Subversion Repositories ALCASAR

Rev

Rev 2710 | Rev 2718 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log

Rev Author Line No. Line
318 richard 1
<?php
2449 tom.houday 2
# $Id: ldap.php 2714 2019-03-10 23:43:22Z tom.houdayer $
3
 
2453 tom.houday 4
/* written by steweb57, Rexy & Tom HOUDAYER */
318 richard 5
/****************************************************************
2449 tom.houday 6
*			GLOBAL FILE PATHS			*
318 richard 7
*****************************************************************/
2449 tom.houday 8
define('CONF_FILE', '/usr/local/etc/alcasar.conf');
318 richard 9
 
2449 tom.houday 10
/****************************************************************
11
*			FILE reading test			*
12
*****************************************************************/
13
$conf_files = array(CONF_FILE);
14
foreach ($conf_files as $file) {
15
	if (!file_exists($file)) {
16
		exit("Fichier $file non présent");
17
	}
18
	if (!is_readable($file)) {
19
		exit("Vous n'avez pas les droits de lecture sur le fichier $file");
20
	}
21
}
318 richard 22
 
1160 stephane 23
/****************************************************************
2449 tom.houday 24
*			Read CONF_FILE				*
25
*****************************************************************/
26
$file_conf = fopen(CONF_FILE, 'r');
27
if (!$file_conf) {
28
	exit('Error opening the file '.CONF_FILE);
29
}
30
while (!feof($file_conf)) {
31
	$buffer = fgets($file_conf, 4096);
32
	if ((strpos($buffer, '=') !== false) && (substr($buffer, 0, 1) !== '#')) {
33
		$tmp = explode('=', $buffer, 2);
34
		$conf[trim($tmp[0])] = trim($tmp[1]);
35
	}
36
}
37
fclose($file_conf);
38
 
