2007-12-09 09:03:15 +01:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* eGgroupWare setup - test or create the ldap connection and hierarchy
|
|
|
|
*
|
|
|
|
* @link http://www.egroupware.org
|
|
|
|
* @author Ralf Becker <RalfBecker-AT-outdoor-training.de>
|
|
|
|
* @package setup
|
2010-08-18 11:14:30 +02:00
|
|
|
* @copyright (c) 2007-10 by Ralf Becker <RalfBecker-AT-outdoor-training.de>
|
2007-12-09 09:03:15 +01:00
|
|
|
* @license http://opensource.org/licenses/gpl-license.php GPL - GNU General Public License
|
2009-12-05 18:42:18 +01:00
|
|
|
* @version $Id$
|
2007-12-09 09:03:15 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* setup command: test or create the ldap connection and hierarchy
|
2011-05-04 11:42:50 +02:00
|
|
|
*
|
2010-08-31 11:33:29 +02:00
|
|
|
* All commands can be run via setup-cli eg:
|
2011-05-04 11:42:50 +02:00
|
|
|
*
|
2010-08-31 11:33:29 +02:00
|
|
|
* setup/setup-cli.php --setup_cmd_ldap stylite.de,config-user,config-pw sub_command=set_mailbox \
|
|
|
|
* ldap_base=dc=local ldap_admin=cn=admin,dc=local ldap_admin_pw=secret ldap_host=localhost test=1
|
2007-12-09 09:03:15 +01:00
|
|
|
*/
|
2009-12-05 18:42:18 +01:00
|
|
|
class setup_cmd_ldap extends setup_cmd
|
2007-12-09 09:03:15 +01:00
|
|
|
{
|
2008-01-14 06:44:32 +01:00
|
|
|
/**
|
|
|
|
* Allow to run this command via setup-cli
|
|
|
|
*/
|
|
|
|
const SETUP_CLI_CALLABLE = true;
|
|
|
|
|
2007-12-09 09:03:15 +01:00
|
|
|
/**
|
|
|
|
* Instance of ldap object
|
|
|
|
*
|
|
|
|
* @var ldap
|
|
|
|
*/
|
|
|
|
private $test_ldap;
|
|
|
|
|
|
|
|
/**
|
2007-12-09 20:00:16 +01:00
|
|
|
* Constructor
|
2007-12-09 09:03:15 +01:00
|
|
|
*
|
|
|
|
* @param string/array $domain domain-name to customize the defaults or array with all parameters
|
|
|
|
* @param string $ldap_host=null
|
|
|
|
* @param string $ldap_suffix=null base of the whole ldap install, default "dc=local"
|
|
|
|
* @param string $ldap_admin=null root-dn needed to create new entries in the suffix
|
|
|
|
* @param string $ldap_admin_pw=null
|
|
|
|
* @param string $ldap_base=null base of the instance, default "o=$domain,$suffix"
|
2007-12-11 02:28:07 +01:00
|
|
|
* @param string $ldap_root_dn=null root-dn used for the instance, default "cn=admin,$base"
|
2007-12-09 09:03:15 +01:00
|
|
|
* @param string $ldap_root_pw=null
|
|
|
|
* @param string $ldap_context=null ou for accounts, default "ou=accounts,$base"
|
|
|
|
* @param string $ldap_search_filter=null search-filter for accounts, default "(uid=%user)"
|
2007-12-11 02:28:07 +01:00
|
|
|
* @param string $ldap_group_context=null ou for groups, default "ou=groups,$base"
|
2011-05-04 11:42:50 +02:00
|
|
|
* @param string $sub_command='create_ldap' 'create_ldap', 'test_ldap', 'test_ldap_root', see exec method
|
2010-08-29 10:16:27 +02:00
|
|
|
* @param string $ldap_encryption_type='des'
|
2007-12-09 09:03:15 +01:00
|
|
|
*/
|
|
|
|
function __construct($domain,$ldap_host=null,$ldap_suffix=null,$ldap_admin=null,$ldap_admin_pw=null,
|
2007-12-11 02:28:07 +01:00
|
|
|
$ldap_base=null,$ldap_root_dn=null,$ldap_root_pw=null,$ldap_context=null,$ldap_search_filter=null,
|
2010-08-26 22:22:02 +02:00
|
|
|
$ldap_group_context=null,$sub_command='create_ldap',$ldap_encryption_type='des')
|
2007-12-09 09:03:15 +01:00
|
|
|
{
|
|
|
|
if (!is_array($domain))
|
|
|
|
{
|
2007-12-10 05:59:01 +01:00
|
|
|
$domain = array(
|
2007-12-09 09:03:15 +01:00
|
|
|
'domain' => $domain,
|
|
|
|
'ldap_host' => $ldap_host,
|
|
|
|
'ldap_suffix' => $ldap_suffix,
|
|
|
|
'ldap_admin' => $ldap_admin,
|
|
|
|
'ldap_admin_pw' => $ldap_admin_pw,
|
|
|
|
'ldap_base' => $ldap_base,
|
2007-12-11 02:28:07 +01:00
|
|
|
'ldap_root_dn' => $ldap_root_dn,
|
2007-12-09 09:03:15 +01:00
|
|
|
'ldap_root_pw' => $ldap_root_pw,
|
|
|
|
'ldap_context' => $ldap_context,
|
|
|
|
'ldap_search_filter' => $ldap_search_filter,
|
2007-12-11 02:28:07 +01:00
|
|
|
'ldap_group_context' => $ldap_group_context,
|
2010-08-26 22:22:02 +02:00
|
|
|
'sub_command' => $sub_command,
|
|
|
|
'ldap_encryption_type' => $ldap_encryption_type,
