Commit | Line | Data |
---|---|---|
6a488035 TO |
1 | <?php |
2 | /* | |
3 | +--------------------------------------------------------------------+ | |
06b69b18 | 4 | | CiviCRM version 4.5 | |
6a488035 | 5 | +--------------------------------------------------------------------+ |
06b69b18 | 6 | | Copyright CiviCRM LLC (c) 2004-2014 | |
6a488035 TO |
7 | +--------------------------------------------------------------------+ |
8 | | This file is a part of CiviCRM. | | |
9 | | | | |
10 | | CiviCRM is free software; you can copy, modify, and distribute it | | |
11 | | under the terms of the GNU Affero General Public License | | |
12 | | Version 3, 19 November 2007 and the CiviCRM Licensing Exception. | | |
13 | | | | |
14 | | CiviCRM is distributed in the hope that it will be useful, but | | |
15 | | WITHOUT ANY WARRANTY; without even the implied warranty of | | |
16 | | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. | | |
17 | | See the GNU Affero General Public License for more details. | | |
18 | | | | |
19 | | You should have received a copy of the GNU Affero General Public | | |
20 | | License and the CiviCRM Licensing Exception along | | |
21 | | with this program; if not, contact CiviCRM LLC | | |
22 | | at info[AT]civicrm[DOT]org. If you have questions about the | | |
23 | | GNU Affero General Public License or the licensing of CiviCRM, | | |
24 | | see the CiviCRM license FAQ at http://civicrm.org/licensing | | |
25 | +--------------------------------------------------------------------+ | |
26 | */ | |
27 | ||
28 | /** | |
29 | * | |
30 | * @package CRM | |
06b69b18 | 31 | * @copyright CiviCRM LLC (c) 2004-2014 |
6a488035 TO |
32 | * $Id$ |
33 | * | |
34 | */ | |
35 | ||
36 | /** | |
37 | * This is the basic permission class wrapper | |
38 | */ | |
39 | class CRM_Core_Permission { | |
40 | ||
41 | /** | |
42 | * Static strings used to compose permissions | |
43 | * | |
44 | * @const | |
45 | * @var string | |
46 | */ | |
47 | CONST EDIT_GROUPS = 'edit contacts in ', VIEW_GROUPS = 'view contacts in '; | |
48 | ||
49 | /** | |
50 | * The various type of permissions | |
51 | * | |
52 | * @var int | |
53 | */ | |
54 | CONST EDIT = 1, VIEW = 2, DELETE = 3, CREATE = 4, SEARCH = 5, ALL = 6, ADMIN = 7; | |
55 | ||
085823c1 TO |
56 | /** |
57 | * A placeholder permission which always fails | |
58 | */ | |
59 | const ALWAYS_DENY_PERMISSION = "*always deny*"; | |
60 | ||
61 | /** | |
62 | * A placeholder permission which always fails | |
63 | */ | |
64 | const ALWAYS_ALLOW_PERMISSION = "*always allow*"; | |
65 | ||
6dd18b98 DS |
66 | /** |
67 | * Various authentication sources | |
68 | * | |
69 | * @var int | |
70 | */ | |
e8f14831 | 71 | CONST AUTH_SRC_UNKNOWN = 0, AUTH_SRC_CHECKSUM = 1, AUTH_SRC_SITEKEY = 2, AUTH_SRC_LOGIN = 4; |
6dd18b98 | 72 | |
6a488035 TO |
73 | /** |
74 | * get the current permission of this user | |
75 | * | |
76 | * @return string the permission of the user (edit or view or null) | |
77 | */ | |
78 | public static function getPermission() { | |
79 | $config = CRM_Core_Config::singleton(); | |
41f314b6 | 80 | return $config->userPermissionClass->getPermission(); |
6a488035 TO |
81 | } |
82 | ||
83 | /** | |
60ec9f43 E |
84 | * given a permission string or array, check for access requirements |
85 | * @param mixed $permissions the permission to check as an array or string -see examples | |
86 | * arrays | |
6a488035 | 87 | * |
60ec9f43 E |
88 | * Ex 1 |
89 | * | |
90 | * Must have 'access CiviCRM' | |
91 | * (string) 'access CiviCRM' | |
92 | * | |
93 | * | |
94 | * Ex 2 Must have 'access CiviCRM' and 'access Ajax API' | |
95 | * array('access CiviCRM', 'access Ajax API') | |
96 | * | |
97 | * Ex 3 Must have 'access CiviCRM' or 'access Ajax API' | |
