1 <?php
2 /*
3 * This code is part of GOsa (http://www.gosa-project.org)
4 * Copyright (C) 2003-2008 GONICUS GmbH
5 *
6 * ID: $$Id$$
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
21 */
23 /*!
24 \brief user plugin
25 \author Cajus Pollmeier <pollmeier@gonicus.de>
26 \version 2.00
27 \date 24.07.2003
29 This class provides the functionality to read and write all attributes
30 relevant for person, organizationalPerson, inetOrgPerson and gosaAccount
31 from/to the LDAP. It does syntax checking and displays the formulars required.
32 */
34 class user extends plugin
35 {
36 /* Definitions */
37 var $plHeadline= "Generic";
38 var $plDescription= "Edit organizational user settings";
40 /* Plugin specific values */
41 var $base= "";
42 var $orig_base= "";
43 var $cn= "";
44 var $new_dn= "";
45 var $personalTitle= "";
46 var $academicTitle= "";
47 var $homePostalAddress= "";
48 var $homePhone= "";
49 var $labeledURI= "";
50 var $o= "";
51 var $ou= "";
52 var $departmentNumber= "";
53 var $gosaLoginRestriction= array();
54 var $gosaLoginRestrictionWidget;
55 var $employeeNumber= "";
56 var $employeeType= "";
57 var $roomNumber= "";
58 var $telephoneNumber= "";
59 var $facsimileTelephoneNumber= "";
60 var $mobile= "";
61 var $pager= "";
62 var $l= "";
63 var $st= "";
64 var $postalAddress= "";
65 var $dateOfBirth;
66 var $use_dob= "0";
67 var $gender="0";
68 var $preferredLanguage="0";
69 var $baseSelector;
71 var $jpegPhoto= "*removed*";
72 var $photoData= "";
73 var $old_jpegPhoto= "";
74 var $old_photoData= "";
75 var $cert_dialog= FALSE;
76 var $picture_dialog= FALSE;
77 var $pwObject= NULL;
79 var $userPKCS12= "";
80 var $userSMIMECertificate= "";
81 var $userCertificate= "";
82 var $certificateSerialNumber= "";
83 var $old_certificateSerialNumber= "";
84 var $old_userPKCS12= "";
85 var $old_userSMIMECertificate= "";
86 var $old_userCertificate= "";
88 var $gouvernmentOrganizationalUnit= "";
89 var $houseIdentifier= "";
90 var $street= "";
91 var $postalCode= "";
92 var $vocation= "";
93 var $ivbbLastDeliveryCollective= "";
94 var $gouvernmentOrganizationalPersonLocality= "";
95 var $gouvernmentOrganizationalUnitDescription= "";
96 var $gouvernmentOrganizationalUnitSubjectArea= "";
97 var $functionalTitle= "";
98 var $role= "";
99 var $publicVisible= "";
101 var $orig_dn;
102 var $dialog;
104 /* variables to trigger password changes */
105 var $pw_storage= "md5";
106 var $last_pw_storage= "unset";
107 var $had_userCertificate= FALSE;
109 var $view_logged = FALSE;
111 var $manager = "";
112 var $manager_name = "";
115 /* attribute list for save action */
116 var $attributes= array("sn", "givenName", "uid", "personalTitle", "academicTitle",
117 "homePostalAddress", "homePhone", "labeledURI", "ou", "o", "dateOfBirth", "gender","preferredLanguage",
118 "departmentNumber", "employeeNumber", "employeeType", "l", "st","jpegPhoto",
119 "roomNumber", "telephoneNumber", "mobile", "pager", "cn", "userPKCS12",
120 "postalAddress", "facsimileTelephoneNumber", "userSMIMECertificate", "gosaLoginRestriction", "manager");
122 var $objectclasses= array("top", "person", "organizationalPerson", "inetOrgPerson",
123 "gosaAccount");
125 /* attributes that are part of the government mode */
126 var $govattrs= array("gouvernmentOrganizationalUnit", "houseIdentifier", "vocation",
127 "ivbbLastDeliveryCollective", "gouvernmentOrganizationalPersonLocality",
128 "gouvernmentOrganizationalUnitDescription","gouvernmentOrganizationalUnitSubjectArea",
129 "functionalTitle", "certificateSerialNumber", "publicVisible", "street", "role",
130 "postalCode");
132 var $multiple_support = TRUE;
134 var $governmentmode = FALSE;
136 /* constructor, if 'dn' is set, the node loads the given
137 'dn' from LDAP */
138 function user (&$config, $dn= NULL)
139 {
140 global $lang;
142 $this->config= $config;
143 /* Configuration is fine, allways */
144 if($this->config->get_cfg_value("honourIvbbAttributes") == "true"){
145 $this->governmentmode = TRUE;
146 $this->attributes=array_merge($this->attributes,$this->govattrs);
147 }
149 /* Load base attributes */
150 plugin::plugin ($config, $dn);
152 $this->orig_dn = $this->dn;
153 $this->new_dn = $dn;
155 if ($this->governmentmode){
156 /* Fix public visible attribute if unset */
157 if (!isset($this->attrs['publicVisible'])){
158 $this->publicVisible == "nein";
159 }
160 }
162 /* Load government mode attributes */
163 if ($this->governmentmode){
164 /* Copy all attributs */
165 foreach ($this->govattrs as $val){
166 if (isset($this->attrs["$val"][0])){
167 $this->$val= $this->attrs["$val"][0];
168 }
169 }
170 }
172 /* Create me for new accounts */
173 if ($dn == "new"){
174 $this->is_account= TRUE;
175 }
177 /* Make hash default to md5 if not set in config */
178 $hash= $this->config->get_cfg_value("passwordDefaultHash", "crypt/md5");
180 /* Load data from LDAP? */
181 if ($dn !== NULL){
183 /* Do base conversation */
184 if ($this->dn == "new"){
185 $ui= get_userinfo();
186 $this->base= dn2base(session::global_is_set("CurrentMainBase")?"cn=dummy,".session::global_get("CurrentMainBase"):$ui->dn);
187 } else {
188 $this->base= dn2base($dn);
189 }
191 /* get password storage type */
192 if (isset ($this->attrs['userPassword'][0])){
193 /* Initialize local array */
194 $matches= array();
195 if (preg_match ("/^{[^}]+}/", $this->attrs['userPassword'][0])){
196 $tmp= passwordMethod::get_method($this->attrs['userPassword'][0]);
197 if(is_object($tmp)){
198 $this->pw_storage= $tmp->get_hash();
199 }
201 } else {
202 if ($this->attrs['userPassword'][0] != ""){
203 $this->pw_storage= "clear";
204 } else {
205 $this->pw_storage= $hash;
206 }
207 }
208 } else {
209 /* Preset with vaule from configuration */
210 $this->pw_storage= $hash;
211 }
213 /* Load extra attributes: certificate and picture */
214 $this->load_cert();
215 $this->load_picture();
216 if ($this->userCertificate != ""){
217 $this->had_userCertificate= TRUE;
218 }
219 }
221 /* Reset password storage indicator, used by password_change_needed() */
222 if ($dn == "new"){
223 $this->last_pw_storage= "unset";
224 } else {
225 $this->last_pw_storage= $this->pw_storage;
226 }
228 /* Generate dateOfBirth entry */
229 if (isset ($this->attrs['dateOfBirth'])){
230 /* This entry is ISO 8601 conform */
231 list($year, $month, $day)= explode("-", $this->attrs['dateOfBirth'][0], 3);
233 #TODO: use $lang to convert date
234 $this->dateOfBirth= "$day.$month.$year";
235 } else {
236 $this->dateOfBirth= "";
237 }
239 /* Put gender attribute to upper case */
240 if (isset ($this->attrs['gender'])){
241 $this->gender= strtoupper($this->attrs['gender'][0]);
242 }
244 // Get login restrictions
245 if(isset($this->attrs['gosaLoginRestriction'])){
246 $this->gosaLoginRestriction =array();
247 for($i =0;$i < $this->attrs['gosaLoginRestriction']['count']; $i++){
248 $this->gosaLoginRestriction[] = $this->attrs['gosaLoginRestriction'][$i];
249 }
250 }
251 $this->gosaLoginRestrictionWidget= new sortableListing($this->gosaLoginRestriction);
252 $this->gosaLoginRestrictionWidget->setDeleteable(true);
253 $this->gosaLoginRestrictionWidget->setColspecs(array('*'));
254 $this->gosaLoginRestrictionWidget->setWidth("100%");
255 $this->gosaLoginRestrictionWidget->setHeight("70px");
257 $this->orig_base = $this->base;
258 $this->baseSelector= new baseSelector($this->allowedBasesToMoveTo(), $this->base);
259 $this->baseSelector->setSubmitButton(false);
260 $this->baseSelector->setHeight(300);
261 $this->baseSelector->update(true);
264 // Detect the managers name
265 $this->manager_name = "";
266 $ldap = $this->config->get_ldap_link();
267 if(!empty($this->manager)){
268 $ldap->cat($this->manager, array('cn'));
269 if($ldap->count()){
270 $attrs = $ldap->fetch();
271 $this->manager_name = $attrs['cn'][0];
272 }else{
273 $this->manager_name = "("._("Unknown")."!): ".$this->manager;
274 }
275 }
276 }
279 /* execute generates the html output for this node */
280 function execute()
281 {
282 /* Call parent execute */
283 plugin::execute();
285 /* Set list ACL */
286 $this->gosaLoginRestrictionWidget->setAcl($this->getacl('gosaLoginRestriction'));
287 $this->gosaLoginRestrictionWidget->update();
289 /* Handle add/delete for restriction mode */
290 if (isset($_POST['add_res']) && isset($_POST['res'])) {
291 $val= validate($_POST['res']);
292 if (preg_match('/^[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+$/', $val) ||
293 preg_match('/^([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)\/([0-9]+)$/', $val) ||
294 preg_match('/^([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)\/([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)$/', $val)) {
