2013-03-25 20:33:33 +00:00

623 lines
16 KiB
C#

/*********************************************************************************************
* Copyright 2004 - Volian Enterprises, Inc. All rights reserved.
* Volian Enterprises - Proprietary Information - DO NOT COPY OR DISTRIBUTE
* ------------------------------------------------------------------------------
* $Workfile: Security.cs $ $Revision: 4 $
* $Author: Jsj $ $Date: 5/17/05 11:52a $
*
* $History: Security.cs $
*
* ***************** Version 4 *****************
* User: Jsj Date: 5/17/05 Time: 11:52a
* Updated in $/LibSource/Utils
* cleanup
*
* ***************** Version 3 *****************
* User: Kathy Date: 1/24/05 Time: 2:44p
* Updated in $/LibSource/Utils
* B2005-004 fixes
*
* ***************** Version 2 *****************
* User: Kathy Date: 1/14/05 Time: 10:38a
* Updated in $/LibSource/Utils
* B2004-061: fix security options
*
* ***************** Version 1 *****************
* User: Kathy Date: 7/27/04 Time: 8:34a
* Created in $/LibSource/Utils
*********************************************************************************************/
using System;
using System.IO;
using System.Collections;
using System.Windows.Forms;
using System.Text;
namespace Utils
{
/// <summary>
/// Summary description for Security.
/// </summary>
public class Security
{
public const long VIEW =0x00000001L;
public const long PRINT =0x00000002L;
public const long PRINTDRAFT =0x00000004L;
public const long PRINTCHANGES =0x00000008L;
public const long EDIT =0x00000010L;
public const long SEARCH =0x00000020L;
public const long STANDARDSTEPS =0x00000040L;
public const long APPROVE =0x00000080L;
public const long APPROVESINGLE =0x00000100L;
public const long LIBRARYDOCS =0x00000200L;
public const long ADDMODDEL =0x00000400L;
public const long CLEAN =0x00000800L;
public const long LOCKPROC =0x00001000L;
public const long LOCKSET =0x00000001L;
public const long UCF =0x00000002L;
public const long LOCKSYSTEM =0x00000001L;
public const long DOCMAINT =0x00000002L;
public const long ROEDITOR =0x00000004L;
public const long SYSADMIN =0x00000008L;
public const int SUPERUSER =1000;
public const long SUPERACCESS =0xFFFFFFFFL;
// the following four flags are system security options,
// read in for the user from the security file (vesam.opt)
private bool BlockAccessFlag=false;
public bool PermissionToManageFlag=false;
public bool SystemAdminFlag=false;
public bool PermissionToLockFlag=false;
// private string optFileName;
private int numsets = 0;
private long uoptions; // user options
private Int16 blockAccess = 0;
private long oldpos;
public int userid = -1;
// private int plantid = -1;
// private int procid = -1;
private string ident;
public string initials;
private const string samoptname = "vesam.opt";
public string optfilename;
private ArrayList psets; //
public FileStream fs;
public BinaryReader bw;
public bool isDemoMode=false;
public Security(string pathname)
{
if (File.Exists(pathname + "\\" + samoptname) == false)
{
MessageBox.Show("Could not locate the Security Options file:\n\n" + pathname+"\\"+samoptname,"Security Access Error");
optfilename = null;
return;
}
optfilename = pathname + "\\" + samoptname;
psets = new ArrayList();
}
public bool OpenFile()
{
try
{
fs = new FileStream(optfilename,FileMode.Open,FileAccess.Read,FileShare.Read,1,false);
bw = new BinaryReader(fs);
return true;
}
catch (Exception e)
{
MessageBox.Show(e.Message,"Security File");
return false;
}
}
public void CloseFile()
{
bw.Close();
fs.Close();
bw=null;
fs=null;
}
public int CheckUserId(string Name, string Pass)
{
// check for default superuser username/password.
if ((Name=="vlnmsp") && (Pass=="575"))
{
userid = SUPERUSER;
ident = "vlnmsp";
initials = Name;
return userid;
}
if (bw==null)
{
bool op;
if ((op = OpenFile()) == false) return -1;
}
byte x;
// read past some header stuff.
