sso.Drupal.class.php 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295
  1. <?php
  2. /* For licensing terms, see /license.txt */
  3. use ChamiloSession as Session;
  4. /**
  5. * This file contains the necessary elements to implement a Single Sign On
  6. * mechanism with an external Drupal application (on which the Chamilo module
  7. * 7.x-1.0-alpha3 or above must be implemented)
  8. *
  9. * To use this class, set variable "sso_authentication_subclass" to "Drupal"
  10. * in Chamilo settings. If not yet available in the "Security" tab, execute the
  11. * following on the Chamilo database:
  12. * INSERT INTO `settings_current` (`variable`, `type`, `category`, `selected_value`, `title`, `comment`, `access_url`)
  13. * VALUES ('sso_authentication_subclass', 'textfield', 'Security', 'Drupal', 'SSOSubclass', 'SSOSubclassComment', 1);
  14. *
  15. * @package chamilo.auth.sso
  16. */
  17. /**
  18. * The SSO class allows for management of remote Single Sign On resources
  19. */
  20. class ssoDrupal
  21. {
  22. public $protocol; // 'http://',
  23. public $domain; // 'localhost/project/drupal',
  24. public $auth_uri; // '/?q=user',
  25. public $deauth_uri; // '/?q=logout',
  26. public $referer; // http://my.chamilo.com/main/auth/profile.php
  27. /**
  28. * Instanciates the object, initializing all relevant URL strings
  29. */
  30. public function __construct()
  31. {
  32. $this->protocol = api_get_setting('sso_authentication_protocol');
  33. // There can be multiple domains, so make sure to take only the first
  34. // This might be later extended with a decision process
  35. $domains = preg_split('/,/', api_get_setting('sso_authentication_domain'));
  36. $this->domain = trim($domains[0]);
  37. $this->auth_uri = api_get_setting('sso_authentication_auth_uri');
  38. $this->deauth_uri = api_get_setting('sso_authentication_unauth_uri');
  39. //cut the string to avoid recursive URL construction in case of failure
  40. $this->referer = $this->protocol.$_SERVER['HTTP_HOST'].substr($_SERVER['REQUEST_URI'], 0, strpos($_SERVER['REQUEST_URI'], 'sso'));
  41. $this->deauth_url = $this->protocol.$this->domain.$this->deauth_uri;
  42. $this->master_url = $this->protocol.$this->domain.$this->auth_uri;
  43. $this->referrer_uri = base64_encode($_SERVER['REQUEST_URI']);
  44. $this->target = api_get_path(WEB_PATH);
  45. }
  46. /**
  47. * Unlogs the user from the remote server
  48. */
  49. public function logout()
  50. {
  51. // no_redirect means Drupal sent the signal to logout. When redirecting to Drupal, the $_GET['stop'] param is
  52. // set to 1, to allow Drupal to know that this is it, the logout is already done in Chamilo and there's no
  53. // need to do it again
  54. if (empty($_GET['no_redirect'])) {
  55. header('Location: '.$this->deauth_url.'&stop=1');
  56. } else {
  57. header('Location: '.$this->protocol.$this->domain);
  58. }
  59. exit;
  60. }
  61. /**
  62. * Sends the user to the master URL for a check of active connection
  63. */
  64. public function ask_master()
  65. {
  66. // Generate a single usage token that must be encoded by the master
  67. $_SESSION['sso_challenge'] = api_generate_password(48);
  68. // Redirect browser to the master URL
  69. $params = '';
  70. if (empty($_GET['no_redirect'])) {
  71. $params = 'sso_referer='.urlencode($this->referer).
  72. '&sso_target='.urlencode($this->target).
  73. '&sso_challenge='.urlencode($_SESSION['sso_challenge']).
  74. '&sso_ruri='.urlencode($this->referrer_uri);
  75. if (strpos($this->master_url, "?") === false) {
  76. $params = "?{$params}";
  77. } else {
  78. $params = "&{$params}";
  79. }
  80. }
  81. header('Location: '.$this->master_url.$params);
  82. exit;
  83. }
  84. /**
  85. * Validates the received active connection data with the database
  86. * @return bool Return the loginFailed variable value to local.inc.php
  87. */
  88. public function check_user()
  89. {
  90. global $_user;
  91. $loginFailed = false;
  92. //change the way we recover the cookie depending on how it is formed
  93. $sso = $this->decode_cookie($_GET['sso_cookie']);
  94. //get token that should have been used and delete it
  95. //from session since it can only be used once
  96. $sso_challenge = '';
  97. if (isset($_SESSION['sso_challenge'])) {
  98. $sso_challenge = $_SESSION['sso_challenge'];
  99. unset($_SESSION['sso_challenge']);
  100. }
  101. //lookup the user in the main database
  102. $user_table = Database::get_main_table(TABLE_MAIN_USER);
  103. $sql = "SELECT id, username, password, auth_source, active, expiration_date, status
  104. FROM $user_table
  105. WHERE username = '".trim(Database::escape_string($sso['username']))."'";
  106. $result = Database::query($sql);
  107. if (Database::num_rows($result) > 0) {
  108. $uData = Database::fetch_array($result);
  109. //Check the user's password
  110. if ($uData['auth_source'] == PLATFORM_AUTH_SOURCE) {
  111. if ($sso['secret'] === sha1($uData['username'].$sso_challenge.api_get_security_key())
  112. && ($sso['username'] == $uData['username'])) {
  113. //Check if the account is active (not locked)
  114. if ($uData['active']=='1') {
  115. // check if the expiration date has not been reached
  116. if (empty($uData['expiration_date']) OR $uData['expiration_date'] > date('Y-m-d H:i:s') OR $uData['expiration_date']=='0000-00-00 00:00:00') {
  117. //If Multiple URL is enabled
  118. if (api_get_multiple_access_url()) {
  119. //Check the access_url configuration setting if the user is registered in the access_url_rel_user table
  120. //Getting the current access_url_id of the platform
  121. $current_access_url_id = api_get_current_access_url_id();
  122. // my user is subscribed in these
  123. //sites: $my_url_list
  124. $my_url_list = api_get_access_url_from_user($uData['id']);
  125. } else {
  126. $current_access_url_id = 1;
  127. $my_url_list = array(1);
  128. }
  129. $my_user_is_admin = UserManager::is_admin($uData['id']);
  130. if ($my_user_is_admin === false) {
  131. if (is_array($my_url_list) && count($my_url_list) > 0) {
  132. if (in_array($current_access_url_id, $my_url_list)) {
  133. // the user has permission to enter at this site
  134. $_user['user_id'] = $uData['id'];
  135. $_user = api_get_user_info($_user['user_id']);
  136. $_user['uidReset'] = true;
  137. Session::write('_user', $_user);
  138. Event::event_login($_user['user_id']);
  139. // Redirect to homepage
  140. $sso_target = '';
  141. if (!empty($sso['ruri'])) {
  142. //The referrer URI is *only* used if
  143. // the user credentials are OK, which
  144. // should be protection enough
  145. // against evil URL spoofing...
