Blame view
sources/apps/user_ldap/user_ldap.php
11.8 KB
|
03e52840d
|
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 |
<?php /** * ownCloud * * @author Dominik Schmidt * @author Artuhr Schiwon * @copyright 2011 Dominik Schmidt dev@dominik-schmidt.de * @copyright 2012 Arthur Schiwon blizzz@owncloud.com * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE * License as published by the Free Software Foundation; either * version 3 of the License, or any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU AFFERO GENERAL PUBLIC LICENSE for more details. * * You should have received a copy of the GNU Affero General Public * License along with this library. If not, see <http://www.gnu.org/licenses/>. * */ namespace OCA\user_ldap; |
|
31b7f2792
|
27 28 29 30 |
use OCA\user_ldap\lib\ILDAPWrapper;
use OCA\user_ldap\lib\BackendUtility;
class USER_LDAP extends BackendUtility implements \OCP\UserInterface {
|
|
03e52840d
|
31 32 33 |
private function updateQuota($dn) {
$quota = null;
|
|
31b7f2792
|
34 35 |
$quotaDefault = $this->access->connection->ldapQuotaDefault; $quotaAttribute = $this->access->connection->ldapQuotaAttribute; |
|
03e52840d
|
36 37 38 39 |
if(!empty($quotaDefault)) {
$quota = $quotaDefault;
}
if(!empty($quotaAttribute)) {
|
|
31b7f2792
|
40 |
$aQuota = $this->access->readAttribute($dn, $quotaAttribute); |
|
03e52840d
|
41 42 43 44 45 46 |
if($aQuota && (count($aQuota) > 0)) {
$quota = $aQuota[0];
}
}
if(!is_null($quota)) {
|
|
31b7f2792
|
47 48 49 50 |
\OCP\Config::setUserValue( $this->access->dn2username($dn), 'files', 'quota', \OCP\Util::computerFileSize($quota)); |
|
03e52840d
|
51 52 53 54 55 |
}
}
private function updateEmail($dn) {
$email = null;
|
|
31b7f2792
|
56 |
$emailAttribute = $this->access->connection->ldapEmailAttribute; |
|
03e52840d
|
57 |
if(!empty($emailAttribute)) {
|
|
31b7f2792
|
58 |
$aEmail = $this->access->readAttribute($dn, $emailAttribute); |
|
03e52840d
|
59 60 61 62 |
if($aEmail && (count($aEmail) > 0)) {
$email = $aEmail[0];
}
if(!is_null($email)) {
|
|
31b7f2792
|
63 64 65 66 |
\OCP\Config::setUserValue( $this->access->dn2username($dn), 'settings', 'email', $email); |
|
03e52840d
|
67 68 69 70 71 |
} } } /** |
|
31b7f2792
|
72 73 74 75 76 77 78 79 80 81 82 83 84 85 |
* @brief reads jpegPhoto and set is as avatar if available
* @param $uid string ownCloud user name
* @param $dn string the user's LDAP DN
* @return void
*/
private function updateAvatar($uid, $dn) {
$hasLoggedIn = \OCP\Config::getUserValue($uid, 'user_ldap',
'firstLoginAccomplished', 0);
$lastChecked = \OCP\Config::getUserValue($uid, 'user_ldap',
'lastJpegPhotoLookup', 0);
if(($hasLoggedIn !== '1') || (time() - intval($lastChecked)) < 86400 ) {
//update only once a day
return;
}
|
|
a293d369c
|
86 87 |
$avatarImage = $this->getAvatarImage($uid, $dn);
if($avatarImage === false) {
|
|
31b7f2792
|
88 89 90 91 92 |
//not set, nothing left to do; return; } $image = new \OCP\Image(); |
|
a293d369c
|
93 |
$image->loadFromBase64(base64_encode($avatarImage)); |
|
31b7f2792
|
94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 |
if(!$image->valid()) {
\OCP\Util::writeLog('user_ldap', 'jpegPhoto data invalid for '.$dn,
\OCP\Util::ERROR);
return;
}
//make sure it is a square and not bigger than 128x128
$size = min(array($image->width(), $image->height(), 128));
if(!$image->centerCrop($size)) {
\OCP\Util::writeLog('user_ldap',
'croping image for avatar failed for '.$dn,
\OCP\Util::ERROR);
