12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154 |
- <?php
- /**
- * ownCloud – LDAP Access
- *
- * @author Arthur Schiwon
- * @copyright 2012, 2013 Arthur Schiwon blizzz@owncloud.com
- *
- * This library is free software; you can redistribute it and/or
- * modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
- * License as published by the Free Software Foundation; either
- * version 3 of the License, or any later version.
- *
- * This library is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU AFFERO GENERAL PUBLIC LICENSE for more details.
- *
- * You should have received a copy of the GNU Affero General Public
- * License along with this library. If not, see <http://www.gnu.org/licenses/>.
- *
- */
- namespace OCA\user_ldap\lib;
- class Access extends LDAPUtility {
- public $connection;
- //never ever check this var directly, always use getPagedSearchResultState
- protected $pagedSearchedSuccessful;
- protected $cookies = array();
- public function __construct(Connection $connection, ILDAPWrapper $ldap) {
- parent::__construct($ldap);
- $this->connection = $connection;
- }
- private function checkConnection() {
- return ($this->connection instanceof Connection);
- }
- /**
- * @brief reads a given attribute for an LDAP record identified by a DN
- * @param $dn the record in question
- * @param $attr the attribute that shall be retrieved
- * if empty, just check the record's existence
- * @returns an array of values on success or an empty
- * array if $attr is empty, false otherwise
- *
- * Reads an attribute from an LDAP entry or check if entry exists
- */
- public function readAttribute($dn, $attr, $filter = 'objectClass=*') {
- if(!$this->checkConnection()) {
- \OCP\Util::writeLog('user_ldap',
- 'No LDAP Connector assigned, access impossible for readAttribute.',
- \OCP\Util::WARN);
- return false;
- }
- $cr = $this->connection->getConnectionResource();
- if(!$this->ldap->isResource($cr)) {
- //LDAP not available
- \OCP\Util::writeLog('user_ldap', 'LDAP resource not available.', \OCP\Util::DEBUG);
- return false;
- }
- //all or nothing! otherwise we get in trouble with.
- $this->initPagedSearch($filter, array($dn), $attr, 99999, 0);
- $dn = $this->DNasBaseParameter($dn);
- $rr = @$this->ldap->read($cr, $dn, $filter, array($attr));
- if(!$this->ldap->isResource($rr)) {
- if(!empty($attr)) {
- //do not throw this message on userExists check, irritates
- \OCP\Util::writeLog('user_ldap', 'readAttribute failed for DN '.$dn, \OCP\Util::DEBUG);
- }
- //in case an error occurs , e.g. object does not exist
- return false;
- }
- if (empty($attr)) {
- \OCP\Util::writeLog('user_ldap', 'readAttribute: '.$dn.' found', \OCP\Util::DEBUG);
- return array();
- }
- $er = $this->ldap->firstEntry($cr, $rr);
- if(!$this->ldap->isResource($er)) {
- //did not match the filter, return false
- return false;
- }
- //LDAP attributes are not case sensitive
- $result = \OCP\Util::mb_array_change_key_case(
- $this->ldap->getAttributes($cr, $er), MB_CASE_LOWER, 'UTF-8');
- $attr = mb_strtolower($attr, 'UTF-8');
- if(isset($result[$attr]) && $result[$attr]['count'] > 0) {
- $values = array();
- for($i=0;$i<$result[$attr]['count'];$i++) {
- if($this->resemblesDN($attr)) {
- $values[] = $this->sanitizeDN($result[$attr][$i]);
- } elseif(strtolower($attr) === 'objectguid' || strtolower($attr) === 'guid') {
- $values[] = $this->convertObjectGUID2Str($result[$attr][$i]);
- } else {
- $values[] = $result[$attr][$i];
- }
- }
- return $values;
- }
- \OCP\Util::writeLog('user_ldap', 'Requested attribute '.$attr.' not found for '.$dn, \OCP\Util::DEBUG);
- return false;
- }
- /**
- * @brief checks wether the given attribute`s valua is probably a DN
- * @param $attr the attribute in question
- * @return if so true, otherwise false
- */
- private function resemblesDN($attr) {
- $resemblingAttributes = array(
- 'dn',
- 'uniquemember',
- 'member'
- );
- return in_array($attr, $resemblingAttributes);
- }
- /**
- * @brief sanitizes a DN received from the LDAP server
- * @param $dn the DN in question
- * @return the sanitized DN
- */
- private function sanitizeDN($dn) {
- //treating multiple base DNs
- if(is_array($dn)) {
- $result = array();
- foreach($dn as $singleDN) {
- $result[] = $this->sanitizeDN($singleDN);
- }
- return $result;
- }
- //OID sometimes gives back DNs with whitespace after the comma
- // a la "uid=foo, cn=bar, dn=..." We need to tackle this!
