1 |
efrain |
1 |
<?php
|
|
|
2 |
|
|
|
3 |
// This file is part of Moodle - http://moodle.org/
|
|
|
4 |
//
|
|
|
5 |
// Moodle is free software: you can redistribute it and/or modify
|
|
|
6 |
// it under the terms of the GNU General Public License as published by
|
|
|
7 |
// the Free Software Foundation, either version 3 of the License, or
|
|
|
8 |
// (at your option) any later version.
|
|
|
9 |
//
|
|
|
10 |
// Moodle is distributed in the hope that it will be useful,
|
|
|
11 |
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
12 |
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
13 |
// GNU General Public License for more details.
|
|
|
14 |
//
|
|
|
15 |
// You should have received a copy of the GNU General Public License
|
|
|
16 |
// along with Moodle. If not, see <http://www.gnu.org/licenses/>.
|
|
|
17 |
|
|
|
18 |
/**
|
|
|
19 |
* @package moodlecore
|
|
|
20 |
* @subpackage backup-factories
|
|
|
21 |
* @copyright 2010 onwards Eloy Lafuente (stronk7) {@link http://stronk7.com}
|
|
|
22 |
* @license http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
|
|
|
23 |
*/
|
|
|
24 |
|
|
|
25 |
/**
|
|
|
26 |
* Non instantiable helper class providing different restore checks
|
|
|
27 |
*
|
|
|
28 |
* This class contains various static methods available in order to easily
|
|
|
29 |
* perform a bunch of restore architecture tests
|
|
|
30 |
*
|
|
|
31 |
* TODO: Finish phpdocs
|
|
|
32 |
*/
|
|
|
33 |
abstract class restore_check {
|
|
|
34 |
|
|
|
35 |
public static function check_courseid($courseid) {
|
|
|
36 |
global $DB;
|
|
|
37 |
// id must exist in course table
|
|
|
38 |
if (! $DB->record_exists('course', array('id' => $courseid))) {
|
|
|
39 |
throw new restore_controller_exception('restore_check_course_not_exists', $courseid);
|
|
|
40 |
}
|
|
|
41 |
return true;
|
|
|
42 |
}
|
|
|
43 |
|
|
|
44 |
public static function check_user($userid) {
|
|
|
45 |
global $DB;
|
|
|
46 |
// userid must exist in user table
|
|
|
47 |
if (! $DB->record_exists('user', array('id' => $userid))) {
|
|
|
48 |
throw new restore_controller_exception('restore_check_user_not_exists', $userid);
|
|
|
49 |
}
|
|
|
50 |
return true;
|
|
|
51 |
}
|
|
|
52 |
|
|
|
53 |
public static function check_security($restore_controller, $apply) {
|
|
|
54 |
global $DB;
|
|
|
55 |
|
|
|
56 |
if (! $restore_controller instanceof restore_controller) {
|
|
|
57 |
throw new restore_controller_exception('restore_check_security_requires_restore_controller');
|
|
|
58 |
}
|
|
|
59 |
$restore_controller->log('checking plan security', backup::LOG_INFO);
|
|
|
60 |
|
|
|
61 |
// Some handy vars
|
|
|
62 |
$type = $restore_controller->get_type();
|
|
|
63 |
$mode = $restore_controller->get_mode();
|
|
|
64 |
$courseid = $restore_controller->get_courseid();
|
|
|
65 |
$coursectx= context_course::instance($courseid);
|
|
|
66 |
$userid = $restore_controller->get_userid();
|
|
|
67 |
|
|
|
68 |
// Note: all the checks along the function MUST be performed for $userid, that
|
|
|
69 |
// is the user who "requested" the course restore, not current $USER at all!!
