--- loncom/build/make_domain_coordinator.pl 2011/11/17 14:29:51 1.20 +++ loncom/build/make_domain_coordinator.pl 2013/04/04 15:50:05 1.25 @@ -11,7 +11,7 @@ make_domain_coordinator.pl - Make a doma # The LearningOnline Network # make_domain_coordinator.pl - Make a domain coordinator on a system # -# $Id: make_domain_coordinator.pl,v 1.20 2011/11/17 14:29:51 raeburn Exp $ +# $Id: make_domain_coordinator.pl,v 1.25 2013/04/04 15:50:05 raeburn Exp $ # # This file is part of the LearningOnline Network with CAPA (LON-CAPA). # @@ -96,6 +96,7 @@ use Term::ReadKey; use Apache::lonnet; use Apache::lonlocal; use DBI; +use Storable qw(nfreeze); use strict; =pod @@ -206,10 +207,10 @@ while ((!$got_passwd) && ($trial < $maxt &mt('Please try again.')."\n"); } else { my $pbad=0; - foreach (split(//,$passwd)) {if ((ord($_)<32)||(ord($_)>126)){$pbad=1;}} + foreach (split(//,$firstpass)) {if ((ord($_)<32)||(ord($_)>126)){$pbad=1;}} if ($pbad) { print(&mt('Password contains invalid characters.')."\n". - &mt('Password must consist of standard ASCII characters')."\n". + &mt('Password must consist of standard ASCII characters.')."\n". &mt('Please try again.')."\n"); } else { $secondpass = &get_password(&mt('Enter password a second time')); @@ -364,10 +365,21 @@ if (open(PIPE,"perl distprobe|")) { $distro = ; close(PIPE); } + +my $setpasswd = 0; if ($distro =~ /^ubuntu|debian/) { open(OUT,"|usermod -p `mkpasswd $passwd` $username"); close(OUT); -} else { + $setpasswd = 1; +} elsif ($distro =~ /^suse(\d+)\.(\d)$/) { + if (($1 > 12) || (($1 == 12) && ($2 > 1))) { + open(OUT,"|chpasswd"); + print(OUT "$username:$passwd\n"); + close(OUT); + $setpasswd = 1; + } +} +unless ($setpasswd) { open(OUT,"|passwd --stdin $username"); print(OUT $passwd."\n"); close(OUT); @@ -443,7 +455,7 @@ use GDBM_File; # A simplistic key-value my $rolesref=&LONCAPA::locking_hash_tie("$udpath/roles.db",&GDBM_WRCREAT()); if (!$rolesref) { print(&mt('Error').' '. - &mt('unable to tie roles db: [_1]'."$udpath/roles.db")."\n"); + &mt('unable to tie roles db: [_1].',"$udpath/roles.db")."\n"); exit; } my $now = time; @@ -476,6 +488,41 @@ $domrolesref->{$domkey}= &LONCAPA::escap system('/bin/chown',"www:www","$dompath/nohist_domainroles.db"); # Must be writeable by httpd process. system('/bin/chown',"www:www","$dompath/nohist_domainroles.db.lock"); +# Log with domainconfiguser in nohist_rolelog.db +my $domconfiguser = $domain.'-domainconfig'; +my $subdir = $domconfiguser; +$subdir =~ s/(.)(.)(.).*/$1\/$2\/$3/; +$subdir .= "/$domconfiguser"; + +if (-d "$dompath/$subdir") { + my $rolelogref = &LONCAPA::locking_hash_tie("$dompath/$subdir/nohist_rolelog.db",&GDBM_WRCREAT()); + my $domlogkey = &LONCAPA::escape($now.'00000'.$$.'000000'); + my $storehash = { + role => 'dc', + start => $now, + end => 0, + context => 'server', + }; + my $domlogvalue = { + 'exe_uname' => '', + 'exe_udom' => $domain, + 'exe_time' => $now, + 'exe_ip' => '127.0.0.1', + 'delflag' => '', + 'logentry' => $storehash, + 'uname' => $username, + 'udom' => $domain, + }; + $rolelogref->{$domlogkey}=&freeze_escape($domlogvalue); + &LONCAPA::locking_hash_untie($rolelogref); + + system('/bin/chown',"www:www","$dompath/$subdir/nohist_rolelog.db"); # Must be writeable by httpd process. + system('/bin/chown',"www:www","$dompath/$subdir/nohist_rolelog.db.lock"); +} else { + print(&mt('Failed to log role creation as the path to the directory: "[_1]" does not exist.',"$dompath/$subdir/")."\n". + &mt('Please run UPDATE from the top level directory of the extracted LON-CAPA tarball, i.e., two levels up from this current directory (loncom/build).')); +} + #Update allusers MySQL table print(&mt('Adding new user to allusers table.')."\n"); @@ -574,6 +621,15 @@ sub get_password { return $newpasswd; } +sub freeze_escape { + my ($value)=@_; + if (ref($value)) { + $value=&nfreeze($value); + return '__FROZEN__'.&LONCAPA::escape($value); + } + return &LONCAPA::escape($value); +} + =pod =head1 AUTHOR