- $dn = preg_replace('/([^\\\]),(\s+)/u', '\1,', $dn);
- //make comparisons and everything work
- $dn = mb_strtolower($dn, 'UTF-8');
- //escape DN values according to RFC 2253 – this is already done by ldap_explode_dn
- //to use the DN in search filters, \ needs to be escaped to \5c additionally
- //to use them in bases, we convert them back to simple backslashes in readAttribute()
- $replacements = array(
- '\,' => '\5c2C',
- '\=' => '\5c3D',
- '\+' => '\5c2B',
- '\<' => '\5c3C',
- '\>' => '\5c3E',
- '\;' => '\5c3B',
- '\"' => '\5c22',
- '\#' => '\5c23',
- '(' => '\28',
- ')' => '\29',
- '*' => '\2A',
- );
- $dn = str_replace(array_keys($replacements), array_values($replacements), $dn);
- return $dn;
- }
- /**
- * gives back the database table for the query
- */
- private function getMapTable($isUser) {
- if($isUser) {
- return '*PREFIX*ldap_user_mapping';
- } else {
- return '*PREFIX*ldap_group_mapping';
- }
- }
- /**
- * @brief returns the LDAP DN for the given internal ownCloud name of the group
- * @param $name the ownCloud name in question
- * @returns string with the LDAP DN on success, otherwise false
- *
- * returns the LDAP DN for the given internal ownCloud name of the group
- */
- public function groupname2dn($name) {
- $dn = $this->ocname2dn($name, false);
- if($dn) {
- return $dn;
- }
- return false;
- }
- /**
- * @brief returns the LDAP DN for the given internal ownCloud name of the user
- * @param $name the ownCloud name in question
- * @returns string with the LDAP DN on success, otherwise false
- *
- * returns the LDAP DN for the given internal ownCloud name of the user
- */
- public function username2dn($name) {
- $dn = $this->ocname2dn($name, true);
- //Check whether the DN belongs to the Base, to avoid issues on multi-
- //server setups
- if($dn && $this->isDNPartOfBase($dn, $this->connection->ldapBaseUsers)) {
- return $dn;
- }
- return false;
- }
- /**
- * @brief returns the LDAP DN for the given internal ownCloud name
- * @param $name the ownCloud name in question
- * @param $isUser is it a user? otherwise group
- * @returns string with the LDAP DN on success, otherwise false
- *
- * returns the LDAP DN for the given internal ownCloud name
- */
- private function ocname2dn($name, $isUser) {
- $table = $this->getMapTable($isUser);
- $query = \OCP\DB::prepare('
- SELECT `ldap_dn`
- FROM `'.$table.'`
- WHERE `owncloud_name` = ?
- ');
- $record = $query->execute(array($name))->fetchOne();
- return $record;
- }
- /**
- * @brief returns the internal ownCloud name for the given LDAP DN of the group
- * @param $dn the dn of the group object
- * @param $ldapname optional, the display name of the object
- * @returns string with with the name to use in ownCloud, false on DN outside of search DN
- *
- * returns the internal ownCloud name for the given LDAP DN of the
- * group, false on DN outside of search DN or failure
- */
- public function dn2groupname($dn, $ldapname = null) {
- //To avoid bypassing the base DN settings under certain circumstances
- //with the group support, check whether the provided DN matches one of
- //the given Bases
- if(!$this->isDNPartOfBase($dn, $this->connection->ldapBaseGroups)) {
- return false;
- }
- return $this->dn2ocname($dn, $ldapname, false);
- }
- /**
- * @brief returns the internal ownCloud name for the given LDAP DN of the user
- * @param $dn the dn of the user object
- * @param $ldapname optional, the display name of the object
- * @returns string with with the name to use in ownCloud
- *
- * returns the internal ownCloud name for the given LDAP DN of the user, false on DN outside of search DN or failure
- */
- public function dn2username($dn, $ldapname = null) {
- //To avoid bypassing the base DN settings under certain circumstances
- //with the group support, check whether the provided DN matches one of
- //the given Bases
- if(!$this->isDNPartOfBase($dn, $this->connection->ldapBaseUsers)) {
- return false;
- }
- return $this->dn2ocname($dn, $ldapname, true);
- }
- /**
- * @brief returns an internal ownCloud name for the given LDAP DN
- * @param $dn the dn of the user object
- * @param $ldapname optional, the display name of the object
- * @param $isUser optional, wether it is a user object (otherwise group assumed)
- * @returns string with with the name to use in ownCloud
- *
- * returns the internal ownCloud name for the given LDAP DN of the user, false on DN outside of search DN
- */
- public function dn2ocname($dn, $ldapname = null, $isUser = true) {
- $table = $this->getMapTable($isUser);
- if($isUser) {
- $fncFindMappedName = 'findMappedUser';
- $nameAttribute = $this->connection->ldapUserDisplayName;
- } else {
- $fncFindMappedName = 'findMappedGroup';
- $nameAttribute = $this->connection->ldapGroupDisplayName;
- }
- //let's try to retrieve the ownCloud name from the mappings table
- $ocname = $this->$fncFindMappedName($dn);
- if($ocname) {
- return $ocname;
- }
- //second try: get the UUID and check if it is known. Then, update the DN and return the name.
