12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487 |
- <?php
- /* Copyright (C) 2004 Rodolphe Quiedeville <rodolphe@quiedeville.org>
- * Copyright (C) 2004 Benoit Mortier <benoit.mortier@opensides.be>
- * Copyright (C) 2005-2021 Regis Houssin <regis.houssin@inodbox.com>
- * Copyright (C) 2006-2021 Laurent Destailleur <eldy@users.sourceforge.net>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <https://www.gnu.org/licenses/>.
- * or see https://www.gnu.org/
- */
- /**
- * \file htdocs/core/class/ldap.class.php
- * \brief File of class to manage LDAP features
- *
- * Note:
- * LDAP_ESCAPE_FILTER is to escape char array('\\', '*', '(', ')', "\x00")
- * LDAP_ESCAPE_DN is to escape char array('\\', ',', '=', '+', '<', '>', ';', '"', '#')
- */
- /**
- * Class to manage LDAP features
- */
- class Ldap
- {
- /**
- * @var string Error code (or message)
- */
- public $error = '';
- /**
- * @var string[] Array of error strings
- */
- public $errors = array();
- /**
- * Tableau des serveurs (IP addresses ou nom d'hotes)
- */
- public $server = array();
- /**
- * Current connected server
- */
- public $connectedServer;
- /**
- * Base DN (e.g. "dc=foo,dc=com")
- */
- public $dn;
- /**
- * type de serveur, actuellement OpenLdap et Active Directory
- */
- public $serverType;
- /**
- * Version du protocole ldap
- */
- public $ldapProtocolVersion;
- /**
- * Server DN
- */
- public $domain;
- /**
- * User administrateur Ldap
- * Active Directory ne supporte pas les connexions anonymes
- */
- public $searchUser;
- /**
- * Mot de passe de l'administrateur
- * Active Directory ne supporte pas les connexions anonymes
- */
- public $searchPassword;
- /**
- * DN des utilisateurs
- */
- public $people;
- /**
- * DN des groupes
- */
- public $groups;
- /**
- * Code erreur retourne par le serveur Ldap
- */
- public $ldapErrorCode;
- /**
- * Message texte de l'erreur
- */
- public $ldapErrorText;
- //Fetch user
- public $name;
- public $firstname;
- public $login;
- public $phone;
- public $skype;
- public $fax;
- public $mail;
- public $mobile;
- public $uacf;
- public $pwdlastset;
- public $ldapcharset = 'UTF-8'; // LDAP should be UTF-8 encoded
- /**
- * The internal LDAP connection handle
- */
- public $connection;
- /**
- * Result of any connections etc.
- */
- public $result;
- /**
- * No Ldap synchronization
- */
- const SYNCHRO_NONE = 0;
- /**
- * Dolibarr to Ldap synchronization
- */
- const SYNCHRO_DOLIBARR_TO_LDAP = 1;
- /**
- * Ldap to Dolibarr synchronization
- */
- const SYNCHRO_LDAP_TO_DOLIBARR = 2;
- /**
- * Constructor
- */
- public function __construct()
- {
- global $conf;
- // Server
- if (!empty($conf->global->LDAP_SERVER_HOST)) {
- $this->server[] = $conf->global->LDAP_SERVER_HOST;
- }
- if (!empty($conf->global->LDAP_SERVER_HOST_SLAVE)) {
- $this->server[] = $conf->global->LDAP_SERVER_HOST_SLAVE;
- }
- $this->serverPort = getDolGlobalInt('LDAP_SERVER_PORT', 389);
- $this->ldapProtocolVersion = getDolGlobalString('LDAP_SERVER_PROTOCOLVERSION');
- $this->dn = getDolGlobalString('LDAP_SERVER_DN');
- $this->serverType = getDolGlobalString('LDAP_SERVER_TYPE');
- $this->domain = getDolGlobalString('LDAP_SERVER_DN');
- $this->searchUser = getDolGlobalString('LDAP_ADMIN_DN');
- $this->searchPassword = getDolGlobalString('LDAP_ADMIN_PASS');
- $this->people = getDolGlobalString('LDAP_USER_DN');
- $this->groups = getDolGlobalString('LDAP_GROUP_DN');
- $this->filter = getDolGlobalString('LDAP_FILTER_CONNECTION'); // Filter on user
- $this->filtergroup = getDolGlobalString('LDAP_GROUP_FILTER'); // Filter on groups
- $this->filtermember = getDolGlobalString('LDAP_MEMBER_FILTER'); // Filter on member
- // Users
- $this->attr_login = getDolGlobalString('LDAP_FIELD_LOGIN'); //unix
- $this->attr_sambalogin = getDolGlobalString('LDAP_FIELD_LOGIN_SAMBA'); //samba, activedirectory
- $this->attr_name = getDolGlobalString('LDAP_FIELD_NAME');
- $this->attr_firstname = getDolGlobalString('LDAP_FIELD_FIRSTNAME');
- $this->attr_mail = getDolGlobalString('LDAP_FIELD_MAIL');
- $this->attr_phone = getDolGlobalString('LDAP_FIELD_PHONE');
- $this->attr_skype = getDolGlobalString('LDAP_FIELD_SKYPE');
- $this->attr_fax = getDolGlobalString('LDAP_FIELD_FAX');
- $this->attr_mobile = getDolGlobalString('LDAP_FIELD_MOBILE');
- }
- // Connection handling methods -------------------------------------------
- // phpcs:disable PEAR.NamingConventions.ValidFunctionName.ScopeNotCamelCaps
- /**
- * Connect and bind
- * Use this->server, this->serverPort, this->ldapProtocolVersion, this->serverType, this->searchUser, this->searchPassword
- * After return, this->connection and $this->bind are defined
- *
- * @return int <0 if KO, 1 if bind anonymous, 2 if bind auth
- */
- public function connect_bind()
- {
- // phpcs:enable
- global $conf;
- $connected = 0;
- $this->bind = 0;
- $this->error = 0;
- $this->connectedServer = '';
- // Check parameters
- if (count($this->server) == 0 || empty($this->server[0])) {
- $this->error = 'LDAP setup (file conf.php) is not complete';
- dol_syslog(get_class($this)."::connect_bind ".$this->error, LOG_WARNING);
- return -1;
- }
- if (!function_exists("ldap_connect")) {
- $this->error = 'LDAPFunctionsNotAvailableOnPHP';
- dol_syslog(get_class($this)."::connect_bind ".$this->error, LOG_WARNING);
- $return = -1;
- }
- if (empty($this->error)) {
- // Loop on each ldap server
- foreach ($this->server as $host) {
- if ($connected) {
- break;
- }
- if (empty($host)) {
- continue;
- }
- if ($this->serverPing($host, $this->serverPort) === true) {
- $this->connection = ldap_connect($host, $this->serverPort);
- } else {
- if (preg_match('/^ldaps/i', $host)) {
- // With host = ldaps://server, the serverPing to ssl://server sometimes fails, even if the ldap_connect succeed, so
- // we test this case and continue in suche a case even if serverPing fails.
