File:  [LON-CAPA] / loncom / auth / lonauth.pm
Revision 1.54: download - view: text, annotated - select for diffs
Thu Jul 17 15:24:46 2003 UTC (20 years, 10 months ago) by www
Branches: MAIN
CVS tags: version_1_0_3, version_1_0_2, version_1_0_1, version_1_0_0, version_0_99_5, version_0_99_4, HEAD
Better safe than sorry.

    1: # The LearningOnline Network
    2: # User Authentication Module
    3: #
    4: # $Id: lonauth.pm,v 1.54 2003/07/17 15:24:46 www Exp $
    5: #
    6: # Copyright Michigan State University Board of Trustees
    7: #
    8: # This file is part of the LearningOnline Network with CAPA (LON-CAPA).
    9: #
   10: # LON-CAPA is free software; you can redistribute it and/or modify
   11: # it under the terms of the GNU General Public License as published by
   12: # the Free Software Foundation; either version 2 of the License, or
   13: # (at your option) any later version.
   14: #
   15: # LON-CAPA is distributed in the hope that it will be useful,
   16: # but WITHOUT ANY WARRANTY; without even the implied warranty of
   17: # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   18: # GNU General Public License for more details.
   19: #
   20: # You should have received a copy of the GNU General Public License
   21: # along with LON-CAPA; if not, write to the Free Software
   22: # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
   23: #
   24: # /home/httpd/html/adm/gpl.txt
   25: #
   26: # http://www.lon-capa.org/
   27: #
   28: # 5/21/99,5/22,5/25,5/26,5/27,5/29,6/2,6/11,6/14,6/15
   29: # 16/11,12/16,
   30: # 1/14,2/24,2/28,2/29,3/7,5/29,5/30,5/31,6/1,6/5,6/29,
   31: # 7/1,7/10,10/2,10/5,10/9,10/26,10/30,11/10,
   32: # 05/28,05/29 Gerd Kortemeyer
   33: # 07/28,08/03 Gerd Kortemeyer
   34: # 8/20 Gerd Kortemeyer
   35: 
   36: package Apache::lonauth;
   37: 
   38: use strict;
   39: use Apache::Constants qw(:common);
   40: use Apache::File;
   41: use CGI qw(:standard);
   42: use CGI::Cookie();
   43: use DynaLoader; # for Crypt::DES version
   44: use Crypt::DES;
   45: use Apache::loncommon();
   46: use Apache::lonnet();
   47: use Apache::lonmenu();
   48: use Fcntl qw(:flock);
   49: 
   50: my %FORM;
   51: 
   52: # ------------------------------------------------------------ Successful login
   53: 
   54: sub success {
   55:     my ($r, $username, $domain, $authhost,$lowerurl) = @_;
   56:     my $lonids=$r->dir_config('lonIDsDir');
   57: 
   58: # See if old ID present, if so, remove
   59: 
   60:     my $filename;
   61:     opendir(DIR,$lonids);
   62:     while ($filename=readdir(DIR)) {
   63:        if ($filename=~/^$username\_\d+\_$domain\_$authhost\.id$/) {
   64: 	  unlink($lonids.'/'.$filename);
   65:        }
   66:     }
   67:     closedir(DIR);
   68: 
   69: # Give them a new cookie
   70: 
   71:     my $cookie;
   72:     my $now=time;
   73:     $cookie="$username\_$now\_$domain\_$authhost";
   74: 
   75: # Initialize roles
   76: 
   77:     my $userroles=Apache::lonnet::rolesinit($domain,$username,$authhost);
   78: 
   79: # ------------------------------------ Check browser type and MathML capability
   80: 
   81:     my ($httpbrowser,$clientbrowser,$clientversion,$clientmathml,
   82:         $clientunicode,$clientos) = &Apache::loncommon::decode_user_agent($r);
   83: 
   84: # -------------------------------------- Any accessibility options to remember?
   85:     if (($FORM{'interface'}) && ($FORM{'remember'} eq 'true')) {
   86: 	foreach ('imagesuppress','appletsuppress',
   87: 		 'embedsuppress','fontenhance','blackwhite') {
   88: 	    if ($FORM{$_} eq 'true') {
   89: 		&Apache::lonnet::put('environment',{$_ => 'on'},
   90: 				     $domain,$username);
   91: 	    } else {
   92: 		&Apache::lonnet::del('environment',[$_],$domain,$username);
   93: 	    }
   94: 	}
   95:     }
   96: # ------------------------------------------------------------- Get environment
   97: 
   98:     my $userenv;
   99:     my %userenv=Apache::lonnet::dump('environment',$domain,$username);
  100:     my ($tmp) = keys(%userenv);
  101:     if ($tmp !~ /^(con_lost|error|no_such_host)/i) {
  102: 	foreach my $key (keys(%userenv)) {
  103: 	    $userenv.="environment.$key=$userenv{$key}\n";
  104: 	}
  105:     }
  106:     if (($userenv{'interface'}) && (!$FORM{'interface'})) {
  107: 	$FORM{'interface'}=$userenv{'interface'};
  108:     }
  109:     $ENV{'environment.remote'}=$userenv{'remote'};
  110: # --------------- Do not trust query string to be put directly into environment
  111:     foreach ('imagesuppress','appletsuppress',
  112: 	     'embedsuppress','fontenhance','blackwhite',
  113: 	     'interface','localpath','localres') {
  114: 	$FORM{$_}=~s/[\n\r\=]//gs;
  115:     }
  116: # --------------------------------------------------------- Write first profile
  117: 
  118:     {
  119: 	my $idf=Apache::File->new(">$lonids/$cookie.id");
  120: 	unless (flock($idf,LOCK_EX)) {
  121: 	    &Apache::lonnet::logthis("<font color=blue>WARNING: ".
