0d9e12b904e75a1dc85b311d1cefd541447d7a72
[platal.git] / modules / auth.php
1 <?php
2 /***************************************************************************
3 * Copyright (C) 2003-2011 Polytechnique.org *
4 * http://opensource.polytechnique.org/ *
5 * *
6 * This program is free software; you can redistribute it and/or modify *
7 * it under the terms of the GNU General Public License as published by *
8 * the Free Software Foundation; either version 2 of the License, or *
9 * (at your option) any later version. *
10 * *
11 * This program is distributed in the hope that it will be useful, *
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
14 * GNU General Public License for more details. *
15 * *
16 * You should have received a copy of the GNU General Public License *
17 * along with this program; if not, write to the Free Software *
18 * Foundation, Inc., *
19 * 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA *
20 ***************************************************************************/
21
22 class AuthModule extends PLModule
23 {
24 function handlers()
25 {
26 return array(
27 'groupex/donne-chall.php' => $this->make_hook('chall', AUTH_PUBLIC),
28 'groupex/export-econfiance.php' => $this->make_hook('econf', AUTH_PUBLIC, 'user', NO_HTTPS),
29
30 'webservices/manageurs.php' => $this->make_hook('manageurs', AUTH_PUBLIC, 'user', NO_HTTPS),
31
32 'auth-redirect.php' => $this->make_hook('redirect', AUTH_COOKIE, 'user'),
33 'auth-groupex.php' => $this->make_hook('groupex_old', AUTH_COOKIE, ''),
34 'auth-groupex' => $this->make_hook('groupex', AUTH_PUBLIC, ''),
35 'admin/auth-groupes-x' => $this->make_hook('admin_authgroupesx', AUTH_PASSWD, 'admin'),
36 );
37 }
38
39 function handler_chall($page)
40 {
41 $_SESSION["chall"] = uniqid(rand(), 1);
42 echo $_SESSION["chall"] . "\n" . session_id();
43 exit;
44 }
45
46 function handler_econf($page)
47 {
48 global $globals;
49
50 $cle = $globals->core->econfiance;
51
52 $res = "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n\n<membres>\n\n";
53
54 if (S::v('chall') && Get::s('PASS') == md5(S::v('chall').$cle)) {
55 $list = new MMList(User::getWithUID(10154), "x-econfiance.polytechnique.org");
56 $members = $list->get_members('membres');
57 if (is_array($members)) {
58 $membres = Array();
59 foreach($members[1] as $member) {
60 $user = User::getSilent($member[1]);
61 if ($user && $user->hasProfile()) {
62 $profile = $user->profile();
63 $res .= "<membre>\n";
64 $res .= "\t<nom>" . $profile->lastName() . "</nom>\n";
65 $res .= "\t<prenom>" . $profile->firstName() . "</prenom>\n";
66 $res .= "\t<email>" . $user->forlifeEmail() . "</email>\n";
67 $res .= "</membre>\n\n";
68 }
69 }
70 }
71 $res .= "</membres>\n\n";
72
73 pl_content_headers("text/xml");
74 echo $res;
75 }
76 exit;
77 }
78
79 function handler_manageurs($page)
80 {
81 global $globals;
82
83 require_once 'webservices/manageurs.server.inc.php';
84
85 $ips = array_flip(explode(' ', $globals->manageurs->authorized_ips));
86 if ($ips && isset($ips[$_SERVER['REMOTE_ADDR']])) {
87 $server = xmlrpc_server_create();
88
89 xmlrpc_server_register_method($server, 'get_annuaire_infos', 'get_annuaire_infos');
90 xmlrpc_server_register_method($server, 'get_nouveau_infos', 'get_nouveau_infos');
91
92 $request = @$GLOBALS['HTTP_RAW_POST_DATA'];
93 $response = xmlrpc_server_call_method($server, $request, null);
94 pl_content_headers("text/xml");
95 print $response;
96 xmlrpc_server_destroy($server);
97 }
98
99 exit;
100 }
101
102 function handler_redirect($page)
103 {
104 http_redirect(Env::v('dest', '/'));
105 }
106
107 function handler_groupex_old($page)
108 {
109 return $this->handler_groupex($page, 'iso-8859-1');
110 }
111
112 /** Handles the 'auth-groupe-x' authentication.
113 * Expects the following GET parameters:
114 * - pass: the 'password' for the authentication
115 * - challenge: the authentication challenge
116 * - url: the return URL
117 * - session: the remote PHP session ID
118 */
119 function handler_groupex($page, $charset = 'utf8')
120 {
121 $gpex_url = urldecode(Get::s('url'));
122
123 if (!S::logged()) {
124 $page->assign('external_auth', true);
125 $page->assign('gpex_url', $gpex_url);
126 $page->setTitle('Authentification');
127 $page->setDefaultSkin('group_login');
128
129 if (Get::has('group')) {
130 $res = XDB::query('SELECT nom
131 FROM groups
132 WHERE diminutif = {?}', Get::s('group'));
133 $page->assign('group', $res->fetchOneCell());
134 } else {
135 $page->assign('group', null);
136 }
137 return PL_DO_AUTH;
138 }
139
140 if (!S::user()->checkPerms('groups')) {
141 return PL_FORBIDDEN;
142 }
143
144 $this->load('auth.inc.php');
145
146 $gpex_pass = Get::s('pass');
147 if (Get::has('session')) {
148 if (strpos($gpex_url, '?') === false) {
149 $gpex_url .= "?PHPSESSID=" . Get::s('session');
150 } else {
151 $gpex_url .= "&PHPSESSID=" . Get::s('session');
152 }
153 }
154
155 // Normalize the return URL.
