version 1.260, 2004/10/11 10:58:28
|
version 1.276, 2005/01/26 12:13:58
|
Line 46 use Authen::Krb5;
|
Line 46 use Authen::Krb5;
|
use lib '/home/httpd/lib/perl/'; |
use lib '/home/httpd/lib/perl/'; |
use localauth; |
use localauth; |
use localenroll; |
use localenroll; |
|
use localstudentphoto; |
use File::Copy; |
use File::Copy; |
use LONCAPA::ConfigFileEdit; |
use LONCAPA::ConfigFileEdit; |
use LONCAPA::lonlocal; |
use LONCAPA::lonlocal; |
Line 1130 sub read_profile {
|
Line 1131 sub read_profile {
|
# 0 - Program should exit. |
# 0 - Program should exit. |
# Side effects: |
# Side effects: |
# Reply information is sent to the client. |
# Reply information is sent to the client. |
|
|
sub ping_handler { |
sub ping_handler { |
my ($cmd, $tail, $client) = @_; |
my ($cmd, $tail, $client) = @_; |
Debug("$cmd $tail $client .. $currenthostid:"); |
Debug("$cmd $tail $client .. $currenthostid:"); |
Line 1158 sub ping_handler {
|
Line 1158 sub ping_handler {
|
# 0 - Program should exit. |
# 0 - Program should exit. |
# Side effects: |
# Side effects: |
# Reply information is sent to the client. |
# Reply information is sent to the client. |
|
|
sub pong_handler { |
sub pong_handler { |
my ($cmd, $tail, $replyfd) = @_; |
my ($cmd, $tail, $replyfd) = @_; |
|
|
Line 1213 sub establish_key_handler {
|
Line 1212 sub establish_key_handler {
|
} |
} |
®ister_handler("ekey", \&establish_key_handler, 0, 1,1); |
®ister_handler("ekey", \&establish_key_handler, 0, 1,1); |
|
|
|
|
# Handler for the load command. Returns the current system load average |
# Handler for the load command. Returns the current system load average |
# to the requestor. |
# to the requestor. |
# |
# |
Line 1248 sub load_handler {
|
Line 1246 sub load_handler {
|
|
|
return 1; |
return 1; |
} |
} |
register_handler("load", \&load_handler, 0, 1, 0); |
®ister_handler("load", \&load_handler, 0, 1, 0); |
|
|
# |
# |
# Process the userload request. This sub returns to the client the current |
# Process the userload request. This sub returns to the client the current |
Line 1278 sub user_load_handler {
|
Line 1276 sub user_load_handler {
|
|
|
return 1; |
return 1; |
} |
} |
register_handler("userload", \&user_load_handler, 0, 1, 0); |
®ister_handler("userload", \&user_load_handler, 0, 1, 0); |
|
|
# Process a request for the authorization type of a user: |
# Process a request for the authorization type of a user: |
# (userauth). |
# (userauth). |
Line 1314 sub user_authorization_type {
|
Line 1312 sub user_authorization_type {
|
my ($type,$otherinfo) = split(/:/,$result); |
my ($type,$otherinfo) = split(/:/,$result); |
if($type =~ /^krb/) { |
if($type =~ /^krb/) { |
$type = $result; |
$type = $result; |
} |
} else { |
&Reply( $replyfd, "$type:\n", $userinput); |
$type .= ':'; |
|
} |
|
&Reply( $replyfd, "$type\n", $userinput); |
} |
} |
|
|
return 1; |
return 1; |
Line 1335 sub user_authorization_type {
|
Line 1335 sub user_authorization_type {
|
# 0 - Program should exit |
# 0 - Program should exit |
# Implicit Output: |
# Implicit Output: |
# a reply is written to the client. |
# a reply is written to the client. |
|
|
sub push_file_handler { |
sub push_file_handler { |
my ($cmd, $tail, $client) = @_; |
my ($cmd, $tail, $client) = @_; |
|
|
Line 1378 sub push_file_handler {
|
Line 1377 sub push_file_handler {
|
# Side Effects: |
# Side Effects: |
# The reply is written to $client. |
# The reply is written to $client. |
# |
# |
|
|
sub du_handler { |
sub du_handler { |
my ($cmd, $ududir, $client) = @_; |
my ($cmd, $ududir, $client) = @_; |
my ($ududir) = split(/:/,$ududir); # Make 'telnet' testing easier. |
my ($ududir) = split(/:/,$ududir); # Make 'telnet' testing easier. |
Line 1412 sub du_handler {
|
Line 1410 sub du_handler {
|
} |
} |
®ister_handler("du", \&du_handler, 0, 1, 0); |
®ister_handler("du", \&du_handler, 0, 1, 0); |
|
|
|
|
# |
# |
# ls - list the contents of a directory. For each file in the |
# ls - list the contents of a directory. For each file in the |
# selected directory the filename followed by the full output of |
# selected directory the filename followed by the full output of |
Line 1476 sub ls_handler {
|
Line 1473 sub ls_handler {
|
} |
} |
®ister_handler("ls", \&ls_handler, 0, 1, 0); |
®ister_handler("ls", \&ls_handler, 0, 1, 0); |
|
|
|
|
|
|
|
|
# Process a reinit request. Reinit requests that either |
# Process a reinit request. Reinit requests that either |
# lonc or lond be reinitialized so that an updated |
# lonc or lond be reinitialized so that an updated |
# host.tab or domain.tab can be processed. |
# host.tab or domain.tab can be processed. |
Line 1508 sub reinit_process_handler {
|
Line 1502 sub reinit_process_handler {
|
} |
} |
return 1; |
return 1; |
} |
} |
|
|
®ister_handler("reinit", \&reinit_process_handler, 1, 0, 1); |
®ister_handler("reinit", \&reinit_process_handler, 1, 0, 1); |
|
|
# Process the editing script for a table edit operation. |
# Process the editing script for a table edit operation. |
Line 1550 sub edit_table_handler {
|
Line 1543 sub edit_table_handler {
|
} |
} |
return 1; |
return 1; |
} |
} |
register_handler("edit", \&edit_table_handler, 1, 0, 1); |