|
2007-12-09 09:03:15 +01:00
|
|
|
);
|
|
|
|
}
|
|
|
|
//echo __CLASS__.'::__construct()'; _debug_array($domain);
|
|
|
|
admin_cmd::__construct($domain);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2007-12-13 03:41:55 +01:00
|
|
|
* run the command: test or create the ldap connection and hierarchy
|
2009-12-05 18:42:18 +01:00
|
|
|
*
|
2007-12-09 09:03:15 +01:00
|
|
|
* @param boolean $check_only=false only run the checks (and throw the exceptions), but not the command itself
|
2007-12-13 03:41:55 +01:00
|
|
|
* @return string success message
|
2007-12-09 09:03:15 +01:00
|
|
|
* @throws Exception(lang('Wrong credentials to access the header.inc.php file!'),2);
|
|
|
|
* @throws Exception('header.inc.php not found!');
|
|
|
|
*/
|
|
|
|
protected function exec($check_only=false)
|
|
|
|
{
|
|
|
|
if (!empty($this->domain) && !preg_match('/^([a-z0-9_-]+\.)*[a-z0-9]+/i',$this->domain))
|
|
|
|
{
|
|
|
|
throw new egw_exception_wrong_userinput(lang("'%1' is no valid domain name!",$this->domain));
|
|
|
|
}
|
|
|
|
if ($this->remote_id && $check_only) return true; // further checks can only done locally
|
|
|
|
|
|
|
|
$this->_merge_defaults();
|
|
|
|
//_debug_array($this->as_array());
|
|
|
|
|
2007-12-11 02:28:07 +01:00
|
|
|
switch($this->sub_command)
|
2007-12-09 09:03:15 +01:00
|
|
|
{
|
2007-12-11 02:28:07 +01:00
|
|
|
case 'test_ldap_root':
|
|
|
|
$msg = $this->connect($this->ldap_admin,$this->ldap_admin_pw);
|
|
|
|
break;
|
|
|
|
case 'test_ldap':
|
|
|
|
$msg = $this->connect();
|
|
|
|
break;
|
2010-08-20 15:27:37 +02:00
|
|
|
case 'delete_ldap':
|
2010-08-20 16:18:21 +02:00
|
|
|
$msg = $this->delete_base();
|
|
|
|
break;
|
|
|
|
case 'users_ldap':
|
|
|
|
$msg = $this->users();
|
2010-08-20 15:27:37 +02:00
|
|
|
break;
|
2010-08-26 22:22:02 +02:00
|
|
|
case 'migrate_to_ldap':
|
|
|
|
case 'migrate_to_sql':
|
|
|
|
$msg = $this->migrate($this->sub_command == 'migrate_to_ldap');
|
|
|
|
break;
|
2010-08-31 11:33:29 +02:00
|
|
|
case 'set_mailbox':
|
|
|
|
$msg = $this->set_mailbox();
|
|
|
|
break;
|
2007-12-11 02:28:07 +01:00
|
|
|
case 'create_ldap':
|
|
|
|
default:
|
|
|
|
$msg = $this->create();
|
|
|
|
break;
|
2007-12-09 09:03:15 +01:00
|
|
|
}
|
|
|
|
return $msg;
|
|
|
|
}
|
2011-05-04 11:42:50 +02:00
|
|
|
|
2010-08-26 22:22:02 +02:00
|
|
|
/**
|
|
|
|
* Migrate to other account storage
|
2011-05-04 11:42:50 +02:00
|
|
|
*
|
2010-08-26 22:22:02 +02:00
|
|
|
* @param boolean $to_ldap true: sql --> ldap, false: ldap --> sql
|
|
|
|
* @return string with success message
|
|
|
|
* @throws Exception on error
|
|
|
|
*/
|
|
|
|
private function migrate($to_ldap)
|
|
|
|
{
|
|
|
|
$msg = array();
|
|
|
|
// if migrating to ldap, check ldap and create context if not yet exiting
|
2010-08-29 10:16:27 +02:00
|
|
|
if ($to_ldap && !empty($this->ldap_admin_pw))
|
2010-08-26 22:22:02 +02:00
|
|
|
{
|
|
|
|
$msg[] = $this->create();
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
$msg[] = $this->connect();
|
|
|
|
}
|
|
|
|
// read accounts from old store
|
|
|
|
$accounts = $this->accounts(!$to_ldap);
|
2011-05-04 11:42:50 +02:00
|
|
|
|
2012-11-20 10:13:16 +01:00
|
|
|
/* uncomment if you want to have SQL cleaned up before migration
|
|
|
|
if (!$to_ldap)
|
|
|
|
{
|
|
|
|
$GLOBALS['egw']->db->query('TRUNCATE TABLE egw_accounts', __LINE__, __FILE__);
|
|
|
|
$GLOBALS['egw']->db->query('DELETE FROM egw_addressbook WHERE account_id IS NOT NULL', __LINE__, __FILE__);
|
|
|
|
}*/
|
2010-08-26 22:22:02 +02:00
|
|
|
// instanciate accounts obj for new store
|
|
|
|
$accounts_obj = $this->accounts_obj($to_ldap);
|
2011-05-04 11:42:50 +02:00
|
|
|
|
2010-08-26 22:22:02 +02:00
|
|
|
$accounts_created = $groups_created = $errors = 0;
|
|
|
|
$target = $to_ldap ? 'LDAP' : 'SQL';
|
|
|
|
foreach($accounts as $account_id => $account)
|
|
|
|
{
|
|
|
|
if (isset($this->only) && !in_array($account_id,$this->only))
|
|
|
|
{
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
$what = ($account['account_type'] == 'u' ? lang('User') : lang('Group')).' '.
