3 * Table Definition for Person
5 class_exists('DB_DataObject') ? '' : require_once 'DB/DataObject.php';
8 class Pman_Core_DataObjects_Core_person extends DB_DataObject
11 /* the code below is auto generated do not remove the above tag */
13 public $__table = 'core_person'; // table name
14 public $id; // int(11) not_null primary_key auto_increment
15 public $email; // string(128) not_null
18 public $company_id; // int(11)
19 public $office_id; // int(11)
20 public $name; // string(128) not_null
21 public $firstname; // string(128) not_null
22 public $lastname; // string(128) not_null
23 public $phone; // string(32) not_null
24 public $fax; // string(32) not_null
26 public $role; // string(32) not_null
27 public $remarks; // blob(65535) not_null blob
28 public $passwd; // string(64) not_null
29 public $owner_id; // int(11) not_null
30 public $lang; // string(8)
31 public $no_reset_sent; // int(11)
32 public $action_type; // string(32)
33 public $project_id; // int(11)
36 public $active; // int(11) not_null
37 public $deleted_by; // int(11) not_null
38 public $deleted_dt; // datetime(19) binary
41 public $name_facebook; // VARCHAR(128) NULL;
42 public $url_blog; // VARCHAR(256) NULL ;
43 public $url_twitter; // VARCHAR(256) NULL ;
44 public $url_linkedin; // VARCHAR(256) NULL ;
45 public $linkedin_id; // VARCHAR(256) NULL ;
47 public $phone_mobile; // varchar(32) NOT NULL DEFAULT '';
48 public $phone_direct; // varchar(32) NOT NULL DEFAULT '';
49 public $countries; // VARCHAR(128) NULL;
51 /* the code above is auto generated do not remove the tag below */
56 $p = DB_DataObject::Factory($this->tableName());
57 $p->get($this->owner_id);
66 * FIXME !!!! -- USE Pman_Core_Mailer !!!!!
72 function buildMail($templateFile, $args)
75 $args = (array) $args;
76 $content = clone($this);
78 foreach((array)$args as $k=>$v) {
82 $ff = HTML_FlexyFramework::get();
85 //?? is this really the place for this???
88 empty($args['no_auth']) &&
89 !in_array($templateFile, array(
90 // templates that can be sent without authentication.
96 $content->authUser = $this->getAuthUser();
97 if (!$content->authUser) {
98 return PEAR::raiseError("Not authenticated");
102 // should handle x-forwarded...
104 $content->HTTP_HOST = isset($_SERVER["HTTP_HOST"]) ?
105 $_SERVER["HTTP_HOST"] :
106 (isset($ff->HTTP_HOST) ? $ff->HTTP_HOST : 'localhost');
108 /* use the regex compiler, as it doesnt parse <tags */
111 'compiler' => 'Flexy',
113 'filters' => array('SimpleTags','Mail'),
119 if (!empty($args['templateDir'])) {
120 $tops['templateDir'] = $args['templateDir'];
125 require_once 'HTML/Template/Flexy.php';
126 $template = new HTML_Template_Flexy( $tops );
127 $template->compile("mail/$templateFile.txt");
129 /* use variables from this object to ouput data. */
130 $mailtext = $template->bufferedOutputObject($content);
133 // if a html file with the same name exists, use that as the body
134 // I've no idea where this code went, it was here before..
135 if (false !== $template->resolvePath ( "mail/$templateFile.html" )) {
136 $tops['nonHTML'] = false;
137 $template = new HTML_Template_Flexy( $tops );
138 $template->compile("mail/$templateFile.html");
139 $htmlbody = $template->bufferedOutputObject($content);
145 //echo "<PRE>";print_R($mailtext);
146 //print_R($mailtext);exit;
147 /* With the output try and send an email, using a few tricks in Mail_MimeDecode. */
148 require_once 'Mail/mimeDecode.php';
149 require_once 'Mail.php';
151 $decoder = new Mail_mimeDecode($mailtext);
152 $parts = $decoder->getSendArray();
154 if (is_a($parts,'PEAR_Error')) {
156 //echo "PROBLEM: {$parts->message}";
159 list($recipents,$headers,$body) = $parts;
160 $recipents = array($this->email);
161 if (!empty($content->bcc) && is_array($content->bcc)) {
162 $recipents =array_merge($recipents, $content->bcc);
164 $headers['Date'] = date('r');
166 if ($htmlbody !== false) {
167 require_once 'Mail/mime.php';
168 $mime = new Mail_mime(array('eol' => "\n"));
169 $mime->setTXTBody($body);
170 $mime->setHTMLBody($htmlbody);
171 // I think there might be code in mediaoutreach toEmail somewhere
172 // h embeds images here..
