class_userinfo.inc 31.91 KiB
<?php
/*
  This code is part of FusionDirectory (http://www.fusiondirectory.org/)
  Copyright (C) 2003-2010  Cajus Pollmeier
  Copyright (C) 2011-2018  FusionDirectory
  This program is free software; you can redistribute it and/or modify
  it under the terms of the GNU General Public License as published by
  the Free Software Foundation; either version 2 of the License, or
  (at your option) any later version.
  This program is distributed in the hope that it will be useful,
  but WITHOUT ANY WARRANTY; without even the implied warranty of
  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  GNU General Public License for more details.
  You should have received a copy of the GNU General Public License
  along with this program; if not, write to the Free Software
  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA.
/*!
 * \file class_userinfo.inc
 * Source code for the class userinfo
/*!
 * \brief Class userinfo
 * This class contains all informations and functions
 * about user
class userinfo
  var $dn;
  var $cn;
  var $uid;
  var $sn           = '';
  var $givenName    = '';
  var $gidNumber    = -1;
  var $language     = "";
  var $subtreeACL   = array();
  var $ACL          = array();
  var $groups       = array();
  var $roles        = array();
  var $result_cache = array();
  var $ignoreACL    = FALSE;
  var $ACLperPath             = array();
  var $ACLperPath_usesFilter  = array();
  /*! \brief LDAP size limit handler */
  protected $sizeLimitHandler;
  /* get acl's an put them into the userinfo object
     attr subtreeACL (userdn:components, userdn:component1#sub1#sub2,component2,...) */
  function __construct($userdn)
    global $config;
    $this->dn         = $userdn;
    $this->ignoreACL  = ($config->get_cfg_value('ignoreAcl') == $this->dn);
    $this->loadLDAPInfo();
    /* Initialize ACL_CACHE */
    $this->reset_acl_cache();
    $this->sizeLimitHandler = new ldapSizeLimit();
7172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140
/*! \brief Loads user information from LDAP */ function loadLDAPInfo() { global $config; $ldap = $config->get_ldap_link(); $ldap->cat($this->dn, array('cn', 'sn', 'givenName', 'uid', 'gidNumber', 'preferredLanguage')); $attrs = $ldap->fetch(); $this->uid = $attrs['uid'][0]; if (isset($attrs['cn'][0])) { $this->cn = $attrs['cn'][0]; } elseif (isset($attrs['givenName'][0]) && isset($attrs['sn'][0])) { $this->cn = $attrs['givenName'][0].' '.$attrs['sn'][0]; } else { $this->cn = $attrs['uid'][0]; } if (isset($attrs['gidNumber'][0])) { $this->gidNumber = $attrs['gidNumber'][0]; } if (isset($attrs['sn'][0])) { $this->sn = $attrs['sn'][0]; } if (isset($attrs['givenName'][0])) { $this->givenName = $attrs['givenName'][0]; } /* Assign user language */ if (isset($attrs['preferredLanguage'][0])) { $this->language = $attrs['preferredLanguage'][0]; } } /*! * \brief Reset acl cache */ public function reset_acl_cache() { /* Initialize ACL_CACHE */ session::set('ACL_CACHE', array()); } /*! * \brief Load an acl */ function loadACL() { global $config; $this->ACL = array(); $this->groups = array(); $this->roles = array(); $this->result_cache = array(); $this->reset_acl_cache(); $ldap = $config->get_ldap_link(); $ldap->cd($config->current['BASE']); /* Get member groups... */ $ldap->search('(&(objectClass=groupOfNames)(member='.ldap_escape_f($this->dn).'))', array('dn')); while ($attrs = $ldap->fetch()) { $this->groups[$attrs['dn']] = $attrs['dn']; } /* Get member POSIX groups... */ $ldap->search('(&(objectClass=posixGroup)(memberUid='.ldap_escape_f($this->uid).'))', array('dn')); while ($attrs = $ldap->fetch()) { $this->groups[$attrs['dn']] = $attrs['dn']; } /* Get member roles... */ $ldap->search('(&(objectClass=organizationalRole)(roleOccupant='.ldap_escape_f($this->dn).'))', array('dn'));
