diff --git a/pandora_console/ajax.php b/pandora_console/ajax.php index f0032476e2..d6a48d27d0 100644 --- a/pandora_console/ajax.php +++ b/pandora_console/ajax.php @@ -89,7 +89,11 @@ if (isset($_GET['loginhash']) === true) { $config['id_user'] = $loginhash_user; } else { include_once 'general/login_page.php'; - db_pandora_audit('Logon Failed (loginhash', '', 'system'); + db_pandora_audit( + AUDIT_LOG_USER_REGISTRATION, + 'Loginhash failed', + 'system' + ); while (ob_get_length() > 0) { ob_end_flush(); } @@ -111,8 +115,8 @@ if (class_exists($auth_class) === false || $public_hash === false) { } else { if ($auth_class::validatePublicHash($public_hash) === false) { db_pandora_audit( - 'Invalid public hash', - 'Trying to access public dashboard' + AUDIT_LOG_USER_REGISTRATION, + 'Trying to access public dashboard (Invalid public hash)' ); include 'general/noaccess.php'; exit; diff --git a/pandora_console/extensions/agents_modules.php b/pandora_console/extensions/agents_modules.php index 815a0ed8d0..08218e7f51 100644 --- a/pandora_console/extensions/agents_modules.php +++ b/pandora_console/extensions/agents_modules.php @@ -284,7 +284,7 @@ function mainAgentsModules() // ACL Check. if (! check_acl($config['id_user'], 0, 'AR')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent view (Grouped)' ); include 'general/noaccess.php'; @@ -304,7 +304,10 @@ function mainAgentsModules() db_process_sql_update('tagente_modulo', ['flag' => 1], $where); } else { - db_pandora_audit('ACL Violation', 'Trying to set flag for groups'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to set flag for groups' + ); include 'general/noaccess.php'; exit; } diff --git a/pandora_console/extensions/api_checker.php b/pandora_console/extensions/api_checker.php index 49f742217e..cafbf6016d 100755 --- a/pandora_console/extensions/api_checker.php +++ b/pandora_console/extensions/api_checker.php @@ -63,7 +63,7 @@ function extension_api_checker() if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Profile Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/extensions/db_status.php b/pandora_console/extensions/db_status.php index d55294f3a6..638d795b31 100755 --- a/pandora_console/extensions/db_status.php +++ b/pandora_console/extensions/db_status.php @@ -32,7 +32,7 @@ function extension_db_status() if (!is_user_admin($config['id_user'])) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access db status' ); include 'general/noaccess.php'; diff --git a/pandora_console/extensions/dbmanager.php b/pandora_console/extensions/dbmanager.php index 7d32b730e5..fbe3d7cb47 100644 --- a/pandora_console/extensions/dbmanager.php +++ b/pandora_console/extensions/dbmanager.php @@ -89,7 +89,10 @@ function dbmgr_extension_main() global $config; if (!is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Setup Management' + ); include 'general/noaccess.php'; return; } @@ -143,7 +146,13 @@ function dbmgr_extension_main() echo 'An error has occured when querying the database.
'; echo $error; - db_pandora_audit('DB Interface Extension', 'Error in SQL', false, false, $sql); + db_pandora_audit( + AUDIT_LOG_SYSTEM, + 'DB Interface Extension. Error in SQL', + false, + false, + $sql + ); return; } @@ -151,7 +160,13 @@ function dbmgr_extension_main() if (! is_array($result)) { echo 'Output: '.$result; - db_pandora_audit('DB Interface Extension', 'SQL', false, false, $sql); + db_pandora_audit( + AUDIT_LOG_SYSTEM, + 'DB Interface Extension. SQL', + false, + false, + $sql + ); return; } diff --git a/pandora_console/extensions/disabled/matrix_events.php b/pandora_console/extensions/disabled/matrix_events.php index e93cd24f8e..e695e81bcf 100644 --- a/pandora_console/extensions/disabled/matrix_events.php +++ b/pandora_console/extensions/disabled/matrix_events.php @@ -16,7 +16,10 @@ function load_matrix_console() global $config; if (! check_acl($config['id_user'], 0, 'ER')) { - db_pandora_audit('ACL Violation', 'Trying to access event viewer'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access event viewer' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/extensions/extension_uploader.php b/pandora_console/extensions/extension_uploader.php index 4df1c25bd1..7871ab0b2a 100644 --- a/pandora_console/extensions/extension_uploader.php +++ b/pandora_console/extensions/extension_uploader.php @@ -17,7 +17,7 @@ function extension_uploader_extensions() if (!check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Group Management' ); include 'general/noaccess.php'; @@ -61,7 +61,10 @@ function extension_uploader_extensions() } if ($result) { - db_pandora_audit('Extension manager', 'Upload extension '.$_FILES['extension']['name']); + db_pandora_audit( + AUDIT_LOG_EXTENSION_MANAGER, + 'Upload extension '.$_FILES['extension']['name'] + ); } ui_print_result_message( diff --git a/pandora_console/extensions/files_repo.php b/pandora_console/extensions/files_repo.php index d0edb1f591..34e5fe52d2 100644 --- a/pandora_console/extensions/files_repo.php +++ b/pandora_console/extensions/files_repo.php @@ -106,7 +106,10 @@ function pandora_files_repo_godmode() // ACL Check check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { - db_pandora_audit('ACL Violation', 'Trying to access to Files repository'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access to Files repository' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/extensions/insert_data.php b/pandora_console/extensions/insert_data.php index d6b54cdb11..54306ac5d7 100644 --- a/pandora_console/extensions/insert_data.php +++ b/pandora_console/extensions/insert_data.php @@ -58,7 +58,10 @@ function mainInsertData() ui_print_page_header(__('Insert data'), 'images/extensions.png', false, '', true, ''); if (! check_acl($config['id_user'], 0, 'AW') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Setup Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/extensions/matrix_events/ajax.php b/pandora_console/extensions/matrix_events/ajax.php index f83ae58c36..3931770309 100644 --- a/pandora_console/extensions/matrix_events/ajax.php +++ b/pandora_console/extensions/matrix_events/ajax.php @@ -15,7 +15,10 @@ global $config; if (is_ajax()) { if (! check_acl($config['id_user'], 0, 'ER')) { - db_pandora_audit('ACL Violation', 'Trying to access event viewer'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access event viewer' + ); return; } diff --git a/pandora_console/extensions/module_groups.php b/pandora_console/extensions/module_groups.php index 0062c25a13..a04e6a08dc 100644 --- a/pandora_console/extensions/module_groups.php +++ b/pandora_console/extensions/module_groups.php @@ -33,7 +33,7 @@ check_login(); // ACL Check. if (!check_acl($config['id_user'], 0, 'AR')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Module Groups view' ); include 'general/noaccess.php'; diff --git a/pandora_console/extensions/pandora_logs.php b/pandora_console/extensions/pandora_logs.php index 420d2bc6c1..21b817b978 100644 --- a/pandora_console/extensions/pandora_logs.php +++ b/pandora_console/extensions/pandora_logs.php @@ -56,7 +56,10 @@ function pandoralogs_extension_main() global $config; if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Setup Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/extensions/quick_shell.php b/pandora_console/extensions/quick_shell.php index 54cb24e9f4..bc5f545905 100644 --- a/pandora_console/extensions/quick_shell.php +++ b/pandora_console/extensions/quick_shell.php @@ -46,7 +46,7 @@ function quickShell() if (check_acl($config['id_user'], 0, 'PM') === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Profile Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/extensions/resource_exportation.php b/pandora_console/extensions/resource_exportation.php index 16201ccec0..a9202a0381 100755 --- a/pandora_console/extensions/resource_exportation.php +++ b/pandora_console/extensions/resource_exportation.php @@ -29,7 +29,10 @@ if (isset($_GET['get_ptr'])) { if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Setup Management' + ); include 'general/noaccess.php'; return; } @@ -404,7 +407,10 @@ function resource_exportation_extension_main() check_login(); if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Setup Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/extensions/resource_registration.php b/pandora_console/extensions/resource_registration.php index 1d6ae952a7..4f23e340b3 100755 --- a/pandora_console/extensions/resource_registration.php +++ b/pandora_console/extensions/resource_registration.php @@ -143,14 +143,14 @@ function process_upload_xml_report($xml, $group_filter=0) if ($id_report) { db_pandora_audit( - 'Report management', + AUDIT_LOG_REPORT_MANAGEMENT, 'Create report '.$id_report, false, false ); } else { db_pandora_audit( - 'Report management', + AUDIT_LOG_REPORT_MANAGEMENT, 'Fail to create report', false, false @@ -554,7 +554,11 @@ function process_upload_xml_visualmap($xml, $filter_group=0) ); if ($id_visual_map !== false) { - db_pandora_audit('CREATE VISUAL CONSOLE', $id_visual_map, $config['id_user']); + db_pandora_audit( + AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT, + sprintf('Create Visual Console #%s', $id_visual_map), + $config['id_user'] + ); } else { break; } @@ -716,7 +720,11 @@ function process_upload_xml_visualmap($xml, $filter_group=0) ); if ($id_item !== false) { - db_pandora_audit('CREATE ITEM VISUAL CONSOLE', $values['id_layout'].' - '.$id_item, $config['id_user']); + db_pandora_audit( + AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT, + sprintf('Create Item %s in Visual Console #%s', $id_item, $values['id_layout']), + $config['id_user'] + ); } } else { foreach ($agents_in_item as $id => $agent) { @@ -725,7 +733,7 @@ function process_upload_xml_visualmap($xml, $filter_group=0) $id_item = db_process_sql_insert('tlayout_data', $values); - if (isset($item->other_id)) { + if (isset($item->other_id) === true) { $relation_other_ids[(string) $item->other_id] = $id_item; } @@ -736,9 +744,14 @@ function process_upload_xml_visualmap($xml, $filter_group=0) ); if ($id_item !== false) { - db_pandora_audit('CREATE ITEM VISUAL CONSOLE', $values['id_layout'].' - '.$id_item, $config['id_user']); + db_pandora_audit( + AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT, + sprintf('Create Item %s in Visual Console #%s', $id_item, $values['id_layout']), + $config['id_user'] + ); } } else { + // TODO: Review this else. foreach ($agent['modules'] as $id_module => $module) { $values['id_agent'] = $id; $values['id_agente_modulo'] = $id_module; @@ -752,7 +765,11 @@ function process_upload_xml_visualmap($xml, $filter_group=0) ); if ($id_item !== false) { - db_pandora_audit('CREATE ITEM VISUAL CONSOLE', $values['id_layout'].' - '.$id_item, $config['id_user']); + db_pandora_audit( + AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT, + sprintf('Create Item %s in Visual Console #%s', $id_item, $values['id_layout']), + $config['id_user'] + ); } } } @@ -1063,7 +1080,10 @@ function resource_registration_extension_main() global $config; if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Setup Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/general/first_task/HA_cluster_builder.php b/pandora_console/general/first_task/HA_cluster_builder.php index e39892b254..2f0bb24a20 100644 --- a/pandora_console/general/first_task/HA_cluster_builder.php +++ b/pandora_console/general/first_task/HA_cluster_builder.php @@ -26,7 +26,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access HA cluster' ); include 'general/noaccess.php'; diff --git a/pandora_console/general/first_task/cluster_builder.php b/pandora_console/general/first_task/cluster_builder.php index 22c624c9a6..3e6fe3dad4 100644 --- a/pandora_console/general/first_task/cluster_builder.php +++ b/pandora_console/general/first_task/cluster_builder.php @@ -17,7 +17,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'AR') && ! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Inventory' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/agentes/agent_incidents.php b/pandora_console/godmode/agentes/agent_incidents.php index 3917c2f81a..796a3afd77 100644 --- a/pandora_console/godmode/agentes/agent_incidents.php +++ b/pandora_console/godmode/agentes/agent_incidents.php @@ -27,7 +27,7 @@ $group = $id_grupo; if (! check_acl($config['id_user'], $group, 'AW', $id_agente)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access agent manager' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/agentes/agent_manager.php b/pandora_console/godmode/agentes/agent_manager.php index 2d77e7de29..9452a9f0b0 100644 --- a/pandora_console/godmode/agentes/agent_manager.php +++ b/pandora_console/godmode/agentes/agent_manager.php @@ -154,7 +154,10 @@ ui_require_javascript_file('openlayers.pandora'); $new_agent = (empty($id_agente)) ? true : false; if (! isset($id_agente) && ! $new_agent) { - db_pandora_audit('ACL Violation', 'Trying to access agent manager witout an agent'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access agent manager witout an agent' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/agentes/configurar_agente.php b/pandora_console/godmode/agentes/configurar_agente.php index 7965dbc566..d50a616379 100644 --- a/pandora_console/godmode/agentes/configurar_agente.php +++ b/pandora_console/godmode/agentes/configurar_agente.php @@ -70,7 +70,7 @@ if (!check_acl_one_of_groups($config['id_user'], $all_groups, 'AW')) { if (!$access_granted) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access agent manager' ); include 'general/noaccess.php'; @@ -198,7 +198,10 @@ if ($create_agent) { $grupo = (int) get_parameter_post('grupo'); if ((bool) check_acl($config['id_user'], $grupo, 'AW') === false) { - db_pandora_audit('ACL Violation', 'Trying to access agent manager'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access agent manager' + ); include $config['homedir'].'/general/noaccess.php'; return; } @@ -352,7 +355,7 @@ if ($create_agent) { $unsafe_alias = io_safe_output($alias); db_pandora_audit( - 'Agent management', + AUDIT_LOG_AGENT_MANAGEMENT, 'Created agent '.$unsafe_alias, false, true, @@ -1243,7 +1246,7 @@ if ($update_agent) { ui_print_success_message(__('Successfully updated')); db_pandora_audit( - 'Agent management', + AUDIT_LOG_AGENT_MANAGEMENT, 'Updated agent '.io_safe_output($alias), false, false, @@ -1259,7 +1262,10 @@ if ($id_agente) { // This has been done in the beginning of the page, but if an agent was created, this id might change. $id_grupo = agents_get_agent_group($id_agente); if (!check_acl_one_of_groups($config['id_user'], $all_groups, 'AW') && !check_acl_one_of_groups($config['id_user'], $all_groups, 'AD')) { - db_pandora_audit('ACL Violation', 'Trying to admin an agent without access'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to admin an agent without access' + ); include 'general/noaccess.php'; exit; } @@ -1319,7 +1325,7 @@ if ($update_module || $create_module) { if (! check_acl_one_of_groups($config['id_user'], $all_groups, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to create a module without admin rights' ); include 'general/noaccess.php'; @@ -1803,7 +1809,7 @@ if ($update_module) { $edit_module = true; db_pandora_audit( - 'Agent management', + AUDIT_LOG_AGENT_MANAGEMENT, "Fail to try update module '".io_safe_output($name)."' for agent ".io_safe_output($agent['alias']) ); } else { @@ -1827,7 +1833,7 @@ if ($update_module) { $agent = db_get_row('tagente', 'id_agente', $id_agente); db_pandora_audit( - 'Agent management', + AUDIT_LOG_AGENT_MANAGEMENT, "Updated module '".io_safe_output($name)."' for agent ".io_safe_output($agent['alias']), false, false, @@ -1989,7 +1995,7 @@ if ($create_module) { $edit_module = true; $moduletype = $id_module; db_pandora_audit( - 'Agent management', + AUDIT_LOG_AGENT_MANAGEMENT, "Fail to try added module '".io_safe_output($name)."' for agent ".io_safe_output($agent['alias']) ); } else { @@ -2014,7 +2020,7 @@ if ($create_module) { $agent = db_get_row('tagente', 'id_agente', $id_agente); db_pandora_audit( - 'Agent management', + AUDIT_LOG_AGENT_MANAGEMENT, "Added module '".io_safe_output($name)."' for agent ".io_safe_output($agent['alias']), false, true, @@ -2049,12 +2055,12 @@ if ($enable_module) { $success_action = $result; if ($result === NOERR) { db_pandora_audit( - 'Module management', + AUDIT_LOG_MODULE_MANAGEMENT, 'Enable #'.$enable_module.' | '.$module_name.' | '.io_safe_output($agent['alias']) ); } else { db_pandora_audit( - 'Module management', + AUDIT_LOG_MODULE_MANAGEMENT, 'Fail to enable #'.$enable_module.' | '.$module_name.' | '.io_safe_output($agent['alias']) ); } @@ -2084,12 +2090,12 @@ if ($disable_module) { if ($result === NOERR) { db_pandora_audit( - 'Module management', + AUDIT_LOG_MODULE_MANAGEMENT, 'Disable #'.$disable_module.' | '.$module_name.' | '.io_safe_output($agent['alias']) ); } else { db_pandora_audit( - 'Module management', + AUDIT_LOG_MODULE_MANAGEMENT, 'Fail to disable #'.$disable_module.' | '.$module_name.' | '.io_safe_output($agent['alias']) ); } @@ -2133,7 +2139,7 @@ if ($delete_module) { if (! check_acl_one_of_groups($config['id_user'], $all_groups, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to delete a module without admin rights' ); include 'general/noaccess.php'; @@ -2143,7 +2149,7 @@ if ($delete_module) { if (empty($module_data) || $id_borrar_modulo < 1) { db_pandora_audit( - 'HACK Attempt', + AUDIT_LOG_HACK_ATTEMPT, 'Expected variable from form is not correct' ); include 'general/noaccess.php'; @@ -2165,7 +2171,7 @@ if ($delete_module) { $agent = db_get_row('tagente', 'id_agente', $id_agente); db_pandora_audit( - 'Agent management', + AUDIT_LOG_AGENT_MANAGEMENT, "Deleted module '".io_safe_output($module_data['nombre'])."' for agent ".io_safe_output($agent['alias']) ); } @@ -2206,12 +2212,12 @@ if (!empty($duplicate_module)) { if ($result) { db_pandora_audit( - 'Agent management', + AUDIT_LOG_AGENT_MANAGEMENT, "Duplicate module '".$id_duplicate_module."' for agent ".$agent['alias'].' with the new id for clon '.$result ); } else { db_pandora_audit( - 'Agent management', + AUDIT_LOG_AGENT_MANAGEMENT, "Fail to try duplicate module '".$id_duplicate_module."' for agent ".$agent['alias'] ); } @@ -2225,9 +2231,15 @@ if ($enable_module) { if ($result === NOERR) { enterprise_hook('config_agents_enable_module_conf', [$id_agente, $enable_module]); - db_pandora_audit('Module management', 'Enable #'.$enable_module.' | '.$modulo_nombre.' | '.$agent['alias']); + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + 'Enable #'.$enable_module.' | '.$modulo_nombre.' | '.$agent['alias'] + ); } else { - db_pandora_audit('Module management', 'Fail to enable #'.$enable_module.' | '.$modulo_nombre.' | '.$agent['alias']); + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + 'Fail to enable #'.$enable_module.' | '.$modulo_nombre.' | '.$agent['alias'] + ); } ui_print_result_message( @@ -2244,9 +2256,15 @@ if ($disable_module) { if ($result === NOERR) { enterprise_hook('config_agents_disable_module_conf', [$id_agente, $disable_module]); - db_pandora_audit('Module management', 'Disable #'.$disable_module.' | '.$modulo_nombre.' | '.$agent['alias']); + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + 'Disable #'.$disable_module.' | '.$modulo_nombre.' | '.$agent['alias'] + ); } else { - db_pandora_audit('Module management', 'Fail to disable #'.$disable_module.' | '.$modulo_nombre.' | '.$agent['alias']); + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + 'Fail to disable #'.$disable_module.' | '.$modulo_nombre.' | '.$agent['alias'] + ); } ui_print_result_message( diff --git a/pandora_console/godmode/agentes/configure_field.php b/pandora_console/godmode/agentes/configure_field.php index 0f7a42820a..7ef0fe042a 100755 --- a/pandora_console/godmode/agentes/configure_field.php +++ b/pandora_console/godmode/agentes/configure_field.php @@ -16,7 +16,10 @@ global $config; check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { - db_pandora_audit('ACL Violation', 'Trying to access Group Management2'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Group Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/agentes/fields_manager.php b/pandora_console/godmode/agentes/fields_manager.php index 3fd8db3849..960ed62776 100644 --- a/pandora_console/godmode/agentes/fields_manager.php +++ b/pandora_console/godmode/agentes/fields_manager.php @@ -18,7 +18,7 @@ check_login(); if (!check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Group Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/agentes/modificar_agente.php b/pandora_console/godmode/agentes/modificar_agente.php index e2aca5017f..2d6dd90bbe 100644 --- a/pandora_console/godmode/agentes/modificar_agente.php +++ b/pandora_console/godmode/agentes/modificar_agente.php @@ -58,7 +58,7 @@ if (! check_acl( ) ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access agent manager' ); include 'general/noaccess.php'; @@ -158,7 +158,7 @@ if ($agent_to_delete) { } else { // NO permissions. db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, "Trying to delete agent \'".agents_get_name($id_agente)."\'" ); include 'general/noaccess.php'; @@ -219,12 +219,12 @@ if ($enable_agent) { ] ); db_pandora_audit( - 'Agent management', + AUDIT_LOG_AGENT_MANAGEMENT, 'Enable '.$alias ); } else { db_pandora_audit( - 'Agent management', + AUDIT_LOG_AGENT_MANAGEMENT, 'Fail to enable '.$alias ); } @@ -262,12 +262,12 @@ if ($disable_agent) { ); db_pandora_audit( - 'Agent management', + AUDIT_LOG_AGENT_MANAGEMENT, 'Disable '.$alias ); } else { db_pandora_audit( - 'Agent management', + AUDIT_LOG_AGENT_MANAGEMENT, 'Fail to disable '.$alias ); } diff --git a/pandora_console/godmode/agentes/module_manager.php b/pandora_console/godmode/agentes/module_manager.php index 1d39f0525a..529112bd5a 100644 --- a/pandora_console/godmode/agentes/module_manager.php +++ b/pandora_console/godmode/agentes/module_manager.php @@ -261,7 +261,7 @@ if ($module_action === 'delete') { if (! check_acl_one_of_groups($config['id_user'], $all_groups, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to delete a module without admin rights' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/agentes/module_manager_editor.php b/pandora_console/godmode/agentes/module_manager_editor.php index c4e62816cb..005b1e578f 100644 --- a/pandora_console/godmode/agentes/module_manager_editor.php +++ b/pandora_console/godmode/agentes/module_manager_editor.php @@ -549,7 +549,7 @@ if ($is_function_policies !== ENTERPRISE_NOT_HOOK) { ); db_pandora_audit( - 'Agent management', + AUDIT_LOG_AGENT_MANAGEMENT, 'Re-link module '.$id_agent_module ); } @@ -562,7 +562,10 @@ if ($is_function_policies !== ENTERPRISE_NOT_HOOK) { __('Module will be unlinked in the next application') ); - db_pandora_audit('Agent management', 'Unlink module '.$id_agent_module); + db_pandora_audit( + AUDIT_LOG_AGENT_MANAGEMENT, + 'Unlink module '.$id_agent_module + ); } } @@ -582,7 +585,7 @@ if ($__code_from !== 'policies') { if (!$tag_acl) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access agent manager' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/agentes/pandora_networkmap_empty.editor.php b/pandora_console/godmode/agentes/pandora_networkmap_empty.editor.php index 9616d568a3..6fa81baca7 100644 --- a/pandora_console/godmode/agentes/pandora_networkmap_empty.editor.php +++ b/pandora_console/godmode/agentes/pandora_networkmap_empty.editor.php @@ -73,7 +73,7 @@ if ($edit_networkmap) { if (!$networkmap_write && !$networkmap_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/agentes/planned_downtime.editor.php b/pandora_console/godmode/agentes/planned_downtime.editor.php index 7d73a400c3..7b81e1e16d 100644 --- a/pandora_console/godmode/agentes/planned_downtime.editor.php +++ b/pandora_console/godmode/agentes/planned_downtime.editor.php @@ -38,7 +38,7 @@ $agent_w = check_acl($config['id_user'], 0, 'AW'); $access = ($agent_d == true) ? 'AD' : (($agent_w == true) ? 'AW' : 'AD'); if (!$agent_d && !$agent_w) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access downtime scheduler' ); include 'general/noaccess.php'; @@ -170,7 +170,7 @@ if ($delete_downtime_agent === 1) { || !in_array($downtime_group, $user_groups_ad) ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access downtime scheduler' ); include 'general/noaccess.php'; @@ -189,7 +189,7 @@ if ($delete_downtime_agent === 1) { || !in_array($agent_group, $user_groups_ad) ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access downtime scheduler' ); include 'general/noaccess.php'; @@ -266,7 +266,7 @@ if ($create_downtime || $update_downtime) { // Check AD permission on new downtime. if (!in_array($id_group, $user_groups_ad)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access downtime scheduler' ); include 'general/noaccess.php'; @@ -324,7 +324,7 @@ if ($create_downtime || $update_downtime) { // Check AD permission on OLD downtime. if (empty($old_downtime) || !in_array($old_downtime['id_group'], $user_groups_ad)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access downtime scheduler' ); include 'general/noaccess.php'; @@ -334,7 +334,7 @@ if ($create_downtime || $update_downtime) { // Check AD permission on NEW downtime group. if (!in_array($id_group, $user_groups_ad)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access downtime scheduler' ); include 'general/noaccess.php'; @@ -498,7 +498,7 @@ if ($id_downtime > 0) { // Permission check for the downtime with the AD user groups if (empty($result) || !in_array($result['id_group'], $user_groups_ad)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access downtime scheduler' ); include 'general/noaccess.php'; @@ -1093,7 +1093,7 @@ function insert_downtime_agent($id_downtime, $user_groups_ad) || !in_array($downtime_group, $user_groups_ad) ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access downtime scheduler' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/agentes/planned_downtime.export_csv.php b/pandora_console/godmode/agentes/planned_downtime.export_csv.php index 7e0aff8a34..d61df4e8c3 100644 --- a/pandora_console/godmode/agentes/planned_downtime.export_csv.php +++ b/pandora_console/godmode/agentes/planned_downtime.export_csv.php @@ -23,7 +23,10 @@ require_once '../../include/functions_reporting.php'; $config['id_user'] = $_SESSION['id_usuario']; if (! check_acl($config['id_user'], 0, 'AR')) { - db_pandora_audit('ACL Violation', 'Trying to access downtime scheduler'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access downtime scheduler' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/agentes/planned_downtime.list.php b/pandora_console/godmode/agentes/planned_downtime.list.php index cdd8bae876..fadea37460 100755 --- a/pandora_console/godmode/agentes/planned_downtime.list.php +++ b/pandora_console/godmode/agentes/planned_downtime.list.php @@ -23,7 +23,7 @@ $access = ($read_permisson == true) ? 'AR' : (($write_permisson == true) ? 'AD' if (! $read_permisson && !$manage_permisson) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access downtime scheduler' ); include 'general/noaccess.php'; @@ -70,7 +70,7 @@ if ($stop_downtime) { // Check AD permission on the downtime if (empty($downtime) || (! check_acl($config['id_user'], $downtime['id_group'], 'AD') && ! check_acl($config['id_user'], $downtime['id_group'], 'AW'))) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access downtime scheduler' ); include 'general/noaccess.php'; @@ -94,7 +94,7 @@ if ($delete_downtime) { // Check AD permission on the downtime if (empty($downtime) || (! check_acl($config['id_user'], $downtime['id_group'], 'AD') && ! check_acl($config['id_user'], $downtime['id_group'], 'AW'))) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access downtime scheduler' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/agentes/status_monitor_custom_fields.php b/pandora_console/godmode/agentes/status_monitor_custom_fields.php index 2b4b3d0538..d9960c7547 100644 --- a/pandora_console/godmode/agentes/status_monitor_custom_fields.php +++ b/pandora_console/godmode/agentes/status_monitor_custom_fields.php @@ -20,7 +20,7 @@ if (! check_acl($config['id_user'], 0, 'AR') && ! check_acl($config['id_user'], 0, 'AM') ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/alerts/alert_actions.php b/pandora_console/godmode/alerts/alert_actions.php index de9d6e126d..873d91598c 100644 --- a/pandora_console/godmode/alerts/alert_actions.php +++ b/pandora_console/godmode/alerts/alert_actions.php @@ -42,7 +42,7 @@ enterprise_hook('open_meta_frame'); if (! check_acl($config['id_user'], 0, 'LM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert actions' ); include 'general/noaccess.php'; @@ -104,7 +104,7 @@ if ($copy_action) { // Then action group have to be in his own groups. if (!$is_in_group) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); include 'general/noaccess.php'; @@ -115,17 +115,14 @@ if ($copy_action) { $result = alerts_clone_alert_action($id, $al_action['id_group']); - if ($result) { - db_pandora_audit( - 'Command management', - 'Duplicate alert action '.$id.' clone to '.$result - ); - } else { - db_pandora_audit( - 'Command management', - 'Fail try to duplicate alert action '.$id - ); - } + $auditMessage = ((bool) $result === true) + ? sprintf('Duplicate alert action %s clone to %s', $id, $result) + : sprintf('Fail try to duplicate alert action %s', $id); + + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + $auditMessage + ); ui_print_result_message( $result, @@ -145,7 +142,7 @@ if ($delete_action) { if (!check_acl_restricted_all($config['id_user'], $al_action['id_group'], 'LM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); include 'general/noaccess.php'; @@ -158,7 +155,7 @@ if ($delete_action) { // Then must have "PM" access privileges. if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); include 'general/noaccess.php'; @@ -182,7 +179,7 @@ if ($delete_action) { // Then action group have to be in his own groups. if (!$is_in_group) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); include 'general/noaccess.php'; @@ -194,17 +191,14 @@ if ($delete_action) { $result = alerts_delete_alert_action($id); - if ($result) { - db_pandora_audit( - 'Command management', - 'Delete alert action #'.$id - ); - } else { - db_pandora_audit( - 'Command management', - 'Fail try to delete alert action #'.$id - ); - } + $auditMessage = ((bool) $result === true) + ? sprintf('Delete alert action #%s', $id) + : sprintf('Fail try to delete alert action #%s', $id); + + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + $auditMessage + ); ui_print_result_message( $result, diff --git a/pandora_console/godmode/alerts/alert_commands.php b/pandora_console/godmode/alerts/alert_commands.php index a480f86651..a10e32aeff 100644 --- a/pandora_console/godmode/alerts/alert_commands.php +++ b/pandora_console/godmode/alerts/alert_commands.php @@ -21,7 +21,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'LM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); include 'general/noaccess.php'; @@ -538,9 +538,20 @@ if ($create_command) { } if ($result) { - db_pandora_audit('Command management', 'Create alert command #'.$result, false, false, $info); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Create alert command #'.$result, + false, + false, + $info + ); } else { - db_pandora_audit('Command management', 'Fail try to create alert command', false, false); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Fail try to create alert command', + false, + false + ); } // Show errors. @@ -570,7 +581,7 @@ if ($delete_command) { // Internal commands cannot be deleted. if (alerts_get_alert_command_internal($id)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); include 'general/noaccess.php'; @@ -579,11 +590,14 @@ if ($delete_command) { $result = alerts_delete_alert_command($id); - if ($result) { - db_pandora_audit('Command management', 'Delete alert command #'.$id); - } else { - db_pandora_audit('Command management', 'Fail try to delete alert command #'.$id); - } + $auditMessage = ((bool) $result === true) + ? sprintf('Delete alert command #%s', $id) + : sprintf('Fail try to delete alert command #%s', $id); + + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + $auditMessage + ); ui_print_result_message( $result, diff --git a/pandora_console/godmode/alerts/alert_list.builder.php b/pandora_console/godmode/alerts/alert_list.builder.php index f6a60fffae..8da2925473 100644 --- a/pandora_console/godmode/alerts/alert_list.builder.php +++ b/pandora_console/godmode/alerts/alert_list.builder.php @@ -18,7 +18,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'LW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/alerts/alert_list.list.php b/pandora_console/godmode/alerts/alert_list.list.php index 95ace7d345..a721612eed 100644 --- a/pandora_console/godmode/alerts/alert_list.list.php +++ b/pandora_console/godmode/alerts/alert_list.list.php @@ -22,7 +22,7 @@ if (! check_acl($config['id_user'], 0, 'LW') && ! check_acl($config['id_user'], 0, 'LM') ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/alerts/alert_list.php b/pandora_console/godmode/alerts/alert_list.php index 14d9bf10d4..15c55050da 100644 --- a/pandora_console/godmode/alerts/alert_list.php +++ b/pandora_console/godmode/alerts/alert_list.php @@ -21,7 +21,7 @@ if (! check_acl($config['id_user'], 0, 'LW') && ! check_acl($config['id_user'], 0, 'LM') ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); include 'general/noaccess.php'; @@ -146,7 +146,7 @@ if ($create_alert) { $unsafe_agent_alias = io_safe_output($agent_alias); if ($id) { db_pandora_audit( - 'Alert management', + AUDIT_LOG_ALERT_MANAGEMENT, "Added alert '$unsafe_alert_template_name' for module '$unsafe_module_name' in agent '$unsafe_agent_alias'", false, false, @@ -154,7 +154,7 @@ if ($create_alert) { ); } else { db_pandora_audit( - 'Alert management', + AUDIT_LOG_ALERT_MANAGEMENT, "Fail Added alert '$unsafe_alert_template_name' for module '$unsafe_module_name' in agent '$unsafe_agent_alias'" ); } @@ -217,12 +217,12 @@ if ($delete_alert) { if ($result) { db_pandora_audit( - 'Alert management', + AUDIT_LOG_ALERT_MANAGEMENT, "Deleted alert '$unsafe_alert_template_name' for module '$unsafe_module_name' in agent '$unsafe_agent_alias'" ); } else { db_pandora_audit( - 'Alert management', + AUDIT_LOG_ALERT_MANAGEMENT, "Fail to deleted alert '$unsafe_alert_template_name' for module '$unsafe_module_name' in agent '$unsafe_agent_alias'" ); } @@ -255,9 +255,15 @@ if ($add_action) { $result = alerts_add_alert_agent_module_action($id_alert_module, $id_action, $values); if ($result) { - db_pandora_audit('Alert management', 'Add action '.$id_action.' in alert '.$id_alert_module); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Add action '.$id_action.' in alert '.$id_alert_module + ); } else { - db_pandora_audit('Alert management', 'Fail to add action '.$id_action.' in alert '.$id_alert_module); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Fail to add action '.$id_action.' in alert '.$id_alert_module + ); } $messageAction = ui_print_result_message( @@ -290,9 +296,15 @@ if ($update_action) { $result = alerts_update_alert_agent_module_action($id_module_action, $values); if ($result) { - db_pandora_audit('Alert management', 'Update action '.$id_action.' in alert '.$id_alert_module); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Update action '.$id_action.' in alert '.$id_alert_module + ); } else { - db_pandora_audit('Alert management', 'Fail to updated action '.$id_action.' in alert '.$id_alert_module); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Fail to updated action '.$id_action.' in alert '.$id_alert_module + ); } $messageAction = ui_print_result_message( @@ -311,9 +323,15 @@ if ($delete_action) { $result = alerts_delete_alert_agent_module_action($id_action); if ($result) { - db_pandora_audit('Alert management', 'Delete action '.$id_action.' in alert '.$id_alert); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Delete action '.$id_action.' in alert '.$id_alert + ); } else { - db_pandora_audit('Alert management', 'Fail to delete action '.$id_action.' in alert '.$id_alert); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Fail to delete action '.$id_action.' in alert '.$id_alert + ); } $messageAction = ui_print_result_message( @@ -332,9 +350,15 @@ if ($enable_alert) { $result = alerts_agent_module_disable($id_alert, false); if ($result) { - db_pandora_audit('Alert management', 'Enable '.$id_alert); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Enable '.$id_alert + ); } else { - db_pandora_audit('Alert management', 'Fail to enable '.$id_alert); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Fail to enable '.$id_alert + ); } $messageAction = ui_print_result_message( @@ -353,9 +377,15 @@ if ($disable_alert) { $result = alerts_agent_module_disable($id_alert, true); if ($result) { - db_pandora_audit('Alert management', 'Disable '.$id_alert); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Disable '.$id_alert + ); } else { - db_pandora_audit('Alert management', 'Fail to disable '.$id_alert); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Fail to disable '.$id_alert + ); } $messageAction = ui_print_result_message( @@ -374,9 +404,15 @@ if ($standbyon_alert) { $result = alerts_agent_module_standby($id_alert, true); if ($result) { - db_pandora_audit('Alert management', 'Standby '.$id_alert); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Standby '.$id_alert + ); } else { - db_pandora_audit('Alert management', 'Fail to standby '.$id_alert); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Fail to standby '.$id_alert + ); } $messageAction = ui_print_result_message( @@ -395,9 +431,15 @@ if ($standbyoff_alert) { $result = alerts_agent_module_standby($id_alert, false); if ($result) { - db_pandora_audit('Alert management', 'Standbyoff '.$id_alert); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Standbyoff '.$id_alert + ); } else { - db_pandora_audit('Alert management', 'Fail to standbyoff '.$id_alert); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Fail to standbyoff '.