Project

General

Profile

Download (25.2 KB) Statistics
| Branch: | Tag: | Revision:
1
<?php
2
/*
3
	system_usermanager.php
4
*/
5
/* ====================================================================
6
 *	Copyright (c)  2004-2015  Electric Sheep Fencing, LLC. All rights reserved.
7
 *	Copyright (c)  2008 Shrew Soft Inc.
8
 *	Copyright (c)  2005 Paul Taylor <paultaylor@winn-dixie.com>
9
 *
10
 *	Some or all of this file is based on the m0n0wall project which is
11
 *	Copyright (c)  2004 Manuel Kasper (BSD 2 clause)
12
 *
13
 *	Redistribution and use in source and binary forms, with or without modification,
14
 *	are permitted provided that the following conditions are met:
15
 *
16
 *	1. Redistributions of source code must retain the above copyright notice,
17
 *		this list of conditions and the following disclaimer.
18
 *
19
 *	2. Redistributions in binary form must reproduce the above copyright
20
 *		notice, this list of conditions and the following disclaimer in
21
 *		the documentation and/or other materials provided with the
22
 *		distribution.
23
 *
24
 *	3. All advertising materials mentioning features or use of this software
25
 *		must display the following acknowledgment:
26
 *		"This product includes software developed by the pfSense Project
27
 *		 for use in the pfSense software distribution. (http://www.pfsense.org/).
28
 *
29
 *	4. The names "pfSense" and "pfSense Project" must not be used to
30
 *		 endorse or promote products derived from this software without
31
 *		 prior written permission. For written permission, please contact
32
 *		 coreteam@pfsense.org.
33
 *
34
 *	5. Products derived from this software may not be called "pfSense"
35
 *		nor may "pfSense" appear in their names without prior written
36
 *		permission of the Electric Sheep Fencing, LLC.
37
 *
38
 *	6. Redistributions of any form whatsoever must retain the following
39
 *		acknowledgment:
40
 *
41
 *	"This product includes software developed by the pfSense Project
42
 *	for use in the pfSense software distribution (http://www.pfsense.org/).
43
 *
44
 *	THIS SOFTWARE IS PROVIDED BY THE pfSense PROJECT ``AS IS'' AND ANY
45
 *	EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
46
 *	IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
47
 *	PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE pfSense PROJECT OR
48
 *	ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
49
 *	SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
50
 *	NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
51
 *	LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
52
 *	HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
53
 *	STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
54
 *	ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
55
 *	OF THE POSSIBILITY OF SUCH DAMAGE.
56
 *
57
 *	====================================================================
58
 *
59
 */
60

    
61
##|+PRIV
62
##|*IDENT=page-system-usermanager
63
##|*NAME=System: User Manager
64
##|*DESCR=Allow access to the 'System: User Manager' page.
65
##|*MATCH=system_usermanager.php*
66
##|-PRIV
67

    
68
require("certs.inc");
69
require("guiconfig.inc");
70

    
71
// start admin user code
72
if (isset($_POST['userid']) && is_numericint($_POST['userid'])) {
73
	$id = $_POST['userid'];
74
}
75

    
76
if (isset($_GET['userid']) && is_numericint($_GET['userid'])) {
77
	$id = $_GET['userid'];
78
}
79

    
80
if (!isset($config['system']['user']) || !is_array($config['system']['user'])) {
81
	$config['system']['user'] = array();
82
}
83

    
84
$a_user = &$config['system']['user'];
85
$act = $_GET['act'];
86

    
87
if (isset($_SERVER['HTTP_REFERER'])) {
88
	$referer = $_SERVER['HTTP_REFERER'];
89
} else {
90
	$referer = '/system_usermanager.php';
91
}
92

    
93
if (isset($id) && $a_user[$id]) {
94
	$pconfig['usernamefld'] = $a_user[$id]['name'];
95
	$pconfig['descr'] = $a_user[$id]['descr'];
96
	$pconfig['expires'] = $a_user[$id]['expires'];
97
	$pconfig['groups'] = local_user_get_groups($a_user[$id]);
98
	$pconfig['utype'] = $a_user[$id]['scope'];
99
	$pconfig['uid'] = $a_user[$id]['uid'];
100
	$pconfig['authorizedkeys'] = base64_decode($a_user[$id]['authorizedkeys']);
101
	$pconfig['priv'] = $a_user[$id]['priv'];
102
	$pconfig['ipsecpsk'] = $a_user[$id]['ipsecpsk'];
103
	$pconfig['disabled'] = isset($a_user[$id]['disabled']);
104
}
105

