File:  [LON-CAPA] / loncom / auth / loncacc.pm
Revision 1.57: download - view: text, annotated - select for diffs
Sun Oct 30 20:31:02 2011 UTC (12 years, 7 months ago) by raeburn
Branches: MAIN
CVS tags: HEAD
- Update documentation
- Use lonDocRoot perlvar in place of static string: '/home/httpd/html'
- Coding style: eliminate leaning toothpicks.

    1: # The LearningOnline Network
    2: # Cookie Based Access Handler for Construction Area
    3: # (lonacc: 5/21/99,5/22,5/29,5/31 Gerd Kortemeyer)
    4: #
    5: # $Id: loncacc.pm,v 1.57 2011/10/30 20:31:02 raeburn Exp $
    6: #
    7: # Copyright Michigan State University Board of Trustees
    8: #
    9: # This file is part of the LearningOnline Network with CAPA (LON-CAPA).
   10: #
   11: # LON-CAPA is free software; you can redistribute it and/or modify
   12: # it under the terms of the GNU General Public License as published by
   13: # the Free Software Foundation; either version 2 of the License, or
   14: # (at your option) any later version.
   15: #
   16: # LON-CAPA is distributed in the hope that it will be useful,
   17: # but WITHOUT ANY WARRANTY; without even the implied warranty of
   18: # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   19: # GNU General Public License for more details.
   20: #
   21: # You should have received a copy of the GNU General Public License
   22: # along with LON-CAPA; if not, write to the Free Software
   23: # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
   24: #
   25: # /home/httpd/html/adm/gpl.txt
   26: #
   27: # http://www.lon-capa.org/
   28: #
   29: 
   30: =pod
   31: 
   32: =head1 NAME
   33: 
   34: Apache::lonacc - Cookie Based Access Handler for Construction Area
   35: 
   36: =head1 SYNOPSIS
   37: 
   38: Invoked (for various locations) by /etc/httpd/conf/loncapa_apache.conf:
   39: 
   40:  PerlAccessHandler       Apache::loncacc
   41: 
   42: =head1 INTRODUCTION
   43: 
   44: This module enables cookie based authentication for construction area
   45: and is used to control access for the following two types of URI 
   46: (one for files, and one for directories):
   47: 
   48:  <LocationMatch "^/priv.*">
   49:  <LocationMatch "^/priv.*/$">
   50: 
   51: Whenever the client sends the cookie back to the server, 
   52: if the cookie is missing or invalid, the user is re-challenged
   53: for login information.
   54: 
   55: This is part of the LearningOnline Network with CAPA project
   56: described at http://www.lon-capa.org.
   57: 
   58: =head1 HANDLER SUBROUTINE
   59: 
   60: This routine is called by Apache and mod_perl.
   61: 
   62: =over 4
   63: 
   64: =item *
   65: 
   66: load POST parameters
   67: 
   68: =item *
   69: 
   70: store where they wanted to go (first url entered)
   71: 
   72: =back
   73: 
   74: =head1 OTHERSUBROUTINES
   75: 
   76: =over
   77: 
   78: =item constructaccess($url,$setpriv)
   79: 
   80: See if the owner domain and name
   81: in the URL match those in the expected environment.  If so, return 
   82: two element list ($ownername,$ownerdomain).  Else, return null string.
   83: If 'setpriv' is set to 'setpriv', it actually assigns the privileges.
   84: =back
   85: 
   86: =cut
   87: 
   88: 
   89: package Apache::loncacc;
   90: 
   91: use strict;
   92: use Apache::Constants qw(:common :http :methods REDIRECT);
   93: use Fcntl qw(:flock);
   94: use Apache::lonlocal;
   95: use Apache::lonnet;
   96: use Apache::lonacc;
   97: use LONCAPA qw(:DEFAULT :match);
   98: 
   99: sub constructaccess {
  100:     my ($url,$setpriv)=@_;
  101: 
  102: # We do not allow editing of previous versions of files
  103:     if ($url=~/\.(\d+)\.(\w+)$/) { return ''; }
  104: 
  105: # Get username and domain from URL
  106:     my $londocroot = $Apache::lonnet::perlvar{'lonDocRoot'};
  107:     my ($ownerdomain,$ownername)=($url=~ m{^(?:\Q$londocroot\E|)/priv/($match_domain)/($match_username)/});
  108: 
  109: # The URL does not really point to any authorspace, forget it
  110:     unless (($ownername) && ($ownerdomain)) { return ''; }
  111:   
  112: # Now we need to see if the user has access to the authorspace of
  113: # $ownername at $ownerdomain
  114: 
  115:     if (($ownername eq $env{'user.name'}) && ($ownerdomain eq $env{'user.domain'})) {
  116: # Real author for this?
