X-Git-Url: https://git.tokkee.org/?a=blobdiff_plain;f=gosa-core%2Finclude%2Fclass_gosaSupportDaemon.inc;h=1f0ace96d53023ff967279645cc5fa577357232e;hb=29dcf1374812069ab2f1b27a47e23c6d07004cf5;hp=01c12fcdea1ee751c1b34b8e75efd0fd0fd122f8;hpb=093493d86478e41b670f22c1f84ee0fb32fa5d28;p=gosa.git
diff --git a/gosa-core/include/class_gosaSupportDaemon.inc b/gosa-core/include/class_gosaSupportDaemon.inc
index 01c12fcde..1f0ace96d 100644
--- a/gosa-core/include/class_gosaSupportDaemon.inc
+++ b/gosa-core/include/class_gosaSupportDaemon.inc
@@ -84,6 +84,16 @@ class gosaSupportDaemon
return($this->is_connected);
}
+
+ /*! \brief Returns TRUE whether we are connected or not
+ @return BOOLEAN Returns TRUE when connected else FALSE
+ */
+ public function is_connected()
+ {
+ return($this->is_connected);
+ }
+
+
/*! \brief Disconnect from gosa daemon.
*/
@@ -129,12 +139,112 @@ class gosaSupportDaemon
public function get_error()
{
$str = $this->s_error;
- $str = preg_replace("/ /"," ",$str);
- return($str);
+ $ret = "";
+ if(is_string($str)){
+ $ret = $str;
+ }else{
+ foreach($str as $msg){
+ $ret .= $msg." ";
+ }
+ }
+ $ret = preg_replace("/ /"," ",$ret);
+ return($ret);
}
- public function FAI_get_packages($release,$attrs, $package = array())
+ public function FAI_get_kernels($release)
+ {
+ $xml_msg =
+ "".
+ "gosa_get_available_kernel".
+ "".
+ "GOSA".
+ "".$release."".
+ "";
+
+ $ret = array();
+ if($this->connect()){
+ $this->o_sock->write($xml_msg);
+ $str = trim($this->o_sock->read());
+
+ /* Check if something went wrong while reading */
+ if($this->o_sock->is_error()){
+ $this->set_error($this->o_sock->get_error());
+ return($ret);
+ }
+
+ $entries = $this->xml_to_array($str);
+ if(isset($entries['XML']) && is_array($entries['XML'])){
+
+ /* Check if returned values represent a valid answer */
+ if(isset($entries['XML'])){
+ if(isset($entries['XML']['ERROR_STRING'])) {
+ $this->set_error($entries['XML']['ERROR_STRING']);
+ new log("debug","GOsa-si",
+ get_class($this)."::".__FUNCTION__, array(),
+ "FAILED error was ".$this->get_error());
+ return($ret);
+ }
+
+ /* Unset header tags */
+ $ret = $entries['XML'];
+ foreach($ret as $key => $entry){
+ if(!preg_match("/^answer/i",$key)){
+ unset($ret[$key]);
+ }
+ }
+ }
+ }
+ }
+ return($ret);
+ }
+
+
+ public function FAI_get_package_sections($release)
+ {
+ $xml_msg = "gosa_query_packages_listGOSA".
+ "".