    
106
if ($_GET['act'] == "deluser") {
107

    
108
	if (!isset($_GET['username']) || !isset($a_user[$id]) || ($_GET['username'] != $a_user[$id]['name'])) {
109
		pfSenseHeader("system_usermanager.php");
110
		exit;
111
	}
112

    
113
	conf_mount_rw();
114
	local_user_del($a_user[$id]);
115
	conf_mount_ro();
116
	$userdeleted = $a_user[$id]['name'];
117
	unset($a_user[$id]);
118
	write_config();
119
	$savemsg = sprintf(gettext("User %s successfully deleted."), $userdeleted);
120
} else if ($act == "new") {
121
	/*
122
	 * set this value cause the text field is read only
123
	 * and the user should not be able to mess with this
124
	 * setting.
125
	 */
126
	$pconfig['utype'] = "user";
127
	$pconfig['lifetime'] = 3650;
128
}
129

    
130
if (isset($_POST['dellall'])) {
131

    
132
	$del_users = $_POST['delete_check'];
133

    
134
	if (!empty($del_users)) {
135
		foreach ($del_users as $userid) {
136
			if (isset($a_user[$userid]) && $a_user[$userid]['scope'] != "system") {
137
				conf_mount_rw();
138
				local_user_del($a_user[$userid]);
139
 			    conf_mount_ro();
140
				unset($a_user[$userid]);
141
			}
142
		}
143
		$savemsg = gettext("Selected users removed successfully.");
144
		write_config($savemsg);
145
	}
146
}
147

    
148
if ($_POST['act'] == "delcert") {
149

    
150
	if (!$a_user[$id]) {
151
		pfSenseHeader("system_usermanager.php");
152
		exit;
153
	}
154

    
155
	$certdeleted = lookup_cert($a_user[$id]['cert'][$_POST['certid']]);
156
	$certdeleted = $certdeleted['descr'];
157
	unset($a_user[$id]['cert'][$_POST['certid']]);
158
	write_config();
159
	$_POST['act'] = "edit";
160
	$savemsg = sprintf(gettext("Certificate %s association removed."), $certdeleted);
161
}
162

    
163
if ($_POST['act'] == "delprivid") {
164
	$privdeleted = $priv_list[$a_user[$id]['priv'][$_POST['privid']]]['name'];
165
	unset($a_user[$id]['priv'][$_POST['privid']]);
166
	local_user_set($a_user[$id]);
167
	write_config();
168
	$_POST['act'] = "edit";
169
	$savemsg = sprintf(gettext("Privilege %s removed."), $privdeleted);
170
}
171

    
172
if ($_POST['save']) {
173
	unset($input_errors);
174
	$pconfig = $_POST;
175

    
176
	/* input validation */
177
	if (isset($id) && ($a_user[$id])) {
178
		$reqdfields = explode(" ", "usernamefld");
179
		$reqdfieldsn = array(gettext("Username"));
180
	} else {
181
		if (empty($_POST['name'])) {
182
			$reqdfields = explode(" ", "usernamefld passwordfld1");
183
			$reqdfieldsn = array(
184
				gettext("Username"),
185
				gettext("Password"));
186
		} else {
187
			$reqdfields = explode(" ", "usernamefld passwordfld1 name caref keylen lifetime");
188
			$reqdfieldsn = array(
189
				gettext("Username"),
190
				gettext("Password"),
191
				gettext("Descriptive name"),
192
				gettext("Certificate authority"),
193
				gettext("Key length"),
194
				gettext("Lifetime"));
195
		}
196
	}
197

    
198
	do_input_validation($_POST, $reqdfields, $reqdfieldsn, $input_errors);
199

    
200
	if (preg_match("/[^a-zA-Z0-9\.\-_]/", $_POST['usernamefld'])) {
201
		$input_errors[] = gettext("The username contains invalid characters.");
202
	}
203

    
204
	if (strlen($_POST['usernamefld']) > 16) {
205
		$input_errors[] = gettext("The username is longer than 16 characters.");
206
	}
207

    
208
	if (($_POST['passwordfld1']) && ($_POST['passwordfld1'] != $_POST['passwordfld2'])) {
209
		$input_errors[] = gettext("The passwords do not match.");
210
	}
211

