19 declare(strict_types=1);
60 bool $a_call_by_reference =
false,
61 bool $a_prepare_output =
true 66 $this->
help = $DIC[
'ilHelp'];
67 $this->
logger = $DIC->logger()->ac();
69 $this->role_id = $a_id;
70 $this->
http = $DIC[
'http'];
72 $this->ui_factory = $DIC[
'ui.factory'];
73 $this->ui_renderer = $DIC[
'ui.renderer'];
83 $this->
ctrl->saveParameter($this, [
'obj_id',
'rolf_ref_id']);
84 $this->
lng->loadLanguageModule(
'rbac');
91 $next_class = $this->
ctrl->getNextClass($this);
92 $cmd = $this->
ctrl->getCmd();
96 switch ($next_class) {
97 case 'ilrepositorysearchgui':
99 if (!$this->
access->checkAccess(
'edit_permission',
'', $this->obj_ref_id)) {
100 $this->error->raiseError(
101 $this->
lng->txt(
'permission_denied'),
102 $this->error->WARNING
106 $rep_search->setTitle($this->
lng->txt(
'role_add_user'));
107 $rep_search->setCallback($this,
'addUserObject');
110 $this->tabs_gui->setTabActive(
'user_assignment');
111 $this->
ctrl->setReturn($this,
'userassignment');
112 $ret = $this->
ctrl->forwardCommand($rep_search);
117 $this->tabs_gui->setTabActive(
'export');
123 $exp->addFormat(
'xml');
124 $this->
ctrl->forwardCommand($exp);
127 case 'ilrecommendedcontentroleconfiggui':
128 $this->tabs_gui->setTabActive(
'rep_recommended_content');
130 $this->
ctrl->forwardCommand($ui);
138 $cmd =
'userassignment';
155 $this->obj_ref_id = 0;
157 if ($this->
http->wrapper()->query()->has(
'rolf_ref_id')) {
158 $this->obj_ref_id = $this->
http->wrapper()->query()->retrieve(
162 } elseif ($this->
http->wrapper()->query()->has(
'ref_id')) {
163 $this->obj_ref_id = $this->
http->wrapper()->query()->retrieve(
172 $template_permissions = [];
173 if ($this->
http->wrapper()->post()->has(
'template_perm')) {
174 $custom_transformer = $this->
refinery->custom()->transformation(
179 $template_permissions = $this->
http->wrapper()->post()->retrieve(
184 return $template_permissions;
233 || $this->obj_definition->isAdministrationObject($this->
getContainerType());
238 if ($this->creation_mode) {
239 $this->
ctrl->setParameter($this,
'new_type',
'role');
242 $ff = $this->ui_factory->input()->field();
244 $title_validation_constraint = $this->
refinery->custom()->constraint(
245 fn(
string $v):
bool => preg_match(
'/^il_.*$/', $v) ?
false :
true,
246 $this->
lng->txt(
'msg_role_reserved_prefix')
249 $role_is_autogenerated =
false;
251 if (!$is_role_creation_form) {
252 $role_is_autogenerated = $this->
object->isAutoGenerated();
256 self::FORM_KEY_TITLE => $ff->text($this->
lng->txt(
'title'))
259 ->withAdditionalTransformation($title_validation_constraint)
260 ->withValue($is_role_creation_form ?
'' : $this->
object->getTitle())
261 ->withDisabled($role_is_autogenerated),
262 self::FORM_KEY_DESCRIPTION => $ff->textarea($this->
lng->txt(
'description'))
264 ->withValue($is_role_creation_form ?
'' : $this->
object->getDescription())
265 ->withDisabled($role_is_autogenerated),
269 if (!$is_role_creation_form) {
270 $inputs[self::FORM_KEY_ILIAS_ID] = $ff->text($this->
lng->txt(
'ilias_id'))
273 . $this->
object->getType() .
