10 Commits

Author SHA1 Message Date
2710d9f93d * Thu Feb 20 2025 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-11.sme
- remove pptpd reference [SME: 11417]
- move template-begin-ini [SME: 12211]
- passwordstrength{length} default to 12 [SME: 12383]
- more password granularity (none,normal,intermediate,strong) [SME: 12384]
2025-02-21 00:47:17 -05:00
493977906b * Thu Feb 20 2025 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-10.sme
- remove pptpd reference [SME: 11417]
- move template-begin-ini [SME: 12211]
- passwordstrength{length} default to 12 [SME: 12383]
- more password granularity (none,normal,intermediate,strong) [SME: 12384]
2025-02-21 00:04:00 -05:00
95eba03095 Merge branch 'master' of https://src.koozali.org/smeserver/smeserver-lib 2024-12-12 18:47:27 +00:00
f12ac8900e * Thu Dec 12 2024 Brian Read <brianr@koozali.org> 11.0.0-9.sme
- add in getmyip [SME: 12810 ]
2024-12-12 18:46:52 +00:00
d3486008d1 Add in getmyip - used by Letsencrypt SManager panel 2024-12-12 17:36:25 +01:00
97d1058b70 Add *.bak to .gitignore 2024-11-12 19:20:04 +00:00
03edae6bee * Tue Nov 12 2024 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-8.sme
- fix Use of uninitialized value [SME: 12760]
2024-11-12 12:10:36 -05:00
1b0024751e Update README with specific Bugzilla links with status options 2024-10-27 14:28:50 +00:00
a645d4e717 Update readme bugzilla link to show all outstanding bugs 2024-10-27 12:12:10 +00:00
2a92781704 * Tue Aug 13 2024 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-7.sme
- esmith::util:ldap initial commit [SME: 12719]
2024-08-13 16:43:10 -04:00
9 changed files with 794 additions and 7 deletions

1
.gitignore vendored
View File

@@ -2,3 +2,4 @@
*.log
*spec-20*
*.tar.xz
*.bak

View File

@@ -6,7 +6,14 @@ SMEServer Koozali developed git repo for smeserver-lib smeserver
<br />https://wiki.koozali.org/
## Bugzilla
Show list of outstanding bugs: [here](https://bugs.koozali.org/buglist.cgi?component=smeserver-lib&product=SME%20Server%2010.X&query_format=advanced&limit=0&bug_status=UNCONFIRMED&bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&bug_status=CONFIRMED)\
Show list of outstanding bugs:
[All](https://bugs.koozali.org/buglist.cgi?action=wrap&bug_status=UNCONFIRMED&bug_status=CONFIRMED&bug_status=NEEDINFO&bug_status=IN_PROGRESS&bug_status=RESOLVED&bug_status=VERIFIED&cf_package=smeserver-lib&classification=SME+Server&list_id=105756&order=changeddate+DESC%2Ccomponent%2Cpriority%2Cbug_severity&query_format=advanced)
[Confirmed](https://bugs.koozali.org/buglist.cgi?action=wrap&bug_status=CONFIRMED&cf_package=smeserver-lib&classification=SME+Server&order=changeddate+DESC%2Ccomponent%2Cpriority%2Cbug_severity&query_format=advanced)
[Unconfirmed](https://bugs.koozali.org/buglist.cgi?action=wrap&bug_status=UNCONFIRMED&cf_package=smeserver-lib&classification=SME+Server&order=changeddate+DESC%2Ccomponent%2Cpriority%2Cbug_severity&query_format=advanced)
[Need info](https://bugs.koozali.org/buglist.cgi?action=wrap&bug_status=NEEDINFO&cf_package=smeserver-lib&classification=SME+Server&order=changeddate+DESC%2Ccomponent%2Cpriority%2Cbug_severity&query_format=advanced)
[In progress](https://bugs.koozali.org/buglist.cgi?action=wrap&bug_status=IN_PROGRESS&cf_package=smeserver-lib&classification=SME+Server&order=changeddate+DESC%2Ccomponent%2Cpriority%2Cbug_severity&query_format=advanced)
[Resolved](https://bugs.koozali.org/buglist.cgi?action=wrap&bug_status=RESOLVED&cf_package=smeserver-lib&classification=SME+Server&order=changeddate+DESC%2Ccomponent%2Cpriority%2Cbug_severity&query_format=advanced)
[Verified](https://bugs.koozali.org/buglist.cgi?action=wrap&bug_status=VERIFIED&cf_package=smeserver-lib&classification=SME+Server&order=changeddate+DESC%2Ccomponent%2Cpriority%2Cbug_severity&query_format=advanced)
And a list of outstanding Legacy bugs: (e-smith-lib) [here](https://bugs.koozali.org/buglist.cgi?component=e-smith-lib&product=SME%20Server%2010.X&query_format=advanced&limit=0&bug_status=UNCONFIRMED&bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&bug_status=CONFIRMED)
## Description

