version 1.3, 1999/12/16 20:30:55
|
version 1.62, 2004/03/16 20:42:50
|
Line 1
|
Line 1
|
# The LearningOnline Network |
# The LearningOnline Network |
# User Authentication Module |
# User Authentication Module |
|
# |
|
# $Id$ |
|
# |
|
# Copyright Michigan State University Board of Trustees |
|
# |
|
# This file is part of the LearningOnline Network with CAPA (LON-CAPA). |
|
# |
|
# LON-CAPA is free software; you can redistribute it and/or modify |
|
# it under the terms of the GNU General Public License as published by |
|
# the Free Software Foundation; either version 2 of the License, or |
|
# (at your option) any later version. |
|
# |
|
# LON-CAPA is distributed in the hope that it will be useful, |
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
# GNU General Public License for more details. |
|
# |
|
# You should have received a copy of the GNU General Public License |
|
# along with LON-CAPA; if not, write to the Free Software |
|
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
|
# |
|
# /home/httpd/html/adm/gpl.txt |
|
# |
|
# http://www.lon-capa.org/ |
|
# |
# 5/21/99,5/22,5/25,5/26,5/27,5/29,6/2,6/11,6/14,6/15 |
# 5/21/99,5/22,5/25,5/26,5/27,5/29,6/2,6/11,6/14,6/15 |
# 16/11,12/16 Gerd Kortemeyer |
# 16/11,12/16, |
|
# 1/14,2/24,2/28,2/29,3/7,5/29,5/30,5/31,6/1,6/5,6/29, |
|
# 7/1,7/10,10/2,10/5,10/9,10/26,10/30,11/10, |
|
# 05/28,05/29 Gerd Kortemeyer |
|
# 07/28,08/03 Gerd Kortemeyer |
|
# 8/20 Gerd Kortemeyer |
|
|
package Apache::lonauth; |
package Apache::lonauth; |
|
|
|
use strict; |
use Apache::Constants qw(:common); |
use Apache::Constants qw(:common); |
use Apache::File; |
use Apache::File; |
use CGI qw(:standard); |
use CGI qw(:standard); |
use CGI::Cookie(); |
use CGI::Cookie(); |
|
use DynaLoader; # for Crypt::DES version |
|
use Crypt::DES; |
|
use Apache::loncommon(); |
use Apache::lonnet(); |
use Apache::lonnet(); |
|
use Apache::lonmenu(); |
|
use Fcntl qw(:flock); |
|
use Apache::lonlocal; |
|
|
|
my %FORM; |
|
|
# ------------------------------------------------------------ Successful login |
# ------------------------------------------------------------ Successful login |
|
|
sub success { |
sub success { |
my ($r, $lowerurl, $username, $domain, $authhost) = @_; |
my ($r, $username, $domain, $authhost,$lowerurl) = @_; |
my $lonids=$r->dir_config('lonIDsDir'); |
my $lonids=$r->dir_config('lonIDsDir'); |
# See if old ID present, but overlooked |
|
|
# See if old ID present, if so, remove |
|
|
|
my $filename; |
|
opendir(DIR,$lonids); |
|
while ($filename=readdir(DIR)) { |
|
if ($filename=~/^$username\_\d+\_$domain\_$authhost\.id$/) { |
|
unlink($lonids.'/'.$filename); |
|
} |
|
} |
|
closedir(DIR); |
|
|
|
# Give them a new cookie |
|
|
my $cookie; |
my $cookie; |
if ($cookie=<$lonids/$username\_*\_$domain\_$authhost.id>) { |
my $now=time; |
$cookie=~s/\.id//; |
$cookie="$username\_$now\_$domain\_$authhost"; |
$cookie=~s/$lonids\///; |
|
} else { |
# Initialize roles |
my $now=time; |
|
$cookie="$username\_$now\_$domain\_$authhost"; |
my $userroles=Apache::lonnet::rolesinit($domain,$username,$authhost); |
my $userroles=Apache::lonnet::reply( |
|
"dump:$domain:$username:roles", |
# ------------------------------------ Check browser type and MathML capability |
$authhost); |
|
$userroles=~s/&/\n/g; |
my ($httpbrowser,$clientbrowser,$clientversion,$clientmathml, |
{ |