- $uuid = $this->getUUID($dn, $isUser);
- if($uuid) {
- $query = \OCP\DB::prepare('
- SELECT `owncloud_name`
- FROM `'.$table.'`
- WHERE `directory_uuid` = ?
- ');
- $component = $query->execute(array($uuid))->fetchOne();
- if($component) {
- $query = \OCP\DB::prepare('
- UPDATE `'.$table.'`
- SET `ldap_dn` = ?
- WHERE `directory_uuid` = ?
- ');
- $query->execute(array($dn, $uuid));
- return $component;
- }
- } else {
- //If the UUID can't be detected something is foul.
- \OCP\Util::writeLog('user_ldap', 'Cannot determine UUID for '.$dn.'. Skipping.', \OCP\Util::INFO);
- return false;
- }
- if(is_null($ldapname)) {
- $ldapname = $this->readAttribute($dn, $nameAttribute);
- if(!isset($ldapname[0]) && empty($ldapname[0])) {
- \OCP\Util::writeLog('user_ldap', 'No or empty name for '.$dn.'.', \OCP\Util::INFO);
- return false;
- }
- $ldapname = $ldapname[0];
- }
- if($isUser) {
- $usernameAttribute = $this->connection->ldapExpertUsernameAttr;
- if(!emptY($usernameAttribute)) {
- $username = $this->readAttribute($dn, $usernameAttribute);
- $username = $username[0];
- } else {
- $username = $uuid;
- }
- $intname = $this->sanitizeUsername($username);
- } else {
- $intname = $ldapname;
- }
- //a new user/group! Add it only if it doesn't conflict with other backend's users or existing groups
- //disabling Cache is required to avoid that the new user is cached as not-existing in fooExists check
- $originalTTL = $this->connection->ldapCacheTTL;
- $this->connection->setConfiguration(array('ldapCacheTTL' => 0));
- if(($isUser && !\OCP\User::userExists($intname))
- || (!$isUser && !\OC_Group::groupExists($intname))) {
- if($this->mapComponent($dn, $intname, $isUser)) {
- $this->connection->setConfiguration(array('ldapCacheTTL' => $originalTTL));
- return $intname;
- }
- }
- $this->connection->setConfiguration(array('ldapCacheTTL' => $originalTTL));
- $altname = $this->createAltInternalOwnCloudName($intname, $isUser);
- if($this->mapComponent($dn, $altname, $isUser)) {
- return $altname;
- }
- //if everything else did not help..
- \OCP\Util::writeLog('user_ldap', 'Could not create unique name for '.$dn.'.', \OCP\Util::INFO);
- return false;
- }
- /**
- * @brief gives back the user names as they are used ownClod internally
- * @param $ldapGroups an array with the ldap Users result in style of array ( array ('dn' => foo, 'uid' => bar), ... )
- * @returns an array with the user names to use in ownCloud
- *
- * gives back the user names as they are used ownClod internally
- */
- public function ownCloudUserNames($ldapUsers) {
- return $this->ldap2ownCloudNames($ldapUsers, true);
- }
- /**
- * @brief gives back the group names as they are used ownClod internally
- * @param $ldapGroups an array with the ldap Groups result in style of array ( array ('dn' => foo, 'cn' => bar), ... )
- * @returns an array with the group names to use in ownCloud
- *
- * gives back the group names as they are used ownClod internally
- */
- public function ownCloudGroupNames($ldapGroups) {
- return $this->ldap2ownCloudNames($ldapGroups, false);
- }
- private function findMappedUser($dn) {
- static $query = null;
- if(is_null($query)) {
- $query = \OCP\DB::prepare('
- SELECT `owncloud_name`
- FROM `'.$this->getMapTable(true).'`
- WHERE `ldap_dn` = ?'
- );
- }
- $res = $query->execute(array($dn))->fetchOne();
- if($res) {
- return $res;
- }
- return false;
- }
- private function findMappedGroup($dn) {
- static $query = null;
- if(is_null($query)) {
- $query = \OCP\DB::prepare('
- SELECT `owncloud_name`
- FROM `'.$this->getMapTable(false).'`
- WHERE `ldap_dn` = ?'
- );
- }
- $res = $query->execute(array($dn))->fetchOne();
- if($res) {
- return $res;
- }
- return false;
- }
- private function ldap2ownCloudNames($ldapObjects, $isUsers) {
- if($isUsers) {
- $nameAttribute = $this->connection->ldapUserDisplayName;
- } else {
- $nameAttribute = $this->connection->ldapGroupDisplayName;
- }
- $ownCloudNames = array();
- foreach($ldapObjects as $ldapObject) {
- $nameByLDAP = isset($ldapObject[$nameAttribute]) ? $ldapObject[$nameAttribute] : null;
- $ocname = $this->dn2ocname($ldapObject['dn'], $nameByLDAP, $isUsers);
- if($ocname) {
- $ownCloudNames[] = $ocname;
- }
- continue;
- }
- return $ownCloudNames;
- }
- /**
- * @brief creates a unique name for internal ownCloud use for users. Don't call it directly.
