summaryrefslogtreecommitdiffstats
path: root/src/libtdeldap.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'src/libtdeldap.cpp')
-rw-r--r--src/libtdeldap.cpp408
1 files changed, 408 insertions, 0 deletions
diff --git a/src/libtdeldap.cpp b/src/libtdeldap.cpp
index e69de29..f6f7466 100644
--- a/src/libtdeldap.cpp
+++ b/src/libtdeldap.cpp
@@ -0,0 +1,408 @@
+/***************************************************************************
+ * Copyright (C) 2012 by Timothy Pearson *
+ * kb9vqf@pearsoncomputing.net *
+ * *
+ * This program is free software; you can redistribute it and/or modify *
+ * it under the terms of the GNU General Public License as published by *
+ * the Free Software Foundation; either version 2 of the License, or *
+ * (at your option) any later version. *
+ * *
+ * This program is distributed in the hope that it will be useful, *
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of *
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
+ * GNU General Public License for more details. *
+ * *
+ * You should have received a copy of the GNU General Public License *
+ * along with this program; if not, write to the *
+ * Free Software Foundation, Inc., *
+ * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. *
+ ***************************************************************************/
+
+#include <klocale.h>
+#include <kmessagebox.h>
+#include <klineedit.h>
+#include <kpassdlg.h>
+
+#include <ldap.h>
+#include <stdlib.h>
+#include <sys/time.h>
+
+#include "libtdeldap.h"
+#include "ldappasswddlg.h"
+
+#define LDAP_INSECURE_PORT 389
+#define LDAP_SECURE_PORT 636
+
+int requested_ldap_version = LDAP_VERSION3;
+int requested_ldap_auth_method = LDAP_AUTH_SIMPLE; // Is this safe and secure over an untrusted connection?
+char* ldap_user_and_operational_attributes[2] = {"*", "+"};
+
+LDAPManager::LDAPManager(TQString realm, TQString host, TQObject *parent, const char *name) : TQObject(parent, name), m_realm(realm), m_host(host), m_port(0), m_creds(0), m_ldap(0)
+{
+ TQStringList domainChunks = TQStringList::split(".", realm.lower());
+ m_basedc = "dc=" + domainChunks.join(",dc=");
+}
+
+LDAPManager::~LDAPManager() {
+ unbind(true);
+}
+
+TQString LDAPManager::realm() {
+ return m_realm;
+}
+
+int LDAPManager::bind() {
+ if (m_ldap) {
+ return 0;
+ }
+
+ int use_secure_connection = 0;
+
+ TQString uri;
+ if (use_secure_connection == 1) {
+ m_port = LDAP_SECURE_PORT;
+ uri = TQString("ldaps://%1:%2").arg(m_host).arg(m_port);
+ }
+ else {
+ m_port = LDAP_INSECURE_PORT;
+ uri = TQString("ldap://%1:%2").arg(m_host).arg(m_port);
+ }
+
+ int retcode = ldap_initialize(&m_ldap, uri.ascii());
+ if (retcode < 0) {
+ KMessageBox::error(0, i18n("<qt>Unable to connect to LDAP server %1 on port %2<p>Reason: [%3] %4</qt>").arg(m_host).arg(m_port).arg(retcode).arg(ldap_err2string(retcode)), i18n("Unable to connect to server!"));
+ return -1;
+ }
+ retcode = ldap_set_option(m_ldap, LDAP_OPT_PROTOCOL_VERSION, &requested_ldap_version);
+ if (retcode != LDAP_OPT_SUCCESS) {
+ KMessageBox::error(0, i18n("<qt>Unable to connect to LDAP server %1 on port %2<p>Reason: [%3] %4</qt>").arg(m_host).arg(m_port).arg(retcode).arg(ldap_err2string(retcode)), i18n("Unable to connect to server!"));
+ return -1;
+ }
+
+ TQString errorString;
+ LDAPPasswordDialog passdlg(0);
+ passdlg.m_base->ldapAdminRealm->setEnabled(false);
+ passdlg.m_base->ldapAdminRealm->setText(m_realm);
+ if (passdlg.exec() == TQDialog::Accepted) {
+ char* mechanism = NULL;
+ struct berval cred;
+ TQString ldap_dn = passdlg.m_base->ldapAdminUsername->text();
+ TQCString pass = passdlg.m_base->ldapAdminPassword->password();
+ cred.bv_val = pass.data();
+ cred.bv_len = pass.length();
+
+ if (!ldap_dn.contains(",")) {
+ // Look for a POSIX account with anonymous bind and the specified account name
