|
|
|
|
@ -23,6 +23,10 @@
|
|
|
|
|
|
|
|
|
|
namespace OCA\user_ldap\lib;
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Class Access
|
|
|
|
|
* @package OCA\user_ldap\lib
|
|
|
|
|
*/
|
|
|
|
|
class Access extends LDAPUtility {
|
|
|
|
|
public $connection;
|
|
|
|
|
//never ever check this var directly, always use getPagedSearchResultState
|
|
|
|
|
@ -30,24 +34,30 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
protected $cookies = array();
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @param Connection $connection
|
|
|
|
|
* @param ILDAPWrapper $ldap
|
|
|
|
|
*/
|
|
|
|
|
public function __construct(Connection $connection, ILDAPWrapper $ldap) {
|
|
|
|
|
parent::__construct($ldap);
|
|
|
|
|
$this->connection = $connection;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @return bool
|
|
|
|
|
*/
|
|
|
|
|
private function checkConnection() {
|
|
|
|
|
return ($this->connection instanceof Connection);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief reads a given attribute for an LDAP record identified by a DN
|
|
|
|
|
* @param $dn the record in question
|
|
|
|
|
* @param $attr the attribute that shall be retrieved
|
|
|
|
|
* @param string $dn the record in question
|
|
|
|
|
* @param string $attr the attribute that shall be retrieved
|
|
|
|
|
* if empty, just check the record's existence
|
|
|
|
|
* @returns an array of values on success or an empty
|
|
|
|
|
* @param string $filter
|
|
|
|
|
* @return array|false an array of values on success or an empty
|
|
|
|
|
* array if $attr is empty, false otherwise
|
|
|
|
|
*
|
|
|
|
|
* Reads an attribute from an LDAP entry or check if entry exists
|
|
|
|
|
*/
|
|
|
|
|
public function readAttribute($dn, $attr, $filter = 'objectClass=*') {
|
|
|
|
|
if(!$this->checkConnection()) {
|
|
|
|
|
@ -105,7 +115,7 @@ class Access extends LDAPUtility {
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief checks wether the given attribute`s valua is probably a DN
|
|
|
|
|
* @brief checks whether the given attributes value is probably a DN
|
|
|
|
|
* @param string $attr the attribute in question
|
|
|
|
|
* @return boolean if so true, otherwise false
|
|
|
|
|
*/
|
|
|
|
|
@ -120,8 +130,8 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief sanitizes a DN received from the LDAP server
|
|
|
|
|
* @param $dn the DN in question
|
|
|
|
|
* @return the sanitized DN
|
|
|
|
|
* @param array $dn the DN in question
|
|
|
|
|
* @return array the sanitized DN
|
|
|
|
|
*/
|
|
|
|
|
private function sanitizeDN($dn) {
|
|
|
|
|
//treating multiple base DNs
|
|
|
|
|
@ -163,7 +173,8 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* gives back the database table for the query
|
|
|
|
|
* @param boolean $isUser
|
|
|
|
|
* @param bool $isUser
|
|
|
|
|
* @return string
|
|
|
|
|
*/
|
|
|
|
|
private function getMapTable($isUser) {
|
|
|
|
|
if($isUser) {
|
|
|
|
|
@ -176,9 +187,7 @@ class Access extends LDAPUtility {
|
|
|
|
|
/**
|
|
|
|
|
* @brief returns the LDAP DN for the given internal ownCloud name of the group
|
|
|
|
|
* @param string $name the ownCloud name in question
|
|
|
|
|
* @returns string with the LDAP DN on success, otherwise false
|
|
|
|
|
*
|
|
|
|
|
* returns the LDAP DN for the given internal ownCloud name of the group
|
|
|
|
|
* @return string with the LDAP DN on success, otherwise false
|
|
|
|
|
*/
|
|
|
|
|
public function groupname2dn($name) {
|
|
|
|
|
$dn = $this->ocname2dn($name, false);
|
|
|
|
|
@ -192,10 +201,8 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief returns the LDAP DN for the given internal ownCloud name of the user
|
|
|
|
|
* @param $name the ownCloud name in question
|
|
|
|
|
* @returns string with the LDAP DN on success, otherwise false
|
|
|
|
|
*
|
|
|
|
|
* returns the LDAP DN for the given internal ownCloud name of the user
|
|
|
|
|
* @param string $name the ownCloud name in question
|
|
|
|
|
* @return string with the LDAP DN on success, otherwise false
|
|
|
|
|
*/
|
|
|
|
|
public function username2dn($name) {
|
|
|
|
|
$dn = $this->ocname2dn($name, true);
|
|
|
|
|
@ -210,11 +217,9 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief returns the LDAP DN for the given internal ownCloud name
|
|
|
|
|
* @param $name the ownCloud name in question
|
|
|
|
|
* @param string $name the ownCloud name in question
|
|
|
|
|
* @param boolean $isUser is it a user? otherwise group
|
|
|
|
|
* @returns string with the LDAP DN on success, otherwise false
|
|
|
|
|
*
|
|
|
|
|
* returns the LDAP DN for the given internal ownCloud name
|
|
|
|
|
* @return string with the LDAP DN on success, otherwise false
|
|
|
|
|
*/
|
|
|
|
|
private function ocname2dn($name, $isUser) {
|
|
|
|
|
$table = $this->getMapTable($isUser);
|
|
|
|
|
@ -230,15 +235,12 @@ class Access extends LDAPUtility {
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief returns the internal ownCloud name for the given LDAP DN of the group
|
|
|
|
|
* @param $dn the dn of the group object
|
|
|
|
|
* @param $ldapname optional, the display name of the object
|
|
|
|
|
* @returns string with with the name to use in ownCloud, false on DN outside of search DN
|
|
|
|
|
*
|
|
|
|
|
* returns the internal ownCloud name for the given LDAP DN of the
|
|
|
|
|
* group, false on DN outside of search DN or failure
|
|
|
|
|
* @brief returns the internal ownCloud name for the given LDAP DN of the group, false on DN outside of search DN or failure
|
|
|
|
|
* @param string $dn the dn of the group object
|
|
|
|
|
* @param string $ldapName optional, the display name of the object
|
|
|
|
|
* @return string with the name to use in ownCloud, false on DN outside of search DN
|
|
|
|
|
*/
|
|
|
|
|
public function dn2groupname($dn, $ldapname = null) {
|
|
|
|
|
public function dn2groupname($dn, $ldapName = null) {
|
|
|
|
|
//To avoid bypassing the base DN settings under certain circumstances
