Projet

Général

Profil

Paste
Télécharger (70,4 ko) Statistiques
| Branche: | Révision:

root / drupal7 / sites / all / modules / ldap / ldap_servers / LdapServer.class.php @ 91af538d

1 85ad3d82 Assos Assos
<?php
2
3
/**
4
 * @file
5
 * Defines server classes and related functions.
6
 */
7
8 dd54aff9 Assos Assos
/**
9 32700c57 Assos Assos
 * TODO check if this already exists or find a better place for this function.
10 dd54aff9 Assos Assos
 *
11
 * Formats a ldap-entry ready to be printed on console.
12 32700c57 Assos Assos
 * TODO describe preconditions for ldap_entry.
13 dd54aff9 Assos Assos
 */
14
function pretty_print_ldap_entry($ldap_entry) {
15 32700c57 Assos Assos
  $m = [];
16 bc175c27 Assos Assos
  for ($i = 0; $i < $ldap_entry['count']; $i++) {
17
    $k = $ldap_entry[$i];
18
    $v = $ldap_entry[$k];
19 32700c57 Assos Assos
    if (is_array($v)) {
20
      $m2 = [];
21 bc175c27 Assos Assos
      $max = $v['count'] > 3 ? 3 : $v['count'];
22
      for ($j = 0; $j < $max; $j++) {
23 32700c57 Assos Assos
        $m2[] = $v[$j];
24 dd54aff9 Assos Assos
      }
25 32700c57 Assos Assos
      $v = "(" . join(", ", $m2) . ")";
26 dd54aff9 Assos Assos
    }
27
    $m[] = $k . ": " . $v;
28
  }
29
  return join(", ", $m);
30
}
31
32 85ad3d82 Assos Assos
/**
33 32700c57 Assos Assos
 * LDAP Server Class.
34 85ad3d82 Assos Assos
 *
35 32700c57 Assos Assos
 * This class is used to create, work with, and eventually destroy ldap_server
36 85ad3d82 Assos Assos
 * objects.
37
 *
38
 * @todo make bindpw protected
39
 */
40
class LdapServer {
41
42
  const LDAP_CONNECT_ERROR = 0x5b;
43
  const LDAP_SUCCESS = 0x00;
44
  const LDAP_OPERATIONS_ERROR = 0x01;
45
  const LDAP_PROTOCOL_ERROR = 0x02;
46
47
  public $sid;
48
  public $numericSid;
49
  public $name;
50
  public $status;
51
  public $ldap_type;
52
  public $address;
53
  public $port = 389;
54
  public $tls = FALSE;
55
  public $followrefs = FALSE;
56
  public $bind_method = 0;
57 32700c57 Assos Assos
  public $basedn = [];
58
59
  /**
60
   * Default to an anonymous bind.
61
   */
62
  public $binddn = FALSE;
63
64
  /**
65
   * Default to an anonymous bind.
66
   */
67
  public $bindpw = FALSE;
68
69 85ad3d82 Assos Assos
  public $user_dn_expression;
70
  public $user_attr;
71 32700c57 Assos Assos
72
  /**
73
   * Lowercase.
74
   */
75
  public $account_name_attr;
76
77
  /**
78
   * Lowercase.
79
   */
80
  public $mail_attr;
81 85ad3d82 Assos Assos
  public $mail_template;
82
  public $picture_attr;
83 32700c57 Assos Assos
84
  /**
85
   * Lowercase.
86
   */
87
  public $unique_persistent_attr;
88 85ad3d82 Assos Assos
  public $unique_persistent_attr_binary = FALSE;
89
  public $ldapToDrupalUserPhp;
90
  public $testingDrupalUsername;
91
  public $testingDrupalUserDn;
92
  public $detailed_watchdog_log;
93
  public $editPath;
94 32700c57 Assos Assos
95
  /**
96
   * Can this server be queried without user credentials provided?
97
   */
98
  public $queriableWithoutUserCredentials = FALSE;
99
100
  /**
101
   * Array of attributes needed keyed on $op such as 'user_update'.
102
   */
103
  public $userAttributeNeededCache = [];
104 85ad3d82 Assos Assos
105
  public $groupFunctionalityUnused = 0;
106
  public $groupObjectClass;
107 32700c57 Assos Assos
108
  /**
109
   * 1 | 0.
110
   */
111
  public $groupNested = 0;
112 85ad3d82 Assos Assos
  public $groupDeriveFromDn = FALSE;
113
114 32700c57 Assos Assos
  /**
115
   * Lowercase.
116
   */
117
  public $groupDeriveFromDnAttr = NULL;
118
119
  /**
120
   * Does a user attribute containing groups exist?
121
   */
122
  public $groupUserMembershipsAttrExists = FALSE;
123
124
  /**
125
   * Lowercase name of user attribute containing groups.
126
   */
127
  public $groupUserMembershipsAttr = NULL;
128
  /**
129
   * User attribute containing memberships is configured enough to use.
130
   */
131
  public $groupUserMembershipsConfigured = FALSE;
132
133
  /**
134
   * Lowercase // members, uniquemember, memberUid.
135
   */
136
  public $groupMembershipsAttr = NULL;
137
138
139
  /**
140
   * Lowercase // dn, cn, etc contained in groupMembershipsAttr.
141
   */
142
  public $groupMembershipsAttrMatchingUserAttr = NULL;
143
144
  /**
145
   * Are groupMembershipsAttrMatchingUserAttr and
146
   * groupGroupEntryMembershipsConfigured populated.
147
   */
148
  public $groupGroupEntryMembershipsConfigured = FALSE;
149 85ad3d82 Assos Assos
150
  public $groupTestGroupDn = NULL;
151
  public $groupTestGroupDnWriteable = NULL;
152
153 32700c57 Assos Assos
  private $group_properties = [
154
    'groupObjectClass',
155
    'groupNested',
156
    'groupDeriveFromDn',
157
    'groupDeriveFromDnAttr',
158
    'groupUserMembershipsAttrExists',
159
    'groupUserMembershipsAttr',
160
    'groupMembershipsAttrMatchingUserAttr',
161
    'groupTestGroupDn',
162
    'groupTestGroupDnWriteable',
163
  ];
164
165
  public $paginationEnabled = FALSE;
166 85ad3d82 Assos Assos
  public $searchPagination = FALSE;
167
  public $searchPageSize = 1000;
168
  public $searchPageStart = 0;
169
  public $searchPageEnd = NULL;
170
171
  public $inDatabase = FALSE;
172
  public $connection;
173
174 bc175c27 Assos Assos
  /**
175 32700c57 Assos Assos
   * Direct mapping of db to object properties.
176 bc175c27 Assos Assos
   *
177
   * @return array
178
   */
179 85ad3d82 Assos Assos
  public static function field_to_properties_map() {
180 32700c57 Assos Assos
    return [
181
      'sid' => 'sid',
182
      'numeric_sid' => 'numericSid',
183
      'name'  => 'name' ,
184
      'status'  => 'status',
185
      'ldap_type'  => 'ldap_type',
186
      'address'  => 'address',
187
      'port'  => 'port',
188
      'tls'  => 'tls',
189
      'followrefs'  => 'followrefs',
190
      'bind_method' => 'bind_method',
191
      'basedn'  => 'basedn',
192
      'binddn'  => 'binddn',
193
      'user_dn_expression' => 'user_dn_expression',
194
      'user_attr'  => 'user_attr',
195
      'account_name_attr'  => 'account_name_attr',
196
      'mail_attr'  => 'mail_attr',
197
      'mail_template'  => 'mail_template',
198
      'picture_attr'  => 'picture_attr',
199
      'unique_persistent_attr' => 'unique_persistent_attr',
200
      'unique_persistent_attr_binary' => 'unique_persistent_attr_binary',
201
      'ldap_to_drupal_user'  => 'ldapToDrupalUserPhp',
202
      'testing_drupal_username'  => 'testingDrupalUsername',
203
      'testing_drupal_user_dn'  => 'testingDrupalUserDn',
204
205
      'grp_unused' => 'groupFunctionalityUnused',
206
      'grp_object_cat' => 'groupObjectClass',
207
      'grp_nested' => 'groupNested',
208
      'grp_user_memb_attr_exists' => 'groupUserMembershipsAttrExists',
209
      'grp_user_memb_attr' => 'groupUserMembershipsAttr',
210
      'grp_memb_attr' => 'groupMembershipsAttr',
211
      'grp_memb_attr_match_user_attr' => 'groupMembershipsAttrMatchingUserAttr',
212
      'grp_derive_from_dn' => 'groupDeriveFromDn',
213
      'grp_derive_from_dn_attr' => 'groupDeriveFromDnAttr',
214
      'grp_test_grp_dn' => 'groupTestGroupDn',
215
      'grp_test_grp_dn_writeable' => 'groupTestGroupDnWriteable',
216
217
      'search_pagination' => 'searchPagination',
218
      'search_page_size' => 'searchPageSize',
219 85ad3d82 Assos Assos
220 32700c57 Assos Assos
    ];
221 85ad3d82 Assos Assos
222
  }
223
224
  /**
225 32700c57 Assos Assos
   * Constructor Method.
226 bc175c27 Assos Assos
   *
227
   * @param $sid
228 85ad3d82 Assos Assos
   */
229 bc175c27 Assos Assos
  public function __construct($sid) {
230 85ad3d82 Assos Assos
    if (!is_scalar($sid)) {
231
      return;
232
    }
233
    $this->detailed_watchdog_log = variable_get('ldap_help_watchdog_detail', 0);
234
    $server_record = FALSE;
235
    if (module_exists('ctools')) {
236
      ctools_include('export');
237 32700c57 Assos Assos
      $result = ctools_export_load_object('ldap_servers', 'names', [$sid]);
238 85ad3d82 Assos Assos
      if (isset($result[$sid])) {
239
        $server_record = new stdClass();
240
        foreach ($result[$sid] as $db_field_name => $value) {
241
          $server_record->{$db_field_name} = $value;
242
        }
243
      }
244
    }
245
    else {
246
      $select = db_select('ldap_servers')
247
        ->fields('ldap_servers')
248 bc175c27 Assos Assos
        ->condition('ldap_servers.sid', $sid)
249 85ad3d82 Assos Assos
        ->execute();
250
      foreach ($select as $record) {
251
        if ($record->sid == $sid) {
252
          $server_record = $record;
253
        }
254
      }
255
    }
256
257
    $server_record_bindpw = NULL;
258
    if (!$server_record) {
259
      $this->inDatabase = FALSE;
260
    }
261
    else {
262
      $this->inDatabase = TRUE;
263
      $this->sid = $sid;
264
      $this->detailedWatchdogLog = variable_get('ldap_help_watchdog_detail', 0);
265 32700c57 Assos Assos
      foreach ($this->field_to_properties_map() as $db_field_name => $property_name) {
266 85ad3d82 Assos Assos
        if (isset($server_record->$db_field_name)) {
267
          $this->{$property_name} = $server_record->$db_field_name;
268
        }
269
      }
270
      $server_record_bindpw = property_exists($server_record, 'bindpw') ? $server_record->bindpw : '';
271
    }
272
    $this->initDerivedProperties($server_record_bindpw);
273
  }
274
275
  /**
276 bc175c27 Assos Assos
   * This method sets properties that don't directly map from db record.
277
   *
278 32700c57 Assos Assos
   * It is split out so it can be shared with ldapServerTest.class.php.
279 bc175c27 Assos Assos
   *
280
   * @param $bindpw
281 85ad3d82 Assos Assos
   */
282
  protected function initDerivedProperties($bindpw) {
283
284 32700c57 Assos Assos
    // Get this->basedn in array format.
285 85ad3d82 Assos Assos
    if (!$this->basedn) {
286 32700c57 Assos Assos
      $this->basedn = [];
287 85ad3d82 Assos Assos
    }
288 32700c57 Assos Assos
    // Do nothing.
289
    elseif (is_array($this->basedn)) {
290 85ad3d82 Assos Assos
    }
291
    else {
292
      $basedn_unserialized = @unserialize($this->basedn);
293
      if (is_array($basedn_unserialized)) {
294
        $this->basedn = $basedn_unserialized;
295
      }
296
      else {
297 32700c57 Assos Assos
        $this->basedn = [];
298 85ad3d82 Assos Assos
        $token = is_scalar($basedn_unserialized) ? $basedn_unserialized : print_r($basedn_unserialized, TRUE);
299 32700c57 Assos Assos
        debug("basednb desearialization error" . $token);
300
        watchdog('ldap_servers', 'Failed to deserialize LdapServer::basedn of !basedn', ['!basedn' => $token], WATCHDOG_ERROR);
301 85ad3d82 Assos Assos
      }
302
303
    }
304
305
    if ($this->followrefs && !function_exists('ldap_set_rebind_proc')) {
306
      $this->followrefs = FALSE;
307
    }
308
309
    if ($bindpw) {
310 5136ce55 Assos Assos
      $this->bindpw = ($bindpw == '') ? '' : ldap_servers_decrypt($bindpw);
311 85ad3d82 Assos Assos
    }
312
313 bc175c27 Assos Assos
    $bind_overrides = variable_get('ldap_servers_overrides', []);
314
    if (isset($bind_overrides[$this->sid])) {
315
      if (isset($bind_overrides[$this->sid]['binddn'])) {
316
        $this->binddn = $bind_overrides[$this->sid]['binddn'];
317
      }
318
      if (isset($bind_overrides[$this->sid]['bindpw'])) {
319
        $this->bindpw = $bind_overrides[$this->sid]['bindpw'];
320
      }
321
    }
322
323 32700c57 Assos Assos
    $this->paginationEnabled = (boolean) (ldap_servers_php_supports_pagination() && $this->searchPagination);
324 85ad3d82 Assos Assos
325 32700c57 Assos Assos
    $this->queriableWithoutUserCredentials = (boolean) (
326 85ad3d82 Assos Assos
      $this->bind_method == LDAP_SERVERS_BIND_METHOD_SERVICE_ACCT ||
327
      $this->bind_method == LDAP_SERVERS_BIND_METHOD_ANON_USER
328
    );
329
    $this->editPath = (!$this->sid) ? '' : 'admin/config/people/ldap/servers/edit/' . $this->sid;
330
331
    $this->groupGroupEntryMembershipsConfigured = ($this->groupMembershipsAttrMatchingUserAttr && $this->groupMembershipsAttr);
332
    $this->groupUserMembershipsConfigured = ($this->groupUserMembershipsAttrExists && $this->groupUserMembershipsAttr);
333
  }
334 bc175c27 Assos Assos
335 85ad3d82 Assos Assos
  /**
336 32700c57 Assos Assos
   * Destructor Method.
