From 6a5d68178752212e9dc2ef82d500940b49bf6500 Mon Sep 17 00:00:00 2001 From: Anika Henke Date: Sun, 3 Nov 2013 20:49:30 +0000 Subject: Revert "Fixes validation problems with base64 encoded images in CSS." This reverts commit 88833bac87e7fb295c0479a8260d1d63051bca8d. and fixes FS#2874 --- lib/exe/css.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'lib') diff --git a/lib/exe/css.php b/lib/exe/css.php index 6dfdf06e8..f0bd24b43 100644 --- a/lib/exe/css.php +++ b/lib/exe/css.php @@ -422,7 +422,7 @@ function css_datauri($match){ $data = base64_encode(file_get_contents($local)); } if($data){ - $url = '\'data:image/'.$ext.';base64,'.$data.'\''; + $url = 'data:image/'.$ext.';base64,'.$data; }else{ $url = $base.$url; } -- cgit v1.2.3 From 8c867678811e7f91159175c41ef4722a2fc5308c Mon Sep 17 00:00:00 2001 From: Anika Henke Date: Mon, 4 Nov 2013 01:17:09 +0000 Subject: removed loading of deprecated RTL styles --- lib/exe/css.php | 15 --------------- 1 file changed, 15 deletions(-) (limited to 'lib') diff --git a/lib/exe/css.php b/lib/exe/css.php index f0bd24b43..87fb779eb 100644 --- a/lib/exe/css.php +++ b/lib/exe/css.php @@ -84,16 +84,6 @@ function css_out(){ if(isset($config_cascade['userstyle'][$mediatype])){ $files[$mediatype][$config_cascade['userstyle'][$mediatype]] = DOKU_BASE; } - // load rtl styles - // note: this adds the rtl styles only to the 'screen' media type - // @deprecated 2012-04-09: rtl will cease to be a mode of its own, - // please use "[dir=rtl]" in any css file in all, screen or print mode instead - if ($mediatype=='screen') { - if($lang['direction'] == 'rtl'){ - if (isset($styleini['stylesheets']['rtl'])) $files[$mediatype] = array_merge($files[$mediatype], $styleini['stylesheets']['rtl']); - if (isset($config_cascade['userstyle']['rtl'])) $files[$mediatype][$config_cascade['userstyle']['rtl']] = DOKU_BASE; - } - } $cache_files = array_merge($cache_files, array_keys($files[$mediatype])); } @@ -447,11 +437,6 @@ function css_pluginstyles($mediatype='screen'){ $list[DOKU_PLUGIN."$p/style.css"] = DOKU_BASE."lib/plugins/$p/"; $list[DOKU_PLUGIN."$p/style.less"] = DOKU_BASE."lib/plugins/$p/"; } - // @deprecated 2012-04-09: rtl will cease to be a mode of its own, - // please use "[dir=rtl]" in any css file in all, screen or print mode instead - if($lang['direction'] == 'rtl'){ - $list[DOKU_PLUGIN."$p/rtl.css"] = DOKU_BASE."lib/plugins/$p/"; - } } return $list; } -- cgit v1.2.3 From a9d0f1c468fc51bc74c65a9ad127b45f718a9d75 Mon Sep 17 00:00:00 2001 From: Anika Henke Date: Mon, 4 Nov 2013 01:39:18 +0000 Subject: removed deprecated images --- lib/images/_deprecated.txt | 12 +----------- lib/images/arrow_down.gif | Bin 273 -> 0 bytes lib/images/arrow_up.gif | Bin 274 -> 0 bytes lib/images/at.gif | Bin 57 -> 0 bytes lib/images/close.png | Bin 137 -> 0 bytes lib/images/del.png | Bin 355 -> 0 bytes lib/images/edit.gif | Bin 142 -> 0 bytes lib/images/list-minus.gif | Bin 64 -> 0 bytes lib/images/list-plus.gif | Bin 67 -> 0 bytes lib/images/pencil.png | Bin 391 -> 0 bytes 10 files changed, 1 insertion(+), 11 deletions(-) delete mode 100644 lib/images/arrow_down.gif delete mode 100644 lib/images/arrow_up.gif delete mode 100644 lib/images/at.gif delete mode 100644 lib/images/close.png delete mode 100644 lib/images/del.png delete mode 100644 lib/images/edit.gif delete mode 100644 lib/images/list-minus.gif delete mode 100644 lib/images/list-plus.gif delete mode 100644 lib/images/pencil.png (limited to 'lib') diff --git a/lib/images/_deprecated.txt b/lib/images/_deprecated.txt index bccea2049..a347f8b3c 100644 --- a/lib/images/_deprecated.txt +++ b/lib/images/_deprecated.txt @@ -1,12 +1,2 @@ -== @deprecated 2012-10-06 == - -arrow_down.gif -arrow_up.gif -at.gif -close.png -del.png -edit.gif -list-minus.gif -list-plus.gif -pencil.png +(none) diff --git a/lib/images/arrow_down.gif b/lib/images/arrow_down.gif deleted file mode 100644 index ff13b9585..000000000 Binary files a/lib/images/arrow_down.gif and /dev/null differ diff --git a/lib/images/arrow_up.gif b/lib/images/arrow_up.gif deleted file mode 100644 index d491c18db..000000000 Binary files a/lib/images/arrow_up.gif and /dev/null differ diff --git a/lib/images/at.gif b/lib/images/at.gif deleted file mode 100644 index 8bdf40d54..000000000 Binary files a/lib/images/at.gif and /dev/null differ diff --git a/lib/images/close.png b/lib/images/close.png deleted file mode 100644 index 4ccef0603..000000000 Binary files a/lib/images/close.png and /dev/null differ diff --git a/lib/images/del.png b/lib/images/del.png deleted file mode 100644 index e59ded55f..000000000 Binary files a/lib/images/del.png and /dev/null differ diff --git a/lib/images/edit.gif b/lib/images/edit.gif deleted file mode 100644 index a2a23de7b..000000000 Binary files a/lib/images/edit.gif and /dev/null differ diff --git a/lib/images/list-minus.gif b/lib/images/list-minus.gif deleted file mode 100644 index 36902f159..000000000 Binary files a/lib/images/list-minus.gif and /dev/null differ diff --git a/lib/images/list-plus.gif b/lib/images/list-plus.gif deleted file mode 100644 index adc3fac8a..000000000 Binary files a/lib/images/list-plus.gif and /dev/null differ diff --git a/lib/images/pencil.png b/lib/images/pencil.png deleted file mode 100644 index 78142b61e..000000000 Binary files a/lib/images/pencil.png and /dev/null differ -- cgit v1.2.3 From 30f686eb67205a1da8765c992e2f9ee1a158c712 Mon Sep 17 00:00:00 2001 From: Christopher Smith Date: Tue, 5 Nov 2013 20:15:00 +0000 Subject: add DOKU_INC to less import directories --- lib/exe/css.php | 6 ++++++ 1 file changed, 6 insertions(+) (limited to 'lib') diff --git a/lib/exe/css.php b/lib/exe/css.php index f0bd24b43..bc0645400 100644 --- a/lib/exe/css.php +++ b/lib/exe/css.php @@ -173,6 +173,12 @@ function css_out(){ */ function css_parseless($css) { $less = new lessc(); + $less->importDir[] = DOKU_INC; + + if (defined('DOKU_UNITTEST')){ + $less->importDir[] = TMP_DIR; + } + try { return $less->compile($css); } catch(Exception $e) { -- cgit v1.2.3 From de737055c55e54246de5000d601a089328c1af1c Mon Sep 17 00:00:00 2001 From: Christopher Smith Date: Tue, 5 Nov 2013 20:15:39 +0000 Subject: update url/file rewriting in css_loadfile() to support @import of less files --- lib/exe/css.php | 30 ++++++++++++++++++++++++++++-- 1 file changed, 28 insertions(+), 2 deletions(-) (limited to 'lib') diff --git a/lib/exe/css.php b/lib/exe/css.php index bc0645400..3929b2d4b 100644 --- a/lib/exe/css.php +++ b/lib/exe/css.php @@ -403,12 +403,38 @@ function css_loadfile($file,$location=''){ $css = io_readFile($file); if(!$location) return $css; - $css = preg_replace('#(url\([ \'"]*)(?!/|data:|http://|https://| |\'|")#','\\1'.$location,$css); - $css = preg_replace('#(@import\s+[\'"])(?!/|data:|http://|https://)#', '\\1'.$location, $css); + global $css_location; + global $css_current_dir; + $css_current_dir = preg_replace('#^('.DOKU_INC.(defined('DOKU_UNITTEST')?'|'.realpath(TMP_DIR) : '').')#','',dirname($file)).'/'; + $css_location = $location; + + $css = preg_replace_callback('#(url\( *)([\'"]?)(.*?)(\2)( *\))#','css_loadfile_callback',$css); + $css = preg_replace_callback('#(@import\s+)([\'"])(.*?)(\2)#','css_loadfile_callback',$css); +# $css = preg_replace_callback('#(url\([ \'"]*)(?!/|data:|http://|https://| |\'|")#','\\1'.$location,$css); +# $css = preg_replace_callback('#(@import\s+[\'"])(?!/|data:|http://|https://)#', '\\1'.$location, $css); return $css; } +function css_loadfile_callback($match){ + global $css_location; + global $css_current_dir; + + if (preg_match('#^(/|data:|https?://)#',$match[3])) { + return $match[0]; + } + else if (substr($match[3],-5) == '.less') { + if ($match[3]{0} != '/') { + $match[3] = $css_current_dir . $match[3]; + } + } + else { + $match[3] = $css_location . $match[3]; + } + + return join('',array_slice($match,1)); +} + /** * Converte local image URLs to data URLs if the filesize is small * -- cgit v1.2.3 From b4304655d0b09ba0a958b9cf56f1bf699cf05b84 Mon Sep 17 00:00:00 2001 From: Michael Hamann Date: Fri, 8 Nov 2013 10:48:50 +0100 Subject: Fix password decryption during LDAP rebinding The LDAP rebinding was still using the old blowfish encryption instead of AES so rebinding failed. --- lib/plugins/authldap/auth.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'lib') diff --git a/lib/plugins/authldap/auth.php b/lib/plugins/authldap/auth.php index de1332282..31e2c5135 100644 --- a/lib/plugins/authldap/auth.php +++ b/lib/plugins/authldap/auth.php @@ -166,7 +166,7 @@ class auth_plugin_authldap extends DokuWiki_Auth_Plugin { // be accessible anonymously, so we try to rebind the current user here list($loginuser, $loginsticky, $loginpass) = auth_getCookie(); if($loginuser && $loginpass) { - $loginpass = PMA_blowfish_decrypt($loginpass, auth_cookiesalt(!$loginsticky)); + $loginpass = auth_decrypt($loginpass, auth_cookiesalt(!$loginsticky, true)); $this->checkPass($loginuser, $loginpass); } } -- cgit v1.2.3 From fb4828803b474f9729dcc8e9920b19b7bc533a54 Mon Sep 17 00:00:00 2001 From: Danny Lin Date: Mon, 11 Nov 2013 09:26:50 +0800 Subject: Update zh-tw translation --- lib/plugins/authldap/lang/zh-tw/settings.php | 6 ++++- lib/plugins/usermanager/lang/zh-tw/import.txt | 9 ++++++++ lib/plugins/usermanager/lang/zh-tw/lang.php | 32 ++++++++++++++++++++++++--- 3 files changed, 43 insertions(+), 4 deletions(-) create mode 100644 lib/plugins/usermanager/lang/zh-tw/import.txt (limited to 'lib') diff --git a/lib/plugins/authldap/lang/zh-tw/settings.php b/lib/plugins/authldap/lang/zh-tw/settings.php index d2513eeff..7e35ef632 100644 --- a/lib/plugins/authldap/lang/zh-tw/settings.php +++ b/lib/plugins/authldap/lang/zh-tw/settings.php @@ -1,5 +1,4 @@ * @author Li-Jiun Huang * @author Cheng-Wei Chien - * @author Danny Lin * @author Shuo-Ting Jian * @author syaoranhinata@gmail.com * @author Ichirou Uchiki * @author tsangho + * @author Danny Lin */ $lang['menu'] = '帳號管理器'; + +// custom language strings for the plugin $lang['noauth'] = '(帳號認證尚未開放)'; $lang['nosupport'] = '(尚不支援帳號管理)'; + $lang['badauth'] = '錯誤的認證機制'; + $lang['user_id'] = '帳號'; $lang['user_pass'] = '密碼'; $lang['user_name'] = '名稱'; $lang['user_mail'] = '電郵'; $lang['user_groups'] = '群組'; + $lang['field'] = '欄位'; $lang['value'] = '設定值'; $lang['add'] = '增加'; @@ -36,8 +41,12 @@ $lang['search'] = '搜尋'; $lang['search_prompt'] = '開始搜尋'; $lang['clear'] = '重設篩選條件'; $lang['filter'] = '篩選條件 (Filter)'; -$lang['import'] = '匯入新的用戶'; +$lang['export_all'] = '匯出所有使用者 (CSV)'; +$lang['export_filtered'] = '匯出篩選後的使用者列表 (CSV)'; +$lang['import'] = '匯入新使用者'; +$lang['line'] = '列號'; $lang['error'] = '錯誤訊息'; + $lang['summary'] = '顯示帳號 %1$d-%2$d,共 %3$d 筆符合。共有 %4$d 個帳號。'; $lang['nonefound'] = '找不到帳號。共有 %d 個帳號。'; $lang['delete_ok'] = '已刪除 %d 個帳號'; @@ -45,10 +54,13 @@ $lang['delete_fail'] = '%d 個帳號無法刪除。'; $lang['update_ok'] = '已更新該帳號'; $lang['update_fail'] = '無法更新該帳號'; $lang['update_exists'] = '無法變更帳號名稱 (%s) ,因為有同名帳號存在。其他修改則已套用。'; + $lang['start'] = '開始'; $lang['prev'] = '上一頁'; $lang['next'] = '下一頁'; $lang['last'] = '最後一頁'; + +// added after 2006-03-09 release $lang['edit_usermissing'] = '找不到選取的帳號,可能已被刪除或改為其他名稱。'; $lang['user_notify'] = '通知使用者'; $lang['note_notify'] = '通知信只會在指定使用者新密碼時寄送。'; @@ -58,4 +70,18 @@ $lang['add_ok'] = '已新增使用者'; $lang['add_fail'] = '無法新增使用者'; $lang['notify_ok'] = '通知信已寄出'; $lang['notify_fail'] = '通知信無法寄出'; -$lang['import_error_readfail'] = '會入錯誤,無法讀取已經上傳的檔案'; + +// import & errors +$lang['import_userlistcsv'] = '使用者列表檔案 (CSV): '; +$lang['import_header'] = '最近一次匯入 - 失敗'; +$lang['import_success_count'] = '使用者匯入:找到 %d 個使用者,已成功匯入 %d 個。'; +$lang['import_failure_count'] = '使用者匯入:%d 個匯入失敗,列出於下。'; +$lang['import_error_fields'] = '欄位不足,需要 4 個,找到 %d 個。'; +$lang['import_error_baduserid'] = '使用者帳號遺失'; +$lang['import_error_badname'] = '名稱不正確'; +$lang['import_error_badmail'] = '電郵位址不正確'; +$lang['import_error_upload'] = '匯入失敗,CSV 檔案內容空白或無法匯入。'; +$lang['import_error_readfail'] = '匯入錯誤,無法讀取上傳的檔案'; +$lang['import_error_create'] = '無法建立使用者'; +$lang['import_notify_fail'] = '通知訊息無法寄給已匯入的使用者 %s(電郵 %s)'; +$lang['import_downloadfailures'] = '下載失敗項的 CSV 檔案以供修正'; -- cgit v1.2.3 From cfe186a5905005f882e870f5af79b31d53dd04ae Mon Sep 17 00:00:00 2001 From: Anika Henke Date: Mon, 11 Nov 2013 11:49:36 +0000 Subject: updated inline documentation about location of local style.ini --- lib/tpl/dokuwiki/style.ini | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) (limited to 'lib') diff --git a/lib/tpl/dokuwiki/style.ini b/lib/tpl/dokuwiki/style.ini index 897b6e6da..cc23c169f 100644 --- a/lib/tpl/dokuwiki/style.ini +++ b/lib/tpl/dokuwiki/style.ini @@ -2,7 +2,8 @@ ; for limitations of the ini format used here ; To extend this file or make changes to it, it is recommended to create -; a style.local.ini file to prevent losing any changes after an upgrade. +; a local conf/tpl//style.ini file to prevent losing +; any changes after an upgrade. ; Please don't forget to copy the section your changes should be under ; (i.e. [stylesheets] or [replacements]) into that file as well. -- cgit v1.2.3 From 4eb5f931edaaabdd436f4c2802d0d293f8ef76cd Mon Sep 17 00:00:00 2001 From: Christopher Smith Date: Mon, 11 Nov 2013 22:03:58 +0000 Subject: fix sp. in comment --- lib/exe/css.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'lib') diff --git a/lib/exe/css.php b/lib/exe/css.php index 3929b2d4b..948251440 100644 --- a/lib/exe/css.php +++ b/lib/exe/css.php @@ -436,7 +436,7 @@ function css_loadfile_callback($match){ } /** - * Converte local image URLs to data URLs if the filesize is small + * Convert local image URLs to data URLs if the filesize is small * * Callback for preg_replace_callback */ -- cgit v1.2.3 From 12ffbbc324be1f06ccfcff580f512990dca929b8 Mon Sep 17 00:00:00 2001 From: Christopher Smith Date: Mon, 11 Nov 2013 22:31:28 +0000 Subject: refactor to improve elegance --- lib/exe/css.php | 75 ++++++++++++++++++++++++++++++++++++++------------------- 1 file changed, 50 insertions(+), 25 deletions(-) (limited to 'lib') diff --git a/lib/exe/css.php b/lib/exe/css.php index 948251440..9cde09545 100644 --- a/lib/exe/css.php +++ b/lib/exe/css.php @@ -399,40 +399,65 @@ function css_filetypes(){ * given location prefix */ function css_loadfile($file,$location=''){ - if(!@file_exists($file)) return ''; - $css = io_readFile($file); - if(!$location) return $css; + $css_file = new DokuCssFile($file); + return $css_file->load($location); +} - global $css_location; - global $css_current_dir; - $css_current_dir = preg_replace('#^('.DOKU_INC.(defined('DOKU_UNITTEST')?'|'.realpath(TMP_DIR) : '').')#','',dirname($file)).'/'; - $css_location = $location; +class DokuCssFile { - $css = preg_replace_callback('#(url\( *)([\'"]?)(.*?)(\2)( *\))#','css_loadfile_callback',$css); - $css = preg_replace_callback('#(@import\s+)([\'"])(.*?)(\2)#','css_loadfile_callback',$css); -# $css = preg_replace_callback('#(url\([ \'"]*)(?!/|data:|http://|https://| |\'|")#','\\1'.$location,$css); -# $css = preg_replace_callback('#(@import\s+[\'"])(?!/|data:|http://|https://)#', '\\1'.$location, $css); + protected $filepath; + protected $location; + private $relative_path = null; - return $css; -} + public function __construct($file) { + $this->filepath = $file; + } + + public function load($location='') { + if (!@file_exists($this->filepath)) return ''; -function css_loadfile_callback($match){ - global $css_location; - global $css_current_dir; + $css = io_readFile($this->filepath); + if (!$location) return $css; - if (preg_match('#^(/|data:|https?://)#',$match[3])) { - return $match[0]; + $this->location = $location; + + $css = preg_replace_callback('#(url\( *)([\'"]?)(.*?)(\2)( *\))#',array($this,'replacements'),$css); + $css = preg_replace_callback('#(@import\s+)([\'"])(.*?)(\2)#',array($this,'replacements'),$css); + + return $css; } - else if (substr($match[3],-5) == '.less') { - if ($match[3]{0} != '/') { - $match[3] = $css_current_dir . $match[3]; + + private function getRelativePath(){ + + if (is_null($this->relative_path)) { + $basedir = array(DOKU_INC); + if (defined('DOKU_UNITTEST')) { + $basedir[] = realpath(TMP_DIR); + } + $regex = '#^('.join('|',$basedir).')#'; + + $this->relative_path = preg_replace($regex, '', dirname($this->filepath)); } + + return $this->relative_path; } - else { - $match[3] = $css_location . $match[3]; - } - return join('',array_slice($match,1)); + public function replacements($match) { + + if (preg_match('#^(/|data:|https?://)#',$match[3])) { + return $match[0]; + } + else if (substr($match[3],-5) == '.less') { + if ($match[3]{0} != '/') { + $match[3] = $this->getRelativePath() . '/' . $match[3]; + } + } + else { + $match[3] = $this->location . $match[3]; + } + + return join('',array_slice($match,1)); + } } /** -- cgit v1.2.3 From 3b77d6b3902e7c6a4d65c6d7fb191a5ac639d337 Mon Sep 17 00:00:00 2001 From: Ben Fey Date: Tue, 12 Nov 2013 20:46:38 +0100 Subject: translation update --- lib/plugins/authad/lang/de/settings.php | 2 ++ lib/plugins/usermanager/lang/de/lang.php | 4 ++++ 2 files changed, 6 insertions(+) (limited to 'lib') diff --git a/lib/plugins/authad/lang/de/settings.php b/lib/plugins/authad/lang/de/settings.php index fd624ad02..a1fdcbf55 100644 --- a/lib/plugins/authad/lang/de/settings.php +++ b/lib/plugins/authad/lang/de/settings.php @@ -5,6 +5,7 @@ * * @author Frank Loizzi * @author Matthias Schulte + * @author Ben Fey */ $lang['account_suffix'] = 'Ihr Account-Suffix. Z. B. @my.domain.org'; $lang['base_dn'] = 'Ihr Base-DN. Z. B. DC=my,DC=domain,DC=org'; @@ -12,6 +13,7 @@ $lang['domain_controllers'] = 'Eine Komma-separierte Liste von Domänen-Contr $lang['admin_username'] = 'Ein priviligierter Active Directory-Benutzer mit Zugriff zu allen anderen Benutzerdaten. Optional, aber wird benötigt für Aktionen wie z. B. dass Senden von Benachrichtigungs-Mails.'; $lang['admin_password'] = 'Das Passwort des obigen Benutzers.'; $lang['sso'] = 'Soll Single-Sign-On via Kerberos oder NTLM benutzt werden?'; +$lang['sso_charset'] = 'Die Codierung, in welcher Kerberos oder NTLM Benutzername vom Webserver weitergegeben wird. Nicht ausfüllen für UTF-8 oder latin-1, benötigt iconv Erweiterung.'; $lang['real_primarygroup'] = 'Soll die echte primäre Gruppe aufgelöst werden anstelle der Annahme "Domain Users" (langsamer)'; $lang['use_ssl'] = 'SSL-Verbindung benutzen? Falls ja, TLS unterhalb nicht aktivieren.'; $lang['use_tls'] = 'TLS-Verbindung benutzen? Falls ja, SSL oberhalb nicht aktivieren.'; diff --git a/lib/plugins/usermanager/lang/de/lang.php b/lib/plugins/usermanager/lang/de/lang.php index 21be74f71..7d79c1b21 100644 --- a/lib/plugins/usermanager/lang/de/lang.php +++ b/lib/plugins/usermanager/lang/de/lang.php @@ -20,6 +20,7 @@ * @author Matthias Schulte * @author Sven * @author christian studer + * @author Ben Fey */ $lang['menu'] = 'Benutzerverwaltung'; $lang['noauth'] = '(Authentifizierungssystem nicht verfügbar)'; @@ -67,6 +68,8 @@ $lang['add_ok'] = 'Nutzer erfolgreich angelegt'; $lang['add_fail'] = 'Nutzer konnte nicht angelegt werden'; $lang['notify_ok'] = 'Benachrichtigungsmail wurde versandt'; $lang['notify_fail'] = 'Benachrichtigungsmail konnte nicht versandt werden'; +$lang['import_userlistcsv'] = 'Benutzerliste (CSV):'; +$lang['import_header'] = 'Neueste Fehler bei Import'; $lang['import_success_count'] = 'User-Import: %d User gefunden, %d erfolgreich importiert.'; $lang['import_failure_count'] = 'User-Import: %d fehlgeschlagen. Fehlgeschlagene User sind nachfolgend aufgelistet.'; $lang['import_error_fields'] = 'Unzureichende Anzahl an Feldern: %d gefunden, benötigt sind 4.'; @@ -77,3 +80,4 @@ $lang['import_error_upload'] = 'Import fehlgeschlagen. Die CSV-Datei konnte ni $lang['import_error_readfail'] = 'Import fehlgeschlagen. Die hochgeladene Datei konnte nicht gelesen werden.'; $lang['import_error_create'] = 'User konnte nicht angelegt werden'; $lang['import_notify_fail'] = 'Notifikation konnte nicht an den importierten Benutzer %s (E-Mail: %s) gesendet werden.'; +$lang['import_downloadfailures'] = 'Download der Fehler für Korrektur als CSV-Datei'; -- cgit v1.2.3 From 797e3eee76b03d0f1af440597bcb6cc3a8fc0951 Mon Sep 17 00:00:00 2001 From: Artur Date: Tue, 12 Nov 2013 20:48:09 +0100 Subject: translation update --- lib/plugins/authad/lang/ru/settings.php | 4 ++++ 1 file changed, 4 insertions(+) (limited to 'lib') diff --git a/lib/plugins/authad/lang/ru/settings.php b/lib/plugins/authad/lang/ru/settings.php index f849c201a..6854e0920 100644 --- a/lib/plugins/authad/lang/ru/settings.php +++ b/lib/plugins/authad/lang/ru/settings.php @@ -5,5 +5,9 @@ * * @author Ivan I. Udovichenko (sendtome@mymailbox.pp.ua) * @author Aleksandr Selivanov + * @author Artur */ $lang['admin_password'] = 'Пароль для указанного пользователя.'; +$lang['sso'] = 'Использовать SSO (Single-Sign-On) через Kerberos или NTLM?'; +$lang['use_ssl'] = 'Использовать SSL? Если да, то не включайте TLS.'; +$lang['use_tls'] = 'Использовать TLS? Если да, то не включайте SSL.'; -- cgit v1.2.3 From 95b73a82a05bbfa3987672c556d86e4e726c0e7d Mon Sep 17 00:00:00 2001 From: Myeongjin Date: Tue, 12 Nov 2013 20:50:13 +0100 Subject: translation update --- lib/plugins/authad/lang/ko/settings.php | 1 + 1 file changed, 1 insertion(+) (limited to 'lib') diff --git a/lib/plugins/authad/lang/ko/settings.php b/lib/plugins/authad/lang/ko/settings.php index 2914bf47b..053823508 100644 --- a/lib/plugins/authad/lang/ko/settings.php +++ b/lib/plugins/authad/lang/ko/settings.php @@ -11,6 +11,7 @@ $lang['domain_controllers'] = '도메인 컨트롤러의 쉼표로 구분한 $lang['admin_username'] = '다른 모든 사용자의 데이터에 접근할 수 있는 권한이 있는 Active Directory 사용자. 선택적이지만 구독 메일을 보내는 등의 특정 작업에 필요합니다.'; $lang['admin_password'] = '위 사용자의 비밀번호.'; $lang['sso'] = 'Kerberos나 NTLM을 통해 Single-Sign-On을 사용해야 합니까?'; +$lang['sso_charset'] = '당신의 웹서버의 문자집합은 Kerberos나 NTLM 사용자 이름으로 전달됩니다. UTF-8이나 라린-1이 비어 있습니다. icov 확장 기능이 필요합니다.'; $lang['real_primarygroup'] = '실제 기본 그룹은 "도메인 사용자"를 가정하는 대신 해결될 것입니다 (느림)'; $lang['use_ssl'] = 'SSL 연결을 사용합니까? 사용한다면 아래 TLS을 활성화하지 마세요.'; $lang['use_tls'] = 'TLS 연결을 사용합니까? 사용한다면 위 SSL을 활성화하지 마세요.'; -- cgit v1.2.3 From 0fdcfd96106295c8aac3f83b36be0ac4e3b21d46 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Jonas=20Gr=C3=B6ger?= Date: Tue, 12 Nov 2013 20:51:19 +0100 Subject: translation update --- lib/plugins/authad/lang/de/settings.php | 2 ++ lib/plugins/usermanager/lang/de/lang.php | 4 ++++ 2 files changed, 6 insertions(+) (limited to 'lib') diff --git a/lib/plugins/authad/lang/de/settings.php b/lib/plugins/authad/lang/de/settings.php index fd624ad02..5d13c15b7 100644 --- a/lib/plugins/authad/lang/de/settings.php +++ b/lib/plugins/authad/lang/de/settings.php @@ -5,6 +5,7 @@ * * @author Frank Loizzi * @author Matthias Schulte + * @author Jonas Gröger */ $lang['account_suffix'] = 'Ihr Account-Suffix. Z. B. @my.domain.org'; $lang['base_dn'] = 'Ihr Base-DN. Z. B. DC=my,DC=domain,DC=org'; @@ -12,6 +13,7 @@ $lang['domain_controllers'] = 'Eine Komma-separierte Liste von Domänen-Contr $lang['admin_username'] = 'Ein priviligierter Active Directory-Benutzer mit Zugriff zu allen anderen Benutzerdaten. Optional, aber wird benötigt für Aktionen wie z. B. dass Senden von Benachrichtigungs-Mails.'; $lang['admin_password'] = 'Das Passwort des obigen Benutzers.'; $lang['sso'] = 'Soll Single-Sign-On via Kerberos oder NTLM benutzt werden?'; +$lang['sso_charset'] = 'Der Zeichensatz mit dem der Server den Kerberos oder NTLM Benutzernamen versendet. Leer lassen für UTF-8 oder Latin-1. Benötigt die Erweiterung iconv.'; $lang['real_primarygroup'] = 'Soll die echte primäre Gruppe aufgelöst werden anstelle der Annahme "Domain Users" (langsamer)'; $lang['use_ssl'] = 'SSL-Verbindung benutzen? Falls ja, TLS unterhalb nicht aktivieren.'; $lang['use_tls'] = 'TLS-Verbindung benutzen? Falls ja, SSL oberhalb nicht aktivieren.'; diff --git a/lib/plugins/usermanager/lang/de/lang.php b/lib/plugins/usermanager/lang/de/lang.php index 21be74f71..d89c9d154 100644 --- a/lib/plugins/usermanager/lang/de/lang.php +++ b/lib/plugins/usermanager/lang/de/lang.php @@ -20,6 +20,7 @@ * @author Matthias Schulte * @author Sven * @author christian studer + * @author Jonas Gröger */ $lang['menu'] = 'Benutzerverwaltung'; $lang['noauth'] = '(Authentifizierungssystem nicht verfügbar)'; @@ -67,6 +68,8 @@ $lang['add_ok'] = 'Nutzer erfolgreich angelegt'; $lang['add_fail'] = 'Nutzer konnte nicht angelegt werden'; $lang['notify_ok'] = 'Benachrichtigungsmail wurde versandt'; $lang['notify_fail'] = 'Benachrichtigungsmail konnte nicht versandt werden'; +$lang['import_userlistcsv'] = 'Benutzerliste (CSV-Datei)'; +$lang['import_header'] = 'Letzer Import - Fehler'; $lang['import_success_count'] = 'User-Import: %d User gefunden, %d erfolgreich importiert.'; $lang['import_failure_count'] = 'User-Import: %d fehlgeschlagen. Fehlgeschlagene User sind nachfolgend aufgelistet.'; $lang['import_error_fields'] = 'Unzureichende Anzahl an Feldern: %d gefunden, benötigt sind 4.'; @@ -77,3 +80,4 @@ $lang['import_error_upload'] = 'Import fehlgeschlagen. Die CSV-Datei konnte ni $lang['import_error_readfail'] = 'Import fehlgeschlagen. Die hochgeladene Datei konnte nicht gelesen werden.'; $lang['import_error_create'] = 'User konnte nicht angelegt werden'; $lang['import_notify_fail'] = 'Notifikation konnte nicht an den importierten Benutzer %s (E-Mail: %s) gesendet werden.'; +$lang['import_downloadfailures'] = 'Fehler als CSV-Datei zur Korrektur herunterladen'; -- cgit v1.2.3 From ac4d41ba8ae73bb61890475242df4887e1f58399 Mon Sep 17 00:00:00 2001 From: soer9648 Date: Tue, 12 Nov 2013 20:52:27 +0100 Subject: translation update --- lib/plugins/authldap/lang/da/settings.php | 6 ++++++ lib/plugins/authmysql/lang/da/settings.php | 6 ++++++ 2 files changed, 12 insertions(+) (limited to 'lib') diff --git a/lib/plugins/authldap/lang/da/settings.php b/lib/plugins/authldap/lang/da/settings.php index a3558aa5c..b736504a5 100644 --- a/lib/plugins/authldap/lang/da/settings.php +++ b/lib/plugins/authldap/lang/da/settings.php @@ -4,6 +4,12 @@ * @license GPL 2 (http://www.gnu.org/licenses/gpl.html) * * @author Jens Hyllegaard + * @author soer9648 */ $lang['server'] = 'Din LDAP server. Enten værtsnavn (localhost) eller fuld kvalificeret URL (ldap://server.tld:389)'; +$lang['port'] = 'LDAP server port, hvis der ikke er angivet en komplet URL ovenfor.'; +$lang['usertree'] = 'Hvor findes brugerkonti. F.eks. ou=Personer, dc=server, dc=tld'; +$lang['grouptree'] = 'Hvor findes brugergrupper. F.eks. ou=Grupper, dc=server, dc=tld'; +$lang['starttls'] = 'Benyt TLS forbindelser?'; +$lang['bindpw'] = 'Kodeord til ovenstående bruger'; $lang['debug'] = 'Vis yderligere debug output ved fejl'; diff --git a/lib/plugins/authmysql/lang/da/settings.php b/lib/plugins/authmysql/lang/da/settings.php index 207d0ff60..8e90ee4ed 100644 --- a/lib/plugins/authmysql/lang/da/settings.php +++ b/lib/plugins/authmysql/lang/da/settings.php @@ -4,9 +4,15 @@ * @license GPL 2 (http://www.gnu.org/licenses/gpl.html) * * @author Jens Hyllegaard + * @author soer9648 */ $lang['server'] = 'Din MySQL server'; +$lang['user'] = 'MySQL brugernavn'; +$lang['password'] = 'Kodeord til ovenstående bruger'; +$lang['database'] = 'Database der skal benyttes'; +$lang['charset'] = 'Tegnsæt benyttet i database'; $lang['debug'] = 'Vis yderligere debug output'; +$lang['checkPass'] = 'SQL-sætning til at kontrollere kodeord'; $lang['debug_o_0'] = 'ingen'; $lang['debug_o_1'] = 'kun ved fejl'; $lang['debug_o_2'] = 'alle SQL forespørgsler'; -- cgit v1.2.3 From a2edc01b990d4f183c3441cf703444d57b0949ea Mon Sep 17 00:00:00 2001 From: soer9648 Date: Tue, 12 Nov 2013 20:53:33 +0100 Subject: translation update --- lib/plugins/authmysql/lang/da/settings.php | 10 ++++++++++ lib/plugins/authpgsql/lang/da/settings.php | 12 ++++++++++++ lib/plugins/usermanager/lang/da/lang.php | 18 ++++++++++++++++++ 3 files changed, 40 insertions(+) (limited to 'lib') diff --git a/lib/plugins/authmysql/lang/da/settings.php b/lib/plugins/authmysql/lang/da/settings.php index 207d0ff60..97d511dc1 100644 --- a/lib/plugins/authmysql/lang/da/settings.php +++ b/lib/plugins/authmysql/lang/da/settings.php @@ -4,9 +4,19 @@ * @license GPL 2 (http://www.gnu.org/licenses/gpl.html) * * @author Jens Hyllegaard + * @author soer9648 */ $lang['server'] = 'Din MySQL server'; $lang['debug'] = 'Vis yderligere debug output'; +$lang['getUserInfo'] = 'SQL-sætning til at hente brugerinformation'; +$lang['getUsers'] = 'SQL-sætning til at liste alle brugere'; +$lang['addUser'] = 'SQL-sætning til at tilføje en ny bruger'; +$lang['addGroup'] = 'SQL-sætning til at tilføje en ny gruppe'; +$lang['addUserGroup'] = 'SQL-sætning til at tilføje en bruger til en eksisterende gruppe'; +$lang['delGroup'] = 'SQL-sætning til at fjerne en gruppe'; +$lang['delUser'] = 'SQL-sætning til at slette en bruger'; +$lang['delUserRefs'] = 'SQL-sætning til at fjerne en bruger fra alle grupper'; +$lang['updateUser'] = 'SQL-sætning til at opdatere en brugerprofil'; $lang['debug_o_0'] = 'ingen'; $lang['debug_o_1'] = 'kun ved fejl'; $lang['debug_o_2'] = 'alle SQL forespørgsler'; diff --git a/lib/plugins/authpgsql/lang/da/settings.php b/lib/plugins/authpgsql/lang/da/settings.php index 76c08a734..007174815 100644 --- a/lib/plugins/authpgsql/lang/da/settings.php +++ b/lib/plugins/authpgsql/lang/da/settings.php @@ -4,7 +4,19 @@ * @license GPL 2 (http://www.gnu.org/licenses/gpl.html) * * @author Jens Hyllegaard + * @author soer9648 */ $lang['server'] = 'Din PostgresSQL server'; $lang['port'] = 'Din PostgresSQL servers port'; +$lang['password'] = 'Kodeord til ovenstående bruger'; +$lang['database'] = 'Database der skal benyttes'; $lang['debug'] = 'Vis yderligere debug output'; +$lang['checkPass'] = 'SQL-sætning til at kontrollere kodeord'; +$lang['getUsers'] = 'SQL-sætning til at liste alle brugere'; +$lang['addUser'] = 'SQL-sætning til at tilføje en ny bruger'; +$lang['addGroup'] = 'SQL-sætning til at tilføje en ny gruppe'; +$lang['addUserGroup'] = 'SQL-sætning til at tilføje en bruger til en eksisterende gruppe'; +$lang['delGroup'] = 'SQL-sætning til at fjerne en gruppe'; +$lang['delUser'] = 'SQL-sætning til at slette en bruger'; +$lang['delUserRefs'] = 'SQL-sætning til at fjerne en bruger fra alle grupper'; +$lang['updateUser'] = 'SQL-sætning til at opdatere en brugerprofil'; diff --git a/lib/plugins/usermanager/lang/da/lang.php b/lib/plugins/usermanager/lang/da/lang.php index 6b615b51d..47d7efea2 100644 --- a/lib/plugins/usermanager/lang/da/lang.php +++ b/lib/plugins/usermanager/lang/da/lang.php @@ -12,6 +12,7 @@ * @author rasmus@kinnerup.com * @author Michael Pedersen subben@gmail.com * @author Mikael Lyngvig + * @author soer9648 */ $lang['menu'] = 'Brugerstyring'; $lang['noauth'] = '(Brugervalidering er ikke tilgængelig)'; @@ -34,6 +35,11 @@ $lang['search'] = 'Søg'; $lang['search_prompt'] = 'Udfør søgning'; $lang['clear'] = 'Nulstil søgefilter'; $lang['filter'] = 'Filter'; +$lang['export_all'] = 'Eksportér Alle Brugere (CSV)'; +$lang['export_filtered'] = 'Eksportér Filtrerede Brugerliste (CSV)'; +$lang['import'] = 'Importér Nye Brugere'; +$lang['line'] = 'Linje nr.'; +$lang['error'] = 'Fejlmeddelelse'; $lang['summary'] = 'Viser brugerne %1$d-%2$d ud af %3$d fundne. %4$d brugere totalt.'; $lang['nonefound'] = 'Ingen brugere fundet. %d brugere totalt.'; $lang['delete_ok'] = '%d brugere slettet'; @@ -54,3 +60,15 @@ $lang['add_ok'] = 'Bruger tilføjet uden fejl.'; $lang['add_fail'] = 'Tilføjelse af bruger mislykkedes'; $lang['notify_ok'] = 'Meddelelse sendt'; $lang['notify_fail'] = 'Meddelelse kunne ikke sendes'; +$lang['import_userlistcsv'] = 'Brugerlistefil (CSV):'; +$lang['import_header'] = 'Nyeste Import - Fejl'; +$lang['import_success_count'] = 'Bruger-Import: %d brugere fundet, %d importeret med succes.'; +$lang['import_failure_count'] = 'Bruger-Import: %d fejlet. Fejl er listet nedenfor.'; +$lang['import_error_fields'] = 'Utilstrækkelige felter, fandt %d, påkrævet 4.'; +$lang['import_error_baduserid'] = 'Bruger-id mangler'; +$lang['import_error_badname'] = 'Ugyldigt navn'; +$lang['import_error_badmail'] = 'Ugyldig email-adresse'; +$lang['import_error_upload'] = 'Import Fejlet. CSV-filen kunne ikke uploades eller er tom.'; +$lang['import_error_readfail'] = 'Import Fejlet. Ikke muligt at læse uploadede fil.'; +$lang['import_error_create'] = 'Ikke muligt at oprette brugeren'; +$lang['import_notify_fail'] = 'Notifikationsmeddelelse kunne ikke sendes for importerede bruger %s, med emailen %s.'; -- cgit v1.2.3 From 9970bf3ddc2f2a04491ead0bf54523270c3f0102 Mon Sep 17 00:00:00 2001 From: Martin Michalek Date: Tue, 12 Nov 2013 20:56:02 +0100 Subject: translation update --- lib/plugins/authad/lang/sk/settings.php | 5 +++++ lib/plugins/authldap/lang/sk/settings.php | 6 ++++++ lib/plugins/authmysql/lang/sk/settings.php | 4 ++++ lib/plugins/authpgsql/lang/sk/settings.php | 1 + 4 files changed, 16 insertions(+) (limited to 'lib') diff --git a/lib/plugins/authad/lang/sk/settings.php b/lib/plugins/authad/lang/sk/settings.php index 55f266dd6..b7d822f7e 100644 --- a/lib/plugins/authad/lang/sk/settings.php +++ b/lib/plugins/authad/lang/sk/settings.php @@ -6,10 +6,15 @@ * @author Martin Michalek */ $lang['account_suffix'] = 'Prípona používateľského účtu. Napr. @my.domain.org'; +$lang['base_dn'] = 'Vaše base DN. Napr. DC=my,DC=domain,DC=org'; +$lang['domain_controllers'] = 'Zoznam doménových radičov oddelených čiarkou. Napr. srv1.domain.org,srv2.domain.org'; $lang['admin_username'] = 'Privilegovaný používateľ Active Directory s prístupom ku všetkým dátam ostatných používateľov. Nepovinné nastavenie, ale potrebné pre určité akcie ako napríklad zasielanie mailov o zmenách.'; $lang['admin_password'] = 'Heslo vyššie uvedeného používateľa.'; $lang['sso'] = 'Použiť Single-Sign-On cez Kerberos alebo NTLM?'; +$lang['sso_charset'] = 'Znaková sada, v ktorej bude webserver prenášať meno Kerberos or NTLM používateľa. Prázne pole znamená UTF-8 alebo latin-1. Vyžaduje iconv rozšírenie.'; +$lang['real_primarygroup'] = 'Použiť skutočnú primárnu skupinu používateľa namiesto "Doménoví používatelia" (pomalšie).'; $lang['use_ssl'] = 'Použiť SSL pripojenie? Ak áno, nepovoľte TLS nižšie.'; $lang['use_tls'] = 'Použiť TLS pripojenie? Ak áno, nepovoľte SSL vyššie.'; $lang['debug'] = 'Zobraziť doplňujúce ladiace informácie pri chybe?'; +$lang['expirywarn'] = 'Počet dní pred uplynutím platnosti hesla, počas ktorých používateľ dostáva upozornenie. 0 deaktivuje túto voľbu.'; $lang['additional'] = 'Zoznam dodatočných AD atribútov oddelených čiarkou získaných z údajov používateľa. Používané niektorými pluginmi.'; diff --git a/lib/plugins/authldap/lang/sk/settings.php b/lib/plugins/authldap/lang/sk/settings.php index 48bd37395..c44f07e97 100644 --- a/lib/plugins/authldap/lang/sk/settings.php +++ b/lib/plugins/authldap/lang/sk/settings.php @@ -13,7 +13,13 @@ $lang['userfilter'] = 'LDAP filter pre vyhľadávanie používateľsk $lang['groupfilter'] = 'LDAP filter pre vyhľadávanie skupín. Napr. (&(objectClass=posixGroup)(|(gidNumber=%{gid})(memberUID=%{user})))'; $lang['version'] = 'Použitá verzia protokolu. Možno bude potrebné nastaviť na hodnotu 3'; $lang['starttls'] = 'Použiť TLS pripojenie?'; +$lang['referrals'] = 'Majú byť nasledované odkazy na používateľov (referrals)?'; +$lang['deref'] = 'Ako previesť aliasy?'; +$lang['binddn'] = 'DN prípadného priradenia používateľa, ak anonymné priradenie nie je dostatočné. Napr. cn=admin, dc=my, dc=home'; $lang['bindpw'] = 'Heslo vyššie uvedeného používateľa'; +$lang['userscope'] = 'Obmedzenie oblasti pri vyhľadávaní používateľa'; +$lang['groupscope'] = 'Obmedzenie oblasti pri vyhľadávaní skupiny'; +$lang['groupkey'] = 'Príslušnost k skupine určená z daného atribútu používateľa (namiesto štandardnej AD skupiny) napr. skupiny podľa oddelenia alebo telefónneho čísla'; $lang['debug'] = 'Zobraziť doplňujúce ladiace informácie pri chybe'; $lang['deref_o_0'] = 'LDAP_DEREF_NEVER'; $lang['deref_o_1'] = 'LDAP_DEREF_SEARCHING'; diff --git a/lib/plugins/authmysql/lang/sk/settings.php b/lib/plugins/authmysql/lang/sk/settings.php index 8c52f905e..d7e8cb286 100644 --- a/lib/plugins/authmysql/lang/sk/settings.php +++ b/lib/plugins/authmysql/lang/sk/settings.php @@ -34,5 +34,9 @@ $lang['UpdateLogin'] = 'SQL podmienka pre aktualizáciu prihlasovacieh $lang['UpdatePass'] = 'SQL podmienka pre aktualizáciu hesla používateľa'; $lang['UpdateEmail'] = 'SQL podmienka pre aktualizáciu emailovej adresy používateľa'; $lang['UpdateName'] = 'SQL podmienka pre aktualizáciu mena a priezviska používateľa'; +$lang['UpdateTarget'] = 'Podmienka identifikácie používateľa pri aktualizácii'; $lang['delUserGroup'] = 'SQL príkaz pre vyradenie používateľa z danej skupiny'; $lang['getGroupID'] = 'SQL príkaz pre získanie primárneho kľúča skupiny'; +$lang['debug_o_0'] = 'žiadne'; +$lang['debug_o_1'] = 'iba pri chybách'; +$lang['debug_o_2'] = 'všetky SQL dopyty'; diff --git a/lib/plugins/authpgsql/lang/sk/settings.php b/lib/plugins/authpgsql/lang/sk/settings.php index 9d656415d..861d1237d 100644 --- a/lib/plugins/authpgsql/lang/sk/settings.php +++ b/lib/plugins/authpgsql/lang/sk/settings.php @@ -33,5 +33,6 @@ $lang['UpdateLogin'] = 'SQL podmienka pre aktualizáciu prihlasovacieh $lang['UpdatePass'] = 'SQL podmienka pre aktualizáciu hesla používateľa'; $lang['UpdateEmail'] = 'SQL podmienka pre aktualizáciu emailovej adresy používateľa'; $lang['UpdateName'] = 'SQL podmienka pre aktualizáciu mena a priezviska používateľa'; +$lang['UpdateTarget'] = 'Podmienka identifikácie používateľa pri aktualizácii'; $lang['delUserGroup'] = 'SQL príkaz pre vyradenie používateľa z danej skupiny'; $lang['getGroupID'] = 'SQL príkaz pre získanie primárneho kľúča skupiny'; -- cgit v1.2.3 From 47f862d1e038979f4d2dd5bb0c3eaaa9d1ee8fee Mon Sep 17 00:00:00 2001 From: Christopher Smith Date: Tue, 12 Nov 2013 23:37:38 +0000 Subject: Fix an issue with style.ini replacements values not having relative locations corrected, when those values are "url(...)". Explanation: In the change to the less css extension, variable replacements now happen after the less/css files are processed for correction of relative locations. --- lib/exe/css.php | 13 ++++++++++--- 1 file changed, 10 insertions(+), 3 deletions(-) (limited to 'lib') diff --git a/lib/exe/css.php b/lib/exe/css.php index f0bd24b43..af7f9e4f1 100644 --- a/lib/exe/css.php +++ b/lib/exe/css.php @@ -271,7 +271,7 @@ function css_styleini($tpl) { // replacements if(is_array($data['replacements'])){ - $replacements = array_merge($replacements, $data['replacements']); + $replacements = array_merge($replacements, css_fixreplacementurls($data['replacements'],$webbase)); } } @@ -288,7 +288,7 @@ function css_styleini($tpl) { // replacements if(is_array($data['replacements'])){ - $replacements = array_merge($replacements, $data['replacements']); + $replacements = array_merge($replacements, css_fixreplacementurls($data['replacements'],$webbase)); } } @@ -306,7 +306,7 @@ function css_styleini($tpl) { // replacements if(is_array($data['replacements'])){ - $replacements = array_merge($replacements, $data['replacements']); + $replacements = array_merge($replacements, css_fixreplacementurls($data['replacements'],$webbase)); } } @@ -316,6 +316,13 @@ function css_styleini($tpl) { ); } +function css_fixreplacementurls($replacements, $location) { + foreach($replacements as $key => $value) { + $replacements[$key] = preg_replace('#(url\([ \'"]*)(?!/|data:|http://|https://| |\'|")#','\\1'.$location,$value); + } + return $replacements; +} + /** * Prints classes for interwikilinks * -- cgit v1.2.3 From 5381a7ee4e6527c7d6d6af67134ef92ba97f8745 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Elan=20Ruusam=C3=A4e?= Date: Wed, 13 Nov 2013 22:52:40 +0200 Subject: remove 'infos' misspelling http://english.stackexchange.com/questions/117552/why-does-information-not-have-a-plural-form --- lib/exe/detail.php | 2 +- lib/plugins/acl/admin.php | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) (limited to 'lib') diff --git a/lib/exe/detail.php b/lib/exe/detail.php index e3c81d877..cd3f362ad 100644 --- a/lib/exe/detail.php +++ b/lib/exe/detail.php @@ -6,7 +6,7 @@ require_once(DOKU_INC.'inc/init.php'); $IMG = getID('media'); $ID = cleanID($INPUT->str('id')); -// this makes some general infos available as well as the info about the +// this makes some general info available as well as the info about the // "parent" page $INFO = array_merge(pageinfo(),mediainfo()); diff --git a/lib/plugins/acl/admin.php b/lib/plugins/acl/admin.php index b24981d91..6c7c28ff6 100644 --- a/lib/plugins/acl/admin.php +++ b/lib/plugins/acl/admin.php @@ -345,7 +345,7 @@ class admin_plugin_acl extends DokuWiki_Admin_Plugin { } /** - * Print infos and editor + * Print info and editor */ function _html_info(){ global $ID; -- cgit v1.2.3 From dc4e861bc179b74b87293e83e19a73f781d41690 Mon Sep 17 00:00:00 2001 From: Myeongjin Date: Sat, 16 Nov 2013 01:30:59 +0100 Subject: translation update --- lib/plugins/authldap/lang/ko/settings.php | 4 ++-- lib/plugins/revert/lang/ko/intro.txt | 2 +- lib/plugins/revert/lang/ko/lang.php | 2 +- lib/plugins/usermanager/lang/ko/lang.php | 6 +++--- 4 files changed, 7 insertions(+), 7 deletions(-) (limited to 'lib') diff --git a/lib/plugins/authldap/lang/ko/settings.php b/lib/plugins/authldap/lang/ko/settings.php index 5c5341b31..ae8dc7ab6 100644 --- a/lib/plugins/authldap/lang/ko/settings.php +++ b/lib/plugins/authldap/lang/ko/settings.php @@ -17,8 +17,8 @@ $lang['referrals'] = '참고(referrals)를 허용하겠습니까? '; $lang['deref'] = '어떻게 별명을 간접 참고하겠습니까?'; $lang['binddn'] = '익명 바인드가 충분하지 않으면 선택적인 바인드 사용자의 DN. 예를 들어 cn=admin, dc=my, dc=home'; $lang['bindpw'] = '위 사용자의 비밀번호'; -$lang['userscope'] = '사용자 찾기에 대한 찾기 범위 제한'; -$lang['groupscope'] = '그룹 찾기에 대한 찾기 범위 제한'; +$lang['userscope'] = '사용자 검색에 대한 검색 범위 제한'; +$lang['groupscope'] = '그룹 검색에 대한 검색 범위 제한'; $lang['groupkey'] = '(표준 AD 그룹 대신) 사용자 속성에서 그룹 구성원. 예를 들어 부서나 전화에서 그룹'; $lang['debug'] = '오류에 대한 추가적인 디버그 정보를 보이기'; $lang['deref_o_0'] = 'LDAP_DEREF_NEVER'; diff --git a/lib/plugins/revert/lang/ko/intro.txt b/lib/plugins/revert/lang/ko/intro.txt index 7aa618ba6..565aa4bbe 100644 --- a/lib/plugins/revert/lang/ko/intro.txt +++ b/lib/plugins/revert/lang/ko/intro.txt @@ -1,3 +1,3 @@ ====== 되돌리기 관리자 ====== -스팸 공격으로부터 자동으로 되돌리는데 이 페이지가 도움이 될 수 있습니다. 스팸 공격받은 문서 목록을 찾으려면 문자열을 입력하고(예를 들어 스팸 URL) 나서 찾은 문서가 스팸 공격을 받았는지 확인하고 되돌리세요. \ No newline at end of file +스팸 공격으로부터 자동으로 되돌리는데 이 페이지가 도움이 될 수 있습니다. 스팸에 공격 받은 문서 목록을 찾으려면 검색어를 입력하고(예를 들어 스팸 URL) 나서 찾은 문서가 스팸 공격을 받았는지 확인하고 되돌리세요. \ No newline at end of file diff --git a/lib/plugins/revert/lang/ko/lang.php b/lib/plugins/revert/lang/ko/lang.php index e63706960..5666100e9 100644 --- a/lib/plugins/revert/lang/ko/lang.php +++ b/lib/plugins/revert/lang/ko/lang.php @@ -11,7 +11,7 @@ * @author Myeongjin */ $lang['menu'] = '되돌리기 관리자'; -$lang['filter'] = '스팸 문서 찾기'; +$lang['filter'] = '스팸 문서 검색'; $lang['revert'] = '선택한 문서 되돌리기'; $lang['reverted'] = '%s 판을 %s 판으로 되돌림'; $lang['removed'] = '%s 제거됨'; diff --git a/lib/plugins/usermanager/lang/ko/lang.php b/lib/plugins/usermanager/lang/ko/lang.php index 1905fadc2..ccc7f9059 100644 --- a/lib/plugins/usermanager/lang/ko/lang.php +++ b/lib/plugins/usermanager/lang/ko/lang.php @@ -28,9 +28,9 @@ $lang['delete_selected'] = '선택 삭제'; $lang['edit'] = '편집'; $lang['edit_prompt'] = '이 사용자 편집'; $lang['modify'] = '바뀜 저장'; -$lang['search'] = '찾기'; -$lang['search_prompt'] = '찾기 실행'; -$lang['clear'] = '찾기 필터 재설정'; +$lang['search'] = '검색'; +$lang['search_prompt'] = '검색 수행'; +$lang['clear'] = '검색 필터 재설정'; $lang['filter'] = '필터'; $lang['export_all'] = '모든 사용자 목록 내보내기 (CSV)'; $lang['export_filtered'] = '필터된 사용자 목록 내보내기 (CSV)'; -- cgit v1.2.3 From 072d667427a897f2b6320dd0a24ccf7206d08ae3 Mon Sep 17 00:00:00 2001 From: Myeongjin Date: Sat, 16 Nov 2013 15:46:04 +0900 Subject: fix mistranslated messages --- lib/plugins/config/lang/ko/lang.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'lib') diff --git a/lib/plugins/config/lang/ko/lang.php b/lib/plugins/config/lang/ko/lang.php index ac52090e3..0cdaca90d 100644 --- a/lib/plugins/config/lang/ko/lang.php +++ b/lib/plugins/config/lang/ko/lang.php @@ -71,7 +71,7 @@ $lang['deaccent'] = '문서 이름을 지우는 방법'; $lang['useheading'] = '문서 이름으로 첫 문단 제목 사용'; $lang['sneaky_index'] = '기본적으로 도쿠위키는 색인 목록에 모든 이름공간을 보여줍니다. 이 옵션을 설정하면 사용자가 읽기 권한을 가지고 있지 않은 이름공간은 보여주지 않습니다. 접근 가능한 하위 이름공간을 보이지 않게 설정하면 자동으로 설정됩니다. 특정 ACL 설정은 색인 사용이 불가능하게 할 수도 있습니다.'; -$lang['hidepages'] = '사이트맵과 기타 자동 색인과 같은 찾기에서 정규 표현식과 일치하는 문서 숨기기'; +$lang['hidepages'] = '검색, 사이트맵과 기타 자동 색인에서 정규 표현식과 일치하는 문서 숨기기'; $lang['useacl'] = '접근 제어 목록 (ACL) 사용'; $lang['autopasswd'] = '자동으로 만들어진 비밀번호'; $lang['authtype'] = '인증 백-엔드'; @@ -137,7 +137,7 @@ $lang['gzip_output'] = 'xhml 내용 gzip 압축 사용'; $lang['compress'] = '최적화된 CSS, 자바스크립트 출력'; $lang['cssdatauri'] = '그림이 렌더링될 최대 용량 크기를 CSS에 규정해야 HTTP 요청 헤더 오버헤드 크기를 감소시킬 수 있습니다. 이 기술은 IE 7 이하에서는 작동하지 않습니다! 400에서 600 정도면 좋은 효율을 가져옵니다. 0로 지정할 경우 비활성화 됩니다.'; $lang['send404'] = '존재하지 않는 페이지에 대해 "HTTP 404/페이지를 찾을 수 없습니다" 응답'; -$lang['broken_iua'] = '설치된 시스템에서 ignore_user_abort 기능에 문제가 있습니까? 문제가 있다면 색인이 정상적으로 동작하지 않습니다. 이 기능이 IIS+PHP/CGI에서 문제가 있는 것으로 알려졌습니다. 자세한 정보는 버그 852를 참고하시기 바랍니다.'; +$lang['broken_iua'] = '설치된 시스템에서 ignore_user_abort 기능에 문제가 있습니까? 문제가 있다면 검색 색인이 정상적으로 동작하지 않습니다. 이 기능이 IIS+PHP/CGI에서 문제가 있는 것으로 알려졌습니다. 자세한 정보는 버그 852를 참고하시기 바랍니다.'; $lang['xsendfile'] = '웹 서버가 정적 파일을 제공하도록 X-Sendfile 헤더를 사용하겠습니까? 웹 서버가 이 기능을 지원해야 합니다.'; $lang['renderer_xhtml'] = '주 (xhtml) 위키 출력 처리기'; $lang['renderer__core'] = '%s (도쿠위키 내부)'; -- cgit v1.2.3 From 834ad97fc976d60bd2e57b488a43aca1f39b2277 Mon Sep 17 00:00:00 2001 From: Anika Henke Date: Sat, 16 Nov 2013 21:18:23 +0000 Subject: Improved pagetools event in dokuwiki template This moves the template name away from the hook name into the event data (as the 'tpl' value). Therefore it moves the previous data items into the 'items' sub array. A 'view' value has also been added to describe in which template file the event was called ('main' or 'detail'). This way it will be much easier for plugins to consider default cases and differentiate between main and other layouts. --- lib/tpl/dokuwiki/detail.php | 14 ++++++-------- lib/tpl/dokuwiki/main.php | 24 ++++++++++++------------ 2 files changed, 18 insertions(+), 20 deletions(-) (limited to 'lib') diff --git a/lib/tpl/dokuwiki/detail.php b/lib/tpl/dokuwiki/detail.php index c602830f7..2ee36a2a9 100644 --- a/lib/tpl/dokuwiki/detail.php +++ b/lib/tpl/dokuwiki/detail.php @@ -110,26 +110,24 @@ header('X-UA-Compatible: IE=edge,chrome=1');
    = AUTH_UPLOAD) && function_exists('media_managerURL')) { $mmURL = media_managerURL(array('ns' => $imgNS, 'image' => $IMG)); - $data['mediaManager'] = '
  • '.$lang['img_manager'].'
