Blame view

sources/apps/user_ldap/group_ldap.php 19.2 KB
03e52840d   Kload   Init
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  <?php
  
  /**
   * ownCloud – LDAP group backend
   *
   * @author Arthur Schiwon
   * @copyright 2012 Arthur Schiwon blizzz@owncloud.com
   *
   * This library is free software; you can redistribute it and/or
   * modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
   * License as published by the Free Software Foundation; either
   * version 3 of the License, or any later version.
   *
   * This library is distributed in the hope that it will be useful,
   * but WITHOUT ANY WARRANTY; without even the implied warranty of
   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   * GNU AFFERO GENERAL PUBLIC LICENSE for more details.
   *
   * You should have received a copy of the GNU Affero General Public
   * License along with this library.  If not, see <http://www.gnu.org/licenses/>.
   *
   */
  
  namespace OCA\user_ldap;
31b7f2792   Kload   Upgrade to ownclo...
25
26
27
28
  use OCA\user_ldap\lib\Access;
  use OCA\user_ldap\lib\BackendUtility;
  
  class GROUP_LDAP extends BackendUtility implements \OCP\GroupInterface {
03e52840d   Kload   Init
29
  	protected $enabled = false;
31b7f2792   Kload   Upgrade to ownclo...
30
31
32
33
  	public function __construct(Access $access) {
  		parent::__construct($access);
  		$filter = $this->access->connection->ldapGroupFilter;
  		$gassoc = $this->access->connection->ldapGroupMemberAssocAttr;
03e52840d   Kload   Init
34
35
36
37
38
39
  		if(!empty($filter) && !empty($gassoc)) {
  			$this->enabled = true;
  		}
  	}
  
  	/**
6d9380f96   Cédric Dupont   Update sources OC...
40
41
42
43
  	 * is user in group?
  	 * @param string $uid uid of the user
  	 * @param string $gid gid of the group
  	 * @return bool
03e52840d   Kload   Init
44
45
46
47
48
49
50
  	 *
  	 * Checks whether the user is member of a group or not.
  	 */
  	public function inGroup($uid, $gid) {
  		if(!$this->enabled) {
  			return false;
  		}
6d9380f96   Cédric Dupont   Update sources OC...
51
52
53
  		$cacheKey = 'inGroup'.$uid.':'.$gid;
  		if($this->access->connection->isCached($cacheKey)) {
  			return $this->access->connection->getFromCache($cacheKey);
03e52840d   Kload   Init
54
  		}
6d9380f96   Cédric Dupont   Update sources OC...
55
56
57
  
  		$userDN = $this->access->username2dn($uid);
  		$groupDN = $this->access->groupname2dn($gid);
03e52840d   Kload   Init
58
  		// just in case
6d9380f96   Cédric Dupont   Update sources OC...
59
60
  		if(!$groupDN || !$userDN) {
  			$this->access->connection->writeToCache($cacheKey, false);
03e52840d   Kload   Init
61
62
  			return false;
  		}
6d9380f96   Cédric Dupont   Update sources OC...
63
64
65
66
67
68
  
  		//check primary group first
  		if($gid === $this->getUserPrimaryGroup($userDN)) {
  			$this->access->connection->writeToCache($cacheKey, true);
  			return true;
  		}
03e52840d   Kload   Init
69
  		//usually, LDAP attributes are said to be case insensitive. But there are exceptions of course.
6d9380f96   Cédric Dupont   Update sources OC...
70
  		$members = array_keys($this->_groupMembers($groupDN));
03e52840d   Kload   Init
71
  		if(!$members) {
6d9380f96   Cédric Dupont   Update sources OC...
72
  			$this->access->connection->writeToCache($cacheKey, false);
03e52840d   Kload   Init
73
74
75
76
77
  			return false;
  		}
  