337 85ad3d82 Assos Assos
   */
338 bc175c27 Assos Assos
  public function __destruct() {
339 85ad3d82 Assos Assos
    // Close the server connection to be sure.
340
    $this->disconnect();
341
  }
342
343
  /**
344 32700c57 Assos Assos
   * Invoke Method.
345 85ad3d82 Assos Assos
   */
346 bc175c27 Assos Assos
  public function __invoke() {
347 85ad3d82 Assos Assos
    $this->connect();
348
    $this->bind();
349
  }
350
351
  /**
352 32700c57 Assos Assos
   * Connect Method.
353 85ad3d82 Assos Assos
   */
354 bc175c27 Assos Assos
  public function connect() {
355
    if (!function_exists('ldap_connect')) {
356
      watchdog('ldap_servers', 'PHP LDAP extension not found, aborting.');
357
      return LDAP_NOT_SUPPORTED;
358
    }
359 85ad3d82 Assos Assos
360
    if (!$con = ldap_connect($this->address, $this->port)) {
361 bc175c27 Assos Assos
      watchdog('ldap_servers', 'LDAP Connect failure to ' . $this->address . ':' . $this->port);
362 85ad3d82 Assos Assos
      return LDAP_CONNECT_ERROR;
363
    }
364
365
    ldap_set_option($con, LDAP_OPT_PROTOCOL_VERSION, 3);
366 32700c57 Assos Assos
    ldap_set_option($con, LDAP_OPT_REFERRALS, (int) $this->followrefs);
367 85ad3d82 Assos Assos
368
    // Use TLS if we are configured and able to.
369
    if ($this->tls) {
370
      ldap_get_option($con, LDAP_OPT_PROTOCOL_VERSION, $vers);
371
      if ($vers == -1) {
372 bc175c27 Assos Assos
        watchdog('ldap_servers', 'Could not get LDAP protocol version.');
373 85ad3d82 Assos Assos
        return LDAP_PROTOCOL_ERROR;
374
      }
375
      if ($vers != 3) {
376 bc175c27 Assos Assos
        watchdog('ldap_servers', 'Could not start TLS, only supported by LDAP v3.');
377 85ad3d82 Assos Assos
        return LDAP_CONNECT_ERROR;
378
      }
379
      elseif (!function_exists('ldap_start_tls')) {
380 bc175c27 Assos Assos
        watchdog('ldap_servers', 'Could not start TLS. It does not seem to be supported by this PHP setup.');
381 85ad3d82 Assos Assos
        return LDAP_CONNECT_ERROR;
382
      }
383
      elseif (!ldap_start_tls($con)) {
384 32700c57 Assos Assos
        $msg = t("Could not start TLS. (Error %errno: %error).", ['%errno' => ldap_errno($con), '%error' => ldap_error($con)]);
385 bc175c27 Assos Assos
        watchdog('ldap_servers', $msg);
386 85ad3d82 Assos Assos
        return LDAP_CONNECT_ERROR;
387
      }
388
    }
389
390 32700c57 Assos Assos
    // Store the resulting resource.
391
    $this->connection = $con;
392
    return LDAP_SUCCESS;
393 85ad3d82 Assos Assos
  }
394
395
  /**
396 32700c57 Assos Assos
   * Bind (authenticate) against an active LDAP database.
397
   *
398
   * @param $userdn
399
   *   The DN to bind against. If NULL, we use $this->binddn
400
   * @param $pass
401
   *   The password search base. If NULL, we use $this->bindpw
402 85ad3d82 Assos Assos
   *
403
   * @return
404
   *   Result of bind; TRUE if successful, FALSE otherwise.
405
   */
406 bc175c27 Assos Assos
  public function bind($userdn = NULL, $pass = NULL, $anon_bind = FALSE) {
407 85ad3d82 Assos Assos
408
    // Ensure that we have an active server connection.
409
    if (!$this->connection) {
410 32700c57 Assos Assos
      watchdog('ldap_servers', "LDAP bind failure for user %user. Not connected to LDAP server.", ['%user' => $userdn]);
411 85ad3d82 Assos Assos
      return LDAP_CONNECT_ERROR;
412
    }
413
414 be58a50c Assos Assos
    if ($anon_bind === FALSE && $userdn === NULL && $pass === NULL && $this->bind_method == LDAP_SERVERS_BIND_METHOD_ANON) {
415 85ad3d82 Assos Assos
      $anon_bind = TRUE;
416
    }
417
    if ($anon_bind === TRUE) {
418
      if (@!ldap_bind($this->connection)) {
419
        if ($this->detailedWatchdogLog) {
420 32700c57 Assos Assos
          watchdog('ldap_servers', "LDAP anonymous bind error. Error %errno: %error", ['%errno' => ldap_errno($this->connection), '%error' => ldap_error($this->connection)]);
421 85ad3d82 Assos Assos
        }
422
        return ldap_errno($this->connection);
423
      }
424
    }
425
    else {
426
      $userdn = ($userdn != NULL) ? $userdn : $this->binddn;
427
      $pass = ($pass != NULL) ? $pass : $this->bindpw;
428
429
      if ($this->followrefs) {
430
        $rebHandler = new LdapServersRebindHandler($userdn, $pass);
431 32700c57 Assos Assos
        ldap_set_rebind_proc($this->connection, [$rebHandler, 'rebind_callback']);
432 85ad3d82 Assos Assos
      }
433
434
      if (drupal_strlen($pass) == 0 || drupal_strlen($userdn) == 0) {
435 32700c57 Assos Assos
        watchdog('ldap_servers', "LDAP bind failure for user userdn=%userdn, pass=%pass.", ['%userdn' => $userdn, '%pass' => $pass]);
436 85ad3d82 Assos Assos
        return LDAP_LOCAL_ERROR;
437
      }
438
      if (@!ldap_bind($this->connection, $userdn, $pass)) {
439
        if ($this->detailedWatchdogLog) {
440 32700c57 Assos Assos
          watchdog('ldap_servers', "LDAP bind failure for user %user. Error %errno: %error", ['%user' => $userdn, '%errno' => ldap_errno($this->connection), '%error' => ldap_error($this->connection)]);
441 85ad3d82 Assos Assos
        }
442
        return ldap_errno($this->connection);
443
      }
444
    }
445
446
    return LDAP_SUCCESS;
447
  }
448
449
  /**
450
   * Disconnect (unbind) from an active LDAP server.
451
   */
452 bc175c27 Assos Assos
  public function disconnect() {
453 85ad3d82 Assos Assos
    if (!$this->connection) {
454 32700c57 Assos Assos
      // Never bound or not currently bound, so no need to disconnect
455
      // watchdog('ldap_servers', 'LDAP disconnect failure from '. $this->server_addr . ':' . $this->port);.
456 85ad3d82 Assos Assos
    }
457
    else {
458
      ldap_unbind($this->connection);
459
      $this->connection = NULL;
460
    }
461
  }
462
463 bc175c27 Assos Assos
  /**
464
   *
465
   */
466 85ad3d82 Assos Assos
  public function connectAndBindIfNotAlready() {
467 32700c57 Assos Assos
    if (!$this->connection) {
468 85ad3d82 Assos Assos
      $this->connect();
469
      $this->bind();
470
    }
471
  }
472
473 bc175c27 Assos Assos
  /**
474 32700c57 Assos Assos
   * Does dn exist for this server?
475 bc175c27 Assos Assos
   *
476
   * @param string $dn
477 32700c57 Assos Assos
   * @param enum $return
478
   *   = 'boolean' or 'ldap_entry'.
479
   * @param array $attributes
480
   *   in same form as ldap_read $attributes parameter.
481 bc175c27 Assos Assos
   *
482
   * @return bool|array
483
   */
484
  public function dnExists($dn, $return = 'boolean', $attributes = NULL) {
485 85ad3d82 Assos Assos
486 32700c57 Assos Assos
    $params = [
487 85ad3d82 Assos Assos
      'base_dn' => $dn,
488
      'attributes' => $attributes,
489
      'attrsonly' => FALSE,
490
      'filter' => '(objectclass=*)',
491
      'sizelimit' => 0,
492
      'timelimit' => 0,
493
      'deref' => NULL,
494 32700c57 Assos Assos
    ];
495 85ad3d82 Assos Assos
496
    if ($return == 'boolean' || !is_array($attributes)) {
497 32700c57 Assos Assos
      $params['attributes'] = ['objectclass'];
498 85ad3d82 Assos Assos
    }
499
    else {
500
      $params['attributes'] = $attributes;
501
    }
502
503
    $result = $this->ldapQuery(LDAP_SCOPE_BASE, $params);
504
    if ($result !== FALSE) {
505
      $entries = @ldap_get_entries($this->connection, $result);
506
      if ($entries !== FALSE && $entries['count'] > 0) {
507
        return ($return == 'boolean') ? TRUE : $entries[0];
508
      }
509
    }
510
511
    return FALSE;
512
513
  }
514
515
  /**
516 32700c57 Assos Assos
   * @param $ldap_result
517
   *   as ldap link identifier
518 85ad3d82 Assos Assos
   *
519
   * @return FALSE on error or number of entries.
520
   *   (if 0 entries will return 0)
521
   */
522
  public function countEntries($ldap_result) {
523
    return ldap_count_entries($this->connection, $ldap_result);
524
  }
525
526
  /**
527 32700c57 Assos Assos
   * Create ldap entry.
528 85ad3d82 Assos Assos
   *
529 32700c57 Assos Assos
   * @param array $attributes
530
   *   should follow the structure of ldap_add functions
531 85ad3d82 Assos Assos
   *   entry array: http://us.php.net/manual/en/function.ldap-add.php
532 bc175c27 Assos Assos
   *     $attributes["attribute1"] = "value";
533
   *     $attributes["attribute2"][0] = "value1";
534 32700c57 Assos Assos
   *     $attributes["attribute2"][1] = "value2";.
535
   *
536 85ad3d82 Assos Assos
   * @return boolean result
537
   */
538
  public function createLdapEntry($attributes, $dn = NULL) {
539
540
    if (!$this->connection) {
541
      $this->connect();
542
      $this->bind();
543
    }
544
    if (isset($attributes['dn'])) {
545
      $dn = $attributes['dn'];
546
      unset($attributes['dn']);
547
    }
548
    elseif (!$dn) {
549
      return FALSE;
550
    }
551
552 be58a50c Assos Assos
    if (!empty($attributes['unicodePwd']) && ($this->ldap_type == 'ad')) {
553
      $attributes['unicodePwd'] = ldap_servers_convert_password_for_active_directory_unicodePwd($attributes['unicodePwd']);
554
    }
555
556 85ad3d82 Assos Assos
    $result = @ldap_add($this->connection, $dn, $attributes);
557
    if (!$result) {
558
      $error = "LDAP Server ldap_add(%dn) Error Server ID = %sid, LDAP Err No: %ldap_errno LDAP Err Message: %ldap_err2str ";
559 32700c57 Assos Assos
      $tokens = ['%dn' => $dn, '%sid' => $this->sid, '%ldap_errno' => ldap_errno($this->connection), '%ldap_err2str' => ldap_err2str(ldap_errno($this->connection))];
560 bc175c27 Assos Assos
      watchdog('ldap_servers', $error, $tokens, WATCHDOG_ERROR);
561 85ad3d82 Assos Assos
    }
562
563
    return $result;
564
  }
565
566 bc175c27 Assos Assos
  /**
567
   * Compares 2 LDAP entries and returns the difference.
568
   *
569
   * Given 2 ldap entries, old and new, removes unchanged values to avoid
570
   * security errors and incorrect date modified.
571
   *
572
   * @param array $new_entry
573
   *   LDAP entry array in form <attribute> => <value>, or
574
   *   <attribute> => array(<value1>, <value2>, ...).
575
   * @param array $old_entry
576
   *   LDAP entry in form <attribute> =>
577
   *   array('count' => N, <value1>, <value2>, ...).
578
   *
579
   * @return array
580
   *   The $new_entry with unchanged attributes removed.
