Files
webmin/ldap-server/ldap-server-lib.pl
2007-12-17 00:43:00 +00:00

486 lines
12 KiB
Perl

# Functions for configuring and talking to an LDAP server
# XXX help pages
# XXX acl section
# XXX make sure ACLs work!
# XXX eline not respected when updating/deleting
do '../web-lib.pl';
&init_config();
do '../ui-lib.pl';
%access = &get_module_acl();
eval "use Net::LDAP";
if ($@) { $net_ldap_error = $@; }
@search_attrs = ( 'objectClass', 'cn', 'dn', 'uid' );
@acl_dn_styles = ( 'regex', 'base', 'one', 'subtree', 'children' );
@acl_access_levels = ( 'none', 'auth', 'compare', 'search', 'read', 'write' );
# connect_ldap_db()
# Attempts to connect to an LDAP server. Returns a handle on success or an
# error message string on failure.
sub connect_ldap_db
{
return $connect_ldap_db_cache if (defined($connect_ldap_db_cache));
# Do we have the module?
if ($net_ldap_error) {
local $msg = &text('connect_emod', "<tt>Net::LDAP</tt>",
"<pre>".&html_escape($net_ldap_error)."</pre>");
if (foreign_available("cpan")) {
$msg .= "<p>\n";
$msg .= &text('connect_cpan', "Net::LDAP",
"../cpan/download.cgi?source=3&cpan=Net::LDAP&".
"cpan=Convert::ASN1&".
"return=../$module_name/&returndesc=".
&urlize($module_info{'desc'}));
}
return $msg;
}
# Work out server name, login and TLS mode
local ($server, $port, $user, $pass, $ssl) = @_;
if ($config{'server'}) {
# Remote box .. everything must be set
$server = $config{'server'};
gethostbyname($server) || return &text('connect_eserver',
"<tt>$server</tt>");
$port = $config{'port'} || 389;
$user = $config{'user'};
$user || return $text{'connect_euser'};
$pass = $config{'pass'};
$pass || return $text{'connect_epass'};
}
else {
# Get from slapd.conf
-r $config{'config_file'} || return &text('connect_efile',
"<tt>$config{'config_file'}</tt>");
local $conf = &get_config();
$server = "127.0.0.1";
$port = $config{'port'} || &find_value("port", $conf) || 389;
$user = $config{'user'} || &find_value("rootdn", $conf);
$user || return $text{'connect_euser2'};
$pass = $config{'pass'} || &find_value("rootpw", $conf);
#$pass || return $text{'connect_epass2'};
$pass =~ /^\{/ && return $text{'connect_epass3'};
}
$ssl = $config{'ssl'};
# Try to connect
local @ssls = $ssl eq "" ? ( 1, 0 ) : ( $ssl );
local $ldap;
foreach $ssl (@ssls) {
$ldap = Net::LDAP->new($server, port => $port);
if (!$ldap) {
return &text('connect_eldap', "<tt>$server</tt>", $port);
}
if ($ssl) {
# Switch to TLS mode
local $mesg;
eval { $mesg = $ldap->start_tls(); };
if ($@ || !$mesg || $mesg->code) {
next if (@ssls); # Try non-SSL
}
else {
return &text('connect_essl', "<tt>$server</tt>",
$@ ? %@ : &ldap_error($mesg));
}
}
}
$ldap || return "This can't happen!";
# Login to server
local $mesg = $pass eq '' ?