'_' . $this->
object->getId());
277 $inputs[self::FORM_KEY_ON_REGISTRATION_FORM] = $ff->checkbox($this->
lng->txt(
'allow_register'))
278 ->
withValue($is_role_creation_form ?
false : $this->
object->getAllowRegister());
279 $inputs[self::FORM_KEY_ALLOW_LOCAL_USER_ASSIGNMENT] = $ff->checkbox($this->
lng->txt(
'allow_assign_users'))
280 ->
withValue($is_role_creation_form ?
false : $this->
object->getAssignUsersStatus());
283 $inputs[self::FORM_KEY_PROTECT] = $ff->checkbox($this->
lng->txt(
'role_protect_permissions'))
285 $is_role_creation_form
287 : $this->rbac_review->isProtected($this->obj_ref_id, $this->object->getId())
290 return $this->ui_factory->input()->container()->form()->standard(
291 $this->
ctrl->getFormActionByClass(
293 $is_role_creation_form ?
'save' :
'update' 297 $is_role_creation_form ? $this->
lng->txt(
'role_new') : $this->
lng->txt(
'save')
303 if (!$this->rbac_system->checkAccess(
'create_role', $this->obj_ref_id)) {
304 $this->tpl->setOnScreenMessage(
'failure', $this->
lng->txt(
'permission_denied'),
true);
305 $this->
ctrl->returnToParent(ilRepositoryGUI::class);
308 $this->tabs_gui->setBackTarget(
309 $this->
lng->txt(
'cancel'),
310 $this->
ctrl->getParentReturnByClass(self::class)
313 $this->tpl->setContent(
314 $this->ui_renderer->render(
315 $this->ui_factory->panel()->standard(
316 $this->
lng->txt(
'role_new'),
325 if (!$this->
checkAccess(
'write',
'edit_permission')) {
326 $this->tpl->setOnScreenMessage(
'msg_no_perm_write', $this->
lng->txt(
'permission_denied'),
true);
327 $this->
ctrl->returnToParent($this);
329 $this->tabs_gui->activateTab(
'edit_properties');
340 $form = $this->
getRoleForm(
true)->withRequest($this->request);
341 $data = $form->getData();
343 $this->tabs_gui->setBackTarget(
344 $this->
lng->txt(
'cancel'),
345 $this->
ctrl->getParentReturnByClass(self::class)
347 $this->tpl->setContent(
348 $this->ui_renderer->render(
349 $this->ui_factory->panel()->standard(
350 $this->
lng->txt(
'role_new'),
359 $role->setTitle(
$data[self::FORM_KEY_TITLE]);
360 $role->setDescription(
$data[self::FORM_KEY_DESCRIPTION]);
361 $role->setAllowRegister(
$data[self::FORM_KEY_ON_REGISTRATION_FORM]);
362 $role->toggleAssignUsersStatus(
$data[self::FORM_KEY_ALLOW_LOCAL_USER_ASSIGNMENT]);
365 $this->rbac_admin->setProtected(
368 $data[self::FORM_KEY_PROTECT] ?
'y' :
'n' 370 $this->tpl->setOnScreenMessage(
'success', $this->
lng->txt(
'role_added'),
true);
371 $this->
ctrl->setParameter($this,
'obj_id', $role->getId());
372 $this->
ctrl->redirect($this,
'perm');
381 $form = $this->
getRoleForm()->withRequest($this->request);
382 $data = $form->getData();
388 if (isset(
$data[self::FORM_KEY_TITLE])) {
389 $this->
object->setTitle(
$data[self::FORM_KEY_TITLE]);
391 if (isset(
$data[self::FORM_KEY_DESCRIPTION])) {
392 $this->
object->setDescription(
$data[self::FORM_KEY_DESCRIPTION]);
394 if (isset(
$data[self::FORM_KEY_ON_REGISTRATION_FORM])) {
395 $this->
object->setAllowRegister(
$data[self::FORM_KEY_ON_REGISTRATION_FORM]);
397 if (isset(
$data[self::FORM_KEY_ALLOW_LOCAL_USER_ASSIGNMENT])) {
398 $this->
object->toggleAssignUsersStatus(
$data[self::FORM_KEY_ALLOW_LOCAL_USER_ASSIGNMENT]);
400 $this->
object->update();
401 $this->rbac_admin->setProtected(
404 $data[self::FORM_KEY_PROTECT] ?