®ister_handler("edit", \&edit_table_handler, 1, 0, 1); |
|
|
|
|
# |
# |
# Authenticate a user against the LonCAPA authentication |
# Authenticate a user against the LonCAPA authentication |
Line 1606 sub authenticate_handler {
|
Line 1598 sub authenticate_handler {
|
|
|
return 1; |
return 1; |
} |
} |
|
®ister_handler("auth", \&authenticate_handler, 1, 1, 0); |
register_handler("auth", \&authenticate_handler, 1, 1, 0); |
|
|
|
# |
# |
# Change a user's password. Note that this function is complicated by |
# Change a user's password. Note that this function is complicated by |
Line 1698 sub change_password_handler {
|
Line 1689 sub change_password_handler {
|
|
|
return 1; |
return 1; |
} |
} |
register_handler("passwd", \&change_password_handler, 1, 1, 0); |
®ister_handler("passwd", \&change_password_handler, 1, 1, 0); |
|
|
|
|
# |
# |
# Create a new user. User in this case means a lon-capa user. |
# Create a new user. User in this case means a lon-capa user. |
Line 1738 sub add_user_handler {
|
Line 1728 sub add_user_handler {
|
if (-e $passfilename) { |
if (-e $passfilename) { |
&Failure( $client, "already_exists\n", $userinput); |
&Failure( $client, "already_exists\n", $userinput); |
} else { |
} else { |
my @fpparts=split(/\//,$passfilename); |
|
my $fpnow=$fpparts[0].'/'.$fpparts[1].'/'.$fpparts[2]; |
|
my $fperror=''; |
my $fperror=''; |
for (my $i=3;$i<= ($#fpparts-1);$i++) { |
if (!&mkpath($passfilename)) { |
$fpnow.='/'.$fpparts[$i]; |
$fperror="error: ".($!+0)." mkdir failed while attempting " |
unless (-e $fpnow) { |
."makeuser"; |
&logthis("mkdir $fpnow"); |
|
unless (mkdir($fpnow,0777)) { |
|
$fperror="error: ".($!+0)." mkdir failed while attempting " |
|
."makeuser"; |
|
} |
|
} |
|
} |
} |
unless ($fperror) { |
unless ($fperror) { |
my $result=&make_passwd_file($uname, $umode,$npass, $passfilename); |
my $result=&make_passwd_file($uname, $umode,$npass, $passfilename); |
Line 1806 sub change_authentication_handler {
|
Line 1788 sub change_authentication_handler {
|
chomp($npass); |
chomp($npass); |
|
|
$npass=&unescape($npass); |
$npass=&unescape($npass); |
|
my $oldauth = &get_auth_type($udom, $uname); # Get old auth info. |
my $passfilename = &password_path($udom, $uname); |
my $passfilename = &password_path($udom, $uname); |
if ($passfilename) { # Not allowed to create a new user!! |
if ($passfilename) { # Not allowed to create a new user!! |
my $result=&make_passwd_file($uname, $umode,$npass,$passfilename); |
my $result=&make_passwd_file($uname, $umode,$npass,$passfilename); |
|
# |
|
# If the current auth mode is internal, and the old auth mode was |
|
# unix, or krb*, and the user is an author for this domain, |
|
# re-run manage_permissions for that role in order to be able |
|
# to take ownership of the construction space back to www:www |
|
# |
|
|
|
if( (($oldauth =~ /^unix/) && ($umode eq "internal")) || |
|
(($oldauth =~ /^internal/) && ($umode eq "unix")) ) { |
|
if(&is_author($udom, $uname)) { |
|
&Debug(" Need to manage author permissions..."); |
|
&manage_permissions("/$udom/_au", $udom, $uname, "$umode:"); |
|
} |
|
} |
|
|
|
|
&Reply($client, $result, $userinput); |
&Reply($client, $result, $userinput); |
} else { |
} else { |
&Failure($client, "non_authorized\n", $userinput); # Fail the user now. |
&Failure($client, "non_authorized\n", $userinput); # Fail the user now. |
Line 1964 sub fetch_user_file_handler {
|
Line 1963 sub fetch_user_file_handler {
|
# Note that any regular files in the way of this path are |
# Note that any regular files in the way of this path are |
# wiped out to deal with some earlier folly of mine. |
# wiped out to deal with some earlier folly of mine. |
|
|
my $path = $udir; |
if (!&mkpath($udir.'/'.$ufile)) { |
if ($ufile =~m|(.+)/([^/]+)$|) { |
&Failure($client, "unable_to_create\n", $userinput); |
my @parts=split('/',$1); |
|
foreach my $part (@parts) { |
|
$path .= '/'.$part; |
|
if( -f $path) { |
|
unlink($path); |
|
} |
|
if ((-e $path)!=1) { |
|
mkdir($path,0770); |
|
} |
|
} |
|
} |
} |
|
|
|
|
my $destname=$udir.'/'.$ufile; |
my $destname=$udir.'/'.$ufile; |
my $transname=$udir.'/'.$ufile.'.in.transit'; |
my $transname=$udir.'/'.$ufile.'.in.transit'; |
my $remoteurl='http://'.$clientip.'/userfiles/'.$fname; |
my $remoteurl='http://'.$clientip.'/userfiles/'.$fname; |
Line 2022 sub fetch_user_file_handler {
|
Line 2010 sub fetch_user_file_handler {
|
# |
# |
# Returns: |
# Returns: |
# 1 - Continue processing. |
# 1 - Continue processing. |
|
|
sub remove_user_file_handler { |
sub remove_user_file_handler { |
my ($cmd, $tail, $client) = @_; |
my ($cmd, $tail, $client) = @_; |
|
|
Line 2075 sub remove_user_file_handler {
|
Line 2062 sub remove_user_file_handler {
|
# |
# |
# Returns: |
# Returns: |
# 1 - Continue processing. |
# 1 - Continue processing. |
|
|
sub mkdir_user_file_handler { |
sub mkdir_user_file_handler { |
my ($cmd, $tail, $client) = @_; |
my ($cmd, $tail, $client) = @_; |
|
|
Line 2089 sub mkdir_user_file_handler {
|
Line 2075 sub mkdir_user_file_handler {
|
} else { |
} else { |
my $udir = &propath($udom,$uname); |
my $udir = &propath($udom,$uname); |
