version 1.572, 2022/02/01 23:13:21
|
version 1.576, 2022/07/25 23:31:40
|
Line 259 my %trust = (
|
Line 259 my %trust = (
|
instidrules => {remote => 1, domroles => 1,}, |
instidrules => {remote => 1, domroles => 1,}, |
instrulecheck => {remote => 1, enroll => 1, reqcrs => 1, domroles => 1}, |
instrulecheck => {remote => 1, enroll => 1, reqcrs => 1, domroles => 1}, |
instselfcreatecheck => {institutiononly => 1}, |
instselfcreatecheck => {institutiononly => 1}, |
|
instunamemapcheck => {remote => 1,}, |
instuserrules => {remote => 1, enroll => 1, reqcrs => 1, domroles => 1}, |
instuserrules => {remote => 1, enroll => 1, reqcrs => 1, domroles => 1}, |
keys => {remote => 1,}, |
keys => {remote => 1,}, |
load => {anywhere => 1}, |
load => {anywhere => 1}, |
Line 312 my %trust = (
|
Line 313 my %trust = (
|
tmpget => {institutiononly => 1}, |
tmpget => {institutiononly => 1}, |
tmpput => {remote => 1, othcoau => 1}, |
tmpput => {remote => 1, othcoau => 1}, |
tokenauthuserfile => {anywhere => 1}, |
tokenauthuserfile => {anywhere => 1}, |
|
unamemaprules => {remote => 1,}, |
unsub => {content => 1,}, |
unsub => {content => 1,}, |
update => {shared => 1}, |
update => {shared => 1}, |
updatebalcookie => {institutiononly => 1}, |
updatebalcookie => {institutiononly => 1}, |
Line 863 sub PushFile {
|
Line 865 sub PushFile {
|
|
|
if($filename eq "host") { |
if($filename eq "host") { |
$contents = AdjustHostContents($contents); |
$contents = AdjustHostContents($contents); |
} elsif (($filename eq 'dns_host') || ($filename eq 'dns_domain') || |
} elsif (($filename eq 'dns_hosts') || ($filename eq 'dns_domain') || |
($filename eq 'loncapaCAcrl')) { |
($filename eq 'loncapaCAcrl')) { |
if ($contents eq '') { |
if ($contents eq '') { |
&logthis('<font color="red"> Pushfile: unable to install ' |
&logthis('<font color="red"> Pushfile: unable to install ' |
Line 2655 sub update_passwd_history {
|
Line 2657 sub update_passwd_history {
|
return; |
return; |
} |
} |
|
|
|
sub inst_unamemap_check { |
|
my ($cmd, $tail, $client) = @_; |
|
my $userinput = "$cmd:$tail"; |
|
my %rulecheck; |
|
my $outcome; |
|
my ($udom,$uname,@rules) = split(/:/,$tail); |
|
$udom = &unescape($udom); |
|
$uname = &unescape($uname); |
|
@rules = map {&unescape($_);} (@rules); |
|
eval { |
|
local($SIG{__DIE__})='DEFAULT'; |
|
$outcome = &localenroll::unamemap_check($udom,$uname,\@rules,\%rulecheck); |
|
}; |
|
if (!$@) { |
|
if ($outcome eq 'ok') { |
|
my $result=''; |
|
foreach my $key (keys(%rulecheck)) { |
|
$result.=&escape($key).'='.&Apache::lonnet::freeze_escape($rulecheck{$key}).'&'; |
|
} |
|
&Reply($client,\$result,$userinput); |
|
} else { |
|
&Reply($client,"error\n", $userinput); |
|
} |
|
} else { |
|
&Failure($client,"unknown_cmd\n",$userinput); |
|
} |
|
} |
|
®ister_handler("instunamemapcheck",\&inst_unamemap_check,0,1,0); |
|
|
|
|
# |
# |
# Determines if this is the home server for a user. The home server |
# Determines if this is the home server for a user. The home server |
# for a user will have his/her lon-capa passwd file. Therefore all we need |
# for a user will have his/her lon-capa passwd file. Therefore all we need |
Line 5142 sub get_domain_handler {
|
Line 5174 sub get_domain_handler {
|
my $userinput = "$cmd:$tail"; |
my $userinput = "$cmd:$tail"; |
|
|
my ($udom,$namespace,$what)=split(/:/,$tail,3); |
my ($udom,$namespace,$what)=split(/:/,$tail,3); |
if ($namespace =~ /^enc/) { |
if (($namespace =~ /^enc/) || ($namespace eq 'private')) { |
&Failure( $client, "refused\n", $userinput); |
&Failure( $client, "refused\n", $userinput); |
