Annotation of loncom/auth/lonauth.pm, revision 1.59

1.1       albertel    1: # The LearningOnline Network
                      2: # User Authentication Module
1.27      www         3: #
1.59    ! www         4: # $Id: lonauth.pm,v 1.58 2003/10/30 00:54:57 www Exp $
1.27      www         5: #
                      6: # Copyright Michigan State University Board of Trustees
                      7: #
                      8: # This file is part of the LearningOnline Network with CAPA (LON-CAPA).
                      9: #
                     10: # LON-CAPA is free software; you can redistribute it and/or modify
                     11: # it under the terms of the GNU General Public License as published by
                     12: # the Free Software Foundation; either version 2 of the License, or
                     13: # (at your option) any later version.
                     14: #
                     15: # LON-CAPA is distributed in the hope that it will be useful,
                     16: # but WITHOUT ANY WARRANTY; without even the implied warranty of
                     17: # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
                     18: # GNU General Public License for more details.
                     19: #
                     20: # You should have received a copy of the GNU General Public License
                     21: # along with LON-CAPA; if not, write to the Free Software
                     22: # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
                     23: #
                     24: # /home/httpd/html/adm/gpl.txt
                     25: #
                     26: # http://www.lon-capa.org/
                     27: #
1.2       www        28: # 5/21/99,5/22,5/25,5/26,5/27,5/29,6/2,6/11,6/14,6/15
1.4       www        29: # 16/11,12/16,
1.9       www        30: # 1/14,2/24,2/28,2/29,3/7,5/29,5/30,5/31,6/1,6/5,6/29,
1.19      www        31: # 7/1,7/10,10/2,10/5,10/9,10/26,10/30,11/10,
                     32: # 05/28,05/29 Gerd Kortemeyer
1.22      www        33: # 07/28,08/03 Gerd Kortemeyer
1.24      www        34: # 8/20 Gerd Kortemeyer
1.1       albertel   35: 
                     36: package Apache::lonauth;
                     37: 
1.18      albertel   38: use strict;
1.1       albertel   39: use Apache::Constants qw(:common);
                     40: use Apache::File;
                     41: use CGI qw(:standard);
                     42: use CGI::Cookie();
1.26      harris41   43: use DynaLoader; # for Crypt::DES version
1.8       www        44: use Crypt::DES;
1.45      matthew    45: use Apache::loncommon();
1.1       albertel   46: use Apache::lonnet();
1.12      www        47: use Apache::lonmenu();
1.18      albertel   48: use Fcntl qw(:flock);
1.56      www        49: use Apache::lonlocal;
1.37      www        50: 
                     51: my %FORM;
                     52: 
1.1       albertel   53: # ------------------------------------------------------------ Successful login
                     54: 
                     55: sub success {
1.6       www        56:     my ($r, $username, $domain, $authhost,$lowerurl) = @_;
1.1       albertel   57:     my $lonids=$r->dir_config('lonIDsDir');
1.4       www        58: 
                     59: # See if old ID present, if so, remove
1.17      www        60: 
                     61:     my $filename;
                     62:     opendir(DIR,$lonids);
                     63:     while ($filename=readdir(DIR)) {
                     64:        if ($filename=~/^$username\_\d+\_$domain\_$authhost\.id$/) {
                     65: 	  unlink($lonids.'/'.$filename);
                     66:        }
1.4       www        67:     }
1.17      www        68:     closedir(DIR);
1.4       www        69: 
                     70: # Give them a new cookie
                     71: 
1.17      www        72:     my $cookie;
1.5       www        73:     my $now=time;
                     74:     $cookie="$username\_$now\_$domain\_$authhost";
                     75: 
                     76: # Initialize roles
                     77: 
                     78:     my $userroles=Apache::lonnet::rolesinit($domain,$username,$authhost);
                     79: 
1.7       www        80: # ------------------------------------ Check browser type and MathML capability
1.6       www        81: 
1.45      matthew    82:     my ($httpbrowser,$clientbrowser,$clientversion,$clientmathml,
                     83:         $clientunicode,$clientos) = &Apache::loncommon::decode_user_agent($r);
1.6       www        84: 
1.40      www        85: # -------------------------------------- Any accessibility options to remember?
