User.php 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815
  1. <?php
  2. Lib::loadClass('UserProfile');
  3. Lib::loadClass('Router');
  4. Lib::loadClass('DebugExecutionTime');
  5. Lib::loadClass('UserStorageFactory');
  6. class User {
  7. public static function getLogin() {
  8. return V::get('ADM_ACCOUNT', '', $_SESSION);
  9. }
  10. public static function getName() {
  11. return V::get('ADM_ACCOUNT', '', $_SESSION);
  12. }
  13. public static function getID() {
  14. if (V::get('ADM_ID', 0, $_SESSION, 'int') <= 0) {
  15. self::_fetchMoreUserData();
  16. }
  17. return V::get('ADM_ID', '', $_SESSION);
  18. }
  19. public static function getType() {
  20. if (empty($_SESSION['EMPLOYEE_TYPE'])) {
  21. self::_fetchMoreUserData();
  22. }
  23. return V::get('EMPLOYEE_TYPE', '', $_SESSION);
  24. }
  25. public static function getFullName() {
  26. return V::get('ADM_NAME', '', $_SESSION);
  27. }
  28. public static function getInicjaly() {
  29. if (!array_key_exists('ADM_INICJALY_HANDLOWCA', $_SESSION)) {
  30. self::_fetchMoreUserData();
  31. }
  32. return $_SESSION['ADM_INICJALY_HANDLOWCA'];
  33. }
  34. public static function getDefaultAclGroup() {
  35. if (!array_key_exists('DEFAULT_ACL_GROUP', $_SESSION)) {
  36. self::_fetchMoreUserData();
  37. }
  38. return $_SESSION['DEFAULT_ACL_GROUP'];
  39. }
  40. public static function _fetchMoreUserData() {
  41. $login = self::getLogin();
  42. if (empty($login)) return false;
  43. $sql = "
  44. select u.ID as ADM_ID
  45. , u.INICJALY_HANDLOWCA as ADM_INICJALY_HANDLOWCA
  46. , u.EMPLOYEE_TYPE
  47. , u.DEFAULT_ACL_GROUP
  48. from `ADMIN_USERS` u
  49. where `ADM_ACCOUNT`='{$login}'
  50. ";
  51. if ($userInfo = DB::getPDO()->fetchFirstNoLog($sql)) {
  52. $_SESSION['ADM_ID'] = $userInfo['ADM_ID'];
  53. $_SESSION['ADM_INICJALY_HANDLOWCA'] = $userInfo['ADM_INICJALY_HANDLOWCA'];
  54. $_SESSION['EMPLOYEE_TYPE'] = $userInfo['EMPLOYEE_TYPE'];
  55. $_SESSION['DEFAULT_ACL_GROUP'] = $userInfo['DEFAULT_ACL_GROUP'];
  56. return $userInfo;
  57. }
  58. return [];
  59. }
  60. public static function logged() {
  61. return (!empty($_SESSION['AUTHORIZE_USER']))? true : false;
  62. }
  63. public static function get( $key ) {
  64. return V::get($key, '', $_SESSION);
  65. }
  66. public static function getGroups() {
  67. $groups = User::_fetchGroups();
  68. return $groups;
  69. }
  70. public static function getGroupsIds() {
  71. $groups = User::_fetchGroups();
  72. return array_keys($groups);
  73. }
  74. public static function _fetchGroups() {
  75. static $_groups;
  76. if (!$_groups) {
  77. $user_id = User::getID();
  78. Lib::loadClass('UsersHelper');
  79. $_groups = UsersHelper::getGroupByUser($user_id);
  80. }
  81. return $_groups;
  82. }
  83. public static function loadProfile($force = false) {
  84. return UserProfile::load($force);
  85. }
  86. public static function saveProfile() {
  87. return UserProfile::save();
  88. }
  89. public static function getProfile($key) {
  90. return UserProfile::get($key);
  91. }
  92. public static function setProfile($key, $val) {
  93. UserProfile::set($key, $val);
  94. }
  95. public static function getProfileColumn($column_name, $key) { // TODO: use only in Column.php (only by procesy5.php)
  96. return UserProfile::getColumn($column_name, $key);
  97. }
  98. public static function isAdmin() {
  99. if (in_array(self::get('ADM_ADMIN_LEVEL'), array(0, 1))) {
  100. return true;
  101. }
  102. return false;
  103. }
  104. public static function getRawData() {
  105. $ret = array();
  106. if (self::logged()) {
  107. $ret['id'] = self::getID();
  108. $ret['login'] = self::getName();
  109. $ret['name'] = self::get('ADM_NAME');
  110. $ret['admin_level'] = self::get('ADM_ADMIN_LEVEL');
  111. $ret['opis'] = self::get('ADM_ADMIN_DESC');
  112. }
  113. return $ret;
  114. }
  115. public static function getCurrentUserObject() {
  116. $user = new stdClass();
  117. if (self::logged()) {
  118. $user->ID = $_SESSION['ADM_ID'];
  119. $user->ADM_ACCOUNT = $_SESSION['AUTHORIZE_USER'];
  120. $user->ADM_ACCOUNT = $_SESSION['ADM_ACCOUNT'];