$id_alert + ); } $messageAction = ui_print_result_message( diff --git a/pandora_console/godmode/alerts/alert_templates.php b/pandora_console/godmode/alerts/alert_templates.php index 3f6d8625b5..4833ef8b55 100644 --- a/pandora_console/godmode/alerts/alert_templates.php +++ b/pandora_console/godmode/alerts/alert_templates.php @@ -108,7 +108,7 @@ if (is_ajax()) { if (! check_acl($config['id_user'], 0, 'LM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); include 'general/noaccess.php'; @@ -118,12 +118,7 @@ if (! check_acl($config['id_user'], 0, 'LM')) { $update_template = (bool) get_parameter('update_template'); $delete_template = (bool) get_parameter('delete_template'); $pure = get_parameter('pure', 0); - -if (defined('METACONSOLE')) { - $sec = 'advanced'; -} else { - $sec = 'galertas'; -} +$sec = (is_metaconsole() === true) ? 'advanced' : 'galertas'; // This prevents to duplicate the header in // case delete_templete action is performed. @@ -175,7 +170,7 @@ if ($delete_template) { if ($al_template['id_group'] == 0) { if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); include 'general/noaccess.php'; @@ -217,7 +212,7 @@ if ($delete_template) { } } else { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); include 'general/noaccess.php'; @@ -242,12 +237,12 @@ if ($delete_template) { if ($result) { db_pandora_audit( - 'Template alert management', + AUDIT_LOG_ALERT_MANAGEMENT, 'Delete alert template #'.$id ); } else { db_pandora_audit( - 'Template alert management', + AUDIT_LOG_ALERT_MANAGEMENT, 'Fail try to delete alert template #'.$id ); } diff --git a/pandora_console/godmode/alerts/alert_view.php b/pandora_console/godmode/alerts/alert_view.php index cdc4cb39f1..55fb09e58d 100644 --- a/pandora_console/godmode/alerts/alert_view.php +++ b/pandora_console/godmode/alerts/alert_view.php @@ -33,7 +33,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'LM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert View (In management section)' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/alerts/configure_alert_action.php b/pandora_console/godmode/alerts/configure_alert_action.php index c8efca1f00..8b276d7233 100644 --- a/pandora_console/godmode/alerts/configure_alert_action.php +++ b/pandora_console/godmode/alerts/configure_alert_action.php @@ -23,7 +23,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'LM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); include 'general/noaccess.php'; @@ -96,7 +96,10 @@ if ($al_action !== false) { } if (!$is_in_group && $al_action['id_group'] != 0) { - db_pandora_audit('ACL Violation', 'Trying to access unauthorized alert action configuration'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access unauthorized alert action configuration' + ); include 'general/noaccess.php'; exit; } diff --git a/pandora_console/godmode/alerts/configure_alert_command.php b/pandora_console/godmode/alerts/configure_alert_command.php index a84aaf5467..7b300aa2d9 100644 --- a/pandora_console/godmode/alerts/configure_alert_command.php +++ b/pandora_console/godmode/alerts/configure_alert_command.php @@ -1,17 +1,34 @@ 0) { $alert = alerts_get_alert_command($id); if ($alert['internal'] || !check_acl_restricted_all($config['id_user'], $alert['id_group'], 'PM')) { - db_pandora_audit('ACL Violation', 'Trying to access Alert Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Alert Management' + ); include 'general/noaccess.php'; exit; } @@ -87,17 +107,17 @@ if ($update_command) { $values['description'] = $description; $values['id_group'] = $id_group; // Only for Metaconsole. Save the previous name for synchronizing. - if (is_metaconsole()) { + if (is_metaconsole() === true) { $values['previous_name'] = db_get_value('name', 'talert_commands', 'id', $id); } // Check it the new name is used in the other command. $id_check = db_get_value('id', 'talert_commands', 'name', $name); if (($id_check != $id) && (!empty($id_check))) { - $result = ''; + $result = false; } else { - $result = alerts_update_alert_command($id, $values); - if ($result) { + $result = (bool) alerts_update_alert_command($id, $values); + if ($result === true) { $info = '{"Name":"'.$name.'","Command":"'.$command.'","Description":"'.$description.' '.$info_fields.'"}'; $alert['fields_values'] = io_json_mb_encode($fields_values); $alert['fields_descriptions'] = io_json_mb_encode($fields_descriptions); @@ -109,11 +129,15 @@ if ($update_command) { } } - if ($result) { - db_pandora_audit('Command management', 'Update alert command #'.$id, false, false, $info); - } else { - db_pandora_audit('Command management', 'Fail to update alert command #'.$id, false, false); - } + $auditMessage = ((bool) $result === true) ? 'Update alert command' : 'Fail to update alert command'; + + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + sprintf('%s #%s', $auditMessage, $id), + false, + false, + $info + ); ui_print_result_message( $result, @@ -130,7 +154,7 @@ $fields_descriptions = ''; $fields_values = ''; $id_group = 0; if ($id) { - if (!$result) { + if ($result === false) { $alert = alerts_get_alert_command($id); } diff --git a/pandora_console/godmode/alerts/configure_alert_template.php b/pandora_console/godmode/alerts/configure_alert_template.php index 61c01cc1f3..d7333cbeeb 100644 --- a/pandora_console/godmode/alerts/configure_alert_template.php +++ b/pandora_console/godmode/alerts/configure_alert_template.php @@ -43,7 +43,7 @@ if (is_metaconsole() === true) { if (! check_acl($config['id_user'], 0, 'LM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); include 'general/noaccess.php'; @@ -172,7 +172,7 @@ if ($a_template !== false) { } } else { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); include 'general/noaccess.php'; @@ -218,9 +218,15 @@ if ($duplicate_template) { $id = alerts_duplicate_alert_template($source_id, $a_template['id_group']); if ($id) { - db_pandora_audit('Template alert management', 'Duplicate alert template '.$source_id.' clone to '.$id); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Duplicate alert template '.$source_id.' clone to '.$id + ); } else { - db_pandora_audit('Template alert management', 'Fail try to duplicate alert template '.$source_id); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Fail try to duplicate alert template '.$source_id + ); } ui_print_result_message( @@ -420,7 +426,7 @@ function update_template($step) if ($result) { db_pandora_audit( - 'Template alert management', + AUDIT_LOG_ALERT_MANAGEMENT, 'Update alert template #'.$id, false, false, @@ -428,7 +434,7 @@ function update_template($step) ); } else { db_pandora_audit( - 'Template alert management', + AUDIT_LOG_ALERT_MANAGEMENT, 'Fail try to update alert template #'.$id, false, false, @@ -544,7 +550,7 @@ if ($create_template) { if ($result) { db_pandora_audit( - 'Template alert management', + AUDIT_LOG_ALERT_MANAGEMENT, 'Create alert template #'.$result, false, false, @@ -552,7 +558,7 @@ if ($create_template) { ); } else { db_pandora_audit( - 'Template alert management', + AUDIT_LOG_ALERT_MANAGEMENT, 'Fail try to create alert template', false, false, diff --git a/pandora_console/godmode/audit_log_csv.php b/pandora_console/godmode/audit_log_csv.php index 2d91feca9c..7c03d632df 100644 --- a/pandora_console/godmode/audit_log_csv.php +++ b/pandora_console/godmode/audit_log_csv.php @@ -32,7 +32,10 @@ if (!isset($_SESSION['id_usuario'])) { check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { - db_pandora_audit('ACL Violation', 'Trying to access audit CSV export'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access audit CSV export' + ); include 'general/noaccess.php'; exit; } diff --git a/pandora_console/godmode/category/category.php b/pandora_console/godmode/category/category.php index 39683df3ae..a25bd4a263 100755 --- a/pandora_console/godmode/category/category.php +++ b/pandora_console/godmode/category/category.php @@ -35,7 +35,10 @@ check_login(); enterprise_hook('open_meta_frame'); if (!check_acl($config['id_user'], 0, 'PM') && !is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Categories Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Categories Management' + ); include 'general/noaccess.php'; return; } @@ -113,10 +116,16 @@ if (is_management_allowed() === false) { if ($is_management_allowed === true && $delete != 0) { $return_delete = categories_delete_category($delete); if (!$return_delete) { - db_pandora_audit('Category management', 'Fail try to delete category #'.$delete); + db_pandora_audit( + AUDIT_LOG_CATEGORY_MANAGEMENT, + 'Fail try to delete category #'.$delete + ); ui_print_error_message(__('Error deleting category')); } else { - db_pandora_audit('Category management', 'Delete category #'.$delete); + db_pandora_audit( + AUDIT_LOG_CATEGORY_MANAGEMENT, + 'Delete category #'.$delete + ); ui_print_success_message(__('Successfully deleted category')); } } diff --git a/pandora_console/godmode/category/edit_category.php b/pandora_console/godmode/category/edit_category.php index 6278fb6dae..3cd20c0325 100755 --- a/pandora_console/godmode/category/edit_category.php +++ b/pandora_console/godmode/category/edit_category.php @@ -19,7 +19,10 @@ enterprise_hook('open_meta_frame'); require_once $config['homedir'].'/include/functions_categories.php'; if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Edit Category'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Edit Category' + ); include 'general/noaccess.php'; return; @@ -85,34 +88,46 @@ if ($update_category && $id_category != 0) { } if ($result === false) { - db_pandora_audit('Category management', "Fail try to update category #$id_category"); + db_pandora_audit( + AUDIT_LOG_CATEGORY_MANAGEMENT, + 'Fail try to update category #'.$id_category + ); ui_print_error_message(__('Error updating category')); } else { - db_pandora_audit('Category management', "Update category #$id_category"); + db_pandora_audit( + AUDIT_LOG_CATEGORY_MANAGEMENT, + 'Update category #'.$id_category + ); ui_print_success_message(__('Successfully updated category')); } } -// Create category: creates a new category +// Create category: creates a new category. if ($create_category) { $return_create = true; $values = []; $values['name'] = $name_category; - // DB insert + // DB insert. $return_create = false; if ($values['name'] != '') { $return_create = db_process_sql_insert('tcategory', $values); } if ($return_create === false) { - db_pandora_audit('Category management', 'Fail try to create category'); + db_pandora_audit( + AUDIT_LOG_CATEGORY_MANAGEMENT, + 'Fail try to create category' + ); ui_print_error_message(__('Error creating category')); $action = 'new'; - // If create action ends successfully then current action is update + // If create action ends successfully then current action is update. } else { - db_pandora_audit('Category management', "Create category #$return_create"); + db_pandora_audit( + AUDIT_LOG_CATEGORY_MANAGEMENT, + 'Create category #'.$return_create + ); ui_print_success_message(__('Successfully created category')); $id_category = $return_create; $action = 'update'; @@ -120,7 +135,7 @@ if ($create_category) { } // Form fields are filled here -// Get results when update action is performed +// Get results when update action is performed. if ($action == 'update' && $id_category != 0) { $result_category = db_get_row_filter('tcategory', ['id' => $id_category]); $name_category = $result_category['name']; diff --git a/pandora_console/godmode/db/db_main.php b/pandora_console/godmode/db/db_main.php index a25d09ec04..79a6c9eba7 100644 --- a/pandora_console/godmode/db/db_main.php +++ b/pandora_console/godmode/db/db_main.php @@ -18,7 +18,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'DM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Database Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/events/custom_events.php b/pandora_console/godmode/events/custom_events.php index a492b0522f..a53657ffce 100644 --- a/pandora_console/godmode/events/custom_events.php +++ b/pandora_console/godmode/events/custom_events.php @@ -17,7 +17,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Custom events Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/events/event_edit_filter.php b/pandora_console/godmode/events/event_edit_filter.php index 43f2162719..b52242f166 100644 --- a/pandora_console/godmode/events/event_edit_filter.php +++ b/pandora_console/godmode/events/event_edit_filter.php @@ -21,7 +21,7 @@ $access = ($event_w == true) ? 'EW' : (($event_m == true) ? 'EM' : 'EW'); if (!$event_w && !$event_m) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access events filter editor' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/events/event_filter.php b/pandora_console/godmode/events/event_filter.php index 07e87284ee..5ddc469034 100644 --- a/pandora_console/godmode/events/event_filter.php +++ b/pandora_console/godmode/events/event_filter.php @@ -22,7 +22,7 @@ $access = ($event_w == true) ? 'EW' : (($event_m == true) ? 'EM' : 'EW'); if (!$event_w && !$event_m) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access events filter editor' ); include 'general/noaccess.php'; @@ -43,7 +43,7 @@ if ($delete) { && !check_acl_restricted_all($config['id_user'], $filter_group, 'EM') ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access events filter editor' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/events/event_responses.editor.php b/pandora_console/godmode/events/event_responses.editor.php index 81bf8a5766..0521af7c99 100644 --- a/pandora_console/godmode/events/event_responses.editor.php +++ b/pandora_console/godmode/events/event_responses.editor.php @@ -17,7 +17,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Group Management' ); include 'general/noaccess.php'; @@ -43,7 +43,7 @@ if ($event_response_id > 0) { // ACL check for event response edition. if (!check_acl_restricted_all($config['id_user'], $event_response['id_group'], 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Group Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/events/event_responses.list.php b/pandora_console/godmode/events/event_responses.list.php index ef0785c978..550ac994e9 100644 --- a/pandora_console/godmode/events/event_responses.list.php +++ b/pandora_console/godmode/events/event_responses.list.php @@ -19,7 +19,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Group Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/events/event_responses.php b/pandora_console/godmode/events/event_responses.php index 0e08e67af4..f8e6963d1a 100644 --- a/pandora_console/godmode/events/event_responses.php +++ b/pandora_console/godmode/events/event_responses.php @@ -19,7 +19,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Group Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/events/events.php b/pandora_console/godmode/events/events.php index f32c07ec43..59d7810454 100644 --- a/pandora_console/godmode/events/events.php +++ b/pandora_console/godmode/events/events.php @@ -20,7 +20,7 @@ enterprise_hook('open_meta_frame'); if (!check_acl($config['id_user'], 0, 'EW') && !check_acl($config['id_user'], 0, 'EM') && ! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access event manage' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/extensions.php b/pandora_console/godmode/extensions.php index 6e036827aa..faea92b358 100644 --- a/pandora_console/godmode/extensions.php +++ b/pandora_console/godmode/extensions.php @@ -17,7 +17,7 @@ global $config; if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access extensions list' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/gis_maps/configure_gis_map.php b/pandora_console/godmode/gis_maps/configure_gis_map.php index 5a5cac0f9b..52bde7ac2c 100644 --- a/pandora_console/godmode/gis_maps/configure_gis_map.php +++ b/pandora_console/godmode/gis_maps/configure_gis_map.php @@ -20,7 +20,10 @@ $gis_m = check_acl($config['id_user'], 0, 'MM'); $access = ($gis_w == true) ? 'MW' : (($gis_m == true) ? 'MM' : 'MW'); if (!$gis_w && !$gis_m) { - db_pandora_audit('ACL Violation', 'Trying to access map builder'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access map builder' + ); include 'general/noaccess.php'; return; } @@ -33,7 +36,10 @@ $action = get_parameter('action', 'new_map'); $gis_map_group = db_get_value('group_id', 'tgis_map', 'id_tgis_map', $idMap); if ($idMap > 0 && !check_acl_restricted_all($config['id_user'], $gis_map_group, 'MW') && !check_acl_restricted_all($config['id_user'], $gis_map_group, 'MW')) { - db_pandora_audit('ACL Violation', 'Trying to access map builder'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access map builder' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/groups/configure_group.php b/pandora_console/godmode/groups/configure_group.php index 4e34a89331..2077dce6ed 100644 --- a/pandora_console/godmode/groups/configure_group.php +++ b/pandora_console/godmode/groups/configure_group.php @@ -34,7 +34,10 @@ check_login(); enterprise_hook('open_meta_frame'); if (! check_acl($config['id_user'], 0, 'AW')) { - db_pandora_audit('ACL Violation', 'Trying to access Group Management2'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Group Management2' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/groups/configure_modu_group.php b/pandora_console/godmode/groups/configure_modu_group.php index 95beb0d39d..0ea11d117f 100644 --- a/pandora_console/godmode/groups/configure_modu_group.php +++ b/pandora_console/godmode/groups/configure_modu_group.php @@ -18,7 +18,10 @@ check_login(); enterprise_hook('open_meta_frame'); if (! check_acl($config['id_user'], 0, 'PM')) { - db_pandora_audit('ACL Violation', 'Trying to access Group Management2'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Group Management2' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/groups/group_list.php b/pandora_console/godmode/groups/group_list.php index 685076f5b2..990b0bac77 100644 --- a/pandora_console/godmode/groups/group_list.php +++ b/pandora_console/godmode/groups/group_list.php @@ -47,7 +47,10 @@ if (is_metaconsole() === true) { if (is_ajax() === true) { if ((bool) check_acl($config['id_user'], 0, 'AR') === false) { - db_pandora_audit('ACL Violation', 'Trying to access Group Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Group Management' + ); include 'general/noaccess.php'; return; } @@ -74,7 +77,7 @@ if (is_ajax() === true) { if ((bool) check_acl($config['id_user'], $id_group, 'AR') === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); echo json_encode(false); @@ -117,7 +120,7 @@ if (is_ajax() === true) { if ((bool) check_acl($config['id_user'], $id_group, 'AR') === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); echo json_encode(false); @@ -275,7 +278,7 @@ if ($tab !== 'credbox' && (bool) check_acl($config['id_user'], 0, 'AW') === false ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Group Management' ); include 'general/noaccess.php'; @@ -285,7 +288,7 @@ if ($tab !== 'credbox' && (bool) check_acl($config['id_user'], 0, 'PM') === false ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Credential Store' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/groups/modu_group_list.php b/pandora_console/godmode/groups/modu_group_list.php index 24818de618..84dc35ada8 100644 --- a/pandora_console/godmode/groups/modu_group_list.php +++ b/pandora_console/godmode/groups/modu_group_list.php @@ -32,7 +32,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Group Management' ); include 'general/noaccess.php'; @@ -48,7 +48,7 @@ if (is_ajax() === true) { if (! check_acl($config['id_user'], $id_group, 'AR')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); echo json_encode(false); diff --git a/pandora_console/godmode/massive/massive_add_action_alerts.php b/pandora_console/godmode/massive/massive_add_action_alerts.php index f9a02c8545..178f3c830a 100755 --- a/pandora_console/godmode/massive/massive_add_action_alerts.php +++ b/pandora_console/godmode/massive/massive_add_action_alerts.php @@ -31,7 +31,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access massive agent deletion section' ); include 'general/noaccess.php'; @@ -150,7 +150,13 @@ if ($add) { 'Fires_max' => $fires_max, 'Actions' => implode(',', $actions), ]; - db_pandora_audit('Massive management', 'Add alert action '.json_encode($id_agents), false, false, json_encode($info)); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Add alert action '.json_encode($id_agents), + false, + false, + json_encode($info) + ); ui_print_result_message($results, __('Successfully added'), __('Could not be added')); } } else { diff --git a/pandora_console/godmode/massive/massive_add_alerts.php b/pandora_console/godmode/massive/massive_add_alerts.php index ad81def654..92027c3529 100755 --- a/pandora_console/godmode/massive/massive_add_alerts.php +++ b/pandora_console/godmode/massive/massive_add_alerts.php @@ -31,7 +31,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access massive alert deletion' ); include 'general/noaccess.php'; @@ -139,16 +139,28 @@ function process_manage_add($id_alert_template, $id_agents, $module_names) $success = alerts_create_alert_agent_module($module, $id_alert_template); if ($success) { - $contsuccess ++; + $contsuccess++; } - $conttotal ++; + $conttotal++; } if ($contsuccess > 0) { - db_pandora_audit('Massive management', 'Add alert', false, false, 'Alert template: '.$id_alert_template.' Modules: '.json_encode($modules_id)); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Add alert', + false, + false, + 'Alert template: '.$id_alert_template.' Modules: '.json_encode($modules_id) + ); } else { - db_pandora_audit('Massive management', 'Fail try to add alert', false, false, 'Alert template: '.$id_alert_template.' Modules: '.json_encode($modules_id)); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Fail try to add alert', + false, + false, + 'Alert template: '.$id_alert_template.' Modules: '.json_encode($modules_id) + ); } ui_print_result_message( diff --git a/pandora_console/godmode/massive/massive_add_profiles.php b/pandora_console/godmode/massive/massive_add_profiles.php index 71a0b6777a..4a3be0b304 100644 --- a/pandora_console/godmode/massive/massive_add_profiles.php +++ b/pandora_console/godmode/massive/massive_add_profiles.php @@ -31,7 +31,7 @@ check_login(); if (!check_acl($config['id_user'], 0, 'UM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access massive profile addition' ); include 'general/noaccess.php'; @@ -80,7 +80,7 @@ if ($create_profiles) { // If the profile doesnt exist, we create it if ($profile_data === false) { db_pandora_audit( - 'User management', + AUDIT_LOG_USER_MANAGEMENT, 'Added profile for user '.io_safe_input($user) ); $return = profile_create_user_profile($user, $profile, $group); @@ -95,7 +95,7 @@ if ($create_profiles) { if ($n_added > 0) { db_pandora_audit( - 'Massive management', + AUDIT_LOG_MASSIVE_MANAGEMENT, 'Add profiles', false, false, @@ -103,7 +103,7 @@ if ($create_profiles) { ); } else { db_pandora_audit( - 'Massive management', + AUDIT_LOG_MASSIVE_MANAGEMENT, 'Fail to try add profiles', false, false, diff --git a/pandora_console/godmode/massive/massive_copy_modules.php b/pandora_console/godmode/massive/massive_copy_modules.php index 5abe5a2d26..b6c9f3a420 100755 --- a/pandora_console/godmode/massive/massive_copy_modules.php +++ b/pandora_console/godmode/massive/massive_copy_modules.php @@ -31,7 +31,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent Config Management Admin section' ); include 'general/noaccess.php'; @@ -66,7 +66,7 @@ if ($do_operation) { ]; if ($result) { db_pandora_audit( - 'Massive management', + AUDIT_LOG_MASSIVE_MANAGEMENT, 'Copy modules', false, false, @@ -74,7 +74,7 @@ if ($do_operation) { ); } else { db_pandora_audit( - 'Massive management', + AUDIT_LOG_MASSIVE_MANAGEMENT, 'Fail to try copy modules', false, false, diff --git a/pandora_console/godmode/massive/massive_delete_action_alerts.php b/pandora_console/godmode/massive/massive_delete_action_alerts.php index 9ce405d64d..cc6f9e4c90 100644 --- a/pandora_console/godmode/massive/massive_delete_action_alerts.php +++ b/pandora_console/godmode/massive/massive_delete_action_alerts.php @@ -31,7 +31,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access massive agent deletion section' ); include 'general/noaccess.php'; @@ -148,9 +148,21 @@ if ($delete) { ]; if ($results) { - db_pandora_audit('Massive management', 'Delete alert action', false, false, json_encode($info)); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Delete alert action', + false, + false, + json_encode($info) + ); } else { - db_pandora_audit('Massive management', 'Fail try to delete alert action', false, false, json_encode($info)); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Fail try to delete alert action', + false, + false, + json_encode($info) + ); } ui_print_result_message( diff --git a/pandora_console/godmode/massive/massive_delete_agents.php b/pandora_console/godmode/massive/massive_delete_agents.php index 2808df1d8c..e85a12486d 100755 --- a/pandora_console/godmode/massive/massive_delete_agents.php +++ b/pandora_console/godmode/massive/massive_delete_agents.php @@ -34,7 +34,7 @@ check_login(); if ((bool) check_acl($config['id_user'], 0, 'AW') === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access massive agent deletion section' ); include 'general/noaccess.php'; @@ -149,9 +149,10 @@ if ($delete === true) { $result = process_manage_delete($id_agents); $info = '{"Agent":"'.implode(',', $id_agents).'"}'; + if ($result === true) { db_pandora_audit( - 'Massive management', + AUDIT_LOG_MASSIVE_MANAGEMENT, 'Delete agent ', false, false, @@ -159,7 +160,7 @@ if ($delete === true) { ); } else { db_pandora_audit( - 'Massive management', + AUDIT_LOG_MASSIVE_MANAGEMENT, 'Fail try to delete agent', false, false, diff --git a/pandora_console/godmode/massive/massive_delete_alerts.php b/pandora_console/godmode/massive/massive_delete_alerts.php index 2256405eb7..39028789de 100755 --- a/pandora_console/godmode/massive/massive_delete_alerts.php +++ b/pandora_console/godmode/massive/massive_delete_alerts.php @@ -31,7 +31,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access massive alert deletion' ); include 'general/noaccess.php'; @@ -190,10 +190,10 @@ function process_manage_delete($id_alert_template, $id_agents, $module_names) ); if ($success) { - $contsuccess ++; + $contsuccess++; } - $conttotal ++; + $conttotal++; } ui_print_result_message( @@ -223,9 +223,21 @@ if ($delete) { ]; if ($result) { - db_pandora_audit('Massive management', 'Delete alert ', false, false, json_encode($info)); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Delete alert ', + false, + false, + json_encode($info) + ); } else { - db_pandora_audit('Massive management', 'Fail try to delete alert', false, false, json_encode($info)); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Fail try to delete alert', + false, + false, + json_encode($info) + ); } } diff --git a/pandora_console/godmode/massive/massive_delete_modules.php b/pandora_console/godmode/massive/massive_delete_modules.php index b6a098f07d..f54a127b19 100755 --- a/pandora_console/godmode/massive/massive_delete_modules.php +++ b/pandora_console/godmode/massive/massive_delete_modules.php @@ -31,7 +31,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access agent massive deletion' ); include 'general/noaccess.php'; @@ -230,7 +230,7 @@ if ($delete) { foreach ($module_name as $mod_name) { $result = process_manage_delete($mod_name['nombre'], $id_agent['id_agente'], $modules_selection_mode); - $count ++; + $count++; $success += (int) $result; } } @@ -266,11 +266,16 @@ if ($delete) { 'Agent' => implode(',', $agents_), 'Module' => implode(',', $modules_), ]; - if ($result) { - db_pandora_audit('Massive management', 'Delete module ', false, false, json_encode($info)); - } else { - db_pandora_audit('Massive management', 'Fail try to delete module', false, false, json_encode($info)); - } + + $auditMessage = ((bool) $result === true) ? 'Delete module' : 'Fail try to delete module'; + + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + $auditMessage, + false, + false, + json_encode($info) + ); } $groups = users_get_groups(); diff --git a/pandora_console/godmode/massive/massive_delete_profiles.php b/pandora_console/godmode/massive/massive_delete_profiles.php index bfa490f3cd..3a8611f3c7 100644 --- a/pandora_console/godmode/massive/massive_delete_profiles.php +++ b/pandora_console/godmode/massive/massive_delete_profiles.php @@ -31,7 +31,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'UM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access massive profile deletion' ); include 'general/noaccess.php'; @@ -96,7 +96,7 @@ if ($delete_profiles) { } else { foreach ($users as $user) { db_pandora_audit( - 'User management', + AUDIT_LOG_USER_MANAGEMENT, 'Deleted profile for user '.io_safe_input($user) ); @@ -111,9 +111,21 @@ if ($delete_profiles) { ]; if ($result) { - db_pandora_audit('Massive management', 'Delete profile ', false, false, json_encode($info)); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Delete profile ', + false, + false, + json_encode($info) + ); } else { - db_pandora_audit('Massive management', 'Fail try to delete profile', false, false, json_encode($info)); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Fail try to delete profile', + false, + false, + json_encode($info) + ); } ui_print_result_message( diff --git a/pandora_console/godmode/massive/massive_edit_agents.php b/pandora_console/godmode/massive/massive_edit_agents.php index 6ba5a3c848..d750e684b3 100755 --- a/pandora_console/godmode/massive/massive_edit_agents.php +++ b/pandora_console/godmode/massive/massive_edit_agents.php @@ -31,7 +31,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access massive agent deletion section' ); include 'general/noaccess.php'; @@ -189,9 +189,15 @@ if ($update_agents) { if ($n_deleted > 0) { - db_pandora_audit('Massive management', 'Delete conf file '.$id_agent); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Delete conf file '.$id_agent + ); } else { - db_pandora_audit('Massive management', 'Try to delete conf file '.$id_agent); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Try to delete conf file '.$id_agent + ); } @@ -383,10 +389,22 @@ if ($update_agents) { if ($result !== false) { - db_pandora_audit('Massive management', 'Update agent '.$id_agent, false, false, json_encode($info)); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Update agent '.$id_agent, + false, + false, + json_encode($info) + ); } else { if (isset($id_agent)) { - db_pandora_audit('Massive management', 'Try to update agent '.$id_agent, false, false, json_encode($info)); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Try to update agent '.$id_agent, + false, + false, + json_encode($info) + ); } } diff --git a/pandora_console/godmode/massive/massive_edit_modules.php b/pandora_console/godmode/massive/massive_edit_modules.php index 1045e8efa6..73164c4c2f 100755 --- a/pandora_console/godmode/massive/massive_edit_modules.php +++ b/pandora_console/godmode/massive/massive_edit_modules.php @@ -31,7 +31,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access massive module update' ); include 'general/noaccess.php'; @@ -187,9 +187,21 @@ if ($update) { $info = '{"Modules":"'.implode(',', $modules_).'","Agents":"'.implode(',', $agents_).'"}'; if ($success > 0) { - db_pandora_audit('Massive management', 'Edit module', false, false, $info); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Edit module', + false, + false, + $info + ); } else { - db_pandora_audit('Massive management', 'Fail try to edit module', false, false, $info); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Fail try to edit module', + false, + false, + $info + ); } } diff --git a/pandora_console/godmode/massive/massive_edit_plugins.php b/pandora_console/godmode/massive/massive_edit_plugins.php index bcbed6238d..2e91eafaf8 100644 --- a/pandora_console/godmode/massive/massive_edit_plugins.php +++ b/pandora_console/godmode/massive/massive_edit_plugins.php @@ -14,7 +14,7 @@ * |___| |___._|__|__|_____||_____|__| |___._| |___| |__|_|__|_______| * * ============================================================================ - * Copyright (c) 2005-2021 Artica Soluciones Tecnologicas + * Copyright (c) 2005-2022 Artica Soluciones Tecnologicas * Please see http://pandorafms.org for full contribution list * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License @@ -33,7 +33,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access massive plugin edition section' ); include 'general/noaccess.php'; @@ -45,7 +45,7 @@ $agent_ids = get_parameter('agent_ids', []); $module_ids = get_parameter('module_ids', []); $module_names = get_parameter('module_names', []); -if (is_ajax()) { +if (is_ajax() === true) { $get_plugin = (bool) get_parameter('get_plugin'); $get_agents = (bool) get_parameter('get_agents'); $get_modules = (bool) get_parameter('get_modules'); @@ -54,21 +54,21 @@ if (is_ajax()) { if ($get_plugin) { $plugin = db_get_row('tplugin', 'id', $plugin_id); - if (empty($plugin)) { + if (empty($plugin) === true) { $plugin = []; } - if (isset($plugin['description'])) { + if (isset($plugin['description']) === true) { $plugin['description'] = io_safe_output($plugin['description']); $plugin['description'] = str_replace("\n", '