295 $this->gosaLoginRestrictionWidget->addEntry($val);
296 } else {
297 msg_dialog::display(_("Error"), _("Please add a single IP address or a network/netmask combination!"), ERROR_DIALOG);
298 }
299 }
301 /* Log view */
302 if($this->is_account && !$this->view_logged){
303 $this->view_logged = TRUE;
304 new log("view","users/".get_class($this),$this->dn);
305 }
307 // Clear manager attribute if requested
308 if(preg_match("/ removeManager/i", " ".implode(array_keys($_POST),' ')." ")){
309 $this->manager = "";
310 $this->manager_name = "";
311 }
313 // Allow to select a new inetOrgPersion:manager
314 if(preg_match("/ editManager/i", " ".implode(array_keys($_POST),' ')." ")){
315 $this->dialog = new singleUserSelect($this->config, get_userinfo());
316 }
317 if($this->dialog && $this->dialog instanceOf singleUserSelect && count($this->dialog->detectPostActions())){
318 $users = $this->dialog->detectPostActions();
319 if(isset($users['targets']) && count($users['targets'])){
321 $headpage = $this->dialog->getHeadpage();
322 $dn = $users['targets'][0];
323 $attrs = $headpage->getEntry($dn);
324 $this->manager = $dn;
325 $this->manager_name = $attrs['cn'][0];
326 $this->dialog = NULL;
327 }
328 }
329 if(isset($_POST['add_users_cancel'])){
330 $this->dialog = NULL;
331 }
332 if($this->dialog instanceOf singleUserSelect) return($this->dialog->execute());
335 $smarty= get_smarty();
336 $smarty->assign("usePrototype", "true");
337 $smarty->assign("gosaLoginRestrictionWidget", $this->gosaLoginRestrictionWidget->render());
339 /* Assign sex */
340 $sex= array(0 => " ", "F" => _("female"), "M" => _("male"));
341 $smarty->assign("gender_list", $sex);
342 $language= array_merge(array(0 => " ") ,get_languages(TRUE));
343 $smarty->assign("preferredLanguage_list", $language);
345 /* Get random number for pictures */
346 srand((double)microtime()*1000000);
347 $smarty->assign("rand", rand(0, 10000));
350 /* Do we represent a valid gosaAccount? */
351 if (!$this->is_account){
352 $str = "<img alt=\"\" src=\"images/small-error.png\" align=\"middle\"> <b>".
353 msgPool::noValidExtension("GOsa")."</b>";
354 return($str);
355 }
357 /* Password configure dialog handling */
358 if(is_object($this->pwObject) && $this->pwObject->display){
359 $output= $this->pwObject->configure();
360 if ($output != ""){
361 $this->dialog= TRUE;
362 return $output;
363 }
364 $this->dialog= false;
365 }
367 /* Dialog handling */
368 if(is_object($this->dialog)){
369 /* Must be called before save_object */
370 $this->dialog->save_object();
372 if($this->dialog->isClosed()){
373 $this->dialog = false;
374 }elseif($this->dialog->isSelected()){
376 /* check if selected base is allowed to move to / create a new object */
377 $tmp = $this->get_allowed_bases();
378 if(isset($tmp[$this->dialog->isSelected()])){
379 $this->base = $this->dialog->isSelected();
380 }
381 $this->dialog= false;
382 }else{
383 return($this->dialog->execute());
384 }
385 }
387 /* Want password method editing? */
388 if ($this->acl_is_writeable("userPassword")){
389 if (isset($_POST['edit_pw_method'])){
390 if (!is_object($this->pwObject) || $this->pw_storage != $this->pwObject->get_hash_name()){
391 $temp= passwordMethod::get_available_methods();
392 $this->pwObject= new $temp[$this->pw_storage]($this->config,$this->dn);
393 }
394 $this->pwObject->display = TRUE;
395 $this->dialog= TRUE;
396 return ($this->pwObject->configure());
397 }
398 }
400 /* Want picture edit dialog? */
401 if($this->acl_is_writeable("userPicture")) {
402 if (isset($_POST['edit_picture'])){
403 /* Save values for later recovery, in case some presses
404 the cancel button. */
405 $this->old_jpegPhoto= $this->jpegPhoto;
406 $this->old_photoData= $this->photoData;
407 $this->picture_dialog= TRUE;
408 $this->dialog= TRUE;
409 }
410 }
412 /* Remove picture? */
413 if($this->acl_is_writeable("userPicture")){
414 if (isset($_POST['picture_remove'])){
415 $this->set_picture ();
416 $this->jpegPhoto= "*removed*";
417 $this->is_modified= TRUE;
418 return($smarty->fetch (get_template_path('generic_picture.tpl', TRUE, dirname(__FILE__))));
419 }
420 }
422 /* Save picture */
423 if (isset($_POST['picture_edit_finish'])){
425 /* Check for clean upload */
426 if ($_FILES['picture_file']['name'] != ""){
427 if (!is_uploaded_file($_FILES['picture_file']['tmp_name'])) {
428 msg_dialog::display(_("Error"), _("Cannot upload file!"), ERROR_DIALOG);
429 }else{
430 /* Activate new picture */
431 $this->set_picture($_FILES['picture_file']['tmp_name']);
432 }
433 }
434 $this->picture_dialog= FALSE;
435 $this->dialog= FALSE;
436 $this->is_modified= TRUE;
437 }
440 /* Cancel picture */
441 if (isset($_POST['picture_edit_cancel'])){
443 /* Restore values */
444 $this->jpegPhoto= $this->old_jpegPhoto;
445 $this->photoData= $this->old_photoData;
447 /* Update picture */
448 session::set('binary',$this->photoData);
449 session::set('binarytype',"image/jpeg");
450 $this->picture_dialog= FALSE;
451 $this->dialog= FALSE;
452 }
454 /* Want certificate= */
455 if ((isset($_POST['edit_cert'])) && $this->acl_is_readable("Certificate")){
457 /* Save original values for later reconstruction */
458 foreach (array("certificateSerialNumber", "userCertificate",
459 "userSMIMECertificate", "userPKCS12") as $val){
461 $oval= "old_$val";
462 $this->$oval= $this->$val;
463 }
465 $this->cert_dialog= TRUE;
466 $this->dialog= TRUE;
467 }
470 /* Cancel certificate dialog */
471 if (isset($_POST['cert_edit_cancel'])){
473 /* Restore original values in case of 'cancel' */
474 foreach (array("certificateSerialNumber", "userCertificate",
475 "userSMIMECertificate", "userPKCS12") as $val){
477 $oval= "old_$val";
478 $this->$val= $this->$oval;
479 }
480 $this->cert_dialog= FALSE;
481 $this->dialog= FALSE;
482 }
485 /* Remove certificate? */
486 if($this->acl_is_writeable("Certificate")){
487 foreach (array ("userCertificate", "userSMIMECertificate", "userPKCS12") as $val){
488 if (isset($_POST["remove_$val"])){
490 /* Reset specified cert*/
491 $this->$val= "";
492 $this->is_modified= TRUE;
493 }
494 }
495 }
497 /* Upload new cert and close dialog? */
498 if($this->acl_is_writeable("Certificate")){
499 $fail =false;
500 if (isset($_POST['cert_edit_finish'])){
502 /* for all certificates do */
503 foreach (array ("userCertificate", "userSMIMECertificate", "userPKCS12")
504 as $val){
506 /* Check for clean upload */
507 if (array_key_exists($val."_file", $_FILES) &&
508 array_key_exists('name', $_FILES[$val."_file"]) &&
509 $_FILES[$val."_file"]['name'] != "" &&
510 is_uploaded_file($_FILES[$val."_file"]['tmp_name'])) {
511 $this->set_cert("$val", $_FILES[$val."_file"]['tmp_name']);
512 }
513 }
515 /* Save serial number */
516 if (isset($_POST["certificateSerialNumber"]) &&
517 $_POST["certificateSerialNumber"] != ""){
519 if (!tests::is_id($_POST["certificateSerialNumber"])){
520 $fail = true;
521 msg_dialog::display(_("Error"), msgPool::invalid(_("Serial number"),$_POST["certificateSerialNumber"],"/[0-9]/"),ERROR_DIALOG);
523 foreach(array("userCertificate", "userSMIMECertificate", "userPKCS12") as $cert){
524 if ($this->$cert != ""){
525 $smarty->assign("$cert"."_state", "true");
526 } else {
527 $smarty->assign("$cert"."_state", "");
528 }
529 }
530 }
532 $this->certificateSerialNumber= $_POST["certificateSerialNumber"];
533 $this->is_modified= TRUE;
534 }
535 if(!$fail){
536 $this->cert_dialog= FALSE;
537 $this->dialog= FALSE;
538 }
539 }
540 }
541 /* Display picture dialog */
542 if ($this->picture_dialog){
543 return($smarty->fetch (get_template_path('generic_picture.tpl', TRUE, dirname(__FILE__))));
544 }
546 /* Display cert dialog */
547 if ($this->cert_dialog){
548 $smarty->assign("CertificateACL",$this->getacl("Certificate"));
549 $smarty->assign("Certificate_readable",$this->acl_is_readable("Certificate"));
550 $smarty->assign("certificateSerialNumber",$this->certificateSerialNumber);
552 foreach(array("userCertificate", "userSMIMECertificate", "userPKCS12") as $cert){
553 if ($this->$cert != ""){
554 /* import certificate */
555 $certificate = new certificate;
556 $certificate->import($this->$cert);
558 /* Read out data*/
559 $timeto = $certificate->getvalidto_date();
560 $timefrom = $certificate->getvalidfrom_date();
563 /* Additional info if start end time is '0' */
564 $add_str_info = "";
565 if($timeto == 0 && $timefrom == 0){
566 $add_str_info = "<br><i>"._("(Some types of certificates are currently not supported and may be displayed as 'invalid'.)")."</i>";
567 }
569 $str = "<table \"\" border=0>
570 <tr>
571 <td style='vertical-align:top'>CN</td>
572 <td>".preg_replace("/ /", " ", $certificate->getname())."</td>
573 </tr>
574 </table><br>".
