839 lines
29 KiB
Perl

#
# Generated by SM2Gen version:0.9(20Jan2025) Chameleon version:4.5.4 On Python:3.12.3 at 2025-05-21 08:46:42
#
#
# Routines to be edited by the developer to provide content and validation for parameters
# and provison of the control data for table(s)
#
use esmith::util;
use esmith::util::network;
use esmith::ConfigDB;
use esmith::HostsDB;
use esmith::AccountsDB;
use esmith::NetworksDB;
use esmith::DomainsDB;
use constant FALSE => 0;
use constant TRUE => 1;
#The most common ones - open DB when required.
my $cdb;
my $adb;
my $ndb;
my $hdb;
my $ddb;
# Validation routines - parameters for each panel
sub validate_LIST {
my $c = shift;
my $sf_data = shift; #Data hash as parameter
# Validation for each field
my $ret = "";
if ($ret eq "") {$ret = 'ok';}
return $ret;
}
sub validate_MODIFY {
my $c = shift;
my $sf_data = shift; #Data hash as parameter
# Validation for each field
my $ret = "";
if (! TRUE) #validate $c->param('description')
{$ret .= 'Validation for description failed';}
if (! TRUE) #validate $c->param('smbaccess')
{$ret .= 'Validation for smbaccess failed';}
if (! TRUE) #validate $c->param('recyclebin')
{$ret .= 'Validation for recyclebin failed';}
if (! TRUE) #validate $c->param('retention')
{$ret .= 'Validation for retention failed';}
if (! TRUE) #validate $c->param('httpaccess')
{$ret .= 'Validation for httpaccess failed';}
if (! TRUE) #validate $c->param('webdav')
{$ret .= 'Validation for webdav failed';}
if (! TRUE) #validate $c->param('requireSSL')
{$ret .= 'Validation for requireSSL failed';}
if (! TRUE) #validate $c->param('indexes')
{$ret .= 'Validation for indexes failed';}
if (! TRUE) #validate $c->param('dynamic')
{$ret .= 'Validation for dynamic failed';}
if ($ret eq "") {$ret = 'ok';}
return $ret;
}
sub validate_PERMISSIONS {
my $c = shift;
my $sf_data = shift; #Data hash as parameter
# Validation for each field
my $ret = "";
if (! TRUE) #validate $c->param('writegroup')
{$ret .= 'Validation for writegroup failed';}
if (! TRUE) #validate $c->param('readgroup')
{$ret .= 'Validation for readgroup failed';}
if (! TRUE) #validate $c->param('writegroup')
{$ret .= 'Validation for writegroup failed';}
if (! TRUE) #validate $c->param('readgroup')
{$ret .= 'Validation for readgroup failed';}
if (! TRUE) #validate $c->param('writegroup')
{$ret .= 'Validation for writegroup failed';}
if (! TRUE) #validate $c->param('readgroup')
{$ret .= 'Validation for readgroup failed';}
if (! TRUE) #validate $c->param('writegroup')
{$ret .= 'Validation for writegroup failed';}
if (! TRUE) #validate $c->param('readgroup')
{$ret .= 'Validation for readgroup failed';}
if (! TRUE) #validate $c->param('writegroup')
{$ret .= 'Validation for writegroup failed';}
if (! TRUE) #validate $c->param('readgroup')
{$ret .= 'Validation for readgroup failed';}
if (! TRUE) #validate $c->param('writeuser')
{$ret .= 'Validation for writeuser failed';}
if (! TRUE) #validate $c->param('readuser')
{$ret .= 'Validation for readuser failed';}
if (! TRUE) #validate $c->param('writeuser')
{$ret .= 'Validation for writeuser failed';}
if (! TRUE) #validate $c->param('readuser')
{$ret .= 'Validation for readuser failed';}
if (! TRUE) #validate $c->param('writeuser')
{$ret .= 'Validation for writeuser failed';}
if (! TRUE) #validate $c->param('readuser')
{$ret .= 'Validation for readuser failed';}
if (! TRUE) #validate $c->param('writeuser')
{$ret .= 'Validation for writeuser failed';}
if (! TRUE) #validate $c->param('readuser')
{$ret .= 'Validation for readuser failed';}
if (! TRUE) #validate $c->param('writeuser')
{$ret .= 'Validation for writeuser failed';}
if (! TRUE) #validate $c->param('readuser')
{$ret .= 'Validation for readuser failed';}
if (! TRUE) #validate $c->param('writeuser')
{$ret .= 'Validation for writeuser failed';}
