⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 roleallocation.inc.php.svn-base

📁 PHP 知识管理系统(基于树结构的知识管理系统), 英文原版的PHP源码。
💻 SVN-BASE
字号:
<?php/** * $Id$ * * KnowledgeTree Community Edition * Document Management Made Simple * Copyright (C) 2008 KnowledgeTree Inc. * Portions copyright The Jam Warehouse Software (Pty) Limited *  * This program is free software; you can redistribute it and/or modify it under * the terms of the GNU General Public License version 3 as published by the * Free Software Foundation. *  * This program is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS * FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more * details. *  * You should have received a copy of the GNU General Public License * along with this program.  If not, see <http://www.gnu.org/licenses/>. *  * You can contact KnowledgeTree Inc., PO Box 7775 #87847, San Francisco,  * California 94120-7775, or email info@knowledgetree.com. *  * The interactive user interfaces in modified source and object code versions * of this program must display Appropriate Legal Notices, as required under * Section 5 of the GNU General Public License version 3. *  * In accordance with Section 7(b) of the GNU General Public License version 3, * these Appropriate Legal Notices must retain the display of the "Powered by * KnowledgeTree" logo and retain the original copyright notice. If the display of the  * logo is not reasonably feasible for technical reasons, the Appropriate Legal Notices * must display the words "Powered by KnowledgeTree" and retain the original  * copyright notice. * Contributor( s): ______________________________________ * */require_once(KT_LIB_DIR . "/ktentity.inc"); require_once(KT_LIB_DIR . "/util/ktutil.inc"); require_once(KT_LIB_DIR . "/database/dbutil.inc");  require_once(KT_LIB_DIR . "/permissions/permissiondescriptor.inc.php");require_once(KT_LIB_DIR . "/permissions/permissionutil.inc.php");require_once(KT_LIB_DIR . "/users/User.inc");require_once(KT_LIB_DIR . "/groups/Group.inc");require_once(KT_LIB_DIR . "/foldermanagement/Folder.inc"); class RoleAllocation extends KTEntity {		/** role object primary key */	var $iId=-1;	var $iFolderId;	var $iRoleId;	var $iPermissionDescriptorId;		var $_bUsePearError = true;		var $_aFieldToSelect = array(	    'iId' => 'id',		'iRoleId' => 'role_id',		'iFolderId' => 'folder_id',		'iPermissionDescriptorId' => 'permission_descriptor_id',	);	function setFolderId($iFolderId) { $this->iFolderId = $iFolderId; }	function setRoleId($iRoleId) { $this->iRoleId = $iRoleId; }	function setPermissionDescriptorId($iPermissionDescriptorId) { $this->iPermissionDescriptorId = $iPermissionDescriptorId; }	function getFolderId() {  return $this->iFolderId; }	function getRoleId() { return $this->iRoleId; }	function getPermissionDescriptorId() { return $this->iPermissionDescriptorId; }	// aggregate:  set (for this alloc) the array('user' => array(), 'group' => array()).	function setAllowed($aAllowed) {		$oDescriptor = KTPermissionUtil::getOrCreateDescriptor($aAllowed); // fully done, etc.		$this->iPermissionDescriptorId = $oDescriptor->getId();	}		function getAllowed() {	    if (!is_null($this->iPermissionDescriptorId)) {	        $oDescriptor = KTPermissionDescriptor::get($this->iPermissionDescriptorId); // fully done, etc.			    $aAllowed = $oDescriptor->getAllowed();		} else {		    $aAllowed = array();		}		return $aAllowed;	}				    function _fieldValues () { return array(            'role_id' => $this->iRoleId,            'folder_id' => $this->iFolderId,			'permission_descriptor_id' => $this->iPermissionDescriptorId,        );    }	/* getAllocationForFolderAndRole($iFolderId, $iRoleId)	 *	 *   this is the key function:  for a given folder and role,	 *   returns either a RoleAllocation object, or null 	 *   (if there is none).  It scans _up_ the hierachy of folders,	 *   trying to find the nearest such object with a folder_id	 *   in the mapping.	 */	function & getAllocationsForFolderAndRole($iFolderId, $iRoleId) {		// FIXME the query we use here is ... not very pleasant.  		// NBM: is this the "right" way to do this?		$raTable = KTUtil::getTableName('role_allocations');				$fTable = Folder::_table();				$oFolder =& Folder::get($iFolderId);		// if its an invalid folder, we simply return null, since this is undefined anyway.		