581
   *
582
   * @see \LdapServer::modifyLdapEntry()
583
   */
584
  public static function removeUnchangedAttributes($new_entry, $old_entry) {
585 85ad3d82 Assos Assos
586
    foreach ($new_entry as $key => $new_val) {
587
      $old_value = FALSE;
588 7547bb19 Assos Assos
      $old_value_is_scalar = FALSE;
589 85ad3d82 Assos Assos
      $key_lcase = drupal_strtolower($key);
590
      if (isset($old_entry[$key_lcase])) {
591
        if ($old_entry[$key_lcase]['count'] == 1) {
592
          $old_value = $old_entry[$key_lcase][0];
593
          $old_value_is_scalar = TRUE;
594
        }
595
        else {
596
          unset($old_entry[$key_lcase]['count']);
597
          $old_value = $old_entry[$key_lcase];
598
          $old_value_is_scalar = FALSE;
599
        }
600
      }
601
602 32700c57 Assos Assos
      // Identical multivalued attributes.
603 85ad3d82 Assos Assos
      if (is_array($new_val) && is_array($old_value) && count(array_diff($new_val, $old_value)) == 0) {
604
        unset($new_entry[$key]);
605
      }
606
      elseif ($old_value_is_scalar && !is_array($new_val) && drupal_strtolower($old_value) == drupal_strtolower($new_val)) {
607 32700c57 Assos Assos
        // don't change values that aren't changing to avoid false permission constraints.
608
        unset($new_entry[$key]);
609 85ad3d82 Assos Assos
      }
610
    }
611 bc175c27 Assos Assos
612 85ad3d82 Assos Assos
    return $new_entry;
613
  }
614
615
  /**
616 32700c57 Assos Assos
   * Modify attributes of ldap entry.
617 85ad3d82 Assos Assos
   *
618 32700c57 Assos Assos
   * @param string $dn
619
   *   DN of entry.
620
   * @param array $attributes
621
   *   should follow the structure of ldap_add functions
622 85ad3d82 Assos Assos
   *   entry array: http://us.php.net/manual/en/function.ldap-add.php
623 bc175c27 Assos Assos
   *     $attributes["attribute1"] = "value";
624
   *     $attributes["attribute2"][0] = "value1";
625 32700c57 Assos Assos
   *     $attributes["attribute2"][1] = "value2";.
626 bc175c27 Assos Assos
   *
627
   * @return TRUE on success FALSE on error
628 85ad3d82 Assos Assos
   */
629 32700c57 Assos Assos
  public function modifyLdapEntry($dn, $attributes = [], $old_attributes = FALSE) {
630 85ad3d82 Assos Assos
631
    $this->connectAndBindIfNotAlready();
632
633
    if (!$old_attributes) {
634
      $result = @ldap_read($this->connection, $dn, 'objectClass=*');
635
      if (!$result) {
636
        $error = "LDAP Server ldap_read(%dn) in LdapServer::modifyLdapEntry() Error Server ID = %sid, LDAP Err No: %ldap_errno LDAP Err Message: %ldap_err2str ";
637 32700c57 Assos Assos
        $tokens = ['%dn' => $dn, '%sid' => $this->sid, '%ldap_errno' => ldap_errno($this->connection), '%ldap_err2str' => ldap_err2str(ldap_errno($this->connection))];
638 bc175c27 Assos Assos
        watchdog('ldap_servers', $error, $tokens, WATCHDOG_ERROR);
639 85ad3d82 Assos Assos
        return FALSE;
640
      }
641
642
      $entries = ldap_get_entries($this->connection, $result);
643
      if (is_array($entries) && $entries['count'] == 1) {
644 bc175c27 Assos Assos
        $old_attributes = $entries[0];
645 85ad3d82 Assos Assos
      }
646
    }
647 be58a50c Assos Assos
648
    if (!empty($attributes['unicodePwd']) && ($this->ldap_type == 'ad')) {
649
      $attributes['unicodePwd'] = ldap_servers_convert_password_for_active_directory_unicodePwd($attributes['unicodePwd']);
650
    }
651
652 85ad3d82 Assos Assos
    $attributes = $this->removeUnchangedAttributes($attributes, $old_attributes);
653
654
    foreach ($attributes as $key => $cur_val) {
655
      $old_value = FALSE;
656
      $key_lcase = drupal_strtolower($key);
657
      if (isset($old_attributes[$key_lcase])) {
658
        if ($old_attributes[$key_lcase]['count'] == 1) {
659
          $old_value = $old_attributes[$key_lcase][0];
660
        }
661
        else {
662
          unset($old_attributes[$key_lcase]['count']);
663
          $old_value = $old_attributes[$key_lcase];
664
        }
665
      }
666
667 32700c57 Assos Assos
      // Remove enpty attributes.
668
      if ($cur_val == '' && $old_value != '') {
669 85ad3d82 Assos Assos
        unset($attributes[$key]);
670 32700c57 Assos Assos
        $result = @ldap_mod_del($this->connection, $dn, [$key_lcase => $old_value]);
671 85ad3d82 Assos Assos
        if (!$result) {
672
          $error = "LDAP Server ldap_mod_del(%dn) in LdapServer::modifyLdapEntry() Error Server ID = %sid, LDAP Err No: %ldap_errno LDAP Err Message: %ldap_err2str ";
673 32700c57 Assos Assos
          $tokens = ['%dn' => $dn, '%sid' => $this->sid, '%ldap_errno' => ldap_errno($this->connection), '%ldap_err2str' => ldap_err2str(ldap_errno($this->connection))];
674 bc175c27 Assos Assos
          watchdog('ldap_servers', $error, $tokens, WATCHDOG_ERROR);
675 85ad3d82 Assos Assos
          return FALSE;
676
        }
677
      }
678
      elseif (is_array($cur_val)) {
679
        foreach ($cur_val as $mv_key => $mv_cur_val) {
680
          if ($mv_cur_val == '') {
681 32700c57 Assos Assos
            // Remove empty values in multivalues attributes.
682
            unset($attributes[$key][$mv_key]);
683 85ad3d82 Assos Assos
          }
684
          else {
685
            $attributes[$key][$mv_key] = $mv_cur_val;
686
          }
687
        }
688
      }
689
    }
690
691
    if (count($attributes) > 0) {
692
      $result = @ldap_modify($this->connection, $dn, $attributes);
693
      if (!$result) {
694
        $error = "LDAP Server ldap_modify(%dn) in LdapServer::modifyLdapEntry() Error Server ID = %sid, LDAP Err No: %ldap_errno LDAP Err Message: %ldap_err2str ";
695 32700c57 Assos Assos
        $tokens = ['%dn' => $dn, '%sid' => $this->sid, '%ldap_errno' => ldap_errno($this->connection), '%ldap_err2str' => ldap_err2str(ldap_errno($this->connection))];
696 bc175c27 Assos Assos
        watchdog('ldap_servers', $error, $tokens, WATCHDOG_ERROR);
697 85ad3d82 Assos Assos
        return FALSE;
698
      }
699
    }
700
701
    return TRUE;
702
703
  }
704
705
  /**
706
   * Perform an LDAP delete.
707
   *
708
   * @param string $dn
709
   *
710
   * @return boolean result per ldap_delete
711
   */
712
  public function delete($dn) {
713
    if (!$this->connection) {
714
      $this->connect();
715
      $this->bind();
716
    }
717
    $result = @ldap_delete($this->connection, $dn);
718
    if (!$result) {
719
      $error = "LDAP Server delete(%dn) in LdapServer::delete() Error Server ID = %sid, LDAP Err No: %ldap_errno LDAP Err Message: %ldap_err2str ";
720 32700c57 Assos Assos
      $tokens = ['%dn' => $dn, '%sid' => $this->sid, '%ldap_errno' => ldap_errno($this->connection), '%ldap_err2str' => ldap_err2str(ldap_errno($this->connection))];
721 bc175c27 Assos Assos
      watchdog('ldap_servers', $error, $tokens, WATCHDOG_ERROR);
722 85ad3d82 Assos Assos
    }
723
    return $result;
724
  }
725
726
  /**
727 32700c57 Assos Assos
   * Perform an LDAP search on all base dns and aggregate into one result.
728 85ad3d82 Assos Assos
   *
729
   * @param string $filter
730 32700c57 Assos Assos
   *   The search filter. such as sAMAccountName=jbarclay.  attribute values (e.g. jbarclay) should be esacaped before calling.
731
   *
732 85ad3d82 Assos Assos
   * @param array $attributes
733
   *   List of desired attributes. If omitted, we only return "dn".
734
   *
735
   * @remaining params mimick ldap_search() function params
736
   *
737 bc175c27 Assos Assos
   * @return array
738
   *   An array of matching entries->attributes (will have 0 elements if search
739
   *   returns no results), or FALSE on error on any of the basedn queries.
740 85ad3d82 Assos Assos
   */
741
  public function searchAllBaseDns(
742
    $filter,
743 32700c57 Assos Assos
    $attributes = [],
744 85ad3d82 Assos Assos
    $attrsonly = 0,
745
    $sizelimit = 0,
746
    $timelimit = 0,
747
    $deref = NULL,
748
    $scope = LDAP_SCOPE_SUBTREE
749
    ) {
750 32700c57 Assos Assos
    $all_entries = [];
751
    // Need to search on all basedns one at a time.
752
    foreach ($this->basedn as $base_dn) {
753
      // No attributes, just dns needed.
754
      $entries = $this->search($base_dn, $filter, $attributes, $attrsonly, $sizelimit, $timelimit, $deref, $scope);
755
      // If error in any search, return false.
756
      if ($entries === FALSE) {
757 85ad3d82 Assos Assos
        return FALSE;
758
      }
759
      if (count($all_entries) == 0) {
760
        $all_entries = $entries;
761
        unset($all_entries['count']);
762
      }
763
      else {
764
        $existing_count = count($all_entries);
765
        unset($entries['count']);
766
        foreach ($entries as $i => $entry) {
767
          $all_entries[$existing_count + $i] = $entry;
768
        }
769
      }
770
    }
771
    $all_entries['count'] = count($all_entries);
772
    return $all_entries;
773
774
  }
775
776
  /**
777
   * Perform an LDAP search.
778 bc175c27 Assos Assos
   *
779 85ad3d82 Assos Assos
   * @param string $basedn
780 32700c57 Assos Assos
   *   The search base. If NULL, we use $this->basedn. should not be esacaped.
781 85ad3d82 Assos Assos
   * @param string $filter
782 bc175c27 Assos Assos
   *   The search filter. such as sAMAccountName=jbarclay.  attribute values
783 32700c57 Assos Assos
   *   (e.g. jbarclay) should be esacaped before calling.
784 bc175c27 Assos Assos
   *
785 85ad3d82 Assos Assos
   * @param array $attributes
786
   *   List of desired attributes. If omitted, we only return "dn".
787
   *
788
   * @remaining params mimick ldap_search() function params
789
   *
790
   * @return
791
   *   An array of matching entries->attributes (will have 0
792
   *   elements if search returns no results),
793
   *   or FALSE on error.
794
   */
795 32700c57 Assos Assos
  public function search($base_dn = NULL,
796
  $filter,
797
  $attributes = [],
798
    $attrsonly = 0,
799
  $sizelimit = 0,
800
  $timelimit = 0,
801
  $deref = NULL,
802
  $scope = LDAP_SCOPE_SUBTREE) {
803 85ad3d82 Assos Assos
804 32700c57 Assos Assos
    /**
805 85ad3d82 Assos Assos
      * pagingation issues:
806
      * -- see documentation queue: http://markmail.org/message/52w24iae3g43ikix#query:+page:1+mid:bez5vpl6smgzmymy+state:results
807
      * -- wait for php 5.4? https://svn.php.net/repository/php/php-src/tags/php_5_4_0RC6/NEWS (ldap_control_paged_result
808
      * -- http://sgehrig.wordpress.com/2009/11/06/reading-paged-ldap-results-with-php-is-a-show-stopper/
809
      */
810
811
    if ($base_dn == NULL) {
812
      if (count($this->basedn) == 1) {
813
        $base_dn = $this->basedn[0];
814
      }
815
      else {
816
        return FALSE;
817
      }
818
    }
819
820 bc175c27 Assos Assos
    $attr_display = is_array($attributes) ? join(',', $attributes) : 'none';
821 32700c57 Assos Assos
    $query = 'ldap_search() call: ' . join(",\n", [
822 85ad3d82 Assos Assos
      'base_dn: ' . $base_dn,
823
      'filter = ' . $filter,
824
      'attributes: ' . $attr_display,
825
      'attrsonly = ' . $attrsonly,
826
      'sizelimit = ' . $sizelimit,
827
      'timelimit = ' . $timelimit,
828
      'deref = ' . $deref,
829
      'scope = ' . $scope,
830 32700c57 Assos Assos
    ]
831 85ad3d82 Assos Assos
    );
832
    if ($this->detailed_watchdog_log) {
833 32700c57 Assos Assos
      watchdog('ldap_servers', $query, []);
834 85ad3d82 Assos Assos
    }
835
836
    // When checking multiple servers, there's a chance we might not be connected yet.
