2004-12-09 19:10:57 +00:00
|
|
|
<?php
|
|
|
|
/*
|
|
|
|
$Id$
|
|
|
|
|
|
|
|
This code is part of LDAP Account Manager (http://www.sourceforge.net/projects/lam)
|
2006-03-03 17:30:35 +00:00
|
|
|
Copyright (C) 2004 - 2006 Roland Gruber
|
2004-12-09 19:10:57 +00:00
|
|
|
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program; if not, write to the Free Software
|
|
|
|
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* This file includes functions to control lamdaemon.
|
|
|
|
*
|
|
|
|
* @author Tilo Lutz
|
|
|
|
* @author Roland Gruber
|
2007-02-20 17:39:37 +00:00
|
|
|
* @author Thomas Manninger
|
2004-12-09 19:10:57 +00:00
|
|
|
*
|
|
|
|
* @package modules
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sends commands to lamdaemon script.
|
|
|
|
*
|
|
|
|
* @param array $commands List of command lines
|
2007-02-20 17:39:37 +00:00
|
|
|
* @param string $server remote server
|
2004-12-09 19:10:57 +00:00
|
|
|
* @return array Output of lamdaemon
|
|
|
|
*
|
|
|
|
*/
|
2007-02-20 17:39:37 +00:00
|
|
|
function lamdaemon($commands, $server) {
|
2006-08-27 14:57:50 +00:00
|
|
|
// use new PHP SSH mechanismn
|
|
|
|
if (function_exists("ssh2_connect")) {
|
2007-02-20 17:39:37 +00:00
|
|
|
return lamdaemonSSH($commands, $server);
|
2006-08-27 14:57:50 +00:00
|
|
|
}
|
|
|
|
|
2004-12-09 19:10:57 +00:00
|
|
|
// get username and password of the current lam-admin
|
|
|
|
$ldap_q = $_SESSION['ldap']->decrypt_login();
|
|
|
|
|
|
|
|
$userstring = implode ("\n", $commands);
|
2005-03-05 13:23:59 +00:00
|
|
|
$output_array = array();
|
|
|
|
if (function_exists('proc_open')) {
|
2004-12-09 19:10:57 +00:00
|
|
|
// New Code, requires PHP 4.3
|
2007-02-20 17:39:37 +00:00
|
|
|
$towrite = escapeshellarg($server)." ".escapeshellarg($_SESSION['config']->scriptPath)." - -";
|
2004-12-09 19:10:57 +00:00
|
|
|
$descriptorspec = array(
|
|
|
|
0 => array("pipe", "r"), // stdin
|
|
|
|
1 => array("pipe", "w"), // stout
|
|
|
|
2 => array("file", "/dev/null", "a") // sterr
|
|
|
|
);
|
2006-08-27 14:57:50 +00:00
|
|
|
$process = proc_open(escapeshellarg($_SESSION['lampath']."lib/lamdaemonOld.pl")." ".$towrite,
|
2004-12-09 19:10:57 +00:00
|
|
|
$descriptorspec,
|
|
|
|
$pipes);
|
|
|
|
if (is_resource($process)) {
|
|
|
|
/* perl-script is running
|
|
|
|
* $pipes[0] is writeable handle to child stdin
|
|
|
|
* $pipes[1] is readable handle to child stdout
|
|
|
|
* any error is send to /dev/null
|
|
|
|
*/
|
2005-03-05 13:23:59 +00:00
|
|
|
// user+passwd
|
|
|
|
fwrite($pipes[0], $ldap_q[0] . "\n");
|
|
|
|
fwrite($pipes[0], $ldap_q[1] . "\n");
|
2004-12-09 19:10:57 +00:00
|
|
|
// Write to stdin
|
|
|
|
fwrite($pipes[0], $userstring);
|
|
|
|
}
|
|
|
|
fclose($pipes[0]);
|
|
|
|
while (!feof($pipes[1])) {
|
|
|
|
$output = fgets($pipes[1], 1024);
|
|
|
|
if ($output!='') $output_array[] = $output;
|
|
|
|
}
|
|
|
|
fclose($pipes[1]);
|
|
|
|
proc_close($process);
|
|
|
|
}
|
|
|
|
else { // PHP 4.3>
|
2007-02-20 17:39:37 +00:00
|
|
|
$towrite = escapeshellarg($server)." ".escapeshellarg($_SESSION['config']->scriptPath)." ".