|
|
|
|
|
//with the group support, check whether the provided DN matches one of
|
|
|
|
|
//the given Bases
|
|
|
|
|
@ -246,18 +248,16 @@ class Access extends LDAPUtility {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $this->dn2ocname($dn, $ldapname, false);
|
|
|
|
|
return $this->dn2ocname($dn, $ldapName, false);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief returns the internal ownCloud name for the given LDAP DN of the user
|
|
|
|
|
* @param $dn the dn of the user object
|
|
|
|
|
* @param $ldapname optional, the display name of the object
|
|
|
|
|
* @returns string with with the name to use in ownCloud
|
|
|
|
|
*
|
|
|
|
|
* returns the internal ownCloud name for the given LDAP DN of the user, false on DN outside of search DN or failure
|
|
|
|
|
* @brief returns the internal ownCloud name for the given LDAP DN of the user, false on DN outside of search DN or failure
|
|
|
|
|
* @param string $dn the dn of the user object
|
|
|
|
|
* @param string $ldapName optional, the display name of the object
|
|
|
|
|
* @return string with with the name to use in ownCloud
|
|
|
|
|
*/
|
|
|
|
|
public function dn2username($dn, $ldapname = null) {
|
|
|
|
|
public function dn2username($dn, $ldapName = null) {
|
|
|
|
|
//To avoid bypassing the base DN settings under certain circumstances
|
|
|
|
|
//with the group support, check whether the provided DN matches one of
|
|
|
|
|
//the given Bases
|
|
|
|
|
@ -265,19 +265,17 @@ class Access extends LDAPUtility {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $this->dn2ocname($dn, $ldapname, true);
|
|
|
|
|
return $this->dn2ocname($dn, $ldapName, true);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief returns an internal ownCloud name for the given LDAP DN
|
|
|
|
|
* @param $dn the dn of the user object
|
|
|
|
|
* @param $ldapname optional, the display name of the object
|
|
|
|
|
* @param $isUser optional, wether it is a user object (otherwise group assumed)
|
|
|
|
|
* @returns string with with the name to use in ownCloud
|
|
|
|
|
*
|
|
|
|
|
* returns the internal ownCloud name for the given LDAP DN of the user, false on DN outside of search DN
|
|
|
|
|
* @brief returns an internal ownCloud name for the given LDAP DN, false on DN outside of search DN
|
|
|
|
|
* @param string $dn the dn of the user object
|
|
|
|
|
* @param string $ldapName optional, the display name of the object
|
|
|
|
|
* @param bool $isUser optional, whether it is a user object (otherwise group assumed)
|
|
|
|
|
* @return string with with the name to use in ownCloud
|
|
|
|
|
*/
|
|
|
|
|
public function dn2ocname($dn, $ldapname = null, $isUser = true) {
|
|
|
|
|
public function dn2ocname($dn, $ldapName = null, $isUser = true) {
|
|
|
|
|
$table = $this->getMapTable($isUser);
|
|
|
|
|
if($isUser) {
|
|
|
|
|
$fncFindMappedName = 'findMappedUser';
|
|
|
|
|
@ -288,9 +286,9 @@ class Access extends LDAPUtility {
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//let's try to retrieve the ownCloud name from the mappings table
|
|
|
|
|
$ocname = $this->$fncFindMappedName($dn);
|
|
|
|
|
if($ocname) {
|
|
|
|
|
return $ocname;
|
|
|
|
|
$ocName = $this->$fncFindMappedName($dn);
|
|
|
|
|
if($ocName) {
|
|
|
|
|
return $ocName;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//second try: get the UUID and check if it is known. Then, update the DN and return the name.
|
|
|
|
|
@ -317,13 +315,13 @@ class Access extends LDAPUtility {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(is_null($ldapname)) {
|
|
|
|
|
$ldapname = $this->readAttribute($dn, $nameAttribute);
|
|
|
|
|
if(!isset($ldapname[0]) && empty($ldapname[0])) {
|
|
|
|
|
if(is_null($ldapName)) {
|
|
|
|
|
$ldapName = $this->readAttribute($dn, $nameAttribute);
|
|
|
|
|
if(!isset($ldapName[0]) && empty($ldapName[0])) {
|
|
|
|
|
\OCP\Util::writeLog('user_ldap', 'No or empty name for '.$dn.'.', \OCP\Util::INFO);
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
$ldapname = $ldapname[0];
|
|
|
|
|
$ldapName = $ldapName[0];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if($isUser) {
|
|
|
|
|
@ -334,27 +332,27 @@ class Access extends LDAPUtility {
|
|
|
|
|
} else {
|
|
|
|
|
$username = $uuid;
|
|
|
|
|
}
|
|
|
|
|
$intname = $this->sanitizeUsername($username);
|
|
|
|
|
$intName = $this->sanitizeUsername($username);
|
|
|
|
|
} else {
|
|
|
|
|
$intname = $ldapname;
|
|
|
|
|
$intName = $ldapName;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//a new user/group! Add it only if it doesn't conflict with other backend's users or existing groups
|
|
|
|
|
//disabling Cache is required to avoid that the new user is cached as not-existing in fooExists check
|
|
|
|
|
$originalTTL = $this->connection->ldapCacheTTL;
|
|
|
|
|
$this->connection->setConfiguration(array('ldapCacheTTL' => 0));
|
|
|
|
|
if(($isUser && !\OCP\User::userExists($intname))
|
|
|
|
|
|| (!$isUser && !\OC_Group::groupExists($intname))) {
|
|
|
|
|
if($this->mapComponent($dn, $intname, $isUser)) {
|
|
|
|
|
if(($isUser && !\OCP\User::userExists($intName))
|
|
|
|
|
|| (!$isUser && !\OC_Group::groupExists($intName))) {
|
|
|
|
|
if($this->mapComponent($dn, $intName, $isUser)) {
|
|
|
|
|
$this->connection->setConfiguration(array('ldapCacheTTL' => $originalTTL));
|
|
|
|
|
return $intname;
|
|
|
|
|
return $intName;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
$this->connection->setConfiguration(array('ldapCacheTTL' => $originalTTL));
|
|
|
|
|
|
|
|
|
|
$altname = $this->createAltInternalOwnCloudName($intname, $isUser);
|
|
|
|
|
if($this->mapComponent($dn, $altname, $isUser)) {
|
|
|
|
|
return $altname;
|
|
|
|
|
$altName = $this->createAltInternalOwnCloudName($intName, $isUser);
|
|
|
|
|
if($this->mapComponent($dn, $altName, $isUser)) {
|
|
|
|
|
return $altName;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//if everything else did not help..
