19 declare(strict_types=1);
45 $this->db = $DIC->database();
46 $this->rbacreview = $DIC->rbac()->review();
47 $this->
logger = $DIC->logger()->ac();
50 public function setBlockedStatus(
int $a_role_id,
int $a_ref_id,
bool $a_blocked_status): void
53 $query =
'UPDATE rbac_fa set blocked = ' . $this->db->quote($a_blocked_status,
'integer') .
' ' .
54 'WHERE rol_id = ' . $this->db->quote($a_role_id,
'integer') .
' ' .
55 'AND parent = ' . $this->db->quote($a_ref_id,
'integer');
56 $this->db->manipulate($query);
65 foreach ($this->rbacreview->assignedRoles($a_usr_id) as $role_id) {
68 $query =
"DELETE FROM rbac_ua WHERE usr_id = " . $this->db->quote($a_usr_id,
'integer');
69 $res = $this->db->manipulate($query);
75 public function deleteRole(
int $a_rol_id,
int $a_ref_id): void
79 throw new DomainException(
'System administrator role is not deletable.');
83 $mapping->deleteRole($a_rol_id);
89 $query =
"DELETE FROM rbac_ua " .
90 "WHERE rol_id = " . $this->db->quote($a_rol_id,
'integer');
91 $res = $this->db->manipulate($query);
94 $query =
"DELETE FROM rbac_pa " .
95 "WHERE rol_id = " . $this->db->quote($a_rol_id,
'integer') .
" ";
96 $res = $this->db->manipulate($query);
107 $query =
'DELETE FROM rbac_templates ' .
108 'WHERE rol_id = ' . $this->db->quote($a_obj_id,
'integer');
109 $res = $this->db->manipulate($query);
111 $query =
'DELETE FROM rbac_fa ' .
112 'WHERE rol_id = ' . $this->db->quote($a_obj_id,
'integer');
113 $res = $this->db->manipulate($query);
124 $this->
logger->notice(
'System administrator role is not deletable.');
129 if ($a_ref_id != 0) {
130 $clause =
'AND parent = ' . $this->db->quote($a_ref_id,
'integer') .
' ';
133 $query =
'DELETE FROM rbac_fa ' .
134 'WHERE rol_id = ' . $this->db->quote($a_rol_id,
'integer') .
' ' .
136 $res = $this->db->manipulate($query);
138 $query =
'DELETE FROM rbac_templates ' .
139 'WHERE rol_id = ' . $this->db->quote($a_rol_id,
'integer') .
' ' .
141 $res = $this->db->manipulate($query);
148 array $a_limited_roles = []
152 $ilAtomQuery->addTableLock(
'rbac_ua');
153 $ilAtomQuery->addQueryCallable(
154 function (
ilDBInterface $ilDB) use (&$ret, $a_role_id, $a_usr_id, $a_limit, $a_limited_roles):
void {
156 $limit_query =
'SELECT COUNT(*) num FROM rbac_ua ' .
157 'WHERE ' . $ilDB->
in(
'rol_id', (array) $a_limited_roles,
false,
'integer');
160 if ($row->num >= $a_limit) {
165 $query =
"INSERT INTO rbac_ua (usr_id, rol_id) " .
167 $ilDB->
quote($a_usr_id,
'integer') .
"," . $ilDB->
quote($a_role_id,
'integer') .
178 $this->rbacreview->setAssignedCacheEntry($a_role_id, $a_usr_id,
true);
180 $mapping->assign($a_role_id, $a_usr_id);
188 public function assignUser(
int $a_rol_id,
int $a_usr_id): void
191 $alreadyAssigned = $this->rbacreview->isAssigned($a_usr_id, $a_rol_id);
194 if (!$alreadyAssigned) {
195 $query =
"INSERT INTO rbac_ua (usr_id, rol_id) " .
196 "VALUES (" . $this->db->quote($a_usr_id,
'integer') .
