1 <?php
2 /*
3 * This code is part of GOsa (http://www.gosa-project.org)
4 * Copyright (C) 2003-2008 GONICUS GmbH
5 *
6 * ID: $$Id$$
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
21 */
23 /*!
24 \brief user plugin
25 \author Cajus Pollmeier <pollmeier@gonicus.de>
26 \version 2.00
27 \date 24.07.2003
29 This class provides the functionality to read and write all attributes
30 relevant for person, organizationalPerson, inetOrgPerson and gosaAccount
31 from/to the LDAP. It does syntax checking and displays the formulars required.
32 */
34 class user extends plugin
35 {
36 /* Definitions */
37 var $plHeadline= "Generic";
38 var $plDescription= "Edit organizational user settings";
40 /* Plugin specific values */
41 var $base= "";
42 var $orig_base= "";
43 var $cn= "";
44 var $new_dn= "";
45 var $personalTitle= "";
46 var $academicTitle= "";
47 var $homePostalAddress= "";
48 var $homePhone= "";
49 var $labeledURI= "";
50 var $o= "";
51 var $ou= "";
52 var $departmentNumber= "";
53 var $gosaLoginRestriction= array();
54 var $gosaLoginRestrictionWidget;
55 var $employeeNumber= "";
56 var $employeeType= "";
57 var $roomNumber= "";
58 var $telephoneNumber= "";
59 var $facsimileTelephoneNumber= "";
60 var $mobile= "";
61 var $pager= "";
62 var $l= "";
63 var $st= "";
64 var $postalAddress= "";
65 var $dateOfBirth;
66 var $use_dob= "0";
67 var $gender="0";
68 var $preferredLanguage="0";
69 var $baseSelector;
71 var $jpegPhoto= "*removed*";
72 var $photoData= "";
73 var $old_jpegPhoto= "";
74 var $old_photoData= "";
75 var $cert_dialog= FALSE;
76 var $picture_dialog= FALSE;
77 var $pwObject= NULL;
79 var $userPKCS12= "";
80 var $userSMIMECertificate= "";
81 var $userCertificate= "";
82 var $certificateSerialNumber= "";
83 var $old_certificateSerialNumber= "";
84 var $old_userPKCS12= "";
85 var $old_userSMIMECertificate= "";
86 var $old_userCertificate= "";
88 var $gouvernmentOrganizationalUnit= "";
89 var $houseIdentifier= "";
90 var $street= "";
91 var $postalCode= "";
92 var $vocation= "";
93 var $ivbbLastDeliveryCollective= "";
94 var $gouvernmentOrganizationalPersonLocality= "";
95 var $gouvernmentOrganizationalUnitDescription= "";
96 var $gouvernmentOrganizationalUnitSubjectArea= "";
97 var $functionalTitle= "";
98 var $role= "";
99 var $publicVisible= "";
101 var $orig_dn;
102 var $dialog;
104 /* variables to trigger password changes */
105 var $pw_storage= "md5";
106 var $last_pw_storage= "unset";
107 var $had_userCertificate= FALSE;
109 var $view_logged = FALSE;
111 var $manager = "";
112 var $manager_name = "";
115 /* attribute list for save action */
116 var $attributes= array("sn", "givenName", "uid", "personalTitle", "academicTitle",
117 "homePostalAddress", "homePhone", "labeledURI", "ou", "o", "dateOfBirth", "gender","preferredLanguage",
118 "departmentNumber", "employeeNumber", "employeeType", "l", "st","jpegPhoto",
119 "roomNumber", "telephoneNumber", "mobile", "pager", "cn", "userPKCS12",
120 "postalAddress", "facsimileTelephoneNumber", "userSMIMECertificate", "gosaLoginRestriction", "manager");
122 var $objectclasses= array("top", "person", "organizationalPerson", "inetOrgPerson",
123 "gosaAccount");
125 /* attributes that are part of the government mode */
126 var $govattrs= array("gouvernmentOrganizationalUnit", "houseIdentifier", "vocation",
127 "ivbbLastDeliveryCollective", "gouvernmentOrganizationalPersonLocality",
128 "gouvernmentOrganizationalUnitDescription","gouvernmentOrganizationalUnitSubjectArea",
129 "functionalTitle", "certificateSerialNumber", "publicVisible", "street", "role",
130 "postalCode");
132 var $multiple_support = TRUE;
134 var $governmentmode = FALSE;
136 /* constructor, if 'dn' is set, the node loads the given
137 'dn' from LDAP */
138 function user (&$config, $dn= NULL)
139 {
140 global $lang;
142 $this->config= $config;
143 /* Configuration is fine, allways */
144 if($this->config->get_cfg_value("honourIvbbAttributes") == "true"){
145 $this->governmentmode = TRUE;
146 $this->attributes=array_merge($this->attributes,$this->govattrs);
147 }
149 /* Load base attributes */
150 plugin::plugin ($config, $dn);
152 $this->orig_dn = $this->dn;
153 $this->new_dn = $dn;
155 if ($this->governmentmode){
156 /* Fix public visible attribute if unset */
157 if (!isset($this->attrs['publicVisible'])){
158 $this->publicVisible == "nein";
159 }
160 }
162 /* Load government mode attributes */
163 if ($this->governmentmode){
164 /* Copy all attributs */
165 foreach ($this->govattrs as $val){
166 if (isset($this->attrs["$val"][0])){
167 $this->$val= $this->attrs["$val"][0];
168 }
169 }
170 }
172 /* Create me for new accounts */
173 if ($dn == "new"){
174 $this->is_account= TRUE;
175 }
177 /* Make hash default to md5 if not set in config */
178 $hash= $this->config->get_cfg_value("passwordDefaultHash", "crypt/md5");
180 /* Load data from LDAP? */
181 if ($dn !== NULL){
183 /* Do base conversation */
184 if ($this->dn == "new"){
185 $ui= get_userinfo();
186 $this->base= dn2base(session::global_is_set("CurrentMainBase")?"cn=dummy,".session::global_get("CurrentMainBase"):$ui->dn);
187 } else {
188 $this->base= dn2base($dn);
189 }
191 /* get password storage type */
192 if (isset ($this->attrs['userPassword'][0])){
193 /* Initialize local array */
194 $matches= array();
195 if (preg_match ("/^{[^}]+}/", $this->attrs['userPassword'][0])){
196 $tmp= passwordMethod::get_method($this->attrs['userPassword'][0]);
197 if(is_object($tmp)){
198 $this->pw_storage= $tmp->get_hash();
199 }
201 } else {
202 if ($this->attrs['userPassword'][0] != ""){
203 $this->pw_storage= "clear";
204 } else {
205 $this->pw_storage= $hash;
206 }
207 }
208 } else {
209 /* Preset with vaule from configuration */
210 $this->pw_storage= $hash;
211 }
213 /* Load extra attributes: certificate and picture */
214 $this->load_cert();
215 $this->load_picture();
216 if ($this->userCertificate != ""){
217 $this->had_userCertificate= TRUE;
218 }
219 }
221 /* Reset password storage indicator, used by password_change_needed() */
222 if ($dn == "new"){
223 $this->last_pw_storage= "unset";
224 } else {
225 $this->last_pw_storage= $this->pw_storage;
226 }
228 /* Generate dateOfBirth entry */
229 if (isset ($this->attrs['dateOfBirth'])){
230 /* This entry is ISO 8601 conform */
231 list($year, $month, $day)= explode("-", $this->attrs['dateOfBirth'][0], 3);
233 #TODO: use $lang to convert date
234 $this->dateOfBirth= "$day.$month.$year";
235 } else {
236 $this->dateOfBirth= "";
237 }
239 /* Put gender attribute to upper case */
240 if (isset ($this->attrs['gender'])){
241 $this->gender= strtoupper($this->attrs['gender'][0]);
242 }
244 // Get login restrictions
245 if(isset($this->attrs['gosaLoginRestriction'])){
246 $this->gosaLoginRestriction =array();
247 for($i =0;$i < $this->attrs['gosaLoginRestriction']['count']; $i++){
248 $this->gosaLoginRestriction[] = $this->attrs['gosaLoginRestriction'][$i];
249 }
250 }
251 $this->gosaLoginRestrictionWidget= new sortableListing($this->gosaLoginRestriction);
252 $this->gosaLoginRestrictionWidget->setDeleteable(true);
253 $this->gosaLoginRestrictionWidget->setColspecs(array('*'));
254 $this->gosaLoginRestrictionWidget->setWidth("100%");
255 $this->gosaLoginRestrictionWidget->setHeight("70px");
257 $this->orig_base = $this->base;
258 $this->baseSelector= new baseSelector($this->allowedBasesToMoveTo(), $this->base);
259 $this->baseSelector->setSubmitButton(false);
260 $this->baseSelector->setHeight(300);
261 $this->baseSelector->update(true);
264 // Detect the managers name
265 $this->manager_name = "";
266 $ldap = $this->config->get_ldap_link();
267 if(!empty($this->manager)){
268 $ldap->cat($this->manager, array('cn'));
269 if($ldap->count()){
270 $attrs = $ldap->fetch();
271 $this->manager_name = $attrs['cn'][0];
272 }else{
273 $this->manager_name = "("._("Unknown")."!): ".$this->manager;
274 }
275 }
276 }
279 /* execute generates the html output for this node */
280 function execute()
281 {
282 /* Call parent execute */
283 plugin::execute();
285 /* Set list ACL */
286 $this->gosaLoginRestrictionWidget->setAcl($this->getacl('gosaLoginRestriction'));
287 $this->gosaLoginRestrictionWidget->update();
289 /* Handle add/delete for restriction mode */
290 if (isset($_POST['add_res']) && isset($_POST['res'])) {
291 $val= validate($_POST['res']);
292 if (preg_match('/^[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+$/', $val) ||
293 preg_match('/^([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)\/([0-9]+)$/', $val) ||
294 preg_match('/^([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)\/([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)$/', $val)) {
295 $this->gosaLoginRestrictionWidget->addEntry($val);
296 } else {
