version 1.16, 2021/02/08 14:50:53
|
version 1.21, 2022/02/17 22:35:50
|
Line 41 use MIME::Base64;
|
Line 41 use MIME::Base64;
|
use Crypt::OpenSSL::X509; |
use Crypt::OpenSSL::X509; |
use Crypt::X509::CRL; |
use Crypt::X509::CRL; |
use Crypt::PKCS10; |
use Crypt::PKCS10; |
|
use Net::OAuth; |
|
use Crypt::CBC; |
|
|
sub dump_with_regexp { |
sub dump_with_regexp { |
my ( $tail, $clientversion ) = @_; |
my ( $tail, $clientversion ) = @_; |
Line 242 sub check_homecourses {
|
Line 244 sub check_homecourses {
|
} |
} |
} |
} |
unless (&untie_domain_hash($hashref)) { |
unless (&untie_domain_hash($hashref)) { |
&logthis("Failed to untie tied hash for nohist_courseids.db for $domain"); |
&Apache::lonnet::logthis("Failed to untie tied hash for nohist_courseids.db for $domain"); |
} |
} |
} else { |
} else { |
&logthis("Failed to tie hash for nohist_courseids.db for $domain"); |
&Apache::lonnet::logthis("Failed to tie hash for nohist_courseids.db for $domain"); |
} |
} |
} |
} |
foreach my $hashid (keys(%recent)) { |
foreach my $hashid (keys(%recent)) { |
Line 317 sub get_courseinfo_hash {
|
Line 319 sub get_courseinfo_hash {
|
}; |
}; |
if ($@) { |
if ($@) { |
if ($@ eq "timeout\n") { |
if ($@ eq "timeout\n") { |
&logthis("<font color='blue'>WARNING courseiddump for $cnum:$cdom from $home timedout</font>"); |
&Apache::lonnet::logthis("<font color='blue'>WARNING courseiddump for $cnum:$cdom from $home timedout</font>"); |
} else { |
} else { |
&logthis("<font color='yellow'>WARNING unexpected error during eval of call for courseiddump from $home</font>"); |
&Apache::lonnet::logthis("<font color='yellow'>WARNING unexpected error during eval of call for courseiddump from $home</font>"); |
} |
} |
} else { |
} else { |
if (ref($info{$cdom.'_'.$cnum}) eq 'HASH') { |
if (ref($info{$cdom.'_'.$cnum}) eq 'HASH') { |
Line 805 sub is_course {
|
Line 807 sub is_course {
|
} |
} |
&Apache::lonnet::do_cache_new('iscourse',$hashid,$iscourse,3600); |
&Apache::lonnet::do_cache_new('iscourse',$hashid,$iscourse,3600); |
unless (&untie_domain_hash($hashref)) { |
unless (&untie_domain_hash($hashref)) { |
&logthis("Failed to untie tied hash for nohist_courseids.db for $cdom"); |
&Apache::lonnet::logthis("Failed to untie tied hash for nohist_courseids.db for $cdom"); |
} |
} |
} else { |
} else { |
&logthis("Failed to tie hash for nohist_courseids.db for $cdom"); |
&Apache::lonnet::logthis("Failed to tie hash for nohist_courseids.db for $cdom"); |
} |
} |
} |
} |
return $iscourse; |
return $iscourse; |
Line 1043 sub get_dom {
|
Line 1045 sub get_dom {
|
return $qresult; |
return $qresult; |
} |
} |
|
|
|
sub store_dom { |
|
my ($userinput) = @_; |
|
my ($cmd,$dom,$namespace,$rid,$what) =split(/:/,$userinput); |
|
my $hashref = &tie_domain_hash($dom,$namespace,&GDBM_WRCREAT(),"S","$rid:$what") or |
|
return "error: ".($!+0)." tie(GDBM) Failed while attempting $cmd"; |
|
$hashref->{"version:$rid"}++; |
|
my $version=$hashref->{"version:$rid"}; |
|
my $allkeys=''; |
