setOption('attr_filter', 'ldapdata_attribute_filter'); } /*************************** * Drupal Hooks * ***************************/ /** * Implements hook_help() **/ function ldapdata_help($section) { $output = ''; switch ($section) { case 'admin/modules#name': $output = 'ldapdata'; break; case 'admin/modules#description': case 'admin/help#ldapauth': $output = 'Permits reading and editing of own\'s LDAP data for users authenticated via ldapauth module.'; break; case 'user/help#ldapauth': $output = t('Edit LDAP account info'); break; } return $output; } /** * Implements hook_user() **/ function ldapdata_user($op, &$edit, &$user, $category = NULL) { switch($op) { case 'categories': return ldapdata_user_categories($user); case 'form': return ldapdata_user_form($user, $category); case 'load': ldapdata_user_load($user); break; case 'login': ldapdata_user_login($user); break; case 'update': ldapdata_user_update($edit, $user, $category); break; case 'view': return ldapdata_user_view($user); } } /** * Implements hook_menu() **/ function ldapdata_menu() { $items = array(); $items[] = array( 'path' => 'admin/settings/ldapdata', 'title' => t('LDAP Data'), 'description' => t('Configure LDAP Data'), 'callback' => 'ldapdata_admin_list', 'access' => user_access('administer ldap modules'), ); $items[] = array( 'path' => 'admin/settings/ldapdata/edit', 'title' => t('LDAP DATA'), 'callback' => 'drupal_get_form', 'callback arguments' => array('ldapdata_admin_edit'), 'type' => MENU_CALLBACK, 'weight' => 1, 'access' => user_access('administer ldap modules'), ); $items[] = array( 'path' => 'admin/settings/ldapdata/reset', 'title' => t('LDAP Data'), 'callback' => 'drupal_get_form', 'callback arguments' => array('ldapdata_admin_edit'), 'type' => MENU_CALLBACK, 'weight' => 1, 'access' => user_access('administer ldap modules'), ); $items[] = array( 'path' => 'admin/settings/ldapdata/list', 'title' => t('LDAP Data'), 'callback' => 'ldapdata_admin_list', 'type' => MENU_DEFAULT_LOCAL_TASK, 'weight' => 1, 'access' => user_access('administer ldap modules'), ); return $items; } function ldapdata_admin_list() { $result = db_query("SELECT sid, name FROM {ldapauth} WHERE status = '%s' ORDER BY sid", 1); $rows = array(); while ($row = db_fetch_object($result)) { $rows[] = array($row->name, l(t('edit'), 'admin/settings/ldapdata/edit/'.$row->name), l(t('reset'), 'admin/settings/ldapdata/reset/'.$row->name)); } $header = array( t('LDAP Config'), array( 'data' => t('Operations'), 'colspan' => 2 ) ); return theme('table', $header, $rows); } function ldapdata_admin_edit($ldap_name) { global $ldap_attributes; if ((arg(3) == "reset") && ($ldap_name)) { $form['reset_ldap'] = array( '#type' => 'value', '#value' => $ldap_name, ); return confirm_form( $form, t('Are you sure you want to reset the groups mapping to defaults ?'), 'admin/settings/ldapdata', t('This action cannot be undone.

'), t('Reset'), t('Cancel') ); } elseif ((arg(3) == "edit") && ($ldap_name)) { $result = db_fetch_array(db_query("SELECT ldapdata_mappings, ldapdata_roattrs, ldapdata_rwattrs, ldapdata_binddn, ldapdata_bindpw, ldapdata_bindpw_clear FROM {ldapauth} WHERE name = '%s'", $ldap_name)); $mappings = unserialize($result['ldapdata_mappings']); $roattrs = unserialize($result['ldapdata_roattrs']); $rwattrs = unserialize($result['ldapdata_rwattrs']); $ldapdata_binddn = $result['ldapdata_binddn']; $ldapdata_bindpw = $result['ldapdata_bindpw']; $ldapdata_bindpw_clear = $result['ldapdata_bindpw_clear']; // ATTRIBUTE MAPPING $output = ""; $form['ldap_attribute_mapping'] = array( '#type' => 'fieldset', '#title' => 'Drupal-LDAP fields mapping', '#collapsible' => true ); $form['ldap_attribute_mapping']['ldap-note'] = array( '#value' => t('

PLEASE NOTE: advanced configuration for this module can be set by editing the module\'s config file, located at modules/ldap_integration/ldap_integration/ldapdata.conf.php in your Drupal install.