|
|
|
|
$account_id.' ('.$account['account_lid'].')';
|
|
|
|
|
2012-10-12 14:55:19 +02:00
|
|
|
// invalidate cache: otherwise no migration takes place, if cached results says account already exists
|
|
|
|
accounts::cache_invalidate($account_id);
|
|
|
|
|
2010-08-26 22:22:02 +02:00
|
|
|
if ($account['account_type'] == 'u')
|
|
|
|
{
|
|
|
|
if ($accounts_obj->exists($account_id))
|
|
|
|
{
|
|
|
|
$msg[] = lang('%1 already exists in %2.',$what,$target);
|
|
|
|
$errors++;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if ($to_ldap)
|
|
|
|
{
|
|
|
|
if ($GLOBALS['egw_info']['server']['ldap_extra_attributes'])
|
|
|
|
{
|
|
|
|
$account['homedirectory'] = $GLOBALS['egw_info']['server']['ldap_account_home'] . '/' . $account['account_lid'];
|
|
|
|
$account['loginshell'] = $GLOBALS['egw_info']['server']['ldap_account_shell'];
|
|
|
|
}
|
|
|
|
$account['account_passwd'] = self::hash_sql2ldap($account['account_pwd']);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2010-08-29 10:16:27 +02:00
|
|
|
$account['account_passwd'] = self::hash_ldap2sql($account['account_pwd']);
|
2010-08-26 22:22:02 +02:00
|
|
|
}
|
|
|
|
unset($account['person_id']);
|
2011-05-04 11:42:50 +02:00
|
|
|
|
2010-08-26 22:22:02 +02:00
|
|
|
if (!$accounts_obj->save($account))
|
|
|
|
{
|
|
|
|
$msg[] = lang('Creation of %1 in %2 failed !!!',$what,$target);
|
|
|
|
$errors++;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
$accounts_obj->set_memberships($account['memberships'],$account_id);
|
|
|
|
$msg[] = lang('%1 created in %2.',$what,$target);
|
|
|
|
$accounts_created++;
|
2011-05-04 11:42:50 +02:00
|
|
|
|
2012-11-19 10:59:00 +01:00
|
|
|
// check if we need to migrate mail-account
|
2012-11-20 10:13:16 +01:00
|
|
|
if (!isset($ldap_class))
|
2012-11-19 10:59:00 +01:00
|
|
|
{
|
2012-11-20 10:13:16 +01:00
|
|
|
$ldap_class = false;
|
|
|
|
$ldap = new ldap();
|
|
|
|
$ldap->ldapConnect();
|
|
|
|
foreach(array( // todo: have these enumerated by emailadmin ...
|
|
|
|
'qmailUser' => 'postfixldap',
|
|
|
|
'dbMailUser' => 'postfixdbmailuser',
|
|
|
|
// nothing to migrate for inetOrgPerson ...
|
|
|
|
) as $object_class => $class)
|
2012-11-19 10:59:00 +01:00
|
|
|
{
|
2012-11-20 10:13:16 +01:00
|
|
|
if ($ldap->getLDAPServerInfo()->supportsObjectClass($object_class))
|
|
|
|
{
|
|
|
|
$ldap_class = $class;
|
|
|
|
break;
|
|
|
|
}
|
2012-11-19 10:59:00 +01:00
|
|
|
}
|
2012-11-20 10:13:16 +01:00
|
|
|
}
|
|
|
|
if ($ldap_class)
|
|
|
|
{
|
|
|
|
if (!isset($emailadmin_src))
|
2012-11-19 10:59:00 +01:00
|
|
|
{
|
2012-11-20 10:13:16 +01:00
|
|
|
include_once(EGW_INCLUDE_ROOT.'/emailadmin/inc/class.'.$ldap_class.'.inc.php');
|
|
|
|
if ($to_ldap)
|
2012-11-19 10:59:00 +01:00
|
|
|
{
|
2012-11-20 10:13:16 +01:00
|
|
|
$emailadmin_src = new emailadmin_smtp_sql();
|
|
|
|
$emailadmin_dst = new $ldap_class();
|
2012-11-19 10:59:00 +01:00
|
|
|
}
|
2012-11-20 10:13:16 +01:00
|
|
|
else
|
|
|
|
{
|
|
|
|
$emailadmin_src = new $ldap_class();
|
|
|
|
$emailadmin_dst = new emailadmin_smtp_sql();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (($mailaccount = $emailadmin_src->getUserData($account_id)))
|
|
|
|
{
|
|
|
|
//echo "<p>".array2string($mailaccount).': ';
|
|
|
|
$emailadmin_dst->setUserData($account_id, (array)$mailaccount['mailAlternateAddress'],
|
2012-11-19 10:59:00 +01:00
|
|
|
(array)$mailaccount['mailForwardingAddress'], $mailaccount['deliveryMode'],
|
|
|
|
$mailaccount['accountStatus'], $mailaccount['mailLocalAddress'],
|
|
|
|
$mailaccount['quotaLimit']);
|
2012-11-20 10:13:16 +01:00
|
|
|
|
|
|
|
$msg[] = lang("Mail account of %1 migraged", $account['account_lid']);
|
2012-11-19 10:59:00 +01:00
|
|
|
}
|
2012-11-20 10:13:16 +01:00
|
|
|
//else echo "<p>No mail account data found for #$account_id $account[account_lid]!</p>\n";
|
2012-11-19 10:59:00 +01:00
|
|
|
}
|
|
|
|
|
2010-08-29 10:16:27 +02:00
|
|
|
// should we run any or some addAccount hooks
|
|
|
|
if ($this->add_account_hook)
|
|
|
|
{
|
2010-09-02 10:50:48 +02:00
|
|
|
// setting up egw_info array with new ldap information, so hook can use ldap::ldapConnect()
|
|
|
|
if (!$egw_info_set++)
|
|
|
|
{
|
|
|
|
foreach(array('ldap_host','ldap_root_dn','ldap_root_pw','ldap_context','ldap_group_context','ldap_search_filter','ldap_encryptin_type','mail_suffix','mail_login_type') as $name)
|
|
|
|
{
|
|
|
|
if (!empty($this->$name)) $GLOBALS['egw_info']['server'][$name] = $this->$name;
|
|
|
|
}
|
|
|
|
//error_log(__METHOD__."() setup up egw_info[server]: ldap_host='{$GLOBALS['egw_info']['server']['ldap_host']}', ldap_root_dn='{$GLOBALS['egw_info']['server']['ldap_root_dn']}', ldap_root_pw='{$GLOBALS['egw_info']['server']['ldap_root_pw']}', ldap_context='{$GLOBALS['egw_info']['server']['ldap_context']}', mail_suffix='{$GLOBALS['egw_info']['server']['mail_suffix']}', mail_logig_type='{$GLOBALS['egw_info']['server']['mail_login-type']}'");
|
|
|
|
}
|
2011-05-04 11:42:50 +02:00
|
|
|
try
|
2010-08-29 10:16:27 +02:00
|
|
|
{
|
|
|
|
$account['location'] = 'addAccount';
|
|
|
|
// running all addAccount hooks (currently NOT working, as not all work in setup)
|
|
|
|
if ($this->add_account_hook === true)
|
|
|
|
{
|
|
|
|
$GLOBALS['egw']->hooks->process($account,array(),true);
|
|
|
|
}
|
|
|
|
elseif(is_callable($this->add_account_hook))
|
|
|
|
{
|
|
|
|
call_user_func($this->add_account_hook,$account);
|
|
|
|
}
|
|
|
|
}
|
2011-05-04 11:42:50 +02:00
|
|
|
catch(Exception $e)
|
2010-08-29 10:16:27 +02:00
|
|
|
{
|
|
|
|
$msg[] = $e->getMessage();
|
|
|
|
$errors++;
|
|
|
|
}
|
|
|
|
}
|
2010-08-26 22:22:02 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
// check if group already exists
|
|
|
|
if (!$accounts_obj->exists($account_id))
|
|
|
|
{
|
|
|
|
if (!$accounts_obj->save($account))
|
|
|
|
{
|
|
|
|
$msg[] = lang('Creation of %1 in %2 failed !!!',$what,$target);
|
|
|
|
++$errors;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
$msg[] = lang('%1 created in %2.',$what,$target);
|
|
|
|
$groups_created++;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
$msg[] = lang('%1 already exists in %2.',$what,$target);
|
2010-08-29 10:16:27 +02:00
|
|
|
$errors++;
|
|
|
|
|
2010-08-26 22:22:02 +02:00
|
|
|
if ($accounts_obj->id2name($account_id) != $account['account_lid'])
|
|
|
|
{
|
2010-08-29 10:16:27 +02:00
|
|
|
$msg[] = lang("==> different group '%1' under that gidNumber %2, NOT setting memberships!",$account['account_lid'],$account_id);
|
2010-08-26 22:22:02 +02:00
|
|
|
++$errors;
|
|
|
|
continue; // different group under that gidnumber!
