ILIAS  trunk Revision v11.0_alpha-1689-g66c127b4ae8
All Data Structures Namespaces Files Functions Variables Enumerations Enumerator Modules Pages
class.ilTestAccess.php
Go to the documentation of this file.
1 <?php
2 
19 declare(strict_types=1);
20 
27 
37 {
39  protected ilDBInterface $db;
40  protected ilLanguage $lng;
42 
45 
46  public function __construct(
47  protected int $ref_id
48  ) {
50  global $DIC;
51  $this->db = $DIC['ilDB'];
52  $this->lng = $DIC['lng'];
53  $this->participant_access_filter = new ilTestParticipantAccessFilterFactory($DIC['ilAccess']);
54  $this->participant_repository = TestDIC::dic()['participant.repository'];
55  $this->access = $DIC->access();
56  $this->main_settings_repository = TestDIC::dic()['settings.main.repository'];
57  }
58 
59  public function getAccess(): ilAccessHandler
60  {
61  return $this->access;
62  }
63 
64  public function setAccess(ilAccessHandler $access)
65  {
66  $this->access = $access;
67  }
68 
69  public function getRefId(): int
70  {
71  return $this->ref_id;
72  }
73 
77  public function checkCorrectionsAccess(): bool
78  {
79  return $this->getAccess()->checkAccess('write', '', $this->getRefId());
80  }
81 
85  public function checkScoreParticipantsAccess(): bool
86  {
87  if ($this->getAccess()->checkAccess('write', '', $this->getRefId())) {
88  return true;
89  }
90 
91  if ($this->getAccess()->checkPositionAccess(ilOrgUnitOperation::OP_SCORE_PARTICIPANTS, $this->getRefId())) {
92  return true;
93  }
94 
95  return false;
96  }
97 
101  public function checkManageParticipantsAccess(): bool
102  {
103  if ($this->getAccess()->checkAccess('write', '', $this->getRefId())) {
104  return true;
105  }
106 
107  if ($this->getAccess()->checkPositionAccess(ilOrgUnitOperation::OP_MANAGE_PARTICIPANTS, $this->getRefId())) {
108  return true;
109  }
110 
111  return false;
112  }
113 
117  public function checkParticipantsResultsAccess(): bool
118  {
119  if ($this->getAccess()->checkAccess('write', '', $this->getRefId())) {
120  return true;
121  }
122 
123  if ($this->getAccess()->checkAccess('tst_results', '', $this->getRefId())) {
124  return true;
125  }
126 
127  if ($this->getAccess()->checkPositionAccess(ilOrgUnitOperation::OP_MANAGE_PARTICIPANTS, $this->getRefId())) {
128  return true;
129  }
130 
131  if ($this->getAccess()->checkPositionAccess(ilOrgUnitOperation::OP_ACCESS_RESULTS, $this->getRefId())) {
132  return true;
133  }
134 
135  return false;
136  }
137 
138  protected function checkAccessForActiveId(Closure $access_filter, int $active_id, int $test_id): bool
139  {
140  $participantData = new ilTestParticipantData($this->db, $this->lng);
141  $participantData->setActiveIdsFilter([$active_id]);
142  $participantData->setParticipantAccessFilter($access_filter);
143  $participantData->load($test_id);
144 
145  return in_array($active_id, $participantData->getActiveIds());
146  }
147 
148  public function checkResultsAccessForActiveId(int $active_id, int $test_id): bool
149  {
150  $access_filter = $this->participant_access_filter->getAccessResultsUserFilter($this->getRefId());
151  return $this->checkAccessForActiveId($access_filter, $active_id, $test_id);
152  }
153 
154  public function checkScoreParticipantsAccessForActiveId(int $active_id, int $test_id): bool
155  {
156  $access_filter = $this->participant_access_filter->getScoreParticipantsUserFilter($this->getRefId());
157  return $this->checkAccessForActiveId($access_filter, $active_id, $test_id);
158  }
159 
160  public function isParticipantAllowed(int $obj_id, int $user_id): ParticipantAccess
161  {
162  try {
163  $access_settings = $this->main_settings_repository->getForObjFi($obj_id)
164  ->getAccessSettings();
165  } catch (\Exception $e) {
166  return ParticipantAccess::BROKEN_TEST;
167  }
168 
169  $participant = $this->participant_repository->getParticipantByUserId(
172  ),
173  $user_id
174  );
175 
176  if ($access_settings->getFixedParticipants()
177  && ($participant === null || !$participant->isInvitedParticipant())) {
