diff --git a/pandora_console/ajax.php b/pandora_console/ajax.php
index f0032476e2..d6a48d27d0 100644
--- a/pandora_console/ajax.php
+++ b/pandora_console/ajax.php
@@ -89,7 +89,11 @@ if (isset($_GET['loginhash']) === true) {
$config['id_user'] = $loginhash_user;
} else {
include_once 'general/login_page.php';
- db_pandora_audit('Logon Failed (loginhash', '', 'system');
+ db_pandora_audit(
+ AUDIT_LOG_USER_REGISTRATION,
+ 'Loginhash failed',
+ 'system'
+ );
while (ob_get_length() > 0) {
ob_end_flush();
}
@@ -111,8 +115,8 @@ if (class_exists($auth_class) === false || $public_hash === false) {
} else {
if ($auth_class::validatePublicHash($public_hash) === false) {
db_pandora_audit(
- 'Invalid public hash',
- 'Trying to access public dashboard'
+ AUDIT_LOG_USER_REGISTRATION,
+ 'Trying to access public dashboard (Invalid public hash)'
);
include 'general/noaccess.php';
exit;
diff --git a/pandora_console/extensions/agents_modules.php b/pandora_console/extensions/agents_modules.php
index 815a0ed8d0..08218e7f51 100644
--- a/pandora_console/extensions/agents_modules.php
+++ b/pandora_console/extensions/agents_modules.php
@@ -284,7 +284,7 @@ function mainAgentsModules()
// ACL Check.
if (! check_acl($config['id_user'], 0, 'AR')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Agent view (Grouped)'
);
include 'general/noaccess.php';
@@ -304,7 +304,10 @@ function mainAgentsModules()
db_process_sql_update('tagente_modulo', ['flag' => 1], $where);
} else {
- db_pandora_audit('ACL Violation', 'Trying to set flag for groups');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to set flag for groups'
+ );
include 'general/noaccess.php';
exit;
}
diff --git a/pandora_console/extensions/api_checker.php b/pandora_console/extensions/api_checker.php
index 49f742217e..cafbf6016d 100755
--- a/pandora_console/extensions/api_checker.php
+++ b/pandora_console/extensions/api_checker.php
@@ -63,7 +63,7 @@ function extension_api_checker()
if (! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Profile Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/extensions/db_status.php b/pandora_console/extensions/db_status.php
index d55294f3a6..638d795b31 100755
--- a/pandora_console/extensions/db_status.php
+++ b/pandora_console/extensions/db_status.php
@@ -32,7 +32,7 @@ function extension_db_status()
if (!is_user_admin($config['id_user'])) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access db status'
);
include 'general/noaccess.php';
diff --git a/pandora_console/extensions/dbmanager.php b/pandora_console/extensions/dbmanager.php
index 7d32b730e5..fbe3d7cb47 100644
--- a/pandora_console/extensions/dbmanager.php
+++ b/pandora_console/extensions/dbmanager.php
@@ -89,7 +89,10 @@ function dbmgr_extension_main()
global $config;
if (!is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Setup Management'
+ );
include 'general/noaccess.php';
return;
}
@@ -143,7 +146,13 @@ function dbmgr_extension_main()
echo 'An error has occured when querying the database.
';
echo $error;
- db_pandora_audit('DB Interface Extension', 'Error in SQL', false, false, $sql);
+ db_pandora_audit(
+ AUDIT_LOG_SYSTEM,
+ 'DB Interface Extension. Error in SQL',
+ false,
+ false,
+ $sql
+ );
return;
}
@@ -151,7 +160,13 @@ function dbmgr_extension_main()
if (! is_array($result)) {
echo 'Output: '.$result;
- db_pandora_audit('DB Interface Extension', 'SQL', false, false, $sql);
+ db_pandora_audit(
+ AUDIT_LOG_SYSTEM,
+ 'DB Interface Extension. SQL',
+ false,
+ false,
+ $sql
+ );
return;
}
diff --git a/pandora_console/extensions/disabled/matrix_events.php b/pandora_console/extensions/disabled/matrix_events.php
index e93cd24f8e..e695e81bcf 100644
--- a/pandora_console/extensions/disabled/matrix_events.php
+++ b/pandora_console/extensions/disabled/matrix_events.php
@@ -16,7 +16,10 @@ function load_matrix_console()
global $config;
if (! check_acl($config['id_user'], 0, 'ER')) {
- db_pandora_audit('ACL Violation', 'Trying to access event viewer');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access event viewer'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/extensions/extension_uploader.php b/pandora_console/extensions/extension_uploader.php
index 4df1c25bd1..7871ab0b2a 100644
--- a/pandora_console/extensions/extension_uploader.php
+++ b/pandora_console/extensions/extension_uploader.php
@@ -17,7 +17,7 @@ function extension_uploader_extensions()
if (!check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Group Management'
);
include 'general/noaccess.php';
@@ -61,7 +61,10 @@ function extension_uploader_extensions()
}
if ($result) {
- db_pandora_audit('Extension manager', 'Upload extension '.$_FILES['extension']['name']);
+ db_pandora_audit(
+ AUDIT_LOG_EXTENSION_MANAGER,
+ 'Upload extension '.$_FILES['extension']['name']
+ );
}
ui_print_result_message(
diff --git a/pandora_console/extensions/files_repo.php b/pandora_console/extensions/files_repo.php
index d0edb1f591..34e5fe52d2 100644
--- a/pandora_console/extensions/files_repo.php
+++ b/pandora_console/extensions/files_repo.php
@@ -106,7 +106,10 @@ function pandora_files_repo_godmode()
// ACL Check
check_login();
if (! check_acl($config['id_user'], 0, 'PM')) {
- db_pandora_audit('ACL Violation', 'Trying to access to Files repository');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access to Files repository'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/extensions/insert_data.php b/pandora_console/extensions/insert_data.php
index d6b54cdb11..54306ac5d7 100644
--- a/pandora_console/extensions/insert_data.php
+++ b/pandora_console/extensions/insert_data.php
@@ -58,7 +58,10 @@ function mainInsertData()
ui_print_page_header(__('Insert data'), 'images/extensions.png', false, '', true, '');
if (! check_acl($config['id_user'], 0, 'AW') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Setup Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/extensions/matrix_events/ajax.php b/pandora_console/extensions/matrix_events/ajax.php
index f83ae58c36..3931770309 100644
--- a/pandora_console/extensions/matrix_events/ajax.php
+++ b/pandora_console/extensions/matrix_events/ajax.php
@@ -15,7 +15,10 @@ global $config;
if (is_ajax()) {
if (! check_acl($config['id_user'], 0, 'ER')) {
- db_pandora_audit('ACL Violation', 'Trying to access event viewer');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access event viewer'
+ );
return;
}
diff --git a/pandora_console/extensions/module_groups.php b/pandora_console/extensions/module_groups.php
index 0062c25a13..a04e6a08dc 100644
--- a/pandora_console/extensions/module_groups.php
+++ b/pandora_console/extensions/module_groups.php
@@ -33,7 +33,7 @@ check_login();
// ACL Check.
if (!check_acl($config['id_user'], 0, 'AR')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Module Groups view'
);
include 'general/noaccess.php';
diff --git a/pandora_console/extensions/pandora_logs.php b/pandora_console/extensions/pandora_logs.php
index 420d2bc6c1..21b817b978 100644
--- a/pandora_console/extensions/pandora_logs.php
+++ b/pandora_console/extensions/pandora_logs.php
@@ -56,7 +56,10 @@ function pandoralogs_extension_main()
global $config;
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Setup Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/extensions/quick_shell.php b/pandora_console/extensions/quick_shell.php
index 54cb24e9f4..bc5f545905 100644
--- a/pandora_console/extensions/quick_shell.php
+++ b/pandora_console/extensions/quick_shell.php
@@ -46,7 +46,7 @@ function quickShell()
if (check_acl($config['id_user'], 0, 'PM') === false) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Profile Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/extensions/resource_exportation.php b/pandora_console/extensions/resource_exportation.php
index 16201ccec0..a9202a0381 100755
--- a/pandora_console/extensions/resource_exportation.php
+++ b/pandora_console/extensions/resource_exportation.php
@@ -29,7 +29,10 @@ if (isset($_GET['get_ptr'])) {
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Setup Management'
+ );
include 'general/noaccess.php';
return;
}
@@ -404,7 +407,10 @@ function resource_exportation_extension_main()
check_login();
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Setup Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/extensions/resource_registration.php b/pandora_console/extensions/resource_registration.php
index 1d6ae952a7..4f23e340b3 100755
--- a/pandora_console/extensions/resource_registration.php
+++ b/pandora_console/extensions/resource_registration.php
@@ -143,14 +143,14 @@ function process_upload_xml_report($xml, $group_filter=0)
if ($id_report) {
db_pandora_audit(
- 'Report management',
+ AUDIT_LOG_REPORT_MANAGEMENT,
'Create report '.$id_report,
false,
false
);
} else {
db_pandora_audit(
- 'Report management',
+ AUDIT_LOG_REPORT_MANAGEMENT,
'Fail to create report',
false,
false
@@ -554,7 +554,11 @@ function process_upload_xml_visualmap($xml, $filter_group=0)
);
if ($id_visual_map !== false) {
- db_pandora_audit('CREATE VISUAL CONSOLE', $id_visual_map, $config['id_user']);
+ db_pandora_audit(
+ AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT,
+ sprintf('Create Visual Console #%s', $id_visual_map),
+ $config['id_user']
+ );
} else {
break;
}
@@ -716,7 +720,11 @@ function process_upload_xml_visualmap($xml, $filter_group=0)
);
if ($id_item !== false) {
- db_pandora_audit('CREATE ITEM VISUAL CONSOLE', $values['id_layout'].' - '.$id_item, $config['id_user']);
+ db_pandora_audit(
+ AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT,
+ sprintf('Create Item %s in Visual Console #%s', $id_item, $values['id_layout']),
+ $config['id_user']
+ );
}
} else {
foreach ($agents_in_item as $id => $agent) {
@@ -725,7 +733,7 @@ function process_upload_xml_visualmap($xml, $filter_group=0)
$id_item = db_process_sql_insert('tlayout_data', $values);
- if (isset($item->other_id)) {
+ if (isset($item->other_id) === true) {
$relation_other_ids[(string) $item->other_id] = $id_item;
}
@@ -736,9 +744,14 @@ function process_upload_xml_visualmap($xml, $filter_group=0)
);
if ($id_item !== false) {
- db_pandora_audit('CREATE ITEM VISUAL CONSOLE', $values['id_layout'].' - '.$id_item, $config['id_user']);
+ db_pandora_audit(
+ AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT,
+ sprintf('Create Item %s in Visual Console #%s', $id_item, $values['id_layout']),
+ $config['id_user']
+ );
}
} else {
+ // TODO: Review this else.
foreach ($agent['modules'] as $id_module => $module) {
$values['id_agent'] = $id;
$values['id_agente_modulo'] = $id_module;
@@ -752,7 +765,11 @@ function process_upload_xml_visualmap($xml, $filter_group=0)
);
if ($id_item !== false) {
- db_pandora_audit('CREATE ITEM VISUAL CONSOLE', $values['id_layout'].' - '.$id_item, $config['id_user']);
+ db_pandora_audit(
+ AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT,
+ sprintf('Create Item %s in Visual Console #%s', $id_item, $values['id_layout']),
+ $config['id_user']
+ );
}
}
}
@@ -1063,7 +1080,10 @@ function resource_registration_extension_main()
global $config;
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Setup Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/general/first_task/HA_cluster_builder.php b/pandora_console/general/first_task/HA_cluster_builder.php
index e39892b254..2f0bb24a20 100644
--- a/pandora_console/general/first_task/HA_cluster_builder.php
+++ b/pandora_console/general/first_task/HA_cluster_builder.php
@@ -26,7 +26,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access HA cluster'
);
include 'general/noaccess.php';
diff --git a/pandora_console/general/first_task/cluster_builder.php b/pandora_console/general/first_task/cluster_builder.php
index 22c624c9a6..3e6fe3dad4 100644
--- a/pandora_console/general/first_task/cluster_builder.php
+++ b/pandora_console/general/first_task/cluster_builder.php
@@ -17,7 +17,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'AR') && ! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Inventory'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/agentes/agent_incidents.php b/pandora_console/godmode/agentes/agent_incidents.php
index 3917c2f81a..796a3afd77 100644
--- a/pandora_console/godmode/agentes/agent_incidents.php
+++ b/pandora_console/godmode/agentes/agent_incidents.php
@@ -27,7 +27,7 @@ $group = $id_grupo;
if (! check_acl($config['id_user'], $group, 'AW', $id_agente)) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access agent manager'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/agentes/agent_manager.php b/pandora_console/godmode/agentes/agent_manager.php
index 2d77e7de29..9452a9f0b0 100644
--- a/pandora_console/godmode/agentes/agent_manager.php
+++ b/pandora_console/godmode/agentes/agent_manager.php
@@ -154,7 +154,10 @@ ui_require_javascript_file('openlayers.pandora');
$new_agent = (empty($id_agente)) ? true : false;
if (! isset($id_agente) && ! $new_agent) {
- db_pandora_audit('ACL Violation', 'Trying to access agent manager witout an agent');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access agent manager witout an agent'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/agentes/configurar_agente.php b/pandora_console/godmode/agentes/configurar_agente.php
index 7965dbc566..d50a616379 100644
--- a/pandora_console/godmode/agentes/configurar_agente.php
+++ b/pandora_console/godmode/agentes/configurar_agente.php
@@ -70,7 +70,7 @@ if (!check_acl_one_of_groups($config['id_user'], $all_groups, 'AW')) {
if (!$access_granted) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access agent manager'
);
include 'general/noaccess.php';
@@ -198,7 +198,10 @@ if ($create_agent) {
$grupo = (int) get_parameter_post('grupo');
if ((bool) check_acl($config['id_user'], $grupo, 'AW') === false) {
- db_pandora_audit('ACL Violation', 'Trying to access agent manager');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access agent manager'
+ );
include $config['homedir'].'/general/noaccess.php';
return;
}
@@ -352,7 +355,7 @@ if ($create_agent) {
$unsafe_alias = io_safe_output($alias);
db_pandora_audit(
- 'Agent management',
+ AUDIT_LOG_AGENT_MANAGEMENT,
'Created agent '.$unsafe_alias,
false,
true,
@@ -1243,7 +1246,7 @@ if ($update_agent) {
ui_print_success_message(__('Successfully updated'));
db_pandora_audit(
- 'Agent management',
+ AUDIT_LOG_AGENT_MANAGEMENT,
'Updated agent '.io_safe_output($alias),
false,
false,
@@ -1259,7 +1262,10 @@ if ($id_agente) {
// This has been done in the beginning of the page, but if an agent was created, this id might change.
$id_grupo = agents_get_agent_group($id_agente);
if (!check_acl_one_of_groups($config['id_user'], $all_groups, 'AW') && !check_acl_one_of_groups($config['id_user'], $all_groups, 'AD')) {
- db_pandora_audit('ACL Violation', 'Trying to admin an agent without access');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to admin an agent without access'
+ );
include 'general/noaccess.php';
exit;
}
@@ -1319,7 +1325,7 @@ if ($update_module || $create_module) {
if (! check_acl_one_of_groups($config['id_user'], $all_groups, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to create a module without admin rights'
);
include 'general/noaccess.php';
@@ -1803,7 +1809,7 @@ if ($update_module) {
$edit_module = true;
db_pandora_audit(
- 'Agent management',
+ AUDIT_LOG_AGENT_MANAGEMENT,
"Fail to try update module '".io_safe_output($name)."' for agent ".io_safe_output($agent['alias'])
);
} else {
@@ -1827,7 +1833,7 @@ if ($update_module) {
$agent = db_get_row('tagente', 'id_agente', $id_agente);
db_pandora_audit(
- 'Agent management',
+ AUDIT_LOG_AGENT_MANAGEMENT,
"Updated module '".io_safe_output($name)."' for agent ".io_safe_output($agent['alias']),
false,
false,
@@ -1989,7 +1995,7 @@ if ($create_module) {
$edit_module = true;
$moduletype = $id_module;
db_pandora_audit(
- 'Agent management',
+ AUDIT_LOG_AGENT_MANAGEMENT,
"Fail to try added module '".io_safe_output($name)."' for agent ".io_safe_output($agent['alias'])
);
} else {
@@ -2014,7 +2020,7 @@ if ($create_module) {
$agent = db_get_row('tagente', 'id_agente', $id_agente);
db_pandora_audit(
- 'Agent management',
+ AUDIT_LOG_AGENT_MANAGEMENT,
"Added module '".io_safe_output($name)."' for agent ".io_safe_output($agent['alias']),
false,
true,
@@ -2049,12 +2055,12 @@ if ($enable_module) {
$success_action = $result;
if ($result === NOERR) {
db_pandora_audit(
- 'Module management',
+ AUDIT_LOG_MODULE_MANAGEMENT,
'Enable #'.$enable_module.' | '.$module_name.' | '.io_safe_output($agent['alias'])
);
} else {
db_pandora_audit(
- 'Module management',
+ AUDIT_LOG_MODULE_MANAGEMENT,
'Fail to enable #'.$enable_module.' | '.$module_name.' | '.io_safe_output($agent['alias'])
);
}
@@ -2084,12 +2090,12 @@ if ($disable_module) {
if ($result === NOERR) {
db_pandora_audit(
- 'Module management',
+ AUDIT_LOG_MODULE_MANAGEMENT,
'Disable #'.$disable_module.' | '.$module_name.' | '.io_safe_output($agent['alias'])
);
} else {
db_pandora_audit(
- 'Module management',
+ AUDIT_LOG_MODULE_MANAGEMENT,
'Fail to disable #'.$disable_module.' | '.$module_name.' | '.io_safe_output($agent['alias'])
);
}
@@ -2133,7 +2139,7 @@ if ($delete_module) {
if (! check_acl_one_of_groups($config['id_user'], $all_groups, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to delete a module without admin rights'
);
include 'general/noaccess.php';
@@ -2143,7 +2149,7 @@ if ($delete_module) {
if (empty($module_data) || $id_borrar_modulo < 1) {
db_pandora_audit(
- 'HACK Attempt',
+ AUDIT_LOG_HACK_ATTEMPT,
'Expected variable from form is not correct'
);
include 'general/noaccess.php';
@@ -2165,7 +2171,7 @@ if ($delete_module) {
$agent = db_get_row('tagente', 'id_agente', $id_agente);
db_pandora_audit(
- 'Agent management',
+ AUDIT_LOG_AGENT_MANAGEMENT,
"Deleted module '".io_safe_output($module_data['nombre'])."' for agent ".io_safe_output($agent['alias'])
);
}
@@ -2206,12 +2212,12 @@ if (!empty($duplicate_module)) {
if ($result) {
db_pandora_audit(
- 'Agent management',
+ AUDIT_LOG_AGENT_MANAGEMENT,
"Duplicate module '".$id_duplicate_module."' for agent ".$agent['alias'].' with the new id for clon '.$result
);
} else {
db_pandora_audit(
- 'Agent management',
+ AUDIT_LOG_AGENT_MANAGEMENT,
"Fail to try duplicate module '".$id_duplicate_module."' for agent ".$agent['alias']
);
}
@@ -2225,9 +2231,15 @@ if ($enable_module) {
if ($result === NOERR) {
enterprise_hook('config_agents_enable_module_conf', [$id_agente, $enable_module]);
- db_pandora_audit('Module management', 'Enable #'.$enable_module.' | '.$modulo_nombre.' | '.$agent['alias']);
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ 'Enable #'.$enable_module.' | '.$modulo_nombre.' | '.$agent['alias']
+ );
} else {
- db_pandora_audit('Module management', 'Fail to enable #'.$enable_module.' | '.$modulo_nombre.' | '.$agent['alias']);
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ 'Fail to enable #'.$enable_module.' | '.$modulo_nombre.' | '.$agent['alias']
+ );
}
ui_print_result_message(
@@ -2244,9 +2256,15 @@ if ($disable_module) {
if ($result === NOERR) {
enterprise_hook('config_agents_disable_module_conf', [$id_agente, $disable_module]);
- db_pandora_audit('Module management', 'Disable #'.$disable_module.' | '.$modulo_nombre.' | '.$agent['alias']);
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ 'Disable #'.$disable_module.' | '.$modulo_nombre.' | '.$agent['alias']
+ );
} else {
- db_pandora_audit('Module management', 'Fail to disable #'.$disable_module.' | '.$modulo_nombre.' | '.$agent['alias']);
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ 'Fail to disable #'.$disable_module.' | '.$modulo_nombre.' | '.$agent['alias']
+ );
}
ui_print_result_message(
diff --git a/pandora_console/godmode/agentes/configure_field.php b/pandora_console/godmode/agentes/configure_field.php
index 0f7a42820a..7ef0fe042a 100755
--- a/pandora_console/godmode/agentes/configure_field.php
+++ b/pandora_console/godmode/agentes/configure_field.php
@@ -16,7 +16,10 @@ global $config;
check_login();
if (! check_acl($config['id_user'], 0, 'PM')) {
- db_pandora_audit('ACL Violation', 'Trying to access Group Management2');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Group Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/agentes/fields_manager.php b/pandora_console/godmode/agentes/fields_manager.php
index 3fd8db3849..960ed62776 100644
--- a/pandora_console/godmode/agentes/fields_manager.php
+++ b/pandora_console/godmode/agentes/fields_manager.php
@@ -18,7 +18,7 @@ check_login();
if (!check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Group Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/agentes/modificar_agente.php b/pandora_console/godmode/agentes/modificar_agente.php
index e2aca5017f..2d6dd90bbe 100644
--- a/pandora_console/godmode/agentes/modificar_agente.php
+++ b/pandora_console/godmode/agentes/modificar_agente.php
@@ -58,7 +58,7 @@ if (! check_acl(
)
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access agent manager'
);
include 'general/noaccess.php';
@@ -158,7 +158,7 @@ if ($agent_to_delete) {
} else {
// NO permissions.
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
"Trying to delete agent \'".agents_get_name($id_agente)."\'"
);
include 'general/noaccess.php';
@@ -219,12 +219,12 @@ if ($enable_agent) {
]
);
db_pandora_audit(
- 'Agent management',
+ AUDIT_LOG_AGENT_MANAGEMENT,
'Enable '.$alias
);
} else {
db_pandora_audit(
- 'Agent management',
+ AUDIT_LOG_AGENT_MANAGEMENT,
'Fail to enable '.$alias
);
}
@@ -262,12 +262,12 @@ if ($disable_agent) {
);
db_pandora_audit(
- 'Agent management',
+ AUDIT_LOG_AGENT_MANAGEMENT,
'Disable '.$alias
);
} else {
db_pandora_audit(
- 'Agent management',
+ AUDIT_LOG_AGENT_MANAGEMENT,
'Fail to disable '.$alias
);
}
diff --git a/pandora_console/godmode/agentes/module_manager.php b/pandora_console/godmode/agentes/module_manager.php
index 1d39f0525a..529112bd5a 100644
--- a/pandora_console/godmode/agentes/module_manager.php
+++ b/pandora_console/godmode/agentes/module_manager.php
@@ -261,7 +261,7 @@ if ($module_action === 'delete') {
if (! check_acl_one_of_groups($config['id_user'], $all_groups, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to delete a module without admin rights'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/agentes/module_manager_editor.php b/pandora_console/godmode/agentes/module_manager_editor.php
index c4e62816cb..005b1e578f 100644
--- a/pandora_console/godmode/agentes/module_manager_editor.php
+++ b/pandora_console/godmode/agentes/module_manager_editor.php
@@ -549,7 +549,7 @@ if ($is_function_policies !== ENTERPRISE_NOT_HOOK) {
);
db_pandora_audit(
- 'Agent management',
+ AUDIT_LOG_AGENT_MANAGEMENT,
'Re-link module '.$id_agent_module
);
}
@@ -562,7 +562,10 @@ if ($is_function_policies !== ENTERPRISE_NOT_HOOK) {
__('Module will be unlinked in the next application')
);
- db_pandora_audit('Agent management', 'Unlink module '.$id_agent_module);
+ db_pandora_audit(
+ AUDIT_LOG_AGENT_MANAGEMENT,
+ 'Unlink module '.$id_agent_module
+ );
}
}
@@ -582,7 +585,7 @@ if ($__code_from !== 'policies') {
if (!$tag_acl) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access agent manager'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/agentes/pandora_networkmap_empty.editor.php b/pandora_console/godmode/agentes/pandora_networkmap_empty.editor.php
index 9616d568a3..6fa81baca7 100644
--- a/pandora_console/godmode/agentes/pandora_networkmap_empty.editor.php
+++ b/pandora_console/godmode/agentes/pandora_networkmap_empty.editor.php
@@ -73,7 +73,7 @@ if ($edit_networkmap) {
if (!$networkmap_write && !$networkmap_manage) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access networkmap'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/agentes/planned_downtime.editor.php b/pandora_console/godmode/agentes/planned_downtime.editor.php
index 7d73a400c3..7b81e1e16d 100644
--- a/pandora_console/godmode/agentes/planned_downtime.editor.php
+++ b/pandora_console/godmode/agentes/planned_downtime.editor.php
@@ -38,7 +38,7 @@ $agent_w = check_acl($config['id_user'], 0, 'AW');
$access = ($agent_d == true) ? 'AD' : (($agent_w == true) ? 'AW' : 'AD');
if (!$agent_d && !$agent_w) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access downtime scheduler'
);
include 'general/noaccess.php';
@@ -170,7 +170,7 @@ if ($delete_downtime_agent === 1) {
|| !in_array($downtime_group, $user_groups_ad)
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access downtime scheduler'
);
include 'general/noaccess.php';
@@ -189,7 +189,7 @@ if ($delete_downtime_agent === 1) {
|| !in_array($agent_group, $user_groups_ad)
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access downtime scheduler'
);
include 'general/noaccess.php';
@@ -266,7 +266,7 @@ if ($create_downtime || $update_downtime) {
// Check AD permission on new downtime.
if (!in_array($id_group, $user_groups_ad)) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access downtime scheduler'
);
include 'general/noaccess.php';
@@ -324,7 +324,7 @@ if ($create_downtime || $update_downtime) {
// Check AD permission on OLD downtime.
if (empty($old_downtime) || !in_array($old_downtime['id_group'], $user_groups_ad)) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access downtime scheduler'
);
include 'general/noaccess.php';
@@ -334,7 +334,7 @@ if ($create_downtime || $update_downtime) {
// Check AD permission on NEW downtime group.
if (!in_array($id_group, $user_groups_ad)) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access downtime scheduler'
);
include 'general/noaccess.php';
@@ -498,7 +498,7 @@ if ($id_downtime > 0) {
// Permission check for the downtime with the AD user groups
if (empty($result) || !in_array($result['id_group'], $user_groups_ad)) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access downtime scheduler'
);
include 'general/noaccess.php';
@@ -1093,7 +1093,7 @@ function insert_downtime_agent($id_downtime, $user_groups_ad)
|| !in_array($downtime_group, $user_groups_ad)
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access downtime scheduler'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/agentes/planned_downtime.export_csv.php b/pandora_console/godmode/agentes/planned_downtime.export_csv.php
index 7e0aff8a34..d61df4e8c3 100644
--- a/pandora_console/godmode/agentes/planned_downtime.export_csv.php
+++ b/pandora_console/godmode/agentes/planned_downtime.export_csv.php
@@ -23,7 +23,10 @@ require_once '../../include/functions_reporting.php';
$config['id_user'] = $_SESSION['id_usuario'];
if (! check_acl($config['id_user'], 0, 'AR')) {
- db_pandora_audit('ACL Violation', 'Trying to access downtime scheduler');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access downtime scheduler'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/agentes/planned_downtime.list.php b/pandora_console/godmode/agentes/planned_downtime.list.php
index cdd8bae876..fadea37460 100755
--- a/pandora_console/godmode/agentes/planned_downtime.list.php
+++ b/pandora_console/godmode/agentes/planned_downtime.list.php
@@ -23,7 +23,7 @@ $access = ($read_permisson == true) ? 'AR' : (($write_permisson == true) ? 'AD'
if (! $read_permisson && !$manage_permisson) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access downtime scheduler'
);
include 'general/noaccess.php';
@@ -70,7 +70,7 @@ if ($stop_downtime) {
// Check AD permission on the downtime
if (empty($downtime) || (! check_acl($config['id_user'], $downtime['id_group'], 'AD') && ! check_acl($config['id_user'], $downtime['id_group'], 'AW'))) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access downtime scheduler'
);
include 'general/noaccess.php';
@@ -94,7 +94,7 @@ if ($delete_downtime) {
// Check AD permission on the downtime
if (empty($downtime) || (! check_acl($config['id_user'], $downtime['id_group'], 'AD') && ! check_acl($config['id_user'], $downtime['id_group'], 'AW'))) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access downtime scheduler'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/agentes/status_monitor_custom_fields.php b/pandora_console/godmode/agentes/status_monitor_custom_fields.php
index 2b4b3d0538..d9960c7547 100644
--- a/pandora_console/godmode/agentes/status_monitor_custom_fields.php
+++ b/pandora_console/godmode/agentes/status_monitor_custom_fields.php
@@ -20,7 +20,7 @@ if (! check_acl($config['id_user'], 0, 'AR')
&& ! check_acl($config['id_user'], 0, 'AM')
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Agent Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/alerts/alert_actions.php b/pandora_console/godmode/alerts/alert_actions.php
index de9d6e126d..873d91598c 100644
--- a/pandora_console/godmode/alerts/alert_actions.php
+++ b/pandora_console/godmode/alerts/alert_actions.php
@@ -42,7 +42,7 @@ enterprise_hook('open_meta_frame');
if (! check_acl($config['id_user'], 0, 'LM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert actions'
);
include 'general/noaccess.php';
@@ -104,7 +104,7 @@ if ($copy_action) {
// Then action group have to be in his own groups.
if (!$is_in_group) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
include 'general/noaccess.php';
@@ -115,17 +115,14 @@ if ($copy_action) {
$result = alerts_clone_alert_action($id, $al_action['id_group']);
- if ($result) {
- db_pandora_audit(
- 'Command management',
- 'Duplicate alert action '.$id.' clone to '.$result
- );
- } else {
- db_pandora_audit(
- 'Command management',
- 'Fail try to duplicate alert action '.$id
- );
- }
+ $auditMessage = ((bool) $result === true)
+ ? sprintf('Duplicate alert action %s clone to %s', $id, $result)
+ : sprintf('Fail try to duplicate alert action %s', $id);
+
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ $auditMessage
+ );
ui_print_result_message(
$result,
@@ -145,7 +142,7 @@ if ($delete_action) {
if (!check_acl_restricted_all($config['id_user'], $al_action['id_group'], 'LM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
include 'general/noaccess.php';
@@ -158,7 +155,7 @@ if ($delete_action) {
// Then must have "PM" access privileges.
if (! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
include 'general/noaccess.php';
@@ -182,7 +179,7 @@ if ($delete_action) {
// Then action group have to be in his own groups.
if (!$is_in_group) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
include 'general/noaccess.php';
@@ -194,17 +191,14 @@ if ($delete_action) {
$result = alerts_delete_alert_action($id);
- if ($result) {
- db_pandora_audit(
- 'Command management',
- 'Delete alert action #'.$id
- );
- } else {
- db_pandora_audit(
- 'Command management',
- 'Fail try to delete alert action #'.$id
- );
- }
+ $auditMessage = ((bool) $result === true)
+ ? sprintf('Delete alert action #%s', $id)
+ : sprintf('Fail try to delete alert action #%s', $id);
+
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ $auditMessage
+ );
ui_print_result_message(
$result,
diff --git a/pandora_console/godmode/alerts/alert_commands.php b/pandora_console/godmode/alerts/alert_commands.php
index a480f86651..a10e32aeff 100644
--- a/pandora_console/godmode/alerts/alert_commands.php
+++ b/pandora_console/godmode/alerts/alert_commands.php
@@ -21,7 +21,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'LM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
include 'general/noaccess.php';
@@ -538,9 +538,20 @@ if ($create_command) {
}
if ($result) {
- db_pandora_audit('Command management', 'Create alert command #'.$result, false, false, $info);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Create alert command #'.$result,
+ false,
+ false,
+ $info
+ );
} else {
- db_pandora_audit('Command management', 'Fail try to create alert command', false, false);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Fail try to create alert command',
+ false,
+ false
+ );
}
// Show errors.
