get(IL10NFactory::class)->get('user_ldap'); } $this->result = new WizardResult(); $this->logger = \OC::$server->get(LoggerInterface::class); } public function __destruct() { if ($this->result->hasChanges()) { $this->configuration->saveConfiguration(); } } /** * counts entries in the LDAP directory * * @param string $filter the LDAP search filter * @param string $type a string being either 'users' or 'groups'; * @throws \Exception */ public function countEntries(string $filter, string $type): int { $reqs = ['ldapHost', 'ldapBase']; if (!$this->configuration->usesLdapi()) { $reqs[] = 'ldapPort'; } if ($type === 'users') { $reqs[] = 'ldapUserFilter'; } if (!$this->checkRequirements($reqs)) { throw new \Exception('Requirements not met', 400); } $attr = ['dn']; // default $limit = 1001; if ($type === 'groups') { $result = $this->access->countGroups($filter, $attr, $limit); } elseif ($type === 'users') { $result = $this->access->countUsers($filter, $attr, $limit); } elseif ($type === 'objects') { $result = $this->access->countObjects($limit); } else { throw new \Exception('Internal error: Invalid object type', 500); } return (int)$result; } /** * @return WizardResult|false */ public function countGroups() { $filter = $this->configuration->ldapGroupFilter; if (empty($filter)) { $output = self::$l->n('%n group found', '%n groups found', 0); $this->result->addChange('ldap_group_count', $output); return $this->result; } try { $groupsTotal = $this->countEntries($filter, 'groups'); } catch (\Exception $e) { //400 can be ignored, 500 is forwarded if ($e->getCode() === 500) { throw $e; } return false; } if ($groupsTotal > 1000) { $output = self::$l->t('> 1000 groups found'); } else { $output = self::$l->n( '%n group found', '%n groups found', $groupsTotal ); } $this->result->addChange('ldap_group_count', $output); return $this->result; } /** * @throws \Exception */ public function countUsers(): WizardResult { $filter = $this->access->getFilterForUserCount(); $usersTotal = $this->countEntries($filter, 'users'); if ($usersTotal > 1000) { $output = self::$l->t('> 1000 users found'); } else { $output = self::$l->n( '%n user found', '%n users found', $usersTotal ); } $this->result->addChange('ldap_user_count', $output); return $this->result; } /** * counts any objects in the currently set base dn * * @throws \Exception */ public function countInBaseDN(): WizardResult { // we don't need to provide a filter in this case $total = $this->countEntries('', 'objects'); $this->result->addChange('ldap_test_base', $total); return $this->result; } /** * counts users with a specified attribute * @return int|false */ public function countUsersWithAttribute(string $attr, bool $existsCheck = false) { $reqs = ['ldapHost', 'ldapBase', 'ldapUserFilter']; if (!$this->configuration->usesLdapi()) { $reqs[] = 'ldapPort'; } if (!$this->checkRequirements($reqs)) { return false; } $filter = $this->access->combineFilterWithAnd([ $this->configuration->ldapUserFilter, $attr . '=*' ]); $limit = $existsCheck ? null : 1; return $this->access->countUsers($filter, ['dn'], $limit); } /** * detects the display name attribute. If a setting is already present that * returns at least one hit, the detection will be canceled. * @return WizardResult|false * @throws \Exception */ public function detectUserDisplayNameAttribute() { $reqs = ['ldapHost', 'ldapBase', 'ldapUserFilter']; if (!$this->configuration->usesLdapi()) { $reqs[] = 'ldapPort'; } if (!$this->checkRequirements($reqs)) { return false; } $attr = $this->configuration->ldapUserDisplayName; if ($attr !== '' && $attr !== 'displayName') { // most likely not the default value with upper case N, // verify it still produces a result $count = (int)$this->countUsersWithAttribute($attr, true); if ($count > 0) { //no change, but we sent it back to make sure the user interface //is still correct, even if the ajax call was cancelled meanwhile $this->result->addChange('ldap_display_name', $attr); return $this->result; } } // first attribute that has at least one result wins $displayNameAttrs = ['displayname', 'cn']; foreach ($displayNameAttrs as $attr) { $count = (int)$this->countUsersWithAttribute($attr, true); if ($count > 0) { $this->applyFind('ldap_display_name', $attr); return $this->result; } } throw new \Exception(self::$l->t('Could not detect user display name attribute. Please specify it yourself in advanced LDAP settings.')); } /** * detects the most often used email attribute for users applying to the * user list filter. If a setting is already present that returns at least * one hit, the detection will be canceled. * @return WizardResult|bool */ public function detectEmailAttribute() { $reqs = ['ldapHost', 'ldapBase', 'ldapUserFilter']; if (!