return;
}
if(!\OC\Files\Filesystem::$loaded) {
\OC_Util::setupFS($uid);
}
$avatarManager = \OC::$server->getAvatarManager();
$avatar = $avatarManager->getAvatar($uid);
$avatar->set($image);
}
/**
* @brief checks whether the user is allowed to change his avatar in ownCloud
* @param $uid string the ownCloud user name
* @return boolean either the user can or cannot
*/
public function canChangeAvatar($uid) {
$dn = $this->access->username2dn($uid);
if(!$dn) {
return false;
}
|
|
a293d369c
|
128 |
if($this->getAvatarImage($uid, $dn) === false) {
|
|
31b7f2792
|
129 130 131 132 133 134 135 136 |
//The user is allowed to change his avatar in ownCloud only if no //avatar is provided by LDAP return true; } return false; } /** |
|
a293d369c
|
137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 |
* @brief reads the image from LDAP that shall be used as Avatar
* @param $uid string, the ownCloud user name
* @param $dn string, the user DN
* @return image data (provided by LDAP) | false
*/
private function getAvatarImage($uid, $dn) {
$attributes = array('jpegPhoto', 'thumbnailPhoto');
foreach($attributes as $attribute) {
$result = $this->access->readAttribute($dn, $attribute);
\OCP\Config::setUserValue($uid, 'user_ldap', 'lastJpegPhotoLookup',
time());
if($result !== false && is_array($result) && isset($result[0])) {
return $result[0];
}
}
return false;
}
/**
|
|
03e52840d
|
157 158 159 160 161 162 163 164 |
* @brief Check if the password is correct
* @param $uid The username
* @param $password The password
* @returns true/false
*
* Check if the password is correct without logging in the user
*/
public function checkPassword($uid, $password) {
|
|
a293d369c
|
165 |
$uid = $this->access->escapeFilterPart($uid); |
|
03e52840d
|
166 |
//find out dn of the user name |
|
31b7f2792
|
167 168 169 |
$filter = \OCP\Util::mb_str_replace( '%uid', $uid, $this->access->connection->ldapLoginFilter, 'UTF-8'); $ldap_users = $this->access->fetchListOfUsers($filter, 'dn'); |
|
03e52840d
|
170 171 172 173 174 175 |
if(count($ldap_users) < 1) {
return false;
}
$dn = $ldap_users[0];
//do we have a username for him/her?
|
|
31b7f2792
|
176 |
$ocname = $this->access->dn2username($dn); |
|
03e52840d
|
177 178 179 180 181 182 183 |
if($ocname) {
//update some settings, if necessary
$this->updateQuota($dn);
$this->updateEmail($dn);
//are the credentials OK?
|
|
31b7f2792
|
184 |
if(!$this->access->areCredentialsValid($dn, $password)) {
|
|
03e52840d
|
185 186 |
return false; } |
|
31b7f2792
|
187 188 189 190 |
\OCP\Config::setUserValue($ocname, 'user_ldap', 'firstLoginAccomplished', 1); $this->updateAvatar($ocname, $dn); |
|
03e52840d
|
191 192 193 194 195 196 197 198 199 200 201 202 203 204 |
//give back the display name
return $ocname;
}
return false;
}
/**
* @brief Get a list of all users
* @returns array with all uids
*
* Get a list of all users.
*/
public function getUsers($search = '', $limit = 10, $offset = 0) {
|
|
a293d369c
|
205 |
$search = $this->access->escapeFilterPart($search); |
|
03e52840d
|
206 207 208 |
$cachekey = 'getUsers-'.$search.'-'.$limit.'-'.$offset; //check if users are cached, if so return |
|
31b7f2792
|
209 |
$ldap_users = $this->access->connection->getFromCache($cachekey); |
|
03e52840d
|
210 211 212 213 214 215 216 217 218 |
if(!is_null($ldap_users)) {
return $ldap_users;
}
// if we'd pass -1 to LDAP search, we'd end up in a Protocol
// error. With a limit of 0, we get 0 results. So we pass null.