576 sprintf(_("Certificate is valid from %s to %s and is currently %s."),
577 "<b>".date('d M Y',$timefrom)."</b>",
578 "<b>".date('d M Y',$timeto)."</b>",
579 $certificate->isvalid()?"<b><font style='color:green'>"._("valid")."</font></b>":
580 "<b><font style='color:red'>"._("invalid")."</font></b>").$add_str_info;
582 $smarty->assign($cert."info",$str);
583 $smarty->assign($cert."_state","true");
584 } else {
585 $smarty->assign($cert."info", "<i>"._("No certificate installed")."</i>");
586 $smarty->assign($cert."_state","");
587 }
588 }
590 if($this->governmentmode){
591 $smarty->assign("honourIvbbAttributes", "true");
592 }else{
593 $smarty->assign("honourIvbbAttributes", "false");
594 }
595 $smarty->assign("governmentmode", $this->governmentmode);
596 return($smarty->fetch (get_template_path('generic_certs.tpl', TRUE, dirname(__FILE__))));
597 }
599 /* Prepare password hashes */
600 if ($this->pw_storage == ""){
601 $this->pw_storage= $this->config->get_cfg_value("hash");
602 }
604 $temp= passwordMethod::get_available_methods();
605 $is_configurable= FALSE;
606 $hashes = $temp['name'];
607 if(isset($temp[$this->pw_storage])){
608 $test= new $temp[$this->pw_storage]($this->config);
609 $is_configurable= $test->is_configurable();
610 }else{
611 new msg_dialog(_("Password method"),_("The selected password method is no longer available."),WARNING_DIALOG);
612 }
615 /* Create password methods array */
616 $pwd_methods = array();
617 foreach($hashes as $id => $name){
618 if(!empty($temp['desc'][$id])){
619 $pwd_methods[$name] = $name." (".$temp['desc'][$id].")";
620 }else{
621 $pwd_methods[$name] = $name;
622 }
623 }
625 /* Load attributes and acl's */
626 $ui =get_userinfo();
627 foreach($this->attributes as $val){
628 $smarty->assign("$val", $this->$val);
629 if(in_array($val,$this->multi_boxes)){
630 $smarty->assign("use_".$val,TRUE);
631 }else{
632 $smarty->assign("use_".$val,FALSE);
633 }
634 }
635 foreach(array("base","pw_storage","edit_picture") as $val){
636 if(in_array($val,$this->multi_boxes)){
637 $smarty->assign("use_".$val,TRUE);
638 }else{
639 $smarty->assign("use_".$val,FALSE);
640 }
641 }
643 /* Set acls */
644 $tmp = $this->plinfo();
645 foreach($tmp['plProvidedAcls'] as $val => $translation){
646 $smarty->assign("$val"."ACL", $this->getacl($val));
647 }
649 // Special ACL for gosaLoginRestrictions -
650 // In case of multiple edit, we need a readonly ACL for the list.
651 $smarty->assign('gosaLoginRestriction_ONLY_R_ACL', preg_replace("/[^r]/i","", $this->getacl($val)));
653 $smarty->assign("pwmode", $pwd_methods);
654 $smarty->assign("pwmode_select", $this->pw_storage);
655 $smarty->assign("pw_configurable", $is_configurable);
656 $smarty->assign("passwordStorageACL", $this->getacl("userPassword"));
657 $smarty->assign("CertificatesACL", $this->getacl("Certificate"));
658 $smarty->assign("userPictureACL", $this->getacl("userPicture"));
659 $smarty->assign("userPicture_is_readable", $this->acl_is_readable("userPicture"));
661 /* Create base acls */
662 $smarty->assign("base", $this->baseSelector->render());
664 /* Save government mode attributes */
665 if($this->governmentmode){
666 $smarty->assign("governmentmode", "true");
667 $ivbbmodes= array("nein", "ivbv", "testa", "ivbv,testa", "internet",
668 "internet,ivbv", "internet,testa", "internet,ivbv,testa");
669 $smarty->assign("ivbbmodes", $ivbbmodes);
670 foreach ($this->govattrs as $val){
671 $smarty->assign("$val", $this->$val);
672 $smarty->assign("$val"."ACL", $this->getacl($val));
673 }
674 } else {
675 $smarty->assign("governmentmode", "false");
676 }
678 /* Special mode for uid */
679 $uidACL= $this->getacl("uid");
680 if (isset ($this->dn)){
681 if ($this->dn != "new"){
682 $uidACL= preg_replace("/w/","",$uidACL);
683 }
684 } else {
685 $uidACL= preg_replace("/w/","",$uidACL);
686 }
688 $smarty->assign("uidACL", $uidACL);
689 $smarty->assign("is_template", $this->is_template);
690 $smarty->assign("use_dob", $this->use_dob);
692 if (isset($this->parent)){
693 if (isset($this->parent->by_object['phoneAccount']) &&
694 $this->parent->by_object['phoneAccount']->is_account){
695 $smarty->assign("has_phoneaccount", "true");
696 } else {
697 $smarty->assign("has_phoneaccount", "false");
698 }
699 } else {
700 $smarty->assign("has_phoneaccount", "false");
701 }
702 $smarty->assign("multiple_support" , $this->multiple_support_active);
703 $smarty->assign("manager_name",$this->manager_name);
704 return($smarty->fetch (get_template_path('generic.tpl', TRUE, dirname(__FILE__))));
705 }
708 /* remove object from parent */
709 function remove_from_parent()
710 {
711 /* Only remove valid accounts */
712 if(!$this->initially_was_account) return;
714 /* Remove password extension */
715 $temp= passwordMethod::get_available_methods();
717 /* Remove password method from user account */
718 if(isset($temp[$this->pw_storage]) && class_available($temp[$this->pw_storage])){
719 $this->pwObject= new $temp[$this->pw_storage]($this->config,$this->dn);
720 $this->pwObject->remove_from_parent();
721 }
723 /* Remove user */
724 $ldap= $this->config->get_ldap_link();
725 $ldap->rmdir ($this->dn);
726 if (!$ldap->success()){
727 msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error(), $this->dn, LDAP_DEL, get_class()));
728 }
730 new log("remove","users/".get_class($this),$this->dn,$this->attributes,$ldap->get_error());
732 /* Delete references to groups */
733 $ldap->cd ($this->config->current['BASE']);
734 $ldap->search ("(&(objectClass=posixGroup)(memberUid=".$this->uid."))", array("uid"));
735 while ($ldap->fetch()){
736 $g= new group($this->config, $ldap->getDN());
737 $g->removeUser($this->uid);
738 $g->save ();
739 }
741 /* Delete references to object groups */
742 $ldap->cd ($this->config->current['BASE']);
743 $ldap->search ("(&(objectClass=gosaGroupOfNames)(member=".LDAP::prepare4filter($this->dn)."))", array("cn"));
744 while ($ldap->fetch()){
745 $og= new ogroup($this->config, $ldap->getDN());
746 unset($og->member[$this->dn]);
747 $og->member= array_values($og->member);
748 $og->save ();
749 }
751 // Update 'manager' attributes from gosaDepartment and inetOrgPerson
752 $filter = "(&(objectClass=inetOrgPerson)(manager=".LDAP::prepare4filter($this->dn)."))";
753 $ocs = $ldap->get_objectclasses();
754 if(isset($ocs['gosaDepartment']['MAY']) && in_array('manager', $ocs['gosaDepartment']['MAY'])){
755 $filter = "(|".$filter."(&(objectClass=gosaDepartment)(manager=".LDAP::prepare4filter($this->dn).")))";
756 }
757 $leaf_deps= get_list($filter,array("all"),$this->config->current['BASE'],
758 array("manager","dn","objectClass"),GL_SUBSEARCH | GL_NO_ACL_CHECK);
759 foreach($leaf_deps as $entry){
760 $update = array('manager' => array());
761 $ldap->cd($entry['dn']);
762 $ldap->modify($update);
763 if(!$ldap->success()){
764 trigger_error(sprintf("Failed to update manager for '%s', error was '%s'", $entry['dn'], $ldap->get_error()));
765 }
766 }
768 /* Delete references to roles */
769 $ldap->cd ($this->config->current['BASE']);
770 $ldap->search ("(&(objectClass=organizationalRole)(roleOccupant=".LDAP::prepare4filter($this->dn)."))", array("cn"));
771 while ($ldap->fetch()){
772 $role= new roleGeneric($this->config, $ldap->getDN());
773 $key = array_search($this->dn,$role->roleOccupant);
774 if($key !== FALSE){
775 unset($role->roleOccupant[$key]);
776 $role->roleOccupant= array_values($role->roleOccupant);
777 $role->save ();
778 }
779 }
781 /* If needed, let the password method do some cleanup */
782 $tmp = new passwordMethod($this->config);
783 $available = $tmp->get_available_methods();
784 if (in_array_ics($this->pw_storage, $available['name'])){
785 $test= new $available[$this->pw_storage]($this->config);