                     86:     if (($FORM{'interface'}) && ($FORM{'remember'} eq 'true')) {
1.41      albertel   87: 	foreach ('imagesuppress','appletsuppress',
                     88: 		 'embedsuppress','fontenhance','blackwhite') {
                     89: 	    if ($FORM{$_} eq 'true') {
                     90: 		&Apache::lonnet::put('environment',{$_ => 'on'},
                     91: 				     $domain,$username);
                     92: 	    } else {
                     93: 		&Apache::lonnet::del('environment',[$_],$domain,$username);
                     94: 	    }
                     95: 	}
                     96:     }
1.11      www        97: # ------------------------------------------------------------- Get environment
                     98: 
1.32      albertel   99:     my $userenv;
                    100:     my %userenv=Apache::lonnet::dump('environment',$domain,$username);
                    101:     my ($tmp) = keys(%userenv);
                    102:     if ($tmp !~ /^(con_lost|error|no_such_host)/i) {
                    103: 	foreach my $key (keys(%userenv)) {
                    104: 	    $userenv.="environment.$key=$userenv{$key}\n";
                    105: 	}
1.11      www       106:     }
1.38      www       107:     if (($userenv{'interface'}) && (!$FORM{'interface'})) {
                    108: 	$FORM{'interface'}=$userenv{'interface'};
                    109:     }
1.47      www       110:     $ENV{'environment.remote'}=$userenv{'remote'};
1.54      www       111: # --------------- Do not trust query string to be put directly into environment
                    112:     foreach ('imagesuppress','appletsuppress',
                    113: 	     'embedsuppress','fontenhance','blackwhite',
                    114: 	     'interface','localpath','localres') {
                    115: 	$FORM{$_}=~s/[\n\r\=]//gs;
                    116:     }
1.7       www       117: # --------------------------------------------------------- Write first profile
1.5       www       118: 
1.41      albertel  119:     {
                    120: 	my $idf=Apache::File->new(">$lonids/$cookie.id");
                    121: 	unless (flock($idf,LOCK_EX)) {
                    122: 	    &Apache::lonnet::logthis("<font color=blue>WARNING: ".
                    123: 			   'Could not obtain exclusive lock in lonauth: '.$!);
                    124: 	    $idf->close();
                    125: 	    return 'error: '.$!;
                    126: 	}
                    127: 	if ($userenv ne '') { print $idf "$userenv\n"; }
                    128: 	print $idf "user.name=$username\n";
                    129: 	print $idf "user.domain=$domain\n";
                    130: 	print $idf "user.home=$authhost\n";
                    131: 	print $idf "browser.type=$clientbrowser\n";
                    132: 	print $idf "browser.version=$clientversion\n";
                    133: 	print $idf "browser.mathml=$clientmathml\n";
                    134: 	print $idf "browser.unicode=$clientunicode\n";
                    135: 	print $idf "browser.os=$clientos\n";
1.53      www       136:         if ($FORM{'localpath'}) {
                    137:            print $idf "browser.localpath=$FORM{'localpath'}\n";
                    138:            print $idf "browser.localres=$FORM{'localres'}\n";
                    139:         }
1.41      albertel  140: 	print $idf "request.course.fn=\n";
                    141: 	print $idf "request.course.uri=\n";
                    142: 	print $idf "request.course.sec=\n";
                    143: 	print $idf "request.role=cm\n";
1.48      www       144:         print $idf "request.role.adv=$ENV{'user.adv'}\n";
1.42      www       145: 	print $idf "request.host=$ENV{'REMOTE_ADDR'}\n";
1.41      albertel  146: 	if ($FORM{'interface'}) {
                    147: 	    $FORM{'interface'}=~s/\W//gs;
                    148: 	    print $idf "browser.interface=$FORM{'interface'}\n";
