Code

f7ce3a5cac2e9c059672549a75ad95e2ade97442
[gosa.git] / plugins / personal / posix / class_posixAccount.inc
1 <?php
2 /*!
3   \brief   posixAccount plugin
4   \author  Cajus Pollmeier <pollmeier@gonicus.de>
5   \version 2.00
6   \date    24.07.2003
8   This class provides the functionality to read and write all attributes
9   relevant for posixAccounts and shadowAccounts from/to the LDAP. It
10   does syntax checking and displays the formulars required.
11  */
13 class posixAccount extends plugin
14 {
15   /* Definitions */
16   var $plHeadline= "UNIX";
17   var $plDescription= "This does something";
19   /* CLI vars */
20   var $cli_summary= "Manage users posix account";
21   var $cli_description= "Some longer text\nfor help";
22   var $cli_parameters= array("eins" => "Eins ist toll", "zwei" => "Zwei ist noch besser");
24   /* Plugin specific values */
25   var $homeDirectory= "";
26   var $loginShell= "/bin/bash";
27   var $uidNumber= "";
28   var $gidNumber= "";
29   var $gecos= "";
30   var $shadowMin= "0";
31   var $shadowMax= "0";
32   var $shadowWarning= "0";
33   var $shadowLastChange= "0";
34   var $shadowInactive= "0";
35   var $shadowExpire= "0";
36   var $gosaDefaultPrinter= "";
37   var $gosaDefaultLanguage= "";
38   var $accessTo= array();
39   var $trustModel= "";
41   var $status= "";
42   var $loginShellList= array();
43   var $groupMembership= array();
44   var $savedGroupMembership= array();
45   var $savedUidNumber= "";
46   var $savedGidNumber= "";
47   var $use_shadowMin= "0";
48   var $use_shadowMax= "0";
49   var $use_shadowWarning= "0";
50   var $use_shadowInactive= "0";
51   var $use_shadowExpire= "0";
52   var $must_change_password= "0";
53   var $force_ids= 0;
54   var $printerList= array();
55   var $group_dialog= FALSE;
56   var $show_ws_dialog= FALSE;
57   var $secondaryGroups= array();
58   var $primaryGroup= 0;
59   var $was_trust_account= FALSE;
62   /* attribute list for save action */
63   var $attributes= array("homeDirectory", "loginShell", "uidNumber", "gidNumber", "gecos",
64       "shadowMin", "shadowMax", "shadowWarning", "shadowInactive", "shadowLastChange",
65       "shadowExpire", "gosaDefaultPrinter", "gosaDefaultLanguage", "uid");
66   var $objectclasses= array("posixAccount", "shadowAccount");
69   /* constructor, if 'dn' is set, the node loads the given
70      'dn' from LDAP */
71   function posixAccount ($config, $dn= NULL)
72   {
73     /* Configuration is fine, allways */
74     $this->config= $config;
76     /* Load bases attributes */
77     plugin::plugin($config, $dn);
79     $ldap= $this->config->get_ldap_link();
81     if ($dn != NULL){
83       /* Correct is_account. shadowAccount is not required. */
84       if (isset($this->attrs['objectClass']) &&
85           in_array ('posixAccount', $this->attrs['objectClass'])){
87         $this->is_account= TRUE;
88       }
90       /* Is this account a trustAccount? */
91       if ($this->is_account && isset($this->attrs['trustModel'])){
92         $this->trustModel= $this->attrs['trustModel'][0];
93         $this->was_trust_account= TRUE;
94       } else {
95         $this->was_trust_account= FALSE;
96         $this->trustModel= "";
97       }
98       if ($this->is_account && isset($this->attrs['accessTo'])){
99         for ($i= 0; $i<$this->attrs['accessTo']['count']; $i++){
100           $tmp= $this->attrs['accessTo'][$i];
101           $this->accessTo[$tmp]= $tmp;
102         }
103       }
104       $this->initially_was_account= $this->is_account;
106       /* Fill group */
107       $this->primaryGroup= $this->gidNumber;
109       /* Generate status text */
110       $current= date("U");
111       if (($current >= $this->shadowExpire) && $this->shadowExpire){
112         $this->status= "expired";
113         if (($this->shadowExpire - $current) < $this->shadowInactive){
