/*
- * auth.c
- *
- * This file contains code which relates to authentication of users to Citadel.
- *
* $Id$
*/
+/**
+ *
+ * \defgroup WebcitAuth WebcitAuth; Handles authentication of users to a Citadel server.
+ * \ingroup CitadelConfig
+ */
-#include <stdlib.h>
-#ifdef HAVE_UNISTD_H
-#include <unistd.h>
-#endif
-#include <stdio.h>
-#include <ctype.h>
-#include <string.h>
-#include <errno.h>
+/*@{*/
#include "webcit.h"
-#include "child.h"
-/*
- * Display the login screen
+/**
+ * \brief user states
+ * the plain text states of a user. filled in at \ function TODO initialize_ax_defs()
+ * due to NLS
*/
-void display_login(char *mesg) {
- char buf[256];
+char *axdefs[7];
- printf("HTTP/1.0 200 OK\n");
- output_headers();
+void initialize_axdefs(void) {
+ axdefs[0] = _("Deleted"); /*!0: an erased user */
+ axdefs[1] = _("New User"); /*!1: a new user */
+ axdefs[2] = _("Problem User"); /*!2: a trouble maker */
+ axdefs[3] = _("Local User"); /*!3: user with normal privileges */
+ axdefs[4] = _("Network User"); /*!4: a user that may access network resources */
+ axdefs[5] = _("Preferred User");/*!5: a moderator */
+ axdefs[6] = _("Aide"); /*!6: chief */
+}
- wprintf("<HTML><BODY>\n");
- wprintf("<CENTER><TABLE border=0 width=100%><TR><TD>\n");
- /* FIX replace with the correct image */
- wprintf("<IMG SRC=\"/static/velma.gif\">");
- wprintf("</TD><TD><CENTER>\n");
- if (mesg != NULL) {
- wprintf("<font size=+1><b>%s</b></font>", mesg);
- }
- else {
- serv_puts("MESG hello");
- serv_gets(buf);
- if (buf[0]=='1') fmout(NULL);
- }
- wprintf("</CENTER></TD></TR></TABLE></CENTER>\n");
+/**
+ * \brief Display the login screen
+ * \param mesg The error message if last attempt failed.
+ */
+void display_login(char *mesg)
+{
+ char buf[SIZ];
- wprintf("<HR>\n");
- /* FIX add instructions here */
- wprintf("<CENTER><FORM ACTION=\"/login\" METHOD=\"POST\">\n");
- wprintf("<TABLE border><TR>\n");
- wprintf("<TD>User Name:</TD>\n");
- wprintf("<TD><INPUT TYPE=\"text\" NAME=\"name\" MAXLENGTH=\"25\">\n");
- wprintf("</TD></TR><TR>\n");
- wprintf("<TD>Password:</TD>\n");
- wprintf("<TD><INPUT TYPE=\"password\" NAME=\"pass\" MAXLENGTH=\"20\"></TD>\n");
- wprintf("</TR></TABLE>\n");
- wprintf("<INPUT type=\"submit\" NAME=\"action\" VALUE=\"Login\">\n");
- wprintf("<INPUT type=\"submit\" NAME=\"action\" VALUE=\"New User\">\n");
- wprintf("<INPUT type=\"submit\" NAME=\"action\" VALUE=\"Exit\">\n");
- wprintf("</FORM></CENTER>\n");
- wprintf("</BODY></HTML>\n");
- wDumpContent();
- }
+ output_headers(1, 1, 2, 0, 0, 0);
+ wprintf("<div style=\"position:absolute; top:20px; left:20px; right:20px\">\n");
+ if (mesg != NULL) if (strlen(mesg) > 0) {
+ stresc(buf, mesg, 0, 0);
+ svprintf("mesg", WCS_STRING, "%s", buf);
+ }
+ svprintf("LOGIN_INSTRUCTIONS", WCS_STRING,
+ _("<ul>"
+ "<li><b>If you already have an account on %s</b>, "
