1 <?php
2 /*!
3 \brief posixAccount plugin
4 \author Cajus Pollmeier <pollmeier@gonicus.de>
5 \version 2.00
6 \date 24.07.2003
8 This class provides the functionality to read and write all attributes
9 relevant for posixAccounts and shadowAccounts from/to the LDAP. It
10 does syntax checking and displays the formulars required.
11 */
13 class posixAccount extends plugin
14 {
15 /* Definitions */
16 var $plHeadline= "UNIX";
17 var $plDescription= "This does something";
19 /* CLI vars */
20 var $cli_summary= "Manage users posix account";
21 var $cli_description= "Some longer text\nfor help";
22 var $cli_parameters= array("eins" => "Eins ist toll", "zwei" => "Zwei ist noch besser");
24 /* Plugin specific values */
25 var $homeDirectory= "";
26 var $loginShell= "/bin/bash";
27 var $uidNumber= "";
28 var $gidNumber= "";
29 var $gecos= "";
30 var $shadowMin= "0";
31 var $shadowMax= "0";
32 var $shadowWarning= "0";
33 var $shadowLastChange= "0";
34 var $shadowInactive= "0";
35 var $shadowExpire= "0";
36 var $gosaDefaultPrinter= "";
37 var $gosaDefaultLanguage= "";
38 var $accessTo= array();
39 var $trustModel= "";
41 var $status= "";
42 var $loginShellList= array();
43 var $groupMembership= array();
44 var $savedGroupMembership= array();
45 var $savedUidNumber= "";
46 var $savedGidNumber= "";
47 var $use_shadowMin= "0";
48 var $use_shadowMax= "0";
49 var $use_shadowWarning= "0";
50 var $use_shadowInactive= "0";
51 var $use_shadowExpire= "0";
52 var $must_change_password= "0";
53 var $force_ids= 0;
54 var $printerList= array();
55 var $group_dialog= FALSE;
56 var $show_ws_dialog= FALSE;
57 var $secondaryGroups= array();
58 var $primaryGroup= 0;
59 var $was_trust_account= FALSE;
62 /* attribute list for save action */
63 var $attributes= array("homeDirectory", "loginShell", "uidNumber", "gidNumber", "gecos",
64 "shadowMin", "shadowMax", "shadowWarning", "shadowInactive", "shadowLastChange",
65 "shadowExpire", "gosaDefaultPrinter", "gosaDefaultLanguage", "uid");
66 var $objectclasses= array("posixAccount", "shadowAccount");
69 /* constructor, if 'dn' is set, the node loads the given
70 'dn' from LDAP */
71 function posixAccount ($config, $dn= NULL)
72 {
73 /* Configuration is fine, allways */
74 $this->config= $config;
76 /* Load bases attributes */
77 plugin::plugin($config, $dn);
79 $ldap= $this->config->get_ldap_link();
81 if ($dn != NULL){
83 /* Correct is_account. shadowAccount is not required. */
84 if (isset($this->attrs['objectClass']) &&
85 in_array ('posixAccount', $this->attrs['objectClass'])){
87 $this->is_account= TRUE;
88 }
90 /* Is this account a trustAccount? */
91 if ($this->is_account && isset($this->attrs['trustModel'])){
92 $this->trustModel= $this->attrs['trustModel'][0];
93 $this->was_trust_account= TRUE;
94 } else {
95 $this->was_trust_account= FALSE;
96 $this->trustModel= "";
97 }
98 if ($this->is_account && isset($this->attrs['accessTo'])){
99 for ($i= 0; $i<$this->attrs['accessTo']['count']; $i++){
100 $tmp= $this->attrs['accessTo'][$i];
101 $this->accessTo[$tmp]= $tmp;
102 }
103 }
104 $this->initially_was_account= $this->is_account;
106 /* Fill group */
107 $this->primaryGroup= $this->gidNumber;
109 /* Generate status text */
110 $current= date("U");
111 if (($current >= $this->shadowExpire) && $this->shadowExpire){
112 $this->status= "expired";