- * @param $name the display name of the object
- * @returns string with with the name to use in ownCloud or false if unsuccessful
- *
- * Instead of using this method directly, call
- * createAltInternalOwnCloudName($name, true)
- */
- private function _createAltInternalOwnCloudNameForUsers($name) {
- $attempts = 0;
- //while loop is just a precaution. If a name is not generated within
- //20 attempts, something else is very wrong. Avoids infinite loop.
- while($attempts < 20){
- $altName = $name . '_' . rand(1000,9999);
- if(!\OCP\User::userExists($altName)) {
- return $altName;
- }
- $attempts++;
- }
- return false;
- }
- /**
- * @brief creates a unique name for internal ownCloud use for groups. Don't call it directly.
- * @param $name the display name of the object
- * @returns string with with the name to use in ownCloud or false if unsuccessful.
- *
- * Instead of using this method directly, call
- * createAltInternalOwnCloudName($name, false)
- *
- * Group names are also used as display names, so we do a sequential
- * numbering, e.g. Developers_42 when there are 41 other groups called
- * "Developers"
- */
- private function _createAltInternalOwnCloudNameForGroups($name) {
- $query = \OCP\DB::prepare('
- SELECT `owncloud_name`
- FROM `'.$this->getMapTable(false).'`
- WHERE `owncloud_name` LIKE ?
- ');
- $usedNames = array();
- $res = $query->execute(array($name.'_%'));
- while($row = $res->fetchRow()) {
- $usedNames[] = $row['owncloud_name'];
- }
- if(!($usedNames) || count($usedNames) === 0) {
- $lastNo = 1; //will become name_2
- } else {
- natsort($usedNames);
- $lastname = array_pop($usedNames);
- $lastNo = intval(substr($lastname, strrpos($lastname, '_') + 1));
- }
- $altName = $name.'_'.strval($lastNo+1);
- unset($usedNames);
- $attempts = 1;
- while($attempts < 21){
- //Pro forma check to be really sure it is unique
- //while loop is just a precaution. If a name is not generated within
- //20 attempts, something else is very wrong. Avoids infinite loop.
- if(!\OC_Group::groupExists($altName)) {
- return $altName;
- }
- $altName = $name . '_' . $lastNo + $attempts;
- $attempts++;
- }
- return false;
- }
- /**
- * @brief creates a unique name for internal ownCloud use.
- * @param $name the display name of the object
- * @param $isUser boolean, whether name should be created for a user (true) or a group (false)
- * @returns string with with the name to use in ownCloud or false if unsuccessful
- */
- private function createAltInternalOwnCloudName($name, $isUser) {
- $originalTTL = $this->connection->ldapCacheTTL;
- $this->connection->setConfiguration(array('ldapCacheTTL' => 0));
- if($isUser) {
- $altName = $this->_createAltInternalOwnCloudNameForUsers($name);
- } else {
- $altName = $this->_createAltInternalOwnCloudNameForGroups($name);
- }
- $this->connection->setConfiguration(array('ldapCacheTTL' => $originalTTL));
- return $altName;
- }
- /**
- * @brief retrieves all known groups from the mappings table
- * @returns array with the results
- *
- * retrieves all known groups from the mappings table
- */
- private function mappedGroups() {
- return $this->mappedComponents(false);
- }
- /**
- * @brief retrieves all known users from the mappings table
- * @returns array with the results
- *
- * retrieves all known users from the mappings table
- */
- private function mappedUsers() {
- return $this->mappedComponents(true);
- }
- private function mappedComponents($isUsers) {
- $table = $this->getMapTable($isUsers);
- $query = \OCP\DB::prepare('
- SELECT `ldap_dn`, `owncloud_name`
- FROM `'. $table . '`'
- );
- return $query->execute()->fetchAll();
- }
- /**
- * @brief inserts a new user or group into the mappings table
- * @param $dn the record in question
- * @param $ocname the name to use in ownCloud
- * @param $isUser is it a user or a group?
- * @returns true on success, false otherwise
- *
- * inserts a new user or group into the mappings table
- */
- private function mapComponent($dn, $ocname, $isUser = true) {
- $table = $this->getMapTable($isUser);
- $sqlAdjustment = '';
- $dbtype = \OCP\Config::getSystemValue('dbtype');
- if($dbtype === 'mysql') {
- $sqlAdjustment = 'FROM DUAL';
- }
- $insert = \OCP\DB::prepare('
- INSERT INTO `'.$table.'` (`ldap_dn`, `owncloud_name`, `directory_uuid`)
- SELECT ?,?,?
- '.$sqlAdjustment.'
- WHERE NOT EXISTS (
- SELECT 1
- FROM `'.$table.'`
- WHERE `ldap_dn` = ?