+ "enter your user name and password and click "Login." "
+ "<li><b>If you are a new user</b>, enter the name and password "
+ "you wish to use, "
+ "and click "New User." "
+ "<li>Please log off properly when finished. "
+ "<li>You must use a browser that supports <i>frames</i> and "
+ "<i>cookies</i>. "
+ "<li>Also keep in mind that if your browser is "
+ "configured to block pop-up windows, you will not be able "
+ "to receive any instant messages.<br />"
+ "</ul>"),
+ serv_info.serv_humannode
+ );
+
+ svprintf("USERNAME_BOX", WCS_STRING, "%s", _("User name:"));
+ svprintf("PASSWORD_BOX", WCS_STRING, "%s", _("Password:"));
+ svprintf("LANGUAGE_BOX", WCS_STRING, "%s", _("Language:"));
+ svprintf("LOGIN_BUTTON", WCS_STRING, "%s", _("Login"));
+ svprintf("NEWUSER_BUTTON", WCS_STRING, "%s", _("New User"));
+ svprintf("EXIT_BUTTON", WCS_STRING, "%s", _("Exit"));
+ svprintf("hello", WCS_SERVCMD, "MESG hello");
+ svprintf("BOXTITLE", WCS_STRING, _("%s - powered by Citadel"),
+ serv_info.serv_humannode);
+ svcallback("DO_LANGUAGE_BOX", offer_languages);
+
+ do_template("login");
+
+ wDumpContent(2);
+}
+
+
+
+
+/** \brief Initialize the session
+ * This function needs to get called whenever the session changes from
+ * not-logged-in to logged-in, either by an explicit login by the user or
+ * by a timed-out session automatically re-establishing with a little help
+ * from the browser cookie. Either way, we need to load access controls and
+ * preferences from the server.
+ *
+ * \param user the username
+ * \param pass his password
+ * \param serv_response The parameters returned from a Citadel USER or NEWU command
+ */
+void become_logged_in(char *user, char *pass, char *serv_response)
+{
+ char buf[SIZ];
+
+ WC->logged_in = 1;
+ extract_token(WC->wc_fullname, &serv_response[4], 0, '|', sizeof WC->wc_fullname);
+ safestrncpy(WC->wc_username, user, sizeof WC->wc_username);
+ safestrncpy(WC->wc_password, pass, sizeof WC->wc_password);
+ WC->axlevel = extract_int(&serv_response[4], 1);
+ if (WC->axlevel >= 6) {
+ WC->is_aide = 1;
+ }
+ load_preferences();
-/*
- * This function needs to get called whenever a PASS or NEWU succeeds
- */
-void become_logged_in(char *user, char *pass, char *serv_response) {
- logged_in = 1;
- extract(wc_username, &serv_response[4], 0);
- strcpy(wc_password, pass);
- axlevel = extract_int(&serv_response[4], 1);
- if (axlevel >=6) is_aide = 1;
- fprintf(stderr, "become_logged_in(%s,%s)\n", user, pass);
+ serv_puts("CHEK");
+ serv_getln(buf, sizeof buf);
+ if (buf[0] == '2') {
+ WC->new_mail = extract_int(&buf[4], 0);
+ WC->need_regi = extract_int(&buf[4], 1);
+ WC->need_vali = extract_int(&buf[4], 2);
+ extract_token(WC->cs_inet_email, &buf[4], 3, '|', sizeof WC->cs_inet_email);
}
+ get_preference("current_iconbar", buf, sizeof buf);
+ WC->current_iconbar = atoi(buf);
-void do_login(void) {
- char buf[256];