113 if (($this->shadowExpire - $current) < $this->shadowInactive){
114 $this->status.= ", grace time active";
115 }
116 } elseif (($this->shadowLastChange + $this->shadowMin) >= $current){
117 $this->status= "active, password not changable";
118 } elseif (($this->shadowLastChange + $this->shadowMax) >= $current){
119 $this->status= "active, password expired";
120 } else {
121 $this->status= "active";
122 }
124 /* Get group membership */
125 $ldap->cd($this->config->current['BASE']);
126 $ldap->search("(&(objectClass=posixGroup)(memberUid=".$this->uid."))", array("cn", "description"));
128 while ($this->attrs= $ldap->fetch()){
129 if (!isset($this->attrs["description"][0])){
130 $entry= $this->attrs["cn"][0];
131 } else {
132 $dsc= preg_replace ('/^Group of user/', _("Group of user"), $this->attrs["description"][0]);
133 $entry= $this->attrs["cn"][0]." [$dsc]";
134 }
135 $this->groupMembership[$ldap->getDN()]= $entry;
136 }
137 asort($this->groupMembership);
138 reset($this->groupMembership);
139 $this->savedGroupMembership= $this->groupMembership;
140 $this->savedUidNumber= $this->uidNumber;
141 $this->savedGidNumber= $this->gidNumber;
142 }
144 /* Adjust shadow checkboxes */
145 foreach (array("shadowMin", "shadowMax", "shadowWarning", "shadowInactive",
146 "shadowExpire") as $val){
148 if ($this->$val != 0){
149 $oval= "use_".$val;
150 $this->$oval= "1";
151 }
152 }
154 /* Convert to seconds */
155 if ($this->shadowExpire != 0){
156 $this->shadowExpire*= 60 * 60 * 24;
157 } else {
158 $date= getdate();
159 $this->shadowExpire= floor($date[0] / (60*60*24)) * 60 * 60 * 24;
160 }
162 /* Generate shell list from /etc/gosa/shells */
163 if (file_exists('/etc/gosa/shells')){
164 $shells = file ('/etc/gosa/shells');
165 foreach ($shells as $line){
166 if (!preg_match ("/^#/", $line)){
167 $this->loginShellList[]= trim($line);
168 }
169 }
170 } else {
171 if ($this->loginShell == ""){
172 $this->loginShellList[]= _("unconfigured");
173 }
174 }
176 /* Insert possibly missing loginShell */
177 if ($this->loginShell != "" && !in_array($this->loginShell, $this->loginShellList)){
178 $this->loginShellList[]= $this->loginShell;
179 }
181 /* Generate printer list */
182 if (isset($this->config->data['SERVERS']['CUPS'])){
183 $this->printerList= get_printer_list ($this->config->data['SERVERS']['CUPS']);
184 asort($this->printerList);
185 }
187 /* Generate group list */
188 $ldap->cd($this->config->current['BASE']);
189 $ldap->search("(objectClass=posixGroup)", array("cn", "gidNumber"));
190 $this->secondaryGroups[]= "- "._("automatic")." -";
191 while ($attrs= $ldap->fetch()){
192 $this->secondaryGroups[$attrs['gidNumber'][0]]= $attrs['cn'][0];
193 }
194 asort ($this->secondaryGroups);
196 /* Get global filter config */
197 if (!is_global("sysfilter")){
198 $ui= get_userinfo();
199 $base= get_base_from_people($ui->dn);
200 $sysfilter= array( "depselect" => $base,
201 "regex" => "*");
202 register_global("sysfilter", $sysfilter);
203 }
204 }
207 /* execute generates the html output for this node */
208 function execute()
209 {
210 /* Do we need to flip is_account state? */
211 if (isset($_POST['modify_state'])){
212 $this->is_account= !$this->is_account;
213 }
215 /* Do we represent a valid posixAccount? */
216 if (!$this->is_account && $this->parent == NULL ){
217 $display= "<img src=\"images/stop.png\" align=center> <b>".
