5ec9b829ee8c876ebec95a028d4892a1c2621dee
[citadel.git] / webcit / auth.c
1 /*
2  * auth.c
3  *
4  * This file contains code which relates to authentication of users to Citadel.
5  *
6  * $Id$
7  */
8
9
10 #include <ctype.h>
11 #include <stdlib.h>
12 #include <unistd.h>
13 #include <stdio.h>
14 #include <fcntl.h>
15 #include <signal.h>
16 #include <sys/types.h>
17 #include <sys/wait.h>
18 #include <sys/socket.h>
19 #include <sys/time.h>
20 #include <limits.h>
21 #include <netinet/in.h>
22 #include <netdb.h>
23 #include <string.h>
24 #include <pwd.h>
25 #include <errno.h>
26 #include <stdarg.h>
27 #include <pthread.h>
28 #include <signal.h>
29 #include "webcit.h"
30
31
32 char *axdefs[] =
33 {
34         "Deleted",
35         "New User",
36         "Problem User",
37         "Local User",
38         "Network User",
39         "Preferred User",
40         "Aide"
41 };
42
43 /*
44  * Display the login screen
45  */
46 void display_login(char *mesg)
47 {
48         char buf[256];
49
50         output_headers(3);
51
52         if (mesg != NULL) if (strlen(mesg) > 0) {
53                 stresc(buf, mesg, 0);
54                 svprintf("mesg", WCS_STRING, "%s", buf);
55         }
56
57         stresc(buf, serv_info.serv_humannode, 1);
58         svprintf("humannode", WCS_STRING, "%s", buf);
59
60         svprintf("hello", WCS_SERVCMD, "MESG hello");
61
62         do_template("login.html");
63
64         clear_local_substs();
65         wDumpContent(0);        /* No menu here; not logged in yet! */
66 }
67
68
69
70
71 /*
72  * This function needs to get called whenever a PASS or NEWU succeeds.
73  */
74 void become_logged_in(char *user, char *pass, char *serv_response)
75 {
76         WC->logged_in = 1;
77         extract(WC->wc_username, &serv_response[4], 0);
78         strcpy(WC->wc_password, pass);
79         WC->axlevel = extract_int(&serv_response[4], 1);
80         if (WC->axlevel >= 6)
81                 WC->is_aide = 1;
82 }
83
84
85 void do_login(void)
86 {
87         char buf[256];
88         int need_regi = 0;
89
90
91         if (!strcasecmp(bstr("action"), "Exit")) {
92                 do_logout();
93                 return;
94         }
95         if (!strcasecmp(bstr("action"), "Login")) {
96                 serv_printf("USER %s", bstr("name"));
97                 serv_gets(buf);
98                 if (buf[0] == '3') {
99                         serv_printf("PASS %s", bstr("pass"));
100                         serv_gets(buf);
101                         if (buf[0] == '2') {
102                                 become_logged_in(bstr("name"),
103                                                  bstr("pass"), buf);
104                         } else {
105                                 display_login(&buf[4]);
106                                 return;
107                         }
108                 } else {
109                         display_login(&buf[4]);
110                         return;
111                 }
112         }
113         if (!strcasecmp(bstr("action"), "New User")) {
114                 serv_printf("NEWU %s", bstr("name"));
115                 serv_gets(buf);
116                 if (buf[0] == '2') {
117                         become_logged_in(bstr("name"), bstr("pass"), buf);
118                         serv_printf("SETP %s", bstr("pass"));
119                         serv_gets(buf);
120                 } else {
121                         display_login(&buf[4]);
122                         return;
123                 }
124         }
125         if (WC->logged_in) {
126                 serv_puts("CHEK");
127                 serv_gets(buf);
128                 if (buf[0] == '2') {
129                         WC->new_mail = extract_int(&buf[4], 0);
130                         need_regi = extract_int(&buf[4], 1);
131                         WC->need_vali = extract_int(&buf[4], 2);
132                 }
133                 if (need_regi) {
134                         display_reg(1);
135                 } else {
136                         do_welcome();
137                 }
138         } else {
139                 display_login("Your password was not accepted.");
140         }
141
142 }
143
144 void do_welcome(void)
145 {
146         smart_goto("_BASEROOM_");
147 }
148
149
150 /*
151  * Disconnect from the Citadel server, and end this WebCit session
152  */
153 void end_webcit_session(void) {
154         serv_puts("QUIT");
155         close(WC->serv_sock);
156         WC->serv_sock = (-1);
157         WC->killthis = 1;
158 }
159
160
161 void do_logout(void)
162 {
163         char buf[256];
164
165         strcpy(WC->wc_username, "");
166         strcpy(WC->wc_password, "");
167         strcpy(WC->wc_roomname, "");
168
169         output_headers(2);      /* note "2" causes cookies to be unset */
170
171         wprintf("<CENTER>");