@@ -570,7 +581,7 @@ if ($delete_command) {
// Internal commands cannot be deleted.
if (alerts_get_alert_command_internal($id)) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
include 'general/noaccess.php';
@@ -579,11 +590,14 @@ if ($delete_command) {
$result = alerts_delete_alert_command($id);
- if ($result) {
- db_pandora_audit('Command management', 'Delete alert command #'.$id);
- } else {
- db_pandora_audit('Command management', 'Fail try to delete alert command #'.$id);
- }
+ $auditMessage = ((bool) $result === true)
+ ? sprintf('Delete alert command #%s', $id)
+ : sprintf('Fail try to delete alert command #%s', $id);
+
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ $auditMessage
+ );
ui_print_result_message(
$result,
diff --git a/pandora_console/godmode/alerts/alert_list.builder.php b/pandora_console/godmode/alerts/alert_list.builder.php
index f6a60fffae..8da2925473 100644
--- a/pandora_console/godmode/alerts/alert_list.builder.php
+++ b/pandora_console/godmode/alerts/alert_list.builder.php
@@ -18,7 +18,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'LW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/alerts/alert_list.list.php b/pandora_console/godmode/alerts/alert_list.list.php
index 95ace7d345..a721612eed 100644
--- a/pandora_console/godmode/alerts/alert_list.list.php
+++ b/pandora_console/godmode/alerts/alert_list.list.php
@@ -22,7 +22,7 @@ if (! check_acl($config['id_user'], 0, 'LW')
&& ! check_acl($config['id_user'], 0, 'LM')
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/alerts/alert_list.php b/pandora_console/godmode/alerts/alert_list.php
index 14d9bf10d4..15c55050da 100644
--- a/pandora_console/godmode/alerts/alert_list.php
+++ b/pandora_console/godmode/alerts/alert_list.php
@@ -21,7 +21,7 @@ if (! check_acl($config['id_user'], 0, 'LW')
&& ! check_acl($config['id_user'], 0, 'LM')
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
include 'general/noaccess.php';
@@ -146,7 +146,7 @@ if ($create_alert) {
$unsafe_agent_alias = io_safe_output($agent_alias);
if ($id) {
db_pandora_audit(
- 'Alert management',
+ AUDIT_LOG_ALERT_MANAGEMENT,
"Added alert '$unsafe_alert_template_name' for module '$unsafe_module_name' in agent '$unsafe_agent_alias'",
false,
false,
@@ -154,7 +154,7 @@ if ($create_alert) {
);
} else {
db_pandora_audit(
- 'Alert management',
+ AUDIT_LOG_ALERT_MANAGEMENT,
"Fail Added alert '$unsafe_alert_template_name' for module '$unsafe_module_name' in agent '$unsafe_agent_alias'"
);
}
@@ -217,12 +217,12 @@ if ($delete_alert) {
if ($result) {
db_pandora_audit(
- 'Alert management',
+ AUDIT_LOG_ALERT_MANAGEMENT,
"Deleted alert '$unsafe_alert_template_name' for module '$unsafe_module_name' in agent '$unsafe_agent_alias'"
);
} else {
db_pandora_audit(
- 'Alert management',
+ AUDIT_LOG_ALERT_MANAGEMENT,
"Fail to deleted alert '$unsafe_alert_template_name' for module '$unsafe_module_name' in agent '$unsafe_agent_alias'"
);
}
@@ -255,9 +255,15 @@ if ($add_action) {
$result = alerts_add_alert_agent_module_action($id_alert_module, $id_action, $values);
if ($result) {
- db_pandora_audit('Alert management', 'Add action '.$id_action.' in alert '.$id_alert_module);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Add action '.$id_action.' in alert '.$id_alert_module
+ );
} else {
- db_pandora_audit('Alert management', 'Fail to add action '.$id_action.' in alert '.$id_alert_module);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Fail to add action '.$id_action.' in alert '.$id_alert_module
+ );
}
$messageAction = ui_print_result_message(
@@ -290,9 +296,15 @@ if ($update_action) {
$result = alerts_update_alert_agent_module_action($id_module_action, $values);
if ($result) {
- db_pandora_audit('Alert management', 'Update action '.$id_action.' in alert '.$id_alert_module);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Update action '.$id_action.' in alert '.$id_alert_module
+ );
} else {
- db_pandora_audit('Alert management', 'Fail to updated action '.$id_action.' in alert '.$id_alert_module);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Fail to updated action '.$id_action.' in alert '.$id_alert_module
+ );
}
$messageAction = ui_print_result_message(
@@ -311,9 +323,15 @@ if ($delete_action) {
$result = alerts_delete_alert_agent_module_action($id_action);
if ($result) {
- db_pandora_audit('Alert management', 'Delete action '.$id_action.' in alert '.$id_alert);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Delete action '.$id_action.' in alert '.$id_alert
+ );
} else {
- db_pandora_audit('Alert management', 'Fail to delete action '.$id_action.' in alert '.$id_alert);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Fail to delete action '.$id_action.' in alert '.$id_alert
+ );
}
$messageAction = ui_print_result_message(
@@ -332,9 +350,15 @@ if ($enable_alert) {
$result = alerts_agent_module_disable($id_alert, false);
if ($result) {
- db_pandora_audit('Alert management', 'Enable '.$id_alert);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Enable '.$id_alert
+ );
} else {
- db_pandora_audit('Alert management', 'Fail to enable '.$id_alert);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Fail to enable '.$id_alert
+ );
}
$messageAction = ui_print_result_message(
@@ -353,9 +377,15 @@ if ($disable_alert) {
$result = alerts_agent_module_disable($id_alert, true);
if ($result) {
- db_pandora_audit('Alert management', 'Disable '.$id_alert);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Disable '.$id_alert
+ );
} else {
- db_pandora_audit('Alert management', 'Fail to disable '.$id_alert);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Fail to disable '.$id_alert
+ );
}
$messageAction = ui_print_result_message(
@@ -374,9 +404,15 @@ if ($standbyon_alert) {
$result = alerts_agent_module_standby($id_alert, true);
if ($result) {
- db_pandora_audit('Alert management', 'Standby '.$id_alert);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Standby '.$id_alert
+ );
} else {
- db_pandora_audit('Alert management', 'Fail to standby '.$id_alert);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Fail to standby '.$id_alert
+ );
}
$messageAction = ui_print_result_message(
@@ -395,9 +431,15 @@ if ($standbyoff_alert) {
$result = alerts_agent_module_standby($id_alert, false);
if ($result) {
- db_pandora_audit('Alert management', 'Standbyoff '.$id_alert);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Standbyoff '.$id_alert
+ );
} else {
- db_pandora_audit('Alert management', 'Fail to standbyoff '.$id_alert);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Fail to standbyoff '.$id_alert
+ );
}
$messageAction = ui_print_result_message(
diff --git a/pandora_console/godmode/alerts/alert_templates.php b/pandora_console/godmode/alerts/alert_templates.php
index 3f6d8625b5..4833ef8b55 100644
--- a/pandora_console/godmode/alerts/alert_templates.php
+++ b/pandora_console/godmode/alerts/alert_templates.php
@@ -108,7 +108,7 @@ if (is_ajax()) {
if (! check_acl($config['id_user'], 0, 'LM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
include 'general/noaccess.php';
@@ -118,12 +118,7 @@ if (! check_acl($config['id_user'], 0, 'LM')) {
$update_template = (bool) get_parameter('update_template');
$delete_template = (bool) get_parameter('delete_template');
$pure = get_parameter('pure', 0);
-
-if (defined('METACONSOLE')) {
- $sec = 'advanced';
-} else {
- $sec = 'galertas';
-}
+$sec = (is_metaconsole() === true) ? 'advanced' : 'galertas';
// This prevents to duplicate the header in
// case delete_templete action is performed.
@@ -175,7 +170,7 @@ if ($delete_template) {
if ($al_template['id_group'] == 0) {
if (! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
include 'general/noaccess.php';
@@ -217,7 +212,7 @@ if ($delete_template) {
}
} else {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
include 'general/noaccess.php';
@@ -242,12 +237,12 @@ if ($delete_template) {
if ($result) {
db_pandora_audit(
- 'Template alert management',
+ AUDIT_LOG_ALERT_MANAGEMENT,
'Delete alert template #'.$id
);
} else {
db_pandora_audit(
- 'Template alert management',
+ AUDIT_LOG_ALERT_MANAGEMENT,
'Fail try to delete alert template #'.$id
);
}
diff --git a/pandora_console/godmode/alerts/alert_view.php b/pandora_console/godmode/alerts/alert_view.php
index cdc4cb39f1..55fb09e58d 100644
--- a/pandora_console/godmode/alerts/alert_view.php
+++ b/pandora_console/godmode/alerts/alert_view.php
@@ -33,7 +33,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'LM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert View (In management section)'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/alerts/configure_alert_action.php b/pandora_console/godmode/alerts/configure_alert_action.php
index c8efca1f00..8b276d7233 100644
--- a/pandora_console/godmode/alerts/configure_alert_action.php
+++ b/pandora_console/godmode/alerts/configure_alert_action.php
@@ -23,7 +23,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'LM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
include 'general/noaccess.php';
@@ -96,7 +96,10 @@ if ($al_action !== false) {
}
if (!$is_in_group && $al_action['id_group'] != 0) {
- db_pandora_audit('ACL Violation', 'Trying to access unauthorized alert action configuration');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access unauthorized alert action configuration'
+ );
include 'general/noaccess.php';
exit;
}
diff --git a/pandora_console/godmode/alerts/configure_alert_command.php b/pandora_console/godmode/alerts/configure_alert_command.php
index a84aaf5467..7b300aa2d9 100644
--- a/pandora_console/godmode/alerts/configure_alert_command.php
+++ b/pandora_console/godmode/alerts/configure_alert_command.php
@@ -1,17 +1,34 @@
0) {
$alert = alerts_get_alert_command($id);
if ($alert['internal'] || !check_acl_restricted_all($config['id_user'], $alert['id_group'], 'PM')) {
- db_pandora_audit('ACL Violation', 'Trying to access Alert Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Alert Management'
+ );
include 'general/noaccess.php';
exit;
}
@@ -87,17 +107,17 @@ if ($update_command) {
$values['description'] = $description;
$values['id_group'] = $id_group;
// Only for Metaconsole. Save the previous name for synchronizing.
- if (is_metaconsole()) {
+ if (is_metaconsole() === true) {
$values['previous_name'] = db_get_value('name', 'talert_commands', 'id', $id);
}
// Check it the new name is used in the other command.
$id_check = db_get_value('id', 'talert_commands', 'name', $name);
if (($id_check != $id) && (!empty($id_check))) {
- $result = '';
+ $result = false;
} else {
- $result = alerts_update_alert_command($id, $values);
- if ($result) {
+ $result = (bool) alerts_update_alert_command($id, $values);
+ if ($result === true) {
$info = '{"Name":"'.$name.'","Command":"'.$command.'","Description":"'.$description.' '.$info_fields.'"}';
$alert['fields_values'] = io_json_mb_encode($fields_values);
$alert['fields_descriptions'] = io_json_mb_encode($fields_descriptions);
@@ -109,11 +129,15 @@ if ($update_command) {
}
}
- if ($result) {
- db_pandora_audit('Command management', 'Update alert command #'.$id, false, false, $info);
- } else {
- db_pandora_audit('Command management', 'Fail to update alert command #'.$id, false, false);
- }
+ $auditMessage = ((bool) $result === true) ? 'Update alert command' : 'Fail to update alert command';
+
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ sprintf('%s #%s', $auditMessage, $id),
+ false,
+ false,
+ $info
+ );
ui_print_result_message(
$result,
@@ -130,7 +154,7 @@ $fields_descriptions = '';
$fields_values = '';
$id_group = 0;
if ($id) {
- if (!$result) {
+ if ($result === false) {
$alert = alerts_get_alert_command($id);
}
diff --git a/pandora_console/godmode/alerts/configure_alert_template.php b/pandora_console/godmode/alerts/configure_alert_template.php
index 61c01cc1f3..d7333cbeeb 100644
--- a/pandora_console/godmode/alerts/configure_alert_template.php
+++ b/pandora_console/godmode/alerts/configure_alert_template.php
@@ -43,7 +43,7 @@ if (is_metaconsole() === true) {
if (! check_acl($config['id_user'], 0, 'LM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
include 'general/noaccess.php';
@@ -172,7 +172,7 @@ if ($a_template !== false) {
}
} else {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
include 'general/noaccess.php';
@@ -218,9 +218,15 @@ if ($duplicate_template) {
$id = alerts_duplicate_alert_template($source_id, $a_template['id_group']);
if ($id) {
- db_pandora_audit('Template alert management', 'Duplicate alert template '.$source_id.' clone to '.$id);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Duplicate alert template '.$source_id.' clone to '.$id
+ );
} else {
- db_pandora_audit('Template alert management', 'Fail try to duplicate alert template '.$source_id);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Fail try to duplicate alert template '.$source_id
+ );
}
ui_print_result_message(
@@ -420,7 +426,7 @@ function update_template($step)
if ($result) {
db_pandora_audit(
- 'Template alert management',
+ AUDIT_LOG_ALERT_MANAGEMENT,
'Update alert template #'.$id,
false,
false,
@@ -428,7 +434,7 @@ function update_template($step)
);
} else {
db_pandora_audit(
- 'Template alert management',
+ AUDIT_LOG_ALERT_MANAGEMENT,
'Fail try to update alert template #'.$id,
false,
false,
@@ -544,7 +550,7 @@ if ($create_template) {
if ($result) {
db_pandora_audit(
- 'Template alert management',
+ AUDIT_LOG_ALERT_MANAGEMENT,
'Create alert template #'.$result,
false,
false,
@@ -552,7 +558,7 @@ if ($create_template) {
);
} else {
db_pandora_audit(
- 'Template alert management',
+ AUDIT_LOG_ALERT_MANAGEMENT,
'Fail try to create alert template',
false,
false,
diff --git a/pandora_console/godmode/audit_log_csv.php b/pandora_console/godmode/audit_log_csv.php
index 2d91feca9c..7c03d632df 100644
--- a/pandora_console/godmode/audit_log_csv.php
+++ b/pandora_console/godmode/audit_log_csv.php
@@ -32,7 +32,10 @@ if (!isset($_SESSION['id_usuario'])) {
check_login();
if (! check_acl($config['id_user'], 0, 'PM')) {
- db_pandora_audit('ACL Violation', 'Trying to access audit CSV export');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access audit CSV export'
+ );
include 'general/noaccess.php';
exit;
}
diff --git a/pandora_console/godmode/category/category.php b/pandora_console/godmode/category/category.php
index 39683df3ae..a25bd4a263 100755
--- a/pandora_console/godmode/category/category.php
+++ b/pandora_console/godmode/category/category.php
@@ -35,7 +35,10 @@ check_login();
enterprise_hook('open_meta_frame');
if (!check_acl($config['id_user'], 0, 'PM') && !is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Categories Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Categories Management'
+ );
include 'general/noaccess.php';
return;
}
@@ -113,10 +116,16 @@ if (is_management_allowed() === false) {
if ($is_management_allowed === true && $delete != 0) {
$return_delete = categories_delete_category($delete);
if (!$return_delete) {
- db_pandora_audit('Category management', 'Fail try to delete category #'.$delete);
+ db_pandora_audit(
+ AUDIT_LOG_CATEGORY_MANAGEMENT,
+ 'Fail try to delete category #'.$delete
+ );
ui_print_error_message(__('Error deleting category'));
} else {
- db_pandora_audit('Category management', 'Delete category #'.$delete);
+ db_pandora_audit(
+ AUDIT_LOG_CATEGORY_MANAGEMENT,
+ 'Delete category #'.$delete
+ );
ui_print_success_message(__('Successfully deleted category'));
}
}
diff --git a/pandora_console/godmode/category/edit_category.php b/pandora_console/godmode/category/edit_category.php
index 6278fb6dae..3cd20c0325 100755
--- a/pandora_console/godmode/category/edit_category.php
+++ b/pandora_console/godmode/category/edit_category.php
@@ -19,7 +19,10 @@ enterprise_hook('open_meta_frame');
require_once $config['homedir'].'/include/functions_categories.php';
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Edit Category');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Edit Category'
+ );
include 'general/noaccess.php';
return;
@@ -85,34 +88,46 @@ if ($update_category && $id_category != 0) {
}
if ($result === false) {
- db_pandora_audit('Category management', "Fail try to update category #$id_category");
+ db_pandora_audit(
+ AUDIT_LOG_CATEGORY_MANAGEMENT,
+ 'Fail try to update category #'.$id_category
+ );
ui_print_error_message(__('Error updating category'));
} else {
- db_pandora_audit('Category management', "Update category #$id_category");
+ db_pandora_audit(
+ AUDIT_LOG_CATEGORY_MANAGEMENT,
+ 'Update category #'.$id_category
+ );
ui_print_success_message(__('Successfully updated category'));
}
}
-// Create category: creates a new category
+// Create category: creates a new category.
if ($create_category) {
$return_create = true;
$values = [];
$values['name'] = $name_category;
- // DB insert
+ // DB insert.
$return_create = false;
if ($values['name'] != '') {
$return_create = db_process_sql_insert('tcategory', $values);
}
if ($return_create === false) {
- db_pandora_audit('Category management', 'Fail try to create category');
+ db_pandora_audit(
+ AUDIT_LOG_CATEGORY_MANAGEMENT,
+ 'Fail try to create category'
+ );
ui_print_error_message(__('Error creating category'));
$action = 'new';
- // If create action ends successfully then current action is update
+ // If create action ends successfully then current action is update.
} else {
- db_pandora_audit('Category management', "Create category #$return_create");
+ db_pandora_audit(
+ AUDIT_LOG_CATEGORY_MANAGEMENT,
+ 'Create category #'.$return_create
+ );
ui_print_success_message(__('Successfully created category'));
$id_category = $return_create;
$action = 'update';
@@ -120,7 +135,7 @@ if ($create_category) {
}
// Form fields are filled here
-// Get results when update action is performed
+// Get results when update action is performed.
if ($action == 'update' && $id_category != 0) {
$result_category = db_get_row_filter('tcategory', ['id' => $id_category]);
$name_category = $result_category['name'];
diff --git a/pandora_console/godmode/db/db_main.php b/pandora_console/godmode/db/db_main.php
index a25d09ec04..79a6c9eba7 100644
--- a/pandora_console/godmode/db/db_main.php
+++ b/pandora_console/godmode/db/db_main.php
@@ -18,7 +18,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'DM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Database Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/events/custom_events.php b/pandora_console/godmode/events/custom_events.php
index a492b0522f..a53657ffce 100644
--- a/pandora_console/godmode/events/custom_events.php
+++ b/pandora_console/godmode/events/custom_events.php
@@ -17,7 +17,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Custom events Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/events/event_edit_filter.php b/pandora_console/godmode/events/event_edit_filter.php
index 43f2162719..b52242f166 100644
--- a/pandora_console/godmode/events/event_edit_filter.php
+++ b/pandora_console/godmode/events/event_edit_filter.php
@@ -21,7 +21,7 @@ $access = ($event_w == true) ? 'EW' : (($event_m == true) ? 'EM' : 'EW');
if (!$event_w && !$event_m) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access events filter editor'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/events/event_filter.php b/pandora_console/godmode/events/event_filter.php
index 07e87284ee..5ddc469034 100644
--- a/pandora_console/godmode/events/event_filter.php
+++ b/pandora_console/godmode/events/event_filter.php
@@ -22,7 +22,7 @@ $access = ($event_w == true) ? 'EW' : (($event_m == true) ? 'EM' : 'EW');
if (!$event_w && !$event_m) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access events filter editor'
);
include 'general/noaccess.php';
@@ -43,7 +43,7 @@ if ($delete) {
&& !check_acl_restricted_all($config['id_user'], $filter_group, 'EM')
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access events filter editor'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/events/event_responses.editor.php b/pandora_console/godmode/events/event_responses.editor.php
index 81bf8a5766..0521af7c99 100644
--- a/pandora_console/godmode/events/event_responses.editor.php
+++ b/pandora_console/godmode/events/event_responses.editor.php
@@ -17,7 +17,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Group Management'
);
include 'general/noaccess.php';
@@ -43,7 +43,7 @@ if ($event_response_id > 0) {
// ACL check for event response edition.
if (!check_acl_restricted_all($config['id_user'], $event_response['id_group'], 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Group Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/events/event_responses.list.php b/pandora_console/godmode/events/event_responses.list.php
index ef0785c978..550ac994e9 100644
--- a/pandora_console/godmode/events/event_responses.list.php
+++ b/pandora_console/godmode/events/event_responses.list.php
@@ -19,7 +19,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Group Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/events/event_responses.php b/pandora_console/godmode/events/event_responses.php
index 0e08e67af4..f8e6963d1a 100644
--- a/pandora_console/godmode/events/event_responses.php
+++ b/pandora_console/godmode/events/event_responses.php
@@ -19,7 +19,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Group Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/events/events.php b/pandora_console/godmode/events/events.php
index f32c07ec43..59d7810454 100644
--- a/pandora_console/godmode/events/events.php
+++ b/pandora_console/godmode/events/events.php
@@ -20,7 +20,7 @@ enterprise_hook('open_meta_frame');
if (!check_acl($config['id_user'], 0, 'EW') && !check_acl($config['id_user'], 0, 'EM') && ! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access event manage'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/extensions.php b/pandora_console/godmode/extensions.php
index 6e036827aa..faea92b358 100644
--- a/pandora_console/godmode/extensions.php
+++ b/pandora_console/godmode/extensions.php
@@ -17,7 +17,7 @@ global $config;
if (! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access extensions list'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/gis_maps/configure_gis_map.php b/pandora_console/godmode/gis_maps/configure_gis_map.php
index 5a5cac0f9b..52bde7ac2c 100644
--- a/pandora_console/godmode/gis_maps/configure_gis_map.php
+++ b/pandora_console/godmode/gis_maps/configure_gis_map.php
@@ -20,7 +20,10 @@ $gis_m = check_acl($config['id_user'], 0, 'MM');
$access = ($gis_w == true) ? 'MW' : (($gis_m == true) ? 'MM' : 'MW');
if (!$gis_w && !$gis_m) {
- db_pandora_audit('ACL Violation', 'Trying to access map builder');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access map builder'
+ );
include 'general/noaccess.php';
return;
}
@@ -33,7 +36,10 @@ $action = get_parameter('action', 'new_map');
$gis_map_group = db_get_value('group_id', 'tgis_map', 'id_tgis_map', $idMap);
if ($idMap > 0 && !check_acl_restricted_all($config['id_user'], $gis_map_group, 'MW') && !check_acl_restricted_all($config['id_user'], $gis_map_group, 'MW')) {
- db_pandora_audit('ACL Violation', 'Trying to access map builder');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access map builder'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/groups/configure_group.php b/pandora_console/godmode/groups/configure_group.php
index 4e34a89331..2077dce6ed 100644
--- a/pandora_console/godmode/groups/configure_group.php
+++ b/pandora_console/godmode/groups/configure_group.php
@@ -34,7 +34,10 @@ check_login();
enterprise_hook('open_meta_frame');
if (! check_acl($config['id_user'], 0, 'AW')) {
- db_pandora_audit('ACL Violation', 'Trying to access Group Management2');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Group Management2'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/groups/configure_modu_group.php b/pandora_console/godmode/groups/configure_modu_group.php
index 95beb0d39d..0ea11d117f 100644
--- a/pandora_console/godmode/groups/configure_modu_group.php
+++ b/pandora_console/godmode/groups/configure_modu_group.php
@@ -18,7 +18,10 @@ check_login();
enterprise_hook('open_meta_frame');
if (! check_acl($config['id_user'], 0, 'PM')) {
- db_pandora_audit('ACL Violation', 'Trying to access Group Management2');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Group Management2'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/groups/group_list.php b/pandora_console/godmode/groups/group_list.php
index 685076f5b2..990b0bac77 100644
--- a/pandora_console/godmode/groups/group_list.php
+++ b/pandora_console/godmode/groups/group_list.php
@@ -47,7 +47,10 @@ if (is_metaconsole() === true) {
if (is_ajax() === true) {
if ((bool) check_acl($config['id_user'], 0, 'AR') === false) {
- db_pandora_audit('ACL Violation', 'Trying to access Group Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Group Management'
+ );
include 'general/noaccess.php';
return;
}
@@ -74,7 +77,7 @@ if (is_ajax() === true) {
if ((bool) check_acl($config['id_user'], $id_group, 'AR') === false) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
echo json_encode(false);
@@ -117,7 +120,7 @@ if (is_ajax() === true) {
if ((bool) check_acl($config['id_user'], $id_group, 'AR') === false) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
echo json_encode(false);
@@ -275,7 +278,7 @@ if ($tab !== 'credbox'
&& (bool) check_acl($config['id_user'], 0, 'AW') === false
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Group Management'
);
include 'general/noaccess.php';
@@ -285,7 +288,7 @@ if ($tab !== 'credbox'
&& (bool) check_acl($config['id_user'], 0, 'PM') === false
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Credential Store'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/groups/modu_group_list.php b/pandora_console/godmode/groups/modu_group_list.php
index 24818de618..84dc35ada8 100644
--- a/pandora_console/godmode/groups/modu_group_list.php
+++ b/pandora_console/godmode/groups/modu_group_list.php
@@ -32,7 +32,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Group Management'
);
include 'general/noaccess.php';
@@ -48,7 +48,7 @@ if (is_ajax() === true) {
if (! check_acl($config['id_user'], $id_group, 'AR')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
echo json_encode(false);
diff --git a/pandora_console/godmode/massive/massive_add_action_alerts.php b/pandora_console/godmode/massive/massive_add_action_alerts.php
index f9a02c8545..178f3c830a 100755
--- a/pandora_console/godmode/massive/massive_add_action_alerts.php
+++ b/pandora_console/godmode/massive/massive_add_action_alerts.php
@@ -31,7 +31,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access massive agent deletion section'
);
include 'general/noaccess.php';
@@ -150,7 +150,13 @@ if ($add) {
'Fires_max' => $fires_max,
'Actions' => implode(',', $actions),
];
- db_pandora_audit('Massive management', 'Add alert action '.json_encode($id_agents), false, false, json_encode($info));
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Add alert action '.json_encode($id_agents),
+ false,
+ false,
+ json_encode($info)
+ );
ui_print_result_message($results, __('Successfully added'), __('Could not be added'));
}
} else {
diff --git a/pandora_console/godmode/massive/massive_add_alerts.php b/pandora_console/godmode/massive/massive_add_alerts.php
index ad81def654..92027c3529 100755
--- a/pandora_console/godmode/massive/massive_add_alerts.php
+++ b/pandora_console/godmode/massive/massive_add_alerts.php
@@ -31,7 +31,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access massive alert deletion'
);
include 'general/noaccess.php';
@@ -139,16 +139,28 @@ function process_manage_add($id_alert_template, $id_agents, $module_names)
$success = alerts_create_alert_agent_module($module, $id_alert_template);
if ($success) {
- $contsuccess ++;
+ $contsuccess++;
}
- $conttotal ++;
+ $conttotal++;
}
if ($contsuccess > 0) {
- db_pandora_audit('Massive management', 'Add alert', false, false, 'Alert template: '.$id_alert_template.' Modules: '.json_encode($modules_id));
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Add alert',
+ false,
+ false,
+ 'Alert template: '.$id_alert_template.' Modules: '.json_encode($modules_id)
+ );
} else {
- db_pandora_audit('Massive management', 'Fail try to add alert', false, false, 'Alert template: '.$id_alert_template.' Modules: '.json_encode($modules_id));
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Fail try to add alert',
+ false,
+ false,
+ 'Alert template: '.$id_alert_template.' Modules: '.json_encode($modules_id)
+ );
}
ui_print_result_message(
diff --git a/pandora_console/godmode/massive/massive_add_profiles.php b/pandora_console/godmode/massive/massive_add_profiles.php
index 71a0b6777a..4a3be0b304 100644
--- a/pandora_console/godmode/massive/massive_add_profiles.php
+++ b/pandora_console/godmode/massive/massive_add_profiles.php
@@ -31,7 +31,7 @@ check_login();
if (!check_acl($config['id_user'], 0, 'UM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access massive profile addition'
);
include 'general/noaccess.php';
@@ -80,7 +80,7 @@ if ($create_profiles) {
// If the profile doesnt exist, we create it
if ($profile_data === false) {
db_pandora_audit(
- 'User management',
+ AUDIT_LOG_USER_MANAGEMENT,
'Added profile for user '.io_safe_input($user)
);
$return = profile_create_user_profile($user, $profile, $group);
@@ -95,7 +95,7 @@ if ($create_profiles) {
if ($n_added > 0) {
db_pandora_audit(
- 'Massive management',
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
'Add profiles',
false,
false,
@@ -103,7 +103,7 @@ if ($create_profiles) {
);
} else {
db_pandora_audit(
- 'Massive management',
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
'Fail to try add profiles',
false,
false,
diff --git a/pandora_console/godmode/massive/massive_copy_modules.php b/pandora_console/godmode/massive/massive_copy_modules.php
index 5abe5a2d26..b6c9f3a420 100755
--- a/pandora_console/godmode/massive/massive_copy_modules.php
+++ b/pandora_console/godmode/massive/massive_copy_modules.php
@@ -31,7 +31,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Agent Config Management Admin section'
);
include 'general/noaccess.php';
@@ -66,7 +66,7 @@ if ($do_operation) {
];
if ($result) {
db_pandora_audit(
- 'Massive management',
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
'Copy modules',
false,
false,
@@ -74,7 +74,7 @@ if ($do_operation) {
);
} else {
db_pandora_audit(
- 'Massive management',
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
'Fail to try copy modules',
false,
false,
diff --git a/pandora_console/godmode/massive/massive_delete_action_alerts.php b/pandora_console/godmode/massive/massive_delete_action_alerts.php
index 9ce405d64d..cc6f9e4c90 100644
--- a/pandora_console/godmode/massive/massive_delete_action_alerts.php
+++ b/pandora_console/godmode/massive/massive_delete_action_alerts.php
@@ -31,7 +31,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access massive agent deletion section'
);
include 'general/noaccess.php';
@@ -148,9 +148,21 @@ if ($delete) {
];
if ($results) {
- db_pandora_audit('Massive management', 'Delete alert action', false, false, json_encode($info));
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Delete alert action',
+ false,
+ false,
+ json_encode($info)
+ );
} else {
- db_pandora_audit('Massive management', 'Fail try to delete alert action', false, false, json_encode($info));
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Fail try to delete alert action',
+ false,
+ false,
+ json_encode($info)
+ );
}
ui_print_result_message(
diff --git a/pandora_console/godmode/massive/massive_delete_agents.php b/pandora_console/godmode/massive/massive_delete_agents.php
index 2808df1d8c..e85a12486d 100755
--- a/pandora_console/godmode/massive/massive_delete_agents.php
+++ b/pandora_console/godmode/massive/massive_delete_agents.php
@@ -34,7 +34,7 @@ check_login();
if ((bool) check_acl($config['id_user'], 0, 'AW') === false) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access massive agent deletion section'
);
include 'general/noaccess.php';
@@ -149,9 +149,10 @@ if ($delete === true) {
$result = process_manage_delete($id_agents);
$info = '{"Agent":"'.implode(',', $id_agents).'"}';
+
if ($result === true) {
db_pandora_audit(
- 'Massive management',
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
'Delete agent ',
false,
false,
@@ -159,7 +160,7 @@ if ($delete === true) {
);
} else {
db_pandora_audit(
- 'Massive management',
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
'Fail try to delete agent',
false,
false,
diff --git a/pandora_console/godmode/massive/massive_delete_alerts.php b/pandora_console/godmode/massive/massive_delete_alerts.php
index 2256405eb7..39028789de 100755
--- a/pandora_console/godmode/massive/massive_delete_alerts.php
+++ b/pandora_console/godmode/massive/massive_delete_alerts.php
@@ -31,7 +31,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access massive alert deletion'
);
include 'general/noaccess.php';
@@ -190,10 +190,10 @@ function process_manage_delete($id_alert_template, $id_agents, $module_names)
);
if ($success) {
- $contsuccess ++;
+ $contsuccess++;
}
- $conttotal ++;
+ $conttotal++;
}
ui_print_result_message(
@@ -223,9 +223,21 @@ if ($delete) {
];
if ($result) {
- db_pandora_audit('Massive management', 'Delete alert ', false, false, json_encode($info));
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Delete alert ',
+ false,
+ false,
+ json_encode($info)
+ );
} else {
- db_pandora_audit('Massive management', 'Fail try to delete alert', false, false, json_encode($info));
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Fail try to delete alert',
+ false,
+ false,
+ json_encode($info)
+ );
}
}
diff --git a/pandora_console/godmode/massive/massive_delete_modules.php b/pandora_console/godmode/massive/massive_delete_modules.php
index b6a098f07d..f54a127b19 100755
--- a/pandora_console/godmode/massive/massive_delete_modules.php
+++ b/pandora_console/godmode/massive/massive_delete_modules.php
@@ -31,7 +31,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access agent massive deletion'
);
include 'general/noaccess.php';
@@ -230,7 +230,7 @@ if ($delete) {
foreach ($module_name as $mod_name) {
$result = process_manage_delete($mod_name['nombre'], $id_agent['id_agente'], $modules_selection_mode);
- $count ++;
+ $count++;
$success += (int) $result;
}
}
@@ -266,11 +266,16 @@ if ($delete) {
'Agent' => implode(',', $agents_),
'Module' => implode(',', $modules_),
];
- if ($result) {
- db_pandora_audit('Massive management', 'Delete module ', false, false, json_encode($info));
- } else {
- db_pandora_audit('Massive management', 'Fail try to delete module', false, false, json_encode($info));
- }
+
+ $auditMessage = ((bool) $result === true) ? 'Delete module' : 'Fail try to delete module';
+
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ $auditMessage,
+ false,
+ false,
+ json_encode($info)
+ );
}
$groups = users_get_groups();
diff --git a/pandora_console/godmode/massive/massive_delete_profiles.php b/pandora_console/godmode/massive/massive_delete_profiles.php
index bfa490f3cd..3a8611f3c7 100644
--- a/pandora_console/godmode/massive/massive_delete_profiles.php
+++ b/pandora_console/godmode/massive/massive_delete_profiles.php
@@ -31,7 +31,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'UM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access massive profile deletion'
);
include 'general/noaccess.php';
@@ -96,7 +96,7 @@ if ($delete_profiles) {
} else {
foreach ($users as $user) {
db_pandora_audit(
- 'User management',
+ AUDIT_LOG_USER_MANAGEMENT,
'Deleted profile for user '.io_safe_input($user)
);
@@ -111,9 +111,21 @@ if ($delete_profiles) {
];
if ($result) {
- db_pandora_audit('Massive management', 'Delete profile ', false, false, json_encode($info));
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Delete profile ',
+ false,
+ false,
+ json_encode($info)
+ );
} else {
- db_pandora_audit('Massive management', 'Fail try to delete profile', false, false, json_encode($info));
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Fail try to delete profile',
+ false,
+ false,
+ json_encode($info)
+ );
}
ui_print_result_message(
diff --git a/pandora_console/godmode/massive/massive_edit_agents.php b/pandora_console/godmode/massive/massive_edit_agents.php
index 6ba5a3c848..d750e684b3 100755
--- a/pandora_console/godmode/massive/massive_edit_agents.php
+++ b/pandora_console/godmode/massive/massive_edit_agents.php
@@ -31,7 +31,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access massive agent deletion section'
);
include 'general/noaccess.php';
@@ -189,9 +189,15 @@ if ($update_agents) {
if ($n_deleted > 0) {
- db_pandora_audit('Massive management', 'Delete conf file '.$id_agent);
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Delete conf file '.$id_agent
+ );
} else {
- db_pandora_audit('Massive management', 'Try to delete conf file '.$id_agent);
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Try to delete conf file '.$id_agent
+ );
}
@@ -383,10 +389,22 @@ if ($update_agents) {
if ($result !== false) {
- db_pandora_audit('Massive management', 'Update agent '.$id_agent, false, false, json_encode($info));
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Update agent '.$id_agent,
+ false,
+ false,
+ json_encode($info)
+ );
} else {
if (isset($id_agent)) {
- db_pandora_audit('Massive management', 'Try to update agent '.$id_agent, false, false, json_encode($info));
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Try to update agent '.$id_agent,
+ false,
+ false,
+ json_encode($info)
+ );
}
}
diff --git a/pandora_console/godmode/massive/massive_edit_modules.php b/pandora_console/godmode/massive/massive_edit_modules.php
index 1045e8efa6..73164c4c2f 100755
--- a/pandora_console/godmode/massive/massive_edit_modules.php
+++ b/pandora_console/godmode/massive/massive_edit_modules.php
@@ -31,7 +31,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access massive module update'
);
include 'general/noaccess.php';
@@ -187,9 +187,21 @@ if ($update) {
$info = '{"Modules":"'.implode(',', $modules_).'","Agents":"'.implode(',', $agents_).'"}';
if ($success > 0) {
- db_pandora_audit('Massive management', 'Edit module', false, false, $info);
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Edit module',
+ false,
+ false,
+ $info
+ );
} else {
- db_pandora_audit('Massive management', 'Fail try to edit module', false, false, $info);
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Fail try to edit module',
+ false,
+ false,
+ $info
+ );
}
}
diff --git a/pandora_console/godmode/massive/massive_edit_plugins.php b/pandora_console/godmode/massive/massive_edit_plugins.php
index bcbed6238d..2e91eafaf8 100644
--- a/pandora_console/godmode/massive/massive_edit_plugins.php
+++ b/pandora_console/godmode/massive/massive_edit_plugins.php
@@ -14,7 +14,7 @@
* |___| |___._|__|__|_____||_____|__| |___._| |___| |__|_|__|_______|
*
* ============================================================================
- * Copyright (c) 2005-2021 Artica Soluciones Tecnologicas
+ * Copyright (c) 2005-2022 Artica Soluciones Tecnologicas
* Please see http://pandorafms.org for full contribution list
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
@@ -33,7 +33,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access massive plugin edition section'
);
include 'general/noaccess.php';
@@ -45,7 +45,7 @@ $agent_ids = get_parameter('agent_ids', []);
$module_ids = get_parameter('module_ids', []);
$module_names = get_parameter('module_names', []);
-if (is_ajax()) {
+if (is_ajax() === true) {
$get_plugin = (bool) get_parameter('get_plugin');
$get_agents = (bool) get_parameter('get_agents');
$get_modules = (bool) get_parameter('get_modules');
@@ -54,21 +54,21 @@ if (is_ajax()) {
if ($get_plugin) {
$plugin = db_get_row('tplugin', 'id', $plugin_id);
- if (empty($plugin)) {
+ if (empty($plugin) === true) {
$plugin = [];
}
- if (isset($plugin['description'])) {
+ if (isset($plugin['description']) === true) {
$plugin['description'] = io_safe_output($plugin['description']);
$plugin['description'] = str_replace("\n", '
', $plugin['description']);
}
- if (isset($plugin['macros'])) {
+ if (isset($plugin['macros']) === true) {
$macros = json_decode($plugin['macros'], true);
- if (!empty($macros)) {
+ if (empty($macros) === false) {
$macros = array_values($macros);
- if (!empty($macros)) {
+ if (empty($macros) === false) {
$plugin['macros'] = $macros;
}
}
@@ -79,15 +79,15 @@ if (is_ajax()) {
}
if ($get_agents) {
- $sql = "SELECT ta.id_agente, ta.alias AS agent_alias,
+ $sql = 'SELECT ta.id_agente, ta.alias AS agent_alias,
tam.nombre AS module_name
FROM tagente ta
INNER JOIN tagente_modulo tam
ON ta.id_agente = tam.id_agente
- AND tam.id_plugin = $plugin_id
- ORDER BY ta.alias, tam.nombre";
+ AND tam.id_plugin = '.$plugin_id.'
