X-Git-Url: https://git.tokkee.org/?a=blobdiff_plain;f=setup%2Fclass_setupStep_Migrate.inc;h=e238692681b07d10b98eacf6ad93cc7efb34c57c;hb=6557949139db5e19dfc46394a76396440efa1dd3;hp=5fd72d01dcd0ce6389dd8b28a46713b8d890f4fb;hpb=48029b82c110fa8a93cb3476982dc19b92195a04;p=gosa.git diff --git a/setup/class_setupStep_Migrate.inc b/setup/class_setupStep_Migrate.inc index 5fd72d01d..e23869268 100644 --- a/setup/class_setupStep_Migrate.inc +++ b/setup/class_setupStep_Migrate.inc @@ -20,6 +20,35 @@ */ + +/**************** + * FUNCTIONS + +Step_Migrate - Constructor. +update_strings - Used to update the displayed step informations. +initialize_checks - Initialize migration steps. +check_ldap_permissions - Check if the used admin account has full access to the ldap database. +check_gosaAccounts - Check if there are users without the required objectClasses. +migrate_gosaAccounts - Migrate selected users to GOsa user accounts. +check_organizationalUnits - Check if there are departments, that are not visible for GOsa +migrate_organizationalUnits - Migrate selected departments +check_administrativeAccount - Check if there is at least one acl entry available +checkBase - Check if there is a root object available + +get_user_list - Get list of available users +get_group_list - Get list of groups + +create_admin +create_admin_user + +execute - Generate html output of this plugin +save_object - Save posts +array_to_ldif - Create ldif output of an ldap result array + + ****************/ + + + class Step_Migrate extends setup_step { var $languages = array(); @@ -45,6 +74,27 @@ class Step_Migrate extends setup_step /* Checks initialised ? */ var $checks_initialised = FALSE; + /* Users outside to people ou */ + var $outside_users = array(); + var $outside_users_dialog = FALSE; + + /* Users outside to groups ou */ + var $outside_groups = array(); + var $outside_groups_dialog = FALSE; + + /* Win-Workstations outside to reserved ou */ + var $outside_winstations = array(); + var $outside_winstations_dialog = FALSE; + + /* check for multiple use of same uidNumber */ + var $check_uidNumbers = array(); + var $check_uidNumbers_dialog = FALSE; + + /* check for multiple use of same gidNumber */ + var $check_gidNumbers = array(); + var $check_gidNumbers_dialog = FALSE; + + function Step_Migrate() { $this->update_strings(); @@ -76,27 +126,54 @@ class Step_Migrate extends setup_step $this->checks['deps_visible']['STATUS'] = FALSE; $this->checks['deps_visible']['STATUS_MSG']= ""; $this->checks['deps_visible']['ERROR_MSG'] = ""; - $this->check_visible_organizationalUnits(); + $this->check_organizationalUnits(); $this->checks['users_visible']['TITLE'] = _("Checking for invisible user"); $this->checks['users_visible']['STATUS'] = FALSE; $this->checks['users_visible']['STATUS_MSG']= ""; $this->checks['users_visible']['ERROR_MSG'] = ""; - $this->check_invisible_gosaAccounts(); + $this->check_gosaAccounts(); $this->checks['acls']['TITLE'] = _("Checking for administrational account"); $this->checks['acls']['STATUS'] = FALSE; $this->checks['acls']['STATUS_MSG']= ""; $this->checks['acls']['ERROR_MSG'] = ""; - $this->check_acls(); + $this->check_administrativeAccount(); + + $this->checks['outside_users']['TITLE'] = _("Checking for users outside the people department."); + $this->checks['outside_users']['STATUS'] = FALSE; + $this->checks['outside_users']['STATUS_MSG']= ""; + $this->checks['outside_users']['ERROR_MSG'] = ""; + $this->search_outside_users(); + + $this->checks['outside_groups']['TITLE'] = _("Checking for groups outside the groups department."); + $this->checks['outside_groups']['STATUS'] = FALSE; + $this->checks['outside_groups']['STATUS_MSG']= ""; + $this->checks['outside_groups']['ERROR_MSG'] = ""; + $this->search_outside_groups(); + + $this->checks['outside_winstations']['TITLE'] = _("Checking