2011-06-23 20:51:25 +00:00
|
|
|
<?php
|
|
|
|
/**
|
2015-03-26 10:44:34 +00:00
|
|
|
* @author Andreas Fischer <bantu@owncloud.com>
|
|
|
|
* @author Arthur Schiwon <blizzz@owncloud.com>
|
|
|
|
* @author Bart Visscher <bartv@thisnet.nl>
|
|
|
|
* @author Christopher Schäpers <kondou@ts.unde.re>
|
|
|
|
* @author Dominik Schmidt <dev@dominik-schmidt.de>
|
|
|
|
* @author Jörn Friedrich Dreyer <jfd@butonic.de>
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
|
|
|
* @author Robin Appelman <icewind@owncloud.com>
|
|
|
|
* @author Robin McCorkell <rmccorkell@karoshi.org.uk>
|
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
|
|
|
* @author Tom Needham <tom@owncloud.com>
|
2011-06-23 20:51:25 +00:00
|
|
|
*
|
2015-03-26 10:44:34 +00:00
|
|
|
* @copyright Copyright (c) 2015, ownCloud, Inc.
|
|
|
|
* @license AGPL-3.0
|
2011-06-23 20:51:25 +00:00
|
|
|
*
|
2015-03-26 10:44:34 +00:00
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
2011-06-23 20:51:25 +00:00
|
|
|
*
|
2015-03-26 10:44:34 +00:00
|
|
|
* This program is distributed in the hope that it will be useful,
|
2011-06-23 20:51:25 +00:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2015-03-26 10:44:34 +00:00
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
2011-06-23 20:51:25 +00:00
|
|
|
*
|
2015-03-26 10:44:34 +00:00
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2011-06-23 20:51:25 +00:00
|
|
|
*
|
|
|
|
*/
|
2015-02-26 10:37:37 +00:00
|
|
|
|
2012-07-20 15:43:44 +00:00
|
|
|
namespace OCA\user_ldap;
|
|
|
|
|
2013-09-10 15:11:02 +00:00
|
|
|
use OCA\user_ldap\lib\BackendUtility;
|
2015-01-06 22:28:49 +00:00
|
|
|
use OCA\user_ldap\lib\Access;
|
2014-08-21 15:59:13 +00:00
|
|
|
use OCA\user_ldap\lib\user\OfflineUser;
|
|
|
|
use OCA\User_LDAP\lib\User\User;
|
2015-01-06 22:28:49 +00:00
|
|
|
use OCP\IConfig;
|
2013-09-10 15:11:02 +00:00
|
|
|
|
2014-12-12 16:25:03 +00:00
|
|
|
class USER_LDAP extends BackendUtility implements \OCP\IUserBackend, \OCP\UserInterface {
|
2015-01-06 22:28:49 +00:00
|
|
|
/** @var string[] $homesToKill */
|
|
|
|
protected $homesToKill = array();
|
|
|
|
|
|
|
|
/** @var \OCP\IConfig */
|
|
|
|
protected $ocConfig;
|
|
|
|
|
2014-08-21 15:59:13 +00:00
|
|
|
/**
|
2015-01-06 22:28:49 +00:00
|
|
|
* @param \OCA\user_ldap\lib\Access $access
|
|
|
|
* @param \OCP\IConfig $ocConfig
|
2014-08-21 15:59:13 +00:00
|
|
|
*/
|
2015-01-06 22:28:49 +00:00
|
|
|
public function __construct(Access $access, IConfig $ocConfig) {
|
|
|
|
parent::__construct($access);
|
|
|
|
$this->ocConfig = $ocConfig;
|
|
|
|
}
|
2014-08-21 15:59:13 +00:00
|
|
|
|
2013-11-21 16:02:37 +00:00
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* checks whether the user is allowed to change his avatar in ownCloud
|
2014-05-13 11:29:25 +00:00
|
|
|
* @param string $uid the ownCloud user name
|
2013-11-21 16:02:37 +00:00
|
|
|
* @return boolean either the user can or cannot
|
|
|
|
*/
|
|
|
|
public function canChangeAvatar($uid) {
|
2014-03-27 17:01:14 +00:00
|
|
|
$user = $this->access->userManager->get($uid);
|
2014-08-21 15:59:13 +00:00
|
|
|
if(!$user instanceof User) {
|
2013-11-21 16:02:37 +00:00
|
|
|
return false;
|
|
|
|
}
|
2014-03-27 17:01:14 +00:00
|
|
|
if($user->getAvatarImage() === false) {
|
2013-11-21 16:02:37 +00:00
|
|
|
return true;
|
|
|
|
}
|
2014-02-06 21:18:38 +00:00
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2012-05-04 11:02:20 +00:00
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* Check if the password is correct
|
2014-02-06 15:30:58 +00:00
|
|
|
* @param string $uid The username
|
|
|
|
* @param string $password The password
|
2015-01-07 12:28:56 +00:00
|
|
|
* @return false|string
|
2012-05-04 11:02:20 +00:00
|
|
|
*
|
|
|
|
* Check if the password is correct without logging in the user
|
|
|
|
*/
|
2012-09-07 13:22:01 +00:00
|
|
|
