egroupware/setup/inc/hook_config_validate.inc.php

222 lines
5.1 KiB
PHP
Raw Normal View History

<?php
/**
2016-05-01 17:56:49 +02:00
* EGroupware Setup
*
* @link http://www.egroupware.org
* @package setup
* @author Miles Lott <milos@groupwhere.org>
* @author Ralf Becker <RalfBecker-AT-outdoor-training.de>
* @license http://opensource.org/licenses/gpl-license.php GPL - GNU General Public License
* @version $Id$
*/
2016-05-01 17:56:49 +02:00
use EGroupware\Api;
/*
Set global flag to indicate for which config settings we have equally named validation methods
*/
$GLOBALS['egw_info']['server']['found_validation_hook'] = array(
'vfs_storage_mode',
'temp_dir',
'files_dir',
'backup_dir',
'mcrypt_algo',
'ldap_search_filter',
'auth_type',
'auth_multiple',
);
/**
* Validate different auth-types
*
* @param array $settings
*/
function auth_type($settings)
{
switch($settings['auth_type'])
{
case 'mail':
if (class_exists('Horde_Imap_Client_Socket') && !in_array($settings['mail_server_type'], array('pop', 'pops')))
{
return; // we use Horde code instead of imap extension
}
try {
check_load_extension('imap', true);
}
catch (Exception $ex)
{
$GLOBALS['config_error'] = $ex->getMessage();
}
break;
}
}
/**
* Validate auth_multiple config
*
* @param array $settings
*/
function auth_multiple(array $settings)
{
try {
if ($settings['auth_multiple'] !== '')
{
Api\Auth\Multiple::parseConfig($settings['auth_multiple'], true);
}
}
catch (Exception $ex) {
$GLOBALS['config_error'] = $ex->getMessage();
}
}
/**
* Set vfs_fstab depending from what the user selected for vfs_storage_mode
*
* @param array $settings
*/
function vfs_storage_mode($settings)
{
switch($settings['vfs_storage_mode'])
{
case 'fs':
2016-05-01 17:56:49 +02:00
Api\Config::save_value('vfs_fstab','','phpgwapi');
break;
case 'db':
2016-05-01 17:56:49 +02:00
Api\Config::save_value('vfs_fstab', array(
'/' => 'sqlfs://$host/?storage=db',
'/apps' => 'links://$host/apps?storage=db',
),'phpgwapi');
break;
}
}
function temp_dir($settings)
{
2016-05-01 17:56:49 +02:00
$error_msg = null;
if (!setup_detection::check_dir($settings['temp_dir'],$error_msg))
{
$GLOBALS['config_error'] = lang("Your temporary directory '%1' %2",$settings['temp_dir'],$error_msg);
}
}
function files_dir($settings)
{
2016-05-01 17:56:49 +02:00
$error_msg = null;
if (!setup_detection::check_dir($settings['files_dir'],$error_msg,true))
{
$GLOBALS['config_error'] = lang("Your files directory '%1' %2",$settings['files_dir'],$error_msg);
}
}
function backup_dir(&$settings)
{
if (@is_writeable($settings['files_dir']) && empty($settings['backup_dir']))
{
$settings['backup_dir'] = $settings['files_dir'].'/db_backup';
}
2016-05-01 17:56:49 +02:00
$error_msg = null;
if (!setup_detection::check_dir($settings['backup_dir'],$error_msg,true))
{
$GLOBALS['config_error'] = lang("Your backup directory '%1' %2",$settings['backup_dir'],$error_msg);
}
}
function _mcrypt_test_module_mode($module,$mode)
{
/* Data */
2016-05-01 17:56:49 +02:00
$key_in = 'this is a very long key, even too long for the cipher';
$plain_text = 'very important data';
/* Open module, and create IV */
if(!$GLOBALS['td'] = @mcrypt_module_open($module, '',$mode, ''))
{
@mcrypt_module_close($GLOBALS['td']);
return False;
}
2016-05-01 17:56:49 +02:00
$key = substr($key_in, 0, mcrypt_enc_get_key_size($GLOBALS['td']));
$iv_size = mcrypt_enc_get_iv_size($GLOBALS['td']);
$iv = @mcrypt_create_iv($iv_size, MCRYPT_DEV_RANDOM);
/* Initialize encryption handle */
if($iv && mcrypt_generic_init($GLOBALS['td'], $key, $iv) != -1)
{
/* Encrypt data */
$c_t = mcrypt_generic($GLOBALS['td'], $plain_text);
mcrypt_generic_deinit($GLOBALS['td']);
// close the module
mcrypt_module_close($GLOBALS['td']);
/* Reinitialize buffers for decryption */
/* Open module */
$GLOBALS['td'] = mcrypt_module_open($module, '', $mode, '');
$key = substr($key, 0, mcrypt_enc_get_key_size($GLOBALS['td']));
mcrypt_generic_init($GLOBALS['td'], $key, $iv);
$p_t = mdecrypt_generic($GLOBALS['td'], $c_t);
/* Clean up */
mcrypt_generic_deinit($GLOBALS['td']);
mcrypt_module_close($GLOBALS['td']);
}
else
{
@mcrypt_module_close($GLOBALS['td']);
}
return rtrim($p_t) === $plain_text;
}
/* run a self-test through every listed cipher and mode - from robert at peakepro dot com (php.net manual) */
function mcrypt_check_sanity()
{
$modes = mcrypt_list_modes();
$algorithms = mcrypt_list_algorithms();
foreach($algorithms as $cipher)
{
if(mcrypt_module_self_test($cipher))
{
$GLOBALS['ciphers'][$cipher] = array();
foreach($modes as $mode)
{
if(_mcrypt_test_module_mode($cipher,$mode))
{
$result = True;
}
else
{
$result = False;
}
@$GLOBALS['ciphers'][$cipher][$mode] = $result;
}
}
}
ksort($GLOBALS['ciphers']);
/* _debug_array($GLOBALS['ciphers']); */
}
function mcrypt_algo($settings)
{
/* _debug_array($settings);exit; */
if(@function_exists('mcrypt_list_modes'))
{
mcrypt_check_sanity();
if(!@$GLOBALS['ciphers'][$settings['mcrypt_algo']][$settings['mcrypt_mode']])
{
$GLOBALS['config_error'] = lang('Invalid Mcrypt Algorithm/Mode combination');
}
}
}
/**
* Add bracket around the ldap_search_filter, if admin forgot it
*
* @param array $settings
*/
function ldap_search_filter(&$settings)
{
$filter =& $settings['ldap_search_filter'];
if ($filter && $filter[0] != '(') $filter = '('.$filter.')';
}