Compare commits
13 Commits
11_0_0-5_e
...
master
Author | SHA1 | Date | |
---|---|---|---|
b0d33d1017 | |||
5047976085 | |||
2710d9f93d | |||
493977906b | |||
95eba03095 | |||
f12ac8900e | |||
d3486008d1 | |||
97d1058b70 | |||
03edae6bee | |||
1b0024751e | |||
a645d4e717 | |||
2a92781704 | |||
e1aa2c062a |
1
.gitignore
vendored
1
.gitignore
vendored
@@ -2,3 +2,4 @@
|
||||
*.log
|
||||
*spec-20*
|
||||
*.tar.xz
|
||||
*.bak
|
||||
|
@@ -6,7 +6,14 @@ SMEServer Koozali developed git repo for smeserver-lib smeserver
|
||||
<br />https://wiki.koozali.org/
|
||||
|
||||
## Bugzilla
|
||||
Show list of outstanding bugs: [here](https://bugs.koozali.org/buglist.cgi?component=smeserver-lib&product=SME%20Server%2010.X&query_format=advanced&limit=0&bug_status=UNCONFIRMED&bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&bug_status=CONFIRMED)\
|
||||
Show list of outstanding bugs:
|
||||
[All](https://bugs.koozali.org/buglist.cgi?action=wrap&bug_status=UNCONFIRMED&bug_status=CONFIRMED&bug_status=NEEDINFO&bug_status=IN_PROGRESS&bug_status=RESOLVED&bug_status=VERIFIED&cf_package=smeserver-lib&classification=SME+Server&list_id=105756&order=changeddate+DESC%2Ccomponent%2Cpriority%2Cbug_severity&query_format=advanced)
|
||||
[Confirmed](https://bugs.koozali.org/buglist.cgi?action=wrap&bug_status=CONFIRMED&cf_package=smeserver-lib&classification=SME+Server&order=changeddate+DESC%2Ccomponent%2Cpriority%2Cbug_severity&query_format=advanced)
|
||||
[Unconfirmed](https://bugs.koozali.org/buglist.cgi?action=wrap&bug_status=UNCONFIRMED&cf_package=smeserver-lib&classification=SME+Server&order=changeddate+DESC%2Ccomponent%2Cpriority%2Cbug_severity&query_format=advanced)
|
||||
[Need info](https://bugs.koozali.org/buglist.cgi?action=wrap&bug_status=NEEDINFO&cf_package=smeserver-lib&classification=SME+Server&order=changeddate+DESC%2Ccomponent%2Cpriority%2Cbug_severity&query_format=advanced)
|
||||
[In progress](https://bugs.koozali.org/buglist.cgi?action=wrap&bug_status=IN_PROGRESS&cf_package=smeserver-lib&classification=SME+Server&order=changeddate+DESC%2Ccomponent%2Cpriority%2Cbug_severity&query_format=advanced)
|
||||
[Resolved](https://bugs.koozali.org/buglist.cgi?action=wrap&bug_status=RESOLVED&cf_package=smeserver-lib&classification=SME+Server&order=changeddate+DESC%2Ccomponent%2Cpriority%2Cbug_severity&query_format=advanced)
|
||||
[Verified](https://bugs.koozali.org/buglist.cgi?action=wrap&bug_status=VERIFIED&cf_package=smeserver-lib&classification=SME+Server&order=changeddate+DESC%2Ccomponent%2Cpriority%2Cbug_severity&query_format=advanced)
|
||||
And a list of outstanding Legacy bugs: (e-smith-lib) [here](https://bugs.koozali.org/buglist.cgi?component=e-smith-lib&product=SME%20Server%2010.X&query_format=advanced&limit=0&bug_status=UNCONFIRMED&bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&bug_status=CONFIRMED)
|
||||
|
||||
## Description
|
||||
|
@@ -1 +0,0 @@
|
||||
sme10
|
@@ -24,6 +24,7 @@ use Errno;
|
||||
use DirHandle;
|
||||
|
||||
my $event = shift || die "must give event name parameter";
|
||||
exit(0) if ( grep( /^$event$/, qw(post-upgrade bootstrap-console-save) ));
|
||||
chdir "/etc/e-smith/events/$event" or die "Couldn't chdir to event directory /etc/e-smith/events/$event: $!";
|
||||
my $dh = DirHandle->new("services2adjust");
|
||||
|
||||
|
11
root/etc/e-smith/templates-default/template-begin-ini
Normal file
11
root/etc/e-smith/templates-default/template-begin-ini
Normal file
@@ -0,0 +1,11 @@
|
||||
;------------------------------------------------------------
|
||||
; !!DO NOT MODIFY THIS FILE!!
|
||||
;
|
||||
; Manual changes will be lost when this file is regenerated.
