Proyectos de Subversion Moodle

Rev

| Ultima modificación | Ver Log |

Rev Autor Línea Nro. Línea
1 efrain 1
<?php
2
 
3
// This file is part of Moodle - http://moodle.org/
4
//
5
// Moodle is free software: you can redistribute it and/or modify
6
// it under the terms of the GNU General Public License as published by
7
// the Free Software Foundation, either version 3 of the License, or
8
// (at your option) any later version.
9
//
10
// Moodle is distributed in the hope that it will be useful,
11
// but WITHOUT ANY WARRANTY; without even the implied warranty of
12
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13
// GNU General Public License for more details.
14
//
15
// You should have received a copy of the GNU General Public License
16
// along with Moodle.  If not, see <http://www.gnu.org/licenses/>.
17
 
18
/**
19
 * @package moodlecore
20
 * @subpackage backup-plan
21
 * @copyright 2010 onwards Eloy Lafuente (stronk7) {@link http://stronk7.com}
22
 * @license   http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
23
 */
24
 
25
/**
26
 * Abstract class defining the needed stuf for one restore step
27
 *
28
 * TODO: Finish phpdocs
29
 */
30
abstract class restore_step extends base_step {
31
 
32
    /**
33
     * Constructor - instantiates one object of this class
34
     */
35
    public function __construct($name, $task = null) {
36
        if (!is_null($task) && !($task instanceof restore_task)) {
37
            throw new restore_step_exception('wrong_restore_task_specified');
38
        }
39
        parent::__construct($name, $task);
40
    }
41
 
42
    protected function get_restoreid() {
43
        if (is_null($this->task)) {
44
            throw new restore_step_exception('not_specified_restore_task');
45
        }
46
        return $this->task->get_restoreid();
47
    }
48
 
49
    /**
50
     * Apply course startdate offset based in original course startdate and course_offset_startdate setting
51
     * Note we are using one static cache here, but *by restoreid*, so it's ok for concurrence/multiple
52
     * executions in the same request
53
     *
54
     * Note: The policy is to roll date only for configurations and not for user data. see MDL-9367.
55
     *
56
     * @param int $value Time value (seconds since epoch), or empty for nothing
57
     * @return int Time value after applying the date offset, or empty for nothing
58
     */
59
    public function apply_date_offset($value) {
60
 
61
        // Empties don't offset - zeros (int and string), false and nulls return original value.
62
        if (empty($value)) {
63
            return $value;
64
        }
65
 
66
        static $cache = array();
67
        // Lookup cache.
68
        if (isset($cache[$this->get_restoreid()])) {
69
            return $value + $cache[$this->get_restoreid()];
70
        }
71
        // No cache, let's calculate the offset.
72
        $original = $this->task->get_info()->original_course_startdate;
73
        $setting = 0;
74
        if ($this->setting_exists('course_startdate')) { // Seting may not exist (MDL-25019).
75
            $settingobject = $this->task->get_setting('course_startdate');
76
            if (method_exists($settingobject, 'get_normalized_value')) {
77
                $setting = $settingobject->get_normalized_value();
78
            } else {
79
                $setting = $settingobject->get_value();
80
            }
81
        }
82
 
83
        if (empty($original) || empty($setting)) {
84
            // Original course has not startdate or setting doesn't exist, offset = 0.
85
            $cache[$this->get_restoreid()] = 0;
86
 
87
        } else {
88
            // Arrived here, let's calculate the real offset.
89
            $cache[$this->get_restoreid()] = $setting - $original;
90
        }
91
 
92
        // Return the passed value with cached offset applied.
93
        return $value + $cache[$this->get_restoreid()];
94
    }
95
 
96
    /**
97
     * Returns symmetric-key AES-256 decryption of base64 encoded contents.
98
     *
99
     * This method is used in restore operations to decrypt contents encrypted with
100
     * {@link encrypted_final_element} automatically decoding (base64) and decrypting
101
     * contents using the key stored in backup_encryptkey config.
102
     *
103
     * Requires openssl, cipher availability, and key existence (backup
104
     * automatically sets it if missing). Integrity is provided via HMAC.
105
     *
106
     * @param string $value {@link encrypted_final_element} value to decode and decrypt.
107
     * @return string|null decoded and decrypted value or null if the operation can not be performed.
108
     */
109
    public function decrypt($value) {
110
 
111
        // No openssl available, skip this field completely.
112
        if (!function_exists('openssl_encrypt')) {
113
            return null;
114
        }
115
 
116
        // No hash available, skip this field completely.
117
        if (!function_exists('hash_hmac')) {
118
            return null;
119
        }
120
 
121
        // Cypher not available, skip this field completely.
122
        if (!in_array(backup::CIPHER, openssl_get_cipher_methods())) {
123
            return null;
124
        }
125
 
126
        // Get the decrypt key. Skip if missing.
127
        $key = get_config('backup', 'backup_encryptkey');
128
        if ($key === false) {
129
            return null;
130
        }
131
 
132
        // And decode it.
133
        $key = base64_decode($key);
134
 
135
        // Arrived here, let's proceed with authentication (provides integrity).
136
        $hmaclen = 32; // SHA256 is 32 bytes.
137
        $ivlen = openssl_cipher_iv_length(backup::CIPHER);
138
        list($hmac, $iv, $text) = array_values(unpack("a{$hmaclen}hmac/a{$ivlen}iv/a*text", base64_decode($value)));
139
 
140
        // Verify HMAC matches expectations, skip if not (integrity failed).
141
        if (!hash_equals($hmac, hash_hmac('sha256', $iv . $text, $key, true))) {
142
            return null;
143
        }
144
 
145
        // Arrived here, integrity is ok, let's decrypt.
146
        $result = openssl_decrypt($text, backup::CIPHER, $key, OPENSSL_RAW_DATA, $iv);
147
 
148
        // For some reason decrypt failed (strange, HMAC check should have deteted it), skip this field completely.
149
        if ($result === false) {
150
            return null;
151
        }
152
 
153
        return $result;
154
    }
155
}
156
 
157
/*
158
 * Exception class used by all the @restore_step stuff
159
 */
160
class restore_step_exception extends base_step_exception {
161
 
162
    public function __construct($errorcode, $a=NULL, $debuginfo=null) {
163
        parent::__construct($errorcode, $a, $debuginfo);
164
    }
165
}