summaryrefslogtreecommitdiffstats
path: root/library/nagvis-includes/CoreAuthorisationModIcingaweb2.php
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 12:45:29 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 12:45:29 +0000
commit0fa6f7723cca9bf7edc8af84112e8429e82dea84 (patch)
tree52c73718c9e2b6e4aa3f997791786aa2ee6ebcc9 /library/nagvis-includes/CoreAuthorisationModIcingaweb2.php
parentInitial commit. (diff)
downloadicingaweb2-module-nagvis-0fa6f7723cca9bf7edc8af84112e8429e82dea84.tar.xz
icingaweb2-module-nagvis-0fa6f7723cca9bf7edc8af84112e8429e82dea84.zip
Adding upstream version 1.1.1.upstream/1.1.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'library/nagvis-includes/CoreAuthorisationModIcingaweb2.php')
-rw-r--r--library/nagvis-includes/CoreAuthorisationModIcingaweb2.php183
1 files changed, 183 insertions, 0 deletions
diff --git a/library/nagvis-includes/CoreAuthorisationModIcingaweb2.php b/library/nagvis-includes/CoreAuthorisationModIcingaweb2.php
new file mode 100644
index 0000000..111ecba
--- /dev/null
+++ b/library/nagvis-includes/CoreAuthorisationModIcingaweb2.php
@@ -0,0 +1,183 @@
+<?php
+
+use Icinga\Application\Icinga;
+use Icinga\Authentication\Auth;
+use Icinga\Module\Nagvis\RestrictionHelper;
+
+class CoreAuthorisationModIcingaweb2 extends CoreAuthorisationModule
+{
+ public $rolesConfigurable = false;
+
+ private $auth;
+
+ public function __construct()
+ {
+ $this->auth = Auth::getInstance();
+ }
+
+ public function parsePermissions($sUsername = null)
+ {
+ global $CORE;
+
+ if ($sUsername !== null) {
+ die('parsePermissions() with username is not supported');
+ }
+
+ $perms = array(
+ 'General' => array('*' => array('*' => true)),
+ 'User' => array('setOption' => array('*' => true)),
+ 'Search' => array('view' => array('*' => true)),
+ 'Rotation' => array('view' => array('*' => true))
+ );
+
+ $restriction = RestrictionHelper::getRegex();
+ if ($restriction !== null) {
+ $maps = array();
+ foreach ($CORE->getAvailableMaps($restriction) as $map) {
+ $maps[$map] = true;
+ }
+ if (! empty($maps)) {
+ $perms['Map'] = array('view' => $maps);
+ }
+ } else {
+ $perms['Map'] = array('view' => array('*' => true));
+ }
+
+ if ($this->auth->hasPermission('nagvis/overview')) {
+ $perms['Overview'] = array('view' => array('*' => true));
+ }
+
+ // Never allowed:
+ // ChangePassword - change
+ // Auth - logout
+ // UserMgmt - manage
+ // RoleMgmt - manage
+ // Action - perform - *
+
+ if ($this->auth->hasPermission('nagvis/edit')) {
+ $perms['ManageShapes'] = array('manage' => array('*' => true));
+ $perms['ManageBackgrounds'] = array('manage' => array('*' => true));
+ $perms['Overview']['edit'] = array('*' => true);
+ $perms['Map']['add'] = array('*' => true);
+ $perms['Map']['edit'] = array('*' => true);
+ $perms['Map']['manage'] = array('*' => true);
+ }
+
+ if ($this->auth->hasPermission('nagvis/admin')) {
+ $perms['MainCfg'] = array('edit' => array('*' => true));
+ }
+
+ return $perms;
+ }
+
+ public function getUserRoles($userId)
+ {
+ // $userId is now the username
+ return array();
+ die("getUserRoles($userId)");
+ return array(0 => array('name' => 'Administrators'));
+ // [ { roleId, name }, ... ]
+ }
+
+ public function getAllRoles()
+ {
+ // die('getAllRoles');
+ // User menu -> Manage Users
+ return array();
+ // [ { roleId, name }, ... ]
+ }
+
+
+ // I want to get rid of those :(
+
+ public function isPermitted($sModule, $sAction, $sObj = null)
+ {
+ die("isPermitted($sModule, $sAction, $sObj) - should never be called");
+ return false;
+ }
+
+ public function deletePermission($mod, $name)
+ {
+ return false;
+ // $mod -> Map, Rotation
+ }
+
+ public function createPermission($mod, $name)
+ {
+ return false;
+ }
+
+ public function roleUsedBy($roleId)
+ {
+ die("roleUsedBy($roleId)");
+ return array();
+ // [ name , ... ]
+ }
+
+ public function deleteRole($roleId)
+ {
+ return false;
+ }
+
+ public function deleteUser($userId)
+ {
+ return false;
+ }
+
+ public function updateUserRoles($userId, $roles)
+ {
+ return false;
+ // roles = [roleId, ...]
+ }
+
+
+ public function getRoleId($sRole)
+ {
+ die("getRoleId($sRole)");
+ return 0;
+ }
+
+ public function getAllPerms()
+ {
+ die('getAllPerms');
+ return array();
+ // [ { permId, mod, act, obj }, ... ]
+ }
+
+ public function getRolePerms($roleId) {
+ die("getRolePerms($roleId)");
+ return array();
+ // [ permId => true, ... ]
+ }
+
+ public function updateRolePerms($roleId, $perms)
+ {
+ // $perms = [ permId, ... ]
+ return false;
+ }
+
+ public function checkRoleExists($name)
+ {
+ die("checkRoleExists($name)");
+ return false;
+ }
+
+ public function createRole($name)
+ {
+ die("createRole($name)");
+ return true;
+ }
+
+
+ private function checkUserExistsById($id)
+ {
+ die('checkUserExistsById');
+ return false;
+ }
+
+ public function getUserId($sUsername)
+ {
+ die('getUserId');
+ return 0;
+ }
+}