|
2005-03-05 13:23:59 +00:00
|
|
|
escapeshellarg($ldap_q[0]).' '.escapeshellarg($ldap_q[1]);
|
2006-08-27 14:57:50 +00:00
|
|
|
$command = escapeshellarg($_SESSION['lampath']."lib/lamdaemonOld.pl")." ".$towrite;
|
2004-12-09 19:10:57 +00:00
|
|
|
$pipe = popen("echo \"$userstring\"|$command" , 'r');
|
|
|
|
while(!feof($pipe)) {
|
|
|
|
//$output .= fread($pipe, 1024);
|
|
|
|
$output = fgets($pipe, 1024);
|
|
|
|
if ($output!='') $output_array[] = $output;
|
|
|
|
}
|
|
|
|
pclose($pipe);
|
|
|
|
}
|
2005-03-05 13:23:59 +00:00
|
|
|
if (sizeof($output_array) > 0) {
|
|
|
|
return $output_array;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
return false;
|
|
|
|
}
|
2004-12-09 19:10:57 +00:00
|
|
|
}
|
|
|
|
|
2006-08-27 14:57:50 +00:00
|
|
|
/**
|
|
|
|
* Sends commands to lamdaemon script via PHP SSH functions.
|
|
|
|
*
|
|
|
|
* @param array $commands List of command lines
|
2007-02-20 17:39:37 +00:00
|
|
|
* @param string $server remote server
|
2006-08-27 14:57:50 +00:00
|
|
|
* @return array Output of lamdaemon
|
|
|
|
*
|
|
|
|
*/
|
2007-02-20 17:39:37 +00:00
|
|
|
function lamdaemonSSH($commands, $server) {
|
2006-08-27 14:57:50 +00:00
|
|
|
$commands = implode("\n", $commands) . "\n";
|
|
|
|
// get username and password of the current lam-admin
|
|
|
|
$credentials = $_SESSION['ldap']->decrypt_login();
|
2007-02-22 18:24:34 +00:00
|
|
|
$handle = @ssh2_connect($server);
|
2006-08-27 14:57:50 +00:00
|
|
|
if ($handle) {
|
2006-09-14 20:08:29 +00:00
|
|
|
$sr = @ldap_read($_SESSION['ldap']->server(), $credentials[0], "objectClass=posixAccount", array('uid'));
|
|
|
|
if (!$sr) {
|
|
|
|
$return = array("ERROR," . _("Your LAM admin user must be a valid Unix account to work with lamdaemon!") . ",");
|
|
|
|
return $return;
|
|
|
|
}
|
|
|
|
$entry = @ldap_get_entries($_SESSION['ldap']->server(), $sr);
|
2006-08-27 14:57:50 +00:00
|
|
|
$userName = $entry[0]['uid'][0];
|
2006-09-14 20:08:29 +00:00
|
|
|
if (!$userName) {
|
|
|
|
$return = array("ERROR," . _("Your LAM admin user must be a valid Unix account to work with lamdaemon!") . ",");
|
|
|
|
return $return;
|
|
|
|
}
|
2006-09-09 11:45:22 +00:00
|
|
|
if (@ssh2_auth_password($handle, $userName, $credentials[1])) {
|
|
|
|
$shell = ssh2_exec($handle, "sudo " . $_SESSION['config']->scriptPath);
|
|
|
|
fwrite($shell, $commands);
|
|
|
|
$return = array();
|
|
|
|
$time = time() + (sizeof($commands) * 30);
|
|
|
|
while (sizeof($return) < sizeof($commands)) {
|
|
|
|
if ($time < time()) {
|
|
|
|
$return = array("ERROR," . _("Timeout while executing lamdaemon commands!") . ",");
|
|
|
|
return $return;
|
|
|
|
}
|
|
|
|
usleep(100);
|
|
|
|
$read = split("\n", trim(fread($shell, 100000)));
|
|
|
|
if ((sizeof($read) == 1) && (!isset($read[0]) || ($read[0] == ""))) continue;
|
|
|
|
for ($i = 0; $i < sizeof($read); $i++) {
|
|
|
|
$return[] = $read[$i];
|
|
|
|
}
|
2006-08-27 14:57:50 +00:00
|
|
|
}
|
2006-09-09 11:45:22 +00:00
|
|
|
return $return;
|
|
|
|
}
|
|
|
|
else {
|
2007-02-20 17:39:37 +00:00
|
|
|
$return = array("ERROR," . _('Unable to connect to remote server!') . "," . $server);
|
2006-09-09 11:45:22 +00:00
|
|
|
return $return;
|
2006-08-27 14:57:50 +00:00
|
|
|
}
|
|
|
|
}
|
2006-10-04 18:11:02 +00:00
|
|
|
else {
|
2007-02-20 17:39:37 +00:00
|
|
|
$return = array("ERROR," . _('Unable to connect to remote server!') . "," . $server);
|
2006-10-04 18:11:02 +00:00
|
|
|
return $return;
|
|
|
|
}
|
2006-08-27 14:57:50 +00:00
|
|
|
return array();
|
|
|
|
}
|
|
|
|
|
2004-12-09 19:10:57 +00:00
|
|
|
?>
|