2013-06-03 17:02:08 +02:00
|
|
|
<?php
|
2013-07-12 13:41:48 +02:00
|
|
|
|
2013-06-28 16:47:30 +02:00
|
|
|
/**
|
2013-07-12 13:41:48 +02:00
|
|
|
* LDAP connection handler
|
2013-06-28 16:47:30 +02:00
|
|
|
*/
|
2013-06-03 17:02:08 +02:00
|
|
|
namespace Icinga\Protocol\Ldap;
|
2013-06-07 13:29:11 +02:00
|
|
|
|
2013-06-03 17:02:08 +02:00
|
|
|
use Icinga\Application\Platform;
|
2013-08-12 15:02:25 +02:00
|
|
|
use \Icinga\Application\Config;
|
2013-06-03 17:02:08 +02:00
|
|
|
use Icinga\Application\Logger as Log;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Backend class managing all the LDAP stuff for you.
|
|
|
|
*
|
|
|
|
* Usage example:
|
|
|
|
*
|
|
|
|
* <code>
|
|
|
|
* $lconf = new Connection((object) array(
|
|
|
|
* 'hostname' => 'localhost',
|
|
|
|
* 'root_dn' => 'dc=monitoring,dc=...',
|
|
|
|
* 'bind_dn' => 'cn=Mangager,dc=monitoring,dc=...',
|
|
|
|
* 'bind_pw' => '***'
|
|
|
|
* ));
|
|
|
|
* </code>
|
|
|
|
*
|
|
|
|
* @copyright Copyright (c) 2013 Icinga-Web Team <info@icinga.org>
|
|
|
|
* @author Icinga-Web Team <info@icinga.org>
|
|
|
|
* @license http://www.gnu.org/copyleft/gpl.html GNU General Public License
|
|
|
|
*/
|
|
|
|
class Connection
|
|
|
|
{
|
2013-07-12 13:41:48 +02:00
|
|
|
const LDAP_NO_SUCH_OBJECT = 0x20;
|
2013-06-07 13:29:11 +02:00
|
|
|
|
2013-07-12 13:41:48 +02:00
|
|
|
protected $ds;
|
2013-06-03 17:02:08 +02:00
|
|
|
protected $hostname;
|
2013-07-12 13:41:48 +02:00
|
|
|
protected $port = 389;
|
2013-06-03 17:02:08 +02:00
|
|
|
protected $bind_dn;
|
|
|
|
protected $bind_pw;
|
|
|
|
protected $root_dn;
|
|
|
|
protected $count;
|
|
|
|
protected $ldap_extension = array(
|
2013-07-12 13:41:48 +02:00
|
|
|
'1.3.6.1.4.1.1466.20037' => 'STARTTLS',
|
2013-06-03 17:02:08 +02:00
|
|
|
// '1.3.6.1.4.1.4203.1.11.1' => '11.1', // PASSWORD_MODIFY
|
|
|
|
// '1.3.6.1.4.1.4203.1.11.3' => '11.3', // Whoami
|
|
|
|
// '1.3.6.1.1.8' => '8', // Cancel Extended Request
|
|
|
|
);
|
|
|
|
|
|
|
|
protected $ms_capability = array(
|
|
|
|
// Prefix LDAP_CAP_
|
|
|
|
// Source: http://msdn.microsoft.com/en-us/library/cc223359.aspx
|
|
|
|
|
|
|
|
// Running Active Directory as AD DS:
|
2013-07-12 13:41:48 +02:00
|
|
|
'1.2.840.113556.1.4.800' => 'ACTIVE_DIRECTORY_OID',
|
|
|
|
|
2013-06-03 17:02:08 +02:00
|
|
|
// Capable of signing and sealing on an NTLM authenticated connection
|
|
|
|
// and of performing subsequent binds on a signed or sealed connection.
