X-Git-Url: http://git.roojs.org/?a=blobdiff_plain;f=DataObjects%2FCore_person.php;h=a76d975fca74366eb7386e35efd6d7c1f2d8245d;hb=d2cfff04c699ccae894eff96b59ebdc54ecb23e8;hp=091e40cae680cf71eadac1dfe6c6a82a45fd4187;hpb=b521b8e31aab0dad81070e958380fe2fd0273924;p=Pman.Core diff --git a/DataObjects/Core_person.php b/DataObjects/Core_person.php index 091e40ca..a76d975f 100644 --- a/DataObjects/Core_person.php +++ b/DataObjects/Core_person.php @@ -50,6 +50,9 @@ class Pman_Core_DataObjects_Core_person extends DB_DataObject /* the code above is auto generated do not remove the tag below */ ###END_AUTOCODE + + static $authUser = false; + function owner() { @@ -172,18 +175,13 @@ class Pman_Core_DataObjects_Core_person extends DB_DataObject // h embeds images here.. $body = $mime->get(); $headers = $mime->headers($headers); - } - - return array( 'recipients' => $recipents, 'headers' => $headers, 'body' => $body ); - - } @@ -195,10 +193,8 @@ class Pman_Core_DataObjects_Core_person extends DB_DataObject */ function sendTemplate($templateFile, $args) { - $ar = $this->buildMail($templateFile, $args); - //print_r($recipents);exit; $mailOptions = PEAR::getStaticProperty('Mail','options'); $mail = Mail::factory("SMTP",$mailOptions); @@ -211,7 +207,6 @@ class Pman_Core_DataObjects_Core_person extends DB_DataObject error_reporting($oe); return $ret; - } @@ -299,12 +294,12 @@ class Pman_Core_DataObjects_Core_person extends DB_DataObject } - // local auth - - $default_admin = false; - if (!empty($ff->Pman['local_autoauth']) && - ($ff->Pman['local_autoauth'] === true) && - (!empty($_SERVER['SERVER_ADDR'])) && - ( + $auto_auth_allow = false; + if (!empty($ff->Pman['local_autoauth']) && $ff->Pman['local_autoauth'] === true) { + $auto_auth_allow = true; + } + if ( + (!empty($_SERVER['SERVER_ADDR'])) && ( $_SERVER['SERVER_ADDR'] == '127.0.0.1' && $_SERVER['REMOTE_ADDR'] == '127.0.0.1' @@ -314,8 +309,19 @@ class Pman_Core_DataObjects_Core_person extends DB_DataObject $_SERVER['SERVER_ADDR'] == '::1' && $_SERVER['REMOTE_ADDR'] == '::1' ) - ) - ) { + + ){ + $auto_auth_allow = true; + } + + + if (empty($_SERVER['PATH_INFO']) || $_SERVER['PATH_INFO'] == '/Login') { + $auto_auth_allow = false; + } + //var_dump($auto_auth_allow); + // local auth - + $default_admin = false; + if ($auto_auth_allow) { $group = DB_DataObject::factory('core_group'); $group->get('name', 'Administrators'); @@ -337,24 +343,14 @@ class Pman_Core_DataObjects_Core_person extends DB_DataObject $u = DB_DataObject::factory($this->tableName()); $ff = HTML_FlexyFramework::get(); - if (!empty($ff->Pman['local_autoauth']) && - (!empty($_SERVER['SERVER_ADDR'])) && - ( - ( - $_SERVER['SERVER_ADDR'] == '127.0.0.1' && - $_SERVER['REMOTE_ADDR'] == '127.0.0.1' - ) - || - ( - $_SERVER['SERVER_ADDR'] == '::1' && - $_SERVER['REMOTE_ADDR'] == '::1' - ) - ) && + if ($auto_auth_allow && ($default_admin || $u->get('email', $ff->Pman['local_autoauth'])) ) { $user = $default_admin ? $default_admin->toArray() : $u->toArray(); + // if we request other URLS.. then we get auto logged in.. + $_SESSION[get_class($this)][$sesPrefix .'-auth'] = serialize((object) $user); return true; } @@ -378,10 +374,9 @@ class Pman_Core_DataObjects_Core_person extends DB_DataObject } } if (!$n){ // authenticated as there are no users in the system... - return true; + return true; } - - return false; + return false; } @@ -528,22 +523,25 @@ class Pman_Core_DataObjects_Core_person extends DB_DataObject function checkTwoFactorAuthentication($val) { + + + // also used in login require_once 'System.php'; + if( + empty($this->id) || + empty($this->oath_key) + ) { + return false; + } + $oathtool = System::which('oathtool'); if (!