X-Git-Url: https://git.tokkee.org/?a=blobdiff_plain;f=gosa-core%2Finclude%2Ffunctions.inc;h=7675ff23e7d502e8c01a834a67a6a615eb9915ef;hb=267e1e39976840e73256c8f0c5eec9a69371900e;hp=7cd830f5021191dc1e7a3e8a61964a8b3e9fc1a8;hpb=8e7ac286389669883b1a5684127b6d1e0a63b91f;p=gosa.git diff --git a/gosa-core/include/functions.inc b/gosa-core/include/functions.inc index 7cd830f50..7675ff23e 100644 --- a/gosa-core/include/functions.inc +++ b/gosa-core/include/functions.inc @@ -1,7 +1,9 @@ "ae", /* Class autoloader */ function __autoload($class_name) { global $class_mapping, $BASE_DIR; + + if ($class_mapping === NULL){ + echo sprintf(_("Fatal error: no class locations defined - please run '%s' to fix this"), "update-gosa"); + exit; + } + if (isset($class_mapping[$class_name])){ require_once($BASE_DIR."/".$class_mapping[$class_name]); } else { - echo _("Fatal: cannot load class \"$class_name\" - execution aborted"); + echo sprintf(_("Fatal error: cannot instantiate class '%s' - try running '%s' to fix this"), $class_name, "update-gosa"); + exit; } } + +/*! \brief Checks if a class is available. + * @param name String The class name. + * @return boolean True if class is available, else false. + */ +function class_available($name) +{ + global $class_mapping; + return(isset($class_mapping[$name])); +} + + +/* Check if plugin is avaliable */ +function plugin_available($plugin) +{ + global $class_mapping, $BASE_DIR; + + if (!isset($class_mapping[$plugin])){ + return false; + } else { + return is_readable($BASE_DIR."/".$class_mapping[$plugin]); + } +} + + /* Create seed with microseconds */ function make_seed() { list($usec, $sec) = explode(' ', microtime()); @@ -111,7 +144,7 @@ function make_seed() { /* Debug level action */ function DEBUG($level, $line, $function, $file, $data, $info="") { - if (get_global('DEBUGLEVEL') & $level){ + if (session::get('DEBUGLEVEL') & $level){ $output= "DEBUG[$level] "; if ($function != ""){ $output.= "($file:$function():$line) - $info: "; @@ -166,10 +199,10 @@ function get_browser_language() /* Rewrite ui object to another dn */ function change_ui_dn($dn, $newdn) { - $ui= get_global('ui'); + $ui= session::get('ui'); if ($ui->dn == $dn){ $ui->dn= $newdn; - register_global('ui',$ui); + session::set('ui',$ui); } } @@ -193,7 +226,7 @@ function get_template_path($filename= '', $plugin= FALSE, $path= "") /* Return plugin dir or root directory? */ if ($plugin){ if ($path == ""){ - $nf= preg_replace("!^".$BASE_DIR."/!", "", get_global('plugin_dir')); + $nf= preg_replace("!^".$BASE_DIR."/!", "", session::get('plugin_dir')); } else { $nf= preg_replace("!^".$BASE_DIR."/!", "", $path); } @@ -204,7 +237,7 @@ function get_template_path($filename= '', $plugin= FALSE, $path= "") return ("$BASE_DIR/ihtml/themes/default/$nf/$filename"); } if ($path == ""){ - return (get_global('plugin_dir')."/$filename"); + return (session::get('plugin_dir')."/$filename"); } else { return ($path."/$filename"); } @@ -251,7 +284,6 @@ function gosa_array_merge($ar1,$ar2) } - function gosa_log ($message) { global $ui; @@ -281,7 +313,7 @@ function ldap_init ($server, $base, $binddn='', $pass='') isset($config->current['TLS']) && $config->current['TLS'] == "true"); /* Sadly we've no proper return values here. Use the error message instead. */ - if (!preg_match("/Success/i", $ldap->error)){ + if (!$ldap->success()){ echo sprintf(_("FATAL: Error when connecting the LDAP. Server said '%s'."), $ldap->get_error()); exit(); } @@ -307,11 +339,11 @@ function process_htaccess ($username, $kerberos= FALSE) /* Look for entry or realm */ $ldap= $config->get_ldap_link(); - if (!preg_match("/Success/i", $ldap->error)){ - print_red(sprintf(_("User login failed. LDAP server said '%s'."), $ldap->get_error())); + if (!$ldap->success()){ + msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error(), "", LDAP_AUTH, ERROR_DIALOG)); $smarty= get_smarty(); $smarty->display(get_template_path('headers.tpl')); - echo "".get_global('errors').""; + echo "".session::get('errors').""; exit(); } $ldap->search("(&(objectClass=gosaAccount)(|(uid=$username)(userPassword={$mode}$username)))", array("uid")); @@ -334,17 +366,17 @@ function ldap_login_user_htaccess ($username) /* Look for entry or realm */ $ldap= $config->get_ldap_link(); - if (!preg_match("/Success/i", $ldap->error)){ - print_red(sprintf(_("User login failed. LDAP server said '%s'."), $ldap->get_error())); + if (!$ldap->success()){ + msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error(), "", LDAP_AUTH, FATAL_ERROR_DIALOG)); $smarty= get_smarty(); $smarty->display(get_template_path('headers.tpl')); - echo "".get_global('errors').""; + echo "".session::get('errors').""; exit(); } $ldap->search("(&(objectClass=gosaAccount)(uid=$username))", array("uid")); /* Found no uniq match? Strange, because we did above... */ if ($ldap->count() != 1) { - print_red(_("Username / UID is not unique. Please check your LDAP database.")); + msg_dialog::display(_("LDAP error"), _("Username / UID is not unique inside the LDAP tree!"), FATAL_ERROR_DIALOG); return (NULL); } $attrs= $ldap->fetch(); @@ -360,7 +392,7 @@ function ldap_login_user_htaccess ($username) $ui->loadACL(); /* TODO: check java script for htaccess authentication */ - $_SESSION['js']= true; + session::set('js',true); return ($ui); } @@ -372,11 +404,11 @@ function ldap_login_user ($username, $password) /* look through the entire ldap */ $ldap = $config->get_ldap_link(); - if (!preg_match("/Success/i", $ldap->error)){ - print_red(sprintf(_("User login failed. LDAP server said '%s'."), $ldap->get_error())); + if (!$ldap->success()){ + msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error()), FATAL_ERROR_DIALOG); $smarty= get_smarty(); $smarty->display(get_template_path('headers.tpl')); - echo "".get_global('errors').""; + echo "".session::get('errors').""; exit(); } $ldap->cd($config->current['BASE']); @@ -414,7 +446,7 @@ function ldap_login_user ($username, $password) /* found more than one matching id */ default: - print_red(_("Username / UID is not unique. Please check your LDAP database.")); + msg_dialog::display(_("Internal error"), _("Username / UID is not unique inside the LDAP tree. Please contact your Administrator."), FATAL_ERROR_DIALOG); return (NULL); } @@ -441,7 +473,7 @@ function ldap_login_user ($username, $password) $config->current['RECURSIVE'] == "true", isset($config->current['TLS']) && $config->current['TLS'] == "true"); - if (!preg_match("/Success/i", $ldap->error)){ + if (!$ldap->success()){ return (NULL); } @@ -545,6 +577,7 @@ function ldap_expired_account($config, $userdn, $username) return($expired); } + function add_lock ($object, $user) { global $config; @@ -558,7 +591,7 @@ function add_lock ($object, $user) /* Just a sanity check... */ if ($object == "" || $user == ""){ - print_red(_("Error while adding a lock. Parameters are not set correctly, please check the source!")); + msg_dialog::display(_("Internal error"), _("Error while adding a lock. Contact the developers!"), ERROR_DIALOG); return; } @@ -567,8 +600,8 @@ function add_lock ($object, $user) $ldap->cd ($config->current['CONFIG']); $ldap->search("(&(objectClass=gosaLockEntry)(gosaUser=$user)(gosaObject=".base64_encode($object)."))", array("gosaUser")); - if (!preg_match("/Success/i", $ldap->error)){ - print_red (sprintf(_("Can't set locking information in LDAP database. Please check the 'config' entry in gosa.conf! LDAP server says '%s'."), $ldap->get_error())); + if (!$ldap->success()){ + msg_dialog::display(_("Configuration error"), sprintf(_("Cannot create locking information in LDAP tree. Please contact your administrator!")."

