2007-11-22 01:57:12 +01:00
|
|
|
<?php
|
|
|
|
/**
|
2016-04-27 21:12:20 +02:00
|
|
|
* EGroupware admin - admin command base class
|
2007-11-22 01:57:12 +01:00
|
|
|
*
|
|
|
|
* @link http://www.egroupware.org
|
|
|
|
* @author Ralf Becker <RalfBecker-AT-outdoor-training.de>
|
|
|
|
* @package admin
|
2018-06-04 11:49:24 +02:00
|
|
|
* @copyright (c) 2007-18 by Ralf Becker <RalfBecker-AT-outdoor-training.de>
|
2007-11-22 01:57:12 +01:00
|
|
|
* @license http://opensource.org/licenses/gpl-license.php GPL - GNU General Public License
|
|
|
|
*/
|
|
|
|
|
2016-04-27 21:12:20 +02:00
|
|
|
use EGroupware\Api;
|
|
|
|
use EGroupware\Api\Acl;
|
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
2018-08-02 11:40:02 +02:00
|
|
|
* Admin comand base class
|
|
|
|
*
|
|
|
|
* Admin commands should be used to implement and log (!) all actions admins carry
|
|
|
|
* out using the administrative rights (regular users cant do).
|
|
|
|
*
|
|
|
|
* They are stored in DB table egw_admin_queue which builds a persitent log
|
|
|
|
* of administrative actions cared out on an EGroupware installation.
|
|
|
|
* Commands can be marked deleted (canceled for scheduled commands),
|
|
|
|
* but they are never deleted for the table to implement a persistent log!
|
|
|
|
*
|
|
|
|
* All administrative actions are encapsulated in classes derived from this
|
|
|
|
* abstract base class implementing an exec method to carry out the command.
|
|
|
|
*
|
|
|
|
* @property-read int $created Creation timestamp
|
|
|
|
* @property-read int $creator Creator user-id
|
|
|
|
* @property-read string $creator_email rfc822 address ("Name <email@domain.com>") of creator
|
|
|
|
* @property-read int $modified Modification timestamp
|
|
|
|
* @property-read int|NULL $scheduled timestamp if command is not run immediatly,
|
|
|
|
* but scheduled to run automatic by the system at a later point in time
|
|
|
|
* @property-read int $modifier Modifier user-id
|
|
|
|
* @property-read string $modifier_email rfc822 address ("Name <email@domain.com>") of modifier
|
|
|
|
* @property int|NULL $requested User who requested the change (not current user!)
|
|
|
|
* @property string|NULL $requested_email rfc822 address ("Name <email@domain.com>") of requested
|
|
|
|
* @property string|NULL $comment comment, eg. reasoning why change was requested
|
|
|
|
* @property-read int|NULL $errno Numerical error-code or NULL on success
|
|
|
|
* @property-read string|NULL $error Error message or NULL on success
|
|
|
|
* @property-read int $id $id of command/row in egw_admin_queue table
|
|
|
|
* @property-read string $uid uuid of command (necessary if command is send to a remote system to execute)
|
|
|
|
* @property int|NULL $remote_id id of remote system, if command is not meant to run on local system
|
|
|
|
* foreign key into egw_admin_remote (table of remote systems administrated by this one)
|
2018-08-28 17:06:04 +02:00
|
|
|
* @property-read int $account account_id of user affected by this cmd or NULL
|
|
|
|
* @property-read string $app app-name affected by this cmd or NULL
|
2018-09-18 16:24:09 +02:00
|
|
|
* @property-read string $parent parent cmd (with rrule) of single periodic execution
|
|
|
|
* @property-read string $rrule rrule for periodic execution
|
|
|
|
* @property int $rrule_start optional start timestamp for rrule, default $created time
|
|
|
|
* @property string async_job_id optional name of async job for periodic-run, default "admin-cmd-$id"
|
2007-11-22 01:57:12 +01:00
|
|
|
*/
|
|
|
|
abstract class admin_cmd
|
|
|
|
{
|
2008-01-09 03:04:30 +01:00
|
|
|
const deleted = 0;
|
|
|
|
const scheduled = 1;
|
2007-11-22 01:57:12 +01:00
|
|
|
const successful = 2;
|
2008-01-09 03:04:30 +01:00
|
|
|
const failed = 3;
|
|
|
|
const pending = 4;
|
|
|
|
const queued = 5; // command waits to be fetched from remote
|
2007-12-19 00:11:53 +01:00
|
|
|
|
2016-05-07 18:55:15 +02:00
|
|
|
/**
|
|
|
|
* Status which stil need passwords available
|
|
|
|
*
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
static $require_pw_stati = array(self::scheduled,self::pending,self::queued);
|
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
|
|
|
* The status of the command, one of either scheduled, successful, failed or deleted
|
2013-06-12 18:57:44 +02:00
|
|
|
*
|
2007-11-22 01:57:12 +01:00
|
|
|
* @var int
|
|
|
|
*/
|
2018-09-18 16:24:09 +02:00
|
|
|
protected $status = self::successful;
|
2007-11-22 01:57:12 +01:00
|
|
|
|
|
|
|
static $stati = array(
|
2007-12-05 03:27:49 +01:00
|
|
|
admin_cmd::scheduled => 'scheduled',
|
2007-11-22 01:57:12 +01:00
|
|
|
admin_cmd::successful => 'successful',
|
|
|
|
admin_cmd::failed => 'failed',
|
|
|
|
admin_cmd::deleted => 'deleted',
|
2007-12-19 00:11:53 +01:00
|
|
|
admin_cmd::pending => 'pending',
|
2008-01-09 03:04:30 +01:00
|
|
|
admin_cmd::queued => 'queued',
|
2007-11-22 01:57:12 +01:00
|
|
|
);
|
|
|
|
|
|
|
|
protected $created;
|
|
|
|
protected $creator;
|
|
|
|
protected $creator_email;
|
|
|
|
private $scheduled;
|
|
|
|
private $modified;
|
|
|
|
private $modifier;
|
|
|
|
private $modifier_email;
|
2007-12-19 00:11:53 +01:00
|
|
|
protected $error;
|
|
|
|
protected $errno;
|
2007-11-22 01:57:12 +01:00
|
|
|
public $requested;
|
|
|
|
public $requested_email;
|
|
|
|
public $comment;
|
|
|
|
private $id;
|
2007-12-05 03:27:49 +01:00
|
|
|
protected $uid;
|
2007-11-22 01:57:12 +01:00
|
|
|
private $type = __CLASS__;
|
2007-11-23 21:04:26 +01:00
|
|
|
public $remote_id;
|
2018-08-28 17:06:04 +02:00
|
|
|
protected $account;
|
|
|
|
protected $app;
|
2018-09-18 16:24:09 +02:00
|
|
|
protected $rrule;
|
|
|
|
protected $parent;
|
2007-11-23 21:04:26 +01:00
|
|
|
|
2018-06-04 11:49:24 +02:00
|
|
|
/**
|
|
|
|
* Display name of command, default ucfirst(str_replace(['_cmd_', '_'], ' ', __CLASS__))
|
|
|
|
*/
|
|
|
|
const NAME = null;
|
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
|
|
|
* Stores the data of the derived classes
|
|
|
|
*
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
private $data = array();
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
2016-04-27 21:12:20 +02:00
|
|
|
* Instance of the Api\Accounts class, after calling instanciate_accounts!
|
2007-11-22 01:57:12 +01:00
|
|
|
*
|
2016-04-27 21:12:20 +02:00
|
|
|
* @var Api\Accounts
|
2007-11-22 01:57:12 +01:00
|
|
|
*/
|
|
|
|
static protected $accounts;
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
2016-04-27 21:12:20 +02:00
|
|
|
* Instance of the Acl class, after calling instanciate_acl!