173 $body = $mime->get();
174 $headers = $mime->headers($headers);
181 'recipients' => $recipents,
182 'headers' => $headers,
192 * - user must be authenticate or args[no_auth] = true
193 * or template = password_[reset|welcome]
196 function sendTemplate($templateFile, $args)
199 $ar = $this->buildMail($templateFile, $args);
202 //print_r($recipents);exit;
203 $mailOptions = PEAR::getStaticProperty('Mail','options');
204 $mail = Mail::factory("SMTP",$mailOptions);
206 if (PEAR::isError($mail)) {
209 $oe = error_reporting(E_ALL & ~E_NOTICE & ~E_STRICT);
210 $ret = $mail->send($ar['recipients'],$ar['headers'],$ar['body']);
211 error_reporting($oe);
220 function getEmailFrom()
222 if (empty($this->name)) {
226 return '"' . addslashes($this->name) . '" <' . $this->email . '>';
229 function toEventString()
231 return empty($this->name) ? $this->email : $this->name;
234 function verifyAuth()
236 $ff= HTML_FlexyFramework::get();
237 if (!empty($ff->Pman['auth_comptype']) &&
238 (!$this->company_id || ($ff->Pman['auth_comptype'] != $this->company()->comptype))
241 $sesPrefix = $this->sesPrefix();
243 $_SESSION[get_class($this)][$sesPrefix .'-auth'] = "";
247 //$ff->page->jerr("Login not permited to outside companies");
254 // ---------------- authentication / passwords and keys stuff ----------------
259 $ff= HTML_FlexyFramework::get();
261 $sesPrefix = $this->sesPrefix();
263 if (!empty($_SESSION[get_class($this)][$sesPrefix .'-auth'])) {
265 $a = unserialize($_SESSION[get_class($this)][$sesPrefix .'-auth']);
267 $u = DB_DataObject::factory($this->tableName());
268 if ($a->id && $u->get($a->id)) { //&& strlen($u->passwd)) {
270 return $u->verifyAuth(); // got authentication...
275 unset($_SESSION[get_class($this)][$sesPrefix .'-auth']);
276 unset($_SESSION[get_class($this)][$sesPrefix .'-timeout']);
277 setcookie('Pman.timeout', -1, time() + (30*60), '/');
282 $u = DB_DataObject::factory($this->tableName());
284 if (!empty($_SERVER['PHP_AUTH_USER'])
286 !empty($_SERVER['PHP_AUTH_PW'])
288 $u->get('email', $_SERVER['PHP_AUTH_USER'])
290 $u->checkPassword($_SERVER['PHP_AUTH_PW'])
292 $_SESSION[get_class($this)][$sesPrefix .'-auth'] = serialize($u);
296 if (!$this->canInitializeSystem()) {
297 // die("can not init");
303 $default_admin = false;
304 if (!empty($ff->Pman['local_autoauth']) &&
305 ($ff->Pman['local_autoauth'] === true) &&
306 (!empty($_SERVER['SERVER_ADDR'])) &&
309 $_SERVER['SERVER_ADDR'] == '127.0.0.1' &&
310 $_SERVER['REMOTE_ADDR'] == '127.0.0.1'
314 $_SERVER['SERVER_ADDR'] == '::1' &&
315 $_SERVER['REMOTE_ADDR'] == '::1'
319 $group = DB_DataObject::factory('core_group');
320 $group->get('name', 'Administrators');
322 $member = DB_DataObject::factory('core_group_member');
324 $member->group_id = $group->id;
326 join_user_id_id.id IS NOT NULL
328 if($member->find(true)){
329 $default_admin = DB_DataObject::factory($this->tableName());
330 if(!$default_admin->get($member->user_id)){
331 $default_admin = false;
336 //var_dump($ff->Pman['local_autoauth']); var_dump($_SERVER); exit;
337 $u = DB_DataObject::factory($this->tableName());
338 $ff = HTML_FlexyFramework::get();
340 if (!empty($ff->Pman['local_autoauth']) &&
341 (!empty($_SERVER['SERVER_ADDR'])) &&
344 $_SERVER['SERVER_ADDR'] == '127.0.0.1' &&
345 $_SERVER['REMOTE_ADDR'] == '127.0.0.1'
349 $_SERVER['SERVER_ADDR'] == '::1' &&
350 $_SERVER['REMOTE_ADDR'] == '::1'
353 ($default_admin || $u->get('email', $ff->Pman['local_autoauth']))
356 $user = $default_admin ? $default_admin->toArray() : $u->toArray();
358 $_SESSION[get_class($this)][$sesPrefix .'-auth'] = serialize((object) $user);
362 //var_dump(session_id());
363 //var_dump($_SESSION[__CLASS__]);
365 //if (!empty( $_SESSION[__CLASS__][$sesPrefix .'-empty'] )) {
368 //die("got this far?");
369 // not in session or not matched...