141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210
while ($attrs = $ldap->fetch()) { $this->roles[$attrs['dn']] = $attrs['dn']; } /* Crawl through ACLs and move relevant to the tree */ $ldap->search("(objectClass=gosaACL)", array('dn', 'gosaAclEntry')); $aclp = array(); $aclc = array(); while ($attrs = $ldap->fetch()) { /* Insert links in ACL array */ $aclp[$attrs['dn']] = substr_count($attrs['dn'], ','); $aclc[$attrs['dn']] = array(); $ol = array(); for ($i = 0; $i < $attrs['gosaAclEntry']['count']; $i++) { $ol = array_merge($ol, acl::explodeAcl($attrs['gosaAclEntry'][$i])); } $aclc[$attrs['dn']] = $ol; } /* Resolve roles here */ foreach ($aclc as $dn => $data) { foreach ($data as $prio => $aclc_value) { unset($aclc[$dn][$prio]); $ldap->cat($aclc_value['acl'], array("gosaAclTemplate")); $attrs = $ldap->fetch(); if (isset($attrs['gosaAclTemplate'])) { $roleAcls = acl::explodeRole($attrs['gosaAclTemplate']); foreach ($roleAcls as $roleAcl) { $aclc[$dn][] = array( 'acl' => $roleAcl, 'type' => $aclc_value['type'], 'members' => $aclc_value['members'], 'filter' => $aclc_value['filter'] ); } } } } /* ACL's read, sort for tree depth */ asort($aclp); /* Sort in tree order */ foreach ($aclp as $dn => $acl) { /* Check if we need to keep this ACL */ foreach ($aclc[$dn] as $idx => $type) { $interresting = FALSE; /* No members? This ACL rule is deactivated ... */ if (!count($type['members'])) { $interresting = FALSE; } else { /* Inspect members... */ foreach (array_keys($type['members']) as $grp) { /* Some group inside the members that is relevant for us? */ if (in_array_ics(preg_replace('/^G:/', '', $grp), $this->groups)) { $interresting = TRUE; } /* Some role inside the members that is relevant for us? */ if (in_array_ics(preg_replace('/^R:/', '', $grp), $this->roles)) { $interresting = TRUE; } /* User inside the members? */ if (mb_strtoupper(preg_replace('/^U:/', '', $grp)) == mb_strtoupper($this->dn)) { $interresting = TRUE;
211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280
} /* Wildcard? */ if (preg_match('/^G:\*/', $grp)) { $interresting = TRUE; } } } if ($interresting) { if (!isset($this->ACL[$dn])) { $this->ACL[$dn] = array(); } $this->ACL[$dn][$idx] = $type; } } } /* Create an array which represent all relevant permissions settings per dn. The array will look like this: . ['ou=base'] ['ou=base'] = array(ACLs); . . ['ou=dep1,ou=base']['ou=dep1,ou=base'] = array(ACLs); . ['ou=base'] = array(ACLs); For object located in 'ou=dep1,ou=base' we have to both ACLs, for objects in 'ou=base' we only have to apply on ACL. */ $without_self_acl = $all_acl = array(); foreach ($this->ACL as $dn => $acl) { $sdn = $dn; do { if (isset($this->ACL[$dn])) { $all_acl[$sdn][$dn] = $this->ACL[$dn]; $without_self_acl[$sdn][$dn] = $this->ACL[$dn]; foreach ($without_self_acl[$sdn][$dn] as $acl_id => $acl_set) { /* Remember which ACL set has speicial user filter */ if (isset($acl_set['filter']{1})) { $this->ACLperPath_usesFilter[$sdn] = TRUE; } /* Remove all acl entries which are especially for the current user (self acl) */ foreach ($acl_set['acl'] as $object => $object_acls) { if (isset($object_acls[0]) && (strpos($object_acls[0], "s") !== FALSE)) { unset($without_self_acl[$sdn][$dn][$acl_id]['acl'][$object]); } } } } $dn = preg_replace("/^[^,]*+,/", "", $dn); } while (strpos($dn, ',') !== FALSE); } $this->ACLperPath = $without_self_acl; /* Append Self entry */ $dn = $this->dn; while (strpos($dn, ",") && !isset($all_acl[$dn])) { $dn = preg_replace("/^[^,]*+,/", "", $dn); } if (isset($all_acl[$dn])) { $this->ACLperPath[$this->dn] = $all_acl[$dn]; } } /*!
