Sanitize path normalization of class.t3lib_userauthgroup.php::addFileMount()
[Packages/TYPO3.CMS.git] / t3lib / class.t3lib_userauthgroup.php
1 <?php
2 /***************************************************************
3 * Copyright notice
4 *
5 * (c) 1999-2006 Kasper Skaarhoj (kasperYYYY@typo3.com)
6 * All rights reserved
7 *
8 * This script is part of the TYPO3 project. The TYPO3 project is
9 * free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * The GNU General Public License can be found at
15 * http://www.gnu.org/copyleft/gpl.html.
16 * A copy is found in the textfile GPL.txt and important notices to the license
17 * from the author is found in LICENSE.txt distributed with these scripts.
18 *
19 *
20 * This script is distributed in the hope that it will be useful,
21 * but WITHOUT ANY WARRANTY; without even the implied warranty of
22 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
23 * GNU General Public License for more details.
24 *
25 * This copyright notice MUST APPEAR in all copies of the script!
26 ***************************************************************/
27 /**
28 * Contains an extension class specifically for authentication/initialization of backend users in TYPO3
29 *
30 * $Id$
31 * Revised for TYPO3 3.6 July/2003 by Kasper Skaarhoj
32 *
33 * @author Kasper Skaarhoj <kasperYYYY@typo3.com>
34 */
35 /**
36 * [CLASS/FUNCTION INDEX of SCRIPT]
37 *
38 *
39 *
40 * 135: class t3lib_userAuthGroup extends t3lib_userAuth
41 *
42 * SECTION: Permission checking functions:
43 * 199: function isAdmin()
44 * 211: function isMemberOfGroup($groupId)
45 * 233: function doesUserHaveAccess($row,$perms)
46 * 250: function isInWebMount($id,$readPerms='',$exitOnError=0)
47 * 277: function modAccess($conf,$exitOnError)
48 * 328: function getPagePermsClause($perms)
49 * 367: function calcPerms($row)
50 * 405: function isRTE()
51 * 439: function check($type,$value)
52 * 456: function checkAuthMode($table,$field,$value,$authMode)
53 * 522: function checkLanguageAccess($langValue)
54 * 544: function recordEditAccessInternals($table,$idOrRow,$newRecord=FALSE)
55 * 619: function isPSet($lCP,$table,$type='')
56 * 636: function mayMakeShortcut()
57 * 650: function workspaceCannotEditRecord($table,$recData)
58 * 689: function workspaceCannotEditOfflineVersion($table,$recData)
59 * 712: function workspaceAllowLiveRecordsInPID($pid, $table)
60 * 733: function workspaceCreateNewRecord($pid, $table)
61 * 752: function workspaceAllowAutoCreation($table,$id,$recpid)
62 * 772: function workspaceCheckStageForCurrent($stage)
63 * 795: function workspacePublishAccess($wsid)
64 * 823: function workspaceSwapAccess()
65 * 835: function workspaceVersioningTypeAccess($type)
66 * 866: function workspaceVersioningTypeGetClosest($type)
67 *
68 * SECTION: Miscellaneous functions
69 * 909: function getTSConfig($objectString,$config='')
70 * 935: function getTSConfigVal($objectString)
71 * 947: function getTSConfigProp($objectString)
72 * 959: function inList($in_list,$item)
73 * 970: function returnWebmounts()
74 * 980: function returnFilemounts()
75 * 997: function jsConfirmation($bitmask)
76 *
77 * SECTION: Authentication methods
78 * 1035: function fetchGroupData()
79 * 1168: function fetchGroups($grList,$idList='')
80 * 1266: function setCachedList($cList)
81 * 1286: function addFileMount($title, $altTitle, $path, $webspace, $type)
82 * 1333: function addTScomment($str)
83 *
84 * SECTION: Workspaces
85 * 1369: function workspaceInit()
86 * 1412: function checkWorkspace($wsRec,$fields='uid,title,adminusers,members,reviewers,publish_access,stagechg_notification')
87 * 1487: function checkWorkspaceCurrent()
88 * 1500: function setWorkspace($workspaceId)
89 * 1528: function setWorkspacePreview($previewState)
90 * 1538: function getDefaultWorkspace()
91 *
92 * SECTION: Logging
93 * 1589: function writelog($type,$action,$error,$details_nr,$details,$data,$tablename='',$recuid='',$recpid='',$event_pid=-1,$NEWid='',$userId=0)
94 * 1621: function simplelog($message, $extKey='', $error=0)
95 * 1642: function checkLogFailures($email, $secondsBack=3600, $max=3)
96 *
97 * TOTAL FUNCTIONS: 45
98 * (This index is automatically created/updated by the extension "extdeveval")
99 *
100 */
101
102 // Need this for parsing User TSconfig
103 require_once (PATH_t3lib.'class.t3lib_tsparser.php');
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125 /**
126 * Extension to class.t3lib_userauth.php; Authentication of users in TYPO3 Backend
127 *
128 * Actually this class is extended again by t3lib_beuserauth which is the actual backend user class that will be instantiated.
129 * In fact the two classes t3lib_beuserauth and this class could just as well be one, single class since t3lib_userauthgroup is not - to my knowledge - used separately elsewhere. But for historical reasons they are two separate classes.
130 *
131 * @author Kasper Skaarhoj <kasperYYYY@typo3.com>
132 * @package TYPO3
133 * @subpackage t3lib
134 */
135 class t3lib_userAuthGroup extends t3lib_userAuth {
136 var $usergroup_column = 'usergroup'; // Should be set to the usergroup-column (id-list) in the user-record
137 var $usergroup_table = 'be_groups'; // The name of the group-table
138
139 // internal
140 var $groupData = Array( // This array holds lists of eg. tables, fields and other values related to the permission-system. See fetchGroupData
141 'filemounts' => Array() // Filemounts are loaded here
142 );
143 var $workspace = -99; // User workspace. -99 is ERROR (none available), -1 is offline, 0 is online, >0 is custom workspaces.
144 var $workspaceRec = array(); // Custom workspace record if any
145
146 var $userGroups = Array(); // This array will hold the groups that the user is a member of
147 var $userGroupsUID = Array(); // This array holds the uid's of the groups in the listed order
148 var $groupList =''; // This is $this->userGroupsUID imploded to a comma list... Will correspond to the 'usergroup_cached_list'
149 var $dataLists=array( // Used internally to accumulate data for the user-group. DONT USE THIS EXTERNALLY! Use $this->groupData instead
150 'webmount_list'=>'',
151 'filemount_list'=>'',
152 'modList'=>'',
153 'tables_select'=>'',
154 'tables_modify'=>'',
155 'pagetypes_select'=>'',
156 'non_exclude_fields'=>'',
157 'explicit_allowdeny'=>'',
158 'allowed_languages' => '',
159 'workspace_perms' => '',
160 'custom_options' => '',
161 );
162 var $includeHierarchy=array(); // For debugging/display of order in which subgroups are included.
163 var $includeGroupArray=array(); // List of group_id's in the order they are processed.
164
165 var $OS=''; // Set to 'WIN', if windows
166 var $TSdataArray=array(); // Used to accumulate the TSconfig data of the user
167 var $userTS_text = ''; // Contains the non-parsed user TSconfig
168 var $userTS = array(); // Contains the parsed user TSconfig
169 var $userTSUpdated=0; // Set internally if the user TSconfig was parsed and needs to be cached.
170 var $userTS_dontGetCached=0; // Set this from outside if you want the user TSconfig to ALWAYS be parsed and not fetched from cache.
171
172 var $RTE_errors = array(); // RTE availability errors collected.
173 var $errorMsg = ''; // Contains last error message
174
175 var $checkWorkspaceCurrent_cache=NULL; // Cache for checkWorkspaceCurrent()
176
177
178
179
180
181
182
183
184
185
186
187 /************************************
188 *
189 * Permission checking functions:
190 *
191 ************************************/
192
193 /**
194 * Returns true if user is admin
195 * Basically this function evaluates if the ->user[admin] field has bit 0 set. If so, user is admin.
196 *
197 * @return boolean
198 */
199 function isAdmin() {
200 return (($this->user['admin']&1) ==1);
201 }
202
203 /**
204 * Returns true if the current user is a member of group $groupId
205 * $groupId must be set. $this->groupList must contain groups
206 * Will return true also if the user is a member of a group through subgroups.
207 *
208 * @param integer Group ID to look for in $this->groupList
209 * @return boolean
210 */
211 function isMemberOfGroup($groupId) {
212 $groupId = intval($groupId);
213 if ($this->groupList && $groupId) {
214 return $this->inList($this->groupList, $groupId);
215 }
216 }
217
218 /**
219 * Checks if the permissions is granted based on a page-record ($row) and $perms (binary and'ed)
220 *
221 * Bits for permissions, see $perms variable:
222 *
223 * 1 - Show: See/Copy page and the pagecontent.
224 * 16- Edit pagecontent: Change/Add/Delete/Move pagecontent.
225 * 2- Edit page: Change/Move the page, eg. change title, startdate, hidden.
226 * 4- Delete page: Delete the page and pagecontent.
227 * 8- New pages: Create new pages under the page.
228 *
229 * @param array $row is the pagerow for which the permissions is checked
230 * @param integer $perms is the binary representation of the permission we are going to check. Every bit in this number represents a permission that must be set. See function explanation.
231 * @return boolean True or False upon evaluation
232 */
233 function doesUserHaveAccess($row,$perms) {
234 $userPerms = $this->calcPerms($row);
235 return ($userPerms & $perms)==$perms;
236 }
237
238 /**
239 * Checks if the page id, $id, is found within the webmounts set up for the user.
240 * This should ALWAYS be checked for any page id a user works with, whether it's about reading, writing or whatever.
241 * The point is that this will add the security that a user can NEVER touch parts outside his mounted pages in the page tree. This is otherwise possible if the raw page permissions allows for it. So this security check just makes it easier to make safe user configurations.
