0byt3m1n1
Path:
/
data
/
applications
/
aps
/
mantis
/
1.2.7-0
/
standard
/
htdocs
/
core
/
[
Home
]
File: ldap_api.php
<?php # MantisBT - a php based bugtracking system # MantisBT is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 2 of the License, or # (at your option) any later version. # # MantisBT is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with MantisBT. If not, see <http://www.gnu.org/licenses/>. /** * LDAP API * @package CoreAPI * @subpackage LDAPAPI * @copyright Copyright (C) 2000 - 2002 Kenzaburo Ito - kenito@300baud.org * @copyright Copyright (C) 2002 - 2011 MantisBT Team - mantisbt-dev@lists.sourceforge.net * @link http://www.mantisbt.org */ /** * Logs the most recent LDAP error * @param resource $p_ds LDAP resource identifier returned by ldap_connect */ function ldap_log_error( $p_ds ) { log_event( LOG_LDAP, "ERROR #" . ldap_errno( $p_ds ) . ": " . ldap_error( $p_ds ) ); } /** * Connect and bind to the LDAP directory * @param string $p_binddn * @param string $p_password * @return resource or false */ function ldap_connect_bind( $p_binddn = '', $p_password = '' ) { if( !extension_loaded( 'ldap' ) ) { log_event( LOG_LDAP, "Error: LDAP extension missing in php" ); trigger_error( ERROR_LDAP_EXTENSION_NOT_LOADED, ERROR ); } $t_ldap_server = config_get( 'ldap_server' ); # Connect to LDAP server log_event( LOG_LDAP, "Attempting connection to LDAP URI '{$t_ldap_server}'." ); $t_ds = @ldap_connect( $t_ldap_server ); if ( $t_ds !== false && $t_ds > 0 ) { log_event( LOG_LDAP, "Connection accepted by LDAP server" ); $t_protocol_version = config_get( 'ldap_protocol_version' ); if( $t_protocol_version > 0 ) { log_event( LOG_LDAP, "Setting LDAP protocol version to " . $t_protocol_version ); $t_result = @ldap_set_option( $t_ds, LDAP_OPT_PROTOCOL_VERSION, $t_protocol_version ); if( !$t_result ) { ldap_log_error( $t_ds ); } } # Set referrals flag. $t_follow_referrals = ON == config_get( 'ldap_follow_referrals' ); $t_result = @ldap_set_option( $t_ds, LDAP_OPT_REFERRALS, $t_follow_referrals ); if( !$t_result ) { ldap_log_error( $t_ds ); } # If no Bind DN and Password is set, attempt to login as the configured # Bind DN. if( is_blank( $p_binddn ) && is_blank( $p_password ) ) { $p_binddn = config_get( 'ldap_bind_dn', '' ); $p_password = config_get( 'ldap_bind_passwd', '' ); } if( !is_blank( $p_binddn ) && !is_blank( $p_password ) ) { log_event( LOG_LDAP, "Attempting bind to ldap server with username and password" ); $t_br = @ldap_bind( $t_ds, $p_binddn, $p_password ); } else { # Either the Bind DN or the Password are empty, so attempt an anonymous bind. log_event( LOG_LDAP, "Attempting anonymous bind to ldap server" ); $t_br = @ldap_bind( $t_ds ); } if ( !$t_br ) { ldap_log_error( $t_ds ); log_event( LOG_LDAP, "Bind to ldap server failed" ); trigger_error( ERROR_LDAP_SERVER_CONNECT_FAILED, ERROR ); } else { log_event( LOG_LDAP, "Bind to ldap server successful" ); } } else { log_event( LOG_LDAP, "Connection to ldap server failed" ); trigger_error( ERROR_LDAP_SERVER_CONNECT_FAILED, ERROR ); } return $t_ds; } $g_cache_ldap_email = array(); /** * returns an email address from LDAP, given a userid * @param int $p_user_id * @return string */ function ldap_email( $p_user_id ) { global $g_cache_ldap_email; if( isset( $g_cache_ldap_email[ (int)$p_user_id ] ) ) { return $g_cache_ldap_email[ (int)$p_user_id ]; } $t_username = user_get_field( $p_user_id, 'username' ); $t_email = ldap_email_from_username( $t_username ); $g_cache_ldap_email[ (int)$p_user_id ] = $t_email; return $t_email; } /** * Return an email address from LDAP, given a username * @param string $p_username * @return string */ function ldap_email_from_username( $p_username ) { if ( ldap_simulation_is_enabled() ) { return