summaryrefslogtreecommitdiff
path: root/program/lib/Net/LDAP3.php
diff options
context:
space:
mode:
Diffstat (limited to 'program/lib/Net/LDAP3.php')
-rw-r--r--program/lib/Net/LDAP3.php2618
1 files changed, 2618 insertions, 0 deletions
diff --git a/program/lib/Net/LDAP3.php b/program/lib/Net/LDAP3.php
new file mode 100644
index 000000000..1b3ac73bb
--- /dev/null
+++ b/program/lib/Net/LDAP3.php
@@ -0,0 +1,2618 @@
+<?php
+/*
+ +-----------------------------------------------------------------------+
+ | Net/LDAP3.php |
+ | |
+ | Based on code created by the Roundcube Webmail team. |
+ | |
+ | Copyright (C) 2006-2014, The Roundcube Dev Team |
+ | Copyright (C) 2012-2014, Kolab Systems AG |
+ | |
+ | Licensed under the GNU General Public License version 3 or |
+ | any later version with exceptions for plugins. |
+ | See the README file for a full license statement. |
+ | |
+ | PURPOSE: |
+ | Provide advanced functionality for accessing LDAP directories |
+ | |
+ +-----------------------------------------------------------------------+
+ | Authors: Thomas Bruederli <roundcube@gmail.com> |
+ | Aleksander Machniak <machniak@kolabsys.com> |
+ | Jeroen van Meeuwen <vanmeeuwen@kolabsys.com> |
+ +-----------------------------------------------------------------------+
+*/
+
+require_once __DIR__ . '/LDAP3/Result.php';
+
+/**
+ * Model class to access a LDAP directories
+ *
+ * @package Net_LDAP3
+ */
+class Net_LDAP3
+{
+ public $conn;
+ public $vlv_active = false;
+
+ private $attribute_level_rights_map = array(
+ "r" => "read",
+ "s" => "search",
+ "w" => "write",
+ "o" => "delete",
+ "c" => "compare",
+ "W" => "write",
+ "O" => "delete"
+ );
+
+ private $entry_level_rights_map = array(
+ "a" => "add",
+ "d" => "delete",
+ "n" => "modrdn",
+ "v" => "read"
+ );
+
+ /*
+ * Manipulate configuration through the config_set and config_get methods.
+ * Available options:
+ * 'debug' => false,
+ * 'hosts' => array(),
+ * 'port' => 389,
+ * 'use_tls' => false,
+ * 'ldap_version' => 3, // using LDAPv3
+ * 'auth_method' => '', // SASL authentication method (for proxy auth), e.g. DIGEST-MD5
+ * 'numsub_filter' => '(objectClass=organizationalUnit)', // with VLV, we also use numSubOrdinates to query the total number of records. Set this filter to get all numSubOrdinates attributes for counting
+ * 'referrals' => false, // Sets the LDAP_OPT_REFERRALS option. Mostly used in multi-domain Active Directory setups
+ * 'network_timeout' => 10, // The timeout (in seconds) for connect + bind arrempts. This is only supported in PHP >= 5.3.0 with OpenLDAP 2.x
+ * 'sizelimit' => 0, // Enables you to limit the count of entries fetched. Setting this to 0 means no limit.
+ * 'timelimit' => 0, // Sets the number of seconds how long is spend on the search. Setting this to 0 means no limit.
+ * 'vlv' => false, // force VLV off
+ * 'config_root_dn' => 'cn=config', // Root DN to read config (e.g. vlv indexes) from
+ * 'service_bind_dn' => 'uid=kolab-service,ou=Special Users,dc=example,dc=org',
+ * 'service_bind_pw' => 'Welcome2KolabSystems',
+ * 'root_dn' => 'dc=example,dc=org',
+ */
+ protected $config = array(
+ 'sizelimit' => 0,
+ 'timelimit' => 0,
+ );
+
+ protected $debug_level = false;
+ protected $list_page = 1;
+ protected $page_size = 10;
+ protected $cache;
+
+ // Use public method config_set('log_hook', $callback) to have $callback be
+ // call_user_func'ed instead of the local log functions.
+ protected $_log_hook;
+
+ // Use public method config_set('config_get_hook', $callback) to have
+ // $callback be call_user_func'ed instead of the local config_get function.
+ protected $_config_get_hook;
+
+ // Use public method config_set('config_set_hook', $callback) to have
+ // $callback be call_user_func'ed instead of the local config_set function.
+ protected $_config_set_hook;
+
+ // Not Yet Implemented
+ // Intended to allow hooking in for the purpose of caching.
+ protected $_result_hook;
+
+ // Runtime. These are not the variables you're looking for.
+ protected $_current_bind_dn;
+ protected $_current_bind_pw;
+ protected $_current_host;
+ protected $_supported_control = array();
+ protected $_vlv_indexes_and_searches;
+
+ /**
+ * Constructor
+ *
+ * @param array $config Configuration parameters that have not already
+ * been initialized. For configuration parameters
+ * that have in fact been set, use the config_set()
+ * method after initialization.
+ */
+ public function __construct($config = array())
+ {
+ if (!empty($config) && is_array($config)) {
+ foreach ($config as $key => $value) {
+ if (empty($this->config[$key])) {
+ $setter = 'config_set_' . $key;
+ if (method_exists($this, $setter)) {
+ $this->$setter($value);
+ }
+ else if (isset($this->$key)) {
+ $this->$key = $value;
+ }
+ else {
+ $this->config[$key] = $value;
+ }
+ }
+ }
+ }
+ }
+
+ /**
+ * Add multiple entries to the directory information tree in one go.
+ */
+ public function add_entries($entries, $attributes = array())
+ {
+ // If $entries is an associative array, it's keys are DNs and its
+ // values are the attributes for that DN.
+ //
+ // If $entries is a non-associative array, the attributes are expected
+ // to be positional in $attributes.
+
+ $result_set = array();
+
+ if (array_keys($entries) == range(0, count($entries) - 1)) {
+ // $entries is sequential
+ if (count($entries) !== count($attributes)) {
+ $this->_error("Wrong entry/attribute count in " . __FUNCTION__);
+ return false;
+ }
+
+ for ($i = 0; $i < count($entries); $i++) {
+ $result_set[$i] = $this->add_entry($entries[$i], $attributes[$i]);
+ }
+ }
+ else {
+ // $entries is associative
+ foreach ($entries as $entry_dn => $entry_attributes) {
+ if (array_keys($attributes) !== range(0, count($attributes)-1)) {
+ // $attributes is associative as well, let's merge these
+ //
+ // $entry_attributes takes precedence, so is in the second
+ // position in array_merge()
+ $entry_attributes = array_merge($attributes, $entry_attributes);
+ }
+
+ $result_set[$entry_dn] = $this->add_entry($entry_dn, $entry_attributes);
+ }
+ }
+
+ return $result_set;
+ }
+
+ /**
+ * Add an entry to the directory information tree.
+ */
+ public function add_entry($entry_dn, $attributes)
+ {
+ // TODO:
+ // - Get entry rdn attribute value from entry_dn and see if it exists in
+ // attributes -> issue warning if so (but not block the operation).
+ $this->_debug("Entry DN", $entry_dn);
+ $this->_debug("Attributes", $attributes);
+
+ foreach ($attributes as $attr_name => $attr_value) {
+ if (empty($attr_value)) {
+ unset($attributes[$attr_name]);
+ }
+ }
+
+ $this->_debug("C: Add $entry_dn: " . json_encode($attributes));
+
+ if (($add_result = ldap_add($this->conn, $entry_dn, $attributes)) == false) {
+ $this->_debug("S: " . ldap_error($this->conn));
+ $this->_debug("S: Adding entry $entry_dn failed. " . ldap_error($this->conn));
+
+ return false;
+ }
+
+ $this->_debug("LDAP: S: OK");
+
+ return true;
+ }
+
+ /**
+ * Add replication agreements and initialize the consumer(s) for
+ * $domain_root_dn.
+ *
+ * Searches the configured replicas for any of the current domain/config
+ * databases, and uses this information to configure the additional
+ * replication for the (new) domain database (at $domain_root_dn).
+ *
+ * Very specific to Netscape-based directory servers, and currently also
+ * very specific to multi-master replication.
+ */
+ public function add_replication_agreements($domain_root_dn)
+ {
+ $replica_hosts = $this->list_replicas();
+
+ if (empty($replica_hosts)) {
+ return;
+ }
+
+ $result = $this->search($this->config_get('config_root_dn'), "(&(objectclass=nsDS5Replica)(nsDS5ReplicaType=3))", "sub");
+
+ if (!$result) {
+ $this->_debug("No replication configuration found.");
+ return;
+ }
+
+ // Preserve the number of replicated databases we have, because the replication ID
+ // can be calculated from the number of databases replicated, and the number of
+ // servers.