', $plugin['description']); } - if (isset($plugin['macros'])) { + if (isset($plugin['macros']) === true) { $macros = json_decode($plugin['macros'], true); - if (!empty($macros)) { + if (empty($macros) === false) { $macros = array_values($macros); - if (!empty($macros)) { + if (empty($macros) === false) { $plugin['macros'] = $macros; } } @@ -79,15 +79,15 @@ if (is_ajax()) { } if ($get_agents) { - $sql = "SELECT ta.id_agente, ta.alias AS agent_alias, + $sql = 'SELECT ta.id_agente, ta.alias AS agent_alias, tam.nombre AS module_name FROM tagente ta INNER JOIN tagente_modulo tam ON ta.id_agente = tam.id_agente - AND tam.id_plugin = $plugin_id - ORDER BY ta.alias, tam.nombre"; + AND tam.id_plugin = '.$plugin_id.' + ORDER BY ta.alias, tam.nombre'; $result = db_get_all_rows_sql($sql); - if (empty($result)) { + if (empty($result) === true) { $result = []; } @@ -99,7 +99,7 @@ if (is_ajax()) { $name = io_safe_output($value['agent_alias']); $module_name = $value['module_name']; - if (!empty($current_element) && $current_element['id'] !== $id) { + if (empty($current_element) === false && $current_element['id'] !== $id) { $agents[] = $current_element; $current_element = []; } @@ -107,14 +107,14 @@ if (is_ajax()) { $current_element['id'] = $id; $current_element['name'] = $name; - if (!isset($current_element['module_names'])) { + if (isset($current_element['module_names']) === false) { $current_element['module_names'] = []; } $current_element['module_names'][] = $module_name; } - if (!empty($current_element)) { + if (empty($current_element) === false) { $agents[] = $current_element; } @@ -131,7 +131,7 @@ if (is_ajax()) { ]; $module_plugin_macros = db_get_all_rows_filter('tagente_modulo', $filter, $fields); $module_plugin_macros = io_safe_output($module_plugin_macros); - if (empty($module_plugin_macros)) { + if (empty($module_plugin_macros) === true) { $module_plugin_macros = []; } @@ -139,9 +139,9 @@ if (is_ajax()) { $module_plugin_macros, function ($carry, $item) { $macros = json_decode($item['macros'], true); - if (!empty($macros)) { + if (empty($macros) === false) { $macros = array_values($macros); - if (!empty($macros)) { + if (empty($macros) === false) { $carry[] = $macros; } } @@ -160,28 +160,28 @@ if (is_ajax()) { $update = (bool) get_parameter('update'); -if ($update) { +if ($update === true) { try { $plugin = db_get_row('tplugin', 'id', $plugin_id); - // Macros retrieved from the plugin definition + // Macros retrieved from the plugin definition. $plugin_macros = []; - if (isset($plugin['macros'])) { + if (isset($plugin['macros']) === true) { $plugin_macros = json_decode($plugin['macros'], true); - if (!empty($plugin_macros)) { + if (empty($plugin_macros) === false) { $plugin_macros = array_values($plugin_macros); } } - // Error + // Error. if (empty($plugin_macros)) { throw new Exception(__('Error retrieving the plugin macros')); } - // Macros returned by the form + // Macros returned by the form. $macros = get_parameter('macros', []); - // Error - if (empty($macros)) { + // Error. + if (empty($macros) === true) { throw new Exception(__('Error retrieving the modified macros')); } @@ -199,36 +199,36 @@ if ($update) { $filter, $fields ); - if (empty($module_plugin_macros)) { + if (empty($module_plugin_macros) === true) { $module_plugin_macros = []; } - // Error - if (empty($module_plugin_macros)) { + // Error. + if (empty($module_plugin_macros) === true) { throw new Exception(__('Error retrieving the module plugin macros')); } // Begin transaction - // db_process_sql_begin(); + // db_process_sql_begin();. $errors = 0; $count = 0; foreach ($module_plugin_macros as $item) { $module_id = $item['id_agente_modulo']; $module_macros_str = $item['macros']; - // Macros retrieved from the agent module + // Macros retrieved from the agent module. $module_macros = json_decode($module_macros_str, true); - // Error - if (empty($module_macros)) { + // Error. + if (empty($module_macros) === true) { throw new Exception( __('Error retrieving the module plugin macros data') ); } - // Get the new module plugin macros + // Get the new module plugin macros. $result_macros = array_map( function ($item) use ($macros, $module_macros) { $result = [ @@ -238,7 +238,7 @@ if ($update) { 'hide' => $item['hide'], ]; - // Get the default value os the module plugin macro + // Get the default value os the module plugin macro. $default = array_reduce( $module_macros, function ($carry, $module_macro) use ($result) { @@ -259,41 +259,48 @@ if ($update) { $plugin_macros ); - // Error - if (empty($result_macros)) { + // Error. + if (empty($result_macros) === true) { throw new Exception(__('Error building the new macros')); } $module_macros = io_json_mb_encode($result_macros, JSON_FORCE_OBJECT); - if (empty($module_macros)) { + if (empty($module_macros) === true) { $module_macros = $module_macros_str; } $values = ['macros' => $module_macros]; $where = ['id_agente_modulo' => $module_id]; - // $result = db_process_sql_update('tagente_modulo', $values, $where, 'AND', false); $result = db_process_sql_update('tagente_modulo', $values, $where); - if (!$result) { + if ((bool) $result === false) { $errors++; } else { $count += $result; } } - // if (!$errors) { - // db_process_sql_commit(); - // } - // else { - // db_process_sql_rollback(); - // } - // Result message + // Result message. + $auditMessage = sprintf( + 'Plugin #%s modules updated', + $plugin_id + ); ui_print_info_message(sprintf(__('%d modules updated'), $count)); } catch (Exception $e) { + $auditMessage = sprintf( + 'Try to update plugin #%s modules: %s', + $plugin_id, + $e->getMessage() + ); ui_print_error_message($e->getMessage()); } + + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + $auditMessage + ); } $table = new StdClass(); @@ -302,7 +309,7 @@ $table->width = '100%'; $table->rowstyle = []; $table->data = []; -// Plugins +// Plugins. $filter = ['order' => 'name']; $fields = [ 'id', @@ -341,10 +348,10 @@ $row[] = $plugins_select; $table->data['plugin-ids-row'] = $row; -// Agents & modules +// Agents & modules. $row = []; -// Agents +// Agents. $agents_select = html_print_select( $agent_ids, 'agent_ids[]', @@ -360,9 +367,7 @@ $agents_select = html_print_select( $row[] = ''.__('Agents').''; $row[] = $agents_select; -// Modules -// $modules_select = html_print_select ($module_ids, 'module_ids', -// false, '', '', 0, true, true, false); +// Modules. $modules_select = html_print_select( $module_names, 'module_names[]', @@ -393,7 +398,7 @@ echo ''; ?> diff --git a/pandora_console/godmode/massive/massive_enable_disable_alerts.php b/pandora_console/godmode/massive/massive_enable_disable_alerts.php index a8bb7478b5..bfe6d436e8 100644 --- a/pandora_console/godmode/massive/massive_enable_disable_alerts.php +++ b/pandora_console/godmode/massive/massive_enable_disable_alerts.php @@ -31,7 +31,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access massive alert deletion' ); include 'general/noaccess.php'; @@ -102,11 +102,15 @@ switch ($action) { ui_print_result_message($result, __('Successfully enabled'), __('Could not be enabled')); $info = '{"Alert":"'.implode(',', $id_disabled_alerts).'"}'; - if ($result) { - db_pandora_audit('Massive management', 'Enable alert', false, false, $info); - } else { - db_pandora_audit('Massive management', 'Fail try to enable alert', false, false, $info); - } + + $auditMessage = ((bool) $result === true) ? 'Enable alert' : 'Fail try to enable alert'; + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + $auditMessage, + false, + false, + $info + ); break; case 'disable_alerts': @@ -120,11 +124,15 @@ switch ($action) { ui_print_result_message($result, __('Successfully disabled'), __('Could not be disabled')); $info = '{"Alert":"'.implode(',', $id_enabled_alerts).'"}'; - if ($result) { - db_pandora_audit('Massive management', 'Disable alert', false, false, $info); - } else { - db_pandora_audit('Massive management', 'Fail try to Disable alert', false, false, $info); - } + + $auditMessage = ((bool) $result === true) ? 'Disable alert' : 'Fail try to disable alert'; + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + $auditMessage, + false, + false, + $info + ); break; default: diff --git a/pandora_console/godmode/massive/massive_operations.php b/pandora_console/godmode/massive/massive_operations.php index a3eefc359c..c066816dfd 100755 --- a/pandora_console/godmode/massive/massive_operations.php +++ b/pandora_console/godmode/massive/massive_operations.php @@ -33,7 +33,7 @@ global $config; if (! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access massive operation section' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/massive/massive_standby_alerts.php b/pandora_console/godmode/massive/massive_standby_alerts.php index 5844068665..e1def56976 100644 --- a/pandora_console/godmode/massive/massive_standby_alerts.php +++ b/pandora_console/godmode/massive/massive_standby_alerts.php @@ -31,7 +31,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access massive alert deletion' ); include 'general/noaccess.php'; @@ -103,9 +103,21 @@ switch ($action) { $info = '{"Alert":"'.implode(',', $id_standby_alerts).'"}'; if ($result) { - db_pandora_audit('Massive management', 'Set off standby alerts', false, false, $info); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Set off standby alerts', + false, + false, + $info + ); } else { - db_pandora_audit('Massive management', 'Fail try to set off standby alerts', false, false, $info); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Fail try to set off standby alerts', + false, + false, + $info + ); } break; @@ -121,9 +133,21 @@ switch ($action) { $info = '{"Alert":"'.implode(',', $id_not_standby_alerts).'"}'; if ($result) { - db_pandora_audit('Massive management', 'Set on standby alerts', false, false, $info); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Set on standby alerts', + false, + false, + $info + ); } else { - db_pandora_audit('Massive management', 'Fail try to set on standby alerts', false, false, $info); + db_pandora_audit( + AUDIT_LOG_MASSIVE_MANAGEMENT, + 'Fail try to set on standby alerts', + false, + false, + $info + ); } break; diff --git a/pandora_console/godmode/module_library/module_library_view.php b/pandora_console/godmode/module_library/module_library_view.php index 31553a5352..e5fe29a7bd 100644 --- a/pandora_console/godmode/module_library/module_library_view.php +++ b/pandora_console/godmode/module_library/module_library_view.php @@ -32,7 +32,10 @@ check_login(); if (! check_acl($config['id_user'], 0, 'AR')) { // Doesn't have access to this page. - db_pandora_audit('ACL Violation', 'Trying to access Module Library View'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Module Library View' + ); include 'general/noaccess.php'; exit; } diff --git a/pandora_console/godmode/modules/configuration_wizard_setup.php b/pandora_console/godmode/modules/configuration_wizard_setup.php index 15c5f1b381..d2ec4d0900 100644 --- a/pandora_console/godmode/modules/configuration_wizard_setup.php +++ b/pandora_console/godmode/modules/configuration_wizard_setup.php @@ -25,7 +25,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Network Profile Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/modules/manage_nc_groups.php b/pandora_console/godmode/modules/manage_nc_groups.php index bfac159d4e..e3a546d16f 100644 --- a/pandora_console/godmode/modules/manage_nc_groups.php +++ b/pandora_console/godmode/modules/manage_nc_groups.php @@ -20,7 +20,7 @@ enterprise_hook('open_meta_frame'); if (! check_acl($config['id_user'], 0, 'PM') && ! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access SNMP Group Management' ); include 'general/noaccess.php'; @@ -72,11 +72,12 @@ if ($create) { 'parent' => $parent, ] ); - if ($result) { - db_pandora_audit('Module management', "Create component group #$result"); - } else { - db_pandora_audit('Module management', 'Fail try to create component group'); - } + + $auditMessage = ((bool) $result === true) ? sprintf('Create component group #%s', $result) : 'Fail try to create component group'; + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + $auditMessage + ); ui_print_result_message( $result, @@ -101,11 +102,16 @@ if ($update) { ], ['id_sg' => $id] ); - if ($result) { - db_pandora_audit('Module management', "Update component group #$id"); - } else { - db_pandora_audit('Module management', "Fail try to update component group #$id"); - } + + $auditMessage = ((bool) $result === true) ? 'Update component group' : 'Fail try to update component group'; + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + sprintf( + '%s #%s', + $auditMessage, + $id + ) + ); ui_print_result_message( $result, @@ -131,11 +137,15 @@ if ($delete) { $result = false; } - if ($result) { - db_pandora_audit('Module management', "Delete component group #$id"); - } else { - db_pandora_audit('Module management', "Fail try to delete component group #$id"); - } + $auditMessage = ((bool) $result === true) ? 'Delete component group' : 'Fail try to delete component group'; + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + sprintf( + '%s #%s', + $auditMessage, + $id + ) + ); ui_print_result_message( $result, @@ -168,17 +178,16 @@ if ($multiple_delete) { } $str_ids = implode(',', $ids); - if ($result) { - db_pandora_audit( - 'Module management', - "Multiple delete component group: $str_ids" - ); - } else { - db_pandora_audit( - 'Module management', - "Fail try to delete component group: $str_ids" - ); - } + + $auditMessage = ((bool) $result === true) ? 'Multiple delete component group' : 'Fail try to delete multiple component group'; + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + sprintf( + '%s #%s', + $auditMessage, + $str_ids + ) + ); ui_print_result_message( $result, diff --git a/pandora_console/godmode/modules/manage_nc_groups_form.php b/pandora_console/godmode/modules/manage_nc_groups_form.php index 98cfb8aa81..01beca52ed 100644 --- a/pandora_console/godmode/modules/manage_nc_groups_form.php +++ b/pandora_console/godmode/modules/manage_nc_groups_form.php @@ -18,7 +18,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'PM') && ! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access SNMO Groups Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/modules/manage_network_components.php b/pandora_console/godmode/modules/manage_network_components.php index 4ab509dbc0..c4c3a0d2ac 100644 --- a/pandora_console/godmode/modules/manage_network_components.php +++ b/pandora_console/godmode/modules/manage_network_components.php @@ -34,7 +34,7 @@ enterprise_hook('open_meta_frame'); if (! check_acl($config['id_user'], 0, 'PM') && ! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent Management' ); include 'general/noaccess.php'; @@ -415,7 +415,7 @@ if ($is_management_allowed === true && $create_component) { if ($id === false || !$id) { db_pandora_audit( - 'Module management', + AUDIT_LOG_MODULE_MANAGEMENT, 'Fail try to create remote component' ); @@ -431,7 +431,10 @@ if ($is_management_allowed === true && $create_component) { return; } - db_pandora_audit('Module management', 'Create network component #'.$id); + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + 'Create network component #'.$id + ); ui_print_success_message(__('Created successfully')); $id = 0; } @@ -516,7 +519,7 @@ if ($is_management_allowed === true && $update_component) { if ($result === false || !$result) { db_pandora_audit( - 'Module management', + AUDIT_LOG_MODULE_MANAGEMENT, 'Fail try to update network component #'.$id ); ui_print_error_message(__('Could not be updated')); @@ -524,7 +527,10 @@ if ($is_management_allowed === true && $update_component) { return; } - db_pandora_audit('Module management', 'Update network component #'.$id); + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + 'Update network component #'.$id + ); ui_print_success_message(__('Updated successfully')); $id = 0; @@ -535,17 +541,11 @@ if ($is_management_allowed === true && $delete_component) { $result = network_components_delete_network_component($id); - if ($result) { - db_pandora_audit( - 'Module management', - 'Delete network component #'.$id - ); - } else { - db_pandora_audit( - 'Module management', - 'Fail try to delete network component #'.$id - ); - } + $auditMessage = ((bool) $result === true) ? 'Delete network component' : 'Fail try to delete network component'; + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + sprintf('%s #%s', $auditMessage, $id) + ); ui_print_result_message( $result, @@ -567,17 +567,11 @@ if ($is_management_allowed === true && $multiple_delete) { } $str_ids = implode(',', $ids); - if ($result) { - db_pandora_audit( - 'Module management', - 'Multiple delete network component:'.$str_ids - ); - } else { - db_pandora_audit( - 'Module management', - 'Fail try to delete network component:'.$str_ids - ); - } + $auditMessage = ((bool) $result === true) ? 'Multiple delete network component' : 'Fail try to delete multiple network component'; + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + sprintf('%s :%s', $auditMessage, $str_ids) + ); ui_print_result_message( $result, diff --git a/pandora_console/godmode/modules/manage_network_components_form.php b/pandora_console/godmode/modules/manage_network_components_form.php index 559ca0a376..c39fbc86b6 100644 --- a/pandora_console/godmode/modules/manage_network_components_form.php +++ b/pandora_console/godmode/modules/manage_network_components_form.php @@ -33,7 +33,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'PM') && ! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/modules/manage_network_components_form_common.php b/pandora_console/godmode/modules/manage_network_components_form_common.php index c924eefb2f..095f672a58 100644 --- a/pandora_console/godmode/modules/manage_network_components_form_common.php +++ b/pandora_console/godmode/modules/manage_network_components_form_common.php @@ -18,7 +18,7 @@ include_javascript_d3(); if (! check_acl($config['id_user'], 0, 'PM') && ! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/modules/manage_network_components_form_network.php b/pandora_console/godmode/modules/manage_network_components_form_network.php index 7c69e2784c..d91b80161e 100755 --- a/pandora_console/godmode/modules/manage_network_components_form_network.php +++ b/pandora_console/godmode/modules/manage_network_components_form_network.php @@ -33,7 +33,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'PM') && ! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/modules/manage_network_components_form_wizard.php b/pandora_console/godmode/modules/manage_network_components_form_wizard.php index 990390fe47..0fa9d763c5 100644 --- a/pandora_console/godmode/modules/manage_network_components_form_wizard.php +++ b/pandora_console/godmode/modules/manage_network_components_form_wizard.php @@ -19,7 +19,10 @@ include_javascript_d3(); if (!check_acl($config['id_user'], 0, 'PM') && !check_acl($config['id_user'], 0, 'AW') ) { - db_pandora_audit('ACL Violation', 'Trying to access Agent Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Agent Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/modules/manage_network_components_form_wmi.php b/pandora_console/godmode/modules/manage_network_components_form_wmi.php index 8ea57654cb..19739691fd 100755 --- a/pandora_console/godmode/modules/manage_network_components_form_wmi.php +++ b/pandora_console/godmode/modules/manage_network_components_form_wmi.php @@ -18,7 +18,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/modules/manage_network_templates.php b/pandora_console/godmode/modules/manage_network_templates.php index 9305bd6de1..00dab888b2 100644 --- a/pandora_console/godmode/modules/manage_network_templates.php +++ b/pandora_console/godmode/modules/manage_network_templates.php @@ -18,7 +18,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Network Profile Management' ); include 'general/noaccess.php'; @@ -67,9 +67,15 @@ if ($delete_profile) { $result = network_profiles_delete_network_profile($id); if ($result) { - db_pandora_audit('Module management', "Delete module template #$id"); + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + 'Delete module template #'.$id + ); } else { - db_pandora_audit('Module management', "Fail try to delete module template #$id"); + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + 'Fail try to delete module template #'.$id + ); } ui_print_result_message( @@ -92,9 +98,15 @@ if ($multiple_delete) { $str_ids = implode(',', $ids); if ($result) { - db_pandora_audit('Module management', "Multiple delete module template: $str_ids"); + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + 'Multiple delete module template: '.$str_ids + ); } else { - db_pandora_audit('Module management', "Fail try to delete module template: $str_ids"); + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + 'Fail try to delete module template: '.$str_ids + ); } ui_print_result_message( diff --git a/pandora_console/godmode/modules/manage_network_templates_form.php b/pandora_console/godmode/modules/manage_network_templates_form.php index 795e3c8c9b..2bb1e49fe9 100644 --- a/pandora_console/godmode/modules/manage_network_templates_form.php +++ b/pandora_console/godmode/modules/manage_network_templates_form.php @@ -19,7 +19,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Network Profile Management' ); include 'general/noaccess.php'; @@ -97,9 +97,15 @@ if (isset($_GET['create']) || isset($_GET['update'])) { $result = db_process_sql_update('tnetwork_profile', $values, ['id_np' => $id_np]); if ($result) { - db_pandora_audit('Module management', "Update module template #$id_np"); + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + 'Update module template #'.$id_np + ); } else { - db_pandora_audit('Module management', "Fail try to update module template #$id_np"); + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + 'Fail try to update module template #'.$id_np + ); } ui_print_result_message( @@ -116,9 +122,15 @@ if (isset($_GET['create']) || isset($_GET['update'])) { $result = db_process_sql_insert('tnetwork_profile', $values); if ($result) { - db_pandora_audit('Module management', "Create module template #$result"); + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + 'Create module template #'.$result + ); } else { - db_pandora_audit('Module management', 'Fail try to create module template'); + db_pandora_audit( + AUDIT_LOG_MODULE_MANAGEMENT, + 'Fail try to create module template' + ); } ui_print_result_message( diff --git a/pandora_console/godmode/modules/module_list.php b/pandora_console/godmode/modules/module_list.php index 864ebe32c2..f8c07d7848 100644 --- a/pandora_console/godmode/modules/module_list.php +++ b/pandora_console/godmode/modules/module_list.php @@ -17,12 +17,15 @@ global $config; check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { - db_pandora_audit('ACL Violation', 'Trying to access module management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access module management' + ); include 'general/noaccess.php'; exit; } -// Header +// Header. ui_print_page_header(__('Module management').' » '.__('Defined modules'), 'images/gm_modules.png', false, '', true); $update_module = (bool) get_parameter_post('update_module'); diff --git a/pandora_console/godmode/netflow/nf_edit.php b/pandora_console/godmode/netflow/nf_edit.php index 51d999ef42..4ba54a9c75 100644 --- a/pandora_console/godmode/netflow/nf_edit.php +++ b/pandora_console/godmode/netflow/nf_edit.php @@ -23,7 +23,7 @@ enterprise_hook('open_meta_frame'); if (! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access event viewer' ); include 'general/noaccess.php'; @@ -73,7 +73,7 @@ if ($id > 0) { if (!check_acl_restricted_all($config['id_user'], $filter_group, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access events filter editor' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/netflow/nf_edit_form.php b/pandora_console/godmode/netflow/nf_edit_form.php index 96bc06b87a..19a89ab589 100644 --- a/pandora_console/godmode/netflow/nf_edit_form.php +++ b/pandora_console/godmode/netflow/nf_edit_form.php @@ -25,7 +25,7 @@ enterprise_hook('open_meta_frame'); // Fix: Netflow have to check RW ACL if (! check_acl($config['id_user'], 0, 'RW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access event viewer' ); include $config['homedir'].'/general/noaccess.php'; diff --git a/pandora_console/godmode/reporting/create_container.php b/pandora_console/godmode/reporting/create_container.php index e22a755678..e487723d2e 100644 --- a/pandora_console/godmode/reporting/create_container.php +++ b/pandora_console/godmode/reporting/create_container.php @@ -18,7 +18,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'RW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Inventory Module Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/reporting/graph_builder.graph_editor.php b/pandora_console/godmode/reporting/graph_builder.graph_editor.php index dfe8c1d117..baeb179da5 100644 --- a/pandora_console/godmode/reporting/graph_builder.graph_editor.php +++ b/pandora_console/godmode/reporting/graph_builder.graph_editor.php @@ -20,7 +20,7 @@ $report_m = check_acl($config['id_user'], 0, 'RM'); if (!$report_w && !$report_m) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access graph builder' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/reporting/graph_builder.main.php b/pandora_console/godmode/reporting/graph_builder.main.php index 3b77ed932f..a49495626f 100644 --- a/pandora_console/godmode/reporting/graph_builder.main.php +++ b/pandora_console/godmode/reporting/graph_builder.main.php @@ -66,7 +66,7 @@ if (! check_acl($config['id_user'], 0, 'RW') && ! check_acl($config['id_user'], 0, 'RM') ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access graph builder' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/reporting/graph_builder.php b/pandora_console/godmode/reporting/graph_builder.php index bdbee9a14b..391181edf9 100644 --- a/pandora_console/godmode/reporting/graph_builder.php +++ b/pandora_console/godmode/reporting/graph_builder.php @@ -65,7 +65,7 @@ if (! check_acl($config['id_user'], 0, 'RW') && ! check_acl($config['id_user'], 0, 'RM') ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access graph builder' ); include 'general/noaccess.php'; @@ -90,7 +90,7 @@ if ($id_graph > 0) { && !check_acl_restricted_all($config['id_user'], $graph_group, 'RM') ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access graph builder' ); include 'general/noaccess.php'; @@ -145,11 +145,11 @@ if ($add_graph === true) { if (trim($name) != '') { $id_graph = db_process_sql_insert('tgraph', $values); - if ($id_graph !== false) { - db_pandora_audit('Report management', 'Create graph #'.$id_graph); - } else { - db_pandora_audit('Report management', 'Fail try to create graph'); - } + $auditMessage = ($id_graph !== false) ? sprintf('Create graph #%s', $id_graph) : 'Fail try to create graph'; + db_pandora_audit( + AUDIT_LOG_REPORT_MANAGEMENT, + $auditMessage + ); } else { $id_graph = false; } @@ -197,17 +197,16 @@ if ($update_graph) { ], ['id_graph' => $id_graph] ); - if ($success !== false) { - db_pandora_audit( - 'Report management', - 'Update graph #'.$id_graph - ); - } else { - db_pandora_audit( - 'Report management', - 'Fail try to update graph #'.$id_graph - ); - } + + $auditMessage = ($success !== false) ? 'Update graph' : 'Fail try to update graph'; + db_pandora_audit( + AUDIT_LOG_REPORT_MANAGEMENT, + sprintf( + '%s #%s', + $auditMessage, + $id_graph + ) + ); } else { $success = false; } diff --git a/pandora_console/godmode/reporting/graph_container.php b/pandora_console/godmode/reporting/graph_container.php index 765e93ea60..cbc947ef78 100644 --- a/pandora_console/godmode/reporting/graph_container.php +++ b/pandora_console/godmode/reporting/graph_container.php @@ -34,7 +34,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'RR') || enterprise_installed() === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Graph container' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/reporting/graphs.php b/pandora_console/godmode/reporting/graphs.php index 0c93074a2d..fce91e47c4 100644 --- a/pandora_console/godmode/reporting/graphs.php +++ b/pandora_console/godmode/reporting/graphs.php @@ -40,7 +40,7 @@ $report_m = check_acl($config['id_user'], 0, 'RM'); if (!$report_r && !$report_w && !$report_m) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Inventory Module Management' ); include 'general/noaccess.php'; @@ -155,17 +155,25 @@ if ($delete_graph) { $result = db_process_sql_delete('tgraph', ['id_graph' => $id]); - if ($result) { - db_pandora_audit('Report management', "Delete graph #$id"); - $result = ui_print_success_message(__('Successfully deleted')); - } else { - db_pandora_audit('Report management', "Fail try to delete graph #$id"); - $result = ui_print_error_message(__('Not deleted. Error deleting data')); - } + $auditMessage = ($result === true) ? 'Delete graph' : 'Fail try to delete graph'; + + ui_print_result_message( + $result, + __('Successfully deleted'), + __('Not deleted. Error deleting data') + ); + + db_pandora_audit( + AUDIT_LOG_REPORT_MANAGEMENT, + sprintf('%s #%s', $auditMessage, $id) + ); echo $result; } else { - db_pandora_audit('ACL Violation', 'Trying to delete a graph from access graph builder'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to delete a graph from access graph builder' + ); include 'general/noaccess.php'; exit; } @@ -191,12 +199,14 @@ if ($multiple_delete) { $result = false; } + $auditMessage = ($result === true) ? 'Multiple delete graph' : 'Fail try to delete graphs'; + $str_ids = implode(',', $ids); - if ($result) { - db_pandora_audit('Report management', "Multiple delete graph: $str_ids"); - } else { - db_pandora_audit('Report management', "Fail try to delete graphs: $str_ids"); - } + + db_pandora_audit( + AUDIT_LOG_REPORT_MANAGEMENT, + sprintf('%s: %s', $auditMessage, $str_ids) + ); ui_print_result_message( $result, diff --git a/pandora_console/godmode/reporting/map_builder.php b/pandora_console/godmode/reporting/map_builder.php index b0a8803336..f85849a4ea 100644 --- a/pandora_console/godmode/reporting/map_builder.php +++ b/pandora_console/godmode/reporting/map_builder.php @@ -41,7 +41,7 @@ $is_metaconsole = is_metaconsole(); if (!$vconsoles_read && !$vconsoles_write && !$vconsoles_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access map builder' ); include 'general/noaccess.php'; @@ -157,7 +157,7 @@ if ($delete_layout || $copy_layout) { // Visual console required if (empty($id_layout)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access map builder' ); include 'general/noaccess.php'; @@ -167,7 +167,7 @@ if ($delete_layout || $copy_layout) { $group_id = db_get_value('id_group', 'tlayout', 'id', $id_layout); if ($group_id === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access map builder' ); include 'general/noaccess.php'; @@ -181,7 +181,7 @@ if ($delete_layout || $copy_layout) { if (!$vconsole_write && !$vconsole_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access map builder' ); include 'general/noaccess.php'; @@ -197,22 +197,20 @@ if ($delete_layout || $copy_layout) { 'tlayout', ['id' => $id_layout] ); - if ($result) { - db_pandora_audit( - 'Visual console builder', - "Delete visual console #$id_layout" - ); - ui_print_success_message(__('Successfully deleted')); - db_clean_cache(); - } else { - db_pandora_audit( - 'Visual console builder', - "Fail try to delete visual console #$id_layout" - ); - ui_print_error_message( - __('Not deleted. Error deleting data') - ); - } + + $auditMessage = ((bool) $result === true) ? 'Delete visual console' : 'Fail try to delete visual console'; + db_pandora_audit( + AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT, + sprintf('%s #%s', $auditMessage, $id_layout) + ); + + ui_print_result_message( + (bool) $result, + __('Successfully deleted'), + __('Not deleted. Error deleting data') + ); + + db_clean_cache(); $id_layout = 0; } diff --git a/pandora_console/godmode/reporting/reporting_builder.item_editor.php b/pandora_console/godmode/reporting/reporting_builder.item_editor.php index 4a8f9c64d8..b98b651201 100755 --- a/pandora_console/godmode/reporting/reporting_builder.item_editor.php +++ b/pandora_console/godmode/reporting/reporting_builder.item_editor.php @@ -40,7 +40,7 @@ if (! check_acl($config['id_user'], 0, 'RW') && ! check_acl($config['id_user'], 0, 'RM') ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/reporting/reporting_builder.list_items.php b/pandora_console/godmode/reporting/reporting_builder.list_items.php index 45be7d1d6b..2d1cd69d37 100755 --- a/pandora_console/godmode/reporting/reporting_builder.list_items.php +++ b/pandora_console/godmode/reporting/reporting_builder.list_items.php @@ -33,7 +33,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'RW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/reporting/reporting_builder.main.php b/pandora_console/godmode/reporting/reporting_builder.main.php index 5b1be809d4..177c84d68d 100755 --- a/pandora_console/godmode/reporting/reporting_builder.main.php +++ b/pandora_console/godmode/reporting/reporting_builder.main.php @@ -27,7 +27,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'RW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/reporting/reporting_builder.php b/pandora_console/godmode/reporting/reporting_builder.php index 9421f120f2..9d42914034 100755 --- a/pandora_console/godmode/reporting/reporting_builder.php +++ b/pandora_console/godmode/reporting/reporting_builder.php @@ -64,7 +64,7 @@ function dialog_message(message_id) { .addClass('checkselected'); $(".check_delete").prop("checked", true); $('.check_delete').each(function(){ - $('#hidden-id_report_'+$(this).val()).prop("disabled", false); + $('#hidden-id_report_'+$(this).val()).prop("disabled", false); }); } else{ @@ -128,7 +128,7 @@ $report_m = check_acl($config['id_user'], 0, 'RM'); $access = ($report_r == true) ? 'RR' : (($report_w == true) ? 'RW' : (($report_m == true) ? 'RM' : 'RR')); if (!$report_r && !$report_w && !$report_m) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; @@ -172,7 +172,7 @@ if ($action === 'edit' && $idReport > 0) { && ! check_acl_restricted_all($config['id_user'], $report_group, 'RM') ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; @@ -263,7 +263,7 @@ if ($idReport != 0) { if (!$delete_report_bypass) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; @@ -625,7 +625,7 @@ switch ($action) { $delete = true; // Owner can delete. } else { - $delete = check_acl( + $delete = (bool) check_acl( $config['id_user'], $report['id_group'], 'RM' @@ -646,9 +646,9 @@ switch ($action) { break; } - if (! $delete && !empty($type_access_selected)) { + if ($delete === false && empty($type_access_selected) === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder deletion' ); include 'general/noaccess.php'; @@ -656,17 +656,12 @@ switch ($action) { } $result = reports_delete_report($idReport); - if ($result !== false) { - db_pandora_audit( - 'Report management', - 'Delete report #'.$idReport - ); - } else { - db_pandora_audit( - 'Report management', - 'Fail try to delete report #'.$idReport - ); - } + $auditMessage = ($result !== false) ? 'Delete report' : 'Fail try to delete report'; + + db_pandora_audit( + AUDIT_LOG_REPORT_MANAGEMENT, + sprintf('%s #%s', $auditMessage, $idReport) + ); ui_print_result_message( $result, @@ -721,9 +716,9 @@ switch ($action) { break; } - if (! $copy && !empty($type_access_selected)) { + if (! $copy && empty($type_access_selected) === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder copy' ); include 'general/noaccess.php'; @@ -731,17 +726,11 @@ switch ($action) { } $result = reports_copy_report($idReport); - if ($result !== false) { - db_pandora_audit( - 'Report management', - 'Copy report #'.$idReport - ); - } else { - db_pandora_audit( - 'Report management', - 'Fail try to copy report #'.$idReport - ); - } + $auditMessage = ((bool) $result === true) ? 'Copy report' : 'Fail try to copy report'; + db_pandora_audit( + AUDIT_LOG_REPORT_MANAGEMENT, + sprintf('%s #%s', $auditMessage, $idReport) + ); ui_print_result_message( $result, @@ -1421,23 +1410,17 @@ switch ($action) { ['id_report' => $idReport] ); - if ($resultOperationDB !== false) { - db_pandora_audit( - 'Report management', - 'Update report #'.$idReport - ); - } else { - db_pandora_audit( - 'Report management', - 'Fail try to update report #'.$idReport - ); - } + $auditMessage = ($resultOperationDB === true) ? 'Update report' : 'Fail try to update report'; + db_pandora_audit( + AUDIT_LOG_REPORT_MANAGEMENT, + sprintf('%s #%s', $auditMessage, $idReport) + ); } else { $resultOperationDB = false; } $action = 'edit'; - } else if ($action == 'save') { + } else if ($action === 'save') { if ($reportName != '' && $idGroupReport != '') { // This flag allow to differentiate // between normal console and metaconsole reports. @@ -1482,17 +1465,11 @@ switch ($action) { ] ); - if ($idOrResult !== false) { - db_pandora_audit( - 'Report management', - 'Create report #'.$idOrResult - ); - } else { - db_pandora_audit( - 'Report management', - 'Fail try to create report' - ); - } + $auditMessage = ((bool) $idOrResult === true) ? sprintf('Create report #%s', $idOrResult) : 'Fail try to create report'; + db_pandora_audit( + AUDIT_LOG_REPORT_MANAGEMENT, + $auditMessage + ); } else { $idOrResult = false; } diff --git a/pandora_console/godmode/reporting/visual_console_builder.data.php b/pandora_console/godmode/reporting/visual_console_builder.data.php index 6bf5e0922e..e953e94092 100644 --- a/pandora_console/godmode/reporting/visual_console_builder.data.php +++ b/pandora_console/godmode/reporting/visual_console_builder.data.php @@ -41,7 +41,7 @@ if (empty($idVisualConsole)) { if (!$vconsole_write && !$vconsole_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/reporting/visual_console_builder.editor.php b/pandora_console/godmode/reporting/visual_console_builder.editor.php index 48ef5cc2f9..a8a16ddeb6 100755 --- a/pandora_console/godmode/reporting/visual_console_builder.editor.php +++ b/pandora_console/godmode/reporting/visual_console_builder.editor.php @@ -18,7 +18,7 @@ check_login(); // Visual console required if (empty($visualConsole)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; @@ -40,7 +40,7 @@ if (!isset($vconsole_manage)) { if (!$vconsole_write && !$vconsole_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/reporting/visual_console_builder.elements.php b/pandora_console/godmode/reporting/visual_console_builder.elements.php index 295a27e9a3..71508d313a 100755 --- a/pandora_console/godmode/reporting/visual_console_builder.elements.php +++ b/pandora_console/godmode/reporting/visual_console_builder.elements.php @@ -18,7 +18,7 @@ check_login(); // Visual console required if (empty($visualConsole)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; @@ -46,7 +46,7 @@ if (!isset($vconsole_manage)) { if (!$vconsole_write && !$vconsole_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/reporting/visual_console_builder.php b/pandora_console/godmode/reporting/visual_console_builder.php index b8d939516f..83b9e94998 100755 --- a/pandora_console/godmode/reporting/visual_console_builder.php +++ b/pandora_console/godmode/reporting/visual_console_builder.php @@ -95,7 +95,7 @@ else if ($activeTab != 'data' || ($activeTab == 'data' && $action != 'new')) { // The visual console should exist. if (empty($visualConsole)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; @@ -111,7 +111,7 @@ else if ($activeTab != 'data' || ($activeTab == 'data' && $action != 'new')) { $vconsole_manage = check_acl_restricted_all($config['id_user'], $visualConsole['id_group'], 'VM'); } else { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; @@ -121,7 +121,7 @@ else if ($activeTab != 'data' || ($activeTab == 'data' && $action != 'new')) { // This section is only to manage the visual console if (!$vconsole_write && !$vconsole_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; @@ -173,7 +173,7 @@ switch ($activeTab) { // The user should have permissions on the new group if (!$vconsole_write_new && !$vconsole_manage_new) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; @@ -271,7 +271,10 @@ switch ($activeTab) { } if ($upload_file && !$uploadOK) { - db_pandora_audit('Visual console builder', $error_message); + db_pandora_audit( + AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT, + $error_message + ); break; } @@ -288,24 +291,30 @@ switch ($activeTab) { } if ($result !== false) { - db_pandora_audit('Visual console builder', "Update visual console #$idVisualConsole"); + db_pandora_audit( + AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT, + sprintf('Update visual console #%s', $idVisualConsole) + ); $action = 'edit'; $statusProcessInDB = [ 'flag' => true, 'message' => ui_print_success_message(__('Successfully update.'), '', true), ]; - // Return the updated visual console + // Return the updated visual console. $visualConsole = db_get_row_filter( 'tlayout', ['id' => $idVisualConsole] ); // Update the ACL - // $vconsole_read = $vconsole_read_new; + // $vconsole_read = $vconsole_read_new;. $vconsole_write = $vconsole_write_new; $vconsole_manage = $vconsole_manage_new; } else { - db_pandora_audit('Visual console builder', "Fail update visual console #$idVisualConsole"); + db_pandora_audit( + AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT, + sprintf('Fail update visual console #%s', $idVisualConsole) + ); $statusProcessInDB = [ 'flag' => false, 'message' => ui_print_error_message(__('Could not be update.'), '', true), @@ -321,24 +330,30 @@ switch ($activeTab) { } if ($idVisualConsole !== false) { - db_pandora_audit('Visual console builder', "Create visual console #$idVisualConsole"); + db_pandora_audit( + AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT, + sprintf('Create visual console #%s', $idVisualConsole) + ); $action = 'edit'; $statusProcessInDB = [ 'flag' => true, 'message' => ui_print_success_message(__('Successfully created.'), '', true), ]; - // Return the updated visual console + // Return the updated visual console. $visualConsole = db_get_row_filter( 'tlayout', ['id' => $idVisualConsole] ); // Update the ACL - // $vconsole_read = $vconsole_read_new; + // $vconsole_read = $vconsole_read_new;. $vconsole_write = $vconsole_write_new; $vconsole_manage = $vconsole_manage_new; } else { - db_pandora_audit('Visual console builder', 'Fail try to create visual console'); + db_pandora_audit( + AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT, + 'Fail try to create visual console' + ); $statusProcessInDB = [ 'flag' => false, 'message' => ui_print_error_message(__('Could not be created.'), '', true), diff --git a/pandora_console/godmode/reporting/visual_console_builder.wizard.php b/pandora_console/godmode/reporting/visual_console_builder.wizard.php index d792d18adf..122b40416f 100644 --- a/pandora_console/godmode/reporting/visual_console_builder.wizard.php +++ b/pandora_console/godmode/reporting/visual_console_builder.wizard.php @@ -18,7 +18,7 @@ check_login(); // Visual console required. if (empty($visualConsole) === true) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; @@ -53,7 +53,7 @@ if (!isset($vconsole_manage)) { if (!$vconsole_write && !$vconsole_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/reporting/visual_console_favorite.php b/pandora_console/godmode/reporting/visual_console_favorite.php index 16b5978dd2..d3b2b515f9 100644 --- a/pandora_console/godmode/reporting/visual_console_favorite.php +++ b/pandora_console/godmode/reporting/visual_console_favorite.php @@ -43,7 +43,7 @@ $is_metaconsole = is_metaconsole(); if (!$vconsoles_read && !$vconsoles_write && !