\n" . "
\n"; if ($send_resetkey) { send_resetkey($email, true); $message .= __("A password reset key has been sent to your e-mail address."); $message .= "
\n"; } else { $message .= __("Click on the Login link above to use your account."); $message .= "\n"; } } else { /* Modify an existing account. */ $q = "SELECT InactivityTS FROM Users WHERE "; $q.= "ID = " . intval($UID); $result = $dbh->query($q); $row = $result->fetch(PDO::FETCH_NUM); if ($row[0] && $J) { $inactivity_ts = $row[0]; } elseif ($J) { $inactivity_ts = time(); } else { $inactivity_ts = 0; } $q = "UPDATE Users SET "; $q.= "Username = " . $dbh->quote($U); if ($T) { $q.= ", AccountTypeID = ".intval($T); } if ($S) { /* Ensure suspended users can't keep an active session */ delete_user_sessions($UID); $q.= ", Suspended = 1"; } else { $q.= ", Suspended = 0"; } $q.= ", Email = " . $dbh->quote($E); $q.= ", BackupEmail = " . $dbh->quote($BE); if ($H) { $q.= ", HideEmail = 1"; } else { $q.= ", HideEmail = 0"; } if ($P) { $hash = password_hash($P, PASSWORD_DEFAULT); $q .= ", Passwd = " . $dbh->quote($hash); } $q.= ", RealName = " . $dbh->quote($R); $q.= ", LangPreference = " . $dbh->quote($L); $q.= ", Timezone = " . $dbh->quote($TZ); $q.= ", Homepage = " . $dbh->quote($HP); $q.= ", IRCNick = " . $dbh->quote($I); $q.= ", PGPKey = " . $dbh->quote(str_replace(" ", "", $K)); $q.= ", InactivityTS = " . $inactivity_ts; $q.= ", CommentNotify = " . ($CN ? "1" : "0"); $q.= ", UpdateNotify = " . ($UN ? "1" : "0"); $q.= ", OwnershipNotify = " . ($ON ? "1" : "0"); $q.= " WHERE ID = ".intval($UID); $result = $dbh->exec($q); if (isset($ssh_keys) && count($ssh_keys) > 0) { $ssh_key_result = account_set_ssh_keys($UID, $ssh_keys, $ssh_fingerprints); } else { $ssh_key_result = true; } if (isset($_COOKIE["AURTZ"]) && ($_COOKIE["AURTZ"] != $TZ)) { /* set new cookie for timezone */ $timeout = intval(config_get("options", "persistent_cookie_timeout")); $cookie_time = time() + $timeout; setcookie("AURTZ", $TZ, $cookie_time, "/"); } if (isset($_COOKIE["AURLANG"]) && ($_COOKIE["AURLANG"] != $L)) { /* set new cookie for language */ $timeout = intval(config_get("options", "persistent_cookie_timeout")); $cookie_time = time() + $timeout; setcookie("AURLANG", $L, $cookie_time, "/"); } if ($result === false || $ssh_key_result === false) { $message = __("No changes were made to the account, %s%s%s.", "", htmlspecialchars($U,ENT_QUOTES), ""); } else { $message = __("The account, %s%s%s, has been successfully modified.", "", htmlspecialchars($U,ENT_QUOTES), ""); } } return array(true, $message); } /** * Display the search results page * * @param string $O The offset for the results page * @param string $SB The column to sort the results page by * @param string $U The username search criteria * @param string $T The account type search criteria * @param string $S Whether the account is suspended search criteria * @param string $E The e-mail address search criteria * @param string $R The real name search criteria * @param string $I The IRC nickname search criteria * @param string $K The PGP key fingerprint search criteria * * @return void */ function search_results_page($O=0,$SB="",$U="",$T="", $S="",$E="",$R="",$I="",$K="") { $HITS_PER_PAGE = 50; if ($O) { $OFFSET = intval($O); } else { $OFFSET = 0; } if ($OFFSET < 0) { $OFFSET = 0; } $search_vars = array(); $dbh = DB::connect(); $q = "SELECT Users.*, AccountTypes.AccountType "; $q.= "FROM Users, AccountTypes "; $q.= "WHERE AccountTypes.ID = Users.AccountTypeID "; if ($T == "u") { $q.= "AND AccountTypes.ID = 1 "; $search_vars[] = "T"; } elseif ($T == "t") { $q.= "AND AccountTypes.ID = 2 "; $search_vars[] = "T"; } elseif ($T == "d") { $q.= "AND AccountTypes.ID = 3 "; $search_vars[] = "T"; } elseif ($T == "td") { $q.