'y' :
'n' 407 $this->tpl->setOnScreenMessage(
'success', $this->
lng->txt(
'saved_successfully'),
true);
408 $this->
ctrl->redirect($this,
'edit');
415 $this->
toolbar->setFormAction($this->
ctrl->getFormAction($this));
416 if ($this->rbac_review->isDeleteable($this->object->getId(),
$this->obj_ref_id)) {
419 $this->ui_factory->button()->standard(
420 $this->
lng->txt(
'rbac_delete_role'),
421 $modal->getShowSignal()
424 $page_content[] = $modal;
428 $page_content[] = $this->ui_factory->panel()->standard(
429 $this->
lng->txt(
'role_edit'),
433 $this->tpl->setContent(
434 $this->ui_renderer->render($page_content)
438 protected function permObject(
bool $a_show_admin_permissions =
false): void
440 $this->tabs_gui->setTabActive(
'default_perm_settings');
444 if (!$this->
checkAccess(
'write',
'edit_permission')) {
445 $this->tpl->setOnScreenMessage(
'failure', $this->
lng->txt(
'msg_no_perm_write'),
true);
446 $this->
ctrl->returnToParent($this);
449 if ($a_show_admin_permissions) {
450 $this->tabs_gui->setSubTabActive(
'rbac_admin_permissions');
452 $this->tabs_gui->setSubTabActive(
'rbac_repository_permissions');
455 $this->tpl->addBlockFile(
458 'tpl.rbac_template_permissions.html',
459 'components/ILIAS/AccessControl' 463 $this->
toolbar->setFormAction($this->
ctrl->getFormAction($this));
465 $this->ui_factory->link()->standard(
466 $this->
lng->txt(
"adopt_perm_from_template"),
467 $this->
ctrl->getLinkTarget($this,
'adoptPerm')
470 if ($this->rbac_review->isDeleteable($this->object->getId(),
$this->obj_ref_id)) {
473 $this->ui_factory->button()->standard(
474 $this->
lng->txt(
'rbac_delete_role'),
475 $modal->getShowSignal()
478 $this->tpl->setVariable(
'DELETION_MODAL', $this->ui_renderer->render($modal));
482 $this->tpl->setVariable(
'PERM_ACTION', $this->
ctrl->getFormAction($this));
489 if ($a_show_admin_permissions) {
490 $subs = ilObjRole::getSubObjects(
'adm',
true);
492 $subs = ilObjRole::getSubObjects(
'root',
false);
495 $subs = ilObjRole::getSubObjects($this->
getParentType(), $a_show_admin_permissions);
498 foreach ($subs as $subtype => $def) {
505 $a_show_admin_permissions
509 $acc->addItem($def[
'translation'], $tbl->getHTML());
512 $this->tpl->setVariable(
'ACCORDION', $acc->getHTML());
520 $a_show_admin_permissions
524 $a_show_admin_permissions ?
'adminPermSave' :
'permSave',
525 $this->
lng->txt(
'save')
530 $this->tpl->setVariable(
'OPTIONS_TABLE', $options->getHTML());
546 $parent_role_ids = $this->rbac_review->getParentRoleIds($this->obj_ref_id,
true);
548 $this->tabs_gui->clearTargets();
551 foreach (array_keys($parent_role_ids) as
$id) {
555 $sorted_ids =
ilUtil::_sortIds($ids,
'object_data',
'type,title',
'obj_id');
557 foreach ($sorted_ids as $id) {
558 $par = $parent_role_ids[
$id];
560 $output[$key][
"role_id"] = $par[
"obj_id"];
561 $output[$key][
"type"] = ($par[
"type"] ==
'role' ? $this->
lng->txt(
'obj_role') : $this->
lng->txt(
'obj_rolt'));
563 $output[$key][
"role_desc"] = $par[
"desc"];
569 $tbl->setTitle($this->
lng->txt(
"adopt_perm_from_template"));
570 $tbl->setData($output);
572 $this->tpl->setContent($tbl->getHTML());
580 $this->tabs_gui->clearTargets();
582 if (!$this->
checkAccess(
'visible,write',
'edit_permission')) {
583 $this->tpl->setOnScreenMessage(
'msg_no_perm_perm', $this->
lng->txt(
'permission_denied'),
true);
584 $this->
ctrl->redirectByClass(ilRepositoryGUI::class);
587 $question = $this->
lng->txt(
'rbac_role_delete_qst');
588 if ($this->rbac_review->isAssigned($this->user->getId(), $this->
object->getId())) {
589 $question .= (
'<br />' . $this->
lng->txt(
'rbac_role_delete_self'));
