version 1.200, 2021/11/03 01:04:02
|
version 1.203, 2022/06/18 02:10:18
|
Line 160 sub get_posted_cgi {
|
Line 160 sub get_posted_cgi {
|
if (length($value) == 1) { |
if (length($value) == 1) { |
$value=~s/[\r\n]$//; |
$value=~s/[\r\n]$//; |
} |
} |
} elsif ($fname =~ /\.(xls|doc|ppt)(x|m)$/i) { |
} |
|
if ($fname =~ /\.(xls|doc|ppt)(x|m)$/i) { |
$value=~s/[\r\n]$//; |
$value=~s/[\r\n]$//; |
} |
} |
if (ref($fields) eq 'ARRAY') { |
if (ref($fields) eq 'ARRAY') { |
Line 280 sub upload_size_allowed {
|
Line 281 sub upload_size_allowed {
|
be identified by the third arg ($usename), except when lonacc is called in |
be identified by the third arg ($usename), except when lonacc is called in |
an internal redirect to /adm/switchserver (e.g., load-balancing following |
an internal redirect to /adm/switchserver (e.g., load-balancing following |
successful authentication) -- no cookie set yet. For that particular case |
successful authentication) -- no cookie set yet. For that particular case |
simply skip the call to sso_login(). |
simply skip the call to sso_login(). |
|
|
returns OK if it was SSO and user was handled. |
returns OK if it was SSO and user was handled. |
returns undef if not SSO or no means to handle the user. |
returns undef if not SSO or no means to handle the user. |
|
|
|
In the case where the session was started from /adm/launch/tiny/$domain/$id, |
|
i.e., for a protected link, with launch from another CMS, and user information |
|
is accepted from the LTI payload, then, if the user has privileged roles, |
|
authentication will be required. If SSO authentication is with a username |
|
and/or domain that differ from the username in the LTI payload and domain |
|
in the launch URL, then $r->user() will be unset and /adm/relaunch will be |
|
called. |
|
|
=cut |
=cut |
|
|
Line 324 sub sso_login {
|
Line 333 sub sso_login {
|
} |
} |
} |
} |
|
|
my ($linkprot,$linkkey); |
my ($linkprot,$linkprotuser,$linkkey,$deeplinkurl); |
|
|
# |
# |
# If Shibboleth auth is in use, and a dual SSO and non-SSO login page |
# If Shibboleth auth is in use, and a dual SSO and non-SSO login page |
Line 356 sub sso_login {
|
Line 365 sub sso_login {
|
&Apache::lonnet::tmpdel($form{'ttoken'}); |
&Apache::lonnet::tmpdel($form{'ttoken'}); |
if ($info{'origurl'}) { |
if ($info{'origurl'}) { |
$form{'origurl'} = $info{'origurl'}; |
$form{'origurl'} = $info{'origurl'}; |
|
if ($form{'origurl'} =~ m{^/tiny/$match_domain/\w+$}) { |
|
$deeplinkurl = $form{'origurl'}; |
|
} |
} |
} |
if ($info{'linkprot'}) { |
if ($info{'linkprot'}) { |
$linkprot = $info{'linkprot'}; |
$linkprot = $info{'linkprot'}; |
|
$linkprotuser = $info{'linkprotuser'}; |
} elsif ($info{'linkkey'} ne '') { |
} elsif ($info{'linkkey'} ne '') { |
$linkkey = $info{'linkkey'}; |
$linkkey = $info{'linkkey'}; |
} |
} |
Line 379 sub sso_login {
|
Line 392 sub sso_login {
|
} |
} |
if ($firsturl =~ m{^/tiny/$match_domain/\w+$}) { |
if ($firsturl =~ m{^/tiny/$match_domain/\w+$}) { |
$form{'origurl'} = $firsturl; |
$form{'origurl'} = $firsturl; |
|
$deeplinkurl = $firsturl; |
} |
} |
if ($form{'linkprot'}) { |
if ($form{'linkprot'}) { |
$linkprot = $form{'linkprot'}; |
$linkprot = $form{'linkprot'}; |
|
$linkprotuser = $form{'linkprotuser'}; |
} elsif ($form{'linkkey'} ne '') { |
} elsif ($form{'linkkey'} ne '') { |
$linkkey = $form{'linkkey'}; |
$linkkey = $form{'linkkey'}; |
} |
} |
Line 399 sub sso_login {
|
Line 414 sub sso_login {
|
my ($firsturl,@rest)=split(/\&/,$info); |
my ($firsturl,@rest)=split(/\&/,$info); |
if ($firsturl ne '') { |
if ($firsturl ne '') { |
$form{'origurl'} = &unescape($firsturl); |
$form{'origurl'} = &unescape($firsturl); |
|
if ($form{'origurl'} =~ m{^/tiny/$match_domain/\w+$}) { |
|
$deeplinkurl = $form{'origurl'}; |
|
} |
} |
} |
foreach my $item (@rest) { |
foreach my $item (@rest) { |
my ($key,$value) = split(/=/,$item); |
my ($key,$value) = split(/=/,$item); |
Line 406 sub sso_login {
|
Line 424 sub sso_login {
|
} |
} |
if ($form{'linkprot'}) { |
if ($form{'linkprot'}) { |
$linkprot = $form{'linkprot'}; |
$linkprot = $form{'linkprot'}; |
|
$linkprotuser = $form{'linkprotuser'}; |
} elsif ($form{'linkkey'} ne '') { |
} elsif ($form{'linkkey'} ne '') { |
$linkkey = $form{'linkkey'}; |
$linkkey = $form{'linkkey'}; |
} |
} |
Line 413 sub sso_login {
|
Line 432 sub sso_login {
|
} elsif ($form{'ltoken'}) { |
} elsif ($form{'ltoken'}) { |
my %link_info = &Apache::lonnet::tmpget($form{'ltoken'}); |
my %link_info = &Apache::lonnet::tmpget($form{'ltoken'}); |
$linkprot = $link_info{'linkprot'}; |
$linkprot = $link_info{'linkprot'}; |
|
if (($linkprot) && ($link_info{'linkprotuser'} ne '')) { |
|
$linkprotuser = $link_info{'linkprotuser'}; |
|
} |
my $delete = &Apache::lonnet::tmpdel($form{'ltoken'}); |
my $delete = &Apache::lonnet::tmpdel($form{'ltoken'}); |
delete($form{'ltoken'}); |
delete($form{'ltoken'}); |
|
if ($form{'origurl'} =~ m{^/tiny/$match_domain/\w+$}) { |
|
$deeplinkurl = $form{'origurl'}; |
|
} |
} elsif ($form{'linkkey'} ne '') { |
} elsif ($form{'linkkey'} ne '') { |
$linkkey = $form{'linkkey'}; |
$linkkey = $form{'linkkey'}; |
} |
} |
Line 423 sub sso_login {
|
Line 448 sub sso_login {
|
if ($domain eq '') { |
if ($domain eq '') { |
$domain = $r->dir_config('lonDefDomain'); |
$domain = $r->dir_config('lonDefDomain'); |
} |
} |
|
if (($deeplinkurl) && ($linkprot) && ($linkprotuser ne '')) { |
|
unless ($linkprotuser eq $user.':'.$domain) { |
|
$r->user(); |
|
my %data = ( |
|
origurl => $deeplinkurl, |
|
linkprot => $linkprot, |
|
linkprotuser => $linkprotuser, |
|
); |
|
my $token = &Apache::lonnet::tmpput(\%data,$r->dir_config('lonHostID'),'link'); |
|
unless (($token eq 'con_lost') || ($token eq 'refused') || ($token =~ /^error:/) || |
|
($token eq 'unknown_cmd') || ($token eq 'no_such_host')) { |
|
$r->internal_redirect('/adm/relaunch?rtoken='.$token); |
|
$r->set_handlers('PerlHandler'=> undef); |
|
return OK; |
|
} |
|
} |
|
} |
my $home=&Apache::lonnet::homeserver($user,$domain); |
my $home=&Apache::lonnet::homeserver($user,$domain); |
if ($home !~ /(con_lost|no_host|no_such_host)/) { |
if ($home !~ /(con_lost|no_host|no_such_host)/) { |
&Apache::lonnet::logthis(" SSO authorized user $user "); |
&Apache::lonnet::logthis(" SSO authorized user $user "); |
Line 476 sub sso_login {
|
Line 518 sub sso_login {
|
if ($env{'request.deeplink.login'}) { |
if ($env{'request.deeplink.login'}) { |
if ($linkprot) { |
if ($linkprot) { |
$env{'request.linkprot'} = $linkprot; |
$env{'request.linkprot'} = $linkprot; |
|
if ($linkprotuser ne '') { |
|
$env{'request.linkprotuser'} = $linkprotuser; |
|
} |
} elsif ($linkkey ne '') { |
} elsif ($linkkey ne '') { |
$env{'request.linkkey'} = $linkkey; |
$env{'request.linkkey'} = $linkkey; |
} |
} |
Line 535 sub sso_login {
|
Line 580 sub sso_login {
|
if (($is_balancer) && ($hosthere)) { |
if (($is_balancer) && ($hosthere)) { |
$info{'noloadbalance'} = $hosthere; |
$info{'noloadbalance'} = $hosthere; |
} |
} |
my $token = |
my $token = &Apache::lonnet::tmpput(\%info,$r->dir_config('lonHostID'),'sso'); |
&Apache::lonnet::tmpput(\%info, |
|
$r->dir_config('lonHostID')); |
|
$env{'form.token'} = $token; |
$env{'form.token'} = $token; |
$r->internal_redirect('/adm/migrateuser'); |
$r->internal_redirect('/adm/migrateuser'); |
$r->set_handlers('PerlHandler'=> undef); |
$r->set_handlers('PerlHandler'=> undef); |
Line 730 sub handler {
|
Line 773 sub handler {
|
} |
} |
} |
} |
if ($requrl=~m{^/+tiny/+$match_domain/+\w+$}) { |
if ($requrl=~m{^/+tiny/+$match_domain/+\w+$}) { |
|
if ($r->args) { |
|
&Apache::loncommon::get_unprocessed_cgi($r->args,['ttoken']); |
|
if (defined($env{'form.ttoken'})) { |
|
my %info = &Apache::lonnet::tmpget($env{'form.ttoken'}); |
|
if (($info{'linkprotuser'} ne '') && ($info{'origurl'} ne '')) { |
|
if (($info{'linkprot'}) && ($info{'origurl'} eq $requrl) && |
|
($info{'linkprotuser'} ne $env{'user.name'}.':'.$env{'user.domain'})) { |
|
my %data = ( |
|
origurl => $requrl, |
|
linkprot => $info{'linkprot'}, |
|
linkprotuser => $info{'linkprotuser'}, |
|
); |
|
my $token = |
|
&Apache::lonnet::tmpput(\%data,$r->dir_config('lonHostID'),'retry'); |
|
unless (($token eq 'con_lost') || ($token eq 'refused') || ($token =~ /^error:/) || |
|
($token eq 'unknown_cmd') || ($token eq 'no_such_host')) { |
|
$r->internal_redirect('/adm/relaunch?rtoken='.$token); |
|
$r->set_handlers('PerlHandler'=> undef); |
|
return OK; |
|
} |
|
} |
|
} |
|
} |
|
} |
if ($env{'user.name'} eq 'public' && |
if ($env{'user.name'} eq 'public' && |
$env{'user.domain'} eq 'public') { |
$env{'user.domain'} eq 'public') { |
$env{'request.firsturl'}=$requrl; |
$env{'request.firsturl'}=$requrl; |
return FORBIDDEN; |
return FORBIDDEN; |
} else { |
|
return OK; |
|
} |
} |
|
return OK; |
} |
} |
# ---------------------------------------------------------------- Check access |
# ---------------------------------------------------------------- Check access |
my $now = time; |
my $now = time; |
Line 820 sub handler {
|
Line 886 sub handler {
|
} |
} |
} |
} |
} |
} |
$access=&Apache::lonnet::allowed('bre',$requrl,'','','','','',$nodeeplinkcheck); |
my $clientip = &Apache::lonnet::get_requestor_ip($r); |
|
$access=&Apache::lonnet::allowed('bre',$requrl,'','',$clientip,'','',$nodeeplinkcheck); |
} |
} |
} |
} |
if ($check_block) { |
if ($check_block) { |