297 msg_dialog::display(_("Error"), _("Please add a single IP address or a network/netmask combination!"), ERROR_DIALOG);
298 }
299 }
301 /* Log view */
302 if($this->is_account && !$this->view_logged){
303 $this->view_logged = TRUE;
304 new log("view","users/".get_class($this),$this->dn);
305 }
307 // Clear manager attribute if requested
308 if(preg_match("/ removeManager/i", " ".implode(array_keys($_POST),' ')." ")){
309 $this->manager = "";
310 $this->manager_name = "";
311 }
313 // Allow to select a new inetOrgPersion:manager
314 if(preg_match("/ editManager/i", " ".implode(array_keys($_POST),' ')." ")){
315 $this->dialog = new singleUserSelect($this->config, get_userinfo());
316 }
317 if($this->dialog && $this->dialog instanceOf singleUserSelect && count($this->dialog->detectPostActions())){
318 $users = $this->dialog->detectPostActions();
319 if(isset($users['action']) && $users['action'] =='edit' && isset($users['targets']) && count($users['targets'])){
320 $headpage = $this->dialog->getHeadpage();
321 $dn = $users['targets'][0];
322 $attrs = $headpage->getEntry($dn);
323 $this->manager = $dn;
324 $this->manager_name = $attrs['cn'][0];
325 $this->dialog = NULL;
326 }
327 }
328 if(isset($_POST['add_users_cancel'])){
329 $this->dialog = NULL;
330 }
331 if($this->dialog instanceOf singleUserSelect) return($this->dialog->execute());
334 $smarty= get_smarty();
335 $smarty->assign("usePrototype", "true");
336 $smarty->assign("gosaLoginRestrictionWidget", $this->gosaLoginRestrictionWidget->render());
338 /* Assign sex */
339 $sex= array(0 => " ", "F" => _("female"), "M" => _("male"));
340 $smarty->assign("gender_list", $sex);
341 $language= array_merge(array(0 => " ") ,get_languages(TRUE));
342 $smarty->assign("preferredLanguage_list", $language);
344 /* Get random number for pictures */
345 srand((double)microtime()*1000000);
346 $smarty->assign("rand", rand(0, 10000));
349 /* Do we represent a valid gosaAccount? */
350 if (!$this->is_account){
351 $str = "<img alt=\"\" src=\"images/small-error.png\" align=\"middle\"> <b>".
352 msgPool::noValidExtension("GOsa")."</b>";
353 return($str);
354 }
356 /* Password configure dialog handling */
357 if(is_object($this->pwObject) && $this->pwObject->display){
358 $output= $this->pwObject->configure();
359 if ($output != ""){
360 $this->dialog= TRUE;
361 return $output;
362 }
363 $this->dialog= false;
364 }
366 /* Dialog handling */
367 if(is_object($this->dialog)){
368 /* Must be called before save_object */
369 $this->dialog->save_object();
371 if($this->dialog->isClosed()){
372 $this->dialog = false;
373 }elseif($this->dialog->isSelected()){
375 /* check if selected base is allowed to move to / create a new object */
376 $tmp = $this->get_allowed_bases();
377 if(isset($tmp[$this->dialog->isSelected()])){
378 $this->base = $this->dialog->isSelected();
379 }
380 $this->dialog= false;
381 }else{
382 return($this->dialog->execute());
383 }
384 }
386 /* Want password method editing? */
387 if ($this->acl_is_writeable("userPassword")){
388 if (isset($_POST['edit_pw_method'])){
389 if (!is_object($this->pwObject) || $this->pw_storage != $this->pwObject->get_hash_name()){
390 $temp= passwordMethod::get_available_methods();
391 $this->pwObject= new $temp[$this->pw_storage]($this->config,$this->dn);
392 }
393 $this->pwObject->display = TRUE;
394 $this->dialog= TRUE;
395 pathNavigator::registerPlugin(_("Password configuration"));
396 return ($this->pwObject->configure());
397 }
398 }
400 /* Want picture edit dialog? */
401 if($this->acl_is_writeable("userPicture")) {
402 if (isset($_POST['edit_picture'])){
403 /* Save values for later recovery, in case some presses
404 the cancel button. */
405 $this->old_jpegPhoto= $this->jpegPhoto;
406 $this->old_photoData= $this->photoData;
407 $this->picture_dialog= TRUE;
408 $this->dialog= TRUE;
409 }
410 }
412 /* Remove picture? */
413 if($this->acl_is_writeable("userPicture")){
414 if (isset($_POST['picture_remove'])){
415 $this->set_picture ();
416 $this->jpegPhoto= "*removed*";
417 $this->is_modified= TRUE;
418 return($smarty->fetch (get_template_path('generic_picture.tpl', TRUE, dirname(__FILE__))));
419 }
420 }
422 /* Save picture */
423 if (isset($_POST['picture_edit_finish'])){
425 /* Check for clean upload */
426 if ($_FILES['picture_file']['name'] != ""){
427 if (!is_uploaded_file($_FILES['picture_file']['tmp_name'])) {
428 msg_dialog::display(_("Error"), _("Cannot upload file!"), ERROR_DIALOG);
429 }else{
430 /* Activate new picture */
431 $this->set_picture($_FILES['picture_file']['tmp_name']);
432 }
433 }
434 $this->picture_dialog= FALSE;
435 $this->dialog= FALSE;
436 $this->is_modified= TRUE;
437 }
440 /* Cancel picture */
441 if (isset($_POST['picture_edit_cancel'])){
443 /* Restore values */
444 $this->jpegPhoto= $this->old_jpegPhoto;
445 $this->photoData= $this->old_photoData;
447 /* Update picture */
448 session::set('binary',$this->photoData);
449 session::set('binarytype',"image/jpeg");
450 $this->picture_dialog= FALSE;
451 $this->dialog= FALSE;
452 }
454 /* Want certificate= */
455 if ((isset($_POST['edit_cert'])) && $this->acl_is_readable("Certificate")){
457 /* Save original values for later reconstruction */
458 foreach (array("certificateSerialNumber", "userCertificate",
459 "userSMIMECertificate", "userPKCS12") as $val){
461 $oval= "old_$val";
462 $this->$oval= $this->$val;
463 }
465 $this->cert_dialog= TRUE;
466 $this->dialog= TRUE;
467 }
470 /* Cancel certificate dialog */
471 if (isset($_POST['cert_edit_cancel'])){
473 /* Restore original values in case of 'cancel' */
474 foreach (array("certificateSerialNumber", "userCertificate",
475 "userSMIMECertificate", "userPKCS12") as $val){
477 $oval= "old_$val";
478 $this->$val= $this->$oval;
479 }
480 $this->cert_dialog= FALSE;
481 $this->dialog= FALSE;
482 }
485 /* Remove certificate? */
486 if($this->acl_is_writeable("Certificate")){
487 foreach (array ("userCertificate", "userSMIMECertificate", "userPKCS12") as $val){
488 if (isset($_POST["remove_$val"])){
490 /* Reset specified cert*/
491 $this->$val= "";
492 $this->is_modified= TRUE;
493 }
494 }
495 }
497 /* Upload new cert and close dialog? */
498 if($this->acl_is_writeable("Certificate")){
499 $fail =false;
500 if (isset($_POST['cert_edit_finish'])){
502 /* for all certificates do */
503 foreach (array ("userCertificate", "userSMIMECertificate", "userPKCS12")
504 as $val){
506 /* Check for clean upload */
507 if (array_key_exists($val."_file", $_FILES) &&
508 array_key_exists('name', $_FILES[$val."_file"]) &&
509 $_FILES[$val."_file"]['name'] != "" &&
510 is_uploaded_file($_FILES[$val."_file"]['tmp_name'])) {
511 $this->set_cert("$val", $_FILES[$val."_file"]['tmp_name']);
512 }
513 }
515 /* Save serial number */
516 if (isset($_POST["certificateSerialNumber"]) &&
517 $_POST["certificateSerialNumber"] != ""){
519 if (!tests::is_id($_POST["certificateSerialNumber"])){
520 $fail = true;
521 msg_dialog::display(_("Error"), msgPool::invalid(_("Serial number"),$_POST["certificateSerialNumber"],"/[0-9]/"),ERROR_DIALOG);
523 foreach(array("userCertificate", "userSMIMECertificate", "userPKCS12") as $cert){
524 if ($this->$cert != ""){
525 $smarty->assign("$cert"."_state", "true");
526 } else {
527 $smarty->assign("$cert"."_state", "");
528 }
529 }
530 }
532 $this->certificateSerialNumber= $_POST["certificateSerialNumber"];
533 $this->is_modified= TRUE;
534 }
535 if(!$fail){
536 $this->cert_dialog= FALSE;
537 $this->dialog= FALSE;
538 }
539 }
540 }
541 /* Display picture dialog */
542 if ($this->picture_dialog){
543 pathNavigator::registerPlugin(_("User picture"));
544 return($smarty->fetch (get_template_path('generic_picture.tpl', TRUE, dirname(__FILE__))));
545 }
547 /* Display cert dialog */
548 if ($this->cert_dialog){
549 pathNavigator::registerPlugin(_("Certificates"));
550 $smarty->assign("CertificateACL",$this->getacl("Certificate"));
551 $smarty->assign("Certificate_readable",$this->acl_is_readable("Certificate"));
552 $smarty->assign("certificateSerialNumber",$this->certificateSerialNumber);
554 foreach(array("userCertificate", "userSMIMECertificate", "userPKCS12") as $cert){
555 if ($this->$cert != ""){
556 /* import certificate */
557 $certificate = new certificate;
558 $certificate->import($this->$cert);
560 /* Read out data*/
561 $timeto = $certificate->getvalidto_date();
562 $timefrom = $certificate->getvalidfrom_date();
565 /* Additional info if start end time is '0' */
566 $add_str_info = "";
567 if($timeto == 0 && $timefrom == 0){
568 $add_str_info = "<br><i>"._("(Some types of certificates are currently not supported and may be displayed as 'invalid'.)")."</i>";
569 }
571 $str = "<table \"\" border=0 summary='"._("Certificates")."'>
572 <tr>
573 <td>CN</td>
574 <td>".preg_replace("/ /", " ", $certificate->getname())."</td>
575 </tr>
576 </table><br>".