+ TQString uri;
+ LDAP* ldapconn;
+ if (use_secure_connection == 1) {
+ m_port = LDAP_SECURE_PORT;
+ uri = TQString("ldaps://%1:%2").arg(m_host).arg(m_port);
+ }
+ else {
+ m_port = LDAP_INSECURE_PORT;
+ uri = TQString("ldap://%1:%2").arg(m_host).arg(m_port);
+ }
+ int retcode = ldap_initialize(&ldapconn, uri.ascii());
+ if (retcode < 0) {
+ KMessageBox::error(0, i18n("<qt>Unable to connect to LDAP server %1 on port %2<p>Reason: [%3] %4</qt>").arg(m_host).arg(m_port).arg(retcode).arg(ldap_err2string(retcode)), i18n("Unable to connect to server!"));
+ return -1;
+ }
+ retcode = ldap_set_option(ldapconn, LDAP_OPT_PROTOCOL_VERSION, &requested_ldap_version);
+ if (retcode != LDAP_OPT_SUCCESS) {
+ KMessageBox::error(0, i18n("<qt>Unable to connect to LDAP server %1 on port %2<p>Reason: [%3] %4</qt>").arg(m_host).arg(m_port).arg(retcode).arg(ldap_err2string(retcode)), i18n("Unable to connect to server!"));
+ return -1;
+ }
+ struct berval anoncred;
+ anoncred.bv_val = "";
+ anoncred.bv_len = strlen("");
+ retcode = ldap_sasl_bind_s(ldapconn, "", mechanism, &anoncred, NULL, NULL, NULL);
+ if (retcode == LDAP_SUCCESS ) {
+ // Look for the DN for the specified user
+ LDAPMessage* msg;
+ TQString ldap_base_dn = m_basedc;
+ TQString ldap_filter = TQString("(&(objectclass=posixAccount)(uid=%1))").arg(passdlg.m_base->ldapAdminUsername->text());
+ struct timeval timeout;
+ timeout.tv_sec = 10; // 10 second timeout
+ retcode = ldap_search_ext_s(ldapconn, ldap_base_dn.ascii(), LDAP_SCOPE_SUBTREE, ldap_filter.ascii(), NULL, 0, NULL, NULL, &timeout, 0, &msg);
+ if (retcode != LDAP_SUCCESS) {
+ KMessageBox::error(0, i18n("<qt>LDAP search failure<p>Reason: [%3] %4</qt>").arg(retcode).arg(ldap_err2string(retcode)), i18n("LDAP Error"));
+ }
+ else {
+ // Iterate through the returned entries
+ char* dn = NULL;
+ LDAPMessage* entry;
+ for(entry = ldap_first_entry(ldapconn, msg); entry != NULL; entry = ldap_next_entry(ldapconn, entry)) {
+ if((dn = ldap_get_dn(ldapconn, entry)) != NULL) {
+ ldap_dn = dn;
+ ldap_memfree(dn);
+ }
+ }
+ }
+ // clean up
+ ldap_msgfree(msg);
+
+ // All done!
+ ldap_unbind_ext_s(ldapconn, NULL, NULL);
+ }
+ }
+
+ retcode = ldap_sasl_bind_s(m_ldap, ldap_dn.ascii(), mechanism, &cred, NULL, NULL, NULL);
+
+ if (retcode != LDAP_SUCCESS ) {
+ KMessageBox::error(0, i18n("<qt>Unable to connect to LDAP server %1 on port %2<p>Reason: [%3] %4</qt>").arg(m_host).arg(m_port).arg(retcode).arg(ldap_err2string(retcode)), i18n("Unable to connect to server!"));
+ return -1;
+ }
+
+ return 0;
+ }
+ else {
+ return -2;
+ }
+
+ return -3;
+}
+
+int LDAPManager::unbind(bool force) {
+ if (!m_ldap) {
+ return 0;
+ }
+
+ int retcode = ldap_unbind_ext_s(m_ldap, NULL, NULL);
+ if ((retcode < 0) && (force == false)) {
+ KMessageBox::error(0, i18n("<qt>Unable to disconnect from LDAP server %1 on port %2<p>Reason: [%3] %4</qt>").arg(m_host).arg(m_port).arg(retcode).arg(ldap_err2string(retcode)), i18n("Unable to disconnect from server!"));
+ return retcode;
+ }
+ else {
+ m_ldap = 0;
+ }
+ return retcode;
+}
+
+LDAPUserInfoList LDAPManager::users() {
+ int retcode;
+ LDAPUserInfoList users;
+printf("[RAJA DEBUG 100.0] In LDAPManager::users()\n\r"); fflush(stdout);
+
+ if (bind() < 0) {
+ return LDAPUserInfoList();
+ }
+ else {
+printf("[RAJA DEBUG 100.1] In LDAPManager::users() bind was OK\n\r"); fflush(stdout);
+ LDAPMessage* msg;
+ TQString ldap_base_dn = m_basedc;
+ TQString ldap_filter = "(objectClass=posixAccount)";
+ struct timeval timeout;
+ timeout.tv_sec = 10; // 10 second timeout
+ retcode = ldap_search_ext_s(m_ldap, ldap_base_dn.ascii(), LDAP_SCOPE_SUBTREE, ldap_filter.ascii(), ldap_user_and_operational_attributes, 0, NULL, NULL, &timeout, 0, &msg);
+ if (retcode != LDAP_SUCCESS) {
+ KMessageBox::error(0, i18n("<qt>LDAP search failure<p>Reason: [%3] %4</qt>").arg(retcode).arg(ldap_err2string(retcode)), i18n("LDAP Error"));