if (-e $udir) { |
if (-e $udir) { |
my $newdir=$udir.'/userfiles/'.$ufile; |
my $newdir=$udir.'/userfiles/'.$ufile.'/'; |
if (!-e $newdir) { |
if (!&mkpath($newdir)) { |
my @parts=split('/',$newdir); |
&Failure($client, "failed\n", "$cmd:$tail"); |
my $path; |
|
foreach my $part (@parts) { |
|
$path .= '/'.$part; |
|
if (!-e $path) { |
|
mkdir($path,0770); |
|
} |
|
} |
|
if (!-e $newdir) { |
|
&Failure($client, "failed\n", "$cmd:$tail"); |
|
} else { |
|
&Reply($client, "ok\n", "$cmd:$tail"); |
|
} |
|
} else { |
|
&Failure($client, "not_found\n", "$cmd:$tail"); |
|
} |
} |
|
&Reply($client, "ok\n", "$cmd:$tail"); |
} else { |
} else { |
&Failure($client, "not_home\n", "$cmd:$tail"); |
&Failure($client, "not_home\n", "$cmd:$tail"); |
} |
} |
Line 2124 sub mkdir_user_file_handler {
|
Line 2097 sub mkdir_user_file_handler {
|
# |
# |
# Returns: |
# Returns: |
# 1 - Continue processing. |
# 1 - Continue processing. |
|
|
sub rename_user_file_handler { |
sub rename_user_file_handler { |
my ($cmd, $tail, $client) = @_; |
my ($cmd, $tail, $client) = @_; |
|
|
Line 2158 sub rename_user_file_handler {
|
Line 2130 sub rename_user_file_handler {
|
} |
} |
®ister_handler("renameuserfile", \&rename_user_file_handler, 0,1,0); |
®ister_handler("renameuserfile", \&rename_user_file_handler, 0,1,0); |
|
|
|
|
# |
# |
# Authenticate access to a user file by checking the user's |
# Authenticate access to a user file by checking that the token the user's |
# session token(?) |
# passed also exists in their session file |
# |
# |
# Parameters: |
# Parameters: |
# cmd - The request keyword that dispatched to tus. |
# cmd - The request keyword that dispatched to tus. |
Line 2169 sub rename_user_file_handler {
|
Line 2140 sub rename_user_file_handler {
|
# client - Filehandle open on the client. |
# client - Filehandle open on the client. |
# Return: |
# Return: |
# 1. |
# 1. |
|
|
sub token_auth_user_file_handler { |
sub token_auth_user_file_handler { |
my ($cmd, $tail, $client) = @_; |
my ($cmd, $tail, $client) = @_; |
|
|
Line 2190 sub token_auth_user_file_handler {
|
Line 2160 sub token_auth_user_file_handler {
|
return 1; |
return 1; |
|
|
} |
} |
|
|
®ister_handler("tokenauthuserfile", \&token_auth_user_file_handler, 0,1,0); |
®ister_handler("tokenauthuserfile", \&token_auth_user_file_handler, 0,1,0); |
|
|
|
|
# |
# |
# Unsubscribe from a resource. |
# Unsubscribe from a resource. |
# |
# |
Line 2222 sub unsubscribe_handler {
|
Line 2190 sub unsubscribe_handler {
|
return 1; |
return 1; |
} |
} |
®ister_handler("unsub", \&unsubscribe_handler, 0, 1, 0); |
®ister_handler("unsub", \&unsubscribe_handler, 0, 1, 0); |
|
|
# Subscribe to a resource |
# Subscribe to a resource |
# |
# |
# Parameters: |
# Parameters: |
Line 2300 sub activity_log_handler {
|
Line 2269 sub activity_log_handler {
|
|
|
return 1; |
return 1; |
} |
} |
register_handler("log", \&activity_log_handler, 0, 1, 0); |
®ister_handler("log", \&activity_log_handler, 0, 1, 0); |
|
|
# |
# |
# Put a namespace entry in a user profile hash. |
# Put a namespace entry in a user profile hash. |
Line 2405 sub increment_user_value_handler {
|
Line 2374 sub increment_user_value_handler {
|
} |
} |
®ister_handler("inc", \&increment_user_value_handler, 0, 1, 0); |
®ister_handler("inc", \&increment_user_value_handler, 0, 1, 0); |
|
|
|
|
# |
# |
# Put a new role for a user. Roles are LonCAPA's packaging of permissions. |
# Put a new role for a user. Roles are LonCAPA's packaging of permissions. |
# Each 'role' a user has implies a set of permissions. Adding a new role |
# Each 'role' a user has implies a set of permissions. Adding a new role |
Line 2445 sub roles_put_handler {
|
Line 2413 sub roles_put_handler {
|
# is done on close this improves the chances the log will be an un- |
# is done on close this improves the chances the log will be an un- |
# corrupted ordered thing. |
# corrupted ordered thing. |
if ($hashref) { |
if ($hashref) { |
|
my $pass_entry = &get_auth_type($udom, $uname); |
|
my ($auth_type,$pwd) = split(/:/, $pass_entry); |
|
$auth_type = $auth_type.":"; |
my @pairs=split(/\&/,$what); |
my @pairs=split(/\&/,$what); |
foreach my $pair (@pairs) { |
foreach my $pair (@pairs) { |
my ($key,$value)=split(/=/,$pair); |
my ($key,$value)=split(/=/,$pair); |
my $pass_entry = &get_auth_type($udom, $uname); |
|
my ($auth_type,$pwd) = split(/:/, $pass_entry); |
|
$auth_type = $auth_type.":"; |
|
&manage_permissions($key, $udom, $uname, |
&manage_permissions($key, $udom, $uname, |
$auth_type); |
$auth_type); |
$hashref->{$key}=$value; |
$hashref->{$key}=$value; |
Line 2613 sub get_profile_entry_encrypted {
|
Line 2581 sub get_profile_entry_encrypted {
|
return 1; |
return 1; |
} |
} |
®ister_handler("eget", \&get_profile_entry_encrypted, 0, 1, 0); |
®ister_handler("eget", \&get_profile_entry_encrypted, 0, 1, 0); |
|
|
# |
# |
# Deletes a key in a user profile database. |
# Deletes a key in a user profile database. |
# |
# |
Line 2631 sub get_profile_entry_encrypted {
|
Line 2600 sub get_profile_entry_encrypted {
|
# 0 - Exit server. |
# 0 - Exit server. |
# |
# |
# |
# |
|
|
