mirror of
https://git.code.sf.net/p/seeddms/code
synced 2025-05-08 20:46:05 +00:00
276 lines
8.5 KiB
PHP
276 lines
8.5 KiB
PHP
<?php
|
|
/**
|
|
* Implementation of Login controller
|
|
*
|
|
* @category DMS
|
|
* @package SeedDMS
|
|
* @license GPL 2
|
|
* @version @version@
|
|
* @author Uwe Steinmann <uwe@steinmann.cx>
|
|
* @copyright Copyright (C) 2010-2013 Uwe Steinmann
|
|
* @version Release: @package_version@
|
|
*/
|
|
|
|
/**
|
|
* Class which does the busines logic when logging in
|
|
*
|
|
* @category DMS
|
|
* @package SeedDMS
|
|
* @author Uwe Steinmann <uwe@steinmann.cx>
|
|
* @copyright Copyright (C) 2010-2013 Uwe Steinmann
|
|
* @version Release: @package_version@
|
|
*/
|
|
class SeedDMS_Controller_Login extends SeedDMS_Controller_Common {
|
|
/**
|
|
* @var array $user set if user could be logged in
|
|
* @access protected
|
|
*/
|
|
static protected $user;
|
|
|
|
public function getUser() { /* {{{ */
|
|
return self::$user;
|
|
} /* }}} */
|
|
|
|
public function _finalize($user) { /* {{{ */
|
|
$settings = $this->params['settings'];
|
|
$session = $this->params['session'];
|
|
$sesstheme = $this->params['sesstheme'];
|
|
$source = isset($this->params['source']) ? $this->params['source'] : '';
|
|
$lang = $this->params['lang'];
|
|
|
|
self::$user = $user;
|
|
|
|
/* Check for other restrictions which prevent the user from login, though
|
|
* the authentication was successfull.
|
|
* Checking for a guest login the second time, makes only sense if there are
|
|
* more guest users and the login was done with a password and a user name
|
|
* unequal to 'guest'.
|
|
*/
|
|
$userid = $user->getID();
|
|
if (($userid == $settings->_guestID) && (!$settings->_enableGuestLogin)) {
|
|
$this->setErrorMsg("guest_login_disabled");
|
|
return false;
|
|
}
|
|
|
|
// Check if account is disabled
|
|
if($user->isDisabled()) {
|
|
$this->setErrorMsg("login_disabled_text");
|
|
return false;
|
|
}
|
|
|
|
// control admin IP address if required
|
|
if ($user->isAdmin() && ($_SERVER['REMOTE_ADDR'] != $settings->_adminIP ) && ( $settings->_adminIP != "") ){
|
|
$this->setErrorMsg("invalid_user_id");
|
|
return false;
|
|
}
|
|
|
|
if($settings->_enable2FactorAuthentication) {
|
|
if($user->getSecret()) {
|
|
$tfa = new \RobThree\Auth\TwoFactorAuth('SeedDMS');
|
|
if($tfa->verifyCode($user->getSecret(), $_POST['twofactauth']) !== true) {
|
|
$this->setErrorMsg("login_error_text");
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* Run any additional checks which may prevent login */
|
|
if(false === $this->callHook('restrictLogin', $user)) {
|
|
if(empty($this->errormsg))
|
|
$this->setErrorMsg("login_restrictions_apply");
|
|
return false;
|
|
}
|
|
|
|
/* Clear login failures if login was successful */
|
|
$user->clearLoginFailures();
|
|
|
|
/* Setting the theme and language and all the cookie handling is
|
|
* only done when authentication was requested from a weg page.
|
|
*/
|
|
if($source == 'web') {
|
|
// Capture the user's language and theme settings.
|
|
if ($lang) {
|
|
$user->setLanguage($lang);
|
|
} else {
|
|
$lang = $user->getLanguage();
|
|
if (strlen($lang)==0) {
|
|
$lang = $settings->_language;
|
|
$user->setLanguage($lang);
|
|
}
|
|
}
|
|
if ($sesstheme) {
|
|
$user->setTheme($sesstheme);
|
|
}
|
|
else {
|
|
$sesstheme = $user->getTheme();
|
|
/* Override the theme if the user doesn't have one or the default theme
|
|
* shall override it.
|
|
*/
|
|
if (strlen($sesstheme)==0 || !empty($settings->_overrideTheme)) {
|
|
$sesstheme = $settings->_theme;
|
|
// $user->setTheme($sesstheme);
|
|
}
|
|
}
|
|
|
|
// Delete all sessions that are more than 1 week or the configured
|
|
// cookie lifetime old. Probably not the most
|
|
// reliable place to put this check -- move to inc.Authentication.php?
|
|
if($settings->_cookieLifetime)
|
|
$lifetime = intval($settings->_cookieLifetime);
|
|
else
|
|
$lifetime = 7*86400;
|
|
if(!$session->deleteByTime($lifetime)) {
|
|
$this->setErrorMsg("error_occured");
|
|
return false;
|
|
}
|
|
|
|
if (isset($_COOKIE["mydms_session"])) {
|
|
/* This part will never be reached unless the session cookie is kept,
|
|
* but op.Logout.php deletes it. Keeping a session could be a good idea
|
|
* for retaining the clipboard data, but the user id in the session should
|
|
* be set to 0 which is not possible due to foreign key constraints.