if (! TRUE) #validate $c->param('readuser')
{$ret .= 'Validation for readuser failed';}
if (! TRUE) #validate $c->param('writeuser')
{$ret .= 'Validation for writeuser failed';}
if (! TRUE) #validate $c->param('readuser')
{$ret .= 'Validation for readuser failed';}
if (! TRUE) #validate $c->param('writeuser')
{$ret .= 'Validation for writeuser failed';}
if (! TRUE) #validate $c->param('readuser')
{$ret .= 'Validation for readuser failed';}
if (! TRUE) #validate $c->param('writeuser')
{$ret .= 'Validation for writeuser failed';}
if (! TRUE) #validate $c->param('readuser')
{$ret .= 'Validation for readuser failed';}
if (! TRUE) #validate $c->param('writeuser')
{$ret .= 'Validation for writeuser failed';}
if (! TRUE) #validate $c->param('readuser')
{$ret .= 'Validation for readuser failed';}
if (! TRUE) #validate $c->param('writeuser')
{$ret .= 'Validation for writeuser failed';}
if (! TRUE) #validate $c->param('readuser')
{$ret .= 'Validation for readuser failed';}
if (! TRUE) #validate $c->param('writeuser')
{$ret .= 'Validation for writeuser failed';}
if (! TRUE) #validate $c->param('readuser')
{$ret .= 'Validation for readuser failed';}
if (! TRUE) #validate $c->param('writeuser')
{$ret .= 'Validation for writeuser failed';}
if (! TRUE) #validate $c->param('readuser')
{$ret .= 'Validation for readuser failed';}
if (! TRUE) #validate $c->param('writeuser')
{$ret .= 'Validation for writeuser failed';}
if (! TRUE) #validate $c->param('readuser')
{$ret .= 'Validation for readuser failed';}
if ($ret eq "") {$ret = 'ok';}
return $ret;
}
sub validate_REMOVE {
my $c = shift;
my $sf_data = shift; #Data hash as parameter
# Validation for each field
my $ret = "";
if ($ret eq "") {$ret = 'ok';}
return $ret;
}
# Get singleton data for each panel
sub get_data_for_panel_LIST {
# Return a hash with the fields required which will be loaded into the shared data
my $c = shift;
my %ret = (
'Data1'=>'Data for LIST', #Example
# fields from Inputs in LIST $fields['LIST']
);
return %ret;
}
sub get_data_for_panel_MODIFY {
# Return a hash with the fields required which will be loaded into the shared data
my $c = shift;
my $name = $c->param('Selected');
$adb = esmith::AccountsDB->open() || die("Couldn't open Accounts db");
my $rec = $adb->get($name) || die("Share $name is not in DB ");
my %ret = (
'Data1'=>'Data for MODIFY', #Example
# fields from Inputs in MODIFY $fields['MODIFY']
'name' => $name,
'description'=>$rec->prop('Name'),
'smbaccess'=>$rec->prop('smbAccess'),
'recyclebin'=>$rec->prop('RecycleBin'),
'retention'=>$rec->prop('RecycleBinRetention'),
'httpaccess'=>$rec->prop('httpAccess'),
'webdav'=>$rec->prop('WebDav'),
'requireSSL'=>$rec->prop('RequireSSL'),
'indexes'=>$rec->prop('Indexes'),
'dynamic'=>$rec->prop('DynamicContent'),
);
return %ret;
}
sub get_data_for_panel_PERMISSIONS {
# Return a hash with the fields required which will be loaded into the shared data
# Return a hash with the fields required which will be loaded into the shared data
my $c = shift;
my $name = $c->param('Selected');
$adb = esmith::AccountsDB->open() || die("Couldn't open Accounts db");
my $rec = $adb->get($name) || die("Share $name is not in DB ");
my %ret = (
'Data1'=>'Data for MODIFY', #Example
# fields from Inputs in MODIFY $fields['MODIFY']
'name' => $name,
'description'=>$rec->prop('Name'),
);
return %ret;
}
sub get_data_for_panel_REMOVE {
# Return a hash with the fields required which will be loaded into the shared data
my $c = shift;
my $name = $c->param('Selected');
$adb = esmith::AccountsDB->open() || die("Couldn't open Accounts db");
my $rec = $adb->get($name) || die("Share $name is not in DB ");
my %ret = (
'Data1'=>'Data for MODIFY', #Example
# fields from Inputs in MODIFY $fields['MODIFY']
'name' => $name,
'description'=>$rec->prop('Name'),
);
return %ret;