$oathtool) { return false; } - if(!isset($this->oath_key)) { - $au = $this->getAuthUser(); - $oath_key = $au->oath_key; - } else { - $oath_key = $this->oath_key; - } - - $cmd = "{$oathtool} --totp --base32 {$oath_key}"; + $cmd = "{$oathtool} --totp --base32 " . escapeshellarg($this->oath_key); $password = exec($cmd); @@ -678,6 +676,11 @@ class Pman_Core_DataObjects_Core_person extends DB_DataObject $aur['oath_key'] = ''; $aur['oath_key_enable'] = !empty($this->oath_key); + $aur['require_oath'] = 1; + + $s = DB_DataObject::Factory('core_setting'); + $oath_require = $s->lookup('core', 'two_factor_authentication_requirement'); + $aur['require_oath'] = $oath_require ? $oath_require->val : 0; return $aur; } @@ -769,30 +772,26 @@ class Pman_Core_DataObjects_Core_person extends DB_DataObject function applyFilters($q, $au, $roo) { //DB_DataObject::DebugLevel(1); - if(!empty($q['_generate_oath_key'])){ - $o = clone($this); - $this->generateOathKey(); - $this->update($o); - $roo->jok('OK'); - } - - // missing id for core_person mgmt if(!empty($q['_to_qr_code'])){ + $person = DB_DataObject::factory('Core_person'); + $person->id = $q['id']; - if($q['id'] == 'is_auth') { - $person = $this->getAuthUser(); - } else { - $person = DB_DataObject::factory('Core_person'); - $person->get($q['id']); + if(!$person->find(true)) { + $roo->jerr('_invalid_person'); } - $o = clone($person); - - $person->generateOathKey(); + $hash = $this->generateOathKey(); - $person->update($o); - - $qrcode = $person->generateQRCode(); + $_SESSION[__CLASS__] = + isset($_SESSION[__CLASS__]) ? + $_SESSION[__CLASS__] : array(); + $_SESSION[__CLASS__]['oath'] = + isset($_SESSION[__CLASS__]['oath']) ? + $_SESSION[__CLASS__]['oath'] : array(); + + $_SESSION[__CLASS__]['oath'][$person->id] = $hash; + + $qrcode = $person->generateQRCode($hash); if(empty($qrcode)){ $roo->jerr('Fail to generate QR Code'); @@ -802,15 +801,14 @@ class Pman_Core_DataObjects_Core_person extends DB_DataObject } if(!empty($q['two_factor_auth_code'])) { - - $person = $this; - - if(isset($q['id'])) { - $person = DB_DataObject::factory('core_person'); - $person->get($q['id']); - } + $person = DB_DataObject::factory('core_person'); + $person->get($q['id']); + $o = clone($person); + $person->oath_key = $_SESSION[__CLASS__]['oath'][$person->id]; if($person->checkTwoFactorAuthentication($q['two_factor_auth_code'])) { + $person->update($o); + unset($_SESSION[__CLASS__]['oath'][$person->id]); $roo->jok('DONE'); } @@ -818,22 +816,12 @@ class Pman_Core_DataObjects_Core_person extends DB_DataObject } if(!empty($q['oath_key_disable'])) { - - if($q['id'] == 'is_auth') { - $person = $this->getAuthUser(); - } else { - $person = DB_DataObject::factory('Core_person'); - $person->get($q['id']); - } - - if(empty($person)) { - $roo->jerr('Please login to the system'); - } + $person = DB_DataObject::factory('core_person'); + $person->get($q['id']); $o = clone($person); $person->oath_key = ''; - $person->update($o); $roo->jok('DONE'); @@ -1128,7 +1116,7 @@ class Pman_Core_DataObjects_Core_person extends DB_DataObject $this->setFrom($ar); if(!empty($ar['_enable_oath_key'])){ - $this->generateOathKey(); + $oath_key = $this->generateOathKey(); } if (!empty($ar['passwd1'])) { @@ -1452,22 +1440,18 @@ class Pman_Core_DataObjects_Core_person extends DB_DataObject function generateOathKey() { - $hex = bin2hex(openssl_random_pseudo_bytes(10)); - require 'Base32.php'; $base32 = new Base32(); - $this->oath_key = $base32->base32_encode($hex); - - return $this->oath_key; + return $base32->base32_encode(bin2hex(openssl_random_pseudo_bytes(10))); } - function generateQRCode() + function generateQRCode($hash) { if( empty($this->email) && - empty($this->oath_key) + empty($hash) ){ return false; } @@ -1475,7 +1459,7 @@ class Pman_Core_DataObjects_Core_person extends DB_DataObject $issuer = (empty($this->name)) ? rawurlencode('ROOJS') : rawurlencode($this->name); - $uri = "otpauth://totp/{$issuer}:{$this->email}?secret={$this->oath_key}&issuer={$issuer}&algorithm=SHA1&digits=6&period=30"; + $uri = "otpauth://totp/{$issuer}:{$this->email}?secret={$hash}&issuer={$issuer}&algorithm=SHA1&digits=6&period=30"; require_once 'Image/QRCode.php';