|
|
|
70 |
|
|
|
71 |
// First of all, decide which caps/contexts are we going to check
|
|
|
72 |
// for common backups (general, automated...) based exclusively
|
|
|
73 |
// in the type (course, section, activity). And store them into
|
|
|
74 |
// one capability => context array structure
|
|
|
75 |
$typecapstocheck = array();
|
|
|
76 |
switch ($type) {
|
|
|
77 |
case backup::TYPE_1COURSE :
|
|
|
78 |
$typecapstocheck['moodle/restore:restorecourse'] = $coursectx;
|
|
|
79 |
break;
|
|
|
80 |
case backup::TYPE_1SECTION :
|
|
|
81 |
$typecapstocheck['moodle/restore:restoresection'] = $coursectx;
|
|
|
82 |
break;
|
|
|
83 |
case backup::TYPE_1ACTIVITY :
|
|
|
84 |
$typecapstocheck['moodle/restore:restoreactivity'] = $coursectx;
|
|
|
85 |
break;
|
|
|
86 |
default :
|
|
|
87 |
throw new restore_controller_exception('restore_unknown_restore_type', $type);
|
|
|
88 |
}
|
|
|
89 |
|
|
|
90 |
// Now, if restore mode is hub or import, check userid has permissions for those modes
|
|
|
91 |
// other modes will perform common checks only (restorexxxx capabilities in $typecapstocheck)
|
|
|
92 |
switch ($mode) {
|
|
|
93 |
case backup::MODE_IMPORT:
|
|
|
94 |
if (!has_capability('moodle/restore:restoretargetimport', $coursectx, $userid)) {
|
|
|
95 |
$a = new stdclass();
|
|
|
96 |
$a->userid = $userid;
|
|
|
97 |
$a->courseid = $courseid;
|
|
|
98 |
$a->capability = 'moodle/restore:restoretargetimport';
|
|
|
99 |
throw new restore_controller_exception('restore_user_missing_capability', $a);
|
|
|
100 |
}
|
|
|
101 |
break;
|
|
|
102 |
// Common backup (general, automated...), let's check all the $typecapstocheck
|
|
|
103 |
// capability => context pairs
|
|
|
104 |
default:
|
|
|
105 |
foreach ($typecapstocheck as $capability => $context) {
|
|
|
106 |
if (!has_capability($capability, $context, $userid)) {
|
|
|
107 |
$a = new stdclass();
|
|
|
108 |
$a->userid = $userid;
|
|
|
109 |
$a->courseid = $courseid;
|
|
|
110 |
$a->capability = $capability;
|
|
|
111 |
throw new restore_controller_exception('restore_user_missing_capability', $a);
|
|
|
112 |
}
|
|
|
113 |
}
|
|
|
114 |
}
|
|
|
115 |
|
|
|
116 |
// Now, enforce 'moodle/restore:userinfo' to 'users' setting, applying changes if allowed,
|
|
|
117 |
// else throwing exception
|
|
|
118 |
$userssetting = $restore_controller->get_plan()->get_setting('users');
|
|
|
119 |
$prevvalue = $userssetting->get_value();
|
|
|
120 |
$prevstatus = $userssetting->get_status();
|
|
|
121 |
$hasusercap = has_capability('moodle/restore:userinfo', $coursectx, $userid);
|
|
|
122 |
|
|
|
123 |
// If setting is enabled but user lacks permission
|
|
|
124 |
if (!$hasusercap && $prevvalue) { // If user has not the capability and setting is enabled
|
|
|
125 |
// Now analyse if we are allowed to apply changes or must stop with exception
|
|
|
126 |
if (!$apply) { // Cannot apply changes, throw exception
|
|
|
127 |
$a = new stdclass();
|
|
|
128 |
$a->setting = 'users';
|
|
|
129 |
$a->value = $prevvalue;
|
|
|
130 |
$a->capability = 'moodle/restore:userinfo';
|
|
|
131 |
throw new restore_controller_exception('restore_setting_value_wrong_for_capability', $a);
|
|
|
132 |
|
|
|
133 |
} else { // Can apply changes
|
|
|
134 |
$userssetting->set_value(false); // Set the value to false
|
|
|
135 |
$userssetting->set_status(base_setting::LOCKED_BY_PERMISSION);// Set the status to locked by perm
|
|
|
136 |
}
|
|
|
137 |
}
|
|
|
138 |
|
|
|
139 |
// Now, if mode is HUB or IMPORT, and still we are including users in restore, turn them off
|
|
|
140 |
// Defaults processing should have handled this, but we need to be 100% sure
|
|
|
141 |
if ($mode == backup::MODE_IMPORT || $mode == backup::MODE_HUB) {
|
|
|
142 |
$userssetting = $restore_controller->get_plan()->get_setting('users');
|
|
|
143 |
if ($userssetting->get_value()) {
|
|
|
144 |
$userssetting->set_value(false); // Set the value to false
|
|
|
145 |
$userssetting->set_status(base_setting::LOCKED_BY_PERMISSION);// Set the status to locked by perm
|
|
|
146 |
}
|
|
|
147 |
}
|
|
|
148 |
|
|
|
149 |
// Check the user has the ability to configure the restore. If not then we need
|
|
|
150 |
// to lock all settings by permission so that no changes can be made. This does
|
|
|
151 |
// not apply to the import facility, where all the activities (picked on backup)
|
|
|
152 |
// are restored automatically without restore UI
|
|
|
153 |
if ($mode != backup::MODE_IMPORT) {
|
|
|
154 |
$hasconfigcap = has_capability('moodle/restore:configure', $coursectx, $userid);
|
|
|
155 |
if (!$hasconfigcap) {
|
|
|
156 |
$settings = $restore_controller->get_plan()->get_settings();
|
|
|
157 |
foreach ($settings as $setting) {
|
|
|
158 |
$setting->set_status(base_setting::LOCKED_BY_PERMISSION);
|
|
|
159 |
}
|
|
|
160 |
}
|
|
|
161 |
}
|
|
|
162 |
|
|
|
163 |
if ($type == backup::TYPE_1COURSE) {
|
|
|
164 |
// Ensure the user has the rolldates capability. If not we want to lock this
|
|
|
165 |
// settings so that they cannot change it.