786 $test->attrs= $this->attrs;
787 $test->dn= $this->dn;
788 $test->remove_from_parent();
789 }
791 /* Remove ACL dependencies too */
792 acl::remove_acl_for($this->dn);
794 /* Optionally execute a command after we're done */
795 $this->handle_post_events("remove",array("uid" => $this->uid));
796 }
799 /* Save data to object */
800 function save_object()
801 {
802 if(isset($_POST['generic']) || isset($_POST['multiple_user_posted'])){
804 /* Make a backup of the current selected base */
805 $base_tmp = $this->base;
807 /* Parents save function */
808 plugin::save_object ();
810 /* Refresh base */
811 if ($this->acl_is_moveable($this->base)){
812 if (!$this->baseSelector->update()) {
813 msg_dialog::display(_("Error"), msgPool::permMove(), ERROR_DIALOG);
814 }
815 if ($this->base != $this->baseSelector->getBase()) {
816 $this->base= $this->baseSelector->getBase();
817 $this->is_modified= TRUE;
818 }
819 }
821 /* Sync lists */
822 $this->gosaLoginRestrictionWidget->save_object();
823 if ($this->gosaLoginRestrictionWidget->isModified()) {
824 $this->gosaLoginRestriction= array_values($this->gosaLoginRestrictionWidget->getMaintainedData());
825 }
827 /* Save government mode attributes */
828 if ($this->governmentmode){
829 foreach ($this->govattrs as $val){
830 if ($this->acl_is_writeable($val)){
831 $data= stripcslashes($_POST["$val"]);
832 if ($data != $this->$val){
833 $this->is_modified= TRUE;
834 }
835 $this->$val= $data;
836 }
837 }
838 }
840 /* In template mode, the uid is autogenerated... */
841 if ($this->is_template){
842 $this->uid= strtolower($this->sn);
843 $this->givenName= $this->sn;
844 }
846 /* Get pw_storage mode */
847 if (isset($_POST['pw_storage'])){
848 foreach(array("pw_storage") as $val){
849 if(isset($_POST[$val])){
850 $data= validate($_POST[$val]);
851 if ($data != $this->$val){
852 $this->is_modified= TRUE;
853 }
854 $this->$val= $data;
855 }
856 }
857 }
859 if($this->pw_storage != $this->last_pw_storage && isset($_POST['pw_storage'])){
860 if ($this->acl_is_writeable("userPassword")){
861 $temp= passwordMethod::get_available_methods();
862 if (!is_object($this->pwObject) || !($this->pwObject instanceOf $temp[$this->pw_storage])){
863 foreach($temp as $id => $data){
864 if(isset($data['name']) && $data['name'] == $this->pw_storage && $data['is_configurable']){
865 $this->pwObject= new $temp[$this->pw_storage]($this->config,$this->dn);
866 break;
867 }
868 }
869 }
870 }
871 }
873 /* Save current cn
874 */
875 $this->cn = $this->givenName." ".$this->sn;
876 }
877 }
879 function rebind($ldap, $referral)
880 {
881 $credentials= LDAP::get_credentials($referral, $this->config->current['REFERRAL']);
882 if (ldap_bind($ldap, $credentials['ADMIN'], $credentials['PASSWORD'])) {
883 $this->error = "Success";
884 $this->hascon=true;
885 $this->reconnect= true;
886 return (0);
887 } else {
888 $this->error = "Could not bind to " . $credentials['ADMIN'];
889 return NULL;
890 }
891 }
894 /* Save data to LDAP, depending on is_account we save or delete */
895 function save()
896 {
897 global $lang;
899 /* Only force save of changes ....
900 If this attributes aren't changed, avoid saving.
901 */
903 if($this->gender=="0") $this->gender ="";
904 if($this->preferredLanguage=="0") $this->preferredLanguage ="";
906 /* First use parents methods to do some basic fillup in $this->attrs */
907 plugin::save ();
909 if ($this->dateOfBirth != ""){
910 if(!is_array($this->attrs['dateOfBirth'])) {
911 #TODO: use $lang to convert date
912 list($day, $month, $year)= explode(".", $this->dateOfBirth);
913 $this->attrs['dateOfBirth'] = sprintf("%04d-%02d-%02d", $year, $month, $day);
914 }
915 }
917 /* Remove additional objectClasses */
918 $tmp= array();
919 foreach ($this->attrs['objectClass'] as $key => $set){
920 $found= false;
921 foreach (array("ivbbentry", "gosaUserTemplate") as $val){
922 if (preg_match ("/^$set$/i", $val)){
923 $found= true;
924 break;
925 }
926 }
927 if (!$found){
928 $tmp[]= $set;
929 }
930 }
932 /* Replace the objectClass array. This is done because of the
933 separation into government and normal mode. */
934 $this->attrs['objectClass']= $tmp;
936 /* Add objectClasss for template mode? */
937 if ($this->is_template){
938 $this->attrs['objectClass'][]= "gosaUserTemplate";
939 }
941 /* Hard coded government mode? */
942 if ($this->governmentmode){
943 $this->attrs['objectClass'][]= "ivbbentry";
945 /* Copy standard attributes */
946 foreach ($this->govattrs as $val){
947 if ($this->$val != ""){
948 $this->attrs["$val"]= $this->$val;
949 } elseif (!$this->is_new) {
950 $this->attrs["$val"]= array();
951 }
952 }
954 /* Remove attribute if set to "nein" */
955 if ($this->publicVisible == "nein"){
956 $this->attrs['publicVisible']= array();
957 if($this->is_new){
958 unset($this->attrs['publicVisible']);
959 }else{
960 $this->attrs['publicVisible']=array();
961 }
963 }
965 }
967 /* Special handling for attribute userCertificate needed */
968 if ($this->userCertificate != ""){
969 $this->attrs["userCertificate;binary"]= $this->userCertificate;
970 $remove_userCertificate= false;
971 } else {
972 $remove_userCertificate= true;
973 }
975 /* Special handling for dateOfBirth value */
976 if ($this->dateOfBirth == ""){
977 if ($this->is_new) {
978 unset($this->attrs["dateOfBirth"]);
979 } else {
980 $this->attrs["dateOfBirth"]= array();
981 }
982 }
983 if (!$this->gender){
984 if ($this->is_new) {
985 unset($this->attrs["gender"]);
986 } else {
987 $this->attrs["gender"]= array();
988 }
989 }
990 if (!$this->preferredLanguage){
991 if ($this->is_new) {
992 unset($this->attrs["preferredLanguage"]);
993 } else {
994 $this->attrs["preferredLanguage"]= array();
995 }
996 }
998 /* Special handling for attribute jpegPhote needed, scale image via
999 image magick to 147x200 pixels and inject resulting data. */
1000 if ($this->jpegPhoto == "*removed*"){
1002 /* Reset attribute to avoid writing *removed* as value */
1003 $this->attrs["jpegPhoto"] = array();
1005 } else {
1007 /* Fallback if there's no image magick inside PHP */
1008 if (!function_exists("imagick_blob2image")){
1009 /* Get temporary file name for conversation */
1010 $fname = tempnam (TEMP_DIR, "GOsa");
1012 /* Open file and write out photoData */
1013 $fp = fopen ($fname, "w");
1014 fwrite ($fp, $this->photoData);
1015 fclose ($fp);
1017 /* Build conversation query. Filename is generated automatically, so
1018 we do not need any special security checks. Exec command and save
1019 output. For PHP safe mode, you'll need a configuration which respects
1020 image magick as executable... */
1021 $query= "convert -size 147x200 $fname -resize 147x200 +profile \"*\" -";
1022 @DEBUG (DEBUG_SHELL, __LINE__, __FUNCTION__, __FILE__,
1023 $query, "Execute");
1025 /* Read data written by convert */
1026 $output= "";
1027 $sh= popen($query, 'r');
1028 while (!feof($sh)){
1029 $output.= fread($sh, 4096);
1030 }
1031 pclose($sh);
1033 unlink($fname);
1035 /* Save attribute */
1036 $this->attrs["jpegPhoto"] = $output;
1038 } else {
1040 /* Load the new uploaded Photo */
1041 if(!$handle = imagick_blob2image($this->photoData)) {
1042 new log("debug","users/".get_class($this),$this->dn,array(),"Could not access uploaded image");
1043 }
1045 /* Resizing image to 147x200 and blur */
1046 if(!imagick_resize($handle,147,200,IMAGICK_FILTER_GAUSSIAN,0)){
1047 new log("debug","users/".get_class($this),$this->dn,array(),"Could not resize uploaded image");
1048 }
1050 /* Converting image to JPEG */
1051 if(!imagick_convert($handle,"JPEG")) {
1052 new log("debug","users/".get_class($this),$this->dn,array(),"Could not convert uploaded image to jepg");
1053 }
1055 /* Creating binary Code for the Image */