- OR `owncloud_name` = ?)
- ');
- //feed the DB
- $insRows = $insert->execute(array($dn, $ocname,
- $this->getUUID($dn, $isUser), $dn,
- $ocname));
- if(\OCP\DB::isError($insRows)) {
- return false;
- }
- if($insRows === 0) {
- return false;
- }
- return true;
- }
- public function fetchListOfUsers($filter, $attr, $limit = null, $offset = null) {
- return $this->fetchList($this->searchUsers($filter, $attr, $limit, $offset), (count($attr) > 1));
- }
- public function fetchListOfGroups($filter, $attr, $limit = null, $offset = null) {
- return $this->fetchList($this->searchGroups($filter, $attr, $limit, $offset), (count($attr) > 1));
- }
- private function fetchList($list, $manyAttributes) {
- if(is_array($list)) {
- if($manyAttributes) {
- return $list;
- } else {
- return array_unique($list, SORT_LOCALE_STRING);
- }
- }
- //error cause actually, maybe throw an exception in future.
- return array();
- }
- /**
- * @brief executes an LDAP search, optimized for Users
- * @param $filter the LDAP filter for the search
- * @param $attr optional, when a certain attribute shall be filtered out
- * @returns array with the search result
- *
- * Executes an LDAP search
- */
- public function searchUsers($filter, $attr = null, $limit = null, $offset = null) {
- return $this->search($filter, $this->connection->ldapBaseUsers, $attr, $limit, $offset);
- }
- /**
- * @brief executes an LDAP search, optimized for Groups
- * @param $filter the LDAP filter for the search
- * @param $attr optional, when a certain attribute shall be filtered out
- * @returns array with the search result
- *
- * Executes an LDAP search
- */
- public function searchGroups($filter, $attr = null, $limit = null, $offset = null) {
- return $this->search($filter, $this->connection->ldapBaseGroups, $attr, $limit, $offset);
- }
- /**
- * @brief executes an LDAP search
- * @param $filter the LDAP filter for the search
- * @param $base an array containing the LDAP subtree(s) that shall be searched
- * @param $attr optional, array, one or more attributes that shall be
- * retrieved. Results will according to the order in the array.
- * @returns array with the search result
- *
- * Executes an LDAP search
- */
- private function search($filter, $base, $attr = null, $limit = null, $offset = null, $skipHandling = false) {
- if(!is_null($attr) && !is_array($attr)) {
- $attr = array(mb_strtolower($attr, 'UTF-8'));
- }
- // See if we have a resource, in case not cancel with message
- $link_resource = $this->connection->getConnectionResource();
- if(!$this->ldap->isResource($link_resource)) {
- // Seems like we didn't find any resource.
- // Return an empty array just like before.
- \OCP\Util::writeLog('user_ldap', 'Could not search, because resource is missing.', \OCP\Util::DEBUG);
- return array();
- }
- //check wether paged search should be attempted
- $pagedSearchOK = $this->initPagedSearch($filter, $base, $attr, $limit, $offset);
- $linkResources = array_pad(array(), count($base), $link_resource);
- $sr = $this->ldap->search($linkResources, $base, $filter, $attr);
- $error = $this->ldap->errno($link_resource);
- if(!is_array($sr) || $error !== 0) {
- \OCP\Util::writeLog('user_ldap',
- 'Error when searching: '.$this->ldap->error($link_resource).
- ' code '.$this->ldap->errno($link_resource),
- \OCP\Util::ERROR);
- \OCP\Util::writeLog('user_ldap', 'Attempt for Paging? '.print_r($pagedSearchOK, true), \OCP\Util::ERROR);
- return array();
- }
- // Do the server-side sorting
- foreach(array_reverse($attr) as $sortAttr){
- foreach($sr as $searchResource) {
- $this->ldap->sort($link_resource, $searchResource, $sortAttr);
- }
- }
- $findings = array();
- foreach($sr as $key => $res) {
- $findings = array_merge($findings, $this->ldap->getEntries($link_resource, $res ));
- }
- if($pagedSearchOK) {
- \OCP\Util::writeLog('user_ldap', 'Paged search successful', \OCP\Util::INFO);
- foreach($sr as $key => $res) {
- $cookie = null;
- if($this->ldap->controlPagedResultResponse($link_resource, $res, $cookie)) {
- \OCP\Util::writeLog('user_ldap', 'Set paged search cookie', \OCP\Util::INFO);
- $this->setPagedResultCookie($base[$key], $filter, $limit, $offset, $cookie);
- }
- }
- //browsing through prior pages to get the cookie for the new one
- if($skipHandling) {
- return;
- }
- // if count is bigger, then the server does not support
- // paged search. Instead, he did a normal search. We set a
- // flag here, so the callee knows how to deal with it.
- if($findings['count'] <= $limit) {
- $this->pagedSearchedSuccessful = true;
- }
- } else {
- if(!is_null($limit)) {
- \OCP\Util::writeLog('user_ldap', 'Paged search failed :(', \OCP\Util::INFO);
- }
- }
- // if we're here, probably no connection resource is returned.