  		//extra work if we don't get back user DNs
  		//TODO: this can be done with one LDAP query
31b7f2792   Kload   Upgrade to ownclo...
78
  		if(strtolower($this->access->connection->ldapGroupMemberAssocAttr) === 'memberuid') {
03e52840d   Kload   Init
79
80
  			$dns = array();
  			foreach($members as $mid) {
31b7f2792   Kload   Upgrade to ownclo...
81
82
  				$filter = str_replace('%uid', $mid, $this->access->connection->ldapLoginFilter);
  				$ldap_users = $this->access->fetchListOfUsers($filter, 'dn');
03e52840d   Kload   Init
83
84
85
86
87
88
89
  				if(count($ldap_users) < 1) {
  					continue;
  				}
  				$dns[] = $ldap_users[0];
  			}
  			$members = $dns;
  		}
6d9380f96   Cédric Dupont   Update sources OC...
90
91
  		$isInGroup = in_array($userDN, $members);
  		$this->access->connection->writeToCache($cacheKey, $isInGroup);
03e52840d   Kload   Init
92
93
94
95
96
  
  		return $isInGroup;
  	}
  
  	/**
6d9380f96   Cédric Dupont   Update sources OC...
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
  	 * @param string $dnGroup
  	 * @param array|null &$seen
  	 * @return array|mixed|null
  	 */
  	private function _groupMembers($dnGroup, &$seen = null) {
  		if ($seen === null) {
  			$seen = array();
  		}
  		$allMembers = array();
  		if (array_key_exists($dnGroup, $seen)) {
  			// avoid loops
  			return array();
  		}
  		// used extensively in cron job, caching makes sense for nested groups
  		$cacheKey = '_groupMembers'.$dnGroup;
  		if($this->access->connection->isCached($cacheKey)) {
  			return $this->access->connection->getFromCache($cacheKey);
  		}
  		$seen[$dnGroup] = 1;
  		$members = $this->access->readAttribute($dnGroup, $this->access->connection->ldapGroupMemberAssocAttr,
  												$this->access->connection->ldapGroupFilter);
  		if (is_array($members)) {
  			foreach ($members as $memberDN) {
  				$allMembers[$memberDN] = 1;
  				$nestedGroups = $this->access->connection->ldapNestedGroups;
  				if (!empty($nestedGroups)) {
  					$subMembers = $this->_groupMembers($memberDN, $seen);
  					if ($subMembers) {
  						$allMembers = array_merge($allMembers, $subMembers);
  					}
  				}
  			}
  		}
  		$this->access->connection->writeToCache($cacheKey, $allMembers);
  		return $allMembers;
  	}
  
  	/**
  	 * translates a primary group ID into an ownCloud internal name
  	 * @param string $gid as given by primaryGroupID on AD
  	 * @param string $dn a DN that belongs to the same domain as the group
  	 * @return string|bool
  	 */
  	public function primaryGroupID2Name($gid, $dn) {
  		$cacheKey = 'primaryGroupIDtoName';
  		if($this->access->connection->isCached($cacheKey)) {
  			$groupNames = $this->access->connection->getFromCache($cacheKey);
  			if(isset($groupNames[$gid])) {
  				return $groupNames[$gid];
  			}
  		}
  
  		$domainObjectSid = $this->access->getSID($dn);
  		if($domainObjectSid === false) {
  			return false;
  		}
  
  		//we need to get the DN from LDAP
  		$filter = $this->access->combineFilterWithAnd(array(
  			$this->access->connection->ldapGroupFilter,
  			'objectsid=' . $domainObjectSid . '-' . $gid
  		));
  		$result = $this->access->searchGroups($filter, array('dn'), 1);
  		if(empty($result)) {
  			return false;
  		}
  		$dn = $result[0];
  
  		//and now the group name
  		//NOTE once we have separate ownCloud group IDs and group names we can
  		//directly read the display name attribute instead of the DN
  		$name = $this->access->dn2groupname($dn);
  
  		$this->access->connection->writeToCache($cacheKey, $name);
  
  		return $name;
  	}
  
  	/**
  	 * returns the entry's primary group ID
  	 * @param string $dn
  	 * @param string $attribute
  	 * @return string|bool
  	 */
  	private function getEntryGroupID($dn, $attribute) {
  		$value = $this->access->readAttribute($dn, $attribute);
  		if(is_array($value) && !empty($value)) {
  			return $value[0];
  		}
  		return false;
  	}
  
  	/**
  	 * returns the group's primary ID
  	 * @param string $dn
  	 * @return string|bool
  	 */
  	public function getGroupPrimaryGroupID($dn) {
  		return $this->getEntryGroupID($dn, 'primaryGroupToken');
  	}
  
