123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266 |
- <?php
- /**
- * @copyright Copyright (c) 2017 Arthur Schiwon <blizzz@arthur-schiwon.de>
- *
- * @author Arthur Schiwon <blizzz@arthur-schiwon.de>
- * @author Christoph Wurst <christoph@winzerhof-wurst.at>
- *
- * @license GNU AGPL version 3 or any later version
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU Affero General Public License as
- * published by the Free Software Foundation, either version 3 of the
- * License, or (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU Affero General Public License for more details.
- *
- * You should have received a copy of the GNU Affero General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- *
- */
- namespace OCA\User_LDAP\Controller;
- use OC\CapabilitiesManager;
- use OC\Core\Controller\OCSController;
- use OC\Security\IdentityProof\Manager;
- use OCA\User_LDAP\Configuration;
- use OCA\User_LDAP\ConnectionFactory;
- use OCA\User_LDAP\Helper;
- use OCP\AppFramework\Http;
- use OCP\AppFramework\Http\DataResponse;
- use OCP\AppFramework\OCS\OCSBadRequestException;
- use OCP\AppFramework\OCS\OCSException;
- use OCP\AppFramework\OCS\OCSNotFoundException;
- use OCP\IRequest;
- use OCP\IUserManager;
- use OCP\IUserSession;
- use Psr\Log\LoggerInterface;
- class ConfigAPIController extends OCSController {
- public function __construct(
- string $appName,
- IRequest $request,
- CapabilitiesManager $capabilitiesManager,
- IUserSession $userSession,
- IUserManager $userManager,
- Manager $keyManager,
- private Helper $ldapHelper,
- private LoggerInterface $logger,
- private ConnectionFactory $connectionFactory
- ) {
- parent::__construct(
- $appName,
- $request,
- $capabilitiesManager,
- $userSession,
- $userManager,
- $keyManager
- );
- }
- /**
- * Create a new (empty) configuration and return the resulting prefix
- *
- * @AuthorizedAdminSetting(settings=OCA\User_LDAP\Settings\Admin)
- * @return DataResponse<Http::STATUS_OK, array{configID: string}, array{}>
- * @throws OCSException
- */
- public function create() {
- try {
- $configPrefix = $this->ldapHelper->getNextServerConfigurationPrefix();
- $configHolder = new Configuration($configPrefix);
- $configHolder->ldapConfigurationActive = false;
- $configHolder->saveConfiguration();
- } catch (\Exception $e) {
- $this->logger->error($e->getMessage(), ['exception' => $e]);
- throw new OCSException('An issue occurred when creating the new config.');
- }
- return new DataResponse(['configID' => $configPrefix]);
- }
- /**
- * Delete a LDAP configuration
- *
- * @AuthorizedAdminSetting(settings=OCA\User_LDAP\Settings\Admin)
- * @param string $configID ID of the config
- * @return DataResponse<Http::STATUS_OK, array<empty>, array{}>
- * @throws OCSException
- * @throws OCSNotFoundException Config not found
- *
- * 200: Config deleted successfully
- */
- public function delete($configID) {
- try {
- $this->ensureConfigIDExists($configID);
- if (!$this->ldapHelper->deleteServerConfiguration($configID)) {
- throw new OCSException('Could not delete configuration');
- }
- } catch (OCSException $e) {
- throw $e;
- } catch (\Exception $e) {
- $this->logger->error($e->getMessage(), ['exception' => $e]);
- throw new OCSException('An issue occurred when deleting the config.');
- }
- return new DataResponse();
- }
- /**
- * Modify a configuration
- *
- * @AuthorizedAdminSetting(settings=OCA\User_LDAP\Settings\Admin)
- * @param string $configID ID of the config
- * @param array<string, mixed> $configData New config
- * @return DataResponse<Http::STATUS_OK, array<empty>, array{}>
- * @throws OCSException
- * @throws OCSBadRequestException Modifying config is not possible
- * @throws OCSNotFoundException Config not found
- *
- * 200: Config returned
- */
- public function modify($configID, $configData) {
- try {
- $this->ensureConfigIDExists($configID);
- if (!is_array($configData)) {
- throw new OCSBadRequestException('configData is not properly set');
- }
- $configuration = new Configuration($configID);
- $configKeys = $configuration->getConfigTranslationArray();
- foreach ($configKeys as $i => $key) {
- if (isset($configData[$key])) {
- $configuration->$key = $configData[$key];
- }
- }
- $configuration->saveConfiguration();
- $this->connectionFactory->get($configID)->clearCache();
- } catch (OCSException $e) {
- throw $e;
- } catch (\Exception $e) {
- $this->logger->error($e->getMessage(), ['exception' => $e]);
- throw new OCSException('An issue occurred when modifying the config.');
- }
