Projekt

Allgemein

Profil

Herunterladen (38,1 KB) Statistiken
| Zweig: | Markierung: | Revision:
package SL::Auth;

use DBI;

use Digest::MD5 qw(md5_hex);
use IO::File;
use Time::HiRes qw(gettimeofday);
use List::MoreUtils qw(any uniq);
use YAML;
use Regexp::IPv6 qw($IPv6_re);

use SL::Auth::ColumnInformation;
use SL::Auth::Constants qw(:all);
use SL::Auth::DB;
use SL::Auth::HTTPHeaders;
use SL::Auth::LDAP;
use SL::Auth::Password;
use SL::Auth::SessionValue;

use SL::SessionFile;
use SL::User;
use SL::DBConnect;
use SL::DBUpgrade2;
use SL::DBUtils qw(do_query do_statement prepare_execute_query prepare_query selectall_array_query selectrow_query selectall_ids);

use strict;

use constant SESSION_KEY_ROOT_AUTH => 'session_auth_status_root';
use constant SESSION_KEY_USER_AUTH => 'session_auth_status_user';

use Rose::Object::MakeMethods::Generic (
scalar => [ qw(client) ],
);


sub new {
my ($type, %params) = @_;
my $self = bless {}, $type;

$self->_read_auth_config(%params);
$self->init;

return $self;
}

sub init {
my ($self, %params) = @_;

$self->{SESSION} = { };
$self->{FULL_RIGHTS} = { };
$self->{RIGHTS} = { };
$self->{unique_counter} = 0;
$self->{column_information} = SL::Auth::ColumnInformation->new(auth => $self);
}

sub reset {
my ($self, %params) = @_;

$self->{SESSION} = { };
$self->{FULL_RIGHTS} = { };
$self->{RIGHTS} = { };
$self->{unique_counter} = 0;

if ($self->is_db_connected) {
# reset is called during request shutdown already. In case of a
# completely new auth DB this would fail and generate an error
# message even if the user is currently trying to create said auth
# DB. Therefore only fetch the column information if a connection
# has been established.
$self->{column_information} = SL::Auth::ColumnInformation->new(auth => $self);
$self->{column_information}->_fetch;
} else {
delete $self->{column_information};
}

$_->reset for @{ $self->{authenticators} };

$self->client(undef);
}

sub set_client {
my ($self, $id_or_name) = @_;

$self->client(undef);

return undef unless $id_or_name;

my $column = $id_or_name =~ m/^\d+$/ ? 'id' : 'name';
my $dbh = $self->dbconnect;

return undef unless $dbh;

$self->client($dbh->selectrow_hashref(qq|SELECT * FROM auth.clients WHERE ${column} = ?|, undef, $id_or_name));

return $self->client;
}

sub get_default_client_id {
my ($self) = @_;

my $dbh = $self->dbconnect;

return unless $dbh;

my $row = $dbh->selectrow_hashref(qq|SELECT id FROM auth.clients WHERE is_default = TRUE LIMIT 1|);

return $row->{id} if $row;
}

sub DESTROY {
my $self = shift;

$self->{dbh}->disconnect() if ($self->{dbh});
}

# form isn't loaded yet, so auth needs it's own error.
sub mini_error {
$::lxdebug->show_backtrace();

my ($self, @msg) = @_;
if ($ENV{HTTP_USER_AGENT}) {
# $::form might not be initialized yet at this point — therefore
# we cannot use "create_http_response" yet.
my $cgi = CGI->new('');
print $cgi->header('-type' => 'text/html', '-charset' => 'UTF-8');
print "<pre>", join ('<br>', @msg), "</pre>";
} else {
print STDERR "Error: @msg\n";
}
$::dispatcher->end_request;
}

sub _read_auth_config {
my ($self, %params) = @_;

map { $self->{$_} = $::lx_office_conf{authentication}->{$_} } keys %{ $::lx_office_conf{authentication} };

# Prevent password leakage to log files when dumping Auth instances.
$self->{admin_password} = sub { $::lx_office_conf{authentication}->{admin_password} };

if ($params{unit_tests_database}) {
$self->{DB_config} = $::lx_office_conf{'testing/database'};
$self->{module} = 'DB';

} else {
$self->{DB_config} = $::lx_office_conf{'authentication/database'};
}

$self->{authenticators} = [];
$self->{module} ||= 'DB';
$self->{module} =~ s{^ +| +$}{}g;

foreach my $module (split m{ +}, $self->{module}) {
my $config_name;
($module, $config_name) = split m{:}, $module, 2;
$config_name ||= $module eq 'DB' ? 'database' : $module eq 'HTTPHeaders' ? 'http_headers' : lc($module);
my $config = $::lx_office_conf{'authentication/' . $config_name};

if (!$config) {
my $locale = Locale->new('en');
$self->mini_error($locale->text('Missing configuration section "authentication/#1" in "config/kivitendo.conf".', $config_name));
}

if ($module eq 'DB') {
push @{ $self->{authenticators} }, SL::Auth::DB->new($self);

} elsif ($module eq 'LDAP') {
push @{ $self->{authenticators} }, SL::Auth::LDAP->new($config);

