Diff for /loncom/auth/lonacc.pm between versions 1.107 and 1.119

version 1.107, 2007/01/31 16:48:54 version 1.119, 2008/11/18 19:14:34
Line 27 Line 27
 #  #
 ###  ###
   
   =head1 NAME
   
   Apache::lonacc - Cookie Based Access Handler
   
   =head1 SYNOPSIS
   
   Invoked (for various locations) by /etc/httpd/conf/srm.conf:
   
    PerlAccessHandler       Apache::lonacc
   
   =head1 INTRODUCTION
   
   This module enables cookie based authentication and is used
   to control access for many different LON-CAPA URIs.
   
   Whenever the client sends the cookie back to the server, 
   this cookie is handled by either lonacc.pm or loncacc.pm
   (see srm.conf for what is invoked when).  If
   the cookie is missing or invalid, the user is re-challenged
   for login information.
   
   This is part of the LearningOnline Network with CAPA project
   described at http://www.lon-capa.org.
   
   =head1 HANDLER SUBROUTINE
   
   This routine is called by Apache and mod_perl.
   
   =over 4
   
   =item *
   
   transfer profile into environment
   
   =item *
   
   load POST parameters
   
   =item *
   
   check access
   
   =item *
   
   if allowed, get symb, log, generate course statistics if applicable
   
   =item *
   
   otherwise return error
   
   =item *
   
   see if public resource
   
   =item *
   
   store attempted access
   
   =back
   
   =cut
   
   
 package Apache::lonacc;  package Apache::lonacc;
   
 use strict;  use strict;
Line 37  use Apache::loncommon(); Line 100  use Apache::loncommon();
 use Apache::lonlocal;  use Apache::lonlocal;
 use Apache::restrictedaccess();  use Apache::restrictedaccess();
 use Apache::blockedaccess();   use Apache::blockedaccess(); 
 use CGI::Cookie();  
 use Fcntl qw(:flock);  use Fcntl qw(:flock);
 use LONCAPA;  use LONCAPA;
   
Line 58  sub goodbye { Line 120  sub goodbye {
 ###############################################  ###############################################
   
 sub get_posted_cgi {  sub get_posted_cgi {
     my ($r) = @_;      my ($r,$fields) = @_;
   
     my $buffer;      my $buffer;
     if ($r->header_in('Content-length')) {      if ($r->header_in('Content-length')) {
  $r->read($buffer,$r->header_in('Content-length'),0);   $r->read($buffer,$r->header_in('Content-length'),0);
     }      }
     unless ($buffer=~/^(\-+\w+)\s+Content\-Disposition\:\s*form\-data/si) {      my $content_type = $r->header_in('Content-type');
       if ($content_type !~ m{^multipart/form-data}) {
  my @pairs=split(/&/,$buffer);   my @pairs=split(/&/,$buffer);
  my $pair;   my $pair;
  foreach $pair (@pairs) {   foreach $pair (@pairs) {
Line 73  sub get_posted_cgi { Line 136  sub get_posted_cgi {
     $value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg;      $value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg;
     $name  =~ tr/+/ /;      $name  =~ tr/+/ /;
     $name  =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg;      $name  =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg;
               if (ref($fields) eq 'ARRAY') {
                   next if (!grep(/^\Q$name\E$/,@{$fields}));
               }
     &Apache::loncommon::add_to_env("form.$name",$value);      &Apache::loncommon::add_to_env("form.$name",$value);
  }   }
     } else {      } else {
  my $contentsep=$1;   my ($contentsep) = ($content_type =~ /boundary=\"?([^\";,]+)\"?/);
  my @lines = split (/\n/,$buffer);   my @lines = split (/\n/,$buffer);
  my $name='';   my $name='';
  my $value='';   my $value='';
Line 84  sub get_posted_cgi { Line 150  sub get_posted_cgi {
  my $fmime='';   my $fmime='';
  my $i;   my $i;
  for ($i=0;$i<=$#lines;$i++) {   for ($i=0;$i<=$#lines;$i++) {
     if ($lines[$i]=~/^$contentsep/) {      if ($lines[$i]=~/^--\Q$contentsep\E/) {
  if ($name) {   if ($name) {
     chomp($value);      chomp($value);
     if ($fname) {                      if (ref($fields) eq 'ARRAY') {
  $env{"form.$name.filename"}=$fname;                          next if (!grep(/^\Q$name\E$/,@{$fields}));
  $env{"form.$name.mimetype"}=$fmime;                      }
     } else {                      if ($fname) {
  $value=~s/\s+$//s;                          if ($env{'form.symb'} ne '') {
     }                              my $size = (length($value))/(1024.0 * 1024.0);
     &Apache::loncommon::add_to_env("form.$name",$value);                              if (&upload_size_allowed($name,$size,$fname) eq 'ok') {
                                   $env{"form.$name.filename"}=$fname;
                                   $env{"form.$name.mimetype"}=$fmime;
                                   &Apache::loncommon::add_to_env("form.$name",$value);
                               }
                           } else {
                               $env{"form.$name.filename"}=$fname;
                               $env{"form.$name.mimetype"}=$fmime;
                               &Apache::loncommon::add_to_env("form.$name",$value);
                           }
                       } else {
                           $value=~s/\s+$//s;
                           &Apache::loncommon::add_to_env("form.$name",$value);
                       }
  }   }
  if ($i<$#lines) {   if ($i<$#lines) {
     $i++;      $i++;
Line 139  sub get_posted_cgi { Line 218  sub get_posted_cgi {
     $r->headers_in->unset('Content-length');      $r->headers_in->unset('Content-length');
 }  }
   
   #
   # Perform size checks for file uploads to essayresponse items in course context.
   #
   # Add form.HWFILESIZE.$part_$id to %env with file size (MB)
   # If file exceeds maximum allowed size, add form.HWFILETOOBIG.$part_$id to %env.
   #
    
   sub upload_size_allowed {
       my ($name,$size,$fname) = @_;
       if ($name =~ /^HWFILE(\w+)$/) {
           my $ident = $1;
           my $item = 'HWFILESIZE'.$ident;
           &Apache::loncommon::add_to_env("form.$item",$size);
           my $maxsize= &Apache::lonnet::EXT("resource.$ident.maxfilesize");
           if (!$maxsize) {
               $maxsize = 100.0;
           }
           if ($size > $maxsize) {
               my $warn = 'HWFILETOOBIG'.$ident;
               &Apache::loncommon::add_to_env("form.$warn",$fname);
               return;
           }
       }
       return 'ok';
   }
   
 # handle the case of the single sign on user, at this point $r->user   # handle the case of the single sign on user, at this point $r->user 
 # will be set and valid now need to find the loncapa user info and possibly  # will be set and valid now need to find the loncapa user info and possibly
 # balance them  # balance them
 # returns OK if it was a SSO and user was handled  # returns OK if it was a SSO and user was handled
 #         undef if not SSO or no means to hanle the user  #         undef if not SSO or no means to hanle the user
   
 sub sso_login {  sub sso_login {
     my ($r,$lonid,$handle) = @_;      my ($r,$handle) = @_;
   
     my $lonidsdir=$r->dir_config('lonIDsDir');      my $lonidsdir=$r->dir_config('lonIDsDir');
     if (!($r->user       if (!($r->user 
   && (!defined($env{'user.name'}) && !defined($env{'user.domain'}))    && (!defined($env{'user.name'}) && !defined($env{'user.domain'}))
   && (!$lonid || !-e "$lonidsdir/$handle.id" || $handle eq ''))) {    && ($handle eq ''))) {
  # not an SSO case or already logged in   # not an SSO case or already logged in
  return undef;   return undef;
     }      }
Line 181  sub sso_login { Line 287  sub sso_login {
       'server'    => $r->dir_config('lonHostID'),        'server'    => $r->dir_config('lonHostID'),
       'sso.login' => 1        'sso.login' => 1
       );        );
               if ($r->dir_config("ssodirecturl") == 1) {
                   $info{'origurl'} = $r->uri;
               }
             if (defined($r->dir_config("lonSSOReloginServer"))) {              if (defined($r->dir_config("lonSSOReloginServer"))) {
                 $info{'sso.reloginserver'} =                   $info{'sso.reloginserver'} = 
                     $r->dir_config('lonSSOReloginServer');                       $r->dir_config('lonSSOReloginServer'); 
Line 197  sub sso_login { Line 306  sub sso_login {
  &Apache::lonnet::logthis(" SSO authorized unknown user $user ");   &Apache::lonnet::logthis(" SSO authorized unknown user $user ");
         $r->subprocess_env->set('SSOUserUnknown' => $user);          $r->subprocess_env->set('SSOUserUnknown' => $user);
         $r->subprocess_env->set('SSOUserDomain' => $domain);          $r->subprocess_env->set('SSOUserDomain' => $domain);
  $r->internal_redirect($r->dir_config('lonSSOUserUnknownRedirect'));          my @cancreate;
           my %domconfig =
               &Apache::lonnet::get_dom('configuration',['usercreation'],$domain);
           if (ref($domconfig{'usercreation'}) eq 'HASH') {
               if (ref($domconfig{'usercreation'}{'cancreate'}) eq 'HASH') {
                   if (ref($domconfig{'usercreation'}{'cancreate'}{'selfcreate'}) eq 'ARRAY') {
                       @cancreate = @{$domconfig{'usercreation'}{'cancreate'}{'selfcreate'}};
                   } elsif (($domconfig{'usercreation'}{'cancreate'}{'selfcreate'} ne 'none') && 
                            ($domconfig{'usercreation'}{'cancreate'}{'selfcreate'} ne '')) {
                       @cancreate = ($domconfig{'usercreation'}{'cancreate'}{'selfcreate'});
                   }
               }
           }
           if (grep(/^sso$/,@cancreate)) {
               $r->internal_redirect('/adm/createaccount');
           } else {
       $r->internal_redirect($r->dir_config('lonSSOUserUnknownRedirect'));
           }
  $r->set_handlers('PerlHandler'=> undef);   $r->set_handlers('PerlHandler'=> undef);
  return OK;   return OK;
     }      }
Line 207  sub sso_login { Line 333  sub sso_login {
 sub handler {  sub handler {
     my $r = shift;      my $r = shift;
     my $requrl=$r->uri;      my $requrl=$r->uri;
     my %cookies=CGI::Cookie->parse($r->header_in('Cookie'));      if (&Apache::lonnet::is_domainimage($requrl)) {
     my $lonid=$cookies{'lonID'};          return OK;
     my $cookie;  
     my $lonidsdir=$r->dir_config('lonIDsDir');  
   
     my $handle;  
     if ($lonid) {  
  $handle=&LONCAPA::clean_handle($lonid->value);  
     }      }
   
     my $result = &sso_login($r,$lonid,$handle);      
       my $handle = &Apache::lonnet::check_for_valid_session($r);
   
       my $result = &sso_login($r,$handle);
     if (defined($result)) {      if (defined($result)) {
  return $result   return $result;
     }      }
   
   
Line 230  sub handler { Line 353  sub handler {
           
     if ($handle eq '') {      if ($handle eq '') {
  $r->log_reason("Cookie $handle not valid", $r->filename);    $r->log_reason("Cookie $handle not valid", $r->filename); 
     } elsif ((-e "$lonidsdir/$handle.id") && ($handle ne '')) {      } elsif ($handle ne '') {
   
 # ------------------------------------------------------ Initialize Environment  # ------------------------------------------------------ Initialize Environment
    my $lonidsdir=$r->dir_config('lonIDsDir');
  &Apache::lonnet::transfer_profile_to_env($lonidsdir,$handle);   &Apache::lonnet::transfer_profile_to_env($lonidsdir,$handle);
   
 # --------------------------------------------------------- Initialize Language  # --------------------------------------------------------- Initialize Language
Line 287  sub handler { Line 410  sub handler {
  return HTTP_NOT_ACCEPTABLE;   return HTTP_NOT_ACCEPTABLE;
     }      }
  }   }
    if ($requrl =~ m|^/zipspool/|) {
       my $start='/zipspool/zipout/'.$env{'user.name'}.":".
    $env{'user.domain'};
       if ($requrl !~ /^\Q$start\E/) {
    $env{'user.error.msg'}="$requrl:bre:1:1:Access Denied";
    return HTTP_NOT_ACCEPTABLE;
       }
    }
  if ($env{'user.name'} eq 'public' &&    if ($env{'user.name'} eq 'public' && 
     $env{'user.domain'} eq 'public' &&      $env{'user.domain'} eq 'public' &&
     $requrl !~ m{^/+(res|public|uploaded)/} &&      $requrl !~ m{^/+(res|public|uploaded)/} &&
Line 391  sub handler { Line 522  sub handler {
   
 1;  1;
 __END__  __END__
   
 =head1 NAME  
   
 Apache::lonacc - Cookie Based Access Handler  
   
 =head1 SYNOPSIS  
   
 Invoked (for various locations) by /etc/httpd/conf/srm.conf:  
   
  PerlAccessHandler       Apache::lonacc  
   
 =head1 INTRODUCTION  
   
 This module enables cookie based authentication and is used  
 to control access for many different LON-CAPA URIs.  
   
 Whenever the client sends the cookie back to the server,   
 this cookie is handled by either lonacc.pm or loncacc.pm  
 (see srm.conf for what is invoked when).  If  
 the cookie is missing or invalid, the user is re-challenged  
 for login information.  
   
 This is part of the LearningOnline Network with CAPA project  
 described at http://www.lon-capa.org.  
   
 =head1 HANDLER SUBROUTINE  
   
 This routine is called by Apache and mod_perl.  
   
 =over 4  
   
 =item *  
   
 transfer profile into environment  
   
 =item *  
   
 load POST parameters  
   
 =item *  
   
 check access  
   
 =item *  
   
 if allowed, get symb, log, generate course statistics if applicable  
   
 =item *  
   
 otherwise return error  
   
 =item *  
   
 see if public resource  
   
 =item *  
   
 store attempted access  
   
 =back  
   
 =cut  

Removed from v.1.107  
changed lines
  Added in v.1.119


FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>