+ "".$release."";
+
+ $ret = array();
+ if($this->connect()){
+ $this->o_sock->write($xml_msg);
+ $str = trim($this->o_sock->read());
+
+ /* Check if something went wrong while reading */
+ if($this->o_sock->is_error()){
+ $this->set_error($this->o_sock->get_error());
+ return($ret);
+ }
+
+ $entries = $this->xml_to_array($str);
+ if(isset($entries['XML']) && is_array($entries['XML'])){
+
+ /* Check if returned values represent a valid answer */
+ if(isset($entries['XML'])){
+ if(isset($entries['XML']['ERROR_STRING'])) {
+ $this->set_error($entries['XML']['ERROR_STRING']);
+ new log("debug","GOsa-si",
+ get_class($this)."::".__FUNCTION__, array(),
+ "FAILED error was ".$this->get_error());
+ return($ret);
+ }
+
+ /* Unset header tags */
+ foreach(array("HEADER","SOURCE","TARGET","SESSION_ID") as $type){
+ if(isset($entries['XML'][$type])){
+ unset($entries['XML'][$type]);
+ }
+ }
+ $ret = $entries['XML'];
+ }
+ }
+ }
+ return($ret);
+ }
+
+
+ public function FAI_get_packages($release,$attrs,$package,$from=-1,$to=-1)
{
$this->reset_error();
$ret = array();
@@ -145,46 +255,44 @@ class gosaSupportDaemon
return($ret);
}
+ /* Check Parameter */
+ if(!is_array($package)){
+ trigger_error("Third parameter must be an array. With at least one attribute name.");
+ return($ret);
+ }
+
/* Create list of attributes to fetch */
$attr = "";
foreach($attrs as $at){
$attr.= "";
}
+ /* If no package is given, search for all */
+ if(!count($package)) $package = array("%");
+
+ /* Create limit tag */
+ if($from == -1){
+ $limit ="";
+ }else{
+ $limit = "".$from."".$to."";
+ }
+
/* Create list of attributes to fetch */
$pkgs = "";
foreach($package as $pkg){
- $pkgs .="
-
- like
- ".$pkg."
-
- ";
-
+ $pkgs .="like".$pkg."";
}
- /* Create Daemon query */
- if(!count($package)){
- $xml_msg = "gosa_query_packages_listGOSA".
- $attr.
- "".$release."
- ";
- }else{
- $xml_msg = "gosa_query_packages_listGOSA".
- $attr.
- "
-
- AND
- ".$release."
-
- OR
- ".$pkgs."
-
-
-
- 0100
- ";
- }
+ $xml_msg = "gosa_query_packages_listGOSA".
+ $attr.
+ "
+ ".$release."
+ OR
+ ".$pkgs."
+
+ ".
+ $limit.
+ "";
if($this->connect()){
$this->o_sock->write($xml_msg);
@@ -331,21 +439,21 @@ class gosaSupportDaemon
}
$xml_msg =
-"
+ "gosa_query_jobdbGOSA
".$tags."
".$sort."";
-if($from != -1 && $to != -1){
-$xml_msg.= "
-
- ".$from."
- ".$to."
- ";
-}
-$xml_msg.= "
+ if($from != -1 && $to != -1){
+ $xml_msg.= "
+
+ ".$from."
+ ".$to."
+ ";
+ }
+ $xml_msg.= "
";
if($this->connect()){
@@ -424,7 +532,7 @@ $xml_msg.= "
$entries = $this->xml_to_array($str);
if(isset($entries['XML']) && is_array($entries['XML'])){
foreach($entries['XML'] as $entry){
- if(isset($entry['ID'])){
+ if(is_array($entry) && array_key_exists("ID",$entry)){
$ret[] = $entry['ID'];
}
}
@@ -728,14 +836,33 @@ $xml_msg.= "
}
}
if ($xml_elem['type'] == 'complete') {
+
$start_level = 1;
- $php_stmt = '$params';
+ $test2 = &$params;
while($start_level < $xml_elem['level']) {
- $php_stmt .= '[$level['.$start_level.']]';
+ $test2 = &$test2[$level[$start_level]];
$start_level++;
}
- $php_stmt .= '[$xml_elem[\'tag\']] = $xml_elem[\'value\'];';
- @eval($php_stmt);
+
+ /* Save tag attributes too.
+ e.g.
