# Functions for configuring and talking to an LDAP server # XXX make sure ACLs work! do '../web-lib.pl'; &init_config(); do '../ui-lib.pl'; %access = &get_module_acl(); eval "use Net::LDAP"; if ($@) { $net_ldap_error = $@; } @search_attrs = ( 'objectClass', 'cn', 'dn', 'uid' ); @acl_dn_styles = ( 'regex', 'base', 'one', 'subtree', 'children' ); @acl_access_levels = ( 'none', 'auth', 'compare', 'search', 'read', 'write' ); # connect_ldap_db() # Attempts to connect to an LDAP server. Returns a handle on success or an # error message string on failure. sub connect_ldap_db { return $connect_ldap_db_cache if (defined($connect_ldap_db_cache)); # Do we have the module? if ($net_ldap_error) { local $msg = &text('connect_emod', "Net::LDAP", "
".&html_escape($net_ldap_error).""); if (foreign_available("cpan")) { $msg .= "
\n"; $msg .= &text('connect_cpan', "Net::LDAP", "../cpan/download.cgi?source=3&cpan=Net::LDAP&". "cpan=Convert::ASN1&". "return=../$module_name/&returndesc=". &urlize($module_info{'desc'})); } return $msg; } # Work out server name, login and TLS mode local ($server, $port, $user, $pass, $ssl) = @_; if ($config{'server'}) { # Remote box .. everything must be set $server = $config{'server'}; gethostbyname($server) || return &text('connect_eserver', "$server"); $port = $config{'port'} || 389; $user = $config{'user'}; $user || return $text{'connect_euser'}; $pass = $config{'pass'}; $pass || return $text{'connect_epass'}; } else { # Get from slapd.conf -r $config{'config_file'} || return &text('connect_efile', "$config{'config_file'}"); local $conf = &get_config(); $server = "127.0.0.1"; $port = $config{'port'} || &find_value("port", $conf) || 389; $user = $config{'user'} || &find_value("rootdn", $conf); $user || return $text{'connect_euser2'}; $pass = $config{'pass'} || &find_value("rootpw", $conf); #$pass || return $text{'connect_epass2'}; $pass =~ /^\{/ && return $text{'connect_epass3'}; } $ssl = $config{'ssl'}; # Try to connect local @ssls = $ssl eq "" ? ( 1, 0 ) : ( $ssl ); local $ldap; foreach $ssl (@ssls) { $ldap = Net::LDAP->new($server, port => $port); if (!$ldap) { return &text('connect_eldap', "$server", $port); } if ($ssl) { # Switch to TLS mode local $mesg; eval { $mesg = $ldap->start_tls(); }; if ($@ || !$mesg || $mesg->code) { next if (@ssls); # Try non-SSL } else { return &text('connect_essl', "$server", $@ ? %@ : &ldap_error($mesg)); } } } $ldap || return "This can't happen!"; # Login to server local $mesg = $pass eq '' ? $ldap->bind(dn => $user, anonymous => 1) : $ldap->bind(dn => $user, password => $pass); if (!$mesg || $mesg->code) { return &text('connect_elogin', "$server", "$user", &ldap_error($mesg)); } $connect_ldap_db = $ldap; return $ldap; } # local_ldap_server() # Returns 1 if OpenLDAP is installed locally and we are configuring it, 0 if # remote, or -1 the binary is missing, -2 if the config is missing sub local_ldap_server { if (!$config{'server'} || &to_ipaddress($config{'server'}) eq '127.0.0.1' || &to_ipaddress($config{'server'}) eq &to_ipaddress(&get_system_hostname())) { # Local .. but is it installed? if (!-r $config{'config_file'} && -r $config{'alt_config_file'}) { ©_source_dest($config{'alt_config_file'}, $config{'config_file'}); } return !&has_command($config{'slapd'}) ? -1 : !-r $config{'config_file'} ? -2 : 1; } return 0; } # get_ldap_server_version() # Returns the local LDAP server version number sub get_ldap_server_version { return undef if (&local_ldap_server() != 1); local $out = &backquote_with_timeout( "$config{'slapd'} -V -d 1 2>&1 &1 ) { s/\r|\n//g; s/^\s*#.*$//; if (/^(\S+)\s*(.*)$/) { # Found a directive local $dir = { 'name' => $1, 'line' => $lnum, 'eline' => $lnum, 'file' => $file }; local $value = $2; $dir->{'values'} = [ &split_quoted_string($value) ]; push(@rv, $dir); } elsif (/^\s+(\S.