$ldap->bind(dn => $user, anonymous => 1) :
$ldap->bind(dn => $user, password => $pass);
if (!$mesg || $mesg->code) {
return &text('connect_elogin', "<tt>$server</tt>", "<tt>$user</tt>",
&ldap_error($mesg));
}
$connect_ldap_db = $ldap;
return $ldap;
}
# local_ldap_server()
# Returns 1 if OpenLDAP is installed locally and we are configuring it, 0 if
# remote, or -1 the binary is missing, -2 if the config is missing
sub local_ldap_server
{
if (!$config{'server'} || &to_ipaddress($config{'server'}) eq '127.0.0.1' ||
&to_ipaddress($config{'server'}) eq &to_ipaddress(&get_system_hostname())) {
# Local .. but is it installed?
if (!-r $config{'config_file'} &&
-r $config{'alt_config_file'}) {
&copy_source_dest($config{'alt_config_file'},
$config{'config_file'});
}
return !&has_command($config{'slapd'}) ? -1 :
!-r $config{'config_file'} ? -2 : 1;
}
return 0;
}
# get_ldap_server_version()
# Returns the local LDAP server version number
sub get_ldap_server_version
{
return undef if (&local_ldap_server() != 1);
local $out = &backquote_with_timeout(
"$config{'slapd'} -V -d 1 2>&1 </dev/null", 1, 1, 1);
if ($out =~ /slapd\s+([0-9\.]+)/) {
return $1;
}
# Fall back to -d flag
local $out = &backquote_with_timeout("$config{'slapd'} -d 255 2>&1 </dev/null",
1, 1, 1);
if ($out =~ /slapd\s+([0-9\.]+)/) {
return $1;
}
return undef;
}
# get_config([file])
# Returns an array ref of LDAP server configuration settings
sub get_config
{
local $file = $_[0] || $config{'config_file'};
if (defined($get_config_cache{$file})) {
return $get_config_cache{$file};
}
local @rv;
local $lnum = 0;
open(CONF, $file);
while(<CONF>) {
s/\r|\n//g;
s/^\s*#.*$//;
if (/^(\S+)\s*(.*)$/) {
# Found a directive
local $dir = { 'name' => $1,
'line' => $lnum,
'eline' => $lnum,
'file' => $file };
local $value = $2;
$dir->{'values'} = [ &split_quoted_string($value) ];
push(@rv, $dir);
}
elsif (/^\s+(\S.*)$/ && @rv) {
# Found a continuation line, with extra values
local $value = $1;
push(@{$rv[$#rv]->{'values'}}, &split_quoted_string($value));
$rv[$#rv]->{'eline'} = $lnum;
}
$lnum++;
}
close(CONF);
$get_config_cache{$file} = \@rv;
return \@rv;
}
# find(name, &config)
# Returns the structure(s) with some name
sub find
{
local ($name, $conf) = @_;
local @rv = grep { lc($_->{'name'}) eq lc($name) } @$conf;
return wantarray ? @rv : $rv[0];
}
# find(name, &config)
# Returns the directive values with some name
sub find_value
{
local ($name, $conf) = @_;
local @rv = map { $_->{'values'}->[0] } &find(@_);
return wantarray ? @rv : $rv[0];
}
# save_directive(&config, name, value|&values|&directive, ...)
# Update the value(s) of some entry in the config file
sub save_directive
{
local ($conf, $name, @values) = @_;
local @old = &find($name, $conf);
local $lref = &read_file_lines(@old ? $old[0]->{'file'}
: $config{'config_file'});
local $changed;
for(my $i=0; $i<@old || $i<@values; $i++) {
local ($line, @unqvalues, @qvalues);
if (defined($values[$i])) {
@unqvalues = ref($values[$i]) eq 'ARRAY' ?
@{$values[$i]} :
ref($values[$i]) eq 'HASH' ?