  • '; + $data['items']['mediaManager'] = '
  • '.$lang['img_manager'].'
  • '; } // Back to [ID]; @todo: transfer logic to backend - $data['img_backto'] = '
  • '.$lang['img_backto'].' '.$ID.'
  • '; + $data['items']['img_backto'] = '
  • '.$lang['img_backto'].' '.$ID.'
  • '; // the page tools can be amended through a custom plugin hook - // if you're deriving from this template and your design is close enough to - // the dokuwiki template you might want to trigger a DOKUWIKI event instead - // of using $conf['template'] here - $hook = 'TEMPLATE_'.strtoupper($conf['template']).'_PAGETOOLS_DISPLAY'; - $evt = new Doku_Event($hook, $data); + $evt = new Doku_Event('TEMPLATE_PAGETOOLS_DISPLAY', $data); if($evt->advise_before()){ - foreach($evt->data as $k => $html) echo $html; + foreach($evt->data['items'] as $k => $html) echo $html; } $evt->advise_after(); unset($data); diff --git a/lib/tpl/dokuwiki/main.php b/lib/tpl/dokuwiki/main.php index f6ca4ed86..0dbaa681b 100644 --- a/lib/tpl/dokuwiki/main.php +++ b/lib/tpl/dokuwiki/main.php @@ -75,22 +75,22 @@ $showSidebar = $hasSidebar && ($ACT=='show');
      tpl_action('edit', 1, 'li', 1, '', ''), - 'revert' => tpl_action('revert', 1, 'li', 1, '', ''), - 'revisions' => tpl_action('revisions', 1, 'li', 1, '', ''), - 'backlink' => tpl_action('backlink', 1, 'li', 1, '', ''), - 'subscribe' => tpl_action('subscribe', 1, 'li', 1, '', ''), - 'top' => tpl_action('top', 1, 'li', 1, '', '') + 'tpl' => $conf['template'], + 'view' => 'main', + 'items' => array( + 'edit' => tpl_action('edit', 1, 'li', 1, '', ''), + 'revert' => tpl_action('revert', 1, 'li', 1, '', ''), + 'revisions' => tpl_action('revisions', 1, 'li', 1, '', ''), + 'backlink' => tpl_action('backlink', 1, 'li', 1, '', ''), + 'subscribe' => tpl_action('subscribe', 1, 'li', 1, '', ''), + 'top' => tpl_action('top', 1, 'li', 1, '', '') + ) ); // the page tools can be amended through a custom plugin hook - // if you're deriving from this template and your design is close enough to - // the dokuwiki template you might want to trigger a DOKUWIKI event instead - // of using $conf['template'] here - $hook = 'TEMPLATE_'.strtoupper($conf['template']).'_PAGETOOLS_DISPLAY'; - $evt = new Doku_Event($hook, $data); + $evt = new Doku_Event('TEMPLATE_PAGETOOLS_DISPLAY', $data); if($evt->advise_before()){ - foreach($evt->data as $k => $html) echo $html; + foreach($evt->data['items'] as $k => $html) echo $html; } $evt->advise_after(); unset($data); -- cgit v1.2.3 From f8cadb6a04d3c1c201dd77627c89bd1c0efcac51 Mon Sep 17 00:00:00 2001 From: Anika Henke Date: Sun, 17 Nov 2013 20:39:07 +0000 Subject: removed tpl from TEMPLATE_PAGETOOLS_DISPLAY event as it's always available in --- lib/tpl/dokuwiki/detail.php | 1 - lib/tpl/dokuwiki/main.php | 1 - 2 files changed, 2 deletions(-) (limited to 'lib') diff --git a/lib/tpl/dokuwiki/detail.php b/lib/tpl/dokuwiki/detail.php index 2ee36a2a9..ec846f6fd 100644 --- a/lib/tpl/dokuwiki/detail.php +++ b/lib/tpl/dokuwiki/detail.php @@ -110,7 +110,6 @@ header('X-UA-Compatible: IE=edge,chrome=1');
        $conf['template'], 'view' => 'main', 'items' => array( 'edit' => tpl_action('edit', 1, 'li', 1, '', ''), -- cgit v1.2.3 From b090397b36856aa72a3c87dc391f5fea13c68571 Mon Sep 17 00:00:00 2001 From: Benedikt Fey Date: Mon, 18 Nov 2013 11:21:02 +0100 Subject: translation update --- lib/plugins/authad/lang/de/settings.php | 2 +- lib/plugins/usermanager/lang/de/lang.php | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) (limited to 'lib') diff --git a/lib/plugins/authad/lang/de/settings.php b/lib/plugins/authad/lang/de/settings.php index 6bc86dc01..8105fb6f2 100644 --- a/lib/plugins/authad/lang/de/settings.php +++ b/lib/plugins/authad/lang/de/settings.php @@ -2,7 +2,7 @@ /** * @license GPL 2 (http://www.gnu.org/licenses/gpl.html) - * + * * @author Frank Loizzi * @author Matthias Schulte * @author Ben Fey diff --git a/lib/plugins/usermanager/lang/de/lang.php b/lib/plugins/usermanager/lang/de/lang.php index d1b9b908b..4b297b0dc 100644 --- a/lib/plugins/usermanager/lang/de/lang.php +++ b/lib/plugins/usermanager/lang/de/lang.php @@ -2,7 +2,7 @@ /** * @license GPL 2 (http://www.gnu.org/licenses/gpl.html) - * + * * @author Matthias Grimm * @author Andreas Gohr * @author Michael Klier -- cgit v1.2.3 From dce9cd11f94321df5bde479e72fd8a01257b59d3 Mon Sep 17 00:00:00 2001 From: Gerrit Uitslag Date: Mon, 18 Nov 2013 17:11:10 +0100 Subject: translation update --- lib/plugins/authad/lang/nl/settings.php | 2 ++ 1 file changed, 2 insertions(+) (limited to 'lib') diff --git a/lib/plugins/authad/lang/nl/settings.php b/lib/plugins/authad/lang/nl/settings.php index 69d67be9a..591d72941 100644 --- a/lib/plugins/authad/lang/nl/settings.php +++ b/lib/plugins/authad/lang/nl/settings.php @@ -4,6 +4,7 @@ * @license GPL 2 (http://www.gnu.org/licenses/gpl.html) * * @author Remon + * @author Gerrit Uitslag */ $lang['account_suffix'] = 'Je account domeinnaam. Bijv @mijn.domein.org'; $lang['base_dn'] = 'Je basis DN. Bijv. DC=mijn,DC=domein,DC=org'; @@ -11,6 +12,7 @@ $lang['domain_controllers'] = 'Eeen kommagescheiden lijst van domeinservers. $lang['admin_username'] = 'Een geprivilegeerde Active Directory gebruiker die bij alle gebruikersgegevens kan komen. Dit is optioneel maar kan nodig zijn voor bepaalde acties, zoals het versturen van abonnementsmailtjes.'; $lang['admin_password'] = 'Het wachtwoord van bovenstaande gebruiker.'; $lang['sso'] = 'Wordt voor Single-Sign-on Kerberos of NTLM gebruikt?'; +$lang['sso_charset'] = 'Het tekenset waarin je webserver de Kerberos of NTLM gebruikersnaam doorsturen. Leeglaten voor UTF-8 of latin-1. Vereist de iconv extensie.'; $lang['real_primarygroup'] = 'Moet de echte primaire groep worden opgezocht in plaats van het aannemen van "Domeingebruikers" (langzamer)'; $lang['use_ssl'] = 'SSL verbinding gebruiken? Zo ja, activeer dan niet de TLS optie hieronder.'; $lang['use_tls'] = 'TLS verbinding gebruiken? Zo ja, activeer dan niet de SSL verbinding hierboven.'; -- cgit v1.2.3 From 32f730b04ba68c7ca7c2d32208dfac042e6ffffd Mon Sep 17 00:00:00 2001 From: Satoshi Sahara Date: Tue, 19 Nov 2013 08:11:04 +0100 Subject: translation update --- lib/plugins/authmysql/lang/ja/settings.php | 2 +- lib/plugins/authpgsql/lang/ja/settings.php | 2 +- lib/plugins/usermanager/lang/ja/import.txt | 2 +- lib/plugins/usermanager/lang/ja/lang.php | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) (limited to 'lib') diff --git a/lib/plugins/authmysql/lang/ja/settings.php b/lib/plugins/authmysql/lang/ja/settings.php index 0dc5f1ad8..e5d5689df 100644 --- a/lib/plugins/authmysql/lang/ja/settings.php +++ b/lib/plugins/authmysql/lang/ja/settings.php @@ -11,7 +11,7 @@ $lang['password'] = 'MySQL 接続用ユーザーのパスワード' $lang['database'] = '使用するデータベース名'; $lang['charset'] = 'データベースの文字コード'; $lang['debug'] = 'デバック情報を表示する'; -$lang['forwardClearPass'] = '以下で定義する SQL ステートメントにおいて, パスワード変数 %{pass} を平文とする(DokiWiki側で暗号化しない)'; +$lang['forwardClearPass'] = '以下で定義する SQL ステートメントにおいて, パスワード変数 %{pass} を平文とする(DokiWiki側で暗号化しない)'; $lang['TablesToLock'] = '書き込み時にロックするテーブル(コンマ区切りで列挙)'; $lang['checkPass'] = 'パスワードの照合に用いる SQL ステートメント'; $lang['getUserInfo'] = 'ユーザー情報の取得に用いる SQL ステートメント'; diff --git a/lib/plugins/authpgsql/lang/ja/settings.php b/lib/plugins/authpgsql/lang/ja/settings.php index 2ce63a34a..d7a5f6cf2 100644 --- a/lib/plugins/authpgsql/lang/ja/settings.php +++ b/lib/plugins/authpgsql/lang/ja/settings.php @@ -11,7 +11,7 @@ $lang['user'] = 'PostgreSQL 接続用ユーザー名'; $lang['password'] = 'PostgreSQL 接続用ユーザーのパスワード'; $lang['database'] = '使用するデータベース名'; $lang['debug'] = 'デバック情報を表示する'; -$lang['forwardClearPass'] = '以下で定義する SQL ステートメントにおいて, パスワード変数 %{pass} を平文とする(DokiWiki側で暗号化しない)'; +$lang['forwardClearPass'] = '以下で定義する SQL ステートメントにおいて, パスワード変数 %{pass} を平文とする(DokiWiki側で暗号化しない)'; $lang['checkPass'] = 'パスワードの照合に用いる SQL ステートメント'; $lang['getUserInfo'] = 'ユーザー情報の取得に用いる SQL ステートメント'; $lang['getGroups'] = 'ユーザーが所属する全てのグループの取得に用いる SQL ステートメント'; diff --git a/lib/plugins/usermanager/lang/ja/import.txt b/lib/plugins/usermanager/lang/ja/import.txt index d4f7d08bf..751e515ac 100644 --- a/lib/plugins/usermanager/lang/ja/import.txt +++ b/lib/plugins/usermanager/lang/ja/import.txt @@ -4,7 +4,7 @@ 列の順序:ユーザーID、氏名、電子メールアドレス、グループ。 CSVフィールドはカンマ(,)区切り、文字列は引用符("")区切りです。 エスケープにバックスラッシュ(\)を使用できます。 -適切なファイル例は、上記の"エクスポートユーザー"機能で試して下さい。 +適切なファイル例は、上記の"エクスポートユーザー"機能で試して下さい。 重複するユーザーIDは無視されます。 正常にインポートされたユーザー毎に、パスワードを作成し、電子メールで送付します。 \ No newline at end of file diff --git a/lib/plugins/usermanager/lang/ja/lang.php b/lib/plugins/usermanager/lang/ja/lang.php index 0830416f3..23109f2a2 100644 --- a/lib/plugins/usermanager/lang/ja/lang.php +++ b/lib/plugins/usermanager/lang/ja/lang.php @@ -54,7 +54,7 @@ $lang['edit_usermissing'] = '選択したユーザーは見つかりませ $lang['user_notify'] = 'ユーザーに通知する'; $lang['note_notify'] = '通知メールは、ユーザーに新たなパスワードが設定された場合のみ送信されます。'; $lang['note_group'] = 'グループを指定しない場合は、既定のグループ(%s)に配属されます。'; -$lang['note_pass'] = 'パスワードを空欄とした場合は、(”ユーザーに通知する”がチェックされていなくとも)自動生成したパスワードの通知がユーザー宛てに送信されます。'; +$lang['note_pass'] = '”ユーザーに通知する”をチェックしてパスワードを空欄にすると、パスワードは自動生成されます。'; $lang['add_ok'] = 'ユーザーを登録しました'; $lang['add_fail'] = 'ユーザーの登録に失敗しました'; $lang['notify_ok'] = '通知メールを送信しました'; -- cgit v1.2.3 From a6c758f14a44f0415d89385e5612bb9ae32d6daa Mon Sep 17 00:00:00 2001 From: Myeongjin Date: Sun, 24 Nov 2013 11:37:45 +0100 Subject: translation update --- lib/plugins/usermanager/lang/ko/lang.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'lib') diff --git a/lib/plugins/usermanager/lang/ko/lang.php b/lib/plugins/usermanager/lang/ko/lang.php index ccc7f9059..a01cbbdba 100644 --- a/lib/plugins/usermanager/lang/ko/lang.php +++ b/lib/plugins/usermanager/lang/ko/lang.php @@ -68,5 +68,5 @@ $lang['import_error_badmail'] = '잘못된 이메일 주소'; $lang['import_error_upload'] = '가져오기를 실패했습니다. csv 파일을 올릴 수 없거나 비어 있습니다.'; $lang['import_error_readfail'] = '가져오기를 실패했습니다. 올린 파일을 읽을 수 없습니다.'; $lang['import_error_create'] = '사용자를 만들 수 없습니다.'; -$lang['import_notify_fail'] = '알림 메시지를 가져온 %2$s (이메일: %1$s ) 사용자에게 보낼 수 없습니다.'; +$lang['import_notify_fail'] = '알림 메시지를 가져온 %s (이메일: %s ) 사용자에게 보낼 수 없습니다.'; $lang['import_downloadfailures'] = '교정을 위한 CSV로 다운로드 실패'; -- cgit v1.2.3 From 853aa1550199223a46b55e9563790b9ef6a1d234 Mon Sep 17 00:00:00 2001 From: Rami Lehti Date: Sun, 24 Nov 2013 11:38:46 +0100 Subject: translation update --- lib/plugins/acl/lang/fi/lang.php | 5 +++-- lib/plugins/plugin/lang/fi/lang.php | 5 +++-- lib/plugins/popularity/lang/fi/lang.php | 5 +++-- lib/plugins/revert/lang/fi/lang.php | 5 +++-- lib/plugins/usermanager/lang/fi/lang.php | 5 +++-- 5 files changed, 15 insertions(+), 10 deletions(-) (limited to 'lib') diff --git a/lib/plugins/acl/lang/fi/lang.php b/lib/plugins/acl/lang/fi/lang.php index 4f145e0f6..50224dfb4 100644 --- a/lib/plugins/acl/lang/fi/lang.php +++ b/lib/plugins/acl/lang/fi/lang.php @@ -1,7 +1,8 @@ * @author Teemu Mattila diff --git a/lib/plugins/plugin/lang/fi/lang.php b/lib/plugins/plugin/lang/fi/lang.php index 923029a6f..f51746faa 100644 --- a/lib/plugins/plugin/lang/fi/lang.php +++ b/lib/plugins/plugin/lang/fi/lang.php @@ -1,7 +1,8 @@ * @author Teemu Mattila diff --git a/lib/plugins/popularity/lang/fi/lang.php b/lib/plugins/popularity/lang/fi/lang.php index d7c230742..ec0fc4071 100644 --- a/lib/plugins/popularity/lang/fi/lang.php +++ b/lib/plugins/popularity/lang/fi/lang.php @@ -1,7 +1,8 @@ * @author Teemu Mattila * @author Sami Olmari diff --git a/lib/plugins/revert/lang/fi/lang.php b/lib/plugins/revert/lang/fi/lang.php index fdf9bb81c..d14f527f9 100644 --- a/lib/plugins/revert/lang/fi/lang.php +++ b/lib/plugins/revert/lang/fi/lang.php @@ -1,7 +1,8 @@ * @author Teemu Mattila diff --git a/lib/plugins/usermanager/lang/fi/lang.php b/lib/plugins/usermanager/lang/fi/lang.php index 1db4bd7fb..de243133a 100644 --- a/lib/plugins/usermanager/lang/fi/lang.php +++ b/lib/plugins/usermanager/lang/fi/lang.php @@ -1,7 +1,8 @@ * @author Teemu Mattila -- cgit v1.2.3 From a8bca8a644cdcea093acf51a543cbff261ef0b8a Mon Sep 17 00:00:00 2001 From: Otto Vainio Date: Sun, 24 Nov 2013 18:01:23 +0100 Subject: translation update --- lib/plugins/acl/lang/fi/lang.php | 5 +++-- lib/plugins/authad/lang/fi/settings.php | 7 +++++-- lib/plugins/authldap/lang/fi/settings.php | 9 +++++++-- lib/plugins/plugin/lang/fi/lang.php | 5 +++-- lib/plugins/popularity/lang/fi/lang.php | 5 +++-- lib/plugins/revert/lang/fi/lang.php | 5 +++-- lib/plugins/usermanager/lang/fi/lang.php | 5 +++-- 7 files changed, 27 insertions(+), 14 deletions(-) (limited to 'lib') diff --git a/lib/plugins/acl/lang/fi/lang.php b/lib/plugins/acl/lang/fi/lang.php index 4f145e0f6..50224dfb4 100644 --- a/lib/plugins/acl/lang/fi/lang.php +++ b/lib/plugins/acl/lang/fi/lang.php @@ -1,7 +1,8 @@ * @author Teemu Mattila diff --git a/lib/plugins/authad/lang/fi/settings.php b/lib/plugins/authad/lang/fi/settings.php index d3aa13e07..e2f432f36 100644 --- a/lib/plugins/authad/lang/fi/settings.php +++ b/lib/plugins/authad/lang/fi/settings.php @@ -1,6 +1,9 @@ */ +$lang['debug'] = 'Näytä lisää debug-koodia virheistä?'; +$lang['expirywarn'] = 'Montako päivää etukäteen varoitetaan salasanan vanhenemissta. 0 poistaa.'; diff --git a/lib/plugins/authldap/lang/fi/settings.php b/lib/plugins/authldap/lang/fi/settings.php index d3aa13e07..b15d8c676 100644 --- a/lib/plugins/authldap/lang/fi/settings.php +++ b/lib/plugins/authldap/lang/fi/settings.php @@ -1,6 +1,11 @@ */ +$lang['starttls'] = 'Käytä TLS yhteyttä'; +$lang['bindpw'] = 'Ylläolevan käyttäjän salasana'; +$lang['userscope'] = 'Etsi vain käyttäjiä'; +$lang['groupscope'] = 'Etsi vain ryhmiä'; diff --git a/lib/plugins/plugin/lang/fi/lang.php b/lib/plugins/plugin/lang/fi/lang.php index 923029a6f..f51746faa 100644 --- a/lib/plugins/plugin/lang/fi/lang.php +++ b/lib/plugins/plugin/lang/fi/lang.php @@ -1,7 +1,8 @@ * @author Teemu Mattila diff --git a/lib/plugins/popularity/lang/fi/lang.php b/lib/plugins/popularity/lang/fi/lang.php index d7c230742..ec0fc4071 100644 --- a/lib/plugins/popularity/lang/fi/lang.php +++ b/lib/plugins/popularity/lang/fi/lang.php @@ -1,7 +1,8 @@ * @author Teemu Mattila * @author Sami Olmari diff --git a/lib/plugins/revert/lang/fi/lang.php b/lib/plugins/revert/lang/fi/lang.php index fdf9bb81c..d14f527f9 100644 --- a/lib/plugins/revert/lang/fi/lang.php +++ b/lib/plugins/revert/lang/fi/lang.php @@ -1,7 +1,8 @@ * @author Teemu Mattila diff --git a/lib/plugins/usermanager/lang/fi/lang.php b/lib/plugins/usermanager/lang/fi/lang.php index 1db4bd7fb..de243133a 100644 --- a/lib/plugins/usermanager/lang/fi/lang.php +++ b/lib/plugins/usermanager/lang/fi/lang.php @@ -1,7 +1,8 @@ * @author Teemu Mattila -- cgit v1.2.3 From 94070874cc8d8702821161dbaa291e8b2d043ad3 Mon Sep 17 00:00:00 2001 From: Thomas Juberg Date: Sun, 24 Nov 2013 18:02:23 +0100 Subject: translation update --- lib/plugins/acl/lang/no/lang.php | 6 +++--- lib/plugins/plugin/lang/no/lang.php | 7 ++++--- lib/plugins/popularity/lang/no/lang.php | 7 ++++--- lib/plugins/revert/lang/no/lang.php | 8 +++++--- lib/plugins/usermanager/lang/no/lang.php | 7 ++++--- 5 files changed, 20 insertions(+), 15 deletions(-) (limited to 'lib') diff --git a/lib/plugins/acl/lang/no/lang.php b/lib/plugins/acl/lang/no/lang.php index 09d71937a..82cdd5eef 100644 --- a/lib/plugins/acl/lang/no/lang.php +++ b/lib/plugins/acl/lang/no/lang.php @@ -1,8 +1,8 @@ * @author Jorge Barrera Grandon * @author Thomas Nygreen @@ -10,7 +10,7 @@ * @author Torkill Bruland * @author Rune M. Andersen * @author Jakob Vad Nielsen (me@jakobnielsen.net) - * @author Kjell Tore Næsgaard + * @author Kjell Tore Næsgaard * @author Knut Staring * @author Lisa Ditlefsen * @author Erik Pedersen diff --git a/lib/plugins/plugin/lang/no/lang.php b/lib/plugins/plugin/lang/no/lang.php index 829d29387..2b890f972 100644 --- a/lib/plugins/plugin/lang/no/lang.php +++ b/lib/plugins/plugin/lang/no/lang.php @@ -1,13 +1,14 @@ * @author Arild Burud * @author Torkill Bruland * @author Rune M. Andersen * @author Jakob Vad Nielsen (me@jakobnielsen.net) - * @author Kjell Tore Næsgaard + * @author Kjell Tore Næsgaard * @author Knut Staring * @author Lisa Ditlefsen * @author Erik Pedersen diff --git a/lib/plugins/popularity/lang/no/lang.php b/lib/plugins/popularity/lang/no/lang.php index df38f6e0e..dfa99d824 100644 --- a/lib/plugins/popularity/lang/no/lang.php +++ b/lib/plugins/popularity/lang/no/lang.php @@ -1,10 +1,11 @@ * @author Jakob Vad Nielsen (me@jakobnielsen.net) - * @author Kjell Tore Næsgaard + * @author Kjell Tore Næsgaard * @author Knut Staring * @author Lisa Ditlefsen * @author Erik Pedersen diff --git a/lib/plugins/revert/lang/no/lang.php b/lib/plugins/revert/lang/no/lang.php index 299b12ea7..e7887a07e 100644 --- a/lib/plugins/revert/lang/no/lang.php +++ b/lib/plugins/revert/lang/no/lang.php @@ -1,13 +1,14 @@ * @author Arild Burud * @author Torkill Bruland * @author Rune M. Andersen * @author Jakob Vad Nielsen (me@jakobnielsen.net) - * @author Kjell Tore Næsgaard + * @author Kjell Tore Næsgaard * @author Knut Staring * @author Lisa Ditlefsen * @author Erik Pedersen @@ -15,6 +16,7 @@ * @author Rune Rasmussen syntaxerror.no@gmail.com * @author Jon Bøe * @author Egil Hansen + * @author Thomas Juberg */ $lang['menu'] = 'Tilbakestillingsbehandler'; $lang['filter'] = 'Søk etter søppelmeldinger'; diff --git a/lib/plugins/usermanager/lang/no/lang.php b/lib/plugins/usermanager/lang/no/lang.php index 7124e4811..83823b2b8 100644 --- a/lib/plugins/usermanager/lang/no/lang.php +++ b/lib/plugins/usermanager/lang/no/lang.php @@ -1,13 +1,14 @@ * @author Arild Burud * @author Torkill Bruland * @author Rune M. Andersen * @author Jakob Vad Nielsen (me@jakobnielsen.net) - * @author Kjell Tore Næsgaard + * @author Kjell Tore Næsgaard * @author Knut Staring * @author Lisa Ditlefsen * @author Erik Pedersen -- cgit v1.2.3 From 8d6ec7dd27c536bbaf7d7c0c4f5f99ae20860f3b Mon Sep 17 00:00:00 2001 From: Tomasz Bosak Date: Sun, 24 Nov 2013 18:03:51 +0100 Subject: translation update --- lib/plugins/acl/lang/pl/lang.php | 4 ++-- lib/plugins/authad/lang/pl/settings.php | 7 +++++-- lib/plugins/authldap/lang/pl/settings.php | 5 +++-- lib/plugins/authmysql/lang/pl/settings.php | 5 +++-- lib/plugins/plugin/lang/pl/lang.php | 4 ++-- lib/plugins/popularity/lang/pl/lang.php | 5 +++-- lib/plugins/revert/lang/pl/lang.php | 4 +++- lib/plugins/usermanager/lang/pl/lang.php | 5 +++-- 8 files changed, 24 insertions(+), 15 deletions(-) (limited to 'lib') diff --git a/lib/plugins/acl/lang/pl/lang.php b/lib/plugins/acl/lang/pl/lang.php index bef2d2615..42ce7fdaf 100644 --- a/lib/plugins/acl/lang/pl/lang.php +++ b/lib/plugins/acl/lang/pl/lang.php @@ -1,8 +1,8 @@ * @author Mariusz Kujawski * @author Maciej Kurczewski diff --git a/lib/plugins/authad/lang/pl/settings.php b/lib/plugins/authad/lang/pl/settings.php index 9113c0e51..ad051b0ac 100644 --- a/lib/plugins/authad/lang/pl/settings.php +++ b/lib/plugins/authad/lang/pl/settings.php @@ -1,9 +1,12 @@ */ $lang['account_suffix'] = 'Przyrostek twojej nazwy konta np. @my.domain.org'; +$lang['base_dn'] = 'Twoje bazowe DN. Na przykład: DC=my,DC=domain,DC=org'; $lang['admin_password'] = 'Hasło dla powyższego użytkownika.'; $lang['use_ssl'] = 'Użyć połączenie SSL? Jeśli tak to nie aktywuj TLS poniżej.'; $lang['use_tls'] = 'Użyć połączenie TLS? Jeśli tak to nie aktywuj SSL powyżej.'; diff --git a/lib/plugins/authldap/lang/pl/settings.php b/lib/plugins/authldap/lang/pl/settings.php index 44641f514..084521e0d 100644 --- a/lib/plugins/authldap/lang/pl/settings.php +++ b/lib/plugins/authldap/lang/pl/settings.php @@ -1,7 +1,8 @@ * @author Grzegorz Żur * @author Mariusz Kujawski diff --git a/lib/plugins/popularity/lang/pl/lang.php b/lib/plugins/popularity/lang/pl/lang.php index 76a9464bd..045574a69 100644 --- a/lib/plugins/popularity/lang/pl/lang.php +++ b/lib/plugins/popularity/lang/pl/lang.php @@ -1,7 +1,8 @@ * @author Mariusz Kujawski * @author Maciej Kurczewski diff --git a/lib/plugins/revert/lang/pl/lang.php b/lib/plugins/revert/lang/pl/lang.php index 462841292..d2d53b87e 100644 --- a/lib/plugins/revert/lang/pl/lang.php +++ b/lib/plugins/revert/lang/pl/lang.php @@ -1,6 +1,8 @@ * @author Mariusz Kujawski * @author Maciej Kurczewski diff --git a/lib/plugins/usermanager/lang/pl/lang.php b/lib/plugins/usermanager/lang/pl/lang.php index cfc0ba327..2e063d2bb 100644 --- a/lib/plugins/usermanager/lang/pl/lang.php +++ b/lib/plugins/usermanager/lang/pl/lang.php @@ -1,7 +1,8 @@ * @author Mariusz Kujawski * @author Maciej Kurczewski -- cgit v1.2.3 From eb1d4fdee478e7cd379c3dd4a89f81ad096155c6 Mon Sep 17 00:00:00 2001 From: Claudio Lanconelli Date: Mon, 25 Nov 2013 02:00:56 +0100 Subject: translation update --- lib/plugins/authldap/lang/it/settings.php | 4 ++++ lib/plugins/authmysql/lang/it/settings.php | 7 +++++-- lib/plugins/usermanager/lang/it/lang.php | 3 +++ 3 files changed, 12 insertions(+), 2 deletions(-) (limited to 'lib') diff --git a/lib/plugins/authldap/lang/it/settings.php b/lib/plugins/authldap/lang/it/settings.php index 023159489..eba7cde6e 100644 --- a/lib/plugins/authldap/lang/it/settings.php +++ b/lib/plugins/authldap/lang/it/settings.php @@ -4,6 +4,7 @@ * @license GPL 2 (http://www.gnu.org/licenses/gpl.html) * * @author Edmondo Di Tucci + * @author Claudio Lanconelli */ $lang['server'] = 'Il tuo server LDAP. Inserire o l\'hostname (localhost) oppure un URL completo (ldap://server.tld:389)'; $lang['port'] = 'Porta del server LDAP se non è stato fornito un URL completo più sopra.'; @@ -13,3 +14,6 @@ $lang['userfilter'] = 'Filtro per cercare l\'account utente LDAP. Eg. $lang['groupfilter'] = 'Filtro per cercare i gruppi LDAP. Eg. (&(objectClass=posixGroup)(|(gidNumber=%{gid})(memberUID=%{user})))'; $lang['version'] = 'Versione protocollo da usare. Pu3'; $lang['starttls'] = 'Usare la connessione TSL?'; +$lang['userscope'] = 'Limita il contesto di ricerca per la ricerca degli utenti'; +$lang['groupscope'] = 'Limita il contesto di ricerca per la ricerca dei gruppi'; +$lang['debug'] = 'In caso di errori mostra ulteriori informazioni di debug'; diff --git a/lib/plugins/authmysql/lang/it/settings.php b/lib/plugins/authmysql/lang/it/settings.php index 10ae72f87..e493ec7e9 100644 --- a/lib/plugins/authmysql/lang/it/settings.php +++ b/lib/plugins/authmysql/lang/it/settings.php @@ -1,5 +1,8 @@ */ +$lang['debug'] = 'Mostra ulteriori informazioni di debug'; diff --git a/lib/plugins/usermanager/lang/it/lang.php b/lib/plugins/usermanager/lang/it/lang.php index dfacc6545..6c6789442 100644 --- a/lib/plugins/usermanager/lang/it/lang.php +++ b/lib/plugins/usermanager/lang/it/lang.php @@ -15,6 +15,7 @@ * @author Jacopo Corbetta * @author Matteo Pasotti * @author snarchio@gmail.com + * @author Claudio Lanconelli */ $lang['menu'] = 'Gestione Utenti'; $lang['noauth'] = '(autenticazione non disponibile)'; @@ -37,6 +38,8 @@ $lang['search'] = 'Cerca'; $lang['search_prompt'] = 'Esegui ricerca'; $lang['clear'] = 'Azzera filtro di ricerca'; $lang['filter'] = 'Filtro'; +$lang['export_all'] = 'Esporta tutti gli utenti (CSV)'; +$lang['export_filtered'] = 'Esporta elenco utenti filtrati (CSV)'; $lang['summary'] = 'Visualizzazione utenti %1$d-%2$d di %3$d trovati. %4$d utenti totali.'; $lang['nonefound'] = 'Nessun utente trovato. %d utenti totali.'; $lang['delete_ok'] = '%d utenti eliminati'; -- cgit v1.2.3 From 79c64e955bca6f4339fafa21543e532b11f341cf Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?J=C3=A9r=C3=B4me=20Brandt?= Date: Mon, 25 Nov 2013 08:31:02 +0100 Subject: translation update --- lib/plugins/usermanager/lang/fr/lang.php | 4 ++++ 1 file changed, 4 insertions(+) (limited to 'lib') diff --git a/lib/plugins/usermanager/lang/fr/lang.php b/lib/plugins/usermanager/lang/fr/lang.php index 7c24ef900..dd0e64fc4 100644 --- a/lib/plugins/usermanager/lang/fr/lang.php +++ b/lib/plugins/usermanager/lang/fr/lang.php @@ -23,6 +23,7 @@ * @author Bruno Veilleux * @author Antoine Turmel * @author schplurtz + * @author Jérôme Brandt */ $lang['menu'] = 'Gestion des utilisateurs'; $lang['noauth'] = '(authentification de l\'utilisateur non disponible)'; @@ -70,6 +71,8 @@ $lang['add_ok'] = 'Utilisateur ajouté avec succès'; $lang['add_fail'] = 'Échec de l\'ajout de l\'utilisateur'; $lang['notify_ok'] = 'Courriel de notification expédié'; $lang['notify_fail'] = 'Échec de l\'expédition du courriel de notification'; +$lang['import_userlistcsv'] = 'Liste utilisateur (fichier CSV)'; +$lang['import_header'] = 'Erreurs d\'import les plus récentes'; $lang['import_success_count'] = 'Import d’utilisateurs : %d utilisateurs trouvés, %d utilisateurs importés avec succès.'; $lang['import_failure_count'] = 'Import d\'utilisateurs : %d ont échoué. Les erreurs sont listées ci-dessous.'; $lang['import_error_fields'] = 'Nombre de champs insuffisant, %d trouvé, 4 requis.'; @@ -80,3 +83,4 @@ $lang['import_error_upload'] = 'L\'import a échoué. Le fichier csv n\'a pas $lang['import_error_readfail'] = 'L\'import a échoué. Impossible de lire le fichier téléchargé.'; $lang['import_error_create'] = 'Impossible de créer l\'utilisateur'; $lang['import_notify_fail'] = 'Impossible d\'expédier une notification à l\'utilisateur importé %s, adresse %s.'; +$lang['import_downloadfailures'] = 'Télécharger les erreurs au format CSV pour correction'; -- cgit v1.2.3 From 356106d54d31e84089087217b4895a87900b3fe0 Mon Sep 17 00:00:00 2001 From: Boris Date: Mon, 25 Nov 2013 14:05:53 +0100 Subject: translation update --- lib/plugins/revert/lang/no/lang.php | 1 + 1 file changed, 1 insertion(+) (limited to 'lib') diff --git a/lib/plugins/revert/lang/no/lang.php b/lib/plugins/revert/lang/no/lang.php index e7887a07e..c58300dc0 100644 --- a/lib/plugins/revert/lang/no/lang.php +++ b/lib/plugins/revert/lang/no/lang.php @@ -17,6 +17,7 @@ * @author Jon Bøe * @author Egil Hansen * @author Thomas Juberg + * @author Boris */ $lang['menu'] = 'Tilbakestillingsbehandler'; $lang['filter'] = 'Søk etter søppelmeldinger'; -- cgit v1.2.3 From 53afdafe30f20e091aff7b0cf6bbb86aa7b50078 Mon Sep 17 00:00:00 2001 From: Garam Date: Mon, 25 Nov 2013 20:05:58 +0100 Subject: translation update --- lib/plugins/authmysql/lang/ko/settings.php | 9 +++++---- lib/plugins/authpgsql/lang/ko/settings.php | 9 +++++---- lib/plugins/usermanager/lang/ko/lang.php | 3 ++- 3 files changed, 12 insertions(+), 9 deletions(-) (limited to 'lib') diff --git a/lib/plugins/authmysql/lang/ko/settings.php b/lib/plugins/authmysql/lang/ko/settings.php index 2175c1eea..b3479ad41 100644 --- a/lib/plugins/authmysql/lang/ko/settings.php +++ b/lib/plugins/authmysql/lang/ko/settings.php @@ -4,6 +4,7 @@ * @license GPL 2 (http://www.gnu.org/licenses/gpl.html) * * @author Myeongjin + * @author Garam */ $lang['server'] = 'MySQL 서버'; $lang['user'] = 'MySQL 사용자 이름'; @@ -17,10 +18,10 @@ $lang['checkPass'] = '비밀번호를 확인하기 위한 SQL 문'; $lang['getUserInfo'] = '사용자 정보를 가져오기 위한 SQL 문'; $lang['getGroups'] = '사용자의 그룹 구성원을 가져오기 위한 SQL 문'; $lang['getUsers'] = '모든 사용자를 나타낼 SQL 문'; -$lang['FilterLogin'] = '로그인 이름 별로 사용자를 필터하기 위한 SQL 조항'; -$lang['FilterName'] = '전체 이름 별로 사용자를 필터하기 위한 SQL 조항'; -$lang['FilterEmail'] = '이메일 주소 별로 사용자를 필터하기 위한 SQL 조항'; -$lang['FilterGroup'] = '그룹 구성원 별로 사용자를 필터하기 위한 SQL 조항'; +$lang['FilterLogin'] = '로그인 이름별로 사용자를 필터하기 위한 SQL 조항'; +$lang['FilterName'] = '전체 이름별로 사용자를 필터하기 위한 SQL 조항'; +$lang['FilterEmail'] = '이메일 주소별로 사용자를 필터하기 위한 SQL 조항'; +$lang['FilterGroup'] = '그룹 구성원별로 사용자를 필터하기 위한 SQL 조항'; $lang['SortOrder'] = '사용자를 정렬할 SQL 조항'; $lang['addUser'] = '새 사용자를 추가할 SQL 문'; $lang['addGroup'] = '새 그룹을 추가할 SQL 문'; diff --git a/lib/plugins/authpgsql/lang/ko/settings.php b/lib/plugins/authpgsql/lang/ko/settings.php index bdd8c2718..bdf38b3c7 100644 --- a/lib/plugins/authpgsql/lang/ko/settings.php +++ b/lib/plugins/authpgsql/lang/ko/settings.php @@ -4,6 +4,7 @@ * @license GPL 2 (http://www.gnu.org/licenses/gpl.html) * * @author Myeongjin + * @author Garam */ $lang['server'] = 'PostgreSQL 서버'; $lang['port'] = 'PostgreSQL 서버의 포트'; @@ -16,10 +17,10 @@ $lang['checkPass'] = '비밀번호를 확인하기 위한 SQL 문'; $lang['getUserInfo'] = '사용자 정보를 가져오기 위한 SQL 문'; $lang['getGroups'] = '사용자의 그룹 구성원을 가져오기 위한 SQL 문'; $lang['getUsers'] = '모든 사용자를 나타낼 SQL 문'; -$lang['FilterLogin'] = '로그인 이름 별로 사용자를 필터하기 위한 SQL 조항'; -$lang['FilterName'] = '전체 이름 별로 사용자를 필터하기 위한 SQL 조항'; -$lang['FilterEmail'] = '이메일 주소 별로 사용자를 필터하기 위한 SQL 조항'; -$lang['FilterGroup'] = '그룹 구성원 별로 사용자를 필터하기 위한 SQL 조항'; +$lang['FilterLogin'] = '로그인 이름별로 사용자를 필터하기 위한 SQL 조항'; +$lang['FilterName'] = '전체 이름별로 사용자를 필터하기 위한 SQL 조항'; +$lang['FilterEmail'] = '이메일 주소별로 사용자를 필터하기 위한 SQL 조항'; +$lang['FilterGroup'] = '그룹 구성원별로 사용자를 필터하기 위한 SQL 조항'; $lang['SortOrder'] = '사용자를 정렬할 SQL 조항'; $lang['addUser'] = '새 사용자를 추가할 SQL 문'; $lang['addGroup'] = '새 그룹을 추가할 SQL 문'; diff --git a/lib/plugins/usermanager/lang/ko/lang.php b/lib/plugins/usermanager/lang/ko/lang.php index a01cbbdba..3656a1698 100644 --- a/lib/plugins/usermanager/lang/ko/lang.php +++ b/lib/plugins/usermanager/lang/ko/lang.php @@ -10,6 +10,7 @@ * @author erial2@gmail.com * @author Myeongjin * @author Gerrit Uitslag + * @author Garam */ $lang['menu'] = '사용자 관리자'; $lang['noauth'] = '(사용자 인증이 불가능합니다)'; @@ -33,7 +34,7 @@ $lang['search_prompt'] = '검색 수행'; $lang['clear'] = '검색 필터 재설정'; $lang['filter'] = '필터'; $lang['export_all'] = '모든 사용자 목록 내보내기 (CSV)'; -$lang['export_filtered'] = '필터된 사용자 목록 내보내기 (CSV)'; +$lang['export_filtered'] = '필터된 사용자 목록 내보내기(CSV)'; $lang['import'] = '새 사용자 목록 가져오기'; $lang['line'] = '줄 번호'; $lang['error'] = '오류 메시지'; -- cgit v1.2.3 From ffe35fe919de6c9f52316dd272e6e22c4bde8d81 Mon Sep 17 00:00:00 2001 From: Garam Date: Mon, 25 Nov 2013 20:50:59 +0100 Subject: translation update --- lib/plugins/acl/lang/ko/lang.php | 5 +++-- lib/plugins/authad/lang/ko/settings.php | 3 ++- lib/plugins/authpgsql/lang/ko/settings.php | 9 +++++---- lib/plugins/plugin/lang/ko/lang.php | 15 ++++++++------- lib/plugins/popularity/lang/ko/lang.php | 3 ++- lib/plugins/usermanager/lang/ko/lang.php | 11 ++++++----- 6 files changed, 26 insertions(+), 20 deletions(-) (limited to 'lib') diff --git a/lib/plugins/acl/lang/ko/lang.php b/lib/plugins/acl/lang/ko/lang.php index 2f1ba2311..37cec307c 100644 --- a/lib/plugins/acl/lang/ko/lang.php +++ b/lib/plugins/acl/lang/ko/lang.php @@ -12,6 +12,7 @@ * @author Seung-Chul Yoo * @author erial2@gmail.com * @author Myeongjin + * @author Garam */ $lang['admin_acl'] = '접근 제어 목록 관리'; $lang['acl_group'] = '그룹'; @@ -27,7 +28,7 @@ $lang['p_group_ns'] = '%s 그룹 구성원은 $lang['p_choose_id'] = '%s 문서 접근 권한을 보거나 바꾸려면 사용자그룹을 위 양식에 입력하세요.'; $lang['p_choose_ns'] = '%s 이름공간 접근 권한을 보거나 바꾸려면 사용자그룹을 위 양식에 입력하세요.'; $lang['p_inherited'] = '참고: 권한이 명시적으로 설정되지 않았으므로 다른 그룹이나 상위 이름공간으로부터 가져왔습니다.'; -$lang['p_isadmin'] = '참고: 슈퍼유저로 설정되어 있으므로 선택된 그룹이나 사용자는 언제나 모든 접근 권한을 가집니다.'; +$lang['p_isadmin'] = '참고: 슈퍼 사용자로 설정되어 있으므로 선택된 그룹이나 사용자는 언제나 모든 접근 권한을 가집니다.'; $lang['p_include'] = '더 높은 접근 권한은 하위를 포함합니다. 문서가 아닌 이름공간에는 만들기, 올리기, 삭제 권한만 적용됩니다.'; $lang['current'] = '현재 ACL 규칙'; $lang['where'] = '문서/이름공간'; @@ -38,6 +39,6 @@ $lang['acl_perm1'] = '읽기'; $lang['acl_perm2'] = '편집'; $lang['acl_perm4'] = '만들기'; $lang['acl_perm8'] = '올리기'; -$lang['acl_perm16'] = '삭제'; +$lang['acl_perm16'] = '지우기'; $lang['acl_new'] = '새 항목 추가'; $lang['acl_mod'] = '항목 수정'; diff --git a/lib/plugins/authad/lang/ko/settings.php b/lib/plugins/authad/lang/ko/settings.php index 053823508..6c00950bf 100644 --- a/lib/plugins/authad/lang/ko/settings.php +++ b/lib/plugins/authad/lang/ko/settings.php @@ -4,6 +4,7 @@ * @license GPL 2 (http://www.gnu.org/licenses/gpl.html) * * @author Myeongjin + * @author Garam */ $lang['account_suffix'] = '계정 접미어. 예를 들어 @my.domain.org'; $lang['base_dn'] = '기본 DN. 예를 들어 DC=my,DC=domain,DC=org'; @@ -12,7 +13,7 @@ $lang['admin_username'] = '다른 모든 사용자의 데이터에 접근 $lang['admin_password'] = '위 사용자의 비밀번호.'; $lang['sso'] = 'Kerberos나 NTLM을 통해 Single-Sign-On을 사용해야 합니까?'; $lang['sso_charset'] = '당신의 웹서버의 문자집합은 Kerberos나 NTLM 사용자 이름으로 전달됩니다. UTF-8이나 라린-1이 비어 있습니다. icov 확장 기능이 필요합니다.'; -$lang['real_primarygroup'] = '실제 기본 그룹은 "도메인 사용자"를 가정하는 대신 해결될 것입니다 (느림)'; +$lang['real_primarygroup'] = '실제 기본 그룹은 "도메인 사용자"를 가정하는 대신 해결될 것입니다(느림)'; $lang['use_ssl'] = 'SSL 연결을 사용합니까? 사용한다면 아래 TLS을 활성화하지 마세요.'; $lang['use_tls'] = 'TLS 연결을 사용합니까? 사용한다면 위 SSL을 활성화하지 마세요.'; $lang['debug'] = '오류에 대한 추가적인 디버그 정보를 보이겠습니까?'; diff --git a/lib/plugins/authpgsql/lang/ko/settings.php b/lib/plugins/authpgsql/lang/ko/settings.php index bdd8c2718..bdf38b3c7 100644 --- a/lib/plugins/authpgsql/lang/ko/settings.php +++ b/lib/plugins/authpgsql/lang/ko/settings.php @@ -4,6 +4,7 @@ * @license GPL 2 (http://www.gnu.org/licenses/gpl.html) * * @author Myeongjin + * @author Garam */ $lang['server'] = 'PostgreSQL 서버'; $lang['port'] = 'PostgreSQL 서버의 포트'; @@ -16,10 +17,10 @@ $lang['checkPass'] = '비밀번호를 확인하기 위한 SQL 문'; $lang['getUserInfo'] = '사용자 정보를 가져오기 위한 SQL 문'; $lang['getGroups'] = '사용자의 그룹 구성원을 가져오기 위한 SQL 문'; $lang['getUsers'] = '모든 사용자를 나타낼 SQL 문'; -$lang['FilterLogin'] = '로그인 이름 별로 사용자를 필터하기 위한 SQL 조항'; -$lang['FilterName'] = '전체 이름 별로 사용자를 필터하기 위한 SQL 조항'; -$lang['FilterEmail'] = '이메일 주소 별로 사용자를 필터하기 위한 SQL 조항'; -$lang['FilterGroup'] = '그룹 구성원 별로 사용자를 필터하기 위한 SQL 조항'; +$lang['FilterLogin'] = '로그인 이름별로 사용자를 필터하기 위한 SQL 조항'; +$lang['FilterName'] = '전체 이름별로 사용자를 필터하기 위한 SQL 조항'; +$lang['FilterEmail'] = '이메일 주소별로 사용자를 필터하기 위한 SQL 조항'; +$lang['FilterGroup'] = '그룹 구성원별로 사용자를 필터하기 위한 SQL 조항'; $lang['SortOrder'] = '사용자를 정렬할 SQL 조항'; $lang['addUser'] = '새 사용자를 추가할 SQL 문'; $lang['addGroup'] = '새 그룹을 추가할 SQL 문'; diff --git a/lib/plugins/plugin/lang/ko/lang.php b/lib/plugins/plugin/lang/ko/lang.php index 6ef9cd69a..8d2006672 100644 --- a/lib/plugins/plugin/lang/ko/lang.php +++ b/lib/plugins/plugin/lang/ko/lang.php @@ -9,6 +9,7 @@ * @author Seung-Chul Yoo * @author erial2@gmail.com * @author Myeongjin + * @author Garam */ $lang['menu'] = '플러그인 관리'; $lang['download'] = '새 플러그인을 다운로드하고 설치'; @@ -33,16 +34,16 @@ $lang['deleted'] = '%s 플러그인이 삭제되었습니다.'; $lang['downloading'] = '다운로드 중 ...'; $lang['downloaded'] = '%s 플러그인이 성공적으로 설치되었습니다'; $lang['downloads'] = '다음 플러그인이 성공적으로 설치되었습니다:'; -$lang['download_none'] = '플러그인이 없거나 다운로드 또는 설치 중에 알 수 없는 문제가 발생했습니다.'; +$lang['download_none'] = '플러그인이 없거나 다운로드 또는 설치 중에 알 수 없는 문제가 발생하였습니다.'; $lang['plugin'] = '플러그인:'; $lang['components'] = '구성 요소'; $lang['noinfo'] = '이 플러그인은 어떤 정보도 없습니다. 잘못된 플러그인일 수 있습니다.'; -$lang['name'] = '이름:'; -$lang['date'] = '날짜:'; -$lang['type'] = '종류:'; -$lang['desc'] = '설명:'; -$lang['author'] = '저자:'; -$lang['www'] = '웹:'; +$lang['name'] = '이름: '; +$lang['date'] = '날짜: '; +$lang['type'] = '종류: '; +$lang['desc'] = '설명: '; +$lang['author'] = '저자: '; +$lang['www'] = '웹: '; $lang['error'] = '알 수 없는 문제가 발생했습니다.'; $lang['error_download'] = '플러그인 파일을 다운로드 할 수 없습니다: %s'; $lang['error_badurl'] = '잘못된 URL 같습니다 - URL에서 파일 이름을 알 수 없습니다'; diff --git a/lib/plugins/popularity/lang/ko/lang.php b/lib/plugins/popularity/lang/ko/lang.php index f52e0007a..088ef1dc9 100644 --- a/lib/plugins/popularity/lang/ko/lang.php +++ b/lib/plugins/popularity/lang/ko/lang.php @@ -9,8 +9,9 @@ * @author Seung-Chul Yoo * @author erial2@gmail.com * @author Myeongjin + * @author Garam */ -$lang['name'] = '인기도 조사 (불러오는 데 시간이 걸릴 수 있습니다)'; +$lang['name'] = '인기도 조사(불러오는 데 시간이 걸릴 수 있습니다)'; $lang['submit'] = '자료 보내기'; $lang['autosubmit'] = '자료를 자동으로 한 달에 한 번씩 보내기'; $lang['submissionFailed'] = '다음과 같은 이유로 자료 보내기에 실패했습니다:'; diff --git a/lib/plugins/usermanager/lang/ko/lang.php b/lib/plugins/usermanager/lang/ko/lang.php index a01cbbdba..7c629f74f 100644 --- a/lib/plugins/usermanager/lang/ko/lang.php +++ b/lib/plugins/usermanager/lang/ko/lang.php @@ -10,6 +10,7 @@ * @author erial2@gmail.com * @author Myeongjin * @author Gerrit Uitslag + * @author Garam */ $lang['menu'] = '사용자 관리자'; $lang['noauth'] = '(사용자 인증이 불가능합니다)'; @@ -32,8 +33,8 @@ $lang['search'] = '검색'; $lang['search_prompt'] = '검색 수행'; $lang['clear'] = '검색 필터 재설정'; $lang['filter'] = '필터'; -$lang['export_all'] = '모든 사용자 목록 내보내기 (CSV)'; -$lang['export_filtered'] = '필터된 사용자 목록 내보내기 (CSV)'; +$lang['export_all'] = '모든 사용자 목록 내보내기(CSV)'; +$lang['export_filtered'] = '필터된 사용자 목록 내보내기(CSV)'; $lang['import'] = '새 사용자 목록 가져오기'; $lang['line'] = '줄 번호'; $lang['error'] = '오류 메시지'; @@ -52,12 +53,12 @@ $lang['edit_usermissing'] = '선택된 사용자를 찾을 수 없습니다 $lang['user_notify'] = '사용자에게 알림'; $lang['note_notify'] = '사용자에게 새로운 비밀번호를 준 경우에만 알림 이메일이 보내집니다.'; $lang['note_group'] = '새로운 사용자는 어떤 그룹도 설정하지 않은 경우에 기본 그룹(%s)에 추가됩니다.'; -$lang['note_pass'] = '사용자 통지가 지정되어 있을 때 필드에 아무 값도 입력하지 않으면 비밀번호가 자동으로 만들어집니다.'; +$lang['note_pass'] = '사용자 알림이 지정되어 있을 때 필드에 아무 값도 입력하지 않으면 비밀번호가 자동으로 만들어집니다.'; $lang['add_ok'] = '사용자를 성공적으로 추가했습니다'; $lang['add_fail'] = '사용자 추가를 실패했습니다'; $lang['notify_ok'] = '알림 이메일을 성공적으로 보냈습니다'; $lang['notify_fail'] = '알림 이메일을 보낼 수 없습니다'; -$lang['import_userlistcsv'] = '사용자 목록 파일 (CSV):'; +$lang['import_userlistcsv'] = '사용자 목록 파일(CSV):'; $lang['import_header'] = '가장 최근 가져오기 - 실패'; $lang['import_success_count'] = '사용자 가져오기: 사용자 %d명을 찾았고, %d명을 성공적으로 가져왔습니다.'; $lang['import_failure_count'] = '사용자 가져오기: %d명을 가져오지 못했습니다. 