ILIAS  release_4-3 Revision
 All Data Structures Namespaces Files Functions Variables Groups Pages
class.ilAccessHandler.php
Go to the documentation of this file.
1 <?php
2 /* Copyright (c) 1998-2009 ILIAS open source, Extended GPL, see docs/LICENSE */
3 
4 require_once("Services/AccessControl/classes/class.ilAccessInfo.php");
5 
21 {
22  protected $stored_rbac_access = array();
23 
27  function ilAccessHandler()
28  {
29  global $rbacsystem,$lng;
30 
31  $this->rbacsystem =& $rbacsystem;
32  $this->results = array();
33  $this->current_info = new ilAccessInfo();
34 
35  // use function enable to switch on/off tests (only cache is used so far)
36  $this->cache = true;
37  $this->rbac = true;
38  $this->tree = true;
39  $this->condition = true;
40  $this->path = true;
41  $this->status = true;
42  $this->obj_id_cache = array();
43  $this->obj_type_cache = array();
44  $this->obj_tree_cache=array();
45  }
46 
57  function storeAccessResult($a_permission, $a_cmd, $a_ref_id, $a_access_granted, $a_user_id = "",$a_info = "")
58  {
59  global $ilUser;
60 
61  if ($a_user_id == "")
62  {
63  $a_user_id = $ilUser->getId();
64  }
65 
66  if ($a_info == "")
67  {
68  $a_info = $this->current_info;
69  }
70 
71  //var_dump("<pre>",$a_permission,"</pre>");
72 
73  if ($this->cache)
74  {
75  $this->results[$a_ref_id][$a_permission][$a_cmd][$a_user_id] =
76  array("granted" => $a_access_granted, "info" => $a_info,
77  "prevent_db_cache" => $this->getPreventCachingLastResult());
78 //echo "<br>write-$a_ref_id-$a_permission-$a_cmd-$a_user_id-$a_access_granted-";
79  $this->current_result_element = array($a_access_granted,$a_ref_id,$a_permission,$a_cmd,$a_user_id);
80  $this->last_result = $this->results[$a_ref_id][$a_permission][$a_cmd][$a_user_id];
81  $this->last_info = $a_info;
82  }
83 
84  // get new info object
85  $this->current_info = new ilAccessInfo();
86 
87  }
88 
94  function setPreventCachingLastResult($a_val)
95  {
96  $this->prevent_caching_last_result = $a_val;
97  }
98 
105  {
106  return $this->prevent_caching_last_result;
107  }
108 
121  function getStoredAccessResult($a_permission, $a_cmd, $a_ref_id, $a_user_id = "")
122  {
123  global $ilUser;
124 
125  if ($a_user_id == "")
126  {
127  $a_user_id = $ilUser->getId();
128  }
129 
130  /*if (is_object($this->results[$a_ref_id][$a_permission][$a_cmd][$a_user_id]['info']))
131  {
132  $this->current_info = $this->results[$a_ref_id][$a_permission][$a_cmd][$a_user_id]['info'];
133  }*/
134 
135  if (isset($this->results[$a_ref_id][$a_permission][$a_cmd][$a_user_id]))
136  {
137  return $this->results[$a_ref_id][$a_permission][$a_cmd][$a_user_id];
138  }
139  return false;
140  }
141 
142  function storeCache()
143  {
144  global $ilDB, $ilUser;
145 
146  $query = "DELETE FROM acc_cache WHERE user_id = ".$ilDB->quote($ilUser->getId(),'integer');
147  $res = $ilDB->manipulate($query);
148 
149  $ilDB->insert('acc_cache', array(
150  'user_id' => array('integer',$ilUser->getId()),
151  'time' => array('integer',time()),
152  'result' => array('clob',serialize($this->results))
153  ));
154  }
155 
156  function readCache($a_secs = 0)
157  {
158  global $ilUser, $ilDB;
159 
160  if ($a_secs > 0)
161  {
162  $query = "SELECT * FROM acc_cache WHERE user_id = ".