218 _("This account has no unix extensions.")."</b>";
219 $display.= back_to_main();
220 return ($display);
221 }
223 $display= "";
225 /* Show tab dialog headers */
226 if ($this->parent != NULL){
227 if ($this->is_account){
228 if (isset($this->parent->by_object['sambaAccount'])){
229 $obj= $this->parent->by_object['sambaAccount'];
230 }
231 if (isset($obj) && $obj->is_account == TRUE &&
232 isset($this->parent->by_object['sambaAccount'])){
234 /* Samba3 dependency on posix accounts are enabled
235 in the moment, because I need to rely on unique
236 uidNumbers. There'll be a better solution later
237 on. */
238 $display= $this->show_header(_("Remove posix account"),
239 _("This account has unix features enabled. To disable them, you'll need to remove the samba account first."), TRUE);
240 } else {
241 $display= $this->show_header(_("Remove posix account"),
242 _("This account has posix features enabled. You can disable them by clicking below."));
243 }
244 } else {
245 $display= $this->show_header(_("Create posix account"),
246 _("This account has posix features disabled. You can enable them by clicking below."));
247 return($display);
248 }
249 }
251 /* Trigger group edit? */
252 if (isset($_POST['edit_groupmembership'])){
253 $this->group_dialog= TRUE;
254 $this->dialog= TRUE;
255 }
257 /* Cancel group edit? */
258 if (isset($_POST['add_groups_cancel']) ||
259 isset($_POST['add_groups_finish'])){
260 $this->group_dialog= FALSE;
261 $this->dialog= FALSE;
262 }
264 /* Add selected groups */
265 if (isset($_POST['add_groups_finish']) && isset($_POST['groups']) &&
266 count($_POST['groups'])){
268 if (chkacl ($this->acl, "memberUid") == ""){
269 $this->addGroup ($_POST['groups']);
270 $this->is_modified= TRUE;
271 }
272 }
274 /* Delete selected groups */
275 if (isset($_POST['delete_groupmembership']) &&
276 isset($_POST['group_list']) && count($_POST['group_list'])){
278 if (chkacl ($this->acl, "memberUid") == ""){
279 $this->delGroup ($_POST['group_list']);
280 $this->is_modified= TRUE;
281 }
282 }
284 /* Add user workstation? */
285 if (isset($_POST["add_ws"])){
286 $this->show_ws_dialog= TRUE;
287 $this->dialog= TRUE;
288 }
290 /* Add user workstation? */
291 if (isset($_POST["add_ws_finish"]) && isset($_POST['wslist'])){
292 foreach($_POST['wslist'] as $ws){
293 $this->accessTo[$ws]= $ws;
294 }
295 ksort($this->accessTo);
296 $this->is_modified= TRUE;
297 }
299 /* Remove user workstations? */
300 if (isset($_POST["delete_ws"]) && isset($_POST['workstation_list'])){
301 foreach($_POST['workstation_list'] as $name){
302 unset ($this->accessTo[$name]);
303 }
304 $this->is_modified= TRUE;
305 }
307 /* Add user workstation finished? */
308 if (isset($_POST["add_ws_finish"]) || isset($_POST["add_ws_cancel"])){
309 $this->show_ws_dialog= FALSE;
310 $this->dialog= FALSE;
311 }
313 /* Templates now! */
314 $smarty= get_smarty();
316 /* Show ws dialog */
317 if ($this->show_ws_dialog){
318 /* Save data */
319 $sysfilter= get_global("sysfilter");
320 foreach( array("depselect", "regex") as $type){
321 if (isset($_POST[$type])){
322 $sysfilter[$type]= $_POST[$type];
323 }
324 }
325 if (isset($_GET['search'])){
326 $s= mb_substr($_GET['search'], 0, 1, "UTF8")."*";
327 if ($s == "**"){
328 $s= "*";
329 }
330 $sysfilter['regex']= $s;
331 }
332 register_global("sysfilter", $sysfilter);
334 /* Get workstation list */
335 $exclude= "";
336 foreach($this->accessTo as $ws){
337 $exclude.= "(cn=$ws)";
338 }
339 if ($exclude != ""){
340 $exclude= "(!(|$exclude))";
341 }
342 $acl= array($this->config->current['BASE'] => ":all");
343 $regex= $sysfilter['regex'];
344 $filter= "(&(|(objectClass=goServer)(objectClass=gotoWorkstation)(objectClass=gotoTerminal))$exclude(cn=*)(cn=$regex))";
345 $res= get_list($acl, "$filter", TRUE, $sysfilter['depselect'], array("cn"), TRUE);
346 $wslist= array();
347 foreach ($res as $attrs){
348 $wslist[]= preg_replace('/\$/', '', $attrs['cn'][0]);
349 }
350 asort($wslist);
351 $smarty->assign("search_image", get_template_path('images/search.png'));