$clientunicode,$clientos) = &Apache::loncommon::decode_user_agent($r); |
my $idf=Apache::File->new(">$lonids/$cookie.id"); |
|
print $idf "username=$username\n"; |
# -------------------------------------- Any accessibility options to remember? |
print $idf "userdomain=$domain\n"; |
if (($FORM{'interface'}) && ($FORM{'remember'} eq 'true')) { |
print $idf "userhome=$authhost\n"; |
foreach ('imagesuppress','appletsuppress', |
print $idf "$userroles\n"; |
'embedsuppress','fontenhance','blackwhite') { |
|
if ($FORM{$_} eq 'true') { |
|
&Apache::lonnet::put('environment',{$_ => 'on'}, |
|
$domain,$username); |
|
} else { |
|
&Apache::lonnet::del('environment',[$_],$domain,$username); |
|
} |
|
} |
|
} |
|
# ------------------------------------------------------------- Get environment |
|
|
|
my $userenv; |
|
my %userenv=Apache::lonnet::dump('environment',$domain,$username); |
|
my ($tmp) = keys(%userenv); |
|
if ($tmp !~ /^(con_lost|error|no_such_host)/i) { |
|
foreach my $key (keys(%userenv)) { |
|
$userenv.="environment.$key=$userenv{$key}\n"; |
|
} |
|
} |
|
if (($userenv{'interface'}) && (!$FORM{'interface'})) { |
|
$FORM{'interface'}=$userenv{'interface'}; |
|
} |
|
$ENV{'environment.remote'}=$userenv{'remote'}; |
|
# --------------- Do not trust query string to be put directly into environment |
|
foreach ('imagesuppress','appletsuppress', |
|
'embedsuppress','fontenhance','blackwhite', |
|
'interface','localpath','localres') { |
|
$FORM{$_}=~s/[\n\r\=]//gs; |
|
} |
|
# --------------------------------------------------------- Write first profile |
|
|
|
{ |
|
my $idf=Apache::File->new(">$lonids/$cookie.id"); |
|
unless (flock($idf,LOCK_EX)) { |
|
&Apache::lonnet::logthis("<font color=blue>WARNING: ". |
|
'Could not obtain exclusive lock in lonauth: '.$!); |
|
$idf->close(); |
|
return 'error: '.$!; |
|
} |
|
if ($userenv ne '') { print $idf "$userenv\n"; } |
|
print $idf "user.name=$username\n"; |
|
print $idf "user.domain=$domain\n"; |
|
print $idf "user.home=$authhost\n"; |
|
print $idf "browser.type=$clientbrowser\n"; |
|
print $idf "browser.version=$clientversion\n"; |
|
print $idf "browser.mathml=$clientmathml\n"; |
|
print $idf "browser.unicode=$clientunicode\n"; |
|
print $idf "browser.os=$clientos\n"; |
|
if ($FORM{'localpath'}) { |
|
print $idf "browser.localpath=$FORM{'localpath'}\n"; |
|
print $idf "browser.localres=$FORM{'localres'}\n"; |
|
} |
|
print $idf "request.course.fn=\n"; |
|
print $idf "request.course.uri=\n"; |
|
print $idf "request.course.sec=\n"; |
|
print $idf "request.role=cm\n"; |
|
print $idf "request.role.adv=$ENV{'user.adv'}\n"; |
|
print $idf "request.host=$ENV{'REMOTE_ADDR'}\n"; |
|
if ($FORM{'interface'}) { |
|
$FORM{'interface'}=~s/\W//gs; |
|
print $idf "browser.interface=$FORM{'interface'}\n"; |
|
$ENV{'browser.interface'}=$FORM{'interface'}; |
|
foreach ('imagesuppress','appletsuppress', |
|
'embedsuppress','fontenhance','blackwhite') { |
|
if (($FORM{$_} eq 'true') || |
|
($userenv{$_} eq 'on')) { |
|
print $idf "browser.$_=on\n"; |
|
} |
|
} |
|
} |
|
if ($userroles ne '') { print $idf "$userroles"; } |
|
$idf->close(); |
|
} |
|
$ENV{'request.role'}='cm'; |
|
$ENV{'request.role.adv'}=$ENV{'user.adv'}; |
|
$ENV{'browser.type'}=$clientbrowser; |
|
# -------------------------------------------------------------------- Log this |
|
|
|
&Apache::lonnet::log($domain,$username,$authhost, |
|
"Login $ENV{'REMOTE_ADDR'}"); |
|
|
|
# ------------------------------------------------- Check for critical messages |
|
|
|
my @what=&Apache::lonnet::dump('critical',$domain,$username); |
|
if ($what[0]) { |
|
if (($what[0] ne 'con_lost') && ($what[0]!~/^error\:/)) { |
|
$lowerurl='/adm/email?critical=display'; |
} |
} |
} |
} |
|
|
|
# ------------------------------------------------------------ Get cookie ready |
|
|
$cookie="lonID=$cookie; path=/"; |
$cookie="lonID=$cookie; path=/"; |
|
# -------------------------------------------------------- Menu script and info |
|
my $windowinfo=&Apache::lonmenu::open($clientos); |
|
my $startupremote=&Apache::lonmenu::startupremote($lowerurl); |
|
my $setflags=&Apache::lonmenu::setflags(); |
|
my $maincall=&Apache::lonmenu::maincall(); |
|
my $bodytag=&Apache::loncommon::bodytag('Successful Login'); |
|
my $add=&addcontent(); |
|
# ------------------------------------------------- Output for successful login |
|
|
$r->send_cgi_header(<<ENDHEADER); |
$r->send_cgi_header(<<ENDHEADER); |
Content-type: text/html |
Content-type: text/html$add |
Set-cookie: $cookie |
Set-cookie: $cookie |
|
|
ENDHEADER |
ENDHEADER |
|
my %lt=&Apache::lonlocal::texthash( |
|
'wel' => 'Welcome', |
|
'mes' => 'Welcome to the Learning<i>Online</i> Network with CAPA. Please wait while your session is being set up', |
|
'pro' => 'Problems', |
|
'log' => 'loginproblems.html', |
|
); |
$r->print(<<ENDSUCCESS); |
$r->print(<<ENDSUCCESS); |
<html> |
<html> |
<head> |
<head> |
<title>Successful Login to the LearningOnline Network</title> |
<title>Successful Login to the LearningOnline Network with CAPA</title> |
|
$startupremote |
</head> |
</head> |
<frameset rows="80,*" border=0> |
$bodytag |
<frame scrolling="no" name="loncontrol" src="/adm/menu"> |
$setflags |
<frame name="loncontent" src="$lowerurl"> |
$windowinfo |
</frameset> |
<h1>$lt{'wel'}</h1> |
|
$lt{'mes'}.<p> |
|
<a href="/adm/$lt{'log'}">$lt{'pro'}?</a></p> |
|
$maincall |
|
</body> |
</html> |
</html> |
ENDSUCCESS |
ENDSUCCESS |
} |
} |
Line 59 ENDSUCCESS
|
Line 220 ENDSUCCESS
|
|
|
sub failed { |
sub failed { |
my ($r,$message) = @_; |
my ($r,$message) = @_; |
|
my $bodytag=&Apache::loncommon::bodytag('Unsuccessful Login'); |
|
my $add=&addcontent(); |
$r->send_cgi_header(<<ENDFHEADER); |
$r->send_cgi_header(<<ENDFHEADER); |
Content-type: text/html |
Content-type: text/html$add |
|
|
ENDFHEADER |
ENDFHEADER |
$r->print(<<ENDFAILED); |
$r->print(<<ENDFAILED); |
<html> |
<html> |
<head> |
<head> |
<title>Unsuccessful Login to the LearningOnline Network</title> |
<title>Unsuccessful Login to the LearningOnline Network with CAPA</title> |
</head> |
</head> |
<html> |
$bodytag |
<body bgcolor="#FFFFFF"> |
|
<h1>Sorry ...</h1> |
<h1>Sorry ...</h1> |
<h2>$message to use the Learning<i>Online</i> Network</h2> |
<p><b>$message</b></p> |
|
<p>Please <a href="/adm/login?username=$FORM{'uname'}&domain=$FORM{'udom'}">log in again</a>.</p> |
|
<p> |
|
<a href="/adm/loginproblems.html">Problems?</a></p> |
</body> |
</body> |
</html> |
</html> |
ENDFAILED |
ENDFAILED |
} |
} |
|
|
|
# --------------------------------------------------------------------- Charset |
|
|
|
sub addcontent { |
|
my $encoding=&Apache::lonlocal::current_encoding; |
|
if ($encoding) { |
|
return '; charset='.$encoding; |
|
} else { |
|
return ''; |
|
} |
|
} |
|
|
|
# ------------------------------------------------------------------ Rerouting! |
|