178  return ParticipantAccess::NOT_INVITED;
179  }
180 
181  $ip = $_SERVER['REMOTE_ADDR'];
182 
183  $allowed_individual = $this->isParticipantExplicitelyAllowedByIndividualIPRange($participant, $ip);
184  if ($allowed_individual === false) {
185  return ParticipantAccess::INDIVIDUAL_CLIENT_IP_MISMATCH;
186  }
187 
188 
189  if ($allowed_individual === true
190  || !$access_settings->isIpRangeEnabled()) {
191  return ParticipantAccess::ALLOWED;
192  }
193 
194  if (!$this->isIpAllowedToAccessTest($ip, $access_settings)) {
195  return ParticipantAccess::TEST_LEVEL_CLIENT_IP_MISMATCH;
196  }
197 
198  return ParticipantAccess::ALLOWED;
199  }
200 
202  ?Participant $participant,
203  string $ip
204  ): ?bool {
205  $range_start = $participant?->getClientIpFrom();
206  $range_end = $participant?->getClientIpTo();
207 
208  if ($range_start === null && $range_end === null) {
209  return null;
210  }
211 
212  if ($this->isIpTypeOf(FILTER_FLAG_IPV4, $ip, $range_start, $range_end)) {
213  return $this->isIpv4Between($ip, $range_start, $range_end);
214  }
215 
216  if ($this->isIpTypeOf(FILTER_FLAG_IPV6, $ip, $range_start, $range_end)) {
217  return !$this->isIpv6Between($ip, $range_start, $range_end);
218  }
219 
220  return false;
221  }
222 
223  private function isIpAllowedToAccessTest(
224  string $ip,
225  SettingsAccess $access_settings
226  ): bool {
227  if (!$access_settings->isIpRangeEnabled()) {
228  return true;
229  }
230 
231  $range_start = $access_settings->getIpRangeFrom();
232  $range_end = $access_settings->getIpRangeTo();
233 
234  if ($this->isIpTypeOf(FILTER_FLAG_IPV4, $ip, $range_start, $range_end)) {
235  return $this->isIpv4Between($ip, $range_start, $range_end);
236  }
237 
238  if ($this->isIpTypeOf(FILTER_FLAG_IPV6, $ip, $range_start, $range_end)) {
239  return $this->isIpv6Between($ip, $range_start, $range_end);
240  }
241 
242  return false;
243  }
244 
245  private function isIpTypeOf(int $ip_type_flag, string $ip, string $range_start, string $range_end): bool
246  {
247  return filter_var($ip, FILTER_VALIDATE_IP, $ip_type_flag) !== false
248  && filter_var($range_start, FILTER_VALIDATE_IP, $ip_type_flag) !== false
249  && filter_var($range_end, FILTER_VALIDATE_IP, $ip_type_flag) !== false;
250  }
251 
252  private function isIpv4Between(string $ip, string $range_start, string $range_end): bool
253  {
254  return ip2long($range_start) <= ip2long($ip)
255  && ip2long($ip) <= ip2long($range_end);
256  }
257 
258  private function isIpv6Between(string $ip, string $range_start, string $range_end): bool
259  {
260  return bin2hex(inet_pton($range_start)) <= bin2hex(inet_pton($ip))
261  && bin2hex(inet_pton($ip)) <= bin2hex(inet_pton($range_end));
262  }
263 }
isIpTypeOf(int $ip_type_flag, string $ip, string $range_start, string $range_end)
ilAccessHandler $access
ParticipantRepository $participant_repository
setAccess(ilAccessHandler $access)
MainSettingsDatabaseRepository $main_settings_repository
static _lookupObjId(int $ref_id)
checkResultsAccessForActiveId(int $active_id, int $test_id)
while($session_entry=$r->fetchRow(ilDBConstants::FETCHMODE_ASSOC)) return null
$ref_id
Definition: ltiauth.php:65
checkAccessForActiveId(Closure $access_filter, int $active_id, int $test_id)
isParticipantExplicitelyAllowedByIndividualIPRange(?Participant $participant, string $ip)
$_SERVER['HTTP_HOST']
Definition: raiseError.php:26
global $DIC
Definition: shib_login.php:22
ilDBInterface $db
isIpv4Between(string $ip, string $range_start, string $range_end)
This file is part of ILIAS, a powerful learning management system published by ILIAS open source e-Le...
static _getTestIDFromObjectID($object_id)
Returns the ILIAS test id for a given object id.
checkScoreParticipantsAccessForActiveId(int $active_id, int $test_id)
isIpAllowedToAccessTest(string $ip, SettingsAccess $access_settings)
__construct(Container $dic, ilPlugin $plugin)
isIpv6Between(string $ip, string $range_start, string $range_end)
isParticipantAllowed(int $obj_id, int $user_id)
ilTestParticipantAccessFilterFactory $participant_access_filter