version 1.557, 2019/02/11 17:01:34
|
version 1.564, 2020/10/22 19:23:22
|
Line 220 my %trust = (
|
Line 220 my %trust = (
|
courseidput => {remote => 1, domroles => 1, enroll => 1}, |
courseidput => {remote => 1, domroles => 1, enroll => 1}, |
courseidputhash => {remote => 1, domroles => 1, enroll => 1}, |
courseidputhash => {remote => 1, domroles => 1, enroll => 1}, |
courselastaccess => {remote => 1, domroles => 1, enroll => 1}, |
courselastaccess => {remote => 1, domroles => 1, enroll => 1}, |
|
coursesessions => {institutiononly => 1}, |
currentauth => {remote => 1, domroles => 1, enroll => 1}, |
currentauth => {remote => 1, domroles => 1, enroll => 1}, |
currentdump => {remote => 1, enroll => 1}, |
currentdump => {remote => 1, enroll => 1}, |
currentversion => {remote=> 1, content => 1}, |
currentversion => {remote=> 1, content => 1}, |
Line 227 my %trust = (
|
Line 228 my %trust = (
|
dcmailput => {remote => 1, domroles => 1}, |
dcmailput => {remote => 1, domroles => 1}, |
del => {remote => 1, domroles => 1, enroll => 1, content => 1}, |
del => {remote => 1, domroles => 1, enroll => 1, content => 1}, |
delbalcookie => {institutiononly => 1}, |
delbalcookie => {institutiononly => 1}, |
|
delusersession => {institutiononly => 1}, |
deldom => {remote => 1, domroles => 1}, # not currently used |
deldom => {remote => 1, domroles => 1}, # not currently used |
devalidatecache => {institutiononly => 1}, |
devalidatecache => {institutiononly => 1}, |
domroleput => {remote => 1, enroll => 1}, |
domroleput => {remote => 1, enroll => 1}, |
Line 308 my %trust = (
|
Line 310 my %trust = (
|
tokenauthuserfile => {anywhere => 1}, |
tokenauthuserfile => {anywhere => 1}, |
unsub => {content => 1,}, |
unsub => {content => 1,}, |
update => {shared => 1}, |
update => {shared => 1}, |
|
updatebalcookie => {institutiononly => 1}, |
updateclickers => {remote => 1}, |
updateclickers => {remote => 1}, |
userhassession => {anywhere => 1}, |
userhassession => {anywhere => 1}, |
userload => {anywhere => 1}, |
userload => {anywhere => 1}, |
Line 2030 sub read_lonnet_global {
|
Line 2033 sub read_lonnet_global {
|
} |
} |
if ($what eq 'perlvar') { |
if ($what eq 'perlvar') { |
if (!exists($packagevars{$what}{'lonBalancer'})) { |
if (!exists($packagevars{$what}{'lonBalancer'})) { |
if ($dist =~ /^(centos|rhes|fedora|scientific)/) { |
if ($dist =~ /^(centos|rhes|fedora|scientific|oracle)/) { |
my $othervarref=LONCAPA::Configuration::read_conf('httpd.conf'); |
my $othervarref=LONCAPA::Configuration::read_conf('httpd.conf'); |
if (ref($othervarref) eq 'HASH') { |
if (ref($othervarref) eq 'HASH') { |
$items->{'lonBalancer'} = $othervarref->{'lonBalancer'}; |
$items->{'lonBalancer'} = $othervarref->{'lonBalancer'}; |
Line 2348 sub change_password_handler {
|
Line 2351 sub change_password_handler {
|
} |
} |
if($validated) { |
if($validated) { |
my $realpasswd = &get_auth_type($udom, $uname); # Defined since authd. |
my $realpasswd = &get_auth_type($udom, $uname); # Defined since authd. |
|
|
my ($howpwd,$contentpwd)=split(/:/,$realpasswd); |
my ($howpwd,$contentpwd)=split(/:/,$realpasswd); |
|
my $notunique; |
if ($howpwd eq 'internal') { |
if ($howpwd eq 'internal') { |
&Debug("internal auth"); |
&Debug("internal auth"); |
