1235 lines
34 KiB
PHP
1235 lines
34 KiB
PHP
<?php
|
|
|
|
// Pandora FMS - http://pandorafms.com
|
|
// ==================================================
|
|
// Copyright (c) 2005-2009 Artica Soluciones Tecnologicas
|
|
// Please see http://pandorafms.org for full contribution list
|
|
|
|
// This program is free software; you can redistribute it and/or
|
|
// modify it under the terms of the GNU Lesser General Public License
|
|
// as published by the Free Software Foundation; version 2
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
/**
|
|
* @package Include/auth
|
|
*/
|
|
|
|
if (!isset ($config)) {
|
|
die ('
|
|
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
|
|
<html>
|
|
<head>
|
|
<title>Pandora FMS - The Flexible Monitoring System - Console error</title>
|
|
<meta http-equiv="expires" content="0">
|
|
<meta http-equiv="content-type" content="text/html; charset=utf8">
|
|
<meta name="resource-type" content="document">
|
|
<meta name="distribution" content="global">
|
|
<meta name="author" content="Artica ST">
|
|
<meta name="copyright" content="(c) Artica ST">
|
|
<meta name="robots" content="index, follow">
|
|
<link rel="icon" href="../../images/pandora.ico" type="image/ico">
|
|
<link rel="stylesheet" href="../styles/pandora.css" type="text/css">
|
|
</head>
|
|
<body>
|
|
<div id="main" style="float:left; margin-left: 100px">
|
|
<div align="center">
|
|
<div id="login_f">
|
|
<h1 id="log_f" class="error">You cannot access this file</h1>
|
|
<div>
|
|
<img src="../../images/pandora_logo.png" border="0" />
|
|
</div>
|
|
<div class="msg">
|
|
<span class="error">
|
|
<b>ERROR:</b> You can\'t access this file directly!
|
|
</span>
|
|
</div>
|
|
</div>
|
|
</div>
|
|
</div>
|
|
</body>
|
|
</html>
|
|
');
|
|
}
|
|
|
|
include_once($config['homedir'] . "/include/functions_profile.php");
|
|
enterprise_include ('include/auth/mysql.php');
|
|
|
|
$config["user_can_update_info"] = true;
|
|
$config["user_can_update_password"] = true;
|
|
$config["admin_can_add_user"] = true;
|
|
$config["admin_can_delete_user"] = true;
|
|
$config["admin_can_disable_user"] = false; //currently not implemented
|
|
$config["admin_can_make_admin"] = true;
|
|
|
|
/**
|
|
* process_user_login accepts $login and $pass and handles it according to current authentication scheme
|
|
*
|
|
* @param string $login
|
|
* @param string $pass
|
|
* @param boolean $api
|
|
*
|
|
* @return mixed False in case of error or invalid credentials, the username in case it's correct.
|
|
*/
|
|
function process_user_login ($login, $pass, $api = false) {
|
|
global $config, $mysql_cache;
|
|
|
|
// Always authenticate admins against the local database
|
|
if (strtolower ($config["auth"]) == 'mysql' || is_user_admin ($login)) {
|
|
return process_user_login_local ($login, $pass, $api);
|
|
}
|
|
else {
|
|
$login_remote = process_user_login_remote ($login, io_safe_output($pass), $api);
|
|
if ($login_remote == false && $config['fallback_local_auth'] == '1') {
|
|
return process_user_login_local ($login, $pass, $api);
|
|
}
|
|
else {
|
|
return $login_remote;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
function process_user_login_local ($login, $pass, $api = false) {
|
|
global $config, $mysql_cache;
|
|
|
|
// Connect to Database
|
|
switch ($config["dbtype"]) {
|
|
case "mysql":
|
|
if (!$api) {
|
|
$sql = sprintf ("SELECT `id_user`, `password`
|
|
FROM `tusuario`
|
|
WHERE `id_user` = '%s' AND `not_login` = 0
|
|
AND `disabled` = 0", $login);
|
|
}
|
|
else {
|
|
$sql = sprintf ("SELECT `id_user`, `password`
|
|
FROM `tusuario`
|
|
WHERE `id_user` = '%s'
|
|
AND `disabled` = 0", $login);
|
|
}
|
|
break;
|
|
case "postgresql":
|
|
if (!$api) {
|
|
$sql = sprintf ('SELECT "id_user", "password"
|
|
FROM "tusuario"
|
|
WHERE "id_user" = \'%s\' AND "not_login" = 0
|
|
AND "disabled" = 0', $login);
|
|
}
|
|
else {
|
|
$sql = sprintf ('SELECT "id_user", "password"
|
|
FROM "tusuario"
|
|
WHERE "id_user" = \'%s\'
|
|
AND "disabled" = 0', $login);
|
|
}
|
|
break;
|
|
case "oracle":
|
|
if (!$api) {
|
|
$sql = sprintf ('SELECT id_user, password
|
|
FROM tusuario
|
|
WHERE id_user = \'%s\' AND not_login = 0
|
|
AND disabled = 0', $login);
|
|
}
|
|
else {
|
|
$sql = sprintf ('SELECT id_user, password
|
|
FROM tusuario
|
|
WHERE id_user = \'%s\'
|
|
AND disabled = 0', $login);
|
|
}
|
|
break;
|
|
}
|
|
$row = db_get_row_sql ($sql);
|
|
|
|
//Check that row exists, that password is not empty and that password is the same hash
|
|
if ($row !== false && $row["password"] !== md5 ("")
|
|
&& $row["password"] == md5 ($pass)) {
|
|
// Login OK
|
|
// Nick could be uppercase or lowercase (select in MySQL
|
|
// is not case sensitive)
|
|
// We get DB nick to put in PHP Session variable,
|
|
// to avoid problems with case-sensitive usernames.
