diff options
author | mensonge <mensonge@b3834d28-1941-0410-a4f8-b48e95affb8f> | 2008-04-03 13:28:48 +0000 |
---|---|---|
committer | mensonge <mensonge@b3834d28-1941-0410-a4f8-b48e95affb8f> | 2008-04-03 13:28:48 +0000 |
commit | 0564d64de2ea6838e7a874da5e99fa5358a0f75f (patch) | |
tree | ae678c3e6bda751168d5c896b5f472f5db983bc6 /api | |
parent | 96728fd633b0462b9a7605aae33eba2d1ad827b6 (diff) | |
download | semanticscuttle-0564d64de2ea6838e7a874da5e99fa5358a0f75f.tar.gz semanticscuttle-0564d64de2ea6838e7a874da5e99fa5358a0f75f.tar.bz2 |
Interface design: add export option through API into the profile page
git-svn-id: https://semanticscuttle.svn.sourceforge.net/svnroot/semanticscuttle/trunk@94 b3834d28-1941-0410-a4f8-b48e95affb8f
Diffstat (limited to 'api')
-rw-r--r-- | api/httpauth.inc.php | 41 |
1 files changed, 22 insertions, 19 deletions
diff --git a/api/httpauth.inc.php b/api/httpauth.inc.php index 3e5d464..f693d35 100644 --- a/api/httpauth.inc.php +++ b/api/httpauth.inc.php @@ -1,4 +1,7 @@ <?php +require_once('../header.inc.php'); +$userservice =& ServiceFactory::getServiceInstance('UserService'); + // Provides HTTP Basic authentication of a user, and sets two variables, sId and username, // with the user's info. @@ -6,30 +9,30 @@ function authenticate() { header('WWW-Authenticate: Basic realm="SemanticScuttle API"'); header('HTTP/1.0 401 Unauthorized'); - die("Use of the API calls requires authentication."); -} - - -/* Maybe we have caught authentication data in $_SERVER['REMOTE_USER'] -( Inspired by http://www.yetanothercommunitysystem.com/article-321-regle-comment-utiliser-l-authentification-http-en-php-chez-ovh ) */ -if((!$_SERVER['PHP_AUTH_USER'] || !$_SERVER['PHP_AUTH_USER']) -&& preg_match('/Basic\s+(.*)$/i', $_SERVER['REMOTE_USER'], $matches)) { -list($name, $password) = explode(':', base64_decode($matches[1])); -$_SERVER['PHP_AUTH_USER'] = strip_tags($name); -$_SERVER['PHP_AUTH_PW'] = strip_tags($password); + die(T_("Use of the API calls requires authentication.")); } +if(!$userservice->isLoggedOn()) { + /* Maybe we have caught authentication data in $_SERVER['REMOTE_USER'] + ( Inspired by http://www.yetanothercommunitysystem.com/article-321-regle-comment-utiliser-l-authentification-http-en-php-chez-ovh ) */ + if((!isset($_SERVER['PHP_AUTH_USER']) || !isset($_SERVER['PHP_AUTH_PW'])) + && preg_match('/Basic\s+(.*)$/i', $_SERVER['REMOTE_USER'], $matches)) { + list($name, $password) = explode(':', base64_decode($matches[1])); + $_SERVER['PHP_AUTH_USER'] = strip_tags($name); + $_SERVER['PHP_AUTH_PW'] = strip_tags($password); + } -if (!isset($_SERVER['PHP_AUTH_USER'])) { - authenticate(); -} else { - require_once('../header.inc.php'); - $userservice =& ServiceFactory::getServiceInstance('UserService'); + if (!isset($_SERVER['PHP_AUTH_USER'])) { + authenticate(); + } else { + require_once('../header.inc.php'); + $userservice =& ServiceFactory::getServiceInstance('UserService'); - $login = $userservice->login($_SERVER['PHP_AUTH_USER'], $_SERVER['PHP_AUTH_PW']); - if (!$login) { - authenticate(); + $login = $userservice->login($_SERVER['PHP_AUTH_USER'], $_SERVER['PHP_AUTH_PW']); + if (!$login) { + authenticate(); + } } } ?> |