+ */
+ if(isset($xml_elem['attributes'])){
+ foreach($xml_elem['attributes'] as $name => $value){
+ $test2['ATTRIBUTES'][$name] = $value;
+ }
+ }
+
+ if(!isset($test2[$xml_elem['tag']])){
+ if(isset($xml_elem['value'])){
+ $test2[$xml_elem['tag']] = $xml_elem['value'];
+ }
+ }else{
+ if(!is_array($test2[$xml_elem['tag']])){
+ $test2[$xml_elem['tag']] = array($test2[$xml_elem['tag']]);
+ }
+ $test2[$xml_elem['tag']][] = $xml_elem['value'];
+ }
}
}
}
@@ -771,6 +898,7 @@ $xml_msg.= "
$attr = "";
foreach($data as $key => $value){
+ $key = strtolower($key);
if(is_array($value)){
foreach($value as $sub_value){
$attr.= "<$key>".strtolower($sub_value)."$key>\n";
@@ -829,8 +957,29 @@ $xml_msg.= "
/*! \brief Returns the number of currently queued objects.
@return Integer
*/
- public function number_of_queued_entries()
+ public function number_of_queued_entries($event_types)
{
+ $tags = "";
+ foreach($event_types as $type){
+ $tags .= "".$type."";
+ }
+ if(count($event_types) > 1){
+ $tags = "or".$tags;
+ }
+ if(count($event_types)){
+ $tags = "".$tags."";
+ }
+
+
+ $xml_msg =
+ "".
+ "gosa_query_jobdb".
+ "GOSA".
+ "".
+ "".
+ $tags.
+ "";
+
$xml_msg ="gosa_count_jobdbGOSA";
$this->connect();
if($this->connect()){
@@ -962,6 +1111,9 @@ $xml_msg.= "
if(isset($entries['XML']['ERROR_STRING'])) {
$this->set_error($entries['XML']['ERROR_STRING']);
new log("debug","DaemonEvent (IDS) ", "gosaSupportDaemon::_send()", array($data=>$data),"FAILED ".$this->get_error());
+ }elseif(isset($entries['XML']['ERROR'])){
+ $this->set_error($entries['XML']['ERROR']);
+ new log("debug","DaemonEvent (IDS) ", "gosaSupportDaemon::_send()", array($data=>$data),"FAILED ".$this->get_error());
}else{
new log("debug","DaemonEvent (IDS) ", "gosaSupportDaemon::_send()", array($data=>$data),"SUCCESS");
}
@@ -985,7 +1137,7 @@ $xml_msg.= "
foreach ($data as $key => $value){
if(is_array($value)){
foreach($value as $sub_val){
- $xml_message.= "<$key>$sub_value$key>";
+ $xml_message.= "<$key>$sub_val$key>";
}
}else{
$xml_message.= "<$key>$value$key>";
@@ -1074,18 +1226,736 @@ $xml_msg.= "
}
-static function ping($target)
-{
- if (tests::is_mac($target)){
- /* Get communication object */
- $d= new gosaSupportDaemon(TRUE,0.5);
- $answer= $d->_send("gosa_ping$target", TRUE);
- return (count($answer) ? TRUE:FALSE);
+ static function ping($target)
+ {
+ if (tests::is_mac($target)){
+ /* Get communication object */
+ $d= new gosaSupportDaemon(TRUE,0.5);
+ $answer= $d->_send("gosa_ping$target", TRUE);
+ return (count($answer) ? TRUE:FALSE);
+ }
+ return (FALSE);
}
- return (FALSE);
-}
+
+ /*! \brief Returns a list of all configured principals.
+ (Uses the GOsa support daemon instead of the ldap database.)
+ @return Array A list containing the names of all configured principals.
+ */
+ public function krb5_list_principals($server)
+ {
+ $res = array();
+
+ /* Check if the given server is a valid mac address
+ */
+ if(!tests::is_mac($server)){
+ trigger_error("The given server address '".$server."' is invalid, it must be a valid mac address");
+ return($ret);
+ }
+
+ /* Prepare request event
+ */
+ $xml_msg =
+ "".
+ "gosa_krb5_list_principals".
+ "".
+ "".$server."".
+ "";
+
+ $tmp = $this->_send($xml_msg,TRUE);
+ if(isset($tmp['XML']['PRINCIPAL'])){
+ return($tmp['XML']['PRINCIPAL']);
+ }else{
+ return($res);
+ }
+ }
+
+
+ /*! \brief Returns the configuration settings for a given principal name.
