2011-06-26 10:44:28 +00:00
< ? php
/**
* Classes and functions for communication of Data Stores
*
* @ author The phpLDAPadmin development team
* @ package phpLDAPadmin
*/
/**
* This abstract class provides the basic variables and methods for LDAP datastores
*
* @ package phpLDAPadmin
* @ subpackage DataStore
*/
class myldap extends DS {
# If we fail to connect, set this to true
private $noconnect = false ;
# Raw Schema entries
private $_schema_entries = null ;
# Schema DN
private $_schemaDN = null ;
# Attributes that should be treated as MAY attributes, even though the scheme has them as MUST attributes.
private $force_may = array ();
public function __construct ( $index ) {
$this -> index = $index ;
$this -> type = 'ldap' ;
# Additional values that can go in our config.php
$this -> custom = new StdClass ;
$this -> default = new StdClass ;
/*
* Not used by PLA
# Database Server Variables
$this -> default -> server [ 'db' ] = array (
'desc' => 'Database Name' ,
'untested' => true ,
'default' => null );
*/
/* This was created for IDS - since it doesnt present STRUCTURAL against objectClasses
* definitions when reading the schema .*/
$this -> default -> server [ 'schema_oclass_default' ] = array (
'desc' => 'When reading the schema, and it doesnt specify objectClass type, default it to this' ,
'default' => null );
$this -> default -> server [ 'base' ] = array (
'desc' => 'LDAP Base DNs' ,
'default' => array ());
$this -> default -> server [ 'tls' ] = array (
'desc' => 'Connect using TLS' ,
'default' => false );
# Login Details
$this -> default -> login [ 'attr' ] = array (
'desc' => 'Attribute to use to find the users DN' ,
'default' => 'dn' );
$this -> default -> login [ 'anon_bind' ] = array (
'desc' => 'Enable anonymous bind logins' ,
'default' => true );
$this -> default -> login [ 'allowed_dns' ] = array (
'desc' => 'Limit logins to users who match any of the following LDAP filters' ,
'default' => array ());
$this -> default -> login [ 'base' ] = array (
'desc' => 'Limit logins to users who are in these base DNs' ,
'default' => array ());
$this -> default -> login [ 'class' ] = array (
'desc' => 'Strict login to users containing a specific objectClasses' ,
'default' => array ());
$this -> default -> proxy [ 'attr' ] = array (
'desc' => 'Attribute to use to find the users DN for proxy based authentication' ,
'default' => array ());
# SASL configuration
$this -> default -> server [ 'sasl' ] = array (
'desc' => 'Use SASL authentication when binding LDAP server' ,
'default' => false );
$this -> default -> sasl [ 'mech' ] = array (
'desc' => 'SASL mechanism used while binding LDAP server' ,
'untested' => true ,
'default' => 'PLAIN' );
$this -> default -> sasl [ 'realm' ] = array (
'desc' => 'SASL realm name' ,
'untested' => true ,
'default' => null );
$this -> default -> sasl [ 'authz_id' ] = array (
'desc' => 'SASL authorization id' ,
'untested' => true ,
'default' => null );
$this -> default -> sasl [ 'authz_id_regex' ] = array (
'desc' => 'SASL authorization id PCRE regular expression' ,
'untested' => true ,
'default' => null );
$this -> default -> sasl [ 'authz_id_replacement' ] = array (
'desc' => 'SASL authorization id PCRE regular expression replacement string' ,
'untested' => true ,
'default' => null );
$this -> default -> sasl [ 'props' ] = array (
'desc' => 'SASL properties' ,
'untested' => true ,
'default' => null );
}
/**
* Required ABSTRACT functions
*/
/**
* Connect and Bind to the Database
*
* @ param string Which connection method resource to use
* @ return resource | null Connection resource if successful , null if not .
*/
protected function connect ( $method , $debug = false , $new = false ) {
static $CACHE = array ();
$method = $this -> getMethod ( $method );
$bind = array ();
if ( isset ( $CACHE [ $this -> index ][ $method ]) && $CACHE [ $this -> index ][ $method ])
return $CACHE [ $this -> index ][ $method ];
# Check if we have logged in and therefore need to use those details as our bind.
$bind [ 'id' ] = is_null ( $this -> getLogin ( $method )) && $method != 'anon' ? $this -> getLogin ( 'user' ) : $this -> getLogin ( $method );
$bind [ 'pass' ] = is_null ( $this -> getPassword ( $method )) && $method != 'anon' ? $this -> getPassword ( 'user' ) : $this -> getPassword ( $method );
# If our bind id is still null, we are not logged in.
if ( is_null ( $bind [ 'id' ]) && ! in_array ( $method , array ( 'anon' , 'login' )))
return null ;
# If we bound to the LDAP server with these details for a different connection, return that resource
if ( isset ( $CACHE [ $this -> index ]) && ! $new )
foreach ( $CACHE [ $this -> index ] as $cachedmethod => $resource ) {
if (( $this -> getLogin ( $cachedmethod ) == $bind [ 'id' ]) && ( $this -> getPassword ( $cachedmethod ) == $bind [ 'pass' ])) {
$CACHE [ $this -> index ][ $method ] = $resource ;
return $CACHE [ $this -> index ][ $method ];
}
}
$CACHE [ $this -> index ][ $method ] = null ;
# No identifiable connection exists, lets create a new one.
if ( function_exists ( 'run_hook' ))
run_hook ( 'pre_connect' , array ( 'server_id' => $this -> index , 'method' => $method ));
if ( $this -> getValue ( 'server' , 'port' ))
$resource = ldap_connect ( $this -> getValue ( 'server' , 'host' ), $this -> getValue ( 'server' , 'port' ));
else
$resource = ldap_connect ( $this -> getValue ( 'server' , 'host' ));
2019-08-15 10:48:37 +00:00
if ( defined ( 'LDAP_OPT_X_TLS_CACERTFILE' )) {
$cfgMain = new LAMCfgMain ();
if ( ! empty ( $cfgMain -> getSSLCaCertificates ())) {
ldap_set_option ( $resource , LDAP_OPT_X_TLS_CACERTFILE , $cfgMain -> getSSLCaCertPath ());
}
}
2011-06-26 10:44:28 +00:00
$CACHE [ $this -> index ][ $method ] = $resource ;
if ( ! is_resource ( $resource ))
debug_dump_backtrace ( 'UNHANDLED, $resource is not a resource' , 1 );
# Go with LDAP version 3 if possible (needed for renaming and Novell schema fetching)
ldap_set_option ( $resource , LDAP_OPT_PROTOCOL_VERSION , 3 );
/* Disabling this makes it possible to browse the tree for Active Directory , and seems
* to not affect other LDAP servers ( tested with OpenLDAP ) as phpLDAPadmin explicitly
* specifies deref behavior for each ldap_search operation . */
2014-01-12 10:18:35 +00:00
// TODO provide upstream patch if PLA gets active again
$followReferrals = ( $_SESSION [ 'config' ] -> getFollowReferrals () === 'true' ) ? 1 : 0 ;
ldap_set_option ( $resource , LDAP_OPT_REFERRALS , $followReferrals );
2011-06-26 10:44:28 +00:00
# Try to fire up TLS is specified in the config
if ( $this -> isTLSEnabled ())
$this -> startTLS ( $resource );
# If SASL has been configured for binding, then start it now.
if ( $this -> isSASLEnabled ())
$bind [ 'result' ] = $this -> startSASL ( $resource , $method );
# Normal bind...
else
$bind [ 'result' ] = @ ldap_bind ( $resource , $bind [ 'id' ], $bind [ 'pass' ]);
if ( $debug )
debug_dump ( array ( 'method' => $method , 'bind' => $bind , 'USER' => $_SESSION [ 'USER' ]));
if ( ! $bind [ 'result' ]) {
$this -> noconnect = true ;
system_message ( array (
2011-07-21 17:50:57 +00:00
'title' => sprintf ( '%s %s' ,( 'Unable to connect to LDAP server' ), $this -> getName ()),
2011-06-26 10:44:28 +00:00
'body' => sprintf ( '<b>%s</b>: %s (%s) for <b>%s</b>' , _ ( 'Error' ), $this -> getErrorMessage ( $method ), $this -> getErrorNum ( $method ), $method ),
'type' => 'error' ));
$CACHE [ $this -> index ][ $method ] = null ;
} else {
$this -> noconnect = false ;
# If this is a proxy session, we need to switch to the proxy user
if ( $this -> isProxyEnabled () && $bind [ 'id' ] && $method != 'anon' )
if ( ! $this -> startProxy ( $resource , $method )) {
$this -> noconnect = true ;
$CACHE [ $this -> index ][ $method ] = null ;
}
}
if ( function_exists ( 'run_hook' ))
run_hook ( 'post_connect' , array ( 'server_id' => $this -> index , 'method' => $method , 'id' => $bind [ 'id' ]));
if ( $debug )
debug_dump ( array ( $method => $CACHE [ $this -> index ][ $method ]));
return $CACHE [ $this -> index ][ $method ];
}
/**
* Login to the database with the application user / password
*
* @ return boolean true | false for successful login .
