source: forum/includes/auth.php@ 651

Last change on this file since 651 was 651, checked in by aleg, 15 years ago

Změněná cesta k GM a Char logům pro realmy 4 a 7.

File size: 28.4 KB
Line 
1<?php
2/**
3*
4* @package phpBB3
5* @version $Id: auth.php 8985 2008-10-09 13:18:38Z acydburn $
6* @copyright (c) 2005 phpBB Group
7* @license http://opensource.org/licenses/gpl-license.php GNU Public License
8*
9*/
10
11/**
12* @ignore
13*/
14if (!defined('IN_PHPBB'))
15{
16 exit;
17}
18
19/**
20* Permission/Auth class
21* @package phpBB3
22*/
23class auth
24{
25 var $acl = array();
26 var $cache = array();
27 var $acl_options = array();
28 var $acl_forum_ids = false;
29
30 /**
31 * Init permissions
32 */
33 function acl(&$userdata)
34 {
35 global $db, $cache;
36
37 $this->acl = $this->cache = $this->acl_options = array();
38 $this->acl_forum_ids = false;
39
40 if (($this->acl_options = $cache->get('_acl_options')) === false)
41 {
42 $sql = 'SELECT auth_option_id, auth_option, is_global, is_local
43 FROM ' . ACL_OPTIONS_TABLE . '
44 ORDER BY auth_option_id';
45 $result = $db->sql_query($sql);
46
47 $global = $local = 0;
48 $this->acl_options = array();
49 while ($row = $db->sql_fetchrow($result))
50 {
51 if ($row['is_global'])
52 {
53 $this->acl_options['global'][$row['auth_option']] = $global++;
54 }
55
56 if ($row['is_local'])
57 {
58 $this->acl_options['local'][$row['auth_option']] = $local++;
59 }
60
61 $this->acl_options['id'][$row['auth_option']] = (int) $row['auth_option_id'];
62 $this->acl_options['option'][(int) $row['auth_option_id']] = $row['auth_option'];
63 }
64 $db->sql_freeresult($result);
65
66 $cache->put('_acl_options', $this->acl_options);
67 $this->acl_cache($userdata);
68 }
69 else if (!trim($userdata['user_permissions']))
70 {
71 $this->acl_cache($userdata);
72 }
73
74 // Fill ACL array
75 $this->_fill_acl($userdata['user_permissions']);
76
77 // Verify bitstring length with options provided...
78 $renew = false;
79 $global_length = sizeof($this->acl_options['global']);
80 $local_length = sizeof($this->acl_options['local']);
81
82 // Specify comparing length (bitstring is padded to 31 bits)
83 $global_length = ($global_length % 31) ? ($global_length - ($global_length % 31) + 31) : $global_length;
84 $local_length = ($local_length % 31) ? ($local_length - ($local_length % 31) + 31) : $local_length;
85
86 // You thought we are finished now? Noooo... now compare them.
87 foreach ($this->acl as $forum_id => $bitstring)
88 {
89 if (($forum_id && strlen($bitstring) != $local_length) || (!$forum_id && strlen($bitstring) != $global_length))
90 {
91 $renew = true;
92 break;
93 }
94 }
95
96 // If a bitstring within the list does not match the options, we have a user with incorrect permissions set and need to renew them
97 if ($renew)
98 {
99 $this->acl_cache($userdata);
100 $this->_fill_acl($userdata['user_permissions']);
101 }
102
103 return;
104 }
105
106 /**
107 * Fill ACL array with relevant bitstrings from user_permissions column
108 * @access private
109 */
110 function _fill_acl($user_permissions)
111 {
112 $this->acl = array();
113 $user_permissions = explode("\n", $user_permissions);
114
115 foreach ($user_permissions as $f => $seq)
116 {
117 if ($seq)
118 {
119 $i = 0;
120
121 if (!isset($this->acl[$f]))
122 {
123 $this->acl[$f] = '';
124 }
125
126 while ($subseq = substr($seq, $i, 6))
127 {
128 // We put the original bitstring into the acl array
129 $this->acl[$f] .= str_pad(base_convert($subseq, 36, 2), 31, 0, STR_PAD_LEFT);
130 $i += 6;
131 }
132 }
133 }
134 }
135
136 /**
137 * Look up an option
138 * if the option is prefixed with !, then the result becomes negated
139 *
140 * If a forum id is specified the local option will be combined with a global option if one exist.
141 * If a forum id is not specified, only the global option will be checked.
142 */
143 function acl_get($opt, $f = 0)
144 {
145 $negate = false;
146
147 if (strpos($opt, '!') === 0)
148 {
149 $negate = true;
150 $opt = substr($opt, 1);
151 }
152
153 if (!isset($this->cache[$f][$opt]))
154 {
155 // We combine the global/local option with an OR because some options are global and local.