+ ORDER BY ta.alias, tam.nombre';
$result = db_get_all_rows_sql($sql);
- if (empty($result)) {
+ if (empty($result) === true) {
$result = [];
}
@@ -99,7 +99,7 @@ if (is_ajax()) {
$name = io_safe_output($value['agent_alias']);
$module_name = $value['module_name'];
- if (!empty($current_element) && $current_element['id'] !== $id) {
+ if (empty($current_element) === false && $current_element['id'] !== $id) {
$agents[] = $current_element;
$current_element = [];
}
@@ -107,14 +107,14 @@ if (is_ajax()) {
$current_element['id'] = $id;
$current_element['name'] = $name;
- if (!isset($current_element['module_names'])) {
+ if (isset($current_element['module_names']) === false) {
$current_element['module_names'] = [];
}
$current_element['module_names'][] = $module_name;
}
- if (!empty($current_element)) {
+ if (empty($current_element) === false) {
$agents[] = $current_element;
}
@@ -131,7 +131,7 @@ if (is_ajax()) {
];
$module_plugin_macros = db_get_all_rows_filter('tagente_modulo', $filter, $fields);
$module_plugin_macros = io_safe_output($module_plugin_macros);
- if (empty($module_plugin_macros)) {
+ if (empty($module_plugin_macros) === true) {
$module_plugin_macros = [];
}
@@ -139,9 +139,9 @@ if (is_ajax()) {
$module_plugin_macros,
function ($carry, $item) {
$macros = json_decode($item['macros'], true);
- if (!empty($macros)) {
+ if (empty($macros) === false) {
$macros = array_values($macros);
- if (!empty($macros)) {
+ if (empty($macros) === false) {
$carry[] = $macros;
}
}
@@ -160,28 +160,28 @@ if (is_ajax()) {
$update = (bool) get_parameter('update');
-if ($update) {
+if ($update === true) {
try {
$plugin = db_get_row('tplugin', 'id', $plugin_id);
- // Macros retrieved from the plugin definition
+ // Macros retrieved from the plugin definition.
$plugin_macros = [];
- if (isset($plugin['macros'])) {
+ if (isset($plugin['macros']) === true) {
$plugin_macros = json_decode($plugin['macros'], true);
- if (!empty($plugin_macros)) {
+ if (empty($plugin_macros) === false) {
$plugin_macros = array_values($plugin_macros);
}
}
- // Error
+ // Error.
if (empty($plugin_macros)) {
throw new Exception(__('Error retrieving the plugin macros'));
}
- // Macros returned by the form
+ // Macros returned by the form.
$macros = get_parameter('macros', []);
- // Error
- if (empty($macros)) {
+ // Error.
+ if (empty($macros) === true) {
throw new Exception(__('Error retrieving the modified macros'));
}
@@ -199,36 +199,36 @@ if ($update) {
$filter,
$fields
);
- if (empty($module_plugin_macros)) {
+ if (empty($module_plugin_macros) === true) {
$module_plugin_macros = [];
}
- // Error
- if (empty($module_plugin_macros)) {
+ // Error.
+ if (empty($module_plugin_macros) === true) {
throw new Exception(__('Error retrieving the module plugin macros'));
}
// Begin transaction
- // db_process_sql_begin();
+ // db_process_sql_begin();.
$errors = 0;
$count = 0;
foreach ($module_plugin_macros as $item) {
$module_id = $item['id_agente_modulo'];
$module_macros_str = $item['macros'];
- // Macros retrieved from the agent module
+ // Macros retrieved from the agent module.
$module_macros = json_decode($module_macros_str, true);
- // Error
- if (empty($module_macros)) {
+ // Error.
+ if (empty($module_macros) === true) {
throw new Exception(
__('Error retrieving the module plugin macros data')
);
}
- // Get the new module plugin macros
+ // Get the new module plugin macros.
$result_macros = array_map(
function ($item) use ($macros, $module_macros) {
$result = [
@@ -238,7 +238,7 @@ if ($update) {
'hide' => $item['hide'],
];
- // Get the default value os the module plugin macro
+ // Get the default value os the module plugin macro.
$default = array_reduce(
$module_macros,
function ($carry, $module_macro) use ($result) {
@@ -259,41 +259,48 @@ if ($update) {
$plugin_macros
);
- // Error
- if (empty($result_macros)) {
+ // Error.
+ if (empty($result_macros) === true) {
throw new Exception(__('Error building the new macros'));
}
$module_macros = io_json_mb_encode($result_macros, JSON_FORCE_OBJECT);
- if (empty($module_macros)) {
+ if (empty($module_macros) === true) {
$module_macros = $module_macros_str;
}
$values = ['macros' => $module_macros];
$where = ['id_agente_modulo' => $module_id];
- // $result = db_process_sql_update('tagente_modulo', $values, $where, 'AND', false);
$result = db_process_sql_update('tagente_modulo', $values, $where);
- if (!$result) {
+ if ((bool) $result === false) {
$errors++;
} else {
$count += $result;
}
}
- // if (!$errors) {
- // db_process_sql_commit();
- // }
- // else {
- // db_process_sql_rollback();
- // }
- // Result message
+ // Result message.
+ $auditMessage = sprintf(
+ 'Plugin #%s modules updated',
+ $plugin_id
+ );
ui_print_info_message(sprintf(__('%d modules updated'), $count));
} catch (Exception $e) {
+ $auditMessage = sprintf(
+ 'Try to update plugin #%s modules: %s',
+ $plugin_id,
+ $e->getMessage()
+ );
ui_print_error_message($e->getMessage());
}
+
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ $auditMessage
+ );
}
$table = new StdClass();
@@ -302,7 +309,7 @@ $table->width = '100%';
$table->rowstyle = [];
$table->data = [];
-// Plugins
+// Plugins.
$filter = ['order' => 'name'];
$fields = [
'id',
@@ -341,10 +348,10 @@ $row[] = $plugins_select;
$table->data['plugin-ids-row'] = $row;
-// Agents & modules
+// Agents & modules.
$row = [];
-// Agents
+// Agents.
$agents_select = html_print_select(
$agent_ids,
'agent_ids[]',
@@ -360,9 +367,7 @@ $agents_select = html_print_select(
$row[] = ''.__('Agents').'';
$row[] = $agents_select;
-// Modules
-// $modules_select = html_print_select ($module_ids, 'module_ids',
-// false, '', '', 0, true, true, false);
+// Modules.
$modules_select = html_print_select(
$module_names,
'module_names[]',
@@ -393,7 +398,7 @@ echo '';
?>
diff --git a/pandora_console/godmode/massive/massive_enable_disable_alerts.php b/pandora_console/godmode/massive/massive_enable_disable_alerts.php
index a8bb7478b5..bfe6d436e8 100644
--- a/pandora_console/godmode/massive/massive_enable_disable_alerts.php
+++ b/pandora_console/godmode/massive/massive_enable_disable_alerts.php
@@ -31,7 +31,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access massive alert deletion'
);
include 'general/noaccess.php';
@@ -102,11 +102,15 @@ switch ($action) {
ui_print_result_message($result, __('Successfully enabled'), __('Could not be enabled'));
$info = '{"Alert":"'.implode(',', $id_disabled_alerts).'"}';
- if ($result) {
- db_pandora_audit('Massive management', 'Enable alert', false, false, $info);
- } else {
- db_pandora_audit('Massive management', 'Fail try to enable alert', false, false, $info);
- }
+
+ $auditMessage = ((bool) $result === true) ? 'Enable alert' : 'Fail try to enable alert';
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ $auditMessage,
+ false,
+ false,
+ $info
+ );
break;
case 'disable_alerts':
@@ -120,11 +124,15 @@ switch ($action) {
ui_print_result_message($result, __('Successfully disabled'), __('Could not be disabled'));
$info = '{"Alert":"'.implode(',', $id_enabled_alerts).'"}';
- if ($result) {
- db_pandora_audit('Massive management', 'Disable alert', false, false, $info);
- } else {
- db_pandora_audit('Massive management', 'Fail try to Disable alert', false, false, $info);
- }
+
+ $auditMessage = ((bool) $result === true) ? 'Disable alert' : 'Fail try to disable alert';
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ $auditMessage,
+ false,
+ false,
+ $info
+ );
break;
default:
diff --git a/pandora_console/godmode/massive/massive_operations.php b/pandora_console/godmode/massive/massive_operations.php
index a3eefc359c..c066816dfd 100755
--- a/pandora_console/godmode/massive/massive_operations.php
+++ b/pandora_console/godmode/massive/massive_operations.php
@@ -33,7 +33,7 @@ global $config;
if (! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access massive operation section'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/massive/massive_standby_alerts.php b/pandora_console/godmode/massive/massive_standby_alerts.php
index 5844068665..e1def56976 100644
--- a/pandora_console/godmode/massive/massive_standby_alerts.php
+++ b/pandora_console/godmode/massive/massive_standby_alerts.php
@@ -31,7 +31,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access massive alert deletion'
);
include 'general/noaccess.php';
@@ -103,9 +103,21 @@ switch ($action) {
$info = '{"Alert":"'.implode(',', $id_standby_alerts).'"}';
if ($result) {
- db_pandora_audit('Massive management', 'Set off standby alerts', false, false, $info);
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Set off standby alerts',
+ false,
+ false,
+ $info
+ );
} else {
- db_pandora_audit('Massive management', 'Fail try to set off standby alerts', false, false, $info);
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Fail try to set off standby alerts',
+ false,
+ false,
+ $info
+ );
}
break;
@@ -121,9 +133,21 @@ switch ($action) {
$info = '{"Alert":"'.implode(',', $id_not_standby_alerts).'"}';
if ($result) {
- db_pandora_audit('Massive management', 'Set on standby alerts', false, false, $info);
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Set on standby alerts',
+ false,
+ false,
+ $info
+ );
} else {
- db_pandora_audit('Massive management', 'Fail try to set on standby alerts', false, false, $info);
+ db_pandora_audit(
+ AUDIT_LOG_MASSIVE_MANAGEMENT,
+ 'Fail try to set on standby alerts',
+ false,
+ false,
+ $info
+ );
}
break;
diff --git a/pandora_console/godmode/module_library/module_library_view.php b/pandora_console/godmode/module_library/module_library_view.php
index 31553a5352..e5fe29a7bd 100644
--- a/pandora_console/godmode/module_library/module_library_view.php
+++ b/pandora_console/godmode/module_library/module_library_view.php
@@ -32,7 +32,10 @@ check_login();
if (! check_acl($config['id_user'], 0, 'AR')) {
// Doesn't have access to this page.
- db_pandora_audit('ACL Violation', 'Trying to access Module Library View');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Module Library View'
+ );
include 'general/noaccess.php';
exit;
}
diff --git a/pandora_console/godmode/modules/configuration_wizard_setup.php b/pandora_console/godmode/modules/configuration_wizard_setup.php
index 15c5f1b381..d2ec4d0900 100644
--- a/pandora_console/godmode/modules/configuration_wizard_setup.php
+++ b/pandora_console/godmode/modules/configuration_wizard_setup.php
@@ -25,7 +25,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Network Profile Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/modules/manage_nc_groups.php b/pandora_console/godmode/modules/manage_nc_groups.php
index bfac159d4e..e3a546d16f 100644
--- a/pandora_console/godmode/modules/manage_nc_groups.php
+++ b/pandora_console/godmode/modules/manage_nc_groups.php
@@ -20,7 +20,7 @@ enterprise_hook('open_meta_frame');
if (! check_acl($config['id_user'], 0, 'PM') && ! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access SNMP Group Management'
);
include 'general/noaccess.php';
@@ -72,11 +72,12 @@ if ($create) {
'parent' => $parent,
]
);
- if ($result) {
- db_pandora_audit('Module management', "Create component group #$result");
- } else {
- db_pandora_audit('Module management', 'Fail try to create component group');
- }
+
+ $auditMessage = ((bool) $result === true) ? sprintf('Create component group #%s', $result) : 'Fail try to create component group';
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ $auditMessage
+ );
ui_print_result_message(
$result,
@@ -101,11 +102,16 @@ if ($update) {
],
['id_sg' => $id]
);
- if ($result) {
- db_pandora_audit('Module management', "Update component group #$id");
- } else {
- db_pandora_audit('Module management', "Fail try to update component group #$id");
- }
+
+ $auditMessage = ((bool) $result === true) ? 'Update component group' : 'Fail try to update component group';
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ sprintf(
+ '%s #%s',
+ $auditMessage,
+ $id
+ )
+ );
ui_print_result_message(
$result,
@@ -131,11 +137,15 @@ if ($delete) {
$result = false;
}
- if ($result) {
- db_pandora_audit('Module management', "Delete component group #$id");
- } else {
- db_pandora_audit('Module management', "Fail try to delete component group #$id");
- }
+ $auditMessage = ((bool) $result === true) ? 'Delete component group' : 'Fail try to delete component group';
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ sprintf(
+ '%s #%s',
+ $auditMessage,
+ $id
+ )
+ );
ui_print_result_message(
$result,
@@ -168,17 +178,16 @@ if ($multiple_delete) {
}
$str_ids = implode(',', $ids);
- if ($result) {
- db_pandora_audit(
- 'Module management',
- "Multiple delete component group: $str_ids"
- );
- } else {
- db_pandora_audit(
- 'Module management',
- "Fail try to delete component group: $str_ids"
- );
- }
+
+ $auditMessage = ((bool) $result === true) ? 'Multiple delete component group' : 'Fail try to delete multiple component group';
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ sprintf(
+ '%s #%s',
+ $auditMessage,
+ $str_ids
+ )
+ );
ui_print_result_message(
$result,
diff --git a/pandora_console/godmode/modules/manage_nc_groups_form.php b/pandora_console/godmode/modules/manage_nc_groups_form.php
index 98cfb8aa81..01beca52ed 100644
--- a/pandora_console/godmode/modules/manage_nc_groups_form.php
+++ b/pandora_console/godmode/modules/manage_nc_groups_form.php
@@ -18,7 +18,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'PM') && ! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access SNMO Groups Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/modules/manage_network_components.php b/pandora_console/godmode/modules/manage_network_components.php
index 4ab509dbc0..c4c3a0d2ac 100644
--- a/pandora_console/godmode/modules/manage_network_components.php
+++ b/pandora_console/godmode/modules/manage_network_components.php
@@ -34,7 +34,7 @@ enterprise_hook('open_meta_frame');
if (! check_acl($config['id_user'], 0, 'PM') && ! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Agent Management'
);
include 'general/noaccess.php';
@@ -415,7 +415,7 @@ if ($is_management_allowed === true && $create_component) {
if ($id === false || !$id) {
db_pandora_audit(
- 'Module management',
+ AUDIT_LOG_MODULE_MANAGEMENT,
'Fail try to create remote component'
);
@@ -431,7 +431,10 @@ if ($is_management_allowed === true && $create_component) {
return;
}
- db_pandora_audit('Module management', 'Create network component #'.$id);
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ 'Create network component #'.$id
+ );
ui_print_success_message(__('Created successfully'));
$id = 0;
}
@@ -516,7 +519,7 @@ if ($is_management_allowed === true && $update_component) {
if ($result === false || !$result) {
db_pandora_audit(
- 'Module management',
+ AUDIT_LOG_MODULE_MANAGEMENT,
'Fail try to update network component #'.$id
);
ui_print_error_message(__('Could not be updated'));
@@ -524,7 +527,10 @@ if ($is_management_allowed === true && $update_component) {
return;
}
- db_pandora_audit('Module management', 'Update network component #'.$id);
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ 'Update network component #'.$id
+ );
ui_print_success_message(__('Updated successfully'));
$id = 0;
@@ -535,17 +541,11 @@ if ($is_management_allowed === true && $delete_component) {
$result = network_components_delete_network_component($id);
- if ($result) {
- db_pandora_audit(
- 'Module management',
- 'Delete network component #'.$id
- );
- } else {
- db_pandora_audit(
- 'Module management',
- 'Fail try to delete network component #'.$id
- );
- }
+ $auditMessage = ((bool) $result === true) ? 'Delete network component' : 'Fail try to delete network component';
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ sprintf('%s #%s', $auditMessage, $id)
+ );
ui_print_result_message(
$result,
@@ -567,17 +567,11 @@ if ($is_management_allowed === true && $multiple_delete) {
}
$str_ids = implode(',', $ids);
- if ($result) {
- db_pandora_audit(
- 'Module management',
- 'Multiple delete network component:'.$str_ids
- );
- } else {
- db_pandora_audit(
- 'Module management',
- 'Fail try to delete network component:'.$str_ids
- );
- }
+ $auditMessage = ((bool) $result === true) ? 'Multiple delete network component' : 'Fail try to delete multiple network component';
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ sprintf('%s :%s', $auditMessage, $str_ids)
+ );
ui_print_result_message(
$result,
diff --git a/pandora_console/godmode/modules/manage_network_components_form.php b/pandora_console/godmode/modules/manage_network_components_form.php
index 559ca0a376..c39fbc86b6 100644
--- a/pandora_console/godmode/modules/manage_network_components_form.php
+++ b/pandora_console/godmode/modules/manage_network_components_form.php
@@ -33,7 +33,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'PM') && ! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Agent Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/modules/manage_network_components_form_common.php b/pandora_console/godmode/modules/manage_network_components_form_common.php
index c924eefb2f..095f672a58 100644
--- a/pandora_console/godmode/modules/manage_network_components_form_common.php
+++ b/pandora_console/godmode/modules/manage_network_components_form_common.php
@@ -18,7 +18,7 @@ include_javascript_d3();
if (! check_acl($config['id_user'], 0, 'PM') && ! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Agent Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/modules/manage_network_components_form_network.php b/pandora_console/godmode/modules/manage_network_components_form_network.php
index 7c69e2784c..d91b80161e 100755
--- a/pandora_console/godmode/modules/manage_network_components_form_network.php
+++ b/pandora_console/godmode/modules/manage_network_components_form_network.php
@@ -33,7 +33,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'PM') && ! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Agent Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/modules/manage_network_components_form_wizard.php b/pandora_console/godmode/modules/manage_network_components_form_wizard.php
index 990390fe47..0fa9d763c5 100644
--- a/pandora_console/godmode/modules/manage_network_components_form_wizard.php
+++ b/pandora_console/godmode/modules/manage_network_components_form_wizard.php
@@ -19,7 +19,10 @@ include_javascript_d3();
if (!check_acl($config['id_user'], 0, 'PM')
&& !check_acl($config['id_user'], 0, 'AW')
) {
- db_pandora_audit('ACL Violation', 'Trying to access Agent Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Agent Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/modules/manage_network_components_form_wmi.php b/pandora_console/godmode/modules/manage_network_components_form_wmi.php
index 8ea57654cb..19739691fd 100755
--- a/pandora_console/godmode/modules/manage_network_components_form_wmi.php
+++ b/pandora_console/godmode/modules/manage_network_components_form_wmi.php
@@ -18,7 +18,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Agent Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/modules/manage_network_templates.php b/pandora_console/godmode/modules/manage_network_templates.php
index 9305bd6de1..00dab888b2 100644
--- a/pandora_console/godmode/modules/manage_network_templates.php
+++ b/pandora_console/godmode/modules/manage_network_templates.php
@@ -18,7 +18,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Network Profile Management'
);
include 'general/noaccess.php';
@@ -67,9 +67,15 @@ if ($delete_profile) {
$result = network_profiles_delete_network_profile($id);
if ($result) {
- db_pandora_audit('Module management', "Delete module template #$id");
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ 'Delete module template #'.$id
+ );
} else {
- db_pandora_audit('Module management', "Fail try to delete module template #$id");
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ 'Fail try to delete module template #'.$id
+ );
}
ui_print_result_message(
@@ -92,9 +98,15 @@ if ($multiple_delete) {
$str_ids = implode(',', $ids);
if ($result) {
- db_pandora_audit('Module management', "Multiple delete module template: $str_ids");
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ 'Multiple delete module template: '.$str_ids
+ );
} else {
- db_pandora_audit('Module management', "Fail try to delete module template: $str_ids");
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ 'Fail try to delete module template: '.$str_ids
+ );
}
ui_print_result_message(
diff --git a/pandora_console/godmode/modules/manage_network_templates_form.php b/pandora_console/godmode/modules/manage_network_templates_form.php
index 795e3c8c9b..2bb1e49fe9 100644
--- a/pandora_console/godmode/modules/manage_network_templates_form.php
+++ b/pandora_console/godmode/modules/manage_network_templates_form.php
@@ -19,7 +19,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Network Profile Management'
);
include 'general/noaccess.php';
@@ -97,9 +97,15 @@ if (isset($_GET['create']) || isset($_GET['update'])) {
$result = db_process_sql_update('tnetwork_profile', $values, ['id_np' => $id_np]);
if ($result) {
- db_pandora_audit('Module management', "Update module template #$id_np");
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ 'Update module template #'.$id_np
+ );
} else {
- db_pandora_audit('Module management', "Fail try to update module template #$id_np");
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ 'Fail try to update module template #'.$id_np
+ );
}
ui_print_result_message(
@@ -116,9 +122,15 @@ if (isset($_GET['create']) || isset($_GET['update'])) {
$result = db_process_sql_insert('tnetwork_profile', $values);
if ($result) {
- db_pandora_audit('Module management', "Create module template #$result");
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ 'Create module template #'.$result
+ );
} else {
- db_pandora_audit('Module management', 'Fail try to create module template');
+ db_pandora_audit(
+ AUDIT_LOG_MODULE_MANAGEMENT,
+ 'Fail try to create module template'
+ );
}
ui_print_result_message(
diff --git a/pandora_console/godmode/modules/module_list.php b/pandora_console/godmode/modules/module_list.php
index 864ebe32c2..f8c07d7848 100644
--- a/pandora_console/godmode/modules/module_list.php
+++ b/pandora_console/godmode/modules/module_list.php
@@ -17,12 +17,15 @@ global $config;
check_login();
if (! check_acl($config['id_user'], 0, 'PM')) {
- db_pandora_audit('ACL Violation', 'Trying to access module management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access module management'
+ );
include 'general/noaccess.php';
exit;
}
-// Header
+// Header.
ui_print_page_header(__('Module management').' » '.__('Defined modules'), 'images/gm_modules.png', false, '', true);
$update_module = (bool) get_parameter_post('update_module');
diff --git a/pandora_console/godmode/netflow/nf_edit.php b/pandora_console/godmode/netflow/nf_edit.php
index 51d999ef42..4ba54a9c75 100644
--- a/pandora_console/godmode/netflow/nf_edit.php
+++ b/pandora_console/godmode/netflow/nf_edit.php
@@ -23,7 +23,7 @@ enterprise_hook('open_meta_frame');
if (! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access event viewer'
);
include 'general/noaccess.php';
@@ -73,7 +73,7 @@ if ($id > 0) {
if (!check_acl_restricted_all($config['id_user'], $filter_group, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access events filter editor'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/netflow/nf_edit_form.php b/pandora_console/godmode/netflow/nf_edit_form.php
index 96bc06b87a..19a89ab589 100644
--- a/pandora_console/godmode/netflow/nf_edit_form.php
+++ b/pandora_console/godmode/netflow/nf_edit_form.php
@@ -25,7 +25,7 @@ enterprise_hook('open_meta_frame');
// Fix: Netflow have to check RW ACL
if (! check_acl($config['id_user'], 0, 'RW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access event viewer'
);
include $config['homedir'].'/general/noaccess.php';
diff --git a/pandora_console/godmode/reporting/create_container.php b/pandora_console/godmode/reporting/create_container.php
index e22a755678..e487723d2e 100644
--- a/pandora_console/godmode/reporting/create_container.php
+++ b/pandora_console/godmode/reporting/create_container.php
@@ -18,7 +18,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'RW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Inventory Module Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/reporting/graph_builder.graph_editor.php b/pandora_console/godmode/reporting/graph_builder.graph_editor.php
index dfe8c1d117..baeb179da5 100644
--- a/pandora_console/godmode/reporting/graph_builder.graph_editor.php
+++ b/pandora_console/godmode/reporting/graph_builder.graph_editor.php
@@ -20,7 +20,7 @@ $report_m = check_acl($config['id_user'], 0, 'RM');
if (!$report_w && !$report_m) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access graph builder'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/reporting/graph_builder.main.php b/pandora_console/godmode/reporting/graph_builder.main.php
index 3b77ed932f..a49495626f 100644
--- a/pandora_console/godmode/reporting/graph_builder.main.php
+++ b/pandora_console/godmode/reporting/graph_builder.main.php
@@ -66,7 +66,7 @@ if (! check_acl($config['id_user'], 0, 'RW')
&& ! check_acl($config['id_user'], 0, 'RM')
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access graph builder'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/reporting/graph_builder.php b/pandora_console/godmode/reporting/graph_builder.php
index bdbee9a14b..391181edf9 100644
--- a/pandora_console/godmode/reporting/graph_builder.php
+++ b/pandora_console/godmode/reporting/graph_builder.php
@@ -65,7 +65,7 @@ if (! check_acl($config['id_user'], 0, 'RW')
&& ! check_acl($config['id_user'], 0, 'RM')
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access graph builder'
);
include 'general/noaccess.php';
@@ -90,7 +90,7 @@ if ($id_graph > 0) {
&& !check_acl_restricted_all($config['id_user'], $graph_group, 'RM')
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access graph builder'
);
include 'general/noaccess.php';
@@ -145,11 +145,11 @@ if ($add_graph === true) {
if (trim($name) != '') {
$id_graph = db_process_sql_insert('tgraph', $values);
- if ($id_graph !== false) {
- db_pandora_audit('Report management', 'Create graph #'.$id_graph);
- } else {
- db_pandora_audit('Report management', 'Fail try to create graph');
- }
+ $auditMessage = ($id_graph !== false) ? sprintf('Create graph #%s', $id_graph) : 'Fail try to create graph';
+ db_pandora_audit(
+ AUDIT_LOG_REPORT_MANAGEMENT,
+ $auditMessage
+ );
} else {
$id_graph = false;
}
@@ -197,17 +197,16 @@ if ($update_graph) {
],
['id_graph' => $id_graph]
);
- if ($success !== false) {
- db_pandora_audit(
- 'Report management',
- 'Update graph #'.$id_graph
- );
- } else {
- db_pandora_audit(
- 'Report management',
- 'Fail try to update graph #'.$id_graph
- );
- }
+
+ $auditMessage = ($success !== false) ? 'Update graph' : 'Fail try to update graph';
+ db_pandora_audit(
+ AUDIT_LOG_REPORT_MANAGEMENT,
+ sprintf(
+ '%s #%s',
+ $auditMessage,
+ $id_graph
+ )
+ );
} else {
$success = false;
}
diff --git a/pandora_console/godmode/reporting/graph_container.php b/pandora_console/godmode/reporting/graph_container.php
index 765e93ea60..cbc947ef78 100644
--- a/pandora_console/godmode/reporting/graph_container.php
+++ b/pandora_console/godmode/reporting/graph_container.php
@@ -34,7 +34,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'RR') || enterprise_installed() === false) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Graph container'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/reporting/graphs.php b/pandora_console/godmode/reporting/graphs.php
index 0c93074a2d..fce91e47c4 100644
--- a/pandora_console/godmode/reporting/graphs.php
+++ b/pandora_console/godmode/reporting/graphs.php
@@ -40,7 +40,7 @@ $report_m = check_acl($config['id_user'], 0, 'RM');
if (!$report_r && !$report_w && !$report_m) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Inventory Module Management'
);
include 'general/noaccess.php';
@@ -155,17 +155,25 @@ if ($delete_graph) {
$result = db_process_sql_delete('tgraph', ['id_graph' => $id]);
- if ($result) {
- db_pandora_audit('Report management', "Delete graph #$id");
- $result = ui_print_success_message(__('Successfully deleted'));
- } else {
- db_pandora_audit('Report management', "Fail try to delete graph #$id");
- $result = ui_print_error_message(__('Not deleted. Error deleting data'));
- }
+ $auditMessage = ($result === true) ? 'Delete graph' : 'Fail try to delete graph';
+
+ ui_print_result_message(
+ $result,
+ __('Successfully deleted'),
+ __('Not deleted. Error deleting data')
+ );
+
+ db_pandora_audit(
+ AUDIT_LOG_REPORT_MANAGEMENT,
+ sprintf('%s #%s', $auditMessage, $id)
+ );
echo $result;
} else {
- db_pandora_audit('ACL Violation', 'Trying to delete a graph from access graph builder');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to delete a graph from access graph builder'
+ );
include 'general/noaccess.php';
exit;
}
@@ -191,12 +199,14 @@ if ($multiple_delete) {
$result = false;
}
+ $auditMessage = ($result === true) ? 'Multiple delete graph' : 'Fail try to delete graphs';
+
$str_ids = implode(',', $ids);
- if ($result) {
- db_pandora_audit('Report management', "Multiple delete graph: $str_ids");
- } else {
- db_pandora_audit('Report management', "Fail try to delete graphs: $str_ids");
- }
+
+ db_pandora_audit(
+ AUDIT_LOG_REPORT_MANAGEMENT,
+ sprintf('%s: %s', $auditMessage, $str_ids)
+ );
ui_print_result_message(
$result,
diff --git a/pandora_console/godmode/reporting/map_builder.php b/pandora_console/godmode/reporting/map_builder.php
index b0a8803336..f85849a4ea 100644
--- a/pandora_console/godmode/reporting/map_builder.php
+++ b/pandora_console/godmode/reporting/map_builder.php
@@ -41,7 +41,7 @@ $is_metaconsole = is_metaconsole();
if (!$vconsoles_read && !$vconsoles_write && !$vconsoles_manage) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access map builder'
);
include 'general/noaccess.php';
@@ -157,7 +157,7 @@ if ($delete_layout || $copy_layout) {
// Visual console required
if (empty($id_layout)) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access map builder'
);
include 'general/noaccess.php';
@@ -167,7 +167,7 @@ if ($delete_layout || $copy_layout) {
$group_id = db_get_value('id_group', 'tlayout', 'id', $id_layout);
if ($group_id === false) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access map builder'
);
include 'general/noaccess.php';
@@ -181,7 +181,7 @@ if ($delete_layout || $copy_layout) {
if (!$vconsole_write && !$vconsole_manage) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access map builder'
);
include 'general/noaccess.php';
@@ -197,22 +197,20 @@ if ($delete_layout || $copy_layout) {
'tlayout',
['id' => $id_layout]
);
- if ($result) {
- db_pandora_audit(
- 'Visual console builder',
- "Delete visual console #$id_layout"
- );
- ui_print_success_message(__('Successfully deleted'));
- db_clean_cache();
- } else {
- db_pandora_audit(
- 'Visual console builder',
- "Fail try to delete visual console #$id_layout"
- );
- ui_print_error_message(
- __('Not deleted. Error deleting data')
- );
- }
+
+ $auditMessage = ((bool) $result === true) ? 'Delete visual console' : 'Fail try to delete visual console';
+ db_pandora_audit(
+ AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT,
+ sprintf('%s #%s', $auditMessage, $id_layout)
+ );
+
+ ui_print_result_message(
+ (bool) $result,
+ __('Successfully deleted'),
+ __('Not deleted. Error deleting data')
+ );
+
+ db_clean_cache();
$id_layout = 0;
}
diff --git a/pandora_console/godmode/reporting/reporting_builder.item_editor.php b/pandora_console/godmode/reporting/reporting_builder.item_editor.php
index 4a8f9c64d8..b98b651201 100755
--- a/pandora_console/godmode/reporting/reporting_builder.item_editor.php
+++ b/pandora_console/godmode/reporting/reporting_builder.item_editor.php
@@ -40,7 +40,7 @@ if (! check_acl($config['id_user'], 0, 'RW')
&& ! check_acl($config['id_user'], 0, 'RM')
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/reporting/reporting_builder.list_items.php b/pandora_console/godmode/reporting/reporting_builder.list_items.php
index 45be7d1d6b..2d1cd69d37 100755
--- a/pandora_console/godmode/reporting/reporting_builder.list_items.php
+++ b/pandora_console/godmode/reporting/reporting_builder.list_items.php
@@ -33,7 +33,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'RW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/reporting/reporting_builder.main.php b/pandora_console/godmode/reporting/reporting_builder.main.php
index 5b1be809d4..177c84d68d 100755
--- a/pandora_console/godmode/reporting/reporting_builder.main.php
+++ b/pandora_console/godmode/reporting/reporting_builder.main.php
@@ -27,7 +27,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'RW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/reporting/reporting_builder.php b/pandora_console/godmode/reporting/reporting_builder.php
index 9421f120f2..9d42914034 100755
--- a/pandora_console/godmode/reporting/reporting_builder.php
+++ b/pandora_console/godmode/reporting/reporting_builder.php
@@ -64,7 +64,7 @@ function dialog_message(message_id) {
.addClass('checkselected');
$(".check_delete").prop("checked", true);
$('.check_delete').each(function(){
- $('#hidden-id_report_'+$(this).val()).prop("disabled", false);
+ $('#hidden-id_report_'+$(this).val()).prop("disabled", false);
});
}
else{
@@ -128,7 +128,7 @@ $report_m = check_acl($config['id_user'], 0, 'RM');
$access = ($report_r == true) ? 'RR' : (($report_w == true) ? 'RW' : (($report_m == true) ? 'RM' : 'RR'));
if (!$report_r && !$report_w && !$report_m) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
@@ -172,7 +172,7 @@ if ($action === 'edit' && $idReport > 0) {
&& ! check_acl_restricted_all($config['id_user'], $report_group, 'RM')
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
@@ -263,7 +263,7 @@ if ($idReport != 0) {
if (!$delete_report_bypass) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
@@ -625,7 +625,7 @@ switch ($action) {
$delete = true;
// Owner can delete.
