2007-07-19 12:40:05 +02:00
< ? php
2008-02-25 03:10:37 +01:00
/**
* Security section of the CMS
* @ package cms
* @ subpackage security
*/
2007-08-31 02:31:49 +02:00
class SecurityAdmin extends LeftAndMain implements PermissionProvider {
2008-10-08 01:27:07 +02:00
2008-11-02 22:27:55 +01:00
static $url_segment = 'security' ;
static $url_rule = '/$Action/$ID/$OtherID' ;
static $menu_title = 'Security' ;
2008-10-08 01:27:07 +02:00
static $tree_class = 'Group' ;
static $subitem_class = 'Member' ;
2008-02-25 03:10:37 +01:00
static $allowed_actions = array (
'autocomplete' ,
'removememberfromgroup' ,
2008-08-09 05:54:55 +02:00
'AddRecordForm' ,
2009-11-21 04:16:38 +01:00
'EditForm' ,
2010-02-11 00:06:31 +01:00
'MemberImportForm' ,
2010-02-11 00:06:35 +01:00
'memberimport' ,
'GroupImportForm' ,
'groupimport' ,
2010-02-11 22:55:35 +01:00
'RootForm'
2008-02-25 03:10:37 +01:00
);
2007-07-19 12:40:05 +02:00
2009-11-21 06:24:43 +01:00
/**
* @ var Array
*/
static $hidden_permissions = array ();
2007-07-19 12:40:05 +02:00
public function init () {
parent :: init ();
2009-04-29 03:44:28 +02:00
2011-03-15 10:30:28 +01:00
Requirements :: javascript ( CMS_DIR . '/javascript/SecurityAdmin.js' );
CMSBatchActionHandler :: register ( 'delete' , 'SecurityAdmin_DeleteBatchAction' , 'Group' );
2009-11-21 04:20:17 +01:00
}
function getEditForm ( $id = null ) {
2011-03-16 04:39:49 +01:00
// TODO Duplicate record fetching (see parent implementation)
2010-02-23 04:30:47 +01:00
if ( ! $id ) $id = $this -> currentPageID ();
2011-03-16 04:39:49 +01:00
$form = parent :: getEditForm ( $id );
// TODO Duplicate record fetching (see parent implementation)
$record = $this -> getRecord ( $id );
if ( $record && ! $record -> canView ()) return Security :: permissionFailure ( $this );
2011-03-15 10:30:28 +01:00
2010-02-11 00:06:35 +01:00
if ( $id && is_numeric ( $id )) {
2011-03-15 10:30:28 +01:00
$form = parent :: getEditForm ( $id );
if ( ! $form ) return false ;
$fields = $form -> Fields ();
if ( $fields -> hasTabSet () && $record -> canEdit ()) {
2010-02-11 00:06:35 +01:00
$fields -> findOrMakeTab ( 'Root.Import' , _t ( 'Group.IMPORTTABTITLE' , 'Import' ));
$fields -> addFieldToTab ( 'Root.Import' ,
new LiteralField (
'MemberImportFormIframe' ,
sprintf (
'<iframe src="%s" id="MemberImportFormIframe" width="100%%" height="400px" border="0"></iframe>' ,
$this -> Link ( 'memberimport' )
)
2010-02-11 00:06:31 +01:00
)
2010-02-11 00:06:35 +01:00
);
2010-10-04 08:09:10 +02:00
if ( Permission :: check ( 'APPLY_ROLES' )) {
$fields -> addFieldToTab (
'Root.Roles' ,
new LiteralField (
'RolesAddEditLink' ,
sprintf (
'<p class="add-role"><a href="%s">%s</a></p>' ,
$this -> Link ( 'show/root' ),
// TODO This should include #Root_Roles to switch directly to the tab,
// but tabstrip.js doesn't display tabs when directly adressed through a URL pragma
_t ( 'Group.RolesAddEditLink' , 'Add/edit roles' )
)
2010-10-04 08:04:21 +02:00
)
2010-10-04 08:09:10 +02:00
);
}
2010-02-11 00:06:35 +01:00
2011-03-15 10:30:28 +01:00
$form -> Actions () -> insertBefore (
$actionAddMember = new FormAction ( 'addmember' , _t ( 'SecurityAdmin.ADDMEMBER' , 'Add Member' )),
