File:
[LON-CAPA] /
loncom /
auth /
lonauth.pm
Revision
1.63:
download - view:
text,
annotated -
select for diffs
Thu Oct 28 16:25:19 2004 UTC (19 years, 11 months ago) by
albertel
Branches:
MAIN
CVS tags:
version_1_3_X,
version_1_3_3,
version_1_3_2,
version_1_3_1,
version_1_3_0,
version_1_2_99_1,
version_1_2_99_0,
HEAD
- let user know what we are doing when we are loading the remote, also provide a link to disable the remote control, should addres BUG#3572 and related
1: # The LearningOnline Network
2: # User Authentication Module
3: #
4: # $Id: lonauth.pm,v 1.63 2004/10/28 16:25:19 albertel Exp $
5: #
6: # Copyright Michigan State University Board of Trustees
7: #
8: # This file is part of the LearningOnline Network with CAPA (LON-CAPA).
9: #
10: # LON-CAPA is free software; you can redistribute it and/or modify
11: # it under the terms of the GNU General Public License as published by
12: # the Free Software Foundation; either version 2 of the License, or
13: # (at your option) any later version.
14: #
15: # LON-CAPA is distributed in the hope that it will be useful,
16: # but WITHOUT ANY WARRANTY; without even the implied warranty of
17: # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18: # GNU General Public License for more details.
19: #
20: # You should have received a copy of the GNU General Public License
21: # along with LON-CAPA; if not, write to the Free Software
22: # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
23: #
24: # /home/httpd/html/adm/gpl.txt
25: #
26: # http://www.lon-capa.org/
27: #
28: # 5/21/99,5/22,5/25,5/26,5/27,5/29,6/2,6/11,6/14,6/15
29: # 16/11,12/16,
30: # 1/14,2/24,2/28,2/29,3/7,5/29,5/30,5/31,6/1,6/5,6/29,
31: # 7/1,7/10,10/2,10/5,10/9,10/26,10/30,11/10,
32: # 05/28,05/29 Gerd Kortemeyer
33: # 07/28,08/03 Gerd Kortemeyer
34: # 8/20 Gerd Kortemeyer
35:
36: package Apache::lonauth;
37:
38: use strict;
39: use Apache::Constants qw(:common);
40: use Apache::File;
41: use CGI qw(:standard);
42: use CGI::Cookie();
43: use DynaLoader; # for Crypt::DES version
44: use Crypt::DES;
45: use Apache::loncommon();
46: use Apache::lonnet();
47: use Apache::lonmenu();
48: use Fcntl qw(:flock);
49: use Apache::lonlocal;
50:
51: my %FORM;
52:
53: # ------------------------------------------------------------ Successful login
54:
55: sub success {
56: my ($r, $username, $domain, $authhost,$lowerurl) = @_;
57: my $lonids=$r->dir_config('lonIDsDir');
58:
59: # See if old ID present, if so, remove
60:
61: my $filename;
62: opendir(DIR,$lonids);
63: while ($filename=readdir(DIR)) {
64: if ($filename=~/^$username\_\d+\_$domain\_$authhost\.id$/) {
65: unlink($lonids.'/'.$filename);
66: }
67: }
68: closedir(DIR);
69:
70: # Give them a new cookie
71:
72: my $cookie;
73: my $now=time;
74: $cookie="$username\_$now\_$domain\_$authhost";
75:
76: # Initialize roles
77:
78: my $userroles=Apache::lonnet::rolesinit($domain,$username,$authhost);
79:
80: # ------------------------------------ Check browser type and MathML capability
81:
82: my ($httpbrowser,$clientbrowser,$clientversion,$clientmathml,
83: $clientunicode,$clientos) = &Apache::loncommon::decode_user_agent($r);
84:
85: # -------------------------------------- Any accessibility options to remember?