156 if (!preg_match("/^(http|https):\/\/.*/",$gpex_url)) {
157 $gpex_url = "http://$gpex_url";
158 }
159 $gpex_challenge = Get::s('challenge');
160
161 // Update the last login information (unless the user is in SUID).
162 $uid = S::i('uid');
163 if (!S::suid()) {
164 global $platal;
165 S::logger($uid)->log('connexion_auth_ext', $platal->path.' '.urldecode($_GET['url']));
166 }
167
168 if (Get::has('group')) {
169 $req_group_id = XDB::fetchOneCell('SELECT id
170 FROM groups
171 WHERE diminutif = {?}',
172 Get::s('group'));
173 } else {
174 $req_group_id = null;
175 }
176
177 // Iterate over the auth token to find which one did sign the request.
178 $res = XDB::iterRow(
179 'SELECT ga.privkey, ga.name, ga.datafields, ga.returnurls,
180 ga.group_id, ga.flags, g.nom
181 FROM group_auth AS ga
182 LEFT JOIN groups AS g ON (g.id = ga.group_id)');
183
184 while (list($privkey, $name, $datafields, $returnurls, $group_id, $group_flags, $group_name) = $res->next()) {
185 if (md5($gpex_challenge.$privkey) == $gpex_pass) {
186 $returnurls = trim($returnurls);
187 // We check that the return url matches a per-key regexp to prevent
188 // replay attacks (more exactly to force replay attacks to redirect
189 // the user to the real GroupeX website, which defeats the attack).
190 if (empty($returnurls) || @preg_match($returnurls, $gpex_url)) {
191 $returl = $gpex_url . gpex_make_params($gpex_challenge, $privkey, $datafields, $charset);
192 XDB::execute('UPDATE group_auth
193 SET last_used = DATE(NOW())
194 WHERE name = {?}',
195 $name);
196
197 // Two conditions control access to the return URL:
198 // - If that URL is attached to a group:
199 // - If the user belongs to the group, OK
200 // - If the user is 'xnet' and doesn't belong, NOK
201 // - If the user is not 'xnet' and the group is not 'strict', OK
202 // - If the user is not 'xnet' and the group is 'strict', NOK
203 // - Otherwise, all but 'xnet' accounts may access the URL.
204 $user_is_xnet = S::user()->type == 'xnet';
205 $group_flags = new PlFlagSet($group_flags);
206
207 // If this key is not attached to a group, but a group was
208 // requested (e.g query from wiki / blogs / ...), use the
209 // requested group_id.
210 if (!$group_id && $req_group_id) {
211 $group_id = $req_group_id;
212 }
213
214 if ($group_id) {
215 // Check group permissions
216 $is_member = XDB::fetchOneCell('SELECT COUNT(*)
217 FROM group_members
218 WHERE uid = {?} AND asso_id = {?}',
219 S::user()->id(), $group_id);
220 if (!$is_member && ($user_is_xnet || $group_flags->hasFlag('group_only'))) {
221 $page->kill("Le site demandé est réservé aux membres du groupe $group_name.");
222 }
223
224 } else if ($user_is_xnet && !$group_flags->hasFlag('allow_xnet')) {
225 $page->kill("Le site demandé est réservé aux polytechniciens.");
226 }
227
228 // If we logged in specifically for this 'external_auth' request
229 // and didn't want to "keep access to services", we kill the session
230 // just before returning.
231 // See classes/xorgsession.php:startSessionAs
232 if (S::b('external_auth_exit')) {
233 S::logger()->log('decconnexion', @$_SERVER['HTTP_REFERER']);
234 Platal::session()->killAccessCookie();
235 Platal::session()->destroy();
236 }
237 http_redirect($returl);
238 } else if (S::admin()) {
239 $page->kill("La requête d'authentification a échoué (url de retour invalide).");
240 }
241 }
242 }
243
244 // Otherwise (if no valid request was found, or if the return URL is not
245 // acceptable), the user is redirected back to our homepage.
246 pl_redirect('/');
247 }
248
249 function handler_admin_authgroupesx($page, $action = 'list', $id = null)
250 {
251 $page->setTitle('Administration - Auth groupes X');
252 $page->assign('title', 'Gestion de l\'authentification centralisée');
253 $table_editor = new PLTableEditor('admin/auth-groupes-x','group_auth','id');
254 $table_editor->describe('name','nom',true);
255 $table_editor->describe('privkey','clé privée',false, true);
256 $table_editor->describe('datafields','champs renvoyés',true);
257 $table_editor->describe('returnurls','urls de retour',true);
258 $table_editor->describe('last_used', 'dernière utilisation', true);
259 $table_editor->apply($page, $action, $id);
260 }
261 }
262
263 // vim:set et sw=4 sts=4 sws=4 foldmethod=marker enc=utf-8:
264 ?>