114           $this->status.= ", grace time active";
115         }
116       } elseif (($this->shadowLastChange + $this->shadowMin) >= $current){
117         $this->status= "active, password not changable";
118       } elseif (($this->shadowLastChange + $this->shadowMax) >= $current){
119         $this->status= "active, password expired";
120       } else {
121         $this->status= "active";
122       }
124       /* Get group membership */
125       $ldap->cd($this->config->current['BASE']);
126       $ldap->search("(&(objectClass=posixGroup)(memberUid=".$this->uid."))", array("cn", "description"));
128       while ($this->attrs= $ldap->fetch()){
129         if (!isset($this->attrs["description"][0])){
130           $entry= $this->attrs["cn"][0];
131         } else {
132           $dsc= preg_replace ('/^Group of user/', _("Group of user"), $this->attrs["description"][0]);
133           $entry= $this->attrs["cn"][0]." [$dsc]";
134         }
135         $this->groupMembership[$ldap->getDN()]= $entry;
136       }
137       asort($this->groupMembership);
138       reset($this->groupMembership);
139       $this->savedGroupMembership= $this->groupMembership;
140       $this->savedUidNumber= $this->uidNumber;
141       $this->savedGidNumber= $this->gidNumber;
142     }
144     /* Adjust shadow checkboxes */
145     foreach (array("shadowMin", "shadowMax", "shadowWarning", "shadowInactive",
146           "shadowExpire") as $val){
148       if ($this->$val != 0){
149         $oval= "use_".$val;
150         $this->$oval= "1";
151       }
152     }
154     /* Convert to seconds */
155     if ($this->shadowExpire != 0){
156       $this->shadowExpire*= 60 * 60 * 24;
157     } else {
158       $date= getdate();
159       $this->shadowExpire= floor($date[0] / (60*60*24)) * 60 * 60 * 24;
160     }
162     /* Generate shell list from /etc/gosa/shells */
163     if (file_exists('/etc/gosa/shells')){
164       $shells = file ('/etc/gosa/shells');
165       foreach ($shells as $line){
166         if (!preg_match ("/^#/", $line)){
167           $this->loginShellList[]= trim($line);
168         }
169       }
170     } else {
171       if ($this->loginShell == ""){
172         $this->loginShellList[]= _("unconfigured");
173       }
174     }
176     /* Insert possibly missing loginShell */
177     if ($this->loginShell != "" && !in_array($this->loginShell, $this->loginShellList)){
178       $this->loginShellList[]= $this->loginShell;
179     }
181     /* Generate printer list */
182     if (isset($this->config->data['SERVERS']['CUPS'])){
183       $this->printerList= get_printer_list ($this->config->data['SERVERS']['CUPS']);
184       asort($this->printerList);
185     }
187     /* Generate group list */
188     $ldap->cd($this->config->current['BASE']);
189     $ldap->search("(objectClass=posixGroup)", array("cn", "gidNumber"));
190     $this->secondaryGroups[]= "- "._("automatic")." -";
191     while ($attrs= $ldap->fetch()){
192       $this->secondaryGroups[$attrs['gidNumber'][0]]= $attrs['cn'][0];
193     }
194     asort ($this->secondaryGroups);
196     /* Get global filter config */
197     if (!is_global("sysfilter")){
198       $ui= get_userinfo();
199       $base= get_base_from_people($ui->dn);
200       $sysfilter= array( "depselect"       => $base,
201           "regex"           => "*");
202       register_global("sysfilter", $sysfilter);
203     }
204   }
207   /* execute generates the html output for this node */
208   function execute()
209   {
210     /* Do we need to flip is_account state? */
211     if (isset($_POST['modify_state'])){
212       $this->is_account= !$this->is_account;
213     }
215     /* Do we represent a valid posixAccount? */
216     if (!$this->is_account && $this->parent == NULL ){
217       $display= "<img src=\"images/stop.png\" align=center>&nbsp;<b>".