|
2007-11-22 01:57:12 +01:00
|
|
|
*
|
2016-04-27 21:12:20 +02:00
|
|
|
* @var Acl
|
2007-11-22 01:57:12 +01:00
|
|
|
*/
|
|
|
|
static protected $acl;
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
2016-04-27 21:12:20 +02:00
|
|
|
* Instance of Api\Storage\Base for egw_admin_queue
|
2007-11-22 01:57:12 +01:00
|
|
|
*
|
2016-04-27 21:12:20 +02:00
|
|
|
* @var Api\Storage\Base
|
2007-11-22 01:57:12 +01:00
|
|
|
*/
|
|
|
|
static private $sql;
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-23 21:04:26 +01:00
|
|
|
/**
|
2016-04-27 21:12:20 +02:00
|
|
|
* Instance of Api\Storage\Base for egw_admin_remote
|
2007-11-23 21:04:26 +01:00
|
|
|
*
|
2016-04-27 21:12:20 +02:00
|
|
|
* @var Api\Storage\Base
|
2007-11-23 21:04:26 +01:00
|
|
|
*/
|
|
|
|
static private $remote;
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
|
|
|
* Executes the command
|
2013-06-12 18:57:44 +02:00
|
|
|
*
|
2016-04-27 21:12:20 +02:00
|
|
|
* @param boolean $check_only =false only run the checks (and throw the exceptions), but not the command itself
|
2007-11-22 01:57:12 +01:00
|
|
|
* @return string success message
|
|
|
|
* @throws Exception()
|
|
|
|
*/
|
2007-11-27 04:20:28 +01:00
|
|
|
protected abstract function exec($check_only=false);
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
|
|
|
* Return a title / string representation for a given command, eg. to display it
|
|
|
|
*
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
function __tostring()
|
|
|
|
{
|
|
|
|
return $this->type;
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2018-06-04 11:49:24 +02:00
|
|
|
/**
|
|
|
|
* Generate human readable name of object
|
|
|
|
*
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public static function name()
|
|
|
|
{
|
|
|
|
if (self::NAME) return self::NAME;
|
|
|
|
|
|
|
|
return ucfirst(str_replace(['_cmd_', '_', '\\'], ' ', get_called_class()));
|
|
|
|
}
|
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
|
|
|
* Constructor
|
|
|
|
*
|
|
|
|
* @param array $data class vars as array
|
|
|
|
*/
|
|
|
|
function __construct(array $data)
|
|
|
|
{
|
|
|
|
$this->created = time();
|
|
|
|
$this->creator = $GLOBALS['egw_info']['user']['account_id'];
|
|
|
|
$this->creator_email = admin_cmd::user_email();
|
|
|
|
|
|
|
|
$this->type = get_class($this);
|
|
|
|
|
|
|
|
foreach($data as $name => $value)
|
|
|
|
{
|
2015-02-14 18:05:16 +01:00
|
|
|
$this->$name = $name == 'data' && !is_array($value) ? json_php_unserialize($value) : $value;
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|
|
|
|
//_debug_array($this); exit;
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
|
|
|
* runs the command either immediatly ($time=null) or shedules it for the given time
|
|
|
|
*
|
|
|
|
* The command will be written to the database queue, incl. its scheduled start time or execution status
|
|
|
|
*
|
2016-04-27 21:12:20 +02:00
|
|
|
* @param int $time =null timestamp to run the command or null to run it immediatly
|
|
|
|
* @param boolean $set_modifier =null should the current user be set as modifier, default true
|
|
|
|
* @param booelan $skip_checks =false do not yet run the checks for a scheduled command
|
|
|
|
* @param boolean $dry_run =false only run checks, NOT command itself
|
2007-12-06 09:00:41 +01:00
|
|
|
* @return mixed return value of the command
|
|
|
|
* @throws Exceptions on error
|
2007-11-22 01:57:12 +01:00
|
|
|
*/
|
2013-06-12 18:57:44 +02:00
|
|
|
function run($time=null,$set_modifier=true,$skip_checks=false,$dry_run=false)
|
2007-11-22 01:57:12 +01:00
|
|
|
{
|
|
|
|
if (!is_null($time))
|
|
|
|
{
|
|
|
|
$this->scheduled = $time;
|
|
|
|
$this->status = admin_cmd::scheduled;
|
|
|
|
$ret = lang('Command scheduled to run at %1',date('Y-m-d H:i',$time));
|
2007-11-27 04:20:28 +01:00
|
|
|
// running the checks of the arguments for local commands, if not explicitly requested to not run them
|
|
|
|
if (!$this->remote_id && !$skip_checks)
|
|
|
|
{
|
|
|
|
try {
|
|
|
|
$this->exec(true);
|
|
|
|
}
|
|
|
|
catch (Exception $e) {
|
2018-09-28 12:59:01 +02:00
|
|
|
_egw_log_exception($e);
|
2007-11-27 04:20:28 +01:00
|
|
|
$this->error = $e->getMessage();
|
|
|
|
$ret = $this->errno = $e->getCode();
|
|
|
|
$this->status = admin_cmd::failed;
|
|
|
|
$dont_save = true;
|
|
|
|
}
|
|
|
|
}
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
try {
|
2007-11-23 21:04:26 +01:00
|
|
|
if (!$this->remote_id)
|
|
|
|
{
|
2013-06-12 18:57:44 +02:00
|
|
|
$ret = $this->exec($dry_run);
|
2007-11-23 21:04:26 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2013-06-12 18:57:44 +02:00
|
|
|
$ret = $this->remote_exec($dry_run);
|
2007-11-23 21:04:26 +01:00
|
|
|
}
|
2007-12-19 00:11:53 +01:00
|
|
|
if (is_null($this->status)) $this->status = admin_cmd::successful;
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|
|
|
|
catch (Exception $e) {
|
2018-09-28 12:59:01 +02:00
|
|
|
_egw_log_exception($e);
|
2007-11-22 01:57:12 +01:00
|
|
|
$this->error = $e->getMessage();
|
|
|
|
$ret = $this->errno = $e->getCode();
|
|
|
|
$this->status = admin_cmd::failed;
|
|
|
|
}
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
if (!$dont_save && !$dry_run && !$this->save($set_modifier))
|
2007-11-22 01:57:12 +01:00
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
throw new Api\Db\Exception(lang('Error saving the command!'));
|
2007-12-06 09:00:41 +01:00
|
|
|
}
|
|
|
|
if ($e instanceof Exception)
|
|
|
|
{
|
|
|
|
throw $e;
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|
|
|
|
return $ret;
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-23 21:04:26 +01:00
|
|
|
/**
|
|
|
|
* Runs a command on a remote install
|
2013-06-12 18:57:44 +02:00
|
|
|
*
|
2007-11-23 21:04:26 +01:00
|
|
|
* This is a very basic remote procedure call to an other egw instance.
|
|
|
|
* The payload / command data is send as POST request to the remote installs admin/remote.php script.
|
|
|
|
* The remote domain (eGW instance) and the secret authenticating the request are send as GET parameters.
|
|
|
|
*
|
2013-06-12 18:57:44 +02:00
|
|
|
* To authenticate with the installation we use a secret, which is a md5 hash build from the uid
|
|
|
|
* of the command (to not allow to send new commands with an earsdroped secret) and the md5 hash
|
2007-11-23 21:04:26 +01:00
|
|
|
* of the md5 hash of the config password and the install_id (egw_admin_remote.remote_hash)
|
2013-06-12 18:57:44 +02:00
|
|
|
*
|
2007-11-23 21:04:26 +01:00
|
|
|
* @return string sussess message
|
2016-04-27 21:12:20 +02:00
|
|
|
* @throws Exception(lang('Invalid remote id or name "%1"!',$this->remote_id),997) or other Exceptions reported from remote
|
2007-11-23 21:04:26 +01:00
|
|
|
*/
|
2008-01-09 03:04:30 +01:00
|
|
|
protected function remote_exec()
|
2007-11-23 21:04:26 +01:00
|
|
|
{
|
2008-01-09 03:04:30 +01:00
|
|
|
if (!($remote = $this->read_remote($this->remote_id)))
|
2007-11-23 21:04:26 +01:00
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
throw new Api\Exception\WrongUserinput(lang('Invalid remote id or name "%1"!',$this->remote_id),997);
|
2007-11-23 21:04:26 +01:00
|
|
|
}
|
|
|
|
if (!$this->uid)
|
|
|
|
{
|
|
|
|
$this->save(); // to get the uid
|
|
|
|
}
|
|
|
|
$secret = md5($this->uid.$remote['remote_hash']);
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2008-01-09 03:04:30 +01:00
|
|
|
$postdata = $this->as_array();
|
|
|
|
if (is_object($GLOBALS['egw']->translation))
|
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
$postdata = Api\Translation::convert($postdata,Api\Translation::charset(),'utf-8');
|
2008-01-09 03:04:30 +01:00
|
|
|
}
|
2007-11-23 21:04:26 +01:00
|
|
|
// dont send the id's which have no meaning on the remote install
|
|
|
|
foreach(array('id','creator','modifier','requested','remote_id') as $name)
|
|
|
|
{
|
|
|
|
unset($postdata[$name]);
|
|
|
|
}
|
|
|
|
$opts = array('http' =>
|
|
|
|
array(
|
|
|
|
'method' => 'POST',
|
|
|
|
'header' => 'Content-type: application/x-www-form-urlencoded',
|
|
|
|
'content' => http_build_query($postdata),
|
|
|
|
)
|
|
|
|
);
|
|
|
|
$url = $remote['remote_url'].'/admin/remote.php?domain='.urlencode($remote['remote_domain']).'&secret='.urlencode($secret);
|
|
|
|
//echo "sending command to $url\n"; _debug_array($opts);
|
2016-04-27 21:12:20 +02:00
|
|
|
$http_response_header = null;
|
2007-12-19 00:11:53 +01:00
|
|
|
if (!($message = @file_get_contents($url, false, stream_context_create($opts))))
|
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
throw new Api\Exception(lang('Could not remote execute the command').': '.$http_response_header[0]);
|
2007-12-19 00:11:53 +01:00
|
|
|
}
|
2007-11-23 21:04:26 +01:00
|
|
|
//echo "got: $message\n";
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2015-02-14 18:05:16 +01:00
|
|
|
if (($value = json_php_unserialize($message)) !== false && $message !== serialize(false))
|
2007-12-06 09:00:41 +01:00
|
|
|
{
|
|
|
|
$message = $value;
|
|
|
|
}
|
2008-01-09 03:04:30 +01:00
|
|
|
if (is_object($GLOBALS['egw']->translation))
|
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
$message = Api\Translation::convert($message,'utf-8');
|
2008-01-09 03:04:30 +01:00
|
|
|
}
|
2016-04-27 21:12:20 +02:00
|
|
|
$matches = null;
|
2007-12-06 09:00:41 +01:00
|
|
|
if (is_string($message) && preg_match('/^([0-9]+) (.*)$/',$message,$matches))
|
2007-11-23 21:04:26 +01:00
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
throw new Api\Exception($matches[2],(int)$matches[1]);
|
2007-11-23 21:04:26 +01:00
|
|
|
}
|
|
|
|
return $message;
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
|
|
|
* Delete / canncels a scheduled command
|
|
|
|
*
|
|
|
|
* @return boolean true on success, false otherwise
|
|
|
|
*/
|
|
|
|
function delete()
|
|
|
|
{
|
2019-01-23 17:37:27 +01:00
|
|
|
$this->cancel_periodic_job();
|
2007-11-22 01:57:12 +01:00
|
|
|
if ($this->status != admin_cmd::scheduled) return false;
|
|
|
|
|
|
|
|
$this->status = admin_cmd::deleted;
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
return $this->save();
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
|
|
|
* Saving the object to the database
|
|
|
|
*
|
2016-04-27 21:12:20 +02:00
|
|
|
* @param boolean $set_modifier =true set the current user as modifier or 0 (= run by the system)
|
2007-11-22 01:57:12 +01:00
|
|
|
* @return boolean true on success, false otherwise
|
|
|
|
*/
|
|
|
|
function save($set_modifier=true)
|
|
|
|
{
|
|
|
|
admin_cmd::_instanciate_sql();
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2008-01-09 03:04:30 +01:00
|
|
|
// check if uid already exists --> set the id to not try to insert it again (resulting in SQL error)
|
|
|
|
if (!$this->id && $this->uid && (list($other) = self::$sql->search(array('cmd_uid' => $this->uid))))
|
|
|
|
{
|
|
|
|
$this->id = $other['id'];
|
|
|
|
}
|
2007-11-22 01:57:12 +01:00
|
|
|
if (!is_null($this->id))
|
|
|
|
{
|
|
|
|
$this->modified = time();
|
|
|
|
$this->modifier = $set_modifier ? $GLOBALS['egw_info']['user']['account_id'] : 0;
|
|
|
|
if ($set_modifier) $this->modifier_email = admin_cmd::user_email();
|
|
|
|
}
|
2018-06-04 11:49:24 +02:00
|
|
|
$vars = get_object_vars($this); // does not work in php5.1.2 due a bug
|
|
|
|
|
2016-05-07 18:55:15 +02:00
|
|
|
// data is stored serialized
|
|
|
|
// paswords are masked / removed, if we dont need them anymore
|
|
|
|
$vars['data'] = in_array($this->status, self::$require_pw_stati) ?