for (int jj=0;jj<16;jj++)
x=bw.ReadByte();
long nxtUs;
uint nmUser;
nxtUs=bw.ReadUInt32();
nmUser=bw.ReadUInt16();
int uid, tmp;
string fName, fPass;
for (int i = 0; i < nmUser; i++)
{
fs.Seek((long)nxtUs,SeekOrigin.Begin);
nxtUs=bw.ReadUInt32();
uid = bw.ReadUInt16();
tmp = bw.ReadUInt16();
byte [] test = new byte[10];
test = bw.ReadBytes(10);
fName = Encoding.ASCII.GetString(test,0,10);
int indx = fName.IndexOf("\0");
string fNameTrim = fName.Substring(0,indx);
if (fNameTrim == Name)
{
test = bw.ReadBytes(10);
fPass = Encoding.ASCII.GetString(test,0,10);
indx = fPass.IndexOf("\0");
string fPassTrim = fPass.Substring(0,indx);
if (fPassTrim == Pass)
{
userid = uid;
ident = Name;
initials = Name;
break;
}
}
}
CloseFile();
return userid;
}
public void SetUserSystemRights()
{
BlockAccessFlag=BlockAccess();
long userAccessFlags=GetUserSecurity();
PermissionToManageFlag=(userAccessFlags&Security.DOCMAINT)==0?false:true;
PermissionToLockFlag=(userAccessFlags&Security.LOCKSYSTEM)==0?false:true;
SystemAdminFlag=(userAccessFlags&Security.SYSADMIN)==0?false:true;
}
public void LoadUserSecurity()
{
//
// get the system level security options for this user here
//
bool op = OpenFile();
if (op==false) return;
if( userid == 1000 )
{ // super user priviledge
uoptions = 0xFFFFFFFFL;
SetUserSystemRights();
CloseFile();
return;
}
fs.Seek(32,SeekOrigin.Begin);
blockAccess=bw.ReadInt16();
fs.Seek(0,SeekOrigin.Begin);
byte x;
// read past some header stuff.
for (int jj=0;jj<16;jj++)
x=bw.ReadByte();
long nxtUs;
uint nmUser;
nxtUs=bw.ReadUInt32();
nmUser=bw.ReadUInt16();
int uid;
for (int i = 0; i < nmUser; i++)
{
oldpos = nxtUs;
fs.Seek((long)nxtUs,SeekOrigin.Begin);
nxtUs=bw.ReadUInt32();
uid = bw.ReadUInt16();
if (uid == userid)
{
string junk = new string (bw.ReadChars(22));
uoptions=bw.ReadUInt16();
break;
}
}
SetUserSystemRights();
CloseFile();
}
public void SetUpDemoMode()
{
userid=Security.SUPERUSER; // super user so that demo data can be anywhere (doesn't check vesamp.opt)
ident="demo";
initials="demo";
isDemoMode = true;
}
public int GetPlantSecurityIndex(string Location)
{
for (int i=0;i<psets.Count;i++)
{
SecurityPlantSets sps = (SecurityPlantSets) psets[i];
if (Location.ToUpper() == sps.GetPath().ToUpper()) return i;
}
return -1;
}
public bool PlantHasSecurity(int idx)
{
if (userid == SUPERUSER) return true;
if (idx<0 || idx>psets.Count-1)return false;
SecurityPlantSets sps = (SecurityPlantSets) psets[idx];
return sps.HasSecurity;
}
public bool ProcSetHasSecurity(int idx, string procset)
{
if (userid == SUPERUSER) return true;
if (idx<0 || idx>psets.Count-1)return false;
SecurityPlantSets sps = (SecurityPlantSets) psets[idx];
return sps.ProcSetHasSecurity(procset);
}
public long GetPlantSecurity(int idx)
{
if(userid == SUPERUSER ) return SUPERACCESS;
if (idx<0 || idx>psets.Count-1) return 0L;
SecurityPlantSets sps = (SecurityPlantSets) psets[idx];
return (sps.GetSecurity());
}
public bool AnyOptionsSet(int idx)
{
if(userid==SUPERUSER) return true;
if (idx<0 || idx>psets.Count-1) return false;
SecurityPlantSets sps = (SecurityPlantSets) psets[idx];
return sps.AnyOptionsSet();
}
public long GetUserSecurity()
{
if(userid == SUPERUSER) return SUPERACCESS;
return(uoptions);
}
public bool BlockAccess()
{
if (userid == SUPERUSER) return false;
if(blockAccess!=0) return true;
return false;
}
public bool IsAllowed(long mask)
{
if(userid == SUPERUSER) return true;
return (uoptions&mask) != 0;
}
public bool IsAllowed(string plantpath, string procpath, long mask)
{
bool retval = false;
if(userid == SUPERUSER) return true;
for(int i=0; i<numsets; i++)
{
SecurityPlantSets sps = (SecurityPlantSets) psets[i];
if(sps.IsAllowed(plantpath,procpath,mask)==true)
