-
-
Notifications
You must be signed in to change notification settings - Fork 825
/
Copy pathPermission.php
1882 lines (1760 loc) · 58.9 KB
/
Permission.php
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
<?php
/*
+--------------------------------------------------------------------+
| Copyright CiviCRM LLC. All rights reserved. |
| |
| This work is published under the GNU AGPLv3 license with some |
| permitted exceptions and without any warranty. For full license |
| and copyright information, see https://civicrm.org/licensing |
+--------------------------------------------------------------------+
*/
/**
*
* @package CRM
* @copyright CiviCRM LLC https://civicrm.org/licensing
*/
/**
* This is the basic permission class wrapper
*/
class CRM_Core_Permission {
/**
* Static strings used to compose permissions.
*
* @const
* @var string
*/
const EDIT_GROUPS = 'edit contacts in ', VIEW_GROUPS = 'view contacts in ';
/**
* The various type of permissions.
*
* @var int
*/
const EDIT = 1, VIEW = 2, DELETE = 3, CREATE = 4, SEARCH = 5, ALL = 6, ADMIN = 7;
/**
* A placeholder permission which always fails.
*/
const ALWAYS_DENY_PERMISSION = "*always deny*";
/**
* A placeholder permission which always fails.
*/
const ALWAYS_ALLOW_PERMISSION = "*always allow*";
/**
* A generic permission which allows access to authenticated contacts.
*
* NOTE: This is slightly different from asking whether there is an authenticated CMS `User`.
* This permission only cares about identifying the CRM `Contact`.
*/
const ANY_AUTHENTICATED_CONTACT = '*authenticated*';
/**
* Various authentication sources.
*
* @var int
*/
const AUTH_SRC_UNKNOWN = 0, AUTH_SRC_CHECKSUM = 1, AUTH_SRC_SITEKEY = 2, AUTH_SRC_LOGIN = 4;
/**
* Get the maximum permission of the current user with respect to _any_ contact records.
*
* Note: This appears to be hydrated via `CRM_Core_Permission*::group()`, which appears to run in
* many page-views, but I'm not certain that it's guaranteed.
*
* @return int|string|null
* Highest permission held by the current user.
* If the user has "edit" rights to at least 1 contact (via permission or ACL),
* then CRM_Core_Permission::EDIT.
* If the user has "view" rights to at least 1 contact (via permission or ACL),
* then CRM_Core_Permission::VIEW.
* Otherwise, NULL.
* @see \CRM_Core_Permission_Base::group()
*/
public static function getPermission() {
$config = CRM_Core_Config::singleton();
return $config->userPermissionClass->getPermission();
}
/**
* Given a permission string or array, check for access requirements
*
* Ex 1: Must have 'access CiviCRM'
* (string) 'access CiviCRM'
*
* Ex 2: Must have 'access CiviCRM' and 'access AJAX API'
* ['access CiviCRM', 'access AJAX API']
*
* Ex 3: Must have 'access CiviCRM' or 'access AJAX API'
* [
* ['access CiviCRM', 'access AJAX API'],
* ],
*
* Ex 4: Must have 'access CiviCRM' or 'access AJAX API' AND 'access CiviEvent'
* [
* ['access CiviCRM', 'access AJAX API'],
* 'access CiviEvent',
* ],
*
* Note that in permissions.php this is keyed by the action eg.
* (access Civi || access AJAX) && (access CiviEvent || access CiviContribute)
* 'myaction' => [
* ['access CiviCRM', 'access AJAX API'],
* ['access CiviEvent', 'access CiviContribute']
* ],
*
* @param string|array $permissions
* The permission to check as an array or string -see examples.
*
* @param int $contactId
* Contact id to check permissions for. Defaults to current logged-in user.
*
* @return bool
* true if contact has permission(s), else false
*/
public static function check($permissions, $contactId = NULL) {
$permissions = (array) $permissions;
$userId = CRM_Core_BAO_UFMatch::getUFId($contactId);
/** @var CRM_Core_Permission_Temp $tempPerm */
$tempPerm = CRM_Core_Config::singleton()->userPermissionTemp;
foreach ($permissions as $permission) {
if (is_array($permission)) {
foreach ($permission as $orPerm) {
if (self::check($orPerm, $contactId)) {
//one of our 'or' permissions has succeeded - stop checking this permission
return TRUE;
}
}
//none of our our conditions was met
return FALSE;
}
else {
// This is an individual permission
$impliedPermissions = self::getImpliedBy($permission);
foreach ($impliedPermissions as $permissionOption) {
$granted = CRM_Core_Config::singleton()->userPermissionClass->check($permissionOption, $userId);
// Call the permission_check hook to permit dynamic escalation (CRM-19256)
CRM_Utils_Hook::permission_check($permissionOption, $granted, $contactId);
if ($granted) {
break;
}
}
if (
!$granted
&& !($tempPerm && $tempPerm->check($permission))
) {
//one of our 'and' conditions has not been met
return FALSE;
}
}
}
return TRUE;
}
/**
* Determine if any one of the permissions strings applies to current user.