352 $smarty->assign("launchimage", get_template_path('images/small_filter.png'));
353 $smarty->assign("tree_image", get_template_path('images/tree.png'));
354 $smarty->assign("deplist", $this->config->idepartments);
355 $smarty->assign("alphabet", generate_alphabet());
356 foreach( array("depselect", "regex") as $type){
357 $smarty->assign("$type", $sysfilter[$type]);
358 }
359 $smarty->assign("hint", print_sizelimit_warning());
360 $smarty->assign("wslist", $wslist);
361 $smarty->assign("apply", apply_filter());
362 $display= $smarty->fetch (get_template_path('trust_machines.tpl', TRUE, dirname(__FILE__)));
363 return ($display);
364 }
366 /* Manage group add dialog */
367 if ($this->group_dialog){
368 $gd= new groupManagement($this->config, get_userinfo());
370 /* Save data */
371 $groupfilter= get_global("groupfilter");
372 foreach( array("depselect", "guser", "regex") as $type){
373 if (isset($_POST[$type])){
374 $groupfilter[$type]= $_POST[$type];
375 }
376 }
377 if (isset($_POST['depselect'])){
378 foreach( array("primarygroups", "sambagroups", "mailgroups", "appgroups",
379 "functionalgroups") as $type){
381 if (isset($_POST[$type])) {
382 $groupfilter[$type]= "checked";
383 } else {
384 $groupfilter[$type]= "";
385 }
386 }
387 }
388 if (isset($_GET['search'])){
389 $s= mb_substr($_GET['search'], 0, 1, "UTF8")."*";
390 if ($s == "**"){
391 $s= "*";
392 }
393 $groupfilter['regex']= $s;
394 }
395 register_global("groupfilter", $groupfilter);
397 /* Calculate actual groups */
398 $gd->reload();
399 $glist= array();
400 foreach ($gd->grouplist as $key => $value){
401 if (!isset($this->groupMembership[$key])){
402 $glist[$key]= $value;
403 }
404 }
406 /* Show dialog */
407 $smarty->assign("groups", $glist);
408 $smarty->assign("search_image", get_template_path('images/search.png'));
409 $smarty->assign("launchimage", get_template_path('images/small_filter.png'));
410 $smarty->assign("tree_image", get_template_path('images/tree.png'));
411 $smarty->assign("deplist", $this->config->idepartments);
412 $smarty->assign("alphabet", generate_alphabet());
413 foreach( array("depselect", "guser", "regex", "primarygroups", "mailgroups",
414 "appgroups", "sambagroups", "functionalgroups") as $type){
415 $smarty->assign("$type", $groupfilter[$type]);
416 }
417 $smarty->assign("hint", print_sizelimit_warning());
419 $smarty->assign("apply", apply_filter());
420 $display.= $smarty->fetch (get_template_path('posix_groups.tpl', TRUE, dirname(__FILE__)));
421 return ($display);
422 }
424 /* Show main page */
425 $smarty= get_smarty();
427 /* Depending on pwmode, currently hardcoded because there are no other methods */
428 if ( 1 == 1 ){
429 $smarty->assign("pwmode", dirname(__FILE__)."/posix_shadow");
430 $shadowMinACL= chkacl($this->acl, "shadowMin");
431 $smarty->assign("shadowmins", sprintf(_("Password can't be changed up to %s days after last change"), "<input name=\"shadowMin\" size=3 maxlength=4 $shadowMinACL value=\"".$this->shadowMin."\">"));
432 $shadowMaxACL= chkacl($this->acl, "shadowMax");
433 $smarty->assign("shadowmaxs", sprintf(_("Password must be changed after %s days"), "<input name=\"shadowMax\" size=3 maxlength=4 $shadowMaxACL value=\"".$this->shadowMax."\">"));
434 $shadowInactiveACL= chkacl($this->acl, "shadowInactive");
435 $smarty->assign("shadowinactives", sprintf(_("Disable account after %s days of inactivity after password expiery"), "<input name=\"shadowInactive\" size=3 maxlength=4 $shadowInactiveACL value=\"".$this->shadowInactive."\">"));
436 $shadowWarningACL= chkacl($this->acl, "shadowWarning");
437 $smarty->assign("shadowwarnings", sprintf(_("Warn user %s days before password expiery"), "<input name=\"shadowWarning\" size=3 maxlength=4 $shadowWarningACL value=\"".$this->shadowWarning."\">"));
438 foreach( array("must_change_password", "use_shadowMin", "use_shadowMax",
439 "use_shadowExpire", "use_shadowInactive",
440 "use_shadowWarning") as $val){
441 if ($this->$val == 1){
442 $smarty->assign("$val", "checked");
443 } else {
444 $smarty->assign("$val", "");
445 }
446 $smarty->assign("$val"."ACL", chkacl($this->acl, $val));
