Blame view
sources/apps/user_ldap/user_ldap.php
10.9 KB
|
03e52840d
|
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 |
<?php /** * ownCloud * * @author Dominik Schmidt * @author Artuhr Schiwon * @copyright 2011 Dominik Schmidt dev@dominik-schmidt.de * @copyright 2012 Arthur Schiwon blizzz@owncloud.com * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE * License as published by the Free Software Foundation; either * version 3 of the License, or any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU AFFERO GENERAL PUBLIC LICENSE for more details. * * You should have received a copy of the GNU Affero General Public * License along with this library. If not, see <http://www.gnu.org/licenses/>. * */ namespace OCA\user_ldap; |
|
31b7f2792
|
27 28 29 30 |
use OCA\user_ldap\lib\ILDAPWrapper;
use OCA\user_ldap\lib\BackendUtility;
class USER_LDAP extends BackendUtility implements \OCP\UserInterface {
|
|
03e52840d
|
31 32 |
private function updateQuota($dn) {
|
|
837968727
|
33 |
$this->access->updateQuota($dn); |
|
03e52840d
|
34 35 36 |
}
private function updateEmail($dn) {
|
|
837968727
|
37 |
$this->access->updateEmail($dn); |
|
03e52840d
|
38 39 40 |
} /** |
|
31b7f2792
|
41 42 43 44 45 46 47 48 49 50 51 52 53 54 |
* @brief reads jpegPhoto and set is as avatar if available
* @param $uid string ownCloud user name
* @param $dn string the user's LDAP DN
* @return void
*/
private function updateAvatar($uid, $dn) {
$hasLoggedIn = \OCP\Config::getUserValue($uid, 'user_ldap',
'firstLoginAccomplished', 0);
$lastChecked = \OCP\Config::getUserValue($uid, 'user_ldap',
'lastJpegPhotoLookup', 0);
if(($hasLoggedIn !== '1') || (time() - intval($lastChecked)) < 86400 ) {
//update only once a day
return;
}
|
|
a293d369c
|
55 56 |
$avatarImage = $this->getAvatarImage($uid, $dn);
if($avatarImage === false) {
|
|
31b7f2792
|
57 58 59 60 61 |
//not set, nothing left to do; return; } $image = new \OCP\Image(); |
|
a293d369c
|
62 |
$image->loadFromBase64(base64_encode($avatarImage)); |
|
31b7f2792
|
63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 |
if(!$image->valid()) {
\OCP\Util::writeLog('user_ldap', 'jpegPhoto data invalid for '.$dn,
\OCP\Util::ERROR);
return;
}
//make sure it is a square and not bigger than 128x128
$size = min(array($image->width(), $image->height(), 128));
if(!$image->centerCrop($size)) {
\OCP\Util::writeLog('user_ldap',
'croping image for avatar failed for '.$dn,
\OCP\Util::ERROR);
return;
}
if(!\OC\Files\Filesystem::$loaded) {
\OC_Util::setupFS($uid);
}
$avatarManager = \OC::$server->getAvatarManager();
$avatar = $avatarManager->getAvatar($uid);
$avatar->set($image);
}
/**
* @brief checks whether the user is allowed to change his avatar in ownCloud
* @param $uid string the ownCloud user name
* @return boolean either the user can or cannot
*/
public function canChangeAvatar($uid) {
$dn = $this->access->username2dn($uid);
if(!$dn) {
return false;
}
|
|
a293d369c
|
97 |