@{$values[$i]->{'values'}} :
( $values[$i] );
@qvalues = map { /^[^'" ]+$/ ? $_ :
/"/ ? "'$_'" : "\"$_\"" } @unqvalues;
$line = join(" ", $name, @qvalues);
}
if (defined($old[$i]) && defined($values[$i])) {
# Update some directive
$lref->[$old[$i]->{'line'}] = $line;
$old[$i]->{'values'} = \@unqvalues;
$changed = $old[$i];
}
elsif (defined($old[$i]) && !defined($values[$i])) {
# Remove some directive (from cache too)
splice(@$lref, $old[$i]->{'line'}, 1);
local $idx = &indexof($old[$i], @$conf);
splice(@$conf, $idx, 1) if ($idx >= 0);
foreach my $c (@$conf) {
$c->{'line'}-- if ($c->{'line'} > $old[$i]->{'line'});
}
}
elsif (!defined($old[$i]) && defined($values[$i])) {
# Add some directive
if ($changed) {
# After last one of the same name
local $newdir = { 'name' => $name,
'line' => $changed->{'line'}+1,
'values' => \@unqvalues };
foreach my $c (@$conf) {
$c->{'line'}++ if ($c->{'line'} >
$changed->{'line'});
}
$changed = $newdir;
splice(@$lref, $newdir->{'line'}, 0, $line);
push(@$conf, $newdir);
}
else {
# At end of file
local $newdir = { 'name' => $name,
'line' => scalar(@$lref),
'values' => \@unqvalues };
push(@$lref, $line);
push(@$conf, $newdir);
}
}
}
}
# start_ldap_server()
# Attempts to start the LDAP server process. Returns undef on success or an
# error message on failure.
sub start_ldap_server
{
local $cmd = $config{'start_cmd'} || $config{'slapd'};
local $out = &backquote_logged("$cmd 2>&1 </dev/null");
return $? || $out =~ /line\s+(\d+)/ ?
&text('start_ecmd', "<tt>$cmd</tt>",
"<pre>".&html_escape($out)."</pre>") : undef;
}
# stop_ldap_server()
# Attempts to stop the running LDAP server. Returns undef on success or an
# error message on failure.
sub stop_ldap_server
{
if ($config{'stop_cmd'}) {
local $out = &backquote_logged("$config{'stop_cmd'} 2>&1 </dev/null");
return $? ? &text('stop_ecmd', "<tt>$cmd</tt>",
"<pre>".&html_escape($out)."</pre>") : undef;
}
else {
local $pid = &is_ldap_server_running();
$pid || return $text{'stop_egone'};
return kill('TERM', $pid) ? undef : &text('stop_ekill', $!);
}
}
# apply_configuration()
# Apply the current LDAP server configuration with a HUP signal
sub apply_configuration
{
if ($config{'apply_cmd'}) {
local $out = &backquote_logged("$config{'apply_cmd'} 2>&1 </dev/null");
return $? ? &text('apply_ecmd', "<tt>$cmd</tt>",
"<pre>".&html_escape($out)."</pre>") : undef;
}
else {
local $err = &stop_ldap_server();
return $err if ($err);
return &start_ldap_server();
}
}
# is_ldap_server_running()
# Returns the process ID of the running LDAP server, or undef
sub is_ldap_server_running
{
local $conf = &get_config();
local $pidfile = &find_value("pidfile", $conf);
if ($pidfile) {
return &check_pid_file($pidfile);
}
return undef;
}
# ldap_error(rv)
# Converts a bad LDAP response into an error message
sub ldap_error
{
local ($rv) = @_;
if (!$rv) {
return $text{'euknown'};
}
elsif ($rv->code) {
return $rv->error || "Code ".$rv->code;
}
else {
return undef;
}
}
# valid_pem_file(file, type)
sub valid_pem_file
{
local ($file, $type) = @_;
local $data = &read_file_contents($file);
if ($type eq 'key') {
return $data =~ /\-{5}BEGIN RSA PRIVATE KEY\-{5}/ &&
$data =~ /\-{5}END RSA PRIVATE KEY\-{5}/;
