1060 lines
47 KiB
PHP
1060 lines
47 KiB
PHP
|
<?php
|
||
|
/*********************************************************************************
|
||
|
*
|
||
|
* TimeTrex is a Workforce Management program developed by
|
||
|
* TimeTrex Software Inc. Copyright (C) 2003 - 2021 TimeTrex Software Inc.
|
||
|
*
|
||
|
* This program is free software; you can redistribute it and/or modify it under
|
||
|
* the terms of the GNU Affero General Public License version 3 as published by
|
||
|
* the Free Software Foundation with the addition of the following permission
|
||
|
* added to Section 15 as permitted in Section 7(a): FOR ANY PART OF THE COVERED
|
||
|
* WORK IN WHICH THE COPYRIGHT IS OWNED BY TIMETREX, TIMETREX DISCLAIMS THE
|
||
|
* WARRANTY OF NON INFRINGEMENT OF THIRD PARTY RIGHTS.
|
||
|
*
|
||
|
* This program is distributed in the hope that it will be useful, but WITHOUT
|
||
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
|
||
|
* FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more
|
||
|
* details.
|
||
|
*
|
||
|
*
|
||
|
* You should have received a copy of the GNU Affero General Public License along
|
||
|
* with this program; if not, see http://www.gnu.org/licenses or write to the Free
|
||
|
* Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
||
|
* 02110-1301 USA.
|
||
|
*
|
||
|
*
|
||
|
* You can contact TimeTrex headquarters at Unit 22 - 2475 Dobbin Rd. Suite
|
||
|
* #292 West Kelowna, BC V4T 2E9, Canada or at email address info@timetrex.com.
|
||
|
*
|
||
|
*
|
||
|
* The interactive user interfaces in modified source and object code versions
|
||
|
* of this program must display Appropriate Legal Notices, as required under
|
||
|
* Section 5 of the GNU Affero General Public License version 3.
|
||
|
*
|
||
|
*
|
||
|
* In accordance with Section 7(b) of the GNU Affero General Public License
|
||
|
* version 3, these Appropriate Legal Notices must retain the display of the
|
||
|
* "Powered by TimeTrex" logo. If the display of the logo is not reasonably
|
||
|
* feasible for technical reasons, the Appropriate Legal Notices must display
|
||
|
* the words "Powered by TimeTrex".
|
||
|
*
|
||
|
********************************************************************************/
|
||
|
|
||
|
|
||
|
/**
|
||
|
* @package API\Users
|
||
|
*/
|
||
|
class APIUser extends APIFactory {
|
||
|
protected $main_class = 'UserFactory';
|
||
|
|
||
|
/**
|
||
|
* APIUser constructor.
|
||
|
*/
|
||
|
public function __construct() {
|
||
|
parent::__construct(); //Make sure parent constructor is always called.
|
||
|
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Get default user data for creating new users.
|
||
|
* @param string $tmp_company_id UUID
|
||
|
* @return array
|
||
|
*/
|
||
|
function getUserDefaultData( $tmp_company_id = null, $default_id = null ) {
|
||
|
//Allow getting default data from other companies, so it makes it easier to create the first employee of a company.
|
||
|
if ( $tmp_company_id != '' && TTUUID::isUUID( $tmp_company_id ) && $tmp_company_id != TTUUID::getZeroID() && $tmp_company_id != TTUUID::getNotExistID() && $this->getPermissionObject()->Check( 'company', 'enabled' ) && $this->getPermissionObject()->Check( 'company', 'view' ) ) {
|
||
|
$company_id = $tmp_company_id;
|
||
|
} else {
|
||
|
$company_id = $this->getCurrentCompanyObject()->getId();
|
||
|
}
|
||
|
Debug::Text( 'Getting user default data for Company ID: ' . $company_id . ' TMP Company ID: ' . $tmp_company_id, __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
|
||
|
$uf = TTnew( 'UserFactory' ); /** @var UserFactory $uf */
|
||
|
|
||
|
//Get New Hire Defaults.
|
||
|
$udlf = TTnew( 'UserDefaultListFactory' ); /** @var UserDefaultListFactory $udlf */
|
||
|
if ( $default_id == '' ) {
|
||
|
$udlf->getByCompanyId( $company_id );
|
||
|
} else {
|
||
|
if ( TTUUID::isUUID( $default_id ) ) {
|
||
|
$udlf->getByIdAndCompanyId( $default_id, $company_id );
|
||
|
} else {
|
||
|
$udlf->getByCompanyIdAndName( $company_id, $default_id );
|
||
|
}
|
||
|
}
|
||
|
if ( $udlf->getRecordCount() > 0 ) {
|
||
|
Debug::Text( 'Using User Defaults, as they exist...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
$udf_obj = $udlf->getCurrent(); /** @var UserDefaultFactory $udf_obj */
|
||
|
|
||
|
$data = [
|
||
|
'company_id' => $company_id,
|
||
|
'legal_entity_id' => $udf_obj->getLegalEntity(),
|
||
|
'enable_login' => true,
|
||
|
'status_id' => 10, //Active.
|
||
|
'title_id' => $udf_obj->getTitle(),
|
||
|
'employee_number' => $uf->getNextAvailableEmployeeNumber( $company_id ),
|
||
|
'city' => $udf_obj->getCity(),
|
||
|
'country' => $udf_obj->getCountry(),
|
||
|
'province' => $udf_obj->getProvince(),
|
||
|
'work_phone' => $udf_obj->getWorkPhone(),
|
||
|
'work_phone_ext' => $udf_obj->getWorkPhoneExt(),
|
||
|
'work_email' => $udf_obj->getWorkEmail(),
|
||
|
'hire_date' => TTDate::getAPIDate( 'DATE', time() ),
|
||
|
'sex_id' => 5, //Unspecified.
|
||
|
'default_branch_id' => $udf_obj->getDefaultBranch(),
|
||
|
'default_department_id' => $udf_obj->getDefaultDepartment(),
|
||
|
'permission_control_id' => $udf_obj->getPermissionControl(),
|
||
|
'terminated_permission_control_id' => $udf_obj->getTerminatedPermissionControl(),
|
||
|
'pay_period_schedule_id' => $udf_obj->getPayPeriodSchedule(),
|
||
|
'policy_group_id' => $udf_obj->getPolicyGroup(),
|
||
|
'currency_id' => $udf_obj->getCurrency(),
|
||
|
'hierarchy_control' => $udf_obj->getHierarchyControl(),
|
||
|
'recurring_schedule_id' => $udf_obj->getRecurringSchedule(),
|
||
|
'user_default_id' => $udf_obj->getId(),
|
||
|
];
|
||
|
} else {
|
||
|
Debug::Text( ' User Default data does not exists for Company ID: ' . $company_id .' Trying to determine them automatically...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
|
||
|
$data = [
|
||
|
'company_id' => $company_id,
|
||
|
'enable_login' => true,
|
||
|
'status_id' => 10, //Active.
|
||
|
'employee_number' => $uf->getNextAvailableEmployeeNumber( $company_id ),
|
||
|
'hire_date' => TTDate::getAPIDate( 'DATE', time() ),
|
||
|
'sex_id' => 5, //Unspecified.