} elsif ($module eq 'HTTPHeaders') {
push @{ $self->{authenticators} }, SL::Auth::HTTPHeaders->new($config);

} else {
my $locale = Locale->new('en');
$self->mini_error($locale->text('Unknown authenticantion module #1 specified in "config/kivitendo.conf".', $module));
}
}

my $cfg = $self->{DB_config};

if (!$cfg) {
my $locale = Locale->new('en');
$self->mini_error($locale->text('config/kivitendo.conf: Key "DB_config" is missing.'));
}

if (!$cfg->{host} || !$cfg->{db} || !$cfg->{user}) {
my $locale = Locale->new('en');
$self->mini_error($locale->text('config/kivitendo.conf: Missing parameters in "authentication/database". Required parameters are "host", "db" and "user".'));
}

$_->verify_config for @{ $self->{authenticators} };

$self->{session_timeout} *= 1;
$self->{session_timeout} = 8 * 60 if (!$self->{session_timeout});
}

sub has_access_to_client {
my ($self, $login) = @_;

return 0 if !$self->client || !$self->client->{id};

my $sql = <<SQL;
SELECT cu.client_id
FROM auth.clients_users cu
LEFT JOIN auth."user" u ON (cu.user_id = u.id)
WHERE (u.login = ?)
AND (cu.client_id = ?)
SQL

my ($has_access) = $self->dbconnect->selectrow_array($sql, undef, $login, $self->client->{id});
return $has_access;
}

sub authenticate_root {
my ($self, $password) = @_;

my $session_root_auth = $self->get_session_value(SESSION_KEY_ROOT_AUTH());
if (defined $session_root_auth && $session_root_auth == OK) {
return OK;
}

if (!defined $password) {
return ERR_PASSWORD;
}

my $admin_password = SL::Auth::Password->hash_if_unhashed(login => 'root', password => $self->{admin_password}->());
$password = SL::Auth::Password->hash(login => 'root', password => $password, stored_password => $admin_password);

my $result = $password eq $admin_password ? OK : ERR_PASSWORD;
$self->set_session_value(SESSION_KEY_ROOT_AUTH() => $result);

return $result;
}

sub set_session_authenticated {
my ($self, $login, $result) = @_;

$self->set_session_value(SESSION_KEY_USER_AUTH() => $result, login => $login, client_id => $self->client->{id});
}

sub authenticate {
my ($self, $login, $password) = @_;

if (!$self->client || !$self->has_access_to_client($login)) {
return ERR_PASSWORD;
}

my $session_auth = $self->get_session_value(SESSION_KEY_USER_AUTH());
if (defined $session_auth && $session_auth == OK) {
return OK;
}

if (!defined $password) {
return ERR_PASSWORD;
}

my $result = ERR_USER;
if ($login) {
foreach my $authenticator (@{ $self->{authenticators} }) {
$result = $authenticator->authenticate($login, $password);
last if $result == OK;
}
}

$self->set_session_authenticated($login, $result);

return $result;
}

sub punish_wrong_login {
my $failed_login_penalty = ($::lx_office_conf{authentication} || {})->{failed_login_penalty};
sleep $failed_login_penalty if $failed_login_penalty;
}

sub get_stored_password {
my ($self, $login) = @_;

my $dbh = $self->dbconnect;

return undef unless $dbh;

my $query = qq|SELECT password FROM auth."user" WHERE login = ?|;
my ($stored_password) = $dbh->selectrow_array($query, undef, $login);

return $stored_password;
}

sub dbconnect {
my $self = shift;
my $may_fail = shift;

if ($self->{dbh}) {
return $self->{dbh};
}

my $cfg = $self->{DB_config};
my $dsn = 'dbi:Pg:dbname=' . $cfg->{db} . ';host=' . $cfg->{host};

if ($cfg->{port}) {
$dsn .= ';port=' . $cfg->{port};
}

$main::lxdebug->message(LXDebug->DEBUG1, "Auth::dbconnect DSN: $dsn");

$self->{dbh} = SL::DBConnect->connect($dsn, $cfg->{user}, $cfg->{password}, { pg_enable_utf8 => 1, AutoCommit => 1 });

if (!$may_fail && !$self->{dbh}) {
delete $self->{dbh};
$main::form->error($main::locale->text('The connection to the authentication database failed:') . "\n" . $DBI::errstr);
}

return $self->{dbh};
}

sub dbdisconnect {
my $self = shift;

if ($self->{dbh}) {
$self->{dbh}->disconnect();
delete $self->{dbh};
}
}

sub is_db_connected {
my ($self) = @_;
return !!$self->{dbh};
}

sub check_tables {
my ($self, $dbh) = @_;

$dbh ||= $self->dbconnect();
my $query = qq|SELECT COUNT(*) FROM pg_tables WHERE (schemaname = 'auth') AND (tablename = 'user')|;

my ($count) = $dbh->selectrow_array($query);

return $count > 0;
}

sub check_database {
my $self = shift;

my $dbh = $self->dbconnect(1);

return $dbh ? 1 : 0;
}

sub create_database {
my $self = shift;
my %params = @_;

my $cfg = $self->{DB_config};

if (!$params{superuser}) {
$params{superuser} = $cfg->{user};
$params{superuser_password} = $cfg->{password};
}