591 $this->tpl->setOnScreenMessage(
'question', $question);
594 $confirm->setFormAction($this->
ctrl->getFormAction($this));
595 $confirm->setHeaderText($question);
596 $confirm->setCancel($this->
lng->txt(
'cancel'),
'perm');
597 $confirm->setConfirm($this->
lng->txt(
'rbac_delete_role'),
'performDeleteRole');
601 (
string) $this->
object->getId(),
606 $this->tpl->setContent($confirm->getHTML());
614 if (!$this->
checkAccess(
'visible,write',
'edit_permission')) {
615 $this->tpl->setOnScreenMessage(
'msg_no_perm_perm', $this->
lng->txt(
'permission_denied'),
true);
616 $this->
ctrl->redirectByClass(ilRepositoryGUI::class);
619 $this->
object->setParent($this->obj_ref_id);
620 $this->
object->delete();
621 $this->tpl->setOnScreenMessage(
'success', $this->
lng->txt(
'msg_deleted_role'),
true);
623 $this->
ctrl->returnToParent($this);
632 if (!$this->
checkAccess(
'visible,write',
'edit_permission')) {
633 $this->tpl->setOnScreenMessage(
'msg_no_perm_perm', $this->
lng->txt(
'permission_denied'),
true);
634 $this->
ctrl->redirectByClass(ilRepositoryGUI::class);
639 if ($rbac_log_active) {
645 if ($a_show_admin_permissions) {
646 $subs = ilObjRole::getSubObjects(
'adm',
true);
648 $subs = ilObjRole::getSubObjects(
'root',
false);
651 $subs = ilObjRole::getSubObjects($this->
getParentType(), $a_show_admin_permissions);
654 foreach (array_keys($subs) as $subtype) {
660 foreach ($template_permissions as $key => $ops_array) {
665 if ($rbac_log_active) {
672 $this->
object->update();
676 if ($this->
http->wrapper()->post()->has(
'protected')) {
677 $protected = $this->
http->wrapper()->post()->retrieve(
685 $this->rbac_admin->setProtected($this->obj_ref_id, $this->
object->getId(),
ilUtil::tf2yn($protected));
688 if ($this->
http->wrapper()->post()->has(
'recursive')) {
689 $recursive = $this->
http->wrapper()->post()->retrieve(
695 $recursive_list = [];
696 if ($this->
http->wrapper()->post()->has(
'recursive_list')) {
697 $recursive_list = $this->
http->wrapper()->post()->retrieve(
699 $this->
refinery->kindlyTo()->listOf(
700 $this->
refinery->kindlyTo()->string()
704 if ($a_show_admin_permissions) {
709 if (!$recursive && !count($recursive_list)) {
710 $this->tpl->setOnScreenMessage(
'success', $this->
lng->txt(
"saved_successfully"),
true);
711 if ($a_show_admin_permissions) {
712 $this->
ctrl->redirect($this,
'adminPerm');
714 $this->
ctrl->redirect($this,
'perm');
719 ($recursive || count($recursive_list)) &&
721 !$a_show_admin_permissions
728 if ($a_show_admin_permissions) {
729 $start = $this->tree->getParentId($this->obj_ref_id);
733 $this->
object->changeExistingObjects(
740 $this->
object->changeExistingObjects(
747 $this->tpl->setOnScreenMessage(
'success', $this->
lng->txt(
"saved_successfully"),
true);
749 if ($a_show_admin_permissions) {
750 $this->
ctrl->redirect($this,
'adminPerm');
752 $this->
ctrl->redirect($this,
'perm');
759 if ($this->
http->wrapper()->post()->has(
'adopt')) {
760 $source = $this->
http->wrapper()->post()->retrieve(
767 $this->tpl->setOnScreenMessage(
'failure', $this->
lng->txt(
'select_one'));
774 $this->tpl->setOnScreenMessage(
'failure', $this->
lng->txt(
'msg_no_perm_perm'),
true);
776 if ($this->
object->getId() == $source) {
777 $this->tpl->setOnScreenMessage(
'failure', $this->
lng->txt(
"msg_perm_adopted_from_itself"),
true);
780 $parentRoles = $this->rbac_review->getParentRoleIds($this->obj_ref_id,
true);
781 $this->rbac_admin->copyRoleTemplatePermissions(
783 $parentRoles[$source][
"parent"],
790 $this->
object->update();
794 $this->tpl->setOnScreenMessage(
'success', $this->
lng->txt(
"msg_perm_adopted_from1") .