39
/****************************************************************
1672 richard 40
*			Choice of language			*
1160 stephane 41
*****************************************************************/
42
$Language = 'en';
2449 tom.houday 43
if (isset($_SERVER['HTTP_ACCEPT_LANGUAGE'])) {
44
	$Langue	  = explode(',', $_SERVER['HTTP_ACCEPT_LANGUAGE']);
45
	$Language = strtolower(substr(chop($Langue[0]), 0, 2));
46
}
47
if ($Language === 'fr') {		// French
2459 richard 48
	$l_ldap_update			= "Mise à jour des paramètres LDAP effectuée";
1672 richard 49
	$l_ldap_title			= "Authentification externe : LDAP";
50
	$l_ldap_legend			= "Authentification LDAP";
2459 richard 51
	$l_ldap_auth_enable_label	= "Éditer la configuration LDAP:";
1672 richard 52
	$l_ldap_YES			= "OUI";
53
	$l_ldap_NO			= "NON";
1677 richard 54
	$l_ldap_server_label		= "Serveur LDAP:";
2459 richard 55
	$l_ldap_server_text		= "Adresse IP du serveur";
56
	$l_ldap_base_dn_label		= "DN de la base:";
57
	$l_ldap_base_dn_text		= "Le DN (Distinguished Name) définit où se situent les informations des utilisateurs dans l'annuaire.<br> - Exemple LDAP: 'o=mycompany, c=FR'.<br> - Exemple AD 'cn=Users,dc=server_name,dc=localdomain'";
58
	$l_ldap_uid_label		= "Identifiant d'utilisateur (UID):";
59
	$l_ldap_uid_text		= "Clé utilisée pour rechercher un identifiant de connexion.<br> - Exemple LDAP: 'uid', 'sn', etc.<br> - Pour A.D. mettre 'sAMAccountName'.";
60
	$l_ldap_base_filter_label	= "Filtre de recherche des utilisateurs (optionnel):";
61
	$l_ldap_base_filter_text	= "Vous pouvez limiter les objets recherchés avec des filtres additionnels.<br> Exemple 'objectClass=posixGroup' ajouterait le filtre '(&amp;(uid=username)(objectClass=posixGroup))'";
62
	$l_ldap_user_label		= "CN de l'utilisateur exploité par ALCASAR:";
63
	$l_ldap_user_text		= "CN=Common Name. Laissez vide pour utiliser un accès invité (ou anonyme). Obligatoire sur un AD.<br> - Exemple LDAP : 'uid=username,ou=my_lan,o=mycompany,c=FR'.<br> - Exemple AD : 'username' ou 'cn=username,cn=Users,dc=server_name,dc=localdomain'";
64
	$l_ldap_password_label		= "Mot de passe:";
1673 richard 65
	$l_ldap_password_text		= "Laissez vide pour un accès invité (ou anonyme). Obligatoire sur un AD.";
2705 tom.houday 66
	$l_ldap_ssl_label		= "Connexion chiffré";
67
	$l_ldap_ssl_text		= "Utiliser une connexion chiffré avec SSL (LDAPS)";
68
	$l_ldap_cert_required_label	= "Vérifier le certificat SSL";
69
	$l_ldap_cert_required_text	= "Vérifier que le serveur LDAP utilise un certificat connu";
70
	$l_ldap_cert_label		= "Certificat SSL (CA)";
71
	$l_ldap_cert_text		= "Certificat de l'authorité de certification signant celui du serveur LDAP";
72
	$l_ldap_cert_status_cur		= "Certificat actuel : ";
73
	$l_ldap_cert_status_no		= "Aucun certificat installé";
2461 richard 74
	$l_ldap_submit			= "Enregistrer";
2459 richard 75
	$l_ldap_test_service_failed	= "Service LDAP injoignable sur ce serveur (vérifiez l'@IP).";
2705 tom.houday 76
	$l_ldap_test_service_ok		= "Un port 389 (636 avec SSL) est actif sur ce serveur";
2459 richard 77
	$l_ldap_test_connection_failed	= "Connexion LDAP impossible (vérifiez le service LDAP sur ce serveur)";
78
	$l_ldap_test_connection_ok	= "Une connexion LDAP a été établie";
79
	$l_ldap_test_bind_failed	= "Echec d'authentification (vérifiez l'utilisateur et le mot de passe)";
80
	$l_ldap_test_bind_ok		= "L'authentification a réussie";
81
	$l_ldap_test_dn_failed		= "Le DN de la base semble incorrect (vérifiez le)";
82
	$l_ldap_test_dn_ok		= "Le DN de la base semble correct";
2449 tom.houday 83
	$l_ldap_error			= "erreur LDAP";
2459 richard 84
	$l_ldap_entries			= "entrées dans la base";
2705 tom.houday 85
	$l_ldap_cert_cn_diff_dn		= "Le CommonName du certificat (§cert_domainName§) est différent du nom de domaine du serveur";
2475 tom.houday 86
	$l_check			= "Vérifier cette configuration";
87
	$l_checkingConf			= "Vérification de cette configuration...";
2449 tom.houday 88
} else {				// English
2459 richard 89
	$l_ldap_update			= "LDAP settings updated";
1672 richard 90
	$l_ldap_title			= "External authentication : LDAP";
91
	$l_ldap_legend			= "LDAP authentication";
2459 richard 92
	$l_ldap_auth_enable_label	= "Edit the LDAP configuration :";
1672 richard 93
	$l_ldap_YES			= "YES";
94
	$l_ldap_NO			= "NO";
1677 richard 95
	$l_ldap_server_label		= "LDAP server :";
2459 richard 96
	$l_ldap_server_text		= "IP address of the LDAP server.";
97
	$l_ldap_base_dn_label		= "DN of the base:";
98
	$l_ldap_base_dn_text		= "The DN (Distinguished Name) is used to locate the users information in the directory.<br> e.g. LDAP : 'o=MyCompany,c=US'.<br> e.g. AD : 'cn=Users,dc=server_name,dc=localdomain'";
99
	$l_ldap_uid_label		= "User IDentifier (UID):";
100
	$l_ldap_uid_text		= "Key used to search for a given login identity.<br>e.g. 'uid', 'sn', etc.. For AD use 'sAMAccountName'.";
101
	$l_ldap_base_filter_label	= "User search filter (optional):";
102
	$l_ldap_base_filter_text	= "You can further limit the searched objects with additional filters.<br> For example 'objectClass=posixGroup' would result in the use of '(&amp;(uid=username)(objectClass=posixGroup))'";
103
	$l_ldap_user_label		= "CN of the user operated by ALCASAR:";
104
	$l_ldap_user_text		= "CN=Common Name. Leave blank to use anonymous binding. Mandatory for AD.<br> e.g. LDAP :'uid=Username,ou=my_lan,o=mycompany,c=US'.<br> e.g. AD : 'username' or 'cn=username,cn=Users,dc=server_name,dc=localdomain'";
105
	$l_ldap_password_label		= "Password:";
106
	$l_ldap_password_text		= "Leave blank to use anonymous binding. Mandatory for AD.";
2705 tom.houday 107
	$l_ldap_ssl_label		= "Secure connection";
108
	$l_ldap_ssl_text		= "Use an encrypted connection with SSL (LDAPS)";
109
	$l_ldap_cert_required_label	= "Check the SSL certificate";
110
	$l_ldap_cert_required_text	= "Verify that the LDAP server uses a trusted certificate";
111
	$l_ldap_cert_label		= "SSL certificate (CA)";
112
	$l_ldap_cert_text		= "Certificate of the certification authority that signed the LDAP server certificate";
113
	$l_ldap_cert_status_cur		= "Current certificate:";
114
	$l_ldap_cert_status_no		= "No certificate imported";
2461 richard 115
	$l_ldap_submit			= "Save";
2459 richard 116
	$l_ldap_test_service_failed	= "LDAP service is not reachable on that server (check IP)";
2705 tom.houday 117
	$l_ldap_test_service_ok		= "A port 389 (636 with SSL) is open on this server";
2459 richard 118
	$l_ldap_test_connection_failed	= "LDAP connexion failed (check the LDAP service on this server)";
119
	$l_ldap_test_connection_ok	= "A LDAP connexion is established";
120
	$l_ldap_test_bind_failed	= "LDAP authentication failed (check the LDAP user and password)";
121
	$l_ldap_test_bind_ok		= "Successful authentication";
2475 tom.houday 122
	$l_ldap_test_dn_failed		= "DN of the base seems to be wrong (check it)";
123
	$l_ldap_test_dn_ok		= "DN of the base seems to be ok";
2705 tom.houday 124
	$l_ldap_cert_cn_diff_dn		= "Certificate CommonName (§cert_domainName§) is different from the server domain name";
2449 tom.houday 125
	$l_ldap_error			= "LDAP error";
2459 richard 126
	$l_ldap_entries			= "entries in the base";
2475 tom.houday 127
	$l_check			= "Check this config";
128
	$l_checkingConf			= "Checking this configuration...";
1160 stephane 129
}
318 richard 130
 