|
|
|
|
|
@ -364,8 +362,8 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief gives back the user names as they are used ownClod internally
|
|
|
|
|
* @param $ldapGroups an array with the ldap Users result in style of array ( array ('dn' => foo, 'uid' => bar), ... )
|
|
|
|
|
* @returns an array with the user names to use in ownCloud
|
|
|
|
|
* @param array $ldapUsers an array with the ldap Users result in style of array ( array ('dn' => foo, 'uid' => bar), ... )
|
|
|
|
|
* @return array an array with the user names to use in ownCloud
|
|
|
|
|
*
|
|
|
|
|
* gives back the user names as they are used ownClod internally
|
|
|
|
|
*/
|
|
|
|
|
@ -375,8 +373,8 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief gives back the group names as they are used ownClod internally
|
|
|
|
|
* @param $ldapGroups an array with the ldap Groups result in style of array ( array ('dn' => foo, 'cn' => bar), ... )
|
|
|
|
|
* @returns an array with the group names to use in ownCloud
|
|
|
|
|
* @param array $ldapGroups an array with the ldap Groups result in style of array ( array ('dn' => foo, 'cn' => bar), ... )
|
|
|
|
|
* @return array an array with the group names to use in ownCloud
|
|
|
|
|
*
|
|
|
|
|
* gives back the group names as they are used ownClod internally
|
|
|
|
|
*/
|
|
|
|
|
@ -384,6 +382,10 @@ class Access extends LDAPUtility {
|
|
|
|
|
return $this->ldap2ownCloudNames($ldapGroups, false);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @param $dn
|
|
|
|
|
* @return bool|string
|
|
|
|
|
*/
|
|
|
|
|
private function findMappedUser($dn) {
|
|
|
|
|
static $query = null;
|
|
|
|
|
if(is_null($query)) {
|
|
|
|
|
@ -400,6 +402,10 @@ class Access extends LDAPUtility {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @param $dn
|
|
|
|
|
* @return bool|string
|
|
|
|
|
*/
|
|
|
|
|
private function findMappedGroup($dn) {
|
|
|
|
|
static $query = null;
|
|
|
|
|
if(is_null($query)) {
|
|
|
|
|
@ -416,9 +422,10 @@ class Access extends LDAPUtility {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @param boolean $isUsers
|
|
|
|
|
* @param $ldapObjects
|
|
|
|
|
* @param bool $isUsers
|
|
|
|
|
* @return array
|
|
|
|
|
*/
|
|
|
|
|
private function ldap2ownCloudNames($ldapObjects, $isUsers) {
|
|
|
|
|
if($isUsers) {
|
|
|
|
|
@ -430,13 +437,13 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
foreach($ldapObjects as $ldapObject) {
|
|
|
|
|
$nameByLDAP = isset($ldapObject[$nameAttribute]) ? $ldapObject[$nameAttribute] : null;
|
|
|
|
|
$ocname = $this->dn2ocname($ldapObject['dn'], $nameByLDAP, $isUsers);
|
|
|
|
|
if($ocname) {
|
|
|
|
|
$ownCloudNames[] = $ocname;
|
|
|
|
|
$ocName = $this->dn2ocname($ldapObject['dn'], $nameByLDAP, $isUsers);
|
|
|
|
|
if($ocName) {
|
|
|
|
|
$ownCloudNames[] = $ocName;
|
|
|
|
|
if($isUsers) {
|
|
|
|
|
//cache the user names so it does not need to be retrieved
|
|
|
|
|
//again later (e.g. sharing dialogue).
|
|
|
|
|
$this->cacheUserDisplayName($ocname, $nameByLDAP);
|
|
|
|
|
$this->cacheUserDisplayName($ocName, $nameByLDAP);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
continue;
|
|
|
|
|
@ -446,18 +453,18 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief caches the user display name
|
|
|
|
|
* @param string the internal owncloud username
|
|
|
|
|
* @param string the display name
|
|
|
|
|
* @param string $ocName the internal ownCloud username
|
|
|
|
|
* @param string $displayName the display name
|
|
|
|
|
*/
|
|
|
|
|
public function cacheUserDisplayName($ocname, $displayName) {
|
|
|
|
|
public function cacheUserDisplayName($ocName, $displayName) {
|
|
|
|
|
$cacheKeyTrunk = 'getDisplayName';
|
|
|
|
|
$this->connection->writeToCache($cacheKeyTrunk.$ocname, $displayName);
|
|
|
|
|
$this->connection->writeToCache($cacheKeyTrunk.$ocName, $displayName);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief creates a unique name for internal ownCloud use for users. Don't call it directly.
|
|
|
|
|
* @param $name the display name of the object
|
|
|
|
|
* @returns string with with the name to use in ownCloud or false if unsuccessful
|
|
|
|
|
* @param string $name the display name of the object
|
|
|
|
|
* @return string with with the name to use in ownCloud or false if unsuccessful
|
|
|
|
|
*
|
|
|
|
|
* Instead of using this method directly, call
|
|
|
|
|
* createAltInternalOwnCloudName($name, true)
|
|
|
|
|
@ -478,8 +485,8 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief creates a unique name for internal ownCloud use for groups. Don't call it directly.
|
|
|
|
|
* @param $name the display name of the object
|
|
|
|
|
* @returns string with with the name to use in ownCloud or false if unsuccessful.
|
|
|
|
|
* @param string $name the display name of the object
|
|
|
|
|
* @return string with with the name to use in ownCloud or false if unsuccessful.
|
|
|
|
|
*
|
|
|
|
|
* Instead of using this method directly, call
|
|
|
|
|
* createAltInternalOwnCloudName($name, false)
|
|
|
|
|
@ -504,17 +511,17 @@ class Access extends LDAPUtility {
|
|
|
|
|
$lastNo = 1; //will become name_2
|
|
|
|
|
} else {
|
|
|
|
|
natsort($usedNames);
|
|
|
|
|
$lastname = array_pop($usedNames);
|
|
|
|
|
$lastNo = intval(substr($lastname, strrpos($lastname, '_') + 1));
|
|
|
|
|
$lastName = array_pop($usedNames);
|
|
|
|
|
$lastNo = intval(substr($lastName, strrpos($lastName, '_') + 1));
|
|
|
|
|
}
|
|
|
|
|
$altName = $name.'_'.strval($lastNo+1);
|
|
|
|
|
unset($usedNames);
|
|
|
|
|
|
|
|
|
|
$attempts = 1;
|
|
|
|
|
while($attempts < 21){
|
|
|
|
|
//Pro forma check to be really sure it is unique
|
|
|
|
|
//while loop is just a precaution. If a name is not generated within
|
|
|
|
|
//20 attempts, something else is very wrong. Avoids infinite loop.