|
||||
;
|
||||
; Please read the developer's guide, which is available
|
||||
; at http://www.contribs.org/development/
|
||||
;
|
||||
; Copyright (C) 1999-2006 Mitel Networks Corporation
|
||||
;------------------------------------------------------------
|
||||
|
@@ -87,7 +87,6 @@ ntpd=service|InitscriptOrder|55|status|disabled
|
||||
php=service|status|enabled
|
||||
popd=service|access|private|status|enabled
|
||||
pppoe=service|DemandIdleTime|no|InitscriptOrder|57|SynchronousPPP|no|status|disabled
|
||||
pptpd=service|sessions|10|status|disabled
|
||||
qmail=service|InitscriptOrder|80|status|enabled
|
||||
random=service|InitscriptOrder|20|status|enabled
|
||||
rsyslog=service|InitscriptOrder|05|status|enabled
|
||||
@@ -99,5 +98,6 @@ squid=service|InitscriptOrder|90|status|enabled
|
||||
sshd=service|InitscriptOrder|85|PasswordAuthentication|yes|PermitRootLogin|yes|access|private|status|enabled
|
||||
sync=service|Host|service.e-smith.com|LastId|0|SuccessId|0|SyncFrequency|1|SyncMinute|57|status|disabled
|
||||
telnet=service|access|private|status|disabled
|
||||
vpn=configuration|sessions|10|status|disabled
|
||||
wibble=42
|
||||
xinetd=service|InitscriptOrder|50|status|enabled
|
||||
|
54
root/sbin/e-smith/getmyip
Normal file
54
root/sbin/e-smith/getmyip
Normal file
@@ -0,0 +1,54 @@
|
||||
#!/bin/bash
|
||||
|
||||
# List of services to query for the public IP
|
||||
services=(
|
||||
"ifconfig.me"
|
||||
"ipinfo.io/ip"
|
||||
"icanhazip.com"
|
||||
"api.ipify.org"
|
||||
"ident.me"
|
||||
"ip.tyk.nu"
|
||||
"checkip.amazonaws.com"
|
||||
"ipecho.net/plain"
|
||||
"myip.dnsomatic.com"
|
||||
"ip.seeip.org"
|
||||
"ipapi.co/ip"
|
||||
"wtfismyip.com/text"
|
||||
"openident.net/ip"
|
||||
"ifconfig.co/ip"
|
||||
)
|
||||
|
||||
# Function to shuffle the array of services
|
||||
shuffle_services() {
|
||||
local i
|
||||
for ((i=${#services[@]} - 1; i > 0; i--)); do
|
||||
local j=$((RANDOM % (i + 1)))
|
||||
local temp="${services[i]}"
|
||||
services[i]="${services[j]}"
|
||||
services[j]="$temp"
|
||||
done
|
||||
}
|
||||
|
||||
# Function to fetch the public IP address
|
||||
get_public_ip() {
|
||||
shuffle_services
|
||||
for service in "${services[@]}"; do
|
||||
public_ip=$(curl -s --max-time 5 "$service")
|
||||
|
||||
# Check if the curl request was successful and there's a valid IP address
|
||||
if [[ $? -eq 0 && $public_ip =~ ^[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+$ ]]; then
|
||||
logger -t public_ip_script "Service used: $service, IP found: $public_ip"
|
||||
echo "$public_ip"
|
||||
return
|
||||
fi
|
||||
done
|
||||
|
||||
# If none of the services returned a valid IP, output an error message
|
||||
echo "Failed to retrieve public IP using all services." >&2
|
||||
logger -t public_ip_script "Error: Failed to retrieve public IP using all services."
|
||||
exit 1
|
||||
}
|
||||
|
||||
# Execute the function
|
||||
get_public_ip
|
||||
|
22
root/usr/share/perl5/vendor_perl/esmith/AccountsDB/UTF8.pm
Normal file
22
root/usr/share/perl5/vendor_perl/esmith/AccountsDB/UTF8.pm
Normal file
@@ -0,0 +1,22 @@
|
||||
#----------------------------------------------------------------------
|
||||
# Copyright 2013-2025 Koozali Foundation inc.
|
||||
# This program is free software; you can redistribute it and/or
|
||||
# modify it under the same terms as Perl itself.
|
||||
#----------------------------------------------------------------------
|
||||
|
||||
package esmith::AccountsDB::UTF8;
|
||||
|
||||
use strict;
|
||||
use warnings;
|
||||
|
||||
use esmith::AccountsDB;
|
||||
use esmith::config::utf8;
|
||||
our @ISA = qw(esmith::AccountsDB);
|
||||
|
||||
sub tie_class
|
||||
{
|
||||
return 'esmith::config::utf8';
|
||||
}
|
||||
|
||||
1;
|
||||
|
@@ -1,5 +1,6 @@
|
||||
#----------------------------------------------------------------------
|
||||
# Copyright 1999-2008 Mitel Networks Corporation
|
||||
# Copyright 2013-2025 Koozali Foundationi inc.
|
||||
# This program is free software; you can redistribute it and/or
|
||||
# modify it under the same terms as Perl itself.
|
||||
#----------------------------------------------------------------------
|
||||
@@ -9,9 +10,9 @@ package esmith::ConfigDB::UTF8;
|
||||
use strict;
|
||||
use warnings;
|
||||
|
||||
use esmith::DB::db;
|
||||
use esmith::ConfigDB;
|
||||
use esmith::config::utf8;
|
||||
our @ISA = qw( esmith::DB::db );
|
||||
our @ISA = qw( esmith::ConfigDB );
|
||||
|
||||
sub tie_class
|
||||
{
|
||||
|
22
root/usr/share/perl5/vendor_perl/esmith/DomainsDB/UTF8.pm
Normal file
22
root/usr/share/perl5/vendor_perl/esmith/DomainsDB/UTF8.pm
Normal file
@@ -0,0 +1,22 @@
|
||||
#----------------------------------------------------------------------
|
||||
# Copyright 2013-2025 Koozali Foundation inc.
|
||||
# This program is free software; you can redistribute it and/or
|
||||
# modify it under the same terms as Perl itself.
|
||||
#----------------------------------------------------------------------
|
||||
|
||||
package esmith::DomainsDB::UTF8;
|
||||
|
||||
use strict;
|
||||
use warnings;
|
||||
|
||||
use esmith::DomainsDB;
|
||||
use esmith::config::utf8;
|
||||
our @ISA = qw(esmith::DomainsDB);
|
||||
|
||||
sub tie_class
|
||||
{
|
||||
return 'esmith::config::utf8';
|
||||
}
|
||||
|
||||
1;
