version 1.489.2.32, 2019/08/01 18:17:02
|
version 1.489.2.38, 2020/05/05 20:28:56
|
Line 2107 sub change_password_handler {
|
Line 2107 sub change_password_handler {
|
} |
} |
if($validated) { |
if($validated) { |
my $realpasswd = &get_auth_type($udom, $uname); # Defined since authd. |
my $realpasswd = &get_auth_type($udom, $uname); # Defined since authd. |
|
|
my ($howpwd,$contentpwd)=split(/:/,$realpasswd); |
my ($howpwd,$contentpwd)=split(/:/,$realpasswd); |
|
my $notunique; |
if ($howpwd eq 'internal') { |
if ($howpwd eq 'internal') { |
&Debug("internal auth"); |
&Debug("internal auth"); |
my $ncpass = &hash_passwd($udom,$npass); |
my $ncpass = &hash_passwd($udom,$npass); |
if(&rewrite_password_file($udom, $uname, "internal:$ncpass")) { |
my (undef,$method,@rest) = split(/!/,$contentpwd); |
|
if ($method eq 'bcrypt') { |
|
my %passwdconf = &Apache::lonnet::get_passwdconf($udom); |
|
if (($passwdconf{'numsaved'}) && ($passwdconf{'numsaved'} =~ /^\d+$/)) { |
|
my @oldpasswds; |
|
my $userpath = &propath($udom,$uname); |
|
my $fullpath = $userpath.'/oldpasswds'; |
|
if (-d $userpath) { |
|
my @oldfiles; |
|
if (-e $fullpath) { |
|
if (opendir(my $dir,$fullpath)) { |
|
(@oldfiles) = grep(/^\d+$/,readdir($dir)); |
|
closedir($dir); |
|
} |
|
if (@oldfiles) { |
|
@oldfiles = sort { $b <=> $a } (@oldfiles); |
|
my $numremoved = 0; |
|
for (my $i=0; $i<@oldfiles; $i++) { |
|
if ($i>=$passwdconf{'numsaved'}) { |
|
if (-f "$fullpath/$oldfiles[$i]") { |
|
if (unlink("$fullpath/$oldfiles[$i]")) { |
|
$numremoved ++; |
|
} |
|
} |
|
} elsif (open(my $fh,'<',"$fullpath/$oldfiles[$i]")) { |
|
while (my $line = <$fh>) { |
|
push(@oldpasswds,$line); |
|
} |
|
close($fh); |
|
} |
|
} |
|
if ($numremoved) { |
|
&logthis("unlinked $numremoved old password files for $uname:$udom"); |
|
} |
|
} |
|
} |
|
push(@oldpasswds,$contentpwd); |
|
foreach my $item (@oldpasswds) { |
|
my (undef,$method,@rest) = split(/!/,$item); |
|
if ($method eq 'bcrypt') { |
|
my $result = &hash_passwd($udom,$npass,@rest); |
|
if ($result eq $item) { |
|
$notunique = 1; |
|
last; |
|
} |
|
} |
|
} |
|
unless ($notunique) { |
|
unless (-e $fullpath) { |
|
if (&mkpath("$fullpath/")) { |
|
chmod(0700,$fullpath); |
|
} |
|
} |
|
if (-d $fullpath) { |
|
my $now = time; |
|
if (open(my $fh,'>',"$fullpath/$now")) { |
|
print $fh $contentpwd; |
|
close($fh); |
|
chmod(0400,"$fullpath/$now"); |
|
} |
|
} |
|
} |
|
} |
|
} |
|
} |
|
if ($notunique) { |
|
my $msg="Result of password change for $uname:$udom - password matches one used before"; |
|
if ($lonhost) { |
|
$msg .= " - request originated from: $lonhost"; |
|
} |
|
&logthis($msg); |
|
&Reply($client, "prioruse\n", $userinput); |
|
} elsif (&rewrite_password_file($udom, $uname, "internal:$ncpass")) { |
my $msg="Result of password change for $uname: pwchange_success"; |
my $msg="Result of password change for $uname: pwchange_success"; |
if ($lonhost) { |