|
|
|
|
|
// Check to be really sure it is unique
|
|
|
|
|
// while loop is just a precaution. If a name is not generated within
|
|
|
|
|
// 20 attempts, something else is very wrong. Avoids infinite loop.
|
|
|
|
|
if(!\OC_Group::groupExists($altName)) {
|
|
|
|
|
return $altName;
|
|
|
|
|
}
|
|
|
|
|
@ -526,9 +533,9 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief creates a unique name for internal ownCloud use.
|
|
|
|
|
* @param $name the display name of the object
|
|
|
|
|
* @param string $name the display name of the object
|
|
|
|
|
* @param boolean $isUser whether name should be created for a user (true) or a group (false)
|
|
|
|
|
* @returns string with with the name to use in ownCloud or false if unsuccessful
|
|
|
|
|
* @return string with with the name to use in ownCloud or false if unsuccessful
|
|
|
|
|
*/
|
|
|
|
|
private function createAltInternalOwnCloudName($name, $isUser) {
|
|
|
|
|
$originalTTL = $this->connection->ldapCacheTTL;
|
|
|
|
|
@ -545,7 +552,7 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief retrieves all known groups from the mappings table
|
|
|
|
|
* @returns array with the results
|
|
|
|
|
* @return array with the results
|
|
|
|
|
*
|
|
|
|
|
* retrieves all known groups from the mappings table
|
|
|
|
|
*/
|
|
|
|
|
@ -555,7 +562,7 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief retrieves all known users from the mappings table
|
|
|
|
|
* @returns array with the results
|
|
|
|
|
* @return array with the results
|
|
|
|
|
*
|
|
|
|
|
* retrieves all known users from the mappings table
|
|
|
|
|
*/
|
|
|
|
|
@ -579,19 +586,19 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief inserts a new user or group into the mappings table
|
|
|
|
|
* @param $dn the record in question
|
|
|
|
|
* @param $ocname the name to use in ownCloud
|
|
|
|
|
* @param $isUser is it a user or a group?
|
|
|
|
|
* @returns true on success, false otherwise
|
|
|
|
|
* @param string $dn the record in question
|
|
|
|
|
* @param string $ocName the name to use in ownCloud
|
|
|
|
|
* @param bool $isUser is it a user or a group?
|
|
|
|
|
* @return bool true on success, false otherwise
|
|
|
|
|
*
|
|
|
|
|
* inserts a new user or group into the mappings table
|
|
|
|
|
*/
|
|
|
|
|
private function mapComponent($dn, $ocname, $isUser = true) {
|
|
|
|
|
private function mapComponent($dn, $ocName, $isUser = true) {
|
|
|
|
|
$table = $this->getMapTable($isUser);
|
|
|
|
|
|
|
|
|
|
$sqlAdjustment = '';
|
|
|
|
|
$dbtype = \OCP\Config::getSystemValue('dbtype');
|
|
|
|
|
if($dbtype === 'mysql') {
|
|
|
|
|
$dbType = \OCP\Config::getSystemValue('dbtype');
|
|
|
|
|
if($dbType === 'mysql') {
|
|
|
|
|
$sqlAdjustment = 'FROM DUAL';
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@ -607,9 +614,9 @@ class Access extends LDAPUtility {
|
|
|
|
|
');
|
|
|
|
|
|
|
|
|
|
//feed the DB
|
|
|
|
|
$insRows = $insert->execute(array($dn, $ocname,
|
|
|
|
|
$insRows = $insert->execute(array($dn, $ocName,
|
|
|
|
|
$this->getUUID($dn, $isUser), $dn,
|
|
|
|
|
$ocname));
|
|
|
|
|
$ocName));
|
|
|
|
|
|
|
|
|
|
if(\OCP\DB::isError($insRows)) {
|
|
|
|
|
return false;
|
|
|
|
|
@ -623,24 +630,31 @@ class Access extends LDAPUtility {
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @param integer $limit
|
|
|
|
|
* @param integer $offset
|
|
|
|
|
* @param $filter
|
|
|
|
|
* @param $attr
|
|
|
|
|
* @param int $limit
|
|
|
|
|
* @param int $offset
|
|
|
|
|
* @return array
|
|
|
|
|
*/
|
|
|
|
|
public function fetchListOfUsers($filter, $attr, $limit = null, $offset = null) {
|
|
|
|
|
return $this->fetchList($this->searchUsers($filter, $attr, $limit, $offset), (count($attr) > 1));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @param string $filter
|
|
|
|
|
* @param integer $limit
|
|
|
|
|
* @param integer $offset
|
|
|
|
|
* @param $filter
|
|
|
|
|
* @param $attr
|
|
|
|
|
* @param int $limit
|
|
|
|
|
* @param int $offset
|
|
|
|
|
* @return array
|
|
|
|
|
*/
|
|
|
|
|
public function fetchListOfGroups($filter, $attr, $limit = null, $offset = null) {
|
|
|
|
|
return $this->fetchList($this->searchGroups($filter, $attr, $limit, $offset), (count($attr) > 1));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @param boolean $manyAttributes
|
|
|
|
|
* @param $list
|
|
|
|
|
* @param bool $manyAttributes
|
|
|
|
|
* @return array
|
|
|
|
|
*/
|
|
|
|
|
private function fetchList($list, $manyAttributes) {
|
|
|
|
|
if(is_array($list)) {
|
|
|
|
|
@ -657,11 +671,11 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief executes an LDAP search, optimized for Users
|
|
|
|
|
* @param $filter the LDAP filter for the search
|
|
|
|
|
* @param $attr optional, when a certain attribute shall be filtered out
|
|
|
|
|
* @param string $filter the LDAP filter for the search
|
|
|
|
|
* @param string $attr optional, when a certain attribute shall be filtered out
|
|
|
|
|
* @param integer $limit
|
|
|
|
|
* @param integer $offset
|
|
|
|
|
* @returns array with the search result
|
|
|
|
|
* @return array with the search result
|
|
|
|
|
*
|
|
|
|
|
* Executes an LDAP search
|
|
|
|
|
*/
|
|
|
|
|
@ -671,6 +685,10 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @param string $filter
|
|
|
|
|
* @param array $attr
|
|
|
|
|
* @param int $limit
|
|
|
|
|
* @param int $offset
|
|
|
|
|
* @return false|int
|
|
|
|
|
*/
|
|
|
|
|
public function countUsers($filter, $attr = array('dn'), $limit = null, $offset = null) {
|
|
|
|
|
return $this->count($filter, $this->connection->ldapBaseUsers, $attr, $limit, $offset);
|
|
|
|
|
@ -679,10 +697,10 @@ class Access extends LDAPUtility {
|
|
|
|
|
/**
|
|
|
|
|
* @brief executes an LDAP search, optimized for Groups
|
|
|
|
|
* @param string $filter the LDAP filter for the search
|
|
|
|
|
* @param $attr optional, when a certain attribute shall be filtered out
|
|
|
|
|
* @param string $attr optional, when a certain attribute shall be filtered out
|
|
|
|
|
* @param integer $limit
|
|
|
|
|
* @param integer $offset
|
|
|
|
|
* @returns array with the search result
|
|
|
|
|
* @return array with the search result
|
|
|
|
|
*
|
|
|
|
|
* Executes an LDAP search
|
|
|
|
|
*/
|
|
|
|
|
@ -692,13 +710,13 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief prepares and executes an LDAP search operation
|
|
|
|
|
* @param $filter the LDAP filter for the search
|
|
|
|
|
* @param $base an array containing the LDAP subtree(s) that shall be searched
|
|
|
|
|
* @param $attr optional, array, one or more attributes that shall be
|
|
|
|
|
* @param string $filter the LDAP filter for the search
|
|
|
|
|
* @param array $base an array containing the LDAP subtree(s) that shall be searched
|
|
|
|
|
* @param array $attr optional, array, one or more attributes that shall be
|
|
|
|
|
* retrieved. Results will according to the order in the array.