370 $u = DB_DataObject::factory($this->tableName());
371 $u->whereAdd(' LENGTH(passwd) > 0');
373 $_SESSION[get_class($this)][$sesPrefix .'-empty'] = $n;
374 if (class_exists('PEAR')) {
375 $error = PEAR::getStaticProperty('DB_DataObject','lastError');
377 die($error->toString()); // not really a good thing to do...
380 if (!$n){ // authenticated as there are no users in the system...
388 function canInitializeSystem()
391 return !strcasecmp(get_class($this) , __CLASS__);
394 function getAuthUser()
396 if (!$this->isAuth()) {
400 $ff= HTML_FlexyFramework::get();
402 $sesPrefix = $this->sesPrefix();
404 //var_dump(array(get_class($this),$sesPrefix .'-auth'));
406 if (!empty($_SESSION[get_class($this)][$sesPrefix .'-auth'])) {
407 $a = unserialize($_SESSION[get_class($this)][$sesPrefix .'-auth']);
409 $u = DB_DataObject::factory($this->tableName()); // allow extending this ...
411 if ($u->get($a->id)) { /// && strlen($u->passwd)) { // should work out the pid .. really..
413 $_SESSION[get_class($this)][$sesPrefix .'-auth-timeout'] = time() + (30*60); // eg. 30 minutes
414 setcookie('Pman.timeout', time() + (30*60), time() + (30*60), '/');
420 unset($_SESSION[get_class($this)][$sesPrefix .'-auth']);
421 unset($_SESSION[get_class($this)][$sesPrefix .'-timeout']);
422 setcookie('Pman.timeout', -1, time() + (30*60), '/');
428 if (!$this->canInitializeSystem()) {
434 if (empty( $_SESSION[get_class($this)][$sesPrefix .'-empty'] )) {
435 $u = DB_DataObject::factory($this->tableName());
436 $u->whereAdd(' LENGTH(passwd) > 0');
437 $_SESSION[get_class($this)][$sesPrefix .'-empty'] = $u->count();
442 isset( $_SESSION[get_class($this)][$sesPrefix .'-empty'] ) &&
443 $_SESSION[get_class($this)][$sesPrefix .'-empty'] < 1
446 // fake person - open system..
447 //$ce = DB_DataObject::factory('core_enum');
451 $u = DB_DataObject::factory($this->tableName());
454 // if a company has been created fill that in in company_id_id
455 $c = DB_DAtaObject::factory('core_company')->lookupOwner();
457 $u->company_id_id = $c->pid();
458 $u->company_id = $c->pid();
468 $this->isAuth(); // force session start..
469 if (!$this->verifyAuth()) { // check for company valid..
473 // open up iptables at login..
474 $dbname = $this->databaseNickname();
475 touch( '/tmp/run_pman_admin_iptables-'.$dbname);
477 // refresh admin group if we are logged in as one..
478 //DB_DataObject::debugLevel(1);
479 $g = DB_DataObject::factory('core_group');
481 $g->get('name', 'Administrators');
482 $gm = DB_DataObject::Factory('core_group_member');
483 if (in_array($g->id,$gm->listGroupMembership($this))) {
484 // refresh admin groups.
485 $gr = DB_DataObject::Factory('core_group_right');
486 $gr->applyDefs($g, 0);
489 $sesPrefix = $this->sesPrefix();
491 // we should not store the whole data in the session - otherwise it get's huge.
492 $p = DB_DAtaObject::Factory($this->tableName());
493 $p->get($this->pid());
497 $_SESSION[get_class($this)][$sesPrefix .'-auth-timeout'] = time() + (30*60); // eg. 30 minutes
498 setcookie('Pman.timeout', time() + (30*60), time() + (30*60), '/');
500 //var_dump(array(get_class($this),$sesPrefix .'-auth'));
501 $_SESSION[get_class($this)][$sesPrefix .'-auth'] = serialize((object)$d);
502 // ensure it's written so that ajax calls can fetch it..
509 $this->isAuth(); // force session start..
511 $sesPrefix = $this->sesPrefix();
513 $_SESSION[get_class($this)][$sesPrefix .'-auth-timeout'] = -1;
515 $_SESSION[get_class($this)][$sesPrefix .'-auth'] = "";
518 function genPassKey ($t)
520 return md5($this->email . $t. $this->passwd);
522 function simpleAuthKey($m = 0)
524 $month = $m > -1 ? date('Y-m') : date('Y-m', strtotime('LAST MONTH'));
526 return md5(implode(',' , array($month, $this->email , $this->passwd, $this->id)));
529 function checkTwoFactorAuthentication($val)
531 require_once 'System.php';
533 $oathtool = System::which('oathtool');
539 if(!isset($this->oath_key)) {
540 $au = $this->getAuthUser();
541 $oath_key = $au->oath_key;
543 $oath_key = $this->oath_key;
546 $cmd = "{$oathtool} --totp --base32 {$oath_key}";
548 $password = exec($cmd);
550 return ($password == $val) ? true : false;
553 function checkPassword($val)
555 if (substr($this->passwd,0,1) == '$') {
556 if (function_exists('pasword_verify')) {
557 return password_verify($val, $this->passwd);
559 return crypt($val,$this->passwd) == $this->passwd ;
561 // old style md5 passwords...- cant be used with courier....