my $ncpass = &hash_passwd($udom,$npass); |
my $ncpass = &hash_passwd($udom,$npass); |
if(&rewrite_password_file($udom, $uname, "internal:$ncpass")) { |
my (undef,$method,@rest) = split(/!/,$contentpwd); |
|
if ($method eq 'bcrypt') { |
|
my %passwdconf = &Apache::lonnet::get_passwdconf($udom); |
|
if (($passwdconf{'numsaved'}) && ($passwdconf{'numsaved'} =~ /^\d+$/)) { |
|
my @oldpasswds; |
|
my $userpath = &propath($udom,$uname); |
|
my $fullpath = $userpath.'/oldpasswds'; |
|
if (-d $userpath) { |
|
my @oldfiles; |
|
if (-e $fullpath) { |
|
if (opendir(my $dir,$fullpath)) { |
|
(@oldfiles) = grep(/^\d+$/,readdir($dir)); |
|
closedir($dir); |
|
} |
|
if (@oldfiles) { |
|
@oldfiles = sort { $b <=> $a } (@oldfiles); |
|
my $numremoved = 0; |
|
for (my $i=0; $i<@oldfiles; $i++) { |
|
if ($i>=$passwdconf{'numsaved'}) { |
|
if (-f "$fullpath/$oldfiles[$i]") { |
|
if (unlink("$fullpath/$oldfiles[$i]")) { |
|
$numremoved ++; |
|
} |
|
} |
|
} elsif (open(my $fh,'<',"$fullpath/$oldfiles[$i]")) { |
|
while (my $line = <$fh>) { |
|
push(@oldpasswds,$line); |
|
} |
|
close($fh); |
|
} |
|
} |
|
if ($numremoved) { |
|
&logthis("unlinked $numremoved old password files for $uname:$udom"); |
|
} |
|
} |
|
} |
|
push(@oldpasswds,$contentpwd); |
|
foreach my $item (@oldpasswds) { |
|
my (undef,$method,@rest) = split(/!/,$item); |
|
if ($method eq 'bcrypt') { |
|
my $result = &hash_passwd($udom,$npass,@rest); |
|
if ($result eq $item) { |
|
$notunique = 1; |
|
last; |
|
} |
|
} |
|
} |
|
unless ($notunique) { |
|
unless (-e $fullpath) { |
|
if (&mkpath("$fullpath/")) { |
|
chmod(0700,$fullpath); |
|
} |
|
} |
|
if (-d $fullpath) { |
|
my $now = time; |
|
if (open(my $fh,'>',"$fullpath/$now")) { |
|
print $fh $contentpwd; |
|
close($fh); |
|
chmod(0400,"$fullpath/$now"); |
|
} |
|
} |
|
} |
|
} |
|
} |
|
} |
|
if ($notunique) { |
|
my $msg="Result of password change for $uname:$udom - password matches one used before"; |
|
if ($lonhost) { |
|
$msg .= " - request originated from: $lonhost"; |
|
} |
|
&logthis($msg); |
|
&Reply($client, "prioruse\n", $userinput); |
|
} elsif (&rewrite_password_file($udom, $uname, "internal:$ncpass")) { |
my $msg="Result of password change for $uname: pwchange_success"; |
my $msg="Result of password change for $uname: pwchange_success"; |
if ($lonhost) { |
if ($lonhost) { |
$msg .= " - request originated from: $lonhost"; |
$msg .= " - request originated from: $lonhost"; |
Line 2370 sub change_password_handler {
|
Line 2445 sub change_password_handler {
|
my $result = &change_unix_password($uname, $npass); |
my $result = &change_unix_password($uname, $npass); |
if ($result eq 'ok') { |
if ($result eq 'ok') { |
&update_passwd_history($uname,$udom,$howpwd,$context); |
&update_passwd_history($uname,$udom,$howpwd,$context); |
} |
} |
&logthis("Result of password change for $uname: ". |
&logthis("Result of password change for $uname: ". |
$result); |
$result); |
&Reply($client, \$result, $userinput); |
&Reply($client, \$result, $userinput); |
Line 2381 sub change_password_handler {
|
Line 2456 sub change_password_handler {
|
# |
# |
&Failure( $client, "auth_mode_error\n", $userinput); |
&Failure( $client, "auth_mode_error\n", $userinput); |
} |
} |
|
|
} else { |
} else { |
if ($failure eq '') { |
if ($failure eq '') { |
