version 1.165, 2001/10/16 18:41:01
|
version 1.174, 2001/11/20 22:30:20
|
Line 1
|
Line 1
|
# The LearningOnline Network |
# The LearningOnline Network |
# TCP networking package |
# TCP networking package |
# |
# |
|
# 6/1/99,6/2,6/10,6/11,6/12,6/14,6/26,6/28,6/29,6/30, |
|
# 7/1,7/2,7/9,7/10,7/12,7/14,7/15,7/19, |
|
# 11/8,11/16,11/18,11/22,11/23,12/22, |
|
# 01/06,01/13,02/24,02/28,02/29, |
|
# 03/01,03/02,03/06,03/07,03/13, |
|
# 04/05,05/29,05/31,06/01, |
|
# 06/05,06/26 Gerd Kortemeyer |
|
# 06/26 Ben Tyszka |
|
# 06/30,07/15,07/17,07/18,07/20,07/21,07/22,07/25 Gerd Kortemeyer |
|
# 08/14 Ben Tyszka |
|
# 08/22,08/28,08/31,09/01,09/02,09/04,09/05,09/25,09/28,09/30 Gerd Kortemeyer |
|
# 10/04 Gerd Kortemeyer |
|
# 10/04 Guy Albertelli |
|
# 10/06,10/09,10/10,10/11,10/14,10/20,10/23,10/25,10/26,10/27,10/28,10/29, |
|
# 10/30,10/31, |
|
# 11/2,11/14,11/15,11/16,11/20,11/21,11/22,11/25,11/27, |
|
# 12/02,12/12,12/13,12/14,12/28,12/29 Gerd Kortemeyer |
|
# 05/01/01 Guy Albertelli |
|
# 05/01,06/01,09/01 Gerd Kortemeyer |
|
# 09/01 Guy Albertelli |
|
# 09/01,10/01,11/01 Gerd Kortemeyer |
|
# YEAR=2001 |
|
# 02/27/01 Scott Harrison |
|
# 3/2 Gerd Kortemeyer |
|
# 3/15,3/19 Scott Harrison |
|
# 3/19,3/20 Gerd Kortemeyer |
|
# 3/22,3/27,4/2,4/16,4/17 Scott Harrison |
|
# 5/26,5/28 Gerd Kortemeyer |
|
# 5/30 H. K. Ng |
|
# 6/1 Gerd Kortemeyer |
|
# July Guy Albertelli |
|
# 8/4,8/7,8/8,8/9,8/11,8/16,8/17,8/18,8/20,8/23,9/20,9/21,9/26, |
|
# 10/2 Gerd Kortemeyer |
|
# 10/5,10/10,11/13,11/15 Scott Harrison |
|
# 11/17 Gerd Kortemeyer |
|
# |
|
# $Id$ |
|
# |
|
### |
|
|
# Functions for use by content handlers: |
# Functions for use by content handlers: |
# |
# |
# metadata_query(sql-query-string,custom-metadata-regex) : |
# metadata_query(sql-query-string,custom-metadata-regex) : |
Line 97
|
Line 137
|
# metadata(file,entry): returns the metadata entry for a file. entry='keys' |
# metadata(file,entry): returns the metadata entry for a file. entry='keys' |
# returns a comma separated list of keys |
# returns a comma separated list of keys |
# |
# |
# 6/1/99,6/2,6/10,6/11,6/12,6/14,6/26,6/28,6/29,6/30, |
|
# 7/1,7/2,7/9,7/10,7/12,7/14,7/15,7/19, |
|
# 11/8,11/16,11/18,11/22,11/23,12/22, |
|
# 01/06,01/13,02/24,02/28,02/29, |
|
# 03/01,03/02,03/06,03/07,03/13, |
|
# 04/05,05/29,05/31,06/01, |
|
# 06/05,06/26 Gerd Kortemeyer |
|
# 06/26 Ben Tyszka |
|
# 06/30,07/15,07/17,07/18,07/20,07/21,07/22,07/25 Gerd Kortemeyer |
|
# 08/14 Ben Tyszka |
|
# 08/22,08/28,08/31,09/01,09/02,09/04,09/05,09/25,09/28,09/30 Gerd Kortemeyer |
|
# 10/04 Gerd Kortemeyer |
|
# 10/04 Guy Albertelli |
|
# 10/06,10/09,10/10,10/11,10/14,10/20,10/23,10/25,10/26,10/27,10/28,10/29, |
|
# 10/30,10/31, |
|
# 11/2,11/14,11/15,11/16,11/20,11/21,11/22,11/25,11/27, |
|
# 12/02,12/12,12/13,12/14,12/28,12/29 Gerd Kortemeyer |
|
# 05/01/01 Guy Albertelli |
|
# 05/01,06/01,09/01 Gerd Kortemeyer |
|
# 09/01 Guy Albertelli |
|
# 09/01,10/01,11/01 Gerd Kortemeyer |
|
# YEAR=2001 |
|
# 02/27/01 Scott Harrison |
|
# 3/2 Gerd Kortemeyer |
|
# 3/15,3/19 Scott Harrison |
|
# 3/19,3/20 Gerd Kortemeyer |
|