578 sprintf(_("Certificate is valid from %s to %s and is currently %s."),
579 "<b>".date('d M Y',$timefrom)."</b>",
580 "<b>".date('d M Y',$timeto)."</b>",
581 $certificate->isvalid()?"<b><font style='color:green'>"._("valid")."</font></b>":
582 "<b><font style='color:red'>"._("invalid")."</font></b>").$add_str_info;
584 $smarty->assign($cert."info",$str);
585 $smarty->assign($cert."_state","true");
586 } else {
587 $smarty->assign($cert."info", "<i>"._("No certificate installed")."</i>");
588 $smarty->assign($cert."_state","");
589 }
590 }
592 if($this->governmentmode){
593 $smarty->assign("honourIvbbAttributes", "true");
594 }else{
595 $smarty->assign("honourIvbbAttributes", "false");
596 }
597 $smarty->assign("governmentmode", $this->governmentmode);
598 return($smarty->fetch (get_template_path('generic_certs.tpl', TRUE, dirname(__FILE__))));
599 }
601 /* Prepare password hashes */
602 if ($this->pw_storage == ""){
603 $this->pw_storage= $this->config->get_cfg_value("hash");
604 }
606 $temp= passwordMethod::get_available_methods();
607 $is_configurable= FALSE;
608 $hashes = $temp['name'];
609 if(isset($temp[$this->pw_storage])){
610 $test= new $temp[$this->pw_storage]($this->config, $this->dn);
611 $is_configurable= $test->is_configurable();
612 }else{
613 new msg_dialog(_("Password method"),_("The selected password method is no longer available."),WARNING_DIALOG);
614 }
617 /* Create password methods array */
618 $pwd_methods = array();
619 foreach($hashes as $id => $name){
620 if(!empty($temp['desc'][$id])){
621 $pwd_methods[$name] = $name." (".$temp['desc'][$id].")";
622 }else{
623 $pwd_methods[$name] = $name;
624 }
625 }
627 /* Load attributes and acl's */
628 $ui =get_userinfo();
629 foreach($this->attributes as $val){
630 $smarty->assign("$val", $this->$val);
631 if(in_array($val,$this->multi_boxes)){
632 $smarty->assign("use_".$val,TRUE);
633 }else{
634 $smarty->assign("use_".$val,FALSE);
635 }
636 }
637 foreach(array("base","pw_storage","edit_picture") as $val){
638 if(in_array($val,$this->multi_boxes)){
639 $smarty->assign("use_".$val,TRUE);
640 }else{
641 $smarty->assign("use_".$val,FALSE);
642 }
643 }
645 /* Set acls */
646 $tmp = $this->plinfo();
647 foreach($tmp['plProvidedAcls'] as $val => $translation){
648 $smarty->assign("$val"."ACL", $this->getacl($val));
649 }
651 // Special ACL for gosaLoginRestrictions -
652 // In case of multiple edit, we need a readonly ACL for the list.
653 $smarty->assign('gosaLoginRestriction_ONLY_R_ACL', preg_replace("/[^r]/i","", $this->getacl($val)));
655 $smarty->assign("pwmode", $pwd_methods);
656 $smarty->assign("pwmode_select", $this->pw_storage);
657 $smarty->assign("pw_configurable", $is_configurable);
658 $smarty->assign("passwordStorageACL", $this->getacl("userPassword"));
659 $smarty->assign("CertificatesACL", $this->getacl("Certificate"));
660 $smarty->assign("userPictureACL", $this->getacl("userPicture"));
661 $smarty->assign("userPicture_is_readable", $this->acl_is_readable("userPicture"));
663 /* Create base acls */
664 $smarty->assign("base", $this->baseSelector->render());
666 /* Save government mode attributes */
667 if($this->governmentmode){
668 $smarty->assign("governmentmode", "true");
669 $ivbbmodes= array("nein", "", "ivbv", "testa", "ivbv,testa", "internet",
670 "internet,ivbv", "internet,testa", "internet,ivbv,testa");
671 $smarty->assign("ivbbmodes", $ivbbmodes);
672 foreach ($this->govattrs as $val){
673 $smarty->assign("$val", $this->$val);
674 $smarty->assign("$val"."ACL", $this->getacl($val));
675 }
676 } else {
677 $smarty->assign("governmentmode", "false");
678 }
680 /* Special mode for uid */
681 $uidACL= $this->getacl("uid");
682 if (isset ($this->dn)){
683 if ($this->dn != "new"){
684 $uidACL= preg_replace("/w/","",$uidACL);
685 }
686 } else {
687 $uidACL= preg_replace("/w/","",$uidACL);
688 }
690 $smarty->assign("uidACL", $uidACL);
691 $smarty->assign("is_template", $this->is_template);
692 $smarty->assign("use_dob", $this->use_dob);
694 if (isset($this->parent)){
695 if (isset($this->parent->by_object['phoneAccount']) &&
696 $this->parent->by_object['phoneAccount']->is_account){
697 $smarty->assign("has_phoneaccount", "true");
698 } else {
699 $smarty->assign("has_phoneaccount", "false");
700 }
701 } else {
702 $smarty->assign("has_phoneaccount", "false");
703 }
704 $smarty->assign("multiple_support" , $this->multiple_support_active);
705 $smarty->assign("manager_name",$this->manager_name);
706 return($smarty->fetch (get_template_path('generic.tpl', TRUE, dirname(__FILE__))));
707 }
710 /* remove object from parent */
711 function remove_from_parent()
712 {
713 /* Only remove valid accounts */
714 if(!$this->initially_was_account) return;
716 /* Remove password extension */
717 $temp= passwordMethod::get_available_methods();
719 /* Remove password method from user account */
720 if(isset($temp[$this->pw_storage]) && class_available($temp[$this->pw_storage])){
721 $this->pwObject= new $temp[$this->pw_storage]($this->config,$this->dn);
722 $this->pwObject->remove_from_parent();
723 }
725 /* Remove user */
726 $ldap= $this->config->get_ldap_link();
727 $ldap->rmdir ($this->dn);
728 if (!$ldap->success()){
729 msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error(), $this->dn, LDAP_DEL, get_class()));
730 }
732 new log("remove","users/".get_class($this),$this->dn,$this->attributes,$ldap->get_error());
734 /* Delete references to groups */
735 $ldap->cd ($this->config->current['BASE']);
736 $ldap->search ("(&(objectClass=posixGroup)(memberUid=".$this->uid."))", array("uid"));
737 while ($ldap->fetch()){
738 $g= new group($this->config, $ldap->getDN());
739 $g->removeUser($this->uid);
740 $g->save ();
741 }
743 /* Delete references to object groups */
744 $ldap->cd ($this->config->current['BASE']);
745 $ldap->search ("(&(objectClass=gosaGroupOfNames)(member=".LDAP::prepare4filter($this->dn)."))", array("cn"));
746 while ($ldap->fetch()){
747 $og= new ogroup($this->config, $ldap->getDN());
748 unset($og->member[$this->dn]);
749 $og->member= array_values($og->member);
750 $og->save ();
751 }
753 // Update 'manager' attributes from gosaDepartment and inetOrgPerson
754 $filter = "(&(objectClass=inetOrgPerson)(manager=".LDAP::prepare4filter($this->dn)."))";
755 $ocs = $ldap->get_objectclasses();
756 if(isset($ocs['gosaDepartment']['MAY']) && in_array('manager', $ocs['gosaDepartment']['MAY'])){
757 $filter = "(|".$filter."(&(objectClass=gosaDepartment)(manager=".LDAP::prepare4filter($this->dn).")))";
758 }
759 $leaf_deps= get_list($filter,array("all"),$this->config->current['BASE'],
760 array("manager","dn","objectClass"),GL_SUBSEARCH | GL_NO_ACL_CHECK);
761 foreach($leaf_deps as $entry){
762 $update = array('manager' => array());
763 $ldap->cd($entry['dn']);
764 $ldap->modify($update);
765 if(!$ldap->success()){
766 trigger_error(sprintf("Failed to update manager for '%s', error was '%s'", $entry['dn'], $ldap->get_error()));
767 }
768 }
770 /* Delete references to roles */
771 $ldap->cd ($this->config->current['BASE']);
772 $ldap->search ("(&(objectClass=organizationalRole)(roleOccupant=".LDAP::prepare4filter($this->dn)."))", array("cn"));
773 while ($ldap->fetch()){
774 $role= new roleGeneric($this->config, $ldap->getDN());
775 $key = array_search($this->dn,$role->roleOccupant);
776 if($key !== FALSE){
777 unset($role->roleOccupant[$key]);
778 $role->roleOccupant= array_values($role->roleOccupant);
779 $role->save ();
780 }
781 }
783 /* If needed, let the password method do some cleanup */
784 $tmp = new passwordMethod($this->config, $this->dn);
785 $available = $tmp->get_available_methods();
786 if (in_array_ics($this->pw_storage, $available['name'])){
787 $test= new $available[$this->pw_storage]($this->config);