= "AND AccountTypes.ID = 4 "; $search_vars[] = "T"; } if ($S) { $q.= "AND Users.Suspended = 1 "; $search_vars[] = "S"; } if ($U) { $U = "%" . addcslashes($U, '%_') . "%"; $q.= "AND Username LIKE " . $dbh->quote($U) . " "; $search_vars[] = "U"; } if ($E) { $E = "%" . addcslashes($E, '%_') . "%"; $q.= "AND Email LIKE " . $dbh->quote($E) . " "; $search_vars[] = "E"; } if ($R) { $R = "%" . addcslashes($R, '%_') . "%"; $q.= "AND RealName LIKE " . $dbh->quote($R) . " "; $search_vars[] = "R"; } if ($I) { $I = "%" . addcslashes($I, '%_') . "%"; $q.= "AND IRCNick LIKE " . $dbh->quote($I) . " "; $search_vars[] = "I"; } if ($K) { $K = "%" . addcslashes(str_replace(" ", "", $K), '%_') . "%"; $q.= "AND PGPKey LIKE " . $dbh->quote($K) . " "; $search_vars[] = "K"; } switch ($SB) { case 't': $q.= "ORDER BY AccountTypeID, Username "; break; case 'r': $q.= "ORDER BY RealName, AccountTypeID "; break; case 'i': $q.= "ORDER BY IRCNick, AccountTypeID "; break; default: $q.= "ORDER BY Username, AccountTypeID "; break; } $search_vars[] = "SB"; $q.= "LIMIT " . $HITS_PER_PAGE . " OFFSET " . $OFFSET; $dbh = DB::connect(); $result = $dbh->query($q); $userinfo = array(); if ($result) { while ($row = $result->fetch(PDO::FETCH_ASSOC)) { $userinfo[] = $row; } } include("account_search_results.php"); return; } /** * Attempt to login and generate a session * * @return array Session ID for user, error message if applicable */ function try_login() { $login_error = ""; $new_sid = ""; $userID = null; if (!isset($_REQUEST['user']) && !isset($_REQUEST['passwd'])) { return array('SID' => '', 'error' => null); } if (is_ipbanned()) { $login_error = __('The login form is currently disabled ' . 'for your IP address, probably due ' . 'to sustained spam attacks. Sorry for the ' . 'inconvenience.'); return array('SID' => '', 'error' => $login_error); } $dbh = DB::connect(); $userID = uid_from_loginname($_REQUEST['user']); if (user_suspended($userID)) { $login_error = __('Account suspended'); return array('SID' => '', 'error' => $login_error); } switch (check_passwd($userID, $_REQUEST['passwd'])) { case -1: $login_error = __('Your password has been reset. ' . 'If you just created a new account, please ' . 'use the link from the confirmation email ' . 'to set an initial password. Otherwise, ' . 'please request a reset key on the %s' . 'Password Reset%s page.', '', ''); return array('SID' => '', 'error' => $login_error); case 0: $login_error = __("Bad username or password."); return array('SID' => '', 'error' => $login_error); case 1: break; } $logged_in = 0; $num_tries = 0; /* Generate a session ID and store it. */ while (!$logged_in && $num_tries < 5) { $new_sid = new_sid(); $q = "INSERT INTO Sessions (UsersID, SessionID, LastUpdateTS)" ." VALUES (" . $userID . ", '" . $new_sid . "', " . strval(time()) . ")"; $result = $dbh->exec($q); /* Query will fail if $new_sid is not unique. */ if ($result) { $logged_in = 1; break; } $num_tries++; } if (!$logged_in) { $login_error = __('An error occurred trying to generate a user session.'); return array('SID' => $new_sid, 'error' => $login_error); } $q = "UPDATE Users SET LastLogin = " . strval(time()) . ", "; $q.= "LastLoginIPAddress = " . $dbh->quote($_SERVER['REMOTE_ADDR']) . " "; $q.= "WHERE ID = $userID"; $dbh->exec($q); /* Set the SID cookie. */ if (isset($_POST['remember_me']) && $_POST['remember_me'] == "on") { /* Set cookies for 30 days. */ $timeout = config_get_int('options', 'persistent_cookie_timeout'); $cookie_time = time() + $timeout; /* Set session for 30 days. */ $q = "UPDATE Sessions SET LastUpdateTS = $cookie_time "; $q.= "WHERE SessionID = '$new_sid'"; $dbh->exec($q); } else { $cookie_time = 0; } setcookie("AURSID", $new_sid, $cookie_time, "/", null, !empty($_SERVER['HTTPS']), true); $referer = in_request('referer'); if (strpos($referer, aur_location()) !== 0) { $referer = '/'; } header("Location: " . get_uri($referer)); $login_error = ""; return array('SID' => $new_sid, 'error' => null); } /** * Determine if the user is using a banned IP address * * @return bool True if IP address is banned, otherwise false */ function is_ipbanned() { $dbh = DB::connect(); $q = "SELECT * FROM Bans WHERE IPAddress = " . $dbh->quote($_SERVER['REMOTE_ADDR']); $result = $dbh->query($q); return ($result->fetchColumn() ? true : false); } /** * Validate a username against a collection of rules * * The username must be longer or equal to the configured minimum length. It * must be shorter or equal to the configured maximum length. It must start and * end with either a letter or a number. It can contain one period, hypen, or * underscore. Returns boolean of whether name is valid. * * @param string $user Username to validate * * @return bool True if username meets criteria, otherwise false */ function valid_username($user) { $length_min = config_get_int('options', 'username_min_len'); $length_max = config_get_int('options', 'username_max_len'); if (strlen($user) < $length_min || strlen($user) > $length_max) { return false; } else if (!preg_match("/^[a-z0-9]+[.\-_]?[a-z0-9]+$/Di", $user)) { return false; } return true; } /** * Determine if a user already has a proposal open about themselves * * @param string $user Username to checkout for open proposal * * @return bool True if there is an open proposal about the user, otherwise false */ function open_user_proposals($user) { $dbh = DB::connect(); $q = "SELECT * FROM TU_VoteInfo WHERE User = " . $dbh->quote($user) . " "; $q.= "AND End > " . strval(time()); $result = $dbh->query($q); return ($result->fetchColumn() ? true : false); } /** * Add a new Trusted User proposal to the database * * @param string $agenda The agenda of the vote * @param string $user The use the vote is about * @param int $votelength The length of time for the vote to last * @param string $submitteruid The user ID of the individual who submitted the proposal * * @return void */ function add_tu_proposal($agenda, $user, $votelength, $quorum, $submitteruid) { $dbh = DB::connect(); $q = "SELECT COUNT(*) FROM Users WHERE (AccountTypeID = 2 OR AccountTypeID = 4)"; $result = $dbh->query($q); $row = $result->fetch(PDO::FETCH_NUM); $active_tus = $row[0]; $q = "INSERT INTO TU_VoteInfo (Agenda, User, Submitted, End, Quorum, "; $q.= "SubmitterID, ActiveTUs) VALUES "; $q.= "(" . $dbh->quote($agenda) . ", " . $dbh->quote($user) . ", "; $q.= strval(time()) . ", " . strval(time()) . " + " . $dbh->quote($votelength); $q.= ", " . $dbh->quote($quorum) . ", " . $submitteruid . ", "; $q.= $active_tus . ")"; $result = $dbh->exec($q); } /** * Add a reset key to the database for a specified user * * @param string $resetkey A password reset key to be stored in database * @param string $uid The user ID to store the reset key for * * @return void */ function create_resetkey($resetkey, $uid) { $dbh = DB::connect(); $q = "UPDATE Users "; $q.= "SET ResetKey = '" . $resetkey . "' "; $q.= "WHERE ID = " . $uid; $dbh->exec($q); } /** * Send a reset key to a specific e-mail address * * @param string $user User name or email address of the user * @param bool $welcome Whether to use the welcome message * * @return void */ function send_resetkey($user, $welcome=false) { $uid = uid_from_loginname($user); if ($uid == null) { return; } /* We (ab)use new_sid() to get a random 32 characters long string. */ $resetkey = new_sid(); create_resetkey($resetkey, $uid); /* Send e-mail with confirmation link. */ notify(array($welcome ? 