  	/**
  	 * returns the user's primary group ID
  	 * @param string $dn
  	 * @return string|bool
  	 */
  	public function getUserPrimaryGroupIDs($dn) {
  		return $this->getEntryGroupID($dn, 'primaryGroupID');
  	}
  
  	/**
  	 * returns a list of users that have the given group as primary group
  	 *
  	 * @param string $groupDN
  	 * @param $limit
  	 * @param int $offset
  	 * @return string[]
  	 */
  	public function getUsersInPrimaryGroup($groupDN, $limit = -1, $offset = 0) {
  		$groupID = $this->getGroupPrimaryGroupID($groupDN);
  		if($groupID === false) {
  			return array();
  		}
  
  		$filter = $this->access->combineFilterWithAnd(array(
  			$this->access->connection->ldapUserFilter,
  			'primaryGroupID=' . $groupID
  		));
  
  		$users = $this->access->fetchListOfUsers(
  			$filter,
  			array($this->access->connection->ldapUserDisplayName, 'dn'),
  			$limit,
  			$offset
  		);
  
  		return $users;
  	}
  
  	/**
  	 * gets the primary group of a user
  	 * @param string $dn
  	 * @return string
  	 */
  	public function getUserPrimaryGroup($dn) {
  		$groupID = $this->getUserPrimaryGroupIDs($dn);
  		if($groupID !== false) {
  			$groupName = $this->primaryGroupID2Name($groupID, $dn);
  			if($groupName !== false) {
  				return $groupName;
  			}
  		}
  
  		return false;
  	}
  
  	/**
  	 * Get all groups a user belongs to
  	 * @param string $uid Name of the user
  	 * @return array with group names
03e52840d   Kload   Init
257
258
259
260
261
262
263
264
265
  	 *
  	 * This function fetches all groups a user belongs to. It does not check
  	 * if the user exists at all.
  	 */
  	public function getUserGroups($uid) {
  		if(!$this->enabled) {
  			return array();
  		}
  		$cacheKey = 'getUserGroups'.$uid;
31b7f2792   Kload   Upgrade to ownclo...
266
267
  		if($this->access->connection->isCached($cacheKey)) {
  			return $this->access->connection->getFromCache($cacheKey);
03e52840d   Kload   Init
268
  		}
31b7f2792   Kload   Upgrade to ownclo...
269
  		$userDN = $this->access->username2dn($uid);
03e52840d   Kload   Init
270
  		if(!$userDN) {
31b7f2792   Kload   Upgrade to ownclo...
271
  			$this->access->connection->writeToCache($cacheKey, array());
03e52840d   Kload   Init
272
273
274
275
  			return array();
  		}
  
  		//uniqueMember takes DN, memberuid the uid, so we need to distinguish
31b7f2792   Kload   Upgrade to ownclo...
276
277
  		if((strtolower($this->access->connection->ldapGroupMemberAssocAttr) === 'uniquemember')
  			|| (strtolower($this->access->connection->ldapGroupMemberAssocAttr) === 'member')
03e52840d   Kload   Init
278
279
  		) {
  			$uid = $userDN;
31b7f2792   Kload   Upgrade to ownclo...
280
281
  		} else if(strtolower($this->access->connection->ldapGroupMemberAssocAttr) === 'memberuid') {
  			$result = $this->access->readAttribute($userDN, 'uid');
03e52840d   Kload   Init
282
283
284
285
286
  			$uid = $result[0];
  		} else {
  			// just in case
  			$uid = $userDN;
  		}
6d9380f96   Cédric Dupont   Update sources OC...
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
  		$groups = array_values($this->getGroupsByMember($uid));
  		$groups = $this->access->ownCloudGroupNames($groups);
  
  		$primaryGroup = $this->getUserPrimaryGroup($userDN);
  		if($primaryGroup !== false) {
  			$groups[] = $primaryGroup;
  		}
  