$vconsoles_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access map builder' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/servers/discovery.php b/pandora_console/godmode/servers/discovery.php index 67605a6a4b..7fceb324f9 100755 --- a/pandora_console/godmode/servers/discovery.php +++ b/pandora_console/godmode/servers/discovery.php @@ -15,7 +15,7 @@ if (! check_acl($config['id_user'], 0, 'AR') && ! check_acl($config['id_user'], 0, 'PM') ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Server Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/servers/modificar_server.php b/pandora_console/godmode/servers/modificar_server.php index d0bc6d791b..8fe9d303f2 100644 --- a/pandora_console/godmode/servers/modificar_server.php +++ b/pandora_console/godmode/servers/modificar_server.php @@ -21,7 +21,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Server Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/servers/plugin.php b/pandora_console/godmode/servers/plugin.php index c247987c42..791cf9c9b1 100644 --- a/pandora_console/godmode/servers/plugin.php +++ b/pandora_console/godmode/servers/plugin.php @@ -113,7 +113,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'PM') && ! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Plugin Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/servers/plugin_registration.php b/pandora_console/godmode/servers/plugin_registration.php index 2f69836268..e4ec7e7916 100644 --- a/pandora_console/godmode/servers/plugin_registration.php +++ b/pandora_console/godmode/servers/plugin_registration.php @@ -39,7 +39,7 @@ if ((bool) check_acl($config['id_user'], 0, 'PM') === false || (bool) check_acl($config['id_user'], 0, 'AW') === false ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Plugin Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/servers/servers.build_table.php b/pandora_console/godmode/servers/servers.build_table.php index 4a7323fc8f..e947fc83f5 100644 --- a/pandora_console/godmode/servers/servers.build_table.php +++ b/pandora_console/godmode/servers/servers.build_table.php @@ -20,7 +20,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Server Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/setup/file_manager.php b/pandora_console/godmode/setup/file_manager.php index af7e9d6e3a..e969f1d57f 100644 --- a/pandora_console/godmode/setup/file_manager.php +++ b/pandora_console/godmode/setup/file_manager.php @@ -32,7 +32,10 @@ global $config; check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { - db_pandora_audit('ACL Violation', 'Trying to access File manager'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access File manager' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/setup/gis.php b/pandora_console/godmode/setup/gis.php index 9f8ed7eee0..ff0f4f426c 100755 --- a/pandora_console/godmode/setup/gis.php +++ b/pandora_console/godmode/setup/gis.php @@ -19,7 +19,10 @@ global $config; check_login(); if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Visual Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Visual Setup Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/setup/gis_step_2.php b/pandora_console/godmode/setup/gis_step_2.php index 2ec5deb0d9..c4f823996e 100644 --- a/pandora_console/godmode/setup/gis_step_2.php +++ b/pandora_console/godmode/setup/gis_step_2.php @@ -19,7 +19,10 @@ global $config; check_login(); if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Visual Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Visual Setup Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/setup/license.php b/pandora_console/godmode/setup/license.php index 3d9fa1171c..8ae1827cb8 100644 --- a/pandora_console/godmode/setup/license.php +++ b/pandora_console/godmode/setup/license.php @@ -32,7 +32,10 @@ global $config; check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { - db_pandora_audit('ACL Violation', 'Trying to change License settings'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to change License settings' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/setup/links.php b/pandora_console/godmode/setup/links.php index ffeeb7fb23..61781d2e57 100644 --- a/pandora_console/godmode/setup/links.php +++ b/pandora_console/godmode/setup/links.php @@ -16,7 +16,10 @@ global $config; check_login(); if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Link Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Link Management' + ); include 'general/noaccess.php'; exit; } diff --git a/pandora_console/godmode/setup/news.php b/pandora_console/godmode/setup/news.php index 52f7019dc4..b340e70066 100644 --- a/pandora_console/godmode/setup/news.php +++ b/pandora_console/godmode/setup/news.php @@ -18,7 +18,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Link Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/setup/os.builder.php b/pandora_console/godmode/setup/os.builder.php index ff58e8d5b4..83b79e95a4 100644 --- a/pandora_console/godmode/setup/os.builder.php +++ b/pandora_console/godmode/setup/os.builder.php @@ -17,7 +17,10 @@ global $config; check_login(); if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Setup Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/setup/os.list.php b/pandora_console/godmode/setup/os.list.php index 7ee3bc8093..507f098bc0 100644 --- a/pandora_console/godmode/setup/os.list.php +++ b/pandora_console/godmode/setup/os.list.php @@ -32,7 +32,10 @@ global $config; check_login(); if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Setup Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/setup/os.php b/pandora_console/godmode/setup/os.php index f347f9f01e..ab864205a4 100644 --- a/pandora_console/godmode/setup/os.php +++ b/pandora_console/godmode/setup/os.php @@ -32,7 +32,10 @@ global $config; check_login(); if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Setup Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/setup/performance.php b/pandora_console/godmode/setup/performance.php index 3d71be414c..52a429dc95 100644 --- a/pandora_console/godmode/setup/performance.php +++ b/pandora_console/godmode/setup/performance.php @@ -39,7 +39,10 @@ check_login(); if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user']) ) { - db_pandora_audit('ACL Violation', 'Trying to access Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Setup Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/setup/setup.php b/pandora_console/godmode/setup/setup.php index 1675f86f3e..665543ef60 100644 --- a/pandora_console/godmode/setup/setup.php +++ b/pandora_console/godmode/setup/setup.php @@ -59,7 +59,10 @@ if (is_ajax()) { if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Setup Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/setup/setup_auth.php b/pandora_console/godmode/setup/setup_auth.php index ea3397b30f..59d208afaf 100644 --- a/pandora_console/godmode/setup/setup_auth.php +++ b/pandora_console/godmode/setup/setup_auth.php @@ -25,7 +25,10 @@ global $config; check_login(); if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Setup Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/setup/setup_ehorus.php b/pandora_console/godmode/setup/setup_ehorus.php index 7d6eaef617..eeabebf0d5 100644 --- a/pandora_console/godmode/setup/setup_ehorus.php +++ b/pandora_console/godmode/setup/setup_ehorus.php @@ -23,7 +23,10 @@ global $config; check_login(); if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Setup Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/setup/setup_integria.php b/pandora_console/godmode/setup/setup_integria.php index f04ac026e7..460b20e8c6 100644 --- a/pandora_console/godmode/setup/setup_integria.php +++ b/pandora_console/godmode/setup/setup_integria.php @@ -23,7 +23,10 @@ global $config; check_login(); if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Setup Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/setup/setup_visuals.php b/pandora_console/godmode/setup/setup_visuals.php index d9127cab49..9a36b3ac1c 100755 --- a/pandora_console/godmode/setup/setup_visuals.php +++ b/pandora_console/godmode/setup/setup_visuals.php @@ -17,7 +17,10 @@ global $config; check_login(); if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Visual Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Visual Setup Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/setup/snmp_wizard.php b/pandora_console/godmode/setup/snmp_wizard.php index 89750a5b72..e788b408cd 100644 --- a/pandora_console/godmode/setup/snmp_wizard.php +++ b/pandora_console/godmode/setup/snmp_wizard.php @@ -18,7 +18,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Link Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/snmpconsole/snmp_alert.php b/pandora_console/godmode/snmpconsole/snmp_alert.php index 671bb310de..6829d445e1 100755 --- a/pandora_console/godmode/snmpconsole/snmp_alert.php +++ b/pandora_console/godmode/snmpconsole/snmp_alert.php @@ -16,7 +16,7 @@ // Load global vars if (! check_acl($config['id_user'], 0, 'LW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access SNMP Alert Management' ); include 'general/noaccess.php'; @@ -270,10 +270,16 @@ if ($save_alert || $modify_alert) { $result = db_process_sql_insert('talert_snmp', $values); if (!$result) { - db_pandora_audit('SNMP management', 'Fail try to create snmp alert'); + db_pandora_audit( + AUDIT_LOG_SNMP_MANAGEMENT, + 'Fail try to create snmp alert' + ); ui_print_error_message(__('There was a problem creating the alert')); } else { - db_pandora_audit('SNMP management', "Create snmp alert #$result"); + db_pandora_audit( + AUDIT_LOG_SNMP_MANAGEMENT, + "Create snmp alert #$result" + ); ui_print_success_message(__('Successfully created')); } } else { @@ -400,10 +406,16 @@ if ($save_alert || $modify_alert) { $result = db_process_sql($sql); if (!$result) { - db_pandora_audit('SNMP management', "Fail try to update snmp alert #$id_as"); + db_pandora_audit( + AUDIT_LOG_SNMP_MANAGEMENT, + "Fail try to update snmp alert #$id_as" + ); ui_print_error_message(__('There was a problem updating the alert')); } else { - db_pandora_audit('SNMP management', "Update snmp alert #$id_as"); + db_pandora_audit( + AUDIT_LOG_SNMP_MANAGEMENT, + "Update snmp alert #$id_as" + ); ui_print_success_message(__('Successfully updated')); } } @@ -497,7 +509,7 @@ if ($update_alert || $duplicate_alert) { if (!check_acl_restricted_all($config['id_user'], $group, 'LW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access SNMP Alert Management' ); include 'general/noaccess.php'; @@ -591,14 +603,23 @@ if ($duplicate_alert) { $result = db_process_sql_insert('talert_snmp', $values_duplicate); if (!$result) { - db_pandora_audit('SNMP management', "Fail try to duplicate snmp alert #$id_as"); + db_pandora_audit( + AUDIT_LOG_SNMP_MANAGEMENT, + "Fail try to duplicate snmp alert #$id_as" + ); ui_print_error_message(__('There was a problem duplicating the alert')); } else { - db_pandora_audit('SNMP management', "Duplicate snmp alert #$id_as"); + db_pandora_audit( + AUDIT_LOG_SNMP_MANAGEMENT, + "Duplicate snmp alert #$id_as" + ); ui_print_success_message(__('Successfully Duplicate')); } } else { - db_pandora_audit('SNMP management', "Fail try to duplicate snmp alert #$id_as"); + db_pandora_audit( + AUDIT_LOG_SNMP_MANAGEMENT, + "Fail try to duplicate snmp alert #$id_as" + ); ui_print_error_message(__('There was a problem duplicating the alert')); } } @@ -616,10 +637,16 @@ if ($delete_alert) { ); if ($result === false) { - db_pandora_audit('SNMP management', "Fail try to delete snmp alert #$alert_delete"); + db_pandora_audit( + AUDIT_LOG_SNMP_MANAGEMENT, + "Fail try to delete snmp alert #$alert_delete" + ); ui_print_error_message(__('There was a problem deleting the alert')); } else { - db_pandora_audit('SNMP management', "Delete snmp alert #$alert_delete"); + db_pandora_audit( + AUDIT_LOG_SNMP_MANAGEMENT, + "Delete snmp alert #$alert_delete" + ); ui_print_success_message(__('Successfully deleted')); } } @@ -637,10 +664,16 @@ if ($multiple_delete) { ); if ($result !== false) { - db_pandora_audit('SNMP management', "Delete snmp alert #$alert_delete"); + db_pandora_audit( + AUDIT_LOG_SNMP_MANAGEMENT, + "Delete snmp alert #$alert_delete" + ); $count++; } else { - db_pandora_audit('SNMP management', "Fail try to delete snmp alert #$alert_delete"); + db_pandora_audit( + AUDIT_LOG_SNMP_MANAGEMENT, + "Fail try to delete snmp alert #$alert_delete" + ); } } diff --git a/pandora_console/godmode/snmpconsole/snmp_filters.php b/pandora_console/godmode/snmpconsole/snmp_filters.php index 821d7a7c6e..de9f86697a 100644 --- a/pandora_console/godmode/snmpconsole/snmp_filters.php +++ b/pandora_console/godmode/snmpconsole/snmp_filters.php @@ -14,7 +14,7 @@ // Check ACL if (! check_acl($config['id_user'], 0, 'LW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access SNMP Filter Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/snmpconsole/snmp_trap_generator.php b/pandora_console/godmode/snmpconsole/snmp_trap_generator.php index 15173eee4c..72578868e7 100755 --- a/pandora_console/godmode/snmpconsole/snmp_trap_generator.php +++ b/pandora_console/godmode/snmpconsole/snmp_trap_generator.php @@ -17,7 +17,7 @@ global $config; // Check ACL if (! check_acl($config['id_user'], 0, 'LW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access SNMP Filter Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/tag/edit_tag.php b/pandora_console/godmode/tag/edit_tag.php index bbf1aac06b..37ac7c841b 100644 --- a/pandora_console/godmode/tag/edit_tag.php +++ b/pandora_console/godmode/tag/edit_tag.php @@ -19,7 +19,10 @@ enterprise_hook('open_meta_frame'); require_once $config['homedir'].'/include/functions_tags.php'; if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Edit Tag'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Edit Tag' + ); include 'general/noaccess.php'; return; @@ -110,13 +113,21 @@ if ($update_tag && $id_tag != 0) { $result = tags_update_tag($values, 'id_tag = '.$id_tag); } - if ($result === false) { - db_pandora_audit('Tag management', "Fail try to update tag #$id_tag"); - ui_print_error_message(__('Error updating tag')); - } else { - db_pandora_audit('Tag management', "Update tag #$id_tag"); - ui_print_success_message(__('Successfully updated tag')); - } + $auditMessage = ($result === false) ? 'Fail try to update tag' : 'Update tag'; + db_pandora_audit( + AUDIT_LOG_TAG_MANAGEMENT, + sprintf( + '%s #%s', + $auditMessage, + $id_tag + ) + ); + + ui_print_result_message( + (bool) $result, + __('Successfully updated tag'), + __('Error updating tag') + ); } // Create tag: creates a new tag @@ -140,16 +151,24 @@ if ($create_tag) { } if ($return_create === false) { - db_pandora_audit('Tag management', 'Fail try to create tag'); - ui_print_error_message(__('Error creating tag')); + $auditMessage = 'Fail try to create tag'; $action = 'new'; - // If create action ends successfully then current action is update + // If create action ends successfully then current action is update. } else { - db_pandora_audit('Tag management', "Create tag #$return_create"); - ui_print_success_message(__('Successfully created tag')); + $auditMessage = sprintf('Create tag #%s', $return_create); $id_tag = $return_create; $action = 'update'; } + + db_pandora_audit( + AUDIT_LOG_TAG_MANAGEMENT, + $auditMessage + ); + ui_print_result_message( + $action === 'update', + __('Successfully created tag'), + __('Error creating tag') + ); } // Form fields are filled here diff --git a/pandora_console/godmode/tag/tag.php b/pandora_console/godmode/tag/tag.php index b38e536e74..b808edde9b 100644 --- a/pandora_console/godmode/tag/tag.php +++ b/pandora_console/godmode/tag/tag.php @@ -33,7 +33,10 @@ global $config; check_login(); if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Tag Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Tag Management' + ); include 'general/noaccess.php'; return; } @@ -160,13 +163,21 @@ if (is_metaconsole() === false) { if ($delete !== 0) { $return_delete = tags_delete_tag($delete); - if ($return_delete === false) { - db_pandora_audit('Tag management', 'Fail try to delete tag #'.$delete); - ui_print_error_message(__('Error deleting tag')); - } else { - db_pandora_audit('Tag management', 'Delete tag #'.$delete); - ui_print_success_message(__('Successfully deleted tag')); - } + $auditMessage = ($return_delete === false) ? 'Fail try to delete tag' : 'Delete tag'; + db_pandora_audit( + AUDIT_LOG_TAG_MANAGEMENT, + sprintf( + '%s #%s', + $auditMessage, + $delete + ) + ); + + ui_print_result_message( + (bool) $return_delete !== false, + __('Successfully deleted tag'), + __('Error deleting tag') + ); } $is_management_allowed = is_management_allowed(); diff --git a/pandora_console/godmode/um_client/index.php b/pandora_console/godmode/um_client/index.php index 43385a8317..b8f3420f54 100644 --- a/pandora_console/godmode/um_client/index.php +++ b/pandora_console/godmode/um_client/index.php @@ -50,7 +50,10 @@ if (function_exists('check_acl') === true if ((bool) check_acl($config['id_user'], 0, 'PM') !== true && (bool) is_user_admin($config['id_user']) !== true ) { - db_pandora_audit('ACL Violation', 'Trying to access Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Setup Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/update_manager/update_manager.php b/pandora_console/godmode/update_manager/update_manager.php index 67a03aa94f..c6dc09e90f 100644 --- a/pandora_console/godmode/update_manager/update_manager.php +++ b/pandora_console/godmode/update_manager/update_manager.php @@ -17,7 +17,10 @@ check_login(); // The ajax is in // include/ajax/update_manager.ajax.php if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Setup Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/update_manager/update_manager.setup.php b/pandora_console/godmode/update_manager/update_manager.setup.php index 3a4643a53e..7d466857ba 100644 --- a/pandora_console/godmode/update_manager/update_manager.setup.php +++ b/pandora_console/godmode/update_manager/update_manager.setup.php @@ -35,7 +35,10 @@ require_once __DIR__.'/../../include/functions_update_manager.php'; check_login(); if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access Setup Management'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access Setup Management' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/godmode/users/configure_profile.php b/pandora_console/godmode/users/configure_profile.php index 467bd4703c..b1db4e26e9 100644 --- a/pandora_console/godmode/users/configure_profile.php +++ b/pandora_console/godmode/users/configure_profile.php @@ -31,7 +31,7 @@ enterprise_hook('open_meta_frame'); if (! check_acl($config['id_user'], 0, 'UM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Profile Management' ); include 'general/noaccess.php'; @@ -203,7 +203,7 @@ if ($id_profile || $new_profile) { $network_config_edit = (bool) $profile['network_config_edit'] || $network_config_management; $id_audit = db_pandora_audit( - 'User management', + AUDIT_LOG_USER_MANAGEMENT, 'Edit profile '.io_safe_output($name) ); enterprise_include_once('include/functions_audit.php'); diff --git a/pandora_console/godmode/users/configure_user.php b/pandora_console/godmode/users/configure_user.php index b91609e257..006f4b41da 100644 --- a/pandora_console/godmode/users/configure_user.php +++ b/pandora_console/godmode/users/configure_user.php @@ -105,7 +105,7 @@ $is_err = false; if (! check_acl($config['id_user'], 0, 'UM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access User Management' ); include 'general/noaccess.php'; @@ -124,7 +124,7 @@ if (is_ajax()) { $perfil = db_get_row('tperfil', 'id_perfil', $id_perfil); db_pandora_audit( - 'User management', + AUDIT_LOG_USER_MANAGEMENT, 'Deleted profile for user '.io_safe_output($id2), false, false, @@ -147,7 +147,7 @@ if (is_ajax()) { if ($result) { db_pandora_audit( - 'User management', + AUDIT_LOG_USER_MANAGEMENT, __('Deleted user %s', io_safe_output($id_user)) ); } @@ -169,7 +169,7 @@ if (is_ajax()) { $result = delete_user($id_user); if ($result) { db_pandora_audit( - 'User management', + AUDIT_LOG_USER_MANAGEMENT, __('Deleted user %s from metaconsole', io_safe_output($id_user)) ); } @@ -180,7 +180,7 @@ if (is_ajax()) { // Log to the metaconsole too if ($result) { db_pandora_audit( - 'User management', + AUDIT_LOG_USER_MANAGEMENT, __('Deleted user %s from %s', io_safe_input($id_user), io_safe_input($server['server_name'])) ); } @@ -450,7 +450,7 @@ if ($create_user) { } db_pandora_audit( - 'User management', + AUDIT_LOG_USER_MANAGEMENT, 'Created user '.io_safe_output($id), false, false, @@ -493,7 +493,7 @@ if ($create_user) { $no_hierarchy = $profile['hierarchy']; db_pandora_audit( - 'User management', + AUDIT_LOG_USER_MANAGEMENT, 'Added profile for user '.io_safe_output($id2), false, false, @@ -702,7 +702,7 @@ if ($update_user) { db_pandora_audit( - 'User management', + AUDIT_LOG_USER_MANAGEMENT, 'Updated user '.io_safe_output($id), false, false, @@ -771,7 +771,7 @@ if ($add_profile && empty($json_profile)) { $tags = implode(',', $tags); db_pandora_audit( - 'User management', + AUDIT_LOG_USER_MANAGEMENT, 'Added profile for user '.io_safe_output($id2), false, false, @@ -808,7 +808,7 @@ if (!users_is_admin() && $config['id_user'] != $id && !$new_user) { $result = db_get_all_rows_sql($sql); if ($result == false && $user_info['is_admin'] == false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access User Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/users/profile_list.php b/pandora_console/godmode/users/profile_list.php index 1ee700c989..7ce7c82cc0 100644 --- a/pandora_console/godmode/users/profile_list.php +++ b/pandora_console/godmode/users/profile_list.php @@ -39,7 +39,7 @@ require_once $config['homedir'].'/include/functions_groups.php'; if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access User Management' ); include 'general/noaccess.php'; @@ -127,7 +127,7 @@ if ($is_management_allowed === true && $delete_profile === true) { ui_print_error_message(__('There was a problem deleting the profile')); } else { db_pandora_audit( - 'Profile management', + AUDIT_LOG_USER_MANAGEMENT, 'Delete profile '.io_safe_output($profile['name']) ); ui_print_success_message(__('Successfully deleted')); @@ -242,7 +242,7 @@ if ($is_management_allowed === true && $update_profile === true) { "'.get_product_name().' Management":"'.$pandora_management.'"}'; db_pandora_audit( - 'User management', + AUDIT_LOG_USER_MANAGEMENT, 'Update profile '.io_safe_output($name), false, false, @@ -293,7 +293,7 @@ if ($is_management_allowed === true && $create_profile === true) { "'.get_product_name().' Management":"'.$pandora_management.'"}'; db_pandora_audit( - 'User management', + AUDIT_LOG_USER_MANAGEMENT, 'Created profile '.io_safe_output($name), false, false, diff --git a/pandora_console/godmode/users/user_list.php b/pandora_console/godmode/users/user_list.php index e146bf9646..7ac3f55261 100644 --- a/pandora_console/godmode/users/user_list.php +++ b/pandora_console/godmode/users/user_list.php @@ -41,7 +41,7 @@ enterprise_include_once('meta/include/functions_users_meta.php'); if (! check_acl($config['id_user'], 0, 'UM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access User Management' ); include 'general/noaccess.php'; @@ -271,7 +271,7 @@ if ((bool) get_parameter('user_del', false) === true) { if ($result) { db_pandora_audit( - 'User management', + AUDIT_LOG_USER_MANAGEMENT, __('Deleted user %s', io_safe_output($id_user)) ); } @@ -292,7 +292,7 @@ if ((bool) get_parameter('user_del', false) === true) { $result = delete_user($id_user); if ($result) { db_pandora_audit( - 'User management', + AUDIT_LOG_USER_MANAGEMENT, __('Deleted user %s from metaconsole', io_safe_input($id_user)) ); } @@ -304,7 +304,7 @@ if ((bool) get_parameter('user_del', false) === true) { // Log to the metaconsole too. if ($result) { db_pandora_audit( - 'User management', + AUDIT_LOG_USER_MANAGEMENT, __('Deleted user %s from %s', io_safe_input($id_user), io_safe_input($server['server_name'])) ); } diff --git a/pandora_console/godmode/wizards/DiscoveryTaskList.class.php b/pandora_console/godmode/wizards/DiscoveryTaskList.class.php index 1c7149588c..24875b9d34 100644 --- a/pandora_console/godmode/wizards/DiscoveryTaskList.class.php +++ b/pandora_console/godmode/wizards/DiscoveryTaskList.class.php @@ -228,7 +228,7 @@ class DiscoveryTaskList extends HTML if (! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access recon task viewer' ); include 'general/noaccess.php'; @@ -269,7 +269,7 @@ class DiscoveryTaskList extends HTML if (!$this->aclMulticheck('RR|RW|RM|PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access recon task viewer' ); include 'general/noaccess.php'; @@ -332,7 +332,7 @@ class DiscoveryTaskList extends HTML if (! check_acl($config['id_user'], 0, 'RM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access recon task viewer' ); include 'general/noaccess.php'; @@ -373,7 +373,7 @@ class DiscoveryTaskList extends HTML if (! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access recon task viewer' ); include 'general/noaccess.php'; @@ -415,7 +415,7 @@ class DiscoveryTaskList extends HTML if (! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access recon task viewer' ); include 'general/noaccess.php'; diff --git a/pandora_console/godmode/wizards/HostDevices.class.php b/pandora_console/godmode/wizards/HostDevices.class.php index f2819b4e74..36e7df0b21 100755 --- a/pandora_console/godmode/wizards/HostDevices.class.php +++ b/pandora_console/godmode/wizards/HostDevices.class.php @@ -616,7 +616,7 @@ class HostDevices extends Wizard if (! check_acl($config['id_user'], 0, $this->access)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/include/ajax/alert_list.ajax.php b/pandora_console/include/ajax/alert_list.ajax.php index 3d8e27cb35..dd02e6862e 100644 --- a/pandora_console/include/ajax/alert_list.ajax.php +++ b/pandora_console/include/ajax/alert_list.ajax.php @@ -38,7 +38,7 @@ if ($get_agent_alerts_simple) { if (! check_acl($config['id_user'], $id_group, 'AR')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); echo json_encode(false); @@ -47,7 +47,7 @@ if ($get_agent_alerts_simple) { if (! check_acl($config['id_user'], 0, 'LW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); echo json_encode(false); @@ -332,7 +332,7 @@ if ($get_agent_alerts_agent_view) { if ($enable_alert) { if (! check_acl($config['id_user'], 0, 'LW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); return false; @@ -353,7 +353,7 @@ if ($enable_alert) { if ($disable_alert) { if (! check_acl($config['id_user'], 0, 'LW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); return false; @@ -374,7 +374,7 @@ if ($disable_alert) { if ($get_actions_module) { if (! check_acl($config['id_user'], 0, 'LW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); return false; @@ -395,7 +395,7 @@ if ($get_actions_module) { if ($show_update_action_menu) { if (! check_acl($config['id_user'], 0, 'LW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); return false; diff --git a/pandora_console/include/ajax/double_auth.ajax.php b/pandora_console/include/ajax/double_auth.ajax.php index ebe45a3894..0f85c9c0f5 100644 --- a/pandora_console/include/ajax/double_auth.ajax.php +++ b/pandora_console/include/ajax/double_auth.ajax.php @@ -23,7 +23,7 @@ $id_user_auth = (string) get_parameter('id_user_auth', $config['id_user']); if ($id_user !== $config['id_user'] && $FA_forced != 1) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Double Authentication' ); echo json_encode(-1); diff --git a/pandora_console/include/ajax/events.php b/pandora_console/include/ajax/events.php index 189a76022f..e8a0d5831a 100644 --- a/pandora_console/include/ajax/events.php +++ b/pandora_console/include/ajax/events.php @@ -47,7 +47,7 @@ if (! check_acl($config['id_user'], 0, 'ER') && ! check_acl($config['id_user'], 0, 'EM') ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access event viewer' ); include 'general/noaccess.php'; diff --git a/pandora_console/include/ajax/group.php b/pandora_console/include/ajax/group.php index 1074ed227b..705ed79e2f 100644 --- a/pandora_console/include/ajax/group.php +++ b/pandora_console/include/ajax/group.php @@ -35,7 +35,7 @@ use PandoraFMS\Group; check_login(); if (! check_acl($config['id_user'], 0, 'AR')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access credential store' ); diff --git a/pandora_console/include/ajax/map_enterprise.ajax.php b/pandora_console/include/ajax/map_enterprise.ajax.php index 8d888e4a23..a0178457f5 100644 --- a/pandora_console/include/ajax/map_enterprise.ajax.php +++ b/pandora_console/include/ajax/map_enterprise.ajax.php @@ -42,7 +42,7 @@ if ($networkmap) { if (!$networkmap_read && !$networkmap_write && !$networkmap_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); include 'general/noaccess.php'; diff --git a/pandora_console/include/ajax/reporting.ajax.php b/pandora_console/include/ajax/reporting.ajax.php index f77edb0d3d..89d5b715fb 100755 --- a/pandora_console/include/ajax/reporting.ajax.php +++ b/pandora_console/include/ajax/reporting.ajax.php @@ -18,7 +18,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'RW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; diff --git a/pandora_console/include/ajax/visual_console.ajax.php b/pandora_console/include/ajax/visual_console.ajax.php index cb7e016283..b3739d0c97 100644 --- a/pandora_console/include/ajax/visual_console.ajax.php +++ b/pandora_console/include/ajax/visual_console.ajax.php @@ -23,7 +23,7 @@ check_login(); // Fix: IW was the old ACL to check for report editing, now is RW if (! check_acl($config['id_user'], 0, 'VR')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; diff --git a/pandora_console/include/ajax/visual_console_builder.ajax.php b/pandora_console/include/ajax/visual_console_builder.ajax.php index 9cd2efeb2a..5736815d6c 100755 --- a/pandora_console/include/ajax/visual_console_builder.ajax.php +++ b/pandora_console/include/ajax/visual_console_builder.ajax.php @@ -37,7 +37,7 @@ $id_visual_console = get_parameter('id_visual_console', null); // Visual console id required if (empty($id_visual_console)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; @@ -48,7 +48,7 @@ if (empty($id_visual_console)) { $group_id = db_get_value('id_group', 'tlayout', 'id', $id_visual_console); if ($group_id === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; @@ -68,7 +68,7 @@ if (!isset($vconsole_manage)) { if (!$vconsole_write && !$vconsole_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access report builder' ); include 'general/noaccess.php'; diff --git a/pandora_console/include/api.php b/pandora_console/include/api.php index f7f053a80a..cb3dae8e72 100644 --- a/pandora_console/include/api.php +++ b/pandora_console/include/api.php @@ -334,7 +334,7 @@ if ($correctLogin) { * //TODO: Implement a new switch in config to enable / disable * ACL auth failure: if enabled and have lots of traffic can produce * millions of records and a considerable OVERHEAD in the system :( - * db_pandora_audit("API access Failed", $no_login_msg, $user, $ipOrigin); + * db_pandora_ audit("API access Failed", $no_login_msg, $user, $ipOrigin); */ sleep(15); diff --git a/pandora_console/include/class/AgentWizard.class.php b/pandora_console/include/class/AgentWizard.class.php index 5f1d168183..c8b3de54fe 100644 --- a/pandora_console/include/class/AgentWizard.class.php +++ b/pandora_console/include/class/AgentWizard.class.php @@ -293,7 +293,7 @@ class AgentWizard extends HTML if (!check_acl($config['id_user'], 0, 'AR')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access event viewer' ); diff --git a/pandora_console/include/class/AgentsAlerts.class.php b/pandora_console/include/class/AgentsAlerts.class.php index b7e39af4b7..00f8f334ef 100644 --- a/pandora_console/include/class/AgentsAlerts.class.php +++ b/pandora_console/include/class/AgentsAlerts.class.php @@ -114,7 +114,7 @@ class AgentsAlerts extends HTML if (! check_acl($config['id_user'], 0, 'AR')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access event viewer' ); @@ -174,7 +174,10 @@ class AgentsAlerts extends HTML db_process_sql_update('tagente_modulo', ['flag' => 1], $where); } else { - db_pandora_audit('ACL Violation', 'Trying to set flag for groups'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to set flag for groups' + ); include 'general/noaccess.php'; exit; } diff --git a/pandora_console/include/class/AuditLog.class.php b/pandora_console/include/class/AuditLog.class.php index cc73d9e378..b01e494101 100644 --- a/pandora_console/include/class/AuditLog.class.php +++ b/pandora_console/include/class/AuditLog.class.php @@ -69,7 +69,7 @@ class AuditLog extends HTML && is_user_admin($config['id_user']) === true ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Audit Logs' ); include 'general/noaccess.php'; diff --git a/pandora_console/include/class/CalendarManager.class.php b/pandora_console/include/class/CalendarManager.class.php index 9d5db4e80d..fdd4fb963c 100644 --- a/pandora_console/include/class/CalendarManager.class.php +++ b/pandora_console/include/class/CalendarManager.class.php @@ -121,7 +121,7 @@ class CalendarManager // ACL Check. if ((bool) check_acl($config['id_user'], 0, $this->access) !== true) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert calendar view' ); include 'general/noaccess.php'; @@ -420,8 +420,8 @@ class CalendarManager if ($result === true) { db_pandora_audit( - 'Special days list', - 'Upload iCalendar '.$_FILES['ical_file']['name'] + AUDIT_LOG_SYSTEM, + 'Special Days. Upload iCalendar '.$_FILES['ical_file']['name'] ); } diff --git a/pandora_console/include/class/ConfigPEN.class.php b/pandora_console/include/class/ConfigPEN.class.php index 0482c10863..b3e8d9d319 100644 --- a/pandora_console/include/class/ConfigPEN.class.php +++ b/pandora_console/include/class/ConfigPEN.class.php @@ -64,7 +64,7 @@ class ConfigPEN extends HTML if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access PEN Definition feature' ); diff --git a/pandora_console/include/class/ConsoleSupervisor.php b/pandora_console/include/class/ConsoleSupervisor.php index 356867764f..9071614c2a 100644 --- a/pandora_console/include/class/ConsoleSupervisor.php +++ b/pandora_console/include/class/ConsoleSupervisor.php @@ -2436,7 +2436,7 @@ class ConsoleSupervisor // Only ask for messages once every 2 hours. $future = (time() + 2 * SECONDS_1HOUR); - config_update_value('last_um_check', $future); + config_update_value('last_um_check', $future, true); $messages = update_manager_get_messages(); if (is_array($messages) === true) { diff --git a/pandora_console/include/class/CredentialStore.class.php b/pandora_console/include/class/CredentialStore.class.php index 718ebe7d4a..f9778a33b5 100644 --- a/pandora_console/include/class/CredentialStore.class.php +++ b/pandora_console/include/class/CredentialStore.class.php @@ -160,7 +160,7 @@ class CredentialStore extends Wizard if (! check_acl($config['id_user'], 0, 'AR')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access credential store' ); diff --git a/pandora_console/include/class/CustomNetScan.class.php b/pandora_console/include/class/CustomNetScan.class.php index 1eab6f6634..bb0b420f1e 100644 --- a/pandora_console/include/class/CustomNetScan.class.php +++ b/pandora_console/include/class/CustomNetScan.class.php @@ -282,7 +282,7 @@ class CustomNetScan extends Wizard if (!check_acl($config['id_user'], 0, $this->access)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Custom Net Scan.' ); include 'general/noaccess.php'; diff --git a/pandora_console/include/class/ExternalTools.class.php b/pandora_console/include/class/ExternalTools.class.php index 368b9d209a..58c021de17 100644 --- a/pandora_console/include/class/ExternalTools.class.php +++ b/pandora_console/include/class/ExternalTools.class.php @@ -56,7 +56,7 @@ class ExternalTools extends HTML if ($this->origin === 'agent') { if (check_acl($config['id_user'], 0, 'AR') === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent Management' ); include 'general/noaccess.php'; @@ -72,7 +72,7 @@ class ExternalTools extends HTML } else if ($this->origin === 'setup') { if (check_acl($config['id_user'], 0, 'PM') === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Profile Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/include/class/ManageNetScanScripts.class.php b/pandora_console/include/class/ManageNetScanScripts.class.php index bdcbd26a50..a047cfcb61 100644 --- a/pandora_console/include/class/ManageNetScanScripts.class.php +++ b/pandora_console/include/class/ManageNetScanScripts.class.php @@ -85,7 +85,7 @@ class ManageNetScanScripts extends Wizard if (check_acl($config['id_user'], 0, $this->access) === 0) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Net Scan Script.' ); include 'general/noaccess.php'; diff --git a/pandora_console/include/class/ModuleTemplates.class.php b/pandora_console/include/class/ModuleTemplates.class.php index 90eee1b05f..ba67142560 100644 --- a/pandora_console/include/class/ModuleTemplates.class.php +++ b/pandora_console/include/class/ModuleTemplates.class.php @@ -120,7 +120,7 @@ class ModuleTemplates extends HTML if (! check_acl($config['id_user'], 0, 'AR')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access event viewer' ); diff --git a/pandora_console/include/class/NetworkMap.class.php b/pandora_console/include/class/NetworkMap.class.php index f562f8110c..9d36db8bc8 100644 --- a/pandora_console/include/class/NetworkMap.class.php +++ b/pandora_console/include/class/NetworkMap.class.php @@ -3564,7 +3564,7 @@ class NetworkMap && !