- // to make ownCloud behave nicely, we simply give back an empty array.
- if(is_null($findings)) {
- return array();
- }
- if(!is_null($attr)) {
- $selection = array();
- $multiarray = false;
- if(count($attr) > 1) {
- $multiarray = true;
- $i = 0;
- }
- foreach($findings as $item) {
- if(!is_array($item)) {
- continue;
- }
- $item = \OCP\Util::mb_array_change_key_case($item, MB_CASE_LOWER, 'UTF-8');
- if($multiarray) {
- foreach($attr as $key) {
- $key = mb_strtolower($key, 'UTF-8');
- if(isset($item[$key])) {
- if($key !== 'dn') {
- $selection[$i][$key] = $this->resemblesDN($key) ?
- $this->sanitizeDN($item[$key][0])
- : $item[$key][0];
- } else {
- $selection[$i][$key] = $this->sanitizeDN($item[$key]);
- }
- }
- }
- $i++;
- } else {
- //tribute to case insensitivity
- $key = mb_strtolower($attr[0], 'UTF-8');
- if(isset($item[$key])) {
- if($this->resemblesDN($key)) {
- $selection[] = $this->sanitizeDN($item[$key]);
- } else {
- $selection[] = $item[$key];
- }
- }
- }
- }
- $findings = $selection;
- }
- //we slice the findings, when
- //a) paged search insuccessful, though attempted
- //b) no paged search, but limit set
- if((!$this->pagedSearchedSuccessful
- && $pagedSearchOK)
- || (
- !$pagedSearchOK
- && !is_null($limit)
- )
- ) {
- $findings = array_slice($findings, intval($offset), $limit);
- }
- return $findings;
- }
- public function sanitizeUsername($name) {
- if($this->connection->ldapIgnoreNamingRules) {
- return $name;
- }
- // Translitaration
- //latin characters to ASCII
- $name = iconv('UTF-8', 'ASCII//TRANSLIT', $name);
- //REPLACEMENTS
- $name = \OCP\Util::mb_str_replace(' ', '_', $name, 'UTF-8');
- //every remaining unallowed characters will be removed
- $name = preg_replace('/[^a-zA-Z0-9_.@-]/u', '', $name);
- return $name;
- }
- /**
- * @brief combines the input filters with AND
- * @param $filters array, the filters to connect
- * @returns the combined filter
- *
- * Combines Filter arguments with AND
- */
- public function combineFilterWithAnd($filters) {
- return $this->combineFilter($filters, '&');
- }
- /**
- * @brief combines the input filters with AND
- * @param $filters array, the filters to connect
- * @returns the combined filter
- *
- * Combines Filter arguments with AND
- */
- public function combineFilterWithOr($filters) {
- return $this->combineFilter($filters, '|');
- }
- /**
- * @brief combines the input filters with given operator
- * @param $filters array, the filters to connect
- * @param $operator either & or |
- * @returns the combined filter
- *
- * Combines Filter arguments with AND
- */
- private function combineFilter($filters, $operator) {
- $combinedFilter = '('.$operator;
- foreach($filters as $filter) {
- if(!empty($filter) && $filter[0] !== '(') {
- $filter = '('.$filter.')';
- }
- $combinedFilter.=$filter;
- }
- $combinedFilter.=')';
- return $combinedFilter;
- }
- /**
- * @brief creates a filter part for to perfrom search for users
- * @param string $search the search term
- * @return string the final filter part to use in LDAP searches
- */
- public function getFilterPartForUserSearch($search) {
- return $this->getFilterPartForSearch($search,
- $this->connection->ldapAttributesForUserSearch,
- $this->connection->ldapUserDisplayName);
- }
- /**
- * @brief creates a filter part for to perfrom search for groups
- * @param string $search the search term
- * @return string the final filter part to use in LDAP searches
- */
- public function getFilterPartForGroupSearch($search) {
- return $this->getFilterPartForSearch($search,
- $this->connection->ldapAttributesForGroupSearch,
- $this->connection->ldapGroupDisplayName);
- }
- /**
- * @brief creates a filter part for searches
- * @param string $search the search term
- * @param string $fallbackAttribute a fallback attribute in case the user
- * did not define search attributes. Typically the display name attribute.