|
|
|
|
'1.2.840.113556.1.4.1791' => 'ACTIVE_DIRECTORY_LDAP_INTEG_OID',
|
2013-07-12 13:41:48 +02:00
|
|
|
|
2013-06-03 17:02:08 +02:00
|
|
|
// If AD DS: running at least W2K3, if AD LDS running at least W2K8
|
|
|
|
'1.2.840.113556.1.4.1670' => 'ACTIVE_DIRECTORY_V51_OID',
|
2013-07-12 13:41:48 +02:00
|
|
|
|
2013-06-03 17:02:08 +02:00
|
|
|
// If AD LDS: accepts DIGEST-MD5 binds for AD LDSsecurity principals
|
|
|
|
'1.2.840.113556.1.4.1880' => 'ACTIVE_DIRECTORY_ADAM_DIGEST',
|
2013-07-12 13:41:48 +02:00
|
|
|
|
2013-06-03 17:02:08 +02:00
|
|
|
// Running Active Directory as AD LDS
|
|
|
|
'1.2.840.113556.1.4.1851' => 'ACTIVE_DIRECTORY_ADAM_OID',
|
2013-07-12 13:41:48 +02:00
|
|
|
|
2013-06-03 17:02:08 +02:00
|
|
|
// If AD DS: it's a Read Only DC (RODC)
|
|
|
|
'1.2.840.113556.1.4.1920' => 'ACTIVE_DIRECTORY_PARTIAL_SECRETS_OID',
|
2013-07-12 13:41:48 +02:00
|
|
|
|
2013-06-03 17:02:08 +02:00
|
|
|
// Running at least W2K8
|
|
|
|
'1.2.840.113556.1.4.1935' => 'ACTIVE_DIRECTORY_V60_OID',
|
2013-07-12 13:41:48 +02:00
|
|
|
|
2013-06-03 17:02:08 +02:00
|
|
|
// Running at least W2K8r2
|
|
|
|
'1.2.840.113556.1.4.2080' => 'ACTIVE_DIRECTORY_V61_R2_OID',
|
2013-07-12 13:41:48 +02:00
|
|
|
|
2013-06-03 17:02:08 +02:00
|
|
|
// Running at least W2K12
|
|
|
|
'1.2.840.113556.1.4.2237' => 'ACTIVE_DIRECTORY_W8_OID',
|
|
|
|
|
|
|
|
);
|
|
|
|
|
|
|
|
protected $root;
|
|
|
|
|
2013-07-12 13:41:48 +02:00
|
|
|
protected $supports_v3 = false;
|
|
|
|
protected $supports_tls = false;
|
|
|
|
|
2013-06-03 17:02:08 +02:00
|
|
|
/**
|
|
|
|
* Constructor
|
|
|
|
*
|
|
|
|
* TODO: Allow to pass port and SSL options
|
|
|
|
*
|
|
|
|
* @param array LDAP connection credentials
|
|
|
|
*/
|
|
|
|
public function __construct($config)
|
|
|
|
{
|
|
|
|
$this->hostname = $config->hostname;
|
2013-07-12 13:41:48 +02:00
|
|
|
$this->bind_dn = $config->bind_dn;
|
|
|
|
$this->bind_pw = $config->bind_pw;
|
|
|
|
$this->root_dn = $config->root_dn;
|
|
|
|
|
2013-06-03 17:02:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
public function getDN()
|
|
|
|
{
|
|
|
|
return $this->root_dn;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function root()
|
|
|
|
{
|
|
|
|
if ($this->root === null) {
|
|
|
|
$this->root = Root::forConnection($this);
|
|
|
|
}
|
|
|
|
return $this->root;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function select()
|
|
|
|
{
|
|
|
|
return new Query($this);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function fetchOne($query, $fields = array())
|
|
|
|
{
|
2013-07-12 13:41:48 +02:00
|
|
|
$row = (array) $this->fetchRow($query, $fields);
|
2013-06-03 17:02:08 +02:00
|
|
|
return array_shift($row);
|
|
|
|
}
|
2013-06-07 13:29:11 +02:00
|
|
|
|
2013-06-03 17:02:08 +02:00
|
|
|
public function fetchDN($query, $fields = array())
|
|
|
|
{
|
|
|
|
$rows = $this->fetchAll($query, $fields);
|
|
|
|
if (count($rows) !== 1) {
|
2013-07-12 13:41:48 +02:00
|
|
|
throw new \Exception(
|
2013-06-07 13:29:11 +02:00
|
|
|
sprintf(
|
|
|
|
'Cannot fetch single DN for %s',
|
|
|
|
$query
|
|
|
|
)
|
|
|
|
);
|
2013-06-03 17:02:08 +02:00
|
|
|
}
|
|
|
|
return key($rows);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function fetchRow($query, $fields = array())
|
|
|
|
{
|
|
|
|
// TODO: This is ugly, make it better!
