Proyectos de Subversion Moodle

Rev

Autoría | Ultima modificación | Ver Log |

<?php
// This file is part of Moodle - http://moodle.org/
//
// Moodle is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// Moodle is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with Moodle.  If not, see <http://www.gnu.org/licenses/>.

namespace core_external;

use context;
use context_course;
use context_helper;
use context_system;
use core_user;
use moodle_exception;
use moodle_url;
use stdClass;

/**
 * Utility functions for the external API.
 *
 * @package    core_webservice
 * @copyright  2015 Juan Leyva
 * @license    http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
 */
class util {
    /**
     * Validate a list of courses, returning the complete course objects for valid courses.
     *
     * Each course has an additional 'contextvalidated' field, this will be set to true unless
     * you set $keepfails, in which case it will be false if validation fails for a course.
     *
     * @param  array $courseids A list of course ids
     * @param  array $courses   An array of courses already pre-fetched, indexed by course id.
     * @param  bool $addcontext True if the returned course object should include the full context object.
     * @param  bool $keepfails  True to keep all the course objects even if validation fails
     * @return array            An array of courses and the validation warnings
     */
    public static function validate_courses(
        $courseids,
        $courses = [],
        $addcontext = false,
        $keepfails = false
    ) {
        global $DB;

        // Delete duplicates.
        $courseids = array_unique($courseids);
        $warnings = [];

        // Remove courses which are not even requested.
        $courses = array_intersect_key($courses, array_flip($courseids));

        // For any courses NOT loaded already, get them in a single query (and preload contexts)
        // for performance. Preserve ordering because some tests depend on it.
        $newcourseids = [];
        foreach ($courseids as $cid) {
            if (!array_key_exists($cid, $courses)) {
                $newcourseids[] = $cid;
            }
        }
        if ($newcourseids) {
            [$listsql, $listparams] = $DB->get_in_or_equal($newcourseids);

            // Load list of courses, and preload associated contexts.
            $contextselect = context_helper::get_preload_record_columns_sql('x');
            $newcourses = $DB->get_records_sql(
                "
                            SELECT c.*, $contextselect
                              FROM {course} c
                              JOIN {context} x ON x.instanceid = c.id
                             WHERE x.contextlevel = ? AND c.id $listsql",
                array_merge([CONTEXT_COURSE], $listparams)
            );
            foreach ($newcourseids as $cid) {
                if (array_key_exists($cid, $newcourses)) {
                    $course = $newcourses[$cid];
                    context_helper::preload_from_record($course);
                    $courses[$course->id] = $course;
                }
            }
        }

        foreach ($courseids as $cid) {
            // Check the user can function in this context.
            try {
                $context = context_course::instance($cid);
                external_api::validate_context($context);

                if ($addcontext) {
                    $courses[$cid]->context = $context;
                }
                $courses[$cid]->contextvalidated = true;
            } catch (\Exception $e) {
                if ($keepfails) {
                    $courses[$cid]->contextvalidated = false;
                } else {
                    unset($courses[$cid]);
                }
                $warnings[] = [
                    'item' => 'course',
                    'itemid' => $cid,
                    'warningcode' => '1',
                    'message' => 'No access rights in course context',
                ];
            }
        }

        return [$courses, $warnings];
    }

    /**
     * Returns all area files (optionally limited by itemid).
     *
     * @param int $contextid context ID
     * @param string $component component
     * @param string $filearea file area
     * @param int $itemid item ID or all files if not specified
     * @param bool $useitemidinurl wether to use the item id in the file URL (modules intro don't use it)
     * @return array of files, compatible with the external_files structure.
     * @since Moodle 3.2
     */
    public static function get_area_files($contextid, $component, $filearea, $itemid = false, $useitemidinurl = true) {
        $files = [];
        $fs = get_file_storage();