$this->configuration->usesLdapi()) { $reqs[] = 'ldapPort'; } if (!$this->checkRequirements($reqs)) { return false; } $attr = $this->configuration->ldapEmailAttribute; if ($attr !== '') { $count = (int)$this->countUsersWithAttribute($attr, true); if ($count > 0) { return false; } $writeLog = true; } else { $writeLog = false; } $emailAttributes = ['mail', 'mailPrimaryAddress']; $winner = ''; $maxUsers = 0; foreach ($emailAttributes as $attr) { $count = $this->countUsersWithAttribute($attr); if ($count > $maxUsers) { $maxUsers = $count; $winner = $attr; } } if ($winner !== '') { $this->applyFind('ldap_email_attr', $winner); if ($writeLog) { $this->logger->info( 'The mail attribute has automatically been reset, ' . 'because the original value did not return any results.', ['app' => 'user_ldap'] ); } } return $this->result; } /** * @return WizardResult|false * @throws \Exception */ public function determineAttributes() { $reqs = ['ldapHost', 'ldapBase', 'ldapUserFilter']; if (!$this->configuration->usesLdapi()) { $reqs[] = 'ldapPort'; } if (!$this->checkRequirements($reqs)) { return false; } $attributes = $this->getUserAttributes(); if (!is_array($attributes)) { throw new \Exception('Failed to determine user attributes'); } natcasesort($attributes); $attributes = array_values($attributes); $this->result->addOptions('ldap_loginfilter_attributes', $attributes); $selected = $this->configuration->ldapLoginFilterAttributes; if (is_array($selected) && !empty($selected)) { $this->result->addChange('ldap_loginfilter_attributes', $selected); } return $this->result; } /** * detects the available LDAP attributes * @return array|false * @throws \Exception */ private function getUserAttributes() { $reqs = ['ldapHost', 'ldapBase', 'ldapUserFilter']; if (!$this->configuration->usesLdapi()) { $reqs[] = 'ldapPort'; } if (!$this->checkRequirements($reqs)) { return false; } $cr = $this->getConnection(); if (!$cr) { throw new \Exception('Could not connect to LDAP'); } $base = $this->configuration->ldapBase[0]; $filter = $this->configuration->ldapUserFilter; $rr = $this->ldap->search($cr, $base, $filter, [], 1, 1); if (!$this->ldap->isResource($rr)) { return false; } /** @var \LDAP\Result $rr */ $er = $this->ldap->firstEntry($cr, $rr); $attributes = $this->ldap->getAttributes($cr, $er); if ($attributes === false) { return false; } $pureAttributes = []; for ($i = 0; $i < $attributes['count']; $i++) { $pureAttributes[] = $attributes[$i]; } return $pureAttributes; } /** * detects the available LDAP groups * @return WizardResult|false the instance's WizardResult instance */ public function determineGroupsForGroups() { return $this->determineGroups('ldap_groupfilter_groups', 'ldapGroupFilterGroups', false); } /** * detects the available LDAP groups * @return WizardResult|false the instance's WizardResult instance */ public function determineGroupsForUsers() { return $this->determineGroups('ldap_userfilter_groups', 'ldapUserFilterGroups'); } /** * detects the available LDAP groups * @return WizardResult|false the instance's WizardResult instance * @throws \Exception */ private function determineGroups(string $dbKey, string $confKey, bool $testMemberOf = true) { $reqs = ['ldapHost', 'ldapBase']; if (!$this->configuration->usesLdapi()) { $reqs[] = 'ldapPort'; } if (!$this->checkRequirements($reqs)) { return false; } $cr = $this->getConnection(); if (!$cr) { throw new \Exception('Could not connect to LDAP'); } $this->fetchGroups($dbKey, $confKey); if ($testMemberOf) { $this->configuration->hasMemberOfFilterSupport = (string)$this->testMemberOf(); $this->result->markChange(); if (!