    
212
	if (isset($_POST['ipsecpsk']) && !preg_match('/^[[:ascii:]]*$/', $_POST['ipsecpsk'])) {
213
		$input_errors[] = gettext("IPsec Pre-Shared Key contains invalid characters.");
214
	}
215

    
216
	if (isset($id) && $a_user[$id]) {
217
		$oldusername = $a_user[$id]['name'];
218
	} else {
219
		$oldusername = "";
220
	}
221
	/* make sure this user name is unique */
222
	if (!$input_errors) {
223
		foreach ($a_user as $userent) {
224
			if ($userent['name'] == $_POST['usernamefld'] && $oldusername != $_POST['usernamefld']) {
225
				$input_errors[] = gettext("Another entry with the same username already exists.");
226
				break;
227
			}
228
		}
229
	}
230
	/* also make sure it is not reserved */
231
	if (!$input_errors) {
232
		$system_users = explode("\n", file_get_contents("/etc/passwd"));
233
		foreach ($system_users as $s_user) {
234
			$ent = explode(":", $s_user);
235
			if ($ent[0] == $_POST['usernamefld'] && $oldusername != $_POST['usernamefld']) {
236
				$input_errors[] = gettext("That username is reserved by the system.");
237
				break;
238
			}
239
		}
240
	}
241

    
242
	/*
243
	 * Check for a valid expiration date if one is set at all (valid means,
244
	 * DateTime puts out a time stamp so any DateTime compatible time
245
	 * format may be used. to keep it simple for the enduser, we only
246
	 * claim to accept MM/DD/YYYY as inputs. Advanced users may use inputs
247
	 * like "+1 day", which will be converted to MM/DD/YYYY based on "now".
248
	 * Otherwise such an entry would lead to an invalid expiration data.
249
	 */
250
	if ($_POST['expires']) {
251
		try {
252
			$expdate = new DateTime($_POST['expires']);
253
			//convert from any DateTime compatible date to MM/DD/YYYY
254
			$_POST['expires'] = $expdate->format("m/d/Y");
255
		} catch (Exception $ex) {
256
			$input_errors[] = gettext("Invalid expiration date format; use MM/DD/YYYY instead.");
257
		}
258
	}
259

    
260
	if (!empty($_POST['name'])) {
261
		$ca = lookup_ca($_POST['caref']);
262
		if (!$ca) {
263
			$input_errors[] = gettext("Invalid internal Certificate Authority") . "\n";
264
		}
265
	}
266

    
267
	/* if this is an AJAX caller then handle via JSON */
268
	if (isAjax() && is_array($input_errors)) {
269
		input_errors2Ajax($input_errors);
270
		exit;
271
	}
272

    
273
	if (!$input_errors) {
274

    
275
		conf_mount_rw();
276
		$userent = array();
277
		if (isset($id) && $a_user[$id]) {
278
			$userent = $a_user[$id];
279
		}
280

    
281
		isset($_POST['utype']) ? $userent['scope'] = $_POST['utype'] : $userent['scope'] = "system";
282

    
283
		/* the user name was modified */
284
		if (!empty($_POST['oldusername']) && ($_POST['usernamefld'] <> $_POST['oldusername'])) {
285
			$_SERVER['REMOTE_USER'] = $_POST['usernamefld'];
286
			local_user_del($userent);
287
		}
288

    
289
		/* the user password was modified */
290
		if ($_POST['passwordfld1']) {
291
			local_user_set_password($userent, $_POST['passwordfld1']);
292
		}
293

    
294
		/* only change description if sent */
295
		if (isset($_POST['descr'])) {
296
			$userent['descr'] = $_POST['descr'];
297
		}
298

    
299
		$userent['name'] = $_POST['usernamefld'];
300
		$userent['expires'] = $_POST['expires'];
301
		$userent['authorizedkeys'] = base64_encode($_POST['authorizedkeys']);
302
		$userent['ipsecpsk'] = $_POST['ipsecpsk'];
303

    
304
		if ($_POST['disabled']) {
305
			$userent['disabled'] = true;
306
		} else {
307
			unset($userent['disabled']);
308
		}
309

    
310
		if (isset($id) && $a_user[$id]) {
311
			$a_user[$id] = $userent;
312
		} else {
313
			if (!empty($_POST['name'])) {
314
				$cert = array();
315
				$cert['refid'] = uniqid();
316
				$userent['cert'] = array();
317