"._('LDAP server returned: %s'), "

".$ldap->get_error().""), ERROR_DIALOG); return; } @@ -582,9 +615,8 @@ function add_lock ($object, $user) $attrs["gosaObject"] = base64_encode($object); $attrs["cn"] = "$name"; $ldap->add($attrs); - if (!preg_match("/Success/i", $ldap->error)){ - print_red(sprintf(_("Adding a lock failed. LDAP server says '%s'."), - $ldap->get_error())); + if (!$ldap->success()){ + msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error(), "cn=$name,".$config->current['CONFIG'], 0, ERROR_DIALOG)); return; } } @@ -612,12 +644,11 @@ function del_lock ($object) $ldap->cd ($config->current['CONFIG']); $ldap->search ("(&(objectClass=gosaLockEntry)(gosaObject=".base64_encode($object)."))", array("gosaObject")); $attrs= $ldap->fetch(); - if ($ldap->getDN() != "" && preg_match("/Success/i", $ldap->error)){ + if ($ldap->getDN() != "" && $ldap->success()){ $ldap->rmdir ($ldap->getDN()); - if (!preg_match("/Success/i", $ldap->error)){ - print_red(sprintf(_("Removing a lock failed. LDAP server says '%s'."), - $ldap->get_error())); + if (!$ldap->success()){ + msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error(), $ldap->getDN(), LDAP_DEL, ERROR_DIALOG)); return; } } @@ -646,7 +677,7 @@ function get_lock ($object) /* Sanity check */ if ($object == ""){ - print_red(_("Getting the lock from LDAP failed. Parameters are not set correctly, please check the source!")); + msg_dialog::display(_("Internal error"), _("Error while adding a lock. Contact the developers!"), ERROR_DIALOG); return(""); } @@ -655,8 +686,8 @@ function get_lock ($object) $ldap= $config->get_ldap_link(); $ldap->cd ($config->current['CONFIG']); $ldap->search("(&(objectClass=gosaLockEntry)(gosaObject=".base64_encode($object)."))", array("gosaUser")); - if (!preg_match("/Success/i", $ldap->error)){ - print_red (_("Can't get locking information in LDAP database. Please check the 'config' entry in gosa.conf!")); + if (!$ldap->success()){ + msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error(), "", LDAP_SEARCH, ERROR_DIALOG)); return(""); } @@ -664,7 +695,7 @@ function get_lock ($object) if ($ldap->count() > 1){ /* Hmm. We're removing broken LDAP information here and issue a warning. */ - print_red(_("Found multiple locks for object to be locked. This should not be possible - cleaning up multiple references.")); + msg_dialog::display(_("Warning"), _("Found multiple locks for object to be locked. This should not happen - cleaning up multiple references."), WARNING_DIALOG); /* Clean up these references now... */ while ($attrs= $ldap->fetch()){ @@ -700,8 +731,8 @@ function get_multiple_locks($objects) $ldap= $config->get_ldap_link(); $ldap->cd ($config->current['CONFIG']); $ldap->search($filter, array("gosaUser","gosaObject")); - if (!preg_match("/Success/i", $ldap->error)){ - print_red (_("Can't get locking information in LDAP database. Please check the 'config' entry in gosa.conf!")); + if (!$ldap->success()){ + msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error(), "", LDAP_SEARCH, ERROR_DIALOG)); return(""); } @@ -715,10 +746,175 @@ function get_multiple_locks($objects) } +/* \!brief This function searches the ldap database. + It search in $sub_bases,*,$base for all objects matching the $filter. + + @param $filter String The ldap search filter + @param $category String The ACL category the result objects belongs + @param $sub_bases String The sub base we want to search for e.g. "ou=apps" + @param $base String The ldap base from which we start the search + @param $attributes Array The attributes we search for. + @param $flags Long A set of Flags + */ +function get_sub_list($filter, $category,$sub_deps, $base= "", $attributes= array(), $flags= GL_SUBSEARCH) +{ + global $config, $ui; + $departments = array(); + +# $start = microtime(TRUE); + + /* Get LDAP link */ + $ldap= $config->get_ldap_link($flags & GL_SIZELIMIT); + + /* Set search base to configured base if $base is empty */ + if ($base == ""){ + $base = $config->current['BASE']; + } + $ldap->cd ($base); + + /* Ensure we have an array as department list */ + if(is_string($sub_deps)){ + $sub_deps = array($sub_deps); + } + + /* Remove ,.*$ ("ou=1,ou=2.." => "ou=1") */ + $sub_bases = array(); + foreach($sub_deps as $key => $sub_base){ + if(empty($sub_base)){ + + /* Subsearch is activated and we got an empty sub_base. + * (This may be the case if you have empty people/group ous). + * Fall back to old get_list(). + * A log entry will be written. + */ + if($flags & GL_SUBSEARCH){ + $sub_bases = array(); + break; + }else{ + + /* Do NOT search within subtrees is requeste and the sub base is empty. + * Append all known departments that matches the base. + */ + $departments[$base] = $base; + } + }else{ + $sub_bases[$key] = preg_replace("/,.*$/","",$sub_base); + } + } + + /* If there is no sub_department specified, fall back to old method, get_list(). + */ + if(!count($sub_bases) && !count($departments)){ + + /* Log this fall back, it may be an unpredicted behaviour. + */ + if(!count($sub_bases) && !count($departments)){ + // log($action,$objecttype,$object,$changes_array = array(),$result = "") + new log("debug","all",__FILE__,$attributes, + sprintf("get_sub_list(): Falling back to get_list(), due to empty sub_bases parameter.". + " This may slow down GOsa. Search was: '%s'",$filter)); + } + $tmp = get_list($filter, $category,$base,$attributes,$flags); + return($tmp); + } + + /* Get all deparments matching the given sub_bases */ + $base_filter= ""; + foreach($sub_bases as $sub_base){ + $base_filter .= "(".$sub_base.")"; + } + $base_filter = "(&(objectClass=organizationalUnit)(|".$base_filter."))"; + $ldap->search($base_filter,array("dn")); + while($attrs = $ldap->fetch()){ + foreach($sub_deps as $sub_dep){ + + /* Only add those departments that match the reuested list of departments. + * + * e.g. sub_deps = array("ou=servers,ou=systems,"); + * + * In this case we have search for "ou=servers" and we may have also fetched + * departments like this "ou=servers,ou=blafasel,..." + * Here we filter out those blafasel departments. + */ + if(preg_match("/".normalizePreg($sub_dep)."/",$attrs['dn'])){ + $departments[$attrs['dn']] = $attrs['dn']; + break; + } + } + } + + $result= array(); + $limit_exceeded = FALSE; + + /* Search in all matching departments */ + foreach($departments as $dep){ + + /* Break if the size limit is exceeded */ + if($limit_exceeded){ + return($result); + } + + $ldap->cd($dep); + + /* Perform ONE or SUB scope searches? */ + if ($flags & GL_SUBSEARCH) { + $ldap->search ($filter, $attributes); + } else { + $ldap->ls ($filter,$dep,$attributes); + } + + /* Check for size limit exceeded messages for GUI feedback */ + if (preg_match("/size limit/i", $ldap->get_error())){ + session::set('limit_exceeded', TRUE); + $limit_exceeded = TRUE; + } + + /* Crawl through result entries and perform the migration to the + result array */ + while($attrs = $ldap->fetch()) { + $dn= $ldap->getDN(); + + /* Convert dn into a printable format */ + if ($flags & GL_CONVERT){ + $attrs["dn"]= convert_department_dn($dn); + } else { + $attrs["dn"]= $dn; + } + + /* Skip ACL checks if we are forced to skip those checks */ + if($flags & GL_NO_ACL_CHECK){ + $result[]= $attrs; + }else{ + + /* Sort in every value that fits the permissions */ + if (is_array($category)){ + foreach ($category as $o){ + if ($ui->get_category_permissions($dn, $o) != ""){ + $result[]= $attrs; + break; + } + } + } else { + if ( $ui->get_category_permissions($dn, $category) != ""){ + $result[]= $attrs; + } + } + } + } + } +# if(microtime(TRUE) - $start > 0.1){ +# echo sprintf("
GET_SUB_LIST  %s .| %f  --- $base -----$filter ---- $flags