실패는 아래에 나타나 있습니다.'; @@ -68,5 +69,5 @@ $lang['import_error_badmail'] = '잘못된 이메일 주소'; $lang['import_error_upload'] = '가져오기를 실패했습니다. csv 파일을 올릴 수 없거나 비어 있습니다.'; $lang['import_error_readfail'] = '가져오기를 실패했습니다. 올린 파일을 읽을 수 없습니다.'; $lang['import_error_create'] = '사용자를 만들 수 없습니다.'; -$lang['import_notify_fail'] = '알림 메시지를 가져온 %s (이메일: %s ) 사용자에게 보낼 수 없습니다.'; +$lang['import_notify_fail'] = '알림 메시지를 가져온 %s(이메일: %s) 사용자에게 보낼 수 없습니다.'; $lang['import_downloadfailures'] = '교정을 위한 CSV로 다운로드 실패'; -- cgit v1.2.3 From 43e700149db19863b559e0eebc44132c611ef08d Mon Sep 17 00:00:00 2001 From: Andreas Gohr Date: Tue, 26 Nov 2013 12:19:18 +0100 Subject: fix numeric expression read in plugin default conf FS#2888 --- lib/plugins/config/settings/config.class.php | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) (limited to 'lib') diff --git a/lib/plugins/config/settings/config.class.php b/lib/plugins/config/settings/config.class.php index a5a11cda1..ab76ddc9e 100644 --- a/lib/plugins/config/settings/config.class.php +++ b/lib/plugins/config/settings/config.class.php @@ -330,8 +330,7 @@ if (!class_exists('configuration')) { foreach ($this->get_plugin_list() as $plugin) { $plugin_dir = plugin_directory($plugin); if (@file_exists(DOKU_PLUGIN.$plugin_dir.$file)){ - $conf = array(); - @include(DOKU_PLUGIN.$plugin_dir.$file); + $conf = $this->_read_config(DOKU_PLUGIN.$plugin_dir.$file); foreach ($conf as $key => $value){ $default['plugin'.CM_KEYMARKER.$plugin.CM_KEYMARKER.$key] = $value; } -- cgit v1.2.3 From 8c58242fcc4654752ab53c46ec31d1bc4a622140 Mon Sep 17 00:00:00 2001 From: Andreas Gohr Date: Tue, 26 Nov 2013 12:47:40 +0100 Subject: FS#2888 fix for templates --- lib/plugins/config/settings/config.class.php | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) (limited to 'lib') diff --git a/lib/plugins/config/settings/config.class.php b/lib/plugins/config/settings/config.class.php index ab76ddc9e..05f8470f7 100644 --- a/lib/plugins/config/settings/config.class.php +++ b/lib/plugins/config/settings/config.class.php @@ -339,8 +339,7 @@ if (!class_exists('configuration')) { // the same for the active template if (@file_exists(tpl_incdir().$file)){ - $conf = array(); - @include(tpl_incdir().$file); + $conf = $this->_read_config(tpl_incdir().$file); foreach ($conf as $key => $value){ $default['tpl'.CM_KEYMARKER.$tpl.CM_KEYMARKER.$key] = $value; } -- cgit v1.2.3 From 1e2c59485b8396275abde11d047a4a42a4e4e335 Mon Sep 17 00:00:00 2001 From: Christopher Smith Date: Tue, 26 Nov 2013 19:39:05 +0000 Subject: improved comments for code associated with PR#407 & PR#408 --- lib/exe/css.php | 39 +++++++++++++++++++++++++++++++++++++-- 1 file changed, 37 insertions(+), 2 deletions(-) (limited to 'lib') diff --git a/lib/exe/css.php b/lib/exe/css.php index c2540cc03..c96dedd37 100644 --- a/lib/exe/css.php +++ b/lib/exe/css.php @@ -312,6 +312,11 @@ function css_styleini($tpl) { ); } +/** + * Amend paths used in replacement relative urls, refer FS#2879 + * + * @author Chris Smith + */ function css_fixreplacementurls($replacements, $location) { foreach($replacements as $key => $value) { $replacements[$key] = preg_replace('#(url\([ \'"]*)(?!/|data:|http://|https://| |\'|")#','\\1'.$location,$value); @@ -400,16 +405,29 @@ function css_loadfile($file,$location=''){ return $css_file->load($location); } +/** + * Helper class to abstract loading of css/less files + * + * @author Chris Smith + */ class DokuCssFile { - protected $filepath; - protected $location; + protected $filepath; // file system path to the CSS/Less file + protected $location; // base url location of the CSS/Less file private $relative_path = null; public function __construct($file) { $this->filepath = $file; } + /** + * Load the contents of the css/less file and adjust any relative paths/urls (relative to this file) to be + * relative to the dokuwiki root: the web root (DOKU_BASE) for most files; the file system root (DOKU_INC) + * for less files. + * + * @param string $location base url for this file + * @return string the CSS/Less contents of the file + */ public function load($location='') { if (!@file_exists($this->filepath)) return ''; @@ -424,10 +442,17 @@ class DokuCssFile { return $css; } + /** + * Get the relative file system path of this file, relative to dokuwiki's root folder, DOKU_INC + * + * @return string relative file system path + */ private function getRelativePath(){ if (is_null($this->relative_path)) { $basedir = array(DOKU_INC); + + // during testing, files may be found relative to a second base dir, TMP_DIR if (defined('DOKU_UNITTEST')) { $basedir[] = realpath(TMP_DIR); } @@ -439,16 +464,26 @@ class DokuCssFile { return $this->relative_path; } + /** + * preg_replace callback to adjust relative urls from relative to this file to relative + * to the appropriate dokuwiki root location as described in the code + * + * @param array see http://php.net/preg_replace_callback + * @return string see http://php.net/preg_replace_callback + */ public function replacements($match) { + // not a relative url? - no adjustment required if (preg_match('#^(/|data:|https?://)#',$match[3])) { return $match[0]; } + // a less file import? - requires a file system location else if (substr($match[3],-5) == '.less') { if ($match[3]{0} != '/') { $match[3] = $this->getRelativePath() . '/' . $match[3]; } } + // everything else requires a url adjustment else { $match[3] = $this->location . $match[3]; } -- cgit v1.2.3 From 32087ed0672a7921af76f92eb2e8d3b6e3a166de Mon Sep 17 00:00:00 2001 From: Christopher Smith Date: Thu, 28 Nov 2013 00:01:35 +0000 Subject: Bugfix: correct variable name to --- lib/plugins/usermanager/admin.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'lib') diff --git a/lib/plugins/usermanager/admin.php b/lib/plugins/usermanager/admin.php index c4d71cb22..f2ee95b38 100644 --- a/lib/plugins/usermanager/admin.php +++ b/lib/plugins/usermanager/admin.php @@ -830,7 +830,7 @@ class admin_plugin_usermanager extends DokuWiki_Admin_Plugin { if (!$this->_auth->canDo('addUser')) return false; // check file uploaded ok. - if (empty($_FILES['import']['size']) || !empty($FILES['import']['error']) && is_uploaded_file($FILES['import']['tmp_name'])) { + if (empty($_FILES['import']['size']) || !empty($_FILES['import']['error']) && is_uploaded_file($_FILES['import']['tmp_name'])) { msg($this->lang['import_error_upload'],-1); return false; } -- cgit v1.2.3 From e73725bac6a3c60835092d4e2253730b7d683263 Mon Sep 17 00:00:00 2001 From: Christopher Smith Date: Thu, 28 Nov 2013 00:03:48 +0000 Subject: IMPROVEMENT: remove generated password from import failure data --- lib/plugins/usermanager/admin.php | 1 + 1 file changed, 1 insertion(+) (limited to 'lib') diff --git a/lib/plugins/usermanager/admin.php b/lib/plugins/usermanager/admin.php index f2ee95b38..95524c56a 100644 --- a/lib/plugins/usermanager/admin.php +++ b/lib/plugins/usermanager/admin.php @@ -867,6 +867,7 @@ class admin_plugin_usermanager extends DokuWiki_Admin_Plugin { $import_success_count++; } else { $import_fail_count++; + array_splice($raw, 1, 1); // remove the spliced in password $this->_import_failures[$line] = array('error' => $error, 'user' => $raw, 'orig' => $csv); } } -- cgit v1.2.3 From 5ba64050580b6936c8b364e3a288e7c875263c88 Mon Sep 17 00:00:00 2001 From: Christopher Smith Date: Thu, 28 Nov 2013 00:04:20 +0000 Subject: MINOR: comment spelling corrections --- lib/plugins/usermanager/admin.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'lib') diff --git a/lib/plugins/usermanager/admin.php b/lib/plugins/usermanager/admin.php index 95524c56a..2c566723a 100644 --- a/lib/plugins/usermanager/admin.php +++ b/lib/plugins/usermanager/admin.php @@ -822,7 +822,7 @@ class admin_plugin_usermanager extends DokuWiki_Admin_Plugin { * * csv file should have 4 columns, user_id, full name, email, groups (comma separated) * - * @return bool whether succesful + * @return bool whether successful */ protected function _import() { // check we are allowed to add users @@ -941,7 +941,7 @@ class admin_plugin_usermanager extends DokuWiki_Admin_Plugin { * * @param array $user data of user * @param string &$error reference catched error message - * @return bool whether succesful + * @return bool whether successful */ protected function _addImportUser($user, & $error){ if (!$this->_auth->triggerUserMod('create', $user)) { -- cgit v1.2.3 From b2c01466e61a7800306d8705eada83563ca90a55 Mon Sep 17 00:00:00 2001 From: Christopher Smith Date: Thu, 28 Nov 2013 00:08:52 +0000 Subject: Improvements to facilitate unit testing - don't die at end of _export() - internal classs wrapper method for is_uploaded_file() to allow overriding for use under cli & without having to upload a file --- lib/plugins/usermanager/admin.php | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) (limited to 'lib') diff --git a/lib/plugins/usermanager/admin.php b/lib/plugins/usermanager/admin.php index 2c566723a..782443ee1 100644 --- a/lib/plugins/usermanager/admin.php +++ b/lib/plugins/usermanager/admin.php @@ -814,6 +814,8 @@ class admin_plugin_usermanager extends DokuWiki_Admin_Plugin { fputcsv($fd, $line); } fclose($fd); + if (defined('DOKU_UNITTEST')){ return; } + die; } @@ -830,7 +832,7 @@ class admin_plugin_usermanager extends DokuWiki_Admin_Plugin { if (!$this->_auth->canDo('addUser')) return false; // check file uploaded ok. - if (empty($_FILES['import']['size']) || !empty($_FILES['import']['error']) && is_uploaded_file($_FILES['import']['tmp_name'])) { + if (empty($_FILES['import']['size']) || !empty($_FILES['import']['error']) && $this->_isUploadedFile($_FILES['import']['tmp_name'])) { msg($this->lang['import_error_upload'],-1); return false; } @@ -974,4 +976,11 @@ class admin_plugin_usermanager extends DokuWiki_Admin_Plugin { die; } + /** + * wrapper for is_uploaded_file to facilitate overriding by test suite + */ + protected function _isUploadedFile($file) { + return is_uploaded_file($file); + } + } -- cgit v1.2.3 From ed6bf75f5a78a346e3c3192b2bab79450e206598 Mon Sep 17 00:00:00 2001 From: Christopher Smith Date: Thu, 28 Nov 2013 00:12:38 +0000 Subject: Add unit tests for usermanager import & export functions --- lib/plugins/usermanager/_test/csv_export.test.php | 59 ++++++++ lib/plugins/usermanager/_test/csv_import.test.php | 155 ++++++++++++++++++++++ lib/plugins/usermanager/_test/mocks.class.php | 43 ++++++ 3 files changed, 257 insertions(+) create mode 100644 lib/plugins/usermanager/_test/csv_export.test.php create mode 100644 lib/plugins/usermanager/_test/csv_import.test.php create mode 100644 lib/plugins/usermanager/_test/mocks.class.php (limited to 'lib') diff --git a/lib/plugins/usermanager/_test/csv_export.test.php b/lib/plugins/usermanager/_test/csv_export.test.php new file mode 100644 index 000000000..d0942a861 --- /dev/null +++ b/lib/plugins/usermanager/_test/csv_export.test.php @@ -0,0 +1,59 @@ +usermanager = new admin_mock_usermanager(); + parent::setUp(); + } + + /** + * based on standard test user/conf setup + * + * users per _test/conf/users.auth.php + * expected to be: testuser:179ad45c6ce2cb97cf1029e212046e81:Arthur Dent:arthur@example.com + */ + function test_export() { + $expected = 'User,"Real Name",Email,Groups +testuser,"Arthur Dent",arthur@example.com, +'; + $this->assertEquals($expected, $this->usermanager->tryExport()); + } + + /** + * when configured to use a different locale, the column headings in the first line of the + * exported csv data should reflect the langauge strings of that locale + */ + function test_export_withlocale(){ + global $conf; + $old_conf = $conf; + $conf['lang'] = 'de'; + + $this->usermanager->localised = false; + $this->usermanager->setupLocale(); + + $conf = $old_conf; + + $expected = 'Benutzername,"Voller Name",E-Mail,Gruppen +testuser,"Arthur Dent",arthur@example.com, +'; + $this->assertEquals($expected, $this->usermanager->tryExport()); + } + + function test_export_withfilter(){ + $this->markTestIncomplete( + 'This test has not been implemented yet.' + ); + } + +} diff --git a/lib/plugins/usermanager/_test/csv_import.test.php b/lib/plugins/usermanager/_test/csv_import.test.php new file mode 100644 index 000000000..5deb201ba --- /dev/null +++ b/lib/plugins/usermanager/_test/csv_import.test.php @@ -0,0 +1,155 @@ +importfile = tempnam(TMP_DIR, 'csv'); + + $this->old_files = $_FILES; + $_FILES = array( + 'import' => array( + 'name' => 'import.csv', + 'tmp_name' => $this->importfile, + 'type' => 'text/plain', + 'size' => 1, + 'error' => 0, + ), + ); + + $this->usermanager = new admin_mock_usermanager(); + parent::setUp(); + } + + function tearDown() { + $_FILES = $this->old_files; + parent::tearDown(); + } + + function doImportTest($importCsv, $expectedResult, $expectedNewUsers, $expectedFailures) { + global $auth; + $before_users = $auth->retrieveUsers(); + + io_savefile($this->importfile, $importCsv); + $result = $this->usermanager->tryImport(); + + $after_users = $auth->retrieveUsers(); + $import_count = count($after_users) - count($before_users); + $new_users = array_diff_key($after_users, $before_users); + $diff_users = array_diff_assoc($after_users, $before_users); + + $expectedCount = count($expectedNewUsers); + + $this->assertEquals($expectedResult, $result); // import result as expected + $this->assertEquals($expectedCount, $import_count); // number of new users matches expected number imported + $this->assertEquals($expectedNewUsers, $this->stripPasswords($new_users)); // new user data matches imported user data + $this->assertEquals($expectedCount, $this->countPasswords($new_users)); // new users have a password + $this->assertEquals($expectedCount, $this->usermanager->mock_email_notifications_sent); // new users notified of their passwords + $this->assertEquals($new_users, $diff_users); // no other users were harmed in the testing of this import + $this->assertEquals($expectedFailures, $this->usermanager->getImportFailures()); // failures as expected + } + + function test_import() { + $csv = 'User,"Real Name",Email,Groups +importuser,"Ford Prefect",ford@example.com,user +'; + $expected = array( + 'importuser' => array( + 'name' => 'Ford Prefect', + 'mail' => 'ford@example.com', + 'grps' => array('user'), + ), + ); + + $this->doImportTest($csv, true, $expected, array()); + } + + function test_importExisting() { + $csv = 'User,"Real Name",Email,Groups +importuser,"Ford Prefect",ford@example.com,user +'; + $failures = array( + '2' => array( + 'error' => $this->usermanager->lang['import_error_create'], + 'user' => array( + 'importuser', + 'Ford Prefect', + 'ford@example.com', + 'user', + ), + 'orig' => 'importuser,"Ford Prefect",ford@example.com,user'.NL, + ), + ); + + $this->doImportTest($csv, true, array(), $failures); + } + + function test_importUtf8() { + $csv = 'User,"Real Name",Email,Groups +importutf8,"Førd Prefect",ford@example.com,user +'; + $expected = array( + 'importutf8' => array( + 'name' => 'Førd Prefect', + 'mail' => 'ford@example.com', + 'grps' => array('user'), + ), + ); + + $this->doImportTest($csv, true, $expected, array()); + } + + /** + * utf8: u+00F8 (ø) <=> 0xF8 :iso-8859-1 + */ + function test_importIso8859() { + $csv = 'User,"Real Name",Email,Groups +importiso8859,"F'.chr(0xF8).'rd Prefect",ford@example.com,user +'; + $expected = array( + 'importiso8859' => array( + 'name' => 'Førd Prefect', + 'mail' => 'ford@example.com', + 'grps' => array('user'), + ), + ); + + $this->doImportTest($csv, true, $expected, array()); + } + + private function stripPasswords($array){ + foreach ($array as $user => $data) { + unset($array[$user]['pass']); + } + return $array; + } + + private function countPasswords($array){ + $count = 0; + foreach ($array as $user => $data) { + if (!empty($data['pass'])) { + $count++; + } + } + return $count; + } + +} + diff --git a/lib/plugins/usermanager/_test/mocks.class.php b/lib/plugins/usermanager/_test/mocks.class.php new file mode 100644 index 000000000..edf5438b2 --- /dev/null +++ b/lib/plugins/usermanager/_test/mocks.class.php @@ -0,0 +1,43 @@ +_import_failures; + } + + public function tryExport() { + ob_start(); + $this->_export(); + return ob_get_clean(); + } + + public function tryImport() { + return $this->_import(); + } + + // no need to send email notifications (mostly) + protected function _notifyUser($user, $password, $status_alert=true) { + if ($this->mock_email_notifications) { + $this->mock_email_notifications_sent++; + return true; + } else { + return parent::_notifyUser($user, $password, $status_alert); + } + } + + protected function _isUploadedFile($file) { + return file_exists($file); + } +} + -- cgit v1.2.3 From 211955bef84071b025e83bdeeefe496a5002fdd8 Mon Sep 17 00:00:00 2001 From: Christopher Smith Date: Thu, 28 Nov 2013 00:49:31 +0000 Subject: test import against auth plugin which doesn't allow adding users --- lib/plugins/usermanager/_test/csv_import.test.php | 18 +++++++++++++++++- lib/plugins/usermanager/_test/mocks.class.php | 7 +++++++ 2 files changed, 24 insertions(+), 1 deletion(-) (limited to 'lib') diff --git a/lib/plugins/usermanager/_test/csv_import.test.php b/lib/plugins/usermanager/_test/csv_import.test.php index 5deb201ba..1f0ee7436 100644 --- a/lib/plugins/usermanager/_test/csv_import.test.php +++ b/lib/plugins/usermanager/_test/csv_import.test.php @@ -47,7 +47,7 @@ class plugin_usermanager_csv_import_test extends DokuWikiTest { global $auth; $before_users = $auth->retrieveUsers(); - io_savefile($this->importfile, $importCsv); + io_savefile($this->importfile, $importCsv); $result = $this->usermanager->tryImport(); $after_users = $auth->retrieveUsers(); @@ -66,6 +66,22 @@ class plugin_usermanager_csv_import_test extends DokuWikiTest { $this->assertEquals($expectedFailures, $this->usermanager->getImportFailures()); // failures as expected } + function test_cantImport(){ + global $auth; + $oldauth = $auth; + + $auth = new auth_mock_authplain(); + $auth->setCanDo('addUser', false); + + $csv = 'User,"Real Name",Email,Groups +importuser,"Ford Prefect",ford@example.com,user +'; + + $this->doImportTest($csv, false, array(), array()); + + $auth = $oldauth; + } + function test_import() { $csv = 'User,"Real Name",Email,Groups importuser,"Ford Prefect",ford@example.com,user diff --git a/lib/plugins/usermanager/_test/mocks.class.php b/lib/plugins/usermanager/_test/mocks.class.php index edf5438b2..f3cc72c27 100644 --- a/lib/plugins/usermanager/_test/mocks.class.php +++ b/lib/plugins/usermanager/_test/mocks.class.php @@ -41,3 +41,10 @@ class admin_mock_usermanager extends admin_plugin_usermanager { } } +class auth_mock_authplain extends auth_plugin_authplain { + + public function setCanDo($op, $canDo) { + $this->cando[$op] = $canDo; + } + +} -- cgit v1.2.3 From 0d1370783bb8cfbdc2e1e347edb743fd0de590a2 Mon Sep 17 00:00:00 2001 From: chris taklis Date: Sat, 30 Nov 2013 19:05:55 +0100 Subject: translation update --- lib/plugins/authad/lang/el/settings.php | 8 ++++++++ 1 file changed, 8 insertions(+) create mode 100644 lib/plugins/authad/lang/el/settings.php (limited to 'lib') diff --git a/lib/plugins/authad/lang/el/settings.php b/lib/plugins/authad/lang/el/settings.php new file mode 100644 index 000000000..9bf23ea1c --- /dev/null +++ b/lib/plugins/authad/lang/el/settings.php @@ -0,0 +1,8 @@ + + */ +$lang['admin_password'] = 'Ο κωδικός του παραπάνω χρήστη.'; -- cgit v1.2.3 From d2a843c310418267d3baedd63547d75917da2efe Mon Sep 17 00:00:00 2001 From: Juliano Marconi Lanigra Date: Sat, 30 Nov 2013 23:10:58 +0100 Subject: translation update --- lib/plugins/authad/lang/pt-br/settings.php | 2 ++ lib/plugins/usermanager/lang/pt-br/lang.php | 6 ++++++ 2 files changed, 8 insertions(+) (limited to 'lib') diff --git a/lib/plugins/authad/lang/pt-br/settings.php b/lib/plugins/authad/lang/pt-br/settings.php index 76fb419a6..cdc748055 100644 --- a/lib/plugins/authad/lang/pt-br/settings.php +++ b/lib/plugins/authad/lang/pt-br/settings.php @@ -5,6 +5,7 @@ * * @author Victor Westmann * @author Frederico Guimarães + * @author Juliano Marconi Lanigra */ $lang['account_suffix'] = 'Sufixo de sua conta. Eg. @meu.domínio.org'; $lang['base_dn'] = 'Sua base DN. Eg. DC=meu,DC=domínio,DC=org'; @@ -12,6 +13,7 @@ $lang['domain_controllers'] = 'Uma lista de controles de domínios separada p $lang['admin_username'] = 'Um usuário do Active Directory com privilégios para acessar os dados de todos os outros usuários. Opcional, mas necessário para realizar certas ações, tais como enviar mensagens de assinatura.'; $lang['admin_password'] = 'A senha do usuário acima.'; $lang['sso'] = 'Usar Single-Sign-On através do Kerberos ou NTLM?'; +$lang['sso_charset'] = 'A codificação de caracteres que seu servidor web passará o nome de usuário Kerberos ou NTLM. Vazio para UTF-8 ou latin-1. Requere a extensão iconv.'; $lang['real_primarygroup'] = 'O grupo primário real deve ser resolvido ao invés de assumirmos como "Usuários do Domínio" (mais lento)'; $lang['use_ssl'] = 'Usar conexão SSL? Se usar, não habilitar TLS abaixo.'; $lang['use_tls'] = 'Usar conexão TLS? se usar, não habilitar SSL acima.'; diff --git a/lib/plugins/usermanager/lang/pt-br/lang.php b/lib/plugins/usermanager/lang/pt-br/lang.php index 9bb37742a..356d139eb 100644 --- a/lib/plugins/usermanager/lang/pt-br/lang.php +++ b/lib/plugins/usermanager/lang/pt-br/lang.php @@ -20,6 +20,7 @@ * @author Victor Westmann * @author Leone Lisboa Magevski * @author Dário Estevão + * @author Juliano Marconi Lanigra */ $lang['menu'] = 'Gerenciamento de Usuários'; $lang['noauth'] = '(o gerenciamento de usuários não está disponível)'; @@ -43,6 +44,7 @@ $lang['search_prompt'] = 'Executar a pesquisa'; $lang['clear'] = 'Limpar o filtro de pesquisa'; $lang['filter'] = 'Filtro'; $lang['export_all'] = 'Exportar Todos Usuários (CSV)'; +$lang['export_filtered'] = 'Exportar lista de Usuários Filtrados (CSV)'; $lang['import'] = 'Importar Novos Usuários'; $lang['line'] = 'Linha Nº.'; $lang['error'] = 'Mensagem de Erro'; @@ -66,6 +68,8 @@ $lang['add_ok'] = 'O usuário foi adicionado com sucesso'; $lang['add_fail'] = 'O usuário não foi adicionado'; $lang['notify_ok'] = 'O e-mail de notificação foi enviado'; $lang['notify_fail'] = 'Não foi possível enviar o e-mail de notificação'; +$lang['import_userlistcsv'] = 'Arquivo de lista de usuários (CSV):'; +$lang['import_header'] = 'Importações Mais Recentes - Falhas'; $lang['import_success_count'] = 'Importação de Usuário: %d usuário (s) encontrado (s), %d importado (s) com sucesso.'; $lang['import_failure_count'] = 'Importação de Usuário: %d falhou. As falhas estão listadas abaixo.'; $lang['import_error_fields'] = 'Campos insuficientes, encontrado (s) %d, necessário 4.'; @@ -75,3 +79,5 @@ $lang['import_error_badmail'] = 'Endereço de email errado'; $lang['import_error_upload'] = 'Falha na Importação: O arquivo csv não pode ser carregado ou está vazio.'; $lang['import_error_readfail'] = 'Falha na Importação: Habilitar para ler o arquivo a ser carregado.'; $lang['import_error_create'] = 'Habilitar para criar o usuário.'; +$lang['import_notify_fail'] = 'Mensagem de notificação não pode ser enviada para o usuário importado, %s com email %s.'; +$lang['import_downloadfailures'] = 'Falhas no Download como CSV para correção'; -- cgit v1.2.3 From c9454ee3a82b29418a7ee59f0bb35006ea6a7fb1 Mon Sep 17 00:00:00 2001 From: Christopher Smith Date: Sun, 1 Dec 2013 16:23:02 +0000 Subject: Per FS#2884, implement a local version of str_getcsv() to maintain compatibility with php 5.2.x (str_getcsv() is only available in php 5.3+ and is used by user manager import feature. --- lib/plugins/usermanager/_test/csv_import.test.php | 14 ++++++++++++ lib/plugins/usermanager/_test/mocks.class.php | 8 +++++++ lib/plugins/usermanager/admin.php | 28 ++++++++++++++++++++++- 3 files changed, 49 insertions(+), 1 deletion(-) (limited to 'lib') diff --git a/lib/plugins/usermanager/_test/csv_import.test.php b/lib/plugins/usermanager/_test/csv_import.test.php index 1f0ee7436..5133c1256 100644 --- a/lib/plugins/usermanager/_test/csv_import.test.php +++ b/lib/plugins/usermanager/_test/csv_import.test.php @@ -150,6 +150,20 @@ importiso8859,"F'.chr(0xF8).'rd Prefect",ford@example.com,user $this->doImportTest($csv, true, $expected, array()); } + /** + * Verify usermanager::str_getcsv() behaves identically to php 5.3's str_getcsv() + * within the context/parameters required by _import() + * + * @requires PHP 5.3 + * @deprecated remove when dokuwiki requires 5.3+ + * also associated usermanager & mock usermanager access methods + */ + private function test_getcsvcompatibility() { + $line = 'importuser,"Ford Prefect",ford@example.com,user'.NL; + + $this->assertEquals(str_getcsv($line), $this->usermanager->access_str_getcsv($line)); + } + private function stripPasswords($array){ foreach ($array as $user => $data) { unset($array[$user]['pass']); diff --git a/lib/plugins/usermanager/_test/mocks.class.php b/lib/plugins/usermanager/_test/mocks.class.php index f3cc72c27..91c74768c 100644 --- a/lib/plugins/usermanager/_test/mocks.class.php +++ b/lib/plugins/usermanager/_test/mocks.class.php @@ -26,6 +26,14 @@ class admin_mock_usermanager extends admin_plugin_usermanager { return $this->_import(); } + /** + * @deprecated remove when dokuwiki requires php 5.3+ + * also associated unit test & usermanager methods + */ + public function access_str_getcsv($line){ + return $this->str_getcsv($line); + } + // no need to send email notifications (mostly) protected function _notifyUser($user, $password, $status_alert=true) { if ($this->mock_email_notifications) { diff --git a/lib/plugins/usermanager/admin.php b/lib/plugins/usermanager/admin.php index 782443ee1..156037f09 100644 --- a/lib/plugins/usermanager/admin.php +++ b/lib/plugins/usermanager/admin.php @@ -847,7 +847,7 @@ class admin_plugin_usermanager extends DokuWiki_Admin_Plugin { if (!utf8_check($csv)) { $csv = utf8_encode($csv); } - $raw = str_getcsv($csv); + $raw = $this->_getcsv($csv); $error = ''; // clean out any errors from the previous line // data checks... if (1 == ++$line) { @@ -983,4 +983,30 @@ class admin_plugin_usermanager extends DokuWiki_Admin_Plugin { return is_uploaded_file($file); } + /** + * wrapper for str_getcsv() to simplify maintaining compatibility with php 5.2 + * + * @deprecated remove when dokuwiki php requirement increases to 5.3+ + * also associated unit test & mock access method + */ + protected function _getcsv($csv) { + return function_exists('str_getcsv') ? str_getcsv($csv) : $this->str_getcsv($csv); + } + + /** + * replacement str_getcsv() function for php < 5.3 + * loosely based on www.php.net/str_getcsv#88311 + * + * @deprecated remove when dokuwiki php requirement increases to 5.3+ + */ + protected function str_getcsv($str) { + $fp = fopen("php://temp/maxmemory:1048576", 'r+'); // 1MiB + fputs($fp, $str); + rewind($fp); + + $data = fgetcsv($fp); + + fclose($fp); + return $data; + } } -- cgit v1.2.3 From 3946d21690c98d095fff4a0ad5be4c47c0230ed7 Mon Sep 17 00:00:00 2001 From: Christopher Smith Date: Sun, 1 Dec 2013 16:44:37 +0000 Subject: comment (hide) incomplete export with filter test --- lib/plugins/usermanager/_test/csv_export.test.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'lib') diff --git a/lib/plugins/usermanager/_test/csv_export.test.php b/lib/plugins/usermanager/_test/csv_export.test.php index d0942a861..667fc71dc 100644 --- a/lib/plugins/usermanager/_test/csv_export.test.php +++ b/lib/plugins/usermanager/_test/csv_export.test.php @@ -49,11 +49,11 @@ testuser,"Arthur Dent",arthur@example.com, '; $this->assertEquals($expected, $this->usermanager->tryExport()); } - +/* function test_export_withfilter(){ $this->markTestIncomplete( 'This test has not been implemented yet.' ); } - +*/ } -- cgit v1.2.3 From 1da08fca34cb20a1b12d83e70a1d915f66cf6438 Mon Sep 17 00:00:00 2001 From: Christopher Smith Date: Sun, 1 Dec 2013 16:45:53 +0000 Subject: remove incorrect 'private' restriction from tset method --- lib/plugins/usermanager/_test/csv_import.test.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'lib') diff --git a/lib/plugins/usermanager/_test/csv_import.test.php b/lib/plugins/usermanager/_test/csv_import.test.php index 5133c1256..3968356bc 100644 --- a/lib/plugins/usermanager/_test/csv_import.test.php +++ b/lib/plugins/usermanager/_test/csv_import.test.php @@ -158,7 +158,7 @@ importiso8859,"F'.chr(0xF8).'rd Prefect",ford@example.com,user * @deprecated remove when dokuwiki requires 5.3+ * also associated usermanager & mock usermanager access methods */ - private function test_getcsvcompatibility() { + function test_getcsvcompatibility() { $line = 'importuser,"Ford Prefect",ford@example.com,user'.NL; $this->assertEquals(str_getcsv($line), $this->usermanager->access_str_getcsv($line)); -- cgit v1.2.3 From 6b1ab5ac63d5b5cb49c944d4ef20650977759a66 Mon Sep 17 00:00:00 2001 From: Antonio Bueno Date: Mon, 2 Dec 2013 01:21:32 +0100 Subject: translation update --- lib/plugins/authad/lang/es/settings.php | 2 ++ lib/plugins/authldap/lang/es/settings.php | 13 +++++++++++++ lib/plugins/authmysql/lang/es/settings.php | 12 ++++++++++++ 3 files changed, 27 insertions(+) create mode 100644 lib/plugins/authldap/lang/es/settings.php create mode 100644 lib/plugins/authmysql/lang/es/settings.php (limited to 'lib') diff --git a/lib/plugins/authad/lang/es/settings.php b/lib/plugins/authad/lang/es/settings.php index 9d0aa80ac..98b78056b 100644 --- a/lib/plugins/authad/lang/es/settings.php +++ b/lib/plugins/authad/lang/es/settings.php @@ -4,6 +4,7 @@ * @license GPL 2 (http://www.gnu.org/licenses/gpl.html) * * @author monica + * @author Antonio Bueno */ $lang['account_suffix'] = 'Su cuenta, sufijo. Ejem. @ my.domain.org '; $lang['base_dn'] = 'Su base DN. Ejem. DC=my,DC=dominio,DC=org'; @@ -11,3 +12,4 @@ $lang['domain_controllers'] = 'Una lista separada por coma de los controlador $lang['admin_username'] = 'Un usuario con privilegios de Active Directory con acceso a los datos de cualquier otro usuario. Opcional, pero es necesario para determinadas acciones como el envío de suscripciones de correos electrónicos.'; $lang['admin_password'] = 'La contraseña del usuario anterior.'; $lang['sso'] = 'En caso de inicio de sesión usará ¿Kerberos o NTLM?'; +$lang['sso_charset'] = 'La codificación con que tu servidor web pasará el nombre de usuario Kerberos o NTLM. Si es UTF-8 o latin-1 dejar en blanco. Requiere la extensión iconv.'; diff --git a/lib/plugins/authldap/lang/es/settings.php b/lib/plugins/authldap/lang/es/settings.php new file mode 100644 index 000000000..f8c3ad014 --- /dev/null +++ b/lib/plugins/authldap/lang/es/settings.php @@ -0,0 +1,13 @@ + + */ +$lang['starttls'] = 'Usar conexiones TLS?'; +$lang['debug'] = 'Mostrar información adicional para depuración de errores'; +$lang['deref_o_0'] = 'LDAP_DEREF_NEVER'; +$lang['deref_o_1'] = 'LDAP_DEREF_SEARCHING'; +$lang['deref_o_2'] = 'LDAP_DEREF_FINDING'; +$lang['deref_o_3'] = 'LDAP_DEREF_ALWAYS'; diff --git a/lib/plugins/authmysql/lang/es/settings.php b/lib/plugins/authmysql/lang/es/settings.php new file mode 100644 index 000000000..64d422102 --- /dev/null +++ b/lib/plugins/authmysql/lang/es/settings.php @@ -0,0 +1,12 @@ + + */ +$lang['server'] = 'Tu servidor MySQL'; +$lang['user'] = 'Nombre de usuario MySQL'; +$lang['database'] = 'Base de datos a usar'; +$lang['charset'] = 'Codificación usada en la base de datos'; +$lang['debug'] = 'Mostrar información adicional para depuración de errores'; -- cgit v1.2.3 From 2c01be2ff65c7adeb4e34cd2a507c910e84b79b7 Mon Sep 17 00:00:00 2001 From: zamroni Date: Tue, 3 Dec 2013 06:45:45 +0100 Subject: translation update --- lib/plugins/acl/lang/id/lang.php | 4 ++-- lib/plugins/plugin/lang/id/lang.php | 5 +++-- lib/plugins/usermanager/lang/id/lang.php | 5 +++-- 3 files changed, 8 insertions(+), 6 deletions(-) (limited to 'lib') diff --git a/lib/plugins/acl/lang/id/lang.php b/lib/plugins/acl/lang/id/lang.php index 650637635..6f619c5ec 100644 --- a/lib/plugins/acl/lang/id/lang.php +++ b/lib/plugins/acl/lang/id/lang.php @@ -1,8 +1,8 @@ * @author Yustinus Waruwu */ diff --git a/lib/plugins/plugin/lang/id/lang.php b/lib/plugins/plugin/lang/id/lang.php index f3a1fe4e6..2653b075e 100644 --- a/lib/plugins/plugin/lang/id/lang.php +++ b/lib/plugins/plugin/lang/id/lang.php @@ -1,7 +1,8 @@ * @author Yustinus Waruwu */ diff --git a/lib/plugins/usermanager/lang/id/lang.php b/lib/plugins/usermanager/lang/id/lang.php index 457ad4963..425b2ff59 100644 --- a/lib/plugins/usermanager/lang/id/lang.php +++ b/lib/plugins/usermanager/lang/id/lang.php @@ -1,7 +1,8 @@ * @author Yustinus Waruwu */ -- cgit v1.2.3 From 7c586cd898dec6fc85ce7817f134aa1b35fcb499 Mon Sep 17 00:00:00 2001 From: anjianshi Date: Thu, 5 Dec 2013 08:11:19 +0100 Subject: translation update --- lib/plugins/plugin/lang/zh/lang.php | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) (limited to 'lib') diff --git a/lib/plugins/plugin/lang/zh/lang.php b/lib/plugins/plugin/lang/zh/lang.php index f69410503..b39c6b063 100644 --- a/lib/plugins/plugin/lang/zh/lang.php +++ b/lib/plugins/plugin/lang/zh/lang.php @@ -15,6 +15,7 @@ * @author caii, patent agent in China * @author lainme993@gmail.com * @author Shuo-Ting Jian + * @author anjianshi */ $lang['menu'] = '插件管理器'; $lang['download'] = '下载并安装新的插件'; @@ -26,7 +27,7 @@ $lang['btn_settings'] = '设置'; $lang['btn_download'] = '下载'; $lang['btn_enable'] = '保存'; $lang['url'] = 'URL'; -$lang['installed'] = '已安装:'; +$lang['installed'] = '安装时间:'; $lang['lastupdate'] = '最后更新于:'; $lang['source'] = '来源:'; $lang['unknown'] = '未知'; -- cgit v1.2.3 From 6593db4300a3db6d88c9b09df725ecc8589e99b6 Mon Sep 17 00:00:00 2001 From: Myeongjin Date: Sat, 7 Dec 2013 02:01:38 +0100 Subject: translation update --- lib/plugins/acl/lang/ko/lang.php | 2 +- lib/plugins/authad/lang/ko/settings.php | 2 +- lib/plugins/plugin/lang/ko/lang.php | 14 +++++++------- lib/plugins/popularity/lang/ko/lang.php | 2 +- lib/plugins/usermanager/lang/ko/lang.php | 8 ++++---- 5 files changed, 14 insertions(+), 14 deletions(-) (limited to 'lib') diff --git a/lib/plugins/acl/lang/ko/lang.php b/lib/plugins/acl/lang/ko/lang.php index 37cec307c..34b93a9f4 100644 --- a/lib/plugins/acl/lang/ko/lang.php +++ b/lib/plugins/acl/lang/ko/lang.php @@ -39,6 +39,6 @@ $lang['acl_perm1'] = '읽기'; $lang['acl_perm2'] = '편집'; $lang['acl_perm4'] = '만들기'; $lang['acl_perm8'] = '올리기'; -$lang['acl_perm16'] = '지우기'; +$lang['acl_perm16'] = '삭제'; $lang['acl_new'] = '새 항목 추가'; $lang['acl_mod'] = '항목 수정'; diff --git a/lib/plugins/authad/lang/ko/settings.php b/lib/plugins/authad/lang/ko/settings.php index 6c00950bf..b104371fe 100644 --- a/lib/plugins/authad/lang/ko/settings.php +++ b/lib/plugins/authad/lang/ko/settings.php @@ -13,7 +13,7 @@ $lang['admin_username'] = '다른 모든 사용자의 데이터에 접근 $lang['admin_password'] = '위 사용자의 비밀번호.'; $lang['sso'] = 'Kerberos나 NTLM을 통해 Single-Sign-On을 사용해야 합니까?'; $lang['sso_charset'] = '당신의 웹서버의 문자집합은 Kerberos나 NTLM 사용자 이름으로 전달됩니다. UTF-8이나 라린-1이 비어 있습니다. icov 확장 기능이 필요합니다.'; -$lang['real_primarygroup'] = '실제 기본 그룹은 "도메인 사용자"를 가정하는 대신 해결될 것입니다(느림)'; +$lang['real_primarygroup'] = '실제 기본 그룹은 "도메인 사용자"를 가정하는 대신 해결될 것입니다. (느림)'; $lang['use_ssl'] = 'SSL 연결을 사용합니까? 사용한다면 아래 TLS을 활성화하지 마세요.'; $lang['use_tls'] = 'TLS 연결을 사용합니까? 사용한다면 위 SSL을 활성화하지 마세요.'; $lang['debug'] = '오류에 대한 추가적인 디버그 정보를 보이겠습니까?'; diff --git a/lib/plugins/plugin/lang/ko/lang.php b/lib/plugins/plugin/lang/ko/lang.php index 8d2006672..4cd1ae3c7 100644 --- a/lib/plugins/plugin/lang/ko/lang.php +++ b/lib/plugins/plugin/lang/ko/lang.php @@ -34,16 +34,16 @@ $lang['deleted'] = '%s 플러그인이 삭제되었습니다.'; $lang['downloading'] = '다운로드 중 ...'; $lang['downloaded'] = '%s 플러그인이 성공적으로 설치되었습니다'; $lang['downloads'] = '다음 플러그인이 성공적으로 설치되었습니다:'; -$lang['download_none'] = '플러그인이 없거나 다운로드 또는 설치 중에 알 수 없는 문제가 발생하였습니다.'; +$lang['download_none'] = '플러그인이 없거나 다운로드 또는 설치 중에 알 수 없는 문제가 발생했습니다.'; $lang['plugin'] = '플러그인:'; $lang['components'] = '구성 요소'; $lang['noinfo'] = '이 플러그인은 어떤 정보도 없습니다. 