X-Git-Url: https://git.mxchange.org/?a=blobdiff_plain;f=include%2Fauth.php;h=4c695cc1e3be345320a41debea00297b49cae016;hb=2e8caf7f27197be5f12ea22f4a5e9aae2bb1ee89;hp=5e454745e3879b87848558ef6207de63be2fe746;hpb=c6267a2cd2e3a731f44df9288ced508ad90c4ca3;p=friendica.git diff --git a/include/auth.php b/include/auth.php index 5e454745e3..4c695cc1e3 100644 --- a/include/auth.php +++ b/include/auth.php @@ -1,93 +1,211 @@ module == "logout") { - unset($_SESSION['authenticated']); - unset($_SESSION['uid']); - unset($_SESSION['visitor_id']); - unset($_SESSION['administrator']); - unset($_SESSION['cid']); - $_SESSION['sysmsg'] = "Logged out." . EOL; - goaway($a->get_baseurl()); + + + +if((isset($_SESSION)) && (x($_SESSION,'authenticated')) && ((! (x($_POST,'auth-params'))) || ($_POST['auth-params'] !== 'login'))) { + + if(((x($_POST,'auth-params')) && ($_POST['auth-params'] === 'logout')) || ($a->module === 'logout')) { + + // process logout request + call_hooks("logging_out"); + nuke_session(); + info( t('Logged out.') . EOL); + goaway(z_root()); + } + + if(x($_SESSION,'visitor_id') && (! x($_SESSION,'uid'))) { + $r = q("SELECT * FROM `contact` WHERE `id` = %d LIMIT 1", + intval($_SESSION['visitor_id']) + ); + if(count($r)) { + $a->contact = $r[0]; + } } + if(x($_SESSION,'uid')) { - $r = q("SELECT * FROM `user` WHERE `uid` = %d LIMIT 1", - intval($_SESSION['uid'])); - if($r === NULL || (! count($r))) { - goaway($a->get_baseurl()); + + // already logged in user returning + + $check = get_config('system','paranoia'); + // extra paranoia - if the IP changed, log them out + if($check && ($_SESSION['addr'] != $_SERVER['REMOTE_ADDR'])) { + logger('Session address changed. Paranoid setting in effect, blocking session. ' + . $_SESSION['addr'] . ' != ' . $_SERVER['REMOTE_ADDR']); + nuke_session(); + goaway(z_root()); } - $a->user = $r[0]; - if(strlen($a->user['timezone'])) - date_default_timezone_set($a->user['timezone']); - $r = q("SELECT * FROM `contact` WHERE `uid` = %s AND `self` = 1 LIMIT 1", - intval($_SESSION['uid'])); - if(count($r)) { - $a->cid = $r[0]['id']; - $_SESSION['cid'] = $a->cid; + $r = q("SELECT `user`.*, `user`.`pubkey` as `upubkey`, `user`.`prvkey` as `uprvkey` + FROM `user` WHERE `uid` = %d AND `blocked` = 0 AND `account_expired` = 0 AND `account_removed` = 0 AND `verified` = 1 LIMIT 1", + intval($_SESSION['uid']) + ); + + if(! count($r)) { + nuke_session(); + goaway(z_root()); } + + // Make sure to refresh the last login time for the user if the user + // stays logged in for a long time, e.g. with "Remember Me" + $login_refresh = false; + if(! x($_SESSION['last_login_date'])) { + $_SESSION['last_login_date'] = datetime_convert('UTC','UTC'); + } + if( strcmp(datetime_convert('UTC','UTC','now - 12 hours'), $_SESSION['last_login_date']) > 0 ) { + + $_SESSION['last_login_date'] = datetime_convert('UTC','UTC'); + $login_refresh = true; + } + authenticate_success($r[0], false, false, $login_refresh); } } else { - unset($_SESSION['authenticated']); - unset($_SESSION['uid']); - unset($_SESSION['visitor_id']); - unset($_SESSION['administrator']); - unset($_SESSION['cid']); - $encrypted = hash('whirlpool',trim($_POST['password'])); - - if((x($_POST,'auth-params')) && $_POST['auth-params'] == 'login') { - $r = q("SELECT * FROM `user` - WHERE `email` = '%s' AND `password` = '%s' LIMIT 1", - dbesc(trim($_POST['login-name'])), - dbesc($encrypted)); - if(($r === false) || (! count($r))) { - $_SESSION['sysmsg'] = 'Login failed.' . EOL ; - goaway($a->get_baseurl()); + + if(isset($_SESSION)) { + nuke_session(); + } + + if((x($_POST,'password')) && strlen($_POST['password'])) + $encrypted = hash('whirlpool',trim($_POST['password'])); + else { + if((x($_POST,'openid_url')) && strlen($_POST['openid_url']) || + (x($_POST,'username')) && strlen($_POST['username'])) { + + $noid = get_config('system','no_openid'); + + $openid_url = trim((strlen($_POST['openid_url'])?$_POST['openid_url']:$_POST['username']) ); + + // validate_url alters the calling parameter + + $temp_string = $openid_url; + + // if it's an email address or doesn't resolve to a URL, fail. + + if(($noid) || (strpos($temp_string,'@')) || (! validate_url($temp_string))) { + $a = get_app(); + notice( t('Login failed.') . EOL); + goaway(z_root()); + // NOTREACHED + } + + // Otherwise it's probably an openid. + + try { + require_once('library/openid.php'); + $openid = new LightOpenID; + $openid->identity = $openid_url; + $_SESSION['openid'] = $openid_url; + $a = get_app(); + $openid->returnUrl = $a->get_baseurl(true) . '/openid'; + goaway($openid->authUrl()); + } catch (Exception $e) { + notice( t('We encountered a problem while logging in with the OpenID you provided. Please check the correct spelling of the ID.').'