|
||
|
];
|
||
|
|
||
|
$lelf = TTnew( 'LegalEntityListFactory' );
|
||
|
$lelf->getByCompanyId( $company_id );
|
||
|
if ( $lelf->getRecordCount() > 0 ) {
|
||
|
$data['legal_entity_id'] = $lelf->getCurrent()->getId();
|
||
|
}
|
||
|
unset( $lelf );
|
||
|
|
||
|
$clf = TTnew( 'CurrencyListFactory' );
|
||
|
$clf->getByCompanyIdAndDefault( $company_id, true );
|
||
|
if ( $clf->getRecordCount() > 0 ) {
|
||
|
$data['currency_id'] = $clf->getCurrent()->getId();
|
||
|
}
|
||
|
unset( $clf );
|
||
|
|
||
|
$pclf = TTnew( 'PermissionControlListFactory' );
|
||
|
$pclf->getByCompanyId( $company_id );
|
||
|
if ( $pclf->getRecordCount() > 0 ) {
|
||
|
$data['permission_control_id'] = $pclf->getCurrent()->getId();
|
||
|
}
|
||
|
unset( $pclf );
|
||
|
}
|
||
|
|
||
|
if ( !isset( $data['company_id'] ) ) {
|
||
|
$data['company_id'] = $company_id;
|
||
|
}
|
||
|
|
||
|
if ( !isset( $data['status_id'] ) ) {
|
||
|
$data['status_id'] = 10; //Active
|
||
|
}
|
||
|
|
||
|
if ( !isset( $data['currency_id'] ) ) {
|
||
|
$data['currency_id'] = TTUUID::getZeroID();
|
||
|
}
|
||
|
|
||
|
if ( !isset( $data['country'] ) ) {
|
||
|
$data['country'] = 'US';
|
||
|
}
|
||
|
|
||
|
if ( !isset( $data['user_default_id'] ) ) {
|
||
|
$data['user_default_id'] = TTUUID::getZeroID();
|
||
|
}
|
||
|
|
||
|
$ulf = TTnew( 'UserListFactory' ); /** @var UserListFactory $ulf */
|
||
|
$ulf->getHighestEmployeeNumberByCompanyId( $company_id );
|
||
|
if ( $ulf->getRecordCount() > 0 ) {
|
||
|
Debug::Text( 'Highest Employee Number: ' . $ulf->getCurrent()->getEmployeeNumber(), __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
if ( is_numeric( $ulf->getCurrent()->getEmployeeNumber() ) == true ) {
|
||
|
$data['next_available_employee_number'] = ( $ulf->getCurrent()->getEmployeeNumber() + 1 );
|
||
|
} else {
|
||
|
Debug::Text( 'Highest Employee Number is not an integer.', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
$data['next_available_employee_number'] = null;
|
||
|
}
|
||
|
} else {
|
||
|
$data['next_available_employee_number'] = 1;
|
||
|
}
|
||
|
|
||
|
if ( !isset( $data['hire_date'] ) || $data['hire_date'] == '' ) {
|
||
|
$data['hire_date'] = TTDate::getAPIDate( 'DATE', time() );
|
||
|
}
|
||
|
|
||
|
//Try to default the hierarchy as best we can if its a supervisor (subordinates only) creating the employee record.
|
||
|
if ( $this->getPermissionObject()->Check( 'user', 'view' ) == false && $this->getPermissionObject()->Check( 'user', 'view_child' ) == true ) {
|
||
|
$api_hc = new APIHierarchyControl;
|
||
|
$hierarchy_control_options = $this->stripReturnHandler( $api_hc->getHierarchyControlOptions( false ) ); //Don't include blank.
|
||
|
if ( is_array( $hierarchy_control_options ) ) {
|
||
|
foreach ( $hierarchy_control_options as $hierarchy_object_type => $hierarchy_control_ids ) {
|
||
|
if ( count( $hierarchy_control_ids ) == 1 ) {
|
||
|
$data['hierarchy_control'][$hierarchy_object_type] = Misc::trimSortPrefix( key( $hierarchy_control_ids ) );
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
unset( $api_hc );
|
||
|
}
|
||
|
|
||
|
$data = $uf->getCustomFieldsDefaultData( $company_id, $data );
|
||
|
|
||
|
return $this->returnHandler( $data );
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* @param string $format
|
||
|
* @param array $data
|
||
|
* @param bool $disable_paging
|
||
|
* @return array|bool
|
||
|
*/
|
||
|
function exportUser( $format = 'csv', $data = null, $disable_paging = true ) {
|
||
|
$result = $this->stripReturnHandler( $this->getUser( $data, $disable_paging ) );
|
||
|
|
||
|
return $this->exportRecords( $format, 'export_employee', $result, ( ( isset( $data['filter_columns'] ) ) ? $data['filter_columns'] : null ) );
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Get user data for one or more users.
|
||
|
* @param array $data filter data, see reference for details.
|
||
|
* @param boolean $disable_paging disables paging and returns all records.
|
||
|
* @return array|bool
|
||
|
* @see UserListFactory::getAPISearchByCompanyIdAndArrayCriteria() To see a description of the ListFactory that is used.
|
||
|
*/
|
||
|
function getUser( $data = null, $disable_paging = false ) {
|
||
|
$data = $this->initializeFilterAndPager( $data, $disable_paging );
|
||
|
|
||
|
if ( $this->getPermissionObject()->checkAuthenticationType( 700 ) == false ) { //700=HTTP Auth with username/password
|
||
|
return $this->getPermissionObject()->AuthenticationTypeDenied();
|
||
|
}
|
||
|
|
||
|
if ( !$this->getPermissionObject()->Check( 'user', 'enabled' )
|
||
|
|| !( $this->getPermissionObject()->Check( 'user', 'view' ) || $this->getPermissionObject()->Check( 'user', 'view_own' ) || $this->getPermissionObject()->Check( 'user', 'view_child' ) ) ) {
|
||
|
return $this->getPermissionObject()->PermissionDenied();
|
||
|
}
|
||
|
|
||
|
//We need to take into account different permissions, ie: punch->view, view_child, view_own when displaying the dropdown
|
||
|
//box in the TimeSheet view and other views as well. Allow the caller of this function to pass a "permission_section"
|
||
|
//that can be used to determine this.
|
||
|
$permission_section = 'user';
|
||
|
$valid_permission_sections = [ 'user', 'wage', 'user_contact', 'accrual', 'roe', 'punch', 'schedule', 'recurring_schedule', 'message', 'user_expense', 'pay_stub_amendment', 'policy_group', 'user_membership', 'user_skill', 'user_education', 'user_license', 'user_language', 'user_review', 'job_application' ]; //#2242 - Make sure we limit the sections to a specific list to avoid security bypasses.
|
||
|
if ( isset( $data['permission_section'] ) && $data['permission_section'] != '' ) {
|
||
|
if ( in_array( trim( strtolower( $data['permission_section'] ) ), $valid_permission_sections ) ) {
|
||
|
$permission_section = trim( strtolower( $data['permission_section'] ) );
|
||
|
} else {
|
||
|
Debug::Text( 'ERROR: NOT ALLOWED: permission_section: ' . $data['permission_section'], __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
}
|
||
|
}
|
||
|
Debug::Text( 'Permission Section: ' . $permission_section, __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
|
||
|
//Get Permission Hierarchy Children first, as this can be used for viewing, or editing.
|
||
|
//$data['filter_data']['permission_children_ids'] = $this->getPermissionObject()->getPermissionChildren( $permission_section, 'view' );
|
||
|
$data['filter_data'] = array_merge( (array)$data['filter_data'], $this->getPermissionObject()->getPermissionFilterData( $permission_section, 'view' ) );
|
||
|
//Debug::Arr($data['filter_data']['permission_children_ids'], 'Permission Section: '. $permission_section .' Child IDs: ', __FILE__, __LINE__, __METHOD__, 10);
|
||
|
|
||
|
//Allow getting users from other companies, so we can change admin contacts when using the master company.
|
||
|
//Need to allow -1 to be accepted for Edit Company view to not show any employees in Contact dropdowns when creating a new company.
