--- loncom/interface/loncreateuser.pm 2001/05/10 21:13:04 1.17
+++ loncom/interface/loncreateuser.pm 2002/02/08 19:40:42 1.24
@@ -1,6 +1,30 @@
-# The LearningOnline Network
+# The LearningOnline Network with CAPA
# Create a user
#
+# $Id: loncreateuser.pm,v 1.24 2002/02/08 19:40:42 matthew Exp $
+#
+# Copyright Michigan State University Board of Trustees
+#
+# This file is part of the LearningOnline Network with CAPA (LON-CAPA).
+#
+# LON-CAPA is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; either version 2 of the License, or
+# (at your option) any later version.
+#
+# LON-CAPA is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with LON-CAPA; if not, write to the Free Software
+# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+#
+# /home/httpd/html/adm/gpl.txt
+#
+# http://www.lon-capa.org/
+#
# (Create a course
# (My Desk
#
@@ -10,6 +34,7 @@
# 5/21/99,5/22,5/25,5/26,5/31,6/2,6/10,7/12,7/14,
# 1/14/00,5/29,5/30,6/1,6/29,7/1,11/9 Gerd Kortemeyer)
#
+# YEAR=2001
# 3/1/1 Gerd Kortemeyer)
#
# 3/1 Gerd Kortemeyer)
@@ -18,14 +43,145 @@
#
# 2/14,2/17,2/19,2/20,2/21,2/22,2/23,3/2,3/17,3/24,04/12 Gerd Kortemeyer
# April Guy Albertelli
-# 05/10 Gerd Kortemeyer
+# 05/10,10/16 Gerd Kortemeyer
+# 11/12,11/13,11/15 Scott Harrison
#
+# $Id: loncreateuser.pm,v 1.24 2002/02/08 19:40:42 matthew Exp $
+###
+
package Apache::loncreateuser;
use strict;
use Apache::Constants qw(:common :http);
use Apache::lonnet;
+my $loginscript; # piece of javascript used in two separate instances
+my $generalrule;
+my $authformnop;
+my $authformkrb;
+my $authformint;
+my $authformfsys;
+my $authformloc;
+
+BEGIN {
+ $ENV{'SERVER_NAME'}=~/(\w+\.\w+)$/;
+ my $krbdefdom=$1;
+ $krbdefdom=~tr/a-z/A-Z/;
+ $authformnop=(<
+
+Do not change login data
+
+END
+ $authformkrb=(<
+
+Kerberos authenticated with domain
+
+
+END
+ $authformint=(<
+
+Internally authenticated (with initial password
+ )
+
+END
+ $authformfsys=(<
+
+Filesystem authenticated (with initial password
+ )
+
+END
+ $authformloc=(<
+
+Local Authentication with argument
+
+
+END
+ $loginscript=(<
+function setkrb(vf) {
+ if (vf.krbdom.value!='') {
+ vf.login[0].checked=true;
+ vf.krbdom.value=vf.krbdom.value.toUpperCase();
+ vf.intpwd.value='';
+ vf.fsyspwd.value='';
+ vf.locarg.value='';
+ }
+}
+
+function setint(vf) {
+ if (vf.intpwd.value!='') {
+ vf.login[1].checked=true;
+ vf.krbdom.value='';
+ vf.fsyspwd.value='';
+ vf.locarg.value='';
+ }
+}
+
+function setfsys(vf) {
+ if (vf.fsyspwd.value!='') {
+ vf.login[2].checked=true;
+ vf.krbdom.value='';
+ vf.intpwd.value='';
+ vf.locarg.value='';
+ }
+}
+
+function setloc(vf) {
+ if (vf.locarg.value!='') {
+ vf.login[3].checked=true;
+ vf.krbdom.value='';
+ vf.intpwd.value='';
+ vf.fsyspwd.value='';
+ }
+}
+
+function clicknop(vf) {
+ vf.krbdom.value='';
+ vf.intpwd.value='';
+ vf.fsyspwd.value='';
+ vf.locarg.value='';
+}
+
+function clickkrb(vf) {
+ vf.krbdom.value='$krbdefdom';
+ vf.intpwd.value='';
+ vf.fsyspwd.value='';
+ vf.locarg.value='';
+}
+
+function clickint(vf) {
+ vf.krbdom.value='';
+ vf.fsyspwd.value='';
+ vf.locarg.value='';
+}
+
+function clickfsys(vf) {
+ vf.krbdom.value='';
+ vf.intpwd.value='';
+ vf.locarg.value='';
+}
+
+function clickloc(vf) {
+ vf.krbdom.value='';
+ vf.intpwd.value='';
+ vf.fsyspwd.value='';
+}
+
+ENDLOGINSCRIPT
+ $generalrule=<
+As a general rule, only authors or co-authors should be filesystem
+authenticated (which allows access to the server filesystem).