+ return LDAPUserInfoList();
+ }
+
+printf("[RAJA DEBUG 100.2] The number of entries returned was %d\n\n", ldap_count_entries(m_ldap, msg));
+
+ // Iterate through the returned entries
+ char* dn = NULL;
+ char* attr;
+ struct berval **vals;
+ BerElement* ber;
+ LDAPMessage* entry;
+ int i;
+ for(entry = ldap_first_entry(m_ldap, msg); entry != NULL; entry = ldap_next_entry(m_ldap, entry)) {
+ if((dn = ldap_get_dn(m_ldap, entry)) != NULL) {
+ printf("Returned dn: %s\n", dn);
+ ldap_memfree(dn);
+ }
+
+ LDAPUserInfo userinfo;
+ for( attr = ldap_first_attribute(m_ldap, entry, &ber); attr != NULL; attr = ldap_next_attribute(m_ldap, entry, ber)) {
+ if ((vals = ldap_get_values_len(m_ldap, entry, attr)) != NULL) {
+printf("%s: %s\n\r", attr, vals[i]->bv_val);
+ userinfo.informationValid = true;
+ TQString ldap_field = attr;
+ i=0;
+ if (ldap_field == "uid") {
+ userinfo.name = vals[i]->bv_val;
+ }
+ else if (ldap_field == "uidNumber") {
+ userinfo.uid = atoi(vals[i]->bv_val);
+ }
+ else if (ldap_field == "loginShell") {
+ userinfo.shell = vals[i]->bv_val;
+ }
+ else if (ldap_field == "homeDirectory") {
+ userinfo.homedir = vals[i]->bv_val;
+ }
+ else if (ldap_field == "gidNumber") {
+ userinfo.primary_gid = atoi(vals[i]->bv_val);
+ }
+ else if (ldap_field == "krb5KDCFlags") {
+ userinfo.status = (LDAPKRB5Flags)(atoi(vals[i]->bv_val));
+ }
+ else if (ldap_field == "createTimestamp") { // YYYYMMDD000000Z
+ userinfo.account_created = TQDateTime::fromString(vals[i]->bv_val);
+ }
+ else if (ldap_field == "modifyTimestamp") { // YYYYMMDD000000Z
+ userinfo.account_modified = TQDateTime::fromString(vals[i]->bv_val);
+ }
+ // FIXME
+ // These two attributes do not seem to be available with a Heimdal KDC
+ // userinfo.password_last_changed = vals[i]->bv_val;
+ // userinfo.password_expires = vals[i]->bv_val;
+ else if (ldap_field == "krb5PasswordEnd") { // YYYYMMDD000000Z
+ userinfo.password_expiration = TQDateTime::fromString(vals[i]->bv_val);
+ }
+ // FIXME
+ // These six(!) attributes do not seem to be available with a Heimdal KDC
+ // userinfo.password_ages = vals[i]->bv_val;
+ // userinfo.new_password_interval = vals[i]->bv_val;
+ // userinfo.new_password_warn_interval = vals[i]->bv_val;
+ // userinfo.new_password_lockout_delay = vals[i]->bv_val;
+ // userinfo.password_has_minimum_age = vals[i]->bv_val;
+ // userinfo.password_minimum_age = vals[i]->bv_val;
+ else if (ldap_field == "krb5MaxLife") { // units: hours
+ userinfo.maximum_ticket_lifetime = atoi(vals[i]->bv_val);
+ }
+ else if (ldap_field == "cn") {
+ userinfo.commonName = vals[i]->bv_val;
+ }
+ else if (ldap_field == "givenName") {
+ userinfo.givenName = vals[i]->bv_val;
+ }
+ else if (ldap_field == "sn") {
+ userinfo.surName = vals[i]->bv_val;
+ }
+ else if (ldap_field == "initials") {
+ userinfo.initials = vals[i]->bv_val;
+ }
+ else if (ldap_field == "title") {
+ userinfo.title = vals[i]->bv_val;
+ }
+ else if (ldap_field == "mail") {
+ userinfo.email = vals[i]->bv_val;
+ }
+ else if (ldap_field == "description") {
+ userinfo.description = vals[i]->bv_val;
+ }
+ else if (ldap_field == "l") {
+ userinfo.locality = vals[i]->bv_val;
+ }
+ else if (ldap_field == "telephoneNumber") {
+ userinfo.telephoneNumber = vals[i]->bv_val;
+ }
+ else if (ldap_field == "facsimileTelephoneNumber") {
+ userinfo.faxNumber = vals[i]->bv_val;
+ }
+ else if (ldap_field == "homePhone") {
+ userinfo.homePhone = vals[i]->bv_val;
+ }
+ else if (ldap_field == "mobile") {
+ userinfo.mobilePhone = vals[i]->bv_val;
+ }
+ else if (ldap_field == "pager") {
+ userinfo.pagerNumber = vals[i]->bv_val;
+ }
+ // FIXME
+ // This attribute is not present in my current LDAP schema
+ // userinfo.website = vals[i]->bv_val;
+
+ // RAJA FIXME
+ // Populate these fields!