# 3/22,3/27,4/2,4/16,4/17 Scott Harrison |
|
# 5/26,5/28 Gerd Kortemeyer |
|
# 5/30 H. K. Ng |
|
# 6/1 Gerd Kortemeyer |
|
# July Guy Albertelli |
|
# 8/4,8/7,8/8,8/9,8/11,8/16,8/17,8/18,8/20,8/23,9/20,9/21,9/26, |
|
# 10/2 Gerd Kortemeyer |
|
# 10/5,10/10 Scott Harrison |
|
|
|
package Apache::lonnet; |
package Apache::lonnet; |
|
|
Line 406 sub spareserver {
|
Line 412 sub spareserver {
|
return $spareserver; |
return $spareserver; |
} |
} |
|
|
|
# ----------------------- Try to determine user's current authentication scheme |
|
|
|
sub queryauthenticate { |
|
my ($uname,$udom)=@_; |
|
if (($perlvar{'lonRole'} eq 'library') && |
|
($udom eq $perlvar{'lonDefDomain'})) { |
|
my $answer=reply("encrypt:currentauth:$udom:$uname", |
|
$perlvar{'lonHostID'}); |
|
unless ($answer eq 'unknown_user' or $answer eq 'refused') { |
|
if (length($answer)) { |
|
return $answer; |
|
} |
|
else { |
|
&logthis("User $uname at $udom lacks an authentication mechanism"); |
|
return 'no_host'; |
|
} |
|
} |
|
} |
|
|
|
my $tryserver; |
|
foreach $tryserver (keys %libserv) { |
|
if ($hostdom{$tryserver} eq $udom) { |
|
my $answer=reply("encrypt:currentauth:$udom:$uname",$tryserver); |
|
unless ($answer eq 'unknown_user' or $answer eq 'refused') { |
|
if (length($answer)) { |
|
return $answer; |
|
} |
|
else { |
|
&logthis("User $uname at $udom lacks an authentication mechanism"); |
|
return 'no_host'; |
|
} |
|
} |
|
} |
|
} |
|
&logthis("User $uname at $udom lacks an authentication mechanism"); |
|
return 'no_host'; |
|
} |
|
|
# --------- Try to authenticate user from domain's lib servers (first this one) |
# --------- Try to authenticate user from domain's lib servers (first this one) |
|
|
sub authenticate { |
sub authenticate { |
Line 854 sub devalidate {
|
Line 898 sub devalidate {
|
} |
} |
} |
} |
|
|
|
sub hash2str { |
|
my (%hash)=@_; |
|
my $result=''; |
|
map { $result.=escape($_).'='.escape($hash{$_}).'&'; } keys %hash; |
|
$result=~s/\&$//; |
|
return $result; |
|
} |
|
|
|
sub str2hash { |
|
my ($string) = @_; |
|
my %returnhash; |
|
map { |
|
my ($name,$value)=split(/\=/,$_); |
|
$returnhash{&unescape($name)}=&unescape($value); |
|
} split(/\&/,$string); |
|
return %returnhash; |
|
} |
|
|
|
# -------------------------------------------------------------------Temp Store |
|
|
|
sub tmpreset { |
|
my ($symb,$namespace,$domain,$stuname) = @_; |
|
if (!$symb) { |
|
$symb=&symbread(); |
|
if (!$symb) { $symb= $ENV{'REQUEST_URI'}; } |
|
} |
|
$symb=escape($symb); |
|
|
|
if (!$namespace) { $namespace=$ENV{'request.state'}; } |
|
$namespace=~s/\//\_/g; |
|
$namespace=~s/\W//g; |
|
|
|
#FIXME needs to do something for /pub resources |
|
if (!$domain) { $domain=$ENV{'user.domain'}; } |
|
if (!$stuname) { $stuname=$ENV{'user.name'}; } |
|
my $path=$perlvar{'lonDaemons'}.'/tmp'; |
|
my %hash; |
|
if (tie(%hash,'GDBM_File', |
|
$path.'/tmpstore_'.$stuname.'_'.$domain.'_'.$namespace.'.db', |
|
&GDBM_WRCREAT,0640)) { |
|
foreach my $key (keys %hash) { |
|
if ($key=~ /:$symb:/) { |
|
delete($hash{$key}); |
|
} |
|
} |
|
} |
|
} |
|
|
|