98 | * array( | |
99 | * array('access CiviCRM', 'access Ajax API'), | |
100 | * ), | |
101 | * | |
102 | * Ex 4 Must have 'access CiviCRM' or 'access Ajax API' AND 'access CiviEvent' | |
103 | * array( | |
104 | * array('access CiviCRM', 'access Ajax API'), | |
105 | * 'access CiviEvent', | |
106 | * ), | |
107 | * | |
108 | * Note that in permissions.php this is keyed by the action eg. | |
109 | * (access Civi || access AJAX) && (access CiviEvent || access CiviContribute) | |
110 | * 'myaction' => array( | |
111 | * array('access CiviCRM', 'access Ajax API'), | |
112 | * array('access CiviEvent', 'access CiviContribute') | |
113 | * ), | |
6a488035 TO |
114 | * |
115 | * @return boolean true if yes, else false | |
116 | * @static | |
117 | * @access public | |
118 | */ | |
60ec9f43 E |
119 | static function check($permissions) { |
120 | $permissions = (array) $permissions; | |
121 | ||
122 | foreach ($permissions as $permission) { | |
123 | if(is_array($permission)) { | |
124 | foreach ($permission as $orPerm) { | |
125 | if(self::check($orPerm)) { | |
126 | //one of our 'or' permissions has succeeded - stop checking this permission | |
127 | return TRUE;; | |
128 | } | |
129 | } | |
130 | //none of our our conditions was met | |
131 | return FALSE; | |
132 | } | |
133 | else { | |
134 | if(!CRM_Core_Config::singleton()->userPermissionClass->check($permission)) { | |
135 | //one of our 'and' conditions has not been met | |
136 | return FALSE; | |
137 | } | |
138 | } | |
139 | } | |
140 | return TRUE; | |
6a488035 TO |
141 | } |
142 | ||
dc92f2f8 TO |
143 | /** |
144 | * Determine if any one of the permissions strings applies to current user | |
145 | * | |
146 | * @param array $perms | |
147 | * @return bool | |
148 | */ | |
149 | public static function checkAnyPerm($perms) { | |
150 | foreach ($perms as $perm) { | |
151 | if (CRM_Core_Permission::check($perm)) { | |
152 | return TRUE; | |
153 | } | |
154 | } | |
155 | return FALSE; | |
156 | } | |
157 | ||
6a488035 TO |
158 | /** |
159 | * Given a group/role array, check for access requirements | |
160 | * | |
161 | * @param array $array the group/role to check | |
162 | * | |
163 | * @return boolean true if yes, else false | |
164 | * @static | |
165 | * @access public | |
166 | */ | |
167 | static function checkGroupRole($array) { | |
168 | $config = CRM_Core_Config::singleton(); | |
41f314b6 | 169 | return $config->userPermissionClass->checkGroupRole($array); |
6a488035 TO |
170 | } |
171 | ||
172 | /** | |
173 | * Get the permissioned where clause for the user | |
174 | * | |
175 | * @param int $type the type of permission needed | |
176 | * @param array $tables (reference ) add the tables that are needed for the select clause | |
177 | * @param array $whereTables (reference ) add the tables that are needed for the where clause | |
178 | * | |
179 | * @return string the group where clause for this user | |
180 | * @access public | |
181 | */ | |
182 | public static function getPermissionedStaticGroupClause($type, &$tables, &$whereTables) { | |
183 | $config = CRM_Core_Config::singleton(); | |
41f314b6 | 184 | return $config->userPermissionClass->getPermissionedStaticGroupClause($type, $tables, $whereTables); |
6a488035 TO |
185 | } |
186 | ||
187 | /** | |
188 | * Get all groups from database, filtered by permissions | |
189 | * for this user | |
190 | * | |
da6b46f4 EM |
191 | * @param string $groupType type of group(Access/Mailing) |
192 | * @param bool|\boolen $excludeHidden exclude hidden groups. | |
6a488035 TO |
193 | * |
194 | * @access public | |
195 | * @static | |
196 | * | |
197 | * @return array - array reference of all groups. | |
6a488035 TO |
198 | */ |
