version 1.1515, 2023/10/02 21:01:22
|
version 1.1522, 2023/12/28 18:14:09
|
Line 2753 sub get_domain_defaults {
|
Line 2753 sub get_domain_defaults {
|
&get_dom('configuration',['defaults','quotas', |
&get_dom('configuration',['defaults','quotas', |
'requestcourses','inststatus', |
'requestcourses','inststatus', |
'coursedefaults','usersessions', |
'coursedefaults','usersessions', |
'requestauthor','selfenrollment', |
'requestauthor','authordefaults', |
'coursecategories','ssl','autoenroll', |
'selfenrollment','coursecategories', |
'trust','helpsettings','wafproxy', |
'ssl','autoenroll','trust', |
'ltisec','toolsec','domexttool', |
'helpsettings','wafproxy', |
'exttool','privacy'],$domain); |
'ltisec','toolsec','privacy'],$domain); |
my @coursetypes = ('official','unofficial','community','textbook','placement'); |
my @coursetypes = ('official','unofficial','community','textbook','placement'); |
if (ref($domconfig{'defaults'}) eq 'HASH') { |
if (ref($domconfig{'defaults'}) eq 'HASH') { |
$domdefaults{'lang_def'} = $domconfig{'defaults'}{'lang_def'}; |
$domdefaults{'lang_def'} = $domconfig{'defaults'}{'lang_def'}; |
Line 2783 sub get_domain_defaults {
|
Line 2783 sub get_domain_defaults {
|
} else { |
} else { |
$domdefaults{'defaultquota'} = $domconfig{'quotas'}; |
$domdefaults{'defaultquota'} = $domconfig{'quotas'}; |
} |
} |
my @usertools = ('aboutme','blog','webdav','portfolio'); |
my @usertools = ('aboutme','blog','webdav','portfolio','portaccess'); |
foreach my $item (@usertools) { |
foreach my $item (@usertools) { |
if (ref($domconfig{'quotas'}{$item}) eq 'HASH') { |
if (ref($domconfig{'quotas'}{$item}) eq 'HASH') { |
$domdefaults{$item} = $domconfig{'quotas'}{$item}; |
$domdefaults{$item} = $domconfig{'quotas'}{$item}; |
Line 2801 sub get_domain_defaults {
|
Line 2801 sub get_domain_defaults {
|
if (ref($domconfig{'requestauthor'}) eq 'HASH') { |
if (ref($domconfig{'requestauthor'}) eq 'HASH') { |
$domdefaults{'requestauthor'} = $domconfig{'requestauthor'}; |
$domdefaults{'requestauthor'} = $domconfig{'requestauthor'}; |
} |
} |
|
if (ref($domconfig{'authordefaults'}) eq 'HASH') { |
|
foreach my $item ('nocodemirror','copyright','sourceavail','domcoordacc','editors') { |
|
if ($item eq 'editors') { |
|
if (ref($domconfig{'authordefaults'}{'editors'}) eq 'ARRAY') { |
|
$domdefaults{$item} = join(',',@{$domconfig{'authordefaults'}{'editors'}}); |
|
} |
|
} else { |
|
$domdefaults{$item} = $domconfig{'authordefaults'}{$item}; |
|
} |
|
} |
|
} |
if (ref($domconfig{'inststatus'}) eq 'HASH') { |
if (ref($domconfig{'inststatus'}) eq 'HASH') { |
foreach my $item ('inststatustypes','inststatusorder','inststatusguest') { |
foreach my $item ('inststatustypes','inststatusorder','inststatusguest') { |
$domdefaults{$item} = $domconfig{'inststatus'}{$item}; |
$domdefaults{$item} = $domconfig{'inststatus'}{$item}; |
Line 2842 sub get_domain_defaults {
|
Line 2853 sub get_domain_defaults {
|
} else { |
} else { |
$domdefaults{$type.'exttool'} = 0; |
$domdefaults{$type.'exttool'} = 0; |
} |
} |
|
if (ref($domconfig{'coursedefaults'}{'crsauthor'}) eq 'HASH') { |
|
$domdefaults{$type.'crsauthor'} = $domconfig{'coursedefaults'}{'crsauthor'}{$type}; |
|
} else { |
|
$domdefaults{$type.'crsauthor'} = 1; |
|
} |
} |
} |
if (ref($domconfig{'coursedefaults'}{'canclone'}) eq 'HASH') { |
if (ref($domconfig{'coursedefaults'}{'canclone'}) eq 'HASH') { |
if (ref($domconfig{'coursedefaults'}{'canclone'}{'instcode'}) eq 'ARRAY') { |
