version 1.557, 2019/02/11 17:01:34
|
version 1.563, 2020/05/05 20:24:41
|
Line 220 my %trust = (
|
Line 220 my %trust = (
|
courseidput => {remote => 1, domroles => 1, enroll => 1}, |
courseidput => {remote => 1, domroles => 1, enroll => 1}, |
courseidputhash => {remote => 1, domroles => 1, enroll => 1}, |
courseidputhash => {remote => 1, domroles => 1, enroll => 1}, |
courselastaccess => {remote => 1, domroles => 1, enroll => 1}, |
courselastaccess => {remote => 1, domroles => 1, enroll => 1}, |
|
coursesessions => {institutiononly => 1}, |
currentauth => {remote => 1, domroles => 1, enroll => 1}, |
currentauth => {remote => 1, domroles => 1, enroll => 1}, |
currentdump => {remote => 1, enroll => 1}, |
currentdump => {remote => 1, enroll => 1}, |
currentversion => {remote=> 1, content => 1}, |
currentversion => {remote=> 1, content => 1}, |
Line 227 my %trust = (
|
Line 228 my %trust = (
|
dcmailput => {remote => 1, domroles => 1}, |
dcmailput => {remote => 1, domroles => 1}, |
del => {remote => 1, domroles => 1, enroll => 1, content => 1}, |
del => {remote => 1, domroles => 1, enroll => 1, content => 1}, |
delbalcookie => {institutiononly => 1}, |
delbalcookie => {institutiononly => 1}, |
|
delusersession => {institutiononly => 1}, |
deldom => {remote => 1, domroles => 1}, # not currently used |
deldom => {remote => 1, domroles => 1}, # not currently used |
devalidatecache => {institutiononly => 1}, |
devalidatecache => {institutiononly => 1}, |
domroleput => {remote => 1, enroll => 1}, |
domroleput => {remote => 1, enroll => 1}, |
Line 2030 sub read_lonnet_global {
|
Line 2032 sub read_lonnet_global {
|
} |
} |
if ($what eq 'perlvar') { |
if ($what eq 'perlvar') { |
if (!exists($packagevars{$what}{'lonBalancer'})) { |
if (!exists($packagevars{$what}{'lonBalancer'})) { |
if ($dist =~ /^(centos|rhes|fedora|scientific)/) { |
if ($dist =~ /^(centos|rhes|fedora|scientific|oracle)/) { |
my $othervarref=LONCAPA::Configuration::read_conf('httpd.conf'); |
my $othervarref=LONCAPA::Configuration::read_conf('httpd.conf'); |
if (ref($othervarref) eq 'HASH') { |
if (ref($othervarref) eq 'HASH') { |
$items->{'lonBalancer'} = $othervarref->{'lonBalancer'}; |
$items->{'lonBalancer'} = $othervarref->{'lonBalancer'}; |
Line 2348 sub change_password_handler {
|
Line 2350 sub change_password_handler {
|
} |
} |
if($validated) { |
if($validated) { |
my $realpasswd = &get_auth_type($udom, $uname); # Defined since authd. |
my $realpasswd = &get_auth_type($udom, $uname); # Defined since authd. |
|
|
my ($howpwd,$contentpwd)=split(/:/,$realpasswd); |
my ($howpwd,$contentpwd)=split(/:/,$realpasswd); |
|
my $notunique; |
if ($howpwd eq 'internal') { |
if ($howpwd eq 'internal') { |
&Debug("internal auth"); |
&Debug("internal auth"); |
my $ncpass = &hash_passwd($udom,$npass); |
my $ncpass = &hash_passwd($udom,$npass); |
if(&rewrite_password_file($udom, $uname, "internal:$ncpass")) { |
my (undef,$method,@rest) = split(/!/,$contentpwd); |
|
if ($method eq 'bcrypt') { |
|
my %passwdconf = &Apache::lonnet::get_passwdconf($udom); |
|
if (($passwdconf{'numsaved'}) && ($passwdconf{'numsaved'} =~ /^\d+$/)) { |
|
my @oldpasswds; |
|
my $userpath = &propath($udom,$uname); |
|
my $fullpath = $userpath.'/oldpasswds'; |
|
if (-d $userpath) { |
|
my @oldfiles; |
|
if (-e $fullpath) { |