*/
public function login ( $user = null , $pass = null , $method = null , $new = false ) {
$userDN = null ;
# Get the userDN from the username.
if ( ! is_null ( $user )) {
# If login,attr is set to DN, then user should be a DN
if (( $this -> getValue ( 'login' , 'attr' ) == 'dn' ) || $method != 'user' )
$userDN = $user ;
else
$userDN = $this -> getLoginID ( $user , 'login' );
if ( ! $userDN && $this -> getValue ( 'login' , 'fallback_dn' ))
$userDN = $user ;
if ( ! $userDN )
return false ;
} else {
if ( in_array ( $method , array ( 'user' , 'anon' ))) {
$method = 'anon' ;
$userDN = '' ;
$pass = '' ;
} else {
$userDN = $this -> getLogin ( 'user' );
$pass = $this -> getPassword ( 'user' );
}
}
if ( ! $this -> isAnonBindAllowed () && ! trim ( $userDN ))
return false ;
# Temporarily set our user details
$this -> setLogin ( $userDN , $pass , $method );
$connect = $this -> connect ( $method , false , $new );
# If we didnt log in...
if ( ! is_resource ( $connect ) || $this -> noconnect || ! $this -> userIsAllowedLogin ( $userDN )) {
$this -> logout ( $method );
return false ;
} else
return true ;
}
/**
* Perform a query to the Database
*
* @ param string query to perform
* $query [ 'base' ]
* $query [ 'filter' ]
* $query [ 'scope' ]
* $query [ 'attrs' ] = array ();
* $query [ 'deref' ]
* @ param string Which connection method resource to use
* @ param string Index items according to this key
* @ param boolean Enable debugging output
* @ return array | null Results of query .
*/
public function query ( $query , $method , $index = null , $debug = false ) {
$attrs_only = 0 ;
# Defaults
if ( ! isset ( $query [ 'attrs' ]))
$query [ 'attrs' ] = array ();
else
# Re-index the attrs, PHP throws an error if the keys are not sequential from 0.
$query [ 'attrs' ] = array_values ( $query [ 'attrs' ]);
if ( ! isset ( $query [ 'base' ])) {
$bases = $this -> getBaseDN ();
$query [ 'base' ] = array_shift ( $bases );
}
if ( ! isset ( $query [ 'deref' ]))
$query [ 'deref' ] = $_SESSION [ APPCONFIG ] -> getValue ( 'deref' , 'search' );
if ( ! isset ( $query [ 'filter' ]))
$query [ 'filter' ] = '(&(objectClass=*))' ;
if ( ! isset ( $query [ 'scope' ]))
$query [ 'scope' ] = 'sub' ;
if ( ! isset ( $query [ 'size_limit' ]))
$query [ 'size_limit' ] = 0 ;
if ( ! isset ( $query [ 'time_limit' ]))
$query [ 'time_limit' ] = 0 ;
if ( $query [ 'scope' ] == 'base' && ! isset ( $query [ 'baseok' ]))
system_message ( array (
'title' => sprintf ( 'Dont call %s' , __METHOD__ ),
'body' => sprintf ( 'Use getDNAttrValues for base queries [%s]' , $query [ 'base' ]),
'type' => 'info' ));
if ( is_array ( $query [ 'base' ])) {
system_message ( array (
2011-07-13 18:30:14 +00:00
'title' => ( 'Invalid BASE for query' ),
'body' => ( 'The query was cancelled because of an invalid base.' ),
2011-06-26 10:44:28 +00:00
'type' => 'error' ));
return array ();
}
if ( $debug )
debug_dump ( array ( 'query' => $query , 'server' => $this -> getIndex (), 'con' => $this -> connect ( $method )));
$resource = $this -> connect ( $method , $debug );
switch ( $query [ 'scope' ]) {
case 'base' :
$search = @ ldap_read ( $resource , $query [ 'base' ], $query [ 'filter' ], $query [ 'attrs' ], $attrs_only , $query [ 'size_limit' ], $query [ 'time_limit' ], $query [ 'deref' ]);
break ;
case 'one' :
$search = @ ldap_list ( $resource , $query [ 'base' ], $query [ 'filter' ], $query [ 'attrs' ], $attrs_only , $query [ 'size_limit' ], $query [ 'time_limit' ], $query [ 'deref' ]);
break ;
case 'sub' :
default :
$search = @ ldap_search ( $resource , $query [ 'base' ], $query [ 'filter' ], $query [ 'attrs' ], $attrs_only , $query [ 'size_limit' ], $query [ 'time_limit' ], $query [ 'deref' ]);
break ;
}
if ( $debug )
debug_dump ( array ( 'method' => $method , 'search' => $search , 'error' => $this -> getErrorMessage ()));
if ( ! $search )
return array ();
$return = array ();
# Get the first entry identifier
if ( $entries = ldap_get_entries ( $resource , $search )) {
# Remove the count
if ( isset ( $entries [ 'count' ]))
unset ( $entries [ 'count' ]);
# Iterate over the entries
foreach ( $entries as $a => $entry ) {
if ( ! isset ( $entry [ 'dn' ]))
debug_dump_backtrace ( 'No DN?' , 1 );
# Remove the none entry references.
if ( ! is_array ( $entry )) {
unset ( $entries [ $a ]);
continue ;
}
$dn = $entry [ 'dn' ];
unset ( $entry [ 'dn' ]);
# Iterate over the attributes
foreach ( $entry as $b => $attrs ) {
# Remove the none entry references.
if ( ! is_array ( $attrs )) {
unset ( $entry [ $b ]);
continue ;
}
# Remove the count
if ( isset ( $entry [ $b ][ 'count' ]))
unset ( $entry [ $b ][ 'count' ]);
}
# Our queries always include the DN (the only value not an array).
$entry [ 'dn' ] = $dn ;
$return [ $dn ] = $entry ;
}
# Sort our results
foreach ( $return as $key => $values )
ksort ( $return [ $key ]);
}
return $return ;
}
/**
* Get the last error string
*
* @ param string Which connection method resource to use
*/
public function getErrorMessage ( $method = null ) {
return ldap_error ( $this -> connect ( $method ));
}
/**
* Get the last error number
*
* @ param string Which connection method resource to use
*/
public function getErrorNum ( $method = null ) {
return ldap_errno ( $this -> connect ( $method ));
}
/**
* Additional functions
*/
/**
* Get a user ID
*
* @ param string Which connection method resource to use
*/
public function getLoginID ( $user , $method = null ) {
$query [ 'filter' ] = sprintf ( '(&(%s=%s)%s)' ,
$this -> getValue ( 'login' , 'attr' ), $user ,
$this -> getLoginClass () ? sprintf ( '(objectclass=%s)' , join ( ')(objectclass=' , $this -> getLoginClass ())) : '' );
$query [ 'attrs' ] = array ( 'dn' );
$result = array ();
foreach ( $this -> getLoginBaseDN () as $base ) {
$query [ 'base' ] = $base ;
$result = $this -> query ( $query , $method );
if ( count ( $result ) == 1 )
break ;
}
if ( count ( $result ) != 1 )
return null ;
$detail = array_shift ( $result );
if ( ! isset ( $detail [ 'dn' ]))
die ( 'ERROR: DN missing?' );
else
return $detail [ 'dn' ];
}
/**
* Return the login base DNs
* If no login base DNs are defined , then the LDAP server Base DNs are used .
*/
private function getLoginBaseDN () {
if ( $this -> getValue ( 'login' , 'base' ))
return $this -> getValue ( 'login' , 'base' );
else
return $this -> getBaseDN ();
}
/**
* Return the login classes that a user must have to login
*/
private function getLoginClass () {
return $this -> getValue ( 'login' , 'class' );
}
/**
* Return if anonymous bind is allowed in the configuration
*/
public function isAnonBindAllowed () {
return $this -> getValue ( 'login' , 'anon_bind' );
}
/**
* Fetches whether TLS has been configured for use with a certain server .
*
* Users may configure phpLDAPadmin to use TLS in config , php thus :
* < code >
* $servers -> setValue ( 'server' , 'tls' , true | false );
* </ code >
*
* @ return boolean
*/
private function isTLSEnabled () {
if ( $this -> getValue ( 'server' , 'tls' ) && ! function_exists ( 'ldap_start_tls' )) {
2011-07-14 19:44:14 +00:00
error (( 'TLS has been enabled in your config, but your PHP install does not support TLS. TLS will be disabled.' ), 'warn' );
2011-06-26 10:44:28 +00:00
return false ;
} else
return $this -> getValue ( 'server' , 'tls' );
}
/**
* If TLS is configured , then start it
*/
private function startTLS ( $resource ) {
if ( ! $this -> getValue ( 'server' , 'tls' ) || ( function_exists ( 'ldap_start_tls' ) && ! @ ldap_start_tls ( $resource ))) {
system_message ( array (
2011-07-12 19:23:27 +00:00
'title' => sprintf ( '%s (%s)' ,( 'Could not start TLS.' ), $this -> getName ()),
'body' => sprintf ( '<b>%s</b>: %s' ,( 'Error' ),( 'Could not start TLS. Please check your LDAP server configuration.' )),
2011-06-26 10:44:28 +00:00
'type' => 'error' ));
return false ;
} else
return true ;
}
/**
* Fetches whether SASL has been configured for use with a certain server .
