You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
177 lines
7.6 KiB
177 lines
7.6 KiB
//User.java
|
|
//-----------------------
|
|
//part of the AnomicHTTPD caching proxy
|
|
//(C) by Michael Peter Christen; mc@anomic.de
|
|
//first published on http://www.anomic.de
|
|
//Frankfurt, Germany, 2004
|
|
//
|
|
//This File is contributed by Alexander Schier
|
|
//last major change: 12.11.2005
|
|
//
|
|
//This program is free software; you can redistribute it and/or modify
|
|
//it under the terms of the GNU General Public License as published by
|
|
//the Free Software Foundation; either version 2 of the License, or
|
|
//(at your option) any later version.
|
|
//
|
|
//This program is distributed in the hope that it will be useful,
|
|
//but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
//MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
//GNU General Public License for more details.
|
|
//
|
|
//You should have received a copy of the GNU General Public License
|
|
//along with this program; if not, write to the Free Software
|
|
//Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
//
|
|
//Using this software in any meaning (reading, learning, copying, compiling,
|
|
//running) means that you agree that the Author(s) is (are) not responsible
|
|
//for cost, loss of data or any harm that may be caused directly or indirectly
|
|
//by usage of this softare or this documentation. The usage of this software
|
|
//is on your own risk. The installation and usage (starting/running) of this
|
|
//software may allow other people or application to access your computer and
|
|
//any attached devices and is highly dependent on the configuration of the
|
|
//software which must be done by the user of the software; the author(s) is
|
|
//(are) also not responsible for proper configuration and usage of the
|
|
//software, even if provoked by documentation provided together with
|
|
//the software.
|
|
//
|
|
//Any changes to this file according to the GPL as documented in the file
|
|
//gpl.txt aside this file in the shipment you received can be done to the
|
|
//lines that follows this copyright notice here, but changes must not be
|
|
//done inside the copyright notive above. A re-distribution must contain
|
|
//the intact and unchanged copyright notice.
|
|
//Contributions and changes to the program code must be marked as such.
|
|
|
|
|
|
//You must compile this file with
|
|
//javac -classpath .:../Classes Message.java
|
|
//if the shell's current path is HTROOT
|
|
|
|
import java.io.IOException;
|
|
|
|
import de.anomic.data.userDB;
|
|
import de.anomic.http.httpHeader;
|
|
import de.anomic.kelondro.kelondroBase64Order;
|
|
import de.anomic.plasma.plasmaSwitchboard;
|
|
import de.anomic.server.serverCodings;
|
|
import de.anomic.server.serverObjects;
|
|
import de.anomic.server.serverSwitch;
|
|
|
|
public class User{
|
|
|
|
public static serverObjects respond(httpHeader header, serverObjects post, serverSwitch env) {
|
|
serverObjects prop = new serverObjects();
|
|
plasmaSwitchboard sb = plasmaSwitchboard.getSwitchboard();
|
|
userDB.Entry entry=null;
|
|
|
|
//default values
|
|
prop.put("logged_in", 0);
|
|
prop.put("logged-in_limit", 0);
|
|
prop.put("status", 0);
|
|
//identified via HTTPPassword
|
|
entry=sb.userDB.proxyAuth(((String) header.get(httpHeader.AUTHORIZATION, "xxxxxx")));
|
|
if(entry != null){
|
|
prop.put("logged-in_identified-by", 1);
|
|
//try via cookie
|
|
}else{
|
|
entry=sb.userDB.cookieAuth(userDB.getLoginToken(header.getHeaderCookies()));
|
|
prop.put("logged-in_identified-by", 2);
|
|
//try via ip
|
|
if(entry == null){
|
|
entry=sb.userDB.ipAuth(((String)header.get("CLIENTIP", "xxxxxx")));
|
|
if(entry != null){
|
|
prop.put("logged-in_identified-by", 0);
|
|
}
|
|
}
|
|
}
|
|
|
|
//identified via userDB
|
|
if(entry != null){
|
|
prop.put("logged-in", 1);
|
|
prop.put("logged-in_username", entry.getUserName());
|
|
if(entry.getTimeLimit() > 0){
|
|
prop.put("logged-in_limit", 1);
|
|
long limit=entry.getTimeLimit();
|
|
long used=entry.getTimeUsed();
|
|
prop.put("logged-in_limit_timelimit", limit);
|
|
prop.put("logged-in_limit_timeused", used);
|
|
int percent=0;
|
|
if(limit!=0 && used != 0)
|
|
percent=(int)((float)used/(float)limit*100);
|
|
prop.put("logged-in_limit_percent", percent/3);
|
|
prop.put("logged-in_limit_percent2", (100-percent)/3);
|
|
}
|
|
//logged in via static Password
|
|
}else if(sb.verifyAuthentication(header, true)){
|
|
prop.put("logged-in", 2);
|
|
//identified via form-login
|
|
//TODO: this does not work for a static admin, yet.