218         _("This account has no unix extensions.")."</b>";
219       $display.= back_to_main();
220       return ($display);
221     }
223     $display= "";
225     /* Show tab dialog headers */
226     if ($this->parent != NULL){
227       if ($this->is_account){
228         if (isset($this->parent->by_object['sambaAccount'])){
229           $obj= $this->parent->by_object['sambaAccount'];
230         }
231         if (isset($obj) && $obj->is_account == TRUE &&
232             isset($this->parent->by_object['sambaAccount'])){
234           /* Samba3 dependency on posix accounts are enabled
235              in the moment, because I need to rely on unique
236              uidNumbers. There'll be a better solution later
237              on. */
238           $display= $this->show_header(_("Remove posix account"),
239               _("This account has unix features enabled. To disable them, you'll need to remove the samba account first."), TRUE);
240         } else {
241           $display= $this->show_header(_("Remove posix account"),
242               _("This account has posix features enabled. You can disable them by clicking below."));
243         }
244       } else {
245         $display= $this->show_header(_("Create posix account"),
246             _("This account has posix features disabled. You can enable them by clicking below."));
247         return($display);
248       }
249     }
251     /* Trigger group edit? */
252     if (isset($_POST['edit_groupmembership'])){
253       $this->group_dialog= TRUE;
254       $this->dialog= TRUE;
255     }
257     /* Cancel group edit? */
258     if (isset($_POST['add_groups_cancel']) ||
259         isset($_POST['add_groups_finish'])){
260       $this->group_dialog= FALSE;
261       $this->dialog= FALSE;
262     }
264     /* Add selected groups */
265     if (isset($_POST['add_groups_finish']) && isset($_POST['groups']) &&
266         count($_POST['groups'])){
268       if (chkacl ($this->acl, "memberUid") == ""){
269         $this->addGroup ($_POST['groups']);
270         $this->is_modified= TRUE;
271       }
272     }
274     /* Delete selected groups */
275     if (isset($_POST['delete_groupmembership']) && 
276         isset($_POST['group_list']) && count($_POST['group_list'])){
278       if (chkacl ($this->acl, "memberUid") == ""){
279         $this->delGroup ($_POST['group_list']);
280         $this->is_modified= TRUE;
281       }
282     }
284     /* Add user workstation? */
285     if (isset($_POST["add_ws"])){
286       $this->show_ws_dialog= TRUE;
287       $this->dialog= TRUE;
288     }
290     /* Add user workstation? */
291     if (isset($_POST["add_ws_finish"]) && isset($_POST['wslist'])){
292       foreach($_POST['wslist'] as $ws){
293         $this->accessTo[$ws]= $ws;
294       }
295       ksort($this->accessTo);
296       $this->is_modified= TRUE;
297     }
299     /* Remove user workstations? */
300     if (isset($_POST["delete_ws"]) && isset($_POST['workstation_list'])){
301       foreach($_POST['workstation_list'] as $name){
302         unset ($this->accessTo[$name]);
303       }
304       $this->is_modified= TRUE;
305     }
307     /* Add user workstation finished? */
308     if (isset($_POST["add_ws_finish"]) || isset($_POST["add_ws_cancel"])){
309       $this->show_ws_dialog= FALSE;
310       $this->dialog= FALSE;
311     }
313     /* Templates now! */
314     $smarty= get_smarty();
316     /* Show ws dialog */
317     if ($this->show_ws_dialog){
318       /* Save data */
319       $sysfilter= get_global("sysfilter");
320       foreach( array("depselect", "regex") as $type){
321         if (isset($_POST[$type])){
322           $sysfilter[$type]= $_POST[$type];
323         }
324       }
325       if (isset($_GET['search'])){
326         $s= mb_substr($_GET['search'], 0, 1, "UTF8")."*";
327         if ($s == "**"){
328           $s= "*";
329         }
330         $sysfilter['regex']= $s;
331       }
332       register_global("sysfilter", $sysfilter);
334       /* Get workstation list */
335       $exclude= "";
336       foreach($this->accessTo as $ws){
337         $exclude.= "(cn=$ws)";
338       }
339       if ($exclude != ""){
340         $exclude= "(!(|$exclude))";
341       }
342       $acl= array($this->config->current['BASE'] => ":all");
343       $regex= $sysfilter['regex'];
344       $filter= "(&(|(objectClass=goServer)(objectClass=gotoWorkstation)(objectClass=gotoTerminal))$exclude(cn=*)(cn=$regex))";
345       $res= get_list($acl, "$filter", TRUE, $sysfilter['depselect'], array("cn"), TRUE);
346       $wslist= array();
347       foreach ($res as $attrs){
348         $wslist[]= preg_replace('/\$/', '', $attrs['cn'][0]);
349       }
350       asort($wslist);