  117:        if (exists($env{'user.priv.au./'.$ownerdomain.'/./'})) {
  118:           return ($ownername,$ownerdomain);
  119:        }
  120:     } else {
  121: # Co-author for this?
  122: 	if (exists($env{'user.priv.ca./'.$ownerdomain.'/'.$ownername.'./'}) ||
  123: 	    exists($env{'user.priv.aa./'.$ownerdomain.'/'.$ownername.'./'}) ) {
  124: 	    return ($ownername,$ownerdomain);
  125: 	}
  126:     }
  127: # We don't have any access right now. If we are not possibly going to do anything about this,
  128: # we might as well leave
  129:    unless ($setpriv) { return ''; }
  130: 
  131: # Backdoor access?
  132:     my $allowed=&Apache::lonnet::allowed('eco',$ownerdomain);
  133: # Nope
  134:     unless ($allowed) { return ''; }
  135: # Looks like we may have access, but could be locked by the owner of the construction space
  136:     if ($allowed eq 'U') {
  137:         my %blocked=&Apache::lonnet::get('environment',['domcoord.author'],
  138:                                          $ownerdomain,$ownername);
  139: # Is blocked by owner
  140:         if ($blocked{'domcoord.author'} eq 'blocked') { return ''; }
  141:     }
  142:     if (($allowed eq 'F') || ($allowed eq 'U')) {
  143: # Grant temporary access
  144:         my $then=$env{'user.login.time'};
  145:         my $update==$env{'user.update.time'};
  146:         if (!$update) { $update = $then; }
  147:         my $refresh=$env{'user.refresh.time'};
  148:         if (!$refresh) { $refresh = $update; }
  149:         my $now = time;
  150:         &Apache::lonnet::check_adhoc_privs($ownerdomain,$ownername,
  151:                                            $update,$refresh,$now,'ca',
  152:                                            'constructaccess');
  153:         return($ownername,$ownerdomain);
  154:     }
  155: # No business here
  156:     return '';
  157: }
  158: 
  159: sub handler {
  160:     my $r = shift;
  161:     my $requrl=$r->uri;
  162:     $env{'request.editurl'}=$requrl;
  163: 
  164:     my $handle =  &Apache::lonnet::check_for_valid_session($r);
  165:     if ($handle ne '') {
  166: 
  167: # ------------------------------------------------------ Initialize Environment
  168:         my $lonidsdir=$r->dir_config('lonIDsDir');
  169: 	&Apache::lonnet::transfer_profile_to_env($lonidsdir,$handle);
  170: 
  171: # --------------------------------------------------------- Initialize Language
  172:  
  173: 	&Apache::lonlocal::get_language_handle($r);
  174: 
  175: # -------------------------------------------------------------- Resource State
  176: 
  177: 	$env{'request.state'}    = "construct";
  178: 	$env{'request.filename'} = $r->filename;
  179: 
  180: 	unless (&constructaccess($requrl,'setpriv')) {
  181: 	    $r->log_reason("Unauthorized $requrl", $r->filename); 
  182: 	    return HTTP_NOT_ACCEPTABLE;
  183: 	}
  184: 
  185: # -------------------------------------------------------- Load POST parameters
  186: 
  187: 	&Apache::lonacc::get_posted_cgi($r);
  188: 
  189: 	return OK; 
  190:     } else { 
  191: 	$r->log_reason("Cookie $handle not valid", $r->filename) 
  192:     }
  193: 
  194: # ----------------------------------------------- Store where they wanted to go
  195: 
  196:     $env{'request.firsturl'}=$requrl;
  197:     return FORBIDDEN;
  198: }
  199: 
  200: 1;
  201: __END__
  202: 
  203: 
  204: 
  205: 
  206: 
  207: 
  208: 
  209: 

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>