562 return md5($val) == $this->passwd;
565 function setPassword($value)
567 if (function_exists('pasword_hash')) {
568 return password_hash($value);
572 while(strlen($salt)<9) {
573 $salt.=chr(rand(64,126));
574 //php -r var_dump(crypt('testpassword', '$1$'. (rand(64,126)). '$'));
576 $this->passwd = crypt($value, '$1$'. $salt. '$');
581 function generatePassword($length = 5) // genearte a password (add set 'rawPasswd' to it's value)
583 require_once 'Text/Password.php';
584 $this->rawPasswd = strtr(ucfirst(Text_Password::create($length)).ucfirst(Text_Password::create($length)), array(
585 "a"=>"4", "e"=>"3", "i"=>"1", "o"=>"0", "s"=>"5", "t"=>"7"));
586 $this->setPassword($this->rawPasswd);
587 return $this->rawPasswd;
592 $x = DB_DataObject::factory('core_company');
594 $x->get($this->company_id);
597 function loadCompany()
599 $this->company = $this->company();
604 return $this->active;
606 function authUserName($n) // set username prior to acheck user exists query.
609 $this->whereAdd('LENGTH(passwd) > 1');
614 if (!func_num_args()) {
617 $val = array_shift(func_get_args());
618 if ($val == $this->lang) {
628 function authUserArray()
631 $aur = $this->toArray();
638 //DB_DataObject::debugLevel(1);
639 $c = DB_Dataobject::factory('core_company');
640 $im = DB_Dataobject::factory('Images');
641 $c->joinAdd($im, 'LEFT');
643 $c->selectAs($c, 'company_id_%s');
644 $c->selectAs($im, 'company_id_logo_id_%s');
645 $c->id = $this->company_id;
649 $aur = array_merge( $c->toArray(),$aur);
651 if (empty($c->company_id_logo_id_id)) {
653 $im = DB_Dataobject::factory('Images');
654 $im->ontable = DB_DataObject::factory('core_company')->tableName();
656 $im->imgtype = 'LOGO';
659 $im->selectAs($im, 'company_id_logo_id_%s');
660 if ($im->find(true)) {
662 foreach($im->toArray() as $k=>$v) {
663 if (!preg_match('/^company_id_logo_id_/', $k)) {
672 $aur['perms'] = $this->getPerms();
673 $g = DB_DataObject::Factory('core_group_member');
674 $aur['groups'] = $g->listGroupMembership($this, 'name');
677 $aur['dailykey'] = '';
678 $aur['oath_key'] = '';
680 $aur['oath_key_enable'] = !empty($this->oath_key);
685 // ----------PERMS------ ----------------
688 //DB_DataObject::debugLevel(1);
689 // find out all the groups they are a member of.. + Default..
691 // ------ INIITIALIZE IF NO GROUPS ARE SET UP.
693 $g = DB_DataObject::Factory('core_group_right');
699 return $g->adminRights(); // system is not set up - so they get full rights.
701 //DB_DataObject::debugLevel(1);
702 $g = DB_DataObject::Factory('core_group_member');
703 $g->whereAdd('group_id is NOT NULL AND user_id IS NOT NULL');
705 // add the current user to the admin group..
706 $g = DB_DataObject::Factory('core_group');
707 if ($g->get('name', 'Administrators')) {
708 $gm = DB_DataObject::Factory('core_group_member');
709 $gm->group_id = $g->id;
710 $gm->user_id = $this->id;
716 // ------ STANDARD PERMISSION HANDLING.
717 $isOwner = $this->company()->comptype == 'OWNER';
718 $g = DB_DataObject::Factory('core_group_member');
719 $grps = $g->listGroupMembership($this);
721 $isAdmin = $g->inAdmin; //??? what???
722 //echo '<PRE>'; print_r($grps);var_dump($isAdmin);
723 // the load all the perms for those groups, and add them all together..
724 // then load all those
725 $g = DB_DataObject::Factory('core_group_right');
726 $ret = $g->listPermsFromGroupIds($grps, $isAdmin, $isOwner);
727 //echo '<PRE>';print_r($ret);
733 *Basic group fetching - probably needs to filter by type eventually.
735 *@param String $what - fetchall() argument - eg. 'name' returns names of all groups that they are members of.