"," . $this->db->quote(
200 $res = $this->db->manipulate($query);
202 $this->rbacreview->setAssignedCacheEntry($a_rol_id, $a_usr_id,
true);
206 $mapping->assign($a_rol_id, $a_usr_id);
208 $ref_id = $this->rbacreview->getObjectReferenceOfRole($a_rol_id);
212 if (!$alreadyAssigned) {
214 $GLOBALS[
'DIC'][
'ilAppEventHandler']->raise(
215 'components/ILIAS/AccessControl',
219 'usr_id' => $a_usr_id,
220 'role_id' => $a_rol_id,
232 $query =
"DELETE FROM rbac_ua " .
233 "WHERE usr_id = " . $this->db->quote($a_usr_id,
'integer') .
" " .
234 "AND rol_id = " . $this->db->quote($a_rol_id,
'integer') .
" ";
235 $res = $this->db->manipulate($query);
237 $this->rbacreview->setAssignedCacheEntry($a_rol_id, $a_usr_id,
false);
240 $mapping->deassign($a_rol_id, $a_usr_id);
243 $ref_id =
$GLOBALS[
'DIC'][
'rbacreview']->getObjectReferenceOfRole($a_rol_id);
248 $GLOBALS[
'DIC'][
'ilAppEventHandler']->raise(
'components/ILIAS/AccessControl',
'deassignUser', [
250 'usr_id' => $a_usr_id,
251 'role_id' => $a_rol_id,
269 foreach ($a_ops as $key => $operation) {
270 $a_ops[$key] = (
int) $operation;
273 $ops_ids = serialize($a_ops);
275 $query =
'DELETE FROM rbac_pa ' .
276 'WHERE rol_id = %s ' .
278 $res = $this->db->queryF(
280 [
'integer',
'integer'],
281 [$a_rol_id, $a_ref_id]
288 $query =
"INSERT INTO rbac_pa (rol_id,ops_id,ref_id) " .
290 "(" . $this->db->quote($a_rol_id,
'integer') .
"," . $this->db->quote(
293 ) .
"," . $this->db->quote($a_ref_id,
'integer') .
")";
294 $res = $this->db->manipulate($query);
302 public function revokePermission(
int $a_ref_id,
int $a_rol_id = 0,
bool $a_keep_protected =
true): void
310 if ($a_keep_protected !=
true) {
312 $and1 =
" AND rol_id = " . $this->db->quote($a_rol_id,
'integer') .
" ";
317 $query =
"DELETE FROM rbac_pa " .
318 "WHERE ref_id = " . $this->db->quote($a_ref_id,
'integer') .
320 $res = $this->db->manipulate($query);
327 $roles_in_scope = $this->rbacreview->getParentRoleIds($a_ref_id);
332 foreach ($roles_in_scope as $role) {
333 if ($role[
'protected'] ==
true) {
337 $role_ids[] = $role[
'obj_id'];
341 if ($role_ids === []) {
345 $query =
'DELETE FROM rbac_pa ' .
346 'WHERE ' . $this->db->in(
'rol_id', $role_ids,
false,
'integer') .
' ' .
347 'AND ref_id = ' . $this->db->quote($a_ref_id,
'integer');
348 $res = $this->db->manipulate($query);
351 if ($roles_in_scope[$a_rol_id][
'protected'] ==
true) {
355 $query =
"DELETE FROM rbac_pa " .
356 "WHERE ref_id = " . $this->db->quote($a_ref_id,
'integer') .
" " .
357 "AND rol_id = " . $this->db->quote($a_rol_id,
'integer') .
" ";
358 $res = $this->db->manipulate($query);
367 $query =
'DELETE FROM rbac_pa ' .
369 '( ' .
$GLOBALS[
'DIC'][
'tree']->getSubTreeQuery($a_ref_id, [
'child']) .
' ) ' .
370 'AND rol_id = ' . $this->db->quote($a_role_id,
'integer');
372 $this->db->manipulate($query);
380 $query =
'DELETE FROM rbac_templates ' .
381 'WHERE parent IN ( ' .
382 $GLOBALS[
'DIC'][
'tree']->getSubTreeQuery($a_ref_id, [
'child']) .
' ) ' .