$networkmap_manage ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); include 'general/noaccess.php'; diff --git a/pandora_console/include/class/WebServerModuleDebug.class.php b/pandora_console/include/class/WebServerModuleDebug.class.php index e0e6f23c84..26bbb8b2f1 100644 --- a/pandora_console/include/class/WebServerModuleDebug.class.php +++ b/pandora_console/include/class/WebServerModuleDebug.class.php @@ -81,7 +81,7 @@ class WebServerModuleDebug extends Wizard if (! check_acl($config['id_user'], 0, 'AR')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access event viewer' ); diff --git a/pandora_console/include/constants.php b/pandora_console/include/constants.php index f2b73b332d..ba7ef746da 100644 --- a/pandora_console/include/constants.php +++ b/pandora_console/include/constants.php @@ -769,3 +769,30 @@ define('COMMAND_PING', 2); define('COMMAND_SNMP', 3); define('COMMAND_NMAP', 4); define('COMMAND_DIGWHOIS', 5); + +// Audit logs. +define('AUDIT_LOG_SETUP', 'Setup'); +define('AUDIT_LOG_SYSTEM', 'System'); +define('AUDIT_LOG_HACK_ATTEMPT', 'HACK Attempt'); +define('AUDIT_LOG_ACL_VIOLATION', 'ACL Violation'); +define('AUDIT_LOG_METACONSOLE_NODE', 'Metaconsole node'); +define('AUDIT_LOG_USER_REGISTRATION', 'Console user registration'); +define('AUDIT_LOG_EXTENSION_MANAGER', 'Extension manager'); +define('AUDIT_LOG_WEB_SOCKETS', 'WebSockets engine'); +define('AUDIT_LOG_USER_MANAGEMENT', 'User management'); +define('AUDIT_LOG_AGENT_MANAGEMENT', 'Agent management'); +define('AUDIT_LOG_MODULE_MANAGEMENT', 'Module management'); +define('AUDIT_LOG_CATEGORY_MANAGEMENT', 'Category management'); +define('AUDIT_LOG_REPORT_MANAGEMENT', 'Report management'); +define('AUDIT_LOG_MASSIVE_MANAGEMENT', 'Massive operation management'); +define('AUDIT_LOG_POLICY_MANAGEMENT', 'Policy management'); +define('AUDIT_LOG_AGENT_REMOTE_MANAGEMENT', 'Agent remote configuration'); +define('AUDIT_LOG_FILE_COLLECTION', 'File collection'); +define('AUDIT_LOG_ALERT_MANAGEMENT', 'Alert management'); +define('AUDIT_LOG_ALERT_CORRELATION_MANAGEMENT', 'Alert correlation management'); +define('AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT', 'Visual Console Management'); +define('AUDIT_LOG_TAG_MANAGEMENT', 'Tag management'); +define('AUDIT_LOG_SNMP_MANAGEMENT', 'SNMP management'); +define('AUDIT_LOG_DASHBOARD_MANAGEMENT', 'Dashboard management'); +define('AUDIT_LOG_SERVICE_MANAGEMENT', 'Service management'); +define('AUDIT_LOG_INCIDENT_MANAGEMENT', 'Incident management'); diff --git a/pandora_console/include/functions.php b/pandora_console/include/functions.php index baaa10a317..d66612128e 100644 --- a/pandora_console/include/functions.php +++ b/pandora_console/include/functions.php @@ -2282,7 +2282,11 @@ function check_login($output=true) return false; } - db_pandora_audit('No session', 'Trying to access without a valid session', 'N/A'); + db_pandora_audit( + AUDIT_LOG_HACK_ATTEMPT, + 'Trying to access without a valid session', + 'N/A' + ); include $config['homedir'].'/general/noaccess.php'; exit; } @@ -5963,7 +5967,13 @@ function send_test_email( $result = $mailer->send($message); } catch (Exception $e) { error_log($e->getMessage()); - db_pandora_audit('Cron jobs mail', $e->getMessage()); + db_pandora_audit( + AUDIT_LOG_SYSTEM, + sprintf( + 'Cron jobs mail: %s', + $e->getMessage() + ) + ); } return $result; diff --git a/pandora_console/include/functions_agents.php b/pandora_console/include/functions_agents.php index 6fd1f7cc65..91bdfd2fe1 100644 --- a/pandora_console/include/functions_agents.php +++ b/pandora_console/include/functions_agents.php @@ -272,7 +272,10 @@ function agents_create_agent( agents_add_address($id_agent, $ip_address); } - db_pandora_audit('Agent management', 'New agent '.$name.' created'); + db_pandora_audit( + AUDIT_LOG_AGENT_MANAGEMENT, + 'New agent '.$name.' created' + ); return $id_agent; } @@ -2116,7 +2119,7 @@ function agents_delete_address($id_agent, $ip_address) $agent_name = agents_get_name($id_agent, ''); db_pandora_audit( - 'Agent management', + AUDIT_LOG_AGENT_MANAGEMENT, "Deleted IP $ip_address from agent '$agent_name'" ); @@ -2584,12 +2587,12 @@ function agents_delete_agent($id_agents, $disableACL=false) error_log($e->getMessage().' in '.$e->getFile().':'.$e->getLine()); } - // The status of the module + // The status of the module. db_process_delete_temp('tagente_estado', 'id_agente', $id_agent); // The actual modules, don't put anything based on // DONT Delete this, just mark for deletion - // db_process_delete_temp ("tagente_modulo", "id_agente", $id_agent); + // db_process_delete_temp ("tagente_modulo", "id_agente", $id_agent);. db_process_sql_update( 'tagente_modulo', [ @@ -2603,11 +2606,11 @@ function agents_delete_agent($id_agents, $disableACL=false) // Access entries // Dont delete here, this records are deleted in daily script // db_process_delete_temp ("tagent_access", "id_agent", $id_agent); - // Delete agent policies + // Delete agent policies. enterprise_include_once('include/functions_policies.php'); enterprise_hook('policies_delete_agent', [$id_agent]); - if (enterprise_installed()) { + if (enterprise_installed() === true) { // Delete agent in networkmap. enterprise_include_once('include/functions_networkmap.php'); networkmap_delete_nodes_by_agent([$id_agent]); @@ -2646,12 +2649,12 @@ function agents_delete_agent($id_agents, $disableACL=false) ); } - // tagente_datos_inc - // Dont delete here, this records are deleted later, in database script + // Tagente_datos_inc. + // Dont delete here, this records are deleted later, in database script. // db_process_delete_temp ("tagente_datos_inc", "id_agente_modulo", $where_modules, true); - // Delete remote configuration - if (enterprise_installed()) { - if (isset($config['remote_config'])) { + // Delete remote configuration. + if (enterprise_installed() === true) { + if (isset($config['remote_config']) === true) { enterprise_include_once('include/functions_config_agents.php'); if (enterprise_hook('config_agents_has_remote_configuration', [$id_agent])) { $agent_name = agents_get_name($id_agent); @@ -2659,47 +2662,45 @@ function agents_delete_agent($id_agents, $disableACL=false) $agent_alias = io_safe_output(agents_get_alias($id_agent)); $agent_md5 = md5($agent_name, false); - // Agent remote configuration editor + // Agent remote configuration editor. $file_name = $config['remote_config'].'/conf/'.$agent_md5.'.conf'; $error = !@unlink($file_name); - if (!$error) { + if ((bool) $error === false) { $file_name = $config['remote_config'].'/md5/'.$agent_md5.'.md5'; $error = !@unlink($file_name); - } - - if ($error) { + } else { db_pandora_audit( - 'Agent management', - "Error: Deleted agent $agent_alias, the error is in the delete conf or md5." + AUDIT_LOG_AGENT_MANAGEMENT, + sprintf('Error: Deleted agent %s, the error is in the delete conf or md5.', $agent_alias) ); } } } } - // And at long last, the agent + // And at long last, the agent. db_process_delete_temp('tagente', 'id_agente', $id_agent); db_process_sql('delete from ttag_module where id_agente_modulo in (select id_agente_modulo from tagente_modulo where id_agente = '.$id_agent.')'); db_pandora_audit( - 'Agent management', - "Deleted agent $agent_alias" + AUDIT_LOG_AGENT_MANAGEMENT, + sprintf('Deleted agent %s', $agent_alias) ); - // Delete the agent from the metaconsole cache + // Delete the agent from the metaconsole cache. enterprise_include_once('include/functions_agents.php'); enterprise_hook('agent_delete_from_cache', [$id_agent]); - // Break the loop on error - if ($error) { + // Break the loop on error. + if ((bool) $error === true) { break; } } - if ($error) { + if ((bool) $error === true) { return false; } else { return true; diff --git a/pandora_console/include/functions_alerts.php b/pandora_console/include/functions_alerts.php index 1ffc240f1d..7180595c12 100644 --- a/pandora_console/include/functions_alerts.php +++ b/pandora_console/include/functions_alerts.php @@ -2617,7 +2617,7 @@ function alerts_ui_update_or_create_actions($update=true) if ($al_action['id_group'] == 0) { if (! check_acl($config['id_user'], 0, 'PM') && ! check_acl($config['id_user'], 0, 'LM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert Management' ); include 'general/noaccess.php'; @@ -2717,7 +2717,7 @@ function alerts_ui_update_or_create_actions($update=true) if ($result) { db_pandora_audit( - 'Command management', + AUDIT_LOG_ALERT_MANAGEMENT, $update ? 'Update alert action #'.$id : 'Create alert action #'.$result, false, false, @@ -2725,7 +2725,7 @@ function alerts_ui_update_or_create_actions($update=true) ); } else { db_pandora_audit( - 'Command management', + AUDIT_LOG_ALERT_MANAGEMENT, $update ? 'Fail try to update alert action #'.$id : 'Fail try to create alert action', false, false, diff --git a/pandora_console/include/functions_api.php b/pandora_console/include/functions_api.php index b077a14654..8f5483b6a2 100644 --- a/pandora_console/include/functions_api.php +++ b/pandora_console/include/functions_api.php @@ -2099,7 +2099,7 @@ function api_set_new_agent($thrash1, $thrash2, $other, $thrash3) $unsafe_alias = io_safe_output($alias); db_pandora_audit( - 'Agent management', + AUDIT_LOG_AGENT_MANAGEMENT, 'Created agent '.$unsafe_alias, false, true, @@ -15083,21 +15083,30 @@ function api_set_new_cluster($thrash1, $thrash2, $other, $thrash3) $id_module = modules_create_agent_module($id_agent, $values_module['nombre'], $values_module, true); if ($id_module === false) { - db_pandora_audit('Report management', "Failed to create cluster status module in cluster $name (#$id_agent)"); + db_pandora_audit( + AUDIT_LOG_REPORT_MANAGEMENT, + "Failed to create cluster status module in cluster $name (#$id_agent)" + ); } } - if ($id_cluster !== false) { - db_pandora_audit('Report management', "Created cluster $name (#$id_cluster)"); - } else { - db_pandora_audit('Report management', "Failed to create cluster $name"); - } + $auditMessageCluster = ((bool) $id_cluster === true) + ? sprintf('Created new cluster %s (#%s)', $name, $id_cluster) + : sprintf('Failed to create cluster %s ', $name); - if ($id_agent !== false) { - db_pandora_audit('Report management', "Created new cluster agent $name (#$id_agent)"); - } else { - db_pandora_audit('Report management', "Failed to create cluster agent $name"); - } + db_pandora_audit( + AUDIT_LOG_REPORT_MANAGEMENT, + $auditMessageCluster + ); + + $auditMessageAgent = ((bool) $id_agent === true) + ? sprintf('Created new cluster agent %s (#%s)', $name, $id_agent) + : sprintf('Failed to create cluster agent %s ', $name); + + db_pandora_audit( + AUDIT_LOG_REPORT_MANAGEMENT, + $auditMessageAgent + ); if ($id_cluster !== false) { returnData( @@ -15222,9 +15231,15 @@ function api_set_add_cluster_item($thrash1, $thrash2, $other, $thrash3) ); if ($tcluster_module !== false) { - db_pandora_audit('Report management', 'Module #'.$element['name'].' assigned to cluster #'.$element['id_cluster']); + db_pandora_audit( + AUDIT_LOG_REPORT_MANAGEMENT, + 'Module #'.$element['name'].' assigned to cluster #'.$element['id_cluster'] + ); } else { - db_pandora_audit('Report management', 'Failed to assign AA item module to cluster '.$element['name']); + db_pandora_audit( + AUDIT_LOG_REPORT_MANAGEMENT, + 'Failed to assign AA item module to cluster '.$element['name'] + ); } } else if ($element['type'] == 'AP') { $id_agent = db_get_value_sql('SELECT id_agent FROM tcluster WHERE id = '.$element['id_cluster']); @@ -15287,9 +15302,15 @@ function api_set_add_cluster_item($thrash1, $thrash2, $other, $thrash3) ); if ($tcluster_balanced_module !== false) { - db_pandora_audit('Report management', 'Module #'.$element['name'].' assigned to cluster #'.$element['id_cluster']); + db_pandora_audit( + AUDIT_LOG_REPORT_MANAGEMENT, + 'Module #'.$element['name'].' assigned to cluster #'.$element['id_cluster'] + ); } else { - db_pandora_audit('Report management', 'The module could not be assigned to the cluster'); + db_pandora_audit( + AUDIT_LOG_REPORT_MANAGEMENT, + 'The module could not be assigned to the cluster' + ); } } } @@ -16675,16 +16696,32 @@ function api_set_access_process($thrash1, $thrash2, $other, $returnType) } } else { // There is no administrator user who has logged in since then to log us in. - db_pandora_audit($other['data'][3].' Logon', 'Logged in '.$other['data'][3].' node '.$other['data'][2], $other['data'][0]); + db_pandora_audit( + AUDIT_LOG_USER_REGISTRATION, + 'Logged in '.$other['data'][3].' node '.$other['data'][2], + $other['data'][0] + ); returnData('string', ['type' => 'string', 'data' => 'free']); } } else if ($other['data'][1] == 'logout') { // The administrator user wants to log out - db_pandora_audit($other['data'][3].' Logoff', 'Logout from '.$other['data'][3].' node '.$other['data'][2], $other['data'][0]); + db_pandora_audit( + AUDIT_LOG_USER_REGISTRATION, + 'Logout from '.$other['data'][3].' node '.$other['data'][2], + $other['data'][0] + ); } else if ($other['data'][1] == 'exclude') { // The administrator user has ejected another administrator user who was logged in - db_pandora_audit($other['data'][3].' Logon', 'Logged in '.$other['data'][3].' node '.$other['data'][2], $other['data'][0]); - db_pandora_audit($other['data'][3].' Logoff', 'Logout from '.$other['data'][3].' node '.$other['data'][2], $audit_concurrence[0]['id_usuario']); + db_pandora_audit( + AUDIT_LOG_USER_REGISTRATION, + 'Logged in '.$other['data'][3].' node '.$other['data'][2], + $other['data'][0] + ); + db_pandora_audit( + AUDIT_LOG_USER_REGISTRATION, + 'Logout from '.$other['data'][3].' node '.$other['data'][2], + $audit_concurrence[0]['id_usuario'] + ); } // The admin user is trying to browse else if ($other['data'][1] == 'browse') { @@ -16704,23 +16741,39 @@ function api_set_access_process($thrash1, $thrash2, $other, $returnType) } } else if ($other['data'][1] == 'cancelled') { // The administrator user tries to log in having another administrator logged in, but instead of expelling him he cancels his log in. - db_pandora_audit($other['data'][3].' cancelled access', 'Cancelled access in '.$other['data'][3].' node '.$other['data'][2], $other['data'][0]); + db_pandora_audit( + AUDIT_LOG_USER_REGISTRATION, + 'Cancelled access in '.$other['data'][3].' node '.$other['data'][2], + $other['data'][0] + ); returnData('string', ['type' => 'string', 'data' => 'cancelled']); } } else { if ($other['data'][4] == 1) { // The user trying to log in is not an administrator and is not allowed no admin access - db_pandora_audit($other['data'][3].' denied access', 'Denied access to non-admin user '.$other['data'][3].' node '.$other['data'][2], $other['data'][0]); + db_pandora_audit( + AUDIT_LOG_USER_REGISTRATION, + 'Denied access to non-admin user '.$other['data'][3].' node '.$other['data'][2], + $other['data'][0] + ); returnData('string', ['type' => 'string', 'data' => 'denied']); } else { // The user trying to log in is not an administrator and is allowed no admin access if ($other['data'][1] == 'login') { // The user trying to login is not admin, can enter without concurrent use filter - db_pandora_audit($other['data'][3].' Logon', 'Logged in '.$other['data'][3].' node '.$other['data'][2], $other['data'][0]); + db_pandora_audit( + AUDIT_LOG_USER_REGISTRATION, + 'Logged in '.$other['data'][3].' node '.$other['data'][2], + $other['data'][0] + ); returnData('string', ['type' => 'string', 'data' => 'free']); } else if ($other['data'][1] == 'logout') { // The user trying to logoff is not admin - db_pandora_audit($other['data'][3].' Logoff', 'Logout from '.$other['data'][3].' node '.$other['data'][2], $other['data'][0]); + db_pandora_audit( + AUDIT_LOG_USER_REGISTRATION, + 'Logout from '.$other['data'][3].' node '.$other['data'][2], + $other['data'][0] + ); } else if ($other['data'][1] == 'browse') { // The user trying to browse in an app page is not admin, can enter without concurrent use filter returnData('string', ['type' => 'string', 'data' => 'free']); diff --git a/pandora_console/include/functions_config.php b/pandora_console/include/functions_config.php index 27e976d486..ccf315072f 100644 --- a/pandora_console/include/functions_config.php +++ b/pandora_console/include/functions_config.php @@ -1,6 +1,6 @@ > updated.', $token) + ); + } + return (bool) $result; } } @@ -126,7 +138,7 @@ function config_update_config() include_once $config['homedir'].'/include/functions_io.php'; // If user is not even log it, don't try this. - if (! isset($config['id_user'])) { + if (isset($config['id_user']) === false) { $config['error_config_update_config'] = []; $config['error_config_update_config']['correct'] = false; $config['error_config_update_config']['message'] = __('Failed updated: User did not login.'); @@ -144,9 +156,7 @@ function config_update_config() $update_config = (bool) get_parameter('update_config'); - if ($update_config) { - db_pandora_audit('Setup', 'Setup has changed'); - } else { + if ($update_config === false) { // Do nothing. return false; } @@ -164,39 +174,39 @@ function config_update_config() // Setup now is divided in different tabs. switch ($section_setup) { case 'general': - if (!config_update_value('language', (string) get_parameter('language'))) { + if (config_update_value('language', (string) get_parameter('language'), true) === false) { $error_update[] = __('Language settings'); } - if (!config_update_value('remote_config', (string) get_parameter('remote_config'))) { + if (config_update_value('remote_config', (string) get_parameter('remote_config'), true) === false) { $error_update[] = __('Remote config directory'); } - if (!config_update_value('phantomjs_bin', (string) get_parameter('phantomjs_bin'))) { + if (config_update_value('phantomjs_bin', (string) get_parameter('phantomjs_bin'), true) === false) { $error_update[] = __('phantomjs config directory'); } - if (!config_update_value('loginhash_pwd', io_input_password((string) get_parameter('loginhash_pwd')))) { + if (config_update_value('loginhash_pwd', io_input_password((string) get_parameter('loginhash_pwd')), true) === false) { $error_update[] = __('Auto login (hash) password'); } - if (!config_update_value('timesource', (string) get_parameter('timesource'))) { + if (config_update_value('timesource', (string) get_parameter('timesource'), true) === false) { $error_update[] = __('Time source'); } - if (!config_update_value('autoupdate', (bool) get_parameter('autoupdate'))) { + if (config_update_value('autoupdate', (bool) get_parameter('autoupdate'), true) === false) { $error_update[] = __('Automatic check for updates'); } - if (!config_update_value('cert_path', get_parameter('cert_path'))) { + if (config_update_value('cert_path', get_parameter('cert_path'), true) === false) { $error_update[] = __('SSL cert path'); } - if (!config_update_value('https', (bool) get_parameter('https'))) { + if (config_update_value('https', (bool) get_parameter('https'), true) === false) { $error_update[] = __('Enforce https'); } - if (!config_update_value('use_cert', (bool) get_parameter('use_cert'))) { + if (config_update_value('use_cert', (bool) get_parameter('use_cert'), true) === false) { $error_update[] = __('Use cert.'); } @@ -209,57 +219,55 @@ function config_update_config() "Path doesn't exists or is not writable" ); } else { - if (config_update_value('attachment_store', $attachment_store) === false) { + if (config_update_value('attachment_store', $attachment_store, true) === false) { $error_update[] = __( 'Attachment store.' ); } } - if (!config_update_value('list_ACL_IPs_for_API', (string) get_parameter('list_ACL_IPs_for_API'))) { + if (config_update_value('list_ACL_IPs_for_API', (string) get_parameter('list_ACL_IPs_for_API'), true) === false) { $error_update[] = __('IP list with API access'); } - if (!config_update_value('api_password', io_input_password(get_parameter('api_password')))) { + if (config_update_value('api_password', io_input_password(get_parameter('api_password')), true) === false) { $error_update[] = __('API password'); } - if (!config_update_value('activate_gis', (bool) get_parameter('activate_gis'))) { + if (config_update_value('activate_gis', (bool) get_parameter('activate_gis'), true) === false) { $error_update[] = __('Enable GIS features'); } - if (!config_update_value('integria_inventory', get_parameter('integria_inventory'))) { + if (config_update_value('integria_inventory', get_parameter('integria_inventory'), true) === false) { $error_update[] = __('Integria inventory'); } - if (!config_update_value('integria_api_password', io_input_password(get_parameter('integria_api_password')))) { + if (config_update_value('integria_api_password', io_input_password(get_parameter('integria_api_password')), true) === false) { $error_update[] = __('Integria API password'); } - if (!config_update_value('integria_url', get_parameter('integria_url'))) { + if (config_update_value('integria_url', get_parameter('integria_url'), true) === false) { $error_update[] = __('Integria URL'); } - if (!config_update_value('activate_netflow', (bool) get_parameter('activate_netflow'))) { + if (config_update_value('activate_netflow', (bool) get_parameter('activate_netflow'), true) === false) { $error_update[] = __('Enable Netflow'); } $timezone = (string) get_parameter('timezone'); - if ($timezone != '') { - if (!config_update_value('timezone', $timezone)) { - $error_update[] = __('Timezone setup'); - } + if (empty($timezone) === true || config_update_value('timezone', $timezone, true) === false) { + $error_update[] = __('Timezone setup'); } - if (!config_update_value('sound_alert', get_parameter('sound_alert'))) { + if (config_update_value('sound_alert', get_parameter('sound_alert'), true) === false) { $error_update[] = __('Sound for Alert fired'); } - if (!config_update_value('sound_critical', get_parameter('sound_critical'))) { + if (config_update_value('sound_critical', get_parameter('sound_critical'), true) === false) { $error_update[] = __('Sound for Monitor critical'); } - if (!config_update_value('sound_warning', get_parameter('sound_warning'))) { + if (config_update_value('sound_warning', get_parameter('sound_warning'), true) === false) { $error_update[] = __('Sound for Monitor warning'); } @@ -268,7 +276,7 @@ function config_update_config() if ($update_manager_installed == 1) { $license_info_key = get_parameter('license_info_key', ''); - if (!empty($license_info_key)) { + if (empty($license_info_key) === false) { $values = [db_escape_key_identifier('value') => $license_info_key]; $where = [db_escape_key_identifier('key') => 'customer_key']; $update_manage_settings_result = db_process_sql_update('tupdate_settings', $values, $where); @@ -278,253 +286,253 @@ function config_update_config() } } - if (!config_update_value('public_url', get_parameter('public_url'))) { + if (config_update_value('public_url', get_parameter('public_url'), true) === false) { $error_update[] = __('Public URL'); } - if (!config_update_value('force_public_url', get_parameter_switch('force_public_url'))) { + if (config_update_value('force_public_url', get_parameter_switch('force_public_url'), true) === false) { $error_update[] = __('Force use Public URL'); } - if (!config_update_value('public_url_exclusions', get_parameter('public_url_exclusions'))) { + if (config_update_value('public_url_exclusions', get_parameter('public_url_exclusions'), true) === false) { $error_update[] = __('Public URL host exclusions'); } - if (!config_update_value('referer_security', get_parameter('referer_security'))) { + if (config_update_value('referer_security', get_parameter('referer_security'), true) === false) { $error_update[] = __('Referer security'); } - if (!config_update_value('event_storm_protection', get_parameter('event_storm_protection', 0))) { + if (config_update_value('event_storm_protection', get_parameter('event_storm_protection', 0), true) === false) { $error_update[] = __('Event storm protection'); } - if (!config_update_value('command_snapshot', get_parameter('command_snapshot'))) { + if (config_update_value('command_snapshot', get_parameter('command_snapshot'), true) === false) { $error_update[] = __('Command Snapshot'); } - if (!config_update_value('use_custom_encoding', get_parameter('use_custom_encoding', 0))) { + if (config_update_value('use_custom_encoding', get_parameter('use_custom_encoding', 0), true) === false) { $error_update[] = __('Use custom encoding'); } - if (!config_update_value('server_log_dir', io_safe_input(strip_tags(io_safe_output(get_parameter('server_log_dir')))))) { + if (config_update_value('server_log_dir', io_safe_input(strip_tags(io_safe_output(get_parameter('server_log_dir')))), true) === false) { $error_update[] = __('Server logs directory'); } - if (!config_update_value('max_log_size', get_parameter('max_log_size'))) { + if (config_update_value('max_log_size', get_parameter('max_log_size'), true) === false) { $error_update[] = __('Log size limit in system logs viewer extension'); } - if (!config_update_value('tutorial_mode', get_parameter('tutorial_mode'))) { + if (config_update_value('tutorial_mode', get_parameter('tutorial_mode'), true) === false) { $error_update[] = __('Tutorial mode'); } - if (!config_update_value('past_planned_downtimes', get_parameter('past_planned_downtimes'))) { + if (config_update_value('past_planned_downtimes', get_parameter('past_planned_downtimes'), true) === false) { $error_update[] = __('Allow create scheduled downtimes in the past'); } - if (!config_update_value('limit_parameters_massive', get_parameter('limit_parameters_massive'))) { + if (config_update_value('limit_parameters_massive', get_parameter('limit_parameters_massive'), true) === false) { $error_update[] = __('Limit parameters bulk'); } - if (!config_update_value('identification_reminder', get_parameter('identification_reminder'))) { + if (config_update_value('identification_reminder', get_parameter('identification_reminder'), true) === false) { $error_update[] = __('Identification_reminder'); } - if (!config_update_value('include_agents', (bool) get_parameter('include_agents'))) { + if (config_update_value('include_agents', (bool) get_parameter('include_agents'), true) === false) { $error_update[] = __('Include_agents'); } - if (!config_update_value('alias_as_name', get_parameter('alias_as_name'))) { + if (config_update_value('alias_as_name', get_parameter('alias_as_name'), true) === false) { $error_update[] = __('alias_as_name'); } - if (!config_update_value('console_log_enabled', get_parameter('console_log_enabled'))) { + if (config_update_value('console_log_enabled', get_parameter('console_log_enabled'), true) === false) { $error_update[] = __('Console log enabled'); } - if (!config_update_value('audit_log_enabled', get_parameter('audit_log_enabled'))) { + if (config_update_value('audit_log_enabled', get_parameter('audit_log_enabled'), true) === false) { $error_update[] = __('Audit log enabled'); } - if (!config_update_value('module_custom_id_ro', get_parameter('module_custom_id_ro'))) { + if (config_update_value('module_custom_id_ro', get_parameter('module_custom_id_ro'), true) === false) { $error_update[] = __('Module Custom ID read only'); } - if (!config_update_value('unique_ip', get_parameter('unique_ip'))) { - $error_update[] = __('unique_ip'); + if (config_update_value('unique_ip', get_parameter('unique_ip'), true) === false) { + $error_update[] = __('Unique IP'); } - if (!config_update_value('email_smtpServer', get_parameter('email_smtpServer'))) { + if (config_update_value('email_smtpServer', get_parameter('email_smtpServer'), true) === false) { $error_update[] = __('Server SMTP'); } - if (!config_update_value('email_from_dir', get_parameter('email_from_dir'))) { + if (config_update_value('email_from_dir', get_parameter('email_from_dir'), true) === false) { $error_update[] = __('From dir'); } - if (!config_update_value('email_from_name', get_parameter('email_from_name'))) { + if (config_update_value('email_from_name', get_parameter('email_from_name'), true) === false) { $error_update[] = __('From name'); } - if (!config_update_value('email_smtpPort', (int) get_parameter('email_smtpPort'))) { + if (config_update_value('email_smtpPort', (int) get_parameter('email_smtpPort'), true) === false) { $error_update[] = __('Port SMTP'); } - if (!config_update_value('email_encryption', get_parameter('email_encryption'))) { + if (config_update_value('email_encryption', get_parameter('email_encryption'), true) === false) { $error_update[] = __('Encryption'); } - if (!config_update_value('email_username', get_parameter('email_username'))) { + if (config_update_value('email_username', get_parameter('email_username'), true) === false) { $error_update[] = __('Email user'); } - if (!config_update_value('email_password', io_input_password(get_parameter('email_password')))) { + if (config_update_value('email_password', io_input_password(get_parameter('email_password')), true) === false) { $error_update[] = __('Email password'); } break; case 'enterprise': - if (isset($config['enterprise_installed']) && $config['enterprise_installed'] == 1) { - if (!config_update_value('trap2agent', (string) get_parameter('trap2agent'))) { + if (isset($config['enterprise_installed']) === true && (bool) $config['enterprise_installed'] === true) { + if (config_update_value('trap2agent', (string) get_parameter('trap2agent'), true) === false) { $error_update[] = __('Forward SNMP traps to agent (if exist)'); } - if (!config_update_value('acl_enterprise', get_parameter('acl_enterprise'))) { + if (config_update_value('acl_enterprise', get_parameter('acl_enterprise'), true) === false) { $error_update[] = __('Use Enterprise ACL System'); } - if (!config_update_value('metaconsole', get_parameter('metaconsole'))) { + if (config_update_value('metaconsole', get_parameter('metaconsole'), true) === false) { $error_update[] = __('Activate Metaconsole'); } - if (!config_update_value('collection_max_size', get_parameter('collection_max_size'))) { + if (config_update_value('collection_max_size', get_parameter('collection_max_size'), true) === false) { $error_update[] = __('Size of collection'); } - if (!config_update_value('event_replication', (int) get_parameter('event_replication'))) { + if (config_update_value('event_replication', (int) get_parameter('event_replication'), true) === false) { $error_update[] = __('Events replication'); } - if ((int) get_parameter('event_replication') == 1) { - if (!config_update_value('replication_interval', (int) get_parameter('replication_interval'))) { + if ((int) get_parameter('event_replication') === 1) { + if (config_update_value('replication_interval', (int) get_parameter('replication_interval'), true) === false) { $error_update[] = __('Replication interval'); } - if (!config_update_value('replication_limit', (int) get_parameter('replication_limit'))) { + if (config_update_value('replication_limit', (int) get_parameter('replication_limit'), true) === false) { $error_update[] = __('Replication limit'); } - if (!config_update_value('replication_mode', (string) get_parameter('replication_mode'))) { + if (config_update_value('replication_mode', (string) get_parameter('replication_mode'), true) === false) { $error_update[] = __('Replication mode'); } - if (!config_update_value('show_events_in_local', (string) get_parameter('show_events_in_local'))) { + if (config_update_value('show_events_in_local', (string) get_parameter('show_events_in_local'), true) === false) { $error_update[] = __('Show events list in local console (read only)'); } } - if (!config_update_value('replication_dbengine', (string) get_parameter('replication_dbengine'))) { + if (config_update_value('replication_dbengine', (string) get_parameter('replication_dbengine'), true) === false) { $error_update[] = __('Replication DB engine'); } - if (!config_update_value('replication_dbhost', (string) get_parameter('replication_dbhost'))) { + if (config_update_value('replication_dbhost', (string) get_parameter('replication_dbhost'), true) === false) { $error_update[] = __('Replication DB host'); } - if (!config_update_value('replication_dbname', (string) get_parameter('replication_dbname'))) { + if (config_update_value('replication_dbname', (string) get_parameter('replication_dbname'), true) === false) { $error_update[] = __('Replication DB database'); } - if (!config_update_value('replication_dbuser', (string) get_parameter('replication_dbuser'))) { + if (config_update_value('replication_dbuser', (string) get_parameter('replication_dbuser'), true) === false) { $error_update[] = __('Replication DB user'); } - if (!config_update_value('replication_dbpass', io_input_password((string) get_parameter('replication_dbpass')))) { + if (config_update_value('replication_dbpass', io_input_password((string) get_parameter('replication_dbpass')), true) === false) { $error_update[] = __('Replication DB password'); } - if (!config_update_value('replication_dbport', (string) get_parameter('replication_dbport'))) { + if (config_update_value('replication_dbport', (string) get_parameter('replication_dbport'), true) === false) { $error_update[] = __('Replication DB port'); } - if (!config_update_value('metaconsole_agent_cache', (int) get_parameter('metaconsole_agent_cache'))) { + if (config_update_value('metaconsole_agent_cache', (int) get_parameter('metaconsole_agent_cache'), true) === false) { $error_update[] = __('Metaconsole agent cache'); } - if (!config_update_value('log_collector', (bool) get_parameter('log_collector'))) { + if (config_update_value('log_collector', (bool) get_parameter('log_collector'), true) === false) { $error_update[] = __('Activate Log Collector'); } - if (!config_update_value('enable_update_manager', get_parameter('enable_update_manager'))) { + if (config_update_value('enable_update_manager', get_parameter('enable_update_manager'), true) === false) { $error_update[] = __('Enable Update Manager'); } - if (!config_update_value('ipam_ocuppied_critical_treshold', get_parameter('ipam_ocuppied_critical_treshold'))) { + if (config_update_value('ipam_ocuppied_critical_treshold', get_parameter('ipam_ocuppied_critical_treshold'), true) === false) { $error_update[] = __('Ipam Ocuppied Manager Critical'); } - if (!config_update_value('ipam_ocuppied_warning_treshold', get_parameter('ipam_ocuppied_warning_treshold'))) { + if (config_update_value('ipam_ocuppied_warning_treshold', get_parameter('ipam_ocuppied_warning_treshold'), true) === false) { $error_update[] = __('Ipam Ocuppied Manager Warning'); } - if (!config_update_value('sap_license', get_parameter('sap_license'))) { + if (config_update_value('sap_license', get_parameter('sap_license'), true) === false) { $error_update[] = __('SAP/R3 Plugin Licence'); } $inventory_changes_blacklist = get_parameter('inventory_changes_blacklist', []); - if (!config_update_value('inventory_changes_blacklist', implode(',', $inventory_changes_blacklist))) { + if (config_update_value('inventory_changes_blacklist', implode(',', $inventory_changes_blacklist), true) === false) { $error_update[] = __('Inventory changes blacklist'); } } break; case 'pass': - if (isset($config['enterprise_installed']) && $config['enterprise_installed'] == 1) { - if (!config_update_value('enable_pass_policy', get_parameter('enable_pass_policy'))) { + if (isset($config['enterprise_installed']) === true && (bool) $config['enterprise_installed'] === 1) { + if (config_update_value('enable_pass_policy', get_parameter('enable_pass_policy'), true) === false) { $error_update[] = __('Enable password policy'); } - if (!config_update_value('pass_size', get_parameter('pass_size'))) { + if (config_update_value('pass_size', get_parameter('pass_size'), true) === false) { $error_update[] = __('Min. size password'); } - if (!config_update_value('pass_expire', get_parameter('pass_expire'))) { + if (config_update_value('pass_expire', get_parameter('pass_expire'), true) === false) { $error_update[] = __('Password expiration'); } - if (!config_update_value('first_login', get_parameter('first_login'))) { + if (config_update_value('first_login', get_parameter('first_login'), true) === false) { $error_update[] = __('Force change password on first login'); } - if (!config_update_value('mins_fail_pass', get_parameter('mins_fail_pass'))) { + if (config_update_value('mins_fail_pass', get_parameter('mins_fail_pass'), true) === false) { $error_update[] = __('User blocked if login fails'); } - if (!config_update_value('number_attempts', get_parameter('number_attempts'))) { + if (config_update_value('number_attempts', get_parameter('number_attempts'), true) === false) { $error_update[] = __('Number of failed login attempts'); } - if (!config_update_value('pass_needs_numbers', get_parameter('pass_needs_numbers'))) { + if (config_update_value('pass_needs_numbers', get_parameter('pass_needs_numbers'), true) === false) { $error_update[] = __('Password must have numbers'); } - if (!config_update_value('pass_needs_symbols', get_parameter('pass_needs_symbols'))) { + if (config_update_value('pass_needs_symbols', get_parameter('pass_needs_symbols'), true) === false) { $error_update[] = __('Password must have symbols'); } - if (!config_update_value('enable_pass_policy_admin', get_parameter('enable_pass_policy_admin'))) { + if (config_update_value('enable_pass_policy_admin', get_parameter('enable_pass_policy_admin'), true) === false) { $error_update[] = __('Apply password policy to admin users'); } - if (!config_update_value('enable_pass_history', get_parameter('enable_pass_history'))) { + if (config_update_value('enable_pass_history', get_parameter('enable_pass_history'), true) === false) { $error_update[] = __('Enable password history'); } - if (!config_update_value('compare_pass', get_parameter('compare_pass'))) { + if (config_update_value('compare_pass', get_parameter('compare_pass'), true) === false) { $error_update[] = __('Compare previous password'); } - if (!config_update_value('reset_pass_option', (bool) get_parameter('reset_pass_option'))) { + if (config_update_value('reset_pass_option', (bool) get_parameter('reset_pass_option'), true) === false) { $error_update[] = __('Activate reset password'); } } @@ -532,738 +540,736 @@ function config_update_config() case 'auth': // AUTHENTICATION SETUP. - if (!config_update_value('auth', get_parameter('auth'))) { + if (config_update_value('auth', get_parameter('auth'), true) === false) { $error_update[] = __('Authentication method'); } - if (!config_update_value('autocreate_remote_users', get_parameter('autocreate_remote_users'))) { + if (config_update_value('autocreate_remote_users', get_parameter('autocreate_remote_users'), true) === false) { $error_update[] = __('Autocreate remote users'); } - if (!config_update_value('default_remote_profile', get_parameter('default_remote_profile'))) { + if (config_update_value('default_remote_profile', get_parameter('default_remote_profile'), true) === false) { $error_update[] = __('Autocreate profile'); } - if (!config_update_value('default_remote_group', get_parameter('default_remote_group'))) { + if (config_update_value('default_remote_group', get_parameter('default_remote_group'), true) === false) { $error_update[] = __('Autocreate profile group'); } - if (!config_update_value('default_assign_tags', implode(',', get_parameter('default_assign_tags')))) { + if (config_update_value('default_assign_tags', implode(',', get_parameter('default_assign_tags')), true) === false) { $error_update[] = __('Autocreate profile tags'); } - if (!config_update_value('default_no_hierarchy', (int) get_parameter('default_no_hierarchy'))) { + if (config_update_value('default_no_hierarchy', (int) get_parameter('default_no_hierarchy'), true) === false) { $error_update[] = __('Automatically assigned no hierarchy'); } - if (!config_update_value('autocreate_blacklist', get_parameter('autocreate_blacklist'))) { + if (config_update_value('autocreate_blacklist', get_parameter('autocreate_blacklist'), true) === false) { $error_update[] = __('Autocreate blacklist'); } - if (!config_update_value('ad_server', get_parameter('ad_server'))) { + if (config_update_value('ad_server', get_parameter('ad_server'), true) === false) { $error_update[] = __('Active directory server'); } - if (!config_update_value('ad_port', get_parameter('ad_port'))) { + if (config_update_value('ad_port', get_parameter('ad_port'), true) === false) { $error_update[] = __('Active directory port'); } - if (!config_update_value('ad_start_tls', get_parameter('ad_start_tls'))) { + if (config_update_value('ad_start_tls', get_parameter('ad_start_tls'), true) === false) { $error_update[] = __('Start TLS'); } - if (!config_update_value('ad_advanced_config', get_parameter('ad_advanced_config'))) { + if (config_update_value('ad_advanced_config', get_parameter('ad_advanced_config'), true) === false) { $error_update[] = __('Advanced Config AD'); } - if (!config_update_value('ldap_advanced_config', get_parameter('ldap_advanced_config'))) { + if (config_update_value('ldap_advanced_config', get_parameter('ldap_advanced_config'), true) === false) { $error_update[] = __('Advanced Config LDAP'); } - if (!config_update_value('ad_domain', get_parameter('ad_domain'))) { + if (config_update_value('ad_domain', get_parameter('ad_domain'), true) === false) { $error_update[] = __('Domain'); } - if (!config_update_value('ad_adv_perms', get_parameter('ad_adv_perms'))) { + if (config_update_value('ad_adv_perms', get_parameter('ad_adv_perms'), true) === false) { $error_update[] = __('Advanced Permisions AD'); } - if (!config_update_value('ldap_adv_perms', get_parameter('ldap_adv_perms'))) { + if (config_update_value('ldap_adv_perms', get_parameter('ldap_adv_perms'), true) === false) { $error_update[] = __('Advanced Permissions LDAP'); } - if (!config_update_value('ldap_server', get_parameter('ldap_server'))) { + if (config_update_value('ldap_server', get_parameter('ldap_server'), true) === false) { $error_update[] = __('LDAP server'); } - if (!config_update_value('ldap_port', get_parameter('ldap_port'))) { + if (config_update_value('ldap_port', get_parameter('ldap_port'), true) === false) { $error_update[] = __('LDAP port'); } - if (!config_update_value('ldap_version', get_parameter('ldap_version'))) { + if (config_update_value('ldap_version', get_parameter('ldap_version'), true) === false) { $error_update[] = __('LDAP version'); } - if (!config_update_value('ldap_start_tls', get_parameter('ldap_start_tls'))) { + if (config_update_value('ldap_start_tls', get_parameter('ldap_start_tls'), true) === false) { $error_update[] = __('Start TLS'); } - if (!config_update_value('ldap_base_dn', get_parameter('ldap_base_dn'))) { + if (config_update_value('ldap_base_dn', get_parameter('ldap_base_dn'), true) === false) { $error_update[] = __('Base DN'); } - if (!config_update_value('ldap_login_attr', get_parameter('ldap_login_attr'))) { + if (config_update_value('ldap_login_attr', get_parameter('ldap_login_attr'), true) === false) { $error_update[] = __('Login attribute'); } - if (!config_update_value('ldap_admin_login', get_parameter('ldap_admin_login'))) { + if (config_update_value('ldap_admin_login', get_parameter('ldap_admin_login'), true) === false) { $error_update[] = __('Admin LDAP login'); } - if (!config_update_value('ldap_admin_pass', io_input_password(io_safe_output(get_parameter('ldap_admin_pass'))))) { + if (config_update_value('ldap_admin_pass', io_input_password(io_safe_output(get_parameter('ldap_admin_pass'))), true) === false) { $error_update[] = __('Admin LDAP password'); } - if (!config_update_value('fallback_local_auth', get_parameter('fallback_local_auth'))) { + if (config_update_value('fallback_local_auth', get_parameter('fallback_local_auth'), true) === false) { $error_update[] = __('Fallback to local authentication'); } - if (!config_update_value('ldap_login_user_attr', get_parameter('ldap_login_user_attr'))) { + if (config_update_value('ldap_login_user_attr', get_parameter('ldap_login_user_attr'), true) === false) { $error_update[] = __('Login user attribute'); } - if (!config_update_value('ldap_function', get_parameter('ldap_function'))) { + if (config_update_value('ldap_function', get_parameter('ldap_function'), true) === false) { $error_update[] = __('LDAP function'); } - if (isset($config['fallback_local_auth']) && $config['fallback_local_auth'] == 0) { - if (!config_update_value('ldap_save_password', get_parameter('ldap_save_password'))) { + if (isset($config['fallback_local_auth']) === true && (int) $config['fallback_local_auth'] === 0) { + if (config_update_value('ldap_save_password', get_parameter('ldap_save_password'), true) === false) { $error_update[] = __('Save Password'); } - } else if (isset($config['fallback_local_auth']) && $config['fallback_local_auth'] == 1) { + } else if (isset($config['fallback_local_auth']) === false && (int) $config['fallback_local_auth'] === 1) { config_update_value('ldap_save_password', 1); } - if (!config_update_value('ldap_save_profile', get_parameter('ldap_save_profile'))) { + if (config_update_value('ldap_save_profile', get_parameter('ldap_save_profile'), true) === false) { $error_update[] = __('Save profile'); } - if (!config_update_value('rpandora_server', get_parameter('rpandora_server'))) { + if (config_update_value('rpandora_server', get_parameter('rpandora_server'), true) === false) { $error_update[] = __('MySQL host'); } - if (!config_update_value('rpandora_port', get_parameter('rpandora_port'))) { + if (config_update_value('rpandora_port', get_parameter('rpandora_port'), true) === false) { $error_update[] = __('MySQL port'); } - if (!config_update_value('rpandora_dbname', get_parameter('rpandora_dbname'))) { + if (config_update_value('rpandora_dbname', get_parameter('rpandora_dbname'), true) === false) { $error_update[] = __('Database name'); } - if (!config_update_value('rpandora_user', get_parameter('rpandora_user'))) { + if (config_update_value('rpandora_user', get_parameter('rpandora_user'), true) === false) { $error_update[] = __('User'); } - if (!config_update_value('rpandora_pass', io_input_password(get_parameter('rpandora_pass')))) { + if (config_update_value('rpandora_pass', io_input_password(get_parameter('rpandora_pass')), true) === false) { $error_update[] = __('Password'); } - if (!config_update_value('rintegria_server', get_parameter('rintegria_server'))) { + if (config_update_value('rintegria_server', get_parameter('rintegria_server'), true) === false) { $error_update[] = __('Integria host'); } - if (!config_update_value('rintegria_port', get_parameter('rintegria_port'))) { + if (config_update_value('rintegria_port', get_parameter('rintegria_port'), true) === false) { $error_update[] = __('MySQL port'); } - if (!config_update_value('rintegria_dbname', get_parameter('rintegria_dbname'))) { + if (config_update_value('rintegria_dbname', get_parameter('rintegria_dbname'), true) === false) { $error_update[] = __('Database name'); } - if (!config_update_value('rintegria_user', get_parameter('rintegria_user'))) { + if (config_update_value('rintegria_user', get_parameter('rintegria_user'), true) === false) { $error_update[] = __('User'); } - if (!config_update_value('rintegria_pass', io_input_password(get_parameter('rintegria_pass')))) { + if (config_update_value('rintegria_pass', io_input_password(get_parameter('rintegria_pass')), true) === false) { $error_update[] = __('Password'); } - if (!config_update_value('saml_path', get_parameter('saml_path'))) { + if (config_update_value('saml_path', get_parameter('saml_path'), true) === false) { $error_update[] = __('Saml path'); } - if (!config_update_value('saml_source', get_parameter('saml_source'))) { + if (config_update_value('saml_source', get_parameter('saml_source'), true) === false) { $error_update[] = __('Saml source'); } - if (!config_update_value('saml_user_id', get_parameter('saml_user_id'))) { + if (config_update_value('saml_user_id', get_parameter('saml_user_id'), true) === false) { $error_update[] = __('Saml user id parameter'); } - if (!config_update_value('saml_mail', get_parameter('saml_mail'))) { + if (config_update_value('saml_mail', get_parameter('saml_mail'), true) === false) { $error_update[] = __('Saml mail parameter'); } - if (!config_update_value('saml_group_name', get_parameter('saml_group_name'))) { + if (config_update_value('saml_group_name', get_parameter('saml_group_name'), true) === false) { $error_update[] = __('Saml group name parameter'); } - if (!config_update_value('saml_attr_type', (bool) get_parameter('saml_attr_type'))) { + if (config_update_value('saml_attr_type', (bool) get_parameter('saml_attr_type'), true) === false) { $error_update[] = __('Saml attr type parameter'); } - if (!config_update_value('saml_profiles_and_tags', get_parameter('saml_profiles_and_tags'))) { + if (config_update_value('saml_profiles_and_tags', get_parameter('saml_profiles_and_tags'), true) === false) { $error_update[] = __('Saml profiles and tags parameter'); } - if (!config_update_value('saml_profile', get_parameter('saml_profile'))) { + if (config_update_value('saml_profile', get_parameter('saml_profile'), true) === false) { $error_update[] = __('Saml profile parameters'); } - if (!config_update_value('saml_tag', get_parameter('saml_tag'))) { + if (config_update_value('saml_tag', get_parameter('saml_tag'), true) === false) { $error_update[] = __('Saml tag parameter'); } - if (!config_update_value('saml_profile_tag_separator', get_parameter('saml_profile_tag_separator'))) { + if (config_update_value('saml_profile_tag_separator', get_parameter('saml_profile_tag_separator'), true) === false) { $error_update[] = __('Saml profile and tag separator'); } - if (!config_update_value('double_auth_enabled', get_parameter('double_auth_enabled'))) { + if (config_update_value('double_auth_enabled', get_parameter('double_auth_enabled'), true) === false) { $error_update[] = __('Double authentication'); } - if (!config_update_value('2FA_all_users', get_parameter('2FA_all_users'))) { + if (config_update_value('2FA_all_users', get_parameter('2FA_all_users'), true) === false) { $error_update[] = __('2FA all users'); } - if (!config_update_value('session_timeout', get_parameter('session_timeout'))) { + if (config_update_value('session_timeout', get_parameter('session_timeout'), true) === false) { $error_update[] = __('Session timeout'); } else { if ((int) get_parameter('session_timeout') === 0) { $error_update[] = __('Session timeout forced to 90 minutes'); - if (!config_update_value('session_timeout', 90)) { + if (config_update_value('session_timeout', 90, true) === false) { $error_update[] = __('Session timeout'); } } } - if (isset($config['fallback_local_auth']) && $config['fallback_local_auth'] == 0) { - if (!config_update_value('ad_save_password', get_parameter('ad_save_password'))) { + if (isset($config['fallback_local_auth']) === true && (int) $config['fallback_local_auth'] === 0) { + if (config_update_value('ad_save_password', get_parameter('ad_save_password'), true) === false) { $error_update[] = __('Save Password'); } - } else if (isset($config['fallback_local_auth']) && $config['fallback_local_auth'] == 1) { + } else if (isset($config['fallback_local_auth']) === true && (int) $config['fallback_local_auth'] === 1) { config_update_value('ad_save_password', 1); } break; case 'perf': // PERFORMANCE SETUP. - if (!config_update_value('event_purge', get_parameter('event_purge'))) { + if (config_update_value('event_purge', get_parameter('event_purge'), true) === false) { $check_metaconsole_events_history = get_parameter('metaconsole_events_history', -1); $error_update[] = $check_metaconsole_events_history; } if ($check_metaconsole_events_history != -1) { - if (!config_update_value('metaconsole_events_history', get_parameter('metaconsole_events_history'))) { + if (config_update_value('metaconsole_events_history', get_parameter('metaconsole_events_history'), true) === false) { $error_update[] = __('Max. days before delete events'); } } - if (!config_update_value('trap_purge', get_parameter('trap_purge'))) { + if (config_update_value('trap_purge', get_parameter('trap_purge'), true) === false) { $error_update[] = __('Max. days before delete traps'); } - if (!config_update_value('string_purge', get_parameter('string_purge'))) { + if (config_update_value('string_purge', get_parameter('string_purge'), true) === false) { $error_update[] = __('Max. days before delete string data'); } - if (!config_update_value('audit_purge', get_parameter('audit_purge'))) { + if (config_update_value('audit_purge', get_parameter('audit_purge'), true) === false) { $error_update[] = __('Max. days before delete audit events'); } - if (!config_update_value('gis_purge', get_parameter('gis_purge'))) { + if (config_update_value('gis_purge', get_parameter('gis_purge'), true) === false) { $error_update[] = __('Max. days before delete GIS data'); } - if (!config_update_value('days_purge', (int) get_parameter('days_purge'))) { + if (config_update_value('days_purge', (int) get_parameter('days_purge'), true) === false) { $error_update[] = __('Max. days before purge'); } - if (!config_update_value('days_delete_unknown', (int) get_parameter('days_delete_unknown'))) { + if (config_update_value('days_delete_unknown', (int) get_parameter('days_delete_unknown'), true) === false) { $error_update[] = __('Max. days before delete unknown modules'); } - if (!config_update_value('days_compact', (int) get_parameter('days_compact'))) { + if (config_update_value('days_compact', (int) get_parameter('days_compact'), true) === false) { $error_update[] = __('Max. days before compact data'); } - if (!config_update_value('days_autodisable_deletion', (int) get_parameter('days_autodisable_deletion'))) { + if (config_update_value('days_autodisable_deletion', (int) get_parameter('days_autodisable_deletion'), true) === false) { $error_update[] = __('Max. days before autodisable deletion'); } - if (!config_update_value('report_limit', (int) get_parameter('report_limit'))) { + if (config_update_value('report_limit', (int) get_parameter('report_limit'), true) === false) { $error_update[] = __('Item limit for realtime reports)'); } - if (!config_update_value('step_compact', (int) get_parameter('step_compact'))) { + if (config_update_value('step_compact', (int) get_parameter('step_compact'), true) === false) { $error_update[] = __('Compact interpolation in hours (1 Fine-20 bad)'); } - if (!config_update_value('event_view_hr', (int) get_parameter('event_view_hr'))) { + if (config_update_value('event_view_hr', (int) get_parameter('event_view_hr'), true) === false) { $error_update[] = __('Default hours for event view'); } - if (!config_update_value('realtimestats', get_parameter('realtimestats'))) { + if (config_update_value('realtimestats', get_parameter('realtimestats'), true) === false) { $error_update[] = __('Use realtime statistics'); } - if (!config_update_value('stats_interval', get_parameter('stats_interval'))) { + if (config_update_value('stats_interval', get_parameter('stats_interval'), true) === false) { $error_update[] = __('Batch statistics period (secs)'); } - if (!config_update_value('agentaccess', (int) get_parameter('agentaccess'))) { + if (config_update_value('agentaccess', (int) get_parameter('agentaccess'), true) === false) { $error_update[] = __('Use agent access graph'); } - if (!config_update_value('num_files_attachment', (int) get_parameter('num_files_attachment'))) { + if (config_update_value('num_files_attachment', (int) get_parameter('num_files_attachment'), true) === false) { $error_update[] = __('Max. recommended number of files in attachment directory'); } - if (!config_update_value('delete_notinit', get_parameter('delete_notinit'))) { + if (config_update_value('delete_notinit', get_parameter('delete_notinit'), true) === false) { $error_update[] = __('Delete not init modules'); } - if (!config_update_value('big_operation_step_datos_purge', get_parameter('big_operation_step_datos_purge'))) { + if (config_update_value('big_operation_step_datos_purge', get_parameter('big_operation_step_datos_purge'), true) === false) { $error_update[] = __('Big Operatiopn Step to purge old data'); } - if (!config_update_value('small_operation_step_datos_purge', get_parameter('small_operation_step_datos_purge'))) { + if (config_update_value('small_operation_step_datos_purge', get_parameter('small_operation_step_datos_purge'), true) === false) { $error_update[] = __('Small Operation Step to purge old data'); } - if (!config_update_value('num_past_special_days', get_parameter('num_past_special_days'))) { + if (config_update_value('num_past_special_days', get_parameter('num_past_special_days'), true) === false) { $error_update[] = __('Retention period of past special days'); } - if (!config_update_value('max_macro_fields', get_parameter('max_macro_fields'))) { + if (config_update_value('max_macro_fields', get_parameter('max_macro_fields'), true) === false) { $error_update[] = __('Max. macro data fields'); } - if (isset($config['enterprise_installed']) && $config['enterprise_installed'] == 1) { - if (!config_update_value('inventory_purge', get_parameter('inventory_purge'))) { + if (isset($config['enterprise_installed']) === true && (bool) $config['enterprise_installed'] === true) { + if (config_update_value('inventory_purge', get_parameter('inventory_purge'), true) === false) { $error_update[] = __('Max. days before delete inventory data'); } } - if (!config_update_value('delete_old_messages', get_parameter('delete_old_messages'))) { + if (config_update_value('delete_old_messages', get_parameter('delete_old_messages'), true) === false) { $error_update[] = __('Max. days before delete old messages'); } - if (!config_update_value('delete_old_network_matrix', get_parameter('delete_old_network_matrix'))) { + if (config_update_value('delete_old_network_matrix', get_parameter('delete_old_network_matrix'), true) === false) { $error_update[] = __('Max. days before delete old network matrix data'); } - if (!config_update_value('max_graph_container', get_parameter('max_graph_container'))) { + if (config_update_value('max_graph_container', get_parameter('max_graph_container'), true) === false) { $error_update[] = __('Graph container - Max. Items'); } - if (!config_update_value('max_execution_event_response', get_parameter('max_execution_event_response'))) { + if (config_update_value('max_execution_event_response', get_parameter('max_execution_event_response'), true) === false) { $error_update[] = __('Max execution event response'); } - if (!config_update_value('row_limit_csv', get_parameter('row_limit_csv'))) { + if (config_update_value('row_limit_csv', get_parameter('row_limit_csv'), true) === false) { $error_update[] = __('Row limit in csv log'); } - if (!config_update_value('snmpwalk', get_parameter('snmpwalk'))) { + if (config_update_value('snmpwalk', get_parameter('snmpwalk'), true) === false) { $error_update[] = __('SNMP walk binary path'); } - if (!config_update_value('snmpwalk_fallback', get_parameter('snmpwalk_fallback'))) { + if (config_update_value('snmpwalk_fallback', get_parameter('snmpwalk_fallback'), true) === false) { $error_update[] = __('SNMP walk binary path (fallback for v1)'); } break; case 'vis': // VISUAL STYLES SETUP. - if (!config_update_value('date_format', (string) get_parameter('date_format'))) { + if (config_update_value('date_format', (string) get_parameter('date_format'), true) === false) { $error_update[] = __('Date format string'); } - if (!config_update_value('prominent_time', (string) get_parameter('prominent_time'))) { + if (config_update_value('prominent_time', (string) get_parameter('prominent_time'), true) === false) { $error_update[] = __('Timestamp or time comparation'); } - if (!config_update_value('graph_color1', (string) get_parameter('graph_color1'))) { + if (config_update_value('graph_color1', (string) get_parameter('graph_color1'), true) === false) { $error_update[] = __('Graph color #1'); } - if (!config_update_value('graph_color2', (string) get_parameter('graph_color2'))) { + if (config_update_value('graph_color2', (string) get_parameter('graph_color2'), true) === false) { $error_update[] = __('Graph color #2'); } - if (!config_update_value('graph_color3', (string) get_parameter('graph_color3'))) { + if (config_update_value('graph_color3', (string) get_parameter('graph_color3'), true) === false) { $error_update[] = __('Graph color #3'); } - if (!config_update_value('graph_color4', (string) get_parameter('graph_color4'))) { + if (config_update_value('graph_color4', (string) get_parameter('graph_color4'), true) === false) { $error_update[] = __('Graph color #4'); } - if (!config_update_value('graph_color5', (string) get_parameter('graph_color5'))) { + if (config_update_value('graph_color5', (string) get_parameter('graph_color5'), true) === false) { $error_update[] = __('Graph color #5'); } - if (!config_update_value('graph_color6', (string) get_parameter('graph_color6'))) { + if (config_update_value('graph_color6', (string) get_parameter('graph_color6'), true) === false) { $error_update[] = __('Graph color #6'); } - if (!config_update_value('graph_color7', (string) get_parameter('graph_color7'))) { + if (config_update_value('graph_color7', (string) get_parameter('graph_color7'), true) === false) { $error_update[] = __('Graph color #7'); } - if (!config_update_value('graph_color8', (string) get_parameter('graph_color8'))) { + if (config_update_value('graph_color8', (string) get_parameter('graph_color8'), true) === false) { $error_update[] = __('Graph color #8'); } - if (!config_update_value('graph_color9', (string) get_parameter('graph_color9'))) { + if (config_update_value('graph_color9', (string) get_parameter('graph_color9'), true) === false) { $error_update[] = __('Graph color #9'); } - if (!config_update_value('graph_color10', (string) get_parameter('graph_color10'))) { + if (config_update_value('graph_color10', (string) get_parameter('graph_color10'), true) === false) { $error_update[] = __('Graph color #10'); } - if (!config_update_value('interface_unit', (string) get_parameter('interface_unit', __('Bytes')))) { + if (config_update_value('interface_unit', (string) get_parameter('interface_unit', __('Bytes')), true) === false) { $error_update[] = __('Value to interface graphics'); } - if (!config_update_value('graph_precision', (string) get_parameter('graph_precision', 1))) { + if (config_update_value('graph_precision', (string) get_parameter('graph_precision', 1), true) === false) { $error_update[] = __('Data precision for reports'); } $style = (string) get_parameter('style'); - if ($style != $config['style']) { + if ($style !== (string) $config['style']) { $style = substr($style, 0, (strlen($style) - 4)); } - if (!config_update_value('style', $style)) { + if (config_update_value('style', $style, true) === false) { $error_update[] = __('Style template'); } - if (!config_update_value('block_size', (int) get_parameter('block_size'))) { + if (config_update_value('block_size', (int) get_parameter('block_size'), true) === false) { $error_update[] = __('Block size for pagination'); } - if (!config_update_value('round_corner', (bool) get_parameter('round_corner'))) { + if (config_update_value('round_corner', (bool) get_parameter('round_corner'), true) === false) { $error_update[] = __('Use round corners'); } - if (!config_update_value('maximum_y_axis', (bool) get_parameter('maximum_y_axis'))) { + if (config_update_value('maximum_y_axis', (bool) get_parameter('maximum_y_axis'), true) === false) { $error_update[] = __('Chart fit to content'); } - if (!config_update_value('show_qr_code_header', (bool) get_parameter('show_qr_code_header'))) { + if (config_update_value('show_qr_code_header', (bool) get_parameter('show_qr_code_header'), true) === false) { $error_update[] = __('Show QR code header'); } - if (!config_update_value('status_images_set', (string) get_parameter('status_images_set'))) { + if (config_update_value('status_images_set', (string) get_parameter('status_images_set'), true) === false) { $error_update[] = __('Status icon set'); } - if (!config_update_value('fontpath', (string) get_parameter('fontpath'))) { + if (config_update_value('fontpath', (string) get_parameter('fontpath'), true) === false) { $error_update[] = __('Font path'); } - if (!config_update_value('font_size', get_parameter('font_size'))) { + if (config_update_value('font_size', get_parameter('font_size'), true) === false) { $error_update[] = __('Font size'); } - if (!config_update_value('custom_favicon', (string) get_parameter('custom_favicon'))) { + if (config_update_value('custom_favicon', (string) get_parameter('custom_favicon'), true) === false) { $error_update[] = __('Custom favicon'); } - if (!config_update_value('custom_logo', (string) get_parameter('custom_logo'))) { + if (config_update_value('custom_logo', (string) get_parameter('custom_logo'), true) === false) { $error_update[] = __('Custom logo'); } - if (!config_update_value('custom_logo_collapsed', (string) get_parameter('custom_logo_collapsed'))) { + if (config_update_value('custom_logo_collapsed', (string) get_parameter('custom_logo_collapsed'), true) === false) { $error_update[] = __('Custom logo collapsed'); } - if (!config_update_value('custom_logo_white_bg', (string) get_parameter('custom_logo_white_bg'))) { + if (config_update_value('custom_logo_white_bg', (string) get_parameter('custom_logo_white_bg'), true) === false) { $error_update[] = __('Custom logo white background'); } - if (!config_update_value('custom_logo_login', (string) get_parameter('custom_logo_login'))) { + if (config_update_value('custom_logo_login', (string) get_parameter('custom_logo_login'), true) === false) { $error_update[] = __('Custom logo login'); } - if (!config_update_value('custom_splash_login', (string) get_parameter('custom_splash_login'))) { + if (config_update_value('custom_splash_login', (string) get_parameter('custom_splash_login'), true) === false) { $error_update[] = __('Custom splash login'); } - if (!config_update_value('custom_docs_logo', (string) get_parameter('custom_docs_logo'))) { + if (config_update_value('custom_docs_logo', (string) get_parameter('custom_docs_logo'), true) === false) { $error_update[] = __('Custom documentation logo'); } - if (!config_update_value('custom_support_logo', (string) get_parameter('custom_support_logo'))) { + if (config_update_value('custom_support_logo', (string) get_parameter('custom_support_logo'), true) === false) { $error_update[] = __('Custom support logo'); } - if (!config_update_value('custom_network_center_logo', (string) get_parameter('custom_network_center_logo'))) { + if (config_update_value('custom_network_center_logo', (string) get_parameter('custom_network_center_logo'), true) === false) { $error_update[] = __('Custom networkmap center logo'); } - if (!config_update_value('custom_mobile_console_logo', (string) get_parameter('custom_mobile_console_logo'))) { + if (config_update_value('custom_mobile_console_logo', (string) get_parameter('custom_mobile_console_logo'), true) === false) { $error_update[] = __('Custom networkmap center logo'); } - if (!config_update_value('custom_title_header', (string) get_parameter('custom_title_header'))) { + if (config_update_value('custom_title_header', (string) get_parameter('custom_title_header'), true) === false) { $error_update[] = __('Custom title header'); } - if (!config_update_value('custom_subtitle_header', (string) get_parameter('custom_subtitle_header'))) { + if (config_update_value('custom_subtitle_header', (string) get_parameter('custom_subtitle_header'), true) === false) { $error_update[] = __('Custom subtitle header'); } - if (!config_update_value('meta_custom_title_header', (string) get_parameter('meta_custom_title_header'))) { + if (config_update_value('meta_custom_title_header', (string) get_parameter('meta_custom_title_header'), true) === false) { $error_update[] = __('Meta custom title header'); } - if (!config_update_value('meta_custom_subtitle_header', (string) get_parameter('meta_custom_subtitle_header'))) { + if (config_update_value('meta_custom_subtitle_header', (string) get_parameter('meta_custom_subtitle_header'), true) === false) { $error_update[] = __('Meta custom subtitle header'); } - if (!config_update_value('custom_title1_login', (string) get_parameter('custom_title1_login'))) { + if (config_update_value('custom_title1_login', (string) get_parameter('custom_title1_login'), true) === false) { $error_update[] = __('Custom title1 login'); } - if (!config_update_value('custom_title2_login', (string) get_parameter('custom_title2_login'))) { + if (config_update_value('custom_title2_login', (string) get_parameter('custom_title2_login'), true) === false) { $error_update[] = __('Custom title2 login'); } - if (!config_update_value('login_background', (string) get_parameter('login_background'))) { + if (config_update_value('login_background', (string) get_parameter('login_background'), true) === false) { $error_update[] = __('Login background'); } - if (!config_update_value('custom_docs_url', (string) get_parameter('custom_docs_url'))) { + if (config_update_value('custom_docs_url', (string) get_parameter('custom_docs_url'), true) === false) { $error_update[] = __('Custom Docs url'); } - if (!config_update_value('custom_support_url', (string) get_parameter('custom_support_url'))) { + if (config_update_value('custom_support_url', (string) get_parameter('custom_support_url'), true) === false) { $error_update[] = __('Custom support url'); } - if (!config_update_value('rb_product_name', (string) get_parameter('rb_product_name'))) { + if (config_update_value('rb_product_name', (string) get_parameter('rb_product_name'), true) === false) { $error_update[] = __('Product name'); } - if (!config_update_value('rb_copyright_notice', (string) get_parameter('rb_copyright_notice'))) { + if (config_update_value('rb_copyright_notice', (string) get_parameter('rb_copyright_notice'), true) === false) { $error_update[] = __('Copyright notice'); } - if (!config_update_value('meta_custom_logo_white_bg', (string) get_parameter('meta_custom_logo_white_bg'))) { + if (config_update_value('meta_custom_logo_white_bg', (string) get_parameter('meta_custom_logo_white_bg'), true) === false) { $error_update[] = __('Custom logo metaconsole (white background)'); } - if (!config_update_value('meta_custom_logo_login', (string) get_parameter('meta_custom_logo_login'))) { + if (config_update_value('meta_custom_logo_login', (string) get_parameter('meta_custom_logo_login'), true) === false) { $error_update[] = __('Custom logo login metaconsole'); } - if (!config_update_value('meta_custom_splash_login', (string) get_parameter('meta_custom_splash_login'))) { + if (config_update_value('meta_custom_splash_login', (string) get_parameter('meta_custom_splash_login'), true) === false) { $error_update[] = __('Custom splash login metaconsole'); } - if (!config_update_value('meta_custom_title1_login', (string) get_parameter('meta_custom_title1_login'))) { + if (config_update_value('meta_custom_title1_login', (string) get_parameter('meta_custom_title1_login'), true) === false) { $error_update[] = __('Custom title1 login metaconsole'); } - if (!config_update_value('meta_custom_title2_login', (string) get_parameter('meta_custom_title2_login'))) { + if (config_update_value('meta_custom_title2_login', (string) get_parameter('meta_custom_title2_login'), true) === false) { $error_update[] = __('Custom title2 login metaconsole'); } - if (!config_update_value('meta_login_background', (string) get_parameter('meta_login_background'))) { + if (config_update_value('meta_login_background', (string) get_parameter('meta_login_background'), true) === false) { $error_update[] = __('Login background metaconsole'); } - if (!config_update_value('meta_custom_docs_url', (string) get_parameter('meta_custom_docs_url'))) { + if (config_update_value('meta_custom_docs_url', (string) get_parameter('meta_custom_docs_url'), true) === false) { $error_update[] = __('Custom Docs url'); } - if (!config_update_value('meta_custom_support_url', (string) get_parameter('meta_custom_support_url'))) { + if (config_update_value('meta_custom_support_url', (string) get_parameter('meta_custom_support_url'), true) === false) { $error_update[] = __('Custom support url'); } - if (!config_update_value('legacy_vc', (int) get_parameter('legacy_vc'))) { + if (config_update_value('legacy_vc', (int) get_parameter('legacy_vc'), true) === false) { $error_update[] = __('Use the legacy Visual Console'); } - if (!config_update_value('vc_default_cache_expiration', (int) get_parameter('vc_default_cache_expiration'))) { + if (config_update_value('vc_default_cache_expiration', (int) get_parameter('vc_default_cache_expiration'), true) === false) { $error_update[] = __("Default expiration of the Visual Console item's cache"); } - if (!config_update_value('vc_refr', (int) get_parameter('vc_refr'))) { + if (config_update_value('vc_refr', (int) get_parameter('vc_refr'), true) === false) { $error_update[] = __('Default interval for refresh on Visual Console'); } - if (!config_update_value('vc_favourite_view', (int) get_parameter('vc_favourite_view', 0))) { + if (config_update_value('vc_favourite_view', (int) get_parameter('vc_favourite_view', 0), true) === false) { $error_update[] = __('Default line favourite_view for the Visual Console'); } - if (!config_update_value('vc_menu_items', (int) get_parameter('vc_menu_items', 10))) { + if (config_update_value('vc_menu_items', (int) get_parameter('vc_menu_items', 10), true) === false) { $error_update[] = __('Default line menu items for the Visual Console'); } - if (!config_update_value('vc_line_thickness', (int) get_parameter('vc_line_thickness'))) { + if (config_update_value('vc_line_thickness', (int) get_parameter('vc_line_thickness'), true) === false) { $error_update[] = __('Default line thickness for the Visual Console'); } - if (!config_update_value('ser_menu_items', (int) get_parameter('ser_menu_items', 10))) { + if (config_update_value('ser_menu_items', (int) get_parameter('ser_menu_items', 10), true) === false) { $error_update[] = __('Default line menu items for the Services'); } - if (!config_update_value('agent_size_text_small', get_parameter('agent_size_text_small'))) { + if (config_update_value('agent_size_text_small', get_parameter('agent_size_text_small'), true) === false) { $error_update[] = __('Agent size text'); } - if (!config_update_value('agent_size_text_medium', get_parameter('agent_size_text_medium'))) { + if (config_update_value('agent_size_text_medium', get_parameter('agent_size_text_medium'), true) === false) { $error_update[] = __('Agent size text'); } - if (!config_update_value('module_size_text_small', get_parameter('module_size_text_small'))) { + if (config_update_value('module_size_text_small', get_parameter('module_size_text_small'), true) === false) { $error_update[] = __('Module size text'); } - if (!config_update_value('module_size_text_medium', get_parameter('module_size_text_medium'))) { + if (config_update_value('module_size_text_medium', get_parameter('module_size_text_medium'), true) === false) { $error_update[] = __('Description size text'); } - if (!config_update_value('description_size_text', get_parameter('description_size_text'))) { + if (config_update_value('description_size_text', get_parameter('description_size_text'), true) === false) { $error_update[] = __('Description size text'); } - if (!config_update_value('item_title_size_text', get_parameter('item_title_size_text'))) { + if (config_update_value('item_title_size_text', get_parameter('item_title_size_text'), true) === false) { $error_update[] = __('Item title size text'); } - if (!config_update_value('gis_label', get_parameter('gis_label'))) { + if (config_update_value('gis_label', get_parameter('gis_label'), true) === false) { $error_update[] = __('GIS Labels'); } - if (!config_update_value('simple_module_value', get_parameter('simple_module_value'))) { + if (config_update_value('simple_module_value', get_parameter('simple_module_value'), true) === false) { $error_update[] = __('Show units in values report'); } - if (!config_update_value('gis_default_icon', get_parameter('gis_default_icon'))) { + if (config_update_value('gis_default_icon', get_parameter('gis_default_icon'), true) === false) { $error_update[] = __('Default icon in GIS'); } - if (!config_update_value('autohidden_menu', get_parameter('autohidden_menu'))) { + if (config_update_value('autohidden_menu', get_parameter('autohidden_menu'), true) === false) { $error_update[] = __('Autohidden menu'); } - if (!config_update_value('visual_animation', get_parameter('visual_animation'))) { + if (config_update_value('visual_animation', get_parameter('visual_animation'), true) === false) { $error_update[] = __('visual_animation'); } - if (!config_update_value('disable_help', get_parameter('disable_help'))) { + if (config_update_value('disable_help', get_parameter('disable_help'), true) === false) { $error_update[] = __('Disable help'); } - if (!config_update_value('fixed_graph', get_parameter('fixed_graph'))) { + if (config_update_value('fixed_graph', get_parameter('fixed_graph'), true) === false) { $error_update[] = __('Fixed graph'); } - if (!config_update_value('fixed_header', get_parameter('fixed_header'))) { + if (config_update_value('fixed_header', get_parameter('fixed_header'), true) === false) { $error_update[] = __('Fixed header'); } - if (!config_update_value('paginate_module', get_parameter('paginate_module'))) { + if (config_update_value('paginate_module', get_parameter('paginate_module'), true) === false) { $error_update[] = __('Paginate module'); } - if (!config_update_value('graphviz_bin_dir', get_parameter('graphviz_bin_dir'))) { + if (config_update_value('graphviz_bin_dir', get_parameter('graphviz_bin_dir'), true) === false) { $error_update[] = __('Custom graphviz