'action_save'
);
$actionAddMember -> setForm ( $form );
2010-02-23 04:32:18 +01:00
2011-03-15 10:30:28 +01:00
// Filter permissions
$permissionField = $form -> Fields () -> dataFieldByName ( 'Permissions' );
if ( $permissionField ) $permissionField -> setHiddenPermissions ( self :: $hidden_permissions );
}
2010-02-11 02:02:34 +01:00
2010-02-11 02:21:45 +01:00
$this -> extend ( 'updateEditForm' , $form );
2010-02-23 04:32:18 +01:00
} else {
$form = $this -> RootForm ();
2010-02-11 00:06:31 +01:00
}
2011-03-15 10:30:28 +01:00
2010-02-11 00:06:35 +01:00
return $form ;
}
2010-02-23 04:32:18 +01:00
2010-02-11 00:06:35 +01:00
/**
* @ return FieldSet
*/
function RootForm () {
2010-02-11 22:55:35 +01:00
$memberList = new MemberTableField (
$this ,
" Members "
);
// unset 'inlineadd' permission, we don't want inline addition
2010-10-04 08:10:22 +02:00
$memberList -> setPermissions ( array ( 'edit' , 'delete' , 'add' ));
2010-02-22 05:36:36 +01:00
$memberList -> setRelationAutoSetting ( false );
2010-02-11 22:55:35 +01:00
2010-02-11 00:06:35 +01:00
$fields = new FieldSet (
new TabSet (
'Root' ,
2010-02-11 22:55:35 +01:00
new Tab ( 'Members' , singleton ( 'Member' ) -> i18n_plural_name (),
$memberList ,
new LiteralField ( 'MembersCautionText' ,
sprintf ( '<p class="caution-remove"><strong>%s</strong></p>' ,
_t (
'SecurityAdmin.MemberListCaution' ,
'Caution: Removing members from this list will remove them from all groups and the database'
)
)
)
),
2010-02-11 00:06:35 +01:00
new Tab ( 'Import' , _t ( 'SecurityAdmin.TABIMPORT' , 'Import' ),
new LiteralField (
'GroupImportFormIframe' ,
sprintf (
'<iframe src="%s" id="GroupImportFormIframe" width="100%%" height="400px" border="0"></iframe>' ,
$this -> Link ( 'groupimport' )
)
)
)
),
// necessary for tree node selection in LeftAndMain.EditForm.js
new HiddenField ( 'ID' , false , 0 )
2009-11-21 04:20:17 +01:00
);
2010-10-04 08:04:21 +02:00
// Add roles editing interface
if ( Permission :: check ( 'APPLY_ROLES' )) {
$rolesCTF = new ComplexTableField (
$this ,
'Roles' ,
'PermissionRole'
);
2010-04-01 01:17:46 +02:00
$rolesCTF -> setPermissions ( array ( 'add' , 'edit' , 'delete' ));
2010-03-10 05:06:32 +01:00
2010-10-04 08:04:21 +02:00
$rolesTab = $fields -> findOrMakeTab ( 'Root.Roles' , _t ( 'SecurityAdmin.TABROLES' , 'Roles' ));
$rolesTab -> push ( new LiteralField (
'RolesDescription' ,
''
));
$rolesTab -> push ( $rolesCTF );
}
2010-02-11 22:55:35 +01:00
$actions = new FieldSet (
new FormAction ( 'addmember' , _t ( 'SecurityAdmin.ADDMEMBER' , 'Add Member' ))
);
2009-04-29 03:44:28 +02:00
2010-10-04 07:49:00 +02:00
$this -> extend ( 'updateRootFormFields' , $fields , $actions );
2010-02-11 00:06:35 +01:00
$form = new Form (
$this ,
2010-02-11 22:55:35 +01:00
'EditForm' ,
2010-02-11 00:06:35 +01:00
$fields ,
$actions
);
2010-06-03 02:18:52 +02:00
2009-11-21 04:20:17 +01:00
return $form ;
2007-07-19 12:40:05 +02:00
}
2010-02-11 00:06:31 +01:00
public function memberimport () {
Requirements :: clear ();
Requirements :: css ( SAPPHIRE_DIR . '/css/Form.css' );
Requirements :: css ( CMS_DIR . '/css/typography.css' );
