srchub-old

srchub-old Mercurial Source Tree


Root/indefero/src/IDF/Precondition.php

<?php
/* -*- tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
/*
# ***** BEGIN LICENSE BLOCK *****
# This file is part of InDefero, an open source project management application.
# Copyright (C) 2008-2011 CĂ©ondo Ltd and contributors.
#
# InDefero is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# InDefero is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
#
# ***** END LICENSE BLOCK ***** */

class IDF_Precondition
{
    /**
     * Check if the user has a base authorization to access a given
     * tab. This used in the case of private project. You need to
     * further control with the accessSource, accessIssues,
     * etc. preconditions.
     *
     * @param Pluf_HTTP_Request
     * @return mixed
     */
    static public function baseAccess($request)
    {
        if (!$request->project->private) {
            return true;
        }
        if ($request->user->hasPerm('IDF.project-authorized-user', $request->project)) {
            return true;
        }
        return self::projectMemberOrOwner($request);
    }

    /**
     * Check if the user is project owner.
     *
     * @param Pluf_HTTP_Request
     * @return mixed
     */
    static public function projectOwner($request)
    {
        $res = Pluf_Precondition::loginRequired($request);
        if (true !== $res) {
            return $res;
        }
        if ($request->user->hasPerm('IDF.project-owner', $request->project)) {
            return true;
        }
        return new Pluf_HTTP_Response_Forbidden($request);
    }

    /**
     * Check if the user is project owner or member.
     *
     * @param Pluf_HTTP_Request
     * @return mixed
     */
    static public function projectMemberOrOwner($request)
    {
        $res = Pluf_Precondition::loginRequired($request);
        if (true !== $res) {
            return $res;
        }
        if ($request->user->hasPerm('IDF.project-owner', $request->project)
            or
            $request->user->hasPerm('IDF.project-member', $request->project)
            ) {
            return true;
        }
        return new Pluf_HTTP_Response_Forbidden($request);
    }

    /**
     * Check if the user can access a given element.
     *
     * The rights are:
     *  - 'all' (default)
     *  - 'none'
     *  - 'login'
     *  - 'members'
     *  - 'owners'
     *
     * The order of the rights is such that a 'owner' is also a
     * 'member' and of course a logged in person.
     *
     * @param Pluf_HTTP_Request
     * @param string Control key
     * @return mixed
     */
    static public function accessTabGeneric($request, $key)
    {
        switch ($request->conf->getVal($key, 'all')) {
        case 'none':
            return new Pluf_HTTP_Response_Forbidden($request);
        case 'login':
            return Pluf_Precondition::loginRequired($request);
        case 'members':
            return self::projectMemberOrOwner($request);
        case 'owners':
            return self::projectOwner($request);
        case 'all':
        default:
            return true;
        }
    }

    static public function accessSource($request)
    {
        $res = self::baseAccess($request);
        if (true !== $res) {
            return $res;
        }
        return self::accessTabGeneric($request, 'source_access_rights');
    }

    static public function accessIssues($request)
    {
        $res = self::baseAccess($request);
        if (true !== $res) {
            return $res;
        }
        return self::accessTabGeneric($request, 'issues_access_rights');
    }

    static public function accessDownloads($request)
    {
        $res = self::baseAccess($request);
        if (true !== $res) {
            return $res;
        }
        return self::accessTabGeneric($request, 'downloads_access_rights');
    }

    static public function accessWiki($request)
    {
        $res = self::baseAccess($request);
        if (true !== $res) {
            return $res;
        }
        return self::accessTabGeneric($request, 'wiki_access_rights');
    }

    static public function accessReview($request)
    {
        $res = self::baseAccess($request);
        if (true !== $res) {
            return $res;
        }
        return self::accessTabGeneric($request, 'review_access_rights');
    }

    /**
     * Based on the request, it is automatically setting the user.
     *
     * API calls are not translated.
     */
    static public function apiSetUser($request)
    {
        // REQUEST is used to be used both for POST and GET requests.
        if (!isset($request->REQUEST['_hash'])
            or !isset($request->REQUEST['_login'])
            or !isset($request->REQUEST['_salt'])) {
            // equivalent to anonymous access.
            return true;
        }
        $db =& Pluf::db();
        $true = Pluf_DB_BooleanToDb(true, $db);
        $sql = new Pluf_SQL('login=%s AND active='.$true,
                            $request->REQUEST['_login']);
        $users = Pluf::factory('Pluf_User')->getList(array('filter'=>$sql->gen()));
        if ($users->count() != 1 or !$users[0]->active) {
            // Should return a special authentication error like user
            // not found.
            return true;
        }
        $hash = sha1($request->REQUEST['_salt'].sha1($users[0]->password));
        if ($hash != $request->REQUEST['_hash']) {
            return true; // Again need authentication error
        }
        $request->user = $users[0];
        
        // Don't try to load projects rights access if we are not in one
        if ($request->query !== "/api/") {
            IDF_Middleware::setRights($request);
        }
            
        return true;
    }

    /**
     * Based on the request, it is automatically setting the user.
     *
     * Authenticated feeds have a token set at the end of the url in
     * the for of 'authenticated/url/token/234092384023woeiur/'. If
     * you remove 'token/234092384023woeiur/' the url is not
     * authenticated.
     *
     * If the user is already logged in and not anonymous and no token
     * is given, then the user is unset and a non authenticated user
     * is loaded. This is to avoid people to not understand why a
     * normally not authenticated feed is providing authenticated
     * data.
     */
    static public function feedSetUser($request)
    {
        if (!isset($request->project)) {
            return true; // we do not act on non project pages at the
                         // moment.
        }
        if (!$request->user->isAnonymous()) {
            // by default anonymous
            $request->user = new Pluf_User();
            IDF_Middleware::setRights($request);
        }
        $match = array();
        if (!preg_match('#/token/([^/]+)/$#', $request->query, $match)) {
            return true; // anonymous
        }
        $token = $match[1];
        $hash = substr($token, 0, 2);
        $encrypted = substr($token, 2);
        if ($hash != substr(md5(Pluf::f('secret_key').$encrypted), 0, 2)) {
            return true; // no match in the hash, anonymous
        }
        $cr = new Pluf_Crypt(md5(Pluf::f('secret_key')));
        list($userid, $projectid) = explode(':', $cr->decrypt($encrypted), 2);
        if ($projectid != $request->project->id) {
           return true; // anonymous
        }
        $user = new Pluf_User($userid);
        if (!$user->active) {
           return true; // anonymous
        }
        $request->user = $user;
        IDF_Middleware::setRights($request);
        return true;
    }

    /**
     * Generate the token for the feed.
     *
     * @param IDF_Project
     * @param Pluf_User
     * @return string Token
     */
    static public function genFeedToken($project, $user)
    {
        $cr = new Pluf_Crypt(md5(Pluf::f('secret_key')));
        $encrypted = trim($cr->encrypt($user->id.':'.$project->id), '~');
        return substr(md5(Pluf::f('secret_key').$encrypted), 0, 2).$encrypted;
    }
}
Source at commit 2ef32c152848 created 10 years 6 months ago.
By "Nathan Adams ", Fixing issue 23 - Forge watch list SQL queries too high

Archive Download this file

Branches

Tags

Page rendered in 7.73605s using 11 queries.