+ (Uses the GOsa support daemon instead of the ldap database.)
+ @pram String The name of the requested principal. (e.g. peter@EXAMPLE.DE)
+ @return Array A list containing the names of all configured principals.
+ */
+ public function krb5_get_principal($server,$name)
+ {
+ $ret = array();
+
+ /* Check if the given name is a valid request value
+ */
+ if(!is_string($name) || empty($name)){
+ trigger_error("The given principal name is not of type string or it is empty.");
+ return($ret);
+ }
+
+ /* Check if the given server is a valid mac address
+ */
+ if(!tests::is_mac($server)){
+ trigger_error("The given server address '".$server."' is invalid, it must be a valid mac address");
+ return($ret);
+ }
+
+ /* Prepare request event
+ */
+ $xml_msg =
+ "".
+ "gosa_krb5_get_principal".
+ "".$name."".
+ "".
+ "".$server."".
+ "";
+
+ $res = $this->_send($xml_msg,TRUE);
+ if(isset($res['XML'])){
+ return($res['XML']);
+ }else{
+ return($ret);
+ }
+ }
+
+
+ /*! \brief Creates a given principal with a set of configuration settings.
+ For a list of configurable attributes have a look at 'krb5_get_principal()'.
+ (Uses the GOsa support daemon instead of the ldap database.)
+ @pram String The name of the principal to update. (e.g. peter@EXAMPLE.DE)
+ @return Boolean TRUE on success else FALSE.
+ */
+ public function krb5_add_principal($server,$name,$values)
+ {
+ $ret = FALSE;
+
+ /* Check if the given name is a valid request value
+ */
+ if(!is_string($name) || empty($name)){
+ trigger_error("The given principal name is not of type string or it is empty.");
+ return($ret);
+ }
+ if(!is_array($values)){
+ trigger_error("No valid update settings given. The parameter must be of type array and must contain at least one entry");
+ return($ret);
+ }
+
+ /* Check if the given server is a valid mac address
+ */
+ if(!tests::is_mac($server)){
+ trigger_error("The given server address '".$server."' is invalid, it must be a valid mac address");
+ return($ret);
+ }
+
+ $attrs = "";
+ foreach($values as $key => $value){
+ if(empty($key) || is_numeric($key)){
+ trigger_error("Invalid configuration attribute given '".$key."=".$value."'.");
+ return($ret);
+ }
+ $key = strtolower($key);
+ if(is_array($value)){
+ foreach($value as $val){
+ $attrs.= "<$key>$val$key>\n";
+ }
+ }else{
+ $attrs.= "<$key>$value$key>\n";
+ }
+ }
+
+ /* Prepare request event
+ */
+ $xml_msg =
+ "".
+ "gosa_krb5_create_principal".
+ "".$name."".
+ $attrs.
+ "".
+ "".$server."".
+ "";
+
+ return($this->_send($xml_msg,TRUE) == TRUE && !$this->is_error());
+ }
+
+
+ function krb5_ramdomize_key($server,$name)
+ {
+ /* Prepare request event
+ */
+ $xml_msg =
+ "".
+ "gosa_krb5_randomize_key".
+ "".$name."".
+ "".
+ "".$server."".
+ "";
+
+ return($this->_send($xml_msg,TRUE) == TRUE && !$this->is_error());
+ }
+
+
+
+ /*! \brief Updates a given principal with a set of configuration settings.
+ For a list of configurable attributes have a look at 'krb5_get_principal()'.
+ (Uses the GOsa support daemon instead of the ldap database.)
+ @pram String The name of the principal to update. (e.g. peter@EXAMPLE.DE)
+ @return Boolean TRUE on success else FALSE.