2714 tom.houday 131
function ldap_checkServerConfig($f_ldap_server, $f_ldap_identity, $f_ldap_password, $f_ldap_basedn, $f_ldap_base_filter, $f_ldap_uid, $f_ldap_ssl, $f_ldap_cert, $f_ldap_cert_required) {
2459 richard 132
	// Socket to the LDAP port of the server
2705 tom.houday 133
	if (!$sock = @fsockopen($f_ldap_server, (($f_ldap_ssl) ? 636 : 389), $num, $error, 2)) {
658 stephane 134
		// no network connection
2459 richard 135
		return -2;
2449 tom.houday 136
	}
137
	fclose($sock);
1395 richard 138
 
2705 tom.houday 139
	// Set LDAP SSL options
140
	if ($f_ldap_ssl) {
141
		if ($f_ldap_cert_required) {
142
			if ($f_ldap_cert) {
2710 tom.houday 143
				ldap_set_option(NULL, LDAP_OPT_X_TLS_CACERTFILE, $f_ldap_cert);
2705 tom.houday 144
			}
145
			ldap_set_option(NULL, LDAP_OPT_X_TLS_REQUIRE_CERT, LDAP_OPT_X_TLS_DEMAND);
146
 
147
		} else {
2710 tom.houday 148
			ldap_set_option(NULL, LDAP_OPT_X_TLS_REQUIRE_CERT, LDAP_OPT_X_TLS_NEVER);
2705 tom.houday 149
		}
150
	}
151
 
2459 richard 152
	// if ok, Test LDAP connection
2705 tom.houday 153
	$ldapconn = @ldap_connect((($f_ldap_ssl)?'ldaps':'ldap').'://'.$f_ldap_server);
2449 tom.houday 154
	if (!$ldapconn) {
155
		// LDAP connection failed
2459 richard 156
		return -1;
620 stephane 157
	}
158
 
2705 tom.houday 159
	ldap_set_option($ldapconn, LDAP_OPT_TIMELIMIT, 2);
160
 
2459 richard 161
	// if ok, test a ldap-bind with the user used by ALCASAR
2705 tom.houday 162
	$ldapbind = @ldap_bind($ldapconn, $f_ldap_identity, $f_ldap_password);
2449 tom.houday 163
	if (!$ldapbind) {
164
		// Test LDAP Version 3
165
		ldap_set_option($ldapconn, LDAP_OPT_PROTOCOL_VERSION, 3);
2705 tom.houday 166
		$ldapbind = @ldap_bind($ldapconn, $f_ldap_identity, $f_ldap_password);
2449 tom.houday 167
		if (!$ldapbind) {
168
			// LDAP Bind failed
169
			return 0;
318 richard 170
		}
2449 tom.houday 171
	}
172
 
2459 richard 173
	// if ok, try to query the directory of users
2714 tom.houday 174
	$filter = ((!empty($f_ldap_base_filter)) ? $f_ldap_base_filter : '&');
175
	$query = "(&($f_ldap_uid=*)($filter))";
2705 tom.houday 176
	$ldap_result = @ldap_search($ldapconn, $f_ldap_basedn, $query);
2532 tom.houday 177
	if ($ldap_result) {
2460 tom.houday 178
		$ldap_users_count = ldap_count_entries($ldapconn, $ldap_result);
179
		return ($ldap_users_count + 2);
318 richard 180
	} else {
2449 tom.houday 181
		return 1;
318 richard 182
	}
2459 richard 183
	ldap_unbind($ldapconn);
318 richard 184
}
2449 tom.houday 185
 
2451 tom.houday 186
$messages = '';
2705 tom.houday 187
$LDAPS_CERT_LOC = '/etc/raddb/certs/alcasar-ldaps.crt';
2451 tom.houday 188
 