788 $test->attrs= $this->attrs;
789 $test->dn= $this->dn;
790 $test->remove_from_parent();
791 }
793 /* Remove ACL dependencies too */
794 acl::remove_acl_for($this->dn);
796 /* Optionally execute a command after we're done */
797 $this->handle_post_events("remove",array("uid" => $this->uid));
798 }
801 /* Save data to object */
802 function save_object()
803 {
804 if(isset($_POST['generic']) || isset($_POST['multiple_user_posted'])){
806 /* Make a backup of the current selected base */
807 $base_tmp = $this->base;
809 /* Parents save function */
810 plugin::save_object ();
812 /* Refresh base */
813 if ($this->acl_is_moveable($this->base)){
814 if (!$this->baseSelector->update()) {
815 msg_dialog::display(_("Error"), msgPool::permMove(), ERROR_DIALOG);
816 }
817 if ($this->base != $this->baseSelector->getBase()) {
818 $this->base= $this->baseSelector->getBase();
819 $this->is_modified= TRUE;
820 }
821 }
823 /* Sync lists */
824 $this->gosaLoginRestrictionWidget->save_object();
825 if ($this->gosaLoginRestrictionWidget->isModified()) {
826 $this->gosaLoginRestriction= array_values($this->gosaLoginRestrictionWidget->getMaintainedData());
827 }
829 /* Save government mode attributes */
830 if ($this->governmentmode){
831 foreach ($this->govattrs as $val){
832 if ($this->acl_is_writeable($val)){
833 $data= stripcslashes($_POST["$val"]);
834 if ($data != $this->$val){
835 $this->is_modified= TRUE;
836 }
837 $this->$val= $data;
838 }
839 }
840 }
842 /* In template mode, the uid is autogenerated... */
843 if ($this->is_template){
844 $this->uid= strtolower($this->sn);
845 $this->givenName= $this->sn;
846 }
848 /* Get pw_storage mode */
849 if (isset($_POST['pw_storage'])){
850 foreach(array("pw_storage") as $val){
851 if(isset($_POST[$val])){
852 $data= validate($_POST[$val]);
853 if ($data != $this->$val){
854 $this->is_modified= TRUE;
855 }
856 $this->$val= $data;
857 }
858 }
859 }
861 if($this->pw_storage != $this->last_pw_storage && isset($_POST['pw_storage'])){
862 if ($this->acl_is_writeable("userPassword")){
863 $temp= passwordMethod::get_available_methods();
864 if (!is_object($this->pwObject) || !($this->pwObject instanceOf $temp[$this->pw_storage])){
865 foreach($temp as $id => $data){
866 if(isset($data['name']) && $data['name'] == $this->pw_storage && $data['is_configurable']){
867 $this->pwObject= new $temp[$this->pw_storage]($this->config,$this->dn);
868 break;
869 }
870 }
871 }
872 }
873 }
875 /* Save current cn
876 */
877 $this->cn = $this->givenName." ".$this->sn;
878 }
879 }
881 function rebind($ldap, $referral)
882 {
883 $credentials= LDAP::get_credentials($referral, $this->config->current['REFERRAL']);
884 if (ldap_bind($ldap, $credentials['ADMIN'], $credentials['PASSWORD'])) {
885 $this->error = "Success";
886 $this->hascon=true;
887 $this->reconnect= true;
888 return (0);
889 } else {
890 $this->error = "Could not bind to " . $credentials['ADMIN'];
891 return NULL;
892 }
893 }
896 /* Save data to LDAP, depending on is_account we save or delete */
897 function save()
898 {
899 global $lang;
901 /* Only force save of changes ....
902 If this attributes aren't changed, avoid saving.
903 */
905 if($this->gender=="0") $this->gender ="";
906 if($this->preferredLanguage=="0") $this->preferredLanguage ="";
908 /* First use parents methods to do some basic fillup in $this->attrs */
909 plugin::save ();
911 if ($this->dateOfBirth != ""){
912 if(!is_array($this->attrs['dateOfBirth'])) {
913 #TODO: use $lang to convert date
914 list($day, $month, $year)= explode(".", $this->dateOfBirth);
915 $this->attrs['dateOfBirth'] = sprintf("%04d-%02d-%02d", $year, $month, $day);
916 }
917 }
919 /* Remove additional objectClasses */
920 $tmp= array();
921 foreach ($this->attrs['objectClass'] as $key => $set){
922 $found= false;
923 foreach (array("ivbbentry", "gosaUserTemplate") as $val){
924 if (preg_match ("/^$set$/i", $val)){
925 $found= true;
926 break;
927 }
928 }
929 if (!$found){
930 $tmp[]= $set;
931 }
932 }
934 /* Replace the objectClass array. This is done because of the
935 separation into government and normal mode. */
936 $this->attrs['objectClass']= $tmp;
938 /* Add objectClasss for template mode? */
939 if ($this->is_template){
940 $this->attrs['objectClass'][]= "gosaUserTemplate";
941 }
943 /* Hard coded government mode? */
944 if ($this->governmentmode){
945 $this->attrs['objectClass'][]= "ivbbentry";
947 /* Copy standard attributes */
948 foreach ($this->govattrs as $val){
949 if ($this->$val != ""){
950 $this->attrs["$val"]= $this->$val;
951 } elseif (!$this->is_new) {
952 $this->attrs["$val"]= array();
953 }
954 }
956 /* Remove attribute if set to "nein" */
957 if ($this->publicVisible == "nein"){
958 $this->attrs['publicVisible']= array();
959 if($this->is_new){
960 unset($this->attrs['publicVisible']);
961 }else{
962 $this->attrs['publicVisible']=array();
963 }
965 }
967 }
969 /* Special handling for attribute userCertificate needed */
970 if ($this->userCertificate != ""){
971 $this->attrs["userCertificate;binary"]= $this->userCertificate;
972 $remove_userCertificate= false;
973 } else {
974 $remove_userCertificate= true;
975 }
977 /* Special handling for dateOfBirth value */
978 if ($this->dateOfBirth == ""){
979 if ($this->is_new) {
980 unset($this->attrs["dateOfBirth"]);
981 } else {
982 $this->attrs["dateOfBirth"]= array();
983 }
984 }
985 if (!$this->gender){
986 if ($this->is_new) {
987 unset($this->attrs["gender"]);
988 } else {
989 $this->attrs["gender"]= array();
990 }
991 }
992 if (!$this->preferredLanguage){
993 if ($this->is_new) {
994 unset($this->attrs["preferredLanguage"]);
995 } else {
996 $this->attrs["preferredLanguage"]= array();
997 }
998 }
1000 /* Special handling for attribute jpegPhote needed, scale image via
1001 image magick to 147x200 pixels and inject resulting data. */
1002 if ($this->jpegPhoto == "*removed*"){
1004 /* Reset attribute to avoid writing *removed* as value */
1005 $this->attrs["jpegPhoto"] = array();
1007 } else {
1009 /* Fallback if there's no image magick inside PHP */
1010 if (!function_exists("imagick_blob2image")){
1011 /* Get temporary file name for conversation */
1012 $fname = tempnam (TEMP_DIR, "GOsa");
1014 /* Open file and write out photoData */
1015 $fp = fopen ($fname, "w");
1016 fwrite ($fp, $this->photoData);
1017 fclose ($fp);
1019 /* Build conversation query. Filename is generated automatically, so
1020 we do not need any special security checks. Exec command and save
1021 output. For PHP safe mode, you'll need a configuration which respects
1022 image magick as executable... */
1023 $query= "convert -size 147x200 $fname -resize 147x200 +profile \"*\" -";
1024 @DEBUG (DEBUG_SHELL, __LINE__, __FUNCTION__, __FILE__,
1025 $query, "Execute");
1027 /* Read data written by convert */
1028 $output= "";
1029 $sh= popen($query, 'r');
1030 while (!feof($sh)){
1031 $output.= fread($sh, 4096);
1032 }
1033 pclose($sh);
1035 unlink($fname);
1037 /* Save attribute */
1038 $this->attrs["jpegPhoto"] = $output;
1040 } else {
1042 /* Load the new uploaded Photo */
1043 if(!$handle = imagick_blob2image($this->photoData)) {
1044 new log("debug","users/".get_class($this),$this->dn,array(),"Could not access uploaded image");
1045 }
1047 /* Resizing image to 147x200 and blur */
1048 if(!imagick_resize($handle,147,200,IMAGICK_FILTER_GAUSSIAN,0)){
1049 new log("debug","users/".get_class($this),$this->dn,array(),"Could not resize uploaded image");
1050 }
1052 /* Converting image to JPEG */
1053 if(!imagick_convert($handle,"JPEG")) {
1054 new log("debug","users/".get_class($this),$this->dn,array(),"Could not convert uploaded image to jepg");
1055 }
1057 /* Creating binary Code for the Image */