$params{template} ||= 'template0';
$params{template} =~ s|[^a-zA-Z0-9_\-]||g;

my $dsn = 'dbi:Pg:dbname=template1;host=' . $cfg->{host};

if ($cfg->{port}) {
$dsn .= ';port=' . $cfg->{port};
}

$main::lxdebug->message(LXDebug->DEBUG1(), "Auth::create_database DSN: $dsn");

my $dbh = SL::DBConnect->connect($dsn, $params{superuser}, $params{superuser_password}, { pg_enable_utf8 => 1 });

if (!$dbh) {
$main::form->error($main::locale->text('The connection to the template database failed:') . "\n" . $DBI::errstr);
}

my $query = qq|CREATE DATABASE "$cfg->{db}" OWNER "$cfg->{user}" TEMPLATE "$params{template}" ENCODING 'UNICODE'|;

$main::lxdebug->message(LXDebug->DEBUG1(), "Auth::create_database query: $query");

$dbh->do($query);

if ($dbh->err) {
my $error = $dbh->errstr();

$query = qq|SELECT pg_encoding_to_char(encoding) FROM pg_database WHERE datname = 'template0'|;
my ($cluster_encoding) = $dbh->selectrow_array($query);

if ($cluster_encoding && ($cluster_encoding !~ m/^(?:UTF-?8|UNICODE)$/i)) {
$error = $::locale->text('Your PostgreSQL installationen does not use Unicode as its encoding. This is not supported anymore.');
}

$dbh->disconnect();

$main::form->error($main::locale->text('The creation of the authentication database failed:') . "\n" . $error);
}

$dbh->disconnect();
}

sub create_tables {
my $self = shift;
my $dbh = $self->dbconnect();

$dbh->rollback();
SL::DBUpgrade2->new(form => $::form)->process_query($dbh, 'sql/auth_db.sql');
}

sub save_user {
my $self = shift;
my $login = shift;
my %params = @_;

my $form = $main::form;

my $dbh = $self->dbconnect();

my ($sth, $query, $user_id);

$dbh->begin_work;

$query = qq|SELECT id FROM auth."user" WHERE login = ?|;
($user_id) = selectrow_query($form, $dbh, $query, $login);

if (!$user_id) {
$query = qq|SELECT nextval('auth.user_id_seq')|;
($user_id) = selectrow_query($form, $dbh, $query);

$query = qq|INSERT INTO auth."user" (id, login) VALUES (?, ?)|;
do_query($form, $dbh, $query, $user_id, $login);
}

$query = qq|DELETE FROM auth.user_config WHERE (user_id = ?)|;
do_query($form, $dbh, $query, $user_id);

$query = qq|INSERT INTO auth.user_config (user_id, cfg_key, cfg_value) VALUES (?, ?, ?)|;
$sth = prepare_query($form, $dbh, $query);

while (my ($cfg_key, $cfg_value) = each %params) {
next if ($cfg_key eq 'password');

do_statement($form, $sth, $query, $user_id, $cfg_key, $cfg_value);
}

$dbh->commit();
}

sub can_change_password {
my $self = shift;

return any { $_->can_change_password } @{ $self->{authenticators} };
}

sub change_password {
my ($self, $login, $new_password) = @_;

my $overall_result = OK;

foreach my $authenticator (@{ $self->{authenticators} }) {
next unless $authenticator->can_change_password;

my $result = $authenticator->change_password($login, $new_password);
$overall_result = $result if $result != OK;
}

return $overall_result;
}

sub read_all_users {
my $self = shift;

my $dbh = $self->dbconnect();
my $query = qq|SELECT u.id, u.login, cfg.cfg_key, cfg.cfg_value, s.mtime AS last_action

FROM auth."user" AS u

LEFT JOIN auth.user_config AS cfg
ON (cfg.user_id = u.id)

LEFT JOIN auth.session_content AS sc_login
ON (sc_login.sess_key = 'login' AND sc_login.sess_value = ('--- ' \|\| u.login \|\| '\n'))

LEFT JOIN auth.session AS s
ON (s.id = sc_login.session_id)
|;
my $sth = prepare_execute_query($main::form, $dbh, $query);

my %users;

while (my $ref = $sth->fetchrow_hashref()) {

$users{$ref->{login}} ||= {
'login' => $ref->{login},
'id' => $ref->{id},
'last_action' => $ref->{last_action},
};
$users{$ref->{login}}->{$ref->{cfg_key}} = $ref->{cfg_value} if (($ref->{cfg_key} ne 'login') && ($ref->{cfg_key} ne 'id'));
}

$sth->finish();

return %users;
}

sub read_user {
my ($self, %params) = @_;

my $dbh = $self->dbconnect();

my (@where, @values);
if ($params{login}) {
push @where, 'u.login = ?';
push @values, $params{login};
}
if ($params{id}) {
push @where, 'u.id = ?';
push @values, $params{id};
}
my $where = join ' AND ', '1 = 1', @where;
my $query = qq|SELECT u.id, u.login, cfg.cfg_key, cfg.cfg_value
FROM auth.user_config cfg
LEFT JOIN auth."user" u ON (cfg.user_id = u.id)
WHERE $where|;
my $sth = prepare_execute_query($main::form, $dbh, $query, @values);

my %user_data;