ldap_simulation_email_from_username( $p_username ); } $t_email = ldap_get_field_from_username( $p_username, 'mail' ); if ( $t_email === null ) { return ''; } return $t_email; } /** * Gets a user's real name (common name) given the id. * * @param int $p_user_id The user id. * @return string real name. */ function ldap_realname( $p_user_id ) { $t_username = user_get_field( $p_user_id, 'username' ); return ldap_realname_from_username( $t_username ); } /** * Gets a user real name given their user name. * * @param string $p_username The user's name. * @return string The user's real name. */ function ldap_realname_from_username( $p_username ) { if ( ldap_simulation_is_enabled() ) { return ldap_simulatiom_realname_from_username( $p_username ); } $t_ldap_realname_field = config_get( 'ldap_realname_field' ); $t_realname = ldap_get_field_from_username( $p_username, $t_ldap_realname_field ); if ( $t_realname === null ) { return ''; } return $t_realname; } /** * Escapes the LDAP string to disallow injection. * * @param string $p_string The string to escape. * @return string The escaped string. */ function ldap_escape_string( $p_string ) { $t_find = array( '\\', '*', '(', ')', '/', "\x00" ); $t_replace = array( '\5c', '\2a', '\28', '\29', '\2f', '\00' ); $t_string = str_replace( $t_find, $t_replace, $p_string ); return $t_string; } /** * Gets the value of a specific field from LDAP given the user name * and LDAP field name. * * @todo Implement caching by retrieving all needed information in one query. * @todo Implement logging to LDAP queries same way like DB queries. * * @param string $p_username The user name. * @param string $p_field The LDAP field name. * @return string The field value or null if not found. */ function ldap_get_field_from_username( $p_username, $p_field ) { $t_ldap_organization = config_get( 'ldap_organization' ); $t_ldap_root_dn = config_get( 'ldap_root_dn' ); $t_ldap_uid_field = config_get( 'ldap_uid_field' ); $c_username = ldap_escape_string( $p_username ); log_event( LOG_LDAP, "Retrieving field '$p_field' for '$p_username'" ); # Bind log_event( LOG_LDAP, "Binding to LDAP server" ); $t_ds = @ldap_connect_bind(); if ( $t_ds === false ) { ldap_log_error( $t_ds ); return null; } # Search $t_search_filter = "(&$t_ldap_organization($t_ldap_uid_field=$c_username))"; $t_search_attrs = array( $t_ldap_uid_field, $p_field, 'dn' ); log_event( LOG_LDAP, "Searching for $t_search_filter" ); $t_sr = @ldap_search( $t_ds, $t_ldap_root_dn, $t_search_filter, $t_search_attrs ); if ( $t_sr === false ) { ldap_log_error( $t_ds ); ldap_unbind( $t_ds ); log_event( LOG_LDAP, "ldap search failed" ); return null; } # Get results $t_info = ldap_get_entries( $t_ds, $t_sr ); if ( $t_info === false ) { ldap_log_error( $t_ds ); log_event( LOG_LDAP, "ldap_get_entries() returned false." ); return null; } # Free results / unbind log_event( LOG_LDAP, "Unbinding from LDAP server" ); ldap_free_result( $t_sr ); ldap_unbind( $t_ds ); # If no matches, return null. if ( count( $t_info ) == 0 ) { log_event( LOG_LDAP, "No matches found." ); return null; } # Make sure the requested field exists if( is_array($t_info[0]) && array_key_exists( $p_field, $t_info[0] ) ) { $t_value = $t_info[0][$p_field][0]; log_event( LOG_LDAP, "Found value '{$t_value}' for field '{$p_field}'." ); } else { log_event( LOG_LDAP, "WARNING: field '$p_field' does not exist" ); return null; } return $t_value; } /** * Return true if the $uid has an assigngroup=$p_group tag, false otherwise * @param int $p_user_id * @param string $p_group * @return bool */ function ldap_has_group( $p_user_id, $p_group ) { $t_ldap_organization = config_get( 'ldap_organization' ); $t_ldap_root_dn = config_get( 'ldap_root_dn' ); $t_username = user_get_field( $p_user_id, 'username' ); $t_ldap_uid_field = config_get( 'ldap_uid_field', 'uid' ); $t_search_filter = "(&$t_ldap_organization($t_ldap_uid_field=$t_username)(assignedgroup=$p_group))"; $t_search_attrs = array( $t_ldap_uid_field, 'dn', 'assignedgroup', ); $t_ds = ldap_connect_bind(); log_event( LOG_LDAP, "Searching for $t_search_filter" ); $t_sr = @ldap_search( $t_ds, $t_ldap_root_dn, $t_search_filter, $t_search_attrs ); if( $t_sr === false ) { ldap_log_error( $t_ds ); log_event( LOG_LDAP, "ldap search failed" ); $t_entries = 0; } else { $t_entries = ldap_count_entries( $t_ds, $t_sr ); if( $t_entries === false ) { ldap_log_error( $t_ds ); $t_entries = 0; } ldap_free_result( $t_sr ); } ldap_unbind( $t_ds ); if( $t_entries > 0 ) { return true; } else { return false; } } /** * Attempt to authenticate the user against the LDAP directory * return true on successful authentication, false otherwise * @param int $p_user_id * @param string $p_password * @return bool */ function ldap_authenticate( $p_user_id, $p_password ) { # if password is empty and ldap allows anonymous login, then # the user will be able to login, hence, we need to check # for this special case. if ( is_blank( $p_password ) ) { return false; } $t_username = user_get_field( $p_user_id, 'username' ); return ldap_authenticate_by_username( $t_username, $p_password ); } /** * Authenticates an user via LDAP given the username and password. * * @param string $p_username The user name. * @param string $p_password The password. * @return true: authenticated, false: failed to authenticate. */ function ldap_authenticate_by_username( $p_username, $p_password ) { if ( ldap_simulation_is_enabled() ) { log_event( LOG_LDAP, "Authenticating via LDAP simulation" ); $t_authenticated = ldap_simulation_authenticate_by_username( $p_username, $p_password ); } else { $c_username = ldap_escape_string( $p_username ); $t_ldap_organization = config_get( 'ldap_organization' ); $t_ldap_root_dn = config_get( 'ldap_root_dn' ); $t_ldap_uid_field = config_get( 'ldap_uid_field', 'uid' ); $t_search_filter = "(&$t_ldap_organization($t_ldap_uid_field=$c_username))"; $t_search_attrs = array( $t_ldap_uid_field, 'dn', ); # Bind log_event( LOG_LDAP, "Binding to LDAP server" ); $t_ds = ldap_connect_bind(); if ( $t_ds === false ) { ldap_log_error( $t_ds ); trigger_error( ERROR_LDAP_AUTH_FAILED, ERROR ); } # Search for the user id log_event( LOG_LDAP, "Searching for $t_search_filter" ); $t_sr = ldap_search( $t_ds, $t_ldap_root_dn, $t_search_filter, $t_search_attrs ); if ( $t_sr === false ) { ldap_log_error( $t_ds ); ldap_unbind( $t_ds ); log_event( LOG_LDAP, "ldap search failed" ); trigger_error( ERROR_LDAP_AUTH_FAILED, ERROR ); } $t_info = @ldap_get_entries( $t_ds, $t_sr ); if ( $t_info === false ) { ldap_log_error( $t_ds ); ldap_free_result( $t_sr ); ldap_unbind( $t_ds ); trigger_error( ERROR_LDAP_AUTH_FAILED, ERROR ); } $t_authenticated = false; if ( $t_info['count'] > 0 ) { # Try to authenticate to each until we get a match for ( $i = 0; $i < $t_info['count']; $i++ ) { $t_dn = $t_info[$i]['dn']; log_event( LOG_LDAP, "Checking {$t_info[$i]['dn']}" ); # Attempt to bind with the DN and password if ( @ldap_bind( $t_ds, $t_dn, $p_password ) ) { $t_authenticated = true; break; } } } else { log_event( LOG_LDAP, "No matching entries found" ); } log_event( LOG_LDAP, "Unbinding from LDAP server" ); ldap_free_result( $t_sr ); ldap_unbind( $t_ds ); } # If user authenticated successfully then update the local DB with information # from LDAP. This will allow us to use the local data after login without # having to go back to LDAP. This will also allow fallback to DB if LDAP is down. if ( $t_authenticated ) { $t_user_id = user_get_id_by_name( $p_username ); if ( false !