1058 if(!$dump = imagick_image2blob($handle)){
1059 new log("debug","users/".get_class($this),$this->dn,array(),"Could not create new user image");
1060 }
1062 /* Sending Image */
1063 $output= $dump;
1065 /* Save attribute */
1066 $this->attrs["jpegPhoto"] = $output;
1067 }
1069 }
1071 /* This only gets called when user is renaming himself */
1072 $ldap= $this->config->get_ldap_link();
1073 if ($this->dn != $this->new_dn){
1075 /* Write entry on new 'dn' */
1076 $this->update_acls($this->dn,$this->new_dn);
1077 $this->move($this->dn, $this->new_dn);
1079 /* Happen to use the new one */
1080 change_ui_dn($this->dn, $this->new_dn);
1081 $this->dn= $this->new_dn;
1082 }
1085 /* Save data. Using 'modify' implies that the entry is already present, use 'add' for
1086 new entries. So do a check first... */
1087 $ldap->cat ($this->dn, array('dn'));
1088 if ($ldap->fetch()){
1089 $mode= "modify";
1090 } else {
1091 $mode= "add";
1092 $ldap->cd($this->config->current['BASE']);
1093 $ldap->create_missing_trees(preg_replace('/^[^,]+,/', '', $this->dn));
1094 }
1096 /* Set password to some junk stuff in case of templates */
1097 if ($this->is_template){
1098 $temp= passwordMethod::get_available_methods();
1099 foreach($temp as $id => $data){
1100 if(isset($data['name']) && $data['name'] == $this->pw_storage){
1101 $tmp = new $temp[$this->pw_storage]($this->config,$this->dn);
1102 $tmp->set_hash($this->pw_storage);
1103 $this->attrs['userPassword'] = $tmp->create_template_hash($this->attrs);
1104 break;
1105 }
1106 }
1107 }
1109 @DEBUG (DEBUG_LDAP, __LINE__, __FUNCTION__, __FILE__,
1110 $this->attributes, "Save via $mode");
1112 /* Finally write data with selected 'mode' */
1113 $this->cleanup();
1115 /* Update current locale settings, if we have edited ourselves */
1116 $ui = session::get('ui');
1117 if(isset($this->attrs['preferredLanguage']) && $this->dn == $ui->dn){
1118 $ui->language = $this->preferredLanguage;
1119 session::set('ui',$ui);
1120 session::set('Last_init_lang',"update");
1121 }
1123 $ldap->cd ($this->dn);
1124 $ldap->$mode ($this->attrs);
1125 if (!$ldap->success()){
1126 msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error(), $this->dn, LDAP_DEL, get_class()));
1127 return (1);
1128 }
1130 /* Remove ACL dependencies too */
1131 if($this->dn != $this->orig_dn && $this->orig_dn != "new"){
1132 $tmp = new acl($this->config,$this->parent,$this->dn);
1133 $tmp->update_acl_membership($this->orig_dn,$this->dn);
1134 }
1136 if($mode == "modify"){
1137 new log("modify","users/".get_class($this),$this->dn,array_keys($this->attrs),$ldap->get_error());
1138 }else{
1139 new log("create","users/".get_class($this),$this->dn,array_keys($this->attrs),$ldap->get_error());
1140 }
1142 /* Remove cert?
1143 For some reason, the 'ldap' class doesn't want to remove binary entries, so I need
1144 to work around myself. */
1145 if ($remove_userCertificate == true && !$this->is_new && $this->had_userCertificate){
1147 /* Reset array, assemble new, this should be reworked */
1148 $this->attrs= array();
1149 $this->attrs['userCertificate;binary']= array();
1151 /* Prepare connection */
1152 if (!($ds = ldap_connect($this->config->current['SERVER']))) {
1153 die ("Could not connect to LDAP server");
1154 }
1155 ldap_set_option($ds, LDAP_OPT_PROTOCOL_VERSION, 3);
1156 if (function_exists("ldap_set_rebind_proc") && $this->config->get_cfg_value("ldapFollowReferrals") == "true") {
1157 ldap_set_option($this->cid, LDAP_OPT_REFERRALS, 1);
1158 ldap_set_rebind_proc($ds, array(&$this, "rebind"));
1159 }
1160 if($this->config->get_cfg_value("ldapTLS") == "true"){
1161 ldap_start_tls($ds);
1162 }
1163 if (!($res = @ldap_bind($ds, $this->config->current['ADMIN'],
1164 $this->config->current['PASSWORD']))) {
1165 die ("Could not bind to LDAP");
1166 }
1168 /* Modify using attrs */
1169 ldap_mod_del($ds,$this->dn,$this->attrs);
1170 ldap_close($ds);
1171 }
1173 /* If needed, let the password method do some cleanup */
1174 if ($this->pw_storage != $this->last_pw_storage){
1175 $tmp = new passwordMethod($this->config, $this->dn);
1176 $available = $tmp->get_available_methods();
1177 if (in_array_ics($this->last_pw_storage, $available['name'])){
1178 $test= new $available[$this->last_pw_storage]($this->config,$this->dn);
1179 $test->attrs= $this->attrs;
1180 $test->remove_from_parent();
1181 }
1182 }
1184 /* Maybe the current password method want's to do some changes... */
1185 if (is_object($this->pwObject)){
1186 $this->pwObject->save($this->dn);
1187 }
1189 /* Optionally execute a command after we're done */
1190 if ($mode == "add"){
1191 $this->handle_post_events("add", array("uid" => $this->uid));
1192 } elseif ($this->is_modified){
1193 $this->handle_post_events("modify", array("uid" => $this->uid));
1194 }
1196 return (0);
1197 }
1200 function create_initial_rdn($pattern)
1201 {
1202 // Only generate single RDNs
1203 if (preg_match('/\+/', $pattern)){
1204 msg_dialog::display(_("Error"), _("Cannot build RDN: no + allowed to build sub RDN!"), ERROR_DIALOG);
1205 return "";
1206 }
1208 // Extract attribute
1209 $attribute= preg_replace('/=.*$/', '', $pattern);
1210 if (!in_array_ics($attribute, $this->attributes)) {
1211 msg_dialog::display(_("Error"), _("Cannot build RDN: attribute is not defined!"), ERROR_DIALOG);
1212 return "";
1213 }
1215 // Sort attributes for length
1216 $attrl= array();
1217 foreach ($this->attributes as $attr) {
1218 $attrl[$attr]= strlen($attr);
1219 }
1220 arsort($attrl);
1222 // Walk thru sorted attributes and replace them in pattern
1223 foreach ($attrl as $attr => $dummy) {
1224 if (!is_array($this->$attr)){
1225 $pattern= preg_replace("/%$attr/", $this->$attr, $pattern);
1226 } else {
1227 // Array elements cannot be used for ID generation
1228 if (preg_match("/%$attr/", $pattern)) {
1229 msg_dialog::display(_("Error"), _("Cannot build RDN: invalid attribute parameters!"), ERROR_DIALOG);
1230 break;
1231 }
1232 }
1233 }
1235 // Internally assign value
1236 $this->$attribute= preg_replace('/^[^=]+=/', '', $pattern);
1238 return $pattern;
1239 }
1242 function update_new_dn()
1243 {
1244 // Alternative way to handle DN
1245 $pattern= $this->config->get_cfg_value("accountRDN");
1246 if ($pattern != "") {
1247 $rdn= $this->create_initial_rdn($pattern);
1248 $attribute= preg_replace('/=.*$/', '', $rdn);
1249 $value= preg_replace('/^[^=]+=$/', '', $rdn);
1251 /* Don't touch dn, if $attribute hasn't changed */
1252 if (isset($this->saved_attributes[$attribute]) && $this->saved_attributes[$attribute] == $this->$attribute &&
1253 $this->orig_base == $this->base ){
1254 $this->new_dn= $this->dn;
1255 } else {
1256 $this->new_dn= $this->create_unique_dn2($rdn, get_people_ou().$this->base);
1257 }
1259 // Original way to handle DN
1260 } else {
1262 $pt= "";
1263 if($this->config->get_cfg_value("personalTitleInDN") == "true"){
1264 if(!empty($this->personalTitle)){
1265 $pt = $this->personalTitle." ";
1266 }
1267 }
1269 $this->cn= $pt.$this->givenName." ".$this->sn;
1271 /* Permissions for that base? */
1272 if ($this->config->get_cfg_value("accountPrimaryAttribute") == "uid"){
1273 $this->new_dn= 'uid='.$this->uid.','.get_people_ou().$this->base;
1274 } else {
1275 /* Don't touch dn, if cn hasn't changed */
1276 if (isset($this->saved_attributes['cn']) && $this->saved_attributes['cn'] == $this->cn &&
1277 $this->orig_base == $this->base ){
1278 $this->new_dn= $this->dn;
1279 } else {
1280 $this->new_dn= $this->create_unique_dn('cn', get_people_ou().$this->base);
1281 }
1282 }
1283 }
1284 }
1287 /* Check formular input */
1288 function check()
1289 {
1290 /* Call common method to give check the hook */
1291 $message= plugin::check();
1293 /* Configurable password methods should be configured initially.