}
else {
return $data =~ /\-{5}BEGIN CERTIFICATE\-{5}/ &&
$data =~ /\-{5}END CERTIFICATE\-{5}/;
}
}
sub get_config_dir
{
if ($config{'config_file'} =~ /^(\S+)\/([^\/]+)$/) {
return $1;
}
return undef;
}
# list_schema_files()
# Returns a list of hashes, each of which describes one possible schema file
sub list_schema_files
{
local @rv;
opendir(SCHEMA, $config{'schema_dir'});
foreach my $f (readdir(SCHEMA)) {
if ($f =~ /^(\S+)\.schema$/) {
local $name = $1;
local $lref = &read_file_lines("$config{'schema_dir'}/$f", 1);
local $desc;
foreach my $l (@$lref) {
if ($l !~ /^\#+\s*\$/ && $l =~ /^\#+\s*(\S.*)/) {
$desc .= $1." "; # Comment
}
elsif ($l !~ /\S/) {
last; # End of header
}
else {
last if ($desc); # End of comment
}
}
$desc ||= $text{'schema_desc_'.$name};
push(@rv, { 'file' => "$config{'schema_dir'}/$f",
'name' => $name,
'desc' => $desc,
'core' => $name eq 'core' });
}
}
closedir(SCHEMA);
return sort { $b->{'core'} <=> $a->{'core'} ||
$a->{'name'} cmp $b->{'name'} } @rv;
}
# check_ldap_permissions()
# Returns 1 if ownership of the data dir is correct, 0 if not, -1 if not known
sub check_ldap_permissions
{
local @uinfo;
if ($config{'data_dir'} && $config{'ldap_user'} &&
defined(@uinfo = getpwnam($config{'ldap_user'}))) {
opendir(DATADIR, $config{'data_dir'});
local @datafiles = grep { !/^\./ } readdir(DATADIR);
closedir(DATADIR);
if (@datafiles) {
local @st = stat("$config{'data_dir'}/$datafiles[0]");
if ($st[4] != $uinfo[2]) {
return 0;
}
}
return 1;
}
else {
return -1;
}
}
# parse_ldap_access(&directive)
# Convert a slapd.conf directive into a more usable access control rule hash
sub parse_ldap_access
{
local ($a) = @_;
local @v = @{$a->{'values'}};
local $p = { };
shift(@v); # Remove to
$p->{'what'} = shift(@v); # Object
if ($v[0] =~ /^filter=(\S+)/) {
# Filter added to what
$p->{'filter'} = $1;
shift(@v);
}
if ($v[0] =~ /^attrs=(\S+)/) {
# Attributes added to what
$p->{'attrs'} = $1;
shift(@v);
}
local @descs;
while(@v) {
shift(@v); # Remove by
local $by = { 'who' => shift(@v),
'access' => shift(@v) };
while(@v && $v[0] ne 'by') {
push(@{$by->{'control'}}, shift(@v));
}
local $whodesc = $by->{'who'} eq 'self' ? $text{'access_self'} :
$by->{'who'} eq 'users' ? $text{'access_users'} :
$by->{'who'} eq 'anonymous' ? $text{'access_anon'} :
$by->{'who'} eq '*' ? $text{'access_all'} :
"<tt>$by->{'who'}</tt>";
local $adesc = $text{'access_'.$by->{'access'}} ||
"<tt>$by->{'access'}</tt>";
$adesc = ucfirst($adesc) if (!@descs);
push(@descs, &text('access_desc', $whodesc, $adesc));
push(@{$p->{'by'}}, $by);
}
$p->{'bydesc'} = join(", ", @descs);
if ($p->{'what'} eq '*') {
$p->{'whatdesc'} = $text{'access_any'};
}
else {
$p->{'whatdesc'} = "<tt>$p->{'what'}</tt>";
}
return $p;
}
# store_ldap_access(&directive, &acl-struct)
# Updates the values of a directive from an ACL structure
sub store_ldap_access
{
local ($a, $p) = @_;
local @v = ( 'to' );
push(@v, $p->{'what'});
if ($p->{'filter'}) {
push(@v, "filter=$p->{'filter'}");
}
if ($p->{'attrs'}) {
push(@v, "attrs=$p->{'attrs'}");
}
foreach my $b (@{$p->{'by'}}) {
push(@v, "by");
push(@v, $b->{'who'});
push(@v, $b->{'access'});
push(@v, @{$b->{'control'}});
}
$a->{'values'} = \@v;
}
1;