    
318
				$cert['descr'] = $_POST['name'];
319

    
320
				$subject = cert_get_subject_array($ca['crt']);
321

    
322
				$dn = array(
323
					'countryName' => $subject[0]['v'],
324
					'stateOrProvinceName' => $subject[1]['v'],
325
					'localityName' => $subject[2]['v'],
326
					'organizationName' => $subject[3]['v'],
327
					'emailAddress' => $subject[4]['v'],
328
					'commonName' => $userent['name']);
329

    
330
				cert_create($cert, $_POST['caref'], $_POST['keylen'],
331
					(int)$_POST['lifetime'], $dn);
332

    
333
				if (!is_array($config['cert'])) {
334
					$config['cert'] = array();
335
				}
336
				$config['cert'][] = $cert;
337
				$userent['cert'][] = $cert['refid'];
338
			}
339
			$userent['uid'] = $config['system']['nextuid']++;
340
			/* Add the user to All Users group. */
341
			foreach ($config['system']['group'] as $gidx => $group) {
342
				if ($group['name'] == "all") {
343
					if (!is_array($config['system']['group'][$gidx]['member'])) {
344
						$config['system']['group'][$gidx]['member'] = array();
345
					}
346
					$config['system']['group'][$gidx]['member'][] = $userent['uid'];
347
					break;
348
				}
349
			}
350

    
351
			$a_user[] = $userent;
352
		}
353

    
354
		/* Add user to groups so PHP can see the memberships properly or else the user's shell account does not get proper permissions (if applicable) See #5152. */
355
		local_user_set_groups($userent, $_POST['groups']);
356
		local_user_set($userent);
357
		/* Add user to groups again to ensure they are set everywhere, otherwise the user may not appear to be a member of the group. See commit:5372d26d9d25d751d16865ed9d46869d3b0ec5e1. */
358
		local_user_set_groups($userent, $_POST['groups']);
359
		write_config();
360

    
361
		if (is_dir("/etc/inc/privhooks")) {
362
			run_plugins("/etc/inc/privhooks");
363
		}
364

    
365
		conf_mount_ro();
366

    
367
		pfSenseHeader("system_usermanager.php");
368
	}
369
}
370

    
371
function build_priv_table() {
372
	global $a_user, $id;
373

    
374
	$privhtml = '<div class="table-responsive">';
375
	$privhtml .=	'<table class="table table-striped table-hover table-condensed">';
376
	$privhtml .=		'<thead>';
377
	$privhtml .=			'<tr>';
378
	$privhtml .=				'<th>' . gettext('Inherited from') . '</th>';
379
	$privhtml .=				'<th>' . gettext('Name') . '</th>';
380
	$privhtml .=				'<th>' . gettext('Description') . '</th>';
381
	$privhtml .=			'</tr>';
382
	$privhtml .=		'</thead>';
383
	$privhtml .=		'<tbody>';
384

    
385
	$i = 0;
386

    
387
	foreach (get_user_privdesc($a_user[$id]) as $priv) {
388
		$group = false;
389
		if ($priv['group']) {
390
			$group = $priv['group'];
391
		}
392

    
393
		$privhtml .=		'<tr>';
394
		$privhtml .=			'<td>' . htmlspecialchars($priv['group']) . '</td>';
395
		$privhtml .=			'<td>' . htmlspecialchars($priv['name']) . '</td>';
396
		$privhtml .=			'<td>' . htmlspecialchars($priv['descr']) . '</td>';
397
		$privhtml .=			'<td>';
398
		if (!$group) {
399
			$privhtml .=			'<a class="fa fa-trash no-confirm icon-pointer" title="' . gettext('Delete Privilege') . '" id="delprivid' . $i . '"></a></td>';
400
		}
401

    
402
		$privhtml .=			'</td>';
403
		$privhtml .=		'</tr>';
404

    
405
		if (!$group) {
406
			$i++;
407
		}
408
	}
409

    
410
	$privhtml .=		'</tbody>';
411
	$privhtml .=	'</table>';
412
	$privhtml .= '</div>';
413

    
414
	$privhtml .= '<nav class="action-buttons">';
415
	$privhtml .=	'<a href="system_usermanager_addprivs.php?userid=' . $id . '" class="btn btn-success">' . gettext("Add") . '</a>';
416
	$privhtml .= '</nav>';
417