837 32700c57 Assos Assos
    if (!$this->connection) {
838 85ad3d82 Assos Assos
      $this->connect();
839
      $this->bind();
840
    }
841
842 32700c57 Assos Assos
    $ldap_query_params = [
843 85ad3d82 Assos Assos
      'connection' => $this->connection,
844
      'base_dn' => $base_dn,
845
      'filter' => $filter,
846
      'attributes' => $attributes,
847
      'attrsonly' => $attrsonly,
848
      'sizelimit' => $sizelimit,
849
      'timelimit' => $timelimit,
850
      'deref' => $deref,
851
      'query_display' => $query,
852
      'scope' => $scope,
853 32700c57 Assos Assos
    ];
854 85ad3d82 Assos Assos
855
    if ($this->searchPagination && $this->paginationEnabled) {
856
      $aggregated_entries = $this->pagedLdapQuery($ldap_query_params);
857
      return $aggregated_entries;
858
    }
859
    else {
860
      $result = $this->ldapQuery($scope, $ldap_query_params);
861 32700c57 Assos Assos
      if ($result && ($this->countEntries($result) !== FALSE)) {
862 85ad3d82 Assos Assos
        $entries = ldap_get_entries($this->connection, $result);
863
        drupal_alter('ldap_server_search_results', $entries, $ldap_query_params);
864
        return (is_array($entries)) ? $entries : FALSE;
865
      }
866
      elseif ($this->ldapErrorNumber()) {
867 32700c57 Assos Assos
        $watchdog_tokens = [
868
          '%basedn' => $ldap_query_params['base_dn'],
869
          '%filter' => $ldap_query_params['filter'],
870
          '%attributes' => print_r($ldap_query_params['attributes'], TRUE),
871
          '%errmsg' => $this->errorMsg('ldap'),
872
          '%errno' => $this->ldapErrorNumber(),
873
        ];
874 bc175c27 Assos Assos
        watchdog('ldap_servers', "LDAP ldap_search error. basedn: %basedn| filter: %filter| attributes:
875 85ad3d82 Assos Assos
          %attributes| errmsg: %errmsg| ldap err no: %errno|", $watchdog_tokens);
876
        return FALSE;
877
      }
878
      else {
879
        return FALSE;
880
      }
881
    }
882
  }
883
884
  /**
885 32700c57 Assos Assos
   * Execute a paged ldap query and return entries as one aggregated array.
886 85ad3d82 Assos Assos
   *
887
   * $this->searchPageStart and $this->searchPageEnd should be set before calling if
888 32700c57 Assos Assos
   *   a particular set of pages is desired.
889 85ad3d82 Assos Assos
   *
890 32700c57 Assos Assos
   * @param array $ldap_query_params
891
   *   of form:
892 bc175c27 Assos Assos
   *   'base_dn' => base_dn,
893
   *   'filter' =>  filter,
894
   *   'attributes' => attributes,
895
   *   'attrsonly' => attrsonly,
896
   *   'sizelimit' => sizelimit,
897
   *   'timelimit' => timelimit,
898
   *   'deref' => deref,
899
   *   'scope' => scope,
900
   *
901
   *   (this array of parameters is primarily passed on to ldapQuery() method)
902 85ad3d82 Assos Assos
   *
903
   * @return array of ldap entries or FALSE on error.
904
   */
905
  public function pagedLdapQuery($ldap_query_params) {
906
907
    if (!($this->searchPagination && $this->paginationEnabled)) {
908 32700c57 Assos Assos
      $watchdog_tokens = [
909
        '%basedn' => $ldap_query_params['base_dn'],
910
        '%filter' => $ldap_query_params['filter'],
911
        '%attributes' => print_r($ldap_query_params['attributes'], TRUE),
912
        '%errmsg' => $this->errorMsg('ldap'),
913
        '%errno' => $this->ldapErrorNumber(),
914
      ];
915 bc175c27 Assos Assos
      watchdog('ldap_servers', "LDAP server pagedLdapQuery() called when functionality not available in php install or
916 85ad3d82 Assos Assos
        not enabled in ldap server configuration.  error. basedn: %basedn| filter: %filter| attributes:
917
         %attributes| errmsg: %errmsg| ldap err no: %errno|", $watchdog_tokens);
918 32700c57 Assos Assos
      return FALSE;
919 85ad3d82 Assos Assos
    }
920
921
    $page_token = '';
922
    $page = 0;
923
    $estimated_entries = 0;
924 32700c57 Assos Assos
    $aggregated_entries = [];
925 85ad3d82 Assos Assos
    $aggregated_entries_count = 0;
926
    $has_page_results = FALSE;
927
928
    do {
929
      ldap_control_paged_result($this->connection, $this->searchPageSize, TRUE, $page_token);
930
      $result = $this->ldapQuery($ldap_query_params['scope'], $ldap_query_params);
931
932
      if ($page >= $this->searchPageStart) {
933
        $skipped_page = FALSE;
934 32700c57 Assos Assos
        if ($result && ($this->countEntries($result) !== FALSE)) {
935 85ad3d82 Assos Assos
          $page_entries = ldap_get_entries($this->connection, $result);
936
          unset($page_entries['count']);
937
          $has_page_results = (is_array($page_entries) && count($page_entries) > 0);
938
          $aggregated_entries = array_merge($aggregated_entries, $page_entries);
939
          $aggregated_entries_count = count($aggregated_entries);
940
        }
941
        elseif ($this->ldapErrorNumber()) {
942 32700c57 Assos Assos
          $watchdog_tokens = [
943
            '%basedn' => $ldap_query_params['base_dn'],
944
            '%filter' => $ldap_query_params['filter'],
945
            '%attributes' => print_r($ldap_query_params['attributes'], TRUE),
946
            '%errmsg' => $this->errorMsg('ldap'),
947
            '%errno' => $this->ldapErrorNumber(),
948
          ];
949 bc175c27 Assos Assos
          watchdog('ldap_servers', "LDAP ldap_search error. basedn: %basedn| filter: %filter| attributes:
950 85ad3d82 Assos Assos
            %attributes| errmsg: %errmsg| ldap err no: %errno|", $watchdog_tokens);
951 32700c57 Assos Assos
          return FALSE;
952 85ad3d82 Assos Assos
        }
953
        else {
954
          return FALSE;
955
        }
956
      }
957
      else {
958
        $skipped_page = TRUE;
959
      }
960
      @ldap_control_paged_result_response($this->connection, $result, $page_token, $estimated_entries);
961
      if ($ldap_query_params['sizelimit'] && $this->ldapErrorNumber() == LDAP_SIZELIMIT_EXCEEDED) {
962 32700c57 Assos Assos
        // False positive error thrown.  do not set result limit error when $sizelimit specified.
963 85ad3d82 Assos Assos
      }
964
      elseif ($this->hasError()) {
965 bc175c27 Assos Assos
        watchdog('ldap_servers', 'ldap_control_paged_result_response() function error. LDAP Error: %message, ldap_list() parameters: %query',
966 32700c57 Assos Assos
          ['%message' => $this->errorMsg('ldap'), '%query' => $ldap_query_params['query_display']],
967 85ad3d82 Assos Assos
          WATCHDOG_ERROR);
968
      }
969
970
      if (isset($ldap_query_params['sizelimit']) && $ldap_query_params['sizelimit'] && $aggregated_entries_count >= $ldap_query_params['sizelimit']) {
971
        $discarded_entries = array_splice($aggregated_entries, $ldap_query_params['sizelimit']);
972
        break;
973
      }
974 32700c57 Assos Assos
      // User defined pagination has run out.
975
      elseif ($this->searchPageEnd !== NULL && $page >= $this->searchPageEnd) {
976 85ad3d82 Assos Assos
        break;
977
      }
978 32700c57 Assos Assos
      // Ldap reference pagination has run out.
979
      elseif ($page_token === NULL || $page_token == '') {
980 85ad3d82 Assos Assos
        break;
981
      }
982
      $page++;
983
    } while ($skipped_page || $has_page_results);
984
985
    $aggregated_entries['count'] = count($aggregated_entries);
986
    return $aggregated_entries;
987
  }
988
989
  /**
990 32700c57 Assos Assos
   * Execute ldap query and return ldap records.
991 85ad3d82 Assos Assos
   *
992
   * @param scope
993 32700c57 Assos Assos
   *
994 85ad3d82 Assos Assos
   * @params see pagedLdapQuery $params
995
   *
996
   * @return array of ldap entries
997
   */
998 bc175c27 Assos Assos
  public function ldapQuery($scope, $params) {
999 85ad3d82 Assos Assos
1000
    $this->connectAndBindIfNotAlready();
1001
1002
    switch ($scope) {
1003
      case LDAP_SCOPE_SUBTREE:
1004
        $result = @ldap_search($this->connection, $params['base_dn'], $params['filter'], $params['attributes'], $params['attrsonly'],
1005
          $params['sizelimit'], $params['timelimit'], $params['deref']);
1006
        if ($params['sizelimit'] && $this->ldapErrorNumber() == LDAP_SIZELIMIT_EXCEEDED) {
1007 32700c57 Assos Assos
          // False positive error thrown.  do not return result limit error when $sizelimit specified.
1008 85ad3d82 Assos Assos
        }
1009
        elseif ($this->hasError()) {
1010 bc175c27 Assos Assos
          watchdog('ldap_servers', 'ldap_search() function error. LDAP Error: %message, ldap_search() parameters: %query',
1011 32700c57 Assos Assos
            ['%message' => $this->errorMsg('ldap'), '%query' => $params['query_display']],
1012 85ad3d82 Assos Assos
            WATCHDOG_ERROR);
1013
        }
1014
        break;
1015
1016
      case LDAP_SCOPE_BASE:
1017
        $result = @ldap_read($this->connection, $params['base_dn'], $params['filter'], $params['attributes'], $params['attrsonly'],
1018
          $params['sizelimit'], $params['timelimit'], $params['deref']);
1019
        if ($params['sizelimit'] && $this->ldapErrorNumber() == LDAP_SIZELIMIT_EXCEEDED) {
1020 32700c57 Assos Assos
          // False positive error thrown.  do not result limit error when $sizelimit specified.
1021 85ad3d82 Assos Assos
        }
1022
        elseif ($this->hasError()) {
1023 bc175c27 Assos Assos
          watchdog('ldap_servers', 'ldap_read() function error.  LDAP Error: %message, ldap_read() parameters: %query',
1024 32700c57 Assos Assos
            ['%message' => $this->errorMsg('ldap'), '%query' => @$params['query_display']],
1025 85ad3d82 Assos Assos
            WATCHDOG_ERROR);
1026
        }
1027
        break;
1028
1029
      case LDAP_SCOPE_ONELEVEL:
1030
        $result = @ldap_list($this->connection, $params['base_dn'], $params['filter'], $params['attributes'], $params['attrsonly'],
1031
          $params['sizelimit'], $params['timelimit'], $params['deref']);
1032
        if ($params['sizelimit'] && $this->ldapErrorNumber() == LDAP_SIZELIMIT_EXCEEDED) {
1033 32700c57 Assos Assos
          // False positive error thrown.  do not result limit error when $sizelimit specified.
1034 85ad3d82 Assos Assos
        }
1035
        elseif ($this->hasError()) {
1036 bc175c27 Assos Assos
          watchdog('ldap_servers', 'ldap_list() function error. LDAP Error: %message, ldap_list() parameters: %query',
1037 32700c57 Assos Assos
            ['%message' => $this->errorMsg('ldap'), '%query' => $params['query_display']],
1038 85ad3d82 Assos Assos
            WATCHDOG_ERROR);
1039
        }
1040
        break;
1041
    }
1042
    return $result;
1043
  }
1044
1045
  /**
1046 32700c57 Assos Assos
   * @param array $dns
1047
   *   Mixed Case.
1048 85ad3d82 Assos Assos
   * @return array $dns Lower Case
1049
   */
1050
  public function dnArrayToLowerCase($dns) {
1051
    return array_keys(array_change_key_case(array_flip($dns), CASE_LOWER));
1052
  }
1053
1054
  /**
1055 32700c57 Assos Assos
   * UserUserEntityFromPuid.
1056 85ad3d82 Assos Assos
   *
1057 bc175c27 Assos Assos
   * @param string $puid
1058
   *   Binary or string as returned from ldap_read or other ldap function.
1059
   *
1060
   * @return mixed
1061 85ad3d82 Assos Assos
   */
1062
  public function userUserEntityFromPuid($puid) {
1063
1064
    $query = new EntityFieldQuery();
1065
    $query->entityCondition('entity_type', 'user')
1066 32700c57 Assos Assos
      ->fieldCondition('ldap_user_puid_sid', 'value', $this->sid, '=')
1067
      ->fieldCondition('ldap_user_puid', 'value', $puid, '=')
1068
      ->fieldCondition('ldap_user_puid_property', 'value', $this->unique_persistent_attr, '=')
1069
    // Run the query as user 1.
1070
      ->addMetaData('account', user_load(1));
1071 85ad3d82 Assos Assos
1072
    $result = $query->execute();
1073
1074
    if (isset($result['user'])) {
1075
      $uids = array_keys($result['user']);
1076
      if (count($uids) == 1) {
1077
        $user = entity_load('user', array_keys($result['user']));
1078
        return $user[$uids[0]];
1079
      }
1080
      else {
1081
        $uids = join(',', $uids);
1082 32700c57 Assos Assos
        $tokens = ['%uids' => $uids, '%puid' => $puid, '%sid' => $this->sid, '%ldap_user_puid_property' => $this->unique_persistent_attr];
1083 bc175c27 Assos Assos
        watchdog('ldap_servers', 'multiple users (uids: %uids) with same puid (puid=%puid, sid=%sid, ldap_user_puid_property=%ldap_user_puid_property)', $tokens, WATCHDOG_ERROR);
1084 85ad3d82 Assos Assos
        return FALSE;
1085
      }
1086
    }
1087
    else {
1088
      return FALSE;
1089
    }
1090
1091
  }
1092
1093 bc175c27 Assos Assos
  /**
1094
   * @param $drupal_username
1095
   * @param $watchdog_tokens
1096
   *
1097
   * @return string
1098
   */
1099
  public function userUsernameToLdapNameTransform($drupal_username, &$watchdog_tokens) {
1100 85ad3d82 Assos Assos
    if ($this->ldapToDrupalUserPhp && module_exists('php')) {
1101
      global $name;
1102
      $old_name_value = $name;
1103
      $name = $drupal_username;
1104
      $code = "<?php global \$name; \n" . $this->ldapToDrupalUserPhp . "; \n ?>";
1105
      $watchdog_tokens['%code'] = $this->ldapToDrupalUserPhp;
1106
      $code_result = php_eval($code);
1107
      $watchdog_tokens['%code_result'] = $code_result;
1108
      $ldap_username = $code_result;
1109
      $watchdog_tokens['%ldap_username'] = $ldap_username;
1110 32700c57 Assos Assos
      // Important because of global scope of $name.