  121. $user->ADM_NAME = $_SESSION['ADM_NAME'];
  122. $user->ADM_TECH_WORKER = $_SESSION['ADM_TECH_WORKER'];
  123. $user->ADM_COMPANY = $_SESSION['ADM_COMPANY'];
  124. $user->ADM_ADMIN_LEVEL = $_SESSION['ADM_ADMIN_LEVEL'];
  125. $user->ADM_PHONE = $_SESSION['ADM_PHONE'];
  126. $user->ADM_ADMIN_EXPIRE = $_SESSION['ADM_ADMIN_EXPIRE'];
  127. $user->ADM_ADMIN_DESC = $_SESSION['ADM_ADMIN_DESC'];
  128. $user->EMPLOYEE_TYPE = $_SESSION['EMPLOYEE_TYPE'];
  129. }
  130. return $user;
  131. }
  132. public static function getAcl($acl = null) {
  133. static $_acl;
  134. if ($_acl) return $_acl;
  135. if (null !== $acl) {// force set acl
  136. $_acl = $acl;
  137. return $_acl;
  138. }
  139. Lib::loadClass('UserAcl');
  140. $_acl = new UserAcl(self::getID(), $use_cache = true);
  141. $_acl->fetchGroups();
  142. return $_acl;
  143. }
  144. public static function reloadAcl() {
  145. IF('123'==V::get('DBG_ACL','',$_GET)){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">SESSION KEYS (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): [';echo implode(',', array_keys($_SESSION));echo']</pre>';}
  146. /*
  147. * [3] => USER_PROFILE
  148. * [29] => CRM_PROCES_USERA_WYKONANE_TESTY-4517
  149. * [30] => TableAjax_Cache
  150. */
  151. IF('123'==V::get('DBG_ACL','',$_GET)){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">CONFIG (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($_SESSION['CONFIG']);echo'</pre>';}
  152. IF('123'==V::get('DBG_ACL','',$_GET)){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">TableAjax_Cache (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($_SESSION['TableAjax_Cache']);echo'</pre>';}
  153. unset($_SESSION['TableAcl_cache']);
  154. unset($_SESSION['Typespecial_Cache']);
  155. unset($_SESSION['ADM_INICJALY_HANDLOWCA']);
  156. unset($_SESSION['EMPLOYEE_TYPE']);
  157. unset($_SESSION['DEFAULT_ACL_GROUP']);
  158. IF('123'==V::get('DBG_ACL','',$_GET)){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">SESSION KEYS (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): [';echo implode(',', array_keys($_SESSION));echo']</pre>';}
  159. $testySesKey = 'CRM_PROCES_USERA_WYKONANE_TESTY-' . User::getID();
  160. if (isset($_SESSION[$testySesKey])) unset($_SESSION[$testySesKey]);
  161. $userAcl = User::getAcl();
  162. $userAcl->fetchAllPerms(true);
  163. }
  164. public static function auth() {
  165. $route = V::get('_route', '', $_REQUEST);
  166. if (!empty($route)) {
  167. Router::handleAuth($route);
  168. } else {
  169. self::authByRequest();
  170. }
  171. if (User::logged() && !V::get('ADM_ACL_LOADED', false, $_SESSION)) {
  172. $userAcl = User::getAcl();
  173. $userAcl->fetchAllPerms();
  174. $_SESSION['ADM_ACL_LOADED'] = true;
  175. }
  176. if (User::logged() && User::isAdmin()) {
  177. if (V::get('DBG_ON', '', $_REQUEST)) {
  178. DBG::activate();
  179. }
  180. }
  181. if (V::get('DBG_OFF', '', $_REQUEST)) {
  182. DBG::deactivate();
  183. }
  184. }
  185. public static function authByRequest() {
  186. $task = V::get('LOGIN', '', $_REQUEST);
  187. $data = array();
  188. $data['errors'] = array();
  189. Lib::loadClass('Config');
  190. $data['ALLOW_GUEST_ACCOUNT'] = (int)Config::get('ALLOW_GUEST_ACCOUNT');
  191. switch ($task) {
  192. case 'LOGIN':
  193. if (!User::logged()) {
  194. $req_ADM_ACCOUNT = (isset($_REQUEST['ADM_ACCOUNT']))? $_REQUEST['ADM_ACCOUNT'] : '';
  195. $req_ADM_PASSWD = (isset($_REQUEST['ADM_PASSWD']))? $_REQUEST['ADM_PASSWD'] : '';
  196. if (empty($req_ADM_ACCOUNT) || empty($req_ADM_PASSWD)) {
  197. $data['errors'][] = "Proszę podać poprawny login i hasło!";
  198. } else {
  199. try {
  200. User::login($req_ADM_ACCOUNT, $req_ADM_PASSWD);
  201. } catch (Exception $e) {
  202. $data['errors'][] = $e->getMessage();
  203. session_destroy();
  204. unset($_SESSION['AUTHORIZE_USER']);
  205. unset($_SESSION['ADM_ACCOUNT']);
  206. Router::getRoute('Users')->logoutView($data);
  207. exit;
  208. }
  209. }
  210. }
  211. break;
  212. case 'LOGOUT':
  213. if (User::logged()) {
  214. $_SESSION = array();
  215. session_destroy();// Remove the server-side session information.