'welcome' : 'send-resetkey', $uid)); } /** * Change a user's password in the database if reset key and e-mail are correct * * @param string $password The new password * @param string $resetkey Code e-mailed to a user to reset a password * @param string $user User name or email address of the user * * @return string|void Redirect page if successful, otherwise return error message */ function password_reset($password, $resetkey, $user) { $hash = password_hash($password, PASSWORD_DEFAULT); $dbh = DB::connect(); $q = "UPDATE Users SET "; $q.= "Passwd = " . $dbh->quote($hash) . ", "; $q.= "ResetKey = '' "; $q.= "WHERE ResetKey != '' "; $q.= "AND ResetKey = " . $dbh->quote($resetkey) . " "; $q.= "AND (Email = " . $dbh->quote($user) . " OR "; $q.= "UserName = " . $dbh->quote($user) . ")"; $result = $dbh->exec($q); if (!$result) { $error = __('Invalid e-mail and reset key combination.'); return $error; } else { header('Location: ' . get_uri('/passreset/') . '?step=complete'); exit(); } } /** * Determine if the password is longer than the minimum length * * @param string $passwd The password to check * * @return bool True if longer than minimum length, otherwise false */ function good_passwd($passwd) { $length_min = config_get_int('options', 'passwd_min_len'); return (strlen($passwd) >= $length_min); } /** * Determine if the password is correct and salt it if it hasn't been already * * @param int $user_id The user ID to check the password against * @param string $passwd The password the visitor sent * * @return int Positive if password is correct, negative if password is unset */ function check_passwd($user_id, $passwd) { $dbh = DB::connect(); /* Get password hash and salt. */ $q = "SELECT Passwd, Salt FROM Users WHERE ID = " . intval($user_id); $result = $dbh->query($q); if (!$result) { return 0; } $row = $result->fetch(PDO::FETCH_ASSOC); if (!$row) { return 0; } $hash = $row['Passwd']; $salt = $row['Salt']; if (!$hash) { return -1; } /* Verify the password hash. */ if (!password_verify($passwd, $hash)) { /* Invalid password, fall back to MD5. */ if (md5($salt . $passwd) != $hash) { return 0; } } /* Password correct, migrate the hash if necessary. */ if (password_needs_rehash($hash, PASSWORD_DEFAULT)) { $hash = password_hash($passwd, PASSWORD_DEFAULT); $q = "UPDATE Users SET Passwd = " . $dbh->quote($hash) . " "; $q.= "WHERE ID = " . intval($user_id); $dbh->query($q); } return 1; } /** * Determine if the PGP key fingerprint is valid (must be 40 hexadecimal digits) * * @param string $fingerprint PGP fingerprint to check if valid * * @return bool True if the fingerprint is 40 hexadecimal digits, otherwise false */ function valid_pgp_fingerprint($fingerprint) { $fingerprint = str_replace(" ", "", $fingerprint); return (strlen($fingerprint) == 40 && ctype_xdigit($fingerprint)); } /** * Determine if the SSH public key is valid * * @param string $pubkey SSH public key to check * * @return bool True if the SSH public key is valid, otherwise false */ function valid_ssh_pubkey($pubkey) { $valid_prefixes = array( "ssh-rsa", "ssh-dss", "ecdsa-sha2-nistp256", "ecdsa-sha2-nistp384", "ecdsa-sha2-nistp521", "ssh-ed25519" ); $has_valid_prefix = false; foreach ($valid_prefixes as $prefix) { if (strpos($pubkey, $prefix . " ") === 0) { $has_valid_prefix = true; break; } } if (!$has_valid_prefix) { return false; } $tokens = explode(" ", $pubkey); if (empty($tokens[1])) { return false; } return (base64_encode(base64_decode($tokens[1], true)) == $tokens[1]); } /** * Determine if the user account has been suspended * * @param string $id The ID of user to check if suspended * * @return bool True if the user is suspended, otherwise false */ function user_suspended($id) { $dbh = DB::connect(); if (!$id) { return false; } $q = "SELECT Suspended FROM Users WHERE ID = " . $id; $result = $dbh->query($q); if ($result) { $row = $result->fetch(PDO::FETCH_NUM); if ($row[0]) { return true; } } return false; } /** * Delete a specified user account from the database * * @param int $id The user ID of the account to be deleted * * @return void */ function user_delete($id) { $dbh = DB::connect(); $id = intval($id); /* * These are normally already taken care of by propagation constraints * but it is better to be explicit here. */ $fields_delete = array( array("Sessions", "UsersID"), array("PackageVotes", "UsersID"), array("PackageNotifications", "UserID") ); $fields_set_null = array( array("PackageBases", "SubmitterUID"), array("PackageBases", "MaintainerUID"), array("PackageBases", "PackagerUID"), array("PackageComments", "UsersID"), array("PackageComments", "DelUsersID"), array("PackageRequests", "UsersID"), array("TU_VoteInfo", "SubmitterID"), array("TU_Votes", "UserID") ); foreach($fields_delete as list($table, $field)) { $q = "DELETE FROM " . $table . " "; $q.= "WHERE " . $field . " = " . $id; $dbh->query($q); } foreach($fields_set_null as list($table, $field)) { $q = "UPDATE " . $table . " SET " . $field . " = NULL "; $q.= "WHERE " . $field . " = " . $id; $dbh->query($q); } $q = "DELETE FROM Users WHERE ID = " . $id; $dbh->query($q); return; } /** * Remove the session from the database on logout * * @param string $sid User's session ID * * @return void */ function delete_session_id($sid) { $dbh = DB::connect(); $q = "DELETE FROM Sessions WHERE SessionID = " . $dbh->quote($sid); $dbh->query($q); } /** * Remove all sessions belonging to a particular user * * @param int $uid ID of user to remove all sessions for * * @return void */ function delete_user_sessions($uid) { $dbh = DB::connect(); $q = "DELETE FROM Sessions WHERE UsersID = " . intval($uid); $dbh->exec($q); } /** * Remove sessions from the database that have exceed the timeout * * @return void */ function clear_expired_sessions() { $dbh = DB::connect(); $timeout = config_get_int('options', 'login_timeout'); $q = "DELETE FROM Sessions WHERE LastUpdateTS < (" . strval(time()) . " - " . $timeout . ")"; $dbh->query($q); return; } /** * Get account details for a specific user * * @param string $uid The User ID of account to get information for * @param string $username The username of the account to get for * * @return array Account details for the specified user */ function account_details($uid, $username) { $dbh = DB::connect(); $q = "SELECT Users.*, AccountTypes.AccountType "; $q.= "FROM Users, AccountTypes "; $q.= "WHERE AccountTypes.ID = Users.AccountTypeID "; if (!empty($uid)) { $q.= "AND Users.ID = ".intval($uid); } else { $q.= "AND Users.Username = " . $dbh->quote($username); } $result = $dbh->query($q); if ($result) { $row = $result->fetch(PDO::FETCH_ASSOC); } return $row; } /** * Determine if a user has already voted on a specific proposal * * @param string $voteid The ID of the Trusted User proposal * @param string $uid The ID to check if the user already voted * * @return bool True if the user has already voted, otherwise false */ function tu_voted($voteid, $uid) { $dbh = DB::connect(); $q = "SELECT COUNT(*) FROM TU_Votes "; $q.= "WHERE VoteID = " . intval($voteid) . " AND UserID = " . intval($uid); $result = $dbh->query($q); if ($result->fetchColumn() > 0) { return true; } else { return false; } } /** * Get all current Trusted User proposals from the database * * @param string $order Ascending or descending order for the proposal listing * * @return array The details for all current Trusted User proposals */ function current_proposal_list($order) { $dbh = DB::connect(); $q = "SELECT * FROM TU_VoteInfo WHERE End > " . time() . " ORDER BY Submitted " . $order; $result = $dbh->query($q); $details = array(); while ($row = $result->fetch(PDO::FETCH_ASSOC)) { $details[] = $row; } return $details; } /** * Get a subset of all past Trusted User proposals from the database * * @param string $order Ascending or descending order for the proposal listing * @param string $lim The number of proposals to list with the offset * * @return array The details for the subset of past Trusted User proposals */ function past_proposal_list($order, $lim) { $dbh = DB::connect(); $q = "SELECT * FROM TU_VoteInfo WHERE End < " . time() . " ORDER BY Submitted " . $order . $lim; $result = $dbh->query($q); $details = array(); while ($row = $result->fetch(PDO::FETCH_ASSOC)) { $details[] = $row; } return $details; } /** * Get the vote ID of the last vote of all Trusted Users * * @return array The vote ID of the last vote of each Trusted User */ function last_votes_list() { $dbh = DB::connect(); $q = "SELECT UserID, MAX(VoteID) AS LastVote FROM TU_Votes, "; $q .= "TU_VoteInfo, Users WHERE TU_VoteInfo.ID = TU_Votes.VoteID AND "; $q .= "TU_VoteInfo.End < " . strval(time()) . " AND "; $q .= "Users.ID = TU_Votes.UserID AND (Users.AccountTypeID = 2 OR Users.AccountTypeID = 4) "; $q .= "GROUP BY UserID ORDER BY LastVote DESC, UserName ASC"; $result = $dbh->query($q); $details = array(); while ($row = $result->fetch(PDO::FETCH_ASSOC)) { $details[] = $row; } return $details; } /** * Determine the total number of Trusted User proposals * * @return string The total number of Trusted User proposals */ function proposal_count() { $dbh = DB::connect(); $q = "SELECT COUNT(*) FROM TU_VoteInfo"; $result = $dbh->query($q); $row = $result->fetch(PDO::FETCH_NUM); return $row[0]; } /** * Get all details related to a specific vote from the database * * @param string $voteid The ID of the Trusted User proposal * * @return array All stored details for a specific vote */ function vote_details($voteid) { $dbh = DB::connect(); $q = "SELECT * FROM TU_VoteInfo "; $q.= "WHERE ID = " . intval($voteid); $result = $dbh->query($q); $row = $result->fetch(PDO::FETCH_ASSOC); return $row; } /** * Get an alphabetical list of users who voted for a proposal with HTML links * * @param string $voteid The ID of the Trusted User proposal * * @return array All users who voted for a specific proposal */ function voter_list($voteid) { $dbh = DB::connect(); $whovoted = array(); $q = "SELECT tv.UserID,U.Username "; $q.= "FROM TU_Votes tv, Users U "; $q.= "WHERE tv.VoteID = " . intval($voteid); $q.= " AND tv.UserID = U.ID "; $q.= "ORDER BY Username"; $result = $dbh->query($q); if ($result) { while ($row = $result->fetch(PDO::FETCH_ASSOC)) { $whovoted[] = $row['Username']; } } return $whovoted; } /** * Cast a vote for a specific user proposal * * @param string $voteid The ID of the proposal being voted on * @param string $uid The user ID of the individual voting * @param string $vote Vote position, either "Yes", "No", or "Abstain" * @param int $newtotal The total number of votes after the user has voted * * @return void */ function cast_proposal_vote($voteid, $uid, $vote, $newtotal) { $dbh = DB::connect(); $q = "UPDATE TU_VoteInfo SET " . $vote . " = (" . $newtotal . ") WHERE ID = " . $voteid; $result = $dbh->exec($q); $q = "INSERT INTO TU_Votes (VoteID, UserID) VALUES (" . intval($voteid) . ", " . intval($uid) . ")"; $result = $dbh->exec($q); } /** * Verify a user has the proper permissions to edit an account * * @param array $acctinfo User account information for edited account * * @return bool True if permission to edit the account, otherwise false */ function can_edit_account($acctinfo) { if ($acctinfo['AccountType'] == 