*
* Users may configure phpLDAPadmin to use SASL in config , php thus :
* < code >
* $servers -> setValue ( 'server' , 'sasl' , true | false );
* </ code >
*
* @ return boolean
*/
private function isSASLEnabled () {
if ( $this -> getValue ( 'server' , 'sasl' ) && ! function_exists ( 'ldap_sasl_bind' )) {
2011-07-14 19:44:14 +00:00
error (( 'SASL has been enabled in your config, but your PHP install does not support SASL. SASL will be disabled.' ), 'warn' );
2011-06-26 10:44:28 +00:00
return false ;
} else
return $this -> getValue ( 'server' , 'sasl' );
}
/**
* If SASL is configured , then start it
* To be able to use SASL , PHP should have been compliled with -- with - ldap - sasl = DIR
*
* @ todo This has not been tested , please let the developers know if this function works as expected .
*/
private function startSASL ( $resource , $method ) {
static $CACHE = array ();
if ( ! $this -> getValue ( 'server' , 'sasl' ) || ! function_exists ( 'ldap_start_tls' ))
return false ;
if ( ! isset ( $CACHE [ 'login_dn' ])) {
$CACHE [ 'login_dn' ] = is_null ( $this -> getLogin ( $method )) ? $this -> getLogin ( 'user' ) : $this -> getLogin ( $method );
$CACHE [ 'login_pass' ] = is_null ( $this -> getPassword ( $method )) ? $this -> getPassword ( 'user' ) : $this -> getPassword ( $method );
}
$mech = strtolower ( $this -> getValue ( 'sasl' , 'mech' ));
# Do we need to rewrite authz_id?
if ( ! isset ( $CACHE [ 'authz_id' ]))
if ( ! trim ( $this -> getValue ( 'sasl' , 'authz_id' )) && $mech != 'gssapi' ) {
$CACHE [ 'authz_id' ] = @ preg_replace ( $this -> getValue ( 'sasl' , 'authz_id_regex' ),
$this -> getValue ( 'sasl' , 'authz_id_replacement' ), $CACHE [ 'login_dn' ]);
# Invalid regex?
if ( is_null ( $CACHE [ 'authz_id' ]))
2011-07-08 08:29:26 +00:00
error ( sprintf (( 'It seems that sasl_authz_id_regex "%s" contains invalid PCRE regular expression. The error is "%s".' ),
2011-06-26 10:44:28 +00:00
$this -> getValue ( 'sasl' , 'authz_id_regex' ),( isset ( $php_errormsg ) ? $php_errormsg : '' )),
'error' , 'index.php' );
} else
$CACHE [ 'authz_id' ] = $this -> getValue ( 'sasl' , 'authz_id' );
# @todo this function is different in PHP5.1 and PHP5.2
return @ ldap_sasl_bind ( $resource , $CACHE [ 'login_dn' ], $CACHE [ 'login_pass' ],
$this -> getValue ( 'sasl' , 'mech' ),
$this -> getValue ( 'sasl' , 'realm' ),
$CACHE [ 'authz_id' ],
$this -> getValue ( 'sasl' , 'props' ));
}
/**
* Fetches whether PROXY AUTH has been configured for use with a certain server .
*
* Users may configure phpLDAPadmin to use PROXY AUTH in config , php thus :
* < code >
* $servers -> setValue ( 'login' , 'auth_type' , 'proxy' );
* </ code >
*
* @ return boolean
*/
private function isProxyEnabled () {
return $this -> getValue ( 'login' , 'auth_type' ) == 'proxy' ? true : false ;
}
/**
* If PROXY AUTH is configured , then start it
*/
private function startProxy ( $resource , $method ) {
$rootdse = $this -> getRootDSE ();
if ( ! ( isset ( $rootdse [ 'supportedcontrol' ]) && in_array ( '2.16.840.1.113730.3.4.18' , $rootdse [ 'supportedcontrol' ]))) {
system_message ( array (
2011-07-12 19:23:27 +00:00
'title' => sprintf ( '%s %s' ,( 'Unable to start proxy connection' ), $this -> getName ()),
'body' => sprintf ( '<b>%s</b>: %s' ,( 'Error' ),( 'Your LDAP server doesnt seem to support this control' )),
2011-06-26 10:44:28 +00:00
'type' => 'error' ));
return false ;
}
$filter = '(&' ;
$dn = '' ;
$missing = false ;
foreach ( $this -> getValue ( 'proxy' , 'attr' ) as $attr => $var ) {
if ( ! isset ( $_SERVER [ $var ])) {
system_message ( array (
2011-07-12 19:23:27 +00:00
'title' => sprintf ( '%s %s' ,( 'Unable to start proxy connection' ), $this -> getName ()),
'body' => sprintf ( '<b>%s</b>: %s (%s)' ,( 'Error' ),( 'Attribute doesnt exist' ), $var ),
2011-06-26 10:44:28 +00:00
'type' => 'error' ));
$missing = true ;
} else {
if ( $attr == 'dn' ) {
$dn = $var ;
break ;
} else
$filter .= sprintf ( '(%s=%s)' , $attr , $_SERVER [ $var ]);
}
}
if ( $missing )
return false ;
$filter .= ')' ;
if ( ! $dn ) {
$query [ 'filter' ] = $filter ;
foreach ( $this -> getBaseDN () as $base ) {
$query [ 'base' ] = $base ;
if ( $search = $this -> query ( $query , $method ))
break ;
}
if ( count ( $search ) != 1 ) {
system_message ( array (
2011-07-12 19:23:27 +00:00
'title' => sprintf ( '%s %s' ,( 'Unable to start proxy connection' ), $this -> getName ()),
'body' => sprintf ( '<b>%s</b>: %s (%s)' ,( 'Error' ),( 'Search for DN returned the incorrect number of results' ), count ( $search )),
2011-06-26 10:44:28 +00:00
'type' => 'error' ));
return false ;
}
$search = array_pop ( $search );
$dn = $search [ 'dn' ];
}
$ctrl = array (
'oid' => '2.16.840.1.113730.3.4.18' ,
'value' => sprintf ( 'dn:%s' , $dn ),
'iscritical' => true );
if ( ! ldap_set_option ( $resource , LDAP_OPT_SERVER_CONTROLS , array ( $ctrl ))) {
system_message ( array (
2011-07-12 19:23:27 +00:00
'title' => sprintf ( '%s %s' ,( 'Unable to start proxy connection' ), $this -> getName ()),
'body' => sprintf ( '<b>%s</b>: %s (%s) for <b>%s</b>' ,( 'Error' ), $this -> getErrorMessage ( $method ), $this -> getErrorNum ( $method ), $method ),
2011-06-26 10:44:28 +00:00
'type' => 'error' ));
return false ;
}
$_SESSION [ 'USER' ][ $this -> index ][ $method ][ 'proxy' ] = blowfish_encrypt ( $dn );
return true ;
}
/**
* Modify attributes of a DN
*/
public function modify ( $dn , $attrs , $method = null ) {
# We need to supress the error here - programming should detect and report it.
return @ ldap_mod_replace ( $this -> connect ( $method ), $dn , $attrs );
}
/**
* Gets the root DN of the specified LDAPServer , or null if it
* can 't find it (ie, the server won' t give it to us , or it isnt
* specified in the configuration file ) .
*
* Tested with OpenLDAP 2.0 , Netscape iPlanet , and Novell eDirectory 8.7 ( nldap . com )
* Please report any and all bugs !!
*
* Please note : On FC systems , it seems that php_ldap uses / etc / openldap / ldap . conf in
* the search base if it is blank - so edit that file and comment out the BASE line .
*
* @ param string Which connection method resource to use
* @ return array dn | null The root DN of the server on success ( string ) or null on error .
* @ todo Sort the entries , so that they are in the correct DN order .
*/
public function getBaseDN ( $method = null ) {
static $CACHE ;
$method = $this -> getMethod ( $method );
$result = array ();
if ( isset ( $CACHE [ $this -> index ][ $method ]))
return $CACHE [ $this -> index ][ $method ];
# If the base is set in the configuration file, then just return that.
if ( count ( $this -> getValue ( 'server' , 'base' ))) {
$CACHE [ $this -> index ][ $method ] = $this -> getValue ( 'server' , 'base' );
# We need to figure it out.
} else {
# Set this to empty, in case we loop back here looking for the baseDNs
$CACHE [ $this -> index ][ $method ] = array ();
$results = $this -> getDNAttrValues ( ' ' , $method );
if ( isset ( $results [ 'namingcontexts' ])) {
$result = $results [ 'namingcontexts' ];
}
$CACHE [ $this -> index ][ $method ] = $result ;
}
return $CACHE [ $this -> index ][ $method ];
}
/**
* Gets whether an entry exists based on its DN . If the entry exists ,
* returns true . Otherwise returns false .