}
# Get control data for table(s)
# Define a constant hash for field name mapping
use constant Table1_FIELD_MAPPING => (
'Table1_Name' => 'Table1_Name',
'Table1_Description' => 'Table1_Description',
'Table1_Actionp' => 'Table1_Actionp',
'Table1_Actionm' => 'Table1_Actionm',
'Table1_Actionr' => 'Table1_Actionr',
);
sub actual_Table1 {
my $c = shift;
my @ret = ();
# Actual code for extracting Table1
$adb = esmith::AccountsDB->open() || die("Couldn't open Accounts db");
my @shares = $adb->get_all_by_prop(type => 'share');
foreach my $share (@shares) {
my $sharename = $share->key();
my $sharedesc = $share->prop('Name');
next if (($share->prop('Hide') || 'no') eq 'yes');
my $removable = $share->prop('Removable') || 'yes';
my $actionModify = '<a href="sharesd?trt=MODIFY&Selected='.$sharename.'">'.$c->l('sf_Modify').'</a>';
my $actionPerm = '<a href="sharesd?trt=PERMISSIONS&Selected='.$sharename.'">'.$c->l('sf_Permisssions').'</a>';
my $actionRemove = ($removable ne 'no') ?'<a href="sharesd?trt=REMOVE&Selected='.$sharename.'">'.$c->l('sf_Remove').'</a>': '';
push @ret,
{ Table1_Name => $sharename,
Table1_Description => $sharedesc,
Table1_Actionp => $actionPerm,
Table1_Actionm => $actionModify,
Table1_Actionr => $actionRemove,
};
}
return @ret;
}
sub get_Table1 {
# Return an array of hashes of the contents for each row and column for Table1
my $c = shift;
my @source_records = $c->actual_Table1();
my @transformed_records;
my %Field_Mapping = Table1_FIELD_MAPPING();
# Iterate over each record in the source array
for my $source_record (@source_records) {
my %transformed_record;
# Iterate over each key-value pair in the $Field_Mapping constant
while (my ($target, $source) = each %Field_Mapping) {
# Check if the source field exists in the source record
if (exists $source_record->{$source}) {
# Assign the source field value to the target field in the transformed record
$transformed_record{$target} = $source_record->{$source};
}
}
# Add transformed record to the array if it's not empty
push @transformed_records, \%transformed_record if %transformed_record;
}
return \@transformed_records;
}
# Define a constant hash for field name mapping
use constant Table2_FIELD_MAPPING => (
'Table2_Groups' => 'Username',
'Table2_Description' => 'Description',
'Table2_Read / Write' => 'WritePerms',
'Table2_Read Only' => 'ReadPerms'
#'target_field2' => 'source_field2',
# Add more mappings as needed
);
sub actual_Table2 {
my $c = shift;
my @ret = ();
# Actual code for extracting Table2, Table3
my $groups_ref = $c->acl_list('groups');
my @groups = @$groups_ref;
return @groups;
}
sub get_Table2 {
# Return an array of hashes of the contents for each row and column for Table2
my $c = shift;
my @source_records = $c->actual_Table2();
my @transformed_records;
my %Field_Mapping = Table2_FIELD_MAPPING();
# Iterate over each record in the source array
for my $source_record (@source_records) {
my %transformed_record;
# Iterate over each key-value pair in the $Field_Mapping constant
while (my ($target, $source) = each %Field_Mapping) {
# Check if the source field exists in the source record
if (exists $source_record->{$source}) {
# Assign the source field value to the target field in the transformed record
$transformed_record{$target} = $source_record->{$source};
}
}
# Add transformed record to the array if it's not empty
push @transformed_records, \%transformed_record if %transformed_record;
}
return \@transformed_records;
}
# Define a constant hash for field name mapping
use constant Table3_FIELD_MAPPING => (
'Table3_Users' => 'Username',
'Table3_Description' => 'Description',
'Table3_Read / Write' => 'WritePerms',
'Table3_Read Only' => 'ReadPerms'
#'target_field3' => 'source_field3',
# Add more mappings as needed
);
sub actual_Table3 {
my $c = shift;
my @ret = ();