{
retval = true;
break;
}
}
return retval;
}
public long GetProcSecurity(string fullpath)
{
long mask=0L;
string plantpath;
string fullprocpath;
string procpath;
string tmpchg=null;
string apr=null;
if(userid == SUPERUSER) return SUPERACCESS;
plantpath = fullpath;
procpath = plantpath.Substring(plantpath.LastIndexOf("\\"),plantpath.Length-plantpath.LastIndexOf("\\"));
if (procpath.Substring(1,procpath.Length-1).ToUpper() == "TMPCHG")
{
// we have a Temporary Change directory, store it
tmpchg=procpath;
// remove the tmpchg text from the plantpath string
plantpath=plantpath.Substring(0,plantpath.Length-tmpchg.Length);
// Get the procedure subdirectory
procpath = plantpath.Substring(plantpath.LastIndexOf("\\"),plantpath.Length-plantpath.LastIndexOf("\\"));
}
if(procpath.Substring(1,procpath.Length-1).ToUpper() == "APPROVED")
{
// we have an approved dir, store it
apr = procpath;
// remove the approved text from the plantpath string
plantpath=plantpath.Substring(0,plantpath.Length-apr.Length);
// Get the procedure subdirectory
procpath = plantpath.Substring(plantpath.LastIndexOf("\\"),plantpath.Length-plantpath.LastIndexOf("\\"));
}
// at this point, tmpchg & apr will be set if we have a tmpchg or approved directory,
// plantpath will contain the plant directory & procedure set subdirectory, and
// procpath will be the procedure set subdirectory name (with the preceeding '\').
// Now set plantpath to be the plant level directory. Make fullprocpath from the
// procedure set subdirectory & any approved/tmpchg directories that were part
// of the path that was passed in.
plantpath=plantpath.Substring(0,plantpath.Length-procpath.Length);
procpath=procpath.Substring(1,procpath.Length-1); // remove '\' prefix
fullprocpath=procpath+apr+tmpchg;
for(int i=0; i<numsets; i++)
{
SecurityPlantSets sps = (SecurityPlantSets) psets[i];
if( sps.GetProcSecurity(plantpath,fullprocpath,ref mask) ) break;
}
return mask;
}
public void AddPlant(int nTab, string path)
{
SecurityPlantSets sps = new SecurityPlantSets(path, oldpos, this);
psets.Insert(nTab,sps);
numsets = psets.Count;
}
}
public class SecurityProcSets
{
private long[] procoptions;
private string path;
public SecurityProcSets(string pth, Security security, long userPos, int procid, int numplants, int pid)
{
procoptions = new long[4];
path = pth;
// read in proc options
if (security.userid == Security.SUPERUSER)
{
for(int i=0;i<4;i++) procoptions[i]=0xff;
return;
}
security.fs.Seek(userPos+38L,SeekOrigin.Begin);
short tpid;
for (int i=0;i<numplants;i++)
{
tpid = security.bw.ReadInt16();
security.fs.Seek(8L,SeekOrigin.Current);
short nProcSets;
nProcSets = security.bw.ReadInt16();
for (int j=0; j<nProcSets;j++)
{
short tprocid;
tprocid = security.bw.ReadInt16();
if (tprocid==procid && tpid==pid)
{
tprocid = security.bw.ReadInt16();
for(int k=0;k<4;k++) procoptions[k]=security.bw.ReadInt32();
return;
}
else
security.fs.Seek(18,SeekOrigin.Current);
}
}
}
public bool AnyOptionsSet()
{
for(int k=0;k<4;k++) if(procoptions[k]!=0L)return true;
return false;
}
public bool IsAllowed(string procpath, long mask)
{
bool retval = false;
if (path==procpath) retval = (procoptions[0]&mask) !=0;
return retval;
}
public string GetPath()
{
return path;
}
public bool GetProcSecurity(string procpath, ref long mask)
{
bool retval = false;
if (path.ToUpper()==procpath.ToUpper())
{
mask = procoptions[0];
retval = true;
}
return retval;
}
}
public class SecurityPlantSets
{
private string path;
private long setoption;
private int numopts;
private ArrayList procs; // SecurityProcSets;
private Security security;
// Flag whether this plant has data in the security options file. (maybe newly
// created since vesam was run).
