2013-01-24 16:01:43 +04:00
|
|
|
|
<?php
|
|
|
|
|
/**
|
2016-07-21 17:49:16 +03:00
|
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
|
*
|
2016-05-26 20:56:05 +03:00
|
|
|
|
* @author Arthur Schiwon <blizzz@arthur-schiwon.de>
|
2015-03-26 13:44:34 +03:00
|
|
|
|
* @author Brice Maron <brice@bmaron.net>
|
2020-03-31 11:49:10 +03:00
|
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2016-07-21 17:49:16 +03:00
|
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2015-03-26 13:44:34 +03:00
|
|
|
|
* @author Jörn Friedrich Dreyer <jfd@butonic.de>
|
2016-05-26 20:56:05 +03:00
|
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2015-03-26 13:44:34 +03:00
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2017-11-06 17:56:42 +03:00
|
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
|
|
|
|
* @author Roger Szabo <roger.szabo@web.de>
|
|
|
|
|
* @author root <root@localhost.localdomain>
|
2015-03-26 13:44:34 +03:00
|
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
|
|
|
|
* @author Vincent Petry <pvince81@owncloud.com>
|
2017-11-06 17:56:42 +03:00
|
|
|
|
* @author Vinicius Cubas Brand <vinicius@eita.org.br>
|
2013-01-24 16:01:43 +04:00
|
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
|
* @license AGPL-3.0
|
2013-01-24 16:01:43 +04:00
|
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
|
* as published by the Free Software Foundation.
|
2013-01-24 16:01:43 +04:00
|
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
2013-01-24 16:01:43 +04:00
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2015-03-26 13:44:34 +03:00
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
* GNU Affero General Public License for more details.
|
2013-01-24 16:01:43 +04:00
|
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2013-01-24 16:01:43 +04:00
|
|
|
|
*
|
|
|
|
|
*/
|
2015-02-26 13:37:37 +03:00
|
|
|
|
|
2016-05-12 17:28:21 +03:00
|
|
|
|
namespace OCA\User_LDAP;
|
2015-02-20 15:09:33 +03:00
|
|
|
|
|
2020-04-17 13:49:47 +03:00
|
|
|
|
use OC\Cache\CappedMemoryCache;
|
2020-11-06 13:25:28 +03:00
|
|
|
|
use OCP\DB\QueryBuilder\IQueryBuilder;
|
2016-10-10 11:18:18 +03:00
|
|
|
|
use OCP\IConfig;
|
2020-11-06 13:25:28 +03:00
|
|
|
|
use OCP\IDBConnection;
|
2016-10-10 11:18:18 +03:00
|
|
|
|
|
2013-01-24 16:01:43 +04:00
|
|
|
|
class Helper {
|
2013-01-24 17:11:53 +04:00
|
|
|
|
|
2016-10-10 11:18:18 +03:00
|
|
|
|
/** @var IConfig */
|
|
|
|
|
private $config;
|
|
|
|
|
|
2020-11-06 13:25:28 +03:00
|
|
|
|
/** @var IDBConnection */
|
|
|
|
|
private $connection;
|
|
|
|
|
|
2020-04-17 13:49:47 +03:00
|
|
|
|
/** @var CappedMemoryCache */
|
|
|
|
|
protected $sanitizeDnCache;
|
|
|
|
|
|
2020-11-06 13:25:28 +03:00
|
|
|
|
public function __construct(IConfig $config,
|
|
|
|
|
IDBConnection $connection) {
|
2016-10-10 11:18:18 +03:00
|
|
|
|
$this->config = $config;
|
2020-11-06 13:25:28 +03:00
|
|
|
|
$this->connection = $connection;
|
2020-04-17 13:49:47 +03:00
|
|
|
|
$this->sanitizeDnCache = new CappedMemoryCache(10000);
|
2016-10-10 11:18:18 +03:00
|
|
|
|
}
|
|
|
|
|
|
2013-01-24 16:01:43 +04:00
|
|
|
|
/**
|
2014-05-19 19:50:53 +04:00
|
|
|
|
* returns prefixes for each saved LDAP/AD server configuration.