$failure = 'non_authorized'; |
$failure = 'non_authorized'; |
Line 2962 sub user_has_session_handler {
|
Line 3036 sub user_has_session_handler {
|
} |
} |
®ister_handler("userhassession", \&user_has_session_handler, 0,1,0); |
®ister_handler("userhassession", \&user_has_session_handler, 0,1,0); |
|
|
|
sub del_usersession_handler { |
|
my ($cmd, $tail, $client) = @_; |
|
|
|
my $result; |
|
my ($udom, $uname) = map { &unescape($_) } (split(/:/, $tail)); |
|
if (($udom =~ /^$LONCAPA::match_domain$/) && ($uname =~ /^$LONCAPA::match_username$/)) { |
|
my $lonidsdir = $perlvar{'lonIDsDir'}; |
|
if (-d $lonidsdir) { |
|
if (opendir(DIR,$lonidsdir)) { |
|
my $filename; |
|
while ($filename=readdir(DIR)) { |
|
if ($filename=~/^\Q$uname\E_\d+_\Q$udom\E_/) { |
|
if (tie(my %oldenv,'GDBM_File',"$lonidsdir/$filename", |
|
&GDBM_READER(),0640)) { |
|
my $linkedfile; |
|
if (exists($oldenv{'user.linkedenv'})) { |
|
$linkedfile = $oldenv{'user.linkedenv'}; |
|
} |
|
untie(%oldenv); |
|
$result = unlink("$lonidsdir/$filename"); |
|
if ($result) { |
|
if ($linkedfile =~ /^[a-f0-9]+_linked$/) { |
|
if (-l "$lonidsdir/$linkedfile.id") { |
|
unlink("$lonidsdir/$linkedfile.id"); |
|
} |
|
} |
|
} |
|
} else { |
|
$result = unlink("$lonidsdir/$filename"); |
|
} |
|
last; |
|
} |
|
} |
|
} |
|
} |
|
if ($result == 1) { |
|
&Reply($client, "$result\n", "$cmd:$tail"); |
|
} else { |
|
&Reply($client, "not_found\n", "$cmd:$tail"); |
|
} |
|
} else { |
|
&Failure($client, "invalid_user\n", "$cmd:$tail"); |
|
} |
|
return 1; |
|
} |
|
|
|
®ister_handler("delusersession", \&del_usersession_handler, 0,1,0); |
|
|
# |
# |
# Authenticate access to a user file by checking that the token the user's |
# Authenticate access to a user file by checking that the token the user's |
# passed also exists in their session file |
# passed also exists in their session file |
Line 4753 sub course_lastaccess_handler {
|
Line 4875 sub course_lastaccess_handler {
|
} |
} |
®ister_handler("courselastaccess",\&course_lastaccess_handler, 0, 1, 0); |
®ister_handler("courselastaccess",\&course_lastaccess_handler, 0, 1, 0); |
|
|
|
sub course_sessions_handler { |
|
my ($cmd, $tail, $client) = @_; |
|
my $userinput = "$cmd:$tail"; |
|
my ($cdom,$cnum,$lastactivity) = split(':',$tail); |
|
my $dbsuffix = '_'.$cdom.'_'.$cnum.'.db'; |
|
my (%sessions,$qresult); |
|
my $now=time; |
|
if (opendir(DIR,$perlvar{'lonIDsDir'})) { |
|
my $filename; |
|
while ($filename=readdir(DIR)) { |
|
next if ($filename=~/^\./); |
|
next if ($filename=~/^publicuser_/); |
|
next if ($filename=~/^[a-f0-9]+_(linked|lti_\d+)\.id$/); |
|
if ($filename =~ /^($LONCAPA::match_username)_\d+_($LONCAPA::match_domain)_/) { |
|
my ($uname,$udom) = ($1,$2); |
|
next unless (-e "$perlvar{'lonDaemons'}/tmp/$uname$dbsuffix"); |
|
my $mtime = (stat("$perlvar{'lonIDsDir'}/$filename"))[9]; |
|
if ($lastactivity < 0) { |
|
next if ($mtime-$now > $lastactivity); |
|
} else { |
|
next if ($now-$mtime > $lastactivity); |
|
} |
|
$sessions{$uname.':'.$udom} = $mtime; |
|
} |
|
} |
|
closedir(DIR); |
|
} |
|
foreach my $user (keys(%sessions)) { |
|
$qresult.=&escape($user).'='.$sessions{$user}.'&'; |
|
} |
|
if ($qresult) { |
|
chop($qresult); |
|
} |
|
&Reply($client, \$qresult, $userinput); |
|
return 1; |
|
} |
|
®ister_handler("coursesessions",\&course_sessions_handler, 0, 1, 0); |
|
|
# |
# |
# Puts an unencrypted entry in a namespace db file at the domain level |
# Puts an unencrypted entry in a namespace db file at the domain level |
# |
# |
Line 5524 sub tmp_del_handler {
|
Line 5684 sub tmp_del_handler {
|
®ister_handler("tmpdel", \&tmp_del_handler, 0, 1, 0); |
®ister_handler("tmpdel", \&tmp_del_handler, 0, 1, 0); |
|
|
# |
# |
|
# Process the updatebalcookie command. This command updates a |
|
# cookie in the lonBalancedir directory on a load balancer node. |
|
# |
|
# Parameters: |
|
# $cmd - Command that got us here. |
|
# $tail - Tail of the request (escaped cookie: escaped current entry) |
|
# |
|
# $client - socket open on the client process. |
|
# |
|
# Returns: |
|
# 1 - Indicating processing should continue. |
|
# Side Effects: |
|
# A cookie file is updated from the lonBalancedir directory |
|
# A reply is sent to the client. |
|
# |
|
sub update_balcookie_handler { |
|
my ($cmd, $tail, $client) = @_; |
|
|
|
my $userinput= "$cmd:$tail"; |
|
chomp($tail); |
|
my ($cookie,$lastentry) = map { &unescape($_) } (split(/:/,$tail)); |
|
|
|
my $updatedone; |
|
if ($cookie =~ /^$LONCAPA::match_domain\_$LONCAPA::match_username\_[a-f0-9]{32}$/) { |
|
my $execdir=$perlvar{'lonBalanceDir'}; |
|
if (-e "$execdir/$cookie.id") { |
|
my $doupdate; |
|
if (open(my $fh,'<',"$execdir/$cookie.id")) { |
|
while (my $line = <$fh>) { |
|
chomp($line); |
|
if ($line eq $lastentry) { |
|
$doupdate = 1; |
|
last; |
|
} |
|
} |
|
close($fh); |
|
} |
|
if ($doupdate) { |
|
if (open(my $fh,'>',"$execdir/$cookie.id")) { |
|
print $fh $clientname; |
|
close($fh); |
|
$updatedone = 1; |
|
} |
|
} |
|
} |
|
} |
|
if ($updatedone) { |
|
&Reply($client, "ok\n", $userinput); |
|
} else { |
|
&Failure( $client, "error: ".($!+0)."file update failed ". |
|
"while attempting updatebalcookie\n", $userinput); |
|
} |
|
return 1; |
|
} |
|
®ister_handler("updatebalcookie", \&update_balcookie_handler, 0, 1, 0); |
|
|
|
# |
# Process the delbalcookie command. This command deletes a balancer |
# Process the delbalcookie command. This command deletes a balancer |
# cookie in the lonBalancedir directory created by switchserver |
# cookie in the lonBalancedir directory on a load balancer node. |
# |
# |
# Parameters: |
# Parameters: |
# $cmd - Command that got us here. |
# $cmd - Command that got us here. |
Line 5543 sub del_balcookie_handler {
|
Line 5760 sub del_balcookie_handler {
|
my $userinput= "$cmd:$cookie"; |
my $userinput= "$cmd:$cookie"; |
|
|
chomp($cookie); |
chomp($cookie); |
|
$cookie = &unescape($cookie); |
my $deleted = ''; |
my $deleted = ''; |
if ($cookie =~ /^$LONCAPA::match_domain\_$LONCAPA::match_username\_[a-f0-9]{32}$/) { |
if ($cookie =~ /^$LONCAPA::match_domain\_$LONCAPA::match_username\_[a-f0-9]{32}$/) { |
my $execdir=$perlvar{'lonBalanceDir'}; |
my $execdir=$perlvar{'lonBalanceDir'}; |
Line 7471 sub make_new_child {
|
Line 7689 sub make_new_child {
|
&Authen::Krb5::init_context(); |
&Authen::Krb5::init_context(); |
|
|
my $no_ets; |
my $no_ets; |
if ($dist =~ /^(?:centos|rhes|scientific)(\d+)$/) { |
if ($dist =~ /^(?:centos|rhes|scientific|oracle)(\d+)$/) { |
if ($1 >= 7) { |
if ($1 >= 7) { |
$no_ets = 1; |
$no_ets = 1; |
} |
} |