Proyectos de Subversion Moodle

Rev

Autoría | Ultima modificación | Ver Log |

<?php
// This file is part of Moodle - http://moodle.org/
//
// Moodle is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// Moodle is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with Moodle.  If not, see <http://www.gnu.org/licenses/>.

/**
 * Infected file report
 *
 * @package    report_infectedfiles
 * @author     Nathan Nguyen <nathannguyen@catalyst-au.net>
 * @copyright  Catalyst IT
 * @license    http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
 */
namespace report_infectedfiles\privacy;

use core_privacy\local\metadata\collection;
use core_privacy\local\request;

defined('MOODLE_INTERNAL') || die();

/**
 * Infected file report
 *
 * @package    report_infectedfiles
 * @author     Nathan Nguyen <nathannguyen@catalyst-au.net>
 * @copyright  Catalyst IT
 * @license    http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
 */
class provider implements
        \core_privacy\local\metadata\provider,
        request\plugin\provider,
        request\core_userlist_provider {

    /**
     * This plugin stores the userid of infected users.
     *
     * @param collection $collection the collection object to add data to.
     * @return collection The populated collection.
     */
    public static function get_metadata(collection $collection): collection {
        $collection->add_database_table(
            'infected_files',
            [
                'userid' => 'privacy:metadata:infected_files:userid',
                'filename' => 'privacy:metadata:infected_files:filename',
                'timecreated' => 'privacy:metadata:infected_files:timecreated',
            ],
            'privacy:metadata:infected_files'
        );

        return $collection;
    }

    /**
     * This function gets the contexts containing data for a userid.
     *
     * @param int $userid The userid to get contexts for.
     * @return request\contextlist the context list for the user.
     */
    public static function get_contexts_for_userid(int $userid): request\contextlist {
        $contextlist = new request\contextlist();

        // The system context is the only context where information is stored.
        $contextlist->add_system_context();
        return $contextlist;
    }

    /**
     * This function exports user data on infected files from the contextlist provided.
     *
     * @param request\approved_contextlist $contextlist
     * @return void
     */
    public static function export_user_data(request\approved_contextlist $contextlist) {
        global $DB;

        foreach ($contextlist as $context) {
            // We only export from system context.
            if ($context->contextlevel === CONTEXT_SYSTEM) {

                $userid = $contextlist->get_user()->id;
                $exportdata = [];

                $records = $DB->get_records('infected_files', ['userid' => $userid]);
                foreach ($records as $record) {
                    // Export only the data that does not expose internal information.
                    $data = [];
                    $data['userid'] = $record->userid;
                    $data['timecreated'] = $record->timecreated;
                    $data['filename'] = $record->filename;

                    $exportdata[] = $data;
                }

                // Now export this data in the infected files table as subcontext.
                request\writer::with_context($context)->export_data(
                    [get_string('privacy:metadata:infected_files_subcontext', 'report_infectedfiles')],
                    (object) $exportdata
                );
            }
        }
    }

    /**
     * As this report tracks potential attempted security violations,
     * This data should not be deleted at request. This would allow for an
     * avenue for a malicious user to cover their tracks. This function deliberately
     * does no deletes.
     *
     * @param \context $context the context to delete for.
     * @return void
     */
    public static function delete_data_for_all_users_in_context(\context $context) {
        return;
    }

    /**
     * As this report tracks potential attempted security violations,
     * This data should not be deleted at request. This would allow for an
     * avenue for a malicious user to cover their tracks. This function deliberately
     * does no deletes.
     *
     * @param \core_privacy\local\request\approved_contextlist $contextlist the contextlist to delete for.
     * @return void
     */
    public static function delete_data_for_user(request\approved_contextlist $contextlist) {
        return;
    }

    /**
     * This gets the list of users inside of the provided context. In this case, its only system context
     * which contains users.
     *
     * @param \core_privacy\local\request\userlist $userlist
     * @return void
     */
    public static function get_users_in_context(request\userlist $userlist) {
        $context = $userlist->get_context();

        if ($context->contextlevel === CONTEXT_SYSTEM) {
            // If we are checking system context, we need to get all distinct userids from the table.
            $sql = 'SELECT DISTINCT userid
                      FROM {infected_files}';

            $userlist->add_from_sql('userid', $sql, []);
        }
    }

    /**
     * As this report tracks potential attempted security violations,
     * This data should not be deleted at request. This would allow for an
     * avenue for a malicious user to cover their tracks. This function deliberately
     * does no deletes.
     *
     * @param request\approved_userlist $userlist
     * @return void
     */
    public static function delete_data_for_users(request\approved_userlist $userlist) {
        return;
    }
}