40 if ($mode ==
'user') {
41 $t = getenv(
'APACHE_RUN_USER');
43 if ($mode ==
'group') {
44 $t = getenv(
'APACHE_RUN_GROUP');
64 if ($entitytotest ==
'') {
68 dol_syslog(
"checkLoginPassEntity usertotest=".$usertotest.
" entitytotest=".$entitytotest.
" authmode=".implode(
',', $authmode));
74 foreach ($authmode as $mode) {
75 if ($test && $mode && !$login) {
78 $authfile =
'functions_'.$mode.
'.php';
81 $dirlogin = array_merge(array(
"/core/login"), (array) $conf->modules_parts[
'login']);
82 foreach ($dirlogin as $reldir) {
87 $tmpnewauthfile = $newdir.(preg_match(
'/\/$/', $newdir) ?
'' :
'/').$authfile;
88 if (is_file($tmpnewauthfile)) {
89 $fullauthfile = $tmpnewauthfile;
95 $result = include_once $fullauthfile;
97 if ($fullauthfile && $result) {
99 $function =
'check_user_password_'.$mode;
100 $login = call_user_func($function, $usertotest, $passwordtotest, $entitytotest,
$context);
101 if ($login && $login !=
'--bad-login-validity--') {
104 $conf->authmode = $mode;
111 dol_syslog(
"Authentication KO - failed to load file '".$authfile.
"'", LOG_ERR);
114 $langs->loadLangs(array(
'other',
'main',
'errors'));
116 $_SESSION[
"dol_loginmesg"] = (empty($_SESSION[
"dol_loginmesg"]) ?
'' : $_SESSION[
"dol_loginmesg"].
', ').$langs->transnoentitiesnoconv(
"ErrorFailedToLoadLoginFileForMode", $mode);
126if (!function_exists(
'dol_loginfunction')) {
136 function dol_loginfunction($langs, $conf, $mysoc)
138 global $dolibarr_main_demo, $dolibarr_main_force_https;
139 global $db, $hookmanager;
141 $langs->loadLangs(array(
"main",
"other",
"help",
"admin"));
144 $hookmanager->initHooks(array(
'mainloginpage'));
146 $main_authentication = $conf->file->main_authentication;
148 $session_name = session_name();
150 $dol_url_root = DOL_URL_ROOT;
153 $appli = constant(
'DOL_APPLICATION_TITLE');
154 $title = $appli.(getDolGlobalString(
'MAIN_OPTIMIZEFORTEXTBROWSER') ?
'' :
' '.constant(
'DOL_VERSION'));
158 $titletruedolibarrversion = constant(
'DOL_VERSION');
180 if (!empty($conf->modules_parts[
'tpl'])) {
181 $dirtpls = array_merge($conf->modules_parts[
'tpl'], array(
'/core/tpl/'));
182 foreach ($dirtpls as $reldir) {
184 if (file_exists($tmp)) {
185 $template_dir = preg_replace(
'/login\.tpl\.php$/',
'', $tmp);
190 $template_dir = DOL_DOCUMENT_ROOT.
"/core/tpl/";
195 $prefix = dol_getprefix(
'');
196 $sessiontimeout =
'DOLSESSTIMEOUT_'.$prefix;
199 if (session_status() != PHP_SESSION_ACTIVE) {
200 if (PHP_VERSION_ID < 70300) {
201 session_set_cookie_params(0,
'/',
null, !(empty($dolibarr_main_force_https) &&
isHTTPS() ===
false),
true);
204 $sessioncookieparams = array(
208 'secure' => !(empty($dolibarr_main_force_https) &&
isHTTPS() ===
false),
212 session_set_cookie_params($sessioncookieparams);
215 setcookie($sessiontimeout,
getDolGlobalString(
'MAIN_SESSION_TIMEOUT'), 0,
"/",
'', !empty($dolibarr_main_force_https),
true);
219 if (
GETPOST(
'urlfrom',
'alpha')) {
220 $_SESSION[
"urlfrom"] =
GETPOST(
'urlfrom',
'alpha');
222 unset($_SESSION[
"urlfrom"]);
225 if (!