Requirements :: css ( CMS_DIR . '/css/cms_right.css' );
2010-02-11 03:35:16 +01:00
Requirements :: javascript ( THIRDPARTY_DIR . '/jquery/jquery.js' );
2010-02-11 03:22:45 +01:00
Requirements :: css ( CMS_DIR . '/css/MemberImportForm.css' );
2011-02-24 05:08:38 +01:00
Requirements :: javascript ( SAPPHIRE_DIR . '/thirdparty/jquery-entwine/dist/jquery.entwine-dist.js' );
2010-02-11 00:06:31 +01:00
Requirements :: javascript ( CMS_DIR . '/javascript/MemberImportForm.js' );
return $this -> renderWith ( 'BlankPage' , array (
'Form' => $this -> MemberImportForm ()
));
}
/**
* @ see SecurityAdmin_MemberImportForm
*
* @ return Form
*/
public function MemberImportForm () {
$group = $this -> currentPage ();
$form = new MemberImportForm (
$this ,
'MemberImportForm'
);
$form -> setGroup ( $group );
return $form ;
}
2010-02-11 00:06:35 +01:00
public function groupimport () {
Requirements :: clear ();
Requirements :: css ( SAPPHIRE_DIR . '/css/Form.css' );
Requirements :: css ( CMS_DIR . '/css/typography.css' );
Requirements :: css ( CMS_DIR . '/css/cms_right.css' );
2010-02-11 03:35:16 +01:00
Requirements :: javascript ( THIRDPARTY_DIR . '/jquery/jquery.js' );
2010-02-11 03:22:45 +01:00
Requirements :: css ( CMS_DIR . '/css/MemberImportForm.css' );
2011-03-01 03:02:38 +01:00
Requirements :: javascript ( SAPPHIRE_DIR . '/thirdparty/jquery-entwine/dist/jquery.entwine-dist.js' );
2010-02-11 00:06:35 +01:00
Requirements :: javascript ( CMS_DIR . '/javascript/MemberImportForm.js' );
return $this -> renderWith ( 'BlankPage' , array (
'Form' => $this -> GroupImportForm ()
));
}
/**
* @ see SecurityAdmin_MemberImportForm
*
* @ return Form
*/
public function GroupImportForm () {
$form = new GroupImportForm (
$this ,
'GroupImportForm'
);
return $form ;
}
2007-07-19 12:40:05 +02:00
public function AddRecordForm () {
2008-08-10 23:41:10 +02:00
$m = Object :: create ( 'MemberTableField' ,
2007-07-19 12:40:05 +02:00
$this ,
2007-09-14 21:40:56 +02:00
" Members " ,
2007-07-19 12:40:05 +02:00
$this -> currentPageID ()
);
return $m -> AddRecordForm ();
}
/**
* Ajax autocompletion
*/
public function autocomplete () {
$fieldName = $this -> urlParams [ 'ID' ];
$fieldVal = $_REQUEST [ $fieldName ];
2008-02-25 03:10:37 +01:00
$result = '' ;
2011-03-08 09:01:51 +01:00
$uidField = Member :: get_unique_identifier_field ();
2009-07-17 04:23:57 +02:00
2008-12-04 23:38:58 +01:00
// Make sure we only autocomplete on keys that actually exist, and that we don't autocomplete on password
2009-07-17 04:23:57 +02:00
if ( ! singleton ( $this -> stat ( 'subitem_class' )) -> hasDatabaseField ( $fieldName ) || $fieldName == 'Password' ) return ;
2007-09-14 21:40:56 +02:00
2008-12-04 23:38:58 +01:00
$matches = DataObject :: get ( $this -> stat ( 'subitem_class' ), " \" $fieldName\ " LIKE '" . Convert::raw2sql($fieldVal) . "%' " );
2007-07-19 12:40:05 +02:00
if ( $matches ) {
$result .= " <ul> " ;
foreach ( $matches as $match ) {
2010-10-19 03:02:41 +02:00
// If the current user doesnt have permissions on the target user,
// he's not allowed to add it to a group either: Don't include it in the suggestions.