|
|
// Thanks to David Muñiz for Bug discovery :)
|
|
|
|
$filter = array("id_usuario" => $login);
|
|
$user_profile = db_get_row_filter ("tusuario_perfil", $filter);
|
|
if(!users_is_admin($login) && !$user_profile){
|
|
$mysql_cache["auth_error"] = "User does not have any profile";
|
|
$config["auth_error"] = "User does not have any profile";
|
|
return false;
|
|
}
|
|
|
|
return $row["id_user"];
|
|
}
|
|
else {
|
|
if (!user_can_login($login)) {
|
|
$mysql_cache["auth_error"] = "User only can use the API.";
|
|
$config["auth_error"] = "User only can use the API.";
|
|
}
|
|
else {
|
|
$mysql_cache["auth_error"] = "User not found in database or incorrect password";
|
|
$config["auth_error"] = "User not found in database or incorrect password";
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
function process_user_login_remote ($login, $pass, $api = false) {
|
|
global $config, $mysql_cache;
|
|
|
|
// Remote authentication
|
|
switch ($config["auth"]) {
|
|
// LDAP
|
|
case 'ldap':
|
|
$sr = ldap_process_user_login ($login, $pass);
|
|
|
|
if(!$sr) {
|
|
return false;
|
|
}
|
|
break;
|
|
|
|
// Active Directory
|
|
case 'ad':
|
|
if (enterprise_hook ('ad_process_user_login', array ($login, $pass)) === false) {
|
|
$config["auth_error"] = "User not found in database or incorrect password";
|
|
return false;
|
|
}
|
|
break;
|
|
|
|
// Remote Pandora FMS
|
|
case 'pandora':
|
|
if (enterprise_hook ('remote_pandora_process_user_login', array ($login, $pass)) === false) {
|
|
$config["auth_error"] = "User not found in database or incorrect password";
|
|
return false;
|
|
}
|
|
break;
|
|
|
|
// Remote Integria
|
|
case 'integria':
|
|
if (enterprise_hook ('remote_integria_process_user_login', array ($login, $pass)) === false) {
|
|
$config["auth_error"] = "User not found in database or incorrect password";
|
|
return false;
|
|
}
|
|
break;
|
|
|
|
// Unknown authentication method
|
|
default:
|
|
$config["auth_error"] = "User not found in database
|
|
or incorrect password";
|
|
return false;
|
|
break;
|
|
}
|
|
|
|
if ($config["auth"] === 'ldap') {
|
|
$login_user_attribute = $login;
|
|
if ($config['ldap_login_user_attr'] == 'mail') {
|
|
$login = $sr["mail"][0];
|
|
}
|
|
}
|
|
|
|
// Authentication ok, check if the user exists in the local database
|
|
if (is_user ($login)) {
|
|
if (!user_can_login($login)) {
|
|
return false;
|
|
}
|
|
|
|
if (($config["auth"] === 'ad') &&
|
|
(isset($config['ad_advanced_config']) && $config['ad_advanced_config'])) {
|
|
|
|
$return = enterprise_hook ('prepare_permissions_groups_of_user_ad',
|
|
array ($login, $pass, false, true, defined('METACONSOLE')));
|
|
|
|
if ($return === "error_permissions") {
|
|
$config["auth_error"] =
|
|
__("Problems with configuration permissions. Please contact with Administrator");
|
|
return false;
|
|
}
|
|
else {
|
|
if ($return === "permissions_changed") {
|
|
$config["auth_error"] =
|
|
__("Your permissions have changed. Please, login again.");
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
elseif ($config["auth"] === 'ldap') {
|
|
if ($config['ldap_save_password']) {
|
|
$update_credentials = change_local_user_pass_ldap ($login, $pass);
|
|
|
|
if ($update_credentials) {
|
|
$config["auth_error"] =
|
|
__("Your permissions have changed. Please, login again.");
|
|
return false;
|
|
}
|
|
}
|
|
else {
|
|
delete_user_pass_ldap ($login);
|
|
}
|
|
|
|
$permissions = array();
|
|
if($config['ldap_advanced_config']){
|
|
$i = 0;
|
|
|
|
$ldap_adv_perms = json_decode(io_safe_output($config['ldap_adv_perms']), true);
|
|
foreach ($ldap_adv_perms as $ldap_adv_perm) {
|
|
$attributes = $ldap_adv_perm['groups_ldap'];
|
|
|
|
foreach ($attributes as $attr) {
|
|
$attr = explode('=', $attr, 2);
|
|
foreach ($sr[$attr[0]] as $s_attr) {
|
|
if(preg_match('/' . $attr[1] . '/', $s_attr)){
|
|
$permissions[$i]["profile"] = $ldap_adv_perm['profile'];
|
|
$permissions[$i]["groups"] = $ldap_adv_perm['group'];
|
|
$permissions[$i]["tags"] = implode(",",$ldap_adv_perm['tags']);
|
|
$i++;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
$permissions[0]["profile"] = $config['default_remote_profile'];
|
|
$permissions[0]["groups"][] = $config['default_remote_group'];
|
|
$permissions[0]["tags"] = $config['default_assign_tags'];
|
|
}
|
|
if(empty($permissions)) {
|
|
$config["auth_error"] = __("User not found in database or incorrect password");
|
|
return false;
|
|
|
|
} else {
|
|
// check permissions
|
|
$result = check_permission_ad ($login, $pass, false,
|
|
$permissions, defined('METACONSOLE'));
|
|
|
|
if ($return === "error_permissions") {
|
|
$config["auth_error"] =
|
|