} else { |
} else { |
my $res = LONCAPA::Lond::get_dom($userinput); |
my $res = LONCAPA::Lond::get_dom($userinput); |
Line 5181 sub encrypted_get_domain_handler {
|
Line 5213 sub encrypted_get_domain_handler {
|
|
|
my $userinput = "$cmd:$tail"; |
my $userinput = "$cmd:$tail"; |
|
|
my $res = LONCAPA::Lond::get_dom($userinput); |
my ($udom,$namespace,$what) = split(/:/,$tail,3); |
if ($res =~ /^error:/) { |
if ($namespace eq 'private') { |
&Failure($client, \$res, $userinput); |
&Failure( $client, "refused\n", $userinput); |
} else { |
} else { |
if ($cipher) { |
my $res = LONCAPA::Lond::get_dom($userinput); |
my $cmdlength=length($res); |
if ($res =~ /^error:/) { |
$res.=" "; |
&Failure($client, \$res, $userinput); |
my $encres=''; |
|
for (my $encidx=0;$encidx<=$cmdlength;$encidx+=8) { |
|
$encres.= unpack("H16", |
|
$cipher->encrypt(substr($res, |
|
$encidx, |
|
8))); |
|
} |
|
&Reply( $client,"enc:$cmdlength:$encres\n",$userinput); |
|
} else { |
} else { |
&Failure( $client, "error:no_key\n",$userinput); |
if ($cipher) { |
|
my $cmdlength=length($res); |
|
$res.=" "; |
|
my $encres=''; |
|
for (my $encidx=0;$encidx<=$cmdlength;$encidx+=8) { |
|
$encres.= unpack("H16", |
|
$cipher->encrypt(substr($res, |
|
$encidx, |
|
8))); |
|
} |
|
&Reply( $client,"enc:$cmdlength:$encres\n",$userinput); |
|
} else { |
|
&Failure( $client, "error:no_key\n",$userinput); |
|
} |
} |
} |
} |
} |
return 1; |
return 1; |
Line 6801 sub get_institutional_selfcreate_rules {
|
Line 6838 sub get_institutional_selfcreate_rules {
|
} |
} |
®ister_handler("instemailrules",\&get_institutional_selfcreate_rules,0,1,0); |
®ister_handler("instemailrules",\&get_institutional_selfcreate_rules,0,1,0); |
|
|
|
sub get_unamemap_rules { |
|
my ($cmd, $tail, $client) = @_; |
|
my $userinput = "$cmd:$tail"; |
|
my $dom = &unescape($tail); |
|
my (%rules_hash,@rules_order); |
|
my $outcome; |
|
eval { |
|
local($SIG{__DIE__})='DEFAULT'; |
|
$outcome = &localenroll::unamemap_rules($dom,\%rules_hash,\@rules_order); |
|
}; |
|
if (!$@) { |
|
if ($outcome eq 'ok') { |
|
my $result; |
|
foreach my $key (keys(%rules_hash)) { |
|
$result .= &escape($key).'='.&Apache::lonnet::freeze_escape($rules_hash{$key}).'&'; |
|
} |
|
$result =~ s/\&$//; |
|
$result .= ':'; |
|
if (@rules_order > 0) { |
|
foreach my $item (@rules_order) { |
|
$result .= &escape($item).'&'; |
|
} |
|
} |
|
$result =~ s/\&$//; |
|
&Reply($client,\$result,$userinput); |
|
} else { |
|
&Reply($client,"error\n", $userinput); |
|
} |
|
} else { |
|
&Failure($client,"unknown_cmd\n",$userinput); |
|
} |
|
} |
|
®ister_handler("unamemaprules",\&get_unamemap_rules,0,1,0); |
|
|
sub institutional_username_check { |
sub institutional_username_check { |
my ($cmd, $tail, $client) = @_; |
my ($cmd, $tail, $client) = @_; |
Line 8382 sub validate_user {
|
Line 8452 sub validate_user {
|
} elsif ((($domdefaults{'auth_def'} eq 'krb4') || |
} elsif ((($domdefaults{'auth_def'} eq 'krb4') || |
($domdefaults{'auth_def'} eq 'krb5')) && |
($domdefaults{'auth_def'} eq 'krb5')) && |
($domdefaults{'auth_arg_def'} ne '')) { |
($domdefaults{'auth_arg_def'} ne '')) { |
$howpwd = $domdefaults{'auth_def'}; |
# |
$contentpwd = $domdefaults{'auth_arg_def'}; |
# Don't attempt authentication for username and password supplied |
|
# for user without an account if uername contains @ to avoid |
|
# call to &Authen::Krb5::parse_name() which will result in con_lost |
|
# |
|
unless ($user =~ /\@/) { |
|
$howpwd = $domdefaults{'auth_def'}; |
|
$contentpwd = $domdefaults{'auth_arg_def'}; |
|
} |
} |
} |
} |
} |
} |
} |