|
|
sub reroute { |
|
my $r=shift; |
|
my $bodytag=&Apache::loncommon::bodytag('Rerouting'); |
|
$r->send_cgi_header(<<ENDRFHEADER); |
|
Content-type: text/html |
|
|
|
ENDRFHEADER |
|
$r->print(<<ENDRFAILED); |
|
<html> |
|
<head> |
|
<title>Rerouting Login to the LearningOnline Network with CAPA</title> |
|
</head> |
|
$bodytag |
|
<h1>Sorry ...</h1> |
|
Please <a href="/">log in again</a>. |
|
</body> |
|
</html> |
|
ENDRFAILED |
|
} |
|
|
# ---------------------------------------------------------------- Main handler |
# ---------------------------------------------------------------- Main handler |
|
|
sub handler { |
sub handler { |
my $r = shift; |
my $r = shift; |
|
|
|
# Are we re-routing? |
|
if (-e '/home/httpd/html/lon-status/reroute.txt') { |
|
&reroute($r); |
|
return OK; |
|
} |
|
|
|
&Apache::lonlocal::get_language_handle($r); |
|
|
|
# -------------------------------- Prevent users from attempting to login twice |
|
my %cookies=CGI::Cookie->parse($r->header_in('Cookie')); |
|
my $lonid=$cookies{'lonID'}; |
|
my $cookie; |
|
if ($lonid) { |
|
my $handle=$lonid->value; |
|
$handle=~s/\W//g; |
|
my $lonidsdir=$r->dir_config('lonIDsDir'); |
|
if ((-e "$lonidsdir/$handle.id") && ($handle ne '')) { |
|
# Indeed, a valid token is found |
|
$r->send_cgi_header(<<ENDFHEADER); |
|
Content-type: text/html |
|
|
|
ENDFHEADER |
|
my $bodytag=&Apache::loncommon::bodytag('Already logged in'); |
|
$r->print(<<ENDFAILED); |
|
<html> |
|
<head> |
|
<title>Already logged in</title> |
|
</head> |
|
$bodytag |
|
<h1>You are already logged in</h1> |
|
<p>Please either <a href="/adm/roles">continue the current session</a> or |
|
<a href="/adm/logout">logout</a>.</p> |
|
<p> |
|
<a href="/adm/loginproblems.html">Problems?</a></p> |
|
</body> |
|
</html> |
|
ENDFAILED |
|
return OK; |
|
} |
|
} |
|
|
|
# ---------------------------------------------------- No valid token, continue |
|
|
|
|
my $buffer; |
my $buffer; |
$r->read($buffer,$r->header_in('Content-length')); |
$r->read($buffer,$r->header_in('Content-length'),0); |
my @pairs=split(/&/,$buffer); |
my @pairs=split(/&/,$buffer); |
my $pair; my $name; my $value; my %FORM; |
my $pair; my $name; my $value; |
|
undef %FORM; |
|
%FORM=(); |
foreach $pair (@pairs) { |
foreach $pair (@pairs) { |
($name,$value) = split(/=/,$pair); |
($name,$value) = split(/=/,$pair); |
|
$value =~ tr/+/ /; |
|
$value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg; |
$FORM{$name}=$value; |
$FORM{$name}=$value; |
} |
} |
|
|
if ((!$FORM{'uname'}) || (!$FORM{'upass'}) || (!$FORM{'udom'})) { |
if ((!$FORM{'uname'}) || (!$FORM{'upass'}) || (!$FORM{'udom'})) { |
failed($r,'Username, password and domain need to be specified'); |
failed($r,'Username, password and domain need to be specified.'); |
return OK; |
return OK; |
} |
} |
|
|
|
# split user logging in and "su"-user |
|
|
|
($FORM{'uname'},$FORM{'suname'})=split(/\:/,$FORM{'uname'}); |
$FORM{'uname'} =~ s/\W//g; |
$FORM{'uname'} =~ s/\W//g; |
$FORM{'upass'} =~ s/\W//g; |
$FORM{'suname'} =~ s/\W//g; |
$FORM{'udom'} =~ s/\W//g; |
$FORM{'udom'} =~ s/\W//g; |
|
|
my $role = $r->dir_config('lonRole'); |
my $role = $r->dir_config('lonRole'); |
my $domain = $r->dir_config('lonDefDomain'); |
my $domain = $r->dir_config('lonDefDomain'); |
my $prodir = $r->dir_config('lonUsersDir'); |
my $prodir = $r->dir_config('lonUsersDir'); |
|
|
|
