--- loncom/auth/loncacc.pm 2003/06/11 00:39:46 1.29 +++ loncom/auth/loncacc.pm 2011/11/12 18:48:41 1.58 @@ -2,7 +2,7 @@ # Cookie Based Access Handler for Construction Area # (lonacc: 5/21/99,5/22,5/29,5/31 Gerd Kortemeyer) # -# $Id: loncacc.pm,v 1.29 2003/06/11 00:39:46 www Exp $ +# $Id: loncacc.pm,v 1.58 2011/11/12 18:48:41 raeburn Exp $ # # Copyright Michigan State University Board of Trustees # @@ -26,98 +26,8 @@ # # http://www.lon-capa.org/ # -# YEAR=2000 -# 6/15,16/11,22/11, -# YEAR=2001 -# 01/06,01/11,6/1,9/25,9/28,11/22,12/25,12/26, -# 01/06/01,05/04,05/05,05/09 Gerd Kortemeyer -# YEAR=2002 -# 1/4 Gerd Kortemeyer -### -package Apache::loncacc; - -use strict; -use Apache::Constants qw(:common :http :methods REDIRECT); -use Apache::File; -use CGI::Cookie(); -use Fcntl qw(:flock); - -sub constructaccess { - my ($url,$ownerdomain)=@_; - my ($ownername)=($url=~/\/(?:\~|priv\/|home\/)(\w+)/); - unless (($ownername) && ($ownerdomain)) { return ''; } - # We do not allow editing of previous versions of files. - if ($url=~/\.(\d+)\.(\w+)$/) { return ''; } - if (($ownername eq $ENV{'user.name'}) && - ($ownerdomain eq $ENV{'user.domain'})) { - return ($ownername,$ownerdomain); - } - - my $capriv='user.priv.ca./'. - $ownerdomain.'/'.$ownername.'./'; - foreach (keys %ENV) { - if ($_ eq $capriv) { - return ($ownername,$ownerdomain); - } - } - return ''; -} - -sub handler { - my $r = shift; - my $requrl=$r->uri; - $ENV{'request.editurl'}=$requrl; - my %cookies=CGI::Cookie->parse($r->header_in('Cookie')); - my $lonid=$cookies{'lonID'}; - my $cookie; - if ($lonid) { - my $handle=$lonid->value; - $handle=~s/\W//g; - my $lonidsdir=$r->dir_config('lonIDsDir'); - if ((-e "$lonidsdir/$handle.id") && ($handle ne '')) { - -# ------------------------------------------------------ Initialize Environment - - &Apache::lonnet::transfer_profile_to_env($lonidsdir,$handle); - -# -------------------------------------------------------------- Resource State - - $ENV{'request.state'} = "construct"; - $ENV{'request.filename'} = $r->filename; - - unless (&constructaccess($requrl,$r->dir_config('lonDefDomain'))) { - $r->log_reason("Unauthorized $requrl", $r->filename); - return HTTP_NOT_ACCEPTABLE; - } -# Construction space needs Remote to work - if ($ENV{'environment.remote'} eq 'off') { - $r->content_type('text/html'); - $r->header_out(Location => - 'http://'.$r->server->server_hostname. - '/adm/remote?action=launch&url='. - &Apache::lonnet::escape($requrl)); - return REDIRECT; - } - -# -------------------------------------------------------- Load POST parameters - - &Apache::loncommon::get_posted_cgi($r); - - return OK; - } else { - $r->log_reason("Cookie $handle not valid", $r->filename) - }; - } - -# ----------------------------------------------- Store where they wanted to go - - $ENV{'request.firsturl'}=$requrl; - return FORBIDDEN; -} - -1; -__END__ +=pod =head1 NAME @@ -132,11 +42,11 @@ Invoked (for various locations) by /etc/ =head1 INTRODUCTION This module enables cookie based authentication for construction area -and is used to control access for three (essentially equivalent) URIs. +and is used to control access for the following two types of URI +(one for files, and one for directories): - - + Whenever the client sends the cookie back to the server, if the cookie is missing or invalid, the user is re-challenged @@ -163,21 +73,154 @@ store where they wanted to go (first url =head1 OTHERSUBROUTINES -=over 4 +=over -=item * +=item constructaccess($url,$setpriv) -constructaccess($url,$ownerdomain) : See if the owner domain and name +See if the owner domain and name in the URL match those in the expected environment. If so, return -two element list ($ownername,$ownerdomain). Else, return null string. +three element list ($ownername,$ownerdomain,$ownerhome). + +Otherwise return the null string. + +If second argument 'setpriv' is true, it assigns the privileges, +and returns the same three element list, unless the owner has +blocked "ad hoc" Domain Coordinator access to the Author Space, +in which case the null string is returned. =back =cut +package Apache::loncacc; + +use strict; +use Apache::Constants qw(:common :http :methods REDIRECT); +use Fcntl qw(:flock); +use Apache::lonlocal; +use Apache::lonnet; +use Apache::lonacc; +use LONCAPA qw(:DEFAULT :match); + +sub constructaccess { + my ($url,$setpriv)=@_; + +# We do not allow editing of previous versions of files + if ($url=~/\.