View File

@@ -1 +0,0 @@
sme10

View File

@@ -0,0 +1,11 @@
;------------------------------------------------------------
; !!DO NOT MODIFY THIS FILE!!
;
; Manual changes will be lost when this file is regenerated.
;
; Please read the developer's guide, which is available
; at http://www.contribs.org/development/
;
; Copyright (C) 1999-2006 Mitel Networks Corporation
;------------------------------------------------------------

View File

@@ -87,7 +87,6 @@ ntpd=service|InitscriptOrder|55|status|disabled
php=service|status|enabled
popd=service|access|private|status|enabled
pppoe=service|DemandIdleTime|no|InitscriptOrder|57|SynchronousPPP|no|status|disabled
pptpd=service|sessions|10|status|disabled
qmail=service|InitscriptOrder|80|status|enabled
random=service|InitscriptOrder|20|status|enabled
rsyslog=service|InitscriptOrder|05|status|enabled
@@ -99,5 +98,6 @@ squid=service|InitscriptOrder|90|status|enabled
sshd=service|InitscriptOrder|85|PasswordAuthentication|yes|PermitRootLogin|yes|access|private|status|enabled
sync=service|Host|service.e-smith.com|LastId|0|SuccessId|0|SyncFrequency|1|SyncMinute|57|status|disabled
telnet=service|access|private|status|disabled
vpn=configuration|sessions|10|status|disabled
wibble=42
xinetd=service|InitscriptOrder|50|status|enabled

54
root/sbin/e-smith/getmyip Normal file
View File

@@ -0,0 +1,54 @@
#!/bin/bash
# List of services to query for the public IP
services=(
"ifconfig.me"
"ipinfo.io/ip"
"icanhazip.com"
"api.ipify.org"
"ident.me"
"ip.tyk.nu"
"checkip.amazonaws.com"
"ipecho.net/plain"
"myip.dnsomatic.com"
"ip.seeip.org"
"ipapi.co/ip"
"wtfismyip.com/text"
"openident.net/ip"
"ifconfig.co/ip"
)
# Function to shuffle the array of services
shuffle_services() {
local i
for ((i=${#services[@]} - 1; i > 0; i--)); do
local j=$((RANDOM % (i + 1)))
local temp="${services[i]}"
services[i]="${services[j]}"
services[j]="$temp"
done
}
# Function to fetch the public IP address
get_public_ip() {
shuffle_services
for service in "${services[@]}"; do
public_ip=$(curl -s --max-time 5 "$service")
# Check if the curl request was successful and there's a valid IP address
if [[ $? -eq 0 && $public_ip =~ ^[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+$ ]]; then
logger -t public_ip_script "Service used: $service, IP found: $public_ip"
echo "$public_ip"
return
fi
done
# If none of the services returned a valid IP, output an error message
echo "Failed to retrieve public IP using all services." >&2
logger -t public_ip_script "Error: Failed to retrieve public IP using all services."
exit 1
}
# Execute the function
get_public_ip