1056 if(!$dump = imagick_image2blob($handle)){
1057 new log("debug","users/".get_class($this),$this->dn,array(),"Could not create new user image");
1058 }
1060 /* Sending Image */
1061 $output= $dump;
1063 /* Save attribute */
1064 $this->attrs["jpegPhoto"] = $output;
1065 }
1067 }
1069 /* This only gets called when user is renaming himself */
1070 $ldap= $this->config->get_ldap_link();
1071 if ($this->dn != $this->new_dn){
1073 /* Write entry on new 'dn' */
1074 $this->update_acls($this->dn,$this->new_dn);
1075 $this->move($this->dn, $this->new_dn);
1077 /* Happen to use the new one */
1078 change_ui_dn($this->dn, $this->new_dn);
1079 $this->dn= $this->new_dn;
1080 }
1083 /* Save data. Using 'modify' implies that the entry is already present, use 'add' for
1084 new entries. So do a check first... */
1085 $ldap->cat ($this->dn, array('dn'));
1086 if ($ldap->fetch()){
1087 $mode= "modify";
1088 } else {
1089 $mode= "add";
1090 $ldap->cd($this->config->current['BASE']);
1091 $ldap->create_missing_trees(preg_replace('/^[^,]+,/', '', $this->dn));
1092 }
1094 /* Set password to some junk stuff in case of templates */
1095 if ($this->is_template){
1096 $temp= passwordMethod::get_available_methods();
1097 foreach($temp as $id => $data){
1098 if(isset($data['name']) && $data['name'] == $this->pw_storage){
1099 $tmp = new $temp[$this->pw_storage]($this->config,$this->dn);
1100 $tmp->set_hash($this->pw_storage);
1101 $this->attrs['userPassword'] = $tmp->create_template_hash($this->attrs);
1102 break;
1103 }
1104 }
1105 }
1107 @DEBUG (DEBUG_LDAP, __LINE__, __FUNCTION__, __FILE__,
1108 $this->attributes, "Save via $mode");
1110 /* Finally write data with selected 'mode' */
1111 $this->cleanup();
1113 /* Update current locale settings, if we have edited ourselves */
1114 $ui = session::get('ui');
1115 if(isset($this->attrs['preferredLanguage']) && $this->dn == $ui->dn){
1116 $ui->language = $this->preferredLanguage;
1117 session::set('ui',$ui);
1118 session::set('Last_init_lang',"update");
1119 }
1121 $ldap->cd ($this->dn);
1122 $ldap->$mode ($this->attrs);
1123 if (!$ldap->success()){
1124 msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error(), $this->dn, LDAP_DEL, get_class()));
1125 return (1);
1126 }
1128 /* Remove ACL dependencies too */
1129 if($this->dn != $this->orig_dn && $this->orig_dn != "new"){
1130 $tmp = new acl($this->config,$this->parent,$this->dn);
1131 $tmp->update_acl_membership($this->orig_dn,$this->dn);
1132 }
1134 if($mode == "modify"){
1135 new log("modify","users/".get_class($this),$this->dn,array_keys($this->attrs),$ldap->get_error());
1136 }else{
1137 new log("create","users/".get_class($this),$this->dn,array_keys($this->attrs),$ldap->get_error());
1138 }
1140 /* Remove cert?
1141 For some reason, the 'ldap' class doesn't want to remove binary entries, so I need
1142 to work around myself. */
1143 if ($remove_userCertificate == true && !$this->is_new && $this->had_userCertificate){
1145 /* Reset array, assemble new, this should be reworked */
1146 $this->attrs= array();
1147 $this->attrs['userCertificate;binary']= array();
1149 /* Prepare connection */
1150 if (!($ds = ldap_connect($this->config->current['SERVER']))) {
1151 die ("Could not connect to LDAP server");
1152 }
1153 ldap_set_option($ds, LDAP_OPT_PROTOCOL_VERSION, 3);
1154 if (function_exists("ldap_set_rebind_proc") && $this->config->get_cfg_value("ldapFollowReferrals") == "true") {
1155 ldap_set_option($this->cid, LDAP_OPT_REFERRALS, 1);
1156 ldap_set_rebind_proc($ds, array(&$this, "rebind"));
1157 }
1158 if($this->config->get_cfg_value("ldapTLS") == "true"){
1159 ldap_start_tls($ds);
1160 }
1161 if (!($res = @ldap_bind($ds, $this->config->current['ADMIN'],
1162 $this->config->current['PASSWORD']))) {
1163 die ("Could not bind to LDAP");
1164 }
1166 /* Modify using attrs */
1167 ldap_mod_del($ds,$this->dn,$this->attrs);
1168 ldap_close($ds);
1169 }
1171 /* If needed, let the password method do some cleanup */
1172 if ($this->pw_storage != $this->last_pw_storage){
1173 $tmp = new passwordMethod($this->config);
1174 $available = $tmp->get_available_methods();
1175 if (in_array_ics($this->last_pw_storage, $available['name'])){
1176 $test= new $available[$this->last_pw_storage]($this->config,$this->dn);
1177 $test->attrs= $this->attrs;
1178 $test->remove_from_parent();
1179 }
1180 }
1182 /* Maybe the current password method want's to do some changes... */
1183 if (is_object($this->pwObject)){
1184 $this->pwObject->save($this->dn);
1185 }
1187 /* Optionally execute a command after we're done */
1188 if ($mode == "add"){
1189 $this->handle_post_events("add", array("uid" => $this->uid));
1190 } elseif ($this->is_modified){
1191 $this->handle_post_events("modify", array("uid" => $this->uid));
1192 }
1194 return (0);
1195 }
1198 function create_initial_rdn($pattern)
1199 {
1200 // Only generate single RDNs
1201 if (preg_match('/\+/', $pattern)){
1202 msg_dialog::display(_("Error"), _("Cannot build RDN: no + allowed to build sub RDN!"), ERROR_DIALOG);
1203 return "";
1204 }
1206 // Extract attribute
1207 $attribute= preg_replace('/=.*$/', '', $pattern);
1208 if (!in_array_ics($attribute, $this->attributes)) {
1209 msg_dialog::display(_("Error"), _("Cannot build RDN: attribute is not defined!"), ERROR_DIALOG);
1210 return "";
1211 }
1213 // Sort attributes for length
1214 $attrl= array();
1215 foreach ($this->attributes as $attr) {
1216 $attrl[$attr]= strlen($attr);
1217 }
1218 arsort($attrl);
1220 // Walk thru sorted attributes and replace them in pattern
1221 foreach ($attrl as $attr => $dummy) {
1222 if (!is_array($this->$attr)){
1223 $pattern= preg_replace("/%$attr/", $this->$attr, $pattern);
1224 } else {
1225 // Array elements cannot be used for ID generation
1226 if (preg_match("/%$attr/", $pattern)) {
1227 msg_dialog::display(_("Error"), _("Cannot build RDN: invalid attribute parameters!"), ERROR_DIALOG);
1228 break;
1229 }
1230 }
1231 }
1233 // Internally assign value
1234 $this->$attribute= preg_replace('/^[^=]+=/', '', $pattern);
1236 return $pattern;
1237 }
1240 function update_new_dn()
1241 {
1242 // Alternative way to handle DN
1243 $pattern= $this->config->get_cfg_value("accountRDN");
1244 if ($pattern != "") {
1245 $rdn= $this->create_initial_rdn($pattern);
1246 $attribute= preg_replace('/=.*$/', '', $rdn);
1247 $value= preg_replace('/^[^=]+=$/', '', $rdn);
1249 /* Don't touch dn, if $attribute hasn't changed */
1250 if (isset($this->saved_attributes[$attribute]) && $this->saved_attributes[$attribute] == $this->$attribute &&
1251 $this->orig_base == $this->base ){
1252 $this->new_dn= $this->dn;
1253 } else {
1254 $this->new_dn= $this->create_unique_dn2($rdn, get_people_ou().$this->base);
1255 }
1257 // Original way to handle DN
1258 } else {
1260 $pt= "";
1261 if($this->config->get_cfg_value("personalTitleInDN") == "true"){
1262 if(!empty($this->personalTitle)){
1263 $pt = $this->personalTitle." ";
1264 }
1265 }
1267 $this->cn= $pt.$this->givenName." ".$this->sn;
1269 /* Permissions for that base? */
1270 if ($this->config->get_cfg_value("accountPrimaryAttribute") == "uid"){
1271 $this->new_dn= 'uid='.$this->uid.','.get_people_ou().$this->base;
1272 } else {
1273 /* Don't touch dn, if cn hasn't changed */
1274 if (isset($this->saved_attributes['cn']) && $this->saved_attributes['cn'] == $this->cn &&
1275 $this->orig_base == $this->base ){
1276 $this->new_dn= $this->dn;
1277 } else {
1278 $this->new_dn= $this->create_unique_dn('cn', get_people_ou().$this->base);
1279 }
1280 }
1281 }
1282 }
1285 /* Check formular input */
1286 function check()
1287 {
1288 /* Call common method to give check the hook */
1289 $message= plugin::check();
1291 /* Configurable password methods should be configured initially.