'), ); $form['ldap_attribute_mapping']['ldap_attr_mapping'] = array( '#type' => 'radios', '#title' => 'Should Drupal account fields be mapped to LDAP Attributes?', '#default_value' => $mappings['access'], '#options' => array( LDAP_MAP_ATTRIBUTES => t('Changes in account fields will be mapped to LDAP attributes and back (see modules/ldap_integration/ldap_integration/ldapdata.conf.php)'), LDAP_MAP_ATTRIBUTES_READ_ONLY => t('Same, but read-only mode.'), LDAP_MAP_NOTHING => t('No attribute mapping will be done at all (Clears any existing mappings)'), ), ); $profile_fields = _ldapdata_retrieve_profile_fields(); $standard_fields = _ldapdata_retrieve_standard_user_fields(); $drupal_fields = $profile_fields + $standard_fields; $form['ldap_attribute_mapping']['ldap_drupal_reverse_mapping_pre'] = array( '#value' => t('
'), ); $ldap_drupal_reverse_mappings = _ldapdata_reverse_mappings($ldap_name); foreach ($drupal_fields as $key => $field) { $field_tmp = "ldap_amap-".$key; $_prefix = "', ); } $form['ldap_attribute_mapping']['ldap_drupal_reverse_mappings_post'] = array( '#value' => '
Drupal fieldLDAP attribute
"; $form['ldap_attribute_mapping'][$field_tmp] = array( '#type' => 'textfield', //'#default_value' => $ldap_drupal_reverse_mappings[$key], '#default_value' => $mappings[$field_tmp], '#size' => '20', '#prefix' => $_prefix, '#suffix' => '
', ); // ATTRIBUTE ACCESS CONTROL $form["ldap_editable_attributes"] = array( '#type' => 'fieldset', '#title' => 'Attribute Visibility & Access Control', '#collapsible' => TRUE, '#tree' => true, ); $form["ldap_editable_attributes"]["ldap_message"] = array( '#value' => t('

Users may be able to view their LDAP attributes\' values, as well as edit them. You can configure this feature here.

'), ); foreach ($ldap_attributes as $key => $field) { $fields[$key] = $field[2]; } foreach ($fields as $attr => $attr_name) { $ro_options[$attr] = ''; $rw_options[$attr] = ''; if (!empty($roattrs) && (in_array($attr, $roattrs))) { $ro_status[] = $attr; } if (!empty($rwattrs) && (in_array($attr, $rwattrs))) { $rw_status[] = $attr; } $form['ldap_editable_attributes']['ldap_attr_table'][$attr] = array( //'#type' => 'markup', '#value' => $attr_name, ); } $form['ldap_editable_attributes']['ro_status'] = array( '#type' => 'checkboxes', '#options' => $ro_options, '#default_value' => $ro_status, ); $form['ldap_editable_attributes']['rw_status'] = array( '#type' => 'checkboxes', '#options' => $rw_options, '#default_value' => $rw_status, ); $form['ldap_editable_attributes']['header'] = array( '#type' => 'value', '#value' => array( array('data' => 'Attribute Name'), array('data' => 'Readable by User?'), array('data' => 'Editable by User?'), )); // ADVANCED CONFIGURATION $form['advanced'] = array( '#type' => 'fieldset', '#title' => 'Advanced Configuration', '#collapsible' => TRUE, '#collapsed' => TRUE ); $form['advanced']['ldap-note'] = array( '#value' => t('

When reading/editing attributes, this module logs on to the LDAP directory using the user\'s DN//pass pair. However, many LDAP setups do not allow their users to edit attributes.