sub delete_profile_entry { |
sub delete_profile_entry { |
my ($cmd, $tail, $client) = @_; |
my ($cmd, $tail, $client) = @_; |
|
|
Line 2660 sub delete_profile_entry {
|
Line 2628 sub delete_profile_entry {
|
return 1; |
return 1; |
} |
} |
®ister_handler("del", \&delete_profile_entry, 0, 1, 0); |
®ister_handler("del", \&delete_profile_entry, 0, 1, 0); |
|
|
# |
# |
# List the set of keys that are defined in a profile database file. |
# List the set of keys that are defined in a profile database file. |
# A successful reply from this will contain an & separated list of |
# A successful reply from this will contain an & separated list of |
Line 2838 sub dump_with_regexp {
|
Line 2807 sub dump_with_regexp {
|
|
|
return 1; |
return 1; |
} |
} |
|
|
®ister_handler("dump", \&dump_with_regexp, 0, 1, 0); |
®ister_handler("dump", \&dump_with_regexp, 0, 1, 0); |
|
|
# Store a set of key=value pairs associated with a versioned name. |
# Store a set of key=value pairs associated with a versioned name. |
Line 2870 sub store_handler {
|
Line 2838 sub store_handler {
|
chomp($what); |
chomp($what); |
my @pairs=split(/\&/,$what); |
my @pairs=split(/\&/,$what); |
my $hashref = &tie_user_hash($udom, $uname, $namespace, |
my $hashref = &tie_user_hash($udom, $uname, $namespace, |
&GDBM_WRCREAT(), "P", |
&GDBM_WRCREAT(), "S", |
"$rid:$what"); |
"$rid:$what"); |
if ($hashref) { |
if ($hashref) { |
my $now = time; |
my $now = time; |
Line 2904 sub store_handler {
|
Line 2872 sub store_handler {
|
return 1; |
return 1; |
} |
} |
®ister_handler("store", \&store_handler, 0, 1, 0); |
®ister_handler("store", \&store_handler, 0, 1, 0); |
|
|
# |
# |
# Dump out all versions of a resource that has key=value pairs associated |
# Dump out all versions of a resource that has key=value pairs associated |
# with it for each version. These resources are built up via the store |
# with it for each version. These resources are built up via the store |
Line 3004 sub send_chat_handler {
|
Line 2973 sub send_chat_handler {
|
return 1; |
return 1; |
} |
} |
®ister_handler("chatsend", \&send_chat_handler, 0, 1, 0); |
®ister_handler("chatsend", \&send_chat_handler, 0, 1, 0); |
|
|
# |
# |
# Retrieve the set of chat messagss from a discussion board. |
# Retrieve the set of chat messagss from a discussion board. |
# |
# |
Line 3139 sub reply_query_handler {
|
Line 3109 sub reply_query_handler {
|
# $tail - Tail of the command. In this case consists of a colon |
# $tail - Tail of the command. In this case consists of a colon |
# separated list contaning the domain to apply this to and |
# separated list contaning the domain to apply this to and |
# an ampersand separated list of keyword=value pairs. |
# an ampersand separated list of keyword=value pairs. |
|
# Each value is a colon separated list that includes: |
|
# description, institutional code and course owner. |
|
# For backward compatibility with versions included |
|
# in LON-CAPA 1.1.X (and earlier) and 1.2.X, institutional |
|
# code and/or course owner are preserved from the existing |
|
# record when writing a new record in response to 1.1 or |
|
# 1.2 implementations of lonnet::flushcourselogs(). |
|
# |
# $client - Socket open on the client. |
# $client - Socket open on the client. |
# Returns: |
# Returns: |
# 1 - indicating that processing should continue |
# 1 - indicating that processing should continue |
Line 3152 sub put_course_id_handler {
|
Line 3130 sub put_course_id_handler {
|
|
|
my $userinput = "$cmd:$tail"; |
my $userinput = "$cmd:$tail"; |
|
|
my ($udom, $what) = split(/:/, $tail); |
my ($udom, $what) = split(/:/, $tail,2); |
chomp($what); |
chomp($what); |
my $now=time; |
my $now=time; |
my @pairs=split(/\&/,$what); |
my @pairs=split(/\&/,$what); |
Line 3160 sub put_course_id_handler {
|
Line 3138 sub put_course_id_handler {
|
my $hashref = &tie_domain_hash($udom, "nohist_courseids", &GDBM_WRCREAT()); |
my $hashref = &tie_domain_hash($udom, "nohist_courseids", &GDBM_WRCREAT()); |
if ($hashref) { |
if ($hashref) { |
foreach my $pair (@pairs) { |
foreach my $pair (@pairs) { |
my ($key,$descr,$inst_code)=split(/=/,$pair); |
my ($key,$courseinfo) = split(/=/,$pair,2); |
$hashref->{$key}=$descr.':'.$inst_code.':'.$now; |
$courseinfo =~ s/=/:/g; |
|
|
|
my @current_items = split(/:/,$hashref->{$key}); |
|
shift(@current_items); # remove description |
|
pop(@current_items); # remove last access |
|
my $numcurrent = scalar(@current_items); |
|
|
|
my @new_items = split(/:/,$courseinfo); |
|
my $numnew = scalar(@new_items); |
|
if ($numcurrent > 0) { |
|
if ($numnew == 1) { # flushcourselogs() from 1.1 or earlier |
|
$courseinfo .= ':'.join(':',@current_items); |
|
} elsif ($numnew == 2) { # flushcourselogs() from 1.2.X |
|
$courseinfo .= ':'.$current_items[$numcurrent-1]; |
|
} |
|
} |
|
$hashref->{$key}=$courseinfo.':'.$now; |
} |
} |
if (untie(%$hashref)) { |
if (untie(%$hashref)) { |
&Reply( $client, "ok\n", $userinput); |
&Reply( $client, "ok\n", $userinput); |
Line 3199 sub put_course_id_handler {
|
Line 3193 sub put_course_id_handler {
|