directory'); } - if (!config_update_value('networkmap_max_width', get_parameter('networkmap_max_width'))) { + if (config_update_value('networkmap_max_width', get_parameter('networkmap_max_width'), true) === false) { $error_update[] = __('Networkmap max width'); } - if (!config_update_value('short_module_graph_data', get_parameter('short_module_graph_data'))) { + if (config_update_value('short_module_graph_data', get_parameter('short_module_graph_data'), true) === false) { $error_update[] = __('Shortened module graph data'); } - if (!config_update_value('show_group_name', get_parameter('show_group_name'))) { + if (config_update_value('show_group_name', get_parameter('show_group_name'), true) === false) { $error_update[] = __('Show the group name instead the group icon.'); } - if (!config_update_value('custom_graph_width', (int) get_parameter('custom_graph_width', 1))) { + if (config_update_value('custom_graph_width', (int) get_parameter('custom_graph_width', 1), true) === false) { $error_update[] = __('Default line thickness for the Custom Graph.'); } - if (!config_update_value('type_module_charts', (string) get_parameter('type_module_charts', 'area'))) { + if (config_update_value('type_module_charts', (string) get_parameter('type_module_charts', 'area'), true) === false) { $error_update[] = __('Default type of module charts.'); } - if (!config_update_value('items_combined_charts', (string) get_parameter('items_combined_charts', 10))) { + if (config_update_value('items_combined_charts', (string) get_parameter('items_combined_charts', 10), true) === false) { $error_update[] = __('Default Number of elements in Custom Graph.'); } - if (!config_update_value('type_interface_charts', (string) get_parameter('type_interface_charts', 'line'))) { + if (config_update_value('type_interface_charts', (string) get_parameter('type_interface_charts', 'line'), true) === false) { $error_update[] = __('Default type of interface charts.'); } - if (!config_update_value('render_proc', (bool) get_parameter('render_proc', false))) { + if (config_update_value('render_proc', (bool) get_parameter('render_proc', false), true) === false) { $error_update[] = __('Display data of proc modules in other format'); } - if (!config_update_value('render_proc_ok', (string) get_parameter('render_proc_ok', __('Ok')))) { + if (config_update_value('render_proc_ok', (string) get_parameter('render_proc_ok', __('Ok')), true) === false) { $error_update[] = __('Display text proc modules have state is ok'); } - if (!config_update_value('render_proc_fail', (string) get_parameter('render_proc_fail', __('Fail')))) { + if (config_update_value('render_proc_fail', (string) get_parameter('render_proc_fail', __('Fail')), true) === false) { $error_update[] = __('Display text when proc modules have state critical'); } - // Daniel maya 02/06/2016 Display menu with click --INI. - if (!config_update_value('click_display', (bool) get_parameter('click_display', false))) { + if (config_update_value('click_display', (bool) get_parameter('click_display', false), true) === false) { $error_update[] = __('Display lateral menus with left click'); } - // Daniel maya 02/06/2016 Display menu with click --END. - if (isset($config['enterprise_installed']) && $config['enterprise_installed'] == 1) { - if (!config_update_value('service_label_font_size', get_parameter('service_label_font_size', false))) { + if (isset($config['enterprise_installed']) === true && (bool) $config['enterprise_installed'] === true) { + if (config_update_value('service_label_font_size', get_parameter('service_label_font_size', false), true) === false) { $error_update[] = __('Service label font size'); } - if (!config_update_value('service_item_padding_size', get_parameter('service_item_padding_size', false))) { + if (config_update_value('service_item_padding_size', get_parameter('service_item_padding_size', false), true) === false) { $error_update[] = __('Service item padding size'); } } - if (!config_update_value('percentil', (int) get_parameter('percentil', 0))) { + if (config_update_value('percentil', (int) get_parameter('percentil', 0), true) === false) { $error_update[] = __('Default percentil'); } - if (!config_update_value('full_scale_option', (int) get_parameter('full_scale_option', 0))) { + if (config_update_value('full_scale_option', (int) get_parameter('full_scale_option', 0), true) === false) { $error_update[] = __('Default full scale (TIP)'); } - if (!config_update_value('type_mode_graph', (int) get_parameter('type_mode_graph', 0))) { + if (config_update_value('type_mode_graph', (int) get_parameter('type_mode_graph', 0), true) === false) { $error_update[] = __('Default soft graphs'); } - if (!config_update_value('zoom_graph', (int) get_parameter('zoom_graph', 1))) { + if (config_update_value('zoom_graph', (int) get_parameter('zoom_graph', 1), true) === false) { $error_update[] = __('Default zoom graphs'); } - if (!config_update_value( + if (config_update_value( 'graph_image_height', (int) get_parameter('graph_image_height', 130) - ) + ) === false ) { $error_update[] = __( 'Default height of the chart image' @@ -1280,22 +1286,22 @@ function config_update_config() $custom_value = str_replace(',', '.', $custom_value); - if ($custom_value_add) { + if ($custom_value_add === true) { include_once 'include/functions_post_process.php'; - if (!post_process_add_custom_value( + if (post_process_add_custom_value( $custom_text, (string) $custom_value - ) + ) === false ) { - $error_update[] = __('Add the custom post process'); + $error_update[] = __('Add the custom post process'); } } if ($custom_value_to_delete > 0) { include_once 'include/functions_post_process.php'; - if (!post_process_delete_custom_value($custom_value_to_delete)) { + if (post_process_delete_custom_value($custom_value_to_delete) === false) { $error_update[] = __('Delete the custom post process'); } } @@ -1317,7 +1323,7 @@ function config_update_config() $interval_values = $new_interval; } else { $interval_values_array = explode(',', $interval_values); - if (!in_array($new_interval, $interval_values_array)) { + if (in_array($new_interval, $interval_values_array) === false) { $interval_values_array[] = $new_interval; $interval_values = implode(',', $interval_values_array); } @@ -1337,7 +1343,7 @@ function config_update_config() $interval_values = implode(',', $interval_values_array); } - if (!config_update_value('interval_values', $interval_values)) { + if (config_update_value('interval_values', $interval_values, true) === false) { $error_update[] = __('Delete interval'); } @@ -1348,132 +1354,127 @@ function config_update_config() $custom_unit = io_safe_input(strip_tags(io_safe_output(get_parameter('custom_module_unit')))); $custom_unit_to_delete = io_safe_input(strip_tags(io_safe_output(get_parameter('custom_module_unit_to_delete', '')))); - if (!empty($custom_unit)) { - if (!add_custom_module_unit( - $custom_unit - ) - ) { + if (empty($custom_unit) === false) { + if (add_custom_module_unit($custom_unit) === false) { $error_update[] = __('Add custom module unit'); } } - if (!empty($custom_unit_to_delete)) { - if (!delete_custom_module_unit($custom_unit_to_delete)) { + if (empty($custom_unit_to_delete) === false) { + if (delete_custom_module_unit($custom_unit_to_delete) === false) { $error_update[] = __('Delete custom module unit'); } } - // -------------------------------------------------- - if (!config_update_value('custom_report_info', get_parameter('custom_report_info'))) { + if (config_update_value('custom_report_info', get_parameter('custom_report_info'), true) === false) { $error_update[] = __('Custom report info'); } - // Juanma (06/05/2014) New feature: Custom front page for reports. - if (!config_update_value('font_size_item_report', get_parameter('font_size_item_report', 2))) { + if (config_update_value('font_size_item_report', get_parameter('font_size_item_report', 2), true) === false) { $error_update[] = __('HTML font size for SLA (em)'); } - if (!config_update_value('global_font_size_report', get_parameter('global_font_size_report', 10))) { + if (config_update_value('global_font_size_report', get_parameter('global_font_size_report', 10), true) === false) { $error_update[] = __('PDF font size (px)'); } - if (!config_update_value('custom_report_front', get_parameter('custom_report_front'))) { + if (config_update_value('custom_report_front', get_parameter('custom_report_front'), true) === false) { $error_update[] = __('Custom report front'); } - if (!config_update_value('custom_report_front_font', get_parameter('custom_report_front_font'))) { + if (config_update_value('custom_report_front_font', get_parameter('custom_report_front_font'), true) === false) { $error_update[] = __('Custom report front').' - '.__('Font family'); } - if (!config_update_value('custom_report_front_logo', get_parameter('custom_report_front_logo'))) { + if (config_update_value('custom_report_front_logo', get_parameter('custom_report_front_logo'), true) === false) { $error_update[] = __('Custom report front').' - '.__('Custom logo'); } - if (!config_update_value('custom_report_front_header', get_parameter('custom_report_front_header'))) { + if (config_update_value('custom_report_front_header', get_parameter('custom_report_front_header'), true) === false) { $error_update[] = __('Custom report front').' - '.__('Header'); } - if (!config_update_value('custom_report_front_firstpage', get_parameter('custom_report_front_firstpage'))) { + if (config_update_value('custom_report_front_firstpage', get_parameter('custom_report_front_firstpage'), true) === false) { $error_update[] = __('Custom report front').' - '.__('First page'); } - if (!config_update_value('custom_report_front_footer', get_parameter('custom_report_front_footer'))) { + if (config_update_value('custom_report_front_footer', get_parameter('custom_report_front_footer'), true) === false) { $error_update[] = __('Custom report front').' - '.__('Footer'); } - if (!config_update_value('csv_divider', (string) get_parameter('csv_divider', ';'))) { + if (config_update_value('csv_divider', (string) get_parameter('csv_divider', ';'), true) === false) { $error_update[] = __('CSV divider'); } - if (!config_update_value('csv_decimal_separator', (string) get_parameter('csv_decimal_separator', '.'))) { + if (config_update_value('csv_decimal_separator', (string) get_parameter('csv_decimal_separator', '.'), true) === false) { $error_update[] = __('CSV decimal separator'); } - if (!config_update_value('use_data_multiplier', get_parameter('use_data_multiplier', '1'))) { + if (config_update_value('use_data_multiplier', get_parameter('use_data_multiplier', '1'), true) === false) { $error_update[] = __('Use data multiplier'); } break; case 'net': - if (!config_update_value('netflow_path', get_parameter('netflow_path'))) { + if (config_update_value('netflow_path', get_parameter('netflow_path'), true) === false) { $error_update[] = __('Data storage path'); } - if (!config_update_value('netflow_interval', (int) get_parameter('netflow_interval'))) { + if (config_update_value('netflow_interval', (int) get_parameter('netflow_interval'), true) === false) { $error_update[] = __('Daemon interval'); } - if (!config_update_value('netflow_daemon', get_parameter('netflow_daemon'))) { + if (config_update_value('netflow_daemon', get_parameter('netflow_daemon'), true) === false) { $error_update[] = __('Daemon binary path'); } - if (!config_update_value('netflow_nfdump', get_parameter('netflow_nfdump'))) { + if (config_update_value('netflow_nfdump', get_parameter('netflow_nfdump'), true) === false) { $error_update[] = __('Nfdump binary path'); } - if (!config_update_value('netflow_nfexpire', get_parameter('netflow_nfexpire'))) { + if (config_update_value('netflow_nfexpire', get_parameter('netflow_nfexpire'), true) === false) { $error_update[] = __('Nfexpire binary path'); } - if (!config_update_value('netflow_max_resolution', (int) get_parameter('netflow_max_resolution'))) { + if (config_update_value('netflow_max_resolution', (int) get_parameter('netflow_max_resolution'), true) === false) { $error_update[] = __('Maximum chart resolution'); } - if (!config_update_value('netflow_disable_custom_lvfilters', get_parameter('netflow_disable_custom_lvfilters'))) { + if (config_update_value('netflow_disable_custom_lvfilters', get_parameter('netflow_disable_custom_lvfilters'), true) === false) { $error_update[] = __('Disable custom live view filters'); } - if (!config_update_value('netflow_max_lifetime', (int) get_parameter('netflow_max_lifetime'))) { + if (config_update_value('netflow_max_lifetime', (int) get_parameter('netflow_max_lifetime'), true) === false) { $error_update[] = __('Netflow max lifetime'); } - if (!config_update_value('netflow_get_ip_hostname', (int) get_parameter('netflow_get_ip_hostname'))) { + if (config_update_value('netflow_get_ip_hostname', (int) get_parameter('netflow_get_ip_hostname'), true) === false) { $error_update[] = __('Name resolution for IP address'); } break; case 'log': - if (!config_update_value('elasticsearch_ip', get_parameter('elasticsearch_ip'))) { + if (config_update_value('elasticsearch_ip', get_parameter('elasticsearch_ip'), true) === false) { $error_update[] = __('IP ElasticSearch server'); } - if (!config_update_value('elasticsearch_port', get_parameter('elasticsearch_port'))) { + if (config_update_value('elasticsearch_port', get_parameter('elasticsearch_port'), true) === false) { $error_update[] = __('Port ElasticSearch server'); } - if (!config_update_value('number_logs_viewed', (int) get_parameter('number_logs_viewed'))) { + if (config_update_value('number_logs_viewed', (int) get_parameter('number_logs_viewed'), true) === false) { $error_update[] = __('Number of logs viewed'); } - if (!config_update_value('Days_purge_old_information', (int) get_parameter('Days_purge_old_information'))) { + if (config_update_value('Days_purge_old_information', (int) get_parameter('Days_purge_old_information'), true) === false) { $error_update[] = __('Days to purge old information'); } break; case 'hist_db': - if ($config['dbname'] == get_parameter('history_db_name') - && $config['dbport'] == get_parameter('history_db_port') - && $config['dbhost'] == io_input_password(get_parameter('history_db_host')) + if ($config['dbname'] === get_parameter('history_db_name') + && $config['dbport'] === get_parameter('history_db_port') + && $config['dbhost'] === io_input_password(get_parameter('history_db_host')) ) { // Same definition for active and historical database! // This is a critical error. @@ -1483,47 +1484,47 @@ function config_update_config() ); return; } else { - if (!config_update_value('history_db_host', get_parameter('history_db_host'))) { + if (config_update_value('history_db_host', get_parameter('history_db_host'), true) === false) { $error_update[] = __('Host'); } - if (!config_update_value('history_db_port', get_parameter('history_db_port'))) { + if (config_update_value('history_db_port', get_parameter('history_db_port'), true) === false) { $error_update[] = __('Port'); } - if (!config_update_value('history_db_name', get_parameter('history_db_name'))) { + if (config_update_value('history_db_name', get_parameter('history_db_name'), true) === false) { $error_update[] = __('Database name'); } } - if (!config_update_value('history_db_enabled', get_parameter('history_db_enabled'))) { + if (config_update_value('history_db_enabled', get_parameter('history_db_enabled'), true) === false) { $error_update[] = __('Enable history database'); } - if (!config_update_value('history_event_enabled', get_parameter('history_event_enabled'))) { + if (config_update_value('history_event_enabled', get_parameter('history_event_enabled'), true) === false) { $error_update[] = __('Enable history event'); } - if (!config_update_value('history_db_user', get_parameter('history_db_user'))) { + if (config_update_value('history_db_user', get_parameter('history_db_user'), true) === false) { $error_update[] = __('Database user'); } - if (!config_update_value('history_db_pass', io_input_password(get_parameter('history_db_pass')))) { + if (config_update_value('history_db_pass', io_input_password(get_parameter('history_db_pass')), true) === false) { $error_update[] = __('Database password'); } $history_db_days = get_parameter('history_db_days'); - if (!is_numeric($history_db_days) + if (is_numeric($history_db_days) === false || $history_db_days <= 0 - || !config_update_value('history_db_days', $history_db_days) + || config_update_value('history_db_days', $history_db_days) === false ) { $error_update[] = __('Days'); } $history_event_days = get_parameter('history_event_days'); - if (!is_numeric($history_event_days) + if (is_numeric($history_event_days) === false || $history_event_days <= 0 - || !config_update_value('history_event_days', $history_event_days) + || config_update_value('history_event_days', $history_event_days) === false ) { $error_update[] = __('Event Days'); } @@ -1608,53 +1609,53 @@ function config_update_config() break; case 'ehorus': - if (!config_update_value('ehorus_enabled', (int) get_parameter('ehorus_enabled', 0))) { + if (config_update_value('ehorus_enabled', (int) get_parameter('ehorus_enabled', 0), true) === false) { $error_update[] = __('Enable eHorus'); } - if (!config_update_value('ehorus_user_level_conf', (int) get_parameter('ehorus_user_level_conf', 0))) { + if (config_update_value('ehorus_user_level_conf', (int) get_parameter('ehorus_user_level_conf', 0), true) === false) { $error_update[] = __('eHorus user login'); } - if (!config_update_value('ehorus_user', (string) get_parameter('ehorus_user', $config['ehorus_user']))) { + if (config_update_value('ehorus_user', (string) get_parameter('ehorus_user', $config['ehorus_user']), true) === false) { $error_update[] = __('eHorus user'); } - if (!config_update_value('ehorus_pass', io_input_password((string) get_parameter('ehorus_pass', $config['ehorus_pass'])))) { + if (config_update_value('ehorus_pass', io_input_password((string) get_parameter('ehorus_pass', $config['ehorus_pass'])), true) === false) { $error_update[] = __('eHorus password'); } - if (!config_update_value('ehorus_hostname', (string) get_parameter('ehorus_hostname', $config['ehorus_hostname']))) { + if (config_update_value('ehorus_hostname', (string) get_parameter('ehorus_hostname', $config['ehorus_hostname']), true) === false) { $error_update[] = __('eHorus API hostname'); } - if (!config_update_value('ehorus_port', (int) get_parameter('ehorus_port', $config['ehorus_port']))) { + if (config_update_value('ehorus_port', (int) get_parameter('ehorus_port', $config['ehorus_port']), true) === false) { $error_update[] = __('eHorus API port'); } - if (!config_update_value('ehorus_req_timeout', (int) get_parameter('ehorus_req_timeout', $config['ehorus_req_timeout']))) { + if (config_update_value('ehorus_req_timeout', (int) get_parameter('ehorus_req_timeout', $config['ehorus_req_timeout']), true) === false) { $error_update[] = __('eHorus request timeout'); } - if (!config_update_value('ehorus_custom_field', (string) get_parameter('ehorus_custom_field', $config['ehorus_custom_field']))) { + if (config_update_value('ehorus_custom_field', (string) get_parameter('ehorus_custom_field', $config['ehorus_custom_field']), true) === false) { $error_update[] = __('eHorus id custom field'); } break; case 'integria': - if (!config_update_value('integria_user_level_conf', (int) get_parameter('integria_user_level_conf', 0))) { + if (config_update_value('integria_user_level_conf', (int) get_parameter('integria_user_level_conf', 0), true) === false) { $error_update[] = __('Integria user login'); } - if (!config_update_value('integria_enabled', (int) get_parameter('integria_enabled', 0))) { + if (config_update_value('integria_enabled', (int) get_parameter('integria_enabled', 0), true) === false) { $error_update[] = __('Enable Integria IMS'); } - if (!config_update_value('integria_user', (string) get_parameter('integria_user', $config['integria_user']))) { + if (config_update_value('integria_user', (string) get_parameter('integria_user', $config['integria_user']), true) === false) { $error_update[] = __('Integria user'); } - if (!config_update_value('integria_pass', io_input_password((string) get_parameter('integria_pass', $config['integria_pass'])))) { + if (config_update_value('integria_pass', io_input_password((string) get_parameter('integria_pass', $config['integria_pass'])), true) === false) { $error_update[] = __('Integria password'); } @@ -1668,101 +1669,99 @@ function config_update_config() } } - if (!config_update_value('integria_hostname', $integria_hostname)) { + if (config_update_value('integria_hostname', $integria_hostname, true) === false) { $error_update[] = __('integria API hostname'); } - if (!config_update_value('integria_api_pass', io_input_password((string) get_parameter('integria_api_pass', $config['integria_api_pass'])))) { + if (config_update_value('integria_api_pass', io_input_password((string) get_parameter('integria_api_pass', $config['integria_api_pass'])), true) === false) { $error_update[] = __('Integria API password'); } - if (!config_update_value('integria_req_timeout', (int) get_parameter('integria_req_timeout', $config['integria_req_timeout']))) { + if (config_update_value('integria_req_timeout', (int) get_parameter('integria_req_timeout', $config['integria_req_timeout']), true) === false) { $error_update[] = __('Integria request timeout'); } - if (!config_update_value('default_group', (int) get_parameter('default_group', $config['default_group']))) { + if (config_update_value('default_group', (int) get_parameter('default_group', $config['default_group']), true) === false) { $error_update[] = __('Integria default group'); } - if (!config_update_value('cr_default_group', (int) get_parameter('cr_default_group', $config['cr_default_group']))) { + if (config_update_value('cr_default_group', (int) get_parameter('cr_default_group', $config['cr_default_group']), true) === false) { $error_update[] = __('Integria custom response default group'); } - if (!config_update_value('default_criticity', (int) get_parameter('default_criticity', $config['default_criticity']))) { + if (config_update_value('default_criticity', (int) get_parameter('default_criticity', $config['default_criticity']), true) === false) { $error_update[] = __('Integria default priority'); } - if (!config_update_value('cr_default_criticity', (int) get_parameter('cr_default_criticity', $config['cr_default_criticity']))) { + if (config_update_value('cr_default_criticity', (int) get_parameter('cr_default_criticity', $config['cr_default_criticity']), true) === false) { $error_update[] = __('Integria custom response default priority'); } - if (!config_update_value('default_creator', (string) get_parameter('default_creator', $config['default_creator']))) { + if (config_update_value('default_creator', (string) get_parameter('default_creator', $config['default_creator']), true) === false) { $error_update[] = __('Integria default creator'); } - if (!config_update_value('default_owner', (string) get_parameter('default_owner', $config['default_owner']))) { + if (config_update_value('default_owner', (string) get_parameter('default_owner', $config['default_owner']), true) === false) { $error_update[] = __('Integria default owner'); } - if (!config_update_value('cr_default_owner', (string) get_parameter('cr_default_owner', $config['cr_default_owner']))) { + if (config_update_value('cr_default_owner', (string) get_parameter('cr_default_owner', $config['cr_default_owner']), true) === false) { $error_update[] = __('Integria custom response default owner'); } - if (!config_update_value('incident_type', (int) get_parameter('incident_type', $config['incident_type']))) { + if (config_update_value('incident_type', (int) get_parameter('incident_type', $config['incident_type']), true) === false) { $error_update[] = __('Integria default ticket type'); } - if (!config_update_value('cr_incident_type', (int) get_parameter('cr_incident_type', $config['cr_incident_type']))) { + if (config_update_value('cr_incident_type', (int) get_parameter('cr_incident_type', $config['cr_incident_type']), true) === false) { $error_update[] = __('Integria custom response default ticket type'); } - if (!config_update_value('incident_status', (int) get_parameter('incident_status', $config['incident_status']))) { + if (config_update_value('incident_status', (int) get_parameter('incident_status', $config['incident_status']), true) === false) { $error_update[] = __('Integria default ticket status'); } - if (!config_update_value('cr_incident_status', (int) get_parameter('cr_incident_status', $config['cr_incident_status']))) { + if (config_update_value('cr_incident_status', (int) get_parameter('cr_incident_status', $config['cr_incident_status']), true) === false) { $error_update[] = __('Integria custom response default ticket status'); } - if (!config_update_value('incident_title', (string) get_parameter('incident_title', $config['incident_title']))) { + if (config_update_value('incident_title', (string) get_parameter('incident_title', $config['incident_title']), true) === false) { $error_update[] = __('Integria default ticket title'); } - if (!config_update_value('cr_incident_title', (string) get_parameter('cr_incident_title', $config['cr_incident_title']))) { + if (config_update_value('cr_incident_title', (string) get_parameter('cr_incident_title', $config['cr_incident_title']), true) === false) { $error_update[] = __('Integria custom response default ticket title'); } - if (!config_update_value('incident_content', (string) get_parameter('incident_content', $config['incident_content']))) { + if (config_update_value('incident_content', (string) get_parameter('incident_content', $config['incident_content']), true) === false) { $error_update[] = __('Integria default ticket content'); } - if (!config_update_value('cr_incident_content', (string) get_parameter('cr_incident_content', $config['cr_incident_content']))) { + if (config_update_value('cr_incident_content', (string) get_parameter('cr_incident_content', $config['cr_incident_content']), true) === false) { $error_update[] = __('Integria custom response default ticket content'); } break; case 'module_library': - $module_library_user = get_parameter('module_library_user'); - if (!config_update_value('module_library_user', $module_library_user)) { - $error_update[] = __('User'); + if (config_update_value('module_library_user', get_parameter('module_library_user'), true) === false) { + $error_update[] = __('Module Library User'); } - $module_library_password = get_parameter('module_library_password'); - if (!config_update_value('module_library_password', $module_library_password)) { - $error_update[] = __('Password'); + if (config_update_value('module_library_password', get_parameter('module_library_password'), true) === false) { + $error_update[] = __('Module Library Password'); } break; case 'websocket_engine': - if (!config_update_value('ws_bind_address', get_parameter('ws_bind_address'))) { + if (config_update_value('ws_bind_address', get_parameter('ws_bind_address'), true) === false) { $error_update[] = __('WebSocket bind address'); } - if (!config_update_value('ws_port', get_parameter('ws_port'))) { + if (config_update_value('ws_port', get_parameter('ws_port'), true) === false) { $error_update[] = __('WebSocket port'); } - if (!config_update_value('ws_proxy_url', get_parameter('ws_proxy_url'))) { + if (config_update_value('ws_proxy_url', get_parameter('ws_proxy_url'), true) === false) { $error_update[] = __('WebSocket proxy url'); } break; @@ -1780,11 +1779,27 @@ function config_update_config() if (count($error_update) > 0) { $config['error_config_update_config'] = []; $config['error_config_update_config']['correct'] = false; - $values = implode(', ', $error_update); - $config['error_config_update_config']['message'] = sprintf(__('Failed updated: the next values cannot update: %s'), $values); + $values = implode('
-', $error_update); + $config['error_config_update_config']['message'] = sprintf( + __('Failed updated: the next values cannot update:
-%s'), + $values + ); + + db_pandora_audit( + AUDIT_LOG_SETUP, + 'Failed changing Setup', + false, + false, + $config['error_config_update_config']['message'] + ); } else { $config['error_config_update_config'] = []; $config['error_config_update_config']['correct'] = true; + + db_pandora_audit( + AUDIT_LOG_SETUP, + 'Setup has changed' + ); } if (count($errors) > 0) { @@ -3314,14 +3329,14 @@ function get_um_url() { global $config; - if (isset($config['url_update_manager'])) { + if (isset($config['url_update_manager']) === true) { $url = $config['url_update_manager']; $url = substr($url, 0, (strlen($url) - strpos(strrev($url), '/'))); } else { $url = 'https://licensing.artica.es/pandoraupdate7/'; config_update_value( 'url_update_manager', - 'https://licensing.artica.es/pandoraupdate7/server.php' + $url.'/server.php' ); } diff --git a/pandora_console/include/functions_db.php b/pandora_console/include/functions_db.php index cbcc645fdb..6929325319 100644 --- a/pandora_console/include/functions_db.php +++ b/pandora_console/include/functions_db.php @@ -231,8 +231,8 @@ function db_pandora_audit($accion, $descripcion, $user_id=false, $ip=true, $info { global $config; - // Ignore $ip and always set the ip address - if (isset($config['remote_addr'])) { + // Ignore $ip and always set the ip address. + if (isset($config['remote_addr']) === true) { $ip = $config['remote_addr']; } else { if ($_SERVER['REMOTE_ADDR']) { @@ -245,46 +245,26 @@ function db_pandora_audit($accion, $descripcion, $user_id=false, $ip=true, $info if ($user_id !== false) { $id = $user_id; } else { - if (isset($config['id_user'])) { - $id = $config['id_user']; - } else { - $id = 0; - } + $id = (isset($config['id_user']) === true) ? $config['id_user'] : 0; } $accion = io_safe_input($accion); $descripcion = io_safe_input($descripcion); - switch ($config['dbtype']) { - case 'mysql': - case 'postgresql': - $values = [ - 'id_usuario' => $id, - 'accion' => $accion, - 'ip_origen' => $ip, - 'descripcion' => $descripcion, - 'fecha' => date('Y-m-d H:i:s'), - 'utimestamp' => time(), - ]; - break; - - case 'oracle': - $values = [ - 'id_usuario' => $id, - 'accion' => $accion, - 'ip_origen' => $ip, - 'descripcion' => $descripcion, - 'fecha' => '#to_date(\''.date('Y-m-d H:i:s').'\',\'YYYY-MM-DD HH24:MI:SS\')', - 'utimestamp' => time(), - ]; - break; - } + $values = [ + 'id_usuario' => $id, + 'accion' => $accion, + 'ip_origen' => $ip, + 'descripcion' => $descripcion, + 'fecha' => date('Y-m-d H:i:s'), + 'utimestamp' => time(), + ]; $id_audit = db_process_sql_insert('tsesion', $values); $valor = ''.$values['fecha'].' - '.io_safe_output($id).' - '.io_safe_output($accion).' - '.$ip.' - '.io_safe_output($descripcion)."\n"; - if ($config['audit_log_enabled']) { + if ((bool) $config['audit_log_enabled'] === true) { file_put_contents($config['homedir'].'/log/audit.log', $valor, FILE_APPEND); } @@ -298,12 +278,19 @@ function db_pandora_audit($accion, $descripcion, $user_id=false, $ip=true, $info /** * Log in a user into Pandora. * - * @param string $id_user User id + * @param string $id_user User id. * @param string $ip Client user IP address. + * + * @return void */ function db_logon($id_user, $ip) { - db_pandora_audit('Logon', 'Logged in', $id_user, $ip); + db_pandora_audit( + AUDIT_LOG_USER_REGISTRATION, + 'Logged in', + $id_user, + $ip + ); // Update last registry of user to set last logon. How do we audit when the user was created then? process_user_contact($id_user); @@ -313,12 +300,19 @@ function db_logon($id_user, $ip) /** * Log out a user into Pandora. * - * @param string $id_user User id + * @param string $id_user User id. * @param string $ip Client user IP address. + * + * @return void */ function db_logoff($id_user, $ip) { - db_pandora_audit('Logoff', 'Logged out', $id_user, $ip); + db_pandora_audit( + AUDIT_LOG_USER_REGISTRATION, + 'Logged out', + $id_user, + $ip + ); } diff --git a/pandora_console/include/functions_events.php b/pandora_console/include/functions_events.php index 9b097d4a93..2e752b9623 100644 --- a/pandora_console/include/functions_events.php +++ b/pandora_console/include/functions_events.php @@ -1903,7 +1903,10 @@ function events_delete_event( if (check_acl($config['id_user'], $event_group, 'EM') == 0) { // Check ACL. - db_pandora_audit('ACL Violation', 'Attempted deleting event #'.$event); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Attempted deleting event #'.$event + ); $errors++; } else { $ret = db_process_sql_delete($table_event, ['id_evento' => $event]); @@ -1911,7 +1914,10 @@ function events_delete_event( if (!$ret) { $errors++; } else { - db_pandora_audit('Event deleted', 'Deleted event #'.$event); + db_pandora_audit( + AUDIT_LOG_ALERT_MANAGEMENT, + 'Deleted event #'.$event + ); // ACL didn't fail nor did return. continue; } @@ -1995,7 +2001,10 @@ function events_change_status( } if (check_acl($config['id_user'], $event_group, 'EW') == 0) { - db_pandora_audit('ACL Violation', 'Attempted updating event #'.$id); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Attempted updating event #'.$id + ); unset($id_event[$k]); } @@ -2106,7 +2115,10 @@ function events_change_owner( } if (check_acl($config['id_user'], $event_group, 'EW') == 0) { - db_pandora_audit('ACL Violation', 'Attempted updating event #'.$id); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Attempted updating event #'.$id + ); unset($id_event[$k]); } } @@ -2221,7 +2233,10 @@ function events_comment( } if (check_acl($config['id_user'], $event_group, 'EW') == 0) { - db_pandora_audit('ACL Violation', 'Attempted updating event #'.$id); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Attempted updating event #'.$id + ); unset($id_event[$k]); } diff --git a/pandora_console/include/functions_filemanager.php b/pandora_console/include/functions_filemanager.php index 9f47cf7b29..b33b68aac7 100644 --- a/pandora_console/include/functions_filemanager.php +++ b/pandora_console/include/functions_filemanager.php @@ -142,7 +142,10 @@ function upload_file($upload_file_or_zip, $default_real_directory, $destination_ check_login(); if (! check_acl($config['id_user'], 0, 'AW')) { - db_pandora_audit('ACL Violation', 'Trying to access File manager'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access File manager' + ); include 'general/noaccess.php'; return; } @@ -257,7 +260,10 @@ function create_text_file($default_real_directory, $destination_directory) check_login(); if (! check_acl($config['id_user'], 0, 'AW')) { - db_pandora_audit('ACL Violation', 'Trying to access File manager'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access File manager' + ); include 'general/noaccess.php'; return; } @@ -1019,7 +1025,10 @@ function filemanager_safe_directory( } if ($forbiddenAttempting === true) { - db_pandora_audit('File manager', 'Attempting to use a forbidden file or directory name'); + db_pandora_audit( + AUDIT_LOG_HACK_ATTEMPT, + 'Attempting to use a forbidden file or directory name' + ); } return $directory; diff --git a/pandora_console/include/functions_incidents.php b/pandora_console/include/functions_incidents.php index 4e57ce3b74..78510d1b06 100644 --- a/pandora_console/include/functions_incidents.php +++ b/pandora_console/include/functions_incidents.php @@ -289,7 +289,10 @@ function incidents_delete_incident($id_incident) $notes = array_merge($notes, array_keys(incidents_get_notes($id_inc))); $attachments = array_merge($attachments, array_keys(incidents_get_attach($id_inc))); - db_pandora_audit('Incident deleted', $config['id_user'].' deleted incident #'.$id_inc); + db_pandora_audit( + AUDIT_LOG_INCIDENT_MANAGEMENT, + $config['id_user'].' deleted incident #'.$id_inc + ); } // Delete notes diff --git a/pandora_console/include/functions_planned_downtimes.php b/pandora_console/include/functions_planned_downtimes.php index 75b63083b7..f6fdf49c11 100644 --- a/pandora_console/include/functions_planned_downtimes.php +++ b/pandora_console/include/functions_planned_downtimes.php @@ -588,7 +588,7 @@ function planned_downtimes_stop($downtime) 1 ); db_pandora_audit( - 'Planned Downtime management', + AUDIT_LOG_SYSTEM, 'Manual stop downtime '.$downtime['name'].' (ID '.$downtime['id'].')', false, true diff --git a/pandora_console/include/functions_reporting.php b/pandora_console/include/functions_reporting.php index ebea0146a1..9ccd8e1ff0 100755 --- a/pandora_console/include/functions_reporting.php +++ b/pandora_console/include/functions_reporting.php @@ -14540,7 +14540,10 @@ function reporting_email_template( if (empty($destination) === false) { send_email_attachment($destination, $body, $subject, $attachments); } else { - db_pandora_audit('ERROR:', 'Cron jobs mail, empty destination email.'); + db_pandora_audit( + AUDIT_LOG_SYSTEM, + 'Cron jobs mail, empty destination email.' + ); } } } diff --git a/pandora_console/include/functions_treeview.php b/pandora_console/include/functions_treeview.php index 5f98ed9df8..f0bdbbc613 100755 --- a/pandora_console/include/functions_treeview.php +++ b/pandora_console/include/functions_treeview.php @@ -546,7 +546,7 @@ function treeview_printTable($id_agente, $server_data=[], $no_head=false) && ! check_acl_one_of_groups($config['id_user'], $groups, 'AW', false) ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent General Information' ); include_once 'general/noaccess.php'; diff --git a/pandora_console/include/lib/Dashboard/Manager.php b/pandora_console/include/lib/Dashboard/Manager.php index e72f292537..33cd0a3c2c 100644 --- a/pandora_console/include/lib/Dashboard/Manager.php +++ b/pandora_console/include/lib/Dashboard/Manager.php @@ -205,7 +205,7 @@ class Manager implements PublicLogin } else { if (self::validatePublicHash($hash) === false) { db_pandora_audit( - 'Invalid public hash', + AUDIT_LOG_HACK_ATTEMPT, 'Trying to access public dashboard' ); include 'general/noaccess.php'; @@ -572,12 +572,12 @@ class Manager implements PublicLogin // Audit. if ($result !== 0) { \db_pandora_audit( - 'Dashboard management', + AUDIT_LOG_DASHBOARD_MANAGEMENT, 'Delete dashboard #'.$this->dashboardId ); } else { \db_pandora_audit( - 'Dashboard management', + AUDIT_LOG_DASHBOARD_MANAGEMENT, 'Fail try to delete dashboard #'.