*)$/ && @rv) { # Found a continuation line, with extra values local $value = $1; push(@{$rv[$#rv]->{'values'}}, &split_quoted_string($value)); $rv[$#rv]->{'eline'} = $lnum; } $lnum++; } close(CONF); $get_config_cache{$file} = \@rv; return \@rv; } # find(name, &config) # Returns the structure(s) with some name sub find { local ($name, $conf) = @_; local @rv = grep { lc($_->{'name'}) eq lc($name) } @$conf; return wantarray ? @rv : $rv[0]; } # find(name, &config) # Returns the directive values with some name sub find_value { local ($name, $conf) = @_; local @rv = map { $_->{'values'}->[0] } &find(@_); return wantarray ? @rv : $rv[0]; } # save_directive(&config, name, value|&values|&directive, ...) # Update the value(s) of some entry in the config file sub save_directive { local ($conf, $name, @values) = @_; local @old = &find($name, $conf); local $lref = &read_file_lines(@old ? $old[0]->{'file'} : $config{'config_file'}); local $changed; for(my $i=0; $i<@old || $i<@values; $i++) { local ($line, @unqvalues, @qvalues, $len); if (defined($values[$i])) { # Work out new line @unqvalues = ref($values[$i]) eq 'ARRAY' ? @{$values[$i]} : ref($values[$i]) eq 'HASH' ? @{$values[$i]->{'values'}} : ( $values[$i] ); @qvalues = map { /^[^'" ]+$/ ? $_ : /"/ ? "'$_'" : "\"$_\"" } @unqvalues; $line = join(" ", $name, @qvalues); } if (defined($old[$i])) { $len = $old[$i]->{'eline'} - $old[$i]->{'line'} + 1; } if (defined($old[$i]) && defined($values[$i])) { # Update some directive splice(@$lref, $old[$i]->{'line'}, $len, $line); if (&indexof($values[$i], @$conf) < 0) { $old[$i]->{'values'} = \@unqvalues; } $old[$i]->{'eline'} = $old[$i]->{'line'}; $changed = $old[$i]; if ($len != 1) { # Renumber to account for shrunked directive foreach my $c (@$conf) { if ($c->{'line'} > $old[$i]->{'line'}) { $c->{'line'} -= $len-1; $c->{'eline'} -= $len-1; } } } } elsif (defined($old[$i]) && !defined($values[$i])) { # Remove some directive (from cache too) splice(@$lref, $old[$i]->{'line'}, $len); local $idx = &indexof($old[$i], @$conf); splice(@$conf, $idx, 1) if ($idx >= 0); foreach my $c (@$conf) { if ($c->{'line'} > $old[$i]->{'line'}) { $c->{'line'} -= $len; $c->{'eline'} -= $len; } } } elsif (!defined($old[$i]) && defined($values[$i])) { # Add some directive if ($changed) { # After last one of the same name local $newdir = { 'name' => $name, 'line' => $changed->{'line'}+1, 'eline' => $changed->{'line'}+1, 'values' => \@unqvalues }; foreach my $c (@$conf) { $c->{'line'}++ if ($c->{'line'} > $changed->{'line'}); } $changed = $newdir; splice(@$lref, $newdir->{'line'}, 0, $line); push(@$conf, $newdir); } else { # At end of file local $newdir = { 'name' => $name, 'line' => scalar(@$lref), 'eline' => scalar(@$lref), 'values' => \@unqvalues }; push(@$lref, $line); push(@$conf, $newdir); } } } } # start_ldap_server() # Attempts to start the LDAP server process. Returns undef on success or an # error message on failure. sub start_ldap_server { local $cmd = $config{'start_cmd'} || $config{'slapd'}; local $out = &backquote_logged("$cmd 2>&1 $cmd", "
".&html_escape($out)."") : undef; } # stop_ldap_server() # Attempts to stop the running LDAP server. Returns undef on success or an # error message on failure. sub stop_ldap_server { if ($config{'stop_cmd'}) { local $out = &backquote_logged("$config{'stop_cmd'} 2>&1 $cmd", "
".&html_escape($out)."") : undef; } else { local $pid = &is_ldap_server_running(); $pid || return $text{'stop_egone'}; return kill('TERM', $pid) ? undef : &text('stop_ekill', $!); } } # apply_configuration() # Apply the current LDAP server configuration with a HUP signal sub apply_configuration { if ($config{'apply_cmd'}) { local $out = &backquote_logged("$config{'apply_cmd'} 2>&1 $cmd", "