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// now saving / updating the memberships
|
|
|
|
$accounts_obj->set_members($account['members'],$account_id);
|
|
|
|
}
|
|
|
|
}
|
2012-11-19 09:23:09 +01:00
|
|
|
// migrate addressbook data
|
|
|
|
$GLOBALS['egw_info']['user']['apps']['admin'] = true; // otherwise migration will not run in setup!
|
|
|
|
$addressbook = new addressbook_so();
|
|
|
|
foreach($this->as_array() as $name => $value)
|
|
|
|
{
|
|
|
|
if (substr($name, 5) == 'ldap_')
|
|
|
|
{
|
|
|
|
$GLOBALS['egw_info']['server'][$name] = $value;
|
|
|
|
}
|
|
|
|
}
|
2012-11-20 10:13:16 +01:00
|
|
|
ob_start();
|
2012-11-19 09:23:09 +01:00
|
|
|
$addressbook->migrate2ldap($to_ldap ? 'accounts' : 'accounts-back');
|
2012-11-20 10:13:16 +01:00
|
|
|
$msg = array_merge($msg, explode("\n", strip_tags(ob_get_clean())));
|
2012-11-19 09:23:09 +01:00
|
|
|
|
2010-08-29 10:16:27 +02:00
|
|
|
$this->restore_db();
|
|
|
|
|
2010-08-26 22:22:02 +02:00
|
|
|
return lang('%1 users and %2 groups created, %3 errors',$accounts_created,$groups_created,$errors).
|
|
|
|
($errors || $this->verbose ? "\n- ".implode("\n- ",$msg) : '');
|
|
|
|
}
|
2011-05-04 11:42:50 +02:00
|
|
|
|
2010-08-26 22:22:02 +02:00
|
|
|
/**
|
|
|
|
* Convert SQL hash to LDAP hash
|
2011-05-04 11:42:50 +02:00
|
|
|
*
|
2010-08-26 22:22:02 +02:00
|
|
|
* @param string $hash
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public static function hash_sql2ldap($hash)
|
|
|
|
{
|
2011-05-04 11:42:50 +02:00
|
|
|
if (!($type = $GLOBALS['egw_info']['server']['sql_encryption_type'])) $type = 'md5';
|
|
|
|
|
2010-08-26 22:22:02 +02:00
|
|
|
if (preg_match('/^\\{(.*)\\}(.*)$/',$hash,$matches))
|
|
|
|
{
|
2011-05-04 11:42:50 +02:00
|
|
|
list(,$type,$hash) = $matches;
|
2010-08-26 22:22:02 +02:00
|
|
|
}
|
2012-03-29 20:33:33 +02:00
|
|
|
elseif (preg_match('/^[0-9a-f]{32}$/',$hash))
|
|
|
|
{
|
|
|
|
$type = 'md5';
|
|
|
|
}
|
2010-08-26 22:22:02 +02:00
|
|
|
switch(strtolower($type))
|
|
|
|
{
|
|
|
|
case 'plain':
|
2011-05-04 11:42:50 +02:00
|
|
|
// ldap stores plaintext passwords without {plain} prefix
|
2010-08-26 22:22:02 +02:00
|
|
|
break;
|
2011-05-04 11:42:50 +02:00
|
|
|
|
|
|
|
case 'md5':
|
|
|
|
$hash = base64_encode(pack("H*",$hash));
|
|
|
|
// fall through
|
|
|
|
default:
|
|
|
|
$hash = '{'.strtoupper($type).'}'.$hash;
|
2010-08-26 22:22:02 +02:00
|
|
|
}
|
|
|
|
return $hash;
|
|
|
|
}
|
|
|
|
|
2010-08-29 10:16:27 +02:00
|
|
|
/**
|
|
|
|
* Convert LDAP hash to SQL hash
|
2011-05-04 11:42:50 +02:00
|
|
|
*
|
2010-08-29 10:16:27 +02:00
|
|
|
* @param string $hash
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public static function hash_ldap2sql($hash)
|
|
|
|
{
|
|
|
|
if ($hash[0] != '{') // plain has to be explicitly specified for sql, in ldap it's the default
|
|
|
|
{
|
|
|
|
$hash = '{PLAIN}'.$hash;
|
|
|
|
}
|
|
|
|
return $hash;
|
|
|
|
}
|
|
|
|
|
2010-08-26 22:22:02 +02:00
|
|
|
/**
|
|
|
|
* Read all accounts from sql or ldap
|
2011-05-04 11:42:50 +02:00
|
|
|
*
|
2010-08-26 22:22:02 +02:00
|
|
|
* @param boolean $from_ldap=true true: ldap, false: sql
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public function accounts($from_ldap=true)
|
|
|
|
{
|
|
|
|
$accounts_obj = $this->accounts_obj($from_ldap);
|
|
|
|
//error_log(__METHOD__."(from_ldap=".array2string($from_ldap).') get_class(accounts_obj->backend)='.get_class($accounts_obj->backend));
|
2011-05-04 11:42:50 +02:00
|
|
|
|
2012-11-19 10:59:00 +01:00
|
|
|