199 | public static function group($groupType, $excludeHidden = TRUE) { | |
200 | $config = CRM_Core_Config::singleton(); | |
41f314b6 | 201 | return $config->userPermissionClass->group($groupType, $excludeHidden); |
6a488035 TO |
202 | } |
203 | ||
204 | public static function customGroupAdmin() { | |
205 | $admin = FALSE; | |
206 | ||
207 | // check if user has all powerful permission | |
208 | // or administer civicrm permission (CRM-1905) | |
209 | if (self::check('access all custom data')) { | |
210 | return TRUE; | |
211 | } | |
212 | ||
634e1a1a DL |
213 | if ( |
214 | self::check('administer Multiple Organizations') && | |
6a488035 TO |
215 | self::isMultisiteEnabled() |
216 | ) { | |
217 | return TRUE; | |
218 | } | |
219 | ||
220 | if (self::check('administer CiviCRM')) { | |
221 | return TRUE; | |
222 | } | |
223 | ||
224 | return FALSE; | |
225 | } | |
226 | ||
227 | public static function customGroup($type = CRM_Core_Permission::VIEW, $reset = FALSE) { | |
41f314b6 | 228 | $customGroups = CRM_Core_PseudoConstant::get('CRM_Core_DAO_CustomField', 'custom_group_id', |
229 | array('fresh' => $reset)); | |
6a488035 TO |
230 | $defaultGroups = array(); |
231 | ||
232 | // check if user has all powerful permission | |
233 | // or administer civicrm permission (CRM-1905) | |
234 | if (self::customGroupAdmin()) { | |
235 | $defaultGroups = array_keys($customGroups); | |
236 | } | |
237 | ||
238 | return CRM_ACL_API::group($type, NULL, 'civicrm_custom_group', $customGroups, $defaultGroups); | |
239 | } | |
240 | ||
241 | static function customGroupClause($type = CRM_Core_Permission::VIEW, $prefix = NULL, $reset = FALSE) { | |
242 | if (self::customGroupAdmin()) { | |
243 | return ' ( 1 ) '; | |
244 | } | |
245 | ||
246 | $groups = self::customGroup($type, $reset); | |
247 | if (empty($groups)) { | |
248 | return ' ( 0 ) '; | |
249 | } | |
250 | else { | |
251 | return "{$prefix}id IN ( " . implode(',', $groups) . ' ) '; | |
252 | } | |
253 | } | |
254 | ||
255 | public static function ufGroupValid($gid, $type = CRM_Core_Permission::VIEW) { | |
256 | if (empty($gid)) { | |
257 | return TRUE; | |
258 | } | |
259 | ||
260 | $groups = self::ufGroup($type); | |
261 | return in_array($gid, $groups) ? TRUE : FALSE; | |
262 | } | |
263 | ||
264 | public static function ufGroup($type = CRM_Core_Permission::VIEW) { | |
ff4f7744 | 265 | $ufGroups = CRM_Core_PseudoConstant::get('CRM_Core_DAO_UFField', 'uf_group_id'); |
6a488035 TO |
266 | |
267 | $allGroups = array_keys($ufGroups); | |
268 | ||
269 | // check if user has all powerful permission | |
270 | if (self::check('profile listings and forms')) { | |
271 | return $allGroups; | |
272 | } | |
273 | ||
274 | switch ($type) { | |
275 | case CRM_Core_Permission::VIEW: | |
276 | if (self::check('profile view')) { | |
277 | return $allGroups; | |
278 | } | |
279 | break; | |
280 | ||
281 | case CRM_Core_Permission::CREATE: | |
282 | if (self::check('profile create')) { | |
283 | return $allGroups; | |
284 | } | |
285 | break; | |
286 | ||
287 | case CRM_Core_Permission::EDIT: | |
288 | if (self::check('profile edit')) { | |
289 | return $allGroups; | |
290 | } | |
291 | break; | |
292 | ||
293 | case CRM_Core_Permission::SEARCH: | |
294 | if (self::check('profile listings')) { | |
295 | return $allGroups; | |
296 | } | |
297 | break; | |
298 | } | |
299 | ||
300 | return CRM_ACL_API::group($type, NULL, 'civicrm_uf_group', $ufGroups); | |
301 | } | |
302 | ||
303 | static function ufGroupClause($type = CRM_Core_Permission::VIEW, $prefix = NULL, $returnUFGroupIds = FALSE) { | |
304 | $groups = self::ufGroup($type); | |
305 | if ($returnUFGroupIds) { | |
306 | return $groups; | |
307 | } | |
308 | elseif (empty($groups)) { | |