public bool HasSecurity;
public SecurityPlantSets(string cptr, long userPos, Security sec)
{
string title;
string pth;
int pid=0;
long plantpos;
procs = new ArrayList();
security = sec;
path = cptr;
HasSecurity=false;
security.fs.Seek(8L,SeekOrigin.Begin);
numopts = -1;
plantpos = security.bw.ReadInt32(); // 1st plant set position
short np;
np = security.bw.ReadInt16(); // number of plant sets.
long oldpos=0;
short sz;
for (int i=0;i<np;i++)
{
security.fs.Seek(plantpos,SeekOrigin.Begin);
plantpos = security.bw.ReadInt32();
pid = security.bw.ReadInt16();
sz = security.bw.ReadInt16();
title = new string(security.bw.ReadChars(sz));
sz = security.bw.ReadInt16();
pth=null;
pth = new string(security.bw.ReadChars(sz));
if (pth.ToUpper()==path.ToUpper()) // this is what we're looking for..
{
numopts = security.bw.ReadInt16();
security.fs.Seek(4L,SeekOrigin.Current);
oldpos = security.fs.Position;
HasSecurity=true;
break;
}
}
// get the plant level options
int currentUID = sec.userid;
if (currentUID != Security.SUPERUSER)
{
security.fs.Seek(userPos,SeekOrigin.Begin);
security.fs.Seek(38L,SeekOrigin.Current);
short tpid;
for (int i=0;i<np;i++)
{
tpid = security.bw.ReadInt16();
if (tpid == pid) // correct plant
{
setoption = security.bw.ReadInt32();
break;
}
else
{
setoption = security.bw.ReadInt32(); //skip following data...
setoption = security.bw.ReadInt32();
tpid = security.bw.ReadInt16();
for (int j=0;j<tpid;j++) security.fs.Seek(20L,SeekOrigin.Current);
}
}
}
else
setoption = Security.SUPERACCESS;
if (numopts>0)
procs = new ArrayList(numopts);
else
procs = null;
for(int i=0;i<numopts;i++)
{
security.fs.Seek(oldpos+4L,SeekOrigin.Begin);
short procid;
procid = security.bw.ReadInt16();
sz = security.bw.ReadInt16();
title = new string(security.bw.ReadChars(sz));
sz = security.bw.ReadInt16();
pth = new string(security.bw.ReadChars(sz));
security.fs.Seek(4L,SeekOrigin.Current);
oldpos = security.fs.Position;
SecurityProcSets sps = new SecurityProcSets(pth, security, userPos, procid, np, pid);
procs.Insert(i,sps);
}
}
public string GetPath()
{
return path;
}
public bool ProcSetHasSecurity(string procset)
{
if (procs==null)return false; // if no procs for plant in security file.
//see if this plant has a procedure set that matches the input string
// this will tell us that it is included in the vesam.opt file.
for (int i=0;i<procs.Count;i++)
{
SecurityProcSets sps = (SecurityProcSets) procs[i];
if (sps.GetPath().ToUpper() == procset.ToUpper()) return true;
}
return false;
}
public bool AnyOptionsSet()
{
for (int i=0;i<numopts;i++)
{
SecurityProcSets sps = (SecurityProcSets) procs[i];
if (sps.AnyOptionsSet())return true;
}
return false;
}
public bool IsAllowed(string plantpath, string procpath, long mask)
{
bool retval = false;
if (path==plantpath)
{
for (int i=0;i<numopts;i++)
{
SecurityProcSets sps = (SecurityProcSets) procs[i];
if (sps.IsAllowed(procpath, mask)==true)
{
retval = true;
break;
}
}
}
return retval;
}
public long GetSecurity()
{
return (setoption);
}
public bool GetProcSecurity(string plantpath, string procpath, ref long mask)
{
bool retval = false;
if(path.ToUpper() == plantpath.ToUpper())
{
if (security.userid!=Security.SUPERUSER)
{
for (int i=0; i<numopts; i++)
{
SecurityProcSets sps = (SecurityProcSets) procs[i];
if (sps.GetProcSecurity(procpath,ref mask) == true)
{
retval = true;
break;
}
}
}
else
{
retval = true;
mask = Security.SUPERACCESS;
}
}
return retval;
}
}
}