diff --git a/plugins/personal/samba/class_sambaAccount.inc b/plugins/personal/samba/class_sambaAccount.inc
index d64aff27ab9e4c697015ff2c234f6b374d63e749..d0032add21f8c32333c30c973b223a591f338bd1 100644 (file)
$this->SID= preg_replace ("/-[^-]+$/", "", $this->sambaSID);
$ldap= $this->config->get_ldap_link();
$ldap->cd($this->config->current['BASE']);
- $ldap->search ("(&(objectClass=sambaDomain)(sambaSID=$this->SID))");
+ $ldap->search ("(&(objectClass=sambaDomain)(sambaSID=$this->SID))",array("sambaAlgorithmicRidBase","sambaDomainName"));
if ($ldap->count() != 0){
$attrs= $ldap->fetch();
$this->ridBase= $attrs['sambaAlgorithmicRidBase'][0];
$smarty->assign("reconnmode", $this->mungedObject->getReConn());
$smarty->assign("reconnACL", chkacl($this->acl,"reconn"));
- /* Set form elements to disabled/enable state */
- $smarty->assign("tsloginstate", $this->mungedObject->getTsLogin()?"":"disabled");
- $smarty->assign("inheritstate", $this->mungedObject->getInheritMode()?"disabled":"");
-
+ if($_SESSION['js']){
+ /* Set form elements to disabled/enable state */
+ $smarty->assign("tsloginstate", $this->mungedObject->getTsLogin()?"":"disabled");
+ $smarty->assign("inheritstate", $this->mungedObject->getInheritMode()?"disabled":"");
+ }else{
+ $smarty->assign("tsloginstate", "");
+ $smarty->assign("inheritstate", "");
+ }
+
/* Set checkboxes to checked or unchecked state */
$smarty->assign("tslogin", $this->mungedObject->getTsLogin()?"checked":"");
$smarty->assign("tsloginACL", chkacl($this->acl,"tslogin"));
$smarty->assign("workstations", $ws);
- $smarty->assign("sambaUserWorkstationACL", chkacl($this->acl,"sambauserworkstation"));
+ $smarty->assign("sambaUserWorkstationACL", chkacl($this->acl,"sambaUserWorkstation"));
}
/* Variables */
$smarty->assign("flagsK", "");
}
- $smarty->assign("allow_pwchangeACL", chkacl($this->acl, "allow_pwchange"));
- $smarty->assign("password_expiresACL", chkacl($this->acl, "password_expires"));
- $smarty->assign("no_password_requiredACL", chkacl($this->acl, "no_password_required"));
- $smarty->assign("temporary_disableACL", chkacl($this->acl, "temporary_disable"));
- $smarty->assign("sambaDomainNameACL", chkacl($this->acl, "sambaDomainName"));
- $smarty->assign("logon_time_setACL", chkacl($this->acl, "logon_time_set"));
- $smarty->assign("logoff_time_setACL", chkacl($this->acl, "logoff_time_set"));
- $smarty->assign("kickoff_time_setACL", chkacl($this->acl, "kickoff_time_set"));
- $smarty->assign("sambaLogonTimeACL", chkacl($this->acl, "sambaLogonTime"));
- $smarty->assign("sambaLogoffTimeACL", chkacl($this->acl, "sambaLogoffTime"));
- $smarty->assign("sambaKickoffTimeACL", chkacl($this->acl, "sambaKickoffTime"));
+ $smarty->assign("allow_pwchangeACL", chkacl($this->acl, "allow_pwchange"));
+ $smarty->assign("password_expiresACL", chkacl($this->acl, "password_expires"));
+ $smarty->assign("no_password_requiredACL", chkacl($this->acl, "no_password_required"));
+ $smarty->assign("temporary_disableACL", chkacl($this->acl, "temporary_disable"));
+ $smarty->assign("sambaDomainNameACL", chkacl($this->acl, "sambaDomainName"));
+ $smarty->assign("logon_time_setACL", chkacl($this->acl, "logon_time_set"));
+ $smarty->assign("logoff_time_setACL", chkacl($this->acl, "logoff_time_set"));
+ $smarty->assign("kickoff_time_setACL", chkacl($this->acl, "kickoff_time_set"));
+ $smarty->assign("sambaLogonTimeACL", chkacl($this->acl, "sambaLogonTime"));
+ $smarty->assign("sambaLogoffTimeACL", chkacl($this->acl, "sambaLogoffTime"));
+ $smarty->assign("sambaKickoffTimeACL", chkacl($this->acl, "sambaKickoffTime"));
/* In case of javascript, disable some fields on demand */
@DEBUG (DEBUG_LDAP, __LINE__, __FUNCTION__, __FILE__,
$this->attributes, "Save");
$ldap->cd($this->dn);
- $ldap->modify($this->attrs);
+ $this->cleanup();
+$ldap->modify ($this->attrs);
+
show_ldap_error($ldap->get_error());
/* Optionally execute a command after we're done */
/* Check for users primary group */
$ldap->cd($this->config->current['BASE']);
- $ldap->search("(&(objectClass=posixGroup)(gidNumber=".$this->gidNumber."))",
- array("cn"));
+ $ldap->search("(&(objectClass=posixGroup)(gidNumber=".$this->gidNumber."))", array("cn"));
if ($ldap->count() != 1){
print_red(_("Warning: Can't identify users primary group - no conversion to a samba group possible!"));
} else {
/* Write back to ldap */
$ldap->cd($this->dn);
- $ldap->modify($this->attrs);
+ $this->cleanup();
+$ldap->modify ($this->attrs);
+
show_ldap_error($ldap->get_error());
/* Optionally execute a command after we're done */