version 1.121.2.13, 2015/01/26 22:25:41
|
version 1.121.2.18, 2019/08/03 22:45:30
|
Line 32 use strict;
|
Line 32 use strict;
|
use LONCAPA; |
use LONCAPA; |
use Apache::Constants qw(:common); |
use Apache::Constants qw(:common); |
use CGI qw(:standard); |
use CGI qw(:standard); |
use DynaLoader; # for Crypt::DES version |
|
use Crypt::DES; |
|
use Apache::loncommon(); |
use Apache::loncommon(); |
use Apache::lonnet; |
use Apache::lonnet; |
use Apache::lonmenu(); |
use Apache::lonmenu(); |
Line 42 use Fcntl qw(:flock);
|
Line 40 use Fcntl qw(:flock);
|
use Apache::lonlocal; |
use Apache::lonlocal; |
use Apache::File(); |
use Apache::File(); |
use HTML::Entities; |
use HTML::Entities; |
|
use Digest::MD5; |
|
|
# ------------------------------------------------------------ Successful login |
# ------------------------------------------------------------ Successful login |
sub success { |
sub success { |
Line 72 sub success {
|
Line 71 sub success {
|
} |
} |
} |
} |
|
|
# ------------------------------------------------------------ Get cookie ready |
# ------------------------------------------------------------ Get cookies ready |
$cookie="lonID=$cookie; path=/"; |
my ($securecookie,$defaultcookie); |
|
my $ssl = $r->subprocess_env('https'); |
|
if ($ssl) { |
|
$securecookie="lonSID=$cookie; path=/; HttpOnly; secure"; |
|
my $lonidsdir=$r->dir_config('lonIDsDir'); |
|
if (($lonidsdir) && (-e "$lonidsdir/$cookie.id")) { |
|
my $linkname=substr(Digest::MD5::md5_hex(Digest::MD5::md5_hex(time(). {}. rand(). $$)), 0, 32).'_linked'; |
|
if (-e "$lonidsdir/$linkname.id") { |
|
unlink("$lonidsdir/$linkname.id"); |
|
} |
|
my $made_symlink = eval { symlink("$lonidsdir/$cookie.id", |
|
"$lonidsdir/$linkname.id"); 1 }; |
|
if ($made_symlink) { |
|
$defaultcookie = "lonLinkID=$linkname; path=/; HttpOnly;"; |
|
&Apache::lonnet::appenv({'user.linkedenv' => $linkname}); |
|
} |
|
} |
|
} else { |
|
$defaultcookie = "lonID=$cookie; path=/; HttpOnly;"; |
|
} |
# -------------------------------------------------------- Menu script and info |
# -------------------------------------------------------- Menu script and info |
my $destination = $lowerurl; |
my $destination = $lowerurl; |
|
|
Line 138 sub success {
|
Line 156 sub success {
|
# ------------------------------------------------- Output for successful login |
# ------------------------------------------------- Output for successful login |
|
|
&Apache::loncommon::content_type($r,'text/html'); |
&Apache::loncommon::content_type($r,'text/html'); |
$r->header_out('Set-cookie' => $cookie); |
if ($securecookie) { |
|
$r->headers_out->add('Set-cookie' => $securecookie); |
|
} |
|
if ($defaultcookie) { |
|
$r->headers_out->add('Set-cookie' => $defaultcookie); |
|
} |
$r->send_http_header; |
$r->send_http_header; |
|
|
my %lt=&Apache::lonlocal::texthash( |
my %lt=&Apache::lonlocal::texthash( |
Line 238 sub reroute {
|
Line 261 sub reroute {
|
sub handler { |
sub handler { |
my $r = shift; |
my $r = shift; |
my $londocroot = $r->dir_config('lonDocRoot'); |
my $londocroot = $r->dir_config('lonDocRoot'); |
my $form; |
|
# Are we re-routing? |
# Are we re-routing? |
if (-e "$londocroot/lon-status/reroute.txt") { |
if (-e "$londocroot/lon-status/reroute.txt") { |
&reroute($r); |
&reroute($r); |
Line 302 sub handler {
|
Line 324 sub handler {
|
|
|
