| 1 | RORRP013 ;HCIOFO/SG - RPC: ACCESS & SECURITY ; 11/9/05 8:56am
 | 
|---|
| 2 |  ;;1.5;CLINICAL CASE REGISTRIES;;Feb 17, 2006
 | 
|---|
| 3 |  ;
 | 
|---|
| 4 |  Q
 | 
|---|
| 5 |  ;
 | 
|---|
| 6 |  ;***** RETURNS A LIST OF REGISTRIES ACCESSIBLE TO THE GUI USER
 | 
|---|
| 7 |  ; RPC: [ROR GUI ACCESS]
 | 
|---|
| 8 |  ;
 | 
|---|
| 9 |  ; .RESULTS      Reference to a local variable where the results
 | 
|---|
| 10 |  ;               are returned to.
 | 
|---|
| 11 |  ;
 | 
|---|
| 12 |  ; [USER]        User IEN in the NEW PERSON file. By default
 | 
|---|
| 13 |  ;               (if $G(USER)'>0), the DUZ is used).
 | 
|---|
| 14 |  ;
 | 
|---|
| 15 |  ; Return Values:
 | 
|---|
| 16 |  ;
 | 
|---|
| 17 |  ; A negative value of the first "^"-piece of the RESULTS(0) indicates
 | 
|---|
| 18 |  ; an error (see the RPCSTK^RORERR procedure for more details).
 | 
|---|
| 19 |  ; 
 | 
|---|
| 20 |  ; RESULTS(0)            Number of accessible registries
 | 
|---|
| 21 |  ;
 | 
|---|
| 22 |  ; RESULTS(i)            Registry descriptor
 | 
|---|
| 23 |  ;                         ^01: Registry IEN
 | 
|---|
| 24 |  ;                         ^02: Registry name
 | 
|---|
| 25 |  ;                         ^03: Administrator? (0 or 1)
 | 
|---|
| 26 |  ;                         ^04: Short description
 | 
|---|
| 27 |  ;
 | 
|---|
| 28 | ACREGLST(RESULTS,USER) ;
 | 
|---|
| 29 |  N ADMIN,CNT,IENS,KEY,RC,REGIEN,RORBUF,RORERRDL,RORMSG,TMP
 | 
|---|
| 30 |  K RESULTS  S RESULTS(0)=0
 | 
|---|
| 31 |  D CLEAR^RORERR("ACREGLST^RORRP013",1)
 | 
|---|
| 32 |  ;--- Check the version of the GUI
 | 
|---|
| 33 |  I $G(XWBAPVER)<1.5  D  D RPCSTK^RORERR(.RESULTS,RC)  Q
 | 
|---|
| 34 |  . N DIERR,DIHELP,DIMSG
 | 
|---|
| 35 |  . S TMP("CV")=$S($G(XWBAPVER)>0:XWBAPVER,1:"1.0")
 | 
|---|
| 36 |  . S TMP("RV")="1.5"
 | 
|---|
| 37 |  . D BLD^DIALOG(7980000.006,.TMP,,"RORBUF")
 | 
|---|
| 38 |  . S RC=$$ERROR^RORERR(-107,,.RORBUF)
 | 
|---|
| 39 |  . K RORBUF,TMP
 | 
|---|
| 40 |  ;--- User must be defined
 | 
|---|
| 41 |  I $G(USER)'>0  S USER=+$G(DUZ)  Q:USER'>0
 | 
|---|
| 42 |  ;
 | 
|---|
| 43 |  S (CNT,RC,REGIEN)=0
 | 
|---|
| 44 |  F  S REGIEN=$O(^ROR(798.1,"ACL",USER,REGIEN))  Q:REGIEN=""  D  Q:RC<0
 | 
|---|
| 45 |  . Q:REGIEN'>0  S IENS=REGIEN_","  K RORBUF
 | 
|---|
| 46 |  . D GETS^DIQ(798.1,IENS,".01;4",,"RORBUF","RORMSG")
 | 
|---|
| 47 |  . I $G(DIERR)  S RC=$$DBS^RORERR("RORMSG",-9,,,798.1,IENS)  Q
 | 
|---|
| 48 |  . ;--- Add the registry descriptor to the list