sub tmpstore { |
|
my ($storehash,$symb,$namespace,$domain,$stuname) = @_; |
|
|
|
if (!$symb) { |
|
$symb=&symbread(); |
|
if (!$symb) { $symb= $ENV{'request.url'}; } |
|
} |
|
$symb=escape($symb); |
|
|
|
if (!$namespace) { |
|
# I don't think we would ever want to store this for a course. |
|
# it seems this will only be used if we don't have a course. |
|
#$namespace=$ENV{'request.course.id'}; |
|
#if (!$namespace) { |
|
$namespace=$ENV{'request.state'}; |
|
#} |
|
} |
|
$namespace=~s/\//\_/g; |
|
$namespace=~s/\W//g; |
|
#FIXME needs to do something for /pub resources |
|
if (!$domain) { $domain=$ENV{'user.domain'}; } |
|
if (!$stuname) { $stuname=$ENV{'user.name'}; } |
|
my $now=time; |
|
my %hash; |
|
my $path=$perlvar{'lonDaemons'}.'/tmp'; |
|
if (tie(%hash,'GDBM_File', |
|
$path.'/tmpstore_'.$stuname.'_'.$domain.'_'.$namespace.'.db', |
|
&GDBM_WRCREAT,0640)) { |
|
$hash{"version:$symb"}++; |
|
my $version=$hash{"version:$symb"}; |
|
my $allkeys=''; |
|
foreach my $key (keys(%$storehash)) { |
|
$allkeys.=$key.':'; |
|
$hash{"$version:$symb:$key"}=$$storehash{$key}; |
|
} |
|
$hash{"$version:$symb:timestamp"}=$now; |
|
$allkeys.='timestamp'; |
|
$hash{"$version:keys:$symb"}=$allkeys; |
|
if (untie(%hash)) { |
|
return 'ok'; |
|
} else { |
|
return "error:$!"; |
|
} |
|
} else { |
|
return "error:$!"; |
|
} |
|
} |
|
|
|
# -----------------------------------------------------------------Temp Restore |
|
|
|
sub tmprestore { |
|
my ($symb,$namespace,$domain,$stuname) = @_; |
|
|
|
if (!$symb) { |
|
$symb=&symbread(); |
|
if (!$symb) { $symb= $ENV{'request.url'}; } |
|
} |
|
$symb=escape($symb); |
|
|
|
if (!$namespace) { $namespace=$ENV{'request.state'}; } |
|
#FIXME needs to do something for /pub resources |
|
if (!$domain) { $domain=$ENV{'user.domain'}; } |
|
if (!$stuname) { $stuname=$ENV{'user.name'}; } |
|
|
|
my %returnhash; |
|
$namespace=~s/\//\_/g; |
|
$namespace=~s/\W//g; |
|
my %hash; |
|
my $path=$perlvar{'lonDaemons'}.'/tmp'; |
|
if (tie(%hash,'GDBM_File', |
|
$path.'/tmpstore_'.$stuname.'_'.$domain.'_'.$namespace.'.db', |
|
&GDBM_READER,0640)) { |
|
my $version=$hash{"version:$symb"}; |
|
$returnhash{'version'}=$version; |
|
my $scope; |
|
for ($scope=1;$scope<=$version;$scope++) { |
|
my $vkeys=$hash{"$scope:keys:$symb"}; |
|
my @keys=split(/:/,$vkeys); |
|
my $key; |
|
$returnhash{"$scope:keys"}=$vkeys; |
|
foreach $key (@keys) { |
|
$returnhash{"$scope:$key"}=$hash{"$scope:$symb:$key"}; |
|
$returnhash{"$key"}=$hash{"$scope:$symb:$key"}; |
|
} |
|
} |
|
if (!(untie(%hash))) { |
|
return "error:$!"; |
|
} |
|
} else { |
|
return "error:$!"; |
|
} |
|
return %returnhash; |
|
} |
|
|
# ----------------------------------------------------------------------- Store |
# ----------------------------------------------------------------------- Store |
|
|
sub store { |
sub store { |
my ($storehash,$symb,$namespace,$domain,$stuname) = @_; |
my ($storehash,$symb,$namespace,$domain,$stuname) = @_; |
my $home=''; |
my $home=''; |
|
|
if ($stuname) { |
if ($stuname) { $home=&homeserver($stuname,$domain); } |
$home=&homeserver($stuname,$domain); |