== $t_user_id ) { user_set_field( $t_user_id, 'password', md5( $p_password ) ); if ( ON == config_get( 'use_ldap_realname' ) ) { $t_realname = ldap_realname( $t_user_id ); user_set_field( $t_user_id, 'realname', $t_realname ); } if ( ON == config_get( 'use_ldap_email' ) ) { $t_email = ldap_email_from_username( $p_username ); user_set_field( $t_user_id, 'email', $t_email ); } } log_event( LOG_LDAP, "User '$p_username' authenticated" ); } else { log_event( LOG_LDAP, "Authentication failed" ); } return $t_authenticated; } /** * Checks if the LDAP simulation mode is enabled. * * @return bool true if enabled, false otherwise. */ function ldap_simulation_is_enabled() { $t_filename = config_get( 'ldap_simulation_file_path' ); return !is_blank( $t_filename ); } /** * Gets a user from LDAP simulation mode given the username. * * @param string $p_username The user name. * @return mixed an associate array with user information or null if not found. */ function ldap_simulation_get_user( $p_username ) { $t_filename = config_get( 'ldap_simulation_file_path' ); $t_lines = file( $t_filename ); if ( $t_lines === false ) { log_event( LOG_LDAP, "ldap_simulation_get_user: could not read simulation data from $t_filename." ); trigger_error( ERROR_LDAP_SERVER_CONNECT_FAILED, ERROR ); } foreach ( $t_lines as $t_line ) { $t_line = trim( $t_line, " \t\r\n" ); $t_row = explode( ',', $t_line ); if ( $t_row[0] != $p_username ) { continue; } $t_user = array(); $t_user['username'] = $t_row[0]; $t_user['realname'] = $t_row[1]; $t_user['email'] = $t_row[2]; $t_user['password'] = $t_row[3]; return $t_user; } log_event( LOG_LDAP, "ldap_simulation_get_user: user '$p_username' not found." ); return null; } /** * Given a username, gets the email address or empty address if user is not found. * * @param string $p_username The user name. * @return The email address or blank if user is not found. */ function ldap_simulation_email_from_username( $p_username ) { $t_user = ldap_simulation_get_user( $p_username ); if ( $t_user === null ) { log_event( LOG_LDAP, "ldap_simulation_email_from_username: user '$p_username' not found." ); return ''; } log_event( LOG_LDAP, "ldap_simulation_email_from_username: user '$p_username' has email '{$t_user['email']}'." ); return $t_user['email']; } /** * Given a username, this methods gets the realname or empty string if not found. * * @param string $p_username The username. * @return string The real name or an empty string if not found. */ function ldap_simulatiom_realname_from_username( $p_username ) { $t_user = ldap_simulation_get_user( $p_username ); if ( $t_user === null ) { log_event( LOG_LDAP, "ldap_simulatiom_realname_from_username: user '$p_username' not found." ); return ''; } log_event( LOG_LDAP, "ldap_simulatiom_realname_from_username: user '$p_username' has email '{$t_user['realname']}'." ); return $t_user['realname']; } /** * Authenticates the specified user id / password based on the simulation data. * * @param string $p_username The username. * @param string $p_password The password. * @return bool true for authenticated, false otherwise. */ function ldap_simulation_authenticate_by_username( $p_username, $p_password ) { $c_username = ldap_escape_string( $p_username ); $t_user = ldap_simulation_get_user( $c_username ); if ( $t_user === null ) { log_event( LOG_LDAP, "ldap_simulation_authenticate: user '$p_username' not found." ); return false; } if ( $t_user['password'] != $p_password ) { log_event( LOG_LDAP, "ldap_simulation_authenticate: expected password '{$t_user['password']}' and got '$p_password'." ); return false; } log_event( LOG_LDAP, "ldap_simulation_authenticate: authentication successful for user '$p_username'." ); return true; }