 | 
|---|
| 49 |  . S CNT=CNT+1,RESULTS(CNT)=REGIEN_"^"_$G(RORBUF(798.1,IENS,.01))
 | 
|---|
| 50 |  . S $P(RESULTS(CNT),"^",4)=$G(RORBUF(798.1,IENS,4))
 | 
|---|
| 51 |  . ;--- Check if the user has the administrator security key
 | 
|---|
| 52 |  . S KEY="",ADMIN=0
 | 
|---|
| 53 |  . F  S KEY=$O(^ROR(798.1,"ACL",USER,REGIEN,KEY))  Q:KEY=""  D  Q:RC<0
 | 
|---|
| 54 |  . . I KEY?1"ROR"1.E  S:KEY["ADMIN" ADMIN=1
 | 
|---|
| 55 |  . S $P(RESULTS(CNT),"^",3)=ADMIN
 | 
|---|
| 56 |  ;
 | 
|---|
| 57 |  I RC'<0  D:CNT'>0  S RESULTS(0)=CNT
 | 
|---|
| 58 |  . D ACVIOLTN^RORLOG(-91)  ; Record the access violation
 | 
|---|
| 59 |  E  D RPCSTK^RORERR(.RESULTS,RC)
 | 
|---|
| 60 |  Q
 | 
|---|
| 61 |  ;
 | 
|---|
| 62 |  ;***** RETURNS THE LIST OF ACCESS VIOLATIONS
 | 
|---|
| 63 |  ; RPC: [ROR LOG GET ACCESS VIOLATIONS]
 | 
|---|
| 64 |  ;
 | 
|---|
| 65 |  ; .RESULTS      Reference to a local variable where the results
 | 
|---|
| 66 |  ;               are returned to.
 | 
|---|
| 67 |  ;
 | 
|---|
| 68 |  ; [STDT]        Start date (by default, from the earliest violation)
 | 
|---|
| 69 |  ; [ENDT]        End date (by default, to the latest violation)
 | 
|---|
| 70 |  ;
 | 
|---|
| 71 |  ; Return Values:
 | 
|---|
| 72 |  ;
 | 
|---|
| 73 |  ; A negative value of the first "^"-piece of the RESULTS(0) indicates
 | 
|---|
| 74 |  ; an error (see the RPCSTK^RORERR procedure for more details).
 | 
|---|
| 75 |  ;
 | 
|---|
| 76 |  ; Otherwise, number of logs is returned in the RESULTS(0) and the
 | 
|---|
| 77 |  ; subsequent nodes of the RESULTS array contain the violations.
 | 
|---|
| 78 |  ; 
 | 
|---|
| 79 |  ; @RESULTS@(0)          Number of access violations
 | 
|---|
| 80 |  ;
 | 
|---|
| 81 |  ; @RESULTS@(i)          Access violation descriptor
 | 
|---|
| 82 |  ;                         ^01: Date/Time (int)
 | 
|---|
| 83 |  ;                         ^02: User Name
 | 
|---|
| 84 |  ;                         ^03: User IEN
 | 
|---|
| 85 |  ;                         ^04: Message
 | 
|---|
| 86 |  ;
 | 
|---|
| 87 | AVLIST(RESULTS,STDT,ENDT) ;
 | 
|---|
| 88 |  N BUF,CNT,DATE,IEN,IENS,RC,ROOT,RORBUF,RORERRDL,RORMSG
 | 
|---|
| 89 |  D CLEAR^RORERR("AVLIST^RORRP013",1)
 | 
|---|
| 90 |  ;--- Check the parameters
 | 
|---|
| 91 |  S STDT=$G(STDT)\1,ENDT=$G(ENDT)\1
 | 
|---|
| 92 |  S ENDT=$S(ENDT>0:$$FMADD^XLFDT(ENDT,1),1:9999999)
 | 
|---|
| 93 |  ;--- Initialize the variables
 | 
|---|
| 94 |  S ROOT=$$ROOT^DILFD(798.7,,1),CNT=0
 | 