  146. $sso_target = api_get_path(WEB_PATH) . base64_decode($sso['ruri']);
  147. } else {
  148. $sso_target = isset($sso['target']) ? $sso['target'] : api_get_path(WEB_PATH) . 'index.php';
  149. }
  150. header('Location: '. $sso_target);
  151. exit;
  152. } else {
  153. // user does not have permission for this site
  154. $loginFailed = true;
  155. Session::erase('_uid');
  156. header('Location: '.api_get_path(WEB_PATH).'index.php?loginFailed=1&error=access_url_inactive');
  157. exit;
  158. }
  159. } else {
  160. // there is no URL in the multiple
  161. // urls list for this user
  162. $loginFailed = true;
  163. Session::erase('_uid');
  164. header('Location: '.api_get_path(WEB_PATH).'index.php?loginFailed=1&error=access_url_inactive');
  165. exit;
  166. }
  167. } else {
  168. //Only admins of the "main" (first) Chamilo
  169. // portal can login wherever they want
  170. if (in_array(1, $my_url_list)) {
  171. //Check if this admin is admin on the
  172. // principal portal
  173. $_user['user_id'] = $uData['id'];
  174. $_user = api_get_user_info($_user['user_id']);
  175. $is_platformAdmin = $uData['status'] == COURSEMANAGER;
  176. Session::write('is_platformAdmin', $is_platformAdmin);
  177. Session::write('_user', $_user);
  178. Event::event_login($_user['user_id']);
  179. } else {
  180. //Secondary URL admin wants to login
  181. // so we check as a normal user
  182. if (in_array($current_access_url_id, $my_url_list)) {
  183. $_user['user_id'] = $uData['user_id'];
  184. $_user = api_get_user_info($_user['user_id']);
  185. Session::write('_user', $_user);
  186. Event::event_login($_user['user_id']);
  187. } else {
  188. $loginFailed = true;
  189. Session::erase('_uid');
  190. header('Location: '.api_get_path(WEB_PATH).'index.php?loginFailed=1&error=access_url_inactive');
  191. exit;
  192. }
  193. }
  194. }
  195. } else {
  196. // user account expired
  197. $loginFailed = true;
  198. Session::erase('_uid');
  199. header('Location: '.api_get_path(WEB_PATH).'index.php?loginFailed=1&error=account_expired');
  200. exit;
  201. }
  202. } else {
  203. //User not active
  204. $loginFailed = true;
  205. Session::erase('_uid');
  206. header('Location: '.api_get_path(WEB_PATH).'index.php?loginFailed=1&error=account_inactive');
  207. exit;
  208. }
  209. } else {
  210. //SHA1 of password is wrong
  211. $loginFailed = true;
  212. Session::erase('_uid');
  213. header('Location: '.api_get_path(WEB_PATH).'index.php?loginFailed=1&error=wrong_password');
  214. exit;
  215. }
  216. } else {
  217. //Auth_source is wrong
  218. $loginFailed = true;
  219. Session::erase('_uid');
  220. header('Location: '.api_get_path(WEB_PATH).'index.php?loginFailed=1&error=wrong_authentication_source');
  221. exit;
  222. }
  223. } else {
  224. //No user by that login
  225. $loginFailed = true;
  226. Session::erase('_uid');
  227. header('Location: '.api_get_path(WEB_PATH).'index.php?loginFailed=1&error=user_not_found');
  228. exit;
  229. }
  230. return $loginFailed;
  231. }
  232. /**
  233. * Decode the cookie (this function may vary depending on the
  234. * Single Sign On implementation
  235. * @param string Encoded cookie
  236. * @return array Parsed and unencoded cookie
  237. */
  238. private function decode_cookie($cookie)
  239. {
  240. return unserialize(base64_decode($cookie));
  241. }
  242. /**
  243. * Generate the URL for profile editing for a any user or the current user
  244. * @param int $userId Optional. The user id
  245. * @param boolean $asAdmin Optional. Whether get the URL for the platform admin
  246. * @return string If the URL is obtained return the drupal_user_id. Otherwise return false
  247. */
  248. public function generateProfileEditingURL($userId = 0, $asAdmin = false)
  249. {
  250. $userId = intval($userId);
  251. if (empty($userId)) {
  252. $userId = api_get_user_id();
  253. }
  254. $userExtraFieldValue = new ExtraFieldValue('user');
  255. $drupalUserIdData = $userExtraFieldValue->get_values_by_handler_and_field_variable(
  256. $userId,
  257. 'drupal_user_id'
  258. );
  259. // If this is an administrator, allow him to make some changes in
  260. // the Chamilo profile
  261. if ($asAdmin && api_is_platform_admin(true)) {
  262. return api_get_path(WEB_CODE_PATH) . "admin/user_edit.php?user_id=$userId";
  263. }
  264. // If the user doesn't match a Drupal user, give the normal profile
  265. // link
  266. if ($drupalUserIdData === false) {
  267. return api_get_path(WEB_CODE_PATH) . 'auth/profile.php';
  268. }
  269. // In all other cases, generate a link to the Drupal profile edition
  270. $drupalUserId = $drupalUserIdData['value'];
  271. $url = "{$this->protocol}{$this->domain}/user/{$drupalUserId}/edit";
  272. return $url;
  273. }
  274. }