|
||
|
//But show the proper employees (for that company) in Contact dropdowns when editing an existing company.
|
||
|
if ( isset( $data['filter_data']['company_id'] )
|
||
|
&& !empty( $data['filter_data']['company_id'] )
|
||
|
&& ( $this->getPermissionObject()->Check( 'company', 'enabled' ) && $this->getPermissionObject()->Check( 'company', 'view' ) ) ) {
|
||
|
$company_id = $data['filter_data']['company_id'];
|
||
|
} else {
|
||
|
$company_id = $this->getCurrentCompanyObject()->getId();
|
||
|
}
|
||
|
|
||
|
$include_last_punch_time = ( isset( $data['filter_columns']['max_punch_time_stamp'] ) ) ? true : false;
|
||
|
|
||
|
$ulf = TTnew( 'UserListFactory' ); /** @var UserListFactory $ulf */
|
||
|
$ulf->getAPISearchByCompanyIdAndArrayCriteria( $company_id, $data['filter_data'], $data['filter_items_per_page'], $data['filter_page'], null, $data['filter_sort'], $include_last_punch_time );
|
||
|
Debug::Text( 'Record Count: ' . $ulf->getRecordCount(), __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
if ( $ulf->getRecordCount() > 0 ) {
|
||
|
$this->getProgressBarObject()->start( $this->getAPIMessageID(), $ulf->getRecordCount() );
|
||
|
|
||
|
$this->setPagerObject( $ulf );
|
||
|
|
||
|
$retarr = [];
|
||
|
foreach ( $ulf as $u_obj ) {
|
||
|
$retarr[] = $u_obj->getObjectAsArray( $data['filter_columns'] );
|
||
|
|
||
|
$this->getProgressBarObject()->set( $this->getAPIMessageID(), $ulf->getCurrentRow() );
|
||
|
}
|
||
|
|
||
|
$this->getProgressBarObject()->stop( $this->getAPIMessageID() );
|
||
|
|
||
|
//Debug::Arr($retarr, 'User Data: ', __FILE__, __LINE__, __METHOD__, 10);
|
||
|
|
||
|
return $this->returnHandler( $retarr );
|
||
|
}
|
||
|
|
||
|
return $this->returnHandler( true ); //No records returned.
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Get only the fields that are common across all records in the search criteria. Used for Mass Editing of records.
|
||
|
* @param array $data filter data
|
||
|
* @return array
|
||
|
*/
|
||
|
function getCommonUserData( $data ) {
|
||
|
return Misc::arrayIntersectByRow( $this->stripReturnHandler( $this->getUser( $data, true ) ) );
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Validate user data for one or more users.
|
||
|
* @param array $data user data
|
||
|
* @return array
|
||
|
*/
|
||
|
function validateUser( $data ) {
|
||
|
return $this->setUser( $data, true );
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Set user data for one or more users.
|
||
|
* @param array $data user data
|
||
|
* @param bool $validate_only
|
||
|
* @param bool $ignore_warning
|
||
|
* @return array|bool
|
||
|
*/
|
||
|
function setUser( $data, $validate_only = false, $ignore_warning = true ) {
|
||
|
global $authentication;
|
||
|
|
||
|
$validate_only = (bool)$validate_only;
|
||
|
$ignore_warning = (bool)$ignore_warning;
|
||
|
|
||
|
if ( !is_array( $data ) ) {
|
||
|
return $this->returnHandler( false );
|
||
|
}
|
||
|
|
||
|
if ( $this->getPermissionObject()->checkAuthenticationType( 700 ) == false ) { //700=HTTP Auth with username/password
|
||
|
return $this->getPermissionObject()->AuthenticationTypeDenied();
|
||
|
}
|
||
|
|
||
|
//If they have permissions to edit user records other than their own, make sure their status is Active.
|
||
|
if ( $this->getCurrentUserObject()->getStatus() != 10 && ( $this->getPermissionObject()->Check( 'user', 'edit' ) || $this->getPermissionObject()->Check( 'user', 'edit_child' ) ) ) { //10=Active -- Make sure user record is active as well.
|
||
|
return $this->getPermissionObject()->PermissionDenied( false, TTi18n::getText( 'Employee status must be Active to modify employees' ) );
|
||
|
}
|
||
|
|
||
|
if ( !$this->getPermissionObject()->Check( 'user', 'enabled' )
|
||
|
|| !( $this->getPermissionObject()->Check( 'user', 'edit' ) || $this->getPermissionObject()->Check( 'user', 'edit_own' ) || $this->getPermissionObject()->Check( 'user', 'edit_child' ) || $this->getPermissionObject()->Check( 'user', 'add' ) ) ) {
|
||
|
return $this->getPermissionObject()->PermissionDenied();
|
||
|
}
|
||
|
if ( $validate_only == true ) {
|
||
|
Debug::Text( 'Validating Only!', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
$permission_children_ids = false;
|
||
|
} else {
|
||
|
//Get Permission Hierarchy Children first, as this can be used for viewing, or editing.
|
||
|
$permission_children_ids = $this->getPermissionChildren();
|
||
|
}
|
||
|
|
||
|
[ $data, $total_records ] = $this->convertToMultipleRecords( $data );
|
||
|
Debug::Text( 'Received data for: ' . $total_records . ' Users', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
//Debug::Arr($data, 'Data: ', __FILE__, __LINE__, __METHOD__, 10);
|
||
|
|
||
|
$validator_stats = [ 'total_records' => $total_records, 'valid_records' => 0 ];
|
||
|
$validator = $save_result = []; $key = false;
|
||
|
if ( is_array( $data ) && $total_records > 0 ) {
|
||
|
$this->getProgressBarObject()->start( $this->getAPIMessageID(), $total_records );
|
||
|
|
||
|
foreach ( $data as $key => $row ) {
|
||
|
$transaction_function = function () use ( $row, $validate_only, $ignore_warning, $validator_stats, $validator, $save_result, $key, $total_records, $permission_children_ids ) {
|
||
|
$primary_validator = new Validator();
|
||
|
|
||
|
$lf = TTnew( 'UserListFactory' ); /** @var UserListFactory $lf */
|
||
|
if ( $validate_only == false ) { //Only switch into serializable mode when actually saving the record.
|
||
|
$lf->setTransactionMode( 'REPEATABLE READ' ); //Required to help prevent duplicate simulataneous HTTP requests from causing duplicate user records or duplicate employee number/user_names.
|
||
|
}
|
||
|
$lf->StartTransaction();
|
||
|
|
||
|
//Force Company ID to current company.
|
||
|
if ( !isset( $row['company_id'] ) || ( isset( $row['company_id'] ) && $row['company_id'] == '' ) || !$this->getPermissionObject()->Check( 'company', 'view' ) ) {
|
||
|
$row['company_id'] = $this->getCurrentCompanyObject()->getId();
|
||
|
}
|
||
|
|
||
|
if ( isset( $row['id'] ) && $row['id'] != '' ) {
|
||
|
//Modifying existing object.
|
||
|
//Get user object, so we can only modify just changed data for specific records if needed.