# Set defaults for options not present in database
$user_data{follow_up_notify_by_email} = 1;

while (my $ref = $sth->fetchrow_hashref()) {
$user_data{$ref->{cfg_key}} = $ref->{cfg_value};
@user_data{qw(id login)} = @{$ref}{qw(id login)};
}

# The XUL/XML & 'CSS new' backed menus have been removed.
my %menustyle_map = ( xml => 'new', v4 => 'v3' );
$user_data{menustyle} = $menustyle_map{lc($user_data{menustyle} || '')} || $user_data{menustyle};

# The 'Win2000.css' stylesheet has been removed.
$user_data{stylesheet} = 'kivitendo.css' if ($user_data{stylesheet} || '') =~ m/win2000/i;

# Set default language if selected language does not exist (anymore).
$user_data{countrycode} = $::lx_office_conf{system}->{language} unless $user_data{countrycode} && -d "locale/$user_data{countrycode}";

$sth->finish();

return %user_data;
}

sub get_user_id {
my $self = shift;
my $login = shift;

my $dbh = $self->dbconnect();
my ($id) = selectrow_query($main::form, $dbh, qq|SELECT id FROM auth."user" WHERE login = ?|, $login);

return $id;
}

sub delete_user {
my $self = shift;
my $login = shift;

my $dbh = $self->dbconnect;
my $id = $self->get_user_id($login);

if (!$id) {
$dbh->rollback;
return;
}

$dbh->begin_work;

do_query($::form, $dbh, qq|DELETE FROM auth.user_group WHERE user_id = ?|, $id);
do_query($::form, $dbh, qq|DELETE FROM auth.user_config WHERE user_id = ?|, $id);
do_query($::form, $dbh, qq|DELETE FROM auth.user WHERE id = ?|, $id);

# TODO: SL::Auth::delete_user
# do_query($::form, $u_dbh, qq|UPDATE employee SET deleted = 't' WHERE login = ?|, $login) if $u_dbh && $user_db_exists;

$dbh->commit;
}

# --------------------------------------

my $session_id;

sub restore_session {
my $self = shift;

$session_id = $::request->{cgi}->cookie($self->get_session_cookie_name());
$session_id =~ s|[^0-9a-f]||g if $session_id;

$self->{SESSION} = { };

if (!$session_id) {
return $self->session_restore_result(SESSION_NONE());
}

my ($dbh, $query, $sth, $cookie, $ref, $form);

$form = $main::form;

# Don't fail if the auth DB doesn't exist yet.
if (!( $dbh = $self->dbconnect(1) )) {
return $self->session_restore_result(SESSION_NONE());
}

# Don't fail if the "auth" schema doesn't exist yet, e.g. if the
# admin is creating the session tables at the moment.
$query = qq|SELECT *, (mtime < (now() - '$self->{session_timeout}m'::interval)) AS is_expired FROM auth.session WHERE id = ?|;

if (!($sth = $dbh->prepare($query)) || !$sth->execute($session_id)) {
$sth->finish if $sth;
return $self->session_restore_result(SESSION_NONE());
}

$cookie = $sth->fetchrow_hashref;
$sth->finish;

# The session ID provided is valid in the following cases:
# 1. session ID exists in the database
# 2. hasn't expired yet
# 3. if cookie for the API token is given: the cookie's value equal database column 'auth.session.api_token' for the session ID
$self->{api_token} = $cookie->{api_token} if $cookie;
my $api_token_cookie = $self->get_api_token_cookie;
my $cookie_is_bad = !$cookie || $cookie->{is_expired};
$cookie_is_bad ||= $api_token_cookie && ($api_token_cookie ne $cookie->{api_token}) if $api_token_cookie;
if ($cookie_is_bad) {
$self->destroy_session();
return $self->session_restore_result($cookie ? SESSION_EXPIRED() : SESSION_NONE());
}

if ($self->{column_information}->has('auto_restore')) {
$self->_load_with_auto_restore_column($dbh, $session_id);
} else {
$self->_load_without_auto_restore_column($dbh, $session_id);
}

return $self->session_restore_result(SESSION_OK());
}

sub session_restore_result {
my $self = shift;
if (@_) {
$self->{session_restore_result} = $_[0];
}
return $self->{session_restore_result};
}

sub _load_without_auto_restore_column {
my ($self, $dbh, $session_id) = @_;

my $query = <<SQL;
SELECT sess_key, sess_value
FROM auth.session_content
WHERE (session_id = ?)
SQL
my $sth = prepare_execute_query($::form, $dbh, $query, $session_id);

while (my $ref = $sth->fetchrow_hashref) {
my $value = SL::Auth::SessionValue->new(auth => $self,
key => $ref->{sess_key},
value => $ref->{sess_value},
raw => 1);
$self->{SESSION}->{ $ref->{sess_key} } = $value;

next if defined $::form->{$ref->{sess_key}};

my $data = $value->get;
$::form->{$ref->{sess_key}} = $data if $value->{auto_restore} || !ref $data;
}
}

sub _load_with_auto_restore_column {
my ($self, $dbh, $session_id) = @_;