} else {
- $delete = check_acl(
+ $delete = (bool) check_acl(
$config['id_user'],
$report['id_group'],
'RM'
@@ -646,9 +646,9 @@ switch ($action) {
break;
}
- if (! $delete && !empty($type_access_selected)) {
+ if ($delete === false && empty($type_access_selected) === false) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder deletion'
);
include 'general/noaccess.php';
@@ -656,17 +656,12 @@ switch ($action) {
}
$result = reports_delete_report($idReport);
- if ($result !== false) {
- db_pandora_audit(
- 'Report management',
- 'Delete report #'.$idReport
- );
- } else {
- db_pandora_audit(
- 'Report management',
- 'Fail try to delete report #'.$idReport
- );
- }
+ $auditMessage = ($result !== false) ? 'Delete report' : 'Fail try to delete report';
+
+ db_pandora_audit(
+ AUDIT_LOG_REPORT_MANAGEMENT,
+ sprintf('%s #%s', $auditMessage, $idReport)
+ );
ui_print_result_message(
$result,
@@ -721,9 +716,9 @@ switch ($action) {
break;
}
- if (! $copy && !empty($type_access_selected)) {
+ if (! $copy && empty($type_access_selected) === false) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder copy'
);
include 'general/noaccess.php';
@@ -731,17 +726,11 @@ switch ($action) {
}
$result = reports_copy_report($idReport);
- if ($result !== false) {
- db_pandora_audit(
- 'Report management',
- 'Copy report #'.$idReport
- );
- } else {
- db_pandora_audit(
- 'Report management',
- 'Fail try to copy report #'.$idReport
- );
- }
+ $auditMessage = ((bool) $result === true) ? 'Copy report' : 'Fail try to copy report';
+ db_pandora_audit(
+ AUDIT_LOG_REPORT_MANAGEMENT,
+ sprintf('%s #%s', $auditMessage, $idReport)
+ );
ui_print_result_message(
$result,
@@ -1421,23 +1410,17 @@ switch ($action) {
['id_report' => $idReport]
);
- if ($resultOperationDB !== false) {
- db_pandora_audit(
- 'Report management',
- 'Update report #'.$idReport
- );
- } else {
- db_pandora_audit(
- 'Report management',
- 'Fail try to update report #'.$idReport
- );
- }
+ $auditMessage = ($resultOperationDB === true) ? 'Update report' : 'Fail try to update report';
+ db_pandora_audit(
+ AUDIT_LOG_REPORT_MANAGEMENT,
+ sprintf('%s #%s', $auditMessage, $idReport)
+ );
} else {
$resultOperationDB = false;
}
$action = 'edit';
- } else if ($action == 'save') {
+ } else if ($action === 'save') {
if ($reportName != '' && $idGroupReport != '') {
// This flag allow to differentiate
// between normal console and metaconsole reports.
@@ -1482,17 +1465,11 @@ switch ($action) {
]
);
- if ($idOrResult !== false) {
- db_pandora_audit(
- 'Report management',
- 'Create report #'.$idOrResult
- );
- } else {
- db_pandora_audit(
- 'Report management',
- 'Fail try to create report'
- );
- }
+ $auditMessage = ((bool) $idOrResult === true) ? sprintf('Create report #%s', $idOrResult) : 'Fail try to create report';
+ db_pandora_audit(
+ AUDIT_LOG_REPORT_MANAGEMENT,
+ $auditMessage
+ );
} else {
$idOrResult = false;
}
diff --git a/pandora_console/godmode/reporting/visual_console_builder.data.php b/pandora_console/godmode/reporting/visual_console_builder.data.php
index 6bf5e0922e..e953e94092 100644
--- a/pandora_console/godmode/reporting/visual_console_builder.data.php
+++ b/pandora_console/godmode/reporting/visual_console_builder.data.php
@@ -41,7 +41,7 @@ if (empty($idVisualConsole)) {
if (!$vconsole_write && !$vconsole_manage) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/reporting/visual_console_builder.editor.php b/pandora_console/godmode/reporting/visual_console_builder.editor.php
index 48ef5cc2f9..a8a16ddeb6 100755
--- a/pandora_console/godmode/reporting/visual_console_builder.editor.php
+++ b/pandora_console/godmode/reporting/visual_console_builder.editor.php
@@ -18,7 +18,7 @@ check_login();
// Visual console required
if (empty($visualConsole)) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
@@ -40,7 +40,7 @@ if (!isset($vconsole_manage)) {
if (!$vconsole_write && !$vconsole_manage) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/reporting/visual_console_builder.elements.php b/pandora_console/godmode/reporting/visual_console_builder.elements.php
index 295a27e9a3..71508d313a 100755
--- a/pandora_console/godmode/reporting/visual_console_builder.elements.php
+++ b/pandora_console/godmode/reporting/visual_console_builder.elements.php
@@ -18,7 +18,7 @@ check_login();
// Visual console required
if (empty($visualConsole)) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
@@ -46,7 +46,7 @@ if (!isset($vconsole_manage)) {
if (!$vconsole_write && !$vconsole_manage) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/reporting/visual_console_builder.php b/pandora_console/godmode/reporting/visual_console_builder.php
index b8d939516f..83b9e94998 100755
--- a/pandora_console/godmode/reporting/visual_console_builder.php
+++ b/pandora_console/godmode/reporting/visual_console_builder.php
@@ -95,7 +95,7 @@ else if ($activeTab != 'data' || ($activeTab == 'data' && $action != 'new')) {
// The visual console should exist.
if (empty($visualConsole)) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
@@ -111,7 +111,7 @@ else if ($activeTab != 'data' || ($activeTab == 'data' && $action != 'new')) {
$vconsole_manage = check_acl_restricted_all($config['id_user'], $visualConsole['id_group'], 'VM');
} else {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
@@ -121,7 +121,7 @@ else if ($activeTab != 'data' || ($activeTab == 'data' && $action != 'new')) {
// This section is only to manage the visual console
if (!$vconsole_write && !$vconsole_manage) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
@@ -173,7 +173,7 @@ switch ($activeTab) {
// The user should have permissions on the new group
if (!$vconsole_write_new && !$vconsole_manage_new) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
@@ -271,7 +271,10 @@ switch ($activeTab) {
}
if ($upload_file && !$uploadOK) {
- db_pandora_audit('Visual console builder', $error_message);
+ db_pandora_audit(
+ AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT,
+ $error_message
+ );
break;
}
@@ -288,24 +291,30 @@ switch ($activeTab) {
}
if ($result !== false) {
- db_pandora_audit('Visual console builder', "Update visual console #$idVisualConsole");
+ db_pandora_audit(
+ AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT,
+ sprintf('Update visual console #%s', $idVisualConsole)
+ );
$action = 'edit';
$statusProcessInDB = [
'flag' => true,
'message' => ui_print_success_message(__('Successfully update.'), '', true),
];
- // Return the updated visual console
+ // Return the updated visual console.
$visualConsole = db_get_row_filter(
'tlayout',
['id' => $idVisualConsole]
);
// Update the ACL
- // $vconsole_read = $vconsole_read_new;
+ // $vconsole_read = $vconsole_read_new;.
$vconsole_write = $vconsole_write_new;
$vconsole_manage = $vconsole_manage_new;
} else {
- db_pandora_audit('Visual console builder', "Fail update visual console #$idVisualConsole");
+ db_pandora_audit(
+ AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT,
+ sprintf('Fail update visual console #%s', $idVisualConsole)
+ );
$statusProcessInDB = [
'flag' => false,
'message' => ui_print_error_message(__('Could not be update.'), '', true),
@@ -321,24 +330,30 @@ switch ($activeTab) {
}
if ($idVisualConsole !== false) {
- db_pandora_audit('Visual console builder', "Create visual console #$idVisualConsole");
+ db_pandora_audit(
+ AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT,
+ sprintf('Create visual console #%s', $idVisualConsole)
+ );
$action = 'edit';
$statusProcessInDB = [
'flag' => true,
'message' => ui_print_success_message(__('Successfully created.'), '', true),
];
- // Return the updated visual console
+ // Return the updated visual console.
$visualConsole = db_get_row_filter(
'tlayout',
['id' => $idVisualConsole]
);
// Update the ACL
- // $vconsole_read = $vconsole_read_new;
+ // $vconsole_read = $vconsole_read_new;.
$vconsole_write = $vconsole_write_new;
$vconsole_manage = $vconsole_manage_new;
} else {
- db_pandora_audit('Visual console builder', 'Fail try to create visual console');
+ db_pandora_audit(
+ AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT,
+ 'Fail try to create visual console'
+ );
$statusProcessInDB = [
'flag' => false,
'message' => ui_print_error_message(__('Could not be created.'), '', true),
diff --git a/pandora_console/godmode/reporting/visual_console_builder.wizard.php b/pandora_console/godmode/reporting/visual_console_builder.wizard.php
index d792d18adf..122b40416f 100644
--- a/pandora_console/godmode/reporting/visual_console_builder.wizard.php
+++ b/pandora_console/godmode/reporting/visual_console_builder.wizard.php
@@ -18,7 +18,7 @@ check_login();
// Visual console required.
if (empty($visualConsole) === true) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
@@ -53,7 +53,7 @@ if (!isset($vconsole_manage)) {
if (!$vconsole_write && !$vconsole_manage) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/reporting/visual_console_favorite.php b/pandora_console/godmode/reporting/visual_console_favorite.php
index 16b5978dd2..d3b2b515f9 100644
--- a/pandora_console/godmode/reporting/visual_console_favorite.php
+++ b/pandora_console/godmode/reporting/visual_console_favorite.php
@@ -43,7 +43,7 @@ $is_metaconsole = is_metaconsole();
if (!$vconsoles_read && !$vconsoles_write && !$vconsoles_manage) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access map builder'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/servers/discovery.php b/pandora_console/godmode/servers/discovery.php
index 67605a6a4b..7fceb324f9 100755
--- a/pandora_console/godmode/servers/discovery.php
+++ b/pandora_console/godmode/servers/discovery.php
@@ -15,7 +15,7 @@ if (! check_acl($config['id_user'], 0, 'AR')
&& ! check_acl($config['id_user'], 0, 'PM')
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Server Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/servers/modificar_server.php b/pandora_console/godmode/servers/modificar_server.php
index d0bc6d791b..8fe9d303f2 100644
--- a/pandora_console/godmode/servers/modificar_server.php
+++ b/pandora_console/godmode/servers/modificar_server.php
@@ -21,7 +21,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Server Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/servers/plugin.php b/pandora_console/godmode/servers/plugin.php
index c247987c42..791cf9c9b1 100644
--- a/pandora_console/godmode/servers/plugin.php
+++ b/pandora_console/godmode/servers/plugin.php
@@ -113,7 +113,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'PM') && ! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Plugin Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/servers/plugin_registration.php b/pandora_console/godmode/servers/plugin_registration.php
index 2f69836268..e4ec7e7916 100644
--- a/pandora_console/godmode/servers/plugin_registration.php
+++ b/pandora_console/godmode/servers/plugin_registration.php
@@ -39,7 +39,7 @@ if ((bool) check_acl($config['id_user'], 0, 'PM') === false
|| (bool) check_acl($config['id_user'], 0, 'AW') === false
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Plugin Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/servers/servers.build_table.php b/pandora_console/godmode/servers/servers.build_table.php
index 4a7323fc8f..e947fc83f5 100644
--- a/pandora_console/godmode/servers/servers.build_table.php
+++ b/pandora_console/godmode/servers/servers.build_table.php
@@ -20,7 +20,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Server Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/setup/file_manager.php b/pandora_console/godmode/setup/file_manager.php
index af7e9d6e3a..e969f1d57f 100644
--- a/pandora_console/godmode/setup/file_manager.php
+++ b/pandora_console/godmode/setup/file_manager.php
@@ -32,7 +32,10 @@ global $config;
check_login();
if (! check_acl($config['id_user'], 0, 'PM')) {
- db_pandora_audit('ACL Violation', 'Trying to access File manager');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access File manager'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/setup/gis.php b/pandora_console/godmode/setup/gis.php
index 9f8ed7eee0..ff0f4f426c 100755
--- a/pandora_console/godmode/setup/gis.php
+++ b/pandora_console/godmode/setup/gis.php
@@ -19,7 +19,10 @@ global $config;
check_login();
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Visual Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Visual Setup Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/setup/gis_step_2.php b/pandora_console/godmode/setup/gis_step_2.php
index 2ec5deb0d9..c4f823996e 100644
--- a/pandora_console/godmode/setup/gis_step_2.php
+++ b/pandora_console/godmode/setup/gis_step_2.php
@@ -19,7 +19,10 @@ global $config;
check_login();
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Visual Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Visual Setup Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/setup/license.php b/pandora_console/godmode/setup/license.php
index 3d9fa1171c..8ae1827cb8 100644
--- a/pandora_console/godmode/setup/license.php
+++ b/pandora_console/godmode/setup/license.php
@@ -32,7 +32,10 @@ global $config;
check_login();
if (! check_acl($config['id_user'], 0, 'PM')) {
- db_pandora_audit('ACL Violation', 'Trying to change License settings');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to change License settings'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/setup/links.php b/pandora_console/godmode/setup/links.php
index ffeeb7fb23..61781d2e57 100644
--- a/pandora_console/godmode/setup/links.php
+++ b/pandora_console/godmode/setup/links.php
@@ -16,7 +16,10 @@ global $config;
check_login();
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Link Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Link Management'
+ );
include 'general/noaccess.php';
exit;
}
diff --git a/pandora_console/godmode/setup/news.php b/pandora_console/godmode/setup/news.php
index 52f7019dc4..b340e70066 100644
--- a/pandora_console/godmode/setup/news.php
+++ b/pandora_console/godmode/setup/news.php
@@ -18,7 +18,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Link Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/setup/os.builder.php b/pandora_console/godmode/setup/os.builder.php
index ff58e8d5b4..83b79e95a4 100644
--- a/pandora_console/godmode/setup/os.builder.php
+++ b/pandora_console/godmode/setup/os.builder.php
@@ -17,7 +17,10 @@ global $config;
check_login();
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Setup Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/setup/os.list.php b/pandora_console/godmode/setup/os.list.php
index 7ee3bc8093..507f098bc0 100644
--- a/pandora_console/godmode/setup/os.list.php
+++ b/pandora_console/godmode/setup/os.list.php
@@ -32,7 +32,10 @@ global $config;
check_login();
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Setup Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/setup/os.php b/pandora_console/godmode/setup/os.php
index f347f9f01e..ab864205a4 100644
--- a/pandora_console/godmode/setup/os.php
+++ b/pandora_console/godmode/setup/os.php
@@ -32,7 +32,10 @@ global $config;
check_login();
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Setup Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/setup/performance.php b/pandora_console/godmode/setup/performance.php
index 3d71be414c..52a429dc95 100644
--- a/pandora_console/godmode/setup/performance.php
+++ b/pandora_console/godmode/setup/performance.php
@@ -39,7 +39,10 @@ check_login();
if (! check_acl($config['id_user'], 0, 'PM')
&& ! is_user_admin($config['id_user'])
) {
- db_pandora_audit('ACL Violation', 'Trying to access Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Setup Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/setup/setup.php b/pandora_console/godmode/setup/setup.php
index 1675f86f3e..665543ef60 100644
--- a/pandora_console/godmode/setup/setup.php
+++ b/pandora_console/godmode/setup/setup.php
@@ -59,7 +59,10 @@ if (is_ajax()) {
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Setup Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/setup/setup_auth.php b/pandora_console/godmode/setup/setup_auth.php
index ea3397b30f..59d208afaf 100644
--- a/pandora_console/godmode/setup/setup_auth.php
+++ b/pandora_console/godmode/setup/setup_auth.php
@@ -25,7 +25,10 @@ global $config;
check_login();
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Setup Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/setup/setup_ehorus.php b/pandora_console/godmode/setup/setup_ehorus.php
index 7d6eaef617..eeabebf0d5 100644
--- a/pandora_console/godmode/setup/setup_ehorus.php
+++ b/pandora_console/godmode/setup/setup_ehorus.php
@@ -23,7 +23,10 @@ global $config;
check_login();
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Setup Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/setup/setup_integria.php b/pandora_console/godmode/setup/setup_integria.php
index f04ac026e7..460b20e8c6 100644
--- a/pandora_console/godmode/setup/setup_integria.php
+++ b/pandora_console/godmode/setup/setup_integria.php
@@ -23,7 +23,10 @@ global $config;
check_login();
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Setup Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/setup/setup_visuals.php b/pandora_console/godmode/setup/setup_visuals.php
index d9127cab49..9a36b3ac1c 100755
--- a/pandora_console/godmode/setup/setup_visuals.php
+++ b/pandora_console/godmode/setup/setup_visuals.php
@@ -17,7 +17,10 @@ global $config;
check_login();
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Visual Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Visual Setup Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/setup/snmp_wizard.php b/pandora_console/godmode/setup/snmp_wizard.php
index 89750a5b72..e788b408cd 100644
--- a/pandora_console/godmode/setup/snmp_wizard.php
+++ b/pandora_console/godmode/setup/snmp_wizard.php
@@ -18,7 +18,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Link Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/snmpconsole/snmp_alert.php b/pandora_console/godmode/snmpconsole/snmp_alert.php
index 671bb310de..6829d445e1 100755
--- a/pandora_console/godmode/snmpconsole/snmp_alert.php
+++ b/pandora_console/godmode/snmpconsole/snmp_alert.php
@@ -16,7 +16,7 @@
// Load global vars
if (! check_acl($config['id_user'], 0, 'LW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access SNMP Alert Management'
);
include 'general/noaccess.php';
@@ -270,10 +270,16 @@ if ($save_alert || $modify_alert) {
$result = db_process_sql_insert('talert_snmp', $values);
if (!$result) {
- db_pandora_audit('SNMP management', 'Fail try to create snmp alert');
+ db_pandora_audit(
+ AUDIT_LOG_SNMP_MANAGEMENT,
+ 'Fail try to create snmp alert'
+ );
ui_print_error_message(__('There was a problem creating the alert'));
} else {
- db_pandora_audit('SNMP management', "Create snmp alert #$result");
+ db_pandora_audit(
+ AUDIT_LOG_SNMP_MANAGEMENT,
+ "Create snmp alert #$result"
+ );
ui_print_success_message(__('Successfully created'));
}
} else {
@@ -400,10 +406,16 @@ if ($save_alert || $modify_alert) {
$result = db_process_sql($sql);
if (!$result) {
- db_pandora_audit('SNMP management', "Fail try to update snmp alert #$id_as");
+ db_pandora_audit(
+ AUDIT_LOG_SNMP_MANAGEMENT,
+ "Fail try to update snmp alert #$id_as"
+ );
ui_print_error_message(__('There was a problem updating the alert'));
} else {
- db_pandora_audit('SNMP management', "Update snmp alert #$id_as");
+ db_pandora_audit(
+ AUDIT_LOG_SNMP_MANAGEMENT,
+ "Update snmp alert #$id_as"
+ );
ui_print_success_message(__('Successfully updated'));
}
}
@@ -497,7 +509,7 @@ if ($update_alert || $duplicate_alert) {
if (!check_acl_restricted_all($config['id_user'], $group, 'LW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access SNMP Alert Management'
);
include 'general/noaccess.php';
@@ -591,14 +603,23 @@ if ($duplicate_alert) {
$result = db_process_sql_insert('talert_snmp', $values_duplicate);
if (!$result) {
- db_pandora_audit('SNMP management', "Fail try to duplicate snmp alert #$id_as");
+ db_pandora_audit(
+ AUDIT_LOG_SNMP_MANAGEMENT,
+ "Fail try to duplicate snmp alert #$id_as"
+ );
ui_print_error_message(__('There was a problem duplicating the alert'));
} else {
- db_pandora_audit('SNMP management', "Duplicate snmp alert #$id_as");
+ db_pandora_audit(
+ AUDIT_LOG_SNMP_MANAGEMENT,
+ "Duplicate snmp alert #$id_as"
+ );
ui_print_success_message(__('Successfully Duplicate'));
}
} else {
- db_pandora_audit('SNMP management', "Fail try to duplicate snmp alert #$id_as");
+ db_pandora_audit(
+ AUDIT_LOG_SNMP_MANAGEMENT,
+ "Fail try to duplicate snmp alert #$id_as"
+ );
ui_print_error_message(__('There was a problem duplicating the alert'));
}
}
@@ -616,10 +637,16 @@ if ($delete_alert) {
);
if ($result === false) {
- db_pandora_audit('SNMP management', "Fail try to delete snmp alert #$alert_delete");
+ db_pandora_audit(
+ AUDIT_LOG_SNMP_MANAGEMENT,
+ "Fail try to delete snmp alert #$alert_delete"
+ );
ui_print_error_message(__('There was a problem deleting the alert'));
} else {
- db_pandora_audit('SNMP management', "Delete snmp alert #$alert_delete");
+ db_pandora_audit(
+ AUDIT_LOG_SNMP_MANAGEMENT,
+ "Delete snmp alert #$alert_delete"
+ );
ui_print_success_message(__('Successfully deleted'));
}
}
@@ -637,10 +664,16 @@ if ($multiple_delete) {
);
if ($result !== false) {
- db_pandora_audit('SNMP management', "Delete snmp alert #$alert_delete");
+ db_pandora_audit(
+ AUDIT_LOG_SNMP_MANAGEMENT,
+ "Delete snmp alert #$alert_delete"
+ );
$count++;
} else {
- db_pandora_audit('SNMP management', "Fail try to delete snmp alert #$alert_delete");
+ db_pandora_audit(
+ AUDIT_LOG_SNMP_MANAGEMENT,
+ "Fail try to delete snmp alert #$alert_delete"
+ );
}
}
diff --git a/pandora_console/godmode/snmpconsole/snmp_filters.php b/pandora_console/godmode/snmpconsole/snmp_filters.php
index 821d7a7c6e..de9f86697a 100644
--- a/pandora_console/godmode/snmpconsole/snmp_filters.php
+++ b/pandora_console/godmode/snmpconsole/snmp_filters.php
@@ -14,7 +14,7 @@
// Check ACL
if (! check_acl($config['id_user'], 0, 'LW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access SNMP Filter Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/snmpconsole/snmp_trap_generator.php b/pandora_console/godmode/snmpconsole/snmp_trap_generator.php
index 15173eee4c..72578868e7 100755
--- a/pandora_console/godmode/snmpconsole/snmp_trap_generator.php
+++ b/pandora_console/godmode/snmpconsole/snmp_trap_generator.php
@@ -17,7 +17,7 @@ global $config;
// Check ACL
if (! check_acl($config['id_user'], 0, 'LW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access SNMP Filter Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/tag/edit_tag.php b/pandora_console/godmode/tag/edit_tag.php
index bbf1aac06b..37ac7c841b 100644
--- a/pandora_console/godmode/tag/edit_tag.php
+++ b/pandora_console/godmode/tag/edit_tag.php
@@ -19,7 +19,10 @@ enterprise_hook('open_meta_frame');
require_once $config['homedir'].'/include/functions_tags.php';
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Edit Tag');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Edit Tag'
+ );
include 'general/noaccess.php';
return;
@@ -110,13 +113,21 @@ if ($update_tag && $id_tag != 0) {
$result = tags_update_tag($values, 'id_tag = '.$id_tag);
}
- if ($result === false) {
- db_pandora_audit('Tag management', "Fail try to update tag #$id_tag");
- ui_print_error_message(__('Error updating tag'));
- } else {
- db_pandora_audit('Tag management', "Update tag #$id_tag");
- ui_print_success_message(__('Successfully updated tag'));
- }
+ $auditMessage = ($result === false) ? 'Fail try to update tag' : 'Update tag';
+ db_pandora_audit(
+ AUDIT_LOG_TAG_MANAGEMENT,
+ sprintf(
+ '%s #%s',
+ $auditMessage,
+ $id_tag
+ )
+ );
+
+ ui_print_result_message(
+ (bool) $result,
+ __('Successfully updated tag'),
+ __('Error updating tag')
+ );
}
// Create tag: creates a new tag
@@ -140,16 +151,24 @@ if ($create_tag) {
}
if ($return_create === false) {
- db_pandora_audit('Tag management', 'Fail try to create tag');
- ui_print_error_message(__('Error creating tag'));
+ $auditMessage = 'Fail try to create tag';
$action = 'new';
- // If create action ends successfully then current action is update
+ // If create action ends successfully then current action is update.
} else {
- db_pandora_audit('Tag management', "Create tag #$return_create");
- ui_print_success_message(__('Successfully created tag'));
+ $auditMessage = sprintf('Create tag #%s', $return_create);
$id_tag = $return_create;
$action = 'update';
}
+
+ db_pandora_audit(
+ AUDIT_LOG_TAG_MANAGEMENT,
+ $auditMessage
+ );
+ ui_print_result_message(
+ $action === 'update',
+ __('Successfully created tag'),
+ __('Error creating tag')
+ );
}
// Form fields are filled here
diff --git a/pandora_console/godmode/tag/tag.php b/pandora_console/godmode/tag/tag.php
index b38e536e74..b808edde9b 100644
--- a/pandora_console/godmode/tag/tag.php
+++ b/pandora_console/godmode/tag/tag.php
@@ -33,7 +33,10 @@ global $config;
check_login();
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Tag Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Tag Management'
+ );
include 'general/noaccess.php';
return;
}
@@ -160,13 +163,21 @@ if (is_metaconsole() === false) {
if ($delete !== 0) {
$return_delete = tags_delete_tag($delete);
- if ($return_delete === false) {
- db_pandora_audit('Tag management', 'Fail try to delete tag #'.$delete);
- ui_print_error_message(__('Error deleting tag'));
- } else {
- db_pandora_audit('Tag management', 'Delete tag #'.$delete);
- ui_print_success_message(__('Successfully deleted tag'));
- }
+ $auditMessage = ($return_delete === false) ? 'Fail try to delete tag' : 'Delete tag';
+ db_pandora_audit(
+ AUDIT_LOG_TAG_MANAGEMENT,
+ sprintf(
+ '%s #%s',
+ $auditMessage,
+ $delete
+ )
+ );
+
+ ui_print_result_message(
+ (bool) $return_delete !== false,
+ __('Successfully deleted tag'),
+ __('Error deleting tag')
+ );
}
$is_management_allowed = is_management_allowed();
diff --git a/pandora_console/godmode/um_client/index.php b/pandora_console/godmode/um_client/index.php
index 43385a8317..b8f3420f54 100644
--- a/pandora_console/godmode/um_client/index.php
+++ b/pandora_console/godmode/um_client/index.php
@@ -50,7 +50,10 @@ if (function_exists('check_acl') === true
if ((bool) check_acl($config['id_user'], 0, 'PM') !== true
&& (bool) is_user_admin($config['id_user']) !== true
) {
- db_pandora_audit('ACL Violation', 'Trying to access Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Setup Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/update_manager/update_manager.php b/pandora_console/godmode/update_manager/update_manager.php
index 67a03aa94f..c6dc09e90f 100644
--- a/pandora_console/godmode/update_manager/update_manager.php
+++ b/pandora_console/godmode/update_manager/update_manager.php
@@ -17,7 +17,10 @@ check_login();
// The ajax is in
// include/ajax/update_manager.ajax.php
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Setup Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/update_manager/update_manager.setup.php b/pandora_console/godmode/update_manager/update_manager.setup.php
index 3a4643a53e..7d466857ba 100644
--- a/pandora_console/godmode/update_manager/update_manager.setup.php
+++ b/pandora_console/godmode/update_manager/update_manager.setup.php
@@ -35,7 +35,10 @@ require_once __DIR__.'/../../include/functions_update_manager.php';
check_login();
if (! check_acl($config['id_user'], 0, 'PM') && ! is_user_admin($config['id_user'])) {
- db_pandora_audit('ACL Violation', 'Trying to access Setup Management');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access Setup Management'
+ );
include 'general/noaccess.php';
return;
}
diff --git a/pandora_console/godmode/users/configure_profile.php b/pandora_console/godmode/users/configure_profile.php
index 467bd4703c..b1db4e26e9 100644
--- a/pandora_console/godmode/users/configure_profile.php
+++ b/pandora_console/godmode/users/configure_profile.php
@@ -31,7 +31,7 @@ enterprise_hook('open_meta_frame');
if (! check_acl($config['id_user'], 0, 'UM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Profile Management'
);
include 'general/noaccess.php';
@@ -203,7 +203,7 @@ if ($id_profile || $new_profile) {
$network_config_edit = (bool) $profile['network_config_edit'] || $network_config_management;
$id_audit = db_pandora_audit(
- 'User management',
+ AUDIT_LOG_USER_MANAGEMENT,
'Edit profile '.io_safe_output($name)
);
enterprise_include_once('include/functions_audit.php');
diff --git a/pandora_console/godmode/users/configure_user.php b/pandora_console/godmode/users/configure_user.php
index b91609e257..006f4b41da 100644
--- a/pandora_console/godmode/users/configure_user.php
+++ b/pandora_console/godmode/users/configure_user.php
@@ -105,7 +105,7 @@ $is_err = false;
if (! check_acl($config['id_user'], 0, 'UM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access User Management'
);
include 'general/noaccess.php';
@@ -124,7 +124,7 @@ if (is_ajax()) {
$perfil = db_get_row('tperfil', 'id_perfil', $id_perfil);
db_pandora_audit(
- 'User management',
+ AUDIT_LOG_USER_MANAGEMENT,
'Deleted profile for user '.io_safe_output($id2),
false,
false,
@@ -147,7 +147,7 @@ if (is_ajax()) {
if ($result) {
db_pandora_audit(
- 'User management',
+ AUDIT_LOG_USER_MANAGEMENT,
__('Deleted user %s', io_safe_output($id_user))
);
}
@@ -169,7 +169,7 @@ if (is_ajax()) {
$result = delete_user($id_user);
if ($result) {
db_pandora_audit(
- 'User management',
+ AUDIT_LOG_USER_MANAGEMENT,
__('Deleted user %s from metaconsole', io_safe_output($id_user))
);
}
@@ -180,7 +180,7 @@ if (is_ajax()) {
// Log to the metaconsole too
if ($result) {
db_pandora_audit(
- 'User management',
+ AUDIT_LOG_USER_MANAGEMENT,
__('Deleted user %s from %s', io_safe_input($id_user), io_safe_input($server['server_name']))
);
}
@@ -450,7 +450,7 @@ if ($create_user) {
}
db_pandora_audit(
- 'User management',
+ AUDIT_LOG_USER_MANAGEMENT,
'Created user '.io_safe_output($id),
false,
false,
@@ -493,7 +493,7 @@ if ($create_user) {
$no_hierarchy = $profile['hierarchy'];
db_pandora_audit(
- 'User management',
+ AUDIT_LOG_USER_MANAGEMENT,
'Added profile for user '.io_safe_output($id2),
false,
false,
@@ -702,7 +702,7 @@ if ($update_user) {
db_pandora_audit(
- 'User management',
+ AUDIT_LOG_USER_MANAGEMENT,
'Updated user '.io_safe_output($id),
false,
false,
@@ -771,7 +771,7 @@ if ($add_profile && empty($json_profile)) {
$tags = implode(',', $tags);
db_pandora_audit(
- 'User management',
+ AUDIT_LOG_USER_MANAGEMENT,
'Added profile for user '.io_safe_output($id2),
false,
false,
@@ -808,7 +808,7 @@ if (!users_is_admin() && $config['id_user'] != $id && !$new_user) {
$result = db_get_all_rows_sql($sql);
if ($result == false && $user_info['is_admin'] == false) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access User Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/users/profile_list.php b/pandora_console/godmode/users/profile_list.php
index 1ee700c989..7ce7c82cc0 100644
--- a/pandora_console/godmode/users/profile_list.php
+++ b/pandora_console/godmode/users/profile_list.php
@@ -39,7 +39,7 @@ require_once $config['homedir'].'/include/functions_groups.php';
if (! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access User Management'
);
include 'general/noaccess.php';
@@ -127,7 +127,7 @@ if ($is_management_allowed === true && $delete_profile === true) {
ui_print_error_message(__('There was a problem deleting the profile'));
} else {
db_pandora_audit(
- 'Profile management',
+ AUDIT_LOG_USER_MANAGEMENT,
'Delete profile '.io_safe_output($profile['name'])
);
ui_print_success_message(__('Successfully deleted'));
@@ -242,7 +242,7 @@ if ($is_management_allowed === true && $update_profile === true) {
"'.get_product_name().' Management":"'.$pandora_management.'"}';
db_pandora_audit(
- 'User management',
+ AUDIT_LOG_USER_MANAGEMENT,
'Update profile '.io_safe_output($name),
false,
false,
@@ -293,7 +293,7 @@ if ($is_management_allowed === true && $create_profile === true) {
"'.get_product_name().' Management":"'.$pandora_management.'"}';
db_pandora_audit(
- 'User management',
+ AUDIT_LOG_USER_MANAGEMENT,
'Created profile '.io_safe_output($name),
false,
false,
diff --git a/pandora_console/godmode/users/user_list.php b/pandora_console/godmode/users/user_list.php
index e146bf9646..7ac3f55261 100644
--- a/pandora_console/godmode/users/user_list.php
+++ b/pandora_console/godmode/users/user_list.php
@@ -41,7 +41,7 @@ enterprise_include_once('meta/include/functions_users_meta.php');
if (! check_acl($config['id_user'], 0, 'UM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access User Management'
);
include 'general/noaccess.php';
@@ -271,7 +271,7 @@ if ((bool) get_parameter('user_del', false) === true) {
if ($result) {
db_pandora_audit(
- 'User management',
+ AUDIT_LOG_USER_MANAGEMENT,
__('Deleted user %s', io_safe_output($id_user))
);
}
@@ -292,7 +292,7 @@ if ((bool) get_parameter('user_del', false) === true) {
$result = delete_user($id_user);
if ($result) {
db_pandora_audit(
- 'User management',
+ AUDIT_LOG_USER_MANAGEMENT,
__('Deleted user %s from metaconsole', io_safe_input($id_user))
);
}
@@ -304,7 +304,7 @@ if ((bool) get_parameter('user_del', false) === true) {
// Log to the metaconsole too.