172         serv_puts("MESG goodbye");
173         serv_gets(buf);
174
175         if (buf[0] == '1')
176                 fmout(NULL);
177         else
178                 wprintf("Goodbye\n");
179
180         wprintf("<HR><A HREF=\"/\">Log in again</A>&nbsp;&nbsp;&nbsp;"
181                 "<A HREF=\"javascript:window.close();\">Close window</A>"
182                 "</CENTER>\n");
183         wDumpContent(2);
184         end_webcit_session();
185 }
186
187
188
189 /* 
190  * validate new users
191  */
192 void validate(void)
193 {
194         char cmd[256];
195         char user[256];
196         char buf[256];
197         int a;
198
199         output_headers(1);
200
201         strcpy(buf, bstr("user"));
202         if (strlen(buf) > 0)
203                 if (strlen(bstr("WC->axlevel")) > 0) {
204                         serv_printf("VALI %s|%s", buf, bstr("WC->axlevel"));
205                         serv_gets(buf);
206                         if (buf[0] != '2') {
207                                 wprintf("<EM>%s</EM><BR>\n", &buf[4]);
208                         }
209                 }
210         serv_puts("GNUR");
211         serv_gets(buf);
212
213         if (buf[0] != '3') {
214                 wprintf("<EM>%s</EM><BR>\n", &buf[4]);
215                 wDumpContent(1);
216                 return;
217         }
218         strcpy(user, &buf[4]);
219         serv_printf("GREG %s", user);
220         serv_gets(cmd);
221         if (cmd[0] == '1') {
222                 a = 0;
223                 do {
224                         serv_gets(buf);
225                         ++a;
226                         if (a == 1)
227                                 wprintf("User #%s<BR><H1>%s</H1>",
228                                         buf, &cmd[4]);
229                         if (a == 2)
230                                 wprintf("PW: %s<BR>\n", buf);
231                         if (a == 3)
232                                 wprintf("%s<BR>\n", buf);
233                         if (a == 4)
234                                 wprintf("%s<BR>\n", buf);
235                         if (a == 5)
236                                 wprintf("%s, ", buf);
237                         if (a == 6)
238                                 wprintf("%s ", buf);
239                         if (a == 7)
240                                 wprintf("%s<BR>\n", buf);
241                         if (a == 8)
242                                 wprintf("%s<BR>\n", buf);
243                         if (a == 9)
244                                 wprintf("Current access level: %d (%s)\n",
245                                         atoi(buf), axdefs[atoi(buf)]);
246                 } while (strcmp(buf, "000"));
247         } else {
248                 wprintf("<H1>%s</H1>%s<BR>\n", user, &cmd[4]);
249         }
250
251         wprintf("<CENTER><TABLE border><CAPTION>Select access level:");
252         wprintf("</CAPTION><TR>");
253         for (a = 0; a <= 6; ++a) {
254                 wprintf(
255                                "<TD><A HREF=\"/validate&user=%s&WC->axlevel=%d\">%s</A></TD>\n",
256                                urlesc(user), a, axdefs[a]);
257         }
258         wprintf("</TR></TABLE><CENTER><BR>\n");
259         wDumpContent(1);
260 }
261
262
263
264
265
266
267 /* 
268  * Display form for registration.
269  * (Set during_login to 1 if this registration is being performed during
270  * new user login and will require chaining to the proper screen.)
271  */
272 void display_reg(int during_login)
273 {
274         char buf[256];
275         int a;
276
277         output_headers(1);
278
279         wprintf("<TABLE WIDTH=100% BORDER=0 BGCOLOR=007700><TR><TD>");
280         wprintf("<FONT SIZE=+1 COLOR=\"FFFFFF\"");
281         wprintf("<B>Enter registration info</B>\n");
282         wprintf("</FONT></TD></TR></TABLE>\n");
283
284         wprintf("<CENTER>");
285         serv_puts("MESG register");
286         serv_gets(buf);
287         if (buf[0] == '1')
288                 fmout(NULL);
289
290         wprintf("<FORM ACTION=\"/register\" METHOD=\"POST\">\n");
291         wprintf("<INPUT TYPE=\"hidden\" NAME=\"during_login\" VALUE=\"%d\">\n", during_login);
292
293         serv_puts("GREG _SELF_");
294         serv_gets(buf);
295         if (buf[0] != '1') {
296                 wprintf("<EM>%s</EM><BR>\n", &buf[4]);
297         } else {
298
299                 wprintf("<H1>%s</H1><TABLE border>\n", &buf[4]);
300                 a = 0;
301                 while (serv_gets(buf), strcmp(buf, "000")) {
302                         ++a;
303                         wprintf("<TR><TD>");
304                         switch (a) {
305                         case 3:
306                                 wprintf("Real Name:</TD><TD><INPUT TYPE=\"text\" NAME=\"realname\" VALUE=\"%s\" MAXLENGTH=\"29\"><BR>\n", buf);