156 // If the user has the global permission the local one is true too and vice versa
157 $this->cache[$f][$opt] = false;
158
159 // Is this option a global permission setting?
160 if (isset($this->acl_options['global'][$opt]))
161 {
162 if (isset($this->acl[0]))
163 {
164 $this->cache[$f][$opt] = $this->acl[0][$this->acl_options['global'][$opt]];
165 }
166 }
167
168 // Is this option a local permission setting?
169 // But if we check for a global option only, we won't combine the options...
170 if ($f != 0 && isset($this->acl_options['local'][$opt]))
171 {
172 if (isset($this->acl[$f]) && isset($this->acl[$f][$this->acl_options['local'][$opt]]))
173 {
174 $this->cache[$f][$opt] |= $this->acl[$f][$this->acl_options['local'][$opt]];
175 }
176 }
177 }
178
179 // Founder always has all global options set to true...
180 return ($negate) ? !$this->cache[$f][$opt] : $this->cache[$f][$opt];
181 }
182
183 /**
184 * Get forums with the specified permission setting
185 * if the option is prefixed with !, then the result becomes nagated
186 *
187 * @param bool $clean set to true if only values needs to be returned which are set/unset
188 */
189 function acl_getf($opt, $clean = false)
190 {
191 $acl_f = array();
192 $negate = false;
193
194 if (strpos($opt, '!') === 0)
195 {
196 $negate = true;
197 $opt = substr($opt, 1);
198 }
199
200 // If we retrieve a list of forums not having permissions in, we need to get every forum_id
201 if ($negate)
202 {
203 if ($this->acl_forum_ids === false)
204 {
205 global $db;
206
207 $sql = 'SELECT forum_id
208 FROM ' . FORUMS_TABLE;
209
210 if (sizeof($this->acl))
211 {
212 $sql .= ' WHERE ' . $db->sql_in_set('forum_id', array_keys($this->acl), true);
213 }
214 $result = $db->sql_query($sql);
215
216 $this->acl_forum_ids = array();
217 while ($row = $db->sql_fetchrow($result))
218 {
219 $this->acl_forum_ids[] = $row['forum_id'];
220 }
221 $db->sql_freeresult($result);
222 }
223 }
224
225 if (isset($this->acl_options['local'][$opt]))
226 {
227 foreach ($this->acl as $f => $bitstring)
228 {
229 // Skip global settings
230 if (!$f)
231 {
232 continue;
233 }
234
235 $allowed = (!isset($this->cache[$f][$opt])) ? $this->acl_get($opt, $f) : $this->cache[$f][$opt];
236
237 if (!$clean)
238 {
239 $acl_f[$f][$opt] = ($negate) ? !$allowed : $allowed;
240 }
241 else
242 {
243 if (($negate && !$allowed) || (!$negate && $allowed))
244 {
245 $acl_f[$f][$opt] = 1;
246 }
247 }
248 }
249 }
250
251 // If we get forum_ids not having this permission, we need to fill the remaining parts
252 if ($negate && sizeof($this->acl_forum_ids))
253 {
254 foreach ($this->acl_forum_ids as $f)
255 {
256 $acl_f[$f][$opt] = 1;
257 }
258 }
259
260 return $acl_f;
261 }
262
263 /**
264 * Get local permission state for any forum.
265 *
266 * Returns true if user has the permission in one or more forums, false if in no forum.
267 * If global option is checked it returns the global state (same as acl_get($opt))
268 * Local option has precedence...