163  $ilDB->quote($ilUser->getId() ,'integer');
164  $set = $ilDB->query($query);
165  $rec = $set->fetchRow(DB_FETCHMODE_ASSOC);
166  if ((time() - $rec["time"]) < $a_secs)
167  {
168  $this->results = unserialize($rec["result"]);
169 //var_dump($this->results);
170  return true;
171  }
172  }
173  return false;
174  }
175 
176  function getResults()
177  {
178  return $this->results;
179  }
180 
181  function setResults($a_results)
182  {
183  $this->results = $a_results;
184  }
185 
189  function addInfoItem($a_type, $a_text, $a_data = "")
190  {
191  $this->current_info->addInfoItem($a_type, $a_text, $a_data);
192  }
193 
206  function checkAccess($a_permission, $a_cmd, $a_ref_id, $a_type = "", $a_obj_id = "", $a_tree_id="")
207  {
208  global $ilUser;
209 
210  return $this->checkAccessOfUser($ilUser->getId(),$a_permission, $a_cmd, $a_ref_id, $a_type, $a_obj_id, $a_tree_id);
211  }
212 
226  function checkAccessOfUser($a_user_id,$a_permission, $a_cmd, $a_ref_id, $a_type = "", $a_obj_id = "", $a_tree_id="")
227  {
228  global $ilBench, $lng;
229 
230  $this->setPreventCachingLastResult(false); // for external db based caches
231 
232  $ilBench->start("AccessControl", "0400_clear_info");
233  $this->current_info->clear();
234  $ilBench->stop("AccessControl", "0400_clear_info");
235 
236 
237  // get stored result (internal memory based cache)
238  $cached = $this->doCacheCheck($a_permission, $a_cmd, $a_ref_id, $a_user_id);
239  if ($cached["hit"])
240  {
241  // Store access result
242  if (!$cached["granted"])
243  {
244  $this->current_info->addInfoItem(IL_NO_PERMISSION, $lng->txt("status_no_permission"));
245  }
246  if ($cached["prevent_db_cache"])
247  {
248  $this->setPreventCachingLastResult(true); // should have been saved in previous call already
249  }
250  return $cached["granted"];
251  }
252 
253  $ilBench->start("AccessControl", "0500_lookup_id_and_type");
254  // get object id if not provided
255  if ($a_obj_id == "")
256  {
257  if (isset($this->obj_id_cache[$a_ref_id]) && $this->obj_id_cache[$a_ref_id] > 0)
258  {
259  $a_obj_id = $this->obj_id_cache[$a_ref_id];
260  }
261  else
262  {
263  $a_obj_id = ilObject::_lookupObjId($a_ref_id);
264  $this->obj_id_cache[$a_ref_id] = $a_obj_id;
265  }
266  }
267  if ($a_type == "")
268  {
269  if (isset($this->obj_type_cache[$a_ref_id]) && $this->obj_type_cache[$a_ref_id] != "")
270  {
271  $a_type = $this->obj_type_cache[$a_ref_id];
272  }
273  else
274  {
275  $a_type = ilObject::_lookupType($a_ref_id, true);
276  $this->obj_type_cache[$a_ref_id] = $a_type;
277  }
278  }
279 
280  $ilBench->stop("AccessControl", "0500_lookup_id_and_type");
281 
282  // to do: payment handling
283 
284  // if supplied tree id is not = 1 (= repository main tree),
285  // check if object is in tree and not deleted
286  if ($a_tree_id != 1 &&
287  !$this->doTreeCheck($a_permission, $a_cmd, $a_ref_id, $a_user_id))
288  {
289  $this->current_info->addInfoItem(IL_NO_PERMISSION, $lng->txt("status_no_permission"));
290  $this->storeAccessResult($a_permission, $a_cmd, $a_ref_id, false, $a_user_id);
291  return false;
292  }
293 
294  // rbac check for current object
295  if (!$this->doRBACCheck($a_permission, $a_cmd, $a_ref_id, $a_user_id, $a_type))
296  {
297  $this->current_info->addInfoItem(IL_NO_PERMISSION, $lng->txt("status_no_permission"));
298  $this->storeAccessResult($a_permission, $a_cmd, $a_ref_id, false, $a_user_id);
299  return false;
300  }
301 
302  // Check object activation
303  $act_check = $this->doActivationCheck($a_permission, $a_cmd, $a_ref_id, $a_user_id);
304  if(!$act_check)
305  {
306  $this->current_info->addInfoItem(IL_NO_PERMISSION, $lng->txt('status_no_permission'));
307  $this->storeAccessResult($a_permission, $a_cmd, $a_ref_id, false, $a_user_id);
308  return false;
309  }
310 
311  // check read permission for all parents
312  $par_check = $this->doPathCheck($a_permission, $a_cmd, $a_ref_id, $a_user_id);
313  if (!$par_check)
314  {
315 