" '" .
796 $this->
lng->txt(
"msg_perm_adopted_from2"),
true);
799 $this->
ctrl->redirect($this,
"perm");
807 if (!$this->
checkAccess(
'edit_userassignment',
'edit_permission')) {
808 $this->tpl->setOnScreenMessage(
'failure', $this->
lng->txt(
'msg_no_perm_assign_user_to_role'),
true);
811 if (!$this->rbac_review->isAssignable($this->object->getId(),
$this->obj_ref_id) &&
813 $this->tpl->setOnScreenMessage(
'failure', $this->
lng->txt(
'err_role_not_assignable'),
true);
816 if ($a_user_ids === []) {
817 $this->
lng->loadLanguageModule(
'search');
818 $this->tpl->setOnScreenMessage(
'failure', $this->
lng->txt(
'search_err_user_not_exist'),
true);
822 $assigned_users_all = $this->rbac_review->assignedUsers($this->
object->getId());
825 $assigned_users_new = array_diff($a_user_ids, array_intersect($a_user_ids, $assigned_users_all));
828 if (count($assigned_users_new) == 0) {
829 $this->tpl->setOnScreenMessage(
'info', $this->
lng->txt(
"rbac_msg_user_already_assigned"),
true);
830 $this->
ctrl->redirect($this,
'userassignment');
834 foreach ($assigned_users_new as
$user_id) {
836 $this->tpl->setOnScreenMessage(
'failure', $this->
lng->txt(
'msg_anonymous_cannot_be_assigned'),
true);
839 $this->rbac_admin->assignUser($this->
object->getId(),
$user_id,
false);
843 $this->
object->update();
845 $this->tpl->setOnScreenMessage(
'success', $this->
lng->txt(
"msg_userassignment_changed"),
true);
846 $this->
ctrl->redirect($this,
'userassignment');
851 if (!$this->
checkAccess(
'edit_userassignment',
'edit_permission')) {
852 $this->
ilias->raiseError(
853 $this->
lng->txt(
"msg_no_perm_assign_user_to_role"),
854 $this->
ilias->error_obj->MESSAGE
858 $selected_users = [];
859 if ($this->
http->wrapper()->query()->has(
'user_id')) {
861 $this->
http->wrapper()->query()->retrieve(
867 if ($this->
http->wrapper()->post()->has(
'user_id')) {
868 $selected_users = $this->
http->wrapper()->post()->retrieve(
870 $this->
refinery->kindlyTo()->listOf(
875 if (count($selected_users) === 0) {
876 $this->
ilias->raiseError($this->
lng->txt(
"no_checkbox"), $this->
ilias->error_obj->MESSAGE);
881 if ($admin = array_search(
SYSTEM_USER_ID, $selected_users) !==
false) {
882 unset($selected_users[$admin]);
888 $global_roles = $this->rbac_review->getGlobalRoles();
889 foreach ($selected_users as
$user) {
890 $assigned_roles = $this->rbac_review->assignedRoles($user);
891 $assigned_global_roles = array_intersect($assigned_roles, $global_roles);
893 if (count($assigned_roles) == 1 || count($assigned_global_roles) == 1 && in_array(
895 $assigned_global_roles
898 $last_role[
$user] = $userObj->getFullName();
904 foreach ($selected_users as $user) {
905 if (!isset($last_role[$user])) {
906 $this->rbac_admin->deassignUser($this->
object->getId(),
$user);
911 $this->
object->update();
914 if ($last_role !== []) {
915 $user_list = implode(
", ", $last_role);
916 $this->tpl->setOnScreenMessage(
'failure', $this->
lng->txt(
'msg_is_last_role') .
': ' . $user_list .