$this->dashboardId ); } diff --git a/pandora_console/include/lib/Dashboard/Widgets/maps_made_by_user.php b/pandora_console/include/lib/Dashboard/Widgets/maps_made_by_user.php index 80f6183bde..b87b932eb0 100644 --- a/pandora_console/include/lib/Dashboard/Widgets/maps_made_by_user.php +++ b/pandora_console/include/lib/Dashboard/Widgets/maps_made_by_user.php @@ -370,7 +370,7 @@ class MapsMadeByUser extends Widget ); } catch (Throwable $e) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access visual console without Id' ); include 'general/noaccess.php'; diff --git a/pandora_console/include/lib/Dashboard/Widgets/system_group_status.php b/pandora_console/include/lib/Dashboard/Widgets/system_group_status.php index e43ac4659c..57b4f90fb3 100644 --- a/pandora_console/include/lib/Dashboard/Widgets/system_group_status.php +++ b/pandora_console/include/lib/Dashboard/Widgets/system_group_status.php @@ -364,7 +364,7 @@ class SystemGroupStatusWidget extends Widget if ($agent_a === 0 && $agent_w === 0) { \db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent view (Grouped)' ); include 'general/noaccess.php'; diff --git a/pandora_console/include/lib/Websockets/WSManager.php b/pandora_console/include/lib/Websockets/WSManager.php index a8d4226af7..e973674f8c 100644 --- a/pandora_console/include/lib/Websockets/WSManager.php +++ b/pandora_console/include/lib/Websockets/WSManager.php @@ -295,7 +295,7 @@ class WSManager extends WebSocketServer if (\check_login(false) === false) { $this->disconnect($user->socket); \db_pandora_audit( - 'WebSockets engine', + AUDIT_LOG_WEB_SOCKETS, 'Trying to access websockets engine without a valid session', 'N/A' ); @@ -304,7 +304,7 @@ class WSManager extends WebSocketServer // User exists, and session is valid. \db_pandora_audit( - 'WebSockets engine', + AUDIT_LOG_WEB_SOCKETS, 'WebSocket connection started', $user->account->idUser ); @@ -427,7 +427,7 @@ class WSManager extends WebSocketServer if ($user->account) { $_SERVER['REMOTE_ADDR'] = $user->address; \db_pandora_audit( - 'WebSockets engine', + AUDIT_LOG_WEB_SOCKETS, 'WebSocket connection finished', $user->account->idUser ); diff --git a/pandora_console/include/rest-api/index.php b/pandora_console/include/rest-api/index.php index 5b9b5b13bc..9d3e4faea2 100644 --- a/pandora_console/include/rest-api/index.php +++ b/pandora_console/include/rest-api/index.php @@ -66,7 +66,7 @@ if ($visualConsoleId) { if (!$aclRead && !$aclWrite && !$aclManage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access visual console without group access' ); http_response_code(403); @@ -147,7 +147,7 @@ if ($getVisualConsole === true) { if (!$aclRead && !$aclWrite && !$aclManage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access visual console without group access' ); http_response_code(403); @@ -164,7 +164,7 @@ if ($getVisualConsole === true) { if (!$aclRead && !$aclWrite && !$aclManage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access visual console without group access' ); http_response_code(403); @@ -239,7 +239,7 @@ if ($getVisualConsole === true) { // ACL. if (!$aclWrite && !$aclManage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to delete visual console item without group access' ); http_response_code(403); diff --git a/pandora_console/include/rest-api/models/VisualConsole/View.php b/pandora_console/include/rest-api/models/VisualConsole/View.php index 2f7b758099..4830b4bfce 100644 --- a/pandora_console/include/rest-api/models/VisualConsole/View.php +++ b/pandora_console/include/rest-api/models/VisualConsole/View.php @@ -601,7 +601,7 @@ class View extends \HTML if (!$aclRead && !$aclWrite && !$aclManage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access visual console without group access' ); http_response_code(403); @@ -618,7 +618,7 @@ class View extends \HTML if (!$aclRead && !$aclWrite && !$aclManage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access visual console without group access' ); http_response_code(403); diff --git a/pandora_console/index.php b/pandora_console/index.php index 7828b2c700..76ffded47a 100755 --- a/pandora_console/index.php +++ b/pandora_console/index.php @@ -377,7 +377,7 @@ if (! isset($config['id_user'])) { $login_failed = true; include_once 'general/login_page.php'; db_pandora_audit( - 'Logon Failed', + AUDIT_LOG_USER_REGISTRATION, 'Invalid double auth login: '.$_SERVER['REMOTE_ADDR'], $_SERVER['REMOTE_ADDR'] ); @@ -446,7 +446,11 @@ if (! isset($config['id_user'])) { if ($blocked) { include_once 'general/login_page.php'; - db_pandora_audit('Password expired', 'Password expired: '.$nick, $nick); + db_pandora_audit( + AUDIT_LOG_USER_MANAGEMENT, + 'Password expired: '.$nick, + $nick + ); while (ob_get_length() > 0) { ob_end_flush(); } @@ -489,7 +493,7 @@ if (! isset($config['id_user'])) { // Login ok and password has expired. include_once 'general/login_page.php'; db_pandora_audit( - 'Password expired', + AUDIT_LOG_USER_MANAGEMENT, 'Password expired: '.$nick, $nick ); @@ -628,7 +632,7 @@ if (! isset($config['id_user'])) { $user_language = get_user_language($config['id_user']); $l10n = null; - if (file_exists('./include/languages/'.$user_language.'.mo')) { + if (file_exists('./include/languages/'.$user_language.'.mo') === true) { $cacheFileReader = new CachedFileReader( './include/languages/'.$user_language.'.mo' ); @@ -639,60 +643,50 @@ if (! isset($config['id_user'])) { // Login wrong. $blocked = false; - if ((!is_user_admin($nick) || $config['enable_pass_policy_admin']) - && file_exists(ENTERPRISE_DIR.'/load_enterprise.php') + if ((is_user_admin($nick) === false || (bool) $config['enable_pass_policy_admin'] === true) + && file_exists(ENTERPRISE_DIR.'/load_enterprise.php') === true ) { $blocked = login_check_blocked($nick); } - if (!$blocked) { - if (file_exists(ENTERPRISE_DIR.'/load_enterprise.php')) { + if ((bool) $blocked === false) { + if (file_exists(ENTERPRISE_DIR.'/load_enterprise.php') === true) { // Checks failed attempts. login_check_failed($nick); } $login_failed = true; - include_once 'general/login_page.php'; - db_pandora_audit( - 'Logon Failed', - 'Invalid login: '.$nick, - $nick - ); - while (ob_get_length() > 0) { - ob_end_flush(); - } - - exit(''); - } else { - include_once 'general/login_page.php'; - db_pandora_audit( - 'Logon Failed', - 'Invalid login: '.$nick, - $nick - ); - while (ob_get_length() > 0) { - ob_end_flush(); - } - - exit(''); } + + include_once 'general/login_page.php'; + db_pandora_audit( + AUDIT_LOG_USER_REGISTRATION, + 'Invalid login: '.$nick, + $nick + ); + + while (ob_get_length() > 0) { + ob_end_flush(); + } + + exit(''); } // Form the url. $query_params_redirect = $_GET; // Visual console do not want sec2. - if ($home_page == 'Visual console') { + if ($home_page === 'Visual console') { unset($query_params_redirect['sec2']); } // Dashboard do not want sec2. - if ($home_page == 'Dashboard') { + if ($home_page === 'Dashboard') { unset($query_params_redirect['sec2']); } $redirect_url = '?logged=1'; foreach ($query_params_redirect as $key => $value) { - if ($key == 'login') { + if ($key === 'login') { continue; } @@ -704,7 +698,7 @@ if (! isset($config['id_user'])) { header('Location: '.ui_get_full_url('index.php'.$redirect_url)); exit; // Always exit after sending location headers. - } else if (isset($_GET['loginhash'])) { + } else if (isset($_GET['loginhash']) === true) { // Hash login process. $loginhash_data = get_parameter('loginhash_data', ''); $loginhash_user = str_rot13(get_parameter('loginhash_user', '')); @@ -719,7 +713,11 @@ if (! isset($config['id_user'])) { $config['id_user'] = $loginhash_user; } else { include_once 'general/login_page.php'; - db_pandora_audit('Logon Failed (loginhash', '', 'system'); + db_pandora_audit( + AUDIT_LOG_USER_REGISTRATION, + 'Loginhash failed', + 'system' + ); while (ob_get_length() > 0) { ob_end_flush(); } @@ -922,7 +920,11 @@ if (! isset($config['id_user'])) { $config['id_user'] = $loginhash_user; } else { include_once 'general/login_page.php'; - db_pandora_audit('Logon Failed (loginhash', '', 'system'); + db_pandora_audit( + AUDIT_LOG_USER_REGISTRATION, + 'Loginhash failed', + 'system' + ); while (ob_get_length() > 0) { ob_end_flush(); } diff --git a/pandora_console/mobile/include/system.class.php b/pandora_console/mobile/include/system.class.php index 2cbf124b66..b8a21d60b1 100644 --- a/pandora_console/mobile/include/system.class.php +++ b/pandora_console/mobile/include/system.class.php @@ -142,7 +142,7 @@ class System return true; } else { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access to Mobile Page' ); diff --git a/pandora_console/operation/agentes/agent_fields.php b/pandora_console/operation/agentes/agent_fields.php index bb27bd3f43..3b1c18f7ad 100755 --- a/pandora_console/operation/agentes/agent_fields.php +++ b/pandora_console/operation/agentes/agent_fields.php @@ -27,7 +27,7 @@ if ($id_agente === -1) { if (! check_acl($config['id_user'], $agent['id_grupo'], 'AR')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent General Information' ); include_once 'general/noaccess.php'; diff --git a/pandora_console/operation/agentes/alerts_status.php b/pandora_console/operation/agentes/alerts_status.php index 0f89992d3f..63619c80b1 100755 --- a/pandora_console/operation/agentes/alerts_status.php +++ b/pandora_console/operation/agentes/alerts_status.php @@ -82,7 +82,7 @@ if ($user_tag_array) { foreach ($tag_param_validate as $key => $value) { if (!in_array($value, $user_tag_array)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Alert view' ); include 'general/noaccess.php'; @@ -135,7 +135,10 @@ if ($idAgent != 0) { } if (!check_acl_one_of_groups($config['id_user'], $all_groups, 'AR') && !check_acl_one_of_groups($config['id_user'], $id_group, 'AW')) { - db_pandora_audit('ACL Violation', 'Trying to access alert view'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access alert view' + ); include 'general/noaccess.php'; exit; } @@ -157,7 +160,10 @@ if ($idAgent != 0) { $access = ($agent_a == true) ? 'AR' : (($agent_w == true) ? 'AW' : 'AR'); if (!$agent_a && !$agent_w) { - db_pandora_audit('ACL Violation', 'Trying to access alert view'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access alert view' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/operation/agentes/custom_fields.php b/pandora_console/operation/agentes/custom_fields.php index ac7501312d..e336826d1f 100644 --- a/pandora_console/operation/agentes/custom_fields.php +++ b/pandora_console/operation/agentes/custom_fields.php @@ -32,7 +32,7 @@ if (!isset($all_groups)) { if (! check_acl_one_of_groups($config['id_user'], $all_groups, 'AR') && ! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent General Information' ); include_once 'general/noaccess.php'; diff --git a/pandora_console/operation/agentes/datos_agente.php b/pandora_console/operation/agentes/datos_agente.php index ed1a328526..e484815650 100755 --- a/pandora_console/operation/agentes/datos_agente.php +++ b/pandora_console/operation/agentes/datos_agente.php @@ -44,7 +44,7 @@ $time_to = (string) get_parameter('time_to', date(TIME_FORMAT)); if (! check_acl($config['id_user'], $group, 'AR') || $module_id == 0) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent Data view' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/agentes/ehorus.php b/pandora_console/operation/agentes/ehorus.php index 2529031e2a..eb624bfe5f 100644 --- a/pandora_console/operation/agentes/ehorus.php +++ b/pandora_console/operation/agentes/ehorus.php @@ -34,7 +34,10 @@ if (empty($agent_id)) { $group_id = db_get_value('id_grupo', 'tagente', 'id_agente', $agent_id); if ($group_id === false || (!check_acl($config['id_user'], $group_id, 'AW') && !is_user_admin($config['id_user']))) { - db_pandora_audit('ACL Violation', 'Trying to access eHorus'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access eHorus' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/operation/agentes/estado_agente.php b/pandora_console/operation/agentes/estado_agente.php index 1127cd59b5..8e5590b76a 100644 --- a/pandora_console/operation/agentes/estado_agente.php +++ b/pandora_console/operation/agentes/estado_agente.php @@ -40,7 +40,10 @@ enterprise_include_once('include/functions_config_agents.php'); check_login(); if (! check_acl($config['id_user'], 0, 'AR') && ! check_acl($config['id_user'], 0, 'AW')) { - db_pandora_audit('ACL Violation', 'Trying to access agent main list view'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access agent main list view' + ); include 'general/noaccess.php'; return; @@ -126,7 +129,7 @@ if (is_ajax()) { $id_agent = (int) modules_get_agentmodule_agent((int) $id_module); if (! check_acl_one_of_groups($config['id_user'], agents_get_all_groups_agent($id_agent), 'AR')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access agent main list view' ); echo json_encode(false); diff --git a/pandora_console/operation/agentes/estado_generalagente.php b/pandora_console/operation/agentes/estado_generalagente.php index 7261944afb..ac2e112347 100755 --- a/pandora_console/operation/agentes/estado_generalagente.php +++ b/pandora_console/operation/agentes/estado_generalagente.php @@ -67,7 +67,7 @@ if (! check_acl_one_of_groups($config['id_user'], $all_groups, 'AR') && ! check_acl_one_of_groups($config['id_user'], $all_groups, 'AW') ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent General Information' ); include_once 'general/noaccess.php'; diff --git a/pandora_console/operation/agentes/estado_monitores.php b/pandora_console/operation/agentes/estado_monitores.php index 241cd5aee8..02f683154f 100755 --- a/pandora_console/operation/agentes/estado_monitores.php +++ b/pandora_console/operation/agentes/estado_monitores.php @@ -139,7 +139,7 @@ if (is_ajax()) { if (!isset($id_agente)) { // This page is included, $id_agente should be passed to it. db_pandora_audit( - 'HACK Attempt', + AUDIT_LOG_HACK_ATTEMPT, 'Trying to get the monitor list without id_agent passed' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/agentes/export_csv.php b/pandora_console/operation/agentes/export_csv.php index ea01889713..9b2632db98 100644 --- a/pandora_console/operation/agentes/export_csv.php +++ b/pandora_console/operation/agentes/export_csv.php @@ -31,7 +31,7 @@ if (isset($_GET['agentmodule']) && isset($_GET['agent'])) { $agentmodule_name = modules_get_agentmodule_name($id_agentmodule); if (! check_acl($config['id_user'], agents_get_agent_group($id_agent), 'AR')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent Export Data' ); include '../../general/noaccess.php'; diff --git a/pandora_console/operation/agentes/gis_view.php b/pandora_console/operation/agentes/gis_view.php index a0be08eccd..9f4a11f575 100644 --- a/pandora_console/operation/agentes/gis_view.php +++ b/pandora_console/operation/agentes/gis_view.php @@ -19,7 +19,10 @@ global $config; check_login(); if (! check_acl($config['id_user'], 0, 'MR') && ! check_acl($config['id_user'], 0, 'MW') && ! check_acl($config['id_user'], 0, 'MM') && ! is_user_admin($config['id_user'])) { - db_pandora_audit('ACL Violation', 'Trying to access GIS Agent view'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access GIS Agent view' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/operation/agentes/graphs.php b/pandora_console/operation/agentes/graphs.php index 288c6ab5c7..99ae7337bd 100644 --- a/pandora_console/operation/agentes/graphs.php +++ b/pandora_console/operation/agentes/graphs.php @@ -20,7 +20,7 @@ ui_require_javascript_file('calendar'); if (! check_acl($config['id_user'], $id_grupo, 'AR') && ! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access (read) to agent '.agents_get_name($id_agente) ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/agentes/group_view.php b/pandora_console/operation/agentes/group_view.php index 6b39fe2978..9ec0782e1f 100644 --- a/pandora_console/operation/agentes/group_view.php +++ b/pandora_console/operation/agentes/group_view.php @@ -40,7 +40,7 @@ $agent_w = check_acl($config['id_user'], 0, 'AW'); if (!$agent_a && !$agent_w) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent view (Grouped)' ); include 'general/noaccess.php'; @@ -66,7 +66,10 @@ if (isset($_GET['update_netgroup'])) { ); } } else { - db_pandora_audit('ACL Violation', 'Trying to set flag for groups'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to set flag for groups' + ); include 'general/noaccess.php'; exit; } diff --git a/pandora_console/operation/agentes/interface_view.php b/pandora_console/operation/agentes/interface_view.php index 4f20c459f3..5a76a6afe3 100644 --- a/pandora_console/operation/agentes/interface_view.php +++ b/pandora_console/operation/agentes/interface_view.php @@ -33,7 +33,7 @@ check_login(); if (check_acl($config['id_user'], 0, 'AR') === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/agentes/networkmap.dinamic.php b/pandora_console/operation/agentes/networkmap.dinamic.php index 29651ca1ad..bd2ed02160 100644 --- a/pandora_console/operation/agentes/networkmap.dinamic.php +++ b/pandora_console/operation/agentes/networkmap.dinamic.php @@ -42,7 +42,7 @@ if (defined('_activeTab_') && _activeTab_ != '_activeTab_') { // Networkmap id required if (!isset($id)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access node graph builder' ); include 'general/noaccess.php'; @@ -54,7 +54,7 @@ if (!isset($store_group)) { $store_group = db_get_value('id_group', 'tmap', 'id', $id); if ($store_group === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to accessnode graph builder' ); include 'general/noaccess.php'; @@ -77,7 +77,7 @@ if (!isset($networkmap_manage)) { if (!$networkmap_read && !$networkmap_write && !$networkmap_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access node graph builder' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/agentes/pandora_networkmap.editor.php b/pandora_console/operation/agentes/pandora_networkmap.editor.php index ac80801962..9a31923308 100644 --- a/pandora_console/operation/agentes/pandora_networkmap.editor.php +++ b/pandora_console/operation/agentes/pandora_networkmap.editor.php @@ -89,7 +89,7 @@ if ($edit_networkmap) { if (!$networkmap_write && !$networkmap_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/agentes/pandora_networkmap.php b/pandora_console/operation/agentes/pandora_networkmap.php index c6b5ea71b9..91204eb11e 100644 --- a/pandora_console/operation/agentes/pandora_networkmap.php +++ b/pandora_console/operation/agentes/pandora_networkmap.php @@ -40,7 +40,7 @@ $networkmaps_manage = (bool) check_acl($config['id_user'], 0, 'MM'); if ($networkmaps_read === false && $networkmaps_write === false && $networkmaps_manage === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); include $config['homedir'].'/general/noaccess.php'; @@ -76,7 +76,7 @@ if ($save_empty_networkmap === true) { if ($networkmap_write === false && $networkmap_manage === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); include 'general/noaccess.php'; @@ -113,7 +113,7 @@ if ($save_empty_networkmap === true) { if (!$networkmap_write && !$networkmap_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); include 'general/noaccess.php'; @@ -164,7 +164,7 @@ if ($save_empty_networkmap === true) { if (!$networkmap_write && !$networkmap_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); include 'general/noaccess.php'; @@ -228,7 +228,7 @@ if ($new_networkmap || $save_networkmap) { return; } else { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); include 'general/noaccess.php'; @@ -247,7 +247,7 @@ if ($new_networkmap || $save_networkmap) { if ($networkmap_write === false && $networkmap_manage === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); include 'general/noaccess.php'; @@ -341,7 +341,7 @@ if ($new_networkmap || $save_networkmap) { if ($networkmap_write === false && $networkmap_manage === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); include 'general/noaccess.php'; @@ -409,7 +409,7 @@ else if ($update_networkmap || $copy_networkmap || $delete) { // Networkmap id required if (empty($id)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); include 'general/noaccess.php'; @@ -421,7 +421,7 @@ else if ($update_networkmap || $copy_networkmap || $delete) { if ($id_group_map_old === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to accessnode graph builder' ); include 'general/noaccess.php'; @@ -433,7 +433,7 @@ else if ($update_networkmap || $copy_networkmap || $delete) { if ($networkmap_write === false && $networkmap_manage === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); include 'general/noaccess.php'; @@ -453,7 +453,7 @@ else if ($update_networkmap || $copy_networkmap || $delete) { if ($networkmap_write === false && $networkmap_manage === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/agentes/pandora_networkmap.view.php b/pandora_console/operation/agentes/pandora_networkmap.view.php index 7747c0cbdc..de7ef79c77 100644 --- a/pandora_console/operation/agentes/pandora_networkmap.view.php +++ b/pandora_console/operation/agentes/pandora_networkmap.view.php @@ -488,7 +488,7 @@ if (is_ajax() === true) { if (!$networkmap_write && !$networkmap_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); echo json_encode($return); @@ -550,7 +550,7 @@ if (is_ajax() === true) { if (!$networkmap_write && !$networkmap_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); echo json_encode($return); @@ -595,7 +595,7 @@ if (is_ajax() === true) { if (!$networkmap_write && !$networkmap_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); echo json_encode($return); @@ -637,7 +637,7 @@ if (is_ajax() === true) { if (!$networkmap_write && !$networkmap_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); echo json_encode($return); @@ -952,7 +952,7 @@ if (is_ajax() === true) { if (!$networkmap_write && !$networkmap_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); echo json_encode($return); @@ -2020,7 +2020,7 @@ if (is_ajax() === true) { if (!$networkmap_write && !$networkmap_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); echo json_encode($return); @@ -2244,7 +2244,7 @@ if ($networkmap === false) { if (!$networkmap_read && !$networkmap_write && !$networkmap_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access networkmap' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/agentes/status_monitor.php b/pandora_console/operation/agentes/status_monitor.php index 3d869a02dd..96d1ba3c3f 100644 --- a/pandora_console/operation/agentes/status_monitor.php +++ b/pandora_console/operation/agentes/status_monitor.php @@ -36,7 +36,7 @@ if (! check_acl($config['id_user'], 0, 'AR') && ! check_acl($config['id_user'], 0, 'AM') ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent Management' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/agentes/tactical.php b/pandora_console/operation/agentes/tactical.php index c1274fdc47..7efefea155 100755 --- a/pandora_console/operation/agentes/tactical.php +++ b/pandora_console/operation/agentes/tactical.php @@ -39,7 +39,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'AR') && ! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Agent view (Grouped)' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/agentes/url_address.php b/pandora_console/operation/agentes/url_address.php index 23b2f25eae..d21cade534 100644 --- a/pandora_console/operation/agentes/url_address.php +++ b/pandora_console/operation/agentes/url_address.php @@ -18,7 +18,7 @@ check_login(); if (! check_acl($config['id_user'], $id_grupo, 'AW', $id_agente)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access agent manager' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/agentes/ver_agente.php b/pandora_console/operation/agentes/ver_agente.php index 50ba2a7f9c..07e9614857 100644 --- a/pandora_console/operation/agentes/ver_agente.php +++ b/pandora_console/operation/agentes/ver_agente.php @@ -1274,7 +1274,7 @@ $all_groups = agents_get_all_groups_agent($id_agente, $id_grupo); if (! check_acl_one_of_groups($config['id_user'], $all_groups, 'AR') && ! check_acl_one_of_groups($config['id_user'], $all_groups, 'AW', $id_agente)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access (read) to agent '.agents_get_name($id_agente) ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/events/events.php b/pandora_console/operation/events/events.php index 047166c887..ec41980b23 100644 --- a/pandora_console/operation/events/events.php +++ b/pandora_console/operation/events/events.php @@ -55,7 +55,7 @@ if (! $event_a && ! $event_m ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access event viewer' ); if (is_ajax()) { @@ -1003,7 +1003,7 @@ if (is_metaconsole() !== true) { ) { if ($config['show_events_in_local'] == 0) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access event viewer. View disabled due event replication.' ); ui_print_info_message( diff --git a/pandora_console/operation/events/events_list.php b/pandora_console/operation/events/events_list.php index dc4a0333a9..d5dbc2a13c 100644 --- a/pandora_console/operation/events/events_list.php +++ b/pandora_console/operation/events/events_list.php @@ -59,7 +59,7 @@ $access = ($event_a == true) ? 'ER' : (($event_w == true) ? 'EW' : (($event_m == if (!$event_a && !$event_w && !$event_m) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access event viewer' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/events/sound_events.php b/pandora_console/operation/events/sound_events.php index 8959ae2f47..0772577784 100644 --- a/pandora_console/operation/events/sound_events.php +++ b/pandora_console/operation/events/sound_events.php @@ -46,7 +46,10 @@ if (check_acl($config['id_user'], 0, 'ER') === false && check_acl($config['id_user'], 0, 'EW') === false && check_acl($config['id_user'], 0, 'EM') === false ) { - db_pandora_audit('ACL Violation', 'Trying to access event viewer'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access event viewer' + ); include 'general/noaccess.php'; return; diff --git a/pandora_console/operation/gis_maps/render_view.php b/pandora_console/operation/gis_maps/render_view.php index b2f0513bca..6ecb1ed6a4 100644 --- a/pandora_console/operation/gis_maps/render_view.php +++ b/pandora_console/operation/gis_maps/render_view.php @@ -34,7 +34,10 @@ $confMapDefaultUrlFull = json_decode($confMapDefault['conection_data'], true); $confMapUrlDefault = $confMapDefaultFull['url']; if (! check_acl($config['id_user'], $map['group_id'], 'MR') && ! check_acl($config['id_user'], $map['group_id'], 'MW') && ! check_acl($config['id_user'], $map['group_id'], 'MM')) { - db_pandora_audit('ACL Violation', 'Trying to access map builder'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access map builder' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/operation/netflow/netflow_explorer.php b/pandora_console/operation/netflow/netflow_explorer.php index baff5da32f..e191118855 100644 --- a/pandora_console/operation/netflow/netflow_explorer.php +++ b/pandora_console/operation/netflow/netflow_explorer.php @@ -25,7 +25,7 @@ check_login(); // ACL Check. if (! check_acl($config['id_user'], 0, 'AR')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Netflow explorer' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/netflow/nf_live_view.php b/pandora_console/operation/netflow/nf_live_view.php index dcc9e4065e..442b1b2fa5 100644 --- a/pandora_console/operation/netflow/nf_live_view.php +++ b/pandora_console/operation/netflow/nf_live_view.php @@ -30,7 +30,7 @@ ui_require_javascript_file('calendar'); check_login(); if (! check_acl($config['id_user'], 0, 'AR') && ! check_acl($config['id_user'], 0, 'AW')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access event viewer' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/network/network_report.php b/pandora_console/operation/network/network_report.php index 2c51c663e2..700f94e01e 100644 --- a/pandora_console/operation/network/network_report.php +++ b/pandora_console/operation/network/network_report.php @@ -23,7 +23,7 @@ check_login(); // ACL Check. if (! check_acl($config['id_user'], 0, 'AR')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Network report.' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/network/network_usage_map.php b/pandora_console/operation/network/network_usage_map.php index 5a91e0563b..8af9ccd485 100644 --- a/pandora_console/operation/network/network_usage_map.php +++ b/pandora_console/operation/network/network_usage_map.php @@ -31,7 +31,7 @@ ui_print_page_header(__('Network usage map')); // ACL Check. if (! check_acl($config['id_user'], 0, 'AR')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Network usage map.' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/reporting/graph_viewer.php b/pandora_console/operation/reporting/graph_viewer.php index 4c42ed2ad7..956958a719 100644 --- a/pandora_console/operation/reporting/graph_viewer.php +++ b/pandora_console/operation/reporting/graph_viewer.php @@ -69,7 +69,10 @@ if ($delete_graph) { echo $result; } else { - db_pandora_audit('ACL Violation', 'Trying to delete a graph from access graph builder'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to delete a graph from access graph builder' + ); include 'general/noaccess.php'; exit; } @@ -150,7 +153,7 @@ if ($view_graph) { $name = $graph['name']; if (($graph['private'] == 1) && ($graph['id_user'] != $id_user)) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access to a custom graph not allowed' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/reporting/reporting_viewer.php b/pandora_console/operation/reporting/reporting_viewer.php index d932a5f477..c1ae891e41 100755 --- a/pandora_console/operation/reporting/reporting_viewer.php +++ b/pandora_console/operation/reporting/reporting_viewer.php @@ -21,7 +21,7 @@ $id_report = (int) get_parameter('id'); if (! $id_report) { db_pandora_audit( - 'HACK Attempt', + AUDIT_LOG_HACK_ATTEMPT, 'Trying to access report viewer withoud ID' ); include 'general/noaccess.php'; @@ -36,7 +36,10 @@ enterprise_include_once('include/functions_reporting.php'); if (!reporting_user_can_see_report($id_report)) { - db_pandora_audit('ACL Violation', 'Trying to access report viewer'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access report viewer' + ); include 'general/noaccess.php'; exit; } diff --git a/pandora_console/operation/reporting/reporting_xml.php b/pandora_console/operation/reporting/reporting_xml.php index 6d7a8bfeb2..df8a1644e9 100755 --- a/pandora_console/operation/reporting/reporting_xml.php +++ b/pandora_console/operation/reporting/reporting_xml.php @@ -69,13 +69,17 @@ if (isset($_GET['direct']) && $_GET['direct']) { db_logon($nick, $_SERVER['REMOTE_ADDR']); $_SESSION['id_usuario'] = $nick; $config['id_user'] = $nick; - // Remove everything that might have to do with people's passwords or logins + // Remove everything that might have to do with people's passwords or logins. unset($_GET['pass'], $pass, $_POST['pass'], $_REQUEST['pass'], $login_good); } else { - // User not known + // User not known. $login_failed = true; include_once 'general/login_page.php'; - db_pandora_audit('Logon Failed', 'Invalid login: '.$nick, $nick); + db_pandora_audit( + AUDIT_LOG_USER_REGISTRATION, + 'Invalid login: '.$nick, + $nick + ); exit; } } else { diff --git a/pandora_console/operation/servers/recon_view.php b/pandora_console/operation/servers/recon_view.php index 2cb71042c9..001ede9465 100644 --- a/pandora_console/operation/servers/recon_view.php +++ b/pandora_console/operation/servers/recon_view.php @@ -18,7 +18,7 @@ check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access recon task viewer' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/snmpconsole/snmp_browser.php b/pandora_console/operation/snmpconsole/snmp_browser.php index 39451616e7..d8e8b9e497 100644 --- a/pandora_console/operation/snmpconsole/snmp_browser.php +++ b/pandora_console/operation/snmpconsole/snmp_browser.php @@ -35,7 +35,10 @@ ui_require_jquery_file('pandora.controls'); // Check login and ACLs. check_login(); if (!check_acl($config['id_user'], 0, 'AR')) { - db_pandora_audit('ACL Violation', 'Trying to access SNMP Console'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access SNMP Console' + ); include 'general/noaccess.php'; exit(); } diff --git a/pandora_console/operation/snmpconsole/snmp_mib_uploader.php b/pandora_console/operation/snmpconsole/snmp_mib_uploader.php index fdaff50428..1e5482b016 100644 --- a/pandora_console/operation/snmpconsole/snmp_mib_uploader.php +++ b/pandora_console/operation/snmpconsole/snmp_mib_uploader.php @@ -32,7 +32,10 @@ global $config; check_login(); if (! check_acl($config['id_user'], 0, 'PM')) { - db_pandora_audit('ACL Violation', 'Trying to access MIB uploader'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access MIB uploader' + ); include 'general/noaccess.php'; return; } diff --git a/pandora_console/operation/snmpconsole/snmp_statistics.php b/pandora_console/operation/snmpconsole/snmp_statistics.php index ca1a3ce6e7..ff041c3d5d 100755 --- a/pandora_console/operation/snmpconsole/snmp_statistics.php +++ b/pandora_console/operation/snmpconsole/snmp_statistics.php @@ -23,7 +23,7 @@ check_login(); // ACL if (! check_acl($config['id_user'], 0, 'AR')) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access SNMP Console' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/snmpconsole/snmp_view.php b/pandora_console/operation/snmpconsole/snmp_view.php index 2641cc51fb..e68a6a16f2 100755 --- a/pandora_console/operation/snmpconsole/snmp_view.php +++ b/pandora_console/operation/snmpconsole/snmp_view.php @@ -40,7 +40,7 @@ $agent_w = check_acl($config['id_user'], 0, 'AW'); $access = ($agent_a == true) ? 'AR' : (($agent_w == true) ? 'AW' : 'AR'); if (!$agent_a && !$agent_w) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access SNMP Console' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/users/user_edit_header.php b/pandora_console/operation/users/user_edit_header.php index 4e28945e04..8f61ef3fb3 100644 --- a/pandora_console/operation/users/user_edit_header.php +++ b/pandora_console/operation/users/user_edit_header.php @@ -55,7 +55,7 @@ if ((!check_acl($config['id_user'], users_get_groups($id), 'UM')) && ($id != $config['id_user']) ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to view a user without privileges' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/visual_console/legacy_public_view.php b/pandora_console/operation/visual_console/legacy_public_view.php index f7c23f8d00..40ae10e4bc 100644 --- a/pandora_console/operation/visual_console/legacy_public_view.php +++ b/pandora_console/operation/visual_console/legacy_public_view.php @@ -68,7 +68,7 @@ $config['id_user'] = get_parameter('id_user'); // Check input hash. if (User::validatePublicHash($hash) !== true) { db_pandora_audit( - 'Invalid public visual console', + AUDIT_LOG_HACK_ATTEMPT, 'Trying to access public visual console' ); include 'general/noaccess.php'; @@ -79,7 +79,10 @@ $refr = (int) get_parameter('refr', $config['refr']); $layout = db_get_row('tlayout', 'id', $id_layout); if (! $layout) { - db_pandora_audit('ACL Violation', 'Trying to access visual console without id layout'); + db_pandora_audit( + AUDIT_LOG_ACL_VIOLATION, + 'Trying to access visual console without id layout' + ); include $config['homedir'].'/general/noaccess.php'; exit; } diff --git a/pandora_console/operation/visual_console/legacy_view.php b/pandora_console/operation/visual_console/legacy_view.php index 3dab575425..a0e4ac2493 100644 --- a/pandora_console/operation/visual_console/legacy_view.php +++ b/pandora_console/operation/visual_console/legacy_view.php @@ -72,7 +72,7 @@ if (isset($config['vc_refr']) && $config['vc_refr'] != 0) { // Get input parameter for layout id if (! $id_layout) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access visual console without id layout' ); include 'general/noaccess.php'; @@ -83,7 +83,7 @@ $layout = db_get_row('tlayout', 'id', $id_layout); if (! $layout) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access visual console without id layout' ); include 'general/noaccess.php'; @@ -105,7 +105,7 @@ $vconsole_manage = check_acl_restricted_all($config['id_user'], $id_group, 'VM') if (! $vconsole_read && !$vconsole_write && !$vconsole_manage) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access visual console without group access' ); include 'general/noaccess.php'; diff --git a/pandora_console/operation/visual_console/public_view.php b/pandora_console/operation/visual_console/public_view.php index 36ec6bf722..f87f3f2d17 100644 --- a/pandora_console/operation/visual_console/public_view.php +++ b/pandora_console/operation/visual_console/public_view.php @@ -72,7 +72,7 @@ if (!isset($config['pure'])) { // Check input hash. if (User::validatePublicHash($hash) !== true) { db_pandora_audit( - 'Invalid public visual console', + AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT, 'Trying to access public visual console' ); include 'general/noaccess.php'; @@ -86,7 +86,7 @@ try { $visualConsole = VisualConsole::fromDB(['id' => $visualConsoleId]); } catch (Throwable $e) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access visual console without Id' ); include $config['homedir'].'/general/noaccess.php'; diff --git a/pandora_console/operation/visual_console/view.php b/pandora_console/operation/visual_console/view.php index 7e18e8ad30..45be07fbcb 100644 --- a/pandora_console/operation/visual_console/view.php +++ b/pandora_console/operation/visual_console/view.php @@ -87,7 +87,7 @@ try { $visualConsole = VisualConsole::fromDB(['id' => $visualConsoleId]); } catch (Throwable $e) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access visual console without Id' ); include 'general/noaccess.php'; @@ -105,7 +105,7 @@ $aclManage = (bool) check_acl_restricted_all($config['id_user'], $groupId, 'VM') if ($aclRead === false && $aclWrite === false && $aclManage === false) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access visual console without group access' ); include 'general/noaccess.php'; diff --git a/pandora_plugins/intel_dcm/extensions/intel_dcm_setup.php b/pandora_plugins/intel_dcm/extensions/intel_dcm_setup.php index d446365ace..cd820dd587 100644 --- a/pandora_plugins/intel_dcm/extensions/intel_dcm_setup.php +++ b/pandora_plugins/intel_dcm/extensions/intel_dcm_setup.php @@ -62,7 +62,7 @@ function main_intel_dcm() ) ) { db_pandora_audit( - 'ACL Violation', + AUDIT_LOG_ACL_VIOLATION, 'Trying to access Setup Management' ); include 'general/noaccess.php';