|
} |
|
|
|
if (!$symb) { unless ($symb=&symbread()) { return ''; } } |
if (!$symb) { unless ($symb=&symbread()) { return ''; } } |
|
|
Line 887 sub cstore {
|
Line 1071 sub cstore {
|
my ($storehash,$symb,$namespace,$domain,$stuname) = @_; |
my ($storehash,$symb,$namespace,$domain,$stuname) = @_; |
my $home=''; |
my $home=''; |
|
|
if ($stuname) { |
if ($stuname) { $home=&homeserver($stuname,$domain); } |
$home=&homeserver($stuname,$domain); |
|
} |
|
|
|
if (!$symb) { unless ($symb=&symbread()) { return ''; } } |
if (!$symb) { unless ($symb=&symbread()) { return ''; } } |
|
|
Line 915 sub restore {
|
Line 1097 sub restore {
|
my ($symb,$namespace,$domain,$stuname) = @_; |
my ($symb,$namespace,$domain,$stuname) = @_; |
my $home=''; |
my $home=''; |
|
|
if ($stuname) { |
if ($stuname) { $home=&homeserver($stuname,$domain); } |
$home=&homeserver($stuname,$domain); |
|
} |
|
|
|
if (!$symb) { |
if (!$symb) { |
unless ($symb=escape(&symbread())) { return ''; } |
unless ($symb=escape(&symbread())) { return ''; } |
Line 1241 sub allowed {
|
Line 1421 sub allowed {
|
|
|
# If this is generating or modifying users, exit with special codes |
# If this is generating or modifying users, exit with special codes |
|
|
if (':csu:cdc:ccc:cin:cta:cep:ccr:cst:cad:cli:cau:cdg:'=~/\:$priv\:/) { |
if (':csu:cdc:ccc:cin:cta:cep:ccr:cst:cad:cli:cau:cdg:cca:'=~/\:$priv\:/) { |
return $thisallowed; |
return $thisallowed; |
} |
} |
# |
# |
Line 1482 sub definerole {
|
Line 1662 sub definerole {
|
|
|
sub metadata_query { |
sub metadata_query { |
my ($query,$custom,$customshow)=@_; |
my ($query,$custom,$customshow)=@_; |
# need to put in a library server loop here and return a hash |
|
my %rhash; |
my %rhash; |
for my $server (keys %libserv) { |
for my $server (keys %libserv) { |
unless ($custom or $customshow) { |
unless ($custom or $customshow) { |
Line 1557 sub assignrole {
|
Line 1736 sub assignrole {
|
return &reply($command,&homeserver($uname,$udom)); |
return &reply($command,&homeserver($uname,$udom)); |
} |
} |
|
|
|
# -------------------------------------------------- Modify user authentication |
|
sub modifyuserauth { |
|
my ($udom,$uname,$umode,$upass)=@_; |
|
my $uhome=&homeserver($uname,$udom); |
|
&logthis('Call to modify user authentication'.$udom.', '.$uname.', '. |
|
$umode.' by '.$ENV{'user.name'}.' at '.$ENV{'user.domain'}); |
|
my $reply=&reply('encrypt:changeuserauth:'.$udom.':'.$uname.':'.$umode.':'. |
|
&escape($upass),$uhome); |
|
unless ($reply eq 'ok') { |
|
return 'error: '.$reply; |
|
} |
|
return 'ok'; |
|
} |
|
|
# --------------------------------------------------------------- Modify a user |
# --------------------------------------------------------------- Modify a user |
|
|
|
|
Line 2039 sub EXT {
|
Line 2232 sub EXT {
|
# ---------------------------------------------------------------- Get metadata |
# ---------------------------------------------------------------- Get metadata |
|
|
sub metadata { |
sub metadata { |
my ($uri,$what)=@_; |
my ($uri,$what,$liburi,$prefix)=@_; |
|
|
$uri=&declutter($uri); |