'Developer' || $acctinfo['AccountType'] == 'Trusted User & Developer') { return has_credential(CRED_ACCOUNT_EDIT_DEV); } $uid = $acctinfo['ID']; return has_credential(CRED_ACCOUNT_EDIT, array($uid)); } /* * Compute the fingerprint of an SSH key. * * @param string $ssh_key The SSH public key to retrieve the fingerprint for * * @return string The SSH key fingerprint */ function ssh_key_fingerprint($ssh_key) { $tmpfile = tempnam(sys_get_temp_dir(), "aurweb"); file_put_contents($tmpfile, $ssh_key); /* * The -l option of ssh-keygen can be used to show the fingerprint of * the specified public key file. Expected output format: * * 2048 SHA256:uBBTXmCNjI2CnLfkuz9sG8F+e9/T4C+qQQwLZWIODBY user@host (RSA) * * ... where 2048 is the key length, the second token is the actual * fingerprint, followed by the key comment and the key type. */ $cmd = "/usr/bin/ssh-keygen -l -f " . escapeshellarg($tmpfile); exec($cmd, $out, $ret); if ($ret !== 0 || count($out) !== 1) { return false; } unlink($tmpfile); $tokens = explode(' ', $out[0]); if (count($tokens) < 4) { return false; } $tokens = explode(':', $tokens[1]); if (count($tokens) != 2 || $tokens[0] != 'SHA256') { return false; } return $tokens[1]; } /* * Get the SSH public keys associated with an account. * * @param int $uid The user ID of the account to retrieve the keys for. * * @return array An array representing the keys */ function account_get_ssh_keys($uid) { $dbh = DB::connect(); $q = "SELECT PubKey FROM SSHPubKeys WHERE UserID = " . intval($uid); $result = $dbh->query($q); if ($result) { return $result->fetchAll(PDO::FETCH_COLUMN, 0); } else { return array(); } } /* * Set the SSH public keys associated with an account. * * @param int $uid The user ID of the account to assign the keys to. * @param array $ssh_keys The SSH public keys. * @param array $ssh_fingerprints The corresponding SSH key fingerprints. * * @return bool Boolean flag indicating success or failure. */ function account_set_ssh_keys($uid, $ssh_keys, $ssh_fingerprints) { $dbh = DB::connect(); $q = sprintf("DELETE FROM SSHPubKeys WHERE UserID = %d", $uid); $dbh->exec($q); $ssh_fingerprint = reset($ssh_fingerprints); foreach ($ssh_keys as $ssh_key) { $q = sprintf( "INSERT INTO SSHPubKeys (UserID, Fingerprint, PubKey) " . "VALUES (%d, %s, %s)", $uid, $dbh->quote($ssh_fingerprint), $dbh->quote($ssh_key) ); $dbh->exec($q); $ssh_fingerprint = next($ssh_fingerprints); } return true; } /* * Invoke the email notification script. * * @param string $params Command line parameters for the script. * * @return void */ function notify($params) { $cmd = config_get('notifications', 'notify-cmd'); foreach ($params as $param) { $cmd .= ' ' . escapeshellarg($param); } $descspec = array( 0 => array('pipe', 'r'), 1 => array('pipe', 'w'), ); $p = proc_open($cmd, $descspec, $pipes); if (!is_resource($p)) { return false; } fclose($pipes[0]); fclose($pipes[1]); return proc_close($p); } /* * Obtain a list of terms a given user has not yet accepted. * * @param int $uid The ID of the user to obtain terms for. * * @return array A list of terms the user has not yet accepted. */ function fetch_updated_terms($uid) { $dbh = DB::connect(); $q = "SELECT ID, Terms.Revision, Description, URL "; $q .= "FROM Terms LEFT JOIN AcceptedTerms "; $q .= "ON AcceptedTerms.TermsID = Terms.ID "; $q .= "AND AcceptedTerms.UsersID = " . intval($uid) . " "; $q .= "WHERE AcceptedTerms.Revision IS NULL OR "; $q .= "AcceptedTerms.Revision < Terms.Revision"; $result = $dbh->query($q); if ($result) { return $result->fetchAll(); } else { return array(); } } /* * Accept a list of given terms. * * @param int $uid The ID of the user to accept the terms. * @param array $termrev An array mapping each term to the accepted revision. * * @return void */ function accept_terms($uid, $termrev) { $dbh = DB::connect(); $q = "SELECT TermsID, Revision FROM AcceptedTerms "; $q .= "WHERE UsersID = " . intval($uid); $result = $dbh->query($q); if (!$result) { return; } $termrev_update = array(); while ($row = $result->fetch(PDO::FETCH_ASSOC)) { $id = $row['TermsID']; if (!array_key_exists($id, $termrev)) { continue; } if ($row['Revision'] < $termrev[$id]) { $termrev_update[$id] = $termrev[$id]; } } $termrev_add = array_diff_key($termrev, $termrev_update); foreach ($termrev_add as $id => $rev) { $q = "INSERT INTO AcceptedTerms (TermsID, UsersID, Revision) "; $q .= "VALUES (" . intval($id) . ", " . intval($uid) . ", "; $q .= intval($rev) . ")"; $dbh->exec($q); } foreach ($termrev_update as $id => $rev) { $q = "UPDATE AcceptedTerms "; $q .= "SET Revision = " . intval($rev) . " "; $q .= "WHERE TermsID = " . intval($id) . " AND "; $q .= "UsersID = " . intval($uid); $dbh->exec($q); } } function account_comments($uid, $limit, $offset=0) { $dbh = DB::connect(); $q = "SELECT PackageComments.ID, Comments, UsersID, "; $q.= "PackageBaseId, CommentTS, DelTS, EditedTS, B.UserName AS EditUserName, "; $q.= "PinnedTS, "; $q.= "C.UserName as DelUserName, RenderedComment, "; $q.= "PB.ID as PackageBaseID, PB.Name as PackageBaseName "; $q.= "FROM PackageComments "; $q.= "LEFT JOIN PackageBases PB ON PackageComments.PackageBaseID = PB.ID "; $q.= "LEFT JOIN Users A ON PackageComments.UsersID = A.ID "; $q.= "LEFT JOIN Users B ON PackageComments.EditedUsersID = B.ID "; $q.= "LEFT JOIN Users C ON PackageComments.DelUsersID = C.ID "; $q.= "WHERE A.ID = " . $dbh->quote($uid) . " "; $q.= "ORDER BY CommentTS DESC"; if ($limit > 0) { $q.=" LIMIT " . intval($limit); } if ($offset > 0) { $q.=" OFFSET " . intval($offset); } $result = $dbh->query($q); if (!$result) { return null; } return $result->fetchAll(); } function account_comments_count($uid) { $dbh = DB::connect(); $q = "SELECT COUNT(*) "; $q.= "FROM PackageComments "; $q.= "LEFT JOIN Users A ON PackageComments.UsersID = A.ID "; $q.= "WHERE A.ID = " . $dbh->quote($uid); $result = $dbh->query($q); return $result->fetchColumn(); } /* * Compute the list of active CAPTCHA salts. The salt changes based on the * number of registered users. This ensures that new users always use a * different salt and protects against hardcoding the CAPTCHA response. * * The first CAPTCHA in the list is the most recent one and should be used for * new CAPTCHA challenges. The other ones are slightly outdated but may still * be valid for recent challenges that were created before the number of users * increased. The current implementation ensures that we can still use our * CAPTCHA salt, even if five new users registered since the CAPTCHA challenge * was created. * * @return string The list of active salts, the first being the most recent * one. */ function get_captcha_salts() { $dbh = DB::connect(); $q = "SELECT count(*) FROM Users"; $result = $dbh->query($q); $user_count = $result->fetchColumn(); $ret = array(); for ($i = 0; $i <= 5; $i++) { array_push($ret, 'aurweb-' . ($user_count - $i)); } return $ret; } /* * Return the CAPTCHA challenge for a given salt. * * @param string $salt The salt to be used for the CAPTCHA computation. * * @return string The challenge as a string. */ function get_captcha_challenge($salt) { $token = substr(md5($salt), 0, 3); return "LC_ALL=C pacman -V|sed -r 's#[0-9]+#" . $token . "#g'|md5sum|cut -c1-6"; } /* * Compute CAPTCHA answer for a given salt. * * @param string $salt The salt to be used for the CAPTCHA computation. * * @return string The correct answer as a string. */ function get_captcha_answer($salt) { $token = substr(md5($salt), 0, 3); $text = <<