__("Problems with configuration permissions. Please contact with Administrator");
|
|
return false;
|
|
}
|
|
else {
|
|
if ($return === "permissions_changed") {
|
|
$config["auth_error"] =
|
|
__("Your permissions have changed. Please, login again.");
|
|
return false;
|
|
}
|
|
}
|
|
|
|
|
|
}
|
|
}
|
|
|
|
return $login;
|
|
}
|
|
|
|
// The user does not exist and can not be created
|
|
if ($config['autocreate_remote_users'] == 0 || is_user_blacklisted ($login)) {
|
|
$config["auth_error"] = __("Ooops User not found in
|
|
database or incorrect password");
|
|
|
|
return false;
|
|
}
|
|
|
|
if ($config["auth"] === 'ad' &&
|
|
(isset($config['ad_advanced_config']) &&
|
|
$config['ad_advanced_config'])) {
|
|
|
|
|
|
if ( defined('METACONSOLE') ) {
|
|
enterprise_include_once('include/functions_metaconsole.php');
|
|
enterprise_include_once ('meta/include/functions_groups_meta.php');
|
|
|
|
$return = groups_meta_synchronizing();
|
|
|
|
if ($return["group_create_err"] > 0 || $return["group_update_err"] > 0) {
|
|
$config["auth_error"] = __('Fail the group synchronizing');
|
|
return false;
|
|
}
|
|
|
|
$return = meta_tags_synchronizing();
|
|
if ($return['tag_create_err'] > 0 || $return['tag_update_err'] > 0) {
|
|
$config["auth_error"] = __('Fail the tag synchronizing');
|
|
return false;
|
|
}
|
|
}
|
|
|
|
// Create the user
|
|
if (enterprise_hook ('prepare_permissions_groups_of_user_ad',
|
|
array($login,
|
|
$pass,
|
|
array ('fullname' => $login,
|
|
'comments' => 'Imported from ' . $config['auth']),
|
|
false, defined('METACONSOLE'))) === false) {
|
|
|
|
$config["auth_error"] = __("User not found in database
|
|
or incorrect password");
|
|
|
|
return false;
|
|
}
|
|
}
|
|
elseif ($config["auth"] === 'ldap') {
|
|
if ( defined('METACONSOLE') ) {
|
|
enterprise_include_once('include/functions_metaconsole.php');
|
|
enterprise_include_once ('meta/include/functions_groups_meta.php');
|
|
|
|
$return = groups_meta_synchronizing();
|
|
|
|
if ($return["group_create_err"] > 0 || $return["group_update_err"] > 0) {
|
|
$config["auth_error"] = __('Fail the group synchronizing');
|
|
return false;
|
|
}
|
|
|
|
$return = meta_tags_synchronizing();
|
|
if ($return['tag_create_err'] > 0 || $return['tag_update_err'] > 0) {
|
|
$config["auth_error"] = __('Fail the tag synchronizing');
|
|
return false;
|
|
}
|
|
}
|
|
|
|
$permissions = array();
|
|
if($config['ldap_advanced_config']){
|
|
$i = 0;
|
|
|
|
$ldap_adv_perms = json_decode(io_safe_output($config['ldap_adv_perms']), true);
|
|
|
|
foreach ($ldap_adv_perms as $ldap_adv_perm) {
|
|
$attributes = $ldap_adv_perm['groups_ldap'];
|
|
|
|
foreach ($attributes as $attr) {
|
|
$attr = explode('=', $attr, 2);
|
|
foreach ($sr[$attr[0]] as $s_attr) {
|
|
if(preg_match('/' . $attr[1] . '/', $s_attr)){
|
|
$permissions[$i]["profile"] = $ldap_adv_perm['profile'];
|
|
$permissions[$i]["groups"] = $ldap_adv_perm['group'];
|
|
$permissions[$i]["tags"] = implode(",",$ldap_adv_perm['tags']);
|
|
$i++;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
$permissions[0]["profile"] = $config['default_remote_profile'];
|
|
$permissions[0]["groups"][] = $config['default_remote_group'];
|
|
$permissions[0]["tags"] = $config['default_assign_tags'];
|
|
}
|
|
|
|
if(empty($permissions)) {
|
|
$config["auth_error"] = __("User not found in database or incorrect password");
|
|
return false;
|
|
|
|
} else {
|
|
$user_info['fullname'] = $sr['cn'][0];
|
|
$user_info['email'] = $sr['mail'][0];
|
|
|
|
// Create the user
|
|
$create_user = create_user_and_permisions_ldap($login, $pass, $user_info, $permissions, defined('METACONSOLE'));
|
|
}
|
|
|
|
}
|
|
else {
|
|
|
|
$user_info = array ('fullname' => $login,
|
|
'comments' => 'Imported from ' . $config['auth']);
|
|
if ( is_metaconsole() && $config["auth"] === 'ad')
|
|
$user_info['metaconsole_access_node'] = $config['ad_adv_user_node'];
|
|
|
|
// Create the user in the local database
|
|
if (create_user ($login, $pass, $user_info ) === false) {
|
|
$config["auth_error"] = __("User not found in database or incorrect password");
|
|
return false;
|
|
}
|
|
|
|
profile_create_user_profile ($login, $config['default_remote_profile'],
|
|
$config['default_remote_group'], false, $config['default_assign_tags']);
|
|
//TODO: Check the creation in the nodes
|
|
if ( is_metaconsole() ) {
|
|
enterprise_include_once('include/functions_metaconsole.php');
|
|
enterprise_include_once ('meta/include/functions_groups_meta.php');
|
|
|
|
$return = groups_meta_synchronizing();
|
|
|
|
if ($return["group_create_err"] > 0 || $return["group_update_err"] > 0) {
|
|
$config["auth_error"] = __('Fail the group synchronizing');
|
|
return false;
|
|
}
|
