2025-09-16 16:04:49 +00:00
|
|
|
<?php
|
|
|
|
|
|
2025-09-18 03:47:29 +00:00
|
|
|
use ProcessMaker\Model\RbacAuthenticationSource;
|
2025-09-22 22:29:47 +00:00
|
|
|
use ProcessMaker\Model\RbacUsers;
|
2025-10-07 02:22:03 +00:00
|
|
|
use ProcessMaker\Model\User;
|
2025-09-16 16:04:49 +00:00
|
|
|
use Illuminate\Support\Facades\Cache;
|
|
|
|
|
use Illuminate\Support\Facades\DB;
|
|
|
|
|
use Illuminate\Support\Facades\Log;
|
|
|
|
|
use ProcessMaker\Model\Department;
|
|
|
|
|
use ProcessMaker\Model\Groupwf;
|
2025-10-07 11:13:49 -04:00
|
|
|
use ProcessMaker\Model\GroupUser;
|
2025-10-07 02:22:03 +00:00
|
|
|
use ProcessMaker\BusinessModel\User as BusinessUser;
|
|
|
|
|
use \RbacUsers as RbacUsersModel;
|
|
|
|
|
use \Roles as RolesModel;
|
|
|
|
|
use \UsersRoles as UsersRolesModel;
|
2025-09-16 16:04:49 +00:00
|
|
|
|
|
|
|
|
class LdapSource
|
|
|
|
|
{
|
|
|
|
|
public $authSourceUid;
|
2025-10-07 02:22:03 +00:00
|
|
|
public $sTerminatedOu = '';
|
2025-09-18 03:47:29 +00:00
|
|
|
public $ldapcnn = null;
|
2025-10-07 02:22:03 +00:00
|
|
|
public $debug = false;
|
|
|
|
|
private $frontEnd = false;
|
2025-09-18 03:47:29 +00:00
|
|
|
public $terminatedOu;
|
2025-10-07 02:22:03 +00:00
|
|
|
public $allListOfUsers = [];
|
2025-09-22 22:29:47 +00:00
|
|
|
private $arrayDepartmentUserSynchronizedChecked = [];
|
2025-10-07 02:22:03 +00:00
|
|
|
public $arrayAuthenticationSourceUsersByUid = [];
|
|
|
|
|
public $arrayAuthenticationSourceUsersByUsername = [];
|
|
|
|
|
public $arrayDepartmentUsersByUid = [];
|
|
|
|
|
public $arrayDepartmentUsersByUsername = [];
|
|
|
|
|
public $arrayGroupUsersByUid = [];
|
|
|
|
|
public $arrayGroupUsersByUsername = [];
|
|
|
|
|
private $arrayUserUpdateChecked = [];
|
2025-09-16 16:04:49 +00:00
|
|
|
|
|
|
|
|
private $arrayObjectClassFilter = [
|
|
|
|
|
"user" => "|(objectclass=inetorgperson)(objectclass=organizationalperson)(objectclass=person)(objectclass=user)",
|
|
|
|
|
"group" => "|(objectclass=posixgroup)(objectclass=group)(objectclass=groupofuniquenames)",
|
|
|
|
|
"department" => "|(objectclass=organizationalunit)"
|
|
|
|
|
];
|
|
|
|
|
private $arrayAttributes = [
|
|
|
|
|
"ldap" => ["uid" => "uid", "member" => "memberuid"], //OpenLDAP
|
|
|
|
|
"ad" => ["uid" => "samaccountname", "member" => "member"], //Active Directory
|
|
|
|
|
"ds" => ["uid" => "uid", "member" => "uniquemember"] //389 DS
|
|
|
|
|
];
|
|
|
|
|
|
|
|
|
|
private $arrayAttributesForUser = ["dn", "uid", "samaccountname", "givenname", "sn", "cn", "mail", "userprincipalname", "useraccountcontrol", "accountexpires", "manager"];
|
|
|
|
|
|
2025-09-19 02:54:53 +00:00
|
|
|
public function __destruct() {
|
|
|
|
|
if ($this->ldapcnn) {
|
|
|
|
|
@ldap_close($this->ldapcnn);
|
|
|
|
|
}
|
|
|
|
|
}
|
2025-09-16 16:04:49 +00:00
|
|
|
|
2025-09-19 02:54:53 +00:00
|
|
|
public function ldapConnection($authSourceData) {
|
2025-09-16 16:04:49 +00:00
|
|
|
// Removing sensitive data
|
|
|
|
|
$loggableAuthSource = $authSourceData;
|
|
|
|
|
unset($loggableAuthSource['AUTH_SOURCE_PASSWORD']);
|
|
|
|
|
|
|
|
|
|
$ldapcnn = ldap_connect($authSourceData['AUTH_SOURCE_SERVER_NAME'], $authSourceData['AUTH_SOURCE_PORT']);
|
|
|
|
|
$this->stdLog($ldapcnn, 'ldap_connect', $loggableAuthSource);
|
|
|
|
|
$ldapServer = $authSourceData['AUTH_SOURCE_SERVER_NAME'] . ':' . $authSourceData['AUTH_SOURCE_PORT'];
|
|
|
|
|
|
|
|
|
|
ldap_set_option($ldapcnn, LDAP_OPT_PROTOCOL_VERSION, 3);
|
|
|
|
|
$this->stdLog($ldapcnn, 'ldap_set_option', $loggableAuthSource);
|
|
|
|
|
ldap_set_option($ldapcnn, LDAP_OPT_REFERRALS, 0);
|
|
|
|
|
$this->stdLog($ldapcnn, 'ldap_set_option', $loggableAuthSource);
|
|
|
|
|
|
|
|
|
|
$resultLDAPStartTLS = true;
|
|
|
|
|
if (isset($authSourceData['AUTH_SOURCE_ENABLED_TLS']) && $authSourceData['AUTH_SOURCE_ENABLED_TLS']) {
|
2025-09-26 21:56:16 +00:00
|
|
|
ldap_set_option($ldapcnn, LDAP_OPT_X_TLS_REQUIRE_CERT, LDAP_OPT_X_TLS_ALLOW);
|
2025-09-16 16:04:49 +00:00
|
|
|
$resultLDAPStartTLS = @ldap_start_tls($ldapcnn);
|
|
|
|
|
$this->stdLog($ldapcnn, 'ldap_start_tls', $loggableAuthSource);
|
|
|
|
|
$ldapServer = 'TLS ' . $ldapServer;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ($authSourceData['AUTH_ANONYMOUS'] == '1') {
|
|
|
|
|
$bBind = ldap_bind($ldapcnn);
|
2025-09-26 21:56:16 +00:00
|
|
|
$this->log($ldapcnn, 'bind ' . $ldapServer . ' like anonymous user');
|
2025-09-16 16:04:49 +00:00
|
|
|
} else {
|
|
|
|
|
$bBind = ldap_bind($ldapcnn, $authSourceData['AUTH_SOURCE_SEARCH_USER'], $authSourceData['AUTH_SOURCE_PASSWORD']);
|
2025-09-26 21:56:16 +00:00
|
|
|
$this->log($ldapcnn, 'bind ' . $ldapServer . ' with user ' . $loggableAuthSource['AUTH_SOURCE_SEARCH_USER']);
|
2025-09-16 16:04:49 +00:00
|
|
|
}
|
2025-10-07 02:22:03 +00:00
|
|
|
|
2025-09-16 16:04:49 +00:00
|
|
|
$this->stdLog($ldapcnn, 'ldap_bind', $loggableAuthSource);
|
2025-10-07 02:22:03 +00:00
|
|
|
|
2025-09-16 16:04:49 +00:00
|
|
|
$this->getDiagnosticMessage($ldapcnn);
|
|
|
|
|
if (!$bBind) {
|
|
|
|
|
$message = 'Unable to bind to server: ' . $ldapServer . 'LDAP-Errno: ' . ldap_errno($ldapcnn) . ' : ' . ldap_error($ldapcnn) . " \n";
|
|
|
|
|
throw new Exception($message);
|
|
|
|
|
}
|
2025-09-19 02:54:53 +00:00
|
|
|
$this->ldapcnn = $ldapcnn;
|
2025-09-16 16:04:49 +00:00
|
|
|
return ['connection' =>$ldapcnn, 'startTLS' => $resultLDAPStartTLS];
|
|
|
|
|
}
|
|
|
|
|
|
2025-09-18 03:47:29 +00:00
|
|
|
public function searchGroups() {
|
|
|
|
|
try {
|
|
|
|
|
$arrayGroup = [];
|
|
|
|
|
|
2025-09-19 02:54:53 +00:00
|
|
|
$filters = ['conditions' => ['AUTH_SOURCE_UID'=> $this->authSourceUid]];
|
|
|
|
|
$rbacAuthenticationSource = new RbacAuthenticationSource();
|
|
|
|
|
$authSourceReturn = $rbacAuthenticationSource->show($filters);
|
|
|
|
|
$authenticationSourceData = $authSourceReturn['data'][0];
|
|
|
|
|
$authenticationSourceData['AUTH_SOURCE_DATA'] = json_decode($authenticationSourceData['AUTH_SOURCE_DATA'], true);
|
|
|
|
|
$authenticationSourceData['AUTH_SOURCE_PASSWORD'] = G::decrypt($authenticationSourceData['AUTH_SOURCE_PASSWORD'], URL_KEY);
|
2025-09-18 03:47:29 +00:00
|
|
|
|
|
|
|
|
if (is_null($this->ldapcnn)) {
|
2025-09-19 02:54:53 +00:00
|
|
|
$ldapcnn = $this->ldapConnection($authenticationSourceData);
|
2025-09-18 03:47:29 +00:00
|
|
|
$this->ldapcnn = $ldapcnn['connection'];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$ldapcnn = $this->ldapcnn;
|
|
|
|
|
// Get Groups
|
2025-09-19 02:54:53 +00:00
|
|
|
$limit = $this->getPageSizeLimitByData($authenticationSourceData);
|
2025-09-18 03:47:29 +00:00
|
|
|
$flagError = false;
|
|
|
|
|
$filter = '(' . $this->arrayObjectClassFilter['group'] . ')';
|
|
|
|
|
$this->log($ldapcnn, 'search groups with Filter: ' . $filter);
|
|
|
|
|
|
|
|
|
|
$cookie = '';
|
|
|
|
|
do {
|
|
|
|
|
$searchResult = @ldap_search(
|
|
|
|
|
$ldapcnn,
|
2025-09-19 02:54:53 +00:00
|
|
|
$authenticationSourceData['AUTH_SOURCE_BASE_DN'],
|
2025-09-18 03:47:29 +00:00
|
|
|
$filter,
|
|
|
|
|
['dn', 'cn'],
|
|
|
|
|
0,
|
|
|
|
|
-1,
|
|
|
|
|
-1,
|
|
|
|
|
LDAP_DEREF_NEVER,
|
|
|
|
|
[['oid' => LDAP_CONTROL_PAGEDRESULTS, 'value' => ['size' => $limit, 'cookie' => $cookie]]]
|
|
|
|
|
);
|
|
|
|
|
ldap_parse_result($ldapcnn, $searchResult, $errcode, $matcheddn, $errmsg, $referrals, $controls);
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_search", ["filter" => $filter, "attributes" => ['dn', 'cn']]);
|
|
|
|
|
|
|
|
|
|
$context = [
|
2025-09-19 02:54:53 +00:00
|
|
|
"baseDN" => $authenticationSourceData['AUTH_SOURCE_BASE_DN'],
|
2025-09-18 03:47:29 +00:00
|
|
|
"filter" => $filter,
|
|
|
|
|
"attributes" => ['dn', 'cn']
|
|
|
|
|
];
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_search", $context);
|
|
|
|
|
|
|
|
|
|
if ($error = ldap_errno($ldapcnn)) {
|
|
|
|
|
$this->log($ldapcnn, 'Error in Search');
|
|
|
|
|
|
|
|
|
|
$flagError = true;
|
|
|
|
|
} else {
|
|
|
|
|
if ($searchResult) {
|
|
|
|
|
//Get groups from the ldap entries
|
|
|
|
|
$countEntries = ldap_count_entries($ldapcnn, $searchResult);
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_count_entries");
|
|
|
|
|
|
|
|
|
|
if ($countEntries > 0) {
|
|
|
|
|
$entry = ldap_first_entry($ldapcnn, $searchResult);
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_first_entry");
|
|
|
|
|
|
|
|
|
|
do {
|
|
|
|
|
$arrayEntryData = $this->ldapGetAttributes($ldapcnn, $entry);
|
|
|
|
|
|
|
|
|
|
if (isset($arrayEntryData['cn']) && !is_array($arrayEntryData['cn'])) {
|
|
|
|
|
$arrayGroup[] = [
|
|
|
|
|
'dn' => $arrayEntryData['dn'],
|
|
|
|
|
'cn' => trim($arrayEntryData['cn']),
|
|
|
|
|
'users' => 0,
|
|
|
|
|
];
|
|
|
|
|
}
|
|
|
|
|
} while ($entry = ldap_next_entry($ldapcnn, $entry));
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!$flagError) {
|
|
|
|
|
if (isset($controls[LDAP_CONTROL_PAGEDRESULTS]['value']['cookie'])) {
|
|
|
|
|
// You need to pass the cookie from the last call to the next one
|
|
|
|
|
$cookie = $controls[LDAP_CONTROL_PAGEDRESULTS]['value']['cookie'];
|
|
|
|
|
} else {
|
|
|
|
|
$cookie = '';
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
// Empty cookie means last page
|
|
|
|
|
} while (!empty($cookie) && !$flagError);
|
|
|
|
|
|
|
|
|
|
$str = '';
|
|
|
|
|
|
|
|
|
|
foreach ($arrayGroup as $group) {
|
|
|
|
|
$str .= ' ' . $group['cn'];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$this->log($ldapcnn, 'found ' . count($arrayGroup) . ' groups: ' . $str);
|
|
|
|
|
return $arrayGroup;
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function searchDepartments() {
|
|
|
|
|
try {
|
|
|
|
|
$arrayDepartment = [];
|
|
|
|
|
|
|
|
|
|
$filters = ['conditions' => ['AUTH_SOURCE_UID'=> $this->authSourceUid]];
|
|
|
|
|
$rbacAuthenticationSource = new RbacAuthenticationSource();
|
|
|
|
|
$authSourceReturn = $rbacAuthenticationSource->show($filters);
|
|
|
|
|
$authenticationSourceData = $authSourceReturn['data'][0];
|
2025-10-07 02:22:03 +00:00
|
|
|
|
2025-09-19 02:54:53 +00:00
|
|
|
$authenticationSourceData['AUTH_SOURCE_DATA'] = json_decode($authenticationSourceData['AUTH_SOURCE_DATA'], true);
|
|
|
|
|
$authenticationSourceData['AUTH_SOURCE_PASSWORD'] = G::decrypt($authenticationSourceData['AUTH_SOURCE_PASSWORD'], URL_KEY);
|
2025-09-18 03:47:29 +00:00
|
|
|
|
|
|
|
|
if (is_null($this->ldapcnn)) {
|
|
|
|
|
$ldapcnn = $this->ldapConnection($authenticationSourceData);
|
|
|
|
|
$this->ldapcnn = $ldapcnn['connection'];
|
|
|
|
|
}
|
2025-10-07 02:22:03 +00:00
|
|
|
|
2025-09-18 03:47:29 +00:00
|
|
|
$this->terminatedOu = $attributes['AUTH_SOURCE_RETIRED_OU'] ?? '';
|
|
|
|
|
$ldapcnn = $this->ldapcnn;
|
|
|
|
|
|
|
|
|
|
//Get Departments
|
|
|
|
|
$limit = $this->getPageSizeLimitByData($authenticationSourceData);
|
|
|
|
|
$flagError = false;
|
|
|
|
|
$filter = '(' . $this->arrayObjectClassFilter['department'] . ')';
|
|
|
|
|
$this->log($ldapcnn, 'search Departments with Filter: ' . $filter);
|
|
|
|
|
$unitsBase = $this->custom_ldap_explode_dn($authenticationSourceData['AUTH_SOURCE_BASE_DN']);
|
|
|
|
|
|
|
|
|
|
$cookie = '';
|
|
|
|
|
do {
|
|
|
|
|
$searchResult = @ldap_search(
|
|
|
|
|
$ldapcnn,
|
|
|
|
|
$authenticationSourceData['AUTH_SOURCE_BASE_DN'],
|
|
|
|
|
$filter,
|
|
|
|
|
['dn', 'ou'],
|
|
|
|
|
0,
|
|
|
|
|
-1,
|
|
|
|
|
-1,
|
|
|
|
|
LDAP_DEREF_NEVER,
|
|
|
|
|
[['oid' => LDAP_CONTROL_PAGEDRESULTS, 'value' => ['size' => $limit, 'cookie' => $cookie]]]
|
|
|
|
|
);
|
|
|
|
|
ldap_parse_result($ldapcnn, $searchResult, $errcode, $matcheddn, $errmsg, $referrals, $controls);
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_search", ["filter" => $filter, "attributes" => ['dn', 'ou']]);
|
|
|
|
|
|
|
|
|
|
$context = [
|
|
|
|
|
"baseDN" => $authenticationSourceData['AUTH_SOURCE_BASE_DN'],
|
|
|
|
|
"filter" => $filter,
|
|
|
|
|
"attributes" => ['dn', 'ou']
|
|
|
|
|
];
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_search", $context);
|
|
|
|
|
|
|
|
|
|
if ($error = ldap_errno($ldapcnn)) {
|
|
|
|
|
$this->log($ldapcnn, 'Error in Search');
|
|
|
|
|
|
|
|
|
|
$flagError = true;
|
|
|
|
|
} else {
|
|
|
|
|