".&html_escape($out)."") : undef; } else { local $err = &stop_ldap_server(); return $err if ($err); return &start_ldap_server(); } } # is_ldap_server_running() # Returns the process ID of the running LDAP server, or undef sub is_ldap_server_running { local $conf = &get_config(); local $pidfile = &find_value("pidfile", $conf); if ($pidfile) { return &check_pid_file($pidfile); } return undef; } # ldap_error(rv) # Converts a bad LDAP response into an error message sub ldap_error { local ($rv) = @_; if (!$rv) { return $text{'euknown'}; } elsif ($rv->code) { return $rv->error || "Code ".$rv->code; } else { return undef; } } # valid_pem_file(file, type) sub valid_pem_file { local ($file, $type) = @_; local $data = &read_file_contents($file); if ($type eq 'key') { return $data =~ /\-{5}BEGIN RSA PRIVATE KEY\-{5}/ && $data =~ /\-{5}END RSA PRIVATE KEY\-{5}/; } else { return $data =~ /\-{5}BEGIN CERTIFICATE\-{5}/ && $data =~ /\-{5}END CERTIFICATE\-{5}/; } } sub get_config_dir { if ($config{'config_file'} =~ /^(\S+)\/([^\/]+)$/) { return $1; } return undef; } # list_schema_files() # Returns a list of hashes, each of which describes one possible schema file sub list_schema_files { local @rv; opendir(SCHEMA, $config{'schema_dir'}); foreach my $f (readdir(SCHEMA)) { if ($f =~ /^(\S+)\.schema$/) { local $name = $1; local $lref = &read_file_lines("$config{'schema_dir'}/$f", 1); local $desc; foreach my $l (@$lref) { if ($l !~ /^\#+\s*\$/ && $l =~ /^\#+\s*(\S.*)/) { $desc .= $1." "; # Comment } elsif ($l !~ /\S/) { last; # End of header } else { last if ($desc); # End of comment } } $desc ||= $text{'schema_desc_'.$name}; push(@rv, { 'file' => "$config{'schema_dir'}/$f", 'name' => $name, 'desc' => $desc, 'core' => $name eq 'core' }); } } closedir(SCHEMA); return sort { $b->{'core'} <=> $a->{'core'} || $a->{'name'} cmp $b->{'name'} } @rv; } # check_ldap_permissions() # Returns 1 if ownership of the data dir is correct, 0 if not, -1 if not known sub check_ldap_permissions { local @uinfo; if ($config{'data_dir'} && $config{'ldap_user'} && defined(@uinfo = getpwnam($config{'ldap_user'}))) { opendir(DATADIR, $config{'data_dir'}); local @datafiles = grep { !/^\./ } readdir(DATADIR); closedir(DATADIR); if (@datafiles) { local @st = stat("$config{'data_dir'}/$datafiles[0]"); if ($st[4] != $uinfo[2]) { return 0; } } return 1; } else { return -1; } } # parse_ldap_access(&directive) # Convert a slapd.conf directive into a more usable access control rule hash sub parse_ldap_access { local ($a) = @_; local @v = @{$a->{'values'}}; local $p = { }; shift(@v); # Remove to $p->{'what'} = shift(@v); # Object if ($v[0] =~ /^filter=(\S+)/) { # Filter added to what $p->{'filter'} = $1; shift(@v); } if ($v[0] =~ /^attrs=(\S+)/) { # Attributes added to what $p->{'attrs'} = $1; shift(@v); } local @descs; while(@v) { shift(@v); # Remove by local $by = { 'who' => shift(@v), 'access' => shift(@v) }; while(@v && $v[0] ne 'by') { push(@{$by->{'control'}}, shift(@v)); } local $whodesc = $by->{'who'} eq 'self' ? $text{'access_self'} : $by->{'who'} eq 'users' ? $text{'access_users'} : $by->{'who'} eq 'anonymous' ? $text{'access_anon'} : $by->{'who'} eq '*' ? $text{'access_all'} : "$by->{'who'}"; local $adesc = $text{'access_'.$by->{'access'}} || "$by->{'access'}"; $adesc = ucfirst($adesc) if (!@descs); push(@descs, &text('access_desc', $whodesc, $adesc)); push(@{$p->{'by'}}, $by); } $p->{'bydesc'} = join(", ", @descs); if ($p->{'what'} eq '*') { $p->{'whatdesc'} = $text{'access_any'}; } elsif ($p->{'what'} =~ /^dn(\.[^=]+)?=(.*)$/) { $p->{'whatdesc'} = "$2"; } else { $p->{'whatdesc'} = $p->{'what'}; } return $p; } # store_ldap_access(&directive, &acl-struct) # Updates the values of a directive from an ACL structure sub store_ldap_access { local ($a, $p) = @_; local @v = ( 'to' ); push(@v, $p->{'what'}); if ($p->{'filter'}) { push(@v, "filter=$p->{'filter'}"); } if ($p->{'attrs'}) { push(@v, "attrs=$p->{'attrs'}"); } foreach my $b (@{$p->{'by'}}) { push(@v, "by"); push(@v, $b->{'who'}); push(@v, $b->{'access'}); push(@v, @{$b->{'control'}}); } $a->{'values'} = \@v; } 1;