If this is your case, but still you want users to edit their LDAP attributes via Drupal, you should set up an special user on your directory, with special access to edit your users\' attributes. Then this module will use it to log on and edit data.

') ); $form['advanced']['ldapdata_binddn'] = array( '#type' => 'textfield', '#title' => t('DN for reading/editing attributes'), '#default_value' => $ldapdata_binddn, '#size' => 50, '#maxlength' => 255, ); if ($ldapdata_bindpw_clear || !ldapdata_bindpw) { $form['advanced']['ldapdata_bindpw'] = array( '#type' => 'password', '#title' => t('Password for reading/editing attributes'), '#size' => 50, '#maxlength' => 255, ); } else { // given an option to clear the password $form['advanced']['ldapdata_bindpw_clear'] = array( '#type' => 'checkbox', '#default_value' => false, '#title' => t('Clear current password'), ); } // SUBMIT $form['config_name'] = array( '#type' => 'hidden', '#value' => $ldap_name, ); $form['buttons']['submit'] = array( '#type' => 'submit', '#value' => 'Update' ); return $form; } else { drupal_goto('admin/settings/ldapdata'); } } function theme_ldapdata_admin_edit($form) { $output = ''; $rows = array(); foreach (element_children($form) as $element) { if ($element == "ldap_editable_attributes" ) { foreach (element_children($form['ldap_editable_attributes']['ldap_attr_table']) as $key) { $row = array(); $row[] = drupal_render($form['ldap_editable_attributes']['ldap_attr_table'][$key]); $row[] = drupal_render($form['ldap_editable_attributes']['ro_status'][$key]); $row[] = drupal_render($form['ldap_editable_attributes']['rw_status'][$key]); $rows[] = $row; } $form['ldap_editable_attributes']['#children'] .= drupal_render($form['ldap_editable_attributes']['ldap_message']); $form['ldap_editable_attributes']['#children'] .= theme('table', $form['ldap_editable_attributes']['header']['#value'], $rows); $output .= drupal_render($form['ldap_editable_attributes']); } else { $output .= drupal_render($form[$element]); } } $output .= drupal_render($form); return $output; } function ldapdata_admin_edit_submit($form_id, $form_values) { $config_name = $form_values['config_name']; // Attribute Mapping $attr_mapping_access = $form_values['ldap_attr_mapping']; $attr_mappings['access'] = $attr_mapping_access; if ($attr_mapping_access >=4 ) { foreach (element_children($form_values) as $attr) { if (preg_match("/ldap_amap/", $attr) && $form_values[$attr]) { // match found $attr_mappings[$attr] = $form_values[$attr]; } } } $serialized_data = serialize($attr_mappings); // Attribute Access Control $ro_tmp = array_filter($form_values['ldap_editable_attributes']['ro_status']); if (!empty($ro_tmp)) { foreach ($ro_tmp as $ro_attr) { $ro_attrs[] = $ro_attr; } $serialized_ro_attrs = serialize($ro_attrs); } $rw_tmp = array_filter($form_values['ldap_editable_attributes']['rw_status']); if (!empty($rw_tmp)) { foreach ($rw_tmp as $rw_attr) { $rw_attrs[] = $rw_attr; } $serialized_rw_attrs = serialize($rw_attrs); } if ( !$form_values['ldapdata_bindpw_clear'] && $form_values['ldapdata_bindpw']) { db_query("UPDATE {ldapauth} SET ldapdata_mappings = '%s', ldapdata_roattrs = '%s', ldapdata_rwattrs = '%s', ldapdata_binddn = '%s', ldapdata_bindpw = '%s', ldapdata_bindpw_clear = '%d' WHERE name = '%s'", $serialized_data, $serialized_ro_attrs, $serialized_rw_attrs, $form_values['ldapdata_binddn'], $form_values['ldapdata_bindpw'], $form_values['ldapdata_bindpw_clear'], $config_name); } else { // set the clear password switch db_query("UPDATE {ldapauth} SET ldapdata_mappings = '%s', ldapdata_roattrs = '%s', ldapdata_rwattrs = '%s', ldapdata_binddn = '%s', ldapdata_bindpw_clear = '%d' WHERE name = '%s'", $serialized_data, $serialized_ro_attrs, $serialized_rw_attrs, $form_values['ldapdata_binddn'], $form_values['ldapdata_bindpw_clear'], $config_name); } return 'admin/settings/ldapdata/edit/'.