public function checkPassword($uid, $password) {
|
2012-05-04 11:02:20 +00:00
|
|
|
//find out dn of the user name
|
2014-08-21 15:59:13 +00:00
|
|
|
$attrs = array($this->access->connection->ldapUserDisplayName, 'dn',
|
|
|
|
'uid', 'samaccountname');
|
LDAP Wizard Overhaul
wizard refactor
reimplement save spinners and cursor
implement Port detector
introduced detector queue, added base dn detector
disable input fields when detectors are running
introduce spinners for fields that are being updated by detector
cache jq element objects
consolidate processing of detector results in generic / abstract base class
display notification if a detector discovered a problem
don't run base dn detector if a base is configured
reset detector queue on configuration switch
implement functionality check and update of status indicator
document ConfigModel
jsdoc for controller and main view
more documentation
implement the user filter tab view
so far the multiselects get initialized (not filled yet) and the mode can be switched.
mode is also restored.
reintroduce filter switch confirmation in admin XP mode
new detector for user object classes. so we also load user object classes if necessary and are able to save and show the setting.
multiselect trigger save actions now on close only
show spinners automatically, when a detector is running
20k limit for object classes preselection test
adjust wordings, fix grammar
add group (for users tab) detector
also includes wording fixes
error presentation moved from detectors to view, where it belongs
add info label to users page
missing wording changes
show effective LDAP filter in Assisted Mode
add user filter detector
implement count button for users and limit all count actions to 1001 for performance reasons
make port field a bit bigger. not perfect though.
do not detect port automatically
implement login filter tab view
only load features in assisted mode and don't enable assisted fields while in raw mode
add tooltips on login filter checkbox options for better understanding
permanently show filter on login tab
and also compile login filter in assisted mode
test/verify button on login attributes tab, with backend changes.
only run wizard requests if your an active tab. also run compile filter requests when switching to assisted mode
underline toggle filter links to stress that they are clickable
unity user and group tab functionality in common abstract class, add group filter tab view. only detectors and template adjustments left to have group tab implementation complete
add object class and group detector for groups as well as filter composer
show ldap filter permanently on groups tab
introduce input element that can deal better with many groups, will be used with > 40
fix disabling complex group chooser while detection is running
hide complex group chooser on config switch
fix few more issues with complex chooser
make complex group chooser available on Users tab as well
detect base dn improvements/changes:
- do not look for Base DN automatically, offer a button instead
- fix for alternative way to detect a base dn (if agent dn is not given)
- do not trigger filter composers on config switch
Changes with configuration chooser controls
- "New" was removed out of the configuration list
- and split into buttons "add" and "copy"
- delete button is also now an icon
add test button for Base DN
reimplement advanced tab. The save button is gone.
reimplement expert tab
remove unused methods
implement mail attribute detector
implement user display name attribute detection
implement member group association detector
replace text input with textarea for raw filter input
finish functionality check
auto-enable good configurations, as it was before
cleanup
move save confirmation handling to base class, reduces code duplication
enable tabs only if no running save processes are left.