for windows workstations outside the winstation department."); + $this->checks['outside_winstations']['STATUS'] = FALSE; + $this->checks['outside_winstations']['STATUS_MSG']= ""; + $this->checks['outside_winstations']['ERROR_MSG'] = ""; + $this->search_outside_winstations(); + + $this->checks['uidNumber_usage']['TITLE'] = _("Checking for multiple use of same uidNumber value."); + $this->checks['uidNumber_usage']['STATUS'] = FALSE; + $this->checks['uidNumber_usage']['STATUS_MSG']= ""; + $this->checks['uidNumber_usage']['ERROR_MSG'] = ""; + $this->check_uidNumber(); + + $this->checks['gidNumber_usage']['TITLE'] = _("Checking for multiple use of same gidNumber value."); + $this->checks['gidNumber_usage']['STATUS'] = FALSE; + $this->checks['gidNumber_usage']['STATUS_MSG']= ""; + $this->checks['gidNumber_usage']['ERROR_MSG'] = ""; + $this->check_gidNumber(); } - - /* Check Acls if there is at least one object with acls defined - */ - function check_acls() + + function check_uidNumber() { - /* Establish ldap connection */ $cv = $this->parent->captured_values; $ldap = new LDAP($cv['admin'], $cv['password'], @@ -104,23 +181,222 @@ class Step_Migrate extends setup_step FALSE, $cv['tls']); - /* Search for gosaAcls */ $ldap->cd($cv['base']); - $res = $ldap->search("(&(objectClass=gosaAccount)(|(objectClass=posixAccount)". - "(objectClass=inetOrgPerson)(objectClass=organizationalPerson)))"); + $res = $ldap->search("uidNumber=*",array("dn","uidNumber")); if(!$res){ - $this->checks['acls']['STATUS'] = FALSE; - $this->checks['acls']['STATUS_MSG']= _("Ldap query failed."); - $this->checks['acls']['ERROR_MSG'] = _("Possibly the 'root object' is missing."); - }elseif($ldap->count() == 0){ - $this->checks['acls']['STATUS'] = TRUE; - $this->checks['acls']['STATUS_MSG']= _("Ok"); + $this->checks['uidNumber_usage']['STATUS'] = FALSE; + $this->checks['uidNumber_usage']['STATUS_MSG']= _("Ldap query failed."); + $this->checks['uidNumber_usage']['ERROR_MSG'] = _("Possibly the 'root object' is missing."); + return(false); + } + + $this->check_uidNumbers= array(); + $tmp = array(); + while($attrs = $ldap->fetch()){ + $tmp[$attrs['uidNumber'][0]][] = $attrs; + } + + foreach($tmp as $id => $entries){ + if(count($entries) > 1){ + foreach($entries as $entry){ + $this->check_uidNumbers[base64_encode($entry['dn'])] = $entry; + } + } + } + + if($this->check_uidNumbers){ + $this->checks['uidNumber_usage']['STATUS'] = FALSE; + $this->checks['uidNumber_usage']['STATUS_MSG']= _("Failed"); + $this->checks['uidNumber_usage']['ERROR_MSG'] = + sprintf(_("Found %s duplicated uidNumber values."),count($this->check_uidNumbers)); + return(false); }else{ - $this->checks['acls']['STATUS'] = FALSE; - $this->checks['acls']['STATUS_MSG']= _("Failed"); - $this->checks['acls']['ERROR_MSG'].= ""; + $this->checks['uidNumber_usage']['STATUS'] = TRUE; + $this->checks['uidNumber_usage']['STATUS_MSG']= _("Ok"); + $this->checks['uidNumber_usage']['ERROR_MSG'] = ""; + return(TRUE); + } + } + + function check_gidNumber() + { + $cv = $this->parent->captured_values; + $ldap = new LDAP($cv['admin'], + $cv['password'], + $cv['connection'], + FALSE, + $cv['tls']); + + $ldap->cd($cv['base']); + $res = $ldap->search("gidNumber=*",array("dn","gidNumber")); + if(!