*
* @ param string The DN of the entry of interest .
* @ param string Which connection method resource to use
* @ return boolean
*/
public function dnExists ( $dn , $method = null ) {
$results = $this -> getDNAttrValues ( $dn , $method );
if ( $results )
return $results ;
else
return false ;
}
/**
* Given a DN string , this returns the top container portion of the string .
*
* @ param string The DN whose container string to return .
* @ return string The container
*/
public function getContainerTop ( $dn ) {
$return = $dn ;
foreach ( $this -> getBaseDN () as $base ) {
if ( preg_match ( " / ${ base } $ /i " , $dn )) {
$return = $base ;
break ;
}
}
return $return ;
}
/**
* Given a DN string and a path like syntax , this returns the parent container portion of the string .
*
* @ param string The DN whose container string to return .
* @ param string Either '/' , '.' or something like '../../<rdn>'
* @ return string The container
*/
public function getContainerPath ( $dn , $path = '..' ) {
$top = $this -> getContainerTop ( $dn );
if ( $path [ 0 ] == '/' ) {
$dn = $top ;
$path = substr ( $path , 1 );
} elseif ( $path == '.' ) {
return $dn ;
}
$parenttree = explode ( '/' , $path );
foreach ( $parenttree as $key => $value ) {
if ( $value == '..' ) {
if ( $this -> getContainer ( $dn ))
$dn = $this -> getContainer ( $dn );
if ( $dn == $top )
break ;
} elseif ( $value )
$dn = sprintf ( '%s,%s' , $value , $dn );
else
break ;
}
if ( ! $dn ) {
debug_dump ( array ( __METHOD__ , 'dn' => $dn , 'path' => $path ));
debug_dump_backtrace ( 'Container is empty?' , 1 );
}
return $dn ;
}
/**
* Given a DN string , this returns the parent container portion of the string .
* For example . given 'cn=Manager,dc=example,dc=com' , this function returns
* 'dc=example,dc=com' .
*
* @ param string The DN whose container string to return .
* @ return string The container
*/
public function getContainer ( $dn ) {
$parts = $this -> explodeDN ( $dn );
if ( count ( $parts ) <= 1 )
$return = null ;
else {
$return = $parts [ 1 ];
for ( $i = 2 ; $i < count ( $parts ); $i ++ )
$return .= sprintf ( ',%s' , $parts [ $i ]);
}
return $return ;
}
/**
* Gets a list of child entries for an entry . Given a DN , this function fetches the list of DNs of
* child entries one level beneath the parent . For example , for the following tree :
*
* < code >
* dc = example , dc = com
* ou = People
* cn = Dave
* cn = Fred
* cn = Joe
* ou = More People
* cn = Mark
* cn = Bob
* </ code >
*
* Calling < code > getContainerContents ( " ou=people,dc=example,dc=com " ) </ code >
* would return the following list :
*
* < code >
* cn = Dave
* cn = Fred
* cn = Joe
* ou = More People
* </ code >
*
* @ param string The DN of the entry whose children to return .
* @ param string Which connection method resource to use
* @ param int ( optional ) The maximum number of entries to return .
* If unspecified , no limit is applied to the number of entries in the returned .
* @ param string ( optional ) An LDAP filter to apply when fetching children , example : " (objectClass=inetOrgPerson) "
* @ param constant ( optional ) The LDAP deref setting to use in the query
* @ return array An array of DN strings listing the immediate children of the specified entry .
*/
public function getContainerContents ( $dn , $method = null , $size_limit = 0 , $filter = '(objectClass=*)' , $deref = LDAP_DEREF_NEVER ) {
$return = array ();
$query = array ();
$query [ 'base' ] = $this -> escapeDN ( $dn );
$query [ 'attrs' ] = array ( 'dn' );
$query [ 'filter' ] = $filter ;
$query [ 'deref' ] = $deref ;
$query [ 'scope' ] = 'one' ;
$query [ 'size_limit' ] = $size_limit ;
$results = $this -> query ( $query , $method );
if ( $results ) {
foreach ( $results as $index => $entry ) {
$child_dn = $entry [ 'dn' ];
array_push ( $return , $child_dn );
}
}
# Sort the results
asort ( $return );
return $return ;
}
/**
* Explode a DN into an array of its RDN parts .
*
* @ param string The DN to explode .
* @ param int ( optional ) Whether to include attribute names ( see http :// php . net / ldap_explode_dn for details )
*
* @ return array An array of RDN parts of this format :
* < code >
* Array
* (
* [ 0 ] => uid = ppratt
* [ 1 ] => ou = People
* [ 2 ] => dc = example
* [ 3 ] => dc = com
* )
* </ code >
*
* NOTE : When a multivalue RDN is passed to ldap_explode_dn , the results returns with 'value + value' ;
*/
private function explodeDN ( $dn , $with_attributes = 0 ) {
static $CACHE ;
if ( isset ( $CACHE [ 'explode' ][ $dn ][ $with_attributes ])) {
return $CACHE [ 'explode' ][ $dn ][ $with_attributes ];
}
$dn = addcslashes ( $dn , '<>+";' );
# split the dn
$result [ 0 ] = ldap_explode_dn ( $this -> escapeDN ( $dn ), 0 );
$result [ 1 ] = ldap_explode_dn ( $this -> escapeDN ( $dn ), 1 );
if ( ! $result [ $with_attributes ]) {
return array ();
}
# Remove our count value that ldap_explode_dn returns us.
unset ( $result [ 0 ][ 'count' ]);
unset ( $result [ 1 ][ 'count' ]);
# Record the forward and reverse entries in the cache.
foreach ( $result as $key => $value ) {
# translate hex code into ascii for display
2013-08-02 21:01:14 +00:00
$result [ $key ] = dn_unescape ( $value );
2011-06-26 10:44:28 +00:00
$CACHE [ 'explode' ][ implode ( ',' , $result [ 0 ])][ $key ] = $result [ $key ];
$CACHE [ 'explode' ][ implode ( ',' , array_reverse ( $result [ 0 ]))][ $key ] = array_reverse ( $result [ $key ]);
}
return $result [ $with_attributes ];
}
/**
* Parse a DN and escape any special characters
*/
protected function escapeDN ( $dn ) {
if ( ! trim ( $dn ))
return $dn ;
# Check if the RDN has a comma and escape it.
while ( preg_match ( '/([^\\\\]),(\s*[^=]*\s*),/' , $dn ))
$dn = preg_replace ( '/([^\\\\]),(\s*[^=]*\s*),/' , '$1\\\\2C$2,' , $dn );
$dn = preg_replace ( '/([^\\\\]),(\s*[^=]*\s*)([^,])$/' , '$1\\\\2C$2$3' , $dn );
return $dn ;
}
public function getRootDSE ( $method = null ) {
$query = array ();
$query [ 'base' ] = '' ;
$query [ 'scope' ] = 'base' ;
$query [ 'attrs' ] = $this -> getValue ( 'server' , 'root_dse_attributes' );
$query [ 'baseok' ] = true ;
$results = $this -> query ( $query , $method );
if ( is_array ( $results ) && count ( $results ) == 1 )
return array_change_key_case ( array_pop ( $results ));
else
return array ();
}
/** Schema Methods **/
/**
* This function will query the ldap server and request the subSchemaSubEntry which should be the Schema DN .
*
* If we cant connect to the LDAP server , we ' ll return false .
* If we can connect but cant get the entry , then we ' ll return null .
*
* @ param string Which connection method resource to use
* @ param dn The DN to use to obtain the schema
* @ return array | false Schema if available , null if its not or false if we cant connect .
*/
private function getSchemaDN ( $method = null , $dn = '' ) {
# If we already got the SchemaDN, then return it.
if ( $this -> _schemaDN )
return $this -> _schemaDN ;
if ( ! $this -> connect ( $method ))
return false ;
$search = @ ldap_read ( $this -> connect ( $method ), $dn , 'objectclass=*' , array ( 'subschemaSubentry' ), false , 0 , 10 , LDAP_DEREF_NEVER );
# Fix for broken ldap.conf configuration.
if ( ! $search && ! $dn ) {
if ( isset ( $this -> _baseDN )) {
foreach ( $this -> _baseDN as $base ) {
$search = @ ldap_read ( $this -> connect ( $method ), $base , 'objectclass=*' , array ( 'subschemaSubentry' ), false , 0 , 10 , LDAP_DEREF_NEVER );
if ( $search )
break ;
}
}
}
if ( ! $search )
return null ;
if ( ! @ ldap_count_entries ( $this -> connect ( $method ), $search )) {
return null ;
}
$entries = @ ldap_get_entries ( $this -> connect ( $method ), $search );
if ( ! $entries || ! is_array ( $entries ))
return null ;
$entry = isset ( $entries [ 0 ]) ? $entries [ 0 ] : false ;
if ( ! $entry ) {
return null ;
}
$sub_schema_sub_entry = isset ( $entry [ 0 ]) ? $entry [ 0 ] : false ;
if ( ! $sub_schema_sub_entry ) {
return null ;
}
$this -> _schemaDN = isset ( $entry [ $sub_schema_sub_entry ][ 0 ]) ? $entry [ $sub_schema_sub_entry ][ 0 ] : false ;
return $this -> _schemaDN ;
}
/**
* Fetches the raw schema array for the subschemaSubentry of the server . Note ,
* this function has grown many hairs to accomodate more LDAP servers . It is
* needfully complicated as it now supports many popular LDAP servers that
* don ' t necessarily expose their schema " the right way " .
