Annotation of loncom/lchtmldir, revision 1.10

1.7       albertel    1: #!/usr/bin/perl
1.1       foxr        2: 
                      3: # The Learning Online Network with CAPA
                      4: #
                      5: # Copyright Michigan State University Board of Trustees
                      6: #
                      7: # This file is part of the LearningOnline Network with CAPA (LON-CAPA).
                      8: #
                      9: # LON-CAPA is free software; you can redistribute it and/or modify
                     10: # it under the terms of the GNU General Public License as published by
                     11: # the Free Software Foundation; either version 2 of the License, or
                     12: # (at your option) any later version.
                     13: #
                     14: # LON-CAPA is distributed in the hope that it will be useful,
                     15: # but WITHOUT ANY WARRANTY; without even the implied warranty of
                     16: # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
                     17: # GNU General Public License for more details.
                     18: #
                     19: # You should have received a copy of the GNU General Public License
                     20: # along with LON-CAPA; if not, write to the Free Software
                     21: # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
                     22: #
                     23: # /home/httpd/html/adm/gpl.txt
                     24: #
                     25: # http://www.lon-capa.org/
                     26: #
                     27: #  lchtmldir - LONC-CAPA setuid script to:
                     28: #              o If necessary, add a public_html directory 
                     29: #                to the specified user home directory.
                     30: #              o Set the permissions according to the authentication type.
                     31: #
                     32: #  Motivations:
                     33: #     Originally, account creation would create a public_html
                     34: #     directory for unix authorized people only.  It is possible to have
                     35: #     Kerberos, internal and locally authorized 'users' which may be authors
                     36: #     and hence need a properly owned an protected public_html directory
                     37: #     to serve as their construction space.
                     38: #
                     39: #  Author:
                     40: #    Ron Fox
                     41: #    NSCL
                     42: #    Michigan State University8
                     43: #    East Lansing, MI 48824-1321
                     44: 
                     45: #   General flow of control:
                     46: #   1. Validate process state (must be run as www).
                     47: #   2. Validate parameters:  Need two parameters:
                     48: #         o Homedir  - Home diretory of user 
                     49: #         o Username - Name of the user.
                     50: #         o AuthMode - Authentication mode, can be:
                     51: #                      - unix
                     52: #                      - internal
                     53: #                      - krb4
                     54: #                      - localauth
                     55: #  3. Untaint the usename and home directory
                     56: #
                     57: #  4. As root if necessary, create $Homedir/public_html
                     58: #  5. Set ownership/permissions according to authentication mode (AuthMode)
                     59: #       - unix - ~owner:www/2775
                     60: #       - krb4 - ~owner:www/2775
                     61: #       - internal - www:www/2775
                     62: #       - local    - www:www/2775
                     63: #
                     64: 
                     65: #
                     66: #   Take a few precautions to be sure that we're not vulnerable to trojan
                     67: #   horses and other fine issues:
                     68: #
                     69: use strict; 
1.10    ! foxr       70: use Fcntl qw(:mode);
        !            71: use DirHandle;
        !            72: 
1.1       foxr       73: 
                     74: $ENV{'PATH'} = '/bin:/usr/bin:/usr/local/sbin:/home/httpd/perl';
                     75: delete @ENV{qw{IFS CDPATH ENV BASH_ENV}};
                     76: 
                     77: my $DEBUG = 0;                         # .nonzero -> Debug printing enabled.
1.10    ! foxr       78: my $path_sep = "/";		# Unix like operating systems.
1.1       foxr       79: 
                     80: 
                     81: # If the UID of the running process is not www exit with error.
                     82: 
                     83: if ($DEBUG) {
                     84:     print("Checking uid...\n");
                     85: }
                     86: my $wwwid = getpwnam('www');
                     87: &DisableRoot;
                     88: if($wwwid != $>) {
                     89:     if ($DEBUG) {
                     90: 	print("User ID incorrect.  This program must be run as user 'www'\n");
                     91:     }
                     92:     exit 1;			# Exit with error status.
                     93: }
                     94: 
                     95: # There must be three 'command line' parameters.  The first
                     96: # is the home directory of the user.
                     97: # The second is the name of the user.  This is only referenced
                     98: # in code branches dealing with unix mode authentication.
