2024-05-14 00:36:54 +03:00
|
|
|
<?php defined('BASEPATH') or exit('No direct script access allowed');
|
|
|
|
|
|
|
|
/* ----------------------------------------------------------------------------
|
|
|
|
* Easy!Appointments - Online Appointment Scheduler
|
|
|
|
*
|
|
|
|
* @package EasyAppointments
|
|
|
|
* @author A.Tselegidis <alextselegidis@gmail.com>
|
|
|
|
* @copyright Copyright (c) Alex Tselegidis
|
|
|
|
* @license https://opensource.org/licenses/GPL-3.0 - GPLv3
|
|
|
|
* @link https://easyappointments.org
|
2024-05-14 11:37:43 +03:00
|
|
|
* @since v1.5.0
|
2024-05-14 00:36:54 +03:00
|
|
|
* ---------------------------------------------------------------------------- */
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Ldap_client library.
|
|
|
|
*
|
|
|
|
* Handles LDAP related functionality.
|
|
|
|
*
|
|
|
|
* @package Libraries
|
|
|
|
*/
|
|
|
|
class Ldap_client
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* @var EA_Controller|CI_Controller
|
|
|
|
*/
|
|
|
|
protected EA_Controller|CI_Controller $CI;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Ldap_client constructor.
|
|
|
|
*/
|
|
|
|
public function __construct()
|
|
|
|
{
|
|
|
|
$this->CI = &get_instance();
|
|
|
|
|
|
|
|
$this->CI->load->model('roles_model');
|
|
|
|
|
|
|
|
$this->CI->load->library('timezones');
|
|
|
|
$this->CI->load->library('accounts');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Validate the provided password with an LDAP hashed password.
|
|
|
|
*
|
|
|
|
* @param string $password
|
|
|
|
* @param string $hashed_password
|
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function validate_password(string $password, string $hashed_password): bool
|
|
|
|
{
|
|
|
|
if (empty($hashed_password) || ($hashed_password[0] !== '{' && $password === $hashed_password)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (str_starts_with($hashed_password, '{MD5}')) {
|
|
|
|
$encrypted_password = '{MD5}' . base64_encode(md5($password, true));
|
|
|
|
} elseif (str_starts_with($hashed_password, '{SHA1}')) {
|
|
|
|
$encrypted_password = '{SHA}' . base64_encode(sha1($password, true));
|
|
|
|
} elseif (str_starts_with($hashed_password, '{SSHA}')) {
|
|
|
|
$salt = substr(base64_decode(substr($hashed_password, 6)), 20);
|
|
|
|
$encrypted_password = '{SSHA}' . base64_encode(sha1($password . $salt, true) . $salt);
|
|
|
|
} else {
|
|
|
|
throw new RuntimeException('Unsupported password hash format');
|
|
|
|
}
|
|
|
|
|
|
|
|
return $hashed_password === $encrypted_password;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Try authenticating the user with LDAP
|
|
|
|
*
|
|
|
|
* @param string $username
|
|
|
|
* @param string $password
|
|
|
|
*
|
|
|
|
* @return array|null
|
|
|
|
*
|
|
|
|
* @throws Exception
|
|
|
|
*/
|
|
|
|
public function check_login(string $username, string $password): ?array
|
|
|
|
{
|
|
|
|
if (empty($username)) {
|
|
|
|
throw new InvalidArgumentException('No username value provided.');
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check LDAP environment and configuration
|
|
|
|
|
2024-05-20 12:57:54 +03:00
|
|
|
$this->check_environment();
|
2024-05-14 00:36:54 +03:00
|
|
|
|
|
|
|
$ldap_is_active = setting('ldap_is_active');
|
|
|
|
|
|
|
|
if (!$ldap_is_active) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Match user by username
|
|
|
|
|
|
|
|
$user = $this->CI->accounts->get_user_by_username($username);
|
|
|
|
|
|
|
|
if (empty($user['ldap_dn'])) {
|
2024-06-01 16:35:57 +03:00
|
|
|
return null; // User does not exist in Easy!Appointments
|
2024-05-14 00:36:54 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Connect to LDAP server
|
|
|
|
|
2024-06-01 16:35:57 +03:00
|
|
|
$ldap_host = setting('ldap_host');
|
|
|
|
$ldap_port = (int) setting('ldap_port');
|
2024-05-14 00:36:54 +03:00
|
|
|
|
2024-06-01 16:35:57 +03:00
|
|
|
$connection = @ldap_connect($ldap_host, $ldap_port);
|
2024-05-14 00:36:54 +03:00
|
|
|
|
2024-06-01 16:35:57 +03:00
|
|
|
$user_bind = @ldap_bind($connection, $user['ldap_dn'], $password);
|
2024-05-14 00:36:54 +03:00
|
|
|
|
2024-06-01 16:35:57 +03:00
|
|
|
if ($user_bind) {
|
2024-05-14 00:36:54 +03:00
|
|
|
$role = $this->CI->roles_model->find($user['id_roles']);
|
|
|
|
|
|
|
|
$default_timezone = $this->CI->timezones->get_default_timezone();
|
|
|
|
|
|
|
|
return [
|
|
|
|
'user_id' => $user['id'],
|
|
|
|
'user_email' => $user['email'],
|
|
|
|
'username' => $username,
|
|
|
|
'timezone' => !empty($user['timezone']) ? $user['timezone'] : $default_timezone,
|
|
|
|
'language' => !empty($user['language']) ? $user['language'] : Config::LANGUAGE,
|
|
|
|
'role_slug' => $role['slug'],
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Search the LDAP server based on the provided keyword and configuration.