+ get_preference("floordiv_expanded", WC->floordiv_expanded, sizeof WC->floordiv_expanded);
+}
- if (!strcasecmp(bstr("action"), "Exit")) {
- do_logout();
- }
- if (!strcasecmp(bstr("action"), "Login")) {
+/**
+ * \brief Login Checks
+ * the logics to detect invalid passwords not to get on citservers nerves
+ */
+void do_login(void)
+{
+ char buf[SIZ];
+
+ if (strlen(bstr("language")) > 0) {
+ set_selected_language(bstr("language"));
+ go_selected_language();
+ }
+
+ if (strlen(bstr("exit_action")) > 0) {
+ do_logout();
+ return;
+ }
+ if (strlen(bstr("login_action")) > 0) {
serv_printf("USER %s", bstr("name"));
- serv_gets(buf);
- if (buf[0]=='3') {
+ serv_getln(buf, sizeof buf);
+ if (buf[0] == '3') {
serv_printf("PASS %s", bstr("pass"));
- serv_gets(buf);
- if (buf[0]=='2') {
+ serv_getln(buf, sizeof buf);
+ if (buf[0] == '2') {
become_logged_in(bstr("name"),
- bstr("pass"), buf);
- }
- else {
+ bstr("pass"), buf);
+ } else {
display_login(&buf[4]);
return;
- }
}
- else {
+ } else {
display_login(&buf[4]);
return;
- }
}
-
- if (!strcasecmp(bstr("action"), "New User")) {
+ }
+ if (strlen(bstr("newuser_action")) > 0) {
+ if (strlen(bstr("pass")) == 0) {
+ display_login(_("Blank passwords are not allowed."));
+ return;
+ }
serv_printf("NEWU %s", bstr("name"));
- serv_gets(buf);
- if (buf[0]=='2') {
+ serv_getln(buf, sizeof buf);
+ if (buf[0] == '2') {
become_logged_in(bstr("name"), bstr("pass"), buf);
serv_printf("SETP %s", bstr("pass"));
- serv_gets(buf);
- }
- else {
+ serv_getln(buf, sizeof buf);
+ } else {
display_login(&buf[4]);
return;
+ }
+ }
+ if (WC->logged_in) {
+ if (WC->need_regi) {
+ display_reg(1);
+ } else {
+ do_welcome();
+ }
+ } else {
+ display_login(_("Your password was not accepted."));
+ }
+
+}
+
+/**
+ * \brief display the user a welcome screen.
+ * if this is the first time login, and the web based setup is enabled,
+ * lead the user through the setup routines
+ */
+void do_welcome(void)
+{
+ char buf[SIZ];
+#ifdef XXX_NOT_FINISHED_YET_XXX
+ FILE *fp;
+ int i;
+
+ /**
+ * See if we have to run the first-time setup wizard
+ */
+ if (WC->is_aide) {
+ if (!setup_wizard) {
+ sprintf(wizard_filename, "setupwiz.%s.%s",
+ ctdlhost, ctdlport);
+ for (i=0; i<strlen(wizard_filename); ++i) {
+ if ( (wizard_filename[i]==' ')
+ || (wizard_filename[i] == '/')
+ ) {
+ wizard_filename[i] = '_';
+ }
+ }
+
+ fp = fopen(wizard_filename, "r");
+ if (fp != NULL) {
+ fgets(buf, sizeof buf, fp);
+ buf[strlen(buf)-1] = 0;
+ fclose(fp);
+ if (atoi(buf) == serv_info.serv_rev_level) {
+ setup_wizard = 1; /**< already run */
+ }
}
}
- if (logged_in) {
- output_static("frameset.html");
+ if (!setup_wizard) {
+ http_redirect("setup_wizard");
}
+ }
+#endif
+
+ /**
+ * Go to the user's preferred start page
+ */
+ get_preference("startpage", buf, sizeof buf);
+ if (strlen(buf)==0) {
+ safestrncpy(buf, "dotskip&room=_BASEROOM_", sizeof buf);
