version 1.16, 2016/08/16 20:17:54
|
version 1.41, 2023/06/02 01:20:28
|
Line 29
|
Line 29
|
package Apache::lontrans; |
package Apache::lontrans; |
|
|
use strict; |
use strict; |
use Apache::Constants qw(:common :remotehost REDIRECT); |
use Apache::Constants qw(:common :remotehost); |
use Apache::lonnet(); |
use Apache::lonnet; |
|
use Apache::loncommon; |
use Apache::File(); |
use Apache::File(); |
use LONCAPA qw(:DEFAULT :match); |
use LONCAPA qw(:DEFAULT :match); |
|
|
sub handler { |
sub handler { |
my $r = shift; |
my $r = shift; |
# FIXME line remove when mod_perl fixes BUG#4948 |
# FIXME line remove when mod_perl fixes BUG#4948 |
$r->notes->set('error-notes' => ''); |
$r->notes->set('error-notes' => ''); |
|
my $hdrhost = $r->headers_in->get('Host'); |
|
if (($r->uri eq '/adm/service/passback') || |
|
($r->uri eq '/adm/service/roster')) { |
|
return OK; |
|
} |
if ($r->uri=~m{^/raw/}) { |
if ($r->uri=~m{^/raw/}) { |
my $host = $r->headers_in->get('Host'); |
if ($hdrhost) { |
if ($host) { |
unless ($hdrhost =~ /^internal\-/) { |
unless ($host =~ /^internal\-/) { |
my $remote_ip = &Apache::lonnet::get_requestor_ip($r,REMOTE_NOLOOKUP,1); |
my $remote_ip = $r->get_remote_host(); |
|
my $lonhost = $r->dir_config('lonHostID'); |
my $lonhost = $r->dir_config('lonHostID'); |
if (&redirect_raw($remote_ip,$lonhost)) { |
if (&redirect_raw($remote_ip,$lonhost)) { |
my $location = 'https://internal-'.$host.$r->uri; |
my $location = 'https://internal-'.$hdrhost.$r->uri; |
$r->headers_out->set(Location => $location); |
$r->headers_out->set(Location => $location); |
return REDIRECT; |
return REDIRECT; |
} |
} |
} |
} |
} |
} |
} |
} |
|
my $alias = &Apache::lonnet::get_proxy_alias(); |
|
if ($alias) { |
|
my $lonhost = $r->dir_config('lonHostID'); |
|
my $hostname = &Apache::lonnet::hostname($lonhost); |
|
my $ssourl = '/adm/sso'; |
|
if ($r->dir_config('lonOtherAuthenUrl') ne '') { |
|
$ssourl = $r->dir_config('lonOtherAuthenUrl'); |
|
} |
|
if (($hdrhost eq $alias) || ($hdrhost eq $hostname)) { |
|
my $proxyinfo = &Apache::lonnet::get_proxy_settings($r->dir_config('lonDefDomain')); |
|
my ($vpnint,$vpnext); |
|
if (ref($proxyinfo) eq 'HASH') { |
|
$vpnint = $proxyinfo->{'vpnint'}; |
|
$vpnext = $proxyinfo->{'vpnext'}; |
|
} |
|
my ($redirect,$remote_ip); |
|
if ($hdrhost eq $alias) { |
|
$remote_ip = &Apache::lonnet::get_requestor_ip($r,REMOTE_NOLOOKUP); |
|
if (($vpnext && &Apache::lonnet::ip_match($remote_ip,$vpnext)) && |
|
($r->uri !~ m{^/adm/(lti|launch)/})) { |
|
$redirect = $hostname; |
|
} |
|
if ($r->uri eq $ssourl) { |
|
if (&Apache::lonnet::alias_sso($lonhost)) { |
|
undef($redirect); |
|
} else { |
|
$redirect = $hostname; |
|
} |
|
} |
|
if ($redirect eq $hdrhost) { |
|
undef($redirect); |
|
} |
|
} elsif ($hdrhost eq $hostname) { |
|
$remote_ip = &Apache::lonnet::get_requestor_ip($r,REMOTE_NOLOOKUP,1); |
|
unless (($remote_ip eq '127.0.0.1') || ($remote_ip eq '::1') || |
|
($remote_ip eq &Apache::lonnet::get_host_ip($lonhost)) || |
|
($r->uri=~m{^/adm/(lti|launch)/}) || |
|
($vpnint && &Apache::lonnet::ip_match($remote_ip,$vpnint))) { |