if($this->getAvatarImage($uid, $dn) === false) {
|
|
31b7f2792
|
98 99 100 101 102 103 104 105 |
//The user is allowed to change his avatar in ownCloud only if no //avatar is provided by LDAP return true; } return false; } /** |
|
a293d369c
|
106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 |
* @brief reads the image from LDAP that shall be used as Avatar
* @param $uid string, the ownCloud user name
* @param $dn string, the user DN
* @return image data (provided by LDAP) | false
*/
private function getAvatarImage($uid, $dn) {
$attributes = array('jpegPhoto', 'thumbnailPhoto');
foreach($attributes as $attribute) {
$result = $this->access->readAttribute($dn, $attribute);
\OCP\Config::setUserValue($uid, 'user_ldap', 'lastJpegPhotoLookup',
time());
if($result !== false && is_array($result) && isset($result[0])) {
return $result[0];
}
}
return false;
}
/**
|
|
03e52840d
|
126 127 128 129 130 131 132 133 |
* @brief Check if the password is correct
* @param $uid The username
* @param $password The password
* @returns true/false
*
* Check if the password is correct without logging in the user
*/
public function checkPassword($uid, $password) {
|
|
a293d369c
|
134 |
$uid = $this->access->escapeFilterPart($uid); |
|
03e52840d
|
135 |
//find out dn of the user name |
|
31b7f2792
|
136 137 138 |
$filter = \OCP\Util::mb_str_replace( '%uid', $uid, $this->access->connection->ldapLoginFilter, 'UTF-8'); $ldap_users = $this->access->fetchListOfUsers($filter, 'dn'); |
|
03e52840d
|
139 140 141 142 143 144 |
if(count($ldap_users) < 1) {
return false;
}
$dn = $ldap_users[0];
//do we have a username for him/her?
|
|
31b7f2792
|
145 |
$ocname = $this->access->dn2username($dn); |
|
03e52840d
|
146 147 148 149 150 151 152 |
if($ocname) {
//update some settings, if necessary
$this->updateQuota($dn);
$this->updateEmail($dn);
//are the credentials OK?
|
|
31b7f2792
|
153 |
if(!$this->access->areCredentialsValid($dn, $password)) {
|
|
03e52840d
|
154 155 |
return false; } |
|
31b7f2792
|
156 157 158 159 |
\OCP\Config::setUserValue($ocname, 'user_ldap', 'firstLoginAccomplished', 1); $this->updateAvatar($ocname, $dn); |
|
03e52840d
|
160 161 162 163 164 165 166 167 168 169 170 171 172 173 |
//give back the display name
return $ocname;
}
return false;
}
/**
* @brief Get a list of all users
* @returns array with all uids
*
* Get a list of all users.
*/
public function getUsers($search = '', $limit = 10, $offset = 0) {
|
|
a293d369c
|
174 |
$search = $this->access->escapeFilterPart($search); |
|
03e52840d
|
175 176 177 |
$cachekey = 'getUsers-'.$search.'-'.$limit.'-'.$offset; //check if users are cached, if so return |
|
31b7f2792
|
178 |
$ldap_users = $this->access->connection->getFromCache($cachekey); |
|
03e52840d
|
179 180 181 182 183 184 185 186 187 |
if(!is_null($ldap_users)) {
return $ldap_users;
}
// if we'd pass -1 to LDAP search, we'd end up in a Protocol
// error. With a limit of 0, we get 0 results. So we pass null.