309 | return ' ( 0 ) '; | |
310 | } | |
311 | else { | |
312 | return "{$prefix}id IN ( " . implode(',', $groups) . ' ) '; | |
313 | } | |
314 | } | |
315 | ||
e2d09ab4 EM |
316 | public static function event($type = CRM_Core_Permission::VIEW, $eventID = NULL, $context = '') { |
317 | if(!empty($context)) { | |
318 | if(CRM_Core_Permission::check($context)) { | |
319 | return TRUE; | |
320 | } | |
321 | } | |
6a488035 TO |
322 | $events = CRM_Event_PseudoConstant::event(NULL, TRUE); |
323 | $includeEvents = array(); | |
324 | ||
325 | // check if user has all powerful permission | |
326 | if (self::check('register for events')) { | |
327 | $includeEvents = array_keys($events); | |
328 | } | |
329 | ||
330 | if ($type == CRM_Core_Permission::VIEW && | |
331 | self::check('view event info') | |
332 | ) { | |
333 | $includeEvents = array_keys($events); | |
334 | } | |
335 | ||
336 | $permissionedEvents = CRM_ACL_API::group($type, NULL, 'civicrm_event', $events, $includeEvents); | |
337 | if (!$eventID) { | |
338 | return $permissionedEvents; | |
339 | } | |
41f314b6 | 340 | if (!empty($permissionedEvents)) { |
2efcf0c2 | 341 | return array_search($eventID, $permissionedEvents) === FALSE ? NULL : $eventID; |
41f314b6 | 342 | } |
dfa720e7 | 343 | return NULL; |
6a488035 TO |
344 | } |
345 | ||
346 | static function eventClause($type = CRM_Core_Permission::VIEW, $prefix = NULL) { | |
347 | $events = self::event($type); | |
348 | if (empty($events)) { | |
349 | return ' ( 0 ) '; | |
350 | } | |
351 | else { | |
352 | return "{$prefix}id IN ( " . implode(',', $events) . ' ) '; | |
353 | } | |
354 | } | |
355 | ||
356 | static function access($module, $checkPermission = TRUE) { | |
357 | $config = CRM_Core_Config::singleton(); | |
358 | ||
359 | if (!in_array($module, $config->enableComponents)) { | |
360 | return FALSE; | |
361 | } | |
362 | ||
363 | if ($checkPermission) { | |
364 | if ($module == 'CiviCase') { | |
365 | return CRM_Case_BAO_Case::accessCiviCase(); | |
366 | } | |
367 | else { | |
368 | return CRM_Core_Permission::check("access $module"); | |
369 | } | |
370 | } | |
371 | ||
372 | return TRUE; | |
373 | } | |
374 | ||
375 | /** | |
376 | * check permissions for delete and edit actions | |
377 | * | |
41f314b6 | 378 | * @param string $module component name. |
6a488035 TO |
379 | * @param $action action to be check across component |
380 | * | |
77b97be7 EM |
381 | * |
382 | * @return bool | |
383 | */ | |
6a488035 TO |
384 | static function checkActionPermission($module, $action) { |
385 | //check delete related permissions. | |
386 | if ($action & CRM_Core_Action::DELETE) { | |
387 | $permissionName = "delete in $module"; | |
388 | } | |
389 | else { | |
390 | $editPermissions = array( | |
391 | 'CiviEvent' => 'edit event participants', | |
392 | 'CiviMember' => 'edit memberships', | |
393 | 'CiviPledge' => 'edit pledges', | |
394 | 'CiviContribute' => 'edit contributions', | |
395 | 'CiviGrant' => 'edit grants', | |
396 | 'CiviMail' => 'access CiviMail', | |
397 | 'CiviAuction' => 'add auction items', | |
398 | ); | |
399 | $permissionName = CRM_Utils_Array::value($module, $editPermissions); | |
400 | } | |
401 | ||
402 | if ($module == 'CiviCase' && !$permissionName) { | |
403 | return CRM_Case_BAO_Case::accessCiviCase(); | |
404 | } | |
405 | else { | |
406 | //check for permission. | |
407 | return CRM_Core_Permission::check($permissionName); | |
408 | } | |
409 | } | |
410 | ||
411 | static function checkMenu(&$args, $op = 'and') { | |
412 | if (!is_array($args)) { | |
413 | return $args; | |
414 | } | |
415 | foreach ($args as $str) { | |
416 | $res = CRM_Core_Permission::check($str); | |
417 | if ($op == 'or' && $res) { | |
418 | return TRUE; | |
