2013-09-27 16:30:59 +00:00
|
|
|
|
<?php
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* ownCloud – LDAP Wizard
|
|
|
|
|
*
|
|
|
|
|
* @author Arthur Schiwon
|
|
|
|
|
* @copyright 2013 Arthur Schiwon blizzz@owncloud.com
|
|
|
|
|
*
|
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
|
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
|
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
|
* version 3 of the License, or any later version.
|
|
|
|
|
*
|
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
* GNU AFFERO GENERAL PUBLIC LICENSE for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU Affero General Public
|
|
|
|
|
* License along with this library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
*
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
namespace OCA\user_ldap\lib;
|
|
|
|
|
|
|
|
|
|
class Wizard extends LDAPUtility {
|
|
|
|
|
static protected $l;
|
2013-10-07 23:19:37 +00:00
|
|
|
|
protected $cr;
|
2013-09-27 16:30:59 +00:00
|
|
|
|
protected $configuration;
|
|
|
|
|
protected $result;
|
2013-10-07 23:19:37 +00:00
|
|
|
|
protected $resultCache = array();
|
2013-09-27 16:30:59 +00:00
|
|
|
|
|
2013-10-04 14:33:37 +00:00
|
|
|
|
const LRESULT_PROCESSED_OK = 0;
|
|
|
|
|
const LRESULT_PROCESSED_INVALID = 1;
|
|
|
|
|
const LRESULT_PROCESSED_SKIP = 2;
|
|
|
|
|
|
2013-09-27 16:30:59 +00:00
|
|
|
|
/**
|
|
|
|
|
* @brief Constructor
|
|
|
|
|
* @param $configuration an instance of Configuration
|
|
|
|
|
* @param $ldap an instance of ILDAPWrapper
|
|
|
|
|
*/
|
|
|
|
|
public function __construct(Configuration $configuration, ILDAPWrapper $ldap) {
|
|
|
|
|
parent::__construct($ldap);
|
|
|
|
|
$this->configuration = $configuration;
|
|
|
|
|
if(is_null(Wizard::$l)) {
|
|
|
|
|
Wizard::$l = \OC_L10N::get('user_ldap');
|
|
|
|
|
}
|
|
|
|
|
$this->result = new WizardResult;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function __destruct() {
|
|
|
|
|
if($this->result->hasChanges()) {
|
|
|
|
|
$this->configuration->saveConfiguration();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2013-10-07 15:56:45 +00:00
|
|
|
|
/**
|
|
|
|
|
* @brief detects the available LDAP groups
|
|
|
|
|
* @returns the instance's WizardResult instance
|
|
|
|
|
*/
|
2013-10-04 16:11:44 +00:00
|
|
|
|
public function determineGroups() {
|
|
|
|
|
if(!$this->checkRequirements(array('ldapHost',
|
|
|
|
|
'ldapPort',
|
|
|
|
|
'ldapAgentName',
|
|
|
|
|
'ldapAgentPassword',
|
|
|
|
|
'ldapBase',
|
|
|
|
|
))) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
$cr = $this->getConnection();
|
|
|
|
|
if(!$cr) {
|
|
|
|
|
throw new \Excpetion('Could not connect to LDAP');
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$obclasses = array('posixGroup', 'group', '*');
|
2013-10-08 09:19:55 +00:00
|
|
|
|
$this->determineFeature($obclasses,
|
|
|
|
|
'cn',
|
|
|
|
|
'ldap_userfilter_groups',
|
|
|
|
|
'ldapUserFilterGroups');
|
2013-10-07 15:56:45 +00:00
|
|
|
|
|
2013-10-08 09:19:55 +00:00
|
|
|
|
if(!$this->testMemberOf()) {
|
2013-10-07 23:19:37 +00:00
|
|
|
|
throw new \Exception('memberOf is not supported by the server');
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $this->result;
|
|
|
|
|
}
|
|
|
|
|
|
2013-10-07 15:56:45 +00:00
|
|
|
|
/**
|
|
|
|
|
* @brief detects the available object classes
|
|
|
|
|
* @returns the instance's WizardResult instance
|
