@@ -22,5 +22,5 @@ |
||
22 | 22 | * See facebook section of the auth.conf.php file |
23 | 23 | */ |
24 | 24 | |
25 | -require_once dirname(__FILE__) . '/../../../app/config/auth.conf.php'; |
|
25 | +require_once dirname(__FILE__).'/../../../app/config/auth.conf.php'; |
|
26 | 26 |
@@ -14,7 +14,7 @@ discard block |
||
14 | 14 | $wsUrl = ''; |
15 | 15 | |
16 | 16 | // include common authentication functions |
17 | -require_once dirname(__FILE__) . '/functions.inc.php'; |
|
17 | +require_once dirname(__FILE__).'/functions.inc.php'; |
|
18 | 18 | // call the login checker (defined below) |
19 | 19 | $isValid = loginWSAuthenticate($login, $password, $wsUrl); |
20 | 20 | |
@@ -61,8 +61,8 @@ discard block |
||
61 | 61 | $key = '-+*%$({[]})$%*+-'; |
62 | 62 | // Complete password con PKCS7-specific padding |
63 | 63 | $blockSize = 16; |
64 | - $padding = $blockSize - (strlen($password)%$blockSize); |
|
65 | - $password .= str_repeat(chr($padding),$padding); |
|
64 | + $padding = $blockSize - (strlen($password) % $blockSize); |
|
65 | + $password .= str_repeat(chr($padding), $padding); |
|
66 | 66 | $cipher = new Crypt_AES(CRYPT_AES_MODE_CFB); |
67 | 67 | $cipher->setKeyLength(128); |
68 | 68 | $cipher->setKey($key); |
@@ -7,7 +7,7 @@ discard block |
||
7 | 7 | |
8 | 8 | use ChamiloSession as Session; |
9 | 9 | |
10 | -require_once(dirname(__FILE__) . '/functions.inc.php'); |
|
10 | +require_once(dirname(__FILE__).'/functions.inc.php'); |
|
11 | 11 | |
12 | 12 | //MAIN CODE |
13 | 13 | //$uData variable is set in local.inc.php |
@@ -36,6 +36,6 @@ discard block |
||
36 | 36 | //User cannot login |
37 | 37 | $loginFailed = true; |
38 | 38 | Session::erase('_uid'); |
39 | - header('Location: ' . api_get_path(WEB_PATH) . 'index.php?loginFailed=1&error=user_password_incorrect'); |
|
39 | + header('Location: '.api_get_path(WEB_PATH).'index.php?loginFailed=1&error=user_password_incorrect'); |
|
40 | 40 | exit; |
41 | 41 | } |
@@ -10,7 +10,7 @@ |
||
10 | 10 | |
11 | 11 | use ChamiloSession as Session; |
12 | 12 | |
13 | -require_once(dirname(__FILE__) . '/functions.inc.php'); |
|
13 | +require_once(dirname(__FILE__).'/functions.inc.php'); |
|
14 | 14 | |
15 | 15 | //MAIN CODE |
16 | 16 | //$login and $password variables are setted in main/inc/local.inc.php |
@@ -1,13 +1,13 @@ |
||
1 | 1 | <?php |
2 | 2 | /* For licensing terms, see /license.txt */ |
3 | 3 | /** |
4 | - * This script executes the importation of all users in the LDAP repository |
|
5 | - * into Chamilo |
|
6 | - * @package chamilo.auth.ldap |
|
7 | - */ |
|
4 | + * This script executes the importation of all users in the LDAP repository |
|
5 | + * into Chamilo |
|
6 | + * @package chamilo.auth.ldap |
|
7 | + */ |
|
8 | 8 | /** |
9 | - * Init |
|
10 | - */ |
|
9 | + * Init |
|
10 | + */ |
|
11 | 11 | if (PHP_SAPI != 'cli') { |
12 | 12 | die ('For security reasons, this script can only be launched from cron or from the command line'); |
13 | 13 | } |
@@ -13,9 +13,9 @@ |
||
13 | 13 | } |
14 | 14 | use \ChamiloSession as Session; |
15 | 15 | |
16 | -require dirname(__FILE__) . '/../../inc/global.inc.php'; |
|
17 | -require dirname(__FILE__) . '/ldap.inc.php'; |
|
18 | -require dirname(__FILE__) . '/../../inc/conf/auth.conf.php'; |
|
16 | +require dirname(__FILE__).'/../../inc/global.inc.php'; |
|
17 | +require dirname(__FILE__).'/ldap.inc.php'; |
|
18 | +require dirname(__FILE__).'/../../inc/conf/auth.conf.php'; |
|
19 | 19 | /** |
20 | 20 | * Code execution |
21 | 21 | */ |
@@ -39,8 +39,8 @@ |
||
39 | 39 | |
40 | 40 | use ChamiloSession as Session; |
41 | 41 | |
42 | -require_once dirname(__FILE__) . '/ldap.inc.php'; |
|
43 | -require_once dirname(__FILE__) . '/functions.inc.php'; |
|
42 | +require_once dirname(__FILE__).'/ldap.inc.php'; |
|
43 | +require_once dirname(__FILE__).'/functions.inc.php'; |