86: if (($FORM{'interface'}) && ($FORM{'remember'} eq 'true')) {
87: foreach ('imagesuppress','appletsuppress',
88: 'embedsuppress','fontenhance','blackwhite') {
89: if ($FORM{$_} eq 'true') {
90: &Apache::lonnet::put('environment',{$_ => 'on'},
91: $domain,$username);
92: } else {
93: &Apache::lonnet::del('environment',[$_],$domain,$username);
94: }
95: }
96: }
97: # ------------------------------------------------------------- Get environment
98:
99: my $userenv;
100: my %userenv=Apache::lonnet::dump('environment',$domain,$username);
101: my ($tmp) = keys(%userenv);
102: if ($tmp !~ /^(con_lost|error|no_such_host)/i) {
103: foreach my $key (keys(%userenv)) {
104: $userenv.="environment.$key=$userenv{$key}\n";
105: }
106: }
107: if (($userenv{'interface'}) && (!$FORM{'interface'})) {
108: $FORM{'interface'}=$userenv{'interface'};
109: }
110: $ENV{'environment.remote'}=$userenv{'remote'};
111: # --------------- Do not trust query string to be put directly into environment
112: foreach ('imagesuppress','appletsuppress',
113: 'embedsuppress','fontenhance','blackwhite',
114: 'interface','localpath','localres') {
115: $FORM{$_}=~s/[\n\r\=]//gs;
116: }
117: # --------------------------------------------------------- Write first profile
118:
119: {
120: my $idf=Apache::File->new(">$lonids/$cookie.id");
121: unless (flock($idf,LOCK_EX)) {
122: &Apache::lonnet::logthis("<font color=blue>WARNING: ".
123: 'Could not obtain exclusive lock in lonauth: '.$!);
124: $idf->close();
125: return 'error: '.$!;
126: }
127: if ($userenv ne '') { print $idf "$userenv\n"; }
128: print $idf "user.name=$username\n";
129: print $idf "user.domain=$domain\n";
130: print $idf "user.home=$authhost\n";
131: print $idf "browser.type=$clientbrowser\n";
132: print $idf "browser.version=$clientversion\n";
133: print $idf "browser.mathml=$clientmathml\n";
134: print $idf "browser.unicode=$clientunicode\n";
135: print $idf "browser.os=$clientos\n";
136: if ($FORM{'localpath'}) {
137: print $idf "browser.localpath=$FORM{'localpath'}\n";
138: print $idf "browser.localres=$FORM{'localres'}\n";
139: }
140: print $idf "request.course.fn=\n";
141: print $idf "request.course.uri=\n";
142: print $idf "request.course.sec=\n";
143: print $idf "request.role=cm\n";
144: print $idf "request.role.adv=$ENV{'user.adv'}\n";
145: print $idf "request.host=$ENV{'REMOTE_ADDR'}\n";
146: if ($FORM{'interface'}) {
147: $FORM{'interface'}=~s/\W//gs;
148: print $idf "browser.interface=$FORM{'interface'}\n";
149: $ENV{'browser.interface'}=$FORM{'interface'};
150: foreach ('imagesuppress','appletsuppress',
151: 'embedsuppress','fontenhance','blackwhite') {
152: if (($FORM{$_} eq 'true') ||
153: ($userenv{$_} eq 'on')) {
154: print $idf "browser.$_=on\n";
155: }
156: }
157: }
158: if ($userroles ne '') { print $idf "$userroles"; }
159: $idf->close();
160: }
161: $ENV{'request.role'}='cm';
162: $ENV{'request.role.adv'}=$ENV{'user.adv'};
163: $ENV{'browser.type'}=$clientbrowser;
164: # -------------------------------------------------------------------- Log this
165:
166: &Apache::lonnet::log($domain,$username,$authhost,
167: "Login $ENV{'REMOTE_ADDR'}");
168:
169: # ------------------------------------------------- Check for critical messages
170:
171: my @what=&Apache::lonnet::dump('critical',$domain,$username);
172: if ($what[0]) {
173: if (($what[0] ne 'con_lost') && ($what[0]!~/^error\:/)) {
174: $lowerurl='/adm/email?critical=display';
175: }
176: }
177:
178: # ------------------------------------------------------------ Get cookie ready
179:
180: $cookie="lonID=$cookie; path=/";
181: # -------------------------------------------------------- Menu script and info
182: my $windowinfo=&Apache::lonmenu::open($clientos);
183: my $startupremote=&Apache::lonmenu::startupremote($lowerurl);
184: my $remoteinfo=&Apache::lonmenu::load_remote_msg($lowerurl);
185: my $setflags=&Apache::lonmenu::setflags();
186: my $maincall=&Apache::lonmenu::maincall();
187: my $bodytag=&Apache::loncommon::bodytag('Successful Login');
188: my $add=&addcontent();
189: # ------------------------------------------------- Output for successful login
190:
191: $r->send_cgi_header(<<ENDHEADER);
192: Content-type: text/html$add
193: Set-cookie: $cookie
194:
195: ENDHEADER
196: my %lt=&Apache::lonlocal::texthash(
197: 'wel' => 'Welcome',
198: 'mes' => 'Welcome to the Learning<i>Online</i> Network with CAPA. Please wait while your session is being set up',
199: 'pro' => 'Problems',
200: 'log' => 'loginproblems.html',
201: );
202: $r->print(<<ENDSUCCESS);
203: <html>
204: <head>
205: <title>Successful Login to the LearningOnline Network with CAPA</title>
206: $startupremote
207: </head>
208: $bodytag
209: $setflags
210: $windowinfo
211: <h1>$lt{'wel'}</h1>
212: $lt{'mes'}.<p>
213: <a href="/adm/$lt{'log'}">$lt{'pro'}?</a></p>
214: $remoteinfo
215: $maincall
216: </body>
217: </html>
218: ENDSUCCESS
219: }
220:
221: # --------------------------------------------------------------- Failed login!
