version 1.75, 2006/04/20 04:30:02
|
version 1.89, 2007/10/01 23:56:14
|
Line 29
|
Line 29
|
package Apache::lonauth; |
package Apache::lonauth; |
|
|
use strict; |
use strict; |
|
use LONCAPA; |
use Apache::Constants qw(:common); |
use Apache::Constants qw(:common); |
use Apache::File; |
|
use CGI qw(:standard); |
use CGI qw(:standard); |
use CGI::Cookie(); |
|
use DynaLoader; # for Crypt::DES version |
use DynaLoader; # for Crypt::DES version |
use Crypt::DES; |
use Crypt::DES; |
use Apache::loncommon(); |
use Apache::loncommon(); |
Line 40 use Apache::lonnet;
|
Line 39 use Apache::lonnet;
|
use Apache::lonmenu(); |
use Apache::lonmenu(); |
use Fcntl qw(:flock); |
use Fcntl qw(:flock); |
use Apache::lonlocal; |
use Apache::lonlocal; |
|
|
my %FORM; |
|
|
|
# ------------------------------------------------------------ Successful login |
# ------------------------------------------------------------ Successful login |
|
|
sub success { |
sub success { |
my ($r, $username, $domain, $authhost,$lowerurl) = @_; |
my ($r, $username, $domain, $authhost, $lowerurl, $extra_env, |
my $lonids=$r->dir_config('lonIDsDir'); |
$form) = @_; |
|
|
my $public=($username eq 'public' && $domain eq 'public'); |
|
|
|
# See if old ID present, if so, remove |
|
|
|
my ($filename,$cookie,$userroles); |
|
my $now=time; |
|
|
|
if ($public) { |
|
my $max_public=100; |
|
my $oldest; |
|
my $oldest_time=0; |
|
for(my $next=1;$next<=$max_public;$next++) { |
|
if (-e $lonids."/publicuser_$next.id") { |
|
my $mtime=(stat($lonids."/publicuser_$next.id"))[9]; |
|
if ($mtime<$oldest_time || !$oldest_time) { |
|
$oldest_time=$mtime; |
|
$oldest=$next; |
|
} |
|
} else { |
|
$cookie="publicuser_$next"; |
|
last; |
|
} |
|
} |
|
if (!$cookie) { $cookie="publicuser_$oldest"; } |
|
} else { |
|
opendir(DIR,$lonids); |
|
while ($filename=readdir(DIR)) { |
|
if ($filename=~/^$username\_\d+\_$domain\_$authhost\.id$/) { |
|
unlink($lonids.'/'.$filename); |
|
} |
|
} |
|
closedir(DIR); |
|
|
|
# Give them a new cookie |
|
|
|
$cookie="$username\_$now\_$domain\_$authhost"; |
|
|
|
# Initialize roles |
|
|
|
$userroles=Apache::lonnet::rolesinit($domain,$username,$authhost); |
# ------------------------------------------------------------ Get cookie ready |
} |
my $cookie = |
# ------------------------------------ Check browser type and MathML capability |
&Apache::loncommon::init_user_environment($r, $username, $domain, |
|
$authhost, $form, |
my ($httpbrowser,$clientbrowser,$clientversion,$clientmathml, |
{'extra_env' => $extra_env,}); |
$clientunicode,$clientos) = &Apache::loncommon::decode_user_agent($r); |
|
|
|
# -------------------------------------- Any accessibility options to remember? |
my $public=($username eq 'public' && $domain eq 'public'); |
if (($FORM{'interface'}) && ($FORM{'remember'} eq 'true')) { |
|
foreach ('imagesuppress','appletsuppress', |
|
'embedsuppress','fontenhance','blackwhite') { |
|
if ($FORM{$_} eq 'true') { |
|
&Apache::lonnet::put('environment',{$_ => 'on'}, |
|
$domain,$username); |
|
} else { |
|
&Apache::lonnet::del('environment',[$_],$domain,$username); |
|
} |
|
} |
|
} |
|
# ------------------------------------------------------------- Get environment |
|
|
|
my $userenv; |
if ($public or $lowerurl eq 'noredirect') { return $cookie; } |
my %userenv=Apache::lonnet::dump('environment',$domain,$username); |
|
my ($tmp) = keys(%userenv); |
|
if ($tmp !~ /^(con_lost|error|no_such_host)/i) { |
|
# default remote control to off |
|
if ($userenv{'remote'} ne 'on') { $userenv{'remote'} = 'off'; } |
|
foreach my $key (keys(%userenv)) { |
|
$userenv.="environment.$key=$userenv{$key}\n"; |