+// userinfo.poBox = vals[i]->bv_val;
+// userinfo.street = vals[i]->bv_val;
+// userinfo.address = vals[i]->bv_val;
+// userinfo.state = vals[i]->bv_val;
+// userinfo.postcode = vals[i]->bv_val;
+// userinfo.registeredAddress = vals[i]->bv_val;
+// userinfo.homeAddress = vals[i]->bv_val;
+// userinfo.seeAlso = vals[i]->bv_val;
+// userinfo.deliveryOffice = vals[i]->bv_val;
+// userinfo.department = vals[i]->bv_val;
+// userinfo.roomNumber = vals[i]->bv_val;
+// userinfo.employeeType = vals[i]->bv_val;
+// userinfo.employeeNumber = vals[i]->bv_val;
+// userinfo.manager = vals[i]->bv_val;
+// userinfo.secretary = vals[i]->bv_val;
+// userinfo.isdnNumber = vals[i]->bv_val;
+// userinfo.teletexID = vals[i]->bv_val;
+// userinfo.telexNumber = vals[i]->bv_val;
+// userinfo.preferredDelivery = vals[i]->bv_val;
+// userinfo.destinationIndicator = vals[i]->bv_val;
+// userinfo.x121Address = vals[i]->bv_val;
+// userinfo.displayName = vals[i]->bv_val;
+// userinfo.preferredLanguage = vals[i]->bv_val;
+// userinfo.uniqueIdentifier = vals[i]->bv_val;
+// userinfo.businessCategory = vals[i]->bv_val;
+// userinfo.carLicense = vals[i]->bv_val;
+// userinfo.notes = vals[i]->bv_val;
+
+// for(i = 0; vals[i] != NULL; i++) {
+// printf("%s: %s\n", attr, vals[i]->bv_val);
+// }
+ ldap_value_free_len(vals);
+ }
+ ldap_memfree(attr);
+ }
+ users.append(userinfo);
+
+ if (ber != NULL) {
+ ber_free(ber, 0);
+ }
+
+ printf("\n\r");
+ }
+
+ // clean up
+ ldap_msgfree(msg);
+
+ // RAJA FIXME
+ return users;
+ }
+
+ return LDAPUserInfoList();
+}
+
+// ===============================================================================================================
+//
+// DATA CLASS CONSTRUCTORS AND DESTRUCTORS
+//
+// ===============================================================================================================
+
+LDAPUserInfo::LDAPUserInfo() {
+ // TQStrings are always initialized to TQString::null, so they don't need initialization here...
+ informationValid = false;
+
+ uid = -1;
+ primary_gid = -1;
+ status = (LDAPKRB5Flags)0;
+ account_created = TQDateTime::fromString("01-01-1970 00:00:00");
+ account_modified = TQDateTime::fromString("01-01-1970 00:00:00");
+ password_last_changed = TQDateTime::fromString("01-01-1970 00:00:00");
+ password_expires = false;
+ password_expiration = TQDateTime::fromString("01-01-1970 00:00:00");
+ password_ages = false;
+ new_password_interval = -1;
+ new_password_warn_interval = -1;
+ new_password_lockout_delay = -1;
+ password_has_minimum_age = false;
+ password_minimum_age = -1;
+ maximum_ticket_lifetime = -1;
+}
+
+LDAPUserInfo::~LDAPUserInfo() {
+ //
+}
+
+LDAPGroupInfo::LDAPGroupInfo() {
+ // TQStrings are always initialized to TQString::null, so they don't need initialization here...
+ informationValid = false;
+
+ gid = -1;
+}
+
+LDAPGroupInfo::~LDAPGroupInfo() {
+ //
+}
+
+#include "libtdeldap.moc" \ No newline at end of file