$this->configuration->hasMemberOfFilterSupport) { throw new \Exception('memberOf is not supported by the server'); } } return $this->result; } /** * fetches all groups from LDAP and adds them to the result object * * @throws \Exception */ public function fetchGroups(string $dbKey, string $confKey): array { $obclasses = ['posixGroup', 'group', 'zimbraDistributionList', 'groupOfNames', 'groupOfUniqueNames']; $filterParts = []; foreach ($obclasses as $obclass) { $filterParts[] = 'objectclass=' . $obclass; } //we filter for everything //- that looks like a group and //- has the group display name set $filter = $this->access->combineFilterWithOr($filterParts); $filter = $this->access->combineFilterWithAnd([$filter, 'cn=*']); $groupNames = []; $groupEntries = []; $limit = 400; $offset = 0; do { // we need to request dn additionally here, otherwise memberOf // detection will fail later $result = $this->access->searchGroups($filter, ['cn', 'dn'], $limit, $offset); foreach ($result as $item) { if (!isset($item['cn']) || !is_array($item['cn']) || !isset($item['cn'][0])) { // just in case - no issue known continue; } $groupNames[] = $item['cn'][0]; $groupEntries[] = $item; } $offset += $limit; } while ($this->access->hasMoreResults()); if (count($groupNames) > 0) { natsort($groupNames); $this->result->addOptions($dbKey, array_values($groupNames)); } else { throw new \Exception(self::$l->t('Could not find the desired feature')); } $setFeatures = $this->configuration->$confKey; if (is_array($setFeatures) && !empty($setFeatures)) { //something is already configured? pre-select it. $this->result->addChange($dbKey, $setFeatures); } return $groupEntries; } /** * @return WizardResult|false */ public function determineGroupMemberAssoc() { $reqs = ['ldapHost', 'ldapGroupFilter']; if (!$this->configuration->usesLdapi()) { $reqs[] = 'ldapPort'; } if (!$this->checkRequirements($reqs)) { return false; } $attribute = $this->detectGroupMemberAssoc(); if ($attribute === false) { return false; } $this->configuration->setConfiguration(['ldapGroupMemberAssocAttr' => $attribute]); $this->result->addChange('ldap_group_member_assoc_attribute', $attribute); return $this->result; } /** * Detects the available object classes * @return WizardResult|false the instance's WizardResult instance * @throws \Exception */ public function determineGroupObjectClasses() { $reqs = ['ldapHost', 'ldapBase']; if (!$this->configuration->usesLdapi()) { $reqs[] = 'ldapPort'; } if (!$this->checkRequirements($reqs)) { return false; } $cr = $this->getConnection(); if (!$cr) { throw new \Exception('Could not connect to LDAP'); } $obclasses = ['groupOfNames', 'groupOfUniqueNames', 'group', 'posixGroup', '*']; $this->determineFeature($obclasses, 'objectclass', 'ldap_groupfilter_objectclass', 'ldapGroupFilterObjectclass', false); return $this->result; } /** * detects the available object classes * @return WizardResult|false * @throws \Exception */ public function determineUserObjectClasses() { $reqs = ['ldapHost', 'ldapBase']; if (!$this->configuration->usesLdapi()) { $reqs[] = 'ldapPort'; } if (!$this->checkRequirements($reqs)) { return false; } $cr = $this->getConnection(); if (!$cr) { throw new \Exception('Could not connect to LDAP'); } $obclasses = ['inetOrgPerson', 'person', 'organizationalPerson', 'user', 'posixAccount', '*']; $filter = $this->configuration->ldapUserFilter; //if filter is empty, it is probably the first time the wizard is called //then, apply suggestions. $this->determineFeature($obclasses, 'objectclass', 'ldap_userfilter_objectclass', 'ldapUserFilterObjectclass', empty($filter)); return $this->result; } /** * @return WizardResult|false * @throws \Exception */ public function getGroupFilter() { $reqs = ['ldapHost', 'ldapBase']; if (!$this->configuration->usesLdapi()) { $reqs[] = 'ldapPort'; } if (!$this->checkRequirements($reqs)) { return false; } //make sure the use display name is set $displayName = $this->configuration->ldapGroupDisplayName; if ($displayName === '') { $d = $this->configuration->getDefaults(); $this->applyFind('ldap_group_display_name', $d['ldap_group_display_name']); } $filter = $this->composeLdapFilter(self::LFILTER_GROUP_LIST); $this->applyFind('ldap_group_filter', $filter); return $this->result; } /** * @return WizardResult|false * @throws \Exception */ public function getUserListFilter() { $reqs = ['ldapHost', 'ldapBase']; if (!$this->configuration->usesLdapi()) { $reqs[] = 'ldapPort'; } if (!