if ($result) {
db_pandora_audit(
- 'User management',
+ AUDIT_LOG_USER_MANAGEMENT,
__('Deleted user %s from %s', io_safe_input($id_user), io_safe_input($server['server_name']))
);
}
diff --git a/pandora_console/godmode/wizards/DiscoveryTaskList.class.php b/pandora_console/godmode/wizards/DiscoveryTaskList.class.php
index 1c7149588c..24875b9d34 100644
--- a/pandora_console/godmode/wizards/DiscoveryTaskList.class.php
+++ b/pandora_console/godmode/wizards/DiscoveryTaskList.class.php
@@ -228,7 +228,7 @@ class DiscoveryTaskList extends HTML
if (! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access recon task viewer'
);
include 'general/noaccess.php';
@@ -269,7 +269,7 @@ class DiscoveryTaskList extends HTML
if (!$this->aclMulticheck('RR|RW|RM|PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access recon task viewer'
);
include 'general/noaccess.php';
@@ -332,7 +332,7 @@ class DiscoveryTaskList extends HTML
if (! check_acl($config['id_user'], 0, 'RM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access recon task viewer'
);
include 'general/noaccess.php';
@@ -373,7 +373,7 @@ class DiscoveryTaskList extends HTML
if (! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access recon task viewer'
);
include 'general/noaccess.php';
@@ -415,7 +415,7 @@ class DiscoveryTaskList extends HTML
if (! check_acl($config['id_user'], 0, 'AW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access recon task viewer'
);
include 'general/noaccess.php';
diff --git a/pandora_console/godmode/wizards/HostDevices.class.php b/pandora_console/godmode/wizards/HostDevices.class.php
index f2819b4e74..36e7df0b21 100755
--- a/pandora_console/godmode/wizards/HostDevices.class.php
+++ b/pandora_console/godmode/wizards/HostDevices.class.php
@@ -616,7 +616,7 @@ class HostDevices extends Wizard
if (! check_acl($config['id_user'], 0, $this->access)) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Agent Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/include/ajax/alert_list.ajax.php b/pandora_console/include/ajax/alert_list.ajax.php
index 3d8e27cb35..dd02e6862e 100644
--- a/pandora_console/include/ajax/alert_list.ajax.php
+++ b/pandora_console/include/ajax/alert_list.ajax.php
@@ -38,7 +38,7 @@ if ($get_agent_alerts_simple) {
if (! check_acl($config['id_user'], $id_group, 'AR')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
echo json_encode(false);
@@ -47,7 +47,7 @@ if ($get_agent_alerts_simple) {
if (! check_acl($config['id_user'], 0, 'LW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
echo json_encode(false);
@@ -332,7 +332,7 @@ if ($get_agent_alerts_agent_view) {
if ($enable_alert) {
if (! check_acl($config['id_user'], 0, 'LW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
return false;
@@ -353,7 +353,7 @@ if ($enable_alert) {
if ($disable_alert) {
if (! check_acl($config['id_user'], 0, 'LW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
return false;
@@ -374,7 +374,7 @@ if ($disable_alert) {
if ($get_actions_module) {
if (! check_acl($config['id_user'], 0, 'LW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
return false;
@@ -395,7 +395,7 @@ if ($get_actions_module) {
if ($show_update_action_menu) {
if (! check_acl($config['id_user'], 0, 'LW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
return false;
diff --git a/pandora_console/include/ajax/double_auth.ajax.php b/pandora_console/include/ajax/double_auth.ajax.php
index ebe45a3894..0f85c9c0f5 100644
--- a/pandora_console/include/ajax/double_auth.ajax.php
+++ b/pandora_console/include/ajax/double_auth.ajax.php
@@ -23,7 +23,7 @@ $id_user_auth = (string) get_parameter('id_user_auth', $config['id_user']);
if ($id_user !== $config['id_user'] && $FA_forced != 1) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Double Authentication'
);
echo json_encode(-1);
diff --git a/pandora_console/include/ajax/events.php b/pandora_console/include/ajax/events.php
index 189a76022f..e8a0d5831a 100644
--- a/pandora_console/include/ajax/events.php
+++ b/pandora_console/include/ajax/events.php
@@ -47,7 +47,7 @@ if (! check_acl($config['id_user'], 0, 'ER')
&& ! check_acl($config['id_user'], 0, 'EM')
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access event viewer'
);
include 'general/noaccess.php';
diff --git a/pandora_console/include/ajax/group.php b/pandora_console/include/ajax/group.php
index 1074ed227b..705ed79e2f 100644
--- a/pandora_console/include/ajax/group.php
+++ b/pandora_console/include/ajax/group.php
@@ -35,7 +35,7 @@ use PandoraFMS\Group;
check_login();
if (! check_acl($config['id_user'], 0, 'AR')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access credential store'
);
diff --git a/pandora_console/include/ajax/map_enterprise.ajax.php b/pandora_console/include/ajax/map_enterprise.ajax.php
index 8d888e4a23..a0178457f5 100644
--- a/pandora_console/include/ajax/map_enterprise.ajax.php
+++ b/pandora_console/include/ajax/map_enterprise.ajax.php
@@ -42,7 +42,7 @@ if ($networkmap) {
if (!$networkmap_read && !$networkmap_write && !$networkmap_manage) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access networkmap'
);
include 'general/noaccess.php';
diff --git a/pandora_console/include/ajax/reporting.ajax.php b/pandora_console/include/ajax/reporting.ajax.php
index f77edb0d3d..89d5b715fb 100755
--- a/pandora_console/include/ajax/reporting.ajax.php
+++ b/pandora_console/include/ajax/reporting.ajax.php
@@ -18,7 +18,7 @@ check_login();
if (! check_acl($config['id_user'], 0, 'RW')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
diff --git a/pandora_console/include/ajax/visual_console.ajax.php b/pandora_console/include/ajax/visual_console.ajax.php
index cb7e016283..b3739d0c97 100644
--- a/pandora_console/include/ajax/visual_console.ajax.php
+++ b/pandora_console/include/ajax/visual_console.ajax.php
@@ -23,7 +23,7 @@ check_login();
// Fix: IW was the old ACL to check for report editing, now is RW
if (! check_acl($config['id_user'], 0, 'VR')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
diff --git a/pandora_console/include/ajax/visual_console_builder.ajax.php b/pandora_console/include/ajax/visual_console_builder.ajax.php
index 9cd2efeb2a..5736815d6c 100755
--- a/pandora_console/include/ajax/visual_console_builder.ajax.php
+++ b/pandora_console/include/ajax/visual_console_builder.ajax.php
@@ -37,7 +37,7 @@ $id_visual_console = get_parameter('id_visual_console', null);
// Visual console id required
if (empty($id_visual_console)) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
@@ -48,7 +48,7 @@ if (empty($id_visual_console)) {
$group_id = db_get_value('id_group', 'tlayout', 'id', $id_visual_console);
if ($group_id === false) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
@@ -68,7 +68,7 @@ if (!isset($vconsole_manage)) {
if (!$vconsole_write && !$vconsole_manage) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access report builder'
);
include 'general/noaccess.php';
diff --git a/pandora_console/include/api.php b/pandora_console/include/api.php
index f7f053a80a..cb3dae8e72 100644
--- a/pandora_console/include/api.php
+++ b/pandora_console/include/api.php
@@ -334,7 +334,7 @@ if ($correctLogin) {
* //TODO: Implement a new switch in config to enable / disable
* ACL auth failure: if enabled and have lots of traffic can produce
* millions of records and a considerable OVERHEAD in the system :(
- * db_pandora_audit("API access Failed", $no_login_msg, $user, $ipOrigin);
+ * db_pandora_ audit("API access Failed", $no_login_msg, $user, $ipOrigin);
*/
sleep(15);
diff --git a/pandora_console/include/class/AgentWizard.class.php b/pandora_console/include/class/AgentWizard.class.php
index 5f1d168183..c8b3de54fe 100644
--- a/pandora_console/include/class/AgentWizard.class.php
+++ b/pandora_console/include/class/AgentWizard.class.php
@@ -293,7 +293,7 @@ class AgentWizard extends HTML
if (!check_acl($config['id_user'], 0, 'AR')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access event viewer'
);
diff --git a/pandora_console/include/class/AgentsAlerts.class.php b/pandora_console/include/class/AgentsAlerts.class.php
index b7e39af4b7..00f8f334ef 100644
--- a/pandora_console/include/class/AgentsAlerts.class.php
+++ b/pandora_console/include/class/AgentsAlerts.class.php
@@ -114,7 +114,7 @@ class AgentsAlerts extends HTML
if (! check_acl($config['id_user'], 0, 'AR')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access event viewer'
);
@@ -174,7 +174,10 @@ class AgentsAlerts extends HTML
db_process_sql_update('tagente_modulo', ['flag' => 1], $where);
} else {
- db_pandora_audit('ACL Violation', 'Trying to set flag for groups');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to set flag for groups'
+ );
include 'general/noaccess.php';
exit;
}
diff --git a/pandora_console/include/class/AuditLog.class.php b/pandora_console/include/class/AuditLog.class.php
index cc73d9e378..b01e494101 100644
--- a/pandora_console/include/class/AuditLog.class.php
+++ b/pandora_console/include/class/AuditLog.class.php
@@ -69,7 +69,7 @@ class AuditLog extends HTML
&& is_user_admin($config['id_user']) === true
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Audit Logs'
);
include 'general/noaccess.php';
diff --git a/pandora_console/include/class/CalendarManager.class.php b/pandora_console/include/class/CalendarManager.class.php
index 9d5db4e80d..fdd4fb963c 100644
--- a/pandora_console/include/class/CalendarManager.class.php
+++ b/pandora_console/include/class/CalendarManager.class.php
@@ -121,7 +121,7 @@ class CalendarManager
// ACL Check.
if ((bool) check_acl($config['id_user'], 0, $this->access) !== true) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert calendar view'
);
include 'general/noaccess.php';
@@ -420,8 +420,8 @@ class CalendarManager
if ($result === true) {
db_pandora_audit(
- 'Special days list',
- 'Upload iCalendar '.$_FILES['ical_file']['name']
+ AUDIT_LOG_SYSTEM,
+ 'Special Days. Upload iCalendar '.$_FILES['ical_file']['name']
);
}
diff --git a/pandora_console/include/class/ConfigPEN.class.php b/pandora_console/include/class/ConfigPEN.class.php
index 0482c10863..b3e8d9d319 100644
--- a/pandora_console/include/class/ConfigPEN.class.php
+++ b/pandora_console/include/class/ConfigPEN.class.php
@@ -64,7 +64,7 @@ class ConfigPEN extends HTML
if (! check_acl($config['id_user'], 0, 'PM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access PEN Definition feature'
);
diff --git a/pandora_console/include/class/ConsoleSupervisor.php b/pandora_console/include/class/ConsoleSupervisor.php
index 356867764f..9071614c2a 100644
--- a/pandora_console/include/class/ConsoleSupervisor.php
+++ b/pandora_console/include/class/ConsoleSupervisor.php
@@ -2436,7 +2436,7 @@ class ConsoleSupervisor
// Only ask for messages once every 2 hours.
$future = (time() + 2 * SECONDS_1HOUR);
- config_update_value('last_um_check', $future);
+ config_update_value('last_um_check', $future, true);
$messages = update_manager_get_messages();
if (is_array($messages) === true) {
diff --git a/pandora_console/include/class/CredentialStore.class.php b/pandora_console/include/class/CredentialStore.class.php
index 718ebe7d4a..f9778a33b5 100644
--- a/pandora_console/include/class/CredentialStore.class.php
+++ b/pandora_console/include/class/CredentialStore.class.php
@@ -160,7 +160,7 @@ class CredentialStore extends Wizard
if (! check_acl($config['id_user'], 0, 'AR')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access credential store'
);
diff --git a/pandora_console/include/class/CustomNetScan.class.php b/pandora_console/include/class/CustomNetScan.class.php
index 1eab6f6634..bb0b420f1e 100644
--- a/pandora_console/include/class/CustomNetScan.class.php
+++ b/pandora_console/include/class/CustomNetScan.class.php
@@ -282,7 +282,7 @@ class CustomNetScan extends Wizard
if (!check_acl($config['id_user'], 0, $this->access)) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Custom Net Scan.'
);
include 'general/noaccess.php';
diff --git a/pandora_console/include/class/ExternalTools.class.php b/pandora_console/include/class/ExternalTools.class.php
index 368b9d209a..58c021de17 100644
--- a/pandora_console/include/class/ExternalTools.class.php
+++ b/pandora_console/include/class/ExternalTools.class.php
@@ -56,7 +56,7 @@ class ExternalTools extends HTML
if ($this->origin === 'agent') {
if (check_acl($config['id_user'], 0, 'AR') === false) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Agent Management'
);
include 'general/noaccess.php';
@@ -72,7 +72,7 @@ class ExternalTools extends HTML
} else if ($this->origin === 'setup') {
if (check_acl($config['id_user'], 0, 'PM') === false) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Profile Management'
);
include 'general/noaccess.php';
diff --git a/pandora_console/include/class/ManageNetScanScripts.class.php b/pandora_console/include/class/ManageNetScanScripts.class.php
index bdcbd26a50..a047cfcb61 100644
--- a/pandora_console/include/class/ManageNetScanScripts.class.php
+++ b/pandora_console/include/class/ManageNetScanScripts.class.php
@@ -85,7 +85,7 @@ class ManageNetScanScripts extends Wizard
if (check_acl($config['id_user'], 0, $this->access) === 0) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Net Scan Script.'
);
include 'general/noaccess.php';
diff --git a/pandora_console/include/class/ModuleTemplates.class.php b/pandora_console/include/class/ModuleTemplates.class.php
index 90eee1b05f..ba67142560 100644
--- a/pandora_console/include/class/ModuleTemplates.class.php
+++ b/pandora_console/include/class/ModuleTemplates.class.php
@@ -120,7 +120,7 @@ class ModuleTemplates extends HTML
if (! check_acl($config['id_user'], 0, 'AR')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access event viewer'
);
diff --git a/pandora_console/include/class/NetworkMap.class.php b/pandora_console/include/class/NetworkMap.class.php
index f562f8110c..9d36db8bc8 100644
--- a/pandora_console/include/class/NetworkMap.class.php
+++ b/pandora_console/include/class/NetworkMap.class.php
@@ -3564,7 +3564,7 @@ class NetworkMap
&& !$networkmap_manage
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access networkmap'
);
include 'general/noaccess.php';
diff --git a/pandora_console/include/class/WebServerModuleDebug.class.php b/pandora_console/include/class/WebServerModuleDebug.class.php
index e0e6f23c84..26bbb8b2f1 100644
--- a/pandora_console/include/class/WebServerModuleDebug.class.php
+++ b/pandora_console/include/class/WebServerModuleDebug.class.php
@@ -81,7 +81,7 @@ class WebServerModuleDebug extends Wizard
if (! check_acl($config['id_user'], 0, 'AR')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access event viewer'
);
diff --git a/pandora_console/include/constants.php b/pandora_console/include/constants.php
index f2b73b332d..ba7ef746da 100644
--- a/pandora_console/include/constants.php
+++ b/pandora_console/include/constants.php
@@ -769,3 +769,30 @@ define('COMMAND_PING', 2);
define('COMMAND_SNMP', 3);
define('COMMAND_NMAP', 4);
define('COMMAND_DIGWHOIS', 5);
+
+// Audit logs.
+define('AUDIT_LOG_SETUP', 'Setup');
+define('AUDIT_LOG_SYSTEM', 'System');
+define('AUDIT_LOG_HACK_ATTEMPT', 'HACK Attempt');
+define('AUDIT_LOG_ACL_VIOLATION', 'ACL Violation');
+define('AUDIT_LOG_METACONSOLE_NODE', 'Metaconsole node');
+define('AUDIT_LOG_USER_REGISTRATION', 'Console user registration');
+define('AUDIT_LOG_EXTENSION_MANAGER', 'Extension manager');
+define('AUDIT_LOG_WEB_SOCKETS', 'WebSockets engine');
+define('AUDIT_LOG_USER_MANAGEMENT', 'User management');
+define('AUDIT_LOG_AGENT_MANAGEMENT', 'Agent management');
+define('AUDIT_LOG_MODULE_MANAGEMENT', 'Module management');
+define('AUDIT_LOG_CATEGORY_MANAGEMENT', 'Category management');
+define('AUDIT_LOG_REPORT_MANAGEMENT', 'Report management');
+define('AUDIT_LOG_MASSIVE_MANAGEMENT', 'Massive operation management');
+define('AUDIT_LOG_POLICY_MANAGEMENT', 'Policy management');
+define('AUDIT_LOG_AGENT_REMOTE_MANAGEMENT', 'Agent remote configuration');
+define('AUDIT_LOG_FILE_COLLECTION', 'File collection');
+define('AUDIT_LOG_ALERT_MANAGEMENT', 'Alert management');
+define('AUDIT_LOG_ALERT_CORRELATION_MANAGEMENT', 'Alert correlation management');
+define('AUDIT_LOG_VISUAL_CONSOLE_MANAGEMENT', 'Visual Console Management');
+define('AUDIT_LOG_TAG_MANAGEMENT', 'Tag management');
+define('AUDIT_LOG_SNMP_MANAGEMENT', 'SNMP management');
+define('AUDIT_LOG_DASHBOARD_MANAGEMENT', 'Dashboard management');
+define('AUDIT_LOG_SERVICE_MANAGEMENT', 'Service management');
+define('AUDIT_LOG_INCIDENT_MANAGEMENT', 'Incident management');
diff --git a/pandora_console/include/functions.php b/pandora_console/include/functions.php
index baaa10a317..d66612128e 100644
--- a/pandora_console/include/functions.php
+++ b/pandora_console/include/functions.php
@@ -2282,7 +2282,11 @@ function check_login($output=true)
return false;
}
- db_pandora_audit('No session', 'Trying to access without a valid session', 'N/A');
+ db_pandora_audit(
+ AUDIT_LOG_HACK_ATTEMPT,
+ 'Trying to access without a valid session',
+ 'N/A'
+ );
include $config['homedir'].'/general/noaccess.php';
exit;
}
@@ -5963,7 +5967,13 @@ function send_test_email(
$result = $mailer->send($message);
} catch (Exception $e) {
error_log($e->getMessage());
- db_pandora_audit('Cron jobs mail', $e->getMessage());
+ db_pandora_audit(
+ AUDIT_LOG_SYSTEM,
+ sprintf(
+ 'Cron jobs mail: %s',
+ $e->getMessage()
+ )
+ );
}
return $result;
diff --git a/pandora_console/include/functions_agents.php b/pandora_console/include/functions_agents.php
index 6fd1f7cc65..91bdfd2fe1 100644
--- a/pandora_console/include/functions_agents.php
+++ b/pandora_console/include/functions_agents.php
@@ -272,7 +272,10 @@ function agents_create_agent(
agents_add_address($id_agent, $ip_address);
}
- db_pandora_audit('Agent management', 'New agent '.$name.' created');
+ db_pandora_audit(
+ AUDIT_LOG_AGENT_MANAGEMENT,
+ 'New agent '.$name.' created'
+ );
return $id_agent;
}
@@ -2116,7 +2119,7 @@ function agents_delete_address($id_agent, $ip_address)
$agent_name = agents_get_name($id_agent, '');
db_pandora_audit(
- 'Agent management',
+ AUDIT_LOG_AGENT_MANAGEMENT,
"Deleted IP $ip_address from agent '$agent_name'"
);
@@ -2584,12 +2587,12 @@ function agents_delete_agent($id_agents, $disableACL=false)
error_log($e->getMessage().' in '.$e->getFile().':'.$e->getLine());
}
- // The status of the module
+ // The status of the module.
db_process_delete_temp('tagente_estado', 'id_agente', $id_agent);
// The actual modules, don't put anything based on
// DONT Delete this, just mark for deletion
- // db_process_delete_temp ("tagente_modulo", "id_agente", $id_agent);
+ // db_process_delete_temp ("tagente_modulo", "id_agente", $id_agent);.
db_process_sql_update(
'tagente_modulo',
[
@@ -2603,11 +2606,11 @@ function agents_delete_agent($id_agents, $disableACL=false)
// Access entries
// Dont delete here, this records are deleted in daily script
// db_process_delete_temp ("tagent_access", "id_agent", $id_agent);
- // Delete agent policies
+ // Delete agent policies.
enterprise_include_once('include/functions_policies.php');
enterprise_hook('policies_delete_agent', [$id_agent]);
- if (enterprise_installed()) {
+ if (enterprise_installed() === true) {
// Delete agent in networkmap.
enterprise_include_once('include/functions_networkmap.php');
networkmap_delete_nodes_by_agent([$id_agent]);
@@ -2646,12 +2649,12 @@ function agents_delete_agent($id_agents, $disableACL=false)
);
}
- // tagente_datos_inc
- // Dont delete here, this records are deleted later, in database script
+ // Tagente_datos_inc.
+ // Dont delete here, this records are deleted later, in database script.
// db_process_delete_temp ("tagente_datos_inc", "id_agente_modulo", $where_modules, true);
- // Delete remote configuration
- if (enterprise_installed()) {
- if (isset($config['remote_config'])) {
+ // Delete remote configuration.
+ if (enterprise_installed() === true) {
+ if (isset($config['remote_config']) === true) {
enterprise_include_once('include/functions_config_agents.php');
if (enterprise_hook('config_agents_has_remote_configuration', [$id_agent])) {
$agent_name = agents_get_name($id_agent);
@@ -2659,47 +2662,45 @@ function agents_delete_agent($id_agents, $disableACL=false)
$agent_alias = io_safe_output(agents_get_alias($id_agent));
$agent_md5 = md5($agent_name, false);
- // Agent remote configuration editor
+ // Agent remote configuration editor.
$file_name = $config['remote_config'].'/conf/'.$agent_md5.'.conf';
$error = !@unlink($file_name);
- if (!$error) {
+ if ((bool) $error === false) {
$file_name = $config['remote_config'].'/md5/'.$agent_md5.'.md5';
$error = !@unlink($file_name);
- }
-
- if ($error) {
+ } else {
db_pandora_audit(
- 'Agent management',
- "Error: Deleted agent $agent_alias, the error is in the delete conf or md5."
+ AUDIT_LOG_AGENT_MANAGEMENT,
+ sprintf('Error: Deleted agent %s, the error is in the delete conf or md5.', $agent_alias)
);
}
}
}
}
- // And at long last, the agent
+ // And at long last, the agent.
db_process_delete_temp('tagente', 'id_agente', $id_agent);
db_process_sql('delete from ttag_module where id_agente_modulo in (select id_agente_modulo from tagente_modulo where id_agente = '.$id_agent.')');
db_pandora_audit(
- 'Agent management',
- "Deleted agent $agent_alias"
+ AUDIT_LOG_AGENT_MANAGEMENT,
+ sprintf('Deleted agent %s', $agent_alias)
);
- // Delete the agent from the metaconsole cache
+ // Delete the agent from the metaconsole cache.
enterprise_include_once('include/functions_agents.php');
enterprise_hook('agent_delete_from_cache', [$id_agent]);
- // Break the loop on error
- if ($error) {
+ // Break the loop on error.
+ if ((bool) $error === true) {
break;
}
}
- if ($error) {
+ if ((bool) $error === true) {
return false;
} else {
return true;
diff --git a/pandora_console/include/functions_alerts.php b/pandora_console/include/functions_alerts.php
index 1ffc240f1d..7180595c12 100644
--- a/pandora_console/include/functions_alerts.php
+++ b/pandora_console/include/functions_alerts.php
@@ -2617,7 +2617,7 @@ function alerts_ui_update_or_create_actions($update=true)
if ($al_action['id_group'] == 0) {
if (! check_acl($config['id_user'], 0, 'PM') && ! check_acl($config['id_user'], 0, 'LM')) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Alert Management'
);
include 'general/noaccess.php';
@@ -2717,7 +2717,7 @@ function alerts_ui_update_or_create_actions($update=true)
if ($result) {
db_pandora_audit(
- 'Command management',
+ AUDIT_LOG_ALERT_MANAGEMENT,
$update ? 'Update alert action #'.$id : 'Create alert action #'.$result,
false,
false,
@@ -2725,7 +2725,7 @@ function alerts_ui_update_or_create_actions($update=true)
);
} else {
db_pandora_audit(
- 'Command management',
+ AUDIT_LOG_ALERT_MANAGEMENT,
$update ? 'Fail try to update alert action #'.$id : 'Fail try to create alert action',
false,
false,
diff --git a/pandora_console/include/functions_api.php b/pandora_console/include/functions_api.php
index b077a14654..8f5483b6a2 100644
--- a/pandora_console/include/functions_api.php
+++ b/pandora_console/include/functions_api.php
@@ -2099,7 +2099,7 @@ function api_set_new_agent($thrash1, $thrash2, $other, $thrash3)
$unsafe_alias = io_safe_output($alias);
db_pandora_audit(
- 'Agent management',
+ AUDIT_LOG_AGENT_MANAGEMENT,
'Created agent '.$unsafe_alias,
false,
true,
@@ -15083,21 +15083,30 @@ function api_set_new_cluster($thrash1, $thrash2, $other, $thrash3)
$id_module = modules_create_agent_module($id_agent, $values_module['nombre'], $values_module, true);
if ($id_module === false) {
- db_pandora_audit('Report management', "Failed to create cluster status module in cluster $name (#$id_agent)");
+ db_pandora_audit(
+ AUDIT_LOG_REPORT_MANAGEMENT,
+ "Failed to create cluster status module in cluster $name (#$id_agent)"
+ );
}
}
- if ($id_cluster !== false) {
- db_pandora_audit('Report management', "Created cluster $name (#$id_cluster)");
- } else {
- db_pandora_audit('Report management', "Failed to create cluster $name");
- }
+ $auditMessageCluster = ((bool) $id_cluster === true)
+ ? sprintf('Created new cluster %s (#%s)', $name, $id_cluster)
+ : sprintf('Failed to create cluster %s ', $name);
- if ($id_agent !== false) {
- db_pandora_audit('Report management', "Created new cluster agent $name (#$id_agent)");
- } else {
- db_pandora_audit('Report management', "Failed to create cluster agent $name");
- }
+ db_pandora_audit(
+ AUDIT_LOG_REPORT_MANAGEMENT,
+ $auditMessageCluster
+ );
+
+ $auditMessageAgent = ((bool) $id_agent === true)
+ ? sprintf('Created new cluster agent %s (#%s)', $name, $id_agent)
+ : sprintf('Failed to create cluster agent %s ', $name);
+
+ db_pandora_audit(
+ AUDIT_LOG_REPORT_MANAGEMENT,
+ $auditMessageAgent
+ );
if ($id_cluster !== false) {
returnData(
@@ -15222,9 +15231,15 @@ function api_set_add_cluster_item($thrash1, $thrash2, $other, $thrash3)
);
if ($tcluster_module !== false) {
- db_pandora_audit('Report management', 'Module #'.$element['name'].' assigned to cluster #'.$element['id_cluster']);
+ db_pandora_audit(
+ AUDIT_LOG_REPORT_MANAGEMENT,
+ 'Module #'.$element['name'].' assigned to cluster #'.$element['id_cluster']
+ );
} else {
- db_pandora_audit('Report management', 'Failed to assign AA item module to cluster '.$element['name']);
+ db_pandora_audit(
+ AUDIT_LOG_REPORT_MANAGEMENT,
+ 'Failed to assign AA item module to cluster '.$element['name']
+ );
}
} else if ($element['type'] == 'AP') {
$id_agent = db_get_value_sql('SELECT id_agent FROM tcluster WHERE id = '.$element['id_cluster']);
@@ -15287,9 +15302,15 @@ function api_set_add_cluster_item($thrash1, $thrash2, $other, $thrash3)
);
if ($tcluster_balanced_module !== false) {
- db_pandora_audit('Report management', 'Module #'.$element['name'].' assigned to cluster #'.$element['id_cluster']);
+ db_pandora_audit(
+ AUDIT_LOG_REPORT_MANAGEMENT,
+ 'Module #'.$element['name'].' assigned to cluster #'.$element['id_cluster']
+ );
} else {
- db_pandora_audit('Report management', 'The module could not be assigned to the cluster');
+ db_pandora_audit(
+ AUDIT_LOG_REPORT_MANAGEMENT,
+ 'The module could not be assigned to the cluster'
+ );
}
}
}
@@ -16675,16 +16696,32 @@ function api_set_access_process($thrash1, $thrash2, $other, $returnType)
}
} else {
// There is no administrator user who has logged in since then to log us in.
- db_pandora_audit($other['data'][3].' Logon', 'Logged in '.$other['data'][3].' node '.$other['data'][2], $other['data'][0]);
+ db_pandora_audit(
+ AUDIT_LOG_USER_REGISTRATION,
+ 'Logged in '.$other['data'][3].' node '.$other['data'][2],
+ $other['data'][0]
+ );
returnData('string', ['type' => 'string', 'data' => 'free']);
}
} else if ($other['data'][1] == 'logout') {
// The administrator user wants to log out
- db_pandora_audit($other['data'][3].' Logoff', 'Logout from '.$other['data'][3].' node '.$other['data'][2], $other['data'][0]);
+ db_pandora_audit(
+ AUDIT_LOG_USER_REGISTRATION,
+ 'Logout from '.$other['data'][3].' node '.$other['data'][2],
+ $other['data'][0]
+ );
} else if ($other['data'][1] == 'exclude') {
// The administrator user has ejected another administrator user who was logged in
- db_pandora_audit($other['data'][3].' Logon', 'Logged in '.$other['data'][3].' node '.$other['data'][2], $other['data'][0]);
- db_pandora_audit($other['data'][3].' Logoff', 'Logout from '.$other['data'][3].' node '.$other['data'][2], $audit_concurrence[0]['id_usuario']);
+ db_pandora_audit(
+ AUDIT_LOG_USER_REGISTRATION,
+ 'Logged in '.$other['data'][3].' node '.$other['data'][2],
+ $other['data'][0]
+ );
+ db_pandora_audit(
+ AUDIT_LOG_USER_REGISTRATION,
+ 'Logout from '.$other['data'][3].' node '.$other['data'][2],
+ $audit_concurrence[0]['id_usuario']
+ );
}
// The admin user is trying to browse
else if ($other['data'][1] == 'browse') {
@@ -16704,23 +16741,39 @@ function api_set_access_process($thrash1, $thrash2, $other, $returnType)
}
} else if ($other['data'][1] == 'cancelled') {
// The administrator user tries to log in having another administrator logged in, but instead of expelling him he cancels his log in.
- db_pandora_audit($other['data'][3].' cancelled access', 'Cancelled access in '.$other['data'][3].' node '.$other['data'][2], $other['data'][0]);
+ db_pandora_audit(
+ AUDIT_LOG_USER_REGISTRATION,
+ 'Cancelled access in '.$other['data'][3].' node '.$other['data'][2],
+ $other['data'][0]
+ );
returnData('string', ['type' => 'string', 'data' => 'cancelled']);
}
} else {
if ($other['data'][4] == 1) {
// The user trying to log in is not an administrator and is not allowed no admin access
- db_pandora_audit($other['data'][3].' denied access', 'Denied access to non-admin user '.$other['data'][3].' node '.$other['data'][2], $other['data'][0]);
+ db_pandora_audit(
+ AUDIT_LOG_USER_REGISTRATION,
+ 'Denied access to non-admin user '.$other['data'][3].' node '.$other['data'][2],
+ $other['data'][0]
+ );
returnData('string', ['type' => 'string', 'data' => 'denied']);
} else {
// The user trying to log in is not an administrator and is allowed no admin access
if ($other['data'][1] == 'login') {
// The user trying to login is not admin, can enter without concurrent use filter
- db_pandora_audit($other['data'][3].' Logon', 'Logged in '.$other['data'][3].' node '.$other['data'][2], $other['data'][0]);
+ db_pandora_audit(
+ AUDIT_LOG_USER_REGISTRATION,
+ 'Logged in '.$other['data'][3].' node '.$other['data'][2],
+ $other['data'][0]
+ );
returnData('string', ['type' => 'string', 'data' => 'free']);
} else if ($other['data'][1] == 'logout') {
// The user trying to logoff is not admin
- db_pandora_audit($other['data'][3].' Logoff', 'Logout from '.$other['data'][3].' node '.$other['data'][2], $other['data'][0]);
+ db_pandora_audit(
+ AUDIT_LOG_USER_REGISTRATION,
+ 'Logout from '.$other['data'][3].' node '.$other['data'][2],
+ $other['data'][0]
+ );
} else if ($other['data'][1] == 'browse') {
// The user trying to browse in an app page is not admin, can enter without concurrent use filter
returnData('string', ['type' => 'string', 'data' => 'free']);
diff --git a/pandora_console/include/functions_config.php b/pandora_console/include/functions_config.php
index 27e976d486..ccf315072f 100644
--- a/pandora_console/include/functions_config.php
+++ b/pandora_console/include/functions_config.php
@@ -1,6 +1,6 @@
> updated.', $token)
+ );
+ }
+
return (bool) $result;
}
}
@@ -126,7 +138,7 @@ function config_update_config()
include_once $config['homedir'].'/include/functions_io.php';
// If user is not even log it, don't try this.
