]> code.citadel.org Git - citadel.git/blob - webcit/auth.c
* Started templatizing the login screen. Not finished yet.
[citadel.git] / webcit / auth.c
1 /*
2  * auth.c
3  *
4  * This file contains code which relates to authentication of users to Citadel.
5  *
6  * $Id$
7  */
8
9
10 #include <ctype.h>
11 #include <stdlib.h>
12 #include <unistd.h>
13 #include <stdio.h>
14 #include <fcntl.h>
15 #include <signal.h>
16 #include <sys/types.h>
17 #include <sys/wait.h>
18 #include <sys/socket.h>
19 #include <sys/time.h>
20 #include <limits.h>
21 #include <netinet/in.h>
22 #include <netdb.h>
23 #include <string.h>
24 #include <pwd.h>
25 #include <errno.h>
26 #include <stdarg.h>
27 #include <pthread.h>
28 #include <signal.h>
29 #include "webcit.h"
30
31
32 char *axdefs[] =
33 {
34         "Deleted",
35         "New User",
36         "Problem User",
37         "Local User",
38         "Network User",
39         "Preferred User",
40         "Aide"
41 };
42
43 /*
44  * Display the login screen
45  */
46 void display_login(char *mesg)
47 {
48         output_headers(3);
49
50         /*
51         mesg = mesg
52         hello = "mesg hello"
53         humannode = config.c_humannode
54         */
55
56         do_template("login.html");
57
58         wDumpContent(0);        /* No menu here; not logged in yet! */
59 }
60
61
62
63
64 /*
65  * This function needs to get called whenever a PASS or NEWU succeeds.
66  */
67 void become_logged_in(char *user, char *pass, char *serv_response)
68 {
69         WC->logged_in = 1;
70         extract(WC->wc_username, &serv_response[4], 0);
71         strcpy(WC->wc_password, pass);
72         WC->axlevel = extract_int(&serv_response[4], 1);
73         if (WC->axlevel >= 6)
74                 WC->is_aide = 1;
75 }
76
77
78 void do_login(void)
79 {
80         char buf[256];
81         int need_regi = 0;
82
83
84         if (!strcasecmp(bstr("action"), "Exit")) {
85                 do_logout();
86                 return;
87         }
88         if (!strcasecmp(bstr("action"), "Login")) {
89                 serv_printf("USER %s", bstr("name"));
90                 serv_gets(buf);
91                 if (buf[0] == '3') {
92                         serv_printf("PASS %s", bstr("pass"));
93                         serv_gets(buf);
94                         if (buf[0] == '2') {
95                                 become_logged_in(bstr("name"),
96                                                  bstr("pass"), buf);
97                         } else {
98                                 display_login(&buf[4]);
99                                 return;
100                         }
101                 } else {
102                         display_login(&buf[4]);
103                         return;
104                 }
105         }
106         if (!strcasecmp(bstr("action"), "New User")) {
107                 serv_printf("NEWU %s", bstr("name"));
108                 serv_gets(buf);
109                 if (buf[0] == '2') {
110                         become_logged_in(bstr("name"), bstr("pass"), buf);
111                         serv_printf("SETP %s", bstr("pass"));
112                         serv_gets(buf);
113                 } else {
114                         display_login(&buf[4]);
115                         return;
116                 }
117         }
118         if (WC->logged_in) {
119                 serv_puts("CHEK");
120                 serv_gets(buf);
121                 if (buf[0] == '2') {
122                         WC->new_mail = extract_int(&buf[4], 0);
123                         need_regi = extract_int(&buf[4], 1);
124                         WC->need_vali = extract_int(&buf[4], 2);
125                 }
126                 if (need_regi) {
127                         display_reg(1);
128                 } else {
129                         do_welcome();
130                 }
131         } else {
132                 display_login("Your password was not accepted.");
133         }
134
135 }
136
137 void do_welcome(void)
138 {
139         smart_goto("_BASEROOM_");
140 }
141
142
143 /*
144  * Disconnect from the Citadel server, and end this WebCit session
145  */
146 void end_webcit_session(void) {
147         serv_puts("QUIT");
148         close(WC->serv_sock);
149         WC->serv_sock = (-1);
150         WC->killthis = 1;
151 }
152
153
154 void do_logout(void)
155 {
156         char buf[256];
157
158         strcpy(WC->wc_username, "");
159         strcpy(WC->wc_password, "");
160         strcpy(WC->wc_roomname, "");
161
162         output_headers(2);      /* note "2" causes cookies to be unset */
163
164         wprintf("<CENTER>");
165         serv_puts("MESG goodbye");
166         serv_gets(buf);
167
168         if (buf[0] == '1')
169                 fmout(NULL);
170         else