738 function groups($what=false)
740 $g = DB_DataObject::Factory('core_group_member');
741 $grps = $g->listGroupMembership($this);
742 $g = DB_DataObject::Factory('core_group');
743 $g->whereAddIn('id', $grps, 'int');
744 return $g->fetchAll($what);
750 function hasPerm($name, $lvl)
752 static $pcache = array();
754 if (!isset($pcache[$this->id])) {
755 $pcache[$this->id] = $this->getPerms();
758 // echo "<PRE>";print_r($pcache[$au->id]);
759 // var_dump($pcache[$au->id]);
760 if (empty($pcache[$this->id][$name])) {
764 return strpos($pcache[$this->id][$name], $lvl) > -1;
768 // ------------ROO HOOKS------------------------------------
769 function applyFilters($q, $au, $roo)
771 //DB_DataObject::DebugLevel(1);
772 if(!empty($q['_generate_oath_key'])){
774 $this->oath_key = $this->getOathKey();
779 if(!empty($q['_to_qr_code'])){
781 $person = DB_DataObject::factory('Core_person');
782 $person->get($q['id']);
786 $person->oath_key = $this->getOathKey();
789 $qrcode = $person->generateQRCode();
792 $roo->jerr('Fail to generate QR Code');
798 if(!empty($q['two_factor_auth_code'])) {
802 if(isset($q['id'])) {
803 $person = DB_DataObject::factory('core_person');
804 $person->get($q['id']);
807 if($person->checkTwoFactorAuthentication($q['two_factor_auth_code'])) {
811 $roo->jerr('_invalid_auth_code');
814 if(!empty($q['oath_key_disable'])) {
816 $person = DB_DataObject::factory('core_person');
817 $person->get($q['id']);
821 $person->oath_key = '';
827 if (!empty($q['query']['is_owner'])) {
828 $this->whereAdd(" join_company_id_id.comptype = 'OWNER'");
831 if (!empty($q['query']['person_not_internal'])) {
832 $this->whereAdd(" join_company_id_id.isOwner = 0 ");
835 if (!empty($q['query']['person_internal_only_all'])) {
838 // must be internal and not current user (need for distribution list)
839 // user has a projectdirectory entry and role is not blank.
840 //DB_DataObject::DebugLevel(1);
841 $pd = DB_DataObject::factory('ProjectDirectory');
842 $pd->whereAdd("role != ''");
844 $pd->selectAdd('distinct(person_id) as person_id');
845 $roled = $pd->fetchAll('person_id');
847 {$this->tableName()}.id IN (".implode(',', $roled) . ")
849 $this->whereAdd(" join_company_id_id.comptype = 'OWNER' $rs ");
852 // -- for distribution
853 if (!empty($q['query']['person_internal_only'])) {
854 // must be internal and not current user (need for distribution list)
855 $this->whereAdd(" join_company_id_id.comptype = 'OWNER'");
857 //$this->whereAdd(($this->tableName() == 'Person' ? 'Person' : "join_person_id_id") .
858 // ".id != ".$au->id);
859 $this->whereAdd("{$this->tableName()}.id != {$au->id}");
862 if (!empty($q['query']['comptype_or_company_id'])) {
863 // DB_DataObject::debugLevel(1);
864 $bits = explode(',', $q['query']['comptype_or_company_id']);
865 $id = (int) array_pop($bits);
866 $ct = $this->escape($bits[0]);
868 $this->whereAdd(" join_company_id_id.comptype = '$ct' OR {$this->tableName()}.company_id = $id");
874 if (!empty($q['query']['person_inactive'])) {
875 // DB_Dataobject::debugLevel(1);
878 $tn_p = $this->tableName();
879 $tn_gm = DB_DataObject::Factory('core_group_member')->tableName();
880 $tn_g = DB_DataObject::Factory('core_group')->tableName();
882 ///---------------- Group views --------
883 if (!empty($q['query']['in_group'])) {
884 // DB_DataObject::debugLevel(1);
885 $ing = (int) $q['query']['in_group'];
886 if ($q['query']['in_group'] == -1) {
888 // list all staff who are not in a group.
889 $this->whereAdd("{$this->tableName()}.id NOT IN (
890 SELECT distinct(user_id) FROM $tn_gm LEFT JOIN
891 $tn_g ON $tn_g.id = $tn_gm.group_id)");
895 $this->whereAdd("$tn_p.id IN (
896 SELECT distinct(user_id) FROM $tn_gm
897 WHERE group_id = $ing
903 if(!empty($q['in_group_name'])){
905 $v = $this->escape($q['in_group_name']);
910 DISTINCT(user_id) FROM $tn_gm
914 $tn_g.id = $tn_gm.group_id
921 // #2307 Search Country!!
922 if (!empty($q['query']['in_country'])) {
923 // DB_DataObject::debugLevel(1);
924 $inc = $q['query']['in_country'];
925 $this->whereAdd("$tn_p.countries LIKE '%{$inc}%'");
928 if (!empty($q['query']['not_in_directory'])) {
929 // it's a Person list..