316  $this->current_info->addInfoItem(IL_NO_PERMISSION, $lng->txt("status_no_permission"));
317  $this->storeAccessResult($a_permission, $a_cmd, $a_ref_id, false, $a_user_id);
318  return false;
319  }
320 
321  // condition check (currently only implemented for read permission)
322  if (!$this->doConditionCheck($a_permission, $a_cmd, $a_ref_id, $a_user_id, $a_obj_id, $a_type))
323  {
324  $this->current_info->addInfoItem(IL_NO_PERMISSION, $lng->txt("status_no_permission"));
325  $this->storeAccessResult($a_permission, $a_cmd, $a_ref_id, false, $a_user_id);
326  $this->setPreventCachingLastResult(true); // do not store this in db, since condition updates are not monitored
327  return false;
328  }
329 
330  // object type specific check
331  if (!$this->doStatusCheck($a_permission, $a_cmd, $a_ref_id, $a_user_id, $a_obj_id, $a_type))
332  {
333  $this->current_info->addInfoItem(IL_NO_PERMISSION, $lng->txt("status_no_permission"));
334  $this->storeAccessResult($a_permission, $a_cmd, $a_ref_id, false, $a_user_id);
335  $this->setPreventCachingLastResult(true); // do not store this in db, since status updates are not monitored
336  return false;
337  }
338 
339  // check for available licenses
340  if (!$this->doLicenseCheck($a_permission, $a_cmd, $a_ref_id, $a_user_id, $a_obj_id, $a_type))
341  {
342  $this->setPreventCachingLastResult(true); // do not store this in db, since status updates are not monitored
343  return false;
344  }
345 
346  // all checks passed
347  $this->storeAccessResult($a_permission, $a_cmd, $a_ref_id, true, $a_user_id);
348  return true;
349  }
350 
354  function getInfo()
355  {
356  //return $this->last_result;
357  //$this->last_info->setQueryData($this->current_result_element);
358  //var_dump("<pre>",$this->results,"</pre>");
359  return is_object($this->last_info) ? $this->last_info->getInfoItems() : array();
360  }
361 
365  function getResultLast()
366  {
367  return $this->last_result;
368  }
369 
370  function getResultAll($a_ref_id = "")
371  {
372  if ($a_ref_id == "")
373  {
374  return $this->results;
375  }
376 
377  return $this->results[$a_ref_id];
378  }
379 
384  function doCacheCheck($a_permission, $a_cmd, $a_ref_id,$a_user_id)
385  {
386  global $ilBench;
387  //echo "cacheCheck<br/>";
388 
389  $ilBench->start("AccessControl", "1000_checkAccess_get_cache_result");
390  $stored_access = $this->getStoredAccessResult($a_permission, $a_cmd, $a_ref_id,$a_user_id);
391  //var_dump($stored_access);
392  if (is_array($stored_access))
393  {
394  $this->current_info = $stored_access["info"];
395  //var_dump("cache-treffer:");
396  $ilBench->stop("AccessControl", "1000_checkAccess_get_cache_result");
397  return array("hit" => true, "granted" => $stored_access["granted"],
398  "prevent_db_cache" => $stored_access["prevent_db_cache"]);
399  }
400 
401  // not in cache
402  $ilBench->stop("AccessControl", "1000_checkAccess_get_cache_result");
403  return array("hit" => false, "granted" => false,
404  "prevent_db_cache" => false);
405  }
406 
411  function doTreeCheck($a_permission, $a_cmd, $a_ref_id, $a_user_id)
412  {
413  global $tree, $lng, $ilBench;
414  //echo "treeCheck<br/>";
415 
416  // Get stored result
417  $tree_cache_key = $a_user_id.':'.$a_ref_id;
418  if (array_key_exists($tree_cache_key, $this->obj_tree_cache)) {
419  // Store access result
420  if (!$this->obj_tree_cache[$tree_cache_key])
421  {
422  $this->current_info->addInfoItem(IL_NO_PERMISSION, $lng->txt("status_no_permission"));
423  }
424  $this->storeAccessResult($a_permission, $a_cmd, $a_ref_id, $this->obj_tree_cache[$tree_cache_key], $a_user_id);
425 
426  return $this->obj_tree_cache[$tree_cache_key];
427  }
428 
429  $ilBench->start("AccessControl", "2000_checkAccess_in_tree");
430 
431  if(!$tree->isInTree($a_ref_id) or $tree->isDeleted($a_ref_id))
432  {
433  // Store negative access results
434 
435  // Store in tree cache
436  // Note, we only store up to 1000 results to avoid memory overflow.