222:
223: sub failed {
224: my ($r,$message) = @_;
225: my $bodytag=&Apache::loncommon::bodytag('Unsuccessful Login');
226: my $add=&addcontent();
227: $r->send_cgi_header(<<ENDFHEADER);
228: Content-type: text/html$add
229:
230: ENDFHEADER
231: $r->print(<<ENDFAILED);
232: <html>
233: <head>
234: <title>Unsuccessful Login to the LearningOnline Network with CAPA</title>
235: </head>
236: $bodytag
237: <h1>Sorry ...</h1>
238: <p><b>$message</b></p>
239: <p>Please <a href="/adm/login?username=$FORM{'uname'}&domain=$FORM{'udom'}">log in again</a>.</p>
240: <p>
241: <a href="/adm/loginproblems.html">Problems?</a></p>
242: </body>
243: </html>
244: ENDFAILED
245: }
246:
247: # --------------------------------------------------------------------- Charset
248:
249: sub addcontent {
250: my $encoding=&Apache::lonlocal::current_encoding;
251: if ($encoding) {
252: return '; charset='.$encoding;
253: } else {
254: return '';
255: }
256: }
257:
258: # ------------------------------------------------------------------ Rerouting!
259:
260: sub reroute {
261: my $r=shift;
262: my $bodytag=&Apache::loncommon::bodytag('Rerouting');
263: $r->send_cgi_header(<<ENDRFHEADER);
264: Content-type: text/html
265:
266: ENDRFHEADER
267: $r->print(<<ENDRFAILED);
268: <html>
269: <head>
270: <title>Rerouting Login to the LearningOnline Network with CAPA</title>
271: </head>
272: $bodytag
273: <h1>Sorry ...</h1>
274: Please <a href="/">log in again</a>.
275: </body>
276: </html>
277: ENDRFAILED
278: }
279:
280: # ---------------------------------------------------------------- Main handler
281:
282: sub handler {
283: my $r = shift;
284:
285: # Are we re-routing?
286: if (-e '/home/httpd/html/lon-status/reroute.txt') {
287: &reroute($r);
288: return OK;
289: }
290:
291: &Apache::lonlocal::get_language_handle($r);
292:
293: # -------------------------------- Prevent users from attempting to login twice
294: my %cookies=CGI::Cookie->parse($r->header_in('Cookie'));
295: my $lonid=$cookies{'lonID'};
296: my $cookie;
297: if ($lonid) {
298: my $handle=$lonid->value;
299: $handle=~s/\W//g;
300: my $lonidsdir=$r->dir_config('lonIDsDir');
301: if ((-e "$lonidsdir/$handle.id") && ($handle ne '')) {
302: # Indeed, a valid token is found
303: $r->send_cgi_header(<<ENDFHEADER);
304: Content-type: text/html
305:
306: ENDFHEADER
307: my $bodytag=&Apache::loncommon::bodytag('Already logged in');
308: $r->print(<<ENDFAILED);
309: <html>
310: <head>
311: <title>Already logged in</title>
312: </head>
313: $bodytag
314: <h1>You are already logged in</h1>
315: <p>Please either <a href="/adm/roles">continue the current session</a> or
316: <a href="/adm/logout">logout</a>.</p>
317: <p>
318: <a href="/adm/loginproblems.html">Problems?</a></p>
319: </body>
320: </html>
321: ENDFAILED
322: return OK;
323: }
324: }
325:
326: # ---------------------------------------------------- No valid token, continue
327:
328:
329: my $buffer;
330: $r->read($buffer,$r->header_in('Content-length'),0);
331: my @pairs=split(/&/,$buffer);
332: my $pair; my $name; my $value;
333: undef %FORM;
334: %FORM=();
335: foreach $pair (@pairs) {
336: ($name,$value) = split(/=/,$pair);
337: $value =~ tr/+/ /;
338: $value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg;
339: $FORM{$name}=$value;
340: }
341:
342: if ((!$FORM{'uname'}) || (!$FORM{'upass'}) || (!$FORM{'udom'})) {