242 * If the user is admin OR if this feature is disabled (fx. by setting TYPO3_CONF_VARS['BE']['lockBeUserToDBmounts']=0) then it returns "1" right away
243 * Otherwise the function will return the uid of the webmount which was first found in the rootline of the input page $id
244 *
245 * @param integer Page ID to check
246 * @param string Content of "->getPagePermsClause(1)" (read-permissions). If not set, they will be internally calculated (but if you have the correct value right away you can save that database lookup!)
247 * @param boolean If set, then the function will exit with an error message.
248 * @return integer The page UID of a page in the rootline that matched a mount point
249 */
250 function isInWebMount($id,$readPerms='',$exitOnError=0) {
251 if (!$GLOBALS['TYPO3_CONF_VARS']['BE']['lockBeUserToDBmounts'] || $this->isAdmin()) return 1;
252 $id = intval($id);
253 if (!$readPerms) $readPerms = $this->getPagePermsClause(1);
254 if ($id>0) {
255 $wM = $this->returnWebmounts();
256 $rL = t3lib_BEfunc::BEgetRootLine($id,' AND '.$readPerms);
257
258 foreach($rL as $v) {
259 if ($v['uid'] && in_array($v['uid'],$wM)) {
260 return $v['uid'];
261 }
262 }
263 }
264 if ($exitOnError) {
265 t3lib_BEfunc::typo3PrintError ('Access Error','This page is not within your DB-mounts',0);
266 exit;
267 }
268 }
269
270 /**
271 * Checks access to a backend module with the $MCONF passed as first argument
272 *
273 * @param array $MCONF array of a backend module!
274 * @param boolean If set, an array will issue an error message and exit.
275 * @return boolean Will return true if $MCONF['access'] is not set at all, if the BE_USER is admin or if the module is enabled in the be_users/be_groups records of the user (specifically enabled). Will return false if the module name is not even found in $TBE_MODULES
276 */
277 function modAccess($conf,$exitOnError) {
278 if (!t3lib_BEfunc::isModuleSetInTBE_MODULES($conf['name'])) {
279 if ($exitOnError) {
280 t3lib_BEfunc::typo3PrintError ('Fatal Error','This module "'.$conf['name'].'" is not enabled in TBE_MODULES',0);
281 exit;
282 }
283 return FALSE;
284 }
285
286 // Workspaces check:
287 if ($conf['workspaces']) {
288 if (($this->workspace===0 && t3lib_div::inList($conf['workspaces'],'online')) ||
289 ($this->workspace===-1 && t3lib_div::inList($conf['workspaces'],'offline')) ||
290 ($this->workspace>0 && t3lib_div::inList($conf['workspaces'],'custom'))) {
291 // ok, go on...
292 } else {
293 if ($exitOnError) {
294 t3lib_BEfunc::typo3PrintError ('Workspace Error','This module "'.$conf['name'].'" is not available under the current workspace',0);
295 exit;
296 }
297 return FALSE;
298 }
299 }
300
301 // Returns true if conf[access] is not set at all or if the user is admin
302 if (!$conf['access'] || $this->isAdmin()) return TRUE;
303
304 // If $conf['access'] is set but not with 'admin' then we return true, if the module is found in the modList
305 if (!strstr($conf['access'],'admin') && $conf['name']) {
306 $acs = $this->check('modules',$conf['name']);
307 }
308 if (!$acs && $exitOnError) {
309 t3lib_BEfunc::typo3PrintError ('Access Error','You don\'t have access to this module.',0);
310 exit;
311 } else return $acs;
312 }
313
314 /**
315 * Returns a WHERE-clause for the pages-table where user permissions according to input argument, $perms, is validated.
316 * $perms is the 'mask' used to select. Fx. if $perms is 1 then you'll get all pages that a user can actually see!
317 * 2^0 = show (1)
318 * 2^1 = edit (2)
319 * 2^2 = delete (4)
320 * 2^3 = new (8)
321 * If the user is 'admin' " 1=1" is returned (no effect)
322 * If the user is not set at all (->user is not an array), then " 1=0" is returned (will cause no selection results at all)
323 * The 95% use of this function is "->getPagePermsClause(1)" which will return WHERE clauses for *selecting* pages in backend listings - in other words will this check read permissions.
324 *
325 * @param integer Permission mask to use, see function description
326 * @return string Part of where clause. Prefix " AND " to this.
327 */
328 function getPagePermsClause($perms) {
329 global $TYPO3_CONF_VARS;
330 if (is_array($this->user)) {
331 if ($this->isAdmin()) {
332 return ' 1=1';
333 }
334
335 $perms = intval($perms); // Make sure it's integer.
336 $str= ' ('.
337 '(pages.perms_everybody & '.$perms.' = '.$perms.')'. // Everybody
338 'OR(pages.perms_userid = '.$this->user['uid'].' AND pages.perms_user & '.$perms.' = '.$perms.')'; // User
339 if ($this->groupList){$str.='OR(pages.perms_groupid in ('.$this->groupList.') AND pages.perms_group & '.$perms.' = '.$perms.')';} // Group (if any is set)
340 $str.=')';
341
342 // ****************
343 // getPagePermsClause-HOOK
344 // ****************
345 if (is_array($TYPO3_CONF_VARS['SC_OPTIONS']['t3lib/class.t3lib_userauthgroup.php']['getPagePermsClause'])) {
346
347 foreach($TYPO3_CONF_VARS['SC_OPTIONS']['t3lib/class.t3lib_userauthgroup.php']['getPagePermsClause'] as $_funcRef) {
348 $_params = array('currentClause' => $str, 'perms' => $perms);
349 $str = t3lib_div::callUserFunction($_funcRef, $_params, $this);
350 }
351 }
352
353 return $str;
354 } else {
355 return ' 1=0';
356 }
357 }
358
359 /**
360 * Returns a combined binary representation of the current users permissions for the page-record, $row.
361 * The perms for user, group and everybody is OR'ed together (provided that the page-owner is the user and for the groups that the user is a member of the group
362 * If the user is admin, 31 is returned (full permissions for all five flags)
363 *
364 * @param array Input page row with all perms_* fields available.
365 * @return integer Bitwise representation of the users permissions in relation to input page row, $row
366 */
367 function calcPerms($row) {
368 global $TYPO3_CONF_VARS;
369 if ($this->isAdmin()) {return 31;} // Return 31 for admin users.
370
371 $out=0;
372 if (isset($row['perms_userid']) && isset($row['perms_user']) && isset($row['perms_groupid']) && isset($row['perms_group']) && isset($row['perms_everybody']) && isset($this->groupList)) {
373 if ($this->user['uid']==$row['perms_userid']) {
374 $out|=$row['perms_user'];
375 }
376 if ($this->isMemberOfGroup($row['perms_groupid'])) {
377 $out|=$row['perms_group'];
378 }
379 $out|=$row['perms_everybody'];
380 }
381
382 // ****************
383 // CALCPERMS hook
384 // ****************
385 if (is_array($TYPO3_CONF_VARS['SC_OPTIONS']['t3lib/class.t3lib_userauthgroup.php']['calcPerms'])) {
386 foreach($TYPO3_CONF_VARS['SC_OPTIONS']['t3lib/class.t3lib_userauthgroup.php']['calcPerms'] as $_funcRef) {
387 $_params = array(
388 'row' => $row,
389 'outputPermissions' => $out
390 );
391 $out = t3lib_div::callUserFunction($_funcRef, $_params, $this);
392 }
393 }
394
395 return $out;
396 }
397
398 /**
399 * Returns true if the RTE (Rich Text Editor) can be enabled for the user
400 * Strictly this is not permissions being checked but rather a series of settings like a loaded extension, browser/client type and a configuration option in ->uc[edit_RTE]
401 * The reasons for a FALSE return can be found in $this->RTE_errors
402 *
403 * @return boolean
404 */
405 function isRTE() {
406 global $CLIENT;
407
408 // Start:
409 $this->RTE_errors = array();
410 if (!$this->uc['edit_RTE'])
411 $this->RTE_errors[] = 'RTE is not enabled for user!';
412 if (!$GLOBALS['TYPO3_CONF_VARS']['BE']['RTEenabled'])
413 $this->RTE_errors[] = 'RTE is not enabled in $TYPO3_CONF_VARS["BE"]["RTEenabled"]';
414
415
416 // Acquire RTE object:
417 $RTE = &t3lib_BEfunc::RTEgetObj();
418 if (!is_object($RTE)) {
419 $this->RTE_errors = array_merge($this->RTE_errors, $RTE);
420 }
421
422 if (!count($this->RTE_errors)) {
423 return TRUE;
424 } else {
425 return FALSE;
426 }
427 }
428
429 /**
430 * Returns true if the $value is found in the list in a $this->groupData[] index pointed to by $type (array key).
431 * Can thus be users to check for modules, exclude-fields, select/modify permissions for tables etc.
432 * If user is admin true is also returned
433 * Please see the document Inside TYPO3 for examples.
434 *
435 * @param string The type value; "webmounts", "filemounts", "pagetypes_select", "tables_select", "tables_modify", "non_exclude_fields", "modules"
436 * @param string String to search for in the groupData-list
437 * @return boolean True if permission is granted (that is, the value was found in the groupData list - or the BE_USER is "admin")
438 */
439 function check($type,$value) {
440 if (isset($this->groupData[$type])) {
441 if ($this->isAdmin() || $this->inList($this->groupData[$type],$value)) {
442 return 1;
443 }
444 }
445 }
446
447 /**
448 * Checking the authMode of a select field with authMode set
449 *
450 * @param string Table name
451 * @param string Field name (must be configured in TCA and of type "select" with authMode set!)
452 * @param string Value to evaluation (single value, must not contain any of the chars ":,|")
453 * @param string Auth mode keyword (explicitAllow, explicitDeny, individual)
454 * @return boolean True or false whether access is granted or not.