if (ref($domconfig{'coursedefaults'}{'canclone'}{'instcode'}) eq 'ARRAY') { |
Line 3921 sub can_edit_resource {
|
Line 3937 sub can_edit_resource {
|
} |
} |
} |
} |
|
|
|
# |
|
# For /adm/viewcoauthors can only edit if author or co-author who is manager. |
|
# |
|
|
|
if (($resurl eq '/adm/viewcoauthors') && ($cnum ne '') && ($cdom ne '')) { |
|
if (((&allowed('cca',"$cdom/$cnum")) || |
|
(&allowed('caa',"$cdom/$cnum"))) || |
|
((&allowed('vca',"$cdom/$cnum") || |
|
&allowed('vaa',"$cdom/$cnum")) && |
|
($env{"environment.internal.manager./$cdom/$cnum"}))) { |
|
$home = $env{'user.home'}; |
|
$cfile = $resurl; |
|
if ($env{'form.forceedit'}) { |
|
$forceview = 1; |
|
} else { |
|
$forceedit = 1; |
|
} |
|
return ($cfile,$home,$switchserver,$forceedit,$forceview); |
|
} else { |
|
return; |
|
} |
|
} |
|
|
if ($env{'request.course.id'}) { |
if ($env{'request.course.id'}) { |
my $crsedit = &allowed('mdc',$env{'request.course.id'}); |
my $crsedit = &allowed('mdc',$env{'request.course.id'}); |
if ($group ne '') { |
if ($group ne '') { |
Line 5471 sub courserolelog {
|
Line 5510 sub courserolelog {
|
$storehash{'group'} = $sec; |
$storehash{'group'} = $sec; |
} else { |
} else { |
$storehash{'section'} = $sec; |
$storehash{'section'} = $sec; |
my ($curruserdomstr,$newuserdomstr); |
my ($curruserdomstr,$newuserdomstr); |
if (exists($env{'course.'.$cdom.'_'.$cnum.'.internal.userdomains'})) { |
if (exists($env{'course.'.$cdom.'_'.$cnum.'.internal.userdomains'})) { |
$curruserdomstr = $env{'course.'.$env{'request.course.id'}.'.internal.userdomains'}; |
$curruserdomstr = $env{'course.'.$env{'request.course.id'}.'.internal.userdomains'}; |
} else { |
} else { |
my %courseinfo = &coursedescription($cdom.'/'.$cnum); |
my %courseinfo = &coursedescription($cdom.'/'.$cnum); |
$curruserdomstr = $courseinfo{'internal.userdomains'}; |
$curruserdomstr = $courseinfo{'internal.userdomains'}; |
} |
} |
if ($currusedomstr ne '') { |
if ($curruserdomstr ne '') { |
my @udoms = split(/,/,$courseinfo{'internal.userdomains'}); |
my @udoms = split(/,/,$curruserdomstr); |
unless (grep(/^\Q$domain\E/,@udoms)) { |
unless (grep(/^\Q$domain\E/,@udoms)) { |
push(@udoms,$domain); |
push(@udoms,$domain); |
$newuserdomstr = join(',',sort(@udoms)); |
$newuserdomstr = join(',',sort(@udoms)); |
Line 6944 sub rolesinit {
|
Line 6983 sub rolesinit {
|
my %firstaccess = &dump('firstaccesstimes', $domain, $username); |
my %firstaccess = &dump('firstaccesstimes', $domain, $username); |
my %timerinterval = &dump('timerinterval', $domain, $username); |
my %timerinterval = &dump('timerinterval', $domain, $username); |
my (%coursetimerstarts, %firstaccchk, %firstaccenv, %coursetimerintervals, |
my (%coursetimerstarts, %firstaccchk, %firstaccenv, %coursetimerintervals, |
%timerintchk, %timerintenv); |
%timerintchk, %timerintenv, %coauthorenv); |
|
|
foreach my $key (keys(%firstaccess)) { |
foreach my $key (keys(%firstaccess)) { |
my ($cid, $rest) = split(/\0/, $key); |
my ($cid, $rest) = split(/\0/, $key); |
Line 6958 sub rolesinit {
|
Line 6997 sub rolesinit {
|
|
|
my %allroles=(); |
my %allroles=(); |
my %allgroups=(); |
my %allgroups=(); |
|
my %gotcoauconfig=(); |
|
|
for my $area (grep { ! /^rolesdef_/ } keys(%rolesdump)) { |
for my $area (grep { ! /^rolesdef_/ } keys(%rolesdump)) { |
my $role = $rolesdump{$area}; |
my $role = $rolesdump{$area}; |
Line 7009 sub rolesinit {
|