$config_name; } /** * Implements hook_categories(); */ function ldapdata_user_categories(&$user) { $ret = null; // we do this as opposed to calling _ldapdata_ldap_info() to save on the multiple sql queries $result = db_fetch_array(db_query("SELECT ldapdata_mappings, ldapdata_rwattrs FROM {ldapauth} WHERE name = '%s'", $user->ldap_config)); $mappings = unserialize($result['ldapdata_mappings']); $mapping_type = $mappings['access']; $rwattrs = $result['ldapdata_rwattrs']; if (($mapping_type == LDAP_MAP_ATTRIBUTES) && (!empty($rwattrs)) && arg(2) == 'edit') { $ret = array( array( 'name' => LDAP_CATEGORY_USER_DATA, 'title' => LDAP_USER_DATA_EDIT_TAB, 'weight' => 50 ) ); } return $ret; } /** * Only used for editable LDAP attributes with no Drupal equivalents */ function ldapdata_user_form(&$user, $category) { global $ldap_attributes, $ldap; $mapping_type = _ldapdata_ldap_info($user, 'mapping_type'); $attributes = _ldapdata_ldap_info($user, 'ldapdata_rwattrs'); if ((!$user->ldap_dn) || ($category != LDAP_CATEGORY_USER_DATA) || ($mapping_type != LDAP_MAP_ATTRIBUTES) || (!$attributes)) { return null; } $bind_info = _ldapdata_edition($user); if (!$ldap->connect($bind_info[0], $bind_info[1])) { watchdog('user', "User form: user $user->name's data could not be read in the LDAP directory", WATCHDOG_WARNING); return; } $entry = $ldap->retrieveAttributes($user->ldap_dn); $output = ''; $form['ldap_attributes'] = array( '#title' => LDAP_SETTINGS_GROUP_STRING, '#type' => 'fieldset', ); foreach ($attributes as $attribute) { $attr_info = $ldap_attributes[$attribute]; if ($attr_info) { array_shift($attr_info); $value = $entry[strtolower($attribute)][0]; $form['ldap_attributes'][$attribute] = _ldapdata_attribute_form($attribute, $value, $attr_info); } } $ldap->disconnect(); return $form; } function ldapdata_user_load(&$user) { global $ldap; // setup the global $ldap object if (!_ldapdata_ldap_init($user)) { return; } $mapping_type = _ldapdata_ldap_info($user, 'mapping_type'); // See http://drupal.org/node/91786 about user_node() // User can be edited by the user or by other authorized users. if ((!$user->ldap_authentified) || ($mapping_type == LDAP_MAP_NOTHING)) { return; } $bind_info = _ldapdata_edition($user); if (!$ldap->connect($bind_info[0], $bind_info[1])) { watchdog('user', "User load: user $user->name's data could not be read in the LDAP directory", WATCHDOG_WARNING); return; } $entry = $ldap->retrieveAttributes($user->ldap_dn); if ($entry) { $ldap_drupal_mappings = array_flip(_ldapdata_reverse_mappings($user->ldap_config)); foreach ($ldap_drupal_mappings as $ldap_attr => $drupal_field) { if (isset($user->$drupal_field) && $ldap_attr && $drupal_field != 'access') { if ($drupal_field != 'pass') { $user->$drupal_field = $entry[strtolower($ldap_attr)][0]; } } } ldapdata_user_profile_load($user); } $ldap->disconnect(); } function ldapdata_user_profile_load(&$user) { global $ldap; $ldap_drupal_reverse_mappings = _ldapdata_reverse_mappings($user->ldap_config); $ldap_drupal_mappings = array_flip($ldap_drupal_reverse_mappings); // Retrieve profile fields list $profile_fields = _ldapdata_retrieve_profile_fields(); // compare