        if ($areafiles = $fs->get_area_files($contextid, $component, $filearea, $itemid, 'itemid, filepath, filename', false)) {
            foreach ($areafiles as $areafile) {
                $file = [];
                $file['filename'] = $areafile->get_filename();
                $file['filepath'] = $areafile->get_filepath();
                $file['mimetype'] = $areafile->get_mimetype();
                $file['filesize'] = $areafile->get_filesize();
                $file['timemodified'] = $areafile->get_timemodified();
                $file['isexternalfile'] = $areafile->is_external_file();
                if ($file['isexternalfile']) {
                    $file['repositorytype'] = $areafile->get_repository_type();
                }
                $fileitemid = $useitemidinurl ? $areafile->get_itemid() : null;
                // If AJAX request, generate a standard plugin file url.
                if (AJAX_SCRIPT) {
                    $fileurl = moodle_url::make_pluginfile_url(
                        $contextid,
                        $component,
                        $filearea,
                        $fileitemid,
                        $areafile->get_filepath(),
                        $areafile->get_filename()
                    );
                } else { // Otherwise, generate a webservice plugin file url.
                    $fileurl = moodle_url::make_webservice_pluginfile_url(
                        $contextid,
                        $component,
                        $filearea,
                        $fileitemid,
                        $areafile->get_filepath(),
                        $areafile->get_filename()
                    );
                }
                $file['fileurl'] = $fileurl->out(false);
                $file['icon'] = file_file_icon($areafile);
                $files[] = $file;
            }
        }
        return $files;
    }


    /**
     * Create and return a session linked token. Token to be used for html embedded client apps that want to communicate
     * with the Moodle server through web services. The token is linked to the current session for the current page request.
     * It is expected this will be called in the script generating the html page that is embedding the client app and that the
     * returned token will be somehow passed into the client app being embedded in the page.
     *
     * @param int $tokentype EXTERNAL_TOKEN_EMBEDDED|EXTERNAL_TOKEN_PERMANENT
     * @param stdClass $service service linked to the token
     * @param int $userid user linked to the token
     * @param context $context
     * @param int $validuntil date when the token expired
     * @param string $iprestriction allowed ip - if 0 or empty then all ips are allowed
     * @param string $name token name as a note or token identity at the table view.
     * @return string generated token
     */
    public static function generate_token(
        int $tokentype,
        stdClass $service,
        int $userid,
        context $context,
        int $validuntil = 0,
        string $iprestriction = '',
        string $name = ''
    ): string {
        global $DB, $USER, $SESSION;

        // Make sure the token doesn't exist (even if it should be almost impossible with the random generation).
        $numtries = 0;
        do {
            $numtries++;
            $generatedtoken = md5(uniqid((string) rand(), true));
            if ($numtries > 5) {
                throw new moodle_exception('tokengenerationfailed');
            }
        } while ($DB->record_exists('external_tokens', ['token' => $generatedtoken]));
        $newtoken = (object) [
            'token' => $generatedtoken,
        ];

        if (empty($service->requiredcapability) || has_capability($service->requiredcapability, $context, $userid)) {
            $newtoken->externalserviceid = $service->id;
        } else {
            throw new moodle_exception('nocapabilitytousethisservice');
        }

        $newtoken->tokentype = $tokentype;
        $newtoken->userid = $userid;
        if ($tokentype == EXTERNAL_TOKEN_EMBEDDED) {
            $newtoken->sid = session_id();
        }

        $newtoken->contextid = $context->id;
        $newtoken->creatorid = $USER->id;
        $newtoken->timecreated = time();
        $newtoken->validuntil = $validuntil;
        if (!empty($iprestriction)) {
            $newtoken->iprestriction = $iprestriction;
        }

        // Generate the private token, it must be transmitted only via https.
        $newtoken->privatetoken = random_string(64);

        if (!$name) {
            // Generate a token name.
            $name = self::generate_token_name();
        }
        $newtoken->name = $name;

        $tokenid = $DB->insert_record('external_tokens', $newtoken);
        // Create new session to hold newly created token ID.
        $SESSION->webservicenewlycreatedtoken = $tokenid;

        return $newtoken->token;
    }

    /**
     * Get a service by its id.
     *
     * @param int $serviceid
     * @return stdClass
     */
    public static function get_service_by_id(int $serviceid): stdClass {
        global $DB;

        return $DB->get_record('external_services', ['id' => $serviceid], '*', MUST_EXIST);
    }

    /**
     * Get a service by its name.
     *
     * @param string $name The service name.
     * @return stdClass
     */
    public static function get_service_by_name(string $name): stdClass {
        global $DB;

        return $DB->get_record('external_services', ['name' => $name], '*', MUST_EXIST);
    }

    /**
     * Set the last time a token was sent and trigger the \core\event\webservice_token_sent event.
     *
     * This function is used when a token is generated by the user via login/token.php or admin/tool/mobile/launch.php.
     * In order to protect the privatetoken, we remove it from the event params.
     *
     * @param  stdClass $token token object
     */
    public static function log_token_request(stdClass $token): void {
        global $DB, $USER;