$res){ + $this->checks['gidNumber_usage']['STATUS'] = FALSE; + $this->checks['gidNumber_usage']['STATUS_MSG']= _("Ldap query failed."); + $this->checks['gidNumber_usage']['ERROR_MSG'] = _("Possibly the 'root object' is missing."); + return(false); + } + + $this->check_gidNumbers= array(); + $tmp = array(); + while($attrs = $ldap->fetch()){ + $tmp[$attrs['gidNumber'][0]][] = $attrs; + } + + foreach($tmp as $id => $entries){ + if(count($entries) > 1){ + foreach($entries as $entry){ + $this->check_gidNumbers[base64_encode($entry['dn'])] = $entry; + } + } + } + + if($this->check_gidNumbers){ + $this->checks['gidNumber_usage']['STATUS'] = FALSE; + $this->checks['gidNumber_usage']['STATUS_MSG']= _("Failed"); + $this->checks['gidNumber_usage']['ERROR_MSG'] = + sprintf(_("Found %s duplicated gidNumber values."),count($this->check_gidNumbers)); + return(false); + }else{ + $this->checks['gidNumber_usage']['STATUS'] = TRUE; + $this->checks['gidNumber_usage']['STATUS_MSG']= _("Ok"); + $this->checks['gidNumber_usage']['ERROR_MSG'] = ""; + return(TRUE); + } + } + + + /* Search for winstations outside the winstation ou */ + function search_outside_winstations() + { + $cv = $this->parent->captured_values; + $ldap = new LDAP($cv['admin'], + $cv['password'], + $cv['connection'], + FALSE, + $cv['tls']); + + /* Get winstation ou */ + if($cv['generic_settings']['wws_ou_active']) { + $winstation_ou = $cv['generic_settings']['ws_ou']; + }else{ + $winstation_ou = "ou=winstations"; + } + + $ldap->cd($cv['base']); + $res = $ldap->search("(&(objectClass=posixGroup)(sambaGroupType=2)(sambaSID=*))",array("dn","sambaSID")); + if(!$res){ + $this->checks['outside_winstations']['STATUS'] = FALSE; + $this->checks['outside_winstations']['STATUS_MSG']= _("Ldap query failed."); + $this->checks['outside_winstations']['ERROR_MSG'] = _("Possibly the 'root object' is missing."); + return(false); + } + + $this->outside_winstations = array(); + while($attrs = $ldap->fetch()){ + if(preg_match("/-516$/","",$attrs['sambaSID'][0]) && !preg_match("/^[^,]+,".normalizePreg($winstation_ou)."/",$attrs['dn'])){ + $this->outside_winstations[base64_encode($attrs['dn'])] = $attrs; + } + } + + if(count($this->outside_winstations)){ + $this->checks['outside_winstations']['STATUS'] = FALSE; + $this->checks['outside_winstations']['STATUS_MSG']= _("Failed"); + $this->checks['outside_winstations']['ERROR_MSG'] = + sprintf(_("Found %s winstations outside the predefined winstation department ou '%s'."),count($this->outside_winstations),$winstation_ou); + return(false); + }else{ + $this->checks['outside_winstations']['STATUS'] = TRUE; + $this->checks['outside_winstations']['STATUS_MSG']= _("Ok"); + $this->checks['outside_winstations']['ERROR_MSG'] = ""; + return(TRUE); + } + } + + + /* Search for groups outside the group ou */ + function search_outside_groups() + { + $cv = $this->parent->captured_values; + $ldap = new LDAP($cv['admin'], + $cv['password'], + $cv['connection'], + FALSE, + $cv['tls']); + + $group_ou = $cv['groupou']; + $ldap->cd($cv['base']); + $res = $ldap->search("(objectClass=posixGroup)",array("dn")); + if(!$res){ + $this->checks['outside_groups']['STATUS'] = FALSE; + $this->checks['outside_groups']['STATUS_MSG']= _("Ldap query failed."); + $this->checks['outside_groups']['ERROR_MSG'] = _("Possibly the 'root object' is missing."); + return(false); + } + + + $this->outside_groups = array(); + while($attrs = $ldap->fetch()){ + if(!preg_match("/^[^,]+,".normalizePreg($group_ou)."/",$attrs['dn'])){ + $this->outside_groups[base64_encode($attrs['dn'])] = $attrs; + } + } + + if(count($this->outside_groups)){ + $this->checks['outside_groups']['STATUS'] = FALSE; + $this->checks['outside_groups']['STATUS_MSG']= _("Failed"); + $this->checks['outside_groups']['ERROR_MSG'] = + sprintf(_("Found %s groups outside the selected group ou '%s'."),count($this->outside_groups),$group_ou); + return(false); + }else{ + $this->checks['outside_groups']['STATUS'] = TRUE; + $this->checks['outside_groups']['STATUS_MSG']= _("Ok"); + $this->checks['outside_groups']['ERROR_MSG'] = ""; + return(TRUE); + } + } + + /* Search for users outside the people ou */ + function search_outside_users() + { + $cv = $this->parent->captured_values; + $ldap = new LDAP($cv['admin'], + $cv['password'], + $cv['connection'], + FALSE, + $cv['tls']); + $people_ou = $cv['peopleou']; + $ldap->cd($cv['base']); + $res = $ldap->search("(objectClass=gosaAccount)",array("dn")); + if(!