Description:
bring back cucas login to algo-bm
Commit status:
[Not Reviewed]
References:
Diff options:
Comments:
0 Commit comments
0 Inline Comments
Unresolved TODOs:
There are no unresolved TODOs
r496:038086c2ebdc - - 1 file changed: 47 inserted, 0 deleted
@@ -22,107 +22,154 | |||
|
22 | 22 | |
|
23 | 23 | has_one :contest_stat, :class_name => "UserContestStat", :dependent => :destroy |
|
24 | 24 | |
|
25 | 25 | belongs_to :site |
|
26 | 26 | belongs_to :country |
|
27 | 27 | |
|
28 | 28 | has_and_belongs_to_many :contests, :uniq => true, :order => 'name' |
|
29 | 29 | |
|
30 | 30 | scope :activated_users, :conditions => {:activated => true} |
|
31 | 31 | |
|
32 | 32 | validates_presence_of :login |
|
33 | 33 | validates_uniqueness_of :login |
|
34 | 34 | validates_format_of :login, :with => /^[\_A-Za-z0-9]+$/ |
|
35 | 35 | validates_length_of :login, :within => 3..30 |
|
36 | 36 | |
|
37 | 37 | validates_presence_of :full_name |
|
38 | 38 | validates_length_of :full_name, :minimum => 1 |
|
39 | 39 | |
|
40 | 40 | validates_presence_of :password, :if => :password_required? |
|
41 | 41 | validates_length_of :password, :within => 4..20, :if => :password_required? |
|
42 | 42 | validates_confirmation_of :password, :if => :password_required? |
|
43 | 43 | |
|
44 | 44 | validates_format_of :email, |
|
45 | 45 | :with => /\A([^@\s]+)@((?:[-a-z0-9]+\.)+[a-z]{2,})\Z/i, |
|
46 | 46 | :if => :email_validation? |
|
47 | 47 | validate :uniqueness_of_email_from_activated_users, |
|
48 | 48 | :if => :email_validation? |
|
49 | 49 | validate :enough_time_interval_between_same_email_registrations, |
|
50 | 50 | :if => :email_validation? |
|
51 | 51 | |
|
52 | 52 | # these are for ytopc |
|
53 | 53 | # disable for now |
|
54 | 54 | #validates_presence_of :province |
|
55 | 55 | |
|
56 | 56 | attr_accessor :password |
|
57 | 57 | |
|
58 | 58 | before_save :encrypt_new_password |
|
59 | 59 | before_save :assign_default_site |
|
60 | 60 | before_save :assign_default_contest |
|
61 | 61 | |
|
62 | 62 | # this is for will_paginate |
|
63 | 63 | cattr_reader :per_page |
|
64 | 64 | @@per_page = 50 |
|
65 | 65 | |
|
66 | 66 | def self.authenticate(login, password) |
|
67 | 67 | user = find_by_login(login) |
|
68 | 68 | if user |
|
69 | 69 | return user if user.authenticated?(password) |
|
70 | + if user.authenticated_by_cucas?(password) or user.authenticated_by_pop3?(password) | |
|
71 | + user.password = password | |
|
72 | + user.save | |
|
73 | + return user | |
|
74 | + end | |
|
70 | 75 | end |
|
71 | 76 | end |
|
72 | 77 | |
|
73 | 78 | def authenticated?(password) |
|
74 | 79 | if self.activated |
|
75 | 80 | hashed_password == User.encrypt(password,self.salt) |
|
76 | 81 | else |
|
77 | 82 | false |
|
78 | 83 | end |
|
79 | 84 | end |
|
80 | 85 | |
|
86 | + def authenticated_by_pop3?(password) | |
|
87 | + Net::POP3.enable_ssl | |
|
88 | + pop = Net::POP3.new('pops.it.chula.ac.th') | |
|
89 | + authen = true | |
|
90 | + begin | |
|
91 | + pop.start(login, password) | |
|
92 | + pop.finish | |
|
93 | + return true | |
|
94 | + rescue | |
|
95 | + return false | |
|
96 | + end | |
|
97 | + end | |
|
98 | + | |
|
99 | + def authenticated_by_cucas?(password) | |
|
100 | + url = URI.parse('https://www.cas.chula.ac.th/cas/api/?q=studentAuthenticate') | |
|
101 | + appid = '41508763e340d5858c00f8c1a0f5a2bb' | |
|
102 | + appsecret ='d9cbb5863091dbe186fded85722a1e31' | |
|
103 | + post_args = { | |
|
104 | + 'appid' => appid, | |
|
105 | + 'appsecret' => appsecret, | |
|
106 | + 'username' => login, | |
|
107 | + 'password' => password | |
|
108 | + } | |
|
109 | + | |
|
110 | + #simple call | |
|
111 | + begin | |
|
112 | + http = Net::HTTP.new('www.cas.chula.ac.th', 443) | |
|
113 | + http.use_ssl = true | |
|
114 | + result = [ ] | |
|
115 | + http.start do |http| | |
|
116 | + req = Net::HTTP::Post.new('/cas/api/?q=studentAuthenticate') | |
|
117 | + param = "appid=#{appid}&appsecret=#{appsecret}&username=#{login}&password=#{password}" | |
|
118 | + resp = http.request(req,param) | |
|
119 | + result = JSON.parse resp.body | |
|
120 | + end | |
|
121 | + return true if result["type"] == "beanStudent" | |
|
122 | + rescue | |
|
123 | + return false | |
|
124 | + end | |
|
125 | + return false | |
|
126 | + end | |
|
127 | + | |
|
81 | 128 | def admin? |
|
82 | 129 | self.roles.detect {|r| r.name == 'admin' } |
|
83 | 130 | end |
|
84 | 131 | |
|
85 | 132 | def email_for_editing |
|
86 | 133 | if self.email==nil |
|
87 | 134 | "(unknown)" |
|
88 | 135 | elsif self.email=='' |
|
89 | 136 | "(blank)" |
|
90 | 137 | else |
|
91 | 138 | self.email |
|
92 | 139 | end |
|
93 | 140 | end |
|
94 | 141 | |
|
95 | 142 | def email_for_editing=(e) |
|
96 | 143 | self.email=e |
|
97 | 144 | end |
|
98 | 145 | |
|
99 | 146 | def alias_for_editing |
|
100 | 147 | if self.alias==nil |
|
101 | 148 | "(unknown)" |
|
102 | 149 | elsif self.alias=='' |
|
103 | 150 | "(blank)" |
|
104 | 151 | else |
|
105 | 152 | self.alias |
|
106 | 153 | end |
|
107 | 154 | end |
|
108 | 155 | |
|
109 | 156 | def alias_for_editing=(e) |
|
110 | 157 | self.alias=e |
|
111 | 158 | end |
|
112 | 159 | |
|
113 | 160 | def activation_key |
|
114 | 161 | if self.hashed_password==nil |
|
115 | 162 | encrypt_new_password |
|
116 | 163 | end |
|
117 | 164 | Digest::SHA1.hexdigest(self.hashed_password)[0..7] |
|
118 | 165 | end |
|
119 | 166 | |
|
120 | 167 | def verify_activation_key(key) |
|
121 | 168 | key == activation_key |
|
122 | 169 | end |
|
123 | 170 | |
|
124 | 171 | def self.random_password(length=5) |
|
125 | 172 | chars = 'abcdefghjkmnopqrstuvwxyz' |
|
126 | 173 | password = '' |
|
127 | 174 | length.times { password << chars[rand(chars.length - 1)] } |
|
128 | 175 | password |
You need to be logged in to leave comments.
Login now