move onConfigLoaded to base class, avoids code duplication
simplify, save LOCs
Test Configuration button to be dealt with in main view as it is a cross-tab element
require detectorQueue in constructor
cleanup
put bootstrap into a function and thus make it testable
get rid of old stuff
2015-03-03 10:56:03 +00:00
|
|
|
$users = $this->access->fetchUsersByLoginName($uid, $attrs);
|
2014-08-21 15:59:13 +00:00
|
|
|
if(count($users) < 1) {
|
2011-07-05 22:30:57 +00:00
|
|
|
return false;
|
|
|
|
}
|
2014-08-21 15:59:13 +00:00
|
|
|
$dn = $users[0]['dn'];
|
2014-03-27 17:01:14 +00:00
|
|
|
$user = $this->access->userManager->get($dn);
|
2014-08-21 15:59:13 +00:00
|
|
|
if(!$user instanceof User) {
|
2014-10-27 14:58:23 +00:00
|
|
|
\OCP\Util::writeLog('user_ldap',
|
|
|
|
'LDAP Login: Could not get user object for DN ' . $dn .
|
|
|
|
'. Maybe the LDAP entry has no set display name attribute?',
|
|
|
|
\OCP\Util::WARN);
|
|
|
|
return false;
|
|
|
|
}
|
2014-03-27 17:01:14 +00:00
|
|
|
if($user->getUsername() !== false) {
|
2013-08-14 14:03:18 +00:00
|
|
|
//are the credentials OK?
|
2013-09-10 15:11:02 +00:00
|
|
|
if(!$this->access->areCredentialsValid($dn, $password)) {
|
2013-08-14 14:03:18 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2014-03-27 17:01:14 +00:00
|
|
|
$user->markLogin();
|
2014-08-21 15:59:13 +00:00
|
|
|
if(isset($users[0][$this->access->connection->ldapUserDisplayName])) {
|
|
|
|
$dpn = $users[0][$this->access->connection->ldapUserDisplayName];
|
|
|
|
$user->storeDisplayName($dpn);
|
|
|
|
}
|
|
|
|
if(isset($users[0]['uid'])) {
|
|
|
|
$user->storeLDAPUserName($users[0]['uid']);
|
|
|
|
} else if(isset($users[0]['samaccountname'])) {
|
|
|
|
$user->storeLDAPUserName($users[0]['samaccountname']);
|
|
|
|
}
|
2013-11-26 11:57:39 +00:00
|
|
|
|
2014-03-27 17:01:14 +00:00
|
|
|
return $user->getUsername();
|
2012-07-30 15:42:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
2011-06-23 21:41:02 +00:00
|
|
|
}
|
2011-06-23 20:51:25 +00:00
|
|
|
|
2012-05-03 21:41:08 +00:00
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* Get a list of all users
|
2012-05-03 21:41:08 +00:00
|
|
|
*
|
2015-06-27 18:35:47 +00:00
|
|
|
* @param string $search
|
|
|
|
* @param null|int $limit
|
|
|
|
* @param null|int $offset
|
|
|
|
* @return string[] an array of all uids
|
2012-05-03 21:41:08 +00:00
|
|
|
*/
|
2012-09-07 13:22:01 +00:00
|
|
|
public function getUsers($search = '', $limit = 10, $offset = 0) {
|
2014-12-08 16:12:13 +00:00
|
|
|
$search = $this->access->escapeFilterPart($search, true);
|
2012-10-26 19:54:22 +00:00
|
|
|
$cachekey = 'getUsers-'.$search.'-'.$limit.'-'.$offset;
|
|
|
|
|
|
|
|
//check if users are cached, if so return
|
2013-09-10 15:11:02 +00:00
|
|
|
$ldap_users = $this->access->connection->getFromCache($cachekey);
|
2012-10-26 19:54:22 +00:00
|
|
|
if(!is_null($ldap_users)) {
|
|
|
|
return $ldap_users;
|
2012-08-14 12:14:20 +00:00
|
|
|
}
|
2012-10-26 19:54:22 +00:00
|
|
|
|
2013-02-14 21:16:48 +00:00
|
|
|
// if we'd pass -1 to LDAP search, we'd end up in a Protocol
|
|
|
|
// error. With a limit of 0, we get 0 results. So we pass null.