  216. session_write_close();
  217. session_start();
  218. session_regenerate_id(true);
  219. Router::getRoute('Users')->logoutView($data);
  220. exit;
  221. }
  222. break;
  223. case 'PERMS_RELOAD':
  224. if (User::logged()) {
  225. try {
  226. $dbgExecTime = new DebugExecutionTime();
  227. $dbgExecTime->activate();
  228. $dbgExecTime->log('start');
  229. $routeFixCrmProcesInitIdx = Router::getRoute('FixCrmProcesInitIdx');
  230. if ($routeFixCrmProcesInitIdx) {
  231. $routeFixCrmProcesInitIdx->runMethod('callProcedure');
  232. }
  233. $dbgExecTime->log('FixCrmProcesInitIdx::callProcedure');
  234. $fixAllPermsExecTime = $dbgExecTime->getLastExecTime();
  235. User::reloadAcl();
  236. $dbgExecTime->log('User::reloadAcl');
  237. $fixUserPermsExecTime = $dbgExecTime->getLastExecTime();
  238. } catch (Exception $e) {
  239. $data['errors'][] = $e->getMessage();
  240. }
  241. Router::getRoute('Users')->reloadPermsView($data, $fixUserPermsExecTime);
  242. exit;
  243. }
  244. break;
  245. case 'ANONYMOUS_LOGIN':
  246. if (!User::logged()) {
  247. if ($data['ALLOW_GUEST_ACCOUNT'] != 1) {
  248. $data['errors'][] = "Zablokowane logowaniwe na konto gościa!";
  249. }
  250. else {
  251. $anonim = User::getAnonymousAccount();
  252. if (!$anonim) {
  253. $data['errors'][] = "Konto gościa nie istnieje!";
  254. } else {
  255. try {
  256. User::login($anonim->ADM_ACCOUNT, $anonim->ADM_PASSWD);
  257. } catch (Exception $e) {
  258. $data['errors'][] = $e->getMessage();
  259. }
  260. }
  261. }
  262. }
  263. break;
  264. default:
  265. }
  266. if (!User::logged()) {
  267. Router::getRoute('Users')->loginView($data);
  268. exit;
  269. }
  270. }
  271. public static function kandydatLogin($kandydatId, &$errors = array()) {
  272. $user = self::kandydatLoginByDB($kandydatId, $errors);
  273. if ($user) {
  274. $_SESSION['ADM_ID'] = $user->ID;
  275. $_SESSION['AUTHORIZE_USER'] = $user->ADM_ACCOUNT;
  276. $_SESSION['ADM_ACCOUNT'] = $user->ADM_ACCOUNT;
  277. //$_SESSION['ADM_AREA'] = $user->ADM_AREA;
  278. $_SESSION['ADM_NAME'] = $user->ADM_NAME;
  279. $_SESSION['ADM_TECH_WORKER'] = $user->ADM_TECH_WORKER;
  280. $_SESSION['ADM_COMPANY'] = $user->ADM_COMPANY;
  281. $_SESSION['ADM_ADMIN_LEVEL'] = $user->ADM_ADMIN_LEVEL;
  282. $_SESSION['ADM_PHONE'] = $user->ADM_PHONE;
  283. $_SESSION['ADM_ADMIN_EXPIRE'] = $user->ADM_ADMIN_EXPIRE;
  284. $_SESSION['ADM_ADMIN_DESC'] = $user->ADM_ADMIN_DESC;
  285. $_SESSION['EMPLOYEE_TYPE'] = $user->EMPLOYEE_TYPE;
  286. // save user pass in encrypted form
  287. Lib::loadClass('Crypt');
  288. $_SESSION['ADM_PASS_HASH'] = Crypt::encrypt($pass);
  289. $_SESSION['EMAIL_IMAP_IMPORT_PASSWD_HASH'] = Crypt::encrypt($user->EMAIL_IMAP_IMPORT_PASSWD);
  290. $_SESSION['EMAIL_IMAP_IMPORT_HOST'] = $user->EMAIL_IMAP_IMPORT_HOST;
  291. $_SESSION['EMAIL_IMAP_IMPORT_USERNAME'] = $user->EMAIL_IMAP_IMPORT_USERNAME;
  292. //$keyFromHash = Crypt::decrypt($_SESSION['ADM_PASS_HASH']);
  293. $userAcl = User::getAcl();
  294. $userAcl->fetchAllPerms();
  295. return true;
  296. }
  297. return false;
  298. }
  299. public static function login($login, $pass) {
  300. Lib::loadClass('LDAP');
