19 declare(strict_types=1);
51 $this->db = $DIC[
'ilDB'];
52 $this->
lng = $DIC[
'lng'];
54 $this->participant_repository = TestDIC::dic()[
'participant.repository'];
55 $this->
access = $DIC->access();
56 $this->main_settings_repository = TestDIC::dic()[
'settings.main.repository'];
141 $participantData->setActiveIdsFilter([$active_id]);
142 $participantData->setParticipantAccessFilter($access_filter);
143 $participantData->load($test_id);
145 return in_array($active_id, $participantData->getActiveIds());
150 $access_filter = $this->participant_access_filter->getAccessResultsUserFilter($this->
getRefId());
156 $access_filter = $this->participant_access_filter->getScoreParticipantsUserFilter($this->
getRefId());
163 $access_settings = $this->main_settings_repository->getForObjFi($obj_id)
164 ->getAccessSettings();
166 return ParticipantAccess::BROKEN_TEST;
169 $participant = $this->participant_repository->getParticipantByUserId(
176 if ($access_settings->getFixedParticipants()
177 && ($participant ===
null || !$participant->isInvitedParticipant())) {
178 return ParticipantAccess::NOT_INVITED;
184 if ($allowed_individual ===
false) {
185 return ParticipantAccess::INDIVIDUAL_CLIENT_IP_MISMATCH;
189 if ($allowed_individual ===
true 190 || !$access_settings->isIpRangeEnabled()) {
191 return ParticipantAccess::ALLOWED;
195 return ParticipantAccess::TEST_LEVEL_CLIENT_IP_MISMATCH;
198 return ParticipantAccess::ALLOWED;
208 if ($range_start ===
null && $range_end ===
null) {
212 if ($this->
isIpTypeOf(FILTER_FLAG_IPV4, $ip, $range_start, $range_end)) {
216 if ($this->
isIpTypeOf(FILTER_FLAG_IPV6, $ip, $range_start, $range_end)) {
234 if ($this->
isIpTypeOf(FILTER_FLAG_IPV4, $ip, $range_start, $range_end)) {
238 if ($this->
isIpTypeOf(FILTER_FLAG_IPV6, $ip, $range_start, $range_end)) {
245 private function isIpTypeOf(
int $ip_type_flag,
string $ip,
string $range_start,
string $range_end): bool
247 return filter_var($ip, FILTER_VALIDATE_IP, $ip_type_flag) !==
false 248 && filter_var($range_start, FILTER_VALIDATE_IP, $ip_type_flag) !==
false 249 && filter_var($range_end, FILTER_VALIDATE_IP, $ip_type_flag) !==
false;
252 private function isIpv4Between(
string $ip,
string $range_start,
string $range_end): bool
254 return ip2long($range_start) <= ip2long($ip)
255 && ip2long($ip) <= ip2long($range_end);
258 private function isIpv6Between(
string $ip,
string $range_start,
string $range_end): bool
260 return bin2hex(inet_pton($range_start)) <= bin2hex(inet_pton($ip))
261 && bin2hex(inet_pton($ip)) <= bin2hex(inet_pton($range_end));
isIpTypeOf(int $ip_type_flag, string $ip, string $range_start, string $range_end)
checkScoreParticipantsAccess()
ParticipantRepository $participant_repository
setAccess(ilAccessHandler $access)
MainSettingsDatabaseRepository $main_settings_repository
static _lookupObjId(int $ref_id)
checkResultsAccessForActiveId(int $active_id, int $test_id)
while($session_entry=$r->fetchRow(ilDBConstants::FETCHMODE_ASSOC)) return null
checkParticipantsResultsAccess()
const OP_SCORE_PARTICIPANTS
checkAccessForActiveId(Closure $access_filter, int $active_id, int $test_id)
isParticipantExplicitelyAllowedByIndividualIPRange(?Participant $participant, string $ip)
const OP_MANAGE_PARTICIPANTS
isIpv4Between(string $ip, string $range_start, string $range_end)
This file is part of ILIAS, a powerful learning management system published by ILIAS open source e-Le...
static _getTestIDFromObjectID($object_id)
Returns the ILIAS test id for a given object id.
checkManageParticipantsAccess()
checkScoreParticipantsAccessForActiveId(int $active_id, int $test_id)
isIpAllowedToAccessTest(string $ip, SettingsAccess $access_settings)
__construct(Container $dic, ilPlugin $plugin)
isIpv6Between(string $ip, string $range_start, string $range_end)
isParticipantAllowed(int $obj_id, int $user_id)
ilTestParticipantAccessFilterFactory $participant_access_filter