quickvm_sup.php 14.2 KB
Newer Older
Leigh B Stoller's avatar
Leigh B Stoller committed
1
2
<?php
#
3
# Copyright (c) 2000-2014 University of Utah and the Flux Group.
Leigh B Stoller's avatar
Leigh B Stoller committed
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
# 
# {{{EMULAB-LICENSE
# 
# This file is part of the Emulab network testbed software.
# 
# This file is free software: you can redistribute it and/or modify it
# under the terms of the GNU Affero General Public License as published by
# the Free Software Foundation, either version 3 of the License, or (at
# your option) any later version.
# 
# This file is distributed in the hope that it will be useful, but WITHOUT
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
# FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Affero General Public
# License for more details.
# 
# You should have received a copy of the GNU Affero General Public License
# along with this file.  If not, see <http://www.gnu.org/licenses/>.
# 
# }}}
#
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
$APTHOST	= "$WWWHOST";
$APTBASE	= "$TBBASE/apt";

#
# Global flag to disable accounts. We do this on some pages which
# should not display login/account info.
#
$disable_accounts = 0;

#
# So, we could be coming in on the alternate APT address (virtual server)
# which causes cookie problems. I need to look into avoiding this problem
# but for now, just change the global value of the TBAUTHDOMAIN when we do.
# The downside is that users will have to log in twice if they switch back
# and forth.
#
if ($TBMAINSITE && $_SERVER["SERVER_NAME"] == "www.aptlab.net") {
    $TBAUTHDOMAIN = ".aptlab.net";
    $APTHOST      = "www.aptlab.net";
43
    $WWWHOST      = "www.aptlab.net";
44
45
46
    $APTBASE      = "https://www.aptlab.net";
}

47
48
49
50
#
# Redefine this so APT errors are styled properly.
#
$PAGEERROR_HANDLER = function($msg, $status_code = 0) {
51
52
53
54
55
    global $drewheader;

    if (! $drewheader) {
	SPITHEADER();
    }
56
57
58
59
60
61
    echo $msg;
    echo "<script src='js/lib/require.js' data-main='js/null.js'></script>\n";
    SPITFOOTER();
    die("");
};

Leigh B Stoller's avatar
Leigh B Stoller committed
62
63
function SPITHEADER($thinheader = 0)
{
Leigh B Stoller's avatar
Leigh B Stoller committed
64
    global $TBMAINSITE;
65
    global $login_user, $login_status;
66
    global $disable_accounts, $page_title, $drewheader;
67
68
69
70
    $title = "AptLab";
    if (isset($page_title)) {
	$title .= " - $page_title";
    }
Leigh B Stoller's avatar
Leigh B Stoller committed
71
    $height = ($thinheader ? 150 : 250);
72
    $drewheader = 1;
73
74
75
76
77
78
79
80
81

    #
    # Figure out who is logged in, if anyone.
    #
    if (($login_user = CheckLogin($status)) != null) {
	$login_status = $status;
	$login_uid    = $login_user->uid();
    }

Leigh B Stoller's avatar
Leigh B Stoller committed
82
83
    echo "<html>
      <head>
84
        <title>$title</title>
85
        <link rel='stylesheet' href='bootstrap/css/bootstrap.css'>
Leigh B Stoller's avatar
Leigh B Stoller committed
86
        <link rel='stylesheet' href='quickvm.css'>
87
	<script src='js/common.js'></script>
Leigh B Stoller's avatar
Leigh B Stoller committed
88
        <script src='https://www.emulab.net/emulab_sup.js'></script>
Leigh B Stoller's avatar
Leigh B Stoller committed
89
      </head>
90
    <body style='display: none'>\n";
Leigh B Stoller's avatar
Leigh B Stoller committed
91
92
93
94
    
    if ($TBMAINSITE && file_exists("../google-analytics.php")) {
	readfile("../google-analytics.php");
    }
95

Leigh B Stoller's avatar
Leigh B Stoller committed
96
    echo "
Leigh B Stoller's avatar
Leigh B Stoller committed
97
    <!-- Container for body, needed for sticky footer -->
98
    <div id='wrap'>
99
100
101
102
103
104
         <div class='navbar navbar-static-top' role='navigation'>
           <div class='navbar-inner'>
             <div class='brand'>
                 <img src='aptlogo.png'/>
             </div>
             <ul class='nav navbar-nav navbar-right'>";
105
    if (!$disable_accounts) {
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
	if ($login_user && ISADMINISTRATOR()) {
	    echo "<li>\n";
	    if (ISADMIN()) {
		$url = CreateURL("toggle", $login_user,
				 "type", "adminon", "value", 0);
		
		echo "<a href='/$url'>
                             <img src='/redball.gif'
                                  style='height: 10px;'
                                  border='0' alt='Admin On'></a>\n";
	    }
	    else {
		$url = CreateURL("toggle", $login_user,
				 "type", "adminon", "value", 1);

		echo "<a href='/$url'>
                              <img src='/greenball.gif'
                                   style='height: 10px;'
                                   border='0' alt='Admin Off'></a>\n";
	    }
	    echo "</li>\n";
	}
128
	echo "<li id='loginstatus'>".
Leigh B Stoller's avatar
Leigh B Stoller committed
129
	    ($login_user ? "<p>$login_uid logged in</p>" : "") . "</li>\n";
130

131
132
133
134
	if (!NOLOGINS()) {
	    echo "<li id='loginbutton' " .
		($login_user ? "class='hidden'" : "") . ">" .
		"       <a class='btn btn-primary navbar-btn'
135
                           id='loginbutton'
136
137
138
139
140
	                   data-toggle='modal'
                           href='#quickvm_login_modal'
                           data-target='#quickvm_login_modal'>
                        Login</a></li>
                  \n";
141
142
	}
    }
143
144
    echo "   </ul>
             <ul class='nav navbar-nav navbar-left'>
Leigh B Stoller's avatar
Leigh B Stoller committed
145
                <li><a class='btn btn-quickvm-home navbar-btn'
146
                       href='instantiate.php'>Home</a></li>\n";
147
148
149
150
    if (!$disable_accounts) {
	echo "  <li id='quickvm_actions_menu' class='dropdown ".
	    (!$login_user ? "hidden" : "") . "'>" .
	         "<a href='#' class='dropdown-toggle' data-toggle='dropdown'>
151
152
153
                    Actions <b class='caret'></b></a>
                  <ul class='dropdown-menu'>
                   <li><a href='myprofiles.php'>My Profiles</a></li>
Leigh B Stoller's avatar
Leigh B Stoller committed
154
                   <li><a href='myexperiments.php'>My Experiments</a></li>
155
156
                   <li><a href='manage_profile.php'>Create Profile</a></li>
                   <li class='divider'></li>
Leigh B Stoller's avatar
Leigh B Stoller committed
157
	           <li><a href='logout.php'>Logout</a></li>
158
159
                  </ul>
                </li>\n";
160
161
162
163
164
    }
    echo "   </ul>
           </div>
         </div>\n";

165
    SpitLoginModal("quickvm_login_modal");
166
167
    echo " <!-- Page content -->
           <div class='container'>\n";
Leigh B Stoller's avatar
Leigh B Stoller committed
168
169
170
171
172
}

function SPITFOOTER()
{
    echo "</div>
173
174
      </div>\n";
    echo "
Leigh B Stoller's avatar
Leigh B Stoller committed
175
      <!--- Footer -->
176
177
178
      <div>
       <div id='footer'>
        <div class='pull-left'>Powered by
Leigh B Stoller's avatar
Leigh B Stoller committed
179
             <img src='emulab-whiteout.png' id='elabpower'></div>
180
181
        <div class='pull-right'>&copy; 2013 The University of Utah</div>
       </div>
Leigh B Stoller's avatar
Leigh B Stoller committed
182
      </div>
183
      <!-- Placed at the end of the document so the pages load faster -->
Leigh B Stoller's avatar
Leigh B Stoller committed
184
185
186
     </body></html>\n";
}

187
188
function SPITUSERERROR($msg)
{
189
    PAGEERROR($msg, 0);
190
191
}

Leigh B Stoller's avatar
Leigh B Stoller committed
192
193
194
195
196
197
198
199
200
201
202
203
#
# Does not return; page exits.
#
function SPITAJAX_RESPONSE($value)
{
    $results = array(
	'code'  => 0,
	'value' => $value
	);
    echo json_encode($results);
}

Leigh B Stoller's avatar
Leigh B Stoller committed
204
function SPITAJAX_ERROR($code, $msg)
Leigh B Stoller's avatar
Leigh B Stoller committed
205
206
{
    $results = array(
Leigh B Stoller's avatar
Leigh B Stoller committed
207
	'code'  => code,
Leigh B Stoller's avatar
Leigh B Stoller committed
208
209
210
211
212
	'value' => $msg
	);
    echo json_encode($results);
}

Leigh B Stoller's avatar
Leigh B Stoller committed
213
214
215
216
217
#
# Spit out an info tooltip.
#
function SpitToolTip($info)
{
218
219
220
221
    echo "<a href='#' class='btn btn-xs' data-toggle='popover' ".
	"data-content='$info'> ".
        "<span class='glyphicon glyphicon-question-sign'></span> ".
        "</a>\n";
Leigh B Stoller's avatar
Leigh B Stoller committed
222
223
}

224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
#
# Spit out the verify modal. We are not using real password authentication
# like the rest of the Emulab website. Assumed to be inside of a form
# that handles a create button.
#
function SpitVerifyModal($id, $label)
{
    echo "<!-- This is the user verify modal -->
          <div id='$id' class='modal fade'>
            <div class='modal-dialog'>
            <div class='modal-content'>
               <div class='modal-header'>
                <button type='button' class='close' data-dismiss='modal'
                   aria-hidden='true'>&times;</button>
                <h3>Important</h3>
               </div>
               <div class='modal-body'>
                    <p>Check your email for a verification code, and
                       enter it here:</p>
                       <div class='form-group'>
                        <input name='verify' class='form-control'
                               placeholder='Verification code'
                               autofocus type='text' />
                       </div>
                       <div class='form-group'>
                        <button class='btn btn-primary form-control'
                            type='submit' name='create'>
                            $label</button>
                       </div>
               </div>
            </div>
            </div>
         </div>\n";
}

#
# Spit out the login modal. 
#
Robert Ricci's avatar
Robert Ricci committed
262
function SpitLoginModal($id)
263
{
Robert Ricci's avatar
Robert Ricci committed
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
?>
    <!-- This is the login modal -->
    <div id='<?php echo $id ?>' class='modal fade' role='dialog'>
        <div class='modal-dialog'>
        <form id='quickvm_login_form'
              role='form'
              method='post' action='login.php'>
        <input type=hidden name=refer value=1>
        <div id='quickvm_login_form_error'
             class='align-center'></div>
        <div class='modal-content'>
           <div class='modal-header'>
            <button type='button' class='close' data-dismiss='modal'
               aria-hidden='true'>&times;</button>
               <h4 class='modal-title'>Log in to Apt</h4>
           </div>
           <div class='modal-body form-horizontal'>
             <div class='form-group'>
                       <label for='uid' class='col-sm-2 control-label'>Username</label>
                       <div class='col-sm-10'>
                           <input name='uid' class='form-control'
                                  placeholder='Aptlab.net or Emulab.net Username'
                                  autofocus type='text'>
287
                       </div>
Robert Ricci's avatar
Robert Ricci committed
288
289
290
291
292
293
294
                   </div>
                   <div class='form-group'>
                       <label for='password' class='col-sm-2 control-label'>Password </label>
                       <div class='col-sm-10'>
                           <input name='password' class='form-control'
                                  placeholder='Password'
                                  type='password'>
295
                       </div>
Robert Ricci's avatar
Robert Ricci committed
296
297
298
299
300
                   </div>
             </div>
             <div class='modal-footer'>
                   <div class='form-group'>
                        <button class='btn btn-success btn-sm'
301
302
303
304
                            id='quickvm_login_modal_button'
                            class='form-control'
                            type='submit' name='login'>
                            Login</button>
Robert Ricci's avatar
Robert Ricci committed
305
306
307
308
309
310
311
312
313
314
                         or
                         <a class='btn btn-primary btn-sm'
                            href='signup.php'>Sign Up</a> 
                   </div>
             </div>
        </div>
        </form>
        </div>
     </div>
<?php
315
316
}

317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
#
# Topology view modal, shared across a few pages.
#
function SpitTopologyViewModal($modal_name, $profile_array)
{
    echo "<!-- This is the topology view modal -->
          <div id='$modal_name' class='modal fade'>
          <div class='modal-dialog'  id='showtopo_dialog'>
            <div class='modal-content'>
               <div class='modal-header'>
                <button type='button' class='close' data-dismiss='modal'
                   aria-hidden='true'>
                   &times;</button>
                <h3>Select a Profile</h3>
               </div>
               <div class='modal-body'>
                 <!-- This topo diagram goes inside this div -->
                 <div class='panel panel-default'
                            id='showtopo_container'>
                  <div class='form-group pull-left'>
                    <ul class='list-group' id='profile_name'
                            name='profile'
                            >\n";
    while (list ($id, $title) = each ($profile_array)) {
	$selected = "";
	if ($profile_value == $id)
	    $selected = "selected";
                      