|---|
| 95 |  K RESULTS  S RESULTS=$$ALLOC^RORTMP()
 | 
|---|
| 96 |  ;--- Browse through the logs
 | 
|---|
| 97 |  S DATE=STDT
 | 
|---|
| 98 |  F  S DATE=$O(@ROOT@("B",DATE))  Q:DATE=""  Q:DATE'<ENDT  D
 | 
|---|
| 99 |  . S IEN=0
 | 
|---|
| 100 |  . F  S IEN=$O(@ROOT@("B",DATE,IEN))  Q:IEN'>0  D
 | 
|---|
| 101 |  . . S IENS=IEN_","  K RORBUF
 | 
|---|
| 102 |  . . D GETS^DIQ(798.7,IENS,".01;1;7","EI","RORBUF","RORMSG")
 | 
|---|
| 103 |  . . Q:$G(DIERR)
 | 
|---|
| 104 |  . . ;--- Check for the 'Access Violation' Activity
 | 
|---|
| 105 |  . . Q:$G(RORBUF(798.7,IENS,1,"I"))'=6
 | 
|---|
| 106 |  . . ;--- Date/Time of the event
 | 
|---|
| 107 |  . . S BUF=$G(RORBUF(798.7,IENS,.01,"I"))
 | 
|---|
| 108 |  . . ;--- User Name (ext)
 | 
|---|
| 109 |  . . S $P(BUF,"^",2)=$G(RORBUF(798.7,IENS,7,"E"))
 | 
|---|
| 110 |  . . ;--- User IEN (int)
 | 
|---|
| 111 |  . . S $P(BUF,"^",3)=$G(RORBUF(798.7,IENS,7,"I"))
 | 
|---|
| 112 |  . . ;--- Message
 | 
|---|
| 113 |  . . S $P(BUF,"^",4)=$$GET1^DIQ(798.74,"1,"_IENS,2,,,"RORMSG")
 | 
|---|
| 114 |  . . ;--- Add the record to the output
 | 
|---|
| 115 |  . . S CNT=CNT+1,@RESULTS@(CNT)=BUF
 | 
|---|
| 116 |  ;--- Number of violations
 | 
|---|
| 117 |  S @RESULTS@(0)=CNT
 | 
|---|
| 118 |  Q
 | 
|---|
| 119 |  ;
 | 
|---|
| 120 |  ;***** ADDS THE USERS WHO HAVE THE SECURITY KEY TO THE LIST
 | 
|---|
| 121 |  ;
 | 
|---|
| 122 |  ; KEYNAME       Name of the security key
 | 
|---|
| 123 |  ; ACCESS        Level of the user access to the registry
 | 
|---|
| 124 |  ;               (1-User, 2-Administrator, 3-IRM)
 | 
|---|
| 125 |  ;
 | 
|---|
| 126 |  ; Return Values:
 | 
|---|
| 127 |  ;
 | 
|---|
| 128 | KLIST(KEYNAME,ACCESS) ;
 | 
|---|
| 129 |  N IEN  S IEN=0
 | 
|---|
| 130 |  F  S IEN=$O(^XUSEC(KEYNAME,IEN))  Q:IEN'>0  D
 | 
|---|
| 131 |  . S $P(@RORULST@(IEN,0),"^",ACCESS)=1
 | 
|---|
| 132 |  Q
 | 
|---|
| 133 |  ;
 | 
|---|
| 134 |  ;***** RETURNS THE LIST OF REGISTRY USERS
 | 
|---|
| 135 |  ; RPC: [ROR GET REGISTRY USERS]
 | 
|---|
| 136 |  ;
 | 
|---|
| 137 |  ; .RESULTS      Reference to a local variable where the results
 | 
|---|
| 138 |  ;               are returned to.
 | 
|---|
| 139 |  ;
 | 
|---|
| 140 |  ; REGIEN        Registry IEN
 | 
|---|
| 141 |  ;
 | 
|---|
| 142 |  ; Return Values:
 | 
|---|
| 143 |  ;
 | 
|---|
| 144 |  ; A negative value of the first "^"-piece of the RESULTS(0) indicates
 | 
|---|
| 145 |  ; an error (see the RPCSTK^RORERR procedure for more details).