'. t('The error message was:').' '.$e->getMessage()); + } + // NOTREACHED + } + } + + if((x($_POST,'auth-params')) && $_POST['auth-params'] === 'login') { + + $record = null; + + $addon_auth = array( + 'username' => trim($_POST['username']), + 'password' => trim($_POST['password']), + 'authenticated' => 0, + 'user_record' => null + ); + + /** + * + * A plugin indicates successful login by setting 'authenticated' to non-zero value and returning a user record + * Plugins should never set 'authenticated' except to indicate success - as hooks may be chained + * and later plugins should not interfere with an earlier one that succeeded. + * + */ + + call_hooks('authenticate', $addon_auth); + + if(($addon_auth['authenticated']) && (count($addon_auth['user_record']))) { + $record = $addon_auth['user_record']; + } + else { + + // process normal login request + + $r = q("SELECT `user`.*, `user`.`pubkey` as `upubkey`, `user`.`prvkey` as `uprvkey` + FROM `user` WHERE ( `email` = '%s' OR `nickname` = '%s' ) + AND `password` = '%s' AND `blocked` = 0 AND `account_expired` = 0 AND `account_removed` = 0 AND `verified` = 1 LIMIT 1", + dbesc(trim($_POST['username'])), + dbesc(trim($_POST['username'])), + dbesc($encrypted) + ); + if(count($r)) + $record = $r[0]; + } + + if((! $record) || (! count($record))) { + logger('authenticate: failed login attempt: ' . notags(trim($_POST['username'])) . ' from IP ' . $_SERVER['REMOTE_ADDR']); + notice( t('Login failed.') . EOL ); + goaway(z_root()); } - $_SESSION['uid'] = $r[0]['uid']; - $_SESSION['admin'] = $r[0]['admin']; - $_SESSION['authenticated'] = 1; - if(x($r[0],'nickname')) - $_SESSION['my_url'] = $a->get_baseurl() . '/profile/' . $r[0]['nickname']; - else - $_SESSION['my_url'] = $a->get_baseurl() . '/profile/' . $r[0]['uid']; - - $_SESSION['sysmsg'] = "Welcome back " . $r[0]['username'] . EOL; - $a->user = $r[0]; - if(strlen($a->user['timezone'])) - date_default_timezone_set($a->user['timezone']); - - $r = q("SELECT * FROM `contact` WHERE `uid` = %s AND `self` = 1 LIMIT 1", - intval($_SESSION['uid'])); - if(count($r)) { - $a->cid = $r[0]['id']; - $_SESSION['cid'] = $a->cid; + + // If the user specified to remember the authentication, then change the cookie + // to expire after one year (the default is when the browser is closed). + // If the user did not specify to remember, change the cookie to expire when the + // browser is closed. The reason this is necessary is because if the user + // specifies to remember, then logs out and logs back in without specifying to + // remember, the old "remember" cookie may remain and prevent the session from + // expiring when the browser is closed. + // + // It seems like I should be able to test for the old cookie, but for some reason when + // I read the lifetime value from session_get_cookie_params(), I always get '0' + // (i.e. expire when the browser is closed), even when there's a time expiration + // on the cookie + if($_POST['remember']) { + new_cookie(31449600); // one year + } + else { + new_cookie(0); // 0 means delete on browser exit } + // if we haven't failed up this point, log them in. + $_SESSION['last_login_date'] = datetime_convert('UTC','UTC'); + authenticate_success($record, true, true); } } -// Returns an array of group id's this contact is a member of. -// This array will only contain group id's related to the uid of this -// DFRN contact. They are *not* neccessarily unique across the entire site. - - -if(! function_exists('init_groups_visitor')) { -function init_groups_visitor($contact_id) { - $groups = array(); - $r = q("SELECT `gid` FROM `group_member` - WHERE `contact-id` = %d ", - intval($contact_id) - ); - if(count($r)) { - foreach($r as $rr) - $groups[] = $rr['gid']; - } - return $groups; -}} - +function new_cookie($time) { + $old_sid = session_id(); + session_set_cookie_params("$time"); + session_regenerate_id(false); + q("UPDATE session SET sid = '%s' WHERE sid = '%s'", dbesc(session_id()), dbesc($old_sid)); +}