343: failed($r,'Username, password and domain need to be specified.');
344: return OK;
345: }
346:
347: # split user logging in and "su"-user
348:
349: ($FORM{'uname'},$FORM{'suname'})=split(/\:/,$FORM{'uname'});
350: $FORM{'uname'} =~ s/\W//g;
351: $FORM{'suname'} =~ s/\W//g;
352: $FORM{'udom'} =~ s/\W//g;
353:
354: my $role = $r->dir_config('lonRole');
355: my $domain = $r->dir_config('lonDefDomain');
356: my $prodir = $r->dir_config('lonUsersDir');
357:
358: # ---------------------------------------- Get the information from login token
359:
360: my $tmpinfo=Apache::lonnet::reply('tmpget:'.$FORM{'logtoken'},
361: $FORM{'serverid'});
362:
363: if (($tmpinfo=~/^error/) || ($tmpinfo eq 'con_lost')) {
364: failed($r,'Information needed to verify your login information is missing, inaccessible or expired.');
365: return OK;
366: } else {
367: unless (&Apache::lonnet::reply('tmpdel:'.$FORM{'logtoken'},
368: $FORM{'serverid'}) eq 'ok') {
369: &failed($r,'Session could not be opened.');
370: }
371: }
372: my ($key,$firsturl)=split(/&/,$tmpinfo);
373:
374: my $keybin=pack("H16",$key);
375:
376: my $cipher;
377: if ($Crypt::DES::VERSION>=2.03) {
378: $cipher=new Crypt::DES $keybin;
379: }
380: else {
381: $cipher=new DES $keybin;
382: }
383:
384: my $upass=$cipher->decrypt(
385: unpack("a8",pack("H16",substr($FORM{'upass'},0,16))));
386:
387: $upass.=$cipher->decrypt(
388: unpack("a8",pack("H16",substr($FORM{'upass'},16,16))));
389:
390: $upass=substr($upass,1,ord(substr($upass,0,1)));
391:
392: # ---------------------------------------------------------------- Authenticate
393: my $authhost=Apache::lonnet::authenticate($FORM{'uname'},
394: $upass,
395: $FORM{'udom'});
396:
397: # --------------------------------------------------------------------- Failed?
398:
399: if ($authhost eq 'no_host') {
400: failed($r,'Username and/or password could not be authenticated.');
401: return OK;
402: }
403:
404: if (($firsturl eq '') ||
405: ($firsturl=~/^\/adm\/(logout|remote)/)) {
406: $firsturl='/adm/roles';
407: }
408: # --------------------------------- Are we attempting to login as somebody else?
409: if ($FORM{'suname'}) {
410: # ------------ see if the original user has enough privileges to pull this stunt
411: if (&Apache::lonnet::privileged($FORM{'uname'},$FORM{'udom'})) {
412: # ---------------------------------------------------- see if the su-user exists
413: unless (&Apache::lonnet::homeserver($FORM{'suname'},$FORM{'udom'})
414: eq 'no_host') {
415: &Apache::lonnet::logthis(&Apache::lonnet::homeserver($FORM{'suname'},$FORM{'udom'}));
416: # ------------------------------ see if the su-user is not too highly privileged
417: unless (&Apache::lonnet::privileged($FORM{'suname'},$FORM{'udom'})) {
418: # -------------------------------------------------------- actually switch users
419: &Apache::lonnet::logperm('User '.$FORM{'uname'}.' at '.$FORM{'udom'}.
420: ' logging in as '.$FORM{'suname'});
421: $FORM{'uname'}=$FORM{'suname'};
422: } else {
423: &Apache::lonnet::logthis('Attempted switch user to privileged user');
424: }
425: }
426: } else {
427: &Apache::lonnet::logthis('Non-privileged user attempting switch user');
428: }
429: }
430: &success($r,$FORM{'uname'},$FORM{'udom'},$authhost,$firsturl);
431: return OK;
432: }
433:
434: 1;
435: __END__
436:
437:
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>