        $token->privatetoken = null;

        // Log token access.
        $DB->set_field('external_tokens', 'lastaccess', time(), ['id' => $token->id]);

        $event = \core\event\webservice_token_sent::create([
            'objectid' => $token->id,
        ]);
        $event->add_record_snapshot('external_tokens', $token);
        $event->trigger();

        // Check if we need to notify the user about the new login via token.
        $loginip = getremoteaddr();
        if ($USER->lastip === $loginip) {
            return;
        }

        $shouldskip = WS_SERVER || CLI_SCRIPT || !NO_MOODLE_COOKIES;
        if ($shouldskip && !PHPUNIT_TEST) {
            return;
        }

        // Schedule adhoc task to sent a login notification to the user.
        $task = new \core\task\send_login_notifications();
        $task->set_userid($USER->id);
        $logintime = time();
        $task->set_custom_data([
            'useragent' => \core_useragent::get_user_agent_string(),
            'ismoodleapp' => \core_useragent::is_moodle_app(),
            'loginip' => $loginip,
            'logintime' => $logintime,
        ]);
        $task->set_component('core');
        // We need sometime so the mobile app will send to Moodle the device information after login.
        $task->set_next_run_time(time() + (2 * MINSECS));
        \core\task\manager::reschedule_or_queue_adhoc_task($task);
    }

    /**
     * Generate or return an existing token for the current authenticated user.
     * This function is used for creating a valid token for users authenticathing via places, including:
     * - login/token.php
     * - admin/tool/mobile/launch.php.
     *
     * @param stdClass $service external service object
     * @return stdClass token object
     * @throws moodle_exception
     */
    public static function generate_token_for_current_user(stdClass $service) {
        global $DB, $USER, $CFG;

        core_user::require_active_user($USER, true, true);

        // Check if there is any required system capability.
        if ($service->requiredcapability && !has_capability($service->requiredcapability, context_system::instance())) {
            throw new moodle_exception('missingrequiredcapability', 'webservice', '', $service->requiredcapability);
        }

        // Specific checks related to user restricted service.
        if ($service->restrictedusers) {
            $authoriseduser = $DB->get_record('external_services_users', [
                'externalserviceid' => $service->id,
                'userid' => $USER->id,
            ]);

            if (empty($authoriseduser)) {
                throw new moodle_exception('usernotallowed', 'webservice', '', $service->shortname);
            }

            if (!empty($authoriseduser->validuntil) && $authoriseduser->validuntil < time()) {
                throw new moodle_exception('invalidtimedtoken', 'webservice');
            }

            if (!empty($authoriseduser->iprestriction) && !address_in_subnet(getremoteaddr(), $authoriseduser->iprestriction)) {
                throw new moodle_exception('invalidiptoken', 'webservice');
            }
        }

        // Check if a token has already been created for this user and this service.
        $conditions = [
            'userid' => $USER->id,
            'externalserviceid' => $service->id,
            'tokentype' => EXTERNAL_TOKEN_PERMANENT,
        ];
        $tokens = $DB->get_records('external_tokens', $conditions, 'timecreated ASC');

        // A bit of sanity checks.
        foreach ($tokens as $key => $token) {
            // Checks related to a specific token. (script execution continue).
            $unsettoken = false;
            // If sid is set then there must be a valid associated session no matter the token type.
            if (!empty($token->sid)) {
                if (!\core\session\manager::session_exists($token->sid)) {
                    // This token will never be valid anymore, delete it.
                    $DB->delete_records('external_tokens', ['sid' => $token->sid]);
                    $unsettoken = true;
                }
            }

            // Remove token is not valid anymore.
            if (!empty($token->validuntil) && $token->validuntil < time()) {
                $DB->delete_records('external_tokens', ['token' => $token->token, 'tokentype' => EXTERNAL_TOKEN_PERMANENT]);
                $unsettoken = true;
            }