|
|
|
$return = meta_tags_synchronizing();
|
|
if ($return['tag_create_err'] > 0 || $return['tag_update_err'] > 0) {
|
|
$config["auth_error"] = __('Fail the tag synchronizing');
|
|
return false;
|
|
}
|
|
|
|
$servers = metaconsole_get_servers();
|
|
foreach ($servers as $server) {
|
|
$perfil_maestro = db_get_row('tperfil',
|
|
'id_perfil', $config['default_remote_profile']);
|
|
|
|
if (metaconsole_connect($server) == NOERR ) {
|
|
|
|
if (!profile_exist($perfil_maestro['name'])) {
|
|
unset($perfil_maestro['id_perfil']);
|
|
$id_profile = db_process_sql_insert('tperfil', $perfil_maestro);
|
|
}
|
|
else {
|
|
$id_profile = db_get_value('id_perfil', 'tperfil', 'name', $perfil_maestro['name']);
|
|
}
|
|
|
|
if ($config["auth"] === 'ad') {
|
|
unset($user_info['metaconsole_access_node']);
|
|
$user_info['not_login'] = (int) !$config['ad_adv_user_node'];
|
|
}
|
|
|
|
if (create_user ($login, $pass, $user_info) === false)
|
|
continue;
|
|
profile_create_user_profile ($login, $id_profile,
|
|
$config['default_remote_group'], false, $config['default_assign_tags']);
|
|
}
|
|
|
|
metaconsole_restore_db();
|
|
}
|
|
}
|
|
}
|
|
|
|
return $login;
|
|
}
|
|
|
|
/**
|
|
* Checks if a user is administrator.
|
|
*
|
|
* @param string User id.
|
|
*
|
|
* @return bool True is the user is admin
|
|
*/
|
|
function is_user_admin ($id_user) {
|
|
require_once(__DIR__ . "/../functions_users.php");
|
|
return users_is_admin($id_user);
|
|
}
|
|
|
|
|
|
/**
|
|
* Get the user id field on a mixed structure.
|
|
*
|
|
* This function is needed to make auth system more compatible and independant.
|
|
*
|
|
* @param mixed User structure to get id. It might be a row returned from
|
|
* tusuario or tusuario_perfil. If it's not a row, the int value is returned.
|
|
*
|
|
* @return int User id of the mixed parameter.
|
|
*/
|
|
function get_user_id ($user) {
|
|
if (is_array ($user)) {
|
|
if (isset ($user['id_user']))
|
|
return $user['id_user'];
|
|
elseif (isset ($user['id_usuario']))
|
|
return $user['id_usuario'];
|
|
else
|
|
return false;
|
|
}
|
|
else {
|
|
return $user;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Check is a user exists in the system
|
|
*
|
|
* @param mixed User id.
|
|
*
|
|
* @return bool True if the user exists.
|
|
*/
|
|
function is_user ($user) {
|
|
$user = db_get_row('tusuario', 'id_user', get_user_id ($user));
|
|
|
|
if (! $user)
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
function user_can_login($user) {
|
|
$not_login = db_get_value('not_login', 'tusuario', 'id_user', $user);
|
|
|
|
if ($not_login != 0) {
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* Gets the users real name
|
|
*
|
|
* @param mixed User id.
|
|
*
|
|
* @return string The users full name
|
|
*/
|
|
function get_user_fullname ($user) {
|
|
return (string) db_get_value ('fullname', 'tusuario', 'id_user', get_user_id ($user));
|
|
}
|
|
|
|
/**
|
|
* Gets the users email
|
|
*
|
|
* @param mixed User id.
|
|
*
|
|
* @return string The users email address
|
|
*/
|
|
function get_user_email ($user) {
|
|
return (string) db_get_value ('email', 'tusuario', 'id_user', get_user_id ($user));
|
|
}
|
|
|
|
/**
|
|
* Gets a Users info
|
|
*
|
|
* @param mixed User id
|
|
*
|
|
* @return mixed An array of users
|
|
*/
|
|
function get_user_info ($user) {
|
|
static $cache_user_info = array();
|
|
if (array_key_exists($user, $cache_user_info)){
|
|
return $cache_user_info[$user];
|
|
}
|
|
else{
|
|
$return = db_get_row ("tusuario", "id_user", get_user_id ($user));
|
|
$cache_user_info[$user] = $return;
|
|
return $return;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Get a list of all users in an array [username] => array (userinfo)
|
|
* We can't simplify this because some auth schemes (like LDAP) automatically (or it's at least cheaper to) return all the information
|
|
* Functions like get_user_info allow selection of specifics (in functions_db)
|
|
*
|
|
* @param string Field to order by (id_user, fullname or registered)
|
|
*
|
|
* @return array An array of user information
|
|
*/
|
|
function get_users ($order = "fullname", $filter = false, $fields = false) {
|
|
if (is_array($order)) {
|
|
$filter['order'] = $order['field'] . ' ' . $order['order'];
|
|
}
|
|
else {
|
|
switch ($order) {
|
|
case "registered":
|
|
case "last_connect":
|
|
case "fullname":
|
|
break;
|
|
default:
|
|
$order = "fullname";
|
|
break;
|
|
}
|
|
|
|
$filter['order'] = $order." ASC";
|
|
}
|
|
|
|
|
|
$output = array();
|
|
|
|
$result = db_get_all_rows_filter ("tusuario", $filter, $fields);
|
|
if ($result !== false) {
|
|
foreach ($result as $row) {
|
|
$output[$row["id_user"]] = $row;
|
|
}