1111
      $name = $old_name_value;
1112 85ad3d82 Assos Assos
      if ($this->detailedWatchdogLog) {
1113 bc175c27 Assos Assos
        watchdog('ldap_servers', '%drupal_user_name tansformed to %ldap_username by applying code <code>%code</code>', $watchdog_tokens, WATCHDOG_DEBUG);
1114 85ad3d82 Assos Assos
      }
1115
    }
1116
    else {
1117
      $ldap_username = $drupal_username;
1118
    }
1119
1120 32700c57 Assos Assos
    // Let other modules alter the ldap name.
1121
    $context = [
1122 85ad3d82 Assos Assos
      'ldap_server' => $this,
1123 32700c57 Assos Assos
    ];
1124 85ad3d82 Assos Assos
    drupal_alter('ldap_servers_username_to_ldapname', $ldap_username, $drupal_username, $context);
1125
1126
    return $ldap_username;
1127
1128
  }
1129
1130 bc175c27 Assos Assos
  /**
1131 32700c57 Assos Assos
   * UserUsernameFromLdapEntry.
1132 bc175c27 Assos Assos
   *
1133
   * @param array $ldap_entry
1134 85ad3d82 Assos Assos
   *
1135 bc175c27 Assos Assos
   * @return string
1136
   *   user's username value
1137 85ad3d82 Assos Assos
   */
1138
  public function userUsernameFromLdapEntry($ldap_entry) {
1139
1140
    if ($this->account_name_attr) {
1141
      $accountname = (empty($ldap_entry[$this->account_name_attr][0])) ? FALSE : $ldap_entry[$this->account_name_attr][0];
1142
    }
1143 32700c57 Assos Assos
    elseif ($this->user_attr) {
1144 85ad3d82 Assos Assos
      $accountname = (empty($ldap_entry[$this->user_attr][0])) ? FALSE : $ldap_entry[$this->user_attr][0];
1145
    }
1146
    else {
1147
      $accountname = FALSE;
1148
    }
1149
1150
    return $accountname;
1151
  }
1152
1153 bc175c27 Assos Assos
  /**
1154 32700c57 Assos Assos
   * UserUsernameFromDn.
1155 85ad3d82 Assos Assos
   *
1156 bc175c27 Assos Assos
   * @param string $dn
1157
   *
1158
   * @return mixed
1159
   *   string user's username value of FALSE
1160 85ad3d82 Assos Assos
   */
1161
  public function userUsernameFromDn($dn) {
1162
1163 32700c57 Assos Assos
    $ldap_entry = @$this->dnExists($dn, 'ldap_entry', []);
1164 85ad3d82 Assos Assos
    if (!$ldap_entry || !is_array($ldap_entry)) {
1165
      return FALSE;
1166
    }
1167
    else {
1168
      return $this->userUsernameFromLdapEntry($ldap_entry);
1169
    }
1170
1171
  }
1172
1173
  /**
1174
   * @param ldap entry array $ldap_entry
1175
   *
1176
   * @return string user's mail value or FALSE if none present
1177
   */
1178
  public function userEmailFromLdapEntry($ldap_entry) {
1179
1180 32700c57 Assos Assos
    // Not using template.
1181
    if ($ldap_entry && $this->mail_attr) {
1182 85ad3d82 Assos Assos
      $mail = isset($ldap_entry[$this->mail_attr][0]) ? $ldap_entry[$this->mail_attr][0] : FALSE;
1183
      return $mail;
1184
    }
1185 32700c57 Assos Assos
    // Template is of form [cn]@illinois.edu.
1186
    elseif ($ldap_entry && $this->mail_template) {
1187 85ad3d82 Assos Assos
      ldap_servers_module_load_include('inc', 'ldap_servers', 'ldap_servers.functions');
1188
      return ldap_servers_token_replace($ldap_entry, $this->mail_template, 'ldap_entry');
1189
    }
1190
    else {
1191
      return FALSE;
1192
    }
1193
  }
1194
1195 32700c57 Assos Assos
  /**
1196
   * @param array $ldap_entry
1197
   *
1198
   * @return object|bool
1199 bc175c27 Assos Assos
   *   Drupal file object image user's thumbnail or FALSE if none present or
1200
   *   ERROR happens.
1201 32700c57 Assos Assos
   */
1202
  public function userPictureFromLdapEntry($ldap_entry, $drupal_username = FALSE) {
1203
    if ($ldap_entry && $this->picture_attr) {
1204
      // Check if ldap entry has been provisioned.
1205
      $image_data = isset($ldap_entry[$this->picture_attr][0]) ? $ldap_entry[$this->picture_attr][0] : FALSE;
1206
      if (!$image_data) {
1207
        return FALSE;
1208
      }
1209 85ad3d82 Assos Assos
1210 32700c57 Assos Assos
      $md5thumb = md5($image_data);
1211 85ad3d82 Assos Assos
1212 32700c57 Assos Assos
      /**
1213
       * If the existing account already has picture check if it has changed. If
1214 bc175c27 Assos Assos
       * so remove the old file and create the new one. If a picture is not set
1215
       * but the account has an md5 hash, something is wrong and we exit.
1216 32700c57 Assos Assos
       */
1217
      if ($drupal_username && $account = user_load_by_name($drupal_username)) {
1218 bc175c27 Assos Assos
        if ($account->uid == 0 || $account->uid == 1) {
1219 85ad3d82 Assos Assos
          return FALSE;
1220
        }
1221 bc175c27 Assos Assos
        if (isset($account->picture)) {
1222
          // Check if image has changed.
1223
          if (isset($account->data['ldap_user']['init']['thumb5md']) && $md5thumb === $account->data['ldap_user']['init']['thumb5md']) {
1224
            // No change, return same image.
1225
            $account->picture->md5Sum = $md5thumb;
1226 85ad3d82 Assos Assos
            return $account->picture;
1227
          }
1228
          else {
1229 bc175c27 Assos Assos
            // Image is different, remove file object.
1230
            if (is_object($account->picture)) {
1231 85ad3d82 Assos Assos
              file_delete($account->picture, TRUE);
1232
            }
1233 bc175c27 Assos Assos
            elseif (is_string($account->picture)) {
1234 85ad3d82 Assos Assos
              $file = file_load(intval($account->picture));
1235
              file_delete($file, TRUE);
1236
            }
1237
          }
1238
        }
1239
        elseif (isset($account->data['ldap_user']['init']['thumb5md'])) {
1240 bc175c27 Assos Assos
          watchdog('ldap_servers', "Some error happened during thumbnailPhoto sync.");
1241 85ad3d82 Assos Assos
          return FALSE;
1242
        }
1243
      }
1244 bc175c27 Assos Assos
      return $this->savePictureData($image_data, $md5thumb);
1245
    }
1246
    return FALSE;
1247 32700c57 Assos Assos
  }
1248 85ad3d82 Assos Assos
1249
  /**
1250 bc175c27 Assos Assos
   * @param $image_data
1251
   * @param $md5thumb
1252 32700c57 Assos Assos
   *
1253
   * @return bool|\stdClass
1254 bc175c27 Assos Assos
   */
1255
  private function savePictureData($image_data, $md5thumb) {
1256 32700c57 Assos Assos
    // Create tmp file to get image format.
1257 bc175c27 Assos Assos
    $filename = uniqid();
1258
    $fileuri = file_directory_temp() . '/' . $filename;
1259
    $size = file_put_contents($fileuri, $image_data);
1260
    $info = image_get_info($fileuri);
1261
    unlink($fileuri);
1262 32700c57 Assos Assos
    // Create file object.
1263 bc175c27 Assos Assos
    $file = file_save_data($image_data, file_default_scheme() . '://' . variable_get('user_picture_path') . '/' . $filename . '.' . $info['extension']);
1264
    $file->md5Sum = $md5thumb;
1265 32700c57 Assos Assos
    // Standard Drupal validators for user pictures.
1266 bc175c27 Assos Assos
    $validators = [
1267
      'file_validate_is_image' => [],
1268
      'file_validate_image_resolution' => [variable_get('user_picture_dimensions', '85x85')],
1269
      'file_validate_size' => [variable_get('user_picture_file_size', '30') * 1024],
1270
    ];
1271
    $errors = file_validate($file, $validators);
1272
    if (empty($errors)) {
1273
      return $file;
1274
    }
1275
    else {
1276
      foreach ($errors as $err => $err_val) {
1277
        watchdog('ldap_servers', "Error storing picture: %error", ["%error" => $err_val], WATCHDOG_ERROR);
1278
      }
1279
      return FALSE;
1280
    }
1281
  }
1282
1283
  /**
1284
   * @param array $ldap_entry
1285 85ad3d82 Assos Assos
   *
1286 32700c57 Assos Assos
   * @return string
1287
   *   user's PUID or permanent user id (within ldap), converted from binary, if applicable
1288 85ad3d82 Assos Assos
   */
1289
  public function userPuidFromLdapEntry($ldap_entry) {
1290
1291
    if ($this->unique_persistent_attr
1292
        && isset($ldap_entry[$this->unique_persistent_attr][0])
1293
        && is_scalar($ldap_entry[$this->unique_persistent_attr][0])
1294
        ) {
1295 be58a50c Assos Assos
      if (is_array($ldap_entry[$this->unique_persistent_attr])) {
1296
        $puid = $ldap_entry[$this->unique_persistent_attr][0];
1297
      }
1298
      else {
1299
        $puid = $ldap_entry[$this->unique_persistent_attr];
1300
      }
1301 85ad3d82 Assos Assos
      return ($this->unique_persistent_attr_binary) ? ldap_servers_binary($puid) : $puid;
1302
    }
1303
    else {
1304
      return FALSE;
1305
    }
1306
  }
1307
1308 bc175c27 Assos Assos
  /**
1309 32700c57 Assos Assos
   * @param mixed $user
1310
   *   - drupal user object (stdClass Object)
1311 85ad3d82 Assos Assos
   *    - ldap entry of user (array)
1312
   *    - ldap dn of user (string)
1313
   *    - drupal username of user (string)
1314
   *
1315 32700c57 Assos Assos
   * @return array $ldap_user_entry (with top level keys of 'dn', 'mail', 'sid' and 'attr' )
1316 bc175c27 Assos Assos
   */
1317 85ad3d82 Assos Assos
  public function user_lookup($user) {
1318
    return $this->userUserToExistingLdapEntry($user);
1319
  }
1320 32700c57 Assos Assos
1321
  /**
1322
   *
1323
   */
1324 85ad3d82 Assos Assos
  public function userUserToExistingLdapEntry($user) {
1325
1326
    if (is_object($user)) {
1327
      $user_ldap_entry = $this->userUserNameToExistingLdapEntry($user->name);
1328
    }
1329
    elseif (is_array($user)) {
1330
      $user_ldap_entry = $user;
1331
    }
1332
    elseif (is_scalar($user)) {
1333 32700c57 Assos Assos
      // Username.
1334
      if (strpos($user, '=') === FALSE) {
1335 85ad3d82 Assos Assos
        $user_ldap_entry = $this->userUserNameToExistingLdapEntry($user);
1336
      }
1337
      else {
1338
        $user_ldap_entry = $this->dnExists($user, 'ldap_entry');
1339
      }
1340
    }
1341
    return $user_ldap_entry;
1342
  }
1343
1344
  /**
1345
   * Queries LDAP server for the user.
1346
   *
1347
   * @param string $drupal_user_name
1348
   *
1349
   * @param string or int $prov_event
1350 32700c57 Assos Assos
   *   This could be anything, particularly when used by other modules.
1351
   *   Other modules should use string like 'mymodule_myevent'
1352
   *   LDAP_USER_EVENT_ALL signifies get all attributes needed by all other
1353
   *   contexts/ops.
1354 85ad3d82 Assos Assos
   *
1355 32700c57 Assos Assos
   * @return array
1356
   *   representing ldap data of a user.  for example of returned value.
1357 85ad3d82 Assos Assos
   *   'sid' => ldap server id
1358
   *   'mail' => derived from ldap mail (not always populated).
1359
   *   'dn'   => dn of user
1360
   *   'attr' => single ldap entry array in form returned from ldap_search() extension, e.g.