# description - regular expression that is used to filter |
# description - regular expression that is used to filter |
# the dump. Only keywords matching this regexp |
# the dump. Only keywords matching this regexp |
# will be used. |
# will be used. |
|
# institutional code - optional supplied code to filter |
|
# the dump. Only courses with an institutional code |
|
# that match the supplied code will be returned. |
|
# owner - optional supplied username of owner to filter |
|
# the dump. Only courses for which the course |
|
# owner matches the supplied username will be |
|
# returned. Implicit assumption that owner |
|
# is a user in the domain in which the |
|
# course database is defined. |
# $client - The socket open on the client. |
# $client - The socket open on the client. |
# Returns: |
# Returns: |
# 1 - Continue processing. |
# 1 - Continue processing. |
Line 3209 sub dump_course_id_handler {
|
Line 3212 sub dump_course_id_handler {
|
|
|
my $userinput = "$cmd:$tail"; |
my $userinput = "$cmd:$tail"; |
|
|
my ($udom,$since,$description) =split(/:/,$tail); |
my ($udom,$since,$description,$instcodefilter,$ownerfilter) =split(/:/,$tail); |
if (defined($description)) { |
if (defined($description)) { |
$description=&unescape($description); |
$description=&unescape($description); |
} else { |
} else { |
$description='.'; |
$description='.'; |
} |
} |
|
if (defined($instcodefilter)) { |
|
$instcodefilter=&unescape($instcodefilter); |
|
} else { |
|
$instcodefilter='.'; |
|
} |
|
if (defined($ownerfilter)) { |
|
$ownerfilter=&unescape($ownerfilter); |
|
} else { |
|
$ownerfilter='.'; |
|
} |
|
|
unless (defined($since)) { $since=0; } |
unless (defined($since)) { $since=0; } |
my $qresult=''; |
my $qresult=''; |
my $hashref = &tie_domain_hash($udom, "nohist_courseids", &GDBM_WRCREAT()); |
my $hashref = &tie_domain_hash($udom, "nohist_courseids", &GDBM_WRCREAT()); |
if ($hashref) { |
if ($hashref) { |
while (my ($key,$value) = each(%$hashref)) { |
while (my ($key,$value) = each(%$hashref)) { |
my ($descr,$lasttime,$inst_code); |
my ($descr,$lasttime,$inst_code,$owner); |
if ($value =~ m/^([^\:]*):([^\:]*):(\d+)$/) { |
my @courseitems = split(/:/,$value); |
($descr,$inst_code,$lasttime)=($1,$2,$3); |
$lasttime = pop(@courseitems); |
} else { |
($descr,$inst_code,$owner)=@courseitems; |
($descr,$lasttime) = split(/\:/,$value); |
|
} |
|
if ($lasttime<$since) { next; } |
if ($lasttime<$since) { next; } |
if ($description eq '.') { |
my $match = 1; |
$qresult.=$key.'='.$descr.':'.$inst_code.'&'; |
unless ($description eq '.') { |
} else { |
my $unescapeDescr = &unescape($descr); |
my $unescapeVal = &unescape($descr); |
unless (eval('$unescapeDescr=~/\Q$description\E/i')) { |
if (eval('$unescapeVal=~/\Q$description\E/i')) { |
$match = 0; |
$qresult.=$key.'='.$descr.':'.$inst_code.'&'; |
|
} |
} |
|
} |
|
unless ($instcodefilter eq '.' || !defined($instcodefilter)) { |
|
my $unescapeInstcode = &unescape($inst_code); |
|
unless (eval('$unescapeInstcode=~/\Q$instcodefilter\E/i')) { |
|
$match = 0; |
|
} |
} |
} |
|
unless ($ownerfilter eq '.' || !defined($ownerfilter)) { |
|
my $unescapeOwner = &unescape($owner); |
|
unless (eval('$unescapeOwner=~/\Q$ownerfilter\E/i')) { |
|
$match = 0; |
|
} |
|
} |
|
if ($match == 1) { |
|
$qresult.=$key.'='.$descr.':'.$inst_code.':'.$owner.'&'; |
|
} |
} |
} |
if (untie(%$hashref)) { |
if (untie(%$hashref)) { |
chop($qresult); |
chop($qresult); |
Line 3298 sub put_id_handler {
|
Line 3324 sub put_id_handler {
|
|
|
return 1; |
return 1; |
} |
} |
|
|
®ister_handler("idput", \&put_id_handler, 0, 1, 0); |
®ister_handler("idput", \&put_id_handler, 0, 1, 0); |
|
|
# |
# |
# Retrieves a set of id values from the id database. |
# Retrieves a set of id values from the id database. |
# Returns an & separated list of results, one for each requested id to the |
# Returns an & separated list of results, one for each requested id to the |
Line 3348 sub get_id_handler {
|
Line 3374 sub get_id_handler {
|
|
|
return 1; |
return 1; |
} |
} |
|
®ister_handler("idget", \&get_id_handler, 0, 1, 0); |
register_handler("idget", \&get_id_handler, 0, 1, 0); |
|
|
|
# |
# |
# Process the tmpput command I'm not sure what this does.. Seems to |
# Process the tmpput command I'm not sure what this does.. Seems to |
Line 3392 sub tmp_put_handler {
|
Line 3417 sub tmp_put_handler {
|
|
|
} |
} |
®ister_handler("tmpput", \&tmp_put_handler, 0, 1, 0); |
®ister_handler("tmpput", \&tmp_put_handler, 0, 1, 0); |
|
|
# Processes the tmpget command. This command returns the contents |
# Processes the tmpget command. This command returns the contents |
# of a temporary resource file(?) created via tmpput. |
# of a temporary resource file(?) created via tmpput. |
# |
# |
Line 3404 sub tmp_put_handler {
|
Line 3430 sub tmp_put_handler {
|
# 1 - Inidcating processing can continue. |
# 1 - Inidcating processing can continue. |
# Side effects: |
# Side effects: |
# A reply is sent to the client. |
# A reply is sent to the client. |
|
|
# |
# |
sub tmp_get_handler { |
sub tmp_get_handler { |
my ($cmd, $id, $client) = @_; |
my ($cmd, $id, $client) = @_; |
Line 3427 sub tmp_get_handler {
|
Line 3452 sub tmp_get_handler {
|
return 1; |
return 1; |
} |