351       $smarty->assign("search_image", get_template_path('images/search.png'));
352       $smarty->assign("launchimage", get_template_path('images/small_filter.png'));
353       $smarty->assign("tree_image", get_template_path('images/tree.png'));
354       $smarty->assign("deplist", $this->config->idepartments);
355       $smarty->assign("alphabet", generate_alphabet());
356       foreach( array("depselect", "regex") as $type){
357         $smarty->assign("$type", $sysfilter[$type]);
358       }
359       $smarty->assign("hint", print_sizelimit_warning());
360       $smarty->assign("wslist", $wslist);
361       $smarty->assign("apply", apply_filter());
362       $display= $smarty->fetch (get_template_path('trust_machines.tpl', TRUE, dirname(__FILE__)));
363       return ($display);
364     }
366     /* Manage group add dialog */
367     if ($this->group_dialog){
368       $gd= new groupManagement($this->config, get_userinfo());
370       /* Save data */
371       $groupfilter= get_global("groupfilter");
372       foreach( array("depselect", "guser", "regex") as $type){
373         if (isset($_POST[$type])){
374           $groupfilter[$type]= $_POST[$type];
375         }
376       }
377       if (isset($_POST['depselect'])){
378         foreach( array("primarygroups", "sambagroups", "mailgroups", "appgroups",
379               "functionalgroups") as $type){
381           if (isset($_POST[$type])) {
382             $groupfilter[$type]= "checked";
383           } else {
384             $groupfilter[$type]= "";
385           }
386         }
387       }
388       if (isset($_GET['search'])){
389         $s= mb_substr($_GET['search'], 0, 1, "UTF8")."*";
390         if ($s == "**"){
391           $s= "*";
392         }
393         $groupfilter['regex']= $s;
394       }
395       register_global("groupfilter", $groupfilter);
397       /* Calculate actual groups */
398       $gd->reload();
399       $glist= array();
400       foreach ($gd->grouplist as $key => $value){
401         if (!isset($this->groupMembership[$key])){
402           $glist[$key]= $value;
403         }
404       }
406       /* Show dialog */
407       $smarty->assign("groups", $glist);
408       $smarty->assign("search_image", get_template_path('images/search.png'));
409       $smarty->assign("launchimage", get_template_path('images/small_filter.png'));
410       $smarty->assign("tree_image", get_template_path('images/tree.png'));
411       $smarty->assign("deplist", $this->config->idepartments);
412       $smarty->assign("alphabet", generate_alphabet());
413       foreach( array("depselect", "guser", "regex", "primarygroups", "mailgroups",
414             "appgroups", "sambagroups", "functionalgroups") as $type){
415         $smarty->assign("$type", $groupfilter[$type]);
416       }
417       $smarty->assign("hint", print_sizelimit_warning());
419       $smarty->assign("apply", apply_filter());
420       $display.= $smarty->fetch (get_template_path('posix_groups.tpl', TRUE, dirname(__FILE__)));
421       return ($display);
422     }
424     /* Show main page */
425     $smarty= get_smarty();
427     /* Depending on pwmode, currently hardcoded because there are no other methods */
428     if ( 1 == 1 ){
429       $smarty->assign("pwmode", dirname(__FILE__)."/posix_shadow");
430       $shadowMinACL= chkacl($this->acl, "shadowMin");
431       $smarty->assign("shadowmins", sprintf(_("Password can't be changed up to %s days after last change"), "<input name=\"shadowMin\" size=3 maxlength=4 $shadowMinACL value=\"".$this->shadowMin."\">"));
432       $shadowMaxACL= chkacl($this->acl, "shadowMax");
433       $smarty->assign("shadowmaxs", sprintf(_("Password must be changed after %s days"), "<input name=\"shadowMax\" size=3 maxlength=4 $shadowMaxACL value=\"".$this->shadowMax."\">"));
434       $shadowInactiveACL= chkacl($this->acl, "shadowInactive");
435       $smarty->assign("shadowinactives", sprintf(_("Disable account after %s days of inactivity after password expiery"), "<input name=\"shadowInactive\" size=3 maxlength=4 $shadowInactiveACL value=\"".$this->shadowInactive."\">"));
436       $shadowWarningACL= chkacl($this->acl, "shadowWarning");
437       $smarty->assign("shadowwarnings", sprintf(_("Warn user %s days before password expiery"), "<input name=\"shadowWarning\" size=3 maxlength=4 $shadowWarningACL value=\"".$this->shadowWarning."\">"));
438       foreach( array("must_change_password", "use_shadowMin", "use_shadowMax",
439             "use_shadowExpire", "use_shadowInactive",
440             "use_shadowWarning") as $val){
441         if ($this->$val == 1){
442           $smarty->assign("$val", "checked");
443         } else {
444           $smarty->assign("$val", "");
445         }