447 }
448 }
450 /* Fill calendar */
451 $date= getdate($this->shadowExpire);
453 $days= array();
454 for($d= 1; $d<32; $d++){
455 $days[$d]= $d;
456 }
457 $years= array();
458 for($y= $date['year']-10; $y<$date['year']+10; $y++){
459 $years[]= $y;
460 }
461 $months= array(_("January"), _("February"), _("March"), _("April"),
462 _("May"), _("June"), _("July"), _("August"), _("September"),
463 _("October"), _("November"), _("December"));
464 $smarty->assign("day", $date["mday"]);
465 $smarty->assign("days", $days);
466 $smarty->assign("months", $months);
467 $smarty->assign("month", $date["mon"]-1);
468 $smarty->assign("years", $years);
469 $smarty->assign("year", $date["year"]);
471 /* Fill arrays */
472 $smarty->assign("shells", $this->loginShellList);
473 $smarty->assign("secondaryGroups", $this->secondaryGroups);
474 $smarty->assign("primaryGroup", $this->primaryGroup);
475 $smarty->assign("groupMembership", $this->groupMembership);
476 if (count($this->groupMembership) > 16){
477 $smarty->assign("groups", "too_many_for_nfs");
478 } else {
479 $smarty->assign("groups", "");
480 }
481 $smarty->assign("printerList", $this->printerList);
482 $smarty->assign("languages", $this->config->data['MAIN']['LANGUAGES']);
484 /* Checkboxes */
485 if ($this->force_ids == 1){
486 $smarty->assign("force_ids", "checked");
487 } else {
488 if ($_SESSION["js"]){
489 $smarty->assign("forceMode", "disabled");
490 }
491 $smarty->assign("force_ids", "");
492 }
493 $smarty->assign("force_idsACL", chkacl($this->acl, "force_ids"));
495 /* Load attributes and acl's */
496 foreach($this->attributes as $val){
497 if(($_SESSION["js"])&&(($val=="uidNumber")||($val=="gidNumber")))
498 {
499 $smarty->assign("$val"."ACL","");
500 $smarty->assign("$val", $this->$val);
501 continue;
502 }
503 $smarty->assign("$val", $this->$val);
504 $smarty->assign("$val"."ACL", chkacl($this->acl,$val));
505 }
506 $smarty->assign("groupMembershipACL", chkacl($this->acl, "groupMembership"));
507 $smarty->assign("status", $this->status);
509 /* Work on trust modes */
510 $smarty->assign("trustmodeACL", chkacl($this->acl, "trustmode"));
511 if ($this->trustModel == "fullaccess"){
512 $trustmode= 1;
513 // pervent double disable tag in html code, this will disturb our clean w3c html
515 if(chkacl($this->acl, "trustmode")==""){
516 $smarty->assign("trusthide", "disabled");
517 }else{
518 $smarty->assign("trusthide", "");
519 }
521 } elseif ($this->trustModel == "byhost"){
522 $trustmode= 2;
523 $smarty->assign("trusthide", "");
524 } else {
525 // pervent double disable tag in html code, this will disturb our clean w3c html
526 if(chkacl($this->acl, "trustmode")==""){
527 $smarty->assign("trusthide", "disabled");
528 }else{
529 $smarty->assign("trusthide", "");
530 }
531 $trustmode= 0;
532 }
533 $smarty->assign("trustmode", $trustmode);
534 $smarty->assign("trustmodes", array( 0 => _("disabled"), 1 => _("full access"),
535 2 => _("allow access to these hosts")));
539 if((count($this->accessTo))==0)
540 $smarty->assign("emptyArrAccess",true);
541 else
542 $smarty->assign("emptyArrAccess",false);
546 $smarty->assign("workstations", $this->accessTo);
548 $smarty->assign("apply", apply_filter());
549 $display.= $smarty->fetch (get_template_path('generic.tpl', TRUE, dirname(__FILE__)));
550 return($display);
551 }
554 /* remove object from parent */
555 function remove_from_parent()
556 {
557 /* Cancel if there's nothing to do here */
558 if (!$this->initially_was_account){
559 return;
560 }
562 /* include global link_info */
563 $ldap= $this->config->get_ldap_link();
565 /* Remove and write to LDAP */
566 plugin::remove_from_parent();
568 /* Zero out array */
569 $this->attrs['gosaHostACL']= array();
571 /* Keep uid, because we need it for authentification! */
572 unset($this->attrs['uid']);
574 @DEBUG (DEBUG_LDAP, __LINE__, __FUNCTION__, __FILE__,
575 $this->attributes, "Save");
576 $ldap->cd($this->dn);
577 $ldap->modify($this->attrs);
578 show_ldap_error($ldap->get_error());
580 /* Delete group only if cn is uid and there are no other