|
2012-10-27 15:32:55 +00:00
|
|
|
if($limit <= 0) {
|
|
|
|
$limit = null;
|
|
|
|
}
|
2013-09-10 15:11:02 +00:00
|
|
|
$filter = $this->access->combineFilterWithAnd(array(
|
|
|
|
$this->access->connection->ldapUserFilter,
|
|
|
|
$this->access->getFilterPartForUserSearch($search)
|
2012-10-26 19:54:22 +00:00
|
|
|
));
|
|
|
|
|
2013-02-14 21:16:48 +00:00
|
|
|
\OCP\Util::writeLog('user_ldap',
|
|
|
|
'getUsers: Options: search '.$search.' limit '.$limit.' offset '.$offset.' Filter: '.$filter,
|
|
|
|
\OCP\Util::DEBUG);
|
2012-10-26 19:54:22 +00:00
|
|
|
//do the search and translate results to owncloud names
|
2013-09-10 15:11:02 +00:00
|
|
|
$ldap_users = $this->access->fetchListOfUsers(
|
|
|
|
$filter,
|
|
|
|
array($this->access->connection->ldapUserDisplayName, 'dn'),
|
2013-02-14 21:16:48 +00:00
|
|
|
$limit, $offset);
|
2013-09-10 15:11:02 +00:00
|
|
|
$ldap_users = $this->access->ownCloudUserNames($ldap_users);
|
2012-10-27 10:18:50 +00:00
|
|
|
\OCP\Util::writeLog('user_ldap', 'getUsers: '.count($ldap_users). ' Users found', \OCP\Util::DEBUG);
|
2012-08-14 12:14:20 +00:00
|
|
|
|
2013-09-10 15:11:02 +00:00
|
|
|
$this->access->connection->writeToCache($cachekey, $ldap_users);
|
2012-10-26 19:54:22 +00:00
|
|
|
return $ldap_users;
|
2011-11-29 22:11:42 +00:00
|
|
|
}
|
2011-06-23 21:41:02 +00:00
|
|
|
|
2014-08-21 15:59:13 +00:00
|
|
|
/**
|
|
|
|
* checks whether a user is still available on LDAP
|
|
|
|
* @param string|\OCA\User_LDAP\lib\user\User $user either the ownCloud user
|
|
|
|
* name or an instance of that user
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function userExistsOnLDAP($user) {
|
|
|
|
if(is_string($user)) {
|
|
|
|
$user = $this->access->userManager->get($user);
|
|
|
|
}
|
|
|
|
if(!$user instanceof User) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
$dn = $user->getDN();
|
|
|
|
//check if user really still exists by reading its entry
|
|
|
|
if(!is_array($this->access->readAttribute($dn, ''))) {
|
|
|
|
$lcr = $this->access->connection->getConnectionResource();
|
|
|
|
if(is_null($lcr)) {
|
|
|
|
throw new \Exception('No LDAP Connection to server ' . $this->access->connection->ldapHost);
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-05-03 21:44:12 +00:00
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* check if a user exists
|
2012-05-03 21:44:12 +00:00
|
|
|
* @param string $uid the username
|
|
|
|
* @return boolean
|
2015-03-31 11:42:23 +00:00
|
|
|
* @throws \Exception when connection could not be established
|
2012-05-03 21:44:12 +00:00
|
|
|
*/
|
2012-09-07 13:22:01 +00:00
|
|
|
public function userExists($uid) {
|
2013-09-10 15:11:02 +00:00
|
|
|
if($this->access->connection->isCached('userExists'.$uid)) {
|
|
|
|
return $this->access->connection->getFromCache('userExists'.$uid);
|
2012-07-26 14:11:23 +00:00
|
|
|
}
|
2012-06-22 10:42:07 +00:00
|
|
|
//getting dn, if false the user does not exist. If dn, he may be mapped only, requires more checking.
|
2014-03-27 17:01:14 +00:00
|
|
|
$user = $this->access->userManager->get($uid);
|
2015-06-11 16:24:45 +00:00
|
|
|
|
2014-03-27 17:01:14 +00:00
|
|
|
if(is_null($user)) {
|
2013-09-11 17:42:08 +00:00
|
|
|
\OCP\Util::writeLog('user_ldap', 'No DN found for '.$uid.' on '.
