defs.php3.in 5.46 KB
Newer Older
1 2
<?php
#
3
# Standard definitions! 
4
#
5 6
$TBDIR          = "@prefix@/";
$WWWDEFS        = "@WWWDEFS@";
7
$OURDOMAIN      = "@OURDOMAIN@";
8
$BOSSNODE       = "@BOSSNODE@";
9
$TBADMINGROUP   = "@TBADMINGROUP@";
10

11 12 13
# Overridden by the defs file!
$TBMAINSITE     = 0;

14 15 16 17 18
#
# Include configure selected definitions.
#
include("$WWWDEFS"."-defs.php3");

Leigh B. Stoller's avatar
Leigh B. Stoller committed
19 20
$TBWWW_DIR	= "$TBDIR"."www/";
$TBBIN_DIR	= "$TBDIR"."bin/";
21
$TBETC_DIR	= "$TBDIR"."etc/";
22 23 24
$TBLIBEXEC_DIR	= "$TBDIR"."libexec/";
$TBSUEXEC_PATH  = "$TBLIBEXEC_DIR/suexec";
$TBCHKPASS_PATH = "$TBLIBEXEC_DIR/checkpass";
25
$TBCSLOGINS     = "$TBETC_DIR/cslogins";
26

27 28 29 30 31 32 33 34
#
# Hardcoded check against $WWWHOST, to prevent anyone from accidentally setting
# $TBMAINSITE when it shouldn't be
#
if ($WWWHOST != "www.emulab.net") {
    $TBMAINSITE = 0;
}

35
$TBPROJ_DIR     = "/proj";
36
$TBUSER_DIR	= "/users";
Leigh B. Stoller's avatar
Leigh B. Stoller committed
37
$TBNSSUBDIR     = "nsdir";
Leigh B. Stoller's avatar
Leigh B. Stoller committed
38

39 40
$TBAUTHCOOKIE   = "HashCookie" . $TBCOOKIESUFFIX;
$TBNAMECOOKIE   = "MyUidCookie" . $TBCOOKIESUFFIX;
41
$TBAUTHTIMEOUT  = 21600;
42

43 44
$HTTPTAG        = "http://";

45
#
46 47 48
# This just spits out an email address in a page, so it does not need
# to be configured per development tree. It could be though ...
# 
49 50
$TBMAILADDR     = "<a href=\"mailto:$TBMAILADDR_OPS\">
                      Testbed Operations ($TBMAILADDR_OPS)</a>";
51

52 53 54 55 56
#
# Database constants and the like.
#
include("dbdefs.php3");

57 58 59 60
#
# Generate the KEY from a name
#
function GENKEY ($name) {
61
    return crypt("TB_"."$name"."_USR", strlen($name) + 13);
62 63
}

64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81
#
# Wrap up the mail function so we can prepend a tag to the subject
# line that indicates what testbed. Useful when multiple testbed
# email to the same list.
#
# 
function TBMAIL($to, $subject, $message, $headers = 0)
{
    global $THISHOMEBASE;

    $subject = strtoupper($THISHOMEBASE) . ": $subject";

    if ($headers)
	    return mail($to, $subject, $message, $headers);
    else
	    return mail($to, $subject, $message);
}

82 83 84 85 86
#
# Internal errors should be reported back to the user simply. The actual 
# error information should be emailed to the list for action. The script
# should then terminate if required to do so.
#
87
function TBERROR ($message, $death, $xmp = 0) {
Leigh B. Stoller's avatar
Leigh B. Stoller committed
88
    global $TBMAIL_WWW, $TBMAIL_OPS, $TBMAILADDR;
89

90 91
    TBMAIL($TBMAIL_OPS,
         "WEB ERROR REPORT",
92 93 94 95
         "\n".
         "$message\n\n".
         "Thanks,\n".
         "Testbed WWW\n",
96
         "From: $TBMAIL_OPS\n".
97
         "Errors-To: $TBMAIL_WWW");
98

Leigh B. Stoller's avatar
Leigh B. Stoller committed
99
    # Allow sendmail to run.
100 101
    sleep(1);
    
102
    if ($death) {
103 104 105
	if ($xmp)
	    $message = "<XMP>$message</XMP>\n";
	
106
            $msg = "<font size=+1><br>
107 108
                    $message
	            <br>	
109
        	    </font>
110 111 112 113
                    <p><p>
		    Could not continue. Please contact $TBMAILADDR\n";

	    PAGEERROR($msg);
114 115 116
    }
    return 0;
}
Leigh B. Stoller's avatar
Leigh B. Stoller committed
117 118 119 120 121

#
# General user errors should print something warm and fuzzy
#
function USERERROR($message, $death) {
122 123
    global $TBMAILADDR;

124
    $msg = "<font size=+1><br>
125 126
            $message
            <br>	
127
      	    </font>
128 129
            <p><p>
            Please contact $TBMAILADDR if you feel this message is an error.";
130

Leigh B. Stoller's avatar
Leigh B. Stoller committed
131
    if ($death) {
132
	PAGEERROR($msg);
Leigh B. Stoller's avatar
Leigh B. Stoller committed
133
    }
134 135
    else
        echo "$msg\n";
Leigh B. Stoller's avatar
Leigh B. Stoller committed
136 137
}

138 139 140 141 142 143 144 145
#
# A form error.
#
function FORMERROR($field) {
    USERERROR("Missing field; ".
              "Please go back and fill out the \"$field\" field!", 1);
}

146 147 148 149
#
# Run a program as a user.
#
function SUEXEC($uid, $gid, $cmdandargs, $die) {
150
    global $TBSUEXEC_PATH;
151

152 153
    ignore_user_abort(1);

154 155
    $output = array();
    $retval = 0;
156
    $result = exec("$TBSUEXEC_PATH $uid $gid $cmdandargs",
157 158 159
		   $output, $retval);

    if ($retval) {
160
	$foo = "";
161 162 163 164
        for ($i = 0; $i < count($output); $i++) {
	      $foo = "$foo $output[$i]";
	}
	
165 166 167
	TBERROR("SUEXEC failure: '$cmdandargs'\n".
		"Error output:\n\n".
                "$foo", $die, 1);
168 169 170 171
    }
    return $retval;
}

172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187
#
# Verify a URL.
#
function VERIFYURL($url) {
    global $HTTPTAG;

    if (strlen($url)) {
	if (strstr($url, " ")) {
	    USERERROR("URL ($url) is malformed; spaces are not allowed. ".
		      "Please go back and fix it up.", 1);
	}
	
	if (strcmp($HTTPTAG, substr($url, 0, strlen($HTTPTAG)))) {
	    USERERROR("URL ($url) must begin with $HTTPTAG. ".
		      "Please go back and fix it up.", 1);
	}
188
	$fp = fopen($url, "r");
189 190 191 192 193 194 195 196 197
	if (! $fp) {
	    USERERROR("URL ($url) is not valid (cannot be accessed). ".
		      "Please go back and fix it up.", 1);
	}
	fclose($fp);
    }
    return 0;
}

198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247
#
# Verify a URL.
#
function CHECKURL($url, &$error) {
    global $HTTPTAG;

    if (strlen($url)) {
	if (strstr($url, " ")) {
	    $error = "URL is malformed; spaces are not allowed!";
	    return 0;
	}
	
	if (strcmp($HTTPTAG, substr($url, 0, strlen($HTTPTAG)))) {
	    $error = "URL is malformed; must begin with $HTTPTAG!";
	    return 0;
	}
	
	$fp = @fopen($url, "r");
	if (! $fp) {
	    $error = "URL is not valid; Cannot be accessed!";
	    return 0;
	}
	fclose($fp);
    }
    return 1;
}

#
# Check a password.
#
function CHECKPASSWORD($uid, $password, $name, $email, &$error)
{
    global $TBCHKPASS_PATH;
    
    $mypipe =
	popen(escapeshellcmd("$TBCHKPASS_PATH $password $uid '$name:$email'"),
	      "w+");
    
    if ($mypipe) { 
        $retval=fgets($mypipe, 1024);
        if (strcmp($retval,"ok\n") != 0) {
	    $error = "$retval";
	    return 0;
	}
	return 1;
    }
    TBERROR("Checkpass Failure! Returned '$mypipe'.\n\n".
	    "$TBCHKPASS_PATH $password $uid '$name:$email'", 1);
}

248 249 250 251
function LASTNODELOGIN($node)
{
}

252 253 254 255
#
# Beware empty spaces (cookies)!
# 
require("tbauth.php3");
256 257 258 259 260

#
# Okay, this is what checks the login and spits out the menu.
#
require("menu.php3");
261
?>