|
|
|
|
|
* @param $limit optional, maximum results to be counted
|
|
|
|
|
* @param $offset optional, a starting point
|
|
|
|
|
* @returns array with the search result as first value and pagedSearchOK as
|
|
|
|
|
* @param int $limit optional, maximum results to be counted
|
|
|
|
|
* @param int $offset optional, a starting point
|
|
|
|
|
* @return array|false array with the search result as first value and pagedSearchOK as
|
|
|
|
|
* second | false if not successful
|
|
|
|
|
*/
|
|
|
|
|
private function executeSearch($filter, $base, &$attr = null, $limit = null, $offset = null) {
|
|
|
|
|
@ -715,7 +733,7 @@ class Access extends LDAPUtility {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//check wether paged search should be attempted
|
|
|
|
|
//check whether paged search should be attempted
|
|
|
|
|
$pagedSearchOK = $this->initPagedSearch($filter, $base, $attr, $limit, $offset);
|
|
|
|
|
|
|
|
|
|
$linkResources = array_pad(array(), count($base), $cr);
|
|
|
|
|
@ -738,16 +756,16 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief processes an LDAP paged search operation
|
|
|
|
|
* @param $sr the array containing the LDAP search resources
|
|
|
|
|
* @param $filter the LDAP filter for the search
|
|
|
|
|
* @param $base an array containing the LDAP subtree(s) that shall be searched
|
|
|
|
|
* @param $iFoundItems number of results in the search operation
|
|
|
|
|
* @param $limit maximum results to be counted
|
|
|
|
|
* @param $offset a starting point
|
|
|
|
|
* @param $pagedSearchOK whether a paged search has been executed
|
|
|
|
|
* @param boolean $skipHandling required for paged search when cookies to
|
|
|
|
|
* @param array $sr the array containing the LDAP search resources
|
|
|
|
|
* @param string $filter the LDAP filter for the search
|
|
|
|
|
* @param array $base an array containing the LDAP subtree(s) that shall be searched
|
|
|
|
|
* @param int $iFoundItems number of results in the search operation
|
|
|
|
|
* @param int $limit maximum results to be counted
|
|
|
|
|
* @param int $offset a starting point
|
|
|
|
|
* @param bool $pagedSearchOK whether a paged search has been executed
|
|
|
|
|
* @param bool $skipHandling required for paged search when cookies to
|
|
|
|
|
* prior results need to be gained
|
|
|
|
|
* @returns array with the search result as first value and pagedSearchOK as
|
|
|
|
|
* @returns array|false array with the search result as first value and pagedSearchOK as
|
|
|
|
|
* second | false if not successful
|
|
|
|
|
*/
|
|
|
|
|
private function processPagedSearchStatus($sr, $filter, $base, $iFoundItems, $limit, $offset, $pagedSearchOK, $skipHandling) {
|
|
|
|
|
@ -780,14 +798,14 @@ class Access extends LDAPUtility {
|
|
|
|
|
/**
|
|
|
|
|
* @brief executes an LDAP search, but counts the results only
|
|
|
|
|
* @param string $filter the LDAP filter for the search
|
|
|
|
|
* @param $base an array containing the LDAP subtree(s) that shall be searched
|
|
|
|
|
* @param $attr optional, array, one or more attributes that shall be
|
|
|
|
|
* @param array $base an array containing the LDAP subtree(s) that shall be searched
|
|
|
|
|
* @param array $attr optional, array, one or more attributes that shall be
|
|
|
|
|
* retrieved. Results will according to the order in the array.
|
|
|
|
|
* @param $limit optional, maximum results to be counted
|
|
|
|
|
* @param $offset optional, a starting point
|
|
|
|
|
* @param $skipHandling indicates whether the pages search operation is
|
|
|
|
|
* @param int $limit optional, maximum results to be counted
|
|
|
|
|
* @param int $offset optional, a starting point
|
|
|
|
|
* @param bool $skipHandling indicates whether the pages search operation is
|
|
|
|
|
* completed
|
|
|
|
|
* @returns int | false if the search could not be initialized
|
|
|
|
|
* @returns int|false Integer or false if the search could not be initialized
|
|
|
|
|
*
|
|
|
|
|
*/
|
|
|
|
|
private function count($filter, $base, $attr = null, $limit = null, $offset = null, $skipHandling = false) {
|
|
|
|
|
@ -799,7 +817,7 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
$counter = 0;
|
|
|
|
|
$count = null;
|
|
|
|
|
$cr = $this->connection->getConnectionResource();
|
|
|
|
|
$this->connection->getConnectionResource();
|
|
|
|
|
|
|
|
|
|
do {
|
|
|
|
|
$continue = false;
|
|
|
|
|
@ -821,10 +839,15 @@ class Access extends LDAPUtility {
|
|
|
|
|
return $counter;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private function countEntriesInSearchResults($searchResults, $limit,
|
|
|
|
|
&$hasHitLimit) {
|
|
|
|
|
/**
|
|
|
|
|
* @param $searchResults
|
|
|
|
|
* @param $limit
|
|
|
|
|
* @param $hasHitLimit
|
|
|
|
|
* @return int
|
|
|
|
|
*/
|
|
|
|
|
private function countEntriesInSearchResults($searchResults, $limit, &$hasHitLimit) {
|
|
|
|
|
$cr = $this->connection->getConnectionResource();
|
|
|
|
|
$count = 0;
|
|
|
|
|
$counter = 0;
|
|
|
|
|
|
|
|
|
|
foreach($searchResults as $res) {
|
|
|
|
|
$count = intval($this->ldap->countEntries($cr, $res));
|
|
|
|
|
@ -838,14 +861,14 @@ class Access extends LDAPUtility {
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief executes an LDAP search
|
|
|
|
|
* @param $filter the LDAP filter for the search
|
|
|
|
|
* @param $base an array containing the LDAP subtree(s) that shall be searched
|
|
|
|
|
* @param $attr optional, array, one or more attributes that shall be
|
|
|
|
|
* retrieved. Results will according to the order in the array.