# Actual code for extracting Table3, Table3 - this is called twice - by table 2 and table 3 processiong (!)
my $users_ref = $c->acl_list('users');
my @users = @$users_ref;
return @users;
}
sub get_Table3 {
# Return an array of hashes of the contents for each row and column for Table3
my $c = shift;
my @source_records = $c->actual_Table3();
my @transformed_records;
my %Field_Mapping = Table3_FIELD_MAPPING();
# Iterate over each record in the source array
for my $source_record (@source_records) {
my %transformed_record;
# Iterate over each key-value pair in the $Field_Mapping constant
while (my ($target, $source) = each %Field_Mapping) {
# Check if the source field exists in the source record
if (exists $source_record->{$source}) {
# Assign the source field value to the target field in the transformed record
$transformed_record{$target} = $source_record->{$source};
}
}
# Add transformed record to the array if it's not empty
push @transformed_records, \%transformed_record if %transformed_record;
}
return \@transformed_records;
}
# Return hash with values from row in which link clicked on table
sub get_selected_LIST {
my $c = shift;
my $selected = shift; #Parameter is name of selected row.
my $is_new_record = shift; #Indicates new record required (defaults)
my %ret = {};
return %ret;
}
sub get_selected_MODIFY {
my $c = shift;
my $selected = shift; #Parameter is name of selected row.
my $is_new_record = shift; #Indicates new record required (defaults)
my %ret = {};
return %ret;
}
sub get_selected_PERMISSIONS {
my $c = shift;
my $selected = shift; #Parameter is name of selected row.
my $is_new_record = shift; #Indicates new record required (defaults)
my %ret = {};
return %ret;
}
sub get_selected_REMOVE {
my $c = shift;
my $selected = shift; #Parameter is name of selected row.
my $is_new_record = shift; #Indicates new record required (defaults)
my %ret = {};
return %ret;
}
#after sucessful modify or create or whatever and submit then perfom (if the params validate)
sub perform_LIST {
my $c = shift;
my $sf_data = shift; #Data hash as parameter
my $ret = "";
my $db = $cdb; #maybe one of the others
my $dbkey = 'ChangeThis';
# To make it write to DB as comment, delete this (regex) string in each if statement "TRUE\) \#copy or perform with value: .* e.g."
if ($ret eq "") {$ret = 'ok';}
return $ret;
}
sub perform_MODIFY {
my $c = shift;
my $sf_data = shift; #Data hash as parameter
my $ret = "";
#my $db = $cdb; #maybe one of the others
#my $dbkey = 'ChangeThis';
## To make it write to DB as comment, delete this (regex) string in each if statement "TRUE\) \#copy or perform with value: .* e.g."
#if (! TRUE) #copy or perform with value: description e.g. $db->set_prop($dbkey,'description',$c->param('description'),type=>'service'))
#{$ret .= 'Perform/save failed for description';}
#if (! TRUE) #copy or perform with value: smbaccess e.g. $db->set_prop($dbkey,'smbaccess',$c->param('smbaccess'),type=>'service'))
#{$ret .= 'Perform/save failed for smbaccess';}
#if (! TRUE) #copy or perform with value: recyclebin e.g. $db->set_prop($dbkey,'recyclebin',$c->param('recyclebin'),type=>'service'))
#{$ret .= 'Perform/save failed for recyclebin';}
#if (! TRUE) #copy or perform with value: retention e.g. $db->set_prop($dbkey,'retention',$c->param('retention'),type=>'service'))
#{$ret .= 'Perform/save failed for retention';}
#if (! TRUE) #copy or perform with value: httpaccess e.g. $db->set_prop($dbkey,'httpaccess',$c->param('httpaccess'),type=>'service'))
#{$ret .= 'Perform/save failed for httpaccess';}
#if (! TRUE) #copy or perform with value: webdav e.g. $db->set_prop($dbkey,'webdav',$c->param('webdav'),type=>'service'))
#{$ret .= 'Perform/save failed for webdav';}