$res){ + $this->checks['outside_users']['STATUS'] = FALSE; + $this->checks['outside_users']['STATUS_MSG']= _("Ldap query failed."); + $this->checks['outside_users']['ERROR_MSG'] = _("Possibly the 'root object' is missing."); + return(false); + } + + + $this->outside_users = array(); + while($attrs = $ldap->fetch()){ + if(!preg_match("/^[^,]+,".normalizePreg($people_ou)."/",$attrs['dn'])){ + $attrs['selected'] = FALSE; + $attrs['ldif'] = ""; + $this->outside_users[base64_encode($attrs['dn'])] = $attrs; + } + } + + if(count($this->outside_users)){ + $this->checks['outside_users']['STATUS'] = FALSE; + $this->checks['outside_users']['STATUS_MSG']= _("Failed"); + $this->checks['outside_users']['ERROR_MSG'] = + sprintf(_("Found %s users outside the selected user ou '%s'."),count($this->outside_users),$people_ou); + $this->checks['outside_users']['ERROR_MSG'].= ""; + return(false); + }else{ + $this->checks['outside_users']['STATUS'] = TRUE; + $this->checks['outside_users']['STATUS_MSG']= _("Ok"); + $this->checks['outside_users']['ERROR_MSG'] = ""; + return(TRUE); } - return($ldap->count()>=1); } @@ -195,7 +471,7 @@ class Step_Migrate extends setup_step /* Check if there are users which will * be invisible for GOsa */ - function check_invisible_gosaAccounts() + function check_gosaAccounts() { /* Remember old list of ivisible users, to be able to set * the 'html checked' status for the checkboxes again @@ -304,7 +580,7 @@ class Step_Migrate extends setup_step /* Check if there are invisible organizational Units */ - function check_visible_organizationalUnits() + function check_organizationalUnits() { $cnt_ok = 0; $old = $this->deps_to_migrate; @@ -432,50 +708,35 @@ class Step_Migrate extends setup_step } - function get_user_list() + /* Check Acls if there is at least one object with acls defined + */ + function check_administrativeAccount() { - /* Get collected configuration settings */ - $cv = $this->parent->captured_values; - /* Establish ldap connection */ - $ldap = new LDAP($cv['admin'], - $cv['password'], - $cv['connection'], - FALSE, - $cv['tls']); - - $ldap->cd($cv['base']); - $ldap->search("(objectClass=gosaAccount)",array("dn")); - - $tmp = array(); - while($attrs = $ldap->fetch()){ - $tmp[base64_encode($attrs['dn'])] = @LDAP::fix($attrs['dn']); - } - - return($tmp); - } - - function get_group_list() - { - /* Get collected configuration settings */ $cv = $this->parent->captured_values; - - /* Establish ldap connection */ $ldap = new LDAP($cv['admin'], $cv['password'], $cv['connection'], FALSE, $cv['tls']); - + + /* Search for gosaAcls */ $ldap->cd($cv['base']); - $ldap->search("(objectClass=posixGroup)",array("dn")); - - $tmp = array(); - while($attrs = $ldap->fetch()){ - $tmp[base64_encode($attrs['dn'])] = @LDAP::fix($attrs['dn']); + $res = $ldap->search("(&(objectClass=gosaAccount)(|(objectClass=posixAccount)". + "(objectClass=inetOrgPerson)(objectClass=organizationalPerson)))"); + if(!$res){ + $this->checks['acls']['STATUS'] = FALSE; + $this->checks['acls']['STATUS_MSG']= _("Ldap query failed."); + $this->checks['acls']['ERROR_MSG'] = _("Possibly the 'root object' is missing."); + }elseif($ldap->count()){ + $this->checks['acls']['STATUS'] = TRUE; + $this->checks['acls']['STATUS_MSG']= _("Ok"); + }else{ + $this->checks['acls']['STATUS'] = FALSE; + $this->checks['acls']['STATUS_MSG']= _("Failed"); + $this->checks['acls']['ERROR_MSG'].