|
|
|
|
|
* @returns array with the search result
|
|
|
|
|
*
|
|
|
|
|
* Executes an LDAP search
|
|
|
|
|
* @brief Executes an LDAP search
|
|
|
|
|
* @param string $filter the LDAP filter for the search
|
|
|
|
|
* @param array $base an array containing the LDAP subtree(s) that shall be searched
|
|
|
|
|
* @param array $attr optional, array, one or more attributes that shall be
|
|
|
|
|
* @param int $limit
|
|
|
|
|
* @param int $offset
|
|
|
|
|
* @param bool $skipHandling
|
|
|
|
|
* @return array with the search result
|
|
|
|
|
*/
|
|
|
|
|
private function search($filter, $base, $attr = null, $limit = null, $offset = null, $skipHandling = false) {
|
|
|
|
|
$search = $this->executeSearch($filter, $base, $attr, $limit, $offset);
|
|
|
|
|
@ -873,7 +896,7 @@ class Access extends LDAPUtility {
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$findings = array();
|
|
|
|
|
foreach($sr as $key => $res) {
|
|
|
|
|
foreach($sr as $res) {
|
|
|
|
|
$findings = array_merge($findings, $this->ldap->getEntries($cr , $res ));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@ -889,9 +912,9 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
if(!is_null($attr)) {
|
|
|
|
|
$selection = array();
|
|
|
|
|
$multiarray = false;
|
|
|
|
|
$multiArray = false;
|
|
|
|
|
if(count($attr) > 1) {
|
|
|
|
|
$multiarray = true;
|
|
|
|
|
$multiArray = true;
|
|
|
|
|
$i = 0;
|
|
|
|
|
}
|
|
|
|
|
foreach($findings as $item) {
|
|
|
|
|
@ -900,7 +923,7 @@ class Access extends LDAPUtility {
|
|
|
|
|
}
|
|
|
|
|
$item = \OCP\Util::mb_array_change_key_case($item, MB_CASE_LOWER, 'UTF-8');
|
|
|
|
|
|
|
|
|
|
if($multiarray) {
|
|
|
|
|
if($multiArray) {
|
|
|
|
|
foreach($attr as $key) {
|
|
|
|
|
$key = mb_strtolower($key, 'UTF-8');
|
|
|
|
|
if(isset($item[$key])) {
|
|
|
|
|
@ -931,7 +954,7 @@ class Access extends LDAPUtility {
|
|
|
|
|
$findings = $selection;
|
|
|
|
|
}
|
|
|
|
|
//we slice the findings, when
|
|
|
|
|
//a) paged search insuccessful, though attempted
|
|
|
|
|
//a) paged search unsuccessful, though attempted
|
|
|
|
|
//b) no paged search, but limit set
|
|
|
|
|
if((!$this->getPagedSearchResultState()
|
|
|
|
|
&& $pagedSearchOK)
|
|
|
|
|
@ -945,19 +968,23 @@ class Access extends LDAPUtility {
|
|
|
|
|
return $findings;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @param $name
|
|
|
|
|
* @return bool|mixed|string
|
|
|
|
|
*/
|
|
|
|
|
public function sanitizeUsername($name) {
|
|
|
|
|
if($this->connection->ldapIgnoreNamingRules) {
|
|
|
|
|
return $name;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Translitaration
|
|
|
|
|
//latin characters to ASCII
|
|
|
|
|
// Transliteration
|
|
|
|
|
// latin characters to ASCII
|
|
|
|
|
$name = iconv('UTF-8', 'ASCII//TRANSLIT', $name);
|
|
|
|
|
|
|
|
|
|
//REPLACEMENTS
|
|
|
|
|
// Replacements
|
|
|
|
|
$name = \OCP\Util::mb_str_replace(' ', '_', $name, 'UTF-8');
|
|
|
|
|
|
|
|
|
|
//every remaining unallowed characters will be removed
|
|
|
|
|
// Every remaining disallowed characters will be removed
|
|
|
|
|
$name = preg_replace('/[^a-zA-Z0-9_.@-]/u', '', $name);
|
|
|
|
|
|
|
|
|
|
return $name;
|
|
|
|
|
@ -966,7 +993,7 @@ class Access extends LDAPUtility {
|
|
|
|
|
/**
|
|
|
|
|
* @brief escapes (user provided) parts for LDAP filter
|
|
|
|
|
* @param string $input, the provided value
|
|
|
|
|
* @return the escaped string
|
|
|
|
|
* @return string the escaped string
|
|
|
|
|
*/
|
|
|
|
|
public function escapeFilterPart($input) {
|
|
|
|
|
$search = array('*', '\\', '(', ')');
|
|
|
|
|
@ -977,9 +1004,7 @@ class Access extends LDAPUtility {
|
|
|
|
|
/**
|
|
|
|
|
* @brief combines the input filters with AND
|
|
|
|
|
* @param $filters array, the filters to connect
|
|
|
|
|
* @returns the combined filter
|
|
|
|
|
*
|
|
|
|
|
* Combines Filter arguments with AND
|
|
|
|
|
* @return string the combined filter
|
|
|
|
|
*/
|
|
|
|
|
public function combineFilterWithAnd($filters) {
|
|
|
|
|
return $this->combineFilter($filters, '&');
|
|
|
|
|
@ -988,9 +1013,7 @@ class Access extends LDAPUtility {
|
|
|
|
|
/**
|
|
|
|
|
* @brief combines the input filters with AND
|
|
|
|
|
* @param $filters array, the filters to connect
|
|
|
|
|
* @returns the combined filter
|
|
|
|
|
*
|
|
|
|
|
* Combines Filter arguments with AND
|
|
|
|
|
* @return string the combined filter
|
|
|
|
|
*/
|
|
|
|
|
public function combineFilterWithOr($filters) {
|
|
|
|
|
return $this->combineFilter($filters, '|');
|
|
|
|
|
@ -1000,9 +1023,7 @@ class Access extends LDAPUtility {
|
|
|
|
|
* @brief combines the input filters with given operator
|
|
|
|
|
* @param $filters array, the filters to connect
|
|
|
|
|
* @param string $operator either & or |
|
|
|
|
|
* @returns the combined filter
|
|
|
|
|
*
|
|
|
|
|
* Combines Filter arguments with AND
|
|
|
|
|
* @return string the combined filter
|
|
|
|
|
*/
|
|
|
|
|
private function combineFilter($filters, $operator) {
|
|
|
|
|
$combinedFilter = '('.$operator;
|
|
|
|
|
@ -1017,7 +1038,7 @@ class Access extends LDAPUtility {
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief creates a filter part for to perfrom search for users
|
|
|
|
|
* @brief creates a filter part for to perform search for users
|
|
|
|
|
* @param string $search the search term
|
|
|
|
|
* @return string the final filter part to use in LDAP searches
|
|
|
|
|
*/
|
|
|
|
|
@ -1028,7 +1049,7 @@ class Access extends LDAPUtility {
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief creates a filter part for to perfrom search for groups
|
|
|
|
|
* @brief creates a filter part for to perform search for groups
|
|
|
|
|
* @param string $search the search term
|
|
|
|
|
* @return string the final filter part to use in LDAP searches
|
|
|
|
|
*/
|
|
|
|
|
@ -1041,9 +1062,10 @@ class Access extends LDAPUtility {
|
|
|
|
|
/**
|
|
|
|
|
* @brief creates a filter part for searches
|
|
|
|
|
* @param string $search the search term
|
|
|
|
|
* @param $searchAttributes
|
|
|
|
|
* @param string $fallbackAttribute a fallback attribute in case the user
|
|
|
|
|
* did not define search attributes. Typically the display name attribute.