#if (! TRUE) #copy or perform with value: requireSSL e.g. $db->set_prop($dbkey,'requireSSL',$c->param('requireSSL'),type=>'service'))
#{$ret .= 'Perform/save failed for requireSSL';}
#if (! TRUE) #copy or perform with value: indexes e.g. $db->set_prop($dbkey,'indexes',$c->param('indexes'),type=>'service'))
#{$ret .= 'Perform/save failed for indexes';}
#if (! TRUE) #copy or perform with value: dynamic e.g. $db->set_prop($dbkey,'dynamic',$c->param('dynamic'),type=>'service'))
#{$ret .= 'Perform/save failed for dynamic';}
$ret = $c->save_share();
if ($ret eq "") {$ret = 'ok';}
return $ret;
}
sub perform_PERMISSIONS {
my $c = shift;
$ret = $c->modify_perm();
#my $sf_data = shift; #Data hash as parameter
#my $ret = "";
#my $db = $cdb; #maybe one of the others
#my $dbkey = 'ChangeThis';
if ($ret eq "") {$ret = 'ok';}
return $ret;
}
sub perform_REMOVE {
my $c = shift;
my $sf_data = shift; #Data hash as parameter
my $ret = "";
$ret = $c->remove_share();
if ($ret eq "") {$ret = 'ok';}
return $ret;
}
sub create_link{
# WIP
my ($c,$route, $panel, $index) = @_;
my $link = "$route?trt=$panel&Selected=$index";
return $link;
}
# Create a new shared folder
sub save_share {
#
# Merged the two subs from SM1
#
my $c = shift;
my $name = $c->param('name');
$adb = esmith::AccountsDB->open() || die("Couldn't open Accounts db");
my $acct = $adb->get($name);
my $is_create = !$acct;
if ($is_create) {
# Validate new share parameters
my $msg = $c->validate_name($name);
return $c->l($msg) unless $msg eq 'ok';
$msg = $c->max_share_name_length($name);
return $c->l($msg) unless $msg eq 'ok';
$msg = $c->conflict_check($name);
return $c->l($msg) unless $msg eq 'ok';
# Handle encryption parameters
my $encryption = $c->param('encryption') || 'disabled';
my $password;
if ($encryption eq 'enabled') {
$password = $c->param('password');
my $password2 = $c->param('password2');
$msg = $c->confirm_password($password, $password2);
return $c->l($msg) unless $msg eq 'ok';
}
# Create new share record
$acct = $adb->new_record($name, {
Name => $c->param('description'),
Encryption => $encryption,
InactivityTimeOut => ($c->param('inactivity') || ''),
RecycleBin => $c->param('recyclebin'),
RecycleBinRetention => $c->param('retention'),
smbAccess => $c->param('smbaccess'),
httpAccess => $c->param('httpaccess'),
WebDav => $c->param('webdav'),
Pydio => ($c->param('pydio') || 'disabled'),
RequireSSL => $c->param('requireSSL'),
Indexes => $c->param('indexes'),
DynamicContent => $c->param('dynamic'),
type => 'share',
}) or return $c->l('sf_CANT_CREATE_SHARE');
# Set up encrypted filesystem if needed
if ($encryption eq 'enabled') {
my $source = "/home/e-smith/files/shares/$name/.store";
my $dest = "/home/e-smith/files/shares/$name/files";
File::Path::mkpath($source);
mkdir $dest;
open(my $dir, "| /usr/bin/encfs -S --public -o nonempty,umask=000 $source $dest > /dev/null 2>&1")
or die "Failed to open encfs command: $!";
print $dir "\n$password";
close $dir;
return $c->l("sf_ERROR_WITH_ENCRYPTION") unless(
system("/bin/fusermount -uz $dest") == 0
);
}
}
else {
# Validate existing share
return $c->l('sf_CANT_FIND_SHARE') unless $acct->prop('type') eq 'share';
# Update share properties
$acct->merge_props(
Name => $c->param('description'),
InactivityTimeOut => ($c->param('inactivity') || ''),
RecycleBin => $c->param('recyclebin'),
RecycleBinRetention => $c->param('retention'),
smbAccess => $c->param('smbaccess'),
httpAccess => $c->param('httpaccess'),
WebDav => $c->param('webdav'),
Pydio => ($c->param('pydio') || 'disabled'),
RequireSSL => $c->param('requireSSL'),
Indexes => $c->param('indexes'),
DynamicContent => $c->param('dynamic'),
);
}
# Untaint and execute system command
$name =~ /(.+)/ && ($name = $1);
my $event = $is_create ? "share-create" : "share-modify";
