summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--acf.conf2
-rw-r--r--app/acf-util/acf-util.roles4
-rw-r--r--app/acf-util/logon-controller.lua10
-rw-r--r--app/acf-util/logon-model.lua10
-rw-r--r--app/acf-util/password-controller.lua2
-rw-r--r--app/acf_www-controller.lua2
-rw-r--r--app/template-html.lsp6
-rw-r--r--lib/authenticator.lua2
-rw-r--r--lib/session.lua4
9 files changed, 21 insertions, 21 deletions
diff --git a/acf.conf b/acf.conf
index 158b151..d610335 100644
--- a/acf.conf
+++ b/acf.conf
@@ -21,7 +21,7 @@ logfile = /var/log/acf.log
# Session parameters
# sessiontimeout - time in minutes before inactive session deleted (default 30)
-# lockouttime - time in minutes for lockout due to failed login attempts (default 30) (maximum = sessiontimeout)
+# lockouttime - time in minutes for lockout due to failed logon attempts (default 30) (maximum = sessiontimeout)
# lockouteventlimit - number of events in past lockouttime to cause lockout (default 10)
# ACF is skinnable - this specifies the active skin
diff --git a/app/acf-util/acf-util.roles b/app/acf-util/acf-util.roles
index c2639cf..8741022 100644
--- a/app/acf-util/acf-util.roles
+++ b/app/acf-util/acf-util.roles
@@ -1,4 +1,4 @@
-GUEST=logon/logon,logon/logout,logon/status,welcome/read
+GUEST=logon/logon,logon/logoff,logon/status,welcome/read
USER=password/editme,roles/read
EXPERT=
-ADMIN=logon/logon,logon/logout,logon/status,password/editme,password/status,password/edituser,password/newuser,password/deleteuser,roles/read,roles/getpermslist,roles/viewuserroles,roles/viewroleperms,roles/viewroles,roles/editrole,roles/deleterole,roles/newrole,welcome/read,password/status,password/edituser,password/newuser,password/deleteuser,roles/getpermslist,roles/viewuserroles,roles/viewroleperms,roles/viewroles,roles/editrole,roles/deleterole,roles/newrole,skins/read,skins/update
+ADMIN=logon/logon,logon/logoff,logon/status,password/editme,password/status,password/edituser,password/newuser,password/deleteuser,roles/read,roles/getpermslist,roles/viewuserroles,roles/viewroleperms,roles/viewroles,roles/editrole,roles/deleterole,roles/newrole,welcome/read,password/status,password/edituser,password/newuser,password/deleteuser,roles/getpermslist,roles/viewuserroles,roles/viewroleperms,roles/viewroles,roles/editrole,roles/deleterole,roles/newrole,skins/read,skins/update
diff --git a/app/acf-util/logon-controller.lua b/app/acf-util/logon-controller.lua
index 5404dbd..6ac293e 100644
--- a/app/acf-util/logon-controller.lua
+++ b/app/acf-util/logon-controller.lua
@@ -61,15 +61,15 @@ logon = function(self)
return cmdresult
end
--- Log out current user and go to login screen
-logout = function(self)
- local logout = self.model.logoff(conf.sessiondir, sessiondata)
+-- Log off current user and go to logon screen
+logoff = function(self)
+ local logoff = self.model.logoff(conf.sessiondir, sessiondata)
-- We have to redirect so a new session / menu is created
redirect(self, "logon")
- return logout
+ return logoff
end
--- Report the login status
+-- Report the logon status
status = function(self)
local name = cfe({ label="User Name" })
local sessionid = cfe({ value=self.sessiondata.id or "", label="Session ID" })
diff --git a/app/acf-util/logon-model.lua b/app/acf-util/logon-model.lua
index 40a533e..833d665 100644
--- a/app/acf-util/logon-model.lua
+++ b/app/acf-util/logon-model.lua
@@ -22,9 +22,9 @@ logoff = function (sessiondir, sessiondata)
end
-- Log on new user if possible and set up userinfo in session
--- if we fail, we leave the session alone (don't log out)
+-- if we fail, we leave the session alone (don't log off)
logon = function (self, userid, password, ip_addr, sessiondir, sessiondata)
- -- Check to see if we can login this user id / ip addr
+ -- Check to see if we can log on this user id / ip addr
local countevent = session.count_events(sessiondir, userid, session.hash_ip_addr(ip_addr), self.conf.lockouttime, self.conf.lockouteventlimit)
if countevent then
session.record_event(sessiondir, userid, session.hash_ip_addr(ip_addr))
@@ -32,9 +32,9 @@ logon = function (self, userid, password, ip_addr, sessiondir, sessiondata)
if false == countevent and userid and password then
if authenticator.authenticate (self, userid, password) then
- -- We have a successful login, change sessiondata
+ -- We have a successful logon, change sessiondata
-- for some reason, can't call this function or it skips rest of logon
- -- logout(sessiondir, sessiondata)
+ -- logoff(sessiondir, sessiondata)
---[[ so, do this instead
session.unlink_session(sessiondir, sessiondata.id)
-- Clear the current session data
@@ -50,7 +50,7 @@ logon = function (self, userid, password, ip_addr, sessiondir, sessiondata)
end
return cfe({ type="boolean", value=true, label="Logon Success" })
else
- -- We have a bad login, log the event
+ -- We have a bad logon, log the event
session.record_event(sessiondir, userid, session.hash_ip_addr(ip_addr))
end
end
diff --git a/app/acf-util/password-controller.lua b/app/acf-util/password-controller.lua
index c3d8695..6518249 100644
--- a/app/acf-util/password-controller.lua
+++ b/app/acf-util/password-controller.lua
@@ -18,7 +18,7 @@ function editme(self)
local tmp1, tmp2 = roles.get_roles_perm(self, value.value.roles.value)
table.sort(tmp2)
for i,h in ipairs(tmp2) do
- if h ~= "/acf-util/logon/logout" and h ~= "/acf-util/logon/logon" then
+ if h ~= "/acf-util/logon/logoff" and h ~= "/acf-util/logon/logon" then
value.value.home.option[#value.value.home.option+1] = h
end
end
diff --git a/app/acf_www-controller.lua b/app/acf_www-controller.lua
index 91872cb..2ff2179 100644
--- a/app/acf_www-controller.lua
+++ b/app/acf_www-controller.lua
@@ -272,7 +272,7 @@ mvc.on_load = function (self, parent)
self.sessiondata.id = sessionlib.random_hash(512)
require("authenticator")
self.sessiondata.userinfo = authenticator.get_userinfo(self, ENV.REMOTE_USER)
- logevent("Automatic login as ENV.REMOTE_USER: "..tostring(ENV.REMOTE_USER))
+ logevent("Automatic logon as ENV.REMOTE_USER: "..tostring(ENV.REMOTE_USER))
end
if nil == self.sessiondata.id then
diff --git a/app/template-html.lsp b/app/template-html.lsp
index 811a771..34bc824 100644
--- a/app/template-html.lsp
+++ b/app/template-html.lsp
@@ -58,9 +58,9 @@ end
<% local ctlr = pageinfo.script .. "/acf-util/logon/"
if session.userinfo and session.userinfo.userid then
- io.write ( string.format("\t\t\t\t\t\t<a href=\"%s\">Log out as '" .. html.html_escape(session.userinfo.userid) .. "'</a>\n", html.html_escape(ctlr) .. "logout" ) )
+ io.write ( string.format("\t\t\t\t\t\t<a href=\"%s\">Log off as '" .. html.html_escape(session.userinfo.userid) .. "'</a>\n", html.html_escape(ctlr) .. "logoff" ) )
else
- io.write ( string.format("\t\t\t\t\t\t<a href=\"%s\">Log in</a>\n", html.html_escape(ctlr) .. "logon" ) )
+ io.write ( string.format("\t\t\t\t\t\t<a href=\"%s\">Log on</a>\n", html.html_escape(ctlr) .. "logon" ) )
end %>
|
<a href="<%= html.html_escape(pageinfo.wwwprefix) %>/">home</a> |
@@ -108,7 +108,7 @@ end
</div>
<h2><%= html.html_escape(pageinfo.controller) %> : <%= html.html_escape(pageinfo.action) %></h2>
<!-- FIXME: Next row is 'dead' data! Remove 'class=hide' when done! -->
- <p class='hide'>[ welcome ] > [ login ] > [ bgp ] > [ firewall ] > [ content filter ] > [ interfaces ]</p>
+ <p class='hide'>[ welcome ] > [ logon ] > [ bgp ] > [ firewall ] > [ content filter ] > [ interfaces ]</p>
<div class="tailer">
</div>
</div> <!-- postnav -->
diff --git a/lib/authenticator.lua b/lib/authenticator.lua
index fe91c3d..311e764 100644
--- a/lib/authenticator.lua
+++ b/lib/authenticator.lua
@@ -1,5 +1,5 @@
-- ACF Authenticator - does validation and loads sub-authenticator to read/write database
--- We store the login info in the passwd table, "" field. It looks like
+-- We store the logon info in the passwd table, "" field. It looks like
-- password:username:ROLE1[,ROLE2...]
module (..., package.seeall)
diff --git a/lib/session.lua b/lib/session.lua
index 146c0e9..d41a3f6 100644
--- a/lib/session.lua
+++ b/lib/session.lua
@@ -182,7 +182,7 @@ unlink_session = function (sessionpath, session)
return statos
end
--- Record an invalid login event
+-- Record an invalid logon event
-- ID would typically be an ip address or username
-- the format is lockevent.id.datetime.processid
record_event = function( sessionpath, id_u, id_ip )
@@ -192,7 +192,7 @@ record_event = function( sessionpath, id_u, id_ip )
io.close(x)
end
--- Check how many invalid login events
+-- Check how many invalid logon events
-- have happened for this id in the last n minutes
-- this will only effect the lockevent files
count_events = function (sessionpath, id_user, ipaddr, minutes, limit)