View File

@@ -556,6 +556,12 @@ for example /etc/passwd, /etc/samba/smbpasswd, etc.
=head2 validatePassword($password, $strength)
Validate Unix password.
length is the minimal password length, default is 12.
strength could be none,normal,intermediate or strong.
- none: only check for length
- normal: upper and lower case letters
- intermediate: upper and lower case letters not positive to cracklib
- strong : numbers, letter and special characters not positive to cracklib
=cut
@@ -566,14 +572,24 @@ sub validatePassword($$)
$strength ||= 'normal';
my $length = 12;
my $db = esmith::ConfigDB->open() || undef;
my $sysconfig = $db->get("passwordstrength")|| undef if $db ;
$length = $sysconfig->prop("length") || "12" if $sysconfig;
my $reason = 'ok';
$reason = 'it is too short' unless (length($password) > 6);
$reason = 'it is too short' unless (length($password) >= $length);
return $reason if ($reason ne 'ok' || $strength eq 'none');
$reason = 'it does not contain numbers' if (not $password =~ /\d/);
$reason = 'it does not contain uppercase characters' if (not $password =~ /[A-Z]/);
$reason = 'it does not contain lowercase characters' if (not $password =~ /[a-z]/);
$reason = 'it does not contain special characters' if (not $password =~ /\W|_/);
return $reason if ($reason ne 'ok' || $strength eq 'normal');
# we are left here with intermediate and strong
if ($strength eq 'strong') {
$reason = 'it does not contain numbers' if (not $password =~ /\d/);
$reason = 'it does not contain special characters' if (not $password =~ /\W|_/);
}
return $reason if ($reason ne 'ok' && $strength eq 'strong');
if ( -f '/usr/lib64/cracklib_dict.pwd' ) {