|
|
}
|
|
|
|
return $output;
|
|
}
|
|
|
|
/**
|
|
* Sets the last login for a user
|
|
*
|
|
* @param string User id
|
|
*/
|
|
function process_user_contact ($id_user) {
|
|
return db_process_sql_update ("tusuario",
|
|
array ("last_connect" => get_system_time ()),
|
|
array ("id_user" => $id_user));
|
|
}
|
|
|
|
/**
|
|
* Create a new user
|
|
*
|
|
* @return bool false
|
|
*/
|
|
function create_user ($id_user, $password, $user_info) {
|
|
$values = $user_info;
|
|
$values["id_user"] = $id_user;
|
|
$values["password"] = md5 ($password);
|
|
$values["last_connect"] = 0;
|
|
$values["registered"] = get_system_time ();
|
|
|
|
return (@db_process_sql_insert ("tusuario", $values)) !== false;
|
|
}
|
|
|
|
/**
|
|
* Save password history
|
|
*
|
|
* @return bool false
|
|
*/
|
|
function save_pass_history ($id_user, $password) {
|
|
$values["id_user"] = $id_user;
|
|
$values["password"] = md5 ($password);
|
|
$values["date_begin"] = date ("Y/m/d H:i:s", get_system_time());
|
|
|
|
return (@db_process_sql_insert ("tpassword_history", $values)) !== false;
|
|
}
|
|
|
|
/**
|
|
* Deletes the user
|
|
*
|
|
* @param string User id
|
|
*/
|
|
function delete_user ($id_user) {
|
|
$result = db_process_sql_delete('tusuario_perfil',
|
|
array('id_usuario' => $id_user));
|
|
if ($result === false) {
|
|
return false;
|
|
}
|
|
|
|
$result = db_process_sql_delete('tusuario',
|
|
array('id_user' => $id_user));
|
|
if ($result === false) {
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* Update the password in MD5 for user pass as id_user with
|
|
* password in plain text.
|
|
*
|
|
* @param string user User ID
|
|
* @param string password Password in plain text.
|
|
*
|
|
* @return mixed False in case of error or invalid values passed. Affected rows otherwise
|
|
*/
|
|
function update_user_password ($user, $password_new) {
|
|
global $config;
|
|
if (isset($config['auth']) && $config['auth'] == 'pandora') {
|
|
$sql = sprintf("UPDATE tusuario SET password = '" . md5($password_new) .
|
|
"', last_pass_change = '" . date("Y-m-d H:i:s", get_system_time()) .
|
|
"' WHERE id_user = '" . $user . "'");
|
|
|
|
$connection = mysql_connect_db($config['rpandora_server'],
|
|
$config['rpandora_dbname'], $config['rpandora_user'],
|
|
$config['rpandora_pass']);
|
|
$remote_pass_update = db_process_sql ($sql, 'affected_rows', $connection);
|
|
|
|
if (!$remote_pass_update) {
|
|
$config["auth_error"] = __('Could not changes password on remote pandora');
|
|
return false;
|
|
}
|
|
}
|
|
return db_process_sql_update ('tusuario',
|
|
array ('password' => md5 ($password_new), 'last_pass_change' => date ("Y/m/d H:i:s", get_system_time())),
|
|
array ('id_user' => $user));
|
|
}
|
|
|
|
/**
|
|
* Update the data of a user that user is choose with
|
|
* id_user.
|
|
*
|
|
* @param string user User ID
|
|
* @param array values Associative array with index as name of field and content.
|
|
*
|
|
* @return mixed False in case of error or invalid values passed. Affected rows otherwise
|
|
*/
|
|
function update_user ($id_user, $values) {
|
|
if (! is_array ($values))
|
|
return false;
|
|
|
|
return db_process_sql_update ("tusuario", $values, array ("id_user" => $id_user));
|
|
}
|
|
|
|
/**
|
|
* Authenticate against an LDAP server.
|
|
*
|
|
* @param string User login
|
|
* @param string User password (plain text)
|
|
*
|
|
* @return bool True if the login is correct, false in other case
|
|
*/
|
|
function ldap_process_user_login ($login, $password) {
|
|
global $config;
|
|
|
|
if (! function_exists ("ldap_connect")) {
|
|
$config["auth_error"] = __('Your installation of PHP does not support LDAP');
|
|
|
|
return false;
|
|
}
|
|
|
|
// Connect to the LDAP server
|
|
$ds = @ldap_connect ($config["ldap_server"], $config["ldap_port"]);
|
|
|
|
if (!$ds) {
|
|
$config["auth_error"] = 'Error connecting to LDAP server';
|
|
|
|
return false;
|
|
}
|
|
|
|
// Set the LDAP version
|
|
ldap_set_option ($ds, LDAP_OPT_PROTOCOL_VERSION, $config["ldap_version"]);
|
|
|
|
if ($config["ldap_start_tls"]) {
|
|
if (!@ldap_start_tls ($ds)) {
|
|
$config["auth_error"] = 'Could not start TLS for LDAP connection';
|
|
@ldap_close ($ds);
|
|
|
|
return false;
|
|
}
|
|
}
|
|
|
|
if($config['ldap_function'] == 'local'){
|
|
$sr = local_ldap_search($config["ldap_server"], $config["ldap_port"], $config["ldap_version"],
|
|
io_safe_output($config["ldap_base_dn"]), $config['ldap_login_attr'],
|
|
io_safe_output($config['ldap_admin_login']), $config['ldap_admin_pass'], io_safe_output($login));
|
|
|
|
if($sr) {
|
|
$user_dn = $sr["dn"][0];
|
|
|
|
$ldap_base_dn = !empty($config["ldap_base_dn"]) ? "," . io_safe_output($config["ldap_base_dn"]) : '';