|
|
|
|
$results = $this->fetchAll($query, $fields);
|
|
|
|
return array_shift($results);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function count(Query $query)
|
|
|
|
{
|
|
|
|
$results = $this->runQuery($query, '+');
|
2013-07-12 13:41:48 +02:00
|
|
|
if (! $results) {
|
|
|
|
return 0;
|
|
|
|
}
|
2013-06-03 17:02:08 +02:00
|
|
|
return ldap_count_entries($this->ds, $results);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function fetchAll($query, $fields = array())
|
|
|
|
{
|
|
|
|
$offset = null;
|
|
|
|
$limit = null;
|
|
|
|
if ($query->hasLimit()) {
|
|
|
|
$offset = $query->getOffset();
|
2013-07-12 13:41:48 +02:00
|
|
|
$limit = $query->getLimit();
|
2013-06-03 17:02:08 +02:00
|
|
|
}
|
|
|
|
$entries = array();
|
|
|
|
$results = $this->runQuery($query, $fields);
|
2013-07-12 13:41:48 +02:00
|
|
|
if (! $results) {
|
|
|
|
return array();
|
|
|
|
}
|
2013-06-03 17:02:08 +02:00
|
|
|
$entry = ldap_first_entry($this->ds, $results);
|
|
|
|
$count = 0;
|
|
|
|
while ($entry) {
|
|
|
|
if (($offset === null || $offset <= $count)
|
|
|
|
&& ($limit === null || ($offset + $limit) >= $count)
|
|
|
|
) {
|
|
|
|
$attrs = ldap_get_attributes($this->ds, $entry);
|
2013-07-12 13:41:48 +02:00
|
|
|
$entries[ldap_get_dn($this->ds, $entry)]
|
|
|
|
= $this->cleanupAttributes($attrs);
|
2013-06-03 17:02:08 +02:00
|
|
|
}
|
|
|
|
$count++;
|
|
|
|
$entry = ldap_next_entry($this->ds, $entry);
|
|
|
|
}
|
|
|
|
ldap_free_result($results);
|
|
|
|
return $entries;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function cleanupAttributes(& $attrs)
|
|
|
|
{
|
2013-07-12 13:41:48 +02:00
|
|
|
$clean = (object) array();
|
2013-06-03 17:02:08 +02:00
|
|
|
for ($i = 0; $i < $attrs['count']; $i++) {
|
|
|
|
$attr_name = $attrs[$i];
|
|
|
|
if ($attrs[$attr_name]['count'] === 1) {
|
|
|
|
$clean->$attr_name = $attrs[$attr_name][0];
|
|
|
|
} else {
|
|
|
|
for ($j = 0; $j < $attrs[$attr_name]['count']; $j++) {
|
|
|
|
$clean->{$attr_name}[] = $attrs[$attr_name][$j];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $clean;
|
|
|
|
}
|
|
|
|
|
|
|
|
protected function runQuery($query, $fields)
|
|
|
|
{
|
|
|
|
$this->connect();
|
|
|
|
if ($query instanceof Query) {
|
|
|
|
$fields = $query->listFields();
|
|
|
|
}
|
|
|
|
// WARNING:
|
|
|
|
// We do not support pagination right now, and there is no chance to
|
|
|
|
// do so for PHP < 5.4. Warnings about "Sizelimit exceeded" will
|
|
|
|
// therefore not be hidden right now.