$this->checkRequirements($reqs)) { return false; } //make sure the use display name is set $displayName = $this->configuration->ldapUserDisplayName; if ($displayName === '') { $d = $this->configuration->getDefaults(); $this->applyFind('ldap_display_name', $d['ldap_display_name']); } $filter = $this->composeLdapFilter(self::LFILTER_USER_LIST); if (!$filter) { throw new \Exception('Cannot create filter'); } $this->applyFind('ldap_userlist_filter', $filter); return $this->result; } /** * @return WizardResult|false * @throws \Exception */ public function getUserLoginFilter() { $reqs = ['ldapHost', 'ldapBase', 'ldapUserFilter']; if (!$this->configuration->usesLdapi()) { $reqs[] = 'ldapPort'; } if (!$this->checkRequirements($reqs)) { return false; } $filter = $this->composeLdapFilter(self::LFILTER_LOGIN); if (!$filter) { throw new \Exception('Cannot create filter'); } $this->applyFind('ldap_login_filter', $filter); return $this->result; } /** * @return WizardResult|false * @throws \Exception */ public function testLoginName(string $loginName) { $reqs = ['ldapHost', 'ldapBase', 'ldapUserFilter']; if (!$this->configuration->usesLdapi()) { $reqs[] = 'ldapPort'; } if (!$this->checkRequirements($reqs)) { return false; } $cr = $this->access->connection->getConnectionResource(); if (mb_strpos($this->access->connection->ldapLoginFilter, '%uid', 0, 'UTF-8') === false) { throw new \Exception('missing placeholder'); } $users = $this->access->countUsersByLoginName($loginName); if ($this->ldap->errno($cr) !== 0) { throw new \Exception($this->ldap->error($cr)); } $filter = str_replace('%uid', $loginName, $this->access->connection->ldapLoginFilter); $this->result->addChange('ldap_test_loginname', $users); $this->result->addChange('ldap_test_effective_filter', $filter); return $this->result; } /** * Tries to determine the port, requires given Host, User DN and Password * @return WizardResult|false WizardResult on success, false otherwise * @throws \Exception */ public function guessPortAndTLS() { if (!$this->checkRequirements(['ldapHost', ])) { return false; } $this->checkHost(); $portSettings = $this->getPortSettingsToTry(); //proceed from the best configuration and return on first success foreach ($portSettings as $setting) { $p = $setting['port']; $t = $setting['tls']; $this->logger->debug( 'Wiz: trying port ' . $p . ', TLS ' . $t, ['app' => 'user_ldap'] ); //connectAndBind may throw Exception, it needs to be caught by the //callee of this method try { $settingsFound = $this->connectAndBind($p, $t); } catch (\Exception $e) { // any reply other than -1 (= cannot connect) is already okay, // because then we found the server // unavailable startTLS returns -11 if ($e->getCode() > 0) { $settingsFound = true; } else { throw $e; } } if ($settingsFound === true) { $config = [ 'ldapPort' => (string)$p, 'ldapTLS' => (string)$t, ]; $this->configuration->setConfiguration($config); $this->logger->debug( 'Wiz: detected Port ' . $p, ['app' => 'user_ldap'] ); $this->result->addChange('ldap_port', $p); return $this->result; } } //custom port, undetected (we do not brute force) return false; } /** * tries to determine a base dn from User DN or LDAP Host * @return WizardResult|false WizardResult on success, false otherwise */ public function guessBaseDN() { $reqs = ['ldapHost']; if (!$this->configuration->usesLdapi()) { $reqs[] = 'ldapPort'; } if (!$this->checkRequirements($reqs)) { return false; } //check whether a DN is given in the agent name (99.9% of all cases) $base = null; $i = stripos($this->configuration->ldapAgentName, 'dc='); if ($i !== false) { $base = substr($this->configuration->ldapAgentName, $i); if ($this->testBaseDN($base)) { $this->applyFind('ldap_base', $base); return $this->result; } } //this did not help :( //Let's see whether we can parse the Host URL and convert the domain to //a base DN $helper = \OC::$server->get(Helper::class); $domain = $helper->getDomainFromURL($this->configuration->ldapHost); if (!$domain) { return false; } $dparts = explode('.', $domain); while (count($dparts) > 0) { $base2 = 'dc=' . implode(',dc=', $dparts); if ($base !