*
* @param array $perms
* @return bool
*/
public static function checkAnyPerm($perms) {
foreach ($perms as $perm) {
if (CRM_Core_Permission::check($perm)) {
return TRUE;
}
}
return FALSE;
}
/**
* Given a group/role array, check for access requirements
*
* @param array $array
* The group/role to check.
*
* @return bool
* true if yes, else false
*/
public static function checkGroupRole($array) {
$config = CRM_Core_Config::singleton();
return $config->userPermissionClass->checkGroupRole($array);
}
public static function checkConstPermissions(\Civi\Core\Event\GenericHookEvent $e) {
if ($e->permission === CRM_Core_Permission::ANY_AUTHENTICATED_CONTACT) {
// For typical web-requests, we're just asking if there is a "logged in contact ID".
// The other edge-case: we're asking on behalf of someone else. *If* that contact made a request, would they be approved?
$target = ($e->contactId ?: CRM_Core_Session::getLoggedInContactID());
if ($target !== NULL) {
$e->granted = TRUE;
}
}
// TODO: Consider moving similar checks for 'ALWAYS_ALLOW' and 'ALWAYS_DENY' from CRM_Core_Permission_{UF}::check() to here..
}
/**
* Get the permissioned where clause for the user.
*
* @param int $type
* The type of permission needed.
* @param array $tables
* (reference ) add the tables that are needed for the select clause.
* @param array $whereTables
* (reference ) add the tables that are needed for the where clause.
*
* @return string
* the group where clause for this user
*/
public static function getPermissionedStaticGroupClause($type, &$tables, &$whereTables) {
$config = CRM_Core_Config::singleton();
return $config->userPermissionClass->getPermissionedStaticGroupClause($type, $tables, $whereTables);
}
/**
* Get all groups from database, filtered by permissions
* for this user
*
* @param string $groupType
* Type of group(Access/Mailing).
* @param bool $excludeHidden
* exclude hidden groups.
*
*
* @return array
* array reference of all groups.
*/
public static function group($groupType, $excludeHidden = TRUE) {
$config = CRM_Core_Config::singleton();
return $config->userPermissionClass->group($groupType, $excludeHidden);
}
/**
* @param int $userId
* @return bool
*/
public static function customGroupAdmin($userId = NULL) {
// check if user has all powerful permission
// or administer civicrm permission (CRM-1905)
if (self::check('access all custom data', $userId)) {
return TRUE;
}
if (
self::check('administer Multiple Organizations', $userId) &&
self::isMultisiteEnabled()
) {
return TRUE;
}
return self::check('administer CiviCRM data', $userId);
}
/**
* Returns the ids of all custom groups the user is permitted to perform action of "$type"
*
* @param int $type
* Type of action e.g. CRM_Core_Permission::VIEW or CRM_Core_Permission::EDIT
* @param bool $reset
* Flush cache
* @param int $userId
*
* @return int[]
*/
public static function customGroup($type = CRM_Core_Permission::VIEW, $reset = FALSE, $userId = NULL) {
$customGroups = CRM_Core_BAO_CustomGroup::getAll();
// Hook expects a flat array of [id => name]
$customGroups = array_combine(array_keys($customGroups), array_column($customGroups, 'name'));
// Administrators and users with 'access all custom data' can see all custom groups.
if (self::customGroupAdmin($userId)) {
return array_keys($customGroups);
}
// By default, users without 'access all custom data' are permitted to see no groups.