+ set_preference("startpage", buf, 1);
+ }
+ if (buf[0] == '/') {
+ strcpy(buf, &buf[1]);
+ }
+ http_redirect(buf);
+}
+
+
+/**
+ * Disconnect from the Citadel server, and end this WebCit session
+ */
+void end_webcit_session(void) {
+ char buf[256];
+
+ if (WC->logged_in) {
+ sprintf(buf, "%d", WC->current_iconbar);
+ set_preference("current_iconbar", buf, 0);
+ set_preference("floordiv_expanded", WC->floordiv_expanded, 1);
+ }
+
+ serv_puts("QUIT");
+ WC->killthis = 1;
+ /* close() of citadel socket will be done by do_housekeeping() */
+}
+
+/**
+ * execute the logout
+ */
+void do_logout(void)
+{
+ char buf[SIZ];
+
+ safestrncpy(WC->wc_username, "", sizeof WC->wc_username);
+ safestrncpy(WC->wc_password, "", sizeof WC->wc_password);
+ safestrncpy(WC->wc_roomname, "", sizeof WC->wc_roomname);
+ safestrncpy(WC->wc_fullname, "", sizeof WC->wc_fullname);
+
+ /** Calling output_headers() this way causes the cookies to be un-set */
+ output_headers(1, 1, 0, 1, 0, 0);
+
+ wprintf("<center>");
+ serv_puts("MESG goodbye");
+ serv_getln(buf, sizeof buf);
+
+ if (WC->serv_sock >= 0) {
+ if (buf[0] == '1') {
+ fmout("CENTER");
+ } else {
+ wprintf("Goodbye\n");
+ }
+ }
else {
- display_login("Your password was not accepted.");
+ wprintf(_("This program was unable to connect or stay "
+ "connected to the Citadel server. Please report "
+ "this problem to your system administrator.")
+ );
+ }
+
+ wprintf("<hr /><a href=\".\">");
+ wprintf(_("Log in again"));
+ wprintf("</A> "
+ "<a href=\"javascript:window.close();\">");
+ wprintf(_("Close window"));
+ wprintf("</a></center>\n");
+ wDumpContent(2);
+ end_webcit_session();
+}
+
+
+/* *
+ * validate new users
+ */
+void validate(void)
+{
+ char cmd[SIZ];
+ char user[SIZ];
+ char buf[SIZ];
+ int a;
+
+ output_headers(1, 1, 2, 0, 0, 0);
+ wprintf("<div id=\"banner\">\n"
+ "<TABLE WIDTH=100%% BORDER=0 BGCOLOR=\"#444455\"><TR><TD>"
+ "<SPAN CLASS=\"titlebar\">");
+ wprintf(_("Validate new users"));
+ wprintf("</SPAN></TD></TR></TABLE>\n</div>\n<div id=\"content\">\n");
+
+ /** If the user just submitted a validation, process it... */
+ safestrncpy(buf, bstr("user"), sizeof buf);
+ if (strlen(buf) > 0) {
+ if (strlen(bstr("axlevel")) > 0) {
+ serv_printf("VALI %s|%s", buf, bstr("axlevel"));
+ serv_getln(buf, sizeof buf);
+ if (buf[0] != '2') {
+ wprintf("<b>%s</b><br />\n", &buf[4]);
+ }
}
+ }
+ /** Now see if any more users require validation. */
+ serv_puts("GNUR");
+ serv_getln(buf, sizeof buf);
+ if (buf[0] == '2') {
+ wprintf("<b>");
+ wprintf(_("No users require validation at this time."));
+ wprintf("</b><br />\n");
+ wDumpContent(1);
+ return;
+ }
+ if (buf[0] != '3') {
+ wprintf("<b>%s</b><br />\n", &buf[4]);
+ wDumpContent(1);
+ return;
}
-void do_welcome(void) {
- printf("HTTP/1.0 200 OK\n");
- output_headers();
- wprintf("<HTML><BODY>\n");
- wprintf("<CENTER><H1>");