== $base2 && $this->testBaseDN($base2)) { $this->applyFind('ldap_base', $base2); return $this->result; } array_shift($dparts); } return false; } /** * sets the found value for the configuration key in the WizardResult * as well as in the Configuration instance * @param string $key the configuration key * @param string $value the (detected) value * */ private function applyFind(string $key, string $value): void { $this->result->addChange($key, $value); $this->configuration->setConfiguration([$key => $value]); } /** * Checks, whether a port was entered in the Host configuration * field. In this case the port will be stripped off, but also stored as * setting. */ private function checkHost(): void { $host = $this->configuration->ldapHost; $hostInfo = parse_url($host); //removes Port from Host if (is_array($hostInfo) && isset($hostInfo['port'])) { $port = $hostInfo['port']; $host = str_replace(':' . $port, '', $host); $this->applyFind('ldap_host', $host); $this->applyFind('ldap_port', (string)$port); } } /** * tries to detect the group member association attribute which is * one of 'uniqueMember', 'memberUid', 'member', 'gidNumber' * @return string|false string with the attribute name, false on error * @throws \Exception */ private function detectGroupMemberAssoc() { $possibleAttrs = ['uniqueMember', 'memberUid', 'member', 'gidNumber', 'zimbraMailForwardingAddress']; $filter = $this->configuration->ldapGroupFilter; if (empty($filter)) { return false; } $cr = $this->getConnection(); if (!$cr) { throw new \Exception('Could not connect to LDAP'); } $base = $this->configuration->ldapBaseGroups[0] ?: $this->configuration->ldapBase[0]; $rr = $this->ldap->search($cr, $base, $filter, $possibleAttrs, 0, 1000); if (!$this->ldap->isResource($rr)) { return false; } /** @var \LDAP\Result $rr */ $er = $this->ldap->firstEntry($cr, $rr); while ($this->ldap->isResource($er)) { $this->ldap->getDN($cr, $er); $attrs = $this->ldap->getAttributes($cr, $er); $result = []; $possibleAttrsCount = count($possibleAttrs); for ($i = 0; $i < $possibleAttrsCount; $i++) { if (isset($attrs[$possibleAttrs[$i]])) { $result[$possibleAttrs[$i]] = $attrs[$possibleAttrs[$i]]['count']; } } if (!empty($result)) { natsort($result); return key($result); } $er = $this->ldap->nextEntry($cr, $er); } return false; } /** * Checks whether for a given BaseDN results will be returned * @param string $base the BaseDN to test * @return bool true on success, false otherwise * @throws \Exception */ private function testBaseDN(string $base): bool { $cr = $this->getConnection(); if (!$cr) { throw new \Exception('Could not connect to LDAP'); } //base is there, let's validate it. If we search for anything, we should //get a result set > 0 on a proper base $rr = $this->ldap->search($cr, $base, 'objectClass=*', ['dn'], 0, 1); if (!$this->ldap->isResource($rr)) { $errorNo = $this->ldap->errno($cr); $errorMsg = $this->ldap->error($cr); $this->logger->info( 'Wiz: Could not search base ' . $base . ' Error ' . $errorNo . ': ' . $errorMsg, ['app' => 'user_ldap'] ); return false; } /** @var \LDAP\Result $rr */ $entries = $this->ldap->countEntries($cr, $rr); return ($entries !== false) && ($entries > 0); } /** * Checks whether the server supports memberOf in LDAP Filter. * Note: at least in OpenLDAP, availability of memberOf is dependent on * a configured objectClass. I.e. not necessarily for all available groups * memberOf does work. * * @return bool true if it does, false otherwise * @throws \Exception */ private function testMemberOf(): bool { $cr = $this->getConnection(); if (!$cr) { throw new \Exception('Could not connect to LDAP'); } $result = $this->access->countUsers('memberOf=*', ['memberOf'], 1); if (is_int($result) && $result > 0) { return true; } return false; } /** * creates an LDAP Filter from given configuration * @param int $filterType int, for which use case the filter shall be created * can be any of self::LFILTER_USER_LIST, self::LFILTER_LOGIN or * self::LFILTER_GROUP_LIST * @throws \Exception */ private function composeLdapFilter(int $filterType): string { $filter = ''; $parts = 0; switch ($filterType) { case self::LFILTER_USER_LIST: $objcs = $this->configuration->ldapUserFilterObjectclass; //glue objectclasses if (is_array($objcs) && count($objcs) > 0) { $filter .= '(|'; foreach ($objcs as $objc) { $filter .= '(objectclass=' . ldap_escape($objc, '', LDAP_ESCAPE_FILTER) . ')'; } $filter .