281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350
* \brief Returns an array containing all target objects we've permissions on * * \return Return the next id or NULL if failed */ function get_acl_target_objects() { return array_keys($this->ACLperPath); } /*! * \brief Get permissions by category * * \param string $dn Dn from which we want to know permissions. * * \param string $category Category for which we want the acl eg: server * * \return all the permissions for the dn and category */ function get_category_permissions($dn, $category) { return @$this->get_permissions($dn, $category.'/0', ''); } /*! * \brief Check if the given object (dn) is copyable * * \param string $dn The object dn * * \param string $object The acl category (e.g. user) * * \return boolean TRUE if the given object is copyable else FALSE */ function is_copyable($dn, $object) { return (strpos($this->get_complete_category_acls($dn, $object), 'r') !== FALSE); } /*! * \brief Check if the given object (dn) is cutable * * \param string $dn The object dn * * \param string $object The acl category (e.g. user) * * \param string $class The acl class (e.g. user) * * \return boolean TRUE if the given object is cutable else FALSE */ function is_cutable($dn, $object, $class) { $remove = (strpos($this->get_permissions($dn, $object.'/'.$class), 'd') !== FALSE); $read = (strpos($this->get_complete_category_acls($dn, $object), 'r') !== FALSE); return ($remove && $read); } /*! * \brief Checks if we are allowed to paste an object to the given destination ($dn) * * \param string $dn The destination dn * * \param string $object The acl category (e.g. user) * * \return Boolean TRUE if we are allowed to paste an object. */ function is_pasteable($dn, $object) { return (strpos($this->get_complete_category_acls($dn, $object), 'w') !== FALSE);
351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420
} /*! * \brief Checks if we are allowed to restore a snapshot for the given dn. * * \param string $dn The destination dn * * \param string $categories The acl category (e.g. user) * * \param boolean $deleted Is it a deleted or existing object * * \return boolean TRUE if we are allowed to restore a snapshot. */ function allow_snapshot_restore($dn, $categories, $deleted) { $permissions = $this->get_snapshot_permissions($dn, $categories); return in_array(($deleted ? 'restore_deleted' : 'restore_over'), $permissions); } /*! * \brief Checks if we are allowed to create a snapshot of the given dn. * * \param string $dn The source dn * * \param string $categories The acl category (e.g. user) * * \return boolean TRUE if we are allowed to create a snapshot. */ function allow_snapshot_create($dn, $categories) { $permissions = $this->get_snapshot_permissions($dn, $categories); return in_array('c', $permissions); } /*! * \brief Checks if we are allowed to delete a snapshot of the given dn. * * \param string $dn The source dn * * \param string $categories The acl category (e.g. user) * * \return boolean TRUE if we are allowed to delete a snapshot. */ function allow_snapshot_delete($dn, $categories) { $permissions = $this->get_snapshot_permissions($dn, $categories); return in_array('d', $permissions); } function get_snapshot_permissions($dn, $categories) { if (!is_array($categories)) { $categories = array($categories); } /* Possible permissions for snapshots */ $objectPermissions = array('r', 'c', 'd'); $attributePermissions = array('restore_over', 'restore_deleted'); foreach ($categories as $category) { $acl = $this->get_permissions($dn, $category.'/SnapshotHandler'); foreach ($objectPermissions as $i => $perm) { if (strpos($acl, $perm) === FALSE) { unset($objectPermissions[$i]); } } foreach ($attributePermissions as $i => $attribute) { $acl = $this->get_permissions($dn, $category.'/SnapshotHandler', $attribute); if (strpos($acl, 'w') === FALSE) {
421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490