+ $num_replica_dbs = $result->count();
+ $replicas = $result->entries(true);
+ $max_replica_agreements = 0;
+
+ foreach ($replicas as $replica_dn => $replica_attrs) {
+ $result = $this->search($replica_dn, "(objectclass=nsDS5ReplicationAgreement)", "sub");
+ if ($result) {
+ if ($max_replica_agreements < $result->count()) {
+ $max_replica_agreements = $result->count();
+ $max_replica_agreements_dn = $replica_dn;
+ }
+ }
+ }
+
+ $max_repl_id = $num_replica_dbs * count($replica_hosts);
+
+ $this->_debug("The current maximum replication ID is $max_repl_id");
+ $this->_debug("The current maximum number of replication agreements for any database is $max_replica_agreements (for $max_replica_agreements_dn)");
+ $this->_debug("With " . count($replica_hosts) . " replicas, the next is " . ($max_repl_id + 1) . " and the last one is " . ($max_repl_id + count($replica_hosts)));
+
+ // Then add the replication agreements
+ foreach ($replica_hosts as $num => $replica_host) {
+ $ldap = new Net_LDAP3($this->config);
+ $ldap->config_set('hosts', array($replica_host));
+ $ldap->connect();
+ $ldap->bind($this->_current_bind_dn, $this->_current_bind_pw);
+
+ $replica_attrs = array(
+ 'cn' => 'replica',
+ 'objectclass' => array(
+ 'top',
+ 'nsds5replica',
+ 'extensibleobject',
+ ),
+ 'nsDS5ReplicaBindDN' => $ldap->get_entry_attribute($replica_dn, "nsDS5ReplicaBindDN"),
+ 'nsDS5ReplicaId' => ($max_repl_id + $num + 1),
+ 'nsDS5ReplicaRoot' => $domain_root_dn,
+ 'nsDS5ReplicaType' => $ldap->get_entry_attribute($replica_dn, "nsDS5ReplicaType"),
+ 'nsds5ReplicaPurgeDelay' => $ldap->get_entry_attribute($replica_dn, "nsds5ReplicaPurgeDelay"),
+ 'nsDS5Flags' => $ldap->get_entry_attribute($replica_dn, "nsDS5Flags")
+ );
+
+ $new_replica_dn = 'cn=replica,cn="' . $domain_root_dn . '",cn=mapping tree,cn=config';
+
+ $this->_debug("Adding $new_replica_dn to $replica_host with attributes: " . var_export($replica_attrs, true));
+
+ $result = $ldap->add_entry($new_replica_dn, $replica_attrs);
+
+ if (!$result) {
+ $this->_error("Could not add replication configuration to database for $domain_root_dn on $replica_host");
+ continue;
+ }
+
+ $result = $ldap->search($replica_dn, "(objectclass=nsDS5ReplicationAgreement)", "sub");
+
+ if (!$result) {
+ $this->_error("Host $replica_host does not have any replication agreements");
+ continue;
+ }
+
+ $entries = $result->entries(true);
+ $replica_agreement_tpl_dn = key($entries);
+
+ $this->_debug("Using " . var_export($replica_agreement_tpl_dn, true) . " as the template for new replication agreements");
+
+ foreach ($replica_hosts as $replicate_to_host) {
+ // Skip the current server
+ if ($replicate_to_host == $replica_host) {
+ continue;
+ }
+
+ $this->_debug("Adding a replication agreement for $domain_root_dn to $replicate_to_host on " . $replica_host);
+
+ $attrs = array(
+ 'objectclass',
+ 'nsDS5ReplicaBindDN',
+ 'nsDS5ReplicaCredentials',
+ 'nsDS5ReplicaTransportInfo',
+ 'nsDS5ReplicaBindMethod',
+ 'nsDS5ReplicaHost',
+ 'nsDS5ReplicaPort'
+ );
+
+ $replica_agreement_attrs = $ldap->get_entry_attributes($replica_agreement_tpl_dn, $attrs);
+ $replica_agreement_attrs['cn'] = array_shift(explode('.', $replicate_to_host)) . str_replace(array('dc=',','), array('_',''), $domain_root_dn);
+ $replica_agreement_attrs['nsDS5ReplicaRoot'] = $domain_root_dn;
+ $replica_agreement_dn = "cn=" . $replica_agreement_attrs['cn'] . "," . $new_replica_dn;
+
+ $this->_debug("Adding $replica_agreement_dn to $replica_host with attributes: " . var_export($replica_agreement_attrs, true));
+
+ $result = $ldap->add_entry($replica_agreement_dn, $replica_agreement_attrs);
+
+ if (!$result) {
+ $this->_error("Failed adding $replica_agreement_dn");
+ }
+ }
+ }
+
+ $server_id = implode('', array_diff($replica_hosts, $this->_server_id_not));
+
+ $this->_debug("About to trigger consumer initialization for replicas on current 'parent': $server_id");
+
+ $result = $this->search($this->config_get('config_root_dn'), "(&(objectclass=nsDS5ReplicationAgreement)(nsds5replicaroot=$domain_root_dn))", "sub");
+
+ if ($result) {
+ foreach ($result->entries(true) as $agreement_dn => $agreement_attrs) {
+ $this->modify_entry_attributes(
+ $agreement_dn,
+ array(
+ 'replace' => array(
+ 'nsds5BeginReplicaRefresh' => 'start',
+ ),
+ )
+ );
+ }
+ }
+ }
+
+ public function attribute_details($attributes = array())
+ {
+ $schema = $this->init_schema();
+
+ if (!$schema) {
+ return array();
+ }
+
+ $attribs = $schema->getAll('attributes');
+
+ $attributes_details = array();
+
+ foreach ($attributes as $attribute) {
+ if (array_key_exists($attribute, $attribs)) {
+ $attrib_details = $attribs[$attribute];
+
+ if (!empty($attrib_details['sup'])) {
+ foreach ($attrib_details['sup'] as $super_attrib) {
+ $_attrib_details = $attribs[$super_attrib];
+ if (is_array($_attrib_details)) {
+ $attrib_details = array_merge($_attrib_details, $attrib_details);
+ }
+ }
+ }
+ }
+ else if (array_key_exists(strtolower($attribute), $attribs)) {
+ $attrib_details = $attribs[strtolower($attribute)];
+
+ if (!empty($attrib_details['sup'])) {
+ foreach ($attrib_details['sup'] as $super_attrib) {
+ $_attrib_details = $attribs[$super_attrib];
+ if (is_array($_attrib_details)) {
+ $attrib_details = array_merge($_attrib_details, $attrib_details);
+ }
+ }
+ }
+ }
+ else {
+ $this->_warning("LDAP: No schema details exist for attribute $attribute (which is strange)");
+ }
+
+ // The relevant parts only, please
+ $attributes_details[$attribute] = array(
+ 'type' => !empty($attrib_details['single-value']) ? 'text' : 'list',
+ 'description' => $attrib_details['desc'],
+ 'syntax' => $attrib_details['syntax'],
+ 'max-length' => $attrib_details['max-length'] ?: false,
+ );
+ }
+
+ return $attributes_details;
+ }
+
+ public function attributes_allowed($objectclasses = array())
+ {
+ $this->_debug("Listing allowed_attributes for objectclasses", $objectclasses);
+
+ if (!is_array($objectclasses) || empty($objectclasses)) {
+ return false;
+ }
+
+ $schema = $this->init_schema();
+ if (!$schema) {
+ return false;
+ }
+
+ $may = array();
+ $must = array();
+ $superclasses = array();
+
+ foreach ($objectclasses as $objectclass) {
+ $superclass = $schema->superclass($objectclass);
+ if (!empty($superclass)) {
+ $superclasses = array_merge($superclass, $superclasses);
+ }
+
+ $_may = $schema->may($objectclass);
+ $_must = $schema->must($objectclass);
+
+ if (is_array($_may)) {
+ $may = array_merge($may, $_may);
+ }
+ if (is_array($_must)) {
+ $must = array_merge($must, $_must);
+ }
+ }
+
+ $may = array_unique($may);
+ $must = array_unique($must);
+ $superclasses = array_unique($superclasses);
+
+ return array('may' => $may, 'must' => $must, 'super' => $superclasses);
+ }
+
+ public function classes_allowed()
+ {
+ $schema = $this->init_schema();
+ if (!$schema) {
+ return false;
+ }
+
+ $list = $schema->getAll('objectclasses');
+ $classes = array();
+
+ foreach ($list as $class) {
+ $classes[] = $class['name'];
+ }
+
+ return $classes;
+ }
+
+ /**
+ * Bind connection with DN and password
+ *
+ * @param string $dn Bind DN
+ * @param string $pass Bind password
+ *
+ * @return boolean True on success, False on error
+ */
+ public function bind($bind_dn, $bind_pw)
+ {
+ if (!$this->conn) {
+ return false;
+ }
+
+ if ($bind_dn == $this->_current_bind_dn) {
+ return true;
+ }
+
+ $this->_debug("C: Bind [dn: $bind_dn] [pass: $bind_pw]");
+
+ if (@ldap_bind($this->conn, $bind_dn, $bind_pw)) {
+ $this->_debug("S: OK");
+ $this->_current_bind_dn = $bind_dn;
+ $this->_current_bind_pw = $bind_pw;
+
+ return true;
+ }
+
+ $this->_debug("S: ".ldap_error($this->conn));
+ $this->_error("Bind failed for dn=$bind_dn: ".ldap_error($this->conn));
+
+ return false;
+ }
+
+ /**
+ * Close connection to LDAP server
+ */
+ public function close()
+ {
+ if ($this->conn) {
+ $this->_debug("C: Close");
+ ldap_unbind($this->conn);
+
+ $this->_current_bind_dn = null;
+ $this->_current_bind_pw = null;
+ $this->conn = null;
+ }
+ }
+
+ /**
+ * Get the value of a configuration item.
+ *
+ * @param string $key Configuration key
+ * @param mixed $default Default value to return
+ */
+ public function config_get($key, $default = null)
+ {
+ if (!empty($this->_config_get_hook)) {
+ return call_user_func_array($this->_config_get_hook, array($key, $value));
+ }
+ else if (method_exists($this, "config_get_{$key}")) {
+ return call_user_func(array($this, "config_get_$key"), $value);
+ }
+ else if (!isset($this->config[$key])) {
+ return $default;
+ }
+ else {
+ return $this->config[$key];
+ }
+ }
+
+ /**
+ * Set a configuration item to value.