|
|
|
|
json_encode($this->data) : self::mask_passwords($this->data);
|
2007-11-22 01:57:12 +01:00
|
|
|
|
2018-08-02 11:40:02 +02:00
|
|
|
// skip EGroupware\\ prefix in new class-names, as value gets too long for column otherwise
|
|
|
|
if (strpos($this->type, 'EGroupware\\') === 0)
|
|
|
|
{
|
|
|
|
$vars['type'] = substr($this->type, 11);
|
|
|
|
}
|
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
admin_cmd::$sql->init($vars);
|
|
|
|
if (admin_cmd::$sql->save() != 0)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
2007-12-19 00:11:53 +01:00
|
|
|
if (!$this->id)
|
2007-11-22 01:57:12 +01:00
|
|
|
{
|
|
|
|
$this->id = admin_cmd::$sql->data['id'];
|
|
|
|
// if the cmd has no uid yet, we create one from our id and the install-id of this eGW instance
|
|
|
|
if (!$this->uid)
|
|
|
|
{
|
|
|
|
$this->uid = $this->id.'-'.$GLOBALS['egw_info']['server']['install_id'];
|
|
|
|
admin_cmd::$sql->save(array('uid' => $this->uid));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// install an async job, if we saved a scheduled job
|
2019-01-28 23:29:25 +01:00
|
|
|
if ($this->status == admin_cmd::scheduled && empty($this->rrule))
|
2007-11-22 01:57:12 +01:00
|
|
|
{
|
|
|
|
admin_cmd::_set_async_job();
|
|
|
|
}
|
2018-09-18 16:24:09 +02:00
|
|
|
// schedule periodic execution, if we have an rrule
|
2019-01-28 23:29:25 +01:00
|
|
|
elseif (!empty($this->rrule) && $this->status != admin_cmd::deleted)
|
2018-09-18 16:24:09 +02:00
|
|
|
{
|
|
|
|
$this->set_periodic_job();
|
|
|
|
}
|
|
|
|
// existing object with no rrule, cancle evtl. running periodic job
|
|
|
|
elseif($vars['id'])
|
|
|
|
{
|
|
|
|
$this->cancel_periodic_job();
|
|
|
|
}
|
2007-11-22 01:57:12 +01:00
|
|
|
return true;
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2016-05-07 18:55:15 +02:00
|
|
|
/**
|
|
|
|
* Mask / remove passwords in $data
|
|
|
|
*
|
|
|
|
* @param string|array $data json or php-encoded string or array
|
|
|
|
* @param boolean $return_serialized =true true: return json serialized string, false: return array
|
|
|
|
* @return string|array see $return_serialized
|
|
|
|
*/
|
|
|
|
static function mask_passwords($data, $return_serialized=true)
|
|
|
|
{
|
|
|
|
if (!is_array($data))
|
|
|
|
{
|
|
|
|
$data = json_php_unserialize($data);
|
|
|
|
}
|
|
|
|
foreach($data as $key => &$value)
|
|
|
|
{
|
|
|
|
if (is_array($value))
|
|
|
|
{
|
|
|
|
$value = self::mask_passwords($value, false);
|
|
|
|
}
|
|
|
|
elseif (preg_match('/(pw|passwd_?\d*|(?<!change)password|db_pass)$/i', $key))
|
|
|
|
{
|
|
|
|
$value = str_repeat('*', strlen($value));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $return_serialized ? json_encode($data) : $data;
|
|
|
|
}
|
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
2018-09-18 16:24:09 +02:00
|
|
|
* Reading a command from the queue returning the comand object
|
2007-11-22 01:57:12 +01:00
|
|
|
*
|
2013-06-12 18:57:44 +02:00
|
|
|
* @static
|
2016-04-27 21:12:20 +02:00
|
|
|
* @param int|string $id id or uid of the command
|
2007-11-22 01:57:12 +01:00
|
|
|
* @return admin_cmd or null if record not found
|
2018-09-18 16:24:09 +02:00
|
|
|
* @throws Api\Exception\WrongParameter if class does not exist or is no instance of admin_cmd
|
2007-11-22 01:57:12 +01:00
|
|
|
*/
|
|
|
|
static function read($id)
|
|
|
|
{
|
|
|
|
admin_cmd::_instanciate_sql();
|
|
|
|
|
|
|
|
$keys = is_numeric($id) ? array('id' => $id) : array('uid' => $id);
|
|
|
|
if (!($data = admin_cmd::$sql->read($keys)))
|
|
|
|
{
|
|
|
|
return $data;
|
|
|
|
}
|
|
|
|
return admin_cmd::instanciate($data);
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
|
|
|
* Instanciated the object / subclass using the given data
|
|
|
|
*
|
2013-06-12 18:57:44 +02:00
|
|
|
* @static
|
2007-11-22 01:57:12 +01:00
|
|
|
* @param array $data
|
|
|
|
* @return admin_cmd
|
2016-04-27 21:12:20 +02:00
|
|
|
* @throws Api\Exception\WrongParameter if class does not exist or is no instance of admin_cmd
|
2007-11-22 01:57:12 +01:00
|
|
|
*/
|
|
|
|
static function instanciate(array $data)
|
|
|
|
{
|
|
|
|
if (isset($data['data']) && !is_array($data['data']))
|
|
|
|
{
|
2015-02-14 18:05:16 +01:00
|
|
|
$data['data'] = json_php_unserialize($data['data']);
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|
2018-06-04 11:49:24 +02:00
|
|
|
if (!(class_exists($class = 'EGroupware\\'.$data['type']) || // namespaced class
|
|
|
|
class_exists($class = $data['type'])) || $data['type'] == 'admin_cmd')
|
2007-11-22 01:57:12 +01:00
|
|
|
{
|
2019-02-26 16:38:05 +01:00
|
|
|
throw new Api\Exception\WrongParameter(lang('Unknown command %1!',$class), 10);
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|
|
|
|
$cmd = new $class($data);
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
if ($cmd instanceof admin_cmd) // dont allow others classes to be executed that way!
