--- loncom/auth/loncacc.pm 2000/01/06 15:35:58 1.4 +++ loncom/auth/loncacc.pm 2011/10/25 18:37:11 1.56 @@ -1,60 +1,198 @@ # The LearningOnline Network # Cookie Based Access Handler for Construction Area # (lonacc: 5/21/99,5/22,5/29,5/31 Gerd Kortemeyer) -# 6/15,16/11,22/11, -# 01/06 Gerd Kortemeyer +# +# $Id: loncacc.pm,v 1.56 2011/10/25 18:37:11 www Exp $ +# +# Copyright Michigan State University Board of Trustees +# +# This file is part of the LearningOnline Network with CAPA (LON-CAPA). +# +# LON-CAPA is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; either version 2 of the License, or +# (at your option) any later version. +# +# LON-CAPA is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with LON-CAPA; if not, write to the Free Software +# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA +# +# /home/httpd/html/adm/gpl.txt +# +# http://www.lon-capa.org/ +# + +=pod + +=head1 NAME + +Apache::lonacc - Cookie Based Access Handler for Construction Area + +=head1 SYNOPSIS + +Invoked (for various locations) by /etc/httpd/conf/loncapa_apache.conf: + + PerlAccessHandler Apache::loncacc + +=head1 INTRODUCTION + +This module enables cookie based authentication for construction area +and is used to control access for three (essentially equivalent) URIs. + + + + + +Whenever the client sends the cookie back to the server, +if the cookie is missing or invalid, the user is re-challenged +for login information. + +This is part of the LearningOnline Network with CAPA project +described at http://www.lon-capa.org. + +=head1 HANDLER SUBROUTINE + +This routine is called by Apache and mod_perl. + +=over 4 + +=item * + +load POST parameters + +=item * + +store where they wanted to go (first url entered) + +=back + +=head1 OTHERSUBROUTINES + +=over + +=item constructaccess($url,$setpriv) + +See if the owner domain and name +in the URL match those in the expected environment. If so, return +two element list ($ownername,$ownerdomain). Else, return null string. +If 'setpriv' is set to 'setpriv', it actually assigns the privileges. +=back + +=cut + package Apache::loncacc; use strict; -use Apache::Constants qw(:common :http); -use CGI::Cookie(); +use Apache::Constants qw(:common :http :methods REDIRECT); +use Fcntl qw(:flock); +use Apache::lonlocal; +use Apache::lonnet; +use Apache::lonacc; +use LONCAPA qw(:DEFAULT :match); + +sub constructaccess { + my ($url,$setpriv)=@_; + +# We do not allow editing of previous versions of files + if ($url=~/\.(\d+)\.(\w+)$/) { return ''; } + +# Get username and domain from URL + my ($ownerdomain,$ownername)=($url=~/^(?:\/home\/httpd\/html\/|\/)priv\/($match_domain)\/($match_username)\//); + +# The URL does not really point to any authorspace, forget it + unless (($ownername) && ($ownerdomain)) { return ''; } + +# Now we need to see if the user has access to the authorspace of +# $ownername at $ownerdomain + + if (($ownername eq $env{'user.name'}) && ($ownerdomain eq $env{'user.domain'})) { +# Real author for this? + if (exists($env{'user.priv.au./'.$ownerdomain.'/./'})) { + return ($ownername,$ownerdomain); + } + } else { +# Co-author for this? + if (exists($env{'user.priv.ca./'.$ownerdomain.'/'.$ownername.'./'}) || + exists($env{'user.priv.aa./'.$ownerdomain.'/'.$ownername.'./'}) ) { + return ($ownername,$ownerdomain); + } + } +# We don't have any access right now. If we are not possibly going to do anything about this, +# we might as well leave + unless ($setpriv) { return ''; } + +# Backdoor access? + my $allowed=&Apache::lonnet::allowed('eco',$ownerdomain); +# Nope + unless ($allowed) { return ''; } +# Looks like we may have access, but could be locked by the owner of the construction space + if ($allowed eq 'U') { + my %blocked=&Apache::lonnet::get('environment',['domcoord.author'], + $ownerdomain,$ownername); +# Is blocked by owner + if ($blocked{'domcoord.author'} eq 'blocked') { return ''; } + } + if (($allowed eq 'F') || ($allowed eq 'U')) { +# Grant temporary access + my $then=$env{'user.login.time'}; + my $update==$env{'user.update.time'}; + if (!$update) { $update = $then; } + my $refresh=$env{'user.refresh.time'}; + if (!$refresh) { $refresh = $update; } + my $now = time; + &Apache::lonnet::check_adhoc_privs($ownerdomain,$ownername, + $update,$refresh,$now,'ca', + 'constructaccess'); + return($ownername,$ownerdomain); + } +# No business here + return ''; +} sub handler { my $r = shift; my $requrl=$r->uri; - my %cookies=CGI::Cookie->parse($r->header_in('Cookie')); - my $lonid=$cookies{'lonID'}; - my $cookie; - if ($lonid) { - my $handle=$lonid->value; - $handle=~s/\W//g; + $env{'request.editurl'}=$requrl; + + my $handle = &Apache::lonnet::check_for_valid_session($r); + if ($handle ne '') { + +# ------------------------------------------------------ Initialize Environment my $lonidsdir=$r->dir_config('lonIDsDir'); - if ((-e "$lonidsdir/$handle.id") && ($handle ne '')) { - my $ownername=$requrl; - $ownername=~s/\/\~(\w+).*/\1/; - my $ownerdomain=$r->dir_config('lonDefDomain'); - my @handleparts=split(/\_/,$handle); - my $username=$handleparts[0]; - my $domain=$handleparts[2]; - if (($username ne $ownername) || ($domain ne $ownerdomain)) { - $r->log_reason - ("$username at $domain not authorized", $r->filename); - return HTTP_NOT_ACCEPTABLE; - } - my @profile; - { - my $idf=Apache::File->new("$lonidsdir/$handle.id"); - @profile=<$idf>; - } - my $envi; - for ($envi=0;$envi<=$#profile;$envi++) { - chomp($profile[$envi]); - my ($envname,$envvalue)=split(/=/,$profile[$envi]); - $r->subprocess_env("$envname" => "$envvalue"); - } - $r->subprocess_env("user.environment" => "$lonidsdir/$handle.id", - "request.state" => "construct", - "request.filename" => $r->filename); - return OK; - } else { - $r->log_reason("Cookie $handle not valid", $r->filename) - }; + &Apache::lonnet::transfer_profile_to_env($lonidsdir,$handle); + +# --------------------------------------------------------- Initialize Language + + &Apache::lonlocal::get_language_handle($r); + +# -------------------------------------------------------------- Resource State + + $env{'request.state'} = "construct"; + $env{'request.filename'} = $r->filename; + + unless (&constructaccess($requrl,'setpriv')) { + $r->log_reason("Unauthorized $requrl", $r->filename); + return HTTP_NOT_ACCEPTABLE; + } + +# -------------------------------------------------------- Load POST parameters + + &Apache::lonacc::get_posted_cgi($r); + + return OK; + } else { + $r->log_reason("Cookie $handle not valid", $r->filename) } - $cookie=CGI::Cookie->new(-name => 'lonURL', - -value => $requrl, - -path => '/'); - $r->err_headers_out->add('Set-Cookie' => $cookie); + +# ----------------------------------------------- Store where they wanted to go + + $env{'request.firsturl'}=$requrl; return FORBIDDEN; }