mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-08-07 17:49:17 +00:00
21132: ALF-3855: Refactored repository authentication filters so that same code is re-used for Web Client, Web Script, Web DAV and Sharepoint authentication - 'Uber Filter' part 3 - Means we now support Kerberos Authentication for Sharepoint - Threw away a lot of duplicated code - New common AuthenticationDriver interface created and now implemented by core authentication code - Sharepoint and BaseSSOAuthenticationFilter now both use AuthenticationDrivers - Needs regression testing 21137: ALF-3841: Alfresco Explorer SSO Authentication Filters now accept ticket parameters too - Can be turned back off with ntlm.authentication.browser.ticketLogons=false or kerberos.authentication.browser.ticketLogons=false - Wiki updated 21141: ALF-3855: Fixed wiring 21146: ALF-2879: 'xamconnector' module behaviour for xam:archived - Application of xam:archived recurses and locks both files and folders - cm:content nodes also have the store selector applied for the XAMContentStore - TODO: Archive properties 21165: Fixed ALF-3867: SQL format error when re-instating orphaned content URL - Parameter was not bounded with # - Added unit test to ensure SQL generated is correct 21169: Merged V3.3 to V3.3-BUG-FIX 21168: (RECORD ONLY Merged PATCHES/V3.2.1 to V3.3 21166: Merged V3.3-BUG-FIX to PATCHES/V3.2.1 21165: Fixed ALF-3867: SQL format error when re-instating orphaned content URL - Parameter was not bounded with # - Added unit test to ensure SQL generated is correct 21118: Latest SpringSurf libs: - Fix for missing read of "keystore" in Remote config - Session Fixation attack mitigation improvements: - A Surf application no longer generates a Session (and therefore no JSESSIONID) until a user is authenticated - simply visiting a login page or similar will no longer generate a Session - Existing Sessions are always invalidated and destroyed if found when a user is authenticated via the LoginController (i.e. due to a JSESSIONID captured via an XSS attack) Merged HEAD to V3.3 21111: Fix to encode form parameter on Share login template - prevents its potential use as an reflected XSS attack vector 21117: Session Fixation mitigation: - Removed Session creation from Share index.jsp Merged V3.3-BUG-FIX-2010_06_24 to V3.3 21096: Fix for ALF-3718 - JSF client login page input validator is too aggressive ("Login" button is disabled if username contains forward slash) 21088: Latest SpringSurf libs git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@21170 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
358 lines
10 KiB
JavaScript
358 lines
10 KiB
JavaScript
//
|
|
// Validation functions
|
|
// Gavin Cornwell 30-11-2005
|
|
//
|
|
|
|
/**
|
|
* Informs the user of the given 'message', if 'showMessage' is true.
|
|
* If 'showMessage' is true focus is given to the 'control'.
|
|
*/
|
|
function informUser(control, message, showMessage)
|
|
{
|
|
if (showMessage)
|
|
{
|
|
alert(message);
|
|
if (control.type != "hidden") control.focus();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Ensures the value of the 'control' is not null or 0.
|
|
*
|
|
* @return true if the mandatory validation passed
|
|
*/
|
|
function validateMandatory(control, message, showMessage)
|
|
{
|
|
var result = true;
|
|
|
|
if (control.value == null || control.value.length == 0)
|
|
{
|
|
informUser(control, message, showMessage);
|
|
result = false;
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
/**
|
|
* Ensures the value of the 'control' is more than 'min' and less than 'max'.
|
|
*
|
|
* @return true if the number range validation passed
|
|
*/
|
|
function validateNumberRange(control, min, max, message, showMessage)
|
|
{
|
|
var result = true;
|
|
|
|
if (isNaN(control.value) || control.value < min || control.value > max)
|
|
{
|
|
informUser(control, message, showMessage);
|
|
result = false;
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
/**
|
|
* Ensures the value of the 'control' is a number.
|
|
*
|
|
* @return true if the value is a number
|
|
*/
|
|
function validateIsNumber(control, message, showMessage)
|
|
{
|
|
var result = true;
|
|
|
|
if (isNaN(control.value))
|
|
{
|
|
informUser(control, message, showMessage);
|
|
result = false;
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
/**
|
|
* Ensures the value of the 'control' has a string length more than 'min' and less than 'max'.
|
|
*
|
|
* @return true if the string length validation passed
|
|
*/
|
|
function validateStringLength(control, min, max, message, showMessage)
|
|
{
|
|
var result = true;
|
|
|
|
if (control.value.length < min || control.value.length > max)
|
|
{
|
|
informUser(control, message, showMessage);
|
|
result = false;
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
/**
|
|
* Ensures the value of the 'control' matches the 'expression' if 'requiresMatch' is true.