|
||||
|
22
root/usr/share/perl5/vendor_perl/esmith/HostsDB/UTF8.pm
Normal file
22
root/usr/share/perl5/vendor_perl/esmith/HostsDB/UTF8.pm
Normal file
@@ -0,0 +1,22 @@
|
||||
#----------------------------------------------------------------------
|
||||
# Copyright 2013-2025 Koozali Foundation inc.
|
||||
# This program is free software; you can redistribute it and/or
|
||||
# modify it under the same terms as Perl itself.
|
||||
#----------------------------------------------------------------------
|
||||
|
||||
package esmith::HostsDB::UTF8;
|
||||
|
||||
use strict;
|
||||
use warnings;
|
||||
|
||||
use esmith::HostsDB;
|
||||
use esmith::config::utf8;
|
||||
our @ISA = qw(esmith::HostsDB);
|
||||
|
||||
sub tie_class
|
||||
{
|
||||
return 'esmith::config::utf8';
|
||||
}
|
||||
|
||||
1;
|
||||
|
22
root/usr/share/perl5/vendor_perl/esmith/NetworksDB/UTF8.pm
Normal file
22
root/usr/share/perl5/vendor_perl/esmith/NetworksDB/UTF8.pm
Normal file
@@ -0,0 +1,22 @@
|
||||
#----------------------------------------------------------------------
|
||||
# Copyright 2013-2025 Koozali Foundation inc.
|
||||
# This program is free software; you can redistribute it and/or
|
||||
# modify it under the same terms as Perl itself.
|
||||
#----------------------------------------------------------------------
|
||||
|
||||
package esmith::NetworksDB::UTF8;
|
||||
|
||||
use strict;
|
||||
use warnings;
|
||||
|
||||
use esmith::NetworksDB;
|
||||
use esmith::config::utf8;
|
||||
our @ISA = qw(esmith::NetworksDB);
|
||||
|
||||
sub tie_class
|
||||
{
|
||||
return 'esmith::config::utf8';
|
||||
}
|
||||
|
||||
1;
|
||||
|
@@ -556,6 +556,12 @@ for example /etc/passwd, /etc/samba/smbpasswd, etc.
|
||||
=head2 validatePassword($password, $strength)
|
||||
|
||||
Validate Unix password.
|
||||
length is the minimal password length, default is 12.
|
||||
strength could be none,normal,intermediate or strong.
|
||||
- none: only check for length
|
||||
- normal: upper and lower case letters
|
||||
- intermediate: upper and lower case letters not positive to cracklib
|
||||
- strong : numbers, letter and special characters not positive to cracklib
|
||||
|
||||
=cut
|
||||
|
||||
@@ -566,14 +572,24 @@ sub validatePassword($$)
|
||||
|
||||
$strength ||= 'normal';
|
||||
|
||||
my $length = 12;
|
||||
my $db = esmith::ConfigDB->open() || undef;
|
||||
my $sysconfig = $db->get("passwordstrength")|| undef if $db ;
|
||||
$length = $sysconfig->prop("length") || "12" if $sysconfig;
|
||||
|
||||
my $reason = 'ok';
|
||||
$reason = 'it is too short' unless (length($password) > 6);
|
||||
$reason = 'it is too short' unless (length($password) >= $length);
|
||||
return $reason if ($reason ne 'ok' || $strength eq 'none');
|
||||
|
||||
$reason = 'it does not contain numbers' if (not $password =~ /\d/);
|
||||
$reason = 'it does not contain uppercase characters' if (not $password =~ /[A-Z]/);
|
||||
$reason = 'it does not contain lowercase characters' if (not $password =~ /[a-z]/);
|
||||
$reason = 'it does not contain special characters' if (not $password =~ /\W|_/);
|
||||
return $reason if ($reason ne 'ok' || $strength eq 'normal');
|
||||
|
||||
# we are left here with intermediate and strong
|
||||
if ($strength eq 'strong') {
|
||||
$reason = 'it does not contain numbers' if (not $password =~ /\d/);
|
||||
$reason = 'it does not contain special characters' if (not $password =~ /\W|_/);
|
||||
}
|
||||
return $reason if ($reason ne 'ok' && $strength eq 'strong');
|
||||
|
||||
if ( -f '/usr/lib64/cracklib_dict.pwd' ) {
|
||||
|
684
root/usr/share/perl5/vendor_perl/esmith/util/ldap.pm
Normal file
684
root/usr/share/perl5/vendor_perl/esmith/util/ldap.pm
Normal file
@@ -0,0 +1,684 @@
|
||||
#----------------------------------------------------------------------
|
||||
# Copyright (C) 2024 Koozali Foundation inc.
|
||||
# This program is free software; you can redistribute it and/or
|
||||
# modify it under the same terms as Perl itself.
|
||||
#----------------------------------------------------------------------
|
||||
|
||||
package esmith::util::ldap;
|
||||
|
||||
use strict;
|
||||
use Errno;
|
||||
use esmith::ConfigDB;
|
||||
use esmith::AccountsDB;
|
||||
use esmith::util;
|
||||
use utf8;
|
||||
use Encode;
|
||||
use Unicode::Normalize;
|
||||
use Text::Unidecode;
|
||||
use Net::LDAP;
|
||||
use List::MoreUtils qw(uniq);
|
||||
|
||||
require Exporter;
|
||||
our @ISA = qw(Exporter Net::LDAP);
|
||||
|
||||
# Exporting as default.
|
||||
our @EXPORT = qw(stringToASCII ldapgroup ldapdelgroup ldapsetgroupmembers ldapaddgroupmembers ldapuser ldapdeluser ldaplockuser ldapaddmachine ldapdelmachine);
|
||||
# Exporting on demand basis.
|
||||
our @EXPORT_OK = qw(ldapaddgroup ldapmodgroup ldapadduser ldapmoduser ldapexistsgroup ldapexistsuser ldapread);
|
||||
|
||||
#TODO:
|
||||
#=for testing
|
||||
#use_ok('esmith::util::system', 'killall', 'rsync', 'rsync_ssh');
|
||||
|
||||
my $c = esmith::ConfigDB->open_ro || die "Couldn't open config db\n";
|
||||
our $domain = $c->get('DomainName')
|
||||
|| die("Couldn't determine domain name");
|
||||
$domain = $domain->value;
|
||||
|
||||
|
||||
=pod
|
||||
|
||||
=head1 NAME
|
||||
|
||||
esmith::util::ldap - wrappers for ldap commands
|
||||
|
||||
=head1 SYNOPSIS
|
||||
|
||||
use esmith::util::ldap;
|
||||
|
||||
|
||||
=head1 DESCRIPTION
|
||||
|
||||
This is for common functions that would normally require a complete setting
|
||||
to bind and acces localhost LDAP server in order to read, add or modify entries
|
||||
|
||||
It is mostly a set of wrappers based on Net::LDAP.