  301. $ldap = ('1' == V::get('P5_DONT_USE_LDAP_FOR_AUTH', '', $_SERVER)) ? null : LDAP::getInstance();
  302. $authClass = null;
  303. {
  304. $projectName = Config::getProjectName();
  305. $projectPath = Config::getProjectPath();
  306. $pathAuthClass = $projectPath ? "{$projectPath}/auth.php" : null;
  307. if ($pathAuthClass && file_exists($pathAuthClass)) {
  308. require_once $pathAuthClass;
  309. $nameAuthClass = "Auth_{$projectName}";
  310. if (!class_exists($nameAuthClass)) throw new Exception("Auth class not exists for project '{$projectName}'!");
  311. $authClass = $nameAuthClass;
  312. }
  313. }
  314. if ($ldap != null && $ldap->isConnected()) {
  315. $user = self::loginByLDAP($login, $pass);
  316. if ($user) { // user logged in by ldap - update password hash in db
  317. DB::getPDO()->update('ADMIN_USERS', 'ID', $user->ID, [
  318. 'ADM_PASSWD_AES' => hash('sha512', $pass), // Mysql: SHA2('{$pass}', 512)
  319. ]);
  320. }
  321. } else if ($authClass) {
  322. // $classname::aStaticMethod(); // As of PHP 5.3.0
  323. $user = $authClass::login($login, $pass);
  324. { // default values
  325. if (!$user->EMAIL_IMAP_IMPORT_HOST) $user->EMAIL_IMAP_IMPORT_HOST = null;
  326. if (!$user->EMAIL_IMAP_IMPORT_USERNAME) $user->EMAIL_IMAP_IMPORT_USERNAME = null;
  327. }
  328. } else {
  329. $user = self::loginByDB($login, $pass);
  330. }
  331. if ($user) {
  332. $_SESSION['ADM_ID'] = $user->ID;
  333. $_SESSION['AUTHORIZE_USER'] = $user->ADM_ACCOUNT;
  334. $_SESSION['ADM_ACCOUNT'] = $user->ADM_ACCOUNT;
  335. //$_SESSION['ADM_AREA'] = $user->ADM_AREA;
  336. $_SESSION['ADM_NAME'] = $user->ADM_NAME;
  337. $_SESSION['ADM_TECH_WORKER'] = $user->ADM_TECH_WORKER;
  338. $_SESSION['ADM_COMPANY'] = $user->ADM_COMPANY;
  339. $_SESSION['ADM_ADMIN_LEVEL'] = $user->ADM_ADMIN_LEVEL;
  340. $_SESSION['ADM_PHONE'] = $user->ADM_PHONE;
  341. $_SESSION['ADM_ADMIN_EXPIRE'] = $user->ADM_ADMIN_EXPIRE;
  342. $_SESSION['ADM_ADMIN_DESC'] = $user->ADM_ADMIN_DESC;
  343. $_SESSION['EMPLOYEE_TYPE'] = $user->EMPLOYEE_TYPE;
  344. // save user pass in encrypted form
  345. Lib::loadClass('Crypt');
  346. $_SESSION['ADM_PASS_HASH'] = Crypt::encrypt($pass);
  347. $_SESSION['EMAIL_IMAP_IMPORT_PASSWD_HASH'] = Crypt::encrypt($user->EMAIL_IMAP_IMPORT_PASSWD);
  348. $_SESSION['EMAIL_IMAP_IMPORT_HOST'] = $user->EMAIL_IMAP_IMPORT_HOST;
  349. $_SESSION['EMAIL_IMAP_IMPORT_USERNAME'] = $user->EMAIL_IMAP_IMPORT_USERNAME;
  350. //$keyFromHash = Crypt::decrypt($_SESSION['ADM_PASS_HASH']);
  351. $userAcl = User::getAcl();
  352. $userAcl->fetchAllPerms();
  353. $_SESSION['ADM_ACL_LOADED'] = true;
  354. return true;
  355. }
  356. return false;
  357. }
  358. public static function loginByLDAP($login, $pass) {
  359. $ldapUser = array();
  360. $DBG = false;
  361. Lib::loadClass('LDAP');
  362. $ldap = LDAP::getInstance();
  363. if (!$ldap->isConnected()) {
  364. throw new Exception("Wystąpiły błędy podczas połączenia do bazy LDAP. Spróbuj ponownie za chwilę.");
  365. }
  366. $filter = (false !== strpos($login, '@'))? "(mail={$login})" : "(uid={$login})";
  367. //$filter = "cn=*";// show all ldap accounts