+ */
+ public function krb5_set_principal($server,$name,$values)
+ {
+ $ret = FALSE;
+
+ /* Check if the given name is a valid request value
+ */
+ if(!is_string($name) || empty($name)){
+ trigger_error("The given principal name is not of type string or it is empty.");
+ return($ret);
+ }
+ if(!is_array($values) || !count($values)){
+ trigger_error("No valid update settings given. The parameter must be of type array and must contain at least one entry");
+ return($ret);
+ }
+
+ /* Check if the given server is a valid mac address
+ */
+ if(!tests::is_mac($server)){
+ trigger_error("The given server address '".$server."' is invalid, it must be a valid mac address");
+ return($ret);
+ }
+
+ $attrs = "";
+ foreach($values as $key => $value){
+ if(empty($key) || is_numeric($key)){
+ trigger_error("Invalid configuration attribute given '".$key."=".$value."'.");
+ return($ret);
+ }
+ $key = strtolower($key);
+ if(is_array($value)){
+ foreach($value as $val){
+ $attrs.= "<$key>$val$key>\n";
+ }
+ }else{
+ $attrs.= "<$key>$value$key>\n";
+ }
+ }
+
+ /* Prepare request event
+ */
+ $xml_msg =
+ "".
+ "gosa_krb5_modify_principal".
+ "".$name."".
+ $attrs.
+ "".
+ "".$server."".
+ "";
+
+ return($this->_send($xml_msg,TRUE) == TRUE && !$this->is_error());
+ }
+
+
+ /*! \brief Removes the given principal.
+ (Uses the GOsa support daemon instead of the ldap database.)
+ @pram String The name of the principal. (e.g. peter@EXAMPLE.DE)
+ @return Boollean TRUE on success else FALSE
+ */
+ public function krb5_del_principal($server,$name)
+ {
+ $ret = FALSE;
+
+ /* Check if the given name is a valid request value
+ */
+ if(!is_string($name) || empty($name)){
+ trigger_error("The given principal name is not of type string or it is empty.");
+ return($ret);
+ }
+
+ /* Check if the given server is a valid mac address
+ */
+ if(!tests::is_mac($server)){
+ trigger_error("The given server address '".$server."' is invalid, it must be a valid mac address");
+ return($ret);
+ }
+
+ /* Prepare request event
+ */
+ $xml_msg =
+ "".
+ "gosa_krb5_del_principal".
+ "".$name."".
+ "".
+ "".$server."".
+ "";
+
+ return($this->_send($xml_msg,TRUE) == TRUE && !$this->is_error());
+ }
+
+
+ /*! \brief Returns a list of configured password policies.
+ (Uses the GOsa support daemon instead of the ldap database.)
+ @return Array A list of all configured password policies.
+ */
+ public function krb5_list_policies($server)
+ {
+ $res = array();
+
+ /* Check if the given server is a valid mac address
+ */
+ if(!tests::is_mac($server)){
+ trigger_error("The given server address '".$server."' is invalid, it must be a valid mac address");
+ return($ret);
+ }
+
+ /* Prepare request event
+ */
+ $xml_msg =
+ "".
+ "gosa_krb5_list_policies".
+ "".
+ "".$server."".
+ "";
+
+ $res = $this->_send($xml_msg,TRUE);
+
+ /* Check if there are results for POLICY
+ */
+ if(isset($res['XML']['POLICY'])){
+
+ /* Ensure that we return an array
+ */
+ $tmp = $res['XML']['POLICY'];
+ if(!is_array($tmp)){
+ $tmp = array($tmp);
+ }
+ return($tmp);
+ }else{
+ return(array());
+ }
+ }
+
+
+ /*! \brief Returns a list of configured password policies.
+ (Uses the GOsa support daemon instead of the ldap database.)
+ @return Array The policy settings for the given policy name.
+ */
+ public function krb5_get_policy($server,$name)
+ {
+ $res = array();
+
+ /* Check if the given name is a valid request value
+ */
+ if(!is_string($name) || empty($name)){
+ trigger_error("The given policy name is not of type string or it is empty.");
+ return($ret);
+ }
+
+ /* Check if the given server is a valid mac address
+ */
+ if(!tests::is_mac($server)){
+ trigger_error("The given server address '".$server."' is invalid, it must be a valid mac address");
+ return($ret);
+ }
+
+ /* Prepare request event
+ */
+ $xml_msg =
+ "".