189
if (isset($_POST['auth_enable'])) {
190
	if ($_POST['auth_enable'] === '1') {
2705 tom.houday 191
		// TODO : need to translate messages
2451 tom.houday 192
		$varErrors = [];
2705 tom.houday 193
		if (isset($_POST['ldap_server']))        $ldap_server        = $_POST['ldap_server'];        else array_push($varErrors, 'Variable error "ldap_server"');
194
		if (isset($_POST['ldap_base_dn']))       $ldap_base_dn       = $_POST['ldap_base_dn'];       else array_push($varErrors, 'Variable error "ldap_base_dn"');
195
		if (isset($_POST['ldap_uid']))           $ldap_uid           = $_POST['ldap_uid'];           else array_push($varErrors, 'Variable error "ldap_uid"');
196
		if (isset($_POST['ldap_base_filter']))   $ldap_base_filter   = $_POST['ldap_base_filter'];   else array_push($varErrors, 'Variable error "ldap_base_filter"');
197
		if (isset($_POST['ldap_user']))          $ldap_user          = $_POST['ldap_user'];          else array_push($varErrors, 'Variable error "ldap_user"');
198
		if (isset($_POST['ldap_password']))      $ldap_password      = $_POST['ldap_password'];      else array_push($varErrors, 'Variable error "ldap_password"');
199
		if (isset($_POST['ldap_ssl']))           $ldap_ssl           = $_POST['ldap_ssl'];           //else array_push($varErrors, 'Variable error "ldap_ssl"');
200
		if (isset($_FILES['ldap_cert']))         $ldap_cert          = $_FILES['ldap_cert'];         //else array_push($varErrors, 'Variable error "ldap_cert"');
201
		if (isset($_POST['ldap_cert_required'])) $ldap_cert_required = $_POST['ldap_cert_required']; //else array_push($varErrors, 'Variable error "ldap_cert_required"');
2451 tom.houday 202
 
2705 tom.houday 203
		if (isset($ldap_cert) && ($ldap_cert['error'] === UPLOAD_ERR_OK)) {
204
			if ($ldap_cert_required === 'on') {
205
				$certificateInfos = openssl_x509_parse(file_get_contents($ldap_cert['tmp_name']));
206
				if (preg_match_all('@/[a-zA-Z]+=([^/]+)@', $certificateInfos['name'], $matches)) {
207
					$cert_domainName = implode('.', array_reverse($matches[1]));
208
					if ($cert_domainName !== $ldap_server) {
209
						array_push($varErrors, str_replace("§cert_domainName§", $cert_domainName, $l_ldap_cert_cn_diff_dn));
210
					}
211
				}
2451 tom.houday 212
			}
213
		}
214
 
215
		if (!empty($varErrors)) { 
216
			foreach ($varErrors as $error) {
217
				$messages .= '<span style="font-weight: bold; color: red;">'.$error.'</span><br>';
218
			}
219
		} else {
220
			exec('sed -i '.escapeshellarg("s/^LDAP_SERVER=.*/LDAP_SERVER=$ldap_server/g").' '.CONF_FILE);
221
			exec('sed -i '.escapeshellarg("s/^LDAP_BASE=.*/LDAP_BASE=$ldap_base_dn/g").' '.CONF_FILE);
2459 richard 222
			exec('sed -i '.escapeshellarg("s/^LDAP_UID=.*/LDAP_UID=$ldap_uid/g").' '.CONF_FILE);
2452 tom.houday 223
			exec('sed -i '.escapeshellarg("s/^LDAP_FILTER=.*/LDAP_FILTER=$ldap_base_filter/g").' '.CONF_FILE);
2451 tom.houday 224
			exec('sed -i '.escapeshellarg("s/^LDAP_USER=.*/LDAP_USER=$ldap_user/g").' '.CONF_FILE);
225
			exec('sed -i '.escapeshellarg("s/^LDAP_PASSWORD=.*/LDAP_PASSWORD=$ldap_password/g").' '.CONF_FILE);
2705 tom.houday 226
			exec('sed -i '.escapeshellarg("s/^LDAP_SSL=.*/LDAP_SSL=$ldap_ssl/g").' '.CONF_FILE);
227
			exec('sed -i '.escapeshellarg("s/^LDAP_CERT_REQUIRED=.*/LDAP_CERT_REQUIRED=$ldap_cert_required/g").' '.CONF_FILE);
2465 richard 228
			exec('sed -i \'s/^LDAP=.*/LDAP=on/g\' '.CONF_FILE);
2705 tom.houday 229
			if (isset($ldap_cert) && ($ldap_cert['error'] === UPLOAD_ERR_OK)) {
230
				exec('sudo /usr/local/bin/alcasar-ldap.sh --import-cert '.escapeshellarg($ldap_cert['tmp_name']));
231
			}
2451 tom.houday 232
			exec('sudo /usr/local/bin/alcasar-ldap.sh --on');
2459 richard 233
			$messages .= '<span style="font-weight: bold; color: green;">'.$l_ldap_update.'</span><br>';
2451 tom.houday 234
		}
235
	} else {
236
		exec('sed -i "s/^LDAP=.*/LDAP=off/g" '.CONF_FILE);
237
		exec('sudo /usr/local/bin/alcasar-ldap.sh --off');
2459 richard 238
		$messages .= '<span style="font-weight: bold; color: green;">'.$l_ldap_update.'</span><br>';
2451 tom.houday 239
	}
240
 
