X-Git-Url: http://git.polytechnique.org/?a=blobdiff_plain;f=modules%2Fauth.php;h=e222eebb05a657a9de4d8b47e9ba3ab2f4943af9;hb=e9a46d1a6839b5efc9a651a601fca80b9af70e7f;hp=702b47536791b5010940e2197d3f2eb45d740425;hpb=b8de879db1c1da7497ca22dd9ae4937f27aee0eb;p=platal.git diff --git a/modules/auth.php b/modules/auth.php index 702b475..e222eeb 100644 --- a/modules/auth.php +++ b/modules/auth.php @@ -30,9 +30,9 @@ class AuthModule extends PLModule 'webservices/manageurs.php' => $this->make_hook('manageurs', AUTH_PUBLIC, 'user', NO_HTTPS), 'auth-redirect.php' => $this->make_hook('redirect', AUTH_COOKIE, 'user'), - 'auth-groupex.php' => $this->make_hook('groupex_old', AUTH_COOKIE, 'user'), - 'auth-groupex' => $this->make_hook('groupex', AUTH_PUBLIC), - 'admin/auth-groupes-x' => $this->make_hook('admin_authgroupesx', AUTH_MDP, 'admin'), + 'auth-groupex.php' => $this->make_hook('groupex_old', AUTH_COOKIE, ''), + 'auth-groupex' => $this->make_hook('groupex', AUTH_PUBLIC, ''), + 'admin/auth-groupes-x' => $this->make_hook('admin_authgroupesx', AUTH_PASSWD, 'admin'), ); } @@ -118,8 +118,11 @@ class AuthModule extends PLModule */ function handler_groupex($page, $charset = 'utf8') { + $ext_url = urldecode(Get::s('url')); + if (!S::logged()) { - $page->assign('referer', true); + $page->assign('external_auth', true); + $page->assign('ext_url', $ext_url); $page->setTitle('Authentification'); $page->setDefaultSkin('group_login'); @@ -134,21 +137,24 @@ class AuthModule extends PLModule return PL_DO_AUTH; } + if (!S::user()->checkPerms('groups')) { + return PL_FORBIDDEN; + } + $this->load('auth.inc.php'); $gpex_pass = Get::s('pass'); - $gpex_url = urldecode(Get::s('url')); if (Get::has('session')) { - if (strpos($gpex_url, '?') === false) { - $gpex_url .= "?PHPSESSID=" . Get::s('session'); + if (strpos($ext_url, '?') === false) { + $ext_url .= "?PHPSESSID=" . Get::s('session'); } else { - $gpex_url .= "&PHPSESSID=" . Get::s('session'); + $ext_url .= "&PHPSESSID=" . Get::s('session'); } } // Normalize the return URL. - if (!preg_match("/^(http|https):\/\/.*/",$gpex_url)) { - $gpex_url = "http://$gpex_url"; + if (!preg_match("/^(http|https):\/\/.*/",$ext_url)) { + $ext_url = "http://$ext_url"; } $gpex_challenge = Get::s('challenge'); @@ -159,21 +165,30 @@ class AuthModule extends PLModule S::logger($uid)->log('connexion_auth_ext', $platal->path.' '.urldecode($_GET['url'])); } + if (Get::has('group')) { + $req_group_id = XDB::fetchOneCell('SELECT id + FROM groups + WHERE diminutif = {?}', + Get::s('group')); + } else { + $req_group_id = null; + } + // Iterate over the auth token to find which one did sign the request. $res = XDB::iterRow( 'SELECT ga.privkey, ga.name, ga.datafields, ga.returnurls, - ga.group_id, ga.group_strict, g.nom + ga.group_id, ga.flags, g.nom FROM group_auth AS ga LEFT JOIN groups AS g ON (g.id = ga.group_id)'); - while (list($privkey, $name, $datafields, $returnurls, $group_id, $group_strict, $group_name) = $res->next()) { + while (list($privkey, $name, $datafields, $returnurls, $group_id, $group_flags, $group_name) = $res->next()) { if (md5($gpex_challenge.$privkey) == $gpex_pass) { $returnurls = trim($returnurls); // We check that the return url matches a per-key regexp to prevent // replay attacks (more exactly to force replay attacks to redirect // the user to the real GroupeX website, which defeats the attack). - if (empty($returnurls) || @preg_match($returnurls, $gpex_url)) { - $returl = $gpex_url . gpex_make_params($gpex_challenge, $privkey, $datafields, $charset); + if (empty($returnurls) || @preg_match($returnurls, $ext_url)) { + $returl = $ext_url . gpex_make_params($gpex_challenge, $privkey, $datafields, $charset); XDB::execute('UPDATE group_auth SET last_used = DATE(NOW()) WHERE name = {?}', @@ -187,6 +202,14 @@ class AuthModule extends PLModule // - If the user is not 'xnet' and the group is 'strict', NOK // - Otherwise, all but 'xnet' accounts may access the URL. $user_is_xnet = S::user()->type == 'xnet'; + $group_flags = new PlFlagSet($group_flags); + + // If this key is not attached to a group, but a group was + // requested (e.g query from wiki / blogs / ...), use the + // requested group_id. + if (!$group_id && $req_group_id) { + $group_id = $req_group_id; + } if ($group_id) { // Check group permissions @@ -194,17 +217,26 @@ class AuthModule extends PLModule FROM group_members WHERE uid = {?} AND asso_id = {?}', S::user()->id(), $group_id); - if (!$is_member && ($user_is_xnet || $group_strict)) { + if (!$is_member && ($user_is_xnet || $group_flags->hasFlag('group_only'))) { $page->kill("Le site demandé est réservé aux membres du groupe $group_name."); } - } else if ($user_is_xnet) { + } else if ($user_is_xnet && !$group_flags->hasFlag('allow_xnet')) { $page->kill("Le site demandé est réservé aux polytechniciens."); } + // If we logged in specifically for this 'external_auth' request + // and didn't want to "keep access to services", we kill the session + // just before returning. + // See classes/xorgsession.php:startSessionAs + if (S::b('external_auth_exit')) { + S::logger()->log('decconnexion', @$_SERVER['HTTP_REFERER']); + Platal::session()->killAccessCookie(); + Platal::session()->destroy(); + } http_redirect($returl); } else if (S::admin()) { - $page->kill("La requête d'authentification a échouée (url de retour invalide)."); + $page->kill("La requête d'authentification a échoué (url de retour invalide)."); } } }