quickvm_sup.php 14.4 KB
Newer Older
Leigh B Stoller's avatar
Leigh B Stoller committed
1
2
<?php
#
3
# Copyright (c) 2000-2014 University of Utah and the Flux Group.
Leigh B Stoller's avatar
Leigh B Stoller committed
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
# 
# {{{EMULAB-LICENSE
# 
# This file is part of the Emulab network testbed software.
# 
# This file is free software: you can redistribute it and/or modify it
# under the terms of the GNU Affero General Public License as published by
# the Free Software Foundation, either version 3 of the License, or (at
# your option) any later version.
# 
# This file is distributed in the hope that it will be useful, but WITHOUT
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
# FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Affero General Public
# License for more details.
# 
# You should have received a copy of the GNU Affero General Public License
# along with this file.  If not, see <http://www.gnu.org/licenses/>.
# 
# }}}
#
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
$APTHOST	= "$WWWHOST";
$APTBASE	= "$TBBASE/apt";

#
# Global flag to disable accounts. We do this on some pages which
# should not display login/account info.
#
$disable_accounts = 0;

#
# So, we could be coming in on the alternate APT address (virtual server)
# which causes cookie problems. I need to look into avoiding this problem
# but for now, just change the global value of the TBAUTHDOMAIN when we do.
# The downside is that users will have to log in twice if they switch back
# and forth.
#
if ($TBMAINSITE && $_SERVER["SERVER_NAME"] == "www.aptlab.net") {
    $TBAUTHDOMAIN = ".aptlab.net";
    $APTHOST      = "www.aptlab.net";
43
    $WWWHOST      = "www.aptlab.net";
44
45
46
    $APTBASE      = "https://www.aptlab.net";
}

47
48
49
50
#
# Redefine this so APT errors are styled properly.
#
$PAGEERROR_HANDLER = function($msg, $status_code = 0) {
51
52
53
54
55
    global $drewheader;

    if (! $drewheader) {
	SPITHEADER();
    }
56
57
58
59
60
61
    echo $msg;
    echo "<script src='js/lib/require.js' data-main='js/null.js'></script>\n";
    SPITFOOTER();
    die("");
};

Leigh B Stoller's avatar
Leigh B Stoller committed
62
63
function SPITHEADER($thinheader = 0)
{
Leigh B Stoller's avatar
Leigh B Stoller committed
64
    global $TBMAINSITE;
65
    global $login_user, $login_status;
66
    global $disable_accounts, $page_title, $drewheader;
67
68
69
70
    $title = "AptLab";
    if (isset($page_title)) {
	$title .= " - $page_title";
    }
Leigh B Stoller's avatar
Leigh B Stoller committed
71
    $height = ($thinheader ? 150 : 250);
72
    $drewheader = 1;
73
74
75
76
77
78
79
80
81

    #
    # Figure out who is logged in, if anyone.
    #
    if (($login_user = CheckLogin($status)) != null) {
	$login_status = $status;
	$login_uid    = $login_user->uid();
    }

Leigh B Stoller's avatar
Leigh B Stoller committed
82
83
    echo "<html>
      <head>
84
        <title>$title</title>
85
        <link rel='stylesheet' href='bootstrap/css/bootstrap.css'>
Leigh B Stoller's avatar
Leigh B Stoller committed
86
        <link rel='stylesheet' href='quickvm.css'>
87
	<script src='js/common.js'></script>
Leigh B Stoller's avatar
Leigh B Stoller committed
88
        <script src='https://www.emulab.net/emulab_sup.js'></script>
Leigh B Stoller's avatar
Leigh B Stoller committed
89
      </head>
90
    <body style='display: none'>\n";
Leigh B Stoller's avatar
Leigh B Stoller committed
91
92
93
94
    
    if ($TBMAINSITE && file_exists("../google-analytics.php")) {
	readfile("../google-analytics.php");
    }
95

Leigh B Stoller's avatar
Leigh B Stoller committed
96
    echo "
Leigh B Stoller's avatar
Leigh B Stoller committed
97
    <!-- Container for body, needed for sticky footer -->
98
    <div id='wrap'>
99
100
101
102
103
104
         <div class='navbar navbar-static-top' role='navigation'>
           <div class='navbar-inner'>
             <div class='brand'>
                 <img src='aptlogo.png'/>
             </div>
             <ul class='nav navbar-nav navbar-right'>";
105
    if (!$disable_accounts) {
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
	if ($login_user && ISADMINISTRATOR()) {
	    echo "<li>\n";
	    if (ISADMIN()) {
		$url = CreateURL("toggle", $login_user,
				 "type", "adminon", "value", 0);
		
		echo "<a href='/$url'>
                             <img src='/redball.gif'
                                  style='height: 10px;'
                                  border='0' alt='Admin On'></a>\n";
	    }
	    else {
		$url = CreateURL("toggle", $login_user,
				 "type", "adminon", "value", 1);

		echo "<a href='/$url'>
                              <img src='/greenball.gif'
                                   style='height: 10px;'
                                   border='0' alt='Admin Off'></a>\n";
	    }
	    echo "</li>\n";
	}
128
	echo "<li id='loginstatus'>".
Leigh B Stoller's avatar
Leigh B Stoller committed
129
	    ($login_user ? "<p>$login_uid logged in</p>" : "") . "</li>\n";
130

131
	if (!NOLOGINS()) {
132
	    echo "<li id='signupitem' " .
133
		($login_user ? "class='hidden'" : "") . ">" .
134
135
136
137
138
139
140
141
                    "<form><a class='btn btn-primary navbar-btn'
                           id='signupbutton'
                           href='signup.php'>
                        Sign Up</a></form></li>
                  \n";
	    echo "<li id='loginitem' " .
		($login_user ? "class='hidden'" : "") . ">" .
                    "<form><a class='btn btn-primary navbar-btn'
142
                           id='loginbutton'
143
144
145
	                   data-toggle='modal'
                           href='#quickvm_login_modal'
                           data-target='#quickvm_login_modal'>
146
                        Login</a></form></li>
147
                  \n";
148
149
	}
    }
150
151
    echo "   </ul>
             <ul class='nav navbar-nav navbar-left'>
152
153
                <li><form><a class='btn btn-quickvm-home navbar-btn'
                       href='instantiate.php'>Home</a></form></li>\n";
154
155
156
157
    if (!$disable_accounts) {
	echo "  <li id='quickvm_actions_menu' class='dropdown ".
	    (!$login_user ? "hidden" : "") . "'>" .
	         "<a href='#' class='dropdown-toggle' data-toggle='dropdown'>
158
159
160
                    Actions <b class='caret'></b></a>
                  <ul class='dropdown-menu'>
                   <li><a href='myprofiles.php'>My Profiles</a></li>
Leigh B Stoller's avatar
Leigh B Stoller committed
161
                   <li><a href='myexperiments.php'>My Experiments</a></li>
162
163
                   <li><a href='manage_profile.php'>Create Profile</a></li>
                   <li class='divider'></li>
Leigh B Stoller's avatar
Leigh B Stoller committed
164
	           <li><a href='logout.php'>Logout</a></li>
165
166
                  </ul>
                </li>\n";
167
168
169
170
171
    }
    echo "   </ul>
           </div>
         </div>\n";

172
    SpitLoginModal("quickvm_login_modal");
173
174
    echo " <!-- Page content -->
           <div class='container'>\n";
Leigh B Stoller's avatar
Leigh B Stoller committed
175
176
177
178
179
}

function SPITFOOTER()
{
    echo "</div>
180
181
      </div>\n";
    echo "
Leigh B Stoller's avatar
Leigh B Stoller committed
182
      <!--- Footer -->
183
184
185
      <div>
       <div id='footer'>
        <div class='pull-left'>Powered by
Leigh B Stoller's avatar
Leigh B Stoller committed
186
             <img src='emulab-whiteout.png' id='elabpower'></div>
187
188
        <div class='pull-right'>&copy; 2013 The University of Utah</div>
       </div>
Leigh B Stoller's avatar
Leigh B Stoller committed
189
      </div>
190
      <!-- Placed at the end of the document so the pages load faster -->
Leigh B Stoller's avatar
Leigh B Stoller committed
191
192
193
     </body></html>\n";
}

194
195
function SPITUSERERROR($msg)
{
196
    PAGEERROR($msg, 0);
197
198
}

Leigh B Stoller's avatar
Leigh B Stoller committed
199
200
201
202
203
204
205
206
207
208
209
210
#
# Does not return; page exits.
#
function SPITAJAX_RESPONSE($value)
{
    $results = array(
	'code'  => 0,
	'value' => $value
	);
    echo json_encode($results);
}

Leigh B Stoller's avatar
Leigh B Stoller committed
211
function SPITAJAX_ERROR($code, $msg)
Leigh B Stoller's avatar
Leigh B Stoller committed
212
213
{
    $results = array(
Leigh B Stoller's avatar
Leigh B Stoller committed
214
	'code'  => code,
Leigh B Stoller's avatar
Leigh B Stoller committed
215
216
217
218
219
	'value' => $msg
	);
    echo json_encode($results);
}