1294 */
1295 if($this->last_pw_storage != $this->pw_storage){
1296 $temp= passwordMethod::get_available_methods();
1297 foreach($temp['name'] as $id => $name){
1298 if($name == $this->pw_storage){
1299 if($temp['is_configurable'][$id] && !$this->pwObject instanceof $temp[$name] ){
1300 $message[] = _("The selected password method requires initial configuration!");
1301 }
1302 break;
1303 }
1304 }
1305 }
1307 $this->update_new_dn();
1309 /* Set the new acl base */
1310 if($this->dn == "new") {
1311 $this->set_acl_base($this->base);
1312 }
1314 /* Check if we are allowed to create/move this user */
1315 if($this->orig_dn == "new" && !$this->acl_is_createable($this->base)){
1316 $message[]= msgPool::permCreate();
1317 }elseif($this->orig_dn != "new" && $this->new_dn != $this->orig_dn && !$this->acl_is_moveable($this->base)){
1318 $message[]= msgPool::permMove();
1319 }
1321 /* UID already used? */
1322 $ldap= $this->config->get_ldap_link();
1323 $ldap->cd($this->config->current['BASE']);
1324 $ldap->search("(uid=$this->uid)", array("uid"));
1325 $ldap->fetch();
1326 if ($ldap->count() != 0 && $this->dn == 'new'){
1327 $message[]= msgPool::duplicated(_("Login"));
1328 }
1330 /* In template mode, the uid and givenName are autogenerated... */
1331 if ($this->sn == ""){
1332 $message[]= msgPool::required(_("Name"));
1333 }
1335 // Check if a wrong base was supplied
1336 if(!$this->baseSelector->checkLastBaseUpdate()){
1337 $message[]= msgPool::check_base();;
1338 }
1340 if (!$this->is_template){
1341 if ($this->givenName == ""){
1342 $message[]= msgPool::required(_("Given name"));
1343 }
1344 if ($this->uid == ""){
1345 $message[]= msgPool::required(_("Login"));
1346 }
1347 if ($this->config->get_cfg_value("accountPrimaryAttribute") != "uid"){
1348 $ldap->cat($this->new_dn);
1349 if ($ldap->count() != 0 && $this->dn != $this->new_dn && $this->dn == 'new'){
1350 $message[]= msgPool::duplicated(_("Name"));
1351 }
1352 }
1353 }
1355 /* Check for valid input */
1356 if ($this->is_modified && !tests::is_uid($this->uid)){
1358 if (strict_uid_mode()){
1359 $message[]= msgPool::invalid(_("Login"), $this->uid, "/[a-z0-9_-]/");
1360 } else {
1361 $message[]= msgPool::invalid(_("Login"), $this->uid, "/[a-z0-9_-]/i");
1362 }
1363 }
1364 if (!tests::is_url($this->labeledURI)){
1365 $message[]= msgPool::invalid(_("Homepage"), "", "", "http://www.your-domain.com/yourname");
1366 }
1368 /* Check phone numbers */
1369 if (!tests::is_phone_nr($this->telephoneNumber)){
1370 $message[]= msgPool::invalid(_("Phone"), $this->telephoneNumber, "/[\/0-9 ()+*-]/");
1371 }
1372 if (!tests::is_phone_nr($this->facsimileTelephoneNumber)){
1373 $message[]= msgPool::invalid(_("Fax"), $this->facsimileTelephoneNumber, "/[\/0-9 ()+*-]/");
1374 }
1375 if (!tests::is_phone_nr($this->mobile)){
1376 $message[]= msgPool::invalid(_("Mobile"), $this->mobile, "/[\/0-9 ()+*-]/");
1377 }
1378 if (!tests::is_phone_nr($this->pager)){
1379 $message[]= msgPool::invalid(_("Pager"), $this->pager, "/[\/0-9 ()+*-]/");
1380 }
1382 /* Check dates */
1383 if (!tests::is_date($this->dateOfBirth)){
1384 $message[]= msgPool::invalid(_("Date of birth"), $this->dateOfBirth,"" ,"23.02.2009");
1385 }
1387 /* Check for reserved characers */
1388 if (preg_match ('/[,+"?\'()=<>;\\\\]/', $this->givenName)){
1389 $message[]= msgPool::invalid(_("Given name"), $this->givenName, '/[^,+"?\'()=<>;\\\\]/');
1390 }
1391 if (preg_match ('/[,+"?\'()=<>;\\\\]/', $this->sn)){
1392 $message[]= msgPool::invalid(_("Name"), $this->sn, '/[^,+"?\'()=<>;\\\\]/');
1393 }
1395 return $message;
1396 }
1399 /* Indicate whether a password change is needed or not */
1400 function password_change_needed()
1401 {
1402 if($this->multiple_support_active){
1403 return(FALSE);
1404 }else{
1406 if(in_array("pw_storage",$this->multi_boxes)){
1407 return(TRUE);
1408 }
1409 return($this->pw_storage != $this->last_pw_storage && !$this->is_template);
1410 }
1411 }
1414 /* Load a jpegPhoto from LDAP, this is going to be simplified later on */
1415 function load_picture()
1416 {
1417 $ldap = $this->config->get_ldap_link();
1418 $ldap->cd ($this->dn);
1419 $data = $ldap->get_attribute($this->dn,"jpegPhoto");
1421 if((!$data) || ($data == "*removed*")){
1423 /* In case we don't get an entry, load a default picture */
1424 $this->set_picture ();
1425 $this->jpegPhoto= "*removed*";
1426 }else{
1428 /* Set picture */
1429 $this->photoData= $data;
1430 session::set('binary',$this->photoData);
1431 session::set('binarytype',"image/jpeg");
1432 $this->jpegPhoto= "";
1433 }
1434 }
1437 /* Load a certificate from LDAP, this is going to be simplified later on */
1438 function load_cert()
1439 {
1440 $ds= ldap_connect($this->config->current['SERVER']);
1441 ldap_set_option($ds, LDAP_OPT_PROTOCOL_VERSION, 3);
1442 if (function_exists("ldap_set_rebind_proc") && $this->config->get_cfg_value("ldapFollowReferrals") == "true"){
1443 ldap_set_option($this->cid, LDAP_OPT_REFERRALS, 1);
1444 ldap_set_rebind_proc($ds, array(&$this, "rebind"));
1445 }
1446 if ($this->config->get_cfg_value("ldapTLS") == "true"){
1447 ldap_start_tls($ds);
1448 }
1450 $r= ldap_bind($ds);
1451 $sr= @ldap_read($ds, $this->dn, "userCertificate=*", array("userCertificate"));
1453 if ($sr) {
1454 $ei= @ldap_first_entry($ds, $sr);
1456 if ($ei) {
1457 if (!$info = @ldap_get_values_len($ds, $ei, "userCertificate;binary")){
1458 $this->userCertificate= "";
1459 } else {
1460 $this->userCertificate= $info[0];
1461 }
1462 }
1463 } else {
1464 $this->userCertificate= "";
1465 }
1467 ldap_unbind($ds);
1468 }
1471 /* Load picture from file to object */
1472 function set_picture($filename ="")
1473 {
1474 if (!is_file($filename) || $filename =="" ){
1475 $filename= "./plugins/users/images/default.jpg";
1476 $this->jpegPhoto= "*removed*";
1477 }
1479 $fd = fopen ($filename, "rb");
1480 $this->photoData= fread ($fd, filesize ($filename));
1481 session::set('binary',$this->photoData);
1482 session::set('binarytype',"image/jpeg");
1483 $this->jpegPhoto= "";
1485 fclose ($fd);
1486 }
1489 /* Load certificate from file to object */
1490 function set_cert($cert, $filename)
1491 {
1492 if(!$this->acl_is_writeable("Certificate")) return;
1493 $fd = fopen ($filename, "rb");
1494 if (filesize($filename)>0) {
1495 $this->$cert= fread ($fd, filesize ($filename));
1496 fclose ($fd);
1497 $this->is_modified= TRUE;
1498 } else {
1499 msg_dialog::display(_("Error"), _("Cannot open certificate!"), ERROR_DIALOG);
1500 }
1501 }
1503 /* Adapt from given 'dn' */