# ---------------------------------------- Get the information from login token |
|
|
|
my $tmpinfo=Apache::lonnet::reply('tmpget:'.$FORM{'logtoken'}, |
|
$FORM{'serverid'}); |
|
|
|
if (($tmpinfo=~/^error/) || ($tmpinfo eq 'con_lost')) { |
|
failed($r,'Information needed to verify your login information is missing, inaccessible or expired.'); |
|
return OK; |
|
} else { |
|
unless (&Apache::lonnet::reply('tmpdel:'.$FORM{'logtoken'}, |
|
$FORM{'serverid'}) eq 'ok') { |
|
&failed($r,'Session could not be opened.'); |
|
} |
|
} |
|
my ($key,$firsturl)=split(/&/,$tmpinfo); |
|
|
|
my $keybin=pack("H16",$key); |
|
|
|
my $cipher; |
|
if ($Crypt::DES::VERSION>=2.03) { |
|
$cipher=new Crypt::DES $keybin; |
|
} |
|
else { |
|
$cipher=new DES $keybin; |
|
} |
|
|
|
my $upass=$cipher->decrypt( |
|
unpack("a8",pack("H16",substr($FORM{'upass'},0,16)))); |
|
|
|
$upass.=$cipher->decrypt( |
|
unpack("a8",pack("H16",substr($FORM{'upass'},16,16)))); |
|
|
|
$upass=substr($upass,1,ord(substr($upass,0,1))); |
|
|
# ---------------------------------------------------------------- Authenticate |
# ---------------------------------------------------------------- Authenticate |
my $authhost=Apache::lonnet::authenticate($FORM{'uname'}, |
my $authhost=Apache::lonnet::authenticate($FORM{'uname'}, |
$FORM{'upass'}, |
$upass, |
$FORM{'udom'}); |
$FORM{'udom'}); |
|
|
# --------------------------------------------------------------------- Failed? |
# --------------------------------------------------------------------- Failed? |
|
|
if ($authhost eq 'no_host') { |
if ($authhost eq 'no_host') { |
failed($r,'Username and/or password could not be authenticated'); |
failed($r,'Username and/or password could not be authenticated.'); |
return OK; |
return OK; |
} |
} |
|
|
my %cookies=CGI::Cookie->parse($r->header_in('Cookie')); |
if (($firsturl eq '') || |
my $lonurl=$cookies{'lonURL'}; |
($firsturl=~/^\/adm\/(logout|remote)/)) { |
if (!$lonurl) { failed($r,'Cookies need to be activated'); return OK; } |
$firsturl='/adm/roles'; |
my $lowerurl=$lonurl->value; |
} |
|
# --------------------------------- Are we attempting to login as somebody else? |
success($r,$lowerurl,$FORM{'uname'},$FORM{'udom'},$authhost); |
if ($FORM{'suname'}) { |
|
# ------------ see if the original user has enough privileges to pull this stunt |
|
if (&Apache::lonnet::privileged($FORM{'uname'},$FORM{'udom'})) { |
|
# ---------------------------------------------------- see if the su-user exists |
|
unless (&Apache::lonnet::homeserver($FORM{'suname'},$FORM{'udom'}) |
|
eq 'no_host') { |
|
&Apache::lonnet::logthis(&Apache::lonnet::homeserver($FORM{'suname'},$FORM{'udom'})); |
|
# ------------------------------ see if the su-user is not too highly privileged |
|
unless (&Apache::lonnet::privileged($FORM{'suname'},$FORM{'udom'})) { |
|
# -------------------------------------------------------- actually switch users |
|
&Apache::lonnet::logperm('User '.$FORM{'uname'}.' at '.$FORM{'udom'}. |
|
' logging in as '.$FORM{'suname'}); |
|
$FORM{'uname'}=$FORM{'suname'}; |
|
} else { |
|
&Apache::lonnet::logthis('Attempted switch user to privileged user'); |
|
} |
|
} |
|
} else { |
|
&Apache::lonnet::logthis('Non-privileged user attempting switch user'); |
|
} |
|
} |
|
&success($r,$FORM{'uname'},$FORM{'udom'},$authhost,$firsturl); |
return OK; |
return OK; |
} |
} |
|
|
1; |
1; |
__END__ |
__END__ |
|
|
|
|