1361
   *   'dn' => dn of entry
1362
   */
1363 bc175c27 Assos Assos
  public function userUserNameToExistingLdapEntry($drupal_user_name, $ldap_context = NULL) {
1364 85ad3d82 Assos Assos
1365 32700c57 Assos Assos
    $watchdog_tokens = ['%drupal_user_name' => $drupal_user_name];
1366 85ad3d82 Assos Assos
    $ldap_username = $this->userUsernameToLdapNameTransform($drupal_user_name, $watchdog_tokens);
1367
    if (!$ldap_username) {
1368
      return FALSE;
1369
    }
1370
    if (!$ldap_context) {
1371 32700c57 Assos Assos
      $attributes = [];
1372 85ad3d82 Assos Assos
    }
1373
    else {
1374
      $attribute_maps = ldap_servers_attributes_needed($this->sid, $ldap_context);
1375
      $attributes = array_keys($attribute_maps);
1376
    }
1377
1378
    foreach ($this->basedn as $basedn) {
1379 32700c57 Assos Assos
      if (empty($basedn)) {
1380
        continue;
1381
      }
1382 85ad3d82 Assos Assos
      $filter = '(' . $this->user_attr . '=' . ldap_server_massage_text($ldap_username, 'attr_value', LDAP_SERVER_MASSAGE_QUERY_LDAP) . ')';
1383
      $result = $this->search($basedn, $filter, $attributes);
1384 32700c57 Assos Assos
      if (!$result || !isset($result['count']) || !$result['count']) {
1385
        continue;
1386
      }
1387 85ad3d82 Assos Assos
1388
      // Must find exactly one user for authentication to work.
1389
      if ($result['count'] != 1) {
1390
        $count = $result['count'];
1391 32700c57 Assos Assos
        watchdog('ldap_servers', "Error: !count users found with $filter under $basedn.", ['!count' => $count], WATCHDOG_ERROR);
1392 85ad3d82 Assos Assos
        continue;
1393
      }
1394
      $match = $result[0];
1395
      // These lines serve to fix the attribute name in case a
1396
      // naughty server (i.e.: MS Active Directory) is messing the
1397
      // characters' case.
1398
      // This was contributed by Dan "Gribnif" Wilga, and described
1399
      // here: http://drupal.org/node/87833
1400
      $name_attr = $this->user_attr;
1401
1402
      if (isset($match[$name_attr][0])) {
1403 32700c57 Assos Assos
        // Leave name.
1404 85ad3d82 Assos Assos
      }
1405
      elseif (isset($match[drupal_strtolower($name_attr)][0])) {
1406
        $name_attr = drupal_strtolower($name_attr);
1407
1408
      }
1409
      else {
1410
        if ($this->bind_method == LDAP_SERVERS_BIND_METHOD_ANON_USER) {
1411 32700c57 Assos Assos
          $result = [
1412 bc175c27 Assos Assos
            'dn' => $match['dn'],
1413 85ad3d82 Assos Assos
            'mail' => $this->userEmailFromLdapEntry($match),
1414
            'attr' => $match,
1415
            'sid' => $this->sid,
1416 32700c57 Assos Assos
          ];
1417 85ad3d82 Assos Assos
          return $result;
1418
        }
1419
        else {
1420
          continue;
1421
        }
1422
      }
1423
1424
      // Finally, we must filter out results with spaces added before
1425
      // or after, which are considered OK by LDAP but are no good for us
1426
      // We allow lettercase independence, as requested by Marc Galera
1427
      // on http://drupal.org/node/97728
1428
      //
1429
      // Some setups have multiple $name_attr per entry, as pointed out by
1430
      // Clarence "sparr" Risher on http://drupal.org/node/102008, so we
1431
      // loop through all possible options.
1432
      foreach ($match[$name_attr] as $value) {
1433
        if (drupal_strtolower(trim($value)) == drupal_strtolower($ldap_username)) {
1434 32700c57 Assos Assos
          $result = [
1435 bc175c27 Assos Assos
            'dn' => $match['dn'],
1436 85ad3d82 Assos Assos
            'mail' => $this->userEmailFromLdapEntry($match),
1437
            'attr' => $match,
1438
            'sid' => $this->sid,
1439 32700c57 Assos Assos
          ];
1440 85ad3d82 Assos Assos
          return $result;
1441
        }
1442
      }
1443
    }
1444
  }
1445
1446
  /**
1447
   * Is a user a member of group?
1448
   *
1449 32700c57 Assos Assos
   * @param string $group_dn
1450
   *   MIXED CASE.
1451 85ad3d82 Assos Assos
   * @param mixed $user
1452 32700c57 Assos Assos
   *   - drupal user object (stdClass Object)
1453 85ad3d82 Assos Assos
   *    - ldap entry of user (array)
1454
   *    - ldap dn of user (array)
1455
   *    - drupal user name (string)
1456 32700c57 Assos Assos
   * @param enum $nested
1457
   *   = NULL (default to server configuration), TRUE, or FALSE indicating to
1458
   *   test for nested groups.
1459
   *
1460
   * @return bool
1461 85ad3d82 Assos Assos
   */
1462
  public function groupIsMember($group_dn, $user, $nested = NULL) {
1463
1464
    $nested = ($nested === TRUE || $nested === FALSE) ? $nested : $this->groupNested;
1465
    $group_dns = $this->groupMembershipsFromUser($user, 'group_dns', $nested);
1466 32700c57 Assos Assos
    // While list of group dns is going to be in correct mixed case, $group_dn may not since it may be derived from user entered values
1467
    // so make sure in_array() is case insensitive.
1468 85ad3d82 Assos Assos
    return (is_array($group_dns) && in_array(drupal_strtolower($group_dn), $this->dnArrayToLowerCase($group_dns)));
1469
  }
1470
1471
  /**
1472
   * NOT TESTED
1473 32700c57 Assos Assos
   * add a group entry.
1474 85ad3d82 Assos Assos
   *
1475 32700c57 Assos Assos
   * @param string $group_dn
1476
   *   as ldap dn.
1477
   * @param array $attributes
1478
   *   in key value form
1479
   *   $attributes = array(
1480 85ad3d82 Assos Assos
   *      "attribute1" = "value",
1481
   *      "attribute2" = array("value1", "value2"),
1482
   *      )
1483 32700c57 Assos Assos
   *
1484 85ad3d82 Assos Assos
   * @return boolean success
1485
   */
1486 32700c57 Assos Assos
  public function groupAddGroup($group_dn, $attributes = []) {
1487 85ad3d82 Assos Assos
1488
    if ($this->dnExists($group_dn, 'boolean')) {
1489
      return FALSE;
1490
    }
1491
1492
    $attributes = array_change_key_case($attributes, CASE_LOWER);
1493
    $objectclass = (empty($attributes['objectclass'])) ? $this->groupObjectClass : $attributes['objectclass'];
1494
    $attributes['objectclass'] = $objectclass;
1495
1496
    /**
1497
     * 2. give other modules a chance to add or alter attributes
1498
     */
1499 32700c57 Assos Assos
    $context = [
1500 85ad3d82 Assos Assos
      'action' => 'add',
1501 32700c57 Assos Assos
      'corresponding_drupal_data' => [$group_dn => $attributes],
1502 85ad3d82 Assos Assos
      'corresponding_drupal_data_type' => 'group',
1503 32700c57 Assos Assos
    ];
1504
    $ldap_entries = [$group_dn => $attributes];
1505 85ad3d82 Assos Assos
    drupal_alter('ldap_entry_pre_provision', $ldap_entries, $this, $context);
1506
    $attributes = $ldap_entries[$group_dn];
1507
1508 32700c57 Assos Assos
    /**
1509 85ad3d82 Assos Assos
     * 4. provision ldap entry
1510
     *   @todo how is error handling done here?
1511
     */
1512
    $ldap_entry_created = $this->createLdapEntry($attributes, $group_dn);
1513
1514 32700c57 Assos Assos
    /**
1515 85ad3d82 Assos Assos
     * 5. allow other modules to react to provisioned ldap entry
1516
     *   @todo how is error handling done here?
1517
     */
1518
    if ($ldap_entry_created) {
1519
      module_invoke_all('ldap_entry_post_provision', $ldap_entries, $this, $context);
1520
      return TRUE;
1521
    }
1522
    else {
1523
      return FALSE;
1524
    }
1525
1526
  }
1527
1528
  /**
1529
   * NOT TESTED
1530 32700c57 Assos Assos
   * remove a group entry.
1531 85ad3d82 Assos Assos
   *
1532 32700c57 Assos Assos
   * @param string $group_dn
1533
   *   as ldap dn.
1534
   * @param bool $only_if_group_empty
1535 85ad3d82 Assos Assos
   *   TRUE = group should not be removed if not empty
1536 32700c57 Assos Assos
   *   FALSE = groups should be deleted regardless of members.
1537
   *
1538
   * @return bool
1539 85ad3d82 Assos Assos
   */
1540
  public function groupRemoveGroup($group_dn, $only_if_group_empty = TRUE) {
1541
1542
    if ($only_if_group_empty) {
1543
      $members = $this->groupAllMembers($group_dn);
1544
      if (is_array($members) && count($members) > 0) {
1545
        return FALSE;
1546
      }
1547
    }
1548
1549
    return $this->delete($group_dn);
1550
1551
  }
1552
1553
  /**
1554
   * NOT TESTED
1555 32700c57 Assos Assos
   * add a member to a group.
1556 85ad3d82 Assos Assos
   *
1557 32700c57 Assos Assos
   * @param string $ldap_user_dn
1558
   *   as ldap dn.
1559 85ad3d82 Assos Assos
   * @param mixed $user
1560 32700c57 Assos Assos
   *   - drupal user object (stdClass Object)
1561
   *    - ldap entry of user (array) (with top level keys of 'dn', 'mail',
1562
   *   'sid' and 'attr' )
1563 85ad3d82 Assos Assos
   *    - ldap dn of user (array)
1564
   *    - drupal username of user (string)
1565 32700c57 Assos Assos
   *
1566
   * @return bool
1567 85ad3d82 Assos Assos
   */
1568
  public function groupAddMember($group_dn, $user) {
1569
1570
    $user_ldap_entry = $this->userUserToExistingLdapEntry($user);
1571
    $result = FALSE;
1572
    if ($user_ldap_entry && $this->groupGroupEntryMembershipsConfigured) {
1573 32700c57 Assos Assos
      $add = [];
1574 85ad3d82 Assos Assos
      $add[$this->groupMembershipsAttr] = $user_ldap_entry['dn'];
1575
      $this->connectAndBindIfNotAlready();
1576
      $result = @ldap_mod_add($this->connection, $group_dn, $add);
1577
    }
1578
1579
    return $result;
1580
  }
1581
1582
  /**
1583
   * NOT TESTED
1584 32700c57 Assos Assos
   * remove a member from a group.
1585 85ad3d82 Assos Assos
   *
1586 32700c57 Assos Assos
   * @param string $group_dn
1587
   *   as ldap dn.
1588 85ad3d82 Assos Assos
   * @param mixed $user
1589 32700c57 Assos Assos
   *   - drupal user object (stdClass Object)
1590
   *    - ldap entry of user (array) (with top level keys of 'dn', 'mail',
1591
   *   'sid' and 'attr' )
1592 85ad3d82 Assos Assos
   *    - ldap dn of user (array)
1593
   *    - drupal username of user (string)
1594 32700c57 Assos Assos
   *
1595
   * @return bool
1596 85ad3d82 Assos Assos
   */
1597
  public function groupRemoveMember($group_dn, $user) {
1598
1599
    $user_ldap_entry = $this->userUserToExistingLdapEntry($user);
1600
    $result = FALSE;
1601
    if ($user_ldap_entry && $this->groupGroupEntryMembershipsConfigured) {
1602 32700c57 Assos Assos
      $del = [];
1603 85ad3d82 Assos Assos
      $del[$this->groupMembershipsAttr] = $user_ldap_entry['dn'];
1604
      $this->connectAndBindIfNotAlready();
1605
      $result = @ldap_mod_del($this->connection, $group_dn, $del);
1606
    }
1607
    return $result;
1608
  }
1609
1610
  /**
1611 32700c57 Assos Assos
   * Get all members of a group.
1612 85ad3d82 Assos Assos
   *
1613
   * @todo: NOT IMPLEMENTED: nested groups
1614
   *
1615 32700c57 Assos Assos
   * @param string $group_dn
1616
   *   as ldap dn.
1617 85ad3d82 Assos Assos
   *
1618 32700c57 Assos Assos
   * @return false
1619
   *   on error otherwise array of group members (could be users or groups)
1620 85ad3d82 Assos Assos
   */
1621
  public function groupAllMembers($group_dn) {
1622
    if (!$this->groupGroupEntryMembershipsConfigured) {
1623
      return FALSE;
1624
    }
1625 32700c57 Assos Assos
    $attributes = [$this->groupMembershipsAttr, 'cn'];
1626 85ad3d82 Assos Assos
    $group_entry = $this->dnExists($group_dn, 'ldap_entry', $attributes);
1627
    if (!$group_entry) {
1628
      return FALSE;
1629
    }
1630
    else {
1631 32700c57 Assos Assos
      // If attributes weren't returned, don't give false  empty group.
1632
      if (empty($group_entry['cn'])) {
1633 85ad3d82 Assos Assos
        return FALSE;
1634
      }
1635
      if (empty($group_entry[$this->groupMembershipsAttr])) {
1636 32700c57 Assos Assos
        // If no attribute returned, no members.
1637
        return [];
1638 85ad3d82 Assos Assos
      }
1639
      $members = $group_entry[$this->groupMembershipsAttr];
1640
      if (isset($members['count'])) {
1641
        unset($members['count']);
1642
      }
1643
      return $members;
1644
    }
1645
1646
    $this->groupMembersResursive($current_group_entries, $all_group_dns, $tested_group_ids, 0, $max_levels, $object_classes);
1647
1648
    return $all_group_dns;
1649
1650
  }
1651
1652 bc175c27 Assos Assos
  /**
1653 32700c57 Assos Assos
   * NOT IMPLEMENTED
1654 85ad3d82 Assos Assos
   * recurse through all child groups and add members.