unset($attributePermissions[$i]); } } } return array_merge($objectPermissions, $attributePermissions); } /*! * \brief Get the permissions for a specified dn * * \param string $dn The object dn * * \param string $object The acl category (e.g. user) * * \param string $attribute The acl class (e.g. user) * * \param bool $skip_write Remove the write acl for this dn * */ function get_permissions($dn, $object, $attribute = "", $skip_write = FALSE) { global $config; /* If we are forced to skip ACLs checks for the current user then return all permissions. */ if ($this->ignore_acl_for_current_user()) { if ($skip_write) { return 'r'; } return 'rwcdm'; } /* Push cache answer? */ $ACL_CACHE = &session::global_get_ref('ACL_CACHE'); if (isset($ACL_CACHE["$dn+$object+$attribute"])) { $ret = $ACL_CACHE["$dn+$object+$attribute"]; if ($skip_write) { $ret = str_replace(array('w','c','d','m'), '', $ret); } return $ret; } /* Detect the set of ACLs we have to check for this object */ $adn = $dn; while (!isset($this->ACLperPath[$adn]) && (strpos($adn, ',') !== FALSE)) { $adn = preg_replace("/^[^,]*+,/", "", $adn); } if (isset($this->ACLperPath[$adn])) { $ACL = $this->ACLperPath[$adn]; } else { $ACL_CACHE["$dn+$object+$attribute"] = ''; return ''; } /* If we do not need to respect any user-filter settings we can skip the per object ACL checks. */ $orig_dn = $dn; if (!isset($this->ACLperPath_usesFilter[$adn])) { $dn = $adn; if (isset($ACL_CACHE["$dn+$object+$attribute"])) { $ret = $ACL_CACHE["$dn+$object+$attribute"]; if (!isset($ACL_CACHE["$orig_dn+$object+$attribute"])) { $ACL_CACHE["$orig_dn+$object+$attribute"] = $ret; } if ($skip_write) { $ret = str_replace(array('w','c','d','m'), '', $ret); } return $ret;
491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560
} } /* Get ldap object, for later filter checks */ $ldap = $config->get_ldap_link(); $acl = array('r' => '', 'w' => '', 'c' => '', 'd' => '', 'm' => '', 'a' => ''); /* Build dn array */ $path = explode(',', $dn); $path = array_reverse($path); /* Walk along the path to evaluate the acl */ $cpath = ''; foreach ($path as $element) { /* Clean potential ACLs for each level */ if (isset($config->idepartments[$cpath])) { $acl = $this->cleanACL($acl); } if ($cpath == "") { $cpath = $element; } else { $cpath = $element.','.$cpath; } if (isset($ACL[$cpath])) { /* Inspect this ACL, place the result into ACL */ foreach ($ACL[$cpath] as $subacl) { /* Reset? Just clean the ACL and turn over to the next one... */ if ($subacl['type'] == 'reset') { $acl = $this->cleanACL($acl, TRUE); continue; } /* With user filter */ if (isset($subacl['filter']) && !empty($subacl['filter'])) { $id = $dn."-".$subacl['filter']; if (!isset($ACL_CACHE['FILTER'][$id])) { $ACL_CACHE['FILTER'][$id] = $ldap->object_match_filter($dn, $subacl['filter']); } if (!$ACL_CACHE['FILTER'][$id]) { continue; } } /* Self ACLs? */ if (($dn != $this->dn) && isset($subacl['acl'][$object][0]) && (strpos($subacl['acl'][$object][0], "s") !== FALSE)) { continue; } /* If attribute is "", we want to know, if we've *any* permissions here... Merge global class ACLs [0] with attributes specific ACLs [attribute]. */ if (($attribute == '') && isset($subacl['acl'][$object])) { foreach ($subacl['acl'][$object] as $attr => $dummy) { $acl = $this->mergeACL($acl, $subacl['type'], $subacl['acl'][$object][$attr]); } continue; } /* Per attribute ACL? */ if (isset($subacl['acl'][$object][$attribute])) { $acl = $this->mergeACL($acl, $subacl['type'], $subacl['acl'][$object][$attribute]); continue; }
561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630
/* Per object ACL? */ if (isset($subacl['acl'][$object][0])) { $acl = $this->mergeACL($acl, $subacl['type'], $subacl['acl'][$object][0]); continue; } /* Global ACL? */ if (isset($subacl['acl']['all'][0])) { $acl = $this->mergeACL($acl, $subacl['type'], $subacl['acl']['all'][0]); continue; } /* Category ACLs (e.g. $object = "user/0") */ if (strstr($object, '/0')) { $ocs = preg_replace("/\/0$/", "", $object); if (isset($config->data['CATEGORIES'][$ocs])) { /* if $attribute is "", then check every single attribute for this object. if it is 0, then just check the object category ACL. */ if ($attribute == "") { foreach ($config->data['CATEGORIES'][$ocs]['classes'] as $oc) { if (isset($subacl['acl'][$ocs.'