    
418
	return($privhtml);
419
}
420

    
421
function build_cert_table() {
422
	global $a_user, $id;
423

    
424
	$certhtml = '<div class="table-responsive">';
425
	$certhtml .=	'<table class="table table-striped table-hover table-condensed">';
426
	$certhtml .=		'<thead>';
427
	$certhtml .=			'<tr>';
428
	$certhtml .=				'<th>' . gettext('Name') . '</th>';
429
	$certhtml .=				'<th>' . gettext('CA') . '</th>';
430
	$certhtml .=				'<th></th>';
431
	$certhtml .=			'</tr>';
432
	$certhtml .=		'</thead>';
433
	$certhtml .=		'<tbody>';
434

    
435
	$a_cert = $a_user[$id]['cert'];
436
	if (is_array($a_cert)) {
437
		$i = 0;
438
		foreach ($a_cert as $certref) {
439
			$cert = lookup_cert($certref);
440
			$ca = lookup_ca($cert['caref']);
441
			$revokedstr =	is_cert_revoked($cert) ? '<b> Revoked</b>':'';
442

    
443
			$certhtml .=	'<tr>';
444
			$certhtml .=		'<td>' . htmlspecialchars($cert['descr']) . $revokedstr . '</td>';
445
			$certhtml .=		'<td>' . htmlspecialchars($ca['descr']) . '</td>';
446
			$certhtml .=		'<td>';
447
			$certhtml .=			'<a id="delcert' . $i .'" class="fa fa-trash no-confirm icon-pointer" title="';
448
			$certhtml .=			gettext('Remove this certificate association? (Certificate will not be deleted)') . '"></a>';
449
			$certhtml .=		'</td>';
450
			$certhtml .=	'</tr>';
451
			$i++;
452
		}
453

    
454
	}
455

    
456
	$certhtml .=		'</tbody>';
457
	$certhtml .=	'</table>';
458
	$certhtml .= '</div>';
459

    
460
	$certhtml .= '<nav class="action-buttons">';
461
	$certhtml .=	'<a href="system_certmanager.php?act=new&amp;userid=' . $id . '" class="btn btn-success">' . gettext("Add") . '</a>';
462
	$certhtml .= '</nav>';
463

    
464
	return($certhtml);
465
}
466

    
467
$pgtitle = array(gettext("System"), gettext("User Manager"), gettext("Users"));
468

    
469
if ($act == "new" || $act == "edit" || $input_errors) {
470
	$pgtitle[] = gettext('Edit');
471
}
472
include("head.inc");
473

    
474
if ($input_errors) {
475
	print_input_errors($input_errors);
476
}
477

    
478
if ($savemsg) {
479
	print_info_box($savemsg, 'success');
480
}
481

    
482
$tab_array = array();
483
$tab_array[] = array(gettext("Users"), true, "system_usermanager.php");
484
$tab_array[] = array(gettext("Groups"), false, "system_groupmanager.php");
485
$tab_array[] = array(gettext("Settings"), false, "system_usermanager_settings.php");
486
$tab_array[] = array(gettext("Authentication Servers"), false, "system_authservers.php");
487
display_top_tabs($tab_array);
488