잘못된 플러그인일 수 있습니다.'; -$lang['name'] = '이름: '; -$lang['date'] = '날짜: '; -$lang['type'] = '종류: '; -$lang['desc'] = '설명: '; -$lang['author'] = '저자: '; -$lang['www'] = '웹: '; +$lang['name'] = '이름:'; +$lang['date'] = '날짜:'; +$lang['type'] = '종류:'; +$lang['desc'] = '설명:'; +$lang['author'] = '저자:'; +$lang['www'] = '웹:'; $lang['error'] = '알 수 없는 문제가 발생했습니다.'; $lang['error_download'] = '플러그인 파일을 다운로드 할 수 없습니다: %s'; $lang['error_badurl'] = '잘못된 URL 같습니다 - URL에서 파일 이름을 알 수 없습니다'; diff --git a/lib/plugins/popularity/lang/ko/lang.php b/lib/plugins/popularity/lang/ko/lang.php index 088ef1dc9..f8cf4525d 100644 --- a/lib/plugins/popularity/lang/ko/lang.php +++ b/lib/plugins/popularity/lang/ko/lang.php @@ -11,7 +11,7 @@ * @author Myeongjin * @author Garam */ -$lang['name'] = '인기도 조사(불러오는 데 시간이 걸릴 수 있습니다)'; +$lang['name'] = '인기도 조사 (불러오는 데 시간이 걸릴 수 있습니다)'; $lang['submit'] = '자료 보내기'; $lang['autosubmit'] = '자료를 자동으로 한 달에 한 번씩 보내기'; $lang['submissionFailed'] = '다음과 같은 이유로 자료 보내기에 실패했습니다:'; diff --git a/lib/plugins/usermanager/lang/ko/lang.php b/lib/plugins/usermanager/lang/ko/lang.php index 7c629f74f..ac129c95e 100644 --- a/lib/plugins/usermanager/lang/ko/lang.php +++ b/lib/plugins/usermanager/lang/ko/lang.php @@ -33,8 +33,8 @@ $lang['search'] = '검색'; $lang['search_prompt'] = '검색 수행'; $lang['clear'] = '검색 필터 재설정'; $lang['filter'] = '필터'; -$lang['export_all'] = '모든 사용자 목록 내보내기(CSV)'; -$lang['export_filtered'] = '필터된 사용자 목록 내보내기(CSV)'; +$lang['export_all'] = '모든 사용자 목록 내보내기 (CSV)'; +$lang['export_filtered'] = '필터된 사용자 목록 내보내기 (CSV)'; $lang['import'] = '새 사용자 목록 가져오기'; $lang['line'] = '줄 번호'; $lang['error'] = '오류 메시지'; @@ -58,7 +58,7 @@ $lang['add_ok'] = '사용자를 성공적으로 추가했습니 $lang['add_fail'] = '사용자 추가를 실패했습니다'; $lang['notify_ok'] = '알림 이메일을 성공적으로 보냈습니다'; $lang['notify_fail'] = '알림 이메일을 보낼 수 없습니다'; -$lang['import_userlistcsv'] = '사용자 목록 파일(CSV):'; +$lang['import_userlistcsv'] = '사용자 목록 파일 (CSV):'; $lang['import_header'] = '가장 최근 가져오기 - 실패'; $lang['import_success_count'] = '사용자 가져오기: 사용자 %d명을 찾았고, %d명을 성공적으로 가져왔습니다.'; $lang['import_failure_count'] = '사용자 가져오기: %d명을 가져오지 못했습니다. 실패는 아래에 나타나 있습니다.'; @@ -69,5 +69,5 @@ $lang['import_error_badmail'] = '잘못된 이메일 주소'; $lang['import_error_upload'] = '가져오기를 실패했습니다. csv 파일을 올릴 수 없거나 비어 있습니다.'; $lang['import_error_readfail'] = '가져오기를 실패했습니다. 올린 파일을 읽을 수 없습니다.'; $lang['import_error_create'] = '사용자를 만들 수 없습니다.'; -$lang['import_notify_fail'] = '알림 메시지를 가져온 %s(이메일: %s) 사용자에게 보낼 수 없습니다.'; +$lang['import_notify_fail'] = '알림 메시지를 가져온 %s (이메일: %s) 사용자에게 보낼 수 없습니다.'; $lang['import_downloadfailures'] = '교정을 위한 CSV로 다운로드 실패'; -- cgit v1.2.3 From ccfec5606dae81e6524f6cfcdaca09d4cde7f111 Mon Sep 17 00:00:00 2001 From: Anika Henke Date: Sat, 7 Dec 2013 23:10:05 +0000 Subject: crlf 2 lf whitespace fixes --- lib/plugins/authad/adLDAP/adLDAP.php | 1900 ++++++++++---------- .../authad/adLDAP/classes/adLDAPComputers.php | 304 ++-- .../authad/adLDAP/classes/adLDAPContacts.php | 588 +++--- .../authad/adLDAP/classes/adLDAPExchange.php | 778 ++++---- .../authad/adLDAP/classes/adLDAPFolders.php | 356 ++-- lib/plugins/authad/adLDAP/classes/adLDAPGroups.php | 1262 ++++++------- lib/plugins/authad/adLDAP/classes/adLDAPUsers.php | 1364 +++++++------- lib/plugins/authad/adLDAP/classes/adLDAPUtils.php | 526 +++--- .../authad/adLDAP/collections/adLDAPCollection.php | 274 +-- .../collections/adLDAPComputerCollection.php | 92 +- .../adLDAP/collections/adLDAPContactCollection.php | 92 +- .../adLDAP/collections/adLDAPGroupCollection.php | 92 +- .../adLDAP/collections/adLDAPUserCollection.php | 92 +- lib/scripts/jquery/jquery-migrate.js | 1022 +++++------ lib/scripts/jquery/jquery-migrate.min.js | 2 +- 15 files changed, 4372 insertions(+), 4372 deletions(-) (limited to 'lib') diff --git a/lib/plugins/authad/adLDAP/adLDAP.php b/lib/plugins/authad/adLDAP/adLDAP.php index a8f33b47e..c1f92abe2 100644 --- a/lib/plugins/authad/adLDAP/adLDAP.php +++ b/lib/plugins/authad/adLDAP/adLDAP.php @@ -1,951 +1,951 @@ -ldapConnection) { - return $this->ldapConnection; - } - return false; - } - - /** - * Get the bind status - * - * @return bool - */ - public function getLdapBind() { - return $this->ldapBind; - } - - /** - * Get the current base DN - * - * @return string - */ - public function getBaseDn() { - return $this->baseDn; - } - - /** - * The group class - * - * @var adLDAPGroups - */ - protected $groupClass; - - /** - * Get the group class interface - * - * @return adLDAPGroups - */ - public function group() { - if (!$this->groupClass) { - $this->groupClass = new adLDAPGroups($this); - } - return $this->groupClass; - } - - /** - * The user class - * - * @var adLDAPUsers - */ - protected $userClass; - - /** - * Get the userclass interface - * - * @return adLDAPUsers - */ - public function user() { - if (!$this->userClass) { - $this->userClass = new adLDAPUsers($this); - } - return $this->userClass; - } - - /** - * The folders class - * - * @var adLDAPFolders - */ - protected $folderClass; - - /** - * Get the folder class interface - * - * @return adLDAPFolders - */ - public function folder() { - if (!$this->folderClass) { - $this->folderClass = new adLDAPFolders($this); - } - return $this->folderClass; - } - - /** - * The utils class - * - * @var adLDAPUtils - */ - protected $utilClass; - - /** - * Get the utils class interface - * - * @return adLDAPUtils - */ - public function utilities() { - if (!$this->utilClass) { - $this->utilClass = new adLDAPUtils($this); - } - return $this->utilClass; - } - - /** - * The contacts class - * - * @var adLDAPContacts - */ - protected $contactClass; - - /** - * Get the contacts class interface - * - * @return adLDAPContacts - */ - public function contact() { - if (!$this->contactClass) { - $this->contactClass = new adLDAPContacts($this); - } - return $this->contactClass; - } - - /** - * The exchange class - * - * @var adLDAPExchange - */ - protected $exchangeClass; - - /** - * Get the exchange class interface - * - * @return adLDAPExchange - */ - public function exchange() { - if (!$this->exchangeClass) { - $this->exchangeClass = new adLDAPExchange($this); - } - return $this->exchangeClass; - } - - /** - * The computers class - * - * @var adLDAPComputers - */ - protected $computersClass; - - /** - * Get the computers class interface - * - * @return adLDAPComputers - */ - public function computer() { - if (!$this->computerClass) { - $this->computerClass = new adLDAPComputers($this); - } - return $this->computerClass; - } - - /** - * Getters and Setters - */ - - /** - * Set the account suffix - * - * @param string $accountSuffix - * @return void - */ - public function setAccountSuffix($accountSuffix) - { - $this->accountSuffix = $accountSuffix; - } - - /** - * Get the account suffix - * - * @return string - */ - public function getAccountSuffix() - { - return $this->accountSuffix; - } - - /** - * Set the domain controllers array - * - * @param array $domainControllers - * @return void - */ - public function setDomainControllers(array $domainControllers) - { - $this->domainControllers = $domainControllers; - } - - /** - * Get the list of domain controllers - * - * @return void - */ - public function getDomainControllers() - { - return $this->domainControllers; - } - - /** - * Sets the port number your domain controller communicates over - * - * @param int $adPort - */ - public function setPort($adPort) - { - $this->adPort = $adPort; - } - - /** - * Gets the port number your domain controller communicates over - * - * @return int - */ - public function getPort() - { - return $this->adPort; - } - - /** - * Set the username of an account with higher priviledges - * - * @param string $adminUsername - * @return void - */ - public function setAdminUsername($adminUsername) - { - $this->adminUsername = $adminUsername; - } - - /** - * Get the username of the account with higher priviledges - * - * This will throw an exception for security reasons - */ - public function getAdminUsername() - { - throw new adLDAPException('For security reasons you cannot access the domain administrator account details'); - } - - /** - * Set the password of an account with higher priviledges - * - * @param string $adminPassword - * @return void - */ - public function setAdminPassword($adminPassword) - { - $this->adminPassword = $adminPassword; - } - - /** - * Get the password of the account with higher priviledges - * - * This will throw an exception for security reasons - */ - public function getAdminPassword() - { - throw new adLDAPException('For security reasons you cannot access the domain administrator account details'); - } - - /** - * Set whether to detect the true primary group - * - * @param bool $realPrimaryGroup - * @return void - */ - public function setRealPrimaryGroup($realPrimaryGroup) - { - $this->realPrimaryGroup = $realPrimaryGroup; - } - - /** - * Get the real primary group setting - * - * @return bool - */ - public function getRealPrimaryGroup() - { - return $this->realPrimaryGroup; - } - - /** - * Set whether to use SSL - * - * @param bool $useSSL - * @return void - */ - public function setUseSSL($useSSL) - { - $this->useSSL = $useSSL; - // Set the default port correctly - if($this->useSSL) { - $this->setPort(self::ADLDAP_LDAPS_PORT); - } - else { - $this->setPort(self::ADLDAP_LDAP_PORT); - } - } - - /** - * Get the SSL setting - * - * @return bool - */ - public function getUseSSL() - { - return $this->useSSL; - } - - /** - * Set whether to use TLS - * - * @param bool $useTLS - * @return void - */ - public function setUseTLS($useTLS) - { - $this->useTLS = $useTLS; - } - - /** - * Get the TLS setting - * - * @return bool - */ - public function getUseTLS() - { - return $this->useTLS; - } - - /** - * Set whether to use SSO - * Requires ldap_sasl_bind support. Be sure --with-ldap-sasl is used when configuring PHP otherwise this function will be undefined. - * - * @param bool $useSSO - * @return void - */ - public function setUseSSO($useSSO) - { - if ($useSSO === true && !$this->ldapSaslSupported()) { - throw new adLDAPException('No LDAP SASL support for PHP. See: http://www.php.net/ldap_sasl_bind'); - } - $this->useSSO = $useSSO; - } - - /** - * Get the SSO setting - * - * @return bool - */ - public function getUseSSO() - { - return $this->useSSO; - } - - /** - * Set whether to lookup recursive groups - * - * @param bool $recursiveGroups - * @return void - */ - public function setRecursiveGroups($recursiveGroups) - { - $this->recursiveGroups = $recursiveGroups; - } - - /** - * Get the recursive groups setting - * - * @return bool - */ - public function getRecursiveGroups() - { - return $this->recursiveGroups; - } - - /** - * Default Constructor - * - * Tries to bind to the AD domain over LDAP or LDAPs - * - * @param array $options Array of options to pass to the constructor - * @throws Exception - if unable to bind to Domain Controller - * @return bool - */ - function __construct($options = array()) { - // You can specifically overide any of the default configuration options setup above - if (count($options) > 0) { - if (array_key_exists("account_suffix",$options)){ $this->accountSuffix = $options["account_suffix"]; } - if (array_key_exists("base_dn",$options)){ $this->baseDn = $options["base_dn"]; } - if (array_key_exists("domain_controllers",$options)){ - if (!is_array($options["domain_controllers"])) { - throw new adLDAPException('[domain_controllers] option must be an array'); - } - $this->domainControllers = $options["domain_controllers"]; - } - if (array_key_exists("admin_username",$options)){ $this->adminUsername = $options["admin_username"]; } - if (array_key_exists("admin_password",$options)){ $this->adminPassword = $options["admin_password"]; } - if (array_key_exists("real_primarygroup",$options)){ $this->realPrimaryGroup = $options["real_primarygroup"]; } - if (array_key_exists("use_ssl",$options)){ $this->setUseSSL($options["use_ssl"]); } - if (array_key_exists("use_tls",$options)){ $this->useTLS = $options["use_tls"]; } - if (array_key_exists("recursive_groups",$options)){ $this->recursiveGroups = $options["recursive_groups"]; } - if (array_key_exists("ad_port",$options)){ $this->setPort($options["ad_port"]); } - if (array_key_exists("sso",$options)) { - $this->setUseSSO($options["sso"]); - if (!$this->ldapSaslSupported()) { - $this->setUseSSO(false); - } - } - } - - if ($this->ldapSupported() === false) { - throw new adLDAPException('No LDAP support for PHP. See: http://www.php.net/ldap'); - } - - return $this->connect(); - } - - /** - * Default Destructor - * - * Closes the LDAP connection - * - * @return void - */ - function __destruct() { - $this->close(); - } - - /** - * Connects and Binds to the Domain Controller - * - * @return bool - */ - public function connect() - { - // Connect to the AD/LDAP server as the username/password - $domainController = $this->randomController(); - if ($this->useSSL) { - $this->ldapConnection = ldap_connect("ldaps://" . $domainController, $this->adPort); - } else { - $this->ldapConnection = ldap_connect($domainController, $this->adPort); - } - - // Set some ldap options for talking to AD - ldap_set_option($this->ldapConnection, LDAP_OPT_PROTOCOL_VERSION, 3); - ldap_set_option($this->ldapConnection, LDAP_OPT_REFERRALS, 0); - - if ($this->useTLS) { - ldap_start_tls($this->ldapConnection); - } - - // Bind as a domain admin if they've set it up - if ($this->adminUsername !== NULL && $this->adminPassword !== NULL) { - $this->ldapBind = @ldap_bind($this->ldapConnection, $this->adminUsername . $this->accountSuffix, $this->adminPassword); - if (!$this->ldapBind) { - if ($this->useSSL && !$this->useTLS) { - // If you have problems troubleshooting, remove the @ character from the ldapldapBind command above to get the actual error message - throw new adLDAPException('Bind to Active Directory failed. Either the LDAPs connection failed or the login credentials are incorrect. AD said: ' . $this->getLastError()); - } - else { - throw new adLDAPException('Bind to Active Directory failed. Check the login credentials and/or server details. AD said: ' . $this->getLastError()); - } - } - } - if ($this->useSSO && $_SERVER['REMOTE_USER'] && $this->adminUsername === null && $_SERVER['KRB5CCNAME']) { - putenv("KRB5CCNAME=" . $_SERVER['KRB5CCNAME']); - $this->ldapBind = @ldap_sasl_bind($this->ldapConnection, NULL, NULL, "GSSAPI"); - if (!$this->ldapBind){ - throw new adLDAPException('Rebind to Active Directory failed. AD said: ' . $this->getLastError()); - } - else { - return true; - } - } - - - if ($this->baseDn == NULL) { - $this->baseDn = $this->findBaseDn(); - } - - return true; - } - - /** - * Closes the LDAP connection - * - * @return void - */ - public function close() { - if ($this->ldapConnection) { - @ldap_close($this->ldapConnection); - } - } - - /** - * Validate a user's login credentials - * - * @param string $username A user's AD username - * @param string $password A user's AD password - * @param bool optional $preventRebind - * @return bool - */ - public function authenticate($username, $password, $preventRebind = false) { - // Prevent null binding - if ($username === NULL || $password === NULL) { return false; } - if (empty($username) || empty($password)) { return false; } - - // Allow binding over SSO for Kerberos - if ($this->useSSO && $_SERVER['REMOTE_USER'] && $_SERVER['REMOTE_USER'] == $username && $this->adminUsername === NULL && $_SERVER['KRB5CCNAME']) { - putenv("KRB5CCNAME=" . $_SERVER['KRB5CCNAME']); - $this->ldapBind = @ldap_sasl_bind($this->ldapConnection, NULL, NULL, "GSSAPI"); - if (!$this->ldapBind) { - throw new adLDAPException('Rebind to Active Directory failed. AD said: ' . $this->getLastError()); - } - else { - return true; - } - } - - // Bind as the user - $ret = true; - $this->ldapBind = @ldap_bind($this->ldapConnection, $username . $this->accountSuffix, $password); - if (!$this->ldapBind){ - $ret = false; - } - - // Cnce we've checked their details, kick back into admin mode if we have it - if ($this->adminUsername !== NULL && !$preventRebind) { - $this->ldapBind = @ldap_bind($this->ldapConnection, $this->adminUsername . $this->accountSuffix , $this->adminPassword); - if (!$this->ldapBind){ - // This should never happen in theory - throw new adLDAPException('Rebind to Active Directory failed. AD said: ' . $this->getLastError()); - } - } - - return $ret; - } - - /** - * Find the Base DN of your domain controller - * - * @return string - */ - public function findBaseDn() - { - $namingContext = $this->getRootDse(array('defaultnamingcontext')); - return $namingContext[0]['defaultnamingcontext'][0]; - } - - /** - * Get the RootDSE properties from a domain controller - * - * @param array $attributes The attributes you wish to query e.g. defaultnamingcontext - * @return array - */ - public function getRootDse($attributes = array("*", "+")) { - if (!$this->ldapBind){ return (false); } - - $sr = @ldap_read($this->ldapConnection, NULL, 'objectClass=*', $attributes); - $entries = @ldap_get_entries($this->ldapConnection, $sr); - return $entries; - } - - /** - * Get last error from Active Directory - * - * This function gets the last message from Active Directory - * This may indeed be a 'Success' message but if you get an unknown error - * it might be worth calling this function to see what errors were raised - * - * return string - */ - public function getLastError() { - return @ldap_error($this->ldapConnection); - } - - /** - * Detect LDAP support in php - * - * @return bool - */ - protected function ldapSupported() - { - if (!function_exists('ldap_connect')) { - return false; - } - return true; - } - - /** - * Detect ldap_sasl_bind support in PHP - * - * @return bool - */ - protected function ldapSaslSupported() - { - if (!function_exists('ldap_sasl_bind')) { - return false; - } - return true; - } - - /** - * Schema - * - * @param array $attributes Attributes to be queried - * @return array - */ - public function adldap_schema($attributes){ - - // LDAP doesn't like NULL attributes, only set them if they have values - // If you wish to remove an attribute you should set it to a space - // TO DO: Adapt user_modify to use ldap_mod_delete to remove a NULL attribute - $mod=array(); - - // Check every attribute to see if it contains 8bit characters and then UTF8 encode them - array_walk($attributes, array($this, 'encode8bit')); - - if ($attributes["address_city"]){ $mod["l"][0]=$attributes["address_city"]; } - if ($attributes["address_code"]){ $mod["postalCode"][0]=$attributes["address_code"]; } - //if ($attributes["address_country"]){ $mod["countryCode"][0]=$attributes["address_country"]; } // use country codes? - if ($attributes["address_country"]){ $mod["c"][0]=$attributes["address_country"]; } - if ($attributes["address_pobox"]){ $mod["postOfficeBox"][0]=$attributes["address_pobox"]; } - if ($attributes["address_state"]){ $mod["st"][0]=$attributes["address_state"]; } - if ($attributes["address_street"]){ $mod["streetAddress"][0]=$attributes["address_street"]; } - if ($attributes["company"]){ $mod["company"][0]=$attributes["company"]; } - if ($attributes["change_password"]){ $mod["pwdLastSet"][0]=0; } - if ($attributes["department"]){ $mod["department"][0]=$attributes["department"]; } - if ($attributes["description"]){ $mod["description"][0]=$attributes["description"]; } - if ($attributes["display_name"]){ $mod["displayName"][0]=$attributes["display_name"]; } - if ($attributes["email"]){ $mod["mail"][0]=$attributes["email"]; } - if ($attributes["expires"]){ $mod["accountExpires"][0]=$attributes["expires"]; } //unix epoch format? - if ($attributes["firstname"]){ $mod["givenName"][0]=$attributes["firstname"]; } - if ($attributes["home_directory"]){ $mod["homeDirectory"][0]=$attributes["home_directory"]; } - if ($attributes["home_drive"]){ $mod["homeDrive"][0]=$attributes["home_drive"]; } - if ($attributes["initials"]){ $mod["initials"][0]=$attributes["initials"]; } - if ($attributes["logon_name"]){ $mod["userPrincipalName"][0]=$attributes["logon_name"]; } - if ($attributes["manager"]){ $mod["manager"][0]=$attributes["manager"]; } //UNTESTED ***Use DistinguishedName*** - if ($attributes["office"]){ $mod["physicalDeliveryOfficeName"][0]=$attributes["office"]; } - if ($attributes["password"]){ $mod["unicodePwd"][0]=$this->user()->encodePassword($attributes["password"]); } - if ($attributes["profile_path"]){ $mod["profilepath"][0]=$attributes["profile_path"]; } - if ($attributes["script_path"]){ $mod["scriptPath"][0]=$attributes["script_path"]; } - if ($attributes["surname"]){ $mod["sn"][0]=$attributes["surname"]; } - if ($attributes["title"]){ $mod["title"][0]=$attributes["title"]; } - if ($attributes["telephone"]){ $mod["telephoneNumber"][0]=$attributes["telephone"]; } - if ($attributes["mobile"]){ $mod["mobile"][0]=$attributes["mobile"]; } - if ($attributes["pager"]){ $mod["pager"][0]=$attributes["pager"]; } - if ($attributes["ipphone"]){ $mod["ipphone"][0]=$attributes["ipphone"]; } - if ($attributes["web_page"]){ $mod["wWWHomePage"][0]=$attributes["web_page"]; } - if ($attributes["fax"]){ $mod["facsimileTelephoneNumber"][0]=$attributes["fax"]; } - if ($attributes["enabled"]){ $mod["userAccountControl"][0]=$attributes["enabled"]; } - if ($attributes["homephone"]){ $mod["homephone"][0]=$attributes["homephone"]; } - - // Distribution List specific schema - if ($attributes["group_sendpermission"]){ $mod["dlMemSubmitPerms"][0]=$attributes["group_sendpermission"]; } - if ($attributes["group_rejectpermission"]){ $mod["dlMemRejectPerms"][0]=$attributes["group_rejectpermission"]; } - - // Exchange Schema - if ($attributes["exchange_homemdb"]){ $mod["homeMDB"][0]=$attributes["exchange_homemdb"]; } - if ($attributes["exchange_mailnickname"]){ $mod["mailNickname"][0]=$attributes["exchange_mailnickname"]; } - if ($attributes["exchange_proxyaddress"]){ $mod["proxyAddresses"][0]=$attributes["exchange_proxyaddress"]; } - if ($attributes["exchange_usedefaults"]){ $mod["mDBUseDefaults"][0]=$attributes["exchange_usedefaults"]; } - if ($attributes["exchange_policyexclude"]){ $mod["msExchPoliciesExcluded"][0]=$attributes["exchange_policyexclude"]; } - if ($attributes["exchange_policyinclude"]){ $mod["msExchPoliciesIncluded"][0]=$attributes["exchange_policyinclude"]; } - if ($attributes["exchange_addressbook"]){ $mod["showInAddressBook"][0]=$attributes["exchange_addressbook"]; } - if ($attributes["exchange_altrecipient"]){ $mod["altRecipient"][0]=$attributes["exchange_altrecipient"]; } - if ($attributes["exchange_deliverandredirect"]){ $mod["deliverAndRedirect"][0]=$attributes["exchange_deliverandredirect"]; } - - // This schema is designed for contacts - if ($attributes["exchange_hidefromlists"]){ $mod["msExchHideFromAddressLists"][0]=$attributes["exchange_hidefromlists"]; } - if ($attributes["contact_email"]){ $mod["targetAddress"][0]=$attributes["contact_email"]; } - - //echo ("
        "); print_r($mod);
        -        /*
        -        // modifying a name is a bit fiddly
        -        if ($attributes["firstname"] && $attributes["surname"]){
        -            $mod["cn"][0]=$attributes["firstname"]." ".$attributes["surname"];
        -            $mod["displayname"][0]=$attributes["firstname"]." ".$attributes["surname"];
        -            $mod["name"][0]=$attributes["firstname"]." ".$attributes["surname"];
        -        }
        -        */
        -
        -        if (count($mod)==0){ return (false); }
        -        return ($mod);
        -    }
        -    
        -    /**
        -    * Convert 8bit characters e.g. accented characters to UTF8 encoded characters
        -    */
        -    protected function encode8Bit(&$item, $key) {
        -        $encode = false;
        -        if (is_string($item)) {
        -            for ($i=0; $i> 7) {
        -                    $encode = true;
        -                }
        -            }
        -        }
        -        if ($encode === true && $key != 'password') {
        -            $item = utf8_encode($item);   
        -        }
        -    }
        -    
        -    /**
        -    * Select a random domain controller from your domain controller array
        -    * 
        -    * @return string
        -    */
        -    protected function randomController() 
        -    {
        -        mt_srand(doubleval(microtime()) * 100000000); // For older PHP versions
        -        /*if (sizeof($this->domainControllers) > 1) {
        -            $adController = $this->domainControllers[array_rand($this->domainControllers)]; 
        -            // Test if the controller is responding to pings
        -            $ping = $this->pingController($adController); 
        -            if ($ping === false) { 
        -                // Find the current key in the domain controllers array
        -                $key = array_search($adController, $this->domainControllers);
        -                // Remove it so that we don't end up in a recursive loop
        -                unset($this->domainControllers[$key]);
        -                // Select a new controller
        -                return $this->randomController(); 
        -            }
        -            else { 
        -                return ($adController); 
        -            }
        -        } */
        -        return $this->domainControllers[array_rand($this->domainControllers)];
        -    }  
        -    
        -    /** 
        -    * Test basic connectivity to controller 
        -    * 
        -    * @return bool
        -    */ 
        -    protected function pingController($host) {
        -        $port = $this->adPort; 
        -        fsockopen($host, $port, $errno, $errstr, 10); 
        -        if ($errno > 0) {
        -            return false;
        -        }
        -        return true;
        -    }
        -
        -}
        -
        -/**
        -* adLDAP Exception Handler
        -* 
        -* Exceptions of this type are thrown on bind failure or when SSL is required but not configured
        -* Example:
        -* try {
        -*   $adldap = new adLDAP();
        -* }
        -* catch (adLDAPException $e) {
        -*   echo $e;
        -*   exit();
        -* }
        -*/
        -class adLDAPException extends Exception {}
        -
        +ldapConnection) {
        +            return $this->ldapConnection;   
        +        }
        +        return false;
        +    }
        +    
        +    /**
        +    * Get the bind status
        +    * 
        +    * @return bool
        +    */
        +    public function getLdapBind() {
        +        return $this->ldapBind;
        +    }
        +    
        +    /**
        +    * Get the current base DN
        +    * 
        +    * @return string
        +    */
        +    public function getBaseDn() {
        +        return $this->baseDn;   
        +    }
        +    
        +    /**
        +    * The group class
        +    * 
        +    * @var adLDAPGroups
        +    */
        +    protected $groupClass;
        +    
        +    /**
        +    * Get the group class interface
        +    * 
        +    * @return adLDAPGroups
        +    */
        +    public function group() {
        +        if (!$this->groupClass) {
        +            $this->groupClass = new adLDAPGroups($this);
        +        }   
        +        return $this->groupClass;
        +    }
        +    
        +    /**
        +    * The user class
        +    * 
        +    * @var adLDAPUsers
        +    */
        +    protected $userClass;
        +    
        +    /**
        +    * Get the userclass interface
        +    * 
        +    * @return adLDAPUsers
        +    */
        +    public function user() {
        +        if (!$this->userClass) {
        +            $this->userClass = new adLDAPUsers($this);
        +        }   
        +        return $this->userClass;
        +    }
        +    
        +    /**
        +    * The folders class
        +    * 
        +    * @var adLDAPFolders
        +    */
        +    protected $folderClass;
        +    
        +    /**
        +    * Get the folder class interface
        +    * 
        +    * @return adLDAPFolders
        +    */
        +    public function folder() {
        +        if (!$this->folderClass) {
        +            $this->folderClass = new adLDAPFolders($this);
        +        }   
        +        return $this->folderClass;
        +    }
        +    
        +    /**
        +    * The utils class
        +    * 
        +    * @var adLDAPUtils
        +    */
        +    protected $utilClass;
        +    
        +    /**
        +    * Get the utils class interface
        +    * 
        +    * @return adLDAPUtils
        +    */
        +    public function utilities() {
        +        if (!$this->utilClass) {
        +            $this->utilClass = new adLDAPUtils($this);
        +        }   
        +        return $this->utilClass;
        +    }
        +    
        +    /**
        +    * The contacts class
        +    * 
        +    * @var adLDAPContacts
        +    */
        +    protected $contactClass;
        +    
        +    /**
        +    * Get the contacts class interface
        +    * 
        +    * @return adLDAPContacts
        +    */
        +    public function contact() {
        +        if (!$this->contactClass) {
        +            $this->contactClass = new adLDAPContacts($this);
        +        }   
        +        return $this->contactClass;
        +    }
        +    
        +    /**
        +    * The exchange class
        +    * 
        +    * @var adLDAPExchange
        +    */
        +    protected $exchangeClass;
        +    
        +    /**
        +    * Get the exchange class interface
        +    * 
        +    * @return adLDAPExchange
        +    */
        +    public function exchange() {
        +        if (!$this->exchangeClass) {
        +            $this->exchangeClass = new adLDAPExchange($this);
        +        }   
        +        return $this->exchangeClass;
        +    }
        +    
        +    /**
        +    * The computers class
        +    * 
        +    * @var adLDAPComputers
        +    */
        +    protected $computersClass;
        +    
        +    /**
        +    * Get the computers class interface
        +    * 
        +    * @return adLDAPComputers
        +    */
        +    public function computer() {
        +        if (!$this->computerClass) {
        +            $this->computerClass = new adLDAPComputers($this);
        +        }   
        +        return $this->computerClass;
        +    }
        +
        +    /**
        +    * Getters and Setters
        +    */
        +    
        +    /**
        +    * Set the account suffix
        +    * 
        +    * @param string $accountSuffix
        +    * @return void
        +    */
        +    public function setAccountSuffix($accountSuffix)
        +    {
        +          $this->accountSuffix = $accountSuffix;
        +    }
        +
        +    /**
        +    * Get the account suffix
        +    * 
        +    * @return string
        +    */
        +    public function getAccountSuffix()
        +    {
        +          return $this->accountSuffix;
        +    }
        +    
        +    /**
        +    * Set the domain controllers array
        +    * 
        +    * @param array $domainControllers
        +    * @return void
        +    */
        +    public function setDomainControllers(array $domainControllers)
        +    {
        +          $this->domainControllers = $domainControllers;
        +    }
        +
        +    /**
        +    * Get the list of domain controllers
        +    * 
        +    * @return void
        +    */
        +    public function getDomainControllers()
        +    {
        +          return $this->domainControllers;
        +    }
        +    
        +    /**
        +    * Sets the port number your domain controller communicates over
        +    * 
        +    * @param int $adPort
        +    */
        +    public function setPort($adPort) 
        +    { 
        +        $this->adPort = $adPort; 
        +    } 
        +    
        +    /**
        +    * Gets the port number your domain controller communicates over
        +    * 
        +    * @return int
        +    */
        +    public function getPort() 
        +    { 
        +        return $this->adPort; 
        +    } 
        +    
        +    /**
        +    * Set the username of an account with higher priviledges
        +    * 
        +    * @param string $adminUsername
        +    * @return void
        +    */
        +    public function setAdminUsername($adminUsername)
        +    {
        +          $this->adminUsername = $adminUsername;
        +    }
        +
        +    /**
        +    * Get the username of the account with higher priviledges
        +    * 
        +    * This will throw an exception for security reasons
        +    */
        +    public function getAdminUsername()
        +    {
        +          throw new adLDAPException('For security reasons you cannot access the domain administrator account details');
        +    }
        +    
        +    /**
        +    * Set the password of an account with higher priviledges
        +    * 
        +    * @param string $adminPassword
        +    * @return void
        +    */
        +    public function setAdminPassword($adminPassword)
        +    {
        +          $this->adminPassword = $adminPassword;
        +    }
        +
        +    /**
        +    * Get the password of the account with higher priviledges
        +    * 
        +    * This will throw an exception for security reasons
        +    */
        +    public function getAdminPassword()
        +    {
        +          throw new adLDAPException('For security reasons you cannot access the domain administrator account details');
        +    }
        +    
        +    /**
        +    * Set whether to detect the true primary group
        +    * 
        +    * @param bool $realPrimaryGroup
        +    * @return void
        +    */
        +    public function setRealPrimaryGroup($realPrimaryGroup)
        +    {
        +          $this->realPrimaryGroup = $realPrimaryGroup;
        +    }
        +
        +    /**
        +    * Get the real primary group setting
        +    * 
        +    * @return bool
        +    */
        +    public function getRealPrimaryGroup()
        +    {
        +          return $this->realPrimaryGroup;
        +    }
        +    
        +    /**
        +    * Set whether to use SSL
        +    * 
        +    * @param bool $useSSL
        +    * @return void
        +    */
        +    public function setUseSSL($useSSL)
        +    {
        +          $this->useSSL = $useSSL;
        +          // Set the default port correctly 
        +          if($this->useSSL) { 
        +            $this->setPort(self::ADLDAP_LDAPS_PORT); 
        +          }
        +          else { 
        +            $this->setPort(self::ADLDAP_LDAP_PORT); 
        +          } 
        +    }
        +
        +    /**
        +    * Get the SSL setting
        +    * 
        +    * @return bool
        +    */
        +    public function getUseSSL()
        +    {
        +          return $this->useSSL;
        +    }
        +    
        +    /**
        +    * Set whether to use TLS
        +    * 
        +    * @param bool $useTLS
        +    * @return void
        +    */
        +    public function setUseTLS($useTLS)
        +    {
        +          $this->useTLS = $useTLS;
        +    }
        +
        +    /**
        +    * Get the TLS setting
        +    * 
        +    * @return bool
        +    */
        +    public function getUseTLS()
        +    {
        +          return $this->useTLS;
        +    }
        +    
        +    /**
        +    * Set whether to use SSO
        +    * Requires ldap_sasl_bind support. Be sure --with-ldap-sasl is used when configuring PHP otherwise this function will be undefined. 