- escputs(wc_username);
- wprintf("</H1>\n");
- /* FIX add user stats here */
+ wprintf("<div class=\"fix_scrollbar_bug\">"
+ "<table border=0 width=100%% bgcolor=\"#ffffff\"><tr><td>\n");
+ wprintf("<center>");
+
+ safestrncpy(user, &buf[4], sizeof user);
+ serv_printf("GREG %s", user);
+ serv_getln(cmd, sizeof cmd);
+ if (cmd[0] == '1') {
+ a = 0;
+ do {
+ serv_getln(buf, sizeof buf);
+ ++a;
+ if (a == 1)
+ wprintf("#%s<br /><H1>%s</H1>",
+ buf, &cmd[4]);
+ if (a == 2)
+ wprintf("PW: %s<br />\n", buf);
+ if (a == 3)
+ wprintf("%s<br />\n", buf);
+ if (a == 4)
+ wprintf("%s<br />\n", buf);
+ if (a == 5)
+ wprintf("%s, ", buf);
+ if (a == 6)
+ wprintf("%s ", buf);
+ if (a == 7)
+ wprintf("%s<br />\n", buf);
+ if (a == 8)
+ wprintf("%s<br />\n", buf);
+ if (a == 9)
+ wprintf(_("Current access level: %d (%s)\n"),
+ atoi(buf), axdefs[atoi(buf)]);
+ } while (strcmp(buf, "000"));
+ } else {
+ wprintf("<H1>%s</H1>%s<br />\n", user, &cmd[4]);
+ }
+
+ wprintf("<hr />");
+ wprintf(_("Select access level for this user:"));
+ wprintf("<br />\n");
+ for (a = 0; a <= 6; ++a) {
+ wprintf("<a href=\"validate&user=");
+ urlescputs(user);
+ wprintf("&axlevel=%d\">%s</A> \n",
+ a, axdefs[a]);
+ }
+ wprintf("<br />\n");
+
+ wprintf("</CENTER>\n");
+ wprintf("</td></tr></table></div>\n");
+ wDumpContent(1);
+}
+
- wprintf("<HR>");
- /* FIX --- what should we put here? the main menu,
- * or new messages in the lobby?
- */
- embed_main_menu();
- wprintf("</BODY></HTML>\n");
- wDumpContent();
+/**
+ * \brief Display form for registration.
+ * (Set during_login to 1 if this registration is being performed during
+ * new user login and will require chaining to the proper screen.)
+ * \param during_login are we just in the login phase?
+ */
+void display_reg(int during_login)
+{
+ long vcard_msgnum;
+
+ if (goto_config_room() != 0) {
+ if (during_login) do_welcome();
+ else display_main_menu();
+ return;
}
+ vcard_msgnum = locate_user_vcard(WC->wc_fullname, -1);
+ if (vcard_msgnum < 0L) {
+ if (during_login) do_welcome();
+ else display_main_menu();
+ return;
+ }
-void do_logout(void) {
- char buf[256];
+ if (during_login) {
+ do_edit_vcard(vcard_msgnum, "1", "do_welcome");
+ }
+ else {
+ do_edit_vcard(vcard_msgnum, "1", "display_main_menu");
+ }
- strcpy(wc_username, "");
- strcpy(wc_password, "");
- strcpy(wc_roomname, "");
- strcpy(wc_host, "");
- strcpy(wc_port, "");
+}
- printf("HTTP/1.0 200 OK\n");
- output_headers();
- printf("X-WebCit-Session: close\n");
-
- wprintf("<HTML><HEAD><TITLE>Goodbye</TITLE></HEAD><BODY><CENTER>\n");
- serv_puts("MESG goodbye");
- serv_gets(buf);
- if (buf[0]=='1') fmout(NULL);
- else wprintf("Goodbye\n");
- wprintf("<HR><A HREF=\"/\">Log in again</A>\n");
+/**
+ * display form for changing your password
+ */
+void display_changepw(void)
+{
+ char buf[SIZ];
+
+ output_headers(1, 1, 2, 0, 0, 0);