|
2020-04-17 17:02:04 +03:00
|
|
|
|
*
|
2014-05-11 17:17:27 +04:00
|
|
|
|
* @param bool $activeConfigurations optional, whether only active configuration shall be
|
2013-01-25 01:39:05 +04:00
|
|
|
|
* retrieved, defaults to false
|
2013-01-24 16:01:43 +04:00
|
|
|
|
* @return array with a list of the available prefixes
|
2013-01-24 17:11:53 +04:00
|
|
|
|
*
|
2013-01-24 16:01:43 +04:00
|
|
|
|
* Configuration prefixes are used to set up configurations for n LDAP or
|
2013-01-24 17:11:53 +04:00
|
|
|
|
* AD servers. Since configuration is stored in the database, table
|
2013-01-24 16:01:43 +04:00
|
|
|
|
* appconfig under appid user_ldap, the common identifiers in column
|
|
|
|
|
* 'configkey' have a prefix. The prefix for the very first server
|
|
|
|
|
* configuration is empty.
|
|
|
|
|
* Configkey Examples:
|
2013-01-31 20:53:01 +04:00
|
|
|
|
* Server 1: ldap_login_filter
|
2013-01-24 16:01:43 +04:00
|
|
|
|
* Server 2: s1_ldap_login_filter
|
|
|
|
|
* Server 3: s2_ldap_login_filter
|
2013-01-24 17:11:53 +04:00
|
|
|
|
*
|
|
|
|
|
* The prefix needs to be passed to the constructor of Connection class,
|
2013-01-24 16:01:43 +04:00
|
|
|
|
* except the default (first) server shall be connected to.
|
2013-01-24 17:11:53 +04:00
|
|
|
|
*
|
2013-01-24 16:01:43 +04:00
|
|
|
|
*/
|
2020-10-22 12:25:33 +03:00
|
|
|
|
public function getServerConfigurationPrefixes($activeConfigurations = false): array {
|
2013-01-25 01:39:05 +04:00
|
|
|
|
$referenceConfigkey = 'ldap_configuration_active';
|
2013-01-24 17:11:53 +04:00
|
|
|
|
|
2016-10-10 11:51:13 +03:00
|
|
|
|
$keys = $this->getServersConfig($referenceConfigkey);
|
2014-01-21 14:56:34 +04:00
|
|
|
|
|
2016-10-08 15:46:00 +03:00
|
|
|
|
$prefixes = [];
|
|
|
|
|
foreach ($keys as $key) {
|
2016-10-10 11:51:13 +03:00
|
|
|
|
if ($activeConfigurations && $this->config->getAppValue('user_ldap', $key, '0') !== '1') {
|
|
|
|
|
continue;
|
2016-10-08 15:46:00 +03:00
|
|
|
|
}
|
2016-10-10 11:51:13 +03:00
|
|
|
|
|
|
|
|
|
$len = strlen($key) - strlen($referenceConfigkey);
|
|
|
|
|
$prefixes[] = substr($key, 0, $len);
|
2013-01-24 16:01:43 +04:00
|
|
|
|
}
|
2020-02-07 20:10:31 +03:00
|
|
|
|
asort($prefixes);
|
2013-01-24 17:11:53 +04:00
|
|
|
|
|
2013-01-24 16:01:43 +04:00
|
|
|
|
return $prefixes;
|
|
|
|
|
}
|
2013-01-24 17:11:53 +04:00
|
|
|
|
|
2013-08-15 17:55:06 +04:00
|
|
|
|
/**
|
|
|
|
|
*
|
2014-05-19 19:50:53 +04:00
|
|
|
|
* determines the host for every configured connection
|
2020-04-17 17:02:04 +03:00
|
|
|
|
*
|
2014-05-11 17:17:27 +04:00
|
|
|
|
* @return array an array with configprefix as keys
|
2013-08-15 17:55:06 +04:00
|
|
|
|
*
|
|
|
|
|
*/
|
2014-08-21 19:59:13 +04:00
|
|
|
|
public function getServerConfigurationHosts() {
|
2013-08-15 17:55:06 +04:00
|
|
|
|
$referenceConfigkey = 'ldap_host';
|
|
|
|
|
|
2016-10-10 11:51:13 +03:00
|
|
|
|
$keys = $this->getServersConfig($referenceConfigkey);
|
|
|
|
|
|
2020-03-26 11:30:18 +03:00
|
|
|
|
$result = [];
|
2020-04-10 15:19:56 +03:00
|
|
|
|
foreach ($keys as $key) {
|
2016-10-10 11:51:13 +03:00
|
|
|
|
$len = strlen($key) - strlen($referenceConfigkey);
|
|
|
|
|
$prefix = substr($key, 0, $len);