 | 
|---|
| 146 |  ;
 | 
|---|
| 147 |  ; Otherwise, number of users is returned in the RESULTS(0) and the
 | 
|---|
| 148 |  ; subsequent nodes of the RESULTS array contain the users.
 | 
|---|
| 149 |  ; 
 | 
|---|
| 150 |  ; @RESULTS@(0)          Number of users
 | 
|---|
| 151 |  ;
 | 
|---|
| 152 |  ; @RESULTS@(i)          User descriptor
 | 
|---|
| 153 |  ;                         ^01: User IEN (DUZ)
 | 
|---|
| 154 |  ;                         ^02: User Name
 | 
|---|
| 155 |  ;                         ^03: User          (0/1)
 | 
|---|
| 156 |  ;                         ^04: Administrator (0/1)
 | 
|---|
| 157 |  ;                         ^05: IRM           (0/1)
 | 
|---|
| 158 |  ;
 | 
|---|
| 159 | USERLIST(RESULTS,REGIEN) ;
 | 
|---|
| 160 |  N ACCESS,ADMIN,CNT,IEN,NAME,RORERRDL,RORMSG,RORULST
 | 
|---|
| 161 |  D CLEAR^RORERR("USERLIST^RORRP013",1)
 | 
|---|
| 162 |  ;--- Check the parameters
 | 
|---|
| 163 |  I $G(REGIEN)'>0  D  D RPCSTK^RORERR(.RESULTS,RC)  Q
 | 
|---|
| 164 |  . S RC=$$ERROR^RORERR(-88,,,,"REGIEN",$G(REGIEN))
 | 
|---|
| 165 |  S REGIEN=+REGIEN
 | 
|---|
| 166 |  ;--- Initialize the variables
 | 
|---|
| 167 |  K RESULTS  S RESULTS=$$ALLOC^RORTMP()
 | 
|---|
| 168 |  S RORULST=$$ALLOC^RORTMP()
 | 
|---|
| 169 |  ;--- Browse the security keys
 | 
|---|
| 170 |  S NAME=""
 | 
|---|
| 171 |  F  S NAME=$O(^ROR(798.1,REGIEN,18,"B",NAME))  Q:NAME=""  D
 | 
|---|
| 172 |  . S ADMIN=(NAME?1"ROR"1.E)&(NAME["ADMIN")
 | 
|---|
| 173 |  . D KLIST(NAME,$S(ADMIN:2,1:1))
 | 
|---|
| 174 |  ;--- Add the authorized IRM personnel
 | 
|---|
| 175 |  D KLIST("ROR VA IRM",3)
 | 
|---|
| 176 |  ;--- Sort the users by their names
 | 
|---|
| 177 |  S IEN=0
 | 
|---|
| 178 |  F  S IEN=$O(@RORULST@(IEN))  Q:IEN'>0  D
 | 
|---|
| 179 |  . S NAME=$$GET1^DIQ(200,IEN_",",.01,,,"RORMSG")
 | 
|---|
| 180 |  . S:NAME'="" @RORULST@("B",NAME,IEN)=""
 | 
|---|
| 181 |  ;--- Generate the output
 | 
|---|
| 182 |  S NAME="",CNT=0
 | 
|---|
| 183 |  F  S NAME=$O(@RORULST@("B",NAME)) Q:NAME=""  D
 | 
|---|
| 184 |  . S IEN=0
 | 
|---|
| 185 |  . F  S IEN=$O(@RORULST@("B",NAME,IEN)) Q:IEN'>0  D
 | 
|---|
| 186 |  . . S ACCESS=$G(@RORULST@(IEN,0))
 | 
|---|
| 187 |  . . S CNT=CNT+1,@RESULTS@(CNT)=IEN_"^"_NAME_"^"_ACCESS
 | 
|---|
| 188 |  S @RESULTS@(0)=CNT
 | 
|---|
| 189 |  ;--- Cleanup
 | 
|---|
| 190 |  D FREE^RORTMP(RORULST)
 | 
|---|
| 191 |  Q
 | 
|---|