        +    * 
        +    * @param bool $useSSO
        +    * @return void
        +    */
        +    public function setUseSSO($useSSO)
        +    {
        +          if ($useSSO === true && !$this->ldapSaslSupported()) {
        +              throw new adLDAPException('No LDAP SASL support for PHP.  See: http://www.php.net/ldap_sasl_bind');
        +          }
        +          $this->useSSO = $useSSO;
        +    }
        +
        +    /**
        +    * Get the SSO setting
        +    * 
        +    * @return bool
        +    */
        +    public function getUseSSO()
        +    {
        +          return $this->useSSO;
        +    }
        +    
        +    /**
        +    * Set whether to lookup recursive groups
        +    * 
        +    * @param bool $recursiveGroups
        +    * @return void
        +    */
        +    public function setRecursiveGroups($recursiveGroups)
        +    {
        +          $this->recursiveGroups = $recursiveGroups;
        +    }
        +
        +    /**
        +    * Get the recursive groups setting
        +    * 
        +    * @return bool
        +    */
        +    public function getRecursiveGroups()
        +    {
        +          return $this->recursiveGroups;
        +    }
        +
        +    /**
        +    * Default Constructor
        +    * 
        +    * Tries to bind to the AD domain over LDAP or LDAPs
        +    * 
        +    * @param array $options Array of options to pass to the constructor
        +    * @throws Exception - if unable to bind to Domain Controller
        +    * @return bool
        +    */
        +    function __construct($options = array()) {
        +        // You can specifically overide any of the default configuration options setup above
        +        if (count($options) > 0) {
        +            if (array_key_exists("account_suffix",$options)){ $this->accountSuffix = $options["account_suffix"]; }
        +            if (array_key_exists("base_dn",$options)){ $this->baseDn = $options["base_dn"]; }
        +            if (array_key_exists("domain_controllers",$options)){ 
        +                if (!is_array($options["domain_controllers"])) { 
        +                    throw new adLDAPException('[domain_controllers] option must be an array');
        +                }
        +                $this->domainControllers = $options["domain_controllers"]; 
        +            }
        +            if (array_key_exists("admin_username",$options)){ $this->adminUsername = $options["admin_username"]; }
        +            if (array_key_exists("admin_password",$options)){ $this->adminPassword = $options["admin_password"]; }
        +            if (array_key_exists("real_primarygroup",$options)){ $this->realPrimaryGroup = $options["real_primarygroup"]; }
        +            if (array_key_exists("use_ssl",$options)){ $this->setUseSSL($options["use_ssl"]); }
        +            if (array_key_exists("use_tls",$options)){ $this->useTLS = $options["use_tls"]; }
        +            if (array_key_exists("recursive_groups",$options)){ $this->recursiveGroups = $options["recursive_groups"]; }
        +            if (array_key_exists("ad_port",$options)){ $this->setPort($options["ad_port"]); } 
        +            if (array_key_exists("sso",$options)) { 
        +                $this->setUseSSO($options["sso"]);
        +                if (!$this->ldapSaslSupported()) {
        +                    $this->setUseSSO(false);
        +                }
        +            } 
        +        }
        +        
        +        if ($this->ldapSupported() === false) {
        +            throw new adLDAPException('No LDAP support for PHP.  See: http://www.php.net/ldap');
        +        }
        +
        +        return $this->connect();
        +    }
        +
        +    /**
        +    * Default Destructor
        +    * 
        +    * Closes the LDAP connection
        +    * 
        +    * @return void
        +    */
        +    function __destruct() { 
        +        $this->close(); 
        +    }
        +
        +    /**
        +    * Connects and Binds to the Domain Controller
        +    * 
        +    * @return bool
        +    */
        +    public function connect() 
        +    {
        +        // Connect to the AD/LDAP server as the username/password
        +        $domainController = $this->randomController();
        +        if ($this->useSSL) {
        +            $this->ldapConnection = ldap_connect("ldaps://" . $domainController, $this->adPort);
        +        } else {
        +            $this->ldapConnection = ldap_connect($domainController, $this->adPort);
        +        }
        +               
        +        // Set some ldap options for talking to AD
        +        ldap_set_option($this->ldapConnection, LDAP_OPT_PROTOCOL_VERSION, 3);
        +        ldap_set_option($this->ldapConnection, LDAP_OPT_REFERRALS, 0);
        +        
        +        if ($this->useTLS) {
        +            ldap_start_tls($this->ldapConnection);
        +        }
        +               
        +        // Bind as a domain admin if they've set it up
        +        if ($this->adminUsername !== NULL && $this->adminPassword !== NULL) {
        +            $this->ldapBind = @ldap_bind($this->ldapConnection, $this->adminUsername . $this->accountSuffix, $this->adminPassword);
        +            if (!$this->ldapBind) {
        +                if ($this->useSSL && !$this->useTLS) {
        +                    // If you have problems troubleshooting, remove the @ character from the ldapldapBind command above to get the actual error message
        +                    throw new adLDAPException('Bind to Active Directory failed. Either the LDAPs connection failed or the login credentials are incorrect. AD said: ' . $this->getLastError());
        +                }
        +                else {
        +                    throw new adLDAPException('Bind to Active Directory failed. Check the login credentials and/or server details. AD said: ' . $this->getLastError());
        +                }
        +            }
        +        }
        +        if ($this->useSSO && $_SERVER['REMOTE_USER'] && $this->adminUsername === null && $_SERVER['KRB5CCNAME']) {
        +            putenv("KRB5CCNAME=" . $_SERVER['KRB5CCNAME']);  
        +            $this->ldapBind = @ldap_sasl_bind($this->ldapConnection, NULL, NULL, "GSSAPI"); 
        +            if (!$this->ldapBind){ 
        +                throw new adLDAPException('Rebind to Active Directory failed. AD said: ' . $this->getLastError()); 
        +            }
        +            else {
        +                return true;
        +            }
        +        }
        +                
        +        
        +        if ($this->baseDn == NULL) {
        +            $this->baseDn = $this->findBaseDn();   
        +        }
        +        
        +        return true;
        +    }
        +    
        +    /**
        +    * Closes the LDAP connection
        +    * 
        +    * @return void
        +    */
        +    public function close() {
        +        if ($this->ldapConnection) {
        +            @ldap_close($this->ldapConnection);
        +        }
        +    }
        +    
        +    /**
        +    * Validate a user's login credentials
        +    * 
        +    * @param string $username A user's AD username
        +    * @param string $password A user's AD password
        +    * @param bool optional $preventRebind
        +    * @return bool
        +    */
        +    public function authenticate($username, $password, $preventRebind = false) {
        +        // Prevent null binding
        +        if ($username === NULL || $password === NULL) { return false; } 
        +        if (empty($username) || empty($password)) { return false; }
        +        
        +        // Allow binding over SSO for Kerberos
        +        if ($this->useSSO && $_SERVER['REMOTE_USER'] && $_SERVER['REMOTE_USER'] == $username && $this->adminUsername === NULL && $_SERVER['KRB5CCNAME']) { 
        +            putenv("KRB5CCNAME=" . $_SERVER['KRB5CCNAME']);
        +            $this->ldapBind = @ldap_sasl_bind($this->ldapConnection, NULL, NULL, "GSSAPI");
        +            if (!$this->ldapBind) {
        +                throw new adLDAPException('Rebind to Active Directory failed. AD said: ' . $this->getLastError());
        +            }
        +            else {
        +                return true;
        +            }
        +        }
        +        
        +        // Bind as the user        
        +        $ret = true;
        +        $this->ldapBind = @ldap_bind($this->ldapConnection, $username . $this->accountSuffix, $password);
        +        if (!$this->ldapBind){ 
        +            $ret = false; 
        +        }
        +        
        +        // Cnce we've checked their details, kick back into admin mode if we have it
        +        if ($this->adminUsername !== NULL && !$preventRebind) {
        +            $this->ldapBind = @ldap_bind($this->ldapConnection, $this->adminUsername . $this->accountSuffix , $this->adminPassword);
        +            if (!$this->ldapBind){
        +                // This should never happen in theory
        +                throw new adLDAPException('Rebind to Active Directory failed. AD said: ' . $this->getLastError());
        +            } 
        +        } 
        +        
        +        return $ret;
        +    }
        +    
        +    /**
        +    * Find the Base DN of your domain controller
        +    * 
        +    * @return string
        +    */
        +    public function findBaseDn() 
        +    {
        +        $namingContext = $this->getRootDse(array('defaultnamingcontext'));   
        +        return $namingContext[0]['defaultnamingcontext'][0];
        +    }
        +    
        +    /**
        +    * Get the RootDSE properties from a domain controller
        +    * 
        +    * @param array $attributes The attributes you wish to query e.g. defaultnamingcontext
        +    * @return array
        +    */
        +    public function getRootDse($attributes = array("*", "+")) {
        +        if (!$this->ldapBind){ return (false); }
        +        
        +        $sr = @ldap_read($this->ldapConnection, NULL, 'objectClass=*', $attributes);
        +        $entries = @ldap_get_entries($this->ldapConnection, $sr);
        +        return $entries;
        +    }
        +
        +    /**
        +    * Get last error from Active Directory
        +    * 
        +    * This function gets the last message from Active Directory
        +    * This may indeed be a 'Success' message but if you get an unknown error
        +    * it might be worth calling this function to see what errors were raised
        +    * 
        +    * return string
        +    */
        +    public function getLastError() {
        +        return @ldap_error($this->ldapConnection);
        +    }
        +    
        +    /**
        +    * Detect LDAP support in php
        +    * 
        +    * @return bool
        +    */    
        +    protected function ldapSupported()
        +    {
        +        if (!function_exists('ldap_connect')) {
        +            return false;   
        +        }
        +        return true;
        +    }
        +    
        +    /**
        +    * Detect ldap_sasl_bind support in PHP
        +    * 
        +    * @return bool
        +    */
        +    protected function ldapSaslSupported()
        +    {
        +        if (!function_exists('ldap_sasl_bind')) {
        +            return false;
        +        }
        +        return true;
        +    }
        +    
        +    /**
        +    * Schema
        +    * 
        +    * @param array $attributes Attributes to be queried
        +    * @return array
        +    */    
        +    public function adldap_schema($attributes){
        +    
        +        // LDAP doesn't like NULL attributes, only set them if they have values
        +        // If you wish to remove an attribute you should set it to a space
        +        // TO DO: Adapt user_modify to use ldap_mod_delete to remove a NULL attribute
        +        $mod=array();
        +        
        +        // Check every attribute to see if it contains 8bit characters and then UTF8 encode them
        +        array_walk($attributes, array($this, 'encode8bit'));
        +
        +        if ($attributes["address_city"]){ $mod["l"][0]=$attributes["address_city"]; }
        +        if ($attributes["address_code"]){ $mod["postalCode"][0]=$attributes["address_code"]; }
        +        //if ($attributes["address_country"]){ $mod["countryCode"][0]=$attributes["address_country"]; } // use country codes?
        +        if ($attributes["address_country"]){ $mod["c"][0]=$attributes["address_country"]; }
        +        if ($attributes["address_pobox"]){ $mod["postOfficeBox"][0]=$attributes["address_pobox"]; }
        +        if ($attributes["address_state"]){ $mod["st"][0]=$attributes["address_state"]; }
        +        if ($attributes["address_street"]){ $mod["streetAddress"][0]=$attributes["address_street"]; }
        +        if ($attributes["company"]){ $mod["company"][0]=$attributes["company"]; }
        +        if ($attributes["change_password"]){ $mod["pwdLastSet"][0]=0; }
        +        if ($attributes["department"]){ $mod["department"][0]=$attributes["department"]; }
        +        if ($attributes["description"]){ $mod["description"][0]=$attributes["description"]; }
        +        if ($attributes["display_name"]){ $mod["displayName"][0]=$attributes["display_name"]; }
        +        if ($attributes["email"]){ $mod["mail"][0]=$attributes["email"]; }
        +        if ($attributes["expires"]){ $mod["accountExpires"][0]=$attributes["expires"]; } //unix epoch format?
        +        if ($attributes["firstname"]){ $mod["givenName"][0]=$attributes["firstname"]; }
        +        if ($attributes["home_directory"]){ $mod["homeDirectory"][0]=$attributes["home_directory"]; }
        +        if ($attributes["home_drive"]){ $mod["homeDrive"][0]=$attributes["home_drive"]; }
        +        if ($attributes["initials"]){ $mod["initials"][0]=$attributes["initials"]; }
        +        if ($attributes["logon_name"]){ $mod["userPrincipalName"][0]=$attributes["logon_name"]; }
        +        if ($attributes["manager"]){ $mod["manager"][0]=$attributes["manager"]; }  //UNTESTED ***Use DistinguishedName***
        +        if ($attributes["office"]){ $mod["physicalDeliveryOfficeName"][0]=$attributes["office"]; }
        +        if ($attributes["password"]){ $mod["unicodePwd"][0]=$this->user()->encodePassword($attributes["password"]); }
        +        if ($attributes["profile_path"]){ $mod["profilepath"][0]=$attributes["profile_path"]; }
        +        if ($attributes["script_path"]){ $mod["scriptPath"][0]=$attributes["script_path"]; }
        +        if ($attributes["surname"]){ $mod["sn"][0]=$attributes["surname"]; }
        +        if ($attributes["title"]){ $mod["title"][0]=$attributes["title"]; }
        +        if ($attributes["telephone"]){ $mod["telephoneNumber"][0]=$attributes["telephone"]; }
        +        if ($attributes["mobile"]){ $mod["mobile"][0]=$attributes["mobile"]; }
        +        if ($attributes["pager"]){ $mod["pager"][0]=$attributes["pager"]; }
        +        if ($attributes["ipphone"]){ $mod["ipphone"][0]=$attributes["ipphone"]; }
        +        if ($attributes["web_page"]){ $mod["wWWHomePage"][0]=$attributes["web_page"]; }
        +        if ($attributes["fax"]){ $mod["facsimileTelephoneNumber"][0]=$attributes["fax"]; }
        +        if ($attributes["enabled"]){ $mod["userAccountControl"][0]=$attributes["enabled"]; }
        +        if ($attributes["homephone"]){ $mod["homephone"][0]=$attributes["homephone"]; }
        +        
        +        // Distribution List specific schema
        +        if ($attributes["group_sendpermission"]){ $mod["dlMemSubmitPerms"][0]=$attributes["group_sendpermission"]; }
        +        if ($attributes["group_rejectpermission"]){ $mod["dlMemRejectPerms"][0]=$attributes["group_rejectpermission"]; }
        +        
        +        // Exchange Schema
        +        if ($attributes["exchange_homemdb"]){ $mod["homeMDB"][0]=$attributes["exchange_homemdb"]; }
        +        if ($attributes["exchange_mailnickname"]){ $mod["mailNickname"][0]=$attributes["exchange_mailnickname"]; }
        +        if ($attributes["exchange_proxyaddress"]){ $mod["proxyAddresses"][0]=$attributes["exchange_proxyaddress"]; }
        +        if ($attributes["exchange_usedefaults"]){ $mod["mDBUseDefaults"][0]=$attributes["exchange_usedefaults"]; }
        +        if ($attributes["exchange_policyexclude"]){ $mod["msExchPoliciesExcluded"][0]=$attributes["exchange_policyexclude"]; }
        +        if ($attributes["exchange_policyinclude"]){ $mod["msExchPoliciesIncluded"][0]=$attributes["exchange_policyinclude"]; }       
        +        if ($attributes["exchange_addressbook"]){ $mod["showInAddressBook"][0]=$attributes["exchange_addressbook"]; }    
        +        if ($attributes["exchange_altrecipient"]){ $mod["altRecipient"][0]=$attributes["exchange_altrecipient"]; } 
        +        if ($attributes["exchange_deliverandredirect"]){ $mod["deliverAndRedirect"][0]=$attributes["exchange_deliverandredirect"]; }    
        +        
        +        // This schema is designed for contacts
        +        if ($attributes["exchange_hidefromlists"]){ $mod["msExchHideFromAddressLists"][0]=$attributes["exchange_hidefromlists"]; }
        +        if ($attributes["contact_email"]){ $mod["targetAddress"][0]=$attributes["contact_email"]; }
        +        
        +        //echo ("
        "); print_r($mod);
        +        /*
        +        // modifying a name is a bit fiddly
        +        if ($attributes["firstname"] && $attributes["surname"]){
        +            $mod["cn"][0]=$attributes["firstname"]." ".$attributes["surname"];
        +            $mod["displayname"][0]=$attributes["firstname"]." ".$attributes["surname"];
        +            $mod["name"][0]=$attributes["firstname"]." ".$attributes["surname"];
        +        }
        +        */
        +
        +        if (count($mod)==0){ return (false); }
        +        return ($mod);
        +    }
        +    
        +    /**
        +    * Convert 8bit characters e.g. accented characters to UTF8 encoded characters
        +    */
        +    protected function encode8Bit(&$item, $key) {
        +        $encode = false;
        +        if (is_string($item)) {
        +            for ($i=0; $i> 7) {
        +                    $encode = true;
        +                }
        +            }
        +        }
        +        if ($encode === true && $key != 'password') {
        +            $item = utf8_encode($item);   
        +        }
        +    }
        +    
        +    /**
        +    * Select a random domain controller from your domain controller array
        +    * 
        +    * @return string
        +    */
        +    protected function randomController() 
        +    {
        +        mt_srand(doubleval(microtime()) * 100000000); // For older PHP versions
        +        /*if (sizeof($this->domainControllers) > 1) {
        +            $adController = $this->domainControllers[array_rand($this->domainControllers)]; 
        +            // Test if the controller is responding to pings
        +            $ping = $this->pingController($adController); 
        +            if ($ping === false) { 
        +                // Find the current key in the domain controllers array
        +                $key = array_search($adController, $this->domainControllers);
        +                // Remove it so that we don't end up in a recursive loop
        +                unset($this->domainControllers[$key]);
        +                // Select a new controller
        +                return $this->randomController(); 
        +            }
        +            else { 
        +                return ($adController); 
        +            }
        +        } */
        +        return $this->domainControllers[array_rand($this->domainControllers)];
        +    }  
        +    
        +    /** 
        +    * Test basic connectivity to controller 
        +    * 
        +    * @return bool
        +    */ 
        +    protected function pingController($host) {
        +        $port = $this->adPort; 
        +        fsockopen($host, $port, $errno, $errstr, 10); 
        +        if ($errno > 0) {
        +            return false;
        +        }
        +        return true;
        +    }
        +
        +}
        +
        +/**
        +* adLDAP Exception Handler
        +* 
        +* Exceptions of this type are thrown on bind failure or when SSL is required but not configured
        +* Example:
        +* try {
        +*   $adldap = new adLDAP();
        +* }
        +* catch (adLDAPException $e) {
        +*   echo $e;
        +*   exit();
        +* }
        +*/
        +class adLDAPException extends Exception {}
        +
         ?>
        \ No newline at end of file
        diff --git a/lib/plugins/authad/adLDAP/classes/adLDAPComputers.php b/lib/plugins/authad/adLDAP/classes/adLDAPComputers.php
        index 71b24a04f..aabd88fa5 100644
        --- a/lib/plugins/authad/adLDAP/classes/adLDAPComputers.php
        +++ b/lib/plugins/authad/adLDAP/classes/adLDAPComputers.php
        @@ -1,153 +1,153 @@
        -adldap = $adldap;
        -    }
        -    
        -    /**
        -    * Get information about a specific computer. Returned in a raw array format from AD
        -    * 
        -    * @param string $computerName The name of the computer
        -    * @param array $fields Attributes to return
        -    * @return array
        -    */
        -    public function info($computerName, $fields = NULL)
        -    {
        -        if ($computerName === NULL) { return false; }
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -
        -        $filter = "(&(objectClass=computer)(cn=" . $computerName . "))";
        -        if ($fields === NULL) { 
        -            $fields = array("memberof","cn","displayname","dnshostname","distinguishedname","objectcategory","operatingsystem","operatingsystemservicepack","operatingsystemversion"); 
        -        }
        -        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        -        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        -        
        -        return $entries;
        -    }
        -    
        -    /**
        -    * Find information about the computers. Returned in a raw array format from AD
        -    * 
        -    * @param string $computerName The name of the computer
        -    * @param array $fields Array of parameters to query
        -    * @return mixed
        -    */
        -    public function infoCollection($computerName, $fields = NULL)
        -    {
        -        if ($computerName === NULL) { return false; }
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -        
        -        $info = $this->info($computerName, $fields);
        -        
        -        if ($info !== false) {
        -            $collection = new adLDAPComputerCollection($info, $this->adldap);
        -            return $collection;
        -        }
        -        return false;
        -    }
        -    
        -    /**
        -    * Check if a computer is in a group
        -    * 
        -    * @param string $computerName The name of the computer
        -    * @param string $group The group to check
        -    * @param bool $recursive Whether to check recursively
        -    * @return array
        -    */
        -    public function inGroup($computerName, $group, $recursive = NULL)
        -    {
        -        if ($computerName === NULL) { return false; }
        -        if ($group === NULL) { return false; }
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -        if ($recursive === NULL) { $recursive = $this->adldap->getRecursiveGroups(); } // use the default option if they haven't set it
        -
        -        //get a list of the groups
        -        $groups = $this->groups($computerName, array("memberof"), $recursive);
        -
        -        //return true if the specified group is in the group list
        -        if (in_array($group, $groups)){ 
        -            return true; 
        -        }
        -
        -        return false;
        -    }
        -    
        -    /**
        -    * Get the groups a computer is in
        -    * 
        -    * @param string $computerName The name of the computer
        -    * @param bool $recursive Whether to check recursively
        -    * @return array
        -    */
        -    public function groups($computerName, $recursive = NULL)
        -    {
        -        if ($computerName === NULL) { return false; }
        -        if ($recursive === NULL) { $recursive = $this->adldap->getRecursiveGroups(); } //use the default option if they haven't set it
        -        if (!$this->adldap->getLdapBind()){ return false; }
        -
        -        //search the directory for their information
        -        $info = @$this->info($computerName, array("memberof", "primarygroupid"));
        -        $groups = $this->adldap->utilities()->niceNames($info[0]["memberof"]); //presuming the entry returned is our guy (unique usernames)
        -
        -        if ($recursive === true) {
        -            foreach ($groups as $id => $groupName){
        -              $extraGroups = $this->adldap->group()->recursiveGroups($groupName);
        -              $groups = array_merge($groups, $extraGroups);
        -            }
        -        }
        -
        -        return $groups;
        -    }
        -    
        -}
        +adldap = $adldap;
        +    }
        +    
        +    /**
        +    * Get information about a specific computer. Returned in a raw array format from AD
        +    * 
        +    * @param string $computerName The name of the computer
        +    * @param array $fields Attributes to return
        +    * @return array
        +    */
        +    public function info($computerName, $fields = NULL)
        +    {
        +        if ($computerName === NULL) { return false; }
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +
        +        $filter = "(&(objectClass=computer)(cn=" . $computerName . "))";
        +        if ($fields === NULL) { 
        +            $fields = array("memberof","cn","displayname","dnshostname","distinguishedname","objectcategory","operatingsystem","operatingsystemservicepack","operatingsystemversion"); 
        +        }
        +        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        +        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        +        
        +        return $entries;
        +    }
        +    
        +    /**
        +    * Find information about the computers. Returned in a raw array format from AD
        +    * 
        +    * @param string $computerName The name of the computer
        +    * @param array $fields Array of parameters to query
        +    * @return mixed
        +    */
        +    public function infoCollection($computerName, $fields = NULL)
        +    {
        +        if ($computerName === NULL) { return false; }
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +        
        +        $info = $this->info($computerName, $fields);
        +        
        +        if ($info !== false) {
        +            $collection = new adLDAPComputerCollection($info, $this->adldap);
        +            return $collection;
        +        }
        +        return false;
        +    }
        +    
        +    /**
        +    * Check if a computer is in a group
        +    * 
        +    * @param string $computerName The name of the computer
        +    * @param string $group The group to check
        +    * @param bool $recursive Whether to check recursively
        +    * @return array
        +    */
        +    public function inGroup($computerName, $group, $recursive = NULL)
        +    {
        +        if ($computerName === NULL) { return false; }
        +        if ($group === NULL) { return false; }
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +        if ($recursive === NULL) { $recursive = $this->adldap->getRecursiveGroups(); } // use the default option if they haven't set it
        +
        +        //get a list of the groups
        +        $groups = $this->groups($computerName, array("memberof"), $recursive);
        +
        +        //return true if the specified group is in the group list
        +        if (in_array($group, $groups)){ 
        +            return true; 
        +        }
        +
        +        return false;
        +    }
        +    
        +    /**
        +    * Get the groups a computer is in
        +    * 
        +    * @param string $computerName The name of the computer
        +    * @param bool $recursive Whether to check recursively
        +    * @return array
        +    */
        +    public function groups($computerName, $recursive = NULL)
        +    {
        +        if ($computerName === NULL) { return false; }
        +        if ($recursive === NULL) { $recursive = $this->adldap->getRecursiveGroups(); } //use the default option if they haven't set it
        +        if (!$this->adldap->getLdapBind()){ return false; }
        +
        +        //search the directory for their information
        +        $info = @$this->info($computerName, array("memberof", "primarygroupid"));
        +        $groups = $this->adldap->utilities()->niceNames($info[0]["memberof"]); //presuming the entry returned is our guy (unique usernames)
        +
        +        if ($recursive === true) {
        +            foreach ($groups as $id => $groupName){
        +              $extraGroups = $this->adldap->group()->recursiveGroups($groupName);
        +              $groups = array_merge($groups, $extraGroups);
        +            }
        +        }
        +
        +        return $groups;
        +    }
        +    
        +}
         ?>
        \ No newline at end of file
        diff --git a/lib/plugins/authad/adLDAP/classes/adLDAPContacts.php b/lib/plugins/authad/adLDAP/classes/adLDAPContacts.php
        index addd3e5f0..42a0d756b 100644
        --- a/lib/plugins/authad/adLDAP/classes/adLDAPContacts.php
        +++ b/lib/plugins/authad/adLDAP/classes/adLDAPContacts.php
        @@ -1,294 +1,294 @@
        -adldap = $adldap;
        -    }
        -    
        -    //*****************************************************************************************************************
        -    // CONTACT FUNCTIONS
        -    // * Still work to do in this area, and new functions to write
        -    
        -    /**
        -    * Create a contact
        -    * 
        -    * @param array $attributes The attributes to set to the contact
        -    * @return bool
        -    */
        -    public function create($attributes)
        -    {
        -        // Check for compulsory fields
        -        if (!array_key_exists("display_name", $attributes)) { return "Missing compulsory field [display_name]"; }
        -        if (!array_key_exists("email", $attributes)) { return "Missing compulsory field [email]"; }
        -        if (!array_key_exists("container", $attributes)) { return "Missing compulsory field [container]"; }
        -        if (!is_array($attributes["container"])) { return "Container attribute must be an array."; }
        -
        -        // Translate the schema
        -        $add = $this->adldap->adldap_schema($attributes);
        -        
        -        // Additional stuff only used for adding contacts
        -        $add["cn"][0] = $attributes["display_name"];
        -        $add["objectclass"][0] = "top";
        -        $add["objectclass"][1] = "person";
        -        $add["objectclass"][2] = "organizationalPerson";
        -        $add["objectclass"][3] = "contact"; 
        -        if (!isset($attributes['exchange_hidefromlists'])) {
        -            $add["msExchHideFromAddressLists"][0] = "TRUE";
        -        }
        -
        -        // Determine the container
        -        $attributes["container"] = array_reverse($attributes["container"]);
        -        $container= "OU=" . implode(",OU=", $attributes["container"]);
        -
        -        // Add the entry
        -        $result = @ldap_add($this->adldap->getLdapConnection(), "CN=" . $this->adldap->utilities()->escapeCharacters($add["cn"][0]) . ", " . $container . "," . $this->adldap->getBaseDn(), $add);
        -        if ($result != true) { 
        -            return false; 
        -        }
        -        
        -        return true;
        -    }  
        -    
        -    /**
        -    * Determine the list of groups a contact is a member of
        -    * 
        -    * @param string $distinguisedname The full DN of a contact
        -    * @param bool $recursive Recursively check groups
        -    * @return array
        -    */
        -    public function groups($distinguishedName, $recursive = NULL)
        -    {
        -        if ($distinguishedName === NULL) { return false; }
        -        if ($recursive === NULL) { $recursive = $this->adldap->getRecursiveGroups(); } //use the default option if they haven't set it
        -        if (!$this->adldap->getLdapBind()){ return false; }
        -        
        -        // Search the directory for their information
        -        $info = @$this->info($distinguishedName, array("memberof", "primarygroupid"));
        -        $groups = $this->adldap->utilities()->niceNames($info[0]["memberof"]); //presuming the entry returned is our contact
        -
        -        if ($recursive === true){
        -            foreach ($groups as $id => $groupName){
        -                $extraGroups = $this->adldap->group()->recursiveGroups($groupName);
        -                $groups = array_merge($groups, $extraGroups);
        -            }
        -        }
        -        
        -        return $groups;
        -    }
        -    
        -    /**
        -    * Get contact information. Returned in a raw array format from AD
        -    * 
        -    * @param string $distinguisedname The full DN of a contact
        -    * @param array $fields Attributes to be returned
        -    * @return array
        -    */
        -    public function info($distinguishedName, $fields = NULL)
        -    {
        -        if ($distinguishedName === NULL) { return false; }
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -
        -        $filter = "distinguishedName=" . $distinguishedName;
        -        if ($fields === NULL) { 
        -            $fields = array("distinguishedname", "mail", "memberof", "department", "displayname", "telephonenumber", "primarygroupid", "objectsid"); 
        -        }
        -        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        -        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        -        
        -        if ($entries[0]['count'] >= 1) {
        -            // AD does not return the primary group in the ldap query, we may need to fudge it
        -            if ($this->adldap->getRealPrimaryGroup() && isset($entries[0]["primarygroupid"][0]) && isset($entries[0]["primarygroupid"][0])){
        -                //$entries[0]["memberof"][]=$this->group_cn($entries[0]["primarygroupid"][0]);
        -                $entries[0]["memberof"][] = $this->adldap->group()->getPrimaryGroup($entries[0]["primarygroupid"][0], $entries[0]["objectsid"][0]);
        -            } else {
        -                $entries[0]["memberof"][] = "CN=Domain Users,CN=Users," . $this->adldap->getBaseDn();
        -            }
        -        }
        -        
        -        $entries[0]["memberof"]["count"]++;
        -        return $entries;
        -    }
        -    
        -    /**
        -    * Find information about the contacts. Returned in a raw array format from AD
        -    * 
        -    * @param string $distinguishedName The full DN of a contact 
        -    * @param array $fields Array of parameters to query
        -    * @return mixed
        -    */
        -    public function infoCollection($distinguishedName, $fields = NULL)
        -    {
        -        if ($distinguishedName === NULL) { return false; }
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -        
        -        $info = $this->info($distinguishedName, $fields);
        -        
        -        if ($info !== false) {
        -            $collection = new adLDAPContactCollection($info, $this->adldap);
        -            return $collection;
        -        }
        -        return false;
        -    }
        -    
        -    /**
        -    * Determine if a contact is a member of a group
        -    * 
        -    * @param string $distinguisedName The full DN of a contact
        -    * @param string $group The group name to query
        -    * @param bool $recursive Recursively check groups
        -    * @return bool
        -    */
        -    public function inGroup($distinguisedName, $group, $recursive = NULL)
        -    {
        -        if ($distinguisedName === NULL) { return false; }
        -        if ($group === NULL) { return false; }
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -        if ($recursive === NULL) { $recursive = $this->adldap->getRecursiveGroups(); } //use the default option if they haven't set it
        -        
        -        // Get a list of the groups
        -        $groups = $this->groups($distinguisedName, array("memberof"), $recursive);
        -        
        -        // Return true if the specified group is in the group list
        -        if (in_array($group, $groups)){ 
        -            return true; 
        -        }
        -
        -        return false;
        -    }          
        -    
        -    /**
        -    * Modify a contact
        -    * 
        -    * @param string $distinguishedName The contact to query
        -    * @param array $attributes The attributes to modify.  Note if you set the enabled attribute you must not specify any other attributes
        -    * @return bool
        -    */
        -    public function modify($distinguishedName, $attributes) {
        -        if ($distinguishedName === NULL) { return "Missing compulsory field [distinguishedname]"; }
        -        
        -        // Translate the update to the LDAP schema                
        -        $mod = $this->adldap->adldap_schema($attributes);
        -        
        -        // Check to see if this is an enabled status update
        -        if (!$mod) { 
        -            return false; 
        -        }
        -        
        -        // Do the update
        -        $result = ldap_modify($this->adldap->getLdapConnection(), $distinguishedName, $mod);
        -        if ($result == false) { 
        -            return false; 
        -        }
        -        
        -        return true;
        -    }
        -    
        -    /**
        -    * Delete a contact
        -    * 
        -    * @param string $distinguishedName The contact dn to delete (please be careful here!)
        -    * @return array
        -    */
        -    public function delete($distinguishedName) 
        -    {
        -        $result = $this->folder()->delete($distinguishedName);
        -        if ($result != true) { 
        -            return false; 
        -        }       
        -        return true;
        -    }
        -    
        -    /**
        -    * Return a list of all contacts
        -    * 
        -    * @param bool $includeDescription Include a description of a contact
        -    * @param string $search The search parameters
        -    * @param bool $sorted Whether to sort the results
        -    * @return array
        -    */
        -    public function all($includeDescription = false, $search = "*", $sorted = true) {
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -        
        -        // Perform the search and grab all their details
        -        $filter = "(&(objectClass=contact)(cn=" . $search . "))";
        -        $fields = array("displayname","distinguishedname");           
        -        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        -        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        -
        -        $usersArray = array();
        -        for ($i=0; $i<$entries["count"]; $i++){
        -            if ($includeDescription && strlen($entries[$i]["displayname"][0])>0){
        -                $usersArray[$entries[$i]["distinguishedname"][0]] = $entries[$i]["displayname"][0];
        -            } elseif ($includeDescription){
        -                $usersArray[$entries[$i]["distinguishedname"][0]] = $entries[$i]["distinguishedname"][0];
        -            } else {
        -                array_push($usersArray, $entries[$i]["distinguishedname"][0]);
        -            }
        -        }
        -        if ($sorted) { 
        -            asort($usersArray); 
        -        }
        -        return $usersArray;
        -    }
        -    
        -    /**
        -    * Mail enable a contact
        -    * Allows email to be sent to them through Exchange
        -    * 
        -    * @param string $distinguishedname The contact to mail enable
        -    * @param string $emailaddress The email address to allow emails to be sent through
        -    * @param string $mailnickname The mailnickname for the contact in Exchange.  If NULL this will be set to the display name
        -    * @return bool
        -    */
        -    public function contactMailEnable($distinguishedName, $emailAddress, $mailNickname = NULL){
        -        return $this->adldap->exchange()->contactMailEnable($distinguishedName, $emailAddress, $mailNickname);
        -    }
        -    
        -    
        -}
        -?>
        +adldap = $adldap;
        +    }
        +    
        +    //*****************************************************************************************************************
        +    // CONTACT FUNCTIONS
        +    // * Still work to do in this area, and new functions to write
        +    
        +    /**
        +    * Create a contact
        +    * 
        +    * @param array $attributes The attributes to set to the contact
        +    * @return bool
        +    */
        +    public function create($attributes)
        +    {
        +        // Check for compulsory fields
        +        if (!array_key_exists("display_name", $attributes)) { return "Missing compulsory field [display_name]"; }
        +        if (!array_key_exists("email", $attributes)) { return "Missing compulsory field [email]"; }
        +        if (!array_key_exists("container", $attributes)) { return "Missing compulsory field [container]"; }
        +        if (!is_array($attributes["container"])) { return "Container attribute must be an array."; }
        +
        +        // Translate the schema
        +        $add = $this->adldap->adldap_schema($attributes);
        +        
        +        // Additional stuff only used for adding contacts
        +        $add["cn"][0] = $attributes["display_name"];
        +        $add["objectclass"][0] = "top";
        +        $add["objectclass"][1] = "person";
        +        $add["objectclass"][2] = "organizationalPerson";
        +        $add["objectclass"][3] = "contact"; 
        +        if (!isset($attributes['exchange_hidefromlists'])) {
        +            $add["msExchHideFromAddressLists"][0] = "TRUE";
        +        }
        +
        +        // Determine the container
        +        $attributes["container"] = array_reverse($attributes["container"]);
        +        $container= "OU=" . implode(",OU=", $attributes["container"]);
        +
        +        // Add the entry
        +        $result = @ldap_add($this->adldap->getLdapConnection(), "CN=" . $this->adldap->utilities()->escapeCharacters($add["cn"][0]) . ", " . $container . "," . $this->adldap->getBaseDn(), $add);
        +        if ($result != true) { 
        +            return false; 
        +        }
        +        
        +        return true;
        +    }  
        +    
        +    /**
        +    * Determine the list of groups a contact is a member of
        +    * 
        +    * @param string $distinguisedname The full DN of a contact
        +    * @param bool $recursive Recursively check groups
        +    * @return array
        +    */
        +    public function groups($distinguishedName, $recursive = NULL)
        +    {
        +        if ($distinguishedName === NULL) { return false; }
        +        if ($recursive === NULL) { $recursive = $this->adldap->getRecursiveGroups(); } //use the default option if they haven't set it
        +        if (!$this->adldap->getLdapBind()){ return false; }
        +        
        +        // Search the directory for their information
        +        $info = @$this->info($distinguishedName, array("memberof", "primarygroupid"));
        +        $groups = $this->adldap->utilities()->niceNames($info[0]["memberof"]); //presuming the entry returned is our contact
        +
        +        if ($recursive === true){
        +            foreach ($groups as $id => $groupName){
        +                $extraGroups = $this->adldap->group()->recursiveGroups($groupName);
        +                $groups = array_merge($groups, $extraGroups);
        +            }
        +        }
        +        
        +        return $groups;
        +    }
        +    
        +    /**
        +    * Get contact information. Returned in a raw array format from AD
        +    * 
        +    * @param string $distinguisedname The full DN of a contact
        +    * @param array $fields Attributes to be returned
        +    * @return array
        +    */
        +    public function info($distinguishedName, $fields = NULL)
        +    {
        +        if ($distinguishedName === NULL) { return false; }
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +
        +        $filter = "distinguishedName=" . $distinguishedName;
        +        if ($fields === NULL) { 
        +            $fields = array("distinguishedname", "mail", "memberof", "department", "displayname", "telephonenumber", "primarygroupid", "objectsid"); 
        +        }
        +        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        +        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        +        
        +        if ($entries[0]['count'] >= 1) {
        +            // AD does not return the primary group in the ldap query, we may need to fudge it
        +            if ($this->adldap->getRealPrimaryGroup() && isset($entries[0]["primarygroupid"][0]) && isset($entries[0]["primarygroupid"][0])){
        +                //$entries[0]["memberof"][]=$this->group_cn($entries[0]["primarygroupid"][0]);
        +                $entries[0]["memberof"][] = $this->adldap->group()->getPrimaryGroup($entries[0]["primarygroupid"][0], $entries[0]["objectsid"][0]);
        +            } else {
        +                $entries[0]["memberof"][] = "CN=Domain Users,CN=Users," . $this->adldap->getBaseDn();
        +            }
        +        }
        +        
        +        $entries[0]["memberof"]["count"]++;
        +        return $entries;
        +    }
        +    
        +    /**
        +    * Find information about the contacts. Returned in a raw array format from AD
        +    * 
        +    * @param string $distinguishedName The full DN of a contact 
        +    * @param array $fields Array of parameters to query
        +    * @return mixed
        +    */
        +    public function infoCollection($distinguishedName, $fields = NULL)
        +    {
        +        if ($distinguishedName === NULL) { return false; }
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +        
        +        $info = $this->info($distinguishedName, $fields);
        +        
        +        if ($info !== false) {
        +            $collection = new adLDAPContactCollection($info, $this->adldap);
        +            return $collection;
        +        }
        +        return false;
        +    }
        +    
        +    /**
        +    * Determine if a contact is a member of a group
        +    * 
        +    * @param string $distinguisedName The full DN of a contact
        +    * @param string $group The group name to query
        +    * @param bool $recursive Recursively check groups
        +    * @return bool
        +    */
        +    public function inGroup($distinguisedName, $group, $recursive = NULL)
        +    {
        +        if ($distinguisedName === NULL) { return false; }
        +        if ($group === NULL) { return false; }
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +        if ($recursive === NULL) { $recursive = $this->adldap->getRecursiveGroups(); } //use the default option if they haven't set it
        +        
        +        // Get a list of the groups
        +        $groups = $this->groups($distinguisedName, array("memberof"), $recursive);
        +        
        +        // Return true if the specified group is in the group list
        +        if (in_array($group, $groups)){ 
        +            return true; 
        +        }
        +
        +        return false;
        +    }          
        +    
        +    /**
        +    * Modify a contact
        +    * 
        +    * @param string $distinguishedName The contact to query
        +    * @param array $attributes The attributes to modify.  Note if you set the enabled attribute you must not specify any other attributes
        +    * @return bool
        +    */
        +    public function modify($distinguishedName, $attributes) {
        +        if ($distinguishedName === NULL) { return "Missing compulsory field [distinguishedname]"; }
        +        
        +        // Translate the update to the LDAP schema                
        +        $mod = $this->adldap->adldap_schema($attributes);
        +        
        +        // Check to see if this is an enabled status update
        +        if (!$mod) { 
        +            return false; 
        +        }
        +        
        +        // Do the update
        +        $result = ldap_modify($this->adldap->getLdapConnection(), $distinguishedName, $mod);
        +        if ($result == false) { 
        +            return false; 
        +        }
        +        
        +        return true;
        +    }
        +    
        +    /**
        +    * Delete a contact
        +    * 
        +    * @param string $distinguishedName The contact dn to delete (please be careful here!)
        +    * @return array
        +    */
        +    public function delete($distinguishedName) 
        +    {
        +        $result = $this->folder()->delete($distinguishedName);
        +        if ($result != true) { 
        +            return false; 
        +        }       
        +        return true;
        +    }
        +    
        +    /**
        +    * Return a list of all contacts
        +    * 
        +    * @param bool $includeDescription Include a description of a contact
        +    * @param string $search The search parameters
        +    * @param bool $sorted Whether to sort the results
        +    * @return array
        +    */
        +    public function all($includeDescription = false, $search = "*", $sorted = true) {
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +        
        +        // Perform the search and grab all their details
        +        $filter = "(&(objectClass=contact)(cn=" . $search . "))";
        +        $fields = array("displayname","distinguishedname");           
        +        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        +        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        +
        +        $usersArray = array();
        +        for ($i=0; $i<$entries["count"]; $i++){
        +            if ($includeDescription && strlen($entries[$i]["displayname"][0])>0){
        +                $usersArray[$entries[$i]["distinguishedname"][0]] = $entries[$i]["displayname"][0];
        +            } elseif ($includeDescription){
        +                $usersArray[$entries[$i]["distinguishedname"][0]] = $entries[$i]["distinguishedname"][0];
        +            } else {
        +                array_push($usersArray, $entries[$i]["distinguishedname"][0]);
        +            }
        +        }
        +        if ($sorted) { 
        +            asort($usersArray); 
        +        }
        +        return $usersArray;
        +    }
        +    
        +    /**
        +    * Mail enable a contact
        +    * Allows email to be sent to them through Exchange
        +    * 
        +    * @param string $distinguishedname The contact to mail enable
        +    * @param string $emailaddress The email address to allow emails to be sent through
        +    * @param string $mailnickname The mailnickname for the contact in Exchange.  If NULL this will be set to the display name
        +    * @return bool
        +    */
        +    public function contactMailEnable($distinguishedName, $emailAddress, $mailNickname = NULL){
        +        return $this->adldap->exchange()->contactMailEnable($distinguishedName, $emailAddress, $mailNickname);
        +    }
        +    
        +    
        +}
        +?>
        diff --git a/lib/plugins/authad/adLDAP/classes/adLDAPExchange.php b/lib/plugins/authad/adLDAP/classes/adLDAPExchange.php
        index dd0c6de05..d70aac779 100644
        --- a/lib/plugins/authad/adLDAP/classes/adLDAPExchange.php
        +++ b/lib/plugins/authad/adLDAP/classes/adLDAPExchange.php
        @@ -1,390 +1,390 @@
        -adldap = $adldap;
        -    }
        -    
        -    /**
        -    * Create an Exchange account
        -    * 
        -    * @param string $username The username of the user to add the Exchange account to
        -    * @param array $storageGroup The mailbox, Exchange Storage Group, for the user account, this must be a full CN
        -    *                            If the storage group has a different base_dn to the adLDAP configuration, set it using $base_dn
        -    * @param string $emailAddress The primary email address to add to this user
        -    * @param string $mailNickname The mail nick name.  If mail nickname is blank, the username will be used
        -    * @param bool $mdbUseDefaults Indicates whether the store should use the default quota, rather than the per-mailbox quota.
        -    * @param string $baseDn Specify an alternative base_dn for the Exchange storage group
        -    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        -    * @return bool
        -    */
        -    public function createMailbox($username, $storageGroup, $emailAddress, $mailNickname=NULL, $useDefaults=TRUE, $baseDn=NULL, $isGUID=false)
        -    {
        -        if ($username === NULL){ return "Missing compulsory field [username]"; }     
        -        if ($storageGroup === NULL) { return "Missing compulsory array [storagegroup]"; }
        -        if (!is_array($storageGroup)) { return "[storagegroup] must be an array"; }
        -        if ($emailAddress === NULL) { return "Missing compulsory field [emailAddress]"; }
        -        
        -        if ($baseDn === NULL) {
        -            $baseDn = $this->adldap->getBaseDn();   
        -        }
        -        
        -        $container = "CN=" . implode(",CN=", $storageGroup);
        -        
        -        if ($mailNickname === NULL) { 
        -            $mailNickname = $username; 
        -        }
        -        $mdbUseDefaults = $this->adldap->utilities()->boolToString($useDefaults);
        -        
        -        $attributes = array(
        -            'exchange_homemdb'=>$container.",".$baseDn,
        -            'exchange_proxyaddress'=>'SMTP:' . $emailAddress,
        -            'exchange_mailnickname'=>$mailNickname,
        -            'exchange_usedefaults'=>$mdbUseDefaults
        -        );
        -        $result = $this->adldap->user()->modify($username, $attributes, $isGUID);
        -        if ($result == false) { 
        -            return false; 
        -        }
        -        return true;
        -    }
        -    
        -    /**
        -    * Add an X400 address to Exchange
        -    * See http://tools.ietf.org/html/rfc1685 for more information.
