6c2fa2f020
git-svn-id: https://semanticscuttle.svn.sourceforge.net/svnroot/semanticscuttle/trunk@643 b3834d28-1941-0410-a4f8-b48e95affb8f
38 lines
1.3 KiB
PHP
38 lines
1.3 KiB
PHP
<?php
|
|
require_once '../www-header.php';
|
|
|
|
// Provides HTTP Basic authentication of a user
|
|
// and logs the user in if necessary
|
|
|
|
function authenticate() {
|
|
header('WWW-Authenticate: Basic realm="SemanticScuttle API"');
|
|
header('HTTP/1.0 401 Unauthorized');
|
|
|
|
die(T_("Use of the API calls requires authentication."));
|
|
}
|
|
|
|
if (!$userservice->isLoggedOn()) {
|
|
/* Maybe we have caught authentication data in $_SERVER['REMOTE_USER']
|
|
( Inspired by http://www.yetanothercommunitysystem.com/article-321-regle-comment-utiliser-l-authentification-http-en-php-chez-ovh ) */
|
|
if ((!isset($_SERVER['PHP_AUTH_USER']) || !isset($_SERVER['PHP_AUTH_PW']))
|
|
&& isset($_SERVER['REMOTE_USER'])
|
|
&& preg_match('/Basic\s+(.*)$/i', $_SERVER['REMOTE_USER'], $matches)
|
|
) {
|
|
list($name, $password) = explode(':', base64_decode($matches[1]));
|
|
$_SERVER['PHP_AUTH_USER'] = strip_tags($name);
|
|
$_SERVER['PHP_AUTH_PW'] = strip_tags($password);
|
|
}
|
|
|
|
if (!isset($_SERVER['PHP_AUTH_USER'])) {
|
|
authenticate();
|
|
} else {
|
|
$login = $userservice->login($_SERVER['PHP_AUTH_USER'], $_SERVER['PHP_AUTH_PW']);
|
|
if ($login) {
|
|
$currentUser = $userservice->getCurrentObjectUser();
|
|
} else {
|
|
authenticate();
|
|
}
|
|
}
|
|
}
|
|
?>
|