$accounts = $accounts_obj->search(array('type' => 'both', 'objectclass' => true));
|
2010-08-26 22:22:02 +02:00
|
|
|
|
|
|
|
foreach($accounts as $account_id => &$account)
|
|
|
|
{
|
|
|
|
if ($account_id != $account['account_id']) // not all backends have as key the account_id
|
|
|
|
{
|
|
|
|
unset($account);
|
|
|
|
$account_id = $account['account_id'];
|
|
|
|
}
|
2012-11-19 10:59:00 +01:00
|
|
|
$account += $accounts_obj->read($account_id);
|
2011-05-04 11:42:50 +02:00
|
|
|
|
2010-08-26 22:22:02 +02:00
|
|
|
if ($account['account_type'] == 'g')
|
|
|
|
{
|
|
|
|
$account['members'] = $accounts_obj->members($account_id,true);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
$account['memberships'] = $accounts_obj->memberships($account_id,true);
|
|
|
|
}
|
|
|
|
}
|
2010-08-29 10:16:27 +02:00
|
|
|
accounts::cache_invalidate();
|
|
|
|
|
2010-08-26 22:22:02 +02:00
|
|
|
return $accounts;
|
|
|
|
}
|
2011-05-04 11:42:50 +02:00
|
|
|
|
2010-08-26 22:22:02 +02:00
|
|
|
/**
|
|
|
|
* Instancate accounts object from either sql of ldap
|
2011-05-04 11:42:50 +02:00
|
|
|
*
|
2010-08-26 22:22:02 +02:00
|
|
|
* @param boolean $ldap true: ldap, false: sql
|
|
|
|
* @return accounts
|
|
|
|
*/
|
|
|
|
private function accounts_obj($ldap)
|
|
|
|
{
|
|
|
|
static $enviroment_setup;
|
2011-05-04 11:42:50 +02:00
|
|
|
if (!$enviroment_setup)
|
2010-08-26 22:22:02 +02:00
|
|
|
{
|
|
|
|
parent::_setup_enviroment($this->domain);
|
|
|
|
$enviroment_setup = true;
|
|
|
|
}
|
|
|
|
if ($ldap) $this->connect(); // throws exception, if it can NOT connect
|
|
|
|
|
|
|
|
// otherwise search does NOT work, as accounts_sql uses addressbook_bo for it
|
|
|
|
$GLOBALS['egw_info']['server']['account_repository'] = $ldap ? 'ldap' : 'sql';
|
|
|
|
|
|
|
|
if (!self::$egw_setup->setup_account_object(
|
|
|
|
array(
|
|
|
|
'account_repository' => $GLOBALS['egw_info']['server']['account_repository'],
|
|
|
|
) + $this->as_array()) ||
|
|
|
|
!is_a(self::$egw_setup->accounts,'accounts') ||
|
|
|
|
!is_a(self::$egw_setup->accounts->backend,'accounts_'.($ldap?'ldap':'sql')))
|
|
|
|
{
|
|
|
|
throw new Exception(lang("Can NOT instancate accounts object for %1",$ldap?'LDAP':'SQL'));
|
|
|
|
}
|
|
|
|
return self::$egw_setup->accounts;
|
|
|
|
}
|
2009-12-05 18:42:18 +01:00
|
|
|
|
2007-12-09 09:03:15 +01:00
|
|
|
/**
|
|
|
|
* Connect to ldap server
|
|
|
|
*
|
2007-12-11 02:28:07 +01:00
|
|
|
* @param string $dn=null default $this->ldap_root_dn
|
2007-12-09 09:03:15 +01:00
|
|
|
* @param string $pw=null default $this->ldap_root_pw
|
|
|
|
* @throws egw_exception_wrong_userinput Can not connect to ldap ...
|
|
|
|
*/
|
|
|
|
private function connect($dn=null,$pw=null)
|
|
|
|
{
|
2007-12-11 02:28:07 +01:00
|
|
|
if (is_null($dn)) $dn = $this->ldap_root_dn;
|
2007-12-09 09:03:15 +01:00
|
|
|
if (is_null($pw)) $pw = $this->ldap_root_pw;
|
2009-12-05 18:42:18 +01:00
|
|
|
|
2007-12-09 09:03:15 +01:00
|
|
|
if (!$pw) // ldap::ldapConnect use the current eGW's pw otherwise
|
|
|
|
{
|
|
|
|
throw new egw_exception_wrong_userinput(lang('You need to specify a password!'));
|
|
|
|
}
|
|
|
|
$this->test_ldap = new ldap();
|
2009-12-05 18:42:18 +01:00
|
|
|
|
2007-12-09 09:03:15 +01:00
|
|
|
$error_rep = error_reporting();
|
2012-11-19 09:23:09 +01:00
|
|
|
error_reporting($error_rep & ~E_WARNING); // switch warnings of, in case they are on
|
2007-12-09 09:03:15 +01:00
|
|
|
ob_start();
|
|
|
|
$ds = $this->test_ldap->ldapConnect($this->ldap_host,$dn,$pw);
|
|
|
|
ob_end_clean();
|
|
|
|
error_reporting($error_rep);
|
2009-12-05 18:42:18 +01:00
|
|
|
|
2007-12-09 09:03:15 +01:00
|
|
|
if (!$ds)
|
|
|
|
{
|
|
|
|
throw new egw_exception_wrong_userinput(lang('Can not connect to LDAP server on host %1 using DN %2!',
|
|
|
|
$this->ldap_host,$dn).($this->test_ldap->ds ? ' ('.ldap_error($this->test_ldap->ds).')' : ''));
|
|
|
|
}
|
|
|
|
return lang('Successful connected to LDAP server on %1 using DN %2.',$this->ldap_host,$dn);
|
|
|
|
}
|
2011-05-04 11:42:50 +02:00
|
|
|
|
2010-08-20 16:18:21 +02:00
|
|
|
/**
|
|
|
|
* Count active (not expired) users
|
|
|
|
*
|
|
|
|
* @return int number of active users
|
|
|
|
* @throws egw_exception_wrong_userinput
|
|
|
|
*/
|
|
|
|
private function users()
|
|
|
|
{
|
|
|
|
$this->connect();
|
2011-05-04 11:42:50 +02:00
|
|
|
|
2010-08-20 16:18:21 +02:00
|
|
|
$sr = ldap_list($this->test_ldap->ds,$this->ldap_context,'ObjectClass=posixAccount',array('dn','shadowExpire'));
|
|
|
|
if (!($entries = ldap_get_entries($this->test_ldap->ds, $sr)))
|
|
|
|
{
|
|
|
|
throw new egw_exception('Error listing "dn=%1"!',$this->ldap_context);
|
|
|
|
}
|
|
|
|
$num = 0;
|
|
|
|
foreach($entries as $n => $entry)
|
|
|
|
{
|
|
|
|
if ($n === 'count') continue;
|
|
|
|
if (isset($entry['shadowexpire']) && $entry['shadowexpire'][0]*24*3600 < time()) continue;
|
|
|
|
++$num;
|
|
|
|
}
|
|
|
|
return $num;
|
|
|
|
}
|
2011-05-04 11:42:50 +02:00
|
|
|
|
2007-12-09 09:03:15 +01:00
|
|
|
/**
|
|
|
|
* Check and if does not yet exist create the new database and user
|
|
|
|
*
|
|
|
|
* @return string with success message
|
|
|
|
* @throws egw_exception_wrong_userinput
|
|
|
|
*/
|
|
|
|
private function create()
|
|
|
|
{
|
|
|
|
$this->connect($this->ldap_admin,$this->ldap_admin_pw);
|
2009-12-05 18:42:18 +01:00
|
|
|
|
2007-12-09 09:03:15 +01:00
|
|
|
foreach(array(
|
|
|
|
$this->ldap_base => array(),
|
|
|
|
$this->ldap_context => array(),
|
2007-12-11 02:28:07 +01:00
|
|
|
$this->ldap_group_context => array(),
|
2011-05-04 11:42:50 +02:00
|
|
|
$this->ldap_root_dn => array('userPassword' => auth::encrypt_ldap($this->ldap_root_pw,'ssha')),
|
2007-12-09 09:03:15 +01:00
|
|
|
) as $dn => $extra)
|
|
|
|
{
|
2007-12-11 02:28:07 +01:00
|
|
|
if (!$this->_create_node($dn,$extra,$check_only) && $dn == $this->ldap_root_dn)
|
2007-12-09 09:03:15 +01:00
|
|
|
{
|
|
|
|
// ldap_root already existed, lets check the pw is correct
|
|
|
|
$this->connect();
|
|
|
|
}
|
|
|
|
}
|
2007-12-09 20:00:16 +01:00
|
|
|
return lang('Successful connected to LDAP server on %1 and created/checked required structur %2.',
|
2007-12-09 09:03:15 +01:00
|
|
|
$this->ldap_host,$this->ldap_base);
|
|
|
|
}
|
2009-12-05 18:42:18 +01:00
|
|
|
|
2010-08-20 15:27:37 +02:00
|
|
|
/**
|
|
|
|
* Delete whole LDAP tree of an instance dn=$this->ldap_base using $this->ldap_admin/_pw
|
|
|
|
*
|
|
|
|
* @return string with success message
|
|
|
|
* @throws egw_exception if dn not found, not listable or delete fails
|
|
|
|
*/
|
2010-08-20 16:18:21 +02:00
|
|
|
private function delete_base()
|
2010-08-20 15:27:37 +02:00
|
|
|
{
|
|
|
|
$this->connect($this->ldap_admin,$this->ldap_admin_pw);
|
2011-05-04 11:42:50 +02:00
|
|
|
|
2010-08-20 15:27:37 +02:00
|
|
|
// if base not set, use context minus one hierarchy, eg. ou=accounts,(o=domain,dc=local)
|
|
|
|
if (empty($this->ldap_base) && $this->ldap_context)
|
|
|
|
{
|
|
|
|
list(,$this->ldap_base) = explode(',',$this->ldap_context,2);
|
|
|
|
}
|
|
|
|
// some precausion to not delete whole ldap tree!
|
|
|
|
if (count(explode(',',$this->ldap_base)) < 2)
|
|
|
|
{
|
2010-08-20 16:18:21 +02:00
|
|
|
throw new egw_exception_assertion_failed(lang('Refusing to delete dn "%1"!',$this->ldap_base));
|
2010-08-20 15:27:37 +02:00
|
|
|
}
|
|
|
|
// check if base does exist
|
|
|
|
if (!@ldap_read($this->test_ldap->ds,$this->ldap_base,'objectClass=*'))
|
|
|
|
{
|
2010-08-20 16:18:21 +02:00
|
|
|
throw new egw_exception_wrong_userinput(lang('Base dn "%1" NOT found!',$this->ldap_base));
|
2010-08-20 15:27:37 +02:00
|
|
|
}
|
|
|
|
return lang('LDAP dn="%1" with %2 entries deleted.',
|
|
|
|
$this->ldap_base,$this->rdelete($this->ldap_base));
|
|
|
|
}
|
2011-05-04 11:42:50 +02:00
|
|
|
|
2010-08-20 15:27:37 +02:00
|
|
|
/**
|
|
|
|
* Recursive delete a dn
|
2011-05-04 11:42:50 +02:00
|
|
|
*
|
2010-08-20 15:27:37 +02:00
|
|
|
* @param string $dn
|
|
|
|
* @return int integer number of deleted entries
|
|
|
|
* @throws egw_exception if dn not listable or delete fails
|
|
|
|
*/
|
|
|
|
private function rdelete($dn)
|
|
|
|
{
|
2010-08-20 16:18:21 +02:00
|
|
|
if (!($sr = ldap_list($this->test_ldap->ds,$dn,'ObjectClass=*',array(''))) ||
|
|
|
|
!($entries = ldap_get_entries($this->test_ldap->ds, $sr)))
|
2010-08-20 15:27:37 +02:00
|
|
|
{
|
2010-08-20 16:18:21 +02:00
|
|
|
throw new egw_exception(lang('Error listing "dn=%1"!',$dn));
|
2010-08-20 15:27:37 +02:00
|
|
|
}
|
2010-08-29 10:16:27 +02:00
|
|
|
$deleted = 0;
|
2010-08-20 15:27:37 +02:00
|
|
|
foreach($entries as $n => $entry)
|
|
|
|
{
|
2010-08-20 16:18:21 +02:00
|
|
|
if ($n === 'count') continue;
|
2010-08-29 10:16:27 +02:00
|
|
|
$deleted += $this->rdelete($entry['dn']);
|
2010-08-20 15:27:37 +02:00
|
|
|
}
|
|
|
|
if (!ldap_delete($this->test_ldap->ds,$dn))
|
|
|
|
{
|
2010-08-20 16:18:21 +02:00
|
|
|
throw new egw_exception(lang('Error deleting "dn=%1"!',$dn));
|
2010-08-20 15:27:37 +02:00
|
|
|
}
|
2010-08-29 10:16:27 +02:00
|
|
|
return ++$deleted;
|
2010-08-20 15:27:37 +02:00
|
|
|
}
|
|
|
|
|
2010-08-31 11:33:29 +02:00
|
|
|
/**
|
|
|
|
* Set mailbox attribute in $this->ldap_base according to given format
|
|
|
|
*
|
|
|
|
* Uses $this->ldap_host, $this->ldap_admin and $this->ldap_admin_pw to connect.
|
2011-05-04 11:42:50 +02:00
|
|
|
*
|
2010-08-31 11:33:29 +02:00
|
|
|
* @param string $this->object_class='qmailUser'
|
|
|
|
* @param string $this->mbox_attr='mailmessagestore' lowercase!!!
|
2010-08-31 12:13:28 +02:00
|
|
|
* @param string $this->mail_login_type='email' 'email', 'vmailmgr', 'standard' or 'uidNumber'
|
2010-08-31 11:33:29 +02:00
|
|
|
* @return string with success message N entries modified
|
|
|
|
* @throws egw_exception if dn not found, not listable or delete fails
|
|
|
|
*/
|
|
|
|
private function set_mailbox()
|
|
|
|
{
|
|
|
|
$this->connect($this->ldap_admin,$this->ldap_admin_pw);
|
2011-05-04 11:42:50 +02:00
|
|
|
|
2010-08-31 11:33:29 +02:00
|
|
|
// if base not set, use context minus one hierarchy, eg. ou=accounts,(o=domain,dc=local)
|
|
|
|
if (empty($this->ldap_base) && $this->ldap_context)
|
|
|
|
{
|
|
|
|
list(,$this->ldap_base) = explode(',',$this->ldap_context,2);
|
|
|
|
}
|
|
|
|
// check if base does exist
|
|
|
|
if (!@ldap_read($this->test_ldap->ds,$this->ldap_base,'objectClass=*'))
|
|
|
|
{
|
|
|
|
throw new egw_exception_wrong_userinput(lang('Base dn "%1" NOT found!',$this->ldap_base));
|
|
|
|
}
|
|
|
|
$object_class = $this->object_class ? $this->object_class : 'qmailUser';
|
|
|
|
$mbox_attr = $this->mbox_attr ? $this->mbox_attr : 'mailmessagestore';
|
2010-08-31 12:13:28 +02:00
|
|
|
$mail_login_type = $this->mail_login_type ? $this->mail_login_type : 'email';
|
2010-08-31 11:33:29 +02:00
|
|
|
|
|
|
|
if (!($sr = ldap_search($this->test_ldap->ds,$this->ldap_base,
|
|
|
|
'objectClass='.$object_class,array('mail','uidNumber','uid',$mbox_attr))) ||
|
|
|
|
!($entries = ldap_get_entries($this->test_ldap->ds, $sr)))
|
|
|
|
{
|
|
|
|
throw new egw_exception(lang('Error listing "dn=%1"!',$this->ldap_base));
|
|
|
|
}
|
|
|
|
$modified = 0;
|
|
|
|
foreach($entries as $n => $entry)
|
|
|
|
{
|
|
|
|
if ($n === 'count') continue;
|
|
|
|
|
2010-08-31 12:13:28 +02:00
|
|
|
$mbox = emailadmin_smtp_ldap::mailbox_addr(array(
|
|
|
|
'account_id' => $entry['uidnumber'][0],
|
|
|
|
'account_lid' => $entry['uid'][0],
|
|
|
|
'account_email' => $entry['mail'][0],
|
2010-08-31 12:26:43 +02:00
|
|
|
),$this->domain,$mail_login_type);
|
2010-08-31 12:13:28 +02:00
|
|
|
|
2010-08-31 11:33:29 +02:00
|
|
|
if ($mbox === $entry[$mbox_attr][0]) continue; // nothing to change
|
|
|
|
|
|
|
|
if (!$this->test && !ldap_modify($this->test_ldap->ds,$entry['dn'],array(
|
|
|
|
$mbox_attr => $mbox,
|
|
|
|
)))
|
|
|
|
{
|
|
|
|
throw new egw_exception(lang("Error modifying dn=%1: %2='%3'!",$dn,$mbox_attr,$mbox));
|
|
|
|
}
|
|
|
|
++$modified;
|
|
|
|
if ($this->test) echo "$modified: $entry[dn]: $mbox_attr={$entry[$mbox_attr][0]} --> $mbox\n";
|
|
|
|