|
|
|
|
{
|
|
|
|
return $cmd;
|
|
|
|
}
|
2019-02-26 16:38:05 +01:00
|
|
|
throw new Api\Exception\WrongParameter(lang('%1 is no command!',$class), 10);
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
2016-04-27 21:12:20 +02:00
|
|
|
* calling get_rows of our static Api\Storage\Base instance
|
2007-11-22 01:57:12 +01:00
|
|
|
*
|
2013-06-12 18:57:44 +02:00
|
|
|
* @static
|
2007-11-22 01:57:12 +01:00
|
|
|
* @param array $query
|
|
|
|
* @param array &$rows
|
|
|
|
* @param array $readonlys
|
|
|
|
* @return int
|
|
|
|
*/
|
|
|
|
static function get_rows($query,&$rows,$readonlys)
|
|
|
|
{
|
|
|
|
admin_cmd::_instanciate_sql();
|
|
|
|
|
2007-11-24 20:56:58 +01:00
|
|
|
if ((string)$query['col_filter']['remote_id'] === '0')
|
|
|
|
{
|
|
|
|
$query['col_filter']['remote_id'] = null;
|
|
|
|
}
|
2018-09-25 21:17:52 +02:00
|
|
|
if ((string)$query['col_filter']['periodic'] === '0')
|
|
|
|
{
|
|
|
|
$query['col_filter']['rrule'] = null;
|
|
|
|
}
|
|
|
|
else if ((string)$query['col_filter']['periodic'] === '1')
|
|
|
|
{
|
|
|
|
$query['col_filter'][] = 'cmd_rrule IS NOT NULL';
|
|
|
|
}
|
|
|
|
unset($query['col_filter']['periodic']);
|
|
|
|
|
2019-01-14 15:26:04 +01:00
|
|
|
$total = admin_cmd::$sql->get_rows($query,$rows,$readonlys);
|
|
|
|
|
|
|
|
if (!$rows) return 0;
|
|
|
|
|
|
|
|
$async = new Api\Asyncservice();
|
|
|
|
foreach($rows as &$row)
|
|
|
|
{
|
|
|
|
try {
|
|
|
|
$cmd = admin_cmd::instanciate($row);
|
|
|
|
$row['title'] = $cmd->__tostring(); // we call __tostring explicit, as a cast to string requires php5.2+
|
|
|
|
}
|
|
|
|
catch (Exception $e) {
|
|
|
|
$row['title'] = $e->getMessage();
|
|
|
|
}
|
|
|
|
|
|
|
|
$row['value'] = $cmd->value;
|
|
|
|
|
|
|
|
if(method_exists($cmd, 'summary'))
|
|
|
|
{
|
|
|
|
$row['data'] = $cmd->summary();
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
$row['data'] = !($data = json_php_unserialize($row['data'])) ? '' :
|
|
|
|
json_encode($data+(empty($row['rrule'])?array():array('rrule' => $row['rrule'])),
|
|
|
|
JSON_PRETTY_PRINT|JSON_UNESCAPED_UNICODE|JSON_UNESCAPED_SLASHES);
|
|
|
|
}
|
|
|
|
if($row['rrule'])
|
|
|
|
{
|
|
|
|
$rrule = calendar_rrule::event2rrule(calendar_rrule::parseRrule($row['rrule'],true)+array(
|
|
|
|
'start' => time(),
|
|
|
|
'tzid'=> Api\DateTime::$server_timezone->getName()
|
|
|
|
));
|
|
|
|
$row['rrule'] = ''.$rrule;
|
|
|
|
}
|
|
|
|
if(!$row['scheduled'] && $cmd && $cmd->async_job_id)
|
|
|
|
{
|
|
|
|
$job = $async->read($cmd->async_job_id);
|
|
|
|
|
|
|
|
$row['scheduled'] = $job ? $job[$cmd->async_job_id]['next'] : null;
|
|
|
|
}
|
|
|
|
if ($row['status'] == admin_cmd::scheduled)
|
|
|
|
{
|
|
|
|
$row['class'] = 'AllowDelete';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $total;
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|
|
|
|
|
2018-06-04 11:49:24 +02:00
|
|
|
/**
|
|
|
|
* Get list of stored or available (admin) cmd classes/types
|
|
|
|
*
|
|
|
|
* @return array class => label pairs
|
|
|
|
*/
|
|
|
|
static function get_cmd_labels()
|
|
|
|
{
|
|
|
|
return Api\Cache::getInstance(__CLASS__, 'cmd_labels', function()
|
|
|
|
{
|
|
|
|
admin_cmd::_instanciate_sql();
|
|
|
|
|
|
|
|
$labels = admin_cmd::$sql->query_list('cmd_type');
|
|
|
|
|
|
|
|
// for admin app we also add all available cmd objects
|
|
|
|
foreach(scandir(__DIR__) as $file)
|
|
|
|
{
|
|
|
|
$matches = null;
|
|
|
|
if (preg_match('/^class\.(admin_cmd_.*)\.inc\.php$/', $file, $matches))
|
|
|
|
{
|
|
|
|
if (!isset($labels[$matches[1]]))
|
|
|
|
{
|
|
|
|
$labels[$matches[1]] = $matches[1];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
foreach($labels as $class => &$label)
|
|
|
|
{
|
2019-01-23 18:41:52 +01:00
|
|
|
if(class_exists($class))
|
|
|
|
{
|
|
|
|
$label = $class::name();
|
|
|
|
}
|
2018-06-04 11:49:24 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// sort them alphabetic
|
|
|
|
uasort($labels, function($a, $b)
|
|
|
|
{
|
|
|
|
return strcasecmp($a, $b);
|
|
|
|
});
|
|
|
|
|
|
|
|
return $labels;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
2016-04-27 21:12:20 +02:00
|
|
|
* calling search method of our static Api\Storage\Base instance
|
2007-11-22 01:57:12 +01:00
|
|
|
*
|
2013-06-12 18:57:44 +02:00
|
|
|
* @static
|
2016-04-27 21:12:20 +02:00
|
|
|
* @param array|string $criteria array of key and data cols, OR a SQL query (content for WHERE), fully quoted (!)
|
|
|
|
* @param boolean|string|array $only_keys =true True returns only keys, False returns all cols. or
|
2007-11-22 01:57:12 +01:00
|
|
|
* comma seperated list or array of columns to return
|
2016-04-27 21:12:20 +02:00
|
|
|
* @param string $order_by ='' fieldnames + {ASC|DESC} separated by colons ',', can also contain a GROUP BY (if it contains ORDER BY)
|
|
|
|
* @param string|array $extra_cols ='' string or array of strings to be added to the SELECT, eg. "count(*) as num"
|
|
|
|
* @param string $wildcard ='' appended befor and after each criteria
|
|
|
|
* @param boolean $empty =false False=empty criteria are ignored in query, True=empty have to be empty in row
|
|
|
|
* @param string $op ='AND' defaults to 'AND', can be set to 'OR' too, then criteria's are OR'ed together
|
|
|
|
* @param mixed $start =false if != false, return only maxmatch rows begining with start, or array($start,$num), or 'UNION' for a part of a union query
|
|
|
|
* @param array $filter =null if set (!=null) col-data pairs, to be and-ed (!) into the query without wildcards
|
2007-11-22 01:57:12 +01:00
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
static function &search($criteria,$only_keys=True,$order_by='',$extra_cols='',$wildcard='',$empty=False,$op='AND',$start=false,$filter=null)
|
|
|
|
{
|
|
|
|
admin_cmd::_instanciate_sql();
|
|
|
|
|
|
|
|
return admin_cmd::$sql->search($criteria,$only_keys,$order_by,$extra_cols,$wildcard,$empty,$op,$start,$filter);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2016-04-27 21:12:20 +02:00
|
|
|
* Instanciate our static Api\Storage\Base object for egw_admin_queue
|
2007-11-22 01:57:12 +01:00
|
|
|
*
|
2013-06-12 18:57:44 +02:00
|
|
|
* @static
|
2007-11-22 01:57:12 +01:00
|
|
|
*/
|
|
|
|
private static function _instanciate_sql()
|
|
|
|
{
|
|
|
|
if (is_null(admin_cmd::$sql))
|
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
admin_cmd::$sql = new Api\Storage\Base('admin','egw_admin_queue',null,'cmd_');
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-23 21:04:26 +01:00
|
|
|
/**
|
2016-04-27 21:12:20 +02:00
|
|
|
* Instanciate our static Api\Storage\Base object for egw_admin_remote
|
2007-11-23 21:04:26 +01:00
|
|
|
*
|
2013-06-12 18:57:44 +02:00
|
|
|
* @static
|
2007-11-23 21:04:26 +01:00
|
|
|
*/
|
|
|
|
private static function _instanciate_remote()
|
|
|
|
{
|
|
|
|
if (is_null(admin_cmd::$remote))
|
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
admin_cmd::$remote = new Api\Storage\Base('admin','egw_admin_remote');
|
2007-11-23 21:04:26 +01:00
|
|
|
}
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
|
|
|
* magic method to read a property, all non admin-cmd properties are stored in the data array
|
2013-06-12 18:57:44 +02:00
|
|
|
*
|
2007-11-22 01:57:12 +01:00
|
|
|
* @param string $property
|
|
|
|
* @return mixed
|
|
|
|
*/
|
|
|
|
function __get($property)
|
|
|
|
{
|
|
|
|
if (property_exists('admin_cmd',$property))
|
|
|
|
{
|
|
|
|
return $this->$property; // making all (non static) class vars readonly available
|
|
|
|
}
|
2007-12-19 00:11:53 +01:00
|
|
|
switch($property)
|
|
|
|
{
|
|
|
|
case 'accounts':
|
|
|
|
self::_instanciate_accounts();
|
|
|
|
return self::$accounts;
|
2017-03-13 16:40:22 +01:00
|
|
|
case 'data':
|
|
|
|
return $this->data;
|
2007-12-19 00:11:53 +01:00
|
|
|
}
|
2007-11-22 01:57:12 +01:00
|
|
|
return $this->data[$property];
|
|
|
|
}
|
2007-12-13 03:34:44 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* magic method to check if a property is set, all non admin-cmd properties are stored in the data array
|
2013-06-12 18:57:44 +02:00
|
|
|
*
|
2007-12-13 03:34:44 +01:00
|
|
|
* @param string $property
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
function __isset($property)
|
|
|
|
{
|
|
|
|
if (property_exists('admin_cmd',$property))
|
|
|
|
{
|
|
|
|
return isset($this->$property); // making all (non static) class vars readonly available
|
|
|
|
}
|
|
|
|
return isset($this->data[$property]);
|
|
|
|
}
|
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
|
|
|