|
|
|
|
if(!empty($ldap_base_dn)) {
|
|
if (strlen($password) != 0 && @ldap_bind($ds, io_safe_output($user_dn), $password) ) {
|
|
@ldap_close ($ds);
|
|
return $sr;
|
|
}
|
|
} else {
|
|
if (strlen($password) != 0 && @ldap_bind($ds, io_safe_output($login), $password) ) {
|
|
@ldap_close ($ds);
|
|
return $sr;
|
|
}
|
|
}
|
|
}
|
|
|
|
} else {
|
|
// PHP LDAP function
|
|
if ($config['ldap_admin_login'] != "" && $config['ldap_admin_pass'] != "") {
|
|
if (!@ldap_bind($ds, io_safe_output($config['ldap_admin_login']), $config['ldap_admin_pass'])) {
|
|
$config["auth_error"] = 'Admin ldap connection fail';
|
|
@ldap_close ($ds);
|
|
return false;
|
|
}
|
|
}
|
|
|
|
$filter="(" . $config['ldap_login_attr'] . "=" . io_safe_output($login) . ")";
|
|
|
|
$sr = ldap_search($ds, io_safe_output($config["ldap_base_dn"]), $filter);
|
|
|
|
$memberof = ldap_get_entries($ds, $sr);
|
|
|
|
if ($memberof["count"] == 0 && !isset($memberof[0]["memberof"])) {
|
|
@ldap_close ($ds);
|
|
return false;
|
|
} else {
|
|
$memberof = $memberof[0];
|
|
}
|
|
|
|
unset($memberof["count"]);
|
|
$ldap_base_dn = !empty($config["ldap_base_dn"]) ? "," . io_safe_output($config["ldap_base_dn"]) : '';
|
|
|
|
if(!empty($ldap_base_dn)) {
|
|
if (strlen($password) != 0 && @ldap_bind($ds, io_safe_output($memberof['dn']), $password) ) {
|
|
@ldap_close ($ds);
|
|
return $memberof;
|
|
}
|
|
} else {
|
|
if (strlen($password) != 0 && @ldap_bind($ds, io_safe_output($login), $password) ) {
|
|
@ldap_close ($ds);
|
|
return $memberof;
|
|
}
|
|
}
|
|
}
|
|
|
|
@ldap_close ($ds);
|
|
$config["auth_error"] = 'User not found in database or incorrect password';
|
|
return false;
|
|
|
|
}
|
|
|
|
/**
|
|
* Checks if a user is in the autocreate blacklist.
|
|
*
|
|
* @param string User
|
|
*
|
|
* @return bool True if the user is in the blacklist, false otherwise.
|
|
*/
|
|
function is_user_blacklisted ($user) {
|
|
global $config;
|
|
|
|
$blisted_users = explode (',', $config['autocreate_blacklist']);
|
|
foreach ($blisted_users as $blisted_user) {
|
|
if ($user == $blisted_user) {
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Create progile with data obtaint from AD
|
|
*
|
|
* @param string Login
|
|
* @param string Password
|
|
* @param array user_info
|
|
* @param array permiisons
|
|
*
|
|
* @return bool
|
|
*/
|
|
function create_user_and_permisions_ldap ($id_user, $password, $user_info,
|
|
$permissions, $syncronize = false) {
|
|
global $config;
|
|
|
|
$values = $user_info;
|
|
$values["id_user"] = $id_user;
|
|
|
|
if ($config['ldap_save_password']) {
|
|
$values["password"] = md5 ($password);
|
|
}
|
|
$values["last_connect"] = 0;
|
|
$values["registered"] = get_system_time ();
|
|
if ( defined("METACONSOLE") && $syncronize )
|
|
$values['metaconsole_access_node'] = $config['ldap_adv_user_node'];
|
|
$user = (@db_process_sql_insert ("tusuario", $values)) !== false;
|
|
|
|
if ($user) {
|
|
if (!empty($permissions)) {
|
|
foreach ($permissions as $permission) {
|
|
|
|
$id_profile = $permission["profile"];
|
|
$id_groups = $permission["groups"];
|
|
$tags = $permission["tags"];
|
|
|
|
foreach ($id_groups as $id_group) {
|
|
$profile = profile_create_user_profile(
|
|
$id_user, $id_profile, $id_group, false, $tags);
|
|
}
|
|
|
|
if ( defined("METACONSOLE") && $syncronize ) {
|
|
enterprise_include_once('include/functions_metaconsole.php');
|
|
|
|
unset($values['metaconsole_access_node']);
|
|
$values['not_login'] = (int) !$config['ldap_adv_user_node'];
|
|
|
|
$servers = metaconsole_get_servers();
|
|
foreach ($servers as $server) {
|
|
$perfil_maestro = db_get_row('tperfil',
|
|
'id_perfil', $permission["profile"]);
|
|
|
|
if (metaconsole_connect($server) == NOERR ) {
|
|
|
|
if (!profile_exist($perfil_maestro['name'])) {
|
|
unset($perfil_maestro['id_perfil']);
|
|
$id_profile = db_process_sql_insert('tperfil', $perfil_maestro);
|
|
}
|
|
else {
|
|
$id_profile = db_get_value('id_perfil', 'tperfil', 'name', $perfil_maestro['name']);
|
|
}
|
|
|
|
db_process_sql_insert ("tusuario", $values);
|
|
foreach ($id_groups as $id_group) {
|
|
$profile = profile_create_user_profile ($id_user,
|
|
$id_profile, $id_group, false, $tags);
|
|
}
|
|
}
|
|
|
|
metaconsole_restore_db();
|
|
}
|
|
}
|
|
|
|
if (!$profile)
|
|
return false;
|
|
}
|
|
}
|
|
else {
|
|
$profile = profile_create_user_profile(
|
|
$id_user, $config['default_remote_profile'], $config['default_remote_group'], false, $config['default_assign_tags']);
|
|
|
|
if (!$profile)
|
|
return false;
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* Check if user have right permission in pandora. This
|
|
* permission depend of ldap.