= ')'; $parts++; } //glue group memberships if ($this->configuration->hasMemberOfFilterSupport) { $cns = $this->configuration->ldapUserFilterGroups; if (is_array($cns) && count($cns) > 0) { $filter .= '(|'; $cr = $this->getConnection(); if (!$cr) { throw new \Exception('Could not connect to LDAP'); } $base = $this->configuration->ldapBase[0]; foreach ($cns as $cn) { $rr = $this->ldap->search($cr, $base, 'cn=' . ldap_escape($cn, '', LDAP_ESCAPE_FILTER), ['dn', 'primaryGroupToken']); if (!$this->ldap->isResource($rr)) { continue; } /** @var \LDAP\Result $rr */ $er = $this->ldap->firstEntry($cr, $rr); $attrs = $this->ldap->getAttributes($cr, $er); $dn = $this->ldap->getDN($cr, $er); if ($dn === false || $dn === '') { continue; } $filterPart = '(memberof=' . ldap_escape($dn, '', LDAP_ESCAPE_FILTER) . ')'; if (isset($attrs['primaryGroupToken'])) { $pgt = $attrs['primaryGroupToken'][0]; $primaryFilterPart = '(primaryGroupID=' . ldap_escape($pgt, '', LDAP_ESCAPE_FILTER) . ')'; $filterPart = '(|' . $filterPart . $primaryFilterPart . ')'; } $filter .= $filterPart; } $filter .= ')'; } $parts++; } //wrap parts in AND condition if ($parts > 1) { $filter = '(&' . $filter . ')'; } if ($filter === '') { $filter = '(objectclass=*)'; } break; case self::LFILTER_GROUP_LIST: $objcs = $this->configuration->ldapGroupFilterObjectclass; //glue objectclasses if (is_array($objcs) && count($objcs) > 0) { $filter .= '(|'; foreach ($objcs as $objc) { $filter .= '(objectclass=' . ldap_escape($objc, '', LDAP_ESCAPE_FILTER) . ')'; } $filter .= ')'; $parts++; } //glue group memberships $cns = $this->configuration->ldapGroupFilterGroups; if (is_array($cns) && count($cns) > 0) { $filter .= '(|'; foreach ($cns as $cn) { $filter .= '(cn=' . ldap_escape($cn, '', LDAP_ESCAPE_FILTER) . ')'; } $filter .= ')'; } $parts++; //wrap parts in AND condition if ($parts > 1) { $filter = '(&' . $filter . ')'; } break; case self::LFILTER_LOGIN: $ulf = $this->configuration->ldapUserFilter; $loginpart = '=%uid'; $filterUsername = ''; $userAttributes = $this->getUserAttributes(); if ($userAttributes === false) { throw new \Exception('Failed to get user attributes'); } $userAttributes = array_change_key_case(array_flip($userAttributes)); $parts = 0; if ($this->configuration->ldapLoginFilterUsername === '1') { $attr = ''; if (isset($userAttributes['uid'])) { $attr = 'uid'; } elseif (isset($userAttributes['samaccountname'])) { $attr = 'samaccountname'; } elseif (isset($userAttributes['cn'])) { //fallback $attr = 'cn'; } if ($attr !== '') { $filterUsername = '(' . $attr . $loginpart . ')'; $parts++; } } $filterEmail = ''; if ($this->configuration->ldapLoginFilterEmail === '1') { $filterEmail = '(|(mailPrimaryAddress=%uid)(mail=%uid))'; $parts++; } $filterAttributes = ''; $attrsToFilter = $this->configuration->ldapLoginFilterAttributes; if (is_array($attrsToFilter) && count($attrsToFilter) > 0) { $filterAttributes = '(|'; foreach ($attrsToFilter as $attribute) { $filterAttributes .= '(' . $attribute . $loginpart . ')'; } $filterAttributes .= ')'; $parts++; } $filterLogin = ''; if ($parts > 1) { $filterLogin = '(|'; } $filterLogin .= $filterUsername; $filterLogin .= $filterEmail; $filterLogin .= $filterAttributes; if ($parts > 1) { $filterLogin .= ')'; } $filter = '(&' . $ulf . $filterLogin . ')'; break; } $this->logger->debug( 'Wiz: Final filter ' . $filter, ['app' => 'user_ldap'] ); return $filter; } /** * Connects and Binds to an LDAP Server * * @param int $port the port to connect with * @param bool $tls whether startTLS is to be used * @throws \Exception */ private function connectAndBind(int $port, bool $tls): bool { //connect, does not really trigger any server communication $host = $this->configuration->ldapHost; $hostInfo = parse_url((string)$host); if (!is_string($host) || !$hostInfo) { throw new \Exception(self::$l->t('Invalid Host')); } $this->logger->debug( 'Wiz: Attempting to connect', ['app' => 'user_ldap'] ); $cr = $this->ldap->connect($host, (string)$port); if (!$this->ldap->isResource($cr)) { throw new \Exception(self::$l->t('Invalid Host')); } /** @var \LDAP\Connection $cr */ //set LDAP options $this->ldap->setOption($cr, LDAP_OPT_PROTOCOL_VERSION, 3); $this->ldap->setOption($cr, LDAP_OPT_REFERRALS, 0); $this->ldap->setOption($cr, LDAP_OPT_NETWORK_TIMEOUT, self::LDAP_NW_TIMEOUT); try { if ($tls) { $isTlsWorking = @$this->ldap->startTls($cr); if (!