  122: 			   'Could not obtain exclusive lock in lonauth: '.$!);
  123: 	    $idf->close();
  124: 	    return 'error: '.$!;
  125: 	}
  126: 	if ($userenv ne '') { print $idf "$userenv\n"; }
  127: 	print $idf "user.name=$username\n";
  128: 	print $idf "user.domain=$domain\n";
  129: 	print $idf "user.home=$authhost\n";
  130: 	print $idf "browser.type=$clientbrowser\n";
  131: 	print $idf "browser.version=$clientversion\n";
  132: 	print $idf "browser.mathml=$clientmathml\n";
  133: 	print $idf "browser.unicode=$clientunicode\n";
  134: 	print $idf "browser.os=$clientos\n";
  135:         if ($FORM{'localpath'}) {
  136:            print $idf "browser.localpath=$FORM{'localpath'}\n";
  137:            print $idf "browser.localres=$FORM{'localres'}\n";
  138:         }
  139: 	print $idf "request.course.fn=\n";
  140: 	print $idf "request.course.uri=\n";
  141: 	print $idf "request.course.sec=\n";
  142: 	print $idf "request.role=cm\n";
  143:         print $idf "request.role.adv=$ENV{'user.adv'}\n";
  144: 	print $idf "request.host=$ENV{'REMOTE_ADDR'}\n";
  145: 	if ($FORM{'interface'}) {
  146: 	    $FORM{'interface'}=~s/\W//gs;
  147: 	    print $idf "browser.interface=$FORM{'interface'}\n";
  148: 	    $ENV{'browser.interface'}=$FORM{'interface'};
  149: 	    foreach ('imagesuppress','appletsuppress',
  150: 		     'embedsuppress','fontenhance','blackwhite') {
  151: 		if (($FORM{$_} eq 'true') ||
  152: 		    ($userenv{$_} eq 'on')) {
  153: 		    print $idf "browser.$_=on\n";
  154: 		}
  155: 	    }
  156: 	}
  157: 	if ($userroles ne '') { print $idf "$userroles"; }
  158: 	$idf->close();
  159:     }
  160:     $ENV{'request.role'}='cm';
  161:     $ENV{'request.role.adv'}=$ENV{'user.adv'};
  162:     $ENV{'browser.type'}=$clientbrowser;
  163: # -------------------------------------------------------------------- Log this
  164: 
  165:     &Apache::lonnet::log($domain,$username,$authhost,
  166:                          "Login $ENV{'REMOTE_ADDR'}");
  167: 
  168: # ------------------------------------------------- Check for critical messages
  169: 
  170:     my @what=&Apache::lonnet::dump('critical',$domain,$username);
  171:     if ($what[0]) {
  172: 	if (($what[0] ne 'con_lost') && ($what[0]!~/^error\:/)) {
  173: 	    $lowerurl='/adm/email?critical=display';
  174:         }
  175:     }
  176: 
  177: # ------------------------------------------------------------ Get cookie ready
  178: 
  179:     $cookie="lonID=$cookie; path=/";
  180: # -------------------------------------------------------- Menu script and info
  181:     my $windowinfo=&Apache::lonmenu::open($clientos);
  182:     my $startupremote=&Apache::lonmenu::startupremote($lowerurl);
  183:     my $setflags=&Apache::lonmenu::setflags();
  184:     my $maincall=&Apache::lonmenu::maincall();
  185:     my $bodytag=&Apache::loncommon::bodytag('Successful Login');
  186: # ------------------------------------------------- Output for successful login
  187: 
  188:     $r->send_cgi_header(<<ENDHEADER);
  189: Content-type: text/html
  190: Set-cookie: $cookie
  191: 
  192: ENDHEADER
  193:     $r->print(<<ENDSUCCESS);
  194: <html>
  195: <head>
  196: <title>Successful Login to the LearningOnline Network with CAPA</title>
  197: $startupremote
  198: </head>
  199: $bodytag
  200: $setflags
  201: $windowinfo
  202: <h1>Welcome!</h1>
  203: Welcome to the Learning<i>Online</i> Network with CAPA.
  204: Please wait while your session
  205: is being set up.<p>
  206: <a href="/adm/loginproblems.html">Problems?</a></p>
  207: $maincall
  208: </body>
  209: </html>
  210: ENDSUCCESS
  211: }
  212: 
  213: # --------------------------------------------------------------- Failed login!
  214: 
  215: sub failed {
  216:     my ($r,$message) = @_;
  217:     my $bodytag=&Apache::loncommon::bodytag('Unsuccessful Login');
  218:     $r->send_cgi_header(<<ENDFHEADER);
  219: Content-type: text/html
  220: 
  221: ENDFHEADER
  222:     $r->print(<<ENDFAILED);
  223: <html>
  224: <head>
  225: <title>Unsuccessful Login to the LearningOnline Network with CAPA</title>
  226: </head>
  227: <html>
  228: $bodytag
  229: <h1>Sorry ...</h1>
  230: <p><b>$message</b></p>
  231: <p>Please <a href="/adm/login?username=$FORM{'uname'}&domain=$FORM{'udom'}">log in again</a>.</p>
  232: <p>
  233: <a href="/adm/loginproblems.html">Problems?</a></p>
  234: </body>
  235: </html>
  236: ENDFAILED
  237: }
  238: 
  239: # ---------------------------------------------------------------- Main handler
  240: 
  241: sub handler {
  242:     my $r = shift;
  243: 
  244:     my $buffer;
  245:     $r->read($buffer,$r->header_in('Content-length'),0);
  246:     my @pairs=split(/&/,$buffer);
  247:     my $pair; my $name; my $value;
  248:     undef %FORM;
  249:     %FORM=();
  250:     foreach $pair (@pairs) {
  251:        ($name,$value) = split(/=/,$pair);
  252:        $value =~ tr/+/ /;
  253:        $value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg;
  254:        $FORM{$name}=$value;
  255:     } 
  256: 
  257:     if ((!$FORM{'uname'}) || (!$FORM{'upass'}) || (!$FORM{'udom'})) {
  258: 	failed($r,'Username, password and domain need to be specified.');
  259:         return OK;
  260:     }
  261:     $FORM{'uname'} =~ s/\W//g;
  262:     $FORM{'udom'}  =~ s/\W//g;
  263: 
  264:     my $role   = $r->dir_config('lonRole');
  265:     my $domain = $r->dir_config('lonDefDomain');
  266:     my $prodir = $r->dir_config('lonUsersDir');
  267: 
  268: # ---------------------------------------- Get the information from login token
  269: 
  270:     my $tmpinfo=Apache::lonnet::reply('tmpget:'.$FORM{'logtoken'},
  271:                                       $FORM{'serverid'});
  272: 
  273:     if (($tmpinfo=~/^error/) || ($tmpinfo eq 'con_lost')) {
  274: 	failed($r,'Information needed to verify your login information is missing, inaccessible or expired.');
  275:         return OK;
  276:     } else {
  277:         unless (&Apache::lonnet::reply('tmpdel:'.$FORM{'logtoken'},
  278:                                          $FORM{'serverid'}) eq 'ok') {
  279:             &failed($r,'Session could not be opened.');
  280: 	}
  281:     }
  282:     my ($key,$firsturl)=split(/&/,$tmpinfo);
  283: 
  284:     my $keybin=pack("H16",$key);
  285: 
  286:     my $cipher;
  287:     if ($Crypt::DES::VERSION>=2.03) {
  288: 	$cipher=new Crypt::DES $keybin;
  289:     }
  290:     else {
  291: 	$cipher=new DES $keybin;
  292:     }
  293: 
  294:     my $upass=$cipher->decrypt(
  295:        unpack("a8",pack("H16",substr($FORM{'upass'},0,16))));
  296: 
  297:     $upass.=$cipher->decrypt(
  298:        unpack("a8",pack("H16",substr($FORM{'upass'},16,16))));
  299: 
  300:     $upass=substr($upass,1,ord(substr($upass,0,1)));
  301: 
  302: # ---------------------------------------------------------------- Authenticate
  303:     my $authhost=Apache::lonnet::authenticate($FORM{'uname'},
  304:                                               $upass,
  305:                                               $FORM{'udom'});
  306:     
  307: # --------------------------------------------------------------------- Failed?
  308: 
  309:     if ($authhost eq 'no_host') {
  310: 	failed($r,'Username and/or password could not be authenticated.');
  311:         return OK;
  312:     }
  313: 
  314:     if (($firsturl eq '') || ($firsturl eq '/adm/logout')) {
  315: 	$firsturl='/adm/roles';
  316:     }
  317: 
  318:     success($r,$FORM{'uname'},$FORM{'udom'},$authhost,$firsturl);
  319:     return OK;
  320: }
  321: 
  322: 1;
  323: __END__
  324: 
  325: 

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>