// Allow ACLs and hooks to grant permissions to certain groups.
return CRM_ACL_API::group($type, $userId, 'civicrm_custom_group', $customGroups);
}
/**
* @param int $type
* @param string|null $prefix
* @param bool $reset
*
* @return string
*/
public static function customGroupClause($type = CRM_Core_Permission::VIEW, $prefix = NULL, $reset = FALSE) {
if (self::customGroupAdmin()) {
return ' ( 1 ) ';
}
$groups = self::customGroup($type, $reset);
if (empty($groups)) {
return ' ( 0 ) ';
}
else {
return "{$prefix}id IN ( " . implode(',', $groups) . ' ) ';
}
}
/**
* @param int $gid
* @param int $type
*
* @return bool
*/
public static function ufGroupValid($gid, $type = CRM_Core_Permission::VIEW) {
if (empty($gid)) {
return TRUE;
}
$groups = self::ufGroup($type);
return !empty($groups) && in_array($gid, $groups);
}
/**
* @param int $type
*
* @return array
*/
public static function ufGroup($type = CRM_Core_Permission::VIEW) {
$ufGroups = CRM_Core_DAO_UFField::buildOptions('uf_group_id');
$allGroups = array_keys($ufGroups);
// check if user has all powerful permission
if (self::check('profile listings and forms')) {
return $allGroups;
}
switch ($type) {
case CRM_Core_Permission::VIEW:
if (self::check('profile view')) {
return $allGroups;
}
break;
case CRM_Core_Permission::CREATE:
if (self::check('profile create')) {
return $allGroups;
}
break;
case CRM_Core_Permission::EDIT:
if (self::check('profile edit')) {
return $allGroups;
}
break;
case CRM_Core_Permission::SEARCH:
if (self::check('profile listings')) {
return $allGroups;
}
break;
}
return CRM_ACL_API::group($type, NULL, 'civicrm_uf_group', $ufGroups);
}
/**
* @param int $type
* @param string $prefix
* @param bool $returnUFGroupIds
*
* @return array|string
*/
public static function ufGroupClause($type = CRM_Core_Permission::VIEW, $prefix = NULL, $returnUFGroupIds = FALSE) {
$groups = self::ufGroup($type);
if ($returnUFGroupIds) {
return $groups;
}
elseif (empty($groups)) {
return ' ( 0 ) ';
}
else {
return "{$prefix}id IN ( " . implode(',', $groups) . ' ) ';
}
}
/**
* @param int $type
* @param int $eventID
* @param string $context
*
* @return array|null
*/
public static function event($type = CRM_Core_Permission::VIEW, $eventID = NULL, $context = '') {
if (!empty($context)) {
if (CRM_Core_Permission::check($context)) {
return TRUE;
}
}
$events = CRM_Event_PseudoConstant::event(NULL, TRUE);
$includeEvents = [];
// check if user has all powerful permission
if (self::check('register for events')) {
$includeEvents = array_keys($events);
}
if ($type == CRM_Core_Permission::VIEW &&
self::check('view event info')
) {
$includeEvents = array_keys($events);
}
$permissionedEvents = CRM_ACL_API::group($type, NULL, 'civicrm_event', $events, $includeEvents);
if (!$eventID) {
return $permissionedEvents;
}
if (!empty($permissionedEvents)) {
return array_search($eventID, $permissionedEvents) === FALSE ? NULL : $eventID;
}
return NULL;
}
/**
* @param int $type
* @param null $prefix
*
* @return string
*/
public static function eventClause($type = CRM_Core_Permission::VIEW, $prefix = NULL) {
$events = self::event($type);
if (empty($events)) {
return ' ( 0 ) ';
}
else {
return "{$prefix}id IN ( " . implode(',', $events) . ' ) ';
}
}
/**
* Checks that component is enabled and optionally that user has basic perm.
*
* @param string $module
* Specifies the name of the CiviCRM component.
* @param bool $checkPermission
* Check not only that module is enabled, but that user has necessary
* permission.
* @param bool $requireAllCasesPermOnCiviCase
* Significant only if $module == CiviCase
* Require "access all cases and activities", not just
* "access my cases and activities".
*
* @return bool
* Access to specified $module is granted.
*/
public static function access($module, $checkPermission = TRUE, $requireAllCasesPermOnCiviCase = FALSE) {
if (!CRM_Core_Component::isEnabled($module)) {
return FALSE;
}
if ($checkPermission) {
switch ($module) {
case 'CiviCase':
$access_all_cases = CRM_Core_Permission::check("access all cases and activities");
$access_my_cases = CRM_Core_Permission::check("access my cases and activities");
return $access_all_cases || (!$requireAllCasesPermOnCiviCase && $access_my_cases);
case 'CiviCampaign':
return CRM_Core_Permission::check("administer $module");
default:
return CRM_Core_Permission::check("access $module");
}
}
return TRUE;
}
/**
* Check permissions for delete and edit actions.