|
||||
If you find yourself writing a ldap related function, consider putting it
|
||||
in here.
|
||||
|
||||
|
||||
=head2 Functions
|
||||
|
||||
These may be pure Perl functions or they may well just be wrappers
|
||||
around Net::LDAP.
|
||||
|
||||
Each can be imported on request.
|
||||
|
||||
=over 4
|
||||
|
||||
=begin testing
|
||||
#TODO
|
||||
=end testing
|
||||
|
||||
=head2 new()
|
||||
Initiate the perl object and binds to SME Server localhost ldap
|
||||
|
||||
=cut
|
||||
|
||||
sub new {
|
||||
my $self = shift;
|
||||
my $obj = bless {}, $self;
|
||||
my $c = esmith::ConfigDB->open_ro || die "Couldn't open config db\n";
|
||||
my $a = esmith::AccountsDB->open_ro || die "Couldn't open accounts db\n";
|
||||
|
||||
# prepare LDAP bind ; Fail safe : if not root can not read password file !
|
||||
my $pw = esmith::util::LdapPassword();
|
||||
my $base = $self->base;
|
||||
|
||||
$obj = Net::LDAP->new('localhost')
|
||||
or die "$@";
|
||||
|
||||
$obj->bind(
|
||||
dn => "cn=root,$base",
|
||||
password => $pw
|
||||
);
|
||||
return bless $obj, $self;
|
||||
};
|
||||
|
||||
=pod
|
||||
|
||||
=head2 base()
|
||||
|
||||
Display base for ldap search or other usage
|
||||
e.g. ou=domain,ou=org
|
||||
|
||||
=cut
|
||||
|
||||
sub base {
|
||||
my $self = shift;
|
||||
my $c = esmith::ConfigDB->open_ro || die "Couldn't open config db\n";
|
||||
return esmith::util::ldapBase ($domain);
|
||||
}
|
||||
|
||||
=head2 ldapgroup($group{})
|
||||
Check if group is in ldap:
|
||||
- if not it calls addgroup
|
||||
- if yes it calls modgroup
|
||||
It expects as argument output of e-smith account db $account->get($key).
|
||||
It returns whatever addgroup or modgroup will.
|
||||
|
||||
=cut
|
||||
sub ldapgroup {
|
||||
my $self = shift ;
|
||||
my $group = shift;
|
||||
# get $key, this tests if not an account hash and returns 255
|
||||
my $key = $group->key or return 255;
|
||||
# get $type, if not returns 254, could also filter for user,group,system.ibay,machine...
|
||||
my $type = $group->prop('type') or return 254;
|
||||
# check if exists
|
||||
# yes : modgroup
|
||||
# no : addgroup
|
||||
return ($self->ldapexistsgroup($key))? $self->ldapmodgroup($group) : $self->ldapaddgroup($group);
|
||||
}
|
||||
|
||||
=pod
|
||||
|
||||
=head2 ldapaddgroup($group{})
|
||||
|
||||
Insert new group in ldap and return ldap err code if any.
|
||||
It expects as argument output of e-smith account db $account->get($key).
|
||||
From the type, it will extrapolate if we add a real group, an user main group
|
||||
or an ibay group and chose the content to add.
|
||||
|
||||
=cut
|
||||
|
||||
sub ldapaddgroup {
|
||||
my $self = shift ;
|
||||
my $acct = shift;
|
||||
my $base = $self->base;
|
||||
# get $key, this tests if not an account hash and returns 255
|
||||
my $acctName = $acct->key or return 255;
|
||||
# get $type, if not what we want returns 254
|
||||
my $type = $acct->prop('type') or return 254;
|
||||
my $uid = $acct->prop('Uid') ;
|
||||
my $gid = $acct->prop('Gid') || $uid; # this is a user group
|
||||
# create the hash to submit with values common to all
|
||||
my %attrs = (
|
||||
"cn"=> $acctName,
|
||||
"gidNumber"=> $gid,
|
||||
"objectClass" => [ 'posixGroup', 'mailboxRelatedObject'],
|
||||
);
|
||||
if ($type eq "group") {
|
||||
$attrs{'description'} = $self->stringToASCII($acct->prop('Description') || $acctName );
|
||||
$attrs{'mail'} = "$acctName\@$domain";
|
||||
}
|
||||
if ($type eq "ibay") {
|
||||
$attrs{'description'} = $self->stringToASCII($acct->prop('Name') || $acctName );
|
||||
#$attrs{'mail'} = "$acctName\@$domain";# we might want to set email for ibay there?
|
||||
$attrs{'objectClass'} = ['posixGroup'];
|
||||
}
|
||||
if ($type eq "machine") {
|
||||
$attrs{'objectClass'} = ['posixGroup'];
|
||||
}
|
||||
# Create the group in ldap
|
||||
my $result = $self->add("cn=$acctName,ou=Groups,$base",
|
||||
attrs => [ %attrs ]);
|
||||
return $result->code
|
||||
}
|
||||
|
||||
=pod
|
||||
|
||||
=head2 ldapmodgroup($group{})
|
||||
|
||||
It modifies the group in ldap and return ldap err code if any.
|
||||
It expects as argument output of e-smith account db $account->get($key).
|
||||
It is assumed the group exists, please use ldapgroup() as failsafe. Before altering,
|
||||
ldap content, it will first check that the content has change to avoid unnecessary
|
||||
ldap write access.