269 */
270 function acl_getf_global($opt)
271 {
272 if (is_array($opt))
273 {
274 // evaluates to true as soon as acl_getf_global is true for one option
275 foreach ($opt as $check_option)
276 {
277 if ($this->acl_getf_global($check_option))
278 {
279 return true;
280 }
281 }
282
283 return false;
284 }
285
286 if (isset($this->acl_options['local'][$opt]))
287 {
288 foreach ($this->acl as $f => $bitstring)
289 {
290 // Skip global settings
291 if (!$f)
292 {
293 continue;
294 }
295
296 // as soon as the user has any permission we're done so return true
297 if ((!isset($this->cache[$f][$opt])) ? $this->acl_get($opt, $f) : $this->cache[$f][$opt])
298 {
299 return true;
300 }
301 }
302 }
303 else if (isset($this->acl_options['global'][$opt]))
304 {
305 return $this->acl_get($opt);
306 }
307
308 return false;
309 }
310
311 /**
312 * Get permission settings (more than one)
313 */
314 function acl_gets()
315 {
316 $args = func_get_args();
317 $f = array_pop($args);
318
319 if (!is_numeric($f))
320 {
321 $args[] = $f;
322 $f = 0;
323 }
324
325 // alternate syntax: acl_gets(array('m_', 'a_'), $forum_id)
326 if (is_array($args[0]))
327 {
328 $args = $args[0];
329 }
330
331 $acl = 0;
332 foreach ($args as $opt)
333 {
334 $acl |= $this->acl_get($opt, $f);
335 }
336
337 return $acl;
338 }
339
340 /**
341 * Get permission listing based on user_id/options/forum_ids
342 */
343 function acl_get_list($user_id = false, $opts = false, $forum_id = false)
344 {
345 if ($user_id !== false && !is_array($user_id) && $opts === false && $forum_id === false)
346 {
347 $hold_ary = array($user_id => $this->acl_raw_data_single_user($user_id));
348 }
349 else
350 {
351 $hold_ary = $this->acl_raw_data($user_id, $opts, $forum_id);
352 }
353
354 $auth_ary = array();
355 foreach ($hold_ary as $user_id => $forum_ary)
356 {
357 foreach ($forum_ary as $forum_id => $auth_option_ary)
358 {
359 foreach ($auth_option_ary as $auth_option => $auth_setting)
360 {
361 if ($auth_setting)
362 {
363 $auth_ary[$forum_id][$auth_option][] = $user_id;
364 }
365 }
366 }
367 }
368
369 return $auth_ary;
370 }
371
372 /**
373 * Cache data to user_permissions row
374 */
375 function acl_cache(&$userdata)
376 {
377 global $db;
378
379 // Empty user_permissions
380 $userdata['user_permissions'] = '';
381
382 $hold_ary = $this->acl_raw_data_single_user($userdata['user_id']);
383
384 // Key 0 in $hold_ary are global options, all others are forum_ids
385
386 // If this user is founder we're going to force fill the admin options ...
387 if ($userdata['user_type'] == USER_FOUNDER)
388 {
389 foreach ($this->acl_options['global'] as $opt => $id)
390 {
391 if (strpos($opt, 'a_') === 0)
392 {
393 $hold_ary[0][$this->acl_options['id'][$opt]] = ACL_YES;
394 }
395 }
396 }
397
398 $hold_str = $this->build_bitstring($hold_ary);
399
400 if ($hold_str)
401 {
402 $userdata['user_permissions'] = $hold_str;
403
404 $sql = 'UPDATE ' . USERS_TABLE . "
405 SET user_permissions = '" . $db->sql_escape($userdata['user_permissions']) . "',
406 user_perm_from = 0
407 WHERE user_id = " . $userdata['user_id'];
408 $db->sql_query($sql);
409 }
410
411 return;
412 }
413
414 /**
415 * Build bitstring from permission set
416 */
417 function build_bitstring(&$hold_ary)
418 {
419 $hold_str = '';
420
421 if (sizeof($hold_ary))
422 {
423 ksort($hold_ary);
424
425 $last_f = 0;
426
427 foreach ($hold_ary as $f => $auth_ary)
428 {
429 $ary_key = (!$f) ? 'global' : 'local';
430
431 $bitstring = array();
432 foreach ($this->acl_options[$ary_key] as $opt => $id)
433 {
434 if (isset($auth_ary[$this->acl_options['id'][$opt]]))
435 {
436 $bitstring[$id] = $auth_ary[$this->acl_options['id'][$opt]];
437
438 $option_key = substr($opt, 0, strpos($opt, '_') + 1);
439
440 // If one option is allowed, the global permission for this option has to be allowed too
441 // example: if the user has the a_ permission this means he has one or more a_* permissions
442 if ($auth_ary[$this->acl_options['id'][$opt]] == ACL_YES && (!isset($bitstring[$this->acl_options[$ary_key][$option_key]]) || $bitstring[$this->acl_options[$ary_key][$option_key]] == ACL_NEVER))
443 {
444 $bitstring[$this->acl_options[$ary_key][$option_key]] = ACL_YES;
445 }
446 }
447 else
448 {
449 $bitstring[$id] = ACL_NEVER;
450 }
451 }
452