437  if (count($this->obj_tree_cache) < 1000)
438  {
439  $this->obj_tree_cache[$tree_cache_key] = false;
440  }
441 
442  // Store in result cache
443  $this->current_info->addInfoItem(IL_DELETED, $lng->txt("object_deleted"));
444  $this->storeAccessResult($a_permission, $a_cmd, $a_ref_id, false, $a_user_id);
445 
446  $ilBench->stop("AccessControl", "2000_checkAccess_in_tree");
447 
448  return false;
449  }
450 
451  // Store positive access result.
452 
453  // Store in tree cache
454  // Note, we only store up to 1000 results to avoid memory overflow.
455  if (count($this->obj_tree_cache) < 1000)
456  {
457  $this->obj_tree_cache[$tree_cache_key] = true;
458  }
459 
460  // Store in result cache
461  $this->storeAccessResult($a_permission, $a_cmd, $a_ref_id, true, $a_user_id);
462 
463  $ilBench->stop("AccessControl", "2000_checkAccess_in_tree");
464  return true;
465  }
466 
471  function doRBACCheck($a_permission, $a_cmd, $a_ref_id, $a_user_id, $a_type)
472  {
473  global $lng, $ilBench, $ilErr, $ilLog;
474 
475  $ilBench->start("AccessControl", "2500_checkAccess_rbac_check");
476 
477  if ($a_permission == "")
478  {
479  $message = sprintf('%s::doRBACCheck(): No operations given! $a_ref_id: %s',
480  get_class($this),
481  $a_ref_id);
482  $ilLog->write($message,$ilLog->FATAL);
483  $ilErr->raiseError($message,$ilErr->MESSAGE);
484  }
485 
486  if (isset($this->stored_rbac_access[$a_user_id."-".$a_permission."-".$a_ref_id]))
487  {
488  $access = $this->stored_rbac_access[$a_user_id."-".$a_permission."-".$a_ref_id];
489  }
490  else
491  {
492  $access = $this->rbacsystem->checkAccessOfUser($a_user_id, $a_permission, $a_ref_id, $a_type);
493  if (!is_array($this->stored_rbac_access) || count($this->stored_rbac_access) < 1000)
494  {
495  if ($a_permission != "create")
496  {
497  $this->stored_rbac_access[$a_user_id."-".$a_permission."-".$a_ref_id] = $access;
498  }
499  }
500  }
501 
502  // Store in result cache
503  if (!$access)
504  {
505  $this->current_info->addInfoItem(IL_NO_PERMISSION, $lng->txt("status_no_permission"));
506  }
507  if ($a_permission != "create")
508  {
509  $this->storeAccessResult($a_permission, $a_cmd, $a_ref_id, true, $a_user_id);
510  }
511  $ilBench->stop("AccessControl", "2500_checkAccess_rbac_check");
512 
513  return $access;
514  }
515 
520  function doPathCheck($a_permission, $a_cmd, $a_ref_id, $a_user_id, $a_all = false)
521  {
522  global $tree, $lng, $ilBench,$ilObjDataCache;
523 //echo "<br>dopathcheck";
524  //echo "pathCheck<br/>";
525  $ilBench->start("AccessControl", "3100_checkAccess_check_parents_get_path");
526 
527 // if (isset($this->stored_path[$a_ref_id]))
528 // {
529 // $path = $this->stored_path[$a_ref_id];
530 // }
531 // else
532 // {
533  $path = $tree->getPathId($a_ref_id);
534 // $this->stored_path[$a_ref_id] = $path;
535 // }
536  $ilBench->stop("AccessControl", "3100_checkAccess_check_parents_get_path");
537 
538  foreach ($path as $id)
539  {
540  if ($a_ref_id == $id)
541  {
542  continue;
543  }
544 
545  $access = $this->checkAccessOfUser($a_user_id, "read", "info", $id);
546 
547  if ($access == false)
548  {
549 
550  //$this->doCacheCheck($a_permission, $a_cmd, $a_ref_id, $a_user_id);
551  $this->current_info->addInfoItem(IL_NO_PARENT_ACCESS, $lng->txt("no_parent_access"),$id);
552 
553  if ($a_all == false)
554  {
555  return false;
556  }
557  }
558  }
559 
560  return true;
561  }
562 
567  function doActivationCheck($a_permission, $a_cmd, $a_ref_id, $a_user_id, $a_all = false)
