File:  [LON-CAPA] / loncom / auth / lonauth.pm
Revision 1.87: download - view: text, annotated - select for diffs
Thu Nov 23 01:49:41 2006 UTC (17 years, 6 months ago) by albertel
Branches: MAIN
CVS tags: version_2_4_X, version_2_4_2, version_2_4_1, version_2_4_0, version_2_3_X, version_2_3_99_0, version_2_3_2, version_2_3_1, version_2_3_0, version_2_2_99_1, version_2_2_99_0, HEAD
- swithc to using helper cleaing functions and helper matchi re

    1: # The LearningOnline Network
    2: # User Authentication Module
    3: #
    4: # $Id: lonauth.pm,v 1.87 2006/11/23 01:49:41 albertel Exp $
    5: #
    6: # Copyright Michigan State University Board of Trustees
    7: #
    8: # This file is part of the LearningOnline Network with CAPA (LON-CAPA).
    9: #
   10: # LON-CAPA is free software; you can redistribute it and/or modify
   11: # it under the terms of the GNU General Public License as published by
   12: # the Free Software Foundation; either version 2 of the License, or
   13: # (at your option) any later version.
   14: #
   15: # LON-CAPA is distributed in the hope that it will be useful,
   16: # but WITHOUT ANY WARRANTY; without even the implied warranty of
   17: # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   18: # GNU General Public License for more details.
   19: #
   20: # You should have received a copy of the GNU General Public License
   21: # along with LON-CAPA; if not, write to the Free Software
   22: # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
   23: #
   24: # /home/httpd/html/adm/gpl.txt
   25: #
   26: # http://www.lon-capa.org/
   27: #
   28: 
   29: package Apache::lonauth;
   30: 
   31: use strict;
   32: use LONCAPA;
   33: use Apache::Constants qw(:common);
   34: use CGI qw(:standard);
   35: use CGI::Cookie();
   36: use DynaLoader; # for Crypt::DES version
   37: use Crypt::DES;
   38: use Apache::loncommon();
   39: use Apache::lonnet;
   40: use Apache::lonmenu();
   41: use Fcntl qw(:flock);
   42: use Apache::lonlocal;
   43:  
   44: # ------------------------------------------------------------ Successful login
   45: sub success {
   46:     my ($r, $username, $domain, $authhost, $lowerurl, $extra_env,
   47: 	$form) = @_;
   48: 
   49: # ------------------------------------------------------------ Get cookie ready
   50:     my $cookie =
   51: 	&Apache::loncommon::init_user_environment($r, $username, $domain,
   52: 						  $authhost, $form,
   53: 						  {'extra_env' => $extra_env,});
   54: 
   55:     my $public=($username eq 'public' && $domain eq 'public');
   56: 
   57:     if ($public or $lowerurl eq 'noredirect') { return $cookie; }
   58: 
   59: # -------------------------------------------------------------------- Log this
   60: 
   61:     &Apache::lonnet::log($domain,$username,$authhost,
   62:                          "Login $ENV{'REMOTE_ADDR'}");
   63: 
   64: # ------------------------------------------------- Check for critical messages
   65: 
   66:     my @what=&Apache::lonnet::dump('critical',$domain,$username);
   67:     if ($what[0]) {
   68: 	if (($what[0] ne 'con_lost') && ($what[0]!~/^error\:/)) {
   69: 	    $lowerurl='/adm/email?critical=display';
   70:         }
   71:     }
   72: 
   73: # ------------------------------------------------------------ Get cookie ready
   74:     $cookie="lonID=$cookie; path=/";
   75: # -------------------------------------------------------- Menu script and info
   76:     my $windowinfo=&Apache::lonmenu::open($env{'browser.os'});
   77:     my $startupremote=&Apache::lonmenu::startupremote($lowerurl);
   78:     my $remoteinfo=&Apache::lonmenu::load_remote_msg($lowerurl);
   79:     my $setflags=&Apache::lonmenu::setflags();
   80:     my $maincall=&Apache::lonmenu::maincall();
   81:     my $start_page=&Apache::loncommon::start_page('Successful Login',
   82: 						  $startupremote,
   83: 						  {'no_inline_link' => 1,});
   84:     my $end_page  =&Apache::loncommon::end_page();
   85: 
   86:     my $continuelink;
   87:     if (($env{'browser.interface'} eq 'textual') ||
   88:         ($env{'environment.remote'} eq 'off')) {
   89: 	$continuelink="<a href=\"$lowerurl\">".&mt('Continue')."</a>";
   90:     }
   91: # ------------------------------------------------- Output for successful login
   92: 
   93:     &Apache::loncommon::content_type($r,'text/html');
   94:     $r->header_out('Set-cookie' => $cookie);
   95:     $r->send_http_header;
   96: 
   97:     my %lt=&Apache::lonlocal::texthash(
   98: 				       'wel' => 'Welcome',
   99: 				       'mes' => 'Welcome to the Learning<i>Online</i> Network with CAPA. Please wait while your session is being set up',
  100: 				       'pro' => 'Problems',
  101: 				       'log' => 'loginproblems.html',
  102: 				       );
  103:     $r->print(<<ENDSUCCESS);
  104: $start_page
  105: $setflags
  106: $windowinfo
  107: <h1>$lt{'wel'}</h1>
  108: $lt{'mes'}.<p>
  109: <a href="/adm/$lt{'log'}">$lt{'pro'}?</a></p>
  110: $remoteinfo
  111: $maincall
  112: $continuelink
  113: $end_page
  114: ENDSUCCESS
  115: }
  116: 
  117: # --------------------------------------------------------------- Failed login!