                    149: 	    $ENV{'browser.interface'}=$FORM{'interface'};
                    150: 	    foreach ('imagesuppress','appletsuppress',
                    151: 		     'embedsuppress','fontenhance','blackwhite') {
                    152: 		if (($FORM{$_} eq 'true') ||
                    153: 		    ($userenv{$_} eq 'on')) {
                    154: 		    print $idf "browser.$_=on\n";
                    155: 		}
1.18      albertel  156: 	    }
1.41      albertel  157: 	}
                    158: 	if ($userroles ne '') { print $idf "$userroles"; }
                    159: 	$idf->close();
                    160:     }
                    161:     $ENV{'request.role'}='cm';
1.48      www       162:     $ENV{'request.role.adv'}=$ENV{'user.adv'};
1.41      albertel  163:     $ENV{'browser.type'}=$clientbrowser;
1.7       www       164: # -------------------------------------------------------------------- Log this
                    165: 
                    166:     &Apache::lonnet::log($domain,$username,$authhost,
                    167:                          "Login $ENV{'REMOTE_ADDR'}");
1.4       www       168: 
1.14      www       169: # ------------------------------------------------- Check for critical messages
                    170: 
1.21      www       171:     my @what=&Apache::lonnet::dump('critical',$domain,$username);
1.14      www       172:     if ($what[0]) {
1.22      www       173: 	if (($what[0] ne 'con_lost') && ($what[0]!~/^error\:/)) {
1.21      www       174: 	    $lowerurl='/adm/email?critical=display';
1.14      www       175:         }
                    176:     }
                    177: 
1.5       www       178: # ------------------------------------------------------------ Get cookie ready
                    179: 
1.1       albertel  180:     $cookie="lonID=$cookie; path=/";
1.12      www       181: # -------------------------------------------------------- Menu script and info
1.31      www       182:     my $windowinfo=&Apache::lonmenu::open($clientos);
1.35      www       183:     my $startupremote=&Apache::lonmenu::startupremote($lowerurl);
                    184:     my $setflags=&Apache::lonmenu::setflags();
                    185:     my $maincall=&Apache::lonmenu::maincall();
1.52      www       186:     my $bodytag=&Apache::loncommon::bodytag('Successful Login');
1.5       www       187: # ------------------------------------------------- Output for successful login
                    188: 
1.1       albertel  189:     $r->send_cgi_header(<<ENDHEADER);
                    190: Content-type: text/html
                    191: Set-cookie: $cookie
                    192: 
                    193: ENDHEADER
1.58      www       194:     my %lt=&Apache::lonlocal::texthash(
                    195: 				       'wel' => 'Welcome',
                    196: 				       'mes' => 'Welcome to the Learning<i>Online</i> Network with CAPA. Please wait while your session is being set up',
                    197: 				       'pro' => 'Problems',
                    198: 				       'log' => 'loginproblems.html',
                    199: 				       );
1.1       albertel  200:     $r->print(<<ENDSUCCESS);
                    201: <html>
                    202: <head>
1.4       www       203: <title>Successful Login to the LearningOnline Network with CAPA</title>
1.35      www       204: $startupremote
1.1       albertel  205: </head>
1.43      www       206: $bodytag
1.35      www       207: $setflags
1.19      www       208: $windowinfo
1.58      www       209: <h1>$lt{'wel'}</h1>
                    210: $lt{'mes'}.<p>
                    211: <a href="/adm/$lt{'log'}">$lt{'pro'}?</a></p>
1.35      www       212: $maincall
1.6       www       213: </body>
1.1       albertel  214: </html>
                    215: ENDSUCCESS
                    216: }
                    217: 
                    218: # --------------------------------------------------------------- Failed login!