1655
   *
1656 32700c57 Assos Assos
   * @param array $current_group_entries
1657
   *   of ldap group entries that are starting point.  should include at least
1658
   *   1 entry.
1659
   * @param array $all_group_dns
1660
   *   as array of all groups user is a member of.  MIXED CASE VALUES.
1661
   * @param array $tested_group_ids
1662
   *   as array of tested group dn, cn, uid, etc.  MIXED CASE VALUES
1663
   *   whether these value are dn, cn, uid, etc depends on what attribute
1664
   *   members, uniquemember, memberUid contains whatever attribute is in
1665
   *   $this->$tested_group_ids to avoid redundant recursing.
1666
   * @param int $level
1667
   *   of recursion.
1668
   * @param int $max_levels
1669
   *   as max recursion allowed.
1670
   *
1671
   * @return bool
1672 85ad3d82 Assos Assos
   */
1673
  public function groupMembersResursive($current_member_entries, &$all_member_dns, &$tested_group_ids, $level, $max_levels, $object_classes = FALSE) {
1674
1675
    if (!$this->groupGroupEntryMembershipsConfigured || !is_array($current_member_entries) || count($current_member_entries) == 0) {
1676
      return FALSE;
1677
    }
1678
    if (isset($current_member_entries['count'])) {
1679
      unset($current_member_entries['count']);
1680
    };
1681
1682
    foreach ($current_member_entries as $i => $member_entry) {
1683 32700c57 Assos Assos
      // 1.  Add entry itself if of the correct type to $all_member_dns.
1684 85ad3d82 Assos Assos
      $objectClassMatch = (!$object_classes || (count(array_intersect(array_values($member_entry['objectclass']), $object_classes)) > 0));
1685
      $objectIsGroup = in_array($this->groupObjectClass, array_values($member_entry['objectclass']));
1686 32700c57 Assos Assos
      // Add member.
1687
      if ($objectClassMatch && !in_array($member_entry['dn'], $all_member_dns)) {
1688 85ad3d82 Assos Assos
        $all_member_dns[] = $member_entry['dn'];
1689
      }
1690
1691 32700c57 Assos Assos
      // 2. If its a group, keep recurse the group for descendants.
1692 85ad3d82 Assos Assos
      if ($objectIsGroup && $level < $max_levels) {
1693
        if ($this->groupMembershipsAttrMatchingUserAttr == 'dn') {
1694
          $group_id = $member_entry['dn'];
1695
        }
1696
        else {
1697
          $group_id = $member_entry[$this->groupMembershipsAttrMatchingUserAttr][0];
1698
        }
1699 32700c57 Assos Assos
        // 3. skip any groups that have already been tested.
1700 85ad3d82 Assos Assos
        if (!in_array($group_id, $tested_group_ids)) {
1701
          $tested_group_ids[] = $group_id;
1702
          $member_ids = $member_entry[$this->groupMembershipsAttr];
1703
          if (isset($member_ids['count'])) {
1704
            unset($member_ids['count']);
1705
          };
1706 32700c57 Assos Assos
          $ors = [];
1707 85ad3d82 Assos Assos
          foreach ($member_ids as $i => $member_id) {
1708 32700c57 Assos Assos
            // @todo this would be replaced by query template
1709
            $ors[] = $this->groupMembershipsAttr . '=' . ldap_pear_escape_filter_value($member_id);
1710 85ad3d82 Assos Assos
          }
1711
1712
          if (count($ors)) {
1713 32700c57 Assos Assos
            // e.g. (|(cn=group1)(cn=group2)) or   (|(dn=cn=group1,ou=blah...)(dn=cn=group2,ou=blah...))
1714
            $query_for_child_members = '(|(' . join(")(", $ors) . '))';
1715
            // Add or on object classe, otherwise get all object classes.
1716
            if (count($object_classes)) {
1717
              $object_classes_ors = ['(objectClass=' . $this->groupObjectClass . ')'];
1718 85ad3d82 Assos Assos
              foreach ($object_classes as $object_class) {
1719
                $object_classes_ors[] = '(objectClass=' . $object_class . ')';
1720
              }
1721
              $query_for_child_members = '&(|' . join($object_classes_ors) . ')(' . $query_for_child_members . ')';
1722
            }
1723 32700c57 Assos Assos
            // Need to search on all basedns one at a time.
1724
            foreach ($this->basedn as $base_dn) {
1725
              $child_member_entries = $this->search($base_dn, $query_for_child_members, ['objectclass', $this->groupMembershipsAttr, $this->groupMembershipsAttrMatchingUserAttr]);
1726 85ad3d82 Assos Assos
              if ($child_member_entries !== FALSE) {
1727
                $this->groupMembersResursive($child_member_entries, $all_member_dns, $tested_group_ids, $level + 1, $max_levels, $object_classes);
1728
              }
1729
            }
1730
          }
1731
        }
1732
      }
1733
    }
1734
  }
1735
1736
  /**
1737 32700c57 Assos Assos
   * Get list of all groups that a user is a member of.
1738 85ad3d82 Assos Assos
   *
1739
   *    If $nested = TRUE,
1740
   *    list will include all parent group.  That is if user is a member of "programmer" group
1741
   *    and "programmer" group is a member of "it" group, user is a member of
1742
   *    both "programmer" and "it" groups.
1743
   *
1744
   *    If $nested = FALSE, list will only include groups user is in directly.
1745
   *
1746 32700c57 Assos Assos
   * @param mixed
1747
   *   - drupal user object (stdClass Object)
1748 85ad3d82 Assos Assos
   *    - ldap entry of user (array) (with top level keys of 'dn', 'mail', 'sid' and 'attr' )
1749
   *    - ldap dn of user (array)
1750
   *    - drupal username of user (string)
1751 32700c57 Assos Assos
   * @param mixed $return
1752
   *   = 'group_dns'.
1753
   * @param bool $nested
1754
   *   if groups should be recursed or not.
1755 85ad3d82 Assos Assos
   *
1756 32700c57 Assos Assos
   * @return array of groups dns in mixed case or FALSE on error
1757 85ad3d82 Assos Assos
   */
1758
  public function groupMembershipsFromUser($user, $return = 'group_dns', $nested = NULL) {
1759
1760
    $group_dns = FALSE;
1761
    $user_ldap_entry = @$this->userUserToExistingLdapEntry($user);
1762
    if (!$user_ldap_entry || $this->groupFunctionalityUnused) {
1763
      return FALSE;
1764
    }
1765
    if ($nested === NULL) {
1766
      $nested = $this->groupNested;
1767
    }
1768
1769 32700c57 Assos Assos
    // Preferred method.
1770
    if ($this->groupUserMembershipsConfigured) {
1771 85ad3d82 Assos Assos
      $group_dns = $this->groupUserMembershipsFromUserAttr($user_ldap_entry, $nested);
1772
    }
1773
    elseif ($this->groupGroupEntryMembershipsConfigured) {
1774
      $group_dns = $this->groupUserMembershipsFromEntry($user_ldap_entry, $nested);
1775
    }
1776
    else {
1777 32700c57 Assos Assos
      watchdog('ldap_servers', 'groupMembershipsFromUser: Group memberships for server have not been configured.', [], WATCHDOG_WARNING);
1778 85ad3d82 Assos Assos
      return FALSE;
1779
    }
1780
    if ($return == 'group_dns') {
1781
      return $group_dns;
1782
    }
1783
1784
  }
1785
1786
  /**
1787 32700c57 Assos Assos
   * Get list of all groups that a user is a member of by using memberOf attribute first,
1788
   *    then if nesting is true, using group entries to find parent groups.
1789 85ad3d82 Assos Assos
   *
1790
   *    If $nested = TRUE,
1791
   *    list will include all parent group.  That is if user is a member of "programmer" group
1792
   *    and "programmer" group is a member of "it" group, user is a member of
1793
   *    both "programmer" and "it" groups.
1794
   *
1795
   *    If $nested = FALSE, list will only include groups user is in directly.
1796
   *
1797 32700c57 Assos Assos
   * @param mixed
1798
   *   - drupal user object (stdClass Object)
1799 85ad3d82 Assos Assos
   *    - ldap entry of user (array) (with top level keys of 'dn', 'mail', 'sid' and 'attr' )
1800
   *    - ldap dn of user (array)
1801
   *    - drupal username of user (string)
1802 32700c57 Assos Assos
   * @param bool $nested
1803
   *   if groups should be recursed or not.
1804 85ad3d82 Assos Assos
   *
1805 32700c57 Assos Assos
   * @return array of group dns
1806 85ad3d82 Assos Assos
   */
1807
  public function groupUserMembershipsFromUserAttr($user, $nested = NULL) {
1808
1809
    if (!$this->groupUserMembershipsConfigured) {
1810
      return FALSE;
1811
    }
1812
    if ($nested === NULL) {
1813
      $nested = $this->groupNested;
1814
    }
1815
1816
    $not_user_ldap_entry = empty($user['attr'][$this->groupUserMembershipsAttr]);
1817 32700c57 Assos Assos
    // If drupal user passed in, try to get user_ldap_entry.
1818
    if ($not_user_ldap_entry) {
1819 85ad3d82 Assos Assos
      $user = $this->userUserToExistingLdapEntry($user);
1820
      $not_user_ldap_entry = empty($user['attr'][$this->groupUserMembershipsAttr]);
1821
      if ($not_user_ldap_entry) {
1822 32700c57 Assos Assos
        // user's membership attribute is not present.  either misconfigured or query failed.
1823
        return FALSE;
1824 85ad3d82 Assos Assos
      }
1825
    }
1826 32700c57 Assos Assos
    // If not exited yet, $user must be user_ldap_entry.
1827 85ad3d82 Assos Assos
    $user_ldap_entry = $user;
1828 32700c57 Assos Assos
    $all_group_dns = [];
1829
    $tested_group_ids = [];
1830 85ad3d82 Assos Assos
    $level = 0;
1831
1832
    $member_group_dns = $user_ldap_entry['attr'][$this->groupUserMembershipsAttr];
1833
    if (isset($member_group_dns['count'])) {
1834
      unset($member_group_dns['count']);
1835
    }
1836 32700c57 Assos Assos
    $ors = [];
1837 85ad3d82 Assos Assos
    foreach ($member_group_dns as $i => $member_group_dn) {
1838
      $all_group_dns[] = $member_group_dn;
1839
      if ($nested) {
1840
        if ($this->groupMembershipsAttrMatchingUserAttr == 'dn') {
1841
          $member_value = $member_group_dn;
1842
        }
1843
        else {
1844
          $member_value = ldap_servers_get_first_rdn_value_from_dn($member_group_dn, $this->groupMembershipsAttrMatchingUserAttr);
1845
        }
1846 bc175c27 Assos Assos
        $ors[] = $this->groupMembershipsAttr . '=' . ldap_pear_escape_filter_value($member_value);
1847 85ad3d82 Assos Assos
      }
1848
    }
1849
1850
    if ($nested && count($ors)) {
1851
      $count = count($ors);
1852 32700c57 Assos Assos
      // Only 50 or so per query.
1853
      for ($i = 0; $i < $count; $i = $i + LDAP_SERVER_LDAP_QUERY_CHUNK) {
1854 85ad3d82 Assos Assos
        $current_ors = array_slice($ors, $i, LDAP_SERVER_LDAP_QUERY_CHUNK);
1855 32700c57 Assos Assos
        // e.g. (|(cn=group1)(cn=group2)) or   (|(dn=cn=group1,ou=blah...)(dn=cn=group2,ou=blah...))
1856
        $or = '(|(' . join(")(", $current_ors) . '))';
1857 85ad3d82 Assos Assos
        $query_for_parent_groups = '(&(objectClass=' . $this->groupObjectClass . ')' . $or . ')';
1858
1859 32700c57 Assos Assos
        // Need to search on all basedns one at a time.
1860
        foreach ($this->basedn as $base_dn) {
1861
          // No attributes, just dns needed.
1862
          $group_entries = $this->search($base_dn, $query_for_parent_groups);
1863 85ad3d82 Assos Assos
          if ($group_entries !== FALSE  && $level < LDAP_SERVER_LDAP_QUERY_RECURSION_LIMIT) {
1864
            $this->groupMembershipsFromEntryRecursive($group_entries, $all_group_dns, $tested_group_ids, $level + 1, LDAP_SERVER_LDAP_QUERY_RECURSION_LIMIT);
1865
          }
1866
        }
1867
      }
1868
    }
1869
1870
    return $all_group_dns;
1871
  }
1872
1873
  /**
1874 32700c57 Assos Assos
   * Get list of all groups that a user is a member of by querying groups.
1875 85ad3d82 Assos Assos
   *
1876
   *    If $nested = TRUE,
1877
   *    list will include all parent group.  That is if user is a member of "programmer" group
1878
   *    and "programmer" group is a member of "it" group, user is a member of
1879
   *    both "programmer" and "it" groups.
1880
   *
1881
   *    If $nested = FALSE, list will only include groups user is in directly.
1882
   *
1883 32700c57 Assos Assos
   * @param mixed
1884
   *   - drupal user object (stdClass Object)
1885 85ad3d82 Assos Assos
   *    - ldap entry of user (array) (with top level keys of 'dn', 'mail', 'sid' and 'attr' )
1886
   *    - ldap dn of user (array)
1887
   *    - drupal username of user (string)
1888 32700c57 Assos Assos
   * @param bool $nested
1889
   *   if groups should be recursed or not.