GETPOST(
"username",
'alpha')) {
226 $focus_element =
'username';
228 $focus_element =
'password';
233 if (!empty($dolibarr_main_demo)) {
234 $tab = explode(
',', $dolibarr_main_demo);
235 $demologin = $tab[0];
236 $demopassword = $tab[1];
240 $parameters = array(
'entity' =>
GETPOSTINT(
'entity'),
'switchentity' =>
GETPOSTINT(
'switchentity'));
241 $reshook = $hookmanager->executeHooks(
'getLoginPageOptions', $parameters);
242 $morelogincontent = $hookmanager->resPrint;
245 $parameters = array(
'entity' =>
GETPOSTINT(
'entity'),
'switchentity' =>
GETPOSTINT(
'switchentity'));
246 $reshook = $hookmanager->executeHooks(
'getLoginPageExtraOptions', $parameters);
247 $moreloginextracontent = $hookmanager->resPrint;
250 $parameters = array(
'entity' =>
GETPOSTINT(
'entity'),
'switchentity' =>
GETPOSTINT(
'switchentity'));
251 $reshook = $hookmanager->executeHooks(
'redirectAfterConnection', $parameters);
252 $php_self = $hookmanager->resPrint;
255 $login = (!empty($hookmanager->resArray[
'username']) ? $hookmanager->resArray[
'username'] : (
GETPOST(
"username",
"alpha") ?
GETPOST(
"username",
"alpha") : $demologin));
256 $password = $demopassword;
260 $urllogo = DOL_URL_ROOT.
'/theme/common/login_logo.png';
262 if (!empty($mysoc->logo_small) && is_readable($conf->mycompany->dir_output.
'/logos/thumbs/'.$mysoc->logo_small)) {
263 $urllogo = DOL_URL_ROOT.
'/viewimage.php?cache=1&modulepart=mycompany&file='.urlencode(
'logos/thumbs/'.$mysoc->logo_small);
264 } elseif (!empty($mysoc->logo) && is_readable($conf->mycompany->dir_output.
'/logos/'.$mysoc->logo)) {
265 $urllogo = DOL_URL_ROOT.
'/viewimage.php?cache=1&modulepart=mycompany&file='.urlencode(
'logos/'.$mysoc->logo);
267 } elseif (!empty($mysoc->logo_squarred_small) && is_readable($conf->mycompany->dir_output.
'/logos/thumbs/'.$mysoc->logo_squarred_small)) {
268 $urllogo = DOL_URL_ROOT.
'/viewimage.php?cache=1&modulepart=mycompany&file='.urlencode(
'logos/thumbs/'.$mysoc->logo_squarred_small);
269 } elseif (is_readable(DOL_DOCUMENT_ROOT.
'/theme/dolibarr_logo.svg')) {
270 $urllogo = DOL_URL_ROOT.
'/theme/dolibarr_logo.svg';
306 $dol_loginmesg = (!empty($_SESSION[
"dol_loginmesg"]) ? $_SESSION[
"dol_loginmesg"] :
'');
308 $favicon = DOL_URL_ROOT.
'/theme/dolibarr_256x256_color.png';
309 if (!empty($mysoc->logo_squarred_mini)) {
310 $favicon = DOL_URL_ROOT.
'/viewimage.php?cache=1&modulepart=mycompany&file='.urlencode(
'logos/thumbs/'.$mysoc->logo_squarred_mini);
316 $jquerytheme =
'base';
322 $dol_hide_topmenu =
GETPOSTINT(
'dol_hide_topmenu');
323 $dol_hide_leftmenu =
GETPOSTINT(
'dol_hide_leftmenu');
324 $dol_optimize_smallscreen =
GETPOSTINT(
'dol_optimize_smallscreen');
325 $dol_no_mouse_hover =
GETPOSTINT(
'dol_no_mouse_hover');
326 $dol_use_jmobile =
GETPOSTINT(
'dol_use_jmobile');
329 include $template_dir.
'login.tpl.php';
334 $_SESSION[
"dol_loginmesg"] =
'';
369 $salt .= chr(mt_rand(64, 126));
372 $result = $saltprefix.$salt.$saltsuffix;
385 dol_syslog(
"encodedecode_dbpassconf level=".$level, LOG_DEBUG);
388 $passwd_crypted =
'';
390 if ($fp = fopen(DOL_DOCUMENT_ROOT.