against mapped fields list $writeout = array(); $entry = $ldap->retrieveAttributes($user->ldap_dn); foreach ($profile_fields as $key => $field ) { if (in_array($key, $ldap_drupal_mappings)) { $writeout[$field] = $entry[strtolower($ldap_drupal_reverse_mappings[$key])][0]; } } // Write coincidences to Drupal DB foreach ($writeout as $field => $value) { $result = db_fetch_array(db_query("SELECT fid FROM {profile_fields} WHERE name = '%s'", $field)); $fid = $result['fid']; $uid = $user->uid; // does the user have a value for this field ? then update it : otherwise create it $result = db_fetch_array(db_query("SELECT value FROM {profile_values} WHERE fid = '%d' AND uid = '%d'", $fid, $uid)); if ($result) { db_query("UPDATE {profile_values} SET value = '%s' WHERE fid = '%d' AND uid = '%d'", $value, $fid, $uid); } else { db_query("INSERT INTO {profile_values} (value, fid, uid) VALUES ('%s', '%d', '%d')", $value, $fid, $uid); } } } function ldapdata_user_login(&$user) { global $ldap; // The whole point of implementing this hook is getting the // e-mail address written to the DB as soon as possible. // This is because it could not be written along with the rest // of the user info when the user was first created in // _ldapauth_ldap_login at the ldapauth module $mapping_type = _ldapdata_ldap_info($user, 'mapping_type'); if ((!$user->ldap_authentified) || ($mapping_type = LDAP_MAP_NOTHING)) { return; } $bind_info = _ldapdata_edition($user); if (!$ldap->connect($bind_info[0], $bind_info[1])) { watchdog('user', "User login: user $user->name's data could not be read in the LDAP directory", WATCHDOG_WARNING); return; } $entry = $ldap->retrieveAttributes($user->ldap_dn); $ldap->disconnect(); $d2l_mappings = _ldapdata_reverse_mappings($user->ldap_config); if (isset($d2l_mappings['mail'])) { $mail_attr = strtolower($d2l_mappings['mail']); $mail = $entry[$mail_attr][0]; if ($mail != $user->mail) { user_save($user, array('mail' => $mail)); } } } function ldapdata_user_update(&$edit, &$user, $category) { global $ldap; if (!$user->ldap_authentified) { return; } // Three cases here: // 1. User logged on and editing his LDAP entry attributes ($category == LDAP_CATEGORY_USER_DATA). // 2. User logged on and editing his Drupal account settings ($category == 'account'). // 3. OBSOLETE FROM 4.7: Password lost and being updated (category == 'account'). // Additionally: // 4. User logged on and editing his profile.module fields ($category == *any*). $writeout = array(); // So, case 1 $editables = _ldapdata_ldap_info($user, 'ldapdata_rwattrs'); if ($category == LDAP_CATEGORY_USER_DATA && $editables) { $writeout = array_merge($writeout, ldapdata_user_update_ldap_attributes($edit, $user)); } // Cases 2 && 3 else if ($category == 'account') { $writeout = array_merge($writeout, ldapdata_user_update_drupal_account($edit, $user)); } // And now, case 4 $writeout = array_merge($writeout, ldapdata_user_update_profile($edit, $user)); if ($writeout) { $bind_info = _ldapdata_edition($user); if (!$ldap->connect($bind_info[0], $bind_info[1])) { watchdog('user', "User update: user $user->name's data could not be updated in the LDAP directory", WATCHDOG_NOTICE); return; } $ldap->writeAttributes($user->ldap_dn, $writeout); } $ldap->disconnect(); } function ldapdata_user_update_ldap_attributes(&$edit, &$user) { global $ldap; $writeout = array(); $editables = _ldapdata_ldap_info($user, 'ldapdata_rwattrs'); foreach ($edit as $edit_attr => $edit_val) { // Preventing a POST data injection: we check allowance to write value. if (array_search($edit_attr, $editables) !