|
|
|
|
*/
|
2013-10-04 14:33:37 +00:00
|
|
|
|
public function determineObjectClasses() {
|
|
|
|
|
if(!$this->checkRequirements(array('ldapHost',
|
|
|
|
|
'ldapPort',
|
|
|
|
|
'ldapAgentName',
|
|
|
|
|
'ldapAgentPassword',
|
|
|
|
|
'ldapBase',
|
|
|
|
|
))) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
$cr = $this->getConnection();
|
|
|
|
|
if(!$cr) {
|
|
|
|
|
throw new \Excpetion('Could not connect to LDAP');
|
|
|
|
|
}
|
|
|
|
|
|
2013-10-04 16:11:44 +00:00
|
|
|
|
$obclasses = array('inetOrgPerson', 'person', 'organizationalPerson',
|
|
|
|
|
'user', 'posixAccount', '*');
|
2013-10-07 23:19:37 +00:00
|
|
|
|
$this->determineFeature($obclasses,
|
|
|
|
|
'objectclass',
|
|
|
|
|
'ldap_userfilter_objectclass',
|
|
|
|
|
'ldapUserFilterObjectclass',
|
|
|
|
|
true);
|
|
|
|
|
|
|
|
|
|
return $this->result;
|
2013-10-04 16:11:44 +00:00
|
|
|
|
}
|
2013-10-04 14:33:37 +00:00
|
|
|
|
|
2013-09-27 16:30:59 +00:00
|
|
|
|
/**
|
|
|
|
|
* Tries to determine the port, requires given Host, User DN and Password
|
|
|
|
|
* @returns mixed WizardResult on success, false otherwise
|
|
|
|
|
*/
|
|
|
|
|
public function guessPortAndTLS() {
|
|
|
|
|
if(!$this->checkRequirements(array('ldapHost',
|
|
|
|
|
'ldapAgentName',
|
2013-10-04 14:33:37 +00:00
|
|
|
|
'ldapAgentPassword'
|
|
|
|
|
))) {
|
2013-09-27 16:30:59 +00:00
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
$this->checkHost();
|
|
|
|
|
$portSettings = $this->getPortSettingsToTry();
|
|
|
|
|
file_put_contents('/tmp/ps', print_r($portSettings, true).PHP_EOL, FILE_APPEND);
|
|
|
|
|
|
|
|
|
|
if(!is_array($portSettings)) {
|
|
|
|
|
throw new \Exception(print_r($portSettings, true));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//proceed from the best configuration and return on first success
|
|
|
|
|
foreach($portSettings as $setting) {
|
|
|
|
|
$p = $setting['port'];
|
|
|
|
|
$t = $setting['tls'];
|
|
|
|
|
\OCP\Util::writeLog('user_ldap', 'Wiz: trying port '. $p . ', TLS '. $t, \OCP\Util::DEBUG);
|
|
|
|
|
//connectAndBind may throw Exception, it needs to be catched by the
|
|
|
|
|
//callee of this method
|
|
|
|
|
if($this->connectAndBind($p, $t) === true) {
|
|
|
|
|
$config = array('ldapPort' => $p,
|
|
|
|
|
'ldapTLS' => intval($t)
|
|
|
|
|
);
|
|
|
|
|
$this->configuration->setConfiguration($config);
|
|
|
|
|
\OCP\Util::writeLog('user_ldap', 'Wiz: detected Port '. $p, \OCP\Util::DEBUG);
|
|
|
|
|
$this->result->addChange('ldap_port', $p);
|
|
|
|
|
$this->result->addChange('ldap_tls', intval($t));
|
|
|
|
|
return $this->result;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//custom port, undetected (we do not brute force)
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
2013-09-29 21:53:14 +00:00
|
|
|
|
/**
|
|
|
|
|
* @brief tries to determine a base dn from User DN or LDAP Host
|
|
|
|
|
* @returns mixed WizardResult on success, false otherwise
|
|
|
|
|
*/
|
2013-09-27 16:30:59 +00:00
|
|
|
|
public function guessBaseDN() {
|
|
|
|
|
if(!$this->checkRequirements(array('ldapHost',
|
|
|
|
|
'ldapAgentName',
|
|
|
|
|
'ldapAgentPassword',
|
|
|
|
|
'ldapPort',
|
|
|
|
|
))) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
2013-09-29 21:53:14 +00:00
|
|
|
|
|
|
|
|
|
//check whether a DN is given in the agent name (99.9% of all cases)
|
|
|
|
|
$base = null;
|
|
|
|
|
$i = stripos($this->configuration->ldapAgentName, 'dc=');