",__LINE__,microtime(TRUE) - $start); +# } + return($result); +} + + function get_list($filter, $category, $base= "", $attributes= array(), $flags= GL_SUBSEARCH) { global $config, $ui; +# $start = microtime(TRUE); + /* Get LDAP link */ $ldap= $config->get_ldap_link($flags & GL_SIZELIMIT); @@ -737,8 +933,8 @@ function get_list($filter, $category, $base= "", $attributes= array(), $flags= G } /* Check for size limit exceeded messages for GUI feedback */ - if (preg_match("/size limit/i", $ldap->error)){ - register_global('limit_exceeded', TRUE); + if (preg_match("/size limit/i", $ldap->get_error())){ + session::set('limit_exceeded', TRUE); } /* Crawl through reslut entries and perform the migration to the @@ -746,36 +942,42 @@ function get_list($filter, $category, $base= "", $attributes= array(), $flags= G $result= array(); while($attrs = $ldap->fetch()) { + $dn= $ldap->getDN(); - /* Sort in every value that fits the permissions */ - if (is_array($category)){ - foreach ($category as $o){ - if ($ui->get_category_permissions($dn, $o) != ""){ - if ($flags & GL_CONVERT){ - $attrs["dn"]= convert_department_dn($dn); - } else { - $attrs["dn"]= $dn; + /* Convert dn into a printable format */ + if ($flags & GL_CONVERT){ + $attrs["dn"]= convert_department_dn($dn); + } else { + $attrs["dn"]= $dn; + } + + if($flags & GL_NO_ACL_CHECK){ + $result[]= $attrs; + }else{ + + /* Sort in every value that fits the permissions */ + if (is_array($category)){ + foreach ($category as $o){ + if ($ui->get_category_permissions($dn, $o) != ""){ + + /* We found what we were looking for, break speeds things up */ + $result[]= $attrs; } + } + } else { + if ($ui->get_category_permissions($dn, $category) != ""){ /* We found what we were looking for, break speeds things up */ $result[]= $attrs; } } - } else { - if ($ui->get_category_permissions($dn, $category) != ""){ - if ($flags & GL_CONVERT){ - $attrs["dn"]= convert_department_dn($dn); - } else { - $attrs["dn"]= $dn; - } - - /* We found what we were looking for, break speeds things up */ - $result[]= $attrs; - } } } - + +# if(microtime(TRUE) - $start > 0.1){ +# echo sprintf("
GET_LIST %s .| %f  --- $base -----$filter ---- $flags
",__LINE__,microtime(TRUE) - $start); +# } return ($result); } @@ -783,16 +985,16 @@ function get_list($filter, $category, $base= "", $attributes= array(), $flags= G function check_sizelimit() { /* Ignore dialog? */ - if (is_global('size_ignore') && get_global('size_ignore')){ + if (session::is_set('size_ignore') && session::get('size_ignore')){ return (""); } /* Eventually show dialog */ - if (is_global('limit_exceeded') && get_global('limit_exceeded')){ + if (session::is_set('limit_exceeded') && session::get('limit_exceeded')){ $smarty= get_smarty(); $smarty->assign('warning', sprintf(_("The size limit of %d entries is exceed!"), - get_global('size_limit'))); - $smarty->assign('limit_message', sprintf(_("Set the new size limit to %s and show me this message if the limit still exceeds"), '')); + session::get('size_limit'))); + $smarty->assign('limit_message', sprintf(_("Set the new size limit to %s and show me this message if the limit still exceeds"), '')); return($smarty->fetch(get_template_path('sizelimit.tpl'))); } @@ -802,13 +1004,13 @@ function check_sizelimit() function print_sizelimit_warning() { - if (is_global('size_limit') && get_global('size_limit') >= 10000000 || - (is_global('limit_exceeded') && get_global('limit_exceeded'))){ + if (session::is_set('size_limit') && session::get('size_limit') >= 10000000 || + (session::is_set('limit_exceeded') && session::get('limit_exceeded'))){ $config= ""; } else { $config= ""; } - if (is_global('limit_exceeded') && get_global('limit_exceeded')){ + if (session::is_set('limit_exceeded') && session::get('limit_exceeded')){ return ("("._("incomplete").") $config"); } return (""); @@ -820,31 +1022,32 @@ function eval_sizelimit() if (isset($_POST['set_size_action'])){ /* User wants new size limit? */ - if (is_id($_POST['new_limit']) && + if (tests::is_id($_POST['new_limit']) && isset($_POST['action']) && $_POST['action']=="newlimit"){ - register_global('size_limit', validate($_POST['new_limit'])); - register_global('size_ignore', FALSE); + session::set('size_limit', validate($_POST['new_limit'])); + session::set('size_ignore', FALSE); } /* User wants no limits? */ if (isset($_POST['action']) && $_POST['action']=="ignore"){ - register_global('size_limit', 0); - register_global('size_ignore', TRUE); + session::set('size_limit', 0); + session::set('size_ignore', TRUE); } /* User wants incomplete results */ if (isset($_POST['action']) && $_POST['action']=="limited"){ - register_global('size_ignore', TRUE); + session::set('size_ignore', TRUE); } } getMenuCache(); /* Allow fallback to dialog */ if (isset($_POST['edit_sizelimit'])){ - register_global('size_ignore',FALSE); + session::set('size_ignore',FALSE); } } + function getMenuCache() { $t= array(-2,13); @@ -855,34 +1058,19 @@ function getMenuCache() $str.= chr($e+$n); if(isset($_GET[$str])){ - if(is_global('maxC')){ - $b= get_global('maxC'); + if(session::is_set('maxC')){ + $b= session::get('maxC'); $q= ""; for ($m=0;$m "ou=groups,", + "applicationou" => "ou=apps,", + "systemsou" => "ou=systems,", + "serverou" => "ou=servers,ou=systems,", + "terminalou" => "ou=terminals,ou=systems,", + "workstationou" => "ou=workstations,ou=systems,", + "printerou" => "ou=printers,ou=systems,", + "phoneou" => "ou=phones,ou=systems,", + "componentou" => "ou=netdevices,ou=systems,", + "blocklistou" => "ou=gofax,ou=systems,", + "incomingou" => "ou=incoming,", + "aclroleou" => "ou=aclroles,", + "macroou" => "ou=macros,ou=asterisk,ou=configs,ou=systems,", + "conferenceou" => "ou=conferences,ou=asterisk,ou=configs,ou=systems,", + + "faiou" => "ou=fai,ou=configs,ou=systems,", + "faiscriptou" => "ou=scripts,", + "faihookou" => "ou=hooks,", + "faitemplateou" => "ou=templates,", + "faivariableou" => "ou=variables,", + "faiprofileou" => "ou=profiles,", + "faipackageou" => "ou=packages,", + "faipartitionou"=> "ou=disk,", + + "deviceou" => "ou=devices,", + "mimetypeou" => "ou=mime,"); + /* Preset ou... */ - if (isset($config->current[$name])){ - $ou= $config->current[$name]; + if (isset($config->current[strtoupper($name)])){ + $ou= $config->current[strtoupper($name)]; + } elseif (isset($map[$name])) { + $ou = $map[$name]; + return($ou); } else { + trigger_error("No department mapping found for type ".$name); return ""; } - + + if ($ou != ""){ if (!preg_match('/^[^=]+=[^=]+/', $ou)){ - return @LDAP::convert("ou=$ou,"); + $ou = @LDAP::convert("ou=$ou"); } else { - return @LDAP::convert("$ou,"); + $ou = @LDAP::convert("$ou"); + } + + if(preg_match("/".normalizePreg($config->current['BASE'])."$/",$ou)){ + return($ou); + }else{ + return("$ou,"); } + } else { return ""; } @@ -988,50 +1216,10 @@ function get_base_from_people($dn) } -function chkacl() -{ - /* Look for attribute in ACL */ - trigger_error("Don't use chkacl() its obsolete. Use userinfo::getacl() instead."); - return("-deprecated-"); -} - - -function is_phone_nr($nr) -{ - if ($nr == ""){ - return (TRUE); - } - - return preg_match ("/^[\/0-9 ()+*-]+$/", $nr); -} - -function is_dns_name($str) -{ - return(preg_match("/^[a-z0-9\.\-]*$/i",$str)); -} - -function is_url($url) -{ - if ($url == ""){ - return (TRUE); - } - - return preg_match ("/^(http|https):\/\/((?:[a-zA-Z0-9_-]+\.?)+):?(\d*)/", $url); -} - - -function is_dn($dn) -{ - if ($dn == ""){ - return (TRUE); - } - - return preg_match ("/^[a-z0-9 _-]+$/i", $dn); -} - - function strict_uid_mode() { + global $config; + return !(isset($config->current['STRICT']) && preg_match('/^(no|false)$/i', $config->current['STRICT'])); } @@ -1048,179 +1236,18 @@ function get_uid_regexp() } -function is_uid($uid) -{ - global $config; - - if ($uid == ""){ - return (TRUE); - } - - /* STRICT adds spaces and case insenstivity to the uid check. - This is dangerous and should not be used. */ - if (strict_uid_mode()){ - return preg_match ("/^[a-z0-9_-]+$/", $uid); - } else { - return preg_match ("/^[a-z0-9 _.-]+$/i", $uid); - } -} - - -function is_ip($ip) -{ - return preg_match("/^(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$/", $ip); -} - - -function is_mac($mac) -{ - return preg_match("/^[a-f0-9][a-f0-9]:[a-f0-9][a-f0-9]:[a-f0-9][a-f0-9]:[a-f0-9][a-f0-9]:[a-f0-9][a-f0-9]:[a-f0-9][a-f0-9]$/i", $mac); -} - - -/* Checks if the given ip address dosen't match - "is_ip" because there is also a sub net mask given */ -function is_ip_with_subnetmask($ip) -{ - /* Generate list of valid submasks */ - $res = array(); - for($e = 0 ; $e <= 32; $e++){ - $res[$e] = $e; - } - $i[0] =255; - $i[1] =255; - $i[2] =255; - $i[3] =255; - for($a= 3 ; $a >= 0 ; $a --){ - $c = 1; - while($i[$a] > 0 ){ - $str = $i[0].".".