|
||||
|
||||
=cut
|
||||
|
||||
sub ldapmodgroup {
|
||||
my $self = shift ;
|
||||
#get variables an sanitize
|
||||
my $acct = shift;
|
||||
my $base = $self->base;
|
||||
# get $key, this tests if not an account hash and returns 255
|
||||
my $acctName = $acct->key or return 255;
|
||||
# get $type, if not what we want returns 254
|
||||
my $type = $acct->prop('type') or return 254;
|
||||
my $gid = $acct->prop('Gid') or return 253;
|
||||
# create the hash to submit with values common to all
|
||||
my %attrs = (
|
||||
"cn"=> [$acctName],
|
||||
"gidNumber"=> [$gid],
|
||||
);
|
||||
if ($type eq "group") {
|
||||
$attrs{'description'} = [ $self->stringToASCII($acct->prop('Description') || $acctName ) ];
|
||||
$attrs{'mail'} = [ "$acctName\@$domain" ];
|
||||
}
|
||||
if ($type eq "ibay") {
|
||||
$attrs{'description'} = [ $self->stringToASCII($acct->prop('Name') || $acctName ) ] ;
|
||||
#$attrs{'mail'} = [ "$acctName\@$domain" ];
|
||||
}
|
||||
# if type user we add nothing
|
||||
#get current content
|
||||
#list attributes
|
||||
my $result;
|
||||
my @list = keys %attrs;
|
||||
$result = $self->search ( base => "cn=$acctName,ou=Groups,$base",
|
||||
filter => "(objectClass=*)",
|
||||
attrs => [ @list ]
|
||||
);
|
||||
my $href = $result->as_struct;
|
||||
my @arrayOfDNs = keys %$href;
|
||||
$href = $$href{$arrayOfDNs[0]};
|
||||
# filter out fields without changes
|
||||
for my $field (@list){
|
||||
delete($attrs{$field}) if ( defined($href->{lc($field)}) and $href->{lc($field)}[0] eq $attrs{$field}[0]);
|
||||
}
|
||||
# return if nothing to change
|
||||
return 0 unless ( %attrs);
|
||||
#use replace for any change
|
||||
$result = $self->modify("cn=$acctName,ou=Groups,$base",
|
||||
replace => %attrs
|
||||
);
|
||||
return $result->code;
|
||||
}
|
||||
|
||||
=pod
|
||||
|
||||
=head2 ldapsetgroupmembers($groupName,\@groupMembers)
|
||||
|
||||
will set all members in array to this group.
|
||||
=cut
|
||||
|
||||
sub ldapsetgroupmembers {
|
||||
my $self = shift ;
|
||||
my $groupName = shift;
|
||||
my $base = $self->base;
|
||||
my $groupMembers_ref = shift;
|
||||
my @groupMembers = @{ $groupMembers_ref };
|
||||
my $arrSize = scalar @groupMembers;
|
||||
# add admin, www to group if SME group group, not for ibays,user,computers dedicated group
|
||||
my $a = esmith::AccountsDB->open_ro || die "Couldn't open accounts db\n";
|
||||
push @groupMembers, 'admin', 'www' if ( $a->get($groupName) and $a->get($groupName)->prop("type") eq "group");
|
||||
#remove duplicates
|
||||
@groupMembers = uniq @groupMembers;
|
||||
#TODO check that we are not sending empty array
|
||||
#TODO check that it actually needs updating to avoid write access
|
||||
my $result = $self->modify("cn=$groupName,ou=Groups,$base",
|
||||
replace => {
|
||||
"memberUid"=> \@groupMembers
|
||||
});
|
||||
return $result->code;
|
||||
}
|
||||
|
||||
=pod
|
||||
|
||||
=head2 ldapaddgroupmembers($groupName,\@groupMembers)
|
||||
|
||||
will add members in array to this group. not removing existing
|
||||
members. will return code 20 if one exist.
|
||||
=cut
|
||||
|
||||
sub ldapaddgroupmembers{
|
||||
my $self = shift ;
|
||||
my $groupName = shift;
|
||||
my $base = $self->base;
|
||||
my $groupMembers_ref = shift;
|
||||
my @groupMembers = @{ $groupMembers_ref };
|
||||
my $arrSize = scalar @groupMembers;
|
||||
#TODO check that we are not sending empty array
|
||||
#TODO check that it actually needs updating to avoid write access
|
||||
my $result = $self->modify("cn=$groupName,ou=Groups,$base",
|
||||
add => {
|
||||
"memberUid"=> \@groupMembers
|
||||
});
|
||||
return $result->code;
|
||||
}
|
||||
|
||||
=pod
|
||||
|
||||
=head2 ldapdelgroup($groupName)
|
||||
|
||||
Will delete the group which groupname is provided.
|
||||
Returns ldap error code if any.
|
||||
|
||||
=cut
|
||||
|
||||
sub ldapdelgroup {
|
||||
my $self = shift ;
|
||||
my $groupName = shift;
|
||||
my $base = $self->base;
|
||||
my $result = $self->delete("cn=$groupName,ou=Groups,$base");
|
||||
return $result->code;
|
||||
}
|
||||
|
||||
=pod
|
||||
|
||||
=head2 ldapexistsgroup($groupName)
|
||||
|
||||
Will check if group exists in ldap.
|
||||
Returns 0 if not, and 1 if it does.
|
||||
|
||||
=cut
|
||||
|
||||
sub ldapexistsgroup {
|
||||
my $self = shift ;
|
||||
my $groupName = shift;
|
||||
my $base = $self->base;
|
||||
my $result = $self->search ( base => "cn=$groupName,ou=Groups,$base",
|
||||
filter => "(objectClass=*)",
|
||||
attrs => ["uid"]
|
||||
);
|
||||
return ($result->code)? 0:1;
|
||||
}
|
||||
|
||||
=head2 ldapuser($user{})
|
||||
Check if user is in ldap:
|
||||
- if not it calls ldapadduser
|
||||
- if yes it calls ldapmoduser
|
||||
It expects as argument output of e-smith account db $account->get($key).