*
* @param string $module
* Component name.
* @param int $action
* Action to be check across component.
*
*
* @return bool
*/
public static function checkActionPermission($module, $action) {
//check delete related permissions.
if ($action & CRM_Core_Action::DELETE) {
$permissionName = "delete in $module";
}
else {
$editPermissions = [
'CiviEvent' => 'edit event participants',
'CiviMember' => 'edit memberships',
'CiviPledge' => 'edit pledges',
'CiviContribute' => 'edit contributions',
'CiviMail' => 'access CiviMail',
];
$permissionName = $editPermissions[$module] ?? NULL;
}
if ($module == 'CiviCase' && !$permissionName) {
return CRM_Case_BAO_Case::accessCiviCase();
}
else {
//check for permission.
return CRM_Core_Permission::check($permissionName);
}
}
/**
* @param $args
* @param string $op
*
* @return bool
*/
public static function checkMenu(&$args, $op = 'and') {
if (!is_array($args)) {
return $args;
}
foreach ($args as $str) {
$res = CRM_Core_Permission::check($str);
if ($op == 'or' && $res) {
return TRUE;
}
elseif ($op == 'and' && !$res) {
return FALSE;
}
}
return ($op == 'or') ? FALSE : TRUE;
}
/**
* @param $item
*
* @return bool|mixed
* @throws Exception
*/
public static function checkMenuItem(&$item) {
if (!array_key_exists('access_callback', $item)) {
CRM_Core_Error::backtrace();
throw new CRM_Core_Exception('Missing Access Callback key in menu item');
}
// if component_id is present, ensure it is enabled
if (!empty($item['component_id'])) {
$componentName = CRM_Core_Component::getComponentName($item['component_id']);
if (!$componentName || !CRM_Core_Component::isEnabled($componentName)) {
return FALSE;
}
}
// the following is imitating drupal 6 code in includes/menu.inc
if (empty($item['access_callback']) ||
is_numeric($item['access_callback'])
) {
return (bool) $item['access_callback'];
}
// check whether the following Ajax requests submitted the right key
// FIXME: this should be integrated into ACLs proper
if (($item['page_type'] ?? NULL) == 3) {
if (!CRM_Core_Key::validate($_REQUEST['key'], $item['path'])) {
return FALSE;
}
}
// check if callback is for checkMenu, if so optimize it
if (is_array($item['access_callback']) &&
$item['access_callback'][0] == 'CRM_Core_Permission' &&
$item['access_callback'][1] == 'checkMenu'
) {
$op = CRM_Utils_Array::value(1, $item['access_arguments'], 'and');
return self::checkMenu($item['access_arguments'][0], $op);
}
else {
return call_user_func_array($item['access_callback'], $item['access_arguments']);
}
}
/**
* @param bool $includeDisabled
* Include permissions from disabled components/settings.
* @param bool $returnAssociative
* If true, returns arrays with keys: [label, description, disabled, implies, implied_by].
* If false, returns strings (label only).
*
* @return array[]|string[]
* @throws RuntimeException
*/
public static function basicPermissions($includeDisabled = FALSE, $returnAssociative = FALSE): array {
$permissions = Civi::$statics[__CLASS__][__FUNCTION__] ??= self::assembleBasicPermissions();
if (!$includeDisabled) {
$permissions = array_filter($permissions, fn($permission) => empty($permission['disabled']));
}
if ($returnAssociative) {
return $permissions;
}
return array_combine(array_keys($permissions), array_column($permissions, 'label'));
}
/**
* @return array
* @throws RuntimeException
*/
protected static function assembleBasicPermissions(): array {
$permissions = self::getCoreAndComponentPermissions();
$module_permissions = CRM_Core_Config::singleton()->userPermissionClass->getAllModulePermissions();
$allPermissions = array_merge($permissions, $module_permissions);
// Propagate implied_by permissions to their parents
foreach ($allPermissions as $name => $permission) {
foreach ($permission['implied_by'] ?? [] as $parent) {
if (isset($allPermissions[$parent])) {
$allPermissions[$parent]['implies'][] = $name;
$allPermissions[$name]['parent'] = $parent;
}
}
}
// Propagate implied permissions to their children
foreach ($allPermissions as $name => $permission) {
if (!empty($permission['implies'])) {
self::setImpliedBy([$name], $permission['implies'], $allPermissions);
}
}
return $allPermissions;
}
/**
* Recursively sets the 'implied_by' value for every sub-permission,
* based on the 'implies' declaration in meta-permissions.