- if (! isset($config['id_user'])) {
+ if (isset($config['id_user']) === false) {
$config['error_config_update_config'] = [];
$config['error_config_update_config']['correct'] = false;
$config['error_config_update_config']['message'] = __('Failed updated: User did not login.');
@@ -144,9 +156,7 @@ function config_update_config()
$update_config = (bool) get_parameter('update_config');
- if ($update_config) {
- db_pandora_audit('Setup', 'Setup has changed');
- } else {
+ if ($update_config === false) {
// Do nothing.
return false;
}
@@ -164,39 +174,39 @@ function config_update_config()
// Setup now is divided in different tabs.
switch ($section_setup) {
case 'general':
- if (!config_update_value('language', (string) get_parameter('language'))) {
+ if (config_update_value('language', (string) get_parameter('language'), true) === false) {
$error_update[] = __('Language settings');
}
- if (!config_update_value('remote_config', (string) get_parameter('remote_config'))) {
+ if (config_update_value('remote_config', (string) get_parameter('remote_config'), true) === false) {
$error_update[] = __('Remote config directory');
}
- if (!config_update_value('phantomjs_bin', (string) get_parameter('phantomjs_bin'))) {
+ if (config_update_value('phantomjs_bin', (string) get_parameter('phantomjs_bin'), true) === false) {
$error_update[] = __('phantomjs config directory');
}
- if (!config_update_value('loginhash_pwd', io_input_password((string) get_parameter('loginhash_pwd')))) {
+ if (config_update_value('loginhash_pwd', io_input_password((string) get_parameter('loginhash_pwd')), true) === false) {
$error_update[] = __('Auto login (hash) password');
}
- if (!config_update_value('timesource', (string) get_parameter('timesource'))) {
+ if (config_update_value('timesource', (string) get_parameter('timesource'), true) === false) {
$error_update[] = __('Time source');
}
- if (!config_update_value('autoupdate', (bool) get_parameter('autoupdate'))) {
+ if (config_update_value('autoupdate', (bool) get_parameter('autoupdate'), true) === false) {
$error_update[] = __('Automatic check for updates');
}
- if (!config_update_value('cert_path', get_parameter('cert_path'))) {
+ if (config_update_value('cert_path', get_parameter('cert_path'), true) === false) {
$error_update[] = __('SSL cert path');
}
- if (!config_update_value('https', (bool) get_parameter('https'))) {
+ if (config_update_value('https', (bool) get_parameter('https'), true) === false) {
$error_update[] = __('Enforce https');
}
- if (!config_update_value('use_cert', (bool) get_parameter('use_cert'))) {
+ if (config_update_value('use_cert', (bool) get_parameter('use_cert'), true) === false) {
$error_update[] = __('Use cert.');
}
@@ -209,57 +219,55 @@ function config_update_config()
"Path doesn't exists or is not writable"
);
} else {
- if (config_update_value('attachment_store', $attachment_store) === false) {
+ if (config_update_value('attachment_store', $attachment_store, true) === false) {
$error_update[] = __(
'Attachment store.'
);
}
}
- if (!config_update_value('list_ACL_IPs_for_API', (string) get_parameter('list_ACL_IPs_for_API'))) {
+ if (config_update_value('list_ACL_IPs_for_API', (string) get_parameter('list_ACL_IPs_for_API'), true) === false) {
$error_update[] = __('IP list with API access');
}
- if (!config_update_value('api_password', io_input_password(get_parameter('api_password')))) {
+ if (config_update_value('api_password', io_input_password(get_parameter('api_password')), true) === false) {
$error_update[] = __('API password');
}
- if (!config_update_value('activate_gis', (bool) get_parameter('activate_gis'))) {
+ if (config_update_value('activate_gis', (bool) get_parameter('activate_gis'), true) === false) {
$error_update[] = __('Enable GIS features');
}
- if (!config_update_value('integria_inventory', get_parameter('integria_inventory'))) {
+ if (config_update_value('integria_inventory', get_parameter('integria_inventory'), true) === false) {
$error_update[] = __('Integria inventory');
}
- if (!config_update_value('integria_api_password', io_input_password(get_parameter('integria_api_password')))) {
+ if (config_update_value('integria_api_password', io_input_password(get_parameter('integria_api_password')), true) === false) {
$error_update[] = __('Integria API password');
}
- if (!config_update_value('integria_url', get_parameter('integria_url'))) {
+ if (config_update_value('integria_url', get_parameter('integria_url'), true) === false) {
$error_update[] = __('Integria URL');
}
- if (!config_update_value('activate_netflow', (bool) get_parameter('activate_netflow'))) {
+ if (config_update_value('activate_netflow', (bool) get_parameter('activate_netflow'), true) === false) {
$error_update[] = __('Enable Netflow');
}
$timezone = (string) get_parameter('timezone');
- if ($timezone != '') {
- if (!config_update_value('timezone', $timezone)) {
- $error_update[] = __('Timezone setup');
- }
+ if (empty($timezone) === true || config_update_value('timezone', $timezone, true) === false) {
+ $error_update[] = __('Timezone setup');
}
- if (!config_update_value('sound_alert', get_parameter('sound_alert'))) {
+ if (config_update_value('sound_alert', get_parameter('sound_alert'), true) === false) {
$error_update[] = __('Sound for Alert fired');
}
- if (!config_update_value('sound_critical', get_parameter('sound_critical'))) {
+ if (config_update_value('sound_critical', get_parameter('sound_critical'), true) === false) {
$error_update[] = __('Sound for Monitor critical');
}
- if (!config_update_value('sound_warning', get_parameter('sound_warning'))) {
+ if (config_update_value('sound_warning', get_parameter('sound_warning'), true) === false) {
$error_update[] = __('Sound for Monitor warning');
}
@@ -268,7 +276,7 @@ function config_update_config()
if ($update_manager_installed == 1) {
$license_info_key = get_parameter('license_info_key', '');
- if (!empty($license_info_key)) {
+ if (empty($license_info_key) === false) {
$values = [db_escape_key_identifier('value') => $license_info_key];
$where = [db_escape_key_identifier('key') => 'customer_key'];
$update_manage_settings_result = db_process_sql_update('tupdate_settings', $values, $where);
@@ -278,253 +286,253 @@ function config_update_config()
}
}
- if (!config_update_value('public_url', get_parameter('public_url'))) {
+ if (config_update_value('public_url', get_parameter('public_url'), true) === false) {
$error_update[] = __('Public URL');
}
- if (!config_update_value('force_public_url', get_parameter_switch('force_public_url'))) {
+ if (config_update_value('force_public_url', get_parameter_switch('force_public_url'), true) === false) {
$error_update[] = __('Force use Public URL');
}
- if (!config_update_value('public_url_exclusions', get_parameter('public_url_exclusions'))) {
+ if (config_update_value('public_url_exclusions', get_parameter('public_url_exclusions'), true) === false) {
$error_update[] = __('Public URL host exclusions');
}
- if (!config_update_value('referer_security', get_parameter('referer_security'))) {
+ if (config_update_value('referer_security', get_parameter('referer_security'), true) === false) {
$error_update[] = __('Referer security');
}
- if (!config_update_value('event_storm_protection', get_parameter('event_storm_protection', 0))) {
+ if (config_update_value('event_storm_protection', get_parameter('event_storm_protection', 0), true) === false) {
$error_update[] = __('Event storm protection');
}
- if (!config_update_value('command_snapshot', get_parameter('command_snapshot'))) {
+ if (config_update_value('command_snapshot', get_parameter('command_snapshot'), true) === false) {
$error_update[] = __('Command Snapshot');
}
- if (!config_update_value('use_custom_encoding', get_parameter('use_custom_encoding', 0))) {
+ if (config_update_value('use_custom_encoding', get_parameter('use_custom_encoding', 0), true) === false) {
$error_update[] = __('Use custom encoding');
}
- if (!config_update_value('server_log_dir', io_safe_input(strip_tags(io_safe_output(get_parameter('server_log_dir')))))) {
+ if (config_update_value('server_log_dir', io_safe_input(strip_tags(io_safe_output(get_parameter('server_log_dir')))), true) === false) {
$error_update[] = __('Server logs directory');
}
- if (!config_update_value('max_log_size', get_parameter('max_log_size'))) {
+ if (config_update_value('max_log_size', get_parameter('max_log_size'), true) === false) {
$error_update[] = __('Log size limit in system logs viewer extension');
}
- if (!config_update_value('tutorial_mode', get_parameter('tutorial_mode'))) {
+ if (config_update_value('tutorial_mode', get_parameter('tutorial_mode'), true) === false) {
$error_update[] = __('Tutorial mode');
}
- if (!config_update_value('past_planned_downtimes', get_parameter('past_planned_downtimes'))) {
+ if (config_update_value('past_planned_downtimes', get_parameter('past_planned_downtimes'), true) === false) {
$error_update[] = __('Allow create scheduled downtimes in the past');
}
- if (!config_update_value('limit_parameters_massive', get_parameter('limit_parameters_massive'))) {
+ if (config_update_value('limit_parameters_massive', get_parameter('limit_parameters_massive'), true) === false) {
$error_update[] = __('Limit parameters bulk');
}
- if (!config_update_value('identification_reminder', get_parameter('identification_reminder'))) {
+ if (config_update_value('identification_reminder', get_parameter('identification_reminder'), true) === false) {
$error_update[] = __('Identification_reminder');
}
- if (!config_update_value('include_agents', (bool) get_parameter('include_agents'))) {
+ if (config_update_value('include_agents', (bool) get_parameter('include_agents'), true) === false) {
$error_update[] = __('Include_agents');
}
- if (!config_update_value('alias_as_name', get_parameter('alias_as_name'))) {
+ if (config_update_value('alias_as_name', get_parameter('alias_as_name'), true) === false) {
$error_update[] = __('alias_as_name');
}
- if (!config_update_value('console_log_enabled', get_parameter('console_log_enabled'))) {
+ if (config_update_value('console_log_enabled', get_parameter('console_log_enabled'), true) === false) {
$error_update[] = __('Console log enabled');
}
- if (!config_update_value('audit_log_enabled', get_parameter('audit_log_enabled'))) {
+ if (config_update_value('audit_log_enabled', get_parameter('audit_log_enabled'), true) === false) {
$error_update[] = __('Audit log enabled');
}
- if (!config_update_value('module_custom_id_ro', get_parameter('module_custom_id_ro'))) {
+ if (config_update_value('module_custom_id_ro', get_parameter('module_custom_id_ro'), true) === false) {
$error_update[] = __('Module Custom ID read only');
}
- if (!config_update_value('unique_ip', get_parameter('unique_ip'))) {
- $error_update[] = __('unique_ip');
+ if (config_update_value('unique_ip', get_parameter('unique_ip'), true) === false) {
+ $error_update[] = __('Unique IP');
}
- if (!config_update_value('email_smtpServer', get_parameter('email_smtpServer'))) {
+ if (config_update_value('email_smtpServer', get_parameter('email_smtpServer'), true) === false) {
$error_update[] = __('Server SMTP');
}
- if (!config_update_value('email_from_dir', get_parameter('email_from_dir'))) {
+ if (config_update_value('email_from_dir', get_parameter('email_from_dir'), true) === false) {
$error_update[] = __('From dir');
}
- if (!config_update_value('email_from_name', get_parameter('email_from_name'))) {
+ if (config_update_value('email_from_name', get_parameter('email_from_name'), true) === false) {
$error_update[] = __('From name');
}
- if (!config_update_value('email_smtpPort', (int) get_parameter('email_smtpPort'))) {
+ if (config_update_value('email_smtpPort', (int) get_parameter('email_smtpPort'), true) === false) {
$error_update[] = __('Port SMTP');
}
- if (!config_update_value('email_encryption', get_parameter('email_encryption'))) {
+ if (config_update_value('email_encryption', get_parameter('email_encryption'), true) === false) {
$error_update[] = __('Encryption');
}
- if (!config_update_value('email_username', get_parameter('email_username'))) {
+ if (config_update_value('email_username', get_parameter('email_username'), true) === false) {
$error_update[] = __('Email user');
}
- if (!config_update_value('email_password', io_input_password(get_parameter('email_password')))) {
+ if (config_update_value('email_password', io_input_password(get_parameter('email_password')), true) === false) {
$error_update[] = __('Email password');
}
break;
case 'enterprise':
- if (isset($config['enterprise_installed']) && $config['enterprise_installed'] == 1) {
- if (!config_update_value('trap2agent', (string) get_parameter('trap2agent'))) {
+ if (isset($config['enterprise_installed']) === true && (bool) $config['enterprise_installed'] === true) {
+ if (config_update_value('trap2agent', (string) get_parameter('trap2agent'), true) === false) {
$error_update[] = __('Forward SNMP traps to agent (if exist)');
}
- if (!config_update_value('acl_enterprise', get_parameter('acl_enterprise'))) {
+ if (config_update_value('acl_enterprise', get_parameter('acl_enterprise'), true) === false) {
$error_update[] = __('Use Enterprise ACL System');
}
- if (!config_update_value('metaconsole', get_parameter('metaconsole'))) {
+ if (config_update_value('metaconsole', get_parameter('metaconsole'), true) === false) {
$error_update[] = __('Activate Metaconsole');
}
- if (!config_update_value('collection_max_size', get_parameter('collection_max_size'))) {
+ if (config_update_value('collection_max_size', get_parameter('collection_max_size'), true) === false) {
$error_update[] = __('Size of collection');
}
- if (!config_update_value('event_replication', (int) get_parameter('event_replication'))) {
+ if (config_update_value('event_replication', (int) get_parameter('event_replication'), true) === false) {
$error_update[] = __('Events replication');
}
- if ((int) get_parameter('event_replication') == 1) {
- if (!config_update_value('replication_interval', (int) get_parameter('replication_interval'))) {
+ if ((int) get_parameter('event_replication') === 1) {
+ if (config_update_value('replication_interval', (int) get_parameter('replication_interval'), true) === false) {
$error_update[] = __('Replication interval');
}
- if (!config_update_value('replication_limit', (int) get_parameter('replication_limit'))) {
+ if (config_update_value('replication_limit', (int) get_parameter('replication_limit'), true) === false) {
$error_update[] = __('Replication limit');
}
- if (!config_update_value('replication_mode', (string) get_parameter('replication_mode'))) {
+ if (config_update_value('replication_mode', (string) get_parameter('replication_mode'), true) === false) {
$error_update[] = __('Replication mode');
}
- if (!config_update_value('show_events_in_local', (string) get_parameter('show_events_in_local'))) {
+ if (config_update_value('show_events_in_local', (string) get_parameter('show_events_in_local'), true) === false) {
$error_update[] = __('Show events list in local console (read only)');
}
}
- if (!config_update_value('replication_dbengine', (string) get_parameter('replication_dbengine'))) {
+ if (config_update_value('replication_dbengine', (string) get_parameter('replication_dbengine'), true) === false) {
$error_update[] = __('Replication DB engine');
}
- if (!config_update_value('replication_dbhost', (string) get_parameter('replication_dbhost'))) {
+ if (config_update_value('replication_dbhost', (string) get_parameter('replication_dbhost'), true) === false) {
$error_update[] = __('Replication DB host');
}
- if (!config_update_value('replication_dbname', (string) get_parameter('replication_dbname'))) {
+ if (config_update_value('replication_dbname', (string) get_parameter('replication_dbname'), true) === false) {
$error_update[] = __('Replication DB database');
}
- if (!config_update_value('replication_dbuser', (string) get_parameter('replication_dbuser'))) {
+ if (config_update_value('replication_dbuser', (string) get_parameter('replication_dbuser'), true) === false) {
$error_update[] = __('Replication DB user');
}
- if (!config_update_value('replication_dbpass', io_input_password((string) get_parameter('replication_dbpass')))) {
+ if (config_update_value('replication_dbpass', io_input_password((string) get_parameter('replication_dbpass')), true) === false) {
$error_update[] = __('Replication DB password');
}
- if (!config_update_value('replication_dbport', (string) get_parameter('replication_dbport'))) {
+ if (config_update_value('replication_dbport', (string) get_parameter('replication_dbport'), true) === false) {
$error_update[] = __('Replication DB port');
}
- if (!config_update_value('metaconsole_agent_cache', (int) get_parameter('metaconsole_agent_cache'))) {
+ if (config_update_value('metaconsole_agent_cache', (int) get_parameter('metaconsole_agent_cache'), true) === false) {
$error_update[] = __('Metaconsole agent cache');
}
- if (!config_update_value('log_collector', (bool) get_parameter('log_collector'))) {
+ if (config_update_value('log_collector', (bool) get_parameter('log_collector'), true) === false) {
$error_update[] = __('Activate Log Collector');
}
- if (!config_update_value('enable_update_manager', get_parameter('enable_update_manager'))) {
+ if (config_update_value('enable_update_manager', get_parameter('enable_update_manager'), true) === false) {
$error_update[] = __('Enable Update Manager');
}
- if (!config_update_value('ipam_ocuppied_critical_treshold', get_parameter('ipam_ocuppied_critical_treshold'))) {
+ if (config_update_value('ipam_ocuppied_critical_treshold', get_parameter('ipam_ocuppied_critical_treshold'), true) === false) {
$error_update[] = __('Ipam Ocuppied Manager Critical');
}
- if (!config_update_value('ipam_ocuppied_warning_treshold', get_parameter('ipam_ocuppied_warning_treshold'))) {
+ if (config_update_value('ipam_ocuppied_warning_treshold', get_parameter('ipam_ocuppied_warning_treshold'), true) === false) {
$error_update[] = __('Ipam Ocuppied Manager Warning');
}
- if (!config_update_value('sap_license', get_parameter('sap_license'))) {
+ if (config_update_value('sap_license', get_parameter('sap_license'), true) === false) {
$error_update[] = __('SAP/R3 Plugin Licence');
}
$inventory_changes_blacklist = get_parameter('inventory_changes_blacklist', []);
- if (!config_update_value('inventory_changes_blacklist', implode(',', $inventory_changes_blacklist))) {
+ if (config_update_value('inventory_changes_blacklist', implode(',', $inventory_changes_blacklist), true) === false) {
$error_update[] = __('Inventory changes blacklist');
}
}
break;
case 'pass':
- if (isset($config['enterprise_installed']) && $config['enterprise_installed'] == 1) {
- if (!config_update_value('enable_pass_policy', get_parameter('enable_pass_policy'))) {
+ if (isset($config['enterprise_installed']) === true && (bool) $config['enterprise_installed'] === 1) {
+ if (config_update_value('enable_pass_policy', get_parameter('enable_pass_policy'), true) === false) {
$error_update[] = __('Enable password policy');
}
- if (!config_update_value('pass_size', get_parameter('pass_size'))) {
+ if (config_update_value('pass_size', get_parameter('pass_size'), true) === false) {
$error_update[] = __('Min. size password');
}
- if (!config_update_value('pass_expire', get_parameter('pass_expire'))) {
+ if (config_update_value('pass_expire', get_parameter('pass_expire'), true) === false) {
$error_update[] = __('Password expiration');
}
- if (!config_update_value('first_login', get_parameter('first_login'))) {
+ if (config_update_value('first_login', get_parameter('first_login'), true) === false) {
$error_update[] = __('Force change password on first login');
}
- if (!config_update_value('mins_fail_pass', get_parameter('mins_fail_pass'))) {
+ if (config_update_value('mins_fail_pass', get_parameter('mins_fail_pass'), true) === false) {
$error_update[] = __('User blocked if login fails');
}
- if (!config_update_value('number_attempts', get_parameter('number_attempts'))) {
+ if (config_update_value('number_attempts', get_parameter('number_attempts'), true) === false) {
$error_update[] = __('Number of failed login attempts');
}
- if (!config_update_value('pass_needs_numbers', get_parameter('pass_needs_numbers'))) {
+ if (config_update_value('pass_needs_numbers', get_parameter('pass_needs_numbers'), true) === false) {
$error_update[] = __('Password must have numbers');
}
- if (!config_update_value('pass_needs_symbols', get_parameter('pass_needs_symbols'))) {
+ if (config_update_value('pass_needs_symbols', get_parameter('pass_needs_symbols'), true) === false) {
$error_update[] = __('Password must have symbols');
}
- if (!config_update_value('enable_pass_policy_admin', get_parameter('enable_pass_policy_admin'))) {
+ if (config_update_value('enable_pass_policy_admin', get_parameter('enable_pass_policy_admin'), true) === false) {
$error_update[] = __('Apply password policy to admin users');
}
- if (!config_update_value('enable_pass_history', get_parameter('enable_pass_history'))) {
+ if (config_update_value('enable_pass_history', get_parameter('enable_pass_history'), true) === false) {
$error_update[] = __('Enable password history');
}
- if (!config_update_value('compare_pass', get_parameter('compare_pass'))) {
+ if (config_update_value('compare_pass', get_parameter('compare_pass'), true) === false) {
$error_update[] = __('Compare previous password');
}
- if (!config_update_value('reset_pass_option', (bool) get_parameter('reset_pass_option'))) {
+ if (config_update_value('reset_pass_option', (bool) get_parameter('reset_pass_option'), true) === false) {
$error_update[] = __('Activate reset password');
}
}
@@ -532,738 +540,736 @@ function config_update_config()
case 'auth':
// AUTHENTICATION SETUP.
- if (!config_update_value('auth', get_parameter('auth'))) {
+ if (config_update_value('auth', get_parameter('auth'), true) === false) {
$error_update[] = __('Authentication method');
}
- if (!config_update_value('autocreate_remote_users', get_parameter('autocreate_remote_users'))) {
+ if (config_update_value('autocreate_remote_users', get_parameter('autocreate_remote_users'), true) === false) {
$error_update[] = __('Autocreate remote users');
}
- if (!config_update_value('default_remote_profile', get_parameter('default_remote_profile'))) {
+ if (config_update_value('default_remote_profile', get_parameter('default_remote_profile'), true) === false) {
$error_update[] = __('Autocreate profile');
}
- if (!config_update_value('default_remote_group', get_parameter('default_remote_group'))) {
+ if (config_update_value('default_remote_group', get_parameter('default_remote_group'), true) === false) {
$error_update[] = __('Autocreate profile group');
}
- if (!config_update_value('default_assign_tags', implode(',', get_parameter('default_assign_tags')))) {
+ if (config_update_value('default_assign_tags', implode(',', get_parameter('default_assign_tags')), true) === false) {
$error_update[] = __('Autocreate profile tags');
}
- if (!config_update_value('default_no_hierarchy', (int) get_parameter('default_no_hierarchy'))) {
+ if (config_update_value('default_no_hierarchy', (int) get_parameter('default_no_hierarchy'), true) === false) {
$error_update[] = __('Automatically assigned no hierarchy');
}
- if (!config_update_value('autocreate_blacklist', get_parameter('autocreate_blacklist'))) {
+ if (config_update_value('autocreate_blacklist', get_parameter('autocreate_blacklist'), true) === false) {
$error_update[] = __('Autocreate blacklist');
}
- if (!config_update_value('ad_server', get_parameter('ad_server'))) {
+ if (config_update_value('ad_server', get_parameter('ad_server'), true) === false) {
$error_update[] = __('Active directory server');
}
- if (!config_update_value('ad_port', get_parameter('ad_port'))) {
+ if (config_update_value('ad_port', get_parameter('ad_port'), true) === false) {
$error_update[] = __('Active directory port');
}
- if (!config_update_value('ad_start_tls', get_parameter('ad_start_tls'))) {
+ if (config_update_value('ad_start_tls', get_parameter('ad_start_tls'), true) === false) {
$error_update[] = __('Start TLS');
}
- if (!config_update_value('ad_advanced_config', get_parameter('ad_advanced_config'))) {
+ if (config_update_value('ad_advanced_config', get_parameter('ad_advanced_config'), true) === false) {
$error_update[] = __('Advanced Config AD');
}
- if (!config_update_value('ldap_advanced_config', get_parameter('ldap_advanced_config'))) {
+ if (config_update_value('ldap_advanced_config', get_parameter('ldap_advanced_config'), true) === false) {
$error_update[] = __('Advanced Config LDAP');
}
- if (!config_update_value('ad_domain', get_parameter('ad_domain'))) {
+ if (config_update_value('ad_domain', get_parameter('ad_domain'), true) === false) {
$error_update[] = __('Domain');
}
- if (!config_update_value('ad_adv_perms', get_parameter('ad_adv_perms'))) {
+ if (config_update_value('ad_adv_perms', get_parameter('ad_adv_perms'), true) === false) {
$error_update[] = __('Advanced Permisions AD');
}
- if (!config_update_value('ldap_adv_perms', get_parameter('ldap_adv_perms'))) {
+ if (config_update_value('ldap_adv_perms', get_parameter('ldap_adv_perms'), true) === false) {
$error_update[] = __('Advanced Permissions LDAP');
}
- if (!config_update_value('ldap_server', get_parameter('ldap_server'))) {
+ if (config_update_value('ldap_server', get_parameter('ldap_server'), true) === false) {
$error_update[] = __('LDAP server');
}
- if (!config_update_value('ldap_port', get_parameter('ldap_port'))) {
+ if (config_update_value('ldap_port', get_parameter('ldap_port'), true) === false) {
$error_update[] = __('LDAP port');
}
- if (!config_update_value('ldap_version', get_parameter('ldap_version'))) {
+ if (config_update_value('ldap_version', get_parameter('ldap_version'), true) === false) {
$error_update[] = __('LDAP version');
}
- if (!config_update_value('ldap_start_tls', get_parameter('ldap_start_tls'))) {
+ if (config_update_value('ldap_start_tls', get_parameter('ldap_start_tls'), true) === false) {
$error_update[] = __('Start TLS');
}
- if (!config_update_value('ldap_base_dn', get_parameter('ldap_base_dn'))) {
+ if (config_update_value('ldap_base_dn', get_parameter('ldap_base_dn'), true) === false) {
$error_update[] = __('Base DN');
}
- if (!config_update_value('ldap_login_attr', get_parameter('ldap_login_attr'))) {
+ if (config_update_value('ldap_login_attr', get_parameter('ldap_login_attr'), true) === false) {
$error_update[] = __('Login attribute');
}
- if (!config_update_value('ldap_admin_login', get_parameter('ldap_admin_login'))) {
+ if (config_update_value('ldap_admin_login', get_parameter('ldap_admin_login'), true) === false) {
$error_update[] = __('Admin LDAP login');
}
- if (!config_update_value('ldap_admin_pass', io_input_password(io_safe_output(get_parameter('ldap_admin_pass'))))) {
+ if (config_update_value('ldap_admin_pass', io_input_password(io_safe_output(get_parameter('ldap_admin_pass'))), true) === false) {
$error_update[] = __('Admin LDAP password');
}
- if (!config_update_value('fallback_local_auth', get_parameter('fallback_local_auth'))) {
+ if (config_update_value('fallback_local_auth', get_parameter('fallback_local_auth'), true) === false) {
$error_update[] = __('Fallback to local authentication');
}
- if (!config_update_value('ldap_login_user_attr', get_parameter('ldap_login_user_attr'))) {
+ if (config_update_value('ldap_login_user_attr', get_parameter('ldap_login_user_attr'), true) === false) {
$error_update[] = __('Login user attribute');
}
- if (!config_update_value('ldap_function', get_parameter('ldap_function'))) {
+ if (config_update_value('ldap_function', get_parameter('ldap_function'), true) === false) {
$error_update[] = __('LDAP function');
}
- if (isset($config['fallback_local_auth']) && $config['fallback_local_auth'] == 0) {
- if (!config_update_value('ldap_save_password', get_parameter('ldap_save_password'))) {
+ if (isset($config['fallback_local_auth']) === true && (int) $config['fallback_local_auth'] === 0) {
+ if (config_update_value('ldap_save_password', get_parameter('ldap_save_password'), true) === false) {
$error_update[] = __('Save Password');
}
- } else if (isset($config['fallback_local_auth']) && $config['fallback_local_auth'] == 1) {
+ } else if (isset($config['fallback_local_auth']) === false && (int) $config['fallback_local_auth'] === 1) {
config_update_value('ldap_save_password', 1);
}
- if (!config_update_value('ldap_save_profile', get_parameter('ldap_save_profile'))) {
+ if (config_update_value('ldap_save_profile', get_parameter('ldap_save_profile'), true) === false) {
$error_update[] = __('Save profile');
}
- if (!config_update_value('rpandora_server', get_parameter('rpandora_server'))) {
+ if (config_update_value('rpandora_server', get_parameter('rpandora_server'), true) === false) {
$error_update[] = __('MySQL host');
}
- if (!config_update_value('rpandora_port', get_parameter('rpandora_port'))) {
+ if (config_update_value('rpandora_port', get_parameter('rpandora_port'), true) === false) {
$error_update[] = __('MySQL port');
}
- if (!config_update_value('rpandora_dbname', get_parameter('rpandora_dbname'))) {
+ if (config_update_value('rpandora_dbname', get_parameter('rpandora_dbname'), true) === false) {
$error_update[] = __('Database name');
}
- if (!config_update_value('rpandora_user', get_parameter('rpandora_user'))) {
+ if (config_update_value('rpandora_user', get_parameter('rpandora_user'), true) === false) {
$error_update[] = __('User');
}
- if (!config_update_value('rpandora_pass', io_input_password(get_parameter('rpandora_pass')))) {
+ if (config_update_value('rpandora_pass', io_input_password(get_parameter('rpandora_pass')), true) === false) {
$error_update[] = __('Password');
}
- if (!config_update_value('rintegria_server', get_parameter('rintegria_server'))) {
+ if (config_update_value('rintegria_server', get_parameter('rintegria_server'), true) === false) {
$error_update[] = __('Integria host');
}
- if (!config_update_value('rintegria_port', get_parameter('rintegria_port'))) {
+ if (config_update_value('rintegria_port', get_parameter('rintegria_port'), true) === false) {
$error_update[] = __('MySQL port');
}
- if (!config_update_value('rintegria_dbname', get_parameter('rintegria_dbname'))) {
+ if (config_update_value('rintegria_dbname', get_parameter('rintegria_dbname'), true) === false) {
$error_update[] = __('Database name');
}
- if (!config_update_value('rintegria_user', get_parameter('rintegria_user'))) {
+ if (config_update_value('rintegria_user', get_parameter('rintegria_user'), true) === false) {
$error_update[] = __('User');
}
- if (!config_update_value('rintegria_pass', io_input_password(get_parameter('rintegria_pass')))) {
+ if (config_update_value('rintegria_pass', io_input_password(get_parameter('rintegria_pass')), true) === false) {
$error_update[] = __('Password');
}
- if (!config_update_value('saml_path', get_parameter('saml_path'))) {
+ if (config_update_value('saml_path', get_parameter('saml_path'), true) === false) {
$error_update[] = __('Saml path');
}
- if (!config_update_value('saml_source', get_parameter('saml_source'))) {
+ if (config_update_value('saml_source', get_parameter('saml_source'), true) === false) {
$error_update[] = __('Saml source');
}
- if (!config_update_value('saml_user_id', get_parameter('saml_user_id'))) {
+ if (config_update_value('saml_user_id', get_parameter('saml_user_id'), true) === false) {
$error_update[] = __('Saml user id parameter');
}
- if (!config_update_value('saml_mail', get_parameter('saml_mail'))) {
+ if (config_update_value('saml_mail', get_parameter('saml_mail'), true) === false) {
$error_update[] = __('Saml mail parameter');
}
- if (!config_update_value('saml_group_name', get_parameter('saml_group_name'))) {
+ if (config_update_value('saml_group_name', get_parameter('saml_group_name'), true) === false) {
$error_update[] = __('Saml group name parameter');
}
- if (!config_update_value('saml_attr_type', (bool) get_parameter('saml_attr_type'))) {
+ if (config_update_value('saml_attr_type', (bool) get_parameter('saml_attr_type'), true) === false) {
$error_update[] = __('Saml attr type parameter');
}
- if (!config_update_value('saml_profiles_and_tags', get_parameter('saml_profiles_and_tags'))) {
+ if (config_update_value('saml_profiles_and_tags', get_parameter('saml_profiles_and_tags'), true) === false) {
$error_update[] = __('Saml profiles and tags parameter');
}
- if (!config_update_value('saml_profile', get_parameter('saml_profile'))) {
+ if (config_update_value('saml_profile', get_parameter('saml_profile'), true) === false) {
$error_update[] = __('Saml profile parameters');
}
- if (!config_update_value('saml_tag', get_parameter('saml_tag'))) {
+ if (config_update_value('saml_tag', get_parameter('saml_tag'), true) === false) {
$error_update[] = __('Saml tag parameter');
}
- if (!config_update_value('saml_profile_tag_separator', get_parameter('saml_profile_tag_separator'))) {
+ if (config_update_value('saml_profile_tag_separator', get_parameter('saml_profile_tag_separator'), true) === false) {
$error_update[] = __('Saml profile and tag separator');
}
- if (!config_update_value('double_auth_enabled', get_parameter('double_auth_enabled'))) {
+ if (config_update_value('double_auth_enabled', get_parameter('double_auth_enabled'), true) === false) {
$error_update[] = __('Double authentication');
}
- if (!config_update_value('2FA_all_users', get_parameter('2FA_all_users'))) {
+ if (config_update_value('2FA_all_users', get_parameter('2FA_all_users'), true) === false) {
$error_update[] = __('2FA all users');
}
- if (!config_update_value('session_timeout', get_parameter('session_timeout'))) {
+ if (config_update_value('session_timeout', get_parameter('session_timeout'), true) === false) {
$error_update[] = __('Session timeout');
} else {
if ((int) get_parameter('session_timeout') === 0) {
$error_update[] = __('Session timeout forced to 90 minutes');
- if (!config_update_value('session_timeout', 90)) {
+ if (config_update_value('session_timeout', 90, true) === false) {
$error_update[] = __('Session timeout');
}
}
}
- if (isset($config['fallback_local_auth']) && $config['fallback_local_auth'] == 0) {
- if (!config_update_value('ad_save_password', get_parameter('ad_save_password'))) {
+ if (isset($config['fallback_local_auth']) === true && (int) $config['fallback_local_auth'] === 0) {
+ if (config_update_value('ad_save_password', get_parameter('ad_save_password'), true) === false) {
$error_update[] = __('Save Password');
}
- } else if (isset($config['fallback_local_auth']) && $config['fallback_local_auth'] == 1) {
+ } else if (isset($config['fallback_local_auth']) === true && (int) $config['fallback_local_auth'] === 1) {
config_update_value('ad_save_password', 1);
}
break;
case 'perf':
// PERFORMANCE SETUP.