View File

@@ -0,0 +1,684 @@
#----------------------------------------------------------------------
# Copyright (C) 2024 Koozali Foundation inc.
# This program is free software; you can redistribute it and/or
# modify it under the same terms as Perl itself.
#----------------------------------------------------------------------
package esmith::util::ldap;
use strict;
use Errno;
use esmith::ConfigDB;
use esmith::AccountsDB;
use esmith::util;
use utf8;
use Encode;
use Unicode::Normalize;
use Text::Unidecode;
use Net::LDAP;
use List::MoreUtils qw(uniq);
require Exporter;
our @ISA = qw(Exporter Net::LDAP);
# Exporting as default.
our @EXPORT = qw(stringToASCII ldapgroup ldapdelgroup ldapsetgroupmembers ldapaddgroupmembers ldapuser ldapdeluser ldaplockuser ldapaddmachine ldapdelmachine);
# Exporting on demand basis.
our @EXPORT_OK = qw(ldapaddgroup ldapmodgroup ldapadduser ldapmoduser ldapexistsgroup ldapexistsuser ldapread);
#TODO:
#=for testing
#use_ok('esmith::util::system', 'killall', 'rsync', 'rsync_ssh');
my $c = esmith::ConfigDB->open_ro || die "Couldn't open config db\n";
our $domain = $c->get('DomainName')
|| die("Couldn't determine domain name");
$domain = $domain->value;
=pod
=head1 NAME
esmith::util::ldap - wrappers for ldap commands
=head1 SYNOPSIS
use esmith::util::ldap;
=head1 DESCRIPTION
This is for common functions that would normally require a complete setting
to bind and acces localhost LDAP server in order to read, add or modify entries
It is mostly a set of wrappers based on Net::LDAP.
If you find yourself writing a ldap related function, consider putting it
in here.
=head2 Functions
These may be pure Perl functions or they may well just be wrappers
around Net::LDAP.
Each can be imported on request.
=over 4
=begin testing
#TODO
=end testing
=head2 new()
Initiate the perl object and binds to SME Server localhost ldap
=cut
sub new {
my $self = shift;
my $obj = bless {}, $self;
my $c = esmith::ConfigDB->open_ro || die "Couldn't open config db\n";
my $a = esmith::AccountsDB->open_ro || die "Couldn't open accounts db\n";
# prepare LDAP bind ; Fail safe : if not root can not read password file !
my $pw = esmith::util::LdapPassword();
my $base = $self->base;
$obj = Net::LDAP->new('localhost')
or die "$@";
$obj->bind(
dn => "cn=root,$base",
password => $pw
);
return bless $obj, $self;
};
=pod
=head2 base()
Display base for ldap search or other usage
e.g. ou=domain,ou=org
=cut
sub base {
my $self = shift;
my $c = esmith::ConfigDB->open_ro || die "Couldn't open config db\n";
return esmith::util::ldapBase ($domain);
}
=head2 ldapgroup($group{})
Check if group is in ldap:
- if not it calls addgroup
- if yes it calls modgroup
It expects as argument output of e-smith account db $account->get($key).
It returns whatever addgroup or modgroup will.
=cut
sub ldapgroup {
my $self = shift ;
my $group = shift;
# get $key, this tests if not an account hash and returns 255
my $key = $group->key or return 255;
# get $type, if not returns 254, could also filter for user,group,system.ibay,machine...
my $type = $group->prop('type') or return 254;
# check if exists
# yes : modgroup
# no : addgroup
return ($self->ldapexistsgroup($key))? $self->ldapmodgroup($group) : $self->ldapaddgroup($group);
}
=pod
=head2 ldapaddgroup($group{})
Insert new group in ldap and return ldap err code if any.
It expects as argument output of e-smith account db $account->get($key).
From the type, it will extrapolate if we add a real group, an user main group
or an ibay group and chose the content to add.
=cut
sub ldapaddgroup {
my $self = shift ;
my $acct = shift;
my $base = $self->base;
# get $key, this tests if not an account hash and returns 255
my $acctName = $acct->key or return 255;
# get $type, if not what we want returns 254
my $type = $acct->prop('type') or return 254;
my $uid = $acct->prop('Uid') ;