	echo "          <li class='list-group-item profile-item' $selected
                            value='$id'>$title </li>\n";
    }
    echo "          </ul>
                  </div> 
                  <div class='pull-right'>
                    <span id='showtopo_title'></span>
                    <div class='panel-body'>
                     <div id='showtopo_div'></div>
                     <span class='pull-left' id='showtopo_description'></span>
                    </div>
                   </div>
                 </div>
                 <div id='showtopo_buttons' class='pull-right'>
                     <button id='showtopo_select'
                           class='btn btn-primary btn-sm'
                           type='submit' name='select'>
                              Select Profile</button>
                      <button type='button' class='btn btn-default btn-sm' 
                      data-dismiss='modal' aria-hidden='true'>
                     Cancel</button>
                    </div>
               </div>
            </div>
          </div>
       </div>\n";
}

373
374
375
376
377
378
379
380
#
# Generate an authentication object to pass to the browser that
# is passed to the web server on boss. This is used to grant
# permission to the user to invoke ssh to a local node using their
# emulab generated (no passphrase) key. This is basically a clone
# of what GateOne does, but that code was a mess. 
#
function SSHAuthObject($uid, $nodeid)
Leigh B Stoller's avatar
Leigh B Stoller committed
381
{
382
383
384
385
    global $USERNODE;
	
    $file = "/usr/testbed/etc/sshauth.key";
    
Leigh B Stoller's avatar
Leigh B Stoller committed
386
387
388
    #
    # We need the secret that is shared with ops.
    #
389
    $fp = fopen($file, "r");
Leigh B Stoller's avatar
Leigh B Stoller committed
390
    if (! $fp) {
391
	TBERROR("Error opening $file", 0);
Leigh B Stoller's avatar
Leigh B Stoller committed
392
393
	return null;
    }
394
    $key = fread($fp, 128);
Leigh B Stoller's avatar
Leigh B Stoller committed
395
    fclose($fp);
396
397
    if (!$key) {
	TBERROR("Could not get key from $file", 0);
Leigh B Stoller's avatar
Leigh B Stoller committed
398
399
	return null;
    }
400
401
402
    $key   = chop($key);
    $stuff = GENHASH();
    $now   = time();
Leigh B Stoller's avatar
Leigh B Stoller committed
403
404


405
406
407
408
409
410
411
412
413
414
415
416
    $authobj = array('uid'       => $uid,
		     'stuff'     => $stuff,
		     'nodeid'    => $nodeid,
		     'timestamp' => $now,
		     'baseurl'   => "https://${USERNODE}",
		     'signature_method' => 'HMAC-SHA1',
		     'api_version' => '1.0',
		     'signature' => hash_hmac('sha1',
					      $uid . $stuff . $nodeid . $now,
					      $key),
    );
    return json_encode($authobj);
Leigh B Stoller's avatar
Leigh B Stoller committed
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
}

#
# This is a little odd; since we are using our local CM to create
# the experiment, we can just ask for the graphic directly.
#
function GetTopoMap($uid, $pid, $eid)
{
    global $TBSUEXEC_PATH;
    $xmlstuff = "";
    
    if ($fp = popen("$TBSUEXEC_PATH nobody nobody webvistopology ".
		    "-x -s $uid $pid $eid", "r")) {

	while (!feof($fp) && connection_status() == 0) {
	    $string = fgets($fp);
	    if ($string) {
		$xmlstuff .= $string;
	    }
	}
	return $xmlstuff;
    }
    else {
	return "";
    }
}

444
445
446
447
448
449
450
451
452
453
454
455
456
#
# Redirect request to https
#
function RedirectSecure()
{
    global $APTHOST;

    if (!isset($_SERVER["SSL_PROTOCOL"])) {
	header("Location: https://$APTHOST". $_SERVER['REQUEST_URI']);
	exit();
    }
}

Leigh B Stoller's avatar
Leigh B Stoller committed
457
458
459
460
461
462
463
464
465
466
467
#
# Redirect to the login page()
#
function RedirectLoginPage()
{
    # HTTP_REFERER will not work reliably when redirecting so
    # pass in the URI for this page as an argument
    header("Location: login.php?referrer=".
	   urlencode($_SERVER['REQUEST_URI']));
}

Leigh B Stoller's avatar
Leigh B Stoller committed
468
?>