446         $smarty->assign("$val"."ACL", chkacl($this->acl, $val));
447       }
448     }
450     /* Fill calendar */
451     $date= getdate($this->shadowExpire);
453     $days= array();
454     for($d= 1; $d<32; $d++){
455       $days[$d]= $d;
456     }
457     $years= array();
458     for($y= $date['year']-10; $y<$date['year']+10; $y++){
459       $years[]= $y;
460     }
461     $months= array(_("January"), _("February"), _("March"), _("April"),
462         _("May"), _("June"), _("July"), _("August"), _("September"),
463         _("October"), _("November"), _("December"));
464     $smarty->assign("day", $date["mday"]);
465     $smarty->assign("days", $days);
466     $smarty->assign("months", $months);
467     $smarty->assign("month", $date["mon"]-1);
468     $smarty->assign("years", $years);
469     $smarty->assign("year", $date["year"]);
471     /* Fill arrays */
472     $smarty->assign("shells", $this->loginShellList);
473     $smarty->assign("secondaryGroups", $this->secondaryGroups);
474     $smarty->assign("primaryGroup", $this->primaryGroup);
475     $smarty->assign("groupMembership", $this->groupMembership);
476     if (count($this->groupMembership) > 16){
477       $smarty->assign("groups", "too_many_for_nfs");
478     } else {
479       $smarty->assign("groups", "");
480     }
481     $smarty->assign("printerList", $this->printerList);
482     $smarty->assign("languages", $this->config->data['MAIN']['LANGUAGES']);
484     /* Checkboxes */
485     if ($this->force_ids == 1){
486       $smarty->assign("force_ids", "checked");
487     } else {
488       if ($_SESSION["js"]){
489         $smarty->assign("forceMode", "disabled");
490       }
491       $smarty->assign("force_ids", "");
492     }
493     $smarty->assign("force_idsACL", chkacl($this->acl, "force_ids"));
495     /* Load attributes and acl's */
496     foreach($this->attributes as $val){
497       if(($_SESSION["js"])&&(($val=="uidNumber")||($val=="gidNumber")))
498         {
499           $smarty->assign("$val"."ACL","");
500           $smarty->assign("$val", $this->$val);
501           continue;
502         }
503       $smarty->assign("$val", $this->$val);
504       $smarty->assign("$val"."ACL", chkacl($this->acl,$val));
505     }
506     $smarty->assign("groupMembershipACL", chkacl($this->acl, "groupMembership"));
507     $smarty->assign("status", $this->status);
509     /* Work on trust modes */
510     $smarty->assign("trustmodeACL", chkacl($this->acl, "trustmode"));
511     if ($this->trustModel == "fullaccess"){
512       $trustmode= 1;
513       // pervent double disable tag in html code, this will disturb our clean w3c html
514     
515     if(chkacl($this->acl, "trustmode")!="disabled"){
516           $smarty->assign("trusthide", "disabled");
517       }else{
518           $smarty->assign("trusthide", "");
519       }
521     } elseif ($this->trustModel == "byhost"){
522       $trustmode= 2;
523       $smarty->assign("trusthide", "");
524     } else {
525       // pervent double disable tag in html code, this will disturb our clean w3c html
526       if(chkacl($this->acl, "trustmode")==""){
527           $smarty->assign("trusthide", "disabled");
528       }else{
529           $smarty->assign("trusthide", "");
530       }
531       $trustmode= 0;
532     }
533     $smarty->assign("trustmode", $trustmode);
534     $smarty->assign("trustmodes", array( 0 => _("disabled"), 1 => _("full access"),
535           2 => _("allow access to these hosts")));
536     $smarty->assign("workstations", $this->accessTo);
538     $smarty->assign("apply", apply_filter());
539     $display.= $smarty->fetch (get_template_path('generic.tpl', TRUE, dirname(__FILE__)));
540     return($display);
541   }
544   /* remove object from parent */
545   function remove_from_parent()
546   {
547     /* Cancel if there's nothing to do here */
548     if (!$this->initially_was_account){
549       return;
550     }
551     
552     /* include global link_info */
553     $ldap= $this->config->get_ldap_link();
555     /* Remove and write to LDAP */
556     plugin::remove_from_parent();
558     /* Zero out array */
559     $this->attrs['gosaHostACL']= array();
561     /* Keep uid, because we need it for authentification! */
562     unset($this->attrs['uid']);
564     @DEBUG (DEBUG_LDAP, __LINE__, __FUNCTION__, __FILE__,
565         $this->attributes, "Save");
566     $ldap->cd($this->dn);
567     $ldap->modify($this->attrs);
568     show_ldap_error($ldap->get_error());
570     /* Delete group only if cn is uid and there are no other
571        members inside */
572     $ldap->cd ($this->config->current['BASE']);
573     $ldap->search ("(&(objectClass=posixGroup)(gidNumber=".$this->gidNumber."))", array("cn", "memberUid"));
574     if ($ldap->count() != 0){
