]> WPIA git - gigi.git/blob - src/org/cacert/gigi/pages/LoginPage.java
58adcda2dacb1a3ab1aa3be2592f847554f58fde
[gigi.git] / src / org / cacert / gigi / pages / LoginPage.java
1 package org.cacert.gigi.pages;
2
3 import static org.cacert.gigi.Gigi.*;
4
5 import java.io.IOException;
6 import java.io.PrintWriter;
7 import java.security.cert.X509Certificate;
8 import java.util.HashMap;
9 import java.util.Map;
10
11 import javax.servlet.http.HttpServletRequest;
12 import javax.servlet.http.HttpServletResponse;
13 import javax.servlet.http.HttpSession;
14
15 import org.cacert.gigi.GigiApiException;
16 import org.cacert.gigi.database.DatabaseConnection;
17 import org.cacert.gigi.database.GigiPreparedStatement;
18 import org.cacert.gigi.database.GigiResultSet;
19 import org.cacert.gigi.dbObjects.CertificateOwner;
20 import org.cacert.gigi.dbObjects.Group;
21 import org.cacert.gigi.dbObjects.User;
22 import org.cacert.gigi.localisation.Language;
23 import org.cacert.gigi.output.template.Form;
24 import org.cacert.gigi.util.AuthorizationContext;
25 import org.cacert.gigi.util.PasswordHash;
26 import org.cacert.gigi.util.ServerConstants;
27
28 public class LoginPage extends Page {
29
30     public class LoginForm extends Form {
31
32         public LoginForm(HttpServletRequest hsr) {
33             super(hsr);
34         }
35
36         @Override
37         public boolean submit(PrintWriter out, HttpServletRequest req) throws GigiApiException {
38             tryAuthWithUnpw(req);
39             return false;
40         }
41
42         @Override
43         protected void outputContent(PrintWriter out, Language l, Map<String, Object> vars) {
44             getDefaultTemplate().output(out, l, vars);
45         }
46
47     }
48
49     public static final String LOGIN_RETURNPATH = "login-returnpath";
50
51     public LoginPage(String title) {
52         super(title);
53     }
54
55     @Override
56     public void doGet(HttpServletRequest req, HttpServletResponse resp) throws IOException {
57         if (req.getHeader("Host").equals(ServerConstants.getSecureHostNamePort())) {
58             resp.getWriter().println(getLanguage(req).getTranslation("Authentication with certificate failed. Try another certificate or use a password."));
59         } else {
60             new LoginForm(req).output(resp.getWriter(), getLanguage(req), new HashMap<String, Object>());
61         }
62     }
63
64     @Override
65     public boolean beforeTemplate(HttpServletRequest req, HttpServletResponse resp) throws IOException {
66         String redir = (String) req.getSession().getAttribute(LOGIN_RETURNPATH);
67         if (req.getSession().getAttribute("loggedin") == null) {
68             X509Certificate cert = getCertificateFromRequest(req);
69             if (cert != null) {
70                 tryAuthWithCertificate(req, cert);
71             }
72             if (req.getMethod().equals("POST")) {
73                 try {
74                     Form.getForm(req, LoginForm.class).submit(resp.getWriter(), req);
75                 } catch (GigiApiException e) {
76                 }
77             }
78         }
79
80         if (req.getSession().getAttribute("loggedin") != null) {
81             String s = redir;
82             if (s != null) {
83                 if ( !s.startsWith("/")) {
84                     s = "/" + s;
85                 }
86                 resp.sendRedirect(s);
87             } else {
88                 resp.sendRedirect("/");
89             }
90             return true;
91         }
92         return false;
93     }
94
95     @Override
96     public boolean needsLogin() {
97         return false;
98     }
99
100     private void tryAuthWithUnpw(HttpServletRequest req) {
101         String un = req.getParameter("username");
102         String pw = req.getParameter("password");
103         GigiPreparedStatement ps = DatabaseConnection.getInstance().prepare("SELECT `password`, `id` FROM `users` WHERE `email`=? AND verified='1'");
104         ps.setString(1, un);
105         GigiResultSet rs = ps.executeQuery();
106         if (rs.next()) {
107             String dbHash = rs.getString(1);
108             String hash = PasswordHash.verifyHash(pw, dbHash);
109             if (hash != null) {
110                 if ( !hash.equals(dbHash)) {
111                     GigiPreparedStatement gps = DatabaseConnection.getInstance().prepare("UPDATE `users` SET `password`=? WHERE `email`=?");
112                     gps.setString(1, hash);
113                     gps.setString(2, un);
114                     gps.executeUpdate();
115                 }
116                 loginSession(req, User.getById(rs.getInt(2)));
117                 req.getSession().setAttribute(LOGIN_METHOD, "Password");
118             }
119         }
120         rs.close();
121     }
122
123     public static User getUser(HttpServletRequest req) {
124         AuthorizationContext ac = getAuthorizationContext(req);
125         if (ac == null) {
126             return null;
127         }
128         return ac.getActor();
129     }
130
131     public static AuthorizationContext getAuthorizationContext(HttpServletRequest req) {
132         return ((AuthorizationContext) req.getSession().getAttribute(AUTH_CONTEXT));
133     }
134
135     private void tryAuthWithCertificate(HttpServletRequest req, X509Certificate x509Certificate) {
136         String serial = extractSerialFormCert(x509Certificate);
137         User user = fetchUserBySerial(serial);
138         if (user == null) {
139             return;
140         }
141         loginSession(req, user);
142         req.getSession().setAttribute(CERT_SERIAL, serial);
143         req.getSession().setAttribute(CERT_ISSUER, x509Certificate.getIssuerDN());
144         req.getSession().setAttribute(LOGIN_METHOD, "Certificate");
145     }
146
147     public static String extractSerialFormCert(X509Certificate x509Certificate) {
148         return x509Certificate.getSerialNumber().toString(16).toUpperCase();
149     }
150
151     public static User fetchUserBySerial(String serial) {
152         if ( !serial.matches("[A-Fa-f0-9]+")) {
153             throw new Error("serial malformed.");
154         }
155
156         CertificateOwner o = CertificateOwner.getByEnabledSerial(serial);
157         if (o == null || !(o instanceof User)) {
158             return null;
159         }
160         return (User) o;
161     }
162
163     public static X509Certificate getCertificateFromRequest(HttpServletRequest req) {
164         X509Certificate[] cert = (X509Certificate[]) req.getAttribute("javax.servlet.request.X509Certificate");
165         X509Certificate uc = null;
166         if (cert != null && cert[0] != null) {
167             uc = cert[0];
168         }
169         return uc;
170     }
171
172     private static final Group LOGIN_BLOCKED = Group.getByString("blockedlogin");
173
174     private void loginSession(HttpServletRequest req, User user) {
175         if (user.isInGroup(LOGIN_BLOCKED)) {
176             return;
177         }
178         req.getSession().invalidate();
179         HttpSession hs = req.getSession();
180         hs.setAttribute(LOGGEDIN, true);
181         hs.setAttribute(Language.SESSION_ATTRIB_NAME, user.getPreferredLocale());
182         hs.setAttribute(AUTH_CONTEXT, new AuthorizationContext(user, user));
183     }
184
185     @Override
186     public boolean isPermitted(AuthorizationContext ac) {
187         return ac == null;
188     }
189 }