581 members inside */
582 $ldap->cd ($this->config->current['BASE']);
583 $ldap->search ("(&(objectClass=posixGroup)(gidNumber=".$this->gidNumber."))", array("cn", "memberUid"));
584 if ($ldap->count() != 0){
585 $attrs= $ldap->fetch();
586 if ($attrs['cn'][0] == $this->uid &&
587 !isset($this->attrs['memberUid'])){
589 $ldap->rmDir($ldap->getDN());
590 }
591 }
593 /* Optionally execute a command after we're done */
594 $this->handle_post_events("remove");
595 }
598 function save_object()
599 {
600 if (isset($_POST['posixTab'])){
601 /* Save values to object */
602 plugin::save_object();
604 /* Save force GID attribute */
605 if (chkacl ($this->acl, "force_ids") == ""){
606 if (isset ($_POST['force_ids'])){
607 $data= 1;
608 } else {
609 $data= 0;
610 }
611 if ($this->force_ids != $data){
612 $this->is_modified= TRUE;
613 }
614 $this->force_ids= $data;
616 $data= $_POST['primaryGroup'];
617 if ($this->primaryGroup != $data){
618 $this->is_modified= TRUE;
619 }
620 $this->primaryGroup= $_POST['primaryGroup'];
621 }
623 /* Save pwmode dependent attributes, curently hardcoded because there're
624 no alternatives */
625 if (1 == 1){
626 foreach( array("must_change_password", "use_shadowMin", "use_shadowMax",
627 "use_shadowExpire", "use_shadowInactive",
628 "use_shadowWarning") as $val){
629 if (chkacl($this->acl, "$val") == ""){
630 if (isset ($_POST[$val])){
631 $data= 1;
632 } else {
633 $data= 0;
634 }
635 if ($data != $this->$val){
636 $this->is_modified= TRUE;
637 }
638 $this->$val= $data;
639 }
640 }
641 }
643 /* Trust mode - special handling */
644 if (isset($_POST['trustmode'])){
645 $saved= $this->trustModel;
646 if ($_POST['trustmode'] == "1"){
647 $this->trustModel= "fullaccess";
648 } elseif ($_POST['trustmode'] == "2"){
649 $this->trustModel= "byhost";
650 } else {
651 $this->trustModel= "";
652 }
653 if ($this->trustModel != $saved){
654 $this->is_modified= TRUE;
655 }
656 }
657 }
658 }
661 /* Save data to LDAP, depending on is_account we save or delete */
662 function save()
663 {
664 /* include global link_info */
665 $ldap= $this->config->get_ldap_link();
667 /* Adapt shadow values */
668 if (!$this->use_shadowExpire){
669 $this->shadowExpire= "0";
670 } else {
671 /* Transform seconds to days here */
672 $this->shadowExpire= (int)($this->shadowExpire / (60 * 60 * 24)) + 1;
673 }
674 if (!$this->use_shadowMax){
675 $this->shadowMax= "0";
676 }
677 if ($this->must_change_password){
678 $this->shadowLastChange= (int)(date("U") / 86400) - $this->shadowMax - 1;
679 } else {
680 $this->shadowLastChange= (int)(date("U") / 86400);
681 }
682 if (!$this->use_shadowWarning){
683 $this->shadowWarning= "0";
684 }
686 /* Check what to do with ID's */
687 if ($this->force_ids == 0){
689 /* Use id's that are already set */
690 if ($this->savedUidNumber != ""){
691 $this->uidNumber= $this->savedUidNumber;
692 $this->gidNumber= $this->savedGidNumber;
693 } else {
695 /* Calculate new id's. We need to place a lock before calling get_next_id
696 to get real unique values. */
697 $wait= 10;
698 while (get_lock("uidnumber") != ""){
699 sleep (1);
701 /* Oups - timed out */
702 if ($wait-- == 0){
703 print_red (_("Failed: overriding lock"));
704 break;
705 }
706 }
708 add_lock ("uidnumber", "gosa");
709 $this->uidNumber= $this->get_next_id("uidNumber");
710 if ($this->savedGidNumber != ""){
711 $this->gidNumber= $this->savedGidNumber;
712 } else {
713 $this->gidNumber= $this->get_next_id("gidNumber");
714 }
715 }
717 if ($this->primaryGroup != 0){
718 $this->gidNumber= $this->primaryGroup;
719 }
720 }
722 if ($this->use_shadowMin != "1" ) {
723 $this->shadowMin = "";
724 }
726 if (($this->use_shadowMax != "1") && ($this->must_change_password != "1")) {
727 $this->shadowMax = "";
728 }
730 if ($this->use_shadowWarning != "1" ) {
731 $this->shadowWarning = "";
732 }
734 if ($this->use_shadowInactive != "1" ) {
735 $this->shadowInactive = "";
736 }
738 if ($this->use_shadowExpire != "1" ) {
739 $this->shadowExpire = "";
740 }
742 /* Call parents save to prepare $this->attrs */
743 plugin::save();
745 /* Fill gecos */
