6 * \defgroup WebcitAuth WebcitAuth; Handles authentication of users to a Citadel server.
7 * \ingroup CitadelConfig
17 * the plain text states of a user. filled in at \ function TODO initialize_ax_defs()
22 void initialize_axdefs(void) {
23 axdefs[0] = _("Deleted"); /*!0: an erased user */
24 axdefs[1] = _("New User"); /*!1: a new user */
25 axdefs[2] = _("Problem User"); /*!2: a trouble maker */
26 axdefs[3] = _("Local User"); /*!3: user with normal privileges */
27 axdefs[4] = _("Network User"); /*!4: a user that may access network resources */
28 axdefs[5] = _("Preferred User");/*!5: a moderator */
29 axdefs[6] = _("Aide"); /*!6: chief */
36 * \brief Display the login screen
37 * \param mesg The error message if last attempt failed.
39 void display_login(char *mesg)
43 output_headers(1, 1, 2, 0, 0, 0);
44 wprintf("<div style=\"position:absolute; top:20px; left:20px; right:20px\">\n");
46 if (mesg != NULL) if (strlen(mesg) > 0) {
47 stresc(buf, mesg, 0, 0);
48 svprintf("mesg", WCS_STRING, "%s", buf);
51 svprintf("LOGIN_INSTRUCTIONS", WCS_STRING,
53 "<li><b>If you already have an account on %s</b>, "
54 "enter your user name and password and click "Login." "
55 "<li><b>If you are a new user</b>, enter the name and password "
57 "and click "New User." "
58 "<li>Please log off properly when finished. "
59 "<li>You must use a browser that supports <i>frames</i> and "
61 "<li>Also keep in mind that if your browser is "
62 "configured to block pop-up windows, you will not be able "
63 "to receive any instant messages.<br />"
65 serv_info.serv_humannode
68 svprintf("USERNAME_BOX", WCS_STRING, "%s", _("User name:"));
69 svprintf("PASSWORD_BOX", WCS_STRING, "%s", _("Password:"));
70 svprintf("LANGUAGE_BOX", WCS_STRING, "%s", _("Language:"));
71 svprintf("LOGIN_BUTTON", WCS_STRING, "%s", _("Login"));
72 svprintf("NEWUSER_BUTTON", WCS_STRING, "%s", _("New User"));
73 svprintf("EXIT_BUTTON", WCS_STRING, "%s", _("Exit"));
74 svprintf("hello", WCS_SERVCMD, "MESG hello");
75 svprintf("BOXTITLE", WCS_STRING, _("%s - powered by Citadel"),
76 serv_info.serv_humannode);
77 svcallback("DO_LANGUAGE_BOX", offer_languages);
78 if (serv_info.serv_newuser_disabled) {
79 svprintf("NEWUSER_BUTTON_PRE", WCS_STRING, "<div style=\"display:none;\">");
80 svprintf("NEWUSER_BUTTON_POST", WCS_STRING, "</div>");
83 svprintf("NEWUSER_BUTTON_PRE", WCS_STRING, "");
84 svprintf("NEWUSER_BUTTON_POST", WCS_STRING, "");
95 /** \brief Initialize the session
96 * This function needs to get called whenever the session changes from
97 * not-logged-in to logged-in, either by an explicit login by the user or
98 * by a timed-out session automatically re-establishing with a little help
99 * from the browser cookie. Either way, we need to load access controls and
100 * preferences from the server.
102 * \param user the username
103 * \param pass his password
104 * \param serv_response The parameters returned from a Citadel USER or NEWU command
106 void become_logged_in(char *user, char *pass, char *serv_response)
111 extract_token(WC->wc_fullname, &serv_response[4], 0, '|', sizeof WC->wc_fullname);
112 safestrncpy(WC->wc_username, user, sizeof WC->wc_username);
113 safestrncpy(WC->wc_password, pass, sizeof WC->wc_password);
114 WC->axlevel = extract_int(&serv_response[4], 1);
115 if (WC->axlevel >= 6) {
122 serv_getln(buf, sizeof buf);
124 WC->new_mail = extract_int(&buf[4], 0);
125 WC->need_regi = extract_int(&buf[4], 1);
126 WC->need_vali = extract_int(&buf[4], 2);
127 extract_token(WC->cs_inet_email, &buf[4], 3, '|', sizeof WC->cs_inet_email);
130 get_preference("current_iconbar", buf, sizeof buf);
131 WC->current_iconbar = atoi(buf);
133 get_preference("floordiv_expanded", WC->floordiv_expanded, sizeof WC->floordiv_expanded);
138 * \brief Login Checks
139 * the logics to detect invalid passwords not to get on citservers nerves
145 if (strlen(bstr("language")) > 0) {
146 set_selected_language(bstr("language"));
147 go_selected_language();
150 if (strlen(bstr("exit_action")) > 0) {
154 if (strlen(bstr("login_action")) > 0) {
155 serv_printf("USER %s", bstr("name"));
156 serv_getln(buf, sizeof buf);
158 serv_printf("PASS %s", bstr("pass"));
159 serv_getln(buf, sizeof buf);
161 become_logged_in(bstr("name"),
164 display_login(&buf[4]);
168 display_login(&buf[4]);
172 if (strlen(bstr("newuser_action")) > 0) {
173 if (strlen(bstr("pass")) == 0) {
174 display_login(_("Blank passwords are not allowed."));
177 serv_printf("NEWU %s", bstr("name"));
178 serv_getln(buf, sizeof buf);
180 become_logged_in(bstr("name"), bstr("pass"), buf);
181 serv_printf("SETP %s", bstr("pass"));
182 serv_getln(buf, sizeof buf);
184 display_login(&buf[4]);
195 display_login(_("Your password was not accepted."));
201 * \brief display the user a welcome screen.