my %auto_restore_keys = map { $_ => 1 } qw(login password rpw client_id), SESSION_KEY_ROOT_AUTH, SESSION_KEY_USER_AUTH;

my $query = <<SQL;
SELECT sess_key, sess_value, auto_restore
FROM auth.session_content
WHERE (session_id = ?) AND (auto_restore OR sess_key IN (@{[ join ',', ("?") x keys %auto_restore_keys ]}))
SQL
my $sth = prepare_execute_query($::form, $dbh, $query, $session_id, keys %auto_restore_keys);

my $need_delete;
while (my $ref = $sth->fetchrow_hashref) {
$need_delete = 1 if $ref->{auto_restore};
my $value = SL::Auth::SessionValue->new(auth => $self,
key => $ref->{sess_key},
value => $ref->{sess_value},
auto_restore => $ref->{auto_restore},
raw => 1);
$self->{SESSION}->{ $ref->{sess_key} } = $value;

next if defined $::form->{$ref->{sess_key}};

my $data = $value->get;
$::form->{$ref->{sess_key}} = $data if $value->{auto_restore} || !ref $data;
}

$sth->finish;

if ($need_delete) {
do_query($::form, $dbh, 'DELETE FROM auth.session_content WHERE auto_restore AND session_id = ?', $session_id);
}
}

sub destroy_session {
my $self = shift;

if ($session_id) {
my $dbh = $self->dbconnect();

$dbh->begin_work;

do_query($main::form, $dbh, qq|DELETE FROM auth.session_content WHERE session_id = ?|, $session_id);
do_query($main::form, $dbh, qq|DELETE FROM auth.session WHERE id = ?|, $session_id);

$dbh->commit();

SL::SessionFile->destroy_session($session_id);

$session_id = undef;
$self->{SESSION} = { };
}
}

sub active_session_ids {
my $self = shift;
my $dbh = $self->dbconnect;

my $query = qq|SELECT id FROM auth.session|;

my @ids = selectall_array_query($::form, $dbh, $query);

return @ids;
}

sub expire_sessions {
my $self = shift;

return if !$self->session_tables_present;

my $dbh = $self->dbconnect();

my $query = qq|SELECT id
FROM auth.session
WHERE (mtime < (now() - '$self->{session_timeout}m'::interval))|;

my @ids = selectall_array_query($::form, $dbh, $query);

if (@ids) {
$dbh->begin_work;

SL::SessionFile->destroy_session($_) for @ids;

$query = qq|DELETE FROM auth.session_content
WHERE session_id IN (| . join(', ', ('?') x scalar(@ids)) . qq|)|;
do_query($main::form, $dbh, $query, @ids);

$query = qq|DELETE FROM auth.session
WHERE id IN (| . join(', ', ('?') x scalar(@ids)) . qq|)|;
do_query($main::form, $dbh, $query, @ids);

$dbh->commit();
}
}

sub _create_session_id {
my @data;
map { push @data, int(rand() * 255); } (1..32);

my $id = md5_hex(pack 'C*', @data);

return $id;
}

sub create_or_refresh_session {
$session_id ||= shift->_create_session_id;
}

sub save_session {
my $self = shift;
my $provided_dbh = shift;

my $dbh = $provided_dbh || $self->dbconnect(1);

return unless $dbh && $session_id;

$dbh->begin_work unless $provided_dbh;

# If this fails then the "auth" schema might not exist yet, e.g. if
# the admin is just trying to create the auth database.
if (!$dbh->do(qq|LOCK auth.session_content|)) {
$dbh->rollback unless $provided_dbh;
return;
}

my ($id) = selectrow_query($::form, $dbh, qq|SELECT id FROM auth.session WHERE id = ?|, $session_id);

if ($id) {
do_query($::form, $dbh, qq|UPDATE auth.session SET mtime = now() WHERE id = ?|, $session_id);
} else {
do_query($::form, $dbh, qq|INSERT INTO auth.session (id, ip_address, mtime) VALUES (?, ?, now())|, $session_id, $ENV{REMOTE_ADDR});
}

if ($self->{column_information}->has('api_token', 'session')) {
my ($stored_api_token) = $dbh->selectrow_array(qq|SELECT api_token FROM auth.session WHERE id = ?|, undef, $session_id);
do_query($::form, $dbh, qq|UPDATE auth.session SET api_token = ? WHERE id = ?|, $self->_create_session_id, $session_id) unless $stored_api_token;
}

my @values_to_save = grep { $_->{modified} }
values %{ $self->{SESSION} };
if (@values_to_save) {
my %known_keys = map { $_ => 1 }
selectall_ids($::form, $dbh, qq|SELECT sess_key FROM auth.session_content WHERE session_id = ?|, 'sess_key', $session_id);
my $auto_restore = $self->{column_information}->has('auto_restore');

my $insert_query = $auto_restore
? "INSERT INTO auth.session_content (session_id, sess_key, sess_value, auto_restore) VALUES (?, ?, ?, ?)"
: "INSERT INTO auth.session_content (session_id, sess_key, sess_value) VALUES (?, ?, ?)";
my $insert_sth = prepare_query($::form, $dbh, $insert_query);