        -    * An X400 Address looks similar to this X400:c=US;a= ;p=Domain;o=Organization;s=Doe;g=John;
        -    * 
        -    * @param string $username The username of the user to add the X400 to to
        -    * @param string $country Country
        -    * @param string $admd Administration Management Domain
        -    * @param string $pdmd Private Management Domain (often your AD domain)
        -    * @param string $org Organization
        -    * @param string $surname Surname
        -    * @param string $givenName Given name
        -    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        -    * @return bool
        -    */
        -    public function addX400($username, $country, $admd, $pdmd, $org, $surname, $givenName, $isGUID=false) 
        -    {
        -        if ($username === NULL){ return "Missing compulsory field [username]"; }     
        -        
        -        $proxyValue = 'X400:';
        -            
        -        // Find the dn of the user
        -        $user = $this->adldap->user()->info($username, array("cn","proxyaddresses"), $isGUID);
        -        if ($user[0]["dn"] === NULL) { return false; }
        -        $userDn = $user[0]["dn"];
        -        
        -        // We do not have to demote an email address from the default so we can just add the new proxy address
        -        $attributes['exchange_proxyaddress'] = $proxyValue . 'c=' . $country . ';a=' . $admd . ';p=' . $pdmd . ';o=' . $org . ';s=' . $surname . ';g=' . $givenName . ';';
        -       
        -        // Translate the update to the LDAP schema                
        -        $add = $this->adldap->adldap_schema($attributes);
        -        
        -        if (!$add) { return false; }
        -        
        -        // Do the update
        -        // Take out the @ to see any errors, usually this error might occur because the address already
        -        // exists in the list of proxyAddresses
        -        $result = @ldap_mod_add($this->adldap->getLdapConnection(), $userDn, $add);
        -        if ($result == false) { 
        -            return false; 
        -        }
        -        
        -        return true;
        -    }
        -    
        -    /**
        -    * Add an address to Exchange
        -    * 
        -    * @param string $username The username of the user to add the Exchange account to
        -    * @param string $emailAddress The email address to add to this user
        -    * @param bool $default Make this email address the default address, this is a bit more intensive as we have to demote any existing default addresses
        -    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        -    * @return bool
        -    */
        -    public function addAddress($username, $emailAddress, $default = FALSE, $isGUID = false) 
        -    {
        -        if ($username === NULL) { return "Missing compulsory field [username]"; }     
        -        if ($emailAddress === NULL) { return "Missing compulsory fields [emailAddress]"; }
        -        
        -        $proxyValue = 'smtp:';
        -        if ($default === true) {
        -            $proxyValue = 'SMTP:';
        -        }
        -              
        -        // Find the dn of the user
        -        $user = $this->adldap->user()->info($username, array("cn","proxyaddresses"), $isGUID);
        -        if ($user[0]["dn"] === NULL){ return false; }
        -        $userDn = $user[0]["dn"];
        -        
        -        // We need to scan existing proxy addresses and demote the default one
        -        if (is_array($user[0]["proxyaddresses"]) && $default === true) {
        -            $modAddresses = array();
        -            for ($i=0;$iadldap->getLdapConnection(), $userDn, $modAddresses);
        -            if ($result == false) { 
        -                return false; 
        -            }
        -            
        -            return true;
        -        }
        -        else {
        -            // We do not have to demote an email address from the default so we can just add the new proxy address
        -            $attributes['exchange_proxyaddress'] = $proxyValue . $emailAddress;
        -            
        -            // Translate the update to the LDAP schema                
        -            $add = $this->adldap->adldap_schema($attributes);
        -            
        -            if (!$add) { 
        -                return false; 
        -            }
        -            
        -            // Do the update
        -            // Take out the @ to see any errors, usually this error might occur because the address already
        -            // exists in the list of proxyAddresses
        -            $result = @ldap_mod_add($this->adldap->getLdapConnection(), $userDn,$add);
        -            if ($result == false) { 
        -                return false; 
        -            }
        -            
        -            return true;
        -        }
        -    }
        -    
        -    /**
        -    * Remove an address to Exchange
        -    * If you remove a default address the account will no longer have a default, 
        -    * we recommend changing the default address first
        -    * 
        -    * @param string $username The username of the user to add the Exchange account to
        -    * @param string $emailAddress The email address to add to this user
        -    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        -    * @return bool
        -    */
        -    public function deleteAddress($username, $emailAddress, $isGUID=false) 
        -    {
        -        if ($username === NULL) { return "Missing compulsory field [username]"; }     
        -        if ($emailAddress === NULL) { return "Missing compulsory fields [emailAddress]"; }
        -        
        -        // Find the dn of the user
        -        $user = $this->adldap->user()->info($username, array("cn","proxyaddresses"), $isGUID);
        -        if ($user[0]["dn"] === NULL) { return false; }
        -        $userDn = $user[0]["dn"];
        -        
        -        if (is_array($user[0]["proxyaddresses"])) {
        -            $mod = array();
        -            for ($i=0;$iadldap->getLdapConnection(), $userDn,$mod);
        -            if ($result == false) { 
        -                return false; 
        -            }
        -            
        -            return true;
        -        }
        -        else {
        -            return false;
        -        }
        -    }
        -    /**
        -    * Change the default address
        -    * 
        -    * @param string $username The username of the user to add the Exchange account to
        -    * @param string $emailAddress The email address to make default
        -    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        -    * @return bool
        -    */
        -    public function primaryAddress($username, $emailAddress, $isGUID = false) 
        -    {
        -        if ($username === NULL) { return "Missing compulsory field [username]"; }     
        -        if ($emailAddress === NULL) { return "Missing compulsory fields [emailAddress]"; }
        -        
        -        // Find the dn of the user
        -        $user = $this->adldap->user()->info($username, array("cn","proxyaddresses"), $isGUID);
        -        if ($user[0]["dn"] === NULL){ return false; }
        -        $userDn = $user[0]["dn"];
        -        
        -        if (is_array($user[0]["proxyaddresses"])) {
        -            $modAddresses = array();
        -            for ($i=0;$iadldap->getLdapConnection(), $userDn, $modAddresses);
        -            if ($result == false) { 
        -                return false; 
        -            }
        -            
        -            return true;
        -        }
        -        
        -    }
        -    
        -    /**
        -    * Mail enable a contact
        -    * Allows email to be sent to them through Exchange
        -    * 
        -    * @param string $distinguishedName The contact to mail enable
        -    * @param string $emailAddress The email address to allow emails to be sent through
        -    * @param string $mailNickname The mailnickname for the contact in Exchange.  If NULL this will be set to the display name
        -    * @return bool
        -    */
        -    public function contactMailEnable($distinguishedName, $emailAddress, $mailNickname = NULL)
        -    {
        -        if ($distinguishedName === NULL) { return "Missing compulsory field [distinguishedName]"; }   
        -        if ($emailAddress === NULL) { return "Missing compulsory field [emailAddress]"; }  
        -        
        -        if ($mailNickname !== NULL) {
        -            // Find the dn of the user
        -            $user = $this->adldap->contact()->info($distinguishedName, array("cn","displayname"));
        -            if ($user[0]["displayname"] === NULL) { return false; }
        -            $mailNickname = $user[0]['displayname'][0];
        -        }
        -        
        -        $attributes = array("email"=>$emailAddress,"contact_email"=>"SMTP:" . $emailAddress,"exchange_proxyaddress"=>"SMTP:" . $emailAddress,"exchange_mailnickname" => $mailNickname);
        -         
        -        // Translate the update to the LDAP schema                
        -        $mod = $this->adldap->adldap_schema($attributes);
        -        
        -        // Check to see if this is an enabled status update
        -        if (!$mod) { return false; }
        -        
        -        // Do the update
        -        $result = ldap_modify($this->adldap->getLdapConnection(), $distinguishedName, $mod);
        -        if ($result == false) { return false; }
        -        
        -        return true;
        -    }
        -    
        -    /**
        -    * Returns a list of Exchange Servers in the ConfigurationNamingContext of the domain
        -    * 
        -    * @param array $attributes An array of the AD attributes you wish to return
        -    * @return array
        -    */
        -    public function servers($attributes = array('cn','distinguishedname','serialnumber')) 
        -    {
        -        if (!$this->adldap->getLdapBind()){ return false; }
        -        
        -        $configurationNamingContext = $this->adldap->getRootDse(array('configurationnamingcontext'));
        -        $sr = @ldap_search($this->adldap->getLdapConnection(), $configurationNamingContext[0]['configurationnamingcontext'][0],'(&(objectCategory=msExchExchangeServer))', $attributes);
        -        $entries = @ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        -        return $entries;
        -    }
        -    
        -    /**
        -    * Returns a list of Storage Groups in Exchange for a given mail server
        -    * 
        -    * @param string $exchangeServer The full DN of an Exchange server.  You can use exchange_servers() to find the DN for your server
        -    * @param array $attributes An array of the AD attributes you wish to return
        -    * @param bool $recursive If enabled this will automatically query the databases within a storage group
        -    * @return array
        -    */
        -    public function storageGroups($exchangeServer, $attributes = array('cn','distinguishedname'), $recursive = NULL) 
        -    {
        -        if (!$this->adldap->getLdapBind()){ return false; }
        -        if ($exchangeServer === NULL) { return "Missing compulsory field [exchangeServer]"; }
        -        if ($recursive === NULL) { $recursive = $this->adldap->getRecursiveGroups(); }
        -
        -        $filter = '(&(objectCategory=msExchStorageGroup))';
        -        $sr = @ldap_search($this->adldap->getLdapConnection(), $exchangeServer, $filter, $attributes);
        -        $entries = @ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        -
        -        if ($recursive === true) {
        -            for ($i=0; $i<$entries['count']; $i++) {
        -                $entries[$i]['msexchprivatemdb'] = $this->storageDatabases($entries[$i]['distinguishedname'][0]);       
        -            }
        -        }
        -        
        -        return $entries;
        -    }
        -    
        -    /**
        -    * Returns a list of Databases within any given storage group in Exchange for a given mail server
        -    * 
        -    * @param string $storageGroup The full DN of an Storage Group.  You can use exchange_storage_groups() to find the DN 
        -    * @param array $attributes An array of the AD attributes you wish to return
        -    * @return array
        -    */
        -    public function storageDatabases($storageGroup, $attributes = array('cn','distinguishedname','displayname')) {
        -        if (!$this->adldap->getLdapBind()){ return false; }
        -        if ($storageGroup === NULL) { return "Missing compulsory field [storageGroup]"; }
        -        
        -        $filter = '(&(objectCategory=msExchPrivateMDB))';
        -        $sr = @ldap_search($this->adldap->getLdapConnection(), $storageGroup, $filter, $attributes);
        -        $entries = @ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        -        return $entries;
        -    }
        -}
        +adldap = $adldap;
        +    }
        +    
        +    /**
        +    * Create an Exchange account
        +    * 
        +    * @param string $username The username of the user to add the Exchange account to
        +    * @param array $storageGroup The mailbox, Exchange Storage Group, for the user account, this must be a full CN
        +    *                            If the storage group has a different base_dn to the adLDAP configuration, set it using $base_dn
        +    * @param string $emailAddress The primary email address to add to this user
        +    * @param string $mailNickname The mail nick name.  If mail nickname is blank, the username will be used
        +    * @param bool $mdbUseDefaults Indicates whether the store should use the default quota, rather than the per-mailbox quota.
        +    * @param string $baseDn Specify an alternative base_dn for the Exchange storage group
        +    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        +    * @return bool
        +    */
        +    public function createMailbox($username, $storageGroup, $emailAddress, $mailNickname=NULL, $useDefaults=TRUE, $baseDn=NULL, $isGUID=false)
        +    {
        +        if ($username === NULL){ return "Missing compulsory field [username]"; }     
        +        if ($storageGroup === NULL) { return "Missing compulsory array [storagegroup]"; }
        +        if (!is_array($storageGroup)) { return "[storagegroup] must be an array"; }
        +        if ($emailAddress === NULL) { return "Missing compulsory field [emailAddress]"; }
        +        
        +        if ($baseDn === NULL) {
        +            $baseDn = $this->adldap->getBaseDn();   
        +        }
        +        
        +        $container = "CN=" . implode(",CN=", $storageGroup);
        +        
        +        if ($mailNickname === NULL) { 
        +            $mailNickname = $username; 
        +        }
        +        $mdbUseDefaults = $this->adldap->utilities()->boolToString($useDefaults);
        +        
        +        $attributes = array(
        +            'exchange_homemdb'=>$container.",".$baseDn,
        +            'exchange_proxyaddress'=>'SMTP:' . $emailAddress,
        +            'exchange_mailnickname'=>$mailNickname,
        +            'exchange_usedefaults'=>$mdbUseDefaults
        +        );
        +        $result = $this->adldap->user()->modify($username, $attributes, $isGUID);
        +        if ($result == false) { 
        +            return false; 
        +        }
        +        return true;
        +    }
        +    
        +    /**
        +    * Add an X400 address to Exchange
        +    * See http://tools.ietf.org/html/rfc1685 for more information.
        +    * An X400 Address looks similar to this X400:c=US;a= ;p=Domain;o=Organization;s=Doe;g=John;
        +    * 
        +    * @param string $username The username of the user to add the X400 to to
        +    * @param string $country Country
        +    * @param string $admd Administration Management Domain
        +    * @param string $pdmd Private Management Domain (often your AD domain)
        +    * @param string $org Organization
        +    * @param string $surname Surname
        +    * @param string $givenName Given name
        +    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        +    * @return bool
        +    */
        +    public function addX400($username, $country, $admd, $pdmd, $org, $surname, $givenName, $isGUID=false) 
        +    {
        +        if ($username === NULL){ return "Missing compulsory field [username]"; }     
        +        
        +        $proxyValue = 'X400:';
        +            
        +        // Find the dn of the user
        +        $user = $this->adldap->user()->info($username, array("cn","proxyaddresses"), $isGUID);
        +        if ($user[0]["dn"] === NULL) { return false; }
        +        $userDn = $user[0]["dn"];
        +        
        +        // We do not have to demote an email address from the default so we can just add the new proxy address
        +        $attributes['exchange_proxyaddress'] = $proxyValue . 'c=' . $country . ';a=' . $admd . ';p=' . $pdmd . ';o=' . $org . ';s=' . $surname . ';g=' . $givenName . ';';
        +       
        +        // Translate the update to the LDAP schema                
        +        $add = $this->adldap->adldap_schema($attributes);
        +        
        +        if (!$add) { return false; }
        +        
        +        // Do the update
        +        // Take out the @ to see any errors, usually this error might occur because the address already
        +        // exists in the list of proxyAddresses
        +        $result = @ldap_mod_add($this->adldap->getLdapConnection(), $userDn, $add);
        +        if ($result == false) { 
        +            return false; 
        +        }
        +        
        +        return true;
        +    }
        +    
        +    /**
        +    * Add an address to Exchange
        +    * 
        +    * @param string $username The username of the user to add the Exchange account to
        +    * @param string $emailAddress The email address to add to this user
        +    * @param bool $default Make this email address the default address, this is a bit more intensive as we have to demote any existing default addresses
        +    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        +    * @return bool
        +    */
        +    public function addAddress($username, $emailAddress, $default = FALSE, $isGUID = false) 
        +    {
        +        if ($username === NULL) { return "Missing compulsory field [username]"; }     
        +        if ($emailAddress === NULL) { return "Missing compulsory fields [emailAddress]"; }
        +        
        +        $proxyValue = 'smtp:';
        +        if ($default === true) {
        +            $proxyValue = 'SMTP:';
        +        }
        +              
        +        // Find the dn of the user
        +        $user = $this->adldap->user()->info($username, array("cn","proxyaddresses"), $isGUID);
        +        if ($user[0]["dn"] === NULL){ return false; }
        +        $userDn = $user[0]["dn"];
        +        
        +        // We need to scan existing proxy addresses and demote the default one
        +        if (is_array($user[0]["proxyaddresses"]) && $default === true) {
        +            $modAddresses = array();
        +            for ($i=0;$iadldap->getLdapConnection(), $userDn, $modAddresses);
        +            if ($result == false) { 
        +                return false; 
        +            }
        +            
        +            return true;
        +        }
        +        else {
        +            // We do not have to demote an email address from the default so we can just add the new proxy address
        +            $attributes['exchange_proxyaddress'] = $proxyValue . $emailAddress;
        +            
        +            // Translate the update to the LDAP schema                
        +            $add = $this->adldap->adldap_schema($attributes);
        +            
        +            if (!$add) { 
        +                return false; 
        +            }
        +            
        +            // Do the update
        +            // Take out the @ to see any errors, usually this error might occur because the address already
        +            // exists in the list of proxyAddresses
        +            $result = @ldap_mod_add($this->adldap->getLdapConnection(), $userDn,$add);
        +            if ($result == false) { 
        +                return false; 
        +            }
        +            
        +            return true;
        +        }
        +    }
        +    
        +    /**
        +    * Remove an address to Exchange
        +    * If you remove a default address the account will no longer have a default, 
        +    * we recommend changing the default address first
        +    * 
        +    * @param string $username The username of the user to add the Exchange account to
        +    * @param string $emailAddress The email address to add to this user
        +    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        +    * @return bool
        +    */
        +    public function deleteAddress($username, $emailAddress, $isGUID=false) 
        +    {
        +        if ($username === NULL) { return "Missing compulsory field [username]"; }     
        +        if ($emailAddress === NULL) { return "Missing compulsory fields [emailAddress]"; }
        +        
        +        // Find the dn of the user
        +        $user = $this->adldap->user()->info($username, array("cn","proxyaddresses"), $isGUID);
        +        if ($user[0]["dn"] === NULL) { return false; }
        +        $userDn = $user[0]["dn"];
        +        
        +        if (is_array($user[0]["proxyaddresses"])) {
        +            $mod = array();
        +            for ($i=0;$iadldap->getLdapConnection(), $userDn,$mod);
        +            if ($result == false) { 
        +                return false; 
        +            }
        +            
        +            return true;
        +        }
        +        else {
        +            return false;
        +        }
        +    }
        +    /**
        +    * Change the default address
        +    * 
        +    * @param string $username The username of the user to add the Exchange account to
        +    * @param string $emailAddress The email address to make default
        +    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        +    * @return bool
        +    */
        +    public function primaryAddress($username, $emailAddress, $isGUID = false) 
        +    {
        +        if ($username === NULL) { return "Missing compulsory field [username]"; }     
        +        if ($emailAddress === NULL) { return "Missing compulsory fields [emailAddress]"; }
        +        
        +        // Find the dn of the user
        +        $user = $this->adldap->user()->info($username, array("cn","proxyaddresses"), $isGUID);
        +        if ($user[0]["dn"] === NULL){ return false; }
        +        $userDn = $user[0]["dn"];
        +        
        +        if (is_array($user[0]["proxyaddresses"])) {
        +            $modAddresses = array();
        +            for ($i=0;$iadldap->getLdapConnection(), $userDn, $modAddresses);
        +            if ($result == false) { 
        +                return false; 
        +            }
        +            
        +            return true;
        +        }
        +        
        +    }
        +    
        +    /**
        +    * Mail enable a contact
        +    * Allows email to be sent to them through Exchange
        +    * 
        +    * @param string $distinguishedName The contact to mail enable
        +    * @param string $emailAddress The email address to allow emails to be sent through
        +    * @param string $mailNickname The mailnickname for the contact in Exchange.  If NULL this will be set to the display name
        +    * @return bool
        +    */
        +    public function contactMailEnable($distinguishedName, $emailAddress, $mailNickname = NULL)
        +    {
        +        if ($distinguishedName === NULL) { return "Missing compulsory field [distinguishedName]"; }   
        +        if ($emailAddress === NULL) { return "Missing compulsory field [emailAddress]"; }  
        +        
        +        if ($mailNickname !== NULL) {
        +            // Find the dn of the user
        +            $user = $this->adldap->contact()->info($distinguishedName, array("cn","displayname"));
        +            if ($user[0]["displayname"] === NULL) { return false; }
        +            $mailNickname = $user[0]['displayname'][0];
        +        }
        +        
        +        $attributes = array("email"=>$emailAddress,"contact_email"=>"SMTP:" . $emailAddress,"exchange_proxyaddress"=>"SMTP:" . $emailAddress,"exchange_mailnickname" => $mailNickname);
        +         
        +        // Translate the update to the LDAP schema                
        +        $mod = $this->adldap->adldap_schema($attributes);
        +        
        +        // Check to see if this is an enabled status update
        +        if (!$mod) { return false; }
        +        
        +        // Do the update
        +        $result = ldap_modify($this->adldap->getLdapConnection(), $distinguishedName, $mod);
        +        if ($result == false) { return false; }
        +        
        +        return true;
        +    }
        +    
        +    /**
        +    * Returns a list of Exchange Servers in the ConfigurationNamingContext of the domain
        +    * 
        +    * @param array $attributes An array of the AD attributes you wish to return
        +    * @return array
        +    */
        +    public function servers($attributes = array('cn','distinguishedname','serialnumber')) 
        +    {
        +        if (!$this->adldap->getLdapBind()){ return false; }
        +        
        +        $configurationNamingContext = $this->adldap->getRootDse(array('configurationnamingcontext'));
        +        $sr = @ldap_search($this->adldap->getLdapConnection(), $configurationNamingContext[0]['configurationnamingcontext'][0],'(&(objectCategory=msExchExchangeServer))', $attributes);
        +        $entries = @ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        +        return $entries;
        +    }
        +    
        +    /**
        +    * Returns a list of Storage Groups in Exchange for a given mail server
        +    * 
        +    * @param string $exchangeServer The full DN of an Exchange server.  You can use exchange_servers() to find the DN for your server
        +    * @param array $attributes An array of the AD attributes you wish to return
        +    * @param bool $recursive If enabled this will automatically query the databases within a storage group
        +    * @return array
        +    */
        +    public function storageGroups($exchangeServer, $attributes = array('cn','distinguishedname'), $recursive = NULL) 
        +    {
        +        if (!$this->adldap->getLdapBind()){ return false; }
        +        if ($exchangeServer === NULL) { return "Missing compulsory field [exchangeServer]"; }
        +        if ($recursive === NULL) { $recursive = $this->adldap->getRecursiveGroups(); }
        +
        +        $filter = '(&(objectCategory=msExchStorageGroup))';
        +        $sr = @ldap_search($this->adldap->getLdapConnection(), $exchangeServer, $filter, $attributes);
        +        $entries = @ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        +
        +        if ($recursive === true) {
        +            for ($i=0; $i<$entries['count']; $i++) {
        +                $entries[$i]['msexchprivatemdb'] = $this->storageDatabases($entries[$i]['distinguishedname'][0]);       
        +            }
        +        }
        +        
        +        return $entries;
        +    }
        +    
        +    /**
        +    * Returns a list of Databases within any given storage group in Exchange for a given mail server
        +    * 
        +    * @param string $storageGroup The full DN of an Storage Group.  You can use exchange_storage_groups() to find the DN 
        +    * @param array $attributes An array of the AD attributes you wish to return
        +    * @return array
        +    */
        +    public function storageDatabases($storageGroup, $attributes = array('cn','distinguishedname','displayname')) {
        +        if (!$this->adldap->getLdapBind()){ return false; }
        +        if ($storageGroup === NULL) { return "Missing compulsory field [storageGroup]"; }
        +        
        +        $filter = '(&(objectCategory=msExchPrivateMDB))';
        +        $sr = @ldap_search($this->adldap->getLdapConnection(), $storageGroup, $filter, $attributes);
        +        $entries = @ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        +        return $entries;
        +    }
        +}
         ?>
        \ No newline at end of file
        diff --git a/lib/plugins/authad/adLDAP/classes/adLDAPFolders.php b/lib/plugins/authad/adLDAP/classes/adLDAPFolders.php
        index 55120152d..67b1474db 100644
        --- a/lib/plugins/authad/adLDAP/classes/adLDAPFolders.php
        +++ b/lib/plugins/authad/adLDAP/classes/adLDAPFolders.php
        @@ -1,179 +1,179 @@
        -adldap = $adldap;
        -    }
        -    
        -    /**
        -    * Delete a distinguished name from Active Directory
        -    * You should never need to call this yourself, just use the wrapper functions user_delete and contact_delete
        -    *
        -    * @param string $dn The distinguished name to delete
        -    * @return bool
        -    */
        -    public function delete($dn){ 
        -        $result = ldap_delete($this->adldap->getLdapConnection(), $dn);
        -        if ($result != true) { 
        -            return false; 
        -        }
        -        return true;
        -    }
        -    
        -    /**
        -    * Returns a folder listing for a specific OU
        -    * See http://adldap.sourceforge.net/wiki/doku.php?id=api_folder_functions
        -    * 
        -    * @param array $folderName An array to the OU you wish to list. 
        -    *                           If set to NULL will list the root, strongly recommended to set 
        -    *                           $recursive to false in that instance!
        -    * @param string $dnType The type of record to list.  This can be ADLDAP_FOLDER or ADLDAP_CONTAINER.
        -    * @param bool $recursive Recursively search sub folders
        -    * @param bool $type Specify a type of object to search for
        -    * @return array
        -    */
        -    public function listing($folderName = NULL, $dnType = adLDAP::ADLDAP_FOLDER, $recursive = NULL, $type = NULL) 
        -    {
        -        if ($recursive === NULL) { $recursive = $this->adldap->getRecursiveGroups(); } //use the default option if they haven't set it
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -
        -        $filter = '(&';
        -        if ($type !== NULL) {
        -            switch ($type) {
        -                case 'contact':
        -                    $filter .= '(objectClass=contact)';
        -                    break;
        -                case 'computer':
        -                    $filter .= '(objectClass=computer)';
        -                    break;
        -                case 'group':
        -                    $filter .= '(objectClass=group)';
        -                    break;
        -                case 'folder':
        -                    $filter .= '(objectClass=organizationalUnit)';
        -                    break;
        -                case 'container':
        -                    $filter .= '(objectClass=container)';
        -                    break;
        -                case 'domain':
        -                    $filter .= '(objectClass=builtinDomain)';
        -                    break;
        -                default:
        -                    $filter .= '(objectClass=user)';
        -                    break;   
        -            }
        -        }
        -        else {
        -            $filter .= '(objectClass=*)';   
        -        }
        -        // If the folder name is null then we will search the root level of AD
        -        // This requires us to not have an OU= part, just the base_dn
        -        $searchOu = $this->adldap->getBaseDn();
        -        if (is_array($folderName)) {
        -            $ou = $dnType . "=" . implode("," . $dnType . "=", $folderName);
        -            $filter .= '(!(distinguishedname=' . $ou . ',' . $this->adldap->getBaseDn() . ')))';
        -            $searchOu = $ou . ',' . $this->adldap->getBaseDn();
        -        }
        -        else {
        -            $filter .= '(!(distinguishedname=' . $this->adldap->getBaseDn() . ')))';
        -        }
        -
        -        if ($recursive === true) {
        -            $sr = ldap_search($this->adldap->getLdapConnection(), $searchOu, $filter, array('objectclass', 'distinguishedname', 'samaccountname'));
        -            $entries = @ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        -            if (is_array($entries)) {
        -                return $entries;
        -            }
        -        }
        -        else {
        -            $sr = ldap_list($this->adldap->getLdapConnection(), $searchOu, $filter, array('objectclass', 'distinguishedname', 'samaccountname'));
        -            $entries = @ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        -            if (is_array($entries)) {
        -                return $entries;
        -            }
        -        }
        -        
        -        return false;
        -    }
        -
        -    /**
        -    * Create an organizational unit
        -    * 
        -    * @param array $attributes Default attributes of the ou
        -    * @return bool
        -    */
        -    public function create($attributes)
        -    {
        -        if (!is_array($attributes)){ return "Attributes must be an array"; }
        -        if (!is_array($attributes["container"])) { return "Container attribute must be an array."; }
        -        if (!array_key_exists("ou_name",$attributes)) { return "Missing compulsory field [ou_name]"; }
        -        if (!array_key_exists("container",$attributes)) { return "Missing compulsory field [container]"; }
        -        
        -        $attributes["container"] = array_reverse($attributes["container"]);
        -
        -        $add=array();
        -        $add["objectClass"] = "organizationalUnit";
        -        $add["OU"] = $attributes['ou_name'];
        -        $containers = "";
        -        if (count($attributes['container']) > 0) {
        -            $containers = "OU=" . implode(",OU=", $attributes["container"]) . ",";
        -        }
        -
        -        $containers = "OU=" . implode(",OU=", $attributes["container"]);
        -        $result = ldap_add($this->adldap->getLdapConnection(), "OU=" . $add["OU"] . ", " . $containers . $this->adldap->getBaseDn(), $add);
        -        if ($result != true) { 
        -            return false; 
        -        }
        -        
        -        return true;
        -    }
        -    
        -}
        -
        +adldap = $adldap;
        +    }
        +    
        +    /**
        +    * Delete a distinguished name from Active Directory
        +    * You should never need to call this yourself, just use the wrapper functions user_delete and contact_delete
        +    *
        +    * @param string $dn The distinguished name to delete
        +    * @return bool
        +    */
        +    public function delete($dn){ 
        +        $result = ldap_delete($this->adldap->getLdapConnection(), $dn);
        +        if ($result != true) { 
        +            return false; 
        +        }
        +        return true;
        +    }
        +    
        +    /**
        +    * Returns a folder listing for a specific OU
        +    * See http://adldap.sourceforge.net/wiki/doku.php?id=api_folder_functions
        +    * 
        +    * @param array $folderName An array to the OU you wish to list. 
        +    *                           If set to NULL will list the root, strongly recommended to set 
        +    *                           $recursive to false in that instance!
        +    * @param string $dnType The type of record to list.  This can be ADLDAP_FOLDER or ADLDAP_CONTAINER.
        +    * @param bool $recursive Recursively search sub folders
        +    * @param bool $type Specify a type of object to search for
        +    * @return array
        +    */
        +    public function listing($folderName = NULL, $dnType = adLDAP::ADLDAP_FOLDER, $recursive = NULL, $type = NULL) 
        +    {
        +        if ($recursive === NULL) { $recursive = $this->adldap->getRecursiveGroups(); } //use the default option if they haven't set it
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +
        +        $filter = '(&';
        +        if ($type !== NULL) {
        +            switch ($type) {
        +                case 'contact':
        +                    $filter .= '(objectClass=contact)';
        +                    break;
        +                case 'computer':
        +                    $filter .= '(objectClass=computer)';
        +                    break;
        +                case 'group':
        +                    $filter .= '(objectClass=group)';
        +                    break;
        +                case 'folder':
        +                    $filter .= '(objectClass=organizationalUnit)';
        +                    break;
        +                case 'container':
        +                    $filter .= '(objectClass=container)';
        +                    break;
        +                case 'domain':
        +                    $filter .= '(objectClass=builtinDomain)';
        +                    break;
        +                default:
        +                    $filter .= '(objectClass=user)';
        +                    break;   
        +            }
        +        }
        +        else {
        +            $filter .= '(objectClass=*)';   
        +        }
        +        // If the folder name is null then we will search the root level of AD
        +        // This requires us to not have an OU= part, just the base_dn
        +        $searchOu = $this->adldap->getBaseDn();
        +        if (is_array($folderName)) {
        +            $ou = $dnType . "=" . implode("," . $dnType . "=", $folderName);
        +            $filter .= '(!(distinguishedname=' . $ou . ',' . $this->adldap->getBaseDn() . ')))';
        +            $searchOu = $ou . ',' . $this->adldap->getBaseDn();
        +        }
        +        else {
        +            $filter .= '(!(distinguishedname=' . $this->adldap->getBaseDn() . ')))';
        +        }
        +
        +        if ($recursive === true) {
        +            $sr = ldap_search($this->adldap->getLdapConnection(), $searchOu, $filter, array('objectclass', 'distinguishedname', 'samaccountname'));
        +            $entries = @ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        +            if (is_array($entries)) {
        +                return $entries;
        +            }
        +        }
        +        else {
        +            $sr = ldap_list($this->adldap->getLdapConnection(), $searchOu, $filter, array('objectclass', 'distinguishedname', 'samaccountname'));
        +            $entries = @ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        +            if (is_array($entries)) {
        +                return $entries;
        +            }
        +        }
        +        
        +        return false;
        +    }
        +
        +    /**
        +    * Create an organizational unit
        +    * 
        +    * @param array $attributes Default attributes of the ou
        +    * @return bool
        +    */
        +    public function create($attributes)
        +    {
        +        if (!is_array($attributes)){ return "Attributes must be an array"; }
        +        if (!is_array($attributes["container"])) { return "Container attribute must be an array."; }
        +        if (!array_key_exists("ou_name",$attributes)) { return "Missing compulsory field [ou_name]"; }
        +        if (!array_key_exists("container",$attributes)) { return "Missing compulsory field [container]"; }
        +        
        +        $attributes["container"] = array_reverse($attributes["container"]);
        +
        +        $add=array();
        +        $add["objectClass"] = "organizationalUnit";
        +        $add["OU"] = $attributes['ou_name'];
        +        $containers = "";
        +        if (count($attributes['container']) > 0) {
        +            $containers = "OU=" . implode(",OU=", $attributes["container"]) . ",";
        +        }
        +
        +        $containers = "OU=" . implode(",OU=", $attributes["container"]);
        +        $result = ldap_add($this->adldap->getLdapConnection(), "OU=" . $add["OU"] . ", " . $containers . $this->adldap->getBaseDn(), $add);
        +        if ($result != true) { 
        +            return false; 
        +        }
        +        
        +        return true;
        +    }
        +    
        +}
        +
         ?>
        \ No newline at end of file
        diff --git a/lib/plugins/authad/adLDAP/classes/adLDAPGroups.php b/lib/plugins/authad/adLDAP/classes/adLDAPGroups.php
        index 05e4cc93b..94bc04853 100644
        --- a/lib/plugins/authad/adLDAP/classes/adLDAPGroups.php
        +++ b/lib/plugins/authad/adLDAP/classes/adLDAPGroups.php
        @@ -1,631 +1,631 @@
        -adldap = $adldap;
        -    }
        -    
        -    /**
        -    * Add a group to a group
        -    * 
        -    * @param string $parent The parent group name
        -    * @param string $child The child group name
        -    * @return bool
        -    */
        -    public function addGroup($parent,$child){
        -
        -        // Find the parent group's dn
        -        $parentGroup = $this->ginfo($parent, array("cn"));
        -        if ($parentGroup[0]["dn"] === NULL){
        -            return false; 
        -        }
        -        $parentDn = $parentGroup[0]["dn"];
        -        
        -        // Find the child group's dn
        -        $childGroup = $this->info($child, array("cn"));
        -        if ($childGroup[0]["dn"] === NULL){ 
        -            return false; 
        -        }
        -        $childDn = $childGroup[0]["dn"];
        -                
        -        $add = array();
        -        $add["member"] = $childDn;
        -        
        -        $result = @ldap_mod_add($this->adldap->getLdapConnection(), $parentDn, $add);
        -        if ($result == false) { 
        -            return false; 
        -        }
        -        return true;
        -    }
        -    
        -    /**
        -    * Add a user to a group
        -    * 
        -    * @param string $group The group to add the user to
        -    * @param string $user The user to add to the group
        -    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        -    * @return bool
        -    */
        -    public function addUser($group, $user, $isGUID = false)
        -    {
        -        // Adding a user is a bit fiddly, we need to get the full DN of the user
        -        // and add it using the full DN of the group
        -        
        -        // Find the user's dn
        -        $userDn = $this->adldap->user()->dn($user, $isGUID);
        -        if ($userDn === false) { 
        -            return false; 
        -        }
        -        
        -        // Find the group's dn
        -        $groupInfo = $this->info($group, array("cn"));
        -        if ($groupInfo[0]["dn"] === NULL) { 
        -            return false; 
        -        }
        -        $groupDn = $groupInfo[0]["dn"];
        -        
        -        $add = array();
        -        $add["member"] = $userDn;
        -        
        -        $result = @ldap_mod_add($this->adldap->getLdapConnection(), $groupDn, $add);
        -        if ($result == false) { 
        -            return false; 
        -        }
        -        return true;
        -    }
        -    
        -    /**
        -    * Add a contact to a group
        -    * 
        -    * @param string $group The group to add the contact to
        -    * @param string $contactDn The DN of the contact to add
        -    * @return bool
        -    */
        -    public function addContact($group, $contactDn)
        -    {
        -        // To add a contact we take the contact's DN
        -        // and add it using the full DN of the group
        -        
        -        // Find the group's dn
        -        $groupInfo = $this->info($group, array("cn"));
        -        if ($groupInfo[0]["dn"] === NULL) { 
        -            return false; 
        -        }
        -        $groupDn = $groupInfo[0]["dn"];
        -        
        -        $add = array();
        -        $add["member"] = $contactDn;
        -        
        -        $result = @ldap_mod_add($this->adldap->getLdapConnection(), $groupDn, $add);
        -        if ($result == false) { 
        -            return false; 
        -        }
        -        return true;
        -    }
        -
        -    /**
        -    * Create a group
        -    * 
        -    * @param array $attributes Default attributes of the group
        -    * @return bool
        -    */
        -    public function create($attributes)
        -    {
        -        if (!is_array($attributes)){ return "Attributes must be an array"; }
        -        if (!array_key_exists("group_name", $attributes)){ return "Missing compulsory field [group_name]"; }
        -        if (!array_key_exists("container", $attributes)){ return "Missing compulsory field [container]"; }
        -        if (!array_key_exists("description", $attributes)){ return "Missing compulsory field [description]"; }
        -        if (!is_array($attributes["container"])){ return "Container attribute must be an array."; }
        -        $attributes["container"] = array_reverse($attributes["container"]);
        -
        -        //$member_array = array();
        -        //$member_array[0] = "cn=user1,cn=Users,dc=yourdomain,dc=com";
        -        //$member_array[1] = "cn=administrator,cn=Users,dc=yourdomain,dc=com";
        -        
        -        $add = array();
        -        $add["cn"] = $attributes["group_name"];
        -        $add["samaccountname"] = $attributes["group_name"];
        -        $add["objectClass"] = "Group";
        -        $add["description"] = $attributes["description"];
        -        //$add["member"] = $member_array; UNTESTED
        -
        -        $container = "OU=" . implode(",OU=", $attributes["container"]);
        -        $result = ldap_add($this->adldap->getLdapConnection(), "CN=" . $add["cn"] . ", " . $container . "," . $this->adldap->getBaseDn(), $add);
        -        if ($result != true) { 
        -            return false; 
        -        }
        -        return true;
        -    }
        -    
        -    /**
        -    * Delete a group account 
        -    * 
        -    * @param string $group The group to delete (please be careful here!) 
        -    * 
        -    * @return array 
        -    */
        -    public function delete($group) {
        -        if (!$this->adldap->getLdapBind()){ return false; }
        -        if ($group === null){ return "Missing compulsory field [group]"; }
        -        
        -        $groupInfo = $this->info($group, array("*"));
        -        $dn = $groupInfo[0]['distinguishedname'][0]; 
        -        $result = $this->adldap->folder()->delete($dn); 
        -        if ($result !== true) { 
        -            return false; 
        -        } return true;   
        -    }
        -
        -    /**
        -    * Remove a group from a group
        -    * 
        -    * @param string $parent The parent group name
        -    * @param string $child The child group name
        -    * @return bool
        -    */
        -    public function removeGroup($parent , $child)
        -    {
        -    
        -        // Find the parent dn
        -        $parentGroup = $this->info($parent, array("cn"));
        -        if ($parentGroup[0]["dn"] === NULL) { 
        -            return false; 
        -        }
        -        $parentDn = $parentGroup[0]["dn"];
        -        
        -        // Find the child dn
        -        $childGroup = $this->info($child, array("cn"));
        -        if ($childGroup[0]["dn"] === NULL) { 
        -            return false; 
        -        }
        -        $childDn = $childGroup[0]["dn"];
        -        
        -        $del = array();
        -        $del["member"] = $childDn;
        -        
        -        $result = @ldap_mod_del($this->adldap->getLdapConnection(), $parentDn, $del);
        -        if ($result == false) { 
        -            return false; 
        -        }
        -        return true;
        -    }
        -    
        -    /**
        -    * Remove a user from a group
        -    * 
        -    * @param string $group The group to remove a user from
        -    * @param string $user The AD user to remove from the group
        -    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        -    * @return bool
        -    */
        -    public function removeUser($group, $user, $isGUID = false)
        -    {
        -    
        -        // Find the parent dn
        -        $groupInfo = $this->info($group, array("cn"));
        -        if ($groupInfo[0]["dn"] === NULL){ 
        -            return false; 
        -        }
        -        $groupDn = $groupInfo[0]["dn"];
        -        
        -        // Find the users dn
        -        $userDn = $this->adldap->user()->dn($user, $isGUID);
        -        if ($userDn === false) {
        -            return false; 
        -        }
        -
        -        $del = array();
        -        $del["member"] = $userDn;
        -        
        -        $result = @ldap_mod_del($this->adldap->getLdapConnection(), $groupDn, $del);
        -        if ($result == false) {
        -            return false; 
        -        }
        -        return true;
        -    }
        -    
        -    /**
        -    * Remove a contact from a group
        -    * 
        -    * @param string $group The group to remove a user from
        -    * @param string $contactDn The DN of a contact to remove from the group
        -    * @return bool
        -    */
        -    public function removeContact($group, $contactDn)
        -    {
        -    
        -        // Find the parent dn
        -        $groupInfo = $this->info($group, array("cn"));
        -        if ($groupInfo[0]["dn"] === NULL) { 
        -            return false; 
        -        }
        -        $groupDn = $groupInfo[0]["dn"];
        -    
        -        $del = array();
        -        $del["member"] = $contactDn;
        -        
        -        $result = @ldap_mod_del($this->adldap->getLdapConnection(), $groupDn, $del);
        -        if ($result == false) { 
        -            return false; 
        -        }
        -        return true;
        -    }
        -    
        -    /**
        -    * Return a list of groups in a group
        -    * 
        -    * @param string $group The group to query
        -    * @param bool $recursive Recursively get groups
        -    * @return array
        -    */
        -    public function inGroup($group, $recursive = NULL)
        -    {
        -        if (!$this->adldap->getLdapBind()){ return false; }
        -        if ($recursive === NULL){ $recursive = $this->adldap->getRecursiveGroups(); } // Use the default option if they haven't set it 
        -        
        -        // Search the directory for the members of a group
        -        $info = $this->info($group, array("member","cn"));
        -        $groups = $info[0]["member"];
        -        if (!is_array($groups)) {
        -            return false;   
        -        }
        - 
        -        $groupArray = array();
        -
        -        for ($i=0; $i<$groups["count"]; $i++){ 
        -             $filter = "(&(objectCategory=group)(distinguishedName=" . $this->adldap->utilities()->ldapSlashes($groups[$i]) . "))";
        -             $fields = array("samaccountname", "distinguishedname", "objectClass");
        -             $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        -             $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        -
        -             // not a person, look for a group  
        -             if ($entries['count'] == 0 && $recursive == true) {  
        -                $filter = "(&(objectCategory=group)(distinguishedName=" . $this->adldap->utilities()->ldapSlashes($groups[$i]) . "))";  
        -                $fields = array("distinguishedname");  
        -                $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);  
        -                $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);  
        -                if (!isset($entries[0]['distinguishedname'][0])) {
        -                    continue;  
        -                }
        -                $subGroups = $this->inGroup($entries[0]['distinguishedname'][0], $recursive);  
        -                if (is_array($subGroups)) {
        -                    $groupArray = array_merge($groupArray, $subGroups); 
        -                    $groupArray = array_unique($groupArray);  
        -                }
        -                continue;  
        -             } 
        -
        -             $groupArray[] = $entries[0]['distinguishedname'][0];
        -        }
        -        return $groupArray;
        -    }
        -    
        -    /**
        -    * Return a list of members in a group
        -    * 
        -    * @param string $group The group to query
        -    * @param bool $recursive Recursively get group members
        -    * @return array
        -    */
        -    public function members($group, $recursive = NULL)
        -    {
        -        if (!$this->adldap->getLdapBind()){ return false; }
        -        if ($recursive === NULL){ $recursive = $this->adldap->getRecursiveGroups(); } // Use the default option if they haven't set it 
        -        // Search the directory for the members of a group
        -        $info = $this->info($group, array("member","cn"));
        -        $users = $info[0]["member"];
        -        if (!is_array($users)) {
        -            return false;   
        -        }
        - 
        -        $userArray = array();
        -
        -        for ($i=0; $i<$users["count"]; $i++){ 
        -             $filter = "(&(objectCategory=person)(distinguishedName=" . $this->adldap->utilities()->ldapSlashes($users[$i]) . "))";
        -             $fields = array("samaccountname", "distinguishedname", "objectClass");
        -             $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        -             $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        -
        -             // not a person, look for a group  
        -             if ($entries['count'] == 0 && $recursive == true) {  
        -                $filter = "(&(objectCategory=group)(distinguishedName=" . $this->adldap->utilities()->ldapSlashes($users[$i]) . "))";  
        -                $fields = array("samaccountname");  
        -                $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);  
        -                $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);  
        -                if (!isset($entries[0]['samaccountname'][0])) {
        -                    continue;  
        -                }
        -                $subUsers = $this->members($entries[0]['samaccountname'][0], $recursive);  
        -                if (is_array($subUsers)) {
        -                    $userArray = array_merge($userArray, $subUsers); 
        -                    $userArray = array_unique($userArray);  
        -                }
        -                continue;  
        -             } 
        -             else if ($entries['count'] == 0) {   
        -                continue; 
        -             } 
        -
        -             if ((!isset($entries[0]['samaccountname'][0]) || $entries[0]['samaccountname'][0] === NULL) && $entries[0]['distinguishedname'][0] !== NULL) {
        -                 $userArray[] = $entries[0]['distinguishedname'][0];
        -             }
        -             else if ($entries[0]['samaccountname'][0] !== NULL) {
        -                $userArray[] = $entries[0]['samaccountname'][0];
        -             }
        -        }
        -        return $userArray;
        -    }
        -    
        -    /**
        -    * Group Information.  Returns an array of raw information about a group.