307                                 break;
308                         case 4:
309                                 wprintf("Street Address:</TD><TD><INPUT TYPE=\"text\" NAME=\"address\" VALUE=\"%s\" MAXLENGTH=\"24\"><BR>\n", buf);
310                                 break;
311                         case 5:
312                                 wprintf("City/town:</TD><TD><INPUT TYPE=\"text\" NAME=\"city\" VALUE=\"%s\" MAXLENGTH=\"14\"><BR>\n", buf);
313                                 break;
314                         case 6:
315                                 wprintf("State/province:</TD><TD><INPUT TYPE=\"text\" NAME=\"state\" VALUE=\"%s\" MAXLENGTH=\"2\"><BR>\n", buf);
316                                 break;
317                         case 7:
318                                 wprintf("ZIP code:</TD><TD><INPUT TYPE=\"text\" NAME=\"zip\" VALUE=\"%s\" MAXLENGTH=\"10\"><BR>\n", buf);
319                                 break;
320                         case 8:
321                                 wprintf("Telephone:</TD><TD><INPUT TYPE=\"text\" NAME=\"phone\" VALUE=\"%s\" MAXLENGTH=\"14\"><BR>\n", buf);
322                                 break;
323                         case 10:
324                                 wprintf("E-Mail:</TD><TD><INPUT TYPE=\"text\" NAME=\"email\" VALUE=\"%s\" MAXLENGTH=\"31\"><BR>\n", buf);
325                                 break;
326                         }
327                         wprintf("</TD></TR>\n");
328                 }
329                 wprintf("</TABLE><P>");
330         }
331         wprintf("<INPUT type=\"submit\" NAME=\"action\" VALUE=\"Register\">\n");
332         wprintf("<INPUT type=\"submit\" NAME=\"action\" VALUE=\"Cancel\">\n");
333         wprintf("</CENTER>\n");
334         wDumpContent(1);
335 }
336
337 /*
338  * register
339  */
340 void register_user(void)
341 {
342         char buf[256];
343
344         if (strcmp(bstr("action"), "Register")) {
345                 display_error("Cancelled.  Registration was not saved.");
346                 return;
347         }
348         serv_puts("REGI");
349         serv_gets(buf);
350         if (buf[0] != '4') {
351                 display_error(&buf[4]);
352         }
353         serv_puts(bstr("realname"));
354         serv_puts(bstr("address"));
355         serv_puts(bstr("city"));
356         serv_puts(bstr("state"));
357         serv_puts(bstr("zip"));
358         serv_puts(bstr("phone"));
359         serv_puts(bstr("email"));
360         serv_puts("000");
361
362         if (atoi(bstr("during_login"))) {
363                 do_welcome();
364         } else {
365                 display_error("Registration information has been saved.");
366         }
367 }
368
369
370
371
372
373 /* 
374  * display form for changing your password
375  */
376 void display_changepw(void)
377 {
378         char buf[256];
379
380         output_headers(1);
381
382         wprintf("<TABLE WIDTH=100% BORDER=0 BGCOLOR=770000><TR><TD>");
383         wprintf("<FONT SIZE=+1 COLOR=\"FFFFFF\"");
384         wprintf("<B>Change your password</B>\n");
385         wprintf("</FONT></TD></TR></TABLE>\n");
386
387         wprintf("<CENTER>");
388         serv_puts("MESG changepw");
389         serv_gets(buf);
390         if (buf[0] == '1')
391                 fmout(NULL);
392
393         wprintf("<FORM ACTION=\"changepw\" METHOD=\"POST\">\n");
394         wprintf("<CENTER><TABLE border><TR><TD>Enter new password:</TD>\n");
395         wprintf("<TD><INPUT TYPE=\"password\" NAME=\"newpass1\" VALUE=\"\" MAXLENGTH=\"20\"></TD></TR>\n");
396         wprintf("<TR><TD>Enter it again to confirm:</TD>\n");
397         wprintf("<TD><INPUT TYPE=\"password\" NAME=\"newpass2\" VALUE=\"\" MAXLENGTH=\"20\"></TD></TR>\n");
398         wprintf("</TABLE>\n");
399         wprintf("<INPUT type=\"submit\" NAME=\"action\" VALUE=\"Change\">\n");
400         wprintf("<INPUT type=\"submit\" NAME=\"action\" VALUE=\"Cancel\">\n");
401         wprintf("</CENTER>\n");
402         wDumpContent(1);
403 }
404
405 /*
406  * change password
407  */
408 void changepw(void)
409 {
410         char buf[256];
411         char newpass1[32], newpass2[32];
412
413         if (strcmp(bstr("action"), "Change")) {
414                 display_error("Cancelled.  Password was not changed.");
415                 return;
416         }
417         strcpy(newpass1, bstr("newpass1"));
418         strcpy(newpass2, bstr("newpass2"));
419
420         if (strcasecmp(newpass1, newpass2)) {
421                 display_error("They don't match.  Password was not changed.");
422                 return;
423         }
424         serv_printf("SETP %s", newpass1);
425         serv_gets(buf);
426         if (buf[0] == '2')
427                 display_success(&buf[4]);
428         else
429                 display_error(&buf[4]);
430 }