File: login.php

package info (click to toggle)
phpldapadmin 0.9.5-3sarge3
  • links: PTS
  • area: main
  • in suites: sarge
  • size: 3,052 kB
  • ctags: 2,526
  • sloc: php: 21,258; sh: 262; makefile: 132; xml: 42
file content (153 lines) | stat: -rw-r--r-- 4,887 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
<?php
// $Header: /cvsroot/phpldapadmin/phpldapadmin/login.php,v 1.35 2004/10/24 23:51:49 uugdave Exp $
 

/**
 * For servers whose auth_type is set to 'cookie' or 'session'. Pass me the login info
 * and I'll write two cookies, pla_login_dn_X and pla_pass_X
 * where X is the server_id. The cookie_time comes from config.php
 *
 * Note: this file uses ldap_connect() and ldap_bind() only for purposes
 *       of verifying the user-supplied DN and Password.
 *
 * Variables that come in as POST vars:
 *  - login_dn
 *  - login_pass 
 *  - server_id
 */

require './common.php';

// Prevents users from coming here without going through the proper channels
isset( $_POST['server_id'] ) or header( "Location: index.php" );

$server_id = $_POST['server_id'];
$dn = isset( $_POST['login_dn'] ) ? $_POST['login_dn'] : null;
$uid = isset( $_POST['uid'] ) ? $_POST['uid'] : null;
$pass = isset( $_POST['login_pass'] ) ? $_POST['login_pass'] : null;
$anon_bind = isset( $_POST['anonymous_bind'] ) && $_POST['anonymous_bind'] == 'on' && is_anonymous_bind_allowed($server_id) ? true : false;
check_server_id( $server_id ) or pla_error( $lang['bad_server_id'] );

if( ! $anon_bind ) {
	strlen($pass) or pla_error( $lang['password_blank'] );
}

$auth_type = $servers[$server_id]['auth_type'];

if( $anon_bind ) {
	$dn = null;
	$pass = null;
}
// Checks if the login_attr option is enabled for this host,
// which allows users to login with a simple username like 'jdoe' rather
// than the fully qualified DN, 'uid=jdoe,ou=people,,dc=example,dc=com'.
elseif ( login_attr_enabled( $server_id ) ) {

    // Is this a login string (printf-style)
    if( login_string_enabled( $server_id ) ) {
        $dn = str_replace( '<username>', $uid, get_login_string( $server_id ) );
    } else {
        // This is a standard login_attr

        // Fake the auth_type of config to do searching. This way, the admin can specify
        // the DN to use when searching for the login_attr user.
        $servers[$server_id]['auth_type'] = 'config';

        // search for the "uid" first
        set_error_handler( 'temp_login_error_handler' );
        $ds = pla_ldap_connect( $server_id );
        pla_ldap_connection_is_error( $ds );
        restore_error_handler();
        $search_base = isset( $servers[$server_id]['base'] ) && '' != trim( $servers[$server_id]['base'] ) ?
            $servers[$server_id]['base'] :
            try_to_get_root_dn( $server_id, $ds );
        if (!empty($servers[$server_id]['login_class'])) {
            $filter = '(&(objectClass='.$servers[$server_id]['login_class'].')('.$servers[$server_id]['login_attr'].'='.$uid.'))';
        } else {
            $filter = $servers[$server_id]['login_attr'].'='.$uid;
        }
        $sr = @ldap_search($ds, $search_base, $filter, array('dn'), 0, 1);
        $result = @ldap_get_entries($ds, $sr);
        $dn = isset( $result[0]['dn'] ) ? $result[0]['dn'] : false;
        if( ! $dn ) {
            pla_error( $lang['bad_user_name_or_password'] );
        }

        // restore the original auth_type
        $servers[$server_id]['auth_type'] = $auth_type;
    }
}

// We fake a 'config' server auth_type to omit duplicated code 
$auth_type = $servers[$server_id]['auth_type'];
$servers[$server_id]['auth_type'] = 'config';
$servers[$server_id]['login_dn'] = $dn;
$servers[$server_id]['login_pass'] = $pass;

// verify that the login is good 
if( null == $dn && null == $pass )
    $ds = pla_ldap_connect( $server_id, true, false );
else
    $ds = pla_ldap_connect( $server_id, false, false );

if( ! is_resource( $ds ) ) { 
	if( $anon_bind )
		pla_error( $lang['could_not_bind_anon'] );
	else
		pla_error( $lang['bad_user_name_or_password'] );
} 

$servers[$server_id]['auth_type'] = $auth_type;
set_login_dn( $server_id, $dn, $pass, $anon_bind ) or pla_error( $lang['could_not_set_cookie'] );

initialize_session_tree();
$_SESSION['tree'][$server_id] = array();
$_SESSION['tree_icons'][$server_id] = array();

session_write_close();

include realpath( 'header.php' );
?>

<body>

<script language="javascript">
	<?php if( $anon_bind && anon_bind_tree_disabled() )  { ?>
	
		parent.location.href='search.php?server_id=<?php echo $server_id; ?>'

	<?php } else {  ?>

		parent.left_frame.location.reload();

	<?php } ?>
</script>

<center>
<br />
<br />
<br />
<?php echo sprintf( $lang['successfully_logged_in_to_server'], 
    			htmlspecialchars( $servers[$server_id]['name'] ) ); ?><br />
<?php if( $anon_bind ) { ?>
	(<?php echo $lang['anonymous_bind']; ?>)	
<?php } ?>
<br />
</center>

</body>
</html>

<?php
/**
 * Only gets called when we fail to login.
 */
function temp_login_error_handler( $errno, $errstr, $file, $lineno )
{
    global $lang;
	if( 0 == ini_get( 'error_reporting' ) || 0 == error_reporting() )
			return;
    pla_error( $lang['could_not_connect'] . "<br /><br />" . htmlspecialchars( $errstr ) );
}
?>