(\d+)\.(\w+)$/) { return ''; } +# Get username and domain from URL + my $londocroot = $Apache::lonnet::perlvar{'lonDocRoot'}; + my ($ownername,$ownerdomain,$ownerhome); + ($ownerdomain,$ownername) = + ($url=~ m{^(?:\Q$londocroot\E|)/priv/($match_domain)/($match_username)/}); +# The URL does not really point to any authorspace, forget it + unless (($ownername) && ($ownerdomain)) { return ''; } + +# Now we need to see if the user has access to the authorspace of +# $ownername at $ownerdomain + if (($ownername eq $env{'user.name'}) && ($ownerdomain eq $env{'user.domain'})) { +# Real author for this? + $ownerhome = $env{'user.home'}; + if (exists($env{'user.priv.au./'.$ownerdomain.'/./'})) { + return ($ownername,$ownerdomain,$ownerhome); + } + } else { +# Co-author for this? + if (exists($env{'user.priv.ca./'.$ownerdomain.'/'.$ownername.'./'}) || + exists($env{'user.priv.aa./'.$ownerdomain.'/'.$ownername.'./'}) ) { + $ownerhome = &Apache::lonnet::homeserver($ownername,$ownerdomain); + return ($ownername,$ownerdomain,$ownerhome); + } + } +# We don't have any access right now. If we are not possibly going to do anything about this, +# we might as well leave + unless ($setpriv) { return ''; } + +# Backdoor access? + my $allowed=&Apache::lonnet::allowed('eco',$ownerdomain); +# Nope + unless ($allowed) { return ''; } +# Looks like we may have access, but could be locked by the owner of the construction space + if ($allowed eq 'U') { + my %blocked=&Apache::lonnet::get('environment',['domcoord.author'], + $ownerdomain,$ownername); +# Is blocked by owner + if ($blocked{'domcoord.author'} eq 'blocked') { return ''; } + } + if (($allowed eq 'F') || ($allowed eq 'U')) { +# Grant temporary access + my $then=$env{'user.login.time'}; + my $update==$env{'user.update.time'}; + if (!$update) { $update = $then; } + my $refresh=$env{'user.refresh.time'}; + if (!$refresh) { $refresh = $update; } + my $now = time; + &Apache::lonnet::check_adhoc_privs($ownerdomain,$ownername, + $update,$refresh,$now,'ca', + 'constructaccess'); + $ownerhome = &Apache::lonnet::homeserver($ownername,$ownerdomain); + return($ownername,$ownerdomain,$ownerhome); + } +# No business here + return ''; +} + +sub handler { + my $r = shift; + my $requrl=$r->uri; + $env{'request.editurl'}=$requrl; + + my $handle = &Apache::lonnet::check_for_valid_session($r); + if ($handle ne '') { + +# ------------------------------------------------------ Initialize Environment + my $lonidsdir=$r->dir_config('lonIDsDir'); + &Apache::lonnet::transfer_profile_to_env($lonidsdir,$handle); + +# --------------------------------------------------------- Initialize Language + + &Apache::lonlocal::get_language_handle($r); + +# -------------------------------------------------------------- Resource State + + $env{'request.state'} = "construct"; + $env{'request.filename'} = $r->filename; + + my $allowed; + my ($ownername,$ownerdom,$ownerhome) = &constructaccess($requrl,'setpriv'); + if (($ownername ne '') && ($ownerdom ne '') && ($ownerhome ne '')) { + unless ($ownerhome eq 'no_host') { + my @hosts = &Apache::lonnet::current_machine_domains(); + if (grep(/^\Q$ownerhome\E$/,@hosts)) { + $allowed = 1; + } + } + } + + unless ($allowed) { + $r->log_reason("Unauthorized $requrl", $r->filename); + return HTTP_NOT_ACCEPTABLE; + } + +# -------------------------------------------------------- Load POST parameters + + &Apache::lonacc::get_posted_cgi($r); + + return OK; + } else { + $r->log_reason("Cookie $handle not valid", $r->filename) + } + +# ----------------------------------------------- Store where they wanted to go + + $env{'request.firsturl'}=$requrl; + return FORBIDDEN; +} + +1; +__END__