- * @returns string the final filter part to use in LDAP searches
- */
- private function getFilterPartForSearch($search, $searchAttributes, $fallbackAttribute) {
- $filter = array();
- $search = empty($search) ? '*' : '*'.$search.'*';
- if(!is_array($searchAttributes) || count($searchAttributes) === 0) {
- if(empty($fallbackAttribute)) {
- return '';
- }
- $filter[] = $fallbackAttribute . '=' . $search;
- } else {
- foreach($searchAttributes as $attribute) {
- $filter[] = $attribute . '=' . $search;
- }
- }
- if(count($filter) === 1) {
- return '('.$filter[0].')';
- }
- return $this->combineFilterWithOr($filter);
- }
- public function areCredentialsValid($name, $password) {
- $name = $this->DNasBaseParameter($name);
- $testConnection = clone $this->connection;
- $credentials = array(
- 'ldapAgentName' => $name,
- 'ldapAgentPassword' => $password
- );
- if(!$testConnection->setConfiguration($credentials)) {
- return false;
- }
- $result=$testConnection->bind();
- $this->connection->bind();
- return $result;
- }
- /**
- * @brief auto-detects the directory's UUID attribute
- * @param $dn a known DN used to check against
- * @param $force the detection should be run, even if it is not set to auto
- * @returns true on success, false otherwise
- */
- private function detectUuidAttribute($dn, $isUser = true, $force = false) {
- if($isUser) {
- $uuidAttr = 'ldapUuidUserAttribute';
- $uuidOverride = $this->connection->ldapExpertUUIDUserAttr;
- } else {
- $uuidAttr = 'ldapUuidGroupAttribute';
- $uuidOverride = $this->connection->ldapExpertUUIDGroupAttr;
- }
- if(($this->connection->$uuidAttr !== 'auto') && !$force) {
- return true;
- }
- if(!empty($uuidOverride) && !$force) {
- $this->connection->$uuidAttr = $uuidOverride;
- return true;
- }
- //for now, supported attributes are entryUUID, nsuniqueid, objectGUID
- $testAttributes = array('entryuuid', 'nsuniqueid', 'objectguid', 'guid');
- foreach($testAttributes as $attribute) {
- $value = $this->readAttribute($dn, $attribute);
- if(is_array($value) && isset($value[0]) && !empty($value[0])) {
- \OCP\Util::writeLog('user_ldap',
- 'Setting '.$attribute.' as '.$uuidAttr,
- \OCP\Util::DEBUG);
- $this->connection->$uuidAttr = $attribute;
- return true;
- }
- }
- \OCP\Util::writeLog('user_ldap',
- 'Could not autodetect the UUID attribute',
- \OCP\Util::ERROR);
- return false;
- }
- public function getUUID($dn, $isUser = true) {
- if($isUser) {
- $uuidAttr = 'ldapUuidUserAttribute';
- $uuidOverride = $this->connection->ldapExpertUUIDUserAttr;
- } else {
- $uuidAttr = 'ldapUuidGroupAttribute';
- $uuidOverride = $this->connection->ldapExpertUUIDGroupAttr;
- }
- $uuid = false;
- if($this->detectUuidAttribute($dn, $isUser)) {
- $uuid = $this->readAttribute($dn, $this->connection->$uuidAttr);
- if( !is_array($uuid)
- && !empty($uuidOverride)
- && $this->detectUuidAttribute($dn, $isUser, true)) {
- $uuid = $this->readAttribute($dn,
- $this->connection->$uuidAttr);
- }
- if(is_array($uuid) && isset($uuid[0]) && !empty($uuid[0])) {
- $uuid = $uuid[0];
- }
- }
- return $uuid;
- }
- /**
- * @brief converts a binary ObjectGUID into a string representation
- * @param $oguid the ObjectGUID in it's binary form as retrieved from AD
- * @returns String
- *
- * converts a binary ObjectGUID into a string representation
- * http://www.php.net/manual/en/function.ldap-get-values-len.php#73198
- */
- private function convertObjectGUID2Str($oguid) {
- $hex_guid = bin2hex($oguid);
- $hex_guid_to_guid_str = '';
- for($k = 1; $k <= 4; ++$k) {
- $hex_guid_to_guid_str .= substr($hex_guid, 8 - 2 * $k, 2);
- }
- $hex_guid_to_guid_str .= '-';
- for($k = 1; $k <= 2; ++$k) {
- $hex_guid_to_guid_str .= substr($hex_guid, 12 - 2 * $k, 2);
- }
- $hex_guid_to_guid_str .= '-';
- for($k = 1; $k <= 2; ++$k) {
- $hex_guid_to_guid_str .= substr($hex_guid, 16 - 2 * $k, 2);
- }
- $hex_guid_to_guid_str .= '-' . substr($hex_guid, 16, 4);
- $hex_guid_to_guid_str .= '-' . substr($hex_guid, 20);
- return strtoupper($hex_guid_to_guid_str);
- }
- /**
- * @brief converts a stored DN so it can be used as base parameter for LDAP queries
- * @param $dn the DN
- * @returns String
- *
- * converts a stored DN so it can be used as base parameter for LDAP queries
- * internally we store them for usage in LDAP filters
- */
- private function DNasBaseParameter($dn) {
- return str_ireplace('\\5c', '\\', $dn);
- }
- /**
- * @brief checks if the given DN is part of the given base DN(s)
- * @param $dn the DN
- * @param $bases array containing the allowed base DN or DNs
- * @returns Boolean