/'.$oc])) { // Skip ACLs wich are defined for ourselfs only - if not checking against ($ui->dn) if (isset($subacl['acl'][$ocs.'/'.$oc][0]) && ($dn != $this->dn) && (strpos($subacl['acl'][$ocs.'/'.$oc][0], "s") !== FALSE)) { continue; } foreach ($subacl['acl'][$ocs.'/'.$oc] as $attr => $dummy) { $acl = $this->mergeACL($acl, $subacl['type'], $subacl['acl'][$ocs.'/'.$oc][$attr]); } continue; } } } else { if (isset($subacl['acl'][$ocs.'/'.$oc][0])) { if (($dn != $this->dn) && (strpos($subacl['acl'][$ocs.'/'.$oc][0], "s") !== FALSE)) { continue; } $acl = $this->mergeACL($acl, $subacl['type'], $subacl['acl'][$ocs.'/'.$oc][0]); } } } continue; } } } } /* If the requested ACL is for a container object, then alter ACLs by applying cleanACL a last time. */ if (isset($config->idepartments[$dn])) { $acl = $this->cleanACL($acl); } /* Assemble string */ $ret = ""; foreach ($acl as $key => $value) { if ($value !== "") { $ret .= $key; } } $ACL_CACHE["$dn+$object+$attribute"] = $ret; $ACL_CACHE["$orig_dn+$object+$attribute"] = $ret;
631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700
/* Remove write if needed */ if ($skip_write) { $ret = str_replace(array('w','c','d','m'), '', $ret); } return $ret; } /*! * \brief Extract all departments that are accessible * * Extract all departments that are accessible (direct or 'on the way' to an * accessible department) * * \param string $module The module * * \param bool $skip_self_acls FALSE * * \return array Return all accessible departments */ function get_module_departments($module, $skip_self_acls = FALSE ) { global $config; /* If we are forced to skip ACLs checks for the current user then return all departments as valid. */ if ($this->ignore_acl_for_current_user()) { return array_keys($config->idepartments); } /* Use cached results if possilbe */ $ACL_CACHE = &session::global_get_ref('ACL_CACHE'); if (!is_array($module)) { $module = array($module); } $res = array(); foreach ($module as $mod) { if (isset($ACL_CACHE['MODULE_DEPARTMENTS'][$mod])) { $res = array_merge($res, $ACL_CACHE['MODULE_DEPARTMENTS'][$mod]); continue; } $deps = array(); /* Search for per object ACLs */ foreach ($this->ACL as $dn => $infos) { foreach ($infos as $info) { $found = FALSE; foreach ($info['acl'] as $cat => $data) { /* Skip self acls? */ if ($skip_self_acls && isset($data['0']) && (strpos($data['0'], "s") !== FALSE)) { continue; } if (preg_match("/^".preg_quote($mod, '/')."/", $cat)) { $found = TRUE; break; } } if ($found && !isset($config->idepartments[$dn])) { while (!isset($config->idepartments[$dn]) && strpos($dn, ",")) { $dn = preg_replace("/^[^,]+,/", "", $dn); } if (isset($config->idepartments[$dn])) { $deps[$dn] = $dn; } } } }
701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770
/* For all gosaDepartments */ foreach ($config->departments as $dn) { if (isset($deps[$dn])) { continue; } $acl = ''; if (strpos($mod, '/')) { $acl .= $this->get_permissions($dn, $mod); } else { $acl .= $this->get_category_permissions($dn, $mod); } if (!empty($acl)) { $deps[$dn] = $dn; } } $ACL_CACHE['MODULE_DEPARTMENTS'][$mod] = $deps; $res = array_merge($res, $deps); } return array_values($res); } /*! * \brief Merge acls * * \param $acl The ACL * * \param $type The type * * \param $newACL The new ACL */ function mergeACL($acl, $type, $newACL) { $at = array("subtree" => "s", "one" => "1"); if ((strpos($newACL, 'w') !== FALSE) && (strpos($newACL, 'r') === FALSE)) { $newACL .= "r"; } /* Ignore invalid characters */ $newACL = preg_replace('/[^rwcdm]/', '', $newACL); foreach (str_split($newACL) as $char) { /* Skip "self" ACLs without combination of rwcdm, they have no effect. -self flag without read/write/create/... */ if (empty($char)) { continue; } /* Skip subtree entries */ if ($acl[$char] == 's') { continue; } if ($type == "base" && $acl[$char] != 1) { $acl[$char] = 0; } else { $acl[$char] = $at[$type]; } } return $acl; } /*! * \brief Clean acls *
771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840