455 */
456 function checkAuthMode($table,$field,$value,$authMode) {
457 global $TCA;
458
459 // Admin users can do anything:
460 if ($this->isAdmin()) return TRUE;
461
462 // Allow all blank values:
463 if (!strcmp($value,'')) return TRUE;
464
465 // Certain characters are not allowed in the value
466 if (ereg('[:|,]',$value)) {
467 return FALSE;
468 }
469
470 // Initialize:
471 $testValue = $table.':'.$field.':'.$value;
472 $out = TRUE;
473
474 // Checking value:
475 switch((string)$authMode) {
476 case 'explicitAllow':
477 if (!$this->inList($this->groupData['explicit_allowdeny'],$testValue.':ALLOW')) {
478 $out = FALSE;
479 }
480 break;
481 case 'explicitDeny':
482 if ($this->inList($this->groupData['explicit_allowdeny'],$testValue.':DENY')) {
483 $out = FALSE;
484 }
485 break;
486 case 'individual':
487 t3lib_div::loadTCA($table);
488 if (is_array($TCA[$table]) && is_array($TCA[$table]['columns'][$field])) {
489 $items = $TCA[$table]['columns'][$field]['config']['items'];
490 if (is_array($items)) {
491 foreach($items as $iCfg) {
492 if (!strcmp($iCfg[1],$value) && $iCfg[4]) {
493 switch((string)$iCfg[4]) {
494 case 'EXPL_ALLOW':
495 if (!$this->inList($this->groupData['explicit_allowdeny'],$testValue.':ALLOW')) {
496 $out = FALSE;
497 }
498 break;
499 case 'EXPL_DENY':
500 if ($this->inList($this->groupData['explicit_allowdeny'],$testValue.':DENY')) {
501 $out = FALSE;
502 }
503 break;
504 }
505 break;
506 }
507 }
508 }
509 }
510 break;
511 }
512
513 return $out;
514 }
515
516 /**
517 * Checking if a language value (-1, 0 and >0 for sys_language records) is allowed to be edited by the user.
518 *
519 * @param integer Language value to evaluate
520 * @return boolean Returns true if the language value is allowed, otherwise false.
521 */
522 function checkLanguageAccess($langValue) {
523 if (strcmp($this->groupData['allowed_languages'],'')) { // The users language list must be non-blank - otherwise all languages are allowed.
524 $langValue = intval($langValue);
525 if ($langValue != -1 && !$this->check('allowed_languages',$langValue)) { // Language must either be explicitly allowed OR the lang Value be "-1" (all languages)
526 return FALSE;
527 }
528 }
529 return TRUE;
530 }
531
532 /**
533 * Checking if a user has editing access to a record from a $TCA table.
534 * The checks does not take page permissions and other "environmental" things into account. It only deal with record internals; If any values in the record fields disallows it.
535 * For instance languages settings, authMode selector boxes are evaluated (and maybe more in the future).
536 * It will check for workspace dependent access.
537 * The function takes an ID (integer) or row (array) as second argument.
538 *
539 * @param string Table name
540 * @param mixed If integer, then this is the ID of the record. If Array this just represents fields in the record.
541 * @param boolean Set, if testing a new (non-existing) record array. Will disable certain checks that doesn't make much sense in that context.
542 * @return boolean True if OK, otherwise false
543 */
544 function recordEditAccessInternals($table,$idOrRow,$newRecord=FALSE) {
545 global $TCA;
546
547 if (isset($TCA[$table])) {
548 t3lib_div::loadTCA($table);
549
550 // Always return true for Admin users.
551 if ($this->isAdmin()) return TRUE;
552
553 // Fetching the record if the $idOrRow variable was not an array on input:
554 if (!is_array($idOrRow)) {
555 $idOrRow = t3lib_BEfunc::getRecord($table, $idOrRow);
556 if (!is_array($idOrRow)) {
557 $this->errorMsg = 'ERROR: Record could not be fetched.';
558 return FALSE;
559 }
560 }
561
562 // Checking languages:
563 if ($TCA[$table]['ctrl']['languageField']) {
564 if (isset($idOrRow[$TCA[$table]['ctrl']['languageField']])) { // Language field must be found in input row - otherwise it does not make sense.
565 if (!$this->checkLanguageAccess($idOrRow[$TCA[$table]['ctrl']['languageField']])) {
566 $this->errorMsg = 'ERROR: Language was not allowed.';
567 return FALSE;
568 }
569 } else {
570 $this->errorMsg = 'ERROR: The "languageField" field named "'.$TCA[$table]['ctrl']['languageField'].'" was not found in testing record!';
571 return FALSE;
572 }
573 }
574
575 // Checking authMode fields:
576 if (is_array($TCA[$table]['columns'])) {
577 foreach($TCA[$table]['columns'] as $fN => $fV) {
578 if (isset($idOrRow[$fN])) { //
579 if ($fV['config']['type']=='select' && $fV['config']['authMode'] && !strcmp($fV['config']['authMode_enforce'],'strict')) {
580 if (!$this->checkAuthMode($table,$fN,$idOrRow[$fN],$fV['config']['authMode'])) {
581 $this->errorMsg = 'ERROR: authMode "'.$fV['config']['authMode'].'" failed for field "'.$fN.'" with value "'.$idOrRow[$fN].'" evaluated';
582 return FALSE;
583 }
584 }
585 }
586 }
587 }
588
589 // Checking "editlock" feature (doesn't apply to new records)
590 if (!$newRecord && $TCA[$table]['ctrl']['editlock']) {
591 if (isset($idOrRow[$TCA[$table]['ctrl']['editlock']])) {
592 if ($idOrRow[$TCA[$table]['ctrl']['editlock']]) {
593 $this->errorMsg = 'ERROR: Record was locked for editing. Only admin users can change this state.';
594 return FALSE;
595 }
596 } else {
597 $this->errorMsg = 'ERROR: The "editLock" field named "'.$TCA[$table]['ctrl']['editlock'].'" was not found in testing record!';
598 return FALSE;
599 }
600 }
601
602 // Checking record permissions
603 // THIS is where we can include a check for "perms_" fields for other records than pages...
604
605 // Finally, return true if all is well.
606 return TRUE;
607 }
608 }
609
610 /**
611 * Will check a type of permission against the compiled permission integer, $lCP, and in relation to table, $table
612 *
613 * @param integer $lCP could typically be the "compiled permissions" integer returned by ->calcPerms
614 * @param string $table is the tablename to check: If "pages" table then edit,new,delete and editcontent permissions can be checked. Other tables will be checked for "editcontent" only (and $type will be ignored)
615 * @param string For $table='pages' this can be 'edit' (2), 'new' (8 or 16), 'delete' (4), 'editcontent' (16). For all other tables this is ignored. (16 is used)
616 * @return boolean
617 * @access private
618 */
619 function isPSet($lCP,$table,$type='') {
620 if ($this->isAdmin()) return true;
621 if ($table=='pages') {
622 if ($type=='edit') return $lCP & 2;
623 if ($type=='new') return ($lCP & 8) || ($lCP & 16); // Create new page OR pagecontent
624 if ($type=='delete') return $lCP & 4;
625 if ($type=='editcontent') return $lCP & 16;
626 } else {
627 return $lCP & 16;
628 }
629 }
630
631 /**
632 * Returns true if the BE_USER is allowed to *create* shortcuts in the backend modules
633 *
634 * @return boolean
635 */
636 function mayMakeShortcut() {
637 return $this->getTSConfigVal('options.shortcutFrame') && !$this->getTSConfigVal('options.mayNotCreateEditShortcuts');
638 }
639
640 /**
641 * Checking if editing of an existing record is allowed in current workspace if that is offline.
642 * Rules for editing in offline mode:
643 * - record supports versioning and is an offline version from workspace and has the corrent stage
644 * - or record (any) is in a branch where there is a page which is a version from the workspace and where the stage is not preventing records
645 *
646 * @param string Table of record
647 * @param array Integer (record uid) or array where fields are at least: pid, t3ver_wsid, t3ver_stage (if versioningWS is set)
648 * @return string String error code, telling the failure state. FALSE=All ok
649 */
650 function workspaceCannotEditRecord($table,$recData) {
651
652 if ($this->workspace!==0) { // Only test offline spaces:
653
654 if (!is_array($recData)) {
655 $recData = t3lib_BEfunc::getRecord($table,$recData,'pid'.($GLOBALS['TCA'][$table]['ctrl']['versioningWS']?',t3ver_wsid,t3ver_stage':''));
656 }
657
658 if (is_array($recData)) {
659 if ((int)$recData['pid']===-1) { // We are testing a "version" (identified by a pid of -1): it can be edited provided that workspace matches and versioning is enabled for the table.
660 if (!$GLOBALS['TCA'][$table]['ctrl']['versioningWS']) { // No versioning, basic error, inconsistency even! Such records should not have a pid of -1!
661 return 'Versioning disabled for table';
662 } elseif ((int)$recData['t3ver_wsid']!==$this->workspace) { // So does workspace match?
663 return 'Workspace ID of record didn\'t match current workspace';
664 } else { // So what about the stage of the version, does that allow editing for this user?