568  {
569  global $ilBench,$ilUser;
570 
571  $ilBench->start("AccessControl", "3150_checkAccess_check_course_activation");
572 
573  $cache_perm = ($a_permission == "visible")
574  ? "visible"
575  : "other";
576 
577 //echo "<br>doActivationCheck-$cache_perm-$a_ref_id-$a_user_id-".$ilObjDataCache->lookupType($ilObjDataCache->lookupObjId($a_ref_id));
578 
579  if (isset($this->ac_cache[$cache_perm][$a_ref_id][$a_user_id]))
580  {
581  $ilBench->stop("AccessControl", "3150_checkAccess_check_course_activation");
582  return $this->ac_cache[$cache_perm][$a_ref_id][$a_user_id];
583  }
584 
585  // nothings needs to be done if current permission is write permission
586  if($a_permission == 'write')
587  {
588  $ilBench->stop("AccessControl", "3150_checkAccess_check_course_activation");
589  return true;
590  }
591 
592  // #10852 - member view check
593  if($a_user_id == $ilUser->getId())
594  {
595  // #10905 - activate parent container ONLY
596  include_once './Services/Container/classes/class.ilMemberViewSettings.php';
598  if($memview->isActiveForRefId($a_ref_id) &&
599  $memview->getContainer() == $a_ref_id)
600  {
601  return true;
602  }
603  }
604 
605  include_once 'Services/Object/classes/class.ilObjectActivation.php';
606  $item_data = ilObjectActivation::getItem($a_ref_id);
607 
608  // if activation isn't enabled
609  if($item_data === NULL ||
610  $item_data['timing_type'] != ilObjectActivation::TIMINGS_ACTIVATION)
611  {
612  $this->ac_cache[$cache_perm][$a_ref_id][$a_user_id] = true;
613  $ilBench->stop("AccessControl", "3150_checkAccess_check_course_activation");
614  return true;
615  }
616 
617  // if within activation time
618  if((time() >= $item_data['timing_start']) and
619  (time() <= $item_data['timing_end']))
620  {
621  $this->ac_cache[$cache_perm][$a_ref_id][$a_user_id] = true;
622  $ilBench->stop("AccessControl", "3150_checkAccess_check_course_activation");
623  return true;
624  }
625 
626  // if user has write permission
627  if($this->checkAccessOfUser($a_user_id, "write", "", $a_ref_id))
628  {
629  $this->ac_cache[$cache_perm][$a_ref_id][$a_user_id] = true;
630  $ilBench->stop("AccessControl", "3150_checkAccess_check_course_activation");
631  return true;
632  }
633  // if current permission is visible and visible is set in activation
634  if($a_permission == 'visible' and $item_data['visible'])
635  {
636  $this->ac_cache[$cache_perm][$a_ref_id][$a_user_id] = true;
637  $ilBench->stop("AccessControl", "3150_checkAccess_check_course_activation");
638  return true;
639  }
640  // no access
641  $this->ac_cache[$cache_perm][$a_ref_id][$a_user_id] = false;
642  $ilBench->stop("AccessControl", "3150_checkAccess_check_course_activation");
643  return false;
644  }
645 
650  function doConditionCheck($a_permission, $a_cmd, $a_ref_id,$a_user_id, $a_obj_id, $a_type)
651  {
652  //echo "conditionCheck<br/>";
653  global $lng, $ilBench;
654 
655  if (($a_permission == "read" or $a_permission == 'join') &&
656  !$this->checkAccessOfUser($a_user_id, "write", "", $a_ref_id, $a_type, $a_obj_id))
657  {
658  $ilBench->start("AccessControl", "4000_checkAccess_condition_check");
659  if(!ilConditionHandler::_checkAllConditionsOfTarget($a_ref_id,$a_obj_id,$a_type,$a_user_id))
660  {
661  $conditions = ilConditionHandler::_getConditionsOfTarget($a_ref_id,$a_obj_id, $a_type);
662  foreach ($conditions as $condition)
663  {
664  $this->current_info->addInfoItem(IL_MISSING_PRECONDITION,
665  $lng->txt("missing_precondition").": ".