|
|
|
|
|
if($i !== false) {
|
|
|
|
|
$base = substr($this->configuration->ldapAgentName, $i);
|
|
|
|
|
|
|
|
|
|
if($this->testBaseDN($base)) {
|
|
|
|
|
$this->applyFind('ldap_base', $base);
|
|
|
|
|
$this->applyFind('ldap_base_users', $base);
|
|
|
|
|
$this->applyFind('ldap_base_groups', $base);
|
|
|
|
|
return $this->result;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//this did not help :(
|
|
|
|
|
//Let's see whether we can parse the Host URL and convert the domain to
|
|
|
|
|
//a base DN
|
|
|
|
|
$domain = Helper::getDomainFromURL($this->configuration->ldapHost);
|
|
|
|
|
if(!$domain) {
|
2013-09-27 16:30:59 +00:00
|
|
|
|
return false;
|
|
|
|
|
}
|
2013-09-29 21:53:14 +00:00
|
|
|
|
|
|
|
|
|
$dparts = explode('.', $domain);
|
|
|
|
|
$base2 = implode('dc=', $dparts);
|
|
|
|
|
if($base !== $base2 && $this->testBaseDN($base2)) {
|
|
|
|
|
$this->applyFind('ldap_base', $base2);
|
|
|
|
|
$this->applyFind('ldap_base_users', $base2);
|
|
|
|
|
$this->applyFind('ldap_base_groups', $base2);
|
|
|
|
|
return $this->result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief sets the found value for the configuration key in the WizardResult
|
|
|
|
|
* as well as in the Configuration instance
|
|
|
|
|
* @param $key the configuration key
|
|
|
|
|
* @param $value the (detected) value
|
|
|
|
|
* @return null
|
|
|
|
|
*
|
|
|
|
|
*/
|
|
|
|
|
private function applyFind($key, $value) {
|
|
|
|
|
$this->result->addChange($key, $value);
|
|
|
|
|
$this->configuration->setConfiguration(array($key => $value));
|
2013-09-27 16:30:59 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief Checks, whether a port was entered in the Host configuration
|
|
|
|
|
* field. In this case the port will be stripped off, but also stored as
|
|
|
|
|
* setting.
|
|
|
|
|
*/
|
|
|
|
|
private function checkHost() {
|
|
|
|
|
$host = $this->configuration->ldapHost;
|
|
|
|
|
$hostInfo = parse_url($host);
|
|
|
|
|
|
|
|
|
|
//removes Port from Host
|
|
|
|
|
if(is_array($hostInfo) && isset($hostInfo['port'])) {
|
|
|
|
|
$port = $hostInfo['port'];
|
|
|
|
|
$host = str_replace(':'.$port, '', $host);
|
2013-09-29 21:53:14 +00:00
|
|
|
|
$this->applyFind('ldap_host', $host);
|
|
|
|
|
$this->applyFind('ldap_port', $port);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief Checks whether for a given BaseDN results will be returned
|
|
|
|
|
* @param $base the BaseDN to test
|
|
|
|
|
* @return bool true on success, false otherwise
|
|
|
|
|
*/
|
|
|
|
|
private function testBaseDN($base) {
|
|
|
|
|
$cr = $this->getConnection();
|
|
|
|
|
if(!$cr) {
|
|
|
|
|
throw new \Excpetion('Could not connect to LDAP');
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//base is there, let's validate it. If we search for anything, we should
|
|
|
|
|
//get a result set > 0 on a proper base
|
|
|
|
|
$rr = $this->ldap->search($cr, $base, 'objectClass=*', array('dn'), 0, 1);
|
|
|
|
|
if(!$this->ldap->isResource($rr)) {
|
|
|
|
|
return false;
|
2013-09-27 16:30:59 +00:00
|
|
|
|
}
|
2013-09-29 21:53:14 +00:00
|
|
|
|
$entries = $this->ldap->countEntries($cr, $rr);
|
|
|
|
|
return ($entries !== false) && ($entries > 0);
|
2013-09-27 16:30:59 +00:00
|
|
|
|
}
|
|
|
|
|
|
2013-10-08 09:19:55 +00:00
|
|
|
|
/**
|
|
|
|
|
* @brief Checks whether the server supports memberOf in LDAP Filter.