930 // DB_DATaobjecT::debugLevel(1);
932 // specific to project directory which is single comp. login
934 $owncomp = DB_DataObject::Factory('core_company');
935 $owncomp->get('comptype', 'OWNER');
936 if ($q['company_id'] == $owncomp->id) {
942 if ( $q['query']['not_in_directory'] > -1) {
943 $tn_pd = DB_DataObject::Factory('ProjectDirectory')->tableName();
944 // can list current - so that it does not break!!!
945 $this->whereAdd("$tn_p.id NOT IN
946 ( SELECT distinct person_id FROM $tn_pd WHERE
947 project_id = " . $q['query']['not_in_directory'] . " AND
948 company_id = " . $this->company_id . ')');
952 if (!empty($q['query']['role'])) {
953 // it's a Person list..
954 // DB_DATaobjecT::debugLevel(1);
956 // specific to project directory which is single comp. login
958 $tn_pd = DB_DataObject::Factory('ProjectDirectory')->tableName();
959 // can list current - so that it does not break!!!
960 $this->whereAdd("$tn_p.id IN
961 ( SELECT distinct person_id FROM $tn_pd WHERE
962 role = '". $this->escape($q['query']['role']) ."'
968 if (!empty($q['query']['project_member_of'])) {
969 // this is also a flag to return if they are a member..
970 //DB_DataObject::debugLevel(1);
971 $do = DB_DataObject::factory('ProjectDirectory');
972 $do->project_id = $q['query']['project_member_of'];
973 $tn_pd = DB_DataObject::Factory('ProjectDirectory')->tableName();
974 $this->joinAdd($do,array('joinType' => 'LEFT', 'useWhereAsOn' => true));
975 $this->selectAdd("IF($tn_pd.id IS NULL, 0, $tn_pd.id ) as is_member");
978 if (!empty($q['query']['project_member_filter'])) {
979 $this->having('is_member !=0');
985 if(!empty($q['query']['name'])){
987 {$this->tableName()}.name LIKE '%{$this->escape($q['query']['name'])}%'
990 if(!empty($q['query']['name_starts'])){
992 {$this->tableName()}.name LIKE '{$this->escape($q['query']['name_starts'])}%'
996 if (!empty($q['query']['search'])) {
998 // use our magic search builder...
1000 require_once 'Text/SearchParser.php';
1001 $x = new Text_SearchParser($q['query']['search']);
1009 "join_company_id_id.name"
1011 $tbcols = $this->table();
1012 foreach(array('firstname','lastname') as $k) {
1013 if (isset($tbcols[$k])) {
1014 $props[] = "{$tn_p}.{$k}";
1021 $str = $x->toSQL(array(
1022 'default' => $props,
1024 'company' => 'join_company_id_id.name',
1025 //'country' => 'Clipping.country',
1026 // 'media' => 'Clipping.media_name',
1028 'escape' => array($this->getDatabaseConnection(), 'escapeSimple'), /// pear db or mdb object..
1033 $this->whereAdd($str); /*
1034 $tn_p.name LIKE '%$s%' OR
1035 $tn_p.email LIKE '%$s%' OR
1036 $tn_p.role LIKE '%$s%' OR
1037 $tn_p.phone LIKE '%$s%' OR
1038 $tn_p.remarks LIKE '%$s%'
1043 // project directory rules -- this may distrupt things.
1044 $p = DB_DataObject::factory('ProjectDirectory');
1045 // if project directories are set up, then we can apply project query rules..
1048 $pids = $p->projects($au);
1049 if (isset($q['query']['project_id'])) {
1050 $pid = (int)$q['query']['project_id'];
1051 if (!in_array($pid, $pids)) {
1052 $roo->jerr("Project not in users valid projects");
1054 $pids = array($pid);
1057 //if (empty($q['_anyrole'])) { // should be project_directry_role
1058 // $p->whereAdd("{$p->tableName()}.role != ''");
1060 if (!empty($q['query']['role'])) { // should be project_directry_role
1061 $role = $this->escape($q['query']['role']);
1063 $p->whereAdd("{$p->tableName()}.role LIKE '%{$role}%'");
1067 if (!$roo->hasPerm('Core.Projects_All', 'S')) {
1068 $peps = $p->people($pids);
1069 $this->whereAddIn("{$tn}.id", $peps, 'int');
1073 // fixme - this needs a more generic fix - it was from the mtrack_person code...
1074 if (isset($q['query']['ticket_id'])) {
1075 // find out what state the ticket is in.
1076 $t = DB_DataObject::Factory('mtrack_ticket');
1078 $t->get($q['query']['ticket_id']);
1080 if (!$this->checkPerm('S', $au)) {
1081 $roo->jerr("permssion denied to query state of ticket");
1084 $p = DB_DataObject::factory('ProjectDirectory');
1085 $pids = array($t->project_id);
1087 $peps = $p->people($pids);
1089 $this->whereAddIn($this->tableName().'.id', $peps, 'int');
1091 //$this->whereAdd('join_prole != ''");
1096 * Seems we never expose oath_key / passwd, so...