my $gid = $acct->prop('Gid') || $uid; # this is a user group
# create the hash to submit with values common to all
my %attrs = (
"cn"=> $acctName,
"gidNumber"=> $gid,
"objectClass" => [ 'posixGroup', 'mailboxRelatedObject'],
);
if ($type eq "group") {
$attrs{'description'} = $self->stringToASCII($acct->prop('Description') || $acctName );
$attrs{'mail'} = "$acctName\@$domain";
}
if ($type eq "ibay") {
$attrs{'description'} = $self->stringToASCII($acct->prop('Name') || $acctName );
#$attrs{'mail'} = "$acctName\@$domain";# we might want to set email for ibay there?
$attrs{'objectClass'} = ['posixGroup'];
}
if ($type eq "machine") {
$attrs{'objectClass'} = ['posixGroup'];
}
# Create the group in ldap
my $result = $self->add("cn=$acctName,ou=Groups,$base",
attrs => [ %attrs ]);
return $result->code
}
=pod
=head2 ldapmodgroup($group{})
It modifies the group in ldap and return ldap err code if any.
It expects as argument output of e-smith account db $account->get($key).
It is assumed the group exists, please use ldapgroup() as failsafe. Before altering,
ldap content, it will first check that the content has change to avoid unnecessary
ldap write access.
=cut
sub ldapmodgroup {
my $self = shift ;
#get variables an sanitize
my $acct = shift;
my $base = $self->base;
# get $key, this tests if not an account hash and returns 255
my $acctName = $acct->key or return 255;
# get $type, if not what we want returns 254
my $type = $acct->prop('type') or return 254;
my $gid = $acct->prop('Gid') or return 253;
# create the hash to submit with values common to all
my %attrs = (
"cn"=> [$acctName],
"gidNumber"=> [$gid],
);
if ($type eq "group") {
$attrs{'description'} = [ $self->stringToASCII($acct->prop('Description') || $acctName ) ];
$attrs{'mail'} = [ "$acctName\@$domain" ];
}
if ($type eq "ibay") {
$attrs{'description'} = [ $self->stringToASCII($acct->prop('Name') || $acctName ) ] ;
#$attrs{'mail'} = [ "$acctName\@$domain" ];
}
# if type user we add nothing
#get current content
#list attributes
my $result;
my @list = keys %attrs;
$result = $self->search ( base => "cn=$acctName,ou=Groups,$base",
filter => "(objectClass=*)",
attrs => [ @list ]
);
my $href = $result->as_struct;
my @arrayOfDNs = keys %$href;
$href = $$href{$arrayOfDNs[0]};
# filter out fields without changes
for my $field (@list){
delete($attrs{$field}) if ( defined($href->{lc($field)}) and $href->{lc($field)}[0] eq $attrs{$field}[0]);
}
# return if nothing to change
return 0 unless ( %attrs);
#use replace for any change
$result = $self->modify("cn=$acctName,ou=Groups,$base",
replace => %attrs
);
return $result->code;
}
=pod
=head2 ldapsetgroupmembers($groupName,\@groupMembers)
will set all members in array to this group.
=cut
sub ldapsetgroupmembers {
my $self = shift ;
my $groupName = shift;
my $base = $self->base;
my $groupMembers_ref = shift;
my @groupMembers = @{ $groupMembers_ref };
my $arrSize = scalar @groupMembers;
# add admin, www to group if SME group group, not for ibays,user,computers dedicated group
my $a = esmith::AccountsDB->open_ro || die "Couldn't open accounts db\n";
push @groupMembers, 'admin', 'www' if ( $a->get($groupName) and $a->get($groupName)->prop("type") eq "group");
#remove duplicates
@groupMembers = uniq @groupMembers;
#TODO check that we are not sending empty array
#TODO check that it actually needs updating to avoid write access
my $result = $self->modify("cn=$groupName,ou=Groups,$base",
replace => {
"memberUid"=> \@groupMembers
});
return $result->code;
}
=pod
=head2 ldapaddgroupmembers($groupName,\@groupMembers)
will add members in array to this group. not removing existing
members. will return code 20 if one exist.
=cut
sub ldapaddgroupmembers{
my $self = shift ;
my $groupName = shift;
my $base = $self->base;
my $groupMembers_ref = shift;
my @groupMembers = @{ $groupMembers_ref };
my $arrSize = scalar @groupMembers;