|
|
|
|
|
* Requires that groups are determined, thus internally called from within
|
|
|
|
|
* determineGroups()
|
|
|
|
|
* @return bool, true if it does, false otherwise
|
|
|
|
|
*/
|
|
|
|
|
private function testMemberOf() {
|
|
|
|
|
$cr = $this->getConnection();
|
|
|
|
|
if(!$cr) {
|
|
|
|
|
throw new \Excpetion('Could not connect to LDAP');
|
|
|
|
|
}
|
|
|
|
|
if(!is_array($this->configuration->ldapBase)
|
|
|
|
|
|| !isset($this->configuration->ldapBase[0])) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
$base = $this->configuration->ldapBase[0];
|
|
|
|
|
$filterPrefix = '(&(objectclass=*)(memberOf=';
|
|
|
|
|
$filterSuffix = '))';
|
|
|
|
|
|
|
|
|
|
foreach($this->resultCache as $dn => $properties) {
|
|
|
|
|
if(!isset($properties['cn'])) {
|
|
|
|
|
//assuming only groups have their cn cached :)
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
$filter = strtolower($filterPrefix . $dn . $filterSuffix);
|
|
|
|
|
$rr = $this->ldap->search($cr, $base, $filter, array('dn'));
|
|
|
|
|
if(!$this->ldap->isResource($rr)) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
$entries = $this->ldap->countEntries($cr, $rr);
|
|
|
|
|
//we do not know which groups are empty, so test any and return
|
|
|
|
|
//success on the first match that returns at least one user
|
|
|
|
|
if(($entries !== false) && ($entries > 0)) {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
2013-09-27 16:30:59 +00:00
|
|
|
|
/**
|
|
|
|
|
* Connects and Binds to an LDAP Server
|
|
|
|
|
* @param $port the port to connect with
|
|
|
|
|
* @param $tls whether startTLS is to be used
|
|
|
|
|
* @return
|
|
|
|
|
*/
|
|
|
|
|
private function connectAndBind($port = 389, $tls = false, $ncc = false) {
|
|
|
|
|
if($ncc) {
|
|
|
|
|
//No certificate check
|
|
|
|
|
//FIXME: undo afterwards
|
|
|
|
|
putenv('LDAPTLS_REQCERT=never');
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//connect, does not really trigger any server communication
|
|
|
|
|
\OCP\Util::writeLog('user_ldap', 'Wiz: Checking Host Info ', \OCP\Util::DEBUG);
|
|
|
|
|
$host = $this->configuration->ldapHost;
|
|
|
|
|
$hostInfo = parse_url($host);
|
|
|
|
|
if(!$hostInfo) {
|
|
|
|
|
throw new \Exception($this->l->t('Invalid Host'));
|
|
|
|
|
}
|
|
|
|
|
if(isset($hostInfo['scheme'])) {
|
|
|
|
|
if(isset($hostInfo['port'])) {
|
|
|
|
|
//problem
|
|
|
|
|
} else {
|
|
|
|
|
$host .= ':' . $port;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
\OCP\Util::writeLog('user_ldap', 'Wiz: Attempting to connect ', \OCP\Util::DEBUG);
|
|
|
|
|
$cr = $this->ldap->connect($host, $port);
|
|
|
|
|
if(!is_resource($cr)) {
|
|
|
|
|
throw new \Exception($this->l->t('Invalid Host'));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
\OCP\Util::writeLog('user_ldap', 'Wiz: Setting LDAP Options ', \OCP\Util::DEBUG);
|
|
|
|
|
//set LDAP options
|
|
|
|
|
if($this->ldap->setOption($cr, LDAP_OPT_PROTOCOL_VERSION, 3)) {
|
|
|
|
|
if($tls) {
|
|
|
|
|
$this->ldap->startTls($cr);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
\OCP\Util::writeLog('user_ldap', 'Wiz: Attemping to Bind ', \OCP\Util::DEBUG);
|
|
|
|
|
//interesting part: do the bind!