}
|
|
|
|
return $this->test ? lang('%1 entries would have been modified.',$modified) :
|
|
|
|
lang('%1 entries modified.',$modified);
|
|
|
|
}
|
2011-05-04 11:42:50 +02:00
|
|
|
|
2007-12-09 09:03:15 +01:00
|
|
|
/**
|
|
|
|
* array with objectclasses for the objects we can create
|
|
|
|
*
|
|
|
|
* @var array of name => objectClass pairs (or array with multiple)
|
|
|
|
*/
|
|
|
|
static $requiredObjectclasses = array(
|
|
|
|
'o' => 'organization',
|
|
|
|
'ou' => 'organizationalUnit',
|
2010-08-18 11:14:30 +02:00
|
|
|
'cn' => array('organizationalRole','simpleSecurityObject'),
|
2011-05-04 11:42:50 +02:00
|
|
|
'uid' => array('uidObject','organizationalRole','simpleSecurityObject'),
|
2007-12-09 09:03:15 +01:00
|
|
|
'dc' => array('organization','dcObject'),
|
|
|
|
);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Create a new node in the ldap tree
|
|
|
|
*
|
|
|
|
* @param string $dn dn to create, eg. "cn=admin,dc=local"
|
|
|
|
* @param array $extra=array() extra attributes to set
|
|
|
|
* @return boolean true if the node was create, false if it was already there
|
|
|
|
* @throws egw_exception_wrong_userinput
|
|
|
|
*/
|
|
|
|
private function _create_node($dn,$extra=array())
|
|
|
|
{
|
2011-05-04 11:42:50 +02:00
|
|
|
//echo "<p>_create_node($dn,".array2string($extra).")</p>\n";
|
2007-12-09 09:03:15 +01:00
|
|
|
// check if the node already exists and return if it does
|
|
|
|
if (@ldap_read($this->test_ldap->ds,$dn,'objectClass=*'))
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
list($node,$base) = explode(',',$dn,2);
|
2009-12-05 18:42:18 +01:00
|
|
|
|
2007-12-09 09:03:15 +01:00
|
|
|
if (!@ldap_read($this->test_ldap->ds,$base,'objectClass=*'))
|
|
|
|
{
|
|
|
|
$this->_create_node($base); // create the base if it's not already there
|
|
|
|
}
|
|
|
|
// now we need to create the node itself
|
|
|
|
list($name,$value) = explode('=',$node);
|
2009-12-05 18:42:18 +01:00
|
|
|
|
2007-12-09 09:03:15 +01:00
|
|
|
if (!isset(self::$requiredObjectclasses[$name]))
|
|
|
|
{
|
|
|
|
throw new egw_exception_wrong_userinput(lang('Can not create DN %1!',$dn).' '.
|
|
|
|
lang('Supported node types:').implode(', ',array_keys(self::$requiredObjectclasses)));
|
|
|
|
}
|
|
|
|
if ($name == 'dc') $extra['o'] = $value; // required by organisation
|
2011-05-04 11:42:50 +02:00
|
|
|
if ($name == 'uid') $extra['cn'] = $value; // required by organizationalRole
|
2007-12-09 09:03:15 +01:00
|
|
|
|
|
|
|
if (!@ldap_add($this->test_ldap->ds,$dn,$attr = array(
|
|
|
|
$name => $value,
|
|
|
|
'objectClass' => self::$requiredObjectclasses[$name],
|
|
|
|
)+$extra))
|
|
|
|
{
|
|
|
|
throw new egw_exception_wrong_userinput(lang('Can not create DN %1!',$dn).
|
|
|
|
' ('.ldap_error($this->test_ldap->ds).', attributes='.print_r($attr,true).')');
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Return default database settings for a given domain
|
|
|
|
*
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
static function defaults()
|
|
|
|
{
|
|
|
|
return array(
|
|
|
|
'ldap_host' => 'localhost',
|
|
|
|
'ldap_suffix' => 'dc=local',
|
|
|
|
'ldap_admin' => 'cn=admin,$suffix',
|
|
|
|
'ldap_admin_pw' => '',
|
|
|
|
'ldap_base' => 'o=$domain,$suffix',
|
2007-12-11 02:28:07 +01:00
|
|
|
'ldap_root_dn' => 'cn=admin,$base',
|
|
|
|
'ldap_root_pw' => self::randomstring(),
|
2007-12-09 09:03:15 +01:00
|
|
|
'ldap_context' => 'ou=accounts,$base',
|
|
|
|
'ldap_search_filter' => '(uid=%user)',
|
2007-12-11 02:28:07 +01:00
|
|
|
'ldap_group_context' => 'ou=groups,$base',
|
2007-12-09 09:03:15 +01:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Merges the default into the current properties, if they are empty or contain placeholders
|
|
|
|
*/
|
|
|
|
private function _merge_defaults()
|
|
|
|
{
|
2007-12-11 02:28:07 +01:00
|
|
|
foreach(self::defaults() as $name => $default)
|
2007-12-09 09:03:15 +01:00
|
|
|
{
|
2010-08-20 16:18:21 +02:00
|
|
|
if ($this->sub_command == 'delete_ldap' && in_array($name,array('ldap_base','ldap_context')))
|
|
|
|
{
|
|
|
|
continue; // no default on what to delete!
|
|
|
|
}
|
2007-12-09 09:03:15 +01:00
|
|
|
if (!$this->$name)
|
|
|
|
{
|
|
|
|
//echo "<p>setting $name='{$this->$name}' to it's default='$default'</p>\n";
|
|
|
|
$this->set_defaults[$name] = $this->$name = $default;
|
|
|
|
}
|
|
|
|
if (strpos($this->$name,'$') !== false)
|
|
|
|
{
|
2010-08-25 14:24:11 +02:00
|
|
|
$this->set_defaults[$name] = $this->$name = str_replace(array(
|
2007-12-09 09:03:15 +01:00
|
|
|
'$domain',
|
|
|
|
'$suffix',
|
|
|
|
'$base',
|
2009-12-05 18:42:18 +01:00
|
|
|
'$admin_pw',
|
2007-12-09 09:03:15 +01:00
|
|
|
),array(
|
|
|
|
$this->domain,
|
|
|
|
$this->ldap_suffix,
|
|
|
|
$this->ldap_base,
|
2009-12-05 18:42:18 +01:00
|
|
|
$this->ldap_admin_pw,
|
2007-12-09 09:03:15 +01:00
|
|
|
),$this->$name);
|
|
|
|
}
|
2009-12-05 18:42:18 +01:00
|
|
|
}
|
2007-12-09 09:03:15 +01:00
|
|
|
}
|
|
|
|
}
|