if ( ! $match -> canView () || ! $match -> canEdit ()) continue ;
2011-03-08 09:01:51 +01:00
$data = array ();
foreach ( $match -> summaryFields () as $k => $v ) {
$data [ $k ] = $match -> $k ;
}
$result .= sprintf (
'<li data-fields="%s">%s <span class="informal">(%s)</span></li>' ,
Convert :: raw2att ( Convert :: raw2json ( $data )),
$match -> $fieldName ,
implode ( ',' , array_values ( $data ))
);
2007-07-19 12:40:05 +02:00
}
$result .= " </ul> " ;
return $result ;
}
}
2011-03-15 10:30:28 +01:00
function getCMSTreeTitle () {
return _t ( 'SecurityAdmin.SGROUPS' , 'Security Groups' );
2007-07-19 12:40:05 +02:00
}
2007-09-14 21:40:56 +02:00
2007-07-19 12:40:05 +02:00
public function EditedMember () {
2009-02-03 03:50:25 +01:00
if ( Session :: get ( 'currentMember' )) return DataObject :: get_by_id ( 'Member' , ( int ) Session :: get ( 'currentMember' ));
2007-07-19 12:40:05 +02:00
}
2007-09-14 21:40:56 +02:00
2007-08-31 02:31:49 +02:00
function providePermissions () {
return array (
2009-10-29 01:55:20 +01:00
'EDIT_PERMISSIONS' => array (
'name' => _t ( 'SecurityAdmin.EDITPERMISSIONS' , 'Manage permissions for groups' ),
2009-10-30 02:43:34 +01:00
'category' => _t ( 'Permissions.PERMISSIONS_CATEGORY' , 'Roles and access permissions' ),
2010-10-13 06:12:59 +02:00
'help' => _t ( 'SecurityAdmin.EDITPERMISSIONS_HELP' , 'Ability to edit Permissions and IP Addresses for a group. Requires the "Access to \'Security\' section" permission.' ),
2009-10-29 01:55:20 +01:00
'sort' => 0
2009-10-29 22:36:13 +01:00
),
'APPLY_ROLES' => array (
'name' => _t ( 'SecurityAdmin.APPLY_ROLES' , 'Apply roles to groups' ),
2009-10-30 02:43:34 +01:00
'category' => _t ( 'Permissions.PERMISSIONS_CATEGORY' , 'Roles and access permissions' ),
2010-10-13 06:12:59 +02:00
'help' => _t ( 'SecurityAdmin.APPLY_ROLES_HELP' , 'Ability to edit the roles assigned to a group. Requires the "Access to \'Security\' section" permission.' ),
2009-10-29 22:36:13 +01:00
'sort' => 0
2009-10-29 01:55:20 +01:00
)
2007-08-31 02:31:49 +02:00
);
}
2009-11-21 03:01:21 +01:00
/**
2009-11-21 06:24:43 +01:00
* The permissions represented in the $codes will not appearing in the form
* containing { @ link PermissionCheckboxSetField } so as not to be checked / unchecked .
*
* @ param $codes String | Array
2009-11-21 03:01:21 +01:00
*/
2009-11-21 06:24:43 +01:00
static function add_hidden_permission ( $codes ){
if ( is_string ( $codes )) $codes = array ( $codes );
2009-12-16 06:54:23 +01:00
self :: $hidden_permissions = array_merge ( self :: $hidden_permissions , $codes );
2009-11-21 06:24:43 +01:00
}
/**
* @ param $codes String | Array
*/
static function remove_hidden_permission ( $codes ){
if ( is_string ( $codes )) $codes = array ( $codes );
self :: $hidden_permissions = array_diff ( self :: $hidden_permissions , $codes );
}
/**
* @ return Array
*/
static function get_hidden_permissions (){
return self :: $hidden_permissions ;
}
/**
* Clear all permissions previously hidden with { @ link add_hidden_permission }
*/
static function clear_hidden_permissions (){
self :: $hidden_permissions = array ();
2009-11-21 03:01:21 +01:00
}
2007-07-19 12:40:05 +02:00
}
2009-11-21 04:20:17 +01:00
/**
* Delete multiple { @ link Group } records . Usually used through the { @ link SecurityAdmin } interface .
*
* @ package cms
* @ subpackage batchactions
*/
class SecurityAdmin_DeleteBatchAction extends CMSBatchAction {
function getActionTitle () {
return _t ( 'AssetAdmin_DeleteBatchAction.TITLE' , 'Delete groups' );
}
function run ( DataObjectSet $records ) {
$status = array (
'modified' => array (),
'deleted' => array ()
);
foreach ( $records as $record ) {
// TODO Provide better feedback if permission was denied
if ( ! $record -> canDelete ()) continue ;
$id = $record -> ID ;
$record -> delete ();
$status [ 'deleted' ][ $id ] = array ();
$record -> destroy ();
unset ( $record );
}
return Convert :: raw2json ( $status );
}
}
2009-02-03 04:46:15 +01:00
?>