getDB();
  652. if (!$db) die("Error DB connection!");
  653. $sql = "select u.*
  654. from `ADMIN_USERS` as u
  655. where
  656. u.`ADM_ACCOUNT`='anonymous'
  657. and u.`EMPLOYEE_TYPE`='Anonymous'
  658. and u.`A_STATUS` in('NORMAL')
  659. order by u.`ID` asc
  660. limit 1
  661. ";
  662. $res = $db->query($sql);
  663. if (!$res) die("Error SQL login!");
  664. $num_rows = $db->num_rows($res);
  665. if ($r = $db->fetch($res)) {
  666. //$_SESSION['ADM_PASSWD'] = $pass;
  667. $user = new stdClass();
  668. $user->ID = "$r->ID";
  669. $user->AUTHORIZE_USER = "$r->ADM_ACCOUNT";
  670. $user->ADM_ACCOUNT = "$r->ADM_ACCOUNT";
  671. $user->ADM_PASSWD = "$r->ADM_PASSWD";
  672. //$user->ADM_AREA = "$r->ADM_AREA";
  673. $user->ADM_NAME = "$r->ADM_NAME";
  674. $user->ADM_TECH_WORKER = "$r->ADM_TECH_WORKER";
  675. $user->ADM_COMPANY = "$r->ADM_COMPANY";
  676. $user->ADM_ADMIN_LEVEL = "$r->ADM_ADMIN_LEVEL";
  677. $user->ADM_PHONE = "$r->ADM_PHONE";
  678. $user->ADM_ADMIN_EXPIRE = "$r->ADM_ADMIN_EXPIRE";
  679. $user->ADM_ADMIN_DESC = "$r->ADM_ADMIN_DESC";
  680. return $user;
  681. }
  682. return false;
  683. }
  684. public static function getLdapGroups() {
  685. $ldapGroups = User::_fetchLdapGroups();
  686. return $ldapGroups;
  687. }
  688. public static function getLdapGroupsNames() {
  689. $ldapGroupsNames = array();
  690. $ldapGroups = User::_fetchLdapGroups();
  691. foreach ($ldapGroups as $kID => $vLDAPGroup) {
  692. $ldapGroupsNames[$kID] = $vLDAPGroup->cn;
  693. }
  694. return $ldapGroupsNames;
  695. }
  696. public static function getLdapGroupsIds() {
  697. $ldapGroups = User::_fetchLdapGroups();
  698. $gidNumbers = array();
  699. if (!empty($ldapGroups)) {
  700. foreach ($ldapGroups as $vLdapGroup) {
  701. $gidNumbers[] = $vLdapGroup->gidNumber;
  702. }
  703. }
  704. return $gidNumbers;
  705. }
  706. public static function _fetchLdapGroups() {
  707. static $_groups;
  708. if (!$_groups) {
  709. $login = User::getLogin();
  710. Lib::loadClass('UsersLdapHelper');
  711. $_groups = UsersLdapHelper::getUserGroups($login, 3);
  712. //echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">getLDAPGroupByUserName (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($_groups);echo'</pre>';
  713. }
  714. return $_groups;
  715. }
  716. }