419 | } | |
420 | elseif ($op == 'and' && !$res) { | |
421 | return FALSE; | |
422 | } | |
423 | } | |
424 | return ($op == 'or') ? FALSE : TRUE; | |
425 | } | |
426 | ||
427 | static function checkMenuItem(&$item) { | |
428 | if (!array_key_exists('access_callback', $item)) { | |
429 | CRM_Core_Error::backtrace(); | |
430 | CRM_Core_Error::fatal(); | |
431 | } | |
432 | ||
433 | // if component_id is present, ensure it is enabled | |
434 | if (isset($item['component_id']) && | |
435 | $item['component_id'] | |
436 | ) { | |
437 | $config = CRM_Core_Config::singleton(); | |
438 | if (is_array($config->enableComponentIDs) && | |
439 | in_array($item['component_id'], $config->enableComponentIDs) | |
440 | ) { | |
441 | // continue with process | |
442 | } | |
443 | else { | |
444 | return FALSE; | |
445 | } | |
446 | } | |
447 | ||
448 | // the following is imitating drupal 6 code in includes/menu.inc | |
449 | if (empty($item['access_callback']) || | |
450 | is_numeric($item['access_callback']) | |
451 | ) { | |
452 | return (boolean ) $item['access_callback']; | |
453 | } | |
454 | ||
455 | // check whether the following Ajax requests submitted the right key | |
456 | // FIXME: this should be integrated into ACLs proper | |
457 | if (CRM_Utils_Array::value('page_type', $item) == 3) { | |
458 | if (!CRM_Core_Key::validate($_REQUEST['key'], $item['path'])) { | |
459 | return FALSE; | |
460 | } | |
461 | } | |
462 | ||
463 | // check if callback is for checkMenu, if so optimize it | |
464 | if (is_array($item['access_callback']) && | |
465 | $item['access_callback'][0] == 'CRM_Core_Permission' && | |
466 | $item['access_callback'][1] == 'checkMenu' | |
467 | ) { | |
468 | $op = CRM_Utils_Array::value(1, $item['access_arguments'], 'and'); | |
469 | return self::checkMenu($item['access_arguments'][0], $op); | |
470 | } | |
471 | else { | |
472 | return call_user_func_array($item['access_callback'], $item['access_arguments']); | |
473 | } | |
474 | } | |
475 | ||
476 | static function &basicPermissions($all = FALSE) { | |
477 | static $permissions = NULL; | |
478 | ||
479 | if (!$permissions) { | |
81bb85ea | 480 | $config = CRM_Core_Config::singleton(); |
6a488035 TO |
481 | $prefix = ts('CiviCRM') . ': '; |
482 | $permissions = self::getCorePermissions(); | |
483 | ||
484 | if (self::isMultisiteEnabled()) { | |
485 | $permissions['administer Multiple Organizations'] = $prefix . ts('administer Multiple Organizations'); | |
486 | } | |
487 | ||
6a488035 TO |
488 | if (!$all) { |
489 | $components = CRM_Core_Component::getEnabledComponents(); | |
490 | } | |
491 | else { | |
492 | $components = CRM_Core_Component::getComponents(); | |
493 | } | |
494 | ||
495 | foreach ($components as $comp) { | |
496 | $perm = $comp->getPermissions(); | |
497 | if ($perm) { | |
498 | $info = $comp->getInfo(); | |
499 | foreach ($perm as $p) { | |
500 | $permissions[$p] = $info['translatedName'] . ': ' . $p; | |
501 | } | |
502 | } | |
503 | } | |
504 | ||
505 | // Add any permissions defined in hook_civicrm_permission implementations. | |
6a488035 TO |
506 | $module_permissions = $config->userPermissionClass->getAllModulePermissions(); |
507 | $permissions = array_merge($permissions, $module_permissions); | |
508 | } | |
509 | ||
510 | return $permissions; | |
511 | } | |
512 | ||
81bb85ea AC |
513 | static function getAnonymousPermissionsWarnings() { |
514 | static $permissions = array(); | |
515 | if (empty($permissions)) { | |
516 | $permissions = array( | |
517 | 'administer CiviCRM' | |
518 | ); | |
519 | $components = CRM_Core_Component::getComponents(); | |
520 | foreach ($components as $comp) { | |
521 | if (!method_exists($comp, 'getAnonymousPermissionWarnings')) { | |