if (system("/sbin/e-smith/signal-event", $event, $name) == 0) {
return $c->l('ok')
# $is_create ? "SUCCESSFULLY_CREATED_SHARE" : "SUCCESSFULLY_MODIFIED_SHARE",
# $is_create ? "Permissions" : ()
# );
}
else {
$c->l($is_create ? "sf_ERROR_WHILE_CREATING_SHARE" : "sf_ERROR_WHILE_MODIFYING_SHARE");
}
return "";
}
sub modify_perm {
my $c = shift;
my $name = $c->param('name');
$adb = esmith::AccountsDB->open() || die("Couldn't open Accounts db");
my $acct = $adb->get($name);
return $c->l('sf_CANT_FIND_SHARE') unless($acct && $acct->prop('type') eq 'share');
my $encryption = $acct->prop('Encryption') || 'disabled';
my @selected = @{$c->every_param('panelAccess')};
my $AdminPanels = join(',', @selected);
my @selectedwritegroups = @{$c->every_param('writegroup')};
my $WriteGroups = join(",", @selectedwritegroups);
my @selectedwriteusers = @{$c->every_param('writeuser')};
my $WriteUsers = join(",", @selectedwriteusers);
my @CleanReadGroups = ();
my @CleanReadUsers = ();
# EncFS doesn't expose underlying ACLs
# So, just remove any read only groups
# Read Only is not supported with encryption
my @selectedreadgroups = @{$c->every_param('readgroup')};
my @selectedreadusers = @{$c->every_param('readuser')};
if ($encryption ne 'enabled'){
# No need to have read access if write is already granted
foreach my $group (@selectedreadgroups){
push (@CleanReadGroups, $group) unless (grep { $_ eq $group } @selectedwritegroups);
}
foreach my $user (@selectedreadusers){
push (@CleanReadUsers, $user) unless (grep { $_ eq $user } @selectedwriteusers);
}
}
my $ReadGroups = join(",",@CleanReadGroups);
my $ReadUsers = join(",",@CleanReadUsers);
$acct->merge_props(
WriteGroups => $WriteGroups,
ReadGroups => $ReadGroups,
WriteUsers => $WriteUsers,
ReadUsers => $ReadUsers,
);
# Untaint $name before use in system()
$name =~ /(.+)/; $name = $1;
if (system ("/sbin/e-smith/signal-event", "share-modify", $name) == 0) {
return 'ok'; #$c->success("sf_SUCCESSFULLY_MODIFIED_SHARE");
}
else {
return $c->l("sf_ERROR_WHILE_MODIFYING_SHARE");
}
return "";
}
# Remove a share
sub remove_share {
my $c = shift;
$adb = esmith::AccountsDB->open() || die("Couldn't open Accounts db");
my $name = $c->param('Selected');
my $acct = $adb->get($name);
return $c->l('sf_CANCELED','First') if ($c->param('cancel'));
return $c->l('sf_CANT_FIND_SHARE') unless ($acct && $acct->prop('type') eq 'share');
# Untaint $name before use in system()
$name =~ /(.+)/; $name = $1;
my $encryption = $acct->prop('Encryption') || 'disabled';
my $mountstatus = `/bin/mount | grep /home/e-smith/files/shares/$name/ | grep -c fuse`;
chomp($mountstatus);
if (($encryption eq 'enabled') && ($mountstatus eq '1')){
$c->l("sf_ERROR_ENCRYPTED_ENABLED");
return undef;
}
$acct->set_prop('type', 'share-deleted');
if (system ("/sbin/e-smith/signal-event", "share-delete", $name) == 0) {
return 'ok'; #$c->success("SUCCESSFULLY_DELETED_SHARE");
$acct->delete();
}
else {
$c->l("sf_ERROR_WHILE_DELETING_SHARE");
}
return "";
}
# Check the proposed name for clashes with existing pseudonyms or other
# accounts of any type.
sub conflict_check {
my ($c, $name) = @_;
$adb = esmith::AccountsDB->open() || die("Couldn't open Accounts db");
my $rec = $adb->get($name);
my $type;
if (defined $rec){
my $type = $rec->prop('type');
if ($type eq "pseudonym"){
my $acct = $rec->prop("Account");
my $acct_type = $adb->get($acct)->prop('type');
return $c->l('sf_ACCT_CLASHES_WITH_PSEUDONYM',
{acctName => $name, acctType => $acct_type, acct => $acct});
}
}
elsif (defined getpwnam($name) || defined getgrnam($name)){
$type = 'system';
}
else{
# No account record and no account
return 'ok';
}
return $c->l('sf_ACCOUNT_EXISTS',
{acctName => $name, acctType => $type});