|
|
|
|
|
$login = $this->ldap->bind($cr,
|
|
|
|
|
$this->configuration->ldapAgentName,
|
|
|
|
|
$this->configuration->ldapAgentPassword);
|
|
|
|
|
|
|
|
|
|
if($login === true) {
|
|
|
|
|
$this->ldap->unbind($cr);
|
|
|
|
|
if($ncc) {
|
|
|
|
|
throw new \Exception('Certificate cannot be validated.');
|
|
|
|
|
}
|
|
|
|
|
\OCP\Util::writeLog('user_ldap', 'Wiz: Bind succesfull with Port '. $port, \OCP\Util::DEBUG);
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$errno = $this->ldap->errno($cr);
|
|
|
|
|
$error = ldap_error($cr);
|
|
|
|
|
$this->ldap->unbind($cr);
|
|
|
|
|
if($errno === -1 || ($errno === 2 && $ncc)) {
|
|
|
|
|
//host, port or TLS wrong
|
|
|
|
|
return false;
|
|
|
|
|
} else if ($errno === 2) {
|
|
|
|
|
return $this->connectAndBind($port, $tls, true);
|
|
|
|
|
}
|
|
|
|
|
throw new \Exception($error);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private function checkRequirements($reqs) {
|
|
|
|
|
foreach($reqs as $option) {
|
|
|
|
|
$value = $this->configuration->$option;
|
|
|
|
|
if(empty($value)) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
2013-10-04 14:33:37 +00:00
|
|
|
|
/**
|
|
|
|
|
* @brief does a cumulativeSearch on LDAP to get different values of a
|
|
|
|
|
* specified attribute
|
|
|
|
|
* @param $filters array, the filters that shall be used in the search
|
|
|
|
|
* @param $attr the attribute of which a list of values shall be returned
|
|
|
|
|
* @param $lfw bool, whether the last filter is a wildcard which shall not
|
|
|
|
|
* be processed if there were already findings, defaults to true
|
|
|
|
|
* @param $maxF string. if not null, this variable will have the filter that
|
|
|
|
|
* yields most result entries
|
|
|
|
|
* @return mixed, an array with the values on success, false otherwise
|
|
|
|
|
*
|
|
|
|
|
*/
|
|
|
|
|
private function cumulativeSearchOnAttribute($filters, $attr, $lfw = true, &$maxF = null) {
|
|
|
|
|
$dnRead = array();
|
|
|
|
|
$foundItems = array();
|
|
|
|
|
$maxEntries = 0;
|
2013-10-07 16:03:54 +00:00
|
|
|
|
if(!is_array($this->configuration->ldapBase)
|
|
|
|
|
|| !isset($this->configuration->ldapBase[0])) {
|
2013-10-04 14:33:37 +00:00
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
$base = $this->configuration->ldapBase[0];
|
|
|
|
|
$cr = $this->getConnection();
|
|
|
|
|
if(!is_resource($cr)) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
foreach($filters as $filter) {
|
|
|
|
|
if($lfw && count($foundItems) > 0) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
$rr = $this->ldap->search($cr, $base, $filter, array($attr));
|
|
|
|
|
if(!$this->ldap->isResource($rr)) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
$entries = $this->ldap->countEntries($cr, $rr);
|
|
|
|
|
$getEntryFunc = 'firstEntry';
|
|
|
|
|
if(($entries !== false) && ($entries > 0)) {
|
|
|
|
|
if(!is_null($maxF) && $entries > $maxEntries) {
|
|
|
|
|
$maxEntries = $entries;
|
|
|
|
|
$maxF = $filter;
|
|
|
|
|
}
|
|
|
|
|
do {
|
|
|
|
|
$entry = $this->ldap->$getEntryFunc($cr, $rr);