|
|
|
|
|
$result[$prefix] = $this->config->getAppValue('user_ldap', $key);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
|
}
|
|
|
|
|
|
2017-01-18 23:13:23 +03:00
|
|
|
|
/**
|
|
|
|
|
* return the next available configuration prefix
|
|
|
|
|
*
|
|
|
|
|
* @return string
|
|
|
|
|
*/
|
|
|
|
|
public function getNextServerConfigurationPrefix() {
|
|
|
|
|
$serverConnections = $this->getServerConfigurationPrefixes();
|
|
|
|
|
|
2020-04-10 15:19:56 +03:00
|
|
|
|
if (count($serverConnections) === 0) {
|
2017-01-18 23:13:23 +03:00
|
|
|
|
return 's01';
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
sort($serverConnections);
|
|
|
|
|
$lastKey = array_pop($serverConnections);
|
2018-01-26 01:06:53 +03:00
|
|
|
|
$lastNumber = (int)str_replace('s', '', $lastKey);
|
2018-01-26 02:02:03 +03:00
|
|
|
|
return 's' . str_pad($lastNumber + 1, 2, '0', STR_PAD_LEFT);
|
2017-01-18 23:13:23 +03:00
|
|
|
|
}
|
|
|
|
|
|
2016-10-10 11:51:13 +03:00
|
|
|
|
private function getServersConfig($value) {
|
|
|
|
|
$regex = '/' . $value . '$/S';
|
2013-08-15 17:55:06 +04:00
|
|
|
|
|
2016-10-10 11:51:13 +03:00
|
|
|
|
$keys = $this->config->getAppKeys('user_ldap');
|
|
|
|
|
$result = [];
|
|
|
|
|
foreach ($keys as $key) {
|
|
|
|
|
if (preg_match($regex, $key) === 1) {
|
|
|
|
|
$result[] = $key;
|
|
|
|
|
}
|
2013-08-15 17:55:06 +04:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
|
}
|
|
|
|
|
|
2013-01-30 06:44:11 +04:00
|
|
|
|
/**
|
2014-05-19 19:50:53 +04:00
|
|
|
|
* deletes a given saved LDAP/AD server configuration.
|
2020-04-17 17:02:04 +03:00
|
|
|
|
*
|
2014-05-11 17:17:27 +04:00
|
|
|
|
* @param string $prefix the configuration prefix of the config to delete
|
2013-01-31 20:53:01 +04:00
|
|
|
|
* @return bool true on success, false otherwise
|
2013-01-30 06:44:11 +04:00
|
|
|
|
*/
|
2014-08-21 19:59:13 +04:00
|
|
|
|
public function deleteServerConfiguration($prefix) {
|
2020-04-10 15:19:56 +03:00
|
|
|
|
if (!in_array($prefix, self::getServerConfigurationPrefixes())) {
|
2013-01-24 17:11:53 +04:00
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
2020-11-06 13:25:28 +03:00
|
|
|
|
$query = $this->connection->getQueryBuilder();
|
|
|
|
|
$query->delete('appconfig')
|
|
|
|
|
->where($query->expr()->eq('appid', $query->createNamedParameter('user_ldap')))
|
|
|
|
|
->andWhere($query->expr()->notIn('configkey', $query->createNamedParameter([
|
|
|
|
|
'enabled',
|
|
|
|
|
'installed_version',
|
|
|
|
|
'types',
|
|
|
|
|
'bgjUpdateGroupsLastRun',
|
|
|
|
|
]), IQueryBuilder::PARAM_STR_ARRAY));
|
2014-02-14 18:34:22 +04:00
|
|
|
|
|
2020-11-06 13:25:28 +03:00
|
|
|
|
if (empty($prefix)) {
|
|
|
|
|
$query->andWhere($query->expr()->notLike('configkey', $query->createNamedParameter('s%')));
|
2013-01-24 17:11:53 +04:00
|
|
|
|
}
|
|
|
|
|
|
2020-11-06 13:25:28 +03:00
|
|
|
|
$deletedRows = $query->execute();
|
|
|
|
|
return $deletedRows !== 0;
|
2013-01-24 17:11:53 +04:00
|
|
|
|
}
|
2013-05-08 19:47:07 +04:00
|
|
|
|
|
2014-08-21 19:59:13 +04:00
|
|
|
|
/**
|
|
|
|
|
* checks whether there is one or more disabled LDAP configurations
|
|
|
|
|
*/
|
2020-10-22 12:25:33 +03:00
|
|
|