    
489
if (!($act == "new" || $act == "edit" || $input_errors)) {
490
?>
491
<form method="post">
492
<div class="panel panel-default">
493
	<div class="panel-heading"><h2 class="panel-title"><?=gettext('Users')?></h2></div>
494
	<div class="panel-body">
495
		<div class="table-responsive">
496
			<table class="table table-striped table-hover table-condensed sortable-theme-bootstrap" data-sortable>
497
				<thead>
498
					<tr>
499
						<th>&nbsp;</th>
500
						<th><?=gettext("Username")?></th>
501
						<th><?=gettext("Full name")?></th>
502
						<th><?=gettext("Disabled")?></th>
503
						<th><?=gettext("Groups")?></th>
504
						<th><?=gettext("Actions")?></th>
505
					</tr>
506
				</thead>
507
				<tbody>
508
<?php
509
foreach ($a_user as $i => $userent):
510
	?>
511
					<tr>
512
						<td>
513
							<input type="checkbox" id="frc<?=$i?>" name="delete_check[]" value="<?=$i?>" <?=($userent['scope'] == "system" ? 'disabled' : '')?>/>
514
						</td>
515
						<td>
516
<?php
517
	if ($userent['scope'] != "user") {
518
		$usrimg = 'eye-open';
519
	} else {
520
		$usrimg = 'user';
521
	}
522
?>
523
							<i class="fa fa-<?=$usrimg?>"></i>
524
							<?=htmlspecialchars($userent['name'])?>
525
						</td>
526
						<td><?=htmlspecialchars($userent['descr'])?></td>
527
						<td><?php if (isset($userent['disabled'])) echo "*"?></td>
528
						<td><?=implode(",", local_user_get_groups($userent))?></td>
529
						<td>
530
							<a class="fa fa-pencil" title="<?=gettext("Edit user"); ?>" href="?act=edit&amp;userid=<?=$i?>"></a>
531
<?php if ($userent['scope'] != "system"): ?>
532
							<a class="fa fa-trash"	title="<?=gettext("Delete user")?>" href="?act=deluser&amp;userid=<?=$i?>&amp;username=<?=$userent['name']?>"></a>
533
<?php endif; ?>
534
						</td>
535
					</tr>
536
<?php endforeach; ?>
537
				</tbody>
538
			</table>
539
		</div>
540
	</div>
541
</div>
542
<nav class="action-buttons">
543
	<a href="?act=new" class="btn btn-sm btn-success">
544
		<i class="fa fa-plus icon-embed-btn"></i>
545
		<?=gettext("Add")?>
546
	</a>
547

    
548
	<button type="submit" class="btn btn-sm btn-danger" name="dellall" value="dellall" title="<?=gettext('Delete selected users')?>">
549
		<i class="fa fa-trash icon-embed-btn"></i>
550
		<?=gettext("Delete")?>
551
	</button>
552
</nav>
553
</form>
554

    
555
<?php
556
	print_callout('<p>' . gettext("Additional users can be added here. User permissions for accessing " .
557
		"the webConfigurator can be assigned directly or inherited from group memberships. " .
558
		"Some system object properties can be modified but they cannot be deleted.") . '</p>' .
559
		'<p>' . gettext("Accounts added here are also used for other parts of the system " .
560
		"such as OpenVPN, IPsec, and Captive Portal.") . '</p>'
561
	);
562
	include("foot.inc");
563
	exit;
564
}
565

    
566
$form = new Form;
567

    
568
if ($act == "new" || $act == "edit" || $input_errors):
569

    
570
	$form->addGlobal(new Form_Input(
571
		'act',
572
		null,
573
		'hidden',
574
		''
575
	));
576

    
577
	$form->addGlobal(new Form_Input(
578
		'userid',
579
		null,
580
		'hidden',
581
		isset($id) ? $id:''
582
	));
583

    
584
	$form->addGlobal(new Form_Input(
585
		'privid',
586
		null,
587
		'hidden',
588
		''
589
	));
590

    
591
	$form->addGlobal(new Form_Input(
592
		'certid',
593
		null,
594
		'hidden',
595
		''
596
	));
597

    
598
	$ro = "";
599
	if ($pconfig['utype'] == "system") {
600
		$ro = "readonly";
601
	}
602

    
603
	$section = new Form_Section('User Properties');
604

    
605
	$section->addInput(new Form_StaticText(
606
		'Defined by',
607
		strtoupper($pconfig['utype'])
608
	));
609

    
610
	$form->addGlobal(new Form_Input(
611
		'utype',
612
		null,
613
		'hidden',
614
		$pconfig['utype']
615
	));
616

    
617
	$section->addInput(new Form_Checkbox(
618
		'disabled',
619
		'Disabled',
620
		'This user cannot login',
621
		$pconfig['disabled']
622
	));
623

    
624
	$section->addInput($input = new Form_Input(
625
		'usernamefld',
626
		'Username',
627
		'text',
628
		$pconfig['usernamefld']
629
	));
630

    
631
	if ($ro) {
632
		$input->setReadonly();
633
	}
634

    
635
	$form->addGlobal(new Form_Input(
636
		'oldusername',
637
		null,
638
		'hidden',
639
		$pconfig['usernamefld']
640
	));
641

    
642
	$group = new Form_Group('Password');
643
	$group->add(new Form_Input(
644
		'passwordfld1',
645
		'Password',
646
		'password'
647
	));
648
	$group->add(new Form_Input(
649
		'passwordfld2',
650
		'Confirm Password',
651
		'password'
652
	));
653