|
|
* So for now op.Logout.php will delete the cookie as always
|
|
*/
|
|
/* Load session */
|
|
$dms_session = $_COOKIE["mydms_session"];
|
|
if(!$resArr = $session->load($dms_session)) {
|
|
/* Turn off http only cookies if jumploader is enabled */
|
|
setcookie("mydms_session", $dms_session, time()-3600, $settings->_httpRoot, null, false, true); //delete cookie
|
|
header("Location: " . $settings->_httpRoot . "out/out.Login.php?referuri=".$referuri);
|
|
exit;
|
|
} else {
|
|
$session->updateAccess($dms_session);
|
|
$session->setUser($userid);
|
|
}
|
|
} else {
|
|
// Create new session in database
|
|
if(!$id = $session->create(array('userid'=>$userid, 'theme'=>$sesstheme, 'lang'=>$lang))) {
|
|
$this->setErrorMsg("error_occured");
|
|
return false;
|
|
}
|
|
|
|
// Set the session cookie.
|
|
if($settings->_cookieLifetime)
|
|
$lifetime = time() + intval($settings->_cookieLifetime);
|
|
else
|
|
$lifetime = 0;
|
|
setcookie("mydms_session", $id, $lifetime, $settings->_httpRoot, null, false, true);
|
|
}
|
|
}
|
|
|
|
if($this->callHook('postLogin', $user)) {
|
|
}
|
|
|
|
return true;
|
|
} /* }}} */
|
|
|
|
public function run() { /* {{{ */
|
|
$dms = $this->params['dms'];
|
|
$settings = $this->params['settings'];
|
|
$session = $this->params['session'];
|
|
$authenticator = $this->params['authenticator'];
|
|
$source = isset($this->params['source']) ? $this->params['source'] : '';
|
|
$sesstheme = $this->getParam('sesstheme');
|
|
$referuri = $this->getParam('referuri');
|
|
$lang = $this->getParam('lang');
|
|
$login = $this->params['login'];
|
|
$pwd = $this->params['pwd'];
|
|
|
|
self::$user = null;
|
|
|
|
/* The preLogin hook may set self::$user which will prevent any further
|
|
* authentication process.
|
|
*/
|
|
if($this->callHook('preLogin')) {
|
|
}
|
|
|
|
$user = self::$user;
|
|
|
|
/* The password may only be empty if the guest user tries to log in.
|
|
* There is just one guest account with id $settings->_guestID which
|
|
* is allowed to log in without a password. All other guest accounts
|
|
* are treated like regular logins
|
|
*/
|
|
if(!$user && $settings->_enableGuestLogin && (int) $settings->_guestID) {
|
|
$guestUser = $dms->getUser((int) $settings->_guestID);
|
|
if($guestUser) {
|
|
if(($login != $guestUser->getLogin())) {
|
|
if ((!isset($pwd) || strlen($pwd)==0)) {
|
|
$this->setErrorMsg("login_error_text");
|
|
return false;
|
|
}
|
|
} else {
|
|
$user = $guestUser;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* Run any additional authentication method. The hook must return a
|
|
* valid user, if the authentication succeeded. If it fails, it must
|
|
* return false and if the hook doesn't care at all, if must return null.
|
|
*/
|
|
if(!$user) {
|
|
$user = $this->callHook('authenticate', $source);
|
|
if(false === $user) {
|
|
if(empty($this->errormsg))
|
|
$this->setErrorMsg("authentication_failed");
|
|
return false;
|
|
}
|
|
}
|
|
|
|
/* Deprecated: Run any additional authentication implemented in a hook */
|
|
if(!is_object($user) && isset($GLOBALS['SEEDDMS_HOOKS']['authentication'])) {
|
|
foreach($GLOBALS['SEEDDMS_HOOKS']['authentication'] as $authObj) {
|
|
if(!$user && method_exists($authObj, 'authenticate')) {
|
|
$user = $authObj->authenticate($dms, $settings, $login, $pwd);
|
|
if(false === $user) {
|
|
if(empty($this->errormsg))
|
|
$this->setErrorMsg("authentication_failed");
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
$user = $authenticator->authenticate($login, $pwd);
|
|
|
|
if(0) {
|
|
/* Authenticate against LDAP server {{{ */
|
|
if (!is_object($user) && isset($settings->_ldapHost) && strlen($settings->_ldapHost)>0) {
|
|
require_once("../inc/inc.ClassLdapAuthentication.php");
|
|
$authobj = new SeedDMS_LdapAuthentication($dms, $settings);
|
|
$user = $authobj->authenticate($login, $pwd);
|
|
if(!$user) {
|
|
add_log_line('Authentication against LDAP failed for user '.$login);
|
|
}
|
|
} /* }}} */
|
|
|
|
/* Authenticate against SeedDMS database {{{ */
|
|
if(!is_object($user)) {
|
|
require_once("../inc/inc.ClassDbAuthentication.php");
|
|
$authobj = new SeedDMS_DbAuthentication($dms, $settings);
|
|
$user = $authobj->authenticate($login, $pwd);
|
|
} /* }}} */
|
|
}
|
|
|
|
/* If the user is still not authenticated, then exit with an error */
|
|
if(!is_object($user)) {
|
|
/* if counting of login failures is turned on, then increment its value */
|
|
if($settings->_loginFailure) {
|
|
$user = $dms->getUserByLogin($login);
|
|
if($user) {
|
|
$failures = $user->addLoginFailure();
|
|
if($failures >= $settings->_loginFailure)
|
|
$user->setDisabled(true);
|
|
}
|
|
}
|
|
$this->callHook('loginFailed');
|
|
$this->setErrorMsg("login_error_text");
|
|
return false;
|
|
}
|
|
|
|
return self::_finalize($user);
|
|
|
|
} /* }}} */
|
|
}
|