|
|
}else if(post != null && post.containsKey("username") && post.containsKey("password")){
|
|
//entry=sb.userDB.passwordAuth((String)post.get("username"), (String)post.get("password"), (String)header.get("CLIENTIP", "xxxxxx"));
|
|
String username=(String)post.get("username");
|
|
String password=(String)post.get("password");
|
|
|
|
entry=sb.userDB.passwordAuth(username, password);
|
|
boolean staticAdmin = sb.getConfig("adminAccountBase64MD5", "").equals(
|
|
serverCodings.encodeMD5Hex(
|
|
kelondroBase64Order.standardCoder.encodeString(username + ":" + password)
|
|
)
|
|
);
|
|
String cookie="";
|
|
if(entry != null)
|
|
//set a random token in a cookie
|
|
cookie=sb.userDB.getCookie(entry);
|
|
else if(staticAdmin)
|
|
cookie=sb.userDB.getAdminCookie();
|
|
|
|
if(entry != null || staticAdmin){
|
|
httpHeader outgoingHeader=new httpHeader();
|
|
outgoingHeader.setCookie("login", cookie);
|
|
prop.setOutgoingHeader(outgoingHeader);
|
|
|
|
prop.put("logged-in", 1);
|
|
prop.put("logged-in_identified-by", 1);
|
|
prop.put("logged-in_username", username);
|
|
if(post.containsKey("returnto")){
|
|
prop.put("LOCATION", (String)post.get("returnto"));
|
|
}
|
|
}
|
|
}
|
|
|
|
if(post!= null && entry != null){
|
|
if(post.containsKey("changepass")){
|
|
prop.put("status", 1); //password
|
|
if(entry.getMD5EncodedUserPwd().equals(serverCodings.encodeMD5Hex(entry.getUserName()+":"+post.get("oldpass", "")))){
|
|
if(post.get("newpass").equals(post.get("newpass2"))){
|
|
if(!post.get("newpass", "").equals("")){
|
|
try {
|
|
entry.setProperty(userDB.Entry.MD5ENCODED_USERPWD_STRING, serverCodings.encodeMD5Hex(entry.getUserName()+":"+post.get("newpass", "")));
|
|
prop.put("status_password", 0); //changes
|
|
} catch (IOException e) {}
|
|
}else{
|
|
prop.put("status_password", 3); //empty
|
|
}
|
|
}else{
|
|
prop.put("status_password", 2); //pws do not match
|
|
}
|
|
}else{
|
|
prop.put("status_password", 1); //old pw wrong
|
|
}
|
|
}
|
|
}
|
|
if(post!=null && post.containsKey("logout")){
|
|
prop.put("logged-in",0);
|
|
if(entry != null){
|
|
entry.logout(((String)header.get("CLIENTIP", "xxxxxx")), userDB.getLoginToken(header.getHeaderCookies())); //todo: logout cookie
|
|
}else{
|
|
sb.userDB.adminLogout(userDB.getLoginToken(header.getHeaderCookies()));
|
|
}
|
|
//XXX: This should not be needed anymore, because of isLoggedout
|
|
if(! ((String) header.get(httpHeader.AUTHORIZATION, "xxxxxx")).equals("xxxxxx")){
|
|
prop.put("AUTHENTICATE","admin log-in");
|
|
}
|
|
}
|
|
// return rewrite properties
|
|
return prop;
|
|
}
|
|
}
|