$uri=&declutter($uri); |
my $filename=$uri; |
my $filename=$uri; |
$uri=~s/\.meta$//; |
$uri=~s/\.meta$//; |
unless ($metacache{$uri.':keys'}) { |
# |
|
# Is the metadata already cached? |
|
# If "keys" are set, the assumption is that everything is already cached. |
|
# Everything is cached by the main uri, libraries are never directly cached |
|
# |
|
unless (abs($metacache{$uri.':cachedtimestamp'}-time)<600) { |
|
# |
|
# Is this a recursive call for a library? |
|
# |
|
if ($liburi) { |
|
$liburi=&declutter($liburi); |
|
$filename=$liburi; |
|
} |
my %metathesekeys=(); |
my %metathesekeys=(); |
unless ($filename=~/\.meta$/) { $filename.='.meta'; } |
unless ($filename=~/\.meta$/) { $filename.='.meta'; } |
my $metastring=&getfile($perlvar{'lonDocRoot'}.'/res/'.$filename); |
my $metastring=&getfile($perlvar{'lonDocRoot'}.'/res/'.$filename); |
Line 2054 sub metadata {
|
Line 2259 sub metadata {
|
while ($token=$parser->get_token) { |
while ($token=$parser->get_token) { |
if ($token->[0] eq 'S') { |
if ($token->[0] eq 'S') { |
if (defined($token->[2]->{'package'})) { |
if (defined($token->[2]->{'package'})) { |
|
# |
|
# This is a package - get package info |
|
# |
my $package=$token->[2]->{'package'}; |
my $package=$token->[2]->{'package'}; |
my $keyroot=''; |
my $keyroot=''; |
if (defined($token->[2]->{'part'})) { |
if ($prefix) { |
$keyroot.='_'.$token->[2]->{'part'}; |
$keyroot.='_'.$prefix; |
|
} else { |
|
if (defined($token->[2]->{'part'})) { |
|
$keyroot.='_'.$token->[2]->{'part'}; |
|
} |
} |
} |
if (defined($token->[2]->{'id'})) { |
if (defined($token->[2]->{'id'})) { |
$keyroot.='_'.$token->[2]->{'id'}; |
$keyroot.='_'.$token->[2]->{'id'}; |
Line 2086 sub metadata {
|
Line 2298 sub metadata {
|
} |
} |
} keys %packagetab; |
} keys %packagetab; |
} else { |
} else { |
my $entry=$token->[1]; |
# |
|
# This is not a package - some other kind of start tag |
|
# |
|
my $entry=$token->[1]; |
|
if ($entry eq 'import') { |
|
# |
|
# Importing a library here |
|
# |
|
my $libid=$token->[2]->{'id'}; |
|
|
|
|
|
} else { |
my $unikey=$entry; |
my $unikey=$entry; |
if (defined($token->[2]->{'part'})) { |
if ($prefix) { |
$unikey.='_'.$token->[2]->{'part'}; |
$unikey.='_'.$prefix; |
|
} else { |
|
if (defined($token->[2]->{'part'})) { |
|
$unikey.='_'.$token->[2]->{'part'}; |
|
} |
} |
} |
if (defined($token->[2]->{'id'})) { |
if (defined($token->[2]->{'id'})) { |
$unikey.='_'.$token->[2]->{'id'}; |
$unikey.='_'.$token->[2]->{'id'}; |
Line 2106 sub metadata {
|
Line 2333 sub metadata {
|
) { $metacache{$uri.':'.$unikey}= |
) { $metacache{$uri.':'.$unikey}= |
$metacache{$uri.':'.$unikey.'.default'}; |
$metacache{$uri.':'.$unikey.'.default'}; |
} |
} |
} |
# end of not-a-package not-a-library import |
|
} |
|
# end of not-a-package start tag |
|
} |
|
# the next is the end of "start tag" |
} |
} |
} |
} |
$metacache{$uri.':keys'}=join(',',keys %metathesekeys); |
$metacache{$uri.':keys'}=join(',',keys %metathesekeys); |
|
$metacache{$uri.':cachedtimestamp'}=time; |
} |
} |
return $metacache{$uri.':'.$what}; |
return $metacache{$uri.':'.$what}; |
} |
} |