*
* Please note : On FC systems , it seems that php_ldap uses / etc / openldap / ldap . conf in
* the search base if it is blank - so edit that file and comment out the BASE line .
*
* @ param string Which connection method resource to use
* @ param string A string indicating which type of schema to
* fetch . Five valid values : 'objectclasses' , 'attributetypes' ,
* 'ldapsyntaxes' , 'matchingruleuse' , or 'matchingrules' .
* Case insensitive .
* @ param dn ( optional ) This paremeter is the DN of the entry whose schema you
* would like to fetch . Entries have the option of specifying
* their own subschemaSubentry that points to the DN of the system
* schema entry which applies to this attribute . If unspecified ,
* this will try to retrieve the schema from the RootDSE subschemaSubentry .
* Failing that , we use some commonly known schema DNs . Default
* value is the Root DSE DN ( zero - length string )
* @ return array an array of strings of this form :
* Array (
* [ 0 ] => " (1.3.6.1.4.1.7165.1.2.2.4 NAME 'gidPool' DESC 'Pool ...
* [ 1 ] => " (1.3.6.1.4.1.7165.2.2.3 NAME 'sambaAccount' DESC 'Sa ...
* etc .
*/
private function getRawSchema ( $method , $schema_to_fetch , $dn = '' ) {
$valid_schema_to_fetch = array ( 'objectclasses' , 'attributetypes' , 'ldapsyntaxes' , 'matchingrules' , 'matchingruleuse' );
if ( ! $this -> connect ( $method ) || $this -> noconnect )
return false ;
# error checking
$schema_to_fetch = strtolower ( $schema_to_fetch );
if ( ! is_null ( $this -> _schema_entries ) && isset ( $this -> _schema_entries [ $schema_to_fetch ])) {
$schema = $this -> _schema_entries [ $schema_to_fetch ];
return $schema ;
}
# This error message is not localized as only developers should ever see it
if ( ! in_array ( $schema_to_fetch , $valid_schema_to_fetch ))
error ( sprintf ( 'Bad parameter provided to function to %s::getRawSchema(). "%s" is not valid for the schema_to_fetch parameter.' ,
get_class ( $this ), $schema_to_fetch ), 'error' , 'index.php' );
# Try to get the schema DN from the specified entry.
$schema_dn = $this -> getSchemaDN ( $method , $dn );
# Do we need to try again with the Root DSE?
if ( ! $schema_dn && trim ( $dn ))
$schema_dn = $this -> getSchemaDN ( $method , '' );
# Store the eventual schema retrieval in $schema_search
$schema_search = null ;
if ( $schema_dn ) {
foreach ( array ( '(objectClass=*)' , '(objectClass=subschema)' ) as $schema_filter ) {
$schema_search = @ ldap_read ( $this -> connect ( $method ), $schema_dn , $schema_filter , array ( $schema_to_fetch ), false , 0 , 10 , LDAP_DEREF_NEVER );
if ( is_null ( $schema_search ))
continue ;
$schema_entries = @ ldap_get_entries ( $this -> connect ( $method ), $schema_search );
if ( is_array ( $schema_entries ) && isset ( $schema_entries [ 'count' ]) && $schema_entries [ 'count' ]) {
break ;
}
unset ( $schema_entries );
$schema_search = null ;
}
}
/* Second chance : If the DN or Root DSE didn ' t give us the subschemaSubentry , ie $schema_search
* is still null , use some common subSchemaSubentry DNs as a work - around . */
if ( is_null ( $schema_search )) {
foreach ( $this -> getBaseDN () as $base ) {
$ldap [ 'W2K3 AD' ][ expand_dn_with_base ( $base , 'cn=Aggregate,cn=Schema,cn=configuration,' )] = '(objectClass=*)' ;
$ldap [ 'W2K AD' ][ expand_dn_with_base ( $base , 'cn=Schema,cn=configuration,' )] = '(objectClass=*)' ;
$ldap [ 'W2K AD' ][ expand_dn_with_base ( $base , 'cn=Schema,ou=Admin,' )] = '(objectClass=*)' ;
}
# OpenLDAP and Novell
$ldap [ 'OpenLDAP' ][ 'cn=subschema' ] = '(objectClass=*)' ;
foreach ( $ldap as $ldap_server_name => $ldap_options ) {
foreach ( $ldap_options as $ldap_dn => $ldap_filter ) {
$schema_search = @ ldap_read ( $this -> connect ( $method ), $ldap_dn , $ldap_filter , array ( $schema_to_fetch ), false , 0 , 10 , LDAP_DEREF_NEVER );
if ( is_null ( $schema_search ))
continue ;
$schema_entries = @ ldap_get_entries ( $this -> connect ( $method ), $schema_search );
if ( $schema_entries && isset ( $schema_entries [ 0 ][ $schema_to_fetch ])) {
break ;
}
unset ( $schema_entries );
$schema_search = null ;
}
if ( $schema_search )
break ;
}
}
if ( is_null ( $schema_search )) {
/* Still cant find the schema , try with the RootDSE
* Attempt to pull schema from Root DSE with scope " base " , or
* Attempt to pull schema from Root DSE with scope " one " ( work - around for Isode M - Vault X . 500 / LDAP ) */
foreach ( array ( 'base' , 'one' ) as $ldap_scope ) {
switch ( $ldap_scope ) {
case 'base' :
$schema_search = @ ldap_read ( $this -> connect ( $method ), '' , '(objectClass=*)' , array ( $schema_to_fetch ), false , 0 , 10 , LDAP_DEREF_NEVER );
break ;
case 'one' :
$schema_search = @ ldap_list ( $this -> connect ( $method ), '' , '(objectClass=*)' , array ( $schema_to_fetch ), false , 0 , 10 , LDAP_DEREF_NEVER );
break ;
}
if ( is_null ( $schema_search ))
continue ;
$schema_entries = @ ldap_get_entries ( $this -> connect ( $method ), $schema_search );
if ( $schema_entries && isset ( $schema_entries [ 0 ][ $schema_to_fetch ])) {
break ;
}
unset ( $schema_entries );
$schema_search = null ;
}
}
$schema_error_message = 'Please contact the phpLDAPadmin developers and let them know:<ul><li>Which LDAP server you are running, including which version<li>What OS it is running on<li>Which version of PHP<li>As well as a link to some documentation that describes how to obtain the SCHEMA information</ul><br />We\'ll then add support for your LDAP server in an upcoming release.' ;
$schema_error_message_array = array ( 'objectclasses' , 'attributetypes' );
# Shall we just give up?
if ( is_null ( $schema_search )) {
# We need to have objectclasses and attribues, so display an error, asking the user to get us this information.
if ( in_array ( $schema_to_fetch , $schema_error_message_array ))
system_message ( array (
2011-07-14 18:29:11 +00:00
'title' => sprintf ( '%s (%s)' ,( 'Our attempts to find your SCHEMA have failed' ), $schema_to_fetch ),
'body' => sprintf ( '<b>%s</b>: %s' ,( 'Error' ), $schema_error_message ),
2011-06-26 10:44:28 +00:00
'type' => 'error' ));
# We'll set this, so if we return here our cache will return the known false.
$this -> _schema_entries [ $schema_to_fetch ] = false ;
return false ;
}
if ( ! $schema_entries ) {
$return = false ;
return $return ;
}
if ( ! isset ( $schema_entries [ 0 ][ $schema_to_fetch ])) {
if ( in_array ( $schema_to_fetch , $schema_error_message_array )) {
error ( sprintf ( 'Our attempts to find your SCHEMA for "%s" has return UNEXPECTED results.<br /><br /><small>(We expected a "%s" in the $schema array but it wasnt there.)</small><br /><br />%s<br /><br />Dump of $schema_search:<hr /><pre><small>%s</small></pre>' ,
$schema_to_fetch , gettype ( $schema_search ), $schema_error_message , serialize ( $schema_entries )), 'error' , 'index.php' );
} else {
$return = false ;
return $return ;
}
}
/* Make a nice array of this form :
Array (
[ 0 ] => " (1.3.6.1.4.1.7165.1.2.2.4 NAME 'gidPool' DESC 'Pool ...) "
[ 1 ] => " (1.3.6.1.4.1.7165.2.2.3 NAME 'sambaAccount' DESC 'Sa ...) "
etc . ) */
$schema = $schema_entries [ 0 ][ $schema_to_fetch ];
unset ( $schema [ 'count' ]);
$this -> _schema_entries [ $schema_to_fetch ] = $schema ;
return $schema ;
}
/**
* Gets a single ObjectClass object specified by name .