+ "gosa_krb5_get_policy".
+ "".$name."".
+ "".
+ "".$server."".
+ "";
+
+ /* Possible attributes */
+ $attrs = array("MASK","POLICY","PW_HISTORY_NUM","PW_MAX_LIFE",
+ "PW_MIN_CLASSES","PW_MIN_LENGTH","PW_MIN_LIFE","POLICY_REFCNT");
+
+
+ $tmp = $this->_send($xml_msg,TRUE);
+ if(isset($tmp['XML'])){
+ foreach($attrs as $attr){
+ if(isset($tmp['XML'][$attr])){
+ $ret[$attr] = $tmp['XML'][$attr];
+ }else{
+ $ret[$attr] = "";
+ }
+ }
+ }
+ return($ret);
+ }
+
+
+ /*! \brief Creates a new policy with a given set of configuration settings.
+ For a list of configurable attributes have a look at 'krb5_get_policy()'.
+ (Uses the GOsa support daemon instead of the ldap database.)
+ @pram String The name of the policy to update.
+ @pram Array The attributes to update
+ @return Boolean TRUE on success else FALSE.
+ */
+ public function krb5_add_policy($server,$name,$values)
+ {
+ $ret = FALSE;
+
+ /* Check if the given name is a valid request value
+ */
+ if(!is_string($name) || empty($name)){
+ trigger_error("The given policy name is not of type string or it is empty.");
+ return($ret);
+ }
+ if(!is_array($values) || !count($values)){
+ trigger_error("No valid policy settings given. The parameter must be of type array and must contain at least one entry");
+ return($ret);
+ }
+
+ /* Check if the given server is a valid mac address
+ */
+ if(!tests::is_mac($server)){
+ trigger_error("The given server address '".$server."' is invalid, it must be a valid mac address");
+ return($ret);
+ }
+
+
+ /* Transform array into
+ */
+ $attrs = "";
+ foreach($values as $id => $value){
+ if(empty($id) || is_numeric($id)){
+ trigger_error("Invalid policy configuration attribute given '".$id."=".$value."'.");
+ return($ret);
+ }
+ $id = strtolower($id);
+ $attrs.= "<$id>$value$id>\n";
+ }
+
+ /* Prepare request event
+ */
+ $xml_msg =
+ "".
+ "gosa_krb5_create_policy".
+ "".$name."".
+ $attrs.
+ "".
+ "".$server."".
+ "";
+
+ return($this->_send($xml_msg,TRUE) == TRUE && !$this->is_error());
+ }
+
+
+ /*! \brief Updates a given policy with a set of configuration settings.
+ For a list of configurable attributes have a look at 'krb5_get_policy()'.
+ (Uses the GOsa support daemon instead of the ldap database.)
+ @pram String The name of the policy to update.
+ @return Boolean TRUE on success else FALSE.
+ */
+ public function krb5_set_policy($server,$name,$values)
+ {
+ $ret = FALSE;
+
+ /* Check if the given name is a valid request value
+ */
+ if(!is_string($name) || empty($name)){
+ trigger_error("The given policy name is not of type string or it is empty.");
+ return($ret);
+ }
+ if(!is_array($values) || !count($values)){
+ trigger_error("No valid policy settings given. The parameter must be of type array and must contain at least one entry");
+ return($ret);
+ }
+
+ /* Check if the given server is a valid mac address
+ */
+ if(!tests::is_mac($server)){
+ trigger_error("The given server address '".$server."' is invalid, it must be a valid mac address");
+ return($ret);
+ }
+
+ /* Transform array into
+ */
+ $attrs = "";
+ foreach($values as $id => $value){
+ if(preg_match("/^policy$/i",$id)) continue;
+ if(empty($id) || is_numeric($id)){
+ trigger_error("Invalid policy configuration attribute given '".$id."=".$value."'.");
+ return($ret);
+ }
+ $id = strtolower($id);
+ $attrs.= "<$id>$value$id>\n";
+ }
+
+ /* Prepare request event
+ */
+ $xml_msg =
+ "".