|
||
|
$lf->getByIdAndCompanyId( $row['id'], $row['company_id'] );
|
||
|
if ( $lf->getRecordCount() == 1 ) {
|
||
|
//Object exists, check edit permissions
|
||
|
//Debug::Text('User ID: '. $row['id'] .' Created By: '. $lf->getCurrent()->getCreatedBy() .' Is Owner: '. (int)$this->getPermissionObject()->isOwner( $lf->getCurrent()->getCreatedBy(), $lf->getCurrent()->getID() ) .' Is Child: '. (int)$this->getPermissionObject()->isChild( $lf->getCurrent()->getId(), $permission_children_ids ), __FILE__, __LINE__, __METHOD__, 10);
|
||
|
if (
|
||
|
$validate_only == true
|
||
|
||
|
||
|
(
|
||
|
$this->getPermissionObject()->Check( 'user', 'edit' )
|
||
|
|| ( $this->getPermissionObject()->Check( 'user', 'edit_own' ) && $this->getPermissionObject()->isOwner( $lf->getCurrent()->getCreatedBy(), $lf->getCurrent()->getID() ) === true )
|
||
|
|| ( $this->getPermissionObject()->Check( 'user', 'edit_child' ) && $this->getPermissionObject()->isChild( $lf->getCurrent()->getId(), $permission_children_ids ) === true )
|
||
|
) ) {
|
||
|
|
||
|
Debug::Text( 'Row Exists, getting current data for ID: ' . $row['id'], __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
//$row = array_merge( $lf->getCurrent()->getObjectAsArray(), $row );
|
||
|
$lf = $lf->getCurrent(); //Make the current $lf variable the current object, so we can ignore some fields if needed.
|
||
|
$row = array_merge( $lf->getObjectAsArray(), $row );
|
||
|
} else {
|
||
|
$primary_validator->isTrue( 'permission', false, TTi18n::gettext( 'Edit permission denied' ) );
|
||
|
}
|
||
|
} else {
|
||
|
//Object doesn't exist.
|
||
|
$primary_validator->isTrue( 'id', false, TTi18n::gettext( 'Edit permission denied, record does not exist' ) );
|
||
|
}
|
||
|
} else {
|
||
|
//Adding new object, check ADD permissions.
|
||
|
$primary_validator->isTrue( 'permission', $this->getPermissionObject()->Check( 'user', 'add' ), TTi18n::gettext( 'Add permission denied' ) );
|
||
|
|
||
|
//Because password encryption requires the user_id, we need to get it first when creating a new employee.
|
||
|
$row['id'] = $lf->getNextInsertId();
|
||
|
}
|
||
|
|
||
|
//When doing a mass edit of employees, user name is never specified, so we need to avoid this validation issue.
|
||
|
//Generate random user name if its validate only and not otherwise specified.
|
||
|
if ( $validate_only == true && ( !isset( $row['user_name'] ) || $row['user_name'] == '' ) ) {
|
||
|
$row['user_name'] = 'random' . rand( 10000000, 99999999 );
|
||
|
}
|
||
|
//Debug::Arr($row, 'Data: ', __FILE__, __LINE__, __METHOD__, 10);
|
||
|
|
||
|
$is_valid = $primary_validator->isValid();
|
||
|
if ( $is_valid == true ) { //Check to see if all permission checks passed before trying to save data.
|
||
|
Debug::Text( 'Attempting to save data... API Message ID: ' . $this->getAPIMessageID(), __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
|
||
|
if ( DEMO_MODE == true && $lf->isNew() == false ) { //Allow changing these if DEMO is enabled, but they are adding new records.
|
||
|
Debug::Text( 'DEMO Mode ENABLED, disable modifying some data...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
unset( $row['permission_control_id'], $row['status_id'], $row['phone_id'], $row['user_name'], $row['password'] );
|
||
|
}
|
||
|
|
||
|
if ( $this->getPermissionObject()->Check( 'user', 'edit_advanced' ) == false ) {
|
||
|
Debug::Text( 'NOT allowing advanced edit...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
//Unset all advanced fields.
|
||
|
unset(
|
||
|
$row['user_name'],
|
||
|
$row['currency_id'],
|
||
|
$row['employee_number'], //This must always be set
|
||
|
$row['default_branch_id'],
|
||
|
$row['default_department_id'],
|
||
|
$row['group_id'],
|
||
|
$row['title_id'],
|
||
|
$row['first_name'],
|
||
|
$row['middle_name'],
|
||
|
$row['last_name'],
|
||
|
$row['city'],
|
||
|
$row['country'],
|
||
|
$row['province'],
|
||
|
$row['hire_date'],
|
||
|
$row['birth_date'],
|
||
|
$row['termination_date'],
|
||
|
$row['sin'],
|
||
|
$row['note'],
|
||
|
$row['tags']
|
||
|
);
|
||
|
}
|
||
|
|
||
|
unset( $row['mfa_type_id'] ); //Do not allow changing multifactor settings
|
||
|
|
||
|
//If the user doesn't have permissions to change the hierarchy_control, unset that data.
|
||
|
if ( isset( $row['hierarchy_control'] ) && ( $this->getPermissionObject()->Check( 'hierarchy', 'edit' ) || $this->getPermissionObject()->Check( 'user', 'edit_hierarchy' ) ) ) {
|
||
|
Debug::Text( 'Allowing change of hierarchy...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
} else {
|
||
|
Debug::Text( 'NOT allowing change of hierarchy...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
unset( $row['hierarchy_control'] );
|
||
|
}
|
||
|
|
||
|
//Handle additional permission checks for setPermissionControl().
|
||
|
if ( isset( $row['permission_control_id'] )
|
||
|
&& ( $lf->getPermissionLevel() <= $this->getPermissionObject()->getLevel() && ( $this->getPermissionObject()->Check( 'permission', 'edit' ) || $this->getPermissionObject()->Check( 'permission', 'edit_own' ) || $this->getPermissionObject()->Check( 'user', 'edit_permission_group' ) ) ) ) {
|
||
|
Debug::Text( 'Allowing change of permissions...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
} else {
|
||
|
Debug::Text( 'NOT allowing change of permissions...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
unset( $row['permission_control_id'] );
|
||
|
}
|
||
|
|
||
|
if ( isset( $row['pay_period_schedule_id'] ) && ( $this->getPermissionObject()->Check( 'pay_period_schedule', 'edit' ) || $this->getPermissionObject()->Check( 'user', 'edit_pay_period_schedule' ) ) ) {
|
||
|
Debug::Text( 'Allowing change of pay period schedule...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
} else {
|
||
|
Debug::Text( 'NOT allowing change of pay period schedule...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
unset( $row['pay_period_schedule_id'] );
|
||
|
}
|
||
|
|
||
|
if ( isset( $row['policy_group_id'] ) && ( $this->getPermissionObject()->Check( 'policy_group', 'edit' ) || $this->getPermissionObject()->Check( 'user', 'edit_policy_group' ) ) ) {
|
||
|
Debug::Text( 'Allowing change of policy group...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
} else {
|
||
|
Debug::Text( 'NOT allowing change of policy group...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
unset( $row['policy_group_id'] );
|
||
|
}
|
||
|
|
||
|
$lf->setObjectFromArray( $row );
|
||
|
|
||
|
$lf->Validator->setValidateOnly( $validate_only );
|
||
|
|
||
|
$is_valid = $lf->isValid( $ignore_warning );
|
||
|
|
||
|
if ( $validate_only == false && $lf->getIsRequiredCurrentPassword() == true ) {
|
||
|
$lf->FailTransaction();
|
||
|
$lf->CommitTransaction();
|
||
|
$lf->setTransactionMode(); //Back to default isolation level.
|
||
|
|
||
|
return [ $validator, $validator_stats, $key, false, true ];
|
||
|
}
|
||
|
|
||
|
if ( $is_valid == true ) {
|
||
|
Debug::Text( 'Saving data...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
if ( $validate_only == true ) {
|
||
|
$save_result[$key] = true;
|
||
|
} else {
|
||
|
$save_result[$key] = $lf->Save( true, true );
|
||
|
}
|
||
|
$validator_stats['valid_records']++;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
if ( $is_valid == false ) {
|
||
|
Debug::Text( 'Data is Invalid...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
|
||
|
$lf->FailTransaction(); //Just rollback this single record, continue on to the rest.