} |
®ister_handler("tmpget", \&tmp_get_handler, 0, 1, 0); |
®ister_handler("tmpget", \&tmp_get_handler, 0, 1, 0); |
|
|
# |
# |
# Process the tmpdel command. This command deletes a temp resource |
# Process the tmpdel command. This command deletes a temp resource |
# created by the tmpput command. |
# created by the tmpput command. |
Line 3460 sub tmp_del_handler {
|
Line 3486 sub tmp_del_handler {
|
|
|
} |
} |
®ister_handler("tmpdel", \&tmp_del_handler, 0, 1, 0); |
®ister_handler("tmpdel", \&tmp_del_handler, 0, 1, 0); |
|
|
# |
# |
# Processes the setannounce command. This command |
# Processes the setannounce command. This command |
# creates a file named announce.txt in the top directory of |
# creates a file named announce.txt in the top directory of |
Line 3498 sub set_announce_handler {
|
Line 3525 sub set_announce_handler {
|
return 1; |
return 1; |
} |
} |
®ister_handler("setannounce", \&set_announce_handler, 0, 1, 0); |
®ister_handler("setannounce", \&set_announce_handler, 0, 1, 0); |
|
|
# |
# |
# Return the version of the daemon. This can be used to determine |
# Return the version of the daemon. This can be used to determine |
# the compatibility of cross version installations or, alternatively to |
# the compatibility of cross version installations or, alternatively to |
Line 3522 sub get_version_handler {
|
Line 3550 sub get_version_handler {
|
return 1; |
return 1; |
} |
} |
®ister_handler("version", \&get_version_handler, 0, 1, 0); |
®ister_handler("version", \&get_version_handler, 0, 1, 0); |
|
|
# Set the current host and domain. This is used to support |
# Set the current host and domain. This is used to support |
# multihomed systems. Each IP of the system, or even separate daemons |
# multihomed systems. Each IP of the system, or even separate daemons |
# on the same IP can be treated as handling a separate lonCAPA virtual |
# on the same IP can be treated as handling a separate lonCAPA virtual |
Line 3658 sub validate_course_owner_handler {
|
Line 3687 sub validate_course_owner_handler {
|
return 1; |
return 1; |
} |
} |
®ister_handler("autonewcourse", \&validate_course_owner_handler, 0, 1, 0); |
®ister_handler("autonewcourse", \&validate_course_owner_handler, 0, 1, 0); |
|
|
# |
# |
# Validate a course section in the official schedule of classes |
# Validate a course section in the official schedule of classes |
# from the institutions point of view (part of autoenrollment). |
# from the institutions point of view (part of autoenrollment). |
Line 3738 sub create_auto_enroll_password_handler
|
Line 3768 sub create_auto_enroll_password_handler
|
# |
# |
# Returns: |
# Returns: |
# 1 - Continue processing. |
# 1 - Continue processing. |
|
|
sub retrieve_auto_file_handler { |
sub retrieve_auto_file_handler { |
my ($cmd, $tail, $client) = @_; |
my ($cmd, $tail, $client) = @_; |
my $userinput = "cmd:$tail"; |
my $userinput = "cmd:$tail"; |
Line 3823 sub get_institutional_code_format_handle
|
Line 3852 sub get_institutional_code_format_handle
|
|
|
return 1; |
return 1; |
} |
} |
|
®ister_handler("autoinstcodeformat", |
|
\&get_institutional_code_format_handler,0,1,0); |
|
|
®ister_handler("autoinstcodeformat", \&get_institutional_code_format_handler, |
|
0,1,0); |
|
|
|
# |
|
# |
|
# |
|
# |
|
# |
# |
|
# Gets a student's photo to exist (in the correct image type) in the user's |
|
# directory. |
|
# Formal Parameters: |
|
# $cmd - The command request that got us dispatched. |
|
# $tail - A colon separated set of words that will be split into: |
|
# $domain - student's domain |
|
# $uname - student username |
|
# $type - image type desired |
|
# $client - The socket open on the client. |
|
# Returns: |
|
# 1 - continue processing. |
|
sub student_photo_handler { |
|
my ($cmd, $tail, $client) = @_; |
|
my ($domain,$uname,$type) = split(/:/, $tail); |
|
|
|
my $path=&propath($domain,$uname). |
|
'/userfiles/internal/studentphoto.'.$type; |
|
if (-e $path) { |
|
&Reply($client,"ok\n","$cmd:$tail"); |
|
return 1; |
|
} |
|
&mkpath($path); |
|
my $file=&localstudentphoto::fetch($domain,$uname); |
|
if (!$file) { |
|
&Failure($client,"unavailable\n","$cmd:$tail"); |
|
return 1; |
|
} |
|
if (!-e $path) { &convert_photo($file,$path); } |
|
if (-e $path) { |
|
&Reply($client,"ok\n","$cmd:$tail"); |
|
return 1; |
|
} |
|
&Failure($client,"unable_to_convert\n","$cmd:$tail"); |
|
return 1; |
|
} |
|
®ister_handler("studentphoto", \&student_photo_handler, 0, 1, 0); |
|
|
|
# mkpath makes all directories for a file, expects an absolute path with a |
|
# file or a trailing / if just a dir is passed |
|
# returns 1 on success 0 on failure |
|
sub mkpath { |
|
my ($file)=@_; |
|
my @parts=split(/\//,$file,-1); |
|
my $now=$parts[0].'/'.$parts[1].'/'.$parts[2]; |
|
for (my $i=3;$i<= ($#parts-1);$i++) { |
|
$now.='/'.$parts[$i]; |
|
if (!-e $now) { |
|
if (!mkdir($now,0770)) { return 0; } |
|
} |
|
} |
|
return 1; |
|
} |
|
|
#--------------------------------------------------------------- |
#--------------------------------------------------------------- |
# |
# |
# Getting, decoding and dispatching requests: |
# Getting, decoding and dispatching requests: |
# |
# |
|