            // Remove token if its IP is restricted.
            if (isset($token->iprestriction) && !address_in_subnet(getremoteaddr(), $token->iprestriction)) {
                $unsettoken = true;
            }

            if ($unsettoken) {
                unset($tokens[$key]);
            }
        }

        // If some valid tokens exist then use the most recent.
        if (count($tokens) > 0) {
            $token = array_pop($tokens);
        } else {
            $context = context_system::instance();
            $isofficialservice = $service->shortname == MOODLE_OFFICIAL_MOBILE_SERVICE;

            if (
                ($isofficialservice && has_capability('moodle/webservice:createmobiletoken', $context)) ||
                (!is_siteadmin($USER) && has_capability('moodle/webservice:createtoken', $context))
            ) {
                // Create a new token.
                $token = new stdClass();
                $token->token = md5(uniqid((string) rand(), true));
                $token->userid = $USER->id;
                $token->tokentype = EXTERNAL_TOKEN_PERMANENT;
                $token->contextid = context_system::instance()->id;
                $token->creatorid = $USER->id;
                $token->timecreated = time();
                $token->externalserviceid = $service->id;
                // By default tokens are valid for 12 weeks.
                $token->validuntil = $token->timecreated + $CFG->tokenduration;
                $token->iprestriction = null;
                $token->sid = null;
                $token->lastaccess = null;
                $token->name = self::generate_token_name();
                // Generate the private token, it must be transmitted only via https.
                $token->privatetoken = random_string(64);
                $token->id = $DB->insert_record('external_tokens', $token);

                $eventtoken = clone $token;
                $eventtoken->privatetoken = null;
                $params = [
                    'objectid' => $eventtoken->id,
                    'relateduserid' => $USER->id,
                    'other' => [
                        'auto' => true,
                    ],
                ];
                $event = \core\event\webservice_token_created::create($params);
                $event->add_record_snapshot('external_tokens', $eventtoken);
                $event->trigger();
            } else {
                throw new moodle_exception('cannotcreatetoken', 'webservice', '', $service->shortname);
            }
        }
        return $token;
    }

    /**
     * Format the string to be returned properly as requested by the either the web service server,
     * either by an internally call.
     * The caller can change the format (raw) with the settings singleton
     * All web service servers must set this singleton when parsing the $_GET and $_POST.
     *
     * <pre>
     * Options are the same that in {@see format_string()} with some changes:
     *      filter      : Can be set to false to force filters off, else observes {@see settings}.
     * </pre>
     *
     * @param string|null $content The string to be filtered. Should be plain text, expect
     * possibly for multilang tags.
     * @param int|context $context The id of the context for the string or the context (affects filters).
     * @param boolean $striplinks To strip any link in the result text. Moodle 1.8 default changed from false to true! MDL-8713
     * @param array $options options array/object or courseid
     * @return string text
     */
    public static function format_string(
        $content,
        $context,
        $striplinks = true,
        $options = []
    ) {
        if ($content === null || $content === '') {
            // Nothing to return.
            // Note: It's common for the DB to return null, so we allow format_string to take a null,
            // even though it is counter-intuitive.
            return '';
        }

        // Get settings (singleton).
        $settings = external_settings::get_instance();

        if (!$settings->get_raw()) {
            $options['context'] = $context;
            $options['filter'] = isset($options['filter']) && !$options['filter'] ? false : $settings->get_filter();
            return format_string($content, $striplinks, $options);
        }

        return $content;
    }

    /**
     * Format the text to be returned properly as requested by the either the web service server,
     * either by an internally call.
     * The caller can change the format (raw, filter, file, fileurl) with the \core_external\settings singleton
     * All web service servers must set this singleton when parsing the $_GET and $_POST.
     *
     * <pre>
     * Options are the same that in {@see format_text()} with some changes in defaults to provide backwards compatibility:
     *      trusted     :   If true the string won't be cleaned. Default false.
     *      noclean     :   If true the string won't be cleaned only if trusted is also true. Default false.
     *      nocache     :   If true the string will not be cached and will be formatted every call. Default false.
     *      filter      :   Can be set to false to force filters off, else observes {@see \core_external\settings}.
     *      para        :   If true then the returned string will be wrapped in div tags.
     *                      Default (different from format_text) false.
     *                      Default changed because div tags are not commonly needed.
     *      newlines    :   If true then lines newline breaks will be converted to HTML newline breaks. Default true.
     *      context     :   Not used! Using contextid parameter instead.
     *      overflowdiv :   If set to true the formatted text will be encased in a div with the class no-overflow before being
     *                      returned. Default false.
     *      allowid     :   If true then id attributes will not be removed, even when using htmlpurifier. Default (different from
     *                      format_text) true. Default changed id attributes are commonly needed.
     *      blanktarget :   If true all <a> tags will have target="_blank" added unless target is explicitly specified.
     * </pre>
     *
     * @param string|null $text The content that may contain ULRs in need of rewriting.
     * @param string|int|null $textformat The text format.
     * @param context $context This parameter and the next two identify the file area to use.
     * @param string|null $component
     * @param string|null $filearea helps identify the file area.
     * @param int|string|null $itemid helps identify the file area.
     * @param array|stdClass|null $options text formatting options
     * @return array text + textformat
     */
    public static function format_text(
        $text,
        $textformat,
        $context,
        $component = null,
        $filearea = null,
        $itemid = null,
        $options = null
    ) {
        global $CFG;