                    219: 
                    220: sub failed {
                    221:     my ($r,$message) = @_;
1.52      www       222:     my $bodytag=&Apache::loncommon::bodytag('Unsuccessful Login');
1.1       albertel  223:     $r->send_cgi_header(<<ENDFHEADER);
                    224: Content-type: text/html
                    225: 
                    226: ENDFHEADER
                    227:     $r->print(<<ENDFAILED);
                    228: <html>
                    229: <head>
1.4       www       230: <title>Unsuccessful Login to the LearningOnline Network with CAPA</title>
1.1       albertel  231: </head>
                    232: <html>
1.43      www       233: $bodytag
1.1       albertel  234: <h1>Sorry ...</h1>
1.43      www       235: <p><b>$message</b></p>
1.46      matthew   236: <p>Please <a href="/adm/login?username=$FORM{'uname'}&domain=$FORM{'udom'}">log in again</a>.</p>
1.43      www       237: <p>
                    238: <a href="/adm/loginproblems.html">Problems?</a></p>
1.1       albertel  239: </body>
                    240: </html>
                    241: ENDFAILED
                    242: }
                    243: 
1.55      www       244: # ------------------------------------------------------------------ Rerouting!
                    245: 
                    246: sub reroute {
                    247:     my $r=shift;
                    248:     my $bodytag=&Apache::loncommon::bodytag('Rerouting');
                    249:     $r->send_cgi_header(<<ENDRFHEADER);
                    250: Content-type: text/html
                    251: 
                    252: ENDRFHEADER
                    253:     $r->print(<<ENDRFAILED);
                    254: <html>
                    255: <head>
                    256: <title>Rerouting Login to the LearningOnline Network with CAPA</title>
                    257: </head>
                    258: <html>
                    259: $bodytag
                    260: <h1>Sorry ...</h1>
                    261: Please <a href="/">log in again</a>.
                    262: </body>
                    263: </html>
                    264: ENDRFAILED
                    265: }
                    266: 
1.1       albertel  267: # ---------------------------------------------------------------- Main handler
                    268: 
                    269: sub handler {
                    270:     my $r = shift;
1.55      www       271: 
                    272: # Are we re-routing?
                    273:     if (-e '/home/httpd/html/lon-status/reroute.txt') {
                    274: 	&reroute($r);
                    275: 	return OK;
                    276:     }
1.56      www       277: 
1.57      www       278:     &Apache::lonlocal::get_language_handle($r);
1.1       albertel  279: 
1.59    ! www       280: # -------------------------------- Prevent users from attempting to login twice
        !           281:     my %cookies=CGI::Cookie->parse($r->header_in('Cookie'));
        !           282:     my $lonid=$cookies{'lonID'};
        !           283:     my $cookie;
        !           284:     if ($lonid) {
        !           285: 	my $handle=$lonid->value;
        !           286:         $handle=~s/\W//g;
        !           287:         my $lonidsdir=$r->dir_config('lonIDsDir');
        !           288:         if ((-e "$lonidsdir/$handle.id") && ($handle ne '')) {
        !           289: # Indeed, a valid token is found
        !           290: 	    $r->send_cgi_header(<<ENDFHEADER);
        !           291: Content-type: text/html
        !           292: 
        !           293: ENDFHEADER
        !           294: 	    my $bodytag=&Apache::loncommon::bodytag('Already logged in');
        !           295: 	    $r->print(<<ENDFAILED);
        !           296: <html>
        !           297: <head>
        !           298: <title>Already logged in</title>
        !           299: </head>
        !           300: <html>
        !           301: $bodytag
        !           302: <h1>You are already logged in</h1>
        !           303: <p>Please either <a href="/adm/roles">continue the current session</a> or
        !           304: <a href="/adm/logout">logout</a>.</p>
        !           305: <p>
        !           306: <a href="/adm/loginproblems.html">Problems?</a></p>
        !           307: </body>
        !           308: </html>
        !           309: ENDFAILED
        !           310:            return OK;
        !           311: 	}
        !           312:     }
        !           313: 
        !           314: # ---------------------------------------------------- No valid token, continue