Line 7049 sub rolesinit {
|
} else { |
} else { |
# Normal role, defined in roles.tab |
# Normal role, defined in roles.tab |
&standard_roleprivs(\%allroles,$trole,$tdomain,$spec,$trest,$area); |
&standard_roleprivs(\%allroles,$trole,$tdomain,$spec,$trest,$area); |
|
if (($trole eq 'ca') || ($trole eq 'aa')) { |
|
(undef,my ($audom,$auname)) = split(/\//,$area); |
|
unless ($gotcoauconfig{$area}) { |
|
my @ca_settings = ('authoreditors','coauthorlist','coauthoroptin'); |
|
my %info = &userenvironment($audom,$auname,@ca_settings); |
|
$gotcoauconfig{$area} = 1; |
|
foreach my $item (@ca_settings) { |
|
if (exists($info{$item})) { |
|
my $name = $item; |
|
if ($item eq 'authoreditors') { |
|
$name = 'editors'; |
|
} |
|
$coauthorenv{"environment.internal.$name.$area"} = $info{$item}; |
|
} |
|
} |
|
} |
|
} |
} |
} |
|
|
my $cid = $tdomain.'_'.$trest; |
my $cid = $tdomain.'_'.$trest; |
Line 7037 sub rolesinit {
|
Line 7094 sub rolesinit {
|
$env{'user.adv'} = $userroles{'user.adv'}; |
$env{'user.adv'} = $userroles{'user.adv'}; |
$env{'user.rar'} = $userroles{'user.rar'}; |
$env{'user.rar'} = $userroles{'user.rar'}; |
|
|
return (\%userroles,\%firstaccenv,\%timerintenv); |
return (\%userroles,\%firstaccenv,\%timerintenv,\%coauthorenv); |
} |
} |
|
|
sub set_arearole { |
sub set_arearole { |
Line 7931 sub portfolio_access {
|
Line 7988 sub portfolio_access {
|
} |
} |
|
|
sub get_portfolio_access { |
sub get_portfolio_access { |
my ($udom,$unum,$file_name,$group,$clientip,$access_hash) = @_; |
my ($udom,$unum,$file_name,$group,$clientip,$access_hash,$portaccessref) = @_; |
|
|
if (!ref($access_hash)) { |
if (!ref($access_hash)) { |
my $current_perms = &get_portfile_permissions($udom,$unum); |
my $current_perms = &get_portfile_permissions($udom,$unum); |
Line 7940 sub get_portfolio_access {
|
Line 7997 sub get_portfolio_access {
|
$access_hash = $access_controls{$file_name}; |
$access_hash = $access_controls{$file_name}; |
} |
} |
|
|
my ($public,$guest,@domains,@users,@courses,@groups,@ips); |
my $portaccess; |
|
if (ref($portaccess) eq 'SCALAR') { |
|
$portaccess = $$portaccessref; |
|
} else { |
|
$portaccess = &usertools_access($unum,$udom,'portaccess',undef,'tools'); |
|
} |
|
|
|
my ($public,$guest,@domains,@users,@courses,@groups,@ips,@userips); |
my $now = time; |
my $now = time; |
if (ref($access_hash) eq 'HASH') { |
if (ref($access_hash) eq 'HASH') { |
foreach my $key (keys(%{$access_hash})) { |
foreach my $key (keys(%{$access_hash})) { |
my ($num,$scope,$end,$start) = ($key =~ /^([^:]+):([a-z]+)_(\d*)_?(\d*)$/); |
my ($num,$scope,$end,$start) = ($key =~ /^([^:]+):([a-z]+)_(\d*)_?(\d*)$/); |
|
next if (($scope ne 'ip') && ($portaccess == 0)); |
if ($start > $now) { |
if ($start > $now) { |
next; |
next; |
} |
} |
Line 7966 sub get_portfolio_access {
|
Line 8031 sub get_portfolio_access {
|
push(@groups,$key); |
push(@groups,$key); |
} elsif ($scope eq 'ip') { |
} elsif ($scope eq 'ip') { |
push(@ips,$key); |
push(@ips,$key); |
|
} elsif ($scope eq 'userip') { |
|
push(@userips,$key); |
} |
} |
} |
} |
if ($public) { |
if ($public) { |
Line 7983 sub get_portfolio_access {
|
Line 8050 sub get_portfolio_access {
|
if ($allowed) { |
if ($allowed) { |
return 'ok'; |
return 'ok'; |
} |
} |
|
} elsif (@userips > 0) { |
|
my $allowed; |
|
foreach my $useripkey (@userips) { |
|
if (ref($access_hash->{$useripkey}{'ip'}) eq 'ARRAY') { |
|