383 'AND rol_id = ' . $this->db->quote($a_rol_id,
'integer');
385 $this->db->manipulate($query);
387 $query =
'DELETE FROM rbac_fa ' .
388 'WHERE parent IN ( ' .
389 $GLOBALS[
'DIC'][
'tree']->getSubTreeQuery($a_ref_id, [
'child']) .
' ) ' .
390 'AND rol_id = ' . $this->db->quote($a_rol_id,
'integer');
392 $this->db->manipulate($query);
405 $query =
"DELETE FROM rbac_pa " .
406 "WHERE " . $this->db->in(
'ref_id', $a_ref_ids,
false,
'integer') .
' ' .
407 "AND rol_id = " . $this->db->quote($a_rol_id,
'integer');
408 $res = $this->db->manipulate($query);
416 int $a_source_parent,
419 bool $a_consider_protected =
true 427 $a_consider_protected
429 $ops = $this->rbacreview->getRoleOperationsOnObject($a_source_id, $a_source_parent);
441 int $a_source_parent,
444 bool $a_consider_protected =
true 453 $query =
'SELECT * FROM rbac_templates ' .
454 'WHERE rol_id = ' . $this->db->quote($a_source_id,
'integer') .
' ' .
455 'AND parent = ' . $this->db->quote($a_source_parent,
'integer');
456 $res = $this->db->query($query);
459 while ($row = $this->db->fetchObject(
$res)) {
460 $operations[$rownum][
'type'] = $row->type;
461 $operations[$rownum][
'ops_id'] = $row->ops_id;
466 $query =
'DELETE FROM rbac_templates WHERE rol_id = ' . $this->db->quote($a_dest_id,
'integer') .
' ' .
467 'AND parent = ' . $this->db->quote($a_dest_parent,
'integer');
468 $res = $this->db->manipulate($query);
470 foreach ($operations as $op) {
471 $query =
'INSERT INTO rbac_templates (rol_id,type,ops_id,parent) ' .
473 $this->db->quote($a_dest_id,
'integer') .
"," .
474 $this->db->quote($op[
'type'],
'text') .
"," .
475 $this->db->quote($op[
'ops_id'],
'integer') .
"," .
476 $this->db->quote($a_dest_parent,
'integer') .
")";
477 $this->db->manipulate($query);
481 if ($a_consider_protected ==
true) {
482 if ($this->rbacreview->isProtected($a_source_parent, $a_source_id)) {
494 int $a_source1_parent,
496 int $a_source2_parent,
505 $query =
"SELECT s1.type, s1.ops_id " .
506 "FROM rbac_templates s1, rbac_templates s2 " .
507 "WHERE s1.rol_id = " . $this->db->quote($a_source1_id,
'integer') .
" " .
508 "AND s1.parent = " . $this->db->quote($a_source1_parent,
'integer') .
" " .
509 "AND s2.rol_id = " . $this->db->quote($a_source2_id,
'integer') .
" " .
510 "AND s2.parent = " . $this->db->quote($a_source2_parent,
'integer') .
" " .
511 "AND s1.type = s2.type " .
512 "AND s1.ops_id = s2.ops_id";
514 $res = $this->db->query($query);
518 $operations[$rowNum][
'type'] = $row->type;
519 $operations[$rowNum][
'ops_id'] = $row->ops_id;
525 $query =
'DELETE FROM rbac_templates WHERE rol_id = ' . $this->db->quote($a_dest_id,
'integer') .
' ' .
526 'AND parent = ' . $this->db->quote($a_dest_parent,
'integer');
527 $res = $this->db->manipulate($query);
529 $query =
'INSERT INTO rbac_templates (rol_id,type,ops_id,parent) ' .
531 $sta = $this->db->prepareManip($query, [
'integer',
'text',
'integer',
'integer']);
532 foreach ($operations as $set) {
533 $this->db->execute($sta, [
544 int $a_source1_parent,
546 int $a_source2_parent,
555 $s1_ops = $this->rbacreview->getAllOperationsOfRole($a_source1_id, $a_source1_parent);
556 $s2_ops = $this->rbacreview->getAllOperationsOfRole($a_source2_id, $a_source2_parent);
559 foreach ($s1_ops as $type => $ops) {
560 foreach ($ops as $op) {
563 $query =
'INSERT INTO rbac_templates (rol_id,type,ops_id,parent) ' .