  368. $justthese = array();//array("uid", "givenName", "mail", "*");
  369. if($DBG){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">ldap_search (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r(array('ldaprdn'=>$ldap->getBaseDN(), 'filter'=>$filter, 'justthese'=>$justthese));echo'</pre>';}
  370. $res = $ldap->search($filter, 'cn=users', $justthese);
  371. if ($ldap->count_entries($res) > 0) {
  372. $entry = $ldap->first_entry($res);
  373. if ($entry) {
  374. $ldapUser['user_dn'] = $ldap->get_dn($entry);
  375. $val = $ldap->get_values($entry, 'uid');
  376. $ldapUser['uid'] = $val[0];
  377. $val = $ldap->get_values($entry, 'mail');
  378. $ldapUser['mail'] = $val[0];
  379. $val = $ldap->get_values($entry, 'cn');
  380. $ldapUser['cn'] = $val[0];
  381. } else {
  382. throw new Exception("Login nie istnieje");
  383. }
  384. if($DBG){// test
  385. echo'<pre style="overflow:auto;border:1px solid green;">';
  386. // print number of entries found
  387. echo "Number of entries found: " . $ldap->count_entries($res) . "\n";
  388. while ( $entry ) {
  389. $dn = $ldap->get_dn($entry);
  390. echo "<b>$dn</b>\n";
  391. $attrs = $ldap->get_attributes($entry);
  392. for ( $i=0; $i < $attrs['count']; $i++) {
  393. echo "$attrs[$i]: ";
  394. for ( $j=0; $j < $attrs[$attrs[$i]]['count']; $j++ ) {
  395. echo $attrs[$attrs[$i]][$j] . " ";
  396. }
  397. echo "\n";
  398. }
  399. echo "\n";
  400. $entry = $ldap->next_entry($entry);
  401. }
  402. $ldap->free_result($res);
  403. echo'</pre>';
  404. }// test
  405. }
  406. if (!$ldapUser['user_dn']) {
  407. throw new Exception("Proszę podać poprawny login i hasło!");
  408. }
  409. if($DBG){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">LDAP user (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($ldapUser);echo'</pre>';}
  410. if($DBG){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">ldap_bind (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r(array('ldaprdn'=>$ldapUser['user_dn'], 'pass'=>'***'));echo'</pre>';}
  411. $ldapbind = $ldap->bind($ldapUser['user_dn'], $pass, $errorMsg);
  412. if (!$ldapbind && "Error Binding to LDAP: No additional information is available." === $errorMsg) throw new Exception("Nieprawidłowy login lub hasło");
  413. if (!$ldapbind) throw new Exception("Wystąpiły błędy podczas próby logowania. {$errorMsg}");
  414. $user = new stdClass();
  415. $user->AUTHORIZE_USER = $ldapUser['uid'];
  416. $user->ADM_ACCOUNT = $ldapUser['uid'];
  417. $user->ADM_NAME = $ldapUser['cn'];
  418. $user->OTHER_INFO = $ldapUser['mail'];
  419. $rawUser = DB::getPDO()->fetchFirst("
  420. select u.*
  421. from ADMIN_USERS u
  422. where u.ADM_ACCOUNT = :login
  423. and u.A_STATUS in('WAITING', 'NORMAL')
  424. ", [
  425. ':login' => $user->ADM_ACCOUNT,
  426. ]);
  427. if (!$rawUser) throw new Exception("Wystąpiły błędy podczas próby logowania. Brak użytkownika w bazie danych.");
  428. $user->ID = $rawUser['ID'];
  429. $user->ADM_TECH_WORKER = $rawUser['ADM_TECH_WORKER'];
  430. $user->ADM_COMPANY = $rawUser['ADM_COMPANY'];
  431. $user->ADM_ADMIN_LEVEL = $rawUser['ADM_ADMIN_LEVEL'];
  432. $user->ADM_PHONE = $rawUser['ADM_PHONE'];