+ *
+ * @param string $key Configuration key
+ * @param mixed $value Configuration value
+ */
+ public function config_set($key, $value = null)
+ {
+ if (is_array($key)) {
+ foreach ($key as $k => $v) {
+ $this->config_set($k, $v);
+ }
+ return;
+ }
+
+ if (!empty($this->_config_set_hook)) {
+ call_user_func($this->_config_set_hook, array($key, $value));
+ }
+ else if (method_exists($this, "config_set_{$key}")) {
+ call_user_func_array(array($this, "config_set_$key"), array($value));
+ }
+ else if (isset($this->$key)) {
+ $this->$key = $value;
+ }
+ else {
+ // 'host' option is deprecated
+ if ($key == 'host') {
+ $this->config['hosts'] = (array) $value;
+ }
+ else {
+ $this->config[$key] = $value;
+ }
+ }
+ }
+
+ /**
+ * Establish a connection to the LDAP server
+ */
+ public function connect($host = null)
+ {
+ if (!function_exists('ldap_connect')) {
+ $this->_error("No ldap support in this PHP installation");
+ return false;
+ }
+
+ if (is_resource($this->conn)) {
+ $this->_debug("Connection already exists");
+ return true;
+ }
+
+ $hosts = !empty($host) ? $host : $this->config_get('hosts', array());
+ $port = $this->config_get('port', 389);
+
+ foreach ((array) $hosts as $host) {
+ $this->_debug("C: Connect [$host:$port]");
+
+ if ($lc = @ldap_connect($host, $port)) {
+ if ($this->config_get('use_tls', false) === true) {
+ if (!ldap_start_tls($lc)) {
+ $this->_debug("S: Could not start TLS. " . ldap_error($lc));
+ continue;
+ }
+ }
+
+ $this->_debug("S: OK");
+
+ $ldap_version = $this->config_get('ldap_version', 3);
+ $timeout = $this->config_get('network_timeout');
+ $referrals = $this->config_get('referrals');
+
+ ldap_set_option($lc, LDAP_OPT_PROTOCOL_VERSION, $ldap_version);
+
+ if ($timeout) {
+ ldap_set_option($lc, LDAP_OPT_NETWORK_TIMEOUT, $timeout);
+ }
+
+ if ($referrals !== null) {
+ ldap_set_option($lc, LDAP_OPT_REFERRALS, (bool) $referrals);
+ }
+
+ $this->_current_host = $host;
+ $this->conn = $lc;
+
+ break;
+ }
+
+ $this->_debug("S: NOT OK");
+ }
+
+ if (!is_resource($this->conn)) {
+ $this->_error("Could not connect to LDAP");
+ return false;
+ }
+
+ return true;
+ }
+
+ /**
+ * Shortcut to ldap_delete()
+ */
+ public function delete_entry($entry_dn)
+ {
+ $this->_debug("LDAP: C: Delete $entry_dn");
+
+ if (ldap_delete($this->conn, $entry_dn) === false) {
+ $this->_debug("LDAP: S: " . ldap_error($this->conn));
+ return false;
+ }
+
+ $this->_debug("LDAP: S: OK");
+
+ return true;
+ }
+
+ /**
+ * Deletes specified entry and all entries in the tree
+ */
+ public function delete_entry_recursive($entry_dn)
+ {
+ // searching for sub entries, but not scope sub, just one level
+ $result = $this->search($entry_dn, '(objectclass=*)', 'one');
+
+ if ($result) {
+ $entries = $result->entries(true);
+
+ foreach (array_keys($entries) as $sub_dn) {
+ if (!$this->delete_entry_recursive($sub_dn)) {
+ return false;
+ }
+ }
+ }
+
+ if (!$this->delete_entry($entry_dn)) {
+ return false;
+ }
+
+ return true;
+ }
+
+ public function effective_rights($subject)
+ {
+ $effective_rights_control_oid = "1.3.6.1.4.1.42.2.27.9.5.2";
+
+ $supported_controls = $this->supported_controls();
+
+ if (!in_array($effective_rights_control_oid, $supported_controls)) {
+ $this->_debug("LDAP: No getEffectiveRights control in supportedControls");
+ return false;
+ }
+
+ $attributes = array(
+ 'attributeLevelRights' => array(),
+ 'entryLevelRights' => array(),
+ );
+
+ $output = array();
+ $entry_dn = $this->entry_dn($subject);
+
+ if (!$entry_dn) {
+ $entry_dn = $this->config_get($subject . "_base_dn");
+ }
+ if (!$entry_dn) {
+ $entry_dn = $this->config_get("base_dn");
+ }
+ if (!$entry_dn) {
+ $entry_dn = $this->config_get("root_dn");
+ }
+
+ $this->_debug("effective_rights for subject $subject resolves to entry dn $entry_dn");
+
+ $moz_ldapsearch = "/usr/lib64/mozldap/ldapsearch";
+ if (!is_file($moz_ldapsearch)) {
+ $moz_ldapsearch = "/usr/lib/mozldap/ldapsearch";
+ }
+ if (!is_file($moz_ldapsearch)) {
+ $moz_ldapsearch = null;
+ }
+
+ if (empty($moz_ldapsearch)) {
+ $this->_error("Mozilla LDAP C SDK binary ldapsearch not found, cannot get effective rights on subject $subject");
+ return null;
+ }
+
+ $command = array(
+ $moz_ldapsearch,
+ '-x',
+ '-h',
+ $this->_ldap_server,
+ '-p',
+ $this->_ldap_port,
+ '-b',
+ escapeshellarg($entry_dn),
+ '-D',
+ escapeshellarg($this->_current_bind_dn),
+ '-w',
+ escapeshellarg($this->_current_bind_pw),
+ '-J',
+ escapeshellarg(implode(':', array(
+ $effective_rights_control_oid, // OID
+ 'true', // Criticality
+ 'dn:' . $this->_current_bind_dn // User DN
+ ))),
+ '-s',
+ 'base',
+ '"(objectclass=*)"',
+ '"*"',
+ );
+
+ $command = implode(' ', $command);
+
+ $this->_debug("LDAP: Executing command: $command");
+
+ exec($command, $output, $return_code);
+
+ $this->_debug("LDAP: Command output:" . var_export($output, true));
+ $this->_debug("Return code: " . $return_code);
+
+ if ($return_code) {
+ $this->_error("Command $moz_ldapsearch returned error code: $return_code");
+ return null;
+ }
+
+ $lines = array();
+ foreach ($output as $line_num => $line) {
+ if (substr($line, 0, 1) == " ") {
+ $lines[count($lines)-1] .= trim($line);
+ }
+ else {
+ $lines[] = trim($line);
+ }
+ }
+
+ foreach ($lines as $line) {
+ $line_components = explode(':', $line);
+ $attribute_name = array_shift($line_components);
+ $attribute_value = trim(implode(':', $line_components));
+
+ switch ($attribute_name) {
+ case "attributeLevelRights":
+ $attributes[$attribute_name] = $this->parse_attribute_level_rights($attribute_value);
+ break;
+ case "dn":
+ $attributes[$attribute_name] = $attribute_value;
+ break;
+ case "entryLevelRights":
+ $attributes[$attribute_name] = $this->parse_entry_level_rights($attribute_value);
+ break;
+
+ default:
+ break;
+ }
+ }
+
+ return $attributes;
+ }
+
+ /**
+ * Resolve entry data to entry DN
+ *
+ * @param string $subject Entry string (e.g. entry DN or unique attribute value)
+ * @param array $attributes Additional attributes
+ * @param string $base_dn Optional base DN
+ *
+ * @return string Entry DN string
+ */
+ public function entry_dn($subject, $attributes = array(), $base_dn = null)
+ {
+ $this->_debug("entry_dn on subject $subject");
+ $is_dn = ldap_explode_dn($subject, 1);
+
+ if (is_array($is_dn) && array_key_exists("count", $is_dn) && $is_dn["count"] > 0) {
+ $this->_debug("$subject is a dn");
+ return $subject;
+ }
+
+ $this->_debug("$subject is not a dn");
+
+ if (strlen($subject) < 32 || preg_match('/[^a-fA-F0-9-]/', $subject)) {
+ $this->_debug("$subject is not a unique identifier");
+ return;
+ }
+
+ $unique_attr = $this->config_get('unique_attribute', 'nsuniqueid');
+
+ $this->_debug("Using unique_attribute " . var_export($unique_attr, true) . " at " . __FILE__ . ":" . __LINE__);
+
+ $attributes = array_merge(array($unique_attr => $subject), (array)$attributes);
+ $subject = $this->entry_find_by_attribute($attributes, $base_dn);
+
+ if (!empty($subject)) {
+ return key($subject);
+ }
+ }
+
+ public function entry_find_by_attribute($attributes, $base_dn = null)
+ {
+ $this->_debug("Net_LDAP3::entry_find_by_attribute(\$attributes, \$base_dn) called with base_dn", $base_dn, "and attributes", $attributes);
+
+ if (empty($attributes) || !is_array($attributes)) {
+ return false;
+ }
+
+ if (empty($attributes[key($attributes)])) {
+ return false;
+ }
+
+ $filter = count($attributes) ? "(&" : "";
+
+ foreach ($attributes as $key => $value) {
+ $filter .= "(" . $key . "=" . $value . ")";
+ }
+
+ $filter .= count($attributes) ? ")" : "";
+
+ if (empty($base_dn)) {
+ $base_dn = $this->config_get('root_dn');
+ $this->_debug("Using base_dn from domain " . $this->domain . ": " . $base_dn);
+ }
+
+ $result = $this->search($base_dn, $filter, 'sub', array_keys($attributes));
+
+ if ($result && $result->count() > 0) {
+ $this->_debug("Results found: " . implode(', ', array_keys($result->entries(true))));
+ return $result->entries(true);
+ }
+ else {
+ $this->_debug("No result");
+ return false;
+ }
+ }
+
+ public function find_user_groups($member_dn)
+ {
+ $groups = array();
+ $root_dn = $this->config_get('root_dn');
+
+ // TODO: Do not query for both, it's either one or the other
+ $entries = $this->search($root_dn, "(|" .
+ "(&(objectclass=groupofnames)(member=$member_dn))" .
+ "(&(objectclass=groupofuniquenames)(uniquemember=$member_dn))" .
+ ")"
+ );
+
+ if ($entries) {
+ $groups = array_keys($entries->entries(true));
+ }
+
+ return $groups;
+ }
+
+ public function get_entry_attribute($subject_dn, $attribute)
+ {
+ $entry = $this->get_entry_attributes($subject_dn, (array)$attribute);
+
+ return $entry[strtolower($attribute)];
+ }
+
+ public function get_entry_attributes($subject_dn, $attributes)
+ {
+ // @TODO: use get_entry?
+ $result = $this->search($subject_dn, '(objectclass=*)', 'base', $attributes);
+
+ if (!$result) {
+ return array();
+ }
+
+ $entries = $result->entries(true);
+ $entry_dn = key($entries);
+ $entry = $entries[$entry_dn];
+
+ return $entry;
+ }
+
+ /**
+ * Get a specific LDAP entry, identified by its DN
+ *
+ * @param string $dn Record identifier
+ * @param array $attributes Attributes to return
+ *
+ * @return array Hash array
+ */
+ public function get_entry($dn, $attributes = array())
+ {
+ $rec = null;
+
+ if ($this->conn && $dn) {
+ $this->_debug("C: Read [dn: $dn] [(objectclass=*)]");
+
+ if ($ldap_result = @ldap_read($this->conn, $dn, '(objectclass=*)', $attributes)) {
+ $this->_debug("S: OK");
+
+ if ($entry = ldap_first_entry($this->conn, $ldap_result)) {
+ $rec = ldap_get_attributes($this->conn, $entry);
+ }
+ }
+ else {
+ $this->_debug("S: ".ldap_error($this->conn));
+ }
+
+ if (!empty($rec)) {
+ $rec['dn'] = $dn; // Add in the dn for the entry.