# split user logging in and "su"-user |
# split user logging in and "su"-user |
|
|
($form{'uname'},$form{'suname'})=split(/\:/,$form{'uname'}); |
($form{'uname'},$form{'suname'},$form{'sudom'})=split(/\:/,$form{'uname'}); |
$form{'uname'} = &LONCAPA::clean_username($form{'uname'}); |
$form{'uname'} = &LONCAPA::clean_username($form{'uname'}); |
$form{'suname'}= &LONCAPA::clean_username($form{'suname'}); |
$form{'suname'}= &LONCAPA::clean_username($form{'suname'}); |
$form{'udom'} = &LONCAPA::clean_domain( $form{'udom'}); |
$form{'udom'} = &LONCAPA::clean_domain($form{'udom'}); |
|
$form{'sudom'} = &LONCAPA::clean_domain($form{'sudom'}); |
|
|
my $role = $r->dir_config('lonRole'); |
my $role = $r->dir_config('lonRole'); |
my $domain = $r->dir_config('lonDefDomain'); |
my $domain = $r->dir_config('lonDefDomain'); |
Line 356 sub handler {
|
Line 379 sub handler {
|
(undef,$form{'iptoken'}) = split('=',$iptokenstr); |
(undef,$form{'iptoken'}) = split('=',$iptokenstr); |
} |
} |
|
|
my $keybin=pack("H16",$key); |
my $upass = &Apache::loncommon::des_decrypt($key,$form{'upass0'}); |
|
|
my $cipher; |
|
if ($Crypt::DES::VERSION>=2.03) { |
|
$cipher=new Crypt::DES $keybin; |
|
} |
|
else { |
|
$cipher=new DES $keybin; |
|
} |
|
my $upass=''; |
|
for (my $i=0;$i<=2;$i++) { |
|
my $chunk= |
|
$cipher->decrypt(unpack("a8",pack("H16",substr($form{'upass'.$i},0,16)))); |
|
|
|
$chunk.= |
|
$cipher->decrypt(unpack("a8",pack("H16",substr($form{'upass'.$i},16,16)))); |
|
|
|
$chunk=substr($chunk,1,ord(substr($chunk,0,1))); |
|
$upass.=$chunk; |
|
} |
|
|
|
# ---------------------------------------------------------------- Authenticate |
# ---------------------------------------------------------------- Authenticate |
|
|
Line 449 sub handler {
|
Line 453 sub handler {
|
|
|
# --------------------------------- Are we attempting to login as somebody else? |
# --------------------------------- Are we attempting to login as somebody else? |
if ($form{'suname'}) { |
if ($form{'suname'}) { |
|
my ($suname,$sudom,$sudomref); |
|
$suname = $form{'suname'}; |
|
$sudom = $form{'udom'}; |
|
if ($form{'sudom'}) { |
|
unless ($sudom eq $form{'sudom'}) { |
|
if (&Apache::lonnet::domain($form{'sudom'})) { |
|
$sudomref = [$form{'sudom'}]; |
|
$sudom = $form{'sudom'}; |
|
} |
|
} |
|
} |
# ------------ see if the original user has enough privileges to pull this stunt |
# ------------ see if the original user has enough privileges to pull this stunt |
if (&Apache::lonnet::privileged($form{'uname'},$form{'udom'})) { |
if (&Apache::lonnet::privileged($form{'uname'},$form{'udom'},$sudomref)) { |
# ---------------------------------------------------- see if the su-user exists |
# ---------------------------------------------------- see if the su-user exists |
unless (&Apache::lonnet::homeserver($form{'suname'},$form{'udom'}) |
unless (&Apache::lonnet::homeserver($suname,$sudom) eq 'no_host') { |
eq 'no_host') { |
|
&Apache::lonnet::logthis(&Apache::lonnet::homeserver($form{'suname'},$form{'udom'})); |
|
# ------------------------------ see if the su-user is not too highly privileged |
# ------------------------------ see if the su-user is not too highly privileged |
unless (&Apache::lonnet::privileged($form{'suname'},$form{'udom'})) { |
if (&Apache::lonnet::privileged($suname,$sudom)) { |
|
&Apache::lonnet::logthis('Attempted switch user to privileged user'); |
|
} else { |
|