+ "gosa_krb5_modify_policy".
+ "".$name."".
+ $attrs.
+ "".
+ "".$server."".
+ "";
+
+ return($this->_send($xml_msg,TRUE) == TRUE && !$this->is_error());
+ }
+
+
+ /*! \brief Removes the given password policy.
+ (Uses the GOsa support daemon instead of the ldap database.)
+ @return Boolean TRUE on success else FALSE
+ */
+ public function krb5_del_policy($server,$name)
+ {
+ $ret = FALSE;
+
+ /* Check if the given server is a valid mac address
+ */
+ if(!tests::is_mac($server)){
+ trigger_error("The given server address '".$server."' is invalid, it must be a valid mac address");
+ return($ret);
+ }
+
+ /* Check if the given name is a valid request value
+ */
+ if(!is_string($name) || empty($name)){
+ trigger_error("The given policy name is not of type string or it is empty.");
+ return($ret);
+ }
+
+ /* Prepare request event
+ */
+ $xml_msg =
+ "".
+ "gosa_krb5_del_policy".
+ "".$name."".
+ "".
+ "".$server."".
+ "";
+ return($this->_send($xml_msg,TRUE) == TRUE && !$this->is_error());
+ }
+
+
+ /*! \brief Sets the password of for the given principal.
+ (Uses the GOsa support daemon instead of the ldap database.)
+ @param String The servers mac
+ @param String The principals name
+ @param String $the new password.
+ @return Boolean TRUE on success else FALSE
+ */
+ public function krb5_set_password($server,$name,$password)
+ {
+ $ret = FALSE;
+
+ /* Check if the given server is a valid mac address
+ */
+ if(!tests::is_mac($server)){
+ trigger_error("The given server address '".$server."' is invalid, it must be a valid mac address");
+ return($ret);
+ }
+
+ /* Check if the given name is a valid request value
+ */
+ if(!is_string($name) || empty($name)){
+ trigger_error("The given principal name is not of type string or it is empty.");
+ return($ret);
+ }
+
+ /* Prepare request event
+ */
+ $xml_msg =
+ "".
+ "gosa_krb5_set_password".
+ "".$name."".
+ "".$password."".
+ "".
+ "".$server."".
+ "";
+ return($this->_send($xml_msg,TRUE) == TRUE && !$this->is_error());
+ }
+
+
+ /*! \brief Returns log file informations for a given mac address
+ @param $mac The mac address to fetch logs for.
+ @retrun Array A Multidimensional array containing log infos.
+ MAC_00_01_6C_9D_B9_FA['install_20080311_090900'][0]=debconf.log
+ MAC_00_01_6C_9D_B9_FA['install_20080311_090900'][1]=syslog.log
+ install_20080313_144450 ...
+ */
+ public function get_log_info_for_mac($mac)
+ {
+ $xml_msg = "
+
+ gosa_show_log_by_mac
+ GOSA
+
+ ".$mac."
+ ";
+
+ $res = $this->_send($xml_msg,TRUE);
+ $ret = array();
+ if(isset($res['XML'])){
+
+ /* Filter all entry that look like this
+ MAC_00_01_6C_9D_B9_FA
+ */
+ foreach($res['XML'] as $name => $entry){
+ if(preg_match("/^MAC/",$name)){
+
+ /* Get list of available log files
+ */
+ foreach($entry as $log_date){
+ $xml_msg2 = "
+ gosa_show_log_files_by_date_and_mac
+ GOSA
+
+ ".$log_date."
+ ".$mac."