|
||||
It returns whatever ldapadduser or ldapmoduser will.
|
||||
|
||||
=cut
|
||||
|
||||
sub ldapuser {
|
||||
my $self = shift ;
|
||||
my $user = shift;
|
||||
# get $key, this tests if not an account hash and returns 255
|
||||
my $key = $user->key or return 255;
|
||||
# get $type, if not what we want returns 254, we could also filter forallowed type
|
||||
my $type = $user->prop('type') or return 254;
|
||||
# check if exists
|
||||
# yes : ldapmodgroup
|
||||
# no : ldapaddgroup
|
||||
return ($self->ldapexistsuser($key))? $self->ldapmoduser($user) : $self->ldapadduser($user);
|
||||
}
|
||||
|
||||
=pod
|
||||
|
||||
=head2 ldapadduser($user{})
|
||||
|
||||
Insert new user in ldap and return ldap err code if any.
|
||||
It expects as argument output of e-smith account db $account->get($key).
|
||||
From the type, it will extrapolate if we add a real user, a dummy group user
|
||||
or a dummy ibay group and chose the content to add.
|
||||
|
||||
=cut
|
||||
|
||||
sub ldapadduser {
|
||||
my $self = shift;
|
||||
#check if posixAccount or dummy for group/Machine/ibay
|
||||
my $acct = shift;
|
||||
my $base = $self->base;
|
||||
# get $key, this tests if not an account hash and returns 255
|
||||
my $acctName = $acct->key or return 255;
|
||||
# get $type, if not what we want returns 254
|
||||
my $type = $acct->prop('type') or return 254;
|
||||
my $uid = $acct->prop('Uid') or return 253;
|
||||
my $gid = $acct->prop('Gid') || $uid ;
|
||||
my $first = $self->stringToASCII($acct->prop('FirstName')) || '';
|
||||
my $last = $self->stringToASCII($acct->prop('LastName')) || '';
|
||||
my $phone = $self->stringToASCII($acct->prop('Phone')) || '';
|
||||
my $company = $self->stringToASCII($acct->prop('Company')) || '';
|
||||
my $dept = $self->stringToASCII($acct->prop('Dept')) || '';
|
||||
my $city = $self->stringToASCII($acct->prop('City')) || '';
|
||||
my $street = $acct->prop('Street') || '';
|
||||
my $shell = $acct->prop('Shell') || '/usr/bin/false';
|
||||
|
||||
# create the hash to submit with values common to all
|
||||
my %attrs = (
|
||||
"uidNumber" => $uid,
|
||||
"gidNumber"=> $gid,
|
||||
"objectClass" => [ 'inetOrgPerson', 'posixAccount', 'shadowAccount' ],
|
||||
"homeDirectory" => "/home/e-smith/files/users/$acctName",
|
||||
"loginShell" => "$shell",
|
||||
"shadowExpire" => -1,
|
||||
"shadowFlag" => 134538308,
|
||||
"shadowInactive" => -1,
|
||||
"shadowLastChange" => 15997,
|
||||
"shadowMax" => 99999,
|
||||
"shadowMin" => -1,
|
||||
"shadowWarning"=> 7,
|
||||
'userPassword' => "{crypt}!*"
|
||||
);
|
||||
if ($type eq "user") {
|
||||
$attrs{"cn"}= "$first $last";
|
||||
$attrs{"givenName"}= "$first";
|
||||
$attrs{"sn"}= "$last";
|
||||
$attrs{"displayName"}= "$first $last";
|
||||
$attrs{"mail"}= "$acctName\@$domain";
|
||||
$attrs{"telephoneNumber"}= $phone;
|
||||
$attrs{"o"}= $company;
|
||||
$attrs{"ou"}= $dept;
|
||||
$attrs{"l"}= $city;
|
||||
$attrs{"street"}= $street;
|
||||
} elsif ($type eq "group") {
|
||||
$attrs{"objectClass"}=['account', 'posixAccount', 'shadowAccount'];
|
||||
$attrs{"cn"}=$acctName;
|
||||
$attrs{"homeDirectory"} = "/home/e-smith";
|
||||
$attrs{"loginShell"} = "/bin/false";
|
||||
} elsif ($type eq "ibay") {
|
||||
my $Name = $self->stringToASCII($acct->prop('Name')) || $acctName;
|
||||
$attrs{"objectClass"}=['account', 'posixAccount', 'shadowAccount'];
|
||||
$attrs{"cn"}=$Name;
|
||||
$attrs{"homeDirectory"} = "/home/e-smith/files/ibays/$acctName";
|
||||
$attrs{"loginShell"} = "/bin/false";
|
||||
}
|
||||
# Create the group in ldap
|
||||
my $result = $self->add("uid=$acctName,ou=Users,$base",
|
||||
attrs => [ %attrs ]);
|
||||
return $result->code
|
||||
}
|
||||
|
||||
=pod
|
||||
|
||||
=head2 ldapmoduser($user{})
|
||||
|
||||
Updates user.
|
||||
It modifies the user in ldap and return ldap err code if any.
|
||||
It expects as argument output of e-smith account db $account->get($key).
|
||||
It is assumed the user exists, please use ldapuser() as failsafe. Before altering,
|
||||
ldap content, it will first check that the content has change to avoid unnecessary
|
||||
ldap write access.