  118: 
  119: sub failed {
  120:     my ($r,$message,$form) = @_;
  121:     my $start_page = &Apache::loncommon::start_page('Unsuccessful Login',undef,
  122: 						    {'no_inline_link' => 1,});
  123:     my $end_page   = &Apache::loncommon::end_page();
  124: 
  125:     my %lt=('sorry'  => &mt('Sorry ...'),
  126: 	    'please' => 
  127: 	    &mt('Please [_1]log in again[_2].',
  128: 		"<a href=\"/adm/login?username=$form->{'uname'}&domain=$form->{'udom'}\">",
  129: 		'</a>'),
  130: 	    'problemspage' => &mt('loginproblems.html'),
  131: 	    'problems'     => 'Problems',
  132: 	    );
  133:     &Apache::loncommon::content_type($r,'text/html');
  134:     $r->send_http_header;
  135: 
  136:     $r->print(<<ENDFAILED);
  137: $start_page
  138: <h1>$lt{'sorry'}</h1>
  139: <p><b>$message</b></p>
  140: <p>$lt{'please'}</p>
  141: <p>
  142: <a href="/adm/$lt{'problemspage'}">$lt{'problems'}</a></p>
  143: $end_page
  144: ENDFAILED
  145: }
  146: 
  147: # ------------------------------------------------------------------ Rerouting!
  148: 
  149: sub reroute {
  150:     my ($r) = @_;
  151:     &Apache::loncommon::content_type($r,'text/html');
  152:     $r->send_http_header;
  153:     my $msg='<h1>Sorry ...</h1>
  154:              Please <a href="/">log in again</a>.';
  155:     &Apache::loncommon::simple_error_page($r,'Rerouting',$msg);
  156: }
  157: 
  158: # ---------------------------------------------------------------- Main handler
  159: 
  160: sub handler {
  161:     my $r = shift;
  162:     my $form;
  163: # Are we re-routing?
  164:     if (-e '/home/httpd/html/lon-status/reroute.txt') {
  165: 	&reroute($r);
  166: 	return OK;
  167:     }
  168: 
  169:     &Apache::lonlocal::get_language_handle($r);
  170: 
  171: # -------------------------------- Prevent users from attempting to login twice
  172:     my %cookies=CGI::Cookie->parse($r->header_in('Cookie'));
  173:     my $lonid=$cookies{'lonID'};
  174:     my $cookie;
  175:     if ($lonid) {
  176: 	my $handle=&LONCAPA::clean_handle($lonid->value);
  177:         my $lonidsdir=$r->dir_config('lonIDsDir');
  178:         if ((-e "$lonidsdir/$handle.id") && ($handle ne '')) {
  179: # Indeed, a valid token is found
  180: 	    &Apache::loncommon::content_type($r,'text/html');
  181: 	    $r->send_http_header;
  182: 	    my $start_page = 
  183: 		&Apache::loncommon::start_page('Already logged in');
  184: 	    my $end_page = 
  185: 		&Apache::loncommon::end_page();
  186: 	    $r->print(<<ENDFAILED);
  187: $start_page
  188: <h1>You are already logged in</h1>
  189: <p>Please either <a href="/adm/roles">continue the current session</a> or
  190: <a href="/adm/logout">logout</a>.</p>
  191: <p>
  192: <a href="/adm/loginproblems.html">Problems?</a></p>
  193: $end_page
  194: ENDFAILED
  195:            return OK;
  196: 	}
  197:     }
  198: 
  199: # ---------------------------------------------------- No valid token, continue
  200: 
  201: 
  202:     my $buffer;
  203:     if ($r->header_in('Content-length') > 0) {
  204: 	$r->read($buffer,$r->header_in('Content-length'),0);
  205:     }
  206:     my %form;
  207:     foreach my $pair (split(/&/,$buffer)) {
  208:        my ($name,$value) = split(/=/,$pair);
  209:        $value =~ tr/+/ /;
  210:        $value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg;
  211:        $form{$name}=$value;
  212:     } 
  213: 
  214:     if ((!$form{'uname'}) || (!$form{'upass0'}) || (!$form{'udom'})) {
  215: 	&failed($r,'Username, password and domain need to be specified.',
  216: 		\%form);
  217:         return OK;
  218:     }
  219: 
  220: # split user logging in and "su"-user
  221: 
  222:     ($form{'uname'},$form{'suname'})=split(/\:/,$form{'uname'});
  223:     $form{'uname'} = &LONCAPA::clean_username($form{'uname'});
  224:     $form{'suname'}= &LONCAPA::clean_username($form{'suname'});
  225:     $form{'udom'}  = &LONCAPA::clean_domain(  $form{'udom'});
  226: 
  227:     my $role   = $r->dir_config('lonRole');
  228:     my $domain = $r->dir_config('lonDefDomain');
