mirror of
https://github.com/bklang/ldap2dns.git
synced 2025-10-27 22:34:18 -04:00
Preparing for ldap2dns-0.3.6
+ Fixed bug with duplicate OIDs in dns.schema from partially applied patch + Renamed schema file to ldap2dns.schema + Updated RPM specfile (UNTESTED, may need editing) + Removed already merged patchfiles + Restructured file layout, created doc directory + Deprecated unfinished webadmin work. Will be replaced with Beatnik + Deprecated OpenLDAP 2.0 schema support + Deprecated djbdns-1.0.5 native LDAP patch (status of patch unknown) + Removed old index.html + Removed TODO.schema + Updated Makefile git-svn-id: https://svn.alkaloid.net/gpl/ldap2dns/trunk@124 06cd67b6-e706-0410-b29e-9de616bca6e9
This commit is contained in:
81
deprecated/webadmin/common.inc
Normal file
81
deprecated/webadmin/common.inc
Normal file
@@ -0,0 +1,81 @@
|
||||
<?
|
||||
// $Id: common.inc,v 1.5 2002/08/13 12:20:21 tis Exp $
|
||||
// common functions used by dns and portal-admin
|
||||
|
||||
function connect_ldap()
|
||||
{
|
||||
global $ldap, $binddn, $LDAPHOST, $BINDBASE, $BINDUID, $PHP_AUTH_USER, $PHP_AUTH_PW;
|
||||
$binddn = "$BINDUID=$PHP_AUTH_USER,$BINDBASE";
|
||||
$ldap = ldap_connect($LDAPHOST);
|
||||
if ($ldap) {
|
||||
if (!$PHP_AUTH_PW || !@ldap_bind($ldap, $binddn, $PHP_AUTH_PW)) {
|
||||
header("WWW-Authenticate: Basic realm=\"Bind to 1 ldap://$LDAPHOST/$binddn\"");
|
||||
header("HTTP/1.0 401 Unauthorized");
|
||||
exit;
|
||||
}
|
||||
} else {
|
||||
die("Unable to connect to LDAP host: $LDAPHOST");
|
||||
}
|
||||
}
|
||||
|
||||
function error_confirm($errmsg)
|
||||
{
|
||||
print "<CENTER><BR><h2><FONT color='red'>$errmsg</FONT></h2><BR>\n";
|
||||
log_action("error: ".$errmsg);
|
||||
}
|
||||
|
||||
function log_action($errmsg)
|
||||
{
|
||||
global $LOGFILE, $REMOTE_ADDR, $PHP_AUTH_USER;
|
||||
$fd = fopen("$LOGFILE", "a");
|
||||
fwrite($fd, "[".date("H:i:s d/M/Y")."] $PHP_AUTH_USER@$REMOTE_ADDR $errmsg\n");
|
||||
fclose($fd);
|
||||
}
|
||||
|
||||
# Use this function to determine contraints on objects and returns a set
|
||||
# of characters with the following meaning:
|
||||
# o: binddn owns the object
|
||||
# a: binddn is administrator
|
||||
# m: binddn is member
|
||||
function check_constraint($dn = "")
|
||||
{
|
||||
global $ldap, $binddn, $BASEDN;
|
||||
$result = "";
|
||||
$num_owners = 0;
|
||||
if (strlen($dn)>0) {
|
||||
// get owners for this object
|
||||
$query = ldap_read($ldap, $dn, "(objectclass=*)", array("owner"));
|
||||
$entries = ldap_get_entries($ldap, $query);
|
||||
ldap_free_result($query);
|
||||
$num_owners = $entries[0][owner][count];
|
||||
for ($i = 0; $i<$num_owners; $i++) {
|
||||
if ($entries[0][owner][$i]==$binddn) {
|
||||
$result .= "o";
|
||||
$num_owners = 0;
|
||||
}
|
||||
}
|
||||
}
|
||||
// get administrators for BASEDN
|
||||
$query = ldap_read($ldap, $BASEDN, "(objectclass=*)", array("administrator", "member"));
|
||||
$entries = ldap_get_entries($ldap, $query);
|
||||
ldap_free_result($query);
|
||||
for ($i = 0; $i<$entries[0][administrator][count]; $i++) {
|
||||
if ($entries[0][administrator][$i]==$binddn) {
|
||||
$result .= "a";
|
||||
break;
|
||||
}
|
||||
}
|
||||
if ($num_owners==0) {
|
||||
// only objects owned by nobody except binddn are granted to members
|
||||
for ($i = 0; $i<$entries[0][member][count]; $i++) {
|
||||
if ($entries[0][member][$i]==$binddn) {
|
||||
$result .= "m";
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
print "<!-- dn: $dn constraint: $result -->";
|
||||
return $result;
|
||||
}
|
||||
|
||||
?>
|
||||
Reference in New Issue
Block a user