746 if (isset($this->parent) && $this->parent != NULL){
747 $this->gecos= $this->parent->by_object['user']->cn;
748 }
750 /* Trust accounts */
751 $objectclasses= array();
752 foreach ($this->attrs['objectClass'] as $key => $class){
753 if (preg_match('/trustAccount/i', $class)){
754 continue;
755 }
756 $objectclasses[]= $this->attrs['objectClass'][$key];
757 }
758 $this->attrs['objectClass']= $objectclasses;
759 if ($this->trustModel != ""){
760 $this->attrs['objectClass'][]= "trustAccount";
761 $this->attrs['trustModel']= $this->trustModel;
762 $this->attrs['accessTo']= array();
763 if ($this->trustModel == "byhost"){
764 foreach ($this->accessTo as $host){
765 $this->attrs['accessTo'][]= $host;
766 }
767 }
768 } else {
769 if ($this->was_trust_account){
770 $this->attrs['accessTo']= array();
771 $this->attrs['trustModel']= array();
772 }
773 }
775 /* Save data to LDAP */
776 $ldap->cd($this->dn);
777 $ldap->modify($this->attrs);
778 show_ldap_error($ldap->get_error());
780 /* Remove lock needed for unique id generation */
781 del_lock ("uidnumber");
784 /* Posix accounts have group interrelationship, take care about these here. */
785 if ($this->force_ids == 0 && $this->primaryGroup == 0){
786 $ldap->cd($this->config->current['BASE']);
787 $ldap->search("(&(objectClass=posixGroup)(gidNumber=".$this->gidNumber."))", array("cn"));
789 /* Create group if it doesn't exist */
790 if ($ldap->count() == 0){
791 $groupdn= preg_replace ('/^'.$this->config->current['DNMODE'].'=[^,]+,'.get_people_ou().'/i', 'cn='.$this->uid.','.get_groups_ou(), $this->dn);
793 $g= new group($this->config, $groupdn);
794 $g->cn= $this->uid;
795 $g->force_gid= 1;
796 $g->gidNumber= $this->gidNumber;
797 $g->description= "Group of user ".$this->givenName." ".$this->sn;
798 $g->save ();
799 }
800 }
802 /* Take care about groupMembership values: add to groups */
803 foreach ($this->groupMembership as $key => $value){
804 $g= new group($this->config, $key);
805 $g->addUser ($this->uid);
806 $g->save();
808 /* May need to save the mail part, too */
809 if ($g->has_mailAccount){
810 $m= new mailgroup($this->config, $key);
811 $m->save();
812 }
813 }
815 /* Remove from groups not listed in groupMembership */
816 foreach ($this->savedGroupMembership as $key => $value){
817 if (!array_key_exists ($key, $this->groupMembership)){
818 $g= new group($this->config, $key);
819 $g->removeUser ($this->uid);
820 $g->save();
822 /* May need to save the mail part, too */
823 if ($g->has_mailAccount){
824 $m= new mailgroup($this->config, $key);
825 $m->save();
826 }
827 }
828 }
830 /* Optionally execute a command after we're done */
831 if ($this->initially_was_account == $this->is_account){
832 if ($this->is_modified){
833 $this->handle_post_events("mofify");
834 }
835 } else {
836 $this->handle_post_events("add");
837 }
838 }
840 /* Check formular input */
841 function check()
842 {
843 /* Include global link_info */
844 $ldap= $this->config->get_ldap_link();
846 /* Reset message array */
847 $message= array();
849 /* must: homeDirectory */
850 if ($this->homeDirectory == ""){
851 $message[]= _("The required field 'Home directory' is not set.");
852 }
853 if (!is_path($this->homeDirectory)){
854 $message[]= _("Please enter a valid path in 'Home directory' field.");
855 }
857 /* Check ID's if they are forced by user */
858 if ($this->force_ids == "1"){
860 /* Valid uid/gid? */
861 if (!is_id($this->uidNumber)){
862 $message[]= _("Value specified as 'UID' is not valid.");
863 } else {
864 if ($this->uidNumber < $this->config->current['MINID']){
865 $message[]= _("Value specified as 'UID' is too small.");
866 }
867 }
868 if (!is_id($this->gidNumber)){
869 $message[]= _("Value specified as 'GID' is not valid.");
870 } else {
871 if ($this->gidNumber < $this->config->current['MINID']){
872 $message[]= _("Value specified as 'GID' is too small.");
873 }
874 }
876 }
878 /* Check shadow settings, well I like spaghetties... */
879 if ($this->use_shadowMin){
880 if (!is_id($this->shadowMin)){
881 $message[]= _("Value specified as 'shadowMin' is not valid.");