|
} |
|
} |
|
if (($userenv{'interface'}) && (!$FORM{'interface'})) { |
|
$FORM{'interface'}=$userenv{'interface'}; |
|
} |
|
$env{'environment.remote'}=$userenv{'remote'}; |
|
if ($userenv{'texengine'} eq 'ttm') { $clientmathml=1; } |
|
|
|
# --------------- Do not trust query string to be put directly into environment |
|
foreach ('imagesuppress','appletsuppress', |
|
'embedsuppress','fontenhance','blackwhite', |
|
'interface','localpath','localres') { |
|
$FORM{$_}=~s/[\n\r\=]//gs; |
|
} |
|
# --------------------------------------------------------- Write first profile |
|
|
|
{ |
|
my $idf=Apache::File->new(">$lonids/$cookie.id"); |
|
unless (flock($idf,LOCK_EX)) { |
|
&Apache::lonnet::logthis("<font color=blue>WARNING: ". |
|
'Could not obtain exclusive lock in lonauth: '.$!); |
|
$idf->close(); |
|
return 'error: '.$!; |
|
} |
|
if ($userenv ne '') { print $idf "$userenv\n"; } |
|
print $idf "user.name=$username\n"; |
|
print $idf "user.domain=$domain\n"; |
|
print $idf "user.home=$authhost\n"; |
|
print $idf "browser.type=$clientbrowser\n"; |
|
print $idf "browser.version=$clientversion\n"; |
|
print $idf "browser.mathml=$clientmathml\n"; |
|
print $idf "browser.unicode=$clientunicode\n"; |
|
print $idf "browser.os=$clientos\n"; |
|
if ($FORM{'localpath'}) { |
|
print $idf "browser.localpath=$FORM{'localpath'}\n"; |
|
print $idf "browser.localres=$FORM{'localres'}\n"; |
|
} |
|
print $idf "server.domain=".$r->dir_config('lonDefDomain')."\n"; |
|
print $idf "request.course.fn=\n"; |
|
print $idf "request.course.uri=\n"; |
|
print $idf "request.course.sec=\n"; |
|
print $idf "request.role=cm\n"; |
|
print $idf "request.role.adv=$env{'user.adv'}\n"; |
|
print $idf "request.host=$ENV{'REMOTE_ADDR'}\n"; |
|
if ($public) { |
|
print $idf "environment.remote=off\n"; |
|
} |
|
if ($FORM{'interface'}) { |
|
$FORM{'interface'}=~s/\W//gs; |
|
print $idf "browser.interface=$FORM{'interface'}\n"; |
|
$env{'browser.interface'}=$FORM{'interface'}; |
|
foreach ('imagesuppress','appletsuppress', |
|
'embedsuppress','fontenhance','blackwhite') { |
|
if (($FORM{$_} eq 'true') || |
|
($userenv{$_} eq 'on')) { |
|
print $idf "browser.$_=on\n"; |
|
} |
|
} |
|
} |
|
if ($userroles ne '') { print $idf "$userroles"; } |
|
$idf->close(); |
|
} |
|
$env{'request.role'}='cm'; |
|
$env{'request.role.adv'}=$env{'user.adv'}; |
|
$env{'browser.type'}=$clientbrowser; |
|
# -------------------------------------------------------------------- Log this |
# -------------------------------------------------------------------- Log this |
|
|
&Apache::lonnet::log($domain,$username,$authhost, |
&Apache::lonnet::log($domain,$username,$authhost, |
Line 197 sub success {
|
Line 70 sub success {
|
} |
} |
|
|
# ------------------------------------------------------------ Get cookie ready |
# ------------------------------------------------------------ Get cookie ready |
|
|
if ($public or $lowerurl eq 'noredirect') { return $cookie; } |
|
|
|
$cookie="lonID=$cookie; path=/"; |
$cookie="lonID=$cookie; path=/"; |
# -------------------------------------------------------- Menu script and info |
# -------------------------------------------------------- Menu script and info |
my $windowinfo=&Apache::lonmenu::open($clientos); |
my $windowinfo=&Apache::lonmenu::open($env{'browser.os'}); |
my $startupremote=&Apache::lonmenu::startupremote($lowerurl); |
my $startupremote=&Apache::lonmenu::startupremote($lowerurl); |
my $remoteinfo=&Apache::lonmenu::load_remote_msg($lowerurl); |
my $remoteinfo=&Apache::lonmenu::load_remote_msg($lowerurl); |
my $setflags=&Apache::lonmenu::setflags(); |