*
* @param array $metaPermissions
* @param array $subPermissions
* @param array $allPermissions
* @param int $recursionLevel
*/
protected static function setImpliedBy(array $metaPermissions, array $subPermissions, array &$allPermissions, int $recursionLevel = 0): void {
foreach ($subPermissions as $name) {
if (isset($allPermissions[$name])) {
$allPermissions[$name]['implied_by'] = array_unique(array_merge($allPermissions[$name]['implied_by'] ?? [], $metaPermissions));
if (!$recursionLevel) {
$allPermissions[$name]['parent'] = $metaPermissions[0];
}
if (!empty($allPermissions[$name]['implies'])) {
self::setImpliedBy(array_merge([$name], $metaPermissions), $allPermissions[$name]['implies'], $allPermissions, $recursionLevel + 1);
}
}
}
}
/**
* @return array
*/
public static function getAnonymousPermissionsWarnings() {
static $permissions = [];
if (empty($permissions)) {
$permissions = [
'administer CiviCRM',
];
$components = CRM_Core_Component::getComponents();
foreach ($components as $comp) {
if (!method_exists($comp, 'getAnonymousPermissionWarnings')) {
continue;
}
$permissions = array_merge($permissions, $comp->getAnonymousPermissionWarnings());
}
}
return $permissions;
}
/**
* @param $anonymous_perms
*
* @return array
*/
public static function validateForPermissionWarnings($anonymous_perms) {
return array_intersect($anonymous_perms, self::getAnonymousPermissionsWarnings());
}
/**
* Get core permissions.
*
* @return array
*/
public static function getCorePermissions() {
$prefix = ts('CiviCRM') . ': ';
$permissions = [
'add contacts' => [
'label' => $prefix . ts('add contacts'),
'description' => ts('Create a new contact record in CiviCRM'),
],
'view all contacts' => [
'label' => $prefix . ts('view all contacts'),
'description' => ts('View ANY CONTACT in the CiviCRM database, export contact info and perform activities such as Send Email, Phone Call, etc.'),
'implies' => [
'view my contact',
],
],
'edit all contacts' => [
'label' => $prefix . ts('edit all contacts'),
'description' => ts('View, Edit and Delete ANY CONTACT in the CiviCRM database; Create and edit relationships, tags and other info about the contacts'),
'implies' => [
'view all contacts',
'edit my contact',
],
],
'view my contact' => [
'label' => $prefix . ts('view my contact'),
],
'edit my contact' => [
'label' => $prefix . ts('edit my contact'),
],
'delete contacts' => [
'label' => $prefix . ts('delete contacts'),
],
'access deleted contacts' => [
'label' => $prefix . ts('access deleted contacts'),
'description' => ts('Access contacts in the trash'),
],
'import contacts' => [
'label' => $prefix . ts('import contacts'),
'description' => ts('Import contacts and activities'),
],
'import SQL datasource' => [
'label' => $prefix . ts('import SQL datasource'),
'description' => ts('When importing, consume data directly from a SQL datasource'),
],
'edit groups' => [
'label' => $prefix . ts('edit groups'),
'description' => ts('Create new groups, edit group settings (e.g. group name, visibility...), delete groups'),
],
'administer CiviCRM' => [
'label' => $prefix . ts('administer CiviCRM'),
'description' => ts('Perform all tasks in the Administer CiviCRM control panel and Import Contacts'),
'implies' => [
'administer CiviCRM system',
'administer CiviCRM data',
'access CiviCRM',
],
],
'skip IDS check' => [
'label' => $prefix . ts('skip IDS check'),
'description' => ts('Warning: Give to trusted roles only; this permission has security implications. IDS system is bypassed for users with this permission. Prevents false errors for admin users.'),
],
'access uploaded files' => [
'label' => $prefix . ts('access uploaded files'),
'description' => ts('View / download files including images and photos'),
],
'profile listings and forms' => [
'label' => $prefix . ts('profile listings and forms'),
'description' => ts('Warning: Give to trusted roles only; this permission has privacy implications. Add/edit data in online forms and access public searchable directories.'),
'implies' => [
'profile listings',
],
],
'profile listings' => [
'label' => $prefix . ts('profile listings'),
'description' => ts('Warning: Give to trusted roles only; this permission has privacy implications. Access public searchable directories.'),
],
'profile create' => [
'label' => $prefix . ts('profile create'),
'description' => ts('Add data in a profile form.'),
],
'profile edit' => [
'label' => $prefix . ts('profile edit'),
'description' => ts('Edit data in a profile form.'),