- $this->connection = ldap_connect($host, $this->serverPort);
- } else {
- continue;
- }
- }
- if (is_resource($this->connection) || is_object($this->connection)) {
- // Upgrade connexion to TLS, if requested by the configuration
- if (!empty($conf->global->LDAP_SERVER_USE_TLS)) {
- // For test/debug
- //ldap_set_option($this->connection, LDAP_OPT_DEBUG_LEVEL, 7);
- //ldap_set_option($this->connection, LDAP_OPT_PROTOCOL_VERSION, 3);
- //ldap_set_option($this->connection, LDAP_OPT_REFERRALS, 0);
- $resulttls = ldap_start_tls($this->connection);
- if (!$resulttls) {
- dol_syslog(get_class($this)."::connect_bind failed to start tls", LOG_WARNING);
- $this->error = 'ldap_start_tls Failed to start TLS '.ldap_errno($this->connection).' '.ldap_error($this->connection);
- $connected = 0;
- $this->unbind();
- }
- }
- // Execute the ldap_set_option here (after connect and before bind)
- $this->setVersion();
- ldap_set_option($this->connection, LDAP_OPT_SIZELIMIT, 0); // no limit here. should return true.
- if ($this->serverType == "activedirectory") {
- $result = $this->setReferrals();
- dol_syslog(get_class($this)."::connect_bind try bindauth for activedirectory on ".$host." user=".$this->searchUser." password=".preg_replace('/./', '*', $this->searchPassword), LOG_DEBUG);
- $this->result = $this->bindauth($this->searchUser, $this->searchPassword);
- if ($this->result) {
- $this->bind = $this->result;
- $connected = 2;
- break;
- } else {
- $this->error = ldap_errno($this->connection).' '.ldap_error($this->connection);
- }
- } else {
- // Try in auth mode
- if ($this->searchUser && $this->searchPassword) {
- dol_syslog(get_class($this)."::connect_bind try bindauth on ".$host." user=".$this->searchUser." password=".preg_replace('/./', '*', $this->searchPassword), LOG_DEBUG);
- $this->result = $this->bindauth($this->searchUser, $this->searchPassword);
- if ($this->result) {
- $this->bind = $this->result;
- $connected = 2;
- break;
- } else {
- $this->error = ldap_errno($this->connection).' '.ldap_error($this->connection);
- }
- }
- // Try in anonymous
- if (!$this->bind) {
- dol_syslog(get_class($this)."::connect_bind try bind anonymously on ".$host, LOG_DEBUG);
- $result = $this->bind();
- if ($result) {
- $this->bind = $this->result;
- $connected = 1;
- break;
- } else {
- $this->error = ldap_errno($this->connection).' '.ldap_error($this->connection);
- }
- }
- }
- }
- if (!$connected) {
- $this->unbind();
- } else {
- $this->connectedServer = $host;
- }
- }
- }
- if ($connected) {
- $return = $connected;
- dol_syslog(get_class($this)."::connect_bind return=".$return, LOG_DEBUG);
- } else {
- $this->error = 'Failed to connect to LDAP'.($this->error ? ': '.$this->error : '');
- $return = -1;
- dol_syslog(get_class($this)."::connect_bind return=".$return.' - '.$this->error, LOG_WARNING);
- }
- return $return;
- }
- /**
- * Simply closes the connection set up earlier. Returns true if OK, false if there was an error.
- * This method seems a duplicate/alias of unbind().
- *
- * @return boolean true or false
- * @deprecated ldap_close is an alias of ldap_unbind
- * @see unbind()
- */
- public function close()
- {
- $r_type = get_resource_type($this->connection);
- if ($this->connection && ($r_type === "Unknown" || !@ldap_close($this->connection))) {
- return false;
- } else {
- return true;
- }
- }
- /**
- * Anonymously binds to the connection. After this is done,
- * queries and searches can be done - but read-only.
- *
- * @return boolean true or false
- */
- public function bind()
- {
- if (!$this->result = @ldap_bind($this->connection)) {
- $this->ldapErrorCode = ldap_errno($this->connection);
- $this->ldapErrorText = ldap_error($this->connection);
- $this->error = $this->ldapErrorCode." ".$this->ldapErrorText;
- return false;
- } else {
- return true;
- }
- }
- /**
- * Binds as an authenticated user, which usually allows for write
- * access. The FULL dn must be passed. For a directory manager, this is
- * "cn=Directory Manager" under iPlanet. For a user, it will be something
- * like "uid=jbloggs,ou=People,dc=foo,dc=com".
- *
- * @param string $bindDn DN
- * @param string $pass Password
- * @return boolean true or false
- */
- public function bindauth($bindDn, $pass)
- {
- if (!$this->result = @ldap_bind($this->connection, $bindDn, $pass)) {
- $this->ldapErrorCode = ldap_errno($this->connection);
- $this->ldapErrorText = ldap_error($this->connection);
- $this->error = $this->ldapErrorCode." ".$this->ldapErrorText;
- return false;
- } else {
- return true;
- }
- }
- /**
- * Unbind of LDAP server (close connection).
- *
- * @return boolean true or false
- * @see close()
- */
- public function unbind()
- {
- $this->result = true;
- if ($this->connection) {
- $this->result = @ldap_unbind($this->connection);
- }
- if ($this->result) {
- return true;
- } else {
- return false;
- }
- }
- /**
- * Verification de la version du serveur ldap.
