View source
<?php
define('SECURESITE_DISABLED', 0);
define('SECURESITE_ALWAYS', 1);
define('SECURESITE_OFFLINE', 2);
define('SECURESITE_403', 3);
define('SECURESITE_FORM', 1);
define('SECURESITE_BASIC', 2);
define('SECURESITE_DIGEST', 3);
use Drupal\Core\Session\AnonymousUserSession;
use Drupal\Core\Form\FormStateInterface;
use Drupal\Core\DrupalKernel;
function securesite_permission() {
return array(
'access secured pages' => array(
'title' => t('Access secure pages'),
'description' => t('Allow the user to access pages after entering their credentials in the Secure Site log-ing form.'),
),
);
}
function securesite_user_logout($account) {
$types = \Drupal::config('securesite.settings')
->get('securesite_type');
if ((in_array(SECURESITE_BASIC, $types) || in_array(SECURESITE_DIGEST, $types)) && !empty($_SESSION['securesite_login'])) {
\Drupal::currentUser()
->setAccount(new AnonymousUserSession());
$user_agent = isset($_SERVER['HTTP_USER_AGENT']) ? drupal_strtolower($_SERVER['HTTP_USER_AGENT']) : '';
if ($user_agent != str_replace('safari', '', $user_agent)) {
session_set_save_handler('sess_open', 'sess_close', 'sess_read', 'sess_write', 'sess_destroy_sid', 'sess_gc');
session_start();
$_SESSION['securesite_repeat'] = TRUE;
}
\Drupal::service('securesite.manager')
->showDialog(array_pop($types));
}
}
function securesite_form_system_site_information_settings_alter(&$form, $form_state) {
if (\Drupal::config('securesite.settings')
->get('securesite_enabled') == SECURESITE_403) {
$form['error_page']['securesite_403'] = $form['error_page']['site_403'];
$form['error_page']['securesite_403']['#default_value'] = \Drupal::config('securesite.settings')
->get('securesite_403');
$form['error_page']['securesite_403']['#weight'] = 0;
unset($form['error_page']['site_403']);
}
}
function securesite_user_login_submit($form, &$form_state) {
$edit['name'] = $form_state['values']['name'];
$edit['pass'] = $form_state['values']['pass'];
if (\Drupal::service('user.auth')
->authenticate($edit['name'], $edit['pass'])) {
_securesite_user_digest_cleanup($edit);
}
}
function securesite_user_form_submit($form, &$form_state) {
$edit['name'] = $form_state['values']['name'];
$edit['pass'] = $form_state['values']['pass'];
_securesite_user_digest_cleanup($edit);
}
function securesite_form_alter(&$form, $form_state, $form_id) {
if (in_array($form_id, array(
'user_register_form',
'user_profile_form',
))) {
$form['#validate'][] = 'securesite_user_validate';
}
else {
if (in_array($form_id, array(
"user_login_form",
))) {
$form['#submit'][] = 'securesite_user_login_submit';
}
else {
if (in_array($form_id, array(
"user_form",
))) {
$form['actions']['submit']['#submit'][] = "securesite_user_form_submit";
}
else {
if (in_array($form_id, array(
"user_pass",
))) {
$form['#theme'] = 'securesite_user_pass';
$form['name']['#title'] = t('User name or e-mail address');
$form['#redirect'] = FALSE;
$form['name']['#required'] = FALSE;
}
}
}
}
}
function securesite_user_validate($form, FormStateInterface $form_state) {
if (!array_key_exists('name', $form_state
->getErrors($form_state)) && isset($form_state['values']['name']) && $form_state['values']['name'] == \Drupal::config('securesite.settings')
->get('securesite_guest_name')) {
$form_state
->setErrorByName('name', t('The name %name is being used as the %site guest name.', array(
'%name' => $form_state['values']['name'],
'%site' => \Drupal::config('system.site')
->get('name'),
)));
}
}
function _securesite_user_digest_cleanup($edit) {
$user = \Drupal::currentUser();
$site_path = DrupalKernel::findSitePath(\Drupal::request());
if (in_array(SECURESITE_DIGEST, \Drupal::config('securesite.settings')
->get('securesite_type')) && isset($edit['pass'])) {
$edit['name'] = isset($edit['name']) ? $edit['name'] : $user
->getUsername();
$script = \Drupal::config('securesite.settings')
->get('securesite_password_script');
$values = array(
'username=' . escapeshellarg($edit['name']),
'realm=' . escapeshellarg(\Drupal::config('securesite.settings')
->get('securesite_realm')),
'pass=' . escapeshellarg($edit['pass']),
'op=create',
'site_path=' . $site_path,
);
exec($script . ' ' . implode(' ', $values), $output, $status);
}
}
function securesite_user_delete($account) {
$user = \Drupal::currentUser();
$site_path = DrupalKernel::findSitePath(\Drupal::request());
if (in_array(SECURESITE_DIGEST, \Drupal::config('securesite.settings')
->get('securesite_type'))) {
$script = \Drupal::config('securesite.settings')
->get('securesite_password_script');
$values = array(
'username=' . escapeshellarg($user
->getUsername()),
'realm=' . escapeshellarg(\Drupal::config('securesite.settings')
->get('securesite_realm')),
'op=delete',
'site_path=' . $site_path,
);
exec($script . ' ' . implode(' ', $values));
}
}
function securesite_theme() {
return array(
'securesite_page' => array(
'template' => 'securesite-page',
'variables' => array(
'content' => NULL,
),
'file' => 'securesite.theme.inc',
'path' => drupal_get_path('module', 'securesite') . '/theme',
),
'securesite_login_form' => array(
'template' => 'securesite-user-login',
'render element' => 'form',
'file' => 'securesite.theme.inc',
'path' => drupal_get_path('module', 'securesite') . '/theme',
),
'securesite_user_pass' => array(
'template' => 'securesite-user-pass',
'render element' => 'form',
'file' => 'securesite.theme.inc',
'path' => drupal_get_path('module', 'securesite') . '/theme',
),
);
}
function securesite_login_form($form, FormStateInterface $form_state) {
return $form;
}
function securesite_user_pass($form, &$form_state) {
return $form;
}
function securesite_help($path, $arg) {
switch ($path) {
case 'admin/help#securesite':
return '<p>' . t('Secure Site allows site administrators to make a site or part of a site private. You can restrict access to the site by role. This means the site will be inaccessible to search engines and other crawlers, but you can still allow access to certain people.') . '</p>' . "\n" . '<p>' . t('You can also secure remote access to RSS feeds. You can keep content private and protected, but still allow users to get notification of new content and other actions via RSS with news readers that support <em>user:pass@example.com/node/feed</em> URLs, or have direct support for user name and password settings. This is especially useful when paired with the Organic Groups module or other node access systems.') . '</p>' . "\n" . '<h3>' . t('Configuration') . '</h3>' . "\n" . '<ul>' . "\n" . ' <li>' . t('Force authentication') . "\n" . ' <p>' . t('This setting controls whether users will be forced to authenticate before viewing pages. By default, authentication is never forced.') . '</p>' . "\n" . ' <ol>' . "\n" . ' <li>' . t('Never') . "\n" . ' <p>' . t('This setting will prevent Secure Site from hiding pages.') . '</p>' . "\n" . ' </li>' . "\n" . ' <li>' . t('Always') . "\n" . ' <p>' . t('This setting will hide your entire site from unauthenticated users.') . "\n" . ' </li>' . "\n" . ' <li>' . t('During maintenance') . "\n" . ' <p>' . t('This setting will hide your site during maintenance.') . "\n" . ' </li>' . "\n" . ' <li>' . t('On restricted pages') . "\n" . ' <p>' . t('This setting will hide only pages that anonymous users cannot access.') . "\n" . ' </li>' . "\n" . ' </ol>' . "\n" . ' </li>' . "\n" . ' <li>' . t('Authentication type') . "\n" . ' <p>' . t('Three methods of authentication are available. Please note that HTTP authentication requires extra configuration if PHP is not installed as an Apache module. See the <a href="#issues">Known issues</a> section for details.') . "\n" . ' <ol>' . "\n" . ' <li>' . t('HTTP digest') . "\n" . ' <p>' . t('This will enable HTTP digest authentication. The user’s browser will prompt for the user’s name and password before displaying the page.') . '</p>' . "\n" . ' <p>' . t('Digest authentication protects a user’s password from eavesdroppers when you are not using SSL to encrypt the connection. However, it can only be used when a copy of the password is stored on the server. For security reasons, Drupal does not store passwords. You will need to configure scripts to securely save passwords and authenticate users. See the <a href="#passwords">Secure password storage</a> section for details.') . '</p>' . "\n" . ' <p>' . t('When digest authentication is enabled, passwords will be saved when users log in or set their passwords. If you use digest authentication to protect your whole site, you should allow guest access or allow another authentication type until users whose passwords are not yet saved have logged in. Otherwise, you may lock yourself out of your own site.') . '</p>' . "\n" . ' </li>' . "\n" . ' <li>' . t('HTTP basic') . "\n" . ' <p>' . t('This will enable HTTP basic authentication. The user’s browser will prompt for the user’s name and password before displaying the page. Basic authentication is not secure unless you are using SSL to encrypt the connection.') . '</p>' . "\n" . ' </li>' . "\n" . ' <li>' . t('HTML log-in form') . "\n" . ' <p>' . t('This method uses a themeable HTML log-in form for user name and password input. This method is the most reliable as it