|
if (opendir(my $dir,$fullpath)) { |
|
(@oldfiles) = grep(/^\d+$/,readdir($dir)); |
|
closedir($dir); |
|
} |
|
if (@oldfiles) { |
|
@oldfiles = sort { $b <=> $a } (@oldfiles); |
|
my $numremoved = 0; |
|
for (my $i=0; $i<@oldfiles; $i++) { |
|
if ($i>=$passwdconf{'numsaved'}) { |
|
if (-f "$fullpath/$oldfiles[$i]") { |
|
if (unlink("$fullpath/$oldfiles[$i]")) { |
|
$numremoved ++; |
|
} |
|
} |
|
} elsif (open(my $fh,'<',"$fullpath/$oldfiles[$i]")) { |
|
while (my $line = <$fh>) { |
|
push(@oldpasswds,$line); |
|
} |
|
close($fh); |
|
} |
|
} |
|
if ($numremoved) { |
|
&logthis("unlinked $numremoved old password files for $uname:$udom"); |
|
} |
|
} |
|
} |
|
push(@oldpasswds,$contentpwd); |
|
foreach my $item (@oldpasswds) { |
|
my (undef,$method,@rest) = split(/!/,$item); |
|
if ($method eq 'bcrypt') { |
|
my $result = &hash_passwd($udom,$npass,@rest); |
|
if ($result eq $item) { |
|
$notunique = 1; |
|
last; |
|
} |
|
} |
|
} |
|
unless ($notunique) { |
|
unless (-e $fullpath) { |
|
if (&mkpath("$fullpath/")) { |
|
chmod(0700,$fullpath); |
|
} |
|
} |
|
if (-d $fullpath) { |
|
my $now = time; |
|
if (open(my $fh,'>',"$fullpath/$now")) { |
|
print $fh $contentpwd; |
|
close($fh); |
|
chmod(0400,"$fullpath/$now"); |
|
} |
|
} |
|
} |
|
} |
|
} |
|
} |
|
if ($notunique) { |
|
my $msg="Result of password change for $uname:$udom - password matches one used before"; |
|
if ($lonhost) { |
|
$msg .= " - request originated from: $lonhost"; |
|
} |
|
&logthis($msg); |
|
&Reply($client, "prioruse\n", $userinput); |
|
} elsif (&rewrite_password_file($udom, $uname, "internal:$ncpass")) { |
my $msg="Result of password change for $uname: pwchange_success"; |
my $msg="Result of password change for $uname: pwchange_success"; |
if ($lonhost) { |
if ($lonhost) { |
$msg .= " - request originated from: $lonhost"; |
$msg .= " - request originated from: $lonhost"; |
Line 2370 sub change_password_handler {
|
Line 2444 sub change_password_handler {
|
my $result = &change_unix_password($uname, $npass); |
my $result = &change_unix_password($uname, $npass); |
if ($result eq 'ok') { |
if ($result eq 'ok') { |
&update_passwd_history($uname,$udom,$howpwd,$context); |
&update_passwd_history($uname,$udom,$howpwd,$context); |
} |
} |
&logthis("Result of password change for $uname: ". |
&logthis("Result of password change for $uname: ". |
$result); |
$result); |
&Reply($client, \$result, $userinput); |
&Reply($client, \$result, $userinput); |
Line 2381 sub change_password_handler {
|
Line 2455 sub change_password_handler {
|
# |
# |
&Failure( $client, "auth_mode_error\n", $userinput); |
&Failure( $client, "auth_mode_error\n", $userinput); |
} |
} |
|
|
} else { |
} else { |
if ($failure eq '') { |
if ($failure eq '') { |
$failure = 'non_authorized'; |
$failure = 'non_authorized'; |
Line 2962 sub user_has_session_handler {
|
Line 3035 sub user_has_session_handler {
|
} |
} |
®ister_handler("userhassession", \&user_has_session_handler, 0,1,0); |
®ister_handler("userhassession", \&user_has_session_handler, 0,1,0); |
|
|
|
sub del_usersession_handler { |
|
my ($cmd, $tail, $client) = @_; |
|
|
|
my $result; |
|
my ($udom, $uname) = map { &unescape($_) } (split(/:/, $tail)); |
|
if (($udom =~ /^$LONCAPA::match_domain$/) && ($uname =~ /^$LONCAPA::match_username$/)) { |
|
