X-Git-Url: http://wagnertech.de/git?a=blobdiff_plain;f=WEB-INF%2Flib%2Fauth%2FAuth_db.class.php;h=a7ae0d3faeb7659b5873de92a9461287e6a1ad1d;hb=75a1eedb8977b8f2db459128bab9aaf367e3b58b;hp=4861552c77f571e537d1cc00da558e5884a7bdb8;hpb=c8144edb537a2447d78cda4a2e6c53616a63c876;p=timetracker.git diff --git a/WEB-INF/lib/auth/Auth_db.class.php b/WEB-INF/lib/auth/Auth_db.class.php index 4861552c..a7ae0d3f 100644 --- a/WEB-INF/lib/auth/Auth_db.class.php +++ b/WEB-INF/lib/auth/Auth_db.class.php @@ -44,8 +44,8 @@ class Auth_db extends Auth { $mdb2 = getConnection(); // Try md5 password match first. - $sql = "SELECT id FROM tt_users - WHERE login = ".$mdb2->quote($login)." AND password = md5(".$mdb2->quote($password).") AND status = 1"; + $sql = "SELECT id FROM tt_users". + " WHERE login = ".$mdb2->quote($login)." AND password = md5(".$mdb2->quote($password).") AND status = 1"; $res = $mdb2->query($sql); if (is_a($res, 'PEAR_Error')) { @@ -56,22 +56,25 @@ class Auth_db extends Auth { if ($val['id'] > 0) { return array('login'=>$login,'id'=>$val['id']); } else { - // If the OLD_PASSWORDS option is defined - set it. - if (defined('OLD_PASSWORDS') && isTrue(OLD_PASSWORDS)) { + if (isTrue('OLD_PASSWORDS')) { $sql = "SET SESSION old_passwords = 1"; $res = $mdb2->query($sql); if (is_a($res, 'PEAR_Error')) { die($res->getMessage()); } } - // Try legacy password match. This is needed for compatibility with older versions of TT. $sql = "SELECT id FROM tt_users WHERE login = ".$mdb2->quote($login)." AND password = old_password(".$mdb2->quote($password).") AND status = 1"; $res = $mdb2->query($sql); if (is_a($res, 'PEAR_Error')) { - die($res->getMessage()); + return false; // Simply return false for a meaningful error message on screen, see the comment below. + // die($res->getMessage()); // old_password() function is removed in MySQL 5.7.5. + // We are getting a confusing "MDB2 Error: not found" in this case if we die. + // TODO: perhaps it's time to simplify things and remove handling of old passwords completely. + // HOWEVER: some users apparently never change their passwords. When I tried removing OLD_PASSWORDS + // support in November 2018, there were login issues with such users. } $val = $res->fetchRow(); if ($val['id'] > 0) { @@ -81,8 +84,9 @@ class Auth_db extends Auth { // Special handling for admin@localhost - search for an account with admin role with a matching password. if ($login == 'admin@localhost') { - $sql = "SELECT id, login FROM tt_users - WHERE role = 1024 AND password = md5(".$mdb2->quote($password).") AND status = 1"; + $sql = "SELECT u.id, u.login FROM tt_users u". + " LEFT JOIN tt_roles r on (u.role_id = r.id)". + " WHERE r.rank = 1024 AND password = md5(".$mdb2->quote($password).") AND u.status = 1"; $res = $mdb2->query($sql); if (is_a($res, 'PEAR_Error')) { die($res->getMessage());