aboutsummaryrefslogtreecommitdiffstats
path: root/apps/user_ldap/lib
diff options
context:
space:
mode:
authorCôme Chilliet <come.chilliet@nextcloud.com>2024-04-16 16:57:21 +0200
committerCôme Chilliet <come.chilliet@nextcloud.com>2024-04-16 16:57:21 +0200
commitd546b9ffb9cfa350eee51dcac0e3066357282265 (patch)
tree5d96990a65149408789ceeae9a385a5ada9a3eb3 /apps/user_ldap/lib
parent10fc78a9ea0d8a2081c1185f8f4c4b63b631d88e (diff)
downloadnextcloud-server-d546b9ffb9cfa350eee51dcac0e3066357282265.tar.gz
nextcloud-server-d546b9ffb9cfa350eee51dcac0e3066357282265.zip
feat(user_ldap): Add setup check to verify connection configuration
Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
Diffstat (limited to 'apps/user_ldap/lib')
-rw-r--r--apps/user_ldap/lib/AppInfo/Application.php2
-rw-r--r--apps/user_ldap/lib/SetupChecks/LdapConnection.php111
2 files changed, 113 insertions, 0 deletions
diff --git a/apps/user_ldap/lib/AppInfo/Application.php b/apps/user_ldap/lib/AppInfo/Application.php
index e46d77b8066..4d8a11caf3c 100644
--- a/apps/user_ldap/lib/AppInfo/Application.php
+++ b/apps/user_ldap/lib/AppInfo/Application.php
@@ -40,6 +40,7 @@ use OCA\User_LDAP\ILDAPWrapper;
use OCA\User_LDAP\LDAP;
use OCA\User_LDAP\LoginListener;
use OCA\User_LDAP\Notification\Notifier;
+use OCA\User_LDAP\SetupChecks\LdapConnection;
use OCA\User_LDAP\SetupChecks\LdapInvalidUuids;
use OCA\User_LDAP\User\Manager;
use OCA\User_LDAP\User_Proxy;
@@ -118,6 +119,7 @@ class Application extends App implements IBootstrap {
);
$context->registerEventListener(PostLoginEvent::class, LoginListener::class);
$context->registerSetupCheck(LdapInvalidUuids::class);
+ $context->registerSetupCheck(LdapConnection::class);
}
public function boot(IBootContext $context): void {
diff --git a/apps/user_ldap/lib/SetupChecks/LdapConnection.php b/apps/user_ldap/lib/SetupChecks/LdapConnection.php
new file mode 100644
index 00000000000..63877ff06ae
--- /dev/null
+++ b/apps/user_ldap/lib/SetupChecks/LdapConnection.php
@@ -0,0 +1,111 @@
+<?php
+
+declare(strict_types=1);
+
+/**
+ * @copyright Copyright (c) 2024 Côme Chilliet <come.chilliet@nextcloud.com>
+ *
+ * @author Côme Chilliet <come.chilliet@nextcloud.com>
+ *
+ * @license GNU AGPL version 3 or any later version
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU Affero General Public License as
+ * published by the Free Software Foundation, either version 3 of the
+ * License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU Affero General Public License for more details.
+ *
+ * You should have received a copy of the GNU Affero General Public License
+ * along with this program. If not, see <https://www.gnu.org/licenses/>.
+ *
+ */
+
+namespace OCA\User_LDAP\SetupChecks;
+
+use OCA\User_LDAP\AccessFactory;
+use OCA\User_LDAP\ConnectionFactory;
+use OCA\User_LDAP\Helper;
+use OCP\IL10N;
+use OCP\SetupCheck\ISetupCheck;
+use OCP\SetupCheck\SetupResult;
+
+class LdapConnection implements ISetupCheck {
+ public function __construct(
+ private IL10N $l10n,
+ private Helper $helper,
+ private ConnectionFactory $connectionFactory,
+ private AccessFactory $accessFactory,
+ ) {
+ }
+
+ public function getCategory(): string {
+ return 'ldap';
+ }
+
+ public function getName(): string {
+ return $this->l10n->t('LDAP Connection');
+ }
+
+ public function run(): SetupResult {
+ $availableConfigs = $this->helper->getServerConfigurationPrefixes();
+ $inactiveConfigurations = [];
+ $bindFailedConfigurations = [];
+ $searchFailedConfigurations = [];
+ foreach ($availableConfigs as $configID) {
+ $connection = $this->connectionFactory->get($configID);
+ if (!$connection->ldapConfigurationActive) {
+ $inactiveConfigurations[] = $configID;
+ continue;
+ }
+ if (!$connection->bind()) {
+ $bindFailedConfigurations[] = $configID;
+ continue;
+ }
+ $access = $this->accessFactory->get($connection);
+ $result = $access->countObjects(1);
+ if (!is_int($result) || ($result <= 0)) {
+ $searchFailedConfigurations[] = $configID;
+ }
+ }
+ $output = '';
+ if (!empty($bindFailedConfigurations)) {
+ $output .= $this->l10n->n(
+ 'Binding failed for this LDAP configuration: %s',
+ 'Binding failed for these LDAP configurations: %s',
+ count($bindFailedConfigurations),
+ [implode(',', $bindFailedConfigurations)]
+ )."\n";
+ }
+ if (!empty($searchFailedConfigurations)) {
+ $output .= $this->l10n->n(
+ 'Searching failed for this LDAP configuration: %s',
+ 'Searching failed for these LDAP configurations: %s',
+ count($searchFailedConfigurations),
+ [implode(',', $searchFailedConfigurations)]
+ )."\n";
+ }
+ if (!empty($inactiveConfigurations)) {
+ $output .= $this->l10n->n(
+ 'There is an inactive LDAP configuration: %s',
+ 'There are inactive LDAP configurations: %s',
+ count($inactiveConfigurations),
+ [implode(',', $inactiveConfigurations)]
+ )."\n";
+ }
+ if (!empty($bindFailedConfigurations) || !empty($searchFailedConfigurations)) {
+ return SetupResult::error($output);
+ } elseif (!empty($inactiveConfigurations)) {
+ return SetupResult::warning($output);
+ }
+ return SetupResult::success($this->l10n->n(
+ 'Binding and searching works on the configured LDAP connection (%s)',
+ 'Binding and searching works on all of the configured LDAP connections (%s)',
+ count($availableConfigs),
+ [implode(',', $availableConfigs)]
+ ));
+ }
+}