#TODO check that we are not sending empty array
#TODO check that it actually needs updating to avoid write access
my $result = $self->modify("cn=$groupName,ou=Groups,$base",
add => {
"memberUid"=> \@groupMembers
});
return $result->code;
}
=pod
=head2 ldapdelgroup($groupName)
Will delete the group which groupname is provided.
Returns ldap error code if any.
=cut
sub ldapdelgroup {
my $self = shift ;
my $groupName = shift;
my $base = $self->base;
my $result = $self->delete("cn=$groupName,ou=Groups,$base");
return $result->code;
}
=pod
=head2 ldapexistsgroup($groupName)
Will check if group exists in ldap.
Returns 0 if not, and 1 if it does.
=cut
sub ldapexistsgroup {
my $self = shift ;
my $groupName = shift;
my $base = $self->base;
my $result = $self->search ( base => "cn=$groupName,ou=Groups,$base",
filter => "(objectClass=*)",
attrs => ["uid"]
);
return ($result->code)? 0:1;
}
=head2 ldapuser($user{})
Check if user is in ldap:
- if not it calls ldapadduser
- if yes it calls ldapmoduser
It expects as argument output of e-smith account db $account->get($key).
It returns whatever ldapadduser or ldapmoduser will.
=cut
sub ldapuser {
my $self = shift ;
my $user = shift;
# get $key, this tests if not an account hash and returns 255
my $key = $user->key or return 255;
# get $type, if not what we want returns 254, we could also filter forallowed type
my $type = $user->prop('type') or return 254;
# check if exists
# yes : ldapmodgroup
# no : ldapaddgroup
return ($self->ldapexistsuser($key))? $self->ldapmoduser($user) : $self->ldapadduser($user);
}
=pod
=head2 ldapadduser($user{})
Insert new user in ldap and return ldap err code if any.
It expects as argument output of e-smith account db $account->get($key).
From the type, it will extrapolate if we add a real user, a dummy group user
or a dummy ibay group and chose the content to add.
=cut
sub ldapadduser {
my $self = shift;
#check if posixAccount or dummy for group/Machine/ibay
my $acct = shift;
my $base = $self->base;
# get $key, this tests if not an account hash and returns 255
my $acctName = $acct->key or return 255;
# get $type, if not what we want returns 254
my $type = $acct->prop('type') or return 254;
my $uid = $acct->prop('Uid') or return 253;
my $gid = $acct->prop('Gid') || $uid ;
my $first = $self->stringToASCII($acct->prop('FirstName')) || '';
my $last = $self->stringToASCII($acct->prop('LastName')) || '';
my $phone = $self->stringToASCII($acct->prop('Phone')) || '';
my $company = $self->stringToASCII($acct->prop('Company')) || '';
my $dept = $self->stringToASCII($acct->prop('Dept')) || '';
my $city = $self->stringToASCII($acct->prop('City')) || '';
my $street = $acct->prop('Street') || '';
my $shell = $acct->prop('Shell') || '/usr/bin/false';
# create the hash to submit with values common to all
my %attrs = (
"uidNumber" => $uid,
"gidNumber"=> $gid,
"objectClass" => [ 'inetOrgPerson', 'posixAccount', 'shadowAccount' ],
"homeDirectory" => "/home/e-smith/files/users/$acctName",
"loginShell" => "$shell",
"shadowExpire" => -1,
"shadowFlag" => 134538308,
"shadowInactive" => -1,
"shadowLastChange" => 15997,
"shadowMax" => 99999,
"shadowMin" => -1,
"shadowWarning"=> 7,
'userPassword' => "{crypt}!*"
);
if ($type eq "user") {
$attrs{"cn"}= "$first $last";
$attrs{"givenName"}= "$first";
$attrs{"sn"}= "$last";
$attrs{"displayName"}= "$first $last";
$attrs{"mail"}= "$acctName\@$domain";
$attrs{"telephoneNumber"}= $phone;
$attrs{"o"}= $company;
$attrs{"ou"}= $dept;
$attrs{"l"}= $city;
$attrs{"street"}= $street;
} elsif ($type eq "group") {
$attrs{"objectClass"}=['account', 'posixAccount', 'shadowAccount'];
$attrs{"cn"}=$acctName;
$attrs{"homeDirectory"} = "/home/e-smith";
$attrs{"loginShell"} = "/bin/false";
} elsif ($type eq "ibay") {
my $Name = $self->stringToASCII($acct->prop('Name')) || $acctName;
$attrs{"objectClass"}=['account', 'posixAccount', 'shadowAccount'];