+ }
+ }
+
+ return $rec;
+ }
+
+ public function list_replicas()
+ {
+ $this->_debug("Finding replicas for this server.");
+
+ // Search any host that is a replica for the current host
+ $replica_hosts = $this->config_get('replica_hosts', array());
+ $root_dn = $this->config_get('config_root_dn');
+
+ if (!empty($replica_hosts)) {
+ return $replica_hosts;
+ }
+
+ $ldap = new Net_LDAP3($this->config);
+ $ldap->connect();
+ $ldap->bind($this->_current_bind_dn, $this->_current_bind_pw);
+
+ $result = $ldap->search($root_dn, '(objectclass=nsds5replicationagreement)', 'sub', array('nsds5replicahost'));
+
+ if (!$result) {
+ $this->_debug("No replicas configured");
+ return $replica_hosts;
+ }
+
+ $this->_debug("Replication agreements found: " . var_export($result->entries(true), true));
+
+ foreach ($result->entries(true) as $dn => $attrs) {
+ if (!in_array($attrs['nsds5replicahost'], $replica_hosts)) {
+ $replica_hosts[] = $attrs['nsds5replicahost'];
+ }
+ }
+
+ // $replica_hosts now holds the IDs of servers we are currently NOT
+ // connected to. We might need this later in order to set
+ $this->_server_id_not = $replica_hosts;
+
+ $this->_debug("So far, we have the following replicas: " . var_export($replica_hosts, true));
+
+ $ldap->close();
+
+ foreach ($replica_hosts as $replica_host) {
+ $ldap->config_set('hosts', array($replica_host));
+ $ldap->connect();
+ $ldap->bind($this->_current_bind_dn, $this->_current_bind_pw);
+
+ $result = $ldap->search($root_dn, '(objectclass=nsds5replicationagreement)', 'sub', array('nsds5replicahost'));
+ if (!$result) {
+ $this->_debug("No replicas configured");
+ }
+
+ foreach ($result->entries(true) as $dn => $attrs) {
+ if (!in_array($attrs['nsds5replicahost'], $replica_hosts)) {
+ $replica_hosts[] = $attrs['nsds5replicahost'];
+ }
+ }
+
+ $ldap->close();
+ }
+
+ $this->config_set('replica_hosts', $replica_hosts);
+
+ return $replica_hosts;
+ }
+
+ public function login($username, $password, $domain = null)
+ {
+ $this->_debug("Net_LDAP3::login(\$username = '" . $username . "', \$password = '****', \$domain = '" . $domain . "')");
+
+ $_bind_dn = $this->config_get('service_bind_dn');
+ $_bind_pw = $this->config_get('service_bind_pw');
+
+ if (empty($_bind_dn)) {
+ $this->_debug("No valid service bind dn found.");
+ return null;
+ }
+
+ if (empty($_bind_pw)) {
+ $this->_debug("No valid service bind password found.");
+ return null;
+ }
+
+ $bound = $this->bind($_bind_dn, $_bind_pw);
+
+ if (!$bound) {
+ $this->_debug("Could not bind with service bind credentials.");
+ return null;
+ }
+
+ $entry_dn = $this->entry_dn($username);
+
+ if (!empty($entry_dn)) {
+ $bound = $this->bind($entry_dn, $password);
+
+ if (!$bound) {
+ $this->_error("Could not bind with " . $entry_dn);
+ return null;
+ }
+
+ return $entry_dn;
+ }
+
+ $base_dn = $this->config_get('root_dn');
+
+ if (empty($base_dn)) {
+ $this->_debug("Could not get a valid base dn to search.");
+ return null;
+ }
+
+ $localpart = $username;
+
+ if (empty($domain) ) {
+ if (count(explode('@', $username)) > 1) {
+ $_parts = explode('@', $username);
+ $localpart = $_parts[0];
+ $domain = $_parts[1];
+ }
+ else {
+ $localpart = $username;
+ $domain = '';
+ }
+ }
+
+ $realm = $domain;
+ $filter = $this->config_get("login_filter", null);
+
+ if (empty($filter)) {
+ $filter = $this->config_get("filter", null);
+ }
+ if (empty($filter)) {
+ $filter = "(&(|(mail=%s)(mail=%U@%d)(alias=%s)(alias=%U@%d)(uid=%s))(objectclass=inetorgperson))";
+ }
+
+ $this->_debug("Net::LDAP3::login() original filter: " . $filter);
+
+ $replace_patterns = array(
+ '/%s/' => $username,
+ '/%d/' => $domain,
+ '/%U/' => $localpart,
+ '/%r/' => $realm
+ );
+
+ $filter = preg_replace(array_keys($replace_patterns), array_values($replace_patterns), $filter);
+
+ $this->_debug("Net::LDAP3::login() actual filter: " . $filter);
+
+ $result = $this->search($base_dn, $filter, 'sub');
+
+ if (!$result) {
+ $this->_debug("Could not search $base_dn with $filter");
+ return null;
+ }
+
+ if ($result->count() > 1) {
+ $this->_debug("Multiple entries found.");
+ return null;
+ }
+ else if ($result->count() < 1) {
+ $this->_debug("No entries found.");
+ return null;
+ }
+
+ $entries = $result->entries();
+ $entry = self::normalize_result($entries);
+ $entry_dn = key($entry);
+
+ $bound = $this->bind($entry_dn, $password);
+
+ if (!$bound) {
+ $this->_debug("Could not bind with " . $entry_dn);
+ return null;
+ }
+
+ return $entry_dn;
+ }
+
+ public function list_group_members($dn, $entry = null, $recurse = true)
+ {
+ $this->_debug("Called list_group_members(" . $dn . ")");
+
+ if (is_array($entry) && in_array('objectclass', $entry)) {
+ if (!in_array(array('groupofnames', 'groupofuniquenames', 'groupofurls'), $entry['objectclass'])) {
+ $this->_debug("Called list_group_members on a non-group!");
+ return array();
+ }
+ }
+ else {
+ $entry = $this->get_entry($dn, array('member', 'uniquemember', 'memberurl', 'objectclass'));
+
+ if (!$entry) {
+ return array();
+ }
+ }
+
+ $group_members = array();
+
+ foreach ((array)$entry['objectclass'] as $objectclass) {
+ switch (strtolower($objectclass)) {
+ case "groupofnames":
+ case "kolabgroupofnames":
+ $group_members = array_merge($group_members, $this->list_group_member($dn, $entry['member'], $recurse));
+ break;
+ case "groupofuniquenames":
+ case "kolabgroupofuniquenames":
+ $group_members = array_merge($group_members, $this->list_group_uniquemember($dn, $entry['uniquemember'], $recurse));
+ break;
+ case "groupofurls":
+ $group_members = array_merge($group_members, $this->list_group_memberurl($dn, $entry['memberurl'], $recurse));
+ break;
+ }
+ }
+
+ return array_values(array_filter($group_members));
+ }
+
+ public function modify_entry($subject_dn, $old_attrs, $new_attrs)
+ {
+ $this->_debug("OLD ATTRIBUTES", $old_attrs);
+ $this->_debug("NEW ATTRIBUTES", $new_attrs);
+
+ // TODO: Get $rdn_attr - we have type_id in $new_attrs
+ $dn_components = ldap_explode_dn($subject_dn, 0);
+ $rdn_components = explode('=', $dn_components[0]);
+ $rdn_attr = $rdn_components[0];
+
+ $this->_debug("Net_LDAP3::modify_entry() using rdn attribute: " . $rdn_attr);
+
+ $mod_array = array(
+ 'add' => array(), // For use with ldap_mod_add()
+ 'del' => array(), // For use with ldap_mod_del()
+ 'replace' => array(), // For use with ldap_mod_replace()
+ 'rename' => array(), // For use with ldap_rename()
+ );
+
+ // This is me cheating. Remove this special attribute.
+ if (array_key_exists('ou', $old_attrs) || array_key_exists('ou', $new_attrs)) {
+ $old_ou = $old_attrs['ou'];
+ $new_ou = $new_attrs['ou'];
+ unset($old_attrs['ou']);
+ unset($new_attrs['ou']);
+ }
+ else {
+ $old_ou = null;
+ $new_ou = null;
+ }
+
+ // Compare each attribute value of the old attrs with the corresponding value
+ // in the new attrs, if any.
+ foreach ($old_attrs as $attr => $old_attr_value) {
+ if (is_array($old_attr_value)) {
+ if (count($old_attr_value) == 1) {
+ $old_attrs[$attr] = $old_attr_value[0];
+ $old_attr_value = $old_attrs[$attr];
+ }
+ }
+
+ if (array_key_exists($attr, $new_attrs)) {
+ if (is_array($new_attrs[$attr])) {
+ if (count($new_attrs[$attr]) == 1) {
+ $new_attrs[$attr] = $new_attrs[$attr][0];
+ }
+ }
+
+ if (is_array($old_attrs[$attr]) && is_array($new_attrs[$attr])) {
+ $_sort1 = $new_attrs[$attr];
+ sort($_sort1);
+ $_sort2 = $old_attr_value;
+ sort($_sort2);
+ }
+ else {
+ $_sort1 = true;
+ $_sort2 = false;
+ }
+
+ if ($new_attrs[$attr] !== $old_attr_value && $_sort1 !== $_sort2) {
+ $this->_debug("Attribute $attr changed from " . var_export($old_attr_value, true) . " to " . var_export($new_attrs[$attr], true));
+ if ($attr === $rdn_attr) {
+ $this->_debug("This attribute is the RDN attribute. Let's see if it is multi-valued, and if the original still exists in the new value.");
+ if (is_array($old_attrs[$attr])) {
+ if (!is_array($new_attrs[$attr])) {
+ if (in_array($new_attrs[$attr], $old_attrs[$attr])) {
+ // TODO: Need to remove all $old_attrs[$attr] values not equal to $new_attrs[$attr], and not equal to the current $rdn_attr value [0]
+
+ $this->_debug("old attrs. is array, new attrs. is not array. new attr. exists in old attrs.");
+
+ $rdn_attr_value = array_shift($old_attrs[$attr]);
+ $_attr_to_remove = array();
+
+ foreach ($old_attrs[$attr] as $value) {
+ if (strtolower($value) != strtolower($new_attrs[$attr])) {
+ $_attr_to_remove[] = $value;
+ }
+ }
+
+ $this->_debug("Adding to delete attribute $attr values:" . implode(', ', $_attr_to_remove));
+
+ $mod_array['del'][$attr] = $_attr_to_remove;
+
+ if (strtolower($new_attrs[$attr]) !== strtolower($rdn_attr_value)) {
+ $this->_debug("new attrs is not the same as the old rdn value, issuing a rename");
+ $mod_array['rename']['dn'] = $subject_dn;
+ $mod_array['rename']['new_rdn'] = $rdn_attr . '=' . $new_attrs[$attr][0];
+ }
+ }
+ else {
+ $this->_debug("new attrs is not the same as any of the old rdn value, issuing a full rename");
+ $mod_array['rename']['dn'] = $subject_dn;
+ $mod_array['rename']['new_rdn'] = $rdn_attr . '=' . $new_attrs[$attr];
+ }
+ }
+ else {
+ // TODO: See if the rdn attr. value is still in $new_attrs[$attr]
+ if (in_array($old_attrs[$attr][0], $new_attrs[$attr])) {
+ $this->_debug("Simply replacing attr $attr as rdn attr value is preserved.");
+ $mod_array['replace'][$attr] = $new_attrs[$attr];
+ }
+ else {
+ // TODO: This fails.
+ $mod_array['rename']['dn'] = $subject_dn;
+ $mod_array['rename']['new_rdn'] = $rdn_attr . '=' . $new_attrs[$attr][0];
+ $mod_array['del'][$attr] = $old_attrs[$attr][0];
+ }
+ }
+ }
+ else {
+ if (!is_array($new_attrs[$attr])) {
+ $this->_debug("Renaming " . $old_attrs[$attr] . " to " . $new_attrs[$attr]);
+ $mod_array['rename']['dn'] = $subject_dn;
+ $mod_array['rename']['new_rdn'] = $rdn_attr . '=' . $new_attrs[$attr];
+ }
+ else {
+ $this->_debug("Adding to replace");
+ // An additional attribute value is being supplied. Just replace and continue.