        -    * The group name is case sensitive
        -    * 
        -    * @param string $groupName The group name to retrieve info about
        -    * @param array $fields Fields to retrieve
        -    * @return array
        -    */
        -    public function info($groupName, $fields = NULL)
        -    {
        -        if ($groupName === NULL) { return false; }
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -        
        -        if (stristr($groupName, '+')) {
        -            $groupName = stripslashes($groupName);   
        -        }
        -        
        -        $filter = "(&(objectCategory=group)(name=" . $this->adldap->utilities()->ldapSlashes($groupName) . "))";
        -        if ($fields === NULL) { 
        -            $fields = array("member","memberof","cn","description","distinguishedname","objectcategory","samaccountname"); 
        -        }
        -        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        -        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        -
        -        return $entries;
        -    }
        -    
        -    /**
        -    * Group Information.  Returns an collection
        -    * The group name is case sensitive
        -    * 
        -    * @param string $groupName The group name to retrieve info about
        -    * @param array $fields Fields to retrieve
        -    * @return adLDAPGroupCollection
        -    */
        -    public function infoCollection($groupName, $fields = NULL)
        -    {
        -        if ($groupName === NULL) { return false; }
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -        
        -        $info = $this->info($groupName, $fields);
        -        if ($info !== false) {
        -            $collection = new adLDAPGroupCollection($info, $this->adldap);
        -            return $collection;
        -        }
        -        return false;
        -    }
        -    
        -    /**
        -    * Return a complete list of "groups in groups"
        -    * 
        -    * @param string $group The group to get the list from
        -    * @return array
        -    */
        -    public function recursiveGroups($group)
        -    {
        -        if ($group === NULL) { return false; }
        -
        -        $stack = array(); 
        -        $processed = array(); 
        -        $retGroups = array(); 
        -     
        -        array_push($stack, $group); // Initial Group to Start with 
        -        while (count($stack) > 0) {
        -            $parent = array_pop($stack);
        -            array_push($processed, $parent);
        -            
        -            $info = $this->info($parent, array("memberof"));
        -            
        -            if (isset($info[0]["memberof"]) && is_array($info[0]["memberof"])) {
        -                $groups = $info[0]["memberof"]; 
        -                if ($groups) {
        -                    $groupNames = $this->adldap->utilities()->niceNames($groups);  
        -                    $retGroups = array_merge($retGroups, $groupNames); //final groups to return
        -                    foreach ($groupNames as $id => $groupName) { 
        -                        if (!in_array($groupName, $processed)) {
        -                            array_push($stack, $groupName);
        -                        }
        -                    }
        -                }
        -            }
        -        }
        -        
        -        return $retGroups;
        -    }
        -    
        -    /**
        -    * Returns a complete list of the groups in AD based on a SAM Account Type  
        -    * 
        -    * @param string $sAMAaccountType The account type to return
        -    * @param bool $includeDescription Whether to return a description
        -    * @param string $search Search parameters
        -    * @param bool $sorted Whether to sort the results
        -    * @return array
        -    */
        -    public function search($sAMAaccountType = adLDAP::ADLDAP_SECURITY_GLOBAL_GROUP, $includeDescription = false, $search = "*", $sorted = true) {
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -        
        -        $filter = '(&(objectCategory=group)';
        -        if ($sAMAaccountType !== null) {
        -            $filter .= '(samaccounttype='. $sAMAaccountType .')';
        -        }
        -        $filter .= '(cn=' . $search . '))';
        -        // Perform the search and grab all their details
        -        $fields = array("samaccountname", "description");
        -        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        -        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        -
        -        $groupsArray = array();        
        -        for ($i=0; $i<$entries["count"]; $i++){
        -            if ($includeDescription && strlen($entries[$i]["description"][0]) > 0 ) {
        -                $groupsArray[$entries[$i]["samaccountname"][0]] = $entries[$i]["description"][0];
        -            }
        -            else if ($includeDescription){
        -                $groupsArray[$entries[$i]["samaccountname"][0]] = $entries[$i]["samaccountname"][0];
        -            }
        -            else {
        -                array_push($groupsArray, $entries[$i]["samaccountname"][0]);
        -            }
        -        }
        -        if ($sorted) { 
        -            asort($groupsArray); 
        -        }
        -        return $groupsArray;
        -    }
        -    
        -    /**
        -    * Returns a complete list of all groups in AD
        -    * 
        -    * @param bool $includeDescription Whether to return a description
        -    * @param string $search Search parameters
        -    * @param bool $sorted Whether to sort the results
        -    * @return array
        -    */
        -    public function all($includeDescription = false, $search = "*", $sorted = true){
        -        $groupsArray = $this->search(null, $includeDescription, $search, $sorted);
        -        return $groupsArray;
        -    }
        -    
        -    /**
        -    * Returns a complete list of security groups in AD
        -    * 
        -    * @param bool $includeDescription Whether to return a description
        -    * @param string $search Search parameters
        -    * @param bool $sorted Whether to sort the results
        -    * @return array
        -    */
        -    public function allSecurity($includeDescription = false, $search = "*", $sorted = true){
        -        $groupsArray = $this->search(adLDAP::ADLDAP_SECURITY_GLOBAL_GROUP, $includeDescription, $search, $sorted);
        -        return $groupsArray;
        -    }
        -    
        -    /**
        -    * Returns a complete list of distribution lists in AD
        -    * 
        -    * @param bool $includeDescription Whether to return a description
        -    * @param string $search Search parameters
        -    * @param bool $sorted Whether to sort the results
        -    * @return array
        -    */
        -    public function allDistribution($includeDescription = false, $search = "*", $sorted = true){
        -        $groupsArray = $this->search(adLDAP::ADLDAP_DISTRIBUTION_GROUP, $includeDescription, $search, $sorted);
        -        return $groupsArray;
        -    }
        -    
        -    /**
        -    * Coping with AD not returning the primary group
        -    * http://support.microsoft.com/?kbid=321360 
        -    * 
        -    * This is a re-write based on code submitted by Bruce which prevents the 
        -    * need to search each security group to find the true primary group
        -    * 
        -    * @param string $gid Group ID
        -    * @param string $usersid User's Object SID
        -    * @return mixed
        -    */
        -    public function getPrimaryGroup($gid, $usersid)
        -    {
        -        if ($gid === NULL || $usersid === NULL) { return false; }
        -        $sr = false;
        -
        -        $gsid = substr_replace($usersid, pack('V',$gid), strlen($usersid)-4,4);
        -        $filter = '(objectsid=' . $this->adldap->utilities()->getTextSID($gsid).')';
        -        $fields = array("samaccountname","distinguishedname");
        -        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        -        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        -
        -        if (isset($entries[0]['distinguishedname'][0])) {
        -            return $entries[0]['distinguishedname'][0];
        -        }
        -        return false;
        -     }
        -     
        -     /**
        -    * Coping with AD not returning the primary group
        -    * http://support.microsoft.com/?kbid=321360 
        -    * 
        -    * For some reason it's not possible to search on primarygrouptoken=XXX
        -    * If someone can show otherwise, I'd like to know about it :)
        -    * this way is resource intensive and generally a pain in the @#%^
        -    * 
        -    * @deprecated deprecated since version 3.1, see get get_primary_group
        -    * @param string $gid Group ID
        -    * @return string
        -    */
        -    public function cn($gid){    
        -        if ($gid === NULL) { return false; }
        -        $sr = false;
        -        $r = '';
        -        
        -        $filter = "(&(objectCategory=group)(samaccounttype=" . adLDAP::ADLDAP_SECURITY_GLOBAL_GROUP . "))";
        -        $fields = array("primarygrouptoken", "samaccountname", "distinguishedname");
        -        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        -        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        -        
        -        for ($i=0; $i<$entries["count"]; $i++){
        -            if ($entries[$i]["primarygrouptoken"][0] == $gid) {
        -                $r = $entries[$i]["distinguishedname"][0];
        -                $i = $entries["count"];
        -            }
        -        }
        -
        -        return $r;
        -    }
        -}
        -?>
        +adldap = $adldap;
        +    }
        +    
        +    /**
        +    * Add a group to a group
        +    * 
        +    * @param string $parent The parent group name
        +    * @param string $child The child group name
        +    * @return bool
        +    */
        +    public function addGroup($parent,$child){
        +
        +        // Find the parent group's dn
        +        $parentGroup = $this->ginfo($parent, array("cn"));
        +        if ($parentGroup[0]["dn"] === NULL){
        +            return false; 
        +        }
        +        $parentDn = $parentGroup[0]["dn"];
        +        
        +        // Find the child group's dn
        +        $childGroup = $this->info($child, array("cn"));
        +        if ($childGroup[0]["dn"] === NULL){ 
        +            return false; 
        +        }
        +        $childDn = $childGroup[0]["dn"];
        +                
        +        $add = array();
        +        $add["member"] = $childDn;
        +        
        +        $result = @ldap_mod_add($this->adldap->getLdapConnection(), $parentDn, $add);
        +        if ($result == false) { 
        +            return false; 
        +        }
        +        return true;
        +    }
        +    
        +    /**
        +    * Add a user to a group
        +    * 
        +    * @param string $group The group to add the user to
        +    * @param string $user The user to add to the group
        +    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        +    * @return bool
        +    */
        +    public function addUser($group, $user, $isGUID = false)
        +    {
        +        // Adding a user is a bit fiddly, we need to get the full DN of the user
        +        // and add it using the full DN of the group
        +        
        +        // Find the user's dn
        +        $userDn = $this->adldap->user()->dn($user, $isGUID);
        +        if ($userDn === false) { 
        +            return false; 
        +        }
        +        
        +        // Find the group's dn
        +        $groupInfo = $this->info($group, array("cn"));
        +        if ($groupInfo[0]["dn"] === NULL) { 
        +            return false; 
        +        }
        +        $groupDn = $groupInfo[0]["dn"];
        +        
        +        $add = array();
        +        $add["member"] = $userDn;
        +        
        +        $result = @ldap_mod_add($this->adldap->getLdapConnection(), $groupDn, $add);
        +        if ($result == false) { 
        +            return false; 
        +        }
        +        return true;
        +    }
        +    
        +    /**
        +    * Add a contact to a group
        +    * 
        +    * @param string $group The group to add the contact to
        +    * @param string $contactDn The DN of the contact to add
        +    * @return bool
        +    */
        +    public function addContact($group, $contactDn)
        +    {
        +        // To add a contact we take the contact's DN
        +        // and add it using the full DN of the group
        +        
        +        // Find the group's dn
        +        $groupInfo = $this->info($group, array("cn"));
        +        if ($groupInfo[0]["dn"] === NULL) { 
        +            return false; 
        +        }
        +        $groupDn = $groupInfo[0]["dn"];
        +        
        +        $add = array();
        +        $add["member"] = $contactDn;
        +        
        +        $result = @ldap_mod_add($this->adldap->getLdapConnection(), $groupDn, $add);
        +        if ($result == false) { 
        +            return false; 
        +        }
        +        return true;
        +    }
        +
        +    /**
        +    * Create a group
        +    * 
        +    * @param array $attributes Default attributes of the group
        +    * @return bool
        +    */
        +    public function create($attributes)
        +    {
        +        if (!is_array($attributes)){ return "Attributes must be an array"; }
        +        if (!array_key_exists("group_name", $attributes)){ return "Missing compulsory field [group_name]"; }
        +        if (!array_key_exists("container", $attributes)){ return "Missing compulsory field [container]"; }
        +        if (!array_key_exists("description", $attributes)){ return "Missing compulsory field [description]"; }
        +        if (!is_array($attributes["container"])){ return "Container attribute must be an array."; }
        +        $attributes["container"] = array_reverse($attributes["container"]);
        +
        +        //$member_array = array();
        +        //$member_array[0] = "cn=user1,cn=Users,dc=yourdomain,dc=com";
        +        //$member_array[1] = "cn=administrator,cn=Users,dc=yourdomain,dc=com";
        +        
        +        $add = array();
        +        $add["cn"] = $attributes["group_name"];
        +        $add["samaccountname"] = $attributes["group_name"];
        +        $add["objectClass"] = "Group";
        +        $add["description"] = $attributes["description"];
        +        //$add["member"] = $member_array; UNTESTED
        +
        +        $container = "OU=" . implode(",OU=", $attributes["container"]);
        +        $result = ldap_add($this->adldap->getLdapConnection(), "CN=" . $add["cn"] . ", " . $container . "," . $this->adldap->getBaseDn(), $add);
        +        if ($result != true) { 
        +            return false; 
        +        }
        +        return true;
        +    }
        +    
        +    /**
        +    * Delete a group account 
        +    * 
        +    * @param string $group The group to delete (please be careful here!) 
        +    * 
        +    * @return array 
        +    */
        +    public function delete($group) {
        +        if (!$this->adldap->getLdapBind()){ return false; }
        +        if ($group === null){ return "Missing compulsory field [group]"; }
        +        
        +        $groupInfo = $this->info($group, array("*"));
        +        $dn = $groupInfo[0]['distinguishedname'][0]; 
        +        $result = $this->adldap->folder()->delete($dn); 
        +        if ($result !== true) { 
        +            return false; 
        +        } return true;   
        +    }
        +
        +    /**
        +    * Remove a group from a group
        +    * 
        +    * @param string $parent The parent group name
        +    * @param string $child The child group name
        +    * @return bool
        +    */
        +    public function removeGroup($parent , $child)
        +    {
        +    
        +        // Find the parent dn
        +        $parentGroup = $this->info($parent, array("cn"));
        +        if ($parentGroup[0]["dn"] === NULL) { 
        +            return false; 
        +        }
        +        $parentDn = $parentGroup[0]["dn"];
        +        
        +        // Find the child dn
        +        $childGroup = $this->info($child, array("cn"));
        +        if ($childGroup[0]["dn"] === NULL) { 
        +            return false; 
        +        }
        +        $childDn = $childGroup[0]["dn"];
        +        
        +        $del = array();
        +        $del["member"] = $childDn;
        +        
        +        $result = @ldap_mod_del($this->adldap->getLdapConnection(), $parentDn, $del);
        +        if ($result == false) { 
        +            return false; 
        +        }
        +        return true;
        +    }
        +    
        +    /**
        +    * Remove a user from a group
        +    * 
        +    * @param string $group The group to remove a user from
        +    * @param string $user The AD user to remove from the group
        +    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        +    * @return bool
        +    */
        +    public function removeUser($group, $user, $isGUID = false)
        +    {
        +    
        +        // Find the parent dn
        +        $groupInfo = $this->info($group, array("cn"));
        +        if ($groupInfo[0]["dn"] === NULL){ 
        +            return false; 
        +        }
        +        $groupDn = $groupInfo[0]["dn"];
        +        
        +        // Find the users dn
        +        $userDn = $this->adldap->user()->dn($user, $isGUID);
        +        if ($userDn === false) {
        +            return false; 
        +        }
        +
        +        $del = array();
        +        $del["member"] = $userDn;
        +        
        +        $result = @ldap_mod_del($this->adldap->getLdapConnection(), $groupDn, $del);
        +        if ($result == false) {
        +            return false; 
        +        }
        +        return true;
        +    }
        +    
        +    /**
        +    * Remove a contact from a group
        +    * 
        +    * @param string $group The group to remove a user from
        +    * @param string $contactDn The DN of a contact to remove from the group
        +    * @return bool
        +    */
        +    public function removeContact($group, $contactDn)
        +    {
        +    
        +        // Find the parent dn
        +        $groupInfo = $this->info($group, array("cn"));
        +        if ($groupInfo[0]["dn"] === NULL) { 
        +            return false; 
        +        }
        +        $groupDn = $groupInfo[0]["dn"];
        +    
        +        $del = array();
        +        $del["member"] = $contactDn;
        +        
        +        $result = @ldap_mod_del($this->adldap->getLdapConnection(), $groupDn, $del);
        +        if ($result == false) { 
        +            return false; 
        +        }
        +        return true;
        +    }
        +    
        +    /**
        +    * Return a list of groups in a group
        +    * 
        +    * @param string $group The group to query
        +    * @param bool $recursive Recursively get groups
        +    * @return array
        +    */
        +    public function inGroup($group, $recursive = NULL)
        +    {
        +        if (!$this->adldap->getLdapBind()){ return false; }
        +        if ($recursive === NULL){ $recursive = $this->adldap->getRecursiveGroups(); } // Use the default option if they haven't set it 
        +        
        +        // Search the directory for the members of a group
        +        $info = $this->info($group, array("member","cn"));
        +        $groups = $info[0]["member"];
        +        if (!is_array($groups)) {
        +            return false;   
        +        }
        + 
        +        $groupArray = array();
        +
        +        for ($i=0; $i<$groups["count"]; $i++){ 
        +             $filter = "(&(objectCategory=group)(distinguishedName=" . $this->adldap->utilities()->ldapSlashes($groups[$i]) . "))";
        +             $fields = array("samaccountname", "distinguishedname", "objectClass");
        +             $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        +             $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        +
        +             // not a person, look for a group  
        +             if ($entries['count'] == 0 && $recursive == true) {  
        +                $filter = "(&(objectCategory=group)(distinguishedName=" . $this->adldap->utilities()->ldapSlashes($groups[$i]) . "))";  
        +                $fields = array("distinguishedname");  
        +                $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);  
        +                $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);  
        +                if (!isset($entries[0]['distinguishedname'][0])) {
        +                    continue;  
        +                }
        +                $subGroups = $this->inGroup($entries[0]['distinguishedname'][0], $recursive);  
        +                if (is_array($subGroups)) {
        +                    $groupArray = array_merge($groupArray, $subGroups); 
        +                    $groupArray = array_unique($groupArray);  
        +                }
        +                continue;  
        +             } 
        +
        +             $groupArray[] = $entries[0]['distinguishedname'][0];
        +        }
        +        return $groupArray;
        +    }
        +    
        +    /**
        +    * Return a list of members in a group
        +    * 
        +    * @param string $group The group to query
        +    * @param bool $recursive Recursively get group members
        +    * @return array
        +    */
        +    public function members($group, $recursive = NULL)
        +    {
        +        if (!$this->adldap->getLdapBind()){ return false; }
        +        if ($recursive === NULL){ $recursive = $this->adldap->getRecursiveGroups(); } // Use the default option if they haven't set it 
        +        // Search the directory for the members of a group
        +        $info = $this->info($group, array("member","cn"));
        +        $users = $info[0]["member"];
        +        if (!is_array($users)) {
        +            return false;   
        +        }
        + 
        +        $userArray = array();
        +
        +        for ($i=0; $i<$users["count"]; $i++){ 
        +             $filter = "(&(objectCategory=person)(distinguishedName=" . $this->adldap->utilities()->ldapSlashes($users[$i]) . "))";
        +             $fields = array("samaccountname", "distinguishedname", "objectClass");
        +             $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        +             $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        +
        +             // not a person, look for a group  
        +             if ($entries['count'] == 0 && $recursive == true) {  
        +                $filter = "(&(objectCategory=group)(distinguishedName=" . $this->adldap->utilities()->ldapSlashes($users[$i]) . "))";  
        +                $fields = array("samaccountname");  
        +                $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);  
        +                $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);  
        +                if (!isset($entries[0]['samaccountname'][0])) {
        +                    continue;  
        +                }
        +                $subUsers = $this->members($entries[0]['samaccountname'][0], $recursive);  
        +                if (is_array($subUsers)) {
        +                    $userArray = array_merge($userArray, $subUsers); 
        +                    $userArray = array_unique($userArray);  
        +                }
        +                continue;  
        +             } 
        +             else if ($entries['count'] == 0) {   
        +                continue; 
        +             } 
        +
        +             if ((!isset($entries[0]['samaccountname'][0]) || $entries[0]['samaccountname'][0] === NULL) && $entries[0]['distinguishedname'][0] !== NULL) {
        +                 $userArray[] = $entries[0]['distinguishedname'][0];
        +             }
        +             else if ($entries[0]['samaccountname'][0] !== NULL) {
        +                $userArray[] = $entries[0]['samaccountname'][0];
        +             }
        +        }
        +        return $userArray;
        +    }
        +    
        +    /**
        +    * Group Information.  Returns an array of raw information about a group.
        +    * The group name is case sensitive
        +    * 
        +    * @param string $groupName The group name to retrieve info about
        +    * @param array $fields Fields to retrieve
        +    * @return array
        +    */
        +    public function info($groupName, $fields = NULL)
        +    {
        +        if ($groupName === NULL) { return false; }
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +        
        +        if (stristr($groupName, '+')) {
        +            $groupName = stripslashes($groupName);   
        +        }
        +        
        +        $filter = "(&(objectCategory=group)(name=" . $this->adldap->utilities()->ldapSlashes($groupName) . "))";
        +        if ($fields === NULL) { 
        +            $fields = array("member","memberof","cn","description","distinguishedname","objectcategory","samaccountname"); 
        +        }
        +        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        +        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        +
        +        return $entries;
        +    }
        +    
        +    /**
        +    * Group Information.  Returns an collection
        +    * The group name is case sensitive
        +    * 
        +    * @param string $groupName The group name to retrieve info about
        +    * @param array $fields Fields to retrieve
        +    * @return adLDAPGroupCollection
        +    */
        +    public function infoCollection($groupName, $fields = NULL)
        +    {
        +        if ($groupName === NULL) { return false; }
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +        
        +        $info = $this->info($groupName, $fields);
        +        if ($info !== false) {
        +            $collection = new adLDAPGroupCollection($info, $this->adldap);
        +            return $collection;
        +        }
        +        return false;
        +    }
        +    
        +    /**
        +    * Return a complete list of "groups in groups"
        +    * 
        +    * @param string $group The group to get the list from
        +    * @return array
        +    */
        +    public function recursiveGroups($group)
        +    {
        +        if ($group === NULL) { return false; }
        +
        +        $stack = array(); 
        +        $processed = array(); 
        +        $retGroups = array(); 
        +     
        +        array_push($stack, $group); // Initial Group to Start with 
        +        while (count($stack) > 0) {
        +            $parent = array_pop($stack);
        +            array_push($processed, $parent);
        +            
        +            $info = $this->info($parent, array("memberof"));
        +            
        +            if (isset($info[0]["memberof"]) && is_array($info[0]["memberof"])) {
        +                $groups = $info[0]["memberof"]; 
        +                if ($groups) {
        +                    $groupNames = $this->adldap->utilities()->niceNames($groups);  
        +                    $retGroups = array_merge($retGroups, $groupNames); //final groups to return
        +                    foreach ($groupNames as $id => $groupName) { 
        +                        if (!in_array($groupName, $processed)) {
        +                            array_push($stack, $groupName);
        +                        }
        +                    }
        +                }
        +            }
        +        }
        +        
        +        return $retGroups;
        +    }
        +    
        +    /**
        +    * Returns a complete list of the groups in AD based on a SAM Account Type  
        +    * 
        +    * @param string $sAMAaccountType The account type to return
        +    * @param bool $includeDescription Whether to return a description
        +    * @param string $search Search parameters
        +    * @param bool $sorted Whether to sort the results
        +    * @return array
        +    */
        +    public function search($sAMAaccountType = adLDAP::ADLDAP_SECURITY_GLOBAL_GROUP, $includeDescription = false, $search = "*", $sorted = true) {
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +        
        +        $filter = '(&(objectCategory=group)';
        +        if ($sAMAaccountType !== null) {
        +            $filter .= '(samaccounttype='. $sAMAaccountType .')';
        +        }
        +        $filter .= '(cn=' . $search . '))';
        +        // Perform the search and grab all their details
        +        $fields = array("samaccountname", "description");
        +        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        +        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        +
        +        $groupsArray = array();        
        +        for ($i=0; $i<$entries["count"]; $i++){
        +            if ($includeDescription && strlen($entries[$i]["description"][0]) > 0 ) {
        +                $groupsArray[$entries[$i]["samaccountname"][0]] = $entries[$i]["description"][0];
        +            }
        +            else if ($includeDescription){
        +                $groupsArray[$entries[$i]["samaccountname"][0]] = $entries[$i]["samaccountname"][0];
        +            }
        +            else {
        +                array_push($groupsArray, $entries[$i]["samaccountname"][0]);
        +            }
        +        }
        +        if ($sorted) { 
        +            asort($groupsArray); 
        +        }
        +        return $groupsArray;
        +    }
        +    
        +    /**
        +    * Returns a complete list of all groups in AD
        +    * 
        +    * @param bool $includeDescription Whether to return a description
        +    * @param string $search Search parameters
        +    * @param bool $sorted Whether to sort the results
        +    * @return array
        +    */
        +    public function all($includeDescription = false, $search = "*", $sorted = true){
        +        $groupsArray = $this->search(null, $includeDescription, $search, $sorted);
        +        return $groupsArray;
        +    }
        +    
        +    /**
        +    * Returns a complete list of security groups in AD
        +    * 
        +    * @param bool $includeDescription Whether to return a description
        +    * @param string $search Search parameters
        +    * @param bool $sorted Whether to sort the results
        +    * @return array
        +    */
        +    public function allSecurity($includeDescription = false, $search = "*", $sorted = true){
        +        $groupsArray = $this->search(adLDAP::ADLDAP_SECURITY_GLOBAL_GROUP, $includeDescription, $search, $sorted);
        +        return $groupsArray;
        +    }
        +    
        +    /**
        +    * Returns a complete list of distribution lists in AD
        +    * 
        +    * @param bool $includeDescription Whether to return a description
        +    * @param string $search Search parameters
        +    * @param bool $sorted Whether to sort the results
        +    * @return array
        +    */
        +    public function allDistribution($includeDescription = false, $search = "*", $sorted = true){
        +        $groupsArray = $this->search(adLDAP::ADLDAP_DISTRIBUTION_GROUP, $includeDescription, $search, $sorted);
        +        return $groupsArray;
        +    }
        +    
        +    /**
        +    * Coping with AD not returning the primary group
        +    * http://support.microsoft.com/?kbid=321360 
        +    * 
        +    * This is a re-write based on code submitted by Bruce which prevents the 
        +    * need to search each security group to find the true primary group
        +    * 
        +    * @param string $gid Group ID
        +    * @param string $usersid User's Object SID
        +    * @return mixed
        +    */
        +    public function getPrimaryGroup($gid, $usersid)
        +    {
        +        if ($gid === NULL || $usersid === NULL) { return false; }
        +        $sr = false;
        +
        +        $gsid = substr_replace($usersid, pack('V',$gid), strlen($usersid)-4,4);
        +        $filter = '(objectsid=' . $this->adldap->utilities()->getTextSID($gsid).')';
        +        $fields = array("samaccountname","distinguishedname");
        +        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        +        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        +
        +        if (isset($entries[0]['distinguishedname'][0])) {
        +            return $entries[0]['distinguishedname'][0];
        +        }
        +        return false;
        +     }
        +     
        +     /**
        +    * Coping with AD not returning the primary group
        +    * http://support.microsoft.com/?kbid=321360 
        +    * 
        +    * For some reason it's not possible to search on primarygrouptoken=XXX
        +    * If someone can show otherwise, I'd like to know about it :)
        +    * this way is resource intensive and generally a pain in the @#%^
        +    * 
        +    * @deprecated deprecated since version 3.1, see get get_primary_group
        +    * @param string $gid Group ID
        +    * @return string
        +    */
        +    public function cn($gid){    
        +        if ($gid === NULL) { return false; }
        +        $sr = false;
        +        $r = '';
        +        
        +        $filter = "(&(objectCategory=group)(samaccounttype=" . adLDAP::ADLDAP_SECURITY_GLOBAL_GROUP . "))";
        +        $fields = array("primarygrouptoken", "samaccountname", "distinguishedname");
        +        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        +        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        +        
        +        for ($i=0; $i<$entries["count"]; $i++){
        +            if ($entries[$i]["primarygrouptoken"][0] == $gid) {
        +                $r = $entries[$i]["distinguishedname"][0];
        +                $i = $entries["count"];
        +            }
        +        }
        +
        +        return $r;
        +    }
        +}
        +?>
        diff --git a/lib/plugins/authad/adLDAP/classes/adLDAPUsers.php b/lib/plugins/authad/adLDAP/classes/adLDAPUsers.php
        index 96a93b512..839fd592d 100644
        --- a/lib/plugins/authad/adLDAP/classes/adLDAPUsers.php
        +++ b/lib/plugins/authad/adLDAP/classes/adLDAPUsers.php
        @@ -1,682 +1,682 @@
        -adldap = $adldap;
        -    }
        -    
        -    /**
        -    * Validate a user's login credentials
        -    * 
        -    * @param string $username A user's AD username
        -    * @param string $password A user's AD password
        -    * @param bool optional $prevent_rebind
        -    * @return bool
        -    */
        -    public function authenticate($username, $password, $preventRebind = false) {
        -        return $this->adldap->authenticate($username, $password, $preventRebind);
        -    }
        -    
        -    /**
        -    * Create a user
        -    * 
        -    * If you specify a password here, this can only be performed over SSL
        -    * 
        -    * @param array $attributes The attributes to set to the user account
        -    * @return bool
        -    */
        -    public function create($attributes)
        -    {
        -        // Check for compulsory fields
        -        if (!array_key_exists("username", $attributes)){ return "Missing compulsory field [username]"; }
        -        if (!array_key_exists("firstname", $attributes)){ return "Missing compulsory field [firstname]"; }
        -        if (!array_key_exists("surname", $attributes)){ return "Missing compulsory field [surname]"; }
        -        if (!array_key_exists("email", $attributes)){ return "Missing compulsory field [email]"; }
        -        if (!array_key_exists("container", $attributes)){ return "Missing compulsory field [container]"; }
        -        if (!is_array($attributes["container"])){ return "Container attribute must be an array."; }
        -
        -        if (array_key_exists("password",$attributes) && (!$this->adldap->getUseSSL() && !$this->adldap->getUseTLS())){ 
        -            throw new adLDAPException('SSL must be configured on your webserver and enabled in the class to set passwords.');
        -        }
        -
        -        if (!array_key_exists("display_name", $attributes)) { 
        -            $attributes["display_name"] = $attributes["firstname"] . " " . $attributes["surname"]; 
        -        }
        -
        -        // Translate the schema
        -        $add = $this->adldap->adldap_schema($attributes);
        -        
        -        // Additional stuff only used for adding accounts
        -        $add["cn"][0] = $attributes["display_name"];
        -        $add["samaccountname"][0] = $attributes["username"];
        -        $add["objectclass"][0] = "top";
        -        $add["objectclass"][1] = "person";
        -        $add["objectclass"][2] = "organizationalPerson";
        -        $add["objectclass"][3] = "user"; //person?
        -        //$add["name"][0]=$attributes["firstname"]." ".$attributes["surname"];
        -
        -        // Set the account control attribute
        -        $control_options = array("NORMAL_ACCOUNT");
        -        if (!$attributes["enabled"]) { 
        -            $control_options[] = "ACCOUNTDISABLE"; 
        -        }
        -        $add["userAccountControl"][0] = $this->accountControl($control_options);
        -        
        -        // Determine the container
        -        $attributes["container"] = array_reverse($attributes["container"]);
        -        $container = "OU=" . implode(", OU=",$attributes["container"]);
        -
        -        // Add the entry
        -        $result = @ldap_add($this->adldap->getLdapConnection(), "CN=" . $add["cn"][0] . ", " . $container . "," . $this->adldap->getBaseDn(), $add);
        -        if ($result != true) { 
        -            return false; 
        -        }
        -        
        -        return true;
        -    }
        -    
        -    /**
        -    * Account control options
        -    *
        -    * @param array $options The options to convert to int 
        -    * @return int
        -    */
        -    protected function accountControl($options)
        -    {
        -        $val=0;
        -
        -        if (is_array($options)) {
        -            if (in_array("SCRIPT",$options)){ $val=$val+1; }
        -            if (in_array("ACCOUNTDISABLE",$options)){ $val=$val+2; }
        -            if (in_array("HOMEDIR_REQUIRED",$options)){ $val=$val+8; }
        -            if (in_array("LOCKOUT",$options)){ $val=$val+16; }
        -            if (in_array("PASSWD_NOTREQD",$options)){ $val=$val+32; }
        -            //PASSWD_CANT_CHANGE Note You cannot assign this permission by directly modifying the UserAccountControl attribute.
        -            //For information about how to set the permission programmatically, see the "Property flag descriptions" section.
        -            if (in_array("ENCRYPTED_TEXT_PWD_ALLOWED",$options)){ $val=$val+128; }
        -            if (in_array("TEMP_DUPLICATE_ACCOUNT",$options)){ $val=$val+256; }
        -            if (in_array("NORMAL_ACCOUNT",$options)){ $val=$val+512; }
        -            if (in_array("INTERDOMAIN_TRUST_ACCOUNT",$options)){ $val=$val+2048; }
        -            if (in_array("WORKSTATION_TRUST_ACCOUNT",$options)){ $val=$val+4096; }
        -            if (in_array("SERVER_TRUST_ACCOUNT",$options)){ $val=$val+8192; }
        -            if (in_array("DONT_EXPIRE_PASSWORD",$options)){ $val=$val+65536; }
        -            if (in_array("MNS_LOGON_ACCOUNT",$options)){ $val=$val+131072; }
        -            if (in_array("SMARTCARD_REQUIRED",$options)){ $val=$val+262144; }
        -            if (in_array("TRUSTED_FOR_DELEGATION",$options)){ $val=$val+524288; }
        -            if (in_array("NOT_DELEGATED",$options)){ $val=$val+1048576; }
        -            if (in_array("USE_DES_KEY_ONLY",$options)){ $val=$val+2097152; }
        -            if (in_array("DONT_REQ_PREAUTH",$options)){ $val=$val+4194304; } 
        -            if (in_array("PASSWORD_EXPIRED",$options)){ $val=$val+8388608; }
        -            if (in_array("TRUSTED_TO_AUTH_FOR_DELEGATION",$options)){ $val=$val+16777216; }
        -        }
        -        return $val;
        -    }
        -    
        -    /**
        -    * Delete a user account
        -    * 
        -    * @param string $username The username to delete (please be careful here!)
        -    * @param bool $isGUID Is the username a GUID or a samAccountName
        -    * @return array
        -    */
        -    public function delete($username, $isGUID = false) 
        -    {      
        -        $userinfo = $this->info($username, array("*"), $isGUID);
        -        $dn = $userinfo[0]['distinguishedname'][0];
        -        $result = $this->adldap->folder()->delete($dn);
        -        if ($result != true) { 
        -            return false;
        -        }        
        -        return true;
        -    }
        -    
        -    /**
        -    * Groups the user is a member of
        -    * 
        -    * @param string $username The username to query
        -    * @param bool $recursive Recursive list of groups
        -    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        -    * @return array
        -    */
        -    public function groups($username, $recursive = NULL, $isGUID = false)
        -    {
        -        if ($username === NULL) { return false; }
        -        if ($recursive === NULL) { $recursive = $this->adldap->getRecursiveGroups(); } // Use the default option if they haven't set it
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -        
        -        // Search the directory for their information
        -        $info = @$this->info($username, array("memberof", "primarygroupid"), $isGUID);
        -        $groups = $this->adldap->utilities()->niceNames($info[0]["memberof"]); // Presuming the entry returned is our guy (unique usernames)
        -
        -        if ($recursive === true){
        -            foreach ($groups as $id => $groupName){
        -                $extraGroups = $this->adldap->group()->recursiveGroups($groupName);
        -                $groups = array_merge($groups, $extraGroups);
        -            }
        -        }
        -        
        -        return $groups;
        -    }
        -    
        -    /**
        -    * Find information about the users. Returned in a raw array format from AD
        -    * 
        -    * @param string $username The username to query
        -    * @param array $fields Array of parameters to query
        -    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        -    * @return array
        -    */
        -    public function info($username, $fields = NULL, $isGUID = false)
        -    {
        -        if ($username === NULL) { return false; }
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -
        -        if ($isGUID === true) {
        -            $username = $this->adldap->utilities()->strGuidToHex($username);
        -            $filter = "objectguid=" . $username;
        -        }
        -        else if (strstr($username, "@")) {
        -             $filter = "userPrincipalName=" . $username;
        -        }
        -        else {
        -             $filter = "samaccountname=" . $username;
        -        }
        -        $filter = "(&(objectCategory=person)({$filter}))";
        -        if ($fields === NULL) { 
        -            $fields = array("samaccountname","mail","memberof","department","displayname","telephonenumber","primarygroupid","objectsid"); 
        -        }
        -        if (!in_array("objectsid", $fields)) {
        -            $fields[] = "objectsid";
        -        }
        -        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        -        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        -        
        -        if (isset($entries[0])) {
        -            if ($entries[0]['count'] >= 1) {
        -                if (in_array("memberof", $fields)) {
        -                    // AD does not return the primary group in the ldap query, we may need to fudge it
        -                    if ($this->adldap->getRealPrimaryGroup() && isset($entries[0]["primarygroupid"][0]) && isset($entries[0]["objectsid"][0])){
        -                        //$entries[0]["memberof"][]=$this->group_cn($entries[0]["primarygroupid"][0]);
        -                        $entries[0]["memberof"][] = $this->adldap->group()->getPrimaryGroup($entries[0]["primarygroupid"][0], $entries[0]["objectsid"][0]);
        -                    } else {
        -                        $entries[0]["memberof"][] = "CN=Domain Users,CN=Users," . $this->adldap->getBaseDn();
        -                    }
        -                    if (!isset($entries[0]["memberof"]["count"])) {
        -                        $entries[0]["memberof"]["count"] = 0;
        -                    }
        -                    $entries[0]["memberof"]["count"]++;
        -                }
        -            }
        -            
        -            return $entries;
        -        }
        -        return false;
        -    }
        -    
        -    /**
        -    * Find information about the users. Returned in a raw array format from AD
        -    * 
        -    * @param string $username The username to query
        -    * @param array $fields Array of parameters to query
        -    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        -    * @return mixed
        -    */
        -    public function infoCollection($username, $fields = NULL, $isGUID = false)
        -    {
        -        if ($username === NULL) { return false; }
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -        
        -        $info = $this->info($username, $fields, $isGUID);
        -        
        -        if ($info !== false) {
        -            $collection = new adLDAPUserCollection($info, $this->adldap);
        -            return $collection;
        -        }
        -        return false;
        -    }
        -    
        -    /**
        -    * Determine if a user is in a specific group
        -    * 
        -    * @param string $username The username to query
        -    * @param string $group The name of the group to check against
        -    * @param bool $recursive Check groups recursively
        -    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        -    * @return bool
        -    */
        -    public function inGroup($username, $group, $recursive = NULL, $isGUID = false)
        -    {
        -        if ($username === NULL) { return false; }
        -        if ($group === NULL) { return false; }
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -        if ($recursive === NULL) { $recursive = $this->adldap->getRecursiveGroups(); } // Use the default option if they haven't set it
        -        
        -        // Get a list of the groups
        -        $groups = $this->groups($username, $recursive, $isGUID);
        -        
        -        // Return true if the specified group is in the group list
        -        if (in_array($group, $groups)) { 
        -            return true; 
        -        }
        -
        -        return false;
        -    }
        -    
        -    /**
        -    * Determine a user's password expiry date
        -    * 
        -    * @param string $username The username to query
        -    * @param book $isGUID Is the username passed a GUID or a samAccountName
        -    * @requires bcmath http://www.php.net/manual/en/book.bc.php
        -    * @return array
        -    */
        -    public function passwordExpiry($username, $isGUID = false) 
        -    {
        -        if ($username === NULL) { return "Missing compulsory field [username]"; }
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -        if (!function_exists('bcmod')) { throw new adLDAPException("Missing function support [bcmod] http://www.php.net/manual/en/book.bc.php"); };
        -        
        -        $userInfo = $this->info($username, array("pwdlastset", "useraccountcontrol"), $isGUID);
        -        $pwdLastSet = $userInfo[0]['pwdlastset'][0];
        -        $status = array();
        -        
        -        if ($userInfo[0]['useraccountcontrol'][0] == '66048') {
        -            // Password does not expire
        -            return "Does not expire";
        -        }
        -        if ($pwdLastSet === '0') {
        -            // Password has already expired
        -            return "Password has expired";
        -        }
        -        
        -         // Password expiry in AD can be calculated from TWO values:
        -         //   - User's own pwdLastSet attribute: stores the last time the password was changed
        -         //   - Domain's maxPwdAge attribute: how long passwords last in the domain
        -         //
        -         // Although Microsoft chose to use a different base and unit for time measurements.
        -         // This function will convert them to Unix timestamps
        -         $sr = ldap_read($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), 'objectclass=*', array('maxPwdAge'));
        -         if (!$sr) {
        -             return false;
        -         }
        -         $info = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        -         $maxPwdAge = $info[0]['maxpwdage'][0];
        -         
        -
        -         // See MSDN: http://msdn.microsoft.com/en-us/library/ms974598.aspx
        -         //
        -         // pwdLastSet contains the number of 100 nanosecond intervals since January 1, 1601 (UTC), 
        -         // stored in a 64 bit integer. 
        -         //
        -         // The number of seconds between this date and Unix epoch is 11644473600.
        -         //
        -         // maxPwdAge is stored as a large integer that represents the number of 100 nanosecond
        -         // intervals from the time the password was set before the password expires.
        -         //
        -         // We also need to scale this to seconds but also this value is a _negative_ quantity!
        -         //
        -         // If the low 32 bits of maxPwdAge are equal to 0 passwords do not expire
        -         //
        -         // Unfortunately the maths involved are too big for PHP integers, so I've had to require
        -         // BCMath functions to work with arbitrary precision numbers.
        -         if (bcmod($maxPwdAge, 4294967296) === '0') {
        -            return "Domain does not expire passwords";
        -        }
        -        
        -        // Add maxpwdage and pwdlastset and we get password expiration time in Microsoft's
        -        // time units.  Because maxpwd age is negative we need to subtract it.
        -        $pwdExpire = bcsub($pwdLastSet, $maxPwdAge);
        -    
        -        // Convert MS's time to Unix time
        -        $status['expiryts'] = bcsub(bcdiv($pwdExpire, '10000000'), '11644473600');
        -        $status['expiryformat'] = date('Y-m-d H:i:s', bcsub(bcdiv($pwdExpire, '10000000'), '11644473600'));
        -        
        -        return $status;
        -    }
        -    
        -    /**
        -    * Modify a user
        -    * 
        -    * @param string $username The username to query
        -    * @param array $attributes The attributes to modify.  Note if you set the enabled attribute you must not specify any other attributes
        -    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        -    * @return bool
        -    */
        -    public function modify($username, $attributes, $isGUID = false)
        -    {
        -        if ($username === NULL) { return "Missing compulsory field [username]"; }
        -        if (array_key_exists("password", $attributes) && !$this->adldap->getUseSSL() && !$this->adldap->getUseTLS()) { 
        -            throw new adLDAPException('SSL/TLS must be configured on your webserver and enabled in the class to set passwords.');
        -        }
        -
        -        // Find the dn of the user
        -        $userDn = $this->dn($username, $isGUID);
        -        if ($userDn === false) { 
        -            return false; 
        -        }
        -        
        -        // Translate the update to the LDAP schema                
        -        $mod = $this->adldap->adldap_schema($attributes);
        -        
        -        // Check to see if this is an enabled status update
        -        if (!$mod && !array_key_exists("enabled", $attributes)){ 
        -            return false; 
        -        }
        -        
        -        // Set the account control attribute (only if specified)
        -        if (array_key_exists("enabled", $attributes)){
        -            if ($attributes["enabled"]){ 
        -                $controlOptions = array("NORMAL_ACCOUNT"); 
        -            }
        -            else { 
        -                $controlOptions = array("NORMAL_ACCOUNT", "ACCOUNTDISABLE"); 
        -            }
        -            $mod["userAccountControl"][0] = $this->accountControl($controlOptions);
        -        }
        -
        -        // Do the update
        -        $result = @ldap_modify($this->adldap->getLdapConnection(), $userDn, $mod);
        -        if ($result == false) { 
        -            return false; 
        -        }
        -        
        -        return true;
        -    }
        -    
        -    /**
        -    * Disable a user account
        -    * 
        -    * @param string $username The username to disable
        -    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        -    * @return bool
        -    */
        -    public function disable($username, $isGUID = false)
        -    {
        -        if ($username === NULL) { return "Missing compulsory field [username]"; }
        -        $attributes = array("enabled" => 0);
        -        $result = $this->modify($username, $attributes, $isGUID);
        -        if ($result == false) { return false; }
        -        
        -        return true;
        -    }
        -    
        -    /**
        -    * Enable a user account
        -    * 
        -    * @param string $username The username to enable
        -    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        -    * @return bool
        -    */
        -    public function enable($username, $isGUID = false)
        -    {
        -        if ($username === NULL) { return "Missing compulsory field [username]"; }
        -        $attributes = array("enabled" => 1);
        -        $result = $this->modify($username, $attributes, $isGUID);
        -        if ($result == false) { return false; }
        -        
        -        return true;
        -    }
        -    
        -    /**
        -    * Set the password of a user - This must be performed over SSL
        -    * 
        -    * @param string $username The username to modify
        -    * @param string $password The new password
        -    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        -    * @return bool
        -    */
        -    public function password($username, $password, $isGUID = false)
        -    {
        -        if ($username === NULL) { return false; }
        -        if ($password === NULL) { return false; }
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -        if (!$this->adldap->getUseSSL() && !$this->adldap->getUseTLS()) { 
        -            throw new adLDAPException('SSL must be configured on your webserver and enabled in the class to set passwords.');
        -        }
        -        
        -        $userDn = $this->dn($username, $isGUID);
        -        if ($userDn === false) { 
        -            return false; 
        -        }
        -                
        -        $add=array();
        -        $add["unicodePwd"][0] = $this->encodePassword($password);
        -        
        -        $result = @ldap_mod_replace($this->adldap->getLdapConnection(), $userDn, $add);
        -        if ($result === false){
        -            $err = ldap_errno($this->adldap->getLdapConnection());
        -            if ($err) {
        -                $msg = 'Error ' . $err . ': ' . ldap_err2str($err) . '.';
        -                if($err == 53) {
        -                    $msg .= ' Your password might not match the password policy.';
        -                }
        -                throw new adLDAPException($msg);
        -            }
        -            else {
        -                return false;
        -            }
        -        }
        -        
        -        return true;
        -    }
        -    
        -    /**
        -    * Encode a password for transmission over LDAP
        -    *
        -    * @param string $password The password to encode
        -    * @return string
        -    */
        -    public function encodePassword($password)
        -    {
        -        $password="\"".$password."\"";
        -        $encoded="";
        -        for ($i=0; $i info($username, array("cn"), $isGUID);
        -        if ($user[0]["dn"] === NULL) { 
        -            return false; 
        -        }
        -        $userDn = $user[0]["dn"];
        -        return $userDn;
        -    }
        -    
        -    /**
        -    * Return a list of all users in AD
        -    * 
        -    * @param bool $includeDescription Return a description of the user
        -    * @param string $search Search parameter
        -    * @param bool $sorted Sort the user accounts
        -    * @return array
        -    */
        -    public function all($includeDescription = false, $search = "*", $sorted = true)
        -    {
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -        
        -        // Perform the search and grab all their details
        -        $filter = "(&(objectClass=user)(samaccounttype=" . adLDAP::ADLDAP_NORMAL_ACCOUNT .")(objectCategory=person)(cn=" . $search . "))";
        -        $fields = array("samaccountname","displayname");
        -        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        -        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        -
        -        $usersArray = array();
        -        for ($i=0; $i<$entries["count"]; $i++){
        -            if ($includeDescription && strlen($entries[$i]["displayname"][0])>0){
        -                $usersArray[$entries[$i]["samaccountname"][0]] = $entries[$i]["displayname"][0];
        -            } elseif ($includeDescription){
        -                $usersArray[$entries[$i]["samaccountname"][0]] = $entries[$i]["samaccountname"][0];
        -            } else {
        -                array_push($usersArray, $entries[$i]["samaccountname"][0]);
        -            }
        -        }
        -        if ($sorted) { 
        -            asort($usersArray); 
        -        }
        -        return $usersArray;
        -    }
        -    
        -    /**
        -    * Converts a username (samAccountName) to a GUID
        -    * 
        -    * @param string $username The username to query
        -    * @return string
        -    */
        -    public function usernameToGuid($username) 
        -    {
        -        if (!$this->adldap->getLdapBind()){ return false; }
        -        if ($username === null){ return "Missing compulsory field [username]"; }
        -        
        -        $filter = "samaccountname=" . $username; 
        -        $fields = array("objectGUID"); 
        -        $sr = @ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields); 
        -        if (ldap_count_entries($this->adldap->getLdapConnection(), $sr) > 0) { 
        -            $entry = @ldap_first_entry($this->adldap->getLdapConnection(), $sr); 
        -            $guid = @ldap_get_values_len($this->adldap->getLdapConnection(), $entry, 'objectGUID'); 
        -            $strGUID = $this->adldap->utilities()->binaryToText($guid[0]);          
        -            return $strGUID; 
        -        }
        -        return false; 
        -    }
        -    
        -    /**
        -    * Return a list of all users in AD that have a specific value in a field
        -    *
        -    * @param bool $includeDescription Return a description of the user
        -    * @param string $searchField Field to search search for
        -    * @param string $searchFilter Value to search for in the specified field
        -    * @param bool $sorted Sort the user accounts
        -    * @return array
        -    */
        -    public function find($includeDescription = false, $searchField = false, $searchFilter = false, $sorted = true){
        -        if (!$this->adldap->getLdapBind()){ return false; }
        -          
        -        // Perform the search and grab all their details
        -        $searchParams = "";
        -        if ($searchField) {
        -            $searchParams = "(" . $searchField . "=" . $searchFilter . ")";
        -        }                           
        -        $filter = "(&(objectClass=user)(samaccounttype=" . adLDAP::ADLDAP_NORMAL_ACCOUNT .")(objectCategory=person)" . $searchParams . ")";
        -        $fields = array("samaccountname","displayname");
        -        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        -        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        -
        -        $usersArray = array();
        -        for ($i=0; $i < $entries["count"]; $i++) {
        -            if ($includeDescription && strlen($entries[$i]["displayname"][0]) > 0) {
        -                $usersArray[$entries[$i]["samaccountname"][0]] = $entries[$i]["displayname"][0];
        -            }
        -            else if ($includeDescription) {
        -                $usersArray[$entries[$i]["samaccountname"][0]] = $entries[$i]["samaccountname"][0];
        -            }
        -            else {
        -                array_push($usersArray, $entries[$i]["samaccountname"][0]);
        -            }
        -        }
        -        if ($sorted){ 
        -          asort($usersArray); 
        -        }
        -        return ($usersArray);
        -    }
        -    
        -    /**
        -    * Move a user account to a different OU
        -    *
        -    * @param string $username The username to move (please be careful here!)
        -    * @param array $container The container or containers to move the user to (please be careful here!).
        -    * accepts containers in 1. parent 2. child order
        -    * @return array
        -    */
        -    public function move($username, $container) 
        -    {
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -        if ($username === null) { return "Missing compulsory field [username]"; }
        -        if ($container === null) { return "Missing compulsory field [container]"; }
        -        if (!is_array($container)) { return "Container must be an array"; }
        -        
        -        $userInfo = $this->info($username, array("*"));
        -        $dn = $userInfo[0]['distinguishedname'][0];
        -        $newRDn = "cn=" . $username;
        -        $container = array_reverse($container);
        -        $newContainer = "ou=" . implode(",ou=",$container);
        -        $newBaseDn = strtolower($newContainer) . "," . $this->adldap->getBaseDn();
        -        $result = @ldap_rename($this->adldap->getLdapConnection(), $dn, $newRDn, $newBaseDn, true);
        -        if ($result !== true) {
        -            return false;
        -        }
        -        return true;
        -    }
        -    
        -    /**
        -    * Get the last logon time of any user as a Unix timestamp
        -    * 
        -    * @param string $username
        -    * @return long $unixTimestamp
        -    */
        -    public function getLastLogon($username) {
        -        if (!$this->adldap->getLdapBind()) { return false; }
        -        if ($username === null) { return "Missing compulsory field [username]"; }
        -        $userInfo = $this->info($username, array("lastLogonTimestamp"));
        -        $lastLogon = adLDAPUtils::convertWindowsTimeToUnixTime($userInfo[0]['lastLogonTimestamp'][0]);
        -        return $lastLogon;
        -    }
        -    
        -}
        -?>
        +adldap = $adldap;
        +    }
        +    
        +    /**
        +    * Validate a user's login credentials
        +    * 
        +    * @param string $username A user's AD username
        +    * @param string $password A user's AD password
        +    * @param bool optional $prevent_rebind
        +    * @return bool
        +    */
        +    public function authenticate($username, $password, $preventRebind = false) {
        +        return $this->adldap->authenticate($username, $password, $preventRebind);
        +    }
        +    
        +    /**
        +    * Create a user
        +    * 
        +    * If you specify a password here, this can only be performed over SSL
        +    * 
        +    * @param array $attributes The attributes to set to the user account
        +    * @return bool
        +    */
        +    public function create($attributes)
        +    {
        +        // Check for compulsory fields
        +        if (!array_key_exists("username", $attributes)){ return "Missing compulsory field [username]"; }
        +        if (!array_key_exists("firstname", $attributes)){ return "Missing compulsory field [firstname]"; }
        +        if (!array_key_exists("surname", $attributes)){ return "Missing compulsory field [surname]"; }
        +        if (!array_key_exists("email", $attributes)){ return "Missing compulsory field [email]"; }
        +        if (!array_key_exists("container", $attributes)){ return "Missing compulsory field [container]"; }
        +        if (!is_array($attributes["container"])){ return "Container attribute must be an array."; }
        +
        +        if (array_key_exists("password",$attributes) && (!$this->adldap->getUseSSL() && !$this->adldap->getUseTLS())){ 
        +            throw new adLDAPException('SSL must be configured on your webserver and enabled in the class to set passwords.');
        +        }
        +
        +        if (!array_key_exists("display_name", $attributes)) { 
        +            $attributes["display_name"] = $attributes["firstname"] . " " . $attributes["surname"]; 
        +        }
        +
        +        // Translate the schema
        +        $add = $this->adldap->adldap_schema($attributes);
        +        
        +        // Additional stuff only used for adding accounts
        +        $add["cn"][0] = $attributes["display_name"];
        +        $add["samaccountname"][0] = $attributes["username"];
        +        $add["objectclass"][0] = "top";
        +        $add["objectclass"][1] = "person";
        +        $add["objectclass"][2] = "organizationalPerson";
        +        $add["objectclass"][3] = "user"; //person?