|
|
|
|
$this->access->connection->ldapHost, \OCP\Util::DEBUG);
|
2013-09-10 15:11:02 +00:00
|
|
|
$this->access->connection->writeToCache('userExists'.$uid, false);
|
2012-06-22 10:42:07 +00:00
|
|
|
return false;
|
2014-08-21 15:59:13 +00:00
|
|
|
} else if($user instanceof OfflineUser) {
|
|
|
|
//express check for users marked as deleted. Returning true is
|
|
|
|
//necessary for cleanup
|
|
|
|
return true;
|
2012-06-22 10:42:07 +00:00
|
|
|
}
|
2014-08-21 15:59:13 +00:00
|
|
|
|
2015-03-31 11:42:23 +00:00
|
|
|
$result = $this->userExistsOnLDAP($user);
|
|
|
|
$this->access->connection->writeToCache('userExists'.$uid, $result);
|
|
|
|
if($result === true) {
|
|
|
|
$user->update();
|
2012-06-22 10:42:07 +00:00
|
|
|
}
|
2015-03-31 11:42:23 +00:00
|
|
|
return $result;
|
2012-05-03 21:44:12 +00:00
|
|
|
}
|
|
|
|
|
2012-07-20 14:28:20 +00:00
|
|
|
/**
|
2014-08-21 15:59:13 +00:00
|
|
|
* returns whether a user was deleted in LDAP
|
|
|
|
*
|
2014-05-13 11:29:25 +00:00
|
|
|
* @param string $uid The username of the user to delete
|
|
|
|
* @return bool
|
2012-07-20 14:28:20 +00:00
|
|
|
*/
|
|
|
|
public function deleteUser($uid) {
|
2015-01-06 22:28:49 +00:00
|
|
|
$marked = $this->ocConfig->getUserValue($uid, 'user_ldap', 'isDeleted', 0);
|
2014-08-21 15:59:13 +00:00
|
|
|
if(intval($marked) === 0) {
|
|
|
|
\OC::$server->getLogger()->notice(
|
|
|
|
'User '.$uid . ' is not marked as deleted, not cleaning up.',
|
|
|
|
array('app' => 'user_ldap'));
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
\OC::$server->getLogger()->info('Cleaning up after user ' . $uid,
|
|
|
|
array('app' => 'user_ldap'));
|
|
|
|
|
|
|
|
//Get Home Directory out of user preferences so we can return it later,
|
|
|
|
//necessary for removing directories as done by OC_User.
|
2015-01-06 22:28:49 +00:00
|
|
|
$home = $this->ocConfig->getUserValue($uid, 'user_ldap', 'homePath', '');
|
2014-08-21 15:59:13 +00:00
|
|
|
$this->homesToKill[$uid] = $home;
|
2014-12-20 15:09:04 +00:00
|
|
|
$this->access->getUserMapper()->unmap($uid);
|
2014-08-21 15:59:13 +00:00
|
|
|
|
|
|
|
return true;
|
2012-07-20 14:28:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* get the user's home directory
|
2013-02-06 01:28:09 +00:00
|
|
|
* @param string $uid the username
|
2014-08-21 15:59:13 +00:00
|
|
|
* @return string|bool
|
2012-08-28 12:24:31 +00:00
|
|
|
*/
|
2013-02-06 01:28:09 +00:00
|
|
|
public function getHome($uid) {
|
2014-08-21 15:59:13 +00:00
|
|
|
if(isset($this->homesToKill[$uid]) && !empty($this->homesToKill[$uid])) {
|
|
|
|
//a deleted user who needs some clean up
|
|
|
|
return $this->homesToKill[$uid];
|
|
|
|
}
|
|
|
|
|
2015-06-11 16:24:45 +00:00
|
|
|
// user Exists check required as it is not done in user proxy!