1292 */
1293 if($this->last_pw_storage != $this->pw_storage){
1294 $temp= passwordMethod::get_available_methods();
1295 foreach($temp['name'] as $id => $name){
1296 if($name == $this->pw_storage){
1297 if($temp['is_configurable'][$id] && !$this->pwObject instanceof $temp[$name] ){
1298 $message[] = _("The selected password method requires initial configuration!");
1299 }
1300 break;
1301 }
1302 }
1303 }
1305 $this->update_new_dn();
1307 /* Set the new acl base */
1308 if($this->dn == "new") {
1309 $this->set_acl_base($this->base);
1310 }
1312 /* Check if we are allowed to create/move this user */
1313 if($this->orig_dn == "new" && !$this->acl_is_createable($this->base)){
1314 $message[]= msgPool::permCreate();
1315 }elseif($this->orig_dn != "new" && $this->new_dn != $this->orig_dn && !$this->acl_is_moveable($this->base)){
1316 $message[]= msgPool::permMove();
1317 }
1319 /* UID already used? */
1320 $ldap= $this->config->get_ldap_link();
1321 $ldap->cd($this->config->current['BASE']);
1322 $ldap->search("(uid=$this->uid)", array("uid"));
1323 $ldap->fetch();
1324 if ($ldap->count() != 0 && $this->dn == 'new'){
1325 $message[]= msgPool::duplicated(_("Login"));
1326 }
1328 /* In template mode, the uid and givenName are autogenerated... */
1329 if ($this->sn == ""){
1330 $message[]= msgPool::required(_("Name"));
1331 }
1333 // Check if a wrong base was supplied
1334 if(!$this->baseSelector->checkLastBaseUpdate()){
1335 $message[]= msgPool::check_base();;
1336 }
1338 if (!$this->is_template){
1339 if ($this->givenName == ""){
1340 $message[]= msgPool::required(_("Given name"));
1341 }
1342 if ($this->uid == ""){
1343 $message[]= msgPool::required(_("Login"));
1344 }
1345 if ($this->config->get_cfg_value("accountPrimaryAttribute") != "uid"){
1346 $ldap->cat($this->new_dn);
1347 if ($ldap->count() != 0 && $this->dn != $this->new_dn && $this->dn == 'new'){
1348 $message[]= msgPool::duplicated(_("Name"));
1349 }
1350 }
1351 }
1353 /* Check for valid input */
1354 if ($this->is_modified && !tests::is_uid($this->uid)){
1356 if (strict_uid_mode()){
1357 $message[]= msgPool::invalid(_("Login"), $this->uid, "/[a-z0-9_-]/");
1358 } else {
1359 $message[]= msgPool::invalid(_("Login"), $this->uid, "/[a-z0-9_-]/i");
1360 }
1361 }
1362 if (!tests::is_url($this->labeledURI)){
1363 $message[]= msgPool::invalid(_("Homepage"), "", "", "http://www.your-domain.com/yourname");
1364 }
1366 /* Check phone numbers */
1367 if (!tests::is_phone_nr($this->telephoneNumber)){
1368 $message[]= msgPool::invalid(_("Phone"), $this->telephoneNumber, "/[\/0-9 ()+*-]/");
1369 }
1370 if (!tests::is_phone_nr($this->facsimileTelephoneNumber)){
1371 $message[]= msgPool::invalid(_("Fax"), $this->facsimileTelephoneNumber, "/[\/0-9 ()+*-]/");
1372 }
1373 if (!tests::is_phone_nr($this->mobile)){
1374 $message[]= msgPool::invalid(_("Mobile"), $this->mobile, "/[\/0-9 ()+*-]/");
1375 }
1376 if (!tests::is_phone_nr($this->pager)){
1377 $message[]= msgPool::invalid(_("Pager"), $this->pager, "/[\/0-9 ()+*-]/");
1378 }
1380 /* Check dates */
1381 if (!tests::is_date($this->dateOfBirth)){
1382 $message[]= msgPool::invalid(_("Date of birth"), $this->dateOfBirth,"" ,"23.02.2009");
1383 }
1385 /* Check for reserved characers */
1386 if (preg_match ('/[,+"?\'()=<>;\\\\]/', $this->givenName)){
1387 $message[]= msgPool::invalid(_("Given name"), $this->givenName, '/[^,+"?\'()=<>;\\\\]/');
1388 }
1389 if (preg_match ('/[,+"?\'()=<>;\\\\]/', $this->sn)){
1390 $message[]= msgPool::invalid(_("Name"), $this->sn, '/[^,+"?\'()=<>;\\\\]/');
1391 }
1393 return $message;
1394 }
1397 /* Indicate whether a password change is needed or not */
1398 function password_change_needed()
1399 {
1400 if($this->multiple_support_active){
1401 return(FALSE);
1402 }else{
1404 if(in_array("pw_storage",$this->multi_boxes)){
1405 return(TRUE);
1406 }
1407 return($this->pw_storage != $this->last_pw_storage && !$this->is_template);
1408 }
1409 }
1412 /* Load a jpegPhoto from LDAP, this is going to be simplified later on */
1413 function load_picture()
1414 {
1415 $ldap = $this->config->get_ldap_link();
1416 $ldap->cd ($this->dn);
1417 $data = $ldap->get_attribute($this->dn,"jpegPhoto");
1419 if((!$data) || ($data == "*removed*")){
1421 /* In case we don't get an entry, load a default picture */
1422 $this->set_picture ();
1423 $this->jpegPhoto= "*removed*";
1424 }else{
1426 /* Set picture */
1427 $this->photoData= $data;
1428 session::set('binary',$this->photoData);
1429 session::set('binarytype',"image/jpeg");
1430 $this->jpegPhoto= "";
1431 }
1432 }
1435 /* Load a certificate from LDAP, this is going to be simplified later on */
1436 function load_cert()
1437 {
1438 $ds= ldap_connect($this->config->current['SERVER']);
1439 ldap_set_option($ds, LDAP_OPT_PROTOCOL_VERSION, 3);
1440 if (function_exists("ldap_set_rebind_proc") && $this->config->get_cfg_value("ldapFollowReferrals") == "true"){
1441 ldap_set_option($this->cid, LDAP_OPT_REFERRALS, 1);
1442 ldap_set_rebind_proc($ds, array(&$this, "rebind"));
1443 }
1444 if ($this->config->get_cfg_value("ldapTLS") == "true"){
1445 ldap_start_tls($ds);
1446 }
1448 $r= ldap_bind($ds);
1449 $sr= @ldap_read($ds, $this->dn, "userCertificate=*", array("userCertificate"));
1451 if ($sr) {
1452 $ei= @ldap_first_entry($ds, $sr);
1454 if ($ei) {
1455 if (!$info = @ldap_get_values_len($ds, $ei, "userCertificate;binary")){
1456 $this->userCertificate= "";
1457 } else {
1458 $this->userCertificate= $info[0];
1459 }
1460 }
1461 } else {
1462 $this->userCertificate= "";
1463 }
1465 ldap_unbind($ds);
1466 }
1469 /* Load picture from file to object */
1470 function set_picture($filename ="")
1471 {
1472 if (!is_file($filename) || $filename =="" ){
1473 $filename= "./plugins/users/images/default.jpg";
1474 $this->jpegPhoto= "*removed*";
1475 }
1477 $fd = fopen ($filename, "rb");
1478 $this->photoData= fread ($fd, filesize ($filename));
1479 session::set('binary',$this->photoData);
1480 session::set('binarytype',"image/jpeg");
1481 $this->jpegPhoto= "";
1483 fclose ($fd);
1484 }
1487 /* Load certificate from file to object */
1488 function set_cert($cert, $filename)
1489 {
1490 if(!$this->acl_is_writeable("Certificate")) return;
1491 $fd = fopen ($filename, "rb");
1492 if (filesize($filename)>0) {
1493 $this->$cert= fread ($fd, filesize ($filename));
1494 fclose ($fd);
1495 $this->is_modified= TRUE;
1496 } else {
1497 msg_dialog::display(_("Error"), _("Cannot open certificate!"), ERROR_DIALOG);
1498 }
1499 }
1501 /* Adapt from given 'dn' */