    
654
	$section->add($group);
655

    
656
	$section->addInput($input = new Form_Input(
657
		'descr',
658
		'Full name',
659
		'text',
660
		htmlspecialchars($pconfig['descr'])
661
	))->setHelp('User\'s full name, for your own information only');
662

    
663
	if ($ro) {
664
		$input->setDisabled();
665
	}
666

    
667
	$section->addInput(new Form_Input(
668
		'expires',
669
		'Expiration date',
670
		'date',
671
		$pconfig['expires']
672
	))->setHelp('Leave blank if the account shouldn\'t expire, otherwise enter '.
673
		'the expiration date');
674

    
675
	// ==== Group membership ==================================================
676
	$group = new Form_Group('Group membership');
677

    
678
	// Make a list of all the groups configured on the system, and a list of
679
	// those which this user is a member of
680
	$systemGroups = array();
681
	$usersGroups = array();
682

    
683
	$usergid = [$pconfig['usernamefld']];
684

    
685
	foreach ($config['system']['group'] as $Ggroup) {
686
		if ($Ggroup['name'] != "all") {
687
			if (($act == 'edit') && $Ggroup['member'] && in_array($pconfig['uid'], $Ggroup['member'])) {
688
				$usersGroups[ $Ggroup['name'] ] = $Ggroup['name'];	// Add it to the user's list
689
			} else {
690
				$systemGroups[ $Ggroup['name'] ] = $Ggroup['name']; // Add it to the 'not a member of' list
691
			}
692
		}
693
	}
694

    
695
	$group->add(new Form_Select(
696
		'sysgroups',
697
		null,
698
		array_combine((array)$pconfig['groups'], (array)$pconfig['groups']),
699
		$systemGroups,
700
		true
701
	))->setHelp('Not member of');
702

    
703
	$group->add(new Form_Select(
704
		'groups',
705
		null,
706
		array_combine((array)$pconfig['groups'], (array)$pconfig['groups']),
707
		$usersGroups,
708
		true
709
	))->setHelp('Member of');
710

    
711
	$section->add($group);
712

    
713
	$group = new Form_Group('');
714

    
715
	$group->add(new Form_Button(
716
		'movetoenabled',
717
		'Move to "Member of" list >'
718
	))->removeClass('btn-primary')->addClass('btn-default btn-sm');
719

    
720
	$group->add(new Form_Button(
721
		'movetodisabled',
722
		'< Move to "Not member of" list'
723
	))->removeClass('btn-primary')->addClass('btn-default btn-sm');
724

    
725
	$group->setHelp('Hold down CTRL (pc)/COMMAND (mac) key to select multiple items');
726
	$section->add($group);
727

    
728
	// ==== Button for adding user certificate ================================
729
	if ($act == 'new') {
730
		$section->addInput(new Form_Checkbox(
731
			'showcert',
732
			'Certificate',
733
			'Click to create a user certificate',
734
			false
735
		));
736
	}
737

    
738
	$form->add($section);
739

    
740
	// ==== Effective privileges section ======================================
741
	if (isset($pconfig['uid'])) {
742
		// We are going to build an HTML table and add it to an Input_StaticText. It may be ugly, but it
743
		// is the best way to make the display we need.
744

    
745
		$section = new Form_Section('Effective Privileges');
746

    
747
		$section->addInput(new Form_StaticText(
748
			null,
749
			build_priv_table()
750
		));
751

    
752
		$form->add($section);
753

    
754
		// ==== Certificate table section =====================================
755
		$section = new Form_Section('User Certificates');
756

    
757
		$section->addInput(new Form_StaticText(
758
			null,
759
			build_cert_table()
760
		));
761

    
762
		$form->add($section);
763
	}
764

    
765
	// ==== Add user certificate for a new user
766
	if (is_array($config['ca']) && count($config['ca']) > 0) {
767
		$section = new Form_Section('Create Certificate for User');
768
		$section->addClass('cert-options');
769

    
770
		$nonPrvCas = array();
771
		foreach($config['ca'] as $ca) {
772
			if (!$ca['prv']) {
773
				continue;
774
			}
775

    
776
			$nonPrvCas[ $ca['refid'] ] = $ca['descr'];
777
		}
778

    
779
		if (!empty($nonPrvCas)) {
780
			$section->addInput(new Form_Input(
781
				'name',
782
				'Descriptive name',
783
				'text',
784
				$pconfig['name']
785
			));
786