1504 function adapt_from_template($dn, $skip= array())
1505 {
1506 plugin::adapt_from_template($dn, $skip);
1508 /* Get password method from template
1509 */
1510 $tmp= passwordMethod::get_method($this->attrs['userPassword'][0]);
1511 if(is_object($tmp)){
1512 if($tmp->is_configurable()){
1513 $tmp->adapt_from_template($dn);
1514 $this->pwObject = &$tmp;
1515 }
1516 $this->pw_storage= $tmp->get_hash();
1517 }
1519 /* Get base */
1520 $this->base= preg_replace('/^[^,]+,'.preg_quote(get_people_ou(), '/').'/i', '', $dn);
1522 if($this->governmentmode){
1524 /* Walk through govattrs */
1525 foreach ($this->govattrs as $val){
1527 if (in_array($val, $skip)){
1528 continue;
1529 }
1531 if (isset($this->attrs["$val"][0])){
1533 /* If attribute is set, replace dynamic parts:
1534 %sn, %givenName and %uid. Fill these in our local variables. */
1535 $value= $this->attrs["$val"][0];
1537 foreach (array("sn", "givenName", "uid") as $repl){
1538 if (preg_match("/%$repl/i", $value)){
1539 $value= preg_replace ("/%$repl/i",
1540 $this->parent->$repl, $value);
1541 }
1542 }
1543 $this->$val= $value;
1544 }
1545 }
1546 }
1548 /* Get back uid/sn/givenName - only write if nothing's skipped */
1549 if ($this->parent !== NULL && count($skip) == 0){
1550 $this->uid= $this->parent->uid;
1551 $this->sn= $this->parent->sn;
1552 $this->givenName= $this->parent->givenName;
1553 }
1555 if ($this->dateOfBirth) {
1556 /* This entry is ISO 8601 conform */
1557 list($year, $month, $day)= explode("-", $this->dateOfBirth, 3);
1559 #TODO: use $lang to convert date
1560 $this->dateOfBirth= "$day.$month.$year";
1561 }
1562 }
1565 /* This avoids that users move themselves out of their rights.
1566 */
1567 function allowedBasesToMoveTo()
1568 {
1569 /* Get bases */
1570 $bases = $this->get_allowed_bases();
1571 return($bases);
1572 }
1575 function getCopyDialog()
1576 {
1577 $str = "";
1579 session::set('binary',$this->photoData);
1580 session::set('binarytype',"image/jpeg");
1582 /* Get random number for pictures */
1583 srand((double)microtime()*1000000);
1584 $rand = rand(0, 10000);
1586 $smarty = get_smarty();
1588 $smarty->assign("passwordTodo","clear");
1590 if(isset($_POST['passwordTodo'])){
1591 $smarty->assign("passwordTodo",$_POST['passwordTodo']);
1592 }
1594 $smarty->assign("sn", $this->sn);
1595 $smarty->assign("givenName",$this->givenName);
1596 $smarty->assign("uid", $this->uid);
1597 $smarty->assign("rand", $rand);
1598 $str = $smarty->fetch(get_template_path("paste_generic.tpl",TRUE,dirname(__FILE__)));
1601 $ret = array();
1602 $ret['string'] = $str;
1603 $ret['status'] = "";
1604 return($ret);
1605 }
1607 function saveCopyDialog()
1608 {
1609 /* Set_acl_base */
1610 $this->set_acl_base($this->base);
1612 if((isset($_FILES['picture_file']['tmp_name'])) && ($_FILES['picture_file']['size'] > 0)){
1613 $this->set_picture($_FILES['picture_file']['tmp_name']);
1614 }
1616 /* Remove picture? */
1617 if (isset($_POST['picture_remove'])){
1618 $this->jpegPhoto= "*removed*";
1619 $this->set_picture ("./plugins/users/images/default.jpg");
1620 $this->is_modified= TRUE;
1621 }
1623 $attrs = array("uid","givenName","sn");
1624 foreach($attrs as $attr){
1625 if(isset($_POST[$attr])){
1626 $this->$attr = $_POST[$attr];
1627 }
1628 }
1629 }
1632 function PrepareForCopyPaste($source)
1633 {
1634 plugin::PrepareForCopyPaste($source);
1636 /* Reset certificate information addepted from source user
1637 to avoid setting the same user certificate for the destination user. */
1638 $this->userPKCS12= "";
1639 $this->userSMIMECertificate= "";
1640 $this->userCertificate= "";
1641 $this->certificateSerialNumber= "";
1642 $this->old_certificateSerialNumber= "";
1643 $this->old_userPKCS12= "";
1644 $this->old_userSMIMECertificate= "";
1645 $this->old_userCertificate= "";
1646 }
1649 static function plInfo()
1650 {
1652 $govattrs= array(
1653 "gouvernmentOrganizationalUnit" => _("Unit"),
1654 "houseIdentifier" => _("House identifier"),
1655 "vocation" => _("Vocation"),
1656 "ivbbLastDeliveryCollective" => _("Last delivery"),
1657 "gouvernmentOrganizationalPersonLocality" => _("Person locality"),
1658 "gouvernmentOrganizationalUnitDescription" => _("Unit description"),
1659 "gouvernmentOrganizationalUnitSubjectArea" => _("Subject area"),
1660 "functionalTitle" => _("Functional title"),
1661 "certificateSerialNumber" => _("Certificate serial number"),
1662 "publicVisible" => _("Public visible"),
1663 "street" => _("Street"),
1664 "role" => _("Role"),
1665 "postalCode" => _("Postal code"));
1667 $ret = array(
1668 "plShortName" => _("Generic"),
1669 "plDescription" => _("Generic user settings"),
1670 "plSelfModify" => TRUE,
1671 "plDepends" => array(),
1672 "plPriority" => 1,
1673 "plSection" => array("personal" => _("My account")),
1674 "plCategory" => array("users" => array("description" => _("Users"),
1675 "objectClass" => "gosaAccount")),
1677 "plProvidedAcls" => array(
1679 "sn" => _("Surname"),
1680 "givenName" => _("Given name"),
1681 "uid" => _("User identification"),
1683 "gosaUserDefinedFilter" => _("Allow to define user filters"),
1685 "personalTitle" => _("Personal title"),
1686 "academicTitle" => _("Academic title"),
1688 "dateOfBirth" => _("Date of birth"),
1689 "gender" => _("Sex"),
1690 "preferredLanguage" => _("Preferred language"),
1691 "base" => _("Base"),
1693 "userPicture" => _("User picture"),
1695 "gosaLoginRestriction" => _("Login restrictions"),
1697 "o" => _("Organization"),
1698 "ou" => _("Department"),
1699 "departmentNumber" => _("Department number"),
1700 "manager" => _("Manager"),
1701 "employeeNumber" => _("Employee number"),
1702 "employeeType" => _("Employee type"),
1704 "roomNumber" => _("Room number"),
1705 "telephoneNumber" => _("Telefon number"),
1706 "pager" => _("Pager number"),
1707 "mobile" => _("Mobile number"),
1708 "facsimileTelephoneNumber" => _("Fax number"),
1710 "st" => _("State"),
1711 "l" => _("Location"),
1712 "postalAddress" => _("Postal address"),
1714 "homePostalAddress" => _("Home postal address"),
1715 "homePhone" => _("Home phone number"),
1716 "labeledURI" => _("Homepage"),
1717 "userPassword" => _("User password method"),
1718 "Certificate" => _("User certificates"))
1720 );
1722 /* Append government attributes if required */
1723 global $config;
1724 if($config->get_cfg_value("honourIvbbAttributes") == "true"){
1725 foreach($govattrs as $attr => $desc){
1726 $ret["plProvidedAcls"][$attr] = $desc;
1727 }
1728 }
1729 return($ret);
1730 }
1732 function get_multi_edit_values()
1733 {