241
	// Reload configuration
242
	$file_conf = fopen(CONF_FILE, 'r');
243
	if (!$file_conf) {
244
		exit('Error opening the file '.CONF_FILE);
245
	}
246
	while (!feof($file_conf)) {
247
		$buffer = fgets($file_conf, 4096);
248
		if ((strpos($buffer, '=') !== false) && (substr($buffer, 0, 1) !== '#')) {
249
			$tmp = explode('=', $buffer, 2);
250
			$conf[trim($tmp[0])] = trim($tmp[1]);
251
		}
252
	}
253
	fclose($file_conf);
254
}
255
 
256
// LDAP configuration params
2705 tom.houday 257
$ldap_status        = ($conf['LDAP'] === 'on');
258
$ldap_server        = $conf['LDAP_SERVER'];
259
$ldap_user          = $conf['LDAP_USER'];
260
$ldap_password      = $conf['LDAP_PASSWORD'];
261
$ldap_base_dn       = $conf['LDAP_BASE'];
262
$ldap_uid	    = $conf['LDAP_UID'];
263
$ldap_base_filter   = $conf['LDAP_FILTER'];
264
$ldap_ssl           = ($conf['LDAP_SSL'] === 'on');
265
$ldap_cert_required = ($conf['LDAP_CERT_REQUIRED'] === 'on');
2451 tom.houday 266
 
2705 tom.houday 267
$ldap_cert_subject = NULL;
268
if (file_exists($LDAPS_CERT_LOC)) {
269
	$certificateInfos = openssl_x509_parse(file_get_contents($LDAPS_CERT_LOC));
270
	if (preg_match_all('@/[a-zA-Z]+=([^/]+)@', $certificateInfos['name'], $matches)) {
271
		$ldap_cert_subject = implode('.', array_reverse($matches[1]));
272
	}
273
}
274
 
2453 tom.houday 275
// AJAX LDAP configuration checker
276
if (isset($_GET['conf_check'])) {
277
	$response = [
278
		'enable' => $ldap_status
279
	];
280
	if ($ldap_status || ($_SERVER['REQUEST_METHOD'] === 'POST')) {
281
		$varErrors = [];
282
		if ($_SERVER['REQUEST_METHOD'] === 'POST') {
2705 tom.houday 283
			// TODO : need to translate messages
284
			if (isset($_POST['ldap_server']))        $ldap_server        = $_POST['ldap_server'];                   else array_push($varErrors, 'Variable error "ldap_server"');
285
			if (isset($_POST['ldap_base_dn']))       $ldap_base_dn       = $_POST['ldap_base_dn'];                  else array_push($varErrors, 'Variable error "ldap_base_dn"');
286
			if (isset($_POST['ldap_uid']))           $ldap_uid           = $_POST['ldap_uid'];                      else array_push($varErrors, 'Variable error "ldap_uid"');
287
			if (isset($_POST['ldap_base_filter']))   $ldap_base_filter   = $_POST['ldap_base_filter'];              else array_push($varErrors, 'Variable error "ldap_base_filter"');
288
			if (isset($_POST['ldap_user']))          $ldap_user          = $_POST['ldap_user'];                     else array_push($varErrors, 'Variable error "ldap_user"');
289
			if (isset($_POST['ldap_password']))      $ldap_password      = $_POST['ldap_password'];                 else array_push($varErrors, 'Variable error "ldap_password"');
290
			if (isset($_POST['ldap_ssl']))           $ldap_ssl           = ($_POST['ldap_ssl'] === 'on');           //else array_push($varErrors, 'Variable error "ldap_ssl"');
291
			if (isset($_FILES['ldap_cert']))         $ldap_cert          = $_FILES['ldap_cert'];                    //else array_push($varErrors, 'Variable error "ldap_cert"');
292
			if (isset($_POST['ldap_cert_required'])) $ldap_cert_required = ($_POST['ldap_cert_required'] === 'on'); //else array_push($varErrors, 'Variable error "ldap_cert_required"');
2453 tom.houday 293
		}
294
 
2705 tom.houday 295
		if (($ldap_cert_required) && isset($ldap_cert) && ($ldap_cert['error'] === UPLOAD_ERR_OK)) {
296
			$ldap_cert_tmpFilename = $ldap_cert['tmp_name'];
297
		} else {
298
			$ldap_cert_tmpFilename = NULL;
2453 tom.houday 299
		}
300
 
301
		if (!empty($varErrors)) {
302
			$response['errors'] = $varErrors;
2460 tom.houday 303
		} else {
2714 tom.houday 304
			$result = ldap_checkServerConfig($ldap_server, $ldap_user, $ldap_password, $ldap_base_dn, $ldap_base_filter, $ldap_uid, $ldap_ssl, $ldap_cert_tmpFilename, $ldap_cert_required);
2705 tom.houday 305
 