if($limit <= 0) {
$limit = null;
}
|
|
31b7f2792
|
188 189 190 |
$filter = $this->access->combineFilterWithAnd(array( $this->access->connection->ldapUserFilter, $this->access->getFilterPartForUserSearch($search) |
|
03e52840d
|
191 192 193 194 195 196 |
));
\OCP\Util::writeLog('user_ldap',
'getUsers: Options: search '.$search.' limit '.$limit.' offset '.$offset.' Filter: '.$filter,
\OCP\Util::DEBUG);
//do the search and translate results to owncloud names
|
|
31b7f2792
|
197 198 199 |
$ldap_users = $this->access->fetchListOfUsers( $filter, array($this->access->connection->ldapUserDisplayName, 'dn'), |
|
03e52840d
|
200 |
$limit, $offset); |
|
31b7f2792
|
201 |
$ldap_users = $this->access->ownCloudUserNames($ldap_users); |
|
03e52840d
|
202 |
\OCP\Util::writeLog('user_ldap', 'getUsers: '.count($ldap_users). ' Users found', \OCP\Util::DEBUG);
|
|
31b7f2792
|
203 |
$this->access->connection->writeToCache($cachekey, $ldap_users); |
|
03e52840d
|
204 205 206 207 208 209 210 211 212 |
return $ldap_users;
}
/**
* @brief check if a user exists
* @param string $uid the username
* @return boolean
*/
public function userExists($uid) {
|
|
31b7f2792
|
213 214 |
if($this->access->connection->isCached('userExists'.$uid)) {
return $this->access->connection->getFromCache('userExists'.$uid);
|
|
03e52840d
|
215 |
} |
|
03e52840d
|
216 |
//getting dn, if false the user does not exist. If dn, he may be mapped only, requires more checking. |
|
31b7f2792
|
217 |
$dn = $this->access->username2dn($uid); |
|
03e52840d
|
218 |
if(!$dn) {
|
|
31b7f2792
|
219 220 221 |
\OCP\Util::writeLog('user_ldap', 'No DN found for '.$uid.' on '.
$this->access->connection->ldapHost, \OCP\Util::DEBUG);
$this->access->connection->writeToCache('userExists'.$uid, false);
|
|
03e52840d
|
222 223 |
return false; } |
|
03e52840d
|
224 |
//check if user really still exists by reading its entry |
|
31b7f2792
|
225 |
if(!is_array($this->access->readAttribute($dn, ''))) {
|
|
a293d369c
|
226 227 |
\OCP\Util::writeLog('user_ldap', 'LDAP says no user '.$dn.' on '.
$this->access->connection->ldapHost, \OCP\Util::DEBUG);
|
|
31b7f2792
|
228 |
$this->access->connection->writeToCache('userExists'.$uid, false);
|
|
03e52840d
|
229 230 |
return false; } |
|
31b7f2792
|
231 |
$this->access->connection->writeToCache('userExists'.$uid, true);
|
|
03e52840d
|
232 |
$this->updateQuota($dn); |
|
837968727
|
233 |
$this->updateEmail($dn); |
|
31b7f2792
|
234 |
$this->updateAvatar($uid, $dn); |
|
03e52840d
|
235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 |
return true;
}
/**
* @brief delete a user
* @param $uid The username of the user to delete
* @returns true/false
*
* Deletes a user
*/
public function deleteUser($uid) {
return false;
}
/**
* @brief get the user's home directory
* @param string $uid the username
* @return boolean
*/
public function getHome($uid) {
// user Exists check required as it is not done in user proxy!
if(!$this->userExists($uid)) {
return false;
}
$cacheKey = 'getHome'.$uid;
|
|
31b7f2792
|
261 262 |
if($this->access->connection->isCached($cacheKey)) {
return $this->access->connection->getFromCache($cacheKey);
|
|
03e52840d
|
263 |
} |
|
31b7f2792
|
264 265 266 267 |
if(strpos($this->access->connection->homeFolderNamingRule, 'attr:') === 0) {
$attr = substr($this->access->connection->homeFolderNamingRule, strlen('attr:'));
$homedir = $this->access->readAttribute(
$this->access->username2dn($uid), $attr);
|
|
03e52840d
|
268 269 270 271 272 |
if($homedir && isset($homedir[0])) {
$path = $homedir[0];