my $noprivswitch; |
|
# |
|
# su-user's home server and user's home server must have one of: |
|
# (a) same domain |
|
# (b) same primary library server for the two domains |
|
# (c) same "internet domain" for primary library server(s) for home servers' domains |
|
# |
|
my $suprim = &Apache::lonnet::domain($sudom,'primary'); |
|
my $suintdom = &Apache::lonnet::internet_dom($suprim); |
|
unless ($sudom eq $form{'udom'}) { |
|
my $uprim = &Apache::lonnet::domain($form{'udom'},'primary'); |
|
my $uintdom = &Apache::lonnet::internet_dom($uprim); |
|
unless ($suprim eq $uprim) { |
|
unless ($suintdom eq $uintdom) { |
|
&Apache::lonnet::logthis('Attempted switch user ' |
|
.'to user with different "internet domain".'); |
|
$noprivswitch = 1; |
|
} |
|
} |
|
} |
|
|
|
unless ($noprivswitch) { |
|
# |
|
# server where log-in occurs must have same "internet domain" as su-user's home |
|
# server |
|
# |
|
my $lonhost = $r->dir_config('lonHostID'); |
|
my $hostintdom = &Apache::lonnet::internet_dom($lonhost); |
|
if ($hostintdom ne $suintdom) { |
|
&Apache::lonnet::logthis('Attempted switch user on a ' |
|
.'server with a different "internet domain".'); |
|
} else { |
|
|
# -------------------------------------------------------- actually switch users |
# -------------------------------------------------------- actually switch users |
&Apache::lonnet::logperm('User '.$form{'uname'}.' at '.$form{'udom'}. |
|
' logging in as '.$form{'suname'}); |
&Apache::lonnet::logperm('User '.$form{'uname'}.' at '. |
$form{'uname'}=$form{'suname'}; |
$form{'udom'}.' logging in as '.$suname.':'.$sudom); |
} else { |
$form{'uname'}=$suname; |
&Apache::lonnet::logthis('Attempted switch user to privileged user'); |
if ($form{'udom'} ne $sudom) { |
|
$form{'udom'}=$sudom; |
|
} |
|
} |
|
} |
} |
} |
} |
} |
} else { |
} else { |
Line 474 sub handler {
|
Line 526 sub handler {
|
|
|
unless ($hosthere) { |
unless ($hosthere) { |
($is_balancer,$otherserver) = |
($is_balancer,$otherserver) = |
&Apache::lonnet::check_loadbalancing($form{'uname'},$form{'udom'}); |
&Apache::lonnet::check_loadbalancing($form{'uname'},$form{'udom'},'login'); |
|
if ($is_balancer) { |
|
if ($otherserver eq '') { |
|
my $lowest_load; |
|
($otherserver,undef,undef,undef,$lowest_load) = &Apache::lonnet::choose_server($form{'udom'}); |
|
if ($lowest_load > 100) { |
|
$otherserver = &Apache::lonnet::spareserver($lowest_load,$lowest_load,1,$form{'udom'}); |
|
} |
|
} |
|
if ($otherserver ne '') { |
|
my @hosts = &Apache::lonnet::current_machine_ids(); |
|
if (grep(/^\Q$otherserver\E$/,@hosts)) { |
|
$hosthere = $otherserver; |
|
} |
|
} |
|
} |
} |
} |
|
|
if ($is_balancer) { |
if (($is_balancer) && (!$hosthere)) { |
if (!$otherserver) { |
|
($otherserver) = &Apache::lonnet::choose_server($form{'udom'}); |
|
} |
|
if ($otherserver) { |
if ($otherserver) { |
&success($r,$form{'uname'},$form{'udom'},$authhost,'noredirect',undef, |
&success($r,$form{'uname'},$form{'udom'},$authhost,'noredirect',undef, |
\%form); |
\%form); |
Line 548 sub handler {
|
Line 612 sub handler {
|
return OK; |
return OK; |
} |
} |
} |
} |
|
if (($is_balancer) && ($hosthere)) { |
|
$form{'noloadbalance'} = $hosthere; |
|
} |
&success($r,$form{'uname'},$form{'udom'},$authhost,$firsturl,undef, |
&success($r,$form{'uname'},$form{'udom'},$authhost,$firsturl,undef, |
\%form); |
\%form); |
return OK; |
return OK; |