- *
- * @return string version
- */
- public function getVersion()
- {
- $version = 0;
- $version = @ldap_get_option($this->connection, LDAP_OPT_PROTOCOL_VERSION, $version);
- return $version;
- }
- /**
- * Change ldap protocol version to use.
- *
- * @return boolean version
- */
- public function setVersion()
- {
- // LDAP_OPT_PROTOCOL_VERSION est une constante qui vaut 17
- $ldapsetversion = ldap_set_option($this->connection, LDAP_OPT_PROTOCOL_VERSION, $this->ldapProtocolVersion);
- return $ldapsetversion;
- }
- /**
- * changement du referrals.
- *
- * @return boolean referrals
- */
- public function setReferrals()
- {
- // LDAP_OPT_REFERRALS est une constante qui vaut ?
- $ldapreferrals = ldap_set_option($this->connection, LDAP_OPT_REFERRALS, 0);
- return $ldapreferrals;
- }
- /**
- * Add a LDAP entry
- * Ldap object connect and bind must have been done
- *
- * @param string $dn DN entry key
- * @param array $info Attributes array
- * @param User $user Objet user that create
- * @return int <0 if KO, >0 if OK
- */
- public function add($dn, $info, $user)
- {
- dol_syslog(get_class($this)."::add dn=".$dn." info=".json_encode($info));
- // Check parameters
- if (!$this->connection) {
- $this->error = "NotConnected";
- return -2;
- }
- if (!$this->bind) {
- $this->error = "NotConnected";
- return -3;
- }
- // Encode to LDAP page code
- $dn = $this->convFromOutputCharset($dn, $this->ldapcharset);
- foreach ($info as $key => $val) {
- if (!is_array($val)) {
- $info[$key] = $this->convFromOutputCharset($val, $this->ldapcharset);
- }
- }
- $this->dump($dn, $info);
- //print_r($info);
- $result = @ldap_add($this->connection, $dn, $info);
- if ($result) {
- dol_syslog(get_class($this)."::add successfull", LOG_DEBUG);
- return 1;
- } else {
- $this->ldapErrorCode = @ldap_errno($this->connection);
- $this->ldapErrorText = @ldap_error($this->connection);
- $this->error = $this->ldapErrorCode." ".$this->ldapErrorText;
- dol_syslog(get_class($this)."::add failed: ".$this->error, LOG_ERR);
- return -1;
- }
- }
- /**
- * Modify a LDAP entry
- * Ldap object connect and bind must have been done
- *
- * @param string $dn DN entry key
- * @param array $info Attributes array
- * @param User $user Objet user that modify
- * @return int <0 if KO, >0 if OK
- */
- public function modify($dn, $info, $user)
- {
- dol_syslog(get_class($this)."::modify dn=".$dn." info=".join(',', $info));
- // Check parameters
- if (!$this->connection) {
- $this->error = "NotConnected";
- return -2;
- }
- if (!$this->bind) {
- $this->error = "NotConnected";
- return -3;
- }
- // Encode to LDAP page code
- $dn = $this->convFromOutputCharset($dn, $this->ldapcharset);
- foreach ($info as $key => $val) {
- if (!is_array($val)) {
- $info[$key] = $this->convFromOutputCharset($val, $this->ldapcharset);
- }
- }
- $this->dump($dn, $info);
- //print_r($info);
- // For better compatibility with Samba4 AD
- if ($this->serverType == "activedirectory") {
- unset($info['cn']); // To avoid error : Operation not allowed on RDN (Code 67)
- // To avoid error : LDAP Error: 53 (Unwilling to perform)
- if (isset($info['unicodePwd'])) {
- $info['unicodePwd'] = mb_convert_encoding("\"".$info['unicodePwd']."\"", "UTF-16LE", "UTF-8");
- }
- }
- $result = @ldap_modify($this->connection, $dn, $info);
- if ($result) {
- dol_syslog(get_class($this)."::modify successfull", LOG_DEBUG);
- return 1;
- } else {
- $this->error = @ldap_error($this->connection);
- dol_syslog(get_class($this)."::modify failed: ".$this->error, LOG_ERR);
- return -1;
- }
- }
- /**
- * Rename a LDAP entry
- * Ldap object connect and bind must have been done
- *
- * @param string $dn Old DN entry key (uid=qqq,ou=xxx,dc=aaa,dc=bbb) (before update)
- * @param string $newrdn New RDN entry key (uid=qqq)
- * @param string $newparent New parent (ou=xxx,dc=aaa,dc=bbb)
- * @param User $user Objet user that modify
- * @param bool $deleteoldrdn If true the old RDN value(s) is removed, else the old RDN value(s) is retained as non-distinguished values of the entry.
- * @return int <0 if KO, >0 if OK
- */
- public function rename($dn, $newrdn, $newparent, $user, $deleteoldrdn = true)
- {
- dol_syslog(get_class($this)."::modify dn=".$dn." newrdn=".$newrdn." newparent=".$newparent." deleteoldrdn=".($deleteoldrdn ? 1 : 0));
- // Check parameters
- if (!$this->connection) {
- $this->error = "NotConnected";
- return -2;
- }
- if (!$this->bind) {
- $this->error = "NotConnected";
- return -3;
- }
- // Encode to LDAP page code
- $dn = $this->convFromOutputCharset($dn, $this->ldapcharset);
- $newrdn = $this->convFromOutputCharset($newrdn, $this->ldapcharset);
- $newparent = $this->convFromOutputCharset($newparent, $this->ldapcharset);
- //print_r($info);
- $result = @ldap_rename($this->connection, $dn, $newrdn, $newparent, $deleteoldrdn);
- if ($result) {
- dol_syslog(get_class($this)."::rename successfull", LOG_DEBUG);
- return 1;
- } else {
- $this->error = @ldap_error($this->connection);
- dol_syslog(get_class($this)."::rename failed: ".$this->error, LOG_ERR);
- return -1;
- }
- }
- /**
- * Modify a LDAP entry (to use if dn != olddn)
- * Ldap object connect and bind must have been done
- *
- * @param string $dn DN entry key
- * @param array $info Attributes array
- * @param User $user Objet user that update
- * @param string $olddn Old DN entry key (before update)
- * @param string $newrdn New RDN entry key (uid=qqq) (for ldap_rename)
- * @param string $newparent New parent (ou=xxx,dc=aaa,dc=bbb) (for ldap_rename)
- * @return int <0 if KO, >0 if OK
- */
- public function update($dn, $info, $user, $olddn, $newrdn = false, $newparent = false)
- {
- dol_syslog(get_class($this)."::update dn=".$dn." olddn=".$olddn);
- // Check parameters
- if (!$this->connection) {
- $this->error = "NotConnected";
- return -2;
- }
- if (!$this->bind) {
- $this->error = "NotConnected";
- return -3;
- }
- if (!$olddn || $olddn != $dn) {
- if (!empty($olddn) && !empty($newrdn) && !empty($newparent) && $this->ldapProtocolVersion === '3') {
- // This function currently only works with LDAPv3
- $result = $this->rename($olddn, $newrdn, $newparent, $user, true);
- $result = $this->modify($dn, $info, $user); // We force "modify" for avoid some fields not modify
- } else {
- // If change we make is rename the key of LDAP record, we create new one and if ok, we delete old one.