if (PEAR::isError($oFolder)) { 			return null;		}		$parents = Folder::generateFolderIds($iFolderId);				// FIXME what (if anything) do we need to do to check that this can't be used as an attack?		$folders = '(' . $parents . ')';				$sQuery = "SELECT ra.id as `id` FROM " . $raTable . " AS ra " .		' LEFT JOIN ' . $fTable . ' AS f ON (f.id = ra.folder_id) ' .		' WHERE f.id IN ' . $folders .		' AND ra.role_id = ?' .		' ORDER BY CHAR_LENGTH(f.parent_folder_ids) desc, f.parent_folder_ids DESC';		$aParams = array($iRoleId);				$aRoleAllocIds = DBUtil::getResultArrayKey(array($sQuery, $aParams), 'id');				if (false) {		    print '<pre>';			var_dump($aRoleAllocIds);			print '';			print $sQuery;			print '</pre>';				}				if (empty($aRoleAllocIds)) { 		    return null;		}				$iAllocId = $aRoleAllocIds[0]; // array pop?		return RoleAllocation::get($iAllocId);	}		// static, boilerplate.    function _table () { return KTUtil::getTableName('role_allocations'); }    function & get($iRoleId) { return KTEntityUtil::get('RoleAllocation', $iRoleId); }	function & getList($sWhereClause = null) { return KTEntityUtil::getList2('RoleAllocation', $sWhereClause); }	function & createFromArray($aOptions) { return KTEntityUtil::createFromArray('RoleAllocation', $aOptions); }	function getPermissionDescriptor() {	    // could be an error - return as-is.		$oDescriptor =& KTPermissionDescriptor::get($this->iPermissionDescriptorId);		return $oDescriptor;	}	// setting users and groups needs to use permissionutil::getOrCreateDescriptor	function getUsers() {	    $oDescriptor = $this->getPermissionDescriptor();		$aUsers = array();		if (PEAR::isError($oDescriptor) || ($oDescriptor == false)) {		     return $aUsers;		}		$aAllowed = $oDescriptor->getAllowed();		if ($aAllowed['user'] !== null) {		    $aUsers = $aAllowed['user'];		} 				// now we want to map to oUsers, since that's what groups do.		$aFullUsers = array();		foreach ($aUsers as $iUserId) {		    $oUser = User::get($iUserId);			if (!(PEAR::isError($oUser) || ($oUser == false) || ($oUser->getDisabled() == 1))) {			    $aFullUsers[$iUserId] = $oUser;			}		}				return $aFullUsers;	}		function getGroups() {	    $oDescriptor = $this->getPermissionDescriptor();		$aGroups = array();		if (PEAR::isError($oDescriptor) || ($oDescriptor == false)) {		     return $aGroups;		}		$aAllowed = $oDescriptor->getAllowed();		if ($aAllowed['group'] !== null) {		    $aGroups = $aAllowed['group'];		} 				// now we want to map to oUsers, since that's what groups do.		$aFullGroups = array();		foreach ($aGroups as $iGroupId) {		    $oGroup = Group::get($iGroupId);			if (!(PEAR::isError($oGroup) || ($oGroup == false))) {			    $aFullGroups[$iGroupId] = $oGroup;			}		}				return $aFullGroups;	}		function getUserIds() {	    $oDescriptor = $this->getPermissionDescriptor();		$aUsers = array();		if (PEAR::isError($oDescriptor) || ($oDescriptor == false)) {		     return $aUsers;		}		$aAllowed = $oDescriptor->getAllowed();		if ($aAllowed['user'] !== null) {		    $aUsers = $aAllowed['user'];		} 				return $aUsers;	}		function getGroupIds() {	    $oDescriptor = $this->getPermissionDescriptor();		$aGroups = array();		if (PEAR::isError($oDescriptor) || ($oDescriptor == false)) {		     return $aGroups;		}		$aAllowed = $oDescriptor->getAllowed();		if ($aAllowed['group'] !== null) {		    $aGroups = $aAllowed['group'];		} 				return $aGroups;	}			// utility function to establish user membership in this allocation.	function hasMember($oUser) {	    $oPD = $this->getPermissionDescriptor();		if (PEAR::isError($oPD) || ($oPD == false)) {		    return false;		}		$aAllowed = $oPD->getAllowed();		$iUserId = $oUser->getId();				if ($aAllowed['user'] != null) {			if (array_search($iUserId, $aAllowed['user']) !== false) {			    return true;			}		}				// now we need the group objects.		// FIXME this could accelerated to a single SQL query on group_user_link.		$aGroups = $this->getGroups();		if (PEAR::isError($aGroups) || ($aGroups == false)) {		    return false;		} else {		    foreach ($aGroups as $oGroup) {		        $reason = GroupUtil::getMembershipReason($oUser, $oGroup);		        if (PEAR::isError($reason) || is_null($reason)) {		            continue;		        }		        return true; // don't bother continuing - short-circuit for performance.			}		}	    	    return false;	}	}?>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -