piler/webui/model/user/auth.php

85 lines
2.9 KiB
PHP
Raw Normal View History

2012-02-08 23:14:28 +01:00
<?php
class ModelUserAuth extends Model {
public function checkLogin($username = '', $password = '') {
2012-10-06 14:18:00 +02:00
$ok = 0;
2012-02-08 23:14:28 +01:00
$query = $this->db->query("SELECT " . TABLE_USER . ".username, " . TABLE_USER . ".uid, " . TABLE_USER . ".realname, " . TABLE_USER . ".dn, " . TABLE_USER . ".password, " . TABLE_USER . ".isadmin, " . TABLE_USER . ".domain FROM " . TABLE_USER . ", " . TABLE_EMAIL . " WHERE " . TABLE_EMAIL . ".email=? AND " . TABLE_EMAIL . ".uid=" . TABLE_USER . ".uid", array($username));
2012-02-08 23:14:28 +01:00
if(!isset($query->row['password'])) { return 0; }
$pass = crypt($password, $query->row['password']);
if($pass == $query->row['password']){
2012-10-06 14:18:00 +02:00
$ok = 1;
2012-02-08 23:14:28 +01:00
2012-10-06 14:18:00 +02:00
AUDIT(ACTION_LOGIN, $username, '', '', 'successful auth against user table');
}
else {
AUDIT(ACTION_LOGIN_FAILED, $username, '', '', 'failed auth against user table');
}
if($ok == 0 && strlen($query->row['dn']) > 3) {
2012-10-06 21:35:22 +02:00
$ok = $this->checkLoginAgainstLDAP($query->row, $password);
2012-10-06 14:18:00 +02:00
}
if($ok == 1) {
2012-02-08 23:14:28 +01:00
$_SESSION['username'] = $query->row['username'];
$_SESSION['uid'] = $query->row['uid'];
$_SESSION['admin_user'] = $query->row['isadmin'];
$_SESSION['email'] = $username;
$_SESSION['domain'] = $query->row['domain'];
$_SESSION['realname'] = $query->row['realname'];
2012-07-06 15:02:23 +02:00
$_SESSION['emails'] = $this->model_user_user->get_users_all_email_addresses($query->row['uid']);
2012-09-06 15:27:20 +02:00
$_SESSION['folders'] = $this->model_folder_folder->get_all_folder_ids($query->row['uid']);
2012-09-15 15:30:35 +02:00
$_SESSION['extra_folders'] = $this->model_folder_folder->get_all_extra_folder_ids($query->row['uid']);
2012-02-08 23:14:28 +01:00
return 1;
}
return 0;
}
private function checkLoginAgainstLDAP($user = array(), $password = '') {
if($password == '' || !isset($user['username']) || !isset($user['domain']) || !isset($user['dn']) || strlen($user['domain']) < 2){ return 0; }
$query = $this->db->query("SELECT remotehost, basedn FROM " . TABLE_REMOTE . " WHERE remotedomain=?", array($user['domain']));
if($query->num_rows != 1) { return 0; }
$ldap = new LDAP($query->row['remotehost'], $user['dn'], $password);
if($ldap->is_bind_ok()) {
2012-06-22 15:22:02 +02:00
$this->change_password($user['username'], $password);
2012-02-08 23:14:28 +01:00
AUDIT(ACTION_LOGIN, $user['username'], '', '', 'changed password in local table');
return 1;
}
else {
AUDIT(ACTION_LOGIN_FAILED, $user['username'], '', '', 'failed bind to ' . $query->row['remotehost'], $user['dn']);
}
return 0;
}
2012-06-22 15:22:02 +02:00
public function change_password($username = '', $password = '') {
2012-02-08 23:14:28 +01:00
if($username == "" || $password == ""){ return 0; }
$query = $this->db->query("UPDATE " . TABLE_USER . " SET password=? WHERE username=?", array(crypt($password), $username));
$rc = $this->db->countAffected();
return $rc;
}
}
?>