1099 if($this->tableName() == 'core_person'){
1100 $this->_extra_cols = array('length_passwd', 'length_oath_key');
1103 LENGTH({$this->tableName()}.passwd) AS length_passwd,
1104 LENGTH({$this->tableName()}.oath_key) AS length_oath_key
1111 function setFromRoo($ar, $roo)
1113 $this->setFrom($ar);
1115 if(!empty($ar['_enable_oath_key'])){
1116 $oath_key = $this->getOathKey();
1119 if (!empty($ar['passwd1'])) {
1120 $this->setPassword($ar['passwd1']);
1124 ($this->email == $roo->old->email)&&
1125 ($this->company_id == $roo->old->company_id)
1129 if (empty($this->email)) {
1132 // this only applies to our owner company..
1133 $c = $this->company();
1134 if (empty($c->comptype_name) || $c->comptype_name != 'OWNER') {
1139 $xx = DB_Dataobject::factory($this->tableName());
1141 'email' => $this->email,
1142 // 'company_id' => $x->company_id
1146 return "Duplicate Email found";
1153 * before Delete - delete significant dependancies..
1154 * this is called after checkPerm..
1157 function beforeDelete($dependants_array, $roo)
1159 //delete group membership except for admin group..
1160 // if they are a member of admin group do not delete anything.
1161 $default_admin = false;
1163 $e = DB_DataObject::Factory('Events');
1164 $e->whereAdd('person_id = ' . $this->id);
1166 $g = DB_DataObject::Factory('core_group');
1167 $g->get('name', 'Administrators'); // select * from core_group where name = 'Administrators'
1169 $p = DB_DataObject::Factory('core_group_member');
1171 'user_id' => $this->id,
1172 'group_id' => $g->id
1176 $roo->jerr("Please remove this user from the Administrator group before deleting");
1180 $p = DB_DataObject::Factory('core_group_member');
1181 $p->user_id = $this->id;
1182 $mem = $p->fetchAll(); // fetch all the rows and set the $mem variable to the rows data, just like mysqli_fetch_assoc
1183 $e->logDeletedRecord($mem);
1185 foreach($mem as $p) {
1189 $e = DB_DataObject::Factory('Events');
1190 $e->person_id = $this->id;
1191 $eve = $e->fetchAll(); // fetch all the rows and set the $mem variable to the rows data, just like mysqli_fetch_assoc
1193 $e->logDeletedRecord($eve);
1194 foreach($eve as $e) {
1205 * Check if the a user has access to modify this item.
1206 * @param String $lvl Level (eg. Core.Projects)
1207 * @param Pman_Core_DataObjects_Person $au The authenticated user.
1208 * @param boolean $changes alllow changes???
1210 * @return false if no access..
1212 function checkPerm($lvl, $au, $changes=false) //heck who is trying to access this. false == access denied..
1215 // do we have an empty system..
1216 if ($au && $au->id == -1) {
1219 // if not authenticated... do not allow in???
1224 // determine if it's staff!!!
1225 $owncomp = DB_DataObject::Factory('core_company');
1226 $owncomp->get('comptype', 'OWNER');
1227 $isStaff = ($au->company_id == $owncomp->id);
1232 // - can not change company!!!
1234 isset($changes['company_id']) &&
1235 $changes['company_id'] != $au->company_id) {
1238 // can only set new emails..
1240 !empty($this->email) &&
1241 isset($changes['email']) &&
1242 $changes['email'] != $this->email) {
1247 // mtrack had the idea that all 'S' should be allowed.. - but filtered later..
1248 // ???? do we want this?
1250 // edit self... - what about other staff members...
1252 //return $this->company_id == $au->company_id;
1256 // yes, only owner company can mess with this...
1262 // extra case change passwod?
1263 case 'P': //??? password
1264 // standard perms -- for editing + if the user is dowing them selves..
1265 $ret = $isStaff ? $au->hasPerm("Core.Staff", "E") : $au->hasPerm("Core.Person", "E");
1266 return $ret || $au->id == $this->id;
1269 return $isStaff ? $au->hasPerm("Core.Staff", $lvl) : $au->hasPerm("Core.Person", $lvl);
1275 function beforeInsert($req, $roo)
1277 $p = DB_DataObject::factory('core_person');
1278 if ($roo->authUser->id > -1 || $p->count() > 1) {
1281 $c = DB_DataObject::Factory('core_company');
1284 if (!$tc || $tc> 1) {
1285 $roo->jerr("can not create initial user as multiple companies already exist");
1288 $this->company_id = $c->id;
1289 $this->email = trim($this->email);
1293 function onInsert($req, $roo)
1296 $p = DB_DataObject::factory('core_person');
1297 if ($roo->authUser->id < 0 && $p->count() == 1) {
1298 // this seems a bit risky...