+ $mod_array['replace'][$attr] = $new_attrs[$attr];
+ continue;
+ }
+ }
+
+ }
+ else {
+ if (!isset($new_attrs[$attr]) || $new_attrs[$attr] === '' || (is_array($new_attrs[$attr]) && empty($new_attrs[$attr]))) {
+ switch ($attr) {
+ case "userpassword":
+ break;
+ default:
+ $this->_debug("Adding to del: $attr");
+ $mod_array['del'][$attr] = (array)($old_attr_value);
+ break;
+ }
+ }
+ else {
+ $this->_debug("Adding to replace: $attr");
+ $mod_array['replace'][$attr] = (array)($new_attrs[$attr]);
+ }
+ }
+ }
+ else {
+ $this->_debug("Attribute $attr unchanged");
+ }
+ }
+ else {
+ // TODO: Since we're not shipping the entire object back and forth, and only post
+ // part of the data... we don't know what is actually removed (think modifiedtimestamp, etc.)
+ $this->_debug("Group attribute $attr not mentioned in \$new_attrs..., but not explicitly removed... by assumption");
+ }
+ }
+
+ foreach ($new_attrs as $attr => $value) {
+ // OU's parent base dn
+ if ($attr == 'base_dn') {
+ continue;
+ }
+
+ if (is_array($value)) {
+ if (count($value) == 1) {
+ $new_attrs[$attr] = $value[0];
+ $value = $new_attrs[$attr];
+ }
+ }
+
+ if (array_key_exists($attr, $old_attrs)) {
+ if (is_array($old_attrs[$attr])) {
+ if (count($old_attrs[$attr]) == 1) {
+ $old_attrs[$attr] = $old_attrs[$attr][0];
+ }
+ }
+
+ if (is_array($new_attrs[$attr]) && is_array($old_attrs[$attr])) {
+ $_sort1 = $old_attrs[$attr];
+ sort($_sort1);
+ $_sort2 = $value;
+ sort($_sort2);
+ }
+ else {
+ $_sort1 = true;
+ $_sort2 = false;
+ }
+
+ if ($value === null || $value === '' || (is_array($value) && empty($value))) {
+ if (!array_key_exists($attr, $mod_array['del'])) {
+ switch ($attr) {
+ case 'userpassword':
+ break;
+ default:
+ $this->_debug("Adding to del(2): $attr");
+ $mod_array['del'][$attr] = (array)($old_attrs[$attr]);
+ break;
+ }
+ }
+ }
+ else {
+ if (!($old_attrs[$attr] === $value) && !($attr === $rdn_attr) && !($_sort1 === $_sort2)) {
+ if (!array_key_exists($attr, $mod_array['replace'])) {
+ $this->_debug("Adding to replace(2): $attr");
+ $mod_array['replace'][$attr] = $value;
+ }
+ }
+ }
+ }
+ else {
+ if (!empty($value)) {
+ $mod_array['add'][$attr] = $value;
+ }
+ }
+ }
+
+ if (empty($old_ou)) {
+ $subject_dn_components = ldap_explode_dn($subject_dn, 0);
+ unset($subject_dn_components["count"]);
+ $subject_rdn = array_shift($subject_dn_components);
+ $old_ou = implode(',', $subject_dn_components);
+ }
+
+ // object is an organizational unit
+ if (strpos($subject_dn, 'ou=' . $old_ou) === 0) {
+ $root = substr($subject_dn, strlen($old_ou) + 4); // remove ou=*,
+
+ if ((!empty($new_attrs['base_dn']) && strtolower($new_attrs['base_dn']) !== strtolower($root))
+ || (strtolower($old_ou) !== strtolower($new_ou))
+ ) {
+ if (!empty($new_attrs['base_dn'])) {
+ $root = $new_attrs['base_dn'];
+ }
+
+ $mod_array['rename']['new_parent'] = $root;
+ $mod_array['rename']['dn'] = $subject_dn;
+ $mod_array['rename']['new_rdn'] = 'ou=' . $new_ou;
+ }
+ }
+ // not OU object, but changed ou attribute
+ else if ((!empty($old_ou) && !empty($new_ou)) && strtolower($old_ou) !== strtolower($new_ou)) {
+ $mod_array['rename']['new_parent'] = $new_ou;
+ if (empty($mod_array['rename']['dn']) || empty($mod_array['rename']['new_rdn'])) {
+ $mod_array['rename']['dn'] = $subject_dn;
+ $mod_array['rename']['new_rdn'] = $rdn_attr . '=' . $new_attrs[$rdn_attr];
+ }
+ }
+
+ $this->_debug($mod_array);
+
+ $result = $this->modify_entry_attributes($subject_dn, $mod_array);
+
+ if ($result) {
+ return $mod_array;
+ }
+ }
+
+ /**
+ * Bind connection with (SASL-) user and password
+ *
+ * @param string $authc Authentication user
+ * @param string $pass Bind password
+ * @param string $authz Autorization user
+ *
+ * @return boolean True on success, False on error
+ */
+ public function sasl_bind($authc, $pass, $authz=null)
+ {
+ if (!$this->conn) {
+ return false;
+ }
+
+ if (!function_exists('ldap_sasl_bind')) {
+ $this->_error("Unable to bind: ldap_sasl_bind() not exists");
+ return false;
+ }
+
+ if (!empty($authz)) {
+ $authz = 'u:' . $authz;
+ }
+
+ $method = $this->config_get('auth_method');
+ if (empty($method)) {
+ $method = 'DIGEST-MD5';
+ }
+
+ $this->_debug("C: Bind [mech: $method, authc: $authc, authz: $authz] [pass: $pass]");
+
+ if (ldap_sasl_bind($this->conn, null, $pass, $method, null, $authc, $authz)) {
+ $this->_debug("S: OK");
+ return true;
+ }
+
+ $this->_debug("S: ".ldap_error($this->conn));
+ $this->_error("Bind failed for authcid=$authc ".ldap_error($this->conn));
+
+ return false;
+ }
+
+ /**
+ * Execute LDAP search
+ *
+ * @param string $base_dn Base DN to use for searching
+ * @param string $filter Filter string to query
+ * @param string $scope The LDAP scope (list|sub|base)
+ * @param array $attrs List of entry attributes to read
+ * @param array $prop Hash array with query configuration properties:
+ * - sort: array of sort attributes (has to be in sync with the VLV index)
+ * - search: search string used for VLV controls
+ * @param bool $count_only Set to true if only entry count is requested
+ *
+ * @return mixed Net_LDAP3_Result object or number of entries (if $count_only=true) or False on failure
+ */
+ public function search($base_dn, $filter = '(objectclass=*)', $scope = 'sub', $attrs = array('dn'), $props = array(), $count_only = false)
+ {
+ if (!$this->conn) {
+ $this->_debug("No active connection for " . __CLASS__ . "::" . __FUNCTION__);
+ return false;
+ }
+
+ $this->_debug("C: Search base dn: [$base_dn] scope [$scope] with filter [$filter]");
+
+ // make sure attributes list is not empty
+ if (empty($attrs)) {
+ $attrs = array('dn');
+ }
+
+ if (!$count_only && ($sort = $this->find_vlv($base_dn, $filter, $scope, $props['sort']))) {
+ // when using VLV, we get the total count by...
+ // ...either reading numSubOrdinates attribute
+ if (($sub_filter = $this->config_get('numsub_filter')) &&
+ ($result_count = @$ns_function($this->conn, $base_dn, $sub_filter, array('numSubOrdinates'), 0, 0, 0))
+ ) {
+ $counts = ldap_get_entries($this->conn, $result_count);
+ for ($vlv_count = $j = 0; $j < $counts['count']; $j++) {
+ $vlv_count += $counts[$j]['numsubordinates'][0];
+ }
+ $this->_debug("D: total numsubordinates = " . $vlv_count);
+ }
+ // ...or by fetching all records dn and count them
+ else if (!function_exists('ldap_parse_virtuallist_control')) {
+ $vlv_count = $this->search($base_dn, $filter, $scope, array('dn'), $props, true);
+ }
+
+ $this->vlv_active = $this->_vlv_set_controls($sort, $this->list_page, $this->page_size,
+ $this->_vlv_search($sort, $props['search']));
+ }
+ else {
+ $this->vlv_active = false;
+ }
+
+ $function = self::scope_to_function($scope, $ns_function);
+ $sizelimit = (int) $this->config['sizelimit'];
+ $timelimit = (int) $this->config['timelimit'];
+
+ $this->_debug("Using function $function on scope $scope (\$ns_function is $ns_function)");
+
+ if ($this->vlv_active) {
+ if (!empty($this->additional_filter)) {
+ $filter = "(&" . $filter . $this->additional_filter . ")";
+ $this->_debug("C: (With VLV) Setting a filter (with additional filter) of " . $filter);
+ }
+ else {
+ $this->_debug("C: (With VLV) Setting a filter (without additional filter) of " . $filter);
+ }
+ }
+ else {
+ if (!empty($this->additional_filter)) {
+ $filter = "(&" . $filter . $this->additional_filter . ")";
+ }
+ $this->_debug("C: (Without VLV) Setting a filter of " . $filter);
+ }
+
+ $this->_debug("Executing search with return attributes: " . var_export($attrs, true));
+
+ $ldap_result = @$function($this->conn, $base_dn, $filter, $attrs, 0, $sizelimit, $timelimit);
+
+ if (!$ldap_result) {
+ $this->_debug("$function failed for dn=$base_dn: ".ldap_error($this->conn));
+ return false;
+ }
+
+ // when running on a patched PHP we can use the extended functions
+ // to retrieve the total count from the LDAP search result
+ if ($this->vlv_active && function_exists('ldap_parse_virtuallist_control')) {
+ if (ldap_parse_result($this->conn, $ldap_result, $errcode, $matcheddn, $errmsg, $referrals, $serverctrls)) {
+ ldap_parse_virtuallist_control($this->conn, $serverctrls, $last_offset, $vlv_count, $vresult);
+ $this->_debug("S: VLV result: last_offset=$last_offset; content_count=$vlv_count");
+ }
+ else {
+ $this->_debug("S: ".($errmsg ? $errmsg : ldap_error($this->conn)));
+ }
+ }
+ else if ($this->debug) {
+ $this->_debug("S: ".ldap_count_entries($this->conn, $ldap_result)." record(s) found");
+ }
+
+ $result = new Net_LDAP3_Result($this->conn, $base_dn, $filter, $scope, $ldap_result);
+ $result->set('offset', $last_offset);
+ $result->set('count', $vlv_count);
+ $result->set('vlv', true);
+
+ return $count_only ? $result->count() : $result;
+ }
+
+ /**
+ * Similar to Net_LDAP3::search() but using a search array with multiple
+ * keys and values that to continue to use the VLV but with an original
+ * filter adding the search stuff to an additional filter.