+
+END
+}
+
# =================================================================== Phase one
sub phase_one {
@@ -110,58 +266,35 @@ ENDENHEAD
my $uhome=&Apache::lonnet::homeserver($ccuname,$ccdomain);
my %incdomains;
my %inccourses;
- map {
+ foreach (%Apache::lonnet::hostdom) {
$incdomains{$_}=1;
- } values %Apache::lonnet::hostdom;
- map {
+ }
+ foreach (keys(%ENV)) {
if ($_=~/^user\.priv\.cm\.\/(\w+)\/(\w+)/) {
$inccourses{$1.'_'.$2}=1;
}
- } %ENV;
+ }
if ($uhome eq 'no_host') {
$r->print(<New user $ccuname at $ccdomain
-
-
+ENDNUSER
+ $r->print(<
Personal Data
-First Name:
-Middle Name:
-Last Name:
-Generation:
+First Name:
+Middle Name:
+Last Name:
+Generation:
-ID/Student Number:
+ID/Student Number:
Login Data
-
-Kerberos authenticated with domain
-
-
-Internally authenticated (with initial password
- )
+$generalrule
+$authformkrb
+$authformint
+$authformfsys
+$authformloc
ENDNUSER
} else {
$r->print('
Existing user '.$ccuname.' at '.$ccdomain.' ');
@@ -173,7 +306,7 @@ ENDNUSER
$r->print('Revoke Existing Roles '.
'Revoke Role Extent '.
'Start End ');
- map {
+ foreach (split(/&/,$rolesdump)) {
if ($_!~/^rolesdef\&/) {
my ($area,$role)=split(/=/,$_);
@@ -227,11 +360,103 @@ ENDNUSER
($tstart?localtime($tstart):' ').''.
($tend?localtime($tend):' ')." \n");
}
- } split(/&/,$rolesdump);
+ }
$r->print('
');
}
+ my $currentauth=&Apache::lonnet::queryauthenticate($ccuname,$ccdomain);
+ if ($currentauth=~/^krb4:/) {
+ $currentauth=~/^krb4:(.*)/;
+ my $krbdefdom2=$1;
+ $loginscript=~s/vf\.krbdom\.value='.*?';/vf.krbdom.value='$krbdefdom2';/;
+ }
+ # minor script hack here
+# $loginscript=~s/login\[3\]/login\[4\]/; # loc
+# $loginscript=~s/login\[2\]/login\[3\]/; # fsys
+# $loginscript=~s/login\[1\]/login\[2\]/; # int
+# $loginscript=~s/login\[0\]/login\[1\]/; # krb4
+
+ unless ($currentauth=~/^krb4:/ or
+ $currentauth=~/^unix:/ or
+ $currentauth=~/^internal:/ or
+ $currentauth=~/^localauth:/
+ ) {
+ $r->print(<
+$loginscript
+ERROR:
+This user has an unrecognized authentication scheme ($currentauth).
+Please specify login data below.
+Login Data
+$generalrule
+$authformkrb
+$authformint
+$authformfsys
+$authformloc
+END
+ }
+ else {
+ my $authformcurrent='';
+ my $authformother='';
+ if ($currentauth=~/^krb4:/) {
+ $authformcurrent=$authformkrb;
+ $authformother=$authformint.$authformfsys.$authformloc;
+ # embarrassing script hack here
+ $loginscript=~s/login\[3\]/login\[4\]/; # loc
+ $loginscript=~s/login\[2\]/login\[3\]/; # fsys
+ $loginscript=~s/login\[1\]/login\[2\]/; # int
+ $loginscript=~s/login\[0\]/login\[1\]/; # krb4
+ }
+ elsif ($currentauth=~/^internal:/) {
+ $authformcurrent=$authformint;
+ $authformother=$authformkrb.$authformfsys.$authformloc;
+ # embarrassing script hack here
+ $loginscript=~s/login\[3\]/login\[4\]/; # loc
+ $loginscript=~s/login\[2\]/login\[3\]/; # fsys
+ $loginscript=~s/login\[1\]/login\[1\]/; # int
+ $loginscript=~s/login\[0\]/login\[2\]/; # krb4
+ }
+ elsif ($currentauth=~/^unix:/) {
+ $authformcurrent=$authformfsys;
+ $authformother=$authformkrb.$authformint.$authformloc;
+ # embarrassing script hack here
+ $loginscript=~s/login\[3\]/login\[4\]/; # loc
+ $loginscript=~s/login\[1\]/login\[3\]/; # int
+ $loginscript=~s/login\[2\]/login\[1\]/; # fsys
+ $loginscript=~s/login\[0\]/login\[2\]/; # krb4
+ }
+ elsif ($currentauth=~/^localauth:/) {
+ $authformcurrent=$authformloc;
+ $authformother=$authformkrb.$authformint.$authformfsys;
+ # embarrassing script hack here
+ $loginscript=~s/login\[3\]/login\[loc\]/; # loc
+ $loginscript=~s/login\[2\]/login\[4\]/; # fsys
+ $loginscript=~s/login\[1\]/login\[3\]/; # int
+ $loginscript=~s/login\[0\]/login\[2\]/; # krb4
+ $loginscript=~s/login\[loc\]/login\[1\]/; # loc
+ }
+ $authformcurrent=<
+
+* * * WARNING * * *
+* * * WARNING * * *
+
+$authformcurrent
+Changing this value will overwrite existing authentication for the user; you should notify the user of this change.
+
+END
+ $r->print(<
+$loginscript
+Change Current Login Data
+$generalrule
+$authformnop
+$authformcurrent
+Enter New Login Data
+$authformother
+END
+ }
}
- $r->print('Add Roles ');
+ $r->print('Add Roles ');
#
# Co-Author
#
@@ -263,9 +488,9 @@ ENDCOAUTH
$r->print('Domain Level '.
'Activate Role Extent '.
'Start End ');
- map {
+ foreach ( sort( keys(%incdomains))) {
my $thisdomain=$_;
- map {
+ foreach ('dc','li','dg','au') {
if (&Apache::lonnet::allowed('c'.$_,$thisdomain)) {
my $plrole=&Apache::lonnet::plaintext($_);
$r->print(<
ENDDROW
}
- } ('dc','li','dg','au');
- } sort keys %incdomains;
+ }
+ }
$r->print('
');
#
# Course level
@@ -291,7 +516,7 @@ ENDDROW
$r->print('Course Level '.
'Activate Role Extent '.
'Group/Section Start End ');
- map {
+ foreach (sort( keys(%inccourses))) {
my $thiscourse=$_;
my $protectedcourse=$_;
$thiscourse=~s:_:/:g;
@@ -300,7 +525,7 @@ ENDDROW
my $bgcol=$thiscourse;
$bgcol=~s/[^8-9b-e]//g;
$bgcol=substr($bgcol.$bgcol.$bgcol.'ffffff',0,6);
- map {
+ foreach ('st','ta','ep','ad','in','cc') {
if (&Apache::lonnet::allowed('c'.$_,$thiscourse)) {
my $plrole=&Apache::lonnet::plaintext($_);
$r->print("
@@ -322,8 +547,8 @@ ENDDROW
ENDROW
}
- } ('st','ta','ep','ad','in','cc');
- } sort keys %inccourses;
+ }
+ }
$r->print('
');
$r->print(' ');
$r->print('