|
# |
# |
# Get a Request: |
# Get a Request: |
# Gets a Request message from the client. The transaction |
# Gets a Request message from the client. The transaction |
Line 3943 sub process_request {
|
Line 4019 sub process_request {
|
|
|
} |
} |
|
|
#------------------- Commands not yet in spearate handlers. -------------- |
print $client "unknown_cmd\n"; |
|
|
#------------------------------- is auto-enrollment enabled? |
|
if ($userinput =~/^autorun/) { |
|
if (isClient) { |
|
my ($cmd,$cdom) = split(/:/,$userinput); |
|
my $outcome = &localenroll::run($cdom); |
|
print $client "$outcome\n"; |
|
} else { |
|
print $client "0\n"; |
|
} |
|
#------------------------------- get official sections (for auto-enrollment). |
|
} elsif ($userinput =~/^autogetsections/) { |
|
if (isClient) { |
|
my ($cmd,$coursecode,$cdom)=split(/:/,$userinput); |
|
my @secs = &localenroll::get_sections($coursecode,$cdom); |
|
my $seclist = &escape(join(':',@secs)); |
|
print $client "$seclist\n"; |
|
} else { |
|
print $client "refused\n"; |
|
} |
|
#----------------------- validate owner of new course section (for auto-enrollment). |
|
} elsif ($userinput =~/^autonewcourse/) { |
|
if (isClient) { |
|
my ($cmd,$inst_course_id,$owner,$cdom)=split(/:/,$userinput); |
|
my $outcome = &localenroll::new_course($inst_course_id,$owner,$cdom); |
|
print $client "$outcome\n"; |
|
} else { |
|
print $client "refused\n"; |
|
} |
|
#-------------- validate course section in schedule of classes (for auto-enrollment). |
|
} elsif ($userinput =~/^autovalidatecourse/) { |
|
if (isClient) { |
|
my ($cmd,$inst_course_id,$cdom)=split(/:/,$userinput); |
|
my $outcome=&localenroll::validate_courseID($inst_course_id,$cdom); |
|
print $client "$outcome\n"; |
|
} else { |
|
print $client "refused\n"; |
|
} |
|
#--------------------------- create password for new user (for auto-enrollment). |
|
} elsif ($userinput =~/^autocreatepassword/) { |
|
if (isClient) { |
|
my ($cmd,$authparam,$cdom)=split(/:/,$userinput); |
|
my ($create_passwd,$authchk); |
|
($authparam,$create_passwd,$authchk) = &localenroll::create_password($authparam,$cdom); |
|
print $client &escape($authparam.':'.$create_passwd.':'.$authchk)."\n"; |
|
} else { |
|
print $client "refused\n"; |
|
} |
|
#--------------------------- read and remove temporary files (for auto-enrollment). |
|
} elsif ($userinput =~/^autoretrieve/) { |
|
if (isClient) { |
|
my ($cmd,$filename) = split(/:/,$userinput); |
|
my $source = $perlvar{'lonDaemons'}.'/tmp/'.$filename; |
|
if ( (-e $source) && ($filename ne '') ) { |
|
my $reply = ''; |
|
if (open(my $fh,$source)) { |
|
while (<$fh>) { |
|
chomp($_); |
|
$_ =~ s/^\s+//g; |
|
$_ =~ s/\s+$//g; |
|
$reply .= $_; |
|
} |
|
close($fh); |
|
print $client &escape($reply)."\n"; |
|
# unlink($source); |
|
} else { |
|
print $client "error\n"; |
|
} |
|
} else { |
|
print $client "error\n"; |
|
} |
|
} else { |
|
print $client "refused\n"; |
|
} |
|
#--------------------- read and retrieve institutional code format |
|
# (for support form). |
|
} elsif ($userinput =~/^autoinstcodeformat/) { |
|
if (isClient) { |
|
my $reply; |
|
my($cmd,$cdom,$course) = split(/:/,$userinput); |
|
my @pairs = split/\&/,$course; |
|
my %instcodes = (); |
|
my %codes = (); |
|
my @codetitles = (); |
|
my %cat_titles = (); |
|
my %cat_order = (); |
|
foreach (@pairs) { |
|
my ($key,$value) = split/=/,$_; |
|
$instcodes{&unescape($key)} = &unescape($value); |
|
} |
|
my $formatreply = &localenroll::instcode_format($cdom,\%instcodes,\%codes,\@codetitles,\%cat_titles,\%cat_order); |
|
if ($formatreply eq 'ok') { |
|
my $codes_str = &hash2str(%codes); |
|
my $codetitles_str = &array2str(@codetitles); |
|
my $cat_titles_str = &hash2str(%cat_titles); |
|
my $cat_order_str = &hash2str(%cat_order); |
|
print $client $codes_str.':'.$codetitles_str.':'.$cat_titles_str.':'.$cat_order_str."\n"; |
|
} |
|
} else { |
|
print $client "refused\n"; |
|
} |
|
# ------------------------------------------------------------- unknown command |
|
|
|
} else { |
|
# unknown command |
|
print $client "unknown_cmd\n"; |
|
} |
|
# -------------------------------------------------------------------- complete |
# -------------------------------------------------------------------- complete |
Debug("process_request - returning 1"); |
Debug("process_request - returning 1"); |
return 1; |
return 1; |
Line 4498 sub logstatus {
|
Line 4467 sub logstatus {
|
flock(LOG,LOCK_EX); |
flock(LOG,LOCK_EX); |
print LOG $$."\t".$clientname."\t".$currenthostid."\t" |
print LOG $$."\t".$clientname."\t".$currenthostid."\t" |
.$status."\t".$lastlog."\t $keymode\n"; |
.$status."\t".$lastlog."\t $keymode\n"; |
flock(DB,LOCK_UN); |
flock(LOG,LOCK_UN); |
close(LOG); |
close(LOG); |
} |
} |
&status("Finished logging"); |
&status("Finished logging"); |
Line 4925 sub make_new_child {
|
Line 4894 sub make_new_child {
|
exit; |
exit; |
|
|
} |
} |
|
# |
|
# Determine if a user is an author for the indicated domain. |
|
# |
|
# Parameters: |
|
# domain - domain to check in . |
|
# user - Name of user to check. |
|
# |
|
# Return: |
|
# 1 - User is an author for domain. |
|
