LDAPAccountManager/lam/lib/lamdaemon.inc

151 lines
4.5 KiB
PHP
Raw Normal View History

<?php
/*
$Id$
This code is part of LDAP Account Manager (http://www.sourceforge.net/projects/lam)
2006-03-03 17:30:35 +00:00
Copyright (C) 2004 - 2006 Roland Gruber
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
/**
* This file includes functions to control lamdaemon.
*
* @author Tilo Lutz
* @author Roland Gruber
2007-02-20 17:39:37 +00:00
* @author Thomas Manninger
*
* @package modules
*/
/**
* Sends commands to lamdaemon script.
*
* @param array $commands List of command lines
2007-02-20 17:39:37 +00:00
* @param string $server remote server
* @return array Output of lamdaemon
*
*/
2007-02-20 17:39:37 +00:00
function lamdaemon($commands, $server) {
2006-08-27 14:57:50 +00:00
// use new PHP SSH mechanismn
if (function_exists("ssh2_connect")) {
2007-02-20 17:39:37 +00:00
return lamdaemonSSH($commands, $server);
2006-08-27 14:57:50 +00:00
}
// get username and password of the current lam-admin
$ldap_q = $_SESSION['ldap']->decrypt_login();
$userstring = implode ("\n", $commands);
2005-03-05 13:23:59 +00:00
$output_array = array();
2007-12-29 18:59:09 +00:00
$towrite = escapeshellarg($server)." ".escapeshellarg($_SESSION['config']->get_scriptPath())." - -";
2007-08-07 17:47:47 +00:00
$descriptorspec = array(
0 => array("pipe", "r"), // stdin
1 => array("pipe", "w"), // stout
2 => array("file", "/dev/null", "a") // sterr
);
$process = proc_open(escapeshellarg($_SESSION['lampath']."lib/lamdaemonOld.pl")." ".$towrite,
$descriptorspec,
$pipes);
if (is_resource($process)) {
/* perl-script is running
* $pipes[0] is writeable handle to child stdin
* $pipes[1] is readable handle to child stdout
* any error is send to /dev/null
*/
// user+passwd
fwrite($pipes[0], $ldap_q[0] . "\n");
fwrite($pipes[0], $ldap_q[1] . "\n");
// Write to stdin
fwrite($pipes[0], $userstring);
}
2007-08-07 17:47:47 +00:00
fclose($pipes[0]);
while (!feof($pipes[1])) {
$output = fgets($pipes[1], 1024);
if ($output!='') $output_array[] = $output;
}
2007-08-07 17:47:47 +00:00
fclose($pipes[1]);
proc_close($process);
2005-03-05 13:23:59 +00:00
if (sizeof($output_array) > 0) {
return $output_array;
}
else {
return false;
}
}
2006-08-27 14:57:50 +00:00
/**
* Sends commands to lamdaemon script via PHP SSH functions.
*
* @param array $commands List of command lines
2007-02-20 17:39:37 +00:00
* @param string $server remote server
2006-08-27 14:57:50 +00:00
* @return array Output of lamdaemon
*
*/
2007-02-20 17:39:37 +00:00
function lamdaemonSSH($commands, $server) {
2006-08-27 14:57:50 +00:00
$commands = implode("\n", $commands) . "\n";
// get username and password of the current lam-admin
$credentials = $_SESSION['ldap']->decrypt_login();
2008-07-03 18:42:26 +00:00
$serverNameParts = explode(",", $server);
if (sizeof($serverNameParts) > 1) {
$handle = @ssh2_connect($serverNameParts[0], $serverNameParts[1]);
}
else {
$handle = @ssh2_connect($server);
}
2006-08-27 14:57:50 +00:00
if ($handle) {
$sr = @ldap_read($_SESSION['ldap']->server(), $credentials[0], "objectClass=posixAccount", array('uid'));
if (!$sr) {
$return = array("ERROR," . _("Your LAM admin user must be a valid Unix account to work with lamdaemon!") . ",");
return $return;
}
$entry = @ldap_get_entries($_SESSION['ldap']->server(), $sr);
2006-08-27 14:57:50 +00:00
$userName = $entry[0]['uid'][0];
if (!$userName) {
$return = array("ERROR," . _("Your LAM admin user must be a valid Unix account to work with lamdaemon!") . ",");
return $return;
}
if (@ssh2_auth_password($handle, $userName, $credentials[1])) {
2007-12-29 18:59:09 +00:00
$shell = ssh2_exec($handle, "sudo " . $_SESSION['config']->get_scriptPath());
fwrite($shell, $commands);
$return = array();
$time = time() + (sizeof($commands) * 30);
while (sizeof($return) < sizeof($commands)) {
if ($time < time()) {
$return = array("ERROR," . _("Timeout while executing lamdaemon commands!") . ",");
return $return;
}
usleep(100);
$read = split("\n", trim(fread($shell, 100000)));
if ((sizeof($read) == 1) && (!isset($read[0]) || ($read[0] == ""))) continue;
for ($i = 0; $i < sizeof($read); $i++) {
$return[] = $read[$i];
}
2006-08-27 14:57:50 +00:00
}
return $return;
}
else {
2007-02-20 17:39:37 +00:00
$return = array("ERROR," . _('Unable to connect to remote server!') . "," . $server);
return $return;
2006-08-27 14:57:50 +00:00
}
}
2006-10-04 18:11:02 +00:00
else {
2007-02-20 17:39:37 +00:00
$return = array("ERROR," . _('Unable to connect to remote server!') . "," . $server);
2006-10-04 18:11:02 +00:00
return $return;
}
2006-08-27 14:57:50 +00:00
}
?>