453 // Now this bitstring defines the permission setting for the current forum $f (or global setting)
454 $bitstring = implode('', $bitstring);
455
456 // The line number indicates the id, therefore we have to add empty lines for those ids not present
457 $hold_str .= str_repeat("\n", $f - $last_f);
458
459 // Convert bitstring for storage - we do not use binary/bytes because PHP's string functions are not fully binary safe
460 for ($i = 0, $bit_length = strlen($bitstring); $i < $bit_length; $i += 31)
461 {
462 $hold_str .= str_pad(base_convert(str_pad(substr($bitstring, $i, 31), 31, 0, STR_PAD_RIGHT), 2, 36), 6, 0, STR_PAD_LEFT);
463 }
464
465 $last_f = $f;
466 }
467 unset($bitstring);
468
469 $hold_str = rtrim($hold_str);
470 }
471
472 return $hold_str;
473 }
474
475 /**
476 * Clear one or all users cached permission settings
477 */
478 function acl_clear_prefetch($user_id = false)
479 {
480 global $db, $cache;
481
482 // Rebuild options cache
483 $cache->destroy('_role_cache');
484
485 $sql = 'SELECT *
486 FROM ' . ACL_ROLES_DATA_TABLE . '
487 ORDER BY role_id ASC';
488 $result = $db->sql_query($sql);
489
490 $this->role_cache = array();
491 while ($row = $db->sql_fetchrow($result))
492 {
493 $this->role_cache[$row['role_id']][$row['auth_option_id']] = (int) $row['auth_setting'];
494 }
495 $db->sql_freeresult($result);
496
497 foreach ($this->role_cache as $role_id => $role_options)
498 {
499 $this->role_cache[$role_id] = serialize($role_options);
500 }
501
502 $cache->put('_role_cache', $this->role_cache);
503
504 // Now empty user permissions
505 $where_sql = '';
506
507 if ($user_id !== false)
508 {
509 $user_id = (!is_array($user_id)) ? $user_id = array((int) $user_id) : array_map('intval', $user_id);
510 $where_sql = ' WHERE ' . $db->sql_in_set('user_id', $user_id);
511 }
512
513 $sql = 'UPDATE ' . USERS_TABLE . "
514 SET user_permissions = '',
515 user_perm_from = 0
516 $where_sql";
517 $db->sql_query($sql);
518
519 return;
520 }
521
522 /**
523 * Get assigned roles
524 */
525 function acl_role_data($user_type, $role_type, $ug_id = false, $forum_id = false)
526 {
527 global $db;
528
529 $roles = array();
530
531 $sql_id = ($user_type == 'user') ? 'user_id' : 'group_id';
532
533 $sql_ug = ($ug_id !== false) ? ((!is_array($ug_id)) ? "AND a.$sql_id = $ug_id" : 'AND ' . $db->sql_in_set("a.$sql_id", $ug_id)) : '';
534 $sql_forum = ($forum_id !== false) ? ((!is_array($forum_id)) ? "AND a.forum_id = $forum_id" : 'AND ' . $db->sql_in_set('a.forum_id', $forum_id)) : '';
535
536 // Grab assigned roles...
537 $sql = 'SELECT a.auth_role_id, a.' . $sql_id . ', a.forum_id
538 FROM ' . (($user_type == 'user') ? ACL_USERS_TABLE : ACL_GROUPS_TABLE) . ' a, ' . ACL_ROLES_TABLE . " r
539 WHERE a.auth_role_id = r.role_id
540 AND r.role_type = '" . $db->sql_escape($role_type) . "'
541 $sql_ug
542 $sql_forum
543 ORDER BY r.role_order ASC";
544 $result = $db->sql_query($sql);
545
546 while ($row = $db->sql_fetchrow($result))
547 {
548 $roles[$row[$sql_id]][$row['forum_id']] = $row['auth_role_id'];
549 }
550 $db->sql_freeresult($result);
551
552 return $roles;
553 }
554
555 /**
556 * Get raw acl data based on user/option/forum
557 */
558 function acl_raw_data($user_id = false, $opts = false, $forum_id = false)
559 {
560 global $db;
561
562 $sql_user = ($user_id !== false) ? ((!is_array($user_id)) ? 'user_id = ' . (int) $user_id : $db->sql_in_set('user_id', array_map('intval', $user_id))) : '';
563 $sql_forum = ($forum_id !== false) ? ((!is_array($forum_id)) ? 'AND a.forum_id = ' . (int) $forum_id : 'AND ' . $db->sql_in_set('a.forum_id', array_map('intval', $forum_id))) : '';
564
565 $sql_opts = $sql_opts_select = $sql_opts_from = '';
566 $hold_ary = array();
567
568 if ($opts !== false)
569 {
570 $sql_opts_select = ', ao.auth_option';
571 $sql_opts_from = ', ' . ACL_OPTIONS_TABLE . ' ao';
572 $this->build_auth_option_statement('ao.auth_option', $opts, $sql_opts);
573 }
574
575 $sql_ary = array();
576
577 // Grab non-role settings - user-specific
578 $sql_ary[] = 'SELECT a.user_id, a.forum_id, a.auth_setting, a.auth_option_id' . $sql_opts_select . '
579 FROM ' . ACL_USERS_TABLE . ' a' . $sql_opts_from . '
580 WHERE a.auth_role_id = 0 ' .
581 (($sql_opts_from) ? 'AND a.auth_option_id = ao.auth_option_id ' : '') .