if ($searchResult) {
|
|
|
|
|
//The first node is root
|
|
|
|
|
if (empty($arrayDepartment)) {
|
|
|
|
|
$arrayDepartment[] = [
|
|
|
|
|
'dn' => $authenticationSourceData['AUTH_SOURCE_BASE_DN'],
|
|
|
|
|
'parent' => '',
|
|
|
|
|
'ou' => 'ROOT',
|
|
|
|
|
'users' => 0
|
|
|
|
|
];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//Get departments from the ldap entries
|
|
|
|
|
if (ldap_count_entries($ldapcnn, $searchResult) > 0) {
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_count_entries");
|
|
|
|
|
$entry = ldap_first_entry($ldapcnn, $searchResult);
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_first_entry", $context);
|
|
|
|
|
|
|
|
|
|
do {
|
|
|
|
|
$arrayEntryData = $this->ldapGetAttributes($ldapcnn, $entry);
|
|
|
|
|
$unitsEqual = $this->custom_ldap_explode_dn($arrayEntryData['dn']);
|
|
|
|
|
|
|
|
|
|
if (count($unitsEqual) == 1 && $unitsEqual[0] == '') {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (count($unitsEqual) > count($unitsBase)) {
|
|
|
|
|
unset($unitsEqual[0]);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (isset($arrayEntryData['ou']) && !is_array($arrayEntryData['ou'])) {
|
|
|
|
|
$arrayDepartment[] = [
|
|
|
|
|
'dn' => $arrayEntryData['dn'],
|
|
|
|
|
'parent' => (isset($unitsEqual[1])) ? implode(',', $unitsEqual) : '',
|
|
|
|
|
'ou' => trim($arrayEntryData['ou']),
|
|
|
|
|
'users' => 0
|
|
|
|
|
];
|
|
|
|
|
}
|
|
|
|
|
} while ($entry = ldap_next_entry($ldapcnn, $entry));
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!$flagError) {
|
|
|
|
|
if (isset($controls[LDAP_CONTROL_PAGEDRESULTS]['value']['cookie'])) {
|
|
|
|
|
// You need to pass the cookie from the last call to the next one
|
|
|
|
|
$cookie = $controls[LDAP_CONTROL_PAGEDRESULTS]['value']['cookie'];
|
|
|
|
|
} else {
|
|
|
|
|
$cookie = '';
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
// Empty cookie means last page
|
|
|
|
|
} while (!empty($cookie) && !$flagError);
|
|
|
|
|
|
|
|
|
|
$str = '';
|
|
|
|
|
|
|
|
|
|
foreach ($arrayDepartment as $dep) {
|
|
|
|
|
$str .= ' ' . $dep['ou'];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$this->log($ldapcnn, 'found ' . count($arrayDepartment) . ' departments: ' . $str);
|
|
|
|
|
return $arrayDepartment;
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2025-09-16 16:04:49 +00:00
|
|
|
public function getPageSizeLimit($ldapcnn, $baseDn = '')
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$limit = 1000;
|
|
|
|
|
|
|
|
|
|
if ($ldapcnn === false) {
|
|
|
|
|
return $limit;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$searchResult = @ldap_search($ldapcnn, $baseDn, '(|(objectclass=*))', ['dn']);
|
|
|
|
|
$context = [
|
|
|
|
|
'baseDN' => $baseDn,
|
|
|
|
|
'filter' => '(|(objectclass=*))',
|
|
|
|
|
'attributes' => ['dn']
|
|
|
|
|
];
|
|
|
|
|
$this->stdLog($ldapcnn, 'ldap_search', $context);
|
|
|
|
|
|
|
|
|
|
if ($searchResult) {
|
|
|
|
|
$countEntries = ldap_count_entries($ldapcnn, $searchResult);
|
|
|
|
|
$this->stdLog($ldapcnn, 'ldap_count_entries');
|
|
|
|
|
|
|
|
|
|
if ($countEntries > 0) {
|
|
|
|
|
$limit = ($countEntries > $limit) ? $limit : $countEntries;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $limit;
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private function getDiagnosticMessage($linkIdentifier)
|
|
|
|
|
{
|
|
|
|
|
//specific message
|
|
|
|
|
$keysError = [
|
|
|
|
|
[
|
|
|
|
|
'key' => 'USER_NOT_FOUND',
|
|
|
|
|
'code' => 525,
|
|
|
|
|
'message' => G::LoadTranslation('ID_LDAP_USER_NOT_FOUND_INVALID'),
|
|
|
|
|
], [
|
|
|
|
|
'key' => 'NOT_PERMITTED_TO_LOGON_AT_THIS_TIME',
|
|
|
|
|
'code' => 530,
|
|
|
|
|
'message' => G::LoadTranslation('ID_LDAP_NOT_PERMITTED_TO_LOGON_AT_THIS_TIME'),
|
|
|
|
|
], [
|
|
|
|
|
'key' => 'RESTRICTED_TO_SPECIFIC_MACHINES',
|
|
|
|
|
'code' => 531,
|
|
|
|
|
'message' => G::LoadTranslation('ID_LDAP_RESTRICTED_TO_SPECIFIC_MACHINES'),
|
|
|
|
|
], [
|
|
|
|
|
'key' => 'PASSWORD_EXPIRED',
|
|
|
|
|
'code' => 532,
|
|
|
|
|
'message' => G::LoadTranslation('ID_LDAP_PASSWORD_EXPIRED'),
|
|
|
|
|
], [
|
|
|
|
|
'key' => 'ACCOUNT_DISABLED',
|
|
|
|
|
'code' => 533,
|
|
|
|
|
'message' => G::LoadTranslation('ID_LDAP_ACCOUNT_DISABLED'),
|
|
|
|
|
], [
|
|
|
|
|
'key' => 'ACCOUNT_EXPIRED',
|
|
|
|
|
'code' => 701,
|
|
|
|
|
'message' => G::LoadTranslation('ID_LDAP_ACCOUNT_EXPIRED'),
|
|
|
|
|
], [
|
|
|
|
|
'key' => 'USER_MUST_RESET_PASSWORD',
|
|
|
|
|
'code' => 773,
|
|
|
|
|
'message' => G::LoadTranslation('ID_LDAP_USER_MUST_RESET_PASSWORD'),
|
|
|
|
|
]
|
|
|
|
|
];
|
|
|
|
|
$message = '';
|
|
|
|
|
ldap_get_option($linkIdentifier, LDAP_OPT_DIAGNOSTIC_MESSAGE, $messageError);
|
|
|
|
|
$this->stdLog($linkIdentifier, 'ldap_get_option', ['error' => $messageError]);
|
|
|
|
|
foreach ($keysError as $key => $value) {
|
|
|
|
|
if (strpos($messageError, (string) $value['code']) !== false) {
|
|
|
|
|
$message = $value['message'];
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
//standard message
|
|
|
|
|
if (empty($message)) {
|
|
|
|
|
$errorNumber = ldap_errno($linkIdentifier);
|
|
|
|
|
$message = ldap_err2str($errorNumber) . '.';
|
|
|
|
|
}
|
|
|
|
|
if (empty($message)) {
|
|
|
|
|
$message = G::LoadTranslation('ID_LDAP_ERROR_CONNECTION');
|
|
|
|
|
}
|
|
|
|
|
Cache::put('ldapMessageError', $message, 120); //laravel 8.x the time parameter is in seconds.
|
|
|
|
|
$this->log($linkIdentifier, $messageError);
|
|
|
|
|
}
|
|
|
|
|
|
2025-10-07 02:22:03 +00:00
|
|
|
public function log($link, $text)
|
2025-09-16 16:04:49 +00:00
|
|
|
{
|
|
|
|
|
$logFile = PATH_DATA . 'logs/ldap.log';
|
|
|
|
|
|
|
|
|
|
if (!file_exists($logFile)) {
|
|
|
|
|
file_put_contents($logFile, "Start\n");
|
|
|
|
|
@chmod($logFile, 0644);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!is_writable($logFile)) {
|
|
|
|
|
error_log('Log file is not writable: ' . $logFile);
|
|
|
|
|
throw new Exception('Log file is not writable: ' . $logFile);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$fpt = fopen($logFile, 'a');
|
|
|
|
|
$ldapErrorMsg = '';
|
|
|
|
|
$ldapErrorNr = 0;
|
|
|
|
|
|
|
|
|
|
if ($link != null) {
|
|
|
|
|
$ldapErrorNr = ldap_errno($link);
|
|
|
|
|
|
|
|
|
|
if ($ldapErrorNr != 0) {
|
|
|
|
|
$ldapErrorMsg = ldap_error($link);
|
|
|
|
|
$text = $ldapErrorMsg . ' : ' . $text;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Log format: date hour ipaddress workspace ldapErrorNr
|
|
|
|
|
fwrite($fpt, sprintf("%s %s %s %s %s \n", date('Y-m-d H:i:s'), getenv('REMOTE_ADDR'), config('system.workspace'), $ldapErrorNr, $text));
|
|
|
|
|
fclose($fpt);
|
|
|
|
|
}
|
|
|
|
|
|
2025-10-07 02:22:03 +00:00
|
|
|
public function stdLog($link, $message = "", $context = [], $level = "info")
|
2025-09-16 16:04:49 +00:00
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
if (empty($link)) {
|
|
|
|
|
switch ($level) {
|
|
|
|
|
case "error":
|
|
|
|
|
Log::channel(':ldapAdvanced')->error($message, Bootstrap::context($context));
|
|
|
|
|
break;
|
|
|
|
|
case "info":
|
|
|
|
|
default:
|
|
|
|
|
Log::channel(':ldapAdvanced')->info($message, Bootstrap::context($context));
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
$code = ldap_errno($link);
|
|
|
|
|
$detail = ldap_err2str($code);
|
|
|
|
|
$context["detail"] = $detail;
|
|
|
|
|
if ($code === 0) {
|
|
|
|
|
Log::channel(':ldapAdvanced')->info($message, Bootstrap::context($context));
|
|
|
|
|
} else {
|
|
|
|
|
Log::channel(':ldapAdvanced')->error($message, Bootstrap::context($context));
|
|
|
|
|
}
|
|
|
|
|
} catch (Exception $exception) {
|
|
|
|
|
return ['success' => false, 'message' => $exception->getMessage()];
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
public function searchUsersLdap($keyword, $start = null, $limit = null) {
|
|
|
|
|
$arrayUser = [];
|
|
|
|
|
$totalUser = 0;
|
|
|
|
|
$countUser = 0;
|
|
|
|
|
|
|
|
|
|
$paged = !is_null($start) && !is_null($limit);
|
|
|
|
|
|
2025-09-18 03:47:29 +00:00
|
|
|
$filters = [
|
|
|
|
|
'conditions' => ['AUTH_SOURCE_UID' => $this->authSourceUid],
|
|
|
|
|
];
|
|
|
|
|
$rbacAuthenticationSource = new RbacAuthenticationSource();
|
|
|
|
|
$authSourceReturn = $rbacAuthenticationSource->show($filters);
|
|
|
|
|
$arrayAuthenticationSourceData = $authSourceReturn['data'][0];
|
|
|
|
|
$arrayAuthenticationSourceData['AUTH_SOURCE_DATA'] = json_decode($arrayAuthenticationSourceData['AUTH_SOURCE_DATA'], true);
|
2025-09-19 02:54:53 +00:00
|
|
|
$arrayAuthenticationSourceData['AUTH_SOURCE_PASSWORD'] = G::decrypt($arrayAuthenticationSourceData['AUTH_SOURCE_PASSWORD'], URL_KEY);
|
2025-09-16 16:04:49 +00:00
|
|
|
|
|
|
|
|
$attributeUserSet = [];
|
|
|
|
|
$attributeSetAdd = [];
|
|
|
|
|
|
|
|
|
|
if (
|
|
|
|
|
isset($arrayAuthenticationSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_GRID_ATTRIBUTE']) && !empty($arrayAuthenticationSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_GRID_ATTRIBUTE'])
|
|
|
|
|
) {
|
|
|
|
|
foreach ($arrayAuthenticationSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_GRID_ATTRIBUTE'] as $value) {
|
|
|
|
|
$attributeSetAdd[] = $value['attributeLdap'];
|
|
|
|
|
$attributeUserSet[$value['attributeUser']] = $value['attributeLdap'];
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$ldapcnn = $this->ldapConnection($arrayAuthenticationSourceData);
|
|
|
|
|
$ldapcnn = $ldapcnn['connection'];
|
|
|
|
|
|
|
|
|
|
//Get Users
|
|
|
|
|
if (!isset($arrayAuthenticationSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_USERS_FILTER'])) {
|
|
|
|
|
$arrayAuthenticationSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_USERS_FILTER'] = '';
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$uidUserIdentifier = (isset($arrayAuthenticationSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_IDENTIFIER_FOR_USER'])) ? $arrayAuthenticationSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_IDENTIFIER_FOR_USER'] : 'uid';
|
|
|
|
|
$filterUsers = trim($arrayAuthenticationSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_USERS_FILTER']);
|
|
|
|
|
$filter = ($filterUsers != '') ? $filterUsers : '(' . $this->arrayObjectClassFilter['user'] . ')';
|
2025-10-02 11:16:08 -04:00
|
|
|
$filtersDefault = "(|(dn=$keyword)(uid=$keyword)(samaccountname=$keyword)(givenname=$keyword)(sn=$keyword)(cn=$keyword)(mail=$keyword)(userprincipalname=$keyword))";
|
|
|
|
|
$filter = '(&' . $filter . $filtersDefault . ')';
|
2025-09-16 16:04:49 +00:00
|
|
|
$oSearch = @ldap_search($ldapcnn, $arrayAuthenticationSourceData['AUTH_SOURCE_BASE_DN'], $filter, array_merge($this->arrayAttributesForUser, $attributeSetAdd));
|
|
|
|
|
$context = [
|
|
|
|
|
'baseDN' => $arrayAuthenticationSourceData['AUTH_SOURCE_BASE_DN'],
|
|
|
|
|
'filter' => $filter,
|
|
|
|
|
'attribute' => array_merge($this->arrayAttributesForUser, $attributeSetAdd)
|
|
|
|
|
];
|
|
|
|
|
$this->stdLog($ldapcnn, 'ldap_search', $context);
|
|
|
|
|
|
|
|
|
|
if ($oError = ldap_errno($ldapcnn)) {
|
|
|
|
|
$this->log($ldapcnn, 'Error in Search users');
|
|
|
|
|
} else {
|
|
|
|
|
if ($oSearch) {
|
|
|
|
|
$entries = ldap_count_entries($ldapcnn, $oSearch);
|
|
|
|
|
$this->stdLog($ldapcnn, 'ldap_count_entries');
|
|
|
|
|
$totalUser = $entries;
|
|
|
|
|
|
|
|
|
|
if ($entries > 0) {
|
|
|
|
|
$oEntry = ldap_first_entry($ldapcnn, $oSearch);
|
|
|
|
|
$this->stdLog($ldapcnn, 'ldap_first_entry');
|
|
|
|
|
$countEntries = 0;
|
|
|
|
|
$flagNextRecord = true;
|
|
|
|
|
|
|
|
|
|
do {
|
|
|
|
|
$aAttr = $this->ldapGetAttributes($ldapcnn, $oEntry);
|
|
|
|
|
$sUsername = (isset($aAttr[$uidUserIdentifier])) ? $aAttr[$uidUserIdentifier] : '';
|
|
|
|
|
|
|
|
|
|
if ((is_array($sUsername) && !empty($sUsername)) || trim($sUsername) != '') {
|
|
|
|
|
$countUser++;
|
|
|
|
|
$userCountControl = '';
|
|
|
|
|
//Active Directory, openLdap
|
|
|
|
|
if (isset($aAttr['useraccountcontrol'])) {
|
|
|
|
|
switch ($aAttr['useraccountcontrol']) {
|
|
|
|
|
case '512':
|
|
|
|
|
case '544':
|
|
|
|
|
case '66048':
|
|
|
|
|
case '66080':
|
|
|
|
|
$userCountControl = 'ACTIVE';
|
|
|
|
|
break;
|
|
|
|
|
case '514':
|
|
|
|
|
case '546':
|
|
|
|
|
case '66050':
|
|
|
|
|
case '66082':
|
|
|
|
|
case '2':
|
|
|
|
|
case '16':
|
|
|
|
|
case '8388608':
|
|
|
|
|
default:
|
|
|
|
|
$userCountControl = 'INACTIVE';
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
//apache ldap
|
|
|
|
|
if (isset($aAttr['status'])) {
|
|
|
|
|
$userCountControl = strtoupper($aAttr['status']);
|
|
|
|
|
}
|
|
|
|
|
$aUserAttributes = [];
|
|
|
|
|
foreach ($attributeUserSet as $key => $value) {
|
|
|
|
|
if ($key == 'USR_STATUS') {
|
|
|
|
|
$aUserAttributes[$key] = ($userCountControl != '') ? $userCountControl : 'ACTIVE';
|
|
|
|
|
} elseif (isset($aAttr[$value])) {
|
|
|
|
|
$aUserAttributes[$key] = $aAttr[$value];
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ($paged) {
|
|
|
|
|
if ($countUser - 1 <= $start + $limit - 1) {
|
|
|
|
|
if ($start <= $countUser - 1) {
|
|
|
|
|
$arrayUser[] = array_merge($this->getUserDataFromAttribute($sUsername, $aAttr), $aUserAttributes);
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
$flagNextRecord = false;
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
$arrayUser[] = array_merge($this->getUserDataFromAttribute($sUsername, $aAttr), $aUserAttributes);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$countEntries++;
|
|
|
|
|
}
|
|
|
|
|
} while (($oEntry = ldap_next_entry($ldapcnn, $oEntry)) && $flagNextRecord);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2025-10-02 11:16:08 -04:00
|
|
|
$response = [
|
|
|
|
|
'numRecTotal' => $totalUser,
|
|
|
|
|
'data' => $arrayUser,
|
|
|
|
|
'context' => $context
|
|
|
|
|
];
|
|
|
|
|
return $response;
|
2025-09-16 16:04:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private function getUserDataFromAttribute($username, array $arrayAttributes)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$keyMail = (isset($arrayAttributes['mail'])) ? 'mail' : ((isset($arrayAttributes['userprincipalname'])) ? 'userprincipalname' : 'nomail');
|
|
|
|
|
|
|
|
|
|
return [
|
|
|
|
|
'sUsername' => trim((is_array($username)) ? $username[0] : $username),
|
|
|
|
|
'sPassword' => trim((isset($arrayAttributes['userpassword'])) ? ((is_array($arrayAttributes['userpassword'])) ? $arrayAttributes['userpassword'][0] : $arrayAttributes['userpassword']) : ''),
|
|
|
|
|
'sFullname' => trim((isset($arrayAttributes['cn'])) ? ((is_array($arrayAttributes['cn'])) ? $arrayAttributes['cn'][0] : $arrayAttributes['cn']) : ''),
|
|
|
|
|
'sFirstname' => trim((isset($arrayAttributes['givenname'])) ? ((is_array($arrayAttributes['givenname'])) ? $arrayAttributes['givenname'][0] : $arrayAttributes['givenname']) : ''),
|
|
|
|
|
'sLastname' => trim((isset($arrayAttributes['sn'])) ? ((is_array($arrayAttributes['sn'])) ? $arrayAttributes['sn'][0] : $arrayAttributes['sn']) : ''),
|
|
|
|
|
'sEmail' => trim((isset($arrayAttributes[$keyMail])) ? ((is_array($arrayAttributes[$keyMail])) ? $arrayAttributes[$keyMail][0] : $arrayAttributes[$keyMail]) : ''),
|
|
|
|
|
'sDN' => trim($arrayAttributes['dn']),
|
2025-10-02 11:16:08 -04:00
|
|
|
'sManagerDN' => trim((isset($arrayAttributes['manager'])) ? ((is_array($arrayAttributes['manager'])) ? $arrayAttributes['manager'][0] : $arrayAttributes['manager']) : ''),
|
|
|
|
|
// TODO REMOVE THIS LAST INDEX, ONLY FOR REVIEW
|
|
|
|
|
'allAttributes' => (array)$arrayAttributes
|
2025-09-16 16:04:49 +00:00
|
|
|
];
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2025-09-18 03:47:29 +00:00
|
|
|
private function getPageSizeLimitByData(array $arrayAuthSourceData)
|
|
|
|
|
{
|
|
|
|
|
if (isset($arrayAuthSourceData['AUTH_SOURCE_DATA']['LDAP_PAGE_SIZE_LIMIT'])) {
|
|
|
|
|
return $arrayAuthSourceData['AUTH_SOURCE_DATA']['LDAP_PAGE_SIZE_LIMIT'];
|
|
|
|
|
} else {
|
|
|
|
|
return $this->getPageSizeLimit(false);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2025-09-16 16:04:49 +00:00
|
|
|
private function ldapGetAttributes($ldapcnn, $entry)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$arrayAttributes = [];
|
|
|
|
|
|
|
|
|
|
$arrayAttributes['dn'] = ldap_get_dn($ldapcnn, $entry);
|
|
|
|
|
$this->stdLog($ldapcnn, 'ldap_get_dn');
|
|
|
|
|
|
|
|
|
|
$arrayAux = ldap_get_attributes($ldapcnn, $entry);
|
|
|
|
|
$this->stdLog($ldapcnn, 'ldap_get_attributes');
|
|
|
|
|
|
|
|
|
|
for ($i = 0; $i <= $arrayAux['count'] - 1; $i++) {
|
|
|
|
|
$key = strtolower($arrayAux[$i]);
|
|
|
|
|
|
|
|
|
|
switch ($arrayAux[$arrayAux[$i]]['count']) {
|
|
|
|
|
case 0:
|
|
|
|
|
$arrayAttributes[$key] = '';
|
|
|
|
|
break;
|
|
|
|
|
case 1:
|
|
|
|
|
$arrayAttributes[$key] = $arrayAux[$arrayAux[$i]][0];
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
$arrayAttributes[$key] = $arrayAux[$arrayAux[$i]];
|
|
|
|
|
|
|
|
|
|
unset($arrayAttributes[$key]['count']);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!isset($arrayAttributes['mail']) && isset($arrayAttributes['userprincipalname'])) {
|
|
|
|
|
$arrayAttributes['mail'] = $arrayAttributes['userprincipalname'];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $arrayAttributes;
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
2025-09-18 03:47:29 +00:00
|
|
|
|
|
|
|
|
public function custom_ldap_explode_dn($dn)
|
|
|
|
|
{
|
|
|
|
|
$dn = trim($dn, ',');
|
|
|
|
|
$result = ldap_explode_dn($dn, 0);
|
|
|
|
|
$this->stdLog(null, "ldap_explode_dn", ["dn" => $dn]);
|
|
|
|
|
|
|
|
|
|
if (is_array($result)) {
|
|
|
|
|
unset($result['count']);
|
|
|
|
|
|
|
|
|
|
foreach ($result as $key => $value) {
|
|
|
|
|
$result[$key] = addcslashes(preg_replace_callback("/\\\([0-9A-Fa-f]{2})/", function ($m) {
|
|
|
|
|
return chr(hexdec($m[1]));
|
|
|
|
|
}, $value), '<>,"');
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
|
}
|
2025-09-22 22:29:47 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
//-------------------------
|
|
|
|
|
public function automaticRegister($authSource, $strUser, $strPass)
|
|
|
|
|
{
|
|
|
|
|
$rbac = RBAC::getSingleton();
|
|
|
|
|
|
|
|
|
|
$user = $this->searchUserByUid($strUser);
|
|
|
|
|
|
|
|
|
|
$result = 0;
|
|
|
|
|
if (!empty($user)) {
|
|
|
|
|
if ($this->VerifyLogin($user['sUsername'], $strPass) === true) {
|
|
|
|
|
$result = 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ($result == 0 && $this->VerifyLogin($user['sDN'], $strPass) === true) {
|
|
|
|
|
$result = 1;
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ($result == 0) {
|
|
|
|
|
$filters = ['conditions' => ['AUTH_SOURCE_UID'=> $this->authSourceUid]];
|
|
|
|
|
$rbacAuthenticationSource = new RbacAuthenticationSource();
|
|
|
|
|
$authSourceReturn = $rbacAuthenticationSource->show($filters);
|
|
|
|
|
$authenticationSourceData = $authSourceReturn['data'][0];
|
|
|
|
|
$authenticationSourceData['AUTH_SOURCE_DATA'] = json_decode($authenticationSourceData['AUTH_SOURCE_DATA'], true);
|
|
|
|
|
|
|
|
|
|
$attributes = [];
|
|
|
|
|
if (isset($authSource['AUTH_SOURCE_DATA']['AUTH_SOURCE_GRID_ATTRIBUTE'])) {
|
|
|
|
|
$attributes = $authSource['AUTH_SOURCE_DATA']['AUTH_SOURCE_GRID_ATTRIBUTE'];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$usrRole = 'LURANA_OPERATOR';
|
|
|
|
|
if (!empty($authSource['AUTH_SOURCE_DATA']['USR_ROLE'])) {
|
|
|
|
|
$usrRole = $authSource['AUTH_SOURCE_DATA']['USR_ROLE'];
|
|
|
|
|
}
|
|
|
|
|
$data = [];
|
|
|
|
|
$data['USR_USERNAME'] = $user['sUsername'];
|
|
|
|
|
$data["USR_PASSWORD"] = "00000000000000000000000000000000";
|
|
|
|
|
$data['USR_FIRSTNAME'] = $user['sFirstname'];
|
|
|
|
|
$data['USR_LASTNAME'] = $user['sLastname'];
|
|
|
|
|
$data['USR_EMAIL'] = $user['sEmail'];
|
|
|
|
|
$data['USR_DUE_DATE'] = date('Y-m-d', mktime(0, 0, 0, date('m'), date('d'), date('Y') + 2));
|
|
|
|
|
$data['USR_CREATE_DATE'] = date('Y-m-d H:i:s');
|
|
|
|
|
$data['USR_UPDATE_DATE'] = date('Y-m-d H:i:s');
|
|
|
|
|
$data['USR_BIRTHDAY'] = date('Y-m-d');
|
|
|
|
|
$data['USR_STATUS'] = (isset($user['USR_STATUS'])) ? (($user['USR_STATUS'] == 'ACTIVE') ? 1 : 0) : 1;
|
|
|
|
|
$data['USR_AUTH_TYPE'] = strtolower($authSource['AUTH_SOURCE_PROVIDER']);
|
|
|
|
|
$data['UID_AUTH_SOURCE'] = $authSource['AUTH_SOURCE_UID'];
|
|
|
|
|
$data['USR_AUTH_USER_DN'] = $user['sDN'];
|
|
|
|
|
$data['USR_ROLE'] = $usrRole;
|
|
|
|
|
|
|
|
|
|
if (!empty($attributes)) {
|
|
|
|
|
foreach ($attributes as $value) {
|
|
|
|
|
if (isset($user[$value['attributeUser']])) {
|
|
|
|
|
$data[$value['attributeUser']] = str_replace("*", "'", $user[$value['attributeUser']]);
|
|
|
|
|
if ($value['attributeUser'] == 'USR_STATUS') {
|
|
|
|
|
$evalValue = $data[$value['attributeUser']];
|
|
|
|
|
$statusValue = (isset($user['USR_STATUS'])) ? $user['USR_STATUS'] : 'ACTIVE';
|
|
|
|
|
$data[$value['attributeUser']] = $statusValue;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//req - accountexpires
|
|
|
|
|
if (isset($user["USR_DUE_DATE"]) && $user["USR_DUE_DATE"] != '') {
|
|
|
|
|
$data["USR_DUE_DATE"] = $this->convertDateADtoPM($user["USR_DUE_DATE"]);
|
|
|
|
|
}
|
|
|
|
|
//end
|
|
|
|
|
|
|
|
|
|
$userUid = $rbac->createUser($data, $usrRole);
|
|
|
|
|
$data['USR_UID'] = $userUid;
|
|
|
|
|
|
|
|
|
|
$users = new Users();
|
|
|
|
|
$data['USR_STATUS'] = (isset($user['USR_STATUS'])) ? $user['USR_STATUS'] : 'ACTIVE';
|
|
|
|
|
$users->create($data);
|
|
|
|
|
$this->log(null, "Automatic Register for user $strUser ");
|
|
|
|
|
$result = 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function searchUserByUid($keyword, $identifier = "")
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$arrayUserData = [];
|
|
|
|
|
|
|
|
|
|
$filters = ['conditions' => ['AUTH_SOURCE_UID'=> $this->authSourceUid]];
|
|
|
|
|
$rbacAuthenticationSource = new RbacAuthenticationSource();
|
|
|
|
|
$authSourceReturn = $rbacAuthenticationSource->show($filters);
|
|
|
|
|
$authenticationSourceData = $authSourceReturn['data'][0];
|
|
|
|
|
$authenticationSourceData['AUTH_SOURCE_DATA'] = json_decode($authenticationSourceData['AUTH_SOURCE_DATA'], true);
|
|
|
|
|
$authenticationSourceData['AUTH_SOURCE_PASSWORD'] = G::decrypt($authenticationSourceData['AUTH_SOURCE_PASSWORD'], URL_KEY);
|
|
|
|
|
|
|
|
|
|
if (is_null($this->ldapcnn)) {
|
|
|
|
|
$ldapcnn = $this->ldapConnection($authenticationSourceData);
|
|
|
|
|
$this->ldapcnn = $ldapcnn['connection'];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$ldapcnn = $this->ldapcnn;
|
|
|
|
|
|
|
|
|
|
//Get User
|
|
|
|
|
$attributeUserSet = [];
|
|
|
|
|
$attributeSetAdd = [];
|
|
|
|
|
|
|
|
|
|
if (
|
|
|
|
|
isset($authenticationSourceData["AUTH_SOURCE_DATA"]["AUTH_SOURCE_GRID_ATTRIBUTE"]) && !empty($authenticationSourceData["AUTH_SOURCE_DATA"]["AUTH_SOURCE_GRID_ATTRIBUTE"])
|
|
|
|
|
) {
|
|
|
|
|
foreach ($authenticationSourceData["AUTH_SOURCE_DATA"]["AUTH_SOURCE_GRID_ATTRIBUTE"] as $value) {
|
|
|
|
|
$attributeSetAdd[] = $value["attributeLdap"];
|
|
|
|
|
$attributeUserSet[$value["attributeUser"]] = $value["attributeLdap"];
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$uidUserIdentifier = (isset($authenticationSourceData["AUTH_SOURCE_DATA"]["AUTH_SOURCE_IDENTIFIER_FOR_USER"])) ? $authenticationSourceData["AUTH_SOURCE_DATA"]["AUTH_SOURCE_IDENTIFIER_FOR_USER"] : "uid";
|
|
|
|
|
|
|
|
|
|
$filter2 = "";
|
|
|
|
|
|
|
|
|
|
if ($identifier != "" && $identifier != $uidUserIdentifier) {
|
|
|
|
|
$filter2 = "($identifier=$keyword)";
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$filter = "(&(" . $this->arrayObjectClassFilter["user"] . ")(|($uidUserIdentifier=$keyword)$filter2))";
|
|
|
|
|
|
|
|
|
|
$searchResult = @ldap_search($ldapcnn, $authenticationSourceData["AUTH_SOURCE_BASE_DN"], $filter, array_merge($this->arrayAttributesForUser, $attributeSetAdd));
|
|
|
|
|
$context = [
|
|
|
|
|
"baseDN" => $authenticationSourceData["AUTH_SOURCE_BASE_DN"],
|
|
|
|
|
"filter" => $filter,
|
|
|
|
|
"attribute" => array_merge($this->arrayAttributesForUser, $attributeSetAdd)
|
|
|
|
|
];
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_search", $context);
|
|
|
|
|
|
|
|
|
|
if ($error = ldap_errno($ldapcnn)) {
|
|
|
|
|
$messageError = ldap_err2str($error);
|
|
|
|
|
Cache::put('ldapMessageError', $messageError, 120); //laravel 8.x the time parameter is in seconds.