|
||
|
|
||
|
$validator[$key] = $this->setValidationArray( [ $primary_validator, $lf ], ( ( $total_records > 1 && is_object( $lf ) ) ? $lf->getFullName() : null ) );
|
||
|
} else if ( $validate_only == true ) {
|
||
|
//Always fail transaction when valididate only is used, as is saved to different tables immediately.
|
||
|
$lf->FailTransaction();
|
||
|
}
|
||
|
|
||
|
$lf->CommitTransaction();
|
||
|
$lf->setTransactionMode(); //Back to default isolation level.
|
||
|
|
||
|
return [ $validator, $validator_stats, $key, $save_result, false ];
|
||
|
};
|
||
|
|
||
|
[ $validator, $validator_stats, $key, $save_result, $is_reauthentication_required ] = $this->getMainClassObject()->RetryTransaction( $transaction_function );
|
||
|
|
||
|
if ( $is_reauthentication_required == true ) {
|
||
|
return $this->getPermissionObject()->ReauthenticationRequired( $this->getCurrentUserObject() );
|
||
|
}
|
||
|
|
||
|
$this->getProgressBarObject()->set( $this->getAPIMessageID(), $key );
|
||
|
}
|
||
|
|
||
|
$this->getProgressBarObject()->stop( $this->getAPIMessageID() );
|
||
|
|
||
|
//One time auth is used to verify single actions that require re-authentication and needs to be removed after used.
|
||
|
$authentication->reauthenticationActionCompleted();
|
||
|
|
||
|
return $this->handleRecordValidationResults( $validator, $validator_stats, $key, $save_result ); //Don't Enable System Job Queue status update, as it will trigger the spinner quite often when we rarely run background jobs currently.
|
||
|
}
|
||
|
|
||
|
return $this->returnHandler( false );
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Delete one or more users.
|
||
|
* @param array $data user data
|
||
|
* @return array|bool
|
||
|
*/
|
||
|
function deleteUser( $data ) {
|
||
|
if ( !is_array( $data ) ) {
|
||
|
$data = [ $data ];
|
||
|
}
|
||
|
|
||
|
if ( DEMO_MODE == true ) {
|
||
|
return $this->returnHandler( true );
|
||
|
}
|
||
|
|
||
|
if ( !is_array( $data ) ) {
|
||
|
return $this->returnHandler( false );
|
||
|
}
|
||
|
|
||
|
if ( $this->getPermissionObject()->checkAuthenticationType( 700 ) == false ) { //700=HTTP Auth with username/password
|
||
|
return $this->getPermissionObject()->AuthenticationTypeDenied();
|
||
|
}
|
||
|
|
||
|
if ( !$this->getPermissionObject()->Check( 'user', 'enabled' )
|
||
|
|| !( $this->getPermissionObject()->Check( 'user', 'delete' ) || $this->getPermissionObject()->Check( 'user', 'delete_own' ) || $this->getPermissionObject()->Check( 'user', 'delete_child' ) ) ) {
|
||
|
return $this->getPermissionObject()->PermissionDenied();
|
||
|
}
|
||
|
|
||
|
//Get Permission Hierarchy Children first, as this can be used for viewing, or editing.
|
||
|
$permission_children_ids = $this->getPermissionChildren();
|
||
|
|
||
|
Debug::Text( 'Received data for: ' . count( $data ) . ' Users', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
Debug::Arr( $data, 'Data: ', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
|
||
|
$total_records = count( $data );
|
||
|
$validator = $save_result = []; $key = false;
|
||
|
$validator_stats = [ 'total_records' => $total_records, 'valid_records' => 0 ];
|
||
|
if ( is_array( $data ) && $total_records > 0 ) {
|
||
|
$this->getProgressBarObject()->start( $this->getAPIMessageID(), $total_records );
|
||
|
|
||
|
foreach ( $data as $key => $id ) {
|
||
|
$primary_validator = new Validator();
|
||
|
$lf = TTnew( 'UserListFactory' ); /** @var UserListFactory $lf */
|
||
|
$lf->StartTransaction();
|
||
|
if ( $id != '' ) {
|
||
|
if ( $this->getPermissionObject()->Check( 'company', 'view' ) == true ) {
|
||
|
$lf->getById( $id );//Allow deleting employees in other companies.
|
||
|
} else {
|
||
|
$lf->getByIdAndCompanyId( $id, $this->getCurrentCompanyObject()->getId() );
|
||
|
}
|
||
|
if ( $lf->getRecordCount() == 1 ) {
|
||
|
//Object exists, check edit permissions
|
||
|
//Debug::Text('User ID: '. $user['id'] .' Created By: '. $lf->getCurrent()->getCreatedBy() .' Is Owner: '. (int)$this->getPermissionObject()->isOwner( $lf->getCurrent()->getCreatedBy(), $lf->getCurrent()->getID() ) .' Is Child: '. (int)$this->getPermissionObject()->isChild( $lf->getCurrent()->getId(), $permission_children_ids ), __FILE__, __LINE__, __METHOD__, 10);
|
||
|
if ( $this->getPermissionObject()->Check( 'user', 'delete' )
|
||
|
|| ( $this->getPermissionObject()->Check( 'user', 'delete_own' ) && $this->getPermissionObject()->isOwner( $lf->getCurrent()->getCreatedBy(), $lf->getCurrent()->getID() ) === true )
|
||
|
|| ( $this->getPermissionObject()->Check( 'user', 'delete_child' ) && $this->getPermissionObject()->isChild( $lf->getCurrent()->getId(), $permission_children_ids ) === true ) ) {
|
||
|
|
||
|
Debug::Text( 'Record Exists, deleting record ID: ' . $id, __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
$lf = $lf->getCurrent();
|
||
|
} else {
|
||
|
$primary_validator->isTrue( 'permission', false, TTi18n::gettext( 'Delete permission denied' ) );
|
||
|
}
|
||
|
} else {
|
||
|
//Object doesn't exist.
|
||
|
$primary_validator->isTrue( 'id', false, TTi18n::gettext( 'Delete permission denied, record does not exist' ) );
|
||
|
}
|
||
|
} else {
|
||
|
$primary_validator->isTrue( 'id', false, TTi18n::gettext( 'Delete permission denied, record does not exist' ) );
|
||
|
}
|
||
|
|
||
|
//Debug::Arr($lf, 'AData: ', __FILE__, __LINE__, __METHOD__, 10);
|
||
|
|
||
|
$is_valid = $primary_validator->isValid();
|
||
|
if ( $is_valid == true ) { //Check to see if all permission checks passed before trying to save data.
|
||
|
Debug::Text( 'Attempting to delete record...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
$lf->setDeleted( true );
|
||
|
|
||
|
$is_valid = $lf->isValid();
|
||
|
if ( $is_valid == true ) {
|
||
|
Debug::Text( 'Record Deleted...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
$save_result[$key] = $lf->Save();
|
||
|
$validator_stats['valid_records']++;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
if ( $is_valid == false ) {
|
||
|
Debug::Text( 'Data is Invalid...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
|
||
|
$lf->FailTransaction(); //Just rollback this single record, continue on to the rest.