my $setflags=&Apache::lonmenu::setflags(); |
my $maincall=&Apache::lonmenu::maincall(); |
my $maincall=&Apache::lonmenu::maincall(); |
my $start_page=&Apache::loncommon::start_page('Successful Login', |
my $start_page=&Apache::loncommon::start_page('Successful Login', |
$startupremote); |
$startupremote, |
|
{'no_inline_link' => 1,}); |
my $end_page =&Apache::loncommon::end_page(); |
my $end_page =&Apache::loncommon::end_page(); |
|
|
my $continuelink; |
my $continuelink; |
Line 245 ENDSUCCESS
|
Line 116 ENDSUCCESS
|
# --------------------------------------------------------------- Failed login! |
# --------------------------------------------------------------- Failed login! |
|
|
sub failed { |
sub failed { |
my ($r,$message) = @_; |
my ($r,$message,$form) = @_; |
my $start_page = &Apache::loncommon::start_page('Unsuccessful Login'); |
my $start_page = &Apache::loncommon::start_page('Unsuccessful Login',undef, |
|
{'no_inline_link' => 1,}); |
my $end_page = &Apache::loncommon::end_page(); |
my $end_page = &Apache::loncommon::end_page(); |
|
|
|
$message = &mt($message); |
my %lt=('sorry' => &mt('Sorry ...'), |
my %lt=('sorry' => &mt('Sorry ...'), |
'please' => |
'please' => |
&mt('Please [_1]log in again[_2].', |
&mt('Please [_1]log in again[_2].', |
"<a href=\"/adm/login?username=$FORM{'uname'}&domain=$FORM{'udom'}\">", |
"<a href=\"/adm/login?username=$form->{'uname'}&domain=$form->{'udom'}\">", |
'</a>'), |
'</a>'), |
'problemspage' => &mt('loginproblems.html'), |
'problemspage' => &mt('loginproblems.html'), |
'problems' => 'Problems', |
'problems' => 'Problems', |
Line 286 sub reroute {
|
Line 159 sub reroute {
|
|
|
sub handler { |
sub handler { |
my $r = shift; |
my $r = shift; |
|
my $form; |
# Are we re-routing? |
# Are we re-routing? |
if (-e '/home/httpd/html/lon-status/reroute.txt') { |
if (-e '/home/httpd/html/lon-status/reroute.txt') { |
&reroute($r); |
&reroute($r); |
Line 296 sub handler {
|
Line 169 sub handler {
|
&Apache::lonlocal::get_language_handle($r); |
&Apache::lonlocal::get_language_handle($r); |
|
|
# -------------------------------- Prevent users from attempting to login twice |
# -------------------------------- Prevent users from attempting to login twice |
my %cookies=CGI::Cookie->parse($r->header_in('Cookie')); |
my $handle = &Apache::lonnet::check_for_valid_session($r); |
my $lonid=$cookies{'lonID'}; |
if ($handle ne '') { |
my $cookie; |
|
if ($lonid) { |
|
my $handle=$lonid->value; |
|
$handle=~s/\W//g; |
|
my $lonidsdir=$r->dir_config('lonIDsDir'); |
|
if ((-e "$lonidsdir/$handle.id") && ($handle ne '')) { |
|
# Indeed, a valid token is found |
# Indeed, a valid token is found |
&Apache::loncommon::content_type($r,'text/html'); |
&Apache::loncommon::content_type($r,'text/html'); |
$r->send_http_header; |
$r->send_http_header; |
my $start_page = |
my $start_page = |
&Apache::loncommon::start_page('Already logged in'); |
&Apache::loncommon::start_page('Already logged in'); |
my $end_page = |
my $end_page = |
&Apache::loncommon::end_page(); |
&Apache::loncommon::end_page(); |
$r->print(<<ENDFAILED); |
$r->print(<<ENDFAILED); |
$start_page |
$start_page |
<h1>You are already logged in</h1> |
<h1>You are already logged in</h1> |
<p>Please either <a href="/adm/roles">continue the current session</a> or |
<p>Please either <a href="/adm/roles">continue the current session</a> or |
Line 320 $start_page
|
Line 187 $start_page
|
<a href="/adm/loginproblems.html">Problems?</a></p> |
<a href="/adm/loginproblems.html">Problems?</a></p> |
$end_page |
$end_page |
ENDFAILED |
ENDFAILED |
return OK; |
return OK; |
} |
|
} |