$attrs{"cn"}=$Name;
$attrs{"homeDirectory"} = "/home/e-smith/files/ibays/$acctName";
$attrs{"loginShell"} = "/bin/false";
}
# Create the group in ldap
my $result = $self->add("uid=$acctName,ou=Users,$base",
attrs => [ %attrs ]);
return $result->code
}
=pod
=head2 ldapmoduser($user{})
Updates user.
It modifies the user in ldap and return ldap err code if any.
It expects as argument output of e-smith account db $account->get($key).
It is assumed the user exists, please use ldapuser() as failsafe. Before altering,
ldap content, it will first check that the content has change to avoid unnecessary
ldap write access.
=cut
sub ldapmoduser {
my $self = shift ;
my $acct = shift;
my $base = $self->base;
# get $key, this tests if not an account hash and returns 255
my $acctName = $acct->key or return 255;
# get $type, if not what we want returns 254
my $type = $acct->prop('type') or return 254;
my $uid = $acct->prop('Uid') or return 253;
my $gid = $acct->prop('Gid') || $uid;
my $first = $self->stringToASCII($acct->prop('FirstName')) || '';
my $last = $self->stringToASCII($acct->prop('LastName')) || '';
my $phone = $self->stringToASCII($acct->prop('Phone')) || '';
my $company = $self->stringToASCII($acct->prop('Company')) || '';
my $dept = $self->stringToASCII($acct->prop('Dept')) || '';
my $city = $self->stringToASCII($acct->prop('City')) || '';
my $street = $self->stringToASCII($acct->prop('Street')) || '';
my $shell = $acct->prop('Shell') || '/usr/bin/false';
# create the hash to submit with values common to all
my %attrs = (
"uidNumber" => $uid,
"gidNumber"=> $gid ,
"homeDirectory" => "/home/e-smith/files/users/$acctName",
"loginShell" => "$shell",
);
if ( $type eq "user") {
$attrs{"cn"}= "$first $last";
$attrs{"givenName"}=$first;
$attrs{"mail"}="$acctName\@$domain";
$attrs{"sn"}=$last;
$attrs{"telephoneNumber"}=$phone;
$attrs{"o"}= $company;
$attrs{"ou"}=$dept;
$attrs{"l"}=$city;
$attrs{"street"}=$street;
$attrs{"displayName"}= "$first $last";
} elsif ($type eq "group") {
$attrs{"homeDirectory"}="/home/e-smith/";
$attrs{"loginShell"} = "/bin/false";
$attrs{"cn"}=$acctName;
} elsif ($type eq "ibay") {
my $Name = $self->stringToASCII($acct->prop('Name')) || $acctName;
$attrs{"cn"}=$Name;
$attrs{"homeDirectory"} = "/home/e-smith/files/ibays/$acctName";
$attrs{"loginShell"} = "/bin/false";
}
#get current content
#list attributes
my $result;
my @list = keys %attrs;
$result = $self->search ( base => "uid=$acctName,ou=Users,$base",
filter => "(objectClass=*)",
attrs => [ @list ]
);
my $href = $result->as_struct;
my @arrayOfDNs = keys %$href;
$href = $$href{$arrayOfDNs[0]};
# filter out fields without any change.
for my $field (@list){
delete($attrs{$field}) if ( defined ($href->{lc($field)}) and $href->{lc($field)}[0] eq $attrs{$field});
}
# return if nothing changed
return 0 unless ( %attrs);
# update only if changes
$result = $self->modify("uid=$acctName,ou=Users,$base",
replace => [ %attrs]
);
return $result->code;
}
=pod
=head2 ldaplockuser($username)
Lock a user password
=cut
sub ldaplockuser {
my $self = shift ;
my $userName = shift;
my $base = $self->base;
my $result = $self->modify("uid=$userName,ou=Users,$base",
replace => { 'userPassword' => "{crypt}!*"});
return $result->code;
}
=pod
=head2 ldapdeluser($userName)
Will delete the user which username is provided.
Returns ldap error code if any.
=cut
sub ldapdeluser {
my $self = shift ;
my $userName = shift;
my $base = $self->base;
my $result = $self->delete("uid=$userName,ou=Users,$base");
return $result->code;
}
=pod
=head2 ldapexistsuser($userName)
Checks if user does exists in ldap.
=cut
sub ldapexistsuser {
my $self = shift ;
my $userName = shift;
my $base = $self->base;
my $result = $self->search ( base => "uid=$userName,ou=Users,$base",
filter => "(objectClass=*)",
attrs => ["uid"]
);
return ($result->code)? 0:1;