|
2013-07-12 13:41:48 +02:00
|
|
|
$results = @ldap_search(
|
2013-06-03 17:02:08 +02:00
|
|
|
$this->ds,
|
|
|
|
$this->root_dn,
|
2013-07-12 13:41:48 +02:00
|
|
|
(string) $query,
|
2013-06-03 17:02:08 +02:00
|
|
|
$fields,
|
|
|
|
0, // Attributes and values
|
2013-07-12 13:41:48 +02:00
|
|
|
0 // No limit - at least where possible
|
2013-06-03 17:02:08 +02:00
|
|
|
);
|
2013-07-12 13:41:48 +02:00
|
|
|
if ($results === false) {
|
|
|
|
if (ldap_errno($this->ds) === self::LDAP_NO_SUCH_OBJECT) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
throw new \Exception(
|
2013-06-07 13:29:11 +02:00
|
|
|
sprintf(
|
|
|
|
'LDAP query "%s" (root %s) failed: %s',
|
|
|
|
$query,
|
|
|
|
$this->root_dn,
|
|
|
|
ldap_error($this->ds)
|
|
|
|
)
|
|
|
|
);
|
2013-06-03 17:02:08 +02:00
|
|
|
die('Query failed');
|
|
|
|
}
|
|
|
|
$list = array();
|
|
|
|
if ($query instanceof Query) {
|
|
|
|
foreach ($query->getSortColumns() as $col) {
|
2013-06-07 13:29:11 +02:00
|
|
|
ldap_sort($this->ds, $results, $col[0]);
|
2013-06-03 17:02:08 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return $results;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testCredentials($username, $password)
|
|
|
|
{
|
2013-07-12 13:41:48 +02:00
|
|
|
$ds = $this->prepareNewConnection();
|
|
|
|
|
2013-06-03 17:02:08 +02:00
|
|
|
$r = @ldap_bind($ds, $username, $password);
|
|
|
|
if ($r) {
|
2013-07-12 13:41:48 +02:00
|
|
|
log::debug(
|
|
|
|
'Successfully tested LDAP credentials (%s / %s)',
|
|
|
|
$username,
|
|
|
|
'***'
|
|
|
|
);
|
2013-06-03 17:02:08 +02:00
|
|
|
return true;
|
|
|
|
} else {
|
2013-07-12 13:41:48 +02:00
|
|
|
log::debug(
|
|
|
|
'Testing LDAP credentials (%s / %s) failed: %s',
|
2013-06-03 17:02:08 +02:00
|
|
|
$username,
|
|
|
|
'***',
|
2013-06-07 13:29:11 +02:00
|
|
|
ldap_error($ds)
|
|
|
|
);
|
2013-06-03 17:02:08 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-07-12 13:41:48 +02:00
|
|
|
protected function getConfigDir($sub = null)
|
2013-06-03 17:02:08 +02:00
|
|
|
{
|
2013-07-12 13:41:48 +02:00
|
|
|
$dir = Config::getInstance()->getConfigDir() . '/ldap';
|
|
|
|
if ($sub !== null) {
|
|
|
|
$dir .= '/' . $sub;
|
|
|
|
}
|
|
|
|
return $dir;
|
2013-06-03 17:02:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
protected function discoverServerlistForDomain($domain)
|
|
|
|
{
|
|
|
|
$ldaps_records = dns_get_record('_ldaps._tcp.' . $domain, DNS_SRV);
|
2013-07-12 13:41:48 +02:00
|
|
|
$ldap_records = dns_get_record('_ldap._tcp.' . $domain, DNS_SRV);
|
|
|
|
}
|
|
|
|
|
|
|
|
protected function prepareNewConnection()
|
|
|
|
{
|
|
|
|
$use_tls = false;
|
|
|
|
$force_tls = true;
|
|
|
|
$force_tls = false;
|
|
|
|
|
|
|
|
if ($use_tls) {
|
|
|
|
$this->prepareTlsEnvironment();
|
|
|
|
}
|
|
|
|
|
|
|
|
$ds = ldap_connect($this->hostname, $this->port);
|
|
|
|
$cap = $this->discoverCapabilities($ds);
|
|
|
|
|
|
|
|
if ($use_tls) {
|
|
|
|
if ($cap->starttls) {
|
|
|
|
if (@ldap_start_tls($ds)) {
|
|
|
|
Log::debug('LDAP STARTTLS succeeded');
|
|
|
|
} else {
|
|
|
|
Log::debug('LDAP STARTTLS failed: %s', ldap_error($ds));
|
|
|
|
throw new \Exception(
|
|
|
|
sprintf(
|
|
|
|
'LDAP STARTTLS failed: %s',
|
|
|
|
ldap_error($ds)
|
|
|
|
