Search moodle.org's
Developer Documentation

See Release Notes

  • Bug fixes for general core bugs in 4.2.x will end 22 April 2024 (12 months).
  • Bug fixes for security issues in 4.2.x will end 7 October 2024 (18 months).
  • PHP version: minimum PHP 8.0.0 Note: minimum PHP version has increased since Moodle 4.1. PHP 8.1.x is supported too.
<?php
// This file is part of Moodle - http://moodle.org/
//
// Moodle is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// Moodle is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with Moodle.  If not, see <http://www.gnu.org/licenses/>.

namespace core\check\access;

use core\check\check;
use core\check\result;

/**
 * Verifies sanity of default user role.
 *
 * @package    core
 * @category   check
 * @copyright  2020 Brendan Heywood <brendan@catalyst-au.net>
 * @copyright  2008 petr Skoda
 * @license    http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
 */
class defaultuserrole extends check {

    /**
     * Get the short check name
     *
     * @return string
     */
    public function get_name(): string {
        return get_string('check_defaultuserrole_name', 'report_security');
    }

    /**
     * A link to a place to action this
     *
< * @return action_link|null
> * @return \action_link|null
*/ public function get_action_link(): ?\action_link { global $CFG, $DB; $defaultrole = $DB->get_record('role', ['id' => $CFG->defaultuserroleid]); return new \action_link( new \moodle_url('/admin/roles/define.php', ['action' => 'view', 'roleid' => $defaultrole->id]), get_string('definitionofrolex', 'core_role', role_get_name($defaultrole)) ); } /** * Return result * @return result */ public function get_result(): result { global $DB, $CFG; $details = ''; if (!$defaultrole = $DB->get_record('role', ['id' => $CFG->defaultuserroleid])) { $status = result::WARNING; $summary = get_string('check_defaultuserrole_notset', 'report_security'); return new result($status, $summary, $details); } // Risky caps - usually very dangerous. $sql = "SELECT rc.id, rc.contextid, rc.capability FROM {role_capabilities} rc JOIN {capabilities} cap ON cap.name = rc.capability WHERE " . $DB->sql_bitand('cap.riskbitmask', (RISK_XSS | RISK_CONFIG | RISK_DATALOSS)) . " <> 0 AND rc.permission = :capallow AND rc.roleid = :roleid"; $riskyresults = $DB->get_records_sql($sql, [ 'capallow' => CAP_ALLOW, 'roleid' => $defaultrole->id, ]); // If automatic approval is disabled, then the requestdelete capability is not risky. if (!get_config('tool_dataprivacy', 'automaticdatadeletionapproval')) { $riskyresults = array_filter($riskyresults, function ($object) { return $object->capability !== 'tool/dataprivacy:requestdelete'; }); } // Count the number of unique contexts that have risky caps. $riskycount = count(array_unique(array_column($riskyresults, 'contextid'))); // It may have either none or 'user' archetype - nothing else, or else it would break during upgrades badly. if ($defaultrole->archetype === '' or $defaultrole->archetype === 'user') { $legacyok = true; } else { $legacyok = false; } if ($riskycount or !$legacyok) { $status = result::CRITICAL; $summary = get_string('check_defaultuserrole_error', 'report_security', role_get_name($defaultrole)); } else { $status = result::OK; $summary = get_string('check_defaultuserrole_ok', 'report_security'); } $details = get_string('check_defaultuserrole_details', 'report_security'); return new result($status, $summary, $details); } }