- */
- private function isDNPartOfBase($dn, $bases) {
- $bases = $this->sanitizeDN($bases);
- foreach($bases as $base) {
- $belongsToBase = true;
- if(mb_strripos($dn, $base, 0, 'UTF-8') !== (mb_strlen($dn, 'UTF-8')-mb_strlen($base, 'UTF-8'))) {
- $belongsToBase = false;
- }
- if($belongsToBase) {
- break;
- }
- }
- return $belongsToBase;
- }
- /**
- * @brief get a cookie for the next LDAP paged search
- * @param $base a string with the base DN for the search
- * @param $filter the search filter to identify the correct search
- * @param $limit the limit (or 'pageSize'), to identify the correct search well
- * @param $offset the offset for the new search to identify the correct search really good
- * @returns string containing the key or empty if none is cached
- */
- private function getPagedResultCookie($base, $filter, $limit, $offset) {
- if($offset === 0) {
- return '';
- }
- $offset -= $limit;
- //we work with cache here
- $cachekey = 'lc' . crc32($base) . '-' . crc32($filter) . '-' . $limit . '-' . $offset;
- $cookie = '';
- if(isset($this->cookies[$cachekey])) {
- $cookie = $this->cookies[$cachekey];
- if(is_null($cookie)) {
- $cookie = '';
- }
- }
- return $cookie;
- }
- /**
- * @brief set a cookie for LDAP paged search run
- * @param $base a string with the base DN for the search
- * @param $filter the search filter to identify the correct search
- * @param $limit the limit (or 'pageSize'), to identify the correct search well
- * @param $offset the offset for the run search to identify the correct search really good
- * @param $cookie string containing the cookie returned by ldap_control_paged_result_response
- * @return void
- */
- private function setPagedResultCookie($base, $filter, $limit, $offset, $cookie) {
- if(!empty($cookie)) {
- $cachekey = 'lc' . crc32($base) . '-' . crc32($filter) . '-' .$limit . '-' . $offset;
- $this->cookies[$cachekey] = $cookie;
- }
- }
- /**
- * @brief check wether the most recent paged search was successful. It flushed the state var. Use it always after a possible paged search.
- * @return true on success, null or false otherwise
- */
- public function getPagedSearchResultState() {
- $result = $this->pagedSearchedSuccessful;
- $this->pagedSearchedSuccessful = null;
- return $result;
- }
- /**
- * @brief prepares a paged search, if possible
- * @param $filter the LDAP filter for the search
- * @param $bases an array containing the LDAP subtree(s) that shall be searched
- * @param $attr optional, when a certain attribute shall be filtered outside
- * @param $limit
- * @param $offset
- *
- */
- private function initPagedSearch($filter, $bases, $attr, $limit, $offset) {
- $pagedSearchOK = false;
- if($this->connection->hasPagedResultSupport && !is_null($limit)) {
- $offset = intval($offset); //can be null
- \OCP\Util::writeLog('user_ldap',
- 'initializing paged search for Filter'.$filter.' base '.print_r($bases, true)
- .' attr '.print_r($attr, true). ' limit ' .$limit.' offset '.$offset,
- \OCP\Util::INFO);
- //get the cookie from the search for the previous search, required by LDAP
- foreach($bases as $base) {
- $cookie = $this->getPagedResultCookie($base, $filter, $limit, $offset);
- if(empty($cookie) && ($offset > 0)) {
- // no cookie known, although the offset is not 0. Maybe cache run out. We need
- // to start all over *sigh* (btw, Dear Reader, did you need LDAP paged
- // searching was designed by MSFT?)
- $reOffset = ($offset - $limit) < 0 ? 0 : $offset - $limit;
- //a bit recursive, $offset of 0 is the exit
- \OCP\Util::writeLog('user_ldap', 'Looking for cookie L/O '.$limit.'/'.$reOffset, \OCP\Util::INFO);
- $this->search($filter, array($base), $attr, $limit, $reOffset, true);
- $cookie = $this->getPagedResultCookie($base, $filter, $limit, $offset);
- //still no cookie? obviously, the server does not like us. Let's skip paging efforts.
- //TODO: remember this, probably does not change in the next request...
- if(empty($cookie)) {
- $cookie = null;
- }
- }
- if(!is_null($cookie)) {
- if($offset > 0) {
- \OCP\Util::writeLog('user_ldap', 'Cookie '.$cookie, \OCP\Util::INFO);
- }
- $pagedSearchOK = $this->ldap->controlPagedResult(
- $this->connection->getConnectionResource(), $limit,
- false, $cookie);
- if(!$pagedSearchOK) {
- return false;
- }
- \OCP\Util::writeLog('user_ldap', 'Ready for a paged search', \OCP\Util::INFO);
- } else {
- \OCP\Util::writeLog('user_ldap',
- 'No paged search for us, Cpt., Limit '.$limit.' Offset '.$offset,
- \OCP\Util::INFO);
- }
- }
- }
- return $pagedSearchOK;
- }
- }
|