575       $attrs= $ldap->fetch();
576       if ($attrs['cn'][0] == $this->uid &&
577           !isset($this->attrs['memberUid'])){
579         $ldap->rmDir($ldap->getDN());
580       }
581     }
583     /* Optionally execute a command after we're done */
584     $this->handle_post_events("remove");
585   }
588   function save_object()
589   {
590     if (isset($_POST['posixTab'])){
591       /* Save values to object */
592       plugin::save_object();
594       /* Save force GID attribute */
595       if (chkacl ($this->acl, "force_ids") == ""){
596         if (isset ($_POST['force_ids'])){
597           $data= 1;
598         } else {
599           $data= 0;
600         }
601         if ($this->force_ids != $data){
602           $this->is_modified= TRUE;
603         }
604         $this->force_ids= $data;
606         $data= $_POST['primaryGroup'];
607         if ($this->primaryGroup != $data){
608           $this->is_modified= TRUE;
609         }
610         $this->primaryGroup= $_POST['primaryGroup'];
611       }
613       /* Save pwmode dependent attributes, curently hardcoded because there're
614          no alternatives */
615       if (1 == 1){
616         foreach( array("must_change_password", "use_shadowMin", "use_shadowMax",
617               "use_shadowExpire", "use_shadowInactive",
618               "use_shadowWarning") as $val){
619           if (chkacl($this->acl, "$val") == ""){
620             if (isset ($_POST[$val])){
621               $data= 1;
622             } else {
623               $data= 0;
624             }
625             if ($data != $this->$val){
626               $this->is_modified= TRUE;
627             }
628             $this->$val= $data;
629           }
630         }
631       }
633       /* Trust mode - special handling */
634       if (isset($_POST['trustmode'])){
635         $saved= $this->trustModel;
636         if ($_POST['trustmode'] == "1"){
637           $this->trustModel= "fullaccess";
638         } elseif ($_POST['trustmode'] == "2"){
639           $this->trustModel= "byhost";
640         } else {
641           $this->trustModel= "";
642         }
643         if ($this->trustModel != $saved){
644           $this->is_modified= TRUE;
645         }
646       }
647     }
648   }
651   /* Save data to LDAP, depending on is_account we save or delete */
652   function save()
653   {
654     /* include global link_info */
655     $ldap= $this->config->get_ldap_link();
657     /* Adapt shadow values */
658     if (!$this->use_shadowExpire){
659       $this->shadowExpire= "0";
660     } else {
661       /* Transform seconds to days here */
662       $this->shadowExpire= (int)($this->shadowExpire / (60 * 60 * 24)) + 1;
663     }
664     if (!$this->use_shadowMax){
665       $this->shadowMax= "0";
666     }
667     if ($this->must_change_password){
668       $this->shadowLastChange= (int)(date("U") / 86400) - $this->shadowMax - 1;
669     } else {
670       $this->shadowLastChange= (int)(date("U") / 86400);
671     }
672     if (!$this->use_shadowWarning){
673       $this->shadowWarning= "0";
674     }
676     /* Check what to do with ID's */
677     if ($this->force_ids == 0){
679       /* Use id's that are already set */
680       if ($this->savedUidNumber != ""){
681         $this->uidNumber= $this->savedUidNumber;
682         $this->gidNumber= $this->savedGidNumber;
683       } else {
685         /* Calculate new id's. We need to place a lock before calling get_next_id
686            to get real unique values. */
687         $wait= 10;
688         while (get_lock("uidnumber") != ""){
689           sleep (1);
691           /* Oups - timed out */
692           if ($wait-- == 0){
693             print_red (_("Failed: overriding lock"));
694             break;
695           }
696         }
698         add_lock ("uidnumber", "gosa");
699         $this->uidNumber= $this->get_next_id("uidNumber");
700         if ($this->savedGidNumber != ""){
701           $this->gidNumber= $this->savedGidNumber;
702         } else {
703           $this->gidNumber= $this->get_next_id("gidNumber");
704         }
705       }
707       if ($this->primaryGroup != 0){
708         $this->gidNumber= $this->primaryGroup;
709       }
710     }
712     if ($this->use_shadowMin != "1" ) {
713       $this->shadowMin = "";
714     }
716     if (($this->use_shadowMax != "1") && ($this->must_change_password != "1")) {
717       $this->shadowMax = "";
718     }
720     if ($this->use_shadowWarning != "1" ) {
721       $this->shadowWarning = "";
722     }
724     if ($this->use_shadowInactive != "1" ) {
725       $this->shadowInactive = "";
726     }
728     if ($this->use_shadowExpire != "1" ) {
729       $this->shadowExpire = "";
730     }