} |
|
|
# ---------------------------------------------------- No valid token, continue |
# ---------------------------------------------------- No valid token, continue |
|
|
|
|
my $buffer; |
my $buffer; |
$r->read($buffer,$r->header_in('Content-length'),0); |
if ($r->header_in('Content-length') > 0) { |
my @pairs=split(/&/,$buffer); |
$r->read($buffer,$r->header_in('Content-length'),0); |
my $pair; my $name; my $value; |
} |
undef %FORM; |
my %form; |
%FORM=(); |
foreach my $pair (split(/&/,$buffer)) { |
foreach $pair (@pairs) { |
my ($name,$value) = split(/=/,$pair); |
($name,$value) = split(/=/,$pair); |
|
$value =~ tr/+/ /; |
$value =~ tr/+/ /; |
$value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg; |
$value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg; |
$FORM{$name}=$value; |
$form{$name}=$value; |
} |
} |
|
|
if ((!$FORM{'uname'}) || (!$FORM{'upass0'}) || (!$FORM{'udom'})) { |
if ((!$form{'uname'}) || (!$form{'upass0'}) || (!$form{'udom'})) { |
failed($r,'Username, password and domain need to be specified.'); |
&failed($r,'Username, password and domain need to be specified.', |
|
\%form); |
return OK; |
return OK; |
} |
} |
|
|
# split user logging in and "su"-user |
# split user logging in and "su"-user |
|
|
($FORM{'uname'},$FORM{'suname'})=split(/\:/,$FORM{'uname'}); |
($form{'uname'},$form{'suname'})=split(/\:/,$form{'uname'}); |
$FORM{'uname'} =~ s/\W//g; |
$form{'uname'} = &LONCAPA::clean_username($form{'uname'}); |
$FORM{'suname'} =~ s/\W//g; |
$form{'suname'}= &LONCAPA::clean_username($form{'suname'}); |
$FORM{'udom'} =~ s/\W//g; |
$form{'udom'} = &LONCAPA::clean_domain( $form{'udom'}); |
|
|
my $role = $r->dir_config('lonRole'); |
my $role = $r->dir_config('lonRole'); |
my $domain = $r->dir_config('lonDefDomain'); |
my $domain = $r->dir_config('lonDefDomain'); |
Line 358 ENDFAILED
|
Line 224 ENDFAILED
|
|
|
# ---------------------------------------- Get the information from login token |
# ---------------------------------------- Get the information from login token |
|
|
my $tmpinfo=Apache::lonnet::reply('tmpget:'.$FORM{'logtoken'}, |
my $tmpinfo=Apache::lonnet::reply('tmpget:'.$form{'logtoken'}, |
$FORM{'serverid'}); |
$form{'serverid'}); |
|
|
if (($tmpinfo=~/^error/) || ($tmpinfo eq 'con_lost')) { |
if (($tmpinfo=~/^error/) || ($tmpinfo eq 'con_lost')) { |
failed($r,'Information needed to verify your login information is missing, inaccessible or expired.'); |
&failed($r,'Information needed to verify your login information is missing, inaccessible or expired.',\%form); |
return OK; |
return OK; |
} else { |
} else { |
unless (&Apache::lonnet::reply('tmpdel:'.$FORM{'logtoken'}, |
my $reply = &Apache::lonnet::reply('tmpdel:'.$form{'logtoken'}, |
$FORM{'serverid'}) eq 'ok') { |
$form{'serverid'}); |
&failed($r,'Session could not be opened.'); |
if ( $reply ne 'ok' ) { |
|
&failed($r,'Session could not be opened.',\%form); |
|
&Apache::lonnet::logthis("ERROR got a reply of $reply when trying to contact ". $form{'serverid'}." to get login token"); |
|
return OK; |
} |
} |
} |
} |
my ($key,$firsturl)=split(/&/,$tmpinfo); |
my ($key,$firsturl)=split(/&/,$tmpinfo); |
Line 384 ENDFAILED
|
Line 253 ENDFAILED
|
my $upass=''; |
my $upass=''; |
for (my $i=0;$i<=2;$i++) { |
for (my $i=0;$i<=2;$i++) { |
my $chunk= |
my $chunk= |
$cipher->decrypt(unpack("a8",pack("H16",substr($FORM{'upass'.$i},0,16)))); |
$cipher->decrypt(unpack("a8",pack("H16",substr($form{'upass'.$i},0,16)))); |
|
|
$chunk.= |
$chunk.= |
$cipher->decrypt(unpack("a8",pack("H16",substr($FORM{'upass'.$i},16,16)))); |
$cipher->decrypt(unpack("a8",pack("H16",substr($form{'upass'.$i},16,16)))); |