if (&Apache::loncommon::check_ip_acc(join(',',@{$access_hash->{$useripkey}{'ip'}}),$clientip)) { |
|
$allowed = 1; |
|
last; |
|
} |
|
} |
|
} |
|
if ($allowed) { |
|
return 'ok'; |
|
} |
} |
} |
if ($env{'user.name'} eq 'public' && $env{'user.domain'} eq 'public') { |
if ($env{'user.name'} eq 'public' && $env{'user.domain'} eq 'public') { |
if ($guest) { |
if ($guest) { |
Line 8188 sub usertools_access {
|
Line 8268 sub usertools_access {
|
%tools = ( |
%tools = ( |
requestauthor => 1, |
requestauthor => 1, |
); |
); |
|
} elsif ($context eq 'authordefaults') { |
|
%tools = ( |
|
webdav => 1, |
|
); |
} else { |
} else { |
%tools = ( |
%tools = ( |
aboutme => 1, |
aboutme => 1, |
blog => 1, |
blog => 1, |
webdav => 1, |
|
portfolio => 1, |
portfolio => 1, |
|
portaccess => 1, |
timezone => 1, |
timezone => 1, |
); |
); |
} |
} |
Line 8210 sub usertools_access {
|
Line 8294 sub usertools_access {
|
return $env{'environment.canrequest.'.$tool}; |
return $env{'environment.canrequest.'.$tool}; |
} elsif ($context eq 'requestauthor') { |
} elsif ($context eq 'requestauthor') { |
return $env{'environment.canrequest.author'}; |
return $env{'environment.canrequest.author'}; |
|
} elsif ($context eq 'authordefaults') { |
|
if ($tool eq 'webdav') { |
|
return $env{'environment.availabletools.'.$tool}; |
|
} |
} else { |
} else { |
return $env{'environment.availabletools.'.$tool}; |
return $env{'environment.availabletools.'.$tool}; |
} |
} |
Line 8218 sub usertools_access {
|
Line 8306 sub usertools_access {
|
|
|
my ($toolstatus,$inststatus,$envkey); |
my ($toolstatus,$inststatus,$envkey); |
if ($context eq 'requestauthor') { |
if ($context eq 'requestauthor') { |
$envkey = $context; |
$envkey = $context; |
|
} elsif ($context eq 'authordefaults') { |
|
if ($tool eq 'webdav') { |
|
$envkey = 'tools.'.$tool; |
|
} |
} else { |
} else { |
$envkey = $context.'.'.$tool; |
$envkey = $context.'.'.$tool; |
} |
} |
Line 8792 sub allowed {
|
Line 8884 sub allowed {
|
|
|
# If this is generating or modifying users, exit with special codes |
# If this is generating or modifying users, exit with special codes |
|
|
if (':csu:cdc:ccc:cin:cta:cep:ccr:cst:cad:cli:cau:cdg:cca:caa:'=~/\:\Q$priv\E\:/) { |
if (':csu:cdc:ccc:cin:cta:cep:ccr:cst:cad:cli:cau:cdg:cca:caa:vca:vaa:'=~/\:\Q$priv\E\:/) { |
if (($priv eq 'cca') || ($priv eq 'caa')) { |
if (($priv eq 'cca') || ($priv eq 'caa')) { |
my ($audom,$auname)=split('/',$uri); |
my ($audom,$auname)=split('/',$uri); |
# no author name given, so this just checks on the general right to make a co-author in this domain |
# no author name given, so this just checks on the general right to make a co-author in this domain |
Line 8801 sub allowed {
|
Line 8893 sub allowed {
|
if (($auname ne $env{'user.name'} && $env{'request.role'} !~ /^dc\./) || |
if (($auname ne $env{'user.name'} && $env{'request.role'} !~ /^dc\./) || |
(($audom ne $env{'user.domain'} && $env{'request.role'} !~ /^dc\./) && |
(($audom ne $env{'user.domain'} && $env{'request.role'} !~ /^dc\./) && |
($audom ne $env{'request.role.domain'}))) { return ''; } |
($audom ne $env{'request.role.domain'}))) { return ''; } |
|
} elsif (($priv eq 'vca') || ($priv eq 'vaa')) { |
|
my ($audom,$auname)=split('/',$uri); |
|
unless ($auname) { return $thisallowed; } |
|
unless (($env{'request.role'} eq "dc./$audom") || |
|
($env{'request.role'} eq "ca./$uri")) { |
|
return ''; |
|
} |
} |
} |
return $thisallowed; |
return $thisallowed; |
} |
} |