665 return $this->workspaceCheckStageForCurrent($recData['t3ver_stage']) ? FALSE : 'Record stage "'.$recData['t3ver_stage'].'" and users access level did not allow for editing';
666 }
667 } else { // We are testing a "live" record:
668 if ($res = $this->workspaceAllowLiveRecordsInPID($recData['pid'], $table)) { // For "Live" records, check that PID for table allows editing
669 // Live records are OK in this branch, but what about the stage of branch point, if any:
670 return $res>0 ? FALSE : 'Stage for versioning root point and users access level did not allow for editing'; // OK
671 } else { // If not offline and not in versionized branch, output error:
672 return 'Online record was not in versionized branch!';
673 }
674 }
675 } else return 'No record';
676 } else {
677 return FALSE; // OK because workspace is 0
678 }
679 }
680
681 /**
682 * Evaluates if a user is allowed to edit the offline version
683 *
684 * @param string Table of record
685 * @param array Integer (record uid) or array where fields are at least: pid, t3ver_wsid, t3ver_stage (if versioningWS is set)
686 * @return string String error code, telling the failure state. FALSE=All ok
687 * @see workspaceCannotEditRecord()
688 */
689 function workspaceCannotEditOfflineVersion($table,$recData) {
690 if ($GLOBALS['TCA'][$table]['ctrl']['versioningWS']) {
691
692 if (!is_array($recData)) {
693 $recData = t3lib_BEfunc::getRecord($table,$recData,'uid,pid,t3ver_wsid,t3ver_stage');
694 }
695 if (is_array($recData)) {
696 if ((int)$recData['pid']===-1) {
697 return $this->workspaceCannotEditRecord($table,$recData);
698 } else return 'Not an offline version';
699 } else return 'No record';
700 } else return 'Table does not support versioning.';
701 }
702
703 /**
704 * Check if "live" records from $table may be created or edited in this PID.
705 * If the answer is FALSE it means the only valid way to create or edit records in the PID is by versioning
706 * If the answer is 1 or 2 it means it is OK to create a record, if -1 it means that it is OK in terms of versioning because the element was within a versionized branch but NOT ok in terms of the state the root point had!
707 *
708 * @param integer PID value to check for.
709 * @param string Table name
710 * @return mixed Returns FALSE if a live record cannot be created and must be versionized in order to do so. 2 means a) Workspace is "Live" or workspace allows "live edit" of records from non-versionized tables (and the $table is not versionizable). 1 and -1 means the pid is inside a versionized branch where -1 means that the branch-point did NOT allow a new record according to its state.
711 */
712 function workspaceAllowLiveRecordsInPID($pid, $table) {
713
714 // Always for Live workspace AND if live-edit is enabled and tables are completely without versioning it is ok as well.
715 if ($this->workspace===0 || ($this->workspaceRec['live_edit'] && !$GLOBALS['TCA'][$table]['ctrl']['versioningWS'])) {
716 return 2; // OK to create for this table.
717 } elseif (t3lib_BEfunc::isPidInVersionizedBranch($pid, $table)) { // Check if records from $table can be created with this PID: Either if inside "branch" versioning type or a "versioning_followPages" table on a "page" versioning type.
718 // Now, check what the stage of that "page" or "branch" version type is:
719 $stage = t3lib_BEfunc::isPidInVersionizedBranch($pid, $table, TRUE);
720 return $this->workspaceCheckStageForCurrent($stage) ? 1 : -1;
721 } else {
722 return FALSE; // If the answer is FALSE it means the only valid way to create or edit records in the PID is by versioning
723 }
724 }
725
726 /**
727 * Evaluates if a record from $table can be created in $pid
728 *
729 * @param integer Page id. This value must be the _ORIG_uid if available: So when you have pages versionized as "page" or "element" you must supply the id of the page version in the workspace!
730 * @param string Table name
731 * @return boolean TRUE if OK.
732 */
733 function workspaceCreateNewRecord($pid, $table) {
734 if ($res = $this->workspaceAllowLiveRecordsInPID($pid,$table)) { // If LIVE records cannot be created in the current PID due to workspace restrictions, prepare creation of placeholder-record
735 if ($res<0) {
736 return FALSE; // Stage for versioning root point and users access level did not allow for editing
737 }
738 } elseif (!$GLOBALS['TCA'][$table]['ctrl']['versioningWS']) { // So, if no live records were allowed, we have to create a new version of this record:
739 return FALSE;
740 }
741 return TRUE;
742 }
743
744 /**
745 * Evaluates if auto creation of a version of a record is allowed.
746 *
747 * @param string Table of the record
748 * @param integer UID of record
749 * @param integer PID of record
750 * @return boolean TRUE if ok.
751 */
752 function workspaceAllowAutoCreation($table,$id,$recpid) {
753 // Auto-creation of version: In offline workspace, test if versioning is enabled and look for workspace version of input record. If there is no versionized record found we will create one and save to that.
754 if ($this->workspace!==0 // Only in draft workspaces
755 && !$this->workspaceRec['disable_autocreate'] // Auto-creation must not be disabled.
756 && $GLOBALS['TCA'][$table]['ctrl']['versioningWS'] // Table must be versionizable
757 && $recpid >= 0 // The PID of the record must NOT be -1 or less (would indicate that it already was a version!)
758 && !t3lib_BEfunc::getWorkspaceVersionOfRecord($this->workspace, $table, $id, 'uid') // There must be no existing version of this record in workspace.
759 && !t3lib_BEfunc::isPidInVersionizedBranch($recpid, $table)) { // PID must NOT be in a versionized branch either
760 return TRUE;
761 }
762 }
763
764 /**
765 * Checks if an element stage allows access for the user in the current workspace
766 * In workspaces 0 (Live) and -1 (Default draft) access is always granted for any stage.
767 * Admins are always allowed.
768 *
769 * @param integer Stage id from an element: -1,0 = editing, 1 = reviewer, >1 = owner
770 * @return boolean TRUE if user is allowed access
771 */
772 function workspaceCheckStageForCurrent($stage) {
773 if ($this->isAdmin()) return TRUE;
774
775 if ($this->workspace>0) {
776 $stat = $this->checkWorkspaceCurrent();
777 if (($stage<=0 && $stat['_ACCESS']==='member') ||
778 ($stage<=1 && $stat['_ACCESS']==='reviewer') ||
779 ($stat['_ACCESS']==='owner')) {
780 return TRUE; // OK for these criteria
781 }
782 } else return TRUE; // Always OK for live and draft workspaces.
783 }
784
785 /**
786 * Returns TRUE if the user has access to publish content from the workspace ID given.
787 * Admin-users are always granted access to do this
788 * If the workspace ID is 0 (live) all users have access also
789 * If -1 (draft workspace) TRUE is returned if the user has access to the Live workspace
790 * For custom workspaces it depends on whether the user is owner OR like with draft workspace if the user has access to Live workspace.
791 *
792 * @param integer Workspace UID; -1,0,1+
793 * @return boolean Returns TRUE if the user has access to publish content from the workspace ID given.
794 */
795 function workspacePublishAccess($wsid) {
796 if ($this->isAdmin()) return TRUE;
797
798 // If no access to workspace, of course you cannot publish!
799 $retVal = FALSE;
800
801 $wsAccess = $this->checkWorkspace($wsid);
802 if ($wsAccess) {
803 switch($wsAccess['uid']) {
804 case 0: // Live workspace
805 $retVal = TRUE; // If access to Live workspace, no problem.
806 break;
807 case -1: // Default draft workspace
808 $retVal = $this->checkWorkspace(0) ? TRUE : FALSE; // If access to Live workspace, no problem.
809 break;
810 default: // Custom workspace
811 $retVal = $wsAccess['_ACCESS'] === 'owner' || ($this->checkWorkspace(0) && !($wsAccess['publish_access']&2)); // Either be an adminuser OR have access to online workspace which is OK as well as long as publishing access is not limited by workspace option.
812 break;
813 }
814 }
815 return $retVal;
816 }
817
818 /**
819 * Workspace swap-mode access?
820 *
821 * @return boolean Returns TRUE if records can be swapped in the current workspace, otherwise false
822 */
823 function workspaceSwapAccess() {
824 if ($this->workspace>0 && (int)$this->workspaceRec['swap_modes']===2) {
825 return FALSE;
826 } else return TRUE;
827 }
828
829 /**
830 * Workspace Versioning type access?
831 *
832 * @param integer Versioning type to evaluation: -1, 0, >1
833 * @return boolean TRUE if OK
834 */
835 function workspaceVersioningTypeAccess($type) {
836 $retVal = FALSE;
837
838 if ($this->workspace>0 && !$this->isAdmin()) {
839 $stat = $this->checkWorkspaceCurrent();
840 if ($stat['_ACCESS']!=='owner') {
841
842 $type = t3lib_div::intInRange($type,-1);
843 switch((int)$type) {
844 case -1:
845 $retVal = $this->workspaceRec['vtypes']&1 ? FALSE : TRUE;
846 break;
847 case 0:
848 $retVal = $this->workspaceRec['vtypes']&2 ? FALSE : TRUE;
849 break;
850 default:
851 $retVal = $this->workspaceRec['vtypes']&4 ? FALSE : TRUE;
852 break;
853 }
854 } else $retVal = TRUE;
855 } else $retVal = TRUE;
856
857 return $retVal;
858 }
859
860 /**
861 * Finding "closest" versioning type, used for creation of new records.
862 *
863 * @param integer Versioning type to evaluation: -1, 0, >1
864 * @return integer Returning versioning type
865 */
866 function workspaceVersioningTypeGetClosest($type) {
867 $type = t3lib_div::intInRange($type,-1);
868
869 if ($this->workspace>0) {
870 switch((int)$type) {
871 case -1:
872 $type = -1;
873 break;
874 case 0:
875 $type = $this->workspaceVersioningTypeAccess($type) ? $type : -1;
876 break;
877 default:
878 $type = $this->workspaceVersioningTypeAccess($type) ? $type : ($this->workspaceVersioningTypeAccess(0) ? 0 : -1);
879 break;
880 }
881 }
882 return $type;
883 }
884
885
886
887
888
889
890
891
892
893
894 /*************************************
895 *
896 * Miscellaneous functions
897 *
898 *************************************/
899
900 /**
901 * Returns the value/properties of a TS-object as given by $objectString, eg. 'options.dontMountAdminMounts'
902 * Nice (general!) function for returning a part of a TypoScript array!
903 *
904 * @param string Pointer to an "object" in the TypoScript array, fx. 'options.dontMountAdminMounts'
905 * @param array Optional TSconfig array: If array, then this is used and not $this->userTS. If not array, $this->userTS is used.