        !           315: 
        !           316: 
1.1       albertel  317:     my $buffer;
1.49      albertel  318:     $r->read($buffer,$r->header_in('Content-length'),0);
1.1       albertel  319:     my @pairs=split(/&/,$buffer);
1.37      www       320:     my $pair; my $name; my $value;
                    321:     undef %FORM;
                    322:     %FORM=();
1.1       albertel  323:     foreach $pair (@pairs) {
                    324:        ($name,$value) = split(/=/,$pair);
1.7       www       325:        $value =~ tr/+/ /;
                    326:        $value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg;
1.1       albertel  327:        $FORM{$name}=$value;
                    328:     } 
                    329: 
                    330:     if ((!$FORM{'uname'}) || (!$FORM{'upass'}) || (!$FORM{'udom'})) {
1.43      www       331: 	failed($r,'Username, password and domain need to be specified.');
1.1       albertel  332:         return OK;
                    333:     }
                    334:     $FORM{'uname'} =~ s/\W//g;
                    335:     $FORM{'udom'}  =~ s/\W//g;
                    336: 
                    337:     my $role   = $r->dir_config('lonRole');
                    338:     my $domain = $r->dir_config('lonDefDomain');
                    339:     my $prodir = $r->dir_config('lonUsersDir');
                    340: 
1.8       www       341: # ---------------------------------------- Get the information from login token
                    342: 
                    343:     my $tmpinfo=Apache::lonnet::reply('tmpget:'.$FORM{'logtoken'},
                    344:                                       $FORM{'serverid'});
                    345: 
                    346:     if (($tmpinfo=~/^error/) || ($tmpinfo eq 'con_lost')) {
1.43      www       347: 	failed($r,'Information needed to verify your login information is missing, inaccessible or expired.');
1.8       www       348:         return OK;
1.44      www       349:     } else {
                    350:         unless (&Apache::lonnet::reply('tmpdel:'.$FORM{'logtoken'},
                    351:                                          $FORM{'serverid'}) eq 'ok') {
                    352:             &failed($r,'Session could not be opened.');
                    353: 	}
1.8       www       354:     }
1.9       www       355:     my ($key,$firsturl)=split(/&/,$tmpinfo);
1.8       www       356: 
                    357:     my $keybin=pack("H16",$key);
                    358: 
1.26      harris41  359:     my $cipher;
                    360:     if ($Crypt::DES::VERSION>=2.03) {
                    361: 	$cipher=new Crypt::DES $keybin;
                    362:     }
                    363:     else {
                    364: 	$cipher=new DES $keybin;
                    365:     }
1.8       www       366: 
                    367:     my $upass=$cipher->decrypt(
                    368:        unpack("a8",pack("H16",substr($FORM{'upass'},0,16))));
                    369: 
                    370:     $upass.=$cipher->decrypt(
                    371:        unpack("a8",pack("H16",substr($FORM{'upass'},16,16))));
                    372: 
                    373:     $upass=substr($upass,1,ord(substr($upass,0,1)));
                    374: 
1.1       albertel  375: # ---------------------------------------------------------------- Authenticate
                    376:     my $authhost=Apache::lonnet::authenticate($FORM{'uname'},
1.8       www       377:                                               $upass,
1.1       albertel  378:                                               $FORM{'udom'});
                    379:     
                    380: # --------------------------------------------------------------------- Failed?
                    381: 
                    382:     if ($authhost eq 'no_host') {
1.43      www       383: 	failed($r,'Username and/or password could not be authenticated.');
1.1       albertel  384:         return OK;
                    385:     }
                    386: 
1.59    ! www       387:     if (($firsturl eq '') || 
        !           388: 	($firsturl=~/^\/adm\/(logout|remote)/)) {
1.24      www       389: 	$firsturl='/adm/roles';
1.7       www       390:     }
1.1       albertel  391: 
1.8       www       392:     success($r,$FORM{'uname'},$FORM{'udom'},$authhost,$firsturl);
1.1       albertel  393:     return OK;
                    394: }
                    395: 
                    396: 1;
                    397: __END__
1.7       www       398: 
                    399: 

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>