202 * if this is the first time login, and the web based setup is enabled,
203 * lead the user through the setup routines
205 void do_welcome(void)
208 #ifdef XXX_NOT_FINISHED_YET_XXX
213 * See if we have to run the first-time setup wizard
217 sprintf(wizard_filename, "setupwiz.%s.%s",
219 for (i=0; i<strlen(wizard_filename); ++i) {
220 if ( (wizard_filename[i]==' ')
221 || (wizard_filename[i] == '/')
223 wizard_filename[i] = '_';
227 fp = fopen(wizard_filename, "r");
229 fgets(buf, sizeof buf, fp);
230 buf[strlen(buf)-1] = 0;
232 if (atoi(buf) == serv_info.serv_rev_level) {
233 setup_wizard = 1; /**< already run */
239 http_redirect("setup_wizard");
245 * Go to the user's preferred start page
247 get_preference("startpage", buf, sizeof buf);
248 if (strlen(buf)==0) {
249 safestrncpy(buf, "dotskip&room=_BASEROOM_", sizeof buf);
250 set_preference("startpage", buf, 1);
253 strcpy(buf, &buf[1]);
260 * Disconnect from the Citadel server, and end this WebCit session
262 void end_webcit_session(void) {
266 sprintf(buf, "%d", WC->current_iconbar);
267 set_preference("current_iconbar", buf, 0);
268 set_preference("floordiv_expanded", WC->floordiv_expanded, 1);
273 /* close() of citadel socket will be done by do_housekeeping() */
283 safestrncpy(WC->wc_username, "", sizeof WC->wc_username);
284 safestrncpy(WC->wc_password, "", sizeof WC->wc_password);
285 safestrncpy(WC->wc_roomname, "", sizeof WC->wc_roomname);
286 safestrncpy(WC->wc_fullname, "", sizeof WC->wc_fullname);
288 /** Calling output_headers() this way causes the cookies to be un-set */
289 output_headers(1, 1, 0, 1, 0, 0);
292 serv_puts("MESG goodbye");
293 serv_getln(buf, sizeof buf);
295 if (WC->serv_sock >= 0) {
299 wprintf("Goodbye\n");
303 wprintf(_("This program was unable to connect or stay "
304 "connected to the Citadel server. Please report "
305 "this problem to your system administrator.")
309 wprintf("<hr /><a href=\".\">");
310 wprintf(_("Log in again"));
311 wprintf("</A> "
312 "<a href=\"javascript:window.close();\">");
313 wprintf(_("Close window"));
314 wprintf("</a></center>\n");
316 end_webcit_session();
330 output_headers(1, 1, 2, 0, 0, 0);
331 wprintf("<div id=\"banner\">\n"
332 "<TABLE WIDTH=100%% BORDER=0 BGCOLOR=\"#444455\"><TR><TD>"
333 "<SPAN CLASS=\"titlebar\">");
334 wprintf(_("Validate new users"));
335 wprintf("</SPAN></TD></TR></TABLE>\n</div>\n<div id=\"content\">\n");
337 /** If the user just submitted a validation, process it... */
338 safestrncpy(buf, bstr("user"), sizeof buf);
339 if (strlen(buf) > 0) {
340 if (strlen(bstr("axlevel")) > 0) {
341 serv_printf("VALI %s|%s", buf, bstr("axlevel"));
342 serv_getln(buf, sizeof buf);
344 wprintf("<b>%s</b><br />\n", &buf[4]);
349 /** Now see if any more users require validation. */
351 serv_getln(buf, sizeof buf);
354 wprintf(_("No users require validation at this time."));
355 wprintf("</b><br />\n");
360 wprintf("<b>%s</b><br />\n", &buf[4]);
365 wprintf("<div class=\"fix_scrollbar_bug\">"
366 "<table border=0 width=100%% bgcolor=\"#ffffff\"><tr><td>\n");
369 safestrncpy(user, &buf[4], sizeof user);
370 serv_printf("GREG %s", user);
371 serv_getln(cmd, sizeof cmd);
375 serv_getln(buf, sizeof buf);
378 wprintf("#%s<br /><H1>%s</H1>",
381 wprintf("PW: %s<br />\n", buf);
383 wprintf("%s<br />\n", buf);
385 wprintf("%s<br />\n", buf);
387 wprintf("%s, ", buf);
391 wprintf("%s<br />\n", buf);
393 wprintf("%s<br />\n", buf);
395 wprintf(_("Current access level: %d (%s)\n"),
396 atoi(buf), axdefs[atoi(buf)]);
397 } while (strcmp(buf, "000"));
399 wprintf("<H1>%s</H1>%s<br />\n", user, &cmd[4]);
403 wprintf(_("Select access level for this user:"));
405 for (a = 0; a <= 6; ++a) {
406 wprintf("<a href=\"validate&user=");
408 wprintf("&axlevel=%d\">%s</A> \n",
413 wprintf("</CENTER>\n");
414 wprintf("</td></tr></table></div>\n");
421 * \brief Display form for registration.