- $result = $this->add($dn, $info, $user);
- if ($result > 0 && $olddn && $olddn != $dn) {
- $result = $this->delete($olddn); // If add fails, we do not try to delete old one
- }
- }
- } else {
- //$result = $this->delete($olddn);
- $result = $this->add($dn, $info, $user); // If record has been deleted from LDAP, we recreate it. We ignore error if it already exists.
- $result = $this->modify($dn, $info, $user); // We use add/modify instead of delete/add when olddn is received
- }
- if ($result <= 0) {
- $this->error = ldap_error($this->connection).' (Code '.ldap_errno($this->connection).") ".$this->error;
- dol_syslog(get_class($this)."::update ".$this->error, LOG_ERR);
- //print_r($info);
- return -1;
- } else {
- dol_syslog(get_class($this)."::update done successfully");
- return 1;
- }
- }
- /**
- * Delete a LDAP entry
- * Ldap object connect and bind must have been done
- *
- * @param string $dn DN entry key
- * @return int <0 if KO, >0 if OK
- */
- public function delete($dn)
- {
- dol_syslog(get_class($this)."::delete Delete LDAP entry dn=".$dn);
- // Check parameters
- if (!$this->connection) {
- $this->error = "NotConnected";
- return -2;
- }
- if (!$this->bind) {
- $this->error = "NotConnected";
- return -3;
- }
- // Encode to LDAP page code
- $dn = $this->convFromOutputCharset($dn, $this->ldapcharset);
- $result = @ldap_delete($this->connection, $dn);
- if ($result) {
- return 1;
- }
- return -1;
- }
- // phpcs:disable PEAR.NamingConventions.ValidFunctionName.ScopeNotCamelCaps
- /**
- * Build a LDAP message
- *
- * @param string $dn DN entry key
- * @param array $info Attributes array
- * @return string Content of file
- */
- public function dump_content($dn, $info)
- {
- // phpcs:enable
- $content = '';
- // Create file content
- if (preg_match('/^ldap/', $this->server[0])) {
- $target = "-H ".join(',', $this->server);
- } else {
- $target = "-h ".join(',', $this->server)." -p ".$this->serverPort;
- }
- $content .= "# ldapadd $target -c -v -D ".$this->searchUser." -W -f ldapinput.in\n";
- $content .= "# ldapmodify $target -c -v -D ".$this->searchUser." -W -f ldapinput.in\n";
- $content .= "# ldapdelete $target -c -v -D ".$this->searchUser." -W -f ldapinput.in\n";
- if (in_array('localhost', $this->server)) {
- $content .= "# If commands fails to connect, try without -h and -p\n";
- }
- $content .= "dn: ".$dn."\n";
- foreach ($info as $key => $value) {
- if (!is_array($value)) {
- $content .= "$key: $value\n";
- } else {
- foreach ($value as $valuevalue) {
- $content .= "$key: $valuevalue\n";
- }
- }
- }
- return $content;
- }
- /**
- * Dump a LDAP message to ldapinput.in file
- *
- * @param string $dn DN entry key
- * @param array $info Attributes array
- * @return int <0 if KO, >0 if OK
- */
- public function dump($dn, $info)
- {
- global $conf;
- // Create content
- $content = $this->dump_content($dn, $info);
- //Create file
- $result = dol_mkdir($conf->ldap->dir_temp);
- $outputfile = $conf->ldap->dir_temp.'/ldapinput.in';
- $fp = fopen($outputfile, "w");
- if ($fp) {
- fputs($fp, $content);
- fclose($fp);
- if (!empty($conf->global->MAIN_UMASK)) {
- @chmod($outputfile, octdec($conf->global->MAIN_UMASK));
- }
- return 1;
- } else {
- return -1;
- }
- }
- /**
- * Ping a server before ldap_connect for avoid waiting
- *
- * @param string $host Server host or address
- * @param int $port Server port (default 389)
- * @param int $timeout Timeout in second (default 1s)
- * @return boolean true or false
- */
- public function serverPing($host, $port = 389, $timeout = 1)
- {
- $regs = array();
- if (preg_match('/^ldaps:\/\/([^\/]+)\/?$/', $host, $regs)) {
- // Replace ldaps:// by ssl://
- $host = 'ssl://'.$regs[1];
- } elseif (preg_match('/^ldap:\/\/([^\/]+)\/?$/', $host, $regs)) {
- // Remove ldap://
- $host = $regs[1];
- }
- //var_dump($newhostforstream); var_dump($host); var_dump($port);
- //$host = 'ssl://ldap.test.local:636';
- //$port = 636;
- $errno = $errstr = 0;
- /*
- if ($methodtochecktcpconnect == 'socket') {
- Try to use socket_create() method.
- Method that use stream_context_create() works only on registered listed in stream stream_get_wrappers(): http, https, ftp, ...
- }
- */
- // Use the method fsockopen to test tcp connect. No way to ignore ssl certificate errors with this method !