*
* @ param string $oclass_name The name of the objectClass to fetch .
* @ param string $dn ( optional ) It is easier to fetch schema if a DN is provided
* which defines the subschemaSubEntry attribute ( all entries should ) .
*
* @ return ObjectClass The specified ObjectClass object or false on error .
*
* @ see ObjectClass
* @ see SchemaObjectClasses
*/
public function getSchemaObjectClass ( $oclass_name , $method = null , $dn = '' ) {
$oclass_name = strtolower ( $oclass_name );
$socs = $this -> SchemaObjectClasses ( $method , $dn );
# Default return value
$return = false ;
if ( isset ( $socs [ $oclass_name ]))
$return = $socs [ $oclass_name ];
return $return ;
}
/**
* Gets a single AttributeType object specified by name .
*
* @ param string $oclass_name The name of the AttributeType to fetch .
* @ param string $dn ( optional ) It is easier to fetch schema if a DN is provided
* which defines the subschemaSubEntry attribute ( all entries should ) .
*
* @ return AttributeType The specified AttributeType object or false on error .
*
* @ see AttributeType
* @ see SchemaAttributes
*/
public function getSchemaAttribute ( $attr_name , $method = null , $dn = '' ) {
$attr_name = strtolower ( $attr_name );
$sattrs = $this -> SchemaAttributes ( $method , $dn );
# Default return value
$return = false ;
if ( isset ( $sattrs [ $attr_name ]))
$return = $sattrs [ $attr_name ];
return $return ;
}
/**
* Gets an associative array of ObjectClass objects for the specified
* server . Each array entry ' s key is the name of the objectClass
* in lower - case and the value is an ObjectClass object .
*
* @ param string $dn ( optional ) It is easier to fetch schema if a DN is provided
* which defines the subschemaSubEntry attribute ( all entries should ) .
*
* @ return array An array of ObjectClass objects .
*
* @ see ObjectClass
* @ see getSchemaObjectClass
*/
public function SchemaObjectClasses ( $method = null , $dn = '' ) {
# Set default return
$return = null ;
if ( $return = get_cached_item ( $this -> index , 'schema' , 'objectclasses' )) {
return $return ;
}
$raw = $this -> getRawSchema ( $method , 'objectclasses' , $dn );
if ( $raw ) {
# Build the array of objectClasses
$return = array ();
foreach ( $raw as $line ) {
if ( is_null ( $line ) || ! strlen ( $line ))
continue ;
$object_class = new ObjectClass ( $line , $this );
$return [ $object_class -> getName ()] = $object_class ;
}
# Now go through and reference the parent/child relationships
foreach ( $return as $oclass )
foreach ( $oclass -> getSupClasses () as $parent_name )
if ( isset ( $return [ strtolower ( $parent_name )]))
$return [ strtolower ( $parent_name )] -> addChildObjectClass ( $oclass -> getName ( false ));
ksort ( $return );
# cache the schema to prevent multiple schema fetches from LDAP server
set_cached_item ( $this -> index , 'schema' , 'objectclasses' , $return );
}
return $return ;
}
/**
* Gets an associative array of AttributeType objects for the specified
* server . Each array entry ' s key is the name of the attributeType
* in lower - case and the value is an AttributeType object .
*
* @ param string $dn ( optional ) It is easier to fetch schema if a DN is provided
* which defines the subschemaSubEntry attribute ( all entries should ) .
*
* @ return array An array of AttributeType objects .
*/
public function SchemaAttributes ( $method = null , $dn = '' ) {
# Set default return
$return = null ;
if ( $return = get_cached_item ( $this -> index , 'schema' , 'attributes' )) {
return $return ;
}
$raw = $this -> getRawSchema ( $method , 'attributeTypes' , $dn );
if ( $raw ) {
# build the array of attribueTypes
$syntaxes = $this -> SchemaSyntaxes ( $method , $dn );
$attrs = array ();
/**
* bug 856832 : create two arrays - one indexed by name ( the standard
* $attrs array above ) and one indexed by oid ( the new $attrs_oid array
* below ) . This will help for directory servers , like IBM ' s , that use OIDs
* in their attribute definitions of SUP , etc
*/
$attrs_oid = array ();
foreach ( $raw as $line ) {
if ( is_null ( $line ) || ! strlen ( $line ))
continue ;
$attr = new AttributeType ( $line );
if ( isset ( $syntaxes [ $attr -> getSyntaxOID ()])) {
$syntax = $syntaxes [ $attr -> getSyntaxOID ()];
$attr -> setType ( $syntax -> getDescription ());
}
$attrs [ $attr -> getName ()] = $attr ;
/**
* bug 856832 : create an entry in the $attrs_oid array too . This
* will be a ref to the $attrs entry for maintenance and performance
* reasons
*/
$attrs_oid [ $attr -> getOID ()] = & $attrs [ $attr -> getName ()];
}
# go back and add data from aliased attributeTypes
foreach ( $attrs as $name => $attr ) {
$aliases = $attr -> getAliases ();
if ( is_array ( $aliases ) && count ( $aliases ) > 0 ) {
/* foreach of the attribute ' s aliases , create a new entry in the attrs array
* with its name set to the alias name , and all other data copied .*/
foreach ( $aliases as $alias_attr_name ) {
$new_attr = clone $attr ;
$new_attr -> setName ( $alias_attr_name );
$new_attr -> addAlias ( $attr -> getName ( false ));
$new_attr -> removeAlias ( $alias_attr_name );
$new_attr_key = strtolower ( $alias_attr_name );
$attrs [ $new_attr_key ] = $new_attr ;
}
}
}
# go back and add any inherited descriptions from parent attributes (ie, cn inherits name)
foreach ( $attrs as $key => $attr ) {
$sup_attr_name = $attr -> getSupAttribute ();
$sup_attr = null ;
if ( trim ( $sup_attr_name )) {
/* This loop really should traverse infinite levels of inheritance ( SUP ) for attributeTypes ,
* but just in case we get carried away , stop at 100. This shouldn ' t happen , but for
* some weird reason , we have had someone report that it has happened . Oh well .*/
$i = 0 ;
while ( $i ++< 100 /** 100 == INFINITY ;) */ ) {
if ( isset ( $attrs_oid [ $sup_attr_name ])) {
$attr -> setSupAttribute ( $attrs_oid [ $sup_attr_name ] -> getName ());
$sup_attr_name = $attr -> getSupAttribute ();
}
if ( ! isset ( $attrs [ strtolower ( $sup_attr_name )])){
error ( sprintf ( 'Schema error: attributeType "%s" inherits from "%s", but attributeType "%s" does not exist.' ,
$attr -> getName (), $sup_attr_name , $sup_attr_name ), 'error' , 'index.php' );
return ;
}
$sup_attr = $attrs [ strtolower ( $sup_attr_name )];
$sup_attr_name = $sup_attr -> getSupAttribute ();
# Does this superior attributeType not have a superior attributeType?
if ( is_null ( $sup_attr_name ) || strlen ( trim ( $sup_attr_name )) == 0 ) {
/* Since this attribute ' s superior attribute does not have another superior
* attribute , clone its properties for this attribute . Then , replace
* those cloned values with those that can be explicitly set by the child
* attribute attr ) . Save those few properties which the child can set here :*/
$tmp_name = $attr -> getName ( false );
$tmp_oid = $attr -> getOID ();
$tmp_sup = $attr -> getSupAttribute ();
$tmp_aliases = $attr -> getAliases ();
$tmp_single_val = $attr -> getIsSingleValue ();
$tmp_desc = $attr -> getDescription ();
/* clone the SUP attributeType and populate those values
* that were set by the child attributeType */
$attr = clone $sup_attr ;
$attr -> setOID ( $tmp_oid );
$attr -> setName ( $tmp_name );
$attr -> setSupAttribute ( $tmp_sup );
$attr -> setAliases ( $tmp_aliases );
$attr -> setDescription ( $tmp_desc );
/* only overwrite the SINGLE - VALUE property if the child explicitly sets it
* ( note : All LDAP attributes default to multi - value if not explicitly set SINGLE - VALUE ) */
if ( $tmp_single_val )
$attr -> setIsSingleValue ( true );
/* replace this attribute in the attrs array now that we have populated
new values therein */
$attrs [ $key ] = $attr ;
# very important: break out after we are done with this attribute
$sup_attr_name = null ;
$sup_attr = null ;
break ;
}
}
}
}
ksort ( $attrs );