|
||
|
|
||
|
$validator[$key] = $this->setValidationArray( [ $primary_validator, $lf ], ( ( $total_records > 1 && is_object( $lf ) ) ? $lf->getFullName() : null ) );
|
||
|
}
|
||
|
|
||
|
$lf->CommitTransaction();
|
||
|
|
||
|
$this->getProgressBarObject()->set( $this->getAPIMessageID(), $key );
|
||
|
}
|
||
|
|
||
|
$this->getProgressBarObject()->stop( $this->getAPIMessageID() );
|
||
|
|
||
|
return $this->handleRecordValidationResults( $validator, $validator_stats, $key, $save_result );
|
||
|
}
|
||
|
|
||
|
return $this->returnHandler( false );
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Copy one or more users.
|
||
|
* @param array $data user data
|
||
|
* @return array
|
||
|
*/
|
||
|
function copyUser( $data ) {
|
||
|
//Can only Copy as New, not just a regular copy, as too much data needs to be changed,
|
||
|
//such as username, password, employee_number, SIN, first/last name address...
|
||
|
return $this->returnHandler( false );
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Check if username is unique or not.
|
||
|
* @param string $user_name user name
|
||
|
* @return array|bool
|
||
|
*/
|
||
|
function isUniqueUserName( $user_name ) {
|
||
|
Debug::Text( 'Checking for unique user name: ' . $user_name, __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
|
||
|
$uf = TTNew( 'UserFactory' ); /** @var UserFactory $uf */
|
||
|
$retval = $uf->isUniqueUserName( $user_name );
|
||
|
|
||
|
return $this->returnHandler( $retval );
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Allows currently logged in user to change their password.
|
||
|
* @param string $new_password
|
||
|
* @param string $new_password2
|
||
|
* @param string $type
|
||
|
* @return array|bool
|
||
|
*/
|
||
|
function changePassword( $new_password, $new_password2, $type = 'user_name' ) {
|
||
|
$ulf = TTnew( 'UserListFactory' ); /** @var UserListFactory $ulf */
|
||
|
$ulf->getByIdAndCompanyId( $this->getCurrentUserObject()->getId(), $this->getCurrentCompanyObject()->getId() );
|
||
|
if ( $ulf->getRecordCount() == 1 ) {
|
||
|
$uf = $ulf->getCurrent();
|
||
|
|
||
|
global $authentication;
|
||
|
|
||
|
if ( $authentication->isSessionReauthenticated() === false ) {
|
||
|
return $this->getPermissionObject()->ReauthenticationRequired( $this->getCurrentUserObject() );
|
||
|
}
|
||
|
|
||
|
if ( $authentication->getRateLimitObject()->check() == false ) {
|
||
|
Debug::Text( 'Excessive failed password attempts... Preventing password change from: ' . Misc::getRemoteIPAddress() . ' for up to 15 minutes...', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
sleep( 5 ); //Excessive password attempts, sleep longer.
|
||
|
|
||
|
$uf->Validator->isTrue( 'current_password',
|
||
|
false,
|
||
|
TTi18n::gettext( 'Current password is incorrect' ) . ' (z)' );
|
||
|
} else {
|
||
|
$uf->setIsRequiredCurrentPassword( false );
|
||
|
|
||
|
switch ( strtolower( $type ) ) {
|
||
|
case 'quick_punch':
|
||
|
case 'quick_punch_id':
|
||
|
case 'phone_id':
|
||
|
case 'phone':
|
||
|
if ( $this->getPermissionObject()->Check( 'user', 'edit_own_phone_password' ) == false ) {
|
||
|
return $this->getPermissionObject()->PermissionDenied();
|
||
|
}
|
||
|
|
||
|
$log_description = TTi18n::getText( 'Password - Quick Punch' );
|
||
|
|
||
|
if ( $new_password != '' || $new_password2 != '' ) {
|
||
|
if ( $new_password === $new_password2 ) {
|
||
|
$uf->setPhonePassword( $new_password );
|
||
|
} else {
|
||
|
$uf->Validator->isTrue( 'password',
|
||
|
false,
|
||
|
TTi18n::gettext( 'Passwords don\'t match' ) );
|
||
|
}
|
||
|
}
|
||
|
break;
|
||
|
case 'user_name':
|
||
|
case 'web':
|
||
|
if ( $this->getPermissionObject()->Check( 'user', 'edit_own_password' ) == false ) {
|
||
|
return $this->getPermissionObject()->PermissionDenied();
|
||
|
}
|
||
|
|
||
|
if ( $uf->getCompanyObject()->getLDAPAuthenticationType() == 0 ) {
|
||
|
$log_description = TTi18n::getText( 'Password - Web' );
|
||
|
|
||
|
if ( $new_password != '' || $new_password2 != '' ) {
|
||
|
if ( $new_password === $new_password2 ) {
|
||
|
$uf->setPassword( $new_password );
|
||
|
} else {
|
||
|
$uf->Validator->isTrue( 'password',
|
||
|
false,
|
||
|
TTi18n::gettext( 'Passwords don\'t match' ) );
|
||
|
}
|
||
|
}
|
||
|
} else {
|
||
|
Debug::Text( 'LDAP Authentication is enabled, password changing is disabled! ', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
$uf->Validator->isTrue( 'current_password',
|
||
|
false,
|
||
|
TTi18n::getText( 'Please contact your administrator for instructions on changing your password.' ) . ' (LDAP)' );
|
||
|
}
|
||
|
break;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
if ( $uf->isValid() ) {
|
||
|
//One time auth is used to verify single actions that require re-authentication and needs to be removed after used.
|
||
|
$authentication->reauthenticationActionCompleted();
|
||
|
|
||
|
if ( DEMO_MODE == true ) {
|
||
|
//Return TRUE even in demo mode, but nothing happens.
|
||
|
return $this->returnHandler( true );
|
||
|
} else {
|
||
|
TTLog::addEntry( $this->getCurrentUserObject()->getId(), 20, $log_description, null, $uf->getTable() );
|
||
|
|
||
|
$authentication->getRateLimitObject()->delete(); //Clear failed password rate limit upon successful login.
|
||
|
|
||
|
$retval = $uf->Save( false ); //UserID is needed below.
|
||
|
|
||
|
//Logout all other sessions for this user.
|
||
|
$authentication = TTNew( 'Authentication' ); /** @var Authentication $authentication */
|
||
|
$authentication->logoutUser( $uf->getID() );
|
||
|
|
||
|
return $this->returnHandler( $retval ); //Single valid record
|
||
|
}
|
||
|
} else {
|
||
|
//One time auth is used to verify single actions that require re-authentication and needs to be removed after used.
|
||
|
$authentication->reauthenticationActionCompleted();
|
||
|
return $this->returnHandler( false, 'VALIDATION', TTi18n::getText( 'INVALID DATA' ), $uf->Validator->getErrorsArray(), [ 'total_records' => 1, 'valid_records' => 0 ] );
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return $this->returnHandler( false );
|
||
|
}
|
||
|
|
||
|
|
||
|
/**
|
||
|
* Returns a list of unique provinces that employees are assigned to.