565 $this->db->quote($a_dest_id,
'integer') .
', ' .
566 $this->db->quote($type,
'text') .
', ' .
567 $this->db->quote($op,
'integer') .
', ' .
568 $this->db->quote($a_dest_parent,
'integer') .
' ' .
570 $this->db->manipulate($query);
575 foreach ($s2_ops as $type => $ops) {
576 foreach ($ops as $op) {
577 if (!isset($s1_ops[$type]) || !in_array($op, $s1_ops[$type])) {
578 $query =
'INSERT INTO rbac_templates (rol_id,type,ops_id,parent) ' .
580 $this->db->quote($a_dest_id,
'integer') .
', ' .
581 $this->db->quote($type,
'text') .
', ' .
582 $this->db->quote($op,
'integer') .
', ' .
583 $this->db->quote($a_dest_parent,
'integer') .
' ' .
585 $this->db->manipulate($query);
596 int $a_source_parent,
604 $s1_ops = $this->rbacreview->getAllOperationsOfRole($a_source_id, $a_source_parent);
605 $d_ops = $this->rbacreview->getAllOperationsOfRole($a_dest_id, $a_dest_parent);
607 foreach ($s1_ops as $type => $ops) {
608 foreach ($ops as $op) {
609 if (isset($d_ops[$type]) && in_array($op, $d_ops[$type])) {
610 $query =
'DELETE FROM rbac_templates ' .
611 'WHERE rol_id = ' . $this->db->quote($a_dest_id,
'integer') .
' ' .
612 'AND type = ' . $this->db->quote($type,
'text') .
' ' .
613 'AND ops_id = ' . $this->db->quote($op,
'integer') .
' ' .
614 'AND parent = ' . $this->db->quote($a_dest_parent,
'integer');
615 $this->db->manipulate($query);
629 ?
string $a_type =
null 636 if ($a_type !==
null) {
637 $and_type =
" AND type=" . $this->db->quote($a_type,
'text') .
" ";
639 $query =
'DELETE FROM rbac_templates ' .
640 'WHERE rol_id = ' . $this->db->quote($a_rol_id,
'integer') .
' ' .
641 'AND parent = ' . $this->db->quote($a_ref_id,
'integer') .
' ' .
643 $res = $this->db->manipulate($query);
650 public function setRolePermission(
int $a_rol_id,
string $a_type, array $a_ops,
int $a_ref_id): void
653 $this->
logger->logStack();
656 foreach ($a_ops as $op) {
660 'rol_id' => [
'integer', $a_rol_id],
661 'type' => [
'text', $a_type],
662 'ops_id' => [
'integer', $op],
663 'parent' => [
'integer', $a_ref_id]
680 string $a_assign =
"y" 687 if ($a_assign !=
"y") {
692 $query =
'SELECT rol_id FROM rbac_fa ' .
693 'WHERE rol_id = ' . $this->db->quote($a_rol_id,
'integer') .
' ' .
694 'AND parent = ' . $this->db->quote($a_parent,
'integer');
695 $res = $this->db->query($query);
696 if (
$res->numRows()) {
700 'INSERT INTO rbac_fa (rol_id, parent, assign, protected) ' .
701 'VALUES (%s,%s,%s,%s)',
702 $this->db->quote($a_rol_id,
'integer'),
703 $this->db->quote($a_parent,
'integer'),
704 $this->db->quote($a_assign,
'text'),
705 $this->db->quote(
'n',
'text')
707 $res = $this->db->manipulate($query);
716 $query =
"INSERT INTO rbac_ta (typ_id, ops_id) " .
717 "VALUES(" . $this->db->quote($a_type_id,
'integer') .
"," . $this->db->quote($a_ops_id,
'integer') .
")";
718 $res = $this->db->manipulate($query);
727 $query =
"DELETE FROM rbac_ta " .
728 "WHERE typ_id = " . $this->db->quote($a_type_id,
'integer') .
" " .
729 "AND ops_id = " . $this->db->quote($a_ops_id,
'integer');
730 $res = $this->db->manipulate($query);
736 public function setProtected(
int $a_ref_id,
int $a_role_id,
string $a_value): void
740 $query =
'UPDATE rbac_fa ' .
741 'SET protected = ' . $this->db->quote($a_value,
'text') .
' ' .
742 'WHERE rol_id = ' . $this->db->quote($a_role_id,
'integer');
743 $res = $this->db->manipulate($query);
754 foreach ($this->rbacreview->getRolesOfRoleFolder($a_source_id,
false) as $role_data) {
756 if (substr($title, 0, 3) ==
'il_') {
759 $real_local[] = $role_data;
761 if ($real_local === []) {
765 foreach ($real_local as $role) {
770 $roleObj->setTitle($orig->getTitle());
771 $roleObj->setDescription($orig->getDescription());
772 $roleObj->setImportId($orig->getImportId());
785 int $a_template_parent
787 if ($this->rbacreview->isProtected($a_role_parent, $a_role_id)) {
789 $new_ops = $this->rbacreview->getOperationsOfRole(
803 if (!$a_template_id) {
825 $new_ops = $this->rbacreview->getOperationsOfRole(
857 $action->setRefId($a_ref_id);
872 $tree = $DIC[
'tree'];
874 $new_parent = $tree->getParentId($ref_id);
875 $old_context_roles = $this->rbacreview->getParentRoleIds($old_parent,
false);
876 $new_context_roles = $this->rbacreview->getParentRoleIds($new_parent,
false);
883 $tree->useCache(
false);
885 $for_addition = $for_deletion = [];
886 foreach ($new_context_roles as $new_role_id => $new_role) {
887 if (!isset($old_context_roles[$new_role_id])) {
888 $for_addition[] = $new_role_id;
889 } elseif ($new_role[
'parent'] != $old_context_roles[$new_role_id][
'parent']) {
891 $for_deletion[] = $new_role_id;
892 $for_addition[] = $new_role_id;
895 foreach ($old_context_roles as $old_role_id => $old_role) {
896 if (!isset($new_context_roles[$old_role_id])) {
897 $for_deletion[] = $old_role_id;
900 if ($for_deletion === [] && $for_addition === []) {
906 if ($rbac_log_active) {
907 $role_ids = array_unique(array_merge(array_keys($for_deletion), array_keys($for_addition)));
910 foreach ($tree->getSubTree($tree->getNodeData($ref_id),
true) as $node_data) {
911 $node_id = (
int) $node_data[
'child'];
912 if ($rbac_log_active) {
919 if (!($node_data[
'type'] ??
false)) {
926 foreach ($for_deletion as $role_id) {
930 foreach ($for_addition as $role_id) {
931 $role_parent_id = $this->rbacreview->getParentOfRole($role_id, $ref_id);
932 switch ($node_data[
'type']) {
959 $this->rbacreview->getOperationsOfRole($role_id, $node_data[
'type'], $role_parent_id),
966 if ($rbac_log_active) {
removeUser(int $a_usr_id)
deletes a user from rbac_ua all user <-> role relations are deleted
grantPermission(int $a_rol_id, array $a_ops, int $a_ref_id)
Grants a permission to an object and a specific role.
adjustMovedObjectPermissions(int $ref_id, int $old_parent)
Adjust permissions of moved objects.
setRolePermission(int $a_rol_id, string $a_type, array $a_ops, int $a_ref_id)
Inserts template permissions in rbac_templates for an specific object type.
deleteRolePermission(int $a_rol_id, int $a_ref_id, ?string $a_type=null)
Deletes all entries of a template.
deleteSubtreeTemplates(int $a_ref_id, int $a_rol_id)
Delete all template permissions of subtree nodes.
static getLogger(string $a_component_id)
Get component logger.