+ ";
+
+ $ret[$mac][$log_date] = array();
+ $res = $this->_send($xml_msg2,TRUE);
+ $ret[$mac][$log_date]['DATE_STR'] = $log_date;
+ $ret[$mac][$log_date]['REAL_DATE'] = strtotime(preg_replace("/[^0-9]*/","",$log_date));
+ if(isset($res['XML']['SHOW_LOG_FILES_BY_DATE_AND_MAC'])){
+ $ret[$mac][$log_date]['FILES'] = $res['XML']['SHOW_LOG_FILES_BY_DATE_AND_MAC'];
+ }
+ }
+ }
+ }
+ }
+ return($ret);
+ }
+
+ public function get_log_file($mac,$date,$file)
+ {
+ $xml_msg ="
+
+ gosa_get_log_file_by_date_and_mac
+ GOSA
+
+ ".$date."
+ ".$mac."
+ ".$file."
+ ";
+
+ $res = $this->_send($xml_msg,TRUE);
+ if(isset($res['XML'][strtoupper($file)])){
+ return(base64_decode($res['XML'][strtoupper($file)]));
+ }
+ return("");
+ }
+
+
+
+
+
+ /*****************
+ * DAK - Functions
+ *****************/
+
+ /*! \brief Returns all currenlty queued entries for a given DAK repository
+ @param ...
+ @return Array All queued entries.
+ */
+ public function DAK_keyring_entries($server)
+ {
+ /* Ensure that we send the event to a valid mac address
+ */
+ if(!is_string($server) || !tests::is_mac($server)){
+ trigger_error("No valid mac address given '".$server."'.");
+ return;
+ }
+
+ /* Create query
+ */
+ $xml_msg = "
+ gosa_get_dak_keyring
+ ".$server."
+
+ ";
+
+ $res = $this->_send($xml_msg,TRUE);
+
+ /* Check if there are results for POLICY
+ */
+ if(isset($res['XML'])){
+ $ret = array();
+ foreach($res['XML'] as $key => $entry){
+ if(preg_match("/^ANSWER/",$key)){
+ $ret[] = $entry;
+ }
+ }
+ return($ret);
+ }else{
+ return(array());
+ }
+ }
+
+
+ /*! \brief Imports the given key into the specified keyring (Servers mac address)
+ @param String The servers mac address
+ @param String The gpg key.
+ @return Boolean TRUE on success else FALSE
+ */
+ public function DAK_import_key($server,$key)
+ {
+ /* Ensure that we send the event to a valid mac address
+ */
+ if(!is_string($server) || !tests::is_mac($server)){
+ trigger_error("No valid mac address given '".$server."'.");
+ return;
+ }
+
+ /* Check if there is some cleanup required before importing the key.
+ There may be some Header lines like:
+ -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.4.6 (GNU/Linux)
+ */
+ if(preg_match("/".normalizePreg("BEGIN PGP PUBLIC KEY BLOCK")."/",$key)){
+
+ /* Remove header */
+ $key = preg_replace("/^.*\n\n/sim","",$key);
+ /* Remove footer */
+ $key = preg_replace("/-----.*$/sim","",$key);
+ }elseif (!preg_match('%^[a-zA-Z0-9/+]*={0,2}$%', $key)) {
+
+ /* Encode key if it is raw.
+ */
+ $key = base64_encode($key);
+ }
+
+ /* Create query
+ */
+ $xml_msg = "
+ gosa_import_dak_key
+ ".$server."
+ ".$key."
+
+ ";
+
+ $res = $this->_send($xml_msg,TRUE);
+ return($this->is_error());
+ }
+
+
+ /*! \brief Removes a key from the keyring on the given server.
+ @param String The servers mac address
+ @param String The gpg key uid.
+ @return Boolean TRUE on success else FALSE
+ */
+ public function DAK_remove_key($server,$key)
+ {
+ /* Ensure that we send the event to a valid mac address
+ */
+ if(!is_string($server) || !tests::is_mac($server)){
+ trigger_error("No valid mac address given '".$server."'.");
+ return;
+ }
+
+ /* Create query
+ */
+ $xml_msg = "
+ gosa_remove_dak_key
+ ".$server."
+ ".$key."
+
+ ";
+
+ $res = $this->_send($xml_msg,TRUE);
+ return($this->is_error());
+ }
}
// vim:tabstop=2:expandtab:shiftwidth=2:filetype=php:syntax:ruler: