mirror of
https://github.com/YunoHost-Apps/baikal_ynh.git
synced 2024-09-03 18:16:11 +02:00
Fix fake patch...
This commit is contained in:
parent
4c02e4f1ee
commit
d1e1592c2e
3 changed files with 205 additions and 211 deletions
|
@ -0,0 +1,130 @@
|
|||
<?php
|
||||
|
||||
namespace Baikal\Core;
|
||||
|
||||
/**
|
||||
* This is an abstract authentication, that allows to create external
|
||||
* authentication backends. User are automatic created, when the does not exists
|
||||
* in baikal (can disabled).
|
||||
*
|
||||
* @author Sascha Kuehndel (InuSasha) <dev@inusasha.de>
|
||||
* @license http://code.google.com/p/sabredav/wiki/License Modified BSD License
|
||||
*/
|
||||
abstract class AbstractExternalAuth extends \Sabre\DAV\Auth\Backend\AbstractBasic {
|
||||
|
||||
/**
|
||||
* enable autocreation of user
|
||||
*
|
||||
* @var PDO
|
||||
*/
|
||||
protected $enableAutoCreation;
|
||||
|
||||
/**
|
||||
* Reference to PDO connection
|
||||
*
|
||||
* @var PDO
|
||||
*/
|
||||
private $pdo;
|
||||
|
||||
/**
|
||||
* PDO table name we'll be using
|
||||
*
|
||||
* @var string
|
||||
*/
|
||||
private $tableName;
|
||||
|
||||
/**
|
||||
* Creates the backend object.
|
||||
*
|
||||
* If the filename argument is passed in, it will parse out the specified file fist.
|
||||
*
|
||||
* @param PDO $pdo
|
||||
* @param string $realm
|
||||
* @param string $tableName The PDO table name to use
|
||||
*/
|
||||
public function __construct(\PDO $pdo, $realm = 'BaikalDAV', $tableName = 'users') {
|
||||
|
||||
$this->pdo = $pdo;
|
||||
$this->tableName = $tableName;
|
||||
$this->enableAutoCreation = true;
|
||||
}
|
||||
|
||||
/**
|
||||
* Validates a username and password
|
||||
*
|
||||
* This method should return true or false depending on if login
|
||||
* succeeded.
|
||||
*
|
||||
* @param string $username
|
||||
* @param string $password
|
||||
* @return bool
|
||||
*/
|
||||
public function validateUserPass($username, $password) {
|
||||
|
||||
if (!$this->validateUserPassExternal($username, $password))
|
||||
return false;
|
||||
|
||||
$this->currentUser = $username;
|
||||
if ($this->enableAutoCreation)
|
||||
$this->autoUserCreation($username);
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
/**
|
||||
* Validates a username and password agains external backend
|
||||
*
|
||||
* This method should return true or false depending on if login
|
||||
* succeeded.
|
||||
*
|
||||
* @param string $username
|
||||
* @param string $password
|
||||
* @return bool
|
||||
*/
|
||||
public abstract function validateUserPassExternal($username, $password);
|
||||
|
||||
/**
|
||||
* return the displayname and email from the external Backend
|
||||
*
|
||||
* @param string $username
|
||||
* @return array ('displayname' => string, 'email' => string)
|
||||
*/
|
||||
public function getAccountValues($username) {
|
||||
|
||||
return array();
|
||||
}
|
||||
|
||||
/**
|
||||
* create an internal user, when user not exists
|
||||
*
|
||||
* @param string $username
|
||||
*/
|
||||
private function autoUserCreation($username) {
|
||||
|
||||
/* search user in DB and do nothing, when user exists */
|
||||
$stmt = $this->pdo->prepare('SELECT username FROM '.$this->tableName.' WHERE username = ?');
|
||||
$stmt->execute(array($username));
|
||||
$result = $stmt->fetchAll();
|
||||
if (count($result) != 0)
|
||||
return;
|
||||
|
||||
/* get account values from backend */
|
||||
$values = $this->getAccountValues($username);
|
||||
if (!isset($values['displayname']) OR strlen($values['displayname']) === 0)
|
||||
$values['displayname'] = $username;
|
||||
if (!isset($values['email']) OR strlen($values['email']) === 0) {
|
||||
if(filter_var($username, FILTER_VALIDATE_EMAIL))
|
||||
$values['email'] = $username;
|
||||
else
|
||||
$values['email'] = 'unset-mail';
|
||||
}
|
||||
|
||||
/* create user */
|
||||
$user = new \Baikal\Model\User();
|
||||
$user->set('username', $username);
|
||||
$user->set('displayname', $values['displayname']);
|
||||
$user->set('email', $values['email']);
|
||||
$user->persist();
|
||||
}
|
||||
|
||||
}
|
|
@ -0,0 +1,75 @@
|
|||
<?php
|
||||
|
||||
namespace Baikal\Core;
|
||||
|
||||
/**
|
||||
* This is an authentication backend that uses a ldap backend to authenticate user.
|
||||
*
|
||||
* @author Sascha Kuehndel (InuSasha) <dev@inusasha.de>
|
||||
* @license http://code.google.com/p/sabredav/wiki/License Modified BSD License
|
||||
*/
|
||||
class LDAPUserBindAuth extends AbstractExternalAuth {
|
||||
|
||||
/**
|
||||
* AccountValues for getAccountValues
|
||||
*
|
||||
* @var array ('displayname' => string, 'email' => string)
|
||||
*/
|
||||
private $accountValues;
|
||||
|
||||
/**
|
||||
* Validates a username and password over ldap
|
||||
*
|
||||
* @param string $username
|
||||
* @param string $password
|
||||
* @return bool
|
||||
*/
|
||||
public function validateUserPassExternal($username, $password) {
|
||||
|
||||
/* create ldap connection */
|
||||
$conn = ldap_connect(BAIKAL_DAV_LDAP_URI);
|
||||
if (!$conn)
|
||||
return false;
|
||||
if (!ldap_set_option($conn, LDAP_OPT_PROTOCOL_VERSION, 3))
|
||||
return false;
|
||||
|
||||
/* bind with user
|
||||
* error_handler have to change, because a failed bind raises an error
|
||||
* this raise a secuity issue because in the stack trace is the password of user readable
|
||||
*/
|
||||
$arr = explode('@', $username, 2);
|
||||
$dn = str_replace('%n', $username, BAIKAL_DAV_LDAP_DN_TEMPLATE);
|
||||
$dn = str_replace('%u', $arr[0], $dn);
|
||||
if(isset($arr[1])) $dn = str_replace('%d', $arr[1], $dn);
|
||||
|
||||
set_error_handler("\Baikal\Core\LDAPUserBindAuth::exception_error_handler");
|
||||
$bind = ldap_bind($conn, $dn, $password);
|
||||
restore_error_handler();
|
||||
if (!$bind) {
|
||||
ldap_close($conn);
|
||||
return false;
|
||||
}
|
||||
|
||||
/* read displayname and email from user */
|
||||
$this->accountValues = array();
|
||||
$sr = ldap_read($conn, $dn, '(objectclass=*)', array(BAIKAL_DAV_LDAP_DISPLAYNAME_ATTR, BAIKAL_DAV_LDAP_EMAIL_ATTR));
|
||||
$entry = ldap_get_entries($conn, $sr);
|
||||
if (isset($entry[0][BAIKAL_DAV_LDAP_DISPLAYNAME_ATTR][0]))
|
||||
$this->accountValues['displayname'] = $entry[0][BAIKAL_DAV_LDAP_DISPLAYNAME_ATTR][0];
|
||||
if (isset($entry[0][BAIKAL_DAV_LDAP_EMAIL_ATTR][0]))
|
||||
$this->accountValues['email'] = $entry[0][BAIKAL_DAV_LDAP_EMAIL_ATTR][0];
|
||||
|
||||
/* close */
|
||||
ldap_close($conn);
|
||||
return true;
|
||||
}
|
||||
|
||||
public function getAccountValues($username) {
|
||||
|
||||
return $this->accountValues;
|
||||
}
|
||||
|
||||
# WorkAround error_handler in failed bind of LDAP
|
||||
public static function exception_error_handler($errno, $errstr, $errfile, $errline) {
|
||||
}
|
||||
}
|
|
@ -1,214 +1,3 @@
|
|||
--- b/Core/Frameworks/Baikal/Core/AbstractExternalAuth.php
|
||||
+++ b/Core/Frameworks/Baikal/Core/AbstractExternalAuth.php
|
||||
@@ -0,0 +1,130 @@
|
||||
+<?php
|
||||
+
|
||||
+namespace Baikal\Core;
|
||||
+
|
||||
+/**
|
||||
+ * This is an abstract authentication, that allows to create external
|
||||
+ * authentication backends. User are automatic created, when the does not exists
|
||||
+ * in baikal (can disabled).
|
||||
+ *
|
||||
+ * @author Sascha Kuehndel (InuSasha) <dev@inusasha.de>
|
||||
+ * @license http://code.google.com/p/sabredav/wiki/License Modified BSD License
|
||||
+ */
|
||||
+abstract class AbstractExternalAuth extends \Sabre\DAV\Auth\Backend\AbstractBasic {
|
||||
+
|
||||
+ /**
|
||||
+ * enable autocreation of user
|
||||
+ *
|
||||
+ * @var PDO
|
||||
+ */
|
||||
+ protected $enableAutoCreation;
|
||||
+
|
||||
+ /**
|
||||
+ * Reference to PDO connection
|
||||
+ *
|
||||
+ * @var PDO
|
||||
+ */
|
||||
+ private $pdo;
|
||||
+
|
||||
+ /**
|
||||
+ * PDO table name we'll be using
|
||||
+ *
|
||||
+ * @var string
|
||||
+ */
|
||||
+ private $tableName;
|
||||
+
|
||||
+ /**
|
||||
+ * Creates the backend object.
|
||||
+ *
|
||||
+ * If the filename argument is passed in, it will parse out the specified file fist.
|
||||
+ *
|
||||
+ * @param PDO $pdo
|
||||
+ * @param string $realm
|
||||
+ * @param string $tableName The PDO table name to use
|
||||
+ */
|
||||
+ public function __construct(\PDO $pdo, $realm = 'BaikalDAV', $tableName = 'users') {
|
||||
+
|
||||
+ $this->pdo = $pdo;
|
||||
+ $this->tableName = $tableName;
|
||||
+ $this->enableAutoCreation = true;
|
||||
+ }
|
||||
+
|
||||
+ /**
|
||||
+ * Validates a username and password
|
||||
+ *
|
||||
+ * This method should return true or false depending on if login
|
||||
+ * succeeded.
|
||||
+ *
|
||||
+ * @param string $username
|
||||
+ * @param string $password
|
||||
+ * @return bool
|
||||
+ */
|
||||
+ public function validateUserPass($username, $password) {
|
||||
+
|
||||
+ if (!$this->validateUserPassExternal($username, $password))
|
||||
+ return false;
|
||||
+
|
||||
+ $this->currentUser = $username;
|
||||
+ if ($this->enableAutoCreation)
|
||||
+ $this->autoUserCreation($username);
|
||||
+
|
||||
+ return true;
|
||||
+ }
|
||||
+
|
||||
+ /**
|
||||
+ * Validates a username and password agains external backend
|
||||
+ *
|
||||
+ * This method should return true or false depending on if login
|
||||
+ * succeeded.
|
||||
+ *
|
||||
+ * @param string $username
|
||||
+ * @param string $password
|
||||
+ * @return bool
|
||||
+ */
|
||||
+ public abstract function validateUserPassExternal($username, $password);
|
||||
+
|
||||
+ /**
|
||||
+ * return the displayname and email from the external Backend
|
||||
+ *
|
||||
+ * @param string $username
|
||||
+ * @return array ('displayname' => string, 'email' => string)
|
||||
+ */
|
||||
+ public function getAccountValues($username) {
|
||||
+
|
||||
+ return array();
|
||||
+ }
|
||||
+
|
||||
+ /**
|
||||
+ * create an internal user, when user not exists
|
||||
+ *
|
||||
+ * @param string $username
|
||||
+ */
|
||||
+ private function autoUserCreation($username) {
|
||||
+
|
||||
+ /* search user in DB and do nothing, when user exists */
|
||||
+ $stmt = $this->pdo->prepare('SELECT username FROM '.$this->tableName.' WHERE username = ?');
|
||||
+ $stmt->execute(array($username));
|
||||
+ $result = $stmt->fetchAll();
|
||||
+ if (count($result) != 0)
|
||||
+ return;
|
||||
+
|
||||
+ /* get account values from backend */
|
||||
+ $values = $this->getAccountValues($username);
|
||||
+ if (!isset($values['displayname']) OR strlen($values['displayname']) === 0)
|
||||
+ $values['displayname'] = $username;
|
||||
+ if (!isset($values['email']) OR strlen($values['email']) === 0) {
|
||||
+ if(filter_var($username, FILTER_VALIDATE_EMAIL))
|
||||
+ $values['email'] = $username;
|
||||
+ else
|
||||
+ $values['email'] = 'unset-mail';
|
||||
+ }
|
||||
+
|
||||
+ /* create user */
|
||||
+ $user = new \Baikal\Model\User();
|
||||
+ $user->set('username', $username);
|
||||
+ $user->set('displayname', $values['displayname']);
|
||||
+ $user->set('email', $values['email']);
|
||||
+ $user->persist();
|
||||
+ }
|
||||
+
|
||||
+}
|
||||
--- b/Core/Frameworks/Baikal/Core/LDAPUserBindAuth.php
|
||||
+++ b/Core/Frameworks/Baikal/Core/LDAPUserBindAuth.php
|
||||
@@ -0,0 +1,75 @@
|
||||
+<?php
|
||||
+
|
||||
+namespace Baikal\Core;
|
||||
+
|
||||
+/**
|
||||
+ * This is an authentication backend that uses a ldap backend to authenticate user.
|
||||
+ *
|
||||
+ * @author Sascha Kuehndel (InuSasha) <dev@inusasha.de>
|
||||
+ * @license http://code.google.com/p/sabredav/wiki/License Modified BSD License
|
||||
+ */
|
||||
+class LDAPUserBindAuth extends AbstractExternalAuth {
|
||||
+
|
||||
+ /**
|
||||
+ * AccountValues for getAccountValues
|
||||
+ *
|
||||
+ * @var array ('displayname' => string, 'email' => string)
|
||||
+ */
|
||||
+ private $accountValues;
|
||||
+
|
||||
+ /**
|
||||
+ * Validates a username and password over ldap
|
||||
+ *
|
||||
+ * @param string $username
|
||||
+ * @param string $password
|
||||
+ * @return bool
|
||||
+ */
|
||||
+ public function validateUserPassExternal($username, $password) {
|
||||
+
|
||||
+ /* create ldap connection */
|
||||
+ $conn = ldap_connect(BAIKAL_DAV_LDAP_URI);
|
||||
+ if (!$conn)
|
||||
+ return false;
|
||||
+ if (!ldap_set_option($conn, LDAP_OPT_PROTOCOL_VERSION, 3))
|
||||
+ return false;
|
||||
+
|
||||
+ /* bind with user
|
||||
+ * error_handler have to change, because a failed bind raises an error
|
||||
+ * this raise a secuity issue because in the stack trace is the password of user readable
|
||||
+ */
|
||||
+ $arr = explode('@', $username, 2);
|
||||
+ $dn = str_replace('%n', $username, BAIKAL_DAV_LDAP_DN_TEMPLATE);
|
||||
+ $dn = str_replace('%u', $arr[0], $dn);
|
||||
+ if(isset($arr[1])) $dn = str_replace('%d', $arr[1], $dn);
|
||||
+
|
||||
+ set_error_handler("\Baikal\Core\LDAPUserBindAuth::exception_error_handler");
|
||||
+ $bind = ldap_bind($conn, $dn, $password);
|
||||
+ restore_error_handler();
|
||||
+ if (!$bind) {
|
||||
+ ldap_close($conn);
|
||||
+ return false;
|
||||
+ }
|
||||
+
|
||||
+ /* read displayname and email from user */
|
||||
+ $this->accountValues = array();
|
||||
+ $sr = ldap_read($conn, $dn, '(objectclass=*)', array(BAIKAL_DAV_LDAP_DISPLAYNAME_ATTR, BAIKAL_DAV_LDAP_EMAIL_ATTR));
|
||||
+ $entry = ldap_get_entries($conn, $sr);
|
||||
+ if (isset($entry[0][BAIKAL_DAV_LDAP_DISPLAYNAME_ATTR][0]))
|
||||
+ $this->accountValues['displayname'] = $entry[0][BAIKAL_DAV_LDAP_DISPLAYNAME_ATTR][0];
|
||||
+ if (isset($entry[0][BAIKAL_DAV_LDAP_EMAIL_ATTR][0]))
|
||||
+ $this->accountValues['email'] = $entry[0][BAIKAL_DAV_LDAP_EMAIL_ATTR][0];
|
||||
+
|
||||
+ /* close */
|
||||
+ ldap_close($conn);
|
||||
+ return true;
|
||||
+ }
|
||||
+
|
||||
+ public function getAccountValues($username) {
|
||||
+
|
||||
+ return $this->accountValues;
|
||||
+ }
|
||||
+
|
||||
+ # WorkAround error_handler in failed bind of LDAP
|
||||
+ public static function exception_error_handler($errno, $errstr, $errfile, $errline) {
|
||||
+ }
|
||||
+}
|
||||
diff --git a/Core/Frameworks/Baikal/Core/Server.php b/Core/Frameworks/Baikal/Core/Server.php
|
||||
index 8026854..8d306fe 100644
|
||||
--- a/Core/Frameworks/Baikal/Core/Server.php
|
||||
|
|
Loading…
Add table
Reference in a new issue