version 1.571, 2021/12/21 13:57:47
|
version 1.573, 2022/02/16 00:06:08
|
Line 266 my %trust = (
|
Line 266 my %trust = (
|
ls => {remote => 1, enroll => 1, content => 1,}, |
ls => {remote => 1, enroll => 1, content => 1,}, |
ls2 => {remote => 1, enroll => 1, content => 1,}, |
ls2 => {remote => 1, enroll => 1, content => 1,}, |
ls3 => {remote => 1, enroll => 1, content => 1,}, |
ls3 => {remote => 1, enroll => 1, content => 1,}, |
|
lti => {institutiononly => 1}, |
makeuser => {remote => 1, enroll => 1, domroles => 1,}, |
makeuser => {remote => 1, enroll => 1, domroles => 1,}, |
mkdiruserfile => {remote => 1, enroll => 1,}, |
mkdiruserfile => {remote => 1, enroll => 1,}, |
newput => {remote => 1, enroll => 1, reqcrs => 1, domroles => 1,}, |
newput => {remote => 1, enroll => 1, reqcrs => 1, domroles => 1,}, |
Line 5141 sub get_domain_handler {
|
Line 5142 sub get_domain_handler {
|
my $userinput = "$cmd:$tail"; |
my $userinput = "$cmd:$tail"; |
|
|
my ($udom,$namespace,$what)=split(/:/,$tail,3); |
my ($udom,$namespace,$what)=split(/:/,$tail,3); |
if ($namespace =~ /^enc/) { |
if (($namespace =~ /^enc/) || ($namespace eq 'private')) { |
&Failure( $client, "refused\n", $userinput); |
&Failure( $client, "refused\n", $userinput); |
} else { |
} else { |
my $res = LONCAPA::Lond::get_dom($userinput); |
my $res = LONCAPA::Lond::get_dom($userinput); |
Line 5156 sub get_domain_handler {
|
Line 5157 sub get_domain_handler {
|
} |
} |
®ister_handler("getdom", \&get_domain_handler, 0, 1, 0); |
®ister_handler("getdom", \&get_domain_handler, 0, 1, 0); |
|
|
|
# |
|
# Encrypted get from the namespace database file at the domain level. |
|
# This function retrieves a keyed item from a specific named database in the |
|
# domain directory. |
|
# |
|
# Parameters: |
|
# $cmd - Command request keyword (egetdom). |
|
# $tail - Tail of the command. This is a colon separated list |
|
# consisting of the domain and the 'namespace' |
|
# which selects the gdbm file to do the lookup in, |
|
# & separated list of keys to lookup. Note that |
|
# the values are returned as an & separated list too. |
|
# $client - File descriptor open on the client. |
|
# Returns: |
|
# 1 - Continue processing. |
|
# 0 - Exit. |
|
# Side effects: |
|
# reply is encrypted before being written to $client. |
|
# |
sub encrypted_get_domain_handler { |
sub encrypted_get_domain_handler { |
my ($cmd, $tail, $client) = @_; |
my ($cmd, $tail, $client) = @_; |
|
|
my $userinput = "$cmd:$tail"; |
my $userinput = "$cmd:$tail"; |
|
|
my $res = LONCAPA::Lond::get_dom($userinput); |
my ($udom,$namespace,$what) = split(/:/,$tail,3); |
|
if ($namespace eq 'private') { |
|
&Failure( $client, "refused\n", $userinput); |
|
} else { |
|
my $res = LONCAPA::Lond::get_dom($userinput); |
|
if ($res =~ /^error:/) { |
|
&Failure($client, \$res, $userinput); |
|
} else { |
|
if ($cipher) { |
|
my $cmdlength=length($res); |
|
$res.=" "; |
|
my $encres=''; |
|
for (my $encidx=0;$encidx<=$cmdlength;$encidx+=8) { |
|
$encres.= unpack("H16", |
|
$cipher->encrypt(substr($res, |
|
$encidx, |
|
8))); |
|
} |
|
&Reply( $client,"enc:$cmdlength:$encres\n",$userinput); |
|
} else { |
|
&Failure( $client, "error:no_key\n",$userinput); |
|
} |
|
} |
|
} |
|
return 1; |
|
} |
|
®ister_handler("egetdom", \&encrypted_get_domain_handler, 1, 1, 0); |
|
|
|
# |
|
# Encrypted get from the namespace database file at the domain level. |
|
# This function retrieves a keyed item from a specific named database in the |
|
# domain directory. |
|
# |
|
# Parameters: |
|
# $cmd - Command request keyword (lti). |
|
# $tail - Tail of the command. This is a colon-separated list |
|
# consisting of the domain, coursenum, if for LTI- |
|
# enabled deep-linking to course content using |
|
# link protection configured within a course, |
|
# context (=deeplink) if for LTI-enabled deep-linking |
|
# to course content using LTI Provider settings |
|
# configured within a course's domain, the (escaped) |
|
# launch URL, the (escaped) method (typically POST), |
|
# and a frozen hash of the LTI launch parameters |
|
# from the LTI payload. |
|
# $client - File descriptor open on the client. |
|
# Returns: |
|
# 1 - Continue processing. |
|
# 0 - Exit. |
|
# Side effects: |
|
# The reply will contain an LTI itemID, if the signed LTI payload |
|
# could be verified using the consumer key and the shared secret |
|
# available for that key (for the itemID) for either the course or domain, |
|
# depending on values for cnum and context. The reply is encrypted before |
|
# being written to $client. |
|
# |
|
sub lti_handler { |
|
my ($cmd, $tail, $client) = @_; |
|
|
|
my $userinput = "$cmd:$tail"; |
|
|
|
my ($cdom,$cnum,$context,$escurl,$escmethod,$items) = split(/:/,$tail); |
|
my $url = &unescape($escurl); |
|
my $method = &unescape($escmethod); |
|
my $params = &Apache::lonnet::thaw_unescape($items); |
|
my $res; |
|
if ($cnum ne '') { |
|
$res = &LONCAPA::Lond::crslti_itemid($cdom,$cnum,$url,$method,$params,$perlvar{'lonVersion'}); |
|
} else { |
|
$res = &LONCAPA::Lond::domlti_itemid($cdom,$context,$url,$method,$params,$perlvar{'lonVersion'}); |
|
} |
if ($res =~ /^error:/) { |
if ($res =~ /^error:/) { |
&Failure($client, \$res, $userinput); |
&Failure($client, \$res, $userinput); |
} else { |
} else { |
Line 5182 sub encrypted_get_domain_handler {
|
Line 5272 sub encrypted_get_domain_handler {
|
} |
} |
return 1; |
return 1; |
} |
} |
®ister_handler("egetdom", \&encrypted_get_domain_handler, 1, 1, 0); |
®ister_handler("lti", \<i_handler, 1, 1, 0); |
|
|
# |
# |
# Puts an id to a domains id database. |
# Puts an id to a domains id database. |