        if ($text === null || $text === '') {
            // Nothing to return.
            // Note: It's common for the DB to return null, so we allow format_string to take nulls,
            // even though it is counter-intuitive.
            return ['', $textformat ?? FORMAT_MOODLE];
        }

        if (empty($itemid)) {
            $itemid = null;
        }

        // Get settings (singleton).
        $settings = external_settings::get_instance();

        if ($component && $filearea && $settings->get_fileurl()) {
            require_once($CFG->libdir . "/filelib.php");
            $text = file_rewrite_pluginfile_urls($text, $settings->get_file(), $context->id, $component, $filearea, $itemid);
        }

        // Note that $CFG->forceclean does not apply here if the client requests for the raw database content.
        // This is consistent with web clients that are still able to load non-cleaned text into editors, too.

        if (!$settings->get_raw()) {
            $options = (array) $options;

            // If context is passed in options, check that is the same to show a debug message.
            if (isset($options['context'])) {
                if (is_int($options['context'])) {
                    if ($options['context'] != $context->id) {
                        debugging(
                            'Different contexts found in external_format_text parameters. $options[\'context\'] not allowed. ' .
                            'Using $contextid parameter...',
                            DEBUG_DEVELOPER
                        );
                    }
                } else if ($options['context'] instanceof context) {
                    if ($options['context']->id != $context->id) {
                        debugging(
                            'Different contexts found in external_format_text parameters. $options[\'context\'] not allowed. ' .
                            'Using $contextid parameter...',
                            DEBUG_DEVELOPER
                        );
                    }
                }
            }

            $options['filter'] = isset($options['filter']) && !$options['filter'] ? false : $settings->get_filter();
            $options['para'] = isset($options['para']) ? $options['para'] : false;
            $options['context'] = $context;
            $options['allowid'] = isset($options['allowid']) ? $options['allowid'] : true;

            $text = format_text($text, $textformat, $options);
            // Once converted to html (from markdown, plain... lets inform consumer this is already HTML).
            $textformat = FORMAT_HTML;
        }

        // Note: The formats defined in weblib are strings.
        return [$text, $textformat];
    }

    /**
     * Validate text field format against known FORMAT_XXX
     *
     * @param string $format the format to validate
     * @return string the validated format
     * @throws \moodle_exception
     * @since Moodle 2.3
     */
    public static function validate_format($format) {
        $allowedformats = [FORMAT_HTML, FORMAT_MOODLE, FORMAT_PLAIN, FORMAT_MARKDOWN];
        if (!in_array($format, $allowedformats)) {
            throw new moodle_exception(
                'formatnotsupported',
                'webservice',
                '',
                null,
                "The format with value={$format} is not supported by this Moodle site"
            );
        }
        return $format;
    }

    /**
     * Delete all pre-built services, related tokens, and external functions information defined for the specified component.
     *
     * @param string $component The frankenstyle component name
     */
    public static function delete_service_descriptions(string $component): void {
        global $DB;

        $params = [$component];

        $DB->delete_records_select(
            'external_tokens',
            "externalserviceid IN (SELECT id FROM {external_services} WHERE component = ?)",
            $params
        );
        $DB->delete_records_select(
            'external_services_users',
            "externalserviceid IN (SELECT id FROM {external_services} WHERE component = ?)",
            $params
        );
        $DB->delete_records_select(
            'external_services_functions',
            "functionname IN (SELECT name FROM {external_functions} WHERE component = ?)",
            $params
        );
        $DB->delete_records('external_services', ['component' => $component]);
        $DB->delete_records('external_functions', ['component' => $component]);
    }

    /**
     * Generate token name.
     *
     * @return string
     */
    public static function generate_token_name(): string {
        return get_string(
            'tokennameprefix',
            'webservice',
            random_string(5)
        );
    }
}