|
|
|
|
|
if(!$this->ldap->isResource($entry)) {
|
|
|
|
|
continue 2;
|
|
|
|
|
}
|
|
|
|
|
$attributes = $this->ldap->getAttributes($cr, $entry);
|
|
|
|
|
$dn = $this->ldap->getDN($cr, $entry);
|
|
|
|
|
if($dn === false || in_array($dn, $dnRead)) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
2013-10-07 23:19:37 +00:00
|
|
|
|
$newItems = array();
|
2013-10-04 14:33:37 +00:00
|
|
|
|
$state = $this->getAttributeValuesFromEntry($attributes,
|
|
|
|
|
$attr,
|
2013-10-07 23:19:37 +00:00
|
|
|
|
$newItems);
|
|
|
|
|
$foundItems = array_merge($foundItems, $newItems);
|
|
|
|
|
$this->resultCache[$dn][$attr] = $newItems;
|
2013-10-04 14:33:37 +00:00
|
|
|
|
$dnRead[] = $dn;
|
|
|
|
|
$getEntryFunc = 'nextEntry';
|
|
|
|
|
$rr = $entry; //will be expected by nextEntry next round
|
|
|
|
|
} while($state === self::LRESULT_PROCESSED_SKIP
|
|
|
|
|
|| $this->ldap->isResource($entry));
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2013-10-07 23:19:37 +00:00
|
|
|
|
return array_unique($foundItems);
|
2013-10-04 14:33:37 +00:00
|
|
|
|
}
|
|
|
|
|
|
2013-10-07 15:56:45 +00:00
|
|
|
|
/**
|
|
|
|
|
* @brief determines if and which $attr are available on the LDAP server
|
|
|
|
|
* @param $objectclasses the objectclasses to use as search filter
|
|
|
|
|
* @param $attr the attribute to look for
|
|
|
|
|
* @param $dbkey the dbkey of the setting the feature is connected to
|
|
|
|
|
* @param $confkey the confkey counterpart for the $dbkey as used in the
|
|
|
|
|
* Configuration class
|
|
|
|
|
* @param $po boolean, whether the objectClass with most result entries
|
|
|
|
|
* shall be pre-selected via the result
|
2013-10-07 23:19:37 +00:00
|
|
|
|
* @returns array, list of found items.
|
2013-10-07 15:56:45 +00:00
|
|
|
|
*/
|
|
|
|
|
private function determineFeature($objectclasses, $attr, $dbkey, $confkey, $po = false) {
|
|
|
|
|
$cr = $this->getConnection();
|
|
|
|
|
if(!$cr) {
|
|
|
|
|
throw new \Excpetion('Could not connect to LDAP');
|
|
|
|
|
}
|
|
|
|
|
$p = 'objectclass=';
|
|
|
|
|
foreach($objectclasses as $key => $value) {
|
|
|
|
|
$objectclasses[$key] = $p.$value;
|
|
|
|
|
}
|
|
|
|
|
$maxEntryObjC = '';
|
|
|
|
|
$availableFeatures =
|
|
|
|
|
$this->cumulativeSearchOnAttribute($objectclasses, $attr,
|
|
|
|
|
true, $maxEntryObjC);
|
|
|
|
|
if(is_array($availableFeatures)
|
|
|
|
|
&& count($availableFeatures) > 0) {
|
2013-10-08 09:19:55 +00:00
|
|
|
|
natcasesort($availableFeatures);
|
|
|
|
|
//natcasesort keeps indices, but we must get rid of them for proper
|
|
|
|
|
//sorting in the web UI. Therefore: array_values
|
|
|
|
|
$this->result->addOptions($dbkey, array_values($availableFeatures));
|
2013-10-07 15:56:45 +00:00
|
|
|
|
} else {
|
|
|
|
|
throw new \Exception(self::$l->t('Could not find the desired feature'));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$setFeatures = $this->configuration->$confkey;
|
|
|
|
|
if(is_array($setFeatures) && !empty($setFeatures)) {
|
|
|
|
|
//something is already configured? pre-select it.
