Duplicate code is one of the most pungent code smells. A rule that is often used is to re-structure code once it is duplicated in three or more places.
Common duplication problems, and corresponding solutions are:
Complex classes like LDAPService often do a lot of different things. To break such a class down, we need to identify a cohesive component within that class. A common approach to find such a component is to look for fields/methods that share the same prefixes, or suffixes. You can also have a look at the cohesion graph to spot any un-connected, or weakly-connected components.
Once you have determined the fields that belong together, you can apply the Extract Class refactoring. If the component makes sense as a sub-class, Extract Subclass is also a candidate, and is often faster.
While breaking up the class, it is a good idea to analyze how other classes use LDAPService, and based on these observations, apply Extract Interface, too.
| 1 | <?php | ||
| 15 | class LDAPService extends Object implements Flushable | ||
|  | |||
| 16 | { | ||
| 17 | /** | ||
| 18 | * @var array | ||
| 19 | */ | ||
| 20 | private static $dependencies = array( | ||
| 21 | 'gateway' => '%$LDAPGateway' | ||
| 22 | ); | ||
| 23 | |||
| 24 | /** | ||
| 25 | * If configured, only user objects within these locations will be exposed to this service. | ||
| 26 | * | ||
| 27 | * @var array | ||
| 28 | * @config | ||
| 29 | */ | ||
| 30 | private static $users_search_locations = array(); | ||
| 31 | |||
| 32 | /** | ||
| 33 | * If configured, only group objects within these locations will be exposed to this service. | ||
| 34 | * @var array | ||
| 35 | * | ||
| 36 | * @config | ||
| 37 | */ | ||
| 38 | private static $groups_search_locations = array(); | ||
| 39 | |||
| 40 | /** | ||
| 41 | * Location to create new users in (distinguished name). | ||
| 42 | * @var string | ||
| 43 | * | ||
| 44 | * @config | ||
| 45 | */ | ||
| 46 | private static $new_users_dn; | ||
| 47 | |||
| 48 | /** | ||
| 49 | * @var array | ||
| 50 | */ | ||
| 51 | private static $_cache_nested_groups = array(); | ||
| 52 | |||
| 53 | /** | ||
| 54 |      * If this is configured to a "Code" value of a {@link Group} in SilverStripe, the user will always | ||
| 55 | * be added to this group's membership when imported, regardless of any sort of group mappings. | ||
| 56 | * | ||
| 57 | * @var string | ||
| 58 | * @config | ||
| 59 | */ | ||
| 60 | private static $default_group; | ||
| 61 | |||
| 62 | /** | ||
| 63 | * Get the cache objecgt used for LDAP results. Note that the default lifetime set here | ||
| 64 |      * is 8 hours, but you can change that by calling SS_Cache::set_lifetime('ldap', <lifetime in seconds>) | ||
| 65 | * | ||
| 66 | * @return Zend_Cache_Frontend | ||
| 67 | */ | ||
| 68 | public static function get_cache() | ||
| 75 | |||
| 76 | /** | ||
| 77 | * Flushes out the LDAP results cache when flush=1 is called. | ||
| 78 | */ | ||
| 79 | public static function flush() | ||
| 84 | |||
| 85 | /** | ||
| 86 | * @var LDAPGateway | ||
| 87 | */ | ||
| 88 | public $gateway; | ||
| 89 | |||
| 90 | /** | ||
| 91 | * Setter for gateway. Useful for overriding the gateway with a fake for testing. | ||
| 92 | * @var LDAPGateway | ||
| 93 | */ | ||
| 94 | public function setGateway($gateway) | ||
| 98 | |||
| 99 | /** | ||
| 100 | * Checkes whether or not the service is enabled. | ||
| 101 | * | ||
| 102 | * @return bool | ||
| 103 | */ | ||
| 104 | public function enabled() | ||
| 109 | |||
| 110 | /** | ||
| 111 | * Authenticate the given username and password with LDAP. | ||
| 112 | * | ||
| 113 | * @param string $username | ||
| 114 | * @param string $password | ||
| 115 | * | ||
| 116 | * @return array | ||
| 117 | */ | ||
| 118 | public function authenticate($username, $password) | ||
| 137 | |||
| 138 | /** | ||
| 139 | * Return all nodes (organizational units, containers, and domains) within the current base DN. | ||
| 140 | * | ||
| 141 | * @param boolean $cached Cache the results from AD, so that subsequent calls are faster. Enabled by default. | ||