'/conf/conf.php',
'r')) {
392 $buffer = fgets($fp, 4096);
398 if (preg_match(
'/^[^#]*dolibarr_main_db_encrypted_pass[\s]*=[\s]*(.*)/i', $buffer, $reg)) {
399 $val = trim($reg[1]);
400 $val = preg_replace(
'/^["\']/',
'', $val);
401 $val = preg_replace(
'/["\'][\s;]*$/',
'', $val);
403 $passwd_crypted = $val;
410 } elseif (preg_match(
'/^[^#]*dolibarr_main_db_pass[\s]*=[\s]*(.*)/i', $buffer, $reg)) {
411 $val = trim($reg[1]);
412 $val = preg_replace(
'/^["\']/',
'', $val);
413 $val = preg_replace(
'/["\'][\s;]*$/',
'', $val);
414 if (preg_match(
'/crypted:/i', $buffer)) {
417 $val = preg_replace(
'/crypted:/i',
'', $val);
418 $passwd_crypted = $val;
421 } elseif (preg_match(
'/^dolcrypt:([^:]+):(.*)$/i', $buffer, $reg)) {
424 $val = preg_replace(
'/crypted:([^:]+):/i',
'', $val);
425 $passwd_crypted = $val;
432 $passwd_crypted = $val;
443 $config .=
'$dolibarr_main_db_pass=\''.$passwd.
'\';
'."\n";
446 $config .= '$dolibarr_main_db_pass=\
''.$mode.$passwd_crypted.
'\';
'."\n";
449 //print 'passwd =
'.$passwd.' - passwd_crypted =
'.$passwd_crypted;
457 // Write new conf file
458 $file = DOL_DOCUMENT_ROOT.'/
conf/
conf.php
';
459 if ($fp = @fopen($file, 'w
')) {
460 fwrite($fp, $config);
465 // It's config file, so we
set read permission
for creator only.
471 dol_syslog(
"encodedecode_dbpassconf Failed to open conf.php file for writing", LOG_WARNING);
475 dol_syslog(
"encodedecode_dbpassconf Failed to read conf.php", LOG_ERR);
491 global $db, $conf, $langs, $user;
493 $generated_password =
'';
495 $lowercase =
"qwertyuiopasdfghjklzxcvbnm";
496 $uppercase =
"ASDFGHJKLZXCVBNMQWERTYUIOP";
497 $numbers =
"1234567890";
499 $nbofchar = round($length / 3);
500 $nbofcharlast = ($length - 2 * $nbofchar);
502 if (function_exists(
'random_int')) {
503 $max = strlen($lowercase) - 1;
504 for ($x = 0; $x < $nbofchar; $x++) {
505 $tmp = random_int(0, $max);
506 $randomCode .= $lowercase[$tmp];
508 $max = strlen($uppercase) - 1;
509 for ($x = 0; $x < $nbofchar; $x++) {
510 $tmp = random_int(0, $max);
511 $randomCode .= $uppercase[$tmp];
513 $max = strlen($numbers) - 1;
514 for ($x = 0; $x < $nbofcharlast; $x++) {
515 $tmp = random_int(0, $max);
516 $randomCode .= $numbers[$tmp];
519 $generated_password = str_shuffle($randomCode);
522 $max = strlen($lowercase) - 1;
523 for ($x = 0; $x < $nbofchar; $x++) {
524 $tmp = mt_rand(0, $max);
525 $randomCode .= $lowercase[$tmp];
527 $max = strlen($uppercase) - 1;
528 for ($x = 0; $x < $nbofchar; $x++) {
529 $tmp = mt_rand(0, $max);
530 $randomCode .= $uppercase[$tmp];
532 $max = strlen($numbers) - 1;
533 for ($x = 0; $x < $nbofcharlast; $x++) {
534 $tmp = mt_rand(0, $max);
535 $randomCode .= $numbers[$tmp];
538 $generated_password = str_shuffle($randomCode);
541 $nomclass =
"modGeneratePass".ucfirst($conf->global->USER_PASSWORD_GENERATED);
542 $nomfichier = $nomclass.
".class.php";
544 require_once DOL_DOCUMENT_ROOT.