|
|
|
|
|
$this->result->addChange($dbkey, $setFeatures);
|
|
|
|
|
} else if($po && !empty($maxEntryObjC)) {
|
|
|
|
|
//pre-select objectclass with most result entries
|
|
|
|
|
$maxEntryObjC = str_replace($p, '', $maxEntryObjC);
|
|
|
|
|
$this->result->addChange($dbkey, $maxEntryObjC);
|
|
|
|
|
}
|
|
|
|
|
|
2013-10-07 23:19:37 +00:00
|
|
|
|
return $availableFeatures;
|
2013-10-07 15:56:45 +00:00
|
|
|
|
}
|
|
|
|
|
|
2013-10-04 14:33:37 +00:00
|
|
|
|
/**
|
|
|
|
|
* @brief appends a list of values fr
|
|
|
|
|
* @param $result resource, the return value from ldap_get_attributes
|
|
|
|
|
* @param $attribute string, the attribute values to look for
|
|
|
|
|
* @param &$known array, new values will be appended here
|
|
|
|
|
* @return int, state on of the class constants LRESULT_PROCESSED_OK,
|
|
|
|
|
* LRESULT_PROCESSED_INVALID or LRESULT_PROCESSED_SKIP
|
|
|
|
|
*/
|
|
|
|
|
private function getAttributeValuesFromEntry($result, $attribute, &$known) {
|
|
|
|
|
if(!is_array($result)
|
|
|
|
|
|| !isset($result['count'])
|
|
|
|
|
|| !$result['count'] > 0) {
|
|
|
|
|
return self::LRESULT_PROCESSED_INVALID;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//strtolower on all keys for proper comparison
|
|
|
|
|
$result = \OCP\Util::mb_array_change_key_case($result);
|
|
|
|
|
$attribute = strtolower($attribute);
|
|
|
|
|
if(isset($result[$attribute])) {
|
|
|
|
|
foreach($result[$attribute] as $key => $val) {
|
|
|
|
|
if($key === 'count') {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
if(!in_array($val, $known)) {
|
|
|
|
|
$known[] = $val;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return self::LRESULT_PROCESSED_OK;
|
|
|
|
|
} else {
|
|
|
|
|
return self::LRESULT_PROCESSED_SKIP;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2013-09-27 16:30:59 +00:00
|
|
|
|
private function getConnection() {
|
2013-10-07 23:19:37 +00:00
|
|
|
|
if(!is_null($this->cr)) {
|
|
|
|
|
return $cr;
|
|
|
|
|
}
|
2013-09-27 16:30:59 +00:00
|
|
|
|
$cr = $this->ldap->connect(
|
|
|
|
|
$this->configuration->ldapHost.':'.$this->configuration->ldapPort,
|
|
|
|
|
$this->configuration->ldapPort);
|
|
|
|
|
|
|
|
|
|
if($this->ldap->setOption($cr, LDAP_OPT_PROTOCOL_VERSION, 3)) {
|
|
|
|
|
if($this->configuration->ldapTLS === 1) {
|
|
|
|
|
$this->ldap->startTls($cr);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$lo = @$this->ldap->bind($cr,
|
|
|
|
|
$this->configuration->ldapAgentName,
|
|
|
|
|
$this->configuration->ldapAgentPassword);
|
|
|
|
|
if($lo === true) {
|
2013-10-07 23:19:37 +00:00
|
|
|
|
$this->$cr = $cr;
|
2013-09-27 16:30:59 +00:00
|
|
|
|
return $cr;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private function getDefaultLdapPortSettings() {
|
|
|
|
|
static $settings = array(
|
|
|
|
|
array('port' => 7636, 'tls' => false),
|
|
|
|
|
array('port' => 636, 'tls' => false),
|
|
|
|
|
array('port' => 7389, 'tls' => true),
|
|
|
|
|
array('port' => 389, 'tls' => true),
|
|
|
|
|
array('port' => 7389, 'tls' => false),
|
|
|
|
|
array('port' => 389, 'tls' => false),
|
|
|
|
|
);
|
|
|
|
|
return $settings;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private function getPortSettingsToTry() {
|
|
|
|
|
//389 ← LDAP / Unencrypted or StartTLS
|
|
|
|
|
//636 ← LDAPS / SSL
|
|
|
|
|
//7xxx ← UCS. need to be checked first, because both ports may be open
|
|
|
|
|
$host = $this->configuration->ldapHost;
|
|
|
|
|
$port = intval($this->configuration->ldapPort);
|
|
|
|
|
$portSettings = array();
|
|
|
|
|
|
|
|
|
|
//In case the port is already provided, we will check this first
|
|
|
|
|
if($port > 0) {
|
|
|
|
|
$hostInfo = parse_url($host);
|
|
|
|
|
if(is_array($hostInfo)
|
|
|
|
|
&& isset($hostInfo['scheme'])
|
|
|
|
|
&& stripos($hostInfo['scheme'], 'ldaps') === false) {
|
|
|
|
|
$portSettings[] = array('port' => $port, 'tls' => true);
|
|
|
|
|
}
|
|
|
|
|
$portSettings[] =array('port' => $port, 'tls' => false);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//default ports
|
|
|
|
|
$portSettings = array_merge($portSettings,
|
|
|
|
|
$this->getDefaultLdapPortSettings());
|
|
|
|
|
|
|
|
|
|
return $portSettings;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
}
|