= ""; } - - return($tmp); + return($ldap->count()>=1); } @@ -538,6 +799,86 @@ class Step_Migrate extends setup_step } } } + + + function create_admin_user() + { + if(isset($_POST['new_user_password']) && !empty($_POST['new_user_password'])){ + $pwd = $_POST['new_user_password']; + }else{ + print_red(_("Please specify a valid password for the new GOsa admin user.")); + return(FALSE); + } + + /* Establish ldap connection */ + $cv = $this->parent->captured_values; + $ldap = new LDAP($cv['admin'], + $cv['password'], + $cv['connection'], + FALSE, + $cv['tls']); + + /* Get current base attributes */ + $ldap->cd($cv['base']); + + if($cv['peopledn'] == "cn"){ + $dn = "cn=System Administrator,".$cv['peopleou'].",".$cv['base']; + }else{ + $dn = "uid=admin,".$cv['peopleou'].",".$cv['base']; + } + + $methods = @passwordMethod::get_available_methods_if_not_loaded(); + $p_m = $methods[$cv['encryption']]; + $p_c = new $p_m(array()); + $hash = $p_c->generate_hash($pwd); + + $new_user=array(); + $new_user['objectClass']= array("top","person","gosaAccount","organizationalPerson","inetOrgPerson"); + $new_user['givenName'] = "System"; + $new_user['sn'] = "Administrator"; + $new_user['cn'] = "System Administrator"; + $new_user['uid'] = "admin"; + $new_user['userPassword'] = $hash; + + $ldap->cd($cv['base']); + $ldap->create_missing_trees(preg_replace("/^[^,]+,/","",$dn)); + $ldap->cd($dn); + $res = $ldap->add($new_user); + $this->acl_create_selected = $dn; + $this->create_admin(); + + if(!$res){ + print_red($ldap->get_error()); + } + + $this->acl_create_dialog=FALSE; + $this->check_administrativeAccount(); + } + + + function migrate_outside_users($perform = FALSE) + { + /* Check if there was a destination department posted */ + if(isset($_POST['move_user_to'])){ + $destination_dep = $_POST['move_user_to']; + }else{ + print_red(_("Couldn't move users to specified department.")); + return(false); + } + + foreach($this->outside_users as $b_dn => $data){ + $this->outside_users[$b_dn]['ldif'] =""; + if($data['selected']){ + $dn = base64_decode($b_dn); + $d_dn = preg_replace("/,.*$/",",".base64_decode($destination_dep),$dn); + if(!$perform){ + $this->outside_users[$b_dn]['ldif'] = $dn."
".$d_dn; + }else{ + $this->move($dn,$d_dn); + } + } + } + } function execute() @@ -548,15 +889,48 @@ class Step_Migrate extends setup_step $this->checks_initialised = TRUE; } - /* Permission check */ - $this->check_ldap_permissions(); - + /************* + * User outside the people ou + *************/ + + if(isset($_POST['outside_users_dialog_cancel'])){ + $this->outside_users_dialog = FALSE; + $this->dialog = FALSE; + } + + if(isset($_POST['outside_users_dialog_whats_done'])){ + $this->migrate_outside_users(FALSE); + } + + if(isset($_POST['outside_users_dialog_perform'])){ + $this->migrate_outside_users(TRUE); + $this->search_outside_users(); + } + + if(isset($_POST['outside_users_dialog'])){ + $this->outside_users_dialog = TRUE; + $this->dialog = TRUE; + } + + if($this->outside_users_dialog){ + $smarty = get_smarty(); + $smarty->assign("ous",$this->get_all_people_ous()); + $smarty->assign("method","outside_users"); + $smarty->assign("outside_users",$this->outside_users); + return($smarty->fetch(get_template_path("setup_migrate.tpl",TRUE,dirname(__FILE__)))); + } + /************* * Root object check *************/ if(isset($_POST['retry_root_create'])){ + + $state = $this->checks['root']['STATUS']; $this->checkBase(FALSE); + if($state != $this->checks['root']['STATUS']){ + $this->initialize_checks(); + } } /************* @@ -564,7 +938,7 @@ class Step_Migrate extends setup_step *************/ if(isset($_POST['retry_acls'])){ - $this->check_acls(); + $this->check_administrativeAccount(); } if(isset($_POST['create_acls'])){ @@ -585,10 +959,17 @@ class Step_Migrate extends setup_step $this->create_admin(TRUE); } + if(isset($_POST['create_admin_user'])){ + $this->create_admin_user(); + } + if($this->acl_create_dialog){ $smarty = get_smarty(); + $smarty->assign("new_user_password",@$_POST['new_user_password']); $smarty->assign("users" ,$this->get_user_list()); + $smarty->assign("users_cnt" ,count($this->get_user_list())); $smarty->assign("groups",$this->get_group_list()); + $smarty->assign("groups_cnt",count($this->get_group_list())); $smarty->assign("type" ,$this->acl_create_type); $smarty->assign("method","create_acls"); $smarty->assign("acl_create_selected",$this->acl_create_selected); @@ -602,7 +983,7 @@ class Step_Migrate extends setup_step /* Refresh list of deparments */ if(isset($_POST['users_visible_migrate_refresh'])){ - $this->check_invisible_gosaAccounts(); + $this->check_gosaAccounts(); } /* Open migration dialog */ @@ -620,7 +1001,7 @@ class Step_Migrate extends setup_step /* Start migration */ if(isset($_POST['users_visible_migrate_migrate'])){ if($this->migrate_gosaAccounts()){ - $this->check_invisible_gosaAccounts(); + $this->check_gosaAccounts(); } } @@ -644,7 +1025,7 @@ class Step_Migrate extends setup_step /* Refresh list of deparments */ if(isset($_POST['deps_visible_migrate_refresh'])){ - $this->check_visible_organizationalUnits(); + $this->check_organizationalUnits(); } /* Open migration dialog */ @@ -662,7 +1043,7 @@ class Step_Migrate extends setup_step /* Start migration */ if(isset($_POST['deps_visible_migrate_migrate'])){ if($this->migrate_organizationalUnits()){ - $this->check_visible_organizationalUnits(); + $this->check_organizationalUnits(); } } @@ -688,6 +1069,17 @@ class Step_Migrate extends setup_step function save_object() { + /* Capture all selected users from outside_users_dialog */ + if($this->outside_users_dialog){ + foreach($this->outside_users as $dn => $data){ + if(isset($_POST['select_user_'.$dn])){ + $this->outside_users[$dn]['selected'] = TRUE; + }else{ + $this->outside_users[$dn]['selected'] = FALSE; + } + } + } + /* Get "create acl" dialog posts */ if($this->acl_create_dialog){ if(isset($_POST['create_acls_create'])){ @@ -731,7 +1123,11 @@ class Step_Migrate extends setup_step } - // checks for valid base entry + /* Check if the root object exists. + * If the parameter just_check is true, then just check if the + * root object is missing and update the info messages. + * If the Parameter is false, try to create a new root object. + */ function checkBase($just_check = TRUE) { /* Get collected setup informations */ @@ -762,10 +1158,39 @@ class Step_Migrate extends setup_step return(FALSE); }else{ + echo "REMOVE this : Autocreation of the root object will be done by create_missing_tree later. !!!!!!!"; + + /* Try to find out which values are necessary */ + $tmp = $ldap->get_objectclasses(); + $oc = $tmp['organization']; + + $must_attrs = $oc['MUST']; + if(!is_array($must_attrs)){ + $must_attrs = array($must_attrs); + } + + /* Root object does not exists try to create it */ + $ldapadd["objectclass"][0]="top"; + $ldapadd["objectclass"][1]="organization"; + + /* Try to fill all collected must attributes */ + $base_parts = preg_split("/,/",$cv['base']); + foreach($must_attrs as $attr){ + foreach($base_parts as $part){ + if(preg_match("/^".$attr."=/",$part) && !isset($ldapadd[$attr])){ + $ldapadd[$attr]= preg_replace("/^[^=]*+=/","",$part); + } + } + } + /* Add root object */ $ldap->cd($cv['base']); - $res = $ldap->create_missing_trees($cv['base']); - + $res = $ldap->add($ldapadd); + + /* Add root object */ + $ldap->cd($cv['base']); + # $res = $ldap->create_missing_trees($cv['base']); + /* If adding failed, tell the user */ if(!