3 // TODO: SO MUCH ERROR CHECKING ITS NOT FUNNY
6 // get out master library for ga4php
7 require_once("../lib/lib.php");
11 // first we want to fork into the background like all good daemons should
12 //$pid = pcntl_fork();
18 // i am the parent, i shall leave
19 echo "i am a parent, i leave\n";
22 global $MSG_QUEUE_KEY_ID_SERVER, $MSG_QUEUE_KEY_ID_CLIENT;
24 $cl_queue = msg_get_queue($MSG_QUEUE_KEY_ID_CLIENT, 0666 | 'IPC_CREAT');
25 $sr_queue = msg_get_queue($MSG_QUEUE_KEY_ID_SERVER, 0666 | 'IPC_CREAT');
32 msg_receive($sr_queue, 0, $msg_type, 16384, $msg);
34 case MSG_DELETE_USER_TOKEN:
35 $username = $msg["username"];
37 $sql = "select users_otk from users where users_username='$username'";
39 $res = $dbo->query($sql);
41 foreach($res as $row) {
42 $otkid = $row["users_otk"];
46 unlink("$BASE_DIR/authserver/authd/otks/$otkid.png");
49 $sql = "update users set users_tokendata='',users_otk='' where users_username='$username'";
51 $res = $dbo->query($sql);
53 msg_send($cl_queue, MSG_DELETE_USER_TOKEN, true);
55 case MSG_AUTH_USER_TOKEN:
56 echo "Call to auth user token\n";
57 // minimal checking, we leav it up to authenticateUser to do the real
59 if(!isset($msg["username"])) $msg["username"] = "";
60 if(!isset($msg["passcode"])) $msg["passcode"] = "";
61 $username = $msg["username"];
62 $passcode = $msg["passcode"];
64 $authval = $myga->authenticateUser($username, $passcode);
65 msg_send($cl_queue, MSG_AUTH_USER_TOKEN, $authval);
68 if(!isset($msg["username"])) {
69 msg_send($cl_queue, MSG_GET_OTK_ID, false);
71 $username = $msg["username"];
72 $sql = "select users_otk from users where users_username='$username'";
74 $res = $dbo->query($sql);
76 foreach($res as $row) {
77 $otkid = $row["users_otk"];
81 msg_send($cl_queue, MSG_GET_OTK_ID, false);
83 msg_send($cl_queue, MSG_GET_OTK_ID, $otkid);
88 if(!isset($msg["otk"])) {
89 msg_send($cl_queue, MSG_GET_OTK_PNG, false);
92 $sql = "select users_username from users where users_otk='$otk'";
94 $res = $dbo->query($sql);
96 foreach($res as $row) {
97 $username = $row["users_username"];
100 if($username == "") {
101 msg_send($cl_queue, MSG_GET_OTK_PNG, false);
102 } else if($username != $msg["username"]) {
103 msg_send($cl_queue, MSG_GET_OTK_PNG, false);
106 $hand = fopen("$BASE_DIR/authserver/authd/otks/$otk.png", "rb");
107 $data = fread($hand, filesize("$BASE_DIR/authserver/authd/otks/$otk.png"));
109 unlink("$BASE_DIR/authserver/authd/otks/$otk.png");
110 $sql = "update users set users_otk='' where users_username='$username'";
112 error_log("senting otk, fsize: ".filesize("$BASE_DIR/authserver/authd/otks/$otk.png")." $otk ");
113 msg_send($cl_queue, MSG_GET_OTK_PNG, $data);
118 case MSG_ADD_USER_TOKEN:
119 echo "Call to add user token\n";
120 if(!isset($msg["username"])) {
121 msg_send($cl_queue, MSG_ADD_USER_TOKEN, false);
124 $username = $msg["username"];
126 if(isset($msg["tokentype"])) {
127 $tokentype=$msg["tokentype"];
130 if(isset($msg["hexkey"])) {
131 $hexkey = $msg["hexkey"];
134 $myga->setUser($username, $tokentype, "", $hexkey);
136 $url = $myga->createUrl($username);
137 if(!file_exists("$BASE_DIR/authserver/authd/otks")) mkdir("$BASE_DIR/authserver/authd/otks");
138 $otk = generateRandomString();
139 system("qrencode -o $BASE_DIR/authserver/authd/otks/$otk.png $url");
141 $sql = "update users set users_otk='$otk' where users_username='$username'";
142 $dbo = getDatabase();
143 $res = $dbo->query($sql);
145 msg_send($cl_queue, MSG_ADD_USER_TOKEN, true);
148 case MSG_DELETE_USER:
149 echo "Call to del user\n";
150 if(!isset($msg["username"])) {
151 msg_send($cl_queue, MSG_DELETE_USER, false);
153 $username = $msg["username"];
156 $sql = "select users_otk from users where users_username='$username'";
157 $dbo = getDatabase();
158 $res = $dbo->query($sql);
160 foreach($res as $row) {
161 $otkid = $row["users_otk"];
