X-Git-Url: http://git.polytechnique.org/?a=blobdiff_plain;f=modules%2Fauth.php;h=0d09dceffe181aa7defa45207c4eecd582db14f6;hb=1aff3b59c0f46dafe3396c1123a252645805e233;hp=688c5c5eeb31ad106639737562c484abcacfb7be;hpb=ba1cbd51cd218c3a8caf6d9518df9d2367a9ae54;p=platal.git diff --git a/modules/auth.php b/modules/auth.php index 688c5c5..0d09dce 100644 --- a/modules/auth.php +++ b/modules/auth.php @@ -1,6 +1,6 @@ assign('referer', true); + $page->assign('external_auth', true); + $page->assign('ext_url', $ext_url); $page->setTitle('Authentification'); $page->setDefaultSkin('group_login'); @@ -131,6 +134,8 @@ class AuthModule extends PLModule } else { $page->assign('group', null); } + // Add a P3P header for compatibility with IE in iFrames (http://www.w3.org/TR/P3P11/#compact_policies) + header('P3P: CP="CAO COR CURa ADMa DEVa OUR IND PHY ONL COM NAV DEM CNT STA PRE"'); return PL_DO_AUTH; } @@ -141,18 +146,17 @@ class AuthModule extends PLModule $this->load('auth.inc.php'); $gpex_pass = Get::s('pass'); - $gpex_url = urldecode(Get::s('url')); if (Get::has('session')) { - if (strpos($gpex_url, '?') === false) { - $gpex_url .= "?PHPSESSID=" . Get::s('session'); + if (strpos($ext_url, '?') === false) { + $ext_url .= "?PHPSESSID=" . Get::s('session'); } else { - $gpex_url .= "&PHPSESSID=" . Get::s('session'); + $ext_url .= "&PHPSESSID=" . Get::s('session'); } } // Normalize the return URL. - if (!preg_match("/^(http|https):\/\/.*/",$gpex_url)) { - $gpex_url = "http://$gpex_url"; + if (!preg_match("/^(http|https):\/\/.*/",$ext_url)) { + $ext_url = "http://$ext_url"; } $gpex_challenge = Get::s('challenge'); @@ -185,8 +189,8 @@ class AuthModule extends PLModule // We check that the return url matches a per-key regexp to prevent // replay attacks (more exactly to force replay attacks to redirect // the user to the real GroupeX website, which defeats the attack). - if (empty($returnurls) || @preg_match($returnurls, $gpex_url)) { - $returl = $gpex_url . gpex_make_params($gpex_challenge, $privkey, $datafields, $charset); + if (empty($returnurls) || @preg_match($returnurls, $ext_url)) { + $returl = $ext_url . gpex_make_params($gpex_challenge, $privkey, $datafields, $charset); XDB::execute('UPDATE group_auth SET last_used = DATE(NOW()) WHERE name = {?}', @@ -223,9 +227,18 @@ class AuthModule extends PLModule $page->kill("Le site demandé est réservé aux polytechniciens."); } + // If we logged in specifically for this 'external_auth' request + // and didn't want to "keep access to services", we kill the session + // just before returning. + // See classes/xorgsession.php:startSessionAs + if (S::b('external_auth_exit')) { + S::logger()->log('decconnexion', @$_SERVER['HTTP_REFERER']); + Platal::session()->killAccessCookie(); + Platal::session()->destroy(); + } http_redirect($returl); } else if (S::admin()) { - $page->kill("La requête d'authentification a échouée (url de retour invalide)."); + $page->kill("La requête d'authentification a échoué (url de retour invalide)."); } } } @@ -249,5 +262,5 @@ class AuthModule extends PLModule } } -// vim:set et sw=4 sts=4 sws=4 foldmethod=marker enc=utf-8: +// vim:set et sw=4 sts=4 sws=4 foldmethod=marker fenc=utf-8: ?>