- $op = @fsockopen($host, $port, $errno, $errstr, $timeout);
- //var_dump($op);
- if (!$op) {
- return false; //DC is N/A
- } else {
- fclose($op); //explicitly close open socket connection
- return true; //DC is up & running, we can safely connect with ldap_connect
- }
- }
- // Attribute methods -----------------------------------------------------
- /**
- * Add a LDAP attribute in entry
- * Ldap object connect and bind must have been done
- *
- * @param string $dn DN entry key
- * @param array $info Attributes array
- * @param User $user Objet user that create
- * @return int <0 if KO, >0 if OK
- */
- public function addAttribute($dn, $info, $user)
- {
- dol_syslog(get_class($this)."::addAttribute dn=".$dn." info=".join(',', $info));
- // Check parameters
- if (!$this->connection) {
- $this->error = "NotConnected";
- return -2;
- }
- if (!$this->bind) {
- $this->error = "NotConnected";
- return -3;
- }
- // Encode to LDAP page code
- $dn = $this->convFromOutputCharset($dn, $this->ldapcharset);
- foreach ($info as $key => $val) {
- if (!is_array($val)) {
- $info[$key] = $this->convFromOutputCharset($val, $this->ldapcharset);
- }
- }
- $this->dump($dn, $info);
- //print_r($info);
- $result = @ldap_mod_add($this->connection, $dn, $info);
- if ($result) {
- dol_syslog(get_class($this)."::add_attribute successfull", LOG_DEBUG);
- return 1;
- } else {
- $this->error = @ldap_error($this->connection);
- dol_syslog(get_class($this)."::add_attribute failed: ".$this->error, LOG_ERR);
- return -1;
- }
- }
- /**
- * Update a LDAP attribute in entry
- * Ldap object connect and bind must have been done
- *
- * @param string $dn DN entry key
- * @param array $info Attributes array
- * @param User $user Objet user that create
- * @return int <0 if KO, >0 if OK
- */
- public function updateAttribute($dn, $info, $user)
- {
- dol_syslog(get_class($this)."::updateAttribute dn=".$dn." info=".join(',', $info));
- // Check parameters
- if (!$this->connection) {
- $this->error = "NotConnected";
- return -2;
- }
- if (!$this->bind) {
- $this->error = "NotConnected";
- return -3;
- }
- // Encode to LDAP page code
- $dn = $this->convFromOutputCharset($dn, $this->ldapcharset);
- foreach ($info as $key => $val) {
- if (!is_array($val)) {
- $info[$key] = $this->convFromOutputCharset($val, $this->ldapcharset);
- }
- }
- $this->dump($dn, $info);
- //print_r($info);
- $result = @ldap_mod_replace($this->connection, $dn, $info);
- if ($result) {
- dol_syslog(get_class($this)."::updateAttribute successfull", LOG_DEBUG);
- return 1;
- } else {
- $this->error = @ldap_error($this->connection);
- dol_syslog(get_class($this)."::updateAttribute failed: ".$this->error, LOG_ERR);
- return -1;
- }
- }
- /**
- * Delete a LDAP attribute in entry
- * Ldap object connect and bind must have been done
- *
- * @param string $dn DN entry key
- * @param array $info Attributes array
- * @param User $user Objet user that create
- * @return int <0 if KO, >0 if OK
- */
- public function deleteAttribute($dn, $info, $user)
- {
- dol_syslog(get_class($this)."::deleteAttribute dn=".$dn." info=".join(',', $info));
- // Check parameters
- if (!$this->connection) {
- $this->error = "NotConnected";
- return -2;
- }
- if (!$this->bind) {
- $this->error = "NotConnected";
- return -3;
- }
- // Encode to LDAP page code
- $dn = $this->convFromOutputCharset($dn, $this->ldapcharset);
- foreach ($info as $key => $val) {
- if (!is_array($val)) {
- $info[$key] = $this->convFromOutputCharset($val, $this->ldapcharset);
- }
- }
- $this->dump($dn, $info);
- //print_r($info);
- $result = @ldap_mod_del($this->connection, $dn, $info);
- if ($result) {
- dol_syslog(get_class($this)."::deleteAttribute successfull", LOG_DEBUG);
- return 1;
- } else {
- $this->error = @ldap_error($this->connection);
- dol_syslog(get_class($this)."::deleteAttribute failed: ".$this->error, LOG_ERR);
- return -1;
- }
- }
- /**
- * Returns an array containing attributes and values for first record
- *
- * @param string $dn DN entry key
- * @param string $filter Filter
- * @return int|array <0 or false if KO, array if OK
- */
- public function getAttribute($dn, $filter)
- {
- // Check parameters
- if (!$this->connection) {
- $this->error = "NotConnected";
- return -2;
- }
- if (!$this->bind) {
- $this->error = "NotConnected";
- return -3;
- }
- $search = @ldap_search($this->connection, $dn, $filter);
- // Only one entry should ever be returned
- $entry = @ldap_first_entry($this->connection, $search);
- if (!$entry) {
- $this->ldapErrorCode = -1;
- $this->ldapErrorText = "Couldn't find entry";
- return 0; // Couldn't find entry...
- }
- // Get values
- if (!($values = ldap_get_attributes($this->connection, $entry))) {
- $this->ldapErrorCode = ldap_errno($this->connection);
- $this->ldapErrorText = ldap_error($this->connection);
- return 0; // No matching attributes
- }
- // Return an array containing the attributes.
- return $values;
- }
- /**
- * Returns an array containing values for an attribute and for first record matching filterrecord
- *
- * @param string $filterrecord Record
- * @param string $attribute Attributes
- * @return void
- */
- public function getAttributeValues($filterrecord, $attribute)
- {
- $attributes = array();
- $attributes[0] = $attribute;
- // We need to search for this user in order to get their entry.
- $this->result = @ldap_search($this->connection, $this->people, $filterrecord, $attributes);
- // Pourquoi cette ligne ?
- //$info = ldap_get_entries($this->connection, $this->result);
- // Only one entry should ever be returned (no user will have the same uid)
- $entry = ldap_first_entry($this->connection, $this->result);
- if (!$entry) {
- $this->ldapErrorCode = -1;
- $this->ldapErrorText = "Couldn't find user";
- return false; // Couldn't find the user...
- }
- // Get values
- if (!$values = @ldap_get_values($this->connection, $entry, $attribute)) {
- $this->ldapErrorCode = ldap_errno($this->connection);
- $this->ldapErrorText = ldap_error($this->connection);
- return false; // No matching attributes
- }
- // Return an array containing the attributes.
- return $values;
- }
- /**
- * Returns an array containing a details or list of LDAP record(s)
- * ldapsearch -LLLx -hlocalhost -Dcn=admin,dc=parinux,dc=org -w password -b "ou=adherents,ou=people,dc=parinux,dc=org" userPassword
- *
- * @param string $search Value of field to search, '*' for all. Not used if $activefilter is set.
- * @param string $userDn DN (Ex: ou=adherents,ou=people,dc=parinux,dc=org)
- * @param string $useridentifier Name of key field (Ex: uid)
- * @param array $attributeArray Array of fields required. Note this array must also contains field $useridentifier (Ex: sn,userPassword)
- * @param int $activefilter '1' or 'user'=use field this->filter as filter instead of parameter $search, 'group'=use field this->filtergroup as filter, 'member'=use field this->filtermember as filter
- * @param array $attributeAsArray Array of fields wanted as an array not a string
- * @return array Array of [id_record][ldap_field]=value
- */
- public function getRecords($search, $userDn, $useridentifier, $attributeArray, $activefilter = 0, $attributeAsArray = array())
- {
- $fulllist = array();
- dol_syslog(get_class($this)."::getRecords search=".$search." userDn=".$userDn." useridentifier=".$useridentifier." attributeArray=array(".join(',', $attributeArray).") activefilter=".$activefilter);
- // if the directory is AD, then bind first with the search user first
- if ($this->serverType == "activedirectory") {
- $this->bindauth($this->searchUser, $this->searchPassword);
- dol_syslog(get_class($this)."::bindauth serverType=activedirectory searchUser=".$this->searchUser);
- }
- // Define filter
- if (!empty($activefilter)) { // Use a predefined trusted filter (defined into setup by admin).
- if (((string) $activefilter == '1' || (string) $activefilter == 'user') && $this->filter) {
- $filter = '('.$this->filter.')';
- } elseif (((string) $activefilter == 'group') && $this->filtergroup ) {
- $filter = '('.$this->filtergroup.')';
- } elseif (((string) $activefilter == 'member') && $this->filter) {
- $filter = '('.$this->filtermember.')';
- } else {
- // If this->filter/this->filtergroup is empty, make fiter on * (all)
- $filter = '('.ldap_escape($useridentifier, '', LDAP_ESCAPE_FILTER).'=*)';
- }
- } else { // Use a filter forged using the $search value
- $filter = '('.ldap_escape($useridentifier, '', LDAP_ESCAPE_FILTER).'='.ldap_escape($search, '', LDAP_ESCAPE_FILTER).')';
- }
- if (is_array($attributeArray)) {
- // Return list with required fields
- $attributeArray = array_values($attributeArray); // This is to force to have index reordered from 0 (not make ldap_search fails)
- dol_syslog(get_class($this)."::getRecords connection=".$this->connection." userDn=".$userDn." filter=".$filter." attributeArray=(".join(',', $attributeArray).")");
- //var_dump($attributeArray);
- $this->result = @ldap_search($this->connection, $userDn, $filter, $attributeArray);
- } else {
- // Return list with fields selected by default
- dol_syslog(get_class($this)."::getRecords connection=".$this->connection." userDn=".$userDn." filter=".$filter);
- $this->result = @ldap_search($this->connection, $userDn, $filter);
- }
- if (!$this->result) {
- $this->error = 'LDAP search failed: '.ldap_errno($this->connection)." ".ldap_error($this->connection);
- return -1;
- }
- $info = @ldap_get_entries($this->connection, $this->result);
- // Warning: Dans info, les noms d'attributs sont en minuscule meme si passe
- // a ldap_search en majuscule !!!
- //print_r($info);
- for ($i = 0; $i < $info["count"]; $i++) {
- $recordid = $this->convToOutputCharset($info[$i][$useridentifier][0], $this->ldapcharset);
- if ($recordid) {
- //print "Found record with key $useridentifier=".$recordid."<br>\n";
- $fulllist[$recordid][$useridentifier] = $recordid;
- // Add to the array for each attribute in my list
- $num = count($attributeArray);
- for ($j = 0; $j < $num; $j++) {
- $keyattributelower = strtolower($attributeArray[$j]);
- //print " Param ".$attributeArray[$j]."=".$info[$i][$keyattributelower][0]."<br>\n";
- //permet de recuperer le SID avec Active Directory
- if ($this->serverType == "activedirectory" && $keyattributelower == "objectsid") {
- $objectsid = $this->getObjectSid($recordid);
- $fulllist[$recordid][$attributeArray[$j]] = $objectsid;
- } else {
- if (in_array($attributeArray[$j], $attributeAsArray) && is_array($info[$i][$keyattributelower])) {
- $valueTab = array();
- foreach ($info[$i][$keyattributelower] as $key => $value) {
- $valueTab[$key] = $this->convToOutputCharset($value, $this->ldapcharset);
- }
- $fulllist[$recordid][$attributeArray[$j]] = $valueTab;
- } else {
- $fulllist[$recordid][$attributeArray[$j]] = $this->convToOutputCharset($info[$i][$keyattributelower][0], $this->ldapcharset);
- }
- }
- }
- }
- }
- asort($fulllist);
- return $fulllist;
- }
- /**
- * Converts a little-endian hex-number to one, that 'hexdec' can convert
- * Required by Active Directory
- *
- * @param string $hex Hex value
- * @return string Little endian
- */
- public function littleEndian($hex)
- {
- $result = '';
- for ($x = dol_strlen($hex) - 2; $x >= 0; $x = $x - 2) {
- $result .= substr($hex, $x, 2);
- }
- return $result;
- }
- /**
- * Recupere le SID de l'utilisateur
- * Required by Active Directory
- *
- * @param string $ldapUser Login de l'utilisateur
- * @return string Sid
- */
- public function getObjectSid($ldapUser)
- {
- $criteria = '('.$this->getUserIdentifier().'='.$ldapUser.')';
- $justthese = array("objectsid");
- // if the directory is AD, then bind first with the search user first
- if ($this->serverType == "activedirectory") {
- $this->bindauth($this->searchUser, $this->searchPassword);
- }
- $i = 0;
- $searchDN = $this->people;
- while ($i <= 2) {
- $ldapSearchResult = @ldap_search($this->connection, $searchDN, $criteria, $justthese);
- if (!$ldapSearchResult) {
- $this->error = ldap_errno($this->connection)." ".ldap_error($this->connection);
- return -1;
- }
- $entry = ldap_first_entry($this->connection, $ldapSearchResult);
- if (!$entry) {
- // Si pas de resultat on cherche dans le domaine