  433. $user->ADM_ADMIN_EXPIRE = $rawUser['ADM_ADMIN_EXPIRE'];
  434. $user->ADM_ADMIN_DESC = $rawUser['ADM_ADMIN_DESC'];
  435. $user->EMAIL_IMAP_IMPORT_PASSWD = $rawUser['EMAIL_IMAP_IMPORT_PASSWD'];
  436. $user->EMAIL_IMAP_IMPORT_HOST = $rawUser['EMAIL_IMAP_IMPORT_HOST'];
  437. $user->EMAIL_IMAP_IMPORT_USERNAME = $rawUser['EMAIL_IMAP_IMPORT_USERNAME'];
  438. $user->EMPLOYEE_TYPE = $rawUser['EMPLOYEE_TYPE'];
  439. return $user;
  440. }
  441. public static function loginByDB($login, $pass) {
  442. $rawUser = DB::getPDO()->fetchFirst("
  443. select u.*
  444. from ADMIN_USERS u
  445. where u.ADM_ACCOUNT = :login
  446. and u.ADM_PASSWD_AES = :pass_hash
  447. and u.A_STATUS in('WAITING', 'NORMAL')
  448. ", [
  449. ':login' => $login,
  450. ':pass_hash' => hash('sha512', $pass),
  451. ]);
  452. if (!$rawUser) { // TODO: error log - change password for user
  453. error_log("TODO: update password hash for user '{$login}'");
  454. $rawUser = DB::getPDO()->fetchFirst("
  455. select u.*
  456. from ADMIN_USERS u
  457. where u.ADM_ACCOUNT = :login
  458. and ( u.ADM_PASSWD = :pass or u.ADM_PASSWD = md5( :pass ) )
  459. and u.ADM_PASSWD != ''
  460. and u.A_STATUS in('WAITING', 'NORMAL')
  461. ", [
  462. ':login' => $login,
  463. ':pass' => $pass,
  464. ]);
  465. }
  466. if (!$rawUser) throw new Exception("Proszę podać poprawny login i hasło!");
  467. $user = new stdClass();
  468. $user->ID = $rawUser['ID'];
  469. $user->ADM_TECH_WORKER = $rawUser['ADM_TECH_WORKER'];
  470. $user->ADM_COMPANY = $rawUser['ADM_COMPANY'];
  471. $user->AUTHORIZE_USER = $rawUser['ADM_ACCOUNT'];
  472. $user->ADM_ACCOUNT = $rawUser['ADM_ACCOUNT'];
  473. $user->ADM_NAME = $rawUser['ADM_NAME'];
  474. $user->ADM_ADMIN_LEVEL = $rawUser['ADM_ADMIN_LEVEL'];
  475. $user->ADM_PHONE = $rawUser['ADM_PHONE'];
  476. $user->ADM_ADMIN_EXPIRE = $rawUser['ADM_ADMIN_EXPIRE'];
  477. $user->ADM_ADMIN_DESC = $rawUser['ADM_ADMIN_DESC'];
  478. $user->EMAIL_IMAP_IMPORT_PASSWD = $rawUser['EMAIL_IMAP_IMPORT_PASSWD'];
  479. $user->EMAIL_IMAP_IMPORT_HOST = $rawUser['EMAIL_IMAP_IMPORT_HOST'];
  480. $user->EMAIL_IMAP_IMPORT_USERNAME = $rawUser['EMAIL_IMAP_IMPORT_USERNAME'];
  481. $user->EMPLOYEE_TYPE = $rawUser['EMPLOYEE_TYPE'];
  482. //$user->ADM_AREA = $rawUser['ADM_AREA'];
  483. //$_SESSION['ADM_PASSWD'] = $pass;
  484. return $user;
  485. }
  486. public static function kandydatLoginByDB($kandydatId, &$errors) {
  487. $db = DB::getDB();
  488. $kandydatId = (int)$kandydatId;
  489. $sql = "SELECT u.*
  490. from `ADMIN_USERS` as u
  491. where
  492. u.`ID`='{$kandydatId}'
  493. and u.`A_STATUS` in('WAITING','NORMAL')
  494. LIMIT 0, 1;
  495. ";
  496. $res = $db->query($sql);
  497. if (!$res) {
  498. die("Error SQL login!");
  499. }
  500. $num_rows = $db->num_rows($res);
  501. if ($num_rows == 0) {
  502. $errors[] = "Podales zlego uzytkownika lub/i haslo()";
  503. }
  504. else if ($num_rows == 1) {
  505. if ($r = $db->fetch($res)) {
  506. $user = new stdClass();
  507. $user->ID = $r->ID;
  508. $user->ADM_TECH_WORKER = $r->ADM_TECH_WORKER;
  509. $user->ADM_COMPANY = $r->ADM_COMPANY;
  510. $user->AUTHORIZE_USER = $r->ADM_ACCOUNT;