$res){ $this->checks['root']['STATUS'] = FALSE; @@ -806,6 +1231,144 @@ class Step_Migrate extends setup_step } return(preg_replace("/\n$/","",$ret)); } + + + function get_user_list() + { + /* Get collected configuration settings */ + $cv = $this->parent->captured_values; + + /* Establish ldap connection */ + $ldap = new LDAP($cv['admin'], + $cv['password'], + $cv['connection'], + FALSE, + $cv['tls']); + + $ldap->cd($cv['base']); + $ldap->search("(objectClass=gosaAccount)",array("dn")); + + $tmp = array(); + while($attrs = $ldap->fetch()){ + $tmp[base64_encode($attrs['dn'])] = @LDAP::fix($attrs['dn']); + } + return($tmp); + } + + + function get_all_people_ous() + { + /* Get collected configuration settings */ + $cv = $this->parent->captured_values; + + /* Establish ldap connection */ + $ldap = new LDAP($cv['admin'], + $cv['password'], + $cv['connection'], + FALSE, + $cv['tls']); + + $ldap->cd($cv['base']); + $ldap->search("(".$cv['peopleou'].")",array("dn")); + + if($ldap->count() == 0 ){ + $add_dn = $cv['peopleou'].",".$cv['base']; + $naming_attr = preg_replace("/=.*$/","",$add_dn); + $naming_value = preg_replace("/^[^=]*+=([^,]*).*$/","\\1",$add_dn); + $add = array(); + $add['objectClass'] = array("organizationalUnit"); + $add[$naming_attr] = $naming_value; + + $ldap->cd($cv['base']); + $ldap->create_missing_trees(preg_replace("/^[^,]+,/","",$add_dn)); + $ldap->cd($add_dn); + $ldap->add($add); + } + + $ldap->search("(".$cv['peopleou'].")",array("dn")); + $tmp = array(); + while($attrs= $ldap->fetch()){ + if(!preg_match("/ou=snapshots,/",$attrs['dn'])){ + $tmp[base64_encode($attrs['dn'])] = $ldap->fix($attrs['dn']); + } + } + return($tmp); + } + + + function get_group_list() + { + /* Get collected configuration settings */ + $cv = $this->parent->captured_values; + + /* Establish ldap connection */ + $ldap = new LDAP($cv['admin'], + $cv['password'], + $cv['connection'], + FALSE, + $cv['tls']); + + $ldap->cd($cv['base']); + $ldap->search("(objectClass=posixGroup)",array("dn")); + + $tmp = array(); + while($attrs = $ldap->fetch()){ + $tmp[base64_encode($attrs['dn'])] = @LDAP::fix($attrs['dn']); + } + return($tmp); + } + + + function move($source,$destination) + { + /* Get collected configuration settings */ + $cv = $this->parent->captured_values; + + /* Establish ldap connection */ + $ldap = new LDAP($cv['admin'], + $cv['password'], + $cv['connection'], + FALSE, + $cv['tls']); + + /* Rename dn in possible object groups */ +# $ldap->cd($cv['base']); +# $ldap->search('(&(objectClass=gosaGroupOfNames)(member='.@LDAP::fix($source).'))', +# array('cn')); + # while ($attrs= $ldap->fetch()){ + # $og= new ogroup($this->config, $ldap->getDN()); + # unset($og->member[$src_dn]); + # $og->member[$dst_dn]= $dst_dn; + # $og->save (); + # } + + $ldap->cat($source); + $new_data = $this->cleanup_array($ldap->fetch()); + $ldap->cd($destination); + $res = $ldap->add($new_data); + + if(!$res){ + print_red(_("Failed to copy '%s' to '%s'. Ldap says '%s'."),$source,$destination,$ldap->get_error()); + }else{ + $ldap->rmDir($source); + show_ldap_error($ldap->get_error(),_("Something went wrong while copying dns.")); + } + } + + + /* Cleanup ldap result to be able to write it be to ldap */ + function cleanup_array($attrs) + { + foreach($attrs as $key => $value) { + if(is_numeric($key) || in_array($key,array("count","dn"))){ + unset($attrs[$key]); + } + if(is_array($value) && isset($value['count'])){ + unset($attrs[$key]['count']); + } + } + return($attrs); + } } // vim:tabstop=2:expandtab:shiftwidth=2:filetype=php:syntax:ruler: