Bivio::Biz::Model::UserLoginForm
# Copyright (c) 1999-2023 bivio Software, Inc. All rights reserved. package Bivio::Biz::Model::UserLoginForm; use strict; use Bivio::Base 'Model.UserLoginBaseForm'; b_use('IO.Trace'); # C<Bivio::Biz::Model::UserLoginForm> is used to login which changes the # cookie. Modules which "login" users should call <tt>execute</tt> # with the new realm_owner. # # A user is logged in if his PASSWORD_FIELD is set in the cookie. We keep the # user_id in the cookie so we can track logged out users. our($_TRACE); b_use('IO.Config')->register(my $_CFG = { register_with_cookie => 1, }); (my $_C = b_use('AgentHTTP.Cookie'))->register(__PACKAGE__) if $_CFG->{register_with_cookie}; sub SUPER_USER_FIELD { # B<DEPRECATED>: # L<Bivio::Biz::Model::AdmSubstituteUserForm::SUPER_USER_FIELD|Bivio::Biz::Model::AdmSubstituteUserForm/SUPER_USER_FIELD> Bivio::IO::Alert->warn_deprecated( q{use Bivio::Biz::Model->get_instance('AdmSubstituteUserForm')->SUPER_USER_FIELD}); return shift->get_instance('AdmSubstituteUserForm')->SUPER_USER_FIELD; } sub disable_assert_cookie { shift->internal_put_field(disable_assert_cookie => 1); return; } sub execute_ok { my($self) = @_; my($res) = shift->SUPER::execute_ok(@_); my($req) = $self->get_request; my($realm) = $self->unsafe_get('validate_called') ? $self->get('realm_owner') : $self->has_keys('realm_owner') ? _assert_realm($self) : $self->has_keys('login') ? _assert_login($self) : b_die('missing form fields'); b_warn('RealmOwner.password was NOT CHECKED') if defined($self->unsafe_get('RealmOwner.password')) && !$self->unsafe_get('validate_called'); return _su_logout($self) if !$realm && $req->is_substitute_user; if ($realm && $realm->is_locked_out && !$req->is_substitute_user) { b_warn('locked owner=', $self); $self->throw_die('NOT_FOUND', {entity => $realm}); # DOES NOT RETURN } _set_user($self, $realm, $req->unsafe_get('cookie'), $req); _set_cookie_user($self, $req, $realm); return $res unless $realm && $realm->require_otp; return $res unless $self->new_other('OTP')->unauth_load_or_die({ user_id => $realm->get('realm_id'), })->should_reinit; return { task_id => 'USER_OTP', query => undef, }; } sub handle_config { my(undef, $cfg) = @_; $_CFG = $cfg; return; } sub handle_cookie_in { # Sets the I<auth_user_id> if user is logged in. Sets the user # in the log (via I<r> record). # # Doesn't read the database to validate ids, simply translates values # from cookie to real code. my($proto, $cookie, $req) = @_; $proto = Bivio::Biz::Model->get_instance('UserLoginForm'); _set_user($proto, _load_cookie_user($proto, $cookie, $req), $cookie, $req); # If user is invalid, logout as super user _su_logout($proto->new($req)) if $req->is_substitute_user && ! $req->get('auth_user'); return; } sub substitute_user { my($proto, $new_user, $req, $form) = @_; my($self) = ref($proto) ? $proto : $proto->new($req); # Become another user if you are super_user. Returns the task to switch # to or undef (default). # A small sanity check, since this is an important function Bivio::Die->throw(FORBIDDEN => { message => 'not a super user', entity => $req->get('auth_user'), request => $req, }) unless ($form || $self->new_other('AdmSubstituteUserForm')) ->can_substitute_user($new_user->get('realm_id')); unless ($req->unsafe_get('super_user_id')) { # Only set super_user_id field if not already set. This keeps # original user and doesn't allow someone to su to an admin and # then su as that admin. my($super_user_id) = $req->get('auth_user')->get('realm_id'); my($cookie) = $req->unsafe_get('cookie'); $cookie->put(_super_user_field($self) => $super_user_id) if $cookie; $req->put_durable(super_user_id => $super_user_id); } _trace($req->unsafe_get('super_user_id'), ' => ', $new_user) if $_TRACE; return $self->process({ realm_owner => $new_user, disable_assert_cookie => _disable_assert_cookie($self), }); } sub unsafe_get_cookie_user_id { my($proto, $req) = @_; # Returns user_id in cookie independent of login state. return _get($req->unsafe_get('cookie'), $proto->USER_FIELD); } sub _assert_login { my($self) = @_; my($realm) = $self->validate_login; $self->throw_die('NOT_FOUND', { entity => $self->get('login'), }) if $self->in_error; return $realm; } sub _assert_realm { my($self) = @_; # Validates realm_owner is valid return undef unless my $realm = $self->get('realm_owner'); my($err) = $realm->validate_login_for_self; $self->throw_die('NOT_FOUND', {entity => $realm, message => $err}) if $err; $self->internal_put_field(validate_called => 1); return $realm; } sub _cookie_password { my($realm) = @_; return $realm->require_otp ? $realm->new_other('OTP') ->unauth_load_or_die({user_id => $realm->get('realm_id')}) ->get('otp_md5') : $realm->get('password') } sub _disable_assert_cookie { my($self) = @_; return $self->unsafe_get('disable_assert_cookie') || $self->ureq('disable_assert_cookie') || 0; } sub _get { my($cookie, $field) = @_; # Returns cookie field, if there is a cookie. return $cookie && $cookie->unsafe_get($field); } sub _load_cookie_user { my($proto, $cookie, $req) = @_; # Returns auth_user if logged in. Otherwise indicates logged out or # just visitor. return undef unless $cookie->unsafe_get($proto->USER_FIELD); my($auth_user) = Bivio::Biz::Model->new($req, 'RealmOwner'); if ($auth_user->unauth_load({ realm_id => $cookie->get($proto->USER_FIELD), realm_type => Bivio::Auth::RealmType->USER, })) { return $auth_user if $req->is_substitute_user; # Must have password to be logged in my($cp) = _get($cookie, $proto->PASSWORD_FIELD); return undef unless $cp; return $auth_user if _validate_cookie_password($cp, $auth_user); $req->warn($auth_user, ': user is not valid'); } else { $req->warn($cookie->get($proto->USER_FIELD), ': user_id not found, logging out'); } $cookie->delete($proto->USER_FIELD, $proto->PASSWORD_FIELD); return undef; } sub _set_cookie_user { my($self, $req, $realm) = @_; # Checks to see if the cookie was received. If so, set the state. # If there's no cookie, just ignore (probably command line app) my($cookie) = $req->unsafe_get('cookie'); return unless $cookie; # If logging in, need to have a cookie. $_C->assert_is_ok($req) if $realm && !_disable_assert_cookie($self); if ($realm) { $cookie->put( $self->USER_FIELD => $realm->get('realm_id'), $self->PASSWORD_FIELD => _cookie_password($realm), ); } else { $cookie->delete($self->PASSWORD_FIELD); } return; } sub _set_log_user { my($proto, $cookie, $req) = @_; # Set the user for this connection. Shows up in the server log. my($r) = $req->unsafe_get('r'); return unless $r; my($uid) = $req->get('auth_user_id') || _get($cookie, $proto->USER_FIELD); my($suid) = $req->get('super_user_id') || _get($cookie, _super_user_field($proto)); $r->connection->user( ($suid ? 'su-' . $suid . '-' : '') . ($uid ? ($req->get('user_state')->eq_logged_in ? 'li-' : 'lo-') . $uid : '')); return; } sub _set_user { my($proto, $user, $cookie, $req) = @_; # Sets user on request based on cookie state. $req->set_user($user); $req->put_durable( # Cookie overrides but may not have a cookie so super_user_id super_user_id => _get($cookie, _super_user_field($proto)) || $req->unsafe_get('super_user_id'), user_state => $proto->use('Type.UserState')->from_name( $user ? 'LOGGED_IN' : _get($cookie, $proto->USER_FIELD) ? 'LOGGED_OUT' : 'JUST_VISITOR'), ); _set_log_user($proto, $cookie, $req); return $user; } sub _su_logout { return shift->new_other('AdmSubstituteUserForm')->su_logout; } sub _super_user_field { # Returns SUPER_USER_FIELD return shift->get_instance('AdmSubstituteUserForm')->SUPER_USER_FIELD; } sub _validate_cookie_password { my($passwd, $auth_user) = @_; return $auth_user->require_otp ? $auth_user->new_other('OTP')->validate_password($passwd, $auth_user) : $passwd eq $auth_user->get('password') ? 1 : 0; } 1;