== FALSE) { $writeout[$edit_attr] = $edit_val; $edit[$edit_attr] = null; } } return $writeout; } function ldapdata_user_update_drupal_account(&$edit, &$user) { $ldap_config_name = $user->ldap_config; // we do this as opposed to calling _ldapdata_ldap_info() to save on the multiple sql queries $result = db_fetch_array(db_query("SELECT ldapdata_mappings, encrypted FROM {ldapauth} WHERE name = '%s'", $ldap_config_name)); $mappings = unserialize($result['ldapdata_mappings']); $mapping_type = $mappings['access']; $encr = $result['encrypted']; $account_updated_in_ldap = ($mapping_type == LDAP_MAP_ATTRIBUTES); $writeout = array(); if ($user->ldap_dn && $account_updated_in_ldap) { // Case 2: updating account data $d2l_map = _ldapdata_reverse_mappings($user->ldap_config); foreach ($edit as $key => $value) { $ldap_attr = $d2l_map[$key]; if ($ldap_attr) { if ($key == 'pass') { if ($value) { $pw = $encr ? '{md5}' . base64_encode(pack('H*', md5($value))) : $value; $writeout[$ldap_attr] = $pw; } // If authentication is being done in "LDAP only" mode, passwords // should not be written to the database, or users would be able // to log in even after removing their LDAP entry if (variable_get('ldap_login_process', LDAP_FIRST_LDAP) == LDAP_FIRST_LDAP) { $edit['pass'] = null; } } else { $writeout[$ldap_attr] = $value; } } } } return $writeout; } function ldapdata_user_update_profile(&$edit, &$user) { $mapping_type = _ldapdata_ldap_info($user, 'mapping_type'); if ($mapping_type != LDAP_MAP_ATTRIBUTES) { return array(); } $ldap_drupal_reverse_mappings = _ldapdata_reverse_mappings($user->ldap_config); // Retrieve profile fields list $profile_fields = _ldapdata_retrieve_profile_fields(); // Compare against $edit list $writeout = array(); foreach ($profile_fields as $key => $field) { if (isset($edit[$field]) && isset($ldap_drupal_reverse_mappings[$key])) { $writeout[$ldap_drupal_reverse_mappings[$key]] = $edit[$field]; } } return $writeout; } function ldapdata_user_view(&$user) { global $ldap, $ldap_attributes; if (!$user->ldap_authentified) { return; } $bind_info = _ldapdata_edition($user); if (!$ldap->connect($bind_info[0], $bind_info[1])) { watchdog('user', "User view: user $user->name's data could not be read in the LDAP directory", WATCHDOG_WARNING); return; } $entry = $ldap->retrieveAttributes($user->ldap_dn); $ret = array(); $allowed_attrs = _ldapdata_ldap_info($user, 'ldapdata_roattrs'); if ($allowed_attrs) { foreach($allowed_attrs as $attribute) { $item = array(); $item['title'] = $ldap_attributes[$attribute][2]; $item['value'] = theme('ldapdata_ldap_attribute', $entry[strtolower($attribute)][0], $ldap_attributes[$attribute][0]); $item['class'] = 'attribute'; $ret[LDAP_SETTINGS_GROUP_STRING][] = $item; } } $ldap->disconnect(); return $ret; } /********************************* * 3. Auxiliary functions * *********************************/ function _ldapdata_attribute_form($attrname, $value, $info) { $type = array_shift($info); switch($type) { case 'textfield': $form = array( '#type' => 'textfield', '#title' => array_shift($info), '#default_value' => $value, '#size' => array_shift($info), '#maxlength' => array_shift($info), '#description' => array_shift($info), '#attributes' => array_shift($info), '#required' => array_shift($info), ); break; case 'password': // TODO: fix this $form = array( '#type' => 