my $update_query = $auto_restore
? "UPDATE auth.session_content SET sess_value = ?, auto_restore = ? WHERE session_id = ? AND sess_key = ?"
: "UPDATE auth.session_content SET sess_value = ? WHERE session_id = ? AND sess_key = ?";
my $update_sth = prepare_query($::form, $dbh, $update_query);

foreach my $value (@values_to_save) {
my @values = ($value->{key}, $value->get_dumped);
push @values, $value->{auto_restore} if $auto_restore;

if ($known_keys{$value->{key}}) {
do_statement($::form, $update_sth, $update_query,
$value->get_dumped, ( $value->{auto_restore} )x!!$auto_restore, $session_id, $value->{key}
);
} else {
do_statement($::form, $insert_sth, $insert_query,
$session_id, $value->{key}, $value->get_dumped, ( $value->{auto_restore} )x!!$auto_restore
);
}
}

$insert_sth->finish;
$update_sth->finish;
}

$dbh->commit() unless $provided_dbh;
}

sub set_session_value {
my $self = shift;
my @params = @_;

$self->{SESSION} ||= { };

while (@params) {
my $key = shift @params;

if (ref $key eq 'HASH') {
$self->{SESSION}->{ $key->{key} } = SL::Auth::SessionValue->new(key => $key->{key},
value => $key->{value},
modified => 1,
auto_restore => $key->{auto_restore});

} else {
my $value = shift @params;
$self->{SESSION}->{ $key } = SL::Auth::SessionValue->new(key => $key,
value => $value,
modified => 1);
}
}

return $self;
}

sub delete_session_value {
my $self = shift;

$self->{SESSION} ||= { };
delete @{ $self->{SESSION} }{ @_ };

return $self;
}

sub get_session_value {
my ($self, $key) = @_;

return if !$self->{SESSION};

($self->{SESSION}{$key} //= SL::Auth::SessionValue->new(auth => $self, key => $key))->get
}

sub create_unique_session_value {
my ($self, $value, %params) = @_;

$self->{SESSION} ||= { };

my @now = gettimeofday();
my $key = "$$-" . ($now[0] * 1000000 + $now[1]) . "-";
$self->{unique_counter} ||= 0;

my $hashed_key;
do {
$self->{unique_counter}++;
$hashed_key = md5_hex($key . $self->{unique_counter});
} while (exists $self->{SESSION}->{$hashed_key});

$self->set_session_value($hashed_key => $value);

return $hashed_key;
}

sub save_form_in_session {
my ($self, %params) = @_;

my $form = delete($params{form}) || $::form;
my $non_scalars = delete $params{non_scalars};
my $data = {};

my %skip_keys = map { ( $_ => 1 ) } (qw(login password stylesheet version titlebar), @{ $params{skip_keys} || [] });

foreach my $key (grep { !$skip_keys{$_} } keys %{ $form }) {
$data->{$key} = $form->{$key} if !ref($form->{$key}) || $non_scalars;
}

return $self->create_unique_session_value($data, %params);
}

sub restore_form_from_session {
my ($self, $key, %params) = @_;

my $data = $self->get_session_value($key);
return $self unless $data;

my $form = delete($params{form}) || $::form;
my $clobber = exists $params{clobber} ? $params{clobber} : 1;

map { $form->{$_} = $data->{$_} if $clobber || !exists $form->{$_} } keys %{ $data };

return $self;
}

sub set_cookie_environment_variable {
my $self = shift;
$ENV{HTTP_COOKIE} = $self->get_session_cookie_name() . "=${session_id}";
}

sub get_session_cookie_name {
my ($self, %params) = @_;

$params{type} ||= 'id';
my $name = $self->{cookie_name} || 'lx_office_erp_session_id';
$name .= '_api_token' if $params{type} eq 'api_token';

return $name;
}

sub get_session_id {
return $session_id;
}

sub get_api_token_cookie {
my ($self) = @_;

$::request->{cgi}->cookie($self->get_session_cookie_name(type => 'api_token'));
}

sub is_api_token_cookie_valid {
my ($self) = @_;
my $provided_api_token = $self->get_api_token_cookie;
return $self->{api_token} && $provided_api_token && ($self->{api_token} eq $provided_api_token);
}

sub _tables_present {
my ($self, @tables) = @_;
my $cache_key = join '_', @tables;

# Only re-check for the presence of auth tables if either the check
# hasn't been done before of if they weren't present.
return $self->{"$cache_key\_tables_present"} ||= do {
my $dbh = $self->dbconnect(1);

if (!$dbh) {
return 0;
}

my $query =
qq|SELECT COUNT(*)
FROM pg_tables
WHERE (schemaname = 'auth')
AND (tablename IN (@{[ join ', ', ('?') x @tables ]}))|;

my ($count) = selectrow_query($main::form, $dbh, $query, @tables);

scalar @tables == $count;
}
}

sub session_tables_present {
$_[0]->_tables_present('session', 'session_content');
}

sub master_rights_present {
$_[0]->_tables_present('master_rights');
}

# --------------------------------------

sub all_rights_full {
my ($self) = @_;

@{ $self->{master_rights} ||= do {
$self->dbconnect->selectall_arrayref("SELECT name, description, category FROM auth.master_rights ORDER BY position");
}
}
}

sub all_rights {
return map { $_->[0] } grep { !$_->[2] } $_[0]->all_rights_full;
}

sub read_groups {
my $self = shift;

my $form = $main::form;
my $groups = {};
my $dbh = $self->dbconnect();

my $query = 'SELECT * FROM auth."group"';
my $sth = prepare_execute_query($form, $dbh, $query);

my ($row, $group);

while ($row = $sth->fetchrow_hashref()) {
$groups->{$row->{id}} = $row;
}
$sth->finish();

$query = 'SELECT * FROM auth.user_group WHERE group_id = ?';
$sth = prepare_query($form, $dbh, $query);

foreach $group (values %{$groups}) {
my @members;

do_statement($form, $sth, $query, $group->{id});

while ($row = $sth->fetchrow_hashref()) {
push @members, $row->{user_id};
}
$group->{members} = [ uniq @members ];
}
$sth->finish();

$query = 'SELECT * FROM auth.group_rights WHERE group_id = ?';
$sth = prepare_query($form, $dbh, $query);

foreach $group (values %{$groups}) {
$group->{rights} = {};

do_statement($form, $sth, $query, $group->{id});

while ($row = $sth->fetchrow_hashref()) {
$group->{rights}->{$row->{right}} |= $row->{granted};
}

map { $group->{rights}->{$_} = 0 if (!defined $group->{rights}->{$_}); } $self->all_rights;
}
$sth->finish();

return $groups;
}

sub save_group {
my $self = shift;
my $group = shift;

my $form = $main::form;
my $dbh = $self->dbconnect();

$dbh->begin_work;

my ($query, $sth, $row, $rights);

if (!$group->{id}) {
($group->{id}) = selectrow_query($form, $dbh, qq|SELECT nextval('auth.group_id_seq')|);

$query = qq|INSERT INTO auth."group" (id, name, description) VALUES (?, '', '')|;
do_query($form, $dbh, $query, $group->{id});
}

do_query($form, $dbh, qq|UPDATE auth."group" SET name = ?, description = ? WHERE id = ?|, map { $group->{$_} } qw(name description id));

do_query($form, $dbh, qq|DELETE FROM auth.user_group WHERE group_id = ?|, $group->{id});

$query = qq|INSERT INTO auth.user_group (user_id, group_id) VALUES (?, ?)|;
$sth = prepare_query($form, $dbh, $query);

foreach my $user_id (uniq @{ $group->{members} }) {
do_statement($form, $sth, $query, $user_id, $group->{id});
}
$sth->finish();

do_query($form, $dbh, qq|DELETE FROM auth.group_rights WHERE group_id = ?|, $group->{id});

$query = qq|INSERT INTO auth.group_rights (group_id, "right", granted) VALUES (?, ?, ?)|;
$sth = prepare_query($form, $dbh, $query);

foreach my $right (keys %{ $group->{rights} }) {
do_statement($form, $sth, $query, $group->{id}, $right, $group->{rights}->{$right} ? 't' : 'f');
}
$sth->finish();

$dbh->commit();
}

sub delete_group {
my $self = shift;
my $id = shift;

my $form = $main::form;

my $dbh = $self->dbconnect();
$dbh->begin_work;

do_query($form, $dbh, qq|DELETE FROM auth.user_group WHERE group_id = ?|, $id);
do_query($form, $dbh, qq|DELETE FROM auth.group_rights WHERE group_id = ?|, $id);
do_query($form, $dbh, qq|DELETE FROM auth."group" WHERE id = ?|, $id);

$dbh->commit();
}

sub evaluate_rights_ary {
my $ary = shift;

my $value = 0;
my $action = '|';
my $negate = 0;

foreach my $el (@{$ary}) {
next unless defined $el;

if (ref $el eq "ARRAY") {
my $val = evaluate_rights_ary($el);
$val = !$val if $negate;
$negate = 0;
if ($action eq '|') {
$value |= $val;
} else {
$value &= $val;
}

} elsif (($el eq '&') || ($el eq '|')) {
$action = $el;

} elsif ($el eq '!') {
$negate = !$negate;

} elsif ($action eq '|') {
my $val = $el;
$val = !$val if $negate;
$negate = 0;
$value |= $val;

} else {
my $val = $el;
$val = !$val if $negate;
$negate = 0;
$value &= $val;

}
}

return $value;
}

sub _parse_rights_string {
my $self = shift;

my $login = shift;
my $access = shift;

my @stack;
my $cur_ary = [];

push @stack, $cur_ary;

while ($access =~ m/^([a-z_0-9]+|\||\&|\(|\)|\s+)/) {
my $token = $1;
substr($access, 0, length $1) = "";

next if ($token =~ /\s/);

if ($token eq "(") {
my $new_cur_ary = [];
push @stack, $new_cur_ary;
push @{$cur_ary}, $new_cur_ary;
$cur_ary = $new_cur_ary;

} elsif ($token eq ")") {
pop @stack;

if (!@stack) {
return 0;
}

$cur_ary = $stack[-1];

} elsif (($token eq "|") || ($token eq "&")) {
push @{$cur_ary}, $token;