+ *
+ * @see Net_LDAP3::search()
+ */
+ public function search_entries($base_dn, $filter = '(objectclass=*)', $scope = 'sub', $attrs = array('dn'), $props = array())
+ {
+ $this->_debug("Net_LDAP3::search_entries with search " . var_export($props, true));
+
+ if (is_array($props['search']) && array_key_exists('params', $props['search'])) {
+ $_search = $this->search_filter($props['search']);
+ $this->_debug("C: Search filter: $_search");
+
+ if (!empty($_search)) {
+ $this->additional_filter = $_search;
+ }
+ else {
+ $this->additional_filter = "(|";
+
+ foreach ($props['search'] as $attr => $value) {
+ $this->additional_filter .= "(" . $attr . "=" . $this->_fuzzy_search_prefix() . $value . $this->_fuzzy_search_suffix() . ")";
+ }
+
+ $this->additional_filter .= ")";
+ }
+
+ $this->_debug("C: Setting an additional filter " . $this->additional_filter);
+ }
+
+ $search = $this->search($base_dn, $filter, $scope, $attrs, $props);
+
+ $this->additional_filter = null;
+
+ if (!$search) {
+ $this->_debug("Net_LDAP3: Search did not succeed!");
+ return false;
+ }
+
+ return $search;
+ }
+
+ /**
+ * Create LDAP search filter string according to defined parameters.
+ */
+ public function search_filter($search)
+ {
+ if (empty($search) || !is_array($search) || empty($search['params'])) {
+ return null;
+ }
+
+ $operators = array('=', '~=', '>=', '<=');
+ $filter = '';
+
+ foreach ((array) $search['params'] as $field => $param) {
+ switch ((string)$param['type']) {
+ case 'prefix':
+ $prefix = '';
+ $suffix = '*';
+ break;
+
+ case 'suffix':
+ $prefix = '*';
+ $suffix = '';
+ break;
+
+ case 'exact':
+ case '=':
+ case '~=':
+ case '>=':
+ case '<=':
+ $prefix = '';
+ $suffix = '';
+ break;
+
+ case 'exists':
+ $prefix = '*';
+ $suffix = '';
+ $param['value'] = '';
+ break;
+
+ case 'both':
+ default:
+ $prefix = '*';
+ $suffix = '*';
+ break;
+ }
+
+ $operator = $param['type'] && in_array($param['type'], $operators) ? $param['type'] : '=';
+
+ if (is_array($param['value'])) {
+ $val_filter = array();
+ foreach ($param['value'] as $val) {
+ $value = self::quote_string($val);
+ $val_filter[] = "(" . $field . $operator . $prefix . $value . $suffix . ")";
+ }
+ $filter .= "(|" . implode($val_filter, '') . ")";
+ }
+ else {
+ $value = self::quote_string($param['value']);
+ $filter .= "(" . $field . $operator . $prefix . $value . $suffix . ")";
+ }
+ }
+
+ // join search parameters with specified operator ('OR' or 'AND')
+ if (count($search['params']) > 1) {
+ $filter = '(' . ($search['operator'] == 'AND' ? '&' : '|') . $filter . ')';
+ }
+
+ return $filter;
+ }
+
+ /**
+ * Set properties for VLV-based paging
+ *
+ * @param number $page Page number to list (starting at 1)
+ * @param number $size Number of entries to display on one page
+ */
+ public function set_vlv_page($page, $size = 10)
+ {
+ $this->list_page = $page;
+ $this->page_size = $size;
+ }
+
+ /**
+ * Turn an LDAP entry into a regular PHP array with attributes as keys.
+ *
+ * @param array $entry Attributes array as retrieved from ldap_get_attributes() or ldap_get_entries()
+ *
+ * @return array Hash array with attributes as keys
+ */
+ public static function normalize_entry($entry)
+ {
+ $rec = array();
+ for ($i=0; $i < $entry['count']; $i++) {
+ $attr = $entry[$i];
+ for ($j=0; $j < $entry[$attr]['count']; $j++) {
+ $rec[$attr][$j] = $entry[$attr][$j];
+ }
+ }
+
+ return $rec;
+ }
+
+ /**
+ * Normalize a ldap result by converting entry attribute arrays into single values
+ */
+ public static function normalize_result($_result)
+ {
+ if (!is_array($_result)) {
+ return array();
+ }
+
+ $result = array();
+
+ for ($x = 0; $x < $_result['count']; $x++) {
+ $dn = $_result[$x]['dn'];
+ $result[$dn] = array();
+ for ($y = 0; $y < $_result[$x]['count']; $y++) {
+ $attr = $_result[$x][$y];
+ if ($_result[$x][$attr]['count'] == 1) {
+ switch ($attr) {
+ case 'objectclass':
+ $result[$dn][$attr] = array(strtolower($_result[$x][$attr][0]));
+ break;
+ default:
+ $result[$dn][$attr] = $_result[$x][$attr][0];
+ break;
+ }
+ }
+ else {
+ $result[$dn][$attr] = array();
+ for ($z = 0; $z < $_result[$x][$attr]['count']; $z++) {
+ switch ($attr) {
+ case 'objectclass':
+ $result[$dn][$attr][] = strtolower($_result[$x][$attr][$z]);
+ break;
+ default:
+ $result[$dn][$attr][] = $_result[$x][$attr][$z];
+ break;
+ }
+ }
+ }
+ }
+ }
+
+ return $result;
+ }
+
+ public static function scopeint2str($scope)
+ {
+ switch ($scope) {
+ case 2:
+ return 'sub';
+ break;
+ case 1:
+ return 'one';
+ break;
+ case 0:
+ return 'base';
+ break;
+ default:
+ $this->_debug("Scope $scope is not a valid scope integer");
+ break;
+ }
+ }
+
+ /**
+ * Choose the right PHP function according to scope property
+ *
+ * @param string $scope The LDAP scope (sub|base|list)
+ * @param string $ns_function Function to be used for numSubOrdinates queries
+ * @return string PHP function to be used to query directory
+ */
+ public static function scope_to_function($scope, &$ns_function = null)
+ {
+ switch ($scope) {
+ case 'sub':
+ $function = $ns_function = 'ldap_search';
+ break;
+ case 'base':
+ $function = $ns_function = 'ldap_read';
+ break;
+ case 'one':
+ case 'list':
+ default:
+ $function = 'ldap_list';
+ $ns_function = 'ldap_read';
+ break;
+ }
+
+ return $function;
+ }
+
+ private function config_set_config_get_hook($callback)
+ {
+ $this->_config_get_hook = $callback;
+ }
+
+ private function config_set_config_set_hook($callback)
+ {
+ $this->_config_set_hook = $callback;
+ }
+
+ /**
+ * Sets the debug level both for this class and the ldap connection.
+ */
+ private function config_set_debug($value)
+ {
+ $this->config['debug'] = (bool) $value;
+ if ((int)($value) > 0) {
+ ldap_set_option(null, LDAP_OPT_DEBUG_LEVEL, (int)($value));
+ }
+ }
+
+ /**
+ * Sets a log hook that is called with every log message in this module.
+ */
+ private function config_set_log_hook($callback)
+ {
+ $this->_log_hook = $callback;
+ }
+
+ /**
+ * Find a matching VLV
+ */
+ protected function find_vlv($base_dn, $filter, $scope, $sort_attrs = null)
+ {
+ if ($scope == 'base') {
+ return false;
+ }
+
+ $vlv_indexes = $this->find_vlv_indexes_and_searches();
+
+ if (empty($vlv_indexes)) {
+ return false;
+ }
+
+ $this->_debug("Existing vlv index and search information", $vlv_indexes);
+
+ $filter = strtolower($filter);
+
+ foreach ($vlv_indexes as $vlv_index) {
+ if (!empty($vlv_index[$base_dn])) {
+ $this->_debug("Found a VLV for base_dn: " . $base_dn);
+ if ($vlv_index[$base_dn]['filter'] == $filter) {
+ if ($vlv_index[$base_dn]['scope'] == $scope) {
+ $this->_debug("Scope and filter matches");
+
+ // Not passing any sort attributes means you don't care
+ if (!empty($sort_attrs)) {
+ $sort_attrs = (array) $sort_attrs;
+ foreach ($vlv_index[$base_dn]['sort'] as $sss_config) {
+ if (count(array_intersect($sort_attrs, $sss_config)) == count($sort_attrs)) {
+ return $sort_attrs;
+ }
+ }
+
+ $this->_error("The requested sorting does not match any server-side sorting configuration");
+
+ return false;
+ }
+ else {
+ return $vlv_index[$base_dn]['sort'][0];
+ }
+ }
+ else {
+ $this->_debug("Scope does not match. VLV: " . var_export($vlv_index[$base_dn]['scope'], true)
+ . " while looking for " . var_export($scope, true));
+ return false;
+ }
+ }
+ else {
+ $this->_debug("Filter does not match");
+ }
+ }
+ }
+
+ return false;
+ }
+
+ /**
+ * Return VLV indexes and searches including necessary configuration
+ * details.
+ */
+ protected function find_vlv_indexes_and_searches()
+ {
+ if ($this->config['vlv'] === false) {
+ return false;
+ }
+
+ if (is_array($this->config['vlv'])) {
+ return $this->config['vlv'];
+ }
+
+ if ($this->_vlv_indexes_and_searches !== null) {
+ return $this->_vlv_indexes_and_searches;
+ }
+
+ $this->_vlv_indexes_and_searches = array();
+
+ $config_root_dn = $this->config_get('config_root_dn');
+
+ if (empty($config_root_dn)) {
+ return array();
+ }
+
+ if ($this->cache && ($cached_config = $this->cache->get('vlvconfig'))) {
+ $this->_vlv_indexes_and_searches = $cached_config;
+ return $this->_vlv_indexes_and_searches;
+ }
+
+ $this->_debug("No VLV information available yet, refreshing");
+
+ $search_filter = '(objectclass=vlvsearch)';
+ $search_result = ldap_search($this->conn, $config_root_dn, $search_filter, array('*'), 0, 0, 0);
+
+ if ($search_result === false) {
+ $this->_debug("Search for '$search_filter' on '$config_root_dn' failed:".ldap_error($this->conn));
+ return;
+ }
+
+ $vlv_searches = new Net_LDAP3_Result($this->conn, $config_root_dn, $search_filter, 'sub', $search_result);
+
+ if ($vlv_searches->count() < 1) {
+ $this->_debug("Empty result from search for '(objectclass=vlvsearch)' on '$config_root_dn'");
+ return;
+ }
+
+ $index_filter = '(objectclass=vlvindex)';
+
+ foreach ($vlv_searches->entries(true) as $vlv_search_dn => $vlv_search_attrs) {
+ // The attributes we are interested in are as follows:
+ $_vlv_base_dn = $vlv_search_attrs['vlvbase'];
+ $_vlv_scope = $vlv_search_attrs['vlvscope'];
+ $_vlv_filter = $vlv_search_attrs['vlvfilter'];
+
+ // Multiple indexes may exist
+ $index_result = ldap_search($this->conn, $vlv_search_dn, $index_filter, array('*'), 0, 0, 0);
+
+ if ($index_result === false) {
+ $this->_debug("Search for '$index_filter' on '$vlv_search_dn' failed:".ldap_error($this->conn));
+ continue;
+ }
+
+ $vlv_indexes = new Net_LDAP3_Result($this->conn, $vlv_search_dn, $index_filter, 'sub', $index_result);
+ $vlv_indexes = $vlv_indexes->entries(true);
+
+ // Reset this one for each VLV search.