1890 85ad3d82 Assos Assos
   *
1891 32700c57 Assos Assos
   * @return array of group dns MIXED CASE VALUES
1892 85ad3d82 Assos Assos
   *
1893 32700c57 Assos Assos
   * @see tests/DeriveFromEntry/ldap_servers.inc for fuller notes and test example
1894 85ad3d82 Assos Assos
   */
1895
  public function groupUserMembershipsFromEntry($user, $nested = NULL) {
1896
1897
    if (!$this->groupGroupEntryMembershipsConfigured) {
1898
      return FALSE;
1899
    }
1900
    if ($nested === NULL) {
1901
      $nested = $this->groupNested;
1902
    }
1903
1904
    $user_ldap_entry = $this->userUserToExistingLdapEntry($user);
1905
1906 32700c57 Assos Assos
    // MIXED CASE VALUES.
1907
    $all_group_dns = [];
1908
    // Array of dns already tested to avoid excess queries MIXED CASE VALUES.
1909
    $tested_group_ids = [];
1910 85ad3d82 Assos Assos
    $level = 0;
1911
1912
    if ($this->groupMembershipsAttrMatchingUserAttr == 'dn') {
1913
      $member_value = $user_ldap_entry['dn'];
1914
    }
1915
    else {
1916
      $member_value = $user_ldap_entry['attr'][$this->groupMembershipsAttrMatchingUserAttr][0];
1917
    }
1918
    $member_value = ldap_pear_escape_filter_value($member_value);
1919
    if ($this->groupObjectClass == '') {
1920
      $group_query = '(' . $this->groupMembershipsAttr . "=$member_value)";
1921
    }
1922
    else {
1923
      $group_query = '(&(objectClass=' . $this->groupObjectClass . ')(' . $this->groupMembershipsAttr . "=$member_value))";
1924
    }
1925
1926 32700c57 Assos Assos
    // Need to search on all basedns one at a time.
1927
    foreach ($this->basedn as $base_dn) {
1928
      // Only need dn, so empty array forces return of no attributes.
1929
      $group_entries = $this->search($base_dn, $group_query, []);
1930 85ad3d82 Assos Assos
      if ($group_entries !== FALSE) {
1931
        $max_levels = ($nested) ? LDAP_SERVER_LDAP_QUERY_RECURSION_LIMIT : 0;
1932
        $this->groupMembershipsFromEntryRecursive($group_entries, $all_group_dns, $tested_group_ids, $level, $max_levels);
1933
      }
1934
    }
1935
1936
    return $all_group_dns;
1937
  }
1938
1939
  /**
1940 32700c57 Assos Assos
   * Recurse through all groups, adding parent groups to $all_group_dns array.
1941
   *
1942
   * @param array $current_group_entries
1943
   *   of ldap group entries that are starting point.  should include at least 1 entry.
1944
   * @param array $all_group_dns
1945
   *   as array of all groups user is a member of.  MIXED CASE VALUES.
1946
   * @param array $tested_group_ids
1947
   *   as array of tested group dn, cn, uid, etc.  MIXED CASE VALUES
1948 85ad3d82 Assos Assos
   *   whether these value are dn, cn, uid, etc depends on what attribute members, uniquemember, memberUid contains
1949 32700c57 Assos Assos
   *   whatever attribute is in $this->$tested_group_ids to avoid redundant recursing.
1950
   * @param int $level
1951
   *   of recursion.
1952
   * @param int $max_levels
1953
   *   as max recursion allowed
1954 85ad3d82 Assos Assos
   *
1955 32700c57 Assos Assos
   *   given set of groups entries ($current_group_entries such as it, hr, accounting),
1956
   *   find parent groups (such as staff, people, users) and add them to list of group memberships ($all_group_dns)
1957 85ad3d82 Assos Assos
   *
1958 32700c57 Assos Assos
   *   (&(objectClass=[$this->groupObjectClass])(|([$this->groupMembershipsAttr]=groupid1)([$this->groupMembershipsAttr]=groupid2))
1959 85ad3d82 Assos Assos
   *
1960
   * @return FALSE for error or misconfiguration, otherwise TRUE.  results are passed by reference.
1961
   */
1962
  public function groupMembershipsFromEntryRecursive($current_group_entries, &$all_group_dns, &$tested_group_ids, $level, $max_levels) {
1963
1964
    if (!$this->groupGroupEntryMembershipsConfigured || !is_array($current_group_entries) || count($current_group_entries) == 0) {
1965
      return FALSE;
1966
    }
1967
    if (isset($current_group_entries['count'])) {
1968
      unset($current_group_entries['count']);
1969
    };
1970
1971 32700c57 Assos Assos
    $ors = [];
1972 85ad3d82 Assos Assos
    foreach ($current_group_entries as $i => $group_entry) {
1973
      if ($this->groupMembershipsAttrMatchingUserAttr == 'dn') {
1974
        $member_id = $group_entry['dn'];
1975
      }
1976 32700c57 Assos Assos
      // Maybe cn, uid, etc is held.
1977
      else {
1978 85ad3d82 Assos Assos
        $member_id = ldap_servers_get_first_rdn_value_from_dn($group_entry['dn'], $this->groupMembershipsAttrMatchingUserAttr);
1979 32700c57 Assos Assos
        if (!$member_id) {
1980
          if ($this->detailed_watchdog_log) {
1981
            watchdog('ldap_servers', 'group_entry: %ge', ['%ge' => pretty_print_ldap_entry($group_entry)]);
1982
          }
1983
          // Group not identified by simple checks yet!
1984
          // examine the entry and see if it matches the configured groupObjectClass
1985
          // TODO do we need to ensure such entry is there?
1986
          $goc = $group_entry['objectclass'];
1987
          // TODO is it always an array?
1988
          if (is_array($goc)) {
1989
            foreach ($goc as $g) {
1990
              $g = drupal_strtolower($g);
1991
              if ($g == $this->groupObjectClass) {
1992
                // Found a group, current user must be member in it - so:
1993
                if ($this->detailed_watchdog_log) {
1994
                  watchdog('ldap_servers', 'adding %mi', ['%mi' => $member_id]);
1995
                }
1996
                $member_id = $group_entry['dn'];
1997
                break;
1998
              }
1999
            }
2000
          }
2001
        }
2002 85ad3d82 Assos Assos
      }
2003
2004
      if ($member_id && !in_array($member_id, $tested_group_ids)) {
2005
        $tested_group_ids[] = $member_id;
2006
        $all_group_dns[] = $group_entry['dn'];
2007 32700c57 Assos Assos
        // Add $group_id (dn, cn, uid) to query.
2008
        $ors[] = $this->groupMembershipsAttr . '=' . ldap_pear_escape_filter_value($member_id);
2009 85ad3d82 Assos Assos
      }
2010
    }
2011
2012
    if ($level < $max_levels && count($ors)) {
2013
      $count = count($ors);
2014 32700c57 Assos Assos
      // Only 50 or so per query.
2015
      for ($i = 0; $i < $count; $i = $i + LDAP_SERVER_LDAP_QUERY_CHUNK) {
2016 85ad3d82 Assos Assos
        $current_ors = array_slice($ors, $i, LDAP_SERVER_LDAP_QUERY_CHUNK);
2017 32700c57 Assos Assos
        // e.g. (|(cn=group1)(cn=group2)) or   (|(dn=cn=group1,ou=blah...)(dn=cn=group2,ou=blah...))
2018
        $or = '(|(' . join(")(", $current_ors) . '))';
2019 85ad3d82 Assos Assos
        $query_for_parent_groups = '(&(objectClass=' . $this->groupObjectClass . ')' . $or . ')';
2020
2021 32700c57 Assos Assos
        // Need to search on all basedns one at a time.
2022
        foreach ($this->basedn as $base_dn) {
2023
          // No attributes, just dns needed.
2024
          $group_entries = $this->search($base_dn, $query_for_parent_groups);
2025 85ad3d82 Assos Assos
          if ($group_entries !== FALSE) {
2026
            $this->groupMembershipsFromEntryRecursive($group_entries, $all_group_dns, $tested_group_ids, $level + 1, $max_levels);
2027
          }
2028
        }
2029
      }
2030
    }
2031
2032
    return TRUE;
2033
  }
2034
2035 bc175c27 Assos Assos
  /**
2036 32700c57 Assos Assos
   * Get "groups" from derived from DN.  Has limited usefulness.
2037 85ad3d82 Assos Assos
   *
2038 32700c57 Assos Assos
   * @param mixed
2039
   *   - drupal user object (stdClass Object)
2040 85ad3d82 Assos Assos
   *    - ldap entry of user (array) (with top level keys of 'dn', 'mail', 'sid' and 'attr' )
2041
   *    - ldap dn of user (array)
2042
   *    - drupal username of user (string)
2043
   *
2044 32700c57 Assos Assos
   * @return array of group strings
2045 85ad3d82 Assos Assos
   */
2046
  public function groupUserMembershipsFromDn($user) {
2047
2048
    if (!$this->groupDeriveFromDn || !$this->groupDeriveFromDnAttr) {
2049
      return FALSE;
2050
    }
2051
    elseif ($user_ldap_entry = $this->userUserToExistingLdapEntry($user)) {
2052
      return ldap_servers_get_all_rdn_values_from_dn($user_ldap_entry['dn'], $this->groupDeriveFromDnAttr);
2053
    }
2054
    else {
2055
      return FALSE;
2056
    }
2057
2058
  }
2059 32700c57 Assos Assos
2060 85ad3d82 Assos Assos
  /**
2061
   * Error methods and properties.
2062
   */
2063
2064
  public $detailedWatchdogLog = FALSE;
2065
  protected $_errorMsg = NULL;
2066
  protected $_hasError = FALSE;
2067
  protected $_errorName = NULL;
2068
2069 32700c57 Assos Assos
  /**
2070
   *
2071
   */
2072 85ad3d82 Assos Assos
  public function setError($_errorName, $_errorMsgText = NULL) {
2073
    $this->_errorMsgText = $_errorMsgText;
2074
    $this->_errorName = $_errorName;
2075
    $this->_hasError = TRUE;
2076
  }
2077
2078 32700c57 Assos Assos
  /**
2079
   *
2080
   */
2081 85ad3d82 Assos Assos
  public function clearError() {
2082
    $this->_hasError = FALSE;
2083
    $this->_errorMsg = NULL;
2084
    $this->_errorName = NULL;
2085
  }
2086
2087 32700c57 Assos Assos
  /**
2088
   *
2089
   */
2090 85ad3d82 Assos Assos
  public function hasError() {
2091
    return ($this->_hasError || $this->ldapErrorNumber());
2092
  }
2093
2094 32700c57 Assos Assos
  /**
2095
   *
2096
   */
2097 85ad3d82 Assos Assos
  public function errorMsg($type = NULL) {
2098
    if ($type == 'ldap' && $this->connection) {
2099
      return ldap_err2str(ldap_errno($this->connection));
2100
    }
2101
    elseif ($type == NULL) {
2102
      return $this->_errorMsg;
2103
    }
2104
    else {
2105
      return NULL;
2106
    }
2107
  }
2108
2109 32700c57 Assos Assos
  /**
2110
   *
2111
   */
2112 85ad3d82 Assos Assos
  public function errorName($type = NULL) {
2113
    if ($type == 'ldap' && $this->connection) {
2114
      return "LDAP Error: " . ldap_error($this->connection);
2115
    }
2116
    elseif ($type == NULL) {
2117
      return $this->_errorName;
2118
    }
2119
    else {
2120
      return NULL;
2121
    }
2122
  }
2123
2124 32700c57 Assos Assos
  /**
2125
   *
2126
   */
2127 85ad3d82 Assos Assos
  public function ldapErrorNumber() {
2128
    if ($this->connection && ldap_errno($this->connection)) {
2129
      return ldap_errno($this->connection);
2130
    }
2131
    else {
2132
      return FALSE;
2133
    }
2134
  }
2135
2136
}
2137
2138
/**
2139
 * Class for enabling rebind functionality for following referrrals.
2140
 */
2141
class LdapServersRebindHandler {
2142
2143
  private $bind_dn = 'Anonymous';
2144
  private $bind_passwd = '';
2145
2146 32700c57 Assos Assos
  /**
2147
   *
2148
   */
2149
  public function __construct($bind_user_dn, $bind_user_passwd) {
2150 85ad3d82 Assos Assos
    $this->bind_dn = $bind_user_dn;
2151
    $this->bind_passwd = $bind_user_passwd;
2152
  }
2153
2154 32700c57 Assos Assos
  /**
2155
   *
2156
   */
2157
  public function rebind_callback($ldap, $referral) {
2158
    // Ldap options.
2159 85ad3d82 Assos Assos
    ldap_set_option($ldap, LDAP_OPT_PROTOCOL_VERSION, 3);
2160
    ldap_set_option($ldap, LDAP_OPT_REFERRALS, 1);
2161 32700c57 Assos Assos
    ldap_set_rebind_proc($ldap, [$this, 'rebind_callback']);
2162 85ad3d82 Assos Assos
2163 32700c57 Assos Assos
    // Bind to new host, assumes initial bind dn has access to the referred servers.
2164 85ad3d82 Assos Assos
    if (!ldap_bind($ldap, $this->bind_dn, $this->bind_passwd)) {
2165
      echo "Could not bind to referral server: $referral";
2166
      return 1;
2167
    }
2168
    return 0;
2169
  }
2170 32700c57 Assos Assos
2171 85ad3d82 Assos Assos
}