|
||
|
* @return array
|
||
|
*/
|
||
|
function getUniqueUserProvinces() {
|
||
|
//Get a unique list of states each employee belongs to
|
||
|
$ulf = TTnew( 'UserListFactory' ); /** @var UserListFactory $ulf */
|
||
|
$ulf->getByCompanyId( $this->getCurrentCompanyObject()->getId() );
|
||
|
$retarr = [];
|
||
|
if ( $ulf->getRecordCount() > 0 ) {
|
||
|
foreach ( $ulf as $u_obj ) {
|
||
|
$retarr[$u_obj->getProvince()] = $u_obj->getProvince();
|
||
|
}
|
||
|
} else {
|
||
|
$retarr = false;
|
||
|
}
|
||
|
|
||
|
return $retarr;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* @param $email
|
||
|
* @return bool
|
||
|
*/
|
||
|
function UnsubscribeEmail( $email ) {
|
||
|
if ( $email != '' && $this->getPermissionObject()->Check( 'company', 'edit' ) ) {
|
||
|
return UserFactory::UnsubscribeEmail( $email );
|
||
|
}
|
||
|
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* @param string $user_ids UUID
|
||
|
* @return bool
|
||
|
*/
|
||
|
function sendValidationEmail( $user_ids ) {
|
||
|
if ( !$this->getPermissionObject()->Check( 'user', 'enabled' )
|
||
|
|| !( $this->getPermissionObject()->Check( 'user', 'edit' ) || $this->getPermissionObject()->Check( 'user', 'edit_child' ) || $this->getPermissionObject()->Check( 'user', 'add' ) ) ) {
|
||
|
return $this->getPermissionObject()->PermissionDenied();
|
||
|
}
|
||
|
|
||
|
$ulf = TTnew( 'UserListFactory' ); /** @var UserListFactory $ulf */
|
||
|
$ulf->getByIdAndCompanyId( $user_ids, $this->getCurrentCompanyObject()->getId() );
|
||
|
if ( $ulf->getRecordCount() == 1 ) {
|
||
|
$emails_sent = 0;
|
||
|
foreach ( $ulf as $u_obj ) {
|
||
|
if ( $u_obj->getWorkEmailIsValid() == false ) {
|
||
|
$u_obj->sendValidateEmail( 'work' );
|
||
|
$emails_sent++;
|
||
|
}
|
||
|
|
||
|
if ( $u_obj->getHomeEmailIsValid() == false ) {
|
||
|
$u_obj->sendValidateEmail( 'home' );
|
||
|
$emails_sent++;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
Debug::Text( 'Users Found: ' . $ulf->getRecordCount() . ' Validation Emails Sent: ' . $emails_sent, __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
if ( $emails_sent > 0 ) {
|
||
|
return true;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
Debug::Text( 'ERROR: No users to send validation emails to.', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
|
||
|
/**
|
||
|
* Get user data for one or more users. This is an alias for getUser() that can be overridden by a plugin for getting data on remote servers.
|
||
|
* @param array $data filter data, see reference for details.
|
||
|
* @param boolean $disable_paging disables paging and returns all records.
|
||
|
* @return array
|
||
|
* @see UserListFactory::getAPISearchByCompanyIdAndArrayCriteria() To see a description of the ListFactory that is used.
|
||
|
*/
|
||
|
function getCompanyUser( $data = null, $disable_paging = false ) {
|
||
|
return $this->getUser( $data, $disable_paging );
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* @param int $rating Accepted values are -1, 0, 1.
|
||
|
* @param bool $message
|
||
|
* @return array|bool
|
||
|
*/
|
||
|
function setUserFeedbackRating( $rating, $message = false ) {
|
||
|
$ulf = TTnew( 'UserListFactory' ); /** @var UserListFactory $ulf */
|
||
|
$ulf->getByIdAndCompanyId( $this->getCurrentUserObject()->getId(), $this->getCurrentCompanyObject()->getId() );
|
||
|
if ( $ulf->getRecordCount() == 1 ) {
|
||
|
$u_obj = $ulf->getCurrent();
|
||
|
|
||
|
if ( $rating != $u_obj->getFeedbackRating() ) {
|
||
|
$u_obj->setFeedbackRating( $rating );
|
||
|
if ( $u_obj->isValid() ) {
|
||
|
$retval = $u_obj->Save( false );
|
||
|
if ( $retval == true ) {
|
||
|
//Save in user_setting table as well, so we have other information such as created date.
|
||
|
UserSettingFactory::setUserSetting( $this->getCurrentUserObject()->getId(), 'feedback_rating', $rating, 20 ); //20=Private
|
||
|
|
||
|
$ttsc = new TimeTrexSoapClient();
|
||
|
$ttsc->sendUserFeedback( $rating, $message, $u_obj );
|
||
|
|
||
|
//Since we are updating the user record, the audit log will contain the rating change.
|
||
|
//TTLog::addEntry( $u_obj->getId(), 500, TTi18n::getText('Feedback Rating').': '. $rating .' '. TTi18n::getText('Message') .': '. $message, $u_obj->getId(), $u_obj->getTable() );
|
||
|
}
|
||
|
}
|
||
|
} else if ( $message != '' ) {
|
||
|
$ttsc = new TimeTrexSoapClient();
|
||
|
$ttsc->sendUserFeedback( $rating, $message, $u_obj );
|
||
|
}
|
||
|
|
||
|
return $this->returnHandler( true );
|
||
|
}
|
||
|
|
||
|
return $this->returnHandler( false );
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* @param $submitted_review Accepted values are 0 or 1.
|
||
|
* @return array|bool
|
||
|
*/
|
||
|
function setUserFeedbackReview( $submitted_review ) {
|
||
|
$submitted_review = (int)$submitted_review;
|
||
|
|
||
|
return $this->returnHandler( UserSettingFactory::setUserSetting( $this->getCurrentUserObject()->getId(), 'feedback_rating_review', $submitted_review, 20 ) ); //20=Private
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* @param $employee_id
|
||
|
* @return array|bool
|
||
|
*/
|
||
|
function deleteImage( $employee_id ) {
|
||
|
//permissions match setUser()
|
||
|
if ( !$this->getPermissionObject()->Check( 'user', 'enabled' )
|
||
|
|| !( $this->getPermissionObject()->Check( 'user', 'edit' ) || $this->getPermissionObject()->Check( 'user', 'edit_own' ) || $this->getPermissionObject()->Check( 'user', 'edit_child' ) || $this->getPermissionObject()->Check( 'user', 'add' ) ) ) {
|
||
|
return $this->getPermissionObject()->PermissionDenied();
|
||
|
}
|
||
|
|
||
|
$result = $this->stripReturnHandler( $this->getUser( [ 'filter_data' => [ 'id' => $employee_id ] ] ) );
|
||
|
if ( isset( $result[0] ) && count( $result[0] ) > 0 ) {
|
||
|
$uf = TTnew( 'UserFactory' ); /** @var UserFactory $uf */
|
||
|
$file_name = $uf->getPhotoFileName( $this->current_company->getId(), $employee_id, false ); //Do not include default image.
|
||
|
|
||
|
if ( file_exists( $file_name ) ) {
|
||
|
unlink( $file_name );
|
||
|
TTLog::addEntry( $employee_id, 30, TTi18n::getText( 'Photo' ), null, $uf->getTable() );
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return $this->returnHandler( true );
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Get the number of pending authorizations, notifications and messages for the current user.
|
||
|
* @param array $object_types
|
||
|
* @return array
|
||
|
*/
|
||
|
function getUserPendingTotals( $object_types = [] ) {
|
||
|
$totals = [];
|
||
|
|
||
|
if ( empty( $object_types ) ) {
|
||
|
$object_types = [ 'notification', 'request', 'message', 'request_authorization', 'timesheet_authorization', 'expense_authorization' ];
|
||
|
}
|
||
|
|
||
|
//No permissions required to view own notifications.
|
||
|
//Unread notifications.
|
||
|
if ( in_array( 'notification', $object_types ) ) {
|
||
|
$ndtlf = TTnew( 'NotificationListFactory' );
|
||
|
$totals['notification'] = (int)$ndtlf->getUnreadCountByUserIdAndCompanyId( $this->getCurrentUserObject()->getId(), $this->getCurrentUserObject()->getCompany() );
|
||
|
}
|
||
|
|
||
|
//Unread messages.