# 0 - User is not an author for domain. |
|
sub is_author { |
|
my ($domain, $user) = @_; |
|
|
|
&Debug("is_author: $user @ $domain"); |
|
|
|
my $hashref = &tie_user_hash($domain, $user, "roles", |
|
&GDBM_READER()); |
|
|
|
# Author role should show up as a key /domain/_au |
|
|
|
my $key = "/$domain/_au"; |
|
my $value = $hashref->{$key}; |
|
|
|
if(defined($value)) { |
|
&Debug("$user @ $domain is an author"); |
|
} |
|
|
|
return defined($value); |
|
} |
# |
# |
# Checks to see if the input roleput request was to set |
# Checks to see if the input roleput request was to set |
# an author role. If so, invokes the lchtmldir script to set |
# an author role. If so, invokes the lchtmldir script to set |
Line 4941 sub make_new_child {
|
Line 4937 sub make_new_child {
|
sub manage_permissions |
sub manage_permissions |
{ |
{ |
|
|
|
|
my ($request, $domain, $user, $authtype) = @_; |
my ($request, $domain, $user, $authtype) = @_; |
|
|
|
&Debug("manage_permissions: $request $domain $user $authtype"); |
|
|
# See if the request is of the form /$domain/_au |
# See if the request is of the form /$domain/_au |
if($request =~ /^(\/$domain\/_au)$/) { # It's an author rolesput... |
if($request =~ /^(\/$domain\/_au)$/) { # It's an author rolesput... |
my $execdir = $perlvar{'lonDaemons'}; |
my $execdir = $perlvar{'lonDaemons'}; |
my $userhome= "/home/$user" ; |
my $userhome= "/home/$user" ; |
&logthis("system $execdir/lchtmldir $userhome $user $authtype"); |
&logthis("system $execdir/lchtmldir $userhome $user $authtype"); |
|
&Debug("Setting homedir permissions for $userhome"); |
system("$execdir/lchtmldir $userhome $user $authtype"); |
system("$execdir/lchtmldir $userhome $user $authtype"); |
} |
} |
} |
} |
Line 4963 sub manage_permissions
|
Line 4963 sub manage_permissions
|
# |
# |
sub password_path { |
sub password_path { |
my ($domain, $user) = @_; |
my ($domain, $user) = @_; |
|
return &propath($domain, $user).'/passwd'; |
|
|
my $path = &propath($domain, $user); |
|
$path .= "/passwd"; |
|
|
|
return $path; |
|
} |
} |
|
|
# Password Filename |
# Password Filename |
Line 5141 sub validate_user {
|
Line 5136 sub validate_user {
|
my $krbserver = &Authen::Krb5::parse_name($krbservice); |
my $krbserver = &Authen::Krb5::parse_name($krbservice); |
my $credentials= &Authen::Krb5::cc_default(); |
my $credentials= &Authen::Krb5::cc_default(); |
$credentials->initialize($krbclient); |
$credentials->initialize($krbclient); |
my $krbreturn = &Authen::KRb5::get_in_tkt_with_password($krbclient, |
my $krbreturn = &Authen::Krb5::get_in_tkt_with_password($krbclient, |
$krbserver, |
$krbserver, |
$password, |
$password, |
$credentials); |
$credentials); |
Line 5392 sub make_passwd_file {
|
Line 5387 sub make_passwd_file {
|
if ($umode eq 'krb4' or $umode eq 'krb5') { |
if ($umode eq 'krb4' or $umode eq 'krb5') { |
{ |
{ |
my $pf = IO::File->new(">$passfilename"); |
my $pf = IO::File->new(">$passfilename"); |
print $pf "$umode:$npass\n"; |
if ($pf) { |
|
print $pf "$umode:$npass\n"; |
|
} else { |
|
$result = "pass_file_failed_error"; |
|
} |
} |
} |
} elsif ($umode eq 'internal') { |
} elsif ($umode eq 'internal') { |
my $salt=time; |
my $salt=time; |
Line 5401 sub make_passwd_file {
|
Line 5400 sub make_passwd_file {
|
{ |
{ |
&Debug("Creating internal auth"); |
&Debug("Creating internal auth"); |
my $pf = IO::File->new(">$passfilename"); |
my $pf = IO::File->new(">$passfilename"); |
print $pf "internal:$ncpass\n"; |
if($pf) { |
|
print $pf "internal:$ncpass\n"; |
|
} else { |
|
$result = "pass_file_failed_error"; |
|
} |
} |
} |
} elsif ($umode eq 'localauth') { |
} elsif ($umode eq 'localauth') { |
{ |
{ |
my $pf = IO::File->new(">$passfilename"); |
my $pf = IO::File->new(">$passfilename"); |
print $pf "localauth:$npass\n"; |
if($pf) { |
|
print $pf "localauth:$npass\n"; |
|
} else { |
|
$result = "pass_file_failed_error"; |
|
} |
} |
} |
} elsif ($umode eq 'unix') { |
} elsif ($umode eq 'unix') { |
{ |
{ |
Line 5445 sub make_passwd_file {
|
Line 5452 sub make_passwd_file {
|
$result = "lcuseradd_failed:$error_text\n"; |
$result = "lcuseradd_failed:$error_text\n"; |
} else { |
} else { |
my $pf = IO::File->new(">$passfilename"); |
my $pf = IO::File->new(">$passfilename"); |
print $pf "unix:\n"; |
if($pf) { |
|
print $pf "unix:\n"; |
|
} else { |
|
$result = "pass_file_failed_error"; |
|
} |
} |
} |
} |
} |
} elsif ($umode eq 'none') { |
} elsif ($umode eq 'none') { |
{ |
{ |
my $pf = IO::File->new("> $passfilename"); |
my $pf = IO::File->new("> $passfilename"); |
print $pf "none:\n"; |
if($pf) { |
|
print $pf "none:\n"; |
|
} else { |
|
$result = "pass_file_failed_error"; |
|
} |
} |
} |
} else { |
} else { |
$result="auth_mode_error\n"; |
$result="auth_mode_error\n"; |
Line 5459 sub make_passwd_file {
|
Line 5474 sub make_passwd_file {
|
return $result; |
return $result; |
} |
} |
|
|
|
sub convert_photo { |
|
my ($start,$dest)=@_; |
|
system("convert $start $dest"); |
|
} |
|
|
sub sethost { |
sub sethost { |
my ($remotereq) = @_; |
my ($remotereq) = @_; |
my (undef,$hostid)=split(/:/,$remotereq); |
my (undef,$hostid)=split(/:/,$remotereq); |