732     /* Call parents save to prepare $this->attrs */
733     plugin::save();
735     /* Fill gecos */
736     if (isset($this->parent) && $this->parent != NULL){
737       $this->gecos= $this->parent->by_object['user']->cn;
738     }
740     /* Trust accounts */
741     $objectclasses= array();
742     foreach ($this->attrs['objectClass'] as $key => $class){
743       if (preg_match('/trustAccount/i', $class)){
744         continue;
745       }
746       $objectclasses[]= $this->attrs['objectClass'][$key];
747     }
748     $this->attrs['objectClass']= $objectclasses;
749     if ($this->trustModel != ""){
750       $this->attrs['objectClass'][]= "trustAccount";
751       $this->attrs['trustModel']= $this->trustModel;
752       $this->attrs['accessTo']= array();
753       if ($this->trustModel == "byhost"){
754         foreach ($this->accessTo as $host){
755           $this->attrs['accessTo'][]= $host;
756         }
757       }
758     } else {
759       if ($this->was_trust_account){
760         $this->attrs['accessTo']= array();
761         $this->attrs['trustModel']= array();
762       }
763     }
765     /* Save data to LDAP */
766     $ldap->cd($this->dn);
767     $ldap->modify($this->attrs);
768     show_ldap_error($ldap->get_error());
770     /* Remove lock needed for unique id generation */
771     del_lock ("uidnumber");
774     /* Posix accounts have group interrelationship, take care about these here. */
775     if ($this->force_ids == 0 && $this->primaryGroup == 0){
776       $ldap->cd($this->config->current['BASE']);
777       $ldap->search("(&(objectClass=posixGroup)(gidNumber=".$this->gidNumber."))", array("cn"));
779       /* Create group if it doesn't exist */
780       if ($ldap->count() == 0){
781         $groupdn= preg_replace ('/^'.$this->config->current['DNMODE'].'=[^,]+,'.get_people_ou().'/i', 'cn='.$this->uid.','.get_groups_ou(), $this->dn);
783         $g= new group($this->config, $groupdn);
784         $g->cn= $this->uid;
785         $g->force_gid= 1;
786         $g->gidNumber= $this->gidNumber;
787         $g->description= "Group of user ".$this->givenName." ".$this->sn;
788         $g->save ();
789       }
790     }
792     /* Take care about groupMembership values: add to groups */
793     foreach ($this->groupMembership as $key => $value){
794       $g= new group($this->config, $key);
795       $g->addUser ($this->uid);
796       $g->save();
798       /* May need to save the mail part, too */
799       if ($g->has_mailAccount){
800         $m= new mailgroup($this->config, $key);
801         $m->save();
802       }
803     }
805     /* Remove from groups not listed in groupMembership */
806     foreach ($this->savedGroupMembership as $key => $value){
807       if (!array_key_exists ($key, $this->groupMembership)){
808         $g= new group($this->config, $key);
809         $g->removeUser ($this->uid);
810         $g->save();
812         /* May need to save the mail part, too */
813         if ($g->has_mailAccount){
814           $m= new mailgroup($this->config, $key);
815           $m->save();
816         }
817       }
818     }
820     /* Optionally execute a command after we're done */
821     if ($this->initially_was_account == $this->is_account){
822       if ($this->is_modified){
823         $this->handle_post_events("mofify");
824       }
825     } else {
826       $this->handle_post_events("add");
827     }
828   }
830   /* Check formular input */
831   function check()
832   {
833     /* Include global link_info */
834     $ldap= $this->config->get_ldap_link();
836     /* Reset message array */
837     $message= array();
839     /* must: homeDirectory */
840     if ($this->homeDirectory == ""){
841       $message[]= _("The required field 'Home directory' is not set.");
842     }
843     if (!is_path($this->homeDirectory)){
844       $message[]= _("Please enter a valid path in 'Home directory' field.");
845     }
847     /* Check ID's if they are forced by user */
848     if ($this->force_ids == "1"){
850       /* Valid uid/gid? */
851       if (!is_id($this->uidNumber)){
852         $message[]= _("Value specified as 'UID' is not valid.");
853       } else {
854         if ($this->uidNumber < $this->config->current['MINID']){
855           $message[]= _("Value specified as 'UID' is too small.");
856         }
857       }
858       if (!is_id($this->gidNumber)){
859         $message[]= _("Value specified as 'GID' is not valid.");
860       } else {
861         if ($this->gidNumber < $this->config->current['MINID']){
862           $message[]= _("Value specified as 'GID' is too small.");
863         }
864       }
866     }
868     /* Check shadow settings, well I like spaghetties... */
869     if ($this->use_shadowMin){