171                 wprintf("Goodbye\n");
172
173         wprintf("<HR><A HREF=\"/\">Log in again</A>&nbsp;&nbsp;&nbsp;"
174                 "<A HREF=\"javascript:window.close();\">Close window</A>"
175                 "</CENTER>\n");
176         wDumpContent(2);
177         end_webcit_session();
178 }
179
180
181
182 /* 
183  * validate new users
184  */
185 void validate(void)
186 {
187         char cmd[256];
188         char user[256];
189         char buf[256];
190         int a;
191
192         output_headers(1);
193
194         strcpy(buf, bstr("user"));
195         if (strlen(buf) > 0)
196                 if (strlen(bstr("WC->axlevel")) > 0) {
197                         serv_printf("VALI %s|%s", buf, bstr("WC->axlevel"));
198                         serv_gets(buf);
199                         if (buf[0] != '2') {
200                                 wprintf("<EM>%s</EM><BR>\n", &buf[4]);
201                         }
202                 }
203         serv_puts("GNUR");
204         serv_gets(buf);
205
206         if (buf[0] != '3') {
207                 wprintf("<EM>%s</EM><BR>\n", &buf[4]);
208                 wDumpContent(1);
209                 return;
210         }
211         strcpy(user, &buf[4]);
212         serv_printf("GREG %s", user);
213         serv_gets(cmd);
214         if (cmd[0] == '1') {
215                 a = 0;
216                 do {
217                         serv_gets(buf);
218                         ++a;
219                         if (a == 1)
220                                 wprintf("User #%s<BR><H1>%s</H1>",
221                                         buf, &cmd[4]);
222                         if (a == 2)
223                                 wprintf("PW: %s<BR>\n", buf);
224                         if (a == 3)
225                                 wprintf("%s<BR>\n", buf);
226                         if (a == 4)
227                                 wprintf("%s<BR>\n", buf);
228                         if (a == 5)
229                                 wprintf("%s, ", buf);
230                         if (a == 6)
231                                 wprintf("%s ", buf);
232                         if (a == 7)
233                                 wprintf("%s<BR>\n", buf);
234                         if (a == 8)
235                                 wprintf("%s<BR>\n", buf);
236                         if (a == 9)
237                                 wprintf("Current access level: %d (%s)\n",
238                                         atoi(buf), axdefs[atoi(buf)]);
239                 } while (strcmp(buf, "000"));
240         } else {
241                 wprintf("<H1>%s</H1>%s<BR>\n", user, &cmd[4]);
242         }
243
244         wprintf("<CENTER><TABLE border><CAPTION>Select access level:");
245         wprintf("</CAPTION><TR>");
246         for (a = 0; a <= 6; ++a) {
247                 wprintf(
248                                "<TD><A HREF=\"/validate&user=%s&WC->axlevel=%d\">%s</A></TD>\n",
249                                urlesc(user), a, axdefs[a]);
250         }
251         wprintf("</TR></TABLE><CENTER><BR>\n");
252         wDumpContent(1);
253 }
254
255
256
257
258
259
260 /* 
261  * Display form for registration.
262  * (Set during_login to 1 if this registration is being performed during
263  * new user login and will require chaining to the proper screen.)
264  */
265 void display_reg(int during_login)
266 {
267         char buf[256];
268         int a;
269
270         output_headers(1);
271
272         wprintf("<TABLE WIDTH=100% BORDER=0 BGCOLOR=007700><TR><TD>");
273         wprintf("<FONT SIZE=+1 COLOR=\"FFFFFF\"");
274         wprintf("<B>Enter registration info</B>\n");
275         wprintf("</FONT></TD></TR></TABLE>\n");
276
277         wprintf("<CENTER>");
278         serv_puts("MESG register");
279         serv_gets(buf);
280         if (buf[0] == '1')
281                 fmout(NULL);
282
283         wprintf("<FORM ACTION=\"/register\" METHOD=\"POST\">\n");
284         wprintf("<INPUT TYPE=\"hidden\" NAME=\"during_login\" VALUE=\"%d\">\n", during_login);
285
286         serv_puts("GREG _SELF_");
287         serv_gets(buf);
288         if (buf[0] != '1') {
289                 wprintf("<EM>%s</EM><BR>\n", &buf[4]);
290         } else {
291
292                 wprintf("<H1>%s</H1><TABLE border>\n", &buf[4]);
293                 a = 0;
294                 while (serv_gets(buf), strcmp(buf, "000")) {
295                         ++a;
296                         wprintf("<TR><TD>");
297                         switch (a) {
298                         case 3:
299                                 wprintf("Real Name:</TD><TD><INPUT TYPE=\"text\" NAME=\"realname\" VALUE=\"%s\" MAXLENGTH=\"29\"><BR>\n", buf);
300                                 break;