1502 function adapt_from_template($dn, $skip= array())
1503 {
1504 plugin::adapt_from_template($dn, $skip);
1506 /* Get password method from template
1507 */
1508 $tmp= passwordMethod::get_method($this->attrs['userPassword'][0]);
1509 if(is_object($tmp)){
1510 if($tmp->is_configurable()){
1511 $tmp->adapt_from_template($dn);
1512 $this->pwObject = &$tmp;
1513 }
1514 $this->pw_storage= $tmp->get_hash();
1515 }
1517 /* Get base */
1518 $this->base= preg_replace('/^[^,]+,'.preg_quote(get_people_ou(), '/').'/i', '', $dn);
1520 if($this->governmentmode){
1522 /* Walk through govattrs */
1523 foreach ($this->govattrs as $val){
1525 if (in_array($val, $skip)){
1526 continue;
1527 }
1529 if (isset($this->attrs["$val"][0])){
1531 /* If attribute is set, replace dynamic parts:
1532 %sn, %givenName and %uid. Fill these in our local variables. */
1533 $value= $this->attrs["$val"][0];
1535 foreach (array("sn", "givenName", "uid") as $repl){
1536 if (preg_match("/%$repl/i", $value)){
1537 $value= preg_replace ("/%$repl/i",
1538 $this->parent->$repl, $value);
1539 }
1540 }
1541 $this->$val= $value;
1542 }
1543 }
1544 }
1546 /* Get back uid/sn/givenName - only write if nothing's skipped */
1547 if ($this->parent !== NULL && count($skip) == 0){
1548 $this->uid= $this->parent->uid;
1549 $this->sn= $this->parent->sn;
1550 $this->givenName= $this->parent->givenName;
1551 }
1553 if ($this->dateOfBirth) {
1554 /* This entry is ISO 8601 conform */
1555 list($year, $month, $day)= explode("-", $this->dateOfBirth, 3);
1557 #TODO: use $lang to convert date
1558 $this->dateOfBirth= "$day.$month.$year";
1559 }
1560 }
1563 /* This avoids that users move themselves out of their rights.
1564 */
1565 function allowedBasesToMoveTo()
1566 {
1567 /* Get bases */
1568 $bases = $this->get_allowed_bases();
1569 return($bases);
1570 }
1573 function getCopyDialog()
1574 {
1575 $str = "";
1577 session::set('binary',$this->photoData);
1578 session::set('binarytype',"image/jpeg");
1580 /* Get random number for pictures */
1581 srand((double)microtime()*1000000);
1582 $rand = rand(0, 10000);
1584 $smarty = get_smarty();
1586 $smarty->assign("passwordTodo","clear");
1588 if(isset($_POST['passwordTodo'])){
1589 $smarty->assign("passwordTodo",$_POST['passwordTodo']);
1590 }
1592 $smarty->assign("sn", $this->sn);
1593 $smarty->assign("givenName",$this->givenName);
1594 $smarty->assign("uid", $this->uid);
1595 $smarty->assign("rand", $rand);
1596 $str = $smarty->fetch(get_template_path("paste_generic.tpl",TRUE,dirname(__FILE__)));
1599 $ret = array();
1600 $ret['string'] = $str;
1601 $ret['status'] = "";
1602 return($ret);
1603 }
1605 function saveCopyDialog()
1606 {
1607 /* Set_acl_base */
1608 $this->set_acl_base($this->base);
1610 if((isset($_FILES['picture_file']['tmp_name'])) && ($_FILES['picture_file']['size'] > 0)){
1611 $this->set_picture($_FILES['picture_file']['tmp_name']);
1612 }
1614 /* Remove picture? */
1615 if (isset($_POST['picture_remove'])){
1616 $this->jpegPhoto= "*removed*";
1617 $this->set_picture ("./plugins/users/images/default.jpg");
1618 $this->is_modified= TRUE;
1619 }
1621 $attrs = array("uid","givenName","sn");
1622 foreach($attrs as $attr){
1623 if(isset($_POST[$attr])){
1624 $this->$attr = $_POST[$attr];
1625 }
1626 }
1627 }
1630 function PrepareForCopyPaste($source)
1631 {
1632 plugin::PrepareForCopyPaste($source);
1634 /* Reset certificate information addepted from source user
1635 to avoid setting the same user certificate for the destination user. */
1636 $this->userPKCS12= "";
1637 $this->userSMIMECertificate= "";
1638 $this->userCertificate= "";
1639 $this->certificateSerialNumber= "";
1640 $this->old_certificateSerialNumber= "";
1641 $this->old_userPKCS12= "";
1642 $this->old_userSMIMECertificate= "";
1643 $this->old_userCertificate= "";
1644 }
1647 static function plInfo()
1648 {
1650 $govattrs= array(
1651 "gouvernmentOrganizationalUnit" => _("Unit"),
1652 "houseIdentifier" => _("House identifier"),
1653 "vocation" => _("Vocation"),
1654 "ivbbLastDeliveryCollective" => _("Last delivery"),
1655 "gouvernmentOrganizationalPersonLocality" => _("Person locality"),
1656 "gouvernmentOrganizationalUnitDescription" => _("Unit description"),
1657 "gouvernmentOrganizationalUnitSubjectArea" => _("Subject area"),
1658 "functionalTitle" => _("Functional title"),
1659 "certificateSerialNumber" => _("Certificate serial number"),
1660 "publicVisible" => _("Public visible"),
1661 "street" => _("Street"),
1662 "role" => _("Role"),
1663 "postalCode" => _("Postal code"));
1665 $ret = array(
1666 "plShortName" => _("Generic"),
1667 "plDescription" => _("Generic user settings"),
1668 "plSelfModify" => TRUE,
1669 "plDepends" => array(),
1670 "plPriority" => 1,
1671 "plSection" => array("personal" => _("My account")),
1672 "plCategory" => array("users" => array("description" => _("Users"),
1673 "objectClass" => "gosaAccount")),
1675 "plProvidedAcls" => array(
1677 "sn" => _("Surname"),
1678 "givenName" => _("Given name"),
1679 "uid" => _("User identification"),
1680 "personalTitle" => _("Personal title"),
1681 "academicTitle" => _("Academic title"),
1683 "dateOfBirth" => _("Date of birth"),
1684 "gender" => _("Sex"),
1685 "preferredLanguage" => _("Preferred language"),
1686 "base" => _("Base"),
1688 "userPicture" => _("User picture"),
1690 "gosaLoginRestriction" => _("Login restrictions"),
1692 "o" => _("Organization"),
1693 "ou" => _("Department"),
1694 "departmentNumber" => _("Department number"),
1695 "manager" => _("Manager"),
1696 "employeeNumber" => _("Employee number"),
1697 "employeeType" => _("Employee type"),
1699 "roomNumber" => _("Room number"),
1700 "telephoneNumber" => _("Telefon number"),
1701 "pager" => _("Pager number"),
1702 "mobile" => _("Mobile number"),
1703 "facsimileTelephoneNumber" => _("Fax number"),
1705 "st" => _("State"),
1706 "l" => _("Location"),
1707 "postalAddress" => _("Postal address"),
1709 "homePostalAddress" => _("Home postal address"),
1710 "homePhone" => _("Home phone number"),
1711 "labeledURI" => _("Homepage"),
1712 "userPassword" => _("User password method"),
1713 "Certificate" => _("User certificates"))
1715 );
1717 /* Append government attributes if required */
1718 global $config;
1719 if($config->get_cfg_value("honourIvbbAttributes") == "true"){
1720 foreach($govattrs as $attr => $desc){
1721 $ret["plProvidedAcls"][$attr] = $desc;
1722 }
1723 }
1724 return($ret);
1725 }
1727 function get_multi_edit_values()
1728 {
1729 $ret = plugin::get_multi_edit_values();