$isTlsWorking) { return false; } } $this->logger->debug( 'Wiz: Attempting to Bind', ['app' => 'user_ldap'] ); //interesting part: do the bind! $login = $this->ldap->bind($cr, $this->configuration->ldapAgentName, $this->configuration->ldapAgentPassword ); $errNo = $this->ldap->errno($cr); $error = $this->ldap->error($cr); $this->ldap->unbind($cr); } catch (ServerNotAvailableException $e) { return false; } if ($login === true) { $this->logger->debug( 'Wiz: Bind successful to Port ' . $port . ' TLS ' . (int)$tls, ['app' => 'user_ldap'] ); return true; } if ($errNo === -1) { //host, port or TLS wrong return false; } throw new \Exception($error, $errNo); } /** * checks whether a valid combination of agent and password has been * provided (either two values or nothing for anonymous connect) * @return bool true if everything is fine, false otherwise */ private function checkAgentRequirements(): bool { $agent = $this->configuration->ldapAgentName; $pwd = $this->configuration->ldapAgentPassword; return ($agent !== '' && $pwd !== '') || ($agent === '' && $pwd === '') ; } private function checkRequirements(array $reqs): bool { $this->checkAgentRequirements(); foreach ($reqs as $option) { $value = $this->configuration->$option; if (empty($value)) { return false; } } return true; } /** * does a cumulativeSearch on LDAP to get different values of a * specified attribute * @param string[] $filters array, the filters that shall be used in the search * @param string $attr the attribute of which a list of values shall be returned * @param int $dnReadLimit the amount of how many DNs should be analyzed. * The lower, the faster * @param string $maxF string. if not null, this variable will have the filter that * yields most result entries * @return array|false an array with the values on success, false otherwise */ public function cumulativeSearchOnAttribute(array $filters, string $attr, int $dnReadLimit = 3, ?string &$maxF = null) { $dnRead = []; $foundItems = []; $maxEntries = 0; if (!is_array($this->configuration->ldapBase) || !isset($this->configuration->ldapBase[0])) { return false; } $base = $this->configuration->ldapBase[0]; $cr = $this->getConnection(); if (!$this->ldap->isResource($cr)) { return false; } /** @var \LDAP\Connection $cr */ $lastFilter = null; if (isset($filters[count($filters) - 1])) { $lastFilter = $filters[count($filters) - 1]; } foreach ($filters as $filter) { if ($lastFilter === $filter && count($foundItems) > 0) { //skip when the filter is a wildcard and results were found continue; } // 20k limit for performance and reason $rr = $this->ldap->search($cr, $base, $filter, [$attr], 0, 20000); if (!$this->ldap->isResource($rr)) { continue; } /** @var \LDAP\Result $rr */ $entries = $this->ldap->countEntries($cr, $rr); $getEntryFunc = 'firstEntry'; if (($entries !== false) && ($entries > 0)) { if (!is_null($maxF) && $entries > $maxEntries) { $maxEntries = $entries; $maxF = $filter; } $dnReadCount = 0; do { $entry = $this->ldap->$getEntryFunc($cr, $rr); $getEntryFunc = 'nextEntry'; if (!$this->ldap->isResource($entry)) { continue 2; } $rr = $entry; //will be expected by nextEntry next round $attributes = $this->ldap->getAttributes($cr, $entry); $dn = $this->ldap->getDN($cr, $entry); if ($attributes === false || $dn === false || in_array($dn, $dnRead)) { continue; } $newItems = []; $state = $this->getAttributeValuesFromEntry( $attributes, $attr, $newItems ); $dnReadCount++; $foundItems = array_merge($foundItems, $newItems); $dnRead[] = $dn; } while ($dnReadLimit === 0 || $dnReadCount < $dnReadLimit); } } return array_unique($foundItems); } /** * determines if and which $attr are available on the LDAP server * @param string[] $objectclasses the objectclasses to use as search filter * @param string $attr the attribute to look for * @param string $dbkey the dbkey of the setting the feature is connected to * @param string $confkey the confkey counterpart for the $dbkey as used in the * Configuration class * @param bool $po whether the objectClass with most result entries * shall be pre-selected via the result * @return array list of found items. * @throws \Exception */ private function determineFeature(array $objectclasses, string $attr, string $dbkey, string $confkey, bool $po = false): array { $cr = $this->getConnection(); if (!