],
'profile view' => [
'label' => $prefix . ts('profile view'),
'description' => ts('View data in a profile.'),
],
'access all custom data' => [
'label' => $prefix . ts('access all custom data'),
'description' => ts('View all custom fields regardless of ACL rules'),
],
'view all activities' => [
'label' => $prefix . ts('view all activities'),
'description' => ts('View all activities (for visible contacts)'),
],
'delete activities' => [
'label' => $prefix . ts('Delete activities'),
],
'edit inbound email basic information' => [
'label' => $prefix . ts('edit inbound email basic information'),
'description' => ts('Edit all inbound email activities (for visible contacts) basic information. Content editing not allowed.'),
],
'edit inbound email basic information and content' => [
'label' => $prefix . ts('edit inbound email basic information and content'),
'description' => ts('Edit all inbound email activities (for visible contacts) basic information and content.'),
],
'access CiviCRM' => [
'label' => $prefix . ts('access CiviCRM backend and API'),
'description' => ts('Master control for access to the main CiviCRM backend and API. Give to trusted roles only.'),
],
'access Contact Dashboard' => [
'label' => $prefix . ts('access Contact Dashboard'),
'description' => ts('View Contact Dashboard (for themselves and visible contacts)'),
],
'translate CiviCRM' => [
'label' => $prefix . ts('translate CiviCRM'),
'description' => ts('Allow User to enable multilingual'),
],
'manage tags' => [
'label' => $prefix . ts('manage tags'),
'description' => ts('Create and rename tags'),
],
'administer reserved groups' => [
'label' => $prefix . ts('administer reserved groups'),
'description' => ts('Edit and disable Reserved Groups (Needs Edit Groups)'),
],
'administer Tagsets' => [
'label' => $prefix . ts('administer Tagsets'),
],
'administer reserved tags' => [
'label' => $prefix . ts('administer reserved tags'),
],
'administer queues' => [
'label' => $prefix . ts('administer queues'),
'description' => ts('Initialize, browse, and cancel background processing queues'),
// At time of writing, we have specifically omitted the ability to edit fine-grained
// data about specific queue-tasks. Tasks are usually defined as PHP callables...
// and one should hesitate before allowing open-ended edits of PHP callables.
// However, it seems fine for web-admins to browse and cancel these things.
],
'administer dedupe rules' => [
'label' => $prefix . ts('administer dedupe rules'),
'description' => ts('Create and edit rules, change the supervised and unsupervised rules'),
],
'merge duplicate contacts' => [
'label' => $prefix . ts('merge duplicate contacts'),
'description' => ts('Delete Contacts must also be granted in order for this to work.'),
],
'force merge duplicate contacts' => [
'label' => $prefix . ts('force merge duplicate contacts'),
'description' => ts('Delete Contacts must also be granted in order for this to work.'),
],
'view debug output' => [
'label' => $prefix . ts('view debug output'),
'description' => ts('View results of debug and backtrace'),
],
'view all notes' => [
'label' => $prefix . ts('view all notes'),
'description' => ts("View notes (for visible contacts) even if they're marked author only"),
],
'add contact notes' => [
'label' => $prefix . ts('add contact notes'),
'description' => ts("Create notes for contacts"),
],
'access AJAX API' => [
'label' => $prefix . ts('access AJAX API'),
'description' => ts('Allow API access even if Access CiviCRM is not granted'),
],
'access contact reference fields' => [
'label' => $prefix . ts('access contact reference fields'),
'description' => ts('Allow entering data into contact reference fields'),
],
'create manual batch' => [
'label' => $prefix . ts('create manual batch'),
'description' => ts('Create an accounting batch (with Access to CiviContribute and View Own/All Manual Batches)'),
],
'edit own manual batches' => [
'label' => $prefix . ts('edit own manual batches'),
'description' => ts('Edit accounting batches created by user'),
],
'edit all manual batches' => [
'label' => $prefix . ts('edit all manual batches'),
'description' => ts('Edit all accounting batches'),
'implies' => [
'view all manual batches',
'edit own manual batches',
],
],
'close own manual batches' => [
'label' => $prefix . ts('close own manual batches'),
'description' => ts('Close accounting batches created by user (with Access to CiviContribute)'),