1730 if(in_array("pw_storage",$this->multi_boxes)){
1731 $ret['pw_storage'] = $this->pw_storage;
1732 }
1733 if(in_array("edit_picture",$this->multi_boxes)){
1734 $ret['jpegPhoto'] = $this->jpegPhoto;
1735 $ret['photoData'] = $this->photoData;
1736 $ret['old_jpegPhoto'] = $this->old_jpegPhoto;
1737 $ret['old_photoData'] = $this->old_photoData;
1738 }
1739 if(isset($ret['dateOfBirth'])){
1740 unset($ret['dateOfBirth']);
1741 }
1742 if(isset($ret['cn'])){
1743 unset($ret['cn']);
1744 }
1745 $ret['is_modified'] = $this->is_modified;
1746 if(in_array("base",$this->multi_boxes)){
1747 $ret['orig_base']="Changed_by_Multi_Plug";
1748 $ret['base']=$this->base;
1749 }
1751 $ret['gosaLoginRestriction'] = $this->gosaLoginRestriction;
1752 $ret['gosaLoginRestriction_some'] = $this->gosaLoginRestriction_some;
1754 return($ret);
1755 }
1758 function multiple_save_object()
1759 {
1761 if(!isset($_POST['user_mulitple_edit'])) return;
1763 plugin::multiple_save_object();
1765 /* Get pw_storage mode */
1766 if (isset($_POST['pw_storage'])){
1767 foreach(array("pw_storage") as $val){
1768 if(isset($_POST[$val])){
1769 $data= validate(get_post($val));
1770 if ($data != $this->$val){
1771 $this->is_modified= TRUE;
1772 }
1773 $this->$val= $data;
1774 }
1775 }
1776 }
1778 /* Refresh base */
1779 if ($this->acl_is_moveable($this->base)){
1780 if (!$this->baseSelector->update()) {
1781 msg_dialog::display(_("Error"), msgPool::permMove(), ERROR_DIALOG);
1782 }
1783 if ($this->base != $this->baseSelector->getBase()) {
1784 $this->base= $this->baseSelector->getBase();
1785 }
1786 }
1788 if(isset($_POST['user_mulitple_edit'])){
1789 foreach(array("base","pw_storage","edit_picture") as $val){
1790 if(isset($_POST["use_".$val])){
1791 $this->multi_boxes[] = $val;
1792 }
1793 }
1794 }
1796 /* Sync lists */
1797 $this->gosaLoginRestrictionWidget->save_object();
1798 if ($this->gosaLoginRestrictionWidget->isModified()) {
1799 $this->gosaLoginRestriction= array_values($this->gosaLoginRestrictionWidget->getMaintainedData());
1800 }
1801 }
1804 function multiple_check()
1805 {
1806 /* Call check() to set new_dn correctly ... */
1807 $message = plugin::multiple_check();
1809 /* Set the new acl base */
1810 if($this->dn == "new") {
1811 $this->set_acl_base($this->base);
1812 }
1813 if (!tests::is_url($this->labeledURI) && in_array("labeledURI",$this->multi_boxes)){
1814 $message[]= msgPool::invalid(_("Homepage"));
1815 }
1816 if (!tests::is_phone_nr($this->telephoneNumber) && in_array("telephoneNumber",$this->multi_boxes)){
1817 $message[]= msgPool::invalid(_("Phone"), $this->telephoneNumber, "/[\/0-9 ()+*-]/");
1818 }
1819 if (!tests::is_phone_nr($this->facsimileTelephoneNumber) && in_array("facsimileTelephoneNumber",$this->multi_boxes)){
1820 $message[]= msgPool::invalid(_("Fax"), $this->facsimileTelephoneNumber, "/[\/0-9 ()+*-]/");
1821 }
1822 if (!tests::is_phone_nr($this->mobile) && in_array("mobile",$this->multi_boxes)){
1823 $message[]= msgPool::invalid(_("Mobile"), $this->mobile, "/[\/0-9 ()+*-]/");
1824 }
1825 if (!tests::is_phone_nr($this->pager) && in_array("pager",$this->multi_boxes)){
1826 $message[]= msgPool::invalid(_("Pager"), $this->pager, "/[\/0-9 ()+*-]/");
1827 }
1828 if (preg_match ('/[,+"?\'()=<>;\\\\]/', $this->givenName) && in_array("givenName",$this->multi_boxes)){
1829 $message[]= msgPool::invalid(_("Given name"), $this->giveName, '/[^,+"?\'()=<>;\\\\]/');
1830 }
1831 if (preg_match ('/[,+"?\'()=<>;\\\\]/', $this->sn) && in_array("sn",$this->multi_boxes)){
1832 $message[]= msgPool::invalid(_("Name"), $this->sn, '/[^,+"?\'()=<>;\\\\]/');
1833 }
1834 return($message);
1835 }
1839 function multiple_execute()
1840 {
1841 return($this->execute());
1842 }
1845 /*! \brief Prepares the plugin to be used for multiple edit
1846 * Update plugin attributes with given array of attribtues.
1847 * \param array Array with attributes that must be updated.
1848 */
1849 function init_multiple_support($attrs,$all)
1850 {
1851 plugin::init_multiple_support($attrs,$all);
1853 // Get login restrictions
1854 if(isset($attrs['gosaLoginRestriction'])){
1855 $this->gosaLoginRestriction =array();
1856 for($i =0;$i < $attrs['gosaLoginRestriction']['count']; $i++){
1857 $this->gosaLoginRestriction[] = $attrs['gosaLoginRestriction'][$i];
1858 }
1859 }
1861 // Detect the managers name
1862 $this->manager_name = "";
1863 $ldap = $this->config->get_ldap_link();
1864 if(!empty($this->manager)){
1865 $ldap->cat($this->manager, array('cn'));
1866 if($ldap->count()){
1867 $attrs = $ldap->fetch();
1868 $this->manager_name = $attrs['cn'][0];
1869 }else{
1870 $this->manager_name = "("._("Unknown")."!): ".$this->manager;
1871 }
1872 }
1874 // Detect login restriction not used in all user objects.
1875 $this->gosaLoginRestriction_some = array();
1876 if(isset($all['gosaLoginRestriction'])){
1877 for($i=0;$i<$all['gosaLoginRestriction']['count'];$i++){
1878 $this->gosaLoginRestriction_some[] = $all['gosaLoginRestriction'][$i];
1879 }
1880 }
1883 // Reinit the login restriction list.
1884 $data = $this->convertLoginRestriction();
1885 if(count($data)){
1886 $this->gosaLoginRestrictionWidget->setListData($data['data'], $data['displayData']);
1887 }
1888 }
1891 function set_multi_edit_values($attrs)
1892 {
1893 $lR = array();
1895 // Update loginRestrictions, keep my settings while ip is optional
1896 foreach($attrs['gosaLoginRestriction_some'] as $ip){
1897 if(in_array($ip, $this->gosaLoginRestriction) && in_array($ip, $attrs['gosaLoginRestriction'])){
1898 $lR[] = $ip;
1899 }
1900 }
1902 // Add enforced loginRestrictions
1903 foreach($attrs['gosaLoginRestriction'] as $ip){
1904 $lR[] = $ip;
1905 }
1907 $lR = array_values(array_unique($lR));
1908 $this->is_modified |= array_differs($this->gosaLoginRestriction, $lR);
1909 plugin::set_multi_edit_values($attrs);
1910 $this->gosaLoginRestriction = $lR;
1911 }
1914 function convertLoginRestriction()
1915 {
1916 $all = array_unique(array_merge($this->gosaLoginRestriction,$this->gosaLoginRestriction_some));
1917 $data = array();
1918 foreach($all as $ip){
1919 $data['data'][] = $ip;
1920 if(!in_array($ip, $this->gosaLoginRestriction)){
1921 $data['displayData'][] = array('mode' => LIST_MARKED , 'data' => array($ip.' ('._("Entries differ").')'));
1922 }else{
1923 $data['displayData'][] = array('mode' => 0 , 'data' => array($ip));
1924 }
1925 }
1926 return($data);
1927 }
1928 }
1930 // vim:tabstop=2:expandtab:shiftwidth=2:filetype=php:syntax:ruler:
1931 ?>