|
|
|
|
|
* @returns string the final filter part to use in LDAP searches
|
|
|
|
|
* @return string the final filter part to use in LDAP searches
|
|
|
|
|
*/
|
|
|
|
|
private function getFilterPartForSearch($search, $searchAttributes, $fallbackAttribute) {
|
|
|
|
|
$filter = array();
|
|
|
|
|
@ -1065,7 +1087,9 @@ class Access extends LDAPUtility {
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @param string $name
|
|
|
|
|
* @param string $password
|
|
|
|
|
* @return bool
|
|
|
|
|
*/
|
|
|
|
|
public function areCredentialsValid($name, $password) {
|
|
|
|
|
$name = $this->DNasBaseParameter($name);
|
|
|
|
|
@ -1084,8 +1108,9 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief auto-detects the directory's UUID attribute
|
|
|
|
|
* @param $dn a known DN used to check against
|
|
|
|
|
* @param $force the detection should be run, even if it is not set to auto
|
|
|
|
|
* @param string $dn a known DN used to check against
|
|
|
|
|
* @param bool $isUser
|
|
|
|
|
* @param bool $force the detection should be run, even if it is not set to auto
|
|
|
|
|
* @returns true on success, false otherwise
|
|
|
|
|
*/
|
|
|
|
|
private function detectUuidAttribute($dn, $isUser = true, $force = false) {
|
|
|
|
|
@ -1106,7 +1131,7 @@ class Access extends LDAPUtility {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//for now, supported attributes are entryUUID, nsuniqueid, objectGUID, ipaUniqueID
|
|
|
|
|
// for now, supported attributes are entryUUID, nsuniqueid, objectGUID, ipaUniqueID
|
|
|
|
|
$testAttributes = array('entryuuid', 'nsuniqueid', 'objectguid', 'guid', 'ipauniqueid');
|
|
|
|
|
|
|
|
|
|
foreach($testAttributes as $attribute) {
|
|
|
|
|
@ -1126,6 +1151,11 @@ class Access extends LDAPUtility {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @param $dn
|
|
|
|
|
* @param bool $isUser
|
|
|
|
|
* @return array|bool|false
|
|
|
|
|
*/
|
|
|
|
|
public function getUUID($dn, $isUser = true) {
|
|
|
|
|
if($isUser) {
|
|
|
|
|
$uuidAttr = 'ldapUuidUserAttribute';
|
|
|
|
|
@ -1154,11 +1184,9 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief converts a binary ObjectGUID into a string representation
|
|
|
|
|
* @param $oguid the ObjectGUID in it's binary form as retrieved from AD
|
|
|
|
|
* @returns String
|
|
|
|
|
*
|
|
|
|
|
* converts a binary ObjectGUID into a string representation
|
|
|
|
|
* http://www.php.net/manual/en/function.ldap-get-values-len.php#73198
|
|
|
|
|
* @param string $oguid the ObjectGUID in it's binary form as retrieved from AD
|
|
|
|
|
* @return string
|
|
|
|
|
* @link http://www.php.net/manual/en/function.ldap-get-values-len.php#73198
|
|
|
|
|
*/
|
|
|
|
|
private function convertObjectGUID2Str($oguid) {
|
|
|
|
|
$hex_guid = bin2hex($oguid);
|
|
|
|
|
@ -1181,12 +1209,9 @@ class Access extends LDAPUtility {
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief converts a stored DN so it can be used as base parameter for LDAP queries
|
|
|
|
|
* @param $dn the DN
|
|
|
|
|
* @returns String
|
|
|
|
|
*
|
|
|
|
|
* converts a stored DN so it can be used as base parameter for LDAP queries
|
|
|
|
|
* internally we store them for usage in LDAP filters
|
|
|
|
|
* @brief converts a stored DN so it can be used as base parameter for LDAP queries, internally we store them for usage in LDAP filters
|
|
|
|
|
* @param string $dn the DN
|
|
|
|
|
* @return string
|
|
|
|
|
*/
|
|
|
|
|
private function DNasBaseParameter($dn) {
|
|
|
|
|
return str_ireplace('\\5c', '\\', $dn);
|
|
|
|
|
@ -1194,12 +1219,14 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief checks if the given DN is part of the given base DN(s)
|
|
|
|
|
* @param $dn the DN
|
|
|
|
|
* @param string $dn the DN
|
|
|
|
|
* @param $bases array containing the allowed base DN or DNs
|
|
|
|
|
* @returns Boolean
|
|
|
|
|
* @return bool
|
|
|
|
|
*/
|
|
|
|
|
private function isDNPartOfBase($dn, $bases) {
|
|
|
|
|
$belongsToBase = false;
|
|
|
|
|
$bases = $this->sanitizeDN($bases);
|
|
|
|
|
|
|
|
|
|
foreach($bases as $base) {
|
|
|
|
|
$belongsToBase = true;
|
|
|
|
|
if(mb_strripos($dn, $base, 0, 'UTF-8') !== (mb_strlen($dn, 'UTF-8')-mb_strlen($base, 'UTF-8'))) {
|
|
|
|
|
@ -1214,10 +1241,10 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief get a cookie for the next LDAP paged search
|
|
|
|
|
* @param $base a string with the base DN for the search
|
|
|
|
|
* @param $filter the search filter to identify the correct search
|
|
|
|
|
* @param $limit the limit (or 'pageSize'), to identify the correct search well
|
|
|
|
|
* @param $offset the offset for the new search to identify the correct search really good
|
|
|
|
|
* @param string $base a string with the base DN for the search
|
|
|
|
|
* @param string $filter the search filter to identify the correct search
|
|
|
|
|