306
			if (($result === 0) && ($ldap_ssl && $ldap_cert_required && ((isset($ldap_cert) && ($ldap_cert['error'] === UPLOAD_ERR_OK)) || (file_exists($LDAPS_CERT_LOC))))) {
307
				if (filter_var($ldap_server, FILTER_VALIDATE_IP) !== false) {
308
					if (isset($ldap_cert) && ($ldap_cert['error'] === UPLOAD_ERR_OK)) {
309
						$certificateInfos = openssl_x509_parse(file_get_contents($ldap_cert['tmp_name']));
310
					} else {
311
						$certificateInfos = openssl_x509_parse(file_get_contents($LDAPS_CERT_LOC));
312
					}
313
					if (preg_match_all('@/[a-zA-Z]+=([^/]+)@', $certificateInfos['name'], $matches)) {
314
						$cert_domainName = implode('.', array_reverse($matches[1]));
315
						if ($cert_domainName !== $ldap_server) {
316
							$response['warnings'][] = str_replace("§cert_domainName§", $cert_domainName, $l_ldap_cert_cn_diff_dn);
317
						}
318
					}
2714 tom.houday 319
					$res = ldap_checkServerConfig($cert_domainName, $ldap_user, $ldap_password, $ldap_base_dn, $ldap_base_filter, $ldap_uid, $ldap_ssl, $ldap_cert_tmpFilename, $ldap_cert_required);
2705 tom.houday 320
					if ($res > 1) {
321
						$result = $res;
322
					}
323
					$result = max($result, $res);
324
				}
325
			}
326
 
327
			$response['result'] = $result;
2453 tom.houday 328
		}
329
	}
330
 
331
	header('Content-Type: application/json');
332
	echo json_encode($response);
333
	exit();
334
}
335
 
620 stephane 336
?>
2449 tom.houday 337
<!DOCTYPE html>
338
<html>
339
<head>
340
	<meta charset="UTF-8">
341
	<title><?= $l_ldap_title ?></title>
342
	<link type="text/css" href="/css/style.css" rel="stylesheet">
343
	<link type="text/css" href="/css/acc.css" rel="stylesheet">
344
	<link type="text/css" href="/css/ldap.css" rel="stylesheet">
345
	<script>
346
	function onLdapStatusChange() {
2705 tom.houday 347
		var listToDisables = ['ldap_server', 'ldap_dn', 'ldap_uid', 'ldap_base_filter', 'ldap_user', 'ldap_password', 'ldap_ssl', 'ldap_cert_required', 'ldap_cert'];
2460 tom.houday 348
		var formSubmit = document.querySelector('form input[type="submit"]');
349
		var btn_checkConf = document.getElementById('btn-checkconf');
350
		var isChecked = false;
318 richard 351
 
2453 tom.houday 352
		if (document.getElementById('auth_enable').value === '1') {
2449 tom.houday 353
			for (var i=0; i<listToDisables.length; i++) {
2705 tom.houday 354
				document.getElementById(listToDisables[i]).style.backgroundColor = null;
2449 tom.houday 355
				document.getElementById(listToDisables[i]).disabled = false;
356
			}
2705 tom.houday 357
			if (document.getElementById('ldap_ssl').value === 'off') {
358
				document.getElementById('ldap_cert_required').style.backgroundColor = '#c0c0c0';
359
				document.getElementById('ldap_cert_required').disabled = true;
360
				document.getElementById('ldap_cert').style.backgroundColor = '#c0c0c0';
361
				document.getElementById('ldap_cert').disabled = true;
362
			}
363
			else if (document.getElementById('ldap_cert_required').value === 'off') {
364
				document.getElementById('ldap_cert').style.backgroundColor = '#c0c0c0';
365
				document.getElementById('ldap_cert').disabled = true;
366
			}
2460 tom.houday 367
			formSubmit.style.display = 'none';
368
			btn_checkConf.style.display = null;
2705 tom.houday 369
			<?php if (PHP_VERSION_ID < 70100): ?>
370
			// Compatibility with PHP < 7.1.0 # TODO : remove if ever Mageia 7 is released
371
			formSubmit.style.display = null;
372
			<?php endif; ?>
2449 tom.houday 373
		} else {
374
			for (var i=0; i<listToDisables.length; i++) {
375
				document.getElementById(listToDisables[i]).style.backgroundColor = '#c0c0c0';
376
				document.getElementById(listToDisables[i]).disabled = true;
377
			}
2460 tom.houday 378
			formSubmit.style.display = null;
379
			btn_checkConf.style.display = 'none';
2449 tom.houday 380
		}
381
	}
2453 tom.houday 382
 
383
	function checkConfig() {
2462 tom.houday 384
		var messagesElem = document.querySelector('fieldset > legend > div');
2460 tom.houday 385
		var formSubmit   = document.querySelector('form input[type="submit"]');
386
		var btn_checkConf = document.getElementById('btn-checkconf');
2705 tom.houday 387
		var form = document.getElementById('form-config_ldap');
388
		var post_data = new FormData(form);
389
		post_data.delete('auth_enable');
2460 tom.houday 390
 