"/core/modules/security/generate/".$nomfichier;
545 $genhandler =
new $nomclass($db, $conf, $langs, $user);
546 '@phan-var-force ModeleGenPassword $genhandler';
547 $generated_password = $genhandler->getNewGeneratedPassword();
552 if (is_array($replaceambiguouschars) && count($replaceambiguouschars) > 0) {
554 $max = strlen($numbers) - 1;
555 if (function_exists(
'random_int')) {
556 $tmp = random_int(0, $max);
557 $generated_password = str_replace($replaceambiguouschars, $numbers[$tmp], $generated_password);
559 $tmp = mt_rand(0, $max);
560 $generated_password = str_replace($replaceambiguouschars, $numbers[$tmp], $generated_password);
564 return $generated_password;
582 if (!empty($conf->use_javascript_ajax)) {
583 $out .=
"\n".
'<!-- Js code to suggest a security key -->';
584 $out .=
'<script nonce="'.getNonce().
'" type="text/javascript">';
585 $out .=
'jQuery(document).ready(function () {
586 jQuery("#'.dol_escape_js($htmlnameofbutton).
'").click(function() {
587 var currenttoken = jQuery("meta[name=anti-csrf-currenttoken]").attr("content");
588 console.log("We click on the button '.
dol_escape_js($htmlnameofbutton).
' to suggest a key. anti-csrf-currenttoken is "+currenttoken+". We will fill '.
dol_escape_js($htmlname).
'");
589 jQuery.get( "'.DOL_URL_ROOT.
'/core/ajax/security.php", {
590 action: \'getrandompassword\',
591 generic: '.($generic ?
'1' :
'0').
',
595 if (jQuery("input#'.
dol_escape_js($htmlname).
'").attr("type") == "password") {
596 jQuery("input#'.
dol_escape_js($htmlname).
'").attr("type", "text");
GETPOSTINT($paramname, $method=0)
Return the value of a $_GET or $_POST supervariable, converted into integer.
dol_osencode($str)
Return a string encoded into OS filesystem encoding.
isHTTPS()
Return if we are using a HTTPS connection Check HTTPS (no way to be modified by user but may be empty...
dol_strlen($string, $stringencoding='UTF-8')
Make a strlen call.
dol_escape_js($stringtoescape, $mode=0, $noescapebackslashn=0)
Returns text escaped for inclusion into javascript code.
dol_htmlcleanlastbr($stringtodecode)
This function remove all ending and br at end.
dol_htmloutput_events($disabledoutputofmessages=0)
Print formatted messages to output (Used to show messages on html output).
complete_substitutions_array(&$substitutionarray, $outputlangs, $object=null, $parameters=null, $callfunc="completesubstitutionarray")
Complete the $substitutionarray with more entries coming from external module that had set the "subst...
make_substitutions($text, $substitutionarray, $outputlangs=null, $converttextinhtmlifnecessary=0)
Make substitution into a text string, replacing keys with vals from $substitutionarray (oldval=>newva...
GETPOST($paramname, $check='alphanohtml', $method=0, $filter=null, $options=null, $noreplace=0)
Return value of a param into GET or POST supervariable.
dol_buildpath($path, $type=0, $returnemptyifnotfound=0)
Return path of url or filesystem.
getCommonSubstitutionArray($outputlangs, $onlykey=0, $exclude=null, $object=null, $include=null)
Return array of possible common substitutions.
getDolGlobalString($key, $default='')
Return a Dolibarr global constant string value.
dol_syslog($message, $level=LOG_INFO, $ident=0, $suffixinfilename='', $restricttologhandler='', $logcontext=null)
Write log message into outputs.
conf($dolibarr_main_document_root)
Load conf file (file must exists)
$context
@method int call_trigger(string $triggerName, User $user)
dolJSToSetRandomPassword($htmlname, $htmlnameofbutton='generate_token', $generic=1)
Output javascript to autoset a generated password using default module into a HTML element.
dol_getwebuser($mode)
Return user/group account of web server.
encodedecode_dbpassconf($level=0)
Encode or decode database password in config file.
checkLoginPassEntity($usertotest, $passwordtotest, $entitytotest, $authmode, $context='')
Return a login if login/pass was successful.
getRandomPassword($generic=false, $replaceambiguouschars=null, $length=32)
Return a generated password using default module.
if(!function_exists( 'dol_loginfunction')) makesalt($type=CRYPT_SALT_LENGTH)
Initialise the salt for the crypt function.
dol_encode($chain, $key='1')
Encode a string with base 64 algorithm + specific delta change.
dol_decode($chain, $key='1')
Decode a base 64 encoded + specific delta change.
dolDecrypt($chain, $key='')
Decode a string with a symmetric encryption.