- if (!config_update_value('event_purge', get_parameter('event_purge'))) {
+ if (config_update_value('event_purge', get_parameter('event_purge'), true) === false) {
$check_metaconsole_events_history = get_parameter('metaconsole_events_history', -1);
$error_update[] = $check_metaconsole_events_history;
}
if ($check_metaconsole_events_history != -1) {
- if (!config_update_value('metaconsole_events_history', get_parameter('metaconsole_events_history'))) {
+ if (config_update_value('metaconsole_events_history', get_parameter('metaconsole_events_history'), true) === false) {
$error_update[] = __('Max. days before delete events');
}
}
- if (!config_update_value('trap_purge', get_parameter('trap_purge'))) {
+ if (config_update_value('trap_purge', get_parameter('trap_purge'), true) === false) {
$error_update[] = __('Max. days before delete traps');
}
- if (!config_update_value('string_purge', get_parameter('string_purge'))) {
+ if (config_update_value('string_purge', get_parameter('string_purge'), true) === false) {
$error_update[] = __('Max. days before delete string data');
}
- if (!config_update_value('audit_purge', get_parameter('audit_purge'))) {
+ if (config_update_value('audit_purge', get_parameter('audit_purge'), true) === false) {
$error_update[] = __('Max. days before delete audit events');
}
- if (!config_update_value('gis_purge', get_parameter('gis_purge'))) {
+ if (config_update_value('gis_purge', get_parameter('gis_purge'), true) === false) {
$error_update[] = __('Max. days before delete GIS data');
}
- if (!config_update_value('days_purge', (int) get_parameter('days_purge'))) {
+ if (config_update_value('days_purge', (int) get_parameter('days_purge'), true) === false) {
$error_update[] = __('Max. days before purge');
}
- if (!config_update_value('days_delete_unknown', (int) get_parameter('days_delete_unknown'))) {
+ if (config_update_value('days_delete_unknown', (int) get_parameter('days_delete_unknown'), true) === false) {
$error_update[] = __('Max. days before delete unknown modules');
}
- if (!config_update_value('days_compact', (int) get_parameter('days_compact'))) {
+ if (config_update_value('days_compact', (int) get_parameter('days_compact'), true) === false) {
$error_update[] = __('Max. days before compact data');
}
- if (!config_update_value('days_autodisable_deletion', (int) get_parameter('days_autodisable_deletion'))) {
+ if (config_update_value('days_autodisable_deletion', (int) get_parameter('days_autodisable_deletion'), true) === false) {
$error_update[] = __('Max. days before autodisable deletion');
}
- if (!config_update_value('report_limit', (int) get_parameter('report_limit'))) {
+ if (config_update_value('report_limit', (int) get_parameter('report_limit'), true) === false) {
$error_update[] = __('Item limit for realtime reports)');
}
- if (!config_update_value('step_compact', (int) get_parameter('step_compact'))) {
+ if (config_update_value('step_compact', (int) get_parameter('step_compact'), true) === false) {
$error_update[] = __('Compact interpolation in hours (1 Fine-20 bad)');
}
- if (!config_update_value('event_view_hr', (int) get_parameter('event_view_hr'))) {
+ if (config_update_value('event_view_hr', (int) get_parameter('event_view_hr'), true) === false) {
$error_update[] = __('Default hours for event view');
}
- if (!config_update_value('realtimestats', get_parameter('realtimestats'))) {
+ if (config_update_value('realtimestats', get_parameter('realtimestats'), true) === false) {
$error_update[] = __('Use realtime statistics');
}
- if (!config_update_value('stats_interval', get_parameter('stats_interval'))) {
+ if (config_update_value('stats_interval', get_parameter('stats_interval'), true) === false) {
$error_update[] = __('Batch statistics period (secs)');
}
- if (!config_update_value('agentaccess', (int) get_parameter('agentaccess'))) {
+ if (config_update_value('agentaccess', (int) get_parameter('agentaccess'), true) === false) {
$error_update[] = __('Use agent access graph');
}
- if (!config_update_value('num_files_attachment', (int) get_parameter('num_files_attachment'))) {
+ if (config_update_value('num_files_attachment', (int) get_parameter('num_files_attachment'), true) === false) {
$error_update[] = __('Max. recommended number of files in attachment directory');
}
- if (!config_update_value('delete_notinit', get_parameter('delete_notinit'))) {
+ if (config_update_value('delete_notinit', get_parameter('delete_notinit'), true) === false) {
$error_update[] = __('Delete not init modules');
}
- if (!config_update_value('big_operation_step_datos_purge', get_parameter('big_operation_step_datos_purge'))) {
+ if (config_update_value('big_operation_step_datos_purge', get_parameter('big_operation_step_datos_purge'), true) === false) {
$error_update[] = __('Big Operatiopn Step to purge old data');
}
- if (!config_update_value('small_operation_step_datos_purge', get_parameter('small_operation_step_datos_purge'))) {
+ if (config_update_value('small_operation_step_datos_purge', get_parameter('small_operation_step_datos_purge'), true) === false) {
$error_update[] = __('Small Operation Step to purge old data');
}
- if (!config_update_value('num_past_special_days', get_parameter('num_past_special_days'))) {
+ if (config_update_value('num_past_special_days', get_parameter('num_past_special_days'), true) === false) {
$error_update[] = __('Retention period of past special days');
}
- if (!config_update_value('max_macro_fields', get_parameter('max_macro_fields'))) {
+ if (config_update_value('max_macro_fields', get_parameter('max_macro_fields'), true) === false) {
$error_update[] = __('Max. macro data fields');
}
- if (isset($config['enterprise_installed']) && $config['enterprise_installed'] == 1) {
- if (!config_update_value('inventory_purge', get_parameter('inventory_purge'))) {
+ if (isset($config['enterprise_installed']) === true && (bool) $config['enterprise_installed'] === true) {
+ if (config_update_value('inventory_purge', get_parameter('inventory_purge'), true) === false) {
$error_update[] = __('Max. days before delete inventory data');
}
}
- if (!config_update_value('delete_old_messages', get_parameter('delete_old_messages'))) {
+ if (config_update_value('delete_old_messages', get_parameter('delete_old_messages'), true) === false) {
$error_update[] = __('Max. days before delete old messages');
}
- if (!config_update_value('delete_old_network_matrix', get_parameter('delete_old_network_matrix'))) {
+ if (config_update_value('delete_old_network_matrix', get_parameter('delete_old_network_matrix'), true) === false) {
$error_update[] = __('Max. days before delete old network matrix data');
}
- if (!config_update_value('max_graph_container', get_parameter('max_graph_container'))) {
+ if (config_update_value('max_graph_container', get_parameter('max_graph_container'), true) === false) {
$error_update[] = __('Graph container - Max. Items');
}
- if (!config_update_value('max_execution_event_response', get_parameter('max_execution_event_response'))) {
+ if (config_update_value('max_execution_event_response', get_parameter('max_execution_event_response'), true) === false) {
$error_update[] = __('Max execution event response');
}
- if (!config_update_value('row_limit_csv', get_parameter('row_limit_csv'))) {
+ if (config_update_value('row_limit_csv', get_parameter('row_limit_csv'), true) === false) {
$error_update[] = __('Row limit in csv log');
}
- if (!config_update_value('snmpwalk', get_parameter('snmpwalk'))) {
+ if (config_update_value('snmpwalk', get_parameter('snmpwalk'), true) === false) {
$error_update[] = __('SNMP walk binary path');
}
- if (!config_update_value('snmpwalk_fallback', get_parameter('snmpwalk_fallback'))) {
+ if (config_update_value('snmpwalk_fallback', get_parameter('snmpwalk_fallback'), true) === false) {
$error_update[] = __('SNMP walk binary path (fallback for v1)');
}
break;
case 'vis':
// VISUAL STYLES SETUP.
- if (!config_update_value('date_format', (string) get_parameter('date_format'))) {
+ if (config_update_value('date_format', (string) get_parameter('date_format'), true) === false) {
$error_update[] = __('Date format string');
}
- if (!config_update_value('prominent_time', (string) get_parameter('prominent_time'))) {
+ if (config_update_value('prominent_time', (string) get_parameter('prominent_time'), true) === false) {
$error_update[] = __('Timestamp or time comparation');
}
- if (!config_update_value('graph_color1', (string) get_parameter('graph_color1'))) {
+ if (config_update_value('graph_color1', (string) get_parameter('graph_color1'), true) === false) {
$error_update[] = __('Graph color #1');
}
- if (!config_update_value('graph_color2', (string) get_parameter('graph_color2'))) {
+ if (config_update_value('graph_color2', (string) get_parameter('graph_color2'), true) === false) {
$error_update[] = __('Graph color #2');
}
- if (!config_update_value('graph_color3', (string) get_parameter('graph_color3'))) {
+ if (config_update_value('graph_color3', (string) get_parameter('graph_color3'), true) === false) {
$error_update[] = __('Graph color #3');
}
- if (!config_update_value('graph_color4', (string) get_parameter('graph_color4'))) {
+ if (config_update_value('graph_color4', (string) get_parameter('graph_color4'), true) === false) {
$error_update[] = __('Graph color #4');
}
- if (!config_update_value('graph_color5', (string) get_parameter('graph_color5'))) {
+ if (config_update_value('graph_color5', (string) get_parameter('graph_color5'), true) === false) {
$error_update[] = __('Graph color #5');
}
- if (!config_update_value('graph_color6', (string) get_parameter('graph_color6'))) {
+ if (config_update_value('graph_color6', (string) get_parameter('graph_color6'), true) === false) {
$error_update[] = __('Graph color #6');
}
- if (!config_update_value('graph_color7', (string) get_parameter('graph_color7'))) {
+ if (config_update_value('graph_color7', (string) get_parameter('graph_color7'), true) === false) {
$error_update[] = __('Graph color #7');
}
- if (!config_update_value('graph_color8', (string) get_parameter('graph_color8'))) {
+ if (config_update_value('graph_color8', (string) get_parameter('graph_color8'), true) === false) {
$error_update[] = __('Graph color #8');
}
- if (!config_update_value('graph_color9', (string) get_parameter('graph_color9'))) {
+ if (config_update_value('graph_color9', (string) get_parameter('graph_color9'), true) === false) {
$error_update[] = __('Graph color #9');
}
- if (!config_update_value('graph_color10', (string) get_parameter('graph_color10'))) {
+ if (config_update_value('graph_color10', (string) get_parameter('graph_color10'), true) === false) {
$error_update[] = __('Graph color #10');
}
- if (!config_update_value('interface_unit', (string) get_parameter('interface_unit', __('Bytes')))) {
+ if (config_update_value('interface_unit', (string) get_parameter('interface_unit', __('Bytes')), true) === false) {
$error_update[] = __('Value to interface graphics');
}
- if (!config_update_value('graph_precision', (string) get_parameter('graph_precision', 1))) {
+ if (config_update_value('graph_precision', (string) get_parameter('graph_precision', 1), true) === false) {
$error_update[] = __('Data precision for reports');
}
$style = (string) get_parameter('style');
- if ($style != $config['style']) {
+ if ($style !== (string) $config['style']) {
$style = substr($style, 0, (strlen($style) - 4));
}
- if (!config_update_value('style', $style)) {
+ if (config_update_value('style', $style, true) === false) {
$error_update[] = __('Style template');
}
- if (!config_update_value('block_size', (int) get_parameter('block_size'))) {
+ if (config_update_value('block_size', (int) get_parameter('block_size'), true) === false) {
$error_update[] = __('Block size for pagination');
}
- if (!config_update_value('round_corner', (bool) get_parameter('round_corner'))) {
+ if (config_update_value('round_corner', (bool) get_parameter('round_corner'), true) === false) {
$error_update[] = __('Use round corners');
}
- if (!config_update_value('maximum_y_axis', (bool) get_parameter('maximum_y_axis'))) {
+ if (config_update_value('maximum_y_axis', (bool) get_parameter('maximum_y_axis'), true) === false) {
$error_update[] = __('Chart fit to content');
}
- if (!config_update_value('show_qr_code_header', (bool) get_parameter('show_qr_code_header'))) {
+ if (config_update_value('show_qr_code_header', (bool) get_parameter('show_qr_code_header'), true) === false) {
$error_update[] = __('Show QR code header');
}
- if (!config_update_value('status_images_set', (string) get_parameter('status_images_set'))) {
+ if (config_update_value('status_images_set', (string) get_parameter('status_images_set'), true) === false) {
$error_update[] = __('Status icon set');
}
- if (!config_update_value('fontpath', (string) get_parameter('fontpath'))) {
+ if (config_update_value('fontpath', (string) get_parameter('fontpath'), true) === false) {
$error_update[] = __('Font path');
}
- if (!config_update_value('font_size', get_parameter('font_size'))) {
+ if (config_update_value('font_size', get_parameter('font_size'), true) === false) {
$error_update[] = __('Font size');
}
- if (!config_update_value('custom_favicon', (string) get_parameter('custom_favicon'))) {
+ if (config_update_value('custom_favicon', (string) get_parameter('custom_favicon'), true) === false) {
$error_update[] = __('Custom favicon');
}
- if (!config_update_value('custom_logo', (string) get_parameter('custom_logo'))) {
+ if (config_update_value('custom_logo', (string) get_parameter('custom_logo'), true) === false) {
$error_update[] = __('Custom logo');
}
- if (!config_update_value('custom_logo_collapsed', (string) get_parameter('custom_logo_collapsed'))) {
+ if (config_update_value('custom_logo_collapsed', (string) get_parameter('custom_logo_collapsed'), true) === false) {
$error_update[] = __('Custom logo collapsed');
}
- if (!config_update_value('custom_logo_white_bg', (string) get_parameter('custom_logo_white_bg'))) {
+ if (config_update_value('custom_logo_white_bg', (string) get_parameter('custom_logo_white_bg'), true) === false) {
$error_update[] = __('Custom logo white background');
}
- if (!config_update_value('custom_logo_login', (string) get_parameter('custom_logo_login'))) {
+ if (config_update_value('custom_logo_login', (string) get_parameter('custom_logo_login'), true) === false) {
$error_update[] = __('Custom logo login');
}
- if (!config_update_value('custom_splash_login', (string) get_parameter('custom_splash_login'))) {
+ if (config_update_value('custom_splash_login', (string) get_parameter('custom_splash_login'), true) === false) {
$error_update[] = __('Custom splash login');
}
- if (!config_update_value('custom_docs_logo', (string) get_parameter('custom_docs_logo'))) {
+ if (config_update_value('custom_docs_logo', (string) get_parameter('custom_docs_logo'), true) === false) {
$error_update[] = __('Custom documentation logo');
}
- if (!config_update_value('custom_support_logo', (string) get_parameter('custom_support_logo'))) {
+ if (config_update_value('custom_support_logo', (string) get_parameter('custom_support_logo'), true) === false) {
$error_update[] = __('Custom support logo');
}
- if (!config_update_value('custom_network_center_logo', (string) get_parameter('custom_network_center_logo'))) {
+ if (config_update_value('custom_network_center_logo', (string) get_parameter('custom_network_center_logo'), true) === false) {
$error_update[] = __('Custom networkmap center logo');
}
- if (!config_update_value('custom_mobile_console_logo', (string) get_parameter('custom_mobile_console_logo'))) {
+ if (config_update_value('custom_mobile_console_logo', (string) get_parameter('custom_mobile_console_logo'), true) === false) {
$error_update[] = __('Custom networkmap center logo');
}
- if (!config_update_value('custom_title_header', (string) get_parameter('custom_title_header'))) {
+ if (config_update_value('custom_title_header', (string) get_parameter('custom_title_header'), true) === false) {
$error_update[] = __('Custom title header');
}
- if (!config_update_value('custom_subtitle_header', (string) get_parameter('custom_subtitle_header'))) {
+ if (config_update_value('custom_subtitle_header', (string) get_parameter('custom_subtitle_header'), true) === false) {
$error_update[] = __('Custom subtitle header');
}
- if (!config_update_value('meta_custom_title_header', (string) get_parameter('meta_custom_title_header'))) {
+ if (config_update_value('meta_custom_title_header', (string) get_parameter('meta_custom_title_header'), true) === false) {
$error_update[] = __('Meta custom title header');
}
- if (!config_update_value('meta_custom_subtitle_header', (string) get_parameter('meta_custom_subtitle_header'))) {
+ if (config_update_value('meta_custom_subtitle_header', (string) get_parameter('meta_custom_subtitle_header'), true) === false) {
$error_update[] = __('Meta custom subtitle header');
}
- if (!config_update_value('custom_title1_login', (string) get_parameter('custom_title1_login'))) {
+ if (config_update_value('custom_title1_login', (string) get_parameter('custom_title1_login'), true) === false) {
$error_update[] = __('Custom title1 login');
}
- if (!config_update_value('custom_title2_login', (string) get_parameter('custom_title2_login'))) {
+ if (config_update_value('custom_title2_login', (string) get_parameter('custom_title2_login'), true) === false) {
$error_update[] = __('Custom title2 login');
}
- if (!config_update_value('login_background', (string) get_parameter('login_background'))) {
+ if (config_update_value('login_background', (string) get_parameter('login_background'), true) === false) {
$error_update[] = __('Login background');
}
- if (!config_update_value('custom_docs_url', (string) get_parameter('custom_docs_url'))) {
+ if (config_update_value('custom_docs_url', (string) get_parameter('custom_docs_url'), true) === false) {
$error_update[] = __('Custom Docs url');
}
- if (!config_update_value('custom_support_url', (string) get_parameter('custom_support_url'))) {
+ if (config_update_value('custom_support_url', (string) get_parameter('custom_support_url'), true) === false) {
$error_update[] = __('Custom support url');
}
- if (!config_update_value('rb_product_name', (string) get_parameter('rb_product_name'))) {
+ if (config_update_value('rb_product_name', (string) get_parameter('rb_product_name'), true) === false) {
$error_update[] = __('Product name');
}
- if (!config_update_value('rb_copyright_notice', (string) get_parameter('rb_copyright_notice'))) {
+ if (config_update_value('rb_copyright_notice', (string) get_parameter('rb_copyright_notice'), true) === false) {
$error_update[] = __('Copyright notice');
}
- if (!config_update_value('meta_custom_logo_white_bg', (string) get_parameter('meta_custom_logo_white_bg'))) {
+ if (config_update_value('meta_custom_logo_white_bg', (string) get_parameter('meta_custom_logo_white_bg'), true) === false) {
$error_update[] = __('Custom logo metaconsole (white background)');
}
- if (!config_update_value('meta_custom_logo_login', (string) get_parameter('meta_custom_logo_login'))) {
+ if (config_update_value('meta_custom_logo_login', (string) get_parameter('meta_custom_logo_login'), true) === false) {
$error_update[] = __('Custom logo login metaconsole');
}
- if (!config_update_value('meta_custom_splash_login', (string) get_parameter('meta_custom_splash_login'))) {
+ if (config_update_value('meta_custom_splash_login', (string) get_parameter('meta_custom_splash_login'), true) === false) {
$error_update[] = __('Custom splash login metaconsole');
}
- if (!config_update_value('meta_custom_title1_login', (string) get_parameter('meta_custom_title1_login'))) {
+ if (config_update_value('meta_custom_title1_login', (string) get_parameter('meta_custom_title1_login'), true) === false) {
$error_update[] = __('Custom title1 login metaconsole');
}
- if (!config_update_value('meta_custom_title2_login', (string) get_parameter('meta_custom_title2_login'))) {
+ if (config_update_value('meta_custom_title2_login', (string) get_parameter('meta_custom_title2_login'), true) === false) {
$error_update[] = __('Custom title2 login metaconsole');
}
- if (!config_update_value('meta_login_background', (string) get_parameter('meta_login_background'))) {
+ if (config_update_value('meta_login_background', (string) get_parameter('meta_login_background'), true) === false) {
$error_update[] = __('Login background metaconsole');
}
- if (!config_update_value('meta_custom_docs_url', (string) get_parameter('meta_custom_docs_url'))) {
+ if (config_update_value('meta_custom_docs_url', (string) get_parameter('meta_custom_docs_url'), true) === false) {
$error_update[] = __('Custom Docs url');
}
- if (!config_update_value('meta_custom_support_url', (string) get_parameter('meta_custom_support_url'))) {
+ if (config_update_value('meta_custom_support_url', (string) get_parameter('meta_custom_support_url'), true) === false) {
$error_update[] = __('Custom support url');
}
- if (!config_update_value('legacy_vc', (int) get_parameter('legacy_vc'))) {
+ if (config_update_value('legacy_vc', (int) get_parameter('legacy_vc'), true) === false) {
$error_update[] = __('Use the legacy Visual Console');
}
- if (!config_update_value('vc_default_cache_expiration', (int) get_parameter('vc_default_cache_expiration'))) {
+ if (config_update_value('vc_default_cache_expiration', (int) get_parameter('vc_default_cache_expiration'), true) === false) {
$error_update[] = __("Default expiration of the Visual Console item's cache");
}
- if (!config_update_value('vc_refr', (int) get_parameter('vc_refr'))) {
+ if (config_update_value('vc_refr', (int) get_parameter('vc_refr'), true) === false) {
$error_update[] = __('Default interval for refresh on Visual Console');
}
- if (!config_update_value('vc_favourite_view', (int) get_parameter('vc_favourite_view', 0))) {
+ if (config_update_value('vc_favourite_view', (int) get_parameter('vc_favourite_view', 0), true) === false) {
$error_update[] = __('Default line favourite_view for the Visual Console');
}
- if (!config_update_value('vc_menu_items', (int) get_parameter('vc_menu_items', 10))) {
+ if (config_update_value('vc_menu_items', (int) get_parameter('vc_menu_items', 10), true) === false) {
$error_update[] = __('Default line menu items for the Visual Console');
}
- if (!config_update_value('vc_line_thickness', (int) get_parameter('vc_line_thickness'))) {
+ if (config_update_value('vc_line_thickness', (int) get_parameter('vc_line_thickness'), true) === false) {
$error_update[] = __('Default line thickness for the Visual Console');
}
- if (!config_update_value('ser_menu_items', (int) get_parameter('ser_menu_items', 10))) {
+ if (config_update_value('ser_menu_items', (int) get_parameter('ser_menu_items', 10), true) === false) {
$error_update[] = __('Default line menu items for the Services');
}
- if (!config_update_value('agent_size_text_small', get_parameter('agent_size_text_small'))) {
+ if (config_update_value('agent_size_text_small', get_parameter('agent_size_text_small'), true) === false) {
$error_update[] = __('Agent size text');
}
- if (!config_update_value('agent_size_text_medium', get_parameter('agent_size_text_medium'))) {
+ if (config_update_value('agent_size_text_medium', get_parameter('agent_size_text_medium'), true) === false) {
$error_update[] = __('Agent size text');
}
- if (!config_update_value('module_size_text_small', get_parameter('module_size_text_small'))) {
+ if (config_update_value('module_size_text_small', get_parameter('module_size_text_small'), true) === false) {
$error_update[] = __('Module size text');
}
- if (!config_update_value('module_size_text_medium', get_parameter('module_size_text_medium'))) {
+ if (config_update_value('module_size_text_medium', get_parameter('module_size_text_medium'), true) === false) {
$error_update[] = __('Description size text');
}
- if (!config_update_value('description_size_text', get_parameter('description_size_text'))) {
+ if (config_update_value('description_size_text', get_parameter('description_size_text'), true) === false) {
$error_update[] = __('Description size text');
}
- if (!config_update_value('item_title_size_text', get_parameter('item_title_size_text'))) {
+ if (config_update_value('item_title_size_text', get_parameter('item_title_size_text'), true) === false) {
$error_update[] = __('Item title size text');
}
- if (!config_update_value('gis_label', get_parameter('gis_label'))) {
+ if (config_update_value('gis_label', get_parameter('gis_label'), true) === false) {
$error_update[] = __('GIS Labels');
}
- if (!config_update_value('simple_module_value', get_parameter('simple_module_value'))) {
+ if (config_update_value('simple_module_value', get_parameter('simple_module_value'), true) === false) {
$error_update[] = __('Show units in values report');
}
- if (!config_update_value('gis_default_icon', get_parameter('gis_default_icon'))) {
+ if (config_update_value('gis_default_icon', get_parameter('gis_default_icon'), true) === false) {
$error_update[] = __('Default icon in GIS');
}
- if (!config_update_value('autohidden_menu', get_parameter('autohidden_menu'))) {
+ if (config_update_value('autohidden_menu', get_parameter('autohidden_menu'), true) === false) {
$error_update[] = __('Autohidden menu');
}
- if (!config_update_value('visual_animation', get_parameter('visual_animation'))) {
+ if (config_update_value('visual_animation', get_parameter('visual_animation'), true) === false) {
$error_update[] = __('visual_animation');
}
- if (!config_update_value('disable_help', get_parameter('disable_help'))) {
+ if (config_update_value('disable_help', get_parameter('disable_help'), true) === false) {
$error_update[] = __('Disable help');
}
- if (!config_update_value('fixed_graph', get_parameter('fixed_graph'))) {
+ if (config_update_value('fixed_graph', get_parameter('fixed_graph'), true) === false) {
$error_update[] = __('Fixed graph');
}
- if (!config_update_value('fixed_header', get_parameter('fixed_header'))) {
+ if (config_update_value('fixed_header', get_parameter('fixed_header'), true) === false) {
$error_update[] = __('Fixed header');
}
- if (!config_update_value('paginate_module', get_parameter('paginate_module'))) {
+ if (config_update_value('paginate_module', get_parameter('paginate_module'), true) === false) {
$error_update[] = __('Paginate module');
}
- if (!config_update_value('graphviz_bin_dir', get_parameter('graphviz_bin_dir'))) {
+ if (config_update_value('graphviz_bin_dir', get_parameter('graphviz_bin_dir'), true) === false) {
$error_update[] = __('Custom graphviz directory');
}
- if (!config_update_value('networkmap_max_width', get_parameter('networkmap_max_width'))) {
+ if (config_update_value('networkmap_max_width', get_parameter('networkmap_max_width'), true) === false) {
$error_update[] = __('Networkmap max width');
}
- if (!config_update_value('short_module_graph_data', get_parameter('short_module_graph_data'))) {
+ if (config_update_value('short_module_graph_data', get_parameter('short_module_graph_data'), true) === false) {
$error_update[] = __('Shortened module graph data');
}
- if (!config_update_value('show_group_name', get_parameter('show_group_name'))) {
+ if (config_update_value('show_group_name', get_parameter('show_group_name'), true) === false) {
$error_update[] = __('Show the group name instead the group icon.');
}
- if (!config_update_value('custom_graph_width', (int) get_parameter('custom_graph_width', 1))) {
+ if (config_update_value('custom_graph_width', (int) get_parameter('custom_graph_width', 1), true) === false) {
$error_update[] = __('Default line thickness for the Custom Graph.');
}
- if (!config_update_value('type_module_charts', (string) get_parameter('type_module_charts', 'area'))) {
+ if (config_update_value('type_module_charts', (string) get_parameter('type_module_charts', 'area'), true) === false) {
$error_update[] = __('Default type of module charts.');
}
- if (!config_update_value('items_combined_charts', (string) get_parameter('items_combined_charts', 10))) {
+ if (config_update_value('items_combined_charts', (string) get_parameter('items_combined_charts', 10), true) === false) {
$error_update[] = __('Default Number of elements in Custom Graph.');
}
- if (!config_update_value('type_interface_charts', (string) get_parameter('type_interface_charts', 'line'))) {
+ if (config_update_value('type_interface_charts', (string) get_parameter('type_interface_charts', 'line'), true) === false) {
$error_update[] = __('Default type of interface charts.');
}
- if (!config_update_value('render_proc', (bool) get_parameter('render_proc', false))) {
+ if (config_update_value('render_proc', (bool) get_parameter('render_proc', false), true) === false) {
$error_update[] = __('Display data of proc modules in other format');
}
- if (!config_update_value('render_proc_ok', (string) get_parameter('render_proc_ok', __('Ok')))) {
+ if (config_update_value('render_proc_ok', (string) get_parameter('render_proc_ok', __('Ok')), true) === false) {
$error_update[] = __('Display text proc modules have state is ok');
}
- if (!config_update_value('render_proc_fail', (string) get_parameter('render_proc_fail', __('Fail')))) {
+ if (config_update_value('render_proc_fail', (string) get_parameter('render_proc_fail', __('Fail')), true) === false) {
$error_update[] = __('Display text when proc modules have state critical');
}
- // Daniel maya 02/06/2016 Display menu with click --INI.
- if (!config_update_value('click_display', (bool) get_parameter('click_display', false))) {
+ if (config_update_value('click_display', (bool) get_parameter('click_display', false), true) === false) {
$error_update[] = __('Display lateral menus with left click');
}
- // Daniel maya 02/06/2016 Display menu with click --END.
- if (isset($config['enterprise_installed']) && $config['enterprise_installed'] == 1) {
- if (!config_update_value('service_label_font_size', get_parameter('service_label_font_size', false))) {
+ if (isset($config['enterprise_installed']) === true && (bool) $config['enterprise_installed'] === true) {
+ if (config_update_value('service_label_font_size', get_parameter('service_label_font_size', false), true) === false) {
$error_update[] = __('Service label font size');
}
- if (!config_update_value('service_item_padding_size', get_parameter('service_item_padding_size', false))) {
+ if (config_update_value('service_item_padding_size', get_parameter('service_item_padding_size', false), true) === false) {
$error_update[] = __('Service item padding size');
}
}
- if (!config_update_value('percentil', (int) get_parameter('percentil', 0))) {
+ if (config_update_value('percentil', (int) get_parameter('percentil', 0), true) === false) {
$error_update[] = __('Default percentil');
}
- if (!config_update_value('full_scale_option', (int) get_parameter('full_scale_option', 0))) {
+ if (config_update_value('full_scale_option', (int) get_parameter('full_scale_option', 0), true) === false) {
$error_update[] = __('Default full scale (TIP)');
}
- if (!config_update_value('type_mode_graph', (int) get_parameter('type_mode_graph', 0))) {
+ if (config_update_value('type_mode_graph', (int) get_parameter('type_mode_graph', 0), true) === false) {
$error_update[] = __('Default soft graphs');
}
- if (!config_update_value('zoom_graph', (int) get_parameter('zoom_graph', 1))) {
+ if (config_update_value('zoom_graph', (int) get_parameter('zoom_graph', 1), true) === false) {
$error_update[] = __('Default zoom graphs');
}
- if (!config_update_value(
+ if (config_update_value(
'graph_image_height',
(int) get_parameter('graph_image_height', 130)
- )
+ ) === false
) {
$error_update[] = __(
'Default height of the chart image'
@@ -1280,22 +1286,22 @@ function config_update_config()
$custom_value = str_replace(',', '.', $custom_value);
- if ($custom_value_add) {
+ if ($custom_value_add === true) {
include_once 'include/functions_post_process.php';
- if (!post_process_add_custom_value(
+ if (post_process_add_custom_value(
$custom_text,
(string) $custom_value
- )
+ ) === false
) {
- $error_update[] = __('Add the custom post process');
+ $error_update[] = __('Add the custom post process');
}
}
if ($custom_value_to_delete > 0) {
include_once 'include/functions_post_process.php';
- if (!post_process_delete_custom_value($custom_value_to_delete)) {
+ if (post_process_delete_custom_value($custom_value_to_delete) === false) {
$error_update[] = __('Delete the custom post process');
}
}
@@ -1317,7 +1323,7 @@ function config_update_config()
$interval_values = $new_interval;
} else {
$interval_values_array = explode(',', $interval_values);
- if (!in_array($new_interval, $interval_values_array)) {
+ if (in_array($new_interval, $interval_values_array) === false) {
$interval_values_array[] = $new_interval;
$interval_values = implode(',', $interval_values_array);
}
@@ -1337,7 +1343,7 @@ function config_update_config()
$interval_values = implode(',', $interval_values_array);
}
- if (!config_update_value('interval_values', $interval_values)) {
+ if (config_update_value('interval_values', $interval_values, true) === false) {
$error_update[] = __('Delete interval');
}
@@ -1348,132 +1354,127 @@ function config_update_config()
$custom_unit = io_safe_input(strip_tags(io_safe_output(get_parameter('custom_module_unit'))));
$custom_unit_to_delete = io_safe_input(strip_tags(io_safe_output(get_parameter('custom_module_unit_to_delete', ''))));
- if (!empty($custom_unit)) {
- if (!add_custom_module_unit(
- $custom_unit
- )
- ) {
+ if (empty($custom_unit) === false) {
+ if (add_custom_module_unit($custom_unit) === false) {
$error_update[] = __('Add custom module unit');
}
}
- if (!empty($custom_unit_to_delete)) {
- if (!delete_custom_module_unit($custom_unit_to_delete)) {
+ if (empty($custom_unit_to_delete) === false) {
+ if (delete_custom_module_unit($custom_unit_to_delete) === false) {
$error_update[] = __('Delete custom module unit');
}
}
- // --------------------------------------------------
- if (!config_update_value('custom_report_info', get_parameter('custom_report_info'))) {
+ if (config_update_value('custom_report_info', get_parameter('custom_report_info'), true) === false) {
$error_update[] = __('Custom report info');
}
- // Juanma (06/05/2014) New feature: Custom front page for reports.