  511. $user->ADM_ACCOUNT = $r->ADM_ACCOUNT;
  512. $user->ADM_NAME = $r->ADM_NAME;
  513. $user->ADM_ADMIN_LEVEL = $r->ADM_ADMIN_LEVEL;
  514. $user->ADM_PHONE = $r->ADM_PHONE;
  515. $user->ADM_ADMIN_EXPIRE = $r->ADM_ADMIN_EXPIRE;
  516. $user->ADM_ADMIN_DESC = $r->ADM_ADMIN_DESC;
  517. $user->EMAIL_IMAP_IMPORT_PASSWD = $r->EMAIL_IMAP_IMPORT_PASSWD;
  518. $user->EMAIL_IMAP_IMPORT_HOST = $r->EMAIL_IMAP_IMPORT_HOST;
  519. $user->EMAIL_IMAP_IMPORT_USERNAME = $r->EMAIL_IMAP_IMPORT_USERNAME;
  520. $user->EMPLOYEE_TYPE = $r->EMPLOYEE_TYPE;
  521. //$user->ADM_AREA = "$r->ADM_AREA";
  522. //$_SESSION['ADM_PASSWD'] = $pass;
  523. return $user;
  524. }
  525. }
  526. return false;
  527. }
  528. public static function changePassword($login, $oldPass, $newPass) {
  529. if (!is_string($newPass)) throw new Exception("Błąd parametru");
  530. if (strlen($newPass) < 8) throw new Exception("Hasło zbyt krótkie (min. 8 znaków)"); // TODO regex 1 mala litera, 1 mala litera, 1 cyfra, min. 8 znakow
  531. if (!self::logged()) throw new Exception("Użytkownik niezalogwany");
  532. Lib::loadClass('LDAP');
  533. $ldap = LDAP::getInstance();
  534. if ($ldap != null && $ldap->isConnected()) {
  535. return self::changePasswordLDAP($login, $oldPass, $newPass);
  536. } else {
  537. return self::changePasswordDB($login, $oldPass, $newPass);
  538. }
  539. }
  540. public static function changePasswordLDAP($login, $oldPass, $newPass) {
  541. $usrStorageLdap = UserStorageFactory::getStorage('MacOSX');
  542. if (!$usrStorageLdap) throw new Exception("Error storage Ldap not exists");
  543. try {
  544. $user = self::loginByLDAP($login, $oldPass);
  545. } catch (Exception $e) {
  546. throw new Exception("Błędne hasło");
  547. }
  548. if (!$user) throw new Exception("Błąd weryfikacji użytkownika");
  549. if (!$usrStorageLdap->changePassword($login, $newPass)) {
  550. throw new Exception("Błąd podczas zmiany hasła");
  551. }
  552. $affected = DB::getPDO()->update('ADMIN_USERS', 'ID', $user->ID, [
  553. 'ADM_PASSWD' => '',
  554. 'ADM_PASSWD_AES' => hash('sha512', $newPass), // Mysql: SHA2('{$pass}', 512)
  555. ]);
  556. return ($affected > 0);
  557. }
  558. public static function changePasswordDB($login, $oldPass, $newPass) {
  559. try {
  560. $user = self::loginByDB($login, $oldPass);
  561. } catch (Exception $e) {
  562. throw new Exception("Błędne hasło");
  563. }
  564. if (!$user) throw new Exception("Błąd weryfikacji użytkownika");
  565. $affected = DB::getPDO()->update('ADMIN_USERS', 'ID', $user->ID, [
  566. 'ADM_PASSWD' => '',
  567. 'ADM_PASSWD_AES' => hash('sha512', $newPass), // Mysql: SHA2('{$pass}', 512)
  568. ]);
  569. return ($affected > 0);
  570. }
  571. /**
  572. * Check user access.
  573. * @param string $name
  574. * 'menu' - access to view menu
  575. *
  576. * @from [4101] ADM_ADMIN_LEVEL
  577. * Poziom uprawnień - każdy powinien mieć poziom o numerze 3
  578. * kierownicy powinni mieć 2
  579. * a administratorzy 0
  580. * kandydaci poziom 6.
  581. * Poziom 1 umożliwia edycje procesów i zasobów
  582. * poziom 2 umożliwia ocenę testów
  583. * poziom 3 umożliwia widzenie systemu jakości.