- $searchDN = $this->domain;
- $i++;
- } else {
- $i++;
- $i++;
- }
- }
- if ($entry) {
- $ldapBinary = ldap_get_values_len($this->connection, $entry, "objectsid");
- $SIDText = $this->binSIDtoText($ldapBinary[0]);
- return $SIDText;
- } else {
- $this->error = ldap_errno($this->connection)." ".ldap_error($this->connection);
- return '?';
- }
- }
- /**
- * Returns the textual SID
- * Indispensable pour Active Directory
- *
- * @param string $binsid Binary SID
- * @return string Textual SID
- */
- public function binSIDtoText($binsid)
- {
- $hex_sid = bin2hex($binsid);
- $rev = hexdec(substr($hex_sid, 0, 2)); // Get revision-part of SID
- $subcount = hexdec(substr($hex_sid, 2, 2)); // Get count of sub-auth entries
- $auth = hexdec(substr($hex_sid, 4, 12)); // SECURITY_NT_AUTHORITY
- $result = "$rev-$auth";
- for ($x = 0; $x < $subcount; $x++) {
- $result .= "-".hexdec($this->littleEndian(substr($hex_sid, 16 + ($x * 8), 8))); // get all SECURITY_NT_AUTHORITY
- }
- return $result;
- }
- /**
- * Fonction de recherche avec filtre
- * this->connection doit etre defini donc la methode bind ou bindauth doit avoir deja ete appelee
- * Ne pas utiliser pour recherche d'une liste donnee de proprietes
- * car conflit majuscule-minuscule. A n'utiliser que pour les pages
- * 'Fiche LDAP' qui affiche champ lisibles par defaut.
- *
- * @param string $checkDn DN de recherche (Ex: ou=users,cn=my-domain,cn=com)
- * @param string $filter Search filter (ex: (sn=nom_personne) )
- * @return array|int Array with answers (key lowercased - value)
- */
- public function search($checkDn, $filter)
- {
- dol_syslog(get_class($this)."::search checkDn=".$checkDn." filter=".$filter);
- $checkDn = $this->convFromOutputCharset($checkDn, $this->ldapcharset);
- $filter = $this->convFromOutputCharset($filter, $this->ldapcharset);
- // if the directory is AD, then bind first with the search user first
- if ($this->serverType == "activedirectory") {
- $this->bindauth($this->searchUser, $this->searchPassword);
- }
- $this->result = @ldap_search($this->connection, $checkDn, $filter);
- $result = @ldap_get_entries($this->connection, $this->result);
- if (!$result) {
- $this->error = ldap_errno($this->connection)." ".ldap_error($this->connection);
- return -1;
- } else {
- ldap_free_result($this->result);
- return $result;
- }
- }
- /**
- * Load all attribute of a LDAP user
- *
- * @param User $user User to search for. Not used if a filter is provided.
- * @param string $filter Filter for search. Must start with &.
- * Examples: &(objectClass=inetOrgPerson) &(objectClass=user)(objectCategory=person) &(isMemberOf=cn=Sales,ou=Groups,dc=opencsi,dc=com)
- * @return int >0 if OK, <0 if KO
- */
- public function fetch($user, $filter)
- {
- // Perform the search and get the entry handles
- // if the directory is AD, then bind first with the search user first
- if ($this->serverType == "activedirectory") {
- $this->bindauth($this->searchUser, $this->searchPassword);
- }
- $searchDN = $this->people; // TODO Why searching in people then domain ?
- $result = '';
- $i = 0;
- while ($i <= 2) {
- dol_syslog(get_class($this)."::fetch search with searchDN=".$searchDN." filter=".$filter);
- $this->result = @ldap_search($this->connection, $searchDN, $filter);
- if ($this->result) {
- $result = @ldap_get_entries($this->connection, $this->result);
- if ($result['count'] > 0) {
- dol_syslog('Ldap::fetch search found '.$result['count'].' records');
- } else {
- dol_syslog('Ldap::fetch search returns but found no records');
- }
- //var_dump($result);exit;
- } else {
- $this->error = ldap_errno($this->connection)." ".ldap_error($this->connection);
- dol_syslog(get_class($this)."::fetch search fails");
- return -1;
- }
- if (!$result) {
- // Si pas de resultat on cherche dans le domaine
- $searchDN = $this->domain;
- $i++;
- } else {
- break;
- }
- }
- if (!$result) {
- $this->error = ldap_errno($this->connection)." ".ldap_error($this->connection);
- return -1;
- } else {
- $this->name = $this->convToOutputCharset($result[0][$this->attr_name][0], $this->ldapcharset);
- $this->firstname = $this->convToOutputCharset($result[0][$this->attr_firstname][0], $this->ldapcharset);
- $this->login = $this->convToOutputCharset($result[0][$this->attr_login][0], $this->ldapcharset);
- $this->phone = $this->convToOutputCharset($result[0][$this->attr_phone][0], $this->ldapcharset);
- $this->skype = $this->convToOutputCharset($result[0][$this->attr_skype][0], $this->ldapcharset);
- $this->fax = $this->convToOutputCharset($result[0][$this->attr_fax][0], $this->ldapcharset);
- $this->mail = $this->convToOutputCharset($result[0][$this->attr_mail][0], $this->ldapcharset);
- $this->mobile = $this->convToOutputCharset($result[0][$this->attr_mobile][0], $this->ldapcharset);
- $this->uacf = $this->parseUACF($this->convToOutputCharset($result[0]["useraccountcontrol"][0], $this->ldapcharset));
- if (isset($result[0]["pwdlastset"][0])) { // If expiration on password exists
- $this->pwdlastset = ($result[0]["pwdlastset"][0] != 0) ? $this->convert_time($this->convToOutputCharset($result[0]["pwdlastset"][0], $this->ldapcharset)) : 0;
- } else {
- $this->pwdlastset = -1;
- }
- if (!$this->name && !$this->login) {
- $this->pwdlastset = -1;
- }
- $this->badpwdtime = $this->convert_time($this->convToOutputCharset($result[0]["badpasswordtime"][0], $this->ldapcharset));
- // FQDN domain
- $domain = str_replace('dc=', '', $this->domain);
- $domain = str_replace(',', '.', $domain);
- $this->domainFQDN = $domain;
- // Set ldapUserDn (each user can have a different dn)
- //var_dump($result[0]);exit;
- $this->ldapUserDN = $result[0]['dn'];
- ldap_free_result($this->result);
- return 1;
- }
- }
- // helper methods
- /**
- * Returns the correct user identifier to use, based on the ldap server type
- *
- * @return string Login
- */
- public function getUserIdentifier()
- {
- if ($this->serverType == "activedirectory") {
- return $this->attr_sambalogin;
- } else {
- return $this->attr_login;
- }
- }
- /**
- * UserAccountControl Flgs to more human understandable form...