|
|
|
166 |
$hasrolldatescap = has_capability('moodle/restore:rolldates', $coursectx, $userid);
|
|
|
167 |
if (!$hasrolldatescap) {
|
|
|
168 |
$startdatesetting = $restore_controller->get_plan()->get_setting('course_startdate');
|
|
|
169 |
if ($startdatesetting) {
|
|
|
170 |
$startdatesetting->set_status(base_setting::NOT_LOCKED); // Permission lock overrides config lock.
|
|
|
171 |
$startdatesetting->set_value(false);
|
|
|
172 |
$startdatesetting->set_status(base_setting::LOCKED_BY_PERMISSION);
|
|
|
173 |
}
|
|
|
174 |
}
|
|
|
175 |
|
|
|
176 |
// Ensure the user has the changefullname capability. If not we want to lock
|
|
|
177 |
// the setting so that they cannot change it.
|
|
|
178 |
$haschangefullnamecap = has_capability('moodle/course:changefullname', $coursectx, $userid);
|
|
|
179 |
if (!$haschangefullnamecap) {
|
|
|
180 |
$fullnamesetting = $restore_controller->get_plan()->get_setting('course_fullname');
|
|
|
181 |
$fullnamesetting->set_status(base_setting::NOT_LOCKED); // Permission lock overrides config lock.
|
|
|
182 |
$fullnamesetting->set_value(false);
|
|
|
183 |
$fullnamesetting->set_status(base_setting::LOCKED_BY_PERMISSION);
|
|
|
184 |
}
|
|
|
185 |
|
|
|
186 |
// Ensure the user has the changeshortname capability. If not we want to lock
|
|
|
187 |
// the setting so that they cannot change it.
|
|
|
188 |
$haschangeshortnamecap = has_capability('moodle/course:changeshortname', $coursectx, $userid);
|
|
|
189 |
if (!$haschangeshortnamecap) {
|
|
|
190 |
$shortnamesetting = $restore_controller->get_plan()->get_setting('course_shortname');
|
|
|
191 |
$shortnamesetting->set_status(base_setting::NOT_LOCKED); // Permission lock overrides config lock.
|
|
|
192 |
$shortnamesetting->set_value(false);
|
|
|
193 |
$shortnamesetting->set_status(base_setting::LOCKED_BY_PERMISSION);
|
|
|
194 |
}
|
|
|
195 |
|
|
|
196 |
// Ensure the user has the update capability. If not we want to lock
|
|
|
197 |
// the overwrite setting so that they cannot change it.
|
|
|
198 |
$hasupdatecap = has_capability('moodle/course:update', $coursectx, $userid);
|
|
|
199 |
if (!$hasupdatecap) {
|
|
|
200 |
$overwritesetting = $restore_controller->get_plan()->get_setting('overwrite_conf');
|
|
|
201 |
$overwritesetting->set_status(base_setting::NOT_LOCKED); // Permission lock overrides config lock.
|
|
|
202 |
$overwritesetting->set_value(false);
|
|
|
203 |
$overwritesetting->set_status(base_setting::LOCKED_BY_PERMISSION);
|
|
|
204 |
}
|
|
|
205 |
|
|
|
206 |
// Ensure the user has the capability to manage enrolment methods. If not we want to unset and lock
|
|
|
207 |
// the setting so that they cannot change it.
|
|
|
208 |
$hasmanageenrolcap = has_capability('moodle/course:enrolconfig', $coursectx, $userid);
|
|
|
209 |
if (!$hasmanageenrolcap) {
|
|
|
210 |
if ($restore_controller->get_plan()->setting_exists('enrolments')) {
|
|
|
211 |
$enrolsetting = $restore_controller->get_plan()->get_setting('enrolments');
|
|
|
212 |
if ($enrolsetting->get_value() != backup::ENROL_NEVER) {
|
|
|
213 |
$enrolsetting->set_status(base_setting::NOT_LOCKED); // In case it was locked earlier.
|
|
|
214 |
$enrolsetting->set_value(backup::ENROL_NEVER);
|
|
|
215 |
}
|
|
|
216 |
$enrolsetting->set_status(base_setting::LOCKED_BY_PERMISSION);
|
|
|
217 |
}
|
|
|
218 |
}
|
|
|
219 |
}
|
|
|
220 |
|
|
|
221 |
return true;
|
|
|
222 |
}
|
|
|
223 |
}
|