],
'close all manual batches' => [
'label' => $prefix . ts('close all manual batches'),
'description' => ts('Close all accounting batches (with Access to CiviContribute)'),
'implies' => [
'close own manual batches',
],
],
'reopen own manual batches' => [
'label' => $prefix . ts('reopen own manual batches'),
'description' => ts('Reopen accounting batches created by user (with Access to CiviContribute)'),
],
'reopen all manual batches' => [
'label' => $prefix . ts('reopen all manual batches'),
'description' => ts('Reopen all accounting batches (with Access to CiviContribute)'),
'implies' => [
'reopen own manual batches',
],
],
'view own manual batches' => [
'label' => $prefix . ts('view own manual batches'),
'description' => ts('View accounting batches created by user (with Access to CiviContribute)'),
],
'view all manual batches' => [
'label' => $prefix . ts('view all manual batches'),
'description' => ts('View all accounting batches (with Access to CiviContribute)'),
'implies' => [
'view own manual batches',
],
],
'delete own manual batches' => [
'label' => $prefix . ts('delete own manual batches'),
'description' => ts('Delete accounting batches created by user'),
],
'delete all manual batches' => [
'label' => $prefix . ts('delete all manual batches'),
'description' => ts('Delete all accounting batches'),
'implies' => [
'delete own manual batches',
],
],
'export own manual batches' => [
'label' => $prefix . ts('export own manual batches'),
'description' => ts('Export accounting batches created by user'),
],
'export all manual batches' => [
'label' => $prefix . ts('export all manual batches'),
'description' => ts('Export all accounting batches'),
'implies' => [
'export own manual batches',
],
],
'administer payment processors' => [
'label' => $prefix . ts('administer payment processors'),
'description' => ts('Add, Update, or Disable Payment Processors'),
],
'render templates' => [
'label' => $prefix . ts('render templates'),
'description' => ts('Render open-ended template content. (Additional constraints may apply to autoloaded records and specific notations.)'),
],
'edit message templates' => [
'label' => $prefix . ts('edit message templates'),
],
'edit system workflow message templates' => [
'label' => $prefix . ts('edit system workflow message templates'),
],
'edit user-driven message templates' => [
'label' => $prefix . ts('edit user-driven message templates'),
],
'view my invoices' => [
'label' => $prefix . ts('view my invoices'),
'description' => ts('Allow users to view/ download their own invoices'),
],
'edit api keys' => [
'label' => $prefix . ts('edit api keys'),
'description' => ts('Edit API keys'),
'implies' => [
'edit own api keys',
],
],
'edit own api keys' => [
'label' => $prefix . ts('edit own api keys'),
'description' => ts("Edit user's own API keys"),
],
'send SMS' => [
'label' => $prefix . ts('send SMS'),
'description' => ts('Send an SMS'),
],
'administer CiviCRM system' => [
'label' => $prefix . ts('administer CiviCRM System'),
'description' => ts('Perform all system administration tasks in CiviCRM'),
'implies' => [
'edit system workflow message templates',
],
],
'administer CiviCRM data' => [
'label' => $prefix . ts('administer CiviCRM Data'),
'description' => ts('Permit altering all restricted data options'),
'implies' => [
'edit message templates',
'administer dedupe rules',
],
],
// This is a very special permission that supersedes all others;
// it's the equivalent of user 1 in Drupal.
'all CiviCRM permissions and ACLs' => [
'label' => $prefix . ts('all CiviCRM permissions and ACLs'),
'description' => ts('Administer and use CiviCRM bypassing any other permission or ACL checks and enabling the creation of displays and forms that allow others to bypass checks. This permission should be given out with care'),
// This line is here more as a bit of documentation (so it will show in `Civi\Api4\Permission::get()`).
// The functionality that actually propagates this permission into all others
// is in `self::getImpliedBy`.
'implies' => ['*'],
],
];
if (self::isMultisiteEnabled()) {
// This could arguably be moved to the multisite extension but
// within core it does permit editing group-organization records.
$permissions['administer Multiple Organizations'] = [
'label' => $prefix . ts('administer Multiple Organizations'),
'description' => ts('Administer multiple organizations. In practice this allows editing the group organization link'),
];
}