422 * (Set during_login to 1 if this registration is being performed during
423 * new user login and will require chaining to the proper screen.)
424 * \param during_login are we just in the login phase?
426 void display_reg(int during_login)
430 if (goto_config_room() != 0) {
431 if (during_login) do_welcome();
432 else display_main_menu();
436 vcard_msgnum = locate_user_vcard(WC->wc_fullname, -1);
437 if (vcard_msgnum < 0L) {
438 if (during_login) do_welcome();
439 else display_main_menu();
444 do_edit_vcard(vcard_msgnum, "1", "do_welcome");
447 do_edit_vcard(vcard_msgnum, "1", "display_main_menu");
456 * display form for changing your password
458 void display_changepw(void)
462 output_headers(1, 1, 2, 0, 0, 0);
463 wprintf("<div id=\"banner\">\n"
464 "<TABLE WIDTH=100%% BORDER=0 BGCOLOR=\"#444455\"><TR><TD>"
465 "<SPAN CLASS=\"titlebar\">");
466 wprintf(_("Change your password"));
468 "</TD></TR></TABLE>\n"
469 "</div>\n<div id=\"content\">\n"
472 if (strlen(WC->ImportantMessage) > 0) {
473 do_template("beginbox_nt");
474 wprintf("<SPAN CLASS=\"errormsg\">"
475 "%s</SPAN><br />\n", WC->ImportantMessage);
476 do_template("endbox");
477 safestrncpy(WC->ImportantMessage, "", sizeof WC->ImportantMessage);
480 wprintf("<div class=\"fix_scrollbar_bug\">"
481 "<table border=0 width=100%% bgcolor=\"#ffffff\"><tr><td>\n");
483 wprintf("<CENTER><br />");
484 serv_puts("MESG changepw");
485 serv_getln(buf, sizeof buf);
490 wprintf("<form name=\"changepwform\" action=\"changepw\" method=\"post\">\n");
492 "<table border=\"0\" cellspacing=\"5\" cellpadding=\"5\" "
493 "BGCOLOR=\"#EEEEEE\">"
495 wprintf(_("Enter new password:"));
497 wprintf("<TD><INPUT TYPE=\"password\" NAME=\"newpass1\" VALUE=\"\" MAXLENGTH=\"20\"></TD></TR>\n");
499 wprintf(_("Enter it again to confirm:"));
501 wprintf("<TD><INPUT TYPE=\"password\" NAME=\"newpass2\" VALUE=\"\" MAXLENGTH=\"20\"></TD></TR>\n");
503 wprintf("</TABLE><br />\n");
504 wprintf("<INPUT type=\"submit\" name=\"change_action\" value=\"%s\">", _("Change password"));
506 wprintf("<INPUT type=\"submit\" name=\"cancel_action\" value=\"%s\">\n", _("Cancel"));
507 wprintf("</form></center>\n");
508 wprintf("</td></tr></table></div>\n");
513 * \brief change password
514 * if passwords match, propagate it to citserver.
519 char newpass1[32], newpass2[32];
521 if (strlen(bstr("change_action")) == 0) {
522 safestrncpy(WC->ImportantMessage,
523 _("Cancelled. Password was not changed."),
524 sizeof WC->ImportantMessage);
529 safestrncpy(newpass1, bstr("newpass1"), sizeof newpass1);
530 safestrncpy(newpass2, bstr("newpass2"), sizeof newpass2);
532 if (strcasecmp(newpass1, newpass2)) {
533 safestrncpy(WC->ImportantMessage,
534 _("They don't match. Password was not changed."),
535 sizeof WC->ImportantMessage);
540 if (strlen(newpass1) == 0) {
541 safestrncpy(WC->ImportantMessage,
542 _("Blank passwords are not allowed."),
543 sizeof WC->ImportantMessage);
548 serv_printf("SETP %s", newpass1);
549 serv_getln(buf, sizeof buf);
550 sprintf(WC->ImportantMessage, "%s", &buf[4]);
552 safestrncpy(WC->wc_password, buf, sizeof WC->wc_password);