1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168
|
<?php //-*-php-*-
rcs_id('$Id: LDAP.php,v 1.5 2005/10/10 19:43:49 rurban Exp $');
/* Copyright (C) 2004 $ThePhpWikiProgrammingTeam
* This file is part of PhpWiki. Terms and Conditions see LICENSE. (GPL2)
*/
class _LDAPPassUser
extends _PassUser
/**
* Define the vars LDAP_AUTH_HOST and LDAP_BASE_DN in config/config.ini
*
* Preferences are handled in _PassUser
*/
{
function _init() {
if ($this->_ldap = ldap_connect(LDAP_AUTH_HOST)) { // must be a valid LDAP server!
global $LDAP_SET_OPTION;
if (!empty($LDAP_SET_OPTION)) {
foreach ($LDAP_SET_OPTION as $key => $value) {
//if (is_string($key) and defined($key))
// $key = constant($key);
ldap_set_option($this->_ldap, $key, $value);
}
}
if (LDAP_AUTH_USER)
if (LDAP_AUTH_PASSWORD)
// Windows Active Directory Server is strict
$r = ldap_bind($this->_ldap, LDAP_AUTH_USER, LDAP_AUTH_PASSWORD);
else
$r = ldap_bind($this->_ldap, LDAP_AUTH_USER);
else
$r = true; // anonymous bind allowed
if (!$r) {
$this->_free();
trigger_error(sprintf(_("Unable to bind LDAP server %s using %s %s"),
LDAP_AUTH_HOST, LDAP_AUTH_USER, LDAP_AUTH_PASSWORD),
E_USER_WARNING);
return false;
}
return $this->_ldap;
} else {
return false;
}
}
function _free() {
if (isset($this->_sr) and is_resource($this->_sr)) ldap_free_result($this->_sr);
if (isset($this->_ldap) and is_resource($this->_ldap)) ldap_close($this->_ldap);
unset($this->_sr);
unset($this->_ldap);
}
function checkPass($submitted_password) {
$this->_authmethod = 'LDAP';
$userid = $this->_userid;
if (!$this->isValidName()) {
trigger_error(_("Invalid username."), E_USER_WARNING);
return $this->_tryNextPass($submitted_password);
}
if (!$this->_checkPassLength($submitted_password)) {
return WIKIAUTH_FORBIDDEN;
}
if (strstr($userid,'*')) {
trigger_error(fmt("Invalid username '%s' for LDAP Auth", $userid),
E_USER_WARNING);
return WIKIAUTH_FORBIDDEN;
}
if ($ldap = $this->_init()) {
// Need to set the right root search information. See config/config.ini
$st_search = LDAP_SEARCH_FIELD
? LDAP_SEARCH_FIELD."=$userid"
: "uid=$userid";
if (!$this->_sr = ldap_search($ldap, LDAP_BASE_DN, $st_search)) {
$this->_free();
return $this->_tryNextPass($submitted_password);
}
$info = ldap_get_entries($ldap, $this->_sr);
if (empty($info["count"])) {
$this->_free();
return $this->_tryNextPass($submitted_password);
}
// There may be more hits with this userid.
// Of course it would be better to narrow down the BASE_DN
for ($i = 0; $i < $info["count"]; $i++) {
$dn = $info[$i]["dn"];
// The password is still plain text.
// On wrong password the ldap server will return:
// "Unable to bind to server: Server is unwilling to perform"
// The @ catches this error message.
if ($r = @ldap_bind($ldap, $dn, $submitted_password)) {
// ldap_bind will return TRUE if everything matches
$this->_free();
$this->_level = WIKIAUTH_USER;
return $this->_level;
}
}
$this->_free();
}
return $this->_tryNextPass($submitted_password);
}
function userExists() {
$userid = $this->_userid;
if (strstr($userid, '*')) {
trigger_error(fmt("Invalid username '%s' for LDAP Auth", $userid),
E_USER_WARNING);
return false;
}
if ($ldap = $this->_init()) {
// Need to set the right root search information. see ../index.php
$st_search = LDAP_SEARCH_FIELD
? LDAP_SEARCH_FIELD."=$userid"
: "uid=$userid";
if (!$this->_sr = ldap_search($ldap, LDAP_BASE_DN, $st_search)) {
$this->_free();
return $this->_tryNextUser();
}
$info = ldap_get_entries($ldap, $this->_sr);
if ($info["count"] > 0) {
$this->_free();
return true;
}
}
$this->_free();
return $this->_tryNextUser();
}
function mayChangePass() {
return false;
}
}
// $Log: LDAP.php,v $
// Revision 1.5 2005/10/10 19:43:49 rurban
// add DBAUTH_PREF_INSERT: self-creating users. by John Stevens
//
// Revision 1.4 2004/12/26 17:11:17 rurban
// just copyright
//
// Revision 1.3 2004/12/20 16:05:01 rurban
// gettext msg unification
//
// Revision 1.2 2004/12/19 00:58:02 rurban
// Enforce PASSWORD_LENGTH_MINIMUM in almost all PassUser checks,
// Provide an errormessage if so. Just PersonalPage and BogoLogin not.
// Simplify httpauth logout handling and set sessions for all methods.
// fix main.php unknown index "x" getLevelDescription() warning.
//
// Revision 1.1 2004/11/01 10:43:58 rurban
// seperate PassUser methods into seperate dir (memory usage)
// fix WikiUser (old) overlarge data session
// remove wikidb arg from various page class methods, use global ->_dbi instead
// ...
//
// Local Variables:
// mode: php
// tab-width: 8
// c-basic-offset: 4
// c-hanging-comment-ender-p: nil
// indent-tabs-mode: nil
// End:
?>
|