|
||
|
if ( in_array( 'message', $object_types ) && $this->getPermissionObject()->Check( 'message', 'enabled' ) && $this->getPermissionObject()->Check( 'message', 'view_own' ) ) {
|
||
|
$mclf = TTnew( 'MessageControlListFactory' );
|
||
|
$totals['message'] = (int)$mclf->getNewMessagesByCompanyIdAndUserId( $this->getCurrentCompanyObject()->getId(), $this->getCurrentUserObject()->getId() );
|
||
|
}
|
||
|
|
||
|
//Pending request authorizations.
|
||
|
if ( in_array( 'request_authorization', $object_types ) && $this->getPermissionObject()->Check( 'request', 'enabled' ) && $this->getPermissionObject()->Check( 'request', 'authorize' ) && ( $this->getPermissionObject()->Check( 'request', 'view_child' ) || $this->getPermissionObject()->Check( 'request', 'view' ) ) ) {
|
||
|
$rlf = TTnew( 'RequestListFactory' );
|
||
|
$hllf = TTnew( 'HierarchyLevelListFactory' );
|
||
|
$type_ids = array_keys( $rlf->getOptions( 'type' ) );
|
||
|
$hierarchy_level_arr = $hllf->getLevelsAndHierarchyControlIDsByUserIdAndObjectTypeID( $this->getCurrentUserObject()->getId(), $rlf->getHierarchyTypeId( $type_ids ) );
|
||
|
$totals['request_authorization'] = (int)$rlf->getTotalPendingByCompanyIdAndHierarchyLevelMap( $this->getCurrentCompanyObject()->getId(), [ 'hierarchy_level_map' => $hierarchy_level_arr[1] ?? false, 'authorized' => [ 0 ], 'status_id' => [ 30 ], 'type_id' => $type_ids, 'permission_children_ids' => $this->getPermissionObject()->getPermissionChildren( 'request', 'view' ) ] );
|
||
|
}
|
||
|
|
||
|
//Pending timesheet authorizations.
|
||
|
if ( in_array( 'timesheet_authorization', $object_types ) && $this->getPermissionObject()->Check( 'punch', 'enabled' ) && $this->getPermissionObject()->Check( 'punch', 'verify_time_sheet' ) && ( $this->getPermissionObject()->Check( 'punch', 'view_child' ) || $this->getPermissionObject()->Check( 'punch', 'view' ) ) ) {
|
||
|
$pptsvlf = TTnew( 'PayPeriodTimeSheetVerifyListFactory' );
|
||
|
$hllf = TTnew( 'HierarchyLevelListFactory' );
|
||
|
$hierarchy_level_arr = $hllf->getLevelsAndHierarchyControlIDsByUserIdAndObjectTypeID( $this->getCurrentUserObject()->getId(), 90 );
|
||
|
$totals['timesheet_authorization'] = (int)$pptsvlf->getTotalPendingByCompanyIdAndHierarchyLevelMap( $this->getCurrentCompanyObject()->getId(), [ 'hierarchy_level_map' => $hierarchy_level_arr[1] ?? false, 'authorized' => [ 0 ], 'permission_children_ids' => $this->getPermissionObject()->getPermissionChildren( 'punch', 'view' ) ] );
|
||
|
}
|
||
|
|
||
|
//Pending expense authorizations.
|
||
|
if ( in_array( 'expense_authorization', $object_types ) && $this->getCurrentCompanyObject()->getProductEdition() >= 25 && $this->getPermissionObject()->Check( 'user_expense', 'enabled' ) && $this->getPermissionObject()->Check( 'user_expense', 'authorize' ) && ( $this->getPermissionObject()->Check( 'user_expense', 'view_child' ) || $this->getPermissionObject()->Check( 'user_expense', 'view' ) ) ) {
|
||
|
$uelf = TTnew( 'UserExpenseListFactory' );
|
||
|
$hllf = TTnew( 'HierarchyLevelListFactory' );
|
||
|
$hierarchy_level_arr = $hllf->getLevelsAndHierarchyControlIDsByUserIdAndObjectTypeID( $this->getCurrentUserObject()->getId(), 200 );
|
||
|
$totals['expense_authorization'] = (int)$uelf->getTotalPendingByCompanyIdAndHierarchyLevelMap( $this->getCurrentCompanyObject()->getId(), [ 'hierarchy_level_map' => $hierarchy_level_arr[1] ?? false, 'authorized' => [ 0 ], 'status_id' => [ 20 ], 'permission_children_ids' => $this->getPermissionObject()->getPermissionChildren( 'user_expense', 'view' ) ] );
|
||
|
}
|
||
|
|
||
|
Debug::Arr( $totals, ' Pending Totals: ', __FILE__, __LINE__, __METHOD__, 10 );
|
||
|
return $this->returnHandler( $totals );
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Check if MFA is enabled for the current user.
|
||
|
* @return array|bool
|
||
|
*/
|
||
|
function isMFAEnabled() {
|
||
|
if ( is_object( $this->getCurrentUserObject() ) === true && $this->getCurrentUserObject()->getMultiFactorType() > 0 ) { //0 = Disabled
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* @param $mfa_type_id
|
||
|
* @return array|bool
|
||
|
*/
|
||
|
function setMultiFactorSettings( $mfa_type_id ) {
|
||
|
global $authentication;
|
||
|
|
||
|
if ( is_object( $this->getCurrentUserObject() ) === false ) {
|
||
|
return $this->returnHandler( false );
|
||
|
}
|
||
|
|
||
|
//When disabling MFA ($mfa_type_id = 0), we need to make sure to use the users current $mfa_type_id and not the one passed in.
|
||
|
//This means to disable MFA the user has to verify by using the current MFA type.
|
||
|
if ( $mfa_type_id == 0 ) {
|
||
|
//Passing null for $force_mfa_type_id will default to the users current MFA type.
|
||
|
$force_mfa_type_id = null;
|
||
|
} else {
|
||
|
$force_mfa_type_id = $mfa_type_id;
|
||
|
}
|
||
|
|
||
|
if ( $authentication->isSessionReauthenticated() === false ) {
|
||
|
return $this->getPermissionObject()->ReauthenticationRequired( $this->getCurrentUserObject(), $force_mfa_type_id );
|
||
|
}
|
||
|
|
||
|
$ulf = TTnew( 'UserListFactory' );
|
||
|
$ulf->getById( $this->getCurrentUserObject()->getId() );
|
||
|
if ( $ulf->getRecordCount() == 1 ) {
|
||
|
$u_obj = $ulf->getCurrent(); /** @var UserFactory $u_obj */
|
||
|
$u_obj->setMultiFactorType( $mfa_type_id );
|
||
|
if ( $u_obj->isValid() ) {
|
||
|
$u_obj->Save();
|
||
|
|
||
|
if ( $mfa_type_id > 0 ) {
|
||
|
//Multifactor enabled, change user to 'user_name_multi_factor' authentication.
|
||
|
$new_session_type_id = 810;
|
||
|
} else {
|
||
|
//Multifactor disabled, change user to 'user_name' authentication.
|
||
|
$new_session_type_id = 800;
|
||
|
}
|
||
|
|
||
|
$authentication->setType( $new_session_type_id );
|
||
|
//One time auth is used to verify single actions that require re-authentication and needs to be removed after used.
|
||
|
$authentication->reauthenticationActionCompleted();
|
||
|
|
||
|
return $this->returnHandler( true );
|
||
|
}
|
||
|
}
|
||
|
|
||
|
//One time auth is used to verify single actions that require re-authentication and needs to be removed after used.
|
||
|
$authentication->reauthenticationActionCompleted();
|
||
|
return $this->returnHandler( false );
|
||
|
}
|
||
|
}
|
||
|
|
||
|
?>
|