|
|
$chunk=substr($chunk,1,ord(substr($chunk,0,1))); |
$chunk=substr($chunk,1,ord(substr($chunk,0,1))); |
$upass.=$chunk; |
$upass.=$chunk; |
} |
} |
|
|
# ---------------------------------------------------------------- Authenticate |
# ---------------------------------------------------------------- Authenticate |
my $authhost=Apache::lonnet::authenticate($FORM{'uname'}, |
my $authhost=Apache::lonnet::authenticate($form{'uname'}, |
$upass, |
$upass, |
$FORM{'udom'}); |
$form{'udom'}); |
|
|
# --------------------------------------------------------------------- Failed? |
# --------------------------------------------------------------------- Failed? |
|
|
if ($authhost eq 'no_host') { |
if ($authhost eq 'no_host') { |
failed($r,'Username and/or password could not be authenticated.'); |
&failed($r,'Username and/or password could not be authenticated.', |
|
\%form); |
return OK; |
return OK; |
} |
} |
|
|
Line 410 ENDFAILED
|
Line 280 ENDFAILED
|
$firsturl='/adm/roles'; |
$firsturl='/adm/roles'; |
} |
} |
# --------------------------------- Are we attempting to login as somebody else? |
# --------------------------------- Are we attempting to login as somebody else? |
if ($FORM{'suname'}) { |
if ($form{'suname'}) { |
# ------------ see if the original user has enough privileges to pull this stunt |
# ------------ see if the original user has enough privileges to pull this stunt |
if (&Apache::lonnet::privileged($FORM{'uname'},$FORM{'udom'})) { |
if (&Apache::lonnet::privileged($form{'uname'},$form{'udom'})) { |
# ---------------------------------------------------- see if the su-user exists |
# ---------------------------------------------------- see if the su-user exists |
unless (&Apache::lonnet::homeserver($FORM{'suname'},$FORM{'udom'}) |
unless (&Apache::lonnet::homeserver($form{'suname'},$form{'udom'}) |
eq 'no_host') { |
eq 'no_host') { |
&Apache::lonnet::logthis(&Apache::lonnet::homeserver($FORM{'suname'},$FORM{'udom'})); |
&Apache::lonnet::logthis(&Apache::lonnet::homeserver($form{'suname'},$form{'udom'})); |
# ------------------------------ see if the su-user is not too highly privileged |
# ------------------------------ see if the su-user is not too highly privileged |
unless (&Apache::lonnet::privileged($FORM{'suname'},$FORM{'udom'})) { |
unless (&Apache::lonnet::privileged($form{'suname'},$form{'udom'})) { |
# -------------------------------------------------------- actually switch users |
# -------------------------------------------------------- actually switch users |
&Apache::lonnet::logperm('User '.$FORM{'uname'}.' at '.$FORM{'udom'}. |
&Apache::lonnet::logperm('User '.$form{'uname'}.' at '.$form{'udom'}. |
' logging in as '.$FORM{'suname'}); |
' logging in as '.$form{'suname'}); |
$FORM{'uname'}=$FORM{'suname'}; |
$form{'uname'}=$form{'suname'}; |
} else { |
} else { |
&Apache::lonnet::logthis('Attempted switch user to privileged user'); |
&Apache::lonnet::logthis('Attempted switch user to privileged user'); |
} |
} |
Line 431 ENDFAILED
|
Line 301 ENDFAILED
|
&Apache::lonnet::logthis('Non-privileged user attempting switch user'); |
&Apache::lonnet::logthis('Non-privileged user attempting switch user'); |
} |
} |
} |
} |
&success($r,$FORM{'uname'},$FORM{'udom'},$authhost,$firsturl); |
|
|
if ($r->dir_config("lonBalancer") eq 'yes') { |
|
&success($r,$form{'uname'},$form{'udom'},$authhost,'noredirect',undef, |
|
\%form); |
|
$r->internal_redirect('/adm/switchserver'); |
|
} else { |
|
&success($r,$form{'uname'},$form{'udom'},$authhost,$firsturl,undef, |
|
\%form); |
|
} |
return OK; |
return OK; |
} |
} |
|
|