$cr) { throw new \Exception('Could not connect to LDAP'); } $p = 'objectclass='; foreach ($objectclasses as $key => $value) { $objectclasses[$key] = $p . $value; } $maxEntryObjC = ''; //how deep to dig? //When looking for objectclasses, testing few entries is sufficient, $dig = 3; $availableFeatures = $this->cumulativeSearchOnAttribute($objectclasses, $attr, $dig, $maxEntryObjC); if (is_array($availableFeatures) && count($availableFeatures) > 0) { natcasesort($availableFeatures); //natcasesort keeps indices, but we must get rid of them for proper //sorting in the web UI. Therefore: array_values $this->result->addOptions($dbkey, array_values($availableFeatures)); } else { throw new \Exception(self::$l->t('Could not find the desired feature')); } $setFeatures = $this->configuration->$confkey; if (is_array($setFeatures) && !empty($setFeatures)) { //something is already configured? pre-select it. $this->result->addChange($dbkey, $setFeatures); } elseif ($po && $maxEntryObjC !== '') { //pre-select objectclass with most result entries $maxEntryObjC = str_replace($p, '', $maxEntryObjC); $this->applyFind($dbkey, $maxEntryObjC); $this->result->addChange($dbkey, $maxEntryObjC); } return $availableFeatures; } /** * appends a list of values fr * @param array $result the return value from ldap_get_attributes * @param string $attribute the attribute values to look for * @param array &$known new values will be appended here * @return int state on of the class constants LRESULT_PROCESSED_OK, * LRESULT_PROCESSED_INVALID or LRESULT_PROCESSED_SKIP */ private function getAttributeValuesFromEntry(array $result, string $attribute, array &$known): int { if (!isset($result['count']) || !$result['count'] > 0) { return self::LRESULT_PROCESSED_INVALID; } // strtolower on all keys for proper comparison $result = Util::mb_array_change_key_case($result); $attribute = strtolower($attribute); if (isset($result[$attribute])) { foreach ($result[$attribute] as $key => $val) { if ($key === 'count') { continue; } if (!in_array($val, $known)) { $known[] = $val; } } return self::LRESULT_PROCESSED_OK; } else { return self::LRESULT_PROCESSED_SKIP; } } /** * @return \LDAP\Connection|false a link resource on success, otherwise false */ private function getConnection(): \LDAP\Connection|false { if (!is_null($this->cr)) { return $this->cr; } $cr = $this->ldap->connect( $this->configuration->ldapHost, $this->configuration->ldapPort ); if ($cr === false) { return false; } $this->ldap->setOption($cr, LDAP_OPT_PROTOCOL_VERSION, 3); $this->ldap->setOption($cr, LDAP_OPT_REFERRALS, 0); $this->ldap->setOption($cr, LDAP_OPT_NETWORK_TIMEOUT, self::LDAP_NW_TIMEOUT); if ($this->configuration->ldapTLS) { $this->ldap->startTls($cr); } $lo = @$this->ldap->bind($cr, $this->configuration->ldapAgentName, $this->configuration->ldapAgentPassword); if ($lo === true) { $this->cr = $cr; return $cr; } return false; } /** * @return array */ private function getDefaultLdapPortSettings(): array { static $settings = [ ['port' => 7636, 'tls' => false], ['port' => 636, 'tls' => false], ['port' => 7389, 'tls' => true], ['port' => 389, 'tls' => true], ['port' => 7389, 'tls' => false], ['port' => 389, 'tls' => false], ]; return $settings; } /** * @return array */ private function getPortSettingsToTry(): array { //389 ← LDAP / Unencrypted or StartTLS //636 ← LDAPS / SSL //7xxx ← UCS. need to be checked first, because both ports may be open $host = $this->configuration->ldapHost; $port = (int)$this->configuration->ldapPort; $portSettings = []; //In case the port is already provided, we will check this first if ($port > 0) { $hostInfo = parse_url($host); if (!(is_array($hostInfo) && isset($hostInfo['scheme']) && stripos($hostInfo['scheme'], 'ldaps') !== false)) { $portSettings[] = ['port' => $port, 'tls' => true]; } $portSettings[] = ['port' => $port, 'tls' => false]; } elseif ($this->configuration->usesLdapi()) { $portSettings[] = ['port' => 0, 'tls' => false]; } //default ports $portSettings = array_merge($portSettings, $this->getDefaultLdapPortSettings()); return $portSettings; } }