|
|
|
|
|
//
|
|
|
|
|
} else {
|
|
|
|
|
if ($searchResult) {
|
|
|
|
|
$numEntries = ldap_count_entries($ldapcnn, $searchResult);
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_count_entries");
|
|
|
|
|
|
|
|
|
|
if ($numEntries > 0) {
|
|
|
|
|
$entry = ldap_first_entry($ldapcnn, $searchResult);
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_first_entry");
|
|
|
|
|
$arrayUserLdap = $this->ldapGetAttributes($ldapcnn, $entry);
|
|
|
|
|
$username = (isset($arrayUserLdap[$uidUserIdentifier])) ? $arrayUserLdap[$uidUserIdentifier] : "";
|
|
|
|
|
|
|
|
|
|
if ((is_array($username) && !empty($username)) || trim($username) != "") {
|
|
|
|
|
$userCountControl = "";
|
|
|
|
|
|
|
|
|
|
//Active Directory, OpenLDAP
|
|
|
|
|
if (isset($arrayUserLdap["useraccountcontrol"])) {
|
|
|
|
|
switch ($arrayUserLdap["useraccountcontrol"]) {
|
|
|
|
|
case "512":
|
|
|
|
|
case "544":
|
|
|
|
|
case "66048":
|
|
|
|
|
case "66080":
|
|
|
|
|
$userCountControl = "ACTIVE";
|
|
|
|
|
break;
|
|
|
|
|
case "514":
|
|
|
|
|
case "546":
|
|
|
|
|
case "66050":
|
|
|
|
|
case "66082":
|
|
|
|
|
case "2":
|
|
|
|
|
case "16":
|
|
|
|
|
case "8388608":
|
|
|
|
|
default:
|
|
|
|
|
$userCountControl = "INACTIVE";
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//Apache LDAP
|
|
|
|
|
if (isset($arrayUserLdap["status"])) {
|
|
|
|
|
$userCountControl = strtoupper($arrayUserLdap["status"]);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$aUserAttributes = [];
|
|
|
|
|
|
|
|
|
|
foreach ($attributeUserSet as $key => $value) {
|
|
|
|
|
if ($key == "USR_STATUS") {
|
|
|
|
|
$aUserAttributes[$key] = ($userCountControl != "") ? $userCountControl : "ACTIVE";
|
|
|
|
|
} else {
|
|
|
|
|
if (isset($arrayUserLdap[$value])) {
|
|
|
|
|
$aUserAttributes[$key] = $arrayUserLdap[$value];
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$arrayUserData = array_merge($this->getUserDataFromAttribute($username, $arrayUserLdap), $aUserAttributes);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $arrayUserData;
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function VerifyLogin($strUser, $strPass)
|
|
|
|
|
{
|
|
|
|
|
if (is_array($strUser)) {
|
|
|
|
|
$strUser = $strUser[0];
|
|
|
|
|
} else {
|
|
|
|
|
$strUser = trim($strUser);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ($strUser == "") {
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (strlen($strPass) == 0) {
|
|
|
|
|
return -2;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$userDn = $strUser;
|
|
|
|
|
$ldapcnn = null;
|
|
|
|
|
$validUserPass = 1;
|
|
|
|
|
|
|
|
|
|
try {
|
|
|
|
|
$filters = ['conditions' => ['AUTH_SOURCE_UID'=> $this->authSourceUid]];
|
|
|
|
|
$rbacAuthenticationSource = new RbacAuthenticationSource();
|
|
|
|
|
$authSourceReturn = $rbacAuthenticationSource->show($filters);
|
|
|
|
|
$authenticationSourceData = $authSourceReturn['data'][0];
|
|
|
|
|
$authenticationSourceData['AUTH_SOURCE_DATA'] = json_decode($authenticationSourceData['AUTH_SOURCE_DATA'], true);
|
|
|
|
|
|
|
|
|
|
if (
|
|
|
|
|
isset($authenticationSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_SHOWGRID']) &&
|
|
|
|
|
$authenticationSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_SHOWGRID'] == 'on'
|
|
|
|
|
) {
|
|
|
|
|
$setAttributes = 1;
|
|
|
|
|
}
|
|
|
|
|
$filters = [
|
|
|
|
|
'fields' => ['USR_USERNAME', 'USR_UID'],
|
|
|
|
|
'conditions' => [
|
|
|
|
|
'UID_AUTH_SOURCE' => $authenticationSourceData["AUTH_SOURCE_UID"],
|
|
|
|
|
'USR_AUTH_USER_DN' => $strUser,
|
|
|
|
|
['USR_USERNAME', '!=', '']
|
|
|
|
|
]
|
|
|
|
|
];
|
|
|
|
|
$rbacUsers = new RbacUsers();
|
|
|
|
|
$usersByAuthSource = $rbacUsers->show($filters);
|
|
|
|
|
if (!empty($usersByAuthSource['data'] && !empty($usersByAuthSource['data'][0]))) {
|
|
|
|
|
$usrName = $usersByAuthSource['data'][0]['USR_USERNAME'];
|
|
|
|
|
$usrUid = $usersByAuthSource['data'][0]['USR_UID'];
|
|
|
|
|
} else {
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$verifiedUser = $this->searchUserByUid($usrName, $authenticationSourceData["AUTH_SOURCE_DATA"]["AUTH_SOURCE_IDENTIFIER_FOR_USER"]);
|
|
|
|
|
|
|
|
|
|
if (empty($verifiedUser) || trim($verifiedUser["sDN"]) == null) {
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ($verifiedUser["sDN"] != $strUser || $setAttributes == 1) {
|
|
|
|
|
$userDn = $verifiedUser['sDN'];
|
|
|
|
|
|
|
|
|
|
// Update data
|
2025-10-07 02:22:03 +00:00
|
|
|
$user = new BusinessUser();
|
2025-09-22 22:29:47 +00:00
|
|
|
$arrayUserData = $user->getUserRecordByPk($usrUid, [], false);
|
|
|
|
|
|
|
|
|
|
$result = $this->ldapUserUpdateByDnAndData(
|
|
|
|
|
$this->ldapcnn,
|
|
|
|
|
$authenticationSourceData,
|
|
|
|
|
$userDn,
|
|
|
|
|
[$arrayUserData['USR_USERNAME'] => $arrayUserData]
|
|
|
|
|
);
|
|
|
|
|
|
2025-10-07 02:22:03 +00:00
|
|
|
$rbacUsers = new RbacUsers();
|
|
|
|
|
$rbacUsers->updateData(
|
|
|
|
|
['USR_AUTH_USER_DN' => $userDn],
|
|
|
|
|
['UID_AUTH_SOURCE' => $authenticationSourceData["AUTH_SOURCE_UID"], 'USR_AUTH_USER_DN' => $strUser]
|
|
|
|
|
);
|
2025-09-22 22:29:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//Check ldap connection for user
|
|
|
|
|
$authenticationSourceData["AUTH_ANONYMOUS"] = "0";
|
|
|
|
|
$authenticationSourceData["AUTH_SOURCE_SEARCH_USER"] = $userDn;
|
|
|
|
|
$authenticationSourceData["AUTH_SOURCE_PASSWORD"] = $strPass;
|
|
|
|
|
|
|
|
|
|
$ldapcnn = $this->ldapConnection($authenticationSourceData);
|
|
|
|
|
$ldapcnn = $ldapcnn['connection'];
|
|
|
|
|
$flagUpdate = false;
|
|
|
|
|
switch (hexdec(ldap_errno($ldapcnn))) {
|
|
|
|
|
case 0:
|
|
|
|
|
//0x00
|
|
|
|
|
$flagUpdate = true;
|
|
|
|
|
$statusRbac = 1;
|
|
|
|
|
$statusUser = 'ACTIVE';
|
|
|
|
|
break;
|
|
|
|
|
case 52:
|
|
|
|
|
case 88:
|
|
|
|
|
case 94:
|
|
|
|
|
//0x34, 0x58, 0x5e
|
|
|
|
|
//LDAP_UNAVAILABLE
|
|
|
|
|
//LDAP_USER_CANCELLED
|
|
|
|
|
//LDAP_NO_RESULTS_RETURNED
|
|
|
|
|
$flagUpdate = true;
|
|
|
|
|
$statusRbac = 0;
|
|
|
|
|
$statusUser = 'INACTIVE';
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
if ($flagUpdate) {
|
|
|
|
|
$setValues = [
|
|
|
|
|
'USR_AUTH_USER_DN' => $userDn,
|
|
|
|
|
'USR_STATUS' => $statusRbac,
|
|
|
|
|
'USR_FIRSTNAME' => ''
|
|
|
|
|
];
|
|
|
|
|
$conditions = [
|
|
|
|
|
'UID_AUTH_SOURCE' =>$authenticationSourceData["AUTH_SOURCE_UID"],
|
|
|
|
|
'USR_AUTH_USER_DN' => $strUser,
|
|
|
|
|
'USR_STATUS' => 1
|
|
|
|
|
];
|
|
|
|
|
$rbacUsers = new RbacUsers();
|
|
|
|
|
$rbacUsers->updateData($setValues, $conditions);
|
|
|
|
|
|
|
|
|
|
$columnsWf = [];
|
|
|
|
|
$columnsWf['USR_UID'] = $usrUid;
|
|
|
|
|
$columnsWf['USR_STATUS'] = $statusUser;
|
|
|
|
|
$oUser = new Users();
|
|
|
|
|
$oUser->update($columnsWf);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$attributes = $authenticationSourceData["AUTH_SOURCE_DATA"];
|
|
|
|
|
|
|
|
|
|
if (!isset($attributes['AUTH_SOURCE_RETIRED_OU'])) {
|
|
|
|
|
$attributes['AUTH_SOURCE_RETIRED_OU'] = '';
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
$attributes["AUTH_SOURCE_RETIRED_OU"] ahora es igual a ''
|
|
|
|
|
dd('A punto', $verifiedUser, $usrName, $attributes["AUTH_SOURCE_RETIRED_OU"]);
|
|
|
|
|
// Check if the user is in the terminated organizational unit
|
|
|
|
|
if (!empty($verifiedUser) && $this->userIsTerminated($usrName, $attributes["AUTH_SOURCE_RETIRED_OU"])) {
|
|
|
|
|
$this->deactivateUser($usrName);
|
|
|
|
|
$this->log($ldapcnn, "user $strUser is member of Remove OU, deactivating this user.");
|
|
|
|
|
|
|
|
|
|
return -3;
|
|
|
|
|
}
|
|
|
|
|
*/
|
|
|
|
|
$validUserPass = ldap_errno($ldapcnn) == 0;
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
$context = [
|
|
|
|
|
"action" => "ldapSynchronize",
|
|
|
|
|
"authSource" => $authenticationSourceData
|
|
|
|
|
];
|
|
|
|
|
$message = $e->getMessage();
|
|
|
|
|
Log::channel(':ldapSynchronize')->error($message, Bootstrap::context($context));
|
|
|
|
|
|
|
|
|
|
$validUserPass = -5;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ($validUserPass == 1) {
|
|
|
|
|
$this->log($ldapcnn, "sucessful login user " . $userDn);
|
|
|
|
|
} else {
|
|
|
|
|
$this->log($ldapcnn, "failure authentication for user $strUser");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $validUserPass;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function deactivateUser($userUid)
|
|
|
|
|
{
|
|
|
|
|
if (!class_exists('RbacUsers')) {
|
|
|
|
|
require_once(PATH_RBAC . 'model/RbacUsers.php');
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$con = Propel::getConnection(RbacUsersPeer::DATABASE_NAME);
|
|
|
|
|
// select set
|
|
|
|
|
$c1 = new Criteria('rbac');
|
|
|
|
|
$c1->add(RbacUsersPeer::USR_USERNAME, $userUid);
|
|
|
|
|
// update set
|
|
|
|
|
$c2 = new Criteria('rbac');
|
|
|
|
|
$c2->add(RbacUsersPeer::USR_STATUS, '0');
|
|
|
|
|
|
|
|
|
|
BasePeer::doUpdate($c1, $c2, $con);
|
|
|
|
|
|
|
|
|
|
if (!class_exists('Users')) {
|
|
|
|
|
require_once('classes/model/Users.php');
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$con = Propel::getConnection(UsersPeer::DATABASE_NAME);
|
|
|
|
|
// select set
|
|
|
|
|
$c1 = new Criteria('workflow');
|
|
|
|
|
$c1->add(UsersPeer::USR_USERNAME, $userUid);
|
|
|
|
|
// update set
|
|
|
|
|
$c2 = new Criteria('workflow');
|
|
|
|
|
$c2->add(UsersPeer::USR_STATUS, 'INACTIVE');
|
|
|
|
|
$c2->add(UsersPeer::DEP_UID, '');
|
|
|
|
|
|
|
|
|
|
BasePeer::doUpdate($c1, $c2, $con);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function userIsTerminated($userUid, $sOuTerminated)
|
|
|
|
|
{
|
|
|
|
|
$terminated = false;
|
|
|
|
|
$aLdapUsers = $this->getUsersFromDepartmentByName($sOuTerminated);
|
|
|
|
|
|
|
|
|
|
foreach ($aLdapUsers as $aLdapUser) {
|
|
|
|
|
if ($aLdapUser['sUsername'] == $userUid) {
|
|
|
|
|
$terminated = true;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $terminated;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function getUsersFromDepartmentByName($departmentName)
|
|
|
|
|
{
|
|
|
|
|
$dFilter = "(&(" . $this->arrayObjectClassFilter["department"] . ")(ou=" . $departmentName . "))";
|
|
|
|
|
|
|
|
|
|
$aUsers = [];
|
|
|
|
|
|
|
|
|
|
$filters = ['conditions' => ['AUTH_SOURCE_UID'=> $this->authSourceUid]];
|
|
|
|
|
$rbacAuthenticationSource = new RbacAuthenticationSource();
|
|
|
|
|
$authSourceReturn = $rbacAuthenticationSource->show($filters);
|
|
|
|
|
$authenticationSourceData = $authSourceReturn['data'][0];
|
|
|
|
|
$authenticationSourceData['AUTH_SOURCE_DATA'] = json_decode($authenticationSourceData['AUTH_SOURCE_DATA'], true);
|
|
|
|
|
$authenticationSourceData['AUTH_SOURCE_PASSWORD'] = G::decrypt($authenticationSourceData['AUTH_SOURCE_PASSWORD'], URL_KEY);
|
|
|
|
|
|
|
|
|
|
if (is_null($this->ldapcnn)) {
|
|
|
|
|
$ldapcnn = $this->ldapConnection($authenticationSourceData);
|
|
|
|
|
$this->ldapcnn = $ldapcnn['connection'];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$ldapcnn = $this->ldapcnn;
|
|
|
|
|
$oSearch = @ldap_search($ldapcnn, $authenticationSourceData["AUTH_SOURCE_BASE_DN"], $dFilter, $this->arrayAttributesForUser);
|
|
|
|
|
$context = [
|
|
|
|
|
"baseDN" => $authenticationSourceData["AUTH_SOURCE_BASE_DN"],
|
|
|
|
|
"filter" => $dFilter,
|
|
|
|
|
"attributes" => $this->arrayAttributesForUser
|
|
|
|
|
];
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_search", $context);
|
|
|
|
|
|
|
|
|
|
if ($oError = ldap_errno($ldapcnn)) {
|
|
|
|
|
return $aUsers;
|
|
|
|
|
} else {
|
|
|
|
|
if ($oSearch) {
|
|
|
|
|
//get the departments from the ldap entries
|
|
|
|
|
if (ldap_count_entries($ldapcnn, $oSearch) > 0) {
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_count_entries");
|
|
|
|
|
$oEntry = ldap_first_entry($ldapcnn, $oSearch);
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_first_entry");
|
|
|
|
|
|
|
|
|
|
do {
|
|
|
|
|
$aAttr = $this->ldapGetAttributes($ldapcnn, $oEntry);
|
|
|
|
|
$result = $this->ldapGetUsersFromDepartment("GET", $aAttr["dn"]);
|
|
|
|
|
foreach ($result as $item) {
|
|
|
|
|
$aUsers[] = $item;
|
|
|
|
|
}
|
|
|
|
|
} while ($oEntry = ldap_next_entry($ldapcnn, $oEntry));
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return $aUsers;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function ldapGetUsersFromDepartment($option, $dn, array $arrayData = [])
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromDepartment() > START");
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromDepartment() > \$dn ----> $dn");
|
|
|
|
|
|
|
|
|
|
$arrayUser = [];
|
|
|
|
|
$totalUser = 0;
|
|
|
|
|
$countUser = 0;
|
|
|
|
|
|
|
|
|
|
//Set variables
|
|
|
|
|
$dn = trim($dn);
|
|
|
|
|
|
2025-10-07 02:22:03 +00:00
|
|
|
$rbacAuthenticationSource = new RbacAuthenticationSource();
|
|
|
|
|
$filters = ['conditions' => ['AUTH_SOURCE_UID'=> $this->authSourceUid]];
|
|
|
|
|
$authSourceReturn = $rbacAuthenticationSource->show($filters);
|
|
|
|
|
$authenticationSourceData = $authSourceReturn['data'][0];
|
|
|
|
|
$authenticationSourceData['AUTH_SOURCE_DATA'] = json_decode($authenticationSourceData['AUTH_SOURCE_DATA'], true);
|
|
|
|
|
$authenticationSourceData['AUTH_SOURCE_PASSWORD'] = G::decrypt($authenticationSourceData['AUTH_SOURCE_PASSWORD'], URL_KEY);
|
2025-09-22 22:29:47 +00:00
|
|
|
|
2025-10-07 02:22:03 +00:00
|
|
|
if (is_null($this->ldapcnn)) {
|
|
|
|
|
$ldapcnn = $this->ldapConnection($authenticationSourceData);
|
|
|
|
|
$this->ldapcnn = $ldapcnn['connection'];
|
|
|
|
|
}
|
2025-09-22 22:29:47 +00:00
|
|
|
$ldapcnn = $this->ldapcnn;
|
|
|
|
|
|
|
|
|
|
//Get Users
|
2025-10-07 02:22:03 +00:00
|
|
|
$limit = $this->getPageSizeLimitByData($authenticationSourceData);
|
2025-09-22 22:29:47 +00:00
|
|
|
$flagError = false;
|
|
|
|
|
|
2025-10-07 02:22:03 +00:00
|
|
|
if (!isset($authenticationSourceData["AUTH_SOURCE_DATA"]["AUTH_SOURCE_USERS_FILTER"])) {
|
|
|
|
|
$authenticationSourceData["AUTH_SOURCE_DATA"]["AUTH_SOURCE_USERS_FILTER"] = "";
|
2025-09-22 22:29:47 +00:00
|
|
|
}
|
|
|
|
|
|
2025-10-07 02:22:03 +00:00
|
|
|
$uidUserIdentifier = (isset($authenticationSourceData["AUTH_SOURCE_DATA"]["AUTH_SOURCE_IDENTIFIER_FOR_USER"])) ? $authenticationSourceData["AUTH_SOURCE_DATA"]["AUTH_SOURCE_IDENTIFIER_FOR_USER"] : "uid";
|
|
|
|
|
$filterUsers = trim($authenticationSourceData["AUTH_SOURCE_DATA"]["AUTH_SOURCE_USERS_FILTER"]);
|
2025-09-22 22:29:47 +00:00
|
|
|
$filter = ($filterUsers != "") ? $filterUsers : "(" . $this->arrayObjectClassFilter["user"] . ")";
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromDepartment() > \$filter ----> $filter");
|
|
|
|
|
$cookie = '';
|
|
|
|
|
|
|
|
|
|
do {
|
|
|
|
|
$searchResult = @ldap_list(
|
|
|
|
|
$ldapcnn,
|
|
|
|
|
$dn,
|
|
|
|
|
$filter,
|
|
|
|
|
$this->arrayAttributesForUser,
|
|
|
|
|
0,
|
|
|
|
|
-1,
|
|
|
|
|
-1,
|
|
|
|
|
LDAP_DEREF_NEVER,
|
|
|
|
|
[['oid' => LDAP_CONTROL_PAGEDRESULTS, 'value' => ['size' => $limit, 'cookie' => $cookie]]]
|
|
|
|
|
);
|
|
|
|
|
ldap_parse_result($ldapcnn, $searchResult, $errcode, $matcheddn, $errmsg, $referrals, $controls);
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_list", ["filter" => $filter, "attributes" => $this->arrayAttributesForUser]);
|
|
|
|
|
|
|
|
|
|
if ($error = ldap_errno($ldapcnn)) {
|
|
|
|
|
$flagError = true;
|
|
|
|
|
} else {
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromDepartment() > ldap_list > OK");
|
|
|
|
|
|
|
|
|
|
switch ($option) {
|
|
|
|
|
case "GET":
|
|
|
|
|
list($totalUser, $countUser, $arrayUser) = $this->ldapGetUsersFromDepartmentSearchResult($ldapcnn, $searchResult, $option, $dn, $uidUserIdentifier, $totalUser, $countUser, $arrayUser);
|
|
|
|
|
break;
|
|
|
|
|
case "SYNCHRONIZE":
|
|
|
|
|
list($totalUser, $countUser, $arrayData) = $this->ldapGetUsersFromDepartmentSearchResult($ldapcnn, $searchResult, $option, $dn, $uidUserIdentifier, $totalUser, $countUser, $arrayData);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!$flagError) {
|
|
|
|
|
if (isset($controls[LDAP_CONTROL_PAGEDRESULTS]['value']['cookie'])) {
|
|
|
|
|
// You need to pass the cookie from the last call to the next one
|
|
|
|
|
$cookie = $controls[LDAP_CONTROL_PAGEDRESULTS]['value']['cookie'];
|
|
|
|
|
} else {
|
|
|
|
|
$cookie = '';
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
// Empty cookie means last page
|
|
|
|
|
} while (!empty($cookie) && !$flagError);
|
|
|
|
|
|
|
|
|
|
// Get Users //2
|
|
|
|
|
if ($flagError) {
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromDepartment() > Search by characters > START");
|
|
|
|
|
|
|
|
|
|
foreach ($this->characters() as $value) {
|
|
|
|
|
$char = $value;
|
|
|
|
|
|
2025-10-07 02:22:03 +00:00
|
|
|
$ldapcnn = $this->ldapConnection($authenticationSourceData);
|
|
|
|
|
$ldapcnn = $ldapcnn['connection'];
|
2025-09-22 22:29:47 +00:00
|
|
|
$filter = ($filterUsers != "") ? $filterUsers : "(" . $this->arrayObjectClassFilter["user"] . ")";
|
|
|
|
|
$filter = "(&$filter($uidUserIdentifier=$char*))";
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromDepartment() > \$filter ----> $filter");
|
|
|
|
|
$searchResult = @ldap_list($ldapcnn, $dn, $filter, $this->arrayAttributesForUser);
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_list", ["attributes" => $this->arrayAttributesForUser]);
|
|
|
|
|
|
|
|
|
|
if ($error = ldap_errno($ldapcnn)) {
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromDepartment() > ldap_list > ERROR > \$error ---->\n" . print_r($error, true));
|
|
|
|
|
} else {
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromDepartment() > ldap_list > OK");
|
|
|
|
|
|
|
|
|
|
switch ($option) {
|
|
|
|
|
case "GET":
|
|
|
|
|
list($totalUser, $countUser, $arrayUser) = $this->ldapGetUsersFromDepartmentSearchResult($ldapcnn, $searchResult, $option, $dn, $uidUserIdentifier, $totalUser, $countUser, $arrayUser);
|
|
|
|
|
break;
|
|
|
|
|
case "SYNCHRONIZE":
|
|
|
|
|
list($totalUser, $countUser, $arrayData) = $this->ldapGetUsersFromDepartmentSearchResult($ldapcnn, $searchResult, $option, $dn, $uidUserIdentifier, $totalUser, $countUser, $arrayData);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromDepartment() > Search by characters > END");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$this->log($ldapcnn, "Found $totalUser users in department $dn");
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromDepartment() > END");
|
|
|
|
|
|
|
|
|
|
// Return
|
|
|
|
|
switch ($option) {
|
|
|
|
|
case "GET":
|
|
|
|
|
return $arrayUser;
|
|
|
|
|
break;
|
|
|
|
|
case "SYNCHRONIZE":
|
|
|
|
|
return $arrayData;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function characters()
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$arrayCharacter = [];
|
|
|
|
|
|
|
|
|
|
for ($i = 33; $i <= 127; $i++) {
|
|
|
|
|
$char = trim(strtolower(chr($i)));
|
|
|
|
|
|
|
|
|
|
if ($char != "") {
|
|
|
|
|
$arrayCharacter[$i] = $char;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
unset($arrayCharacter[33]); // !
|
|
|
|
|
unset($arrayCharacter[38]); // &
|
|
|
|
|
unset($arrayCharacter[40]); // (
|
|
|
|
|
unset($arrayCharacter[41]); // )
|
|
|
|
|
unset($arrayCharacter[42]); // *
|
|
|
|
|
unset($arrayCharacter[60]); // <
|
|
|
|
|
unset($arrayCharacter[61]); // =
|
|
|
|
|
unset($arrayCharacter[62]); // >
|
|
|
|
|
unset($arrayCharacter[124]); // |
|
|
|
|
|
unset($arrayCharacter[126]); // ~
|
|
|
|
|
unset($arrayCharacter[127]); // DEL
|
|
|
|
|
// Return
|
|
|
|
|
return array_unique($arrayCharacter);
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function ldapGetUsersFromDepartmentSearchResult($ldapcnn, $searchResult, $option, $dn, $uidUserIdentifier, $totalUser, $countUser, array $arrayData)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromDepartmentSearchResult() > START");
|
|
|
|
|
|
|
|
|
|
if ($searchResult) {
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromDepartmentSearchResult() > ldap_list > OK");
|
|
|
|
|
$numEntries = ldap_count_entries($ldapcnn, $searchResult);
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_count_entries");
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromDepartmentSearchResult() > ldap_list > OK > \$numEntries ----> $numEntries");
|
|
|
|
|
|
|
|
|
|
$totalUser += $numEntries;
|
|
|
|
|
|
|
|
|
|
if ($numEntries > 0) {
|
|
|
|
|
$this->log($ldapcnn, "Search $dn accounts with identifier = $uidUserIdentifier");
|
|
|
|
|
$entry = ldap_first_entry($ldapcnn, $searchResult);
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_first_entry");
|
|
|
|
|
|
|
|
|
|
do {
|
|
|
|
|
$arrayUserLdap = $this->ldapGetAttributes($ldapcnn, $entry);
|
|
|
|
|
$username = (isset($arrayUserLdap[$uidUserIdentifier])) ? $arrayUserLdap[$uidUserIdentifier] : "";
|
|
|
|
|
$countUser++;
|
|
|
|
|
|
|
|
|
|
if ((is_array($username) && !empty($username)) || trim($username) != "") {
|
|
|
|
|
$arrayUserData = $this->getUserDataFromAttribute($username, $arrayUserLdap);
|
|
|
|
|
|
|
|
|
|
if (!isset($this->arrayDepartmentUserSynchronizedChecked[$arrayUserData["sUsername"]])) {
|
|
|
|
|
$this->arrayDepartmentUserSynchronizedChecked[$arrayUserData["sUsername"]] = 1;
|
|
|
|
|
|
|
|
|
|
switch ($option) {
|
|
|
|
|
case "GET":
|
|
|
|
|
$arrayData[] = $arrayUserData;
|
|
|
|
|
break;
|
|
|
|
|
case "SYNCHRONIZE":
|
|
|
|
|
$arrayData = $this->departmentSynchronizeUser("", $arrayUserData, $arrayData);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
$this->log($ldapcnn, "User have repeated: Username \"" . $arrayUserData["sUsername"] . "\", DN \"" . $arrayUserData["sDN"] . "\"");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ($option == "SYNCHRONIZE") {
|
|
|
|
|
// Progress bar
|
2025-10-07 02:22:03 +00:00
|
|
|
$this->frontEndShow("BAR", "Departments: " . $arrayData["i"] . "/" . $arrayData["n"] . " " . $this->progressBar($totalUser, $countUser));
|
2025-09-22 22:29:47 +00:00
|
|
|
}
|
|
|
|
|
} while ($entry = ldap_next_entry($ldapcnn, $entry));
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromDepartmentSearchResult() > END");
|
|
|
|
|
// Return
|
|
|
|
|
return array($totalUser, $countUser, $arrayData);
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2025-10-07 02:22:03 +00:00
|
|
|
public function usersUpdateData($authenticationSourceUid)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$totalUser = count($this->arrayAuthenticationSourceUsersByUid);
|
|
|
|
|
$countUserUpdate = 0;
|
|
|
|
|
$countUserDelete = 0;
|
|
|
|
|
|
|
|
|
|
// Set variables
|
|
|
|
|
$rbac = RBAC::getSingleton();
|
|
|
|
|
if (is_null($rbac->authSourcesObj)) {
|
|
|
|
|
$rbac->authSourcesObj = new AuthenticationSource();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
$filters = ['conditions' => ['AUTH_SOURCE_UID'=> $authenticationSourceUid]];
|
|
|
|
|
$rbacAuthenticationSource = new RbacAuthenticationSource();
|
|
|
|
|
$authSourceReturn = $rbacAuthenticationSource->show($filters);
|
|
|
|
|
$authenticationSourceData = $authSourceReturn['data'][0];
|
|
|
|
|
$authenticationSourceData['AUTH_SOURCE_DATA'] = json_decode($authenticationSourceData['AUTH_SOURCE_DATA'], true);
|
|
|
|
|
$authenticationSourceData['AUTH_SOURCE_PASSWORD'] = G::decrypt($authenticationSourceData['AUTH_SOURCE_PASSWORD'], URL_KEY);
|
|
|
|
|
|
|
|
|
|
$ldapcnn = $this->ldapConnection($authenticationSourceData);
|
|
|
|
|
$this->ldapcnn = $ldapcnn['connection'];
|
|
|
|
|
$ldapcnn = $this->ldapcnn;
|
|
|
|
|
|
|
|
|
|
// Update Users
|
|
|
|
|
$limit = $this->getPageSizeLimitByData($authenticationSourceData);
|
|
|
|
|
$count = 0;
|
|
|
|
|
|
|
|
|
|
$uidUserIdentifier = (isset($authenticationSourceData["AUTH_SOURCE_DATA"]["AUTH_SOURCE_IDENTIFIER_FOR_USER"])) ? $authenticationSourceData["AUTH_SOURCE_DATA"]["AUTH_SOURCE_IDENTIFIER_FOR_USER"] : "uid";
|
|
|
|
|
|
|
|
|
|
$filterUsers = "";
|
|
|
|
|
$arrayUserUid = [];
|
|
|
|
|
foreach ($this->arrayAuthenticationSourceUsersByUid as $arrayUserData) {
|
|
|
|
|
$count++;
|
|
|
|
|
$filterUsers .= "($uidUserIdentifier=" . $arrayUserData["USR_USERNAME"] . ")";
|
|
|
|
|
$arrayUserUid[] = $arrayUserData["USR_UID"];
|
|
|
|
|
|
|
|
|
|
if ($count == $limit) {
|
|
|
|
|
list($totalUser, $countUserUpdate, $countUserDelete) = $this->ldapUsersUpdateData(
|
|
|
|
|
$ldapcnn,
|
|
|
|
|
$authenticationSourceData,
|
|
|
|
|
$filterUsers,
|
|
|
|
|
$arrayUserUid,
|
|
|
|
|
['totalUser' => $totalUser, 'countUserUpdated' => $countUserUpdate, 'countUserDeleted' => $countUserDelete]
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
$count = 0;
|
|
|
|
|
$filterUsers = "";
|
|
|
|
|
$arrayUserUid = [];
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ($count > 0) {
|
|
|
|
|
list($totalUser, $countUserUpdate, $countUserDelete) = $this->ldapUsersUpdateData(
|
|
|
|
|
$ldapcnn,
|
|
|
|
|
$authenticationSourceData,
|
|
|
|
|
$filterUsers,
|
|
|
|
|
$arrayUserUid,
|
|
|
|
|
['totalUser' => $totalUser, 'countUserUpdated' => $countUserUpdate, 'countUserDeleted' => $countUserDelete]
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return ['totalUser' => $totalUser, 'countUserUpdated' => $countUserUpdate, 'countUserDeleted' => $countUserDelete];
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private function ldapUsersUpdateData($ldapcnn, array $arrayAuthSourceData, $filterUsers, array $listUids, array $countResult)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$totalUser = $countResult['totalUser'];
|
|
|
|
|
$countUserUpdated = $countResult['countUserUpdated'];
|
|
|
|
|
$countUserDeleted = $countResult['countUserDeleted'];
|
|
|
|
|
|
|
|
|
|
// Define the filter to search all users
|
|
|
|
|
$filter = '(&(' . $this->arrayObjectClassFilter['user'] . ')(|' . $filterUsers . '))';
|
|
|
|
|
// Search all the users
|
|
|
|
|
$searchResult = @ldap_search($ldapcnn, $arrayAuthSourceData['AUTH_SOURCE_BASE_DN'], $filter, $this->arrayAttributesForUser);
|
|
|
|
|
$context = [
|
|
|
|
|
"baseDN" => $arrayAuthSourceData['AUTH_SOURCE_BASE_DN'],
|
|
|
|
|
"filter" => $filter,
|
|
|
|
|
"attributes" => $this->arrayAttributesForUser
|
|
|
|
|
];
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_search", $context);
|
|
|
|
|
|
|
|
|
|
if ($error = ldap_errno($ldapcnn)) {
|
|
|
|
|
//
|
|
|
|
|
} elseif ($searchResult && ldap_count_entries($ldapcnn, $searchResult) > 0) { // Check if at least one user was found
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_count_entries");
|
|
|
|
|
// Get Users from DB
|
|
|
|
|
$arrayUser = [];
|
|
|
|
|
|
|
|
|
|
$user = new User();
|
|
|
|
|
$filters = [
|
|
|
|
|
'limit' => 10000,
|
|
|
|
|
'conditions' => [['USR_STATUS', '!=', 'CLOSED']]];
|
|
|
|
|
$userQueryData = $user->getByListUids($listUids, $filters);
|
|
|
|
|
foreach ($userQueryData['data'] ?? [] as $userData) {
|
|
|
|
|
$arrayUser[$userData['USR_USERNAME']] = $userData;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Get Users from LDAP Server
|
|
|
|
|
$entry = ldap_first_entry($ldapcnn, $searchResult);
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_first_entry");
|
|
|
|
|
// Save all the list of users
|
|
|
|
|
$this->allListOfUsers = $arrayUser;
|
|
|
|
|
// Check all the ldap entry found
|
|
|
|
|
do {
|
|
|
|
|
if ($this->ldapUserUpdateByDnAndData($ldapcnn, $arrayAuthSourceData, ldap_get_dn($ldapcnn, $entry), $arrayUser)) {
|
|
|
|
|
$countUserUpdated++;
|
|
|
|
|
// Progress bar
|
|
|
|
|
$this->frontEndShow(
|
|
|
|
|
'BAR',
|
|
|
|
|
'Update Users data: ' . $countUserUpdated . '/' . $totalUser . ' ' . $this->progressBar($totalUser, $countUserUpdated)
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
} while ($entry = ldap_next_entry($ldapcnn, $entry));
|
|
|
|
|
$countUserDeleted = count($this->allListOfUsers);
|
|
|
|
|
// List of users to delete
|
|
|
|
|
foreach ($this->allListOfUsers as $index => $usr) {
|
|
|
|
|
$user = new BusinessUser();
|
|
|
|
|
$user->deleteGdpr($usr['USR_UID']);
|
|
|
|
|
}
|
|
|
|
|
// Register the users deleted
|
|
|
|
|
$this->stdLog($ldapcnn, "deleteUsersGdpr", $this->allListOfUsers);
|
|
|
|
|
} else { // If no user found, we supposed that all are deleted
|
|
|
|
|
foreach ($listUids as $usr) {
|
|
|
|
|
$user = new BusinessUser();
|
|
|
|
|
$user->deleteGdpr($usr);
|
|
|
|
|
}
|
|
|
|
|
// Register the users deleted
|
|
|
|
|
$this->stdLog($ldapcnn, "deleteAllUsersGdpr", $listUids);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return [$totalUser, $countUserUpdated, $countUserDeleted];
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private function ldapUserUpdateByDnAndData($ldapcnn, array $arrayAuthSourceData, $userDn, array $arrayUser)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
// Set variables
|
|
|
|
|
$rbac = RBAC::getSingleton();
|
|
|
|
|
if (is_null($rbac->userObj)) {
|
|
|
|
|
$rbac->userObj = new RbacUsers();
|
|
|
|
|
}
|
|
|
|
|
// Set variables
|
|
|
|
|
$flagUser = false;
|
|
|
|
|
$arrayAttributesToSync = [
|
|
|
|
|
//Default attributes to sync
|
|
|
|
|
'USR_FIRSTNAME' => 'givenname',
|
|
|
|
|
'USR_LASTNAME' => 'sn',
|
|
|
|
|
'USR_EMAIL' => 'mail',
|
|
|
|
|
'USR_STATUS' => 'useraccountcontrol'
|
|
|
|
|
];
|
|
|
|
|
|
|
|
|
|
if (!empty($arrayAuthSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_GRID_ATTRIBUTE'])) {
|
|
|
|
|
foreach ($arrayAuthSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_GRID_ATTRIBUTE'] as $value) {
|
|
|
|
|
$arrayAttributesToSync[$value['attributeUser']] = $value['attributeLdap'];
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Search User from LDAP Server
|
|
|
|
|
$uidUserIdentifier = (isset($arrayAuthSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_IDENTIFIER_FOR_USER'])) ?
|
|
|
|
|
$arrayAuthSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_IDENTIFIER_FOR_USER'] : 'uid';
|
|
|
|
|
|
|
|
|
|
$arrayAttribute = array_merge($this->arrayAttributesForUser, array_values($arrayAttributesToSync));
|
|
|
|
|
$searchResult = @ldap_search($ldapcnn, $userDn, '(objectclass=*)', $arrayAttribute);
|
|
|
|
|
$context = [
|
|
|
|
|
"baseDN" => $userDn,
|
|
|
|
|
"filter" => "(objectclass=*)",
|
|
|
|
|
"attributes" => $arrayAttribute
|
|
|
|
|
];
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_search", $context);
|
|
|
|
|
|
|
|
|
|
if ($error = ldap_errno($ldapcnn)) {
|
|
|
|
|
//
|
|
|
|
|
} elseif ($searchResult && ldap_count_entries($ldapcnn, $searchResult) > 0) {
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_count_entries");
|
|
|
|
|
$entry = ldap_first_entry($ldapcnn, $searchResult);
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_first_entry", $context);
|
|
|
|
|
$arrayUserLdap = $this->ldapGetAttributes($ldapcnn, $entry);
|
|
|
|
|
$username = (isset($arrayUserLdap[$uidUserIdentifier])) ? $arrayUserLdap[$uidUserIdentifier] : '';
|
|
|
|
|
|
|
|
|
|
if ((is_array($username) && !empty($username)) || trim($username) != '') {
|
|
|
|
|
$username = trim((is_array($username)) ? $username[0] : $username);
|
|
|
|
|
|
|
|
|
|
if (isset($arrayUser[$username])) {
|
|
|
|
|
if (!isset($this->arrayUserUpdateChecked[$username])) {
|
|
|
|
|
$this->arrayUserUpdateChecked[$username] = 1;
|
|
|
|
|
$arrayUserDataUpdate = [];
|
|
|
|
|
$extendedData = [];
|
|
|
|
|
|
|
|
|
|
foreach ($arrayAttributesToSync as $key => $value) {
|
|
|
|
|
$fieldName = $key;
|
|
|
|
|
$attributeName = strtolower($value);
|
|
|
|
|
|
|
|
|
|
if (isset($arrayUserLdap[$attributeName])) {
|
|
|
|
|
$ldapAttributeValue = trim((is_array($arrayUserLdap[$attributeName])) ? $arrayUserLdap[$attributeName][0] : $arrayUserLdap[$attributeName]);
|
|
|
|
|
|
|
|
|
|
switch ($fieldName) {
|
|
|
|
|
case 'USR_STATUS':
|
|
|
|
|
if ($attributeName == 'useraccountcontrol') {
|
|
|
|
|
$ldapAttributeValue = (preg_match('/^(?:' . '512|544|66048|66080' . ')$/', $ldapAttributeValue)) ? (($arrayUser[$username][$fieldName] == 'VACATION') ? 'VACATION' : 'ACTIVE') : 'INACTIVE';
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case 'USR_DUE_DATE':
|
|
|
|
|
if ($attributeName == 'accountexpires') {
|
|
|
|
|
$ldapAttributeValue = $this->convertDateADtoPM($ldapAttributeValue);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (isset($arrayUser[$username][$fieldName])) {
|
|
|
|
|
if ($ldapAttributeValue != $arrayUser[$username][$fieldName]) {
|
|
|
|
|
$arrayUserDataUpdate[$fieldName] = $ldapAttributeValue;
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
$extendedData[$fieldName] = $ldapAttributeValue;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Update the extended data
|
|
|
|
|
if (!empty($extendedData)) {
|
|
|
|
|
$json = $arrayUser[$username]['USR_EXTENDED_ATTRIBUTES_DATA'];
|
|
|
|
|
$oldExtendedData = empty($json) ? [] : json_decode($json, true);
|
|
|
|
|
$extendedData = array_merge($oldExtendedData, $extendedData);
|
|
|
|
|
$arrayUserDataUpdate['USR_EXTENDED_ATTRIBUTES_DATA'] = json_encode($extendedData);
|
|
|
|
|
}
|
|
|
|
|
// Update the user information
|
|
|
|
|
if (!empty($arrayUserDataUpdate)) {
|
|
|
|
|
$arrayUserDataUpdate['USR_UID'] = $arrayUser[$username]['USR_UID'];
|
|
|
|
|
// Update User data
|
|
|
|
|
$rbac->updateUser($arrayUserDataUpdate);
|
|
|
|
|
$user = new Users();
|
|
|
|
|
$result = $user->update($arrayUserDataUpdate);
|
|
|
|
|
}
|
|
|
|
|
// Remove the user from the array
|
|
|
|
|
unset($this->allListOfUsers[$username]);
|
|
|
|
|
} else {
|
|
|
|
|
$this->log(
|
|
|
|
|
$ldapcnn,
|
|
|
|
|
'User is repeated: Username "' . $username . '", DN "' . $arrayUserLdap['dn'] . '"'
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$flagUser = true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Return
|
|
|
|
|
return $flagUser;
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function setArrayDepartmentUsers($departmentUid)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$this->arrayDepartmentUsersByUid = [];
|
|
|
|
|
$this->arrayDepartmentUsersByUsername = [];
|
|
|
|
|
// Set data
|
|
|
|
|
$user = new User();
|
|
|
|
|
$filters = [
|
|
|
|
|
'fields' => ['USR_UID', 'USR_USERNAME', 'USR_REPORTS_TO'],
|
|
|
|
|
'limit' => 10000,
|
|
|
|
|
'conditions' => [['USR_STATUS', '!=', 'CLOSED'], ['DEP_UID', '=', $departmentUid]]
|
|
|
|
|
];
|
|
|
|
|
$usersDepartment = $user->show($filters);
|
|
|
|
|
foreach ($usersDepartment['data'] ?? [] as $userData) {
|
|
|
|
|
$this->arrayDepartmentUsersByUid[$userData['USR_UID']] = $userData;
|
|
|
|
|
$this->arrayDepartmentUsersByUsername[$userData['USR_USERNAME']] = $userData;
|
|
|
|
|
}
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function deactiveArrayOfUsers($aUsers)
|
|
|
|
|
{
|
|
|
|
|
$aUsrUid = [];
|
|
|
|
|
foreach ($aUsers as $key => $val) {
|
|
|
|
|
$aUsrUid[] = $val['sUsername'];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$rbacUsers = new RbacUsers();
|
|
|
|
|
$rbacUsers->updateDataFromListUsersUids(['USR_STATUS' => '0'], $aUsrUid);
|
|
|
|
|
|
|
|
|
|
$user = new User();
|
|
|
|
|
$user->updateDataFromListUsersUids(['USR_STATUS' => 'INACTIVE', 'DEP_UID' => ''], $aUsrUid);
|
|
|
|
|
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
2025-09-22 22:29:47 +00:00
|
|
|
public function departmentSynchronizeUser($departmentUid, array $arrayUserLdap, array $arrayData)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function departmentSynchronizeUser() > START");
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function departmentSynchronizeUser() > \$arrayUserLdap[sUsername] ----> " . $arrayUserLdap["sUsername"]);
|
|
|
|
|
|
|
|
|
|
$userUid = "";
|
|
|
|
|
$found = false;
|
|
|
|
|
|
|
|
|
|
$arrayUserData = $this->departmentGetUserDataIfUsernameExists($arrayUserLdap["sUsername"]);
|
|
|
|
|
|
|
|
|
|
if (!empty($arrayUserData)) {
|
|
|
|
|
//User already exists in this department and there is nothing to do
|
|
|
|
|
//User already exists
|
|
|
|
|
$userUid = $arrayUserData["USR_UID"];
|
|
|
|
|
$found = true;
|
|
|
|
|
$arrayData["already"]++;
|
|
|
|
|
$arrayData["alreadyUsers"] .= $arrayUserData["USR_USERNAME"] . " ";
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!$found) {
|
|
|
|
|
//If user DO NOT exists in this department.. do:
|
|
|
|
|
//If exists with another AuthSource -> impossible
|
|
|
|
|
//If exists in another department, but in PM and for this authsource, we need to move it
|
|
|
|
|
//$arrayNewUserData = $this->searchUserByUid($arrayUserLdap["sUsername"]);
|
|
|
|
|
$arrayNewUserData = $arrayUserLdap;
|
|
|
|
|
|
|
|
|
|
$arrayAux = $this->custom_ldap_explode_dn($arrayNewUserData["sDN"]);
|
|
|
|
|
array_shift($arrayAux);
|
|
|
|
|
|
|
|
|
|
$departmentUid = $this->getDepUidIfExistsDN(implode(",", $arrayAux)); //Check if exists the Department DN in DB
|
|
|
|
|
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function departmentSynchronizeUser() > \$departmentUid ----> $departmentUid");
|
|
|
|
|
|
|
|
|
|
if ($departmentUid != "") {
|
|
|
|
|
$arrayUserData = $this->authenticationSourceGetUserDataIfUsernameExists($arrayNewUserData["sUsername"]);
|
|
|
|
|
|
|
|
|
|
if (!empty($arrayUserData)) {
|
|
|
|
|
//User exists in this Authentication Source
|
|
|
|
|
//Move User
|
|
|
|
|
$userUid = $arrayUserData["USR_UID"];
|
|
|
|
|
|
|
|
|
|
$this->activateUser($arrayUserData["USR_UID"], $arrayNewUserData["sDN"], $departmentUid);
|
|
|
|
|
|
|
|
|
|
$arrayData["moved"]++;
|
|
|
|
|
$arrayData["movedUsers"] .= $arrayUserData["USR_USERNAME"] . " ";
|
|
|
|
|
|
|
|
|
|
$this->setArrayAuthenticationSourceUser($userUid, $arrayNewUserData); //INITIALIZE DATA //Update User
|
|
|
|
|
} else {
|
|
|
|
|
$arrayUserData = $this->getUserFromPM($arrayNewUserData["sUsername"]);
|
|
|
|
|
|
|
|
|
|
if (!empty($arrayUserData)) {
|
|
|
|
|
//User exists in another Authentication Source and another Department
|
|
|
|
|
//Impossible
|
|
|
|
|
$userUid = $arrayUserData["USR_UID"];
|
|
|
|
|
|
|
|
|
|
$arrayData["impossible"]++;
|
|
|
|
|
$arrayData["impossibleUsers"] .= $arrayUserData["USR_USERNAME"] . " ";
|
|
|
|
|
} else {
|
|
|
|
|
//User not exists
|
|
|
|
|
//Create User
|
|
|
|
|
$userUid = $this->createUserAndActivate($arrayNewUserData, $departmentUid);
|
|
|
|
|
|
|
|
|
|
$arrayData["created"]++;
|
|
|
|
|
$arrayData["createdUsers"] .= $arrayNewUserData["sUsername"] . " ";
|
|
|
|
|
|
|
|
|
|
$this->setArrayAuthenticationSourceUser($userUid, $arrayNewUserData); //INITIALIZE DATA //Add User
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ($userUid != "") {
|
|
|
|
|
$arrayData["arrayUserUid"][] = $userUid;
|
|
|
|
|
|
|
|
|
|
if (isset($arrayUserLdap["sManagerDN"]) && $arrayUserLdap["sManagerDN"] != "") {
|
|
|
|
|
if (!isset($arrayData["managersHierarchy"][$arrayUserLdap["sManagerDN"]])) {
|
|
|
|
|
$arrayData["managersHierarchy"][$arrayUserLdap["sManagerDN"]] = [];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$arrayData["managersHierarchy"][$arrayUserLdap["sManagerDN"]][$userUid] = $userUid;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function departmentSynchronizeUser() > \$userUid ----> $userUid");
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function departmentSynchronizeUser() > END");
|
|
|
|
|
|
|
|
|
|
return $arrayData;
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2025-10-07 02:22:03 +00:00
|
|
|
public function createUserAndActivate($user, $depUid)
|
|
|
|
|
{
|
|
|
|
|
$rbac = RBAC::getSingleton();
|
|
|
|
|
|
|
|
|
|
if ($rbac->userObj == null) {
|
|
|
|
|
$rbac->userObj = new RbacUsersModel();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ($rbac->rolesObj == null) {
|
|
|
|
|
$rbac->rolesObj = new RolesModel();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ($rbac->usersRolesObj == null) {
|
|
|
|
|
$rbac->usersRolesObj = new UsersRolesModel();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$sUsername = $user['sUsername'];
|
|
|
|
|
$sFullname = $user['sFullname'];
|
|
|
|
|
$sFirstname = $user['sFirstname'];
|
|
|
|
|
$sLastname = $user['sLastname'];
|
|
|
|
|
$sEmail = $user['sEmail'];
|
|
|
|
|
$sDn = $user['sDN'];
|
|
|
|
|
$usrRole = empty($user['usrRole']) ? 'LURANA_OPERATOR' : $user['usrRole'];
|
|
|
|
|
|
|
|
|
|
$data = [];
|
|
|
|
|
$data['USR_USERNAME'] = $sUsername;
|
|
|
|
|
$data["USR_PASSWORD"] = "00000000000000000000000000000000";
|
|
|
|
|
$data['USR_FIRSTNAME'] = $sFirstname;
|
|
|
|
|
$data['USR_LASTNAME'] = $sLastname;
|
|
|
|
|
$data['USR_EMAIL'] = $sEmail;
|
|
|
|
|
$data['USR_DUE_DATE'] = date('Y-m-d', mktime(0, 0, 0, date('m'), date('d'), date('Y') + 2));
|
|
|
|
|
$data['USR_CREATE_DATE'] = date('Y-m-d H:i:s');
|
|
|
|
|
$data['USR_UPDATE_DATE'] = date('Y-m-d H:i:s');
|
|
|
|
|
$data['USR_BIRTHDAY'] = date('Y-m-d');
|
|
|
|
|
$data['USR_STATUS'] = 1;
|
|
|
|
|
$data['USR_AUTH_TYPE'] = 'ldapadvanced';
|
|
|
|
|
$data['UID_AUTH_SOURCE'] = $this->authSourceUid;
|
|
|
|
|
$data['USR_AUTH_USER_DN'] = $sDn;
|
|
|
|
|
|
|
|
|
|
$userUid = $rbac->createUser($data, $usrRole);
|
|
|
|
|
|
|
|
|
|
$data['USR_STATUS'] = 'ACTIVE';
|
|
|
|
|
$data['USR_UID'] = $userUid;
|
|
|
|
|
$data['DEP_UID'] = $depUid;
|
|
|
|
|
$data['USR_ROLE'] = $usrRole;
|
|
|
|
|
|
|
|
|
|
$users = new Users();
|
|
|
|
|
$users->create($data);
|
|
|
|
|
|
|
|
|
|
return $userUid;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function getDepUidIfExistsDN($currentDN)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$department = new Department();
|
|
|
|
|
$filters = [
|
|
|
|
|
'fields' => ['DEP_UID', 'DEP_LDAP_DN'],
|
|
|
|
|
'conditions' => [['DEP_STATUS', '=', 'ACTIVE'], ['DEP_LDAP_DN', '=', $currentDN]],
|
|
|
|
|
'limit' => 1
|
|
|
|
|
];
|
|
|
|
|
$departmentsData = $department->show($filters);
|
|
|
|
|
if (!empty($departmentsData['data']) && isset($departmentsData['data'][0]['DEP_UID'])) {
|
|
|
|
|
return $departmentsData['data'][0]['DEP_UID'];
|
|
|
|
|
}
|
|
|
|
|
return '';
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function activateUser($userUid, $userDn = null, $depUid = null)
|
|
|
|
|
{
|
|
|
|
|
$rbacUsers = new RbacUsers();
|
|
|
|
|
$setData = [
|
|
|
|
|
'USR_STATUS' => '1'
|
|
|
|
|
];
|
|
|
|
|
if ($userDn != null) {
|
|
|
|
|
$setData['USR_AUTH_USER_DN'] = $userDn;
|
|
|
|
|
$setData['USR_AUTH_SUPERVISOR_DN'] = '';
|
|
|
|
|
}
|
|
|
|
|
$rbacUsers->updateData(
|
|
|
|
|
$setData,
|
|
|
|
|
['USR_UID' => $userUid]
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
$user = new User();
|
|
|
|
|
$setData = [
|
|
|
|
|
'USR_STATUS' => 'ACTIVE'
|
|
|
|
|
];
|
|
|
|
|
if ($depUid != null) {
|
|
|
|
|
$setData['DEP_UID'] = $depUid;
|
|
|
|
|
}
|
|
|
|
|
$user->updateData(
|
|
|
|
|
$setData,
|
|
|
|
|
['USR_UID' => $userUid]
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function getUserFromPM($username)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$user = new User();
|
|
|
|
|
$dataUser = $user->show([
|
|
|
|
|
'fields' => ['USR_UID', 'USR_USERNAME', 'DEP_UID'],
|
|
|
|
|
'conditions' => [['USR_USERNAME', '=', $username], ['USR_STATUS', '!=', 'CLOSED']],
|
|
|
|
|
'limit' => 1
|
|
|
|
|
]);
|
|
|
|
|
if (!empty($dataUser) && isset($dataUser['data'][0])) {
|
|
|
|
|
return $dataUser['data'][0];
|
|
|
|
|
}
|
|
|
|
|
return [];
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2025-10-07 11:13:49 -04:00
|
|
|
public function setArrayGroupUsers($groupUid)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$this->arrayGroupUsersByUid = [];
|
|
|
|
|
$this->arrayGroupUsersByUsername = [];
|
|
|
|
|
|
|
|
|
|
$groupUser = new GroupUser();
|
|
|
|
|
$filters = [
|
|
|
|
|
'fields' => ['GROUP_USER.GRP_UID', 'GROUP_USER.USR_UID', 'USERS.USR_USERNAME', 'USERS.USR_REPORTS_TO'],
|
|
|
|
|
'limit' => 10000,
|
|
|
|
|
'orderBy' => ['USERS.USR_USERNAME', 'ASC'],
|
|
|
|
|
'conditions' => [['GRP_UID', '=', $groupUid], ['USR_STATUS', '!=', 'CLOSED']]
|
|
|
|
|
];
|
|
|
|
|
$groupUserData = $groupUser->getUsersByGroupId($filters);
|
|
|
|
|
|
|
|
|
|
foreach ($groupUserData['data'] ?? [] as $userData) {
|
|
|
|
|
$this->arrayGroupUsersByUid[$userData['USR_UID']] = $userData;
|
|
|
|
|
$this->arrayGroupUsersByUsername[$userData['USR_USERNAME']] = $userData;
|
|
|
|
|
}
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function ldapGetUsersFromGroup($option, array $arrayGroupData, array $arrayData = [])
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromGroup() > START");
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromGroup() > \$arrayGroupData ---->\n" . print_r($arrayGroupData, true));
|
|
|
|
|
|
|
|
|
|
$totalUser = 0;
|
|
|
|
|
$countUser = 0;
|
|
|
|
|
|
|
|
|
|
//Set variables
|
|
|
|
|
$dn = trim($arrayGroupData["GRP_LDAP_DN"]);
|
|
|
|
|
$rbac = RBAC::getSingleton();
|
|
|
|
|
|
|
|
|
|
if (is_null($rbac->authSourcesObj)) {
|
|
|
|
|
$rbac->authSourcesObj = new AuthenticationSource();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$filters = ['conditions' => ['AUTH_SOURCE_UID'=> $this->authSourceUid]];
|
|
|
|
|
$rbacAuthenticationSource = new RbacAuthenticationSource();
|
|
|
|
|
$authSourceReturn = $rbacAuthenticationSource->show($filters);
|
|
|
|
|
$authenticationSourceData = $authSourceReturn['data'][0];
|
|
|
|
|
$authenticationSourceData['AUTH_SOURCE_DATA'] = json_decode($authenticationSourceData['AUTH_SOURCE_DATA'], true);
|
|
|
|
|
$authenticationSourceData['AUTH_SOURCE_PASSWORD'] = G::decrypt($authenticationSourceData['AUTH_SOURCE_PASSWORD'], URL_KEY);
|
|
|
|
|
|
|
|
|
|
if (is_null($this->ldapcnn)) {
|
|
|
|
|
$ldapcnn = $this->ldapConnection($authenticationSourceData);
|
|
|
|
|
$this->ldapcnn = $ldapcnn['connection'];
|
|
|
|
|
}
|
|
|
|
|
$ldapcnn = $this->ldapcnn;
|
|
|
|
|
|
|
|
|
|
//Get Group members
|
|
|
|
|
$memberAttribute = $this->arrayAttributes[$authenticationSourceData["AUTH_SOURCE_DATA"]["LDAP_TYPE"]]["member"];
|
|
|
|
|
$filter = "(" . $this->arrayObjectClassFilter["group"] . ")";
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromGroup() > \$filter ----> $filter");
|
|
|
|
|
$searchResult = @ldap_search($ldapcnn, $dn, $filter, array($memberAttribute));
|
|
|
|
|
$context = [
|
|
|
|
|
"baseDN" => $dn,
|
|
|
|
|
"filter" => $filter,
|
|
|
|
|
"attributes" => [$memberAttribute]
|
|
|
|
|
];
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_search", $context);
|
|
|
|
|
|
|
|
|
|
if ($error = ldap_errno($ldapcnn)) {
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromGroup() > ldap_search > ERROR > \$error ---->\n" . print_r($error, true));
|
|
|
|
|
} else {
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromGroup() > ldap_search > OK1");
|
|
|
|
|
|
|
|
|
|
if ($searchResult) {
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromGroup() > ldap_search > OK2");
|
|
|
|
|
$numEntries = ldap_count_entries($ldapcnn, $searchResult);
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_count_entries");
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromGroup() > ldap_search > OK2 > \$numEntries ----> $numEntries");
|
|
|
|
|
|
|
|
|
|
if ($numEntries > 0) {
|
|
|
|
|
$entry = ldap_first_entry($ldapcnn, $searchResult);
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_first_entry");
|
|
|
|
|
$arrayGroupLdap = $this->ldapGetAttributes($ldapcnn, $entry);
|
|
|
|
|
// Syncronize members
|
|
|
|
|
$flagMemberRange = false;
|
|
|
|
|
$memberAttribute2 = $memberAttribute;
|
|
|
|
|
|
|
|
|
|
if (isset($arrayGroupLdap[$memberAttribute]) && empty($arrayGroupLdap[$memberAttribute])) {
|
|
|
|
|
foreach ($arrayGroupLdap as $key => $value) {
|
|
|
|
|
if (preg_match('/^member;range=\d+\-\d+$/i', $key)) {
|
|
|
|
|
$memberAttribute2 = $key;
|
|
|
|
|
$flagMemberRange = true;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$arrayData = $this->ldapGroupSynchronizeMembers(
|
|
|
|
|
$ldapcnn,
|
|
|
|
|
$authenticationSourceData,
|
|
|
|
|
$arrayGroupData['GRP_UID'],
|
|
|
|
|
$arrayGroupLdap,
|
|
|
|
|
$memberAttribute2,
|
|
|
|
|
array_merge($arrayData, ['totalUser' => $totalUser, 'countUser' => $countUser])
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
$totalUser = $arrayData['totalUser'];
|
|
|
|
|
$countUser = $arrayData['countUser'];
|
|
|
|
|
|
|
|
|
|
$limitMemberRange = (isset($arrayData['countMembers'])) ? $arrayData['countMembers'] : 0;
|
|
|
|
|
|
|
|
|
|
if ($flagMemberRange) {
|
|
|
|
|
for ($start = $limitMemberRange; true; $start += $limitMemberRange) {
|
|
|
|
|
$end = $start + $limitMemberRange - 1;
|
|
|
|
|
$memberAttribute2 = $memberAttribute . ';range=' . $start . '-' . $end;
|
|
|
|
|
$searchResult = @ldap_search($ldapcnn, $dn, $filter, [$memberAttribute2]);
|
|
|
|
|
$context = [
|
|
|
|
|
"baseDN" => $dn,
|
|
|
|
|
"filter" => $filter,
|
|
|
|
|
"attributes" => [$memberAttribute2]
|
|
|
|
|
];
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_search", $context);
|
|
|
|
|
|
|
|
|
|
if ($error = ldap_errno($ldapcnn)) {
|
|
|
|
|
break;
|
|
|
|
|
} else {
|
|
|
|
|
if ($searchResult) {
|
|
|
|
|
if (ldap_count_entries($ldapcnn, $searchResult) > 0) {
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_count_entries");
|
|
|
|
|
$entry = ldap_first_entry($ldapcnn, $searchResult);
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_first_entry");
|
|
|
|
|
$arrayGroupLdap = $this->ldapGetAttributes($ldapcnn, $entry);
|
|
|
|
|
|
|
|
|
|
foreach ($arrayGroupLdap as $key => $value) {
|
|
|
|
|
if (preg_match('/^member;range=\d+\-\*$/i', $key)) {
|
|
|
|
|
$memberAttribute2 = $key;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$arrayData = $this->ldapGroupSynchronizeMembers(
|
|
|
|
|
$ldapcnn,
|
|
|
|
|
$authenticationSourceData,
|
|
|
|
|
$arrayGroupData['GRP_UID'],
|
|
|
|
|
$arrayGroupLdap,
|
|
|
|
|
$memberAttribute2,
|
|
|
|
|
array_merge($arrayData, ['totalUser' => $totalUser, 'countUser' => $countUser])
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
$totalUser = $arrayData['totalUser'];
|
|
|
|
|
$countUser = $arrayData['countUser'];
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$this->log($ldapcnn, "Found $totalUser users in group $dn");
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function ldapGetUsersFromGroup() > END");
|
|
|
|
|
|
|
|
|
|
//Return
|
|
|
|
|
return $arrayData;
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private function ldapGroupSynchronizeMembers($ldapcnn, array $arrayAuthSourceData, $groupUid, array $arrayGroupLdap, $memberAttribute, array $arrayData = [])
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
unset($arrayData['countMembers']);
|
|
|
|
|
|
|
|
|
|
//Get members
|
|
|
|
|
if (!isset($arrayAuthSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_USERS_FILTER'])) {
|
|
|
|
|
$arrayAuthSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_USERS_FILTER'] = '';
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$uidUserIdentifier = (isset($arrayAuthSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_IDENTIFIER_FOR_USER'])) ?
|
|
|
|
|
$arrayAuthSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_IDENTIFIER_FOR_USER'] : 'uid';
|
|
|
|
|
|
|
|
|
|
$filterUsers = trim($arrayAuthSourceData['AUTH_SOURCE_DATA']['AUTH_SOURCE_USERS_FILTER']);
|
|
|
|
|
|
|
|
|
|
$filter = ($filterUsers != '') ? $filterUsers : '(' . $this->arrayObjectClassFilter['user'] . ')';
|
|
|
|
|
|
|
|
|
|
if (isset($arrayGroupLdap[$memberAttribute])) {
|
|
|
|
|
if (!is_array($arrayGroupLdap[$memberAttribute])) {
|
|
|
|
|
$arrayGroupLdap[$memberAttribute] = [$arrayGroupLdap[$memberAttribute]];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$arrayData['countMembers'] = count($arrayGroupLdap[$memberAttribute]);
|
|
|
|
|
$arrayData['totalUser'] += $arrayData['countMembers'];
|
|
|
|
|
|
|
|
|
|
//Synchronize members
|
|
|
|
|
foreach ($arrayGroupLdap[$memberAttribute] as $value) {
|
|
|
|
|
$member = $value; //User DN
|
|
|
|
|
|
|
|
|
|
$searchResult = @ldap_search($ldapcnn, $member, $filter, $this->arrayAttributesForUser);
|
|
|
|
|
$context = [
|
|
|
|
|
"baseDN" => $member,
|
|
|
|
|
"filter" => $filter,
|
|
|
|
|
"attributes" => $this->arrayAttributesForUser
|
|
|
|
|
];
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_search", $context);
|
|
|
|
|
|
|
|
|
|
if ($error = ldap_errno($ldapcnn)) {
|
|
|
|
|
//
|
|
|
|
|
} else {
|
|
|
|
|
if ($searchResult) {
|
|
|
|
|
if (ldap_count_entries($ldapcnn, $searchResult) > 0) {
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_count_entries");
|
|
|
|
|
$entry = ldap_first_entry($ldapcnn, $searchResult);
|
|
|
|
|
$this->stdLog($ldapcnn, "ldap_first_entry");
|
|
|
|
|
$arrayUserLdap = $this->ldapGetAttributes($ldapcnn, $entry);
|
|
|
|
|
$username = (isset($arrayUserLdap[$uidUserIdentifier])) ? $arrayUserLdap[$uidUserIdentifier] : '';
|
|
|
|
|
$arrayData['countUser']++;
|
|
|
|
|
|
|
|
|
|
if ((is_array($username) && !empty($username)) || trim($username) != '') {
|
|
|
|
|
$dataUserLdap = $this->getUserDataFromAttribute($username, $arrayUserLdap);
|
|
|
|
|
$dataUserLdap["usrRole"] = "";
|
|
|
|
|
if (!empty($arrayAuthSourceData['AUTH_SOURCE_DATA']['USR_ROLE'])) {
|
|
|
|
|
$dataUserLdap["usrRole"] = $arrayAuthSourceData['AUTH_SOURCE_DATA']['USR_ROLE'];
|
|
|
|
|
}
|
|
|
|
|
$arrayData = $this->groupSynchronizeUser(
|
|
|
|
|
$groupUid,
|
|
|
|
|
$dataUserLdap,
|
|
|
|
|
$arrayData
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//Progress bar
|
|
|
|
|
$this->frontEndShow(
|
|
|
|
|
'BAR',
|
|
|
|
|
'Groups: ' . $arrayData['i'] . '/' . $arrayData['n'] . ' ' .
|
|
|
|
|
$this->progressBar($arrayData['totalUser'], $arrayData['countUser'])
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
// Return
|
|
|
|
|
return $arrayData;
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function groupSynchronizeUser($groupUid, array $arrayUserLdap, array $arrayData)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function groupSynchronizeUser() > START");
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function groupSynchronizeUser() > \$arrayUserLdap[sUsername] ----> " . $arrayUserLdap["sUsername"]);
|
|
|
|
|
|
|
|
|
|
$group = new Groups();
|
|
|
|
|
|
|
|
|
|
$userUid = "";
|
|
|
|
|
$found = false;
|
|
|
|
|
|
|
|
|
|
$arrayUserData = $this->groupGetUserDataIfUsernameExists($arrayUserLdap["sUsername"]);
|
|
|
|
|
|
|
|
|
|
if (!empty($arrayUserData)) {
|
|
|
|
|
//User already exists in this group and there is nothing to do
|
|
|
|
|
//User already exists
|
|
|
|
|
$userUid = $arrayUserData["USR_UID"];
|
|
|
|
|
$found = true;
|
|
|
|
|
|
|
|
|
|
$arrayData["already"]++;
|
|
|
|
|
$arrayData["alreadyUsers"] .= $arrayUserData["USR_USERNAME"] . " ";
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!$found) {
|
|
|
|
|
//If user DO NOT exists in this group.. do:
|
|
|
|
|
//If exists with another AuthSource -> impossible
|
|
|
|
|
//If exists in another group, but in PM and for this authsource, we need to move it
|
|
|
|
|
//$arrayNewUserData = $this->searchUserByUid($arrayUserLdap["sUsername"]);
|
|
|
|
|
$arrayNewUserData = $arrayUserLdap;
|
|
|
|
|
|
|
|
|
|
$arrayUserData = $this->authenticationSourceGetUserDataIfUsernameExists($arrayNewUserData["sUsername"]);
|
|
|
|
|
|
|
|
|
|
if (!empty($arrayUserData)) {
|
|
|
|
|
//User exists in this Authentication Source
|
|
|
|
|
//Move User
|
|
|
|
|
$userUid = $arrayUserData["USR_UID"];
|
|
|
|
|
|
|
|
|
|
$this->activateUser($arrayUserData["USR_UID"], $arrayNewUserData["sDN"]);
|
|
|
|
|
|
|
|
|
|
$group->addUserToGroup($groupUid, $userUid);
|
|
|
|
|
|
|
|
|
|
$arrayData["moved"]++;
|
|
|
|
|
$arrayData["movedUsers"] .= $arrayUserData["USR_USERNAME"] . " ";
|
|
|
|
|
|
|
|
|
|
$this->setArrayAuthenticationSourceUser($userUid, $arrayNewUserData); //INITIALIZE DATA //Update User
|
|
|
|
|
} else {
|
|
|
|
|
$arrayUserData = $this->getUserFromPM($arrayNewUserData["sUsername"]);
|
|
|
|
|
|
|
|
|
|
if (!empty($arrayUserData)) {
|
|
|
|
|
//User exists in another Authentication Source and another Group
|
|
|
|
|
//Impossible
|
|
|
|
|
$userUid = $arrayUserData["USR_UID"];
|
|
|
|
|
|
|
|
|
|
$arrayData["impossible"]++;
|
|
|
|
|
$arrayData["impossibleUsers"] .= $arrayUserData["USR_USERNAME"] . " ";
|
|
|
|
|
} else {
|
|
|
|
|
//User not exists
|
|
|
|
|
//Create User
|
|
|
|
|
$userUid = $this->createUserAndActivate($arrayNewUserData, "");
|
|
|
|
|
|
|
|
|
|
$group->addUserToGroup($groupUid, $userUid);
|
|
|
|
|
|
|
|
|
|
$arrayData["created"]++;
|
|
|
|
|
$arrayData["createdUsers"] .= $arrayNewUserData["sUsername"] . " ";
|
|
|
|
|
|
|
|
|
|
$this->setArrayAuthenticationSourceUser($userUid, $arrayNewUserData); //INITIALIZE DATA //Add User
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ($userUid != "") {
|
|
|
|
|
$arrayData["arrayUserUid"][] = $userUid;
|
|
|
|
|
|
|
|
|
|
if (isset($arrayUserLdap["sManagerDN"]) && $arrayUserLdap["sManagerDN"] != "") {
|
|
|
|
|
if (!isset($arrayData["managersHierarchy"][$arrayUserLdap["sManagerDN"]])) {
|
|
|
|
|
$arrayData["managersHierarchy"][$arrayUserLdap["sManagerDN"]] = [];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$arrayData["managersHierarchy"][$arrayUserLdap["sManagerDN"]][$userUid] = $userUid;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function groupSynchronizeUser() > \$userUid ----> $userUid");
|
|
|
|
|
$this->debugLog("class.ldapAdvanced.php > function groupSynchronizeUser() > END");
|
|
|
|
|
|
|
|
|
|
//Return
|
|
|
|
|
return $arrayData;
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2025-10-07 02:22:03 +00:00
|
|
|
public function authenticationSourceGetUserDataIfUsernameExists($username)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
if (isset($this->arrayAuthenticationSourceUsersByUsername[$username])) {
|
|
|
|
|
return $this->arrayAuthenticationSourceUsersByUsername[$username];
|
|
|
|
|
}
|
|
|
|
|
// Return
|
|
|
|
|
return [];
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function departmentGetUserDataIfUsernameExists($username)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
if (isset($this->arrayDepartmentUsersByUsername[$username])) {
|
|
|
|
|
return $this->arrayDepartmentUsersByUsername[$username];
|
|
|
|
|
}
|
|
|
|
|
// Return
|
|
|
|
|
return [];
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function setArrayAuthenticationSourceUser($userUid, array $arrayUserLdap)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$arrayUserData = [
|
|
|
|
|
"USR_UID" => $userUid,
|
|
|
|
|
"USR_USERNAME" => $arrayUserLdap["sUsername"],
|
|
|
|
|
"USR_AUTH_USER_DN" => $arrayUserLdap["sDN"]
|
|
|
|
|
];
|
|
|
|
|
// Set data
|
|
|
|
|
$this->arrayAuthenticationSourceUsersByUid[$arrayUserData["USR_UID"]] = $arrayUserData;
|
|
|
|
|
$this->arrayAuthenticationSourceUsersByUsername[$arrayUserData["USR_USERNAME"]] = $arrayUserData;
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2025-09-22 22:29:47 +00:00
|
|
|
public function debugLog($text)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
if ($this->debug) {
|
|
|
|
|
$this->log(null, "DEBUG: $text");
|
|
|
|
|
}
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private function convertDateADtoPM($dateAD)
|
|
|
|
|
{
|
|
|
|
|
$unixTimestamp = ($dateAD / 10000000) - 11644560000;
|
|
|
|
|
$datePM = date('Y-m-d', mktime(0, 0, 0, date('m'), '01', date('Y') + 2));
|
|
|
|
|
if ($unixTimestamp > 0) {
|
|
|
|
|
$dateAux = date("Y-m-d", $unixTimestamp);
|
|
|
|
|
$yearAux = date("Y", $unixTimestamp);
|
|
|
|
|
if (strlen(trim($yearAux)) <= 4) {
|
|
|
|
|
$datePM = $dateAux;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return $datePM;
|
|
|
|
|
}
|
2025-10-07 02:22:03 +00:00
|
|
|
|
|
|
|
|
public function setDebug($debug)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$this->debug = $debug;
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function setFrontEnd($flag)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$this->frontEnd = $flag;
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function frontEndShow($option, $data = "")
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
if (!$this->frontEnd) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$numc = 100;
|
|
|
|
|
|
|
|
|
|
switch ($option) {
|
|
|
|
|
case "BAR":
|
|
|
|
|
echo "\r" . "| " . $data . str_repeat(" ", $numc - 2 - strlen($data));
|
|
|
|
|
break;
|
|
|
|
|
case "TEXT":
|
|
|
|
|
echo "\r" . "| " . $data . str_repeat(" ", $numc - 2 - strlen($data)) . "\n";
|
|
|
|
|
break;
|
|
|
|
|
default: //START, END
|
|
|
|
|
echo "\r" . "+" . str_repeat("-", $numc - 2) . "+" . "\n";
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2025-10-07 11:13:49 -04:00
|
|
|
public function groupGetUserDataIfUsernameExists($username)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
if (isset($this->arrayGroupUsersByUsername[$username])) {
|
|
|
|
|
return $this->arrayGroupUsersByUsername[$username];
|
|
|
|
|
}
|
|
|
|
|
// Return
|
|
|
|
|
return [];
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
2025-10-07 02:22:03 +00:00
|
|
|
|
|
|
|
|
public function setArrayAuthenticationSourceUsers($authSourceUid = '')
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
if (empty($authSourceUid)) {
|
|
|
|
|
$authSourceUid = $this->authSourceUid;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$this->arrayAuthenticationSourceUsersByUid = [];
|
|
|
|
|
$this->arrayAuthenticationSourceUsersByUsername = [];
|
|
|
|
|
|
|
|
|
|
$filters = [
|
|
|
|
|
'select' => ['USR_USERNAME', 'USR_UID', 'USR_AUTH_USER_DN'],
|
|
|
|
|
'fields' => ['USR_USERNAME', 'USR_UID'],
|
|
|
|
|
'conditions' => [
|
|
|
|
|
'UID_AUTH_SOURCE' => $authSourceUid,
|
|
|
|
|
'USR_AUTH_TYPE' => 'ldapadvanced',
|
|
|
|
|
'USR_STATUS' => 1
|
|
|
|
|
]
|
|
|
|
|
];
|
|
|
|
|
$rbacUsers = new RbacUsers();
|
|
|
|
|
$usersByAuthSource = $rbacUsers->show($filters);
|
|
|
|
|
|
|
|
|
|
foreach ($usersByAuthSource['data'] ?? [] as $row) {
|
|
|
|
|
$this->arrayAuthenticationSourceUsersByUid[$row["USR_UID"]] = $row;
|
|
|
|
|
$this->arrayAuthenticationSourceUsersByUsername[$row["USR_USERNAME"]] = $row;
|
|
|
|
|
}
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function clearManager($usersUIDs)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$criteriaSet = new Criteria('workflow');
|
|
|
|
|
$criteriaSet->add(UsersPeer::USR_REPORTS_TO, '');
|
|
|
|
|
$criteriaWhere = new Criteria('workflow');
|
|
|
|
|
$criteriaWhere->add(UsersPeer::USR_UID, $usersUIDs, Criteria::IN);
|
|
|
|
|
BasePeer::doUpdate($criteriaWhere, $criteriaSet, Propel::getConnection('workflow'));
|
|
|
|
|
} catch (Exception $error) {
|
|
|
|
|
$this->log($this->ldapcnn, $error->getMessage());
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function getUsersFromRemovedOu($aAuthSource)
|
|
|
|
|
{
|
|
|
|
|
$aUsers = []; //empty array is the default result
|
|
|
|
|
$attributes = $aAuthSource["AUTH_SOURCE_DATA"];
|
|
|
|
|
$this->sTerminatedOu = isset($attributes['AUTH_SOURCE_RETIRED_OU']) ? trim($attributes['AUTH_SOURCE_RETIRED_OU']) : '';
|
|
|
|
|
|
|
|
|
|
if ($this->sTerminatedOu == '') {
|
|
|
|
|
return $aUsers;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $this->getUsersFromDepartmentByName($this->sTerminatedOu);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function synchronizeManagers($managersHierarchy)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
foreach ($managersHierarchy as $managerDN => $subordinates) {
|
|
|
|
|
$rbacUser = new RbacUsers();
|
|
|
|
|
$rbacUsersData = $rbacUser->show(['conditions' => ['USR_AUTH_USER_DN' => $managerDN]]);
|
|
|
|
|
|
|
|
|
|
if (!empty($rbacUsersData['data'])) {
|
|
|
|
|
$user = new User();
|
|
|
|
|
$userData['USR_REPORTS_TO'] = $rbacUsersData['data'][0]['USR_UID'];
|
|
|
|
|
$user->updateDataFromListUsersUids($userData, $subordinates);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
} catch (Exception $error) {
|
|
|
|
|
$this->log($this->ldapcnn, $error->getMessage());
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function progressBar($total, $count)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$p = (int) (($count * 100) / $total);
|
|
|
|
|
$n = (int) ($p / 2);
|
|
|
|
|
|
|
|
|
|
return "[" . str_repeat("|", $n) . str_repeat(" ", 50 - $n) . "] $p%";
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function getRegisteredDepartments(array $arrayLdapDepartment, array $arrayDbDepartment)
|
|
|
|
|
{
|
|
|
|
|
$aResult = [];
|
|
|
|
|
|
|
|
|
|
if (!empty($arrayLdapDepartment)) {
|
|
|
|
|
$arrayLdapDepartment[0]["ou"] = $arrayLdapDepartment[0]["ou"] . " " . $arrayLdapDepartment[0]["dn"]; //Discard ROOT
|
|
|
|
|
|
|
|
|
|
foreach ($arrayLdapDepartment as $ldapDept) {
|
|
|
|
|
foreach ($arrayDbDepartment as $department) {
|
|
|
|
|
if ($department["DEP_TITLE"] == $ldapDept["ou"] && $department["DEP_LDAP_DN"] == $ldapDept["dn"]) {
|
|
|
|
|
$aResult[] = $department;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $aResult;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function getRegisteredGroups(array $arrayLdapGroup, array $arrayDbGroup)
|
|
|
|
|
{
|
|
|
|
|
$aResult = [];
|
|
|
|
|
|
|
|
|
|
if (!empty($arrayLdapGroup)) {
|
|
|
|
|
foreach ($arrayLdapGroup as $ldapGroup) {
|
|
|
|
|
foreach ($arrayDbGroup as $group) {
|
|
|
|
|
if ($group["GRP_TITLE"] == $ldapGroup["cn"] && $group["GRP_LDAP_DN"] == $ldapGroup["dn"]) {
|
|
|
|
|
$aResult[] = $group;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $aResult;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function setArrayDepartmentUserSynchronizedChecked(array $arrayData)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$this->arrayDepartmentUserSynchronizedChecked = $arrayData;
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function setArrayUserUpdateChecked(array $arrayData)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
$this->arrayUserUpdateChecked = $arrayData;
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
throw $e;
|
|
|
|
|
}
|
|
|
|
|
}
|
2025-09-16 16:04:49 +00:00
|
|
|
}
|