|
public function haveDisabledConfigurations(): bool {
|
2014-08-21 19:59:13 +04:00
|
|
|
|
$all = $this->getServerConfigurationPrefixes(false);
|
|
|
|
|
$active = $this->getServerConfigurationPrefixes(true);
|
|
|
|
|
|
|
|
|
|
return count($all) !== count($active) || count($all) === 0;
|
|
|
|
|
}
|
|
|
|
|
|
2013-09-30 01:53:14 +04:00
|
|
|
|
/**
|
2014-09-16 18:17:25 +04:00
|
|
|
|
* extracts the domain from a given URL
|
2020-04-17 17:02:04 +03:00
|
|
|
|
*
|
2014-05-11 17:17:27 +04:00
|
|
|
|
* @param string $url the URL
|
|
|
|
|
* @return string|false domain as string on success, false otherwise
|
2013-09-30 01:53:14 +04:00
|
|
|
|
*/
|
2014-08-21 19:59:13 +04:00
|
|
|
|
public function getDomainFromURL($url) {
|
2013-09-30 01:53:14 +04:00
|
|
|
|
$uinfo = parse_url($url);
|
2020-04-10 15:19:56 +03:00
|
|
|
|
if (!is_array($uinfo)) {
|
2013-09-30 01:53:14 +04:00
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$domain = false;
|
2020-04-10 15:19:56 +03:00
|
|
|
|
if (isset($uinfo['host'])) {
|
2013-09-30 01:53:14 +04:00
|
|
|
|
$domain = $uinfo['host'];
|
2020-04-10 15:19:56 +03:00
|
|
|
|
} elseif (isset($uinfo['path'])) {
|
2013-09-30 01:53:14 +04:00
|
|
|
|
$domain = $uinfo['path'];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $domain;
|
|
|
|
|
}
|
2020-02-07 20:10:31 +03:00
|
|
|
|
|
2016-07-22 11:46:29 +03:00
|
|
|
|
/**
|
|
|
|
|
*
|
|
|
|
|
* Set the LDAPProvider in the config
|
|
|
|
|
*
|
|
|
|
|
*/
|
|
|
|
|
public function setLDAPProvider() {
|
|
|
|
|
$current = \OC::$server->getConfig()->getSystemValue('ldapProviderFactory', null);
|
2020-04-10 15:19:56 +03:00
|
|
|
|
if (is_null($current)) {
|
2018-01-26 01:16:13 +03:00
|
|
|
|
\OC::$server->getConfig()->setSystemValue('ldapProviderFactory', LDAPProviderFactory::class);
|
2016-07-22 11:46:29 +03:00
|
|
|
|
}
|
|
|
|
|
}
|
2020-02-07 20:10:31 +03:00
|
|
|
|
|
2016-07-22 11:46:29 +03:00
|
|
|
|
/**
|
|
|
|
|
* sanitizes a DN received from the LDAP server
|
2020-04-17 17:02:04 +03:00
|
|
|
|
*
|
2016-07-22 11:46:29 +03:00
|
|
|
|
* @param array $dn the DN in question
|
2017-12-07 19:49:33 +03:00
|
|
|
|
* @return array|string the sanitized DN
|
2016-07-22 11:46:29 +03:00
|
|
|
|
*/
|
|
|
|
|
public function sanitizeDN($dn) {
|
|
|
|
|
//treating multiple base DNs
|
2020-04-10 15:19:56 +03:00
|
|
|
|
if (is_array($dn)) {
|
2020-03-26 11:30:18 +03:00
|
|
|
|
$result = [];
|
2020-04-10 15:19:56 +03:00
|
|
|
|
foreach ($dn as $singleDN) {
|
2016-07-22 11:46:29 +03:00
|
|
|
|
$result[] = $this->sanitizeDN($singleDN);
|
|
|
|
|
}
|
|
|
|
|
return $result;
|
|
|
|
|
}
|
|
|
|
|
|
2020-04-17 17:02:04 +03:00
|
|
|
|
if (!is_string($dn)) {
|
2020-04-17 13:49:47 +03:00
|
|
|
|
throw new \LogicException('String expected ' . \gettype($dn) . ' given');
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (($sanitizedDn = $this->sanitizeDnCache->get($dn)) !== null) {
|
2020-04-17 17:02:04 +03:00
|
|
|
|
return $sanitizedDn;
|
2020-04-17 13:49:47 +03:00
|
|
|
|
}
|
|
|
|
|
|
2016-07-22 11:46:29 +03:00
|
|
|
|
//OID sometimes gives back DNs with whitespace after the comma
|
|
|
|
|
// a la "uid=foo, cn=bar, dn=..." We need to tackle this!