- if (!config_update_value('font_size_item_report', get_parameter('font_size_item_report', 2))) {
+ if (config_update_value('font_size_item_report', get_parameter('font_size_item_report', 2), true) === false) {
$error_update[] = __('HTML font size for SLA (em)');
}
- if (!config_update_value('global_font_size_report', get_parameter('global_font_size_report', 10))) {
+ if (config_update_value('global_font_size_report', get_parameter('global_font_size_report', 10), true) === false) {
$error_update[] = __('PDF font size (px)');
}
- if (!config_update_value('custom_report_front', get_parameter('custom_report_front'))) {
+ if (config_update_value('custom_report_front', get_parameter('custom_report_front'), true) === false) {
$error_update[] = __('Custom report front');
}
- if (!config_update_value('custom_report_front_font', get_parameter('custom_report_front_font'))) {
+ if (config_update_value('custom_report_front_font', get_parameter('custom_report_front_font'), true) === false) {
$error_update[] = __('Custom report front').' - '.__('Font family');
}
- if (!config_update_value('custom_report_front_logo', get_parameter('custom_report_front_logo'))) {
+ if (config_update_value('custom_report_front_logo', get_parameter('custom_report_front_logo'), true) === false) {
$error_update[] = __('Custom report front').' - '.__('Custom logo');
}
- if (!config_update_value('custom_report_front_header', get_parameter('custom_report_front_header'))) {
+ if (config_update_value('custom_report_front_header', get_parameter('custom_report_front_header'), true) === false) {
$error_update[] = __('Custom report front').' - '.__('Header');
}
- if (!config_update_value('custom_report_front_firstpage', get_parameter('custom_report_front_firstpage'))) {
+ if (config_update_value('custom_report_front_firstpage', get_parameter('custom_report_front_firstpage'), true) === false) {
$error_update[] = __('Custom report front').' - '.__('First page');
}
- if (!config_update_value('custom_report_front_footer', get_parameter('custom_report_front_footer'))) {
+ if (config_update_value('custom_report_front_footer', get_parameter('custom_report_front_footer'), true) === false) {
$error_update[] = __('Custom report front').' - '.__('Footer');
}
- if (!config_update_value('csv_divider', (string) get_parameter('csv_divider', ';'))) {
+ if (config_update_value('csv_divider', (string) get_parameter('csv_divider', ';'), true) === false) {
$error_update[] = __('CSV divider');
}
- if (!config_update_value('csv_decimal_separator', (string) get_parameter('csv_decimal_separator', '.'))) {
+ if (config_update_value('csv_decimal_separator', (string) get_parameter('csv_decimal_separator', '.'), true) === false) {
$error_update[] = __('CSV decimal separator');
}
- if (!config_update_value('use_data_multiplier', get_parameter('use_data_multiplier', '1'))) {
+ if (config_update_value('use_data_multiplier', get_parameter('use_data_multiplier', '1'), true) === false) {
$error_update[] = __('Use data multiplier');
}
break;
case 'net':
- if (!config_update_value('netflow_path', get_parameter('netflow_path'))) {
+ if (config_update_value('netflow_path', get_parameter('netflow_path'), true) === false) {
$error_update[] = __('Data storage path');
}
- if (!config_update_value('netflow_interval', (int) get_parameter('netflow_interval'))) {
+ if (config_update_value('netflow_interval', (int) get_parameter('netflow_interval'), true) === false) {
$error_update[] = __('Daemon interval');
}
- if (!config_update_value('netflow_daemon', get_parameter('netflow_daemon'))) {
+ if (config_update_value('netflow_daemon', get_parameter('netflow_daemon'), true) === false) {
$error_update[] = __('Daemon binary path');
}
- if (!config_update_value('netflow_nfdump', get_parameter('netflow_nfdump'))) {
+ if (config_update_value('netflow_nfdump', get_parameter('netflow_nfdump'), true) === false) {
$error_update[] = __('Nfdump binary path');
}
- if (!config_update_value('netflow_nfexpire', get_parameter('netflow_nfexpire'))) {
+ if (config_update_value('netflow_nfexpire', get_parameter('netflow_nfexpire'), true) === false) {
$error_update[] = __('Nfexpire binary path');
}
- if (!config_update_value('netflow_max_resolution', (int) get_parameter('netflow_max_resolution'))) {
+ if (config_update_value('netflow_max_resolution', (int) get_parameter('netflow_max_resolution'), true) === false) {
$error_update[] = __('Maximum chart resolution');
}
- if (!config_update_value('netflow_disable_custom_lvfilters', get_parameter('netflow_disable_custom_lvfilters'))) {
+ if (config_update_value('netflow_disable_custom_lvfilters', get_parameter('netflow_disable_custom_lvfilters'), true) === false) {
$error_update[] = __('Disable custom live view filters');
}
- if (!config_update_value('netflow_max_lifetime', (int) get_parameter('netflow_max_lifetime'))) {
+ if (config_update_value('netflow_max_lifetime', (int) get_parameter('netflow_max_lifetime'), true) === false) {
$error_update[] = __('Netflow max lifetime');
}
- if (!config_update_value('netflow_get_ip_hostname', (int) get_parameter('netflow_get_ip_hostname'))) {
+ if (config_update_value('netflow_get_ip_hostname', (int) get_parameter('netflow_get_ip_hostname'), true) === false) {
$error_update[] = __('Name resolution for IP address');
}
break;
case 'log':
- if (!config_update_value('elasticsearch_ip', get_parameter('elasticsearch_ip'))) {
+ if (config_update_value('elasticsearch_ip', get_parameter('elasticsearch_ip'), true) === false) {
$error_update[] = __('IP ElasticSearch server');
}
- if (!config_update_value('elasticsearch_port', get_parameter('elasticsearch_port'))) {
+ if (config_update_value('elasticsearch_port', get_parameter('elasticsearch_port'), true) === false) {
$error_update[] = __('Port ElasticSearch server');
}
- if (!config_update_value('number_logs_viewed', (int) get_parameter('number_logs_viewed'))) {
+ if (config_update_value('number_logs_viewed', (int) get_parameter('number_logs_viewed'), true) === false) {
$error_update[] = __('Number of logs viewed');
}
- if (!config_update_value('Days_purge_old_information', (int) get_parameter('Days_purge_old_information'))) {
+ if (config_update_value('Days_purge_old_information', (int) get_parameter('Days_purge_old_information'), true) === false) {
$error_update[] = __('Days to purge old information');
}
break;
case 'hist_db':
- if ($config['dbname'] == get_parameter('history_db_name')
- && $config['dbport'] == get_parameter('history_db_port')
- && $config['dbhost'] == io_input_password(get_parameter('history_db_host'))
+ if ($config['dbname'] === get_parameter('history_db_name')
+ && $config['dbport'] === get_parameter('history_db_port')
+ && $config['dbhost'] === io_input_password(get_parameter('history_db_host'))
) {
// Same definition for active and historical database!
// This is a critical error.
@@ -1483,47 +1484,47 @@ function config_update_config()
);
return;
} else {
- if (!config_update_value('history_db_host', get_parameter('history_db_host'))) {
+ if (config_update_value('history_db_host', get_parameter('history_db_host'), true) === false) {
$error_update[] = __('Host');
}
- if (!config_update_value('history_db_port', get_parameter('history_db_port'))) {
+ if (config_update_value('history_db_port', get_parameter('history_db_port'), true) === false) {
$error_update[] = __('Port');
}
- if (!config_update_value('history_db_name', get_parameter('history_db_name'))) {
+ if (config_update_value('history_db_name', get_parameter('history_db_name'), true) === false) {
$error_update[] = __('Database name');
}
}
- if (!config_update_value('history_db_enabled', get_parameter('history_db_enabled'))) {
+ if (config_update_value('history_db_enabled', get_parameter('history_db_enabled'), true) === false) {
$error_update[] = __('Enable history database');
}
- if (!config_update_value('history_event_enabled', get_parameter('history_event_enabled'))) {
+ if (config_update_value('history_event_enabled', get_parameter('history_event_enabled'), true) === false) {
$error_update[] = __('Enable history event');
}
- if (!config_update_value('history_db_user', get_parameter('history_db_user'))) {
+ if (config_update_value('history_db_user', get_parameter('history_db_user'), true) === false) {
$error_update[] = __('Database user');
}
- if (!config_update_value('history_db_pass', io_input_password(get_parameter('history_db_pass')))) {
+ if (config_update_value('history_db_pass', io_input_password(get_parameter('history_db_pass')), true) === false) {
$error_update[] = __('Database password');
}
$history_db_days = get_parameter('history_db_days');
- if (!is_numeric($history_db_days)
+ if (is_numeric($history_db_days) === false
|| $history_db_days <= 0
- || !config_update_value('history_db_days', $history_db_days)
+ || config_update_value('history_db_days', $history_db_days) === false
) {
$error_update[] = __('Days');
}
$history_event_days = get_parameter('history_event_days');
- if (!is_numeric($history_event_days)
+ if (is_numeric($history_event_days) === false
|| $history_event_days <= 0
- || !config_update_value('history_event_days', $history_event_days)
+ || config_update_value('history_event_days', $history_event_days) === false
) {
$error_update[] = __('Event Days');
}
@@ -1608,53 +1609,53 @@ function config_update_config()
break;
case 'ehorus':
- if (!config_update_value('ehorus_enabled', (int) get_parameter('ehorus_enabled', 0))) {
+ if (config_update_value('ehorus_enabled', (int) get_parameter('ehorus_enabled', 0), true) === false) {
$error_update[] = __('Enable eHorus');
}
- if (!config_update_value('ehorus_user_level_conf', (int) get_parameter('ehorus_user_level_conf', 0))) {
+ if (config_update_value('ehorus_user_level_conf', (int) get_parameter('ehorus_user_level_conf', 0), true) === false) {
$error_update[] = __('eHorus user login');
}
- if (!config_update_value('ehorus_user', (string) get_parameter('ehorus_user', $config['ehorus_user']))) {
+ if (config_update_value('ehorus_user', (string) get_parameter('ehorus_user', $config['ehorus_user']), true) === false) {
$error_update[] = __('eHorus user');
}
- if (!config_update_value('ehorus_pass', io_input_password((string) get_parameter('ehorus_pass', $config['ehorus_pass'])))) {
+ if (config_update_value('ehorus_pass', io_input_password((string) get_parameter('ehorus_pass', $config['ehorus_pass'])), true) === false) {
$error_update[] = __('eHorus password');
}
- if (!config_update_value('ehorus_hostname', (string) get_parameter('ehorus_hostname', $config['ehorus_hostname']))) {
+ if (config_update_value('ehorus_hostname', (string) get_parameter('ehorus_hostname', $config['ehorus_hostname']), true) === false) {
$error_update[] = __('eHorus API hostname');
}
- if (!config_update_value('ehorus_port', (int) get_parameter('ehorus_port', $config['ehorus_port']))) {
+ if (config_update_value('ehorus_port', (int) get_parameter('ehorus_port', $config['ehorus_port']), true) === false) {
$error_update[] = __('eHorus API port');
}
- if (!config_update_value('ehorus_req_timeout', (int) get_parameter('ehorus_req_timeout', $config['ehorus_req_timeout']))) {
+ if (config_update_value('ehorus_req_timeout', (int) get_parameter('ehorus_req_timeout', $config['ehorus_req_timeout']), true) === false) {
$error_update[] = __('eHorus request timeout');
}
- if (!config_update_value('ehorus_custom_field', (string) get_parameter('ehorus_custom_field', $config['ehorus_custom_field']))) {
+ if (config_update_value('ehorus_custom_field', (string) get_parameter('ehorus_custom_field', $config['ehorus_custom_field']), true) === false) {
$error_update[] = __('eHorus id custom field');
}
break;
case 'integria':
- if (!config_update_value('integria_user_level_conf', (int) get_parameter('integria_user_level_conf', 0))) {
+ if (config_update_value('integria_user_level_conf', (int) get_parameter('integria_user_level_conf', 0), true) === false) {
$error_update[] = __('Integria user login');
}
- if (!config_update_value('integria_enabled', (int) get_parameter('integria_enabled', 0))) {
+ if (config_update_value('integria_enabled', (int) get_parameter('integria_enabled', 0), true) === false) {
$error_update[] = __('Enable Integria IMS');
}
- if (!config_update_value('integria_user', (string) get_parameter('integria_user', $config['integria_user']))) {
+ if (config_update_value('integria_user', (string) get_parameter('integria_user', $config['integria_user']), true) === false) {
$error_update[] = __('Integria user');
}
- if (!config_update_value('integria_pass', io_input_password((string) get_parameter('integria_pass', $config['integria_pass'])))) {
+ if (config_update_value('integria_pass', io_input_password((string) get_parameter('integria_pass', $config['integria_pass'])), true) === false) {
$error_update[] = __('Integria password');
}
@@ -1668,101 +1669,99 @@ function config_update_config()
}
}
- if (!config_update_value('integria_hostname', $integria_hostname)) {
+ if (config_update_value('integria_hostname', $integria_hostname, true) === false) {
$error_update[] = __('integria API hostname');
}
- if (!config_update_value('integria_api_pass', io_input_password((string) get_parameter('integria_api_pass', $config['integria_api_pass'])))) {
+ if (config_update_value('integria_api_pass', io_input_password((string) get_parameter('integria_api_pass', $config['integria_api_pass'])), true) === false) {
$error_update[] = __('Integria API password');
}
- if (!config_update_value('integria_req_timeout', (int) get_parameter('integria_req_timeout', $config['integria_req_timeout']))) {
+ if (config_update_value('integria_req_timeout', (int) get_parameter('integria_req_timeout', $config['integria_req_timeout']), true) === false) {
$error_update[] = __('Integria request timeout');
}
- if (!config_update_value('default_group', (int) get_parameter('default_group', $config['default_group']))) {
+ if (config_update_value('default_group', (int) get_parameter('default_group', $config['default_group']), true) === false) {
$error_update[] = __('Integria default group');
}
- if (!config_update_value('cr_default_group', (int) get_parameter('cr_default_group', $config['cr_default_group']))) {
+ if (config_update_value('cr_default_group', (int) get_parameter('cr_default_group', $config['cr_default_group']), true) === false) {
$error_update[] = __('Integria custom response default group');
}
- if (!config_update_value('default_criticity', (int) get_parameter('default_criticity', $config['default_criticity']))) {
+ if (config_update_value('default_criticity', (int) get_parameter('default_criticity', $config['default_criticity']), true) === false) {
$error_update[] = __('Integria default priority');
}
- if (!config_update_value('cr_default_criticity', (int) get_parameter('cr_default_criticity', $config['cr_default_criticity']))) {
+ if (config_update_value('cr_default_criticity', (int) get_parameter('cr_default_criticity', $config['cr_default_criticity']), true) === false) {
$error_update[] = __('Integria custom response default priority');
}
- if (!config_update_value('default_creator', (string) get_parameter('default_creator', $config['default_creator']))) {
+ if (config_update_value('default_creator', (string) get_parameter('default_creator', $config['default_creator']), true) === false) {
$error_update[] = __('Integria default creator');
}
- if (!config_update_value('default_owner', (string) get_parameter('default_owner', $config['default_owner']))) {
+ if (config_update_value('default_owner', (string) get_parameter('default_owner', $config['default_owner']), true) === false) {
$error_update[] = __('Integria default owner');
}
- if (!config_update_value('cr_default_owner', (string) get_parameter('cr_default_owner', $config['cr_default_owner']))) {
+ if (config_update_value('cr_default_owner', (string) get_parameter('cr_default_owner', $config['cr_default_owner']), true) === false) {
$error_update[] = __('Integria custom response default owner');
}
- if (!config_update_value('incident_type', (int) get_parameter('incident_type', $config['incident_type']))) {
+ if (config_update_value('incident_type', (int) get_parameter('incident_type', $config['incident_type']), true) === false) {
$error_update[] = __('Integria default ticket type');
}
- if (!config_update_value('cr_incident_type', (int) get_parameter('cr_incident_type', $config['cr_incident_type']))) {
+ if (config_update_value('cr_incident_type', (int) get_parameter('cr_incident_type', $config['cr_incident_type']), true) === false) {
$error_update[] = __('Integria custom response default ticket type');
}
- if (!config_update_value('incident_status', (int) get_parameter('incident_status', $config['incident_status']))) {
+ if (config_update_value('incident_status', (int) get_parameter('incident_status', $config['incident_status']), true) === false) {
$error_update[] = __('Integria default ticket status');
}
- if (!config_update_value('cr_incident_status', (int) get_parameter('cr_incident_status', $config['cr_incident_status']))) {
+ if (config_update_value('cr_incident_status', (int) get_parameter('cr_incident_status', $config['cr_incident_status']), true) === false) {
$error_update[] = __('Integria custom response default ticket status');
}
- if (!config_update_value('incident_title', (string) get_parameter('incident_title', $config['incident_title']))) {
+ if (config_update_value('incident_title', (string) get_parameter('incident_title', $config['incident_title']), true) === false) {
$error_update[] = __('Integria default ticket title');
}
- if (!config_update_value('cr_incident_title', (string) get_parameter('cr_incident_title', $config['cr_incident_title']))) {
+ if (config_update_value('cr_incident_title', (string) get_parameter('cr_incident_title', $config['cr_incident_title']), true) === false) {
$error_update[] = __('Integria custom response default ticket title');
}
- if (!config_update_value('incident_content', (string) get_parameter('incident_content', $config['incident_content']))) {
+ if (config_update_value('incident_content', (string) get_parameter('incident_content', $config['incident_content']), true) === false) {
$error_update[] = __('Integria default ticket content');
}
- if (!config_update_value('cr_incident_content', (string) get_parameter('cr_incident_content', $config['cr_incident_content']))) {
+ if (config_update_value('cr_incident_content', (string) get_parameter('cr_incident_content', $config['cr_incident_content']), true) === false) {
$error_update[] = __('Integria custom response default ticket content');
}
break;
case 'module_library':
- $module_library_user = get_parameter('module_library_user');
- if (!config_update_value('module_library_user', $module_library_user)) {
- $error_update[] = __('User');
+ if (config_update_value('module_library_user', get_parameter('module_library_user'), true) === false) {
+ $error_update[] = __('Module Library User');
}
- $module_library_password = get_parameter('module_library_password');
- if (!config_update_value('module_library_password', $module_library_password)) {
- $error_update[] = __('Password');
+ if (config_update_value('module_library_password', get_parameter('module_library_password'), true) === false) {
+ $error_update[] = __('Module Library Password');
}
break;
case 'websocket_engine':
- if (!config_update_value('ws_bind_address', get_parameter('ws_bind_address'))) {
+ if (config_update_value('ws_bind_address', get_parameter('ws_bind_address'), true) === false) {
$error_update[] = __('WebSocket bind address');
}
- if (!config_update_value('ws_port', get_parameter('ws_port'))) {
+ if (config_update_value('ws_port', get_parameter('ws_port'), true) === false) {
$error_update[] = __('WebSocket port');
}
- if (!config_update_value('ws_proxy_url', get_parameter('ws_proxy_url'))) {
+ if (config_update_value('ws_proxy_url', get_parameter('ws_proxy_url'), true) === false) {
$error_update[] = __('WebSocket proxy url');
}
break;
@@ -1780,11 +1779,27 @@ function config_update_config()
if (count($error_update) > 0) {
$config['error_config_update_config'] = [];
$config['error_config_update_config']['correct'] = false;
- $values = implode(', ', $error_update);
- $config['error_config_update_config']['message'] = sprintf(__('Failed updated: the next values cannot update: %s'), $values);
+ $values = implode('
-', $error_update);
+ $config['error_config_update_config']['message'] = sprintf(
+ __('Failed updated: the next values cannot update:
-%s'),
+ $values
+ );
+
+ db_pandora_audit(
+ AUDIT_LOG_SETUP,
+ 'Failed changing Setup',
+ false,
+ false,
+ $config['error_config_update_config']['message']
+ );
} else {
$config['error_config_update_config'] = [];
$config['error_config_update_config']['correct'] = true;
+
+ db_pandora_audit(
+ AUDIT_LOG_SETUP,
+ 'Setup has changed'
+ );
}
if (count($errors) > 0) {
@@ -3314,14 +3329,14 @@ function get_um_url()
{
global $config;
- if (isset($config['url_update_manager'])) {
+ if (isset($config['url_update_manager']) === true) {
$url = $config['url_update_manager'];
$url = substr($url, 0, (strlen($url) - strpos(strrev($url), '/')));
} else {
$url = 'https://licensing.artica.es/pandoraupdate7/';
config_update_value(
'url_update_manager',
- 'https://licensing.artica.es/pandoraupdate7/server.php'
+ $url.'/server.php'
);
}
diff --git a/pandora_console/include/functions_db.php b/pandora_console/include/functions_db.php
index cbcc645fdb..6929325319 100644
--- a/pandora_console/include/functions_db.php
+++ b/pandora_console/include/functions_db.php
@@ -231,8 +231,8 @@ function db_pandora_audit($accion, $descripcion, $user_id=false, $ip=true, $info
{
global $config;
- // Ignore $ip and always set the ip address
- if (isset($config['remote_addr'])) {
+ // Ignore $ip and always set the ip address.
+ if (isset($config['remote_addr']) === true) {
$ip = $config['remote_addr'];
} else {
if ($_SERVER['REMOTE_ADDR']) {
@@ -245,46 +245,26 @@ function db_pandora_audit($accion, $descripcion, $user_id=false, $ip=true, $info
if ($user_id !== false) {
$id = $user_id;
} else {
- if (isset($config['id_user'])) {
- $id = $config['id_user'];
- } else {
- $id = 0;
- }
+ $id = (isset($config['id_user']) === true) ? $config['id_user'] : 0;
}
$accion = io_safe_input($accion);
$descripcion = io_safe_input($descripcion);
- switch ($config['dbtype']) {
- case 'mysql':
- case 'postgresql':
- $values = [
- 'id_usuario' => $id,
- 'accion' => $accion,
- 'ip_origen' => $ip,
- 'descripcion' => $descripcion,
- 'fecha' => date('Y-m-d H:i:s'),
- 'utimestamp' => time(),
- ];
- break;
-
- case 'oracle':
- $values = [
- 'id_usuario' => $id,
- 'accion' => $accion,
- 'ip_origen' => $ip,
- 'descripcion' => $descripcion,
- 'fecha' => '#to_date(\''.date('Y-m-d H:i:s').'\',\'YYYY-MM-DD HH24:MI:SS\')',
- 'utimestamp' => time(),
- ];
- break;
- }
+ $values = [
+ 'id_usuario' => $id,
+ 'accion' => $accion,
+ 'ip_origen' => $ip,
+ 'descripcion' => $descripcion,
+ 'fecha' => date('Y-m-d H:i:s'),
+ 'utimestamp' => time(),
+ ];
$id_audit = db_process_sql_insert('tsesion', $values);
$valor = ''.$values['fecha'].' - '.io_safe_output($id).' - '.io_safe_output($accion).' - '.$ip.' - '.io_safe_output($descripcion)."\n";
- if ($config['audit_log_enabled']) {
+ if ((bool) $config['audit_log_enabled'] === true) {
file_put_contents($config['homedir'].'/log/audit.log', $valor, FILE_APPEND);
}
@@ -298,12 +278,19 @@ function db_pandora_audit($accion, $descripcion, $user_id=false, $ip=true, $info
/**
* Log in a user into Pandora.
*
- * @param string $id_user User id
+ * @param string $id_user User id.
* @param string $ip Client user IP address.
+ *
+ * @return void
*/
function db_logon($id_user, $ip)
{
- db_pandora_audit('Logon', 'Logged in', $id_user, $ip);
+ db_pandora_audit(
+ AUDIT_LOG_USER_REGISTRATION,
+ 'Logged in',
+ $id_user,
+ $ip
+ );
// Update last registry of user to set last logon. How do we audit when the user was created then?
process_user_contact($id_user);
@@ -313,12 +300,19 @@ function db_logon($id_user, $ip)
/**
* Log out a user into Pandora.
*
- * @param string $id_user User id
+ * @param string $id_user User id.
* @param string $ip Client user IP address.
+ *
+ * @return void
*/
function db_logoff($id_user, $ip)
{
- db_pandora_audit('Logoff', 'Logged out', $id_user, $ip);
+ db_pandora_audit(
+ AUDIT_LOG_USER_REGISTRATION,
+ 'Logged out',
+ $id_user,
+ $ip
+ );
}
diff --git a/pandora_console/include/functions_events.php b/pandora_console/include/functions_events.php
index 9b097d4a93..2e752b9623 100644
--- a/pandora_console/include/functions_events.php
+++ b/pandora_console/include/functions_events.php
@@ -1903,7 +1903,10 @@ function events_delete_event(
if (check_acl($config['id_user'], $event_group, 'EM') == 0) {
// Check ACL.
- db_pandora_audit('ACL Violation', 'Attempted deleting event #'.$event);
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Attempted deleting event #'.$event
+ );
$errors++;
} else {
$ret = db_process_sql_delete($table_event, ['id_evento' => $event]);
@@ -1911,7 +1914,10 @@ function events_delete_event(
if (!$ret) {
$errors++;
} else {
- db_pandora_audit('Event deleted', 'Deleted event #'.$event);
+ db_pandora_audit(
+ AUDIT_LOG_ALERT_MANAGEMENT,
+ 'Deleted event #'.$event
+ );
// ACL didn't fail nor did return.
continue;
}
@@ -1995,7 +2001,10 @@ function events_change_status(
}
if (check_acl($config['id_user'], $event_group, 'EW') == 0) {
- db_pandora_audit('ACL Violation', 'Attempted updating event #'.$id);
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Attempted updating event #'.$id
+ );
unset($id_event[$k]);
}
@@ -2106,7 +2115,10 @@ function events_change_owner(
}
if (check_acl($config['id_user'], $event_group, 'EW') == 0) {
- db_pandora_audit('ACL Violation', 'Attempted updating event #'.$id);
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Attempted updating event #'.$id
+ );
unset($id_event[$k]);
}
}
@@ -2221,7 +2233,10 @@ function events_comment(
}
if (check_acl($config['id_user'], $event_group, 'EW') == 0) {
- db_pandora_audit('ACL Violation', 'Attempted updating event #'.$id);
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Attempted updating event #'.$id
+ );
unset($id_event[$k]);
}
diff --git a/pandora_console/include/functions_filemanager.php b/pandora_console/include/functions_filemanager.php
index 9f47cf7b29..b33b68aac7 100644
--- a/pandora_console/include/functions_filemanager.php
+++ b/pandora_console/include/functions_filemanager.php
@@ -142,7 +142,10 @@ function upload_file($upload_file_or_zip, $default_real_directory, $destination_
check_login();
if (! check_acl($config['id_user'], 0, 'AW')) {
- db_pandora_audit('ACL Violation', 'Trying to access File manager');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access File manager'
+ );
include 'general/noaccess.php';
return;
}
@@ -257,7 +260,10 @@ function create_text_file($default_real_directory, $destination_directory)
check_login();
if (! check_acl($config['id_user'], 0, 'AW')) {
- db_pandora_audit('ACL Violation', 'Trying to access File manager');
+ db_pandora_audit(
+ AUDIT_LOG_ACL_VIOLATION,
+ 'Trying to access File manager'
+ );
include 'general/noaccess.php';
return;
}
@@ -1019,7 +1025,10 @@ function filemanager_safe_directory(
}
if ($forbiddenAttempting === true) {
- db_pandora_audit('File manager', 'Attempting to use a forbidden file or directory name');
+ db_pandora_audit(
+ AUDIT_LOG_HACK_ATTEMPT,
+ 'Attempting to use a forbidden file or directory name'
+ );
}
return $directory;
diff --git a/pandora_console/include/functions_incidents.php b/pandora_console/include/functions_incidents.php
index 4e57ce3b74..78510d1b06 100644
--- a/pandora_console/include/functions_incidents.php
+++ b/pandora_console/include/functions_incidents.php
@@ -289,7 +289,10 @@ function incidents_delete_incident($id_incident)
$notes = array_merge($notes, array_keys(incidents_get_notes($id_inc)));
$attachments = array_merge($attachments, array_keys(incidents_get_attach($id_inc)));
- db_pandora_audit('Incident deleted', $config['id_user'].' deleted incident #'.$id_inc);
+ db_pandora_audit(
+ AUDIT_LOG_INCIDENT_MANAGEMENT,
+ $config['id_user'].' deleted incident #'.$id_inc
+ );
}
// Delete notes
diff --git a/pandora_console/include/functions_planned_downtimes.php b/pandora_console/include/functions_planned_downtimes.php
index 75b63083b7..f6fdf49c11 100644
--- a/pandora_console/include/functions_planned_downtimes.php
+++ b/pandora_console/include/functions_planned_downtimes.php
@@ -588,7 +588,7 @@ function planned_downtimes_stop($downtime)
1
);
db_pandora_audit(
- 'Planned Downtime management',
+ AUDIT_LOG_SYSTEM,
'Manual stop downtime '.$downtime['name'].' (ID '.$downtime['id'].')',
false,
true
diff --git a/pandora_console/include/functions_reporting.php b/pandora_console/include/functions_reporting.php
index ebea0146a1..9ccd8e1ff0 100755
--- a/pandora_console/include/functions_reporting.php
+++ b/pandora_console/include/functions_reporting.php
@@ -14540,7 +14540,10 @@ function reporting_email_template(
if (empty($destination) === false) {
send_email_attachment($destination, $body, $subject, $attachments);
} else {
- db_pandora_audit('ERROR:', 'Cron jobs mail, empty destination email.');
+ db_pandora_audit(
+ AUDIT_LOG_SYSTEM,
+ 'Cron jobs mail, empty destination email.'
+ );
}
}
}
diff --git a/pandora_console/include/functions_treeview.php b/pandora_console/include/functions_treeview.php
index 5f98ed9df8..f0bdbbc613 100755
--- a/pandora_console/include/functions_treeview.php
+++ b/pandora_console/include/functions_treeview.php
@@ -546,7 +546,7 @@ function treeview_printTable($id_agente, $server_data=[], $no_head=false)
&& ! check_acl_one_of_groups($config['id_user'], $groups, 'AW', false)
) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Agent General Information'
);
include_once 'general/noaccess.php';
diff --git a/pandora_console/include/lib/Dashboard/Manager.php b/pandora_console/include/lib/Dashboard/Manager.php
index e72f292537..33cd0a3c2c 100644
--- a/pandora_console/include/lib/Dashboard/Manager.php
+++ b/pandora_console/include/lib/Dashboard/Manager.php
@@ -205,7 +205,7 @@ class Manager implements PublicLogin
} else {
if (self::validatePublicHash($hash) === false) {
db_pandora_audit(
- 'Invalid public hash',
+ AUDIT_LOG_HACK_ATTEMPT,
'Trying to access public dashboard'
);
include 'general/noaccess.php';
@@ -572,12 +572,12 @@ class Manager implements PublicLogin
// Audit.
if ($result !== 0) {
\db_pandora_audit(
- 'Dashboard management',
+ AUDIT_LOG_DASHBOARD_MANAGEMENT,
'Delete dashboard #'.$this->dashboardId
);
} else {
\db_pandora_audit(
- 'Dashboard management',
+ AUDIT_LOG_DASHBOARD_MANAGEMENT,
'Fail try to delete dashboard #'.$this->dashboardId
);
}
diff --git a/pandora_console/include/lib/Dashboard/Widgets/maps_made_by_user.php b/pandora_console/include/lib/Dashboard/Widgets/maps_made_by_user.php
index 80f6183bde..b87b932eb0 100644
--- a/pandora_console/include/lib/Dashboard/Widgets/maps_made_by_user.php
+++ b/pandora_console/include/lib/Dashboard/Widgets/maps_made_by_user.php
@@ -370,7 +370,7 @@ class MapsMadeByUser extends Widget
);
} catch (Throwable $e) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access visual console without Id'
);
include 'general/noaccess.php';
diff --git a/pandora_console/include/lib/Dashboard/Widgets/system_group_status.php b/pandora_console/include/lib/Dashboard/Widgets/system_group_status.php
index e43ac4659c..57b4f90fb3 100644
--- a/pandora_console/include/lib/Dashboard/Widgets/system_group_status.php
+++ b/pandora_console/include/lib/Dashboard/Widgets/system_group_status.php
@@ -364,7 +364,7 @@ class SystemGroupStatusWidget extends Widget
if ($agent_a === 0 && $agent_w === 0) {
\db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access Agent view (Grouped)'
);
include 'general/noaccess.php';
diff --git a/pandora_console/include/lib/Websockets/WSManager.php b/pandora_console/include/lib/Websockets/WSManager.php
index a8d4226af7..e973674f8c 100644
--- a/pandora_console/include/lib/Websockets/WSManager.php
+++ b/pandora_console/include/lib/Websockets/WSManager.php
@@ -295,7 +295,7 @@ class WSManager extends WebSocketServer
if (\check_login(false) === false) {
$this->disconnect($user->socket);
\db_pandora_audit(
- 'WebSockets engine',
+ AUDIT_LOG_WEB_SOCKETS,
'Trying to access websockets engine without a valid session',
'N/A'
);
@@ -304,7 +304,7 @@ class WSManager extends WebSocketServer
// User exists, and session is valid.
\db_pandora_audit(
- 'WebSockets engine',
+ AUDIT_LOG_WEB_SOCKETS,
'WebSocket connection started',
$user->account->idUser
);
@@ -427,7 +427,7 @@ class WSManager extends WebSocketServer
if ($user->account) {
$_SERVER['REMOTE_ADDR'] = $user->address;
\db_pandora_audit(
- 'WebSockets engine',
+ AUDIT_LOG_WEB_SOCKETS,
'WebSocket connection finished',
$user->account->idUser
);
diff --git a/pandora_console/include/rest-api/index.php b/pandora_console/include/rest-api/index.php
index 5b9b5b13bc..9d3e4faea2 100644
--- a/pandora_console/include/rest-api/index.php
+++ b/pandora_console/include/rest-api/index.php
@@ -66,7 +66,7 @@ if ($visualConsoleId) {
if (!$aclRead && !$aclWrite && !$aclManage) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access visual console without group access'
);
http_response_code(403);
@@ -147,7 +147,7 @@ if ($getVisualConsole === true) {
if (!$aclRead && !$aclWrite && !$aclManage) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access visual console without group access'
);
http_response_code(403);
@@ -164,7 +164,7 @@ if ($getVisualConsole === true) {
if (!$aclRead && !$aclWrite && !$aclManage) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access visual console without group access'
);
http_response_code(403);
@@ -239,7 +239,7 @@ if ($getVisualConsole === true) {
// ACL.
if (!$aclWrite && !$aclManage) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to delete visual console item without group access'
);
http_response_code(403);
diff --git a/pandora_console/include/rest-api/models/VisualConsole/View.php b/pandora_console/include/rest-api/models/VisualConsole/View.php
index 2f7b758099..4830b4bfce 100644
--- a/pandora_console/include/rest-api/models/VisualConsole/View.php
+++ b/pandora_console/include/rest-api/models/VisualConsole/View.php
@@ -601,7 +601,7 @@ class View extends \HTML
if (!$aclRead && !$aclWrite && !$aclManage) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access visual console without group access'
);
http_response_code(403);
@@ -618,7 +618,7 @@ class View extends \HTML
if (!$aclRead && !$aclWrite && !$aclManage) {
db_pandora_audit(
- 'ACL Violation',
+ AUDIT_LOG_ACL_VIOLATION,
'Trying to access visual console without group access'
);
http_response_code(403);
diff --git a/pandora_console/index.php b/pandora_console/index.php
index 7828b2c700..76ffded47a 100755
--- a/pandora_console/index.php
+++ b/pandora_console/index.php
@@ -377,7 +377,7 @@ if (! isset($config['id_user'])) {
$login_failed = true;
include_once 'general/login_page.php';
db_pandora_audit(
- 'Logon Failed',
+ AUDIT_LOG_USER_REGISTRATION,
'Invalid double auth login: '.$_SERVER['REMOTE_ADDR'],
$_SERVER['REMOTE_ADDR']
);
@@ -446,7 +446,11 @@ if (! isset($config['id_user'])) {
if ($blocked) {
include_once 'general/login_page.php';
- db_pandora_audit('Password expired', 'Password expired: '.$nick, $nick);
+ db_pandora_audit(
+ AUDIT_LOG_USER_MANAGEMENT,
+ 'Password expired: '.$nick,
+ $nick
+ );
while (ob_get_length() > 0) {
ob_end_flush();
}
@@ -489,7 +493,7 @@ if (! isset($config['id_user'])) {
// Login ok and password has expired.
include_once 'general/login_page.php';
db_pandora_audit(
- 'Password expired',
+ AUDIT_LOG_USER_MANAGEMENT,
'Password expired: '.$nick,
$nick
);
@@ -628,7 +632,7 @@ if (! isset($config['id_user'])) {
$user_language = get_user_language($config['id_user']);
$l10n = null;
- if (file_exists('./include/languages/'.$user_language.'.mo')) {
+ if (file_exists('./include/languages/'.$user_language.'.mo') === true) {
$cacheFileReader = new CachedFileReader(
'./include/languages/'.$user_language.'.mo'
);
@@ -639,60 +643,50 @@ if (! isset($config['id_user'])) {
// Login wrong.
$blocked = false;
- if ((!is_user_admin($nick) || $config['enable_pass_policy_admin'])
- && file_exists(ENTERPRISE_DIR.'/load_enterprise.php')
+ if ((is_user_admin($nick) === false || (bool) $config['enable_pass_policy_admin'] === true)
+ && file_exists(ENTERPRISE_DIR.'/load_enterprise.php') === true
) {
$blocked = login_check_blocked($nick);
}
- if (!$blocked) {
- if (file_exists(ENTERPRISE_DIR.'/load_enterprise.php')) {
+ if ((bool) $blocked === false) {
+ if (file_exists(ENTERPRISE_DIR.'/load_enterprise.php') === true) {
// Checks failed attempts.
login_check_failed($nick);
}
$login_failed = true;
- include_once 'general/login_page.php';
- db_pandora_audit(
- 'Logon Failed',
- 'Invalid login: '.$nick,
- $nick
- );
- while (ob_get_length() > 0) {
- ob_end_flush();
- }
-
- exit('