# Add the used in and required_by values.
$socs = $this -> SchemaObjectClasses ( $method );
if ( ! is_array ( $socs ))
return array ();
foreach ( $socs as $object_class ) {
$must_attrs = $object_class -> getMustAttrNames ();
$may_attrs = $object_class -> getMayAttrNames ();
$oclass_attrs = array_unique ( array_merge ( $must_attrs , $may_attrs ));
# Add Used In.
foreach ( $oclass_attrs as $attr_name )
if ( isset ( $attrs [ strtolower ( $attr_name )]))
$attrs [ strtolower ( $attr_name )] -> addUsedInObjectClass ( $object_class -> getName ( false ));
# Add Required By.
foreach ( $must_attrs as $attr_name )
if ( isset ( $attrs [ strtolower ( $attr_name )]))
$attrs [ strtolower ( $attr_name )] -> addRequiredByObjectClass ( $object_class -> getName ( false ));
# Force May
foreach ( $object_class -> getForceMayAttrs () as $attr_name )
if ( isset ( $attrs [ strtolower ( $attr_name -> name )]))
$attrs [ strtolower ( $attr_name -> name )] -> setForceMay ();
}
$return = $attrs ;
# cache the schema to prevent multiple schema fetches from LDAP server
set_cached_item ( $this -> index , 'schema' , 'attributes' , $return );
}
return $return ;
}
/**
* Returns an array of MatchingRule objects for the specified server .
* The key of each entry is the OID of the matching rule .
*/
public function MatchingRules ( $method = null , $dn = '' ) {
# Set default return
$return = null ;
if ( $return = get_cached_item ( $this -> index , 'schema' , 'matchingrules' )) {
return $return ;
}
# build the array of MatchingRule objects
$raw = $this -> getRawSchema ( $method , 'matchingRules' , $dn );
if ( $raw ) {
$rules = array ();
foreach ( $raw as $line ) {
if ( is_null ( $line ) || ! strlen ( $line ))
continue ;
$rule = new MatchingRule ( $line );
$key = $rule -> getName ();
$rules [ $key ] = $rule ;
}
ksort ( $rules );
/* For each MatchingRuleUse entry , add the attributes who use it to the
* MatchingRule in the $rules array .*/
$raw = $this -> getRawSchema ( $method , 'matchingRuleUse' );
if ( $raw != false ) {
foreach ( $raw as $line ) {
if ( is_null ( $line ) || ! strlen ( $line ))
continue ;
$rule_use = new MatchingRuleUse ( $line );
$key = $rule_use -> getName ();
if ( isset ( $rules [ $key ]))
$rules [ $key ] -> setUsedByAttrs ( $rule_use -> getUsedByAttrs ());
}
} else {
/* No MatchingRuleUse entry in the subschema , so brute - forcing
* the reverse - map for the " $rule->getUsedByAttrs () " data .*/
$sattrs = $this -> SchemaAttributes ( $method , $dn );
if ( is_array ( $sattrs ))
foreach ( $sattrs as $attr ) {
$rule_key = strtolower ( $attr -> getEquality ());
if ( isset ( $rules [ $rule_key ]))
$rules [ $rule_key ] -> addUsedByAttr ( $attr -> getName ( false ));
}
}
$return = $rules ;
# cache the schema to prevent multiple schema fetches from LDAP server
set_cached_item ( $this -> index , 'schema' , 'matchingrules' , $return );
}
return $return ;
}
/**
* Returns an array of Syntax objects that this LDAP server uses mapped to
* their descriptions . The key of each entry is the OID of the Syntax .
*/
public function SchemaSyntaxes ( $method = null , $dn = '' ) {
# Set default return
$return = null ;
if ( $return = get_cached_item ( $this -> index , 'schema' , 'syntaxes' )) {
return $return ;
}
$raw = $this -> getRawSchema ( $method , 'ldapSyntaxes' , $dn );
if ( $raw ) {
# build the array of attributes
$return = array ();
foreach ( $raw as $line ) {
if ( is_null ( $line ) || ! strlen ( $line ))
continue ;
$syntax = new Syntax ( $line );
$key = strtolower ( trim ( $syntax -> getOID ()));
if ( ! $key )
continue ;
$return [ $key ] = $syntax ;
}
ksort ( $return );
# cache the schema to prevent multiple schema fetches from LDAP server
set_cached_item ( $this -> index , 'schema' , 'syntaxes' , $return );
}
return $return ;
}
/**
* This function determines if the specified attribute is contained in the force_may list
* as configured in config . php .
*
* @ return boolean True if the specified attribute is in the $force_may list and false
* otherwise .
*/
function isForceMay ( $attr_name ) {
return in_array ( $attr_name , $this -> force_may );
}
/**
* Much like getDNAttrValues (), but only returns the values for
* one attribute of an object . Example calls :
*
* < code >
* print_r ( getDNAttrValue ( 'cn=Bob,ou=people,dc=example,dc=com' , 'sn' ));
* Array (
* [ 0 ] => Smith
* )
*
* print_r ( getDNAttrValue ( 'cn=Bob,ou=people,dc=example,dc=com' , 'objectClass' ));
* Array (
* [ 0 ] => top
* [ 1 ] => person
* )
* </ code >
*
* @ param string The distinguished name ( DN ) of the entry whose attributes / values to fetch .
* @ param string The attribute whose value ( s ) to return ( ie , " objectClass " , " cn " , " userPassword " )
* @ param string Which connection method resource to use
* @ param constant For aliases and referrals , this parameter specifies whether to
* follow references to the referenced DN or to fetch the attributes for
* the referencing DN . See http :// php . net / ldap_search for the 4 valid
* options .
* @ return array
* @ see getDNAttrValues
* @ todo Caching these values may be problematic with multiple calls and different deref values .
*/
public function getDNAttrValue ( $dn , $attr , $method = null , $deref = LDAP_DEREF_NEVER ) {
# Ensure our attr is in lowercase
$attr = strtolower ( $attr );
$values = $this -> getDNAttrValues ( $dn , $method , $deref );
if ( isset ( $values [ $attr ]))
return $values [ $attr ];
else
return array ();
}
/**
* Gets the attributes / values of an entry . Returns an associative array whose
* keys are attribute value names and whose values are arrays of values for
* said attribute .
*
* Optionally , callers may specify true for the parameter
* $lower_case_attr_names to force all keys in the associate array ( attribute
* names ) to be lower case .
*
* Example of its usage :
* < code >
* print_r ( getDNAttrValues ( 'cn=Bob,ou=pepole,dc=example,dc=com' )
* Array (
* [ objectClass ] => Array (
* [ 0 ] => person
* [ 1 ] => top
* )
* [ cn ] => Array (
* [ 0 ] => Bob
* )
* [ sn ] => Array (
* [ 0 ] => Jones
* )
* [ dn ] => Array (
* [ 0 ] => cn = Bob , ou = pepole , dc = example , dc = com
* )
* )
* </ code >
*
* @ param string The distinguished name ( DN ) of the entry whose attributes / values to fetch .
* @ param string Which connection method resource to use
* @ param constant For aliases and referrals , this parameter specifies whether to
* follow references to the referenced DN or to fetch the attributes for
* the referencing DN . See http :// php . net / ldap_search for the 4 valid
* options .
* @ return array
* @ see getDNSysAttrs
* @ see getDNAttrValue
*/
public function getDNAttrValues ( $dn , $method = null , $deref = LDAP_DEREF_NEVER , $attrs = array ( '*' , '+' )) {
static $CACHE ;
$cacheindex = null ;
$method = $this -> getMethod ( $method );
if ( in_array ( '*' , $attrs ) && in_array ( '+' , $attrs ))
$cacheindex = '&' ;
elseif ( in_array ( '+' , $attrs ))
$cacheindex = '+' ;
elseif ( in_array ( '*' , $attrs ))
$cacheindex = '*' ;
if ( ! is_null ( $cacheindex ) && isset ( $CACHE [ $this -> index ][ $method ][ $dn ][ $cacheindex ])) {
$results = $CACHE [ $this -> index ][ $method ][ $dn ][ $cacheindex ];
} else {
$query = array ();
$query [ 'base' ] = $this -> escapeDN ( $dn );
$query [ 'scope' ] = 'base' ;
$query [ 'deref' ] = $deref ;
$query [ 'attrs' ] = $attrs ;
$query [ 'baseok' ] = true ;
$results = $this -> query ( $query , $method );
if ( count ( $results ))
$results = array_pop ( $results );
$results = array_change_key_case ( $results );
# Covert all our result key values to an array
foreach ( $results as $key => $values )
if ( ! is_array ( $results [ $key ]))
$results [ $key ] = array ( $results [ $key ]);
# Finally sort the results
ksort ( $results );
if ( ! is_null ( $cacheindex ) && count ( $results ))
$CACHE [ $this -> index ][ $method ][ $dn ][ $cacheindex ] = $results ;
}
return $results ;
}
/**
* Returns true if the attribute specified is required to take as input a DN .