my $lonidsdir = $perlvar{'lonIDsDir'}; |
|
if (-d $lonidsdir) { |
|
if (opendir(DIR,$lonidsdir)) { |
|
my $filename; |
|
while ($filename=readdir(DIR)) { |
|
if ($filename=~/^\Q$uname\E_\d+_\Q$udom\E_/) { |
|
if (tie(my %oldenv,'GDBM_File',"$lonidsdir/$filename", |
|
&GDBM_READER(),0640)) { |
|
my $linkedfile; |
|
if (exists($oldenv{'user.linkedenv'})) { |
|
$linkedfile = $oldenv{'user.linkedenv'}; |
|
} |
|
untie(%oldenv); |
|
$result = unlink("$lonidsdir/$filename"); |
|
if ($result) { |
|
if ($linkedfile =~ /^[a-f0-9]+_linked$/) { |
|
if (-l "$lonidsdir/$linkedfile.id") { |
|
unlink("$lonidsdir/$linkedfile.id"); |
|
} |
|
} |
|
} |
|
} else { |
|
$result = unlink("$lonidsdir/$filename"); |
|
} |
|
last; |
|
} |
|
} |
|
} |
|
} |
|
if ($result == 1) { |
|
&Reply($client, "$result\n", "$cmd:$tail"); |
|
} else { |
|
&Reply($client, "not_found\n", "$cmd:$tail"); |
|
} |
|
} else { |
|
&Failure($client, "invalid_user\n", "$cmd:$tail"); |
|
} |
|
return 1; |
|
} |
|
|
|
®ister_handler("delusersession", \&del_usersession_handler, 0,1,0); |
|
|
# |
# |
# Authenticate access to a user file by checking that the token the user's |
# Authenticate access to a user file by checking that the token the user's |
# passed also exists in their session file |
# passed also exists in their session file |
Line 4753 sub course_lastaccess_handler {
|
Line 4874 sub course_lastaccess_handler {
|
} |
} |
®ister_handler("courselastaccess",\&course_lastaccess_handler, 0, 1, 0); |
®ister_handler("courselastaccess",\&course_lastaccess_handler, 0, 1, 0); |
|
|
|
sub course_sessions_handler { |
|
my ($cmd, $tail, $client) = @_; |
|
my $userinput = "$cmd:$tail"; |
|
my ($cdom,$cnum,$lastactivity) = split(':',$tail); |
|
my $dbsuffix = '_'.$cdom.'_'.$cnum.'.db'; |
|
my (%sessions,$qresult); |
|
my $now=time; |
|
if (opendir(DIR,$perlvar{'lonIDsDir'})) { |
|
my $filename; |
|
while ($filename=readdir(DIR)) { |
|
next if ($filename=~/^\./); |
|
next if ($filename=~/^publicuser_/); |
|
next if ($filename=~/^[a-f0-9]+_(linked|lti_\d+)\.id$/); |
|
if ($filename =~ /^($LONCAPA::match_username)_\d+_($LONCAPA::match_domain)_/) { |
|
my ($uname,$udom) = ($1,$2); |
|
next unless (-e "$perlvar{'lonDaemons'}/tmp/$uname$dbsuffix"); |
|
my $mtime = (stat("$perlvar{'lonIDsDir'}/$filename"))[9]; |
|
if ($lastactivity < 0) { |
|
next if ($mtime-$now > $lastactivity); |
|
} else { |
|
next if ($now-$mtime > $lastactivity); |
|
} |
|
$sessions{$uname.':'.$udom} = $mtime; |
|
} |
|
} |
|
closedir(DIR); |
|
} |
|
foreach my $user (keys(%sessions)) { |
|
$qresult.=&escape($user).'='.$sessions{$user}.'&'; |
|
} |
|
if ($qresult) { |
|
chop($qresult); |
|
} |
|
&Reply($client, \$qresult, $userinput); |
|
return 1; |
|
} |
|
®ister_handler("coursesessions",\&course_sessions_handler, 0, 1, 0); |
|
|
# |
# |
# Puts an unencrypted entry in a namespace db file at the domain level |
# Puts an unencrypted entry in a namespace db file at the domain level |
# |
# |
Line 7471 sub make_new_child {
|
Line 7630 sub make_new_child {
|
&Authen::Krb5::init_context(); |
&Authen::Krb5::init_context(); |
|
|
my $no_ets; |
my $no_ets; |
if ($dist =~ /^(?:centos|rhes|scientific)(\d+)$/) { |
if ($dist =~ /^(?:centos|rhes|scientific|oracle)(\d+)$/) { |
if ($1 >= 7) { |
if ($1 >= 7) { |
$no_ets = 1; |
$no_ets = 1; |
} |
} |