882 }
883 }
884 if ($this->use_shadowMax){
885 if (!is_id($this->shadowMax)){
886 $message[]= _("Value specified as 'shadowMax' is not valid.");
887 }
888 }
889 if ($this->use_shadowWarning){
890 if (!is_id($this->shadowWarning)){
891 $message[]= _("Value specified as 'shadowWarning' is not valid.");
892 }
893 if (!$this->use_shadowMax){
894 $message[]= _("'shadowWarning' without 'shadowMax' makes no sense.");
895 }
896 if ($this->shadowWarning > $this->shadowMax){
897 $message[]= _("Value specified as 'shadowWarning' should be smaller than 'shadowMax'.");
898 }
899 if ($this->use_shadowMin && $this->shadowWarning < $this->shadowMin){
900 $message[]= _("Value specified as 'shadowWarning' should be greater than 'shadowMin'.");
901 }
902 }
903 if ($this->use_shadowInactive){
904 if (!is_id($this->shadowInactive)){
905 $message[]= _("Value specified as 'shadowInactive' is not valid.");
906 }
907 if (!$this->use_shadowMax){
908 $message[]= _("'shadowInactive' without 'shadowMax' makes no sense.");
909 }
910 }
911 if ($this->use_shadowMin && $this->use_shadowMax){
912 if ($this->shadowMin > $this->shadowMax){
913 $message[]= _("Value specified as 'shadowMin' should be smaller than 'shadowMax'.");
914 }
915 }
917 return ($message);
918 }
921 /* Add posix user to some groups */
922 function addGroup ($groups)
923 {
924 /* include global link_info */
925 $ldap= $this->config->get_ldap_link();
927 /* Walk through groups and add the descriptive entry if not exists */
928 foreach ($groups as $value){
929 if (!array_key_exists($value, $this->groupMembership)){
930 $ldap->cat($value);
931 $attrs= $ldap->fetch();
932 error_reporting (0);
933 if (!isset($attrs['description'][0])){
934 $entry= $attrs["cn"][0];
935 } else {
936 $dsc= preg_replace ('/^Group of user/', _("Group of user"), $attrs["description"][0]);
937 $entry= $attrs["cn"][0]." [$dsc]";
938 }
939 error_reporting (E_ALL);
940 $this->groupMembership[$ldap->getDN()]= $entry;
941 }
942 }
944 /* Sort groups */
945 asort ($this->groupMembership);
946 reset ($this->groupMembership);
947 }
950 /* Del posix user from some groups */
951 function delGroup ($groups)
952 {
953 $dest= array();
955 foreach ($this->groupMembership as $key => $value){
956 if (!in_array($key, $groups)){
957 $dest[$key]= $value;
958 }
959 }
960 $this->groupMembership= $dest;
961 }
963 /* Adapt from template, using 'dn' */
964 function adapt_from_template($dn)
965 {
966 /* Include global link_info */
967 $ldap= $this->config->get_ldap_link();
969 plugin::adapt_from_template($dn);
970 $template= $this->attrs['uid'][0];
972 /* Adapt group membership */
973 $ldap->cd($this->config->current['BASE']);
974 $ldap->search("(&(objectClass=posixGroup)(memberUid=".$this->attrs["uid"][0]."))", array("description", "cn"));
976 while ($this->attrs= $ldap->fetch()){
977 if (!isset($this->attrs["description"][0])){
978 $entry= $this->attrs["cn"][0];
979 } else {
980 $entry= $this->attrs["cn"][0]." [".$this->attrs["description"][0]."]";
981 }
982 $this->groupMembership[$ldap->getDN()]= $entry;
983 }
985 /* Fix primary group settings */
986 $ldap->cd($this->config->current['BASE']);
987 $ldap->search("(&(objectClass=posixGroup)(cn=$template)(gidNumber=".$this->gidNumber."))", array("cn"));
988 if ($ldap->count() != 1){
989 $this->primaryGroup= $this->gidNumber;
990 }
991 }
993 function get_next_id($attrib)
994 {
995 $ids= array();
996 $ldap= $this->config->get_ldap_link();
998 $ldap->cd ($this->config->current['BASE']);
999 $ldap->search ("($attrib=*)", array("$attrib"));
1001 /* Get list of ids */
1002 while ($attrs= $ldap->fetch()){
1003 $ids[]= (int)$attrs["$attrib"][0];
1004 }
1006 /* Find out next free id near to UID_BASE */
1007 for ($id= $this->config->current['UIDBASE']; $id++; $id<65000){
1008 if (!in_array($id, $ids)){
1009 return ($id);
1010 }
1011 }
1013 /* Should not happen */
1014 if ($id == 65000){
1015 print_red(_("Too many users, can't allocate a free ID!"));
1016 exit;
1017 }
1019 }
1021 }
1023 // vim:tabstop=2:expandtab:shiftwidth=2:filetype=php:syntax:ruler:
1024 ?>