'<br />' . $this->
lng->txt(
'msg_min_one_role'),
true);
918 $this->tpl->setOnScreenMessage(
'success', $this->
lng->txt(
"msg_userassignment_changed"),
true);
920 $this->
ctrl->redirect($this,
'userassignment');
928 if (!$this->
checkAccess(
'edit_userassignment',
'edit_permission')) {
929 $this->tpl->setOnScreenMessage(
930 $this->
lng->txt(
"msg_no_perm_assign_user_to_role"),
935 $this->tabs_gui->setTabActive(
'user_assignment');
937 $this->tpl->addBlockFile(
'ADM_CONTENT',
'adm_content',
'tpl.rbac_ua.html',
'components/ILIAS/AccessControl');
950 'auto_complete_name' => $this->
lng->txt(
'user'),
951 'submit_name' => $this->
lng->txt(
'add')
958 $this->ui_factory->link()->standard(
959 $this->
lng->txt(
'search_user'),
960 $this->
ctrl->getLinkTargetByClass(
'ilRepositorySearchGUI',
'start')
967 $this->ui_factory->link()->standard(
968 $this->
lng->txt(
'role_mailto'),
969 $this->
ctrl->getLinkTarget($this,
'mailToRole')
972 $this->tpl->setVariable(
'BUTTONS_UA', $tb->getHTML());
974 $role_assignment_editable =
true;
978 $role_assignment_editable =
false;
986 $role_assignment_editable,
989 $this->tpl->setVariable(
'TABLE_UA', $ut->getHTML());
997 if ($this->
getAdminMode() === self::ADMIN_MODE_SETTINGS) {
998 parent::addAdminLocatorItems(
true);
1001 $this->
lng->txt(
'obj_' . $this->getParentType()),
1002 $this->
ctrl->getLinkTargetByClass(
"ilobjrolefoldergui",
'view')
1005 if ($this->
object instanceof
ilObjRole) {
1008 $this->
ctrl->getLinkTarget($this,
'perm')
1012 parent::addAdminLocatorItems($do_not_add_object);
1018 $base_role_container = $this->rbac_review->getFoldersAssignedToRole($this->
object->getId(),
true);
1019 $activate_role_edit =
false;
1024 in_array($this->obj_ref_id, $base_role_container) ||
1027 $activate_role_edit =
true;
1031 $this->tabs_gui->clearTargets();
1033 $this->
help->setScreenIdComponent(
'role');
1034 $this->tabs_gui->setBackTarget(
1035 $this->
lng->txt(
'btn_back'),
1036 (string) $this->
ctrl->getParentReturn($this)
1038 if ($this->
checkAccess(
'write',
'edit_permission') && $activate_role_edit) {
1039 $this->tabs_gui->addTarget(
1041 $this->
ctrl->getLinkTarget($this,
"edit"),
1047 $this->tabs_gui->addTarget(
1048 'default_perm_settings',
1049 $this->
ctrl->getLinkTarget($this,
'perm'),
1059 $this->tabs_gui->addTarget(
1061 $this->
ctrl->getLinkTarget($this,
'userassignment'),
1062 [
'deassignUser',
'userassignment',
'assignUser',
'searchUserForm',
'search'],
1071 $this->
lng->loadLanguageModule(
'rep');
1072 $this->tabs_gui->addTarget(
1073 'rep_recommended_content',
1074 $this->
ctrl->getLinkTargetByClass(
'ilrecommendedcontentroleconfiggui',
'')
1077 if ($this->
checkAccess(
'write',
'edit_permission')) {
1078 $this->tabs_gui->addTarget(
1080 $this->
ctrl->getLinkTargetByClass(
'ilExportGUI'),
1091 if (count($obj_ids) > 1) {
1092 $mail_roles[] =
'#il_role_' . $this->
object->getId();
1094 $mail_roles[] = (new \ilRoleMailboxAddress($this->
object->getId()))->value();
1101 public function checkAccess(
string $a_perm_global,
string $a_perm_obj =
''): bool
1103 $a_perm_obj = $a_perm_obj ?: $a_perm_global;
1106 return $this->rbac_system->checkAccess($a_perm_global, $this->obj_ref_id);
1108 return $this->
access->checkAccess($a_perm_obj,
'', $this->obj_ref_id);
1118 if ($this->rbac_review->isProtected($this->obj_ref_id, $this->object->getId())) {
1121 return count($this->rbac_review->getFoldersAssignedToRole($this->object->getId())) > 1;
1125 return count($this->rbac_review->getFoldersAssignedToRole($this->object->getId())) > 1;
1136 if ($this->
http->wrapper()->post()->has(
'protected')) {
1137 $protected = $this->
http->wrapper()->post()->retrieve(