Leigh B Stoller's avatar
Leigh B Stoller committed
220
221
222
223
224
#
# Spit out an info tooltip.
#
function SpitToolTip($info)
{
225
226
227
228
    echo "<a href='#' class='btn btn-xs' data-toggle='popover' ".
	"data-content='$info'> ".
        "<span class='glyphicon glyphicon-question-sign'></span> ".
        "</a>\n";
Leigh B Stoller's avatar
Leigh B Stoller committed
229
230
}

231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
#
# Spit out the verify modal. We are not using real password authentication
# like the rest of the Emulab website. Assumed to be inside of a form
# that handles a create button.
#
function SpitVerifyModal($id, $label)
{
    echo "<!-- This is the user verify modal -->
          <div id='$id' class='modal fade'>
            <div class='modal-dialog'>
            <div class='modal-content'>
               <div class='modal-header'>
                <button type='button' class='close' data-dismiss='modal'
                   aria-hidden='true'>&times;</button>
                <h3>Important</h3>
               </div>
               <div class='modal-body'>
                    <p>Check your email for a verification code, and
                       enter it here:</p>
                       <div class='form-group'>
                        <input name='verify' class='form-control'
                               placeholder='Verification code'
                               autofocus type='text' />
                       </div>
                       <div class='form-group'>
                        <button class='btn btn-primary form-control'
                            type='submit' name='create'>
                            $label</button>
                       </div>
               </div>
            </div>
            </div>
         </div>\n";
}

#
# Spit out the login modal. 
#
Robert Ricci's avatar
Robert Ricci committed
269
function SpitLoginModal($id)
270
{
Robert Ricci's avatar
Robert Ricci committed
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
?>
    <!-- This is the login modal -->
    <div id='<?php echo $id ?>' class='modal fade' role='dialog'>
        <div class='modal-dialog'>
        <form id='quickvm_login_form'
              role='form'
              method='post' action='login.php'>
        <input type=hidden name=refer value=1>
        <div id='quickvm_login_form_error'
             class='align-center'></div>
        <div class='modal-content'>
           <div class='modal-header'>
            <button type='button' class='close' data-dismiss='modal'
               aria-hidden='true'>&times;</button>
               <h4 class='modal-title'>Log in to Apt</h4>
           </div>
           <div class='modal-body form-horizontal'>
             <div class='form-group'>
                       <label for='uid' class='col-sm-2 control-label'>Username</label>
                       <div class='col-sm-10'>
                           <input name='uid' class='form-control'
                                  placeholder='Aptlab.net or Emulab.net Username'
                                  autofocus type='text'>
294
                       </div>
Robert Ricci's avatar
Robert Ricci committed
295
296
297
298
299
300
301
                   </div>
                   <div class='form-group'>
                       <label for='password' class='col-sm-2 control-label'>Password </label>
                       <div class='col-sm-10'>
                           <input name='password' class='form-control'
                                  placeholder='Password'
                                  type='password'>
302
                       </div>
Robert Ricci's avatar
Robert Ricci committed
303
304
305
306
307
                   </div>
             </div>
             <div class='modal-footer'>
                   <div class='form-group'>
                        <button class='btn btn-success btn-sm'
308
309
310
311
                            id='quickvm_login_modal_button'
                            class='form-control'
                            type='submit' name='login'>
                            Login</button>
Robert Ricci's avatar
Robert Ricci committed
312
313
314
315
316
317
318
                   </div>
             </div>
        </div>
        </form>
        </div>
     </div>
<?php
319
320
}

321
322
323
324
325
326
327
#
# Topology view modal, shared across a few pages.
#
function SpitTopologyViewModal($modal_name, $profile_array)
{
    echo "<!-- This is the topology view modal -->
          <div id='$modal_name' class='modal fade'>
328
          <div class='modal-dialog topo-modal'  id='showtopo_dialog'>
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
            <div class='modal-content'>
               <div class='modal-header'>
                <button type='button' class='close' data-dismiss='modal'
                   aria-hidden='true'>
                   &times;</button>
                <h3>Select a Profile</h3>
               </div>
               <div class='modal-body'>
                 <!-- This topo diagram goes inside this div -->
                 <div class='panel panel-default'
                            id='showtopo_container'>
                  <div class='form-group pull-left'>
                    <ul class='list-group' id='profile_name'
                            name='profile'
                            >\n";
    while (list ($id, $title) = each ($profile_array)) {
	$selected = "";
	if ($profile_value == $id)
	    $selected = "selected";
                      
	echo "          <li class='list-group-item profile-item' $selected
                            value='$id'>$title </li>\n";
    }
    echo "          </ul>
                  </div> 
                  <div class='pull-right'>
                    <span id='showtopo_title'></span>
                    <div class='panel-body'>
                     <div id='showtopo_div'></div>
                     <span class='pull-left' id='showtopo_description'></span>
                    </div>
                   </div>
                 </div>
                 <div id='showtopo_buttons' class='pull-right'>
                     <button id='showtopo_select'
                           class='btn btn-primary btn-sm'
                           type='submit' name='select'>
                              Select Profile</button>
                      <button type='button' class='btn btn-default btn-sm' 
                      data-dismiss='modal' aria-hidden='true'>
                     Cancel</button>
                    </div>
               </div>
            </div>
          </div>
       </div>\n";
}

377
378
379
380
381
382
383
384
#
# Generate an authentication object to pass to the browser that
# is passed to the web server on boss. This is used to grant
# permission to the user to invoke ssh to a local node using their
# emulab generated (no passphrase) key. This is basically a clone
# of what GateOne does, but that code was a mess. 
#
function SSHAuthObject($uid, $nodeid)
Leigh B Stoller's avatar
Leigh B Stoller committed
385
{
386
387
388
389
    global $USERNODE;
	
    $file = "/usr/testbed/etc/sshauth.key";
    
Leigh B Stoller's avatar
Leigh B Stoller committed
390
391
392
    #
    # We need the secret that is shared with ops.
    #
393
    $fp = fopen($file, "r");
Leigh B Stoller's avatar
Leigh B Stoller committed
394
    if (! $fp) {
395
	TBERROR("Error opening $file", 0);
Leigh B Stoller's avatar
Leigh B Stoller committed
396
397
	return null;
    }
398
    $key = fread($fp, 128);
Leigh B Stoller's avatar
Leigh B Stoller committed
399
    fclose($fp);
400
401
    if (!$key) {
	TBERROR("Could not get key from $file", 0);
Leigh B Stoller's avatar
Leigh B Stoller committed
402
403
	return null;
    }
404
405
406
    $key   = chop($key);
    $stuff = GENHASH();
    $now   = time();
Leigh B Stoller's avatar
Leigh B Stoller committed
407
408


409
410
411
412
413
414
415
416
417
418
419
420
    $authobj = array('uid'       => $uid,
		     'stuff'     => $stuff,
		     'nodeid'    => $nodeid,
		     'timestamp' => $now,
		     'baseurl'   => "https://${USERNODE}",
		     'signature_method' => 'HMAC-SHA1',
		     'api_version' => '1.0',
		     'signature' => hash_hmac('sha1',
					      $uid . $stuff . $nodeid . $now,
					      $key),
    );
    return json_encode($authobj);
Leigh B Stoller's avatar
Leigh B Stoller committed
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
}

#
# This is a little odd; since we are using our local CM to create
# the experiment, we can just ask for the graphic directly.
#
function GetTopoMap($uid, $pid, $eid)
{
    global $TBSUEXEC_PATH;
    $xmlstuff = "";
    
    if ($fp = popen("$TBSUEXEC_PATH nobody nobody webvistopology ".
		    "-x -s $uid $pid $eid", "r")) {

	while (!feof($fp) && connection_status() == 0) {
	    $string = fgets($fp);
	    if ($string) {
		$xmlstuff .= $string;
	    }
	}
	return $xmlstuff;
    }
    else {
	return "";
    }
}

448
449
450
451
452
453
454
455
456
457
458
459
460
#
# Redirect request to https
#
function RedirectSecure()
{
    global $APTHOST;

    if (!isset($_SERVER["SSL_PROTOCOL"])) {
	header("Location: https://$APTHOST". $_SERVER['REQUEST_URI']);
	exit();
    }
}

Leigh B Stoller's avatar
Leigh B Stoller committed
461
462
463
464
465
466
467
468
469
470
471
#
# Redirect to the login page()
#
function RedirectLoginPage()
{
    # HTTP_REFERER will not work reliably when redirecting so
    # pass in the URI for this page as an argument
    header("Location: login.php?referrer=".
	   urlencode($_SERVER['REQUEST_URI']));
}

Leigh B Stoller's avatar
Leigh B Stoller committed
472
?>