| 142 | * @param array $attributes List of specific AD attributes to return. Empty array means return everything. | ||
| 143 | * @return array | ||
| 144 | */ | ||
| 145 | public function getNodes($cached = true, $attributes = array()) | ||
| 162 | |||
| 163 | /** | ||
| 164 | * Return all AD groups in configured search locations, including all nested groups. | ||
| 165 | * Uses groups_search_locations if defined, otherwise falls back to NULL, which tells LDAPGateway | ||
| 166 | * to use the default baseDn defined in the connection. | ||
| 167 | * | ||
| 168 | * @param boolean $cached Cache the results from AD, so that subsequent calls are faster. Enabled by default. | ||
| 169 | * @param array $attributes List of specific AD attributes to return. Empty array means return everything. | ||
| 170 | * @param string $indexBy Attribute to use as an index. | ||
| 171 | * @return array | ||
| 172 | */ | ||
| 173 | public function getGroups($cached = true, $attributes = array(), $indexBy = 'dn') | ||
| 197 | |||
| 198 | /** | ||
| 199 | * Return all member groups (and members of those, recursively) underneath a specific group DN. | ||
| 200 | * Note that these get cached in-memory per-request for performance to avoid re-querying for the same results. | ||
| 201 | * | ||
| 202 | * @param string $dn | ||
| 203 | * @param array $attributes List of specific AD attributes to return. Empty array means return everything. | ||
| 204 | * @return array | ||
| 205 | */ | ||
| 206 | public function getNestedGroups($dn, $attributes = array()) | ||
| 224 | |||
| 225 | /** | ||
| 226 | * Get a particular AD group's data given a GUID. | ||
| 227 | * | ||
| 228 | * @param string $guid | ||
| 229 | * @param array $attributes List of specific AD attributes to return. Empty array means return everything. | ||
| 230 | * @return array | ||
| 231 | */ | ||
| 232 | View Code Duplication | public function getGroupByGUID($guid, $attributes = array()) | |
| 242 | |||
| 243 | /** | ||
| 244 | * Get a particular AD group's data given a DN. | ||
| 245 | * | ||
| 246 | * @param string $dn | ||
| 247 | * @param array $attributes List of specific AD attributes to return. Empty array means return everything. | ||
| 248 | * @return array | ||
| 249 | */ | ||
| 250 | View Code Duplication | public function getGroupByDN($dn, $attributes = array()) | |
| 260 | |||
| 261 | /** | ||
| 262 | * Return all AD users in configured search locations, including all users in nested groups. | ||
| 263 | * Uses users_search_locations if defined, otherwise falls back to NULL, which tells LDAPGateway | ||
| 264 | * to use the default baseDn defined in the connection. | ||
| 265 | * | ||
| 266 | * @param array $attributes List of specific AD attributes to return. Empty array means return everything. | ||
| 267 | * @return array | ||
| 268 | */ | ||
| 269 | public function getUsers($attributes = array()) | ||
| 287 | |||
| 288 | /** | ||
| 289 | * Get a specific AD user's data given a GUID. | ||
| 290 | * | ||
| 291 | * @param string $guid | ||
| 292 | * @param array $attributes List of specific AD attributes to return. Empty array means return everything. | ||
| 293 | * @return array | ||
| 294 | */ | ||
| 295 | View Code Duplication | public function getUserByGUID($guid, $attributes = array()) | |
| 305 | |||
| 306 | /** | ||
| 307 | * Get a specific AD user's data given a DN. | ||
| 308 | * | ||
| 309 | * @param string $dn | ||
| 310 | * @param array $attributes List of specific AD attributes to return. Empty array means return everything. | ||
| 311 | * | ||
| 312 | * @return array | ||
| 313 | */ | ||
| 314 | View Code Duplication | public function getUserByDN($dn, $attributes = array()) | |
| 324 | |||
| 325 | /** | ||
| 326 | * Get a specific user's data given an email. | ||
| 327 | * | ||
| 328 | * @param string $email | ||
| 329 | * @param array $attributes List of specific AD attributes to return. Empty array means return everything. | ||
| 330 | * @return array | ||
| 331 | */ | ||
| 332 | View Code Duplication | public function getUserByEmail($email, $attributes = array()) | |
| 342 | |||
| 343 | /** | ||
| 344 | * Get a specific user's data given a username. | ||