- *
- * @param string $uacf UACF
- * @return void
- */
- public function parseUACF($uacf)
- {
- //All flags array
- $flags = array(
- "TRUSTED_TO_AUTH_FOR_DELEGATION" => 16777216,
- "PASSWORD_EXPIRED" => 8388608,
- "DONT_REQ_PREAUTH" => 4194304,
- "USE_DES_KEY_ONLY" => 2097152,
- "NOT_DELEGATED" => 1048576,
- "TRUSTED_FOR_DELEGATION" => 524288,
- "SMARTCARD_REQUIRED" => 262144,
- "MNS_LOGON_ACCOUNT" => 131072,
- "DONT_EXPIRE_PASSWORD" => 65536,
- "SERVER_TRUST_ACCOUNT" => 8192,
- "WORKSTATION_TRUST_ACCOUNT" => 4096,
- "INTERDOMAIN_TRUST_ACCOUNT" => 2048,
- "NORMAL_ACCOUNT" => 512,
- "TEMP_DUPLICATE_ACCOUNT" => 256,
- "ENCRYPTED_TEXT_PWD_ALLOWED" => 128,
- "PASSWD_CANT_CHANGE" => 64,
- "PASSWD_NOTREQD" => 32,
- "LOCKOUT" => 16,
- "HOMEDIR_REQUIRED" => 8,
- "ACCOUNTDISABLE" => 2,
- "SCRIPT" => 1
- );
- //Parse flags to text
- $retval = array();
- //while (list($flag, $val) = each($flags)) {
- foreach ($flags as $flag => $val) {
- if ($uacf >= $val) {
- $uacf -= $val;
- $retval[$val] = $flag;
- }
- }
- //Return human friendly flags
- return($retval);
- }
- /**
- * SamAccountType value to text
- *
- * @param string $samtype SamType
- * @return string Sam string
- */
- public function parseSAT($samtype)
- {
- $stypes = array(
- 805306368 => "NORMAL_ACCOUNT",
- 805306369 => "WORKSTATION_TRUST",
- 805306370 => "INTERDOMAIN_TRUST",
- 268435456 => "SECURITY_GLOBAL_GROUP",
- 268435457 => "DISTRIBUTION_GROUP",
- 536870912 => "SECURITY_LOCAL_GROUP",
- 536870913 => "DISTRIBUTION_LOCAL_GROUP"
- );
- $retval = "";
- while (list($sat, $val) = each($stypes)) {
- if ($samtype == $sat) {
- $retval = $val;
- break;
- }
- }
- if (empty($retval)) {
- $retval = "UNKNOWN_TYPE_".$samtype;
- }
- return($retval);
- }
- // phpcs:disable PEAR.NamingConventions.ValidFunctionName.ScopeNotCamelCaps
- /**
- * Convertit le temps ActiveDirectory en Unix timestamp
- *
- * @param string $value AD time to convert
- * @return integer Unix timestamp
- */
- public function convert_time($value)
- {
- // phpcs:enable
- $dateLargeInt = $value; // nano secondes depuis 1601 !!!!
- $secsAfterADEpoch = $dateLargeInt / (10000000); // secondes depuis le 1 jan 1601
- $ADToUnixConvertor = ((1970 - 1601) * 365.242190) * 86400; // UNIX start date - AD start date * jours * secondes
- $unixTimeStamp = intval($secsAfterADEpoch - $ADToUnixConvertor); // Unix time stamp
- return $unixTimeStamp;
- }
- /**
- * Convert a string into output/memory charset
- *
- * @param string $str String to convert
- * @param string $pagecodefrom Page code of src string
- * @return string Converted string
- */
- private function convToOutputCharset($str, $pagecodefrom = 'UTF-8')
- {
- global $conf;
- if ($pagecodefrom == 'ISO-8859-1' && $conf->file->character_set_client == 'UTF-8') {
- $str = utf8_encode($str);
- }
- if ($pagecodefrom == 'UTF-8' && $conf->file->character_set_client == 'ISO-8859-1') {
- $str = utf8_decode($str);
- }
- return $str;
- }
- /**
- * Convert a string from output/memory charset
- *
- * @param string $str String to convert
- * @param string $pagecodeto Page code for result string
- * @return string Converted string
- */
- public function convFromOutputCharset($str, $pagecodeto = 'UTF-8')
- {
- global $conf;
- if ($pagecodeto == 'ISO-8859-1' && $conf->file->character_set_client == 'UTF-8') {
- $str = utf8_decode($str);
- }
- if ($pagecodeto == 'UTF-8' && $conf->file->character_set_client == 'ISO-8859-1') {
- $str = utf8_encode($str);
- }
- return $str;
- }
- /**
- * Return available value of group GID
- *
- * @param string $keygroup Key of group
- * @return int gid number
- */
- public function getNextGroupGid($keygroup = 'LDAP_KEY_GROUPS')
- {
- global $conf;
- if (empty($keygroup)) {
- $keygroup = 'LDAP_KEY_GROUPS';
- }
- $search = '('.$conf->global->$keygroup.'=*)';
- $result = $this->search($this->groups, $search);
- if ($result) {
- $c = $result['count'];
- $gids = array();
- for ($i = 0; $i < $c; $i++) {
- $gids[] = $result[$i]['gidnumber'][0];
- }
- rsort($gids);
- return $gids[0] + 1;
- }
- return 0;
- }
- }
|