deassignOperationFromObject(int $a_type_id, int $a_ops_id)
Deassign an existing operation from an object Update of rbac_ta.
applyMovedObjectDidacticTemplates(int $a_ref_id, int $a_old_parent)
Apply didactic templates after object movement.
static lookupCourseNonMemberTemplatesId()
copyRoleTemplatePermissions(int $a_source_id, int $a_source_parent, int $a_dest_parent, int $a_dest_id, bool $a_consider_protected=true)
Copies template permissions of one role to another.
revokePermissionList(array $a_ref_ids, int $a_rol_id)
Revokes permissions of a LIST of objects of ONE role.
assignUser(int $a_rol_id, int $a_usr_id)
Assigns an user to a role.
quote($value, string $type)
revokePermission(int $a_ref_id, int $a_rol_id=0, bool $a_keep_protected=true)
Revokes permissions of an object of one role.
revokeSubtreePermissions(int $a_ref_id, int $a_role_id)
Revoke subtree permissions.
static lookupGroupStatusTemplateId(int $a_obj_id)
copyRolePermissions(int $a_source_id, int $a_source_parent, int $a_dest_parent, int $a_dest_id, bool $a_consider_protected=true)
Copies template permissions and permission of one role to another.
static _lookupObjId(int $ref_id)
while($session_entry=$r->fetchRow(ilDBConstants::FETCHMODE_ASSOC)) return null
static _getInstance()
Get singleton instance of this class.
static gatherFaPa(int $ref_id, array $role_ids, bool $add_action=false)
static lookupTemplateId(int $a_ref_id)
static _lookupTitle(int $obj_id)
deleteTemplate(int $a_obj_id)
Deletes a template from role folder and deletes all entries in rbac_templates, rbac_fa.
initIntersectionPermissions(int $a_ref_id, int $a_role_id, int $a_role_parent, int $a_template_id, int $a_template_parent)
copyLocalRoles(int $a_source_id, int $a_target_id)
Copy local roles This method creates a copy of all local role.
query(string $query)
Run a (read-only) Query on the database.
copyRolePermissionIntersection(int $a_source1_id, int $a_source1_parent, int $a_source2_id, int $a_source2_parent, int $a_dest_parent, int $a_dest_id)
Copies the intersection of the template permissions of two roles to a third role. ...
__construct()
Constructor public.
setProtected(int $a_ref_id, int $a_role_id, string $a_value)
Set protected.
assignRoleToFolder(int $a_rol_id, int $a_parent, string $a_assign="y")
Assigns a role to a role folder A role folder is an object to store roles.
in(string $field, array $values, bool $negate=false, string $type="")
deleteLocalRole(int $a_rol_id, int $a_ref_id=0)
Deletes a local role and entries in rbac_fa and rbac_templates.
deleteRole(int $a_rol_id, int $a_ref_id)
Deletes a role and deletes entries in rbac_pa, rbac_templates, rbac_ua, rbac_fa.
static getActionsByTemplateId(int $a_tpl_id)
Get actions of one template.
static add(int $action, int $ref_id, array $diff, bool $source_ref_id=false)
static diffFaPa(array $old, array $new)
represents a creation of local roles action
assignUserLimited(int $a_role_id, int $a_usr_id, int $a_limit, array $a_limited_roles=[])
copyRolePermissionSubtract(int $a_source_id, int $a_source_parent, int $a_dest_id, int $a_dest_parent)
Subtract role permissions.
Class ilRbacAdmin Core functions for role based access control.
assignOperationToObject(int $a_type_id, int $a_ops_id)
Assign an existing operation to an object Update of rbac_ta.
manipulate(string $query)
Run a (write) Query on the database.
static _lookupType(int $id, bool $reference=false)
setBlockedStatus(int $a_role_id, int $a_ref_id, bool $a_blocked_status)
copyRolePermissionUnion(int $a_source1_id, int $a_source1_parent, int $a_source2_id, int $a_source2_parent, int $a_dest_id, int $a_dest_parent)
deassignUser(int $a_rol_id, int $a_usr_id)
Deassigns a user from a role.