1300 $g = DB_DataObject::factory('core_group');
1304 $g->get('name', 'Administrators');
1306 $p = DB_DataObject::factory('core_group_member');
1307 $p->group_id = $g->id;
1308 $p->user_id = $this->id;
1311 $roo->addEvent("ADD", $p, $g->toEventString(). " Added " . $this->toEventString());
1315 if (!empty($req['project_id_addto'])) {
1316 $pd = DB_DataObject::factory('ProjectDirectory');
1317 $pd->project_id = $req['project_id_addto'];
1318 $pd->person_id = $this->id;
1320 $pd->office_id = $this->office_id;
1321 $pd->company_id = $this->company_id;
1327 function importFromArray($roo, $persons, $opts)
1329 if (empty($opts['prefix'])) {
1330 $roo->jerr("opts[prefix] is empty - you can not just create passwords based on the user names");
1333 if (!is_array($persons) || empty($persons)) {
1334 $roo->jerr("error in the person data. - empty on not valid");
1336 DB_DataObject::factory('core_group')->initGroups();
1338 foreach($persons as $person){
1339 $p = DB_DataObject::factory('core_person');
1340 if($p->get('name', $person['name'])){
1343 $p->setFrom($person);
1345 $companies = DB_DataObject::factory('core_company');
1346 if(!$companies->get('comptype', 'OWNER')){
1347 $roo->jerr("Missing OWNER companies!");
1349 $p->company_id = $companies->pid();
1350 // strip the 'spaces etc.. make lowercase..
1351 $name = strtolower(str_replace(' ', '', $person['name']));
1352 $p->setPassword("{$opts['prefix']}{$name}");
1355 // if $person->groups is set.. then
1356 // add this person to that group eg. groups : [ 'Administrator' ]
1357 if(!empty($person['groups'])){
1358 $groups = DB_DataObject::factory('core_group');
1359 if(!$groups->get('name', $person['groups'])){
1360 $roo->jerr("Missing groups : {$person['groups']}");
1362 $gm = DB_DataObject::factory('core_group_member');
1363 $gm->change($p, $groups, true);
1366 $p->onInsert(array(), $roo);
1370 // this is for the To: "{getEmailName()}" <email@address>
1371 // not good for Dear XXXX, - use {person.firstname} for that.
1372 function getEmailName()
1376 if(!empty($this->honor)){
1377 array_push($name, $this->honor);
1380 if(!empty($this->name)){
1381 array_push($name, $this->name);
1383 return implode(' ', $name);
1386 if(!empty($this->firstname) || !empty($this->lastname)){
1387 array_push($name, $this->firstname);
1388 array_push($name, $this->lastname);
1390 $name = array_filter($name);
1392 return implode(' ', $name);
1395 return $this->email;
1398 function sesPrefix()
1400 $ff= HTML_FlexyFramework::get();
1402 $appname = empty($ff->appNameShort) ? $ff->project : $ff->project . '-' . $ff->appNameShort;
1404 $dname = method_exists($this, 'getDatabaseConnection') ? $this->getDatabaseConnection()->dsn['database'] : $this->databaseNickname();
1406 $sesPrefix = $appname.'-' .get_class($this) .'-' . $dname;
1411 function loginPublic()
1413 $this->isAuth(); // force session start..
1415 $db = $this->getDatabaseConnection();
1417 $ff = HTML_FlexyFramework::get();
1419 if(empty($ff->Pman) || empty($ff->Pman['login_public'])){
1423 $sesPrefix = $ff->Pman['login_public'] . '-' .get_class($this) .'-'.$db->dsn['database'] ;
1425 $p = DB_DAtaObject::Factory($this->tableName());
1426 $p->get($this->pid());
1428 $_SESSION[get_class($this)][$sesPrefix .'-auth'] = serialize((object)$p->toArray());
1433 function beforeUpdate($old, $q, $roo)
1435 $this->email = trim($this->email);
1438 function getOathKey()
1440 require 'Base32.php';
1442 $base32 = new Base32();
1444 return $base32->base32_encode(bin2hex(openssl_random_pseudo_bytes(10)));
1447 function generateQRCode()
1450 empty($this->email) &&
1451 empty($this->oath_key)
1456 $issuer = (empty($this->name)) ?
1457 rawurlencode('ROOJS') : rawurlencode($this->name);
1459 $uri = "otpauth://totp/{$issuer}:{$this->email}?secret={$this->oath_key}&issuer={$issuer}&algorithm=SHA1&digits=6&period=30";
1461 require_once 'Image/QRCode.php';
1463 $qrcode = new Image_QRCode();
1465 $image = $qrcode->makeCode($uri, array(
1466 'output_type' => 'return'
1471 $base64 = base64_encode(ob_get_contents());
1474 return "data:image/png;base64,{$base64}";