1139 $this->
refinery->kindlyTo()->bool()
1143 $form->setFormAction($this->
ctrl->getFormAction($this,
'changeExistingObjects'));
1144 $form->setTitle($this->
lng->txt(
'rbac_change_existing_confirm_tbl'));
1146 $form->addCommandButton(
'changeExistingObjects', $this->
lng->txt(
'change_existing_objects'));
1147 $form->addCommandButton(
'perm', $this->
lng->txt(
'cancel'));
1150 $hidden->setValue($recursive ? json_encode([
'all']) : json_encode($recursive_list));
1151 $form->addItem($hidden);
1158 $this->
lng->txt(
'rbac_keep_local_policies'),
1160 $this->
lng->txt(
'rbac_keep_local_policies_info')
1165 $this->
lng->txt(
'rbac_keep_local_policies'),
1166 (string) ilObjRole::MODE_UNPROTECTED_KEEP_LOCAL_POLICIES,
1167 $this->
lng->txt(
'rbac_unprotected_keep_local_policies_info')
1170 $rad->addOption($keep);
1174 $this->
lng->txt(
'rbac_delete_local_policies'),
1176 $this->
lng->txt(
'rbac_delete_local_policies_info')
1180 $this->
lng->txt(
'rbac_delete_local_policies'),
1182 $this->
lng->txt(
'rbac_unprotected_delete_local_policies_info')
1185 $rad->addOption($del);
1187 $form->addItem($rad);
1188 $this->tpl->setContent($form->getHTML());
1194 if ($this->
http->wrapper()->post()->has(
'mode')) {
1195 $mode = $this->
http->wrapper()->post()->retrieve(
1203 if ($this->
http->wrapper()->post()->has(
'type_filter')) {
1204 $serialized_type_filter = $this->
http->wrapper()->post()->retrieve(
1206 $this->
refinery->kindlyTo()->string()
1208 $type_filter = json_decode(
1209 $serialized_type_filter,
1214 $this->
object->changeExistingObjects($start, $mode, $type_filter);
1215 $this->tpl->setOnScreenMessage(
'success', $this->
lng->txt(
'settings_saved'),
true);
1216 $this->
ctrl->redirect($this,
'perm');
1222 case 'default_perm_settings':
1226 $this->tabs_gui->addSubTabTarget(
1227 'rbac_repository_permissions',
1228 $this->
ctrl->getLinkTarget($this,
'perm')
1230 $this->tabs_gui->addSubTabTarget(
1231 'rbac_admin_permissions',
1232 $this->
ctrl->getLinkTarget($this,
'adminPerm')
1243 if ($this->
http->wrapper()->post()->has(
'user_id')) {
1244 $users = $this->
http->wrapper()->post()->retrieve(
1246 $this->
refinery->kindlyTo()->listOf(
1251 if (count($users) === 0) {
1252 $this->tpl->setOnScreenMessage(
'failure', $this->
lng->txt(
'select_one'),
true);
1253 $this->
ctrl->redirect($this,
'userassignment');
1259 $this->
lng->loadLanguageModule(
'user');
1260 $this->tpl->setOnScreenMessage(
'success', $this->
lng->txt(
'clipboard_user_added'),
true);
1261 $this->
ctrl->redirect($this,
'userassignment');
1270 $this->
ctrl->setParameterByClass(
1277 $this->
ctrl->getLinkTargetByClass(
1296 !$this->
object->getId() ||
1302 $possible_roles = [];
1304 $possible_roles = $this->rbac_review->getRolesOfObject(
1309 $this->
logger->warning(
'Role access check failed: ' . $e);
1310 throw new \ilObjectException($this->
lng->txt(
'permission_denied'));
1313 if (!in_array($this->
object->getId(), $possible_roles)) {
1315 throw new \ilObjectException($this->
lng->txt(
'permission_denied'));
1322 $message = $this->
lng->txt(
'rbac_role_delete_qst');
1323 if ($this->rbac_review->isAssigned($this->user->getId(), $this->
object->getId())) {
1324 $message .= (
'<br />' . $this->
lng->txt(
'rbac_role_delete_self'));
1326 return $this->ui_factory->modal()->interruptive(
1327 $this->
lng->txt(
'confirm'),
1329 $this->
ctrl->getFormActionByClass(self::class,
'performDeleteRole')
1330 )->withAffectedItems([
1331 $this->ui_factory->modal()->interruptiveItem()->standard(
1332 (
string) $this->
object->getId(),
1333 $this->
object->getTitle()
static get(string $a_var)
This class represents an option in a radio group.