if($limit <= 0) {
$limit = null;
}
|
|
31b7f2792
|
219 220 221 |
$filter = $this->access->combineFilterWithAnd(array( $this->access->connection->ldapUserFilter, $this->access->getFilterPartForUserSearch($search) |
|
03e52840d
|
222 223 224 225 226 227 |
));
\OCP\Util::writeLog('user_ldap',
'getUsers: Options: search '.$search.' limit '.$limit.' offset '.$offset.' Filter: '.$filter,
\OCP\Util::DEBUG);
//do the search and translate results to owncloud names
|
|
31b7f2792
|
228 229 230 |
$ldap_users = $this->access->fetchListOfUsers( $filter, array($this->access->connection->ldapUserDisplayName, 'dn'), |
|
03e52840d
|
231 |
$limit, $offset); |
|
31b7f2792
|
232 |
$ldap_users = $this->access->ownCloudUserNames($ldap_users); |
|
03e52840d
|
233 |
\OCP\Util::writeLog('user_ldap', 'getUsers: '.count($ldap_users). ' Users found', \OCP\Util::DEBUG);
|
|
31b7f2792
|
234 |
$this->access->connection->writeToCache($cachekey, $ldap_users); |
|
03e52840d
|
235 236 237 238 239 240 241 242 243 |
return $ldap_users;
}
/**
* @brief check if a user exists
* @param string $uid the username
* @return boolean
*/
public function userExists($uid) {
|
|
31b7f2792
|
244 245 |
if($this->access->connection->isCached('userExists'.$uid)) {
return $this->access->connection->getFromCache('userExists'.$uid);
|
|
03e52840d
|
246 |
} |
|
03e52840d
|
247 |
//getting dn, if false the user does not exist. If dn, he may be mapped only, requires more checking. |
|
31b7f2792
|
248 |
$dn = $this->access->username2dn($uid); |
|
03e52840d
|
249 |
if(!$dn) {
|
|
31b7f2792
|
250 251 252 |
\OCP\Util::writeLog('user_ldap', 'No DN found for '.$uid.' on '.
$this->access->connection->ldapHost, \OCP\Util::DEBUG);
$this->access->connection->writeToCache('userExists'.$uid, false);
|
|
03e52840d
|
253 254 |
return false; } |
|
03e52840d
|
255 |
//check if user really still exists by reading its entry |
|
31b7f2792
|
256 |
if(!is_array($this->access->readAttribute($dn, ''))) {
|
|
a293d369c
|
257 258 |
\OCP\Util::writeLog('user_ldap', 'LDAP says no user '.$dn.' on '.
$this->access->connection->ldapHost, \OCP\Util::DEBUG);
|
|
31b7f2792
|
259 |
$this->access->connection->writeToCache('userExists'.$uid, false);
|
|
03e52840d
|
260 261 |
return false; } |
|
31b7f2792
|
262 |
$this->access->connection->writeToCache('userExists'.$uid, true);
|
|
03e52840d
|
263 |
$this->updateQuota($dn); |
|
31b7f2792
|
264 |
$this->updateAvatar($uid, $dn); |
|
03e52840d
|
265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 |
return true;
}
/**
* @brief delete a user
* @param $uid The username of the user to delete
* @returns true/false
*
* Deletes a user
*/
public function deleteUser($uid) {
return false;
}
/**
* @brief get the user's home directory
* @param string $uid the username
* @return boolean
*/
public function getHome($uid) {
// user Exists check required as it is not done in user proxy!