  229:     my $prodir = $r->dir_config('lonUsersDir');
  230: 
  231: # ---------------------------------------- Get the information from login token
  232: 
  233:     my $tmpinfo=Apache::lonnet::reply('tmpget:'.$form{'logtoken'},
  234:                                       $form{'serverid'});
  235: 
  236:     if (($tmpinfo=~/^error/) || ($tmpinfo eq 'con_lost')) {
  237: 	&failed($r,'Information needed to verify your login information is missing, inaccessible or expired.',\%form);
  238:         return OK;
  239:     } else {
  240: 	my $reply = &Apache::lonnet::reply('tmpdel:'.$form{'logtoken'},
  241: 					   $form{'serverid'});
  242:         if ( $reply ne 'ok' ) {
  243:             &failed($r,'Session could not be opened.',\%form);
  244: 	    &Apache::lonnet::logthis("ERROR got a reply of $reply when trying to contact ". $form{'serverid'}." to get login token");
  245: 	    return OK;
  246: 	}
  247:     }
  248:     my ($key,$firsturl)=split(/&/,$tmpinfo);
  249: 
  250:     my $keybin=pack("H16",$key);
  251: 
  252:     my $cipher;
  253:     if ($Crypt::DES::VERSION>=2.03) {
  254: 	$cipher=new Crypt::DES $keybin;
  255:     }
  256:     else {
  257: 	$cipher=new DES $keybin;
  258:     }
  259:     my $upass='';
  260:     for (my $i=0;$i<=2;$i++) {
  261: 	my $chunk=
  262: 	    $cipher->decrypt(unpack("a8",pack("H16",substr($form{'upass'.$i},0,16))));
  263: 
  264: 	$chunk.=
  265: 	    $cipher->decrypt(unpack("a8",pack("H16",substr($form{'upass'.$i},16,16))));
  266: 
  267: 	$chunk=substr($chunk,1,ord(substr($chunk,0,1)));
  268: 	$upass.=$chunk;
  269:     }
  270: 
  271: # ---------------------------------------------------------------- Authenticate
  272:     my $authhost=Apache::lonnet::authenticate($form{'uname'},
  273:                                               $upass,
  274:                                               $form{'udom'});
  275:     
  276: # --------------------------------------------------------------------- Failed?
  277: 
  278:     if ($authhost eq 'no_host') {
  279: 	&failed($r,'Username and/or password could not be authenticated.',
  280: 		\%form);
  281:         return OK;
  282:     }
  283: 
  284:     if (($firsturl eq '') || 
  285: 	($firsturl=~/^\/adm\/(logout|remote)/)) {
  286: 	$firsturl='/adm/roles';
  287:     }
  288: # --------------------------------- Are we attempting to login as somebody else?
  289:     if ($form{'suname'}) {
  290: # ------------ see if the original user has enough privileges to pull this stunt
  291: 	if (&Apache::lonnet::privileged($form{'uname'},$form{'udom'})) {
  292: # ---------------------------------------------------- see if the su-user exists
  293: 	    unless (&Apache::lonnet::homeserver($form{'suname'},$form{'udom'})
  294: 		eq 'no_host') {
  295: 		&Apache::lonnet::logthis(&Apache::lonnet::homeserver($form{'suname'},$form{'udom'}));
  296: # ------------------------------ see if the su-user is not too highly privileged
  297: 		unless (&Apache::lonnet::privileged($form{'suname'},$form{'udom'})) {
  298: # -------------------------------------------------------- actually switch users
  299: 		    &Apache::lonnet::logperm('User '.$form{'uname'}.' at '.$form{'udom'}.
  300: 			' logging in as '.$form{'suname'});
  301: 		    $form{'uname'}=$form{'suname'};
  302: 		} else {
  303: 		    &Apache::lonnet::logthis('Attempted switch user to privileged user');
  304: 		}
  305: 	    }
  306: 	} else {
  307: 	    &Apache::lonnet::logthis('Non-privileged user attempting switch user');
  308: 	}
  309:     }
  310: 
  311:     if ($r->dir_config("lonBalancer") eq 'yes') {
  312: 	&success($r,$form{'uname'},$form{'udom'},$authhost,'noredirect',undef,
  313: 		 \%form);
  314: 	$r->internal_redirect('/adm/switchserver');
  315:     } else {
  316: 	&success($r,$form{'uname'},$form{'udom'},$authhost,$firsturl,undef,
  317: 		 \%form);
  318:     }
  319:     return OK;
  320: }
  321: 
  322: 1;
  323: __END__
  324: 
  325: 

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>