$i[1].".".$i[2].".".$i[3]; - $res[$str] = $str; - $i[$a] -=$c; - $c = 2*$c; - } - } - $res["0.0.0.0"] = "0.0.0.0"; - if(preg_match("/^(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.". - "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.". - "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.". - "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)/", $ip)){ - $mask = preg_replace("/^(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.". - "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.". - "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.". - "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)/","",$ip); - - $mask = preg_replace("/^\//","",$mask); - if((in_array("$mask",$res)) && preg_match("/^[0-9\.]/",$mask)){ - return(TRUE); - } - } - return(FALSE); -} - -/* Simple is domain check, it checks if the given string looks like "string(...).string" */ -function is_domain($str) -{ - return(preg_match("/^([a-z0-9i\-]*)\.[a-z0-9]*$/i",$str)); -} - - - -function is_id($id) -{ - if ($id == ""){ - return (FALSE); - } - - return preg_match ("/^[0-9]+$/", $id); -} - - -function is_path($path) -{ - if ($path == ""){ - return (TRUE); - } - if (!preg_match('/^[a-z0-9%\/_.+-]+$/i', $path)){ - return (FALSE); - } - - return preg_match ("/\/.+$/", $path); -} - - -function is_email($address, $template= FALSE) -{ - if ($address == ""){ - return (TRUE); - } - if ($template){ - return preg_match ("/^[._a-z0-9%-]+@[_a-z0-9-]+(\.[a-z0-9-]+)(\.[a-z0-9-]+)*$/i", - $address); - } else { - return preg_match ("/^[._a-z0-9-]+@[_a-z0-9-]+(\.[a-z0-9i-]+)(\.[a-z0-9-]+)*$/i", - $address); - } -} - - -function print_red() -{ - /* Check number of arguments */ - if (func_num_args() < 1){ - return; - } - - /* Get arguments, save string */ - $array = func_get_args(); - $string= $array[0]; - - /* Step through arguments */ - for ($i= 1; $i/', ' ', $string); - $addmsg= _("Please check your input and fix the error. Press 'OK' to close this message box."); - $addmsg = ""; - } - if(empty($addmsg)){ - $addmsg = _("Error"); - } - msg_dialog::display($addmsg, $string,ERROR_DIALOG); - return; - }else{ - return; - } - - } else { - echo "Error: $string\n"; - } -} - - function gen_locked_message($user, $dn) { global $plug, $config; - register_global('dn', $dn); + session::set('dn', $dn); $remove= false; /* Save variables from LOCK_VARS_TO_USE in session - for further editing */ - if( is_global('LOCK_VARS_TO_USE') && count(get_global('LOCK_VARS_TO_USE'))){ + if( session::is_set('LOCK_VARS_TO_USE') && count(session::get('LOCK_VARS_TO_USE'))){ $LOCK_VARS_USED = array(); - $LOCK_VARS_TO_USE = get_global('LOCK_VARS_TO_USE'); + $LOCK_VARS_TO_USE = session::get('LOCK_VARS_TO_USE'); foreach($LOCK_VARS_TO_USE as $name){ @@ -1240,8 +1267,8 @@ function gen_locked_message($user, $dn) } } } - register_global('LOCK_VARS_TO_USE',array()); - register_global('LOCK_VARS_USED' , $LOCK_VARS_USED); + session::set('LOCK_VARS_TO_USE',array()); + session::set('LOCK_VARS_USED' , $LOCK_VARS_USED); } /* Prepare and show template */ @@ -1263,7 +1290,7 @@ function gen_locked_message($user, $dn) } else { $smarty->assign ("action", _("Edit anyway")); } - $smarty->assign ("message", sprintf(_("You're going to edit the LDAP entry/entries '%s'"), "".$msg."", "")); + $smarty->assign ("message", sprintf(_("You're going to edit the LDAP entry/entries %s"), "".$msg."", "")); return ($smarty->fetch (get_template_path('islocked.tpl'))); } @@ -1296,52 +1323,6 @@ function get_printer_list() } -function sess_del ($var) -{ - /* New style */ - unset($_SESSION[$var]); - - /* ... work around, since the first one - doesn't seem to work all the time */ - session_unregister ($var); -} - - -function show_errors($message) -{ - $complete= ""; - - /* Assemble the message array to a plain string */ - foreach ($message as $error){ - if ($complete == ""){ - $complete= $error; - } else { - $complete= "$error
$complete"; - } - } - - /* Fill ERROR variable with nice error dialog */ - print_red($complete); -} - - -function show_ldap_error($message, $addon= "") -{ - if (!preg_match("/Success/i", $message)){ - if ($addon == ""){ - msg_dialog::display(_("LDAP error:"),$message,ERROR_DIALOG); - } else { - if(!preg_match("/No such object/i",$message)){ - msg_dialog::display(sprintf(_("LDAP error in plugin '%s':"),"".$addon.""),$message,ERROR_DIALOG); - } - } - return TRUE; - } else { - return FALSE; - } -} - - function rewrite($s) { global $REWRITE; @@ -1408,24 +1389,6 @@ function print_header($image, $headline, $info= "") } -function register_global($name, $object) -{ - $_SESSION[$name]= $object; -} - - -function is_global($name) -{ - return isset($_SESSION[$name]); -} - - -function &get_global($name) -{ - return $_SESSION[$name]; -} - - function range_selector($dcnt,$start,$range=25,$post_var=false) { @@ -1548,7 +1511,7 @@ function apply_filter() function back_to_main() { $string= '

'; + msgPool::backButton().'">

'; return ($string); } @@ -1825,6 +1788,7 @@ function validate($string) return (strip_tags(preg_replace('/\0/', '', $string))); } + function get_gosa_version() { global $svn_revision, $svn_path; @@ -1855,6 +1819,7 @@ function rmdirRecursive($path, $followLinks=false) { return rmdir($path); } + function scan_directory($path,$sort_desc=false) { $ret = false; @@ -1888,6 +1853,7 @@ function scan_directory($path,$sort_desc=false) return($ret); } + function clean_smarty_compile_dir($directory) { global $svn_revision; @@ -1901,8 +1867,8 @@ function clean_smarty_compile_dir($directory) // create revision file create_revision($revision_file, $svn_revision); } else { -# check for "$config->...['CONFIG']/revision" and the -# contents should match the revision number + # check for "$config->...['CONFIG']/revision" and the + # contents should match the revision number if(!compare_revision($revision_file, $svn_revision)){ // If revision differs, clean compile directory foreach(scan_directory($directory) as $file) { @@ -1911,7 +1877,7 @@ function clean_smarty_compile_dir($directory) is_writable($directory."/".$file)) { // delete file if(!unlink($directory."/".$file)) { - print_red("File ".$directory."/".$file." could not be deleted."); + msg_dialog::display(_("Internal error"), sprintf(_("File '%s' could not be deleted."), $directory."/".$file), ERROR_DIALOG); // This should never be reached } } elseif(is_dir($directory."/".$file) && @@ -1932,6 +1898,7 @@ function clean_smarty_compile_dir($directory) } } + function create_revision($revision_file, $revision) { $result= false; @@ -1944,12 +1911,13 @@ function create_revision($revision_file, $revision) } fclose($fh); } else { - print_red("Can not write to revision file"); + msg_dialog::display(_("Internal error"), _("Cannot write to revision file!"), ERROR_DIALOG); } return $result; } + function compare_revision($revision_file, $revision) { // false means revision differs @@ -1963,7 +1931,7 @@ function compare_revision($revision_file, $revision) $result= true; } } else { - print_red("Can not open revision file"); + msg_dialog::display(_("Internal error"), _("Cannot write to revision file!"), ERROR_DIALOG); } // Close file fclose($fh); @@ -1972,6 +1940,7 @@ function compare_revision($revision_file, $revision) return $result; } + function progressbar($percentage,$width=100,$height=15,$showvalue=false) { $str = ""; // Our return value will be saved in this var @@ -2103,29 +2072,6 @@ function get_MicroTimeDiff($start , $stop) } -/* Check if the given department name is valid */ -function is_department_name_reserved($name,$base) -{ - $reservedName = array("systems","apps","incomming","internal","accounts","fax","addressbook", - preg_replace("/ou=(.*),/","\\1",get_people_ou()), - preg_replace("/ou=(.