} else {
push @{$cur_ary}, ($self->{RIGHTS}->{$login}->{$token} // 0) * 1;
}
}

my $result = ($access || (1 < scalar @stack)) ? 0 : evaluate_rights_ary($stack[0]);

return $result;
}

sub check_right {
my $self = shift;
my $login = shift;
my $right = shift;
my $default = shift;

$self->{FULL_RIGHTS} ||= { };
$self->{FULL_RIGHTS}->{$login} ||= { };

if (!defined $self->{FULL_RIGHTS}->{$login}->{$right}) {
$self->{RIGHTS} ||= { };
$self->{RIGHTS}->{$login} ||= $self->load_rights_for_user($login);

$self->{FULL_RIGHTS}->{$login}->{$right} = $self->_parse_rights_string($login, $right);
}

my $granted = $self->{FULL_RIGHTS}->{$login}->{$right};
$granted = $default if (!defined $granted);

return $granted;
}

sub deny_access {
my ($self) = @_;

$::dispatcher->reply_with_json_error(error => 'access') if $::request->type eq 'json';

delete $::form->{title};
$::form->show_generic_error($::locale->text("You do not have the permissions to access this function."));
}

sub assert {
my ($self, $right, $dont_abort) = @_;

if ($self->check_right($::myconfig{login}, $right)) {
return 1;
}

if (!$dont_abort) {
$self->deny_access;
}

return 0;
}

sub load_rights_for_user {
my ($self, $login) = @_;
my $dbh = $self->dbconnect;
my ($query, $sth, $row, $rights);

$rights = { map { $_ => 0 } $self->all_rights };

return $rights if !$self->client || !$login;

$query =
qq|SELECT gr."right", gr.granted
FROM auth.group_rights gr
WHERE group_id IN
(SELECT ug.group_id
FROM auth.user_group ug
LEFT JOIN auth."user" u ON (ug.user_id = u.id)
WHERE u.login = ?)
AND group_id IN
(SELECT cg.group_id
FROM auth.clients_groups cg
WHERE cg.client_id = ?)|;

$sth = prepare_execute_query($::form, $dbh, $query, $login, $self->client->{id});

while ($row = $sth->fetchrow_hashref()) {
$rights->{$row->{right}} |= $row->{granted};
}
$sth->finish();

return $rights;
}

1;
__END__

=pod

=encoding utf8

=head1 NAME

SL::Auth - Authentication and session handling

=head1 METHODS

=over 4

=item C<set_session_value @values>

=item C<set_session_value %values>

Store all values of C<@values> or C<%values> in the session. Each
member of C<@values> is tested if it is a hash reference. If it is
then it must contain the keys C<key> and C<value> and can optionally
contain the key C<auto_restore>. In this case C<value> is associated
with C<key> and restored to C<$::form> upon the next request
automatically if C<auto_restore> is trueish or if C<value> is a scalar
value.

If the current member of C<@values> is not a hash reference then it
will be used as the C<key> and the next entry of C<@values> is used as
the C<value> to store. In this case setting C<auto_restore> is not
possible.

Therefore the following two invocations are identical:

$::auth-E<gt>set_session_value(name =E<gt> "Charlie");
$::auth-E<gt>set_session_value({ key =E<gt> "name", value =E<gt> "Charlie" });

All of these values are copied back into C<$::form> for the next
request automatically if they're scalar values or if they have
C<auto_restore> set to trueish.

The values can be any Perl structure. They are stored as YAML dumps.

=item C<get_session_value $key>

Retrieve a value from the session. Returns C<undef> if the value
doesn't exist.

=item C<create_unique_session_value $value, %params>

Create a unique key in the session and store C<$value>
there.

Returns the key created in the session.

=item C<save_session>

Stores the session values in the database. This is the only function
that actually stores stuff in the database. Neither the various
setters nor the deleter access the database.

=item C<save_form_in_session %params>

Stores the content of C<$params{form}> (default: C<$::form>) in the
session using L</create_unique_session_value>.

If C<$params{non_scalars}> is trueish then non-scalar values will be
stored as well. Default is to only store scalar values.

The following keys will never be saved: C<login>, C<password>,
C<stylesheet>, C<titlebar>, C<version>. Additional keys not to save
can be given as an array ref in C<$params{skip_keys}>.

Returns the unique key under which the form is stored.

=item C<restore_form_from_session $key, %params>

Restores the form from the session into C<$params{form}> (default:
C<$::form>).

If C<$params{clobber}> is falsish then existing values with the same
key in C<$params{form}> will not be overwritten. C<$params{clobber}>
is on by default.

Returns C<$self>.

=item C<reset>

C<reset> deletes every state information from previous requests, but does not
close the database connection.

Creating a new database handle on each request can take up to 30% of the
pre-request startup time, so we want to avoid that for fast ajax calls.

=item C<assert, $right, $dont_abort>

Checks if current user has the C<$right>. If C<$dont_abort> is falsish
the request dies with a access denied error, otherwise returns true or false.

=back

=head1 BUGS

Nothing here yet.

=head1 AUTHOR

Moritz Bunkus E<lt>m.bunkus@linet-services.deE<gt>

=cut
(7-7/85)