522 | continue; | |
523 | } | |
524 | $permissions = array_merge($permissions, $comp->getAnonymousPermissionWarnings()); | |
525 | } | |
526 | } | |
527 | return $permissions; | |
528 | } | |
529 | ||
530 | static function validateForPermissionWarnings($anonymous_perms) { | |
531 | return array_intersect($anonymous_perms, self::getAnonymousPermissionsWarnings()); | |
532 | } | |
533 | ||
6a488035 TO |
534 | static function getCorePermissions() { |
535 | $prefix = ts('CiviCRM') . ': '; | |
536 | $permissions = array( | |
537 | 'add contacts' => $prefix . ts('add contacts'), | |
538 | 'view all contacts' => $prefix . ts('view all contacts'), | |
539 | 'edit all contacts' => $prefix . ts('edit all contacts'), | |
aafd773a DL |
540 | 'view my contact' => $prefix . ts('view my contact'), |
541 | 'edit my contact' => $prefix . ts('edit my contact'), | |
6a488035 TO |
542 | 'delete contacts' => $prefix . ts('delete contacts'), |
543 | 'access deleted contacts' => $prefix . ts('access deleted contacts'), | |
544 | 'import contacts' => $prefix . ts('import contacts'), | |
545 | 'edit groups' => $prefix . ts('edit groups'), | |
546 | 'administer CiviCRM' => $prefix . ts('administer CiviCRM'), | |
634e1a1a | 547 | 'skip IDS check' => $prefix . ts('skip IDS check'), |
6a488035 TO |
548 | 'access uploaded files' => $prefix . ts('access uploaded files'), |
549 | 'profile listings and forms' => $prefix . ts('profile listings and forms'), | |
550 | 'profile listings' => $prefix . ts('profile listings'), | |
551 | 'profile create' => $prefix . ts('profile create'), | |
552 | 'profile edit' => $prefix . ts('profile edit'), | |
553 | 'profile view' => $prefix . ts('profile view'), | |
554 | 'access all custom data' => $prefix . ts('access all custom data'), | |
555 | 'view all activities' => $prefix . ts('view all activities'), | |
556 | 'delete activities' => $prefix . ts('delete activities'), | |
557 | 'access CiviCRM' => $prefix . ts('access CiviCRM'), | |
558 | 'access Contact Dashboard' => $prefix . ts('access Contact Dashboard'), | |
559 | 'translate CiviCRM' => $prefix . ts('translate CiviCRM'), | |
560 | 'administer reserved groups' => $prefix . ts('administer reserved groups'), | |
561 | 'administer Tagsets' => $prefix . ts('administer Tagsets'), | |
562 | 'administer reserved tags' => $prefix . ts('administer reserved tags'), | |
563 | 'administer dedupe rules' => $prefix . ts('administer dedupe rules'), | |
564 | 'merge duplicate contacts' => $prefix . ts('merge duplicate contacts'), | |
565 | 'view debug output' => $prefix . ts('view debug output'), | |
566 | 'view all notes' => $prefix . ts('view all notes'), | |
567 | 'access AJAX API' => $prefix . ts('access AJAX API'), | |
568 | 'access contact reference fields' => $prefix . ts('access contact reference fields'), | |
569 | 'create manual batch' => $prefix . ts('create manual batch'), | |
570 | 'edit own manual batches' => $prefix . ts('edit own manual batches'), | |
571 | 'edit all manual batches' => $prefix . ts('edit all manual batches'), | |
572 | 'view own manual batches' => $prefix . ts('view own manual batches'), | |
573 | 'view all manual batches' => $prefix . ts('view all manual batches'), | |
574 | 'delete own manual batches' => $prefix . ts('delete own manual batches'), | |
575 | 'delete all manual batches' => $prefix . ts('delete all manual batches'), | |
576 | 'export own manual batches' => $prefix . ts('export own manual batches'), | |
577 | 'export all manual batches' => $prefix . ts('export all manual batches'), | |
e16ce4cd | 578 | 'administer payment processors' => $prefix . ts('administer payment processors'), |
6a488035 TO |
579 | ); |
580 | ||
581 | return $permissions; | |
582 | } | |
