diff --git a/htroot/User.java b/htroot/User.java index aa354eb5c..e3091b800 100644 --- a/htroot/User.java +++ b/htroot/User.java @@ -50,6 +50,7 @@ import java.io.IOException; import de.anomic.data.userDB; import de.anomic.http.httpHeader; +import de.anomic.kelondro.kelondroBase64Order; import de.anomic.plasma.plasmaSwitchboard; import de.anomic.server.serverCodings; import de.anomic.server.serverObjects; @@ -57,17 +58,6 @@ import de.anomic.server.serverSwitch; public class User{ - private static String getLoginToken(String cookies){ - String[] cookie=cookies.split(";"); //TODO: Mozilla uses - String[] pair; - for(int i=0;iresult) result=tmp; + return result; + } + public int staticAdminAuthenticated(String authorization){ + if(authorization==null) return 1; if (authorization.length() == 0) return 1; // no authentication information given - if ((((String) header.get("CLIENTIP", "")).equals("localhost")) && (adminAccountBase64MD5.equals(authorization))) return 3; // soft-authenticated for localhost + String adminAccountBase64MD5 = getConfig("adminAccountBase64MD5", ""); + if (adminAccountBase64MD5.length() == 0) return 2; // no passwrd stored if (adminAccountBase64MD5.equals(serverCodings.encodeMD5Hex(authorization))) return 4; // hard-authenticated, all ok - if (userDB.hasAdminRight((String)header.get(httpHeader.AUTHORIZATION, "xxxxxx"))) return 4; - return 0; // wrong password + return 0; } public boolean verifyAuthentication(httpHeader header, boolean strict) {