|
|
|
|
*
|
|
|
|
* @param string $keyword
|
|
|
|
*
|
|
|
|
* @return array
|
|
|
|
*
|
|
|
|
* @throws Exception
|
|
|
|
*/
|
|
|
|
public function search(string $keyword): array
|
|
|
|
{
|
2024-05-20 12:57:54 +03:00
|
|
|
$this->check_environment();
|
|
|
|
|
2024-05-14 00:36:54 +03:00
|
|
|
$host = setting('ldap_host');
|
|
|
|
$port = (int) setting('ldap_port');
|
|
|
|
$user_dn = setting('ldap_user_dn');
|
|
|
|
$password = setting('ldap_password');
|
|
|
|
$base_dn = setting('ldap_base_dn');
|
|
|
|
$filter = setting('ldap_filter');
|
|
|
|
|
2024-05-20 12:57:54 +03:00
|
|
|
$connection = @ldap_connect($host, $port);
|
2024-05-14 00:36:54 +03:00
|
|
|
|
|
|
|
if (!$connection) {
|
2024-05-20 12:57:54 +03:00
|
|
|
throw new Exception('Could not connect to LDAP server: ' . @ldap_error($connection));
|
2024-05-14 00:36:54 +03:00
|
|
|
}
|
|
|
|
|
2024-05-20 12:57:54 +03:00
|
|
|
@ldap_set_option($connection, LDAP_OPT_PROTOCOL_VERSION, 3);
|
|
|
|
@ldap_set_option($connection, LDAP_OPT_REFERRALS, 0); // We need this for doing an LDAP search.
|
2024-05-14 00:36:54 +03:00
|
|
|
|
2024-05-20 12:57:54 +03:00
|
|
|
$bind = @ldap_bind($connection, $user_dn, $password);
|
2024-05-14 00:36:54 +03:00
|
|
|
|
|
|
|
if (!$bind) {
|
2024-05-20 12:57:54 +03:00
|
|
|
throw new Exception('LDAP bind failed: ' . @ldap_error($connection));
|
2024-05-14 00:36:54 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
$wildcard_keyword = !empty($keyword) ? '*' . $keyword . '*' : '*';
|
|
|
|
|
|
|
|
$interpolated_filter = str_replace('{{KEYWORD}}', $wildcard_keyword, $filter);
|
|
|
|
|
2024-05-20 12:57:54 +03:00
|
|
|
$result = @ldap_search($connection, $base_dn, $interpolated_filter);
|
2024-05-14 00:36:54 +03:00
|
|
|
|
|
|
|
if (!$result) {
|
2024-05-20 12:57:54 +03:00
|
|
|
throw new Exception('Search failed: ' . @ldap_error($connection));
|
2024-05-14 00:36:54 +03:00
|
|
|
}
|
|
|
|
|
2024-05-20 12:57:54 +03:00
|
|
|
$ldap_entries = @ldap_get_entries($connection, $result);
|
2024-05-14 00:36:54 +03:00
|
|
|
|
|
|
|
// Flatten the LDAP entries so that they become easier to import
|
|
|
|
|
|
|
|
$entries = [];
|
|
|
|
|
|
|
|
foreach ($ldap_entries as $ldap_entry) {
|
|
|
|
if (!is_array($ldap_entry)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
$entry = [
|
|
|
|
'dn' => $ldap_entry['dn'],
|
|
|
|
];
|
|
|
|
|
|
|
|
foreach ($ldap_entry as $key => $value) {
|
2024-06-01 14:22:15 +03:00
|
|
|
if (!is_array($value) || !in_array($key, LDAP_WHITELISTED_ATTRIBUTES)) {
|
2024-05-14 00:36:54 +03:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
$entry[$key] = $value[0] ?? null;
|
|
|
|
}
|
|
|
|
|
|
|
|
$entries[] = $entry;
|
|
|
|
}
|
|
|
|
|
|
|
|
return $entries;
|
|
|
|
}
|
2024-05-20 12:57:54 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Check if the ldap extension is installed
|
|
|
|
*
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
private function check_environment(): void
|
|
|
|
{
|
|
|
|
if (!extension_loaded('ldap')) {
|
|
|
|
throw new RuntimeException('The LDAP extension is not loaded.');
|
|
|
|
}
|
|
|
|
}
|
2024-05-14 00:36:54 +03:00
|
|
|
}
|