301                         case 4:
302                                 wprintf("Street Address:</TD><TD><INPUT TYPE=\"text\" NAME=\"address\" VALUE=\"%s\" MAXLENGTH=\"24\"><BR>\n", buf);
303                                 break;
304                         case 5:
305                                 wprintf("City/town:</TD><TD><INPUT TYPE=\"text\" NAME=\"city\" VALUE=\"%s\" MAXLENGTH=\"14\"><BR>\n", buf);
306                                 break;
307                         case 6:
308                                 wprintf("State/province:</TD><TD><INPUT TYPE=\"text\" NAME=\"state\" VALUE=\"%s\" MAXLENGTH=\"2\"><BR>\n", buf);
309                                 break;
310                         case 7:
311                                 wprintf("ZIP code:</TD><TD><INPUT TYPE=\"text\" NAME=\"zip\" VALUE=\"%s\" MAXLENGTH=\"10\"><BR>\n", buf);
312                                 break;
313                         case 8:
314                                 wprintf("Telephone:</TD><TD><INPUT TYPE=\"text\" NAME=\"phone\" VALUE=\"%s\" MAXLENGTH=\"14\"><BR>\n", buf);
315                                 break;
316                         case 10:
317                                 wprintf("E-Mail:</TD><TD><INPUT TYPE=\"text\" NAME=\"email\" VALUE=\"%s\" MAXLENGTH=\"31\"><BR>\n", buf);
318                                 break;
319                         }
320                         wprintf("</TD></TR>\n");
321                 }
322                 wprintf("</TABLE><P>");
323         }
324         wprintf("<INPUT type=\"submit\" NAME=\"action\" VALUE=\"Register\">\n");
325         wprintf("<INPUT type=\"submit\" NAME=\"action\" VALUE=\"Cancel\">\n");
326         wprintf("</CENTER>\n");
327         wDumpContent(1);
328 }
329
330 /*
331  * register
332  */
333 void register_user(void)
334 {
335         char buf[256];
336
337         if (strcmp(bstr("action"), "Register")) {
338                 display_error("Cancelled.  Registration was not saved.");
339                 return;
340         }
341         serv_puts("REGI");
342         serv_gets(buf);
343         if (buf[0] != '4') {
344                 display_error(&buf[4]);
345         }
346         serv_puts(bstr("realname"));
347         serv_puts(bstr("address"));
348         serv_puts(bstr("city"));
349         serv_puts(bstr("state"));
350         serv_puts(bstr("zip"));
351         serv_puts(bstr("phone"));
352         serv_puts(bstr("email"));
353         serv_puts("000");
354
355         if (atoi(bstr("during_login"))) {
356                 do_welcome();
357         } else {
358                 display_error("Registration information has been saved.");
359         }
360 }
361
362
363
364
365
366 /* 
367  * display form for changing your password
368  */
369 void display_changepw(void)
370 {
371         char buf[256];
372
373         output_headers(1);
374
375         wprintf("<TABLE WIDTH=100% BORDER=0 BGCOLOR=770000><TR><TD>");
376         wprintf("<FONT SIZE=+1 COLOR=\"FFFFFF\"");
377         wprintf("<B>Change your password</B>\n");
378         wprintf("</FONT></TD></TR></TABLE>\n");
379
380         wprintf("<CENTER>");
381         serv_puts("MESG changepw");
382         serv_gets(buf);
383         if (buf[0] == '1')
384                 fmout(NULL);
385
386         wprintf("<FORM ACTION=\"changepw\" METHOD=\"POST\">\n");
387         wprintf("<CENTER><TABLE border><TR><TD>Enter new password:</TD>\n");
388         wprintf("<TD><INPUT TYPE=\"password\" NAME=\"newpass1\" VALUE=\"\" MAXLENGTH=\"20\"></TD></TR>\n");
389         wprintf("<TR><TD>Enter it again to confirm:</TD>\n");
390         wprintf("<TD><INPUT TYPE=\"password\" NAME=\"newpass2\" VALUE=\"\" MAXLENGTH=\"20\"></TD></TR>\n");
391         wprintf("</TABLE>\n");
392         wprintf("<INPUT type=\"submit\" NAME=\"action\" VALUE=\"Change\">\n");
393         wprintf("<INPUT type=\"submit\" NAME=\"action\" VALUE=\"Cancel\">\n");
394         wprintf("</CENTER>\n");
395         wDumpContent(1);
396 }
397
398 /*
399  * change password
400  */
401 void changepw(void)
402 {
403         char buf[256];
404         char newpass1[32], newpass2[32];
405
406         if (strcmp(bstr("action"), "Change")) {
407                 display_error("Cancelled.  Password was not changed.");
408                 return;
409         }
410         strcpy(newpass1, bstr("newpass1"));
411         strcpy(newpass2, bstr("newpass2"));
412
413         if (strcasecmp(newpass1, newpass2)) {
414                 display_error("They don't match.  Password was not changed.");
415                 return;
416         }
417         serv_printf("SETP %s", newpass1);
418         serv_gets(buf);
419         if (buf[0] == '2')
420                 display_success(&buf[4]);
421         else
422                 display_error(&buf[4]);
423 }