Proyectos de Subversion Moodle

Rev

| Ultima modificación | Ver Log |

Rev Autor Línea Nro. Línea
1 efrain 1
<?php
2
 
3
// This file is part of Moodle - http://moodle.org/
4
//
5
// Moodle is free software: you can redistribute it and/or modify
6
// it under the terms of the GNU General Public License as published by
7
// the Free Software Foundation, either version 3 of the License, or
8
// (at your option) any later version.
9
//
10
// Moodle is distributed in the hope that it will be useful,
11
// but WITHOUT ANY WARRANTY; without even the implied warranty of
12
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13
// GNU General Public License for more details.
14
//
15
// You should have received a copy of the GNU General Public License
16
// along with Moodle.  If not, see <http://www.gnu.org/licenses/>.
17
 
18
/**
19
 * @package    moodlecore
20
 * @subpackage backup-factories
21
 * @copyright  2010 onwards Eloy Lafuente (stronk7) {@link http://stronk7.com}
22
 * @license    http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
23
 */
24
 
25
/**
26
 * Non instantiable helper class providing different restore checks
27
 *
28
 * This class contains various static methods available in order to easily
29
 * perform a bunch of restore architecture tests
30
 *
31
 * TODO: Finish phpdocs
32
 */
33
abstract class restore_check {
34
 
35
    public static function check_courseid($courseid) {
36
        global $DB;
37
        // id must exist in course table
38
        if (! $DB->record_exists('course', array('id' => $courseid))) {
39
            throw new restore_controller_exception('restore_check_course_not_exists', $courseid);
40
        }
41
        return true;
42
    }
43
 
44
    public static function check_user($userid) {
45
        global $DB;
46
        // userid must exist in user table
47
        if (! $DB->record_exists('user', array('id' => $userid))) {
48
            throw new restore_controller_exception('restore_check_user_not_exists', $userid);
49
        }
50
        return true;
51
    }
52
 
53
    public static function check_security($restore_controller, $apply) {
54
        global $DB;
55
 
56
        if (! $restore_controller instanceof restore_controller) {
57
            throw new restore_controller_exception('restore_check_security_requires_restore_controller');
58
        }
59
        $restore_controller->log('checking plan security', backup::LOG_INFO);
60
 
61
        // Some handy vars
62
        $type     = $restore_controller->get_type();
63
        $mode     = $restore_controller->get_mode();
64
        $courseid = $restore_controller->get_courseid();
65
        $coursectx= context_course::instance($courseid);
66
        $userid   = $restore_controller->get_userid();
67
 
68
        // Note: all the checks along the function MUST be performed for $userid, that
69
        // is the user who "requested" the course restore, not current $USER at all!!
70
 
71
        // First of all, decide which caps/contexts are we going to check
72
        // for common backups (general, automated...) based exclusively
73
        // in the type (course, section, activity). And store them into
74
        // one capability => context array structure
75
        $typecapstocheck = array();
76
        switch ($type) {
77
            case backup::TYPE_1COURSE :
78
                $typecapstocheck['moodle/restore:restorecourse'] = $coursectx;
79
                break;
80
            case backup::TYPE_1SECTION :
81
                $typecapstocheck['moodle/restore:restoresection'] = $coursectx;
82
                break;
83
            case backup::TYPE_1ACTIVITY :
84
                $typecapstocheck['moodle/restore:restoreactivity'] = $coursectx;
85
                break;
86
            default :
87
                throw new restore_controller_exception('restore_unknown_restore_type', $type);
88
        }
89
 
90
        // Now, if restore mode is hub or import, check userid has permissions for those modes
91
        // other modes will perform common checks only (restorexxxx capabilities in $typecapstocheck)
92
        switch ($mode) {
93
            case backup::MODE_IMPORT:
94
                if (!has_capability('moodle/restore:restoretargetimport', $coursectx, $userid)) {
95
                    $a = new stdclass();
96
                    $a->userid = $userid;
97
                    $a->courseid = $courseid;
98
                    $a->capability = 'moodle/restore:restoretargetimport';
99
                    throw new restore_controller_exception('restore_user_missing_capability', $a);
100
                }
101
                break;
102
            // Common backup (general, automated...), let's check all the $typecapstocheck
103
            // capability => context pairs
104
            default:
105
                foreach ($typecapstocheck as $capability => $context) {
106
                    if (!has_capability($capability, $context, $userid)) {
107
                        $a = new stdclass();
108
                        $a->userid = $userid;
109
                        $a->courseid = $courseid;
110
                        $a->capability = $capability;
111
                        throw new restore_controller_exception('restore_user_missing_capability', $a);
112
                    }
113
                }
114
        }
115
 
116
        // Now, enforce 'moodle/restore:userinfo' to 'users' setting, applying changes if allowed,
117
        // else throwing exception
118
        $userssetting = $restore_controller->get_plan()->get_setting('users');
119
        $prevvalue    = $userssetting->get_value();
120
        $prevstatus   = $userssetting->get_status();
121
        $hasusercap   = has_capability('moodle/restore:userinfo', $coursectx, $userid);
122
 