//if attribute's value is an absolute path take this, otherwise append it to data dir
//check for / at the beginning or pattern c:\ resp. c:/
if(
|
|
31b7f2792
|
273 |
'/' === $path[0] |
|
03e52840d
|
274 |
|| (3 < strlen($path) && ctype_alpha($path[0]) |
|
31b7f2792
|
275 |
&& $path[1] === ':' && ('\\' === $path[2] || '/' === $path[2]))
|
|
03e52840d
|
276 277 278 279 280 281 |
) {
$homedir = $path;
} else {
$homedir = \OCP\Config::getSystemValue('datadirectory',
\OC::$SERVERROOT.'/data' ) . '/' . $homedir[0];
}
|
|
31b7f2792
|
282 |
$this->access->connection->writeToCache($cacheKey, $homedir); |
|
03e52840d
|
283 284 285 286 287 |
return $homedir; } } //false will apply default behaviour as defined and done by OC_User |
|
31b7f2792
|
288 |
$this->access->connection->writeToCache($cacheKey, false); |
|
03e52840d
|
289 290 291 292 293 294 295 296 297 298 299 300 301 302 |
return false;
}
/**
* @brief get display name of the user
* @param $uid user ID of the user
* @return display name
*/
public function getDisplayName($uid) {
if(!$this->userExists($uid)) {
return false;
}
$cacheKey = 'getDisplayName'.$uid;
|
|
31b7f2792
|
303 |
if(!is_null($displayName = $this->access->connection->getFromCache($cacheKey))) {
|
|
03e52840d
|
304 305 |
return $displayName; } |
|
31b7f2792
|
306 307 308 |
$displayName = $this->access->readAttribute( $this->access->username2dn($uid), $this->access->connection->ldapUserDisplayName); |
|
03e52840d
|
309 310 |
if($displayName && (count($displayName) > 0)) {
|
|
31b7f2792
|
311 |
$this->access->connection->writeToCache($cacheKey, $displayName[0]); |
|
03e52840d
|
312 313 314 315 316 317 318 319 320 321 322 323 324 325 |
return $displayName[0];
}
return null;
}
/**
* @brief Get a list of all display names
* @returns array with all displayNames (value) and the correspondig uids (key)
*
* Get a list of all display names and user ids.
*/
public function getDisplayNames($search = '', $limit = null, $offset = null) {
$cacheKey = 'getDisplayNames-'.$search.'-'.$limit.'-'.$offset;
|
|
31b7f2792
|
326 |
if(!is_null($displayNames = $this->access->connection->getFromCache($cacheKey))) {
|
|
03e52840d
|
327 328 329 330 331 332 333 334 |
return $displayNames;
}
$displayNames = array();
$users = $this->getUsers($search, $limit, $offset);
foreach ($users as $user) {
$displayNames[$user] = $this->getDisplayName($user);
}
|
|
31b7f2792
|
335 |
$this->access->connection->writeToCache($cacheKey, $displayNames); |
|
03e52840d
|
336 337 338 339 340 341 342 343 344 345 346 347 348 349 |
return $displayNames;
}
/**
* @brief Check if backend implements actions
* @param $actions bitwise-or'ed actions
* @returns boolean
*
* Returns the supported actions as int to be
* compared with OC_USER_BACKEND_CREATE_USER etc.
*/
public function implementsActions($actions) {
return (bool)((OC_USER_BACKEND_CHECK_PASSWORD
| OC_USER_BACKEND_GET_HOME
|
|
31b7f2792
|
350 |
| OC_USER_BACKEND_GET_DISPLAYNAME |
|
a293d369c
|
351 352 |
| OC_USER_BACKEND_PROVIDE_AVATAR | OC_USER_BACKEND_COUNT_USERS) |
|
03e52840d
|
353 354 355 356 357 358 359 360 361 |
& $actions);
}
/**
* @return bool
*/
public function hasUserListings() {
return true;
}
|
|
a293d369c
|
362 363 364 365 366 367 368 369 370 371 372 373 |
/**
* counts the users in LDAP
*
* @return int | bool
*/
public function countUsers() {
$filter = \OCP\Util::mb_str_replace(
'%uid', '*', $this->access->connection->ldapLoginFilter, 'UTF-8');
$entries = $this->access->countUsers($filter);
return $entries;
}
|
|
03e52840d
|
374 |
} |