                     99: # The last is the authentication mode which must be one of unix, internal
                    100: # krb4 or localauth.
                    101: #   If there is an error in the argument count or countents, we exit with an
                    102: # error.
                    103: 
                    104: if ($DEBUG) {
                    105:     print("Checking parameters: \n");
                    106: }
                    107: if(@ARGV != 3) {
                    108:     if($DEBUG) {
                    109: 	print("Error: lchtmldir need 3 parameters \n");
                    110:     }
                    111:     exit 2;
                    112: }
                    113: my ($dir,$username,$authentication) = @ARGV;
                    114: 
                    115: if($DEBUG) {
                    116:     print ("Directory = $dir \n");
                    117:     print ("User      = $username \n");
                    118:     print ("Authmode  = $authentication \n");
                    119: 
                    120: }
                    121: 
1.2       foxr      122: if( $authentication ne "unix:"     &&
                    123:     $authentication ne "internal:" &&
1.4       matthew   124:     $authentication !~ /^krb(4|5):(.*)/ &&
1.2       foxr      125:     $authentication ne "localauth:") {
1.1       foxr      126:     if($DEBUG) {
                    127: 	print("Invalid authentication parameter: ".$authentication."\n");
                    128: 	print("Should be one of: unix, internal, krb4, localauth\n");
                    129:     }
                    130:     exit 3;
                    131: }
                    132: 
                    133: # Untaint the username.
                    134: 
                    135: my $match = $username =~ /^(\w+)$/;
                    136: my $patt  = $1;
                    137:  
                    138: if($DEBUG) {
                    139:    print("Username word match flag = ".$match."\n");
                    140:     print("Match value = ".$patt."\n");
                    141: }
                    142: 
                    143: my $safeuser = $patt;
                    144: if($DEBUG) {
                    145:     print("Save username = $safeuser \n");
                    146: }
                    147: if(($username ne $safeuser) or ($safeuser!~/^[A-za-z]/)) {
                    148:     if($DEBUG) {
                    149: 	print("User name $username had illegal characters\n");
                    150:     }
                    151:     exit 4;
                    152: }
                    153: 
                    154: #untaint the base directory require that the dir contain only 
                    155: # alphas, / numbers or underscores, and end in /$safeuser
                    156: 
                    157: $dir =~ /(^([\w\/]+))/;
                    158: 
                    159: my $dirtry1 = $1;
                    160: 
                    161: $dir =~ /$\/$safeuser/;
                    162: my $dirtry2 = $1;
                    163: 
                    164: if(($dirtry1 ne $dir) or ($dirtry2 ne $dir)) {
                    165:     if ($DEBUG) {
                    166: 	print("Directory $dir is not a valid home for $safeuser\n");
                    167:     }
                    168:     exit 5;
                    169: }
                    170: 
                    171: 
                    172: # As root, create the directory.
                    173: 
1.9       foxr      174: my $homedir = $dirtry1;
                    175: my $fulldir = $homedir."/public_html";
                    176: 
1.1       foxr      177: if($DEBUG) {
                    178:     print("Full directory path is: $fulldir \n");
                    179: }
                    180: if(!( -e $dirtry1)) {
                    181:     if($DEBUG) {
                    182: 	print("User's home directory $dirtry1 does not exist\n");
                    183:     }
1.4       matthew   184:     if ($authentication eq "unix:") {
                    185:         exit 6;
                    186:     }
1.1       foxr      187: }
                    188: &EnableRoot;
                    189: 
1.3       foxr      190: &System("/bin/mkdir -p $fulldir")   unless (-e $fulldir);
1.1       foxr      191:     unless(-e $fulldir."/index.html") {
                    192: 	open OUT,">".$fulldir."/index.html";
                    193: 	print OUT<<END;
                    194: 	<html>
                    195: 	<head>
                    196: 	<title>$safeuser</title>
                    197:         </head>
1.5       www       198:         <body bgcolor="#ccffdd">
                    199:         <h1>$safeuser Construction Space</h1>
                    200:           <h2>
                    201:             The Learning<i>Online</i> Network with Computer-Assisted Personalized Approach
                    202:           </h2>
1.1       foxr      203:           <p>
1.5       www       204: This is your construction space within LON-CAPA, where you would construct resources which are meant to be
                    205: used across courses and institutions.