)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
} elseif ($force_tls) {
|
|
|
|
throw new \Exception(
|
|
|
|
sprintf(
|
|
|
|
'TLS is required but not announced by %s',
|
|
|
|
$this->host_name
|
|
|
|
)
|
|
|
|
);
|
|
|
|
} else {
|
|
|
|
// TODO: Log noticy -> TLS enabled but not announced
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// ldap_rename requires LDAPv3:
|
|
|
|
if ($cap->ldapv3) {
|
|
|
|
if (! ldap_set_option($ds, LDAP_OPT_PROTOCOL_VERSION, 3)) {
|
|
|
|
throw new Exception('LDAPv3 is required');
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
|
|
|
|
// TODO: remove this -> FORCING v3 for now
|
|
|
|
ldap_set_option($ds, LDAP_OPT_PROTOCOL_VERSION, 3);
|
|
|
|
|
|
|
|
Log::warn('No LDAPv3 support detected');
|
|
|
|
}
|
|
|
|
|
|
|
|
// Not setting this results in "Operations error" on AD when using the
|
|
|
|
// whole domain as search base:
|
|
|
|
ldap_set_option($ds, LDAP_OPT_REFERRALS, 0);
|
|
|
|
// ldap_set_option($ds, LDAP_OPT_DEREF, LDAP_DEREF_NEVER);
|
|
|
|
return $ds;
|
2013-06-03 17:02:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
protected function prepareTlsEnvironment()
|
|
|
|
{
|
2013-07-12 13:41:48 +02:00
|
|
|
$strict_tls = true;
|
|
|
|
// TODO: allow variable known CA location (system VS Icinga)
|
2013-06-03 17:02:08 +02:00
|
|
|
if (Platform::isWindows()) {
|
2013-07-12 13:41:48 +02:00
|
|
|
// putenv('LDAP...')
|
2013-06-03 17:02:08 +02:00
|
|
|
} else {
|
|
|
|
if ($strict_tls) {
|
2013-07-12 13:41:48 +02:00
|
|
|
$ldap_conf = $this->getConfigDir('ldap_ca.conf');
|
2013-06-03 17:02:08 +02:00
|
|
|
} else {
|
2013-07-12 13:41:48 +02:00
|
|
|
$ldap_conf = $this->getConfigDir('ldap_nocert.conf');
|
|
|
|
}
|
|
|
|
putenv('LDAPRC=' . $ldap_conf);
|
|
|
|
if (getenv('LDAPRC') !== $ldap_conf) {
|
|
|
|
throw new Exception('putenv failed');
|
2013-06-03 17:02:08 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-07-12 13:41:48 +02:00
|
|
|
protected function discoverCapabilities($ds)
|
2013-06-03 17:02:08 +02:00
|
|
|
{
|
2013-07-12 13:41:48 +02:00
|
|
|
$query = $this->select()->from(
|
|
|
|
'*',
|
|
|
|
array(
|
|
|
|
'defaultNamingContext',
|
|
|
|
'namingContexts',
|
|
|
|
'vendorName',
|
|
|
|
'vendorVersion',
|
|
|
|
'supportedSaslMechanisms',
|
|
|
|
'dnsHostName',
|
|
|
|
'schemaNamingContext',
|
|
|
|
'supportedLDAPVersion', // => array(3, 2)
|
|
|
|
'supportedCapabilities',
|
|
|
|
'supportedExtension',
|
|
|
|
'+'
|
|
|
|
)
|
|
|
|
);
|
2013-06-03 17:02:08 +02:00
|
|
|
$fields = $query->listFields();
|
|
|
|
|
2013-07-12 13:41:48 +02:00
|
|
|
$result = @ldap_read(
|
|
|
|
$ds,
|
2013-06-03 17:02:08 +02:00
|
|
|
'',
|
2013-07-12 13:41:48 +02:00
|
|
|
(string) $query,
|
|
|
|
$query->listFields()
|
2013-06-03 17:02:08 +02:00
|
|
|
);
|
|
|
|
|
2013-07-12 13:41:48 +02:00
|
|
|
if (! $result) {
|
|
|
|
throw new Exception(
|
|
|
|
sprintf(
|
|
|
|
'Capability query failed: %s',
|
|
|
|
ldap_error($ds)
|
|
|
|
)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
$entry = ldap_first_entry($ds, $result);
|
|
|
|
|
|
|
|
$cap = (object) array(
|
|
|
|
'ldapv3' => false,
|
|
|
|
'starttls' => false,
|
|
|
|
);
|
|
|
|
|
|
|
|
if ($entry === false) {
|
|
|
|
// TODO: Is it OK to have no capabilities?