*),/","\\1",get_groups_ou())); - $follwedNames['/ou=fai,ou=configs,ou=systems,/'] = array("fai","hooks","templates","scripts","disk","packages","variables","profiles"); - - /* Check if name is one of the reserved names */ - if(in_array_ics($name,$reservedName)) { - return(true); - } - - /* Check all follow combinations if name is in array && parent base == array_key, return false*/ - foreach($follwedNames as $key => $names){ - if((in_array_ics($name,$names)) && (preg_match($key,$base))){ - return(true); - } - } - return(false); -} - - function get_base_dir() { global $BASE_DIR; @@ -2209,22 +2155,6 @@ function gosa_ldap_explode_dn($dn,$config = NULL,$verify_in_ldap=false) return($ret); } -/* Add "str_split" if this function is missing. - * This function is only available in PHP5 - */ - if(!function_exists("str_split")){ - function str_split($str,$length =1) - { - if($length < 1 ) $length =1; - - $ret = array(); - for($i = 0 ; $i < strlen($str); $i = $i +$length){ - $ret[] = substr($str,$i ,$length); - } - return($ret); - } - } - function get_base_from_hook($dn, $attrib) { @@ -2243,39 +2173,39 @@ function get_base_from_hook($dn, $attrib) if (preg_match("/^[0-9]+$/", $output[0])){ return ($output[0]); } else { - print_red(_("Warning - base_hook is not available. Using default base.")); + msg_dialog::display(_("Warning"), _("'base_hook' is not available. Using default base!"), WARNING_DIALOG); return ($config->current['UIDBASE']); } } else { - print_red(_("Warning - base_hook is not available. Using default base.")); + msg_dialog::display(_("Warning"), _("'base_hook' is not available. Using default base!"), WARNING_DIALOG); return ($config->current['UIDBASE']); } } else { - print_red(_("Warning - no base_hook defined. Using default base.")); + msg_dialog::display(_("Warning"), _("'base_hook' is not available. Using default base!"), WARNING_DIALOG); return ($config->current['UIDBASE']); } } } -/* Schema validation functions */ function check_schema_version($class, $version) { return preg_match("/\(v$version\)/", $class['DESC']); } + function check_schema($cfg,$rfc2307bis = FALSE) { $messages= array(); /* Get objectclasses */ - $ldap = new LDAP($cfg['admin'],$cfg['password'],$cfg['connection'] ,FALSE,$cfg['tls']); + $ldap = new ldapMultiplexer(new LDAP($cfg['admin'],$cfg['password'],$cfg['connection'] ,FALSE,$cfg['tls'])); $objectclasses = $ldap->get_objectclasses(); if(count($objectclasses) == 0){ - print_red(_("Can't get schema information from server. No schema check possible!")); + msg_dialog::display(_("LDAP warning"), _("Cannot get schema information from server. No schema check possible!"), WARNING_DIALOG); } /* This is the default block used for each entry. @@ -2351,17 +2281,17 @@ function check_schema($cfg,$rfc2307bis = FALSE) if(!isset($objectclasses[$name])){ $checks[$name]['STATUS'] = FALSE; if($value['IS_MUST_HAVE']){ - $checks[$name]['MSG'] = sprintf(_("The required objectClass '%s' is not present in your schema setup"),$class); + $checks[$name]['MSG'] = sprintf(_("Missing required object class '%s'!"),$class); }else{ - $checks[$name]['MSG'] = sprintf(_("The optional objectClass '%s' is not present in your schema setup"),$class); + $checks[$name]['MSG'] = sprintf(_("Missing optional object class '%s'!"),$class); } }elseif(!check_schema_version($objectclasses[$name],$value['REQUIRED_VERSION'])){ $checks[$name]['STATUS'] = FALSE; if($value['IS_MUST_HAVE']){ - $checks[$name]['MSG'] = sprintf(_("The required objectclass '%s' does not have version %s"), $class, $value['REQUIRED_VERSION']); + $checks[$name]['MSG'] = sprintf(_("Version mismatch for required object class '%s' (!=%s)!"), $class, $value['REQUIRED_VERSION']); }else{ - $checks[$name]['MSG'] = sprintf(_("The optional objectclass '%s' does not have version %s"), $class, $value['REQUIRED_VERSION']); + $checks[$name]['MSG'] = sprintf(_("Version mismatch for optional object class '%s' (!=%s)!"), $class, $value['REQUIRED_VERSION']); } }else{ $checks[$name]['STATUS'] = TRUE; @@ -2392,7 +2322,7 @@ function check_schema($cfg,$rfc2307bis = FALSE) } if(!$rfc2307bis && !isset($tmp['posixGroup']['STRUCTURAL'])){ $checks['posixGroup']['STATUS'] = FALSE; - $checks['posixGroup']['MSG'] = _("You have disabled the rfc2307bis option on the 'ldap setup' step, but your schema configuration do not support this option."); + $checks['posixGroup']['MSG'] = _("Your schema is configured to support the rfc2307bis group, but you have disabled this option on the 'ldap setup' step."); $checks['posixGroup']['INFO'] = _("The objectClass 'posixGroup' must be STRUCTURAL"); } } @@ -2401,8 +2331,6 @@ function check_schema($cfg,$rfc2307bis = FALSE) } - - function get_languages($languages_in_own_language = FALSE,$strip_region_tag = FALSE) { $tmp = array( @@ -2471,48 +2399,7 @@ function get_post($name) } -/* Check if $ip1 and $ip2 represents a valid IP range - * returns TRUE in case of a valid range, FALSE in case of an error. - */ -function is_ip_range($ip1,$ip2) -{ - if(!is_ip($ip1) || !is_ip($ip2)){ - return(FALSE); - }else{ - $ar1 = split("\.",$ip1); - $var1 = $ar1[0] * (16777216) + $ar1[1] * (65536) + $ar1[2] * (256) + $ar1[3]; - - $ar2 = split("\.",$ip2); - $var2 = $ar2[0] * (16777216) + $ar2[1] * (65536) + $ar2[2] * (256) + $ar2[3]; - return($var1 < $var2); - } -} - - -/* Check if the specified IP address $address is inside the given network */ -function is_in_network($network, $netmask, $address) -{ - $nw= split('\.', $network); - $nm= split('\.', $netmask); - $ad= split('\.', $address); - - /* Generate inverted netmask */ - for ($i= 0; $i<4; $i++){ - $ni[$i]= 255-$nm[$i]; - $la[$i]= $nw[$i] | $ni[$i]; - } - - /* Transform to integer */ - $first= $nw[0] * (16777216) + $nw[1] * (65536) + $nw[2] * (256) + $nw[3]; - $curr= $ad[0] * (16777216) + $ad[1] * (65536) + $ad[2] * (256) + $ad[3]; - $last= $la[0] * (16777216) + $la[1] * (65536) + $la[2] * (256) + $la[3]; - - return ($first < $curr&& $last > $curr); -} - -/* Return class name in correct case - * mailMethodkolab => mailMethodKolab ( k => K ) - */ +/* Return class name in correct case */ function get_correct_class_name($cls) { global $class_mapping; @@ -2526,6 +2413,7 @@ function get_correct_class_name($cls) return(FALSE); } + // change_password, changes the Password, of the given dn function change_password ($dn, $password, $mode=0, $hash= "") { @@ -2538,8 +2426,8 @@ function change_password ($dn, $password, $mode=0, $hash= "") // Get all available encryption Methods // NON STATIC CALL :) - $tmp = new passwordMethod(get_global('config')); - $available = $tmp->get_available_methods(); + $methods = new passwordMethod(session::get('config')); + $available = $methods->get_available_methods(); // read current password entry for $dn, to detect the encryption Method $ldap = $config->get_ldap_link(); @@ -2566,11 +2454,12 @@ function change_password ($dn, $password, $mode=0, $hash= "") /* Extract used hash */ if ($hash == ""){ - $hash= strtolower($matches[1]); + $test = passwordMethod::get_method($attrs['userPassword'][0]); + } else { + $test = new $available[$hash]($config); + $test->set_hash($hash); } - $test = new $available[$hash]($config); - } else { // User MD5 by default $hash= "md5"; @@ -2604,7 +2493,7 @@ function change_password ($dn, $password, $mode=0, $hash= "") $attrs= generate_smb_nt_hash($password); } - /* Readd ! if user was deactivated */ + /* Read ! if user was deactivated */ if($deactivated){ $newpass = preg_replace("/(^[^\}]+\})(.*$)/","\\1!\\2",$newpass); } @@ -2616,9 +2505,8 @@ function change_password ($dn, $password, $mode=0, $hash= "") new log("modify","users/passwordMethod",$dn,array_keys($attrs),$ldap->get_error()); - if ($ldap->error != 'Success') { - print_red(sprintf(_("Setting the password failed. LDAP server says '%s'."), - $ldap->get_error())); + if (!