  		$groups = array_unique($groups, SORT_LOCALE_STRING);
  		$this->access->connection->writeToCache($cacheKey, $groups);
  
  		return $groups;
  	}
  
  	/**
  	 * @param string $dn
  	 * @param array|null &$seen
  	 * @return array
  	 */
  	private function getGroupsByMember($dn, &$seen = null) {
  		if ($seen === null) {
  			$seen = array();
  		}
  		$allGroups = array();
  		if (array_key_exists($dn, $seen)) {
  			// avoid loops
  			return array();
  		}
  		$seen[$dn] = true;
31b7f2792   Kload   Upgrade to ownclo...
316
317
  		$filter = $this->access->combineFilterWithAnd(array(
  			$this->access->connection->ldapGroupFilter,
6d9380f96   Cédric Dupont   Update sources OC...
318
  			$this->access->connection->ldapGroupMemberAssocAttr.'='.$dn
03e52840d   Kload   Init
319
  		));
31b7f2792   Kload   Upgrade to ownclo...
320
  		$groups = $this->access->fetchListOfGroups($filter,
6d9380f96   Cédric Dupont   Update sources OC...
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
  			array($this->access->connection->ldapGroupDisplayName, 'dn'));
  		if (is_array($groups)) {
  			foreach ($groups as $groupobj) {
  				$groupDN = $groupobj['dn'];
  				$allGroups[$groupDN] = $groupobj;
  				$nestedGroups = $this->access->connection->ldapNestedGroups;
  				if (!empty($nestedGroups)) {
  					$supergroups = $this->getGroupsByMember($groupDN, $seen);
  					if (is_array($supergroups) && (count($supergroups)>0)) {
  						$allGroups = array_merge($allGroups, $supergroups);
  					}
  				}
  			}
  		}
  		return $allGroups;
03e52840d   Kload   Init
336
337
338
  	}
  
  	/**
6d9380f96   Cédric Dupont   Update sources OC...
339
340
341
342
343
344
345
  	 * get a list of all users in a group
  	 *
  	 * @param string $gid
  	 * @param string $search
  	 * @param int $limit
  	 * @param int $offset
  	 * @return array with user ids
03e52840d   Kload   Init
346
347
348
349
350
351
352
353
  	 */
  	public function usersInGroup($gid, $search = '', $limit = -1, $offset = 0) {
  		if(!$this->enabled) {
  			return array();
  		}
  		if(!$this->groupExists($gid)) {
  			return array();
  		}
6d9380f96   Cédric Dupont   Update sources OC...
354
  		$cacheKey = 'usersInGroup-'.$gid.'-'.$search.'-'.$limit.'-'.$offset;
03e52840d   Kload   Init
355
  		// check for cache of the exact query
6d9380f96   Cédric Dupont   Update sources OC...
356
  		$groupUsers = $this->access->connection->getFromCache($cacheKey);
03e52840d   Kload   Init
357
358
359
360
361
  		if(!is_null($groupUsers)) {
  			return $groupUsers;
  		}
  
  		// check for cache of the query without limit and offset
31b7f2792   Kload   Upgrade to ownclo...
362
  		$groupUsers = $this->access->connection->getFromCache('usersInGroup-'.$gid.'-'.$search);
03e52840d   Kload   Init
363
364
  		if(!is_null($groupUsers)) {
  			$groupUsers = array_slice($groupUsers, $offset, $limit);
6d9380f96   Cédric Dupont   Update sources OC...
365
  			$this->access->connection->writeToCache($cacheKey, $groupUsers);
03e52840d   Kload   Init
366
367
  			return $groupUsers;
  		}
31b7f2792   Kload   Upgrade to ownclo...
368
  		if($limit === -1) {
03e52840d   Kload   Init
369
370
  			$limit = null;
  		}
31b7f2792   Kload   Upgrade to ownclo...
371
  		$groupDN = $this->access->groupname2dn($gid);
03e52840d   Kload   Init
372
373
  		if(!$groupDN) {
  			// group couldn't be found, return empty resultset
6d9380f96   Cédric Dupont   Update sources OC...
374
  			$this->access->connection->writeToCache($cacheKey, array());
03e52840d   Kload   Init
375
376
  			return array();
  		}
6d9380f96   Cédric Dupont   Update sources OC...
377
  		$members = array_keys($this->_groupMembers($groupDN));
03e52840d   Kload   Init
378
  		if(!$members) {
6d9380f96   Cédric Dupont   Update sources OC...
379
380
  			//in case users could not be retrieved, return empty result set
  			$this->access->connection->writeToCache($cacheKey, array());
03e52840d   Kload   Init
381
382
383
384
  			return array();
  		}
  
  		$groupUsers = array();
31b7f2792   Kload   Upgrade to ownclo...
385
  		$isMemberUid = (strtolower($this->access->connection->ldapGroupMemberAssocAttr) === 'memberuid');
03e52840d   Kload   Init
386
387
  		foreach($members as $member) {
  			if($isMemberUid) {
6d9380f96   Cédric Dupont   Update sources OC...
388
  				//we got uids, need to get their DNs to 'translate' them to user names
31b7f2792   Kload   Upgrade to ownclo...
389
  				$filter = $this->access->combineFilterWithAnd(array(
03e52840d   Kload   Init
390
  					\OCP\Util::mb_str_replace('%uid', $member,
31b7f2792   Kload   Upgrade to ownclo...
391
392
  						$this->access->connection->ldapLoginFilter, 'UTF-8'),
  					$this->access->getFilterPartForUserSearch($search)
03e52840d   Kload   Init
393
  				));
31b7f2792   Kload   Upgrade to ownclo...
394
  				$ldap_users = $this->access->fetchListOfUsers($filter, 'dn');
03e52840d   Kload   Init
395
396
397
  				if(count($ldap_users) < 1) {
  					continue;
  				}
31b7f2792   Kload   Upgrade to ownclo...
398
  				$groupUsers[] = $this->access->dn2username($ldap_users[0]);
03e52840d   Kload   Init
399
400
401
  			} else {
  				//we got DNs, check if we need to filter by search or we can give back all of them
  				if(!empty($search)) {
31b7f2792   Kload   Upgrade to ownclo...
402
403
404
  					if(!$this->access->readAttribute($member,
  						$this->access->connection->ldapUserDisplayName,
  						$this->access->getFilterPartForUserSearch($search))) {
03e52840d   Kload   Init
405
406
407
408
  						continue;
  					}
  				}
  				// dn2username will also check if the users belong to the allowed base
31b7f2792   Kload   Upgrade to ownclo...
409
  				if($ocname = $this->access->dn2username($member)) {
03e52840d   Kload   Init
410
411
412
413
  					$groupUsers[] = $ocname;
  				}
  			}
  		}
6d9380f96   Cédric Dupont   Update sources OC...
414

03e52840d   Kload   Init
415
  		natsort($groupUsers);
31b7f2792   Kload   Upgrade to ownclo...
416
  		$this->access->connection->writeToCache('usersInGroup-'.$gid.'-'.$search, $groupUsers);
03e52840d   Kload   Init
417
  		$groupUsers = array_slice($groupUsers, $offset, $limit);
6d9380f96   Cédric Dupont   Update sources OC...
418
419
420
421
422
423
  
  		//and get users that have the group as primary
  		$primaryUsers = $this->getUsersInPrimaryGroup($groupDN, $limit, $offset);
  		$groupUsers = array_unique(array_merge($groupUsers, $primaryUsers));
  
  		$this->access->connection->writeToCache($cacheKey, $groupUsers);
03e52840d   Kload   Init
424
425
426
427
428
  
  		return $groupUsers;
  	}
  
  	/**
6d9380f96   Cédric Dupont   Update sources OC...
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
  	 * returns the number of users in a group, who match the search term
  	 * @param string $gid the internal group name
  	 * @param string $search optional, a search string
  	 * @return int|bool
  	 */
  	public function countUsersInGroup($gid, $search = '') {
  		$cacheKey = 'countUsersInGroup-'.$gid.'-'.$search;
  		if(!$this->enabled || !$this->groupExists($gid)) {
  			return false;
  		}
  		$groupUsers = $this->access->connection->getFromCache($cacheKey);
  		if(!is_null($groupUsers)) {
  			return $groupUsers;
  		}
  
  		$groupDN = $this->access->groupname2dn($gid);
  		if(!$groupDN) {
  			// group couldn't be found, return empty result set
  			$this->access->connection->writeToCache($cacheKey, false);
  			return false;
  		}
  
  		$members = array_keys($this->_groupMembers($groupDN));
  		if(!$members) {
  			//in case users could not be retrieved, return empty result set
  			$this->access->connection->writeToCache($cacheKey, false);
  			return false;
  		}
  
  		if(empty($search)) {
  			$groupUsers = count($members);
  			$this->access->connection->writeToCache($cacheKey, $groupUsers);
  			return $groupUsers;
  		}
  		$isMemberUid =
  			(strtolower($this->access->connection->ldapGroupMemberAssocAttr)
  			=== 'memberuid');
  
  		//we need to apply the search filter
  		//alternatives that need to be checked:
  		//a) get all users by search filter and array_intersect them
  		//b) a, but only when less than 1k 10k ?k users like it is
  		//c) put all DNs|uids in a LDAP filter, combine with the search string
  		//   and let it count.
  		//For now this is not important, because the only use of this method
  		//does not supply a search string
  		$groupUsers = array();
  		foreach($members as $member) {
  			if($isMemberUid) {
  				//we got uids, need to get their DNs to 'translate' them to user names
  				$filter = $this->access->combineFilterWithAnd(array(
  					\OCP\Util::mb_str_replace('%uid', $member,
  						$this->access->connection->ldapLoginFilter, 'UTF-8'),
  					$this->access->getFilterPartForUserSearch($search)
  				));
  				$ldap_users = $this->access->fetchListOfUsers($filter, 'dn');
  				if(count($ldap_users) < 1) {
  					continue;
  				}
  				$groupUsers[] = $this->access->dn2username($ldap_users[0]);
  			} else {
  				//we need to apply the search filter now
  				if(!$this->access->readAttribute($member,
  					$this->access->connection->ldapUserDisplayName,
  					$this->access->getFilterPartForUserSearch($search))) {
  					continue;
  				}
  				// dn2username will also check if the users belong to the allowed base
  				if($ocname = $this->access->dn2username($member)) {
  					$groupUsers[] = $ocname;
  				}
  			}
  		}
  
  		//and get users that have the group as primary
  		$primaryUsers = $this->getUsersInPrimaryGroup($groupDN);
  		$groupUsers = array_unique(array_merge($groupUsers, $primaryUsers));
  
  		return count($groupUsers);
  	}
  
  	/**
  	 * get a list of all groups
03e52840d   Kload   Init
512
  	 *
6d9380f96   Cédric Dupont   Update sources OC...
513
514
515
516
517
518
  	 * @param string $search
  	 * @param $limit
  	 * @param int $offset
  	 * @return array with group names
  	 *
  	 * Returns a list with all groups (used by getGroups)
03e52840d   Kload   Init
519
  	 */
6d9380f96   Cédric Dupont   Update sources OC...
520
  	protected function getGroupsChunk($search = '', $limit = -1, $offset = 0) {
03e52840d   Kload   Init
521
522
523
  		if(!$this->enabled) {
  			return array();
  		}
6d9380f96   Cédric Dupont   Update sources OC...
524
  		$cacheKey = 'getGroups-'.$search.'-'.$limit.'-'.$offset;
03e52840d   Kload   Init
525
526
  
  		//Check cache before driving unnecessary searches
6d9380f96   Cédric Dupont   Update sources OC...
527
528
  		\OCP\Util::writeLog('user_ldap', 'getGroups '.$cacheKey, \OCP\Util::DEBUG);
  		$ldap_groups = $this->access->connection->getFromCache($cacheKey);
03e52840d   Kload   Init
529
530
531
532
533
534
535
536
537
  		if(!is_null($ldap_groups)) {
  			return $ldap_groups;
  		}
  
  		// if we'd pass -1 to LDAP search, we'd end up in a Protocol
  		// error. With a limit of 0, we get 0 results. So we pass null.
  		if($limit <= 0) {
  			$limit = null;
  		}
31b7f2792   Kload   Upgrade to ownclo...
538
539
540
  		$filter = $this->access->combineFilterWithAnd(array(
  			$this->access->connection->ldapGroupFilter,
  			$this->access->getFilterPartForGroupSearch($search)
03e52840d   Kload   Init
541
542
  		));
  		\OCP\Util::writeLog('user_ldap', 'getGroups Filter '.$filter, \OCP\Util::DEBUG);
31b7f2792   Kload   Upgrade to ownclo...
543
544
545
546
547
  		$ldap_groups = $this->access->fetchListOfGroups($filter,
  				array($this->access->connection->ldapGroupDisplayName, 'dn'),
  				$limit,
  				$offset);
  		$ldap_groups = $this->access->ownCloudGroupNames($ldap_groups);
03e52840d   Kload   Init
548

6d9380f96   Cédric Dupont   Update sources OC...
549
  		$this->access->connection->writeToCache($cacheKey, $ldap_groups);
03e52840d   Kload   Init
550
551
  		return $ldap_groups;
  	}
6d9380f96   Cédric Dupont   Update sources OC...
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
  	/**
  	 * get a list of all groups using a paged search
  	 *
  	 * @param string $search
  	 * @param int $limit
  	 * @param int $offset
  	 * @return array with group names
  	 *
  	 * Returns a list with all groups
  	 * Uses a paged search if available to override a
  	 * server side search limit.
  	 * (active directory has a limit of 1000 by default)
  	 */
  	public function getGroups($search = '', $limit = -1, $offset = 0) {
  		if(!$this->enabled) {
  			return array();
  		}
  		$pagingSize = $this->access->connection->ldapPagingSize;
  		if ((! $this->access->connection->hasPagedResultSupport)
  		   	|| empty($pagingSize)) {
  			return $this->getGroupsChunk($search, $limit, $offset);
  		}
  		$maxGroups = 100000; // limit max results (just for safety reasons)
  		if ($limit > -1) {
  		   $overallLimit = min($limit, $maxGroups);
  		} else {
  		   $overallLimit = $maxGroups;
  		}
  		$chunkOffset = $offset;
  		$allGroups = array();
  		while ($chunkOffset < $overallLimit) {
  			$chunkLimit = min($pagingSize, $overallLimit - $chunkOffset);
  			$ldapGroups = $this->getGroupsChunk($search, $chunkLimit, $chunkOffset);
  			$nread = count($ldapGroups);
  			\OCP\Util::writeLog('user_ldap', 'getGroups('.$search.'): read '.$nread.' at offset '.$chunkOffset.' (limit: '.$chunkLimit.')', \OCP\Util::DEBUG);
  			if ($nread) {
  				$allGroups = array_merge($allGroups, $ldapGroups);
  				$chunkOffset += $nread;
  			}
  			if ($nread < $chunkLimit) {
  				break;
  			}
  		}
  		return $allGroups;
  	}
  
  	/**
  	 * @param string $group
  	 * @return bool
  	 */
03e52840d   Kload   Init
602
603
604
605
606
607
608
609
610
611
  	public function groupMatchesFilter($group) {
  		return (strripos($group, $this->groupSearch) !== false);
  	}
  
  	/**
  	 * check if a group exists
  	 * @param string $gid
  	 * @return bool
  	 */
  	public function groupExists($gid) {
31b7f2792   Kload   Upgrade to ownclo...
612
613
  		if($this->access->connection->isCached('groupExists'.$gid)) {
  			return $this->access->connection->getFromCache('groupExists'.$gid);
03e52840d   Kload   Init
614
  		}
31b7f2792   Kload   Upgrade to ownclo...
615
616
617
  		//getting dn, if false the group does not exist. If dn, it may be mapped
  		//only, requires more checking.
  		$dn = $this->access->groupname2dn($gid);
03e52840d   Kload   Init
618
  		if(!$dn) {
31b7f2792   Kload   Upgrade to ownclo...
619
  			$this->access->connection->writeToCache('groupExists'.$gid, false);
03e52840d   Kload   Init
620
621
622
623
  			return false;
  		}
  
  		//if group really still exists, we will be able to read its objectclass
6d9380f96   Cédric Dupont   Update sources OC...
624
  		if(!is_array($this->access->readAttribute($dn, ''))) {
31b7f2792   Kload   Upgrade to ownclo...
625
  			$this->access->connection->writeToCache('groupExists'.$gid, false);
03e52840d   Kload   Init
626
627
  			return false;
  		}
31b7f2792   Kload   Upgrade to ownclo...
628
  		$this->access->connection->writeToCache('groupExists'.$gid, true);
03e52840d   Kload   Init
629
630
631
632
  		return true;
  	}
  
  	/**
6d9380f96   Cédric Dupont   Update sources OC...
633
634
635
  	* Check if backend implements actions
  	* @param int $actions bitwise-or'ed actions
  	* @return boolean
03e52840d   Kload   Init
636
637
638
639
640
  	*
  	* Returns the supported actions as int to be
  	* compared with OC_USER_BACKEND_CREATE_USER etc.
  	*/
  	public function implementsActions($actions) {
6d9380f96   Cédric Dupont   Update sources OC...
641
  		return (bool)(OC_GROUP_BACKEND_COUNT_USERS & $actions);
03e52840d   Kload   Init
642
643
  	}
  }