|
44 | 44 | |
45 | 45 | $ldap_user = extldap_authenticate($login, $password); |
46 | 46 | if ($ldap_user !== false) { |
@@ -31,7 +31,7 @@ |
||
31 | 31 | $loginFailed = false; |
32 | 32 | $uidReset = true; |
33 | 33 | $_user['user_id'] = $uData['user_id']; |
34 | - Session::write('_uid',$_uid); |
|
34 | + Session::write('_uid', $_uid); |
|
35 | 35 | // Jand: copied from event_login in events.lib.php to enable login statistics: |
36 | 36 | Event::event_login($uData['user_id']); |
37 | 37 | } else { |
@@ -7,18 +7,18 @@ discard block |
||
7 | 7 | * @package chamilo.auth.ldap |
8 | 8 | */ |
9 | 9 | /** |
10 | - * An external authentification module needs to set |
|
11 | - * - $loginFailed |
|
12 | - * - $uidReset |
|
13 | - * - $_user['user_id'] |
|
14 | - * - register the $_user['user_id'] in the session |
|
15 | - * |
|
16 | - * As the LDAP code shows, this is not as difficult as you might think. |
|
17 | - * LDAP authentification module |
|
18 | - * this calls the loginWithLdap function |
|
19 | - * from the LDAP library, and sets a few |
|
20 | - * variables based on the result. |
|
21 | - */ |
|
10 | + * An external authentification module needs to set |
|
11 | + * - $loginFailed |
|
12 | + * - $uidReset |
|
13 | + * - $_user['user_id'] |
|
14 | + * - register the $_user['user_id'] in the session |
|
15 | + * |
|
16 | + * As the LDAP code shows, this is not as difficult as you might think. |
|
17 | + * LDAP authentification module |
|
18 | + * this calls the loginWithLdap function |
|
19 | + * from the LDAP library, and sets a few |
|
20 | + * variables based on the result. |
|
21 | + */ |
|
22 | 22 | //require_once('../../inc/global.inc.php'); - this script should be loaded by the /index.php script anyway, so global is already loaded |
23 | 23 | |
24 | 24 | use ChamiloSession as Session; |
@@ -28,14 +28,14 @@ discard block |
||
28 | 28 | $loginLdapSucces = ldap_login($login, $password); |
29 | 29 | |
30 | 30 | if ($loginLdapSucces) { |
31 | - $loginFailed = false; |
|
32 | - $uidReset = true; |
|
33 | - $_user['user_id'] = $uData['user_id']; |
|
34 | - Session::write('_uid',$_uid); |
|
31 | + $loginFailed = false; |
|
32 | + $uidReset = true; |
|
33 | + $_user['user_id'] = $uData['user_id']; |
|
34 | + Session::write('_uid',$_uid); |
|
35 | 35 | // Jand: copied from event_login in events.lib.php to enable login statistics: |
36 | - Event::event_login($uData['user_id']); |
|
36 | + Event::event_login($uData['user_id']); |
|
37 | 37 | } else { |
38 | - $loginFailed = true; |
|
39 | - unset($_user['user_id']); |
|
40 | - $uidReset = false; |
|
38 | + $loginFailed = true; |
|
39 | + unset($_user['user_id']); |
|
40 | + $uidReset = false; |
|
41 | 41 | } |
@@ -34,7 +34,7 @@ discard block |
||
34 | 34 | */ |
35 | 35 | public function __construct() |
36 | 36 | { |
37 | - $this->protocol = api_get_setting('sso_authentication_protocol'); |
|
37 | + $this->protocol = api_get_setting('sso_authentication_protocol'); |
|
38 | 38 | // There can be multiple domains, so make sure to take only the first |
39 | 39 | // This might be later extended with a decision process |
40 | 40 | $domains = explode(',', api_get_setting('sso_authentication_domain')); |
@@ -42,7 +42,7 @@ discard block |
||
42 | 42 | $this->auth_uri = api_get_setting('sso_authentication_auth_uri'); |
43 | 43 | $this->deauth_uri = api_get_setting('sso_authentication_unauth_uri'); |
44 | 44 | //cut the string to avoid recursive URL construction in case of failure |
45 | - $this->referer = $this->protocol.$_SERVER['HTTP_HOST'].substr($_SERVER['REQUEST_URI'],0,strpos($_SERVER['REQUEST_URI'],'sso')); |
|
45 | + $this->referer = $this->protocol.$_SERVER['HTTP_HOST'].substr($_SERVER['REQUEST_URI'], 0, strpos($_SERVER['REQUEST_URI'], 'sso')); |
|
46 | 46 | $this->deauth_url = $this->protocol.$this->domain.$this->deauth_uri; |
47 | 47 | $this->master_url = $this->protocol.$this->domain.$this->auth_uri; |
48 | 48 | $this->referrer_uri = base64_encode($_SERVER['REQUEST_URI']); |
@@ -130,11 +130,11 @@ discard block |
||
130 | 130 | ) { |
131 | 131 | //error_log('user n password are ok'); |
132 | 132 | //Check if the account is active (not locked) |
133 | - if ($uData['active']=='1') { |
|
133 | + if ($uData['active'] == '1') { |
|
134 | 134 | // check if the expiration date has not been reached |
135 | 135 | if (empty($uData['expiration_date']) |
136 | 136 | or $uData['expiration_date'] > date('Y-m-d H:i:s') |
137 | - or $uData['expiration_date']=='0000-00-00 00:00:00') { |
|
137 | + or $uData['expiration_date'] == '0000-00-00 00:00:00') { |
|
138 | 138 | |
139 | 139 | //If Multiple URL is enabled |
140 | 140 | if (api_get_multiple_access_url()) { |
@@ -168,11 +168,11 @@ discard block |
||
168 | 168 | // the user credentials are OK, which |
169 | 169 | // should be protection enough |
170 | 170 | // against evil URL spoofing... |
171 | - $sso_target = api_get_path(WEB_PATH) . base64_decode($sso['ruri']); |
|
171 | + $sso_target = api_get_path(WEB_PATH).base64_decode($sso['ruri']); |
|
172 | 172 | } else { |
173 | - $sso_target = isset($sso['target']) ? $sso['target'] : api_get_path(WEB_PATH) . 'index.php'; |
|
173 | + $sso_target = isset($sso['target']) ? $sso['target'] : api_get_path(WEB_PATH).'index.php'; |
|
174 | 174 | } |
175 | - header('Location: '. $sso_target); |
|
175 | + header('Location: '.$sso_target); |
|
176 | 176 | exit; |
177 | 177 | } else { |
178 | 178 | // user does not have permission for this site |
@@ -286,9 +286,9 @@ discard block |
||
286 | 286 | $userId = intval($userId); |
287 | 287 | |
288 | 288 | if ($asAdmin && api_is_platform_admin(true)) { |
289 | - return api_get_path(WEB_CODE_PATH) . "admin/user_edit.php?user_id=$userId"; |
|
289 | + return api_get_path(WEB_CODE_PATH)."admin/user_edit.php?user_id=$userId"; |
|
290 | 290 | } |
291 | 291 | |
292 | - return api_get_path(WEB_CODE_PATH) . 'auth/profile.php'; |
|
292 | + return api_get_path(WEB_CODE_PATH).'auth/profile.php'; |
|
293 | 293 | } |
294 | 294 | } |
@@ -90,7 +90,7 @@ |
||
90 | 90 | |
91 | 91 | /** |
92 | 92 | * Validates the received active connection data with the database |
93 | - * @return bool Return the loginFailed variable value to local.inc.php |
|
93 | + * @return null|false Return the loginFailed variable value to local.inc.php |
|
94 | 94 | */ |
95 | 95 | public function check_user() |
96 | 96 | { |
@@ -48,7 +48,7 @@ discard block |
||
48 | 48 | |
49 | 49 | /* 2.Get the chamilo username and password from your system or from webservices */ |
50 | 50 | |
51 | - $account['username'] = 'jbrion525'; //username in Chamilo |
|
51 | + $account['username'] = 'jbrion525'; //username in Chamilo |
|
52 | 52 | $account['password'] = sha1(sha1('jbrion525')); //encrypted password with assuming that the first encrypted method is sha1 in chamilo |
53 | 53 | |
54 | 54 | $master_auth_uri = $my_chamilo_server.'/?q=user'; |
@@ -64,9 +64,9 @@ discard block |
||
64 | 64 | ); |
65 | 65 | |
66 | 66 | $cookie = base64_encode(serialize($sso)); |
67 | - $url = chamilo_sso_protocol() . $master_auth_uri; |
|
68 | - $params = 'sso_referer='. urlencode($url) .'&sso_cookie='. urlencode($cookie); |
|
69 | - $final_url = filter_xss($_GET['sso_referer']) .'?'. $params; |
|
67 | + $url = chamilo_sso_protocol().$master_auth_uri; |
|
68 | + $params = 'sso_referer='.urlencode($url).'&sso_cookie='.urlencode($cookie); |
|
69 | + $final_url = filter_xss($_GET['sso_referer']).'?'.$params; |
|
70 | 70 | |
71 | 71 | //If your user exists redirect to chamilo and set the account in a session to check it later |
72 | 72 | $_SESSION['my_server_user_session'] = $account; |