1.1       foxr      206:           </p>
                    207:           <p>
1.5       www       208: Material within this area can only be seen and edited by $safeuser and designated co-authors. To make
                    209: it available to students and other instructors, the material needs to be published.
1.1       foxr      210:           </p>
                    211:         </body>
                    212:        </html>
                    213: END
                    214:     close OUT;
                    215:     }
1.9       foxr      216: 
1.1       foxr      217: &System("/bin/chmod  02775  $fulldir");
                    218: &System("/bin/chmod  0775  $fulldir"."/index.html");
                    219: 
                    220: 
                    221: # Based on the authentiation mode, set the ownership of the directory.
                    222: 
1.2       foxr      223: if($authentication eq "unix:") {	# Unix mode authentication...
1.6       albertel  224:     &System("/bin/chown -R   $safeuser".":".$safeuser." ".$fulldir);
                    225:     &JoinGroup($safeuser);
1.4       matthew   226: } else {
                    227:     # Internal, Kerberos, and Local authentication are for users
                    228:     # who do not have unix accounts on the system.  Therefore we
                    229:     # will give ownership of their public_html directories to www:www
1.9       foxr      230:     # If the user is an internal auth user, the rest of the directory tree
                    231:     # gets owned by root.  This chown is needed in case what's really happening
                    232:     # is that a file system user is being demoted to internal user...
                    233: 
                    234:     if($authentication eq "internal:") {
                    235: 	&System("/bin/chown -R root:root ".$homedir);
                    236:     }
1.4       matthew   237:     &System("/bin/chown -R www:www  ".$fulldir);
1.1       foxr      238: }
                    239: &DisableRoot;
                    240: 
                    241: exit 0;
                    242: 
                    243: #----------------------------------------------------------------------
                    244: #
                    245: #  Local utility procedures.
                    246: #  These include:
                    247: #     EnableRoot - Start running as root.
                    248: #     DisableRoot- Stop running as root.
                    249: #     JoinGroup  - Join www to the specified group.
                    250: 
                    251: # Turn on as root:
                    252: 
                    253: sub EnableRoot {
                    254:     if ($wwwid==$>) {
                    255: 	($<,$>)=($>,$<);
                    256: 	($(,$))=($),$();
                    257:     }
                    258:     else {
                    259: 	# root capability is already enabled
                    260:     }
                    261:     if($DEBUG) {
1.4       matthew   262: 	print("Enable Root - id =  $> $<\n");
1.1       foxr      263:     }
                    264:     return $>;  
                    265: }
                    266: 
                    267: sub DisableRoot {
                    268:     if ($wwwid==$<) {
                    269: 	($<,$>)=($>,$<);
                    270: 	($(,$))=($),$();
                    271:     }
                    272:     else {
                    273: 	# root capability is already disabled
                    274:     }
                    275:     if($DEBUG) {
                    276: 	print("Disable root: id = ".$>."\n");
                    277:     }
                    278: }
                    279: 
                    280: sub JoinGroup {
                    281:     my $usergroup = shift;
                    282: 
                    283:     my $groups = `/usr/bin/groups www`;
1.6       albertel  284:     # untaint
1.8       albertel  285:     my ($safegroups)=($groups=~/:\s+([\s\w]+)/);
1.6       albertel  286:     $groups=$safegroups;
1.1       foxr      287:     chomp $groups; $groups=~s/^\S+\s+\:\s+//;
                    288:     my @grouplist=split(/\s+/,$groups);
                    289:     my @ugrouplist=grep {!/www|$usergroup/} @grouplist;
                    290:     my $gl=join(',',(@ugrouplist,$usergroup));
                    291:     if (&System('/usr/sbin/usermod','-G',$gl,'www')) {
                    292: 	if($DEBUG) {
                    293: 	    print "Error. Could not make www a member of the group ".