if ($lonhost) { |
$msg .= " - request originated from: $lonhost"; |
$msg .= " - request originated from: $lonhost"; |
Line 2140 sub change_password_handler {
|
Line 2212 sub change_password_handler {
|
# |
# |
&Failure( $client, "auth_mode_error\n", $userinput); |
&Failure( $client, "auth_mode_error\n", $userinput); |
} |
} |
|
|
} else { |
} else { |
if ($failure eq '') { |
if ($failure eq '') { |
$failure = 'non_authorized'; |
$failure = 'non_authorized'; |
Line 4505 sub course_lastaccess_handler {
|
Line 4576 sub course_lastaccess_handler {
|
} |
} |
®ister_handler("courselastaccess",\&course_lastaccess_handler, 0, 1, 0); |
®ister_handler("courselastaccess",\&course_lastaccess_handler, 0, 1, 0); |
|
|
|
sub course_sessions_handler { |
|
my ($cmd, $tail, $client) = @_; |
|
my $userinput = "$cmd:$tail"; |
|
my ($cdom,$cnum,$lastactivity) = split(':',$tail); |
|
my $dbsuffix = '_'.$cdom.'_'.$cnum.'.db'; |
|
my (%sessions,$qresult); |
|
my $now=time; |
|
if (opendir(DIR,$perlvar{'lonIDsDir'})) { |
|
my $filename; |
|
while ($filename=readdir(DIR)) { |
|
next if ($filename=~/^\./); |
|
next if ($filename=~/^publicuser_/); |
|
next if ($filename=~/^[a-f0-9]+_(linked|lti_\d+)\.id$/); |
|
if ($filename =~ /^($LONCAPA::match_username)_\d+_($LONCAPA::match_domain)_/) { |
|
my ($uname,$udom) = ($1,$2); |
|
next unless (-e "$perlvar{'lonDaemons'}/tmp/$uname$dbsuffix"); |
|
my $mtime = (stat("$perlvar{'lonIDsDir'}/$filename"))[9]; |
|
if ($lastactivity < 0) { |
|
next if ($mtime-$now > $lastactivity); |
|
} else { |
|
next if ($now-$mtime > $lastactivity); |
|
} |
|
$sessions{$uname.':'.$udom} = $mtime; |
|
} |
|
} |
|
closedir(DIR); |
|
} |
|
foreach my $user (keys(%sessions)) { |
|
$qresult.=&escape($user).'='.$sessions{$user}.'&'; |
|
} |
|
if ($qresult) { |
|
chop($qresult); |
|
} |
|
&Reply($client, \$qresult, $userinput); |
|
return 1; |
|
} |
|
®ister_handler("coursesessions",\&course_sessions_handler, 0, 1, 0); |
|
|
# |
# |
# Puts an unencrypted entry in a namespace db file at the domain level |
# Puts an unencrypted entry in a namespace db file at the domain level |
# |
# |
Line 4571 sub get_domain_handler {
|
Line 4680 sub get_domain_handler {
|
my ($cmd, $tail, $client) = @_; |
my ($cmd, $tail, $client) = @_; |
|
|
|
|
my $userinput = "$client:$tail"; |
my $userinput = "$cmd:$tail"; |
|
|
my ($udom,$namespace,$what)=split(/:/,$tail,3); |
my ($udom,$namespace,$what)=split(/:/,$tail,3); |
chomp($what); |
chomp($what); |
Line 5599 sub auto_export_grades_handler {
|
Line 5708 sub auto_export_grades_handler {
|
return 1; |
return 1; |
} |
} |
®ister_handler("autoexportgrades", \&auto_export_grades_handler, |
®ister_handler("autoexportgrades", \&auto_export_grades_handler, |
0, 1, 0); |
1, 1, 0); |
|
|
|
|
# Retrieve and remove temporary files created by/during autoenrollment. |
# Retrieve and remove temporary files created by/during autoenrollment. |