2475 tom.houday 391
		messagesElem.innerHTML = '<?= $l_checkingConf ?>';
2460 tom.houday 392
 
2453 tom.houday 393
		var xhr = new XMLHttpRequest();
394
		xhr.onreadystatechange = function() {
395
			if (this.readyState == 4) {
396
				if (this.status == 200) {
397
					var data = JSON.parse(this.responseText);
398
 
2460 tom.houday 399
					var messages = '';
400
 
401
					if (typeof data.result !== 'undefined') {
402
						if (data.result === -2) {
403
							messages += "<span style=\"color: red\"><?= $l_ldap_test_service_failed ?></span>";
404
						} else {
405
							messages += "<span style=\"color: green\"><?= $l_ldap_test_service_ok ?></span>";
406
							if (data.result === -1) {
407
								messages += "<br><span style=\"color: red\"><?= $l_ldap_test_connection_failed ?></span>";
408
							} else {
409
								messages += "<br><span style=\"color: green\"><?= $l_ldap_test_connection_ok ?></span>";
410
								if (data.result === 0) {
411
									messages += "<br><span style=\"color: red\"><?= $l_ldap_test_bind_failed ?></span>";
412
								} else {
413
									messages += "<br><span style=\"color: green\"><?= $l_ldap_test_bind_ok ?></span>";
414
									if (data.result === 1) {
415
										messages += "<br><span style=\"color: red\"><?= $l_ldap_test_dn_failed ?></span>";
416
									} else {
417
										messages += "<br><span style=\"color: green\"><?= $l_ldap_test_dn_ok ?> (" + (data.result - 2) + " <?= $l_ldap_entries?>)</span>";
418
									}
419
								}
420
							}
421
						}
422
					}
423
 
424
					if (data.result > 1) {
425
						formSubmit.style.display = null;
426
						btn_checkConf.style.display = 'none';
2453 tom.houday 427
					} else {
2460 tom.houday 428
						formSubmit.style.display = 'none';
429
						btn_checkConf.style.display = null;
2453 tom.houday 430
					}
2705 tom.houday 431
					<?php if (PHP_VERSION_ID < 70100): ?>
432
					// Compatibility with PHP < 7.1.0 # TODO : remove if ever Mageia 7 is released
433
					formSubmit.style.display = null;
434
					<?php endif; ?>
2453 tom.houday 435
 
436
					if (typeof data.errors !== 'undefined') {
2460 tom.houday 437
						messages = '<span style=\"color: red\">' + data.errors.join('</span><br><span style=\"color: red\">') + '</span><br>';
2453 tom.houday 438
					}
2705 tom.houday 439
					if (typeof data.warnings !== 'undefined') {
440
						messages += '<br><span style=\"color: orange\">' + data.warnings.join('</span><br><span style=\"color: orange\">') + '</span><br>';
441
					}
2453 tom.houday 442
 