|
|
|
|
return $cap;
|
|
|
|
}
|
2013-07-26 15:29:13 +02:00
|
|
|
$ldapAttributes = ldap_get_attributes($ds, $entry);
|
2013-07-12 13:41:48 +02:00
|
|
|
$result = $this->cleanupAttributes(
|
2013-07-26 15:29:13 +02:00
|
|
|
$ldapAttributes
|
2013-07-12 13:41:48 +02:00
|
|
|
);
|
|
|
|
/*
|
|
|
|
if (isset($result->dnsHostName)) {
|
|
|
|
ldap_set_option($ds, LDAP_OPT_HOST_NAME, $result->dnsHostName);
|
|
|
|
}
|
|
|
|
*/
|
|
|
|
|
|
|
|
if ((is_string($result->supportedLDAPVersion)
|
|
|
|
&& (int) $result->supportedLDAPVersion === 3)
|
|
|
|
|| (is_array($result->supportedLDAPVersion)
|
|
|
|
&& in_array(3, $result->supportedLDAPVersion)
|
|
|
|
)) {
|
|
|
|
$cap->ldapv3 = true;
|
|
|
|
}
|
2013-06-07 13:29:11 +02:00
|
|
|
|
2013-06-03 17:02:08 +02:00
|
|
|
if (isset($result->supportedCapabilities)) {
|
|
|
|
foreach ($result->supportedCapabilities as $oid) {
|
|
|
|
if (array_key_exists($oid, $this->ms_capability)) {
|
2013-07-12 13:41:48 +02:00
|
|
|
// echo $this->ms_capability[$oid] . "\n";
|
2013-06-03 17:02:08 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (isset($result->supportedExtension)) {
|
|
|
|
foreach ($result->supportedExtension as $oid) {
|
|
|
|
if (array_key_exists($oid, $this->ldap_extension)) {
|
2013-07-12 13:41:48 +02:00
|
|
|
if ($this->ldap_extension[$oid] === 'STARTTLS') {
|
|
|
|
$cap->starttls = true;
|
|
|
|
}
|
2013-06-03 17:02:08 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-07-12 13:41:48 +02:00
|
|
|
return $cap;
|
2013-06-03 17:02:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
public function connect()
|
|
|
|
{
|
2013-06-07 13:29:11 +02:00
|
|
|
if ($this->ds !== null) {
|
|
|
|
return;
|
|
|
|
}
|
2013-07-12 13:41:48 +02:00
|
|
|
$this->ds = $this->prepareNewConnection();
|
2013-06-07 13:29:11 +02:00
|
|
|
|
2013-06-03 17:02:08 +02:00
|
|
|
$r = @ldap_bind($this->ds, $this->bind_dn, $this->bind_pw);
|
|
|
|
|
2013-07-12 13:41:48 +02:00
|
|
|
if (! $r) {
|
|
|
|
throw new \Exception(
|
2013-06-07 13:29:11 +02:00
|
|
|
sprintf(
|
2013-07-12 13:41:48 +02:00
|
|
|
'LDAP connection to %s:%s (%s / %s) failed: %s',
|
|
|
|
$this->hostname,
|
|
|
|
$this->port,
|
|
|
|
$this->bind_dn,
|
|
|
|
'***' /* $this->bind_pw */,
|
|
|
|
ldap_error($this->ds)
|
2013-06-07 13:29:11 +02:00
|
|
|
)
|
|
|
|
);
|
2013-06-03 17:02:08 +02:00
|
|
|
}
|
|
|
|
}
|
2013-07-12 13:41:48 +02:00
|
|
|
|
|
|
|
public function __destruct()
|
|
|
|
{
|
|
|
|
putenv('LDAPRC');
|
|
|
|
}
|
2013-06-03 17:02:08 +02:00
|
|
|
}
|