583 | ||
584 | /** | |
585 | * Validate user permission across | |
586 | * edit or view or with supportable acls. | |
587 | * | |
588 | * return boolean true/false. | |
589 | **/ | |
590 | static function giveMeAllACLs() { | |
591 | if (CRM_Core_Permission::check('view all contacts') || | |
592 | CRM_Core_Permission::check('edit all contacts') | |
593 | ) { | |
594 | return TRUE; | |
595 | } | |
596 | ||
597 | $session = CRM_Core_Session::singleton(); | |
598 | $contactID = $session->get('userID'); | |
599 | ||
6a488035 TO |
600 | //check for acl. |
601 | $aclPermission = self::getPermission(); | |
602 | if (in_array($aclPermission, array( | |
603 | CRM_Core_Permission::EDIT, | |
41f314b6 | 604 | CRM_Core_Permission::VIEW, |
605 | )) | |
606 | ) { | |
6a488035 TO |
607 | return TRUE; |
608 | } | |
609 | ||
610 | // run acl where hook and see if the user is supplying an ACL clause | |
611 | // that is not false | |
612 | $tables = $whereTables = array(); | |
613 | $where = NULL; | |
614 | ||
615 | CRM_Utils_Hook::aclWhereClause(CRM_Core_Permission::VIEW, | |
616 | $tables, $whereTables, | |
617 | $contactID, $where | |
618 | ); | |
619 | return empty($whereTables) ? FALSE : TRUE; | |
620 | } | |
621 | ||
622 | /** | |
623 | * Function to get component name from given permission. | |
624 | * | |
41f314b6 | 625 | * @param string $permission |
6a488035 TO |
626 | * |
627 | * return string $componentName the name of component. | |
77b97be7 EM |
628 | * |
629 | * @return int|null|string | |
6a488035 TO |
630 | * @static |
631 | */ | |
632 | static function getComponentName($permission) { | |
633 | $componentName = NULL; | |
634 | $permission = trim($permission); | |
635 | if (empty($permission)) { | |
636 | return $componentName; | |
637 | } | |
638 | ||
639 | static $allCompPermissions = array(); | |
640 | if (empty($allCompPermissions)) { | |
641 | $components = CRM_Core_Component::getComponents(); | |
642 | foreach ($components as $name => $comp) { | |
33777e4a PJ |
643 | //get all permissions of each components unconditionally |
644 | $allCompPermissions[$name] = $comp->getPermissions(TRUE); | |
6a488035 TO |
645 | } |
646 | } | |
647 | ||
648 | if (is_array($allCompPermissions)) { | |
649 | foreach ($allCompPermissions as $name => $permissions) { | |
650 | if (in_array($permission, $permissions)) { | |
651 | $componentName = $name; | |
652 | break; | |
653 | } | |
654 | } | |
655 | } | |
656 | ||
657 | return $componentName; | |
658 | } | |
659 | ||
660 | /** | |
661 | * Get all the contact emails for users that have a specific permission | |
662 | * | |
663 | * @param string $permissionName name of the permission we are interested in | |
664 | * | |
665 | * @return string a comma separated list of email addresses | |
666 | */ | |
667 | public static function permissionEmails($permissionName) { | |
668 | $config = CRM_Core_Config::singleton(); | |
41f314b6 | 669 | return $config->userPermissionClass->permissionEmails($permissionName); |
6a488035 TO |
670 | } |
671 | ||
672 | /** | |
673 | * Get all the contact emails for users that have a specific role | |
674 | * | |
675 | * @param string $roleName name of the role we are interested in | |
676 | * | |
677 | * @return string a comma separated list of email addresses | |
678 | */ | |
679 | public static function roleEmails($roleName) { | |
680 | $config = CRM_Core_Config::singleton(); | |
41f314b6 | 681 | return $config->userRoleClass->roleEmails($roleName); |
6a488035 TO |
682 | } |
683 | ||
684 | static function isMultisiteEnabled() { | |
685 | return CRM_Core_BAO_Setting::getItem(CRM_Core_BAO_Setting::MULTISITE_PREFERENCES_NAME, | |
686 | 'is_enabled' | |
687 | ) ? TRUE : FALSE; | |
688 | } | |
689 | } |