|
|
* Ensures the value of the 'control' does not match the 'expression' if 'requiresMatch' is false.
|
|
*
|
|
* @return true if the regex validation passed
|
|
*/
|
|
function validateMultivalueRegex(control, expression, requiresMatch, matchMessage, noMatchMessage, showMessage)
|
|
{
|
|
var result = true;
|
|
var pattern = new RegExp(decode(expression));
|
|
|
|
var arrayOfStrings = control.value.substring(1, control.value.length - 1).split(", ");
|
|
for (var i=0; i < arrayOfStrings.length; i++)
|
|
{
|
|
var matches = pattern.test(arrayOfStrings[i]);
|
|
if (matches != requiresMatch)
|
|
{
|
|
if (requiresMatch)
|
|
{
|
|
informUser(control, noMatchMessage, showMessage);
|
|
return false;
|
|
}
|
|
else
|
|
{
|
|
informUser(control, matchMessage, showMessage);
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
return result;
|
|
}
|
|
|
|
/**
|
|
* Ensures the value of the 'control' matches the 'expression' if 'requiresMatch' is true.
|
|
* Ensures the value of the 'control' does not match the 'expression' if 'requiresMatch' is false.
|
|
*
|
|
* @return true if the regex validation passed
|
|
*/
|
|
function validateRegex(control, expression, requiresMatch, matchMessage, noMatchMessage, showMessage)
|
|
{
|
|
var result = true;
|
|
|
|
var pattern = new RegExp(decode(expression));
|
|
var matches = pattern.test(control.value);
|
|
|
|
if (matches != requiresMatch)
|
|
{
|
|
if (requiresMatch)
|
|
{
|
|
informUser(control, noMatchMessage, showMessage);
|
|
}
|
|
else
|
|
{
|
|
informUser(control, matchMessage, showMessage);
|
|
}
|
|
|
|
result = false;
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
/**
|
|
* Ensures the value of the 'control' does not contain any illegal characters.
|
|
*
|
|
* @return true if the file name is valid
|
|
*/
|
|
function validateName(control, message, showMessage)
|
|
{
|
|
var pattern = /([\"\*\\\>\<\?\/\:\|]+)|([ ]+$)|([\.]?[\.]+$)/;
|
|
return validateValue(control, pattern, message, showMessage);
|
|
}
|
|
|
|
/**
|
|
* Ensures the user name value does not contain any illegal characters while user creating.
|
|
*
|
|
* @return true if the user name is valid
|
|
*/
|
|
function validateUserNameForCreate(control, message, showMessage)
|
|
{
|
|
var pattern = /([\"\*\\\>\<\?\:\|]+)|([ ]+$)|([\.]?[\.]+$)/;
|
|
return validateValue(control, pattern, message, showMessage);
|
|
}
|
|
|
|
/**
|
|
* Ensures the user name value does not contain any illegal characters while login.
|
|
*
|
|
* @return true if the user name is valid
|
|
*/
|
|
function validateUserNameForLogin(control, message, showMessage)
|
|
{
|
|
var pattern = /([\"\*\>\<\?\:\|]+)|([ ]+$)|([\.]?[\.]+$)/;
|
|
return validateValue(control, pattern, message, showMessage);
|
|
}
|
|
|
|
/**
|
|
* Ensures the value of the 'control' coresponds to required pattern.
|
|
*
|
|
* @return true if the file name is valid
|
|
*/
|
|
function validateValue(control, pattern, message, showMessage)
|
|
{
|
|
var result = true;
|
|
var trimed = control.value.replace(/^\s\s*/, '').replace(/\s\s*$/, '');
|
|
var idx = trimed.search(pattern);
|
|
if (idx != -1)
|
|
{
|
|
informUser(control, "'" + trimed.charAt(idx) + "' " + message, showMessage);
|
|
result = false;
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
function validateDialog()
|
|
{
|
|
if (finishButtonPressed)
|
|
{
|
|
finishButtonPressed = false;
|
|
var message = $("dialog:dialog-body:validation_invalid_character").textContent ? $("dialog:dialog-body:validation_invalid_character").textContent : $("dialog:dialog-body:validation_invalid_character").innerText;
|
|
return validateName($("dialog:dialog-body:name"), message, true);
|
|
}
|
|
else
|
|
{
|
|
return true;
|
|
}
|
|
}
|
|
|
|
function validateWizard()
|
|
{
|
|
if (finishButtonPressed)
|
|
{
|
|
finishButtonPressed = false;
|
|
var message = $("wizard:wizard-body:validation_invalid_character").textContent ? $("wizard:wizard-body:validation_invalid_character").textContent : $("wizard:wizard-body:validation_invalid_character").innerText;
|
|
return validateName($("wizard:wizard-body:name"), message, true);
|
|
}
|
|
else
|
|
{
|
|
return true;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Decodes the given string
|
|
*
|
|
* @param str The string to decode
|
|
* @return The decoded string
|
|
*/
|
|
function decode(str)
|
|
{
|
|
var s0, i, j, s, ss, u, n, f;
|
|
|
|
s0 = ""; // decoded str
|
|
|
|
for (i = 0; i < str.length; i++)
|
|
{
|
|
// scan the source str
|
|
s = str.charAt(i);
|
|
|
|
if (s == "+")
|
|
{
|
|
// "+" should be changed to SP
|
|
s0 += " ";
|
|
}
|
|
else
|
|
{
|
|
if (s != "%")
|
|
{
|
|
// add an unescaped char
|
|
s0 += s;
|
|
}
|
|
else
|
|
{
|
|
// escape sequence decoding
|
|
u = 0; // unicode of the character
|
|
|
|
f = 1; // escape flag, zero means end of this sequence
|
|
|
|
while (true)
|
|
{
|
|
ss = ""; // local str to parse as int
|
|
for (j = 0; j < 2; j++ )
|
|
{
|
|
// get two maximum hex characters for parse
|
|
sss = str.charAt(++i);
|
|
|
|
if (((sss >= "0") && (sss <= "9")) || ((sss >= "a") && (sss <= "f")) || ((sss >= "A") && (sss <= "F")))
|
|
{
|
|
ss += sss; // if hex, add the hex character
|
|
}
|
|
else
|
|
{
|
|
// not a hex char., exit the loop
|
|
--i;
|
|
break;
|
|
}
|
|
}
|
|
|
|
// parse the hex str as byte
|
|
n = parseInt(ss, 16);
|
|
|
|
// single byte format
|
|
if (n <= 0x7f) { u = n; f = 1; }
|
|
|
|
// double byte format
|
|
if ((n >= 0xc0) && (n <= 0xdf)) { u = n & 0x1f; f = 2; }
|
|
|
|
// triple byte format
|
|
if ((n >= 0xe0) && (n <= 0xef)) { u = n & 0x0f; f = 3; }
|
|
|
|
// quaternary byte format (extended)
|
|
if ((n >= 0xf0) && (n <= 0xf7)) { u = n & 0x07; f = 4; }
|
|
|
|
// not a first, shift and add 6 lower bits
|
|
if ((n >= 0x80) && (n <= 0xbf)) { u = (u << 6) + (n & 0x3f); --f; }
|
|
|
|
// end of the utf byte sequence
|
|
if (f <= 1) { break; }
|
|
|
|
if (str.charAt(i + 1) == "%")
|
|
{
|
|
// test for the next shift byte
|
|
i++ ;
|
|
}
|
|
else
|
|
{
|
|
// abnormal, format error
|
|
break;
|
|
}
|
|
}
|
|
|
|
// add the escaped character
|
|
s0 += String.fromCharCode(u);
|
|
|
|
}
|
|
}
|
|
}
|
|
|
|
return s0;
|
|
}
|
|
|
|
/**
|
|
* This function validates Output Path Pattern parameter for Create Web Site and
|
|
* Create Form Wizards
|
|
*
|
|
* @param disablingElement -
|
|
* some input control for disabling if Pattern parameter is not valid
|
|
* @param outputPathInput -
|
|
* input that contains Pattern parameter
|
|
* @param additionalConditionInput -
|
|
* input that contains additional parameter for enabling
|
|
* disablingElement. If this parameter is 'null' then
|
|
* disablingElement will be enabled
|
|
*/
|
|
function validateOutputPathPattern(disabledElement, outputPathInput, additionalConditionInput)
|
|
{
|
|
var path = (null != outputPathInput) ? (outputPathInput.value) : (null);
|
|
var pattern = new RegExp("^([\\s\u0020]*)([^\\s\\u0020]+)([^\\0]*)$", "");
|
|
if ((null == path) || ("" == path) || !pattern.test(path))
|
|
{
|
|
disabledElement.disabled = true;
|
|
}
|
|
else
|
|
{
|
|
value = (null != additionalConditionInput) ? (additionalConditionInput.value) : (null);
|
|
disabledElement.disabled = (null != value) ? (("" == value.trim()) || !pattern.test(value)) : (false);
|
|
}
|
|
} |