* magic method to set a property, all non admin-cmd properties are stored in the data array
|
|
|
|
*
|
|
|
|
* @param string $property
|
|
|
|
* @param mixed $value
|
|
|
|
* @return mixed
|
|
|
|
*/
|
2009-06-08 18:21:14 +02:00
|
|
|
function __set($property,$value)
|
2007-11-22 01:57:12 +01:00
|
|
|
{
|
|
|
|
$this->data[$property] = $value;
|
|
|
|
}
|
2007-12-13 03:34:44 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* magic method to unset a property, all non admin-cmd properties are stored in the data array
|
|
|
|
*
|
|
|
|
* @param string $property
|
|
|
|
*/
|
2009-06-08 18:21:14 +02:00
|
|
|
function __unset($property)
|
2007-12-13 03:34:44 +01:00
|
|
|
{
|
|
|
|
unset($this->data[$property]);
|
|
|
|
}
|
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
|
|
|
* Return the whole object-data as array, it's a cast of the object to an array
|
|
|
|
*
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
function as_array()
|
|
|
|
{
|
2007-12-21 00:56:06 +01:00
|
|
|
if (version_compare(PHP_VERSION,'5.1.2','>'))
|
|
|
|
{
|
|
|
|
$vars = get_object_vars($this); // does not work in php5.1.2 due a bug
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
foreach(array_keys(get_class_vars(__CLASS__)) as $name)
|
|
|
|
{
|
|
|
|
$vars[$name] = $this->$name;
|
|
|
|
}
|
|
|
|
}
|
2007-11-22 01:57:12 +01:00
|
|
|
unset($vars['data']);
|
2008-01-09 03:04:30 +01:00
|
|
|
if ($this->data) $vars = array_merge($this->data,$vars);
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
return $vars;
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
|
|
|
* Check if the creator is still admin and has the neccessary admin rights
|
|
|
|
*
|
2016-04-27 21:12:20 +02:00
|
|
|
* @param string $extra_acl =null further admin rights to check, eg. 'account_access'
|
|
|
|
* @param int $extra_deny =null further admin rights to check, eg. 16 = deny edit Api\Accounts
|
|
|
|
* @throws Api\Exception\NoPermission\Admin
|
2007-11-22 01:57:12 +01:00
|
|
|
*/
|
|
|
|
protected function _check_admin($extra_acl=null,$extra_deny=null)
|
|
|
|
{
|
|
|
|
if ($this->creator)
|
|
|
|
{
|
|
|
|
admin_cmd::_instanciate_acl($this->creator);
|
|
|
|
// todo: check only if and with $this->creator
|
|
|
|
if (!admin_cmd::$acl->check('run',1,'admin') && // creator is no longer admin
|
|
|
|
$extra_acl && $extra_deny && admin_cmd::$acl->check($extra_acl,$extra_deny,'admin')) // creator is explicitly forbidden to do something
|
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
throw new Api\Exception\NoPermission\Admin();
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* parse application names, titles or localised names and return array of app-names
|
|
|
|
*
|
|
|
|
* @param array $apps names, titles or localised names
|
|
|
|
* @return array of app-names
|
2016-04-27 21:12:20 +02:00
|
|
|
* @throws Api\Exception\WrongUserinput lang("Application '%1' not found (maybe not installed or misspelled)!",$name),8
|
2007-11-22 01:57:12 +01:00
|
|
|
*/
|
2007-11-27 04:20:28 +01:00
|
|
|
static function parse_apps(array $apps)
|
2007-11-22 01:57:12 +01:00
|
|
|
{
|
|
|
|
foreach($apps as $key => $name)
|
|
|
|
{
|
|
|
|
if (!isset($GLOBALS['egw_info']['apps'][$name]))
|
|
|
|
{
|
|
|
|
foreach($GLOBALS['egw_info']['apps'] as $app => $data) // check against title and localised name
|
|
|
|
{
|
|
|
|
if (!strcasecmp($name,$data['title']) || !strcasecmp($name,lang($app)))
|
|
|
|
{
|
|
|
|
$apps[$key] = $name = $app;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!isset($GLOBALS['egw_info']['apps'][$name]))
|
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
throw new Api\Exception\WrongUserinput(lang("Application '%1' not found (maybe not installed or misspelled)!",$name),8);
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return $apps;
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
|
|
|
* parse account name or id
|
|
|
|
*
|
2016-04-27 21:12:20 +02:00
|
|
|
* @param string|int $account account_id or account_lid
|
|
|
|
* @param boolean $allow_only_user =null true=only user, false=only groups, default both
|
2007-11-27 04:20:28 +01:00
|
|
|
* @return int/array account_id
|
2019-02-26 16:38:05 +01:00
|
|
|
* @throws Api\Exception\WrongUserinput(lang("Unknown account: %1 !!!",$account), 15);
|
|
|
|
* @throws Api\Exception\WrongUserinput(lang("Wrong account type: %1 is NO %2 !!!",$account,$allow_only_user?lang('user'):lang('group')), 16);
|
2007-11-22 01:57:12 +01:00
|
|
|
*/
|
2007-11-27 04:20:28 +01:00
|
|
|
static function parse_account($account,$allow_only_user=null)
|
2007-11-22 01:57:12 +01:00
|
|
|
{
|
2007-11-27 04:20:28 +01:00
|
|
|
admin_cmd::_instanciate_accounts();
|
|
|
|
|
2013-06-12 18:57:44 +02:00
|
|
|
if (!($type = admin_cmd::$accounts->exists($account)) ||
|
2007-11-22 01:57:12 +01:00
|
|
|
!is_numeric($id=$account) && !($id = admin_cmd::$accounts->name2id($account)))
|
|
|
|
{
|
2019-02-26 16:38:05 +01:00
|
|
|
throw new Api\Exception\WrongUserinput(lang("Unknown account: %1 !!!",$account), 15);
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|
2007-11-27 04:20:28 +01:00
|
|
|
if (!is_null($allow_only_user) && $allow_only_user !== ($type == 1))
|
2007-11-22 01:57:12 +01:00
|
|
|
{
|
2019-02-26 16:38:05 +01:00
|
|
|
throw new Api\Exception\WrongUserinput(lang("Wrong account type: %1 is NO %2 !!!",$account,$allow_only_user?lang('user'):lang('group')), 16);
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|
|
|
|
if ($type == 2 && $id > 0) $id = -$id; // groups use negative id's internally, fix it, if user given the wrong sign
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
return $id;
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-27 04:20:28 +01:00
|
|
|
/**
|
|
|
|
* parse account names or ids
|
|
|
|
*
|
2016-04-27 21:12:20 +02:00
|
|
|
* @param string|int|array $accounts array or comma-separated account_id's or account_lid's
|
|
|
|
* @param boolean $allow_only_user =null true=only user, false=only groups, default both
|
2007-11-27 04:20:28 +01:00
|
|
|
* @return array of account_id's or null if none specified
|
2019-02-26 16:38:05 +01:00
|
|
|
* @throws Api\Exception\WrongUserinput(lang("Unknown account: %1 !!!",$account), 15);
|
|
|
|
* @throws Api\Exception\WrongUserinput(lang("Wrong account type: %1 is NO %2 !!!",$account,$allow_only?lang('user'):lang('group')), 16);
|
2007-11-27 04:20:28 +01:00
|
|
|
*/
|
|
|
|
static function parse_accounts($accounts,$allow_only_user=null)
|
|
|
|
{
|
|
|
|
if (!$accounts) return null;
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-27 04:20:28 +01:00
|
|
|
$ids = array();
|
|
|
|
foreach(is_array($accounts) ? $accounts : explode(',',$accounts) as $account)
|
|
|
|
{
|
|
|
|
$ids[] = admin_cmd::parse_account($account,$allow_only_user);
|
|
|
|
}
|
|
|
|
return $ids;
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
|
|
|
* Parses a date into an integer timestamp
|
|
|
|
*
|
|
|
|
* @param string $date
|
|
|
|
* @return int timestamp
|
2016-04-27 21:12:20 +02:00
|
|
|
* @throws Api\Exception\WrongUserinput(lang('Invalid formated date "%1"!',$datein),6);
|
2007-11-22 01:57:12 +01:00
|
|
|
*/
|
|
|
|
static function parse_date($date)
|
|
|
|
{
|
|
|
|
if (!is_numeric($date)) // we allow to input a timestamp
|
|
|
|
{
|
|
|
|
$datein = $date;
|
|
|
|
// convert german DD.MM.YYYY format into ISO YYYY-MM-DD format
|
|
|
|
$date = preg_replace('/^([0-9]{1,2})\.([0-9]{1,2})\.([0-9]{4})$/','\3-\2-\1',$date);
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
if (($date = strtotime($date)) === false)
|
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
throw new Api\Exception\WrongUserinput(lang('Invalid formated date "%1"!',$datein),6);
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return (int)$date;
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-27 04:20:28 +01:00
|
|
|
/**
|
|
|
|
* Parse a boolean value
|
|
|
|
*
|
2014-03-18 16:10:57 +01:00
|
|
|
* @param string|boolean|int $value
|
2016-04-27 21:12:20 +02:00
|
|
|
* @param boolean $default =null
|
2007-11-27 04:20:28 +01:00
|
|
|
* @return boolean
|
2016-04-27 21:12:20 +02:00
|
|
|
* @throws Api\Exception\WrongUserinput(lang('Invalid value "%1" use yes or no!',$value),998);
|
2007-11-27 04:20:28 +01:00
|
|
|
*/
|
|
|
|
static function parse_boolean($value,$default=null)
|
|
|
|
{
|
2014-03-18 16:10:57 +01:00
|
|
|
if (is_bool($value) || is_int($value))
|
|
|
|
{
|
|
|
|
return (boolean)$value;
|
|
|
|
}
|
2007-11-27 04:20:28 +01:00
|
|
|
if (is_null($value) || (string)$value === '')
|
|
|
|
{
|
|
|
|