- return new DataResponse();
- }
- /**
- * Get a configuration
- *
- * Output can look like this:
- * <?xml version="1.0"?>
- * <ocs>
- * <meta>
- * <status>ok</status>
- * <statuscode>200</statuscode>
- * <message>OK</message>
- * </meta>
- * <data>
- * <ldapHost>ldaps://my.ldap.server</ldapHost>
- * <ldapPort>7770</ldapPort>
- * <ldapBackupHost></ldapBackupHost>
- * <ldapBackupPort></ldapBackupPort>
- * <ldapBase>ou=small,dc=my,dc=ldap,dc=server</ldapBase>
- * <ldapBaseUsers>ou=users,ou=small,dc=my,dc=ldap,dc=server</ldapBaseUsers>
- * <ldapBaseGroups>ou=small,dc=my,dc=ldap,dc=server</ldapBaseGroups>
- * <ldapAgentName>cn=root,dc=my,dc=ldap,dc=server</ldapAgentName>
- * <ldapAgentPassword>clearTextWithShowPassword=1</ldapAgentPassword>
- * <ldapTLS>1</ldapTLS>
- * <turnOffCertCheck>0</turnOffCertCheck>
- * <ldapIgnoreNamingRules/>
- * <ldapUserDisplayName>displayname</ldapUserDisplayName>
- * <ldapUserDisplayName2>uid</ldapUserDisplayName2>
- * <ldapUserFilterObjectclass>inetOrgPerson</ldapUserFilterObjectclass>
- * <ldapUserFilterGroups></ldapUserFilterGroups>
- * <ldapUserFilter>(&(objectclass=nextcloudUser)(nextcloudEnabled=TRUE))</ldapUserFilter>
- * <ldapUserFilterMode>1</ldapUserFilterMode>
- * <ldapGroupFilter>(&(|(objectclass=nextcloudGroup)))</ldapGroupFilter>
- * <ldapGroupFilterMode>0</ldapGroupFilterMode>
- * <ldapGroupFilterObjectclass>nextcloudGroup</ldapGroupFilterObjectclass>
- * <ldapGroupFilterGroups></ldapGroupFilterGroups>
- * <ldapGroupDisplayName>cn</ldapGroupDisplayName>
- * <ldapGroupMemberAssocAttr>memberUid</ldapGroupMemberAssocAttr>
- * <ldapLoginFilter>(&(|(objectclass=inetOrgPerson))(uid=%uid))</ldapLoginFilter>
- * <ldapLoginFilterMode>0</ldapLoginFilterMode>
- * <ldapLoginFilterEmail>0</ldapLoginFilterEmail>
- * <ldapLoginFilterUsername>1</ldapLoginFilterUsername>
- * <ldapLoginFilterAttributes></ldapLoginFilterAttributes>
- * <ldapQuotaAttribute></ldapQuotaAttribute>
- * <ldapQuotaDefault></ldapQuotaDefault>
- * <ldapEmailAttribute>mail</ldapEmailAttribute>
- * <ldapCacheTTL>20</ldapCacheTTL>
- * <ldapUuidUserAttribute>auto</ldapUuidUserAttribute>
- * <ldapUuidGroupAttribute>auto</ldapUuidGroupAttribute>
- * <ldapOverrideMainServer></ldapOverrideMainServer>
- * <ldapConfigurationActive>1</ldapConfigurationActive>
- * <ldapAttributesForUserSearch>uid;sn;givenname</ldapAttributesForUserSearch>
- * <ldapAttributesForGroupSearch></ldapAttributesForGroupSearch>
- * <ldapExperiencedAdmin>0</ldapExperiencedAdmin>
- * <homeFolderNamingRule></homeFolderNamingRule>
- * <hasMemberOfFilterSupport></hasMemberOfFilterSupport>
- * <useMemberOfToDetectMembership>1</useMemberOfToDetectMembership>
- * <ldapExpertUsernameAttr>uid</ldapExpertUsernameAttr>
- * <ldapExpertUUIDUserAttr>uid</ldapExpertUUIDUserAttr>
- * <ldapExpertUUIDGroupAttr></ldapExpertUUIDGroupAttr>
- * <lastJpegPhotoLookup>0</lastJpegPhotoLookup>
- * <ldapNestedGroups>0</ldapNestedGroups>
- * <ldapPagingSize>500</ldapPagingSize>
- * <turnOnPasswordChange>1</turnOnPasswordChange>
- * <ldapDynamicGroupMemberURL></ldapDynamicGroupMemberURL>
- * </data>
- * </ocs>
- *
- * @AuthorizedAdminSetting(settings=OCA\User_LDAP\Settings\Admin)
- * @param string $configID ID of the config
- * @param bool $showPassword Whether to show the password
- * @return DataResponse<Http::STATUS_OK, array<string, mixed>, array{}>
- * @throws OCSException
- * @throws OCSNotFoundException Config not found
- *
- * 200: Config returned
- */
- public function show($configID, $showPassword = false) {
- try {
- $this->ensureConfigIDExists($configID);
- $config = new Configuration($configID);
- $data = $config->getConfiguration();
- if (!$showPassword) {
- $data['ldapAgentPassword'] = '***';
- }
- foreach ($data as $key => $value) {
- if (is_array($value)) {
- $value = implode(';', $value);
- $data[$key] = $value;
- }
- }
- } catch (OCSException $e) {
- throw $e;
- } catch (\Exception $e) {
- $this->logger->error($e->getMessage(), ['exception' => $e]);
- throw new OCSException('An issue occurred when modifying the config.');
- }
- return new DataResponse($data);
- }
- /**
- * If the given config ID is not available, an exception is thrown
- *
- * @AuthorizedAdminSetting(settings=OCA\User_LDAP\Settings\Admin)
- * @param string $configID
- * @throws OCSNotFoundException
- */
- private function ensureConfigIDExists($configID): void {
- $prefixes = $this->ldapHelper->getServerConfigurationPrefixes();
- if (!in_array($configID, $prefixes, true)) {
- throw new OCSNotFoundException('Config ID not found');
- }
- }
- }
|