| 345 | * | ||
| 346 | * @param string $username | ||
| 347 | * @param array $attributes List of specific AD attributes to return. Empty array means return everything. | ||
| 348 | * @return array | ||
| 349 | */ | ||
| 350 | View Code Duplication | public function getUserByUsername($username, $attributes = array()) | |
| 360 | |||
| 361 | /** | ||
| 362 | * Get a username for an email. | ||
| 363 | * | ||
| 364 | * @param string $email | ||
| 365 | * @return string|null | ||
| 366 | */ | ||
| 367 | public function getUsernameByEmail($email) | ||
| 376 | |||
| 377 | /** | ||
| 378 | * Given a group DN, get the group membership data in LDAP. | ||
| 379 | * | ||
| 380 | * @param string $dn | ||
| 381 | * @return array | ||
| 382 | */ | ||
| 383 | public function getLDAPGroupMembers($dn) | ||
| 396 | |||
| 397 | /** | ||
| 398 | * Update the current Member record with data from LDAP. | ||
| 399 | * | ||
| 400 | * Constraints: | ||
| 401 |      * - Member *must* be in the database before calling this as it will need the ID to be mapped to a {@link Group}. | ||
| 402 | * - GUID of the member must have already been set, for integrity reasons we don't allow it to change here. | ||
| 403 | * | ||
| 404 | * @param Member | ||
| 405 | * @param array|null $data If passed, this is pre-existing AD attribute data to update the Member with. | ||
| 406 | * If not given, the data will be looked up by the user's GUID. | ||
| 407 | * @return bool | ||
| 408 | */ | ||
| 409 | public function updateMemberFromLDAP(Member $member, $data = null) | ||
| 570 | |||
| 571 | /** | ||
| 572 | * Sync a specific Group by updating it with LDAP data. | ||
| 573 | * | ||
| 574 | * @param Group $group An existing Group or a new Group object | ||
| 575 | * @param array $data LDAP group object data | ||
| 576 | * | ||
| 577 | * @return bool | ||
| 578 | */ | ||
| 579 | public function updateGroupFromLDAP(Group $group, $data) | ||
| 619 | |||
| 620 | /** | ||
| 621 | * Creates a new LDAP user from the passed Member record. | ||
| 622 | * Note that the Member record must have a non-empty Username field for this to work. | ||
| 623 | * | ||
| 624 | * @param Member $member | ||
| 625 | */ | ||
| 626 | public function createLDAPUser(Member $member) | ||
| 668 | |||
| 669 | /** | ||
| 670 | * Update the Member data back to the corresponding LDAP user object. | ||
| 671 | * | ||
| 672 | * @param Member $member | ||
| 673 | * @throws ValidationException | ||
| 674 | */ | ||
| 675 | public function updateLDAPFromMember(Member $member) | ||
| 676 |     { | ||
| 677 |         if (!$this->enabled()) { | ||
| 678 | return; | ||
| 679 | } | ||
| 680 |         if (!$member->GUID) { | ||
| 681 |             throw new ValidationException('Member missing GUID. Cannot update LDAP user'); | ||
| 682 | } | ||
| 683 | |||
| 684 | $data = $this->getUserByGUID($member->GUID); | ||
| 685 |         if (empty($data['objectguid'])) { | ||
| 686 |             throw new ValidationException('LDAP synchronisation failure: user missing GUID'); | ||
| 687 | } | ||
| 688 | |||
| 689 |         if (empty($member->Username)) { | ||
| 690 |             throw new ValidationException('Member missing Username. Cannot update LDAP user'); | ||
| 691 | } | ||
| 692 | |||
| 693 | $dn = $data['distinguishedname']; | ||
| 694 | |||
| 695 | // Normalise username to lowercase to ensure we don't have duplicates of different cases | ||
| 696 | $member->Username = strtolower($member->Username); | ||
| 697 | |||
| 698 |         try { | ||
| 699 | // If the common name (cn) has changed, we need to ensure they've been moved | ||
| 700 | // to the new DN, to avoid any clashes between user objects. | ||
| 701 |             if ($data['cn'] != $member->Username) { | ||
| 702 |                 $newDn = sprintf('CN=%s,%s', $member->Username, preg_replace('/^CN=(.+?),/', '', $dn)); | ||
| 703 | $this->move($dn, $newDn); | ||
| 704 | $dn = $newDn; | ||
| 705 | } | ||
| 706 |         } catch (\Exception $e) { | ||
| 707 |             throw new ValidationException('LDAP move failure: '.$e->getMessage()); | ||
| 708 | } | ||
| 709 | |||
| 710 |         try { | ||
| 711 | $attributes = array( | ||
| 712 |                 'displayname' => sprintf('%s %s', $member->FirstName, $member->Surname), | ||
| 713 |                 'name' => sprintf('%s %s', $member->FirstName, $member->Surname), | ||
| 714 | 'userprincipalname' => sprintf( | ||
| 715 | '%s@%s', | ||
| 716 | $member->Username, | ||
| 717 | $this->gateway->config()->options['accountDomainName'] | ||
| 718 | ), | ||
| 719 | ); | ||
| 720 |             foreach ($member->config()->ldap_field_mappings as $attribute => $field) { | ||
| 721 | $relationClass = $member->getRelationClass($field); | ||
| 722 |                 if ($relationClass) { | ||
| 723 | // todo no support for writing back relations yet. | ||
| 724 |                 } else { | ||
| 725 | $attributes[$attribute] = $member->$field; | ||
| 726 | } | ||
| 727 | } | ||
| 728 | |||
| 729 | $this->update($dn, $attributes); | ||
| 730 |         } catch (\Exception $e) { | ||
| 731 |             throw new ValidationException('LDAP synchronisation failure: '.$e->getMessage()); | ||
| 732 | } | ||
| 733 | } | ||
| 734 | |||
| 735 | /** | ||
| 736 | * Ensure the user belongs to the correct groups in LDAP from their membership | ||
| 737 | * to local LDAP mapped SilverStripe groups. | ||
| 738 | * | ||
| 739 | * This also removes them from LDAP groups if they've been taken out of one. | ||
| 740 | * It will not affect group membership of non-mapped groups, so it will | ||
| 741 | * not touch such internal AD groups like "Domain Users". | ||
| 742 | * | ||
| 743 | * @param Member $member | ||
| 744 | */ | ||
| 745 | public function updateLDAPGroupsForMember(Member $member) | ||
| 832 | |||
| 833 | /** | ||
| 834 | * Change a members password on the AD. Works with ActiveDirectory compatible services that saves the | ||
| 835 | * password in the `unicodePwd` attribute. | ||
| 836 | * | ||
| 837 | * @todo Use the Zend\Ldap\Attribute::setPassword functionality to create a password in | ||
| 838 | * an abstract way, so it works on other LDAP directories, not just Active Directory. | ||
| 839 | * | ||
| 840 | * Ensure that the LDAP bind:ed user can change passwords and that the connection is secure. | ||
| 841 | * | ||
| 842 | * @param Member $member | ||
| 843 | * @param string $password | ||
| 844 | * @return ValidationResult | ||
| 845 | * @throws Exception | ||
| 846 | */ | ||
| 847 | public function setPassword(Member $member, $password) | ||
| 881 | |||
| 882 | /** | ||
| 883 | * Delete an LDAP user mapped to the Member record | ||
| 884 | * @param Member $member | ||
| 885 | */ | ||
| 886 |     public function deleteLDAPMember(Member $member) { | ||
| 904 | |||
| 905 | /** | ||
| 906 | * A simple proxy to LDAP update operation. | ||
| 907 | * | ||
| 908 | * @param string $dn Location to add the entry at. | ||
| 909 | * @param array $attributes A simple associative array of attributes. | ||
| 910 | */ | ||
| 911 | public function update($dn, array $attributes) | ||
| 915 | |||
| 916 | /** | ||
| 917 | * A simple proxy to LDAP delete operation. | ||
| 918 | * | ||
| 919 | * @param string $dn Location of object to delete | ||
| 920 | * @param bool $recursively Recursively delete nested objects? | ||
| 921 | */ | ||
| 922 | public function delete($dn, $recursively = false) | ||
| 926 | |||
| 927 | /** | ||
| 928 | * A simple proxy to LDAP copy/delete operation. | ||
| 929 | * | ||
| 930 | * @param string $fromDn | ||
| 931 | * @param string $toDn | ||
| 932 | * @param bool $recursively Recursively move nested objects? | ||
| 933 | */ | ||
| 934 | public function move($fromDn, $toDn, $recursively = false) | ||
| 938 | |||
| 939 | /** | ||
| 940 | * A simple proxy to LDAP add operation. | ||
| 941 | * | ||
| 942 | * @param string $dn Location to add the entry at. | ||
| 943 | * @param array $attributes A simple associative array of attributes. | ||
| 944 | */ | ||
| 945 | public function add($dn, array $attributes) | ||
| 949 | } | ||
| 950 | 
You can fix this by adding a namespace to your class:
When choosing a vendor namespace, try to pick something that is not too generic to avoid conflicts with other libraries.