return $default;
|
|
|
|
}
|
|
|
|
if (in_array($value,array('1','yes','true',lang('yes'),lang('true'))))
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
if (in_array($value,array('0','no','false',lang('no'),lang('false'))))
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
2016-04-27 21:12:20 +02:00
|
|
|
throw new Api\Exception\WrongUserinput(lang('Invalid value "%1" use yes or no!',$value),998);
|
2007-11-27 04:20:28 +01:00
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-23 21:04:26 +01:00
|
|
|
/**
|
|
|
|
* Parse a remote id or name and return the remote_id
|
|
|
|
*
|
|
|
|
* @param string $id_or_name
|
|
|
|
* @return int remote_id
|
2016-04-27 21:12:20 +02:00
|
|
|
* @throws Api\Exception\WrongUserinput(lang('Invalid remote id or name "%1"!',$id_or_name),997);
|
2007-11-23 21:04:26 +01:00
|
|
|
*/
|
|
|
|
static function parse_remote($id_or_name)
|
|
|
|
{
|
|
|
|
admin_cmd::_instanciate_remote();
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-23 21:04:26 +01:00
|
|
|
if (!($remotes = admin_cmd::$remote->search(array(
|
|
|
|
'remote_id' => $id_or_name,
|
|
|
|
'remote_name' => $id_or_name,
|
2007-11-24 20:56:58 +01:00
|
|
|
'remote_domain' => $id_or_name,
|
2007-11-23 21:04:26 +01:00
|
|
|
),true,'','','',false,'OR')) || count($remotes) != 1)
|
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
throw new Api\Exception\WrongUserinput(lang('Invalid remote id or name "%1"!',$id_or_name),997);
|
2007-11-23 21:04:26 +01:00
|
|
|
}
|
|
|
|
return $remotes[0]['remote_id'];
|
|
|
|
}
|
2007-11-22 01:57:12 +01:00
|
|
|
|
|
|
|
/**
|
2016-04-27 21:12:20 +02:00
|
|
|
* Instanciated Api\Accounts class
|
2007-11-22 01:57:12 +01:00
|
|
|
*
|
2016-04-27 21:12:20 +02:00
|
|
|
* @todo Api\Accounts class instanciation for setup
|
|
|
|
* @throws Api\Exception\AssertionFailed(lang('%1 class not instanciated','accounts'),999);
|
2007-11-22 01:57:12 +01:00
|
|
|
*/
|
2007-12-19 00:11:53 +01:00
|
|
|
static function _instanciate_accounts()
|
2007-11-22 01:57:12 +01:00
|
|
|
{
|
|
|
|
if (!is_object(admin_cmd::$accounts))
|
|
|
|
{
|
|
|
|
if (!is_object($GLOBALS['egw']->accounts))
|
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
throw new Api\Exception\AssertionFailed(lang('%1 class not instanciated','accounts'),999);
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|
|
|
|
admin_cmd::$accounts = $GLOBALS['egw']->accounts;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2016-04-27 21:12:20 +02:00
|
|
|
* Instanciated Acl class
|
2007-11-22 01:57:12 +01:00
|
|
|
*
|
2016-04-27 21:12:20 +02:00
|
|
|
* @todo Acl class instanciation for setup
|
|
|
|
* @param int $account =null account_id the class needs to be instanciated for, default need only account-independent methods
|
|
|
|
* @throws Api\Exception\AssertionFailed(lang('%1 class not instanciated','acl'),999);
|
2007-11-22 01:57:12 +01:00
|
|
|
*/
|
|
|
|
protected function _instanciate_acl($account=null)
|
|
|
|
{
|
|
|
|
if (!is_object(admin_cmd::$acl) || $account && admin_cmd::$acl->account_id != $account)
|
|
|
|
{
|
|
|
|
if (!is_object($GLOBALS['egw']->acl))
|
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
throw new Api\Exception\AssertionFailed(lang('%1 class not instanciated','acl'),999);
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|
|
|
|
if ($account && $GLOBALS['egw']->acl->account_id != $account)
|
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
admin_cmd::$acl = new Acl($account);
|
2007-11-22 01:57:12 +01:00
|
|
|
admin_cmd::$acl->read_repository();
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
admin_cmd::$acl = $GLOBALS['egw']->acl;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
|
|
|
* RFC822 email address of the an account, eg. "Ralf Becker <RalfBecker@egroupware.org>"
|
|
|
|
*
|
2016-04-27 21:12:20 +02:00
|
|
|
* @param $account_id =null account_id, default current user
|
2007-11-22 01:57:12 +01:00
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
static function user_email($account_id=null)
|
|
|
|
{
|
|
|
|
if ($account_id)
|
|
|
|
{
|
|
|
|
admin_cmd::_instanciate_accounts();
|
|
|
|
$fullname = admin_cmd::$accounts->id2name($account_id,'account_fullname');
|
|
|
|
$email = admin_cmd::$accounts->id2name($account_id,'account_email');
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
$fullname = $GLOBALS['egw_info']['user']['account_fullname'];
|
|
|
|
$email = $GLOBALS['egw_info']['user']['account_email'];
|
|
|
|
}
|
|
|
|
return $fullname . ($email ? ' <'.$email.'>' : '');
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
|
|
|
* Semaphore to not permanently set new jobs, while we running the current ones
|
|
|
|
*
|
|
|
|
* @var boolean
|
|
|
|
*/
|
|
|
|
private static $running_queued_jobs = false;
|
|
|
|
const async_job_id = 'admin-command-queue';
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Setup an async job to run the next scheduled command
|
2013-06-12 18:57:44 +02:00
|
|
|
*
|
2007-11-22 01:57:12 +01:00
|
|
|
* Only needs to be called if a new command gets scheduled
|
2013-06-12 18:57:44 +02:00
|
|
|
*
|
2007-11-22 01:57:12 +01:00
|
|
|
* @return boolean true if job installed, false if not necessary
|
|
|
|
*/
|
|
|
|
private static function _set_async_job()
|
|
|
|
{
|
|
|
|
if (admin_cmd::$running_queued_jobs)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (!($jobs = admin_cmd::search(array(),false,'cmd_scheduled','','',false,'AND',array(0,1),array(
|
|
|
|
'cmd_status' => admin_cmd::scheduled,
|
|
|
|
))))
|
|
|
|
{
|
|
|
|
return false; // no schduled command, no need to setup the job
|
|
|
|
}
|
|
|
|
$next = $jobs[0];
|
|
|
|
if (($time = $next['scheduled']) < time()) // should run immediatly
|
|
|
|
{
|
|
|
|
return admin_cmd::run_queued_jobs();
|
|
|
|
}
|
2016-05-09 11:15:48 +02:00
|
|
|
$async = new Api\Asyncservice();
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
// we cant use this class as callback, as it's abstract and ExecMethod used by the async service instanciated the class!
|
|
|
|
list($app) = explode('_',$class=$next['type']);
|
|
|
|
$callback = $app.'.'.$class.'.run_queued_jobs';
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
$async->cancel_timer(admin_cmd::async_job_id); // we delete it in case a job already exists
|
|
|
|
return $async->set_timer($time,admin_cmd::async_job_id,$callback,null,$next['creator']);
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
/**
|
|
|
|
* Callback for our async job
|
|
|
|
*
|
|
|
|
* @return boolean true if new job got installed, false if not necessary
|
|
|
|
*/
|
|
|
|
static function run_queued_jobs()
|
|
|
|
{
|
|
|
|
if (!($jobs = admin_cmd::search(array(),false,'cmd_scheduled','','',false,'AND',false,array(
|
|
|
|
'cmd_status' => admin_cmd::scheduled,
|
|
|
|
'cmd_scheduled <= '.time(),
|
|
|
|
))))
|
|
|
|
{
|
|
|
|
return false; // no schduled commands, no need to setup the job
|
|
|
|
}
|
|
|
|
admin_cmd::$running_queued_jobs = true; // stop admin_cmd::run() which calls admin_cmd::save() to install a new job
|
|
|
|
|
|
|
|
foreach($jobs as $job)
|
|
|
|
{
|
|
|
|
try {
|
|
|
|
$cmd = admin_cmd::instanciate($job);
|
|
|
|
$cmd->run(null,false); // false = dont set current user as modifier, as job is run by the queue/system itself
|
|
|
|
}
|
|
|
|
catch (Exception $e) { // we need to mark that command as failed, to prevent further execution
|
2018-09-28 12:59:01 +02:00
|
|
|
_egw_log_exception($e);
|
2007-11-22 01:57:12 +01:00
|
|
|
admin_cmd::$sql->init($job);
|
|
|
|
admin_cmd::$sql->save(array(
|
|
|
|
'status' => admin_cmd::failed,
|
2018-06-04 11:49:24 +02:00
|
|
|
'error' => $e->getMessage(),
|
|
|
|
'errno' => $e->getcode(),
|
2016-05-07 18:55:15 +02:00
|
|
|
'data' => self::mask_passwords($job['data']),
|
2007-11-22 01:57:12 +01:00
|
|
|
));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
admin_cmd::$running_queued_jobs = false;
|
|
|
|
|
|
|
|
return admin_cmd::_set_async_job();
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2018-09-18 16:24:09 +02:00
|
|
|
const PERIOD_ASYNC_ID_PREFIX = 'admin-cmd-';
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Schedule next execution of a periodic job
|
|
|
|
*
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public function set_periodic_job()
|
|
|
|
{
|
|
|
|
if (empty($this->rrule)) return false;
|
|
|
|
|
|
|
|
// parse rrule and calculate next execution time
|
|
|
|
$event = calendar_rrule::parseRrule($this->rrule, true); // true: allow HOURLY or MINUTELY
|
|
|
|