|
|
|
|
if(!$this->userExists($uid)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2013-02-06 01:28:09 +00:00
|
|
|
$cacheKey = 'getHome'.$uid;
|
2013-09-10 15:11:02 +00:00
|
|
|
if($this->access->connection->isCached($cacheKey)) {
|
|
|
|
return $this->access->connection->getFromCache($cacheKey);
|
2013-02-06 01:28:09 +00:00
|
|
|
}
|
2015-06-16 11:46:51 +00:00
|
|
|
if(strpos($this->access->connection->homeFolderNamingRule, 'attr:') === 0 &&
|
|
|
|
$this->access->connection->homeFolderNamingRule !== 'attr:') {
|
2013-09-10 15:11:02 +00:00
|
|
|
$attr = substr($this->access->connection->homeFolderNamingRule, strlen('attr:'));
|
|
|
|
$homedir = $this->access->readAttribute(
|
|
|
|
$this->access->username2dn($uid), $attr);
|
2013-02-06 01:28:09 +00:00
|
|
|
if($homedir && isset($homedir[0])) {
|
|
|
|
$path = $homedir[0];
|
|
|
|
//if attribute's value is an absolute path take this, otherwise append it to data dir
|
|
|
|
//check for / at the beginning or pattern c:\ resp. c:/
|
|
|
|
if(
|
2013-04-20 20:45:50 +00:00
|
|
|
'/' === $path[0]
|
2013-02-14 21:16:48 +00:00
|
|
|
|| (3 < strlen($path) && ctype_alpha($path[0])
|
2013-04-20 20:45:50 +00:00
|
|
|
&& $path[1] === ':' && ('\\' === $path[2] || '/' === $path[2]))
|
2013-02-06 01:28:09 +00:00
|
|
|
) {
|
|
|
|
$homedir = $path;
|
|
|
|
} else {
|
2015-01-06 22:28:49 +00:00
|
|
|
$homedir = $this->ocConfig->getSystemValue('datadirectory',
|
2013-02-14 21:16:48 +00:00
|
|
|
\OC::$SERVERROOT.'/data' ) . '/' . $homedir[0];
|
2013-02-06 01:28:09 +00:00
|
|
|
}
|
2013-09-10 15:11:02 +00:00
|
|
|
$this->access->connection->writeToCache($cacheKey, $homedir);
|
2014-08-21 15:59:13 +00:00
|
|
|
//we need it to store it in the DB as well in case a user gets
|
|
|
|
//deleted so we can clean up afterwards
|
2015-01-06 22:28:49 +00:00
|
|
|
$this->ocConfig->setUserValue(
|
|
|
|
$uid, 'user_ldap', 'homePath', $homedir
|
|
|
|
);
|
2014-08-21 15:59:13 +00:00
|
|
|
//TODO: if home directory changes, the old one needs to be removed.
|
2012-08-28 12:24:31 +00:00
|
|
|
return $homedir;
|
|
|
|
}
|
2015-06-16 11:46:51 +00:00
|
|
|
// a naming rule attribute is defined, but it doesn't exist for that LDAP user
|
|
|
|
throw new \Exception('Home dir attribute can\'t be read from LDAP for uid: ' . $uid);
|
2012-08-28 12:24:31 +00:00
|
|
|
}
|
|
|
|
|
2013-02-06 01:28:09 +00:00
|
|
|
//false will apply default behaviour as defined and done by OC_User
|
2013-09-10 15:11:02 +00:00
|
|
|
$this->access->connection->writeToCache($cacheKey, false);
|
2015-01-06 22:28:49 +00:00
|
|
|
$this->ocConfig->setUserValue($uid, 'user_ldap', 'homePath', '');
|
2012-08-28 12:24:31 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2013-01-29 19:41:48 +00:00
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* get display name of the user
|
2014-05-13 11:29:25 +00:00
|
|
|
* @param string $uid user ID of the user
|
2015-01-16 18:31:15 +00:00
|
|
|
* @return string|false display name
|
2013-01-29 19:41:48 +00:00
|
|
|
*/
|
|
|
|
public function getDisplayName($uid) {
|
2013-03-19 10:16:57 +00:00
|
|
|
if(!$this->userExists($uid)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2013-01-29 19:41:48 +00:00
|
|
|
$cacheKey = 'getDisplayName'.$uid;
|
2013-09-10 15:11:02 +00:00
|
|
|
if(!is_null($displayName = $this->access->connection->getFromCache($cacheKey))) {
|
2013-01-29 19:41:48 +00:00
|
|
|
return $displayName;
|
|
|
|
}
|
|
|
|
|
2013-09-10 15:11:02 +00:00
|
|
|
$displayName = $this->access->readAttribute(