        +        //$add["name"][0]=$attributes["firstname"]." ".$attributes["surname"];
        +
        +        // Set the account control attribute
        +        $control_options = array("NORMAL_ACCOUNT");
        +        if (!$attributes["enabled"]) { 
        +            $control_options[] = "ACCOUNTDISABLE"; 
        +        }
        +        $add["userAccountControl"][0] = $this->accountControl($control_options);
        +        
        +        // Determine the container
        +        $attributes["container"] = array_reverse($attributes["container"]);
        +        $container = "OU=" . implode(", OU=",$attributes["container"]);
        +
        +        // Add the entry
        +        $result = @ldap_add($this->adldap->getLdapConnection(), "CN=" . $add["cn"][0] . ", " . $container . "," . $this->adldap->getBaseDn(), $add);
        +        if ($result != true) { 
        +            return false; 
        +        }
        +        
        +        return true;
        +    }
        +    
        +    /**
        +    * Account control options
        +    *
        +    * @param array $options The options to convert to int 
        +    * @return int
        +    */
        +    protected function accountControl($options)
        +    {
        +        $val=0;
        +
        +        if (is_array($options)) {
        +            if (in_array("SCRIPT",$options)){ $val=$val+1; }
        +            if (in_array("ACCOUNTDISABLE",$options)){ $val=$val+2; }
        +            if (in_array("HOMEDIR_REQUIRED",$options)){ $val=$val+8; }
        +            if (in_array("LOCKOUT",$options)){ $val=$val+16; }
        +            if (in_array("PASSWD_NOTREQD",$options)){ $val=$val+32; }
        +            //PASSWD_CANT_CHANGE Note You cannot assign this permission by directly modifying the UserAccountControl attribute.
        +            //For information about how to set the permission programmatically, see the "Property flag descriptions" section.
        +            if (in_array("ENCRYPTED_TEXT_PWD_ALLOWED",$options)){ $val=$val+128; }
        +            if (in_array("TEMP_DUPLICATE_ACCOUNT",$options)){ $val=$val+256; }
        +            if (in_array("NORMAL_ACCOUNT",$options)){ $val=$val+512; }
        +            if (in_array("INTERDOMAIN_TRUST_ACCOUNT",$options)){ $val=$val+2048; }
        +            if (in_array("WORKSTATION_TRUST_ACCOUNT",$options)){ $val=$val+4096; }
        +            if (in_array("SERVER_TRUST_ACCOUNT",$options)){ $val=$val+8192; }
        +            if (in_array("DONT_EXPIRE_PASSWORD",$options)){ $val=$val+65536; }
        +            if (in_array("MNS_LOGON_ACCOUNT",$options)){ $val=$val+131072; }
        +            if (in_array("SMARTCARD_REQUIRED",$options)){ $val=$val+262144; }
        +            if (in_array("TRUSTED_FOR_DELEGATION",$options)){ $val=$val+524288; }
        +            if (in_array("NOT_DELEGATED",$options)){ $val=$val+1048576; }
        +            if (in_array("USE_DES_KEY_ONLY",$options)){ $val=$val+2097152; }
        +            if (in_array("DONT_REQ_PREAUTH",$options)){ $val=$val+4194304; } 
        +            if (in_array("PASSWORD_EXPIRED",$options)){ $val=$val+8388608; }
        +            if (in_array("TRUSTED_TO_AUTH_FOR_DELEGATION",$options)){ $val=$val+16777216; }
        +        }
        +        return $val;
        +    }
        +    
        +    /**
        +    * Delete a user account
        +    * 
        +    * @param string $username The username to delete (please be careful here!)
        +    * @param bool $isGUID Is the username a GUID or a samAccountName
        +    * @return array
        +    */
        +    public function delete($username, $isGUID = false) 
        +    {      
        +        $userinfo = $this->info($username, array("*"), $isGUID);
        +        $dn = $userinfo[0]['distinguishedname'][0];
        +        $result = $this->adldap->folder()->delete($dn);
        +        if ($result != true) { 
        +            return false;
        +        }        
        +        return true;
        +    }
        +    
        +    /**
        +    * Groups the user is a member of
        +    * 
        +    * @param string $username The username to query
        +    * @param bool $recursive Recursive list of groups
        +    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        +    * @return array
        +    */
        +    public function groups($username, $recursive = NULL, $isGUID = false)
        +    {
        +        if ($username === NULL) { return false; }
        +        if ($recursive === NULL) { $recursive = $this->adldap->getRecursiveGroups(); } // Use the default option if they haven't set it
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +        
        +        // Search the directory for their information
        +        $info = @$this->info($username, array("memberof", "primarygroupid"), $isGUID);
        +        $groups = $this->adldap->utilities()->niceNames($info[0]["memberof"]); // Presuming the entry returned is our guy (unique usernames)
        +
        +        if ($recursive === true){
        +            foreach ($groups as $id => $groupName){
        +                $extraGroups = $this->adldap->group()->recursiveGroups($groupName);
        +                $groups = array_merge($groups, $extraGroups);
        +            }
        +        }
        +        
        +        return $groups;
        +    }
        +    
        +    /**
        +    * Find information about the users. Returned in a raw array format from AD
        +    * 
        +    * @param string $username The username to query
        +    * @param array $fields Array of parameters to query
        +    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        +    * @return array
        +    */
        +    public function info($username, $fields = NULL, $isGUID = false)
        +    {
        +        if ($username === NULL) { return false; }
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +
        +        if ($isGUID === true) {
        +            $username = $this->adldap->utilities()->strGuidToHex($username);
        +            $filter = "objectguid=" . $username;
        +        }
        +        else if (strstr($username, "@")) {
        +             $filter = "userPrincipalName=" . $username;
        +        }
        +        else {
        +             $filter = "samaccountname=" . $username;
        +        }
        +        $filter = "(&(objectCategory=person)({$filter}))";
        +        if ($fields === NULL) { 
        +            $fields = array("samaccountname","mail","memberof","department","displayname","telephonenumber","primarygroupid","objectsid"); 
        +        }
        +        if (!in_array("objectsid", $fields)) {
        +            $fields[] = "objectsid";
        +        }
        +        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        +        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        +        
        +        if (isset($entries[0])) {
        +            if ($entries[0]['count'] >= 1) {
        +                if (in_array("memberof", $fields)) {
        +                    // AD does not return the primary group in the ldap query, we may need to fudge it
        +                    if ($this->adldap->getRealPrimaryGroup() && isset($entries[0]["primarygroupid"][0]) && isset($entries[0]["objectsid"][0])){
        +                        //$entries[0]["memberof"][]=$this->group_cn($entries[0]["primarygroupid"][0]);
        +                        $entries[0]["memberof"][] = $this->adldap->group()->getPrimaryGroup($entries[0]["primarygroupid"][0], $entries[0]["objectsid"][0]);
        +                    } else {
        +                        $entries[0]["memberof"][] = "CN=Domain Users,CN=Users," . $this->adldap->getBaseDn();
        +                    }
        +                    if (!isset($entries[0]["memberof"]["count"])) {
        +                        $entries[0]["memberof"]["count"] = 0;
        +                    }
        +                    $entries[0]["memberof"]["count"]++;
        +                }
        +            }
        +            
        +            return $entries;
        +        }
        +        return false;
        +    }
        +    
        +    /**
        +    * Find information about the users. Returned in a raw array format from AD
        +    * 
        +    * @param string $username The username to query
        +    * @param array $fields Array of parameters to query
        +    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        +    * @return mixed
        +    */
        +    public function infoCollection($username, $fields = NULL, $isGUID = false)
        +    {
        +        if ($username === NULL) { return false; }
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +        
        +        $info = $this->info($username, $fields, $isGUID);
        +        
        +        if ($info !== false) {
        +            $collection = new adLDAPUserCollection($info, $this->adldap);
        +            return $collection;
        +        }
        +        return false;
        +    }
        +    
        +    /**
        +    * Determine if a user is in a specific group
        +    * 
        +    * @param string $username The username to query
        +    * @param string $group The name of the group to check against
        +    * @param bool $recursive Check groups recursively
        +    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        +    * @return bool
        +    */
        +    public function inGroup($username, $group, $recursive = NULL, $isGUID = false)
        +    {
        +        if ($username === NULL) { return false; }
        +        if ($group === NULL) { return false; }
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +        if ($recursive === NULL) { $recursive = $this->adldap->getRecursiveGroups(); } // Use the default option if they haven't set it
        +        
        +        // Get a list of the groups
        +        $groups = $this->groups($username, $recursive, $isGUID);
        +        
        +        // Return true if the specified group is in the group list
        +        if (in_array($group, $groups)) { 
        +            return true; 
        +        }
        +
        +        return false;
        +    }
        +    
        +    /**
        +    * Determine a user's password expiry date
        +    * 
        +    * @param string $username The username to query
        +    * @param book $isGUID Is the username passed a GUID or a samAccountName
        +    * @requires bcmath http://www.php.net/manual/en/book.bc.php
        +    * @return array
        +    */
        +    public function passwordExpiry($username, $isGUID = false) 
        +    {
        +        if ($username === NULL) { return "Missing compulsory field [username]"; }
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +        if (!function_exists('bcmod')) { throw new adLDAPException("Missing function support [bcmod] http://www.php.net/manual/en/book.bc.php"); };
        +        
        +        $userInfo = $this->info($username, array("pwdlastset", "useraccountcontrol"), $isGUID);
        +        $pwdLastSet = $userInfo[0]['pwdlastset'][0];
        +        $status = array();
        +        
        +        if ($userInfo[0]['useraccountcontrol'][0] == '66048') {
        +            // Password does not expire
        +            return "Does not expire";
        +        }
        +        if ($pwdLastSet === '0') {
        +            // Password has already expired
        +            return "Password has expired";
        +        }
        +        
        +         // Password expiry in AD can be calculated from TWO values:
        +         //   - User's own pwdLastSet attribute: stores the last time the password was changed
        +         //   - Domain's maxPwdAge attribute: how long passwords last in the domain
        +         //
        +         // Although Microsoft chose to use a different base and unit for time measurements.
        +         // This function will convert them to Unix timestamps
        +         $sr = ldap_read($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), 'objectclass=*', array('maxPwdAge'));
        +         if (!$sr) {
        +             return false;
        +         }
        +         $info = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        +         $maxPwdAge = $info[0]['maxpwdage'][0];
        +         
        +
        +         // See MSDN: http://msdn.microsoft.com/en-us/library/ms974598.aspx
        +         //
        +         // pwdLastSet contains the number of 100 nanosecond intervals since January 1, 1601 (UTC), 
        +         // stored in a 64 bit integer. 
        +         //
        +         // The number of seconds between this date and Unix epoch is 11644473600.
        +         //
        +         // maxPwdAge is stored as a large integer that represents the number of 100 nanosecond
        +         // intervals from the time the password was set before the password expires.
        +         //
        +         // We also need to scale this to seconds but also this value is a _negative_ quantity!
        +         //
        +         // If the low 32 bits of maxPwdAge are equal to 0 passwords do not expire
        +         //
        +         // Unfortunately the maths involved are too big for PHP integers, so I've had to require
        +         // BCMath functions to work with arbitrary precision numbers.
        +         if (bcmod($maxPwdAge, 4294967296) === '0') {
        +            return "Domain does not expire passwords";
        +        }
        +        
        +        // Add maxpwdage and pwdlastset and we get password expiration time in Microsoft's
        +        // time units.  Because maxpwd age is negative we need to subtract it.
        +        $pwdExpire = bcsub($pwdLastSet, $maxPwdAge);
        +    
        +        // Convert MS's time to Unix time
        +        $status['expiryts'] = bcsub(bcdiv($pwdExpire, '10000000'), '11644473600');
        +        $status['expiryformat'] = date('Y-m-d H:i:s', bcsub(bcdiv($pwdExpire, '10000000'), '11644473600'));
        +        
        +        return $status;
        +    }
        +    
        +    /**
        +    * Modify a user
        +    * 
        +    * @param string $username The username to query
        +    * @param array $attributes The attributes to modify.  Note if you set the enabled attribute you must not specify any other attributes
        +    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        +    * @return bool
        +    */
        +    public function modify($username, $attributes, $isGUID = false)
        +    {
        +        if ($username === NULL) { return "Missing compulsory field [username]"; }
        +        if (array_key_exists("password", $attributes) && !$this->adldap->getUseSSL() && !$this->adldap->getUseTLS()) { 
        +            throw new adLDAPException('SSL/TLS must be configured on your webserver and enabled in the class to set passwords.');
        +        }
        +
        +        // Find the dn of the user
        +        $userDn = $this->dn($username, $isGUID);
        +        if ($userDn === false) { 
        +            return false; 
        +        }
        +        
        +        // Translate the update to the LDAP schema                
        +        $mod = $this->adldap->adldap_schema($attributes);
        +        
        +        // Check to see if this is an enabled status update
        +        if (!$mod && !array_key_exists("enabled", $attributes)){ 
        +            return false; 
        +        }
        +        
        +        // Set the account control attribute (only if specified)
        +        if (array_key_exists("enabled", $attributes)){
        +            if ($attributes["enabled"]){ 
        +                $controlOptions = array("NORMAL_ACCOUNT"); 
        +            }
        +            else { 
        +                $controlOptions = array("NORMAL_ACCOUNT", "ACCOUNTDISABLE"); 
        +            }
        +            $mod["userAccountControl"][0] = $this->accountControl($controlOptions);
        +        }
        +
        +        // Do the update
        +        $result = @ldap_modify($this->adldap->getLdapConnection(), $userDn, $mod);
        +        if ($result == false) { 
        +            return false; 
        +        }
        +        
        +        return true;
        +    }
        +    
        +    /**
        +    * Disable a user account
        +    * 
        +    * @param string $username The username to disable
        +    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        +    * @return bool
        +    */
        +    public function disable($username, $isGUID = false)
        +    {
        +        if ($username === NULL) { return "Missing compulsory field [username]"; }
        +        $attributes = array("enabled" => 0);
        +        $result = $this->modify($username, $attributes, $isGUID);
        +        if ($result == false) { return false; }
        +        
        +        return true;
        +    }
        +    
        +    /**
        +    * Enable a user account
        +    * 
        +    * @param string $username The username to enable
        +    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        +    * @return bool
        +    */
        +    public function enable($username, $isGUID = false)
        +    {
        +        if ($username === NULL) { return "Missing compulsory field [username]"; }
        +        $attributes = array("enabled" => 1);
        +        $result = $this->modify($username, $attributes, $isGUID);
        +        if ($result == false) { return false; }
        +        
        +        return true;
        +    }
        +    
        +    /**
        +    * Set the password of a user - This must be performed over SSL
        +    * 
        +    * @param string $username The username to modify
        +    * @param string $password The new password
        +    * @param bool $isGUID Is the username passed a GUID or a samAccountName
        +    * @return bool
        +    */
        +    public function password($username, $password, $isGUID = false)
        +    {
        +        if ($username === NULL) { return false; }
        +        if ($password === NULL) { return false; }
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +        if (!$this->adldap->getUseSSL() && !$this->adldap->getUseTLS()) { 
        +            throw new adLDAPException('SSL must be configured on your webserver and enabled in the class to set passwords.');
        +        }
        +        
        +        $userDn = $this->dn($username, $isGUID);
        +        if ($userDn === false) { 
        +            return false; 
        +        }
        +                
        +        $add=array();
        +        $add["unicodePwd"][0] = $this->encodePassword($password);
        +        
        +        $result = @ldap_mod_replace($this->adldap->getLdapConnection(), $userDn, $add);
        +        if ($result === false){
        +            $err = ldap_errno($this->adldap->getLdapConnection());
        +            if ($err) {
        +                $msg = 'Error ' . $err . ': ' . ldap_err2str($err) . '.';
        +                if($err == 53) {
        +                    $msg .= ' Your password might not match the password policy.';
        +                }
        +                throw new adLDAPException($msg);
        +            }
        +            else {
        +                return false;
        +            }
        +        }
        +        
        +        return true;
        +    }
        +    
        +    /**
        +    * Encode a password for transmission over LDAP
        +    *
        +    * @param string $password The password to encode
        +    * @return string
        +    */
        +    public function encodePassword($password)
        +    {
        +        $password="\"".$password."\"";
        +        $encoded="";
        +        for ($i=0; $i info($username, array("cn"), $isGUID);
        +        if ($user[0]["dn"] === NULL) { 
        +            return false; 
        +        }
        +        $userDn = $user[0]["dn"];
        +        return $userDn;
        +    }
        +    
        +    /**
        +    * Return a list of all users in AD
        +    * 
        +    * @param bool $includeDescription Return a description of the user
        +    * @param string $search Search parameter
        +    * @param bool $sorted Sort the user accounts
        +    * @return array
        +    */
        +    public function all($includeDescription = false, $search = "*", $sorted = true)
        +    {
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +        
        +        // Perform the search and grab all their details
        +        $filter = "(&(objectClass=user)(samaccounttype=" . adLDAP::ADLDAP_NORMAL_ACCOUNT .")(objectCategory=person)(cn=" . $search . "))";
        +        $fields = array("samaccountname","displayname");
        +        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        +        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        +
        +        $usersArray = array();
        +        for ($i=0; $i<$entries["count"]; $i++){
        +            if ($includeDescription && strlen($entries[$i]["displayname"][0])>0){
        +                $usersArray[$entries[$i]["samaccountname"][0]] = $entries[$i]["displayname"][0];
        +            } elseif ($includeDescription){
        +                $usersArray[$entries[$i]["samaccountname"][0]] = $entries[$i]["samaccountname"][0];
        +            } else {
        +                array_push($usersArray, $entries[$i]["samaccountname"][0]);
        +            }
        +        }
        +        if ($sorted) { 
        +            asort($usersArray); 
        +        }
        +        return $usersArray;
        +    }
        +    
        +    /**
        +    * Converts a username (samAccountName) to a GUID
        +    * 
        +    * @param string $username The username to query
        +    * @return string
        +    */
        +    public function usernameToGuid($username) 
        +    {
        +        if (!$this->adldap->getLdapBind()){ return false; }
        +        if ($username === null){ return "Missing compulsory field [username]"; }
        +        
        +        $filter = "samaccountname=" . $username; 
        +        $fields = array("objectGUID"); 
        +        $sr = @ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields); 
        +        if (ldap_count_entries($this->adldap->getLdapConnection(), $sr) > 0) { 
        +            $entry = @ldap_first_entry($this->adldap->getLdapConnection(), $sr); 
        +            $guid = @ldap_get_values_len($this->adldap->getLdapConnection(), $entry, 'objectGUID'); 
        +            $strGUID = $this->adldap->utilities()->binaryToText($guid[0]);          
        +            return $strGUID; 
        +        }
        +        return false; 
        +    }
        +    
        +    /**
        +    * Return a list of all users in AD that have a specific value in a field
        +    *
        +    * @param bool $includeDescription Return a description of the user
        +    * @param string $searchField Field to search search for
        +    * @param string $searchFilter Value to search for in the specified field
        +    * @param bool $sorted Sort the user accounts
        +    * @return array
        +    */
        +    public function find($includeDescription = false, $searchField = false, $searchFilter = false, $sorted = true){
        +        if (!$this->adldap->getLdapBind()){ return false; }
        +          
        +        // Perform the search and grab all their details
        +        $searchParams = "";
        +        if ($searchField) {
        +            $searchParams = "(" . $searchField . "=" . $searchFilter . ")";
        +        }                           
        +        $filter = "(&(objectClass=user)(samaccounttype=" . adLDAP::ADLDAP_NORMAL_ACCOUNT .")(objectCategory=person)" . $searchParams . ")";
        +        $fields = array("samaccountname","displayname");
        +        $sr = ldap_search($this->adldap->getLdapConnection(), $this->adldap->getBaseDn(), $filter, $fields);
        +        $entries = ldap_get_entries($this->adldap->getLdapConnection(), $sr);
        +
        +        $usersArray = array();
        +        for ($i=0; $i < $entries["count"]; $i++) {
        +            if ($includeDescription && strlen($entries[$i]["displayname"][0]) > 0) {
        +                $usersArray[$entries[$i]["samaccountname"][0]] = $entries[$i]["displayname"][0];
        +            }
        +            else if ($includeDescription) {
        +                $usersArray[$entries[$i]["samaccountname"][0]] = $entries[$i]["samaccountname"][0];
        +            }
        +            else {
        +                array_push($usersArray, $entries[$i]["samaccountname"][0]);
        +            }
        +        }
        +        if ($sorted){ 
        +          asort($usersArray); 
        +        }
        +        return ($usersArray);
        +    }
        +    
        +    /**
        +    * Move a user account to a different OU
        +    *
        +    * @param string $username The username to move (please be careful here!)
        +    * @param array $container The container or containers to move the user to (please be careful here!).
        +    * accepts containers in 1. parent 2. child order
        +    * @return array
        +    */
        +    public function move($username, $container) 
        +    {
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +        if ($username === null) { return "Missing compulsory field [username]"; }
        +        if ($container === null) { return "Missing compulsory field [container]"; }
        +        if (!is_array($container)) { return "Container must be an array"; }
        +        
        +        $userInfo = $this->info($username, array("*"));
        +        $dn = $userInfo[0]['distinguishedname'][0];
        +        $newRDn = "cn=" . $username;
        +        $container = array_reverse($container);
        +        $newContainer = "ou=" . implode(",ou=",$container);
        +        $newBaseDn = strtolower($newContainer) . "," . $this->adldap->getBaseDn();
        +        $result = @ldap_rename($this->adldap->getLdapConnection(), $dn, $newRDn, $newBaseDn, true);
        +        if ($result !== true) {
        +            return false;
        +        }
        +        return true;
        +    }
        +    
        +    /**
        +    * Get the last logon time of any user as a Unix timestamp
        +    * 
        +    * @param string $username
        +    * @return long $unixTimestamp
        +    */
        +    public function getLastLogon($username) {
        +        if (!$this->adldap->getLdapBind()) { return false; }
        +        if ($username === null) { return "Missing compulsory field [username]"; }
        +        $userInfo = $this->info($username, array("lastLogonTimestamp"));
        +        $lastLogon = adLDAPUtils::convertWindowsTimeToUnixTime($userInfo[0]['lastLogonTimestamp'][0]);
        +        return $lastLogon;
        +    }
        +    
        +}
        +?>
        diff --git a/lib/plugins/authad/adLDAP/classes/adLDAPUtils.php b/lib/plugins/authad/adLDAP/classes/adLDAPUtils.php
        index f039a4290..5e8644188 100644
        --- a/lib/plugins/authad/adLDAP/classes/adLDAPUtils.php
        +++ b/lib/plugins/authad/adLDAP/classes/adLDAPUtils.php
        @@ -1,264 +1,264 @@
        -adldap = $adldap;
        -    }
        -    
        -    
        -    /**
        -    * Take an LDAP query and return the nice names, without all the LDAP prefixes (eg. CN, DN)
        -    *
        -    * @param array $groups
        -    * @return array
        -    */
        -    public function niceNames($groups)
        -    {
        -
        -        $groupArray = array();
        -        for ($i=0; $i<$groups["count"]; $i++){ // For each group
        -            $line = $groups[$i];
        -            
        -            if (strlen($line)>0) { 
        -                // More presumptions, they're all prefixed with CN=
        -                // so we ditch the first three characters and the group
        -                // name goes up to the first comma
        -                $bits=explode(",", $line);
        -                $groupArray[] = substr($bits[0], 3, (strlen($bits[0])-3));
        -            }
        -        }
        -        return $groupArray;    
        -    }
        -    
        -    /**
        -    * Escape characters for use in an ldap_create function
        -    * 
        -    * @param string $str
        -    * @return string
        -    */
        -    public function escapeCharacters($str) {
        -        $str = str_replace(",", "\,", $str);
        -        return $str;
        -    }
        -    
        -    /**
        -    * Escape strings for the use in LDAP filters
        -    * 
        -    * DEVELOPERS SHOULD BE DOING PROPER FILTERING IF THEY'RE ACCEPTING USER INPUT
        -    * Ported from Perl's Net::LDAP::Util escape_filter_value
        -    *
        -    * @param string $str The string the parse
        -    * @author Port by Andreas Gohr 
        -    * @return string
        -    */
        -    public function ldapSlashes($str){
        -        return preg_replace('/([\x00-\x1F\*\(\)\\\\])/e',
        -                            '"\\\\\".join("",unpack("H2","$1"))',
        -                            $str);
        -    }
        -    
        -    /**
        -    * Converts a string GUID to a hexdecimal value so it can be queried
        -    * 
        -    * @param string $strGUID A string representation of a GUID
        -    * @return string
        -    */
        -    public function strGuidToHex($strGUID) 
        -    {
        -        $strGUID = str_replace('-', '', $strGUID);
        -
        -        $octet_str = '\\' . substr($strGUID, 6, 2);
        -        $octet_str .= '\\' . substr($strGUID, 4, 2);
        -        $octet_str .= '\\' . substr($strGUID, 2, 2);
        -        $octet_str .= '\\' . substr($strGUID, 0, 2);
        -        $octet_str .= '\\' . substr($strGUID, 10, 2);
        -        $octet_str .= '\\' . substr($strGUID, 8, 2);
        -        $octet_str .= '\\' . substr($strGUID, 14, 2);
        -        $octet_str .= '\\' . substr($strGUID, 12, 2);
        -        //$octet_str .= '\\' . substr($strGUID, 16, strlen($strGUID));
        -        for ($i=16; $i<=(strlen($strGUID)-2); $i++) {
        -            if (($i % 2) == 0) {
        -                $octet_str .= '\\' . substr($strGUID, $i, 2);
        -            }
        -        }
        -        
        -        return $octet_str;
        -    }
        -    
        -    /**
        -    * Convert a binary SID to a text SID
        -    * 
        -    * @param string $binsid A Binary SID
        -    * @return string
        -    */
        -     public function getTextSID($binsid) {
        -        $hex_sid = bin2hex($binsid);
        -        $rev = hexdec(substr($hex_sid, 0, 2));
        -        $subcount = hexdec(substr($hex_sid, 2, 2));
        -        $auth = hexdec(substr($hex_sid, 4, 12));
        -        $result = "$rev-$auth";
        -
        -        for ($x=0;$x < $subcount; $x++) {
        -            $subauth[$x] =
        -                hexdec($this->littleEndian(substr($hex_sid, 16 + ($x * 8), 8)));
        -                $result .= "-" . $subauth[$x];
        -        }
        -
        -        // Cheat by tacking on the S-
        -        return 'S-' . $result;
        -     }
        -     
        -    /**
        -    * Converts a little-endian hex number to one that hexdec() can convert
        -    * 
        -    * @param string $hex A hex code
        -    * @return string
        -    */
        -     public function littleEndian($hex) 
        -     {
        -        $result = '';
        -        for ($x = strlen($hex) - 2; $x >= 0; $x = $x - 2) {
        -            $result .= substr($hex, $x, 2);
        -        }
        -        return $result;
        -     }
        -     
        -     /**
        -    * Converts a binary attribute to a string
        -    * 
        -    * @param string $bin A binary LDAP attribute
        -    * @return string
        -    */
        -    public function binaryToText($bin) 
        -    {
        -        $hex_guid = bin2hex($bin); 
        -        $hex_guid_to_guid_str = ''; 
        -        for($k = 1; $k <= 4; ++$k) { 
        -            $hex_guid_to_guid_str .= substr($hex_guid, 8 - 2 * $k, 2); 
        -        } 
        -        $hex_guid_to_guid_str .= '-'; 
        -        for($k = 1; $k <= 2; ++$k) { 
        -            $hex_guid_to_guid_str .= substr($hex_guid, 12 - 2 * $k, 2); 
        -        } 
        -        $hex_guid_to_guid_str .= '-'; 
        -        for($k = 1; $k <= 2; ++$k) { 
        -            $hex_guid_to_guid_str .= substr($hex_guid, 16 - 2 * $k, 2); 
        -        } 
        -        $hex_guid_to_guid_str .= '-' . substr($hex_guid, 16, 4); 
        -        $hex_guid_to_guid_str .= '-' . substr($hex_guid, 20); 
        -        return strtoupper($hex_guid_to_guid_str);   
        -    }
        -    
        -    /**
        -    * Converts a binary GUID to a string GUID
        -    * 
        -    * @param string $binaryGuid The binary GUID attribute to convert
        -    * @return string
        -    */
        -    public function decodeGuid($binaryGuid) 
        -    {
        -        if ($binaryGuid === null){ return "Missing compulsory field [binaryGuid]"; }
        -        
        -        $strGUID = $this->binaryToText($binaryGuid);          
        -        return $strGUID; 
        -    }
        -    
        -    /**
        -    * Convert a boolean value to a string
        -    * You should never need to call this yourself
        -    *
        -    * @param bool $bool Boolean value
        -    * @return string
        -    */
        -    public function boolToStr($bool) 
        -    {
        -        return ($bool) ? 'TRUE' : 'FALSE';
        -    }
        -    
        -    /**
        -    * Convert 8bit characters e.g. accented characters to UTF8 encoded characters
        -    */
        -    public function encode8Bit(&$item, $key) {
        -        $encode = false;
        -        if (is_string($item)) {
        -            for ($i=0; $i> 7) {
        -                    $encode = true;
        -                }
        -            }
        -        }
        -        if ($encode === true && $key != 'password') {
        -            $item = utf8_encode($item);   
        -        }
        -    }  
        -    
        -    /**
        -    * Get the current class version number
        -    * 
        -    * @return string
        -    */
        -    public function getVersion() {
        -        return self::ADLDAP_VERSION;
        -    }
        -    
        -    /**
        -    * Round a Windows timestamp down to seconds and remove the seconds between 1601-01-01 and 1970-01-01
        -    * 
        -    * @param long $windowsTime
        -    * @return long $unixTime
        -    */
        -    public static function convertWindowsTimeToUnixTime($windowsTime) {
        -      $unixTime = round($windowsTime / 10000000) - 11644477200; 
        -      return $unixTime; 
        -    }
        -}
        -
        +adldap = $adldap;
        +    }
        +    
        +    
        +    /**
        +    * Take an LDAP query and return the nice names, without all the LDAP prefixes (eg. CN, DN)
        +    *
        +    * @param array $groups
        +    * @return array
        +    */
        +    public function niceNames($groups)
        +    {
        +
        +        $groupArray = array();
        +        for ($i=0; $i<$groups["count"]; $i++){ // For each group
        +            $line = $groups[$i];
        +            
        +            if (strlen($line)>0) { 
        +                // More presumptions, they're all prefixed with CN=
        +                // so we ditch the first three characters and the group
        +                // name goes up to the first comma
        +                $bits=explode(",", $line);
        +                $groupArray[] = substr($bits[0], 3, (strlen($bits[0])-3));
        +            }
        +        }
        +        return $groupArray;    
        +    }
        +    
        +    /**
        +    * Escape characters for use in an ldap_create function
        +    * 
        +    * @param string $str
        +    * @return string
        +    */
        +    public function escapeCharacters($str) {
        +        $str = str_replace(",", "\,", $str);
        +        return $str;
        +    }
        +    
        +    /**
        +    * Escape strings for the use in LDAP filters
        +    * 
        +    * DEVELOPERS SHOULD BE DOING PROPER FILTERING IF THEY'RE ACCEPTING USER INPUT
        +    * Ported from Perl's Net::LDAP::Util escape_filter_value
        +    *
        +    * @param string $str The string the parse
        +    * @author Port by Andreas Gohr 
        +    * @return string
        +    */
        +    public function ldapSlashes($str){
        +        return preg_replace('/([\x00-\x1F\*\(\)\\\\])/e',
        +                            '"\\\\\".join("",unpack("H2","$1"))',
        +                            $str);
        +    }
        +    
        +    /**
        +    * Converts a string GUID to a hexdecimal value so it can be queried
        +    * 
        +    * @param string $strGUID A string representation of a GUID
        +    * @return string
        +    */
        +    public function strGuidToHex($strGUID) 
        +    {
        +        $strGUID = str_replace('-', '', $strGUID);
        +
        +        $octet_str = '\\' . substr($strGUID, 6, 2);
        +        $octet_str .= '\\' . substr($strGUID, 4, 2);
        +        $octet_str .= '\\' . substr($strGUID, 2, 2);
        +        $octet_str .= '\\' . substr($strGUID, 0, 2);
        +        $octet_str .= '\\' . substr($strGUID, 10, 2);
        +        $octet_str .= '\\' . substr($strGUID, 8, 2);
        +        $octet_str .= '\\' . substr($strGUID, 14, 2);
        +        $octet_str .= '\\' . substr($strGUID, 12, 2);
        +        //$octet_str .= '\\' . substr($strGUID, 16, strlen($strGUID));
        +        for ($i=16; $i<=(strlen($strGUID)-2); $i++) {
        +            if (($i % 2) == 0) {
        +                $octet_str .= '\\' . substr($strGUID, $i, 2);
        +            }
        +        }
        +        
        +        return $octet_str;
        +    }
        +    
        +    /**
        +    * Convert a binary SID to a text SID
        +    * 
        +    * @param string $binsid A Binary SID
        +    * @return string
        +    */
        +     public function getTextSID($binsid) {
        +        $hex_sid = bin2hex($binsid);
        +        $rev = hexdec(substr($hex_sid, 0, 2));
        +        $subcount = hexdec(substr($hex_sid, 2, 2));
        +        $auth = hexdec(substr($hex_sid, 4, 12));
        +        $result = "$rev-$auth";
        +
        +        for ($x=0;$x < $subcount; $x++) {
        +            $subauth[$x] =
        +                hexdec($this->littleEndian(substr($hex_sid, 16 + ($x * 8), 8)));
        +                $result .= "-" . $subauth[$x];
        +        }
        +
        +        // Cheat by tacking on the S-
        +        return 'S-' . $result;
        +     }
        +     
        +    /**
        +    * Converts a little-endian hex number to one that hexdec() can convert
        +    * 
        +    * @param string $hex A hex code
        +    * @return string
        +    */
        +     public function littleEndian($hex) 
        +     {
        +        $result = '';
        +        for ($x = strlen($hex) - 2; $x >= 0; $x = $x - 2) {
        +            $result .= substr($hex, $x, 2);
        +        }
        +        return $result;
        +     }
        +     
        +     /**
        +    * Converts a binary attribute to a string
        +    * 
        +    * @param string $bin A binary LDAP attribute
        +    * @return string
        +    */
        +    public function binaryToText($bin) 
        +    {
        +        $hex_guid = bin2hex($bin); 
        +        $hex_guid_to_guid_str = ''; 
        +        for($k = 1; $k <= 4; ++$k) { 
        +            $hex_guid_to_guid_str .= substr($hex_guid, 8 - 2 * $k, 2); 
        +        } 
        +        $hex_guid_to_guid_str .= '-'; 
        +        for($k = 1; $k <= 2; ++$k) { 
        +            $hex_guid_to_guid_str .= substr($hex_guid, 12 - 2 * $k, 2); 
        +        } 
        +        $hex_guid_to_guid_str .= '-'; 
        +        for($k = 1; $k <= 2; ++$k) { 
        +            $hex_guid_to_guid_str .= substr($hex_guid, 16 - 2 * $k, 2); 
        +        } 
        +        $hex_guid_to_guid_str .= '-' . substr($hex_guid, 16, 4); 
        +        $hex_guid_to_guid_str .= '-' . substr($hex_guid, 20); 
        +        return strtoupper($hex_guid_to_guid_str);   
        +    }
        +    
        +    /**
        +    * Converts a binary GUID to a string GUID
        +    * 
        +    * @param string $binaryGuid The binary GUID attribute to convert
        +    * @return string
        +    */
        +    public function decodeGuid($binaryGuid) 
        +    {
        +        if ($binaryGuid === null){ return "Missing compulsory field [binaryGuid]"; }
        +        
        +        $strGUID = $this->binaryToText($binaryGuid);          
        +        return $strGUID; 
        +    }
        +    
        +    /**
        +    * Convert a boolean value to a string
        +    * You should never need to call this yourself
        +    *
        +    * @param bool $bool Boolean value
        +    * @return string
        +    */
        +    public function boolToStr($bool) 
        +    {
        +        return ($bool) ? 'TRUE' : 'FALSE';
        +    }
        +    
        +    /**
        +    * Convert 8bit characters e.g. accented characters to UTF8 encoded characters
        +    */
        +    public function encode8Bit(&$item, $key) {
        +        $encode = false;
        +        if (is_string($item)) {
        +            for ($i=0; $i> 7) {
        +                    $encode = true;
        +                }
        +            }
        +        }
        +        if ($encode === true && $key != 'password') {
        +            $item = utf8_encode($item);   
        +        }
        +    }  
        +    
        +    /**
        +    * Get the current class version number
        +    * 
        +    * @return string
        +    */
        +    public function getVersion() {
        +        return self::ADLDAP_VERSION;
        +    }
        +    
        +    /**
        +    * Round a Windows timestamp down to seconds and remove the seconds between 1601-01-01 and 1970-01-01
        +    * 
        +    * @param long $windowsTime
        +    * @return long $unixTime
        +    */
        +    public static function convertWindowsTimeToUnixTime($windowsTime) {
        +      $unixTime = round($windowsTime / 10000000) - 11644477200; 
        +      return $unixTime; 
        +    }
        +}
        +
         ?>
        \ No newline at end of file
        diff --git a/lib/plugins/authad/adLDAP/collections/adLDAPCollection.php b/lib/plugins/authad/adLDAP/collections/adLDAPCollection.php
        index c0a2eb2fa..433d39f18 100644
        --- a/lib/plugins/authad/adLDAP/collections/adLDAPCollection.php
        +++ b/lib/plugins/authad/adLDAP/collections/adLDAPCollection.php
        @@ -1,137 +1,137 @@
        -setInfo($info);   
        -        $this->adldap = $adldap;
        -    }
        -    
        -    /**
        -    * Set the raw info array from Active Directory
        -    * 
        -    * @param array $info
        -    */
        -    public function setInfo(array $info) 
        -    {
        -        if ($this->info && sizeof($info) >= 1) {
        -            unset($this->info);
        -        }
        -        $this->info = $info;   
        -    }
        -    
        -    /**
        -    * Magic get method to retrieve data from the raw array in a formatted way
        -    * 
        -    * @param string $attribute
        -    * @return mixed
        -    */
        -    public function __get($attribute)
        -    {
        -        if (isset($this->info[0]) && is_array($this->info[0])) {
        -            foreach ($this->info[0] as $keyAttr => $valueAttr) {
        -                if (strtolower($keyAttr) == strtolower($attribute)) {
        -                    if ($this->info[0][strtolower($attribute)]['count'] == 1) {
        -                        return $this->info[0][strtolower($attribute)][0];   
        -                    }
        -                    else {
        -                        $array = array();
        -                        foreach ($this->info[0][strtolower($attribute)] as $key => $value) {
        -                            if ((string)$key != 'count') {
        -                                $array[$key] = $value;
        -                            } 
        -                        }  
        -                        return $array;   
        -                    }
        -                }   
        -            }
        -        }
        -        else {
        -            return NULL;   
        -        }
        -    }    
        -    
        -    /**
        -    * Magic set method to update an attribute
        -    * 
        -    * @param string $attribute
        -    * @param string $value
        -    * @return bool
        -    */
        -    abstract public function __set($attribute, $value);
        -    
        -    /** 
        -    * Magic isset method to check for the existence of an attribute 
        -    * 
        -    * @param string $attribute 
        -    * @return bool 
        -    */ 
        -    public function __isset($attribute) {
        -        if (isset($this->info[0]) && is_array($this->info[0])) { 
        -            foreach ($this->info[0] as $keyAttr => $valueAttr) { 
        -                if (strtolower($keyAttr) == strtolower($attribute)) { 
        -                    return true; 
        -                } 
        -            } 
        -        } 
        -        return false; 
        -     } 
        -}
        -?>
        +setInfo($info);   
        +        $this->adldap = $adldap;
        +    }
        +    
        +    /**
        +    * Set the raw info array from Active Directory
        +    * 
        +    * @param array $info
        +    */
        +    public function setInfo(array $info) 
        +    {
        +        if ($this->info && sizeof($info) >= 1) {
        +            unset($this->info);
        +        }
        +        $this->info = $info;   
        +    }
        +    
        +    /**
        +    * Magic get method to retrieve data from the raw array in a formatted way
        +    * 
        +    * @param string $attribute
        +    * @return mixed
        +    */
        +    public function __get($attribute)
        +    {
        +        if (isset($this->info[0]) && is_array($this->info[0])) {
        +            foreach ($this->info[0] as $keyAttr => $valueAttr) {
        +                if (strtolower($keyAttr) == strtolower($attribute)) {
        +                    if ($this->info[0][strtolower($attribute)]['count'] == 1) {
        +                        return $this->info[0][strtolower($attribute)][0];   
        +                    }
        +                    else {
        +                        $array = array();
        +                        foreach ($this->info[0][strtolower($attribute)] as $key => $value) {
        +                            if ((string)$key != 'count') {
        +                                $array[$key] = $value;
        +                            } 
        +                        }  
        +                        return $array;   
        +                    }
        +                }   
        +            }
        +        }
        +        else {
        +            return NULL;   
        +        }
        +    }    
        +    
        +    /**
        +    * Magic set method to update an attribute
        +    * 
        +    * @param string $attribute
        +    * @param string $value
        +    * @return bool
        +    */
        +    abstract public function __set($attribute, $value);
        +    
        +    /** 
        +    * Magic isset method to check for the existence of an attribute 
        +    * 
        +    * @param string $attribute 
        +    * @return bool 
        +    */ 
        +    public function __isset($attribute) {
        +        if (isset($this->info[0]) && is_array($this->info[0])) { 
        +            foreach ($this->info[0] as $keyAttr => $valueAttr) { 
        +                if (strtolower($keyAttr) == strtolower($attribute)) { 
        +                    return true; 
        +                } 
        +            } 
        +        } 
        +        return false; 
        +     } 
        +}
        +?>
        diff --git a/lib/plugins/authad/adLDAP/collections/adLDAPComputerCollection.php b/lib/plugins/authad/adLDAP/collections/adLDAPComputerCollection.php
        index 4f11d8f41..09f82cadc 100644
        --- a/lib/plugins/authad/adLDAP/collections/adLDAPComputerCollection.php
        +++ b/lib/plugins/authad/adLDAP/collections/adLDAPComputerCollection.php
        @@ -1,46 +1,46 @@
        -
        +
        diff --git a/lib/plugins/authad/adLDAP/collections/adLDAPContactCollection.php b/lib/plugins/authad/adLDAP/collections/adLDAPContactCollection.php
        index d42fe6d4c..a9efad5a9 100644
        --- a/lib/plugins/authad/adLDAP/collections/adLDAPContactCollection.php
        +++ b/lib/plugins/authad/adLDAP/collections/adLDAPContactCollection.php
        @@ -1,46 +1,46 @@
        -
        +
        diff --git a/lib/plugins/authad/adLDAP/collections/adLDAPGroupCollection.php b/lib/plugins/authad/adLDAP/collections/adLDAPGroupCollection.php
        index cff12fc20..ef4af8df2 100644
        --- a/lib/plugins/authad/adLDAP/collections/adLDAPGroupCollection.php
        +++ b/lib/plugins/authad/adLDAP/collections/adLDAPGroupCollection.php
        @@ -1,46 +1,46 @@
        -
        +
        diff --git a/lib/plugins/authad/adLDAP/collections/adLDAPUserCollection.php b/lib/plugins/authad/adLDAP/collections/adLDAPUserCollection.php
        index 801d90296..63fce5f96 100644
        --- a/lib/plugins/authad/adLDAP/collections/adLDAPUserCollection.php
        +++ b/lib/plugins/authad/adLDAP/collections/adLDAPUserCollection.php
        @@ -1,46 +1,46 @@
        -
        +
        diff --git a/lib/scripts/jquery/jquery-migrate.js b/lib/scripts/jquery/jquery-migrate.js
        index e99f954e6..942cb8b4d 100644
        --- a/lib/scripts/jquery/jquery-migrate.js
        +++ b/lib/scripts/jquery/jquery-migrate.js
        @@ -1,511 +1,511 @@
        -/*!
        - * jQuery Migrate - v1.1.1 - 2013-02-16
        - * https://github.com/jquery/jquery-migrate
        - * Copyright 2005, 2013 jQuery Foundation, Inc. and other contributors; Licensed MIT
        - */
        -(function( jQuery, window, undefined ) {
        -// See http://bugs.jquery.com/ticket/13335
        -// "use strict";
        -
        -
        -var warnedAbout = {};
        -
        -// List of warnings already given; public read only
        -jQuery.migrateWarnings = [];
        -
        -// Set to true to prevent console output; migrateWarnings still maintained
        -// jQuery.migrateMute = false;
        -
        -// Show a message on the console so devs know we're active
        -if ( !jQuery.migrateMute && window.console && console.log ) {
        -	console.log("JQMIGRATE: Logging is active");
        -}
        -
        -// Set to false to disable traces that appear with warnings
        -if ( jQuery.migrateTrace === undefined ) {
        -	jQuery.migrateTrace = true;
        -}
        -
        -// Forget any warnings we've already given; public
        -jQuery.migrateReset = function() {
        -	warnedAbout = {};
        -	jQuery.migrateWarnings.length = 0;
        -};
        -
        -function migrateWarn( msg) {
        -	if ( !warnedAbout[ msg ] ) {
        -		warnedAbout[ msg ] = true;
        -		jQuery.migrateWarnings.push( msg );
        -		if ( window.console && console.warn && !jQuery.migrateMute ) {
        -			console.warn( "JQMIGRATE: " + msg );
        -			if ( jQuery.migrateTrace && console.trace ) {
        -				console.trace();
        -			}
        -		}
        -	}
        -}
        -
        -function migrateWarnProp( obj, prop, value, msg ) {
        -	if ( Object.defineProperty ) {
        -		// On ES5 browsers (non-oldIE), warn if the code tries to get prop;
        -		// allow property to be overwritten in case some other plugin wants it
        -		try {
        -			Object.defineProperty( obj, prop, {
        -				configurable: true,
        -				enumerable: true,
        -				get: function() {
        -					migrateWarn( msg );
        -					return value;
        -				},
        -				set: function( newValue ) {
        -					migrateWarn( msg );
        -					value = newValue;
        -				}
        -			});
        -			return;
        -		} catch( err ) {
        -			// IE8 is a dope about Object.defineProperty, can't warn there
        -		}
        -	}
        -
        -	// Non-ES5 (or broken) browser; just set the property
        -	jQuery._definePropertyBroken = true;
        -	obj[ prop ] = value;
        -}
        -
        -if ( document.compatMode === "BackCompat" ) {
        -	// jQuery has never supported or tested Quirks Mode
        -	migrateWarn( "jQuery is not compatible with Quirks Mode" );
        -}
        -
        -
        -var attrFn = jQuery( "", { size: 1 } ).attr("size") && jQuery.attrFn,
        -	oldAttr = jQuery.attr,
        -	valueAttrGet = jQuery.attrHooks.value && jQuery.attrHooks.value.get ||
        -		function() { return null; },
        -	valueAttrSet = jQuery.attrHooks.value && jQuery.attrHooks.value.set ||
        -		function() { return undefined; },
        -	rnoType = /^(?:input|button)$/i,
        -	rnoAttrNodeType = /^[238]$/,
        -	rboolean = /^(?:autofocus|autoplay|async|checked|controls|defer|disabled|hidden|loop|multiple|open|readonly|required|scoped|selected)$/i,
        -	ruseDefault = /^(?:checked|selected)$/i;
        -
        -// jQuery.attrFn
        -migrateWarnProp( jQuery, "attrFn", attrFn || {}, "jQuery.attrFn is deprecated" );
        -
        -jQuery.attr = function( elem, name, value, pass ) {
        -	var lowerName = name.toLowerCase(),
        -		nType = elem && elem.nodeType;
        -
        -	if ( pass ) {
        -		// Since pass is used internally, we only warn for new jQuery
        -		// versions where there isn't a pass arg in the formal params
        -		if ( oldAttr.length < 4 ) {
        -			migrateWarn("jQuery.fn.attr( props, pass ) is deprecated");
        -		}
        -		if ( elem && !rnoAttrNodeType.test( nType ) &&
        -			(attrFn ? name in attrFn : jQuery.isFunction(jQuery.fn[name])) ) {
        -			return jQuery( elem )[ name ]( value );
        -		}
        -	}
        -
        -	// Warn if user tries to set `type`, since it breaks on IE 6/7/8; by checking
        -	// for disconnected elements we don't warn on $( "