does not rely on the browser for authentication. Like HTTP basic, it is insecure unless you are using SSL to encrypt the connection.') . '</p>' . "\n" . ' </li>' . "\n" . ' </ol>' . "\n" . ' <p>' . t('HTTP authentication is recommended for secure feeds, because feed readers are not likely to be able to handle forms. You can enable all three types of authentication at the same time.') . '</p>' . "\n" . ' </li>' . "\n" . ' <li>' . t('Digest authentication script') . "\n" . ' <p>' . t('For security, HTTP digest authentication uses an external script to check passwords. Enter the digest authentication script exactly as it would appear on the command line.') . '</p>' . "\n" . ' </li>' . "\n" . ' <li>' . t('Password storage script') . "\n" . ' <p>' . t('For security, HTTP digest authentication uses an external script to save passwords. Enter the password storage script exactly as it would appear on the command line.') . '</p>' . "\n" . ' </li>' . "\n" . ' <li>' . t('Authentication realm') . "\n" . ' <p>' . t('You can use this field to name your log-in area. This is primarily used with HTTP Auth.') . '</p>' . "\n" . ' </li>' . "\n" . ' <li>' . t('Guest user name and password') . "\n" . ' <p>' . t('If you give anonymous users the <em>!access</em> permission, you can set a user name and password for anonymous users. If not set, guests can use any name and password.', array(
'!access' => l(t('access secured pages'), 'admin/people/permissions', array(
'fragment' => 'module-securesite',
)),
)) . '</p>' . "\n" . ' </li>' . "\n" . ' <li>' . t('Customize HTML forms') . "\n" . ' <p>' . t('<em>Custom message for log-in form</em> and <em>Custom message for password reset form</em> are used in the HTML forms when they are displayed. If the latter box is empty, Secure Site will not offer to reset passwords. Please note, the log-in form is only displayed when the HTML log-in form authentication mode is used.') . '</p>' . "\n" . ' </li>' . "\n" . '</ul>' . "\n" . '<h3><a name="passwords">' . t('Secure password storage') . '</a></h3>' . "\n" . '<p>' . t('Digest authentication avoids transmitting passwords by exchanging character strings (digests) that prove both the user and the Web server know the password. This requires passwords for all users to be stored on the server. It is very important to ensure that these passwords cannot be exposed to unauthorized users. Drupal should be able to store passwords without being able to retrieve them.') . '</p>' . "\n" . '<p>' . t('Secure Site provides scripts that can handle stored passwords securely when properly set up. These scripts are contained in the <em>digest_md5</em> directory. There are two scripts in this directory:') . '</p>' . "\n" . '<dl>' . "\n" . ' <dt>stored_passwords.php</dt><dd>' . t('Add, delete, and update user passwords.') . '</dd>' . "\n" . ' <dt>digest_md5.php</dt><dd>' . t('Perform digest authentication.') . '</dd>' . "\n" . '</dl>' . "\n" . '<p>' . t('You can get help for these scripts by typing the script name followed by <em>--help</em> on the command line. You must be able to run PHP from the command line. Some configuration is required to make the scripts work properly:') . '</p>' . "\n" . '<ol>' . "\n" . ' <li>' . t('Set up a secure database') . "\n" . ' <p>' . t('You can set up a password database in the same way you create a Drupal database. Your password database should have its own user. No other database users should have access to the password database.') . '</p>' . "\n" . ' </li>' . "\n" . ' <li>' . t('Edit the configuration file') . "\n" . ' <p>' . t('Configuration settings for the scripts are in the <em>digest_md5.conf.php</em> file in the <em>digest_md5</em> directory. You must set <em>$db_url</em> to point to your password database. If you want to be able to use the scripts from the command-line, you must set <em>$drupal</em> to the absolute path of your Drupal installation. When you are done editing the configuration file, make it read-only.') . '</p>' . "\n" . ' </li>' . "\n" . ' <li>' . t('Control access to the scripts') . "\n" . ' <p>' . t('The first thing you can do to secure the scripts is to move the <em>digest_md5</em> directory to a location that is not accessible from the Internet. The configuration file especially needs protection, because it contains information that allows access to the password database. On the Secure Site settings page, change the digest authentication script and password storage script to point to the new location. For example, if you moved the <em>digest_md5</em> directory to <em>/usr/local</em>, you would use') . '</p>' . "\n" . ' <pre>/usr/local/digest_md5/digest_md5.php' . "\n" . '/usr/local/digest_md5/stored_passwords.php</pre>' . "\n" . ' <p>' . t('If the <em>sudo</em> command is available on your system, you can change the file system permissions on the all the files in the <em>digest_md5</em> directory so that only adminstrators have access to them. You would then add the user your Web server runs as to the <em>sudoers</em> file. A sample <em>sudoers</em> file is provided in the <em>digest_md5</em> directory for comparison. The important lines are') . '</p>' . "\n" . ' <pre>Defaults:apache !authenticate' . "\n" . 'Defaults:apache !lecture' . "\n" . 'apache ALL=/usr/local/digest_md5/stored_passwords.php [A-z]*' . "\n" . 'apache ALL=/usr/local/digest_md5/digest_md5.php [A-z]*</pre>' . "\n" . ' <p>' . t('This allows <em>apache</em> to use <em>sudo</em> only to run <em>stored_passwords.php</em> and <em>digest_md5.php</em>. Replace <em>apache</em> with the name of the Web server user on your system, and replace <em>/usr/local</em> with the directory in which you placed the <em>digest_md5</em> directory. On the Secure Site settings page, add <em>sudo</em> at the beginning of the line for the digest authentication script and the password storage script:') . '</p>' . "\n" . ' <pre>sudo /usr/local/digest_md5/digest_md5.php' . "\n" . 'sudo /usr/local/digest_md5/stored_passwords.php</pre>' . "\n" . ' <p>' . t('If the rest of your system is secure, Drupal can now store passwords without having the ability to retrieve them.') . '</p>' . "\n" . ' </li>' . "\n" . '</ol>' . "\n" . '<h3>' . t('Theming') . '</h3>' . "\n" . '<p>' . t('Secure Site’s HTML output is controlled by three files:') . '</p>' . "\n" . '<dl>' . "\n" . ' <dt>securesite-page.html.twig<dt><dd>' . t('Template for Secure Site pages. Works in the same way as page.tpl.php.') . '</dd>' . "\n" . ' <dt>securesite-user-login.html.twig<dt><dd>' . t('Template for the user log-in form.') . '</dd>' . "\n" . ' <dt>securesite-user-pass.html.twig<dt><dd>' . t('Template for the password reset form.') . '</dd>' . "\n" . '</dl>' . "\n" . '<p>' . t('You can theme Secure Site’s HTML output by copying these files to your theme’s directory. The files in your theme’s directory will become the templates for all Secure Site HTML output.') . '</p>' . "\n" . '<h3>' . t('Configuring cron jobs') . '</h3>' . "\n" . '<p>' . t('If HTTP authentication is forced, cron jobs will need to authenticate themselves. See !link for more details on configuring cron jobs. These examples show how to add a user name and password (note: Lynx does not support digest authentication):', array(
'!link' => l(t('Configuring cron jobs'), 'http://drupal.org/cron'),
)) . '</p>' . "\n" . '<pre>45 * * * * /usr/bin/lynx -auth=<em>username</em>:<em>password</em> -source http://example.com/cron.php' . "\n" . '45 * * * * /usr/bin/wget --user=<em>username</em> --password=<em>password</em> -O - -q http://example.com/cron.php' . "\n" . '45 * * * * /usr/bin/curl --anyauth --user <em>username</em>:<em>password</em> --silent --compressed http://example.com/cron.php</pre>' . "\n" . '<h3><a name="issues">' . t('Known issues') . '</a></h3>' . "\n" . '<ul>' . "\n" . ' <li>' . t('Authentication on PHP/CGI installations') . "\n" . ' <p>' . t('If you are using HTTP authentication and are unable to log in, PHP could be running in CGI mode. When run in CGI mode, the normal HTTP authentication variables are not available to PHP. To work around this issue, add the following rewrite rule at the end of the .htaccess file in Drupal’s installation directory:') . '</p>' . "\n" . ' <pre>RewriteRule .* - [E=HTTP_AUTHORIZATION:%{HTTP:Authorization},L]</pre>' . "\n" . ' <p>' . t('After making the suggested change in Drupal 6, the rewrite rules would look like this:') . '</p>' . "\n" . ' <pre># Rewrite URLs of the form \'x\' to the form \'index.php?q=x\'.' . "\n" . 'RewriteCond %{REQUEST_FILENAME} !-f' . "\n" . 'RewriteCond %{REQUEST_FILENAME} !-d' . "\n" . 'RewriteCond %{REQUEST_URI} !=/favicon.ico' . "\n" . 'RewriteRule ^(.*)$ index.php?q=$1 [L,QSA]' . "\n" . 'RewriteRule .* - [E=HTTP_AUTHORIZATION:%{HTTP:Authorization},L]</pre>' . "\n" . ' </li>' . "\n" . ' <li>' . t('Authentication when running Drupal via IIS') . "\n" . ' <p>' . t('If you are using HTTP authentication and are unable to log in when Drupal is running on an IIS server, make sure that the PHP directive <em>cgi.rfc2616_headers</em> is set to <em>0</em> (the default value).') . '</p>' . "\n" . ' </li>' . "\n" . '</ul>' . "\n";
}
}