|
2020-04-17 13:49:47 +03:00
|
|
|
|
$sanitizedDn = preg_replace('/([^\\\]),(\s+)/u', '\1,', $dn);
|
2016-07-22 11:46:29 +03:00
|
|
|
|
|
|
|
|
|
//make comparisons and everything work
|
2020-04-17 13:49:47 +03:00
|
|
|
|
$sanitizedDn = mb_strtolower($sanitizedDn, 'UTF-8');
|
2016-07-22 11:46:29 +03:00
|
|
|
|
|
|
|
|
|
//escape DN values according to RFC 2253 – this is already done by ldap_explode_dn
|
|
|
|
|
//to use the DN in search filters, \ needs to be escaped to \5c additionally
|
|
|
|
|
//to use them in bases, we convert them back to simple backslashes in readAttribute()
|
2020-03-26 11:30:18 +03:00
|
|
|
|
$replacements = [
|
2016-07-22 11:46:29 +03:00
|
|
|
|
'\,' => '\5c2C',
|
|
|
|
|
'\=' => '\5c3D',
|
|
|
|
|
'\+' => '\5c2B',
|
|
|
|
|
'\<' => '\5c3C',
|
|
|
|
|
'\>' => '\5c3E',
|
|
|
|
|
'\;' => '\5c3B',
|
|
|
|
|
'\"' => '\5c22',
|
|
|
|
|
'\#' => '\5c23',
|
2020-04-17 17:02:04 +03:00
|
|
|
|
'(' => '\28',
|
|
|
|
|
')' => '\29',
|
|
|
|
|
'*' => '\2A',
|
2020-03-26 11:30:18 +03:00
|
|
|
|
];
|
2020-04-17 13:49:47 +03:00
|
|
|
|
$sanitizedDn = str_replace(array_keys($replacements), array_values($replacements), $sanitizedDn);
|
|
|
|
|
$this->sanitizeDnCache->set($dn, $sanitizedDn);
|
2016-07-22 11:46:29 +03:00
|
|
|
|
|
2020-04-17 13:49:47 +03:00
|
|
|
|
return $sanitizedDn;
|
2016-07-22 11:46:29 +03:00
|
|
|
|
}
|
2020-02-07 20:10:31 +03:00
|
|
|
|
|
2016-07-22 11:46:29 +03:00
|
|
|
|
/**
|
|
|
|
|
* converts a stored DN so it can be used as base parameter for LDAP queries, internally we store them for usage in LDAP filters
|
2020-04-17 17:02:04 +03:00
|
|
|
|
*
|
2016-07-22 11:46:29 +03:00
|
|
|
|
* @param string $dn the DN
|
|
|
|
|
* @return string
|
|
|
|
|
*/
|
|
|
|
|
public function DNasBaseParameter($dn) {
|
|
|
|
|
return str_ireplace('\\5c', '\\', $dn);
|
|
|
|
|
}
|
2015-02-20 15:09:33 +03:00
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* listens to a hook thrown by server2server sharing and replaces the given
|
|
|
|
|
* login name by a username, if it matches an LDAP user.
|
|
|
|
|
*
|
|
|
|
|
* @param array $param
|
|
|
|
|
* @throws \Exception
|
|
|
|
|
*/
|
|
|
|
|
public static function loginName2UserName($param) {
|
2020-04-10 15:19:56 +03:00
|
|
|
|
if (!isset($param['uid'])) {
|
2015-02-20 15:09:33 +03:00
|
|
|
|
throw new \Exception('key uid is expected to be set in $param');
|
|
|
|
|
}
|
|
|
|
|
|
2020-10-22 12:25:33 +03:00
|
|
|
|
$userBackend = \OC::$server->get(User_Proxy::class);
|
2020-04-09 17:07:47 +03:00
|
|
|
|
$uid = $userBackend->loginName2UserName($param['uid']);
|
2020-04-10 15:19:56 +03:00
|
|
|
|
if ($uid !== false) {
|
2015-02-20 15:09:33 +03:00
|
|
|
|
$param['uid'] = $uid;
|
|
|
|
|
}
|
|
|
|
|
}
|
2013-01-24 16:01:43 +04:00
|
|
|
|
}
|