666  ilObject::_lookupTitle($condition["trigger_obj_id"])." ".
667  $lng->txt("condition_".$condition["operator"])." ".
668  $condition["value"], $condition);
669  }
670  $ilBench->stop("AccessControl", "4000_checkAccess_condition_check");
671  return false;
672  }
673  $ilBench->stop("AccessControl", "4000_checkAccess_condition_check");
674  }
675 
676  return true;
677  }
678 
683  function doStatusCheck($a_permission, $a_cmd, $a_ref_id,$a_user_id, $a_obj_id, $a_type)
684  {
685  global $objDefinition, $ilBench, $ilPluginAdmin;
686  //echo "statusCheck<br/>";
687  $ilBench->start("AccessControl", "5000_checkAccess_object_check");
688 
689  // check for a deactivated plugin
690  if ($objDefinition->isPluginTypeName($a_type) && !$objDefinition->isPlugin($a_type))
691  {
692  return false;
693  }
694  if(!$a_type)
695  {
696  return false;
697  }
698 
699  $class = $objDefinition->getClassName($a_type);
700  $location = $objDefinition->getLocation($a_type);
701  $full_class = "ilObj".$class."Access";
702  include_once($location."/class.".$full_class.".php");
703  // static call to ilObj..::_checkAccess($a_cmd, $a_permission, $a_ref_id, $a_obj_id)
704 
705  $ilBench->start("AccessControl", "5001_checkAccess_".$full_class."_check");
706  $obj_access = call_user_func(array($full_class, "_checkAccess"),
707  $a_cmd, $a_permission, $a_ref_id, $a_obj_id, $a_user_id);
708  $ilBench->stop("AccessControl", "5001_checkAccess_".$full_class."_check");
709  if (!($obj_access === true))
710  {
711  //Note: We must not add an info item here, because one is going
712  // to be added by the user function we just called a few
713  // lines above.
714  //$this->current_info->addInfoItem(IL_NO_OBJECT_ACCESS, $obj_access);
715 
716  $this->storeAccessResult($a_permission, $a_cmd, $a_ref_id, false, $a_user_id);
717  $ilBench->stop("AccessControl", "5000_checkAccess_object_check");
718  return false;
719  }
720 
721  $this->storeAccessResult($a_permission, $a_cmd, $a_ref_id, true, $a_user_id);
722  $ilBench->stop("AccessControl", "5000_checkAccess_object_check");
723  return true;
724  }
725 
729  function doLicenseCheck($a_permission, $a_cmd, $a_ref_id,$a_user_id, $a_obj_id, $a_type)
730  {
731  global $lng;
732 
733  // simple checks first
734  if (!in_array($a_type, array('sahs','htlm'))
735  or !in_array($a_permission, array('read')))
736  {
737  $has_access = true;
738  }
739  else
740  {
741  require_once("Services/License/classes/class.ilLicenseAccess.php");
742 
743  // licensing globally disabled => access granted
745  {
746  $has_access = true;
747  }
748  /* resolved mantis issue #5288:
749  * admins should not automatically have read access!
750  * their read access will also be noted and consume a license
751  elseif ($this->rbacsystem->checkAccessOfUser($a_user_id, "edit_permissions", $a_ref_id))
752  {
753  $has_access = true;
754  }
755  */
756  // now do the real check
757  else
758  {
759  $has_access = ilLicenseAccess::_checkAccess($a_user_id, $a_obj_id);
760  }
761  }
762 
763  if ($has_access)
764  {
765  $this->storeAccessResult($a_permission, $a_cmd, $a_ref_id, true, $a_user_id);
766  return true;
767  }
768  else
769  {
770  $this->current_info->addInfoItem(IL_NO_LICENSE, $lng->txt("no_license_available"));
771  $this->storeAccessResult($a_permission, $a_cmd, $a_ref_id, false, $a_user_id);
772  return false;
773  }
774  }
775 
776  function clear()
777  {
778  $this->results = array();
779  $this->last_result = "";
780  $this->current_info = new ilAccessInfo();
781  }
782 
783  function enable($a_str,$a_bool)
784  {
785  $this->$a_str = $a_bool;
786  }
787 }