Line 9144 sub constructaccess {
|
Line 9243 sub constructaccess {
|
if (($ownername eq $env{'course.'.$env{'request.course.id'}.'.num'}) && |
if (($ownername eq $env{'course.'.$env{'request.course.id'}.'.num'}) && |
($ownerdomain eq $env{'course.'.$env{'request.course.id'}.'.domain'})) { |
($ownerdomain eq $env{'course.'.$env{'request.course.id'}.'.domain'})) { |
if (&allowed('mdc',$env{'request.course.id'})) { |
if (&allowed('mdc',$env{'request.course.id'})) { |
|
return if ($env{'course.'.$env{'request.course.id'}.'.internal.crsauthor'} eq '0'); |
|
unless ($env{'course.'.$env{'request.course.id'}.'.internal.crsauthor'}) { |
|
my %domdefs = &get_domain_defaults($ownerdomain); |
|
my $type = lc($env{'course.'.$env{'request.course.id'}.'.type'}); |
|
unless (($type eq 'community') || ($type eq 'placement')) { |
|
$type = 'unofficial'; |
|
if ($env{'course.'.$env{'request.course.id'}.'internal.coursecode'} ne '') { |
|
$type = 'official'; |
|
} elsif ($env{'course.'.$env{'request.course.id'}.'internal.textbook'} ne '') { |
|
$type = 'textbook'; |
|
} else { |
|
$type = 'unofficial'; |
|
} |
|
} |
|
return if ($domdefs{$type.'crsauthor'} eq '0'); |
|
} |
$ownerhome = $env{'course.'.$env{'request.course.id'}.'.home'}; |
$ownerhome = $env{'course.'.$env{'request.course.id'}.'.home'}; |
return ($ownername,$ownerdomain,$ownerhome); |
return ($ownername,$ownerdomain,$ownerhome); |
} |
} |
Line 10570 sub plaintext {
|
Line 10685 sub plaintext {
|
sub assignrole { |
sub assignrole { |
my ($udom,$uname,$url,$role,$end,$start,$deleteflag,$selfenroll, |
my ($udom,$uname,$url,$role,$end,$start,$deleteflag,$selfenroll, |
$context,$othdomby,$requester,$reqsec,$reqrole)=@_; |
$context,$othdomby,$requester,$reqsec,$reqrole)=@_; |
my $mrole; |
my ($mrole,$rolelogcontext); |
if ($role =~ /^cr\//) { |
if ($role =~ /^cr\//) { |
my $cwosec=$url; |
my $cwosec=$url; |
$cwosec=~s/^\/($match_domain)\/($match_courseid)\/.*/$1\/$2/; |
$cwosec=~s/^\/($match_domain)\/($match_courseid)\/.*/$1\/$2/; |
Line 10767 sub assignrole {
|
Line 10882 sub assignrole {
|
} |
} |
} |
} |
} |
} |
|
} elsif (($context eq 'author') && (($role eq 'ca' || $role eq 'aa'))) { |
|
if ($url =~ m{^/($match_domain)/($match_username)$}) { |
|
my ($audom,$auname) = ($1,$2); |
|
if ((&Apache::lonnet::allowed('v'.$role,"$audom/$auname")) && |
|
($env{"environment.internal.manager.$url"})) { |
|
$refused = ''; |
|
$rolelogcontext = 'coauthor'; |
|
} |
|
} |
} |
} |
if ($refused) { |
if ($refused) { |
&logthis('Refused assignrole: '.$udom.' '.$uname.' '.$url. |
&logthis('Refused assignrole: '.$udom.' '.$uname.' '.$url. |
Line 10834 sub assignrole {
|
Line 10958 sub assignrole {
|
&domainrolelog($role,$uname,$udom,$url,$origstart,$origend,$delflag, |
&domainrolelog($role,$uname,$udom,$url,$origstart,$origend,$delflag, |
$context,$othdomby,$requester); |
$context,$othdomby,$requester); |
} elsif (($role eq 'ca') || ($role eq 'aa')) { |
} elsif (($role eq 'ca') || ($role eq 'aa')) { |
|
if ($rolelogcontext eq '') { |
|
$rolelogcontext = $context; |
|
} |
&coauthorrolelog($role,$uname,$udom,$url,$origstart,$origend,$delflag, |
&coauthorrolelog($role,$uname,$udom,$url,$origstart,$origend,$delflag, |
$context,$othdomby,$requester); |
$rolelogcontext,$othdomby,$requester); |
} |
} |
if ($role eq 'cc') { |
if ($role eq 'cc') { |
&autoupdate_coowners($url,$end,$start,$uname,$udom); |
&autoupdate_coowners($url,$end,$start,$uname,$udom); |