* Some examples include 'distinguishedName' , 'member' and 'uniqueMember' .
*
* @ param string $attr_name The name of the attribute of interest ( case insensitive )
* @ return boolean
*/
function isDNAttr ( $attr_name , $method = null ) {
# Simple test first
$dn_attrs = array ( 'aliasedObjectName' );
foreach ( $dn_attrs as $dn_attr )
if ( strcasecmp ( $attr_name , $dn_attr ) == 0 )
return true ;
# Now look at the schema OID
$sattr = $this -> getSchemaAttribute ( $attr_name );
if ( ! $sattr )
return false ;
$syntax_oid = $sattr -> getSyntaxOID ();
if ( '1.3.6.1.4.1.1466.115.121.1.12' == $syntax_oid )
return true ;
if ( '1.3.6.1.4.1.1466.115.121.1.34' == $syntax_oid )
return true ;
$syntaxes = $this -> SchemaSyntaxes ( $method );
if ( ! isset ( $syntaxes [ $syntax_oid ]))
return false ;
$syntax_desc = $syntaxes [ $syntax_oid ] -> getDescription ();
if ( strpos ( strtolower ( $syntax_desc ), 'distinguished name' ))
return true ;
return false ;
}
/**
* Used to determine if the specified attribute is indeed a jpegPhoto . If the
* specified attribute is one that houses jpeg data , true is returned . Otherwise
* this function returns false .
*
* @ param string $attr_name The name of the attribute to test .
* @ return boolean
* @ see draw_jpeg_photo
*/
function isJpegPhoto ( $attr_name ) {
# easy quick check
if ( ! strcasecmp ( $attr_name , 'jpegPhoto' ) || ! strcasecmp ( $attr_name , 'photo' ))
return true ;
# go to the schema and get the Syntax OID
$sattr = $this -> getSchemaAttribute ( $attr_name );
if ( ! $sattr )
return false ;
$oid = $sattr -> getSyntaxOID ();
$type = $sattr -> getType ();
if ( ! strcasecmp ( $type , 'JPEG' ) || ( $oid == '1.3.6.1.4.1.1466.115.121.1.28' ))
return true ;
return false ;
}
/**
* Given an attribute name and server ID number , this function returns
* whether the attrbiute contains boolean data . This is useful for
* developers who wish to display the contents of a boolean attribute
* with a drop - down .
*
* @ param string $attr_name The name of the attribute to test .
* @ return boolean
*/
function isAttrBoolean ( $attr_name ) {
$type = ( $sattr = $this -> getSchemaAttribute ( $attr_name )) ? $sattr -> getType () : null ;
if ( ! strcasecmp ( 'boolean' , $type ) ||
! strcasecmp ( 'isCriticalSystemObject' , $attr_name ) ||
! strcasecmp ( 'showInAdvancedViewOnly' , $attr_name ))
return true ;
else
return false ;
}
/**
* Given an attribute name and server ID number , this function returns
* whether the attribute may contain binary data . This is useful for
* developers who wish to display the contents of an arbitrary attribute
* but don ' t want to dump binary data on the page .
*
* @ param string $attr_name The name of the attribute to test .
* @ return boolean
*
* @ see isJpegPhoto
*/
function isAttrBinary ( $attr_name ) {
/**
* Determining if an attribute is binary can be an expensive operation .
* We cache the results for each attr name on each server in the $attr_cache
* to speed up subsequent calls . The $attr_cache looks like this :
*
* Array
* 0 => Array
* 'objectclass' => false
* 'cn' => false
* 'usercertificate' => true
* 1 => Array
* 'jpegphoto' => true
* 'cn' => false
*/
static $attr_cache ;
$attr_name = strtolower ( $attr_name );
if ( isset ( $attr_cache [ $this -> index ][ $attr_name ]))
return $attr_cache [ $this -> index ][ $attr_name ];
if ( $attr_name == 'userpassword' ) {
$attr_cache [ $this -> index ][ $attr_name ] = false ;
return false ;
}
# Quick check: If the attr name ends in ";binary", then it's binary.
if ( strcasecmp ( substr ( $attr_name , strlen ( $attr_name ) - 7 ), ';binary' ) == 0 ) {
$attr_cache [ $this -> index ][ $attr_name ] = true ;
return true ;
}
# See what the server schema says about this attribute
$sattr = $this -> getSchemaAttribute ( $attr_name );
if ( ! is_object ( $sattr )) {
/* Strangely , some attributeTypes may not show up in the server
* schema . This behavior has been observed in MS Active Directory .*/
$type = null ;
$syntax = null ;
} else {
$type = $sattr -> getType ();
$syntax = $sattr -> getSyntaxOID ();
}
if ( strcasecmp ( $type , 'Certificate' ) == 0 ||
strcasecmp ( $type , 'Binary' ) == 0 ||
strcasecmp ( $attr_name , 'usercertificate' ) == 0 ||
strcasecmp ( $attr_name , 'usersmimecertificate' ) == 0 ||
strcasecmp ( $attr_name , 'networkaddress' ) == 0 ||
strcasecmp ( $attr_name , 'objectGUID' ) == 0 ||
strcasecmp ( $attr_name , 'objectSID' ) == 0 ||
strcasecmp ( $attr_name , 'auditingPolicy' ) == 0 ||
strcasecmp ( $attr_name , 'jpegPhoto' ) == 0 ||
2011-11-26 10:58:38 +00:00
strcasecmp ( $attr_name , 'krbExtraData' ) == 0 ||
strcasecmp ( $attr_name , 'krbPrincipalKey' ) == 0 ||
2011-06-26 10:44:28 +00:00
$syntax == '1.3.6.1.4.1.1466.115.121.1.10' ||
$syntax == '1.3.6.1.4.1.1466.115.121.1.28' ||
$syntax == '1.3.6.1.4.1.1466.115.121.1.5' ||
$syntax == '1.3.6.1.4.1.1466.115.121.1.8' ||
$syntax == '1.3.6.1.4.1.1466.115.121.1.9'
) {
$attr_cache [ $this -> index ][ $attr_name ] = true ;
return true ;
} else {
$attr_cache [ $this -> index ][ $attr_name ] = false ;
return false ;
}
}
/**
* This function will test if a user is a member of a group .
*
* Inputs :
* @ param string $user membership value that is being checked
* @ param dn $group DN to see if user is a member
* @ return bool true | false
*/
function userIsMember ( $user , $group ) {
$user = strtolower ( $user );
$group = $this -> getDNAttrValues ( $group );
# If you are using groupOfNames objectClass
if ( array_key_exists ( 'member' , $group ) && ! is_array ( $group [ 'member' ]))
$group [ 'member' ] = array ( $group [ 'member' ]);
if ( array_key_exists ( 'member' , $group ) &&
in_array ( $user , arrayLower ( $group [ 'member' ])))
return true ;
# If you are using groupOfUniqueNames objectClass
if ( array_key_exists ( 'uniquemember' , $group ) && ! is_array ( $group [ 'uniquemember' ]))
$group [ 'uniquemember' ] = array ( $group [ 'uniquemember' ]);
if ( array_key_exists ( 'uniquemember' , $group ) &&
in_array ( $user , arrayLower ( $group [ 'uniquemember' ])))
return true ;
return false ;
}
/**
* This function will determine if the user is allowed to login based on a filter
*/
protected function userIsAllowedLogin ( $dn ) {
$dn = trim ( strtolower ( $dn ));
if ( ! $this -> getValue ( 'login' , 'allowed_dns' ))
return true ;
foreach ( $this -> getValue ( 'login' , 'allowed_dns' ) as $login_allowed_dn ) {
/* Check if $login_allowed_dn is an ldap search filter
* Is first occurence of 'filter=' ( case ensitive ) at position 0 ? */
if ( preg_match ( '/^\([&|]\(/' , $login_allowed_dn )) {
$query = array ();
$query [ 'filter' ] = $login_allowed_dn ;
$query [ 'attrs' ] = array ( 'dn' );
foreach ( $this -> getBaseDN () as $base_dn ) {
$query [ 'base' ] = $base_dn ;
$results = $this -> query ( $query , null );
if ( $results ) {
$dn_array = array ();
foreach ( $results as $result )
array_push ( $dn_array , $result [ 'dn' ]);
$dn_array = array_unique ( $dn_array );
if ( count ( $dn_array ))
foreach ( $dn_array as $result_dn ) {
# Check if $result_dn is a user DN
if ( strcasecmp ( $dn , trim ( strtolower ( $result_dn ))) == 0 )
return true ;
# Check if $result_dn is a group DN
if ( $this -> userIsMember ( $dn , $result_dn ))
return true ;
}
}
}
}
# Check if $login_allowed_dn is a user DN
if ( strcasecmp ( $dn , trim ( strtolower ( $login_allowed_dn ))) == 0 )
return true ;
# Check if $login_allowed_dn is a group DN
if ( $this -> userIsMember ( $dn , $login_allowed_dn ))
return true ;
}
return false ;
}
}
?>