|
||||
|
||||
=cut
|
||||
|
||||
sub ldapmoduser {
|
||||
my $self = shift ;
|
||||
my $acct = shift;
|
||||
my $base = $self->base;
|
||||
# get $key, this tests if not an account hash and returns 255
|
||||
my $acctName = $acct->key or return 255;
|
||||
# get $type, if not what we want returns 254
|
||||
my $type = $acct->prop('type') or return 254;
|
||||
my $uid = $acct->prop('Uid') or return 253;
|
||||
my $gid = $acct->prop('Gid') || $uid;
|
||||
my $first = $self->stringToASCII($acct->prop('FirstName')) || '';
|
||||
my $last = $self->stringToASCII($acct->prop('LastName')) || '';
|
||||
my $phone = $self->stringToASCII($acct->prop('Phone')) || '';
|
||||
my $company = $self->stringToASCII($acct->prop('Company')) || '';
|
||||
my $dept = $self->stringToASCII($acct->prop('Dept')) || '';
|
||||
my $city = $self->stringToASCII($acct->prop('City')) || '';
|
||||
my $street = $self->stringToASCII($acct->prop('Street')) || '';
|
||||
my $shell = $acct->prop('Shell') || '/usr/bin/false';
|
||||
# create the hash to submit with values common to all
|
||||
my %attrs = (
|
||||
"uidNumber" => $uid,
|
||||
"gidNumber"=> $gid ,
|
||||
"homeDirectory" => "/home/e-smith/files/users/$acctName",
|
||||
"loginShell" => "$shell",
|
||||
);
|
||||
if ( $type eq "user") {
|
||||
$attrs{"cn"}= "$first $last";
|
||||
$attrs{"givenName"}=$first;
|
||||
$attrs{"mail"}="$acctName\@$domain";
|
||||
$attrs{"sn"}=$last;
|
||||
$attrs{"telephoneNumber"}=$phone;
|
||||
$attrs{"o"}= $company;
|
||||
$attrs{"ou"}=$dept;
|
||||
$attrs{"l"}=$city;
|
||||
$attrs{"street"}=$street;
|
||||
$attrs{"displayName"}= "$first $last";
|
||||
} elsif ($type eq "group") {
|
||||
$attrs{"homeDirectory"}="/home/e-smith/";
|
||||
$attrs{"loginShell"} = "/bin/false";
|
||||
$attrs{"cn"}=$acctName;
|
||||
} elsif ($type eq "ibay") {
|
||||
my $Name = $self->stringToASCII($acct->prop('Name')) || $acctName;
|
||||
$attrs{"cn"}=$Name;
|
||||
$attrs{"homeDirectory"} = "/home/e-smith/files/ibays/$acctName";
|
||||
$attrs{"loginShell"} = "/bin/false";
|
||||
}
|
||||
#get current content
|
||||
#list attributes
|
||||
my $result;
|
||||
my @list = keys %attrs;
|
||||
$result = $self->search ( base => "uid=$acctName,ou=Users,$base",
|
||||
filter => "(objectClass=*)",
|
||||
attrs => [ @list ]
|
||||
);
|
||||
my $href = $result->as_struct;
|
||||
my @arrayOfDNs = keys %$href;
|
||||
$href = $$href{$arrayOfDNs[0]};
|
||||
# filter out fields without any change.
|
||||
for my $field (@list){
|
||||
delete($attrs{$field}) if ( defined ($href->{lc($field)}) and $href->{lc($field)}[0] eq $attrs{$field});
|
||||
}
|
||||
# return if nothing changed
|
||||
return 0 unless ( %attrs);
|
||||
# update only if changes
|
||||
$result = $self->modify("uid=$acctName,ou=Users,$base",
|
||||
replace => [ %attrs]
|
||||
);
|
||||
return $result->code;
|
||||
}
|
||||
|
||||
|
||||
=pod
|
||||
|
||||
=head2 ldaplockuser($username)
|
||||
|
||||
Lock a user password
|
||||
|
||||
=cut
|
||||
|
||||
sub ldaplockuser {
|
||||
my $self = shift ;
|
||||
my $userName = shift;
|
||||
my $base = $self->base;
|
||||
my $result = $self->modify("uid=$userName,ou=Users,$base",
|
||||
replace => { 'userPassword' => "{crypt}!*"});
|
||||
return $result->code;
|
||||
}
|
||||
|
||||
=pod
|
||||
|
||||
=head2 ldapdeluser($userName)
|
||||
|
||||
Will delete the user which username is provided.
|
||||
Returns ldap error code if any.
|
||||
|
||||
=cut
|
||||
|
||||
sub ldapdeluser {
|
||||
my $self = shift ;
|
||||
my $userName = shift;
|
||||
my $base = $self->base;
|
||||
my $result = $self->delete("uid=$userName,ou=Users,$base");
|
||||
return $result->code;
|
||||
}
|
||||
|
||||
=pod
|
||||
|
||||
=head2 ldapexistsuser($userName)
|
||||
|
||||
Checks if user does exists in ldap.
|
||||
|
||||
=cut
|
||||
|
||||
sub ldapexistsuser {
|
||||
my $self = shift ;
|
||||
my $userName = shift;
|
||||
my $base = $self->base;
|
||||
my $result = $self->search ( base => "uid=$userName,ou=Users,$base",
|
||||
filter => "(objectClass=*)",
|
||||
attrs => ["uid"]
|
||||
);
|
||||
return ($result->code)? 0:1;
|
||||
}
|
||||
|
||||
|
||||
# TODO machine account add modify delete
|
||||
|
||||
=pod
|
||||
|
||||
=head2 ldapaddmachine($m{})
|
||||
|
||||
Insert new Machine in ldap and return ldap err code if any.
|
||||
It expects as argument output of e-smith account db $account->get($key).