|
my @pairs=split(/\&/,$what); |
|
foreach my $pair (@pairs) { |
|
my ($key,$value)=split(/=/,$pair); |
|
$allkeys.=$key.':'; |
|
$hashref->{"$version:$rid:$key"}=$value; |
|
} |
|
my $now = time; |
|
$hashref->{"$version:$rid:timestamp"}=$now; |
|
$allkeys.='timestamp'; |
|
$hashref->{"$version:keys:$rid"}=$allkeys; |
|
&untie_user_hash($hashref) or |
|
return "error: ".($!+0)." untie(GDBM) Failed while attempting $cmd"; |
|
return 'ok'; |
|
} |
|
|
|
sub restore_dom { |
|
my ($userinput) = @_; |
|
my ($cmd,$dom,$namespace,$rid) = split(/:/,$userinput); |
|
my $hashref = &tie_domain_hash($dom,$namespace,&GDBM_READER()) or |
|
return "error: ".($!+0)." tie(GDBM) Failed while attempting $cmd"; |
|
my $qresult=''; |
|
if (ref($hashref)) { |
|
chomp($rid); |
|
my $version=$hashref->{"version:$rid"}; |
|
$qresult.="version=$version&"; |
|
my $scope; |
|
for ($scope=1;$scope<=$version;$scope++) { |
|
my $vkeys=$hashref->{"$scope:keys:$rid"}; |
|
my @keys=split(/:/,$vkeys); |
|
my $key; |
|
$qresult.="$scope:keys=$vkeys&"; |
|
foreach $key (@keys) { |
|
$qresult.="$scope:$key=".$hashref->{"$scope:$rid:$key"}."&"; |
|
} |
|
} |
|
$qresult=~s/\&$//; |
|
} |
|
&untie_user_hash($hashref) or |
|
return "error: ".($!+0)." untie(GDBM) Failed while attempting $cmd"; |
|
return $qresult; |
|
} |
|
|
|
sub crslti_itemid { |
|
my ($cdom,$cnum,$url,$method,$params,$loncaparev) = @_; |
|
unless (ref($params) eq 'HASH') { |
|
return; |
|
} |
|
if (($cdom eq '') || ($cnum eq '')) { |
|
return; |
|
} |
|
my ($itemid,$consumer_key,$secret); |
|
|
|
if (exists($params->{'oauth_callback'})) { |
|
$Net::OAuth::PROTOCOL_VERSION = Net::OAuth::PROTOCOL_VERSION_1_0A; |
|
} else { |
|
$Net::OAuth::PROTOCOL_VERSION = Net::OAuth::PROTOCOL_VERSION_1_0; |
|
} |
|
|
|
my $consumer_key = $params->{'oauth_consumer_key'}; |
|
return if ($consumer_key eq ''); |
|
|
|
my (%crslti,%crslti_by_key); |
|
my $hashid=$cdom.'_'.$cnum; |
|
my ($result,$cached)=&Apache::lonnet::is_cached_new('courseltienc',$hashid); |
|
if (defined($cached)) { |
|
if (ref($result) eq 'HASH') { |
|
%crslti = %{$result}; |
|
} |
|
} else { |
|
my $reply = &dump_with_regexp(join(":",($cdom,$cnum,'nohist_ltienc','','')),$loncaparev); |
|
%crslti = %{&Apache::lonnet::unserialize($reply)}; |
|
my $cachetime = 24*60*60; |
|
&Apache::lonnet::do_cache_new('courseltienc',$hashid,\%crslti,$cachetime); |
|
} |
|
|
|
return if (!keys(%crslti)); |
|
|
|
foreach my $id (keys(%crslti)) { |
|
if (ref($crslti{$id}) eq 'HASH') { |
|
my $key = $crslti{$id}{'key'}; |
|
if (($key ne '') && ($crslti{$id}{'secret'} ne '')) { |
|
push(@{$crslti_by_key{$key}},$id); |
|
} |
|
} |
|
} |
|
|
|
return if (!keys(%crslti_by_key)); |
|
|
|
my %courselti = &Apache::lonnet::get_course_lti($cnum,$cdom,'provider'); |
|
|
|
if (ref($crslti_by_key{$consumer_key}) eq 'ARRAY') { |
|
foreach my $id (@{$crslti_by_key{$consumer_key}}) { |
|
my $secret = $crslti{$id}{'secret'}; |
|
if (ref($courselti{$id}) eq 'HASH') { |
|
if ((exists($courselti{$id}{'cipher'})) && |
|
($courselti{$id}{'cipher'} =~ /^\d+$/)) { |
|
my $keynum = $courselti{$id}{'cipher'}; |
|
my $privkey = &get_dom("getdom:$cdom:private:$keynum:lti:key"); |
|
if ($privkey ne '') { |
|
my $cipher = new Crypt::CBC($privkey); |
|
$secret = $cipher->decrypt_hex($secret); |
|
} |
|
} |
|
} |
|
my $request = Net::OAuth->request('request token')->from_hash($params, |
|
request_url => $url, |
|
request_method => $method, |
|
consumer_secret => $secret,); |
|
if ($request->verify()) { |
|
$itemid = $id; |
|
last; |
|
} |
|
} |
|
} |
|
return $itemid; |
|
} |
|
|
|
sub domlti_itemid { |
|
my ($dom,$context,$url,$method,$params,$loncaparev) = @_; |
|
unless (ref($params) eq 'HASH') { |
|
return; |
|
} |
|
if ($dom eq '') { |
|
return; |
|
} |
|
my ($itemid,$consumer_key,$secret); |
|
|
|
if (exists($params->{'oauth_callback'})) { |
|
$Net::OAuth::PROTOCOL_VERSION = Net::OAuth::PROTOCOL_VERSION_1_0A; |
|
} else { |
|
$Net::OAuth::PROTOCOL_VERSION = Net::OAuth::PROTOCOL_VERSION_1_0; |
|
} |
|
|
|
my $consumer_key = $params->{'oauth_consumer_key'}; |
|
return if ($consumer_key eq ''); |
|
|
|
my ($name,$cachename); |
|
if ($context eq 'linkprot') { |
|
$name = $context; |
|
} else { |
|
$name = 'lti'; |
|
} |
|
$cachename = $name.'enc'; |
|
my %ltienc; |
|
my ($encresult,$enccached)=&Apache::lonnet::is_cached_new($cachename,$dom); |
|
if (defined($enccached)) { |
|
if (ref($encresult) eq 'HASH') { |
|
%ltienc = %{$encresult}; |
|
} |
|
} else { |
|
my $reply = &get_dom("getdom:$dom:encconfig:$name"); |
|
my $ltiencref = &Apache::lonnet::thaw_unescape($reply); |
|
if (ref($ltiencref) eq 'HASH') { |
|
%ltienc = %{$ltiencref}; |
|
} |
|
my $cachetime = 24*60*60; |
|
&Apache::lonnet::do_cache_new($cachename,$dom,\%ltienc,$cachetime); |
|
} |
|
|
|
return if (!keys(%ltienc)); |
|
|
|
my %lti_by_key; |
|
foreach my $id (keys(%ltienc)) { |
|
if (ref($ltienc{$id}) eq 'HASH') { |
|
my $key = $ltienc{$id}{'key'}; |
|
if (($key ne '') && ($ltienc{$id}{'secret'} ne '')) { |
|
push(@{$lti_by_key{$key}},$id); |
|
} |
|
} |
|
} |
|
return if (!keys(%lti_by_key)); |
|
|
|
my %lti = &Apache::lonnet::get_domain_lti($dom,$context); |
|
|
|
if (ref($lti_by_key{$consumer_key}) eq 'ARRAY') { |
|
foreach my $id (@{$lti_by_key{$consumer_key}}) { |
|
my $secret = $ltienc{$id}{'secret'}; |
|
if (ref($lti{$id}) eq 'HASH') { |
|
if ((exists($lti{$id}{'cipher'})) && |
|
($lti{$id}{'cipher'} =~ /^\d+$/)) { |
|
my $keynum = $lti{$id}{'cipher'}; |
|
my $privkey = &get_dom("getdom:$dom:private:$keynum:lti:key"); |
|
if ($privkey ne '') { |
|
my $cipher = new Crypt::CBC($privkey); |
|
$secret = $cipher->decrypt_hex($secret); |
|
} |
|
} |
|
} |
|
my $request = Net::OAuth->request('request token')->from_hash($params, |
|
request_url => $url, |
|
request_method => $method, |
|
consumer_secret => $secret,); |
|
if ($request->verify()) { |
|
$itemid = $id; |
|
last; |
|
} |
|
} |
|
} |
|
return $itemid; |
|
} |
|
|
1; |
1; |
|
|
__END__ |
__END__ |