getRoleForm(bool $is_role_creation_form=false)
Copy Permission Settings.
addToClipboardObject()
Add selected users to user clipboard.
const FORM_KEY_DESCRIPTION
Table for object role permissions.
prepareOutput(bool $show_sub_objects=true)
const MODE_PROTECTED_DELETE_LOCAL_POLICIES
static newInstance(int $a_export_id)
const SYSTEM_USER_ID
This file contains constants for PHPStan analyis, see: https://phpstan.org/config-reference#constants...
addUserObject(array $a_user_ids)
checkAccess(string $a_perm_global, string $a_perm_obj='')
ensureRoleAccessForContext()
Ensure access to role for ref_id.
showChangeExistingObjectsConfirmation(bool $recursive, array $recursive_list)
Show confirmation screen.
parse()
Parse permissions.
Table for object role permissions.
const MODE_PROTECTED_KEEP_LOCAL_POLICIES
static _lookupObjId(int $ref_id)
permSaveObject(bool $a_show_admin_permissions=false)
save permissions public
permObject(bool $a_show_admin_permissions=false)
while($session_entry=$r->fetchRow(ilDBConstants::FETCHMODE_ASSOC)) return null
saveObject()
Save new role.
retrieveTemplatePermissionsFromPost()
static gatherTemplate(int $role_ref_id, int $role_id)
static http()
Fetches the global http state from ILIAS.
static _lookupTitle(int $obj_id)
buildEditPage(?StandardForm $form=null)
confirmDeleteRoleObject()
Show delete confirmation screen.
isChangeExistingObjectsConfirmationRequired()
Check if a confirmation about further settings is required or not.
getParentObjId()
Get obj_id of current object.
performDeleteRoleObject()
Delete role.
static _getTranslation(string $a_role_title)
Class ilObjectGUI Basic methods of all Output classes.
setValue(string $a_value)
getParentType()
get type of current object (not role folder)
const FORM_KEY_ON_REGISTRATION_FORM
static getImagePath(string $image_name, string $module_path="", string $mode="output", bool $offline=false)
get image path (for images located in a template directory)
Class ilObjForumAdministration.
showDefaultPermissionSettings()
check if default permissions are shown or not
static _getIdsForTitle(string $title, string $type='', bool $partial_match=false)
static _sortIds(array $a_ids, string $a_table, string $a_field, string $a_id_name)
Function that sorts ids by a given table field using WHERE IN E.g: __sort(array(6,7),'usr_data','lastname','usr_id') => sorts by lastname.
static redirect(string $a_script)
static add(int $action, int $ref_id, array $diff, bool $source_ref_id=false)
getParentRefId()
Get ref id of current object (not role folder id)
changeExistingObjectsObject()
const FORM_KEY_ALLOW_LOCAL_USER_ASSIGNMENT
userassignmentObject()
display user assignment panel
const MODE_UNPROTECTED_DELETE_LOCAL_POLICIES
addAdminLocatorItems(bool $do_not_add_object=false)
static fillAutoCompleteToolbar(object $parent_object, ?ilToolbarGUI $toolbar=null, array $a_options=[], bool $a_sticky=false)
array( auto_complete_name = $lng->txt('user'), auto_complete_size = 15, user_type = array(ilCoursePar...
__construct(Container $dic, ilPlugin $plugin)
const MODE_UNPROTECTED_KEEP_LOCAL_POLICIES
static diffTemplate(array $old, array $new)
TableGUI class for role administration.
getAdminTabs()
admin and normal tabs are equal for roles
This file is part of ILIAS, a powerful learning management system published by ILIAS open source e-Le...
static _lookupType(int $id, bool $reference=false)
static allocateExportId()
This file is part of ILIAS, a powerful learning management system published by ILIAS open source e-Le...
addMultiCommand(string $a_cmd, string $a_text)
updateObject()
Save role settings.
static _getInstance()
Get instance of ilSecuritySettings.
static set(string $a_var, $a_val)
Set a value.
getContainerType()
Get type of role container.
static getInstance(int $a_usr_id)