                    294: 		"\"$usergroup\".\n";
                    295: 	}
                    296: 	exit 6;
                    297:     }
                    298:     
                    299: }
                    300: 
                    301: 
                    302: 
                    303: sub System {
1.6       albertel  304:     my ($command,@args) = @_;
1.1       foxr      305:     if($DEBUG) {
1.6       albertel  306: 	print("system: $command with args ".join(' ',@args)."\n");
1.1       foxr      307:     }
1.6       albertel  308:     system($command,@args);
1.1       foxr      309: }
                    310: 
                    311: 
                    312: 
                    313: 
1.10    ! foxr      314: 
        !           315: #
        !           316: #   This file contains code to recursively process
        !           317: #   a Directory.  This is a bit more powerful
        !           318: #   than File::Find in that we pass the full
        !           319: #   stat info to the processing function.
        !           320: #     For each file in the specified directory subtree, 
        !           321: #   The user's Code reference is invoked for all files, regular and otherwise
        !           322: #   except:
        !           323: #      ., ..
        !           324: #
        !           325: #  Parameters:
        !           326: #     code_ref    - Code reference, invoked for each file in the tree.
        !           327: #                   as follows:  CodeRef(directory, name, statinfo)
        !           328: #                   directory the path to the directory holding the file.
        !           329: #                   name      the name of the file within Directory.
        !           330: #                   statinfo  a reference to the stat of the file.
        !           331: #     start_dir   - The starting point of the directory walk.
        !           332: #
        !           333: # NOTE:
        !           334: #   Yes, we could have just used File::Find, but since we have to get the
        !           335: #   stat anyway, this is actually simpler, as File::Find would have gotten
        !           336: #   the stat to figure out the file type and then we would have gotten it
        !           337: #   again.
        !           338: #
        !           339: 
        !           340: sub process_tree {
        !           341:     my ($code_ref, $start_dir)  = @_;
        !           342: 
        !           343:     my $dir = new DirHandle $start_dir; 
        !           344:     if (!defined($dir)) {
        !           345:         print "Failed to  open dirhandle: $start_dir\n";
        !           346:     }
        !           347: 
        !           348:     # Now iterate through this level of the tree:
        !           349: 
        !           350:     while (defined (my $name = $dir->read)) {
        !           351: 	next if $name =~/^\.\.?$/;       # Skip ., .. (see cookbook pg 319)
        !           352: 	
        !           353: 	my $full_name   = $start_dir.$path_sep.$name; # Full filename path.
        !           354: 	my @stat_info  = lstat($full_name);
        !           355: 	my $mode       = $stat_info[2];
        !           356: 	my $type       = $mode & 0170000; #  File type.
        !           357: 
        !           358: 	# Unless the file type is a symlink, call the user code:
        !           359: 
        !           360: 	unless ($type == S_IFLNK) {
        !           361: 	    &$code_ref($start_dir, $name, \@stat_info);
        !           362: 	}
        !           363: 
        !           364: 	# If the entry is a directory, we need to recurse:
        !           365: 
        !           366: 
        !           367: 	if (($type ==  S_IFDIR) != 0) {
        !           368: 	    &process_tree($code_ref, $full_name);
        !           369: 	}
        !           370:     }
        !           371: 
        !           372: }
        !           373: #
        !           374: #  Simple test of process_tree:
        !           375: #
        !           376: sub write_script {
        !           377:     my ($dir, $name, $statinfo) = @_;
        !           378: 
        !           379:     my $fullname = $dir.$path_sep.$name;
        !           380: 
        !           381:     #  We're going to '' the name, but we need to deal with embedded
        !           382:     #  ' characters.  Using " is much worse as we'd then have to
        !           383:     #  escape all the shell escapes too.  This way all we need
        !           384:     #  to do is replace ' with '\''
        !           385: 
        !           386:     $fullname =~ s/\'/\'\\\'\'/g;
        !           387: 
        !           388:     my $perms    = $statinfo->[2] & 0777; # Just permissions.
        !           389:     printf CHMODSCRIPT "chmod 0%o '%s'\n", $perms, $fullname;
        !           390:     printf CHMODSCRIPT "chown %d:%d '%s'\n", $statinfo->[4], $statinfo->[5], 
        !           391:                                          $fullname
        !           392: 
        !           393: 
        !           394: }
        !           395: 
        !           396: 
        !           397: 
        !           398: 

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>