+ $_vlv_sort = array();
+
+ foreach ($vlv_indexes as $vlv_index_dn => $vlv_index_attrs) {
+ $_vlv_sort[] = explode(' ', $vlv_index_attrs['vlvsort']);
+ }
+
+ $this->_vlv_indexes_and_searches[] = array(
+ $_vlv_base_dn => array(
+ 'scope' => self::scopeint2str($_vlv_scope),
+ 'filter' => strtolower($_vlv_filter),
+ 'sort' => $_vlv_sort,
+ ),
+ );
+ }
+
+ // cache this
+ if ($this->cache) {
+ $this->cache->set('vlvconfig', $this->_vlv_indexes_and_searches);
+ }
+
+ return $this->_vlv_indexes_and_searches;
+ }
+
+ private function init_schema()
+ {
+ // use PEAR include if autoloading failed
+ if (!class_exists('Net_LDAP2')) {
+ require_once('Net/LDAP2.php');
+ }
+
+ $port = $this->config_get('port', 389);
+ $tls = $this->config_get('use_tls', false);
+
+ foreach ((array) $this->config_get('hosts') as $host) {
+ $this->_debug("C: Connect [$host:$port]");
+
+ $_ldap_cfg = array(
+ 'host' => $host,
+ 'port' => $port,
+ 'tls' => $tls,
+ 'version' => 3,
+ 'binddn' => $this->config_get('service_bind_dn'),
+ 'bindpw' => $this->config_get('service_bind_pw')
+ );
+
+ $_ldap_schema_cache_cfg = array(
+ 'path' => "/tmp/" . $host . ":" . ($port ? $port : '389') . "-Net_LDAP2_Schema.cache",
+ 'max_age' => 86400,
+ );
+
+ $_ldap = Net_LDAP2::connect($_ldap_cfg);
+
+ if (!is_a($_ldap, 'Net_LDAP2_Error')) {
+ $this->_debug("S: OK");
+ break;
+ }
+
+ $this->_debug("S: NOT OK");
+ $this->_debug($_ldap->getMessage());
+ }
+
+ if (is_a($_ldap, 'Net_LDAP2_Error')) {
+ return null;
+ }
+
+ $_ldap_schema_cache = new Net_LDAP2_SimpleFileSchemaCache($_ldap_schema_cache_cfg);
+
+ $_ldap->registerSchemaCache($_ldap_schema_cache);
+
+ // TODO: We should learn what LDAP tech. we're running against.
+ // Perhaps with a scope base objectclass recognize rootdse entry
+ $schema_root_dn = $this->config_get('schema_root_dn');
+
+ if (!$schema_root_dn) {
+ $_schema = $_ldap->schema();
+ }
+
+ return $_schema;
+ }
+
+ private function list_group_member($dn, $members, $recurse = true)
+ {
+ $this->_debug("Called list_group_member(" . $dn . ")");
+
+ $members = (array) $members;
+ $group_members = array();
+
+ // remove possible 'count' item
+ unset($members['count']);
+
+ // Use the member attributes to return an array of member ldap objects
+ // NOTE that the member attribute is supposed to contain a DN
+ foreach ($members as $member) {
+ $member_entry = $this->get_entry($member, array('member', 'uniquemember', 'memberurl', 'objectclass'));
+
+ if (empty($member_entry)) {
+ continue;
+ }
+
+ $group_members[$member] = $member;
+
+ if ($recurse) {
+ // Nested groups
+ $group_group_members = $this->list_group_members($member, $member_entry);
+ if ($group_group_members) {
+ $group_members = array_merge($group_group_members, $group_members);
+ }
+ }
+ }
+
+ return array_filter($group_members);
+ }
+
+ private function list_group_uniquemember($dn, $uniquemembers, $recurse = true)
+ {
+ $this->_debug("Called list_group_uniquemember(" . $dn . ")", $entry);
+
+ $uniquemembers = (array)($uniquemembers);
+ $group_members = array();
+
+ // remove possible 'count' item
+ unset($uniquemembers['count']);
+
+ foreach ($uniquemembers as $member) {
+ $member_entry = $this->get_entry($member, array('member', 'uniquemember', 'memberurl', 'objectclass'));
+
+ if (empty($member_entry)) {
+ continue;
+ }
+
+ $group_members[$member] = $member;
+
+ if ($recurse) {
+ // Nested groups
+ $group_group_members = $this->list_group_members($member, $member_entry);
+ if ($group_group_members) {
+ $group_members = array_merge($group_group_members, $group_members);
+ }
+ }
+ }
+
+ return array_filter($group_members);
+ }
+
+ private function list_group_memberurl($dn, $memberurls, $recurse = true)
+ {
+ $this->_debug("Called list_group_memberurl(" . $dn . ")");
+
+ $group_members = array();
+ $memberurls = (array) $memberurls;
+ $attributes = array('member', 'uniquemember', 'memberurl', 'objectclass');
+
+ // remove possible 'count' item
+ unset($memberurls['count']);
+
+ foreach ($memberurls as $url) {
+ $ldap_uri = $this->parse_memberurl($url);
+ $result = $this->search($ldap_uri[3], $ldap_uri[6], 'sub', $attributes);
+
+ if (!$result) {
+ continue;
+ }
+
+ foreach ($result->entries(true) as $entry_dn => $_entry) {
+ $group_members[$entry_dn] = $entry_dn;
+ $this->_debug("Found " . $entry_dn);
+
+ if ($recurse) {
+ // Nested group
+ $group_group_members = $this->list_group_members($entry_dn, $_entry);
+ if ($group_group_members) {
+ $group_members = array_merge($group_members, $group_group_members);
+ }
+ }
+ }
+ }
+
+ return array_filter($group_members);
+ }
+
+ /**
+ * memberUrl attribute parser
+ *
+ * @param string $url URL string
+ *
+ * @return array URL elements
+ */
+ private function parse_memberurl($url)
+ {
+ preg_match('/(.*):\/\/(.*)\/(.*)\?(.*)\?(.*)\?(.*)/', $url, $matches);
+ return $matches;
+ }
+
+ private function modify_entry_attributes($subject_dn, $attributes)
+ {
+ // Opportunities to set false include failed ldap commands.
+ $result = true;
+
+ if (is_array($attributes['rename']) && !empty($attributes['rename'])) {
+ $olddn = $attributes['rename']['dn'];
+ $newrdn = $attributes['rename']['new_rdn'];
+
+ if (!empty($attributes['rename']['new_parent'])) {
+ $new_parent = $attributes['rename']['new_parent'];
+ }
+ else {
+ $new_parent = null;
+ }
+
+ $this->_debug("LDAP: C: Rename $olddn to $newrdn,$new_parent");
+
+ $result = ldap_rename($this->conn, $olddn, $newrdn, $new_parent, true);
+
+ if ($result) {
+ $this->_debug("LDAP: S: OK");
+
+ if ($new_parent) {
+ $subject_dn = $newrdn . ',' . $new_parent;
+ }
+ else {
+ $old_parent_dn_components = ldap_explode_dn($olddn, 0);
+ unset($old_parent_dn_components["count"]);
+ $old_rdn = array_shift($old_parent_dn_components);
+ $old_parent_dn = implode(",", $old_parent_dn_components);
+ $subject_dn = $newrdn . ',' . $old_parent_dn;
+ }
+ }
+ else {
+ $this->_debug("LDAP: S: " . ldap_error($this->conn));
+ $this->_warning("LDAP: Failed to rename $olddn to $newrdn,$new_parent");
+ return false;
+ }
+ }
+
+ if (is_array($attributes['replace']) && !empty($attributes['replace'])) {
+ $this->_debug("LDAP: C: Mod-Replace $subject_dn: " . json_encode($attributes['replace']));
+
+ $result = ldap_mod_replace($this->conn, $subject_dn, $attributes['replace']);
+
+ if ($result) {
+ $this->_debug("LDAP: S: OK");
+ }
+ else {
+ $this->_debug("LDAP: S: " . ldap_error($this->conn));
+ $this->_warning("LDAP: Failed to replace attributes on $subject_dn: " . json_encode($attributes['replace']));
+ return false;
+ }
+ }
+
+ if (is_array($attributes['del']) && !empty($attributes['del'])) {
+ $this->_debug("LDAP: C: Mod-Delete $subject_dn: " . json_encode($attributes['del']));
+
+ $result = ldap_mod_del($this->conn, $subject_dn, $attributes['del']);
+
+ if ($result) {
+ $this->_debug("LDAP: S: OK");
+ }
+ else {
+ $this->_debug("LDAP: S: " . ldap_error($this->conn));
+ $this->_warning("LDAP: Failed to delete attributes on $subject_dn: " . json_encode($attributes['del']));
+ return false;
+ }
+ }
+
+ if (is_array($attributes['add']) && !empty($attributes['add'])) {
+ $this->_debug("LDAP: C: Mod-Add $subject_dn: " . json_encode($attributes['add']));
+
+ $result = ldap_mod_add($this->conn, $subject_dn, $attributes['add']);
+
+ if ($result) {
+ $this->_debug("LDAP: S: OK");
+ }
+ else {
+ $this->_debug("LDAP: S: " . ldap_error($this->conn));
+ $this->_warning("LDAP: Failed to add attributes on $subject_dn: " . json_encode($attributes['add']));
+ return false;
+ }
+ }
+
+ return true;
+ }
+
+ private function parse_attribute_level_rights($attribute_value)
+ {
+ $attribute_value = str_replace(", ", ",", $attribute_value);
+ $attribute_values = explode(",", $attribute_value);
+ $attribute_value = array();
+
+ foreach ($attribute_values as $access_right) {
+ $access_right_components = explode(":", $access_right);
+ $access_attribute = strtolower(array_shift($access_right_components));
+ $access_value = array_shift($access_right_components);
+
+ $attribute_value[$access_attribute] = array();
+
+ for ($i = 0; $i < strlen($access_value); $i++) {
+ $method = $this->attribute_level_rights_map[substr($access_value, $i, 1)];
+
+ if (!in_array($method, $attribute_value[$access_attribute])) {
+ $attribute_value[$access_attribute][] = $method;
+ }
+ }
+ }
+
+ return $attribute_value;
+ }
+
+ private function parse_entry_level_rights($attribute_value)
+ {
+ $_attribute_value = array();
+
+ for ($i = 0; $i < strlen($attribute_value); $i++) {
+ $method = $this->entry_level_rights_map[substr($attribute_value, $i, 1)];
+
+ if (!in_array($method, $_attribute_value)) {
+ $_attribute_value[] = $method;
+ }
+ }
+
+ return $_attribute_value;
+ }
+
+ private function supported_controls()
+ {
+ if (!empty($this->supported_controls)) {
+ return $this->supported_controls;
+ }
+
+ $this->_info("Obtaining supported controls");
+
+ if ($result = $this->search('', '(objectclass=*)', 'base', array('supportedcontrol'))) {
+ $result = $result->entries(true);
+ $control = $result['']['supportedcontrol'];
+ }
+ else {
+ $control = array();
+ }
+
+ $this->_info("Obtained " . count($control) . " supported controls");
+ $this->supported_controls = $control;
+
+ return $control;
+ }
+
+ protected function _alert()
+ {
+ $this->__log(LOG_ALERT, func_get_args());
+ }
+
+ protected function _critical()
+ {
+ $this->__log(LOG_CRIT, func_get_args());
+ }
+
+ protected function _debug()
+ {
+ $this->__log(LOG_DEBUG, func_get_args());
+ }
+
+ protected function _emergency()
+ {
+ $this->__log(LOG_EMERG, func_get_args());
+ }
+
+ protected function _error()
+ {
+ $this->__log(LOG_ERR, func_get_args());
+ }
+
+ protected function _info()
+ {
+ $this->__log(LOG_INFO, func_get_args());
+ }
+
+ protected function _notice()
+ {
+ $this->__log(LOG_NOTICE, func_get_args());
+ }
+
+ protected function _warning()
+ {
+ $this->__log(LOG_WARNING, func_get_args());
+ }
+
+ /**
+ * Log a message.