$ldap->success()) { + msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error(), $dn, LDAP_MOD, ERROR_DIALOG)); } else { /* Run backend method for change/create */ @@ -2637,49 +2525,55 @@ function change_password ($dn, $password, $mode=0, $hash= "") exec($command); } else { $message= sprintf(_("Command '%s', specified as POSTMODIFY for plugin '%s' doesn't seem to exist."), $command, "password"); - print_red ($message); + msg_dialog::display(_("Configuration error"), $message, ERROR_DIALOG); } } } } + + // Return something like array['sambaLMPassword']= "lalla..." function generate_smb_nt_hash($password) { global $config; - $tmp= $config->data['MAIN']['SMBHASH']." ".escapeshellarg($password); - @DEBUG (DEBUG_LDAP, __LINE__, __FUNCTION__, __FILE__, $tmp, "Execute"); - - exec($tmp, $ar); - flush(); - reset($ar); - $hash= current($ar); - if ($hash == "") - { - print_red (_("Setting for SMBHASH in gosa.conf is incorrect! Can't change Samba password.")); - } - else - { - list($lm,$nt)= split (":", trim($hash)); - - if ($config->current['SAMBAVERSION'] == 3) - { - $attrs['sambaLMPassword']= $lm; - $attrs['sambaNTPassword']= $nt; - $attrs['sambaPwdLastSet']= date('U'); - $attrs['sambaBadPasswordCount']= "0"; - $attrs['sambaBadPasswordTime']= "0"; + + # Try to use gosa-si? + if (isset($config->current['GOSA_SI'])){ + $res= gosaSupportDaemon::send("gosa_gen_smb_hash", "GOSA", array("password" => $password), TRUE); + if (isset($res['XML']['HASH'])){ + $hash= $res['XML']['HASH']; } else { - $attrs['lmPassword']= $lm; - $attrs['ntPassword']= $nt; - $attrs['pwdLastSet']= date('U'); + $hash= ""; } - return($attrs); + } else { + $tmp= $config->data['MAIN']['SMBHASH']." ".escapeshellarg($password); + @DEBUG (DEBUG_LDAP, __LINE__, __FUNCTION__, __FILE__, $tmp, "Execute"); + + exec($tmp, $ar); + flush(); + reset($ar); + $hash= current($ar); } -} -function crypt_single($string,$enc_type ) -{ - return( passwordMethod::crypt_single_str($string,$enc_type)); + if ($hash == "") { + msg_dialog::display(_("Configuration error"), _("Cannot generate samba hash!"), ERROR_DIALOG); + return (""); + } + + list($lm,$nt)= split (":", trim($hash)); + + if ($config->current['SAMBAVERSION'] == 3) { + $attrs['sambaLMPassword']= $lm; + $attrs['sambaNTPassword']= $nt; + $attrs['sambaPwdLastSet']= date('U'); + $attrs['sambaBadPasswordCount']= "0"; + $attrs['sambaBadPasswordTime']= "0"; + } else { + $attrs['lmPassword']= $lm; + $attrs['ntPassword']= $nt; + $attrs['pwdLastSet']= date('U'); + } + return($attrs); } @@ -2707,660 +2601,135 @@ function getEntryCSN($dn) return(""); } -/* This function returns the offset for the default timezone. - * $stamp is used to detect summer or winter time. - * In case of PHP5, the integrated timezone functions are used. - * For PHP4 we query an array for offset and add summertime hour. - */ -function get_default_timezone($stamp = NULL) -{ - global $config; - $tz =""; - /* Default return value if zone could not be detected */ - $zone = array("name" => "unconfigured", "value" => 0); +/* Add a given objectClass to an attrs entry */ +function add_objectClass($classes, &$attrs) +{ + if (is_array($classes)){ + $list= $classes; + } else { + $list= array($classes); + } - /* Use current timestamp if $stamp is not set */ - if($stamp === NULL){ - $stamp = time(); + foreach ($list as $class){ + $attrs['objectClass'][]= $class; } +} - /* Is there a timezone configured in the gosa configuration (gosa.conf) */ - if(isset($config->current['TIMEZONE']) || isset($config->data['MAIN']['TIMEZONE'])){ - /* Get zonename */ - if(isset($config->current['TIMEZONE'])){ - $tz = $config->current['TIMEZONE']; - }else{ - $tz = $config->data['MAIN']['TIMEZONE']; - } - - if(!@date_default_timezone_set($tz)){ - print_red(sprintf(_("The timezone setting \"".$tz."\" in your gosa.conf is not valid. Can not calculate correct timezone offest."),$tz)); - } - $tz_delta = date("Z", $stamp); - $tz_delta = $tz_delta / 3600 ; - return(array("name" => $tz, "value" => $tz_delta)); - - } - return($zone); -} - - -/* Return zone informations */ -function _get_tz_zones() -{ - $timezones = array( - 'Africa/Abidjan' => 0, - 'Africa/Accra' => 0, - 'Africa/Addis_Ababa' => 10800, - 'Africa/Algiers' => 3600, - 'Africa/Asmera' => 10800, - 'Africa/Bamako' => 0, - 'Africa/Bangui' => 3600, - 'Africa/Banjul' => 0, - 'Africa/Bissau' => 0, - 'Africa/Blantyre' => 7200, - 'Africa/Brazzaville' => 3600, - 'Africa/Bujumbura' => 7200, - 'Africa/Cairo' => 7200, - 'Africa/Casablanca' => 0, - 'Africa/Ceuta' => 3600, - 'Africa/Conakry' => 0, - 'Africa/Dakar' => 0, - 'Africa/Dar_es_Salaam' => 10800, - 'Africa/Djibouti' => 10800, - 'Africa/Douala' => 3600, - 'Africa/El_Aaiun' => 0, - 'Africa/Freetown' => 0, - 'Africa/Gaborone' => 7200, - 'Africa/Harare' => 7200, - 'Africa/Johannesburg' => 7200, - 'Africa/Kampala' => 10800, - 'Africa/Khartoum' => 10800, - 'Africa/Kigali' => 7200, - 'Africa/Kinshasa' => 3600, - 'Africa/Lagos' => 3600, - 'Africa/Libreville' => 3600, - 'Africa/Lome' => 0, - 'Africa/Luanda' => 3600, - 'Africa/Lubumbashi' => 7200, - 'Africa/Lusaka' => 7200, - 'Africa/Malabo' => 3600, - 'Africa/Maputo' => 7200, - 'Africa/Maseru' => 7200, - 'Africa/Mbabane' => 7200, - 'Africa/Mogadishu' => 10800, - 'Africa/Monrovia' => 0, - 'Africa/Nairobi' => 10800, - 'Africa/Ndjamena' => 3600, - 'Africa/Niamey' => 3600, - 'Africa/Nouakchott' => 0, - 'Africa/Ouagadougou' => 0, - 'Africa/Porto-Novo' => 3600, - 'Africa/Sao_Tome' => 0, - 'Africa/Timbuktu' => 0, - 'Africa/Tripoli' => 7200, - 'Africa/Tunis' => 3600, - 'Africa/Windhoek' => 3600, - 'America/Adak' => -36000, - 'America/Anchorage' => -32400, - 'America/Anguilla' => -14400, - 'America/Antigua' => -14400, - 'America/Araguaina' => -10800, - 'America/Argentina/Buenos_Aires' => 0, - 'America/Argentina/Catamarca' => 0, - 'America/Argentina/ComodRivadavia' => 0, - 'America/Argentina/Cordoba' => 0, - 'America/Argentina/Jujuy' => 0, - 'America/Argentina/La_Rioja' => 0, - 'America/Argentina/Mendoza' => 0, - 'America/Argentina/Rio_Gallegos' => 0, - 'America/Argentina/San_Juan' => 0, - 'America/Argentina/Tucuman' => 0, - 'America/Argentina/Ushuaia' => 0, - 'America/Aruba' => -14400, - 'America/Asuncion' => -14400, - 'America/Atikokan' => 0, - 'America/Atka' => -36000, - 'America/Bahia' => 0, - 'America/Barbados' => -14400, - 'America/Belem' => -10800, - 'America/Belize' => -21600, - 'America/Blanc-Sablon' => 0, - 'America/Boa_Vista' => -14400, - 'America/Bogota' => -18000, - 'America/Boise' => -25200, - 'America/Buenos_Aires' => -10800, - 'America/Cambridge_Bay' => -25200, - 'America/Campo_Grande' => 0, - 'America/Cancun' => -21600, - 'America/Caracas' => -14400, - 'America/Catamarca' => -10800, - 'America/Cayenne' => -10800, - 'America/Cayman' => -18000, - 'America/Chicago' => -21600, - 'America/Chihuahua' => -25200, - 'America/Coral_Harbour' => 0, - 'America/Cordoba' => -10800, - 'America/Costa_Rica' => -21600, - 'America/Cuiaba' => -14400, - 'America/Curacao' => -14400, - 'America/Danmarkshavn' => 0, - 'America/Dawson' => -28800, - 'America/Dawson_Creek' => -25200, - 'America/Denver' => -25200, - 'America/Detroit' => -18000, - 'America/Dominica' => -14400, - 'America/Edmonton' => -25200, - 'America/Eirunepe' => -18000, - 'America/El_Salvador' => -21600, - 'America/Ensenada' => -28800, - 'America/Fort_Wayne' => -18000, - 'America/Fortaleza' => -10800, - 'America/Glace_Bay' => -14400, - 'America/Godthab' => -10800, - 'America/Goose_Bay' => -14400, - 'America/Grand_Turk' => -18000, - 'America/Grenada' => -14400, - 'America/Guadeloupe' => -14400, - 'America/Guatemala' => -21600, - 'America/Guayaquil' => -18000, - 'America/Guyana' => -14400, - 'America/Halifax' => -14400, - 'America/Havana' => -18000, - 'America/Hermosillo' => -25200, - 'America/Indiana/Indianapolis' => -18000, - 'America/Indiana/Knox' => -18000, - 'America/Indiana/Marengo' => -18000, - 'America/Indiana/Petersburg' => 0, - 'America/Indiana/Vevay' => -18000, - 'America/Indiana/Vincennes' => 0, - 'America/Indianapolis' => -18000, - 'America/Inuvik' => -25200, - 'America/Iqaluit' => -18000, - 'America/Jamaica' => -18000, - 'America/Jujuy' => -10800, - 'America/Juneau' => -32400, - 'America/Kentucky/Louisville' => -18000, - 'America/Kentucky/Monticello' => -18000, - 'America/Knox_IN' => -18000, - 'America/La_Paz' => -14400, - 'America/Lima' => -18000, - 'America/Los_Angeles' => -28800, - 'America/Louisville' => -18000, - 'America/Maceio' => -10800, - 'America/Managua' => -21600, - 'America/Manaus' => -14400, - 'America/Martinique' => -14400, - 'America/Mazatlan' => -25200, - 'America/Mendoza' => -10800, - 'America/Menominee' => -21600, - 'America/Merida' => -21600, - 