// rrule can depend on start-time, use policy creation time by default, if rrule_start is not set
|
|
|
|
$event['start'] = empty($this->rrule_start) ? $this->created : $this->rrule_start;
|
|
|
|
$event['tzid'] = Api\DateTime::$server_timezone->getName();
|
|
|
|
$rrule = calendar_rrule::event2rrule($event, false); // false = server timezone
|
|
|
|
$rrule->rewind();
|
|
|
|
while((($time = $rrule->current()->format('ts'))) <= time())
|
|
|
|
{
|
|
|
|
$rrule->next();
|
|
|
|
}
|
|
|
|
|
|
|
|
// schedule run_periodic_job to run at that time
|
|
|
|
$async = new Api\Asyncservice();
|
|
|
|
$job_id = empty($this->async_job_id) ? self::PERIOD_ASYNC_ID_PREFIX.$this->id : $this->async_job_id;
|
|
|
|
$async->cancel_timer($job_id); // we delete it in case a job already exists
|
|
|
|
return $async->set_timer($time, $job_id, __CLASS__.'::run_periodic_job', $this->as_array(), $this->creator);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Cancel evtl. existing periodic job
|
|
|
|
*
|
|
|
|
* @return boolean true if job was canceled, false otherwise
|
|
|
|
*/
|
2019-01-23 17:37:27 +01:00
|
|
|
public function cancel_periodic_job()
|
2018-09-18 16:24:09 +02:00
|
|
|
{
|
|
|
|
$async = new Api\Asyncservice();
|
|
|
|
$job_id = empty($this->async_job_id) ? self::PERIOD_ASYNC_ID_PREFIX.$this->id : $this->async_job_id;
|
|
|
|
$async->cancel_timer($job_id); // we delete it in case a job already exists
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Run a periodic job, record it's result and schedule next run
|
|
|
|
*/
|
|
|
|
static function run_periodic_job($data)
|
|
|
|
{
|
|
|
|
$cmd = admin_cmd::read($data['id']);
|
|
|
|
|
|
|
|
// schedule next execution
|
|
|
|
$cmd->set_periodic_job();
|
|
|
|
|
|
|
|
// instanciate single periodic execution object
|
|
|
|
$single = $cmd->as_array();
|
|
|
|
$single['parent'] = $single['id'];
|
2018-09-25 21:17:52 +02:00
|
|
|
unset($single['id'], $single['uid'], $single['rrule'], $single['created'], $single['modified'], $single['modifier'], $single['async_job_id']);
|
2018-09-18 16:24:09 +02:00
|
|
|
$periodic = admin_cmd::instanciate($single);
|
|
|
|
|
|
|
|
try {
|
2018-09-25 21:17:52 +02:00
|
|
|
$value = $periodic->run(null, false);
|
2018-09-18 16:24:09 +02:00
|
|
|
}
|
|
|
|
catch (Exception $ex) {
|
2018-09-28 12:59:01 +02:00
|
|
|
_egw_log_exception($ex);
|
2018-09-18 16:24:09 +02:00
|
|
|
error_log(__METHOD__."(".array2string($data).") periodic execution failed: ".$ex->getMessage());
|
|
|
|
}
|
2018-09-25 21:17:52 +02:00
|
|
|
$periodic->value = $value;
|
|
|
|
$periodic->save();
|
2018-09-18 16:24:09 +02:00
|
|
|
}
|
|
|
|
|
2007-11-24 20:56:58 +01:00
|
|
|
/**
|
|
|
|
* Return a list of defined remote instances
|
|
|
|
*
|
|
|
|
* @return array remote_id => remote_name pairs, plus 0 => local
|
|
|
|
*/
|
|
|
|
static function remote_sites()
|
|
|
|
{
|
|
|
|
admin_cmd::_instanciate_remote();
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-12-13 03:34:44 +01:00
|
|
|
$sites = array(lang('local'));
|
2016-04-27 21:12:20 +02:00
|
|
|
if (($remote = admin_cmd::$remote->query_list('remote_name','remote_id')))
|
2007-12-13 03:34:44 +01:00
|
|
|
{
|
|
|
|
$sites = array_merge($sites,$remote);
|
|
|
|
}
|
|
|
|
return $sites;
|
2007-11-24 20:56:58 +01:00
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-24 20:56:58 +01:00
|
|
|
/**
|
|
|
|
* get_rows for remote instances
|
|
|
|
*
|
|
|
|
* @param array $query
|
|
|
|
* @param array &$rows
|
|
|
|
* @param array &$readonlys
|
|
|
|
* @return int
|
|
|
|
*/
|
|
|
|
static function get_remotes($query,&$rows,&$readonlys)
|
|
|
|
{
|
|
|
|
admin_cmd::_instanciate_remote();
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-24 20:56:58 +01:00
|
|
|
return admin_cmd::$remote->get_rows($query,$rows,$readonlys);
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-24 20:56:58 +01:00
|
|
|
/**
|
|
|
|
* Read data of a remote instance
|
|
|
|
*
|
2016-04-27 21:12:20 +02:00
|
|
|
* @param array|int $keys
|
2007-11-24 20:56:58 +01:00
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
static function read_remote($keys)
|
|
|
|
{
|
|
|
|
admin_cmd::_instanciate_remote();
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-24 20:56:58 +01:00
|
|
|
return admin_cmd::$remote->read($keys);
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-24 20:56:58 +01:00
|
|
|
/**
|
|
|
|
* Save / adds a remote instance
|
|
|
|
*
|
|
|
|
* @param array $data
|
2007-12-05 03:27:49 +01:00
|
|
|
* @return int remote_id
|
2007-11-24 20:56:58 +01:00
|
|
|
*/
|
|
|
|
static function save_remote(array $data)
|
|
|
|
{
|
|
|
|
admin_cmd::_instanciate_remote();
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-24 20:56:58 +01:00
|
|
|
if ($data['install_id'] && $data['config_passwd']) // calculate hash
|
|
|
|
{
|
2007-12-07 01:03:31 +01:00
|
|
|
$data['remote_hash'] = self::remote_hash($data['install_id'],$data['config_passwd']);
|
2007-11-24 20:56:58 +01:00
|
|
|
}
|
2007-12-19 00:11:53 +01:00
|
|
|
elseif (!$data['remote_hash'] && !($data['install_id'] && $data['config_passwd']))
|
2007-11-24 20:56:58 +01:00
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
throw new Api\Exception\WrongUserinput(lang('Either Install ID AND Api\Config password needed OR the remote hash!'));
|
2007-11-24 20:56:58 +01:00
|
|
|
}
|
|
|
|
//_debug_array($data);
|
|
|
|
admin_cmd::$remote->init($data);
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-12-20 03:47:37 +01:00
|
|
|
// check if a unique key constrain would be violated by saving the entry
|
|
|
|
if (($num = admin_cmd::$remote->not_unique()))
|
|
|
|
{
|
2007-12-21 00:56:06 +01:00
|
|
|
$col = admin_cmd::$remote->table_def['uc'][$num-1]; // $num is 1 based!
|
|
|
|
throw new egw_exception_db_not_unique(lang('Value for column %1 is not unique!',$this->table_name.'.'.$col),$num);
|
2007-12-20 03:47:37 +01:00
|
|
|
}
|
2007-12-05 03:27:49 +01:00
|
|
|
if (admin_cmd::$remote->save() != 0)
|
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
throw new Api\Db\Exception(lang('Error saving to db:').' '.$this->sql->db->Error.' ('.$this->sql->db->Errno.')',$this->sql->db->Errno);
|
2007-12-05 03:27:49 +01:00
|
|
|
}
|
|
|
|
return admin_cmd::$remote->data['remote_id'];
|
2007-11-24 20:56:58 +01:00
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-12-07 01:03:31 +01:00
|
|
|
/**
|
|
|
|
* Calculate the remote hash from install_id and config_passwd
|
|
|
|
*
|
|
|
|
* @param string $install_id
|
|
|
|
* @param string $config_passwd
|
|
|
|
* @return string 32char md5 hash
|
|
|
|
*/
|
|
|
|
static function remote_hash($install_id,$config_passwd)
|
|
|
|
{
|
|
|
|
if (empty($config_passwd) || !self::is_md5($install_id))
|
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
throw new Api\Exception\WrongParameter(empty($config_passwd)?'Empty Api\Config password':'install_id no md5 hash');
|
2007-12-07 01:03:31 +01:00
|
|
|
}
|
|
|
|
if (!self::is_md5($config_passwd)) $config_passwd = md5($config_passwd);
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-12-07 01:03:31 +01:00
|
|
|
return md5($config_passwd.$install_id);
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-11-27 04:20:28 +01:00
|
|
|
/**
|
|
|
|
* displays an account specified by it's id or lid
|
2013-06-12 18:57:44 +02:00
|
|
|
*
|
2007-11-27 04:20:28 +01:00
|
|
|
* We show the value given by the user, plus the full name in brackets.
|
|
|
|
*
|
2016-04-27 21:12:20 +02:00
|
|
|
* @param int|string $account
|
2007-11-27 04:20:28 +01:00
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
static function display_account($account)
|
|
|
|
{
|
|
|
|
$id = is_numeric($account) ? $account : $GLOBALS['egw']->accounts->id2name($account);
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2016-04-27 21:12:20 +02:00
|
|
|
return $account.' ('.Api\Accounts::username($id).')';
|
2007-11-27 04:20:28 +01:00
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-12-05 03:27:49 +01:00
|
|
|
/**
|
|
|
|
* Check if string is a md5 hash (32 chars of 0-9 or a-f)
|
|
|
|
*
|
|
|
|
* @param string $str
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
static function is_md5($str)
|
|
|
|
{
|
|
|
|
return preg_match('/^[0-9a-f]{32}$/',$str);
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-12-19 00:11:53 +01:00
|
|
|
/**
|
|
|
|
* Check if the current command has the right crediential to be excuted remotely
|
2013-06-12 18:57:44 +02:00
|
|
|
*
|
2007-12-19 00:11:53 +01:00
|
|
|
* Command can reimplement that method, to allow eg. anonymous execution.