+ */
+ private function __log($level, $args)
+ {
+ $msg = array();
+
+ foreach ($args as $arg) {
+ $msg[] = !is_string($arg) ? var_export($arg, true) : $arg;
+ }
+
+ if (!empty($this->_log_hook)) {
+ call_user_func_array($this->_log_hook, array($level, $msg));
+ return;
+ }
+
+ if ($this->debug_level > 0) {
+ syslog($level, implode("\n", $msg));
+ }
+ }
+
+ /**
+ * Add BER sequence with correct length and the given identifier
+ */
+ private static function _ber_addseq($str, $identifier)
+ {
+ $len = dechex(strlen($str)/2);
+ if (strlen($len) % 2 != 0) {
+ $len = '0'.$len;
+ }
+
+ return $identifier . $len . $str;
+ }
+
+ /**
+ * Returns BER encoded integer value in hex format
+ */
+ private static function _ber_encode_int($offset)
+ {
+ $val = dechex($offset);
+ $prefix = '';
+
+ // check if bit 8 of high byte is 1
+ if (preg_match('/^[89abcdef]/', $val)) {
+ $prefix = '00';
+ }
+
+ if (strlen($val)%2 != 0) {
+ $prefix .= '0';
+ }
+
+ return $prefix . $val;
+ }
+
+ /**
+ * Quotes attribute value string
+ *
+ * @param string $str Attribute value
+ * @param bool $dn True if the attribute is a DN
+ *
+ * @return string Quoted string
+ */
+ public static function quote_string($str, $is_dn = false)
+ {
+ // take firt entry if array given
+ if (is_array($str)) {
+ $str = reset($str);
+ }
+
+ if ($is_dn) {
+ $replace = array(
+ ',' => '\2c',
+ '=' => '\3d',
+ '+' => '\2b',
+ '<' => '\3c',
+ '>' => '\3e',
+ ';' => '\3b',
+ "\\"=> '\5c',
+ '"' => '\22',
+ '#' => '\23'
+ );
+ }
+ else {
+ $replace = array(
+ '*' => '\2a',
+ '(' => '\28',
+ ')' => '\29',
+ "\\" => '\5c',
+ '/' => '\2f'
+ );
+ }
+
+ return strtr($str, $replace);
+ }
+
+ /**
+ * create ber encoding for sort control
+ *
+ * @param array List of cols to sort by
+ * @return string BER encoded option value
+ */
+ private static function _sort_ber_encode($sortcols)
+ {
+ $str = '';
+ foreach (array_reverse((array)$sortcols) as $col) {
+ $ber_val = self::_string2hex($col);
+
+ // 30 = ber sequence with a length of octet value
+ // 04 = octet string with a length of the ascii value
+ $oct = self::_ber_addseq($ber_val, '04');
+ $str = self::_ber_addseq($oct, '30') . $str;
+ }
+
+ // now tack on sequence identifier and length
+ $str = self::_ber_addseq($str, '30');
+
+ return pack('H'.strlen($str), $str);
+ }
+
+ /**
+ * Returns ascii string encoded in hex
+ */
+ private static function _string2hex($str)
+ {
+ $hex = '';
+ for ($i=0; $i < strlen($str); $i++)
+ $hex .= dechex(ord($str[$i]));
+
+ return $hex;
+ }
+
+ /**
+ * Generate BER encoded string for Virtual List View option
+ *
+ * @param integer List offset (first record)
+ * @param integer Records per page
+ * @return string BER encoded option value
+ */
+ private static function _vlv_ber_encode($offset, $rpp, $search = '')
+ {
+ // This string is ber-encoded, php will prefix this value with:
+ // 04 (octet string) and 10 (length of 16 bytes)
+ // the code behind this string is broken down as follows:
+ // 30 = ber sequence with a length of 0e (14) bytes following
+ // 02 = type integer (in two's complement form) with 2 bytes following (beforeCount): 01 00 (ie 0)
+ // 02 = type integer (in two's complement form) with 2 bytes following (afterCount): 01 18 (ie 25-1=24)
+ // a0 = type context-specific/constructed with a length of 06 (6) bytes following
+ // 02 = type integer with 2 bytes following (offset): 01 01 (ie 1)
+ // 02 = type integer with 2 bytes following (contentCount): 01 00
+
+ // whith a search string present:
+ // 81 = type context-specific/constructed with a length of 04 (4) bytes following (the length will change here)
+ // 81 indicates a user string is present where as a a0 indicates just a offset search
+ // 81 = type context-specific/constructed with a length of 06 (6) bytes following
+
+ // the following info was taken from the ISO/IEC 8825-1:2003 x.690 standard re: the
+ // encoding of integer values (note: these values are in
+ // two-complement form so since offset will never be negative bit 8 of the
+ // leftmost octet should never by set to 1):
+ // 8.3.2: If the contents octets of an integer value encoding consist
+ // of more than one octet, then the bits of the first octet (rightmost) and bit 8
+ // of the second (to the left of first octet) octet:
+ // a) shall not all be ones; and
+ // b) shall not all be zero
+
+ if ($search) {
+ $search = preg_replace('/[^-[:alpha:] ,.()0-9]+/', '', $search);
+ $ber_val = self::_string2hex($search);
+ $str = self::_ber_addseq($ber_val, '81');
+ }
+ else {
+ // construct the string from right to left
+ $str = "020100"; # contentCount
+
+ // returns encoded integer value in hex format
+ $ber_val = self::_ber_encode_int($offset);
+
+ // calculate octet length of $ber_val
+ $str = self::_ber_addseq($ber_val, '02') . $str;
+
+ // now compute length over $str
+ $str = self::_ber_addseq($str, 'a0');
+ }
+
+ // now tack on records per page
+ $str = "020100" . self::_ber_addseq(self::_ber_encode_int($rpp-1), '02') . $str;
+
+ // now tack on sequence identifier and length
+ $str = self::_ber_addseq($str, '30');
+
+ return pack('H'.strlen($str), $str);
+ }
+
+ private function _fuzzy_search_prefix()
+ {
+ switch ($this->config_get("fuzzy_search", 2)) {
+ case 2:
+ return "*";
+ break;
+ case 1:
+ case 0:
+ default:
+ return "";
+ break;
+ }
+ }
+
+ private function _fuzzy_search_suffix()
+ {
+ switch ($this->config_get("fuzzy_search", 2)) {
+ case 2:
+ return "*";
+ break;
+ case 1:
+ return "*";
+ case 0:
+ default:
+ return "";
+ break;
+ }
+ }
+
+ /**
+ * Return the search string value to be used in VLV controls
+ */
+ private function _vlv_search($sort, $search)
+ {
+ if (!empty($this->additional_filter)) {
+ $this->_debug("Not setting a VLV search filter because we already have a filter");
+ return;
+ }
+
+ if (empty($search)) {
+ return;
+ }
+
+ $search_suffix = $this->_fuzzy_search_suffix();
+
+ foreach ($search as $attr => $value) {
+ if (!in_array(strtolower($attr), $sort)) {
+ $this->_debug("Cannot use VLV search using attribute not indexed: $attr (not in " . var_export($sort, true) . ")");
+ return;
+ }
+ else {
+ return $value . $search_suffix;
+ }
+ }
+ }
+
+ /**
+ * Set server controls for Virtual List View (paginated listing)
+ */
+ private function _vlv_set_controls($sort, $list_page, $page_size, $search = null)
+ {
+ $sort_ctrl = array(
+ 'oid' => "1.2.840.113556.1.4.473",
+ 'value' => self::_sort_ber_encode($sort)
+ );
+
+ if (!empty($search)) {
+ $this->_debug("_vlv_set_controls to include search: " . var_export($search, true));
+ }
+
+ $vlv_ctrl = array(
+ 'oid' => "2.16.840.1.113730.3.4.9",
+ 'value' => self::_vlv_ber_encode(
+ $offset = ($list_page-1) * $page_size + 1,
+ $page_size,
+ $search
+ ),
+ 'iscritical' => true
+ );
+
+ $this->_debug("C: set controls sort=" . join(' ', unpack('H'.(strlen($sort_ctrl['value'])*2), $sort_ctrl['value']))
+ . " (" . implode(',', (array) $sort) . ");"
+ . " vlv=" . join(' ', (unpack('H'.(strlen($vlv_ctrl['value'])*2), $vlv_ctrl['value']))) . " ($offset/$page_size)");
+
+ if (!ldap_set_option($this->conn, LDAP_OPT_SERVER_CONTROLS, array($sort_ctrl, $vlv_ctrl))) {
+ $this->_debug("S: ".ldap_error($this->conn));
+ $this->set_error(self::ERROR_SEARCH, 'vlvnotsupported');
+
+ return false;
+ }
+
+ return true;
+ }
+
+}