--- loncom/auth/lonauth.pm 2008/10/01 11:11:08 1.95 +++ loncom/auth/lonauth.pm 2009/07/03 10:22:00 1.99 @@ -1,7 +1,7 @@ # The LearningOnline Network # User Authentication Module # -# $Id: lonauth.pm,v 1.95 2008/10/01 11:11:08 bisitz Exp $ +# $Id: lonauth.pm,v 1.99 2009/07/03 10:22:00 bisitz Exp $ # # Copyright Michigan State University Board of Trustees # @@ -78,14 +78,16 @@ sub success { my $remoteinfo=&Apache::lonmenu::load_remote_msg($lowerurl); my $setflags=&Apache::lonmenu::setflags(); my $maincall=&Apache::lonmenu::maincall(); + my $brcrum = [{'href' => '', + 'text' => 'Successful Login'},]; my $start_page=&Apache::loncommon::start_page('Successful Login', - $startupremote, - {'no_inline_link' => 1,}); + $startupremote, + {'no_inline_link' => 1, + 'bread_crumbs' => $brcrum,}); my $end_page =&Apache::loncommon::end_page(); my $continuelink; - if (($env{'browser.interface'} eq 'textual') || - ($env{'environment.remote'} eq 'off')) { + if ($env{'environment.remote'} eq 'off') { $continuelink="".&mt('Continue').""; } # ------------------------------------------------- Output for successful login @@ -122,7 +124,6 @@ sub failed { {'no_inline_link' => 1,}); my $end_page = &Apache::loncommon::end_page(); &Apache::loncommon::content_type($r,'text/html'); - sleep 1; # brute force counteraction: slow down attackers, which try to hack user authentication with automated scripts $r->send_http_header; $r->print( $start_page @@ -173,7 +174,7 @@ sub handler { $r->print( $start_page .'

'.&mt('You are already logged in!').'

' - .'

'.&mt('Please either [_1]continue the current session[_2] or [_3]logout[_4].' + .'

'.&mt('Please either [_1]continue the current session[_2] or [_3]log out[_4].' ,'','','','') .'

' .'

'.&mt('Login problems?').'

'