164 unlink("otks/$otkid.png");
168 $sql = "delete from users where users_username='$username'";
169 $dbo = getDatabase();
172 msg_send($cl_queue, MSG_DELETE_USER, true);
175 case MSG_AUTH_USER_PASSWORD:
177 echo "Call to auth user pass\n";
178 if(!isset($msg["username"])) {
179 msg_send($cl_queue, MSG_AUTH_USER_PASSWORD, false);
182 if(!isset($msg["password"])) {
183 msg_send($cl_queue, MSG_AUTH_USER_PASSWORD, false);
187 $username = $msg["username"];
188 $password = $msg["password"];
189 $sql = "select users_password from users where users_username='$username'";
190 $dbo = getDatabase();
191 $res = $dbo->query($sql);
193 foreach($res as $row) {
194 $pass = $row["users_password"];
198 $ourpass = hash('sha512', $password);
199 echo "ourpass: $ourpass\nourhash: $pass\n";
200 if($ourpass == $pass) {
201 msg_send($cl_queue, MSG_AUTH_USER_PASSWORD, true);
204 msg_send($cl_queue, MSG_AUTH_USER_PASSWORD, false);
209 case MSG_SET_USER_PASSWORD:
210 echo "how on earth is that happening Call to set user pass, wtf?\n";
213 if(!isset($msg["username"])) {
214 msg_send($cl_queue, MSG_SET_USER_PASSWORD, false);
218 if(!isset($msg["password"])) {
219 msg_send($cl_queue, MSG_SET_USER_PASSWORD, false);
224 $username = $msg["username"];
225 $password = $msg["password"];
227 echo "would set pass for $username, to $password\n";
228 if($password == "") $pass = "";
229 else $pass = hash('sha512', $password);
231 $dbo = getDatabase();
232 echo "in set user pass for $username, $pass\n";
233 $sql = "update users set users_password='$pass' where users_username='$username'";
237 msg_send($cl_queue, MSG_SET_USER_REALNAME, true);
240 // these are irrelavent yet
243 case MSG_SET_USER_REALNAME:
244 echo "Call to set user realname\n";
246 if(!isset($msg["username"])) {
247 msg_send($cl_queue, MSG_SET_USER_REALNAME, false);
250 if(!isset($msg["realname"])) {
251 msg_send($cl_queue, MSG_SET_USER_REALNAME, false);
255 $username = $msg["username"];
256 $realname = $msg["realname"];
257 $sql = "update users set users_realname='$realname' where users_username='$username'";
258 $dbo = getDatabase();
262 msg_send($cl_queue, MSG_SET_USER_REALNAME, true);
264 // TODO now set real name
266 case MSG_SET_USER_TOKEN:
268 echo "Call to set user token\n";
269 if(!isset($msg["username"])) {
270 msg_send($cl_queue, MSG_SET_USER_TOKEN, false);
273 if(!isset($msg["tokenstring"])) {
274 msg_send($cl_queue, MSG_SET_USER_TOKEN, false);
279 $username = $msg["username"];
280 $token = $msg["tokenstring"];
281 $return = $myga->setUserKey($username, $token);
282 msg_send($cl_queue, MSG_SET_USER_TOKEN, $return);
284 // TODO now set token
286 case MSG_SET_USER_TOKEN_TYPE:
288 echo "Call to set user token type\n";
289 if(!isset($msg["username"])) {
290 msg_send($cl_queue, MSG_SET_USER_TOKEN_TYPE, false);
293 if(!isset($msg["tokentype"])) {
294 msg_send($cl_queue, MSG_SET_USER_TOKEN_TYPE, false);
298 $username = $msg["username"];
299 $tokentype = $msg["tokentype"];
301 msg_send($cl_queue, MSG_SET_USER_TOKEN_TYPE, $myga->setTokenType($username, $tokentype));
303 // TODO now set token
306 // TODO this needs to be better
307 $sql = "select * from users";
309 $dbo = getDatabase();
310 $res = $dbo->query($sql);
314 foreach($res as $row) {
315 $users[$i]["username"] = $row["users_username"];
316 $users[$i]["realname"] = $row["users_realname"];
317 if($row["users_password"]!="") {
318 $users[$i]["haspass"] = true;
320 $users[$i]["haspass"] = false;
322 echo "user: ".$users[$i]["username"]." has tdata: \"".$row["users_tokendata"]."\"\n";
323 if($row["users_tokendata"]!="") {
324 $users[$i]["hastoken"] = true;
326 $users[$i]["hastoken"] = false;
329 if($row["users_otk"]!="") {
330 $users[$i]["otk"] = $row["users_otk"];
332 $users[$i]["otk"] = "";
336 msg_send($cl_queue, MSG_GET_USERS, $users);
338 // TODO now set token