* \param $acl ACL to be cleaned * * \param boolean $reset FALSE */ function cleanACL($acl, $reset = FALSE) { foreach ($acl as $key => $value) { /* Continue, if value is empty or subtree */ if (($value == "") || ($value == "s")) { continue; } /* Reset removes everything but 'p' */ if ($reset && $value != 'p') { $acl[$key] = ""; continue; } /* Decrease tree level */ if (is_int($value)) { if ($value) { $acl[$key]--; } else { $acl[$key] = ""; } } } return $acl; } /*! * \brief Return combined acls for a given category * * Return combined acls for a given category. * All acls will be combined like boolean AND * As example ('rwcdm' + 'rcd' + 'wrm'= 'r') * * Results will be cached in $this->result_cache. * $this->result_cache will be resetted if load_acls is called. * * \param string $dn The DN * * \param string $category The category * * \return string return acl combined with boolean AND */ function get_complete_category_acls($dn, $category) { global $config; if (!is_string($category)) { trigger_error('category must be string'); return ''; } else { if (isset($this->result_cache['get_complete_category_acls'][$dn][$category])) { return $this->result_cache['get_complete_category_acls'][$dn][$category]; } $acl = 'rwcdm'; if (isset($config->data['CATEGORIES'][$category])) { foreach ($config->data['CATEGORIES'][$category]['classes'] as $oc) { if ($oc == '0') { /* Skip objectClass '0' (e.g. user/0) */ continue; } $tmp = $this->get_permissions($dn, $category.'/'.$oc); $types = $acl; for ($i = 0, $l = strlen($types); $i < $l; $i++) { if (strpos($tmp, $types[$i]) === FALSE) { $acl = str_replace($types[$i], '', $acl);
841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910
} } } } else { $acl = ''; } $this->result_cache['get_complete_category_acls'][$dn][$category] = $acl; return $acl; } } /*! * \brief Ignore acl for the current user * * \return Returns TRUE if the current user is configured in IGNORE_ACL=".." * in your fusiondirectory.conf FALSE otherwise */ function ignore_acl_for_current_user() { return $this->ignoreACL; } /*! * \brief Checks the posixAccount status by comparing the shadow attributes. * * \return const * POSIX_ACCOUNT_EXPIRED - If the account is expired. * POSIX_WARN_ABOUT_EXPIRATION - If the account is going to expire. * POSIX_FORCE_PASSWORD_CHANGE - The password has to be changed. * POSIX_DISALLOW_PASSWORD_CHANGE - The password cannot be changed right now. * * * * shadowLastChange * | * |---- shadowMin ---> | <-- shadowMax -- * | | | * |------- shadowWarning -> | * |-- shadowInactive --> DEACTIVATED * | * EXPIRED * */ function expired_status () { global $config; // Skip this for the admin account, we do not want to lock him out. if ($this->is_user_admin()) { return 0; } $ldap = $config->get_ldap_link(); $ldap->cd($config->current['BASE']); $ldap->cat($this->dn); $attrs = $ldap->fetch(); $current = floor(date("U") / 60 / 60 / 24); // Fetch required attributes foreach (array('shadowExpire','shadowLastChange','shadowMax','shadowMin', 'shadowInactive','shadowWarning','sambaKickoffTime') as $attr) { $$attr = (isset($attrs[$attr][0]) ? $attrs[$attr][0] : NULL); } // Check if the account has reached its kick off limitations. // ---------------------------------------------------------- // Once the accout reaches the kick off limit it has expired. if ($sambaKickoffTime !== NULL) { if (time() >= $sambaKickoffTime) { return POSIX_ACCOUNT_EXPIRED;
911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980