|
||||
|
||||
=cut
|
||||
|
||||
sub ldapaddmachine {
|
||||
my $self = shift ;
|
||||
my $acct = shift;
|
||||
my $machineName = $acct->key or return 253;
|
||||
my $uid = $acct->prop('Uid') or return 253;
|
||||
return 253 unless ($acct->prop('type') eq "machine");
|
||||
my $gid = $acct->prop('Gid') || $uid;
|
||||
my $base = $self->base;
|
||||
my $result = $self->add("uid=$machineName,ou=Computers,$base",
|
||||
attrs => [
|
||||
"uidNumber" => $uid,
|
||||
"gidNumber" => $gid,
|
||||
"cn" => "Hostname account for $machineName",
|
||||
"objectClass" => [ 'account','posixAccount', 'shadowAccount'],
|
||||
"homeDirectory" => "/noexistingpath",
|
||||
"loginShell" => "/bin/false",
|
||||
"shadowExpire" => -1,
|
||||
"shadowFlag" => 134538308,
|
||||
"shadowInactive" => -1,
|
||||
"shadowLastChange" => 15997,
|
||||
"shadowMax" => 99999,
|
||||
"shadowMin" => -1,
|
||||
"shadowWarning"=> 7,
|
||||
"userPassword" => "{crypt}!*"
|
||||
]
|
||||
);
|
||||
return $result->code
|
||||
}
|
||||
|
||||
=pod
|
||||
|
||||
=head2 ldapdelmachine($machineName)
|
||||
|
||||
Will delete the user which machinename is provided.
|
||||
Returns ldap error code if any.
|
||||
|
||||
=cut
|
||||
|
||||
sub ldapdelmachine {
|
||||
my $self = shift ;
|
||||
my $machineName = shift;
|
||||
my $base = $self->base;
|
||||
my $result = $self->delete("uid=$machineName,ou=Computers,$base");
|
||||
return $result->code;
|
||||
}
|
||||
|
||||
|
||||
|
||||
=pod
|
||||
|
||||
=head2 ldapread($entry)
|
||||
|
||||
Will returns all the field of an existing entry in ldap.
|
||||
Should provides something like "uid=john,ou=Users" or
|
||||
"cn=groupname,ou=Groups".
|
||||
This is an easy way of verifying all is good in db.
|
||||
|
||||
=cut
|
||||
|
||||
sub ldapread {
|
||||
my $self = shift ;
|
||||
my $entry = shift ;
|
||||
my $base = $self->base;
|
||||
|
||||
my $result = $self->search ( base => "$entry,$base",
|
||||
filter => "(objectClass=*)",
|
||||
attrs => [ ]
|
||||
);
|
||||
return $result->code if $result->error > 0;
|
||||
my $href = $result->as_struct;
|
||||
# get an array of the DN names
|
||||
my @arrayOfDNs = keys %$href; # use DN hashes
|
||||
# process each DN using it as a key
|
||||
foreach ( @arrayOfDNs ) {
|
||||
print $_, "\n";
|
||||
my $valref = $$href{$_};
|
||||
# get an array of the attribute names
|
||||
# passed for this one DN.
|
||||
my @arrayOfAttrs = sort keys %$valref; #use Attr hashes
|
||||
my $attrName;
|
||||
foreach $attrName (@arrayOfAttrs) {
|
||||
# skip any binary data: yuck!
|
||||
next if ( $attrName =~ /;binary$/ );
|
||||
# get the attribute value (pointer) using the
|
||||
# attribute name as the hash
|
||||
my $attrVal = @$valref{$attrName};
|
||||
print "\t $attrName: @$attrVal \n";
|
||||
}
|
||||
print "#-------------------------------\n";
|
||||
# End of that DN
|
||||
}
|
||||
}
|
||||
|
||||
=pod
|
||||
|
||||
=head2 stringToASCII($string)
|
||||
|
||||
Will convert srings from UTF8 to ASCII where it is required to be ASCII.
|
||||
|
||||
=cut
|
||||
|
||||
sub stringToASCII {
|
||||
my $self = shift ;
|
||||
my $string = (ref($self) eq "esmith::util::ldap") ? shift : $self;
|
||||
return unless ($string);
|
||||
my $decomposed = NFKD( unidecode($string) );
|
||||
$decomposed =~ s/\p{NonspacingMark}//g;
|
||||
return $decomposed;
|
||||
}
|
||||
|
@@ -6,7 +6,7 @@ Summary: smeserver server and gateway - library module
|
||||
%define name smeserver-lib
|
||||
Name: %{name}
|
||||
%define version 11.0.0
|
||||
%define release 5
|
||||
%define release 13
|
||||
Version: %{version}
|
||||
Release: %{release}%{?dist}
|
||||
License: Artistic
|
||||
@@ -33,8 +33,32 @@ Provides: e-smith-lib
|
||||
smeserver server and gateway software - library module.
|
||||
|
||||
%changelog
|
||||
* Wed Apr 17 2024 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-5.sme
|
||||
- move event e-smith-lib-update to smeserver-lib-update
|
||||
* Sun Jun 08 2025 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-13.sme
|
||||
- add esmith::AccountsDB::UTF8 support [SME: 13029]
|
||||
also esmith::DomainsDB::UTF8, esmith::HostsDB::UTF8,
|
||||
esmith::NetworksDB::UTF8
|
||||
- improve esmith::ConfigDB::UTF8 support [SME: 13028]
|
||||
|
||||
* Wed May 28 2025 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-12.sme
|
||||
- prevent service handling in bootstrap and post-upgrade [SME: 13002]
|
||||
|
||||
* Thu Feb 20 2025 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-11.sme
|
||||
- remove pptpd reference [SME: 11417]
|
||||
- move template-begin-ini [SME: 12211]
|
||||
- passwordstrength{length} default to 12 [SME: 12383]
|
||||
- more password granularity (none,normal,intermediate,strong) [SME: 12384]
|
||||
|
||||
* Thu Dec 12 2024 Brian Read <brianr@koozali.org> 11.0.0-9.sme
|
||||
- add in getmyip [SME: 12810 ]
|
||||
|
||||
* Tue Nov 12 2024 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-8.sme
|
||||
- fix Use of uninitialized value [SME: 12760]
|
||||
|
||||
* Tue Aug 13 2024 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-7.sme
|
||||
- esmith::util:ldap initial commit [SME: 12719]
|
||||
|
||||
* Wed Apr 17 2024 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-6.sme
|
||||
- rename update event
|
||||
|
||||
* Sat Apr 13 2024 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-4.sme
|
||||
- remove whiptail [SME: 8275]
|
||||
|
Reference in New Issue
Block a user