123
        // If setting is enabled but user lacks permission
124
        if (!$hasusercap && $prevvalue) { // If user has not the capability and setting is enabled
125
            // Now analyse if we are allowed to apply changes or must stop with exception
126
            if (!$apply) { // Cannot apply changes, throw exception
127
                $a = new stdclass();
128
                $a->setting = 'users';
129
                $a->value = $prevvalue;
130
                $a->capability = 'moodle/restore:userinfo';
131
                throw new restore_controller_exception('restore_setting_value_wrong_for_capability', $a);
132
 
133
            } else { // Can apply changes
134
                $userssetting->set_value(false);                              // Set the value to false
135
                $userssetting->set_status(base_setting::LOCKED_BY_PERMISSION);// Set the status to locked by perm
136
            }
137
        }
138
 
139
        // Now, if mode is HUB or IMPORT, and still we are including users in restore, turn them off
140
        // Defaults processing should have handled this, but we need to be 100% sure
141
        if ($mode == backup::MODE_IMPORT || $mode == backup::MODE_HUB) {
142
            $userssetting = $restore_controller->get_plan()->get_setting('users');
143
            if ($userssetting->get_value()) {
144
                $userssetting->set_value(false);                              // Set the value to false
145
                $userssetting->set_status(base_setting::LOCKED_BY_PERMISSION);// Set the status to locked by perm
146
            }
147
        }
148
 
149
        // Check the user has the ability to configure the restore. If not then we need
150
        // to lock all settings by permission so that no changes can be made. This does
151
        // not apply to the import facility, where all the activities (picked on backup)
152
        // are restored automatically without restore UI
153
        if ($mode != backup::MODE_IMPORT) {
154
            $hasconfigcap = has_capability('moodle/restore:configure', $coursectx, $userid);
155
            if (!$hasconfigcap) {
156
                $settings = $restore_controller->get_plan()->get_settings();
157
                foreach ($settings as $setting) {
158
                    $setting->set_status(base_setting::LOCKED_BY_PERMISSION);
159
                }
160
            }
161
        }
162
 
163
        if ($type == backup::TYPE_1COURSE) {
164
            // Ensure the user has the rolldates capability. If not we want to lock this
165
            // settings so that they cannot change it.
166
            $hasrolldatescap = has_capability('moodle/restore:rolldates', $coursectx, $userid);
167
            if (!$hasrolldatescap) {
168
                $startdatesetting = $restore_controller->get_plan()->get_setting('course_startdate');
169
                if ($startdatesetting) {
170
                    $startdatesetting->set_status(base_setting::NOT_LOCKED); // Permission lock overrides config lock.
171
                    $startdatesetting->set_value(false);
172
                    $startdatesetting->set_status(base_setting::LOCKED_BY_PERMISSION);
173
                }
174
            }
175
 
176
            // Ensure the user has the changefullname capability. If not we want to lock
177
            // the setting so that they cannot change it.
178
            $haschangefullnamecap = has_capability('moodle/course:changefullname', $coursectx, $userid);
179
            if (!$haschangefullnamecap) {
180
                $fullnamesetting = $restore_controller->get_plan()->get_setting('course_fullname');
181
                $fullnamesetting->set_status(base_setting::NOT_LOCKED); // Permission lock overrides config lock.
182
                $fullnamesetting->set_value(false);
183
                $fullnamesetting->set_status(base_setting::LOCKED_BY_PERMISSION);
184
            }
185
 
186
            // Ensure the user has the changeshortname capability. If not we want to lock
187
            // the setting so that they cannot change it.
188
            $haschangeshortnamecap = has_capability('moodle/course:changeshortname', $coursectx, $userid);
189
            if (!$haschangeshortnamecap) {
190
                $shortnamesetting = $restore_controller->get_plan()->get_setting('course_shortname');
191
                $shortnamesetting->set_status(base_setting::NOT_LOCKED); // Permission lock overrides config lock.
192
                $shortnamesetting->set_value(false);
193
                $shortnamesetting->set_status(base_setting::LOCKED_BY_PERMISSION);
194
            }
195
 
196
            // Ensure the user has the update capability. If not we want to lock
197
            // the overwrite setting so that they cannot change it.
198
            $hasupdatecap = has_capability('moodle/course:update', $coursectx, $userid);
199
            if (!$hasupdatecap) {
200
                $overwritesetting = $restore_controller->get_plan()->get_setting('overwrite_conf');
201
                $overwritesetting->set_status(base_setting::NOT_LOCKED); // Permission lock overrides config lock.
202
                $overwritesetting->set_value(false);
203
                $overwritesetting->set_status(base_setting::LOCKED_BY_PERMISSION);
204
            }
205
 
206
            // Ensure the user has the capability to manage enrolment methods. If not we want to unset and lock
207
            // the setting so that they cannot change it.
208
            $hasmanageenrolcap = has_capability('moodle/course:enrolconfig', $coursectx, $userid);
209
            if (!$hasmanageenrolcap) {
210
                if ($restore_controller->get_plan()->setting_exists('enrolments')) {
211
                    $enrolsetting = $restore_controller->get_plan()->get_setting('enrolments');
212
                    if ($enrolsetting->get_value() != backup::ENROL_NEVER) {
213
                        $enrolsetting->set_status(base_setting::NOT_LOCKED); // In case it was locked earlier.
214
                        $enrolsetting->set_value(backup::ENROL_NEVER);
215
                    }
216
                    $enrolsetting->set_status(base_setting::LOCKED_BY_PERMISSION);
217
                }
218
            }
219
        }
220
 
221
        return true;
222
    }
223
}