    
787
			$section->addInput(new Form_Select(
788
				'caref',
789
				'Certificate authority',
790
				null,
791
				$nonPrvCas
792
			));
793

    
794
			$section->addInput(new Form_Select(
795
				'keylen',
796
				'Key length',
797
				2048,
798
				array(
799
					512 => '512 bits',
800
					1024 => '1024 bits',
801
					2048 => '2049 bits',
802
					4096 => '4096 bits',
803
				)
804
			));
805

    
806
			$section->addInput(new Form_Input(
807
				'lifetime',
808
				'Lifetime',
809
				'number',
810
				$pconfig['lifetime']
811
			));
812
		}
813

    
814
		$form->add($section);
815
	}
816

    
817
endif;
818
// ==== Paste a key for the new user
819
$section = new Form_Section('Keys');
820

    
821
$section->addInput(new Form_Checkbox(
822
	'showkey',
823
	'Authorized keys',
824
	'Click to paste an authorized key',
825
	false
826
));
827

    
828
$section->addInput(new Form_Textarea(
829
	'authorizedkeys',
830
	'Authorized SSH Keys',
831
	$pconfig['authorizedkeys']
832
))->setHelp('Enter authorized SSH keys for this user');
833

    
834
$section->addInput(new Form_Input(
835
	'ipsecpsk',
836
	'IPsec Pre-Shared Key',
837
	'text',
838
	$pconfig['ipsecpsk']
839
));
840

    
841
$form->add($section);
842

    
843
print $form;
844
?>
845
<script type="text/javascript">
846
//<![CDATA[
847
events.push(function() {
848

    
849
	// Select every option in the specified multiselect
850
	function AllServers(id, selectAll) {
851
	   for (i = 0; i < id.length; i++)	   {
852
		   id.eq(i).prop('selected', selectAll);
853
	   }
854
	}
855

    
856
	// Move all selected options from one multiselect to another
857
	function moveOptions(From, To)	{
858
		var len = From.length;
859
		var option;
860

    
861
		if (len > 0) {
862
			for (i=0; i<len; i++) {
863
				if (From.eq(i).is(':selected')) {
864
					option = From.eq(i).val();
865
					value  = From.eq(i).text();
866
					To.append(new Option(value, option));
867
					From.eq(i).remove();
868
				}
869
			}
870
		}
871
	}
872

    
873
	// Make buttons plain buttons, not submit
874
	$("#movetodisabled").prop('type','button');
875
	$("#movetoenabled").prop('type','button');
876

    
877
	// On click . .
878
	$("#movetodisabled").click(function() {
879
		moveOptions($('[name="groups[]"] option'), $('[name="sysgroups[]"]'));
880
	});
881

    
882
	$("#movetoenabled").click(function() {
883
		moveOptions($('[name="sysgroups[]"] option'), $('[name="groups[]"]'));
884
	});
885

    
886
	$("#showcert").click(function() {
887
		hideClass('cert-options', !this.checked);
888
	});
889

    
890
	$("#showkey").click(function() {
891
		hideInput('authorizedkeys', false);
892
		hideCheckbox('showkey', true);
893
	});
894

    
895
	$('[id^=delcert]').click(function(event) {
896
		if (confirm(event.target.title)) {
897
			$('#certid').val(event.target.id.match(/\d+$/)[0]);
898
			$('#userid').val('<?=$id;?>');
899
			$('#act').val('delcert');
900
			$('form').submit();
901
		}
902
	});
903

    
904
	$('[id^=delprivid]').click(function(event) {
905
		if (confirm(event.target.title)) {
906
			$('#privid').val(event.target.id.match(/\d+$/)[0]);
907
			$('#userid').val('<?=$id;?>');
908
			$('#act').val('delprivid');
909
			$('form').submit();
910
		}
911
	});
912

    
913

    
914
	// ---------- On initial page load ------------------------------------------------------------
915

    
916
	hideClass('cert-options', true);
917
	//hideInput('authorizedkeys', true);
918
	hideCheckbox('showkey', true);
919

    
920
	// On submit mark all the user's groups as "selected"
921
	$('form').submit(function() {
922
		AllServers($('[name="groups[]"] option'), true);
923
	});
924
});
925
//]]>
926
</script>
927
<?php
928
include('foot.inc');
929
?>
(208-208/229)