1734 $ret = plugin::get_multi_edit_values();
1735 if(in_array("pw_storage",$this->multi_boxes)){
1736 $ret['pw_storage'] = $this->pw_storage;
1737 }
1738 if(in_array("edit_picture",$this->multi_boxes)){
1739 $ret['jpegPhoto'] = $this->jpegPhoto;
1740 $ret['photoData'] = $this->photoData;
1741 $ret['old_jpegPhoto'] = $this->old_jpegPhoto;
1742 $ret['old_photoData'] = $this->old_photoData;
1743 }
1744 if(isset($ret['dateOfBirth'])){
1745 unset($ret['dateOfBirth']);
1746 }
1747 if(isset($ret['cn'])){
1748 unset($ret['cn']);
1749 }
1750 $ret['is_modified'] = $this->is_modified;
1751 if(in_array("base",$this->multi_boxes)){
1752 $ret['orig_base']="Changed_by_Multi_Plug";
1753 $ret['base']=$this->base;
1754 }
1756 $ret['gosaLoginRestriction'] = $this->gosaLoginRestriction;
1757 $ret['gosaLoginRestriction_some'] = $this->gosaLoginRestriction_some;
1759 return($ret);
1760 }
1763 function multiple_save_object()
1764 {
1766 if(!isset($_POST['user_mulitple_edit'])) return;
1768 plugin::multiple_save_object();
1770 /* Get pw_storage mode */
1771 if (isset($_POST['pw_storage'])){
1772 foreach(array("pw_storage") as $val){
1773 if(isset($_POST[$val])){
1774 $data= validate(get_post($val));
1775 if ($data != $this->$val){
1776 $this->is_modified= TRUE;
1777 }
1778 $this->$val= $data;
1779 }
1780 }
1781 }
1783 /* Refresh base */
1784 if ($this->acl_is_moveable($this->base)){
1785 if (!$this->baseSelector->update()) {
1786 msg_dialog::display(_("Error"), msgPool::permMove(), ERROR_DIALOG);
1787 }
1788 if ($this->base != $this->baseSelector->getBase()) {
1789 $this->base= $this->baseSelector->getBase();
1790 }
1791 }
1793 if(isset($_POST['user_mulitple_edit'])){
1794 foreach(array("base","pw_storage","edit_picture") as $val){
1795 if(isset($_POST["use_".$val])){
1796 $this->multi_boxes[] = $val;
1797 }
1798 }
1799 }
1801 /* Sync lists */
1802 $this->gosaLoginRestrictionWidget->save_object();
1803 if ($this->gosaLoginRestrictionWidget->isModified()) {
1804 $this->gosaLoginRestriction= array_values($this->gosaLoginRestrictionWidget->getMaintainedData());
1805 }
1806 }
1809 function multiple_check()
1810 {
1811 /* Call check() to set new_dn correctly ... */
1812 $message = plugin::multiple_check();
1814 /* Set the new acl base */
1815 if($this->dn == "new") {
1816 $this->set_acl_base($this->base);
1817 }
1818 if (!tests::is_url($this->labeledURI) && in_array("labeledURI",$this->multi_boxes)){
1819 $message[]= msgPool::invalid(_("Homepage"));
1820 }
1821 if (!tests::is_phone_nr($this->telephoneNumber) && in_array("telephoneNumber",$this->multi_boxes)){
1822 $message[]= msgPool::invalid(_("Phone"), $this->telephoneNumber, "/[\/0-9 ()+*-]/");
1823 }
1824 if (!tests::is_phone_nr($this->facsimileTelephoneNumber) && in_array("facsimileTelephoneNumber",$this->multi_boxes)){
1825 $message[]= msgPool::invalid(_("Fax"), $this->facsimileTelephoneNumber, "/[\/0-9 ()+*-]/");
1826 }
1827 if (!tests::is_phone_nr($this->mobile) && in_array("mobile",$this->multi_boxes)){
1828 $message[]= msgPool::invalid(_("Mobile"), $this->mobile, "/[\/0-9 ()+*-]/");
1829 }
1830 if (!tests::is_phone_nr($this->pager) && in_array("pager",$this->multi_boxes)){
1831 $message[]= msgPool::invalid(_("Pager"), $this->pager, "/[\/0-9 ()+*-]/");
1832 }
1833 if (preg_match ('/[,+"?\'()=<>;\\\\]/', $this->givenName) && in_array("givenName",$this->multi_boxes)){
1834 $message[]= msgPool::invalid(_("Given name"), $this->giveName, '/[^,+"?\'()=<>;\\\\]/');
1835 }
1836 if (preg_match ('/[,+"?\'()=<>;\\\\]/', $this->sn) && in_array("sn",$this->multi_boxes)){
1837 $message[]= msgPool::invalid(_("Name"), $this->sn, '/[^,+"?\'()=<>;\\\\]/');
1838 }
1839 return($message);
1840 }
1844 function multiple_execute()
1845 {
1846 return($this->execute());
1847 }
1850 /*! \brief Prepares the plugin to be used for multiple edit
1851 * Update plugin attributes with given array of attribtues.
1852 * \param array Array with attributes that must be updated.
1853 */
1854 function init_multiple_support($attrs,$all)
1855 {
1856 plugin::init_multiple_support($attrs,$all);
1858 // Get login restrictions
1859 if(isset($attrs['gosaLoginRestriction'])){
1860 $this->gosaLoginRestriction =array();
1861 for($i =0;$i < $attrs['gosaLoginRestriction']['count']; $i++){
1862 $this->gosaLoginRestriction[] = $attrs['gosaLoginRestriction'][$i];
1863 }
1864 }
1866 // Detect the managers name
1867 $this->manager_name = "";
1868 $ldap = $this->config->get_ldap_link();
1869 if(!empty($this->manager)){
1870 $ldap->cat($this->manager, array('cn'));
1871 if($ldap->count()){
1872 $attrs = $ldap->fetch();
1873 $this->manager_name = $attrs['cn'][0];
1874 }else{
1875 $this->manager_name = "("._("Unknown")."!): ".$this->manager;
1876 }
1877 }
1879 // Detect login restriction not used in all user objects.
1880 $this->gosaLoginRestriction_some = array();
1881 if(isset($all['gosaLoginRestriction'])){
1882 for($i=0;$i<$all['gosaLoginRestriction']['count'];$i++){
1883 $this->gosaLoginRestriction_some[] = $all['gosaLoginRestriction'][$i];
1884 }
1885 }
1888 // Reinit the login restriction list.
1889 $data = $this->convertLoginRestriction();
1890 if(count($data)){
1891 $this->gosaLoginRestrictionWidget->setListData($data['data'], $data['displayData']);
1892 }
1893 }
1896 function set_multi_edit_values($attrs)
1897 {
1898 $lR = array();
1900 // Update loginRestrictions, keep my settings while ip is optional
1901 foreach($attrs['gosaLoginRestriction_some'] as $ip){
1902 if(in_array($ip, $this->gosaLoginRestriction) && in_array($ip, $attrs['gosaLoginRestriction'])){
1903 $lR[] = $ip;
1904 }
1905 }
1907 // Add enforced loginRestrictions
1908 foreach($attrs['gosaLoginRestriction'] as $ip){
1909 $lR[] = $ip;
1910 }
1912 $lR = array_values(array_unique($lR));
1913 $this->is_modified |= array_differs($this->gosaLoginRestriction, $lR);
1914 plugin::set_multi_edit_values($attrs);
1915 $this->gosaLoginRestriction = $lR;
1916 }
1919 function convertLoginRestriction()
1920 {
1921 $all = array_unique(array_merge($this->gosaLoginRestriction,$this->gosaLoginRestriction_some));
1922 $data = array();
1923 foreach($all as $ip){
1924 $data['data'][] = $ip;
1925 if(!in_array($ip, $this->gosaLoginRestriction)){
1926 $data['displayData'][] = array('mode' => LIST_MARKED , 'data' => array($ip.' ('._("Entries differ").')'));
1927 }else{
1928 $data['displayData'][] = array('mode' => 0 , 'data' => array($ip));
1929 }
1930 }
1931 return($data);
1932 }
1933 }
1935 // vim:tabstop=2:expandtab:shiftwidth=2:filetype=php:syntax:ruler:
1936 ?>