  584. */
  585. public static function hasAccess($name) {
  586. switch ($name) {
  587. case 'menu': {
  588. if (User::get('ADM_ADMIN_LEVEL') < 6) {
  589. return true;
  590. }
  591. else {
  592. Lib::loadClass('Config');
  593. $ALLOW_GUEST_ACCOUNT = (int)Config::get('ALLOW_GUEST_ACCOUNT');
  594. if ($ALLOW_GUEST_ACCOUNT && User::getLogin() == 'anonymous') {
  595. return true;
  596. }
  597. }
  598. break;
  599. }
  600. case 'dbg': {
  601. return (0 == User::get('ADM_ADMIN_LEVEL'));
  602. break;
  603. }
  604. case 'procesy': {
  605. if (User::get('ADM_ADMIN_LEVEL') < 4) return true;
  606. break;
  607. }
  608. case 'procesy_admin': {
  609. if (User::get('ADM_ADMIN_LEVEL') < 2) return true;
  610. break;
  611. }
  612. case 'testy': {
  613. if (User::get('ADM_ADMIN_LEVEL') <= 6) return true;
  614. break;
  615. }
  616. case 'testy_wyniki': {
  617. if (User::get('ADM_ADMIN_LEVEL') < 3) return true;
  618. break;
  619. }
  620. case 'testy_wyniki_edit': {
  621. if (User::get('ADM_ADMIN_LEVEL') < 3) return true;
  622. break;
  623. }
  624. case 'testy_wyniki_read': {
  625. if (User::get('ADM_ADMIN_LEVEL') < 3) return true;
  626. break;
  627. }
  628. case 'user_add_group': {
  629. if (User::get('ADM_ADMIN_LEVEL') < 1) return true;
  630. break;
  631. }
  632. default:
  633. }
  634. return false;
  635. }
  636. public static function hasAccessToEditTable($tableName) {
  637. if (empty($tableName)) return;
  638. $userAcl = User::getAcl();
  639. $userAcl->fetchGroups();
  640. Lib::loadClass('ProcesHelper');
  641. $zasobID = ProcesHelper::getZasobTableID($tableName);
  642. if (!$userAcl->hasTableAcl($zasobID)) {
  643. return false;
  644. }
  645. $tblAcl = $userAcl->getTableAcl($zasobID);
  646. if (empty($tblAcl)) {
  647. echo "Brak dostępu do tabeli nr {$zasobID} '{$tableName}'"; return;
  648. //throw new Exception("Brak dostępu do tabeli nr {$zasobID} '{$tableName}'");
  649. }
  650. $tblAcl->init();
  651. return $tblAcl->hasEditPerms();
  652. }
  653. public static function hasGroup($groupName) {
  654. // TODO: find group by name @see self::getGroups() @used in SchemaReaderProcess
  655. return false;
  656. }
  657. public static function getAnonymousAccount() {
  658. $db = DB::getDB();
  659. if (!$db) die("Error DB connection!");
  660. $sql = "select u.*
  661. from `ADMIN_USERS` as u
  662. where
  663. u.`ADM_ACCOUNT`='anonymous'
  664. and u.`EMPLOYEE_TYPE`='Anonymous'
  665. and u.`A_STATUS` in('NORMAL')
  666. order by u.`ID` asc
  667. limit 1
  668. ";
  669. $res = $db->query($sql);
  670. if (!$res) die("Error SQL login!");
  671. $num_rows = $db->num_rows($res);
  672. if ($r = $db->fetch($res)) {
  673. //$_SESSION['ADM_PASSWD'] = $pass;
  674. $user = new stdClass();
  675. $user->ID = "$r->ID";
  676. $user->AUTHORIZE_USER = "$r->ADM_ACCOUNT";
  677. $user->ADM_ACCOUNT = "$r->ADM_ACCOUNT";
  678. $user->ADM_PASSWD = "$r->ADM_PASSWD";
  679. //$user->ADM_AREA = "$r->ADM_AREA";
  680. $user->ADM_NAME = "$r->ADM_NAME";
  681. $user->ADM_TECH_WORKER = "$r->ADM_TECH_WORKER";
  682. $user->ADM_COMPANY = "$r->ADM_COMPANY";
  683. $user->ADM_ADMIN_LEVEL = "$r->ADM_ADMIN_LEVEL";
  684. $user->ADM_PHONE = "$r->ADM_PHONE";
  685. $user->ADM_ADMIN_EXPIRE = "$r->ADM_ADMIN_EXPIRE";
  686. $user->ADM_ADMIN_DESC = "$r->ADM_ADMIN_DESC";
  687. return $user;
  688. }
  689. return false;
  690. }
  691. public static function getLdapGroups() {
  692. $ldapGroups = User::_fetchLdapGroups();
  693. return $ldapGroups;
  694. }
  695. public static function getLdapGroupsNames() {
  696. $ldapGroupsNames = array();
  697. $ldapGroups = User::_fetchLdapGroups();
  698. foreach ($ldapGroups as $kID => $vLDAPGroup) {
  699. $ldapGroupsNames[$kID] = $vLDAPGroup->cn;
  700. }
  701. return $ldapGroupsNames;
  702. }
  703. public static function getLdapGroupsIds() {
  704. $ldapGroups = User::_fetchLdapGroups();
  705. $gidNumbers = array();
  706. if (!empty($ldapGroups)) {
  707. foreach ($ldapGroups as $vLdapGroup) {
  708. $gidNumbers[] = $vLdapGroup->gidNumber;
  709. }
  710. }
  711. return $gidNumbers;
  712. }
  713. public static function _fetchLdapGroups() {
  714. static $_groups;
  715. if (!$_groups) {
  716. $login = User::getLogin();
  717. Lib::loadClass('UsersLdapHelper');
  718. $_groups = UsersLdapHelper::getUserGroups($login, 3);
  719. //echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">getLDAPGroupByUserName (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($_groups);echo'</pre>';
  720. }
  721. return $_groups;
  722. }
  723. }