|
|
*
|
|
* @param string Login
|
|
* @param string Password
|
|
*
|
|
* @return string
|
|
*/
|
|
function check_permission_ldap ($id_user, $password, $user_info,
|
|
$permissions, $syncronize = false) {
|
|
|
|
global $config;
|
|
include_once($config['homedir'] . "/enterprise/include/functions_metaconsole.php");
|
|
|
|
$result_user = users_get_user_by_id($id_user);
|
|
$filter = array("id_usuario" => $id_user);
|
|
$profiles_user = array();
|
|
$user_profiles =
|
|
db_get_all_rows_filter ("tusuario_perfil", $filter);
|
|
|
|
foreach ($user_profiles as $user_profile) {
|
|
$profiles_user[$user_profile["id_up"]] =
|
|
$user_profile["id_perfil"];
|
|
}
|
|
|
|
$profiles_user_nodes = array();
|
|
$permissions_nodes = array();
|
|
if ( is_metaconsole() && $syncronize ) {
|
|
$servers = metaconsole_get_servers();
|
|
foreach ($servers as $server) {
|
|
if ( metaconsole_connect($server) == NOERR ) {
|
|
$user_profiles_nodes =
|
|
db_get_all_rows_filter ("tusuario_perfil", $filter);
|
|
foreach ($user_profiles_nodes as $user_profile_node) {
|
|
$profiles_user_nodes[$server['server_name']][$user_profile_node["id_up"]] =
|
|
$user_profile_node["id_perfil"];
|
|
}
|
|
}
|
|
metaconsole_restore_db();
|
|
}
|
|
|
|
foreach ($permissions as $key => $permission) {
|
|
$perfil_maestro = db_get_row('tperfil',
|
|
'id_perfil', $permission['profile']);
|
|
foreach ($servers as $server) {
|
|
if (metaconsole_connect($server) == NOERR ) {
|
|
if (profile_exist($perfil_maestro['name'])) {
|
|
$id_profile = db_get_value('id_perfil', 'tperfil', 'name', $perfil_maestro['name']);
|
|
$permissions_nodes[$server['server_name']][$key] = $permission;
|
|
$permissions_nodes[$server['server_name']][$key]['profile'] = $id_profile;
|
|
}
|
|
}
|
|
metaconsole_restore_db();
|
|
}
|
|
}
|
|
}
|
|
|
|
$no_found = array();
|
|
if ($result_user) {
|
|
foreach ($permissions as $permission) {
|
|
$id_profile = $permission["profile"];
|
|
$id_groups = $permission["groups"];
|
|
$tags = $permission["tags"];
|
|
|
|
foreach ($id_groups as $id_group) {
|
|
$filter = array("id_usuario" => $id_user,
|
|
"id_perfil"=>$id_profile,
|
|
"id_grupo" => $id_group);
|
|
//~ Find perfil with advance permissions in
|
|
//~ authentication menu. This data depends on
|
|
//~ groups where this user it belong.
|
|
$result_profiles =
|
|
db_get_row_filter ("tusuario_perfil", $filter);
|
|
if (!$result_profiles) {
|
|
#If not found save in array.
|
|
$no_found[] = array("id_perfil"=>$id_profile,
|
|
"id_grupo" => $id_group, "tags" =>$tags);
|
|
}
|
|
else {
|
|
#if profile is find, delete from array.
|
|
db_process_sql_update("tusuario_perfil",
|
|
array("tags" =>$tags),
|
|
array('id_usuario' => $id_user,
|
|
'id_up' => $profiles_user[$id_profile]));
|
|
|
|
unset($profiles_user[$result_profiles["id_up"]]);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (is_metaconsole() && $syncronize) {
|
|
$servers = metaconsole_get_servers();
|
|
foreach ($servers as $server) {
|
|
foreach ($permissions_nodes[$server['server_name']] as $permission_node) {
|
|
|
|
$id_profile = $permission_node["profile"];
|
|
$id_groups = $permission_node["groups"];
|
|
$tags = $permission_node["tags"];
|
|
|
|
foreach ($id_groups as $id_group) {
|
|
|
|
$filter = array("id_usuario" => $id_user,
|
|
"id_perfil"=>$id_profile,
|
|
"id_grupo" => $id_group);
|
|
|
|
if (metaconsole_connect($server) == NOERR ) {
|
|
$result_profiles =
|
|
db_get_row_filter ("tusuario_perfil", $filter);
|
|
|
|
if (!$result_profiles) {
|
|
#If not found save in array.
|
|
$no_found_server[$server['server_name']][] = array("id_perfil" => $id_profile,
|
|
"id_grupo" => $id_group, "tags" => $tags);
|
|
}
|
|
else {
|
|
#if profile is find, delete from array.