870       if (!is_id($this->shadowMin)){
871         $message[]= _("Value specified as 'shadowMin' is not valid.");
872       }
873     }
874     if ($this->use_shadowMax){
875       if (!is_id($this->shadowMax)){
876         $message[]= _("Value specified as 'shadowMax' is not valid.");
877       }
878     }
879     if ($this->use_shadowWarning){
880       if (!is_id($this->shadowWarning)){
881         $message[]= _("Value specified as 'shadowWarning' is not valid.");
882       }
883       if (!$this->use_shadowMax){
884         $message[]= _("'shadowWarning' without 'shadowMax' makes no sense.");
885       }
886       if ($this->shadowWarning > $this->shadowMax){
887         $message[]= _("Value specified as 'shadowWarning' should be smaller than 'shadowMax'.");
888       }
889       if ($this->use_shadowMin && $this->shadowWarning < $this->shadowMin){
890         $message[]= _("Value specified as 'shadowWarning' should be greater than 'shadowMin'.");
891       }
892     }
893     if ($this->use_shadowInactive){
894       if (!is_id($this->shadowInactive)){
895         $message[]= _("Value specified as 'shadowInactive' is not valid.");
896       }
897       if (!$this->use_shadowMax){
898         $message[]= _("'shadowInactive' without 'shadowMax' makes no sense.");
899       }
900     }
901     if ($this->use_shadowMin && $this->use_shadowMax){
902       if ($this->shadowMin > $this->shadowMax){
903         $message[]= _("Value specified as 'shadowMin' should be smaller than 'shadowMax'.");
904       }
905     }
907     return ($message);
908   }
911   /* Add posix user to some groups */
912   function addGroup ($groups)
913   {
914     /* include global link_info */
915     $ldap= $this->config->get_ldap_link();
917     /* Walk through groups and add the descriptive entry if not exists */
918     foreach ($groups as $value){
919       if (!array_key_exists($value, $this->groupMembership)){
920         $ldap->cat($value);
921         $attrs= $ldap->fetch();
922         error_reporting (0);
923         if (!isset($attrs['description'][0])){
924           $entry= $attrs["cn"][0];
925         } else {
926           $dsc= preg_replace ('/^Group of user/', _("Group of user"), $attrs["description"][0]);
927           $entry= $attrs["cn"][0]." [$dsc]";
928         }
929         error_reporting (E_ALL);
930         $this->groupMembership[$ldap->getDN()]= $entry;
931       }
932     }
934     /* Sort groups */
935     asort ($this->groupMembership);
936     reset ($this->groupMembership);
937   }
940   /* Del posix user from some groups */
941   function delGroup ($groups)
942   {
943     $dest= array();
945     foreach ($this->groupMembership as $key => $value){
946       if (!in_array($key, $groups)){
947         $dest[$key]= $value;
948       }
949     }
950     $this->groupMembership= $dest;
951   }
953   /* Adapt from template, using 'dn' */
954   function adapt_from_template($dn)
955   {
956     /* Include global link_info */
957     $ldap= $this->config->get_ldap_link();
959     plugin::adapt_from_template($dn);
960     $template= $this->attrs['uid'][0];
962     /* Adapt group membership */
963     $ldap->cd($this->config->current['BASE']);
964     $ldap->search("(&(objectClass=posixGroup)(memberUid=".$this->attrs["uid"][0]."))", array("description", "cn"));
966     while ($this->attrs= $ldap->fetch()){
967       if (!isset($this->attrs["description"][0])){
968         $entry= $this->attrs["cn"][0];
969       } else {
970         $entry= $this->attrs["cn"][0]." [".$this->attrs["description"][0]."]";
971       }
972       $this->groupMembership[$ldap->getDN()]= $entry;
973     }
975     /* Fix primary group settings */
976     $ldap->cd($this->config->current['BASE']);
977     $ldap->search("(&(objectClass=posixGroup)(cn=$template)(gidNumber=".$this->gidNumber."))", array("cn"));
978     if ($ldap->count() != 1){
979       $this->primaryGroup= $this->gidNumber;
980     }
981   }
983   function get_next_id($attrib)
984   {
985     $ids= array();
986     $ldap= $this->config->get_ldap_link();
988     $ldap->cd ($this->config->current['BASE']);
989     $ldap->search ("($attrib=*)", array("$attrib"));
991     /* Get list of ids */
992     while ($attrs= $ldap->fetch()){
993       $ids[]= (int)$attrs["$attrib"][0];
994     }
996     /* Find out next free id near to UID_BASE */
997     for ($id= $this->config->current['UIDBASE']; $id++; $id<65000){
998       if (!in_array($id, $ids)){
999         return ($id);
1000       }
1001     }
1003     /* Should not happen */
1004     if ($id == 65000){
1005       print_red(_("Too many users, can't allocate a free ID!"));
1006       exit;
1007     }
1009   }
1013 // vim:tabstop=2:expandtab:shiftwidth=2:filetype=php:syntax:ruler:
1014 ?>