'password', '#title' => array_shift($info), '#default_value' => $value, '#size' => array_shift($info), '#maxlength' => array_shift($info), '#description' => array_shift($info), ); break; } return $form; } function _ldapdata_retrieve_profile_fields() { $sql = 'SELECT * FROM {profile_fields}'; $result = db_query($sql); $fields = array(); while ($row = db_fetch_object($result)) { $fields[$row->fid] = $row->name; } return $fields; } function _ldapdata_retrieve_standard_user_fields() { // pablom - // This commented code below would return all possible values, // but maybe that's not appropriate. // // $result = db_query('SHOW COLUMNS FROM {users}'); // // $fields = array(); // while ($row = db_fetch_object($result)) { // $fields[] = $row->Field; // } // Rather, I'll use my benevolent dictator powers // to return only sensible ones $fields['mail'] = 'mail'; $fields['pass'] = 'pass'; $fields['signature'] = 'signature'; return $fields; } function _ldapdata_reverse_mappings($config) { $ret = array(); $result = db_fetch_array(db_query("SELECT ldapdata_mappings FROM {ldapauth} WHERE name = '%s'", $config)); $mappings = unserialize($result['ldapdata_mappings']); if (is_array($mappings)) { foreach ($mappings as $key => $value) { $drupal_key = preg_replace('/^ldap_amap-(.*)$/', '$1', $key); $ldap_attr = $value; if ($drupal_key && $ldap_attr) { $ret[$drupal_key] = $ldap_attr; } } } return $ret; } function _ldapdata_edition(&$user) { $ldap_config_name = $user->ldap_config; $ret[] = array('',''); $result = db_fetch_array(db_query("SELECT ldapdata_binddn, ldapdata_bindpw FROM {ldapauth} WHERE name = '%s'", $ldap_config_name)); $dn = $result['ldapdata_binddn']; $pass = $result['ldapdata_bindpw']; if ($dn) { $ret[0] = $dn; } else { $ret[0] = isset($_SESSION['ldap_login']['dn']) ? $_SESSION['ldap_login']['dn'] : ''; } if ($pass) { $ret[1] = $pass; } else { $ret[1] = isset($_SESSION['ldap_login']['pass']) ? $_SESSION['ldap_login']['pass'] : ''; } return $ret; } function _ldapdata_ldap_info(&$user, $req ) { $ldap_config_name = $user->ldap_config; $ret = null; if (!$ldap_config_name) { $ret = null; } $result = db_fetch_array(db_query("SELECT * FROM {ldapauth} WHERE name = '%s'", $ldap_config_name)); switch ($req) { case 'mapping_type': $mappings = unserialize($result['ldapdata_mappings']); $ret = $mappings['access']; break; case 'ldapdata_roattrs': $ret = unserialize($result['ldapdata_roattrs']); break; case 'ldapdata_rwattrs': $ret = unserialize($result['ldapdata_rwattrs']); break; case 'ldapdata_binddn': $ret = $result['ldapdata_binddn']; break; case 'ldapdata_bindpw': $ret = $result['ldapdata_bindpw']; break; case 'encrypted': $ret = $result['encrypted']; break; default: $ret = null; break; } return $ret; } function _ldapdata_ldap_init(&$user) { global $ldap; if ($row = db_fetch_object(db_query("SELECT * FROM {ldapauth} WHERE status = '%s' AND name = '%s'", 1, $user->ldap_config))) { $ldap = new LDAPInterface(); $ldap->setOption('name', $row->name); $ldap->setOption('server', $row->server); $ldap->setOption('port', $row->port); $ldap->setOption('tls', $row->tls); $ldap->setOption('encrypted', $row->encrypted); $ldap->setOption('basedn', $row->basedn); $ldap->setOption('user_attr', $row->user_attr); return $ldap; } else { return; } } /********************************* * 4. Themes * *********************************/ function theme_ldapdata_ldap_attribute($value, $type) { switch($type) { case 'url': $ret = strpos($value, '://') ? $value : "http://$value"; $ret = "$ret"; break; case 'txt': default: $ret = $value; break; } return $ret; } ?>