* @param int $limit the limit (or 'pageSize'), to identify the correct search well
|
|
|
|
|
* @param int $offset the offset for the new search to identify the correct search really good
|
|
|
|
|
* @returns string containing the key or empty if none is cached
|
|
|
|
|
*/
|
|
|
|
|
private function getPagedResultCookie($base, $filter, $limit, $offset) {
|
|
|
|
|
@ -1226,10 +1253,10 @@ class Access extends LDAPUtility {
|
|
|
|
|
}
|
|
|
|
|
$offset -= $limit;
|
|
|
|
|
//we work with cache here
|
|
|
|
|
$cachekey = 'lc' . crc32($base) . '-' . crc32($filter) . '-' . intval($limit) . '-' . intval($offset);
|
|
|
|
|
$cacheKey = 'lc' . crc32($base) . '-' . crc32($filter) . '-' . intval($limit) . '-' . intval($offset);
|
|
|
|
|
$cookie = '';
|
|
|
|
|
if(isset($this->cookies[$cachekey])) {
|
|
|
|
|
$cookie = $this->cookies[$cachekey];
|
|
|
|
|
if(isset($this->cookies[$cacheKey])) {
|
|
|
|
|
$cookie = $this->cookies[$cacheKey];
|
|
|
|
|
if(is_null($cookie)) {
|
|
|
|
|
$cookie = '';
|
|
|
|
|
}
|
|
|
|
|
@ -1239,22 +1266,22 @@ class Access extends LDAPUtility {
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief set a cookie for LDAP paged search run
|
|
|
|
|
* @param $base a string with the base DN for the search
|
|
|
|
|
* @param $filter the search filter to identify the correct search
|
|
|
|
|
* @param $limit the limit (or 'pageSize'), to identify the correct search well
|
|
|
|
|
* @param $offset the offset for the run search to identify the correct search really good
|
|
|
|
|
* @param $cookie string containing the cookie returned by ldap_control_paged_result_response
|
|
|
|
|
* @param string $base a string with the base DN for the search
|
|
|
|
|
* @param string $filter the search filter to identify the correct search
|
|
|
|
|
* @param int $limit the limit (or 'pageSize'), to identify the correct search well
|
|
|
|
|
* @param int $offset the offset for the run search to identify the correct search really good
|
|
|
|
|
* @param string $cookie string containing the cookie returned by ldap_control_paged_result_response
|
|
|
|
|
* @return void
|
|
|
|
|
*/
|
|
|
|
|
private function setPagedResultCookie($base, $filter, $limit, $offset, $cookie) {
|
|
|
|
|
if(!empty($cookie)) {
|
|
|
|
|
$cachekey = 'lc' . crc32($base) . '-' . crc32($filter) . '-' .intval($limit) . '-' . intval($offset);
|
|
|
|
|
$this->cookies[$cachekey] = $cookie;
|
|
|
|
|
$cacheKey = 'lc' . crc32($base) . '-' . crc32($filter) . '-' .intval($limit) . '-' . intval($offset);
|
|
|
|
|
$this->cookies[$cacheKey] = $cookie;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief check wether the most recent paged search was successful. It flushed the state var. Use it always after a possible paged search.
|
|
|
|
|
* @brief Check whether the most recent paged search was successful. It flushed the state var. Use it always after a possible paged search.
|
|
|
|
|
* @return boolean|null true on success, null or false otherwise
|
|
|
|
|
*/
|
|
|
|
|
public function getPagedSearchResultState() {
|
|
|
|
|
@ -1263,15 +1290,14 @@ class Access extends LDAPUtility {
|
|
|
|
|
return $result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @brief prepares a paged search, if possible
|
|
|
|
|
* @param $filter the LDAP filter for the search
|
|
|
|
|
* @param $bases an array containing the LDAP subtree(s) that shall be searched
|
|
|
|
|
* @param $attr optional, when a certain attribute shall be filtered outside
|
|
|
|
|
* @param $limit
|
|
|
|
|
* @param $offset
|
|
|
|
|
*
|
|
|
|
|
* @brief Prepares a paged search, if possible
|
|
|
|
|
* @param string $filter the LDAP filter for the search
|
|
|
|
|
* @param array $bases an array containing the LDAP subtree(s) that shall be searched
|
|
|
|
|
* @param array $attr optional, when a certain attribute shall be filtered outside
|
|
|
|
|
* @param int $limit
|
|
|
|
|
* @param int $offset
|
|
|
|
|
* @return bool|true
|
|
|
|
|
*/
|
|
|
|
|
private function initPagedSearch($filter, $bases, $attr, $limit, $offset) {
|
|
|
|
|
$pagedSearchOK = false;
|
|
|
|
|
@ -1287,8 +1313,9 @@ class Access extends LDAPUtility {
|
|
|
|
|
$cookie = $this->getPagedResultCookie($base, $filter, $limit, $offset);
|
|
|
|
|
if(empty($cookie) && ($offset > 0)) {
|
|
|
|
|
// no cookie known, although the offset is not 0. Maybe cache run out. We need
|
|
|
|
|
// to start all over *sigh* (btw, Dear Reader, did you need LDAP paged
|
|
|
|
|
// to start all over *sigh* (btw, Dear Reader, did you know LDAP paged
|
|
|
|
|
// searching was designed by MSFT?)
|
|
|
|
|
// Lukas: No, but thanks to reading that source I finally know!
|
|
|
|
|
$reOffset = ($offset - $limit) < 0 ? 0 : $offset - $limit;
|
|
|
|
|
//a bit recursive, $offset of 0 is the exit
|
|
|
|
|
\OCP\Util::writeLog('user_ldap', 'Looking for cookie L/O '.$limit.'/'.$reOffset, \OCP\Util::INFO);
|
|
|
|
|
|