}
# Checks that the name supplied does not contain any unacceptable chars.
# Returns OK on success or a localised error message otherwise.
sub validate_name {
my ($c, $acctName) = @_;
unless ($acctName =~ /^([a-z0-9][\_\.\-a-z0-9]*)\$?$/){
return $c->l('sf_ACCT_NAME_HAS_INVALID_CHARS',
{acctName => $acctName});
}
return 'ok';
}
# Check if inactivity is a number
sub validate_inactivity {
my ($c, $inac) = @_;
unless ($inac =~ /^\d+$/){
return $c->l('sf_INVALID_INACTIVITY',
{inactivity => $inac});
}
return 'ok';
}
# Check if both passwords match
# and are more than 8 chars
sub confirm_password {
my ($c, $pass1, $pass2) = @_;
return 'ok' if ($c->{cgi}->param('encryption') eq 'disabled');
my @num = split(//,$pass1);
unless (scalar (@num) >= 8){
return $c->l('sf_PASSWORD_TOO_SHORT');
}
unless ($pass1 eq $pass2){
return $c->l('sf_PASSWORD_MISMATCH');
}
return 'ok';
}
sub max_share_name_length {
my ($c, $data) = @_;
$cdb = esmith::ConfigDB->open() || die("Couldn't open config db");
my $rec = $cdb->get('maxShareNameLength');
my $max = (defined $rec ? $rec->value : '12');
if (length($data) <= $max) {
return "ok";
}
else {
return $c->l("sf_MAX_SHARE_NAME_LENGTH_ERROR",
{acctName => $data,
maxShareNameLength => $max,
maxLength => $max});
}
}
#Get arrays of users and gtroups who have read only or read/write access
sub acl_list {
my ($c, $which) = @_;
my $sharename = $c->param('Selected');
my $adb = esmith::AccountsDB->open() || die("Couldn't open Accounts db");
my $share = $adb->get($sharename);
return $c->l('sf_SHARE_NOT_FOUND') unless ($share);
if ($which eq 'groups') {
my $WriteGroups = $share->prop('WriteGroups') || '';
my $ReadGroups = $share->prop('ReadGroups') || '';
my (%WriteGroups, %ReadGroups);
$WriteGroups{$_} = 1 for grep { $_ } split /[,;]/, $WriteGroups;
$ReadGroups{$_} = 1 for grep { $_ } split /[,;]/, $ReadGroups;
my @groups;
# The "shared" pseudo-group (Everyone)
push @groups, {
Username => 'shared',
Description => 'Everyone',
WritePerms => $WriteGroups{'shared'} ? 1 : 0,
ReadPerms => $ReadGroups{'shared'} ? 1 : 0
};
foreach my $group (sort { $a->key cmp $b->key } $adb->groups) {
my $name = $group->key;
my $desc = $group->prop('Description') || '';
push @groups, {
Username => $name,
Description => $desc,
WritePerms => $WriteGroups{$name} ? 1 : 0,
ReadPerms => $ReadGroups{$name} ? 1 : 0
};
}
return \@groups;
}
elsif ($which eq 'users') {
my $WriteUsers = $share->prop('WriteUsers') || '';
my $ReadUsers = $share->prop('ReadUsers') || '';
my (%WriteUsers, %ReadUsers);
$WriteUsers{$_} = 1 for grep { $_ } split /[,;]/, $WriteUsers;
$ReadUsers{$_} = 1 for grep { $_ } split /[,;]/, $ReadUsers;
my @users;
foreach my $user (sort { $a->key cmp $b->key } $adb->users) {
my $name = $user->key;
my $desc = join(' ', grep { $_ } ($user->prop('FirstName'), $user->prop('LastName')));
push @users, {
Username => $name,
Description => $desc,
WritePerms => $WriteUsers{$name} ? 1 : 0,
ReadPerms => $ReadUsers{$name} ? 1 : 0
};
}
return \@users;
}
else {
die "Invalid parameter to acl_list: must be 'groups' or 'users'";
}
}
1;