}
# TODO machine account add modify delete
=pod
=head2 ldapaddmachine($m{})
Insert new Machine in ldap and return ldap err code if any.
It expects as argument output of e-smith account db $account->get($key).
=cut
sub ldapaddmachine {
my $self = shift ;
my $acct = shift;
my $machineName = $acct->key or return 253;
my $uid = $acct->prop('Uid') or return 253;
return 253 unless ($acct->prop('type') eq "machine");
my $gid = $acct->prop('Gid') || $uid;
my $base = $self->base;
my $result = $self->add("uid=$machineName,ou=Computers,$base",
attrs => [
"uidNumber" => $uid,
"gidNumber" => $gid,
"cn" => "Hostname account for $machineName",
"objectClass" => [ 'account','posixAccount', 'shadowAccount'],
"homeDirectory" => "/noexistingpath",
"loginShell" => "/bin/false",
"shadowExpire" => -1,
"shadowFlag" => 134538308,
"shadowInactive" => -1,
"shadowLastChange" => 15997,
"shadowMax" => 99999,
"shadowMin" => -1,
"shadowWarning"=> 7,
"userPassword" => "{crypt}!*"
]
);
return $result->code
}
=pod
=head2 ldapdelmachine($machineName)
Will delete the user which machinename is provided.
Returns ldap error code if any.
=cut
sub ldapdelmachine {
my $self = shift ;
my $machineName = shift;
my $base = $self->base;
my $result = $self->delete("uid=$machineName,ou=Computers,$base");
return $result->code;
}
=pod
=head2 ldapread($entry)
Will returns all the field of an existing entry in ldap.
Should provides something like "uid=john,ou=Users" or
"cn=groupname,ou=Groups".
This is an easy way of verifying all is good in db.
=cut
sub ldapread {
my $self = shift ;
my $entry = shift ;
my $base = $self->base;
my $result = $self->search ( base => "$entry,$base",
filter => "(objectClass=*)",
attrs => [ ]
);
return $result->code if $result->error > 0;
my $href = $result->as_struct;
# get an array of the DN names
my @arrayOfDNs = keys %$href; # use DN hashes
# process each DN using it as a key
foreach ( @arrayOfDNs ) {
print $_, "\n";
my $valref = $$href{$_};
# get an array of the attribute names
# passed for this one DN.
my @arrayOfAttrs = sort keys %$valref; #use Attr hashes
my $attrName;
foreach $attrName (@arrayOfAttrs) {
# skip any binary data: yuck!
next if ( $attrName =~ /;binary$/ );
# get the attribute value (pointer) using the
# attribute name as the hash
my $attrVal = @$valref{$attrName};
print "\t $attrName: @$attrVal \n";
}
print "#-------------------------------\n";
# End of that DN
}
}
=pod
=head2 stringToASCII($string)
Will convert srings from UTF8 to ASCII where it is required to be ASCII.
=cut
sub stringToASCII {
my $self = shift ;
my $string = (ref($self) eq "esmith::util::ldap") ? shift : $self;
return unless ($string);
my $decomposed = NFKD( unidecode($string) );
$decomposed =~ s/\p{NonspacingMark}//g;
return $decomposed;
}

View File

@@ -6,7 +6,7 @@ Summary: smeserver server and gateway - library module
%define name smeserver-lib
Name: %{name}
%define version 11.0.0
%define release 6
%define release 11
Version: %{version}
Release: %{release}%{?dist}
License: Artistic
@@ -33,6 +33,21 @@ Provides: e-smith-lib
smeserver server and gateway software - library module.
%changelog
* Thu Feb 20 2025 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-11.sme
- remove pptpd reference [SME: 11417]
- move template-begin-ini [SME: 12211]
- passwordstrength{length} default to 12 [SME: 12383]
- more password granularity (none,normal,intermediate,strong) [SME: 12384]
* Thu Dec 12 2024 Brian Read <brianr@koozali.org> 11.0.0-9.sme
- add in getmyip [SME: 12810 ]
* Tue Nov 12 2024 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-8.sme
- fix Use of uninitialized value [SME: 12760]
* Tue Aug 13 2024 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-7.sme
- esmith::util:ldap initial commit [SME: 12719]
* Wed Apr 17 2024 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-6.sme
- rename update event