|
$redirect = $alias; |
|
if (($r->uri=~m{^/raw/}) || ($r->uri=~m{^/adm/dns/})) { |
|
my %iphost = &Apache::lonnet::get_iphost(); |
|
if (exists($iphost{$remote_ip})) { |
|
undef($redirect); |
|
} |
|
} elsif ($r->uri eq $ssourl) { |
|
unless (&Apache::lonnet::alias_sso($lonhost)) { |
|
undef($redirect); |
|
} |
|
} |
|
} |
|
} |
|
if ($redirect) { |
|
my $uri = $r->uri; |
|
if (($uri eq '/adm/switchserver') || ($uri =~ m{^/Shibboleth.sso/})) { |
|
return DECLINED; |
|
} |
|
unless (($uri eq '/adm/migrateuser') || ($uri eq $ssourl)) { |
|
my %user; |
|
my $handle = &Apache::lonnet::check_for_valid_session($r,undef,\%user); |
|
if (($handle) && ($user{'name'} ne '') && ($user{'domain'} ne '')) { |
|
unless (($user{'name'} eq 'public') && ($user{'domain'} eq 'public')) { |
|
my $dest = '/adm/migrateuser'; |
|
my $token = &set_token($r,$dest,$remote_ip,\%user); |
|
unless ($token eq '') { |
|
$r->internal_redirect("$dest?token=$token"); |
|
$r->set_handlers('PerlHandler'=> undef); |
|
return DECLINED; |
|
} |
|
} |
|
} |
|
} |
|
my $protocol = 'http'; |
|
my $port = $r->get_server_port(); |
|
if ($port eq '443') { |
|
$protocol = 'https'; |
|
} |
|
if ($uri =~ m{^(/adm/css/)(.+)(.css)$}) { |
|
$uri = $1.&escape($2).$3; |
|
} |
|
my $location = $protocol.'://'.$redirect.$uri; |
|
if ($r->uri =~ m{^/tiny/$match_domain/\w+$}) { |
|
my $token = &set_token($r,$r->uri); |
|
unless ($token eq '') { |
|
$location .= '?ttoken='.$token; |
|
} |
|
} elsif ($r->args) { |
|
$location .= '?'.$r->args; |
|
} |
|
$r->header_out(Location => $location); |
|
return REDIRECT; |
|
} |
|
} |
|
} |
|
if ($r->uri =~ m{^/tiny/$match_domain/\w+$}) { |
|
my $token = &set_token($r,$r->uri); |
|
unless ($token eq '') { |
|
$r->args('ttoken='.$token); |
|
} |
|
} |
if ($r->uri=~m|^(/raw)?/uploaded/|) { |
if ($r->uri=~m|^(/raw)?/uploaded/|) { |
my $fn = $r->uri(); |
my $fn = $r->uri(); |
$fn=~s/^\/raw//; |
$fn=~s/^\/raw//; |
Line 66 sub handler {
|
Line 170 sub handler {
|
'/userfiles/'.(join('/',@ufile))); |
'/userfiles/'.(join('/',@ufile))); |
} |
} |
return OK; |
return OK; |
} else { |
} elsif ($r->uri =~ m{^\Q/adm/wrapper/ext/https:/\E[^/]}) { |
return DECLINED; |
my $uri = $r->uri; |
|
$uri =~ s{^(\Q/adm/wrapper/ext/https:/\E)}{$1/}; |
|
$r->uri($uri); |
} |
} |
|
return DECLINED; |
} |
} |
|
|
sub redirect_raw { |
sub redirect_raw { |
Line 98 sub redirect_raw {
|
Line 205 sub redirect_raw {
|
my $remintdom = &Apache::lonnet::internet_dom($remprimary); |
my $remintdom = &Apache::lonnet::internet_dom($remprimary); |
if (ref($replication->{'certreq'}) eq 'ARRAY') { |
if (ref($replication->{'certreq'}) eq 'ARRAY') { |
if (grep(/^\Q$remintdom\E$/,@{$replication->{'certreq'}})) { |
if (grep(/^\Q$remintdom\E$/,@{$replication->{'certreq'}})) { |
$redirect = 1; |
|
} else { |
|
$redirect = 0; |
$redirect = 0; |
|
} else { |
|
$redirect = 1; |
} |
} |
} |
} |
if (ref($replication->{'nocertreq'}) eq 'ARRAY') { |
if (ref($replication->{'nocertreq'}) eq 'ARRAY') { |
if (grep(/^\Q$remintdom\E$/,@{$replication->{'nocertreq'}})) { |
if (grep(/^\Q$remintdom\E$/,@{$replication->{'nocertreq'}})) { |