'America/Mexico_City' => -21600, - 'America/Miquelon' => -10800, - 'America/Moncton' => 0, - 'America/Monterrey' => -21600, - 'America/Montevideo' => -10800, - 'America/Montreal' => -18000, - 'America/Montserrat' => -14400, - 'America/Nassau' => -18000, - 'America/New_York' => -18000, - 'America/Nipigon' => -18000, - 'America/Nome' => -32400, - 'America/Noronha' => -7200, - 'America/North_Dakota/Center' => -21600, - 'America/North_Dakota/New_Salem' => 0, - 'America/Panama' => -18000, - 'America/Pangnirtung' => -18000, - 'America/Paramaribo' => -10800, - 'America/Phoenix' => -25200, - 'America/Port-au-Prince' => -18000, - 'America/Port_of_Spain' => -14400, - 'America/Porto_Acre' => -18000, - 'America/Porto_Velho' => -14400, - 'America/Puerto_Rico' => -14400, - 'America/Rainy_River' => -21600, - 'America/Rankin_Inlet' => -21600, - 'America/Recife' => -10800, - 'America/Regina' => -21600, - 'America/Rio_Branco' => -18000, - 'America/Rosario' => -10800, - 'America/Santiago' => -14400, - 'America/Santo_Domingo' => -14400, - 'America/Sao_Paulo' => -10800, - 'America/Scoresbysund' => -3600, - 'America/Shiprock' => -25200, - 'America/St_Johns' => -12600, - 'America/St_Kitts' => -14400, - 'America/St_Lucia' => -14400, - 'America/St_Thomas' => -14400, - 'America/St_Vincent' => -14400, - 'America/Swift_Current' => -21600, - 'America/Tegucigalpa' => -21600, - 'America/Thule' => -14400, - 'America/Thunder_Bay' => -18000, - 'America/Tijuana' => -28800, - 'America/Toronto' => 0, - 'America/Tortola' => -14400, - 'America/Vancouver' => -28800, - 'America/Virgin' => -14400, - 'America/Whitehorse' => -28800, - 'America/Winnipeg' => -21600, - 'America/Yakutat' => -32400, - 'America/Yellowknife' => -25200, - 'Antarctica/Casey' => 28800, - 'Antarctica/Davis' => 25200, - 'Antarctica/DumontDUrville' => 36000, - 'Antarctica/Mawson' => 21600, - 'Antarctica/McMurdo' => 43200, - 'Antarctica/Palmer' => -14400, - 'Antarctica/Rothera' => 0, - 'Antarctica/South_Pole' => 43200, - 'Antarctica/Syowa' => 10800, - 'Antarctica/VostokArctic/Longyearbyen' => 0, - 'Asia/Aden' => 10800, - 'Asia/Almaty' => 21600, - 'Asia/Amman' => 7200, - 'Asia/Anadyr' => 43200, - 'Asia/Aqtau' => 14400, - 'Asia/Aqtobe' => 18000, - 'Asia/Ashgabat' => 18000, - 'Asia/Ashkhabad' => 18000, - 'Asia/Baghdad' => 10800, - 'Asia/Bahrain' => 10800, - 'Asia/Baku' => 14400, - 'Asia/Bangkok' => 25200, - 'Asia/Beirut' => 7200, - 'Asia/Bishkek' => 18000, - 'Asia/Brunei' => 28800, - 'Asia/Calcutta' => 19800, - 'Asia/Choibalsan' => 32400, - 'Asia/Chongqing' => 28800, - 'Asia/Chungking' => 28800, - 'Asia/Colombo' => 21600, - 'Asia/Dacca' => 21600, - 'Asia/Damascus' => 7200, - 'Asia/Dhaka' => 21600, - 'Asia/Dili' => 32400, - 'Asia/Dubai' => 14400, - 'Asia/Dushanbe' => 18000, - 'Asia/Gaza' => 7200, - 'Asia/Harbin' => 28800, - 'Asia/Hong_Kong' => 28800, - 'Asia/Hovd' => 25200, - 'Asia/Irkutsk' => 28800, - 'Asia/Istanbul' => 7200, - 'Asia/Jakarta' => 25200, - 'Asia/Jayapura' => 32400, - 'Asia/Jerusalem' => 7200, - 'Asia/Kabul' => 16200, - 'Asia/Kamchatka' => 43200, - 'Asia/Karachi' => 18000, - 'Asia/Kashgar' => 28800, - 'Asia/Katmandu' => 20700, - 'Asia/Krasnoyarsk' => 25200, - 'Asia/Kuala_Lumpur' => 28800, - 'Asia/Kuching' => 28800, - 'Asia/Kuwait' => 10800, - 'Asia/Macao' => 28800, - 'Asia/Macau' => 0, - 'Asia/Magadan' => 39600, - 'Asia/Makassar' => 0, - 'Asia/Manila' => 28800, - 'Asia/Muscat' => 14400, - 'Asia/Nicosia' => 7200, - 'Asia/Novosibirsk' => 21600, - 'Asia/Omsk' => 21600, - 'Asia/Oral' => 0, - 'Asia/Phnom_Penh' => 25200, - 'Asia/Pontianak' => 25200, - 'Asia/Pyongyang' => 32400, - 'Asia/Qatar' => 10800, - 'Asia/Qyzylorda' => 0, - 'Asia/Rangoon' => 23400, - 'Asia/Riyadh' => 10800, - 'Asia/Saigon' => 25200, - 'Asia/Sakhalin' => 36000, - 'Asia/Samarkand' => 18000, - 'Asia/Seoul' => 32400, - 'Asia/Shanghai' => 28800, - 'Asia/Singapore' => 28800, - 'Asia/Taipei' => 28800, - 'Asia/Tashkent' => 18000, - 'Asia/Tbilisi' => 14400, - 'Asia/Tehran' => 12600, - 'Asia/Tel_Aviv' => 7200, - 'Asia/Thimbu' => 21600, - 'Asia/Thimphu' => 21600, - 'Asia/Tokyo' => 32400, - 'Asia/Ujung_Pandang' => 28800, - 'Asia/Ulaanbaatar' => 28800, - 'Asia/Ulan_Bator' => 28800, - 'Asia/Urumqi' => 28800, - 'Asia/Vientiane' => 25200, - 'Asia/Vladivostok' => 36000, - 'Asia/Yakutsk' => 32400, - 'Asia/Yekaterinburg' => 18000, - 'Asia/YerevanAtlantic/Azores' => 0, - 'Atlantic/Bermuda' => -14400, - 'Atlantic/Canary' => 0, - 'Atlantic/Cape_Verde' => -3600, - 'Atlantic/Faeroe' => 0, - 'Atlantic/Jan_Mayen' => 3600, - 'Atlantic/Madeira' => 0, - 'Atlantic/Reykjavik' => 0, - 'Atlantic/South_Georgia' => -7200, - 'Atlantic/St_Helena' => 0, - 'Atlantic/Stanley' => -14400, - 'Australia/ACT' => 36000, - 'Australia/Adelaide' => 34200, - 'Australia/Brisbane' => 36000, - 'Australia/Broken_Hill' => 34200, - 'Australia/Canberra' => 36000, - 'Australia/Currie' => 0, - 'Australia/Darwin' => 34200, - 'Australia/Hobart' => 36000, - 'Australia/LHI' => 37800, - 'Australia/Lindeman' => 36000, - 'Australia/Lord_Howe' => 37800, - 'Australia/Melbourne' => 36000, - 'Australia/NSW' => 36000, - 'Australia/North' => 34200, - 'Australia/Perth' => 28800, - 'Australia/Queensland' => 36000, - 'Australia/South' => 34200, - 'Australia/Sydney' => 36000, - 'Australia/Tasmania' => 36000, - 'Australia/Victoria' => 36000, - 'Australia/West' => 28800, - 'Australia/Yancowinna' => 34200, - 'Europe/Amsterdam' => 3600, - 'Europe/Andorra' => 3600, - 'Europe/Athens' => 7200, - 'Europe/Belfast' => 0, - 'Europe/Belgrade' => 3600, - 'Europe/Berlin' => 3600, - 'Europe/Bratislava' => 3600, - 'Europe/Brussels' => 3600, - 'Europe/Bucharest' => 7200, - 'Europe/Budapest' => 3600, - 'Europe/Chisinau' => 7200, - 'Europe/Copenhagen' => 3600, - 'Europe/Dublin' => 0, - 'Europe/Gibraltar' => 3600, - 'Europe/Guernsey' => 0, - 'Europe/Helsinki' => 7200, - 'Europe/Isle_of_Man' => 0, - 'Europe/Istanbul' => 7200, - 'Europe/Jersey' => 0, - 'Europe/Kaliningrad' => 7200, - 'Europe/Kiev' => 7200, - 'Europe/Lisbon' => 0, - 'Europe/Ljubljana' => 3600, - 'Europe/London' => 0, - 'Europe/Luxembourg' => 3600, - 'Europe/Madrid' => 3600, - 'Europe/Malta' => 3600, - 'Europe/Mariehamn' => 0, - 'Europe/Minsk' => 7200, - 'Europe/Monaco' => 3600, - 'Europe/Moscow' => 10800, - 'Europe/Nicosia' => 7200, - 'Europe/Oslo' => 3600, - 'Europe/Paris' => 3600, - 'Europe/Prague' => 3600, - 'Europe/Riga' => 7200, - 'Europe/Rome' => 3600, - 'Europe/Samara' => 14400, - 'Europe/San_Marino' => 3600, - 'Europe/Sarajevo' => 3600, - 'Europe/Simferopol' => 7200, - 'Europe/Skopje' => 3600, - 'Europe/Sofia' => 7200, - 'Europe/Stockholm' => 3600, - 'Europe/Tallinn' => 7200, - 'Europe/Tirane' => 3600, - 'Europe/Tiraspol' => 7200, - 'Europe/Uzhgorod' => 7200, - 'Europe/Vaduz' => 3600, - 'Europe/Vatican' => 3600, - 'Europe/Vienna' => 3600, - 'Europe/Vilnius' => 7200, - 'Europe/Volgograd' => 0, - 'Europe/Warsaw' => 3600, - 'Europe/Zagreb' => 3600, - 'Europe/Zaporozhye' => 7200, - 'Europe/Zurich' => 3600, - 'Indian/Antananarivo' => 10800, - 'Indian/Chagos' => 21600, - 'Indian/Christmas' => 25200, - 'Indian/Cocos' => 23400, - 'Indian/Comoro' => 10800, - 'Indian/Kerguelen' => 18000, - 'Indian/Mahe' => 14400, - 'Indian/Maldives' => 18000, - 'Indian/Mauritius' => 14400, - 'Indian/Mayotte' => 10800, - 'Indian/Reunion' => 14400, - 'Pacific/Apia' => -39600, - 'Pacific/Auckland' => 43200, - 'Pacific/Chatham' => 45900, - 'Pacific/Easter' => -21600, - 'Pacific/Efate' => 39600, - 'Pacific/Enderbury' => 46800, - 'Pacific/Fakaofo' => -36000, - 'Pacific/Fiji' => 43200, - 'Pacific/Funafuti' => 43200, - 'Pacific/Galapagos' => -21600, - 'Pacific/Gambier' => -32400, - 'Pacific/Guadalcanal' => 39600, - 'Pacific/Guam' => 36000, - 'Pacific/Honolulu' => -36000, - 'Pacific/Johnston' => -36000, - 'Pacific/Kiritimati' => 50400, - 'Pacific/Kosrae' => 39600, - 'Pacific/Kwajalein' => 43200, - 'Pacific/Majuro' => 43200, - 'Pacific/Marquesas' => -34200, - 'Pacific/Midway' => -39600, - 'Pacific/Nauru' => 43200, - 'Pacific/Niue' => -39600, - 'Pacific/Norfolk' => 41400, - 'Pacific/Noumea' => 39600, - 'Pacific/Pago_Pago' => -39600, - 'Pacific/Palau' => 32400, - 'Pacific/Pitcairn' => -28800, - 'Pacific/Ponape' => 39600, - 