2460 tom.houday 443
					messagesElem.innerHTML = messages;
2453 tom.houday 444
				} else {
2460 tom.houday 445
					messagesElem.innerHTML = 'server error';
2453 tom.houday 446
				}
447
			}
448
		};
449
		xhr.open('POST', 'ldap.php?conf_check', true);
2462 tom.houday 450
		xhr.send(post_data);
2453 tom.houday 451
	}
2449 tom.houday 452
	</script>
453
</head>
2462 tom.houday 454
<body onLoad="onLdapStatusChange();">
2449 tom.houday 455
	<div class="panel">
456
		<div class="panel-header"><?= $l_ldap_legend ?></div>
457
		<div class="panel-body">
2705 tom.houday 458
			<form id="form-config_ldap" name="config_ldap" method="POST" action="<?= htmlspecialchars($_SERVER['PHP_SELF']) ?>" enctype="multipart/form-data">
2449 tom.houday 459
				<fieldset>
460
					<legend>
2460 tom.houday 461
						<br>
462
						<div style="text-align: center">
463
							<?php if ($messages): ?>
464
								<?= $messages ?>
465
							<?php endif; ?>
466
						</div>
2449 tom.houday 467
					</legend>
468
					<dl>
469
						<dt>
470
							<label for="auth_enable"><?= $l_ldap_auth_enable_label ?></label>
471
						</dt>
472
						<dd>
473
							<select id="auth_enable" name="auth_enable" onchange="onLdapStatusChange();">
474
								<option value="1"<?= ($ldap_status)  ? ' selected="selected"' : '' ?>><?= $l_ldap_YES ?></option>
475
								<option value="0"<?= (!$ldap_status) ? ' selected="selected"' : '' ?>><?= $l_ldap_NO ?></option>
476
							</select>
477
						</dd>
478
					</dl>
479
					<dl>
480
						<dt>
481
							<label for="ldap_server"><?= $l_ldap_server_label ?></label><br>
482
							<?= $l_ldap_server_text ?>
483
						</dt>
484
						<dd>
2475 tom.houday 485
							<input type="text" id="ldap_server" size="40" name="ldap_server" value="<?= htmlspecialchars($ldap_server) ?>" oninput="onLdapStatusChange();">
2449 tom.houday 486
						</dd>
487
					</dl>
488
					<dl>
489
						<dt>
490
							<label for="ldap_dn"><?= $l_ldap_base_dn_label ?></label><br>
491
							<?= $l_ldap_base_dn_text ?>
492
						</dt>
493
						<dd>
2475 tom.houday 494
							<input type="text" id="ldap_dn" size="40" name="ldap_base_dn" value="<?= htmlspecialchars($ldap_base_dn) ?>" oninput="onLdapStatusChange();">
2449 tom.houday 495
						</dd>
496
					</dl>
497
					<dl>
498
						<dt>
2459 richard 499
							<label for="ldap_uid"><?= $l_ldap_uid_label ?></label><br>
500
							<?= $l_ldap_uid_text ?>
2449 tom.houday 501
						</dt>
502
						<dd>
2475 tom.houday 503
							<input type="text" id="ldap_uid" size="40" name="ldap_uid" value="<?= htmlspecialchars($ldap_uid) ?>" oninput="onLdapStatusChange();">
2449 tom.houday 504
						</dd>
505
					</dl>
506
					<dl>
507
						<dt>
508
							<label for="ldap_base_filter"><?= $l_ldap_base_filter_label ?></label><br>
509
							<?= $l_ldap_base_filter_text ?>
510
						</dt>
511
						<dd>
2475 tom.houday 512
							<input type="text" id="ldap_base_filter" size="40" name="ldap_base_filter" value="<?= htmlspecialchars($ldap_base_filter) ?>" oninput="onLdapStatusChange();">
2449 tom.houday 513
						</dd>
514
					</dl>
515
					<dl>
516
						<dt>
517
							<label for="ldap_user"><?= $l_ldap_user_label ?></label><br>
518
							<?= $l_ldap_user_text ?>
519
						</dt>
520
						<dd>
2475 tom.houday 521
							<input type="text" id="ldap_user" size="40" name="ldap_user" value="<?= htmlspecialchars($ldap_user) ?>" oninput="onLdapStatusChange();">
2449 tom.houday 522
						</dd>
523
					</dl>
524
					<dl>
525
						<dt>
526
							<label for="ldap_password"><?= $l_ldap_password_label ?></label><br>
527
							<?= $l_ldap_password_text ?>
528
						</dt>
529
						<dd>
2705 tom.houday 530
							<input type="password" id="ldap_password" size="40" name="ldap_password" value="<?= htmlspecialchars($ldap_password) ?>" oninput="onLdapStatusChange();">
2449 tom.houday 531
						</dd>
532
					</dl>
2705 tom.houday 533
					<dl>
534
						<dt>
535
							<label for="ldap_ssl"><?= $l_ldap_ssl_label ?></label><br>
536
							<?= $l_ldap_ssl_text ?><br>
537
						</dt>
538
						<dd>
539
							<select id="ldap_ssl" name="ldap_ssl" onchange="onLdapStatusChange();">
540
								<option value="on"<?= ($ldap_ssl)  ? ' selected="selected"' : '' ?>><?= $l_ldap_YES ?></option>
541
								<option value="off"<?= (!$ldap_ssl) ? ' selected="selected"' : '' ?>><?= $l_ldap_NO ?></option>
542
							</select>
543
						</dd>
544
					</dl>
545
					<dl>
546
						<dt>
547
							<label for="ldap_cert_required"><?= $l_ldap_cert_required_label ?></label><br>
548
							<?= $l_ldap_cert_required_text ?><br>
549
						</dt>
550
						<dd>
551
							<select id="ldap_cert_required" name="ldap_cert_required" onchange="onLdapStatusChange();">
552
								<option value="on"<?= ($ldap_cert_required)  ? ' selected="selected"' : '' ?>><?= $l_ldap_YES ?></option>
553
								<option value="off"<?= (!$ldap_cert_required) ? ' selected="selected"' : '' ?>><?= $l_ldap_NO ?></option>
554
							</select>
555
						</dd>
556
					</dl>
557
					<dl>
558
						<dt>
559
							<label for="ldap_cert"><?= $l_ldap_cert_label ?></label><br>
560
							<?= $l_ldap_cert_text ?><br>
561
							<?= (($ldap_cert_subject) ? "$l_ldap_cert_status_cur $ldap_cert_subject" : $l_ldap_cert_status_no ) ?>
562
						</dt>
563
						<dd>
564
							<input type="file" id="ldap_cert" name="ldap_cert" oninput="onLdapStatusChange();">
565
						</dd>
566
					</dl>
2449 tom.houday 567
					<p>
2461 richard 568
						<button id="btn-checkconf" onclick="checkConfig(); return false;"><?= $l_check ?></button>
2475 tom.houday 569
						<input id="submit" type="submit" value="<?= $l_ldap_submit ?>" name="submit">
2449 tom.houday 570
					</p>
571
				</fieldset>
572
			</form>
573
		</div>
574
	</div>
318 richard 575
</body>
576
</html>