$redirect = 0; |
|
} else { |
|
$redirect = 1; |
$redirect = 1; |
|
} else { |
|
$redirect = 0; |
} |
} |
} |
} |
} |
} |
Line 117 sub redirect_raw {
|
Line 224 sub redirect_raw {
|
last; |
last; |
} |
} |
} |
} |
return $redirect; |
return $redirect; |
|
} |
|
|
|
sub set_token { |
|
my ($r,$dest,$remote_ip,$userref) = @_; |
|
my (%info,%user); |
|
if ($dest eq '/adm/migrateuser') { |
|
return unless (ref($userref) eq 'HASH'); |
|
%user = %{$userref}; |
|
%info = ('ip' => $remote_ip, |
|
'domain' => $user{'domain'}, |
|
'username' => $user{'name'}, |
|
'server' => $r->dir_config('lonHostID'), |
|
); |
|
} |
|
if ($r->args) { |
|
foreach my $pair (split(/&/,$r->args)) { |
|
my ($name,$value) = split(/=/,$pair); |
|
$name = &LONCAPA::unescape($name); |
|
next unless (($name eq 'role') || ($name eq 'symb') || |
|
($name eq 'ltoken') || ($name eq 'linkkey') || |
|
($name eq 'ttoken')); |
|
$value =~ tr/+/ /; |
|
$value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg; |
|
$info{$name} = $value; |
|
} |
|
if ($info{'ttoken'}) { |
|
my %current = &Apache::lonnet::tmpget($info{'ttoken'}); |
|
delete($info{'ttoken'}); |
|
if ($current{'origurl'} eq $r->uri) { |
|
return if (keys(%current)); |
|
} |
|
} |
|
} |
|
# |
|
# To be able to support deep-linking for a shortened URL, i.e., |
|
# /tiny/$dom/$id with (a) linkkey included in POSTed data and |
|
# data and (b) non-Shibboleth SSO in use, ltoken (or linkprot |
|
# if sending to /adm/migrateuser), or linkkey are written to a |
|
# .tmp file in /home/httpd/perl/tmp and the query string is |
|
# replaced with ttoken=tokenid. This does mean other POSTed |
|
# data will be discarded. |
|
# |
|
if ($r->uri =~ m{^/tiny/$match_domain/\w+$}) { |
|
unless (($info{'ltoken'}) || ($info{'linkkey'} ne '')) { |
|
&Apache::lonacc::get_posted_cgi($r,['linkkey']); |
|
if ($env{'form.linkkey'} ne '') { |
|
$info{'linkkey'} = $env{'form.linkkey'}; |
|
} |
|
} |
|
} |
|
if ($dest eq '/adm/migrateuser') { |
|
if ($info{'ltoken'}) { |
|
my %link_info = &Apache::lonnet::tmpget($info{'ltoken'}); |
|
if ($link_info{'linkprot'}) { |
|
$info{'linkprot'} = $link_info{'linkprot'}; |
|
foreach my $item ('linkprotuser','linkprotexit','linkprotpbid','linkprotpburl') { |
|
if ($link_info{$item} ne '') { |
|
$info{$item} = $link_info{$item}; |
|
} |
|
} |
|
} |
|
&Apache::lonnet::tmpdel($info{'ltoken'}); |
|
delete($info{'ltoken'}); |
|
} |
|
unless ($info{'role'}) { |
|
if ($user{'role'} ne '') { |
|
$info{'role'} = $user{'role'}; |
|
} |
|
} |
|
unless ($info{'symb'}) { |
|
unless ($r->uri eq '/adm/roles') { |
|
$info{'origurl'} = $r->uri; |
|
} |
|
} |
|
} |
|
if (($dest eq '/adm/migrateuser') || (keys(%info) > 0)) { |
|
unless ($dest eq '/adm/migrateuser') { |
|
$info{'origurl'} = $r->uri; |
|
} |
|
my $token = &Apache::lonnet::tmpput(\%info,$r->dir_config('lonHostID'),'link'); |
|
unless (($token eq 'con_lost') || ($token eq 'refused') || |
|
($token eq 'unknown_cmd') || ($token eq 'no_such_host')) { |
|
return $token; |
|
} |
|
} |
|
return; |
} |
} |
|
|
1; |
1; |
__END__ |
__END__ |
|
|
|
|
|
|
|
|
|
|
|
|
|
|