|
|
|
|
*
|
2013-06-12 18:57:44 +02:00
|
|
|
* This default implementation use a secret to authenticate with the installation,
|
|
|
|
* which is a md5 hash build from the uid of the command (to not allow to send new
|
|
|
|
* commands with an earsdroped secret) and the md5 hash of the md5 hash of the
|
2016-04-27 21:12:20 +02:00
|
|
|
* Api\Config password and the install_id (egw_admin_remote.remote_hash)
|
2013-06-12 18:57:44 +02:00
|
|
|
*
|
2007-12-19 00:11:53 +01:00
|
|
|
* @param string $secret hash used to authenticate the command (
|
|
|
|
* @param string $config_passwd of the current domain
|
2016-04-27 21:12:20 +02:00
|
|
|
* @throws Api\Exception\NoPermission
|
2007-12-19 00:11:53 +01:00
|
|
|
*/
|
|
|
|
function check_remote_access($secret,$config_passwd)
|
|
|
|
{
|
|
|
|
// as a security measure remote administration need to be enabled under Admin > Site configuration
|
|
|
|
list(,$remote_admin_install_id) = explode('-',$this->uid);
|
|
|
|
$allowed_remote_admin_ids = $GLOBALS['egw_info']['server']['allow_remote_admin'] ? explode(',',$GLOBALS['egw_info']['server']['allow_remote_admin']) : array();
|
2013-06-12 18:57:44 +02:00
|
|
|
|
|
|
|
// to authenticate with the installation we use a secret, which is a md5 hash build from the uid
|
|
|
|
// of the command (to not allow to send new commands with an earsdroped secret) and the md5 hash
|
2016-04-27 21:12:20 +02:00
|
|
|
// of the md5 hash of the Api\Config password and the install_id (egw_admin_remote.remote_hash)
|
2007-12-19 00:11:53 +01:00
|
|
|
if (is_null($config_passwd) || is_numeric($this->uid) || !in_array($remote_admin_install_id,$allowed_remote_admin_ids) ||
|
|
|
|
$secret != ($md5=md5($this->uid.$this->remote_hash($GLOBALS['egw_info']['server']['install_id'],$config_passwd))))
|
|
|
|
{
|
|
|
|
//die("secret='$secret' != '$md5', is_null($config_passwd)=".is_null($config_passwd).", uid=$this->uid, remote_install_id=$remote_admin_install_id, allowed: ".implode(', ',$allowed_remote_admin_ids));
|
2016-04-27 21:12:20 +02:00
|
|
|
unset($md5);
|
2007-12-19 00:11:53 +01:00
|
|
|
$msg = lang('Permission denied!');
|
|
|
|
if (!in_array($remote_admin_install_id,$allowed_remote_admin_ids))
|
|
|
|
{
|
|
|
|
$msg .= "\n".lang('Remote administration need to be enabled in the remote instance under Admin > Site configuration!');
|
|
|
|
}
|
2016-04-27 21:12:20 +02:00
|
|
|
throw new Api\Exception\NoPermission($msg,0);
|
2007-12-19 00:11:53 +01:00
|
|
|
}
|
|
|
|
}
|
2013-06-12 18:57:44 +02:00
|
|
|
|
2007-12-22 04:21:07 +01:00
|
|
|
/**
|
|
|
|
* Return a rand string, eg. to generate passwords
|
|
|
|
*
|
2016-04-27 21:12:20 +02:00
|
|
|
* @param int $len =16
|
2007-12-22 04:21:07 +01:00
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
static function randomstring($len=16)
|
|
|
|
{
|
2016-04-27 21:12:20 +02:00
|
|
|
return Api\Auth::randomstring($len);
|
2007-12-22 04:21:07 +01:00
|
|
|
}
|
2019-03-14 18:57:07 +01:00
|
|
|
|
|
|
|
/**
|
2019-03-19 15:34:44 +01:00
|
|
|
* Get name of eTemplate used to make the change to derive UI for history
|
2019-03-14 18:57:07 +01:00
|
|
|
*
|
2019-03-19 15:34:44 +01:00
|
|
|
* @return string|null etemplate name
|
2019-03-14 18:57:07 +01:00
|
|
|
*/
|
2019-03-19 15:34:44 +01:00
|
|
|
protected function get_etemplate_name()
|
2019-03-14 18:57:07 +01:00
|
|
|
{
|
2019-03-19 15:34:44 +01:00
|
|
|
return null;
|
2019-03-14 18:57:07 +01:00
|
|
|
}
|
|
|
|
|
2019-03-18 23:32:54 +01:00
|
|
|
/**
|
2019-03-19 15:34:44 +01:00
|
|
|
* Return eTemplate used to make the change to derive UI for history
|
|
|
|
*
|
|
|
|
* @return Api\Etemplate|null
|
2019-03-18 23:32:54 +01:00
|
|
|
*/
|
2019-03-19 15:34:44 +01:00
|
|
|
protected function get_etemplate()
|
2019-03-18 23:32:54 +01:00
|
|
|
{
|
2019-03-19 15:34:44 +01:00
|
|
|
static $tpl = null; // some caching to not instanciate it twice
|
|
|
|
|
|
|
|
if (!isset($tpl))
|
|
|
|
{
|
|
|
|
$name = $this->get_etemplate_name();
|
|
|
|
if (empty($name))
|
|
|
|
{
|
|
|
|
$tpl = false;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
$tpl = Api\Etemplate::instance($name);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $tpl ? $tpl : null;
|
2019-03-18 23:32:54 +01:00
|
|
|
}
|
|
|
|
|
2019-03-14 18:57:07 +01:00
|
|
|
/**
|
2019-03-19 15:34:44 +01:00
|
|
|
* Return (human readable) labels for keys of changes
|
|
|
|
*
|
|
|
|
* @return array
|
2019-03-14 18:57:07 +01:00
|
|
|
*/
|
2019-03-19 15:34:44 +01:00
|
|
|
function get_change_labels()
|
2019-03-14 18:57:07 +01:00
|
|
|
{
|
|
|
|
$labels = [];
|
2019-03-19 15:34:44 +01:00
|
|
|
$label = null;
|
|
|
|
if (($tpl = $this->get_etemplate()))
|
2019-03-14 18:57:07 +01:00
|
|
|
{
|
2019-03-19 15:34:44 +01:00
|
|
|
$tpl->run(function($cname, $expand, $widget) use (&$labels, &$label)
|
2019-03-14 18:57:07 +01:00
|
|
|
{
|
2019-03-19 15:34:44 +01:00
|
|
|
switch($widget->type)
|
2019-03-14 18:57:07 +01:00
|
|
|
{
|
2019-03-19 15:34:44 +01:00
|
|
|
// remember label from last description widget
|
|
|
|
case 'description':
|
|
|
|
if (!empty($widget->attrs['value'])) $label = $widget->attrs['value'];
|
|
|
|
break;
|
|
|
|
// ignore non input-widgets
|
|
|
|
case 'hbox': case 'vbox': case 'box': case 'groupbox':
|
|
|
|
case 'grid': case 'columns': case 'column': case 'rows': case 'row':
|
|
|
|
case 'template': case 'tabbox': case 'tabs': case 'tab':
|
|
|
|
// ignore buttons too
|
2019-03-19 23:00:04 +01:00
|
|
|
case 'button': case 'buttononly':
|
2019-03-19 15:34:44 +01:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
if (!empty($widget->id))
|
|
|
|
{
|
|
|
|
if (!empty($widget->attrs['label'])) $label = $widget->attrs['label'];
|
2019-03-19 17:31:20 +01:00
|
|
|
if (!empty($label)) $labels[$widget->id] = $label;
|
2019-03-19 15:34:44 +01:00
|
|
|
$label = null;
|
|
|
|
}
|
|
|
|
break;
|
2019-03-14 18:57:07 +01:00
|
|
|
}
|
2019-03-19 15:34:44 +01:00
|
|
|
unset($cname, $expand);
|
|
|
|
}, ['', []]);
|
|
|
|
}
|
|
|
|
return $labels;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Return widget types (indexed by field key) for changes
|
|
|
|
*
|
|
|
|
* Used by historylog widget to show the changes the command recorded.
|
|
|
|
*/
|
|
|
|
function get_change_widgets()
|
|
|
|
{
|
2019-03-20 11:54:30 +01:00
|
|
|
static $selectboxes = ['select', 'listbox', 'menupopup', 'taglist'];
|
|
|
|
|
2019-03-19 15:34:44 +01:00
|
|
|
$widgets = [];
|
|
|
|
$last_select = null;
|
|
|
|
if (($tpl = $this->get_etemplate()))
|
|
|
|
{
|
2019-03-20 11:54:30 +01:00
|
|
|
$tpl->run(function($cname, $expand, $widget) use (&$widgets, &$last_select, $selectboxes)
|
2019-03-15 21:14:23 +01:00
|
|
|
{
|
2019-03-19 15:34:44 +01:00
|
|
|
switch($widget->type)
|
2019-03-15 21:14:23 +01:00
|
|
|
{
|
2019-03-19 15:34:44 +01:00
|
|
|
// ignore non input-widgets
|
|
|
|
case 'hbox': case 'vbox': case 'box': case 'groupbox':
|
|
|
|
case 'grid': case 'columns': case 'column': case 'rows': case 'row':
|
|
|
|
case 'template': case 'tabbox': case 'tabs': case 'tab':
|
2019-03-19 18:10:07 +01:00
|
|
|
// No need for these
|
2019-03-20 11:54:30 +01:00
|
|
|
case 'textbox': case 'int': case 'float':
|
2019-03-19 18:10:07 +01:00
|
|
|
// ignore widgets that can't go in the historylog
|
2019-03-19 23:00:04 +01:00
|
|
|
case 'button': case 'buttononly': case 'taglist-thumbnail':
|
2019-03-19 15:34:44 +01:00
|
|
|
break;
|
|
|
|
// config templates have options in the template
|
|
|
|
case 'option':
|
|
|
|
if (!is_array($widgets[$last_select])) $widgets[$last_select] = [];
|
2019-03-19 17:19:10 +01:00
|
|
|
$label = (string)$widget->attrs['#text'];
|
|
|
|
// translate "{something} {else}" type options
|
|
|
|
if (strpos($label, '{') !== false)
|
|
|
|
{
|
|
|
|
$label = preg_replace_callback('/{([^}]+)}/', function($matches)
|
|
|
|
{
|
|
|
|
return lang($matches[1]);
|
|
|
|
}, $label);
|
|
|
|
}
|
|
|
|
$widgets[$last_select][(string)$widget->attrs['value']] = $label;
|
2019-03-19 15:34:44 +01:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
$last_select = null;
|
|
|
|
if (!empty($widget->id))
|
|
|
|
{
|
|
|
|
$widgets[$widget->id] = $widget->type;
|
2019-03-20 11:54:30 +01:00
|
|
|
if (in_array($widget->type, $selectboxes))
|
2019-03-19 15:34:44 +01:00
|
|
|
{
|
|
|
|
$last_select = $widget->id;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
2019-03-15 21:14:23 +01:00
|
|
|
}
|
2019-03-19 15:34:44 +01:00
|
|
|
unset($cname, $expand);
|
|
|
|
}, ['', []]);
|
2019-03-20 11:54:30 +01:00
|
|
|
|
|
|
|
// remove pure selectboxes, as they would show nothing without having options
|
|
|
|
$widgets = array_diff($widgets, $selectboxes);
|
2019-03-14 18:57:07 +01:00
|
|
|
}
|
2019-03-19 15:34:44 +01:00
|
|
|
return $widgets;
|
2019-03-14 18:57:07 +01:00
|
|
|
}
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|