} } // Check if the account has expired. // --------------------------------- // An account is locked/expired once its expiration date has reached (shadowExpire). // If the optional attribute (shadowInactive) is set, we've to postpone // the account expiration by the amount of days specified in (shadowInactive). if (($shadowExpire != NULL) && ($shadowExpire <= $current)) { // The account seems to be expired, but we've to check 'shadowInactive' additionally. // ShadowInactive specifies an amount of days we've to reprieve the user. // It some kind of x days' grace. if (($shadowInactive == NULL) || $current > $shadowExpire + $shadowInactive) { // Finally we've detect that the account is deactivated. return POSIX_ACCOUNT_EXPIRED; } } // The users password is going to expire. // -------------------------------------- // We've to warn the user in the case of an expiring account. // An account is going to expire when it reaches its expiration date (shadowExpire). // The user has to be warned, if the days left till expiration, match the // configured warning period (shadowWarning) // --> shadowWarning: Warn x days before account expiration. if (($shadowExpire != NULL) && ($shadowWarning != NULL)) { // Check if the account is still active and not already expired. if ($shadowExpire >= $current) { // Check if we've to warn the user by comparing the remaining // number of days till expiration with the configured amount // of days in shadowWarning. if (($shadowExpire - $current) <= $shadowWarning) { return POSIX_WARN_ABOUT_EXPIRATION; } } } // -- I guess this is the correct detection, isn't it? if (($shadowLastChange != NULL) && ($shadowWarning != NULL) && ($shadowMax != NULL)) { $daysRemaining = ($shadowLastChange + $shadowMax) - $current; if ($daysRemaining > 0 && $daysRemaining <= $shadowWarning) { return POSIX_WARN_ABOUT_EXPIRATION; } } // Check if we've to force the user to change his password. // -------------------------------------------------------- // A password change is enforced when the password is older than // the configured amount of days (shadowMax). // The age of the current password (shadowLastChange) plus the maximum // amount amount of days (shadowMax) has to be smaller than the // current timestamp. if (($shadowLastChange != NULL) && ($shadowMax != NULL)) { // Check if we've an outdated password. if ($current >= ($shadowLastChange + $shadowMax)) { return POSIX_FORCE_PASSWORD_CHANGE; } } // Check if we've to freeze the users password. // -------------------------------------------- // Once a user has changed his password, he cannot change it again // for a given amount of days (shadowMin). // We should not allow to change the password within FusionDirectory too. if (($shadowLastChange != NULL) && ($shadowMin != NULL)) { // Check if we've an outdated password.
981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050
if (($shadowLastChange + $shadowMin) >= $current) { return POSIX_DISALLOW_PASSWORD_CHANGE; } } return 0; } /* \brief Check if a user is a 'user admin' */ function is_user_admin() { global $config; if (empty($this->ACLperPath)) { $this->loadACL(); } return ($this->get_permissions($config->current['BASE'], 'user/user') == 'rwcdm'); } /* \brief Test if a plugin is blacklisted for this user (does not show up in the menu) */ function isBlacklisted($plugin) { global $config; $blacklist = $config->get_cfg_value('PluginsMenuBlacklist', array()); foreach ($blacklist as $item) { list ($group, $p) = explode('|', $item, 2); if ($plugin == $p) { if (in_array($group, $this->groups) || in_array($group, $this->roles)) { return TRUE; } } } return FALSE; } /* \brief Search which ACL category should be used for this attribute and this object type, if any * * \return The ACL category, or FALSE if not found, or TRUE if acl check should be bypassed */ function getAttributeCategory($type, $attribute) { global $config; if (in_array_ics($attribute, array('objectClass', 'dn'))) { return TRUE; } if (is_array($type)) { /* Used for recursion through subtabs */ $prefix = ''; $tabs = $type; } else { /* Usual workflow */ $infos = objects::infos($type); $prefix = $infos['aclCategory'].'/'; $tabs = $config->data['TABS'][$infos['tabGroup']]; } foreach ($tabs as $tab) { $acls = pluglist::pluginInfos($tab['CLASS'])['plProvidedAcls']; if (isset($acls[$attribute])) { return $prefix.$tab['CLASS']; } if (isset($tab['SUBTABS'])) { $acl = $this->getAttributeCategory($config->data['TABS'][$tab['SUBTABS']], $attribute); if ($acl !== FALSE) { return $prefix.$acl; } }
10511052105310541055105610571058105910601061
} return FALSE; } function getSizeLimitHandler() { return $this->sizeLimitHandler; } } ?>