582 (($sql_user) ? 'AND a.' . $sql_user : '') . "
583 $sql_forum
584 $sql_opts";
585
586 // Now the role settings - user-specific
587 $sql_ary[] = 'SELECT a.user_id, a.forum_id, r.auth_option_id, r.auth_setting, r.auth_option_id' . $sql_opts_select . '
588 FROM ' . ACL_USERS_TABLE . ' a, ' . ACL_ROLES_DATA_TABLE . ' r' . $sql_opts_from . '
589 WHERE a.auth_role_id = r.role_id ' .
590 (($sql_opts_from) ? 'AND r.auth_option_id = ao.auth_option_id ' : '') .
591 (($sql_user) ? 'AND a.' . $sql_user : '') . "
592 $sql_forum
593 $sql_opts";
594
595 foreach ($sql_ary as $sql)
596 {
597 $result = $db->sql_query($sql);
598
599 while ($row = $db->sql_fetchrow($result))
600 {
601 $option = ($sql_opts_select) ? $row['auth_option'] : $this->acl_options['option'][$row['auth_option_id']];
602 $hold_ary[$row['user_id']][$row['forum_id']][$option] = $row['auth_setting'];
603 }
604 $db->sql_freeresult($result);
605 }
606
607 $sql_ary = array();
608
609 // Now grab group settings - non-role specific...
610 $sql_ary[] = 'SELECT ug.user_id, a.forum_id, a.auth_setting, a.auth_option_id' . $sql_opts_select . '
611 FROM ' . ACL_GROUPS_TABLE . ' a, ' . USER_GROUP_TABLE . ' ug' . $sql_opts_from . '
612 WHERE a.auth_role_id = 0 ' .
613 (($sql_opts_from) ? 'AND a.auth_option_id = ao.auth_option_id ' : '') . '
614 AND a.group_id = ug.group_id
615 AND ug.user_pending = 0
616 ' . (($sql_user) ? 'AND ug.' . $sql_user : '') . "
617 $sql_forum
618 $sql_opts";
619
620 // Now grab group settings - role specific...
621 $sql_ary[] = 'SELECT ug.user_id, a.forum_id, r.auth_setting, r.auth_option_id' . $sql_opts_select . '
622 FROM ' . ACL_GROUPS_TABLE . ' a, ' . USER_GROUP_TABLE . ' ug, ' . ACL_ROLES_DATA_TABLE . ' r' . $sql_opts_from . '
623 WHERE a.auth_role_id = r.role_id ' .
624 (($sql_opts_from) ? 'AND r.auth_option_id = ao.auth_option_id ' : '') . '
625 AND a.group_id = ug.group_id
626 AND ug.user_pending = 0
627 ' . (($sql_user) ? 'AND ug.' . $sql_user : '') . "
628 $sql_forum
629 $sql_opts";
630
631 foreach ($sql_ary as $sql)
632 {
633 $result = $db->sql_query($sql);
634
635 while ($row = $db->sql_fetchrow($result))
636 {
637 $option = ($sql_opts_select) ? $row['auth_option'] : $this->acl_options['option'][$row['auth_option_id']];
638
639 if (!isset($hold_ary[$row['user_id']][$row['forum_id']][$option]) || (isset($hold_ary[$row['user_id']][$row['forum_id']][$option]) && $hold_ary[$row['user_id']][$row['forum_id']][$option] != ACL_NEVER))
640 {
641 $hold_ary[$row['user_id']][$row['forum_id']][$option] = $row['auth_setting'];
642
643 // If we detect ACL_NEVER, we will unset the flag option (within building the bitstring it is correctly set again)
644 if ($row['auth_setting'] == ACL_NEVER)
645 {
646 $flag = substr($option, 0, strpos($option, '_') + 1);
647
648 if (isset($hold_ary[$row['user_id']][$row['forum_id']][$flag]) && $hold_ary[$row['user_id']][$row['forum_id']][$flag] == ACL_YES)
649 {
650 unset($hold_ary[$row['user_id']][$row['forum_id']][$flag]);
651
652/* if (in_array(ACL_YES, $hold_ary[$row['user_id']][$row['forum_id']]))
653 {
654 $hold_ary[$row['user_id']][$row['forum_id']][$flag] = ACL_YES;
655 }
656*/
657 }
658 }
659 }
660 }
661 $db->sql_freeresult($result);
662 }
663
664 return $hold_ary;
665 }
666
667 /**
668 * Get raw user based permission settings
669 */
670 function acl_user_raw_data($user_id = false, $opts = false, $forum_id = false)
671 {
672 global $db;
673
674 $sql_user = ($user_id !== false) ? ((!is_array($user_id)) ? 'user_id = ' . (int) $user_id : $db->sql_in_set('user_id', array_map('intval', $user_id))) : '';
675 $sql_forum = ($forum_id !== false) ? ((!is_array($forum_id)) ? 'AND a.forum_id = ' . (int) $forum_id : 'AND ' . $db->sql_in_set('a.forum_id', array_map('intval', $forum_id))) : '';
676
677 $sql_opts = '';
678 $hold_ary = $sql_ary = array();
679
680 if ($opts !== false)
681 {
682 $this->build_auth_option_statement('ao.auth_option', $opts, $sql_opts);
683 }
684
685 // Grab user settings - non-role specific...
686 $sql_ary[] = 'SELECT a.user_id, a.forum_id, a.auth_setting, a.auth_option_id, ao.auth_option
687 FROM ' . ACL_USERS_TABLE . ' a, ' . ACL_OPTIONS_TABLE . ' ao
688 WHERE a.auth_role_id = 0
689 AND a.auth_option_id = ao.auth_option_id ' .
690 (($sql_user) ? 'AND a.' . $sql_user : '') . "
691 $sql_forum
692 $sql_opts
693 ORDER BY a.forum_id, ao.auth_option";
694
695 // Now the role settings - user-specific
696 $sql_ary[] = 'SELECT a.user_id, a.forum_id, r.auth_option_id, r.auth_setting, r.auth_option_id, ao.auth_option
697 FROM ' . ACL_USERS_TABLE . ' a, ' . ACL_ROLES_DATA_TABLE . ' r, ' . ACL_OPTIONS_TABLE . ' ao
698 WHERE a.auth_role_id = r.role_id
699 AND r.auth_option_id = ao.auth_option_id ' .
700 (($sql_user) ? 'AND a.' . $sql_user : '') . "
701 $sql_forum
702 $sql_opts
703 ORDER BY a.forum_id, ao.auth_option";
704
705 foreach ($sql_ary as $sql)
706 {
707 $result = $db->sql_query($sql);
708
709 while ($row = $db->sql_fetchrow($result))
710 {
711 $hold_ary[$row['user_id']][$row['forum_id']][$row['auth_option']] = $row['auth_setting'];
712 }
713 $db->sql_freeresult($result);
714 }
715
716 return $hold_ary;
717 }
718
719 /**
720 * Get raw group based permission settings
721 */
722 function acl_group_raw_data($group_id = false, $opts = false, $forum_id = false)
723 {
724 global $db;
725
726 $sql_group = ($group_id !== false) ? ((!is_array($group_id)) ? 'group_id = ' . (int) $group_id : $db->sql_in_set('group_id', array_map('intval', $group_id))) : '';
727 $sql_forum = ($forum_id !== false) ? ((!is_array($forum_id)) ? 'AND a.forum_id = ' . (int) $forum_id : 'AND ' . $db->sql_in_set('a.forum_id', array_map('intval', $forum_id))) : '';
728
729 $sql_opts = '';
730 $hold_ary = $sql_ary = array();
731
732 if ($opts !== false)
733 {
734 $this->build_auth_option_statement('ao.auth_option', $opts, $sql_opts);
735 }
736
737 // Grab group settings - non-role specific...
738 $sql_ary[] = 'SELECT a.group_id, a.forum_id, a.auth_setting, a.auth_option_id, ao.auth_option
739 FROM ' . ACL_GROUPS_TABLE . ' a, ' . ACL_OPTIONS_TABLE . ' ao
740 WHERE a.auth_role_id = 0
741 AND a.auth_option_id = ao.auth_option_id ' .
742 (($sql_group) ? 'AND a.' . $sql_group : '') . "
743 $sql_forum
744 $sql_opts
745 ORDER BY a.forum_id, ao.auth_option";
746
747 // Now grab group settings - role specific...
748 $sql_ary[] = 'SELECT a.group_id, a.forum_id, r.auth_setting, r.auth_option_id, ao.auth_option
749 FROM ' . ACL_GROUPS_TABLE . ' a, ' . ACL_ROLES_DATA_TABLE . ' r, ' . ACL_OPTIONS_TABLE . ' ao
750 WHERE a.auth_role_id = r.role_id
751 AND r.auth_option_id = ao.auth_option_id ' .
752 (($sql_group) ? 'AND a.' . $sql_group : '') . "
753 $sql_forum
754 $sql_opts
755 ORDER BY a.forum_id, ao.auth_option";
756
757 foreach ($sql_ary as $sql)
758 {
759 $result = $db->sql_query($sql);
760
761 while ($row = $db->sql_fetchrow($result))
762 {
763 $hold_ary[$row['group_id']][$row['forum_id']][$row['auth_option']] = $row['auth_setting'];
764 }
765 $db->sql_freeresult($result);
766 }
767
768 return $hold_ary;
769 }
770
771 /**
772 * Get raw acl data based on user for caching user_permissions
773 * This function returns the same data as acl_raw_data(), but without the user id as the first key within the array.
774 */
775 function acl_raw_data_single_user($user_id)
776 {
777 global $db, $cache;
778
779 // Check if the role-cache is there
780 if (($this->role_cache = $cache->get('_role_cache')) === false)
781 {
782 $this->role_cache = array();
783
784 // We pre-fetch roles
785 $sql = 'SELECT *
786 FROM ' . ACL_ROLES_DATA_TABLE . '
787 ORDER BY role_id ASC';
788 $result = $db->sql_query($sql);
789
790 while ($row = $db->sql_fetchrow($result))
791 {
792 $this->role_cache[$row['role_id']][$row['auth_option_id']] = (int) $row['auth_setting'];
793 }
794 $db->sql_freeresult($result);
795
796 foreach ($this->role_cache as $role_id => $role_options)
797 {
798 $this->role_cache[$role_id] = serialize($role_options);
799 }
800
801 $cache->put('_role_cache', $this->role_cache);
802 }
803
804 $hold_ary = array();
805
806 // Grab user-specific permission settings
807 $sql = 'SELECT forum_id, auth_option_id, auth_role_id, auth_setting
808 FROM ' . ACL_USERS_TABLE . '
809 WHERE user_id = ' . $user_id;
810 $result = $db->sql_query($sql);
811
812 while ($row = $db->sql_fetchrow($result))
813 {
814 // If a role is assigned, assign all options included within this role. Else, only set this one option.
815 if ($row['auth_role_id'])
816 {
817 $hold_ary[$row['forum_id']] = (empty($hold_ary[$row['forum_id']])) ? unserialize($this->role_cache[$row['auth_role_id']]) : $hold_ary[$row['forum_id']] + unserialize($this->role_cache[$row['auth_role_id']]);
818 }
819 else
820 {
821 $hold_ary[$row['forum_id']][$row['auth_option_id']] = $row['auth_setting'];
822 }
823 }
824 $db->sql_freeresult($result);
825
826 // Now grab group-specific permission settings
827 $sql = 'SELECT a.forum_id, a.auth_option_id, a.auth_role_id, a.auth_setting
828 FROM ' . ACL_GROUPS_TABLE . ' a, ' . USER_GROUP_TABLE . ' ug
829 WHERE a.group_id = ug.group_id
830 AND ug.user_pending = 0
831 AND ug.user_id = ' . $user_id;
832 $result = $db->sql_query($sql);
833
834 while ($row = $db->sql_fetchrow($result))
835 {
836 if (!$row['auth_role_id'])
837 {
838 $this->_set_group_hold_ary($hold_ary[$row['forum_id']], $row['auth_option_id'], $row['auth_setting']);
839 }
840 else if (!empty($this->role_cache[$row['auth_role_id']]))
841 {
842 foreach (unserialize($this->role_cache[$row['auth_role_id']]) as $option_id => $setting)
843 {
844 $this->_set_group_hold_ary($hold_ary[$row['forum_id']], $option_id, $setting);
845 }
846 }
847 }
848 $db->sql_freeresult($result);
849
850 return $hold_ary;
851 }
852
853 /**
854 * Private function snippet for setting a specific piece of the hold_ary
855 */
856 function _set_group_hold_ary(&$hold_ary, $option_id, $setting)
857 {
858 if (!isset($hold_ary[$option_id]) || (isset($hold_ary[$option_id]) && $hold_ary[$option_id] != ACL_NEVER))
859 {
860 $hold_ary[$option_id] = $setting;
861
862 // If we detect ACL_NEVER, we will unset the flag option (within building the bitstring it is correctly set again)
863 if ($setting == ACL_NEVER)
864 {
865 $flag = substr($this->acl_options['option'][$option_id], 0, strpos($this->acl_options['option'][$option_id], '_') + 1);
866 $flag = (int) $this->acl_options['id'][$flag];
867
868 if (isset($hold_ary[$flag]) && $hold_ary[$flag] == ACL_YES)
869 {
870 unset($hold_ary[$flag]);
871
872/* This is uncommented, because i suspect this being slightly wrong due to mixed permission classes being possible
873 if (in_array(ACL_YES, $hold_ary))
874 {
875 $hold_ary[$flag] = ACL_YES;
876 }*/
877 }
878 }
879 }
880 }
881
882 /**
883 * Authentication plug-ins is largely down to Sergey Kanareykin, our thanks to him.
884 */
885 function login($username, $password, $autologin = false, $viewonline = 1, $admin = 0)
886 {
887 global $config, $db, $user, $phpbb_root_path, $phpEx;
888
889 $method = trim(basename($config['auth_method']));
890 include_once($phpbb_root_path . 'includes/auth/auth_' . $method . '.' . $phpEx);
891
892 $method = 'login_' . $method;
893 if (function_exists($method))
894 {
895 $login = $method($username, $password);
896
897 // If the auth module wants us to create an empty profile do so and then treat the status as LOGIN_SUCCESS
898 if ($login['status'] == LOGIN_SUCCESS_CREATE_PROFILE)
899 {
900 // we are going to use the user_add function so include functions_user.php if it wasn't defined yet
901 if (!function_exists('user_add'))
902 {
903 include($phpbb_root_path . 'includes/functions_user.' . $phpEx);
904 }
905
906 user_add($login['user_row'], (isset($login['cp_data'])) ? $login['cp_data'] : false);
907
908 $sql = 'SELECT user_id, username, user_password, user_passchg, user_email, user_type
909 FROM ' . USERS_TABLE . "
910 WHERE username_clean = '" . $db->sql_escape(utf8_clean_string($username)) . "'";
911 $result = $db->sql_query($sql);
912 $row = $db->sql_fetchrow($result);
913 $db->sql_freeresult($result);
914
915 if (!$row)
916 {
917 return array(
918 'status' => LOGIN_ERROR_EXTERNAL_AUTH,
919 'error_msg' => 'AUTH_NO_PROFILE_CREATED',
920 'user_row' => array('user_id' => ANONYMOUS),
921 );
922 }
923
924 $login = array(
925 'status' => LOGIN_SUCCESS,
926 'error_msg' => false,
927 'user_row' => $row,
928 );
929 }
930
931 // If login succeeded, we will log the user in... else we pass the login array through...
932 if ($login['status'] == LOGIN_SUCCESS)
933 {
934 $old_session_id = $user->session_id;
935
936 if ($admin)
937 {
938 global $SID, $_SID;
939
940 $cookie_expire = time() - 31536000;
941 $user->set_cookie('u', '', $cookie_expire);
942 $user->set_cookie('sid', '', $cookie_expire);
943 unset($cookie_expire);
944
945 $SID = '?sid=';
946 $user->session_id = $_SID = '';
947 }
948
949 $result = $user->session_create($login['user_row']['user_id'], $admin, $autologin, $viewonline);
950
951 // Successful session creation
952 if ($result === true)
953 {
954 // If admin re-authentication we remove the old session entry because a new one has been created...
955 if ($admin)
956 {
957 // the login array is used because the user ids do not differ for re-authentication
958 $sql = 'DELETE FROM ' . SESSIONS_TABLE . "
959 WHERE session_id = '" . $db->sql_escape($old_session_id) . "'
960 AND session_user_id = {$login['user_row']['user_id']}";
961 $db->sql_query($sql);
962 }
963
964 return array(
965 'status' => LOGIN_SUCCESS,
966 'error_msg' => false,
967 'user_row' => $login['user_row'],
968 );
969 }
970
971 return array(
972 'status' => LOGIN_BREAK,
973 'error_msg' => $result,
974 'user_row' => $login['user_row'],
975 );
976 }
977
978 return $login;
979 }
980
981 trigger_error('Authentication method not found', E_USER_ERROR);
982 }
983
984 /**
985 * Fill auth_option statement for later querying based on the supplied options
986 */
987 function build_auth_option_statement($key, $auth_options, &$sql_opts)
988 {
989 global $db;
990
991 if (!is_array($auth_options))
992 {
993 if (strpos($auth_options, '%') !== false)
994 {
995 $sql_opts = "AND $key " . $db->sql_like_expression(str_replace('%', $db->any_char, $auth_options));
996 }
997 else
998 {
999 $sql_opts = "AND $key = '" . $db->sql_escape($auth_options) . "'";
1000 }
1001 }
1002 else
1003 {
1004 $is_like_expression = false;
1005
1006 foreach ($auth_options as $option)
1007 {
1008 if (strpos($option, '%') !== false)
1009 {
1010 $is_like_expression = true;
1011 }
1012 }
1013
1014 if (!$is_like_expression)
1015 {
1016 $sql_opts = 'AND ' . $db->sql_in_set($key, $auth_options);
1017 }
1018 else
1019 {
1020 $sql = array();
1021
1022 foreach ($auth_options as $option)
1023 {
1024 if (strpos($option, '%') !== false)
1025 {
1026 $sql[] = $key . ' ' . $db->sql_like_expression(str_replace('%', $db->any_char, $option));
1027 }
1028 else
1029 {
1030 $sql[] = $key . " = '" . $db->sql_escape($option) . "'";
1031 }
1032 }
1033
1034 $sql_opts = 'AND (' . implode(' OR ', $sql) . ')';
1035 }
1036 }
1037 }
1038}
1039
1040?>
Note: See TracBrowser for help on using the repository browser.