906 * @return array An array with two keys, "value" and "properties" where "value" is a string with the value of the objectsting and "properties" is an array with the properties of the objectstring.
907 * @params array An array with the TypoScript where the $objectString is located. If this argument is not an array, then internal ->userTS (User TSconfig for the current BE_USER) will be used instead.
908 */
909 function getTSConfig($objectString,$config='') {
910 if (!is_array($config)) {
911 $config=$this->userTS; // Getting Root-ts if not sent
912 }
913 $TSConf=array();
914 $parts = explode('.',$objectString,2);
915 $key = $parts[0];
916 if (trim($key)) {
917 if (count($parts)>1 && trim($parts[1])) {
918 // Go on, get the next level
919 if (is_array($config[$key.'.'])) $TSConf = $this->getTSConfig($parts[1],$config[$key.'.']);
920 } else {
921 $TSConf['value']=$config[$key];
922 $TSConf['properties']=$config[$key.'.'];
923 }
924 }
925 return $TSConf;
926 }
927
928 /**
929 * Returns the "value" of the $objectString from the BE_USERS "User TSconfig" array
930 *
931 * @param string Object string, eg. "somestring.someproperty.somesubproperty"
932 * @return string The value for that object string (object path)
933 * @see getTSConfig()
934 */
935 function getTSConfigVal($objectString) {
936 $TSConf = $this->getTSConfig($objectString);
937 return $TSConf['value'];
938 }
939
940 /**
941 * Returns the "properties" of the $objectString from the BE_USERS "User TSconfig" array
942 *
943 * @param string Object string, eg. "somestring.someproperty.somesubproperty"
944 * @return array The properties for that object string (object path) - if any
945 * @see getTSConfig()
946 */
947 function getTSConfigProp($objectString) {
948 $TSConf = $this->getTSConfig($objectString);
949 return $TSConf['properties'];
950 }
951
952 /**
953 * Returns true if $item is in $in_list
954 *
955 * @param string Comma list with items, no spaces between items!
956 * @param string The string to find in the list of items
957 * @return string Boolean
958 */
959 function inList($in_list,$item) {
960 return strstr(','.$in_list.',', ','.$item.',');
961 }
962
963 /**
964 * Returns an array with the webmounts.
965 * If no webmounts, and empty array is returned.
966 * NOTICE: Deleted pages WILL NOT be filtered out! So if a mounted page has been deleted it is STILL coming out as a webmount. This is not checked due to performance.
967 *
968 * @return array
969 */
970 function returnWebmounts() {
971 return (string)($this->groupData['webmounts'])!='' ? explode(',',$this->groupData['webmounts']) : Array();
972 }
973
974 /**
975 * Returns an array with the filemounts for the user. Each filemount is represented with an array of a "name", "path" and "type".
976 * If no filemounts an empty array is returned.
977 *
978 * @return array
979 */
980 function returnFilemounts() {
981 return $this->groupData['filemounts'];
982 }
983
984 /**
985 * Returns true or false, depending if an alert popup (a javascript confirmation) should be shown
986 * call like $GLOBALS['BE_USER']->jsConfirmation($BITMASK)
987 *
988 * 1 - typeChange
989 * 2 - copy/move/paste
990 * 4 - delete
991 * 8 - frontend editing
992 * 128 - other (not used yet)
993 *
994 * @param integer Bitmask
995 * @return boolean true if the confirmation should be shown
996 */
997 function jsConfirmation($bitmask) {
998 $alertPopup = $GLOBALS['BE_USER']->getTSConfig('options.alertPopups');
999 if (empty($alertPopup['value'])) {
1000 $alertPopup = 255; // default: show all warnings
1001 } else {
1002 $alertPopup = (int)$alertPopup['value'];
1003 }
1004 if(($alertPopup&$bitmask) == $bitmask) { // show confirmation
1005 return 1;
1006 } else { // don't show confirmation
1007 return 0;
1008 }
1009 }
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019 /*************************************
1020 *
1021 * Authentication methods
1022 *
1023 *************************************/
1024
1025
1026 /**
1027 * Initializes a lot of stuff like the access-lists, database-mountpoints and filemountpoints
1028 * This method is called by ->backendCheckLogin() (from extending class t3lib_beuserauth) if the backend user login has verified OK.
1029 * Generally this is required initialization of a backend user.
1030 *
1031 * @return void
1032 * @access private
1033 * @see t3lib_TSparser
1034 */
1035 function fetchGroupData() {
1036 if ($this->user['uid']) {
1037
1038 // Get lists for the be_user record and set them as default/primary values.
1039 $this->dataLists['modList'] = $this->user['userMods']; // Enabled Backend Modules
1040 $this->dataLists['allowed_languages'] = $this->user['allowed_languages']; // Add Allowed Languages
1041 $this->dataLists['workspace_perms'] = $this->user['workspace_perms']; // Set user value for workspace permissions.
1042 $this->dataLists['webmount_list'] = $this->user['db_mountpoints']; // Database mountpoints
1043 $this->dataLists['filemount_list'] = $this->user['file_mountpoints']; // File mountpoints
1044
1045 // Setting default User TSconfig:
1046 $this->TSdataArray[]=$this->addTScomment('From $GLOBALS["TYPO3_CONF_VARS"]["BE"]["defaultUserTSconfig"]:').
1047 $GLOBALS['TYPO3_CONF_VARS']['BE']['defaultUserTSconfig'];
1048
1049 // Default TSconfig for admin-users
1050 if ($this->isAdmin()) {
1051 $this->TSdataArray[]=$this->addTScomment('"admin" user presets:').'
1052 admPanel.enable.all = 1
1053 options.shortcutFrame = 1
1054 ';
1055 if (t3lib_extMgm::isLoaded('sys_note')) {
1056 $this->TSdataArray[]='
1057 // Setting defaults for sys_note author / email...
1058 TCAdefaults.sys_note.author = '.$this->user['realName'].'
1059 TCAdefaults.sys_note.email = '.$this->user['email'].'
1060 ';
1061 }
1062 }
1063
1064 // FILE MOUNTS:
1065 // Admin users has the base fileadmin dir mounted
1066 if ($this->isAdmin() && $GLOBALS['TYPO3_CONF_VARS']['BE']['fileadminDir']) {
1067 $this->addFileMount($GLOBALS['TYPO3_CONF_VARS']['BE']['fileadminDir'], '', PATH_site.$GLOBALS['TYPO3_CONF_VARS']['BE']['fileadminDir'], 0, '');
1068 }
1069
1070 // If userHomePath is set, we attempt to mount it
1071 if ($GLOBALS['TYPO3_CONF_VARS']['BE']['userHomePath']) {
1072 // First try and mount with [uid]_[username]
1073 $didMount=$this->addFileMount($this->user['username'], '',$GLOBALS['TYPO3_CONF_VARS']['BE']['userHomePath'].$this->user['uid'].'_'.$this->user['username'].$GLOBALS['TYPO3_CONF_VARS']['BE']['userUploadDir'], 0, 'user');
1074 if (!$didMount) {
1075 // If that failed, try and mount with only [uid]
1076 $this->addFileMount($this->user['username'], '', $GLOBALS['TYPO3_CONF_VARS']['BE']['userHomePath'].$this->user['uid'].$GLOBALS['TYPO3_CONF_VARS']['BE']['userUploadDir'], 0, 'user');
1077 }
1078 }
1079
1080 // BE_GROUPS:
1081 // Get the groups...
1082 # $grList = t3lib_BEfunc::getSQLselectableList($this->user[$this->usergroup_column],$this->usergroup_table,$this->usergroup_table);
1083 $grList = $GLOBALS['TYPO3_DB']->cleanIntList($this->user[$this->usergroup_column]); // 240203: Since the group-field never contains any references to groups with a prepended table name we think it's safe to just intExplode and re-implode - which should be much faster than the other function call.
1084 if ($grList) {
1085 // Fetch groups will add a lot of information to the internal arrays: modules, accesslists, TSconfig etc. Refer to fetchGroups() function.
1086 $this->fetchGroups($grList);
1087 }
1088
1089 // Add the TSconfig for this specific user:
1090 $this->TSdataArray[] = $this->addTScomment('USER TSconfig field').$this->user['TSconfig'];
1091 // Check include lines.
1092 $this->TSdataArray = t3lib_TSparser::checkIncludeLines_array($this->TSdataArray);
1093
1094 // Parsing the user TSconfig (or getting from cache)
1095 $this->userTS_text = implode(chr(10).'[GLOBAL]'.chr(10),$this->TSdataArray); // Imploding with "[global]" will make sure that non-ended confinements with braces are ignored.