|
|
db_process_sql_update("tusuario_perfil",
|
|
array("tags" =>$tags),
|
|
array('id_usuario' => $id_user,
|
|
'id_up' => $profiles_user_nodes[$server_name][$id_profile]));
|
|
|
|
unset($profiles_user_nodes[$server_name][$result_profiles["id_up"]]);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
metaconsole_restore_db();
|
|
}
|
|
}
|
|
|
|
if ( empty($profiles_user) && empty($no_found) ) {
|
|
#The permmisions of user not changed
|
|
return true;
|
|
}
|
|
else {
|
|
foreach ($profiles_user as $key => $profile_user) {
|
|
#The other profiles are deleted
|
|
profile_delete_user_profile ($id_user, $key);
|
|
}
|
|
|
|
if ( is_metaconsole() && $syncronize ) {
|
|
foreach ($profiles_user_nodes as $server_name => $profile_users) {
|
|
$server = metaconsole_get_connection($server_name);
|
|
foreach ($profile_users as $key => $profile_user) {
|
|
if ( metaconsole_connect($server) == NOERR ) {
|
|
profile_delete_user_profile ($id_user, $key);
|
|
}
|
|
}
|
|
metaconsole_restore_db();
|
|
}
|
|
}
|
|
|
|
foreach ($no_found as $new_profiles) {
|
|
//Add the missing permissions
|
|
profile_create_user_profile ($id_user,
|
|
$new_profiles["id_perfil"],
|
|
$new_profiles["id_grupo"], false,
|
|
$new_profiles["tags"]);
|
|
}
|
|
|
|
if ( is_metaconsole() && $syncronize ) {
|
|
$servers = metaconsole_get_servers();
|
|
foreach ($servers as $server) {
|
|
if ( metaconsole_connect($server) == NOERR ) {
|
|
foreach ($no_found_server[$server['server_name']] as $new_profiles) {
|
|
profile_create_user_profile ($id_user,
|
|
$new_profiles["id_perfil"],
|
|
$new_profiles["id_grupo"], false,
|
|
$new_profiles["tags"]);
|
|
}
|
|
}
|
|
metaconsole_restore_db();
|
|
}
|
|
}
|
|
|
|
return "permissions_changed";
|
|
}
|
|
}
|
|
else {
|
|
return "error_permissions";
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Update local user pass from ldap user
|
|
*
|
|
* @param string Login
|
|
* @param string Password
|
|
*
|
|
* @return bool
|
|
*/
|
|
function change_local_user_pass_ldap ($id_user, $password) {
|
|
$local_user_pass = db_get_value_filter('password', 'tusuario', array('id_user' => $id_user));
|
|
|
|
$return = false;
|
|
if (md5($password) !== $local_user_pass) {
|
|
$values_update = array();
|
|
$values_update['password'] = md5($password);
|
|
|
|
$return = db_process_sql_update('tusuario', $values_update, array('id_user' => $id_user));
|
|
}
|
|
|
|
return $return;
|
|
}
|
|
|
|
function delete_user_pass_ldap ($id_user) {
|
|
$values_update = array();
|
|
$values_update['password'] = null;
|
|
|
|
$return = db_process_sql_update('tusuario', $values_update, array('id_user' => $id_user));
|
|
|
|
return;
|
|
}
|
|
|
|
function safe_output_accute($string) {
|
|
$no_allowed= array ("á","é","í","ó","ú","Á","É","Í","Ó","Ú","ñ","Ñ");
|
|
$allowed= array ("a","e","i","o","u","A","E","I","O","U","n","N");
|
|
$result = str_replace($no_allowed, $allowed ,$string);
|
|
return $result;
|
|
}
|
|
|
|
function local_ldap_search($ldap_host, $ldap_port=389, $ldap_version=3, $dn, $access_attr, $ldap_admin_user, $ldap_admin_pass, $user) {
|
|
global $config;
|
|
|
|
$filter = "";
|
|
if(!empty($access_attr) && !empty($user)){
|
|
$filter = " -s sub '(" . $access_attr . "=" . $user . ")' ";
|
|
}
|
|
|
|
$tls = "";
|
|
if($config["ldap_start_tls"]) {
|
|
$tls = " -ZZ ";
|
|
}
|
|
|
|
$ldap_host = " -h " . $ldap_host;
|
|
$ldap_port = " -p ". $ldap_port;
|
|
$ldap_version = " -P ". $ldap_version;
|
|
if(!empty($ldap_admin_user)){
|
|
$ldap_admin_user = " -D '". $ldap_admin_user."'";
|
|
}
|
|
if(!empty($ldap_admin_pass)){
|
|
$ldap_admin_pass = " -w " . $ldap_admin_pass;
|
|
}
|
|
$dn = " -b '". $dn ."'";
|
|
|
|
$shell_ldap_search = explode("\n", shell_exec('ldapsearch -LLL -o ldif-wrap=no -x' . $ldap_host . $ldap_port . $ldap_version . ' -E pr=10000/noprompt ' . $ldap_admin_user . $ldap_admin_pass . $dn . $filter . $tls . ' | grep -v "^#\|^$" | sed "s/:\+ /=>/g"'));
|
|
foreach($shell_ldap_search as $line) {
|
|
$values = explode("=>", $line);
|
|
if(!empty($values[0]) && !empty($values[1])) {
|
|
$user_attr[$values[0]][] = $values[1];
|
|
}
|
|
}
|
|
|
|
if (empty($user_attr)) {
|
|
return false;
|
|
}
|
|
|
|
$base64 = preg_match('/^[a-zA-Z0-9\/\r\n+]*={0,2}$/', $user_attr["dn"][0]);
|
|
if($base64){
|
|
$user_dn = safe_output_accute(base64_decode($user_attr["dn"][0]));
|
|
} else {
|
|
$user_dn = safe_output_accute($user_attr["dn"][0]);
|
|
}
|
|
|
|
if(strlen($user_dn) > 0) {
|
|
$user_attr["dn"][0]=$user_dn;
|
|
}
|
|
|
|
return $user_attr;
|
|
|
|
}
|
|
|
|
//Reference the global use authorization error to last auth error.
|
|
$config["auth_error"] = &$mysql_cache["auth_error"];
|
|
?>
|