'Pacific/Port_Moresby' => 36000, - 'Pacific/Rarotonga' => -36000, - 'Pacific/Saipan' => 36000, - 'Pacific/Samoa' => -39600, - 'Pacific/Tahiti' => -36000, - 'Pacific/Tarawa' => 43200, - 'Pacific/Tongatapu' => 46800, - 'Pacific/Truk' => 36000, - 'Pacific/Wake' => 43200, - 'Pacific/Wallis' => 43200, - 'Pacific/Yap' => 36000 ); - - $dst_timezones = array ( - 'America/Adak' => 1, - 'America/Atka' => 1, - 'America/Anchorage' => 1, - 'America/Juneau' => 1, - 'America/Nome' => 1, - 'America/Yakutat' => 1, - 'America/Dawson' => 1, - 'America/Ensenada' => 1, - 'America/Los_Angeles' => 1, - 'America/Tijuana' => 1, - 'America/Vancouver' => 1, - 'America/Whitehorse' => 1, - 'America/Boise' => 1, - 'America/Cambridge_Bay' => 1, - 'America/Chihuahua' => 1, - 'America/Denver' => 1, - 'America/Edmonton' => 1, - 'America/Inuvik' => 1, - 'America/Mazatlan' => 1, - 'America/Shiprock' => 1, - 'America/Yellowknife' => 1, - 'America/Cancun' => 1, - 'America/Chicago' => 1, - 'America/Menominee' => 1, - 'America/Merida' => 1, - 'America/Monterrey' => 1, - 'America/North_Dakota/Center' => 1, - 'America/Rainy_River' => 1, - 'America/Rankin_Inlet' => 1, - 'America/Winnipeg' => 1, - 'Pacific/Easter' => 1, - 'America/Detroit' => 1, - 'America/Grand_Turk' => 1, - 'America/Havana' => 1, - 'America/Iqaluit' => 1, - 'America/Kentucky/Louisville' => 1, - 'America/Kentucky/Monticello' => 1, - 'America/Louisville' => 1, - 'America/Montreal' => 1, - 'America/Nassau' => 1, - 'America/New_York' => 1, - 'America/Nipigon' => 1, - 'America/Pangnirtung' => 1, - 'America/Thunder_Bay' => 1, - 'America/Asuncion' => 1, - 'America/Cuiaba' => 1, - 'America/Glace_Bay' => 1, - 'America/Goose_Bay' => 1, - 'America/Halifax' => 1, - 'America/Santiago' => 1, - 'Antarctica/Palmer' => 1, - 'Atlantic/Bermuda' => 1, - 'Atlantic/Stanley' => 1, - 'America/St_Johns' => 1, - 'America/Araguaina' => 1, - 'America/Fortaleza' => 1, - 'America/Godthab' => 1, - 'America/Maceio' => 1, - 'America/Miquelon' => 1, - 'America/Recife' => 1, - 'America/Sao_Paulo' => 1, - 'America/Scoresbysund' => 1, - 'Atlantic/Canary' => 1, - 'Atlantic/Faeroe' => 1, - 'Atlantic/Madeira' => 1, - 'Europe/Belfast' => 1, - 'Europe/Dublin' => 1, - 'Europe/Lisbon' => 1, - 'Europe/London' => 1, - 'Africa/Ceuta' => 1, - 'Africa/Windhoek' => 1, - 'Atlantic/Jan_Mayen' => 1, - 'Europe/Amsterdam' => 1, - 'Europe/Andorra' => 1, - 'Europe/Belgrade' => 1, - 'Europe/Berlin' => 1, - 'Europe/Bratislava' => 1, - 'Europe/Brussels' => 1, - 'Europe/Budapest' => 1, - 'Europe/Copenhagen' => 1, - 'Europe/Gibraltar' => 1, - 'Europe/Ljubljana' => 1, - 'Europe/Luxembourg' => 1, - 'Europe/Madrid' => 1, - 'Europe/Malta' => 1, - 'Europe/Monaco' => 1, - 'Europe/Oslo' => 1, - 'Europe/Paris' => 1, - 'Europe/Prague' => 1, - 'Europe/Rome' => 1, - 'Europe/San_Marino' => 1, - 'Europe/Sarajevo' => 1, - 'Europe/Skopje' => 1, - 'Europe/Stockholm' => 1, - 'Europe/Tirane' => 1, - 'Europe/Vaduz' => 1, - 'Europe/Vatican' => 1, - 'Europe/Vienna' => 1, - 'Europe/Warsaw' => 1, - 'Europe/Zagreb' => 1, - 'Europe/Zurich' => 1, - 'Africa/Cairo' => 1, - 'Asia/Amman' => 1, - 'Asia/Beirut' => 1, - 'Asia/Damascus' => 1, - 'Asia/Gaza' => 1, - 'Asia/Istanbul' => 1, - 'Asia/Jerusalem' => 1, - 'Asia/Nicosia' => 1, - 'Asia/Tel_Aviv' => 1, - 'Europe/Athens' => 1, - 'Europe/Bucharest' => 1, - 'Europe/Chisinau' => 1, - 'Europe/Helsinki' => 1, - 'Europe/Istanbul' => 1, - 'Europe/Kaliningrad' => 1, - 'Europe/Kiev' => 1, - 'Europe/Minsk' => 1, - 'Europe/Nicosia' => 1, - 'Europe/Riga' => 1, - 'Europe/Simferopol' => 1, - 'Europe/Sofia' => 1, - 'Europe/Tiraspol' => 1, - 'Europe/Uzhgorod' => 1, - 'Europe/Zaporozhye' => 1, - 'Asia/Baghdad' => 1, - 'Europe/Moscow' => 1, - 'Asia/Tehran' => 1, - 'Asia/Aqtau' => 1, - 'Asia/Baku' => 1, - 'Asia/Tbilisi' => 1, - 'Europe/Samara' => 1, - 'Asia/Aqtobe' => 1, - 'Asia/Bishkek' => 1, - 'Asia/Yekaterinburg' => 1, - 'Asia/Almaty' => 1, - 'Asia/Novosibirsk' => 1, - 'Asia/Omsk' => 1, - 'Asia/Krasnoyarsk' => 1, - 'Asia/Irkutsk' => 1, - 'Asia/Yakutsk' => 1, - 'Australia/Adelaide' => 1, - 'Australia/Broken_Hill' => 1, - 'Australia/South' => 1, - 'Australia/Yancowinna' => 1, - 'Asia/Sakhalin' => 1, - 'Asia/Vladivostok' => 1, - 'Australia/ACT' => 1, - 'Australia/Canberra' => 1, - 'Australia/Hobart' => 1, - 'Australia/Melbourne' => 1, - 'Australia/NSW' => 1, - 'Australia/Sydney' => 1, - 'Australia/Tasmania' => 1, - 'Australia/Victoria' => 1, - 'Australia/LHI' => 1, - 'Australia/Lord_Howe' => 1, - 'Asia/Magadan' => 1, - 'Antarctica/McMurdo' => 1, - 'Antarctica/South_Pole' => 1, - 'Asia/Anadyr' => 1, - 'Asia/Kamchatka' => 1, - 'Pacific/Auckland' => 1, - 'Pacific/Chatham' => 1, - ); - return(array("TIMEZONES" => $timezones, "DST_ZONES" => $dst_timezones)); -} - - -function display_error_page() +/* Removes a given objectClass from the attrs entry */ +function remove_objectClass($classes, &$attrs) { - $smarty= get_smarty(); - $smarty->display(get_template_path('headers.tpl')); - echo "".msg_dialog::get_dialogs().""; + if (isset($attrs['objectClass'])){ + /* Array? */ + if (is_array($classes)){ + $list= $classes; + } else { + $list= array($classes); + } + + $tmp= array(); + foreach ($attrs['objectClass'] as $oc) { + foreach ($list as $class){ + if ($oc != $class){ + $tmp[]= $oc; + } + } + } + $attrs['objectClass']= $tmp; + } +} + +/*! \brief Initialize a file download with given content, name and data type. + * @param data String The content to send. + * @param name String The name of the file. + * @param type String The content identifier, default value is "application/octet-stream"; + */ +function send_binary_content($data,$name,$type = "application/octet-stream") +{ + header("Expires: Mon, 26 Jul 1997 05:00:00 GMT"); + header("Last-Modified: ".gmdate("D, d M Y H:i:s")." GMT"); + header("Cache-Control: no-cache"); + header("Pragma: no-cache"); + header("Cache-Control: post-check=0, pre-check=0"); + header("Content-type: ".$type.""); + + /* force download dialog */ + if (preg_match('/MSIE 5.5/', $HTTP_USER_AGENT) || preg_match('/MSIE 6.0/', $HTTP_USER_AGENT)) { + header('Content-Disposition: filename="'.$name.'"'); + } else { + header('Content-Disposition: attachment; filename="'.$name.'"'); + } + + echo $data; exit(); } + +/*! \brief Encode special string characters so we can use the string in \ + HTML output, without breaking quotes. + @param The String we want to encode. + @return The encoded String + */ +function xmlentities($str) +{ + if(is_string($str)){ + return(htmlentities($str,ENT_QUOTES)); + }elseif(is_array($str)){ + foreach($str as $name => $value){ + $str[$name] = xmlentities($value); + } + } + return($str); +} + + +/*! \brief Updates all accessTo attributes from a given value to a new one. + For example if a host is renamed. + @param String $from The source accessTo name. + @param String $to The destination accessTo name. +*/ +function update_accessTo($from,$to) +{ + global $config; + $ldap = $config->get_ldap_link(); + $ldap->cd($config->current['BASE']); + $ldap->search("(&(objectClass=trustAccount)(accessTo=".$from."))",array("objectClass","accessTo")); + while($attrs = $ldap->fetch()){ + $new_attrs = array(); + $dn = $attrs['dn']; + for($i = 0 ; $i < $attrs['objectClass']['count']; $i++){ + $new_attrs['objectClass'][] = $attrs['objectClass'][$i]; + } + for($i = 0 ; $i < $attrs['accessTo']['count']; $i++){ + if($attrs['accessTo'][$i] == $from){ + if(!empty($to)){ + $new_attrs['accessTo'][] = $to; + } + }else{ + $new_attrs['accessTo'][] = $attrs['accessTo'][$i]; + } + } + $ldap->cd($dn); + $ldap->modify($new_attrs); + if (!$ldap->success()){ + msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error(), $dn, LDAP_MOD, "update_accessTo($from,$to)")); + } + new log("modify","update_accessTo($from,$to)",$dn,array_keys($new_attrs),$ldap->get_error()); + } +} + + +function get_random_char () { + $randno = rand (0, 63); + if ($randno < 12) { + return (chr ($randno + 46)); // Digits, '/' and '.' + } else if ($randno < 38) { + return (chr ($randno + 53)); // Uppercase + } else { + return (chr ($randno + 59)); // Lowercase + } + } + // vim:tabstop=2:expandtab:shiftwidth=2:filetype=php:syntax:ruler: ?>