1096 $hash = md5('userTS:'.$this->userTS_text);
1097 $cachedContent = t3lib_BEfunc::getHash($hash,0);
1098 if (isset($cachedContent) && !$this->userTS_dontGetCached) {
1099 $this->userTS = unserialize($cachedContent);
1100 } else {
1101 $parseObj = t3lib_div::makeInstance('t3lib_TSparser');
1102 $parseObj->parse($this->userTS_text);
1103 $this->userTS = $parseObj->setup;
1104 t3lib_BEfunc::storeHash($hash,serialize($this->userTS),'BE_USER_TSconfig');
1105 // Update UC:
1106 $this->userTSUpdated=1;
1107 }
1108
1109 // Processing webmounts
1110 if ($this->isAdmin() && !$this->getTSConfigVal('options.dontMountAdminMounts')) { // Admin's always have the root mounted
1111 $this->dataLists['webmount_list']='0,'.$this->dataLists['webmount_list'];
1112 }
1113
1114 // Processing filemounts
1115 $this->dataLists['filemount_list'] = t3lib_div::uniqueList($this->dataLists['filemount_list']);
1116 if ($this->dataLists['filemount_list']) {
1117 $res = $GLOBALS['TYPO3_DB']->exec_SELECTquery('*', 'sys_filemounts', 'deleted=0 AND hidden=0 AND pid=0 AND uid IN ('.$this->dataLists['filemount_list'].')');
1118 while ($row = $GLOBALS['TYPO3_DB']->sql_fetch_assoc($res)) {
1119 $this->addFileMount($row['title'], $row['path'], $row['path'], $row['base']?1:0, '');
1120 }
1121 }
1122
1123 // The lists are cleaned for duplicates
1124 $this->groupData['webmounts'] = t3lib_div::uniqueList($this->dataLists['webmount_list']);
1125 $this->groupData['pagetypes_select'] = t3lib_div::uniqueList($this->dataLists['pagetypes_select']);
1126 $this->groupData['tables_select'] = t3lib_div::uniqueList($this->dataLists['tables_modify'].','.$this->dataLists['tables_select']);
1127 $this->groupData['tables_modify'] = t3lib_div::uniqueList($this->dataLists['tables_modify']);
1128 $this->groupData['non_exclude_fields'] = t3lib_div::uniqueList($this->dataLists['non_exclude_fields']);
1129 $this->groupData['explicit_allowdeny'] = t3lib_div::uniqueList($this->dataLists['explicit_allowdeny']);
1130 $this->groupData['allowed_languages'] = t3lib_div::uniqueList($this->dataLists['allowed_languages']);
1131 $this->groupData['custom_options'] = t3lib_div::uniqueList($this->dataLists['custom_options']);
1132 $this->groupData['modules'] = t3lib_div::uniqueList($this->dataLists['modList']);
1133 $this->groupData['workspace_perms'] = $this->dataLists['workspace_perms'];
1134
1135 // populating the $this->userGroupsUID -array with the groups in the order in which they were LAST included.!!
1136 $this->userGroupsUID = array_reverse(array_unique(array_reverse($this->includeGroupArray)));
1137
1138 // Finally this is the list of group_uid's in the order they are parsed (including subgroups!) and without duplicates (duplicates are presented with their last entrance in the list, which thus reflects the order of the TypoScript in TSconfig)
1139 $this->groupList = implode(',',$this->userGroupsUID);
1140 $this->setCachedList($this->groupList);
1141
1142 // Checking read access to webmounts:
1143 if (trim($this->groupData['webmounts'])!=='') {
1144 $webmounts = explode(',',$this->groupData['webmounts']); // Explode mounts
1145 $MProws = $GLOBALS['TYPO3_DB']->exec_SELECTgetRows('uid', 'pages', 'deleted=0 AND uid IN ('.$this->groupData['webmounts'].') AND '.$this->getPagePermsClause(1),'','','','uid'); // Selecting all webmounts with permission clause for reading
1146 foreach($webmounts as $idx => $mountPointUid) {
1147 if ($mountPointUid>0 && !isset($MProws[$mountPointUid])) { // If the mount ID is NOT found among selected pages, unset it:
1148 unset($webmounts[$idx]);
1149 }
1150 }
1151 $this->groupData['webmounts'] = implode(',',$webmounts); // Implode mounts in the end.
1152 }
1153
1154 // Setting up workspace situation (after webmounts are processed!):
1155 $this->workspaceInit();
1156 }
1157 }
1158
1159 /**
1160 * Fetches the group records, subgroups and fills internal arrays.
1161 * Function is called recursively to fetch subgroups
1162 *
1163 * @param string Commalist of be_groups uid numbers
1164 * @param string List of already processed be_groups-uids so the function will not fall into a eternal recursion.
1165 * @return void
1166 * @access private
1167 */
1168 function fetchGroups($grList,$idList='') {
1169 global $TYPO3_CONF_VARS;
1170
1171 // Fetching records of the groups in $grList (which are not blocked by lockedToDomain either):
1172 $lockToDomain_SQL = ' AND (lockToDomain=\'\' OR lockToDomain=\''.t3lib_div::getIndpEnv('HTTP_HOST').'\')';
1173 $whereSQL = 'deleted=0 AND hidden=0 AND pid=0 AND uid IN ('.$grList.')'.$lockToDomain_SQL;
1174
1175 // Hook for manipulation of the WHERE sql sentence which controls which BE-groups are included
1176 if (is_array ($GLOBALS['TYPO3_CONF_VARS']['SC_OPTIONS']['t3lib/class.t3lib_userauthgroup.php']['fetchGroupQuery'])) {
1177 foreach ($GLOBALS['TYPO3_CONF_VARS']['SC_OPTIONS']['t3lib/class.t3lib_userauthgroup.php']['fetchGroupQuery'] as $classRef) {
1178 $hookObj = &t3lib_div::getUserObj($classRef);
1179 if(method_exists($hookObj,'fetchGroupQuery_processQuery')){
1180 $whereSQL = $hookObj->fetchGroupQuery_processQuery($this, $grList, $idList, $whereSQL);
1181 }
1182 }
1183 }
1184
1185 $res = $GLOBALS['TYPO3_DB']->exec_SELECTquery('*', $this->usergroup_table, $whereSQL);
1186
1187 // The userGroups array is filled
1188 while ($row = $GLOBALS['TYPO3_DB']->sql_fetch_assoc($res)) {
1189 $this->userGroups[$row['uid']] = $row;
1190 }
1191
1192 // Traversing records in the correct order
1193 $include_staticArr = t3lib_div::intExplode(',',$grList);
1194 reset($include_staticArr);
1195 while(list(,$uid)=each($include_staticArr)) { // traversing list
1196
1197 // Get row:
1198 $row=$this->userGroups[$uid];
1199 if (is_array($row) && !t3lib_div::inList($idList,$uid)) { // Must be an array and $uid should not be in the idList, because then it is somewhere previously in the grouplist
1200
1201 // Include sub groups
1202 if (trim($row['subgroup'])) {
1203 $theList = implode(',',t3lib_div::intExplode(',',$row['subgroup'])); // Make integer list
1204 $this->fetchGroups($theList, $idList.','.$uid); // Call recursively, pass along list of already processed groups so they are not recursed again.
1205 }
1206 // Add the group uid, current list, TSconfig to the internal arrays.
1207 $this->includeGroupArray[]=$uid;
1208 $this->includeHierarchy[]=$idList;
1209 $this->TSdataArray[] = $this->addTScomment('Group "'.$row['title'].'" ['.$row['uid'].'] TSconfig field:').$row['TSconfig'];
1210
1211 // Mount group database-mounts
1212 if (($this->user['options']&1) == 1) { $this->dataLists['webmount_list'].= ','.$row['db_mountpoints']; }
1213
1214 // Mount group file-mounts
1215 if (($this->user['options']&2) == 2) { $this->dataLists['filemount_list'].= ','.$row['file_mountpoints']; }
1216
1217 // Mount group home-dirs
1218 if (($this->user['options']&2) == 2) {
1219 // If groupHomePath is set, we attempt to mount it
1220 if ($GLOBALS['TYPO3_CONF_VARS']['BE']['groupHomePath']) {
1221 $this->addFileMount($row['title'], '', $GLOBALS['TYPO3_CONF_VARS']['BE']['groupHomePath'].$row['uid'], 0, 'group');
1222 }
1223 }
1224
1225 // The lists are made: groupMods, tables_select, tables_modify, pagetypes_select, non_exclude_fields, explicit_allowdeny, allowed_languages, custom_options
1226 if ($row['inc_access_lists']==1) {
1227 $this->dataLists['modList'].= ','.$row['groupMods'];
1228 $this->dataLists['tables_select'].= ','.$row['tables_select'];
1229 $this->dataLists['tables_modify'].= ','.$row['tables_modify'];
1230 $this->dataLists['pagetypes_select'].= ','.$row['pagetypes_select'];
1231 $this->dataLists['non_exclude_fields'].= ','.$row['non_exclude_fields'];
1232 $this->dataLists['explicit_allowdeny'].= ','.$row['explicit_allowdeny'];
1233 $this->dataLists['allowed_languages'].= ','.$row['allowed_languages'];
1234 $this->dataLists['custom_options'].= ','.$row['custom_options'];
1235 }
1236
1237 // Setting workspace permissions:
1238 $this->dataLists['workspace_perms'] |= $row['workspace_perms'];
1239
1240 // If this function is processing the users OWN group-list (not subgroups) AND if the ->firstMainGroup is not set, then the ->firstMainGroup will be set.
1241 if (!strcmp($idList,'') && !$this->firstMainGroup) {
1242 $this->firstMainGroup=$uid;
1243 }
1244 }
1245 }
1246
1247 // ****************
1248 // HOOK: fetchGroups_postProcessing
1249 // ****************
1250 if (is_array($TYPO3_CONF_VARS['SC_OPTIONS']['t3lib/class.t3lib_userauthgroup.php']['fetchGroups_postProcessing'])) {
1251 foreach($TYPO3_CONF_VARS['SC_OPTIONS']['t3lib/class.t3lib_userauthgroup.php']['fetchGroups_postProcessing'] as $_funcRef) {
1252 $_params = array();
1253 t3lib_div::callUserFunction($_funcRef, $_params, $this);
1254 }
1255 }
1256 }
1257
1258 /**
1259 * Updates the field be_users.usergroup_cached_list if the groupList of the user has changed/is different from the current list.
1260 * The field "usergroup_cached_list" contains the list of groups which the user is a member of. After authentication (where these functions are called...) one can depend on this list being a representation of the exact groups/subgroups which the BE_USER has membership with.
1261 *
1262 * @param string The newly compiled group-list which must be compared with the current list in the user record and possibly stored if a difference is detected.
1263 * @return void
1264 * @access private
1265 */
1266 function setCachedList($cList) {
1267 if ((string)$cList != (string)$this->user['usergroup_cached_list']) {
1268 $GLOBALS['TYPO3_DB']->exec_UPDATEquery('be_users', 'uid='.intval($this->user['uid']), array('usergroup_cached_list' => $cList));
1269 }
1270 }
1271
1272 /**
1273 * Adds a filemount to the users array of filemounts, $this->groupData['filemounts'][hash_key] = Array ('name'=>$name, 'path'=>$path, 'type'=>$type);
1274 * Is a part of the authentication proces of the user.
1275 * A final requirement for a path being mounted is that a) it MUST return true on is_dir(), b) must contain either PATH_site+'fileadminDir' OR 'lockRootPath' - if lockRootPath is set - as first part of string!
1276 * Paths in the mounted information will always be absolute and have a trailing slash.
1277 *
1278 * @param string $title will be the (root)name of the filemount in the folder tree
1279 * @param string $altTitle will be the (root)name of the filemount IF $title is not true (blank or zero)
1280 * @param string $path is the path which should be mounted. Will accept backslash in paths on windows servers (will substituted with forward slash). The path should be 1) relative to TYPO3_CONF_VARS[BE][fileadminDir] if $webspace is set, otherwise absolute.
1281 * @param boolean If $webspace is set, the $path is relative to 'fileadminDir' in TYPO3_CONF_VARS, otherwise $path is absolute. 'fileadminDir' must be set to allow mounting of relative paths.
1282 * @param string Type of filemount; Can be blank (regular) or "user" / "group" (for user and group filemounts presumably). Probably sets the icon first and foremost.
1283 * @return boolean Returns "1" if the requested filemount was mounted, otherwise no return value.
1284 * @access private
1285 */
1286 function addFileMount($title, $altTitle, $path, $webspace, $type) {
1287 // Return false if fileadminDir is not set and we try to mount a relative path
1288 if ($webspace && !$GLOBALS['TYPO3_CONF_VARS']['BE']['fileadminDir']) return false;
1289
1290 // Trimming and pre-processing
1291 $path=trim($path);
1292 if ($this->OS=='WIN') { // with WINDOWS convert backslash to slash!!
1293 $path=str_replace('\\','/',$path);
1294 }
1295 // If the path is true and validates as a valid path string:
1296 if ($path && t3lib_div::validPathStr($path)) {
1297 // normalize path: remove leading '/' and './', and trailing '/' and '/.'
1298 $path=trim($path);
1299 $path=preg_replace('#^\.?/|/\.?$#','',$path);
1300
1301 if ($path) { // there must be some chars in the path
1302 $fdir=PATH_site.$GLOBALS['TYPO3_CONF_VARS']['BE']['fileadminDir']; // fileadmin dir, absolute
1303 if ($webspace) {
1304 $path=$fdir.$path; // PATH_site + fileadmin dir is prepended
1305 } else {
1306 if ($this->OS!='WIN') { // with WINDOWS no prepending!!
1307 $path='/'.$path; // root-level is the start...
1308 }
1309 }
1310 $path.='/';
1311
1312 // We now have a path with slash after and slash before (if unix)
1313 if (@is_dir($path) &&
1314 (($GLOBALS['TYPO3_CONF_VARS']['BE']['lockRootPath'] && t3lib_div::isFirstPartOfStr($path,$GLOBALS['TYPO3_CONF_VARS']['BE']['lockRootPath'])) || t3lib_div::isFirstPartOfStr($path,$fdir))) {
1315 // Alternative title?
1316 $name = $title ? $title : $altTitle;
1317 // Adds the filemount. The same filemount with same name, type and path cannot be set up twice because of the hash string used as key.
1318 $this->groupData['filemounts'][md5($name.'|'.$path.'|'.$type)] = Array('name'=>$name, 'path'=>$path, 'type'=>$type);
1319 // Return true - went well, success!
1320 return 1;
1321 }
1322 }
1323 }
1324 }
1325
1326 /**
1327 * Creates a TypoScript comment with the string text inside.
1328 *
1329 * @param string The text to wrap in comment prefixes and delimiters.
1330 * @return string TypoScript comment with the string text inside.
1331 */
1332 function addTScomment($str) {
1333 $delimiter = '# ***********************************************';
1334
1335 $out = $delimiter.chr(10);
1336 $lines = t3lib_div::trimExplode(chr(10),$str);
1337 foreach($lines as $v) {
1338 $out.= '# '.$v.chr(10);
1339 }
1340 $out.= $delimiter.chr(10);
1341 return $out;
1342 }
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355 /************************************
1356 *
1357 * Workspaces
1358 *
1359 ************************************/
1360
1361 /**
1362 * Initializing workspace.
1363 * Called from within this function, see fetchGroupData()
1364 *
1365 * @return void
1366 * @see fetchGroupData()
1367 */
1368 function workspaceInit() {
1369
1370 // Initializing workspace by evaluating and setting the workspace, possibly updating it in the user record!
1371 $this->setWorkspace($this->user['workspace_id']);
1372
1373 // Setting up the db mount points of the (custom) workspace, if any:
1374 if ($this->workspace>0 && trim($this->workspaceRec['db_mountpoints'])!=='') {
1375
1376 // Initialize:
1377 $newMounts = array();
1378 $readPerms = '1=1'; // Notice: We cannot call $this->getPagePermsClause(1); as usual because the group-list is not available at this point. But bypassing is fine because all we want here is check if the workspace mounts are inside the current webmounts rootline. The actual permission checking on page level is done elsewhere as usual anyway before the page tree is rendered.
1379
1380 // Traverse mount points of the
1381 $mountPoints = t3lib_div::intExplode(',',$this->workspaceRec['db_mountpoints']);
1382 foreach($mountPoints as $mpId) {
1383 if ($this->isInWebMount($mpId,$readPerms)) {
1384 $newMounts[] = $mpId;
1385 }
1386 }
1387
1388 // Re-insert webmounts:
1389 $this->groupData['webmounts'] = implode(',',array_unique($newMounts));
1390 }
1391
1392 // Setting up the file mount points of the (custom) workspace, if any:
1393 if ($this->workspace!==0) $this->groupData['filemounts'] = array();
1394 if ($this->workspace>0 && trim($this->workspaceRec['file_mountpoints'])!=='') {
1395
1396 // Processing filemounts
1397 $res = $GLOBALS['TYPO3_DB']->exec_SELECTquery('*', 'sys_filemounts', 'deleted=0 AND hidden=0 AND pid=0 AND uid IN ('.$GLOBALS['TYPO3_DB']->cleanIntList($this->workspaceRec['file_mountpoints']).')');
1398 while ($row = $GLOBALS['TYPO3_DB']->sql_fetch_assoc($res)) {
1399 $this->addFileMount($row['title'], $row['path'], $row['path'], $row['base']?1:0, '');
1400 }
1401 }
1402 }
1403
1404 /**
1405 * Checking if a workspace is allowed for backend user
1406 *
1407 * @param mixed If integer, workspace record is looked up, if array it is seen as a Workspace record with at least uid, title, members and adminusers columns. Can be faked for workspaces uid 0 and -1 (online and offline)
1408 * @param string List of fields to select. Default fields are: uid,title,adminusers,members,reviewers,publish_access,stagechg_notification
1409 * @return array TRUE if access. Output will also show how access was granted. Admin users will have a true output regardless of input.
1410 */
1411 function checkWorkspace($wsRec,$fields='uid,title,adminusers,members,reviewers,publish_access,stagechg_notification') {
1412 $retVal = FALSE;
1413
1414 // If not array, look up workspace record:
1415 if (!is_array($wsRec)) {
1416 switch((string)$wsRec) {
1417 case '0':
1418 case '-1':
1419 $wsRec = array('uid' => $wsRec);
1420 break;
1421 default:
1422 list($wsRec) = $GLOBALS['TYPO3_DB']->exec_SELECTgetRows(
1423 $fields,
1424 'sys_workspace',
1425 'pid=0 AND uid='.intval($wsRec).
1426 t3lib_BEfunc::deleteClause('sys_workspace'),
1427 '',
1428 'title'
1429 );
1430 break;
1431 }
1432 }
1433
1434 // If wsRec is set to an array, evaluate it:
1435 if (is_array($wsRec)) {
1436 if ($this->isAdmin()) {
1437 return array_merge($wsRec,array('_ACCESS' => 'admin'));
1438 } else {
1439
1440 switch((string)$wsRec['uid']) {
1441 case '0':
1442 $retVal = ($this->groupData['workspace_perms']&1) ? array_merge($wsRec,array('_ACCESS' => 'online')) : FALSE;
1443 break;
1444 case '-1':
1445 $retVal = ($this->groupData['workspace_perms']&2) ? array_merge($wsRec,array('_ACCESS' => 'offline')) : FALSE;
1446 break;
1447 default:
1448 // Checking if the guy is admin:
1449 if (t3lib_div::inList($wsRec['adminusers'],$this->user['uid'])) {
1450 return array_merge($wsRec, array('_ACCESS' => 'owner'));
1451 }
1452 // Checking if he is reviewer user:
1453 if (t3lib_div::inList($wsRec['reviewers'],'be_users_'.$this->user['uid'])) {
1454 return array_merge($wsRec, array('_ACCESS' => 'reviewer'));
1455 }
1456 // Checking if he is reviewer through a user group of his:
1457 foreach($this->userGroupsUID as $groupUid) {
1458 if (t3lib_div::inList($wsRec['reviewers'],'be_groups_'.$groupUid)) {
1459 return array_merge($wsRec, array('_ACCESS' => 'reviewer'));
1460 }
1461 }
1462 // Checking if he is member as user:
1463 if (t3lib_div::inList($wsRec['members'],'be_users_'.$this->user['uid'])) {
1464 return array_merge($wsRec, array('_ACCESS' => 'member'));
1465 }
1466 // Checking if he is member through a user group of his:
1467 foreach($this->userGroupsUID as $groupUid) {
1468 if (t3lib_div::inList($wsRec['members'],'be_groups_'.$groupUid)) {
1469 return array_merge($wsRec, array('_ACCESS' => 'member'));
1470 }
1471 }
1472 break;
1473 }
1474 }
1475 }
1476
1477 return $retVal;
1478 }
1479
1480 /**
1481 * Uses checkWorkspace() to check if current workspace is available for user. This function caches the result and so can be called many times with no performance loss.
1482 *
1483 * @return array See checkWorkspace()
1484 * @see checkWorkspace()
1485 */
1486 function checkWorkspaceCurrent() {
1487 if (!isset($this->checkWorkspaceCurrent_cache)) {
1488 $this->checkWorkspaceCurrent_cache = $this->checkWorkspace($this->workspace);
1489 }
1490 return $this->checkWorkspaceCurrent_cache;
1491 }
1492
1493 /**
1494 * Setting workspace ID
1495 *
1496 * @param integer ID of workspace to set for backend user. If not valid the default workspace for BE user is found and set.
1497 * @return void
1498 */
1499 function setWorkspace($workspaceId) {
1500
1501 // Check workspace validity and if not found, revert to default workspace.
1502 if ($this->workspaceRec = $this->checkWorkspace($workspaceId,'*')) {
1503 // Set workspace ID internally
1504 $this->workspace = (int)$workspaceId;
1505 } else {
1506 $this->workspace = (int)$this->getDefaultWorkspace();
1507 $this->workspaceRec = $this->checkWorkspace($this->workspace,'*');
1508 }
1509
1510 // Unset access cache:
1511 unset($this->checkWorkspaceCurrent_cache);
1512
1513 // If ID is different from the stored one, change it:
1514 if (strcmp($this->workspace, $this->user['workspace_id'])) {
1515 $this->user['workspace_id'] = $this->workspace;
1516 $GLOBALS['TYPO3_DB']->exec_UPDATEquery('be_users','uid='.intval($this->user['uid']),array('workspace_id' => $this->user['workspace_id']));
1517 $this->simplelog('User changed workspace to "'.$this->workspace.'"');
1518 }
1519 }
1520
1521 /**
1522 * Setting workspace preview state for user:
1523 *
1524 * @param boolean State of user preview.
1525 * @return void
1526 */
1527 function setWorkspacePreview($previewState) {
1528 $this->user['workspace_preview'] = $previewState;
1529 $GLOBALS['TYPO3_DB']->exec_UPDATEquery('be_users','uid='.intval($this->user['uid']),array('workspace_preview' => $this->user['workspace_preview']));
1530 }
1531
1532 /**
1533 * Return default workspace ID for user
1534 *
1535 * @return integer Default workspace id. If no workspace is available it will be "-99"
1536 */
1537 function getDefaultWorkspace() {
1538
1539 if ($this->checkWorkspace(0)) { // Check online
1540 return 0;
1541 } elseif ($this->checkWorkspace(-1)) { // Check offline
1542 return -1;
1543 } else { // Traverse custom workspaces:
1544 $workspaces = $GLOBALS['TYPO3_DB']->exec_SELECTgetRows('uid,title,adminusers,members,reviewers','sys_workspace','pid=0'.t3lib_BEfunc::deleteClause('sys_workspace'),'','title');
1545 foreach($workspaces as $rec) {
1546 if ($this->checkWorkspace($rec)) {
1547 return $rec['uid'];
1548 }
1549 }
1550 }
1551 return -99;
1552 }
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564 /************************************
1565 *
1566 * Logging
1567 *
1568 ************************************/
1569
1570 /**
1571 * Writes an entry in the logfile/table
1572 * Documentation in "TYPO3 Core API"
1573 *
1574 * @param integer Denotes which module that has submitted the entry. See "TYPO3 Core API". Use "4" for extensions.
1575 * @param integer Denotes which specific operation that wrote the entry. Use "0" when no sub-categorizing applies
1576 * @param integer Flag. 0 = message, 1 = error (user problem), 2 = System Error (which should not happen), 3 = security notice (admin)
1577 * @param integer The message number. Specific for each $type and $action. This will make it possible to translate errormessages to other languages
1578 * @param string Default text that follows the message (in english!). Possibly translated by identification through type/action/details_nr
1579 * @param array Data that follows the log. Might be used to carry special information. If an array the first 5 entries (0-4) will be sprintf'ed with the details-text
1580 * @param string Table name. Special field used by tce_main.php.
1581 * @param integer Record UID. Special field used by tce_main.php.
1582 * @param integer Record PID. Special field used by tce_main.php. OBSOLETE
1583 * @param integer The page_uid (pid) where the event occurred. Used to select log-content for specific pages.
1584 * @param string Special field used by tce_main.php. NEWid string of newly created records.
1585 * @param integer Alternative Backend User ID (used for logging login actions where this is not yet known).
1586 * @return integer Log entry ID.
1587 */
1588 function writelog($type,$action,$error,$details_nr,$details,$data,$tablename='',$recuid='',$recpid='',$event_pid=-1,$NEWid='',$userId=0) {
1589
1590 $fields_values = Array (
1591 'userid' => $userId ? $userId : intval($this->user['uid']),
1592 'type' => intval($type),
1593 'action' => intval($action),
1594 'error' => intval($error),
1595 'details_nr' => intval($details_nr),
1596 'details' => $details,
1597 'log_data' => serialize($data),
1598 'tablename' => $tablename,
1599 'recuid' => intval($recuid),
1600 # 'recpid' => intval($recpid),
1601 'IP' => t3lib_div::getIndpEnv('REMOTE_ADDR'),
1602 'tstamp' => $GLOBALS['EXEC_TIME'],
1603 'event_pid' => intval($event_pid),
1604 'NEWid' => $NEWid,
1605 'workspace' => $this->workspace
1606 );
1607
1608 $GLOBALS['TYPO3_DB']->exec_INSERTquery('sys_log', $fields_values);
1609 return $GLOBALS['TYPO3_DB']->sql_insert_id();
1610 }
1611
1612 /**
1613 * Simple logging function
1614 *
1615 * @param string Log message
1616 * @param string Option extension key / module name
1617 * @param integer Error level. 0 = message, 1 = error (user problem), 2 = System Error (which should not happen), 3 = security notice (admin)
1618 * @return integer Log entry UID
1619 */
1620 function simplelog($message, $extKey='', $error=0) {
1621 return $this->writelog(
1622 4,
1623 0,
1624 $error,
1625 0,
1626 ($extKey?'['.$extKey.'] ':'').$message,
1627 array()
1628 );
1629 }
1630
1631 /**
1632 * Sends a warning to $email if there has been a certain amount of failed logins during a period.
1633 * If a login fails, this function is called. It will look up the sys_log to see if there has been more than $max failed logins the last $secondsBack seconds (default 3600). If so, an email with a warning is sent to $email.
1634 *
1635 * @param string Email address
1636 * @param integer Number of sections back in time to check. This is a kind of limit for how many failures an hour for instance.
1637 * @param integer Max allowed failures before a warning mail is sent
1638 * @return void
1639 * @access private
1640 */
1641 function checkLogFailures($email, $secondsBack=3600, $max=3) {
1642
1643 if ($email) {
1644
1645 // get last flag set in the log for sending
1646 $theTimeBack = time()-$secondsBack;
1647 $res = $GLOBALS['TYPO3_DB']->exec_SELECTquery(
1648 'tstamp',
1649 'sys_log',
1650 'type=255 AND action=4 AND tstamp>'.intval($theTimeBack),
1651 '',
1652 'tstamp DESC',
1653 '1'
1654 );
1655 if ($testRow = $GLOBALS['TYPO3_DB']->sql_fetch_assoc($res)) {
1656 $theTimeBack = $testRow['tstamp'];
1657 }
1658
1659 // Check for more than $max number of error failures with the last period.
1660 $res = $GLOBALS['TYPO3_DB']->exec_SELECTquery(
1661 '*',
1662 'sys_log',
1663 'type=255 AND action=3 AND error!=0 AND tstamp>'.intval($theTimeBack),
1664 '',
1665 'tstamp'
1666 );
1667 if ($GLOBALS['TYPO3_DB']->sql_num_rows($res) > $max) {
1668 // OK, so there were more than the max allowed number of login failures - so we will send an email then.
1669 $subject = 'TYPO3 Login Failure Warning (at '.$GLOBALS['TYPO3_CONF_VARS']['SYS']['sitename'].')';
1670 $email_body = '
1671 There has been numerous attempts ('.$GLOBALS['TYPO3_DB']->sql_num_rows($res).') to login at the TYPO3
1672 site "'.$GLOBALS['TYPO3_CONF_VARS']['SYS']['sitename'].'" ('.t3lib_div::getIndpEnv('HTTP_HOST').').
1673
1674 This is a dump of the failures:
1675
1676 ';
1677 while($testRows = $GLOBALS['TYPO3_DB']->sql_fetch_assoc($res)) {
1678 $theData = unserialize($testRows['log_data']);
1679 $email_body.=date($GLOBALS['TYPO3_CONF_VARS']['SYS']['ddmmyy'].' H:i',$testRows['tstamp']).': '.@sprintf($testRows['details'],''.$theData[0],''.$theData[1],''.$theData[2]);
1680 $email_body.=chr(10);
1681 }
1682 mail( $email,
1683 $subject,
1684 $email_body,
1685 'From: TYPO3 Login WARNING<>'
1686 );
1687 $this->writelog(255,4,0,3,'Failure warning (%s failures within %s seconds) sent by email to %s',Array($GLOBALS['TYPO3_DB']->sql_num_rows($res),$secondsBack,$email)); // Logout written to log
1688 }
1689 }
1690 }
1691 }
1692
1693
1694
1695 if (defined('TYPO3_MODE') && $TYPO3_CONF_VARS[TYPO3_MODE]['XCLASS']['t3lib/class.t3lib_userauthgroup.php']) {
1696 include_once($TYPO3_CONF_VARS[TYPO3_MODE]['XCLASS']['t3lib/class.t3lib_userauthgroup.php']);
1697 }
1698 ?>