+ wprintf("<div id=\"banner\">\n"
+ "<TABLE WIDTH=100%% BORDER=0 BGCOLOR=\"#444455\"><TR><TD>"
+ "<SPAN CLASS=\"titlebar\">");
+ wprintf(_("Change your password"));
+ wprintf("</SPAN>"
+ "</TD></TR></TABLE>\n"
+ "</div>\n<div id=\"content\">\n"
+ );
+
+ if (strlen(WC->ImportantMessage) > 0) {
+ do_template("beginbox_nt");
+ wprintf("<SPAN CLASS=\"errormsg\">"
+ "%s</SPAN><br />\n", WC->ImportantMessage);
+ do_template("endbox");
+ safestrncpy(WC->ImportantMessage, "", sizeof WC->ImportantMessage);
+ }
- wprintf("</CENTER></BODY></HTML>\n");
- wDumpContent();
- serv_puts("QUIT");
- exit(0);
+ wprintf("<div class=\"fix_scrollbar_bug\">"
+ "<table border=0 width=100%% bgcolor=\"#ffffff\"><tr><td>\n");
+
+ wprintf("<CENTER><br />");
+ serv_puts("MESG changepw");
+ serv_getln(buf, sizeof buf);
+ if (buf[0] == '1') {
+ fmout("CENTER");
}
+
+ wprintf("<form name=\"changepwform\" action=\"changepw\" method=\"post\">\n");
+ wprintf("<CENTER>"
+ "<table border=\"0\" cellspacing=\"5\" cellpadding=\"5\" "
+ "BGCOLOR=\"#EEEEEE\">"
+ "<TR><TD>");
+ wprintf(_("Enter new password:"));
+ wprintf("</TD>\n");
+ wprintf("<TD><INPUT TYPE=\"password\" NAME=\"newpass1\" VALUE=\"\" MAXLENGTH=\"20\"></TD></TR>\n");
+ wprintf("<TR><TD>");
+ wprintf(_("Enter it again to confirm:"));
+ wprintf("</TD>\n");
+ wprintf("<TD><INPUT TYPE=\"password\" NAME=\"newpass2\" VALUE=\"\" MAXLENGTH=\"20\"></TD></TR>\n");
+
+ wprintf("</TABLE><br />\n");
+ wprintf("<INPUT type=\"submit\" name=\"change_action\" value=\"%s\">", _("Change password"));
+ wprintf(" ");
+ wprintf("<INPUT type=\"submit\" name=\"cancel_action\" value=\"%s\">\n", _("Cancel"));
+ wprintf("</form></center>\n");
+ wprintf("</td></tr></table></div>\n");
+ wDumpContent(1);
+}
+
+/**
+ * \brief change password
+ * if passwords match, propagate it to citserver.
+ */
+void changepw(void)
+{
+ char buf[SIZ];
+ char newpass1[32], newpass2[32];
+
+ if (strlen(bstr("change_action")) == 0) {
+ safestrncpy(WC->ImportantMessage,
+ _("Cancelled. Password was not changed."),
+ sizeof WC->ImportantMessage);
+ display_main_menu();
+ return;
+ }
+
+ safestrncpy(newpass1, bstr("newpass1"), sizeof newpass1);
+ safestrncpy(newpass2, bstr("newpass2"), sizeof newpass2);
+
+ if (strcasecmp(newpass1, newpass2)) {
+ safestrncpy(WC->ImportantMessage,
+ _("They don't match. Password was not changed."),
+ sizeof WC->ImportantMessage);
+ display_changepw();
+ return;
+ }
+
+ if (strlen(newpass1) == 0) {
+ safestrncpy(WC->ImportantMessage,
+ _("Blank passwords are not allowed."),
+ sizeof WC->ImportantMessage);
+ display_changepw();
+ return;
+ }
+
+ serv_printf("SETP %s", newpass1);
+ serv_getln(buf, sizeof buf);
+ sprintf(WC->ImportantMessage, "%s", &buf[4]);
+ if (buf[0] == '2') {
+ safestrncpy(WC->wc_password, buf, sizeof WC->wc_password);
+ display_main_menu();
+ }
+ else {
+ display_changepw();
+ }
+}
+
+
+
+/** @} */