if(!$this->userExists($uid)) {
return false;
}
$cacheKey = 'getHome'.$uid;
|
|
31b7f2792
|
291 292 |
if($this->access->connection->isCached($cacheKey)) {
return $this->access->connection->getFromCache($cacheKey);
|
|
03e52840d
|
293 |
} |
|
31b7f2792
|
294 295 296 297 |
if(strpos($this->access->connection->homeFolderNamingRule, 'attr:') === 0) {
$attr = substr($this->access->connection->homeFolderNamingRule, strlen('attr:'));
$homedir = $this->access->readAttribute(
$this->access->username2dn($uid), $attr);
|
|
03e52840d
|
298 299 300 301 302 |
if($homedir && isset($homedir[0])) {
$path = $homedir[0];
//if attribute's value is an absolute path take this, otherwise append it to data dir
//check for / at the beginning or pattern c:\ resp. c:/
if(
|
|
31b7f2792
|
303 |
'/' === $path[0] |
|
03e52840d
|
304 |
|| (3 < strlen($path) && ctype_alpha($path[0]) |
|
31b7f2792
|
305 |
&& $path[1] === ':' && ('\\' === $path[2] || '/' === $path[2]))
|
|
03e52840d
|
306 307 308 309 310 311 |
) {
$homedir = $path;
} else {
$homedir = \OCP\Config::getSystemValue('datadirectory',
\OC::$SERVERROOT.'/data' ) . '/' . $homedir[0];
}
|
|
31b7f2792
|
312 |
$this->access->connection->writeToCache($cacheKey, $homedir); |
|
03e52840d
|
313 314 315 316 317 |
return $homedir; } } //false will apply default behaviour as defined and done by OC_User |
|
31b7f2792
|
318 |
$this->access->connection->writeToCache($cacheKey, false); |
|
03e52840d
|
319 320 321 322 323 324 325 326 327 328 329 330 331 332 |
return false;
}
/**
* @brief get display name of the user
* @param $uid user ID of the user
* @return display name
*/
public function getDisplayName($uid) {
if(!$this->userExists($uid)) {
return false;
}
$cacheKey = 'getDisplayName'.$uid;
|
|
31b7f2792
|
333 |
if(!is_null($displayName = $this->access->connection->getFromCache($cacheKey))) {
|
|
03e52840d
|
334 335 |
return $displayName; } |
|
31b7f2792
|
336 337 338 |
$displayName = $this->access->readAttribute( $this->access->username2dn($uid), $this->access->connection->ldapUserDisplayName); |
|
03e52840d
|
339 340 |
if($displayName && (count($displayName) > 0)) {
|
|
31b7f2792
|
341 |
$this->access->connection->writeToCache($cacheKey, $displayName[0]); |
|
03e52840d
|
342 343 344 345 346 347 348 349 350 351 352 353 354 355 |
return $displayName[0];
}
return null;
}
/**
* @brief Get a list of all display names
* @returns array with all displayNames (value) and the correspondig uids (key)
*
* Get a list of all display names and user ids.
*/
public function getDisplayNames($search = '', $limit = null, $offset = null) {
$cacheKey = 'getDisplayNames-'.$search.'-'.$limit.'-'.$offset;
|
|
31b7f2792
|
356 |
if(!is_null($displayNames = $this->access->connection->getFromCache($cacheKey))) {
|
|
03e52840d
|
357 358 359 360 361 362 363 364 |
return $displayNames;
}
$displayNames = array();
$users = $this->getUsers($search, $limit, $offset);
foreach ($users as $user) {
$displayNames[$user] = $this->getDisplayName($user);
}
|
|
31b7f2792
|
365 |
$this->access->connection->writeToCache($cacheKey, $displayNames); |
|
03e52840d
|
366 367 368 369 370 371 372 373 374 375 376 377 378 379 |
return $displayNames;
}
/**
* @brief Check if backend implements actions
* @param $actions bitwise-or'ed actions
* @returns boolean
*
* Returns the supported actions as int to be
* compared with OC_USER_BACKEND_CREATE_USER etc.
*/
public function implementsActions($actions) {
return (bool)((OC_USER_BACKEND_CHECK_PASSWORD
| OC_USER_BACKEND_GET_HOME
|
|
31b7f2792
|
380 |
| OC_USER_BACKEND_GET_DISPLAYNAME |
|
a293d369c
|
381 382 |
| OC_USER_BACKEND_PROVIDE_AVATAR | OC_USER_BACKEND_COUNT_USERS) |
|
03e52840d
|
383 384 385 386 387 388 389 390 391 |
& $actions);
}
/**
* @return bool
*/
public function hasUserListings() {
return true;
}
|
|
a293d369c
|
392 393 394 395 396 397 398 399 400 401 402 403 |
/**
* counts the users in LDAP
*
* @return int | bool
*/
public function countUsers() {
$filter = \OCP\Util::mb_str_replace(
'%uid', '*', $this->access->connection->ldapLoginFilter, 'UTF-8');
$entries = $this->access->countUsers($filter);
return $entries;
}
|
|
03e52840d
|
404 |
} |