|
|
|
|
$this->access->username2dn($uid),
|
|
|
|
$this->access->connection->ldapUserDisplayName);
|
2013-01-29 19:41:48 +00:00
|
|
|
|
|
|
|
if($displayName && (count($displayName) > 0)) {
|
2013-09-10 15:11:02 +00:00
|
|
|
$this->access->connection->writeToCache($cacheKey, $displayName[0]);
|
2013-01-29 19:41:48 +00:00
|
|
|
return $displayName[0];
|
|
|
|
}
|
|
|
|
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* Get a list of all display names
|
2013-01-29 19:41:48 +00:00
|
|
|
*
|
2015-06-27 18:35:47 +00:00
|
|
|
* @param string $search
|
|
|
|
* @param string|null $limit
|
|
|
|
* @param string|null $offset
|
|
|
|
* @return array an array of all displayNames (value) and the corresponding uids (key)
|
2013-01-29 19:41:48 +00:00
|
|
|
*/
|
|
|
|
public function getDisplayNames($search = '', $limit = null, $offset = null) {
|
|
|
|
$cacheKey = 'getDisplayNames-'.$search.'-'.$limit.'-'.$offset;
|
2013-09-10 15:11:02 +00:00
|
|
|
if(!is_null($displayNames = $this->access->connection->getFromCache($cacheKey))) {
|
2013-01-29 19:41:48 +00:00
|
|
|
return $displayNames;
|
|
|
|
}
|
|
|
|
|
|
|
|
$displayNames = array();
|
|
|
|
$users = $this->getUsers($search, $limit, $offset);
|
|
|
|
foreach ($users as $user) {
|
|
|
|
$displayNames[$user] = $this->getDisplayName($user);
|
|
|
|
}
|
2013-09-10 15:11:02 +00:00
|
|
|
$this->access->connection->writeToCache($cacheKey, $displayNames);
|
2013-01-29 19:41:48 +00:00
|
|
|
return $displayNames;
|
|
|
|
}
|
|
|
|
|
2014-05-15 20:47:28 +00:00
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* Check if backend implements actions
|
2014-05-13 11:29:25 +00:00
|
|
|
* @param int $actions bitwise-or'ed actions
|
|
|
|
* @return boolean
|
2012-07-20 14:28:20 +00:00
|
|
|
*
|
|
|
|
* Returns the supported actions as int to be
|
|
|
|
* compared with OC_USER_BACKEND_CREATE_USER etc.
|
|
|
|
*/
|
|
|
|
public function implementsActions($actions) {
|
2015-04-18 13:29:08 +00:00
|
|
|
return (bool)((\OC_User_Backend::CHECK_PASSWORD
|
|
|
|
| \OC_User_Backend::GET_HOME
|
|
|
|
| \OC_User_Backend::GET_DISPLAYNAME
|
|
|
|
| \OC_User_Backend::PROVIDE_AVATAR
|
|
|
|
| \OC_User_Backend::COUNT_USERS)
|
2013-02-16 01:06:45 +00:00
|
|
|
& $actions);
|
2012-07-20 14:28:20 +00:00
|
|
|
}
|
|
|
|
|
2013-02-11 21:01:52 +00:00
|
|
|
/**
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function hasUserListings() {
|
|
|
|
return true;
|
|
|
|
}
|
2014-01-08 11:07:57 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* counts the users in LDAP
|
|
|
|
*
|
2014-05-15 20:47:28 +00:00
|
|
|
* @return int|bool
|
2014-01-08 11:07:57 +00:00
|
|
|
*/
|
|
|
|
public function countUsers() {
|
2014-10-27 22:39:30 +00:00
|
|
|
$filter = $this->access->getFilterForUserCount();
|
2014-11-19 17:16:08 +00:00
|
|
|
$cacheKey = 'countUsers-'.$filter;
|
|
|
|
if(!is_null($entries = $this->access->connection->getFromCache($cacheKey))) {
|
|
|
|
return $entries;
|
|
|
|
}
|
2014-01-08 11:07:57 +00:00
|
|
|
$entries = $this->access->countUsers($filter);
|
2014-11-19 17:16:08 +00:00
|
|
|
$this->access->connection->writeToCache($cacheKey, $entries);
|
2014-01-08 11:07:57 +00:00
|
|
|
return $entries;
|
|
|
|
}
|
2014-12-12 16:25:03 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Backend name to be shown in user management
|
|
|
|
* @return string the name of the backend to be shown
|
|
|
|
*/
|
|
|
|
public function getBackendName(){
|
|
|
|
return 'LDAP';
|
|
|
|
}
|
|
|
|
|
2013-02-14 21:16:48 +00:00
|
|
|
}
|